Cryptology ePrint Archive: Listing for 2020
Regex
2020/1620 (PDF ) Neural Aided Statistical Attack for Cryptanalysis Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan
2020/1619 (PDF ) Getting Rid of Linear Algebra in Number Theory Problems Paul Kirchner, Pierre-Alain Fouque
2020/1618 (PDF ) Proof-Carrying Data without Succinct Arguments Benedikt Bünz, Alessandro Chiesa, William Lin, Pratyush Mishra, Nicholas Spooner
2020/1617 (PDF ) Arguments of Knowledge via hidden order groups Steve Thakur
2020/1616 (PDF ) Algebraic Geometric Secret Sharing Schemes over Large Fields Are Asymptotically Threshold Fan Peng, Hao Chen, Chang-An Zhao
2020/1615 (PDF ) An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations Jiangtao Yuan, Guoai Xu, Guosheng Xu
2020/1614 (PDF ) SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gaži, Sarah Meiklejohn, Edgar Weippl
2020/1613 (PDF ) Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta
2020/1612 (PDF ) A New Efficient Hierarchical Multi-secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations Jiangtao Yuan, Jing Yang, Guoai Xu, Xingxing Jia, Fang-wei Fu, Chenyu Wang
2020/1611 (PDF ) SLAP: Simple Lattice-Based Private Stream Aggregation Protocol Jonathan Takeshita, Ryan Karl, Ting Gong, Taeho Jung
2020/1610 (PDF ) New directions in the ransomware phenomenon Mihai-Andrei Costandache, Marian-Stefan Mihalache, Emil Simion
2020/1609 (PDF ) A new method for secondary constructions of vectorial bent functions Amar Bapić, Enes Pasalic
2020/1608 (PDF ) Cryptographic competitions Daniel J. Bernstein
2020/1607 (PDF ) Manta: Privacy Preserving Decentralized Exchange Shumo Chu, Qiudong Xia, Zhenfei Zhang
2020/1606 (PDF ) PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, Hunter Qu
2020/1605 (PDF ) $P_4$-free Partition and Cover Numbers and Application Alexander R. Block, Simina Branzei, Hemanta K. Maji, Himanshi Mehta, Tamalika Mukherjee, Hai H. Nguyen
2020/1604 (PDF ) An Embedded Domain-Specific Language for Logical Circuit Descriptions with Applications to Garbled Circuits Andrei Lapets, Wyatt Howe, Ben Getchell, Frederick Jansen
2020/1603 (PDF ) One-Time Delegation of Unlinkable Signing Rights and Its Application Takashi Nishide
2020/1602 (PDF ) Speeding-up Ideal Lattice-Based Key Exchange Using a RSA/ECC Coprocessor Aurélien Greuet, Simon Montoya, Guénaël Renault
2020/1601 (PDF ) Adaptive layer-two dispute periods in blockchains Rami Khalil, Naranker Dulay
2020/1600 (PDF ) Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz
2020/1599 (PDF ) Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou
2020/1598 (PDF ) MILP Based Differential Attack on Round Reduced WARP Manoj Kumar, Tarun Yadav
2020/1597 (PDF ) A New Improved AES S-box With Enhanced Properties Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2020/1596 (PDF ) Batched Differentially Private Information Retrieval Kinan Dak Albab, Rawane Issa, Mayank Varia, Kalman Graffi
2020/1595 (PDF ) Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye
2020/1594 (PDF ) Bootstrapping on SEAL HyungChul Kang, Joon-Woo Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No
2020/1593 (PDF ) Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies Edward Eaton, David Jao, Chelsea Komlo, Youcef Mokrani
2020/1592 (PDF ) Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time Elaine Shi, Waqar Aqeel, Balakrishnan Chandrasekaran, Bruce Maggs
2020/1591 (PDF ) Game-Theoretic Fairness Meets Multi-Party Protocols: The Case of Leader Election Kai-Min Chung, T-H. Hubert Chan, Ting Wen, Elaine Shi
2020/1590 (PDF ) RandPiper -- Reconfiguration-Friendly Random Beacons with Quadratic Communication Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak
2020/1589 (PDF ) Unifying Presampling via Concentration Bounds Siyao Guo, Qian Li, Qipeng Liu, Jiapeng Zhang
2020/1588 (PDF ) Deniable Fully Homomorphic Encryption from LWE Shweta Agrawal, Shafi Goldwasser, Saleet Mossel
2020/1587 (PDF ) On the properties of the Boolean functions associated to the differential spectrum of general APN functions and their consequences Claude Carlet
2020/1586 (PDF ) CirC: Compiler infrastructure for proof systems, software verification, and more Alex Ozdemir, Fraser Brown, Riad S. Wahby
2020/1585 (PDF ) Semi-Regularity of Pairs of Boolean Polynomials Timothy J. Hodges, Hari R. Iyer
2020/1584 (PDF ) Post-Quantum Hash-Based Signatures for Secure Boot Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff
2020/1583 (PDF ) HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System Iraklis Symeonidis, Dragos Rotaru, Mustafa A. Mustafa, Bart Mennink, Bart Preneel, Panos Papadimitratos
2020/1582 (PDF ) A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong
2020/1581 (PDF ) Remark on the Security of CKKS Scheme in Practice Jung Hee Cheon, Seungwan Hong, Duhyeong Kim
2020/1580 (PDF ) Achieving State Machine Replication without Honest Players Conor McMenamin, Vanesa Daza, Matteo Pontecorvi
2020/1579 (PDF ) Efficient Verifiable Image Redacting based on zk-SNARKs Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh
2020/1578 (PDF ) An IND-CCA2 Attack Against the 1st- and 2nd-round Versions of NTS-KEM Tung Chou
2020/1577 (PDF ) Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning Alessandro Baccarini, Marina Blanton, Chen Yuan
2020/1576 (PDF ) How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong
2020/1575 (PDF ) (In)security of the Radio Interface in Sigfox Loïc Ferreira
2020/1574 (PDF ) Analysing Mining Machine Shutdown Price Shange Fu, Jiangshan Yu, Rafael Dowsley, Joseph Liu
2020/1571 (PDF ) Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server Olivier Blazy, Laura Brouilhet, Celine Chevalier, Patrick Towa, Ida Tucker, Damien Vergnaud
2020/1570 (PDF ) Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary Onur Gunlu, Rafael F. Schaefer
2020/1569 (PDF ) Optimal Communication Complexity of Authenticated Byzantine Agreement Atsuki Momose, Ling Ren
2020/1568 (PDF ) Compact Certificates of Collective Knowledge Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich
2020/1567 (PDF ) Secure Decentralized Access Control Policy for Data Sharing in Smart Grid Yadi Ye, Leyou Zhang, Yi Mu, Wenting You
2020/1566 (PDF ) An efficient and provably secure authenticated key agreement scheme for mobile edge computing Mohammad Amin Rakeei, Farokhlagha Moazami
2020/1565 (PDF ) Achieving privacy and accountability in traceable digital currency Amira Barki, Aline Gouget
2020/1564 (PDF ) Prime Proof Protocol Anna M. Johnston, Rathna Ramesh
2020/1563 (PDF ) Verifiable Timed Signatures Made Practical Sri Aravinda KrishnanThyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder
2020/1562 (PDF ) A complete study of two classes of Boolean functions for homomorphic-friendly stream ciphers Claude Carlet, Pierrick Méaux
2020/1561 (PDF ) Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Online Fault Tolerance Ryan Karl, Jonathan Takeshita, Nirajan Koirla, Taeho Jung
2020/1560 (PDF ) Modified Cache Template Attack on AES Mahdi Esfahani, Hadi Soleimany, Mohammad Reza Aref
2020/1559 (PDF ) On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
2020/1558 (PDF ) Double-Odd Elliptic Curves Thomas Pornin
2020/1557 (PDF ) Efficient Quantum Public-Key Encryption From Learning With Errors Javad Doliskani
2020/1556 (PDF ) Honest Majority MPC with Abort with Minimal Online Communication Daniel Escudero, Anders Dalskov
2020/1555 (PDF ) Limits on the Efficiency of (Ring) LWE based Non-Interactive Key Exchange Siyao Guo, Pritish Kamath, Alon Rosen, Katerina Sotiraki
2020/1554 (PDF ) DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel Xiaolu Hou, Jakub Breier, Shivam Bhasin
2020/1553 (PDF ) A Novel Asymmetric Searchable Encryption Scheme with Granting search capability Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh
2020/1552 (PDF ) Threshold Password-Hardened Encryption Services Julian Brost, Christoph Egger, Russell W. F. Lai, Fritz Schmid, Dominique Schröder, Markus Zoppelt
2020/1551 (PDF ) Multi-Client Oblivious RAM with Poly-Logarithmic Communication Sherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta
2020/1550 (PDF ) Foundations of Ring Sampling Viktoria Ronge, Christoph Egger, Russell W. F. Lai, Dominique Schröder, Hoover H. F. Yin
2020/1549 (PDF ) High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimization Yongwoo Lee, Joon-Woo Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, HyungChul Kang
2020/1548 (PDF ) CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
2020/1547 (PDF ) Two-server Distributed ORAM with Sublinear Computation and Constant Rounds Ariel Hamlin, Mayank Varia
2020/1546 (PDF ) Privacy-Preserving Epidemiological Modeling on Mobile Graphs Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh
2020/1545 (PDF ) A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications Howard M. Heys
2020/1544 (PDF ) PAS-TA-U: PASsword-based Threshold Authentication with PASsword Update Rachit Rawat, Mahabir Prasad Jhanwar
2020/1543 (PDF ) CovidBloc: A Blockchain Powered Exposure Database for Contact Tracing Deepraj Pandey, Nandini Agrawal, Mahabir Prasad Jhanwar
2020/1542 (PDF ) Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version) Anubhab Baksi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay, Vinay B. Y. Kumar
2020/1541 (PDF ) PsiBench: Pragmatic Benchmark of Two-party Private Set Intersection. Ziyuan Liang, Weiran Liu, Hanwen Feng, Feng Han, Liqiang Peng, Li Peng, Chao Li, Guorui Xu, Lei Zhang, Fan Zhang
2020/1540 (PDF ) On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem Martin R. Albrecht, Nadia Heninger
2020/1539 (PDF ) Information-Theoretic Security of Cryptographic Channels Marc Fischlin, Felix Günther, Philipp Muth
2020/1538 (PDF ) Homological Characterization of bounded $F_2$-regularity Timothy J. Hodges, Sergio Molina
2020/1536 (PDF ) Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon
2020/1535 (PDF ) Designer Primes Anna M. Johnston
2020/1534 (PDF ) Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition SeongHyuck Lim, JongHyeok Lee, Dong-Guk Han
2020/1533 (PDF ) On the Security of Homomorphic Encryption on Approximate Numbers Baiyu Li, Daniele Micciancio
2020/1532 (PDF ) Oblivious Pseudorandom Functions from Isogenies Dan Boneh, Dmitry Kogan, Katharine Woo
2020/1531 (PDF ) Reconstructing with Less: Leakage Abuse Attacks in Two-Dimensions Evangelia Anna Markatou, Francesca Falzon, William Schor, Roberto Tamassia
2020/1530 (PDF ) Security Analysis of Public Key Searchable Encryption Schemes against Injection Attacks Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh
2020/1529 (PDF ) Bounds on the nonlinearity of differentially uniform functions by means of their image set size, and on their distance to affine functions Claude Carlet
2020/1528 (PDF ) On the Concurrent Composition of Quantum Zero-Knowledge Prabhanjan Ananth, Kai-Min Chung, Rolando L. La Placa
2020/1527 (PDF ) Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier Jonathan Bootle, Alessandro Chiesa, Siqi Liu
2020/1526 (PDF ) Flexible and Efficient Verifiable Computation on Encrypted Data Alexandre Bois, Ignacio Cascudo, Dario Fiore, Dongwoo Kim
2020/1525 (PDF ) BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, Christian Janson
2020/1524 (PDF ) Nonce-Misuse Security of the SAEF Authenticated Encryption mode Elena Andreeva, Amit Singh Bhati, Damian Vizar
2020/1523 (PDF ) Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng
2020/1522 (PDF ) Reducing Participation Costs via Incremental Verification for Ledger Systems Weikeng Chen, Alessandro Chiesa, Emma Dauterman, Nicholas P. Ward
2020/1521 (PDF ) Delegated RingCT: faster anonymous transactions Rui Morais, Paul Crocker, Simao Melo de Sousa
2020/1520 (PDF ) The SQALE of CSIDH: Sublinear Vélu Quantum-resistant isogeny Action with Low Exponents Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, Francisco Rodríguez-Henríquez
2020/1519 (PDF ) Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2 Sven Schäge, Jörg Schwenk, Sebastian Lauer
2020/1518 (PDF ) Botnet IND: About Botnets of Botless IoT Devices Ben Nassi, Yair Meidan, Dudi Nassi, Asaf Shabtai, Yuval Elovici
2020/1517 (PDF ) Constructing Locally Leakage-resilient Linear Secret-sharing Schemes Hemanta Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
2020/1516 (PDF ) How to compute all Pointproofs Alin Tomescu
2020/1515 (PDF ) The classification of quadratic APN functions in 7 variables Konstantin Kalgin, Valeriya Idrisova
2020/1514 (PDF ) Improved privacy-preserving training using fixed-Hessian minimisation Tabitha Ogilvie, Rachel Player, Joe Rowell
2020/1513 (PDF ) Indifferentiable hashing from Elligator 2 Mike Hamburg
2020/1512 (PDF ) Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking Jan Pennekamp, Patrick Sapel, Ina Berenice Fink, Simon Wagner, Sebastian Reuter, Christian Hopmann, Klaus Wehrle, Martin Henze
2020/1511 (PDF ) Balancing Privacy and Accountability in Blockchain Identity Management Ivan Damgård, Chaya Ganesh, Hamidreza Khoshakhlagh, Claudio Orlandi, Luisa Siniscalchi
2020/1510 (PDF ) Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP Jun Yan
2020/1509 (PDF ) Single-Message Credential-Hiding Login Kevin Lewi, Payman Mohassel, Arnab Roy
2020/1508 (PDF ) A Combinatorial Approach to Quantum Random Functions Nico Döttling, Giulio Malavolta, Sihang Pu
2020/1507 (PDF ) Improvements to RSA key generation and CRT on embedded devices Mike Hamburg, Mike Tunstall, Qinglai Xiao
2020/1506 (PDF ) Recovering cryptographic keys from partial information, by example Gabrielle De Micheli, Nadia Heninger
2020/1505 (PDF ) Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model Mariusz Jurkiewicz
2020/1504 (PDF ) The Age of Testifying Wearable Devices: The Case of Intoxication Detection Ben Nassi, Lior Rokach, Yuval Elovici
2020/1503 (PDF ) Recovery Attack on Bob's Secrets in CRYSTALS-KYBER and SABER Satoshi Okada, Yuntao Wang
2020/1502 (PDF ) Witness Encryption from Garbled Circuit and Multikey Fully Homomorphic Encryption Techniques Kamil Kluczniak
2020/1501 (PDF ) PANCAKE: Frequency Smoothing for Encrypted Data Stores Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart
2020/1500 (PDF ) Oblivious Transfer is in MiniQCrypt Alex B. Grilo, Huijia Lin, Fang Song, Vinod Vaikuntanathan
2020/1499 (PDF ) Analysing the HPKE Standard Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel
2020/1498 (PDF ) EPID with Malicious Revocation Olivier Sanders, Jacques Traoré
2020/1497 (PDF ) A note on the calculation of some functions in finite fields: Tricks of the Trade Michael Scott
2020/1496 (PDF ) Pseudo-Free Families and Cryptographic Primitives Mikhail Anokhin
2020/1495 (PDF ) CloudMoles: Surveillance of Power-Wasting Activities by Infiltrating Undercover Sensors Seyedeh Sharareh Mirzargar, Andrea Guerrieri, Mirjana Stojilović
2020/1494 (PDF ) Nonintrusive and Adaptive Monitoring for Locating Voltage Attacks in Virtualized FPGAs Seyedeh Sharareh Mirzargar, Gaiëtan Renault, Andrea Guerrieri, Mirjana Stojilović
2020/1493 (PDF ) Verified fast formulas for control bits for permutation networks Daniel J. Bernstein
2020/1492 (PDF ) Automated ciphertext-only attack on the Wheatstone Cryptograph and related devices Thomas Kaeding
2020/1491 (PDF ) Partitioning Oracle Attacks Julia Len, Paul Grubbs, Thomas Ristenpart
2020/1490 (PDF ) Unlinkable and Invisible γ-Sanitizable Signatures Angèle Bossuat, Xavier Bultel
2020/1489 (PDF ) On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger Christian Badertscher, Julia Hesse, Vassilis Zikas
2020/1488 (PDF ) General Properties of Quantum Bit Commitments Jun Yan
2020/1487 (PDF ) One-Way Functions Imply Secure Computation in a Quantum World James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
2020/1486 (PDF ) CommiTEE: An Efficient and Secure Commit-Chain Protocol using TEEs Andreas Erwig, Sebastian Faust, Siavash Riahi, Tobias Stöckert
2020/1485 (PDF ) Quantum Search for Lightweight Block Ciphers: GIFT, SKINNY, SATURNIN Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya
2020/1484 (PDF ) Cryptanalysis of Aggregate $\Gamma$-Signature and Practical Countermeasures in Application to Bitcoin Goichiro Hanaoka, Kazuo Ohta, Yusuke Sakai, Bagus Santoso, Kaoru Takemure, Yunlei Zhao
2020/1483 (PDF ) A Low-Depth Homomorphic Circuit for Logistic Regression Model Training Eric Crockett
2020/1482 (PDF ) Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber Andrea Basso, Sujoy Sinha Roy
2020/1481 (PDF ) Design and implementation of HElib: a homomorphic encryption library Shai Halevi, Victor Shoup
2020/1480 (PDF ) Proofs of non-Supermajority: the missing link for two-phase BFT with responsive view-change and linear complexity Christophe Levrat, Matthieu Rambaud
2020/1479 (PDF ) Automatic Privacy-Preserving Contact Tracing of Novel Coronavirus Infection by Cloud-Enabled WBAN using Blockchain Anupam Pattanayak, Subhasish Dhal, Sourav Kanti Addya
2020/1478 (PDF ) Robust Subgroup Multi-Signatures for Consensus David Galindo, Jia Liu
2020/1477 (PDF ) Machine-checking the universal verifiability of ElectionGuard Thomas Haines, Rajeev Gore, Jack Stodart
2020/1476 (PDF ) Carbon Trading with Blockchain Andreas Richardson, Jiahua Xu
2020/1475 (PDF ) Delegate and Verify the Update Keys of Revocable Identity-Based Encryption Kwangsu Lee
2020/1474 (PDF ) New method of verifying cryptographic protocols based on the process model A. M. Mironov
2020/1473 (PDF ) Lighthouses: A Warning System for Super-Spreader Events Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/1472 (PDF ) Enhancing Code Based Zero-knowledge Proofs using Rank Metric Emanuele Bellini, Philippe Gaborit, Alexandros Hasikos, Victor Mateu
2020/1471 (PDF ) On The Round Complexity of Secure Quantum Computation James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
2020/1470 (PDF ) TaiJi: Longest Chain Availability with BFT Fast Confirmation Songze Li, David Tse
2020/1469 (PDF ) Succinct Blind Quantum Computation Using a Random Oracle Jiayu Zhang
2020/1468 (PDF ) Secure Cloud Auditing with Efficient Ownership Transfer (Full Version) Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo
2020/1467 (PDF ) Making the BKW Algorithm Practical for LWE Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
2020/1466 (PDF ) Load Balancing for Sharded Blockchains Naoya Okanami, Ryuya Nakamura, Takashi Nishide
2020/1465 (PDF ) Cryptanalysis of an Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network Mohammad Amin Rakeei, Farokhlagha Moazami
2020/1464 (PDF ) Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort Bar Alon, Hao Chung, Kai-Min Chung, Mi-Ying Huang, Yi Lee, Yu-Ching Shen
2020/1463 (PDF ) Observations on the Tightness of the Security Bounds of GIFT-COFB and HyENA Mustafa Khairallah
2020/1462 (PDF ) Ovid: Message-based Automatic Contact Tracing Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/1461 (PDF ) Lower bounds for the depth of modular squaring Benjamin Wesolowski, Ryan Williams
2020/1460 (PDF ) The MAGIC Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction Michael Kounavis, David Durham, Sergej Deutsch, Krystian Matusiewicz, David Wheeler
2020/1459 (PDF ) Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates Mustafa Khairallah, Thomas Peyrin, Anupam Chattopadhyay
2020/1458 (PDF ) Analysis of Ascon, DryGASCON, and Shamash Permutations Cihangir Tezcan
2020/1457 (PDF ) The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3 Patrick Longa, Wen Wang, Jakub Szefer
2020/1456 (PDF ) How to Abuse and Fix Authenticated Encryption Without Key Commitment Ange Albertini, Thai Duong, Shay Gueron, Stefan Kölbl, Atul Luykx, Sophie Schmieg
2020/1455 (PDF ) An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage Yan Yan, Elisabeth Oswald, Srinivas Vivek
2020/1454 (PDF ) Rate-1 Quantum Fully Homomorphic Encryption Orestis Chardouvelis, Nico Doettling, Giulio Malavolta
2020/1453 (PDF ) New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system Jing Yang, Fang-Wei Fu
2020/1452 (PDF ) ASAP: Algorithm Substitution Attacks on Cryptographic Protocols Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth
2020/1451 (PDF ) Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
2020/1450 (PDF ) Subversion-Resilient Enhanced Privacy ID Antonio Faonio, Dario Fiore, Luca Nizzardo, Claudio Soriente
2020/1449 (PDF ) More Efficient Amortization of Exact Zero-Knowledge Proofs for LWE Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/1448 (PDF ) Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/1447 (PDF ) Compressed $\Sigma$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures Thomas Attema, Ronald Cramer, Matthieu Rambaud
2020/1446 (PDF ) Line-Point Zero Knowledge and Its Applications Samuel Dittmer, Yuval Ishai, Rafail Ostrovsky
2020/1445 (PDF ) Observations on COMET Daniel J. Bernstein, Henri Gilbert, Meltem Sonmez Turan
2020/1444 (PDF ) On known constructions of APN and AB functions and their relation to each other Marco Calderini, Lilya Budaghyan, Claude Carlet
2020/1443 (PDF ) DPaSE: Distributed Password-Authenticated Symmetric Encryption Poulami Das, Julia Hesse, Anja Lehmann
2020/1442 (PDF ) Analysis of Multivariate Encryption Schemes: Application to Dob Morten Øygarden, Patrick Felke, Håvard Raddum
2020/1441 (PDF ) PayMo: Payment Channels For Monero Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Fritz Schmidt, Dominique Schröder
2020/1440 (PDF ) SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures Ralph Ankele, Kai Nahrgang, Branka Stojanovic, Atta Badii
2020/1439 (PDF ) Cryptographic Vulnerabilities and Other Shortcomings of the Nextcloud Server Side Encryption as implemented by the Default Encryption Module Kevin "Kenny" Niehage
2020/1438 (PDF ) Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers Ravi Anand, Subhamoy Maitra, Arpita Maitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay
2020/1437 (PDF ) Round-Optimal and Communication-Efficient Multiparty Computation Michele Ciampi, Rafail Ostrovsky, Hendrik Waldner, Vassilis Zikas
2020/1436 (PDF ) Removable Weak Keys for Discrete Logarithm Based Cryptography Michael John Jacobson Jr., Prabhat Kushwaha
2020/1435 (PDF ) Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2020/1434 (PDF ) Towards Multiparty Computation Withstanding Coercion of All Parties Ran Canetti, Oxana Poburinnaya
2020/1433 (PDF ) Interactive Proofs for Social Graphs Liran Katzir, Clara Shikhelman, Eylon Yogev
2020/1432 (PDF ) CP-ABE for Circuits (and more) in the Symmetric Key Setting Shweta Agrawal, Shota Yamada
2020/1431 (PDF ) Information-Theoretic 2-Round MPC without Round Collapsing: Adaptive Security, and More Huijia Lin, Tianren Liu, Hoeteck Wee
2020/1430 (PDF ) Revisiting Fairness in MPC: Polynomial Number of Parties and General Adversarial Structures Dana Dachman-Soled
2020/1429 (PDF ) On Computational Shortcuts for Information-Theoretic PIR Matthew M. Hong, Yuval Ishai, Victor I. Kolobov, Russell W. F. Lai
2020/1428 (PDF ) On Statistical Security in Two-Party Computation Dakshita Khurana, Muhammad Haris Mughees
2020/1427 (PDF ) Barriers for Succinct Arguments in the Random Oracle Model Alessandro Chiesa, Eylon Yogev
2020/1426 (PDF ) Linear-Time Arguments with Sublinear Verification from Tensor Codes Jonathan Bootle, Alessandro Chiesa, Jens Groth
2020/1425 (PDF ) Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
2020/1424 (PDF ) Improved Key Recovery of the HFEv- Signature Scheme Chengdong Tao, Albrecht Petzoldt, Jintai Ding
2020/1423 (PDF ) Quantum encryption with certified deletion Anne Broadbent, Rabib Islam
2020/1422 (PDF ) Non-interactive classical verification of quantum computation Gorjan Alagic, Andrew M. Childs, Alex B. Grilo, Shih-Han Hung
2020/1421 (PDF ) Weakly Extractable One-Way Functions Nir Bitansky, Noa Eizenstadt, Omer Paneth
2020/1420 (PDF ) Functional Encryption for Quadratic Functions from k-Lin, Revisited Hoeteck Wee
2020/1419 (PDF ) The Resiliency of MPC with Low Interaction: The Benefit of Making Errors Benny Applebaum, Eliran Kachlon, Arpita Patra
2020/1418 (PDF ) Quantum Period Finding against Symmetric Primitives in Practice Xavier Bonnetain, Samuel Jaques
2020/1417 (PDF ) Correlated Pseudorandom Functions from Variable-Density LPN Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
2020/1416 (PDF ) Further on the Construction of Feedback Shift Registers with Maximum Strong Linear Complexity Congwei Zhou, Bin Hu, Jie Guan
2020/1415 (PDF ) Secure Graph Database Search with Oblivious Filter Jamie Cui, Chaochao Chen, Alex X. Liu, Li Wang
2020/1414 (PDF ) New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming (Full Version) Anubhab Baksi
2020/1413 (PDF ) Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers Daniele Micciancio, Jessica Sorrell
2020/1412 (PDF ) Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields Antigoni Polychroniadou, Yifan Song
2020/1411 (PDF ) Transparent Error Correcting in a Computationally Bounded World Ofer Grossman, Justin Holmgren, Eylon Yogev
2020/1410 (PDF ) Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions Carsten Baum, Alex J. Malozemoff, Marc B. Rosen, Peter Scholl
2020/1409 (PDF ) The Convergence of Slide-type Reductions Michael Walter
2020/1408 (PDF ) On Broadcast in Generalized Network and Adversarial Models Chen-Da Liu-Zhang, Varun Maram, Ueli Maurer
2020/1407 (PDF ) Computing Square Roots Faster than the Tonelli-Shanks/Bernstein Algorithm Palash Sarkar
2020/1406 (PDF ) How not to VoteAgain: Pitfalls of Scalable Coercion-Resistant E-Voting Thomas Haines, Johannes Mueller
2020/1405 (PDF ) Grover on GIFT Kyoungbae Jang, Hyunjun Kim, Siwoo Eum, Hwajeong Seo
2020/1404 (PDF ) A Practical Key-Recovery Attack on 805-Round Trivium Chen-Dong Ye, Tian Tian
2020/1403 (PDF ) A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross
2020/1402 (PDF ) SKINNY with Scalpel - Comparing Tools for Differential Analysis Stéphanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard, Charles Prud'homme
2020/1401 (PDF ) Quantum Garbled Circuits Zvika Brakerski, Henry Yuen
2020/1400 (PDF ) Transferable E-cash: A Cleaner Model and the First Practical Instantiation Balthazar Bauer, Georg Fuchsbauer, Chen Qian
2020/1399 (PDF ) A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption Diana Maimut, George Teseleanu
2020/1398 (PDF ) Minimal binary linear codes - a general framework based on bent concatenation Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei
2020/1397 (PDF ) NTT Multiplication for NTT-unfriendly Rings Chi-Ming Marvin Chung, Vincent Hwang, Matthias J. Kannwischer, Gregor Seiler, Cheng-Jhih Shih, Bo-Yin Yang
2020/1396 (PDF ) Efficient Privacy Preserving Logistic Regression Inference and Training Kyoohyung Han, Jinhyuck Jeong, Jung Hoon Sohn, Yongha Son
2020/1395 (PDF ) Post-Quantum Multi-Party Computation Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta
2020/1394 (PDF ) Practical and Secure Circular Range Search on Private Spatial Data Zhihao Zheng, Jiachen Shen, Zhenfu Cao
2020/1393 (PDF ) On the Effectiveness of Time Travel to Inject COVID-19 Alerts Vincenzo Iovino, Serge Vaudenay, Martin Vuagnoux
2020/1392 (PDF ) Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, Mayank Rathee
2020/1391 (PDF ) Interactive Proofs for Quantum Black-Box Computations Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang, Kang Yang
2020/1390 (PDF ) A Survey of ECDSA Threshold Signing Jean-Philippe Aumasson, Adrian Hamelink, Omer Shlomovits
2020/1389 (PDF ) Key Mismatch Attack on NewHope Revisited Jan Vacek, Jan Václavek
2020/1388 (PDF ) Signcryption in a Quantum World Sanjit Chatterjee, Tapas Pandit, Shravan Kumar Parshuram Puria, Akash Shah
2020/1386 (PDF ) Decentralized Multi-Authority ABE for DNFs from LWE Pratish Datta, Ilan Komargodski, Brent Waters
2020/1385 (PDF ) An Alternative Approach for SIDH Arithmetic Cyril Bouvier, Laurent Imbert
2020/1384 (PDF ) A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa
2020/1383 (PDF ) Novel Single-Trace ML Profiling Attacks on NIST 3 Round candidate Dilithium Il-Ju Kim, Tae-Ho Lee, Jaeseung Han, Bo-Yeon Sim, Dong-Guk Han
2020/1382 (PDF ) Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE Tapas Pal, Ratna Dutta
2020/1381 (PDF ) PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates Jia-Chng Loh, Geong-Sen Poh, Jason H. M. Ying, Jia Xu, Hoon Wei Lim, Jonathan Pan, Weiyang Wong
2020/1380 (PDF ) Fast Computing of Quadratic Forms of HFE Polynomials over fields of characteristic two Borja Gómez
2020/1378 (PDF ) Correlation-Intractable Hash Functions via Shift-Hiding Alex Lombardi, Vinod Vaikuntanathan
2020/1377 (PDF ) When to Barrett reduce in the inverse NTT Bas Westerbaan
2020/1376 (PDF ) Stronger bounds on the cost of computing Groebner bases for HFE systems Elisa Gorla, Daniela Mueller, Christophe Petit
2020/1375 (PDF ) Semi-regular sequences and other random systems of equations M. Bigdeli, E. De Negri, M. M. Dizdarevic, E. Gorla, R. Minko, S. Tsakou
2020/1374 (PDF ) ELM : A Low-Latency and Scalable Memory Encryption Scheme Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma
2020/1373 (PDF ) Transciphering, using FiLIP and TFHE for an efficient delegation of computation Clément Hoffmann, Pierrick Méaux, Thomas Ricosset
2020/1372 (PDF ) VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
2020/1371 (PDF ) Privacy Amplification with Tamperable Memory via Non-malleable Two-source Extractors Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
2020/1370 (PDF ) A discretization attack Daniel J. Bernstein
2020/1369 (PDF ) Multiplication over Extension Fields for Pairing-based Cryptography: an Hardware Point of View Arthur Lavice, Nadia El Mrabet, Alexandre Berzati, Jean-Baptiste Rigaud
2020/1368 (PDF ) On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices Melissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert, Kostas Papagiannopoulos, Vincent Verneuil
2020/1367 (PDF ) Costs of an Attack Against Proof-of-Work Loïc Etienne
2020/1366 (PDF ) LURK: Server-Controlled TLS Delegation Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan
2020/1365 (PDF ) Evaluation Methods for Chebyshev Polynomials Zhengjun Cao, Lihua Liu, Leming Hong
2020/1364 (PDF ) Security of Hybrid Key Encapsulation Matthew Campagna, Adam Petcher
2020/1363 (PDF ) Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal
2020/1362 (PDF ) Lattice-Based Proof-of-Work for Post-Quantum Blockchains Rouzbeh Behnia, Eamonn W. Postlethwaite, Muslum Ozgur Ozmen, Attila Altay Yavuz
2020/1361 (PDF ) Tight adaptive reprogramming in the QROM Alex B. Grilo, Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz
2020/1360 (PDF ) Incremental Cryptography Revisited: PRFs, Nonces and Modular Design Vivek Arte, Mihir Bellare, Louiza Khati
2020/1359 (PDF ) On two fundamental problems on APN power functions Lilya Budaghyan, Marco Calderini, Claude Carlet, Diana Davidova, Nikolay Kaleyski
2020/1358 (PDF ) Toward Provable One Way Functions Hagar Dolev, Shlomi Dolev
2020/1357 (PDF ) Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Guiyi Wei
2020/1356 (PDF ) Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers Maria Eichlseder, Gregor Leander, Shahram Rasoolzadeh
2020/1355 (PDF ) Modular Lagrange Interpolation of the Mod Function for Bootstrapping of Approximate HE Charanjit S. Jutla, Nathan Manohar
2020/1354 (PDF ) Gadget-Based iNTRU Lattice Trapdoors Nicholas Genise, Baiyu Li
2020/1353 (PDF ) Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu
2020/1352 (PDF ) Reducing Round Complexity of Byzantine Broadcast Linda Chen, Jun Wan
2020/1351 (PDF ) Tight State-Restoration Soundness in the Algebraic Group Model Ashrujit Ghoshal, Stefano Tessaro
2020/1350 (PDF ) Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein
2020/1349 (PDF ) Key Dependency of Differentials: Experiments in the Differential Cryptanalysis of Block Ciphers Using Small S-boxes Howard M. Heys
2020/1348 (PDF ) Vetted Encryption Martha Norberg Hovd, Martijn Stam
2020/1347 (PDF ) A Systematic Appraisal of Side Channel Evaluation Strategies Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sebastien Duval, Christophe Giraud, Eliane Jaulmes, Francois Koeune, Elisabeth Oswald, Francois-Xavier Standaert, Carolyn Whitnall
2020/1346 (PDF ) SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts Shlomi Dolev, Ziyu Wang
2020/1345 (PDF ) Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
2020/1344 (PDF ) Indifferentiability of SKINNY-HASH Internal Functions Akinori Hosoyamada, Tetsu Iwata
2020/1343 (PDF ) Improved Cryptanalysis of UOV and Rainbow Ward Beullens
2020/1342 (PDF ) Forward and Backward Private Conjunctive Searchable Symmetric Encryption Sikhar Patranabis, Debdeep Mukhopadhyay
2020/1341 (PDF ) Zero-Communication Reductions Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran
2020/1340 (PDF ) Homomorphic Evaluation of the SM4 Yu Xue
2020/1339 (PDF ) New Approaches for Quantum Copy-Protection Scott Aaronson, Jiahui Liu, Qipeng Liu, Mark Zhandry, Ruizhe Zhang
2020/1338 (PDF ) Optimized Architectures for Elliptic Curve Cryptography over Curve448 Mojtaba Bisheh Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
2020/1337 (PDF ) Multiplicative Depth Independent & Efficient MPC in the Presence of Mixed Adversary Achintya Desai, Shubham Raj, Kannan Srinathan
2020/1336 (PDF ) Faster Characteristic Three Polynomial Multiplication and Its Application to NTRU Prime Decapsulation Esra Yeniaras, Murat Cenk
2020/1335 (PDF ) Transciphering Framework for Approximate Homomorphic Encryption (Full Version) Jihoon Cho, Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Joohee Lee, Jooyoung Lee, Dukjae Moon, Hyojin Yoon
2020/1334 (PDF ) One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
2020/1333 (PDF ) Updateable Inner Product Argument with Logarithmic Verifier and Applications Vanesa Daza, Carla Ràfols, Alexandros Zacharakis
2020/1332 (PDF ) Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting Ashley Fraser, Elizabeth A. Quaglia
2020/1331 (PDF ) Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg
2020/1330 (PDF ) Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security Anders Dalskov, Daniel Escudero, Marcel Keller
2020/1329 (PDF ) Adaptively secure Threshold Symmetric-key Encryption Pratyay Mukherjee
2020/1328 (PDF ) SWiSSSE: System-Wide Security for Searchable Symmetric Encryption Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi
2020/1327 (PDF ) On The Insider Security of MLS Joël Alwen, Daniel Jost, Marta Mularczyk
2020/1326 (PDF ) Towards Fine-Grained One-Way Functions from Strong Average-Case Hardness Chris Brzuska, Geoffroy Couteau
2020/1325 (PDF ) On Self-Equivalence Encodings in White-Box Implementations Adrián Ranea, Bart Preneel
2020/1324 (PDF ) Separation Results for Boolean Function Classes Aniruddha Biswas, Palash Sarkar
2020/1323 (PDF ) CSI-RAShi: Distributed key generation for CSIDH Ward Beullens, Lucas Disson, Robi Pedersen, Frederik Vercauteren
2020/1322 (PDF ) Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication Sebastian Paul, Patrik Scheible
2020/1321 (PDF ) Provably Quantum-Secure Tweakable Block Ciphers Akinori Hosoyamada, Tetsu Iwata
2020/1320 (PDF ) WARP : Revisiting GFN for Lightweight 128-bit Block Cipher Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri
2020/1319 (PDF ) On Succinct Arguments and Witness Encryption from Groups Ohad Barta, Yuval Ishai, Rafail Ostrovsky, David J. Wu
2020/1318 (PDF ) Poppins: A Direct Construction for Asymptotically Optimal zkSNARKs Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno
2020/1317 (PDF ) Improved Rectangle Attacks on SKINNY and CRAFT Hosein Hadipour, Nasour Bagheri, Ling Song
2020/1316 (PDF ) Security of Public Key Encryption against Resetting Attacks Juliane Krämer, Patrick Struck
2020/1315 (PDF ) On Index Calculus Algorithms for Subfield Curves Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit
2020/1314 (PDF ) Secure Software Leasing from Standard Assumptions Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2020/1313 (PDF ) Payment Trees: Low Collateral Payments for Payment Channel Networks Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2020/1312 (PDF ) Individual Simulations Yi Deng
2020/1311 (PDF ) Cryptanalysis of Feistel-Based Format-Preserving Encryption Orr Dunkelman, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya
2020/1310 (PDF ) A note on the low order assumption in class groups of imaginary quadratic number fields Karim Belabas, Thorsten Kleinjung, Antonio Sanso, Benjamin Wesolowski
2020/1309 (PDF ) Provable Security Analysis of Decentralized Cryptographic Contact Tracing Noel Danz, Oliver Derwisch, Anja Lehmann, Wenzel Puenter, Marvin Stolle, Joshua Ziemann
2020/1308 (PDF ) On the Success Probability of Solving Unique SVP via BKZ Eamonn W. Postlethwaite, Fernando Virdia
2020/1307 (PDF ) Multiparty Cardinality Testing for Threshold Private Set Intersection Pedro Branco, Nico Döttling, Sihang Pu
2020/1306 (PDF ) Simulation Extractable Versions of Groth’s zk-SNARK Revisited Oussama Amine, Karim Baghery, Zaira Pindado, Carla Ràfols
2020/1305 (PDF ) On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work Kai-Min Chung, Serge Fehr, Yu-Hsuan Huang, Tai-Ning Liao
2020/1304 (PDF ) QCB: Efficient Quantum-secure Authenticated Encryption Ritam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin
2020/1303 (PDF ) Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer Joppe W. Bos, Joost Renes, Christine van Vredendaal
2020/1302 (PDF ) TMVP-based Multiplication for Polynomial Quotient Rings and Application to Saber on ARM Cortex-M4 İrem Keskinkurt Paksoy, Murat Cenk
2020/1301 (PDF ) Robust Property-Preserving Hash Functions for Hamming Distance and More Nils Fleischhacker, Mark Simkin
2020/1300 (PDF ) Byzantine Ordered Consensus without Byzantine Oligarchy Yunhao Zhang, Srinath Setty, Qi Chen, Lidong Zhou, Lorenzo Alvisi
2020/1298 (PDF ) Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Čapkun
2020/1297 (PDF ) On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software Lauren De Meyer, Elke De Mulder, Michael Tunstall
2020/1296 (PDF ) Concrete quantum cryptanalysis of binary elliptic curves Gustavo Banegas, Daniel J. Bernstein, Iggy van Hoof, Tanja Lange
2020/1295 (PDF ) Optimized Software Implementations for theLightweight Encryption Scheme ForkAE Arne Deprez, Elena Andreeva, Jose Maria Bermudo Mera, Angshuman Karmakar, Antoon Purnal
2020/1294 (PDF ) Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem
2020/1293 (PDF ) I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis Lichao Wu, Guilherme Perin, Stjepan Picek
2020/1292 (PDF ) Optimal Oblivious Parallel RAM Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Runting Shi
2020/1291 (PDF ) Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model Bernardo David, Rafael Dowsley
2020/1290 (PDF ) FORTIS: Selfish Mining Mitigation by (FOR)geable (TI)me(S)tamps Osman Biçer, Alptekin Küpçü
2020/1289 (PDF ) Sword: An Opaque Blockchain Protocol Farid Elwailly
2020/1288 (PDF ) Improved attacks against key reuse in learning with errors key exchange Nina Bindel, Douglas Stebila, Shannon Veitch
2020/1287 (PDF ) Multivariate Cryptographic Primitive based on the product of the roots of a polynomial over a field Borja Gómez
2020/1286 (PDF ) Secure Two-Party Quantum Computation Over Classical Channels Michele Ciampi, Alexandru Cojocaru, Elham Kashefi, Atul Mantri
2020/1285 (PDF ) Multi-Input Quadratic Functional Encryption from Pairings Shweta Agrawal, Rishab Goyal, Junichi Tomida
2020/1284 (PDF ) Entropy Estimation of Physically Unclonable Functions with Offset Error Mitsuru Shiozaki, Yohei Hori, Takeshi Fujino
2020/1283 (PDF ) Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem Craig Costello, Michael Meyer, Michael Naehrig
2020/1282 (PDF ) Compact Authenticated Key Exchange in the Quantum Random Oracle Model Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang
2020/1281 (PDF ) Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees Matthew Weidner, Martin Kleppmann, Daniel Hugenroth, Alastair R. Beresford
2020/1280 (PDF ) DORY: An Encrypted Search System with Distributed Trust Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, Ion Stoica
2020/1279 (PDF ) Tightly-Secure Authenticated Key Exchange, Revisited Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge
2020/1278 (PDF ) Compact Dilithium Implementations on Cortex-M3 and Cortex-M4 Denisa O. C. Greconici, Matthias J. Kannwischer, Amber Sprenkels
2020/1277 (PDF ) A Simple Protocol to Compare EMFI Platforms J. Toulemont, N. Ouldei-Tebina, J. M. Galliere, P. Nouet, E. Bourbao, P. Maurine
2020/1276 (PDF ) Lattice-based Key Sharing Schemes - A Survey Prasanna Ravi, James Howe, Anupam Chattopadhyay, Shivam Bhasin
2020/1275 (PDF ) Quarks: Quadruple-efficient transparent zkSNARKs Srinath Setty, Jonathan Lee
2020/1274 (PDF ) Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments Jonathan Lee
2020/1273 (PDF ) Classical Verification of Quantum Computations with Efficient Verifier Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa
2020/1272 (PDF ) Bent Functions from Cellular Automata Maximilien Gadouleau, Luca Mariot, Stjepan Picek
2020/1271 (PDF ) (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version) Alexandros Bakas, Antonis Michalas
2020/1270 (PDF ) Classical vs Quantum Random Oracles Takashi Yamakawa, Mark Zhandry
2020/1269 (PDF ) PRINCEv2 - More Security for (Almost) No Overhead Dušan Božilov, Maria Eichlseder, Miroslav Kneževic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer
2020/1268 (PDF ) A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay
2020/1267 (PDF ) Fault Attacks In Symmetric Key Cryptosystems Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha
2020/1266 (PDF ) Multi-Party Functional Encryption Shweta Agrawal, Rishab Goyal, Junichi Tomida
2020/1265 (PDF ) Revisiting ECM on GPUs Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu
2020/1263 (PDF ) Improved Fault Analysis on SIMECK Ciphers Duc-Phong Le, Rongxing Lu, Ali A. Ghorbani
2020/1262 (PDF ) Multi-stage Proof-of-Works: Properties and Vulnerabilities Paolo D'Arco, Zahra Ebadi Ansaroudi, Francesco Mogavero
2020/1261 (PDF ) MuSig2: Simple Two-Round Schnorr Multi-Signatures Jonas Nick, Tim Ruffing, Yannick Seurin
2020/1260 (PDF ) Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell
2020/1259 (PDF ) Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation Yibiao Lu, Bingsheng Zhang, Hong-Sheng Zhou, Weiran Liu, Lei Zhang, Kui Ren
2020/1258 (PDF ) TranSCA: Cross-Family Profiled Side-Channel Attacks using Transfer Learning on Deep Neural Networks Dhruv Thapar, Manaar Alam, Debdeep Mukhopadhyay
2020/1257 (PDF ) Improved Reduction Between SIS Problems over Structured Lattices ZaHyun Koo, Yongwoo Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim
2020/1256 (PDF ) Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/p^k Z Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Matthieu Rambaud, Chaoping Xing, Chen Yuan
2020/1255 (PDF ) Boolean Ring Cryptographic Equation Solving Sean Murphy, Maura Paterson, Christine Swart
2020/1254 (PDF ) Broadcast-Optimal Two Round MPC with an Honest Majority Ivan Damgård, Bernardo Magri, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
2020/1253 (PDF ) New Representations of the AES Key Schedule Gaëtan Leurent, Clara Pernot
2020/1252 (PDF ) Adaptive Extractors and their Application to Leakage Resilient Secret Sharing Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2020/1251 (PDF ) Bit Security Estimation Using Various Information-Theoretic Measures Dong-Hoon Lee, Young-Sik Kim, Jong-Seon No
2020/1250 (PDF ) A New Code Based Signature Scheme without Trapdoors Zhe Li, Chaoping Xing, Sze Ling Yeo
2020/1249 (PDF ) Adversarial Level Agreements for Two-Party Protocols Marilyn George, Seny Kamara
2020/1248 (PDF ) Random-index PIR and Applications Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, Sophia Yakoubov
2020/1247 (PDF ) Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time Jiaheng Zhang, Tianyi Liu, Weijie Wang, Yinuo Zhang, Dawn Song, Xiang Xie, Yupeng Zhang
2020/1246 (PDF ) The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free Gianluca Brian, Antonio Faonio, Maciej Obremski, João Ribeiro, Mark Simkin, Maciej Skórski, Daniele Venturi
2020/1245 (PDF ) Two-round trip Schnorr multi-signatures via delinearized witnesses Handan Kilinc Alper, Jeffrey Burdges
2020/1244 (PDF ) Taming the many EdDSAs Konstantinos Chalkias, François Garillot, Valeria Nikolaenko
2020/1243 (PDF ) A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi
2020/1242 (PDF ) Improved (Related-key) Differential Cryptanalysis on GIFT Fulei Ji, Wentao Zhang, Chunning Zhou, Tianyou Ding
2020/1241 (PDF ) DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version) Siang Meng Sim, Dirmanto Jap, Shivam Bhasin
2020/1240 (PDF ) SQISign: compact post-quantum signatures from quaternions and isogenies Luca De Feo, David Kohel, Antonin Leroux, Christophe Petit, Benjamin Wesolowski
2020/1239 (PDF ) Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation Alin Tomescu, Yu Xia, Zachary Newman
2020/1238 (PDF ) Hardness of Entropic Module-LWE Hao Lin, Mingqiang Wang, Jincheng Zhuang, Yang Wang
2020/1237 (PDF ) A Complete Analysis of the BKZ Lattice Reduction Algorithm Jianwei Li, Phong Q. Nguyen
2020/1236 (PDF ) Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions Jun Wan, Hanshen Xiao, Srinivas Devadas, Elaine Shi
2020/1235 (PDF ) Assessing Lightweight Block Cipher Security using Linear and Nonlinear Machine Learning Classifiers Ting Rong Lee, Je Sen Teh, Norziana Jamil, Jasy Liew Suet Yan, Jiageng Chen
2020/1234 (PDF ) Impossibility on the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model Masayuki Fukumitsu, Shingo Hasegawa
2020/1233 (PDF ) BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer Farid Javani, Alan T. Sherman
2020/1232 (PDF ) On the Existence of Weak Keys for QC-MDPC Decoding Nicolas Sendrier, Valentin Vasseur
2020/1231 (PDF ) vault1317/signal-dakez: An authenticated key exchange protocol with a public key concealing and a participation deniability designed for secure messaging Richard B. Riddick
2020/1229 (PDF ) Decentralized Asset Custody Scheme with Security against Rational Adversary Zhaohua Chen, Guang Yang
2020/1228 (PDF ) Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices Colin O'Flynn
2020/1227 (PDF ) Integral Cryptanalysis of Reduced-Round Tweakable TWINE Muhammad ElSheikh, Amr M. Youssef
2020/1226 (PDF ) Synchronous Constructive Cryptography Chen-Da Liu-Zhang, Ueli Maurer
2020/1225 (PDF ) ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
2020/1224 (PDF ) Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives (extended version) Alexandros Bakas, Antonis Michalas
2020/1223 (PDF ) Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM Jonathan Takeshita, Dayane Reis, Ting Gong, Michael Niemier, X. Sharon Hu, Taeho Jung
2020/1222 (PDF ) Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand Muhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu
2020/1221 (PDF ) Verifiable Functional Encryption using Intel SGX Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote
2020/1220 (PDF ) The Topographic Signature (TopoSign) Protocol Hassan Jameel Asghar, Slawomir Matelski, Josef Pieprzyk
2020/1219 (PDF ) Aggregate Signature with Detecting Functionality from Group Testing Shingo Sato, Junji Shikata, Tsutomu Matsumoto
2020/1218 (PDF ) Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing Shingo Sato, Junji Shikata
2020/1217 (PDF ) R-Propping of HK17: Upgrade for a Detached Proposal of NIST PQC First Round Survey Pedro Hecht
2020/1216 (PDF ) Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4 Erdem Alkim, Dean Yun-Li Cheng, Chi-Ming Marvin Chung, Hülya Evkan, Leo Wei-Lun Huang, Vincent Hwang, Ching-Lin Trista Li, Ruben Niederhagen, Cheng-Jhih Shih, Julian Wälde, Bo-Yin Yang
2020/1215 (PDF ) Differential analysis of the ZUC-256 initialisation Steve Babbage, Alexander Maximov
2020/1214 (PDF ) Cryptanalysis of RSA: A Special Case of Boneh-Durfee’s Attack Majid Mumtaz, Ping Luo
2020/1213 (PDF ) Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness Joseph Jaeger, Stefano Tessaro
2020/1212 (PDF ) Triply Adaptive UC NIZK Ran Canetti, Pratik Sarkar, Xiao Wang
2020/1210 (PDF ) Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions Yusuke Yoshida, Fuyuki Kitagawa, Keita Xagawa, Keisuke Tanaka
2020/1209 (PDF ) Universal Composition with Global Subroutines: Capturing Global Setup within plain UC Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas
2020/1208 (PDF ) An algorithm for bounding non-minimum weight differentials in 2-round LSX-ciphers Vitaly Kiryukhin
2020/1207 (PDF ) FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results Kamyar Mohajerani, Richard Haeussler, Rishub Nagpal, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
2020/1206 (PDF ) Frontrunning on Automated Decentralized Exchange in Proof Of Stake Environment Andrey Sobol
2020/1205 (PDF ) Towards Non-Interactive Witness Hiding Benjamin Kuykendall, Mark Zhandry
2020/1204 (PDF ) Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge Marc Fischlin, Felix Rohrbach
2020/1203 (PDF ) Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys Jean-Philippe Bossuat, Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Pierre Hubaux
2020/1202 (PDF ) Correlation Power Analysis and Higher-order Masking Implementation of WAGE Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric
2020/1201 (PDF ) Algebraic Key-Recovery Attacks on Reduced-Round Xoofff Tingting Cui, Lorenzo Grassi
2020/1199 (PDF ) Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, Stefano Tessaro
2020/1198 (PDF ) Finding EM leakages at design stage: a simulation methodology Davide Poggi, Philippe Maurine, Thomas Ordas, Alexandre Sarafianos, Jérémy Raoult
2020/1197 (PDF ) Black-Box Non-Interactive Non-Malleable Commitments Rachit Garg, Dakshita Khurana, George Lu, Brent Waters
2020/1196 (PDF ) TR-31 and AS 2805 (Non)equivalence report Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
2020/1195 (PDF ) A Lower Bound for One-Round Oblivious RAM David Cash, Andrew Drucker, Alexander Hoover
2020/1194 (PDF ) Quantum copy-protection of compute-and-compare programs in the quantum random oracle model Andrea Coladangelo, Christian Majenz, Alexander Poremba
2020/1193 (PDF ) Bypassing Isolated Execution on RISC-V with Fault Injection Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma
2020/1192 (PDF ) Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level Yuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont
2020/1191 (PDF ) Schrödinger's Pirate: How To Trace a Quantum Decoder Mark Zhandry
2020/1190 (PDF ) Efficient Post-Quantum SNARKs for RSIS and RLWE and their Applications to Privacy Cecilia Boschini, Jan Camenisch, Max Ovsiankin, Nicholas Spooner
2020/1189 (PDF ) Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version) Karim Baghery, Alonso González, Zaira Pindado, Carla Ràfols
2020/1188 (PDF ) Cryptographic Group Actions and Applications Navid Alamati, Luca De Feo, Hart Montgomery, Sikhar Patranabis
2020/1187 (PDF ) Coupling of Random Systems David Lanzenberger, Ueli Maurer
2020/1186 (PDF ) Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions Zvika Brakerski, Pedro Branco, Nico Döttling, Sanjam Garg, Giulio Malavolta
2020/1185 (PDF ) Lossiness and Entropic Hardness for Ring-LWE Zvika Brakerski, Nico Döttling
2020/1184 (PDF ) Constant-time verification for cut-and-choose-based signatures Robert Ransom
2020/1183 (PDF ) Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/1182 (PDF ) On the Round Complexity of the Shuffle Model Amos Beimel, Iftach Haitner, Kobbi Nissim, Uri Stemmer
2020/1181 (PDF ) TinyGarble2: Smart, Efficient, and Scalable Yao’s Garble Circuit Siam Hussain, Baiyu Li, Farinaz Koushanfar, Rosario Cammarota
2020/1180 (PDF ) MultiTLS: Secure communication channels with cipher suite diversity Ricardo Moura, David R. Matos, Miguel Pardal, Miguel Correia
2020/1179 (PDF ) Optimal Broadcast Encryption from LWE and Pairings in the Standard Model Shweta Agrawal, Daniel Wichs, Shota Yamada
2020/1178 (PDF ) An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi
2020/1177 (PDF ) Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang
2020/1176 (PDF ) Short Paper: PoSH Proof of Staked Hardware Consensus Rami Khalil, Naranker Dulay
2020/1175 (PDF ) MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication David Heath, Vladimir Kolesnikov, Stanislav Peceny
2020/1174 (PDF ) Multi Random Projection Inner Product Encryption, Applications to Proximity Searchable Encryption for the Iris Biometric Chloe Cachet, Sohaib Ahmad, Luke Demarest, Serena Riback, Ariel Hamlin, Benjamin Fuller
2020/1173 (PDF ) Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark) Ryo Nishimaki
2020/1172 (PDF ) Cryptanalysis of a round optimal lattice-based multisignature scheme Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
2020/1171 (PDF ) On the Price of Concurrency in Group Ratcheting Protocols Alexander Bienstock, Yevgeniy Dodis, Paul Rösler
2020/1170 (PDF ) On the Power of an Honest Majority in Three-Party Computation Without Broadcast Bar Alon, Ran Cohen, Eran Omri, Tom Suad
2020/1169 (PDF ) Privacy-preserving greater-than integer comparison without binary decomposition in the malicious model Sigurd Eskeland
2020/1168 (PDF ) FHE-Based Bootstrapping of Designated-Prover NIZK Zvika Brakerski, Sanjam Garg, Rotem Tsabary
2020/1167 (PDF ) Batch Verification for Statistical Zero Knowledge Proofs Inbar Kaslasi, Guy N. Rothblum, Ron D. Rothblum, Adam Sealfon, Prashant Nalini Vasudevan
2020/1166 (PDF ) A Differential and Linear Analysis of the Inversion Mapping in Odd-Characteristic Finite Fields Jorge Nakahara Jr
2020/1165 (PDF ) Practical Isogeny-Based Key-exchange with Optimal Tightness Bor de Kock, Kristian Gjøsteen, Mattia Veroni
2020/1164 (PDF ) Template Attacks Based on the Multivariate Joint Distribution Min Yang, Qingshu Meng, An Wang, Xin Liu
2020/1163 (PDF ) Specifying cycles of minimal length for commonly used linear layers in block ciphers Guoqiang Deng, Yongzhuang Wei, Xuefeng Duan, Enes Pasalic, Samir Hodzic
2020/1162 (PDF ) On Average-Case Hardness in TFNP from One-Way Functions Pavel Hubáček, Chethan Kamath, Karel Král, Veronika Slívová
2020/1161 (PDF ) KVaC: Key-Value Commitments for Blockchains and Beyond Shashank Agrawal, Srinivasan Raghuraman
2020/1160 (PDF ) Characterizing Deterministic-Prover Zero Knowledge Nir Bitansky, Arka Rai Choudhuri
2020/1159 (PDF ) ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ? Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu
2020/1158 (PDF ) Don't throw your nonces out with the bathwater: Speeding up Dilithium by reusing the tail of y Amber Sprenkels, Bas Westerbaan
2020/1157 (PDF ) Secure Massively Parallel Computation for Dishonest Majority Rex Fernando, Ilan Komargodski, Yanyi Liu, Elaine Shi
2020/1156 (PDF ) Verifiable Hierarchical Key Assignment Schemes Anna Lisa Ferrara, Chiara Ricciardi
2020/1155 (PDF ) Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs Dimitris Mouris, Nektarios Georgios Tsoutsos
2020/1154 (PDF ) Functional Encryption for Set Intersection in the Multi-Client Setting Kwangsu Lee, Minhye Seo
2020/1153 (PDF ) Key Committing AEADs Shay Gueron
2020/1152 (PDF ) An Automatic Search Tool for Iterative Trails and its Application to estimation of differentials and linear hulls Tianyou Ding, Wentao Zhang, Chunning Zhou, Fulei Ji
2020/1151 (PDF ) Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk
2020/1150 (PDF ) Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems Gennaro Avitabile, Daniele Friolo, Ivan Visconti
2020/1149 (PDF ) Deterministic Wallets in a Quantum World Nabil Alkeilani Alkadri, Poulami Das, Andreas Erwig, Sebastian Faust, Juliane Krämer, Siavash Riahi, Patrick Struck
2020/1148 (PDF ) An Area Aware Accelerator for Elliptic Curve Point Multiplication Malik Imran, Samuel Pagliarini, Muhammad Rashid
2020/1146 (PDF ) Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries Siemen Dhooghe, Svetla Nikova
2020/1145 (PDF ) Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs Wonseok Choi, Byeonghak Lee, Yeongmin Lee, Jooyoung Lee
2020/1144 (PDF ) Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions Lior Rotem, Gil Segev
2020/1143 (PDF ) Rescue-Prime: a Standard Specification (SoK) Alan Szepieniec, Tomer Ashur, Siemen Dhooghe
2020/1142 (PDF ) Factoring Algorithm Based on Parameterized Newton Method Zhengjun Cao, Lihua Liu
2020/1141 (PDF ) A post-quantum signature scheme from the secant variety of the Grassmannian Daniele Di Tullio, Manoj Gyawali
2020/1140 (PDF ) On the Efficient Estimation of Min-Entropy Yongjune Kim, Cyril Guyot, Young-Sik Kim
2020/1139 (PDF ) Succinct and Adaptively Secure ABE for ABP from k-Lin Huijia Lin, Ji Luo
2020/1138 (PDF ) Epochal Signatures for Deniable Group Chats Andreas Hülsing, Fiona Johanna Weber
2020/1137 (PDF ) MOTION - A Framework for Mixed-Protocol Multi-Party Computation Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko
2020/1136 (PDF ) A Note on Koblitz Curves over Prime Fields Han Wu, Guangwu Xu
2020/1135 (PDF ) Adaptively Secure Inner Product Encryption from LWE Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2020/1134 (PDF ) Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier, Shivam Bhasin
2020/1133 (PDF ) Security Analysis of Subterranean 2.0 Ling Song, Yi Tu, Danping Shi, Lei Hu
2020/1132 (PDF ) A Logarithmic Lower Bound for Oblivious RAM (for all parameters) Ilan Komargodski, Wei-Kai Lin
2020/1131 (PDF ) Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound Enes Pasalic, René Rodríguez, Fengrong Zhang, Yongzhuang Wei
2020/1130 (PDF ) Secure training of decision trees with continuous attributes Mark Abspoel, Daniel Escudero, Nikolaj Volgushev
2020/1129 (PDF ) A Secure Software Defined Networking based Framework for IoT Networks Ambili K N, Jimmy Jose
2020/1127 (PDF ) SideLine: How Delay-Lines (May) Leak Secrets from your SoC Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet Moundi
2020/1126 (PDF ) Bitcoin-Monero Cross-chain Atomic Swap Joël Gugger
2020/1125 (PDF ) High-Speed FPGA Implementation of SIKE Based on An Ultra-Low-Latency Modular Multiplier Jing Tian, Bo Wu, Zhongfeng Wang
2020/1124 (PDF ) Optimized Voronoi-based algorithms for parallel shortest vector computations Artur Mariano, Filipe Cabeleira, Gabriel Falcao, Luís Paulo Santos
2020/1123 (PDF ) Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V Alexandre Adomnicai, Thomas Peyrin
2020/1122 (PDF ) The Velvet Path to Superlight Blockchain Clients Aggelos Kiayias, Andrianna Polydouri, Dionysis Zindros
2020/1121 (PDF ) Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Veronika Kuchta
2020/1120 (PDF ) On the security of Diene-Thabet-Yusuf's cubic multivariate signature scheme Yasufumi Hashimoto
2020/1119 (PDF ) All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
2020/1118 (PDF ) Approximate Homomorphic Encryption with Reduced Approximation Error Andrey Kim, Antonis Papadimitriou, Yuriy Polyakov
2020/1117 (PDF ) Economic Proof of Work Jia Kan
2020/1116 (PDF ) On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode. V. Ustimenko
2020/1115 (PDF ) SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets Karim M. Abdellatif, Olivier Hériveaux
2020/1114 (PDF ) Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting Thomas Haines, Rajeev Gore, Bhavesh Sharma
2020/1113 (PDF ) On combinatorial approaches to search for quadratic APN functions Konstantin Kalgin, Valeriya Idrisova
2020/1112 (PDF ) A cautionary note on the use of Gurobi for cryptanalysis Muhammad ElSheikh, Amr M. Youssef
2020/1111 (PDF ) Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography Abhraneel Dutta, Aaron Hutchinson, Koray Karabina
2020/1110 (PDF ) Two-round $n$-out-of-$n$ and Multi-Signatures and Trapdoor Commitment from Lattices Ivan Damgård, Claudio Orlandi, Akira Takahashi, Mehdi Tibouchi
2020/1109 (PDF ) Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols Gora Adj, Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
2020/1108 (PDF ) Radical isogenies Wouter Castryck, Thomas Decru, Frederik Vercauteren
2020/1107 (PDF ) Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest
2020/1106 (PDF ) Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction Gili Schul-Ganz, Gil Segev
2020/1105 (PDF ) Catalic: Delegated PSI Cardinality with Applications to Contact Tracing Thai Duong, Duong Hieu Phan, Ni Trieu
2020/1104 (PDF ) High-Assurance Cryptography Software in the Spectre Era Gilles Barthe, Sunjay Cauligi, Benjamin Gregoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe
2020/1103 (PDF ) Packed Multiplication: How to Amortize the Cost of Side-channel Masking ? Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers
2020/1102 (PDF ) PQC: R-Propping of Public-Key Cryptosystems Using Polynomials over Non-commutative Algebraic Extension Rings Pedro Hecht
2020/1101 (PDF ) NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus Ren Zhang, Dingwei Zhang, Quake Wang, Shichen Wu, Jan Xie, Bart Preneel
2020/1100 (PDF ) Towards Efficiency-Preserving Round Compression in MPC: Do fewer rounds mean more computation? Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
2020/1099 (PDF ) Unbounded HIBE with Tight Security Roman Langrehr, Jiaxin Pan
2020/1098 (PDF ) Formalizing Bitcoin Crashes with Universally Composable Security Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu
2020/1097 (PDF ) How to Build Optimally Secure PRFs Using Block Ciphers Benoît Cogliati, Ashwin Jha, Mridul Nandi
2020/1096 (PDF ) Far Field EM Side-Channel Attack on AES Using Deep Learning Ruize Wang, Huanyu Wang, Elena Dubrova
2020/1095 (PDF ) Cycle structure of generalized and closed loop invariants Yongzhuang Wei, Rene Rodriguez, Enes Pasalic
2020/1094 (PDF ) TN-IDS for Network Layer Attacks in RPL based IoT Systems Ambili K N, Jimmy Jose
2020/1093 (PDF ) Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version) Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, Mingsheng Wang
2020/1092 (PDF ) The Round Complexity of Secure Computation Against Covert Adversaries Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain
2020/1091 (PDF ) Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma Joachim Neu, Ertem Nusret Tas, David Tse
2020/1090 (PDF ) On the Adaptive Security of MACs and PRFs Andrew Morgan, Rafael Pass, Elaine Shi
2020/1089 (PDF ) Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki
2020/1088 (PDF ) Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng
2020/1087 (PDF ) Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE Keita Emura, Atsushi Takayasu, Yohei Watanabe
2020/1086 (PDF ) Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme Daniel Apon, Dustin Moody, Ray Perlner, Daniel Smith-Tone, Javier Verbel
2020/1085 (PDF ) Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications Tapas Pal, Ratna Dutta
2020/1084 (PDF ) Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig
2020/1083 (PDF ) A Fast and Compact RISC-V Accelerator for Ascon and Friends Stefan Steinegger, Robert Primas
2020/1082 (PDF ) Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption Bart Mennink
2020/1081 (PDF ) Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices Olivier Bernard, Adeline Roux-Langlois
2020/1080 (PDF ) Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo
2020/1079 (PDF ) Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption Rongmao Chen, Xinyi Huang, Moti Yung
2020/1078 (PDF ) Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles Jodie Knapp, Elizabeth A. Quaglia
2020/1077 (PDF ) Unconditionally secure quantum bit commitment: Revised Ming-Xing Luo, Xiaojun Wang
2020/1076 (PDF ) Minimizing the Two-Round Tweakable Even-Mansour Cipher Avijit Dutta
2020/1075 (PDF ) On the Query Complexity of Constructing PRFs from Non-adaptive PRFs Pratik Soni, Stefano Tessaro
2020/1074 (PDF ) A Scalable Simulation of the BB84 Protocol Involving Eavesdropping Mihai-Zicu Mina, Emil Simion
2020/1073 (PDF ) Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation Yusai Wu, Liqing Yu, Zhenfu Cao, Xiaolei Dong
2020/1072 (PDF ) Cryptanalysis of the permutation based algorithm SpoC Liliya Kraleva, Raluca Posteuca, Vincent Rijmen
2020/1071 (PDF ) On Pairing-Free Blind Signature Schemes in the Algebraic Group Model Julia Kastner, Julian Loss, Jiayu Xu
2020/1070 (PDF ) Efficient indifferentiable hashing to elliptic curves $y^2 = x^3 + b$ provided that $b$ is a quadratic residue Dmitrii Koshelev
2020/1069 (PDF ) Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions Matteo Campanelli, Antonio Faonio, Dario Fiore, Anaïs Querol, Hadrián Rodríguez
2020/1068 (PDF ) An Efficient Transformation Capabilities of Single Database Private Block Retrieval Radhakrishna Bhat, N R Sunitha
2020/1067 (PDF ) A Constant Time Full Hardware Implementation of Streamlined NTRU Prime Adrian Marotzke
2020/1066 (PDF ) Constant time algorithms for ROLLO-I-128 Carlos Aguilar-Melchor, Nicolas Aragon, Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Chiara Marcolla
2020/1065 (PDF ) Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong
2020/1064 (PDF ) Mimblewimble Non-Interactive Transaction Scheme Gary Yu
2020/1062 (PDF ) Quantum Search for Scaled Hash Function Preimages Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano, Victor Mateu
2020/1061 (PDF ) A new idea in response to fast correlation attacks on small-state stream ciphers Vahid Amin Ghafari, Fujiang Lin
2020/1060 (PDF ) Circular Security Is Complete for KDM Security Fuyuki Kitagawa, Takahiro Matsuda
2020/1059 (PDF ) Incorrectly Generated RSA Keys: How To Recover Lost Plaintexts Daniel Shumow
2020/1057 (PDF ) MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille
2020/1056 (PDF ) Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen
2020/1055 (PDF ) Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain Santi J. Vives
2020/1054 (PDF ) Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems Ben Smyth
2020/1053 (PDF ) Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation Anders Dalskov, Eysa Lee, Eduardo Soria-Vazquez
2020/1052 (PDF ) Attacking Threshold Wallets Jean-Philippe Aumasson, Omer Shlomovits
2020/1051 (PDF ) Lower Bounds on the Degree of Block Ciphers Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo
2020/1050 (PDF ) On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation Arpita Patra, Divya Ravi, Swati Singla
2020/1049 (PDF ) Rotational analysis of ChaCha permutation Stefano Barbero, Emanuele Bellini, Rusydi Makarim
2020/1048 (PDF ) An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang
2020/1047 (PDF ) Side-channel Attacks with Multi-thread Mixed Leakage Yiwen Gao, Yongbin Zhou
2020/1046 (PDF ) On the Linear Distinguishing Attack against ZUC-256 Stream Cipher Bin Zhang, Dengguo Feng, Chenhui Jin, Wen-Feng Qi, Wenling Wu, Chao Xu, Yanfeng Wang, Lin Jiao
2020/1045 (PDF ) On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang
2020/1044 (PDF ) A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
2020/1043 (PDF ) Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions Ian McQuoid, Mike Rosulek, Lawrence Roy
2020/1042 (PDF ) Candidate Obfuscation via Oblivious LWE Sampling Hoeteck Wee, Daniel Wichs
2020/1041 (PDF ) Sign in finite fields Abraham Westerbaan, Bas Westerbaan
2020/1040 (PDF ) MoSS: Modular Security Specifications Framework Amir Herzberg, Hemi Leibowitz, Ewa Syta, Sara Wrotniak
2020/1039 (PDF ) Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct Mohammad Sadeq Dousti, Alptekin Küpçü
2020/1038 (PDF ) On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4 Prasanna Ravi, Romain Poussier, Shivam Bhasin, Anupam Chattopadhyay
2020/1037 (PDF ) A High-performance Hardware Implementation of Saber Based on Karatsuba Algorithm Yihong Zhu, Min Zhu, Bohan Yang, Wenping Zhu, Chenchen Deng, Chen Chen, Shaojun Wei, Leibo Liu
2020/1036 (PDF ) Security in banking Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
2020/1035 (PDF ) Evolving Secret Sharing with Essential Participants Jyotirmoy Pramanik, Avishek Adhikari
2020/1034 (PDF ) Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques Fukang Liu, Takanori Isobe, Willi Meier
2020/1033 (PDF ) RandChain: A Scalable and Fair Decentralised Randomness Beacon Runchao Han, Haoyu Lin, Jiangshan Yu
2020/1032 (PDF ) Cryptanalysis of the MALICIOUS Framework Tim Beyne, Chaoyun Li
2020/1031 (PDF ) Profiled Deep Learning Side-Channel Attack on a Protected Arbiter PUF Combined with Bitstream Modification Yang Yu, Michail Moraitis, Elena Dubrova
2020/1030 (PDF ) Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu
2020/1029 (PDF ) Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols Hannah Davis, Felix Günther
2020/1028 (PDF ) Secure Data Hiding for Contact Tracing Craig Gotsman, Kai Hormann
2020/1027 (PDF ) Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things Hu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari
2020/1026 (PDF ) Simple and Efficient FE for Quadratic Functions Junqing Gong, Haifeng Qian
2020/1025 (PDF ) A Bit-Vector Differential Model for the Modular Addition by a Constant Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
2020/1024 (PDF ) Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
2020/1023 (PDF ) Post-Quantum Anonymous Veto Networks Jintai Ding, Doug Emery, Johannes Mueller, Peter Y. A. Ryan, Vonn Kee Wong
2020/1022 (PDF ) Polynomial IOPs for Linear Algebra Relations Alan Szepieniec, Yuncong Zhang
2020/1021 (PDF ) Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
2020/1020 (PDF ) Towards Classical Hardness of Module-LWE: The Linear Rank Case Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2020/1019 (PDF ) Security of Streaming Encryption in Google's Tink Library Viet Tung Hoang, Yaobin Shen
2020/1018 (PDF ) Small Superset and Big Subset Obfuscation Steven D. Galbraith, Trey Li
2020/1017 (PDF ) Governance framework for Quipuswap - automated decentralized exchange Andrey Sobol, Anastasiia Kondaurova
2020/1016 (PDF ) Hardware-Assisted Intellectual Property Protection of Deep Learning Models Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava
2020/1015 (PDF ) On Multivariate Algorithms of Digital Signatures of Linear Degree and Low Density. Vasyl Ustimenko
2020/1014 (PDF ) GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel Yuntao Liu, Ankur Srivastava
2020/1013 (PDF ) A Study on Privacy-Preserving GRU Inference Framework Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso
2020/1012 (PDF ) Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer Yi-Fu Lai, Steven D. Galbraith, Cyprien Delpech de Saint Guilhem
2020/1011 (PDF ) Private Join and Compute from PIR with Default Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, Ni Trieu
2020/1010 (PDF ) Indistinguishability Obfuscation from Circular Security Romain Gay, Rafael Pass
2020/1009 (PDF ) Obfuscating Finite Automata Steven D. Galbraith, Lukas Zobernig
2020/1008 (PDF ) Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano Leah Lathrop
2020/1007 (PDF ) Attacks on Integer-RLWE Alessandro Budroni, Benjamin Chetioui, Ermes Franch
2020/1006 (PDF ) An Analysis of Fault Attacks on CSIDH Jason LeGrow, Aaron Hutchinson
2020/1005 (PDF ) Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, Marc Stöttinger
2020/1004 (PDF ) Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson
2020/1003 (PDF ) Indistinguishability Obfuscation from Well-Founded Assumptions Aayush Jain, Huijia Lin, Amit Sahai
2020/1002 (PDF ) CrypTFlow2: Practical 2-Party Secure Inference Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
2020/1001 (PDF ) Robust distributed symmetric-key encryption Xunhua Wang, Ben Huson
2020/1000 (PDF ) Mechanised Models and Proofs for Distance-Bounding Ioana Boureanu, Constantin Catalin Dragan, François Dupressoir, David Gerault, Pascal Lafourcade
2020/999 (PDF ) Attribute-Based Symmetric Searchable Encryption Hai-Van Dang, Amjad Ullah, Alexandros Bakas, Antonis Michalas
2020/998 (PDF ) Lightweight Virtual Payment Channels Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2020/997 (PDF ) Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2020/996 (PDF ) Unifying Generic Group Models Ueli Maurer, Christopher Portmann, Jiamin Zhu
2020/995 (PDF ) Bootstrapping fully homomorphic encryption over the integers in less than one second Hilder Vitor Lima Pereira
2020/994 (PDF ) SPARKs: Succinct Parallelizable Arguments of Knowledge Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass
2020/993 (PDF ) Cryptanalysis of Masked Ciphers: A not so Random Idea Tim Beyne, Siemen Dhooghe, Zhenda Zhang
2020/992 (PDF ) Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs Bo-Yeon Sim, Jihoon Kwon, Joohee Lee, Il-Ju Kim, Taeho Lee, Jaeseung Han, Hyojin Yoon, Jihoon Cho, Dong-Guk Han
2020/990 (PDF ) Performance Comparisons and Migration Analyses of Lattice-based Cryptosystems on Hardware Security Module Junting Xiao, Tadahiko Ito
2020/989 (PDF ) Algorithm for SIS and MultiSIS problems Igor Semaev
2020/988 (PDF ) 120.147 Efficient Electromagnetic Side Channel Analysis by Probe Positioning using Multi-Layer Perceptron Anupam Golder, Baogeng Ma, Debayan Das, Josef Danial, Shreyas Sen, Arijit Raychowdhury
2020/987 (PDF ) Fuzzy Asymmetric Password-Authenticated Key Exchange Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi
2020/986 (PDF ) The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers Thomas Peyrin, Haoyang Wang
2020/985 (PDF ) Orienting supersingular isogeny graphs Leonardo Colò, David Kohel
2020/984 (PDF ) On Multivariate Algorithms of Digital Signatures on Secure El Gamal Type Mode. Vasyl Ustimenko
2020/983 (PDF ) A Differential Meet-in-the-Middle Attack on the Zip cipher Michael Stay
2020/982 (PDF ) Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
2020/981 (PDF ) Deep Learning based analysis of Key Scheduling Algorithm of PRESENT cipher Manan Pareek, Dr. Girish Mishra, Varun Kohli
2020/980 (PDF ) SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE Ruta Jawale, Yael Tauman Kalai, Dakshita Khurana, Rachel Zhang
2020/979 (PDF ) Mercurial Signatures for Variable-Length Messages Elizabeth C. Crites, Anna Lysyanskaya
2020/978 (PDF ) Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher Sarah Alzakari, Poorvi Vora
2020/977 (PDF ) On the Influence of Optimizers in Deep Learning-based Side-channel Analysis Guilherme Perin, Stjepan Picek
2020/976 (PDF ) Synchronizable Exchange Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon
2020/975 (PDF ) Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich
2020/974 (PDF ) Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions Dongxi Liu, Surya Nepal
2020/973 (PDF ) Stacked Garbling: Garbled Circuit Proportional to Longest Execution Path David Heath, Vladimir Kolesnikov
2020/972 (PDF ) Optimized Binary GCD for Modular Inversion Thomas Pornin
2020/971 (PDF ) QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme Koksal Mus, Saad Islam, Berk Sunar
2020/970 (PDF ) Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl, Juan Ramón Troncoso-Pastoriza
2020/969 (PDF ) Hashing to elliptic curves of $j=0$ and quadratic imaginary orders of class number $2$ Dmitrii Koshelev
2020/968 (PDF ) Feeding Cryptographic Protocols with Rich and Reliable Supply of Quantum-Grade Randomness Gideon Samid
2020/967 (PDF ) The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes Jintai Ding, Joshua Deaton, Vishakha, Bo-Yin Yang
2020/966 (PDF ) EM-Side-Channel Resistant Symmetric-Key Authentication Mechanism for Small Devices Rick Boivie, Charanjit S. Jutla, Daniel Friedman, Ghavam Shahidi
2020/965 (PDF ) Computation of a 30750-Bit Binary Field Discrete Logarithm Robert Granger, Thorsten Kleinjung, Arjen K. Lenstra, Benjamin Wesolowski, Jens Zumbragel
2020/964 (PDF ) Configurable Private Querying: Lookup and Partial Matching under Homomorphic Encryption Hamish Hunt, Jack Crawford, Oliver Masters, Enrico Steffinlongo, Flavio Bergamaschi
2020/963 (PDF ) From Partial to Global Asynchronous Reliable Broadcast Diana Ghinea, Martin Hirt, Chen-Da Liu-Zhang
2020/962 (PDF ) Post-Quantum Verification of Fujisaki-Okamoto Dominique Unruh
2020/961 (PDF ) Enable Dynamic Parameters Combination to Boost Linear Convolutional Neural Network for Sensitive Data Inference Qizheng Wang, Wenping Ma, Jie Li, Ge Liu
2020/960 (PDF ) Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl
2020/959 (PDF ) Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key Settings Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim
2020/958 (PDF ) Multi-Threshold Asynchronous Reliable Broadcast and Consensus Martin Hirt, Ard Kastrati, Chen-Da Liu-Zhang
2020/957 (PDF ) Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs Johannes Tobisch, Anita Aghaie, Georg T. Becker
2020/956 (PDF ) Constant Time Montgomery Ladder Kaushik Nath, Palash Sarkar
2020/955 (PDF ) Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2020/954 (PDF ) New Techniques for Traitor Tracing: Size $N^{1/3}$ and More from Pairings Mark Zhandry
2020/953 (PDF ) Performance comparison between deep learning-based and conventional cryptographic distinguishers Emanuele Bellini, Matteo Rossi
2020/952 (PDF ) On What to Learn: Train or Adapt a Deeply Learned Profile? Christophe Genevey-Metat, Benoît Gérard, Annelie Heuser
2020/951 (PDF ) Amplifying the Security of Functional Encryption, Unconditionally Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai
2020/950 (PDF ) Self-Processing Private Sensor Data via Garbled Encryption Nathan Manohar, Abhishek Jain, Amit Sahai
2020/949 (PDF ) HABIT: Hardware-Assisted Bluetooth-based Infection Tracking Nathan Manohar, Peter Manohar, Rajit Manohar
2020/948 (PDF ) STARK Friendly Hash -- Survey and Recommendation Eli Ben-Sasson, Lior Goldberg, David Levit
2020/947 (PDF ) Data Oblivious Algorithms for Multicores Vijaya Ramachandran, Elaine Shi
2020/946 (PDF ) Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm Johannes Mittmann, Werner Schindler
2020/945 (PDF ) On the (in)security of ROS Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, Mariana Raykova
2020/944 (PDF ) Secure Conflict-free Replicated Data Types Manuel Barbosa, Bernardo Ferreira, João Marques, Bernardo Portela, Nuno Preguiça
2020/943 (PDF ) Analysing and Improving Shard Allocation Protocols for Sharded Blockchains Runchao Han, Jiangshan Yu, Ren Zhang
2020/942 (PDF ) RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar Weippl
2020/941 (PDF ) Alternative Tower Field Construction for Quantum Implementation of the AES S-box Doyoung Chung, Seungkwang Lee, Dooho choi, Jooyoung Lee
2020/940 (PDF ) Directly revocable ciphertext-policy attribute-based encryption from lattices Fei Meng
2020/939 (PDF ) DLDDO: Deep Learning to Detect Dummy Operations JongHyeok Lee, Dong-Guk Han
2020/938 (PDF ) Performance Trade-offs in Design of MimbleWimble Proofs of Reserves Suyash Bagad, Saravanan Vijayakumaran
2020/937 (PDF ) BAM BAM!! On Reliability of EMFI for in-situ Automotive ECU Attacks Colin O'Flynn
2020/936 (PDF ) Cryptanalysis and Improvement of Anonymous Authentication for Wireless Body Area Networks with Provable Security Mahender Kumar
2020/935 (PDF ) Privacy-Preserving Multi-Operator Contact Tracing for Early Detection of Covid19 Contagions Davide Andreoletti, Omran Ayoub, Silvia Giordano, Massimo Tornatore, Giacomo Verticale
2020/934 (PDF ) CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller
2020/932 (PDF ) A Note on Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near – Rings Atul Chaturvedi, Varun Shukla, Manoj K. Misra
2020/931 (PDF ) Homomorphic string search with constant multiplicative depth Charlotte Bonte, Ilia Iliashenko
2020/930 (PDF ) The design of scalar AES Instruction Set Extensions for RISC-V Ben Marshall, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, Claire Wolf
2020/929 (PDF ) Local XOR Unification: Definitions, Algorithms and Application to Cryptography Hai Lin, Christopher Lynch
2020/928 (PDF ) Multi-theorem (Malicious) Designated-Verifier NIZK for QMA Omri Shmueli
2020/927 (PDF ) A Gas-Efficient Superlight Bitcoin Client in Solidity Stelios Daveas, Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
2020/926 (PDF ) Secure Computation over Lattices and Elliptic Curves Brett Hemenway Falk, Daniel Noble
2020/925 (PDF ) Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits Chenkai Weng, Kang Yang, Jonathan Katz, Xiao Wang
2020/924 (PDF ) Ferret: Fast Extension for coRRElated oT with small communication Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang
2020/923 (PDF ) Another code-based adaptation of Lyubashevsky’s signature cryptanalysed Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit
2020/921 (PDF ) Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications Hyoseung Kim, Youngkyung Lee, Michel Abdalla, Jong Hwan Park
2020/920 (PDF ) Further Cryptographic Properties of the Multiplicative Inverse Function Deng Tang, Bimal Mandal, Subhamoy Maitra
2020/919 (PDF ) Tight Bounds for Simon's Algorithm Xavier Bonnetain
2020/917 (PDF ) Formalizing Nakamoto-Style Proof of Stake Søren Eller Thomsen, Bas Spitters
2020/916 (PDF ) Black-Box Transformations from Passive to Covert Security with Public Verifiability Ivan Damgård, Claudio Orlandi, Mark Simkin
2020/915 (PDF ) Does Fiat-Shamir Require a Cryptographic Hash Function? Yilei Chen, Alex Lombardi, Fermi Ma, Willy Quach
2020/914 (PDF ) Ultra-Short Multivariate Public Key Signatures Jacques Patarin, Gilles Macario-Rat, Maxime Bros, Eliane Koussa
2020/913 (PDF ) Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis Tarun Yadav, Manoj Kumar
2020/912 (PDF ) Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber Zhuang Xu, Owen Pemberton, Sujoy Sinha Roy, David Oswald, Wang Yao, Zhiming Zheng
2020/911 (PDF ) Lossy Correlation Intractability and PPAD Hardness from Sub-exponential LWE Ruta Jawale, Dakshita Khurana
2020/910 (PDF ) A Power Side-Channel Attack on the CCA2-Secure HQC KEM Thomas Schamberger, Julian Renner, Georg Sigl, Antonia Wachter-Zeh
2020/909 (PDF ) When is a test not a proof? Eleanor McMurtry, Olivier Pereira, Vanessa Teague
2020/908 (PDF ) Analysis on the MinRank Attack using Kipnis-Shamir Method Against Rainbow Shuhei Nakamura, Yacheng Wang, Yasuhiko Ikematsu
2020/907 (PDF ) Enhanced Flush+Reload Attack on AES Milad Seddigh, Hadi Soleimany
2020/906 (PDF ) Optimally-resilient Unconditionally-secure Asynchronous Multi-party Computation Revisited Ashish Choudhury
2020/905 (PDF ) Cryptanalysis of a Code-Based Signature Scheme Based on the Lyubashevsky Framework Marco Baldi, Karan Khathuria, Edoardo Persichetti, Paolo Santini
2020/904 (PDF ) A Comparison of Weight Initializers in Deep Learning-based Side-channel Analysis Huimin Li, Marina Krček, Guilherme Perin
2020/903 (PDF ) Optimizing Implementations of Linear Layers Zejun Xiang, Xiangyong Zeng, Da Lin, Zhenzhen Bao, Shasha Zhang
2020/902 (PDF ) Federated Learning in Side-Channel Analysis Huanyu Wang, Elena Dubrova
2020/901 (PDF ) A Not-So-Trival Replay Attack Against DH-PSI Hongrui Cui, Yu Yu
2020/900 (PDF ) Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet
2020/899 (PDF ) On the Attack Evaluation and the Generalization Ability in Profiling Side-channel Analysis Lichao Wu, Léo Weissbart, Marina Krček, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek
2020/898 (PDF ) Rapidly Verifiable XMSS Signatures Joppe W. Bos, Andreas Hülsing, Joost Renes, Christine van Vredendaal
2020/897 (PDF ) Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices Jan Richter-Brockmann, Johannes Mono, Tim Güneysu
2020/896 (PDF ) Fault Injection as an Oscilloscope: Fault Correlation Analysis Albert Spruyt, Alyssa Milburn, Lukasz Chmielewski
2020/895 (PDF ) Multi-Currency Ledgers Joachim Zahnentferner
2020/894 (PDF ) Gossiping For Communication-Efficient Broadcast Georgios Tsimos, Julian Loss, Charalampos Papamanthou
2020/893 (PDF ) Toward an Asymmetric White-Box Proposal Lucas Barthelemy
2020/892 (PDF ) Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks Sayandeep Saha, Arnab Bag, Dirmanto Jap, Debdeep Mukhopadhyay, Shivam Bhasin
2020/891 (PDF ) Keep it Unsupervised: Horizontal Attacks Meet Deep Learning Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek
2020/890 (PDF ) Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness Aein Rezaei Shahmirzadi, Amir Moradi
2020/889 (PDF ) Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry
2020/888 (PDF ) Machine Learning of Physical Unclonable Functions using Helper Data - Revealing a Pitfall in the Fuzzy Commitment Scheme Emanuele Strieder, Christoph Frisch, Michael Pehl
2020/887 (PDF ) Updatable Blockchains Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, Dionysis Zindros
2020/886 (PDF ) Adaptively Secure Revocable Hierarchical IBE from $k$-linear Assumption Keita Emura, Atsushi Takayasu, Yohei Watanabe
2020/885 (PDF ) Wendy, the Good Little Fairness Widget Klaus Kursawe
2020/884 (PDF ) Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu
2020/883 (PDF ) On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis Jeroen Delvaux
2020/882 (PDF ) Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk
2020/881 (PDF ) Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES Loïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie, Damien Couroussé, Cécile Dumas, Laurent Maingault
2020/880 (PDF ) Classical Reduction of Gap SVP to LWE: A Concrete Security Analysis Palash Sarkar, Subhadip Singha
2020/879 (PDF ) Second-Order Masked Lookup Table Compression Scheme Annapurna Valiveti, Srinivas Vivek
2020/878 (PDF ) Bent Boolean functions A better procedure to generate non-crypto 4-bit S-boxes Sankhanil De, Ranjan Ghosh
2020/877 (PDF ) Unclonable Decryption Keys Marios Georgiou, Mark Zhandry
2020/876 (PDF ) Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks Claude Carlet, Sylvain Guilley, Sihem Mesnager
2020/875 (PDF ) Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves Daiki Hayashida, Kenichiro Hayasaka, Tadanori Teruya
2020/874 (PDF ) New Methods and Abstractions for RSA-Based Forward Secure Signatures Susan Hohenberger, Brent Waters
2020/873 (PDF ) Post-Quantum Group Key Agreement Scheme Julia Bobrysheva, Sergey Zapechnikov
2020/872 (PDF ) Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis Gabriel Zaid, Lilian Bossuet, François Dassance, Amaury Habrard, Alexandre Venelli
2020/871 (PDF ) Quantum Immune One-Time Memories Qipeng Liu, Amit Sahai, Mark Zhandry
2020/870 (PDF ) Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN Yu Yu, Jiang Zhang
2020/869 (PDF ) An Algorithmic Reduction Theory for Binary Codes: LLL and more Thomas Debris-Alazard, Léo Ducas, Wessel P. J. van Woerden
2020/868 (PDF ) SoK: A Taxonomy of Cryptocurrency Wallets Kostis Karantias
2020/867 (PDF ) Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks Ping Wang, Ping Chen, Zhimin Luo, Gaofeng Dong, Mengce Zheng, Nenghai Yu, Honggang Hu
2020/866 (PDF ) Development of The RISC-V Entropy Source Interface Markku-Juhani O. Saarinen, G. Richard Newell, Ben Marshall
2020/865 (PDF ) Agora: A Privacy-Aware Data Marketplace Vlasis Koutsos, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Sasu Tarkoma, Pan Hui
2020/864 (PDF ) Linear Complexity Private Set Intersection for Secure Two-Party Protocols Ferhat Karakoç, Alptekin Küpçü
2020/863 (PDF ) Privacy-Preserving Automated Exposure Notification Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner
2020/862 (PDF ) Protecting Cryptography Against Compelled Self-Incrimination Sarah Scheffler, Mayank Varia
2020/861 (PDF ) Faster Homomorphic Encryption over GPGPUs via hierarchical DGT Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
2020/860 (PDF ) SNARGs for Bounded Depth Computations from Sub-Exponential LWE Yael Tauman Kalai, Rachel Zhang
2020/859 (PDF ) A Classification of Computational Assumptions in the Algebraic Group Model Balthazar Bauer, Georg Fuchsbauer, Julian Loss
2020/858 (PDF ) Client-oblivious OPRAM Gareth T. Davies, Christian Janson, Daniel P. Martin
2020/857 (PDF ) Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld
2020/856 (PDF ) Improving Revocation for Group Signature with Redactable Signature Olivier Sanders
2020/855 (PDF ) Fooling primality tests on smartcards Vladimir Sedlacek, Jan Jancar, Petr Svenda
2020/854 (PDF ) Designing Reverse Firewalls for the Real World Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe
2020/853 (PDF ) Linear-Complexity Private Function Evaluation is Practical Marco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider
2020/852 (PDF ) FROST: Flexible Round-Optimized Schnorr Threshold Signatures Chelsea Komlo, Ian Goldberg
2020/851 (PDF ) Asynchronous Byzantine Agreement with Subquadratic Communication Erica Blum, Jonathan Katz, Chen-Da Liu-Zhang, Julian Loss
2020/850 (PDF ) On the Guaranteed Number of Activations in XS-circuits Sergey Agievich
2020/849 (PDF ) Surveying global verifiability Ben Smyth
2020/848 (PDF ) On Composability of Game-based Password Authenticated Key Exchange Marjan Škrobot, Jean Lancrenon
2020/847 (PDF ) Encrypt-to-self: Securely Outsourcing Storage Jeroen Pijnenburg, Bertram Poettering
2020/846 (PDF ) Deep Learning based Differential Distinguisher for Lightweight Cipher PRESENT Aayush Jain, Varun Kohli, Girish Mishra
2020/845 (PDF ) Post-Quantum Adaptor Signatures and Payment Channel Networks Muhammed F. Esgin, Oguzhan Ersoy, Zekeriya Erkin
2020/844 (PDF ) Generic Superlight Client for Permissionless Blockchains Yuan Lu, Qiang Tang, Guiling Wang
2020/843 (PDF ) Dragoon: Private Decentralized HITs Made Practical Yuan Lu, Qiang Tang, Guiling Wang
2020/842 (PDF ) Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited Yuan Lu, Zhenliang Lu, Qiang Tang, Guiling Wang
2020/841 (PDF ) Dumbo: Faster Asynchronous BFT Protocols Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2020/840 (PDF ) Proof of Storage-Time: Efficiently Checking Continuous Data Availability Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang
2020/839 (PDF ) Cryptanalysis of a ``Strengthened'' Key Exchange Protocol for IoT, or When SAKE$^+$ Turns Out to Be SAKE$^-$ Loïc Ferreira
2020/838 (PDF ) PudgyTurtle: variable-length, keystream-dependent encoding to resist time-memory tradeoff attacks David A August, Anne C Smith
2020/837 (PDF ) An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes Daniel Kales, Greg Zaverucha
2020/836 (PDF ) Assembly or Optimized C for Lightweight Cryptography on RISC-V? Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Amber Sprenkels, Benoit Viguier
2020/835 (PDF ) On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function Congwei Zhou, Bin Hu, Jie Guan
2020/834 (PDF ) Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison Eunsang Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim
2020/833 (PDF ) Secure Update of FPGA-based Secure Elements using Partial Reconfiguration Florian Unterstein, Tolga Sel, Thomas Zeschg, Nisha Jacob, Michael Tempelmeier, Michael Pehl, Fabrizio De Santis
2020/832 (PDF ) Round-optimal Black-box Commit-and-prove with Succinct Communication Susumu Kiyoshima
2020/831 (PDF ) On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs Michele Ciampi, Roberto Parisella, Daniele Venturi
2020/830 (PDF ) Terakey - An Encryption Method Whose Security Can Be Analyzed from First Principles Arnold G. Reinhold
2020/829 (PDF ) Refined Analysis of the Asymptotic Complexity of the Number Field Sieve Aude Le Gluher, Pierre-Jean Spaenlehauer, Emmanuel Thomé
2020/827 (PDF ) Encrypted Blockchain Databases Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz
2020/826 (PDF ) A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes Xuan Thanh Do, Duong Hieu Phan, Moti Yung
2020/824 (PDF ) Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC Fynn Dallmeier, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf
2020/823 (PDF ) The Provable Security of Ed25519: Theory and Practice Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao
2020/822 (PDF ) Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries Kwangsu Lee
2020/821 (PDF ) Interconnect-Aware Bitstream Modification Michail Moraitis, Elena Dubrova
2020/820 (PDF ) On the security of the Rescue hash function Tim Beyne, Anne Canteaut, Gregor Leander, María Naya-Plasencia, Léo Perrin, Friedrich Wiemer
2020/819 (PDF ) UC-Secure OT from LWE, Revisited Willy Quach
2020/818 (PDF ) Security Limitations of Classical-Client Delegated Quantum Computing Christian Badertscher, Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Dominik Leichtle, Atul Mantri, Petros Wallden
2020/817 (PDF ) Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation Osman Biçer, Alptekin Küpçü
2020/816 (PDF ) Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses Luka Music, Céline Chevalier, Elham Kashefi
2020/815 (PDF ) Cryptographic Divergences: New Techniques and New Applications Marc Abboud, Thomas Prest
2020/814 (PDF ) Incompressible Encodings Tal Moran, Daniel Wichs
2020/813 (PDF ) Strengthening Sequential Side-Channel Attacks Through Change Detection Luca Frittoli, Matteo Bocchi, Silvia Mella, Diego Carrera, Beatrice Rossi, Pasqualina Fragneto, Ruggero Susella, Giacomo Boracchi
2020/812 (PDF ) Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions Lior Rotem, Gil Segev
2020/811 (PDF ) Another Look at Extraction and Randomization of Groth's zk-SNARK Karim Baghery, Markulf Kohlweiss, Janno Siim, Mikhail Volkhov
2020/809 (PDF ) On (expected polynomial) runtime in cryptography Michael Klooß
2020/808 (PDF ) Security Analysis of Olvid's SAS-based Trust Establishment Protocol Michel Abdalla
2020/807 (PDF ) Secure merge with $O(n \log \log n)$ secure operation Brett Hemenway Falk, Rafail Ostrovsky
2020/806 (PDF ) Toward Comparable Homomorphic Encryption for Crowd-sensing Network Daxin Huang, Qingqing Gan, Xiaoming Wang, Chengpeng Huang, Yijian Lin
2020/805 (PDF ) Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud Furkan Turan, Ingrid Verbauwhede
2020/804 (PDF ) Lightweight Ciphers on a 65 nm ASIC - A Comparative Study on Energy Consumption Bastian Richter, Amir Moradi
2020/803 (PDF ) Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen, Limin Fan, Wenling Wu
2020/802 (PDF ) Quantum Attacks on HCTR and its Variants Mostafizar Rahman, Goutam Paul
2020/801 (PDF ) Not enough LESS: An improved algorithm for solving Code Equivalence Problems over $\mathbb{F}_q$ Ward Beullens
2020/800 (PDF ) Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements Mihir Bellare, Wei Dai, Phillip Rogaway
2020/799 (PDF ) Secure Generalized Deduplication via Multi-Key Revealing Encryption Daniel E. Lucani, Lars Nielsen, Claudio Orlandi, Elena Pagnin, Rasmus Vestergaard
2020/798 (PDF ) Superposition Attack on OT Protocols Ehsan Ebrahimi, Céline Chevalier, Marc Kaplan, Michele Minelli
2020/797 (PDF ) Fast, Small, and Area-Time Efficient Architectures for Key-Exchange on Curve25519 Mojtaba Bisheh Niasar, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2020/796 (PDF ) A Generalization of Paillier's Public-Key System With Fast Decryption Ying Guo, Zhenfu Cao, Xiaolei Dong
2020/795 (PDF ) Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches Viet Ba Dang, Farnoud Farahmand, Michal Andrzejczak, Kamyar Mohajerani, Duc Tri Nguyen, Kris Gaj
2020/794 (PDF ) Symbolic and Computational Reasoning About Cryptographic Modes of Operation Catherine Meadows
2020/793 (PDF ) PHyCT : Privacy preserving Hybrid Contact Tracing Mahabir Prasad Jhanwar, Sumanta Sarkar
2020/792 (PDF ) Trace-$\Sigma$: a privacy-preserving contact tracing app Jean-François Biasse, Sriram Chellappan, Sherzod Kariev, Noyem Khan, Lynette Menezes, Efe Seyitoglu, Charurut Somboonwit, Attila Yavuz
2020/791 (PDF ) Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies Chaya Ganesh, Claudio Orlandi, Daniel Tschudi, Aviv Zohar
2020/790 (PDF ) Anonymity and Rewards in Peer Rating Systems Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso
2020/789 (PDF ) Double-Authentication-Preventing Signatures in the Standard Model Dario Catalano, Georg Fuchsbauer, Azam Soleimanian
2020/788 (PDF ) Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model Michel Abdalla, Florian Bourse, Hugo Marival, David Pointcheval, Azam Soleimanian, Hendrik Waldner
2020/787 (PDF ) A Note on Separating Classical and Quantum Random Oracles Takashi Yamakawa, Mark Zhandry
2020/786 (PDF ) Random Probing Security: Verification, Composition, Expansion and New Constructions Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb
2020/785 (PDF ) The Memory-Tightness of Authenticated Encryption Ashrujit Ghoshal, Joseph Jaeger, Stefano Tessaro
2020/784 (PDF ) CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time Carsten Baum, Bernardo David, Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, Sabine Oechsner
2020/783 (PDF ) Adventures in Crypto Dark Matter: Attacks, Fixes for Weak Pseudorandom Functions Jung Hee Cheon, Wonhee Cho, Jeong Han Kim, Jiseung Kim
2020/782 (PDF ) A Love Affair Between Bias Amplifiers and Broken Noise Sources George Teseleanu
2020/781 (PDF ) Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier
2020/780 (PDF ) The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10 Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
2020/779 (PDF ) Non-Malleable Time-Lock Puzzles and Applications Cody Freitag, Ilan Komargodski, Rafael Pass, Naomi Sirkin
2020/778 (PDF ) SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT Seyed Farhad Aghili, Amirhossein Adavoudi Jolfaei, Aysajan Abidin
2020/777 (PDF ) Dynamic Universal Accumulator with Batch Update over Bilinear Groups Giuseppe Vitto, Alex Biryukov
2020/776 (PDF ) Non-Malleable Codes for Bounded Polynomial-Depth Tampering Dana Dachman-Soled, Ilan Komargodski, Rafael Pass
2020/775 (PDF ) Improved Differential-Linear Attacks with Applications to ARX Ciphers Christof Beierle, Gregor Leander, Yosuke Todo
2020/774 (PDF ) Timelocked Bribing Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer
2020/773 (PDF ) An Instruction Set Extension to Support Software-Based Masking Si Gao, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham, Francesco Regazzoni
2020/772 (PDF ) Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs Alex Lombardi, Vinod Vaikuntanathan
2020/771 (PDF ) Leakage-Resilient Key Exchange and Two-Seed Extractors Xin Li, Fermi Ma, Willy Quach, Daniel Wichs
2020/770 (PDF ) Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions Akshima, David Cash, Andrew Drucker, Hoeteck Wee
2020/769 (PDF ) Lattice-Based Blind Signatures, Revisited Eduard Hauck, Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen
2020/768 (PDF ) Perfect Zero Knowledge: New Upperbounds and Relativized Separations Peter Dixon, Sutanu Gayen, A. Pavan, N. V. Vinodchandran
2020/767 (PDF ) Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability Carsten Baum, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
2020/766 (PDF ) The uncertainty of Side-Channel Analysis: A way to leverage from heuristics Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz
2020/765 (PDF ) Handling Adaptive Compromise for Practical Encryption Schemes Joseph Jaeger, Nirvan Tyagi
2020/764 (PDF ) Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai
2020/763 (PDF ) Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol Jia Xu, Yiwen Gao, Hoonwei Lim, Hongbing Wang, Ee-Chien Chang
2020/762 (PDF ) Functional Encryption for Attribute-Weighted Sums from $k$-Lin Michel Abdalla, Junqing Gong, Hoeteck Wee
2020/761 (PDF ) Decentralized reputation Tassos Dimitriou
2020/760 (PDF ) Curves with fast computations in the first pairing group Rémi Clarisse, Sylvain Duquesne, Olivier Sanders
2020/759 (PDF ) Chosen Ciphertext Security from Injective Trapdoor Functions Susan Hohenberger, Venkata Koppula, Brent Waters
2020/758 (PDF ) Verifiable state machines: Proofs that untrusted services operate correctly Srinath Setty, Sebastian Angel, Jonathan Lee
2020/757 (PDF ) Understanding Methodology for Efficient CNN Architectures in Profiling Attacks Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2020/756 (PDF ) Provable Security Analysis of FIDO2 Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Bogdan Warinschi
2020/755 (PDF ) Time-release Cryptography from Minimal Circuit Assumptions Samuel Jaques, Hart Montgomery, Arnab Roy
2020/754 (PDF ) Fluid MPC: Secure Multiparty Computation with Dynamic Participants Arka Rai Choudhuri, Aarushi Goel, Matthew Green, Abhishek Jain, Gabriel Kaptchuk
2020/753 (PDF ) Compressing Proofs of $k$-Out-Of-$n$ Partial Knowledge Thomas Attema, Ronald Cramer, Serge Fehr
2020/752 (PDF ) Continuous Group Key Agreement with Active Security Joël Alwen, Sandro Coretti, Daniel Jost, Marta Mularczyk
2020/751 (PDF ) DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Christof Paar
2020/750 (PDF ) Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging Max Hoffmann, Christof Paar
2020/749 (PDF ) Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al. Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang
2020/748 (PDF ) Anonymous probabilistic payment in payment hub Tatsuo Mitani, Akira Otsuka
2020/747 (PDF ) Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups Karim Eldefrawy, Seoyeon Hwang, Rafail Ostrovsky, Moti Yung
2020/746 (PDF ) Comparison of RISC-V and transport triggered architectures for a post-quantum cryptography application Latif AKÇAY, Berna ÖRS
2020/745 (PDF ) True Random Number Generation Based on DNA molecule Genetic Information (DNA-TRNG) Siddaramappa V, Ramesh K B
2020/744 (PDF ) Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras
2020/743 (PDF ) A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM Qian Guo, Thomas Johansson, Alexander Nilsson
2020/742 (PDF ) Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures Jan Richter-Brockmann, Tim Güneysu
2020/741 (PDF ) Fast Privacy-Preserving Punch Cards Saba Eskandarian
2020/740 (PDF ) Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback Erica Blum, Chen-Da Liu-Zhang, Julian Loss
2020/739 (PDF ) Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles Peter Chvojka, Tibor Jager, Daniel Slamanig, Christoph Striecks
2020/738 (PDF ) GIFT-COFB Subhadeep Banik, Avik Chakraborti, Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
2020/737 (PDF ) A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/736 (PDF ) Forward Security under Leakage Resilience, Revisited Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan
2020/735 (PDF ) Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger Heewon Chung, Kyoohyung Han, Chanyang Ju, Myungsun Kim, Jae Hong Seo
2020/734 (PDF ) Mirror Theory: A simple proof of the Pi+Pj Theorem with xi_max=2 Benoît Cogliati, Jacques Patarin
2020/733 (PDF ) A Side-Channel Resistant Implementation of SABER Michiel Van Beirendonck, Jan-Pieter D'Anvers, Angshuman Karmakar, Josep Balasch, Ingrid Verbauwhede
2020/732 (PDF ) Security of Multi-Adjustable Join Schemes: Separations and Implications Mojtaba Rafiee, Shahram Khazaei
2020/731 (PDF ) The Exact Security of PMAC with Three Powering-Up Masks Yusuke Naito
2020/730 (PDF ) On the Security of Time-Lock Puzzles and Timed Commitments Jonathan Katz, Julian Loss, Jiayu Xu
2020/729 (PDF ) Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF Melissa Chase, Peihan Miao
2020/728 (PDF ) Minerva: The curse of ECDSA nonces Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sys
2020/727 (PDF ) An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers Adrian Ranea, Yunwen Liu, Tomer Ashur
2020/726 (PDF ) On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments Denis Diemert, Tibor Jager
2020/725 (PDF ) Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi
2020/724 (PDF ) Multi-Party Revocation in Sovrin: Performance through Distributed Trust Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch
2020/723 (PDF ) On the Confidentiality of Amounts in Grin Suyash Bagad, Saravanan Vijayakumaran
2020/722 (PDF ) NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities Yehuda Afek, Anat Bremler-Barr, Lior Shafir
2020/721 (PDF ) MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame
2020/720 (PDF ) Fast algebraic immunity of Boolean functions and LCD codes Sihem Mesnager, Chunming Tang
2020/719 (PDF ) Hypercube and Cascading-based Algorithms for Secret Sharing Schemes Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai
2020/718 (PDF ) Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3 Marc Fischlin, Felix Günther, Christian Janson
2020/717 (PDF ) Fault Location Identification By Machine Learning Anubhab Baksi, Santanu Sarkar, Akhilesh Siddhanti, Ravi Anand, Anupam Chattopadhyay
2020/716 (PDF ) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function Takeshi Sugawara, Tatsuya Onuma, Yang Li
2020/715 (PDF ) On (impracticality of) transfinite symmetric encryption with keys smaller than messages under GCH Sergij V. Goncharov
2020/714 (PDF ) One-One Constrained Pseudorandom Functions Naty Peter, Rotem Tsabary, Hoeteck Wee
2020/713 (PDF ) A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
2020/712 (PDF ) Anonymous IBE From Quadratic Residuosity With Fast Encryption Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng
2020/711 (PDF ) Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2020/710 (PDF ) Rational Behavior in Committee-Based Blockchains Yackolley Amoussou-Guenou, Bruno Biais, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2020/709 (PDF ) Reputable List Curation from Decentralized Voting Elizabeth C. Crites, Mary Maller, Sarah Meiklejohn, Rebekah Mercer
2020/708 (PDF ) Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov
2020/707 (PDF ) Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)) Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen
2020/706 (PDF ) A Logic Synthesis Toolbox for Reducing the Multiplicative Complexity in Logic Networks Eleonora Testa, Mathias Soeken, Heinz Riener, Luca Amaru, Giovanni De Micheli
2020/705 (PDF ) On the minimal value set size of APN functions Ingo Czerwinski
2020/704 (PDF ) Secure Single-Server Aggregation with (Poly)Logarithmic Overhead James Bell, K. A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova
2020/703 (PDF ) New Complexity Estimation on the Rainbow-Band-Separation Attack Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi
2020/702 (PDF ) Rainbow Band Separation is Better than we Thought Ray Perlner, Daniel Smith-Tone
2020/701 (PDF ) MPC with Friends and Foes Bar Alon, Eran Omri, Anat Paskin-Cherniavsky
2020/700 (PDF ) Personal data exchange protocol: X Vladimir Belsky, Ilia Gerasimov, Kirill Tsaregorodtsev, Ivan Chizhov
2020/699 (PDF ) Looking at the NIST Lightweight Candidates from a Masking Point-of-View Lauren De Meyer
2020/697 (PDF ) Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment F. Boudot, P. Gaudry, A. Guillevic, N. Heninger, E. Thomé, P. Zimmermann
2020/696 (PDF ) An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials Yin Li, Yu Zhang
2020/695 (PDF ) Collusion Resistant Watermarkable PRFs from Standard Assumptions Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu
2020/694 (PDF ) The nearest-colattice algorithm Thomas Espitau, Paul Kirchner
2020/693 (PDF ) Tight Quantum Time-Space Tradeoffs for Function Inversion Kai-Min Chung, Siyao Guo, Qipeng Liu, Luowen Qian
2020/692 (PDF ) Optimizing Inner Product Masking Scheme by A Coding Theory Approach Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger
2020/691 (PDF ) Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms Diego Aranha, Anders Dalskov, Daniel Escudero, Claudio Orlandi
2020/690 (PDF ) SAFE: A Secure and Efficient Long-Term Distributed Storage System Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni
2020/689 (PDF ) Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64 Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle
2020/688 (PDF ) Lin2-Xor Lemma: an OR-proof that leads to the membership proof and signature Anton A. Sokolov
2020/687 (PDF ) Lower Bounds on the Time/Memory Tradeoff of Function Inversion Dror Chawin, Iftach Haitner, Noam Mazor
2020/686 (PDF ) A Level Dependent Authentication for IoT Paradigm Chintan Patel, Nishant Doshi
2020/685 (PDF ) Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors Leo de Castro, Chiraag Juvekar, Vinod Vaikuntanathan
2020/684 (PDF ) How to (legally) keep secrets from mobile operators Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Thibaut Jacques, Adina Nedelcu, Cristina Onete
2020/683 (PDF ) Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model Abida Haque, Stephan Krenn, Daniel Slamanig, Christoph Striecks
2020/682 (PDF ) Succinct Diophantine-Satisfiability Arguments Patrick Towa, Damien Vergnaud
2020/681 (PDF ) An F-algebra for analysing information leaks in the presence of glitches Vittorio Zaccaria
2020/680 (PDF ) On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition Sumanta Sarkar, Yu Sasaki, Siang Meng Sim
2020/679 (PDF ) BETA: Biometric Enabled Threshold Authentication Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis
2020/678 (PDF ) Stronger Notions and a More Efficient Construction of Threshold Ring Signatures Alexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov
2020/677 (PDF ) Blockchain with Varying Number of Players T-H. Hubert Chan, Naomi Ephraim, Antonio Marcedone, Andrew Morgan, Rafael Pass, Elaine Shi
2020/676 (PDF ) An airdrop that preserves recipient privacy Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon
2020/675 (PDF ) Ledger Combiners for Fast Settlement Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell
2020/674 (PDF ) Coercion-Resistant Blockchain-Based E-Voting Protocol Chiara Spadafora, Riccardo Longo, Massimiliano Sala
2020/673 (PDF ) LotMint: Blockchain Returning to Decentralization with Decentralized Clock Wenbo MAO, Wenxiang WANG
2020/672 (PDF ) A Survey of Automatic Contact Tracing Approaches Using Bluetooth Low Energy Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/671 (PDF ) Persistent Fault Analysis With Few Encryptions Sebastien Carre, Sylvain Guilley, Olivier Rioul
2020/670 (PDF ) Inverse-Sybil Attacks in Automated Contact Tracing Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
2020/669 (PDF ) Proof of Mirror Theory for $\xi_{\max}=2$ Avijit Dutta, Mridul Nandi, Abishanka Saha
2020/668 (PDF ) On Subversion-Resistant SNARKs Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michał Zając
2020/667 (PDF ) New Results on the SymSum Distinguisher on Round-Reduced SHA3 Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan
2020/666 (PDF ) Revisiting the Hardness of Binary Error LWE Chao Sun, Mehdi Tibouchi, Masayuki Abe
2020/665 (PDF ) Montgomery-friendly primes and applications to cryptography Jean Claude Bajard, Sylvain Duquesne
2020/664 (PDF ) The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs Amos Beimel, Oriol Farràs
2020/663 (PDF ) Super-Linear Time-Memory Trade-Offs for Symmetric Encryption Wei Dai, Stefano Tessaro, Xihu Zhang
2020/662 (PDF ) Multi-Party Computation Mechanism for Anonymous Equity Block Trading: A Secure Implementation of Turquoise Plato Uncross John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
2020/661 (PDF ) Tight Consistency Bounds for Bitcoin Peter Gaži, Aggelos Kiayias, Alexander Russell
2020/660 (PDF ) Efficient Software Implementation of the SIKE Protocol Using a New Data Representation Jing Tian, Piaoyang Wang, Zhe Liu, Jun Lin, Zhongfeng Wang, Johann Großschädl
2020/659 (PDF ) Software Evaluation of Grain-128AEAD for Embedded Platforms Alexander Maximov, Martin Hell
2020/658 (PDF ) Time-Specific Signatures Masahito Ishizaka, Shinsaku Kiyomoto
2020/657 (PDF ) Traceable Constant-Size Multi-Authority Credentials Chloé Hébant, David Pointcheval
2020/656 (PDF ) On Length Independent Security Bounds for the PMAC Family Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
2020/655 (PDF ) Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel Yoo-Seung Won, Dirmanto Jap, Shivam Bhasin
2020/654 (PDF ) Proximity Gaps for Reed-Solomon Codes Eli Ben-Sasson, Dan Carmon, Yuval Ishai, Swastik Kopparty, Shubhangi Saraf
2020/653 (PDF ) MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation Zhen Hang Jiang, Yunsi Fei, Aidong Adam Ding, Thomas Wahl
2020/652 (PDF ) Somewhere Statistically Binding Commitment Schemes with Applications Prastudy Fauzi, Helger Lipmaa, Zaira Pindado, Janno Siim
2020/651 (PDF ) Cryptanalysis of ``FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things'' Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
2020/650 (PDF ) End-to-End Verifiable E-Voting Trial for Polling Station Voting Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Liu
2020/649 (PDF ) NIZK from SNARG Fuyuki Kitagawa, Takahiro Matsuda, Takashi Yamakawa
2020/648 (PDF ) Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust Yuncong Hu, Sam Kumar, Raluca Ada Popa
2020/647 (PDF ) A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes Saeid Esmaeilzade, Ziba Eslami, Nasrollah Pakniat
2020/646 (PDF ) Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices Ward Beullens, Shuichi Katsumata, Federico Pintore
2020/645 (PDF ) Correlation distribution analysis of a two-round key-alternating block cipher Liliya Kraleva, Nikolai L. Manev, Vincent Rijmen
2020/644 (PDF ) ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing Ignacio Cascudo, Bernardo David
2020/643 (PDF ) About Blockchain Interoperability Pascal Lafourcade, Marius Lombard-Platet
2020/642 (PDF ) The Ritva Blockchain: Enabling Confidential Transactions at Scale Henri Aare, Peter Vitols
2020/641 (PDF ) Overview of Polkadot and its Design Considerations Jeff Burdges, Alfonso Cevallos, Peter Czaban, Rob Habermeier, Syed Hosseini, Fabio Lama, Handan Kilinc Alper, Ximin Luo, Fatemeh Shirazi, Alistair Stewart, Gavin Wood
2020/640 (PDF ) Grover on SPECK: Quantum Resource Estimates Kyungbae Jang, Seungjoo Choi, Hyeokdong Kwon, Hwajeong Seo
2020/639 (PDF ) Constructions for Quantum Indistinguishability Obfuscation Anne Broadbent, Raza Ali Kazmi
2020/638 (PDF ) Delay Encryption Jeffrey Burdges, Luca De Feo
2020/636 (PDF ) Mixed-Technique Multi-Party Computations Composed of Two-Party Computations Erik-Oliver Blass, Florian Kerschbaum
2020/635 (PDF ) Two-Round Oblivious Linear Evaluation from Learning with Errors Pedro Branco, Nico Döttling, Paulo Mateus
2020/634 (PDF ) SILVER - Statistical Independence and Leakage Verification David Knichel, Pascal Sasdrich, Amir Moradi
2020/633 (PDF ) Improved torsion-point attacks on SIDH variants Victoria de Quehen, Péter Kutas, Chris Leonardi, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange
2020/632 (PDF ) Proposing an MILP-based Method for the Experimental Verification of Difference Trails Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri
2020/631 (PDF ) Simultaneous Diagonalization of Incomplete Matrices and Applications Jean-Sébastien Coron, Luca Notarnicola, Gabor Wiese
2020/630 (PDF ) ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy Zhiguo Wan, Xiaotong Liu
2020/629 (PDF ) Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer Vivek Arte, Mihir Bellare
2020/628 (PDF ) A post-quantum key exchange protocol from the intersection of quadric surfaces Daniele Di Tullio, Manoj Gyawali
2020/627 (PDF ) Attacking Zcash For Fun And Profit Duke Leto, The Hush Developers
2020/626 (PDF ) Game theoretical framework for analyzing Blockchains Robustness Paolo Zappalà, Marianna Belotti, Maria Potop-Butucaru, Stefano Secci
2020/625 (PDF ) Probability theory and public-key cryptography Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
2020/624 (PDF ) RSA for poor men: a cryptosystem based on probable primes to base 2 numbers Marek Wójtowicz
2020/623 (PDF ) PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim
2020/622 (PDF ) The Direction of Updatable Encryption does not Matter Much Yao Jiang
2020/621 (PDF ) How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment? Junbin Fang, Dominique Unruh, Jun Yan, Dehua Zhou
2020/620 (PDF ) Private Identity Agreement for Private Set Functionalities Ben Kreuter, Sarvar Patel, Ben Terner
2020/619 (PDF ) Security Analysis of NIST CTR-DRBG Viet Tung Hoang, Yaobin Shen
2020/618 (PDF ) Broadcast Secret-Sharing, Bounds and Applications Ivan Damgård, Kasper Green Larsen, Sophia Yakoubov
2020/617 (PDF ) New Techniques in Replica Encodings with Client Setup Rachit Garg, George Lu, Brent Waters
2020/616 (PDF ) Master-Key KDM-Secure IBE from Pairings Sanjam Garg, Romain Gay, Mohammad Hajiabadi
2020/615 (PDF ) LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom
2020/614 (PDF ) Lattice-Based E-Cash, Revisited Amit Deo, Benoit Libert, Khoa Nguyen, Olivier Sanders
2020/613 (PDF ) SiGamal: A supersingular isogeny-based PKE and its application to a PRF Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi
2020/612 (PDF ) Key Assignment Schemes with Authenticated Encryption, revisited Jeroen Pijnenburg, Bertram Poettering
2020/611 (PDF ) Efficient and Fast Hardware Architectures for SIKE Round 2 on FPGA Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2020/609 (PDF ) Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers Behnaz Rezvani, Thomas Conroy, Luke Beckwith, Matthew Bozzay, Trevor Laffoon, David McFeeters, Yijia Shi, Minh Vu, William Diehl
2020/608 (PDF ) The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits Fatih Balli, Andrea Caforio, Subhadeep Banik
2020/607 (PDF ) Energy Analysis of Lightweight AEAD Circuits Andrea Caforio, Fatih Balli, Subhadeep Banik
2020/606 (PDF ) Multiparty Noninteractive Key Exchange from Ring Key-Homomorphic Weak PRFs Navid Alamati, Hart Montgomery, Sikhar Patranabis
2020/605 (PDF ) LUSA: the HPC library for lattice-based cryptanalysis Artur Mariano
2020/604 (PDF ) Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions T-H. Hubert Chan, Elaine Shi, Wei-Kai Lin, Kartik Nayak
2020/603 (PDF ) Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification Gilles Barthe, Marc Gourjon, Benjamin Gregoire, Maximilian Orlt, Clara Paglialonga, Lars Porth
2020/602 (PDF ) CENCPP* - Beyond-birthday-secure Encryption from Public Permutations Arghya Bhattacharjee, Avijit Dutta, Eik List, Mridul Nandi
2020/601 (PDF ) Everything is a Race and Nakamoto Always Wins Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni
2020/600 (PDF ) Multi-Party Threshold Private Set Intersection with Sublinear Communication Saikrishna Badrinarayanan, Peihan Miao, Srinivasan Raghuraman, Peter Rindal
2020/599 (PDF ) Private Matching for Compute Prasad Buddhavarapu, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Vlad Vlaskin
2020/598 (PDF ) Cryptanalysis of Au et al. Dynamic Universal Accumulator Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto
2020/597 (PDF ) Bitstream Modification of Trivium Kalle Ngo, Elena Dubrova, Michail Moraitis
2020/596 (PDF ) Relationships between quantum IND-CPA notions Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Tabia, Dominique Unruh
2020/595 (PDF ) Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption Masahito Ishizaka, Shinsaku Kiyomoto
2020/594 (PDF ) LESS is More: Code-Based Signatures without Syndromes Jean-Francois Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini
2020/593 (PDF ) Alt-Coin Traceability Claire Ye, Chinedu Ojukwu, Anthony Hsu, Ruiqi Hu
2020/592 (PDF ) SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh
2020/591 (PDF ) Automatic Verification of Differential Characteristics: Application to Reduced Gimli (Full Version) Fukang Liu, Takanori Isobe, Willi Meier
2020/590 (PDF ) Expected Constant Round Byzantine Broadcast under Dishonest Majority Jun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas
2020/589 (PDF ) Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity Mykhailo Kasianchuk, Mikolaj Karpinski, Roman Kochan, Volodymyr Karpinskyi, Grzegorz Litawa, Inna Shylinska, Igor Yakymenko
2020/588 (PDF ) Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS ZaHyun Koo, Jong-Seon No, Young-Sik Kim
2020/587 (PDF ) MoniPoly---An Expressive $q$-SDH-Based Anonymous Attribute-Based Credential System Syh-Yuan Tan, Thomas Gross
2020/586 (PDF ) Component-Based Comparison of Privacy-First Exposure Notification Protocols Ellie Daw
2020/585 (PDF ) Improving Key Mismatch Attack on NewHope with Fewer Queries Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi
2020/584 (PDF ) vCNN: Verifiable Convolutional Neural Network based on zk-SNARKs Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh
2020/583 (PDF ) A New Targeted Password Guessing Model Xie Zhijie, Zhang Min, Yin Anqi, Li Zhenhan
2020/582 (PDF ) Risk and Architecture factors in Digital Exposure Notification Archanaa S. Krishnan, Yaling Yang, Patrick Schaumont
2020/581 (PDF ) The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency Benny Applebaum, Eliran Kachlon, Arpita Patra
2020/580 (PDF ) TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation Alexei Zamyatin, Zeta Avarikioti, Daniel Perez, William J. Knottenbelt
2020/579 (PDF ) BitFund: A Benevolent Blockchain Funding Network Darrow R Hartman
2020/578 (PDF ) HyperService: Interoperability and Programmability Across Heterogeneous Blockchains Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu
2020/577 (PDF ) Inner-Product Functional Encryption with Fine-Grained Access Control Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu
2020/576 (PDF ) How Low Can We Go? Yuval Ishai
2020/575 (PDF ) From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption Sanjit Chatterjee, R. Kabaleeshwaran
2020/574 (PDF ) Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization Ming Li, Jian Weng, Anjia Yang, Jiasi Weng, Yue Zhang
2020/573 (PDF ) Quantifying the Security Cost of Migrating Protocols to Practice Christopher Patton, Thomas Shrimpton
2020/572 (PDF ) HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms) Marina Polubelova, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche, Aymeric Fromherz, Natalia Kulatova, Santiago Zanella-Béguelin
2020/571 (PDF ) Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers (Extended Version) Anubhab Baksi, Jakub Breier, Yi Chen, Xiaoyang Dong
2020/570 (PDF ) On Optimality of d + 1 TI Shared Functions of 8 Bits or Less Dušan Božilov
2020/569 (PDF ) QA-NIZK Arguments of Same Opening for Bilateral Commitments Carla Ràfols, Javier Silva
2020/568 (PDF ) Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy) Tomer Ashur, Siemen Dhooghe
2020/567 (PDF ) An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster Yi Liu, Qi Wang, Siu-Ming Yiu
2020/566 (PDF ) Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain Auqib Hamid Lone, Roohie Naaz
2020/565 (PDF ) Homomorphic Computation in Reed-Muller Codes Jinkyu Cho, Young-Sik Kim, Jong-Seon No
2020/564 (PDF ) Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2020/563 (PDF ) Secure large-scale genome-wide association studies using homomorphic encryption Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Shafi Goldwasser
2020/562 (PDF ) The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure Hocheol Shin, Juhwan Noh, Dohyun Kim, Yongdae Kim
2020/561 (PDF ) Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks Fukang Liu, Takanori Isobe, Willi Meier
2020/560 (PDF ) Zerojoin: Combining Zerocoin and CoinJoin Alexander Chepurnoy, Amitabh Saxena
2020/559 (PDF ) PIVOT: PrIVate and effective cOntact Tracing Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa
2020/558 (PDF ) BSPL: Balanced Static Power Logic Bijan Fadaeinia, Thorben Moos, Amir Moradi
2020/557 (PDF ) On the sensitivity of some APN permutations to swapping points Lilya Budaghyan, Nikolay Kaleyski, Constanza Riera, Pantelimon Stanica
2020/556 (PDF ) Kerckhoffs' Legacy Jean-Claude Caraco, Rémi Géraud-Stewart, David Naccache
2020/555 (PDF ) Splitting Payments Locally While Routing Interdimensionally Lisa Eckey, Sebastian Faust, Kristina Hostáková, Stefanie Roos
2020/554 (PDF ) Bitcoin-Compatible Virtual Channels Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi
2020/553 (PDF ) Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang
2020/552 (PDF ) High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function Joon-Woo Lee, Eunsang Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No
2020/551 (PDF ) Higher Order Differential Attack against Full-Round BIG Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko
2020/550 (PDF ) Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation Ruiyu Zhu, Changchang Ding, Yan Huang
2020/549 (PDF ) Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
2020/548 (PDF ) Blockchain Stealth Address Schemes Gary Yu
2020/547 (PDF ) Finding Bit-Based Division Property for Ciphers with Complex Linear Layer Kai Hu, Qingju Wang, Meiqin Wang
2020/546 (PDF ) MixColumns Coefficient Property and Security of the AES with A Secret S-Box Xin An, Kai Hu, Meiqin Wang
2020/545 (PDF ) Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security Ran Canetti, Pratik Sarkar, Xiao Wang
2020/544 (PDF ) SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis Okan Seker, Sebastian Berndt, Luca Wilke, Thomas Eisenbarth
2020/543 (PDF ) Kachina - Foundations of Private Smart Contracts Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
2020/542 (PDF ) Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2020/541 (PDF ) There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging Benjamin Dowling, Britta Hale
2020/540 (PDF ) One Round Threshold ECDSA with Identifiable Abort Rosario Gennaro, Steven Goldfeder
2020/539 (PDF ) On the Concrete Security of LWE with Small Secret Hao Chen, Lynn Chua, Kristin Lauter, Yongsoo Song
2020/538 (PDF ) Rotational Cryptanalysis on MAC Algorithm Chaskey Liliya Kraleva, Tomer Ashur, Vincent Rijmen
2020/537 (PDF ) TARDIS: A Foundation of Time-Lock Puzzles in UC Carsten Baum, Bernardo David, Rafael Dowsley, Jesper Buus Nielsen, Sabine Oechsner
2020/536 (PDF ) Influence of the Linear Layer on the Algebraic Degree in SP-Networks Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
2020/535 (PDF ) Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu
2020/534 (PDF ) Post-quantum TLS without handshake signatures Peter Schwabe, Douglas Stebila, Thom Wiggers
2020/533 (PDF ) Anonymous Lottery in the Proof-of-Stake Setting Foteini Baldimtsi, Varun Madathil, Alessandra Scafuro, Linfeng Zhou
2020/532 (PDF ) Promise: Leveraging Future Gains for Collateral Reduction Dominik Harz, Lewis Gudgeon, Rami Khalil, Alexei Zamyatin
2020/531 (PDF ) Centralized or Decentralized? The Contact Tracing Dilemma Serge Vaudenay
2020/530 (PDF ) Determining the Multiplicative Complexity of Boolean Functions using SAT Mathias Soeken
2020/529 (PDF ) CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs Cas Cremers, Moni Naor, Shahar Paz, Eyal Ronen
2020/528 (PDF ) Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo
2020/527 (PDF ) Aggregatable Subvector Commitments for Stateless Cryptocurrencies Alin Tomescu, Ittai Abraham, Vitalik Buterin, Justin Drake, Dankrad Feist, Dmitry Khovratovich
2020/526 (PDF ) Efficient Montgomery-like formulas for general Huff's and Huff's elliptic curves and their applications to the isogeny-based cryptography Robert Dryło, Tomasz Kijko, Michał Wroński
2020/525 (PDF ) Account Management in Proof of Stake Ledgers Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira
2020/524 (PDF ) Efficient Signatures on Randomizable Ciphertexts Balthazar Bauer, Georg Fuchsbauer
2020/523 (PDF ) Generalized Matsui Algorithm 1 with application for the full DES Tomer Ashur, Raluca Posteuca, Danilo Šijačić, Stef D’haeseleer
2020/522 (PDF ) Privately Connecting Mobility to Infectious Diseases via Applied Cryptography Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch
2020/521 (PDF ) MP-SPDZ: A Versatile Framework for Multi-Party Computation Marcel Keller
2020/520 (PDF ) MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation Yarkın Doröz, Jeffrey Hoffstein, Joseph H. Silverman, Berk Sunar
2020/519 (PDF ) Optimally-secure Coin-tossing against a Byzantine Adversary Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang
2020/518 (PDF ) Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings Muhammed F. Esgin, Ngoc Khanh Nguyen, Gregor Seiler
2020/517 (PDF ) Practical Product Proofs for Lattice Commitments Thomas Attema, Vadim Lyubashevsky, Gregor Seiler
2020/516 (PDF ) POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers Mordechai Guri
2020/515 (PDF ) On a hybrid approach to solve small secret LWE Thomas Espitau, Antoine Joux, Natalia Kharchenko
2020/514 (PDF ) On the Deployment of curve based cryptography for the Internet of Things Michael Scott
2020/513 (PDF ) E-cclesia: Universally Composable Self-Tallying Elections Myrto Arapinis, Nikolaos Lamprou, Lenka Mareková, Thomas Zacharias, Léo Ackermann, Pavlos Georgiou
2020/512 (PDF ) Glimpses are Forever in RC4 amidst the Spectre of Biases Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra
2020/511 (PDF ) JaxNet: Scalable Blockchain Network Iurii Shyshatsky, Vinod Manoharan, Taras Emelyanenko, Lucas Leger
2020/510 (PDF ) On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM Nir Drucker, Shay Gueron, Dusan Kostic, Edoardo Persichetti
2020/509 (PDF ) BBB Secure Nonce Based MAC Using Public Permutations Avijit Dutta, Mridul Nandi
2020/508 (PDF ) Augmenting Leakage Detection using Bootstrapping Yuan Yao, Michael Tunstall, Elke De Mulder, Anton Kochepasov, Patrick Schaumont
2020/507 (PDF ) Characteristics of Hadamard square of Reed--Muller subcodes of special type (Extended abstract) Victoria Vysotskaya
2020/506 (PDF ) Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations Sonia Belaïd, Pierre-Evariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff
2020/505 (PDF ) ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy Wasilij Beskorovajnov, Felix Dörre, Gunnar Hartung, Alexander Koch, Jörn Müller-Quade, Thorsten Strufe
2020/504 (PDF ) Storing and Retrieving Secrets on a Blockchain Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song
2020/503 (PDF ) A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder Aaron Hutchinson, Koray Karabina
2020/502 (PDF ) Applying Blockchain Layer2 Technology to Mass E-Commerce Sijia Zhao, Donal O’Mahony
2020/501 (PDF ) Fast Threshold ECDSA with Honest Majority Ivan Damgård, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergård
2020/500 (PDF ) Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer Lorenzo Grassi, Christian Rechberger, Markus Schofnegger
2020/499 (PDF ) Proof-Carrying Data from Accumulation Schemes Benedikt Bünz, Alessandro Chiesa, Pratyush Mishra, Nicholas Spooner
2020/498 (PDF ) Threshold ECDSA for Decentralized Asset Custody Adam Gągol, Jędrzej Kula, Damian Straszak, Michał Świętek
2020/497 (PDF ) Collusion-Preserving Computation without a Mediator Michele Ciampi, Yun Lu, Vassilis Zikas
2020/496 (PDF ) Linear Generalized ElGamal Encryption Scheme Demba Sow, Léo Robert, Pascal Lafourcade
2020/495 (PDF ) Disperse rotation operator DRT and use in some stream ciphers Kim Yong-Jin, Yon Yong-Ho, Jong Yu-Jin, Li Ok-Chol
2020/494 (PDF ) Improved Black-Box Constructions of Composable Secure Computation Rohit Chatterjee, Xiao Liang, Omkant Pandey
2020/493 (PDF ) Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti
2020/492 (PDF ) UC Non-Interactive, Proactive, Threshold ECDSA Ran Canetti, Nikolaos Makriyannis, Udi Peled
2020/491 (PDF ) Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic Hilder Vitor Lima Pereira
2020/490 (PDF ) SoK: Techniques for Verifiable Mix Nets Thomas Haines, Johannes Mueller
2020/489 (PDF ) Pandemic Contact Tracing Apps: DP-3T, PEPP-PT NTK, and ROBERT from a Privacy Perspective Fraunhofer AISEC
2020/488 (PDF ) Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption Yongwoo Lee, Joonwoo Lee, Young-Sik Kim, Jong-Seon No
2020/487 (PDF ) Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
2020/486 (PDF ) Rotational-XOR Cryptanalysis of Simon-like Block Ciphers Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li
2020/485 (PDF ) Edwards curve points counting method and supersingular Edwards and Montgomery curves Ruslan V. Skuratovskii
2020/484 (PDF ) Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions Aaqib Bashir Dar, Auqib Hamid Lone, Saniya Zahoor, Afshan Amin Khan, Roohie Naaz
2020/483 (PDF ) On Ideal and Weakly-Ideal Access Structures Reza Kaboli, Shahram Khazaei, Maghsoud Parviz
2020/482 (PDF ) A Trace Based $GF(2^n)$ Inversion Algorithm Haining Fan
2020/481 (PDF ) Using z14 Fused-Multiply-Add Instructions to Accelerate Elliptic Curve Cryptography James You, Qi Zhang, Curtis D'Alves, Bill O'Farrell, Christopher K. Anand
2020/480 (PDF ) Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Evaluation Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
2020/479 (PDF ) Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRF Tapas Pal, Ratna Dutta
2020/478 (PDF ) Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li
2020/477 (PDF ) Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More Essam Ghadafi
2020/476 (PDF ) Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostakova, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi
2020/475 (PDF ) Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews Zachary Zaccagni, Ram Dantu
2020/474 (PDF ) Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model Karim Baghery, Mahdi Sedaghat
2020/473 (PDF ) Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing Ashutosh Kumar, Raghu Meka, David Zuckerman
2020/471 (PDF ) Interpose PUF can be PAC Learned Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2020/470 (PDF ) LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4 Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stoettinger
2020/469 (PDF ) Dedicated Security Chips in the Age of Secure Enclaves Kari Kostiainen, Aritra Dhar, Srdjan Capkun
2020/468 (PDF ) Distributed Auditing Proofs of Liabilities Konstantinos Chalkias, Kevin Lewi, Payman Mohassel, Valeria Nikolaenko
2020/467 (PDF ) Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang
2020/466 (PDF ) Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks Pantea Kiaei, Darius Mercadier, Pierre-Evariste Dagand, Karine Heydemann, Patrick Schaumont
2020/465 (PDF ) Domain-Oriented Masked Instruction Set Architecture for RISC-V Pantea Kiaei, Patrick Schaumont
2020/464 (PDF ) Can a Public Blockchain Keep a Secret? Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin
2020/463 (PDF ) Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi
2020/462 (PDF ) An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption Ido Shahaf, Or Ordentlich, Gil Segev
2020/461 (PDF ) A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem Jean-Sébastien Coron, Agnese Gini
2020/460 (PDF ) A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption Marloes Venema, Greg Alpár
2020/459 (PDF ) Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations Debdeep Mukhopadhyay
2020/458 (PDF ) On the Optimality of Optimistic Responsiveness Ittai Abraham, Kartik Nayak, Ling Ren, Nibesh Shrestha
2020/457 (PDF ) Cryptographic Scheme for analyzing protected files on Sandboxes and share them privately Ahmad Almorabea
2020/456 (PDF ) General Congestion Attack on HTLC-Based Payment Channel Networks Zhichun Lu, Runchao Han, Jiangshan Yu
2020/455 (PDF ) Cryptanalysis of LEDAcrypt Daniel Apon, Ray Perlner, Angela Robinson, Paolo Santini
2020/454 (PDF ) Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification Thomas Pornin
2020/453 (PDF ) BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein F. Betül Durak, Loïs Huguenin-Dumittan, Serge Vaudenay
2020/452 (PDF ) Almost Public Quantum Coins Amit Behera, Or Sattath
2020/451 (PDF ) Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning Hao Chen, Miran Kim, Ilya Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh
2020/450 (PDF ) The Landscape of Pointcheval-Sanders Signatures: Mapping to Polynomial-Based Signatures and Beyond Kristian L. McDonald
2020/449 (PDF ) Switched Threshold Signatures from K-Private PolyShamir Secret Sharing Kristian L. McDonald
2020/448 (PDF ) Partial Secret Sharing Schemes Amir Jafari, Shahram Khazaei
2020/446 (PDF ) RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography Tim Fritzmann, Georg Sigl, Johanna Sepúlveda
2020/445 (PDF ) On Pseudorandom Encodings Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai
2020/444 (PDF ) A modern signature scheme with message recovery: Abe--Okamoto signatures with EdDSA elements Satō Shinichi
2020/443 (PDF ) A White-Box Masking Scheme Resisting Computational and Algebraic Attacks Okan Seker, Thomas Eisenbarth, Maciej Liskiewicz
2020/442 (PDF ) Fine-Grained Cryptography: A New Frontier? Alon Rosen
2020/441 (PDF ) Modeling for Three-Subset Division Property without Unknown Subset Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang
2020/440 (PDF ) Sublattice Attack on Poly-LWE with Wide Error Distributions Hao Chen
2020/439 (PDF ) The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
2020/438 (PDF ) Fast hybrid Karatsuba multiplier for Type II pentanomials Yin Li, Yu Zhang, Wei He
2020/437 (PDF ) Faster Montgomery and double-add ladders for short Weierstrass curves Mike Hamburg
2020/436 (PDF ) Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification Houssem Maghrebi
2020/435 (PDF ) WAGE: An Authenticated Encryption with a Twist Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit
2020/434 (PDF ) High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware Sujoy Sinha Roy, Andrea Basso
2020/433 (PDF ) zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays Martin Westerkamp, Jacob Eberhardt
2020/432 (PDF ) From A to Z: Projective coordinates leakage in the wild Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley
2020/431 (PDF ) x-only point addition formula and faster compressed SIKE Geovandro Pereira, Javad Doliskani, David Jao
2020/430 (PDF ) Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures Aram Jivanyan, Tigran Mamikonyan
2020/429 (PDF ) Mathematics and Cryptography: A Marriage of Convenience? Alice Silverberg
2020/428 (PDF ) Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc. Yaron Gvili
2020/427 (PDF ) Improving the Performance of the Picnic Signature Scheme Daniel Kales, Greg Zaverucha
2020/426 (PDF ) Privacy-Preserving Contact Tracing: current solutions and open questions Qiang Tang
2020/425 (PDF ) Friet: An Authenticated Encryption Scheme with Built-in Fault Detection Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel
2020/424 (PDF ) Low-gate Quantum Golden Collision Finding Samuel Jaques, André Schrottenloher
2020/423 (PDF ) On One-way Functions and Kolmogorov Complexity Yanyi Liu, Rafael Pass
2020/422 (PDF ) Pattern Matching on Encrypted Data Anis Bkakria, Nora Cuppens, Frédéric Cuppens
2020/420 (PDF ) Practical Card-Based Protocol for Three-Input Majority Kenji Yasunaga
2020/419 (PDF ) Pointproofs: Aggregating Proofs for Multiple Vector Commitments Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang
2020/418 (PDF ) Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing Krzysztof Pietrzak
2020/417 (PDF ) Optimal strategies for CSIDH Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
2020/416 (PDF ) The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-Rewinding Proofs for Schnorr Identification and Signatures Mihir Bellare, Wei Dai
2020/415 (PDF ) Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE Shweta Agrawal, Alice Pellet-Mary
2020/414 (PDF ) Semi-Quantum Money Roy Radian, Or Sattath
2020/413 (PDF ) Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks Louis Goubin, Matthieu Rivain, Junwei Wang
2020/412 (PDF ) Fixslicing: A New GIFT Representation Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin
2020/411 (PDF ) Secure Two-Party Computation in a Quantum World Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, Patrick Struck
2020/410 (PDF ) Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4 Hwajeong Seo, Mila Anastasova, Amir Jalali, Reza Azarderakhsh
2020/409 (PDF ) Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes Loïs Huguenin-Dumittan, Serge Vaudenay
2020/408 (PDF ) Speed up over the Rainbow Nir Drucker, Shay Gueron
2020/407 (PDF ) Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection Aydin Abadi, Sotirios Terzis, Changyu Dong
2020/406 (PDF ) Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience Atsuki Momose, Jason Paul Cruz, Yuichi Kaji
2020/405 (PDF ) Ordinos: A Verifiable Tally-Hiding E-Voting System Ralf Kuesters, Julian Liedtke, Johannes Mueller, Daniel Rausch, Andreas Vogt
2020/404 (PDF ) From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards Tassos Dimitriou
2020/403 (PDF ) Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes David Derler, Kai Samelin, Daniel Slamanig
2020/402 (PDF ) A Note on Low Order Assumptions in RSA groups István András Seres, Péter Burcsi
2020/401 (PDF ) Mining for Privacy: How to Bootstrap a Snarky Blockchain Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
2020/400 (PDF ) Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis Jeroen Delvaux
2020/399 (PDF ) Analysis of DP3T Serge Vaudenay
2020/398 (PDF ) CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures Samuel Brack, Leonie Reichert, Björn Scheuermann
2020/397 (PDF ) Classification of 4-bit S-boxes for BOGI-permutation Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
2020/396 (PDF ) Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing Donggeun Kwon, HeeSeok Kim, Seokhie Hong
2020/395 (PDF ) Cryptography from Information Loss Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod Vaikuntanathan, Prashant Nalini Vasudevan
2020/394 (PDF ) Candidate iO from Homomorphic Encryption Schemes Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
2020/393 (PDF ) LevioSA: Lightweight Secure Arithmetic Computation Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam
2020/392 (PDF ) An argument on the security of LRBC, a recently proposed lightweight block cipher Sadegh Sadeghi, Nasour Bagheri
2020/391 (PDF ) Optimized CSIDH Implementation Using a 2-torsion Point Donghoe Heo, Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
2020/390 (PDF ) A French cipher from the late 19th century Rémi Géraud-Stewart, David Naccache
2020/389 (PDF ) A Unary Cipher with Advantages over the Vernam Cipher Gideon Samid
2020/388 (PDF ) Fast 4 way vectorized ladder for the complete set of Montgomery curves Huseyin Hisil, Berkan Egrice, Mert Yassi
2020/387 (PDF ) Low-complexity and Reliable Transforms for Physical Unclonable Functions Onur Gunlu, Rafael F. Schaefer
2020/386 (PDF ) Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric Ralf Kuesters, Daniel Rausch, Mike Simon
2020/385 (PDF ) Two-Sided Malicious Security for Private Intersection-Sum with Cardinality Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung
2020/384 (PDF ) A ”Final” Security Bug Nguyen Thoi Minh Quan
2020/383 (PDF ) Parallel strategies for SIDH: Towards computing SIDH twice as fast Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
2020/382 (PDF ) Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks
2020/381 (PDF ) Proof-of-Reputation Blockchain with Nakamoto Fallback Leonard Kleinrock, Rafail Ostrovsky, Vassilis Zikas
2020/380 (PDF ) Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopdhyay
2020/379 (PDF ) Post-quantum WireGuard Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Fiona Johanna Weber, Philip R. Zimmermann
2020/378 (PDF ) Efficient 4-way Vectorizations of the Montgomery Ladder Kaushik Nath, Palash Sarkar
2020/377 (PDF ) Oblivious tight compaction in O(n) time with smaller constant Samuel Dittmer, Rafail Ostrovsky
2020/376 (PDF ) On the privacy of a code-based single-server computational PIR scheme Sarah Bordage, Julien Lavauzelle
2020/375 (PDF ) Privacy-Preserving Contact Tracing of COVID-19 Patients Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/374 (PDF ) Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, abhi shelat, Muthu Venkitasubramaniam, Ruihan Wang
2020/373 (PDF ) Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES Huanyu Wang, Elena Dubrova
2020/372 (PDF ) Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions Claude Carlet
2020/371 (PDF ) Single-Trace Attacks on Keccak Matthias J. Kannwischer, Peter Pessl, Robert Primas
2020/370 (PDF ) Multiparty Generation of an RSA Modulus Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, abhi shelat
2020/369 (PDF ) The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs David Knichel, Thorben Moos, Amir Moradi
2020/368 (PDF ) Defeating NewHope with a Single Trace Dorian Amiet, Andreas Curiger, Lukas Leuenberger, Paul Zbinden
2020/367 (PDF ) Exploiting Decryption Failures in Mersenne Number Cryptosystems Marcel Tiepelt, Jan-Pieter D'Anvers
2020/366 (PDF ) FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection Hangwei Lu, Dhwani Mehta, Olivia Paradis, Navid Asadizanjani, Mark Tehranipoor, Damon L. Woodard
2020/365 (PDF ) A New Algorithm to Find Monic Irreducible Polynomials over Extended Galois field GF prime p and extension q using Positional Arithmetic Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/364 (PDF ) Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs Behzad Abdolmaleki, Daniel Slamanig
2020/363 (PDF ) On equivalence between known polynomial APN functions and power APN functions Qianhong Wan, Longjiang Qu, Chao Li
2020/361 (PDF ) How Not to Create an Isogeny-Based PAKE Reza Azarderakhsh, David Jao, Brian Koziel, Jason T. LeGrow, Vladimir Soukharev, Oleg Taraskin
2020/360 (PDF ) Composite Algorithm The New Algorithm to Search for Monic Irreducible Polynomials over Extended Galois Fields Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/359 (PDF ) 4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes. Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/358 (PDF ) Division Algorithm to search for monic irreducible polynomials over extended Galois Field GF(p^q). Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/357 (PDF ) Quasigroups and Substitution Permutation Networks: A Failed Experiment George Teseleanu
2020/356 (PDF ) Efficient MPC with a Mixed Adversary Martin Hirt, Marta Mularczyk
2020/355 (PDF ) Permissionless Consensus in the Resource Model Benjamin Terner
2020/352 (PDF ) Mina: Decentralized Cryptocurrency at Scale Joseph Bonneau, Izaak Meckler, Vanishree Rao, Evan Shapiro
2020/351 (PDF ) Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition Youssef El Housni, Aurore Guillevic
2020/350 (PDF ) New Multi-bit Differentials to Improve Attacks Against ChaCha Murilo Coutinho, T. C. Souza Neto
2020/349 (PDF ) Differential Power Analysis on (Non-)Linear Feedback Shift Registers Siang Meng Sim
2020/348 (PDF ) Constructing hidden order groups using genus three Jacobians Steve Thakur
2020/347 (PDF ) Some Low Round Zero Knowledge Protocols Hongda Li, Peifang Ni, Dongxue Pan
2020/346 (PDF ) Algebraic Attacks on Round-Reduced Keccak/Xoodoo Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang
2020/345 (PDF ) Bent functions stemming from Maiorana-McFarland class being provably outside its completed version Fengrong Zhangand, Nastja Cepak, Enes Pasalic, Yongzhuang Wei
2020/344 (PDF ) Anchoring the Value of Cryptocurrency Yibin Xu, Yangyu Huang, Jianhua Shao
2020/343 (PDF ) BSC: A Bitcoin Smart Contract Implementation Hiro Midas
2020/342 (PDF ) Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge Estuardo Alpirez Bock, Alexander Treff
2020/341 (PDF ) Faster computation of isogenies of large prime degree Daniel J. Bernstein, Luca De Feo, Antonin Leroux, Benjamin Smith
2020/340 (PDF ) Differential Privacy for Eye Tracking with Temporal Correlations Efe Bozkir, Onur Gunlu, Wolfgang Fuhl, Rafael F. Schaefer, Enkelejda Kasneci
2020/339 (PDF ) Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics George Teseleanu
2020/338 (PDF ) Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits Daniel Escudero, Satrajit Ghosh, Marcel Keller, Rahul Rachuri, Peter Scholl
2020/337 (PDF ) Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter
2020/336 (PDF ) Gimli Encryption in 715.9 psec Santosh Ghosh, Michael Kounavis, Sergej Deutsch
2020/335 (PDF ) An n/2 byzantine node tolerated blockchain sharding approach Yibin Xu, Yangyu Huang
2020/334 (PDF ) 4-Uniform Permutations with Null Nonlinearity Christof Beierle, Gregor Leander
2020/332 (PDF ) Implementation Study of Two Verifiable Delay Functions Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2020/331 (PDF ) The CTR mode with encrypted nonces and its extension to AE Sergey Agievich
2020/330 (PDF ) Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective Gil Segev, Ido Shahaf
2020/329 (PDF ) Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot
2020/328 (PDF ) Weight-Based Nakamoto-Style Blockchains Simon Holmgaard Kamp, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi
2020/327 (PDF ) On the design of stream ciphers with Cellular Automata having radius = 2 Anita John, Rohit Lakra, Jimmy Jose
2020/326 (PDF ) An upper bound on the decryption failure rate of static-key NewHope John M. Schanck
2020/325 (PDF ) SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts Robert Muth, Florian Tschorsch
2020/324 (PDF ) Defeating CAS-Unlock Bicky Shakya, Xiaolin Xu, Mark Tehranipoor, Domenic Forte
2020/323 (PDF ) A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos
2020/322 (PDF ) Optimal and Error-Free Multi-Valued Byzantine Consensus Through Parallel Execution Andrew Loveless, Ronald Dreslinski, Baris Kasikci
2020/321 (PDF ) Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism Jose Maria Bermudo Mera, Furkan Turan, Angshuman Karmakar, Sujoy Sinha Roy, Ingrid Verbauwhede
2020/320 (PDF ) Universally Composable Relaxed Password Authenticated Key Exchange Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu
2020/319 (PDF ) Secure k-ish nearest neighbors classifier Hayim Shaul, Dan Feldman, Daniela Rus
2020/318 (PDF ) Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL Huijia Lin, Ji Luo
2020/317 (PDF ) Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure Archisman Ghosh, Debayan Das, Shreyas Sen
2020/316 (PDF ) Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions Rishab Goyal, Sam Kim, Brent Waters, David J. Wu
2020/315 (PDF ) plookup: A simplified polynomial protocol for lookup tables Ariel Gabizon, Zachary J. Williamson
2020/314 (PDF ) Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi
2020/313 (PDF ) Security analysis of SPAKE2+ Victor Shoup
2020/311 (PDF ) A Blockchain Traceable Scheme with Oversight Function Tianjun Ma, Haixia Xu, Peili Li
2020/310 (PDF ) Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis Gabriel Destouet, Cécile Dumas, Anne Frassati, Valérie Perrier
2020/309 (PDF ) Cryptanalysis Results on Spook Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher
2020/308 (PDF ) Post-Quantum TLS on Embedded Systems Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, Michael Schneider
2020/307 (PDF ) Handling vectorial functions by means of their graph indicators Claude Carlet
2020/306 (PDF ) Leakage Assessment in Fault Attacks: A Deep Learning Perspective Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta
2020/305 (PDF ) 3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Masahito Gotaishi, Kou Shikata, Koji Sasaki, Nobuharu Suzuki, Masaki Hashiyada
2020/304 (PDF ) Multiparty Homomorphic Encryption from Ring-Learning-With-Errors Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Philippe Bossuat, Jean-Pierre Hubaux
2020/303 (PDF ) A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network Sergei Tikhomirov, Pedro Moreno-Sanchez, Matteo Maffei
2020/302 (PDF ) Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers Thomas Kaeding
2020/301 (PDF ) MadHatter: A toy cipher that conceals two plaintexts in the same ciphertext Thomas Kaeding
2020/300 (PDF ) Secure Multiparty Computation (MPC) Yehuda Lindell
2020/299 (PDF ) Hydra: Fast Isomorphic State Channels Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell
2020/298 (PDF ) Fast polynomial inversion for post quantum QC-MDPC cryptography Nir Drucker, Shay Gueron, Dusan Kostic
2020/297 (PDF ) Random Self-reducibility of Ideal-SVP via Arakelov Random Walks Koen de Boer, Léo Ducas, Alice Pellet-Mary, Benjamin Wesolowski
2020/296 (PDF ) Multidimensional Database Reconstruction from Range Query Access Patterns Akshima, David Cash, Francesca Falzon, Adam Rivkin, Jesse Stern
2020/295 (PDF ) Generalized Isotopic Shift Construction for APN Functions Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert Coulter, Irene Villa
2020/294 (PDF ) Public-Key Generation with Verifiable Randomness Olivier Blazy, Patrick Towa, Damien Vergnaud
2020/293 (PDF ) Many-out-of-Many Proofs and Applications to Anonymous Zether Benjamin E. Diamond
2020/292 (PDF ) LWE with Side Information: Attacks and Concrete Security Estimation Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi
2020/290 (PDF ) Linear Cryptanalysis of Reduced-Round SIMON Using Super Rounds Reham Almukhlifi, Poorvi Vora
2020/289 (PDF ) The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves Jonathan Lee
2020/288 (PDF ) Secure Key-Alternating Feistel Ciphers Without Key Schedule Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai
2020/287 (PDF ) Private resource allocators and their applications Sebastian Angel, Sampath Kannan, Zachary Ratliff
2020/286 (PDF ) Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages Geoffroy Couteau, Dominik Hartmann
2020/285 (PDF ) Improved Security Bounds for Generalized Feistel Networks Yaobin Shen, Chun Guo, Lei Wang
2020/284 (PDF ) Database Reconstruction Attacks in Two Dimensions Evangelia Anna Markatou, Roberto Tamassia
2020/283 (PDF ) CryptoWills: How to Bequeath Cryptoassets István András Seres, Omer Shlomovits, Pratyush Ranjan Tiwari
2020/282 (PDF ) The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More Jelle Don, Serge Fehr, Christian Majenz
2020/281 (PDF ) Privacy-friendly Monero transaction signing on a hardware wallet, extended version Dusan Klinec Vashek Matyas
2020/280 (PDF ) Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions Juliane Krämer, Patrick Struck
2020/279 (PDF ) Impact of System-on-Chip Integration of AEAD Ciphers Shashank Raghuraman, Leyla Nazhandali
2020/278 (PDF ) MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs Ahmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song
2020/277 (PDF ) How Does Satoshi Set His Clock? Full Analysis of Nakamoto Consensus Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
2020/276 (PDF ) CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware Hamid Nejatollahi, Saransh Gupta, Mohsen Imani, Tajana Simunic Rosing, Rosario Cammarota, Nikil Dutt
2020/275 (PDF ) Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz
2020/274 (PDF ) An Optimal Relational Database Encryption Scheme Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao
2020/273 (PDF ) On the Fast Algebraic Immunity of Threshold Functions Pierrick Méaux
2020/272 (PDF ) Privacy-Preserving Fast and Exact Linear Equations Solver with Fully Homomorphic Encryption Keita Arimitsu, Kazuki Otsuka
2020/271 (PDF ) Signatures from Sequential-OR Proofs Marc Fischlin, Patrick Harasser, Christian Janson
2020/270 (PDF ) Practical Predicate Encryption for Inner Product Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
2020/269 (PDF ) Order-Fairness for Byzantine Consensus Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels
2020/268 (PDF ) Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography Jose Maria Bermudo Mera, Angshuman Karmakar, Ingrid Verbauwhede
2020/267 (PDF ) Differential Power Analysis of the Picnic Signature Scheme Tim Gellersen, Okan Seker, Thomas Eisenbarth
2020/266 (PDF ) Quantum Indistinguishability for Public Key Encryption Tommaso Gagliardoni, Juliane Krämer, Patrick Struck
2020/265 (PDF ) New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More Benoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu
2020/264 (PDF ) Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi
2020/263 (PDF ) FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups Jihoon Kwon, Byeonghak Lee, Jooyoung Lee, Dukjae Moon
2020/262 (PDF ) A Note on the Ending Elliptic Curve in SIDH Christopher Leonardi
2020/261 (PDF ) Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk
2020/260 (PDF ) Lattice-based (Partially) Blind Signature without Restart Samuel Bouaziz-Ermann, Sébastien Canard, Gautier Eberhart, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré
2020/259 (PDF ) Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
2020/258 (PDF ) NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations Zvika Brakerski, Venkata Koppula, Tamer Mour
2020/257 (PDF ) Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication Onur Gunlu, Rafael F. Schaefer, H. Vincent Poor
2020/256 (PDF ) Statistical ZAPR Arguments from Bilinear Maps Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
2020/255 (PDF ) Novel Deception Techniques for Malware Detection on Industrial Control Systems Takanori Machida, Dai Yamamoto, Yuki Unno, Hisashi Kojima
2020/254 (PDF ) Formalizing Data Deletion in the Context of the Right to be Forgotten Sanjam Garg, Shafi Goldwasser, Prashant Nalini Vasudevan
2020/253 (PDF ) Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing Hemanta K. Maji, Mingyuan Wang
2020/252 (PDF ) Secure Non-interactive Simulation: Feasibility & Rate Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen
2020/251 (PDF ) Communication Lower Bounds for Perfect Maliciously Secure MPC Ivan Damgård, Nikolaj I. Schwartzbach
2020/250 (PDF ) On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations Ehsan Aerabi, Athanasios Papadimitriou, David Hely
2020/248 (PDF ) Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast Ittai Abraham, Benny Pinkas, Avishay Yanai
2020/246 (PDF ) Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography Jing Tian, Jun Lin, Zhongfeng Wang
2020/245 (PDF ) New Assumptions and Efficient Cryptosystems from the $e$-th Power Residue Symbol Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu
2020/244 (PDF ) On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper
2020/243 (PDF ) An Analysis of Hybrid Public Key Encryption Benjamin Lipp
2020/241 (PDF ) Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability Mihir Bellare, Hannah Davis, Felix Günther
2020/240 (PDF ) MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture T-H. Hubert Chan, Kai-Min Chung, Wei-Kai Lin, Elaine Shi
2020/239 (PDF ) Viktoria: A new Paradigm for Hash Functions Edimar Veríssimo
2020/238 (PDF ) Efficient ECM factorization in parallel with the Lyness map Andrew Hone
2020/237 (PDF ) On Security Notions for Encryption in a Quantum World Céline Chevalier, Ehsan Ebrahimi, Quoc-Huy Vu
2020/236 (PDF ) Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21 Mridul Nandi
2020/235 (PDF ) Statistical Zaps and New Oblivious Transfer Protocols Vipul Goyal, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
2020/234 (PDF ) Application of commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups to Key Exchange Protocol Ruslan V. Skuratovskii, Aled Williams
2020/233 (PDF ) Key-Homomorphic Pseudorandom Functions from LWE with a Small Modulus Sam Kim
2020/232 (PDF ) Combiners for AEAD Bertram Poettering, Paul Rösler
2020/231 (PDF ) Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions Nuttapong Attrapadung, Junichi Tomida
2020/230 (PDF ) Lattice analysis on MiNTRU problem Changmin Lee, Alexandre Wallet
2020/229 (PDF ) Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications Itai Dinur
2020/228 (PDF ) Optimal Broadcast Encryption from Pairings and LWE Shweta Agrawal, Shota Yamada
2020/227 (PDF ) About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10 Yindong Chen, Limin Lin, Chuliang Wei
2020/226 (PDF ) Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol Meher Krishna Duggirala, Ravi Duggirala, Krishna Subba Rao Pulugurtha
2020/225 (PDF ) Generic-Group Delay Functions Require Hidden-Order Groups Lior Rotem, Gil Segev, Ido Shahaf
2020/224 (PDF ) Security under Message-Derived Keys: Signcryption in iMessage Mihir Bellare, Igors Stepanovs
2020/223 (PDF ) Compact NIZKs from Standard Assumptions on Bilinear Maps Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2020/222 (PDF ) Improving Speed and Security in Updatable Encryption Schemes Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih
2020/221 (PDF ) Multiparty Reusable Non-Interactive Secure Computation Fabrice Benhamouda, Huijia Lin
2020/220 (PDF ) Remote Side-Channel Attacks on Anonymous Transactions Florian Tramèr, Dan Boneh, Kenneth G. Paterson
2020/219 (PDF ) Multi-Client Functional Encryption for Separable Functions Michele Ciampi, Luisa Siniscalchi, Hendrik Waldner
2020/218 (PDF ) Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs Ehsan Aerabi, Milad Bohlouli, MohammadHasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, David Hely
2020/217 (PDF ) SynFi: Automatic Synthetic Fingerprint Generation M. Sadegh Riazi, Seyed M. Chavoshian, Farinaz Koushanfar
2020/216 (PDF ) Black-Box Constructions of Bounded-Concurrent Secure Computation Sanjam Garg, Xiao Liang, Omkant Pandey, Ivan Visconti
2020/215 (PDF ) Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption Megumi Ando, Anna Lysyanskaya
2020/214 (PDF ) Thresholdizing HashEdDSA: MPC to the Rescue Charlotte Bonte, Nigel P. Smart, Titouan Tanguy
2020/213 (PDF ) Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound Akinori Hosoyamada, Yu Sasaki
2020/212 (PDF ) Isogenies of certain abelian varieties over finite fields with p-ranks zero Steve Thakur
2020/211 (PDF ) Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2020/210 (PDF ) SITM: See-In-The-Middle--Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim
2020/209 (PDF ) Adaptive Simulation Security for Inner Product Functional Encryption Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu
2020/208 (PDF ) Random Integer Lattice Generation via HNF Gengran Hu, Lin You, Liqin Hu, Hui Wang
2020/207 (PDF ) (Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge Carsten Baum, Bernardo David, Rafael Dowsley
2020/205 (PDF ) SodsBC: A Post-quantum by Design Asynchronous Blockchain Framework Shlomi Dolev, Bingyong Guo, Jianyu Niu, Ziyu Wang
2020/204 (PDF ) Cryptographic Reverse Firewalls for Interactive Proof Systems Chaya Ganesh, Bernardo Magri, Daniele Venturi
2020/203 (PDF ) MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework Thang Hoang, Jorge Guajardo, Attila A. Yavuz
2020/202 (PDF ) Strong Anti-SAT: Secure and Effective Logic Locking Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava
2020/201 (PDF ) A Survey on Neural Trojans Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, Ankur Srivastava
2020/200 (PDF ) Leakage and Tamper Resilient Permutation-Based Cryptography Christoph Dobraunig, Bart Mennink, Robert Primas
2020/199 (PDF ) Improvement on a Masked White-box Cryptographic Implementation Seungkwang Lee, Myungchul Kim
2020/198 (PDF ) MPSign: A Signature from Small-Secret Middle-Product Learning with Errors Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang
2020/197 (PDF ) Dynamic Decentralized Functional Encryption Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2020/196 (PDF ) Trustless unknown-order groups Samuel Dobson, Steven D. Galbraith, Benjamin Smith
2020/195 (PDF ) Replicated state machines without replicated execution Jonathan Lee, Kirill Nikitin, Srinath Setty
2020/194 (PDF ) Adaptively Secure ABE for DFA from k-Lin and More Junqing Gong, Hoeteck Wee
2020/193 (PDF ) PSI from PaXoS: Fast, Malicious Private Set Intersection Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
2020/191 (PDF ) Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE Zvika Brakerski, Vinod Vaikuntanathan
2020/190 (PDF ) Proof of Necessary Work: Succinct State Verification with Fairness Guarantees Assimakis Kattis, Joseph Bonneau
2020/189 (PDF ) Guaranteed Output Delivery Comes Free in Honest Majority MPC Vipul Goyal, Yifan Song, Chenzhi Zhu
2020/188 (PDF ) Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer
2020/187 (PDF ) Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack Dragos Ioan Ilie, William J. Knottenbelt, Iain Stewart
2020/186 (PDF ) Bitcoin Crypto–Bounties for Quantum Capable Adversaries Dragos Ioan Ilie, Kostis Karantias, William J. Knottenbelt
2020/185 (PDF ) Hardware Private Circuits: From Trivial Composition to Full Verification Gaëtan Cassiers, Benjamin Grégoire, Itamar Levi, François-Xavier Standaert
2020/184 (PDF ) Fair and Decentralized Exchange of Digital Goods Ariel Futoransky, Carlos Sarraute, Daniel Fernandez, Matias Travizano, Ariel Waissbein
2020/183 (PDF ) A note on secure multiparty computation via higher residue symbols Ignacio Cascudo, Reto Schnyder
2020/182 (PDF ) An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang
2020/181 (PDF ) $L_1$-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi
2020/180 (PDF ) Multi-key Fully-Homomorphic Encryption in the Plain Model Prabhanjan Ananth, Abhishek Jain, ZhengZhong Jin, Giulio Malavolta
2020/179 (PDF ) Mind the Middle Layer: The HADES Design Strategy Revisited Nathan Keller, Asaf Rosemarin
2020/178 (PDF ) A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device Santosh Ghosh, Luis S Kida, Soham Jayesh Desai, Reshma Lal
2020/177 (PDF ) Revisiting (R)CCA Security and Replay Protection Christian Badertscher, Ueli Maurer, Christopher Portmann, Guilherme Rito
2020/176 (PDF ) Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version) Eugene Frimpong, Alexandros Bakas, Hai-Van Dang, Antonis Michalas
2020/175 (PDF ) Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma Stefan Dziembowski, Grzegorz Fabiański, Sebastian Faust, Siavash Riahi
2020/174 (PDF ) On Selective-Opening Security of Deterministic Primitives Mohammad Zaheri, Adam O'Neill
2020/173 (PDF ) Securing Proof-of-Work Ledgers via Checkpointing Dimitris Karakostas, Aggelos Kiayias
2020/172 (PDF ) Qubit-based Unclonable Encryption with Key Recycling Daan Leermakers, Boris Skoric
2020/171 (PDF ) High Performance Logistic Regression for Privacy-Preserving Genome Analysis Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki
2020/170 (PDF ) Reusable Two-Round MPC from DDH James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee
2020/169 (PDF ) Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE) Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin
2020/168 (PDF ) Improved Classical and Quantum Algorithms for Subset-Sum Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen
2020/167 (PDF ) Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning Jinhyun So, Basak Guler, A. Salman Avestimehr
2020/166 (PDF ) Non Atomic Payment Splitting in Channel Networks Stefan Dziembowski, Paweł Kędzior
2020/165 (PDF ) Subsampling and Knowledge Distillation On Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations Aron Gohr, Sven Jacob, Werner Schindler
2020/164 (PDF ) From discrete-log to lattices: maybe the real lessons were our broken schemes along the way? Alex Bienstock, Allison Bishop, Eli Goldin, Garrison Grogan, Victor Lecomte
2020/163 (PDF ) Impossibility Results for Lattice-Based Functional Encryption Schemes Akin Ünal
2020/162 (PDF ) A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity Ignacio Cascudo, Jaron Skovsted Gundersen
2020/161 (PDF ) Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu, Zhenkai Hu
2020/160 (PDF ) Solving Some Affine Equations over Finite Fields Sihem Mesnager, Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee
2020/159 (PDF ) Privacy-preserving collaborative machine learning on genomic data using TensorFlow Cheng Hong, Zhicong Huang, Wen-jie Lu, Hunter Qu, Li Ma, Morten Dahl, Jason Mancuso
2020/158 (PDF ) Jump index in T-functions for designing a new basic structure of stream ciphers Ali Hadipour, Seyed Mahdi Sajadieh, Raheleh Afifi
2020/157 (PDF ) Multi-Source Non-Malleable Extractors and Applications Vipul Goyal, Akshayaram Srinivasan, Chenzhi Zhu
2020/156 (PDF ) Phantom: An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts Xing Li, Yi Zheng, Kunxian Xia, Tongcheng Sun, John Beyler
2020/155 (PDF ) Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference Yifan Tian, Laurent Njilla, Jiawei Yuan, Shucheng Yu
2020/154 (PDF ) Combiners for Functional Encryption, Unconditionally Aayush Jain, Nathan Manohar, Amit Sahai
2020/153 (PDF ) Constructing Secure Multi-Party Computation with Identifiable Abort Nicholas Brandt, Sven Maier, Tobias Müller, Jörn Müller-Quade
2020/152 (PDF ) Compressed $\Sigma$-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics Thomas Attema, Ronald Cramer
2020/151 (PDF ) Breaking the decisional Diffie-Hellman problem for class group actions using genus theory -- extended version Wouter Castryck, Jana Sotáková, Frederik Vercauteren
2020/150 (PDF ) On the Security of NTS-KEM in the Quantum Random Oracle Model Varun Maram
2020/149 (PDF ) Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage Matteo Campanelli, Dario Fiore, Nicola Greco, Dimitris Kolonelos, Luca Nizzardo
2020/148 (PDF ) Determining the Core Primitive for Optimally Secure Ratcheting Fatih Balli, Paul Rösler, Serge Vaudenay
2020/147 (PDF ) Non-Malleability against Polynomial Tampering Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan
2020/146 (PDF ) Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security Roman Langrehr, Jiaxin Pan
2020/145 (PDF ) Self-Secured PUF: Protecting the Loop PUF by Masking Lars Tebelmann, Jean-Luc Danger, Michael Pehl
2020/144 (PDF ) Double-Base Chains for Scalar Multiplications on Elliptic Curves Wei Yu, Saud Al Musa, Bao Li
2020/143 (PDF ) Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT Hailong Yao, Caifen Wang, Xingbing Fu, Chao Liu, Bin Wu, Fagen Li
2020/142 (PDF ) TARDIGRADE: An Atomic Broadcast Protocol for Arbitrary Network Conditions Erica Blum, Jonathan Katz, Julian Loss
2020/141 (PDF ) Deterministic-Prover Zero-Knowledge Proofs Hila Dahari, Yehuda Lindell
2020/140 (PDF ) PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang
2020/139 (PDF ) Going Beyond Dual Execution: MPC for Functions with Efficient Verification Carmit Hazay, abhi shelat, Muthuramakrishnan Venkitasubramaniam
2020/138 (PDF ) Smart Contract Derivatives Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
2020/137 (PDF ) Consistency for Functional Encryption Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss, Hendrik Waldner
2020/136 (PDF ) Stacked Garbling for Disjunctive Zero-Knowledge Proofs David Heath, Vladimir Kolesnikov
2020/135 (PDF ) Threshold Ring Signatures: New Definitions and Post-Quantum Security Abida Haque, Alessandra Scafuro
2020/134 (PDF ) Malicious Security Comes Free in Honest-Majority MPC Vipul Goyal, Yifan Song
2020/133 (PDF ) Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware Souradyuti Paul, Ananya Shrivastava
2020/132 (PDF ) Boosting Verifiable Computation on Encrypted Data Dario Fiore, Anca Nitulescu, David Pointcheval
2020/131 (PDF ) Coin Tossing with Lazy Defense: Hardness of Computation Results Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang
2020/130 (PDF ) Breaking the $O(\sqrt n)$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party Elette Boyle, Ran Cohen, Aarushi Goel
2020/129 (PDF ) Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security Juliane Krämer, Patrick Struck
2020/128 (PDF ) LegRoast: Efficient post-quantum signatures from the Legendre PRF Ward Beullens, Cyprien Delpech de Saint Guilhem
2020/127 (PDF ) Fifty Shades of Ballot Privacy: Privacy against a Malicious Board Véronique Cortier, Joseph Lallemand, Bogdan Warinschi
2020/126 (PDF ) Public-Key Puncturable Encryption: Modular and Compact Constructions Shi-Feng Sun, Amin Sakzad, Ron Steinfeld, Joseph Liu, Dawu Gu
2020/125 (PDF ) Oblivious Parallel Tight Compaction Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi
2020/124 (PDF ) Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512 Ali El Kaafarani, Shuichi Katsumata, Federico Pintore
2020/123 (PDF ) Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
2020/122 (PDF ) Verifiable Inner Product Encryption Scheme Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan
2020/121 (PDF ) When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead Hao Chen, Ilia Iliashenko, Kim Laine
2020/120 (PDF ) The randomized slicer for CVPP: sharper, faster, smaller, batchier Léo Ducas, Thijs Laarhoven, Wessel P. J. van Woerden
2020/119 (PDF ) Hardness of LWE on General Entropic Distributions Zvika Brakerski, Nico Döttling
2020/118 (PDF ) InfoCommit: Information-Theoretic Polynomial Commitment and Verification Saeid Sahraei, Salman Avestimehr
2020/117 (PDF ) Efficient BIKE Hardware Design with Constant-Time Decoder Andrew Reinders, Rafael Misoczki, Santosh Ghosh, Manoj Sastry
2020/116 (PDF ) Separating Two-Round Secure Computation from Oblivious Transfer Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
2020/115 (PDF ) A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing Xavier Boyen, Thomas Haines, Johannes Mueller
2020/114 (PDF ) A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou
2020/113 (PDF ) New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh, Emmanuel Thome
2020/112 (PDF ) A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography Patrick Karl, Michael Tempelmeier
2020/111 (PDF ) Adaptively Secure Constrained Pseudorandom Functions in the Standard Model Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2020/110 (PDF ) Blazing Fast OT for Three-Round UC OT Extension Ran Canetti, Pratik Sarkar, Xiao Wang
2020/109 (PDF ) Fixing the Achilles Heel of E-Voting: The Bulletin Board Lucca Hirschi, Lara Schmid, David Basin
2020/108 (PDF ) Practical Forgeries for ORANGE Christoph Dobraunig, Florian Mendel, Bart Mennink
2020/107 (PDF ) One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication Ryan Amos, Marios Georgiou, Aggelos Kiayias, Mark Zhandry
2020/106 (PDF ) Relaxed freshness in component authentication Frank Schuhmacher
2020/105 (PDF ) MCU intrinsic group features for component authentication Frank Schuhmacher
2020/104 (PDF ) On the Security Goals of White-Box Cryptography Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels
2020/103 (PDF ) Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128 Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier
2020/102 (PDF ) New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect Boxin Zhao, Xiaoyang Dong, Keting Jia
2020/101 (PDF ) A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future Haibat Khan, Keith M. Martin
2020/100 (PDF ) A direct proof of APN-ness of the Kasami functions Claude Carlet, Kwang Ho Kim, Sihem Mesnager
2020/099 (PDF ) Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson
2020/098 (PDF ) Improved key recovery on the Legendre PRF Novak Kaluđerović, Thorsten Kleinjung, Dusan Kostic
2020/097 (PDF ) Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard Stanislav S. Malakhov
2020/096 (PDF ) Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons David Galindo, Jia Liu, Mihai Ordean, Jin-Mann Wong
2020/095 (PDF ) SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors Zhongxiang Zheng, Anyu Wang, Haining Fan, Chunhuan Zhao, Chao Liu, Xue Zhang
2020/094 (PDF ) On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms Michael Davidson, Tyler Diamond
2020/093 (PDF ) A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials Romain Gay
2020/092 (PDF ) Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees Daniel Jost, Ueli Maurer
2020/091 (PDF ) Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption Jonathan Takeshita, Matthew Schoenbauer, Ryan Karl, Taeho Jung
2020/090 (PDF ) Witness Maps and Applications Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs
2020/089 (PDF ) The MILP-Aided Conditional Differential Attack and Its Application to Trivium Chen-Dong Ye, Tian Tian, Fan-Yang Zeng
2020/088 (PDF ) Streamlet: Textbook Streamlined Blockchains Benjamin Y Chan, Elaine Shi
2020/087 (PDF ) Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey) Elaine Shi
2020/086 (PDF ) Bootstrapping in FHEW-like Cryptosystems Daniele Micciancio, Yuriy Polyakov
2020/085 (PDF ) Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval Elovici
2020/084 (PDF ) Bandwidth-efficient threshold EC-DSA Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2020/083 (PDF ) Metal: A Metadata-Hiding File-Sharing System Weikeng Chen, Raluca Ada Popa
2020/082 (PDF ) Random Walks and Concurrent Zero-Knowledge Anand Aiyer, Xiao Liang, Nilu Nalini, Omkant Pandey
2020/081 (PDF ) Efficient polynomial commitment schemes for multiple points and polynomials Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon
2020/080 (PDF ) Better Secret-Sharing via Robust Conditional Disclosure of Secrets Benny Applebaum, Amos Beimel, Oded Nir, Naty Peter
2020/079 (PDF ) Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
2020/078 (PDF ) Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo Kentaro Tamura, Yutaka Shikano
2020/077 (PDF ) Improved Quantum Circuits for Elliptic Curve Discrete Logarithms Thomas Häner, Samuel Jaques, Michael Naehrig, Martin Roetteler, Mathias Soeken
2020/076 (PDF ) Wyner-Ziv reconciliation for key exchange based on Ring-LWE Charbel Saliba, Laura Luzzi, Cong Ling
2020/075 (PDF ) Memory-Tight Reductions for Practical Key Encapsulation Mechanisms Rishiraj Bhattacharyya
2020/074 (PDF ) Rolling up sleeves when subversion's in a field? Daniel R. L. Brown
2020/073 (PDF ) Anonymous Symmetric-Key Communication Fabio Banfi, Ueli Maurer
2020/072 (PDF ) Anonymous Tokens with Private Metadata Bit Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova
2020/071 (PDF ) Post-Quantum Authentication in TLS 1.3: A Performance Study Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis
2020/070 (PDF ) On Instantiating the Algebraic Group Model from Falsifiable Assumptions Thomas Agrikola, Dennis Hofheinz, Julia Kastner
2020/069 (PDF ) RSA and redactable blockchains Dima Grigoriev, Vladimir Shpilrain
2020/068 (PDF ) Further Clarification on Mantin's Digraph Repetition Bias in RC4 Pranab Chakraborty, Subhamoy Maitra
2020/067 (PDF ) Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse Taylor R Campbell
2020/066 (PDF ) Talek: Private Group Messaging with Hidden Access Patterns Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas Anderson, Arvind Krishnamurthy, Bryan Parno
2020/065 (PDF ) A Performant, Misuse-Resistant API for Primality Testing Jake Massimo, Kenneth G. Paterson
2020/063 (PDF ) Attack on LAC Key Exchange in Misuse Situation Aurelien Greuet, Simon Montoya, Guenael Renault
2020/062 (PDF ) Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig
2020/061 (PDF ) Simple Schnorr Signature with Pedersen Commitment as Key Gary Yu
2020/060 (PDF ) Auditable Asymmetric Password Authenticated Public Key Establishment Antonio Faonio, Maria Isabel Gonzalez Vasco, Claudio Soriente, Hien Thi Thu Truong
2020/059 (PDF ) ARX-KW, a family of key wrapping constructions using SipHash and ChaCha Satō Shinichi
2020/058 (PDF ) Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis Guilherme Perin, Ileana Buhan, Stjepan Picek
2020/057 (PDF ) On the smoothing parameter and last minimum of random orthogonal lattices Elena Kirshanova, Huyen Nguyen, Damien Stehlé, Alexandre Wallet
2020/056 (PDF ) AKCN-E8: Compact and Flexible KEM from Ideal Lattice Zhengzhong JIn, Yunlei Zhao
2020/055 (PDF ) When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA Alejandro Cabrera Aldaya, Billy Bob Brumley
2020/054 (PDF ) Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer
2020/053 (PDF ) Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems" Yasuhiko Ikematsu, Shuhei Nakamura
2020/052 (PDF ) Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef
2020/051 (PDF ) Low-Latency Hardware Masking with Application to AES Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark Marson
2020/050 (PDF ) Delphi: A Cryptographic Inference Service for Neural Networks Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa
2020/049 (PDF ) ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri
2020/048 (PDF ) Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage Changshe Ma, Yiping Gu, Hongfei Li
2020/047 (PDF ) New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version) Tianshuo Cong, Ximing Fu, Xuting Zhou, Yuli Zou, Haining Fan
2020/046 (PDF ) On Analysis of Lightweight Stream Ciphers with Keyed Update Orhun Kara, Muhammed F. Esgin
2020/045 (PDF ) Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6 Haibat Khan, Benjamin Dowling, Keith M. Martin
2020/044 (PDF ) Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts Alexander Chepurnoy, Amitabh Saxena
2020/043 (PDF ) Zone Encryption with Anonymous Authentication for V2V Communication Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
2020/042 (PDF ) BLAZE: Blazing Fast Privacy-Preserving Machine Learning Arpita Patra, Ajith Suresh
2020/041 (PDF ) Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders Aggelos Kiayias, Saad Quader, Alexander Russell
2020/040 (PDF ) A Compact and Scalable Hardware/Software Co-design of SIKE Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina
2020/039 (PDF ) Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis Damien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard
2020/038 (PDF ) Bitstream Modification Attack on SNOW 3G Michail Moraitis, Elena Dubrova
2020/037 (PDF ) Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput Matthias Fitzi, Peter Gaži, Aggelos Kiayias, Alexander Russell
2020/036 (PDF ) Analysis on Aigis-Enc: asymmetrical and symmetrical Yupu Hu, Siyue Dong, Xingting Dong
2020/035 (PDF ) Constant-round Dynamic Group Key Exchange from RLWE Assumption Rakyong Choi, Dongyeon Hong, Kwangjo Kim
2020/034 (PDF ) SkyEye: A Traceable Scheme for Blockchain Tianjun Ma, Haixia Xu, Peili Li
2020/033 (PDF ) Scalable Open-Vote Network on Ethereum Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef
2020/032 (PDF ) A New Approach for the Implementation of Binary Matrices Using SLP Applications Mahdi Sajadieh, Mohsen Mousavi
2020/031 (PDF ) Locally Decodable Codes with Randomized Encoding Kuan Cheng, Xin Li, Yu Zheng
2020/030 (PDF ) K-Cipher: A Low Latency, Bit Length Parameterizable Cipher Michael Kounavis, Sergej Deutsch, Santosh Ghosh, David Durham
2020/029 (PDF ) Differentially-Private Multi-Party Sketching for Large-Scale Statistics Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, Arkady Yerukhimovich
2020/028 (PDF ) Verified Security of BLT Signature Scheme Denis Firsov, Ahto Buldas, Ahto Truu, Risto Laanoja
2020/027 (PDF ) On Roots Factorization for PQC Algorithms Alexander Maximov
2020/026 (PDF ) Post-Quantum Secure Architectures for Automotive Hardware Secure Modules Wen Wang, Marc Stöttinger
2020/025 (PDF ) Single Secret Leader Election Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco
2020/024 (PDF ) The Arwen Trading Protocols (Full Version) Ethan Heilman, Sebastien Lipmann, Sharon Goldberg
2020/023 (PDF ) Threshold Multi-Signature with an Offline Recovery Party Riccardo Longo, Alessio Meneghetti, Massimiliano Sala
2020/022 (PDF ) Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material) Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
2020/021 (PDF ) eSIDH: the revenge of the SIDH Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
2020/020 (PDF ) Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu
2020/019 (PDF ) Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains Suhyeon Lee, Seungjoo Kim
2020/018 (PDF ) Triptych: logarithmic-sized linkable ring signatures with applications Sarang Noether, Brandon Goodell
2020/017 (PDF ) Biometric-Authenticated Searchable Encryption Daniel Gardham, Mark Manulis, Constantin Cătălin Drăgan
2020/016 (PDF ) Short Threshold Dynamic Group Signatures Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
2020/015 (PDF ) Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts Hao Chen, Wei Dai, Miran Kim, Yongsoo Song
2020/014 (PDF ) SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust Gaëtan Leurent, Thomas Peyrin
2020/013 (PDF ) On the Cryptographic Hardness of Local Search Nir Bitansky, Idan Gerichter
2020/012 (PDF ) Cortex-M4 Optimizations for \{R,M\}LWE Schemes Erdem Alkim, Yusuf Alper Bilgin, Murat Cenk, François Gérard
2020/011 (PDF ) Towards Vehicular Digital Forensics from Decentralized Trust: An Accountable, Privacy-preservation, and Secure Realization Ming Li, Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo
2020/010 (PDF ) Faster point compression for elliptic curves of $j$-invariant $0$ Dmitrii Koshelev
2020/009 (PDF ) Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions Thomas Pornin
2020/008 (PDF ) Secret Sharing Schemes for Ports of Matroids of Rank 3 Oriol Farràs
2020/007 (PDF ) On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann
2020/006 (PDF ) Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures André Chailloux, Thomas Debris-Alazard
2020/005 (PDF ) Lai-Massey Scheme Revisited M. R. Mirzaee Shamsabad, S. M. Dehnavi
2020/002 (PDF ) On a Conjecture of O'Donnell Qichun Wang
2020/001 (PDF ) Elliptic Curves of Nearly Prime Order Manoj Gyawali, Daniele Di Tullio
[ Cryptology ePrint archive ]