Cryptology ePrint Archive: Listing for 2020s
Regex
2026/648 (PDF ) Synthesis of RTL-based Characterization Programs for Fault Injection Jonah Alle Monne, Guillaume Bouffard, Damien Couroussé, Mathieu Jan
2026/647 (PDF ) SSLE-DAG: A High-Throughput Proof-of-Stake Consensus Protocol Combining an Adaptive DAG with a Single Secret Leader Election Tomas Hladky, Martin Peresini, Juraj Mariani, Ivan Homoliak
2026/646 (PDF ) On Optimal Information-Theoretic Security in Symmetric Encryption under Low-Entropy Keys Haibo Cheng, Haijie Su, Dongyi Li, Wenting Li, Ping Wang
2026/645 (PDF ) Toward Provable Security in Anamorphic Extension: New Constructions and Analysis Nabanita Chakraborty, Ratna Dutta
2026/644 (PDF ) Ordered Multi-Signatures from the DL Assumption Keisuke Hara, Keisuke Tanaka, Masayuki Tezuka
2026/643 (PDF ) FOVA: Fast One-Shot Verifiable Aggregation for Federated Learning Yin Zhu, Junqing Gong, Kai Zhang, Shay Gueron, Haifeng Qian
2026/642 (PDF ) SoK: The Weakest-Link Principle in Public Key Infrastructures and Modern Mitigation Strategies Kertis Mwanza, Carsten Köhn
2026/641 (PDF ) HyperVerITAS: Verifying Image Transformations at Scale on Boolean Hypercubes Garrett Greiner, Toshi Mowery, Pratik Soni
2026/640 (PDF ) MIKE (Module Isogeny Key Exchange): An ἰχθύς introduction Damien Robert
2026/639 (PDF ) Synchronous BFT with Provability and Fast Path for the Age of Blockchains Ittai Abraham, Kartik Nayak, Ling Ren, Ertem Nusret Tas
2026/638 (PDF ) THED: Threshold Dilithium from FHE Jai Hyun Park, Alain Passelègue, Damien Stehlé
2026/637 (PDF ) VeriRAG: Efficient Zero-Knowledge Proofs for Verifiable Retrieval-Augmented Generation Chenqi Lin, Yubo Cui, Zhelei Zhou, Cheng Hong, Yufei Wang, Zhaohui Chen, Meng Li
2026/636 (PDF ) From LFSRs to LFGs: Periodicity and Structural Transformations in Stream Ciphers Shivarama K. N, Susil Kumar Bishoi, Vadiraja Bhatta G. R., Vashek Matyas
2026/635 (PDF ) Low-Stack HAETAE for Memory-Constrained Microcontrollers Gustavo Banegas, YoungBeom Kim, Seog Chung Seo, Christine van Vredendaal
2026/634 (PDF ) PlasmaBlind: A Private Layer 2 With Instant Client-Side Proving Pierre Daix-Moreux, Chengru Zhang
2026/633 (PDF ) Progressive Sieving-Style Information-Set Decoding Algorithm Tong Yu, Haodong Jiang, Hong Wang, Rongmao Chen, Qingfeng Cheng, Xinyi Huang, Yuefei Zhu
2026/632 (PDF ) A tight security analysis of the FIPS-205 standard (SLH-DSA) Dai Chi Do, Quoc Toan Nguyen, Phong Quang Trieu, Ba Danh Vu
2026/631 (PDF ) Rethinking r-PKP: a New Formulation for the Relaxed Permuted Kernel Problem Giuseppe D'Alconzo, Andrea Gangemi, Lorenzo Romano, Giuliano Romeo
2026/630 (PDF ) Asymptotic Analysis of Ternary Sparse LWE Byoungchan Chi, Nathan Cho, Jiseung Kim, Changmin Lee
2026/629 (PDF ) Towards Formal Security Proofs of MQOM Haruhisa Kosuge, Keita Xagawa
2026/628 (PDF ) Fast and Compact Lattice-Based Registration-Based Encryption Tianwei Zhang, Xiuquan Ding, Giulio Malavolta, Nico Döttling
2026/627 (PDF ) Efficient and Parallel Implementation of Isogeny-based Deterministic Group Actions Weize Wang, Yi-Fu Lai, Kaizhan Lin, Yunlei Zhao
2026/626 (PDF ) Deep Learning-Assisted Improved Differential Fault Attacks on Lightweight Stream Ciphers Kok Ping Lim, Dongyang Jia, Iftekhar Salam
2026/625 (PDF ) Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations Ryan Babbush, Adam Zalcman, Craig Gidney, Michael Broughton, Tanuj Khattar, Hartmut Neven, Thiago Bergamaschi, Justin Drake, Dan Boneh
2026/624 (PDF ) Weak-key cryptanalysis of Blink Tim Beyne
2026/623 (PDF ) Bad Benchmarks and a Fourier-Analytic Framework for Characterizing the (Un)Hideability of Combinational-Logic Circuits Animesh Chhotaray, Kollin Labowski, Thomas Shrimpton
2026/622 (PDF ) Locally Computable High Independence Hashing Yevgeniy Dodis, Shachar Lovett, Daniel Wichs
2026/621 (PDF ) Efficient Conflict-Free NTT Hardware Architecture with Single-Port RAMs: Applications to ML-DSA Henrique S. Ogawa, Thales B. Paiva, Marcos A. Simplicio Jr, Syed M. Hafiz, Bahattin Yildiz
2026/620 (PDF ) AHAB: Asynchronous, High-throughput, Adaptively-secure, Batched Threshold Schnorr Signatures Victor Shoup
2026/619 (PDF ) Breaking the One-Way Property of a SHA-3 Implementation via Fault Injection: Key Recovery Attacks on Post-Quantum Digital Signatures Mona Sobhani, Sönke Jendral, Elena Dubrova, Mats Näslund
2026/618 (PDF ) CAGP: A Quantum Canary Address Generation Protocol Ghazaleh Keshavarzkalhori, Roger Sala-Mimó, Jordi Herrera-Joancomartí, Cristina Pérez-Solà
2026/617 (PDF ) Scaling of Memory and Bandwidth Requirements of Post-Quantum Signatures with Message Size Falko Strenzke
2026/616 (PDF ) On the properties of arithmetic crosscorrelation for sequences with coprime periods Feifei Yan, Pinhui Ke
2026/615 (PDF ) On the Security of MPC-in-the-Head Signatures with Correlated GGM Trees Thibauld Feneuil, Matthieu Rivain
2026/614 (PDF ) Attacks on Sparse LWE and Sparse LPN with new Sample-Time tradeoffs Shashwat Agrawal, Amitabha Bagchi, Rajendra Kumar
2026/613 (PDF ) Haechi: Simple Commitment-based Keyless In-person Verifiable Elections Jiwon Kim, Michael Naehrig, Olivier Pereira, Josh Benaloh
2026/612 (PDF ) Improving ML Attacks on LWE with Data Repetition and Stepwise Regression Alberto Alfarano, Eshika Saxena, Emily Wenger, François Charton, Kristin Lauter
2026/611 (PDF ) A Comparative Evaluation of DATA and Microwalk for Detecting Constant-Time Violations in Cryptographic Libraries Dominik Schneider, Paul Fuchs, Kerstin Lemke-Rust
2026/610 (PDF ) Concrete Estimation of Correctness and IND-CPA-D Security for FHE via Rare Event Simulation Mathieu Ballandras, Jean-Baptiste Orfila, Samuel Tap
2026/609 (PDF ) Post-Quantum Blockchains with Agility in Mind Manuel B. Santos, Danno Ferrin, Ron Kahat, Michael Lodder
2026/608 (PDF ) Can Adaptive Communication Graphs Lower the Bottleneck Complexity of (Secure) Multiparty Computation? Lisa Kohl, Pierre Meyer, Divya Ravi, Nicolas Resch
2026/607 (PDF ) Refined Approx-SVP Rank Reduction Conditions and Adaptive Lattice Reduction for MSIS Security Estimation Xiaohan Zhang, Zijian Zhou, Longjiang Qu
2026/606 (PDF ) PD-Net: Learning Device-Invariant Representations for Heterogeneous Cross-Device Side-Channel Attacks Dalin He, Wei Cheng, Yuejun Liu, Jingdian Ming, Yongbin Zhou
2026/605 (PDF ) Adaptively-Secure Proxy Re-Encryption with Tight Security Chen Qian, Shuo Chen, Shuai Han
2026/604 (PDF ) CatCrypt: From Rust to Cryptographic Security in Lean Bas Spitters
2026/603 (PDF ) Oblivious SpaceSaving: Heavy-Hitter Detection over Fully Homomorphic Encryption Sohaib .., Divyakant Agrawal, Amr El Abbadi
2026/602 (PDF ) Confidential Transfers for Multi-Purpose Tokens on the XRP Ledger Murat Cenk, Aanchal Malhotra, Joseph A. Akinyele
2026/601 (PDF ) Cryptanalysis of the Lightweight Stream Cipher RRSC Shivarama K. N., Susil Kumar Bishoi
2026/600 (PDF ) Hadal: Centralized Label DP Training without a Trusted Party James Choncholas, Stanislav Peceny, Amit Agarwal, Mariana Raykova, Baiyu Li, Karn Seth
2026/599 (PDF ) Proving modern code-based dual attacks with second-order techniques Charles Meyer-Hilfiger
2026/598 (PDF ) Triangulating Meet-in-the-Middle Attack Boxin Zhao, Qingliang Hou, Lingyue Qin, Xiaoyang Dong
2026/597 (PDF ) Efficiency Improvement of Deniable FHE: Tighter Deniability Analysis and TFHE-based Construction Towa Toyooka, Yohei Watanabe, Mitsugu Iwamoto
2026/596 (PDF ) Gryphes: Hybrid Proofs for Modular SNARKs with Applications to zkRollups Jiajun Xin, Samuel Cheung On Tin, Christodoulos Pappas, Yongjin Huang, Dimitrios Papadopoulos
2026/595 (PDF ) Registration-Optimized Dynamic Group Time-based One-time Passwords for Mobile Access Jiaqing Guo, Xuelian Cao, Zengpeng Li, Yong Zhou, Zheng Yang, Jianying Zhou
2026/594 (PDF ) Efficient Compilers for Verifiable Dynamic Searchable Symmetric Encryption Chaya Ganesh, Sikhar Patranabis, Raja Rakshit Varanasi
2026/593 (PDF ) Three-Move Blind Signatures in Pairing-Free Groups Yanbo Chen
2026/592 (PDF ) Performance Analysis of Parameterizable HQC Hardware Architecture Nishant Pandey, Sanjay Deshpande, Dixit Dutt Bohra, Debapriya Basu Roy, Dip Sankar Banerjee, Jakub Szefer
2026/591 (PDF ) A Note on HCTR++ Mustafa Khairallah
2026/590 (PDF ) On the Security of Constraint-Friendly Map-to-Curve Relations Youssef El Housni, Benedikt Bünz
2026/589 (PDF ) FROSTLASS: Flexible Ring-Oriented Schnorr-like Thresholdized Linkably Anonymous Signature Scheme Joshua Babb, Brandon Goodell, Rigo Salazar, Freeman Slaughter, Luke Szramowski
2026/588 (PDF ) Tailored Limb Counts, Faster Arithmetic: Improved TMVP Decompositions for Curve5453 and Curve6071 Murat Cenk, N. Gamze Orhon Kılıç, Halil Kemal Taşkın, Oğuz Yayla
2026/587 (PDF ) Speeding Up Sum-Check Proving (Extended Version) Quang Dao, Zachary DeStefano, Suyash Bagad, Yuval Domb, Justin Thaler
2026/586 (PDF ) Bulletproofs*: Verifier-Efficient Arithmetic Circuit Proofs via Folding Emanuele Scala, Daniele Bartoli
2026/585 (PDF ) Format-Preserving Compression-Tolerating Authenticated Encryption for Images Alexandra Boldyreva, Kaishuo Cheng, Jehad Hussein
2026/584 (PDF ) Analyzing the WebRTC Ecosystem and Breaking Authentication in DTLS-SRTP Martin Bach, Vukašin Karadžić, Lukas Knittel, Robert Merget, Jean Paul Degabriele
2026/583 (PDF ) SoK: Updatable Public-Key Encryption Mark Manulis, Daniel Slamanig, Federico Valbusa
2026/582 (PDF ) FrozenTRU: Cold Boot Attacks on NTRU-Based Hash-and-Sign Signatures Hiroto Kaihara, Mehdi Tibouchi, Masayuki Abe
2026/581 (PDF ) vkproof: Succinct verification of indexed verifying keys using modular compilation and polynomial fingerprinting Antonio Mejias Gil, Xueqin Zhao
2026/580 (PDF ) Exploiting noisy single-bit leakage in ML-DSA Kaveh Bashiri, Jan Geuenich, Johannes Mittmann
2026/579 (PDF ) PRIVADA: Private user-centric Data Aggregation Betul Askin Ozdemir, Beyza Bozdemir, Ionut Groza, Melek Önen
2026/578 (PDF ) How Much Verifier's Dilemma and Staking Pools Adversely Affect Decentralization of Ethereum PoS under Realistic Operational Costs? (Extended Version) Ivan Homoliak, Martin Hruby, Martin Peresini, Kristian Kostal, Daria Smuseva
2026/577 (PDF ) Two Decades of Identity-Based Identification Schemes- A Survey on Challenges and Advances Apurva Kiran Vangujar, Paolo Palmieri, Ji-Jian Chin, Swee-Huay Heng
2026/576 (PDF ) Radical 3-isogenies for the ideal class group actions on $(2, \varepsilon)$-structures Masaomi Shibata, Hiroshi Onuki, Tsuyoshi Takagi
2026/575 (PDF ) RoKoko: Lattice-based Succinct Arguments, a Committed Refinement Michael Klooss, Russell W. F. Lai, Ngoc Khanh Nguyen, Michał Osadnik, Lorenzo Tucci
2026/574 (PDF ) A Universal Blinder: One-round Blind Signatures from FHE Dan Boneh, Jaehyung Kim
2026/573 (PDF ) Two-Party BBS+ Signature in Two Passes Xiaofei Wu, Tian Qiu, Guofeng Tang, Yuqing Niu, Bowen Jiang, Jun Zhou, Haiyang Xue, Guomin Yang
2026/572 (PDF ) Earpicks: Tightly Secure Two-Round Multi- and Threshold Signatures Renas Bacho, Yanbo Chen
2026/571 (PDF ) Playing Tag with Okamoto-Schnorr: Three-Move Pairing-Free Blind Signatures from DDH Rutchathon Chairattana-Apirom, Michael Reichle, Stefano Tessaro
2026/570 (PDF ) iToken: One-Time-Use Anonymous Token with Issuance Hiding Zengpeng Li, Xiangyu Su, Dongfang Wei, Guangyu Liao, Mei Wang
2026/569 (PDF ) Hybrid KEM Constructions from Classical PKEs and Post-Quantum KEMs Biming Zhou, Yukai Zhang, Haodong Jiang, Yunlei Zhao
2026/568 (PDF ) Low-Depth Construction of Grover Oracles from Fully Functional Quantum Circuits Behzad Abdolmaleki, Jiaqi Gu
2026/567 (PDF ) Accurate Parameter Estimates for Punctured Key Recovery Linear Attacks TIm Beyne, Antonio Flórez-Gutiérrez, Yosuke Todo
2026/566 (PDF ) Secret-Shared Shuffle from Authenticated Correlations Xiangfu Song, Xiaojian Liang, Ye Dong, Jianli Bai, Pu Duan, Changyu Dong, Tianwei Zhang, Ee-Chien Chang
2026/565 (PDF ) Zeeperio: Verifying Governmental Elections with Ethereum Aikamdeep Malhotra, Aleksander Essex, Jeremy Clark
2026/564 (PDF ) TAPAS: Efficient Two-Server Asymmetric Private Aggregation Beyond Prio(+) Harish Karthikeyan, Antigoni Polychroniadou
2026/563 (PDF ) Optimizing FROST for Message Capacity Philipp Jovanovic, Ben Riva, Arnab Roy
2026/562 (PDF ) New Approaches to Zero-Knowledge SNARG Constructions Chaya Ganesh, Mor Weiss
2026/561 (PDF ) SynCirc: Efficient Synthesis of Depth-Optimized Circuits from High-Level Languages (Extended Version) Arpita Patra, Joachim Schmidt, Thomas Schneider, Ajith Suresh, Hossein Yalame
2026/560 (PDF ) High-Order Galois Automorphisms for TNFS Linear Algebra Haetham Al Aswad, Cécile Pierrot, Emmanuel Thomé
2026/559 (PDF ) PrivaDE: Privacy-preserving Data Evaluation for Blockchain-based Data Marketplaces Wan Ki Wong, Sahel Torkamani, Michele Ciampi, Rik Sarkar
2026/558 (PDF ) Cryptanalysis of four arbitrated quantum signature schemes Pierre-Alain Jacqmin, Jean Liénardy
2026/557 (PDF ) On Post-Quantum Signature with Message Recovery from Hash-and-Sign in QROM Bohang Chen, Shuai Han, Shengli Liu
2026/556 (PDF ) TP-NTT: Batch NTT Hardware with Application to Relinearization Emre Koçer, Tolun Tosun, Beren Aydoğan, Erkay Savaş, Furkan Turan, Ingrid Verbauwhede
2026/555 (PDF ) Improved Issuer Hiding for BBS-based Anonymous Credentials Nesrine Kaaniche, Seyni Kane, Maryline Laurent, Jacques Traoré
2026/554 (PDF ) PrivaLean: Low-Latency and High-Accuracy System for Secure 2PC Inference Jinghao Zhao, Hongwei Yang, Bobo Wang, Lichunxi Yang, Juncheng Li, Xiangrui Zeng, Meng Hao, Desheng Wang, Hui He, Weizhe Zhang
2026/553 (PDF ) Graph-based Asynchrony with Quasilinear Complexity for Any Linear Verifiable Secret Sharing Scheme Hugo Delavenne, Lola-Baie Mallordy
2026/552 (PDF ) NI-DKG: Non-Interactive Distributed Key Generation Using Blockchain and Zero-Knowledge Proofs Alex Kampa, Pau Escrich, Marta Bellés-Muñoz, Roger Baig
2026/551 (PDF ) Succinct Verification of Lattice-Based Compressed $\Sigma$-Protocols via Delegated Proofs of Correct Folding of Cryptographically Generated Public Parameters Anders Kallesøe
2026/550 (PDF ) Solving the Linear Code Equivalence Problem from Single Codeword Matching Magali Bardet, Charles Brion, Ayoub Otmani, Mohamed Saeed, Nicolas Sendrier
2026/549 (PDF ) Look Ahead! Practical CCA-secure Steganography: Cover-Source Switching meets Lattice Gaussian Sampling Russell W. F. Lai, Ivy K. Y. Woo, Hoover H. F. Yin
2026/548 (PDF ) Post-Quantum Cryptography from Quantum Stabilizer Decoding Jonathan Z. Lu, Alexander Poremba, Yihui Quek, Akshar Ramkumar
2026/547 (PDF ) Dialga: A Family of Low-Latency Tweakable Block Ciphers using Multiple Linear Layers (Full Version) Subhadeep Banik, Tatsuya Ishikawa, Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu, Kazuma Nakata, Mostafizar Rahman, Kosei Sakamoto
2026/546 (PDF ) Hyperelliptic Gluing Isogeny Diffie–Hellman (HGIDH): A Genus-2 Gluing Isogeny Key-Exchange Nouhou Abdou Idris, Mustapha Hedabou
2026/545 (PDF ) Aggregator-Based Voting using proof of Partition Marius Lombard-Platet, Doron Zarchy
2026/544 (PDF ) HARE: Compact HQC via Distance-Informed Erasure Decoding Tianrui Wang, Qicheng Teng, Anyu Wang, Jun Zhang, Bo Pang, Chunhuan Zhao, Sihuang Hu, Xiaoyun Wang
2026/543 (PDF ) MTSF --- Market-Theoretic Security Framework: A Unified Paradigm For The Art Of Proving and Disproving Security Basker Palaniswamy, Paolo Palmieri
2026/542 (PDF ) VERIDP: Verifiable Differentially Private Training Behzad Abdolmaleki, Amir R. Asadi, Vahid R. Asadi, Stefan Köpsell, Bhavish Mohee, Nahid Roustaeifar, Maryam Zarezadeh
2026/541 (PDF ) Towards Verifiable AI with Lightweight Cryptographic Proofs of Inference Pranay Anchuri, Matteo Campanelli, Paul Cesaretti, Rosario Gennaro, Tushar M. Jois, Hasan S. Kayman, Tugce Ozdemir
2026/540 (PDF ) Ticket to Hide: Private, Practical Proofs of Provenance for TLS Ryan Little, Daniel S. Roche, Mayank Varia
2026/539 (PDF ) Orca And Dolphin: Efficient Bivariate And Multilinear Polynomial Commitment Schemes Under Standard Assumptions Helger Lipmaa
2026/538 (PDF ) Proof-Carrying Data via Holography Accumulation Nikitas Paslis, Carla Ràfols, Alexandros Zacharakis
2026/537 (PDF ) Cheap Digit Decomposition and Large Plaintext Spaces in FHEW using Phase Splitting Leonard Schild, Aysajan Abidin, Bart Preneel
2026/536 (PDF ) Exploring the Boundary: Discriminative Model-based Parameter Search for Fault Injection Ju-Hwan Kim, Dong-Guk Han
2026/535 (PDF ) Improved Related-Key Differential Neural Distinguishers for SPN Block Ciphers Chuchu Ge, Qichun Wang
2026/534 (PDF ) Ciphertext-Policy ABE for $\mathsf{NC}^1$ Circuits with Constant-Size Ciphertexts from Succinct LWE Jiaqi Liu, Yuanyi Zhang, Fang-Wei Fu
2026/533 (PDF ) A Maliciously-Secure Post-Quantum OPRF from Crypto Dark Matter Diego F. Aranha, Aron van Baarsen, Adam Blatchley Hansen, Kent Nielsen, Peter Scholl
2026/532 (PDF ) S-two Whitepaper Dan Carmon, Lior Goldberg, Ulrich Haböck, Leonardo Lerer, Ilya Lesokhin, Shahar Papini, Shahar Samocha
2026/531 (PDF ) A Review of IC Logical Reverse Engineering Techniques Kevin Xu, Lucas Daudt Franck, Samuel Pagliarini
2026/530 (PDF ) Balthazar Wallet: Making Password Authentication Practical on Web3 via OPAQUE and Privacy-Preserving Smart Contracts Tomas Krajci, Samuel Oleksak, Ivan Homoliak
2026/529 (PDF ) Benchmarking Exported Key Material from Commercial QKD Systems Using SENTRY-Q: A Model-Based Output Validator Darshit Suratwala, Matvey Romanowski, Orr Dunkelman, Elham Amini, Jean-Pierre Seifert
2026/528 (PDF ) Full Secret Key Recovery of First-order Masked Crystals-Kyber implementation using multiple distinct chosen-ciphertexts Souhayl Ben El Haj Soulami, Yann Connan, Sylvain Duquesne
2026/527 (PDF ) QR-UOV without Rejection Sampling: Security Analysis and High-Speed Implementation Hiroshi Amagasa, Hiroki Furue, Rei Ueno, Naofumi Homma
2026/526 (PDF ) Broken By Design: A Longitudinal Analysis of Cryptographic Failures in Alipay Mobile Payment Infrastructure Jiqiang Feng
2026/525 (PDF ) SoK: Understanding zkVM: From Research to Practice Yunbo Yang, Yuejia Cheng, Haibo Tang, Guomin Yang, Bingsheng Zhang, Kui Ren
2026/524 (PDF ) Distance of RAA Codes over Large Finite Fields (with Applications in zkSNARKs and PCGs) Pariya Akhiani, Yupeng Zhang
2026/523 (PDF ) RISC-V based Vectorization of Classic McEliece Key Generation Mahnaz Namazi Rizi, Nusa Zidaric, Lejla Batina, Nele Mentens
2026/522 (PDF ) X3DH with Deniable Authentication without Trusted Third Parties Stanislaw Jarecki, Phillip Nazarian, Apurva Rai
2026/521 (PDF ) UniMSM: An Efficient and Flexible Hardware Accelerator for Multi-Scalar Multiplication Kaixuan Wang, Yifan Yanggong, Chenti Baixiao, Xiaoyu Yang, Lei Wang
2026/520 (PDF ) Sparse optimisation and quantum-inspired encoding for ransomware detection Elodie Mutombo Ngoie, Mike Wa Nkongolo
2026/519 (PDF ) A Generalized Partial Exposure Lattice Attack Against an RSA variant Based on Cubic Pell Curves Michel Seck, Hortense Boudjou Tchapgnouo
2026/518 (PDF ) ${{\mathsf{SMA}^2\mathsf{RT}}}$ : Secret-Metadata Attribute-based Anonymous Rate-limited Tokens Anna Lysyanskaya, Eileen Nolan
2026/517 (PDF ) Multi-Instance Security Degradation of Code-Based KEMs Alexander May, Gabriel Sá Diogo
2026/516 (PDF ) Towards Compact UOV-Based MQ Signatures: Rectangular and Lifted Whipping Structures Quang-Duc Nguyen, Minh Hieu Nguyen
2026/515 (PDF ) Privacy at your Fingertips: Enabling Rapid Client-Side Operations in Fully Homomorphic Encryption Aikata Aikata, Florian Krieger, Sujoy Sinha Roy
2026/514 (PDF ) Secure Matrix Invertibility Testing over Fields of Small Order or Characteristics Seungwoo Han, Jooyoung Lee, Seungmin Park, Mincheol Son
2026/513 (PDF ) zkBSA: Auditable and Compliant Stealth Addresses for Blockchains Siyuan Zheng, Zhe Han
2026/512 (PDF ) Securely Scaling Autonomy: The Role of Cryptography in Future Unmanned Aircraft Systems (UAS) Paul Rochford, William J Buchanan, Rich Macfarlane, Madjid Tehrani
2026/511 (PDF ) Human-Extractable ZK Proofs of Knowledge: A Solution to Dark DAOs Zeyuan Yin, Leiyuan Tian, Bingsheng Zhang, Kui Ren
2026/510 (PDF ) FHorgEt: A Cryptographic Solution for Secure Machine Unlearning David Balbás, Dario Fiore, Georgios Raikos, Damien Robissout, Claudio Soriente
2026/509 (PDF ) PUFF: Maximally Proactive Security for Free in Perfectly Secure MPC with Guaranteed Output Delivery Jiarui Li, Mengzhen Zou, Guidong Li, Guoyan Zhang, Chen Qian
2026/508 (PDF ) Schnorr Blind Signatures and Signed ElGamal KEM in Algebraic Group Action Model Dung Hoang Duong, Willy Susilo, Chuanqi Zhang
2026/507 (PDF ) Practically Efficient Linear-Time Protocols for Server-Aided Private Set Union and Third Party Private Set Operations Foo Yee Yeo, Jason H. M. Ying
2026/506 (PDF ) Unclonable Encryption in the Haar Random Oracle Model James Bartusek, Eli Goldin
2026/505 (PDF ) SCALE-FL: Scalable Cryptography-based Aggregation with Lightweight Enclaves for Federated Learning Micah Brody, Antonia Januszewicz, Jiachen Zhao, Nirajan Koirala, Taeho Jung
2026/504 (PDF ) Compression And Decompression Under FHE Using Error-Correcting Codes and Copy-And-Recurse Adi Akavia, Hayim Shaul, Ofer Shayevitz
2026/503 (PDF ) SwiftSNNI: Optimized Scheduling for Secure Neural Network Inference (SNNI) on Multi-Core Systems Kanwal Batool, Saleem Anwar, Francesco Regazzoni, Andy Pimentel, Zoltán Ádám Mann
2026/502 (PDF ) Efficient RLWE based Chosen-Ciphertext Secure Dual-Receiver Encryption and Sender-Binding KEM in the Standard Model Laurin Benz, Robert Brede
2026/501 (PDF ) More Brisés in Ballet: Extending Differential and Linear Cryptanalysis Emanuele Bellini, Gabriele Bellini, Alessandro De Piccoli, Michela Gallone, David Gerault, Yun Ju Huang, Paul Huynh, Matteo Onger, Simone Pelizzola, Andrea Visconti
2026/500 (PDF ) Expander properties of superspecial isogeny digraphs with level structure Thomas Decru, Krijn Reijnders
2026/499 (PDF ) Accelerating FAEST Signatures on ARM: NEON SIMD AES and Parallel VOLE Optimization Seung-Won Lee, Ha-Gyeong Kim, Min-Ho Song, Si-Woo Eum, Hwa-Jeong Seo
2026/498 (PDF ) Bridging Programmability, Efficiency, and Bounded Trust: A Hybrid Privacy-Preserving Smart Contract Framework Youheng Wang, Rujia Li, Zhaoyang Xie, Kaikai Feng, Qingjie Chen, Yang Gao, Sisi Duan
2026/497 (PDF ) Trustworthy Agent Network: Trust in Agent Networks Must Be Baked In, Not Bolted On Yixiang Yao, Yuhang Yao, Xinyi Fan, Jiechao Gao, Jie Wang, Minjia Zhang, Srivatsan Ravi, Carlee Joe-Wong
2026/496 (PDF ) On quadratic equations of $q$-regular tree and their applications in Graph Theory and Cryptography. Vasyl Ustimenko, Tymoteusz Chojecki
2026/495 (PDF ) Linear Code Equivalence via Plücker Coordinates Gessica Alecci, Giuseppe D'Alconzo
2026/494 (PDF ) $\mathsf{GlueLUT}$: Generalized Lookup Table Arguments over Residue Rings via Auxiliary Fields Yuanju Wei, Zhelei Zhou, Xinxuan Zhang, Songyu Wu, Binwu Xiang, Cheng Hong, Yi Deng
2026/493 (PDF ) The SQInstructor: a guide to SQIsign and the Deuring Correspondence with level structures Giacomo Borin, Luca De Feo, Guido Maria Lido, Sina Schaeffler
2026/492 (PDF ) The Landscape of Reusable Garbling Anasuya Acharya, Carmit Hazay, Rahul Satish
2026/491 (PDF ) SoK: Private Transformer-Based Model Inference Yuntian Chen, Tianpei Lu, Zhanyong Tang, Bingsheng Zhang, Zhiying Shi, Yuxiang Luan, Zhuzhu Wang
2026/490 (PDF ) Towards Modeling Cybersecurity Behavior of Humans in Organizations Klaas Ole Kürtz
2026/489 (PDF ) Threshold Oblivious Pseudorandom Functions from Isogeny Group Actions Robi Pedersen
2026/488 (PDF ) SoK: Offline Finding Protocols for Lightweight Location Tracking Akshaya Kumar, Carolina Ortega Pérez, Joseph Jaeger, Thomas Ristenpart, Michael A. Specter
2026/487 (PDF ) Bootstrapping-Free Blind PCS: Achieving Constant Depth and Linear Prover Kexi Huang, Yanpei Guo, Wenjie Qu, Jiaheng Zhang
2026/486 (PDF ) White-Box Attacks on PhotoDNA Perceptual Hash Function Maxime Deryck, Diane Leblanc-Albarel, Bart Preneel
2026/485 (PDF ) SIMD HSS and aHMAC from Interval Encoding with Application to One-Bit-Per-Gate Garbling Jaehyung Kim, Hanjun Li, Huijia Lin, Zeyu Liu
2026/484 (PDF ) Signal Lost (Integrity): The Signal App is More than the Sum of its Protocols Kien Tuong Truong, Noemi Terzo, Kenneth G. Paterson
2026/483 (PDF ) Debt-Aware Bonding Curves: Non-Decreasing Floor Prices and Non-Liquidatable Borrowing Ömer Demirel, Michael Lewkowitz, Tiago Santana
2026/482 (PDF ) Cryptanalysis of Two Alternating Moduli Weak PRFs Kai Hu, Gregor Leander, Håvard Raddum, Arne Sandrib, Aleksei Udovenko
2026/481 (PDF ) Remise: Authorized Anonymous Communication Systems Rohan Ravi, Paritosh Shukla, Adithya Vadapalli
2026/480 (PDF ) CHOPIN: Optimal Pairing-Based Multilinear Polynomial Commitments from Bivariate KZG Juraj Belohorec, Pavel Hubáček, Aleksi Kalsta, Kristýna Mašková
2026/479 (PDF ) Strong Efficiency Lower Bounds for Byzantine Agreement Clément Ducros, Julian Loss, Matthieu Rambaud
2026/478 (PDF ) A Hardware/Software Co-Optimization of HQC Using Tightly-Coupled Accelerators on a 32-bit Ibex Core Seog Chung Seo, YoungBeom Kim
2026/477 (PDF ) DAC-PRE: Practical Anonymous Data Access Scheme Control with Proxy Re-encryption for Implantable Medical Devices Jayaprakash Kar, Xiaoguang Liu, Fagen Li
2026/476 (PDF ) Duty-Free Bits: Projectivizing Garbling Schemes Nakul Khambhati, Anwesh Bhattacharya, David Heath
2026/475 (PDF ) Scaling Fully Secure MPC via Robust Recursive Search and Gap Amplification Matan Hamilis, Ariel Nof
2026/474 (PDF ) Scalable Compliant Privacy on Starknet Lior Goldberg, Maya Dotan, Ittay Dror, Gideon Kaempfer, Nir Levi, Noa Oved, Arad Reder, Anat Veredgorn, Noa Wolfgor
2026/473 (PDF ) PIKE: Faster Isogeny-Based Public Key Encryption with Pairing-Assisted Decryption Shiping Cai, Mingjie Chen, Yi-Fu Lai, Kaizhan Lin
2026/472 (PDF ) Descent into Broken Trust: Uncovering ML-DSA Subkeys with Scarce Leakage and Local Optimization Carsten Schubert, Niklas Julius Müller, Jean-Pierre Seifert, Marian Margraf
2026/471 (PDF ) Lookup Arguments over Rings and Applications to Batch-Verification of RAM Programs Jonathan Bootle, Julia Guskind, Sikhar Patranabis, Katerina Sotiraki
2026/470 (PDF ) Byzantine Consensus in the Partially Authenticated Setting Christoph Lenzen, Julian Loss, Kecheng Shi, Benedikt Wagner
2026/469 (PDF ) A Note on ``Linear-Communication ACSS with Guaranteed Termination and Lower Amortized Bound'' Xiaoyu Ji, Junru Li, Yifan Song
2026/468 (PDF ) Tighter Proofs for PKE-to-KEM Transformations under Average-Case Decryption Error and without $\gamma$-Spread Jinrong Chen, Rongmao Chen, Yi Wang, Haodong Jiang, Cong Peng, Xinyi Huang, Debiao He, Xiaofeng Chen
2026/467 (PDF ) A Note on the Equivalence Between Zero-knowledge and Quantum CSS Codes Noga Ron-Zewi, Mor Weiss
2026/466 (PDF ) Hashing in Generic Groups: Completing the AGM-to-GGM Transfer Taiyu Wang, Cong Zhang, Hong-Sheng Zhou, Xin Wang, Keyu Ji, Zhihong Jia, Li Lin, Changzheng Wei, Ying Yan, Kui Ren, Chun Chen
2026/465 (PDF ) Advanced cryptography from lattice isomorphism—new constructions of IBE and FHE Huck Bennett, Zhengnan Lai, Noah Stephens-Davidowitz
2026/464 (PDF ) Model Extraction of Convolutional Neural Networks with Max-Pooling Haolin Liu, Adrien Siproudhis, Christina Boura, Thomas Peyrin
2026/463 (PDF ) Icefish: Practical zk-SNARKs for Verifiable Genomics Alexander Frolov, Maurice Shih, Rob Patro, Ian Miers
2026/462 (PDF ) Semigroup Action Problems and Their Uses in Post-Quantum Cryptography Joachim Rosenthal, Silvia Sconza
2026/461 (PDF ) Compact HQC with new (un)balance Chaofeng Guan, Lan Luo, Haodong Jiang, Jianhua Hou, Tong Yu, Hong Wang, Kangquan Li, Longjiang Qu
2026/460 (PDF ) A Resource-Efficient Hardware Accelerator for Large-Size NTT via Algorithm–Architecture Co-Design Kaixuan Wang, Yifan Yanggong, Xiaoyu Yang, Chenti Baixiao, Lei Wang
2026/459 (PDF ) Naor-Yung Transform for IND-CCA Probing Security with Lattice Instantiations Katharina Boudgoust, Laurent Imbert, Loïc Masure, Laz Panard
2026/458 (PDF ) The Art of Linearization: From a KZG’s Trick to a General Commitment Framework Janno Siim
2026/457 (PDF ) Adaptively Secure, Universally Composable Distributed Generation of Discrete-Logarithm Based Keys Hanna Ek, Kelsey Melissaris, Lawrence Roy
2026/456 (PDF ) Libra: Pattern-Scheduling Co-Optimization for Cross-Scheme FHE Code Generation over GPGPU Song Bian, Yintai Sun, Zian Zhao, Haowen Pan, Mingzhe Zhang, Zhenyu Guan
2026/455 (PDF ) Asynchronous MPC with Abort Ananya Appan, David Heath, Ling Ren
2026/454 (PDF ) The principal ideal problem for endomorphism rings of superspecial abelian varieties Wouter Castryck, Jonathan Komada Eriksen, Riccardo Invernizzi, Frederik Vercauteren
2026/453 (PDF ) A Quantum-Safe Private Group System for Signal from Key Re-Randomizable Signatures Graeme Connell, Sebastian Faller, Felix Günther, Julia Hesse, Vadim Lyubashevsky, Rolfe Schmidt
2026/452 (PDF ) On the CCA security properties of a class of group-based linearly homomorphic encryption schemes Duong Hieu Phan, Renaud Sirdey, Jean Vacher
2026/451 (PDF ) Oblivious Single Access Machines are Concretely Efficient Sage Pia, Ananya Appan, Maryam Rezapour, Amey Shukla, Nikhil Date, Benjamin Fuller, Ling Ren, David Heath
2026/450 (PDF ) A flexible and polynomial framework for integer arithmetic in CKKS Lorenzo Rovida
2026/449 (PDF ) Short Signatures from DDH without Pairings or Random Oracles Dario Catalano, Valentina Frasca, Emanuele Giunta
2026/448 (PDF ) Interactive Proofs for Batch Polynomial Evaluation Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, Eylon Yogev
2026/447 (PDF ) Trace: Complete Client-Side Account Access Logging Paul Gerhart, Carolina Ortega Pérez, Thomas Ristenpart
2026/446 (PDF ) Survey of isogeny-based signature schemes resistant to Castryck–Decru attack J. S. Bobrysheva, A. S. Zelenetsky, V. V. Davydov
2026/445 (PDF ) Implementation of a post-quantum hybrid group key exchange protocol Tomáš Fabšič, Samuel Klement, Zoltán Raffay, Pavol Zajac
2026/444 (PDF ) Leakage-Diagrams, Importance Sampling, and Composition in the Random Probing Model Vahid Jahandideh, Bart Mennink, Lejla Batina
2026/443 (PDF ) PRISM with a pinch of salt: Simple, Efficient and Strongly Unforgeable Signatures from Isogenies Andrea Basso, Giacomo Borin, Wouter Castryck, Maria Corte-Real Santos, Riccardo Invernizzi, Antonin Leroux, Luciano Maino, Frederik Vercauteren, Benjamin Wesolowski
2026/442 (PDF ) Memory-Efficient Implementation of SMAUG-T and HAETAE Yulim Hyoung, Subeen Cho, Uijae Kim, Minwoo Lee, Hwajeong Seo, Minjoo Sim
2026/441 (PDF ) Fuzzy Private Set Intersection for Real-World Datasets Satvinder Singh, Yanxue Jia, Aniket Kate
2026/440 (PDF ) Performance Analysis of a Thread Pool-Based Parallel Execution Model for Hybrid Post-Quantum TLS 1.3 Handshakes Si-Woo Eum, Min-Ho Song, Hwa-Jeong Seo
2026/439 (PDF ) The OCH Authenticated Encryption Scheme Sanketh Menda, Mihir Bellare, Viet Tung Hoang, Julia Len, Thomas Ristenpart
2026/438 (PDF ) Updatable Private Set Intersection from Symmetric-Key Techniques Junxin Liu, Peihan Miao, Mike Rosulek, Xinyi Shi, Jifeng Wang
2026/437 (PDF ) Efficient Single-Server Stateful PIR Using Format-Preserving Encryption Pranav Shriram Arunachalaramanan, Ling Ren
2026/436 (PDF ) Post-Quantum Anonymous Signatures from the Lattice Isomorphism Group Action Chris van Noorden, Paola de Perthuis
2026/435 (PDF ) Information-Theoretic Strong Traceable Secret Sharing Schemes Oriol Farràs, Miquel Guiot
2026/434 (PDF ) Secure Cloud Storage: Modularization, Network Adversaries and Adaptive Corruptions Jonas Janneck, Doreen Riepel
2026/433 (PDF ) Round-Optimal Threshold Blind Signatures without Random Oracles Georg Fuchsbauer, Fabian Regen, Hoeteck Wee
2026/432 (PDF ) Finite Field Arithmetic for ML-KEM Using Zech's Logarithm Masaaki Shirase
2026/431 (PDF ) Revisiting the Security of Sparkle Ojaswi Acharya, Georg Fuchsbauer, Adam O'Neill, Marek Sefranek
2026/430 (PDF ) An attack on the CFS scheme and on TII McEliece challenges Magali Bardet, Axel Lemoine, Jean-Pierre Tillich
2026/429 (PDF ) Efficient Private Range Queries on Public Data Pranav Shriram Arunachalaramanan, Ananya Appan, David Heath, Ling Ren
2026/428 (PDF ) Defending Against Backdoor Attacks in Homomorphically Encrypted Federated Learning Ikhlas Mastour, Imane Haidar, Layth Sliman, Raoudha Ben Djemaa
2026/427 (PDF ) StarHunters— Secure Hybrid Post-Quantum KEMs From IND-CCA2 PKEs Deirdre Connolly, Mike Ounsworth, Sophie Schmieg, Douglas Stebila
2026/426 (PDF ) Post-Quantum Security of Keyed Sum of Permutations and Its Siblings Nilanjan Datta, Avijit Dutta, Sougata Mandal, Hrithik Nandi, Amlan Sinha
2026/425 (PDF ) Committing Security of BBB Secure MACs Sougata Mandal, Hrithik Nandi, Amlan Sinha
2026/424 (PDF ) CRISP: Circuit-pRivate Single-Image Steganography with Permutations Shahzad Ahmad, Stefan Rass
2026/423 (PDF ) Coppersmith's Method for Solving Modular Inversion Hidden Number Problem via Determinant-Based Elimination Zhaopeng Ding, Zhaopeng Dai, Baofeng Wu, Rundong Wang, Yanshuo Zhang
2026/422 (PDF ) Threshold Traitor Tracing Revisited: Insider Attacks and Multi-Traitor Tracing Jan Bormet, Sebastian Faust, Hussien Othman
2026/421 (PDF ) Cryptanalysis of Polynomial Learning With Errors (PLWE): A Survey Rahinatou Yuh Njah Nchiwo
2026/420 (PDF ) FALCON with message recovery, a specification Felix Gunther, Vadim Lyubashevsky, Rolfe Schmidt
2026/419 (PDF ) Hermine: An Efficient Lattice-based FROST-like Threshold Signature Giacomo Borin, Sofía Celi, Rafael del Pino, Thomas Espitau, Shuichi Katsumata, Guilhem Niot, Thomas Prest, Kaoru Takemure
2026/418 (PDF ) A White-Box Bootstrapping Approach for High Precision Comparison Over Homomorphic Encryption Deokhwa Hong, Heesoo Lee, Young-Sik Kim, Yongwoo Lee
2026/417 (PDF ) Tweed: Adaptively Secure Lattice-Based Two-Round Threshold Signatures Kaijie Jiang, Stefano Tessaro, Hoeteck Wee, Chenzhi Zhu
2026/416 (PDF ) An Ultra-Robust Privacy Preserving Scheme for Federated Learning using Distributed Homomorphic Encryption Ikhlas Mastour, Layth Sliman, Boussad Ait Salem, Balthazar Bauer, Raoudha Ben Djemaa, Kamel Barkaoui
2026/415 (PDF ) Separating Non-Interactive Classical Verification of Quantum Computation from Falsifiable Assumptions Mohammed Barhoush, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2026/414 (PDF ) Towards Practical Registered ABE: More Efficient, Non-monotone, and CCA-secure Yannis Rouselakis, Junichi Tomida
2026/413 (PDF ) On Best-Possible One-Time Programs Aparna Gupte, Jiahui Liu, Luowen Qian, Justin Raizes, Bhaskar Roberts, Mark Zhandry
2026/412 (PDF ) VisualDedup: Visual Fuzzy Deduplication for Secure Batch Duplicates Detection without Server Aided Shengke Zeng, Zehui Tang, Song Han, Mingxing He
2026/411 (PDF ) A Built-in Crypto Expert for Artificial Intelligence: How Far is the Horizon? Jiasi Weng, Jian Weng, Ming Li
2026/410 (PDF ) Collaborative Incrementally Verifiable Computation Eden Aldema Tshuva, Sanjam Garg, Abhiram Kothapalli, Rotem Oshman, Omkant Pandey, Bhaskar Roberts
2026/409 (PDF ) Cryptanalysis of Poseidon-Based Fiat-Shamir Protocols Hayk Hovhannisyan, Nerses Asaturyan, Gohar Hovhannisyan
2026/408 (PDF ) Smoothing the degree of regularity for polynomial systems Samuel Jaques, Lars Ran, Simona Samardjiska, Melvin Seitner
2026/407 (PDF ) On the Binding Security of KEMs based on RSA and DH Juliane Krämer, Maximiliane Weishäupl, Stefan Winderl
2026/406 (PDF ) Putting the OPTI in Round Optimal IA-MPC in the Plain Model Yashvanth Kondi, Divya Ravi, Jure Sternad, Sophia Yakoubov
2026/405 (PDF ) Group Encryption with Oblivious Traceability Khoa Nguyen, Yanhong Xu, Nam Tran, Willy Susilo, Huaxiong Wang
2026/404 (PDF ) Ultra short signatures with Dragon $HFE_{LL'}$ Jacques Patarin, Jan Vacek
2026/403 (PDF ) On the Need for (Quantum) Memory with Short Outputs Zihan Hao, Zikuan Huang, Qipeng Liu
2026/402 (PDF ) Conditionally Linkable Attribute-Based Signatures Minh Pham, Khoa Nguyen, Slim Bettaieb, Mukul Kulkarni, Willy Susilo
2026/401 (PDF ) NIROPoK-Based Post-Quantum Sidechain Design on Ethereum Hassan Khodaiemehr, Khadijeh Bagheri, Saeid Yazdinejad, Chen Feng
2026/400 (PDF ) Non-interactive Blind Signatures with Threshold Issuance Foteini Baldimtsi, Lucjan Hanzlik, Aayush Yadav
2026/399 (PDF ) What a Wonderful World: zkSNARKs in the Algebraic Group Model are Universally Composable Gaspard Anthoine, Dario Fiore, Mahak Pancholi
2026/398 (PDF ) Orthus: Practical Sublinear Batch-Verification of Lattice Relations from Standard Assumptions Madalina Bolboceanu, Jonathan Bootle, Vadim Lyubashevsky, Antonio Merino-Gallardo, Gregor Seiler
2026/397 (PDF ) Bittersweet Signatures: Bringing LWR to a Picnic for Hardware-Friendly MPC-in-the-Head Brieuc Balon, Gianluca Brian, Sebastian Faust, Carmit Hazay, Elena Micheli, François-Xavier Standaert
2026/396 (PDF ) Anonymity of X-Wing and its Variants Jiawei Bao, Jiaxin Pan
2026/395 (PDF ) How To Make Delegated Payments on Bitcoin: A Question for the AI Agentic Future Jay Taylor, Paul Gerhart, Sri AravindaKrishnan Thyagarajan
2026/394 (PDF ) SQISign on ARM Luca De Feo, Li-Jie Jian, Ting-Yuan Wang, Bo-Yin Yang
2026/393 (PDF ) VROOM: Accelerating (Almost All) Number-Theoretic Cryptography Using Vectorization and the Residue Number System Simon Langowski, Kaiwen He, Srinivas Devadas
2026/392 (PDF ) Fast cube roots in Fp2 via the algebraic torus Youssef El Housni
2026/391 (PDF ) Zero-Knowledge IOPPs for Constrained Interleaved Codes Alessandro Chiesa, Giacomo Fenzi, Guy Weissenberg
2026/390 (PDF ) Succinct Arguments for BatchQMA and Friends under 6 Rounds Rishab Goyal, Aditya Jain, Shashwatha Mitra GB
2026/389 (PDF ) Towards Accountability for Anonymous Credentials Shailesh Mishra, Martin Burkhart
2026/388 (PDF ) Necessary and Sufficient Conditions for the Existence of Ideal Linear Secret Sharing Schemes for Arbitrary Access Structures Zheng Chen, Qiuxia Xu, Chunming Tang
2026/387 (PDF ) A Comprehensive Break of the Tropical Matrix-Based Signature Scheme Sopan Chavhan, Shrikant Chaudhari
2026/386 (PDF ) Determining those Boolean functions whose restrictions to affine spaces are plateaued Claude Carlet, Darrion Thornburgh
2026/385 (PDF ) Bridging Privacy and Utility: A Verifiable Framework for Data Valuation via Zero-Knowledge Proofs Ruibang Liu, Minyu Chen, Dengji Ma, Guoqiang Li
2026/384 (PDF ) The Structured Generic-Group Model Henry Corrigan-Gibbs, Alexandra Henzinger, David J. Wu
2026/383 (PDF ) HCTR$^{++}$ : A Beyond Birthday Bound Secure HCTR2 Variant Gülnihal Öztürk, Onur Koçak, Oğuz Yayla
2026/382 (PDF ) Multi-key Security in the Quantum World: Revisiting Tweakable Even-Mansour and FX Rentaro Shiba, Tetsu Iwata
2026/381 (PDF ) Multi-Committee MPC: From Unanimous to Identifiable Abort Lichun Li, Hongqing Liu, Jiawei Ni, Chaoping Xing, Chen Yuan
2026/380 (PDF ) Lattice HD Wallets: Post-Quantum BIP32 Hierarchical Deterministic Wallets from Lattice Assumptions Conor Deegan, James Fitzwater, Kamil Doruk Gur, David Nugent
2026/379 (PDF ) Pairing-based Functional Commitments for Circuits with Shorter Parameters David Balbás, Dario Fiore, Russell W. F. Lai
2026/378 (PDF ) Information-Theoretic Network-Agnostic MPC with Polynomial Communication Xiaoyu Ji, Chen-Da Liu-Zhang, Daniel Pöllmann, Yifan Song
2026/377 (PDF ) Perfectly Secure Network-Agnostic MPC Comes for Free Xiaoyu Ji, Chen-Da Liu-Zhang, Yifan Song
2026/376 (PDF ) Is PSI Really Faster Than PSU? Achieving Efficient PSU with Invertible Bloom Filters Lucas Piske, Ni Trieu
2026/375 (PDF ) Liquid Democracy With Two Opposing Factions Krishnendu Chatterjee, Seth Gilbert, Stefan Schmid, Jakub Svoboda, Michelle Yeo
2026/374 (PDF ) WOTS-Tree: Merkle-Optimized Winternitz Signatures for Post-Quantum Bitcoin Javier Mateos
2026/373 (PDF ) Partially Non-Interactive Two-Round Threshold and Multi-Signatures with Tighter and Adaptive Security Yanbo Chen
2026/372 (PDF ) Distributed Monotone-Policy Encryption with Silent Setup from Lattices Abtin Afshar, Rishab Goyal, Saikumar Yadugiri
2026/371 (PDF ) A Modular Approach to Succinct Arguments for QMA James Bartusek, Jiahui Liu, Giulio Malavolta
2026/370 (PDF ) Round-Optimal Byzantine Agreement without Trusted Setup Diana Ghinea, Ivana Klasovitá, Chen-Da Liu-Zhang
2026/369 (PDF ) Issuer-Hiding for BBS Anonymous Credentials via Randomizable Keys Andrea Flamini, Karla Friedrichs, Anja Lehmann
2026/368 (PDF ) Additions, Multiplications, and the Interaction In-Between: Optimizing MPC Protocols via Leveled Linear Secret Sharing Andreas Brüggemann, Thomas Schneider, Maximilian Stillger
2026/367 (PDF ) High-Precision Functional Bootstrapping for CKKS from Fourier Extension Song Bian, Yunhao Fu, Ruiyu Shen, Haowen Pan, Anyu Wang, Zhenyu Guan
2026/366 (PDF ) Careful with the Ring: Enhanced Hybrid Decoding Attacks against Module/Ring-LWE Jianhua Hou, Haodong Jiang
2026/365 (PDF ) Cube and Integral Attacks on ChiLow-32 Shuo Peng, Akram Khalesi, Zahra Ahmadian, Hosein Hadipour, Jiahui He, Kai Hu, Zhongfeng Niu, Shahram Rasoolzadeh, Meiqin Wang
2026/364 (PDF ) SPRINT: New Isogeny Proofs of Knowledge and Isogeny-Based Signatures Thomas den Hollander, Shai Levin, Marzio Mula, Robi Pedersen, Daniel Slamanig, Sebastian A. Spindler
2026/363 (PDF ) LazyArc: Dynamic Out-of-Order Engine for High-Throughput FHE Omar Ahmed, Nektarios Georgios Tsoutsos
2026/362 (PDF ) Janus-FHE: A Side Channel Resilient Framework for High-Degree Homomorphic Encryption on GPUs Kashfia Farheen, Nektarios Georgios Tsoutsos
2026/361 (PDF ) Scytale: A Compiler Framework for Accelerating TFHE with Circuit Bootstrapping Rostin Shokri, Nektarios Georgios Tsoutsos
2026/360 (PDF ) Improved preprocessing for the Crossbred algorithm and application to the MQ problem Damien Vidal, Claire Delaplace, Sorina Ionica
2026/359 (PDF ) Cyclo: Lightweight Lattice-based Folding via Partial Range Checks Albert Garreta, Helger Lipmaa, Urmas Luhaäär, Michał Osadnik
2026/358 (PDF ) Round-Based Approximation of (Higher-Order) Differential-Linear Correlation Kai Hu, Zhongfeng Niu, Meiqin Wang
2026/357 (PDF ) Simulating Noisy Leakage with Bounded Leakage: Simpler, Better, Faster Julien Béguinot, Ananta Mukherjee, Maciej Obresmki, João Ribeiro, Lawrence Roy, François-Xavier Standaert, Daniele Venturi
2026/356 (PDF ) Publicly Certifiable Min-Entropy Without Quantum Communication Ofer Casper, Barak Nehoran, Or Sattath
2026/355 (PDF ) Forget-IT: Optimal Good-Case Latency For Information-Theoretic BFT Ittai Abraham, Sourav Das, Yuval Efron, Jovan Komatovic
2026/354 (PDF ) Structural Collapse of the Amutha-Perumal Scheme Based on Duo Circulant Matrices Sopan Chavhan, Shrikant Chaudhari
2026/353 (PDF ) Dual-Syncopation Meet-in-the-Middle Attacks: New Results on SHA-2 and MD5 Jian Guo, Haoran Li, Meicheng Liu, Shichang Wang, Tianyu Zhang
2026/352 (PDF ) Migrating Bitcoin and Ethereum Addresses to the Quantum Blockchain Era Mehmet Sabir Kiraz, Suleyman Kardas
2026/351 (PDF ) Lie algebras and the security of cryptosystems based on classical varieties in disguise Wouter Castryck, Mingjie Chen, Péter Kutas, Jun Bo Lau, Alexander Lemmens, Mickael Montessinos
2026/350 (PDF ) Hybridization of Cryptographic Primitives: A Generalized Framework for Adaptive Security Zahra Seyedi, Eckhard Pfluegel, Shahzad Ahmad, Willie Kouam, Stefan Rass
2026/349 (PDF ) Multipath PA-PUFs generate all Boolean functions R Radheshwar, Dibyendu Roy, Pantelimon Stanica
2026/348 (PDF ) Provable Security and Privacy Analysis of WPA3's SAE and SAE-PK Protocols Shan Chen, Kaige Pan, Olga Sanina
2026/347 (PDF ) Relaxed Modular PCS from Arbitrary PCS and Applications to SNARKs for Integers Alireza Shirzad, Sriram Sridhar, Dimitrios Papadopoulos, Charalampos Papamanthou
2026/346 (PDF ) Lighthouse: Single-Server Secure Aggregation with $O(1)$ Server-Committee Communication at Scale Sanjam Garg, Alireza Kavousi, Dimitris Kolonelos, Erkan Tairi, Zhipeng Wang
2026/345 (PDF ) Zebra: Arithmetic Garbled RAM for Large Words from DCR Tianyao Gu, Ashrujit Ghoshal, Elaine Shi
2026/344 (PDF ) Area-Efficient LUT-Based Multipliers for AMD Versal FPGAs Zetao Miao, Xander Pottier, Jonas Bertels, Wouter Legiest, Ingrid Verbauwhede
2026/343 (PDF ) PaCMan - Partition-Code Masking for Combined Security Fabian Buschkowski, Jakob Feldtkeller, Tim Güneysu, Elisabeth Krahmer, Jan Richter-Brockmann, Pascal Sasdrich
2026/342 (PDF ) Improved Reduction from RLWE to MP-LWE Rahinatou Yuh Njah Nchiwo, Alice Pellet-Mary
2026/341 (PDF ) Syndrome Decoding with Hints Letizia D'Achille, Andre Esser, Nicolai Kraus
2026/340 (PDF ) Improving Neural-Inspired Integral Distinguishers via a Linear-Algebraic Approach Yunjae Hwang, Insung Kim, Sunyeop Kim, Myungkyu Lee, Hanbeom Shin, Deukjo Hong, Seokhie Hong, Dongjae Lee, Jaechul Sung, Byoungjin Seok
2026/339 (PDF ) $\mathsf{Spectra}$: Interval-Agnostic Vector Range Argument for Unstructured Range Assertions Hao Gao, Qianhong Wu, Bo Qin, Fudong Wu, Zhenyang Ding, Zhiguo Wan
2026/338 (PDF ) Is it Really Broken? The Failure of DL-SCA Scoring Metrics under Non-Uniform Priors Nathan Rousselot, Karine Heydemann, Loïc Masure, Vincent Migairou, Rémi Strullu
2026/337 (PDF ) Efficient, UC-secure and Publicly Auditable MPC from OLE & VOLE-in-the-head Carsten Baum, Chiara-Marie Zok
2026/336 (PDF ) How to Build a Short-Input Random Oracle from Public Random Permutations Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Ashwin Jha, Sougata Mandal, Bart Mennink, Hrithik Nandi, Yaobin Shen
2026/335 (PDF ) Sumcheck-based zkSNARKs are Non-Malleable Antonio Faonio, Luigi Russo
2026/334 (PDF ) Tripling on Hessian curves via isogeny decomposition Thomas Decru, Sabrina Kunzweiler
2026/333 (PDF ) A Cryptographic Framework for Proof of Personhood Arka Rai Choudhuri, Sanjam Garg, Keewoo Lee, Hart Montgomery, Guru Vamsi Policharla, Rohit Sinha
2026/332 (PDF ) Cost-Layer–Blind Hybrid QAOA for MAX K-CUT via Native MBQC and Selective Graph Masking Doyoung Chung, Youngkyung Lee, Juyoung Kim
2026/331 (PDF ) Non-Trivial Zero-Knowledge Implies One-Way Functions Suvradip Chakraborty, James Hulett, Dakshita Khurana, Kabir Tomer
2026/330 (PDF ) SoK: Anonymous Credentials for Digital Identity Wallets Christian Bormann, Anja Lehmann
2026/329 (PDF ) Oblivious Ciphertext Compression via Linear Codes Pascal Giorgi, Bruno Grenet, Mark Simkin
2026/328 (PDF ) NeuralCPA: A Deep Learning Perspective on Chosen-Plaintext Attacks Xuanya Zhu, Liqun Chen, Yangguang Tian, Gaofei Wu, Xiatian Zhu
2026/327 (PDF ) Breaking digital signatures from tropical matrix semirings Alessandro Sferlazza
2026/326 (PDF ) Special Soundness and Binding Properties: A Framework for Tightly Secure zk-SNARKs Erki Külaots, Helger Lipmaa, Roberto Parisella, Janno Siim
2026/325 (PDF ) eDAS: Extending Data Availability Sampling with Privacy and Compliance Isobel Watkins, Nicolas Mohnblatt, Philipp Jovanovic
2026/324 (PDF ) FLiPD: Privacy-Preserving Federated Learning via Multi-Party Computation and Differential Privacy Gowri R Chandran, Melek Önen, Thomas Schneider
2026/323 (PDF ) Cryptokinetics Hadrien Barral, David Naccache, Aleksa Veličković
2026/322 (PDF ) Multi-key Fully Homomorphic Encryption with Non-Interactive Setup in the Plain Model Seonhong Min, Jeongeun Park, Yongsoo Song
2026/321 (PDF ) Sliced Rényi Pufferfish Privacy: Tractable Privatization Mechanism and Private Learning with Gradient Clipping Tao Zhang, Yevgeniy Vorobeychik
2026/320 (PDF ) Statistically Secure Asynchronous MPC with Linear Communication and $\mathcal{O}(n^5)$ Additive Overhead Xiaoyu Ji, Yifan Song
2026/319 (PDF ) New Techniques for Information-Theoretic Asynchronous MPC with Abort Xiaoyu Ji, Yifan Song
2026/318 (PDF ) Distributed Monotone-Policy Encryption for DNFs from Lattices Jeffrey Champion, David J. Wu
2026/317 (PDF ) Two-Factor Authentication Can Harden Servers Against Offline Password Search Xavier Boyen, Stanislaw Jarecki, Phillip Nazarian, Jiayu Xu, Tianyu Zheng
2026/316 (PDF ) GG-GSW: Chosen-Ciphertext Secure Leveled FHE From Gadget Trapdoors Jérôme Nguyen
2026/315 (PDF ) Proving Knowledge of Syndrome Decoding Problems with Soundness Felice Manganiello, Freeman Slaughter
2026/314 (PDF ) Understanding Multi-Query Attacks on Key-Then-Hash Functions Jonathan Fuchs
2026/313 (PDF ) On the Equivalence of Forgery and Key Recovery in Key-Then-Hash Functions Jonathan Fuchs
2026/312 (PDF ) RISQrypt: Fast, Secure and Agile Hardware-Software Co-Design for Post-Quantum Cryptography Tolun Tosun, Atıl Utku Ay, Quinten Norga, Suparna Kundu, Melik Yazıcı, Erkay Savaş, Ingrid Verbauwhede
2026/311 (PDF ) Security of the Fischlin Transform in Quantum Random Oracle Model Christian Majenz, Jaya Sharma
2026/310 (PDF ) Bolt: Faster SNARKs from Sketched Codes Kobi Gurkan, Andrija Novakovic, Ron D. Rothblum
2026/309 (PDF ) Hash Function Constructions from Lightweight Block Ciphers for Fully Homomorphic Encryption Olivier Bernard, Marc Joye
2026/308 (PDF ) Anamorphic E-Voting: Coercion-Resistant Through Fake and Real Votes Antonis Michalas
2026/307 (PDF ) Composition Theorems for Zero-Knowledge IOPs Himanshu Vashishth, Mor Weiss
2026/306 (PDF ) Skipping Class: Algebraic Attacks exploiting weak matrices and operation modes of Poseidon2(b) Simon-Philipp Merz, Àlex Rodríguez García
2026/305 (PDF ) Quantum Truncated Differential Attacks using Convolutions Aurel Pichollet--Mugnier, André Schrottenloher
2026/303 (PDF ) $\mathsf{TalonG}$: Bandwidth-Efficient Two-Round Threshold Signatures from Lattices Liming Gao, Guofeng Tang, Dingding Jia, Yijian Liu, Bingqian Liu, Xianhui Lu, Kunpeng Wang, Yongjian Yin
2026/302 (PDF ) Non Interactive MPC, (Quantumly) Revisited Prabhanjan Ananth, Divyanshu Bhardwaj, Aparna Gupte
2026/301 (PDF ) Blind Leakage: Rethinking Deep Learning-based Non-Profiled Side-Channel Analysis Jintong Yu
2026/300 (PDF ) Quantum One Time Programs: Less Assumptions, More Feasibility and One Message 2PC Prabhanjan Ananth, Divyanshu Bhardwaj
2026/299 (PDF ) Weak Zero-Knowledge and One-Way Functions Rohit Chatterjee, Yunqi Li, Prashant Nalini Vasudevan
2026/298 (PDF ) Key Recovery Attacks on UOV Using p^l-truncated Polynomial Rings Hiroki Furue, Yasuhiko Ikematsu
2026/297 (PDF ) Scaling Sparse Matrix Computation for Secure Outsourced Computing Wujie Xiong, Hao Zhou, Yutong Ye, Ruoming Jin, Lei Xu
2026/296 (PDF ) Navigating the Deep: End-to-End Extraction on Deep Neural Networks Haolin Liu, Adrien Siproudhis, Samuel Experton, Peter Lorenz, Christina Boura, Thomas Peyrin
2026/295 (PDF ) From OT to OLE with Almost-Linear Communication Geoffroy Couteau, Naman Kumar
2026/294 (PDF ) Post-Quantum Adaptor Signatures with Strong Security from Cryptographic Group Actions Ryann Cartor, Nathan Daly, Giulia Gaggero, Jason T. LeGrow, Andrea Sanguineti, Silvia Sconza
2026/293 (PDF ) Quantum Oracle Distribution Switching and its Applications to Fully Anonymous Ring Signatures Marvin Beckmann, Christian Majenz
2026/292 (PDF ) Crossing with Confidence: Formal Analysis and Model Checking of Blockchain Bridges Pyrros Chaidos, Pooya Farshim, Denis Firsov, Dimitar Jetchev, Aggelos Kiayias, Markulf Kohlweiss, Anca Nitulescu
2026/291 (PDF ) Tight Reductions for SIS-with-Hints Assumptions with Applications to Anonymous Credentials Ngoc Khanh Nguyen, Jan Niklas Siemer
2026/290 (PDF ) Improved Cryptanalysis of HFERP Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone
2026/289 (PDF ) Zero-Knowledge Proof-Carrying Data from Accumulation Schemes Tianyu Zheng, Shang Gao, Xun Liu
2026/288 (PDF ) Bypassing the Random-Probing Model in Masking Security Proofs Julien Béguinot, Gianluca Brian, Loïc Masure
2026/287 (PDF ) Network-Agnostic Multidimensional Approximate Agreement with Optimal Resilience Diana Ghinea, Darya Melnyk, Tijana Milentijević
2026/286 (PDF ) Upper Bound on Information-Theoretic Security of Permutation-Based Pseudorandom Functions Chun Guo, Jian Guo, Xinnian Li, Wenjie Nan
2026/285 (PDF ) How (not) to Switch FHE Schemes: Framework and Attacks in the IND-CPA-D Model Giacomo Santato, Riccardo Zanotto
2026/284 (PDF ) Knowledge Soundness of Polynomial Commitments in the Algebraic Group Model Does Not Guarantee Extractability Petr Chmel, Pavel Hubáček, Dominik Stejskal
2026/283 (PDF ) Malicious Security Comes Free in SPDZ Junru Li, Yifan Song
2026/282 (PDF ) Unforgeable Watermarks for Language Models via Robust Signatures Huijia Lin, Kameron Shahabi, Min Jae Song
2026/281 (PDF ) Do Androids Dream of a Dead Internet: Interactive Watermarks for Bot Detection Brennon Brimhall, Harry Eldridge, Maurice Shih, Ian Miers, Matthew Green
2026/280 (PDF ) Reducing the Number of Qubits in Quantum Discrete Logarithms on Elliptic Curves Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher
2026/279 (PDF ) On the Concrete Hardness Gap Between MLWE and LWE Tabitha Ogilvie
2026/278 (PDF ) Exploiting PDF Obfuscation in LLMs, arXiv, and More Zhongtang Luo, Jianting Zhang, Zheng Zhong
2026/277 (PDF ) Collusion-Minimized TLS Attestation Protocol for Decentralized Applications Uğur Şen, Murat Osmanoğlu, Oğuz Yayla, Ali Aydın Selçuk, Ali Doğanaksoy
2026/276 (PDF ) On the conversion of module representations for higher dimensional supersingular isogenies Aurel Page, Damien Robert, Julien Soumier
2026/275 (PDF ) PhantomCrypt: Second-Order Deniable Encryption with Post-Quantum Security Shahzad Ahmad, Stefan Rass, Zahra Seyedi
2026/274 (PDF ) From linear regression to generative model for explainable non profiled side-channel attacks Sana Boussam, Mathieu Carbone, Benoît Gérard, Guénaël Renault, Gabriel Zaid
2026/273 (PDF ) Weighted Cryptography with Weight-Independent Complexity Aarushi Goel, Swagata Sasmal, Mingyuan Wang
2026/272 (PDF ) On the Complexity of Interactive Arguments Idan Baril, Iftach Haitner
2026/271 (PDF ) Defining Quantum-Secure Message Authentication Ashwin Jha, Mustafa Khairallah, Jannis Leuther, Stefan Lucks
2026/270 (PDF ) Pseudorandomness of Knapsacks over a Number Ring Biswajit Mandal, Shashank Singh
2026/269 (PDF ) Exact Error Analysis for Blind Rotation in Fully Homomorphic Encryption Sin Kim, Seunghwan Lee, Dohyuk Kim, Dong-Joon Shin
2026/268 (PDF ) One Pair to Rule Them All: An Optimal Algorithm for Solving Code Equivalence via Codeword Search Alessandro Budroni, Andre Esser
2026/267 (PDF ) Beyond the Linear Barrier: Secret Sharing for Evolving (Weighted) Threshold Access Structures with Poly-logarithmic Share Size Danilo Francati, Sara Giammusso, Daniele Venturi
2026/266 (PDF ) UltraFold: Efficient Distributed BaseFold from Packed Interleaved Merkle Trees Wenhao Wang, Fan Zhang
2026/265 (PDF ) Catalytic Tree Evaluation From Matching Vectors Alexandra Henzinger, Edward Pyne, Seyoon Ragavan
2026/264 (PDF ) WillowFold: Secure Aggregation with a Lightweight Committee Hossein Hafezi, Kasra Abbaszadeh, Adrià Gascón, Phillipp Schoppmann, Mariana Raykova, Benedikt Bünz
2026/263 (PDF ) Compact and Statistical NIZK Proofs of Knowledge for Disjunctions from $\Sigma$-Protocols Gennaro Avitabile, Luisa Siniscalchi, Ivan Visconti
2026/262 (PDF ) Fuzzy Private Set Intersection from Density-Bounded Assumptions Seunghun Paik, Jae Hong Seo
2026/261 (PDF ) Logarithmic-Depth Pseudorandom Functions from Well-Founded Code-Based Assumptions Youlong Ding, Aayush Jain, Ilan Komargodski
2026/260 (PDF ) Investigating the Wedge Map on SNOVA Po-En Tseng, Lih-Chung Wang, Peigen Li, Yen-Liang Kuan
2026/259 (PDF ) Blockchain Stacking Fraud and Deterrence Tong Cao, Man Ho Au, Xiapu Luo
2026/258 (PDF ) Lightning, Field-Agnostic Super-Efficient Polynomial Commitment Scheme Wenjie Qu, Yanpei Guo, Jiaheng Zhang
2026/257 (PDF ) Dishonest-Majority Secure Computation via PIR-Authenticated Multiplication Triples Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Ariel Nof
2026/256 (PDF ) Adams Bridge Accelerator: Bridging the Post-Quantum Transition Mojtaba Bisheh-Niasar, Emre Karabulut, Kiran Upadhyayula, Michael Norris, Bharat Pillilli
2026/255 (PDF ) On Compressing Non-Additive Correlations Geoffroy Couteau, Alexander Koch, Nikolas Melissaris, Peter Scholl, Sacha Servan-Schreiber, Xiaxi Ye
2026/254 (PDF ) Key Committing Security of HCTR2, Revisited Donghoon Chang, Yu Long Chen, Yukihito Hiraga, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2026/253 (PDF ) Cryptanalytic Extraction of Deep Neural Networks with Non-Linear Activations Roderick Asselineau, Patrick Derbez, Pierre-Alain Fouque, Brice Minaud
2026/252 (PDF ) At-Compromise Security: The Case for Alert Blindness Martin R. Albrecht, Simone Colombo, Benjamin Dowling, Rikke Bjerg Jensen
2026/251 (PDF ) OpenAC: Open Design for Transparent and Lightweight Anonymous Credentials Liam Eagen, Hy Ngo, Vikas Rushi, Ying Tong, Moven Tsai, Janabel Xia
2026/250 (PDF ) On the Concrete Hardness of LWR with a Power of Two Modulus Jules Baudrin, Rachelle Heim Boissier, François-Xavier Standaert
2026/249 (PDF ) Have Your CKAKE and Eat it, Too: Efficient, Composable KEM-Authenticated Key Exchange Myrto Arapinis, Christopher Battarbee, Mina Doosti
2026/248 (PDF ) Lightweight PQ KEM and Hybrid MQTT Protocol for 8-bit AVR Sensor Nodes Yifan Dong, YoungBeom Kim, Jieyu Zheng, Zhichuang Liang, Boyue Fang, Seog Chung Seo, Maire O'Neill, Yunlei Zhao
2026/247 (PDF ) Efficient Pairing-Based Batch Arguments for NP with a Constant-Size Proof Zhe Jiang, Kai Zhang, Junqing Gong, Haifeng Qian
2026/246 (PDF ) Highly Efficient and Round-Optimal Asymmetric PAKE Zachary Barbanell, Jiayu Xu
2026/245 (PDF ) A note on adversary running times Amit Sahai
2026/244 (PDF ) Revisit Unravelled Linearization with Erhart (quasi-)Polynomial Yansong Feng, Yiming Gao, Honggang Hu, Abderrahmane Nitaj, Yanbin Pan, Mengce Zheng
2026/243 (PDF ) Towards Making Doubly-Efficient PIR Practical Pan Xiao, Heng Zhang, Rending Ouyang, Cong Zhang, Jian Liu, Kui Ren, Chun Chen
2026/242 (PDF ) Neo and SuperNeo: Post-quantum folding with pay-per-bit costs over small fields Wilson Nguyen, Srinath Setty
2026/241 (PDF ) Algebraic Attack on Convolutional Neural Network with Max Pooling Zirui Chen, Shi Tang, Zhengchao Gao, Yongjia Su, Lingyue Qin, Xiaoyang Dong
2026/240 (PDF ) Do not Mix Models: Revisiting Generic Transforms for Committing Authenticated Encryption Kazuhiko Minematsu, Akiko Inoue
2026/239 (PDF ) Optimal Best-of-Both-Worlds Consensus Fatima Elsheimy, Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen
2026/238 (PDF ) PAC-Private Databases Mayuri Sridhar, Michael A. Noguera, Chaitanyasuma Jain, Kevin Kristensen, Srinivas Devadas, Hanshen Xiao, Xiangyao Yu
2026/237 (PDF ) Exploiting SNOVA’s Structure in the Wedge Product Attack Maxime Bros, Thai Hung Le, Jacob Lichtinger, Brice Minaud, Ray Perlner, Daniel Smith-Tone, Cristian Valenzuela
2026/236 (PDF ) Sharing a Secret Anamorphically: Secret Shares Dressed Up as Signatures Gennaro Avitabile, Vincenzo Botta, Daniele Friolo
2026/235 (PDF ) Optimized Implementations of Keccak, Kyber, and Dilithium on the MSP430 Microcontroller DongHyun Shin, YoungBeom Kim, Ayesha Khalid, Máire O'Neill, Seog Chung Seo
2026/234 (PDF ) When Trying to Catch Cheaters Breaks the MPC: Breaking and Fixing Delayed Consistency Checks in Trident, Fantastic Four, SWIFT, and Quad (Full Version) Andreas Brüggemann, Thomas Schneider
2026/233 (PDF ) FHE for SIMD Arithmetic Logic Units with Amortized $O(1)$ Bootstrapping per Ciphertext Mingyu Gao, Hongren Zheng
2026/232 (PDF ) Collision Attacks on SHA-256 up to 37 Steps with Improved Trail Search Zhuolong Zhang, Muzhou Li, Lei Gao, Meiqin Wang
2026/231 (PDF ) RAGtime-PIANO: Efficient Secure Remote RAG Antonia Januszewicz, Jiachen Zhao, Meng Jiang, Taeho Jung
2026/230 (PDF ) Rule Variant Restrictions for the Tamarin Prover Felix Linker
2026/229 (PDF ) ANIMAGUS: A Provably Secure Accordion Mode of Operation Gülnihal Öztürk, Onur Koçak, Oğuz Yayla
2026/228 (PDF ) SCA-MQDSA: Side-Channel Analysis of Multivariate Digital Signature Implementations N.K. Vishwaajith, Anindya Ganguly, Debranjan Pal, Trevor Yap, Puja Mondal, Suparna Kundu, Sayandeep Saha, Shivam Bhasin, Ingrid Verbauwhede, Angshuman Karmakar
2026/227 (PDF ) Analysis and Vulnerabilities in zkLogin Sofia Celi, Hamed Haddadi, Kyle Den Hartog
2026/226 (PDF ) Round-Optimal Identity-Based Blind Signature from Module Lattice Assumptions Arup Mazumder, Mrittika Nandi, Shashank Singh
2026/225 (PDF ) Solving SIS in any norm via Gaussian sampling Maiara F. Bollauf, Amaury Pouly, Yixin Shen
2026/224 (PDF ) Usage of Mixed Integer Linear Programming in Cryptanalysis of Block Ciphers Halil İbrahim Kaplan
2026/223 (PDF ) Nested MuSig2 Nadav Kohen
2026/222 (PDF ) ITSAKE: an unconditionally secure authenticated key establishment protocol Pierre-Alain Jacqmin, Jean Liénardy
2026/221 (PDF ) Spinel: A Post-Quantum Signature Scheme Based on $\mathrm{SL}_n(\mathbb{F}_p)$ Hashing Asmaa Cherkaoui, Faraz Heravi, Delaram Kahrobaei, Siamak F. Shahandashti
2026/220 (PDF ) Optimizing Differential Privacy in Federated Analytics under Known Input Distributions Ferran Alborch, Andreas Athanasiou, Pascal Reisert
2026/219 (PDF ) $\phi(n)$-evaluation algorithm: a novel approach for an efficient retrieval of Euler's totient of an RSA Modulus Jay Mehta, Hitarth Rana
2026/218 (PDF ) Isochronous Fixed-Weight Sampling in Hardware Adrian Marotzke
2026/217 (PDF ) Cavefish: Communication-Optimal Light Client Protocol for UTxO Ledgers Aggelos Kiayias, Marc Roeschlin, Polina Vinogradova, Pyrros Chaidos
2026/216 (PDF ) ECHO: Efficient Covertly-Secure Three-party Computation with Applications to Private Machine Learning Yufei Duan, Yun Li, Zhicong Huang, Cheng Hong, Tao Wei, Chao Zhang
2026/215 (PDF ) Endomorphisms via splittings Sabrina Kunzweiler, Min-Yi Shen
2026/214 (PDF ) Cavern: Efficient Honest-Majority Maliciously Secure $(2+1)$-PC for $\mathbb{Z}_{2^n}$ via DPF Yang Liu, Liang Feng Zhang
2026/213 (PDF ) Orbit: Optimizing Rescale and Bootstrap Placement with Integer Linear Programming Techniques for Secure Inference Zikai Zhou, William Seo, Edward Chen, Alex Ozdemir, Fraser Brown, Wenting Zheng
2026/212 (PDF ) PANCAKE: A SNARK with Plonkish Constraints, Almost-Free Additions, No Permutation Check, and a Linear-Time Prover Yuxi Xue, Peimin Gao, Xingye Lu, Man Ho Au
2026/211 (PDF ) A Generalized $\chi_n$-Function Cheng Lyu, Mu Yuan, Dabin Zheng, Siwei Sun, Shun Li
2026/210 (PDF ) How to Classically Verify a Quantum Cat without Killing It Yael Tauman Kalai, Dakshita Khurana, Justin Raizes
2026/209 (PDF ) Post-Quantum Security of Block Cipher Constructions Gorjan Alagic, Chen Bai, Christian Majenz, Kaiyan Shi
2026/208 (PDF ) eVer: Universal and Automated Verification of Side-Channel Security for Additive, Inner Product, Polynomial and General Code-Based Masking Marc Gourjon, Maximilian Orlt, Pajam Pauls, Alexander Treff
2026/207 (PDF ) $\mathsf{SoK}$: On Cryptography for Multi-Cloud Storage Dayane Horkos, Ludovic Perret
2026/206 (PDF ) MPSpeed: Implementing and Optimizing MPC-in-the-Head Digital Signatures in Hardware Stelios Manasidis, Quinten Norga, Suparna Kundu, Ingrid Verbauwhede
2026/205 (PDF ) Differential-Linear Attacks from New Distinguishers: the case of SERPENT and PRESENT Thierno Mamoudou Sabaly, Marine Minier
2026/204 (PDF ) Malicious Private Set Union with Two-Sided Output Sihang Pu, Jiahui Gao, Ni Trieu
2026/203 (PDF ) Impossibility of CPAD security for a class of FHE schemes Marina Checri, Pierre-Emmanuel Clet, Marc Renard, Renaud Sirdey
2026/202 (PDF ) ZKBoost: Zero-Knowledge Verifiable Training for XGBoost Nikolas Melissaris, Jiayi Xu, Antigoni Polychroniadou, Akira Takahashi, Chenkai Weng
2026/201 (PDF ) On Lifting AGM Security to AGM with Oblivious Sampling Juraj Belohorec, Pavel Hubáček, Dominik Stejskal
2026/200 (PDF ) Plonk Without Random Oracles Georg Fuchsbauer, Marek Sefranek
2026/199 (PDF ) zkAgent: Verifiable Agent Execution via One-Shot Complete LLM Inference Proof Lizheng Wang, Hancheng Lou, Chongrong Li, Yu Yu, Yuncong Hu
2026/198 (PDF ) ELLMo: Packing- and Depth-Aware Encrypted Transformer Inference Seyda Nur Guzelhan, Lohit Daksha, Carlos Agulló Domingo, Gilbert Jonatan, John Kim, Jose L. Abellan, David Kaeli, Ajay Joshi
2026/197 (PDF ) Efficient Evaluation of Multivariate Polynomials over Structured Subsets of $\mathbb F_q^n$ Vaibhav Dixit, Santanu Sarkar, Fukang Liu, Willi Meier
2026/196 (PDF ) Faster Pseudorandom Correlation Generators via Walsh-Hadamard Transform Zhe Li, Hongqing Liu, Chaoping Xing, Yizhou Yao, Chen Yuan
2026/195 (PDF ) The HyperFrog Cryptosystem: High-Genus Voxel Topology as a Trapdoor for Post-Quantum KEMs Victor Duarte Melo
2026/194 (PDF ) A Unified Hardware Architecture for Stateful and Stateless Hash-Based Key/Signature Generations Yechu Zhang, Yuxuan Chu, Yaodong Wei, Yueqin Dai, Qiu Shen, Jing Tian
2026/193 (PDF ) On the Use of Atkin and Weber Modular Polynomials in Isogeny Proofs of Knowledge Thomas den Hollander, Marzio Mula, Daniel Slamanig, Sebastian A. Spindler
2026/192 (PDF ) Verification Theatre: False Assurance in Formally Verified Cryptographic Libraries Nadim Kobeissi
2026/191 (PDF ) On the Active Security of the PEARL-SCALLOP Group Action Tako Boris Fouotsa, Marc Houben, Gioella Lorenzon, Ryan Rueger, Parsa Tasbihgou
2026/190 (PDF ) Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption Bowen Jiang, Guofeng Tang, Haiyang Xue
2026/189 (PDF ) Shared and leakage free MAYO Paco Azevedo-Oliveira, Jordan Beraud, Pierre Varjabedian
2026/188 (PDF ) A Visit to KAZ Attack: Finding a Minor Flaw and a Simplified Lattice Construction Yongbo Hu, Chen Zhang, Guomiao Zhou
2026/187 (PDF ) Hardness of hinted ISIS from the space-time hardness of lattice problems Martin R. Albrecht, Russell W. F. Lai, Eamonn W. Postlethwaite
2026/186 (PDF ) Bitcoin PIPEs v2 Michel Abdalla, Brent Carmer, Muhammed El Gebali, Handan Kilinc-Alper, Mikhail Komarov, Yaroslav Rebenko, Lev Soukhanov, Erkan Tairi, Elena Tatuzova, Patrick Towa
2026/185 (PDF ) EFFICIENT QUATERNION ALGORITHMS FOR THE DEURING CORRESPONDENCE, AND APPLICATION TO THE EVALUATION OF MODULAR POLYNOMIALS Antonin Leroux
2026/184 (PDF ) Succinct Non-interactive Arguments of Proximity Liyan Chen, Zhengzhong Jin, Daniel Wichs
2026/183 (PDF ) Benchmarking Secure Multiparty Computation Frameworks for Real-World Workloads in Diverse Network Settings Christopher Harth-Kitzerow, Jonas Schiller, Nina Schwanke, Thomas Prantl, Georg Carle
2026/182 (PDF ) Computing in a Safe House: Accountable Universally Composable Asynchronous Secure Distributed Computing Pierre Civit, Daniel Collins, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic, Manuel Vidigueira, Pouriya Zarbafian
2026/181 (PDF ) Towards Public Tracing: Collaborative Traceable Secret Sharing Pousali Dey, Rittwik Hajra, Subha Kar, Soumit Pal
2026/180 (PDF ) Telling the Story of Chameleon Hash Functions: A 27-Year Review Houssam Derfoufi, Marina Dehez-Clementi, Jean-Christophe DENEUVILLE
2026/179 (PDF ) Nudge: A Private Recommendations Engine Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Dan Boneh
2026/178 (PDF ) Cryptanalytic Extraction of Neural Networks with Various Activation Functions Xiaokang Qi, Hao Lei, Longxiang Wei, Xiaohan Sun, Meiqin Wang
2026/177 (PDF ) A Practical Neighborhood Search Attack on Oracle MLWE Hongxiao Wang, Muhammed F. Esgin, Ron Steinfeld, Markku-Juhani O. Saarinen, Siu-Ming Yiu
2026/176 (PDF ) Differential Pattern Transition: Characterizing the Differential Behavior of AES-like Linear Layers Jianhua Wang, Tao Huang, Siwei Sun, Hailun Yan, Guang Zeng, Shuang Wu
2026/175 (PDF ) Implementable Witness Encryption from Arithmetic Affine Determinant Programs Lev Soukhanov, Yaroslav Rebenko, Muhammad El Gebali, Mikhail Komarov
2026/174 (PDF ) STIP: Efficient and Secure Non-Interactive Transformer Inference via Compact Packing Zihao Wang, Rongmao Chen, Xinwen Gao, Yi Wang, Lin Liu, Zixin Lan, Zhaoyu Wang, Shaojing Fu, Qiong Wang, Xinyi Huang
2026/173 (PDF ) Eidolon: A Practical Post-Quantum Signature Scheme Based on k-Colorability in the Age of Graph Neural Networks Asmaa Cherkaoui, Ramón Flores, Delaram Kahrobaei, Richard C. Wilson
2026/172 (PDF ) A Generalized Attack on RSA and Its Variants Mengce Zheng, Abderrahmane Nitaj, Maher Boudabra, Michel Seck, Oumar Niang, Djiby Sow
2026/171 (PDF ) Spectral Theory of Isogeny Graphs and Quantum Sampling of Secure Supersingular Elliptic Curves Maher Mamah, Jake Doliskani, David Jao
2026/170 (PDF ) gcVM: Publicly Auditable MPC via Garbled Circuits with Applications to Private EVM-Compatible Computation Avishay Yana, Meital Levy, Mike Rosulek, Hila Dahari-Garbian
2026/169 (PDF ) New lower bound of the $r$-th order nonlinearity via algebraic immunity Mikhail Lobanov
2026/168 (PDF ) Cryptanalytic Extraction of Recurrent Neural Network Models Longxiang Wei, Hao Lei, Xiaokang Qi, Xiaohan Sun, Lei Gao, Kai Hu, Wei Wang, Meiqin Wang
2026/167 (PDF ) Breaking and Fixing Spoed Yan Jia, Peng Wang, Gang Liu, Lei Hu, Tingting Guo, Shuping Mao
2026/166 (PDF ) Fuzzy Enhanced Private Set Union in Hamming and Minkowski Spaces Qiang Liu, JaeYoung Bae, Hyung Tae Lee, Joon-Woo Lee
2026/165 (PDF ) Secure Montgomery Curves over TMVP-Friendly Primes for High-Performance ECC Murat Cenk, N. Gamze Orhon Kılıç, Halil Kemal Taşkın, Oğuz Yayla
2026/164 (PDF ) Shorter, Tighter, FAESTer: Optimizations and Improved (QROM) Analysis for VOLE-in-the-Head Signatures Carsten Baum, Ward Beullens, Lennart Braun, Cyprien Delpech de Saint Guilhem, Michael Klooß, Christian Majenz, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, Peter Scholl
2026/163 (PDF ) CommentonTechRxiv preprint 1374260 (DOI: 10.36227/techrxiv.176765338.86836807/v1): “Dimension Padding as a Structural Countermeasure to Linear Inversion in Dual-Public-Key Code-Based Cryptosystems” Mohammad Sadegh Ghorlivandzadeh
2026/162 (PDF ) IFV: Information Flow Verification at the Pre-silicon Stage Utilizing Static-Formal Methodology Rasheed Kibria, Farimah Farahmandi, Mark Tehranipoor
2026/161 (PDF ) Compact and Low Latency First-Order AES Implementations with Low Randomness Feng Zhou, Hua Chen, Limin Fan, Junhuai Yang
2026/160 (PDF ) Leveraging ASIC AI Chips for Homomorphic Encryption Jianming Tong, Tianhao Huang, Jingtian Dang, Leo de Castro, Anirudh Itagi, anupam golder, asra ali, Jeremy Kun, jevin jiang, arvind arvind, G. Edward Suh, Tushar Krishna
2026/159 (PDF ) Dinocchio: Distributed Prover for Ring Arithmetic Katerina Sotiraki, Yunhao Wang, Fan Zhang
2026/158 (PDF ) Setup Protocols for Sender Anonymity Tian Huang, Jiatai Zhang, Megumi Ando
2026/157 (PDF ) In Mid-Stream: Removing the FO-Transform Helps against Leakage but is not Enough Duyên Pay, Thomas Peters, François-Xavier Standaert
2026/156 (PDF ) Hachi: Efficient Lattice-Based Multilinear Polynomial Commitments over Extension Fields Ngoc Khanh Nguyen, George O'Rourke, Jiapeng Zhang
2026/155 (PDF ) Module Learning With Errors and Structured Extrapolated Dihedral Cosets Weiqiang Wen, Jinwei Zheng
2026/154 (PDF ) Oil, Vinegar, and Sparks: Key Recovery from UOV via Single Electromagnetic Fault Injection Fabio Campos, Daniel Hahn, Daniel Könnecke, Marc Stöttinger
2026/153 (PDF ) BOLT: Bootstrapping-Aware Logic Resynthesis and Technology Mapping for Efficient TFHE Circuits Bhuvnesh Chaturvedi, Ayantika Chatterjee, Anupam Chattopadhyay, Debdeep Mukhopadhyay
2026/152 (PDF ) On the Quantum Collision Resistance of HCF Hash Functions Alisée Lafontaine, André Schrottenloher
2026/151 (PDF ) Non-Complete Set Coverings for Higher Order Threshold Implementations Oriol Farràs, Óscar Fidalgo, Carlos Andres Lara-Nino
2026/150 (PDF ) Claiming bounties on small scale Poseidon and Poseidon2 instances using resultant-based algebraic attacks Antoine Bak, Augustin Bariant, Aurélien Boeuf, Maël Hostettler, Guilhem Jazeron
2026/149 (PDF ) Private IP Address Inference in NAT Networks via Off-Path TCP Control-Plane Attack Suraj Sharma, Adityavir Singh, Mahabir Prasad Jhanwar
2026/148 (PDF ) ABBA: Lattice-based Commitments from Commutators Alberto Centelles, Andrew Mendelsohn
2026/147 (PDF ) OptiBridge: A Trustless, Cost-Efficient Bridge Between the Lightning Network and Ethereum Mohsen Minaei, Duc V. Le, Pedro Moreno-Sanchez
2026/146 (PDF ) Feistel Tools: Reprogramming and Query-Recording for QRPs Yu-Hsuan Huang, Andreas Hülsing, Varun Maram, Silvia Ritsch, Abishanka Saha
2026/145 (PDF ) Round-Optimal GUC-Secure Blind Signatures from Minimal Computational and Setup Assumptions Michele Ciampi, Pierpaolo Della Monica, Ivan Visconti
2026/144 (PDF ) Designated-Verifier Dynamic zk-SNARKs with Applications to Dynamic Proofs of Index Weijie Wang, Charalampos Papamanthou, Shravan Srinivasan, Dimitrios Papadopoulos
2026/143 (PDF ) A Unified Treatment of Reachability and Indistinguishability Properties: First-Order Logic with Overwhelming Truth Gergei Bana, Mitsuhiro Okada
2026/142 (PDF ) „One More Time”: Security of One-time Signature Scheme Using Run-length Encoding Under Two-message Attacks Viktória I. Villányi
2026/141 (PDF ) Minimizing Mempool Dependency in PoW Mining on Blockchain: A Paradigm Shift with Compressed Block Representation for Enhanced Scalability, Decentralization and Security. Gyu Chol Kim
2026/140 (PDF ) On the Necessity of Public Contexts in Hybrid KEMs: A Case Study of X-Wing Taehun Kang, Changmin Lee, Yongha Son
2026/139 (PDF ) Cryptanalytic Extraction of Convolutional Neural Networks Xiaohan Sun, Hao Lei, Longxiang Wei, Xiaokang Qi, Kai Hu, Meiqin Wang, Wei Wang
2026/138 (PDF ) From Arithmetic to Shamir: Secure and Efficient Masking Gadgets for Multiplications - Applications to the Post-Quantum Signature Scheme MQOM Vladimir Sarde, Nicolas Debande, Louis Goubin
2026/137 (PDF ) Hensel-lifting black-box algorithms and fast trace computation for elliptic-curve endomorphisms Lorenz Panny, Damien Robert, Alessandro Sferlazza
2026/136 (PDF ) Private Proofs of When and Where Uma Girish, Grzegorz Gluch, Shafi Goldwasser, Tal Malkin, Leo Orshansky, Henry Yuen
2026/135 (PDF ) Randomness-Recovery Trapdoors: a new methodology for enhancing anamorphic encryption Xuan Thanh Do, Giuseppe Persiano, Duong Hieu Phan, Moti Yung
2026/134 (PDF ) Completing the Chain: Verified Implementations of Hash-Based Signatures and Their Security Manuel Barbosa, François Dupressoir, Rui Fernandes, Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub
2026/133 (PDF ) Homomorphic Signatures : A Systematization of Knowledge Olive Chakraborty
2026/132 (PDF ) Subspace Guessing and Rank-Metric Solvers with Hints Anmoal Porwal, Harrison Banda, Jan Brinkmann, Anna Baumeister, Juliane Krämer, Antonia Wachter-Zeh
2026/131 (PDF ) Root-Cause Analysis of Power Side-Channel Leaks in RISC-V Cryptographic Implementations Asmita Adhikary, Abraham Basurto-Becerra, Lejla Batina, Ileana Buhan, Durba Chatterjee
2026/130 (PDF ) Online-Friendly Robust Threshold ECDSA with Constant Amortized Communication Guofeng Tang, Tian Qiu, Bowen Jiang, Haiyang Xue, Meng Hao, Guomin Yang, Robert H. Deng
2026/129 (PDF ) The ideal arithmetic correlations of $N$-ary sequences and related results Feifei Yan, Pinhui Ke, Chenhuang Wu
2026/128 (PDF ) The Impossibility of Post-Quantum Public Indifferentiability for Merkle-Damgard Akinori Hosoyamada
2026/127 (PDF ) Toward Verifiable Privacy in Decentralized Identity: A Formal Framework for Minimal Disclosure and Unlinkability Yu Zhang, Zongbin Wang
2026/126 (PDF ) Censorship Resistance vs Throughput in Multi-Proposer BFT Protocols Fatima Elsheimy, Ioannis Kaklamanis, Sarisht Wadhwa, Charalampos Papamanthou, Fan Zhang
2026/125 (PDF ) StarFortress: Hybrid KEMs with Diffie-Hellman Inlining Deirdre Connolly, Paul Grubbs
2026/124 (PDF ) Generalization of the Class Elimination Attack to Block Ciphers Osmani Tito-Corrioso
2026/123 (PDF ) Masking Out of Order: Side-Channel Leaks from Software-Masked Cryptography on Out-of-Order Processors Eden Desmet, Suparna Kundu, Ingrid Verbauwhede
2026/122 (PDF ) The Motte-and-Bailey Framework for Leakage-Resilient Accordion Modes: Featuring Qaitbay and Alicante Mario Marhuenda Beltrán, Mustafa Khairallah
2026/121 (PDF ) Integrating Boomerang into TAGADA Rocco Brunelli, Marine Minier, Loïc Rouquette
2026/120 (PDF ) Equivalent computational problems for superspecial abelian surfaces Mickaël Montessinos
2026/119 (PDF ) Re2creds: Reusable Anonymous Credentials from Malleable NIZK and Legacy Signatures Bin Xie, Tianyu Zheng, Rui Song, Shang Gao, Bin Xiao
2026/118 (PDF ) Practical Subvector Commitments with Optimal Opening Complexity Matteo Campanelli
2026/117 (PDF ) Faultless Key Recovery: Iteration-Skip and Loop-Abort Fault Attacks on LESS Xiao Huang, Zhuo Huang, Yituo He, Quan Yuan, Chao Sun, Mehdi Tibouchi, Yu Yu
2026/116 (PDF ) Generating Falcon Trapdoors via Gibbs Sampler Chao Sun, Thomas Espitau, Junjie Song, Jinguang Han, Mehdi Tibouchi
2026/115 (PDF ) Functional Decomposition of Multivariate Polynomials: Revisit and New Improvements Dong-Jie Guo, Qun-Xiong Zheng, Zhong-Xiao Wang, Xiao-Xin Zhao
2026/114 (PDF ) Chasing Rabbits Through Hypercubes: Better algorithms for higher dimensional 2-isogeny computations Pierrick Dartois, Max Duparc
2026/113 (PDF ) How to Steal Oblivious Transfer from Minicrypt Cruz Barnum, David Heath
2026/112 (PDF ) PETCHA: Post-quantum Efficient Transciphering with ChaCha Antonio Guimarães, Gabriela M. Jacob, Hilder V. L. Pereira
2026/111 (PDF ) Structured Matrix Constraint Systems for Architecture-Hiding Succinct Zero-Knowledge Proofs for Neural Networks Mingshu Cong, Sherman S. M. Chow, Tsz Hon Yuen, Siu-Ming Yiu
2026/110 (PDF ) Logarithmic density of rank $\geq1$ and $\geq2$ genus-2 Jacobians and applications to hyperelliptic curve cryptography Razvan Barbulescu, Mugurel Barcau, Vicentiu Pasol, George Turcas
2026/109 (PDF ) Concretely Efficient Blind Signatures Based on VOLE-in-the-Head Proofs and the MAYO Trapdoor Carsten Baum, Marvin Beckmann, Ward Beullens, Shibam Mukherjee, Christian Rechberger
2026/108 (PDF ) Extending RISC-V to Support Flexible-Radix Multiply-Accumulate Operations Isaar Ahmad, Hao Cheng, Johann Großschädl, Daniel Page
2026/107 (PDF ) Verified non-recursive calculation of Beneš networks applied to Classic McEliece Wrenna Robson, Samuel Kelly
2026/106 (PDF ) New Quantum Circuits for ECDLP: Breaking Prime Elliptic Curve Cryptography in Minutes Hyunji Kim, Kyungbae Jang, Siyi Wang, Anubhab Baksi, Gyeongju Song, Hwajeong Seo, Anupam Chattopadhyay
2026/105 (PDF ) Privacy-Preserving LLM Inference in Practice: A Comparative Survey of Techniques, Trade-Offs, and Deployability Davide Andreoletti, Alessandro Rudi, Emanuele Carpanzano, Francesco Lelli, Tiziano Leidi
2026/104 (PDF ) Deal out oblivious correlations: 2-depth HSS circuit for silent V-OLE generation Davide Cerutti, Stelvio Cimato
2026/103 (PDF ) When Only Parts Matter: Efficient Privacy-Preserving Analytics with Fully Homomorphic Encryption Alexandros Bakas, Dimitrios Schoinianakis
2026/102 (PDF ) Secure Computation for Fixed-point and Floating-point Arithmetic Tianpei Lu, Bingsheng Zhang, Yuyang Feng, Kui Ren
2026/101 (PDF ) Analysis and Attacks on the Reputation System of Nym Xinmu Alexis Cao, Matthew Green
2026/100 (PDF ) BREAKMEIFYOUCAN!: Exploiting Keyspace Reduction and Relay Attacks in 3DES and AES-protected NFC Technologies Nathan Nye, Philippe Teuwen, Tiernan Messmer, Steven Mauch, Struan Clark, Zinong Li, Zachary Weiss, Lucifer Voeltner
2026/099 (PDF ) Arithmetic autocorrelation of binary half-$\ell$-sequences with connection integer $p^{r}q^{s}$ Feifei Yan, Pinhui Ke
2026/098 (PDF ) Structured Module Lattice-based Cryptography Joppe W. Bos, Joost Renes, Frederik Vercauteren, Peng Wang
2026/097 (PDF ) Secret-Subspace Recovery in MAYO via Linearization of Errors from a Single Fault Alberto Marcos
2026/096 (PDF ) Revisiting the Concrete Security of Falcon-type Signatures Huiwen Jia, Shiduo Zhang, Yang Yu, Chunming Tang
2026/095 (PDF ) Tropical cryptography IV: Digital signatures and secret sharing with arbitrary access structure Dima Grigoriev, Chris Monico, Vladimir Shpilrain
2026/094 (PDF ) Hardware-Friendly Robust Threshold ECDSA in an Asymmetric Model Hankyung Ko, Seunghwa Lee, Sookyung Eom, Sunghyun Jo
2026/093 (PDF ) Optimized Implementation of ML-KEM on ARMv9-A with SVE2 and SME Hanyu Wei, Wenqian Li, Shiyu Shen, Hao Yang, Yunlei Zhao
2026/092 (PDF ) Integrity from Algebraic Manipulation Detection in Trusted-Repeater QKD Networks Ailsa Robertson, Christian Schaffner, Sebastian R. Verschoor
2026/091 (PDF ) Round-Optimal Pairing-Free Blind Signatures Julia Kastner, Stefano Tessaro, Greg Zaverucha
2026/090 (PDF ) On the Impossibility of Round-Optimal Pairing-Free Blind Signatures in the ROM Marian Dietz, Julia Kastner, Stefano Tessaro
2026/089 (PDF ) The Billion Dollar Merkle Tree Thomas Coratger, Dmitry Khovratovich, Bart Mennink, Benedikt Wagner
2026/088 (PDF ) BLISK: Boolean circuit Logic Integrated into the Single Key Oleksandr Kurbatov, Yevhen Hrubiian, Illia Melnyk, Lasha Antadze
2026/087 (PDF ) Augmenting BBS with Conventional Signatures Sietse Ringers
2026/086 (PDF ) 2PC Memory-Manipulating Programs with Constant Overhead David Heath
2026/085 (PDF ) Beyond-Birthday-Bound Security with HCTR2: Cascaded Construction and Tweak-based Key Derivation Yu Long Chen, Yukihito Hiraga, Nicky Mouha, Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2026/084 (PDF ) Combined Indistinguishability Analysis - Verifying random probing leakage under random faults Armand Schinkel, Pascal Sasdrich
2026/083 (PDF ) Tag-Friendly Lattice Sampler and Applications Corentin Jeudy, Olivier Sanders
2026/082 (PDF ) Rank Syndrome Decoding Estimator - An Asymptotic and Concrete Analysis Andre Esser, Javier Verbel, Ricardo Villanueva-Polanco
2026/081 (PDF ) HYPERSHIELD: Protecting the Hypercube MPC-in-the-Head Framework Against Differential Probing Adversaries without Masking Linda Pirker, Quinten Norga, Suparna Kundu, Anindya Ganguly, Barry van Leeuwen, Angshuman Karmakar, Ingrid Verbauwhede
2026/080 (PDF ) SoK: Outsourced Private Set Intersection Sophie Hawkes, Christian Weinert
2026/079 (PDF ) Uniform Sharing in Multiple Stages: NullFresh for Arbitrary Functions Artemii Ovchinnikov, Aein Rezaei Shahmirzadi, Siemen Dhooghe
2026/078 (PDF ) Breaking the Myth of MPCitH Inefficiency: Optimizing MQOM for Embedded Platforms Ryad Benadjila, Thibauld Feneuil
2026/077 (PDF ) Formalizing Privacy in Decentralized Identity: A Provably Secure Framework with Minimal Disclosure Yu Zhang, Zongbin Wang
2026/076 (PDF ) Lether: Practical Post-Quantum Account-Based Private Blockchain Payments Hongxiao Wang, Muhammed F. Esgin, Ron Steinfeld, Siu-Ming Yiu
2026/075 (PDF ) From $\textsf{TS-SUF-2}$ to $\textsf{TS-SUF-4}$: Practical Security Enhancements for $\textsf{FROST2}$ Threshold Signatures Syh-Yuan Tan, Will Wang, Ryan Chow
2026/074 (PDF ) Noisette: Certifying Differential Privacy Mechanisms Efficiently Qi Pang, Radhika Garg, Ziling Liu, Hanshen Xiao, Virginia Smith, Wenting Zheng, Xiao Wang
2026/073 (PDF ) zkRNN: Zero-Knowledge Proofs for Recurrent Neural Network Inference Fatemeh Zarinjouei, Behzad Abdolmaleki, Maryam Zarezadeh, Bhavish Mohee, Aysajan Abidin, Stefan Köpsell
2026/072 (PDF ) Scalable Distributed Key Generation for Blockchains Aniket Kate, Pratyay Mukherjee, Pratik Sarkar, Hamza Saleem, Nibesh Shrestha, David Yang
2026/071 (PDF ) Single-Trace Message Recovery in HQC via RS Post-Decoding and FO Re-Encryption Jaeho Jeon, Donghyen Kim, Suseong Lee, Young-Sik Kim
2026/070 (PDF ) Unlocking the True Potential of Decryption Failure Oracles: A Hybrid Adaptive-LDPC Attack on ML-KEM Using Imperfect Oracles Qian Guo, Denis Nabokov, Thomas Johansson
2026/069 (PDF ) qFALL – Rapid Prototyping of Lattice-based Cryptography Marvin Beckmann, Phil Milewski, Laurens Porzenheim, Marcel Luca Schmidt, Jan Niklas Siemer
2026/068 (PDF ) Revisiting Polynomial NTRU for FHE: Amortized Bootstrapping with Sparse Keys Wun-Ting Lin, Ja-Ling Wu
2026/067 (PDF ) MALeak: Blind Side-Channel Key Recovery Exploiting Modular Addition Leakage in ARX-based Block Ciphers Inhun Lee, GyuSang Kim, Seokhie Hong, HeeSeok Kim
2026/066 (PDF ) Complete Characterization of Randomness Extraction from DAG-Correlated Sources Divesh Aggarwal, Zihan Li, Saswata Mukherjee, Maciej Obremski, João Ribeiro
2026/065 (PDF ) BABE: Verifying Proofs on Bitcoin Made 1000x Cheaper Sanjam Garg, Dimitris Kolonelos, Mikhail Sergeevitch, Srivatsan Sridhar, David Tse
2026/064 (PDF ) Breaking the KAZ Suite: Practical Key Recovery Attacks on MySEAL 2.0’s Post-Quantum Candidates Zhuo Huang, Chongrong Li, Yu Yu, Xiaogang Zhou
2026/063 (PDF ) Policy-based Access Tokens: Privacy-Preserving Verification for Digital Identity Kiran Pun, Daniel Gardham, Nick Frymann
2026/062 (PDF ) (Fine-Grained) Unbounded Inner-Product Functional Encryption from LWE Valerio Cini, Erkan Tairi
2026/061 (PDF ) $L$ for the Price of One: On the Benefits of Using more than $t+1$ Parties in Threshold Signing Daniel Escudero, Yashvanth Kondi, Yifan Song, Hernán Vanegas
2026/060 (PDF ) Blind Adaptor Signatures, Revisited: Stronger Security Definitions and Their Construction toward Practical Applications Masashi Hisai, Naoto Yanai
2026/059 (PDF ) Heli: Heavy-Light Private Aggregation Ryan Lehmkuhl, Henry Corrigan-Gibbs, Emma Dauterman, David J. Wu
2026/058 (PDF ) Zero Knowledge (About) Encryption: A Comparative Security Analysis of Three Cloud-based Password Managers Matteo Scarlata, Giovanni Torrisi, Matilda Backendal, Kenneth G. Paterson
2026/057 (PDF ) Timed Commitments and Timed Encryption: Generic Constructions and Instantiations from Isogenies Mingjie Chen, Jonas Meers
2026/056 (PDF ) Rejection Matters: Efficient Non-Profiling Side-Channel Attack on ML-DSA via Exploiting Public Templates Yuhan Zhao, Wei Cheng, Zehua Qiao, Yuejun Liu, Yongbin Zhou
2026/055 (PDF ) RotorCipher: A Modern Approach to Rotor Ciphers Using Sponge Functions and Modular Arithmetic Edimar Veríssimo da Silva
2026/054 (PDF ) Communication and Storage-Friendly Bidirectional Multi-hop CPA Secure Proxy Re-encryption from Supersingular Isogenies Manas Jana, Ratna Dutta, Sourav Mukhopadhyay
2026/053 (PDF ) Kilobyte-Bandwidth Subliminal Channels in FIPS 204 ML-DSA via Packed-Commitment Embedding Mounir IDRASSI
2026/052 (PDF ) Key Updatable Hash Based VRF Suman Ghosh, Ratna Dutta, Sourav Mukhopadhyay
2026/051 (PDF ) An improved random AKS-class primality proving algorithm Haining Fan
2026/050 (PDF ) Low-Latency Low-Randomness OPINI Gadgets and Their Formal Verification Lixuan Wu, Yanhong Fan, Guowei Liu, Chaoran Wang, Meiqin Wang
2026/049 (PDF ) Argo MAC: Garbling with Elliptic Curve MACs Liam Eagen, Ying Tong Lai
2026/048 (PDF ) Masked Solving of Linear Equations System and Application to UOV Signatures Jean-Sébastien Coron, François Gérard, Bowen Zhang
2026/047 (PDF ) SoK of Private Deep Neural Network Inference with Approximate Fully Homomorphic Encryption Zaira Pindado, Thomas Spendlhofer, Mohamed Allam, Priyam Mehta, Lena Martens, Antonio J. Peña
2026/046 (PDF ) Euston: Efficient and User-Friendly Secure Transformer Inference with Non-Interactivity Xinwen Gao, Shaojing Fu, Lin Liu, Zhuotao Liu, Yuchuan Luo, Yongjun Wang
2026/045 (PDF ) Formalizing Privacy-Enhanced Whitelists: A Secure Framework with Hidden Policies Yu Zhang, Zongbin Wang
2026/044 (PDF ) Jindo: Practical Lattice-Based Polynomial Commitment for Zero-Knowledge Arguments Intak Hwang, Hyeonbum Lee, Jinyeong Seo, Yongsoo Song
2026/043 (PDF ) Classical Obfuscation of Quantum Circuits via Publicly-Verifiable QFHE James Bartusek, Aparna Gupte, Saachi Mutreja, Omri Shmueli
2026/042 (PDF ) Fully Secure DKG Protocols for Discrete Logarithm Revisited Karim Baghery, Hossein Moghaddas
2026/041 (PDF ) Towards Privacy-Preserving Unmanned Aerial Vehicles Shared Logistics via Dynamic Sanitizable Signature with Multiple Sanitizers Mingwei Zeng, Qingyang Zhang, Jie Cui, Hong Zhong, Fengqun Wang
2026/040 (PDF ) Efficient Polynomial Evaluation over Structured Space and Application to Polynomial Method Fukang Liu, Vaibhav Dixit, Daisuke Yamamoto, Wakaha Ogata, Santanu Sarkar, Willi Meier
2026/039 (PDF ) Abelian surfaces in Hesse form and explicit isogeny formulas Thomas Decru, Sabrina Kunzweiler
2026/038 (PDF ) Scalable Honest-majority MPC for Machine Learning from Mixed Secret Sharings Meilin Li, Meng Hao, Yu Chen
2026/037 (PDF ) On those Boolean functions having only one Walsh zero Claude Carlet, Pierrick Méaux, Marek Broll
2026/036 (PDF ) AKE Protocol Combining PQC and QKD Loïc Ferreira
2026/035 (PDF ) Adaptive NIKE for Unbounded Parties Shafik Nassar, Brent Waters
2026/034 (PDF ) Benchmarking of the Amortized Post Quantum Combiner for MLS Britta Hale, Xisen Tian, Lee Wang
2026/033 (PDF ) Faster Short Pairing-Based NIZK Proofs for Ring LWE Ciphertexts Olivier Bernard, Sarah Elkazdadi, Benoit Libert, Arthur Meyre, Jean-Baptiste Orfila, Nicolas Sarlin
2026/032 (PDF ) The Algebraic Isogeny Model: A General Model with Applications to SQIsign and Key Exchanges Marius A. Aardal, Andrea Basso, Doreen Riepel
2026/031 (PDF ) On Threshold Fully Homomorphic Encryption with Synchronized Decryptors François Colin de Verdière, Alain Passelègue, Damien Stehlé
2026/030 (PDF ) Incremental Single-Server Private Information Retrieval Pengfei Lu, Guangwu Xu, Zengpeng Li, Mei Wang, Haoyu Cui
2026/029 (PDF ) Fast Unbalanced Private Computation on Set Intersection from Permuted Multi-Query Private Membership Test Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu
2026/028 (PDF ) On the design of Survivable Distributed Passwordless Authentication and Single Sign-On Luca Ferretti, Federico Magnanini, Mauro Andreolini, Mattia Trabucco, Michele Colajanni
2026/027 (PDF ) Practical SNARGs for Matrix Multiplications over Encrypted Data Louis Tremblay Thibault, Michael Walter, Jiapeng Zhang
2026/026 (PDF ) A General Randomness Reuse Framework for First-Order Secure Masking and Applications on AES Design Using Randomness Solely for Input Encoding Junhuai Yang, Feng Zhou, Hua Chen, Limin Fan
2026/025 (PDF ) JAGUAR: Efficient and Secure Unbalanced PSI under Malicious Adversaries in the Client-Server Setting Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Qiang Liu, Tingyu Fan
2026/022 (PDF ) FABS: Fast Attribute-Based Signatures Liqun Chen, Long Meng, Yalan Wang, Nada El Kassem, Christopher JP Newton, Yangguang Tian, Jodie Knapp, Constantin Catalin Dragan, Daniel Gardham, Mark Manulis
2026/021 (PDF ) IND-CCA Lattice Threshold KEM under 30 KiB Katharina Boudgoust, Oleksandra Lapiha, Rafaël del Pino, Thomas Prest
2026/020 (PDF ) HIC is all you need: Practical Post-Quantum Password-Authenticated Public Key Encryption Afonso Arriaga, David Mestel, Jan Oupický, Peter Browne Rønne, Marjan Škrobot
2026/019 (PDF ) Subversion-resilient Key-exchange in the Post-quantum World Kévin Duverger, Pierre-Alain Fouque, Charlie Jacomme, Guilhem Niot, Cristina Onete
2026/018 (PDF ) Multi-Instance Unrecoverability of iMHF-Based Password Hashing Charles Dodd, Pooya Farshim, Siamak F. Shahandashti, Karl Southern
2026/017 (PDF ) Grover-Based Quantum Attack on Atom Sumanta Chakraborty, SK Hafizul Islam
2026/016 (PDF ) Aborting Random Oracles: How to Build them, How to Use them Gottfried Herold, Dmitry Khovratovich, Mikhail Kudinov, Stefano Tessaro, Benedikt Wagner
2026/015 (PDF ) Qurrency: a quantum-secure, private, and auditable platform for digital assets Arka Rai Choudhuri, Sanjam Garg, Matthew Gregoire, Keewoo Lee, Mike Lodder, Hart Montgomery, Guru Vamsi Policharla, Jim Zhang
2026/014 (PDF ) Accelerating HQC with Additive FFT Ming-Shing Chen, Chun-Ming Chiu, Chun-Tao Peng, Bo-Yin Yang
2026/013 (PDF ) Efficient Threshold ML-DSA Sofía Celi, Rafaël del Pino, Thomas Espitau, Guilhem Niot, Thomas Prest
2026/012 (PDF ) HIGH: Harnessing GPU Parallelism for Optimized HQC Performance Jiankuo Dong, Yuze Hou, Shiqin Wang, Letian Sha, Fu Xiao, Zhenjiang Dong, Jingqiang Lin
2026/010 (PDF ) Third-Party Moderation of Abuse Reports for End-to-End Encrypted Messaging with Multiple Moderators Matthew Gregoire, Gabriel Schell, Saba Eskandarian
2026/009 (PDF ) SIR: A Sparse-Interaction Keystream Generator with a Hardware-Oriented Architecture W.A. Susantha Wijesinghe
2026/008 (PDF ) A SNARK for (Non-)Subsequences with Text-Sub-Linear Proving Time Dario Fiore, San Ling, Khai Hanh Tang, Hong Hanh Tran, Huaxiong Wang, Yingfei Yan
2026/007 (PDF ) A Certified Framework for Deterministic Navigation in Higher-Genus p-Isogeny Graphs Hung T. Dang
2026/006 (PDF ) SNARGs for NP and Non-Signaling PCPs, Revisited Lalita Devadas, Samuel B. Hopkins, Yael Tauman Kalai, Pravesh K. Kothari, Alex Lombardi, Surya Mathialagan
2026/005 (PDF ) Impersonating Quantum Secrets over Classical Channels Luowen Qian, Mark Zhandry
2026/004 (PDF ) TSM+ and OTSM - Correct Application of Time Sharing Masking in Round-Based Designs Hemin Rahimi, Amir Moradi
2026/003 (PDF ) Batch Arguments with Optimal Communication Nico Döttling, Giulio Malavolta, Omer Paneth
2026/002 (PDF ) LatORAM: ORAMs from Lateral Stashes and Delayed Shuffling Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo
2026/001 (PDF ) The Cokernel Pairing Krijn Reijnders
2025/2340 (PDF ) OOPS: One-time Oblivious Polynomial Signatures Kobi Gurkan, Philipp Jovanovic, Andrija Novakovic
2025/2339 (PDF ) SoK: Approximate Agreement Diana Ghinea, Chen-Da Liu-Zhang
2025/2338 (PDF ) OHMG: One hot modular garbling Ariel Futoransky, Fadi Barbàra, Ramses Fernandez, Gabriel Larotonda
2025/2337 (PDF ) ML-DSA-OSH: An Efficient, Open-Source Hardware Implementation of ML-DSA Quinten Norga, Suparna Kundu, Ingrid Verbauwhede
2025/2336 (PDF ) Compact Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors Jingjing Fan, Xingye Lu, Man Ho Au, Siu Ming Yiu
2025/2335 (PDF ) d/v-CLSAG: Extension for Concise Linkable Spontaneous Anonymous Group Signatures sowle
2025/2334 (PDF ) Moving a Step of ChaCha in Syncopated Rhythm (Extended Version) Shichang Wang, Meicheng Liu, Shiqi Hou, Chengan Hou, Dongdai Lin
2025/2333 (PDF ) Analysis of Diffusion Properties in Generalized Feistel Ciphers under Multidimensional Linear Cryptanalysis Betül Askin Özdemir, Vincent Rijmen
2025/2332 (PDF ) DNS-Anchored zk-SNARK Proofs: A Stateless Alternative to ACME Challenge-Response for Domain Control Validation Abhinav Vishnu
2025/2331 (PDF ) SUMSIG: Compact Code-Based Signatures from Sum-Check Protocols Debrup Chatterjee
2025/2330 (PDF ) Verifiable Aggregate Receipts with Applications to User Engagement Auditing Ioannis Kaklamanis, Wenhao Wang, Harjasleen Malvai, Fan Zhang
2025/2329 (PDF ) A note on ``a fully dynamic multi-secret sharing scheme with redundant authorization'' Zhengjun Cao, Lihua Liu
2025/2328 (PDF ) SNARGs for NP via Fiat–Shamir in the Plain Model Ziyi Guan, Eylon Yogev
2025/2327 (PDF ) Transparent and Post-Quantum Distributed SNARK with Linear Prover Time Zesheng Li, Xinxuan Zhang, Yi Deng
2025/2326 (PDF ) Efficiently Provable Approximations for Non-Polynomial Functions Sriram Sridhar, Shravan Srinivasan, Dimitrios Papadopoulos, Charalampos Papamanthou
2025/2325 (PDF ) Pseudorandom Correlation Functions for Garbled Circuits Geoffroy Couteau, Srinivas Devadas, Alexander Koch, Sacha Servan-Schreiber
2025/2324 (PDF ) SHAFT: Secure, Handy, Accurate, and Fast Transformer Inference Andes Y. L. Kei, Sherman S. M. Chow
2025/2323 (PDF ) An Improved Method for Predicting Truncated Fibonacci LFSRs over Integer Residue Rings Han-Bing Yu, Qun-Xiong Zheng, Wen-Feng Qi
2025/2322 (PDF ) Distributed Symmetric Key Establishment with Forward Secrecy for Implantable Medical Devices Roozbeh Sarenche, Sayon Duttagupta, Francesco Milizia, Kevin Bogner, Varesh Mishra
2025/2321 (PDF ) High-Precision Exact FHE Made Simple, General, and Fast Chris Peikert, Doron Zarchy, Guy Zyskind
2025/2320 (PDF ) New Constructions of Multiplicative Secret Sharing Schemes Chunming Tang, Haonan Fu, Zheng Chen, Hongwei Zhu
2025/2319 (PDF ) One-Time Memories Secure against Depth-Bounded Quantum Circuits Kyosuke Sekii, Takashi Nishide
2025/2318 (PDF ) Hyperion: Private Token Sampling with Homomorphic Encryption Lawrence Lim, Jiaming Liu, Vikas Kalagi, Amr El Abbadi, Divyakant Agrawal
2025/2317 (PDF ) InstantOMR: Oblivious Message Retrieval with Low Latency and Optimal Parallelizability Haofei Liang, Zeyu Liu, Eran Tromer, Xiang Xie, Yu Yu
2025/2316 (PDF ) Making Sense of Private Advertising: A Principled Approach to a Complex Ecosystem Kyle Hogan, Alishah Chator, Gabriel Kaptchuk, Mayank Varia, Srinivas Devadas
2025/2315 (PDF ) Conditionally Input-Revealing 2PC and Fuzzy Password-Authenticated Key Exchange David Richardson, Mike Rosulek, Jiayu Xu
2025/2314 (PDF ) Registered Attribute-Based Encryption with Publicly Verifiable Certified Deletion, Everlasting Security, and More Shayeef Murshid, Ramprasad Sarkar, Mriganka Mandal
2025/2313 (PDF ) Nested YOSO MPC: Near Optimal Resilience Without an MPC Setup Ittai Abraham, Eli Chouatt, Ivan Damgård, Yossi Gilad, Gilad Stern, Sophia Yakoubov
2025/2312 (PDF ) Anamorphic Signatures With Dictator and Recipient Unforgeability for Long Messages Amit Deo, Benoit Libert
2025/2311 (PDF ) Accelerating NTRU-based Bootstrapping with Block Key Distributions Jingwei Feng, Baofeng Wu, Dongdai Lin, Binwu Xiang
2025/2310 (PDF ) RACE: A Rapid ARM Cryptographic Engine for Code-Based Classic McEliece PQC Scheme Wen Wu, Jiankuo Dong, Xuecheng Liu, Shuzhou Sun, Zhenjiang Dong, Jingqiang Lin, Fu Xiao
2025/2309 (PDF ) On the Concrete Practicality of Post-Quantum Multi-Authority Attribute-Based Encryption Hassan Nasiraee
2025/2308 (PDF ) Succinct Garbled Circuits with Low-Depth Garbling Algorithms Hanjun Li, Huijia Lin, George Lu
2025/2307 (PDF ) Computationally Succinct Authentication from DCR: Attribute-Based Laconic Function Evaluation and More Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl
2025/2306 (PDF ) On Delegation of Verifiable Presentations from mdoc and BBS Credentials Andrea Flamini, Andrea Gangemi, Enrico Guglielmino, Vincenzo Orabona
2025/2305 (PDF ) A New Approach to Large Party Beaver-Style MPC with Small Computational Overhead Aayush Jain, Huijia Lin, Nuozhou Sun
2025/2304 (PDF ) Streaming Function Secret Sharing and Its Applications Xiangfu Song, Jianli Bai, Ye Dong, Yijian Liu, Yu Zhang, Xianhui Lu, Tianwei Zhang
2025/2303 (PDF ) Suwako: A Logarithmic-Depth Modular Reduction for Arbitrary Trinomials over $\mathbb{F}_{2^m}$ without Pre-computation Junyu Zhou, Jing Wang, Hao Ren, Si Gao, Xiao Lan
2025/2302 (PDF ) Attacking and Securing Hybrid Homomorphic Encryption Against Power Analysis Aikata Aikata, Maciej Czuprynko, Nedžma Musovic, Emira Salkić, Sujoy Sinha Roy
2025/2301 (PDF ) High-Performance SIMD Software for Spielman Codes in Zero-Knowledge Proofs Florian Krieger, Christian Dobrouschek, Florian Hirner, Sujoy Sinha Roy
2025/2300 (PDF ) Gravity of the Situation:Security Analysis on Rocket.Chat E2EE Hayato Kimura, Ryoma Ito, Kazuhiko Minematsu, Takanori Isobe
2025/2299 (PDF ) Far-Field $Singing$ FPGAs: Repurposing Routing Fabrics into 100 m Covert Radiators Udi Alush, Roey Amitay, Erez Danieli, Itamar Levi
2025/2298 (PDF ) ALKAID: Accelerating Three-Party Boolean Circuits by Mixing Correlations and Redundancy Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Wen-jie Lu, Tianwei Zhang, Jianying Zhou, Jin-Song Dong
2025/2297 (PDF ) Yoyo tricks with a BEANIE Xavier Bonnetain, Sébastien Duval, Virginie Lallemand, Thierno Mamoudou Sabaly, Thomas Sagot, Thibault Sanvoisin
2025/2296 (PDF ) SoK: Verifiable Federated Learning Francesco Bruschi, Marco Esposito, Tommaso Gagliardoni, Andrea Rizzini
2025/2295 (PDF ) An Ideal Linear Secret Sharing Scheme for Complete $t$-Partite $k$-Uniform Hypergraph Access Structures Chunming Tang, Zheng Chen, Haonan Fu, Hongwei Zhu
2025/2294 (PDF ) Fully Distributed Multi-Point Functions for PCGs and Beyond Amit Agarwal, Srinivasan Raghuraman, Peter Rindal
2025/2293 (PDF ) LAKE: Lattice-Code Accelerated Kyber Encapsulation Hassan Nasiraee
2025/2292 (PDF ) FRIVail: A Data Availability Scheme based on FRI Binius Rachit Anand Srivastava
2025/2291 (PDF ) Key Recovery Attacks on ZIP Ciphers: Application to ZIP-AES and ZIP-GIFT Marcel Nageler, Debasmita Chakraborty, Simon Scherer, Maria Eichlseder
2025/2290 (PDF ) Towards Practical Multi-Party Hash Chains using Arithmetization-Oriented Primitives - With Applications to Threshold Hash-Based Signatures Alexandre Adomnicăi
2025/2289 (PDF ) Fourier Sparsity of Delta Functions and Matching Vector PIRs Fatemeh Ghasemi, Swastik Kopparty
2025/2288 (PDF ) Achieving CPAD security for BFV: a pragmatic approach Jean-Paul Bultel, Marina Checri, Caroline Fontaine, Marc Renard, Renaud Sirdey, Oana Stan
2025/2287 (PDF ) MIOPE: A Modular framework for Input and Output Privacy in Ensemble inference Kyrian Maat, Gareth T. Davies, Zoltán Ádám Mann, Joppe W. Bos, Francesco Regazzoni
2025/2286 (PDF ) Improving the Efficiency of zkSNARKs for Ballot Validity Felix Röhr, Nicolas Huber, Ralf Küsters
2025/2285 (PDF ) Laminate: Succinct SIMD-Friendly Verifiable FHE Kabir Peshawaria, Zeyu Liu, Ben Fisch, Eran Tromer
2025/2284 (PDF ) Meta-PBS: Compact High-Precision Programmable Bootstrapping Shihe Ma, Tairong Huang, Anyu Wang, Changtong Xu, Tao Wei, Xiaoyun Wang
2025/2283 (PDF ) Cryptanalysis of Pseudorandom Error-Correcting Codes Tianrui Wang, Anyu Wang, Tianshuo Cong, Delong Ran, Jinyuan Liu, Xiaoyun Wang
2025/2282 (PDF ) When Simple Permutations Mix Poorly: Limited Independence Does Not Imply Pseudorandomness Jesko Dujmovic, Angelos Pelecanos, Stefano Tessaro
2025/2281 (PDF ) UFOs: An Ultra-fast Toolkit for Multiparty Computation of Small Elements Jiacheng Gao, Moyang Xie, Yuan Zhang, Sheng Zhong
2025/2280 (PDF ) Security Models and Cryptographic Protocols in a Quantum World Céline Chevalier, Paul Hermouet, Quoc-Huy Vu
2025/2279 (PDF ) On the representation of self-orthogonal codes and applications to cryptography Marco Baldi, Rahmi El Mechri, Paolo Santini, Riccardo Schiavoni
2025/2278 (PDF ) Secure Distributed State Management for Stateful Signatures with a Practical and Universally Composable Protocol Johannes Blömer, Henrik Bröcher, Volker Krummel, Laurens Porzenheim
2025/2277 (PDF ) Quantum Resource Analysis of Low-Round Keccak/SHA-3 Preimage Attack: From Classical 2^ 57.8 to Quantum 2 ^28.9 using Qiskit Modeling Ramin Rezvani Gilkolaei, Reza Ebrahimi
2025/2276 (PDF ) E2E-AKMA: An End-to-End Secure and Privacy-Enhancing AKMA Protocol Against the Anchor Function Compromise Yueming Li, Long Chen, Qianwen Gao, Zhenfeng Zhang
2025/2275 (PDF ) Random-Access AEAD for Fast Lightweight Online Encryption Andrés Fábrega, Julia Len, Thomas Ristenpart, Gregory Rubin
2025/2274 (PDF ) Post-Quantum Security of the Sum of Even-Mansour YanJin Tan, JunTao Gao, XueLian Li
2025/2273 (PDF ) Benchmarking SLH-DSA: A Comparative Hardware Analysis Against Classical Digital Signatures for Post-Quantum Security Jayalaxmi H, H M Brunda, Sumith Subraya Nayak, Sathya M, Anirudh S Hegde
2025/2272 (PDF ) High Exponents May Not Suffice to Patch AIM (On Attacks, Weak Parameters, and Patches for AIM2) Yimeng Sun, Shiyao Chen, Guowei Liu, Meiqin Wang, Chao Niu
2025/2271 (PDF ) ARION: Attention-Optimized Transformer Inference on Encrypted Data Linhan Yang, Jingwei Chen, Wangchen Dai, Shuai Wang, Wenyuan Wu, Yong Feng
2025/2270 (PDF ) HHGS: Forward-secure Dynamic Group Signatures from Symmetric Primitives Xuelian Cao, Zheng Yang, Daniel Reijsbergen, Jianting Ning, Junming Ke, Zhiqiang Ma, Jianying Zhou
2025/2269 (PDF ) Accelerating FrodoKEM in Hardware Sanjay Deshpande, Patrick Longa, Jakub Szefer
2025/2268 (PDF ) On the Pitfalls of Modeling Individual Knowledge Wojciech Ciszewski, Stefan Dziembowski, Tomasz Lizurej, Marcin Mielniczuk
2025/2267 (PDF ) How to Compare Bandwidth Constrained Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol Benedikt Auerbach, Yevgeniy Dodis, Daniel Jost, Shuichi Katsumata, Rolfe Schmidt
2025/2266 (PDF ) Breaking UOV Encryption: Key Recovery Attack On Olivier Emanuele Cornaggia
2025/2265 (PDF ) PRGUE Schemes: Efficient Updatable Encryption With Robust Security From Symmetric Primitives Elena Andreeva, Andreas Weninger
2025/2264 (PDF ) Leakage-Resilient Multi-Party Computation: Protecting the Evaluator in Circuits Garbling Francesco Berti, Itamar Levi
2025/2263 (PDF ) Completing Policy-based Anonymous Tokens: Private Bits, Public Metadata and more... David Kretzler, Yong Li, Codrin Ogreanu
2025/2262 (PDF ) Certified-Everlasting Quantum NIZK Proofs Nikhil Pappu
2025/2261 (PDF ) TSS-PV: Traceable Secret Sharing with Public Verifiability Duc Anh Luong, Jong Hwan Park, Changmin Lee, Hyoseung Kim
2025/2260 (PDF ) Tight Generic PRF Security of HMAC and NMAC Yaobin Shen, Xiangyang Zhang, Lei Wang, Dawu Gu
2025/2259 (PDF ) HQC Beyond the Standard: Ciphertext Compression and Refined DFR Analysis Sebastian Bitzer, Jean-Christophe Deneuville, Emma Munisamy, Bharath Purtipli, Stefan Ritterhoff, Antonia Wachter-Zeh
2025/2258 (PDF ) On the Equivalence of Polynomial Commitments for an Identical Polynomial under Different Bases Dengji Ma, Jingyu Ke, Sinka Gao, Guoqiang Li
2025/2257 (PDF ) \textsc{Npir}: High-Rate PIR for Databases with Moderate-Size Records Yuliang Lin, Baosheng Wang, Yi Wang, Rongmao Chen
2025/2256 (PDF ) Scalable Private Set Intersection over Distributed Encrypted Data Seunghun Paik, Nirajan Koirala, Jack Nero, Hyunjung Son, Yunki Kim, Jae Hong Seo, Taeho Jung
2025/2255 (PDF ) LPG: Raise Your Location Privacy Game in Direct-to-Cell LEO Satellite Networks Quan Shi, Liying Wang, Prosanta Gope, Qi Liang, Haowen Wang, Qirui Liu, Chenren Xu, Shangguang Wang, Qing Li, Biplab Sikdar
2025/2254 (PDF ) Multi-Party Private Join Anja Lehmann, Christian Mouchet, Andrey Sidorenko
2025/2253 (PDF ) Efficient Privacy-Preserving Blueprints for Threshold Comparison Pratyush Ranjan Tiwari, Harry Eldridge, Matthew Green
2025/2252 (PDF ) Bridging Keyword PIR and Index PIR via MPHF and Batch PIR Huiqiang Liang, Haining Yu, Changtong Xu, Dongyang Zhan, Jinbo Yang, Hongli Zhang
2025/2251 (PDF ) An Efficient Private GPT Never Autoregressively Decodes Zhengyi Li, Yue Guan, Kang Yang, Yu Feng, Ning Liu, Yu Yu, Jingwen Leng, Minyi Guo
2025/2250 (PDF ) Nimbus: Secure and Efficient Two-Party Inference for Transformers Zhengyi Li, Kang Yang, Jin Tan, Wen-jie Lu, Haoqi Wu, Xiao Wang, Yu Yu, Derun Zhao, Yancheng Zheng, Minyi Guo, Jingwen Leng
2025/2249 (PDF ) Revisiting Sum-check-based Polynomial Commitment Schemes Yuncong Zhang
2025/2248 (PDF ) Learning from Leakage: Database Reconstruction from Just a Few Multidimensional Range Queries Peijie Li, Huanhuan Chen, Evangelia Anna Markatou, Kaitai Liang
2025/2247 (PDF ) Beyond Incentive Compatibility: Rational Harm-Proof Transaction Fee Mechanisms Forest Zhang, Elain Park, Ke Wu
2025/2246 (PDF ) Too Easy Fault Injection Attacks on Learning with Rounding (LWR) Francesco Berti, Sasha Petri, Itamar Levi
2025/2245 (PDF ) An Extended PUF-based Protocol Francesco Berti, Itamar Levi
2025/2244 (PDF ) Swarm in EM Hay: Particle Swarm-guided Probe Placement for EM SCA Dev Mehta, Seyedmohammad Nouraniboosjin, Maryam S. Safa, Shahin Tajik, Fatemeh Ganji
2025/2243 (PDF ) On The Dolev-Yao Model of Symmetric Cascade Protocol Varsha Jarali, Shashi Kant Pandey
2025/2242 (PDF ) Sanitizable Signatures with Different Admissibility Policies for Multiple Sanitizers Osama Allabwani, Olivier Blazy, Pascal Lafourcade, Charles Olivier-Anclin, Olivier Raynaud
2025/2241 (PDF ) LEAF: Lightweight and Efficient Hardware Accelerator for Signature Verification of FALCON Samuel Coulon, Jinjun Xiong, Jiafeng Xie
2025/2240 (PDF ) On the Cryptographic Resilience of MDS Matrices Kamil Otal, Ali Mert Sülçe, Oğuz Yayla
2025/2239 (PDF ) Rejection-Free Framework of Zero-Knowledge Proof Based on Hint-MLWE Antoine Douteau, Adeline Roux-Langlois
2025/2238 (PDF ) arya-STARK: Aggregation-Robust Yet Authentic Training via STARK Proofs Abdoul Ahad FALL
2025/2237 (PDF ) Distributed Broadcast Encryption for Confidential Interoperability across Private Blockchains Angelo De Caro, Kaoutar Elkhiyaoui, Sandeep Nishad, Sikhar Patranabis, Venkatraman Ramakrishna
2025/2236 (PDF ) Extending the SPHINCS+ Framework: Varying the Tree Heights and Chain Lengths Zhen Qin, Siwei Sun
2025/2235 (PDF ) MLWE’s impact on Web Metrics, mTLS TTLB, and AWS service endpoint connections Mila Anastasova, Panos Kampanakis
2025/2234 (PDF ) ZeroOS: A Universal Modular Library OS for zkVMs Guangxian Zou, Isaac Zhang, Ryan Zarick, Kelvin Wong, Thomas Kim, Daniel L.-K. Wong, Saeid Yazdinejad, Dan Boneh
2025/2233 (PDF ) Quantum Authentication: Security against Authentication and Verification Queries Shaoquan Jiang
2025/2232 (PDF ) Toward Practical Lattice-based Unbounded Inner Product Functional Encryption: Construction and Implementation Suprava Roy, Ratna Dutta
2025/2231 (PDF ) NeevAs: An AEAD Design for Lightweight Cryptography Varsha Jarali, Hari Preeth S, Khushboo Bussi, Shashi Kant Pandey
2025/2230 (PDF ) Efficient Algorithms for $\mathbb{G}_2$ Subgroup Membership testing on Pairing-friendly Curves Jianming Lin, Yu Dai, Chang-An Zhao, Yuhao Zheng
2025/2229 (PDF ) Practically Implementable Minimal Universal Gate Sets for Multi-Qudit Systems with Cryptographic Validation Anisha Dutta, Sayantan Chakraborty, Chandan Goswami, Avishek Adhikari
2025/2228 (PDF ) PIRANHAS: PrIvacy-Preserving Remote Attestation in Non-Hierarchical Asynchronous Swarms Jonas Hofmann, Philipp-Florens Lehwalder, Shahriar Ebrahimi, Parisa Hassanizadeh, Sebastian Faust
2025/2227 (PDF ) Time Memory Trade-off For Enumeration Yuanmi Chen, Zhao Chen, Tingting Guo, Chao Sun, Weiqiang Wen, Yu Yu
2025/2226 (PDF ) Learning With Physical Rounding for Linear and Quadratic Leakage Functions Clément Hoffmann, Pierrick Méaux, Charles Momin, Yann Rotella, François-Xavier Standaert, Balazs Udvarhelyi
2025/2225 (PDF ) Learning with Errors with Output Dependencies: LWE, LWR, and Physical Learning Problems under the Same Umbrella Clément Hoffmann, Pierrick Méaux, Mélissa Rossi, François-Xavier Standaert
2025/2224 (PDF ) Beyond Ethernet: Reusing MACsec for CANsec Friedrich Wiemer, Arthur Mutter, Jonathan Ndop, Julian Göppert, Axel Sikora, Thierry Walrant
2025/2223 (PDF ) Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System Alan T. Sherman, Jeremy J. Romanik Romano, Edward Zieglar, Enis Golaszewski, Jonathan D. Fuchs, William E. Byrd
2025/2222 (PDF ) Improved Pseudorandom Codes from Permuted Puzzles Miranda Christ, Noah Golowich, Sam Gunn, Ankur Moitra, Daniel Wichs
2025/2221 (PDF ) Sparse Vector Reconstruction from Distance Spectrum using Soft Information Magali Salom, Nicolas Sendrier, Valentin Vasseur
2025/2220 (PDF ) Performance Improvements of ZK-Prover for rWasm: A Sound and Efficient AIR for 32-bit Division and Remainder Suleyman Kardas, Mehmet Sabir Kiraz, Dmitry Savonin, Yao Wang, Aliaksei Dziadziuk
2025/2219 (PDF ) HATSolver: Learning Groebner Bases with Hierarchical Attention Transformers Mohamed Malhou, Ludovic Perret, Kristin Lauter
2025/2218 (PDF ) The Syndrome Weight Distribution in Quasi-Cyclic Codes, Applications to BIKE and HQC Antoine Mesnard, Jean-Pierre Tillich, Valentin Vasseur
2025/2217 (PDF ) Ideal Private Simultaneous Messages Schemes and Their Applications Keitaro Hiwatashi, Reo Eriguchi
2025/2216 (PDF ) AgentCrypt: Advancing Privacy and (Secure) Computation in AI Agent Collaboration Harish Karthikeyan, Yue Guo, Leo de Castro, Antigoni Polychroniadou, Leo Ardon, Udari Madhushani Sehwag, Sumitra Ganesh, Manuela Veloso
2025/2215 (PDF ) Obfuscating Pseudorandom Functions is Post-Quantum Complete Pedro Branco, Abhishek Jain, Akshayaram Srinivasan
2025/2214 (PDF ) Accelerating TFHE with Sorted Bootstrapping Techniques Loris Bergerat, Jean-Baptiste Orfila, Adeline Roux-Langlois, Samuel Tap
2025/2213 (PDF ) Simplified Meet-in-the-middle Preimage Attacks on AES-based Hashing Mathieu Degré, Patrick Derbez, André Schrottenloher
2025/2211 (PDF ) Architecture-private Zero-knowledge Proof of Neural Networks Yanpei Guo, Zhanpeng Guo, Wenjie Qu, Jiaheng Zhang
2025/2210 (PDF ) Multi-Client Functional Encryption for Small Domains Suvasree Biswas, Mohit Vaid, Arkady Yerukhimovich
2025/2209 (PDF ) A New Practical Cube Attack via Recovering Numerous Superpolys Min Zhang, Yao Sun
2025/2208 (PDF ) Vectorized SVE2 Optimization of the Post-Quantum Signature ML-DSA on ARMv9-A Architecture Hanyu Wei, Wenqian Li, Shiyu Shen, Hao Yang, Wenbo Guo, Yunlei Zhao
2025/2207 (PDF ) A General Framework for Registered Functional Encryption via User-Specific Pre-Constraining Tapas Pal, Robert Schädlich
2025/2206 (PDF ) LifeXP+: Secure, Usable and Reliable Key Recovery for Web3 Applications Panagiotis Chatzigiannis, Suvradip Chakraborty, Shimaa Ahmed
2025/2205 (PDF ) ML-Guided Beam Search for Differential Trail Discovery in SPN Ciphers: A Case Study on GIFT-64 Alireza Gholizadeh Shahrbejari, Reza Ebrahimi Atani
2025/2204 (PDF ) Consistency Verification for Zero-Knowledge Virtual Machine on Circuit-Irrelevant Representation Jingyu Ke, Boxuan Liang, Guoqiang Li
2025/2203 (PDF ) Hash-based Signature Schemes for Bitcoin Mikhail Kudinov, Jonas Nick
2025/2202 (PDF ) Disproving the Linearity of the Polynomials after the Pre-image Substitution in the System of the Third Attempt of MAYO Anna Stefano Narivelomanana
2025/2201 (PDF ) On $k$-sum algorithms for $\{-1,1\}^m$ vectors Pabasara Athukorala, Steven D. Galbraith
2025/2200 (PDF ) Privacy-Preserving Identifier Checking in 5G Marcel D.S.K. Gräfenstein, Stefan Köpsell, Maryam Zarezadeh
2025/2199 (PDF ) A Formal Security Proof of Masking: Reduction from Strong Noisy Leakage to Probing Model without Random Probing and Application to LR Primitive Rei Ueno, Akiko Inoue, Kazuhiko Minematsu, Akira Ito, Naofumi Homma
2025/2198 (PDF ) Putting Multi into Multi-Signatures: Tight Security for Multiple Signers Anja Lehmann, Cavit Özbay
2025/2197 (PDF ) Small-field hash-based SNARGs are less sound than conjectured Giacomo Fenzi, Antonio Sanso
2025/2196 (PDF ) Cardinal: Bridging Bitcoin with Ownership Preservation Lukas Aumayr, Jesus Diaz, Dimitar Jetchev, Aggelos Kiayias
2025/2195 (PDF ) Refined Modelling of the Primal Attack, and Variants Against Module-Learning With Errors Paola de Perthuis, Filip Trenkić
2025/2194 (PDF ) Turning Simulation into Construction: New Uses of NIZK Simulators Stephan Krenn, Kai Samelin, Daniel Slamanig
2025/2193 (PDF ) aLEAKator: HDL Mixed-Domain Simulation for Masked Hardware & Software Formal Verification Noé Amiot, Quentin Meunier, Karine Heydemann, Emmanuelle Encrenaz
2025/2192 (PDF ) Constant-time Quaternion Algorithms for SQIsign Andrea Basso, Chenfeng He, David Jacquemin, Fatna Kouider, Péter Kutas, Anisha Mukherjee, Sina Schaeffler, Sujoy Sinha Roy
2025/2191 (PDF ) Mobius: Enabling Byzantine-Resilient Single Secret Leader Election with Uniquely Verifiable State Hanyue Dou, Peifang Ni, Yingzi Gao, Jing Xu
2025/2190 (PDF ) Game-Theoretically Fair Distributed Coin Tossing With Private Preferences Pedro Branco, Pratik Soni, Sri AravindaKrishnan Thyagarajan, Ke Wu
2025/2189 (PDF ) An Improved Quantum Algorithm for 3-Tuple Lattice Sieving Lynn Engelberts, Yanlin Chen, Amin Shiraz Gilani, Maya-Iggy van Hoof, Stacey Jeffery, Ronald de Wolf
2025/2188 (PDF ) ALIOTH: An Efficient and Secure Weight-of-Evidence Framework for Privacy-Preserving Data Processing Ye Dong, Xiangfu Song, W.j Lu, Xudong Chen, Yaxi Yang, Ruonan Chen, Tianwei Zhang, Jin-Song Dong
2025/2187 (PDF ) Abuse Resistant Traceability with Minimal Trust for Encrypted Messaging Systems Zhongming Wang, Tao Xiang, Xiaoguo Li, Guomin Yang, Biwen Chen, Ze Jiang, Jiacheng Wang, Chuan Ma, Robert H. Deng
2025/2186 (PDF ) BEANIE – A 32-bit Cipher for Cryptographic Mitigations against Software Attacks Simon Gerhalter, Samir Hodžić, Marcel Medwed, Marcel Nageler, Artur Folwarczny, Ventzi Nikov, Jan Hoogerbrugge, Tobias Schneider, Gary McConville, Maria Eichlseder
2025/2185 (PDF ) Fully Adaptive Threshold IBE and Signatures in the Standard Model Jiayun Yan, Yu Li, Jie Chen, Haifeng Qian, Xiaofeng Chen, Debiao He
2025/2184 (PDF ) One-way Functions and Boundary Hardness of Randomized Time-Bounded Kolmogorov Complexity Yanyi Liu, Rafael Pass
2025/2183 (PDF ) Hardware Implementation of Stealthy and Lightweight Backdoor for CRYSTALS-Kyber Suraj Mandal, Prasanna Ravi, M Dhilipkumar, Debapriya Basu Roy, Anupam Chattopadhyay
2025/2182 (PDF ) Cryptanalysis on Asymmetric Structured Key Agreement Schemes Koki Jimbo
2025/2181 (PDF ) SVP$_p$ is Deterministically NP-Hard for all $p > 2$, Even to Approximate Within a Factor of $2^{\log^{1-\varepsilon} n}$ Isaac M Hair, Amit Sahai
2025/2180 (PDF ) Weight of Polynomial Products Mod $(X^n+1)$-Application to the HQC Cryptosystem- Laila El Aimani
2025/2179 (PDF ) Policy Compliant Secure Messaging Joël Alwen, Xiaohui Ding, Sanjam Garg, Yiannis Tselekounis
2025/2178 (PDF ) PQCUARK: A Scalar RISC-V ISA Extension for ML-KEM and ML-DSA Xavier Carril, Alicia Manuel Pasoot, Emanuele Parisi, Carlos Andrés Lara-Niño, Oriol Farràs, Miquel Moretó
2025/2177 (PDF ) TAPIR: A Two-Server Authenticated PIR Scheme with Preprocessing Francesca Falzon, Laura Hetz, Annamira O'Toole
2025/2176 (PDF ) On the (Un)biasability of Existing Verifiable Random Functions Davide Carnemolla, Dario Catalano, Valentina Frasca, Emanuele Giunta
2025/2175 (PDF ) Extended Abstract: NICE-PAKE and TEMPO Instantiations from MLWE Rerandomizable Splittable KEMs Nouri Alnahawi, Alexander Wiesmaier
2025/2174 (PDF ) LIME: High-Performance Private Inference with Lightweight Model and Batch Encryption Huan-Chih Wang, Ja-Ling Wu
2025/2173 (PDF ) Systems Security Foundations for Agentic Computing Mihai Christodorescu, Earlence Fernandes, Ashish Hooda, Somesh Jha, Johann Rehberger, Khawaja Shams
2025/2172 (PDF ) Crypto Wars in Secure Messaging: Covert Channels in Signal Despite Leaked Keys Mohammadamin Rakeei, Rosario Giustolisi, Andy Rupp, Chuanwei Lin, Gabriele Lenzini
2025/2171 (PDF ) Efficient GHASH and POLYVAL Implementation Using Polynomial Multiplication: Optimized 64-bit Decomposition with Bit-Reversal Elimination Mamone Tarsha Kurdi, Niels Möller
2025/2170 (PDF ) Lattice-Based Linkable Ring Signatures for Anonymous and Accountable Whistleblowing Vishal Pareek, Aditi Kar Gangopadhyay, Sugata Gangopadhyay
2025/2169 (PDF ) Multivariate exponential equations with unknown coefficients Trey Li
2025/2168 (PDF ) Hybrid Subsupport Guessing: A New Hybrid Technique for the Rank Decoding Problem Hugo Beeloo-Sauerbier Couvée, Antonia Wachter-Zeh, Violetta Weger
2025/2167 (PDF ) 1-Adaptive Weak Pseudorandom Functions Davide Li Calsi, Dominique Schröder, Julian Thomas
2025/2166 (PDF ) How to Prove Post-Quantum Security for Succinct Non-Interactive Reductions Alessandro Chiesa, Zijing Di, Zihan Hu, Yuxi Zheng
2025/2165 (PDF ) Extending and Accelerating Inner Product Masking with Fault Detection via Instruction Set Extension Songqiao Cui, Geng Luo, Junhan Bao, Josep Balasch, Ingrid Verbauwhede
2025/2164 (PDF ) Hardness and Algorithms for Batch LPN under Dependent Noise Xin Li, Songtao Mao, Zhaienhe Zhou
2025/2163 (PDF ) Correction-Based Fault Attack Against Randomized MAYO Mohamed Abdelmonem, Lejla Batina, Durba Chatterjee, Håvard Raddum
2025/2162 (PDF ) You Only Decapsulate Once: Ciphertext-Independent Single-Trace Passive Side-Channel Attacks on HQC Zhenzhi Lai, Ruiyi Zhang, Zhiyuan Zhang, Julius Hermelink, Michael Schwarz, Van-Thuan Pham, Udaya Parampalli
2025/2161 (PDF ) Attacks and Remedies for Randomness in AI: Cryptanalysis of PHILOX and THREEFRY Jens Alich, Thomas Eisenbarth, Hossein Hadipour, Gregor Leander, Felix Mächtle, Yevhen Perehuda, Shahram Rasoolzadeh, Jonas Sander, Cihangir Tezcan
2025/2160 (PDF ) Pairing-Based SNARGs with Two Group Elements Gal Arnon, Jesko Dujmovic, Eylon Yogev
2025/2159 (PDF ) One Fell Swoop: A Single-Trace Key-Recovery Attack on the Falcon Signing Algorithm Kang Li, Shouran Ma, Haochen Dou, Qian Guo
2025/2158 (PDF ) Efficient Batched IBE from Lattices in the Standard Model Saisi Xiong, Jie Chen
2025/2157 (PDF ) Taming the Stack: Proof-Preserving Blockwise FrodoKEM on RISC-V Devices with Hardware Acceleration Frank Hartmann
2025/2156 (PDF ) Multi-Verifier Keyed-Verification Anonymous Credentials Jan Bobolz, Emad Heydari Beni, Anja Lehmann, Omid Mirzamohammadi, Cavit Özbay, Mahdi Sedaghat
2025/2155 (PDF ) A New Approach to Arguments of Quantum Knowledge James Bartusek, Ruta Jawale, Justin Raizes, Kabir Tomer
2025/2154 (PDF ) Optimal Threshold Traitor Tracing Sourav Das, Pratish Datta, Aditi Partap, Swagata Sasmal, Mark Zhandry
2025/2153 (PDF ) Semigroup-homomorphic Signature Heng Guo, Kun Tian, Fengxia Liu, Zhiyong Zheng
2025/2152 (PDF ) Sum-check protocol for approximate computations Dor Bitan, Zachary DeStefano, Shafi Goldwasser, Yuval Ishai, Yael Tauman Kalai, Justin Thaler
2025/2151 (PDF ) Hardness of Problems with Hints in Code-Based Cryptography and Applications to Traitor Tracing Thomas Debris-Alazard, Victor Dyseryn, Duong Hieu Phan
2025/2150 (PDF ) Low-Latency Fully Homomorphic Arithmetic Using Parallel Prefix Group Circuit with Primitive Gate Bootstrapping Dohyuk Kim, Sin Kim, Seunghwan Lee, Dong-Joon Shin
2025/2149 (PDF ) Weak Tweak-Key Analysis Of Blink Via Superbox Shiyao Chen, Jian Guo, Tianyu Zhang
2025/2148 (PDF ) Introducing the ALF family: AES-NI-based length- and format-preserving encryption Dachao Wang, Alexander Maximov, Thomas Johansson
2025/2147 (PDF ) Updatable Private Set Intersection and Beyond: Efficient Constructions via Circuit Private Set Intersection Ferran Alborch, Tom Chauvier, Antonio Faonio, Alexandre Fontaine, Ferhat Karakoç, Alptekin Küpçü, Camille Malek, Melek Önen
2025/2146 (PDF ) Zero-Knowledge Protocols with PVC Security: Striking the Balance between Security and Efficiency Yi Liu, Yipeng Song, Anjia Yang, Junzuo Lai
2025/2145 (PDF ) Derivative-Free Richelot Isogenies via Subresultants: Algebraic Equivalence and Certified Guarded Computation Hung T. Dang
2025/2144 (PDF ) On Equivalence of the Butterfly Structure Chin Hei Chan
2025/2143 (PDF ) New Post-Quantum IBE leveraging maturity, efficiency and security of standard schemes Julien CAM
2025/2142 (PDF ) Differential cryptanalysis of An optimized novel lightweight block cipher for image encryption Khaled Hosseini, Sadegh Sadeghi
2025/2141 (PDF ) Memory Optimizations of Wagner's Algorithm with Applications to Equihash Lili Tang, Rui Ding, Yao Sun, Xiaorui Gong
2025/2140 (PDF ) Nostalgia Cipher: Can Filtered LFSRs Be Secure Again? An Application to Hybrid Homomorphic Encryption with Sub-50 ms Latency Nabil Chacal, Antonio Guimarães, Ange Martinelli, Pierrick Méaux, Romain Poussier
2025/2139 (PDF ) Scalable Private World Computer via Root iO: Application-Agnostic iO and Our Roadmap for Making It Practical Sora Suegami, Enrico Bottazzi
2025/2138 (PDF ) Synergeia: Super-Linear Consistency and Adaptive Stability in a Hybrid PoW/PoS Consensus Aaron M. Schutza
2025/2137 (PDF ) Linear Secret-shared Shuffle with Malicious Security Samuel Dittmer, Rohit Nema, Rafail Ostrovsky
2025/2136 (PDF ) The Latency Cost Of Censorship Resistance Ittai Abraham, Yuval Efron, Ling Ren
2025/2135 (PDF ) Robust Elections and More: Fast MPC in the Preprocessing Model Charanjit S. Jutla, Nathan Manohar, Arnab Roy
2025/2134 (PDF ) Non-Interactive Threshold Mercurial Signatures with Applications to Threshold DAC Scott Griffy, Nicholas Jankovic, Anna Lysyanskaya, Arup Mondal
2025/2133 (PDF ) Byzantine Broadcast with Unknown Participants Wonseok Choi, Ran Cohen, Juan Garay, Nikos Skoumios, Vassilis Zikas
2025/2132 (PDF ) Bandwidth Efficient Partial Authorized PSI Tjitske Ollie Koster, Francesca Falzon, Evangelia Anna Markatou
2025/2131 (PDF ) Persistent BitTorrent Trackers François-Xavier Wicht, Zhengwei Tong, Shunfan Zhou, Hang Yin, Aviv Yaish
2025/2130 (PDF ) Weightwise (almost) perfectly balanced functions: $t$-concatenation and the general Maiorana-McFarland class Leyla Işık, René Rodríguez-Aldama, Ajla Šehović
2025/2129 (PDF ) Binding Security of Explicitly-Rejecting KEMs via Plaintext Confirmation and Robust PKEs Juliane Krämer, Yannick Münz, Patrick Struck, Maximiliane Weishäupl
2025/2127 (PDF ) Censorship-Resistant Sealed-Bid Auctions on Blockchains Orestis Alpos, Lioba Heimbach, Kartik Nayak, Sarisht Wadhwa
2025/2126 (PDF ) DPaaS: Improving Decentralization by Removing Relays in Ethereum PBS Chenyang Liu, Ittai Abraham, Matthew Lentz, Kartik Nayak
2025/2125 (PDF ) Are ideal functionalities really ideal? Myrto Arapinis, Véronique Cortier, Hubert de Groote, Charlie Jacomme, Steve Kremer
2025/2124 (PDF ) SALSAA – Sumcheck-Aided Lattice-based Succinct Arguments and Applications Shuto Kuriyama, Russell W. F. Lai, Michał Osadnik, Lorenzo Tucci
2025/2123 (PDF ) Dictators? Friends? Forgers. Breaking and Fixing Unforgeability Definitions for Anamorphic Signature Schemes Joseph Jaeger, Roy Stracovsky
2025/2122 (PDF ) Adaptive Security for Constrained PRFs Kaishuo Cheng, Joseph Jaeger
2025/2121 (PDF ) Generic and Algebraic Computation Models: When AGM Proofs Transfer to the GGM Joseph Jaeger, Deep Inder Mohan
2025/2120 (PDF ) Language-Agnostic Detection of Computation-Constraint Inconsistencies in ZKP Programs via Value Inference Arman Kolozyan, Bram Vandenbogaerde, Janwillem Swalens, Lode Hoste, Stefanos Chaliasos, Coen De Roover
2025/2119 (PDF ) Twinkle: A family of Low-latency Schemes for Authenticated Encryption and Pointer Authentication Jianhua Wang, Tao Huang, Shuang Wu, Zilong Liu
2025/2118 (PDF ) Revisiting Rational Broadcast Protocols Shunya Otomo, Kenji Yasunaga
2025/2117 (PDF ) Revisiting Simulation Extractability in the Updatable Setting Hamidreza Khoshakhlagh
2025/2116 (PDF ) Oblivious Batch Updates for Bloom-Filter-based Outsourced Cryptographic Protocols Marten van Dijk, Dandan Yuan
2025/2115 (PDF ) Weighted Batched Threshold Encryption with Applications to Mempool Privacy Amit Agarwal, Kushal Babel, Sourav Das, Babak Poorebrahim Gilkalaye, Arup Mondal, Benny Pinkas, Peter Rindal, Aayush Yadav
2025/2114 (PDF ) Hardness of Range Avoidance and Proof Complexity Generators from Demi-Bits Hanlin Ren, Yichuan Wang, Yan Zhong
2025/2113 (PDF ) Single-Server Private Outsourcing of zk-SNARKs Kasra Abbaszadeh, Hossein Hafezi, Jonathan Katz, Sarah Meiklejohn
2025/2112 (PDF ) Sharing the Mask: TFHE bootstrapping on Packed Messages Bergerat Loris, Bonte Charlotte, Benjamin R. Curtis, Jean-Baptiste Orfila, Pascal Paillier, Samuel Tap
2025/2111 (PDF ) SoK: Secure Computation over Secret Shares Tamir Tassa, Arthur Zamarin
2025/2110 (PDF ) A note on mutual correlated agreement for Reed-Solomon codes Ulrich Haböck
2025/2109 (PDF ) Secure Lookup Tables: Faster, Leaner, and More General Chongrong Li, Pengfei Zhu, Yun Li, Zhanpeng Guo, Jingyu Li, Yuncong Hu, Zhicong Huang, Cheng Hong
2025/2108 (PDF ) The Grain Family of Stream Ciphers: an Abstraction, Strengthening of Components and New Concrete Instantiations Palash Sarkar
2025/2107 (PDF ) Quantum-safe Identity-binding Password Authenticated Key Exchange Protocols Pratima Jana, Ratna Dutta
2025/2106 (PDF ) SoK: Blockchain Oracles Between Theory and Practice Colin Finkbeiner, Ghada Almashaqbeh
2025/2105 (PDF ) HRA-Secure Puncturable Attribute-Based Proxy Re-Encryption from Lattices for Secure Cloud Sharing Tianqiao Zhang, Mingming Jiang, Fucai Luo, Yuyan Guo, Jinqiu Hou
2025/2104 (PDF ) Quantum Voting Protocol from Classical Assumptions Tingyu Ge, Mingqiang Wang, Xiaolei Wang, Xinyuan Zhao, Xuanxuan Xiao
2025/2103 (PDF ) Threshold Batched Identity-Based Encryption from Pairings in the Plain Model Junqing Gong, Brent Waters, Hoeteck Wee, David J. Wu
2025/2102 (PDF ) A Graph-Theoretic Framework for Randomness Optimization in First-Order Masked Circuits Dilip Kumar S. V., Benedikt Gierlichs, Ingrid Verbauwhede
2025/2101 (PDF ) Fault Attacks against UOV-based Signatures Sven Bauer, Fabrizio De Santis, Kristjane Koleci
2025/2100 (PDF ) Tag Functions and Their Applications to Lattice-based Signatures and IBEs — Compact Designs and Tighter Security Parhat Abla
2025/2099 (PDF ) A Lattice-based Designated Verifier zkSNARK from Standard Assumptions Mohammad Sadegh Ahmadi, Taraneh Eghlidos, Behzad Abdolmaleki, Ngoc Khanh Nguyen
2025/2098 (PDF ) Optical computing of zero-knowledge proof with single-pixel imaging Wei Huang, Shuming Jiao, Huichang Guan, Huisi Miao, Chao Wang
2025/2097 (PDF ) Hash-Based Blind Signatures: First Steps Javier Herranz, Hugo Louiso
2025/2096 (PDF ) Laser Fault Injection Attack on the eXtended Merkle Signature Scheme Alexander Wagner, Marc Schink, Silvan Streit, Dominik Klein, Sven Freud
2025/2095 (PDF ) FPS: Flexible Payment System Adithya Bhat, Srinivasan Raghuraman, Panagiotis Chatzigiannis, Duc V Le, Mohsen Minaei
2025/2094 (PDF ) Vega: Low-Latency Zero-Knowledge Proofs over Existing Credentials Darya Kaviani, Srinath Setty
2025/2093 (PDF ) Lore: An LWE-based Key Encapsulation Mechanism with Variable Modulus and CRT Compression Zhongxiang Zheng, Anyu Wang, Chunhuan Zhao, Guangwu Xu, Zhengtao Jiang, Sibo Feng, Zhichen Yan, Shuang Sun, Xiaoyun Wang
2025/2092 (PDF ) CRA and Cryptography: The Story Thus Far Markku-Juhani O. Saarinen
2025/2091 (PDF ) Efficient and Proof-of-Useful-Work Friendly Local-Search for Distributed Consensus Matthias Fitzi, Aggelos Kiayias, Laurent Michel, Giorgos Panagiotakos, Alexander Russell
2025/2090 (PDF ) Quantum Grover Attack on MIBS Hasan Ozgur Cildiroglu, Harun Basmaci, Oguz Yayla
2025/2089 (PDF ) Traceable Bottom-Up Secret Sharing and Law & Order on Community Social Key Recovery (Full Version) Rittwik Hajra, Subha Kar, Pratyay Mukherjee, Soumit Pal
2025/2088 (PDF ) UP TO 50% OFF: Efficient Implementation of Polynomial Masking Jorge Andresen, Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Eric Landthaler, Elena Micheli, Maximilian Orlt, Pajam Pauls, Kathrin Wirschem, Liang Zhao
2025/2087 (PDF ) Leakage-Free Enhanced Private Set Union for Balanced and Unbalanced Scenarios Qiang Liu, JaeYoung Bae, JoonWoo Lee
2025/2086 (PDF ) On Composing AGM-Secure Functionalities with Cryptographic Proofs: Applications to Unbounded-Depth IVC and More Matteo Campanelli, Dario Fiore, Mahak Pancholi
2025/2085 (PDF ) Strong Pseudorandom Functions in $AC^0[2]$ in the Bounded-Query Setting Marshall Ball, Clément Ducros, Saroja Erabelli, Lisa Kohl, Nicolas Resch
2025/2084 (PDF ) Postponing the Glitches is Not Enough - A Critical Analysis of the DATE 2024 E-ISW Masking Scheme Amir Moradi
2025/2083 (PDF ) Improvements to Lucas-sequence modular square roots and primality testing Mike Hamburg
2025/2082 (PDF ) Integrating PQC in OpenSSL via Shallow Providers for Cryptographic Agility Akif Mehmood, Nicola Tuveri
2025/2081 (PDF ) Partial Fraction Techniques for Cryptography Charanjit S. Jutla, Rohit Nema, Arnab Roy
2025/2080 (PDF ) Issuer Hiding for BBS-Based Anonymous Credentials Jonathan Katz, Marek Sefranek
2025/2079 (PDF ) On the Dangers of RSA Exponent Transforms Eugene Lau, Laura Shea, Nadia Heninger
2025/2078 (PDF ) Broadcast for Dynamic Committees without Trusted Setup Gabriel Dettling, Chen-Da Liu-Zhang, Elisaweta Masserova, Matthieu Rambaud, Antoine Urban
2025/2077 (PDF ) Malicious Homomorphic Secret Sharing with Applications to DV-NIZK and More Pedro Capitão, Hila Dahari-Garbian, Lisa Kohl, Zhe Li
2025/2076 (PDF ) Non-Interactive Blind Signatures from RSA Assumption and More Lucjan Hanzlik, Eugenio Paracucchi, Riccardo Zanotto
2025/2075 (PDF ) Leveled Isogeny Problems with Hints Subham Das, Riccardo Invernizzi, Péter Kutas, Jonas Meers
2025/2074 (PDF ) VIA: Communication-Efficient Single-Server Private Information Retrieval Chenyang Liu, Xukun Wang, Zhifang Zhang
2025/2073 (PDF ) Recursion Enabled: Improved Cryptanalysis of the Permuted Kernel Problem Alessandro Budroni, Marco Defranceschi, Federico Pintore
2025/2072 (PDF ) Multi-server Fuzzy Message Detection Christopher Goes, Yulia Khalniyazova, Enrique Larraia, Xuyang Song
2025/2071 (PDF ) On Cryptography and Distribution Verification, with Applications to Quantum Advantage Bruno Cavalar, Eli Goldin, Matthew Gray, Taiga Hiroka, Tomoyuki Morimae
2025/2070 (PDF ) MIFA: An MILP-based Framework for Improving Differential Fault Attacks Hanbeom Shin, Insung Kim, Sunyeop Kim, Byoungjin Seok, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee
2025/2069 (PDF ) Shorter Hash-Based Signatures Using Forced Pruning Mehdi Abri, Jonathan Katz
2025/2068 (PDF ) Fast Networks for High-Performance Distributed Trust Yicheng Liu, Rafail Ostrovsky, Scott Shenker, Sam Kumar
2025/2067 (PDF ) Cryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Channel Binding Enis Golaszewski, Alan T. Sherman, Edward Zieglar, Jonathan D. Fuchs, Sophia Hamer
2025/2066 (PDF ) A Comprehensive Analysis of the AKMA+ Protocol Yueming Li, Long Chen, Zhenfeng Zhang
2025/2065 (PDF ) TensorSwitch: Nearly Optimal Polynomial Commitments from Tensor Codes Benedikt Bünz, Giacomo Fenzi, Ron D. Rothblum, William Wang
2025/2064 (PDF ) Security of Private Set Operation Schemes: Separations and Implications Mojtaba Rafiee
2025/2063 (PDF ) QUIC-MLS: Making a Space Security Draft Standard Resilient for Disconnected Environments Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri
2025/2062 (PDF ) Cryptanalysis of Multi-Party Key Exchange Protocols over a Modified Supertropical Semiring Sulaiman Alhussaini, Sergeı̆ Sergeev
2025/2061 (PDF ) Multivariate Signatures with Polynomial Factorization Irene Di Muzio, Martin Feussner, Igor Semaev
2025/2060 (PDF ) Multi-homogeneous XL Kai-Chun Ning, Lars Ran, Simona Samardjiska
2025/2059 (PDF ) Compact, Efficient and Non-Separable Hybrid Signatures Julien Devevey, Morgane Guerreau, Maxime Roméas
2025/2058 (PDF ) Real-Time Encrypted Emotion Recognition Using Homomorphic Encryption Gyeongwon Cha, Dongjin Park, Yejin Choi, Eunji Park, Joon-Woo Lee
2025/2057 (PDF ) Distributed Key Generation for Efficient Threshold-CKKS Seonhong Min, Guillaume Hanrot, Jai Hyun Park, Alain Passelègue, Damien Stehlé
2025/2056 (PDF ) Unclonable Cryptography in Linear Quantum Memory Omri Shmueli, Mark Zhandry
2025/2055 (PDF ) On Proximity Gaps for Reed–Solomon Codes Eli Ben-Sasson, Dan Carmon, Ulrich Haböck, Swastik Kopparty, Shubhangi Saraf
2025/2054 (PDF ) Optimal Proximity Gaps for Subspace-Design Codes and (Random) Reed-Solomon Codes Rohan Goyal, Venkatesan Guruswami
2025/2053 (PDF ) DIFA-Rent: Division Property Based Fault Attacks on DEFAULT and BAKSHEESH Shibam Ghosh, Anup Kumar Kundu, Dhiman Saha
2025/2052 (PDF ) SoK: Systematizing Hybrid Strategies for the Transition to Post-Quantum Cryptography Abdoul Ahad Fall
2025/2051 (PDF ) All Polynomial Generators Preserve Distance with Mutual Correlated Agreement Sarah Bordage, Alessandro Chiesa, Ziyi Guan, Ignacio Manzur
2025/2050 (PDF ) TPL: Power Leakage Model Based on Technology Library Sumesh Manjunath Ramesh, Hoda Alkhzaimi
2025/2049 (PDF ) Black-Box Separation Between Multi-Collision Resistance and Collision Resistance Xinyu Mao, Jiapeng Zhang
2025/2048 (PDF ) Time-Lock Encrypted Storage for Blockchains Amit Agarwal, Kushal Babel, Sourav Das, Babak Poorebrahim Gilkalaye
2025/2047 (PDF ) Enabling Index-free Adjacency in Oblivious Graph Processing with Delayed Duplications Weiqi Feng, Xinle Cao, Adam O'Neill, Chuanhui Yang
2025/2046 (PDF ) On Reed–Solomon Proximity Gaps Conjectures Elizabeth Crites, Alistair Stewart
2025/2045 (PDF ) Handling Noisy Plaintext Checking Oracles with SPiRiT Paco Poilbout, Thomas Roche, Laurent Imbert
2025/2044 (PDF ) New Asymptotic Results on Predicting Non-linear Polynomial Congruential Generators Mengce Zheng, Yansong Feng, Abderrahmane Nitaj, Yanbin Pan
2025/2043 (PDF ) Key-Recovery Side-Channel Attack on the Berlekamp-Massey Decoding Algorithm in the Classic McEliece KEM Andrei Alexei, Marios Omar Choudary, Vlad-Florin Dragoi
2025/2042 (PDF ) Threshold Anonymous Credentials with Silent Setup Preshtha Garg, Sanjam Garg, Guru-Vamsi Policharla, Bhaskar Roberts
2025/2041 (PDF ) Sum-check Is All You Need: An Opinionated Survey on Fast Provers in SNARK Design Justin Thaler
2025/2040 (PDF ) The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1 Antoine Bak, Augustin Bariant, Aurélien Boeuf, Pierre Briaud, Morten Øygarden, Atharva Phanse
2025/2039 (PDF ) Non-Delegatable Commitments Georg Fuchsbauer, Pranav Garimidi, Guru-Vamsi Policharla, Max Resnick, Ertem Nusret Tas
2025/2038 (PDF ) Breaking and Fixing MacaKey Ritam Bhaumik, Bishwajit Chakraborty, Chandranan Dhar
2025/2037 (PDF ) On the Simulation-Extractability of Proof-Carrying Data Behzad Abdolmaleki, Matteo Campanelli, Quang Dao, Hamidreza Khoshakhlagh
2025/2036 (PDF ) On new variants of funcCPA security and related CCA-secure constructions Caroline Fontaine, Marc Renard, Renaud Sirdey, Oana Stan
2025/2035 (PDF ) Multivariate Commitments and Signatures with Efficient Protocols Charles Bouillaguet, Thibauld Feneuil, Jules Maire, Matthieu Rivain, Julia Sauvage, Damien Vergnaud
2025/2034 (PDF ) MtDB: A Decentralized Multi-Tenant Database for Secure Data Sharing Showkot Hossain, Wenyi Tang, Changhao Chenli, Haijian Sun, WenZhan Song, Seokki Lee, Mic Bowman, Taeho Jung
2025/2033 (PDF ) Vestigial Vulnerabilities in Deployed Verifiable E-Voting Systems Thomas Haines, Jarrod Rose
2025/2032 (PDF ) TrX: Encrypted Mempools in High Performance BFT Protocols Rex Fernando, Guru-Vamsi Policharla, Andrei Tonkikh, Zhuolun Xiang
2025/2031 (PDF ) A Note on Notes: Towards Scalable Anonymous Payments via Evolving Nullifiers and Oblivious Synchronization Sean Bowe, Ian Miers
2025/2030 (PDF ) Succinct Zero-knowledge Proofs from One-way Functions:The Blackbox Way Eden Florentz- Konopnicki, Ron D. Rothblum
2025/2029 (PDF ) Forging Dilithium and Falcon Signatures by Single Fault Injection Sven Bauer, Fabrizio De Santis
2025/2028 (PDF ) Improving ML-KEM and ML-DSA on OpenTitan - Efficient Multiplication Vector Instructions for OTBN Ruben Niederhagen, Hoang Nguyen Hien Pham
2025/2027 (PDF ) Accurate BGV Parameters Selection: Accounting for Secret and Public Key Dependencies in Average-Case Analysis Beatrice Biasioli, Chiara Marcolla, Nadir Murru, Matilda Urani
2025/2026 (PDF ) Whom do you trust? PRISM: Lightweight Key Transparency for All Sebastian Pusch, Ryan Quinn Ford, Joachim von zur Gathen, Alexander Markowetz
2025/2025 (PDF ) Migration to Post-Quantum Cryptography: From ECDSA to ML-DSA Daniel Dinu
2025/2024 (PDF ) A Note Comparing Three Incentive Designs Against Privacy-Targeted Collusion Tiantian Gong
2025/2023 (PDF ) Select-Then-Compute: Encrypted Label Selection and Analytics over Distributed Datasets using FHE Nirajan Koirala, Seunghun Paik, Sam Martin, Helena Berens, Tasha Januszewicz, Jonathan Takeshita, Jae Hong Seo, Taeho Jung
2025/2022 (PDF ) Formal Verification of Privacy Pass Kristiana Ivanova, Daniel Gardham, Stephan Wesemeyer
2025/2021 (PDF ) TreeCast: Multi-Party Key Establishment Protocol for IoT Devices Supriyo Banerjee, Sayon Duttagupta
2025/2020 (PDF ) VerfCNN, Optimal Complexity zkSNARK for Convolutional Neural Networks Wenjie Qu, Yanpei Guo, Yue Ying, Jiaheng Zhang
2025/2019 (PDF ) Practical Multi-party Private Set Intersection with Reducible Zero-sharing Yewei Guan, Hua Guo, Man Ho Au, Jiarong Huo, Jin Tan, Zhenyu Guan
2025/2018 (PDF ) Batched and Packed (Publicly) Verifiable Secret Sharing: A Unified Framework and Applications Shahla Atapoor, Karim Baghery, Georgio Nicolas, Robi Pedersen, Jannik Spiessens
2025/2017 (PDF ) Secure Onion Encryption and the Case of Counter Galois Onion Jean Paul Degabriele, Alessandro Melloni, Martijn Stam
2025/2016 (PDF ) Constructions of a Family of Nonlinear Permutations of Any Possible Algebraic Degrees with the Optimal Threshold Implementations Zhaole Li, Deng Tang
2025/2015 (PDF ) Proving Authenticated Key Exchange via Memory-Efficient Reductions Jiaxin Pan, Runzhi Zeng
2025/2014 (PDF ) Multi-Splitting Forking Based Modular Security of Signatures in Multivariate Quadratic Setting Sanjit Chatterjee, Tapas Pandit, Subhabrata Samajder
2025/2013 (PDF ) MARS: Low-Leakage Multi Adversarial Owner and Reader Replication-free Searchable Encryption from Private Information Retrieval Benjamin Fuller, Arinjita Paul, Maryam Rezapour, Ronak Sahu, Amey Shukla
2025/2012 (PDF ) Head Start: Digit Extraction in TFHE from MSB to LSB Jan-Pieter D'Anvers, Xander Pottier, Thomas de Ruijter, Ingrid Verbauwhede
2025/2011 (PDF ) When the Wrong Key Lives On: The Key-Recovery Procedure in Integral Attacks Christof Beierle, Gregor Leander, Yevhen Perehuda
2025/2010 (PDF ) On the Distribution of the Distances of Random Words Benjamin E. Diamond, Angus Gruen
2025/2009 (PDF ) When Randomness Isn’t Random: Practical Fault Attack on Post-Quantum Lattice Standards Hariprasad Kelassery Valsaraj, Prasanna Ravi, Shivam Bhasin, Hongjun Wu
2025/2008 (PDF ) Two-Server Private Information Retrieval in Sublinear Time and Quasilinear Space Alexandra Henzinger, Seyoon Ragavan
2025/2007 (PDF ) k-Anonymous Group Signatures: Addressing Strict Content Moderation in End-to-End Secure Messaging Platforms Shalini Banerjee, Andrey Bozhko, Andy Rupp
2025/2006 (PDF ) OmniBA: Round-Efficient BA with Quadratic Communication under Mixed Faults Simon Holmgaard Kamp, Julian Loss, Kartik Nayak, Kecheng Shi
2025/2005 (PDF ) Reactive Correctness, sINDCPA-D-Security and Deterministic Evaluation for TFHE Nigel Smart, Michael Walter
2025/2004 (PDF ) Re-randomization Attack on the Certificateless Encryption Scheme proposed by Guo et al. Nobuyuki Sugio, Keita Emura, Toshihiro Ohigashi
2025/2003 (PDF ) A Sparse Polynomial Multiplier for HQC Integrating Parallelism and Power-Based Side-Channel Countermeasures Jaeho Jeon, Suseong Lee, Myeongjun Kim, Eunyoung Seo, Myunghyun Cho, Seonggyeom Kim, Bo Gyeong Kang, Young-Sik Kim
2025/2002 (PDF ) Pseudorandom Correlation Functions for Multiparty Beaver Triples from Sparse LPN Sebastian Hasler, Pascal Reisert
2025/2001 (PDF ) On Computational VSS for General Access Structures Shahla Atapoor, Karim Baghery, Robin Jadoul, Barry van Leeuwen
2025/2000 (PDF ) Trust, But Verify When Using the Powers of Tau Karim Baghery
2025/1999 (PDF ) New Security Proofs of MPC-in-the-Head Signatures in the Quantum Random Oracle Model Haruhisa Kosuge, Keita Xagawa
2025/1998 (PDF ) Non-Adaptive One-Way to Hiding not only Implies Adaptive Quantum Reprogramming, but also Does Better Heming Liao, Jiangxia Ge, Rui Xue, Xiaogang Zhou
2025/1997 (PDF ) Provable decryption failure security for practical lattice-based PKE Christian Majenz, Fabrizio Sisinni
2025/1996 (PDF ) Turning Multiple Key-Dependent Attacks into Universal Attacks Hosein Hadipour, Yosuke Todo, Mostafizar Rahman, Maria Eichlseder, Ravi Anand, Takanori Isobe
2025/1995 (PDF ) Device-Bound Anonymous Credentials With(out) Trusted Hardware Karla Friedrichs, Franklin Harding, Anja Lehmann, Anna Lysyanskaya
2025/1994 (PDF ) Separating Pseudorandom Generators from Logarithmic Pseudorandom States Mohammed Barhoush
2025/1993 (PDF ) A Simplified Round-by-round Soundness Proof of FRI Albert Garreta, Nicolas Mohnblatt, Benedikt Wagner
2025/1992 (PDF ) Improved Concurrent-Secure Blind Schnorr Signatures Pierpaolo Della Monica, Ivan Visconti
2025/1991 (PDF ) TWFalcon: Triple-Word Arithmetic for Falcon; Giving Falcon the Precision to Fly Securely Stef Halmans, Christine van Vredendaal, Tobias Schneider, Frank Custers, Tim Güneysu
2025/1990 (PDF ) Accelerating the Primal Hybrid Attack against Sparse LWE using GPUs Ludo N. Pulles, Paul Vié
2025/1989 (PDF ) HardCODE: Hardware-based Circuit Obfuscation using Data Encryption Akashdeep Saha, Sayani Sinha, Chandan Kumar, Animesh Singh, Siddhartha Chowdhury, Sikhar Patranabis, Debdeep Mukhopadhyay
2025/1988 (PDF ) Almost NTRU: Revisiting Noncommutativity Against Lattice Attacks Ali Raya, Vikas Kumar, Seong Oun Hwang, Sugata Gangopadhyay
2025/1987 (PDF ) Single-Trace Key Recovery Attacks on HQC Using Valid and Invalid Ciphertexts Haiyue Dong, Qian Guo, Denis Nabokov
2025/1986 (PDF ) Anonymous Authentication and Key Agreement, Revisited Yanqi Zhao, Xiangyu Liu, Min Xie, Xiaoyi Yang, Jianting Ning, Baodong Qin, Haibin Zhang, Yong Yu
2025/1985 (PDF ) OUF: Oblivious Universal Function with domain specific optimizations Victor Delfour, Marc-Olivier Killijian
2025/1984 (PDF ) Fully Anonymous Secret Sharing Allison Bishop, Matthew Green, Yuval Ishai, Abhishek Jain, Paul Lou
2025/1983 (PDF ) SCORE: A SlotToCoeff Optimization for Real-Vector Encryption in CKKS Tim Seuré
2025/1982 (PDF ) On Evaluating Anonymity of Onion Routing Alessandro Melloni, Martijn Stam, Øyvind Ytrehus
2025/1981 (PDF ) Vision: A Modular Framework for Anonymous Credential Systems Anja Lehmann, Andrey Sidorenko, Alexandros Zacharakis
2025/1980 (PDF ) Traceable Secret Sharing Revisited Vipul Goyal, Abhishek Jain, Aditi Partap
2025/1979 (PDF ) On Singh et. al.'s "Collatz Hash" Joe Doyle
2025/1978 (PDF ) Cryptography with Weak Privacy Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Hanjun Li
2025/1977 (PDF ) Evaluating the Resistance of ARADI Against Differential Fault Attack Chandan Dey, Soumya Sahoo, Santanu Sarkar
2025/1976 (PDF ) Improved Differential Cryptanalysis of ARADI Surajit Mandal, Sandip Kumar Mondal, Raghvendra Rohit, Santanu Sarkar
2025/1975 (PDF ) Rethinking Consensus with Time as a Primitive Ignacio Amores-Sesar, Michelle Yeo
2025/1974 (PDF ) Taming Iterative Grinding Attacks on Blockchain Beacons Peter Gaži, Saad Quader, Alexander Russell
2025/1973 (PDF ) Tight Security for BBS Signatures Rutchathon Chairattana-Apirom, Dennis Hofheinz, Stefano Tessaro
2025/1972 (PDF ) Formalisation of the KZG polynomial commitment schemes in EasyCrypt Palak, Thomas Haines
2025/1971 (PDF ) General Key Recovery Attack on Pointwise-Keyed Functions - Application to Alternating Moduli Weak PRFs Antoine Sidem, Qingju Wang
2025/1970 (PDF ) Delving into Cryptanalytic Extraction of PReLU Neural Networks Yi Chen, Xiaoyang Dong, Ruijie Ma, Yantian Shen, Anyu Wang, Hongbo Yu, Xiaoyun Wang
2025/1969 (PDF ) Cryptographic Personas: Responsible Pseudonyms Without De-Anonymization Rachel Thomas, Oliwia Kempinski, Hari Kailad, Emma Margaret Shroyer, Ian Miers, Gabriel Kaptchuk
2025/1968 (PDF ) TAPAS: Datasets for Learning the Learning with Errors Problem Eshika Saxena, Alberto Alfarano, François Charton, Emily Wenger, Kristin Lauter
2025/1967 (PDF ) Linear-time and Logarithmically-sound Permutation and Multiset SNARKs Bing-Jyue Chen, Lilia Tang, David Heath, Daniel Kang
2025/1966 (PDF ) DPA-Style Attacks on HQC Zhuo Huang, Weijia Wang, Xiaogang Zhou, Yu Yu
2025/1965 (PDF ) Auntie: Unobservable Contracts from Zerocash and Trusted Execution Environments Adrian Cinal
2025/1964 (PDF ) Generic PVSS Framework with $O(1)$ Complexity Using CCA2-Secure Threshold Encryption Liang Zhang, Dongliang Cai, Yiwen Gao, Haibin Kan, Jiheng Zhang, Moti Yung
2025/1963 (PDF ) Germany Is Rolling Out Nation-Scale Key Escrow And Nobody Is Talking About It Jan Sebastian Götte
2025/1962 (PDF ) High Fidelity Security Mesh Monitoring using Low-Cost, Embedded Time Domain Reflectometry Jan Sebastian Götte, Björn Scheuermann
2025/1961 (PDF ) Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws Adrian Cinal, Przemysław Kubiak, Mirosław Kutyłowski, Gabriel Wechta
2025/1960 (PDF ) Multiple Rows Mixers and Hsilu - A Family of Linear Layers and A Permutation with Fewer XORs Xiaobin Yu, Meicheng Liu
2025/1959 (PDF ) On the Communication Complexity of PSM and CDS for Symmetric Functions Reo Eriguchi
2025/1958 (PDF ) A Lattice-Based IND-CCA Threshold KEM from the BCHK+ Transform Oleksandra Lapiha, Thomas Prest
2025/1957 (PDF ) Fast Batch Matrix Multiplication in Ciphertexts Jung Hee Cheon, Minsik Kang, Junho Lee
2025/1956 (PDF ) A Chosen-Ciphertext Side-Channel Attack on Shuffled CRYSTALS-Kyber Hao Zhang, Zewen Ye, Teng Wang, Yuanming Zhang, Tianyu Wang, Chengxuan Wang, Kejie Huang
2025/1955 (PDF ) Aggregate Signatures Tightly Secure under Adaptive Corruptions Yusuke Sakai
2025/1954 (PDF ) Neural Leakage Model: Correlation Power Analysis with Profiled Leakage Model using Deep Neural Networks Trevor Yap, Shivam Bhasin, Liu Zhang
2025/1953 (PDF ) Adaptively Secure Partially Non-Interactive Threshold Schnorr Signatures in the AGM Renas Bacho, Yanbo Chen, Julian Loss, Stefano Tessaro, Chenzhi Zhu
2025/1952 (PDF ) KPIR-C: Keyword PIR with Arbitrary Server-side Computation Ali Arastehfard, Weiran Liu, Qixian Zhou, Zinan Shen, Liqiang Peng, Lin Qu, Shuya Feng, Yuan Hong
2025/1951 (PDF ) What is Cryptography Hiding from Itself? Diego F. Aranha, Nikolas Melissaris
2025/1950 (PDF ) Fully Adaptive FROST in the Algebraic Group Model From Falsifiable Assumptions Ruben Baecker, Paul Gerhart, Davide Li Calsi, Luigi Russo, Dominique Schröder, Arkady Yerukhimovich
2025/1949 (PDF ) On the Credibility of Deniable Communication in Court Jacob Leiken, Sunoo Park
2025/1948 (PDF ) Feedback Lunch: Deep Feedback Codes for Wiretap Channels Yingyao Zhou, Natasha Devroye, Onur Günlü
2025/1947 (PDF ) Minicrypt PRFs Do Not Admit Black-Box Oblivious Evaluations Cruz Barnum, Mohammad Hajiabadi, David Heath, Jake Januzelli, Naman Kumar, Mike Rosulek
2025/1946 (PDF ) Robust and Scalable Lattice-Based Distributed Key Generation for Asynchronous Networks Linghe Yang, Jian Liu, Jingyi Cui, Guangquan Xu, Zhongshan Li, Lei Zhang, Mingzi Zuo, Kaitai Liang
2025/1945 (PDF ) So about that Quantum Lattice Thing: Rebuttal to "Exact Coset Sampling for Quantum Lattice Algorithms" Daniel Apon
2025/1944 (PDF ) Architectural Leakage Analysis of Masked Cryptographic Software on RISC-V Cores Siddhartha Chowdhury, Nimish Mishra, Sarani Bhattacharya, Debdeep Mukhopadhyay
2025/1943 (PDF ) Circuit-Succinct Algebraic Batch Arguments from Projective Functional Commitments David Balbás, Dario Fiore, Russell W. F. Lai
2025/1942 (PDF ) Privacy-Preserving Shape Matching with Leveled Homomorphic Encryption Agha Aghayev, Yadigar Imamverdiyev
2025/1941 (PDF ) Adaptively-Secure Three-Round Threshold Schnorr from DL Guilhem Niot, Michael Reichle, Kaoru Takemure
2025/1940 (PDF ) GPV Preimage Sampling with Weak Smoothness and Its Applications to Lattice Signatures Shiduo Zhang, Huiwen Jia, Delong Ran, Yang Yu, Yu Yu, Xiaoyun Wang
2025/1939 (PDF ) Efficient Polynomial Multiplication for HQC on ARM Cortex-M4 Jihoon Jang, Myeonghoon Lee, Donggeun Kwon, Seokhie Hong, Suhri Kim, Sangjin Lee
2025/1938 (PDF ) zk-Cookies: Continuous Anonymous Authentication for the Web Alexander Frolov, Hal Triedman, Ian Miers
2025/1937 (PDF ) Noisy Function Secret Sharing and its applications to Differentially Private computations Marc Damie, Federico Mazzone, Florian Hahn, Andreas Peter, Jan Ramon
2025/1936 (PDF ) Overshooting the Threshold: ($td+n$)-Masking Vincent Grosso, Carlos Andres Lara-Nino
2025/1935 (PDF ) Fully Homomorphic Encryption for Matrix Arithmetic Craig Gentry, Yongwoo Lee
2025/1934 (PDF ) HORCRUX - A Lightweight PQC-RISC-V eXtension Architecture Alessandra Dolmeta, Valeria Piscopo, Guido Masera, Maurizio Martina, Michael Hutter
2025/1933 (PDF ) Revisiting Multi-Key Blind Rotation: Optimized NTRU-based Bootstrapping for MKFHE Xiaohan Wan, Mingqiang Wang, Xiaopeng Cheng, Haiyang Xue, Qi Zhang
2025/1932 (PDF ) Decoding Balanced Linear Codes With Preprocessing Andrej Bogdanov, Rohit Chatterjee, Yunqi Li, Prashant Nalini Vasudevan
2025/1931 (PDF ) Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin
2025/1930 (PDF ) Attention is still what you need: Another Round of Exploring Shoup’s GGM Taiyu Wang, Cong Zhang, Hong-Sheng Zhou, Xin Wang, Pengfei Chen, Wenli Wang, Kui Ren, Chun Chen
2025/1929 (PDF ) Cryptanalysis of a Post-Quantum Signature Scheme Based on Number-Theoretic Assumptions Agha Aghayev, Nour-eddine Rahmani
2025/1928 (PDF ) Optimizing the Post Quantum Signature Scheme CROSS for Resource Constrained Devices Jonas Schupp, Marco Gianvecchio, Alessandro Barenghi, Patrick Karl, Gerardo Pelosi, Georg Sigl
2025/1927 (PDF ) Accelerating LWE-Based Post-Quantum Cryptography with Approximate Computing Diamante Simone CRESCENZO, Emanuele VALEA, Alberto BOSIO
2025/1926 (PDF ) Hashing-friendly elliptic curves Dimitri Koshelev
2025/1925 (PDF ) Improved Modeling for Substitution Boxes with Negative Samples and Beyond (Extended Version) Debranjan Pal, Anubhab Baksi, Surajit Mandal, Santanu Sarkar
2025/1924 (PDF ) Golden: Lightweight Non-Interactive Distributed Key Generation Benedikt Bünz, Kevin Choi, Chelsea Komlo
2025/1923 (PDF ) Coil-Based Detection and Concurrent Error Correction Against EMFI - An Experimental Case-Study on a Prototype ASIC Felix Uhle, Nicolai Müller, Thorben Moos, Philipp Günther, Amir Moradi
2025/1922 (PDF ) Guaranteeing a Dishonest Party’s Knowledge (Or: Setup Requirements for Deniable Authentication) Nils Fleischhacker, Guilherme Rito
2025/1921 (PDF ) Multi-Copy Security in Unclonable Cryptography Alper Çakan, Vipul Goyal, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2025/1920 (PDF ) ALFOMs and the Moirai: Quantifying the Performance/Security Tradeoff for ZK-friendly Hash Functions Aurélien Boeuf, Léo Perrin
2025/1919 (PDF ) UPPR: Universal Privacy-Preserving Revocation Leandro Rometsch, Philipp-Florens Lehwalder, Anh-Tu Hoang, Dominik Kaaser, Stefan Schulte
2025/1918 (PDF ) Differential-MITM Attack on 14-round ARADI Shibam Ghosh, Bastien Michel, María Naya-Plasencia
2025/1917 (PDF ) Embedding belief propagation within a multi-task learning model : An example on Kyber's NTT Thomas Marquet, Elisabeth Oswald
2025/1916 (PDF ) Graeffe-Based Attacks on Poseidon and NTT Lower Bounds Ziyu Zhao, Antonio Sanso, Giuseppe Vitto, Jintai Ding
2025/1915 (PDF ) A Framework for Efficient Quantum Implementations of Linear Layers Kyungbae Jang, Anubhab Baksi, Hwajeong Seo
2025/1914 (PDF ) A Note on ``Designing Anonymous Signature-Based Identity Authentication Scheme for Ocean Multilevel Transmission'' Zhengjun Cao, Lihua Liu
2025/1913 (PDF ) Unambiguous SNARGs for P from LWE with Applications to PPAD Hardness Liyan Chen, Cody Freitag, Zhengzhong Jin, Daniel Wichs
2025/1912 (PDF ) Quasar: Sublinear Multi-Cast Commitment Mixing in Recursive Accumulation Tianyu Zheng, Shang Gao, Sherman S. M. Chow, Yu Guo, Bin Xiao
2025/1911 (PDF ) Differential Meet-in-the-Middle Attacks on Feistel Ciphers Bastien Michel, Dounia M'foukh, María Naya-Plasencia
2025/1910 (PDF ) Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical Alexander Karenin, Elena Kirshanova, Alexander May, Julian Nowakowski
2025/1909 (PDF ) Weak Instances of the Two Matrix Code Equivalence Problem Jesús-Javier Chi-Domínguez
2025/1908 (PDF ) MPCitH Signature from Restricted Syndrome Decoding Michele Battagliola, Ethan Y. Chen, Hugo Sauerbier Couvée, Violetta Weger
2025/1907 (PDF ) Introducing GRAFHEN: GRoup-bAsed Fully Homomorphic Encryption without Noise Pierre Guillot, Auguste Hoang Duc, Michel Koskas, Florian Méhats
2025/1906 (PDF ) A Simple and Efficient One-Shot Signature Scheme Andrew Huang, Vinod Vaikuntanathan
2025/1905 (PDF ) Symphony: Scalable SNARKs in the Random Oracle Model from Lattice-Based High-Arity Folding Binyi Chen
2025/1904 (PDF ) Predicting Module-Lattice Reduction Léo Ducas, Lynn Engelberts, Paola de Perthuis
2025/1903 (PDF ) Serval: Slack-Free ℓ2-Sound Polynomial Commitments from Lattices Lizhen Zhang, Sherman S. M. Chow, Shang Gao, Bin Xiao
2025/1902 (PDF ) Multi-Party Functional Encryption (MPFE): A tool in the distributed and decentralized world Ruxandra F. Olimid
2025/1901 (PDF ) Towards formal verification and corrupted setup security for the SwissPost voting system Sevdenur Baloglu, Sergiu Bursuc, Reynaldo Gil-Pons, Sjouke Mauw
2025/1900 (PDF ) Beholder Signatures Stefan Dziembowski, Sebastian Faust, Paweł Kędzior, Marcin Mielniczuk, Susil Kumar Mohanty, Krzysztof Pietrzak
2025/1899 (PDF ) CoupledNets: Resisting Feature Snooping Attacks on Neural Processing Units through Noise Injection into Models Sachintha Kavishan Jayarathne, Seetal Potluri
2025/1898 (PDF ) Unique NIZKs and Steganography Detection Willy Quach, LaKyah Tyner, Daniel Wichs
2025/1897 (PDF ) Dynark: Making Groth16 Dynamic Tianyu Zhang, Yupeng Ouyang, Yupeng Zhang
2025/1896 (PDF ) An Approach to Computable Contracts with Verifiable Computation Outsourcing and Blockchain Transactions Carlo Brunetta, Amit Chaudhary, Stefano Galatolo, Massimiliano Sala
2025/1895 (PDF ) Differential Fault Attacks on MQOM, Breaking the Heart of Multivariate Evaluation Vladimir Sarde, Nicolas Debande
2025/1894 (PDF ) Bounded-Equivocable Pseudorandom Functions Paul Gerhart, Davide Li Calsi, Luigi Russo, Dominique Schröder
2025/1893 (PDF ) Poseidon(2)b: Binary Field Versions of Poseidon/Poseidon2 Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Markus Schofnegger, Verena Schröppel, Zhuo Wu
2025/1892 (PDF ) Optimizing FHEW-Like Homomorphic Encryption Schemes with Smooth Performance-Failure Trade-Offs Deokhwa Hong, Yongwoo Lee
2025/1891 (PDF ) Fraud Mitigation in Privacy-Preserving Attribution Rutchathon Chairattana-Apirom, Stefano Tessaro, Nirvan Tyagi
2025/1890 (PDF ) Cryptanalysis on Lightweight Verifiable Homomorphic Encryption Jung Hee Cheon, Daehyun Jang
2025/1889 (PDF ) Gluing Random Unitaries with Inverses and Applications to Strong Pseudorandom Unitaries Prabhanjan Ananth, John Bostanci, Aditya Gulati, Yao-Ting Lin
2025/1888 (PDF ) HCTR2-FP and HCTR3-FP: Format-Preserving Encryption from Wide-Block Ciphers Frank Denis
2025/1887 (PDF ) Parallel Spooky Pebbling Makes Regev Factoring More Practical Gregory D. Kahanamoku-Meyer, Seyoon Ragavan, Katherine Van Kirk
2025/1886 (PDF ) Blind Signatures from Arguments of Inequality Michael Klooß, Russell W. F. Lai, Michael Reichle
2025/1885 (PDF ) Correction Fault Attack on CROSS under Unknown Bit Flips Sönke Jendral, Elena Dubrova, Qian Guo, Thomas Johansson
2025/1884 (PDF ) PERSEUS – Probabilistic Evaluation of Random probing SEcurity Using efficient Sampling Sonia Belaïd, Gaëtan Cassiers
2025/1883 (PDF ) On the security of two blind signatures from code equivalence problems Valerie Gilchrist, Laurane Marco, Christophe Petit, Gang Tang
2025/1882 (PDF ) MATCHI: formal verification of hardware private circuits Gaëtan Cassiers
2025/1881 (PDF ) Making Post Quantum Key Exchange Efficient: An Implementation with the MLS Protocol Noah Greene, Britta Hale
2025/1880 (PDF ) Copy-Protection from Unclonable Puncturable Obfuscation, Revisited Prabhanjan Ananth, Amit Behera, Zikuan Huang, Fuyuki Kitagawa, Takashi Yamakawa
2025/1879 (PDF ) A Minrank-based Encryption Scheme à la Alekhnovich-Regev Thomas Debris-Alazard, Philippe Gaborit, Romaric Neveu, Olivier Ruatta
2025/1878 (PDF ) MIRANDA: short signatures from a leakage-free full-domain-hash scheme Alain Couvreur, Thomas Debris-Alazard, Philippe Gaborit, Adrien Vinçotte
2025/1877 (PDF ) Binary Codes for Computationally Bounded Errors Under Standard Crypto Assumptions George Lu, Jad Silbak, Daniel Wichs
2025/1876 (PDF ) SoK: Lookup Table Arguments Hossein Hafezi, Gaspard Anthoine, Matteo Campanelli, Dario Fiore
2025/1875 (PDF ) Generic-compatible distinguishers for linear regression based attacks Sana Boussam
2025/1874 (PDF ) 0-ART. Asynchronous and Verifiable Group Management for Decentralized Applications Yevhen Hrubiian, Illia Melnyk, Volodymyr Dubinin, Oleksandr Kurbatov, Serhii Volynets, Roman Perebynos, Yevhenii Serdiukov
2025/1873 (PDF ) Threshold Reporting Protocol for Traceability in Anonymous Social Networks Olivier Blazy, Lola-Baie Mallordy
2025/1872 (PDF ) Interoperable Symmetric Message Franking Carolina Ortega Pérez, Thomas Ristenpart, Julia Len
2025/1871 (PDF ) A Unified Approach to Quantum Key Leasing with a Classical Lessor Fuyuki Kitagawa, Jiahui Liu, Shota Yamada, Takashi Yamakawa
2025/1870 (PDF ) Lookup-Table Evaluation over Key-Homomorphic Encodings and KP-ABE for Nonlinear Operations Sora Suegami, Enrico Bottazzi
2025/1869 (PDF ) Just How Secure is SRP, Really? Jiayu Xu, Zhiyuan Zhao
2025/1868 (PDF ) Is the Hard-Label Cryptanalytic Model Extraction Really Polynomial? Akira Ito, Takayuki Miura, Yosuke Todo
2025/1867 (PDF ) Vectorized Falcon-Sign Implementations using SSE2, AVX2, AVX-512F, NEON, and RVV Jipeng Zhang, Jiaheng Zhang
2025/1866 (PDF ) Succinct Line-Point Zero-Knowledge Arguments from Homomorphic Secret Sharing Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan, Mengmeng Zhou
2025/1865 (PDF ) High-Throughput AES Transciphering using CKKS: Less than 1ms Youngjin Bae, Jung Hee Cheon, Minsik Kang, Taeseong Kim
2025/1864 (PDF ) Black-Box Separation Between Pseudorandom Unitaries, Pseudorandom Isometries, and Pseudorandom Function-Like States Aditya Gulati, Yao-Ting Lin, Tomoyuki Morimae, Shogo Yamada
2025/1863 (PDF ) On Limits on the Provable Consequences of Quantum Pseudorandomness Samuel Bouaziz--Ermann, Minki Hhan, Garazi Muguruza, Quoc-Huy Vu
2025/1862 (PDF ) CuKEM: A Concise and Unified Hybrid Key Encapsulation Mechanism Yiting Liu, Biming Zhou, Haodong Jiang
2025/1861 (PDF ) FrodoKEM: A CCA-Secure Learning With Errors Key Encapsulation Mechanism Lewis Glabush, Patrick Longa, Michael Naehrig, Chris Peikert, Douglas Stebila, Fernando Virdia
2025/1860 (PDF ) On the generalized Schönhage-type bound Theophilus Agama
2025/1859 (PDF ) qt-Pegasis: Simpler and Faster Effective Class Group Actions Pierrick Dartois, Jonathan Komada Eriksen, Riccardo Invernizzi, Frederik Vercauteren
2025/1858 (PDF ) Testing Security Equivalence in the Random Probing Model Anna Guinet, Carina Graw, Lukas Koletzko, Jan Richter-Brockmann, Holger Dette, Tim Güneysu
2025/1857 (PDF ) On the Quantum Equivalence between S|LWE⟩ and ISIS André Chailloux, Paul Hermouet
2025/1856 (PDF ) Optimal Good-Case Latency for Sleepy Consensus Yuval Efron, Joachim Neu, Ling Ren, Ertem Nusret Tas
2025/1855 (PDF ) Less is More: On Copy Complexity in Quantum Cryptography Prabhanjan Ananth, Eli Goldin
2025/1854 (PDF ) Credential Revocation Assisted by a Covertly Corrupted Server Alisa Pankova, Jelizaveta Vakarjuk
2025/1853 (PDF ) Compact, Efficient and CCA-Secure Updatable Encryption from Isogenies Antonin Leroux, Maxime Roméas
2025/1852 (PDF ) A Gaussian Leftover Hash Lemma for Modules over Number Fields Martin R. Albrecht, Joël Felderhoff, Russell W. F. Lai, Oleksandra Lapiha, Ivy K. Y. Woo
2025/1851 (PDF ) Locally Recoverable Data Availability Sampling Seunghyun Cho, Eunyoung Seo, Young-Sik Kim
2025/1850 (PDF ) Linear*-Time Permutation Check Benedikt Bünz, Jessica Chen, Zachary DeStefano
2025/1849 (PDF ) CoBBl: Dynamic constraint generation for SNARKs Kunming Jiang, Fraser Brown, Riad S. Wahby
2025/1848 (PDF ) Revisiting Lattice-based Non-interactive Blind Signature Anindya Ganguly, Angshuman Karmakar, Suparna Kundu, Debranjan Pal, Sumanta Sarkar
2025/1847 (PDF ) Security Analysis of Privately Verifiable Privacy Pass Konrad Hanff, Anja Lehmann, Cavit Özbay
2025/1846 (PDF ) The Order of Hashing in Fiat-Shamir Schemes Barbara Jiabao Benedikt, Marc Fischlin
2025/1845 (PDF ) HE-based On-the-Fly MPC, Revisited: Universal Composability, Approximate and Imperfect Computation, Circuit Privacy Ganyuan Cao, Sylvain Chatel, Christian Knabenhans
2025/1844 (PDF ) Bird of Prey: Practical Signature Combiners Preserving Strong Unforgeability Jonas Janneck
2025/1843 (PDF ) Efficiency Improvements for Signal's Handshake Protocol Barbara Jiabao Benedikt, Sebastian Clermont, Marc Fischlin, Tobias Schmalz
2025/1842 (PDF ) Collusion-Resistant Quantum Secure Key Leasing Beyond Decryption Fuyuki Kitagawa, Ryo Nishimaki, Nikhil Pappu
2025/1841 (PDF ) Pegasus and PegaRing: Efficient (Ring) Signatures from Sigma-Protocols for Power Residue PRFs with (Q)ROM Security Xinyu Zhang, Ziyi Li, Ron Steinfeld, Raymond K. Zhao, Joseph K. Liu, Tsz Hon Yuen
2025/1840 (PDF ) Quantum Cryptography and Hardness of Non-Collapsing Measurements Tomoyuki Morimae, Yuki Shirakawa, Takashi Yamakawa
2025/1839 (PDF ) Lattice-Based zk-SNARKs with Hybrid Verification Technique Supriya Adhikary, Puja Mondal, Angshuman Karmakar
2025/1838 (PDF ) Fault to Forge: Fault Assisted Forging Attacks on LESS Signature Scheme Puja Mondal, Suparna Kundu, Hikaru Nishiyama, Supriya Adhikary, Daisuke Fujimoto, Yuichi Hayashi, Angshuman Karmakar
2025/1837 (PDF ) Proofs of quantum memory Minki Hhan, Tomoyuki Morimae, Yasuaki Okinaka, Takashi Yamakawa
2025/1836 (PDF ) On the Security of LOL-MINI and LOL-DOUBLE against Correlation Attacks Yang Liu, Zhen Shi, Chenhui Jin, Jiyan Zhang, Ting Cui, Dengguo Feng
2025/1835 (PDF ) Who Verifies the Verifiers? Lessons Learned From Formally Verified Line-Point Zero-Knowledge Sabine Oechsner, Vitor Pereira, Peter Scholl
2025/1834 (PDF ) Ajax: Fast Threshold Fully Homomorphic Encryption without Noise Flooding Zhenkai Hu, Haofei Liang, Xiao Wang, Xiang Xie, Kang Yang, Yu Yu, Wenhao Zhang
2025/1833 (PDF ) Public-Key Encryption from the MinRank Problem Rohit Chatterjee, Changrui Mu, Prashant Nalini Vasudevan
2025/1832 (PDF ) Can Quantum Break ZUC? Only with a Million Qubits and a Billion Years to Spare Anik Basu Bhaumik, Suman Dutta, Siyi Wang, Anubhab Baksi, Kyungbae Jang, Amit Saha, Hwajeong Seo, Anupam Chattopadhyay
2025/1831 (PDF ) Authenticated Garbling with Tensor Gates David Heath, Nakul Khambhati, Rafail Ostrovsky, Turan Vural
2025/1830 (PDF ) A New Approach to Improved PNB-based Attacks on Reduced-round ChaCha and Salsa Goutam Paul, Anup Kumar Kundu, Sucheta Chakrabarti
2025/1829 (PDF ) On the Limits of Consensus under Dynamic Availability and Reconfiguration Joachim Neu, Javier Nieto, Ling Ren
2025/1828 (PDF ) Block-Accumulate Codes: Accelerated Linear Codes for PCGs and ZK Vladimir Kolesnikov, Stanislav Peceny, Rahul Rachuri, Srinivasan Raghuraman, Peter Rindal, Harshal Shah
2025/1827 (PDF ) Blind ECDSA from the ECDSA Assumption Jules Maire, Alan Pulval-Dady
2025/1826 (PDF ) Proofs of No Intrusion Vipul Goyal, Justin Raizes
2025/1825 (PDF ) Quantumly Computing S-unit Groups in Quantified Polynomial Time and Space Koen de Boer, Joël Felderhoff
2025/1824 (PDF ) Coppercloud: Blind Server-Supported RSA Signatures Nikita Snetkov, Jelizaveta Vakarjuk, Alisa Pankova
2025/1823 (PDF ) A unified theoretical framework for steganography: balancing reliability, security and robustness Daniele Ballo
2025/1822 (PDF ) Solving one-sided linear systems over symmetrized and supertropical semirings Sulaiman Alhussaini, Serge˘ı Sergeev
2025/1821 (PDF ) Extending Mental Poker Donald Beaver
2025/1820 (PDF ) On the Plaintext Awareness of AEAD Schemes Mario Marhuenda Beltrán, Mustafa Khairallah
2025/1819 (PDF ) New Straight-Line Extractable NIZKPs for Cryptographic Group Actions Andrea Flamini, Federico Pintore, Edoardo Signorini, Giovanni Tognolini
2025/1818 (PDF ) Simulation-based Security Notion of Correlation Robust Hashing with Applications to MPC Hongrui Cui, Chun Guo, Xiaojie Guo, Xiao Wang, Kang Yang, Yu Yu
2025/1817 (PDF ) Improved Search-to-Decision Reduction for Random Local Functions Kel Zin Tan, Prashant Nalini Vasudevan
2025/1816 (PDF ) Pool: A Practical OT-based OPRF from Learning with Rounding Alex Davidson, Amit Deo, Louis Tremblay Thibault
2025/1815 (PDF ) Efficient Multiparty Private Simultaneous Messages for Symmetric Functions Reo Eriguchi, Kazumasa Shinagawa
2025/1814 (PDF ) SoK: Is Proof-of-Useful-Work Really Useful? Pratyush Dikshit, Ashkan Emami, Johannes Sedlmeir, Gilbert Fridgen
2025/1813 (PDF ) Two-party ECDSA Signing at Constant Communication Overhead Yashvanth Kondi
2025/1812 (PDF ) Better Bounds for Finding Fixed-Degree Isogenies via Coppersmith’s Method Marius A. Aardal, Diego F. Aranha, Yansong Feng, Yiming Gao, Yanbin Pan
2025/1811 (PDF ) Anchored Merkle Range Proof for Pedersen Commitments Leona Hioki
2025/1810 (PDF ) BitGC Made (More) Efficient Wenhao Zhang, Hanlin Liu, Kang Yang, Wen-jie Lu, Yu Yu, Xiao Wang, Chenkai Weng
2025/1809 (PDF ) On the Security of Linear Secret Sharing with General Noisy Side-Channel Leakage Utkarsh Gupta, Hessam Mahdavifar
2025/1808 (PDF ) Variables for Free: Fault Injection Attack on MAYO via Valid Solutions Yadi Zhong
2025/1807 (PDF ) Traceable Ring Signatures Revisited: Extended Definitions, $O(1)$ Tracing, and Efficient Log-Size Constructions Xiangyu Liu
2025/1806 (PDF ) Improved Integral Attack on ChiLow-32 Exploiting the Inverse of the ChiChi Function Akram Khalesi, Zahra Ahmadian, Hosein Hadipour
2025/1805 (PDF ) DDH-based schemes for multi-party Function Secret Sharing Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon
2025/1804 (PDF ) HERDS: : Multi-Key Fully Homomorphic Encryption with Sublinear Bootstrapping Binwu Xiang, Seonhong Min, Intak Hwang, Zhiwei Wang, Haoqi He, Yuanju Wei, Kang Yang, Jiang Zhang, Yi Deng, Yu Yu
2025/1803 (PDF ) Concretely-Efficient Multi-Key Homomorphic Secret Sharing and Applications Kaiwen He, Sacha Servan-Schreiber, Geoffroy Couteau, Srinivas Devadas
2025/1802 (PDF ) Zyga: Optimized Zero-Knowledge Proofs with Dynamic Public Inputs Tiago A. O. Alves, Vitor Py Braga
2025/1801 (PDF ) Quantum Circuit Implementation and Resource Analysis of AIM2 Gyeongju Song, Kyungbae Jang, Seyoung Yoon, Minwoo Lee, Hwajeong Seo
2025/1800 (PDF ) Constructions of Efficiently Implementable Boolean Functions with Provable Nonlinearity/Resiliency/Algebraic Immunity Trade-Offs Palash Sarkar
2025/1799 (PDF ) Unforgettable Fuzzy Extractor: Practical Construction and Security Model Oleksandr Kurbatov, Dmytro Zakharov, Lasha Antadze, Victor Mashtalyar, Roman Skovron, Volodymyr Dubinin
2025/1798 (PDF ) Threshold Blind Signatures from CDH Michael Reichle, Zoé Reinke
2025/1797 (PDF ) An efficient quantum algorithm for computing $S$-units and its applications Jean-François Biasse, Fang Song
2025/1796 (PDF ) Efficient Fuzzy PSI Based on Prefix Representation Chengrui Dang, Xv Zhou, Bei Liang
2025/1795 (PDF ) No Honor Among Crooks: Non-transferable Anonymous Tokens from Betrayability David Kretzler, Yong Li
2025/1794 (PDF ) Going Faster: Privacy-Preserving Shortest paths from Start to End Vincent Ehrmanntraut, Ulrike Meyer
2025/1793 (PDF ) A note on the soundness of an optimized $\mathsf{gemini}$ variant Ariel Gabizon, Nishat Koti
2025/1792 (PDF ) Zero-Downtime Post-Quantum TLS 1.3 Migration: A Bridge-Server-Based Approach Minjoo Sim, Subin Jo, Hyuntae Song, Eunseong Kim, Hwajeong Seo
2025/1791 (PDF ) High-Speed 16-Radix Polynomial Multiplication on ARM Cortex-M4 with Recursive Karatsuba Layers Minjoo Sim, Hyunjun Kim, Minwoo Lee, Hwajeong Seo
2025/1790 (PDF ) CA-MCPQ: A Context-Aware Post-Quantum Protocol for AI Agent Integrity and Security Seyoung Yoon, Hyunji Kim, Hwajeong Seo
2025/1789 (PDF ) Olingo: Threshold Lattice Signatures with DKG and Identifiable Abort Kamil Doruk Gur, Patrick Hough, Jonathan Katz, Caroline Sandsbråten, Tjerand Silde
2025/1788 (PDF ) Just Guess: Improved (Quantum) Algorithm for the Underdetermined MQ problem Alexander May, Massimo Ostuzzi, Henrik Ressler
2025/1787 (PDF ) Four-round Statistical Non-malleable Zero-knowledge Susumu Kiyoshima
2025/1786 (PDF ) Leveraging Discrete CKKS to Bootstrap in High Precision Hyeongmin Choe, Jaehyung Kim, Damien Stehlé, Elias Suvanto
2025/1785 (PDF ) On the Limitations of Pseudorandom Unitaries Prabhanjan Ananth, Aditya Gulati, Yao-Ting Lin
2025/1784 (PDF ) Pseudorandom Unitaries in the Haar Random Oracle Model Prabhanjan Ananth, John Bostanci, Aditya Gulati, Yao-Ting Lin
2025/1783 (PDF ) Seedless Condensers for Efficiently Samplable Sources Cody Freitag, Jad Silbak, Daniel Wichs
2025/1782 (PDF ) On Verifiable Delay Functions from Time-Lock Puzzles Hamza Abusalah, Karen Azari, Dario Fiore, Chethan Kamath, Erkan Tairi
2025/1781 (PDF ) High-Throughput Universally Composable Threshold FHE Decryption Guy Zyskind, Doron Zarchy, Max Leibovich, Chris Peikert
2025/1780 (PDF ) There are siblings of $\chi$ which are permutations for $n$ even Björn Kriepke, Gohar Kyureghyan
2025/1779 (PDF ) Computing the Restricted Algebraic Immunity, and Application to Weightwise Perfectly Balanced Functions. Luca Bonamino, Pierrick Méaux
2025/1778 (PDF ) Unified Approach to UOV-like Multivariate Signature Schemes Peigen Li, Hao Guo, Jintai Ding
2025/1777 (PDF ) Optimizing NCC-Sign for ARMv8 Minwoo Lee, Minjoo Sim, Siwoo Eum, Gyeongju Song, Hwajeong Seo
2025/1775 (PDF ) Homomorphic Encryption Methods Applied to Cloud Computing: A Practical Architecture for Elastic, Verifiable Confidential Compute Rama Yadavalli, Jeffery Solomon, Vrinda Sharma
2025/1774 (PDF ) Adaptive-Controlled Mutual TLS for Large Language Model Systems Lui Zheng, Roger Zhu, Amit Agrawal, Carol Lamore
2025/1773 (PDF ) Impossibility of VDFs in the ROM: The Complete Picture Hamza Abusalah, Karen Azari, Chethan Kamath, Erkan Tairi, Maximilian von Consbruch
2025/1772 (PDF ) Multiple Concurrent Proposers: Why and How Pranav Garimidi, Joachim Neu, Max Resnick
2025/1771 (PDF ) Batched & Non-interactive Blind Signatures from Lattices Foteini Baldimtsi, Rishab Goyal, Aayush Yadav
2025/1770 (PDF ) On the Security of SL-DNSSEC Aditya Singh Rawat, Mahabir Prasad Jhanwar
2025/1769 (PDF ) Average-Case Complexity of Quantum Stabilizer Decoding Andrey Boris Khesin, Jonathan Z. Lu, Alexander Poremba, Akshar Ramkumar, Vinod Vaikuntanathan
2025/1768 (PDF ) DualMatrix: Conquering zkSNARK for Large Matrix Multiplication Mingshu Cong, Tsz Hon Yuen, Siu-Ming Yiu
2025/1767 (PDF ) Polylogarithmic Polynomial Commitment Scheme over Galois Rings Zhuo Wu, Xinxuan Zhang, Yi Deng, Yuanju Wei, Zhongliang Zhang, Liuyu Yang
2025/1766 (PDF ) Eliminating Exponential Key Growth in PRG-Based Distributed Point Functions Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon
2025/1765 (PDF ) Untelegraphable Encryption and its Applications Jeffrey Champion, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2025/1764 (PDF ) Keccacheck: towards a SNARK friendly Keccak Marcin Kostrzewa, Matthew Klein, Ara Adkins, Grzegorz Świrski, Wojciech Żmuda
2025/1763 (PDF ) A High Throughput Kyber NTT Jonas Bertels, Ingrid Verbauwhede
2025/1762 (PDF ) Threshold Signatures from One-Way Functions Pedro Branco, Giulio Malavolta
2025/1761 (PDF ) Automated Proof for Quadratic Functional Encryption: Finding Attacks and New Constructions Geng Wang, Ruoyi Kong, Dawu Gu
2025/1760 (PDF ) Vive Galois! Part 1: Optimal SIMD Packing and Packed Bootstrapping for FHE Chris Peikert, Zachary Pepin
2025/1759 (PDF ) Plonk is Simulation Extractable in ROM Under Falsifiable Assumptions Helger Lipmaa
2025/1758 (PDF ) Revisiting PQ WireGuard: A Comprehensive Security Analysis With a New Design Using Reinforced KEMs Keitaro Hashimoto, Shuichi Katsumata, Guilhem Niot, Thom Wiggers
2025/1757 (PDF ) New key establishment protocol based on random 1 walks in infinite forest Vasyl Ustimenko, Tymoteusz Chojecki
2025/1756 (PDF ) Are Neural Networks Collision Resistant? Marco Benedetti, Andrej Bogdanov, Enrico M. Malatesta, Marc Mézard, Gianmarco Perrupato, Alon Rosen, Nikolaj I. Schwartzbach, Riccardo Zecchina
2025/1755 (PDF ) DAKE: Bandwidth-Efficient (U)AKE from Double-KEM Hugo Beguinet, Céline Chevalier, Guirec Lebrun, Thomas Legavre, Thomas Ricosset, Maxime Roméas, Éric Sageloli
2025/1754 (PDF ) Machine Learning and Side-Channel Attacks on Post-Quantum Cryptography Abiodun Olaluwe, Nouf Nur Nabilah, Sheikh Tareq, Akshay Raghavendra Kulkarni, Annamalai Annamalai
2025/1753 (PDF ) Bootstrapping over Free $\mathcal{R}$-Module Ruida Wang, Jikang Bai, Yijian Liu, Xinxuan Zhang, Xianhui Lu, Lutan Zhao, Kunpeng Wang, Rui Hou
2025/1752 (PDF ) Foundations of Dynamic Group Signatures: The Case of Malicious Openers and Issuers Stephan Krenn, Kai Samelin, Daniel Slamanig
2025/1751 (PDF ) On the Existence and Construction of Very Strong Elliptic Curves Andrey S. Shchebetov
2025/1750 (PDF ) Modeling Emails: On the Deniability of BCCs Jonas Janneck, Aysan Nishaburi, Guilherme Rito
2025/1749 (PDF ) Sandwich BUFF: Achieving Non-Resignability Using Iterative Hash Functions Serge Fehr, Yu-Hsuan Huang, Julia Kastner
2025/1748 (PDF ) Post-Quantum TLS 1.3 Handshake from CPA-Secure KEMs with Tighter Reductions Jinrong Chen, Biming Zhou, Rongmao Chen, Haodong Jiang, Yi Wang, Xinyi Huang, Yunlei Zhao, Moti Yung
2025/1747 (PDF ) Masked Circuit Compiler in the Cardinal Random Probing Composability Framework Sonia Belaïd, Victor Normand, Matthieu Rivain
2025/1746 (PDF ) Cross-chain Lightning Trades: Getting the Advantages of a Custodial Exchange while Keeping Your Assets Michele Ciampi, Muhammad Ishaq, Rafail Ostrovsky, Ioannis Tzannetos, Vassilis Zikas
2025/1745 (PDF ) Fault Attacks on MPCitH Signature Schemes Harrison Banda, Jan Brinkmann, Juliane Krämer
2025/1744 (PDF ) Randomness beacons from financial data in the presence of an active attacker Daji Landis, Joseph Bonneau
2025/1743 (PDF ) NISQ Security and Complexity via Simple Classical Reasoning Alexandru Cojocaru, Juan Garay, Qipeng Liu, Fang Song
2025/1742 (PDF ) Broadcast Encryption with Size N^1/3 and More from k-Lin Hoeteck Wee
2025/1741 (PDF ) Full L1 On-Chain ZK-STARK+PQC Verification on Solana: A Measurement Study Jotaro Yano
2025/1740 (PDF ) Improved Radix-based Approximate Homomorphic Encryption for Large Integers via Lightweight Bootstrapped Digit Carry Gyeongwon Cha, Dongjin Park, Joon-Woo Lee
2025/1739 (PDF ) Attacking an RSA-like Cryptosystem Using Continued Fractions and Lattices George Teseleanu
2025/1738 (PDF ) Optimal Byzantine Agreement in the Presence of Message Drops Hanwen Feng, Zhenliang Lu, Qiang Tang, Yuchen Ye
2025/1737 (PDF ) WaterSQI and PRISMO: Quaternion Signatures for Supersingular Isogeny Group Actions Tako Boris Fouotsa
2025/1736 (PDF ) Breaking the Barrier for Asynchronous MPC with a Friend Banashri Karmakar, Aniket Kate, Shravani Patil, Arpita Patra, Sikhar Patranabis, Protik Paul, Divya Ravi
2025/1735 (PDF ) Edge Encryption using Iterative Management Framework Manoja Shridhar, Bala Puruvana, Alex Cravill, Joey Wolff
2025/1734 (PDF ) Compressed Permutation Oracles Joseph Carolan
2025/1733 (PDF ) Differentially Private Compression and the Sensitivity of LZ77 Jeremiah Blocki, Seunghoon Lee, Brayan Sebastian Yepes-Garcia
2025/1732 (PDF ) Zero-Knowledge AI Inference with High Precision Arman Riasi, Haodi Wang, Rouzbeh Behnia, Viet Vo, Thang Hoang
2025/1731 (PDF ) ECCFROG522PP: An Enhanced 522-bit Weierstrass Elliptic Curve Vıctor Duarte Melo, William J Buchanan
2025/1730 (PDF ) On the Impossibility of Actively Secure Distributed Samplers Damiano Abram, Serge Fehr, Maciej Obremski, Peter Scholl
2025/1729 (PDF ) GuardianMPC: Backdoor-resilient Neural Network Computation Mohammad Hashemi, Domenic Forte, Fatemeh Ganji
2025/1728 (PDF ) Precision Strike: Targeted Misclassification of Accelerated CNNs with a Single Clock Glitch Arsalan Ali Malik, Furkan Aydin, Aydin Aysu
2025/1727 (PDF ) Rhizomes and the Roots of Efficiency—Improving Prio Armando Faz-Hernandez
2025/1726 (PDF ) How (not) to Build Identity-Based Encryption from Isogenies Elif Ozbay Gurler, Patrick Struck
2025/1725 (PDF ) Blockchain-based Economic Voting with Posterior Security from Lattices Navid Abapour, Amir Goharshady, Catalin Dragan, Mahdi Mahdavi
2025/1724 (PDF ) Efficient Aggregate Anonymous Credentials for Decentralized Identity Rebekah Mercer, Kaoutar El Khiyaoui, Angelo De Caro, Elli Androulaki
2025/1723 (PDF ) Space-Deniable Proofs Jesko Dujmovic, Christoph U. Günther, Krzysztof Pietrzak
2025/1722 (PDF ) From OT to OLE with Subquadratic Communication Jack Doerner, Iftach Haitner, Yuval Ishai, Nikolaos Makriyannis
2025/1721 (PDF ) Q-Stream: A Practical System for Operational Perfect Secrecy Adrian Neal
2025/1720 (PDF ) BATTLE – Bonded Adversarial TournamenT with Logarithmic Escalation Sergio Demian Lerner, Ariel Futoransky
2025/1719 (PDF ) Bribers, Bribers on The Chain, Is Resisting All in Vain? Trustless Consensus Manipulation Through Bribing Contracts Bence Soóki-Tóth, István András Seres, Kamilla Kara, Ábel Nagy, Balázs Pejó, Gergely Biczók
2025/1718 (PDF ) Indistinguishability Obfuscation from Ring Key-Homomorphic Weak PRFs Hart Montgomery, Sikhar Patranabis
2025/1717 (PDF ) Large-Plaintext Functional Bootstrapping in FHE with Small Bootstrapping Keys Kuiyuan Duan, Hongbo Li, Dengfa Liu, Guangsheng Ma
2025/1716 (PDF ) Beyond Shannon: Operational Perfect Secrecy as a Generalised Model for Information-Theoretic Security Adrian Neal
2025/1715 (PDF ) UltraMixer: A Compliant Zero-Knowledge Privacy Layer for Tokenized Real-World Assets Zonglun Li, Hong Kang, Xue Liu
2025/1714 (PDF ) Verifiable PIR with Small Client Storage Mayank Rathee, Keewoo Lee, Raluca Ada Popa
2025/1713 (PDF ) Ilyazh-Web3E2E: A Post-Quantum Hybrid Protocol for Forward-Secure Decentralized Messaging Ilyas Zhaisenbayev
2025/1712 (PDF ) The Syndrome-Space Lens: A Complete Resolution of Proximity Gaps for Reed-Solomon Codes Russell Okamoto
2025/1711 (PDF ) Accelerating FHEW-like Bootstrapping via New Configurations of the Underlying Cryptosystems Han Wang, Ming Luo, Han Xia, Mingsheng Wang, Hanxu Hou
2025/1710 (PDF ) Information-Theoretic Broadcast-Optimal MPC Michele Ciampi, Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
2025/1709 (PDF ) The zkVot Protocol: A Distributed Computation Protocol for Censorship Resistant Anonymous Voting Yunus Gürlek, Kadircan Bozkurt
2025/1708 (PDF ) The Semantic Holder (SH): Algebraic Extraction for Legal Opposability MINKA MI NGUIDJOI Thierry Emmanuel
2025/1707 (PDF ) Is It Even Possible? On the Parallel Composition of Asynchronous MPC Protocols Ran Cohen, Pouyan Forghani, Juan Garay, Rutvik Patel, Vassilis Zikas
2025/1706 (PDF ) Kani's lemma from Clifford algebra Tomoki Moriya
2025/1705 (PDF ) Security Amplification of Threshold Signatures in the Standard Model Karen Azari, Cecilia Boschini, Kristina Hostáková, Michael Reichle
2025/1704 (PDF ) Data Anonymisation with the Density Matrix Classifier David Garvin, Mattia Fiorentini, Oleksiy Kondratyev, Marco Paini
2025/1703 (PDF ) Updatable Signature from Lattices Haotian Yin, Jie Zhang, Wanxin Li, Yuji Dong, Eng Gee Lim, Dominik Wojtczak
2025/1702 (PDF ) Lattice-Based Group Signatures in the Standard Model, Revisited Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo
2025/1701 (PDF ) BPSec-MLS: Asynchronous Key Agreement for Space Communications Xisen Tian, Paul Westland
2025/1700 (PDF ) Computationally-Sound Symbolic Cryptography in Lean Stefan Dziembowski, Grzegorz Fabiański, Daniele Micciancio, Rafał Stefański
2025/1699 (PDF ) A Constant-Rate Compiler for MPC over Noisy Networks Ran Gelles, Carmit Hazay, Manuj Mukherjee, Jaspal Singh, Arun Yeragudipati, Vassilis Zikas
2025/1698 (PDF ) SNARK Lower Bounds via Communication Complexity Rishabh Bhadauria, Alexander R. Block, Prantar Ghosh, Justin Thaler
2025/1697 (PDF ) Extract Discriminative Features: Profiled Side-Channel Analysis for Cryptosystems Based on Supervised Contrastive Learning Zoushaojie Jiang, An Wang, Yaoling Ding, Annyu Liu, Zheng Liu, Jing Yu, Liehuang Zhu
2025/1696 (PDF ) Threshold ECDSA in Two Rounds Yingjie Lyu, Zengpeng Li, Hong-Sheng Zhou, Xudong Deng
2025/1694 (PDF ) Lattice Reduction via Dense Sublattices: A Cryptanalytic No-Go Léo Ducas, Johanna Loyer
2025/1693 (PDF ) Quasi-perfect (de)compression of elliptic curve points in the highly $2$-adic scenario Dimitri Koshelev, Jordi Pujolàs
2025/1692 (PDF ) Combined Stability: Protecting against Combined Attacks Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov
2025/1691 (PDF ) Pilvi: Lattice Threshold PKE with Small Decryption Shares and Improved Security Valerio Cini, Russell W. F. Lai, Ivy K. Y. Woo
2025/1690 (PDF ) A Tight Quantum Algorithm for Multiple Collision Search Xavier Bonnetain, Johanna Loyer, André Schrottenloher, Yixin Shen
2025/1689 (PDF ) IPCrypt: Optimal, Practical Encryption of IP Addresses for Privacy and Measurement Frank Denis
2025/1688 (PDF ) SUMMER: Recursive Zero-Knowledge Proofs for Scalable RNN Training Yuange Li, Xiong Fan
2025/1687 (PDF ) Web3 Recovery Mechanisms and User Preferences Easwar Vivek Mangipudi, Panagiotis Chatzigiannis, Konstantinos Chalkias, Aniket Kate, Mohsen Minaei, Mainack Mondal
2025/1686 (PDF ) Honest Users Make Honest Mistakes: A Framework for Analysing eID Protocols Ole Martin Edstrøm, Kristian Gjøsteen, Hans Heum, Sjouke Mauw, Felix Stutz
2025/1685 (PDF ) Toss: Garbled PIR from Table-Only Stacking Lucien K. L. Ng, Vladimir Kolesnikov
2025/1684 (PDF ) FHEMaLe: Framework for Homomorphic Encrypted Machine Learning B PRADEEP KUMAR REDDY, SAMEEKSHA GOYAL, RUCHIKA MEEL, Ayantika Chatterjee
2025/1683 (PDF ) Proving the Security of PeerDAS without the AGM Benedikt Wagner, Arantxa Zapico
2025/1682 (PDF ) pod: An Optimal-Latency, Censorship-Free, and Accountable Generalized Consensus Layer Orestis Alpos, Bernardo David, Jakov Mitrovski, Odysseas Sofikitis, Dionysis Zindros
2025/1681 (PDF ) Modular Forms and Hecke Operators for Post-Quantum Cryptography Trey Li
2025/1680 (PDF ) ChipmunkRing: A Practical Post-Quantum Ring Signature Scheme for Blockchain Applications Dmitrii A. Gerasimov
2025/1679 (PDF ) SoK: Connecting the Dots in Privacy-Preserving ML - Systematization of MPC Protocols and Conversions Between Secret Sharing Schemes Martin Zbudila, Ajith Suresh, Hossein Yalame, Omid Mirzamohammadi, Aysajan Abidin, Bart Preneel
2025/1678 (PDF ) Two-Key Variant of the Four-Round Cascading LRW1 Shreya Dey, Avijit Dutta, Kazuhiko Minematsu
2025/1677 (PDF ) Diffie–Hellman Key Exchange from Commutativity to Group Laws Dung Hoang Duong, Youming Qiao, Chuanqi Zhang
2025/1676 (PDF ) Honest Majority Constant-Round MPC with Linear Communication from One-Way Functions Junru Li, Yifan Song
2025/1675 (PDF ) Surtr: Transparent Verification with Simple yet Strong Coercion Mitigation Rosario Giustolisi, Maryam Sheikhi Garjan, Peter Browne Rønne
2025/1674 (PDF ) Secure Rate-Distortion-Perception Trade-Off with Side Information Gustaf Åhlgren, Onur Günlü
2025/1673 (PDF ) Strong Designated Verifier Signatures with Non-delegatability from CSIDH Hiroki Minamide, Keisuke Tanaka, Masayuki Tezuka
2025/1672 (PDF ) All Paths Lead to the Root Théophile Brézot, Chloé Hébant
2025/1671 (PDF ) QKD Oracles for Authenticated Key Exchange Kathrin Hövelmanns, Daan Planken, Christian Schaffner, Sebastian Verschoor
2025/1670 (PDF ) Mixderive: A New Framework of Deriving Linear Approximations and Improved Differential-Linear Distinguishers for ChaCha Zhengting Li, Lin Ding, Xinhai Wang, Jiang Wan
2025/1669 (PDF ) Experience from UNITA Elections: Reconciling Revote, E2E Verifiability and Low Coercion Feng Hao, Luke Harrison, Saverio Veltri, Irene Pugliatti, Chris Sinclair, Gareth Nixon
2025/1668 (PDF ) Post-Quantum Cryptography in Practice: A Literature Review of Protocol-Level Transitions and Readiness Obianuju Egbuagha, Emmanuel Ikwunna
2025/1667 (PDF ) Persistence of Hourglass(-like) Structure: Improved Differential-Linear Distinguishers for Several ARX Ciphers Xinxin Gong, Qingju Wang, Yonglin Hao, Lin Jiao, Xichao Hu
2025/1666 (PDF ) Trout: Two-Round Threshold ECDSA from Class Groups Hila Dahari-Garbian, Ariel Nof, Luke Parker
2025/1665 (PDF ) Threshold Public-Key Encryption: Definitions, Relations, and CPA-to-CCA Transforms Chris Brzuska, Michael Klooß, Ivy K. Y. Woo
2025/1664 (PDF ) Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth Optimization Tarun Yadav, Shweta Singh, Sudha Yadav
2025/1663 (PDF ) IVC in the Open-and-sign Random Oracle Model Mary Maller, Nicolas Mohnblatt, Arantxa Zapico
2025/1662 (PDF ) The Affine One-Wayness (AOW): A Transparent Post-Quantum Temporal Verification via Polynomial Iteration MINKA MI NGUIDJOI Thierry Emmanuel
2025/1661 (PDF ) Distinguishing Goppa codes using higher-order vanishing Andreas Wiemers, Tobias Hemmert
2025/1660 (PDF ) Dory: Streaming PCG with Small Memory Xiaojie Guo, Hanlin Liu, Zhicong Huang, Hongrui Cui, Wenhao Zhang, Cheng Hong, Xiao Wang, Kang Yang, Yu Yu
2025/1659 (PDF ) Hurricane Mixer: The Eye in the Storm—Embedding Regulatory Oversight into Cryptocurrency Mixing Services Zonglun Li, Wangze Ni, Shuhao Zheng, Junliang Luo, Weijie Sun, Lei Chen, Xue Liu, Tianhang Zheng, Zhan Qin, Kui Ren
2025/1658 (PDF ) High-Throughput EdDSA Verification on Intel Processors with Advanced Vector Extensions Bowen Zhang, Hao Cheng, Johann Großschädl, Peter Y. A. Ryan
2025/1657 (PDF ) ORQ: Complex Analytics on Private Data with Strong Security Guarantees Eli Baum, Sam Buxbaum, Nitin Mathai, Muhammad Faisal, Vasiliki Kalavri, Mayank Varia, John Liagouris
2025/1656 (PDF ) Forgetful Encryption Suvradip Chakraborty, Sebastian Faller, Dennis Hofheinz, Kristina Hostáková
2025/1655 (PDF ) Lattice-based Multi-message Multi-recipient KEM/PKE with Malicious Security Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang
2025/1654 (PDF ) Security without Trusted Third Parties: VRF-based Authentication with Short Authenticated Strings Yanqi Gu, Stanislaw Jarecki, Phillip Nazarian, Apurva Rai
2025/1653 (PDF ) Distributed SNARK via folding schemes Zesheng Li, Dongliang Cai, Yimeng Tian, Yihang Du, Xinxuan Zhang, Yi Deng
2025/1652 (PDF ) Computing Pairings on Elliptic Curves with Embedding Degree Two via Biextensions Yuhao Zheng, Jianming Lin, Chang-an Zhao
2025/1651 (PDF ) On the Cardinality of the Walsh Support of a Boolean Function Maxence Jauberty, Pierrick Méaux
2025/1650 (PDF ) WISCH: Efficient data signing via correlated signatures Ariel Futoransky, Ramses Fernandez, Emilio Garcia, Gabriel Larotonda, Sergio Demian Lerner
2025/1649 (PDF ) SQIsign with Fixed-Precision Integer Arithmetic Won Kim, Jeonghwan Lee, Hyeonhak Kim, Changmin Lee
2025/1647 (PDF ) Universally Composable Password-Hardened Encryption Behzad Abdolmaleki, Ruben Baecker, Paul Gerhart, Mike Graf, Mojtaba Khalili, Daniel Rausch, Dominique Schröder
2025/1646 (PDF ) Scalable zkSNARKs for Matrix Computations: A Generic Framework for Verifiable Deep Learning Mingshu Cong, Sherman S. M. Chow, Siu Ming Yiu, Tsz Hon Yuen
2025/1645 (PDF ) Hardened CTIDH: Dummy-Free and Deterministic CTIDH Gustavo Banegas, Andreas Hellenbrand, Matheus Saldanha
2025/1644 (PDF ) Fast Pseudorandom Correlation Functions from Sparse LPN Lennart Braun, Geoffroy Couteau, Kelsey Melissaris, Mahshid Riahinia, Elahe Sadeghi
2025/1643 (PDF ) SCA-GPT: A Generation-Planning-Tool Assisted LLM Agent for Fully Automated Side-Channel Analysis on Cryptosystems Wenquan Zhou, An Wang, Yaoling Ding, Annyu Liu, Jingqi Zhang, Jiakun Li, Liehuang Zhu
2025/1642 (PDF ) Mixed Arithmetic-Binary Circuits in Fluid MPC Against Honest Majority of 4-Party and Its Applications Against Semi-Honest Adversary Furkan Kerim Çabaş, Oğuz Yayla
2025/1641 (PDF ) Fujisaki-Okamoto Transformation under Average-Case Decryption Error: Tighter and More General Proofs with Applications to PQC Jiangxia Ge, Kang Yang, Yang Yu, Yu Yu
2025/1640 (PDF ) On the construction of Barnes-Wall lattices and their application in cryptography Artyom Kuninets, Anton Leevik, Ekaterina Malygina, Evgeniy Melnichuk, Denis Nabokov
2025/1639 (PDF ) Rayls: A Novel Design for CBDCs Mario Yaksetig, Jiayu Xu
2025/1638 (PDF ) Rayls II: Fast, Private, and Compliant CBDCs Mario Yaksetig, Pedro M. F. Pereira, Stephen Yang, Mahdi Nejadgholi, Jiayu Xu
2025/1637 (PDF ) Pseudorandom Correlation Functions from Ring-LWR Sebastian Hasler, Pascal Reisert, Ralf Küsters
2025/1636 (PDF ) Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost? Daniel Pöllman, Tianxin Tang
2025/1635 (PDF ) Haystack ciphers: White-box countermeasures as Symmetric encryption Alex Charlès, Aleksei Udovenko
2025/1634 (PDF ) BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques Chi Feng, Lei Fan
2025/1633 (PDF ) LastRings: Lattice-based Scalable Threshold Ring Signatures Sohyun Jeon, Calvin Abou Haidar, Mehdi Tibouchi
2025/1632 (PDF ) Enhancing the DATF Technique in Differential-Linear Cryptanalysis Cheng Che, Tian Tian
2025/1631 (PDF ) Computationally and Communication Efficient Batched Asynchronous DPSS from Lightweight Cryptography Akhil Bandarupalli, Xiaoyu Ji, Soham Jog, Aniket Kate, Chen-Da Liu-Zhang, Yifan Song
2025/1630 (PDF ) Velox: Scalable Fair Asynchronous MPC from Lightweight Cryptography Akhil Bandarupalli, Xiaoyu Ji, Aniket Kate, Chen-Da Liu-Zhang, Daniel Pöllmann, Yifan Song
2025/1629 (PDF ) Solving Concealed ILWE and its Application for Breaking Masked Dilithium Simon Damm, Asja Fischer, Alexander May, Soundes Marzougui, Leander Schwarz, Henning Seidler, Jean-Pierre Seifert, Jonas Thietke, Vincent Quentin Ulitzsch
2025/1628 (PDF ) Fully Adaptive Decentralized MA-ABE: Simplified, Optimized, ASP Supported Pratish Datta, Junichi Tomida, Nikhil Vanjani
2025/1627 (PDF ) IND-CPA-D of Relaxed Functional Bootstrapping: A New Attack, A General Fix, and A Stronger Model Zeyu Liu, Yunhao Wang, Ben Fisch
2025/1626 (PDF ) The Grand Challenge of PQC Migration: Analysis of Modern Blockchain and Intertwined Human Egoisms Kigen Fukuda, Shin’ichiro Matsuo, Yuji Suga, Tadahiko Ito
2025/1625 (PDF ) A Practical and Fully Distributed E-Voting Protocol for the Swiss Context Véronique Cortier, Alexandre Debant, Olivier Esseiva, Pierrick Gaudry, Audhild Høgåsen, Chiara Spadafora
2025/1624 (PDF ) New Limits for Homomorphic Encryption Sven Schäge, Marc Vorstermans
2025/1623 (PDF ) Tetris: Versatile TFHE LUT and Its Application to FHE Instruction Set Architecture Ruida Wang, Jikang Bai, Xuan Shen, Xianhui Lu, Zhihao Li, Binwu Xiang, Zhiwei Wang, Hongyu Wang, Lutan Zhao, Kunpeng Wang, Rui Hou
2025/1622 (PDF ) General Modularity Lemmata about Random Variable Commitment Schemes, and a Certified Laplace Mechanism Fredrik Meisingseth, Christian Rechberger, Fabian Schmid
2025/1621 (PDF ) Page-efficient Encrypted Multi-Maps: New Techniques for Optimal Search Bandwidth Francesca Falzon, Zichen Gui, Michael Reichle
2025/1620 (PDF ) The Coding Limits of Robust Watermarking for Generative Models Danilo Francati, Yevin Nikhel Goonatilake, Shubham Pawar, Daniele Venturi, Giuseppe Ateniese
2025/1619 (PDF ) Generic Anonymity Wrapper for Messaging Protocols Lea Thiemt, Paul Rösler, Alexander Bienstock, Rolfe Schmidt, Yevgeniy Dodis
2025/1618 (PDF ) IND-CPA-D and KR-D Security With Reduced Noise from the HintLWE Problem Tabitha Ogilvie
2025/1617 (PDF ) Game-Theoretically Fair Coin Toss with Arbitrary Preferences Forest Zhang, Ke Wu
2025/1616 (PDF ) Transforming the POKE public key Protocol into a Key Encapsulation Mechanism Nouhou Abdou Idris, Yunusa Abdulsalam, Mustapha Hedabou
2025/1615 (PDF ) The Chaotic Entropic Expansion (CEE): A Transparent Post-Quantum Data Confidentiality Primitive via Entropic Chaotic Maps MINKA MI NGUIDJOI Thierry Emmanuel
2025/1614 (PDF ) Broadcast-Optimal Secure Computation From Black-Box Oblivious Transfer Michele Ciampi, Divya Ravi, Luisa Siniscalchi, Yu Xia
2025/1613 (PDF ) Tightly Secure Inner-Product Functional Encryption Revisited: Compact, Lattice-based, and More Shuai Han, Hongxu Yi, Shengli Liu, Dawu Gu
2025/1612 (PDF ) Low-Latency Rate-Distortion-Perception Trade-offs Through Randomized Distributed Function Computations Onur Gunlu, Maciej Skorski, H. Vincent Poor
2025/1611 (PDF ) Probabilistic Skipping-Based Data Structures with Robust Efficiency Guarantees Marc Fischlin, Moritz Huppert, Sam A. Markelon
2025/1610 (PDF ) BunnyFinder: Finding Incentive Flaws for Ethereum Consensus Rujia Li, Mingfei Zhang, Xueqian Lu, Wenbo Xu, Ying Yan, Sisi Duan
2025/1609 (PDF ) Many-time Linkable Ring Signatures Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo
2025/1608 (PDF ) Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates Haiyue Dong, Qian Guo
2025/1607 (PDF ) Faster Verification of Faster Implementations: Combining Deductive and Circuit-Based Reasoning in EasyCrypt José Bacelar Almeida, Gustavo Xavier Delerue Marinho Alves, Manuel Barbosa, Gilles Barthe, Luı́s Esquı́vel, Vincent Hwang, Tiago Oliveira, Hugo Pacheco, Peter Schwabe, Pierre-Yves Strub
2025/1606 (PDF ) Collatz Hash: Cryptographic Hash Algorithm Using 3x+1 Conjecture Shaurya Pratap Singh, Bhupendra Singh, Alok Mishra
2025/1605 (PDF ) Refined Humbert Invariants in Supersingular Isogeny Degree Analysis Eda Kırımlı, Gaurish Korpal
2025/1604 (PDF ) Qlapoti: Simple and Efficient Translation of Quaternion Ideals to Isogenies Giacomo Borin, Maria Corte-Real Santos, Jonathan Komada Eriksen, Riccardo Invernizzi, Marzio Mula, Sina Schaeffler, Frederik Vercauteren
2025/1603 (PDF ) Post-quantum Security of Key-Alternating Feistel Ciphers Jyotirmoy Basak, Ritam Bhaumik, Amit Kumar Chauhan, Ravindra Jejurikar, Ashwin Jha, Anandarup Roy, André Schrottenloher, Suprita Talnikar
2025/1602 (PDF ) Attacks on PRISM-id via Torsion over Small Extension Fields Kohei Nakagawa, Hiroshi Onuki
2025/1601 (PDF ) Meet-in-the-Middle Attacks on Full ChiLow Eran Lambooij, Patrick Neumann, Michiel Verbauwhede, Shichang Wang, Tianyu Zhang
2025/1599 (PDF ) AVX2 Implementation of QR-UOV for Modern x86 Processors Hiroshi Amagasa, Rei Ueno, Naofumi Homma
2025/1598 (PDF ) How to kickstart Secure Message Transfer with Short Authentication Strings and Out-Of-Band Communication Wasilij Beskorovajnov, Jörn Müller-Quade
2025/1597 (PDF ) The State-Test Technique on Differential Attacks: a 26-Round Attack on CRAFT and Other Applications Dounia M'Foukh, María Naya-Plasencia, Patrick Neumann
2025/1596 (PDF ) On GPU acceleration of PQC algorithms Daniel Römer, Gero Knoblauch, Alexander Wiesmaier
2025/1595 (PDF ) Round-Efficient Composable Two-Party Quantum Computation Vipul Goyal, Xiao Liang, Omkant Pandey, Yuhao Tang, Takashi Yamakawa
2025/1594 (PDF ) Practical Dense-Key Bootstrapping with Subring Secret Encapsulation Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang
2025/1593 (PDF ) Leveraging Smaller Finite Fields for More Efficient ZK-Friendly Hash Functions Gökçe Düzyol, Kamil Otal
2025/1592 (PDF ) MegaBlocks: Breaking the Logarithmic I/O-Overhead Barrier for Oblivious RAM Gilad Asharov, Eliran Eiluz, Ilan Komargodski, Wei-Kai Lin
2025/1591 (PDF ) HE-SecureNet: An Efficient and Usable Framework for Model Training via Homomorphic Encryption Thomas Schneider, Huan-Chih Wang, Hossein Yalame
2025/1590 (PDF ) The AIIP Problem: Toward a Post-Quantum Hardness Assumption from Affine Iterated Inversion over Finite Fields MINKA MI NGUIDJOI Thierry Emmanuel
2025/1589 (PDF ) A Symmetric Group-Based Public-Key Cryptosystem with Secret Partition-Dependent Decryption Kaveh Dastouri
2025/1588 (PDF ) Query-Optimal IOPPs for Linear-Time Encodable Codes Anubhav Baweja, Pratyush Mishra, Tushar Mopuri, Matan Shtepel
2025/1587 (PDF ) Secure Agents Nakul Khambhati, Joonwon Lee, Gary Song, Rafail Ostrovsky, Sam Kumar
2025/1586 (PDF ) A Note on Feedback-PRF Mode of KDF from NIST SP 800-108 Ritam Bhaumik, Avijit Dutta, Tetsu Iwata, Ashwin Jha, Kazuhiko Minematsu, Mridul Nandi, Yu Sasaki, Meltem Sönmez Turan, Stefano Tessaro
2025/1585 (PDF ) LEAF: Compact and Efficient Blind Signature from Code-based Assumptions Yi-Fu Lai, Edoardo Persichetti
2025/1584 (PDF ) PriSrv+: Privacy and Usability-Enhanced Wireless Service Discovery with Fast and Expressive Matchmaking Encryption Yang Yang, Guomin Yang, Yingjiu Li, Pengfei WU, Rui Shi, Minming Huang, Jian Weng, HweeHwa Pang, Robert H. Deng
2025/1583 (PDF ) Compact Lattice-Coded (Multi-Recipient) Kyber without CLT Independence Assumption Shuiyin Liu, Amin Sakzad
2025/1582 (PDF ) Breaking Omertà: On Threshold Cryptography, Smart Collusion, and Whistleblowing Mahimna Kelkar, Aadityan Ganesh, Aditi Partap, Joseph Bonneau, S. Matthew Weinberg
2025/1581 (PDF ) Cryptanalysis of ChiLow with Cube-Like Attacks Shuo Peng, Jiahui He, Kai Hu, Zhongfeng Niu, Shahram Rasoolzadeh, Meiqin Wang
2025/1580 (PDF ) IronDict: Transparent Dictionaries from Polynomial Commitments Hossein Hafezi, Alireza Shirzad, Benedikt Bünz, Joseph Bonneau
2025/1579 (PDF ) TACITA: Threshold Aggregation without Client Interaction Varun Madathil, Arthur Lazzaretti, Zeyu Liu, Charalampos Papamanthou
2025/1578 (PDF ) Back to the future: simple threshold decryption secure against adaptive corruptions Victor Shoup
2025/1577 (PDF ) Template and CPA Side Channel Attacks on the Kyber/ML-KEM Pair-Pointwise Multiplication Sedric Nkotto
2025/1576 (PDF ) Compressed verification for post-quantum signatures with long-term public keys Gustavo Banegas, Anaëlle Le Dévéhat, Benjamin Smith
2025/1575 (PDF ) BitPriv: A Privacy-Preserving Protocol for DeFi Applications on Bitcoin Ioannis Alexopoulos, Zeta Avarikioti, Paul Gerhart, Matteo Maffei, Dominique Schröder
2025/1574 (PDF ) Information-Theoretic Random-Index PIR Sebastian Kolby, Lawrence Roy, Jure Sternad, Sophia Yakoubov
2025/1573 (PDF ) OneTwoPAKE: Two-Round Strong Asymmetric PAKE with Ideal Security Yashvanth Kondi, Ian McQuoid, Kelsey Melissaris, Claudio Orlandi, Lawrence Roy, LaKyah Tyner
2025/1572 (PDF ) Quantum Implementation of MD5 Sangmin Cha, GyeongJu Song, Seyoung Yoon, Hwajeong Seo
2025/1571 (PDF ) Attribute-based Quantum Broadcast Encryption with Composite Policies via Symmetric Unitary t-Designs Sayatan Ganguly, Shion Samadder Chaudhury
2025/1570 (PDF ) Multi-Message Quantum Broadcast with Fine-Grained Access Control Sayatan Ganguly, Shion Samadder Chaudhury
2025/1569 (PDF ) How Hard Can It Be to Formalize a Proof? Lessons from Formalizing CryptoBox Three Times in EasyCrypt François Dupressoir, Andreas Hülsing, Cameron Low, Matthias Meijers, Charlotte Mylog, Sabine Oechsner
2025/1568 (PDF ) Montgomery Curves: Exact Enumeration and Probabilistic Analysis Tsai Yi-Ju
2025/1567 (PDF ) Bootstrappable Fully Homomorphic Attribute-Based Encryption with Unbounded Circuit Depth Feixiang Zhao, Shixin Chen, Man Ho Au, Jian Weng, Huaxiong Wang, Jian Guo
2025/1566 (PDF ) Lattice-based Threshold Blind Signatures Sebastian Faller, Guilhem Niot, Michael Reichle
2025/1565 (PDF ) Game Changer: A Modular Framework for OPRF Security Karla Friedrichs, Anja Lehmann, Cavit Özbay
2025/1564 (PDF ) SoK: Blockchain Consensus in the Quantum Age Aleck Nash, Christian Eduardo Terron Garcia, Henry Chimal-Dzul, Kim-Kwang Raymond Choo
2025/1563 (PDF ) Optimized Constant-Time Implementation of terSIDH Taehun Kang, Donghoe Heo, Jeonghwan Lee, Suhri Kim, Changmin Lee
2025/1562 (PDF ) Formally Verified Correctness Bounds for Lattice-Based Cryptography Manuel Barbosa, Matthias J. Kannwischer, Thing-han Lim, Peter Schwabe, Pierre-Yves Strub
2025/1561 (PDF ) A Traceable Threshold Asmuth--Bloom Secret Sharing Scheme Maria Leslie, Ratna Dutta
2025/1560 (PDF ) On the Termination of the HotStuff Protocol Within the Universally Composable Framework Yuhang Zeng, Zhixin Dong, Xian Xu
2025/1559 (PDF ) A New Generalized Lattice Attack Against a Family of RSA-Like Cryptosystems Michel Seck, Abdoul Aziz Ciss
2025/1558 (PDF ) Lower Bounding Update Frequency in Short Accumulators and Vector Commitments Hamza Abusalah, Gaspard Anthoine, Gennaro Avitabile, Emanuele Giunta
2025/1557 (PDF ) On Achieving ``Best-in-the-Multiverse'' MPC Anasuya Acharya, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2025/1556 (PDF ) CryptoFace: End-to-End Encrypted Face Recognition Wei Ao, Vishnu Naresh Boddeti
2025/1555 (PDF ) Information-theoretic MPC with Constant Communication Overhead Ashish Choudhury, Ivan Damgård, Shravani Patil, Arpita Patra
2025/1554 (PDF ) UniCross: A Universal Cross-Chain Payment Protocol with On-demand Privacy and High Scalability Chenke Wang, Yu Long, Xian Xu, Shi-Feng Sun, Yiqi Liu, Dawu Gu
2025/1553 (PDF ) Understanding Unexpected Fixed-Key Differential Behaviours: How to Avoid Major Weaknesses in Lightweight Designs (Extended Version) Anne Canteaut, Merlin Fruchon
2025/1552 (PDF ) Minimalist Model for Impossible Differentials Patrick Derbez, Marie Euler
2025/1551 (PDF ) M&M: Secure Two-Party Machine Learning through Efficient Modulus Conversion and Mixed-Mode Protocols (Full Version) Ye Dong, Wen-jie Lu, Xiaoyang Hou, Kang Yang, Jian Liu
2025/1550 (PDF ) Revisiting Time-Space Tradeoffs in Collision Search and Decision Problems Jian Guo, Wenjie Nan, Yiran Yao
2025/1549 (PDF ) Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via Packet Inspection Subeen Cho, Yulim Hyoung, Hagyeong Kim, Minjoo Sim, Anupam Chattopadhyay, Hwajeong Seo, Hyunji Kim
2025/1548 (PDF ) Pairing-Based Aggregate Signatures without Random Oracles Susan Hohenberger, Brent Waters, David J. Wu
2025/1547 (PDF ) Silent Threshold Cryptography from Pairings: Expressive Policies in the Plain Model Brent Waters, David J. Wu
2025/1546 (PDF ) Incrementally Verifiable Computation for NP from Standard Assumptions Pratish Datta, Abhishek Jain, Zhengzhong Jin, Alexis Korb, Surya Mathialagan, Amit Sahai
2025/1545 (PDF ) Non-Trivial Ciphertexts Gideon Samid
2025/1544 (PDF ) MDS Diffusion Layers for Arithmetization-Oriented Symmetric Ciphers: The Rotational-Add Construction Baofeng Wu, Wen Kong, Dewei Kong, Hailun Yan
2025/1543 (PDF ) Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM Proofs Elena Andreeva, Amit Singh Bhati, Andreas Weninger
2025/1542 (PDF ) SAT-Based Space Partitioning and Applications to Ascon-Hash256 Guozhen Liu, Shun Li, Huina Li, Weidong Qiu, Siwei Sun
2025/1541 (PDF ) Adaptive Attack on Static POKÉ Keys David Lim, Yan Bo Ti
2025/1540 (PDF ) A Fine-Grained and Real-Time Functional Video Encryption and Sharing Scheme Haikuo Yu, Jiahui Hou, Suyuan Liu, Lan Zhang, Xiang-Yang Li
2025/1539 (PDF ) EvH: Randomized Symmetric Cipher Paradigm with Holographic Storage and Parallelism, Compression, & Erasure Recovery Integration Hillel Avni, Shlomi Dolev, Komal Kumari, Stav Perle Elbar, Shantanu Sharma, Jeffrey Ullman, Moti Yung, Zvi Galil
2025/1538 (PDF ) Evaluating Ascon in Secure Multi-Party Computation using Reverse Multiplication-Friendly Embeddings Peter Schwarz, Erik Pohle, Aysajan Abidin, Bart Preneel
2025/1537 (PDF ) Privacy-Preserving Two-Party RBF Kernel SVM Training Based on Neat and Accurate Secure Exponentiation Qingyu Mo, Wenyuan Wu, Jingwei Chen
2025/1536 (PDF ) Inner-Product Commitments Over Integers With Applications to Succinct Arguments Shihui Fu
2025/1535 (PDF ) Tight Bounds on Uniform-Challenge Reductions from Sigma Protocols Iftach Haitner, Nikolaos Makriyannis
2025/1534 (PDF ) RBOOT: Accelerating Homomorphic Neural Network Inference by Fusing ReLU within Bootstrapping Zhaomin Yang, Chao Niu, Benqiang Wei, Zhicong Huang, Cheng Hong, Tao Wei
2025/1533 (PDF ) PARSAN-Mix: Packet-Aware Routing and Shuffling with Additional Noise for Latency Optimization in Mix Networks (Extended Version) Mahdi Rahimi
2025/1532 (PDF ) Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC Tianshi Xu, Wen-jie Lu, Jiangrui Yu, Yi Chen, Chenqi Lin, Runsheng Wang, Meng Li
2025/1531 (PDF ) Improved Semi-Free-Start Collision Attacks on RIPEMD-160 (Full Version) Zhuolong Zhang, Muzhou Li, Haoyang Wang, Shiqi Hou, Wei Wang, Meiqin Wang
2025/1530 (PDF ) PolySys: an Algebraic Leakage Attack Engine Zachary Espiritu, Seny Kamara, Tarik Moataz, Andrew Park
2025/1529 (PDF ) UC-Security of the ZK-NR Protocol under Contextual Entropy Constraints: A Composable Zero-Knowledge Attestation Framework MINKA MI NGUIDJOI Thierry Emmanuel
2025/1528 (PDF ) Trustless Delegation of Vector Commitment Construction in Resource-Constrained Settings Parisa Hassanizadeh, Shahriar Ebrahimi, Stefan Dziembowski, Janusz Szczepanski
2025/1527 (PDF ) Universally Composable Transaction Order Fairness: Refined Definitions and Adaptive Security Michele Ciampi, Aggelos Kiayias, Yu Shen
2025/1526 (PDF ) A general secondary construction of Boolean functions including the indirect sum and its generalizations Claude Carlet, Deng Tang
2025/1525 (PDF ) Making Hard Problems Easier with Custom Data Distributions and Loss Regularization: A Case Study in Modular Arithmetic Eshika Saxena, Alberto Alfarano, François Charton, Zeyuan Allen-Zhu, Emily Wenger, Kristin Lauter
2025/1524 (PDF ) AUPCH: Auditable Unlinkable Payment Channel Hubs Pedro Moreno-Sanchez, Mohsen Minaei, Srinivasan Raghuraman, Panagiotis Chatzigiannis, Duc V. Le
2025/1523 (PDF ) Decoupling Support Enumeration and Value Discovery in Non-Binary ISD Freja Elbro, Paolo Santini
2025/1522 (PDF ) Constant-Size Inner Product Arguments for Group-Scalar Relations, Dynamic Threshold VRFs, and More Omid Mir, Octavio Perez-Kempner, Sebastian Ramacher, Daniel Slamanig
2025/1521 (PDF ) Universally Composable Subversion-Resilient Authenticated Key Exchange Jiahao Liu, Yi Wang, Rongmao Chen, Xinyi Huang, Jinshu Su, Moti Yung
2025/1520 (PDF ) DAWN: Smaller and Faster NTRU Encryption via Double Encoding Yijian Liu, Yu Zhang, Xianhui Lu, Yao Cheng, Yongjian Yin
2025/1519 (PDF ) Does the UC-Security Notion for PAKE Imply Game-Based Security? Jiayu Xu
2025/1518 (PDF ) Sequential Indifferentiability of STH and EDM Nilanjan Datta, Avijit Dutta, Sougata Mandal, Hrithik Nandi
2025/1517 (PDF ) Universally Composable Treatment of Multi-Party Isomorphic State Channels Maxim Jourenko, Xiangyu Su, Adam Blatchley Hansen, Mario Larangeira
2025/1516 (PDF ) GoSSamer: Lightweight and Linear-Communication Asynchronous (Dynamic Proactive) Secret Sharing and the Applications Xinxin Xing, Yizhong Liu, Boyang Liao, Jianwei Liu, Bin Hu, Xun Lin, Yuan Lu, Tianwei Zhang
2025/1515 (PDF ) Privacy-Preserving Federated Inference for Genomic Analysis with Homomorphic Encryption Anish Chakraborty, Nektarios Georgios Tsoutsos
2025/1514 (PDF ) Rigorous Methods for Computational Number Theory Koen de Boer, Alice Pellet-Mary, Benjamin Wesolowski
2025/1512 (PDF ) Virtual End-to-End Encryption: Analysis of the Doctolib Protocol Dennis Dayanikli, Laura Holz, Anja Lehmann
2025/1511 (PDF ) Updatable aPAKE: Security Against Bulk Precomputation Attacks Dennis Dayanikli, Anja Lehmann
2025/1510 (PDF ) Mosformer: Maliciously Secure Three-Party Inference Framework for Large Transformers Ke Cheng, Yuheng Xia, Anxiao Song, Jiaxuan Fu, Wenjie Qu, Yulong Shen, Jiaheng Zhang
2025/1509 (PDF ) LEAP: High-Performance Lattice-Based Pseudorandom Number Generator Yu Zhang, Xianhui Lu, Yijian Liu, Yongjian Yin, Kunpeng Wang
2025/1508 (PDF ) Concretely Efficient Fluid MPC with Linear Communication Yubo Zeng, Kang Yang, Dengguo Feng, Min Zhang
2025/1507 (PDF ) A Novel Quantum Voting System Based on Quantum Blind Signature without Entanglement Yu-Yuan Chou, Wen-Ching Wu, Jue-Sam Chou
2025/1506 (PDF ) Superposition Attacks Against LPN-Based Authentication Protocols Carlos Cid, David Elkouss, Manuel Goulão
2025/1505 (PDF ) A New Tool to Find Lightweight (AND, XOR) Implementations of Quadratic Vectorial Boolean Functions up to Dimension 9 Marie Bolzer, Sébastien Duval, Marine Minier
2025/1504 (PDF ) On the $\gamma$-Spreadness of Average-Case to Worst-Case Transformations Hyun Ji Kwag, Jonghyun Kim, Changmin Lee, Jong Hwan Park
2025/1503 (PDF ) Constraint-Friendly Map-to-Elliptic-Curve-Group Relations and Their Applications Jens Groth, Harjasleen Malvai, Andrew Miller, Yi-Nuo Zhang
2025/1502 (PDF ) CARPOOL: Secure And Reliable Proof of Location Sayon Duttagupta, Dave Singelée, Xavier Carpent, Volkan Guler, Takahito Yoshizawa, Seyed Farhad Aghili, Aysajan Abidin, Bart Preneel
2025/1501 (PDF ) Using the Planted Clique Conjecture for Cryptography: Public-Key Encryption from Planted Clique and Noisy $k$-$\mathsf{LIN}$ Over Expanders Riddhi Ghosal, Isaac M. Hair, Aayush Jain, Amit Sahai
2025/1500 (PDF ) Data Matching in Unequal Worlds and Applications to Smart Contracts Dmitry Khovratovich, Mikhail Vladimirov, Benedikt Wagner
2025/1499 (PDF ) A Construction of Evolving $k$-threshold Secret Sharing Scheme over A Polynomial Ring Qi Cheng, Hongru Cao, Sian-Jheng Lin, Nenghai Yu, Yunghsiang S. Han, Xianhong Xie
2025/1498 (PDF ) One More Pair, More Information Gained: Improved Attacks on LowMC with Full S-box Layers Using Two Plaintext/Ciphertext Pairs Yimeng Sun, Jiamin Cui, Shiyao Chen, Meiqin Wang, Longzheng Cui, Chao Niu
2025/1497 (PDF ) Hardness Along the Boundary: Towards One-Way Functions from the Worst-case Hardness of Time-Bounded Kolmogorov Complexity Yanyi Liu, Rafael Pass
2025/1496 (PDF ) Noise-Tolerant Plaintext-Checking Oracle Attacks -- A Soft-Analytic Approach Applied to ML-KEM Julius Hermelink, Erik Mårtensson, Maggie Tran
2025/1495 (PDF ) Pairwise independence of AES-like block ciphers Tim Beyne, Gregor Leander, Immo Schütt
2025/1494 (PDF ) Quantum Circuit Synthesis for AES with Low DW-cost Haoyu Liao, Qingbin Luo
2025/1493 (PDF ) Revisit the Boyar-Peralta Algorithm to Solve the Shortest Linear Program Problem Yao Sun, Runhe Yang, Ting Li
2025/1492 (PDF ) Comment on On Gaussian sampling, smoothing parameter and application to lattice signatures Cong Ling
2025/1491 (PDF ) Homomorphic Secret Sharing with Verifiable Evaluation Arka Rai Choudhuri, Aarushi Goel, Aditya Hegde, Abhishek Jain
2025/1490 (PDF ) Accelerating FALCON: Speed Records for FALCON on Xilinx FPGAs Sharath Pendyala, Rahul Magesh, Elif Bilge Kavun, Aydin Aysu
2025/1489 (PDF ) PQ-STAR: Post-Quantum Stateless Auditable Rekeying Shlomi Dolev, Avraham Yagudaev, Moti Yung
2025/1488 (PDF ) ABEL: Perfect Asynchronous Byzantine Extension from List-Decoding Ittai Abraham, Gilad Asharov
2025/1487 (PDF ) Towards Building Efficient SCALES Protocols Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran
2025/1486 (PDF ) Naor-Reingold goes Beyond-the-Birthday-Bound Avik Chakraborti, Bishwajit Chakraborty, Nilanjan Datta, Avijit Dutta, Ashwin Jha, Sougata Mandal, Hrithik Nandi, Mridul Nandi, Abishanka Saha
2025/1485 (PDF ) Glock: Garbled Locks for Bitcoin Liam Eagen
2025/1484 (PDF ) Boosting Payment Channel Network Liquidity with Topology Optimization and Transaction Selection Krishnendu Chatterjee, Jan Matyáš Křišťan, Stefan Schmid, Jakub Svoboda, Michelle Yeo
2025/1483 (PDF ) Cross-Consensus Reliable Broadcast and its Applications Yue Huang, Xin Wang, Haibin Zhang, Sisi Duan
2025/1482 (PDF ) Complex Elections via Threshold (Fully) Homomorphic Encryption Charlotte Bonte, Georgio Nicolas, Nigel P. Smart
2025/1481 (PDF ) A Camera Zoom-based Paper-Pencil Cipher Encryption Scheme atop Merkle–Hellman Knapsack Cryptosystem Gopal Anantharaman, Jintai Ding
2025/1480 (PDF ) SoK: Kleptographic Attacks Ting-Yun Yeh
2025/1479 (PDF ) PicoGRAM: Practical Garbled RAM from Decisional Diffie-Hellman Tianyao Gu, Afonso Tinoco, Sri Harish G Rajan, Elaine Shi
2025/1478 (PDF ) Fully-Adaptive Two-Round Threshold Schnorr Signatures from DDH Paul Gerhart, Davide Li Calsi, Luigi Russo, Dominique Schröder
2025/1477 (PDF ) Adaptively Secure Threshold ElGamal Decryption from DDH Sourav Das, Ling Ren, Ziling Yang
2025/1476 (PDF ) AGB 2.0: Refined Algebraic Attack against Regular Syndrome Decoding for PCG Applications Hanlin Liu, Xiao Wang, Kang Yang, Longhui Yin, Yu Yu
2025/1475 (PDF ) Stateless 2PC Signatures for Internet-Scale Authentication and Authorization Michael Adjedj, Geoffroy Couteau, Arik Galansky, Nikolaos Makriyannis, Oren Yomtov
2025/1474 (PDF ) Snake Mackerel: An Isogeny-Based AKEM Leveraging Randomness Reuse Jonas Janneck, Jonas Meers, Massimo Ostuzzi, Doreen Riepel
2025/1473 (PDF ) Time-Space Trade-Offs for Sumcheck Anubhav Baweja, Alessandro Chiesa, Elisabetta Fedele, Giacomo Fenzi, Pratyush Mishra, Tushar Mopuri, Andrew Zitek-Estrada
2025/1472 (PDF ) Hardness of M-LWE with General Distributions and Applications to Leaky Variants Katharina Boudgoust, Corentin Jeudy, Erkan Tairi, Weiqiang Wen
2025/1471 (PDF ) NTWR Prime - redundant security based on NTRU Prime and LWR problems Jakub Mielczarek, Małgorzata Zajęcka
2025/1470 (PDF ) Efficient Fuzzy Labeled PSI from Vector Ring-OLE Dung Bui, Kelong Cong
2025/1469 (PDF ) Sample Efficient Search to Decision for $k$LIN Andrej Bogdanov, Alon Rosen, Kel Zin Tan
2025/1468 (PDF ) Privacy-Preserving Machine Learning on Web Browsing for Public Opinion Sam Buxbaum, Lucas M. Tassis, Lucas Boschelli, Giovanni Comarela, Mayank Varia, Mark Crovella, Dino P. Christenson
2025/1466 (PDF ) Revisiting Adaptively Secure IBE from Lattices with Smaller Modulus: A Conceptually Simple Framework with Low Overhead Weidan Ji, Zhedong Wang, Lin Lyu, Dawu Gu
2025/1465 (PDF ) CoRReCt: Compute, Record, Replay, Compare to Secure Computations on Untrusted Systems Felix Dörre, Marco Liebel, Jeremias Mechler, Jörn Müller-Quade
2025/1464 (PDF ) Rumors MPC: GOD for Dynamic Committees, Low Communication via Constant-Round Chat Bernardo David, Arup Mondal, Rahul Satish
2025/1463 (PDF ) Leakage-Resilient Circuits against NC1, Revisited Yuyu Wang
2025/1462 (PDF ) Large smooth twins from short lattice vectors Erik Mulder, Bruno Sterner, Wessel van Woerden
2025/1461 (PDF ) Hard Instances of Discrete Logarithm Problem and Cryptographic Applications Christopher Battarbee, Arman Darbinyan, Delaram Kahrobaei
2025/1460 (PDF ) A Performance Comparison of the Homomorphic Encryption Schemes CKKS and TFHE Clemens Krüger, Bhavinkumar Moriya, Dominik Schoop
2025/1459 (PDF ) Not in The Prophecies: Practical Attacks on Nostr Hayato Kimura, Ryoma Ito, Kazuhiko Minematsu, Shogo Shiraki, Takanori Isobe
2025/1458 (PDF ) INKE: Fast Isogeny-Based PKE Using Intermediate Curves Hyeonhak Kim, Seokhie Hong, Suhri Kim, Sangjin Lee
2025/1457 (PDF ) DOC★: Access Control for Information-Theoretically Secure Key-Document Stores Yin Li, Sharad Mehrota, Shantanu Sharma, Komal Kumari
2025/1456 (PDF ) Provably Memory-Hard Proofs of Work With Memory-Easy Verification Jeremiah Blocki, Nathan Smearsoll
2025/1455 (PDF ) Fully-Fluctuating Participation in Sleepy Consensus Yuval Efron, Joachim Neu, Toniann Pitassi
2025/1454 (PDF ) Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes Maxim Jourenko, Marcus Völker
2025/1453 (PDF ) Password-Hardened Encryption Revisited Ruben Baecker, Paul Gerhart, Dominique Schröder
2025/1452 (PDF ) Not Easy to Prepare a Pesto: Cryptanalysis of a Multivariate Public-Key Scheme from CCZ Equivalence Christof Beierle, Patrick Felke
2025/1451 (PDF ) MUSE-VFL: Multi-party Unified System for Private and Communication Efficient Backpropagation in Vertical Federated Learning Ivan Tjuawinata, Yann Fraboni, Ziyao Liu, Jun Zhao, Pu Duan, Kwok-Yan Lam
2025/1450 (PDF ) Single-round Lattice-based Multisignatures Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan
2025/1449 (PDF ) REFHE: Fully Homomorphic ALU Zvika Brakerski, Offir Friedman, Daniel Golan, Alon Gurny, Dolev Mutzari, Ohad Sheinfeld
2025/1448 (PDF ) Dimension-Reducing Algorithms for Quaternion Ideal-SVP Cong Ling, Andrew Mendelsohn, Christian Porter
2025/1447 (PDF ) A New Paradigm for Privacy-Preserving Decision Tree Evaluation Tianpei Lu, Bingsheng Zhang, Hao Li, Kui Ren
2025/1446 (PDF ) zip: Reducing Proof Sizes for Hash-Based SNARGs Giacomo Fenzi, Yuwen Zhang
2025/1445 (PDF ) Fairness Analysis on FairShare: A Secure Data Sharing Scheme for Industrial IoT Mojtaba Rafiee, Mehdi Abri
2025/1444 (PDF ) The Best of Both KEMs: Securely Combining KEMs in Post-Quantum Hybrid Schemes Gorjan Alagic, Fahran Bajaj, Aybars Kocoglu
2025/1443 (PDF ) Generic Partial Decryption as Feature Engineering for Neural Distinguishers Emanuele Bellini, Rocco Brunelli, David Gerault, Anna Hambitzer, Marco Pedicini
2025/1442 (PDF ) Shuffling is Universal: Statistical Additive Randomized Encodings for All Functions Nir Bitansky, Saroja Erabelli, Rachit Garg, Yuval Ishai
2025/1441 (PDF ) DIMSEPP: A Decentralized Identity Management System with Enhanced Privacy Protection Yu Zhang, Zongbin Wang
2025/1440 (PDF ) Faster Homomorphic Integer Computer Jaehyung Kim
2025/1439 (PDF ) A Note on the Post-Quantum Security of Identity-Based Encryption on Isogenous Pairing Groups Malte Andersch, Cezary Pilaszewicz, Marian Margraf
2025/1438 (PDF ) Secure Protocols for Best Arm Identification Using Secret Sharing Schemes Shanuja Sasi, Asaf Cohen, Onur Günlü
2025/1437 (PDF ) GURKE: Group Unidirectional Ratcheted Key Exchange Daniel Collins, Paul Rösler
2025/1436 (PDF ) VOLE-in-the-Head Signatures Based on the Linear Code Equivalence Problem Michele Battagliola, Laura Mattiuz, Alessio Meneghetti
2025/1435 (PDF ) Weak Keys in QC-MDPC-based cryptosystems via the Extended Euclidean Algorithm Alessio Meneghetti, Federica Zanetti
2025/1434 (PDF ) TLShare: Private Authenticated MPC and FHE Inputs Over TLS Manuel B. Santos, Dimitris Mouris, Xiang Xie, Miguel de Vega, Andrei Lapets
2025/1433 (PDF ) A Fully-Adaptive Threshold Partially-Oblivious PRF Ruben Baecker, Paul Gerhart, Daniel Rausch, Dominique Schröder
2025/1432 (PDF ) Brauer and certain class of Hansen chain are closed addition chains Theophilus Agama
2025/1431 (PDF ) Multi-Partner Project: Securing Future Edge-AI Processors in Practice (CONVOLVE) Sven Argo, Henk Corporaal, Alejandro Garza, Marc Geilen, Manil Dev Gomony, Tim Güneysu, Adrian Marotzke, Fouwad Mir, Christian Larmann, Jan Richter-Brockmann, Jeffrey Smith, Mottaqiallah Taouil, Said Hamdioui
2025/1430 (PDF ) Practical Collision Attacks on Reduced-Round Xoodyak Hash Mode Huina Li, Le He, Weidong Qiu
2025/1429 (PDF ) Public-Key Encryption and Injective Trapdoor Functions from LWE with Large Noise Rate Liheng Ji, Yilei Chen
2025/1428 (PDF ) Strategic Mining in Proof-of-Stake with Practical Random Election Zhuo Cai
2025/1427 (PDF ) End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces Jintong Yu, Yuxuan Wang, Shipei Qu, Yubo Zhao, Yipeng Shi, Pei Cao, Xiangjun Lu, Chi Zhang, Dawu Gu, Cheng Hong
2025/1426 (PDF ) (Im)Possibility of Symmetric Encryption against Coordinated Algorithm Substitution Attacks and Key Exfiltration Simone Colombo, Damian Vizár
2025/1425 (PDF ) Lodia: Towards Optimal Sparse Matrix-Vector Multiplication for Batched Fully Homomorphic Encryption Jiping Yu, Kun Chen, Xiaoyu Fan, Yunyi Chen, Xiaowei Zhu, Wenguang Chen
2025/1424 (PDF ) LESS is Even More: Optimizing Digital Signatures from Code Equivalence Luke Beckwith, Andre Esser, Edoardo Persichetti, Paolo Santini, Floyd Zweydinger
2025/1423 (PDF ) Collusion-Safe Proxy Re-Encryption Haotian Yin, Jie Zhang, Wanxin Li, Yuji Dong, Eng Gee Lim, Dominik Wojtczak
2025/1422 (PDF ) Design ZK-NR: A Post-Quantum Layered Protocol for Legally Explainable Zero-Knowledge Non-Repudiation Attestation Minka Mi Nguidjoi Thierry Emmanuel, Mani Onana Flavien Serge, Djotio Ndié Thomas, Atsa Etoundi Roger
2025/1421 (PDF ) Efficient randomized strong $2$-source non-malleable extractor for any linear min-entropy Divesh Aggarwal, Pranjal Dutta, Saswata Mukherjee, Satyajeet Nagargoje, Maciej Obremski
2025/1420 (PDF ) Coral: Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs Sebastian Angel, Sofía Celi, Elizabeth Margolin, Pratyush Mishra, Martin Sander, Jess Woods
2025/1419 (PDF ) BEAST-MEV: Batched Threshold Encryption with Silent Setup for MEV prevention Jan Bormet, Arka Rai Choudhuri, Sebastian Faust, Sanjam Garg, Hussien Othman, Guru-Vamsi Policharla, Ziyan Qu, Mingyuan Wang
2025/1418 (PDF ) Note: Shared Key Recovery Attack on Cascader Key Exchange Protocol Nick Aquina, Simon Rommel, Idelfonso Tafur Monroy
2025/1417 (PDF ) A Note on the Post-Quantum Security of the Inverse Discrete Logarithm Problem Joshua Limbrey, Andrew Mendelsohn
2025/1416 (PDF ) Binding Security of Combined KEMs: An Analysis of Real-World KEM Combiners Juliane Krämer, Patrick Struck, Maximiliane Weishäupl
2025/1415 (PDF ) Quantum Implementation of SHA-1 Seyoung Yoon, Gyeongju Song, Kyungbae Jang, Sangmin Cha, Hwajeong Seo
2025/1414 (PDF ) Data Availability Sampling with Repair Dan Boneh, Joachim Neu, Valeria Nikolaenko, Aditi Partap
2025/1413 (PDF ) When Can We Incrementally Prove Computations of Arbitrary Depth? Matteo Campanelli, Dario Fiore, Mahak Pancholi
2025/1412 (PDF ) AVPEU: Anonymous Verifiable Presentations with Extended Usability Yalan Wang, Liqun Chen, Yangguang Tian, Long Meng, Christopher J.P. Newton
2025/1411 (PDF ) BACON: An Improved Vector Commitment Construction with Applications to Signatures Yalan Wang, Bryan Kumara, Harsh Kasyap, Liqun Chen, Sumanta Sarkar, Christopher J.P. Newton, Carsten Maple, Ugur Ilker Atmaca
2025/1410 (PDF ) Nakamoto Consensus from Multiple Resources Mirza Ahad Baig, Christoph Ullrich Günther, Krzysztof Pietrzak
2025/1409 (PDF ) Oblivious Exact (Un)Learning of Extremely Randomized Trees Sofiane Azogagh, Zelma Aubin Birba, Sébastien Gambs, Marc-Olivier Killijian
2025/1408 (PDF ) qedb: Expressive and Modular Verifiable Databases (without SNARKs) Vincenzo Botta, Simone Bottoni, Matteo Campanelli, Emanuele Ragnoli, Alberto Trombetta
2025/1407 (PDF ) A Flexible Hardware Design Tool for Fast Fourier and Number-Theoretic Transformation Architectures Florian Krieger, Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy
2025/1406 (PDF ) Scalable Secure Multiparty Computation with Perfect Security from Preprocessing Yifan Song, Xiaxi Ye
2025/1405 (PDF ) Two-Tier Black-box Blockchains and Application to Instant Layer-1 Payments Michele Ciampi, Yun Lu, Rafail Ostrovsky, Vassilis Zikas
2025/1404 (PDF ) Optimistic Message Dissemination Chen-Da Liu-Zhang, Christian Matt, Søren Eller Thomsen
2025/1403 (PDF ) Faster Bootstrapping for CKKS with Less Modulus Consumption Lianglin Yan, Pengfei Zeng, Heyang Cao, Peizhe Song, Mingsheng Wang
2025/1402 (PDF ) Can we Speed up Information Set Decoding by Using Extension Field Structure? Freja Elbro, Violetta Weger
2025/1401 (PDF ) Automated Tool for Meet-in-the-Middle Attacks with Very Low Data and Memory Complexity (Full Version) Mohammad Vaziri
2025/1400 (PDF ) RGB I.0: Scalable consensus for client-side validated smart contracts Maxim Orlovsky
2025/1399 (PDF ) Tempo: ML-KEM to PAKE Compiler Resilient to Timing Attacks Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki
2025/1398 (PDF ) General Review of Hash-Based Signatures Halil İbrahim Kaplan
2025/1397 (PDF ) Starfighters—On the General Applicability of X-Wing Deirdre Connolly, Kathrin Hövelmanns, Andreas Hülsing, Stavros Kousidis, Matthias Meijers
2025/1396 (PDF ) A Generalized Wiener-type Attack Against a Family RSA-like Cryptosystem George Teseleanu
2025/1395 (PDF ) A Security Comment on ``A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid'' Dariush Abbasinezhad-Mood
2025/1394 (PDF ) Peeking Into the Future: MPC Resilient to Super-Rushing Adversaries Gilad Asharov, Anirudh Chandramouli, Ran Cohen, Yuval Ishai
2025/1393 (PDF ) Polynomial Lattices for the BIKE Cryptosystem Michael Schaller
2025/1392 (PDF ) FLEX — Capital-Efficient Optimistic Bridges with On-Demand Security Bonds for Bitcoin Sergio Demian Lerner, Ariel Futoransky
2025/1391 (PDF ) Inverse Discrete Logarithm - Post-Quantum take on a classical problem. Mikhail Suslov
2025/1390 (PDF ) Optimizing Backend Verification in zk-Rollup Architectures Mehdi Beriane, Muhammed Ali Bingol
2025/1389 (PDF ) Verification Cost Asymmetry in Cognitive Warfare: A Complexity-Theoretic Framework Joshua Luberisse
2025/1388 (PDF ) Collaborative zkSNARKs with Sublinear Prover Time and Constant Proof Size Zhiyong Fang, Sanjam Garg, Bhaskar Roberts, Wenxuan Wu, Yupeng Zhang
2025/1387 (PDF ) Fast Final Exponentiation on BW and BLS Curves with Even Embedding Degrees at 128 bits security Senegue Gomez Nyamsi, Emmanuel Fouotsa, Calvin Tcheka
2025/1386 (PDF ) How to Tolerate Typos in Strong Asymmetric PAKE Ian McQuoid, Mike Rosulek, Jiayu Xu
2025/1385 (PDF ) Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage Pengxu Zhu, Lei Wang
2025/1384 (PDF ) Silent Threshold Encryption with One-Shot Adaptive Security Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner
2025/1383 (PDF ) An Efficient Circuit Synthesis Framework for TFHE via Convex Sub-graph Optimization Animesh Singh, Ayantika Chatterjee, Anupam Chattopadhyay, Debdeep Mukhopadhyay
2025/1382 (PDF ) Using Learning with Rounding to Instantiate Post-Quantum Cryptographic Algorithms Andrea Basso, Joppe W. Bos, Jan-Pieter D'Anvers, Angshuman Karmakar, Jose Maria Bermudo Mera, Joost Renes, Sujoy Sinha Roy, Frederik Vercauteren, Peng Wang, Yuewu Wang, Shicong Zhang, Chenxin Zhong
2025/1381 (PDF ) Blockchain-Based Decentralized Domain Name System Guang Yang, Peter Trinh, Alma Nkemla, Amuru Serikyaku, Edward Tatchim, Osman Sharaf
2025/1380 (PDF ) Quantum Composable and Contextual Security Infrastructure (Q2CSI) : A Modular Architecture for Legally Explainable Cryptographic Signatures Thierry Emmanuel MINKA MI NGUIDJOI, MANI ONANA Flavien Serge, DJOTIO NDIÉ Thomas, BOUETOU BOUETOU Thomas
2025/1379 (PDF ) Enhancing Scale and Shift Invariance in Deep Learning-based Side-channel Attacks through Equivariant Convolutional Neural Networks David Perez, Sengim Karayalcin, Stjepan Picek, Servio Paguada
2025/1378 (PDF ) Tight Lower Bound on Witness Update Frequency in Additive Positive Accumulators Wei Qi
2025/1377 (PDF ) More Practical Non-interactive Encrypted Conjunctive Search with Leakage and Storage Suppression Huu Ngoc Duc Nguyen, Shujie Cui, Shangqi Lai, Tsz Hon Yuen, Joseph K. Liu
2025/1376 (PDF ) On Hull Attacks on the Module Lattice Isomorphism Problem Franciele C. Silva, Maja Lie, Cong Ling
2025/1375 (PDF ) Revisiting Linkable Ring Signatures with Logarithmic Verification Complexity Danai Balla, Pyrros Chaidos
2025/1374 (PDF ) An Attack to Universally Composable Commitments from Malicious Physically Uncloneable Functions and how to Avoid it Lourenço Abecasis, Paulo Mateus, Chrysoula Vlachou
2025/1373 (PDF ) A Zero-Knowledge Proof for the Syndrome Decoding Problem in the Lee Metric Mladen Kovačević, Tatjana Grbić, Darko Čapko, Nemanja Nedić, Srđan Vukmirović
2025/1372 (PDF ) Gluon W: A Cryptocurrency Stabilization Protocol Bruno Woltzenlogel Paleo, Luca D'Angelo, Mohammad Shaheer, Giselle Reis
2025/1371 (PDF ) Securing Credential Sequence Verification Mamunur Rashid Akand, Reihaneh Safavi-Naini
2025/1370 (PDF ) Randomized Distributed Function Computation (RDFC): Ultra-Efficient Semantic Communication Applications to Privacy Onur Gunlu
2025/1369 (PDF ) Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State Differences (Full Version) Mohammad Vaziri, Vesselin Velichkov
2025/1368 (PDF ) Post-Quantum Readiness in EdDSA Chains Foteini Baldimtsi, Konstantinos Chalkias, Arnab Roy, Mahdi Sedaghat
2025/1367 (PDF ) Encrypted Matrix Multiplication Using 3-Dimensional Rotations Hannah Mahon, Shane Kosieradzki
2025/1366 (PDF ) NOPE: Strengthening domain authentication with succinct proofs Zachary DeStefano, Jeff J. Ma, Joseph Bonneau, Michael Walfish
2025/1365 (PDF ) Towards Efficient Privacy-Preserving Machine Learning: A Systematic Review from Protocol, Model, and System Perspectives Wenxuan Zeng, Tianshi Xu, Yi Chen, Yifan Zhou, Mingzhe Zhang, Jin Tan, Cheng Hong, Meng Li
2025/1364 (PDF ) A Framework for Witness Encryption from Linearly Verifiable SNARKs and Applications Sanjam Garg, Mohammad Hajiabadi, Dimitris Kolonelos, Abhiram Kothapalli, Guru-Vamsi Policharla
2025/1363 (PDF ) Universally Composable Adaptor Signatures Paul Gerhart, Daniel Rausch, Dominique Schröder
2025/1362 (PDF ) Cryptanalysis of the best HFE-LL' Constructions Daniel Smith-Tone, Cristian Valenzuela
2025/1361 (PDF ) Exploring Kaneko’s bound: On multi-edges, loops and the diameter of the supersingular $\ell$-isogeny graph Sebastiano Boscardin, Sebastian A. Spindler
2025/1360 (PDF ) Towards more secure constructions of private set operation schemes Mojtaba Rafiee
2025/1359 (PDF ) Runtime Code Generation for Constant-Time Secret-Indexed Array Accesses: Applications to PERK and NTRU Décio Luiz Gazzoni Filho, Rafael G. Flores e Silva, Alessandro Budroni, Marco Palumbi, Gora Adj
2025/1358 (PDF ) Domain-Oriented Masking Revisited: More Efficient AES Implementations with Arbitrary Protection Order Feng Zhou, Hua Chen, Limin Fan, Junhuai Yang
2025/1357 (PDF ) How to Copy-Protect Malleable-Puncturable Cryptographic Functionalities Under Arbitrary Challenge Distributions Alper Çakan, Vipul Goyal
2025/1356 (PDF ) Group Signatures with Message-Dependent Opening Directly Imply Timed-Release Encryption Yuto Imura, Keita Emura
2025/1355 (PDF ) Unconditional Pseudorandomness against Shallow Quantum Circuits Soumik Ghosh, Sathyawageeswar Subramanian, Wei Zhan
2025/1354 (PDF ) Shred-to-Shine Metamorphosis of (Distributed) Polynomial Commitments Weihan Li, Zongyang Zhang, Sherman S. M. Chow, Yanpei Guo, Boyuan Gao, Xuyang Song, Yi Deng, Jianwei Liu
2025/1353 (PDF ) Introducing two ROS attack variants: breaking one-more unforgeability of BZ blind signatures Bruno M. F. Ricardo, Lucas C. Cardoso, Leonardo T. Kimura, Paulo S. Barreto, Marcos A. Simplicio Jr
2025/1352 (PDF ) InsPIRe: Communication-Efficient PIR with Server-side Preprocessing Rasoul Akhavan Mahdavi, Sarvar Patel, Joon Young Seo, Kevin Yeo
2025/1351 (PDF ) Revisiting the Generalized Birthday Problem and Equihash: Single or K Lists? Lili Tang, Yao Sun, Xiaorui Gong
2025/1350 (PDF ) Rhyme: A Fiat-Shamir Lattice-based Signature with 3C Sampling Zhongxiang Zheng, Anyu Wang, Chunhuan Zhao, Guangwu Xu, Zhengtao Jiang, Sibo Feng, Zhichen Yan, Shuang Sun, Xiaoyun Wang
2025/1349 (PDF ) $\mathsf{HyperFond}$: A Transparent and Post-Quantum Distributed SNARK with Polylogarithmic Communication Yuanzhuo Yu, Mengling Liu, Yuncong Zhang, Shi-Feng Sun, Tianyi Ma, Man Ho Au, Dawu Gu
2025/1348 (PDF ) The CRO Trilemma : a formal incompatibility between Confidentiality, Reliability and legal Opposability in Post-Quantum proof systems Thierry Emmanuel MINKA MI NGUIDJOI, MANI ONANA Flavien Serge, DJOTIO NDIÉ Thomas
2025/1347 (PDF ) Public Traceability in Threshold Decryption Sébastien Canard, Nathan Papon, Duong Hieu Phan
2025/1346 (PDF ) Cryptanalysis of TFHE-friendly Cipher FRAST Antoine Bak, Shibam Ghosh, Fukang Liu, Willi Meier, Jianqiang Ni, Léo Perrin
2025/1345 (PDF ) SLVer Bullet: Straight-Line Verification for Bulletproofs Brandon Goodell, Rigo Salazar, Freeman Slaughter, Luke Szramowski
2025/1344 (PDF ) Side-Channel Sensitivity Analysis on HQC: Towards a Fully Masked Implementation Guillaume Goy, Maxime Spyropoulos, Nicolas Aragon, Philippe Gaborit, Renaud Pacalet, Fabrice Perion, Laurent Sauvage, David Vigilant
2025/1343 (PDF ) A Hybrid Asymmetric Password-Authenticated Key Exchange in the Random Oracle Model Jelle Vos, Stanislaw Jarecki, Christopher A. Wood, Cathie Yun, Steve Myers, Yannick Sierra
2025/1342 (PDF ) Simultaneous Diophantine Approximation for Compact Discrete Gaussian Sampling Ke Ma, Jiabo Wang, Shanxiang Lyu, Junzuo Lai, Zsolt Lángi
2025/1341 (PDF ) Practical Attack on All Parameters of the HPPC Signature Scheme Pierre Briaud, Maxime Bros, Ray Perlner, Daniel Smith-Tone
2025/1340 (PDF ) Zelda: Efficient Multi-server Preprocessing PIR with Unconditional Security Ashrujit Ghoshal, Mingxun Zhou, Bo Peng, Elaine Shi
2025/1339 (PDF ) Breaking the Twinkle Authenticated Encryption Scheme and Analyzing Its Underlying Permutation Debasmita Chakraborty, Hosein Hadipour, Anup Kumar Kundu, Mostafizar Rahman, Prathamesh Ram, Yu Sasaki, Dilip Sau, Aman Sinha
2025/1338 (PDF ) Limits on the Power of Constrained PRFs and Identity-based Cryptography Roman Langrehr
2025/1337 (PDF ) Electrum: UC Fail-Stop Server-Supported Signatures Nikita Snetkov, Jelizaveta Vakarjuk, Peeter Laud
2025/1336 (PDF ) Representations of Elementary Vectors in VOLE-in-the-head-based Schemes Tung Chou
2025/1335 (PDF ) A Compact Post-quantum Strong Designated Verifier Signature Scheme from Isogenies Farzin Renan
2025/1334 (PDF ) On the use of ECDSA with hierarchical public key delegation in identity-based scenarios Lucas C. Cardoso, Marcos A. Simplicio Jr
2025/1333 (PDF ) Policy-Based Redactable Set Signatures Zachary A Kissel
2025/1332 (PDF ) Technical Note: LeanSig for Post-Quantum Ethereum Justin Drake, Dmitry Khovratovich, Mikhail Kudinov, Benedikt Wagner
2025/1331 (PDF ) Constant-Cycle Hardware Private Circuits Daniel Lammers, Nicolai Müller, Siemen Dhooghe, Amir Moradi
2025/1330 (PDF ) Exploring Core Monomial Prediction Further: Weak-Key Superpoly Recovery for 852-Round Trivium Jiahui He, Kai Hu, Guowei Liu
2025/1329 (PDF ) Cryptanalysis of a multivariate CCZ scheme Alessio Caminata, Elisa Gorla, Madison Mabe, Martina Vigorito, Irene Villa
2025/1328 (PDF ) Private Set Intersection and other Set Operations in the Third Party Setting Foo Yee Yeo, Jason H. M. Ying
2025/1327 (PDF ) Randomized Agreement, Verifiable Secret Sharing and Multi-Party Computation in Granular Synchrony Ananya Appan, David Heath, Ling Ren
2025/1326 (PDF ) New Techniques for Analyzing Differentials with Application to AES Itai Dinur
2025/1325 (PDF ) Revisiting the IPA-sumcheck connection Liam Eagen, Ariel Gabizon
2025/1324 (PDF ) FPGA-Friendly Compact and Efficient AES-like 8x8 S-Box Ahmet Malal, Cihangir Tezcan
2025/1323 (PDF ) Pairing-Based Batch Arguments for NP with a Linear-Size CRS Binyi Chen, Noel Elias, David J. Wu
2025/1322 (PDF ) Generation of Fast Finite Field Arithmetic for Cortex-M4 with ECDH and SQIsign Applications Felix Carvalho Rodrigues, Décio Gazzoni Filho, Gora Adj, Isaac A. Canales-Martínez, Jorge Chávez-Saab, Julio López, Michael Scott, Francisco Rodríguez-Henríquez
2025/1321 (PDF ) Threshold Receipt-Free Voting with Server-Side Vote Validation Thi Van Thao Doan, Olivier Pereira, Thomas Peters
2025/1320 (PDF ) Picking up the Fallen Mask: Breaking and Fixing the RS-Mask Countermeasure Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov
2025/1319 (PDF ) Bridging Usability and Performance: A Tensor Compiler for Autovectorizing Homomorphic Encryption Edward Chen, Fraser Brown, Wenting Zheng
2025/1318 (PDF ) Lifeline: Optimal Byzantine Agreement Under Minimal Synchrony Yuval Efron, Ling Ren
2025/1317 (PDF ) FunBic-CCA: Function Secret Sharing for Biclusterings Applied to Cheng and Church Algorithm (Extended Version) Shokofeh VahidianSadegh, Alberto Ibarrondo, Lena Wiese
2025/1316 (PDF ) Scalable Information Theoretic Evaluation of the Rank Statistics in Side-Channel Attacks Julien Béguinot, Olivier Rioul, Loïc Masure, François-Xavier Standaert, Wei Cheng, Sylvain Guilley
2025/1315 (PDF ) CostSphere: A Cost Model-Driven Privacy-Preserving Machine Learning Framework with Network Context Adaptation Yuntian Chen, Zhanyong Tang, Tianpei Lu, Bingsheng Zhang, Zhiying Shi, Zhiyuan Ning
2025/1314 (PDF ) THF: Designing Low-Latency Tweakable Block Ciphers Jianhua Wang, Tao Huang, Guang Zeng, Tianyou Ding, Shuang Wu, Siwei Sun
2025/1313 (PDF ) Two-Server Sublinear PIR with Symmetric Privacy and Statistical Security Shuaishuai Li, Anyu Wang, Cong Zhang, Xiaoyun Wang
2025/1312 (PDF ) Can FrodoKEM Run in a Millisecond? FPGA Says Yes! Gökçe Düzyol, Muhammed Said Gündoğan, Atakan Arslan
2025/1311 (PDF ) Batch subgroup membership testing on pairing-friendly curves Dimitri Koshelev, Youssef El Housni, Georgios Fotiadis
2025/1310 (PDF ) A Comprehensive Survey of Privacy-Preserving Decision Trees Based on Homomorphic Encryption El Hadji Mamadou DIA, Walid ARABI, Anis BKAKRIA, Reda YAICH
2025/1309 (PDF ) SoK: Deep Learning-based Side-channel Analysis Trends and Challenges Sengim Karayalcin, Marina Krcek, Stjepan Picek
2025/1308 (PDF ) Efficient High-Order Masking of FrodoKEM’s CDT-Based Gaussian Sampler Elie Eid, Aurélien Greuet, Nathan Reboud, Rina Zeitoun
2025/1307 (PDF ) The Post-Quantum Security of Bitcoin's Taproot as a Commitment Scheme Tim Ruffing
2025/1306 (PDF ) Rethinking Learning-based Symmetric Cryptanalysis: a Theoretical Perspective Yufei Yuan, Haiyi Xu, Jiaye Teng, Lei Zhang, Wenling Wu
2025/1305 (PDF ) Barely Doubly-Efficient SimplePIR Keewoo Lee
2025/1302 (PDF ) FHERMA Cookbook: FHE Components for Privacy-Preserving Applications Janis Adamek, Aikata Aikata, Ahmad Al Badawi, Andreea Alexandru, Armen Arakelov, Philipp Binfet, Victor Correa, Jules Dumezy, Sergey Gomenyuk, Valentina Kononova, Dmitrii Lekomtsev, Vivian Maloney, Chi-Hieu Nguyen, Yuriy Polyakov, Daria Pianykh, Hayim Shaul, Moritz Schulze Darup, Dieter Teichrib, Dmitry Tronin, Gurgen Arakelov
2025/1301 (PDF ) Evaluating Larger Lookup Tables using CKKS Jules Dumezy, Andreea Alexandru, Yuriy Polyakov, Pierre-Emmanuel Clet, Olive Chakraborty, Aymen Boudguiga
2025/1300 (PDF ) PlasmaFold: An Efficient and Scalable Layer 2 with Client-Side Proving Pierre Daix-Moreux, Chengru Zhang
2025/1299 (PDF ) Sota Voce: Low-Noise Sampling of Sparse Fixed-Weight Vectors Décio Luiz Gazzoni Filho, Gora Adj, Slim Bettaieb, Alessandro Budroni, Jorge Chávez-Saab, Francisco Rodríguez-Henríquez
2025/1298 (PDF ) OverModRaise: Reducing Modulus Consumption of CKKS Bootstrapping Jihwan Kim, Jung Hee Cheon, Yongdong Yeo
2025/1297 (PDF ) On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search Takeshi Yoshida, Keita Emura
2025/1296 (PDF ) Gödel in Cryptography: Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup, and Perfect Soundness Rahul Ilango
2025/1295 (PDF ) The computational refined Humbert invariant problem is equivalent to the computational isogeny problem Eda Kırımlı, Chloe Martindale
2025/1294 (PDF ) Interstellar: Efficient GKR-based IVC Scheme with Privacy-Preserving Collaborative Folding Jieyi Long
2025/1293 (PDF ) ECTester: Reverse-engineering side-channel countermeasures of ECC implementations Vojtech Suchanek, Jan Jancar, Jan Kvapil, Petr Svenda, Łukasz Chmielewski
2025/1292 (PDF ) Key Attack on the ACDGV Matrix Encryption Scheme Anmoal Porwal, Antonia Wachter-Zeh, Pierre Loidreau
2025/1291 (PDF ) A note on the security of the BitVM3 garbling scheme Ariel Futoransky, Gabriel Larotonda, Fadi Barbara
2025/1290 (PDF ) Improving the Selection Rule of Correlation Attacks for Remote Power Analysis Oriol Farràs, Vincent Grosso, Miquel Guiot, Carlos Andres Lara-Nino
2025/1289 (PDF ) AlphaFL: Secure Aggregation with Malicious$^2$ Security for Federated Learning against Dishonest Majority Yufan Jiang, Maryam Zarezadeh, Tianxiang Dai, Stefan Köpsell
2025/1288 (PDF ) New Proof for Plain OAEP: Post-Quantum Security without Parameter Restrictions or Collision-Resistance Heming Liao, Jiangxia Ge, Shujiao Cao, Rui Xue
2025/1287 (PDF ) Fault Injection Evaluation with Statistical Analysis - How to Deal with Nearly Fabricated Large Circuits Felix Uhle, Nicolai Müller, Amir Moradi
2025/1286 (PDF ) State-Based Classical Shadows Zvika Brakerski, Nir Magrafta, Tomer Solomon
2025/1285 (PDF ) FRIttata: A FRI-based Polynomial Commitment Scheme for Distributed Proof Generation Hua Xu, Mariana Gama, Emad Heydari Beni, Jiayi Kang
2025/1284 (PDF ) A Hybrid Algorithm for the Regular Syndrome Decoding Problem Tianrui Wang, Anyu Wang, Kang Yang, Hanlin Liu, Yu Yu, Jun Zhang, Xiaoyun Wang
2025/1283 (PDF ) Fast AVX-512 Implementation of the Optimal Ate Pairing on BLS12-381 Hao Cheng, Georgios Fotiadis, Johann Großschädl, Daniel Page
2025/1282 (PDF ) A Novel Partial Key Exposure Attack on Common Prime RSA Mengce Zheng, Abderrahmane Nitaj
2025/1281 (PDF ) Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith's Techniques Mengce Zheng, Yansong Feng, Abderrahmane Nitaj, Yanbin Pan
2025/1280 (PDF ) SecFePAS: Secure Facial-Expression-Based Pain Assessment with Deep Learning at the Edge Kanwal Batool, Saleem Anwar, Zolt´an Ad´am Mann
2025/1279 (PDF ) Multi-Authority Registered Attribute-Based Encryption George Lu, Brent Waters, David J. Wu
2025/1278 (PDF ) On the Security Risks of Covert Password Manager Providers Gildas Avoine, Amit Singh Bhati, Xavier Carpent, Diane Leblanc-Albarel
2025/1277 (PDF ) Scalable Accountable Byzantine Agreement and Beyond Pierre Civit, Daniel Collins, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic, Manuel Vidigueira, Pouriya Zarbafian
2025/1276 (PDF ) On Weak NIZKs, One-way Functions and Amplification Suvradip Chakraborty, James Hulett, Dakshita Khurana
2025/1275 (PDF ) Improving the Fault Robustness of Polynomial Masking Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Elena Micheli, Maximilian Orlt, Pajam Pauls, Kathrin Wirschem, Liang Zhao
2025/1274 (PDF ) Improved Matrix Inversion with Packed Ciphertexts using Fully Homomorphic Encryption Seunghu Kim, Seongbong Choi, Hyung Tae Lee
2025/1273 (PDF ) Threshold Structure-Preserving Signatures with Randomizable Key Ahmet Ramazan Ağırtaş, Emircan Çelik, Oğuz Yayla
2025/1272 (PDF ) EinHops: Einsum Notation for Expressive Homomorphic Operations on RNS-CKKS Tensors Karthik Garimella, Austin Ebel, Brandon Reagen
2025/1271 (PDF ) Applications Of Zero-Knowledge Proofs On Bitcoin Yusuf Ozmiş
2025/1270 (PDF ) Key Recovery from Side-Channel Power Analysis Attacks on Non-SIMD HQC Decryption Nathan Maillet, Cyrius Nugier, Vincent Migliore, Jean-Christophe Deneuville
2025/1269 (PDF ) Linear Prover IOPs in Log Star Rounds Noor Athamnah, Noga Ron-Zewi, Ron D. Rothblum
2025/1268 (PDF ) What’s the Matter? An In-Depth Security Analysis of the Matter Protocol Sayon Duttagupta, Arman Kolozyan, Georgio Nicolas, Bart Preneel, Dave Singelee
2025/1267 (PDF ) SMOOTHIE: (Multi-)Scalar Multiplication Optimizations On TFHE Xander Pottier, Jan-Pieter D'Anvers, Thomas de Ruijter, Ingrid Verbauwhede
2025/1266 (PDF ) Efficiently parsing existing eID documents for zero-knowledge proofs Tom Godden, Ruben De Smet, Kris Steenhaut, An Braeken
2025/1265 (PDF ) A note on a recent attack against SPEEDY-7-192 Christina Boura, Patrick Derbez, Baptiste Germon, Rachelle Heim Boissier, María Naya-Plasencia
2025/1264 (PDF ) Copy Protecting Cryptographic Functionalities over Entropic Inputs Fuyuki Kitagawa, Takashi Yamakawa
2025/1263 (PDF ) OasisDB: An Oblivious and Scalable System for Relational Data Haseeb Ahmed, Nachiket Rao, Abdelkarim Kati, Florian Kerschbaum, Sujayya Maiyya
2025/1262 (PDF ) Vectorised Hashing Based on Bernstein-Rabin-Winograd Polynomials over Prime Order Fields Kaushik Nath, Palash Sarkar
2025/1261 (PDF ) FAEST for Memory-Constrained Devices with Side-Channel Protections Diego F. Aranha, Johan Degn, Jonathan Eilath, Kent Nielsen, Peter Scholl
2025/1260 (PDF ) Opossum Attack: Application Layer Desynchronization using Opportunistic TLS Robert Merget, Nurullah Erinola, Marcel Maehren, Lukas Knittel, Sven Hebrok, Marcus Brinkmann, Juraj Somorovsky, Jörg Schwenk
2025/1259 (PDF ) Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519 Marcel Nageler, Lorenz Schmid, Maria Eichlseder
2025/1258 (PDF ) Multi-Source Randomness Extraction and Generation in the Random-Oracle Model Sandro Coretti, Pooya Farshim, Patrick Harasser, Karl Southern
2025/1257 (PDF ) Non-Profiled Higher-Order Side-Channel Attacks against Lattice-Based Post-Quantum Cryptography Tolun Tosun, Elisabeth Oswald, Erkay Savaş
2025/1256 (PDF ) Lattice-based Multi-key Homomorphic Signatures Forward-unforgeable against Signing Key Leakage Ye Xu, Takashi Nishide
2025/1255 (PDF ) Efficient Full Domain Functional Bootstrapping from Recursive LUT Decomposition Intak Hwang, Shinwon Lee, Seonhong Min, Yongsoo Song
2025/1254 (PDF ) Batch Decryption without Epochs and its Application to Encrypted Mempools Dan Boneh, Evan Laufer, Ertem Nusret Tas
2025/1253 (PDF ) SoK: BitVM with Succinct On-Chain Cost Weikeng Chen
2025/1252 (PDF ) Tree PCPs Tamer Mour, Alon Rosen, Ron Rothblum
2025/1251 (PDF ) Black Box to Blueprint: Visualizing Leakage Propagation in Deep Learning Models for SCA Suvadeep Hajra, Debdeep Mukhopadhyay
2025/1250 (PDF ) The Weighted Sum Correlation Analysis Elena Dubrova, Sönke Jendral, Yanning Ji, Ruize Wang
2025/1249 (PDF ) An Automated Model to Search For Differential Meet-In-The-Middle Attack: Applications to AndRX Ciphers Debasmita Chakraborty, Soumya Sahoo, Phuong Hoa Nguyen, Santanu Sarkar
2025/1248 (PDF ) Beyond Side-Channels: Evaluating Inner Product Masking Against SIFA Wu Qianmei, Sayandeep Saha, Wei Cheng, Fan Zhang, Shivam Bhasin
2025/1247 (PDF ) Field-Tested Authentication for Quantum Key Distribution and DoS Attacks Antoine Gansel, Juliane Krämer, Tim Schumacher, Patrick Struck, Maximilian Tippmann, Thomas Walther
2025/1246 (PDF ) On Round-Optimal Computational VSS Karim Baghery, Navid Ghaedi Bardeh, Shahram Khazaei, Mahdi Rahimi
2025/1245 (PDF ) Integrating and Benchmarking KpqC in TLS/X.509 Minjoo Sim, Gyeongju Song, Minwoo Lee, Seyoung Yoon, Anubhab Baksi, Hwajeong Seo
2025/1244 (PDF ) A New Bijective Pairing Alternative for Encoding Natural Numbers Manideep Thotakura
2025/1243 (PDF ) Improved algorithms for ascending isogeny volcanoes, and applications Steven Galbraith, Valerie Gilchrist, Damien Robert
2025/1242 (PDF ) Note: Full-round distinguisher for Synergy Orr Dunkelman, Eran Lambooij, Gaëtan Leurent
2025/1241 (PDF ) Public Key Linting for ML-KEM and ML-DSA Evangelos Karatsiolis, Franziskus Kiefer, Juliane Krämer, Mirjam Loiero, Christian Tobias, Maximiliane Weishäupl
2025/1240 (PDF ) pracy: A Practical Compiler for Attribute-Based Encryption in Python Sven Argo, Marloes Venema, Adrian Ackermann, Tim Güneysu
2025/1239 (PDF ) Improved (Again) Key Pair Generation for Falcon, BAT and Hawk Thomas Pornin
2025/1238 (PDF ) Extended $c$-differential distinguishers of full $9$ and reduced-round Kuznyechik cipher, no pre-whitening Pantelimon Stanica, Ranit Dutta, Bimal Mandal
2025/1237 (PDF ) Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog Peter Gutmann, Stephan Neuhaus
2025/1236 (PDF ) Exploring Marginal Guesswork with the Theorem of Berry-Esséen Timo Glaser
2025/1235 (PDF ) HiAE Remains Secure in Its Intended Model: A Clarification of Claimed Attacks Han Chen, Tao Huang, Phuong Pham, Shuang Wu
2025/1234 (PDF ) LegoLog: A configurable transparency log Vivian Fang, Emma Dauterman, Akshay Ravoor, Akshit Dewan, Raluca Ada Popa
2025/1233 (PDF ) Improved Constant-Sized Polynomial Commitment Schemes Without Trusted Setup Shihui Fu
2025/1232 (PDF ) OMIX: Offline Mixing for Scalable Self-Tallying Elections Sébastien Canard, Liam Medley, Duy Nguyen, Duong Hieu Phan
2025/1231 (PDF ) Compressing steganographic payloads with LLM assistance Jaisal Ahmadullah
2025/1230 (PDF ) ABE Cubed: Advanced Benchmarking Extensions for ABE Squared Sven Argo, Marloes Venema, Doreen Riepel, Tim Güneysu, Diego F. Aranha
2025/1229 (PDF ) NTRU with Hints: Recovering NTRU Secret Keys from Partial Leakage Honglin Shao, Yuejun Liu, Mingyao Shao, Yongbin Zhou
2025/1228 (PDF ) Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication Christopher Battarbee, Christoph Striecks, Ludovic Perret, Sebastian Ramacher, Kevin Verhaeghe
2025/1227 (PDF ) Improved Key-recovery Attacks on ARADI Orr Dunkelman, Shibam Ghosh
2025/1226 (PDF ) Rational Censorship Attack: Breaking Blockchain with a Blackboard Michelle Yeo, Haoqian Zhang
2025/1225 (PDF ) Lattice EPID with Efficient Revocation Corentin Jeudy, Olivier Sanders
2025/1224 (PDF ) An Update to ``Polynomial Hashing over Prime Order Fields'' Kaushik Nath, Palash Sarkar
2025/1223 (PDF ) Efficient Pseudorandom Correlation Generators over $\mathbb{Z}/p^k\mathbb{Z}$ Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan
2025/1222 (PDF ) SoK: Reassessing Side-Channel Vulnerabilities and Countermeasures in PQC Implementations Patrik Dobias, Azade Rezaeezade, Łukasz Chmielewski, Lukas Malina, Lejla Batina
2025/1221 (PDF ) EWEMrl: A White-Box Secure Cipher with Longevity Avik Chakraborti, Shibam Ghosh, Takanori Isobe, Sajani Kundu
2025/1220 (PDF ) RoK and Roll – Verifier-Efficient Random Projection for $\tilde{O}(\lambda)$-size Lattice Arguments Michael Klooß, Russell W. F. Lai, Ngoc Khanh Nguyen, Michał Osadnik
2025/1219 (PDF ) Foundations of Single-Decryptor Encryption Fuyuki Kitagawa, Takashi Yamakawa
2025/1218 (PDF ) Revisiting Module Lattice-based Homomorphic Encryption and Application to Secure-MPC Anisha Mukherjee, Sujoy Sinha Roy
2025/1217 (PDF ) Cymric: Short-tailed but Mighty Alexandre Adomnicăi, Wonseok Choi, Yeongmin Lee, Kazuhiko Minematsu, Yusuke Naito
2025/1216 (PDF ) Ring-LWR based Commitments and ZK-PoKs with Application to Verifiable Quantum-Safe Searchable Symmetric Encryption Debadrita Talapatra, Nimish Mishra, Debdeep Mukhopadhyay
2025/1215 (PDF ) Highly Scalable Searchable Symmetric Encryption for Boolean Queries from NTRU Lattice Trapdoors Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay
2025/1214 (PDF ) Hobbit: Space-Efficient zkSNARK with Optimal Prover Time Christodoulos Pappas, Dimitrios Papadopoulos
2025/1213 (PDF ) Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model Yi-Fan Tseng, Yi-Jiin Lu, Tien-Lin Tsai, Zi-Yuan Liu
2025/1212 (PDF ) All Proof of Work But No Proof of Play Hayder Tirmazi
2025/1211 (PDF ) May the Force $\textit{not}$ Be with you: Brute-Force Resistant Biometric Authentication and Key Reconstruction Alexandra Boldyreva, Deep Inder Mohan, Tianxin Tang
2025/1210 (PDF ) A Generalized Approach to Root-based Attacks against PLWE Iván Blanco Chacón, Raúl Durán Díaz, Rodrigo Martín Sánchez-Ledesma
2025/1209 (PDF ) RingSG: Optimal Secure Vertex-Centric Computation for Collaborative Graph Processing Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu
2025/1208 (PDF ) End-to-End Encrypted Git Services Ya-Nan Li, Yaqing Song, Qiang Tang, Moti Yung
2025/1207 (PDF ) Copy-Protection from UPO, Revisited Prabhanjan Ananth, Amit Behera, Zikuan Huang
2025/1206 (PDF ) New Upper and Lower Bounds for Perfectly Secure MPC Ivan Damgård, Shravani Patil, Arpita Patra, Lawrence Roy
2025/1205 (PDF ) Generic Construction of Threshold Ring Signatures and Lattice-based Instantiations Hao Lin, Mingqiang Wang, Weiqiang Wen, Shi-Feng Sun, Kaitai Liang
2025/1204 (PDF ) A search to distinguish reduction for the isomorphism problem on direct sum lattices Daniël van Gent, Wessel van Woerden
2025/1203 (PDF ) Breaking The Authenticated Encryption scheme HiAE Xichao Hu, Lin Jiao, Dengguo Feng, Yonglin Hao, Senpeng Wang, Yongqiang Li, Xinxin Gong
2025/1202 (PDF ) t-Probing (In-)Security - Pitfalls on Noise Assumptions Dina Hesse, Jakob Feldtkeller, Tim Güneysu, Julius Hermelink, Georg Land, Markus Krausz, Jan Richter-Brockmann
2025/1201 (PDF ) BitBatSPIR: Efficient Batch Symmetric Private Information Retrieval from PSI Shuaishuai Li, Liqiang Peng, Weiran Liu, Cong Zhang, Zhen Gu, Dongdai Lin
2025/1200 (PDF ) Tricycle: Private Transformer Inference with Tricyclic Encodings Lawrence Lim, Vikas Kalagi, Divyakant Agrawal, Amr El Abbadi
2025/1199 (PDF ) HypSCA: A Hyperbolic Embedding Method for Enhanced Side-channel Attack Kaibin Li, Yihuai Liang, Zhengchun Zhou, Shui Yu
2025/1198 (PDF ) Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography Extensions Markku-Juhani O. Saarinen
2025/1197 (PDF ) How to Copy-Protect All Puncturable Functionalities Without Conjectures: A Unified Solution to Quantum Protection Alper Çakan, Vipul Goyal
2025/1196 (PDF ) Limits on the Power of Private Constrained PRFs Mengda Bi, Chenxin Dai, Yaohua Ma
2025/1195 (PDF ) On symbolic computations and Post Quantum Cryptography with Lie Geometries. Vasyl Ustimenko
2025/1194 (PDF ) Private coins extension with verifiable encryption Oleg Fomenko
2025/1193 (PDF ) Non-Homomorphic Key Blinding from Symmetric Primitives Thomas Bellebaum
2025/1192 (PDF ) PrivacyGo: Privacy-Preserving Ad Measurement with Multidimensional Intersection Jian Du, Haohao Qian, Shikun Zhang, Wen-jie Lu, Donghang Lu, Yongchuan Niu, Bo Jiang, Yongjun Zhao, Qiang Yan
2025/1191 (PDF ) A Polynomial Public-Key Cryptosystem Based on Jacobian-Preserving Composition Saimon Ahmed
2025/1190 (PDF ) Towards AI-driven Optimization of Robust Probing Model-compliant Masked Hardware Gadgets Using Evolutionary Algorithms David S. Koblah, Dev M. Mehta, Mohammad Hashemi, Fatemeh Ganji, Domenic Forte
2025/1189 (PDF ) Performance and Privacy: A Low-Latency Secure Anonymous Authentication Protocol with OPRF Wenjv Hu, Yanping Ye, Yin Li
2025/1188 (PDF ) Depth-Optimized Quantum Implementation of CHAM Kyungbae Jang, Yujin Oh, Hwajeong Seo
2025/1187 (PDF ) Ligerito: A Small and Concretely Fast Polynomial Commitment Scheme Andrija Novakovic, Guillermo Angeris
2025/1186 (PDF ) Unconditional Individual Verifiability with Receipt Freeness via Post-Cast Isolation Janis Erdmanis
2025/1185 (PDF ) From Worst-Case Hardness of $\mathsf{NP}$ to Quantum Cryptography via Quantum Indistinguishability Obfuscation Tomoyuki Morimae, Yuki Shirakawa, Takashi Yamakawa
2025/1184 (PDF ) zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference Wenjie Qu, Yijun Sun, Xuanming Liu, Tao Lu, Yanpei Guo, Kai Chen, Jiaheng Zhang
2025/1183 (PDF ) PA1 Security on Release of Unverified Plaintext in Encrypt-then-MAC AE Schemes Bart Mennink, Suprita Talnikar
2025/1182 (PDF ) Pseudorandom Correlation Generators for Multiparty Beaver Triples over $\mathbb{F}_2$ Peihan Miao, Alice Murphy, Akshayaram Srinivasan, Max Tromanhauser
2025/1181 (PDF ) UOV-Based Verifiable Timed Signature Scheme Erkan Uslu, Oğuz Yayla
2025/1180 (PDF ) Cryptanalysis of HiAE Alexander Bille, Elmar Tischhauser
2025/1179 (PDF ) A Tale of Two Worlds, a Formal Story of WireGuard Hybridization Pascal Lafourcade, Dhekra Mahmoud, Sylvain Ruhault, Abdul Rahman Taleb
2025/1177 (PDF ) HY-QSN: HYbrid Quantum Safe Networks Sayan Das, Aarav Varshney, Prasanna Ravi, Anupam Chattopadhyay
2025/1176 (PDF ) Solve Approximate CVP via Variants of Nearest-Colattice Wenwen Xia, Geng Wang, Dawu Gu
2025/1175 (PDF ) Simple VESS Victor Shoup
2025/1174 (PDF ) Efficient Constant-Size Linkable Ring Signatures for Ad-Hoc Rings via Pairing-Based Set Membership Arguments Min Xie, Zhengzhou Tu, Man Ho Au, Junbin Fang, Xuan Wang, Zoe Lin Jiang
2025/1173 (PDF ) The Effectiveness of Differential Privacy in Real-world Settings: A Metrics-based Framework to help Practitioners Visualise and Evaluate $\varepsilon$ Akasha Shafiq, Abhishek Kesarwani, Dimitrios Vasilopoulos, Paolo Palmieri
2025/1172 (PDF ) Guarding the Signal: Secure Messaging with Reverse Firewalls Yevgeniy Dodis, Bernardo Magri, Noah Stephens-Davidowitz, Yiannis Tselekounis
2025/1171 (PDF ) Beyond LWE: a Lattice Framework for Homomorphic Encryption Alberto Leporati, Lorenzo Rovida, Wessel van Woerden
2025/1170 (PDF ) Optimized Rank Sort for Encrypted Real Numbers Seunghu Kim, Eymen Ünay, Ayse Yilmazer-Metin, Hyung Tae Lee
2025/1169 (PDF ) Understanding Lasso: A Novel Lookup Argument Protocol Oleg Fomenko, Anton Levochko
2025/1168 (PDF ) On Frontrunning Risks in Batch-Order Fair Systems for Blockchains (Extended Version) Eunchan Park, Taeung Yoon, Hocheol Nam, Deepak Maram, Min Suk Kang
2025/1167 (PDF ) Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester Mizuki Hayashi, Keita Emura
2025/1166 (PDF ) Threshold Signatures Reloaded: ML-DSA and Enhanced Raccoon with Identifiable Aborts Giacomo Borin, Sofía Celi, Rafael del Pino, Thomas Espitau, Guilhem Niot, Thomas Prest
2025/1165 (PDF ) Automated Analysis and Synthesis of Message Authentication Codes Stefan Milius, Dominik Paulus, Dominique Schröder, Lutz Schröder, Julian Thomas
2025/1164 (PDF ) Man-in-the-Middle and Key Recovery Attacks against QP-KEM Nick Aquina, Simon Rommel, Idelfonso Tafur Monroy
2025/1163 (PDF ) Quorus: Efficient, Scalable Threshold ML-DSA Signatures from MPC Alexander Bienstock, Leo de Castro, Daniel Escudero, Antigoni Polychroniadou, Akira Takahashi
2025/1161 (PDF ) High-Performance FPGA Accelerator for the Post-quantum Signature Scheme CROSS Patrick Karl, Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Georg Sigl
2025/1160 (PDF ) Black-box Approaches to Authenticated Dictionaries: New Constructions and Lower Bounds Francesca Falzon, Harjasleen Malvai, Emanuel Opel
2025/1159 (PDF ) $\mathsf{DekartProof}$: Efficient Vector Range Proofs and Their Applications Dan Boneh, Trisha Datta, Rex Fernando, Kamilla Nazirkhanova, Alin Tomescu
2025/1158 (PDF ) Bridging Bitcoin to Second Layers via BitVM2 Robin Linus, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Andrea Pelosi, Orfeas Thyfronitis Litos, Christos Stefo, David Tse, Alexei Zamyatin
2025/1157 (PDF ) General Multi-Prime Multi-Power RSA - A Generalization of RSA and CRT-RSA to Regular Integers Modulo $n$ Klaus Dohmen, Mandy Lange-Geisler
2025/1156 (PDF ) An efficient construction of Raz's two-source randomness extractor with improved parameters Cameron Foreman, Lewis Wooltorton, Kevin Milner, Florian J. Curchod
2025/1155 (PDF ) On the Security of Group Ring Learning with Errors Andrew Mendelsohn, Charles Grover, Cong Ling
2025/1154 (PDF ) Evaluation of Modular Polynomials from Supersingular Elliptic Curves Maria Corte-Real Santos, Jonathan Komada Eriksen, Antonin Leroux, Michael Meyer, Lorenz Panny
2025/1153 (PDF ) Privacy-aware White and Black List Searching for Fraud Analysis William J Buchanan, Jamie Gilchrist, Zakwan Jaroucheh, Dmitri Timosenko, Nanik Ramchandani, Hisham Ali
2025/1152 (PDF ) ZK-ProVer: Proving Programming Verification in Non-Interactive Zero-Knowledge Proofs Haoyu Wei, Jingyu Ke, Ruibang Liu, Guoqiang Li
2025/1151 (PDF ) Faster signature verification with 3-dimensional decomposition Vojtech Suchanek, Marek Sys, Lukasz Chmielewski
2025/1150 (PDF ) Lightweight Sorting in Approximate Homomorphic Encryption Lorenzo Rovida, Alberto Leporati, Simone Basile
2025/1149 (PDF ) An Efficient Encryption Scheme Based on $(U+V, U+W)$ Codes Yang Yang, Fangguo Zhang
2025/1148 (PDF ) On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security Avik Chakraborti, Mridul Nandi, Suprita Talnikar, Kan Yasuda
2025/1147 (PDF ) Jigsaw: Doubly Private Smart Contracts Sanjam Garg, Aarushi Goel, Dimitris Kolonelos, Rohit Sinha
2025/1146 (PDF ) QV-net: Decentralized Self-Tallying Quadratic Voting with Maximal Ballot Secrecy Zibo Zhou, Zongyang Zhang, Feng Hao, Bowen Zheng, Zulkarnaim Masyhur
2025/1145 (PDF ) Dynamic Group Signatures with Verifier-Local Revocation Callum London, Daniel Gardham, Constantin Catalin Dragan
2025/1144 (PDF ) Parasol Compiler: Pushing the Boundaries of FHE Program Efficiency Rick Weber, Ryan Orendorff, Ghada Almashaqbeh, Ravital Solomon
2025/1143 (PDF ) Wedges, oil, and vinegar -- An analysis of UOV in the exterior algebra Lars Ran
2025/1142 (PDF ) OnionPIRv2: Efficient Single-Server PIR Yue Chen, Ling Ren
2025/1141 (PDF ) LZKSA: Lattice-Based Special Zero-Knowledge Proofs for Secure Aggregation's Input Verification Zhi Lu, Songfeng Lu
2025/1140 (PDF ) Unconditionally secure encryption algorithm with unified confidentiality and integrity Zhen-Hu Ning
2025/1139 (PDF ) From Permissioned to Proof-of-Stake Consensus Jovan Komatovic, Andrew Lewis-Pye, Joachim Neu, Tim Roughgarden, Ertem Nusret Tas
2025/1138 (PDF ) ZK-NR: A Layered Cryptographic Architecture for Explainable Non-Repudiation Thierry Emmanuel MINKA MI NGUIDJOI, MANI ONANA Flavien Serge, DJOTIO NDIÉ Thomas
2025/1137 (PDF ) Security Analysis on UOV Families with Odd Characteristics: Using Symmetric Algebra Yi Jin, Yuansheng Pan, Xiaoou He, Boru Gong, Jintai Ding
2025/1136 (PDF ) Learning Parity with Quantization: Achieving Full-Rate Encryption by Exploiting Quantization Noise in Code-Based Cryptography Shanxiang Lyu, Ling Liu, Cong Ling
2025/1135 (PDF ) Keep It Unsupervised: Horizontal Attacks Meet Simple Classifiers Sana Boussam, Ninon Calleja Albillos
2025/1134 (PDF ) Optimal Dimensionality Reduction using Conditional Variational AutoEncoder Sana Boussam, Mathieu Carbone, Benoît Gérard, Guénaël Renault, Gabriel Zaid
2025/1133 (PDF ) A Note on the Rank Defect Phenomena in The Linearization Attack on Elisabeth-4 Antoine Bak
2025/1132 (PDF ) Foundations of Multi-Designated Verifier Signature: Comprehensive Formalization and New Constructions in Subset Simulation Keitaro Hashimoto, Kyosuke Yamashita, Keisuke Hara
2025/1131 (PDF ) Empowering Privacy: A Zero Cost Protocol for Concealing LGBTQ Search Queries Akshit Aggarwal, Pulkit Bharti, Yang Li, Srinibas Swain
2025/1130 (PDF ) An Open-Source Framework for Efficient Side-Channel Analysis on Cryptographic Implementations Takuya Kojima, Masaki Morita, Hideki Takase, Hiroshi Nakamura
2025/1129 (PDF ) Lattice-based Obfuscation from NTRU and Equivocal LWE Valerio Cini, Russell W. F. Lai, Ivy K. Y. Woo
2025/1128 (PDF ) Solving LWE with Independent Hints about Secret and Errors Qian Lu, Yansong Feng, Yanbin Pan
2025/1127 (PDF ) KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2025/1126 (PDF ) Leakage-Resilient Extractors against Number-on-Forehead Protocols Eshan Chattopadhyay, Jesse Goodman
2025/1125 (PDF ) Reusable Designated Verifier NIZK from Lossy Trapdoor Functions Riddhi Ghosal, Ilan Komargodski, Brent Waters
2025/1124 (PDF ) Toxic Decoys: A Path to Scaling Privacy-Preserving Cryptocurrencies Christian Cachin, François-Xavier Wicht
2025/1123 (PDF ) Cryptographic Treatment of Key Control Security -- In Light of NIST SP 800-108 Ritam Bhaumik, Avijit Dutta, Akiko Inoue, Tetsu Iwata, Ashwin Jha, Kazuhiko Minematsu, Mridul Nandi, Yu Sasaki, Meltem Sönmez Turan, Stefano Tessaro
2025/1122 (PDF ) Mechanizing Nested Hybrid Arguments Markus Krabbe Larsen, Carsten Schürmann
2025/1121 (PDF ) 1-private n-party AND from 5 random bits Samuel Dittmer, Rafail Ostrovsky
2025/1120 (PDF ) Traceable Secret Sharing Schemes for General Access Structures Oriol Farràs, Miquel Guiot
2025/1119 (PDF ) Strong Secret Sharing with Snitching Jan Bormet, Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, Marcin Mielniczuk
2025/1118 (PDF ) Extracting Some Layers of Deep Neural Networks in the Hard-Label Setting Isaac A. Canales-Martínez, David Santos
2025/1117 (PDF ) Speeding Up Sum-Check Proving Suyash Bagad, Quang Dao, Yuval Domb, Justin Thaler
2025/1116 (PDF ) The Pipes Model for Latency and Throughput Analysis Andrew Lewis-Pye, Kartik Nayak, Nibesh Shrestha
2025/1115 (PDF ) High-Throughput Permissionless Blockchain Consensus under Realistic Network Assumptions Sandro Coretti, Matthias Fitzi, Aggelos Kiayias, Giorgos Panagiotakos, Alexander Russell
2025/1114 (PDF ) VCR: Fast Private Set Intersection with Improved VOLE and CRT-Batching Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu
2025/1113 (PDF ) Computational Attestations of Polynomial Integrity Towards Verifiable Back-Propagation Dustin Ray, Caroline El Jazmi
2025/1112 (PDF ) Hydrangea: Optimistic Two-Round Partial Synchrony with Improved Fault Resilience Nibesh Shrestha, Aniket Kate, Kartik Nayak
2025/1111 (PDF ) SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference Hao Guo, Zhaoqian Liu, Ximing Fu, Zhusen Liu
2025/1110 (PDF ) A Framework for Compiling Custom Languages as Efficiently Verifiable Virtual Machines Assimakis A. Kattis, Brian Klatt, Philip Quirk, Logan Allen
2025/1109 (PDF ) Kahrobaei--Koupparis DSS: universal forgery Alexander Ushakov
2025/1108 (PDF ) Laconic PSI on Authenticated Inputs and Applications James Bartusek, Sanjam Garg, Abhishek Jain, Guru-Vamsi Policharla
2025/1107 (PDF ) Early Stopping is Cheap Fatima Elsheimy, Simon Holmgaard Kamp, Julian Loss
2025/1106 (PDF ) b4M: Holistic Benchmarking for MPC Karl W. Koch, Dragos Rotaru, Christian Rechberger
2025/1105 (PDF ) Low-cost anonymous reputation update for IoT applications Alex Shafarenko
2025/1104 (PDF ) Better GBFV Bootstrapping and Faster Encrypted Edit Distance Computation Robin Geelen, Frederik Vercauteren
2025/1103 (PDF ) Universally Composable Succinct Vector Commitments and Applications Ran Canetti, Megan Chen
2025/1102 (PDF ) TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System Sajin Sasy, Aaron Johnson, Ian Goldberg
2025/1101 (PDF ) A Note on One Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue Zhengjun Cao, Lihua Liu
2025/1100 (PDF ) Tanuki: New Frameworks for (Concurrently Secure) Blind Signatures from Post-Quantum Groups Actions Lucjan Hanzlik, Yi-Fu Lai, Marzio Mula, Eugenio Paracucchi, Daniel Slamanig, Gang Tang
2025/1099 (PDF ) Lattice-Based Accumulator and Application to Anonymous Credential Revocation Victor Youdom Kemmoe, Anna Lysyanskaya, Ngoc Khanh Nguyen
2025/1098 (PDF ) Efficient post-quantum commutative group actions from orientations of large discriminant Marc Houben
2025/1097 (PDF ) Oracle-Based Multistep Strategy for Solving Polynomial Systems Over Finite Fields and Algebraic Cryptanalysis of the Aradi Cipher Roberto La Scala, Sharwan K. Tiwari
2025/1096 (PDF ) CuFDFB: Fast and Private Computation on Non-Linear Functions Using FHE Shutong Jin, Shiyu Shen, Hao Yang, Donglong Chen, Wangchen Dai, Ray C. C. Cheung
2025/1095 (PDF ) Ideally HAWKward: How Not to Break Module-LIP Clémence Chevignard, Guilhem Mureau
2025/1094 (PDF ) Key-Updatable Identity-Based Signature Schemes Tobias Guggemos, Farzin Renan
2025/1093 (PDF ) On the Concrete Security of BBS/BBS+ Signatures Rutchathon Chairattana-Apirom, Stefano Tessaro
2025/1092 (PDF ) OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries Pratap Singh, Joshua Gancher, Bryan Parno
2025/1091 (PDF ) Quantum Computing without the Linear Algebra Aws Albarghouthi
2025/1090 (PDF ) Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures Shuichi Katsumata, Guilhem Niot, Ida Tucker, Thom Wiggers
2025/1089 (PDF ) Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security Nilanjan Datta, Jean Paul Degabriele, Avijit Dutta, Vukašin Karadžić, Hrithik Nandi
2025/1088 (PDF ) Homomorphic Field Trace Revisited : Breaking the Cubic Noise Barrier Kang Hoon Lee, Ji Won Yoon
2025/1087 (PDF ) Cryptography meets worst-case complexity: Optimal security and more from iO and worst-case assumptions Rahul Ilango, Alex Lombardi
2025/1086 (PDF ) Fairness in the Wild: Secure Atomic Swap with External Incentives Hao Chung, Elisaweta Masserova, Elaine Shi, Sri AravindaKrishnan Thyagarajan
2025/1085 (PDF ) SmallWood: Hash-Based Polynomial Commitments and Zero-Knowledge Arguments for Relatively Small Instances Thibauld Feneuil, Matthieu Rivain
2025/1084 (PDF ) Combining Oblivious Pseudorandom Functions Sebastian Faller, Marc Fischlin, Julius Hardt, Julia Hesse
2025/1083 (PDF ) The complexity of the SupportMinors Modeling for the MinRank Problem Giulia Gaggero, Elisa Gorla, Daniel Cabarcas
2025/1082 (PDF ) Treebeard: A Scalable and Fault Tolerant ORAM Datastore Amin Setayesh, Cheran Mahalingam, Emily Chen, Sujaya Maiyya
2025/1081 (PDF ) FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC Zhengyuan Su, Qi Pang, Simon Beyzerov, Wenting Zheng
2025/1080 (PDF ) Leftover Hash Lemma(s) Over Cyclotomic Rings Katharina Boudgoust, Oleksandra Lapiha
2025/1079 (PDF ) Revisiting Discrete Logarithm Reductions Maiara F. Bollauf, Roberto Parisella, Janno Siim
2025/1078 (PDF ) A Theoretical Perspective on the Formal Verification of IoT Protocols Using LTL and Rewriting Logic in Maude Delia-Iustina Grigoriță
2025/1077 (PDF ) Shorter VOLE-in-the-Head-based Signatures from Vector Semi-Commitment Seongkwang Kim, Byeonghak Lee, Mincheol Son
2025/1076 (PDF ) Weight reduction in distributed protocols: new algorithms and analysis Anatoliy Zinovyev
2025/1075 (PDF ) Secure and Practical Cold (and Hot) Staking Mario Larangeira
2025/1074 (PDF ) Multiparty Distributed Point Functions Aarushi Goel, Mingyuan Wang, Zhiheng Wang
2025/1073 (PDF ) LAPWN: A Lightweight User–Server Authentication Protocol for Wireless Networks Sajjad Alizadeh, Reza Hooshmand
2025/1072 (PDF ) How to Model Unitary Oracles Mark Zhandry
2025/1071 (PDF ) PICS: Private Intersection over Committed (and reusable) Sets Aarushi Goel, Peihan Miao, Phuoc Van Long Pham, Satvinder Singh
2025/1070 (PDF ) Zeus: Defending against Fee Stealing and Griefing Attacks in Multi-Hop Payments Jingyu Liu, Yingjie Xue, Di Wu, Jian Liu, Xuechao Wang
2025/1069 (PDF ) PRESENT Full Round Emulation : Structural Flaws and Predictable Outputs Gopal Singh
2025/1068 (PDF ) Efficient Modular Multiplication Using Vector Instructions on Commodity Hardware Simon Langowski, Srini Devadas
2025/1067 (PDF ) Full Anonymity in the Asynchronous Setting from Peony Onion Encryption Megumi Ando, Miranda Christ, Kashvi Gupta, Tal Malkin, Dane Smith
2025/1066 (PDF ) A New PUF-Based Authenticated Key Establishment Protocol for V2G Networks Milad Seddigh, Seyed Hamid Baghestani, Mahdi Esfahani
2025/1065 (PDF ) High-Order and Cortex-M4 First-Order Implementations of Masked FrodoKEM François Gérard, Morgane Guerreau
2025/1064 (PDF ) Achieving Blockchain-Secured Cryptographic Primitives from Signature-Based Witness Encryption Lev Stambler
2025/1063 (PDF ) MIZAR: Boosting Secure Three-Party Deep Learning with Co-Designed Sign-Bit Extraction and GPU Acceleration Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Tianwei Zhang, Jin-Song Dong
2025/1062 (PDF ) TrafficProof: Privacy-Preserving Reliable Traffic Information Sharing in Social Internet of Vehicles Stefan Dziembowski, Shahriar Ebrahimi, Parisa Hassanizadeh, Susil Kumar Mohanty
2025/1061 (PDF ) On the Adaptive Security of FROST Elizabeth Crites, Jonathan Katz, Chelsea Komlo, Stefano Tessaro, Chenzhi Zhu
2025/1060 (PDF ) Uniform Black-Box Separations via Non-Malleable Extractors Marshall Ball, Dana Dachman-Soled
2025/1059 (PDF ) Post-Quantum Security of Keyed Sponge-Based Constructions through a Modular Approach Akinori Hosoyamada
2025/1058 (PDF ) Adaptive TDF from any TDF via Pseudorandom Ciphertext PKE Fuyuki Kitagawa, Takahiro Matsuda
2025/1057 (PDF ) Efficient Mixed-Mode Oblivious RAMs Wenhao Zhang, Xiao Wang, Chenkai Weng
2025/1056 (PDF ) Private Signaling Secure Against Actively Corrupted Servers Haotian Chu, Xiao Wang, Yanxue Jia
2025/1055 (PDF ) Single-server Stateful PIR with Verifiability and Balanced Efficiency Pranav Shriram Arunachalaramanan, Ling Ren
2025/1054 (PDF ) Rewardable Naysayer Proofs Gennaro Avitabile, Luisa Siniscalchi, Ivan Visconti
2025/1053 (PDF ) Breaking the 1/λ-Rate Barrier for Arithmetic Garbling Geoffroy Couteau, Carmit Hazay, Aditya Hegde, Naman Kumar
2025/1052 (PDF ) How to Trace Viral Content in End-to-End Encrypted Messaging Pedro Branco, Matthew Green, Aditya Hegde, Abhishek Jain, Gabriel Kaptchuk
2025/1051 (PDF ) Synergy: A Lightweight Block Cipher with Variable Bit Rotation Feistel Network Anders Lindman
2025/1050 (PDF ) Integral Resistance of Block Ciphers with Key Whitening by Modular Addition Christof Beierle, Phil Hebborn, Gregor Leander, Yevhen Perehuda
2025/1049 (PDF ) XHMQV: Better Efficiency and Stronger Security for Signal’s Initial Handshake based on HMQV Rune Fiedler, Felix Günther, Jiaxin Pan, Runzhi Zeng
2025/1048 (PDF ) One-way multilinear functions of the second order with linear shifts Stanislav Semenov
2025/1047 (PDF ) Orient Express: Using Frobenius to Express Oriented Isogenies Wouter Castryck, Riccardo Invernizzi, Gioella Lorenzon, Jonas Meers, Frederik Vercauteren
2025/1046 (PDF ) A Quasi-polynomial Time Algorithm for the Extrapolated Dihedral Coset Problem over Power-of-Two Moduli Shi Bai, Hansraj Jangir, Elena Kirshanova, Tran Ngo, William Youmans
2025/1045 (PDF ) Constrained Verifiable Random Functions Without Obfuscation and Friends Nicholas Brandt, Miguel Cueto Noval, Christoph U. Günther, Akin Ünal, Stella Wohnig
2025/1044 (PDF ) When Threshold Meets Anamorphic Signatures: What is Possible and What is Not! Hien Chu, Khue Do, Lucjan Hanzlik, Sri AravindaKrishnan Thyagarajan
2025/1043 (PDF ) Designing QC-MDPC Public Key Encryption Schemes with Niederreiter's Construction and a Bit Flipping Decoder with Bounded DFR Alessandro Annechini, Alessandro Barenghi, Gerardo Pelosi, Simone Perriello
2025/1042 (PDF ) Crowhammer: Full Key Recovery Attack on Falcon with a Single Rowhammer Bit Flip Calvin Abou Haidar, Quentin Payet, Mehdi Tibouchi
2025/1041 (PDF ) Rubato: Provably Post-Quantum Secure and Batched Asynchronous Randomness Beacon Linghe Yang, Tonghong Chong, Jian Liu, Jingyi Cui, Guangquan Xu, Yude Bai, Lei Zhang, Tao Luo
2025/1040 (PDF ) Weave: Efficient and Expressive Oblivious Analytics at Scale Mahdi Soleimani, Grace Jia, Anurag Khandelwal
2025/1039 (PDF ) Unbounded Distributed Broadcast Encryption and Registered ABE from Succinct LWE Hoeteck Wee, David J. Wu
2025/1038 (PDF ) Security of Operations on Random Numbers: A Review Tejas Sharma, Ashish Kundu
2025/1037 (PDF ) Committed Vector Oblivious Linear Evaluation and Its Applications Yunqing Sun, Hanlin Liu, Kang Yang, Yu Yu, Xiao Wang, Chenkai Weng
2025/1036 (PDF ) A Critique on Average-Case Noise Analysis in RLWE-Based Homomorphic Encryption Mingyu Gao, Hongren Zheng
2025/1035 (PDF ) Continuous Group-Key Agreement: Concurrent Updates without Pruning Benedikt Auerbach, Miguel Cueto Noval, Boran Erol, Krzysztof Pietrzak
2025/1034 (PDF ) JANUS: Enhancing Asynchronous Common Subset with Trusted Hardware Liangrong Zhao, Hans Schmiedel, Qin Wang, Jiangshan Yu
2025/1033 (PDF ) Trusted Hardware-Assisted Leaderless Byzantine Fault Tolerance Consensus Liangrong Zhao, Jérémie Decouchant, Joseph K. Liu, Qinghua Lu, Jiangshan Yu
2025/1032 (PDF ) Constant-Round Asynchronous MPC with Optimal Resilience and Linear Communication Junru Li, Yifan Song
2025/1031 (PDF ) Quasidifferential Saves Infeasible Differential: Improved Weak-Key Key-Recovery Attacks on Round-Reduced GIFT Chengcheng Chang, Meiqin Wang, Wei Wang, Kai Hu
2025/1030 (PDF ) Everlasting Anonymous Rate-Limited Tokens Rutchathon Chairattana-Apirom, Nico Döttling, Anna Lysyanskaya, Stefano Tessaro
2025/1029 (PDF ) Improved Key Recovery Attacks of Ascon Shuo Peng, Kai Hu, Jiahui He, Meiqin Wang
2025/1028 (PDF ) Group Key Progression: Strong Security for Shared Persistent Data Matilda Backendal, David Balbás, Miro Haller
2025/1027 (PDF ) Parallel Repetition for Post-Quantum Arguments Andrew Huang, Yael Tauman Kalai
2025/1026 (PDF ) Malicious Security in Collaborative zk-SNARKs: More than Meets the Eye Sanjam Garg, Aarushi Goel, Abhishek Jain, Bhaskar Roberts, Sruthi Sekar
2025/1025 (PDF ) Secure Noise Sampling for Differentially Private Collaborative Learning Olive Franzese, Congyu Fang, Radhika Garg, Somesh Jha, Nicolas Papernot, Xiao Wang, Adam Dziedzic
2025/1024 (PDF ) Towards Trustless Provenance: A Privacy-Preserving Framework for On-chain Media Verification Piotr Mikołajczyk, Parisa Hassanizadeh, Shahriar Ebrahimi
2025/1023 (PDF ) Universal Channel Rebalancing: Flexible Coin Shifting in Payment Channel Networks Stefan Dziembowski, Shahriar Ebrahimi, Omkar Gavhane, Susil Kumar Mohanty
2025/1022 (PDF ) Burn Your Vote: Decentralized and Publicly Verifiable Anonymous Voting at Scale Shahriar Ebrahimi, Haniyeh Habibi, Parisa Hassanizadeh, Pardis Toolabi, Vincenzo Botta, Stefan Dziembowski
2025/1021 (PDF ) Black-Box Crypto is Useless for Pseudorandom Codes Sanjam Garg, Sam Gunn, Mingyuan Wang
2025/1020 (PDF ) Separating Pseudorandom Codes from Local Oracles Nico Döttling, Anne Müller, Mahesh Sreekumar Rajasree
2025/1019 (PDF ) Silent Splitter: Privacy for Payment Splitting via New Protocols for Distributed Point Functions Margaret Pierce, Saba Eskandarian
2025/1018 (PDF ) MT-TMVP: Modular Tiled TMVP-based Polynomial Multiplication for Post-Quantum Cryptography on FPGAs Shekoufeh Neisarian, Elif Bilge Kavun
2025/1017 (PDF ) Using the Schur Product to Solve the Code Equivalence Problem Michele Battagliola, Rocco Mora, Paolo Santini
2025/1016 (PDF ) Leader Election with Poly-logarithmic Communication Per Party Amey Bhangale, Chen-Da Liu-Zhang, Julian Loss, Kartik Nayak, Sravya Yandamuri
2025/1015 (PDF ) Zero-Knowledge Polynomial Commitment in Binary Fields Benjamin E. Diamond
2025/1014 (PDF ) How to Make Any Computational Secret Sharing Scheme Adaptively Secure George Lu, Brent Waters
2025/1013 (PDF ) Silentium: Implementation of a Pseudorandom Correlation Generator for Beaver Triples Vincent Rieder
2025/1012 (PDF ) Nearly Optimal Parallel Broadcast in the Plain Public Key Model Ran Gelles, Christoph Lenzen, Julian Loss, Sravya Yandamuri
2025/1011 (PDF ) Adaptive TDFs from Injective TDFs Xinyu Mao, Hongxu Yi
2025/1010 (PDF ) UPKE and UKEM Schemes from Supersingular Isogenies Pratima Jana, Ratna Dutta
2025/1009 (PDF ) Adaptively Secure Three-Round Threshold Schnorr Signatures from DDH Renas Bacho, Sourav Das, Julian Loss, Ling Ren
2025/1008 (PDF ) Reviving a Grover based Quantum Secret Sharing Scheme Debajyoti Bera, Santanu Majhi
2025/1007 (PDF ) Scalable Multiparty Computation from Non-linear Secret Sharing Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Mingyuan Wang
2025/1006 (PDF ) Permutation-Based Hash from Non-Idealized Assumptions: Adding Feed-Forward to Sponge Chun Guo, Kai Hu, Shuntian Jiang, Yanhong Fan, Yong Fu, Bart Preneel, Meiqin Wang
2025/1005 (PDF ) TEAKEX: TESLA-Authenticated Group Key Exchange Qinyi Li, Lise Millerjord, Colin Boyd
2025/1004 (PDF ) On Factoring and Power Divisor Problems via Rank-3 Lattices and the Second Vector Yiming Gao, Yansong Feng, Honggang Hu, Yanbin Pan
2025/1003 (PDF ) Low-Latency Dynamically Available Total Order Broadcast Sravya Yandamuri, Nibesh Shrestha, Luca Zanolini, Kartik Nayak
2025/1002 (PDF ) Cool + Cruel = Dual, and New Benchmarks for Sparse LWE Alexander Karenin, Elena Kirshanova, Julian Nowakowski, Eamonn W. Postlethwaite, Ludo N. Pulles, Fernando Virdia, Paul Vié
2025/1001 (PDF ) A Plausible Attack on the Adaptive Security of Threshold Schnorr Signatures Elizabeth Crites, Alistair Stewart
2025/1000 (PDF ) mmCipher: Batching Post-Quantum Public Key Encryption Made Bandwidth-Optimal Hongxiao Wang, Ron Steinfeld, Markku-Juhani O. Saarinen, Muhammed F. Esgin, Siu-Ming Yiu
2025/999 (PDF ) Insecurity of One Ring Signature Scheme with Batch Verification for Applications in VANETs Zhengjun Cao, Lihua Liu
2025/998 (PDF ) On the UC-(In)Security of PAKE Protocols Without the Random Oracle Model Naman Kumar, Jiayu Xu
2025/997 (PDF ) Kerblam — Anonymous Messaging System Protecting Both Senders and Recipients Yanxue Jia, Debajyoti Das, Wenhao Zhang, Aniket Kate
2025/996 (PDF ) Distance-Aware OT with Application to Fuzzy PSI Lucas Piske, Jaspal Singh, Ni Trieu, Vladimir Kolesnikov, Vassilis Zikas
2025/995 (PDF ) NIZK Amplification via Leakage-Resilient Secure Computation Benny Applebaum, Eliran Kachlon
2025/994 (PDF ) A Fast Multiplication Algorithm and RLWE-PLWE Equivalence for the Maximal Real Subfield of the $2^r p^s$-th Cyclotomic Field Wilmar Bolaños, Antti Haavikko, Rodrigo M. Sánchez-Ledesma
2025/993 (PDF ) Fully-Homomorphic Encryption from Lattice Isomorphism Pedro Branco, Giulio Malavolta, Zayd Maradni
2025/992 (PDF ) Improved Private Simultaneous Messages Protocols for Symmetric Functions with Universal Reconstruction Koji Nuida
2025/991 (PDF ) MOAI: Module-Optimizing Architecture for Non-Interactive Secure Transformer Inference Linru Zhang, Xiangning Wang, Jun Jie Sim, Zhicong Huang, Jiahao Zhong, Huaxiong Wang, Pu Duan, Kwok Yan Lam
2025/990 (PDF ) Lower Bounds on the Bottleneck Complexity of Secure Multiparty Computation Reo Eriguchi, Keitaro Hiwatashi
2025/989 (PDF ) List Decoding in Private Information Retrieval: Formal Definition and Efficient Constructions Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2025/988 (PDF ) Dynamic Security: A Realistic Approach to Adaptive Security With Applications to Strong FaF Security Bar Alon, Naty Peter
2025/987 (PDF ) Security of Linear Secret Sharing Schemes with Noisy Side-Channel Leakage Utkarsh Gupta, Hessam Mahdavifar
2025/986 (PDF ) The Rényi Smoothing Parameter and Its Applications in Lattice-Based Cryptography Cong Ling, Laura Luzzi, Hao Yan
2025/985 (PDF ) Tighter Quantum Security for Fiat-Shamir-with-Aborts and Hash-and-Sign-with-Retry Signatures Pouria Fallahpour, Serge Fehr, Yu-Hsuan Huang
2025/984 (PDF ) AsconAEAD128 Revisited in the Multi-user Setting Bishwajit Chakraborty, Mridul Nandi, Soumit Pal, Thomas Peyrin, Quan Quan Tan
2025/983 (PDF ) LP2+: a robust symmetric-key AKE protocol with perfect forward secrecy, and an advocacy for thorough security proofs Pierre-Alain Jacqmin, Jean Liénardy
2025/982 (PDF ) Simulatability versus Indistinguishability SOA: CCA Relations are Sampler-Dependent Hans Heum
2025/981 (PDF ) Algebraic Cryptanalysis of AO Primitives Based on Polynomial Decomposition Applications to Rain and Full AIM-IIIIV Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang
2025/980 (PDF ) Formal Security and Functional Verification of Cryptographic Protocol Implementations in Rust Karthikeyan Bhargavan, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters
2025/979 (PDF ) Collision Attacks on Reduced RIPEMD-128 Zhengrong Lu, Hongbo Yu, Xiaoen Lin, Sitong Yuan
2025/978 (PDF ) Multi-Party Distributed Point Functions with Polylogarithmic Key Size from Invariants of Matrices Toomas Krips, Pille Pullonen-Raudvere
2025/977 (PDF ) A Novel Leakage Model in OpenSSL’s Miller-Rabin Primality Test Xiaolin Duan, Fan Huang, Yaqi Wang, Honggang Hu
2025/976 (PDF ) The Large Block Cipher Family Vistrutah Roberto Avanzi, Avik Chakraborthi, Bishwajit Chakraborty, Eik List
2025/975 (PDF ) Incompressible Encryption with Everlasting Security Eylon Yogev, Shany Ben-David
2025/974 (PDF ) OptAttest: Verifying Multi-List Multi-Hop History via a Hybrid Zero-Knowledge Architecture Joshua G. Stern
2025/973 (PDF ) On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions Balthazar Bauer, Georg Fuchsbauer, Fabian Regen
2025/972 (PDF ) Generalized BGV, BFV, and CKKS for Homomorphic Encryption over Matrix Rings Bence Mali
2025/971 (PDF ) Sabot: Efficient and Strongly Anonymous Bootstrapping of Communication Channels Christoph Coijanovic, Laura Hetz, Kenneth G. Paterson, Thorsten Strufe
2025/970 (PDF ) How to Verify that a Small Device is Quantum, Unconditionally Giulio Malavolta, Tamer Mour
2025/969 (PDF ) Decentralized Data Archival: New Definitions and Constructions Elaine Shi, Rose Silver, Changrui Mu
2025/968 (PDF ) Learning with Alternating Moduli, Arora-Ge over Composite Moduli, and Weak PRFs Yilei Chen, Liheng Ji, Wenjie Li
2025/967 (PDF ) Registered Functional Encryption for Pseudorandom Functionalities from Lattices: Registered ABE for Unbounded Depth Circuits and Turing Machines, and More Tapas Pal, Robert Schädlich, Erkan Tairi
2025/966 (PDF ) Multiparty Homomorphic Secret Sharing and More from LPN and MQ Geoffroy Couteau, Naman Kumar, Xiaxi Ye
2025/965 (PDF ) An Efficient Framework for Collusion Resistant Multiparty FHE Robin Jadoul, Barry van Leeuwen, Oliver Zajonc
2025/964 (PDF ) TOOP: A transfer of ownership protocol over Bitcoin Ariel Futoransky, Fadi Barbara, Ramses Fernandez, Gabriel Larotonda, Sergio Demian Lerner
2025/963 (PDF ) Permutation-Based Hashing With Stronger (Second) Preimage Resistance Siwei Sun, Shun Li, Zhiyu Zhang, Charlotte Lefevre, Bart Mennink, Zhen Qin, Dengguo Feng
2025/961 (PDF ) Addendum to How Small Can S-boxes Be? Yu Sun, Lixuan Wu, Chenhao Jia, Tingting Cui, Kai Hu, Meiqin Wang
2025/960 (PDF ) A Framework for Advanced Signature Notions Patrick Struck, Maximiliane Weishäupl
2025/958 (PDF ) Efficient Pairings Final Exponentiation Using Cyclotomic Cubing for Odd Embedding Degrees Curves Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, Leila Ben Abdelghani
2025/957 (PDF ) Laurent Polynomial-Based Linear Transformations for Improved Functional Bootstrapping San Ling, Benjamin Hong Meng Tan, Huaxiong Wang, Allen Siwei Yang
2025/956 (PDF ) LEAF: A Low-Latency Evaluation Architecture for Feedforward Block in Privacy-Preserving Transformer Inference Linru Zhang, Xiangning Wang, Xianhui Lu, Huaxiong Wang, Kwok Yan Lam
2025/955 (PDF ) Towards Better Integral Distinguishers over $\mathbb{F}_{p}$ Based on Exact Coefficients of Monomials Muzhou Li, Jiamin Cui, Longzheng Cui, Kai Hu, Chao Niu, Meiqin Wang
2025/954 (PDF ) Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails Lorenzo Grassi, Katharina Koschatko, Christian Rechberger
2025/953 (PDF ) Tight Multi-User Security of CCM and Enhancement by Tag-Based Key Derivation Applied to GCM and CCM Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2025/952 (PDF ) A Provably Secure, MQ-Based W-OTS$^{+}$ Zijun Zhuang, Yingjie Zhang, Jintai Ding
2025/951 (PDF ) Enhancing Provable Security and Efficiency of Permutation-based DRBGs Woohyuk Chung, Seongha Hwang, Hwigyeom Kim, Jooyoung Lee
2025/950 (PDF ) Breaking Poseidon Challenges with Graeffe Transforms and Complexity Analysis by FFT Lower Bounds Ziyu Zhao, Jintai Ding
2025/949 (PDF ) Almost-Total Puzzles and Their Applications Xiao Liang, Omkant Pandey, Yuhao Tang, Takashi Yamakawa
2025/948 (PDF ) Resolving the Efficiency-Utility Dilemma of Threshold Linearly Homomorphic Encryption via Message-Space Adapter Yijia Chang, Rongmao Chen, Chao Lin, Songze Li, Xinyi Huang
2025/947 (PDF ) Quantum Rewinding for IOP-Based Succinct Arguments Alessandro Chiesa, Marcel Dall'Agnol, Zijing Di, Ziyi Guan, Nicholas Spooner
2025/946 (PDF ) Logup*: faster, cheaper logup argument for small-table indexed lookups Lev Soukhanov
2025/945 (PDF ) Quantum Security Analysis of the Key-Alternating Ciphers Chen Bai, Mehdi Esmaili, Atul Mantri
2025/944 (PDF ) Succinct Witness Encryption for Batch Languages and Applications Lalita Devadas, Abhishek Jain, Brent Waters, David J. Wu
2025/943 (PDF ) On the Adaptive Security of Key-Unique Threshold Signatures Michele Ciampi, Elizabeth Crites, Chelsea Komlo, Mary Maller
2025/942 (PDF ) On the (in)security of Proofs-of-Space based Longest-Chain Blockchains Mirza Ahad Baig, Krzysztof Pietrzak
2025/941 (PDF ) Proof of Exponentiation: Enhanced Prover Efficiency for Algebraic Statements Zhuo Wu, Shi Qi, Xinxuan Zhang, Yi Deng, Kun Lai, Hailong Wang
2025/940 (PDF ) Special Genera of Hermitian Lattices and Applications to HAWK Guilhem Mureau
2025/939 (PDF ) On the security of one certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks Zhengjun Cao, Lihua Liu
2025/938 (PDF ) PSYLOCKE: Provably Secure Logic Locking with Practical Efficiency Yohei Watanabe, Kyoichi Asano, Haruka Hirata, Tomoki Ono, Mingyu Yang, Mitsugu Iwamoto, Yang Li, Yuko Hara
2025/937 (PDF ) Attacking Poseidon via Graeffe-Based Root-Finding over NTT-Friendly Fields Antonio Sanso, Giuseppe Vitto
2025/936 (PDF ) Justvengers: Batched VOLE ZK Disjunctions in $\mathcal{O}(R{+}B{+}C)$ Communication Yibin Yang
2025/935 (PDF ) Side-channel safe conditional moves and swaps David Santos, Michael Scott
2025/934 (PDF ) Diving Deep Into UC: Uncovering and Resolving Issues in Universal Composability Céline Chevalier, Éric Sageloli
2025/933 (PDF ) Fast elliptic curve scalar multiplications in SN(T)ARK circuits Liam Eagen, Youssef El Housni, Simon Masson, Thomas Piellard
2025/932 (PDF ) Integral cryptanalysis in characteristic $p$ Tim Beyne, Michiel Verbauwhede
2025/931 (PDF ) Multivalued Broadcast with Optimal Length Gabriel Dettling, Martin Hirt, Chen-Da Liu-Zhang
2025/930 (PDF ) SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation Henri Dohmen, Robin Hundt, Nora Khayata, Thomas Schneider
2025/929 (PDF ) The DROP Protocol: Dispute Resolution via Observation in Public for Verifiable, In-Person Voting Josh Benaloh, Michael Naehrig, Olivier Pereira
2025/928 (PDF ) HAWK: Having Automorphisms Weakens Key Daniël M. H. van Gent, Ludo N. Pulles
2025/927 (PDF ) Enhancing Meme Token Market Transparency: A Multi-Dimensional Entity-Linked Address Analysis for Liquidity Risk Evaluation Qiangqiang Liu, Qian Huang, Frank Fan, Haishan Wu, Xueyan Tang
2025/926 (PDF ) Polocolo: A ZK-Friendly Hash Function Based on S-boxes Using Power Residues (Full Version) Jincheol Ha, Seongha Hwang, Jooyoung Lee, Seungmin Park, Mincheol Son
2025/925 (PDF ) SCMAC and LOL2.0: An AEAD Design Framework and A New Version of LOL Stream Cipher Design Framework Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian
2025/924 (PDF ) Card-Based Protocol Counting Connected Components of Graphs Koji Nuida
2025/923 (PDF ) SPECK: Signatures from Permutation Equivalence of Codes and Kernels Marco Baldi, Michele Battagliola, Rahmi El Mechri, Paolo Santini, Riccardo Schiavoni, Davide De Zuane
2025/921 (PDF ) Zero-knowledge Authenticator for Blockchain: Policy-private and Obliviously Updateable Kostas Kryptos Chalkias, Deepak Maram, Arnab Roy, Joy Wang, Aayush Yadav
2025/920 (PDF ) SQIsign2D$^2$: New SQIsign2D Variant by Leveraging Power Smooth Isogenies in Dimension One Zheng Xu, Kaizhan Lin, Chang-An Zhao, Yi Ouyang
2025/919 (PDF ) Rep3 Reloaded: On the Cost of Function-Dependent Preprocessing in Semi-Honest 3PC with Honest Majority Marcel Keller
2025/918 (PDF ) The Accidental Computer: Polynomial Commitments from Data Availability Alex Evans, Guillermo Angeris
2025/917 (PDF ) Jagged Polynomial Commitments (or: How to Stack Multilinears) Tamir Hemo, Kevin Jue, Eugene Rabinovich, Gyumin Roh, Ron D. Rothblum
2025/916 (PDF ) Automated Verification of Consistency in Zero-Knowledge Proof Circuits Jon Stephens, Shankara Pailoor, Isil Dillig
2025/915 (PDF ) Improved differential cryptanalysis of SPEEDY Tim Beyne, Addie Neyt
2025/914 (PDF ) Tweakable Permutation-based Luby-Rackoff Constructions Bishwajit Chakraborty, Abishanka Saha
2025/913 (PDF ) A Little LESS Secure - Side-Channel Attacks Exploiting Randomness Leakage Dina Hesse, Elisabeth Krahmer, Yi-Fu Lai, Jonas Meers
2025/912 (PDF ) Enforcing arbitrary constraints on Bitcoin transactions Federico Barbacovi, Enrique Larraia
2025/911 (PDF ) Fuzzy Private Set Intersection from VOLE Aron van Baarsen, Sihang Pu
2025/910 (PDF ) Robust Threshold ECDSA with Online-Friendly Design in Three Rounds Guofeng Tang, Haiyang Xue
2025/909 (PDF ) Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices J Cameron Patterson, William J Buchanan, Callum Turino
2025/908 (PDF ) SubLogarithmic Linear Time SNARKs from Improved Sum-Check Sikhar Patranabis, Nitin Singh, Sayani Sinha
2025/907 (PDF ) New Framework for Structure-Aware PSI From Distributed Function Secret Sharing Dung Bui, Gayathri Garimella, Peihan Miao, Phuoc Van Long Pham
2025/906 (PDF ) Covert Attacks on Machine Learning Training in Passively Secure MPC Matthew Jagielski, Rahul Rachuri, Daniel Escudero, Peter Scholl
2025/905 (PDF ) Authenticated Key Exchange Protocol with Remote Randomness John C. W. Chan
2025/904 (PDF ) The Security of ML-DSA against Fault-Injection Attacks Haruhisa Kosuge, Keita Xagawa
2025/903 (PDF ) Rock and a Hard Place: Attack Hardness in Neural Network-assisted Side Channel Analysis Seyedmohammad Nouraniboosjin, Fatemeh Ganji
2025/902 (PDF ) On the Fiat–Shamir Security of Succinct Arguments from Functional Commitments Alessandro Chiesa, Ziyi Guan, Christian Knabenhans, Zihan Yu
2025/901 (PDF ) A Generic Framework for Practical Lattice-Based Non-interactive Publicly Verifiable Secret Sharing Behzad Abdolmaleki, John Clark, Mohammad Foroutani, Shahram Khazaei, Sajjad Nasirzadeh
2025/900 (PDF ) Exclusive Ownership of Fiat-Shamir Signatures: ML-DSA, SQIsign, LESS, and More Michael Meyer, Patrick Struck, Maximiliane Weishäupl
2025/899 (PDF ) Improved Noise Bound in BFV Homomorphic Encryption and Its Application to Multiplication Akshit Aggarwal, Yang Li, Srinibas Swain
2025/898 (PDF ) A New Approach for LPN-based Pseudorandom Functions: Low-Depth and Key-Homomorphic Youlong Ding, Aayush Jain, Ilan Komargodski
2025/897 (PDF ) SQIsign2DPush: Faster Signature Scheme Using 2-Dimensional Isogenies Kohei Nakagawa, Hiroshi Onuki
2025/896 (PDF ) InstaRand: Instantly Available and Instantly Verifiable On-chain Randomness Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Pratyay Mukherjee, Pratik Sarkar, Sri AravindaKrishnan Thyagarajan
2025/895 (PDF ) Blinding Post-Quantum Hash-and-Sign Signatures Charles Bouillaguet, Thibauld Feneuil, Jules Maire, Matthieu Rivain, Julia Sauvage, Damien Vergnaud
2025/894 (PDF ) Achieving "beyond CCA1" security for linearly homomorphic encryption, without SNARKs? Marina Checri, Pierre-Emmanuel Clet, Marc Renard, Renaud Sirdey
2025/893 (PDF ) MacaKey: Full-State Keyed Sponge Meets the Summation-Truncation Hybrid Charlotte Lefevre, Mario Marhuenda Beltrán
2025/892 (PDF ) Practical cryptanalysis of pseudorandom correlation generators based on quasi-Abelian syndrome decoding Charles Bouillaguet, Claire Delaplace, Mickaël Hamdad, Damien Vergnaud
2025/891 (PDF ) Obfuscation of Unitary Quantum Programs Mi-Ying (Miryam) Huang, Er-Cheng Tang
2025/890 (PDF ) SPEEDY: Caught at Last Christina Boura, Patrick Derbez, Baptiste Germon, Rachelle Heim Boissier, María Naya-Plasencia
2025/889 (PDF ) At the Top of the Hypercube -- Better Size-Time Tradeoffs for Hash-Based Signatures Dmitry Khovratovich, Mikhail Kudinov, Benedikt Wagner
2025/888 (PDF ) Bootstrapping GBFV with CKKS Jaehyung Kim
2025/887 (PDF ) Adaptively Secure Blockchain-Aided Decentralized Storage Networks: Formalization and Generic Construction Xiangyu Su, Yuma Tamagawa, Mario Larangeira, Keisuke Tanaka
2025/886 (PDF ) PaCo: Bootstrapping for CKKS via Partial CoeffToSlot Jean-Sébastien Coron, Tim Seuré
2025/885 (PDF ) Fast Fuzzy PSI from Symmetric-Key Techniques Cong Zhang, Yu Chen, Yang Cao, Yujie Bai, Shuaishuai Li, Juntong Lin, Anyu Wang, Xiaoyun Wang
2025/884 (PDF ) $k$-out-of-$n$ Proofs and Applications to Privacy-Preserving Cryptocurrencies Min Zhang, Yu Chen, Xiyuan Fu
2025/883 (PDF ) A Fast, Efficient, Platform-Adaptive, and AIS-20/31 Compliant PLL-Based True Random Number Generator on an SoC FPGA Oğuz Yayla, Yunus Emre Yılmaz
2025/882 (PDF ) Leveled Homomorphic Encryption over Composite Groups Mahdi Mahdavi, Ehsan Meamari, Emad Heydari Beni, Maryam Sheikhi
2025/881 (PDF ) One-Way Homomorphic Encryption: A Composite Group Approach Mahdi Mahdavi, Helena Rifà-Pous
2025/880 (PDF ) Optimistic Asynchronous Dynamic-committee Proactive Secret Sharing Bin Hu, Jianwei Liu, Zhenliang Lu, Qiang Tang, Zhuolun Xiang, Zongyang Zhang
2025/879 (PDF ) Papercraft: Lattice-based Verifiable Delay Function Implemented Michał Osadnik, Darya Kaviani, Valerio Cini, Russell W. F. Lai, Giulio Malavolta
2025/878 (PDF ) Blockcipher-Based Key Derivation without PRP/PRF Switching Fabrice Benhamouda, Shai Halevi, Panos Kampanakis, Hugo Krawczyk
2025/877 (PDF ) Towards Improving Throughput and Scalability of DAG-based BFT SMR Nibesh Shrestha, Aniket Kate
2025/876 (PDF ) Lower Bounds for Garbled Circuits from Shannon-Type Information Inequalities Jake Januzelli, Mike Rosulek, Lawrence Roy
2025/875 (PDF ) Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve Mohammed Rahmani, Abderrahmane Nitaj
2025/874 (PDF ) Decentralized Multi-Authority Attribute-Based Inner-Product Functional Encryption: Noisy and Evasive Constructions from Lattices Jiaqi Liu, Yan Wang, Fang-Wei Fu
2025/873 (PDF ) Improvement of Side-Channel Attacks on Mitaka Vladimir Sarde, Nicolas Debande
2025/872 (PDF ) Finally! A Compact Lattice-Based Threshold Signature Rafael del Pino, Guilhem Niot
2025/871 (PDF ) Simple and Efficient Lattice Threshold Signatures with Identifiable Aborts Rafael del Pino, Thomas Espitau, Guilhem Niot, Thomas Prest
2025/870 (PDF ) From List-Decodability to Proximity Gaps Yiwen Gao, Dongliang Cai, Yang Xu, Haibin Kan
2025/869 (PDF ) One for All, All for One: Universal semi-agnostic quantum circuit for solving (Standard) Abelian Hidden Subgroup Problems Michał Wroński, Łukasz Dzierzkowski, Mateusz Leśniak, Ewa Syta
2025/868 (PDF ) Delegated PSI from Homomorphic Encryptions Sicheng Wei, Jingwei Hu
2025/867 (PDF ) Side Channel Analysis in Homomorphic Encryption Baraq Ghaleb, William J Buchanan
2025/866 (PDF ) Public-key Cryptography Attacks Using Adiabatic Quantum Computer Weishen Zou, Bruno Martin, Thomas Prévost
2025/865 (PDF ) Data Availability for Thousands of Nodes Yanpei Guo, Alex Luoyuan Xiong, Wenjie Qu, Jiaheng Zhang
2025/864 (PDF ) Fheanor: a new, modular FHE library for designing and optimising schemes Hiroki Okada, Rachel Player, Simon Pohmann
2025/863 (PDF ) Fly Away: Lifting Fault Security through Canaries and the Uniform Random Fault Model Gaëtan Cassiers, Siemen Dhooghe, Thorben Moos, Sayandeep Saha, François-Xavier Standaert
2025/862 (PDF ) Distinguishing Full-Round AES-256 in a Ciphertext-Only Setting via Hybrid Statistical Learning Gopal Singh
2025/861 (PDF ) MOCHA: Mixnet Optimization Considering Honest Client Anonymity Mahdi Rahimi
2025/860 (PDF ) sPAR: (Somewhat) Practical Anonymous Router Debajyoti Das, Jeongeun Park
2025/859 (PDF ) On the Provable Dual Attack for LWE by Modulus Switching Hongyuan Qu, Guangwu Xu
2025/858 (PDF ) Encrypted Matrix-Vector Products from Secret Dual Codes Fabrice Benhamouda, Caicai Chen, Shai Halevi, Yuval Ishai, Hugo Krawczyk, Tamer Mour, Tal Rabin, Alon Rosen
2025/857 (PDF ) Classify Directly: A Dynamic Time SPA Classification Method Based on DTW Yaoling Ding, Haotong Xu, Annyu Liu, An Wang, Jingqi Zhang, Jing Yu, Liehuang Zhu
2025/856 (PDF ) Testing the Tests - Opportunities for Corrections and Improvements in NIST SP 800-22r1a and its Reference Code Elias Riesinger, Jürgen Fuß
2025/855 (PDF ) Posterior Security: Anonymity and Message Hiding of Standard Signatures Tsz Hon Yuen, Ying-Teng Chen, Shimin Pan, Jiangshan Yu, Joseph K. Liu
2025/854 (PDF ) ProbeNav - Fast, precise and repeatable positioning of electromagnetic probes for local Side-Channel Attacks Matthias Probst, Alexander Wiesent, Michael Gruber, Georg Sigl
2025/853 (PDF ) Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-Waay Guilhem Niot
2025/852 (PDF ) Neural-Inspired Advances in Integral Cryptanalysis Liu Zhang, Yiran Yao, Danping Shi, Dongchen Chai, Jian Guo, Zilong Wang
2025/851 (PDF ) V$\epsilon$rity: Verifiable Local Differential Privacy James Bell-Clark, Adrià Gascón, Baiyu Li, Mariana Raykova, Amrita Roy Chowdhury
2025/850 (PDF ) Succinct Computational Secret Sharing for Monotone Circuits George Lu, Shafik Nassar, Brent Waters
2025/849 (PDF ) Unmasking TRaccoon: A Lattice-Based Threshold Signature with An Efficient Identifiable Abort Protocol Rafael del Pino, Shuichi Katsumata, Guilhem Niot, Michael Reichle, Kaoru Takemure
2025/848 (PDF ) On Graphs of Incremental Proofs of Sequential Work Hamza Abusalah
2025/847 (PDF ) Deterministic algorithms for class group actions Marc Houben
2025/845 (PDF ) Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols Lei Tian, Chenke Wang, Yu Long, Xian Xu, Mingchao Wan, Chunmiao Li, Shi-Feng Sun, Dawu Gu
2025/844 (PDF ) Post-Quantum PKE from Unstructured Noisy Linear Algebraic Assumptions: Beyond LWE and Alekhnovich's LPN Riddhi Ghosal, Aayush Jain, Paul Lou, Amit Sahai, Neekon Vafa
2025/843 (PDF ) Rerandomizable Garbling, Revisited Raphael Heitjohann, Jonas von der Heyden, Tibor Jager
2025/842 (PDF ) Improvements on the schemes VOX and QR UOV When minus is a plus Pierre Varjabedian
2025/841 (PDF ) Verifiable E-Voting with a Trustless Bulletin Board Daniel Rausch, Nicolas Huber, Ralf Kuesters
2025/840 (PDF ) T-Spoon: Tightly Secure Two-Round Multi-Signatures with Key Aggregation Renas Bacho, Benedikt Wagner
2025/839 (PDF ) Correlation power analysis of LESS and CROSS Maciej Czuprynko, Anisha Mukherjee, Sujoy Sinha Roy
2025/837 (PDF ) Towards Optimal Differential Attacks on FLY and PIPO Insung Kim, Seonggyeom Kim, Sunyeop Kim, Donggeun Kwon, Hanbeom Shin, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong
2025/836 (PDF ) Registered Functional Encryption for Attribute-Weighted Sums with Access Control Tapas Pal, Robert Schädlich
2025/835 (PDF ) Universally Composable Interactive and Ordered Multi-Signatures Carsten Baum, Bernardo David, Elena Pagnin, Akira Takahashi
2025/834 (PDF ) A Note on ``CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT'' Zhengjun Cao, Lihua Liu
2025/833 (PDF ) A note on closed addition chains and complete numbers Theophilus Agama
2025/832 (PDF ) Constant-time Integer Arithmetic for SQIsign Fatna Kouider, Anisha Mukherjee, David Jacquemin, Péter Kutas
2025/831 (PDF ) Worst-Case Time Analysis of Key Agreement Protocols in 10BASE-T1S Automotive Networks Teodora Ljubevska, Alexander Zeh, Donjete Elshani Rama, Ken Tindell
2025/830 (PDF ) Simple Power Analysis Attack on SQIsign Anisha Mukherjee, Maciej Czuprynko, David Jacquemin, Péter Kutas, Sujoy Sinha Roy
2025/829 (PDF ) Row Reduction Techniques for $n$-Party Garbling Kelong Cong, Emmanuela Orsini, Erik Pohle, Oliver Zajonc
2025/828 (PDF ) Bandwidth-Efficient Robust Threshold ECDSA in Three Rounds Yingjie Lyu, Zengpeng Li, Hong-Sheng Zhou, Haiyang Xue, Mei Wang, Shuchao Wang, Mengling Liu
2025/827 (PDF ) Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios Binbin Tu, Yujie Bai, Cong Zhang, Yang Cao, Yu Chen
2025/826 (PDF ) Repeated Agreement is Cheap! On Weak Accountability and Multishot Byzantine Agreement Pierre Civit, Muhammad Ayaz Dzulfikar, Seth Gilbert, Rachid Guerraoui, Jovan Komatovic, Manuel Vidigueira
2025/825 (PDF ) High-Performance FPGA Implementations of Lightweight ASCON-128 and ASCON-128a with Enhanced Throughput-to-Area Efficiency Ahmet Malal
2025/824 (PDF ) A Specification of an Anonymous Credential System Using BBS+ Signatures with Privacy-Preserving Revocation and Device Binding Christoph Graebnitz, Nicolas Buchmann, Martin Seiffert, Marian Margraf
2025/822 (PDF ) Generalization of semi-regular sequences: Maximal Gröbner basis degree, variants of genericness, and related conjectures Momonari Kudo, Kazuhiro Yokoyama
2025/821 (PDF ) Multi-Client Attribute-Based and Predicate Encryption, Revisited Robert Schädlich
2025/820 (PDF ) Less Than a Bit to Rule Them All – Key Recovery from Randomness Leakage in ML-DSA Simon Damm, Nicolai Kraus, Alexander May, Julian Nowakowski, Jonas Thietke
2025/819 (PDF ) SoK: Dlog-based Distributed Key Generation Renas Bacho, Alireza Kavousi
2025/818 (PDF ) An Attack on TON’s ADNL Secure Channel Protocol Aviv Frenkel, Dmitry Kogan
2025/817 (PDF ) Relating Definitions of Computational Differential Privacy in Wider Parameter Regimes Fredrik Meisingseth, Christian Rechberger
2025/816 (PDF ) Randomized vs. Deterministic? Practical Randomized Synchronous BFT in Expected Constant Time Xufeng Zhang, Baohan Huang, Sisi Duan, Haibin Zhang
2025/815 (PDF ) Security Analysis of NIST Key Derivation Using Pseudorandom Functions Yaobin Shen, Lei Wang, Dawu Gu
2025/814 (PDF ) Groebner Basis Cryptanalysis of Anemoi Luca Campa, Arnab Roy
2025/813 (PDF ) HydraProofs: Optimally Computing All Proofs in a Vector Commitment (with applications to efficient zkSNARKs over data from multiple users) Christodoulos Pappas, Dimitris Papadopoulos, Charalampos Papamanthou
2025/812 (PDF ) Post-Quantum Cryptography in eMRTDs: Evaluating PAKE and PKI for Travel Documents Nouri Alnahawi, Melissa Azouaoui, Joppe W. Bos, Gareth T. Davies, SeoJeong Moon, Christine van Vredendaal, Alexander Wiesmaier
2025/811 (PDF ) Side-Channel Power Trace Dataset for Kyber Pair-Pointwise Multiplication on Cortex-M4 Azade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek
2025/810 (PDF ) Actively Secure MPC in the Dishonest Majority Setting: Achieving Constant Complexity in Online Communication, Computation Per Gate, Rounds, and Private Input Size Seunghwan Lee, Jaesang Noh, Taejeong Kim, Dohyuk Kim, Dong-Joon Shin
2025/809 (PDF ) Don’t be mean: Reducing Approximation Noise in TFHE through Mean Compensation Thomas de Ruijter, Jan-Pieter D'Anvers, Ingrid Verbauwhede
2025/808 (PDF ) Partially Registered Multi-authority Attribute-based Encryption Viktória I. Villányi, Vladimir Božović
2025/807 (PDF ) Registered ABE for Circuits from Evasive Lattice Assumptions Xinrui Yang, Yijian Zhang, Ying Gao, Jie Chen
2025/806 (PDF ) BERMUDA: A BPSec-Compatible Key Management Scheme for DTNs Fiona Fuchs, Felix Walter, Florian Tschorsch
2025/805 (PDF ) Accelerating Multiparty Noise Generation Using Lookups Fredrik Meisingseth, Christian Rechberger, Fabian Schmid
2025/804 (PDF ) Putting Sybils on a Diet: Securing Distributed Hash Tables using Proofs of Space Christoph U. Günther, Krzysztof Pietrzak
2025/803 (PDF ) Universally Composable On-Chain Quadratic Voting for Liquid Democracy Lyudmila Kovalchuk, Bingsheng Zhang, Andrii Nastenko, Zeyuan Yin, Roman Oliynykov, Mariia Rodinko
2025/802 (PDF ) Optimizing Key Recovery in Classic McEliece: Advanced Error Correction for Noisy Side-Channel Measurements Nicolas Vallet, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Vincent Grosso
2025/801 (PDF ) POBA: Privacy-Preserving Operator-Side Bookkeeping and Analytics Dennis Faut, Valerie Fetzer, Jörn Müller-Quade, Markus Raiber, Andy Rupp
2025/800 (PDF ) Comparing classical and quantum conditional disclosure of secrets Uma Girish, Alex May, Leo Orshansky, Chris Waddell
2025/799 (PDF ) Code-based Masking: From Fields to Bits Bitsliced Higher-Order Masked SKINNY John Gaspoz, Siemen Dhooghe
2025/798 (PDF ) CRAFT: Characterizing and Root-Causing Fault Injection Threats at Pre-Silicon Arsalan Ali Malik, Harshvadan Mihir, Aydin Aysu
2025/797 (PDF ) WEBCAT: Web-based Code Assurance and Transparency Giulio Berra
2025/796 (PDF ) Unified MEDS Accelerator Sanjay Deshpande, Yongseok Lee, Mamuri Nawan, Kashif Nawaz, Ruben Niederhagen, Yunheung Paek, Jakub Szefer
2025/795 (PDF ) Efficient Noncommutative KEMs from Twisted Dihedral Group Ring Ali Raya, Vikas Kumar, Sugata Gangopadhyay, Aditi Kar Gangopadhyay
2025/794 (PDF ) Formal Analysis of Multi-Device Group Messaging in WhatsApp Martin R. Albrecht, Benjamin Dowling, Daniel Jones
2025/793 (PDF ) Solving systems of polynomial equations via Macaulay matrices Shuhei Nakamura
2025/792 (PDF ) Scrutinizing the Security of AES-based Hashing and One-way Functions Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang
2025/791 (PDF ) Analysis of One Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism Zhengjun Cao, Lihua Liu
2025/790 (PDF ) PULSE: Parallel Private Set Union for Large-Scale Entities Jiahui Gao, Son Nguyen, Marina Blanton, Ni Trieu
2025/789 (PDF ) Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations Alexander Kyster, Frederik Huss Nielsen, Sabine Oechsner, Peter Scholl
2025/788 (PDF ) Identity-Based Ring Signature from Quantum Token Nabanita Chakraborty, Ratna Dutta
2025/787 (PDF ) Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Ariel Nof
2025/786 (PDF ) Robust and Verifiable MPC with Applications to Linear Machine Learning Inference Tzu-Shen Wang, Jimmy Dani, Juan Garay, Soamar Homsi, Nitesh Saxena
2025/785 (PDF ) DNDK: Combining Nonce and Key Derivation for Fast and Scalable AEAD Shay Gueron, Thomas Ristenpart
2025/784 (PDF ) SHIP: A Shallow and Highly Parallelizable CKKS Bootstrapping Algorithm Jung Hee Cheon, Guillaume Hanrot, Jongmin Kim, Damien Stehlé
2025/783 (PDF ) Non-Adaptive Cryptanalytic Time-Space Lower Bounds via a Shearer-like Inequality for Permutations Itai Dinur, Nathan Keller, Avichai Marmor
2025/782 (PDF ) AES Is Not Enough: the Block Ciphers Zoo Goes Homormorphic (over TFHE) Daphné Trama, Aymen Boudguiga, Renaud Sirdey
2025/781 (PDF ) Generalizing the Augot-Finiasz PKE to Other Code Classes Anmoal Porwal, Anna Baumeister, Violetta Weger, Antonia Wachter-Zeh, Pierre Loidreau
2025/780 (PDF ) The Planted Orthogonal Vectors Problem David Kühnemann, Adam Polak, Alon Rosen
2025/779 (PDF ) Towards Reliable Broadcast with Optimal Communication and Round Complexity Thomas Locher, Victor Shoup
2025/778 (PDF ) Cryptography from Lossy Reductions: Towards OWFs from ETH, and Beyond Pouria Fallahpour, Alex B. Grilo, Garazi Muguruza, Mahshid Riahinia
2025/777 (PDF ) Seamless Switching Between PBS and WoPBS for Scalable TFHE Rostin Shokri, Nektarios Georgios Tsoutsos
2025/776 (PDF ) Clementine: A Collateral-Efficient, Trust-Minimized, and Scalable Bitcoin Bridge Ekrem Bal, Lukas Aumayr, Atacan İyidoğan, Giulia Scaffino, Hakan Karakuş, Cengiz Eray Aslan, Orfeas Stefanos Thyfronitis Litos
2025/775 (PDF ) AuthOr: Lower Cost Authenticity-Oriented Garbling of Arbitrary Boolean Circuits Osman Biçer, Ali Ajorian
2025/774 (PDF ) Towards a Modern LLL Implementation Léo Ducas, Ludo N. Pulles, Marc Stevens
2025/773 (PDF ) Exploring Adversarial Attacks on the MaSTer Truncation Protocol Martin Zbudila, Aysajan Abidin, Bart Preneel
2025/772 (PDF ) Publicly Auditable Garbled Circuit San Ling, Chan Nam Ngo, Khai Hanh Tang, Huaxiong Wang
2025/771 (PDF ) Differential Fault Attacks on TFHE-friendly cipher $\textsf{FRAST}$ Weizhe Wang, Deng Tang
2025/770 (PDF ) ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations Zhelei Zhou, Yun Li, Yuchen Wang, Zhaomin Yang, Bingsheng Zhang, Cheng Hong, Tao Wei, Wenguang Chen
2025/769 (PDF ) Finding the Inverse of some Shift Invariant Transformations Fukang Liu, Vaibhav Dixit, Santanu Sarkar, Willi Meier, Takanori Isobe
2025/768 (PDF ) Incompleteness in Number-Theoretic Transforms: New Tradeoffs and Faster Lattice-Based Cryptographic Applications Syed Mahbub Hafiz, Bahattin Yildiz, Marcos A. Simplicio Jr, Thales B. Paiva, Henrique Ogawa, Gabrielle De Micheli, Eduardo L. Cominetti
2025/767 (PDF ) ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofs Jiwon Kim, Abhiram Kothapalli, Orestis Chardouvelis, Riad S. Wahby, Paul Grubbs
2025/766 (PDF ) Unbiasable Verifiable Random Functions from Generic Assumptions Nicholas Brandt
2025/765 (PDF ) ZKPoG: Accelerating WitGen-Incorporated End-to-End Zero-Knowledge Proof on GPU Muyang Li, Yueteng Yu, Bangyan Wang, Xiong Fan, Shuwen Deng
2025/764 (PDF ) Security of a secret sharing protocol on the Qline Alex B. Grilo, Lucas Hanouz, Anne Marin
2025/763 (PDF ) The Tangent Space Attack Axel Lemoine
2025/762 (PDF ) $\textbf{MALARIA}$: $\textbf{Ma}$nagement of Low-$\textbf{La}$tency $\textbf{R}$outing $\textbf{I}$mpact on Mix Network $\textbf{A}$nonymity (Extended Version) Mahdi Rahimi
2025/761 (PDF ) TERRA : Trojan-Resilient Reverse-Firewall for Cryptographic Applications Chandan Kumar, Nimish Mishra, Suvradip Chakraborty, Satrajit Ghosh, Debdeep Mukhopadhyay
2025/760 (PDF ) DGSP: An Efficient Scalable Fully Dynamic Group Signature Scheme Using $\rm{SPHINCS}^+$ Mojtaba Fadavi, Seyyed Arash Azimi, Sabyasachi Karati, Samuel Jaques
2025/759 (PDF ) Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code Santiago Arranz-Olmos, Gilles Barthe, Benjamin Grégoire, Jan Jancar, Vincent Laporte, Tiago Oliveira, Peter Schwabe
2025/758 (PDF ) Blockcipher-Based Key Commitment for Nonce-Derived Schemes Panos Kampanakis, Shai Halevi, Nevine Ebeid, Matt Campagna
2025/757 (PDF ) Threshold Niederreiter: Chosen-Ciphertext Security and Improved Distributed Decoding Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, Damien Vergnaud
2025/755 (PDF ) A Note on "CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid" Zhengjun Cao, Lihua Liu
2025/753 (PDF ) Linear-Time Accumulation Schemes Benedikt Bünz, Alessandro Chiesa, Giacomo Fenzi, William Wang
2025/752 (PDF ) LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts Gulshan Kumar, Rahul Saha, Mauro Conti, William J Buchanan
2025/751 (PDF ) Improved Range Searching And Range Emptiness Under FHE Using Copy-And-Recurse Eyal Kushnir, Hayim Shaul
2025/750 (PDF ) Secure Rate-Distortion-Perception Trade-off Over Channels: A Randomized Distributed Function Computation (RDFC) Application Gustaf Ahlgren, Onur Gunlu
2025/749 (PDF ) GOLF: Unleashing GPU-Driven Acceleration for FALCON Post-Quantum Cryptography Ruihao Dai, Jiankuo Dong, Mingrui Qiu, Zhenjiang Dong, Fu Xiao, Jingqiang Lin
2025/748 (PDF ) Symphony of Speeds: Harmonizing Classic McEliece Cryptography with GPU Innovation Wen Wu, Jiankuo Dong, Zhen Xu, Zhenjiang Dong, Dung Duong, Fu Xiao, Jingqiang Lin
2025/746 (PDF ) Zemlyanika — Module-LWE based KEM with the power-of-two modulus, explicit rejection and revisited decapsulation failures Alexey S. Zelenetsky, Peter G. Klyucharev
2025/745 (PDF ) When is liquid democracy possible? On the manipulation of variance. Krishnendu Chatterjee, Seth Gilbert, Stefan Schmid, Jakub Svoboda, Michelle Yeo
2025/743 (PDF ) On graph based pseudo quadratic multivariate maps of prescribed degree as instruments of key establishment. Vasyl Ustimenko, Tymoteusz Chojecki
2025/742 (PDF ) Seamless Post-Quantum Transition: Agile and Efficient Encryption for Data-at-Rest Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Federico Valbusa
2025/741 (PDF ) Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON and Piccolo (Full Version) Weiqing Deng, Jianing Zhang, Haoyang Wang
2025/740 (PDF ) Otter: Scalable Sharding-Based Atomic Broadcast with Abortable Fork Detection Xin Wang, Xiao Sui, Sisi Duan
2025/739 (PDF ) An Extended Rectangular MinRank Attack against UOV and Its Variants Toshihiro Suzuki, Hiroki Furue, Takuma Ito, Shuhei Nakamura, Shigenori Uchiyama
2025/738 (PDF ) Quantum Lifting for Invertible Permutations and Ideal Ciphers Alexandru Cojocaru, Minki Hhan, Qipeng Liu, Takashi Yamakawa, Aaram Yun
2025/737 (PDF ) FICS and FACS: Fast IOPPs and Accumulation via Code-Switching Anubhav Baweja, Pratyush Mishra, Tushar Mopuri, Matan Shtepel
2025/736 (PDF ) Superglue: Fast formulae for (2,2)-gluing isogenies Max Duparc
2025/735 (PDF ) Improved Rényi Arguments for Lattice-Based Threshold Encryption Katharina Boudgoust, Anamaria Costache
2025/734 (PDF ) Universal Blind and Verifiable Delegated Quantum Computation with Classical Clients Vicent Esteve Voltes
2025/733 (PDF ) One More Motivation to Use Evaluation Tools, This Time for Hardware Multiplicative Masking of AES Hemin Rahimi, Amir Moradi
2025/732 (PDF ) Quantum pseudoresources imply cryptography Alex B. Grilo, Álvaro Yángüez
2025/731 (PDF ) The Sponge is Quantum Indifferentiable Gorjan Alagic, Joseph Carolan, Christian Majenz, Saliha Tokat
2025/730 (PDF ) Tetris! Traceable Extendable Threshold Ring Signatures and More Gennaro Avitabile, Vincenzo Botta, Dario Fiore
2025/729 (PDF ) Private Information Retrieval based on Homomorphic Encryption, Revisited Jaeseon Kim, Jeongeun Park, Hyewon Sung
2025/727 (PDF ) Securing Nested Attestation of Confidential Serverless Computing without Intra-Enclave Isolation Atsuki Momose, Kailun Qin, Ao Sakurai, Mona Vij
2025/726 (PDF ) Public-Key Quantum Fire and Key-Fire From Classical Oracles Alper Çakan, Vipul Goyal, Omri Shmueli
2025/725 (PDF ) Side-Channel Analysis Revisited and Evaluated Jiangshan Long, Changhai Ou, Yukun Cheng, Kexin Qiao, Wei Cheng, Fan Zhang
2025/724 (PDF ) Privacy and Security in Distributed Data Markets Daniel Alabi, Sainyam Galhotra, Shagufta Mehnaz, Zeyu Song, Eugene Wu
2025/723 (PDF ) Time-Space Tradeoffs of Truncation with Preprocessing Krzysztof Pietrzak, Pengxiang Wang
2025/722 (PDF ) One-Step Schnorr Threshold Identification Foteinos Mergoupis-Anagnou
2025/721 (PDF ) Efficient Key Recovery via Correlation Power Analysis on Scloud⁺ Hangyu Bai, Fan Huang, Xiaolin Duan, Honggang Hu
2025/720 (PDF ) Towards Lightweight CKKS: On Client Cost Efficiency Jung Hee Cheon, Minsik Kang, Jai Hyun Park
2025/719 (PDF ) Packed Sumcheck over Fields of Small Characteristic Yuanju Wei, Kaixuan Wang, Binwu Xiang, Xinxuan Zhang, Yi Deng, Xudong Zhu, Hailong Wang, Li Lin, Lei Wang
2025/718 (PDF ) The Hardness of Learning Quantum Circuits and its Cryptographic Applications Bill Fefferman, Soumik Ghosh, Makrand Sinha, Henry Yuen
2025/717 (PDF ) GKR for Boolean Circuits with Sub-linear RAM Operations Yuncong Hu, Chongrong Li, Zhi Qiu, Tiancheng Xie, Yue Ying, Jiaheng Zhang, Zhenfei Zhang
2025/716 (PDF ) Shark: Actively Secure Inference using Function Secret Sharing Kanav Gupta, Nishanth Chandran, Divya Gupta, Jonathan Katz, Rahul Sharma
2025/715 (PDF ) USpt: Updatable Signature with Public Tokens Haotian Yin, Jie Zhang, Wanxin Li, Yuji Dong, Eng Gee Lim, Dominik Wojtczak
2025/714 (PDF ) Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks (Full Version) Bingqing Li, Ling Sun
2025/713 (PDF ) LOHEN: Layer-wise Optimizations for Neural Network Inferences over Encrypted Data with High Performance or Accuracy Kevin Nam, Youyeon Joo, Dongju Lee, Seungjin Ha, Hyunyoung Oh, Hyungon Moon, Yunheung Paek
2025/712 (PDF ) Threshold FHE with Efficient Asynchronous Decryption Zvika Brakerski, Offir Friedman, Avichai Marmor, Dolev Mutzari, Yuval Spiizer, Ni Trieu
2025/711 (PDF ) Fast Plaintext-Ciphertext Matrix Multiplication from Additively Homomorphic Encryption Krishna Sai Tarun Ramapragada, Utsav Banerjee
2025/710 (PDF ) Arbigraph: Verifiable Turing-Complete Execution Delegation Michael Mirkin, Hongyin Chen, Ohad Eitan, Gal Granot, Ittay Eyal
2025/709 (PDF ) Thunderbolt: A Formally Verified Protocol for Off-Chain Bitcoin Transfers Hongbo Wen, Hanzhi Liu, Jingyu Ke, Yanju Chen, Dahlia Malkhi, Yu Feng
2025/708 (PDF ) Strong keys for tensor isomorphism cryptography Anand Kumar Narayanan
2025/707 (PDF ) Post Quantum Cryptography (PQC) Signatures Without Trapdoors William J Buchanan
2025/706 (PDF ) The Role of Quantum Computing in Enhancing Encryption Security: A Review Aashika Khanal, Navjot Kaur
2025/705 (PDF ) Breaking ECDSA with Two Affinely Related Nonces Jamie Gilchrist, William J Buchanan, Keir Finlow-Bates
2025/704 (PDF ) Revisiting Honest Re-Encryption Attack for Proxy Re-Encryption Schemes Haotian Yin, Jie Zhang, Yuji Dong, Eng Gee Lim, Dominik Wojtczak
2025/703 (PDF ) Priv-PFL: A Privacy-Preserving and Efficient Personalized Federated Learning Approach Alireza Aghabagherloo, Roozbeh Sarenche, Maryam Zarezadeh, Bart Preneel, Stefan Köpsell
2025/702 (PDF ) Two Party Secret Shared Joins Srinivasan Raghuraman, Peter Rindal, Harshal Shah
2025/701 (PDF ) Hermes: Efficient and Secure Multi-Writer Encrypted Database Tung Le, Thang Hoang
2025/700 (PDF ) Fherret: Proof of FHE Correct-and-Honest Evaluation with Circuit Privacy from MPCitH Janik Huth, Antoine Joux, Giacomo Santato
2025/699 (PDF ) Threshold (Fully) Homomorphic Encryption Carl Bootland, Kelong Cong, Daniel Demmler, Tore Kasper Frederiksen, Benoit Libert, Jean-Baptiste Orfila, Dragos Rotaru, Nigel P. Smart, Titouan Tanguy, Samuel Tap, Michael Walter
2025/698 (PDF ) Mind the Grammar: Side-Channel Analysis driven by Grammatical Evolution Mattia Napoli, Alberto Leporati, Stjepan Picek, Luca Mariot
2025/697 (PDF ) A Multi-Differential Approach to Enhance Related-Key Neural Distinguishers Xue Yuan, Qichun Wang
2025/696 (PDF ) Faster amortized bootstrapping using the incomplete NTT for free Thales B. Paiva, Gabrielle De Micheli, Syed Mahbub Hafiz, Marcos A. Simplicio Jr., Bahattin Yildiz
2025/695 (PDF ) Efficient Foreign-Field Arithmetic in PLONK Miguel Ambrona, Denis Firsov, Inigo Querejeta-Azurmendi
2025/694 (PDF ) A Formal Security Analysis of Hyperledger AnonCreds Ashley Fraser, Steve Schneider
2025/693 (PDF ) Accountable Liveness Andrew Lewis-Pye, Joachim Neu, Tim Roughgarden, Luca Zanolini
2025/692 (PDF ) DahLIAS: Discrete Logarithm-Based Interactive Aggregate Signatures Jonas Nick, Tim Ruffing, Yannick Seurin
2025/691 (PDF ) Let us walk on the 3-isogeny graph: efficient, fast, and simple Jesús-Javier Chi-Domínguez, Eduardo Ochoa-Jimenez, Ricardo-Neftalí Pontaza-Rodas
2025/690 (PDF ) Zero-Knowledge Protocol for Knowledge of Known Discrete Logarithms: Applications to Ring Confidential Transactions and Anonymous Zether Li Lin, Tian Qiu, Xin Wang, Hailong Wang, Changzheng Wei, Ying Yan, Wei Wang, Wenbiao Zhao
2025/689 (PDF ) Neural network design options for RNG's verification José Luis Crespo, Jaime Gutierrez, Angel Valle
2025/688 (PDF ) Uncertainty Estimation in Neural Network-enabled Side-channel Analysis and Links to Explainability Seyedmohammad Nouraniboosjin, Fatemeh Ganji
2025/687 (PDF ) Myco: Unlocking Polylogarithmic Accesses in Metadata-Private Messaging Darya Kaviani, Deevashwer Rathee, Bhargav Annem, Raluca Ada Popa
2025/686 (PDF ) Fast amortized bootstrapping with small keys and polynomial noise overhead Antonio Guimarães, Hilder V. L. Pereira
2025/685 (PDF ) Proofs of Useful Work from Arbitrary Matrix Multiplication Ilan Komargodski, Omri Weinstein
2025/684 (PDF ) Post-quantum Cryptographic Analysis of SSH Benjamin Benčina, Benjamin Dowling, Varun Maram, Keita Xagawa
2025/683 (PDF ) On the Definition of Malicious Private Information Retrieval Bar Alon, Amos Beimel
2025/682 (PDF ) SUMAC: an Efficient Administrated-CGKA Using Multicast Key Agreement Nicolas Bon, Céline Chevalier, Guirec Lebrun, Ange Martinelli
2025/681 (PDF ) Quantum Periodic Distinguisher Construction: Symbolization Method and Automated Tool Qun Liu, Haoyang Wang, Jinliang Wang, Boyun Li, Meiqin Wang
2025/680 (PDF ) Pirouette: Query Efficient Single-Server PIR Jiayi Kang, Leonard Schild
2025/679 (PDF ) Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM Rishub Nagpal, Vedad Hadžić, Robert Primas, Stefan Mangard
2025/678 (PDF ) Recovering S-Box Design Structures and Quantifying Distances between S-Boxes using Deep Learning Donggeun Kwon, Deukjo Hong, Jaechul Sung, Seokhie Hong
2025/677 (PDF ) Impossible Differential Attack on SAND-128 Nobuyuki Sugio
2025/676 (PDF ) Onion Encryption Revisited: Relations Among Security Notions Daichong Chao, Liehuang Zhu, Dawei Xu, Tong Wu, Chuan Zhang, Fuchun Guo
2025/675 (PDF ) Trilithium: Efficient and Universally Composable Distributed ML-DSA Signing Antonín Dufka, Semjon Kravtšenko, Peeter Laud, Nikita Snetkov
2025/674 (PDF ) On the Security of Two IKKR-type Code-Based Cryptosystems Kirill Vedenev
2025/673 (PDF ) Hybrid Fingerprinting for Effective Detection of Cloned Neural Networks Can Aknesil, Elena Dubrova, Niklas Lindskog, Jakob Sternby, Håkan Englund
2025/672 (PDF ) Simpler and Faster Pairings from the Montgomery Ladder Giacomo Pope, Krijn Reijnders, Damien Robert, Alessandro Sferlazza, Benjamin Smith
2025/671 (PDF ) Multi-signature in Fully Split Ring and Quantum Random Oracle Model Shimin Pan, Tsz Hon Yuen, Siu-Ming Yiu
2025/670 (PDF ) Biextensions in pairing-based cryptography Jianming Lin, Damien Robert, Chang-An Zhao, Yuhao Zheng
2025/669 (PDF ) SoK: FHE-Friendly Symmetric Ciphers and Transciphering Chao Niu, Benqiang Wei, Zhicong Huang, Zhaomin Yang, Cheng Hong, Meiqin Wang, Tao Wei
2025/668 (PDF ) (Interleaved) Extended Gabidulin Codes, More Analysis on Blockwise Rank Decoding Problem, and Their Applications to Cryptosystems Yongcheng Song, Rongmao Chen, Fangguo Zhang, Xinyi Huang, Jian Weng, Huaxiong Wang
2025/667 (PDF ) Vector Commitment Design, Analysis, and Applications: A Survey Vir Pathak, Sushmita Ruj, Ron van der Meyden
2025/666 (PDF ) Adaptive Robustness of Hypergrid Johnson-Lindenstrauss Andrej Bogdanov, Alon Rosen, Neekon Vafa, Vinod Vaikuntanathan
2025/665 (PDF ) MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero Varun Thakore, Saravanan Vijayakumaran
2025/664 (PDF ) Publicly Verifiable Generalized Secret Sharing Schemes and Their Applications Liang Zhang, Dongliang Cai, Tao Liu, Xingyu Wu, Haibin Kan, Jiheng Zhang
2025/663 (PDF ) Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters Mihir Bellare, Doreen Riepel, Laura Shea
2025/662 (PDF ) Attribute-Based Publicly Verifiable Secret Sharing Liang Zhang, Xingyu Wu, Qiuling Yue, Haibin Kan, Jiheng Zhang
2025/661 (PDF ) An LLM Framework For Cryptography Over Chat Channels Danilo Gligoroski, Mayank Raikwar, Sonu Kumar Jha
2025/659 (PDF ) Scalable and Fine-Tuned Privacy Pass from Group Verifiable Random Functions Dennis Faut, Julia Hesse, Lisa Kohl, Andy Rupp
2025/658 (PDF ) Efficient Verifiable Mixnets from Lattices, Revisited Jonathan Bootle, Vadim Lyubashevsky, Antonio Merino-Gallardo
2025/657 (PDF ) Key Derivation Functions Without a Grain of Salt Matilda Backendal, Sebastian Clermont, Marc Fischlin, Felix Günther
2025/656 (PDF ) Unbounded Multi-Hop Proxy Re-Encryption with HRA Security: An LWE-Based Optimization Xiaohan Wan, Yang Wang, Haiyang Xue, Mingqiang Wang
2025/655 (PDF ) Taking AI-Based Side-Channel Attacks to a New Dimension Lucas David Meier, Felipe Valencia, Cristian-Alexandru Botocan, Damian Vizár
2025/654 (PDF ) ECDSA Cracking Methods William J Buchanan, Jamie Gilchrist, Keir Finlow-Bates
2025/653 (PDF ) Fission: Distributed Privacy-Preserving Large Language Model Inference Mehmet Ugurbil, Dimitris Mouris, Manuel B. Santos, José Cabrero-Holgueras, Miguel de Vega, Shubho Sengupta
2025/652 (PDF ) MultiCent: Secure and Scalable Computation of Centrality Measures on Multilayer Graphs Andreas Brüggemann, Nishat Koti, Varsha Bhat Kukkala, Thomas Schneider
2025/651 (PDF ) Low-Latency Bootstrapping for CKKS using Roots of Unity Jean-Sébastien Coron, Robin Köstler
2025/650 (PDF ) ADC-BE: Optimizing Worst-Case Bandwidth in Broadcast Encryption with Boolean Functions Yadi Zhong
2025/649 (PDF ) Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience Ying Cai, Chengyi Qin, Mingqiang Wang
2025/648 (PDF ) HQC Beyond the BSC: Towards Error Structure-Aware Decoding Marco Baldi, Sebastian Bitzer, Nicholas Lilla, Paolo Santini
2025/647 (PDF ) Anamorphic Voting: Ballot Freedom Against Dishonest Authorities Rosario Giustolisi, Mohammadamin Rakeei, Gabriele Lenzini
2025/646 (PDF ) Secret-Key PIR from Random Linear Codes Caicai Chen, Yuval Ishai, Tamer Mour, Alon Rosen
2025/645 (PDF ) GIGA Protocol: Unlocking Trustless Parallel Computation in Blockchains Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov, Daniele Di Tullio, Mariia Rodinko
2025/644 (PDF ) Attacking at non-harmonic frequencies in screaming-channel attacks Jeremy Guillaume, Maxime Pelcat, Amor Nafkha, Ruben Salvador
2025/643 (PDF ) Obfuscation for Deep Neural Networks against Model Extraction: Attack Taxonomy and Defense Optimization Yulian Sun, Vedant Bonde, Li Duan, Yong Li
2025/642 (PDF ) A Meta-Complexity Characterization of Quantum Cryptography Bruno P. Cavalar, Eli Goldin, Matthew Gray, Peter Hall
2025/641 (PDF ) Scalable Non-Fungible Tokens on Bitcoin Jordi Herrera-Joancomartí, Cristina Pérez-Solà, Toni Mateos
2025/640 (PDF ) Multi-Party Private Set Operations from Predicative Zero-Sharing Minglang Dong, Yu Chen, Cong Zhang, Yujie Bai, Yang Cao
2025/639 (PDF ) Cryptomania v.s. Minicrypt in a Quantum World Longcheng Li, Qian Li, Xingjian Li, Qipeng Liu
2025/638 (PDF ) Round-Efficient Adaptively Secure Threshold Signatures with Rewinding Yanbo Chen
2025/637 (PDF ) A Study of Blockchain Consensus Protocols Shymaa M. Arafat
2025/636 (PDF ) Impossible Differential Attack on SAND-64 Nobuyuki Sugio
2025/635 (PDF ) Towards Scalable YOSO MPC via Packed Secret-Sharing Daniel Escudero, Elisaweta Masserova, Antigoni Polychroniadou
2025/634 (PDF ) Cryptography based on 2D Ray Tracing Sneha Mohanty, Christian Schindelhauer
2025/633 (PDF ) Hybrid-query bounds with partial input control - framework and application to tight M-eTCR Andreas Hülsing, Mikhail Kudinov, Christian Majenz
2025/632 (PDF ) On breaking McEliece keys using brute force Lorenz Panny
2025/631 (PDF ) Dyna-hinTS: Silent Threshold Signatures for Dynamic Committees Aniket Kate, Pratyay Mukherjee, Samipa Samanta, Pratik Sarkar
2025/630 (PDF ) Charge Your Clients: Payable Secure Computation and Its Applications Cong Zhang, Liqiang Peng, Weiran Liu, Shuaishuai Li, Meng Hao, Lei Zhang, Dongdai Lin
2025/629 (PDF ) Audience Injection Attacks: A New Class of Attacks on Web-Based Authorization and Authentication Standards Pedram Hosseyni, Ralf Kuesters, Tim Würtele
2025/628 (PDF ) Improving the Masked Division for the FALCON Signature Pierre-Augustin Berthet, Cédric Tavernier
2025/627 (PDF ) Everlasting Fully Dynamic Group Signatures Yimeng He, San Ling, Khai Hanh Tang, Huaxiong Wang
2025/626 (PDF ) Tree-based Quantum Carry-Save Adder Hyunjun Kim, Sejin Lim, Kyungbae Jang, Siyi Wang, Anubhab Baksi, Anupam Chattopadhyay, Hwajeong Seo
2025/625 (PDF ) FHECAP: An Encrypted Control System with Piecewise Continuous Actuation Song Bian, Yunhao Fu, Dong Zhao, Haowen Pan, Yuexiang Jin, Jiayue Sun, Hui Qiao, Zhenyu Guan
2025/624 (PDF ) Trapdoor one-way functions from tensors Anand Kumar Narayanan
2025/623 (PDF ) CertainSync: Rateless Set Reconciliation with Certainty Tomer Keniagin, Eitan Yaakobi, Ori Rottenstreich
2025/622 (PDF ) Byzantine Reliable Broadcast and Tendermint Consensus with trusted components Yackolley Amoussou-Guenou, Lionel Beltrando, Maurice Herlihy, Maria Potop-Butucaru
2025/621 (PDF ) SPHINCSLET: An Area-Efficient Accelerator for the Full SPHINCS+ Digital Signature Algorithm Sanjay Deshpande, Yongseok Lee, Cansu Karakuzu, Jakub Szefer, Yunheung Paek
2025/620 (PDF ) Need for zkSpeed: Accelerating HyperPlonk for Zero-Knowledge Proofs Alhad Daftardar, Jianqiao Mo, Joey Ah-kiow, Benedikt Bünz, Ramesh Karri, Siddharth Garg, Brandon Reagen
2025/619 (PDF ) Making BBS Anonymous Credentials eIDAS 2.0 Compliant Nicolas Desmoulins, Antoine Dumanois, Seyni Kane, Jacques Traoré
2025/618 (PDF ) Anonymous Self-Credentials and their Application to Single-Sign-On Jayamine Alupotha, Mariarosaria Barbaraci, Ioannis Kaklamanis, Abhimanyu Rawat, Christian Cachin, Fan Zhang
2025/617 (PDF ) Multi-Screaming-Channel Attacks: Frequency Diversity for Enhanced Attacks Jeremy Guillaume, Maxime Pelcat, Amor Nafkha, Ruben Salvador
2025/616 (PDF ) State Machine Replication Among Strangers, Fast and Self-Sufficient Juan Garay, Aggelos Kiayias, Yu Shen
2025/615 (PDF ) From at Least $n/3$ to at Most $3\sqrt{n}$: Correcting the Algebraic Immunity of the Hidden Weight Bit Function Pierrick Méaux
2025/614 (PDF ) Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound Yi Liu, Junzuo Lai, Peng Yang, Anjia Yang, Qi Wang, Siu-Ming Yiu, Jian Weng
2025/613 (PDF ) Low-Latency Rate-Distortion-Perception Trade-off: A Randomized Distributed Function Computation Application Onur Gunlu, Maciej Skorski, H. Vincent Poor
2025/612 (PDF ) More NTRU+Sign Signatures from Cyclotomic Trinomials Ga Hee Hong, Joo Woo, Jonghyun Kim, Minkyu Kim, Hochang Lee, Jong Hwan Park
2025/611 (PDF ) Proving CPU Executions in Small Space Vineet Nair, Justin Thaler, Michael Zhu
2025/610 (PDF ) Clubcards for the WebPKI: smaller certificate revocation tests in theory and practice John M. Schanck
2025/609 (PDF ) Random Oracle Combiners: Merkle-Damgård Style Yevgeniy Dodis, Eli Goldin, Peter Hall
2025/608 (PDF ) On some non-linear recurrences over finite fields linked to isogeny graphs Juan Jesús León, Vicente Muñoz
2025/607 (PDF ) Analytic and Simulation Results of a Gaussian Physically Unclonable Constant Based on Resistance Dispersion Riccardo Bernardini
2025/606 (PDF ) An attack on ML-DSA using an implicit hint Paco Azevedo-Oliveira, Jordan Beraud, Louis Goubin
2025/605 (PDF ) Laconic Cryptography with Preprocessing Rishabh Bhadauria, Nico Döttling, Carmit Hazay, Chuanwei Lin
2025/604 (PDF ) On the success rate of simple side-channel attacks against masking with unlimited attack traces Aymeric Hiltenbrand, Julien Eynard, Romain Poussier
2025/603 (PDF ) Mobile Byzantine Agreement in a Trusted World Bo Pan, Maria Potop Butucaru
2025/602 (PDF ) Lattice-Based Sanitizable Signature Schemes: Chameleon Hash Functions and More Sebastian Clermont, Samed Düzlü, Christian Janson, Laurens Porzenheim, Patrick Struck
2025/601 (PDF ) PHOENIX: Crypto-Agile Hardware Sharing for ML-KEM and HQC Antonio Ras, Antoine Loiseau, Mikaël Carmona, Simon Pontié, Guénaël Renault, Benjamin Smith, Emanuele Valea
2025/600 (PDF ) Improved Round-by-round Soundness IOPs via Reed-Muller Codes Dor Minzer, Kai Zhe Zheng
2025/599 (PDF ) Insecurity of One Decentralized Attribute-based Signature Scheme for Social Co-governance Zhengjun Cao, Lihua Liu
2025/598 (PDF ) Nominal State-Separating Proofs Markus Krabbe Larsen, Carsten Schürmann
2025/597 (PDF ) SoK: Self-Generated Nudes over Private Chats: How Can Technology Contribute to a Safer Sexting? Joel Samper, Bernardo Ferreira
2025/596 (PDF ) Highway to Hull: An Algorithm for Solving the General Matrix Code Equivalence Problem Alain Couvreur, Christophe Levrat
2025/595 (PDF ) Partial Key Exposure Attacks on UOV and Its Variants Yuki Seto, Hiroki Furue, Atsushi Takayasu
2025/594 (PDF ) Efficient SNARKs for Boolean Circuits via Sumcheck over Tower Fields Tianyi Liu, Yupeng Zhang
2025/593 (PDF ) Oblivious Immutable Memory Ananya Appan, David Heath
2025/592 (PDF ) DSM: Decentralized State Machine - The Missing Trust Layer of the Internet Brandon Ramsay
2025/591 (PDF ) ColliderVM: Stateful Computation on Bitcoin without Fraud Proofs Victor I. Kolobov, Avihu M. Levy, Moni Naor
2025/590 (PDF ) $\mathsf{GraSP}$: Secure Collaborative Graph Processing Made Scalable Siddharth Kapoor, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2025/589 (PDF ) Defeating AutoLock: From Simulation to Real-World Cache-Timing Exploits against TrustZone Quentin Forcioli, Sumanta Chaudhuri, Jean-Luc Danger
2025/588 (PDF ) A Place for Everyone vs Everyone in its Place: Measuring and Attacking the Ethereum Global Network Chenyu Li, Ren Zhang, Xiaorui Gong
2025/587 (PDF ) Lifeboats on the Titanic Cryptography Gideon Samid
2025/586 (PDF ) Heuristic Algorithm for Solving Restricted SVP and its Applications Geng Wang, Wenwen Xia, Dawu Gu
2025/585 (PDF ) Adaptively-Secure Big-Key Identity-Based Encryption Jeffrey Champion, Brent Waters, David J. Wu
2025/584 (PDF ) The Singularity Random Number Generator: Bridging Determinism and Unpredictability to Redefine Randomness, Secure Systems, and Adaptive Intelligence S. P. Prahlad
2025/583 (PDF ) Counter Galois Onion (CGO) for Tor: Fast Non-Malleable Onion Encryption Jean Paul Degabriele, Alessandro Melloni, Jean-Pierre Münch, Martijn Stam
2025/582 (PDF ) Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on the ML-DSA Cryptosystem Zheng Liu, An Wang, Congming Wei, Yaoling Ding, Jingqi Zhang, Annyu Liu, Liehuang Zhu
2025/581 (PDF ) Multi-Party Homomorphic Encryption with Dynamicity and Ciphertext Reusability Jung Hee Cheon, Hyeongmin Choe, Seunghong Kim, Yongdong Yeo
2025/580 (PDF ) Efficient Revocable Identity-Based Encryption from Middle-Product LWE Takumi Nishimura, Atsushi Takayasu
2025/579 (PDF ) REGKYC: Supporting Privacy and Compliance Enforcement for KYC in Blockchains Xihan Xiong, Michael Huth, William Knottenbelt
2025/578 (PDF ) Efficient Garbled Pseudorandom Functions and Lookup Tables from Minimal Assumption Wei-Kai Lin, Zhenghao Lu, Hong-Sheng Zhou
2025/577 (PDF ) Making GCM Great Again: Toward Full Security and Longer Nonces Woohyuk Chung, Seongha Hwang, Seongkwang Kim, Byeonghak Lee, Jooyoung Lee
2025/576 (PDF ) Pre-Constructed Publicly Verifiable Secret Sharing and Applications Karim Baghery, Noah Knapen, Georgio Nicolas, Mahdi Rahimi
2025/575 (PDF ) Wagner's Algorithm Provably Runs in Subexponential Time for SIS$^\infty$ Léo Ducas, Lynn Engelberts, Johanna Loyer
2025/574 (PDF ) Buffalo: A Practical Secure Aggregation Protocol for Buffered Asynchronous Federated Learning Riccardo Taiello, Clémentine Gritti, Melek Önen, Marco Lorenzi
2025/573 (PDF ) Forking Lemma in EasyCrypt Denis Firsov, Jakub Janků
2025/572 (PDF ) Zinnia: Expressive, Efficient Zero-Knowledge Framework for General-Purpose Data Analytics Zhantong Xue, Pingchuan Ma, Zhaoyu Wang, Shuai Wang
2025/571 (PDF ) Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange Shuya Hanai, Keisuke Tanaka, Masayuki Tezuka, Yusuke Yoshida
2025/570 (PDF ) Partial Key Overwrite Attacks in Microcontrollers: a Survey pcy Sluys, Lennert Wouters, Benedikt Gierlichs, Ingrid Verbauwhede
2025/569 (PDF ) Solving Data Availability Limitations in Client-Side Validation with UTxO Binding Yunwen Liu, Bo Wang, Ren Zhang
2025/568 (PDF ) An in-depth security evaluation of the Nintendo DSi gaming console pcy Sluys, Lennert Wouters, Benedikt Gierlichs, Ingrid Verbauwhede
2025/567 (PDF ) Making Uncertified DAG BFT Provably Live with Linear Payload and Quadratic Metadata Communication Nikita Polyanskii, Sebastian Mueller, Ilya Vorobyev
2025/566 (PDF ) Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities Subhadeep Banik, Hailun Yan
2025/565 (PDF ) Attacking soundness for an optimization of the Gemini Polynomial Commitment Scheme Lydia Garms, Michael Livesey
2025/564 (PDF ) Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V Linus Mainka, Kostas Papagiannopoulos
2025/563 (PDF ) An Optimized Instantiation of Post-Quantum MQTT protocol on 8-bit AVR Sensor Nodes YoungBeom Kim, Seog Chung Seo
2025/562 (PDF ) Analysis of One Certificateless Authentication and Key Agreement Scheme for Wireless Body Area Network Zhengjun Cao, Lihua Liu
2025/561 (PDF ) ThreatLens: LLM-guided Threat Modeling and Test Plan Generation for Hardware Security Verification Dipayan Saha, Hasan Al Shaikh, Shams Tarek, Farimah Farahmandi
2025/560 (PDF ) Jump, It Is Easy: JumpReLU Activation Function in Deep Learning-based Side-channel Analysis Abraham Basurto-Becerra, Azade Rezaeezade, Stjepan Picek
2025/559 (PDF ) Is Your Bluetooth Chip Leaking Secrets via RF Signals? Yanning Ji, Elena Dubrova, Ruize Wang
2025/558 (PDF ) Breaking and Fixing Content-Defined Chunking Kien Tuong Truong, Simon-Philipp Merz, Matteo Scarlata, Felix Günther, Kenneth G. Paterson
2025/557 (PDF ) Soloist: Distributed SNARK for R1CS with Constant Proof Size Weihan Li, Zongyang Zhang, Yun Li, Pengfei Zhu, Cheng Hong, Jianwei Liu
2025/556 (PDF ) Private SCT Auditing, Revisited Lena Heimberger, Christopher Patton, Bas Westerbaan
2025/555 (PDF ) Strong Federated Authentication With Password-based Credential Against Identity Server Corruption Changsong Jiang, Chunxiang Xu, Guomin Yang, Li Duan, Jing Wang
2025/554 (PDF ) Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix Joseph Jaeger, Akshaya Kumar
2025/553 (PDF ) HIPR: Hardware IP Protection through Low-Overhead Fine-Grain Redaction Aritra Dasgupta, Sudipta Paria, Swarup Bhunia
2025/552 (PDF ) Black Box Crypto is Useless for Doubly Efficient PIR Wei-Kai Lin, Ethan Mook, Daniel Wichs
2025/551 (PDF ) ANARKey: A New Approach to (Socially) Recover Keys Aniket Kate, Pratyay Mukherjee, Hamza Saleem, Pratik Sarkar, Bhaskar Roberts
2025/550 (PDF ) Exact Formula for RX-Differential Probability through Modular Addition for All Rotations Alex Biryukov, Baptiste Lambin, Aleksei Udovenko
2025/549 (PDF ) Public Key Accumulators for Revocation of Non-Anonymous Credentials Andrea Flamini, Silvio Ranise, Giada Sciarretta, Mario Scuro, Nicola Smaniotto, Alessandro Tomasi
2025/548 (PDF ) Breaking HuFu with 0 Leakage: A Side-Channel Analysis Julien Devevey, Morgane Guerreau, Thomas Legavre, Ange Martinelli, Thomas Ricosset
2025/547 (PDF ) Improved Cryptanalysis of FEA-1 and FEA-2 using Square Attacks Abhishek Kumar, Amit Kumar Chauhan, Somitra Kumar Sanadhya
2025/546 (PDF ) BugWhisperer: Fine-Tuning LLMs for SoC Hardware Vulnerability Detection Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Farimah Farahmandi
2025/545 (PDF ) Enhancing E-Voting with Multiparty Class Group Encryption Michele Battagliola, Giuseppe D'Alconzo, Andrea Gangemi, Chiara Spadafora
2025/544 (PDF ) Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies Théophile Brézot, Chloé Hébant, Paola de Perthuis, David Pointcheval
2025/543 (PDF ) Models of Kummer lines and Galois representations Razvan Barbulescu, Damien Robert, Nicolas Sarkis
2025/542 (PDF ) That’s AmorE: Amortized Efficiency for Pairing Delegation Adrián Pérez Keilty, Diego F. Aranha, Elena Pagnin, Francisco Rodríguez-Henríquez
2025/541 (PDF ) Physical Design-Aware Power Side-Channel Leakage Assessment Framework using Deep Learning Dipayan Saha, Jingbo Zhou, Farimah Farahmandi
2025/540 (PDF ) Tangram: Encryption-friendly SNARK framework under Pedersen committed engines Gweonho Jeong, Myeongkyun Moon, Geonho Yoon, Hyunok Oh, Jihye Kim
2025/539 (PDF ) Aegis: Scalable Privacy-preserving CBDC Framework with Dynamic Proof of Liabilities Gweonho Jeong, Jaewoong Lee, Minhae Kim, Byeongkyu Han, Jihye Kim, Hyunok Oh
2025/538 (PDF ) Efficient Proofs of Possession for Legacy Signatures Anna P. Y. Woo, Alex Ozdemir, Chad Sharp, Thomas Pornin, Paul Grubbs
2025/537 (PDF ) Improved Framework of Related-key Differential Neural Distinguisher and Applications to the Standard Ciphers Rui-Tao Su, Jiong-Jiong Ren, Shao-Zhen Chen
2025/536 (PDF ) A Fiat–Shamir Transformation From Duplex Sponges Alessandro Chiesa, Michele Orrù
2025/535 (PDF ) zkPyTorch: A Hierarchical Optimized Compiler for Zero-Knowledge Machine Learning Tiancheng Xie, Tao Lu, Zhiyong Fang, Siqi Wang, Zhenfei Zhang, Yongzheng Jia, Dawn Song, Jiaheng Zhang
2025/534 (PDF ) Plonkify: R1CS-to-Plonk transpiler Pengfei Zhu
2025/533 (PDF ) JesseQ: Efficient Zero-Knowledge Proofs for Circuits over Any Field Mengling Liu, Yang Heng, Xingye Lu, Man Ho Au
2025/532 (PDF ) Chunking Attacks on File Backup Services using Content-Defined Chunking Boris Alexeev, Colin Percival, Yan X Zhang
2025/531 (PDF ) Understanding the new distinguisher of alternant codes at degree 2 Axel Lemoine, Rocco Mora, Jean-Pierre Tillich
2025/529 (PDF ) On the Anonymity in "A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments" Zhengjun Cao, Lihua Liu
2025/528 (PDF ) VeRange: Verification-efficient Zero-knowledge Range Arguments with Transparent Setup for Blockchain Applications and More Yue Zhou, Sid Chi-Kin Chau
2025/527 (PDF ) SoK: Fully-homomorphic encryption in smart contracts Daniel Aronoff, Adithya Bhat, Panagiotis Chatzigiannis, Mohsen Minaei, Srinivasan Raghuraman, Robert M. Townsend, Nicolas Xuan-Yi Zhang
2025/526 (PDF ) AI Agents in Cryptoland: Practical Attacks and No Silver Bullet Atharv Singh Patlan, Peiyao Sheng, S. Ashwin Hebbar, Prateek Mittal, Pramod Viswanath
2025/525 (PDF ) Deniable Secret Sharing Ran Canetti, Ivan Damgård, Sebastian Kolby, Divya Ravi, Sophia Yakoubov
2025/524 (PDF ) Ring Referral: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User Anonymity for Decentralized Identity and More The-Anh Ta, Xiangyu Hui, Sid Chi-Kin Chau
2025/523 (PDF ) Assembly optimised Curve25519 and Curve448 implementations for ARM Cortex-M4 and Cortex-M33 Emil Lenngren
2025/522 (PDF ) New Techniques for Analyzing Fully Secure Protocols: A Case Study of Solitary Output Secure Computation Bar Alon, Benjamin Saldman, Eran Omri
2025/521 (PDF ) Division polynomials for arbitrary isogenies Katherine E. Stange
2025/520 (PDF ) Masking-Friendly Post-Quantum Signatures in the Threshold-Computation-in-the-Head Framework Thibauld Feneuil, Matthieu Rivain, Auguste Warmé-Janville
2025/519 (PDF ) mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software Brieuc Balon, Lorenzo Grassi, Pierrick Méaux, Thorben Moos, François-Xavier Standaert, Matthias Johann Steiner
2025/518 (PDF ) Secret-Sharing Schemes for General Access Structures: An Introduction Amos Beimel
2025/517 (PDF ) Designated-Verifier SNARGs with One Group Element Gal Arnon, Jesko Dujmovic, Yuval Ishai
2025/516 (PDF ) Don't Use It Twice: Reloaded! On the Lattice Isomorphism Group Action Alessandro Budroni, Jesús-Javier Chi-Domínguez, Ermes Franch
2025/515 (PDF ) Compressed Sigma Protocols: New Model and Aggregation Techniques Yuxi Xue, Tianyu Zheng, Shang Gao, Bin Xiao, Man Ho Au
2025/514 (PDF ) On Extractability of the KZG Family of Polynomial Commitment Schemes Juraj Belohorec, Pavel Dvořák, Charlotte Hoffmann, Pavel Hubáček, Kristýna Mašková, Martin Pastyřík
2025/513 (PDF ) Server-Aided Anonymous Credentials Rutchathon Chairattana-Apirom, Franklin Harding, Anna Lysyanskaya, Stefano Tessaro
2025/512 (PDF ) Optimizing AES-GCM on ARM Cortex-M4: A Fixslicing and FACE-Based Approach Hyunjun Kim, Hwajeong Seo
2025/511 (PDF ) VeriSSO: A Privacy-Preserving Legacy-Compatible Single Sign-On Protocol Using Verifiable Credentials Ifteher Alom, Sudip Bhujel, Yang Xiao
2025/510 (PDF ) Adaptive Adversaries in Byzantine-Robust Federated Learning: A survey. Jakub Kacper Szeląg, Ji-Jian Chin, Sook-Chin Yip
2025/509 (PDF ) Almost Optimal KP and CP-ABE for Circuits from Succinct LWE Hoeteck Wee
2025/508 (PDF ) Towards Building Scalable Constant-Round MPC from Minimal Assumptions via Round Collapsing Vipul Goyal, Junru Li, Rafail Ostrovsky, Yifan Song
2025/507 (PDF ) Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning Meng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang
2025/506 (PDF ) On the Estonian Internet Voting System, IVXV, SoK and Suggestions Shymaa M. Arafat
2025/505 (PDF ) Capitalized Bitcoin Fork for National Strategic Reserve Charanjit Singh Jutla, Arnab Roy
2025/504 (PDF ) Ideal Compartmented Secret Sharing Scheme Based on the Chinese Remainder Theorem for Polynomial Rings Alexandru-Valentin Basaga, Sorin Iftene
2025/503 (PDF ) Max Bias Analysis: A New Approach on Computing the Entropy of Free Ring-Oscillator Nicolas David, Eric Garrido
2025/502 (PDF ) Registration-Based Encryption in the Plain Model Jesko Dujmovic, Giulio Malavolta, Wei Qi
2025/501 (PDF ) Quantum Key-Recovery Attacks on Permutation-Based Pseudorandom Functions Hong-Wei Sun, Fei Gao, Rong-Xue Xu, Dan-Dan Li, Zhen-Qiang Li, Ke-Jia Zhang
2025/500 (PDF ) SecurED: Secure Multiparty Edit Distance for Genomic Sequences Jiahui Gao, Yagaagowtham Palanikuma, Dimitris Mouris, Duong Tung Nguyen, Ni Trieu
2025/499 (PDF ) SCAPEgoat: Side-channel Analysis Library Dev Mehta, Trey Marcantino, Mohammad Hashemi, Sam Karkache, Dillibabu Shanmugam, Patrick Schaumont, Fatemeh Ganji
2025/498 (PDF ) Scoop: An Optimizer for Profiling Attacks against Higher-Order Masking Nathan Rousselot, Karine Heydemann, Loïc Masure, Vincent Migairou
2025/497 (PDF ) Fast Scloud+: A Fast Hardware Implementation for the Unstructured LWE-based KEM - Scloud+ Jing Tian, Yaodong Wei, Dejun Xu, Kai Wang, Anyu Wang, Zhiyuan Qiu, Fu Yao, Guang Zeng
2025/496 (PDF ) Shortcut2Secrets: A Table-based Differential Fault Attack Framework Weizhe Wang, Pierrick Méaux, Deng Tang
2025/495 (PDF ) A Security-Enhanced Pairing-Free Certificateless Aggregate Signature for Vehicular Ad-Hoc Networks, Revisited Zhengjun Cao, Lihua Liu
2025/493 (PDF ) Tighter Concrete Security for the Simplest OT Iftach Haitner, Gil Segev
2025/491 (PDF ) Blind Brother: Attribute-Based Selective Video Encryption Eugene Frimpong, Bin Liu, Camille Nuoskala, Antonis Michalas
2025/490 (PDF ) PREAMBLE: Private and Efficient Aggregation of Block Sparse Vectors and Applications Hilal Asi, Vitaly Feldman, Hannah Keller, Guy N. Rothblum, Kunal Talwar
2025/489 (PDF ) Translating Between the Common Haar Random State Model and the Unitary Model Eli Goldin, Mark Zhandry
2025/488 (PDF ) Exploring General Cyclotomic Rings in Torus-Based Fully Homomorphic Encryption Philippe Chartier, Michel Koskas, Mohammed Lemou
2025/487 (PDF ) webSPDZ: Versatile MPC on the Web Thomas Buchsteiner, Karl W. Koch, Dragos Rotaru, Christian Rechberger
2025/486 (PDF ) On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations Omri Shmueli, Mark Zhandry
2025/485 (PDF ) Key reconstruction for QC-MDPC McEliece from imperfect distance spectrum Motonari Ohtsuka, Takahiro Ishimaru, Rei Iseki, Shingo Kukita, Kohtaro Watanabe
2025/484 (PDF ) EvoLUTe+: Fine-Grained Look-Up-Table-based RTL IP Redaction Rui Guo, M Sazadur Rahman, Jingbo Zhou, Hadi M Kamali, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2025/483 (PDF ) Adaptively Secure Threshold Blind BLS Signatures and Threshold Oblivious PRF Stanislaw Jarecki, Phillip Nazarian
2025/482 (PDF ) An Efficient Sequential Aggregate Signature Scheme with Lazy Verification Arinjita Paul, Sabyasachi Dutta, Kouichi Sakurai, C. Pandu Rangan
2025/481 (PDF ) RHQC: post-quantum ratcheted key exchange from coding assumptions Julien Juaneda, Marina Dehez-Clementi, Jean-Christophe Deneuville, Jérôme Lacan
2025/480 (PDF ) Worst-case Analysis of Lattice Enumeration Algorithm over Modules Jiseung Kim, Changmin Lee, Yongha Son
2025/479 (PDF ) Post Quantum Migration of Tor Denis Berger, Mouad Lemoudden, William J Buchanan
2025/478 (PDF ) Attacking Single-Cycle Ciphers on Modern FPGAs featuring Explainable Deep Learning Mustafa Khairallah, Trevor Yap
2025/477 (PDF ) A Note on the Advanced Use of the Tate Pairing Krijn Reijnders
2025/476 (PDF ) A note on "industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training" Zhengjun Cao, Lihua Liu
2025/475 (PDF ) HammR: A ZKP Protocol for Fixed Hamming-Weight Restricted-Entry Vectors Felice Manganiello, Freeman Slaughter
2025/474 (PDF ) Black-Box Constant-Round Secure 2PC with Succinct Communication Michele Ciampi, Ankit Kumar Misra, Rafail Ostrovsky, Akash Shah
2025/473 (PDF ) Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE Faneela, Jawad Ahmad, Baraq Ghaleb, Sana Ullah Jan, William J Buchanan
2025/472 (PDF ) Quantum Attacks on Sum of Even-Mansour Construction Utilizing Online Classical Queries Zhenqiang Li, Shuqin Fan, Fei Gao, Yonglin Hao, Hongwei Sun, Xichao Hu, Dandan Li
2025/471 (PDF ) A Practical Tutorial on Deep Learning-based Side-channel Analysis Sengim Karayalcin, Marina Krcek, Stjepan Picek
2025/470 (PDF ) On Deniable Authentication against Malicious Verifiers Rune Fiedler, Roman Langrehr
2025/469 (PDF ) Practical Semi-Open Chat Groups for Secure Messaging Applications Alex Davidson, Luiza Soezima, Fernando Virdia
2025/468 (PDF ) Optimized Frobenius and Cyclotomic Cubing for Enhanced Pairing Computation Leila Ben Abdelghani, Nadia El Mrabet, Loubna Ghammam, Lina Mortajine
2025/467 (PDF ) PMNS arithmetic for elliptic curve cryptography Fangan Yssouf Dosso, Sylvain Duquesne, Nadia El Mrabet, Emma Gautier
2025/466 (PDF ) Algebraic Cryptanalysis of Small-Scale Variants of Stream Cipher E0 Jan Dolejš, Martin Jureček
2025/465 (PDF ) zkAML: Zero-knowledge Anti Money Laundering in Smart Contracts with whitelist approach Donghwan Oh, Semin Han, Jihye Kim, Hyunok Oh, Jiyeal Chung, Jieun Lee, Hee-jun Yoo, Tae wan Kim
2025/464 (PDF ) SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields Jean Paul Degabriele, Jan Gilcher, Jérôme Govinden, Kenneth G. Paterson
2025/463 (PDF ) Multi-Party Computation in Corporate Data Processing: Legal and Technical Insights Sebastian Becker, Christoph Bösch, Benjamin Hettwer, Thomas Hoeren, Merlin Rombach, Sven Trieflinger, Hossein Yalame
2025/462 (PDF ) Practical Key Collision on AES and Kiasu-BC Jianqiang Ni, Yingxin Li, Fukang Liu, Gaoli Wang
2025/461 (PDF ) Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth Thomas Haines, Rajeev Goré, Mukesh Tiwari
2025/460 (PDF ) Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training Truong Son Nguyen, Yi Ren, Guangyu Nie, Ni Trieu
2025/459 (PDF ) Privacy and Security of FIDO2 Revisited Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Kaishuo Cheng, Luís Esquível
2025/458 (PDF ) CAKE requires programming - On the provable post-quantum security of (O)CAKE Kathrin Hövelmanns, Andreas Hülsing, Mikhail Kudinov, Silvia Ritsch
2025/457 (PDF ) A 10-bit S-box generated by Feistel construction from cellular automata Thomas Prévost, Bruno Martin
2025/456 (PDF ) A Democratic Distributed Post-Quantum Certificateless Encryption Scheme Thomas Prévost, Bruno Martin, Olivier Alibart
2025/455 (PDF ) StaMAC: Fault Protection via Stable-MAC Tags Siemen Dhooghe, Artemii Ovchinnikov, Dilara Toprakhisar
2025/454 (PDF ) Quantum circuit for implementing AES S-box with low costs Huinan Chen, Binbin Cai, Fei Gao, Song Lin
2025/453 (PDF ) Verifiable Secret Sharing Based on Fully Batchable Polynomial Commitment for Privacy-Preserving Distributed Computation Xiangyu Kong, Min Zhang, Yu Chen
2025/452 (PDF ) Polar Lattice Cryptography Gideon Samid
2025/451 (PDF ) Analysis of the Telegram Key Exchange Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Eyal Ronen, Igors Stepanovs
2025/450 (PDF ) Verifiable Decapsulation: Recognizing Faulty Implementations of Post-Quantum KEMs Lewis Glabush, Felix Günther, Kathrin Hövelmanns, Douglas Stebila
2025/449 (PDF ) Concretely Efficient Correlated Oblivious Permutation Feng Han, Xiao Lan, Weiran Liu, Lei Zhang, Hao Ren, Lin Qu, Yuan Hong
2025/448 (PDF ) Ciphertext-Ciphertext Matrix Multiplication: Fast for Large Matrices Jai Hyun Park
2025/447 (PDF ) Protecting Computations Against Continuous Bounded-Communication Leakage Yuval Ishai, Yifan Song
2025/446 (PDF ) Disincentivize Collusion in Verifiable Secret Sharing Tiantian Gong, Aniket Kate, Hemanta K. Maji, Hai H. Nguyen
2025/445 (PDF ) A proof of P≠NP (New symmetric encryption algorithm against any linear attacks and differential attacks) Gao Ming
2025/444 (PDF ) Multiparty Garbling from OT with Linear Scaling and RAM Support David Heath, Vladimir Kolesnikov, Varun Narayanan, Rafail Ostrovsky, Akash Shah
2025/443 (PDF ) Homomorphic Signature-based Witness Encryption and Applications Alireza Kavousi, István András Seres
2025/442 (PDF ) A Unified Framework for Succinct Garbling from Homomorphic Secret Sharing Yuval Ishai, Hanjun Li, Huijia Lin
2025/441 (PDF ) High-Order Masking of BIKE Matthias Trannoy
2025/440 (PDF ) AI for Code-based Cryptography Mohamed Malhou, Ludovic Perret, Kristin Lauter
2025/439 (PDF ) Preimage Attacks on up to 5 Rounds of SHA-3 Using Internal Differentials Zhongyi Zhang, Chengan Hou, Meicheng Liu
2025/438 (PDF ) Transmitting Secrets by Transmitting only Plaintext Gideon Samid
2025/437 (PDF ) Improved Cryptanalysis of ChaCha: Beating PNBs with Bit Puncturing Antonio Flórez-Gutiérrez, Yosuke Todo
2025/436 (PDF ) The Algebraic One-More MISIS Problem and Applications to Threshold Signatures Chenzhi Zhu, Stefano Tessaro
2025/435 (PDF ) Constant-Time Code: The Pessimist Case Thomas Pornin
2025/434 (PDF ) Fine-Grained Verifier NIZK and Its Applications Shuai Han, Shengli Liu, Xiangyu Liu, Dawu Gu
2025/433 (PDF ) MIDAS: an End-to-end CAD Framework for Automating Combinational Logic Locking Akashdeep Saha, Siddhartha Chowdhury, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
2025/432 (PDF ) Black-Box (and Fast) Non-Malleable Zero Knowledge Vincenzo Botta, Michele Ciampi, Emmanuela Orsini, Luisa Siniscalchi, Ivan Visconti
2025/431 (PDF ) Commitment Schemes Based on Module-LIP Hengyi Luo, Kaijie Jiang, Renjie Jin, Yanbin Pan, Anyu Wang
2025/430 (PDF ) Non-interactive Anonymous Tokens with Private Metadata Bit Foteini Baldimtsi, Lucjan Hanzlik, Quan Nguyen, Aayush Yadav
2025/429 (PDF ) Enhanced CKKS Bootstrapping with Generalized Polynomial Composites Approximation Seonhong Min, Joon-Woo Lee, Yongsoo Song
2025/428 (PDF ) On Improved Cryptanalytic Results against ChaCha for Reduced Rounds ≥ 7 Nitin Kumar Sharma, Sabyasachi Dey, Santanu Sarkar, Subhamoy Maitra
2025/427 (PDF ) BUFFing Threshold Signature Schemes Marc Fischlin, Aikaterini Mitrokotsa, Jenit Tomy
2025/426 (PDF ) Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable Keitaro Hashimoto, Shuichi Katsumata, Guillermo Pascual-Perez
2025/425 (PDF ) A Note on the Blindness of the Scheme from ePrint 2025/397 Lucjan Hanzlik
2025/424 (PDF ) Matchmaker: Fast Secure Inference across Deployment Scenarios Neha Jawalkar, Nishanth Chandran, Divya Gupta, Rahul Sharma, Arkaprava Basu
2025/423 (PDF ) Multi-Client Attribute-Based Unbounded Inner Product Functional Encryption, and More Subhranil Dutta, Aikaterini Mitrokotsa, Tapas Pal, Jenit Tomy
2025/422 (PDF ) Private Computation on Common Fuzzy Records Kyoohyung Han, Seongkwang Kim, Yongha Son
2025/421 (PDF ) A Note on Obfuscation-based Attacks on Private-coin Evasive LWE Tzu-Hsiang Huang, Wei-Hsiang Hung, Shota Yamada
2025/420 (PDF ) Non-Interactive Verifiable Aggregation Ojaswi Acharya, Suvasree Biswas, Weiqi Feng, Adam O'Neill, Arkady Yerukhimovich
2025/419 (PDF ) Samaritan: Linear-time Prover SNARK from New Multilinear Polynomial Commitments Chaya Ganesh, Sikhar Patranabis, Nitin Singh
2025/418 (PDF ) ProofFrog: A Tool For Verifying Game-Hopping Proofs Ross Evans, Matthew McKague, Douglas Stebila
2025/417 (PDF ) Evaluation of Privacy-aware Support Vector Machine (SVM) Learning using Homomorphic Encryption William J Buchanan, Hisham Ali
2025/416 (PDF ) Trapdoor Hash Functions and PIR from Low-Noise LPN Damiano Abram, Giulio Malavolta, Lawrence Roy
2025/415 (PDF ) On the Soundness of Algebraic Attacks against Code-based Assumptions Miguel Cueto Noval, Simon-Philipp Merz, Patrick Stählin, Akin Ünal
2025/414 (PDF ) Deimos Cipher: A High-Entropy, Secure Encryption Algorithm with Strong Diffusion and Key Sensitivity Mohsin Belam
2025/413 (PDF ) Garblet: Multi-party Computation for Protecting Chiplet-based Systems Mohammad Hashemi, Shahin Tajik, Fatemeh Ganji
2025/412 (PDF ) Multi-Authority Encryption with Malicious Authorities Rishab Goyal, Saikumar Yadugiri
2025/411 (PDF ) Security of the Ascon Authenticated Encryption Mode in the Presence of Quantum Adversaries Nathalie Lang, Stefan Lucks, Bart Mennink, Suprita Talnikar
2025/410 (PDF ) TreeKEM: A Modular Machine-Checked Symbolic Security Analysis of Group Key Agreement in Messaging Layer Security Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan
2025/409 (PDF ) Low Communication Threshold FHE from Standard (Module-)LWE Hiroki Okada, Tsuyoshi Takagi
2025/408 (PDF ) Hybrid Obfuscated Key Exchange and KEMs Felix Günther, Michael Rosenberg, Douglas Stebila, Shannon Veitch
2025/407 (PDF ) Delegatable ABE with $O(1)$ Delegations from Witness Encryption Rishab Goyal, Saikumar Yadugiri
2025/406 (PDF ) AsyRand: asynchronous distributed randomness beacon with reconfiguration Liang Zhang, Tao Liu, Haibin Kan, Jiheng Zhang
2025/404 (PDF ) SNARKs for Stateful Computations on Authenticated Data Johannes Reinhart, Erik-Oliver Blass, Bjoern Annighoefer
2025/403 (PDF ) Unlocking Mix-Basis Potential: Geometric Approach for Combined Attacks Kai Hu, Chi Zhang, Chengcheng Chang, Jiashu Zhang, Meiqin Wang, Thomas Peyrin
2025/402 (PDF ) Mix-Basis Geometric Approach to Boomerang Distinguishers Chengcheng Chang, Hosein Hadipour, Kai Hu, Muzhou Li, Meiqin Wang
2025/401 (PDF ) PEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogenies Pierrick Dartois, Jonathan Komada Eriksen, Tako Boris Fouotsa, Arthur Herlédan Le Merdy, Riccardo Invernizzi, Damien Robert, Ryan Rueger, Frederik Vercauteren, Benjamin Wesolowski
2025/400 (PDF ) Re-Randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Tang Gang, Yanbin Pan, Xiaoyun Wang
2025/399 (PDF ) Computational Quantum Anamorphic Encryption and Anamorphic Secret Sharing SAYANTAN GANGULY, Shion Samadder Chaudhury
2025/398 (PDF ) Tight Adaptive Simulation Security for Identity-based Inner-Product FE in the (Quantum) Random Oracle Model Tenma Edamura, Atsushi Takayasu
2025/397 (PDF ) Blind Signatures from Cryptographic Group Actions Dung Hoang Duong, Xuan Thanh Khuc, Youming Qiao, Willy Susilo, Chuanqi Zhang
2025/396 (PDF ) Trail-Estimator: An Automated Verifier for Differential Trails in Block Ciphers Thomas Peyrin, Quan Quan Tan, Hongyi Zhang, Chunning Zhou
2025/395 (PDF ) Provably Secure Approximate Computation Protocols from CKKS Intak Hwang, Yisol Hwang, Miran Kim, Dongwon Lee, Yongsoo Song
2025/394 (PDF ) Reducing the Number of Qubits in Solving LWE Barbara Jiabao Benedikt
2025/393 (PDF ) An Efficient Quantum Oblivious Transfer Protocol Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath, Sihem Mesnager
2025/392 (PDF ) Blockchain-based Secure D2D localisation with adaptive precision Gewu Bu, Bilel Zaghdoudi, Maria Potop-Butucaru, Serge Fdida
2025/391 (PDF ) Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity Shafik Nassar, Brent Waters, David J. Wu
2025/390 (PDF ) Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption (Part II: zeroizing attacks against private-coin evasive LWE assumptions) Yao-Ching Hsieh, Aayush Jain, Huijia Lin
2025/389 (PDF ) An ETSI GS QKD compliant TLS implementation Thomas Prévost, Bruno Martin, Olivier Alibart
2025/388 (PDF ) Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures Ruben Baecker, Paul Gerhart, Jonathan Katz, Dominique Schröder
2025/387 (PDF ) Generic Composition: From Classical to Quantum Security Nathalie Lang, Jannis Leuther, Stefan Lucks
2025/386 (PDF ) How Small Can S-boxes Be Chenhao Jia, Tingting Cui, Qing Ling, Yan He, Kai Hu, Yu Sun, Meiqin Wang
2025/385 (PDF ) MERCURY: A multilinear Polynomial Commitment Scheme with constant proof size and no prover FFTs Liam Eagen, Ariel Gabizon
2025/383 (PDF ) Pencil: A Domain-Extended PRF with Full $n$-bit Security for Strengthening GCM and More Ritam Bhaumik, Jean Paul Degabriele
2025/382 (PDF ) On the Security and Privacy of CKKS-based Homomorphic Evaluation Protocols Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song
2025/381 (PDF ) Faster FHEW Bootstrapping with Adaptive Key Update Qi Zhang, Mingqiang Wang, Xiaopeng Cheng
2025/380 (PDF ) A New Generalized Attack on RSA-like Cryptosystems Michel Seck, Oumar Niang, Djiby Sow, Abderrahmane Nitaj, Mengce Zheng, Maher Boudabra
2025/379 (PDF ) A Complete Security Proof of SQIsign Marius A. Aardal, Andrea Basso, Luca De Feo, Sikhar Patranabis, Benjamin Wesolowski
2025/378 (PDF ) Side-Channel and Fault Injection Attacks on VOLEitH Signature Schemes: A Case Study of Masked FAEST Sönke Jendral, Elena Dubrova
2025/377 (PDF ) HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency Han Chen, Tao Huang, Phuong Pham, Shuang Wu
2025/376 (PDF ) Another Look at the Quantum Security of the Vectorization Problem with Shifted Inputs Paul Frixons, Valerie Gilchrist, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Lam L. Pham
2025/375 (PDF ) Zeroizing Attacks against Evasive and Circular Evasive LWE Shweta Agrawal, Anuja Modi, Anshu Yadav, Shota Yamada
2025/374 (PDF ) Simple and General Counterexamples for Private-Coin Evasive LWE Nico Döttling, Abhishek Jain, Giulio Malavolta, Surya Mathialagan, Vinod Vaikuntanathan
2025/373 (PDF ) Split Prover Zero-Knowledge SNARKs Sanjam Garg, Aarushi Goel, Dimitris Kolonelos, Sina Shiehian, Rohit Sinha
2025/372 (PDF ) KLPT²: Algebraic Pathfinding in Dimension Two and Applications Wouter Castryck, Thomas Decru, Péter Kutas, Abel Laval, Christophe Petit, Yan Bo Ti
2025/371 (PDF ) Functional Oblivious Transfer with Applications in Privacy-Preserving Machine Learning Aydin Abadi, Mohammad Naseri
2025/370 (PDF ) Simple Public Key Anamorphic Encryption and Signature using Multi-Message Extensions Shalini Banerjee, Tapas Pal, Andy Rupp, Daniel Slamanig
2025/369 (PDF ) Higher Residuosity Attacks on Small RSA Subgroup Decision Problems Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Zhusen Liu
2025/368 (PDF ) Polynomial Secret Sharing Schemes and Algebraic Matroids Amos Beimel, Oriol Farràs, Adriana Moya
2025/367 (PDF ) Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally Martin R. Albrecht, Russell W. F. Lai, Oleksandra Lapiha, Ivy K. Y. Woo
2025/366 (PDF ) Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY Amin Abdulrahman, Matthias J. Kannwischer, Thing-Han Lim
2025/365 (PDF ) Lattice-Based Updatable Public-Key Encryption for Group Messaging Joël Alwen, Georg Fuchsbauer, Marta Mularczyk, Doreen Riepel
2025/364 (PDF ) Traitor Tracing in Multi-sender Setting ($\textsf{TMCFE}$: Traceable Multi-client Functional Encryption) Xuan Thanh Do, Dang Truong Mac, Ky Nguyen, Duong Hieu Phan, Quoc-Huy Vu
2025/363 (PDF ) The Security of Hash-and-Sign with Retry against Superposition Attacks Haruhisa Kosuge, Keita Xagawa
2025/362 (PDF ) Adaptively Secure Fully Homomorphic Message Authentication Code with Pre-processable Verification Jeongsu Kim, Aaram Yun
2025/361 (PDF ) Predicate Encryption from Lattices: Enhanced Compactness and Refined Functionality Yuejun Wang, Baocang Wang, Qiqi Lai, Huaxiong Wang
2025/360 (PDF ) Vanishing Short Integer Solution, Revisited: Reductions, Trapdoors, Homomorphic Signatures for Low-Degree Polynomials Kalle Jyrkinen, Russell W. F. Lai
2025/359 (PDF ) A Note on Zero-Knowledge Simulator of the CROSS Identification Protocol Shai Levin
2025/358 (PDF ) The Complexity of Memory Checking with Covert Security Elette Boyle, Ilan Komargodski, Neekon Vafa
2025/357 (PDF ) Random Number Generation from Pulsars Hayder Tirmazi
2025/356 (PDF ) Lattice-based Proof-Friendly Signatures from Vanishing Short Integer Solutions Adrien Dubois, Michael Klooß, Russell W. F. Lai, Ivy K. Y. Woo
2025/355 (PDF ) Commit-and-Prove System for Vectors and Applications to Threshold Signing Anja Lehmann, Cavit Özbay
2025/354 (PDF ) Delayed-Input Multi-Party Computation Michele Ciampi, Jure Sternad, Yu Xia
2025/353 (PDF ) Stronger Security for Threshold Blind Signatures Anja Lehmann, Phillip Nazarian, Cavit Özbay
2025/352 (PDF ) Efficient NIZK Arguments with Straight-Line Simulation and Extraction Michele Ciampi, Ivan Visconti
2025/351 (PDF ) Thorough Power Analysis on Falcon Gaussian Samplers and Practical Countermeasure Xiuhan Lin, Shiduo Zhang, Yang Yu, Weijia Wang, Qidi You, Ximing Xu, Xiaoyun Wang
2025/350 (PDF ) Bootstrapping with RMFE for Fully Homomorphic Encryption Khin Mi Mi Aung, Enhui Lim, Jun Jie Sim, Benjamin Hong Meng Tan, Huaxiong Wang
2025/349 (PDF ) Efficient Distributed Randomness Generation from Minimal Assumptions where PArties Speak Sequentially Once Chen-Da Liu-Zhang, Elisaweta Masserova, João Ribeiro, Pratik Soni, Sri AravindaKrishnan Thyagarajan
2025/348 (PDF ) Juicebox Protocol: Distributed Storage and Recovery of Secrets Using Simple PIN Authentication Nora Trapp, Diego Ongaro
2025/347 (PDF ) Helix: Scalable Multi-Party Machine Learning Inference against Malicious Adversaries Yansong Zhang, Xiaojun Chen, Qinghui Zhang, Xudong Chen, Ye Dong
2025/346 (PDF ) Homomorphic Encryption for Large Integers from Nested Residue Number Systems Dan Boneh, Jaehyung Kim
2025/345 (PDF ) Publicly Verifiable Threshold Proxy Re-encryption and Its Application in Data Rights Confirmation Tao Liu, Liang Zhang, Haibin Kan, Jiheng Zhang
2025/343 (PDF ) On The Multi-target Security of Post-Quantum Key Encapsulation Mechanisms Lewis Glabush, Kathrin Hövelmanns, Douglas Stebila
2025/342 (PDF ) Traceable Threshold Encryption without a Trusted Dealer Jan Bormet, Jonas Hofmann, Hussien Othman
2025/341 (PDF ) CCA-Secure Traceable Threshold (ID-based) Encryption and Application Rishiraj Bhattacharyya, Jan Bormet, Sebastian Faust, Pratyay Mukherjee, Hussien Othman
2025/340 (PDF ) Hollow LWE: A New Spin, Unbounded Updatable Encryption from LWE and PCE Martin R. Albrecht, Benjamin Benčina, Russell W. F. Lai
2025/339 (PDF ) Key-Homomorphic Computations for RAM: Fully Succinct Randomised Encodings and More Damiano Abram, Giulio Malavolta, Lawrence Roy
2025/338 (PDF ) CT-LLVM: Automatic Large-Scale Constant-Time Analysis Zhiyuan Zhang, Gilles Barthe
2025/337 (PDF ) IP Masking with Generic Security Guarantees under Minimum Assumptions, and Applications Sebastian Faust, Loïc Masure, Elena Micheli, Hai Hoang Nguyen, Maximilian Orlt, François-Xavier Standaert
2025/336 (PDF ) Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits Damiano Abram, Giulio Malavolta, Lawrence Roy
2025/335 (PDF ) Privacy-Preserving Multi-Signatures: Generic Techniques and Constructions Without Pairings Calvin Abou Haidar, Dipayan Das, Anja Lehmann, Cavit Özbay, Octavio Perez Kempner
2025/334 (PDF ) How to Share an NP Statement or Combiners for Zero-Knowledge Proofs Benny Applebaum, Eliran Kachlon
2025/333 (PDF ) Leap: A Fast, Lattice-based OPRF With Application to Private Set Intersection Lena Heimberger, Daniel Kales, Riccardo Lolato, Omid Mir, Sebastian Ramacher, Christian Rechberger
2025/332 (PDF ) Towards Leakage-Resilient Ratcheted Key Exchange Daniel Collins, Simone Colombo, Sina Schaeffler
2025/331 (PDF ) Private Multi-Party Neural Network Training over $\mathbb{Z}_{2^k}$ via Galois Rings Hengcheng Zhou
2025/330 (PDF ) (Multi-Input) FE for Randomized Functionalities, Revisited Pratish Datta, Jiaxin Guan, Alexis Korb, Amit Sahai
2025/329 (PDF ) Towards a White-Box Secure Fiat-Shamir Transformation Gal Arnon, Eylon Yogev
2025/328 (PDF ) Fully Asymmetric Anamorphic Homomorphic Encryption from LWE Amit Deo, Benoît Libert
2025/327 (PDF ) Bulletproofs for R1CS: Bridging the Completeness-Soundness Gap and a ZK Extension Gil Segev
2025/326 (PDF ) On the Adaptive Security of Free-XOR-based Garbling Schemes in the Plain Model Anasuya Acharya, Karen Azari, Chethan Kamath
2025/325 (PDF ) On Quantum Money and Evasive Obfuscation Mark Zhandry
2025/324 (PDF ) Fine-Grained Complexity in a World without Cryptography Josh Alman, Yizhi Huang, Kevin Yeo
2025/323 (PDF ) A Generic Approach to Adaptively-Secure Broadcast Encryption in the Plain Model Yao-Ching Hsieh, Brent Waters, David J. Wu
2025/321 (PDF ) Differential Cryptanalysis of the Reduced Pointer Authentication Code Function used in Arm’s FEAT_PACQARMA3 Feature Roberto Avanzi, Orr Dunkelman, Shibam Ghosh
2025/320 (PDF ) Committing Authenticated Encryption: Generic Transforms with Hash Functions Shan Chen, Vukašin Karadžić
2025/319 (PDF ) Single Trace Side-Channel Vulnerabilities Discovery Using Statistical Leakage Simulator Jinyi Qiu
2025/318 (PDF ) Traceable Verifiable Secret Sharing and Applications Karim Baghery, Ehsan Ebrahimi, Omid Mirzamohammadi, Mahdi Sedaghat
2025/317 (PDF ) Minicrypt PIR for Big Batches Nico Döttling, Jesko Dujmovic, Julian Loss, Maciej Obremski
2025/316 (PDF ) $\mathsf{Zinc}$: Succinct Arguments with Small Arithmetization Overheads from IOPs of Proximity to the Integers Albert Garreta, Hendrik Waldner, Katerina Hristova, Luca Dall'Ava
2025/315 (PDF ) Cryptanalysis of Full SCARF Antonio Flórez-Gutiérrez, Eran Lambooij, Gaëtan Leurent, Håvard Raddum, Tyge Tiessen, Michiel Verbauwhede
2025/314 (PDF ) Towards Optimally Secure Deterministic Authenticated Encryption Schemes Yu Long Chen, Avijit Dutta, Ashwin Jha, Mridul Nandi
2025/313 (PDF ) Lattice-based $\Sigma$-Protocols for Polynomial Relations with Standard Soundness Lizhen Zhang, Shang Gao, Bin Xiao
2025/312 (PDF ) Traceable Verifiable Random Functions Dan Boneh, Aditi Partap, Lior Rotem
2025/311 (PDF ) Malleable SNARKs and Their Applications Suvradip Chakraborty, Dennis Hofheinz, Roman Langrehr, Jesper Buus Nielsen, Christoph Striecks, Daniele Venturi
2025/310 (PDF ) Non-Interactive Key Exchange: New Notions, New Constructions, and Forward Security Suvradip Chakraborty, Dennis Hofheinz, Roman Langrehr
2025/309 (PDF ) A Unified Treatment of Anamorphic Encryption Wonseok Choi, Daniel Collins, Xiangyu Liu, Vassilis Zikas
2025/308 (PDF ) ChiLow and ChiChi: New Constructions for Code Encryption Yanis Belkheyar, Patrick Derbez, Shibam Ghosh, Gregor Leander, Silvia Mella, Léo Perrin, Shahram Rasoolzadeh, Lukas Stennes, Siwei Sun, Gilles Van Assche, Damian Vizár
2025/307 (PDF ) Quasi-Linear Indistinguishability Obfuscation via Mathematical Proofs of Equivalence and Applications Yaohua Ma, Chenxin Dai, Elaine Shi
2025/306 (PDF ) Dimensional e$\mathsf{ROS}$ion: Improving the $\mathsf{ROS}$ Attack with Decomposition in Higher Bases Antoine Joux, Julian Loss, Giacomo Santato
2025/305 (PDF ) The Malice of ELFs: Practical Anamorphic-Resistant Encryption without Random Oracles Gennaro Avitabile, Vincenzo Botta, Emanuele Giunta, Marcin Mielniczuk, Francesco Migliaro
2025/304 (PDF ) Lattice-based Cryptography: A survey on the security of the lattice-based NIST finalists Koen de Boer, Wessel van Woerden
2025/303 (PDF ) Asynchronous Algorand: Reaching Agreement with Near Linear Communication and Constant Expected Time Ittai Abraham, Eli Chouatt, Ivan Damgård, Yossi Gilad, Gilad Stern, Sophia Yakoubov
2025/302 (PDF ) Phalanx: An FHE-Friendly SNARK for Verifiable Computation on Encrypted Data Xinxuan Zhang, Ruida Wang, Zeyu Liu, Binwu Xiang, Yi Deng, Ben Fisch, Xianhui Lu
2025/301 (PDF ) Making Protocol FSU Revocable Kazuma Wariki, Atsushi Fujioka, Akira Nagai, Kan Yasuda
2025/300 (PDF ) Pseudorandom Functions with Weak Programming Privacy and Applications to Private Information Retrieval Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi, Bo Peng
2025/299 (PDF ) (Un)breakable curses - re-encryption in the Fujisaki-Okamoto transform Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz, Fabrizio Sisinni
2025/298 (PDF ) Stateless Hash-Based Signatures for Post-Quantum Security Keys Ruben Gonzalez
2025/297 (PDF ) Practical Zero-Trust Threshold Signatures in Large-Scale Dynamic Asynchronous Networks Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan Cohen Scaly, Yuval Spiizer
2025/296 (PDF ) DFS: Delegation-friendly zkSNARK and Private Delegation of Provers Yuncong Hu, Pratyush Mishra, Xiao Wang, Jie Xie, Kang Yang, Yu Yu, Yuwen Zhang
2025/295 (PDF ) Stationary Syndrome Decoding for Improved PCGs Vladimir Kolesnikov, Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal
2025/294 (PDF ) Neo: Lattice-based folding scheme for CCS over small fields and pay-per-bit commitments Wilson Nguyen, Srinath Setty
2025/293 (PDF ) Anamorphic-Resistant Encryption; Or Why the Encryption Debate is Still Alive Yevgeniy Dodis, Eli Goldin
2025/292 (PDF ) Tight Lower Bounds and New Upper Bounds For Evolving CDS Tamar Ben David, Anat Paskin-Cherniavsky
2025/291 (PDF ) A Note on Adaptive Security in Hierarchical Identity-Based Encryption Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree
2025/290 (PDF ) Dynamic Decentralized Functional Encryption: Generic Constructions with Strong Security Ky Nguyen, David Pointcheval, Robert Schädlich
2025/289 (PDF ) Significantly Improved Cryptanalysis of Salsa20 With Two-Round Criteria Sabyasachi Dey, Subhamoy Maitra, Santanu Sarkar, Nitin Kumar Sharma
2025/288 (PDF ) Deep Neural Cryptography David Gerault, Anna Hambitzer, Eyal Ronen, Adi Shamir
2025/287 (PDF ) A reduction from Hawk to the principal ideal problem in a quaternion algebra Clémence Chevignard, Guilhem Mureau, Thomas Espitau, Alice Pellet-Mary, Heorhii Pliatsok, Alexandre Wallet
2025/286 (PDF ) Verifiable Computation for Approximate Homomorphic Encryption Schemes Ignacio Cascudo, Anamaria Costache, Daniele Cozzo, Dario Fiore, Antonio Guimarães, Eduardo Soria-Vazquez
2025/285 (PDF ) MicroCrypt Assumptions with Quantum Input Sampling and Pseudodeterminism: Constructions and Separations Mohammed Barhoush, Ryo Nishimaki, Takashi Yamakawa
2025/284 (PDF ) S2DV: Scalable and Secure DAO Voting Ali Dogan, Sermin Kocaman
2025/283 (PDF ) Honest Majority MPC with $\tilde{O}(|C|)$ Communication in Minicrypt Yifan Song, Xiaxi Ye
2025/282 (PDF ) Transistor: a TFHE-friendly Stream Cipher Jules Baudrin, Sonia Belaïd, Nicolas Bon, Christina Boura, Anne Canteaut, Gaëtan Leurent, Pascal Paillier, Léo Perrin, Matthieu Rivain, Yann Rotella, Samuel Tap
2025/281 (PDF ) Securely Instantiating 'Half Gates' Garbling in the Standard Model Anasuya Acharya, Karen Azari, Mirza Ahad Baig, Dennis Hofheinz, Chethan Kamath
2025/280 (PDF ) Cryptanalysis of rank-2 module-LIP: a single real embedding is all it takes Bill Allombert, Alice Pellet-Mary, Wessel van Woerden
2025/279 (PDF ) Context-Dependent Threshold Decryption and its Applications Dan Boneh, Benedikt Bünz, Kartik Nayak, Lior Rotem, Victor Shoup
2025/278 (PDF ) New Techniques for Random Probing Security and Application to Raccoon Signature Scheme Sonia Belaïd, Matthieu Rivain, Mélissa Rossi
2025/277 (PDF ) Tighter Control for Distributed Key Generation: Share Refreshing and Expressive Reconstruction Policies Sara Montanari, Riccardo Longo, Alessio Meneghetti
2025/276 (PDF ) Finding and Protecting the Weakest Link - On Side-Channel Attacks on y in Masked ML-DSA Julius Hermelink, Kai-Chun Ning, Richard Petri
2025/275 (PDF ) Error-Simulatable Sanitization for TFHE and Applications Nigel P. Smart, Michael Walter
2025/274 (PDF ) Post-Quantum Blind Signatures from Matrix Code Equivalence Veronika Kuchta, Jason T. LeGrow, Edoardo Persichetti
2025/273 (PDF ) Clustering Approach for Higher-Order Deterministic Masking Vahid Jahandideh, Jan Schoone, Lejla Batina
2025/272 (PDF ) X-Transfer: Enabling and Optimizing Cross-PCN Transactions Lukas Aumayr, Zeta Avarikioti, Iosif Salem, Stefan Schmid, Michelle Yeo
2025/271 (PDF ) Unconditional foundations for supersingular isogeny-based cryptography Arthur Herlédan Le Merdy, Benjamin Wesolowski
2025/270 (PDF ) A Decomposition Approach for Evaluating Security of Masking Vahid Jahandideh, Bart Mennink, Lejla Batina
2025/269 (PDF ) 10-Party Sublinear Secure Computation from Standard Assumptions Geoffroy Couteau, Naman Kumar
2025/268 (PDF ) 𝜔(1/𝜆)-Rate Boolean Garbling Scheme from Generic Groups Geoffroy Couteau, Carmit Hazay, Aditya Hegde, Naman Kumar
2025/267 (PDF ) Authentication and sole control at a high level of assurance on widespread smartphones with threshold signatures Sander Q. Dijkhuis
2025/266 (PDF ) Memory-Efficient BKW Algorithm for Solving the LWE Problem Yu Wei, Lei Bi, Xianhui Lu, Kunpeng Wang
2025/265 (PDF ) White-Box Watermarking Signatures against Quantum Adversaries and Its Applications Fuyuki Kitagawa, Ryo Nishimaki
2025/264 (PDF ) Dazzle: Improved Adaptive Threshold Signatures from DDH Yanbo Chen
2025/263 (PDF ) Transparent SNARKs over Galois Rings Yuanju Wei, Xinxuan Zhang, Yi Deng
2025/262 (PDF ) PKE and ABE with Collusion-Resistant Secure Key Leasing Fuyuki Kitagawa, Ryo Nishimaki, Nikhil Pappu
2025/261 (PDF ) HasteBoots: Proving FHE Bootstrapping in Seconds Fengrun Liu, Haofei Liang, Tianyu Zhang, Yuncong Hu, Xiang Xie, Haisheng Tan, Yu Yu
2025/260 (PDF ) Quantum Security Evaluation of ASCON Yujin Oh, Kyungbae Jang, Hwajeong Seo
2025/259 (PDF ) Improved Resultant Attack against Arithmetization-Oriented Primitives Augustin Bariant, Aurélien Boeuf, Pierre Briaud, Maël Hostettler, Morten Øygarden, Håvard Raddum
2025/258 (PDF ) MPC with Publicly Identifiable Abort from Pseudorandomness and Homomorphic Encryption Marc Rivinius
2025/257 (PDF ) TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
2025/256 (PDF ) Inaccessible Entropy for Watermarking Generative Agents Daniel Alabi, Lav R. Varshney
2025/255 (PDF ) Tighter Security Notions for a Modular Approach to Private Circuits Bohan Wang, Juelin Zhang, Yu Yu, Weijia Wang
2025/254 (PDF ) Garbled Lookup Tables from Homomorphic Secret Sharing Liqiang Liu, Tianren Liu, Bo Peng
2025/253 (PDF ) Adaptively Secure IBE from Lattices with Asymptotically Better Efficiency Weidan Ji, Zhedong Wang, Lin Lyu, Dawu Gu
2025/252 (PDF ) Chiplet-Based Techniques for Scalable and Memory-Aware Multi-Scalar Multiplication Florian Hirner, Florian Krieger, Sujoy Sinha Roy
2025/251 (PDF ) Verifiable Streaming Computation and Step-by-Step Zero-Knowledge Abtin Afshar, Rishab Goyal
2025/250 (PDF ) The Round Complexity of Black-Box Post-Quantum Secure Computation Rohit Chatterjee, Xiao Liang, Omkant Pandey, Takashi Yamakawa
2025/249 (PDF ) cuFalcon: An Adaptive Parallel GPU Implementation for High-Performance Falcon Acceleration Wenqian Li, Hanyu Wei, Shiyu Shen, Hao Yang, Wangchen Dai, Yunlei Zhao
2025/248 (PDF ) New Exchanged Boomerang Distinguishers for 5-Round AES Hanbeom Shin, Seonkyu Kim, Byoungjin Seok, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong
2025/247 (PDF ) LatticeFold+: Faster, Simpler, Shorter Lattice-Based Folding for Succinct Proof Systems Dan Boneh, Binyi Chen
2025/246 (PDF ) Towards Optimal Early Stopping Agreement Protocols Fatima Elsheimy, Julian Loss, Charalampos Papamanthou
2025/245 (PDF ) Silent Circuit Relinearisation: Sublinear-Size (Boolean and Arithmetic) Garbled Circuits from DCR Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl
2025/244 (PDF ) Provable Speedups for SVP Approximation Under Random Local Blocks Jianwei Li
2025/243 (PDF ) K-Linkable Ring Signatures and Applications in Generalized Voting Wonseok Choi, Xiangyu Liu, Lirong Xia, Vassilis Zikas
2025/242 (PDF ) Rational Secret Sharing with Competition Tiantian Gong, Zeyu Liu
2025/241 (PDF ) IBE-IBE: Intent-Based Execution through Identity-Based Encryption and Auctions Peyman Momeni, Fig Smith
2025/240 (PDF ) Robust Non-Interactive Zero-Knowledge Combiners Michele Ciampi, Lorenzo Magliocco, Daniele Venturi, Yu Xia
2025/239 (PDF ) DART: Decentralized, Anonymous, and Regulation-friendly Tokenization Amirreza Sarencheh, Hamidreza Khoshakhlagh, Alireza Kavousi, Aggelos Kiayias
2025/238 (PDF ) On the Power of Polynomial Preprocessing: Proving Computations in Sublinear Time, and More Matteo Campanelli, Mario Carrillo, Ignacio Cascudo, Dario Fiore, Danilo Francati, Rosario Gennaro
2025/237 (PDF ) UC-Security of Encrypted Key Exchange: A Tutorial Jiayu Xu
2025/236 (PDF ) Diamond iO: A Straightforward Construction of Indistinguishability Obfuscation from Lattices Sora Suegami, Enrico Bottazzi, Gayeong Park
2025/235 (PDF ) Doubly Efficient Cryptography: Commitments, Arguments and RAM MPC Wei-Kai Lin, Ethan Mook, Daniel Wichs
2025/234 (PDF ) Merkle Mountain Ranges are Optimal: On Witness Update Frequency for Cryptographic Accumulators Joseph Bonneau, Jessica Chen, Miranda Christ, Ioanna Karantaidou
2025/233 (PDF ) Anamorphic Resistant Encryption: the Good, the Bad and the Ugly Davide Carnemolla, Dario Catalano, Emanuele Giunta, Francesco Migliaro
2025/232 (PDF ) Authenticated BitGC for Actively Secure Rate-One 2PC Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu
2025/231 (PDF ) NoIC: PAKE from KEM without Ideal Ciphers Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki
2025/230 (PDF ) Privately Constrained PRFs from DCR: Puncturing and Bounded Waring Rank Amik Raj Behera, Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl
2025/229 (PDF ) ETK: External-Operations TreeKEM and the Security of MLS in RFC 9420 Cas Cremers, Esra Günsay, Vera Wesselkamp, Mang Zhao
2025/228 (PDF ) Network agnostic consensus in constant time Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen
2025/227 (PDF ) Two Is All It Takes: Asymptotic and Concrete Improvements for Solving Code Equivalence Alessandro Budroni, Andre Esser, Ermes Franch, Andrea Natale
2025/226 (PDF ) Improved Subfield Curve Search For Specific Field Characteristics Jesús-Javier Chi-Domínguez
2025/225 (PDF ) “Check-Before-you-Solve”: Verifiable Time-lock Puzzles Jiajun Xin, Dimitrios Papadopoulos
2025/223 (PDF ) Building Hard Problems by Combining Easy Ones: Revisited Yael Eisenberg, Christopher Havens, Alexis Korb, Elio Merolle, Amit Sahai
2025/222 (PDF ) A Robust Variant of ChaCha20-Poly1305 Tim Beyne, Yu Long Chen, Michiel Verbauwhede
2025/221 (PDF ) Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero Brandon Goodell, Rigo Salazar, Freeman Slaughter
2025/220 (PDF ) The Quantum Decoherence Model: Everlasting Composable Secure Computation and More Nico Döttling, Alexander Koch, Sven Maier, Jeremias Mechler, Anne Müller, Jörn Müller-Quade, Marcel Tiepelt
2025/219 (PDF ) Slot a la carte: Centralization Issues in Ethereum's Proof-of-Stake Protocol János Tapolcai, Bence Ladóczki, Ábel Nagy
2025/218 (PDF ) LSM Trees in Adversarial Environments Hayder Tirmazi
2025/217 (PDF ) Assumption-Free Fuzzy PSI via Predicate Encryption Erik-Oliver Blass, Guevara Noubir
2025/216 (PDF ) Practical TFHE Ciphertext Sanitization for Oblivious Circuit Evaluation Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song
2025/215 (PDF ) A note on the genus of the HAWK lattice Daniël M. H. van Gent
2025/214 (PDF ) Rejected Signatures' Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks Yuanyuan Zhou, Weijia Wang, Yiteng Sun, Yu Yu
2025/213 (PDF ) An Innovative Lightweight Symmetric Encryption Algorithm Integrating NeoAlzette ARX S-box and XCR CSPRNG Jiang Yu
2025/212 (PDF ) Constructing Quantum Implementations with the Minimal T-depth or Minimal Width and Their Applications Zhenyu Huang, Fuxin Zhang, Dongdai Lin
2025/211 (PDF ) Prior-Based Label Differential Privacy via Secure Two-Party Computation Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth
2025/210 (PDF ) Practical Keyword Private Information Retrieval from Key-to-Index Mappings Meng Hao, Weiran Liu, Liqiang Peng, Cong Zhang, Pengfei Wu, Lei Zhang, Hongwei Li, Robert H. Deng
2025/208 (PDF ) Reductions Between Code Equivalence Problems Mahdi Cheraghchi, Nikhil Shagrithaya, Alexandra Veliche
2025/207 (PDF ) Efficient Mixed Garbling from Homomorphic Secret Sharing and GGM-Tree Jian Guo, Wenjie Nan
2025/205 (PDF ) Addressing Scalability Issues of Blockchains with Hypergraph Payment Networks Arad Kotzer, Bence Ladóczki, János Tapolcai, Ori Rottenstreich
2025/204 (PDF ) On the Composable Security of MDVS and MDRS-PKE Constructions Chen-Da Liu-Zhang, Christopher Portmann, Guilherme Rito
2025/203 (PDF ) Ciphertext-Simulatable HE from BFV with Randomized Evaluation Intak Hwang, Seonhong Min, Yongsoo Song
2025/202 (PDF ) Distributed Non-Interactive Zero-Knowledge Proofs Alex B. Grilo, Ami Paz, Mor Perry
2025/201 (PDF ) Cryptanalysis of Isogeny-Based Quantum Money with Rational Points Hyeonhak Kim, DongHoe Heo, Seokhie Hong
2025/200 (PDF ) Improved Secure Two-party Computation from a Geometric Perspective Hao Guo, Liqiang Peng, Haiyang Xue, Li Peng, Weiran Liu, Zhe Liu, Lei Hu
2025/199 (PDF ) Sublinear Proofs over Polynomial Rings Mi-Ying Miryam Huang, Xinyu Mao, Jiapeng Zhang
2025/198 (PDF ) Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption Song Bian, Haowen Pan, Jiaqi Hu, Zhou Zhang, Yunhao Fu, Jiafeng Hua, Yi Chen, Bo Zhang, Yier Jin, Jin Dong, Zhenyu Guan
2025/197 (PDF ) Cryptanalysis of a nonlinear filter-based stream cipher Tim Beyne, Michiel Verbauwhede
2025/195 (PDF ) Finding a polytope: A practical fault attack against Dilithium Paco Azevedo-Oliveira, Andersson Calle Viera, Benoît Cogliati, Louis Goubin
2025/194 (PDF ) AUCIL: An Inclusion List Design for Rational Parties Sarisht Wadhwa, Julian Ma, Thomas Thiery, Barnabe Monnot, Luca Zanolini, Fan Zhang, Kartik Nayak
2025/193 (PDF ) On the Average Random Probing Model Julien Béguinot, Loïc Masure
2025/192 (PDF ) Practical Electromagnetic Fault Injection on Intel Neural Compute Stick 2 Shivam Bhasin, Dirmanto Jap, Marina Krček, Stjepan Picek, Prasanna Ravi
2025/191 (PDF ) Adaptive Distributional Security: A Framework for Input-Adaptive Cryptography Cruz Barnum, David Heath
2025/190 (PDF ) Binary Codes for Error Detection and Correction in a Computationally Bounded World Jad Silbak, Daniel Wichs
2025/189 (PDF ) Experimentally studying path-finding problem between conjugates in supersingular isogeny graphs: Optimizing primes and powers to speed-up cycle finding Madhurima Mukhopadhyay
2025/188 (PDF ) BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup Nan Wang, Qianhui Wang, Dongxi Liu, Muhammed F. Esgin, Alsharif Abuadbba
2025/187 (PDF ) Asymptotic improvements to provable algorithms for the code equivalence problem Huck Bennett, Drisana Bhatia, Jean-François Biasse, Medha Durisheti, Lucas LaBuff, Vincenzo Pallozzi Lavorante, Philip Waitkevich
2025/186 (PDF ) Computing Quaternion Embeddings and Endomorphism rings of Supersingular Oriented Elliptic curves Maher Mamah
2025/185 (PDF ) AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions Marcel Nageler, Shibam Ghosh, Marlene Jüttler, Maria Eichlseder
2025/184 (PDF ) NodeChain: Cheap Data Integrity Without Consensus Orfeas Stefanos Thyfronitis Litos, Zhaoxuan Wu, Alfredo Musumeci, Songyun Hu, James Helsby, Michael Breza, William Knottenbelt
2025/183 (PDF ) OBLIVIATOR: Oblivious Parallel Joins and other Operators in Shared Memory Environments Apostolos Mavrogiannakis, Xian Wang, Ioannis Demertzis, Dimitrios Papadopoulos, Minos Garofalakis
2025/182 (PDF ) Deny Whatever You Want: Dual-Deniable Public-Key Encryption Zhiyuan An, Fangguo Zhang
2025/181 (PDF ) Improved NTT and CRT-based RNR Blinding for Side-Channel and Fault Resistant Kyber Max Duparc, Mounir Taha
2025/180 (PDF ) On the Atomicity and Efficiency of Blockchain Payment Channels Di Wu, Shoupeng Ren, Yuman Bai, Lipeng He, Jian Liu, Wu Wen, Kui Ren, Chun Chen
2025/179 (PDF ) Probing Secure Composability Without Fresh Randomness: Theory and Application to Ascon Vahid Jahandideh, Bart Mennink, Lejla Batina
2025/178 (PDF ) Improved Differential and Linear Cryptanalysis on Round-Reduced SIMON Chao Niu, Muzhou Li, Jifu Zhang, Meiqin Wang
2025/177 (PDF ) On the Power of Sumcheck in Secure Multiparty Computation Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan
2025/176 (PDF ) HyperLoop: Rationally secure efficient cross-chain bridge Aniket Kate, Easwar Vivek Mangipudi, Charan Nomula, Raghavendra Ramesh, Athina Terzoglou, Joshua Tobkin
2025/175 (PDF ) Updatable Public-Key Encryption, Revisited Joël Alwen, Georg Fuchsbauer, Marta Mularczyk
2025/174 (PDF ) VITARIT: Paying for Threshold Services on Bitcoin and Friends Sri AravindaKrishnan Thyagarajan, Easwar Vivek Mangipudi, Lucjan Hanzlik, Aniket Kate, Pratyay Mukherjee
2025/173 (PDF ) A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography Nick Aquina, Bruno Cimoli, Soumya Das, Kathrin Hövelmanns, Fiona Johanna Weber, Chigo Okonkwo, Simon Rommel, Boris Škorić, Idelfonso Tafur Monroy, Sebastian Verschoor
2025/172 (PDF ) SoK: Understanding zk-SNARKs: The Gap Between Research and Practice Junkai Liang, Daqi Hu, Pengfei Wu, Yunbo Yang, Qingni Shen, Zhonghai Wu
2025/171 (PDF ) S5: Combining white-box countermeasures to resist state-of-the-art attacks Alex Charlès, Aleksei Udovenko
2025/170 (PDF ) Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms Mohamed Abdelmonem, Lukas Holzbaur, Håvard Raddum, Alexander Zeh
2025/169 (PDF ) Efficient Pseudorandom Correlation Generators for Any Finite Field Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan
2025/168 (PDF ) Revisiting Beimel-Weinreb Weighted Threshold Secret Sharing Schemes Oriol Farràs, Miquel Guiot
2025/167 (PDF ) Wiretapping LLMs: Network Side-Channel Attacks on Interactive LLM Services Mahdi Soleimani, Grace Jia, In Gim, Seung-seob Lee, Anurag Khandelwal
2025/166 (PDF ) Polynomial Inversion Algorithms in Constant Time for Post-Quantum Cryptography Abhraneel Dutta, Emrah Karagoz, Edoardo Persichetti, Pakize Sanal
2025/165 (PDF ) SLIDE: Shuffle Shamir Secret Shares Uniformly with Linear Online Communication and Guaranteed Output Delivery Jiacheng Gao, Moyang Xie, Yuan Zhang, Sheng Zhong
2025/164 (PDF ) Multi-Authority Functional Encryption with Bounded Collusions from Standard Assumptions Rishab Goyal, Saikumar Yadugiri
2025/163 (PDF ) Bootstrapping (T)FHE Ciphertexts via Automorphisms: Closing the Gap Between Binary and Gaussian Keys Olivier Bernard, Marc Joye
2025/162 (PDF ) Learning from Functionality Outputs: Private Join and Compute in the Real World Francesca Falzon, Tianxin Tang
2025/161 (PDF ) Stronger Security for Blind Signatures with Attributes Foteini Baldimtsi, Julia Kastner, Julian Loss, Omar Renawi
2025/160 (PDF ) The Nonlinear Filter Model of Stream Cipher Redivivus Claude Carlet, Palash Sarkar
2025/159 (PDF ) A Holistic Framework for Impossible Boomerang Attacks Yincen Chen, Qinggan Fu, Ning Zhao, Jiahao Zhao, Ling Song, Qianqian Yang
2025/158 (PDF ) Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool Haoyang Wang, Jianing Zhang
2025/157 (PDF ) Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis Azade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek
2025/156 (PDF ) TallyGuard: Privacy Preserving Tallied-as-cast Guarantee Athish Pranav Dharmalingam, Sai Venkata Krishnan, KC Sivaramakrishnan, N.S. Narayanaswamy
2025/155 (PDF ) Cycles and Cuts in Supersingular L-Isogeny Graphs Sarah Arpin, Ross Bowden, James Clements, Wissam Ghantous, Jason T. LeGrow, Krystal Maughan
2025/154 (PDF ) Shadowfax: Hybrid Security and Deniability for AKEMs Phillip Gajland, Vincent Hwang, Jonas Janneck
2025/153 (PDF ) Error floor prediction with Markov models for QC-MDPC codes Sarah Arpin, Jun Bo Lau, Antoine Mesnard, Ray Perlner, Angela Robinson, Jean-Pierre Tillich, Valentin Vasseur
2025/152 (PDF ) Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay
2025/151 (PDF ) Quantum function secret sharing Alex B. Grilo, Ramis Movassagh
2025/150 (PDF ) On pairs of primes with small order reciprocity Craig Costello, Gaurish Korpal
2025/149 (PDF ) Practical Asynchronous Distributed Key Reconfiguration and Its Applications Hanwen Feng, Yingzi Gao, Yuan Lu, Qiang Tang, Jing Xu
2025/148 (PDF ) A Comprehensive Formal Security Analysis of OPC UA Vincent Diemunsch, Lucca Hirschi, Steve Kremer
2025/147 (PDF ) Efficient algorithms for the detection of $(N,N)$-splittings and endomorphisms Maria Corte-Real Santos, Craig Costello, Sam Frengley
2025/146 (PDF ) SHIFT SNARE: Uncovering Secret Keys in FALCON via Single-Trace Analysis Jinyi Qiu, Aydin Aysu
2025/145 (PDF ) Breaking RSA with Overclocking-induced GPU Faults Reuven Yakar, Avishai Wool, Eyal Ronen
2025/144 (PDF ) KZH-Fold: Accountable Voting from Sublinear Accumulation George Kadianakis, Arantxa Zapico, Hossein Hafezi, Benedikt Bünz
2025/143 (PDF ) A New Way to Achieve Round-Efficient Asynchronous Byzantine Agreement Simon Holmgaard Kamp
2025/142 (PDF ) hax: Verifying Security-Critical Rust Software using Multiple Provers Karthikeyan Bhargavan, Maxime Buyse, Lucas Franceschino, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters
2025/141 (PDF ) Space-Lock Puzzles and Verifiable Space-Hard Functions from Root-Finding in Sparse Polynomials Nico Döttling, Jesko Dujmovic, Antoine Joux
2025/140 (PDF ) HELP: Everlasting Privacy through Server-Aided Randomness Yevgeniy Dodis, Jiaxin Guan, Peter Hall, Alison Lin
2025/139 (PDF ) Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers Rabiah Alnashwan, Benjamin Dowling, Bhagya Wimalasiri
2025/138 (PDF ) Preprocessing Security of (Nonzero) Short Schnorr Signatures and Hashed ElGamal KEM Jeremiah Blocki, Seunghoon Lee
2025/137 (PDF ) FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs Jonas Bertels, Hilder V. L. Pereira, Ingrid Verbauwhede
2025/136 (PDF ) Computing Isomorphisms between Products of Supersingular Elliptic Curves Pierrick Gaudry, Julien Soumier, Pierre-Jean Spaenlehauer
2025/135 (PDF ) PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies Andrea Basso, Giacomo Borin, Wouter Castryck, Maria Corte-Real Santos, Riccardo Invernizzi, Antonin Leroux, Luciano Maino, Frederik Vercauteren, Benjamin Wesolowski
2025/134 (PDF ) TockOwl: Asynchronous Consensus with Fault and Network Adaptability Minghang Li, Qianhong Wu, Zhipeng Wang, Bo Qin, Bohang Wei, Hang Ruan, Shihong Xiong, Zhenyang Ding
2025/133 (PDF ) Cryptanalysis of an Efficient Signature Based on Isotropic Quadratic Forms Henry Bambury, Phong Q. Nguyen
2025/132 (PDF ) Distributional Private Information Retrieval Ryan Lehmkuhl, Alexandra Henzinger, Henry Corrigan-Gibbs
2025/131 (PDF ) On the Anonymity of Linkable Ring Signatures Xavier Bultel, Charles Olivier-Anclin
2025/130 (PDF ) Symmetric Perceptrons, Number Partitioning and Lattices Neekon Vafa, Vinod Vaikuntanathan
2025/129 (PDF ) DewTwo: a transparent PCS with quasi-linear prover, logarithmic verifier and 4.5KB proofs from falsifiable assumptions Benedikt Bünz, Tushar Mopuri, Alireza Shirzad, Sriram Sridhar
2025/128 (PDF ) Asynchronous YOSO a la Paillier Ivan Bjerre Damgård, Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen
2025/127 (PDF ) A Revision of CROSS Security: Proofs and Attacks for Multi-Round Fiat-Shamir Signatures Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, Giovanni Tognolini
2025/126 (PDF ) Always by Your Side: Constructing Traceable Anonymous Credentials with Hardware-Binding Chang Chen, Guoyu Yang, Qi Chen, Wei Wang, Jin Li
2025/125 (PDF ) Adversarially Robust Bloom Filters: Privacy, Reductions, and Open Problems Hayder Tirmazi
2025/124 (PDF ) GPU Implementations of Three Different Key-Switching Methods for Homomorphic Encryption Schemes Ali Şah Özcan, Erkay Savaş
2025/123 (PDF ) Falcon on ARM Cortex-M4: an Update Thomas Pornin
2025/122 (PDF ) Qelect: Lattice-based Single Secret Leader Election Made Practical Yunhao Wang, Fan Zhang
2025/121 (PDF ) On symbolic computations over arbitrary commutative rings and cryptography with the temporal Jordan-Gauss graphs. Vasyl Ustimenko
2025/120 (PDF ) Module Learning with Errors with Truncated Matrices Katharina Boudgoust, Hannah Keller
2025/119 (PDF ) SoK: PQC PAKEs - Design, Security and Performance Nouri Alnahawi, David Haas, Erik Mauß, Alexander Wiesmaier
2025/118 (PDF ) How to Prove False Statements: Practical Attacks on Fiat-Shamir Dmitry Khovratovich, Ron D. Rothblum, Lev Soukhanov
2025/117 (PDF ) Post-Quantum Online/Offline Signatures Martin R. Albrecht, Nicolas Gama, James Howe, Anand Kumar Narayanan
2025/116 (PDF ) A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS) Jonas Schupp, Georg Sigl
2025/115 (PDF ) Signatures with Tight Adaptive Corruptions from Search Assumptions Keitaro Hashimoto, Wakaha Ogata, Yusuke Sakai
2025/113 (PDF ) Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head James Hsin-Yu Chiang, Ivan Damgård, William R. Duro, Sunniva Engan, Sebastian Kolby, Peter Scholl
2025/112 (PDF ) Post-Quantum Stealth Address Protocols Marija Mikić, Mihajlo Srbakoski, Strahinja Praška
2025/111 (PDF ) On the structure of the Schur squares of Twisted Generalized Reed-Solomon codes and application to cryptanalysis Alain Couvreur, Rakhi Pratihar, Nihan Tanisali, Ilaria Zappatore
2025/110 (PDF ) Verification-efficient Homomorphic Signatures for Verifiable Computation over Data Streams Gaspard Anthoine, Daniele Cozzo, Dario Fiore
2025/109 (PDF ) A Formal Treatment of Homomorphic Encryption Based Outsourced Computation in the Universal Composability Framework Wasilij Beskorovajnov, Sarai Eilebrecht, Yufan Jiang, Jörn Mueller-Quade
2025/108 (PDF ) Subset sum, a new insight Samir Bouftass
2025/107 (PDF ) dCTIDH: Fast & Deterministic CTIDH Fabio Campos, Andreas Hellenbrand, Michael Meyer, Krijn Reijnders
2025/106 (PDF ) NTRU+Sign: Compact NTRU-Based Signatures Using Bimodal Distributions Joo Woo, Jonghyun Kim, Ga Hee Hong, Seungwoo Lee, Minkyu Kim, Hochang Lee, Jong Hwan Park
2025/105 (PDF ) Twist and Shout: Faster memory checking arguments via one-hot addressing and increments Srinath Setty, Justin Thaler
2025/104 (PDF ) Additive Randomized Encodings from Public Key Encryption Nir Bitansky, Saroja Erabelli, Rachit Garg
2025/103 (PDF ) Technology-Dependent Synthesis and Optimization of Circuits for Small S-boxes Zihao Wei, Siwei Sun, Fengmei Liu, Lei Hu, Zhiyu Zhang
2025/102 (PDF ) A practical distinguisher on the full Skyscraper permutation Antoine Bak
2025/101 (PDF ) Unveiling Privacy Risks in Quantum Optimization Services Mateusz Leśniak, Michał Wroński, Ewa Syta, Mirosław Kutyłowski
2025/100 (PDF ) Zero-Knowledge Proofs of Quantumness Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng
2025/099 (PDF ) Adaptive Hardcore Bit and Quantum Key Leasing over Classical Channel from LWE with Polynomial Modulus Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng
2025/098 (PDF ) Fast, private and regulated payments in asynchronous networks Maxence Brugeres, Victor Languille, Petr Kuznetsov, Hamza Zarfaoui
2025/097 (PDF ) Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake Mingfei Zhang, Rujia Li, Xueqian Lu, Sisi Duan
2025/096 (PDF ) Simultaneous-Message and Succinct Secure Computation Elette Boyle, Abhishek Jain, Sacha Servan-Schreiber, Akshayaram Srinivasan
2025/095 (PDF ) Non-Interactive Distributed Point Functions Elette Boyle, Lalita Devadas, Sacha Servan-Schreiber
2025/094 (PDF ) Multi-Key Homomorphic Secret Sharing Geoffroy Couteau, Lalita Devadas, Aditya Hegde, Abhishek Jain, Sacha Servan-Schreiber
2025/093 (PDF ) A Survey on Transciphering and Symmetric Ciphers for Homomorphic Encryption Indranil Thakur, Angshuman Karmakar, Chaoyun Li, Bart Preneel
2025/092 (PDF ) Public-Key Quantum Money From Standard Assumptions (In The Generic Model) Jake Doliskani
2025/091 (PDF ) poqeth: Efficient, post-quantum signature verification on Ethereum Ruslan Kysil, István András Seres, Péter Kutas, Nándor Kelecsényi
2025/090 (PDF ) Friendly primes for efficient modular arithmetic using the Polynomial Modular Number System Fangan Yssouf Dosso, Nadia El Mrabet, Nicolas Méloni, François Palma, Pascal Véron
2025/089 (PDF ) An Introduction to Protein Cryptography Hayder Tirmazi, Tien Phuoc Tran
2025/088 (PDF ) ICT: Insured Cryptocurrency Transactions Aydin Abadi, Amirreza Sarencheh, Henry Skeoch, Thomas Zacharias
2025/087 (PDF ) On Gaussian Sampling for $q$-ary Lattices and Linear Codes with Lee Weight Maiara F. Bollauf, Maja Lie, Cong Ling
2025/086 (PDF ) Artificial Results From Hardware Synthesis Ahmed Alharbi, Charles Bouillaguet
2025/085 (PDF ) Enhancing Threshold Group Action Signature Schemes: Adaptive Security and Scalability Improvements Michele Battagliola, Giacomo Borin, Giovanni Di Crescenzo, Alessio Meneghetti, Edoardo Persichetti
2025/084 (PDF ) Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity Yijia Chang, Songze Li
2025/083 (PDF ) Recover from Excessive Faults in Partially-Synchronous BFT SMR Tiantian Gong, Gustavo Franco Camilo, Kartik Nayak, Andrew Lewis-Pye, Aniket Kate
2025/082 (PDF ) Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer Qingliang Hou, Kuntong Li, Guoyan Zhang, Yanzhao Shen, Qidi You, Xiaoyang Dong
2025/081 (PDF ) Integer Commitments, Old and New Tools Iftach Haitner, Yehuda Lindell, Nikolaos Makriyannis
2025/080 (PDF ) Breaking verifiability and vote privacy in CHVote Véronique Cortier, Alexandre Debant, Pierrick Gaudry
2025/079 (PDF ) Exploring side-channels in Intel Trust Domain Extensions Upasana Mandal, Shubhi Shukla, Nimish Mishra, Sarani Bhattacharya, Paritosh Saxena, Debdeep Mukhopadhyay
2025/078 (PDF ) Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol Yevgeniy Dodis, Daniel Jost, Shuichi Katsumata, Thomas Prest, Rolfe Schmidt
2025/077 (PDF ) On Multi-Key FuncCPA Secure Encryption Schemes Eri Nakajima, Keisuke Hara, Kyosuke Yamashita
2025/076 (PDF ) Decompose and conquer: ZVP attacks on GLV curves Vojtěch Suchánek, Vladimír Sedláček, Marek Sýs
2025/075 (PDF ) Further Improvements in AES Execution over TFHE: Towards Breaking the 1 sec Barrier Sonia Belaïd, Nicolas Bon, Aymen Boudguiga, Renaud Sirdey, Daphné Trama, Nicolas Ye
2025/074 (PDF ) XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering Chao Niu, Zhicong Huang, Zhaomin Yang, Yi Chen, Liang Kong, Cheng Hong, Tao Wei
2025/073 (PDF ) Conditional Constant Function Problem and Its Quantum Solutions: Attacking Feistel Ciphers Zhenqiang Li, Shuqin Fan, Fei Gao, Yonglin Hao, Xichao Hu, Linchun Wan, Hongwei Sun, Qi Su
2025/072 (PDF ) PSMT: Private Segmented Membership Test for Distributed Record Linkage Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Sam Martin, Taeho Jung
2025/071 (PDF ) The HHE Land: Exploring the Landscape of Hybrid Homomorphic Encryption Hossein Abdinasibfar, Camille Nuoskala, Antonis Michalas
2025/070 (PDF ) Beyond Optimal Fault-Tolerance Andrew Lewis-Pye, Tim Roughgarden
2025/069 (PDF ) On Composing Generic Voting Schemes for Improved Privacy Oskar Goldhahn
2025/068 (PDF ) Shielded CSV: Private and Efficient Client-Side Validation Jonas Nick, Liam Eagen, Robin Linus
2025/067 (PDF ) Constant latency and finality for dynamically available DAG Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu
2025/066 (PDF ) Efficient Homomorphic Integer Computer from CKKS Jaehyung Kim
2025/065 (PDF ) Morgana: a laconic circuit builder Lev Soukhanov, Yaroslav Rebenko
2025/064 (PDF ) SoK: Trusted setups for powers-of-tau strings Faxing Wang, Shaanan Cohney, Joseph Bonneau
2025/063 (PDF ) Enabling Puncturable Encrypted Search over Lattice for Privacy-Preserving in Mobile Cloud Yibo Cao, Shiyuan Xu, Gang Xu, Xiu-Bo Chen, Zongpeng Li, Jiawen Kang, Dusit Niyato
2025/062 (PDF ) Treating dishonest ciphertexts in post-quantum KEMs -- explicit vs. implicit rejection in the FO transform Kathrin Hövelmanns, Mikhail Kudinov
2025/061 (PDF ) CAPSS: A Framework for SNARK-Friendly Post-Quantum Signatures Thibauld Feneuil, Matthieu Rivain
2025/060 (PDF ) SoK: Multiparty Computation in the Preprocessing Model Shuang Sun, Eleftheria Makri
2025/059 (PDF ) Fair Signature Exchange Hossein Hafezi, Aditi Partap, Sourav Das, Joseph Bonneau
2025/058 (PDF ) Skyscraper-v2: Fast Hashing on Big Primes Clémence Bouvier, Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Fabian Schmid, Markus Schofnegger
2025/057 (PDF ) Trustless Bridges via Random Sampling Light Clients Bhargav Nagaraja Bhatt, Fatemeh Shirazi, Alistair Stewart
2025/056 (PDF ) A Unified Key Recovery Framework for Impossible Boomerang Attacks: Applications to Full-Round-ARADI and SKINNYe v2 Xichao Hu, Lin Jiao, Dengguo Feng, Yongqiang Li, Senpeng Wang, Yonglin Hao, Xinxin Gong
2025/055 (PDF ) Hash-Based Multi-Signatures for Post-Quantum Ethereum Justin Drake, Dmitry Khovratovich, Mikhail Kudinov, Benedikt Wagner
2025/054 (PDF ) Doubly Efficient Fuzzy Private Set Intersection for High-dimensional Data with Cosine Similarity Hyunjung Son, Seunghun Paik, Yunki Kim, Sunpill Kim, Heewon Chung, Jae Hong Seo
2025/053 (PDF ) Founding Zero-Knowledge Proofs of Training on Optimum Vicinity Gefei Tan, Adrià Gascón, Sarah Meiklejohn, Mariana Raykova, Xiao Wang, Ning Luo
2025/052 (PDF ) Separating Broadcast from Cheater Identification Yashvanth Kondi, Divya Ravi
2025/051 (PDF ) Black-Box Registered ABE from Lattices Ziqi Zhu, Kai Zhang, Zhili Chen, Junqing Gong, Haifeng Qian
2025/050 (PDF ) Cryptojacking detection using local interpretable model-agnostic explanations Elodie Ngoie Mutombo, Mike Wa Nkongolo, Mahmut Tokmak
2025/049 (PDF ) On the gap between terms in an addition chain Theophilus Agama
2025/048 (PDF ) ABLE: Optimizing Mixed Arithmetic and Boolean Garbled Circuit Jianqiao Cambridge Mo, Karthik Garimella, Austin Ebel, Brandon Reagen
2025/047 (PDF ) Time-Lock Puzzles from Lattices Shweta Agrawal, Giulio Malavolta, Tianwei Zhang
2025/046 (PDF ) The Meta-Complexity of Secret Sharing Benny Applebaum, Oded Nir
2025/045 (PDF ) IND-CPA$^{\text{C}}$: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption Bhuvnesh Chaturvedi, Anirban Chakraborty, Nimish Mishra, Ayantika Chatterjee, Debdeep Mukhopadhyay
2025/044 (PDF ) Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE Jeffrey Champion, Yao-Ching Hsieh, David J. Wu
2025/043 (PDF ) SoK: Time to be Selfless?! Demystifying the Landscape of Selfish Mining Strategies and Models Colin Finkbeiner, Mohamed E. Najd, Julia Guskind, Ghada Almashaqbeh
2025/042 (PDF ) Structural Results for Maximal Quaternion Orders and Connecting Ideals of Prime Power Norm in $B_{p,\infty}$ James Clements
2025/041 (PDF ) Keyed-Verification Anonymous Credentials with Highly Efficient Partial Disclosure Omid Mirzamohammadi, Jan Bobolz, Mahdi Sedaghat, Emad Heydari Beni, Aysajan Abidin, Dave Singelee, Bart Preneel
2025/040 (PDF ) Bundled Authenticated Key Exchange: A Concrete Treatment of (Post-Quantum) Signal's Handshake Protocol Keitaro Hashimoto, Shuichi Katsumata, Thom Wiggers
2025/039 (PDF ) VDORAM: Towards a Random Access Machine with Both Public Verifiability and Distributed Obliviousness Huayi Qi, Minghui Xu, Xiaohua Jia, Xiuzhen Cheng
2025/038 (PDF ) Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains Zhongtang Luo, Yanxue Jia, Alejandra Victoria Ospina Gracia, Aniket Kate
2025/037 (PDF ) Forking the RANDAO: Manipulating Ethereum's Distributed Randomness Beacon Ábel Nagy, János Tapolcai, István András Seres, Bence Ladóczki
2025/036 (PDF ) Scalable Post-Quantum Oblivious Transfers for Resource-Constrained Receivers Aydin Abadi, Yvo Desmedt
2025/035 (PDF ) All-You-Can-Compute: Packed Secret Sharing for Combined Resilience Sebastian Faust, Maximilian Orlt, Kathrin Wirschem, Liang Zhao
2025/034 (PDF ) ZODA: Zero-Overhead Data Availability Alex Evans, Nicolas Mohnblatt, Guillermo Angeris
2025/033 (PDF ) Parametrizing Maximal Orders Along Supersingular $\ell$-Isogeny Paths Laia Amorós, James Clements, Chloe Martindale
2025/032 (PDF ) A New Paradigm for Server-Aided MPC Alessandra Scafuro, Tanner Verber
2025/031 (PDF ) Round-Optimal Compiler for Semi-Honest to Malicious Oblivious Transfer via CIH Varun Madathil, Alessandra Scafuro, Tanner Verber
2025/030 (PDF ) Delegated Multi-party Private Set Intersection from Secret Sharing Jingwei Hu, Zhiqi Liu, Cong Zuo
2025/029 (PDF ) Highly Efficient Server-Aided Multiparty Subfield VOLE Distribution Protocol Dongyu Wu
2025/028 (PDF ) Extending Groth16 for Disjunctive Statements Xudong Zhu, Xinxuan Zhang, Xuyang Song, Yi Deng, Yuanju Wei, Liuyu Yang
2025/027 (PDF ) Constant time lattice reduction in dimension 4 with application to SQIsign Otto Hanyecz, Alexander Karenin, Elena Kirshanova, Péter Kutas, Sina Schaeffler
2025/026 (PDF ) How to use your brain for cryptography without trustworthy machines Wakaha Ogata, Toi Tomita, Kenta Takahashi, Masakatsu Nishigaki
2025/025 (PDF ) Chosen-Ciphertext Security for Functional Encryption with Multiple Users: Definitions and Generic Concrete Constructions Ky Nguyen
2025/024 (PDF ) Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited Olivier Blazy, Philippe Gaborit, Philippe Krejci, Cristina Onete
2025/023 (PDF ) Cryptography is Rocket Science: Analysis of BPSec Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri
2025/022 (PDF ) Leveled Functional Bootstrapping via External Product Tree Zhihao Li, Xuan Shen, Xianhui Lu, Ruida Wang, Yuan Zhao, Zhiwei Wang, Benqiang Wei
2025/021 (PDF ) Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem Thomas Johansson, Mustafa Khairallah, Vu Nguyen
2025/020 (PDF ) ProbeShooter: A New Practical Approach for Probe Aiming Daehyeon Bae, Sujin Park, Minsig Choi, Young-Giu Jung, Changmin Jeong, Heeseok Kim, Seokhie Hong
2025/019 (PDF ) Foundations of Platform-Assisted Auctions Hao Chung, Ke Wu, Elaine Shi
2025/018 (PDF ) On the Independence Assumption in Quasi-Cyclic Code-Based Cryptography Maxime Bombar, Nicolas Resch, Emiel Wiedijk
2025/017 (PDF ) New Quantum Cryptanalysis of Binary Elliptic Curves (Extended Version) Kyungbae Jang, Vikas Srivastava, Anubhab Baksi, Santanu Sarkar, Hwajeong Seo
2025/016 (PDF ) Dynamically Available Common Subset Yuval Efron, Ertem Nusret Tas
2025/015 (PDF ) A New Method for Solving Discrete Logarithm Based on Index Calculus Jianjun HU
2025/014 (PDF ) SPY-PMU: Side-Channel Profiling of Your Performance Monitoring Unit to Leak Remote User Activity Md Kawser Bepary, Arunabho Basu, Sajeed Mohammad, Rakibul Hassan, Farimah Farahmandi, Mark Tehranipoor
2025/013 (PDF ) Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms José Reis, Mehmet Ugurbil, Sameer Wagh, Ryan Henry, Miguel de Vega
2025/012 (PDF ) Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell Wouter Legiest, Jan-Pieter D'Anvers, Bojan Spasic, Nam-Luc Tran, Ingrid Verbauwhede
2025/011 (PDF ) DL-SCADS: Deep Learning-Based Post-Silicon Side-Channel Analysis Using Decomposed Signal Dipayan Saha, Farimah Farahmandi
2025/010 (PDF ) A Combinatorial Approach to IoT Data Security Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar
2025/009 (PDF ) Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust Merve Karabulut, Reza Azarderakhsh
2025/008 (PDF ) A Survey of Interactive Verifiable Computing: Utilizing Randomness in Low-Degree Polynomials Angold Wang
2025/007 (PDF ) Non Linearizable Entropic Operator Daniel Nager
2025/006 (PDF ) Nearly Quadratic Asynchronous Distributed Key Generation from Recursive Consensus Ittai Abraham, Renas Bacho, Julian Loss, Gilad Stern
2025/005 (PDF ) What is "legal" and "illegal?": Social Norms, Current Practices and Perceived Risks among the Cryptocurrency Users in Bangladesh Tanusree Sharma, Atm Mizanur Rahman, Silvia Sandhi, Yang Wang, Rifat Shahriyar, S M Taiabul Haque
2025/004 (PDF ) Smaug: Modular Augmentation of LLVM for MPC Radhika Garg, Xiao Wang
2025/003 (PDF ) Post-Quantum DNSSEC with Faster TCP Fallbacks Aditya Singh Rawat, Mahabir Prasad Jhanwar
2025/002 (PDF ) Voting with coercion resistance and everlasting privacy using linkable ring signatures Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou
2025/001 (PDF ) Attribute Based Encryption for Turing Machines from Lattices Shweta Agrawal, Simran Kumari, Shota Yamada
2024/2100 (PDF ) Compact Key Storage in the Standard Model Yevgeniy Dodis, Daniel Jost
2024/2099 (PDF ) MicroNova: Folding-based arguments with efficient (on-chain) verification Jiaxing Zhao, Srinath Setty, Weidong Cui, Greg Zaverucha
2024/2098 (PDF ) Asymptotically Optimal Adaptive Asynchronous Common Coin and DKG with Silent Setup Hanwen Feng, Qiang Tang
2024/2096 (PDF ) Efficient Multi-party Private Set Union Resistant to Maximum Collusion Attacks Qiang Liu, Joon-Woo Lee
2024/2095 (PDF ) A Note on the Minimality of One-Way Functions in Post-Quantum Cryptography Sam Buxbaum, Mohammad Mahmoody
2024/2094 (PDF ) Secure Vault scheme in the Cloud Operating Model Rishiraj Bhattacharyya, Avradip Mandal, Meghna Sengupta
2024/2093 (PDF ) Exploring Large Integer Multiplication for Cryptography Targeting In-Memory Computing Florian Krieger, Florian Hirner, Sujoy Sinha Roy
2024/2092 (PDF ) PQConnect: Automated Post-Quantum End-to-End Tunnels Daniel J. Bernstein, Tanja Lange, Jonathan Levin, Bo-Yin Yang
2024/2091 (PDF ) Encrypted Multi-map that Hides Query, Access, and Volume Patterns Alexandra Boldyreva, Tianxin Tang
2024/2090 (PDF ) Breaking the Shadow: Key Recovery Attack on Full-Round Shadow Block Ciphers with Minimal Data Anda Che, Shahram Rasoolzadeh
2024/2089 (PDF ) Computing the Hermite Normal Form: A Survey Leon Damer
2024/2088 (PDF ) An Embedded Domain-Specific Language for Using One-Hot Vectors and Binary Matrices in Secure Computation Protocols Andrei Lapets
2024/2087 (PDF ) Post-Quantum Privacy for Traceable Receipt-Free Encryption Paola de Perthuis, Thomas Peters
2024/2086 (PDF ) How To Think About End-To-End Encryption and AI: Training, Processing, Disclosure, and Consent Mallory Knodel, Andrés Fábrega, Daniella Ferrari, Jacob Leiken, Betty Li Hou, Derek Yen, Sam de Alfaro, Kyunghyun Cho, Sunoo Park
2024/2085 (PDF ) Definition of End-to-end Encryption Mallory Knodel, Sofía Celi, Olaf Kolkman, Gurshabad Grover
2024/2084 (PDF ) Zero Knowledge Memory-Checking Techniques for Stacks and Queues Alexander Frolov
2024/2083 (PDF ) Fully Hybrid TLSv1.3 in WolfSSL on Cortex-M4 Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani
2024/2082 (PDF ) ClusterGuard: Secure Clustered Aggregation for Federated Learning with Robustness Yulin Zhao, Zhiguo Wan, Zhangshuang Guan, Guannan Li, Miao Guo
2024/2081 (PDF ) Generalized Cryptanalysis of Cubic Pell RSA Hao Kang, Mengce Zheng
2024/2080 (PDF ) Improved Lattice-Based Attack on Mersenne Low Hamming Ratio Search Problem Mengce Zheng, Wei Yan
2024/2079 (PDF ) Solving AES-SAT Using Side-Channel Hints: A Practical Assessment Elena Dubrova
2024/2078 (PDF ) Strongly Secure Universal Thresholdizer Ehsan Ebrahimi, Anshu Yadav
2024/2077 (PDF ) Report on evaluation of KpqC Round-2 candidates Daniel J. Bernstein, Jolijn Cottaar, Emanuele Di Giandomenico, Kathrin Hövelmanns, Andreas Hülsing, Mikhail Kudinov, Tanja Lange, Mairon Mahzoun, Matthias Meijers, Alex Pellegrini, Alberto Ravagnani, Silvia Ritsch, Sven Schäge, Tianxin Tang, Monika Trimoska, Marc Vorstermans, Fiona Johanna Weber
2024/2076 (PDF ) Blind Signatures from Proofs of Inequality Michael Klooß, Michael Reichle
2024/2075 (PDF ) Tightly-Secure Blind Signatures in Pairing-Free Groups Nicholas Brandt, Dennis Hofheinz, Michael Klooß, Michael Reichle
2024/2074 (PDF ) EQSIGN: Practical Digital Signatures from the Non-Abelian Hidden Subgroup Problem and Information Theoretic Equivocation Samuel Lavery
2024/2073 (PDF ) Succinct Homomorphic MACs from Groups and Applications Yuval Ishai, Hanjun Li, Huijia Lin
2024/2072 (PDF ) Beyond the 1/2 Bound: On the Theory and Practice of Biprimality Tests ChihYun Chuang, IHung Hsu, TingFang Lee
2024/2071 (PDF ) Perfectly Secure Fluid MPC with Abort and Linear Communication Complexity Alexander Bienstock, Daniel Escudero, Antigoni Polychroniadou
2024/2070 (PDF ) Sneaking up the Ranks: Partial Key Exposure Attacks on Rank-Based Schemes Giuseppe D'Alconzo, Andre Esser, Andrea Gangemi, Carlo Sanna
2024/2069 (PDF ) A Prompt Framework for LLM-Based Fully Automated Simple Power Analysis on Cryptosystems Wenquan Zhou, An Wang, Yaoling Ding, Congming Wei, Jingqi Zhang, Jiakun Li
2024/2068 (PDF ) Weightwise Almost Perfectly Balanced Functions, Construction From A Permutation Group Action View Deepak Kumar Dalai, Krishna Mallick, Pierrick Méaux
2024/2067 (PDF ) Bypassing the characteristic bound in logUp Liam Eagen, Ulrich Haböck
2024/2066 (PDF ) COCO: Coconuts and Oblivious Computations for Orthogonal Authentication Yamya Reiki
2024/2065 (PDF ) Partial Exposure Attacks Against a Family of RSA-like Cryptosystems George Teseleanu
2024/2064 (PDF ) (Deep) Learning about Elliptic Curve Cryptography Diana Maimut, Alexandru Cristian Matei, George Teseleanu
2024/2063 (PDF ) The Number of the Beast: Reducing Additions in Fast Matrix Multiplication Algorithms for Dimensions up to 666 Erik Mårtensson, Paul Stankovski Wagner
2024/2062 (PDF ) Two Halves Make a Whole: How to Reconcile Soundness and Robustness in Watermarking for Large Language Models Lei Fan, Chenhao Tang, Weicheng Yang, Hong-Sheng Zhou
2024/2061 (PDF ) Programming Equation Systems of Arithmetization-Oriented Primitives with Constraints Mengyu Chang, Kexin Qiao, Junjie Cheng, Changhai Ou, Liehuang Zhu
2024/2060 (PDF ) "These results must be false": A usability evaluation of constant-time analysis tools Marcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar
2024/2059 (PDF ) Minimizing the Use of the Honest Majority in YOSO MPC with Guaranteed Output Delivery Rishabh Bhadauria, James Hsin-yu Chiang, Divya Ravi, Jure Sternad, Sophia Yakoubov
2024/2058 (PDF ) Learning with Errors from Nonassociative Algebras Andrew Mendelsohn, Cong Ling
2024/2057 (PDF ) Leveraging remote attestation APIs for secure image sharing in messaging apps Joel Samper, Bernardo Ferreira
2024/2056 (PDF ) Exact Template Attacks with Spectral Computation Meriem Mahar, Mammar Ouladj, Sylvain Guilley, Hacène Belbachir, Farid Mokrane
2024/2055 (PDF ) Zeroed Out: Cryptanalysis of Weak PRFs in Alternating Moduli Irati Manterola Ayala, Håvard Raddum
2024/2054 (PDF ) Greedy Algorithm for Representative Sets: Applications to IVLBC and GIFT-64 in Impossible Differential Attack Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey
2024/2053 (PDF ) HCTR+: An Optimally Secure TBC-based Accordion Mode Nilanjan Datta, Avijit Dutta, Shibam Ghosh, Eik List, Hrithik Nandi
2024/2052 (PDF ) Compact Lattice Signatures via Iterative Rejection Sampling Joel Gärtner
2024/2051 (PDF ) Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM Alexandre Berzati, Andersson Calle Viera, Maya Chartouny, David Vigilant
2024/2050 (PDF ) Simulation Secure Multi-Input Quadratic Functional Encryption: Applications to Differential Privacy Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie
2024/2049 (PDF ) BBB Secure Arbitrary Length Tweak TBC from n-bit Block Ciphers Arghya Bhattacharjee, Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Shibam Ghosh, Sougata Mandal
2024/2048 (PDF ) TinyLabels: How to Compress Garbled Circuit Input Labels, Efficiently Marian Dietz, Hanjun Li, Huijia Lin
2024/2047 (PDF ) Breaking and Provably Restoring Authentication: A Formal Analysis of SPDM 1.2 including Cross-Protocol Attacks Cas Cremers, Alexander Dax, Aurora Naska
2024/2046 (PDF ) Decompressing Dilithium's Public Key with Fewer Signatures Using Side Channel Analysis Ruize Wang, Joel Gärtner, Elena Dubrova
2024/2045 (PDF ) Observations on TETRA Encryption Algorithm TEA-3 Jens Alich, Amund Askeland, Subhadeep Banik, Tim Beyne, Anne Canteaut, Patrick Felke, Gregor Leander, Willi Meier, Lukas Stennes
2024/2044 (PDF ) Cryptographic Commitments on Anonymizable Data Xavier Bultel, Céline Chevalier, Charlène Jojon, Diandian Liu, Benjamin Nguyen
2024/2043 (PDF ) Efficient Error-tolerant Side-channel Attacks on GPV Signatures Based on Ordinary Least Squares Regression Jaesang Noh, Hyunseo Choi, Dongwoo Han, Dong-Joon Shin
2024/2042 (PDF ) A Note on Isogeny Group Action-Based Pseudorandom Functions Yi-Fu Lai
2024/2041 (PDF ) SeaSearch: Secure and Efficient Selection Queries Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Komal Kumari, Swagnik Roychoudhury
2024/2040 (PDF ) Verified Foundations for Differential Privacy Markus de Medeiros, Muhammad Naveed, Tancrède Lepoint, Temesghen Kahsai, Tristan Ravitch, Stefan Zetzsche, Anjali Joshi, Joseph Tassarotti, Aws Albarghouthi, Jean-Baptiste Tristan
2024/2039 (PDF ) Revisiting Boomerang Attacks on Lightweight ARX and AND-RX Ciphers with Applications to KATAN, SIMON and CHAM Li Yu, Je Sen Teh
2024/2038 (PDF ) Adaptive Special Soundness: Improved Knowledge Extraction by Adaptive Useful Challenge Sampling Thomas Attema, Michael Klooß, Russell W. F. Lai, Pavlo Yatsyna
2024/2037 (PDF ) Multilateral Trade Credit Set-off in MPC via Graph Anonymization and Network Simplex Enrico Bottazzi, Chan Nam Ngo, Masato Tsutsumi
2024/2036 (PDF ) Simple is COOL: Graded Dispersal and its Applications for Byzantine Fault Tolerance Ittai Abraham, Gilad Asharov, Anirudh Chandramouli
2024/2035 (PDF ) A Note on P $\neq$ NP Ping Wang
2024/2034 (PDF ) The Jacobi Factoring Circuit: Quantum Factoring with Near-Linear Gates and Sublinear Space and Depth Gregory D. Kahanamoku-Meyer, Seyoon Ragavan, Vinod Vaikuntanathan, Katherine Van Kirk
2024/2033 (PDF ) General Practical Cryptanalysis of the Sum of Round-Reduced Block Ciphers and ZIP-AES Antonio Flórez-Gutiérrez, Lorenzo Grassi, Gregor Leander, Ferdinand Sibleyras, Yosuke Todo
2024/2032 (PDF ) Carousel: Fully Homomorphic Encryption with Bootstrapping over Automorphism Group Intak Hwang, Seonhong Min, Yongsoo Song
2024/2031 (PDF ) Covert 19th century political intrigues of Tenerife nobility revealed by cryptanalyzing an encrypted letter Jezabel Molina-Gil, Cándido Caballero-Gil, Judit Gutiérrez-de-Armas, Moti Yung
2024/2030 (PDF ) Security Analysis of ASCON Cipher under Persistent Faults Madhurima Das, Bodhisatwa Mazumdar
2024/2029 (PDF ) NLAT: the NonLinear Approximation Table of Vectorial Boolean Mappings Jorge Nakahara Jr
2024/2028 (PDF ) Qubit Optimized Quantum Implementation of SLIM Hasan Ozgur Cildiroglu, Oguz Yayla
2024/2027 (PDF ) Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems Zhongming Wang, Tao Xiang, Xiaoguo Li, Biwen Chen, Guomin Yang, Chuan Ma, Robert H. Deng
2024/2026 (PDF ) Orbweaver: Succinct Linear Functional Commitments from Lattices Ben Fisch, Zeyu Liu, Psi Vesely
2024/2025 (PDF ) Mira: Efficient Folding for Pairing-based Arguments Josh Beal, Ben Fisch
2024/2024 (PDF ) Hash-Prune-Invert: Improved Differentially Private Heavy-Hitter Detection in the Two-Server Model Borja Balle, James Bell, Albert Cheu, Adria Gascon, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Thomas Steinke
2024/2023 (PDF ) An Abstract Multi-Forking Lemma Charanjit S Jutla
2024/2022 (PDF ) The Revisited Hidden Weight Bit Function Pierrick Méaux, Tim Seuré, Deng Tang
2024/2021 (PDF ) PrivQuant: Communication-Efficient Private Inference with Quantized Network/Protocol Co-Optimization Tianshi Xu, Shuzhang Zhong, Wenxuan Zeng, Runsheng Wang, Meng Li
2024/2020 (PDF ) Ring Ring! Who's There? A Privacy Preserving Mobile Number Search Akshit Aggarwal
2024/2019 (PDF ) Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key, Revisited: Consistency, Outsider Strong Unforgeability, and Generic Construction Keita Emura
2024/2018 (PDF ) On the BUFF Security of ECDSA with Key Recovery Keita Emura
2024/2017 (PDF ) Byzantine Reliable Broadcast in Wireless Networks Hao Lu, Jian Liu, Kui Ren
2024/2016 (PDF ) The Existence of Quantum One-Way Functions Ping Wang, Yikang Lei, Zishen Shen, Fangguo Zhang
2024/2015 (PDF ) Universal SNARGs for NP from Proofs of Correctness Zhengzhong Jin, Yael Tauman Kalai, Alex Lombardi, Surya Mathialagan
2024/2014 (PDF ) On the Traceability of Group Signatures: Uncorrupted User Must Exist Keita Emura
2024/2013 (PDF ) Crescent: Stronger Privacy for Existing Credentials Christian Paquin, Guru-Vamsi Policharla, Greg Zaverucha
2024/2012 (PDF ) GraSS: Graph-based Similarity Search on Encrypted Query Duhyeong Kim, Yujin Nam, Wen Wang, Huijing Gong, Ishwar Bhati, Rosario Cammarota, Tajana S. Rosing, Mariano Tepper, Theodore L. Willke
2024/2011 (PDF ) Honest-Majority Threshold ECDSA with Batch Generation of Key-Independent Presignatures Jonathan Katz, Antoine Urban
2024/2010 (PDF ) Anonymous credentials from ECDSA Matteo Frigo, abhi shelat
2024/2009 (PDF ) The Mis/Dis-information Problem is Hard to Solve Gregory Hagen, Reihaneh Safavi-Naini, Moti Yung
2024/2008 (PDF ) PrivCirNet: Efficient Private Inference via Block Circulant Transformation Tianshi Xu, Lemeng Wu, Runsheng Wang, Meng Li
2024/2007 (PDF ) A Combinatorial Attack on Ternary Sparse Learning with Errors (sLWE) Abul Kalam, Santanu Sarkar, Willi Meier
2024/2006 (PDF ) Data Decryption and Analysis of Note-Taking Applications Seyoung Yoon, Myungseo Park, Kyungbae Jang, Hwajeong Seo
2024/2005 (PDF ) Post-Quantum Secure Channel Protocols for eSIMs Luk Bettale, Emmanuelle Dottax, Laurent Grémy
2024/2004 (PDF ) Regev's attack on hyperelliptic cryptosystems Razvan Barbulescu, Gaetan Bisson
2024/2003 (PDF ) Exploring the Optimal Differential Characteristics of SM4 (Full Version): Improving Automatic Search by Including Human Insights Bingqing Li, Ling Sun
2024/2002 (PDF ) Improving Differential-Neural Distinguisher For Simeck Family Xue Yuan, Qichun Wang
2024/2001 (PDF ) Xiezhi: Toward Succinct Proofs of Solvency Youwei Deng, Jeremy Clark
2024/2000 (PDF ) Evasive LWE Assumptions: Definitions, Classes, and Counterexamples Chris Brzuska, Akin Ünal, Ivy K. Y. Woo
2024/1999 (PDF ) Multivariate Encryptions with LL’ perturbations - Is it possible to repair HFE in encryption? - Jacques Patarin, Pierre Varjabedian
2024/1998 (PDF ) Impossible Differential Automation: Model Generation and New Techniques Emanuele Bellini, Paul Huynh, David Gerault, Andrea Visconti, Alessandro De Piccoli, Simone Pelizzola
2024/1997 (PDF ) On format preserving encryption with nonce Alexander Maximov, Jukka Ylitalo
2024/1996 (PDF ) A Framework for Generating S-Box Circuits with Boyar-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin Yongjin Jeon, Seungjun Baek, Giyoon Kim, Jongsung Kim
2024/1995 (PDF ) BitVM: Quasi-Turing Complete Computation on Bitcoin Lukas Aumayr, Zeta Avarikioti, Robin Linus, Matteo Maffei, Andrea Pelosi, Christos Stefo, Alexei Zamyatin
2024/1994 (PDF ) Token-Based Key Exchange - Non-Interactive Key Exchange meets Attribute-Based Encryption Elsie Mestl Fondevik, Kristian Gjøsteen
2024/1993 (PDF ) BOIL: Proof-Carrying Data from Accumulation of Correlated Holographic IOPs Tohru Kohrita, Maksim Nikolaev, Javier Silva
2024/1992 (PDF ) Improved Quantum Linear Attacks and Application to CAST Kaveh Bashiri, Xavier Bonnetain, Akinori Hosoyamada, Nathalie Lang, André Schrottenloher
2024/1991 (PDF ) CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction Song Bian, Zian Zhao, Ruiyu Shen, Zhou Zhang, Ran Mao, Dawei Li, Yizhong Liu, Masaki Waga, Kohei Suenaga, Zhenyu Guan, Jiafeng Hua, Yier Jin, Jianwei Liu
2024/1990 (PDF ) How To Scale Multi-Party Computation Marcel Keller
2024/1989 (PDF ) Revisiting OKVS-based OPRF and PSI: Cryptanalysis and Better Construction Kyoohyung Han, Seongkwang Kim, Byeonghak Lee, Yongha Son
2024/1988 (PDF ) BitGC: Garbled Circuits with 1 Bit per Gate Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu
2024/1986 (PDF ) Improved Quantum Analysis of ARIA Yujin Oh, Kyungbae Jang, Hwajeong Seo
2024/1985 (PDF ) Endomorphisms for Faster Cryptography on Elliptic Curves of Moderate CM Discriminants Dimitri Koshelev, Antonio Sanso
2024/1984 (PDF ) Low Communication Threshold Fully Homomorphic Encryption Alain Passelègue, Damien Stehlé
2024/1983 (PDF ) UTRA: Universe Token Reusability Attack and Verifiable Delegatable Order-Revealing Encryption Jaehwan Park, Hyeonbum Lee, Junbeom Hur, Jae Hong Seo, Doowon Kim
2024/1982 (PDF ) New Results in Quantum Analysis of LED: Featuring One and Two Oracle Attacks Siyi Wang, Kyungbae Jang, Anubhab Baksi, Sumanta Chakraborty, Bryan Lee, Anupam Chattopadhyay, Hwajeong Seo
2024/1981 (PDF ) Shutter Network: Private Transactions from Threshold Cryptography Stefan Dziembowski, Sebastian Faust, Jannik Luhn
2024/1980 (PDF ) Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs Amit Singh Bhati, Elena Andreeva, Simon Müller, Damian Vizar
2024/1979 (PDF ) On the Security of LWE-based KEMs under Various Distributions: A Case Study of Kyber Mingyao Shao, Yuejun Liu, Yongbin Zhou, Yan Shao
2024/1978 (PDF ) µLAM: A LLM-Powered Assistant for Real-Time Micro-architectural Attack Detection and Mitigation Upasana Mandal, Shubhi Shukla, Ayushi Rastogi, Sarani Bhattacharya, Debdeep Mukhopadhyay
2024/1977 (PDF ) Bounded CCA2 Secure Proxy Re-encryption Based on Kyber Shingo Sato, Junji Shikata
2024/1976 (PDF ) HI-CKKS: Is High-Throughput Neglected? Reimagining CKKS Efficiency with Parallelism Fuyuan Chen, Jiankuo Dong, Xiaoyu Hu, Zhenjiang Dong, Wangchen Dai
2024/1975 (PDF ) Quadratic Modelings of Syndrome Decoding Alessio Caminata, Ryann Cartor, Alessio Meneghetti, Rocco Mora, Alex Pellegrini
2024/1974 (PDF ) Efficient and Practical Multi-party Private Set Intersection Cardinality Protocol Shengzhe Meng, Xiaodong Wang, Zijie Lu, Bei Liang
2024/1973 (PDF ) Privately Compute the Item with Maximal Weight Sum in Set Intersection Hongyuan Cai, Xiaodong Wang, Zijie Lu, Bei Liang
2024/1972 (PDF ) RoK, Paper, SISsors – Toolkit for Lattice-based Succinct Arguments Michael Klooß, Russell W. F. Lai, Ngoc Khanh Nguyen, Michał Osadnik
2024/1971 (PDF ) Further Connections Between Isogenies of Supersingular Curves and Bruhat-Tits Trees Steven Galbraith, Valerie Gilchrist, Shai Levin, Ari Markowitz
2024/1970 (PDF ) Scribe: Low-memory SNARKs via Read-Write Streaming Anubhav Baweja, Pratyush Mishra, Tushar Mopuri, Karan Newatia, Steve Wang
2024/1969 (PDF ) SoK: Security of the Ascon Modes Charlotte Lefevre, Bart Mennink
2024/1968 (PDF ) SoK: Pseudorandom Generation for Masked Cryptographic Implementation Rei Ueno, Naofumi Homma, Kazuhiko Minematsu
2024/1967 (PDF ) Analysis of REDOG: The Pad Thai Attack Alex Pellegrini, Marc Vorstermans
2024/1966 (PDF ) Efficient Succinct Zero-Knowledge Arguments in the CL Framework Agathe Beaugrand, Guilhem Castagnos, Fabien Laguillaumie
2024/1965 (PDF ) Onion Franking: Abuse Reports for Mix-Based Private Messaging Matthew Gregoire, Margaret Pierce, Saba Eskandarian
2024/1964 (PDF ) Lova: Lattice-Based Folding Scheme from Unstructured Lattices Giacomo Fenzi, Christian Knabenhans, Ngoc Khanh Nguyen, Duc Tu Pham
2024/1963 (PDF ) Proof of Time: A Method for Verifiable Temporal Commitments Without Timestamp Disclosure Alexander John Lee
2024/1962 (PDF ) uKNIT: Breaking Round-alignment for Cipher Design -- Featuring uKNIT-BC, an Ultra Low-Latency Block Cipher Kai Hu, Mustafa Khairallah, Thomas Peyrin, Quan Quan Tan
2024/1961 (PDF ) On the (Im)possibility of Game-Theoretically Fair Leader Election Protocols Ohad Klein, Ilan Komargodski, Chenzhi Zhu
2024/1960 (PDF ) Share the MAYO: thresholdizing MAYO Sofia Celi, Daniel Escudero, Guilhem Niot
2024/1959 (PDF ) SoK: Privacy-Preserving Transactions in Blockchains Foteini Baldimtsi, Kostas Kryptos Chalkias, Varun Madathil, Arnab Roy
2024/1958 (PDF ) M-Sel: A Message Selection Functional Encryption from Simple Tools Ahmad Khoureich Ka
2024/1957 (PDF ) NICE-PAKE: On the Security of KEM-Based PAKE Constructions without Ideal Ciphers Nouri Alnahawi, Jacob Alperin-Sheriff, Daniel Apon, Gareth T. Davies, Alexander Wiesmaier
2024/1956 (PDF ) MultiReg-FE: Registered FE for Unbounded Inner-Product and Attribute-Weighted Sums Qiuyan Du, Qiaohan Chu, Jie Chen, Man Ho Au, Debiao He
2024/1955 (PDF ) Gold OPRF: Post-Quantum Oblivious Power-Residue PRF Yibin Yang, Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin
2024/1954 (PDF ) A Complete Characterization of One-More Assumptions In the Algebraic Group Model Jake Januzelli, Jiayu Xu
2024/1953 (PDF ) Truncation Untangled: Scaling Fixed-Point Arithmetic for Privacy-Preserving Machine Learning to Large Models and Datasets Christopher Harth-Kitzerow, Ajith Suresh, Georg Carle
2024/1952 (PDF ) Worst-Case Lattice Sampler with Truncated Gadgets and Applications Corentin Jeudy, Olivier Sanders
2024/1951 (PDF ) Vote&Check: Secure Postal Voting with Reduced Trust Assumptions Véronique Cortier, Alexandre Debant, Pierrick Gaudry, Léo Louistisserand
2024/1950 (PDF ) Two-Round 2PC ECDSA at the Cost of 1 OLE Michael Adjedj, Constantin Blokh, Geoffroy Couteau, Arik Galansky, Antoine Joux, Nikolaos Makriyannis
2024/1949 (PDF ) Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for Deep Learning-based Side-Channel Analysis Zhao Minghui, Trevor Yap
2024/1948 (PDF ) ARK: Adaptive Rotation Key Management for Fully Homomorphic Encryption Targeting Memory Efficient Deep Learning Inference Jia-Lin Chan, Wai-Kong Lee, Denis C.-K Wong, Wun-She Yap, Bok-Min Goi
2024/1947 (PDF ) One-More Unforgeability for Multi- and Threshold Signatures Sela Navot, Stefano Tessaro
2024/1946 (PDF ) Distributed Differentially Private Data Analytics via Secure Sketching Jakob Burkhardt, Hannah Keller, Claudio Orlandi, Chris Schwiegelshohn
2024/1945 (PDF ) Multi-Client Attribute-Based and Predicate Encryption from Standard Assumptions David Pointcheval, Robert Schädlich
2024/1944 (PDF ) SoK: The apprentice guide to automated fault injection simulation for security evaluation Asmita Adhikary, Giacomo Tommaso Petrucci, Philippe Tanguy, Vianney Lapôtre, Ileana Buhan
2024/1942 (PDF ) DGMT: A Fully Dynamic Group Signature From Symmetric-key Primitives Mojtaba Fadavi, Sabyasachi Karati, Aylar Erfanian, Reihaneh Safavi-Naini
2024/1941 (PDF ) Universally Composable Server-Supported Signatures for Smartphones Nikita Snetkov, Jelizaveta Vakarjuk, Peeter Laud
2024/1940 (PDF ) A Comprehensive Review of Post-Quantum Cryptography: Challenges and Advances Seyed MohammadReza Hosseini, Hossein Pilaram
2024/1939 (PDF ) Machine Learning-Based Detection of Glitch Attacks in Clock Signal Data Asier Gambra, Durba Chatterjee, Unai Rioja, Igor Armendariz, Lejla Batina
2024/1938 (PDF ) SoK: On the Security Goals of Key Transparency Systems Nicholas Brandt, Mia Filić, Sam A. Markelon
2024/1937 (PDF ) Asynchronous Byzantine Consensus with Trusted Monotonic Counters Yackolley Amoussou-Guenou, Maurice Herlihy, Maria Potop Butucaru
2024/1936 (PDF ) Free Linear Online Phase for Secure Multiparty Shuffle Jiacheng Gao, Yuan Zhang, Sheng Zhong
2024/1935 (PDF ) RevoLUT : Rust Efficient Versatile Oblivious Look-Up-Tables Sofiane Azogagh, Zelma Aubin Birba, Marc-Olivier Killijian, Félix Larose-Gervais, Sébastien Gambs
2024/1934 (PDF ) Quantum One-Time Programs, Revisited Aparna Gupte, Jiahui Liu, Justin Raizes, Bhaskar Roberts, Vinod Vaikuntanathan
2024/1933 (PDF ) On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms George Teseleanu
2024/1932 (PDF ) On Witness Encryption and Laconic Zero-Knowledge Arguments Yanyi Liu, Noam Mazor, Rafael Pass
2024/1931 (PDF ) On White-Box Learning and Public-Key Encryption Yanyi Liu, Noam Mazor, Rafael Pass
2024/1930 (PDF ) Algebraic Zero Knowledge Contingent Payment Javier Gomez-Martinez, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez, Dario Fiore
2024/1929 (PDF ) LightCROSS: A Secure and Memory Optimized Post-Quantum Digital Signature CROSS Harry Hart, Puja Mondal, Suparna Kundu, Supriya Adhikary, Angshuman Karmakar, Chaoyun Li
2024/1928 (PDF ) Generic Security of GCM-SST Akiko Inoue, Ashwin Jha, Bart Mennink, Kazuhiko Minematsu
2024/1927 (PDF ) ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials Anup Kumar Kundu, Shibam Ghosh, Aikata Aikata, Dhiman Saha
2024/1926 (PDF ) Cryptanalysis of BAKSHEESH Block Cipher Shengyuan Xu, Siwei Chen, Xiutao Feng, Zejun Xiang, Xiangyong Zeng
2024/1925 (PDF ) EndGame: Field-Agnostic Succinct Blockchain with Arc Simon Judd
2024/1924 (PDF ) The complexity of solving a random polynomial system Giulia Gaggero, Elisa Gorla
2024/1923 (PDF ) Implementation analysis of index calculus method on elliptic curves over prime finite fields Jianjun HU
2024/1922 (PDF ) Deterministic Consensus using Overpass Channels in Distributed Ledger Technology Brandon "Cryptskii" Ramsay
2024/1921 (PDF ) Downlink (T)FHE ciphertexts compression Antonina Bondarchuk, Olive Chakraborty, Geoffroy Couteau, Renaud Sirdey
2024/1920 (PDF ) An Extended Hierarchy of Security Notions for Threshold Signature Schemes and Automated Analysis of Protocols That Use Them Cas Cremers, Aleksi Peltonen, Mang Zhao
2024/1919 (PDF ) PASTA on Edge: Cryptoprocessor for Hybrid Homomorphic Encryption Aikata Aikata, Daniel Sanz Sobrino, Sujoy Sinha Roy
2024/1918 (PDF ) Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time Florian Hirner, Florian Krieger, Constantin Piber, Sujoy Sinha Roy
2024/1917 (PDF ) Decentralized FHE Computer Gurgen Arakelov, Sergey Gomenyuk, Hovsep Papoyan
2024/1916 (PDF ) Fast, Compact and Hardware-Friendly Bootstrapping in less than 3ms Using Multiple Instruction Multiple Ciphertext Seunghwan Lee, Dohyuk Kim, Dong-Joon Shin
2024/1915 (PDF ) MULTISS: a protocol for long-term secure distributed storage over multiple remote QKD networks Thomas Prévost, Olivier Alibart, Anne Marin, Marc Kaplan
2024/1913 (PDF ) Key Guidance Invocation: A White-box Mode Enables Strong Space Hardness under Adaptively Chosen-Space Attacks Yipeng Shi, Xiaolin Zhang, Boshi Yuan, Chenghao Chen, Jintong Yu, Yuxuan Wang, Chi Zhang, Dawu Gu
2024/1912 (PDF ) Universally Composable and Reliable Password Hardening Services Shaoqiang Wu, Ding Wang
2024/1911 (PDF ) Deletions and Dishonesty: Probabilistic Data Structures in Adversarial Settings Mia Filić, Keran Kocher, Ella Kummer, Anupama Unnikrishnan
2024/1910 (PDF ) Stealth Software Trojan: Amplifying Hidden RF Side-Channels with Ultra High SNR and Data-Rate Gal Cohen, Itamar Levy
2024/1908 (PDF ) Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY Ling Song, Qinggan Fu, Qianqian Yang, Yin Lv, Lei Hu
2024/1907 (PDF ) Towards Optimal Garbled Circuits in the Standard Model Ruiyang Li, Chun Guo, Xiao Wang
2024/1906 (PDF ) On Efficient Computations of $y^2=X^3+b/\mathbb{F}_p$ \\for Primes $p\equiv 1 \pmod 3$ Guangwu Xu, Wei Yu, Ke Han, Pengfei Lu
2024/1905 (PDF ) OPL4GPT: An Application Space Exploration of Optimal Programming Language for Hardware Design by LLM Kimia Tasnia, Sazadur Rahman
2024/1904 (PDF ) An Open Source Ecosystem for Implementation Security Testing Aydin Aysu, Fatemeh Ganji, Trey Marcantonio, Patrick Schaumont
2024/1903 (PDF ) Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus Mahdi Mahdavi, Navid Abapour, Zahra Ahmadian
2024/1902 (PDF ) ZK-SNARKs for Ballot Validity: A Feasibility Study Nicolas Huber, Ralf Kuesters, Julian Liedtke, Daniel Rausch
2024/1901 (PDF ) On the Insecurity of Bloom Filter-Based Private Set Intersections Jelle Vos, Jorrit van Assen, Tjitske Koster, Evangelia Anna Markatou, Zekeriya Erkin
2024/1900 (PDF ) Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith Fukang Liu, Katharina Koschatko, Lorenzo Grassi, Hailun Yan, Shiyao Chen, Subhadeep Banik, Willi Meier
2024/1899 (PDF ) Fast Multiplication and the PLWE-RLWE Equivalence for an Infinite Family of Maximal Real Subfields of Cyclotomic Fields Joonas Ahola, Iván Blanco-Chacón, Wilmar Bolaños, Antti Haavikko, Camilla Hollanti, Rodrigo M. Sánchez-Ledesma
2024/1898 (PDF ) NTRU-based Bootstrapping for MK-FHEs without using Overstretched Parameters Binwu Xiang, Jiang Zhang, Kaixing Wang, Yi Deng, Dengguo Feng
2024/1897 (PDF ) On Threshold Signatures from MPC-in-the-Head Eliana Carozza, Geoffroy Couteau
2024/1896 (PDF ) Shardora: Towards Scaling Blockchain Sharding via Unleashing Parallelism Yu Tao, Lu Zhou, Lei Xie, Dongming Zhang, Xinyu Lei, Fei Xu, Zhe Liu
2024/1895 (PDF ) A Tool for Fast and Secure LWE Parameter Selection: the FHE case Beatrice Biasioli, Elena Kirshanova, Chiara Marcolla, Sergi Rovira
2024/1894 (PDF ) A non-comparison oblivious sort and its application to private k-NN Sofiane Azogagh, Marc-Olivier Killijian, Félix Larose-Gervais
2024/1893 (PDF ) High Speed High Assurance implementations of Multivariate Quadratic based Signatures Samyuktha M, Pallavi Borkar, Chester Rebeiro
2024/1892 (PDF ) A Comprehensive Survey on Hardware-Software co-Protection against Invasive, Non-Invasive and Interactive Security Threats Md Habibur Rahman
2024/1891 (PDF ) Shifting our knowledge of MQ-Sign security Lars Ran, Monika Trimoska
2024/1890 (PDF ) Optimized FPGA Architecture for Modular Reduction in NTT Tolun Tosun, Selim Kırbıyık, Emre Koçer, Ersin Alaybeyoğlu
2024/1889 (PDF ) IO-Optimized Design-Time Configurable Negacyclic Seven-Step NTT Architecture for FHE Applications Emre Koçer, Selim Kırbıyık, Tolun Tosun, Ersin Alaybeyoğlu, Erkay Savaş
2024/1888 (PDF ) Chosen-Prefix Collisions on AES-like Hashing Shiyao Chen, Xiaoyang Dong, Jian Guo, Tianyu Zhang
2024/1887 (PDF ) Differential MITM attacks on SLIM and LBCIoT Peter Grochal, Martin Stanek
2024/1886 (PDF ) Impossibility Results for Post-Compromise Security in Real-World Communication Systems Cas Cremers, Niklas Medinger, Aurora Naska
2024/1885 (PDF ) Improved PIR Schemes using Matching Vectors and Derivatives Fatemeh Ghasemi, Swastik Kopparty, Madhu Sudan
2024/1884 (PDF ) Age-aware Fairness in Blockchain Transaction Ordering for Reducing Tail Latency Yaakov Sokolik, Mohammad Nassar, Ori Rottenstriech
2024/1883 (PDF ) A Fault Analysis on SNOVA Gustavo Banegas, Ricardo Villanueva-Polanco
2024/1882 (PDF ) Single Trace Side-Channel Attack on the MPC-in-the-Head Framework Julie Godard, Nicolas Aragon, Philippe Gaborit, Antoine Loiseau, Julien Maillard
2024/1881 (PDF ) THOR: Secure Transformer Inference with Homomorphic Encryption Jungho Moon, Dongwoo Yoo, Xiaoqian Jiang, Miran Kim
2024/1880 (PDF ) Cryptography Experiments In Lean 4: SHA-3 Implementation Gérald Doussot
2024/1879 (PDF ) Practical Zero-Knowledge PIOP for Maliciously Secure Multiparty Homomorphic Encryption Intak Hwang, Hyeonbum Lee, Jinyeong Seo, Yongsoo Song
2024/1878 (PDF ) Tighter Provable Security for TreeKEM Karen Azari, Andreas Ellison
2024/1877 (PDF ) On the Black-Box Complexity of Private-Key Inner-Product Functional Encryption Mohammad Hajiabadi, Roman Langrehr, Adam O'Neill, Mingyuan Wang
2024/1876 (PDF ) Unbounded Leakage-Resilient Encryption and Signatures Alper Çakan, Vipul Goyal
2024/1875 (PDF ) mUOV: Masking the Unbalanced Oil and Vinegar Digital Signature Scheme at First- and Higher-Order Suparna Kundu, Quinten Norga, Angshuman Karmakar, Uttam Kumar Ojha, Anindya Ganguly, Ingrid Verbauwhede
2024/1874 (PDF ) Multi-Holder Anonymous Credentials from BBS Signatures Andrea Flamini, Eysa Lee, Anna Lysyanskaya
2024/1873 (PDF ) $\mathsf{Cirrus}$: Performant and Accountable Distributed SNARK Wenhao Wang, Fangyan Shi, Dani Vilardell, Fan Zhang
2024/1872 (PDF ) Amigo: Secure Group Mesh Messaging in Realistic Protest Settings David Inyangson, Sarah Radway, Tushar M. Jois, Nelly Fazio, James Mickens
2024/1871 (PDF ) Field-Agnostic SNARKs from Expand-Accumulate Codes Alexander R. Block, Zhiyong Fang, Jonathan Katz, Justin Thaler, Hendrik Waldner, Yupeng Zhang
2024/1870 (PDF ) A Divide-and-Conquer Strategy for Hard-Label Extraction of Deep Neural Networks via Side-Channel Attacks Benoit Coqueret, Mathieu Carbone, Olivier Sentieys, Gabriel Zaid
2024/1869 (PDF ) Black-box Collision Attacks on Widely Deployed Perceptual Hash Functions Diane Leblanc-Albarel, Bart Preneel
2024/1868 (PDF ) IMOK: A compact connector for non-prohibition proofs to privacy-preserving applications Oleksandr Kurbatov, Lasha Antadze, Ameen Soleimani, Kyrylo Riabov, Artem Sdobnov
2024/1867 (PDF ) Symmetric Twin Column Parity Mixers and their Applications Hao Lei, Raghvendra Rohit, Guoxiao Liu, Jiahui He, Mohamed Rachidi, Keting Jia, Kai Hu, Meiqin Wang
2024/1866 (PDF ) ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors Asmita Adhikary, Abraham J. Basurto Becerra, Lejla Batina, Ileana Buhan, Durba Chatterjee, Senna van Hoek, Eloi Sanfelix Gonzalez
2024/1865 (PDF ) Tightly-Secure Group Key Exchange with Perfect Forward Secrecy Emanuele Di Giandomenico, Doreen Riepel, Sven Schäge
2024/1864 (PDF ) Tweakable ForkCipher from Ideal Block Cipher Sougata Mandal
2024/1863 (PDF ) Blockchain-Based Carbon Footprint Management Umut Pekel, Oguz Yayla
2024/1862 (PDF ) BatchZK: A Fully Pipelined GPU-Accelerated System for Batch Generation of Zero-Knowledge Proofs Tao Lu, Yuxun Chen, Zonghui Wang, Xiaohang Wang, Wenzhi Chen, Jiaheng Zhang
2024/1861 (PDF ) Another Lattice Attack Against an RSA-like Cryptosystem George Teseleanu
2024/1859 (PDF ) Non-interactive Fully Encrypted Machine Learning Protocol for Inference Seungwan Hong, Jiseung Kim, Changmin Lee, Minhye Seo
2024/1858 (PDF ) (In)Security of Threshold Fully Homomorphic Encryption based on Shamir Secret Sharing Wonhee Cho, Jiseung Kim, Changmin Lee
2024/1857 (PDF ) Access-Controlled Inner Product Function-Revealing Encryption Ojaswi Acharya, Weiqi Feng, Roman Langrehr, Adam O'Neill
2024/1856 (PDF ) "There's always another counter": Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting Upasana Mandal, Rupali Kalundia, Nimish Mishra, Shubhi Shukla, Sarani Bhattacharya, Debdeep Mukhopadhyay
2024/1855 (PDF ) Lova: A Novel Framework for Verifying Mathematical Proofs with Incrementally Verifiable Computation Noel Elias
2024/1854 (PDF ) A Zero-Knowledge PCP Theorem Tom Gur, Jack O'Connor, Nicholas Spooner
2024/1853 (PDF ) Giant Does NOT Mean Strong: Cryptanalysis of BQTRU Ali Raya, Vikas Kumar, Aditi Kar Gangopadhyay, Sugata Gangopadhyay
2024/1852 (PDF ) Faster algorithms for isogeny computations over extensions of finite fields Shiping Cai, Mingjie Chen, Christophe Petit
2024/1851 (PDF ) Secure Transformer-Based Neural Network Inference for Protein Sequence Classification Jingwei Chen, Linhan Yang, Chen Yang, Shuai Wang, Rui Li, Weijie Miao, Wenyuan Wu, Li Yang, Kang Wu, Lizhong Dai
2024/1850 (PDF ) Single-trace side-channel attacks on MAYO exploiting leaky modular multiplication Sönke Jendral, Elena Dubrova
2024/1849 (PDF ) A Linearisation Method for Identifying Dependencies in Differential Characteristics: Examining the Intersection of Deterministic Linear Relations and Nonlinear Constraints Ling Sun
2024/1848 (PDF ) Non-Interactive Zero-Knowledge Arguments with Certified Deletion Kasra Abbaszadeh, Jonathan Katz
2024/1847 (PDF ) Notions of Quantum Reductions and Impossibility of Statistical NIZK Chuhan Lu, Nikhil Pappu
2024/1846 (PDF ) The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy Vadim Lyubashevsky, Gregor Seiler, Patrick Steuer
2024/1845 (PDF ) Single-Server Client Preprocessing PIR with Tight Space-Time Trade-off Zhikun Wang, Ling Ren
2024/1844 (PDF ) KLaPoTi: An asymptotically efficient isogeny group action from 2-dimensional isogenies Lorenz Panny, Christophe Petit, Miha Stopar
2024/1843 (PDF ) Khatam: Reducing the Communication Complexity of Code-Based SNARKs Hadas Zeilberger
2024/1842 (PDF ) Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, Sebastian Steinhorst
2024/1841 (PDF ) Verifying Jolt zkVM Lookup Semantics Carl Kwan, Quang Dao, Justin Thaler
2024/1840 (PDF ) Ideal Pseudorandom Codes Omar Alrabiah, Prabhanjan Ananth, Miranda Christ, Yevgeniy Dodis, Sam Gunn
2024/1839 (PDF ) Cryptographically Secure Digital Consent F. Betül Durak, Abdullah Talayhan, Serge Vaudenay
2024/1838 (PDF ) Pushing the QAM method for finding APN functions further Nadiia Ichanska, Simon Berg, Nikolay S. Kaleyski, Yuyin Yu
2024/1837 (PDF ) Analyze Your Leakage! Security Analysis of Encryption Schemes for Substring Search Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis
2024/1836 (PDF ) Symmetric Encryption on a Quantum Computer David Garvin, Oleksiy Kondratyev, Alexander Lipton, Marco Paini
2024/1835 (PDF ) Hybrid Zero-Knowledge from Garbled Circuits Masayuki Abe, Miguel Ambrona, Miyako Ohkubo
2024/1834 (PDF ) Scutum: Temporal Verification for Cross-Rollup Bridges via Goal-Driven Reduction Yanju Chen, Juson Xia, Bo Wen, Kyle Charbonnet, Hongbo Wen, Hanzhi Liu, Luke Pearson, Yu Feng
2024/1833 (PDF ) Private Neural Network Training with Packed Secret Sharing Hengcheng Zhou
2024/1832 (PDF ) How to Delete Without a Trace: Certified Deniability in a Quantum World Alper Çakan, Vipul Goyal, Justin Raizes
2024/1831 (PDF ) Fast Two-party Threshold ECDSA with Proactive Security Brian Koziel, S. Dov Gordon, Craig Gentry
2024/1830 (PDF ) A Tight Analysis of GHOST Consistency Peter Gaži, Zahra Motaqy, Alexander Russell
2024/1829 (PDF ) Compiled Nonlocal Games from any Trapdoor Claw-Free Function Kaniuar Bacho, Alexander Kulpe, Giulio Malavolta, Simon Schmidt, Michael Walter
2024/1828 (PDF ) Classic McEliece Hardware Implementation with Enhanced Side-Channel and Fault Resistance Peizhou Gan, Prasanna Ravi, Kamal Raj, Anubhab Baksi, Anupam Chattopadhyay
2024/1827 (PDF ) OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM Xander Pottier, Thomas de Ruijter, Jonas Bertels, Wouter Legiest, Michiel Van Beirendonck, Ingrid Verbauwhede
2024/1826 (PDF ) Cloning Games, Black Holes and Cryptography Alexander Poremba, Seyoon Ragavan, Vinod Vaikuntanathan
2024/1825 (PDF ) BrakingBase - a linear prover, poly-logarithmic verifier, field agnostic polynomial commitment scheme Vineet Nair, Ashish Sharma, Bhargav Thankey
2024/1824 (PDF ) Constructing Dembowski–Ostrom permutation polynomials from upper triangular matrices Yuyin Yu, Yanbin Zheng, Yongqiang Li, Jingang Liu
2024/1823 (PDF ) A Composability Treatment of Bitcoin's Transaction Ledger with Variable Difficulty Juan Garay, Yun Lu, Julien Prat, Brady Testa, Vassilis Zikas
2024/1822 (PDF ) Anonymous Public-Key Quantum Money and Quantum Voting Alper Çakan, Vipul Goyal, Takashi Yamakawa
2024/1821 (PDF ) SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security Jianan Su, Laasya Bangalore, Harel Berger, Jason Yi, Sophia Castor, Micah Sherr, Muthuramakrishnan Venkitasubramaniam
2024/1820 (PDF ) On the Power of Oblivious State Preparation James Bartusek, Dakshita Khurana
2024/1819 (PDF ) VCVio: A Formally Verified Forking Lemma and Fiat-Shamir Transform, via a Flexible and Expressive Oracle Representation Devon Tuma, Nicholas Hopper
2024/1818 (PDF ) SoK: On the Physical Security of UOV-based Signature Schemes Thomas Aulbach, Fabio Campos, Juliane Krämer
2024/1817 (PDF ) Improved ML-DSA Hardware Implementation With First Order Masking Countermeasure Kamal Raj, Prasanna Ravi, Tee Kiah Chia, Anupam Chattopadhyay
2024/1816 (PDF ) Attacking Automotive RKE Security: How Smart are your ‘Smart’ Keys? Ritul Satish, Alfred Daimari, Argha Chakrabarty, Kahaan Shah, Debayan Gupta
2024/1815 (PDF ) Succinct Randomized Encodings from Laconic Function Evaluation, Faster and Simpler Nir Bitansky, Rachit Garg
2024/1814 (PDF ) SophOMR: Improved Oblivious Message Retrieval from SIMD-Aware Homomorphic Compression Keewoo Lee, Yongdong Yeo
2024/1813 (PDF ) Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD: More Applications of Pseudo-Random Injections Mustafa Khairallah
2024/1812 (PDF ) Batching Adaptively-Sound SNARGs for NP Lalita Devadas, Brent Waters, David J. Wu
2024/1811 (PDF ) Pseudorandom Function-like States from Common Haar Unitary Minki Hhan, Shogo Yamada
2024/1810 (PDF ) Linear Proximity Gap for Linear Codes within the 1.5 Johnson Bound Yiwen Gao, Haibin Kan, Yuan Li
2024/1809 (PDF ) Foundations of Adaptor Signatures Paul Gerhart, Dominique Schröder, Pratik Soni, Sri AravindaKrishnan Thyagarajan
2024/1808 (PDF ) Breaking BASS Simon-Philipp Merz, Kenneth G. Paterson, Àlex Rodríguez García
2024/1807 (PDF ) An Unstoppable Ideal Functionality for Signatures and a Modular Analysis of the Dolev-Strong Broadcast Ran Cohen, Jack Doerner, Eysa Lee, Anna Lysyanskaya, Lawrence Roy
2024/1806 (PDF ) Encrypted RAM Delegation: Homomorphic NIZKs, Malicious MPC with Optimal Communication Complexity, and more Abtin Afshar, Jiaqi Cheng, Rishab Goyal, Aayush Yadav, Saikumar Yadugiri
2024/1805 (PDF ) Solving the Shortest Vector Problem in $2^{0.63269n+o(n)}$ time on Random Lattices Amaury Pouly, Yixin Shen
2024/1804 (PDF ) Quantum Chosen-Cipher Attack on Camellia Yanjun Li, Qi Wang, DingYun Huang, Jian Liu, Huiqin Xie
2024/1803 (PDF ) Siniel: Distributed Privacy-Preserving zkSNARK Yunbo Yang, Yuejia Cheng, Kailun Wang, Xiaoguo Li, Jianfei Sun, Jiachen Shen, Xiaolei Dong, Zhenfu Cao, Guomin Yang, Robert H. Deng
2024/1802 (PDF ) ColliderScript: Covenants in Bitcoin via 160-bit hash collisions Ethan Heilman, Victor I. Kolobov, Avihu M. Levy, Andrew Poelstra
2024/1801 (PDF ) Investigation of the Optimal Linear Characteristics of BAKSHEESH (Full Version) Yuxuan Peng, Jinpeng Liu, Ling Sun
2024/1800 (PDF ) Privacy-Preserving Multi-Party Search via Homomorphic Encryption with Constant Multiplicative Depth Mihail-Iulian Pleşa, Ruxandra F. Olimid
2024/1799 (PDF ) Consensus Under Adversary Majority Done Right Srivatsan Sridhar, Ertem Nusret Tas, Joachim Neu, Dionysis Zindros, David Tse
2024/1798 (PDF ) Quantum One-Time Protection of any Randomized Algorithm Sam Gunn, Ramis Movassagh
2024/1797 (PDF ) FLock: Robust and Privacy-Preserving Federated Learning based on Practical Blockchain State Channels Ruonan Chen, Ye Dong, Yizhong Liu, Tingyu Fan, Dawei Li, Zhenyu Guan, Jianwei Liu, Jianying Zhou
2024/1796 (PDF ) Isogeny interpolation and the computation of isogenies from higher dimensional representations David Jao, Jeanne Laflamme
2024/1795 (PDF ) How Fast Does the Inverse Walk Approximate a Random Permutation? Vishesh Jain, Tianren Liu, Clayton Mizgerd, Angelos Pelecanos, Stefano Tessaro, Vinod Vaikuntanathan
2024/1794 (PDF ) How Much Public Randomness Do Modern Consensus Protocols Need? Joseph Bonneau, Benedikt Bünz, Miranda Christ, Yuval Efron
2024/1793 (PDF ) On the Jordan-Gauss graphs and new multivariate public keys Vasyl Ustimenko, Tymoteusz Chojecki, Aneta Wróblewska
2024/1792 (PDF ) Towards Explainable Side-Channel Leakage: Unveiling the Secrets of Microarchitecture Ischa Stork, Vipul Arora, Łukasz Chmielewski, Ileana Buhan
2024/1791 (PDF ) Discrete gaussian sampling for BKZ-reduced basis Amaury Pouly, Yixin Shen
2024/1790 (PDF ) Revisiting subgroup membership testing on pairing-friendly curves via the Tate pairing Yu Dai, Debiao He, Dimitri Koshelev, Cong Peng, Zhijian Yang
2024/1789 (PDF ) Stealth and Beyond: Attribute-Driven Accountability in Bitcoin Transactions Alberto Maria Mongardini, Daniele Friolo, Giuseppe Ateniese
2024/1788 (PDF ) Advanced Transparency System Yuxuan Sun, Yuncong Hu, Yu Yu
2024/1787 (PDF ) An Efficient and Secure Boolean Function Evaluation Protocol Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Sumit Kumar Debnath, Pantelimon Stanica
2024/1786 (PDF ) Black-Box Timed Commitments from Time-Lock Puzzles Hamza Abusalah, Gennaro Avitabile
2024/1785 (PDF ) A General Quantum Duality for Representations of Groups with Applications to Quantum Money, Lightning, and Fire John Bostanci, Barak Nehoran, Mark Zhandry
2024/1784 (PDF ) Fine-Grained Non-Interactive Key-Exchange without Idealized Assumptions, and Lower Bounds Yuyu Wang, Chuanjie Su, Jiaxin Pan, Chunxiang Xu
2024/1783 (PDF ) PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng
2024/1782 (PDF ) Is Periodic Pseudo-randomization Sufficient for Beacon Privacy? Liron David, Avinatan Hassidim, Yossi Matias, Moti Yung
2024/1781 (PDF ) New results in Share Conversion, with applications to evolving access structures Tamar Ben David, Varun Narayanan, Olga Nissenbaum, Anat Paskin-Cherniavsky
2024/1780 (PDF ) ABE for Circuits with $\mathsf{poly}(\lambda)$-sized Keys from LWE Valerio Cini, Hoeteck Wee
2024/1779 (PDF ) Secure Pairing-Free IBE and CP-ABE from Inner-Product Functional Encryption Ahmad Khoureich Ka
2024/1778 (PDF ) Construction of quadratic APN functions with coefficients in $\mathbb{F}_2$ in dimensions $10$ and $11$ Yuyin Yu, Jingchen Li, Nadiia Ichanska, Nikolay Kaleyski
2024/1777 (PDF ) Masking Gaussian Elimination at Arbitrary Order, with Application to Multivariate- and Code-Based PQC Quinten Norga, Suparna Kundu, Uttam Kumar Ojha, Anindya Ganguly, Angshuman Karmakar, Ingrid Verbauwhede
2024/1776 (PDF ) An efficient collision attack on Castryck-Decru-Smith’s hash function Ryo Ohashi, Hiroshi Onuki
2024/1775 (PDF ) zkMarket: Ensuring Fairness and Privacy in Decentralized Data Exchange Seongho Park, Seungwoo Kim, Semin Han, Kyeongtae Lee, Jihye Kim, Hyunok Oh
2024/1774 (PDF ) PANTHER: Private Approximate Nearest Neighbor Search in the Single Server Setting Jingyu Li, Zhicong Huang, Min Zhang, Cheng Hong, Jian Liu, Tao Wei, Wenguang Chen
2024/1773 (PDF ) Universal Adaptor Signatures from Blackbox Multi-Party Computation Michele Ciampi, Xiangyu Liu, Ioannis Tzannetos, Vassilis Zikas
2024/1772 (PDF ) Byte-wise equal property of ARADI Sunyeop Kim, Insung Kim, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong
2024/1771 (PDF ) PRIME: Differentially Private Distributed Mean Estimation with Malicious Security Laasya Bangalore, Albert Cheu, Muthuramakrishnan Venkitasubramaniam
2024/1770 (PDF ) Improved Attacks for SNOVA by Exploiting Stability under a Group Action Daniel Cabarcas, Peigen Li, Javier Verbel, Ricardo Villanueva-Polanco
2024/1769 (PDF ) A Closer Look at Falcon Pierre-Alain Fouque, Phillip Gajland, Hubert de Groote, Jonas Janneck, Eike Kiltz
2024/1768 (PDF ) Programmable Bitcoin Verification via Synthesis-Aided Lifting Hanzhi Liu, Jingyu Ke, Hongbo Wen, Luke Pearson, Robin Linus, Lukas George, Manish Bista, Hakan Karakuş, Domo, Junrui Liu, Yanju Chen, Yu Feng
2024/1767 (PDF ) ECPM Cryptanalysis Resource Estimation Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Jaehan Cho, Howon Kim
2024/1766 (PDF ) Critical Rounds in Multi-Round Proofs: Proof of Partial Knowledge and Trapdoor Commitments Masayuki Abe, David Balbás, Dung Bui, Miyako Ohkubo, Zehua Shang, Akira Takahashi, Mehdi Tibouchi
2024/1765 (PDF ) Compact and Tightly Secure (Anonymous) IBE from Module LWE in the QROM Toi Tomita, Junji Shikata
2024/1764 (PDF ) Fully Homomorphic Encryption with Efficient Public Verification Mi-Ying (Miryam) Huang, Baiyu Li, Xinyu Mao, Jiapeng Zhang
2024/1763 (PDF ) Quantum Black-Box Separations: Succinct Non-Interactive Arguments from Falsifiable Assumptions Gorjan Alagic, Dana Dachman-Soled, Manasi Shingane, Patrick Struck
2024/1762 (PDF ) Homomorphic Matrix Operations under Bicyclic Encoding Jingwei Chen, Linhan Yang, Wenyuan Wu, Yang Liu, Yong Feng
2024/1761 (PDF ) Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing Hao Cheng, Jiliang Li, Yizhong Liu, Yuan Lu, Weizhi Meng, Zhenfeng Zhang
2024/1760 (PDF ) Somewhat Homomorphic Encryption from Linear Homomorphism and Sparse LPN Henry Corrigan-Gibbs, Alexandra Henzinger, Yael Tauman Kalai, Vinod Vaikuntanathan
2024/1759 (PDF ) A Forgery Attack on a Code-based Signature Scheme Ali Babaei, Taraneh Eghlidos
2024/1758 (PDF ) A comprehensive analysis of Regev's quantum algorithm Razvan Barbulescu, Mugurel Barcau, Vicentiu Pasol
2024/1757 (PDF ) On the Sample Complexity of Linear Code Equivalence for all Code Rates Alessandro Budroni, Andrea Natale
2024/1756 (PDF ) $\mathsf{Graphiti}$: Secure Graph Computation Made More Scalable Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2024/1755 (PDF ) Exponential sums in linear cryptanalysis Tim Beyne, Clémence Bouvier
2024/1754 (PDF ) PQNTRU: Acceleration of NTRU-based Schemes via Customized Post-Quantum Processor Zewen Ye, Junhao Huang, Tianshun Huang, Yudan Bai, Jinze Li, Hao Zhang, Guangyan Li, Donglong Chen, Ray C.C. Cheung, Kejie Huang
2024/1753 (PDF ) HTCNN: High-Throughput Batch CNN Inference with Homomorphic Encryption Zewen Ye, Tianyu Wang, Tianshun Huang, Yonggen Li, Chengxuan Wang, Ray C.C. Cheung, Kejie Huang
2024/1752 (PDF ) DEEP Commitments and Their Applications Alan Szepieniec
2024/1751 (PDF ) Offline-Online Indifferentiability of Cryptographic Systems Ashrujit Ghoshal, Ilan Komargodski, Gil Segev
2024/1750 (PDF ) Robust Double Auctions for Resource Allocation Arthur Lazzaretti, Charalampos Papamanthou, Ismael Hishon-Rezaizadeh
2024/1749 (PDF ) Revisiting the “improving the security of multi-party quantum key agreement with five- qubit Brown states” Yu-Yuan Chou, Hsien-Hung Liu, Jue-Sam Chou
2024/1748 (PDF ) New Experimental Evidences For the Riemann Hypothesis Zhengjun Cao
2024/1747 (PDF ) POMS : Proxy Offloading for Multicloud Storage with Keyword Search Adam Oumar Abdel-Rahman, Sofiane Azogagh, Zelma Aubin Birba, Arthur Tran Van
2024/1746 (PDF ) Secure and Privacy-preserving CBDC Offline Payments using a Secure Element Elli Androulaki, Angelo De Caro, Kaoutar El Khiyaoui, Romain Gay, Rebekah Mercer, Alessandro Sorniotti
2024/1745 (PDF ) Pseudorandomness in the (Inverseless) Haar Random Oracle Model Prabhanjan Ananth, John Bostanci, Aditya Gulati, Yao-Ting Lin
2024/1744 (PDF ) PEARL-SCALLOP: Parameter Extension Applicable in Real-Life SCALLOP Bill Allombert, Jean-François Biasse, Jonathan Komada Eriksen, Péter Kutas, Chris Leonardi, Aurel Page, Renate Scheidler, Márton Tot Bagi
2024/1743 (PDF ) The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs Emanuele Bellini, David GERAULT, Juan Grados, Thomas Peyrin
2024/1742 (PDF ) Pseudorandom Obfuscation and Applications Pedro Branco, Nico Döttling, Abhishek Jain, Giulio Malavolta, Surya Mathialagan, Spencer Peters, Vinod Vaikuntanathan
2024/1741 (PDF ) The Learning Stabilizers with Noise problem Alexander Poremba, Yihui Quek, Peter Shor
2024/1740 (PDF ) OpenNTT: An Automated Toolchain for Compiling High-Performance NTT Accelerators in FHE Florian Krieger, Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy
2024/1739 (PDF ) Provably Robust Watermarks for Open-Source Language Models Miranda Christ, Sam Gunn, Tal Malkin, Mariana Raykova
2024/1738 (PDF ) More Efficient Isogeny Proofs of Knowledge via Canonical Modular Polynomials Thomas den Hollander, Sören Kleine, Marzio Mula, Daniel Slamanig, Sebastian A. Spindler
2024/1737 (PDF ) Embedded Curves and Embedded Families for SNARK-Friendly Curves Aurore Guillevic, Simon Masson
2024/1736 (PDF ) A graph-theoretic approach to analyzing decoding failures of BIKE Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray Perlner, Angela Robinson
2024/1735 (PDF ) The Mysteries of LRA: Roots and Progresses in Side-channel Applications Jiangshan Long, Changhai Ou, Zhu Wang, Fan Zhang
2024/1734 (PDF ) Optimizing Message Range and Ciphertext Storage in GSW Encryption Using CRT and PVW-like Compression Scheme Kung-Wei Hu, Huan-Chih Wang, Ja-Ling Wu
2024/1733 (PDF ) One Time Pad and the Short Key Dream Umberto Cerruti
2024/1732 (PDF ) Radical 2-isogenies and cryptographic hash functions in dimensions 1, 2 and 3 Sabrina Kunzweiler, Luciano Maino, Tomoki Moriya, Christophe Petit, Giacomo Pope, Damien Robert, Miha Stopar, Yan Bo Ti
2024/1731 (PDF ) Arc: Accumulation for Reed--Solomon Codes Benedikt Bünz, Pratyush Mishra, Wilson Nguyen, William Wang
2024/1730 (PDF ) Secure and Efficient Outsourced Matrix Multiplication with Homomorphic Encryption Aikata Aikata, Sujoy Sinha Roy
2024/1729 (PDF ) cuTraNTT: A Novel Transposed Number Theoretic Transform Targeting Low Latency Homomorphic Encryption for IoT Applications Supriya Adhikary, Wai Kong Lee, Angshuman Karmakar, Yongwoo Lee, Seong Oun Hwang, Ramachandra Achar
2024/1728 (PDF ) On Key Substitution Attacks against Aggregate Signatures and Multi-Signatures Yuuki Fujita, Yusuke Sakai, Kyosuke Yamashita, Goichiro Hanaoka
2024/1727 (PDF ) (Quantum) Indifferentiability and Pre-Computation Joseph Carolan, Alexander Poremba, Mark Zhandry
2024/1726 (PDF ) On the Equivalence between Classical Position Verification and Certified Randomness Fatih Kaleoglu, Minzhao Liu, Kaushik Chakraborty, David Cui, Omar Amer, Marco Pistoia, Charles Lim
2024/1725 (PDF ) PISA: Privacy-Preserving Smart Parking Sayon Duttagupta, Dave Singelée
2024/1724 (PDF ) Straight-Line Knowledge Extraction for Multi-Round Protocols Lior Rotem, Stefano Tessaro
2024/1723 (PDF ) Proving the Security of the Extended Summation-Truncation Hybrid Avijit Dutta, Eik List
2024/1722 (PDF ) Revisiting Fermat's Factorization Method Gajraj Kuldeep, Rune Hylsberg Jacobsen
2024/1721 (PDF ) An Efficient Noncommutative NTRU from Semidirect Product Vikas Kumar, Ali Raya, Aditi Kar Gangopadhyay, Sugata Gangopadhyay, Md Tarique Hussain
2024/1720 (PDF ) Pseudorandom Multi-Input Functional Encryption and Applications Shweta Agrawal, Simran Kumari, Shota Yamada
2024/1719 (PDF ) Compact Pseudorandom Functional Encryption from Evasive LWE Shweta Agrawal, Simran Kumari, Shota Yamada
2024/1718 (PDF ) Drifting Towards Better Error Probabilities in Fully Homomorphic Encryption Schemes Olivier Bernard, Marc Joye, Nigel P. Smart, Michael Walter
2024/1717 (PDF ) Practical Asynchronous MPC from Lightweight Cryptography Atsuki Momose
2024/1716 (PDF ) Rate-1 Statistical Non-Interactive Zero-Knowledge Pedro Branco, Nico Döttling, Akshayaram Srinivasan
2024/1715 (PDF ) OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates Haiyue Dong, Qian Guo
2024/1714 (PDF ) Theoretical Approaches to Solving the Shortest Vector Problem in NP-Hard Lattice-Based Cryptography with Post-SUSY Theories of Quantum Gravity in Polynomial Time by Orch-Or Trevor Nestor
2024/1713 (PDF ) Universally Composable Non-Interactive Zero-Knowledge from Sigma Protocols via a New Straight-line Compiler Megan Chen, Pousali Dey, Chaya Ganesh, Pratyay Mukherjee, Pratik Sarkar, Swagata Sasmal
2024/1712 (PDF ) Efficient Updatable PSI from Asymmetric PSI and PSU Guowei Ling, Peng Tang, Weidong Qiu
2024/1711 (PDF ) Good Things Come to Those Who Wait: Dishonest-Majority Coin-Flipping Requires Delay Functions Joseph Bonneau, Benedikt Bünz, Miranda Christ, Yuval Efron
2024/1710 (PDF ) $\widetilde{\mbox{O}}$ptimal Adaptively Secure Hash-based Asynchronous Common Subset Hanwen Feng, Zhenliang Lu, Qiang Tang
2024/1709 (PDF ) Do Not Disturb a Sleeping Falcon: Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences Xiuhan Lin, Mehdi Tibouchi, Yang Yu, Shiduo Zhang
2024/1708 (PDF ) Subliminal Encrypted Multi-Maps and Black-Box Leakage Absorption Amine Bahi, Seny Kamara, Tarik Moataz, Guevara Noubir
2024/1707 (PDF ) CountCrypt: Quantum Cryptography between QCMA and PP Eli Goldin, Tomoyuki Morimae, Saachi Mutreja, Takashi Yamakawa
2024/1706 (PDF ) State of the art of HFE variants Is it possible to repair HFE with appropriate perturbations? Benoit COGLIATI, Gilles Macariot-Rat, Jacques Patarin, Pierre Varjabedian
2024/1705 (PDF ) Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience Yuan Su, Yuan Lu, Jiliang Li, Yuyi Wang, Chengyi Dong, Qiang Tang
2024/1704 (PDF ) From One-Time to Two-Round Reusable Multi-Signatures without Nested Forking Lior Rotem, Gil Segev, Eylon Yogev
2024/1703 (PDF ) Free-XOR Gate Bootstrapping Chunling Chen, Xianhui Lu, Ruida Wang, Zhihao Li, Xuan Shen, Benqiang Wei
2024/1702 (PDF ) Secure and efficient transciphering for FHE-based MPC Diego F. Aranha, Antonio Guimarães, Clément Hoffmann, Pierrick Méaux
2024/1701 (PDF ) Secure Computation with Parallel Calls to 2-ary Functions Varun Narayanan, Shubham Vivek Pawar, Akshayaram Srinivasan
2024/1700 (PDF ) Does quantum lattice sieving require quantum RAM? Beomgeun Cho, Minki Hhan, Taehyun Kim, Jeonghoon Lee, Yixin Shen
2024/1699 (PDF ) HADES: Range-Filtered Private Aggregation on Public Data Xiaoyuan Liu, Ni Trieu, Trinabh Gupta, Ishtiyaque Ahmad, Dawn Song
2024/1698 (PDF ) Computational Analysis of Plausibly Post-Quantum-Secure Recursive Arguments of Knowledge Dustin Ray, Paulo L. Barreto
2024/1697 (PDF ) On pairing-friendly 2-cycles and SNARK-friendly 2-chains of elliptic curves containing a curve from a prime-order family Tomáš Novotný, Vladimír Sedláček
2024/1696 (PDF ) Revisiting the Robustness of {(R/M)LWR} under Polynomial Moduli and its Applications Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, Yang Yu
2024/1695 (PDF ) Discrete Gaussians Modulo Sub-Lattices: New Leftover Hash Lemmas for Discrete Gaussians Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, Dawu Gu
2024/1694 (PDF ) Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation Vlad-Florin Drăgoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso
2024/1693 (PDF ) A notion on S-boxes for a partial resistance to some integral attacks Claude Carlet
2024/1692 (PDF ) On the practicality of quantum sieving algorithms for the shortest vector problem Joao F. Doriguello, George Giapitzakis, Alessandro Luongo, Aditya Morolia
2024/1691 (PDF ) A Framework for Group Action-Based Multi-Signatures and Applications to LESS, MEDS, and ALTEQ Giuseppe D'Alconzo, Andrea Flamini, Alessio Meneghetti, Edoardo Signorini
2024/1690 (PDF ) A Note on Security Definitions for Secret Sharing with Certified Deletion Dominique Bazin, Ryo Nishimaki
2024/1689 (PDF ) Homomorphic Encryption with Authority Joohee Lee, Joon-Woo Lee
2024/1688 (PDF ) Revisiting Products of the Form $X$ Times a Linearized Polynomial $L(X)$ Christof Beierle
2024/1687 (PDF ) Revocable Encryption, Programs, and More: The Case of Multi-Copy Security Prabhanjan Ananth, Saachi Mutreja, Alexander Poremba
2024/1686 (PDF ) Circular Insecure Encryption: from Long Cycles to Short Cycles Zehou Wu
2024/1685 (PDF ) GAPP: Generic Aggregation of Polynomial Protocols Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh
2024/1684 (PDF ) Blind zkSNARKs for Private Proof Delegation and Verifiable Computation over Encrypted Data Mariana Gama, Emad Heydari Beni, Jiayi Kang, Jannik Spiessens, Frederik Vercauteren
2024/1683 (PDF ) Unclonable Functional Encryption Arthur Mehta, Anne Müller
2024/1682 (PDF ) Toward Optimal-Complexity Hash-Based Asynchronous MVBA with Optimal Resilience Jovan Komatovic, Joachim Neu, Tim Roughgarden
2024/1681 (PDF ) Another L makes it better? Lagrange meets LLL and may improve BKZ pre-processing Sebastien Balny, Claire Delaplace, Gilles Dequen
2024/1680 (PDF ) Sunfish: Reading Ledgers with Sparse Nodes Giulia Scaffino, Karl Wüst, Deepak Maram, Alberto Sonnino, Lefteris Kokoris-Kogias
2024/1679 (PDF ) Information Set Decoding for Ring-Linear Codes Giulia Cavicchioni, Alessio Meneghetti, Giovanni Tognolini
2024/1678 (PDF ) Commutative Cryptanalysis as a Generalization of Differential Cryptanalysis Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, Lukas Stennes
2024/1677 (PDF ) Batch Range Proof: How to Make Threshold ECDSA More Efficient Guofeng Tang, Shuai Han, Li Lin, Changzheng Wei, Ying Yan
2024/1676 (PDF ) The Sting Framework: Proving the Existence of Superclass Adversaries Mahimna Kelkar, Yunqi Li, Nerla Jean-Louis, Carolina Ortega Pérez, Kushal Babel, Andrew Miller, Ari Juels
2024/1675 (PDF ) Testing Robustness of Homomorphically Encrypted Split Model LLMs Lars Wolfgang Folkerts, Nektarios Georgios Tsoutsos
2024/1674 (PDF ) Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard Alexandra Boldyreva, Virendra Kumar, Jiahao Sun
2024/1673 (PDF ) Proteus: A Fully Homomorphic Authenticated Transciphering Protocol Lars Wolfgang Folkerts, Nektarios Georgios Tsoutsos
2024/1672 (PDF ) New Strategies for Bootstrapping Large-Error Ciphertext in Large-Precision FHEW/TFHE Cryptosystem Hongbo Li, Dengfa Liu, Guangsheng Ma
2024/1671 (PDF ) Multi-party Setup Ceremony for Generating Multivariate zk-SNARK Parameters Muhammed Ali Bingol
2024/1670 (PDF ) Statistical Layered MPC Giovanni Deligios, Anders Konring, Chen-Da Liu-Zhang, Varun Narayanan
2024/1669 (PDF ) The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys Samed Düzlü, Patrick Struck
2024/1668 (PDF ) Modelings for generic PoK and Applications: Shorter SD and PKP based Signatures Slim Bettaieb, Loïc Bidoux, Philippe Gaborit, Mukul Kulkarni
2024/1667 (PDF ) Overlapped Bootstrapping for FHEW/TFHE and Its Application to SHA3 Deokhwa Hong, Youngjin Choi, Yongwoo Lee, Young-Sik Kim
2024/1666 (PDF ) Computationally Efficient Asynchronous MPC with Linear Communication and Low Additive Overhead Akhil Bandarupalli, Xiaoyu Ji, Aniket Kate, Chen-Da Liu-Zhang, Yifan Song
2024/1665 (PDF ) DMM: Distributed Matrix Mechanism for Differentially-Private Federated Learning Based on Constant-Overhead Linear Secret Resharing Alexander Bienstock, Ujjwal Kumar, Antigoni Polychroniadou
2024/1664 (PDF ) Consensus on SNARK pre-processed circuit polynomials Jehyuk Jang
2024/1663 (PDF ) A Hidden-Bits Approach to Statistical ZAPs from LWE Eli Bradley, George Lu, Shafik Nassar, Brent Waters, David J. Wu
2024/1662 (PDF ) Composability in Watermarking Schemes Jiahui Liu, Mark Zhandry
2024/1661 (PDF ) zkFFT: Extending Halo2 with Vector Commitments & More Aram Jivanyan, Gohar Hovhannisyan, Hayk Hovhannisyan, Nerses Asaturyan
2024/1660 (PDF ) A Note on the Hint in the Dilithium Digital Signature Scheme Amit Berman, Ariel Doubchak, Noam Livne
2024/1659 (PDF ) Instance Compression, Revisited Gal Arnon, Shany Ben-David, Eylon Yogev
2024/1658 (PDF ) High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies Guy Zyskind, Avishay Yanai, Alex "Sandy" Pentland
2024/1657 (PDF ) Securely Computing One-Sided Matching Markets James Hsin-Yu Chiang, Ivan Damgård, Claudio Orlandi, Mahak Pancholi, Mark Simkin
2024/1656 (PDF ) Asymptotically Optimal Early Termination for Dishonest Majority Broadcast Giovanni Deligios, Ivana Klasovita, Chen-Da Liu-Zhang
2024/1655 (PDF ) Secure Stateful Aggregation: A Practical Protocol with Applications in Differentially-Private Federated Learning Marshall Ball, James Bell-Clark, Adria Gascon, Peter Kairouz, Sewoong Oh, Zhiye Xie
2024/1654 (PDF ) $\Sigma$-Check: Compressed $\Sigma$-protocol Theory from Sum-check Shang Gao, Chen Qian, Tianyu Zheng, Yu Guo, Bin Xiao
2024/1653 (PDF ) AD-MPC: Asynchronous Dynamic MPC with Guaranteed Output Delivery Wenxuan Yu, Minghui Xu, Bing Wu, Sisi Duan, Xiuzhen Cheng
2024/1652 (PDF ) How to Construct Random Unitaries Fermi Ma, Hsin-Yuan Huang
2024/1651 (PDF ) One-Shot Native Proofs of Non-Native Operations in Incrementally Verifiable Computations Tohru Kohrita, Patrick Towa, Zachary J. Williamson
2024/1650 (PDF ) Towards Practical Oblivious Map Xinle Cao, Weiqi Feng, Jian Liu, Jinjin Zhou, Wenjing Fang, Lei Wang, Quanqing Xu, Chuanhui Yang, Kui Ren
2024/1649 (PDF ) Multiplying Polynomials without Powerful Multiplication Instructions (Long Paper) Vincent Hwang, YoungBeom Kim, Seog Chung Seo
2024/1648 (PDF ) SIMD-style Sorting of Integer Sequence in RLWE Ciphertext Zijing Li, Hongbo Li, Zhengyang Wang
2024/1647 (PDF ) Curve Forests: Transparent Zero-Knowledge Set Membership with Batching and Strong Security Matteo Campanelli, Mathias Hall-Andersen, Simon Holmgaard Kamp
2024/1646 (PDF ) Parallel Execution Fee Mechanisms Abdoulaye Ndiaye
2024/1645 (PDF ) Fiat-Shamir Goes Rational (Or: On the Perils of Sublinear Verification) Matteo Campanelli, Agni Datta
2024/1644 (PDF ) A Tight Lower Bound on the TdScrypt Trapdoor Memory-Hard Function Jeremiah Blocki, Seunghoon Lee
2024/1643 (PDF ) Optimizing Liveness for Blockchain-Based Sealed-Bid Auctions in Rational Settings Maozhou Huang, Xiangyu Su, Mario Larangeira, Keisuke Tanaka
2024/1642 (PDF ) Fuzzy PSI via Oblivious Protocol Routing David Richardson, Mike Rosulek, Jiayu Xu
2024/1641 (PDF ) Simplification Issues of An Authentication and Key Agreement Scheme for Smart Grid Zhengjun Cao, Lihua Liu
2024/1640 (PDF ) Maximizing the Utility of Cryptographic Setups: Secure PAKEs, with either functional RO or CRS Yuting Xiao, Rui Zhang, Hong-Sheng Zhou
2024/1639 (PDF ) Efficient Quantum Pseudorandomness from Hamiltonian Phase States John Bostanci, Jonas Haferkamp, Dominik Hangleiter, Alexander Poremba
2024/1638 (PDF ) Modular Reduction in CKKS Jaehyung Kim, Taeyeong Noh
2024/1637 (PDF ) Bootstrapping Small Integers With CKKS Youngjin Bae, Jaehyung Kim, Damien Stehlé, Elias Suvanto
2024/1636 (PDF ) Quantum State Group Actions Saachi Mutreja, Mark Zhandry
2024/1635 (PDF ) RPO-M31 and XHash-M31: Efficient Hash Functions for Circle STARKs Tomer Ashur, Sundas Tariq
2024/1634 (PDF ) On Constructing Pseudorandom Involutions: Feistel variants using a single round function Chun Guo, Meiqin Wang, Weijia Wang
2024/1633 (PDF ) Efficient Boolean-to-Arithmetic Mask Conversion in Hardware Aein Rezaei Shahmirzadi, Michael Hutter
2024/1632 (PDF ) Fully Secure Searchable Encryption from PRFs, Pairings, and Lattices Hirotomo Shinoki, Hisayoshi Sato, Masayuki Yoshino
2024/1631 (PDF ) Sparrow: Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees Christodoulos Pappas, Dimitrios Papadopoulos
2024/1630 (PDF ) Hybrid Password Authentication Key Exchange in the UC Framework You Lyu, Shengli Liu
2024/1629 (PDF ) Efficient Key-Switching for Word-Type FHE and GPU Acceleration Shutong Jin, Zhen Gu, Guangyan Li, Donglong Chen, Çetin Kaya Koç, Ray C. C. Cheung, Wangchen Dai
2024/1628 (PDF ) Glacius: Threshold Schnorr Signatures from DDH with Full Adaptive Security Renas Bacho, Sourav Das, Julian Loss, Ling Ren
2024/1627 (PDF ) Cycles of supersingular elliptic curves for pairing-based proof systems Craig Costello, Gaurish Korpal
2024/1626 (PDF ) Faster Proofs and VRFs from Isogenies Shai Levin, Robi Pedersen
2024/1625 (PDF ) On the Tight Security of the Double Ratchet Daniel Collins, Doreen Riepel, Si An Oliver Tran
2024/1624 (PDF ) Double-Matrix: Complete Diffusion in a Single Round with (small) MDS Matrices Jorge Nakahara Jr
2024/1623 (PDF ) General Functional Bootstrapping using CKKS Andreea Alexandru, Andrey Kim, Yuriy Polyakov
2024/1622 (PDF ) A New Approach Towards Encrypted Data Sharing and Computation: Enhancing Efficiency Beyond MPC and Multi-Key FHE Anil Kumar Pradhan
2024/1621 (PDF ) PAKE Combiners and Efficient Post-Quantum Instantiations Julia Hesse, Michael Rosenberg
2024/1620 (PDF ) Really Complex Codes with Application to STARKs Yuval Domb
2024/1619 (PDF ) Structure-Preserving Compressing Primitives: Vector Commitments and Accumulators and Applications Stephan Krenn, Omid Mir, Daniel Slamanig
2024/1618 (PDF ) Shaking up authenticated encryption Joan Daemen, Seth Hoffert, Silvia Mella, Gilles Van Assche, Ronny Van Keer
2024/1617 (PDF ) Algebraic Equipage for Learning with Errors in Cyclic Division Algebras Cong Ling, Andrew Mendelsohn
2024/1616 (PDF ) End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem Jonas Hofmann, Kien Tuong Truong
2024/1615 (PDF ) LeOPaRd: Towards Practical Post-Quantum Oblivious PRFs via 2HashDH Paradigm Muhammed F. Esgin, Ron Steinfeld, Erkan Tairi, Jie Xu
2024/1614 (PDF ) Related-Key Cryptanalysis of FUTURE Amit Jana, Smita Das, Ayantika Chatterjee, Debdeep Mukhopadhyay, Yu Sasaki
2024/1613 (PDF ) Efficient Maliciously Secure Oblivious Exponentiations Carsten Baum, Jens Berlips, Walther Chen, Ivan Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu
2024/1612 (PDF ) On Wagner's k-Tree Algorithm Over Integers Haoxing Lin, Prashant Nalini Vasudevan
2024/1611 (PDF ) Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference Jiaxing He, Kang Yang, Guofeng Tang, Zhangjie Huang, Li Lin, Changzheng Wei, Ying Yan, Wei Wang
2024/1610 (PDF ) Secret Sharing with Snitching Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, Marcin Mielniczuk
2024/1609 (PDF ) Blaze: Fast SNARKs from Interleaved RAA Codes Martijn Brehm, Binyi Chen, Ben Fisch, Nicolas Resch, Ron D. Rothblum, Hadas Zeilberger
2024/1608 (PDF ) Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation Zhengan Huang, Junzuo Lai, Gongxian Zeng, Jian Weng
2024/1607 (PDF ) Tighter Proofs for PKE-to-KEM Transformation in the Quantum Random Oracle Model Jinrong Chen, Yi Wang, Rongmao Chen, Xinyi Huang, Wei Peng
2024/1606 (PDF ) NeutronNova: Folding everything that reduces to zero-check Abhiram Kothapalli, Srinath Setty
2024/1605 (PDF ) Nebula: Efficient read-write memory and switchboard circuits for folding schemes Arasu Arun, Srinath Setty
2024/1604 (PDF ) Predicting truncated multiple matrix congruential generators with unknown parameters Changcun Wang, Zhaopeng Dai
2024/1603 (PDF ) Boosting SNARKs and Rate-1 Barrier in Arguments of Knowledge Jiaqi Cheng, Rishab Goyal
2024/1602 (PDF ) Cryptography and Collective Power Leah Namisa Rosenbloom
2024/1601 (PDF ) Juggernaut: Efficient Crypto-Agnostic Byzantine Agreement Daniel Collins, Yuval Efron, Jovan Komatovic
2024/1600 (PDF ) Pacmann: Efficient Private Approximate Nearest Neighbor Search Mingxun Zhou, Elaine Shi, Giulia Fanti
2024/1599 (PDF ) Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes Bar Alon, Amos Beimel, Or Lasri
2024/1598 (PDF ) On the security of the initial tropical Stickel protocol and its modification based on Linde-de la Puente matrices Sulaiman Alhussaini, Serge˘ı Sergeev
2024/1597 (PDF ) An Undetectable Watermark for Generative Image Models Sam Gunn, Xuandong Zhao, Dawn Song
2024/1596 (PDF ) Secret Sharing with Publicly Verifiable Deletion Jonathan Katz, Ben Sela
2024/1595 (PDF ) DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs Yanpei Guo, Xuanming Liu, Kexi Huang, Wenjie Qu, Tianyang Tao, Jiaheng Zhang
2024/1594 (PDF ) Attacks on Goldreich's Pseudorandom Generators by Grouping and Solving Ximing Fu, Mo Li, Shihan Lyu, Chuanyi Liu
2024/1593 (PDF ) Stateful Communication with Malicious Parties Chen-Da Liu-Zhang, Christopher Portmann, Guilherme Rito
2024/1592 (PDF ) DART: Distributed argument of knowledge for rough terrains Steve Thakur
2024/1591 (PDF ) MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography Weihao Bai, Long Chen, Qianwen Gao, Zhenfeng Zhang
2024/1590 (PDF ) Matching radar signals and fingerprints with MPC Benjamin Hansen Mortensen, Mathias Karsrud Nordal, Martin Strand
2024/1589 (PDF ) A Systematic Study of Sparse LWE Aayush Jain, Huijia Lin, Sagnik Saha
2024/1588 (PDF ) A Note on ``Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming'' Zhengjun Cao, Lihua Liu
2024/1587 (PDF ) Fully Homomorphic Encryption for Cyclotomic Prime Moduli Robin Geelen, Frederik Vercauteren
2024/1586 (PDF ) WHIR: Reed–Solomon Proximity Testing with Super-Fast Verification Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, Eylon Yogev
2024/1585 (PDF ) Quantum Money from Class Group Actions on Elliptic Curves Hart Montgomery, Shahed Sharif
2024/1584 (PDF ) Block Ciphers in Idealized Models: Automated Proofs and New Security Results Miguel Ambrona, Pooya Farshim, Patrick Harasser
2024/1583 (PDF ) Efficient Pairing-Free Adaptable k-out-of-N Oblivious Transfer Protocols Keykhosro Khosravani, Taraneh Eghlidos, Mohammad reza Aref
2024/1582 (PDF ) Halving differential additions on Kummer lines Damien Robert, Nicolas Sarkis
2024/1581 (PDF ) $\mathsf{Protoss}$ Protocol for Tight Optimal Symmetric Security Emanuele Di Giandomenico, Yong Li, Sven Schäge
2024/1580 (PDF ) Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting Nicholas Carlini, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Adi Shamir
2024/1579 (PDF ) Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols Francesca Falzon, Evangelia Anna Markatou
2024/1578 (PDF ) Quantum Group Actions Tomoyuki Morimae, Keita Xagawa
2024/1577 (PDF ) Solving Multivariate Coppersmith Problems with Known Moduli Keegan Ryan
2024/1576 (PDF ) Verifiable Value Added Tax Victor Sint Nicolaas, Sascha Jafari
2024/1575 (PDF ) Efficiently-Thresholdizable Batched Identity Based Encryption, with Applications Amit Agarwal, Rex Fernando, Benny Pinkas
2024/1574 (PDF ) Scalable Two-Round $n$-out-of-$n$ and Multi-Signatures from Lattices in the Quantum Random Oracle Model Qiqi Lai, Feng-Hao Liu, Yang Lu, Haiyang Xue, Yong Yu, Yuan Chen
2024/1573 (PDF ) OML: Open, Monetizable, and Loyal AI Zerui Cheng, Edoardo Contente, Ben Finch, Oleg Golev, Jonathan Hayase, Andrew Miller, Niusha Moshrefi, Anshul Nasery, Sandeep Nailwal, Sewoong Oh, Himanshu Tyagi, Pramod Viswanath
2024/1572 (PDF ) Bounded Collusion-Resistant Registered Functional Encryption for Circuits Yijian Zhang, Jie Chen, Debiao He, Yuqing Zhang
2024/1571 (PDF ) Basefold in the List Decoding Regime Ulrich Haböck
2024/1570 (PDF ) Can KANs Do It? Toward Interpretable Deep Learning-based Side-channel Analysis Kota Yoshida, Sengim Karayalcin, Stjepan Picek
2024/1569 (PDF ) The Supersingular ℓ-Isogeny Path and Endomorphism Ring Problems: Tighter Unconditional Reductions Maher Mamah
2024/1568 (PDF ) Oracle Separation Between Quantum Commitments and Quantum One-wayness John Bostanci, Boyang Chen, Barak Nehoran
2024/1567 (PDF ) A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID Amit Behera, Giulio Malavolta, Tomoyuki Morimae, Tamer Mour, Takashi Yamakawa
2024/1566 (PDF ) Dynamic zk-SNARKs (with applications to sparse zk-SNARKs and IVC) Weijie Wang, Charalampos Papamanthou, Shravan Srinivasan, Dimitrios Papadopoulos
2024/1565 (PDF ) Fiat-Shamir in the Wild Hieu Nguyen, Uyen Ho, Alex Biryukov
2024/1564 (PDF ) A Simple Framework for Secure Key Leasing Fuyuki Kitagawa, Tomoyuki Morimae, Takashi Yamakawa
2024/1563 (PDF ) Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4 Marius A. Aardal, Gora Adj, Arwa Alblooshi, Diego F. Aranha, Isaac A. Canales-Martínez, Jorge Chavez-Saab, Décio Luiz Gazzoni Filho, Krijn Reijnders, Francisco Rodríguez-Henríquez
2024/1562 (PDF ) Fully Privacy-preserving Billing Models for Peer-to-Peer Electricity Trading Markets Akash Madhusudan, Mustafa A. Mustafa, Hilder V.L. Pereira, Erik Takke
2024/1561 (PDF ) FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation Daniel Günther, Joachim Schmidt, Thomas Schneider, Hossein Yalame
2024/1560 (PDF ) Private Set Operations from Circuit-Based PSI Jiseung Kim, Hyung Tae Lee, Yongha Son
2024/1559 (PDF ) Mind the Composition of Toffoli Gates: Structural Algebraic Distinguishers of ARADI Emanuele Bellini, Mohamed Rachidi, Raghvendra Rohit, Sharwan K. Tiwari
2024/1558 (PDF ) Understanding Leakage in Searchable Encryption: a Quantitative Approach Alexandra Boldyreva, Zichen Gui, Bogdan Warinschi
2024/1557 (PDF ) Tightly Secure Threshold Signatures over Pairing-Free Groups Renas Bacho, Benedikt Wagner
2024/1556 (PDF ) The module action for isogeny based cryptography Damien Robert
2024/1554 (PDF ) Breaking the IEEE Encryption Standard – XCB-AES in Two Queries Amit Singh Bhati, Elena Andreeva
2024/1553 (PDF ) STARK-based Signatures from the RPO Permutation Shahla Atapoor, Cyprien Delpech de Saint Guilhem, Al Kindi
2024/1552 (PDF ) Revisiting Keyed-Verification Anonymous Credentials Michele Orrù
2024/1551 (PDF ) SNARKs for Virtual Machines are Non-Malleable Matteo Campanelli, Antonio Faonio, Luigi Russo
2024/1550 (PDF ) MAYO Key Recovery by Fixing Vinegar Seeds Sönke Jendral, Elena Dubrova
2024/1549 (PDF ) Universally Composable SNARKs with Transparent Setup without Programmable Random Oracle Christian Badertscher, Matteo Campanelli, Michele Ciampi, Luigi Russo, Luisa Siniscalchi
2024/1548 (PDF ) Fully Succinct Arguments over the Integers from First Principles Matteo Campanelli, Mathias Hall-Andersen
2024/1547 (PDF ) HHL for tensor-decomposable matrices Cezary Pilaszewicz, Marian Margraf
2024/1546 (PDF ) Bit t-SNI Secure Multiplication Gadget for Inner Product Masking John Gaspoz, Siemen Dhooghe
2024/1545 (PDF ) Fully Composable Homomorphic Encryption Daniele Micciancio
2024/1544 (PDF ) PoUDR: Proof of Unified Data Retrieval in Decentralized Storage Networks Zonglun Li, Shuhao Zheng, Junliang Luo, Ziyue Xin, Dun Yuan, Shang Gao, Sichao Yang, Bin Xiao, Xue Liu
2024/1543 (PDF ) HEonGPU: a GPU-based Fully Homomorphic Encryption Library 1.0 Ali Şah Özcan, Erkay Savaş
2024/1542 (PDF ) Robust AE With Committing Security Viet Tung Hoang, Sanketh Menda
2024/1541 (PDF ) Findex: A Concurrent and Database-Independent Searchable Encryption Scheme Théophile Brézot, Chloé Hébant
2024/1540 (PDF ) Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process Pedram Hosseyni, Ralf Küsters, Tim Würtele
2024/1539 (PDF ) Quantum Cryptography from Meta-Complexity Taiga Hiroka, Tomoyuki Morimae
2024/1538 (PDF ) Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem Maggie Yongqi Guan, Yaman Yu, Tanusree Sharma, Molly Zhuangtong Huang, Kaihua Qin, Yang Wang, Kanye Ye Wang
2024/1537 (PDF ) VOLE-in-the-head signatures from Subfield Bilinear Collisions Janik Huth, Antoine Joux
2024/1536 (PDF ) Cryptographic Characterization of Quantum Advantage Tomoyuki Morimae, Yuki Shirakawa, Takashi Yamakawa
2024/1535 (PDF ) Relaxed Lattice-Based Programmable Hash Functions: New Efficient Adaptively Secure IBEs Xingye Lu, Jingjing Fan, Man Ho AU
2024/1534 (PDF ) More Efficient Lattice-based OLE from Circuit-private Linear HE with Polynomial Overhead Leo de Castro, Duhyeong Kim, Miran Kim, Keewoo Lee, Seonhong Min, Yongsoo Song
2024/1533 (PDF ) BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention Jan Bormet, Sebastian Faust, Hussien Othman, Ziyan Qu
2024/1532 (PDF ) Bitwise Garbling Schemes --- A Model with $\frac{3}{2}\kappa$-bit Lower Bound of Ciphertexts Fei Xu, Honggang Hu, Changhong Xu
2024/1531 (PDF ) FLI: Folding Lookup Instances Albert Garreta, Ignacio Manzur
2024/1530 (PDF ) Folding Schemes with Privacy Preserving Selective Verification Joan Boyar, Simon Erfurth
2024/1529 (PDF ) Challenges in Timed Cryptography: A Position Paper Karim Eldefrawy, Benjamin Terner, Moti Yung
2024/1528 (PDF ) Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption Gavin Cho, Georg Fuchsbauer, Adam O'Neill, Marek Sefranek
2024/1527 (PDF ) How to Recover the Full Plaintext of XCB Peng Wang, Shuping Mao, Ruozhou Xu, Jiwu Jing, Yuewu Wang
2024/1526 (PDF ) Overpass Channels: Horizontally Scalable, Privacy-Enhanced, with Independent Verification, Fluid Liquidity, and Robust Censorship Proof, Payments Brandon "Cryptskii" Ramsay
2024/1525 (PDF ) Evaluating Leakage Attacks Against Relational Encrypted Search Patrick Ehrler, Abdelkarim Kati, Thomas Schneider, Amos Treiber
2024/1524 (PDF ) Lower Bounds on the Overhead of Indistinguishability Obfuscation Zhenjian Lu, Noam Mazor, Igor C. Oliveira, Rafael Pass
2024/1523 (PDF ) Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments Nikhil Vanjani, Pratik Soni, Sri AravindaKrishnan Thyagarajan
2024/1522 (PDF ) Mind the Faulty Keccak: A Practical Fault Injection Attack Scheme Apply to All Phases of ML-KEM and ML-DSA Yuxuan Wang, Jintong Yu, Shipei Qu, Xiaolin Zhang, Xiaowei Li, Chi Zhang, Dawu Gu
2024/1521 (PDF ) The SMAesH dataset Gaëtan Cassiers, Charles Momin
2024/1520 (PDF ) On the rough order assumption in imaginary quadratic number fields Antonio Sanso
2024/1519 (PDF ) Efficient theta-based algorithms for computing $(\ell, \ell)$-isogenies on Kummer surfaces for arbitrary odd $\ell$ Ryo Yoshizumi, Hiroshi Onuki, Ryo Ohashi, Momonari Kudo, Koji Nuida
2024/1518 (PDF ) Witness Semantic Security Paul Lou, Nathan Manohar, Amit Sahai
2024/1517 (PDF ) A Note on the SNOVA Security Lih-Chung Wang, Chun-Yen Chou, Jintai Ding, Yen-Liang Kuan, Jan Adriaan Leegwater, Ming-Siou Li, Bo-Shu Tseng, Po-En Tseng, Chia-Chun Wang
2024/1516 (PDF ) Practical Mempool Privacy via One-time Setup Batched Threshold Encryption Arka Rai Choudhuri, Sanjam Garg, Guru-Vamsi Policharla, Mingyuan Wang
2024/1515 (PDF ) Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V} Jipeng Zhang, Yuxing Yan, Junhao Huang, Çetin Kaya Koç
2024/1514 (PDF ) Black-Box Non-Interactive Zero Knowledge from Vector Trapdoor Hash Pedro Branco, Arka Rai Choudhuri, Nico Döttling, Abhishek Jain, Giulio Malavolta, Akshayaram Srinivasan
2024/1513 (PDF ) Depth Optimized Circuits for Lattice Based Voting with Large Candidate Sets Oskar Goldhahn, Kristian Gjøsteen
2024/1511 (PDF ) Some Classes of Cubic Monomial Boolean Functions with Good Second-Order Nonlinearity RUCHI TELANG GODE
2024/1510 (PDF ) Group Factorisation for Smaller Signatures from Cryptographic Group Actions Giuseppe D'Alconzo, Alessio Meneghetti, Edoardo Signorini
2024/1509 (PDF ) DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group Semin Han, Geonho Yoon, Hyunok Oh, Jihye Kim
2024/1508 (PDF ) Key Collisions on AES and Its Applications Kodai Taiyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka, Takanori Isobe
2024/1507 (PDF ) Unbounded ABE for Circuits from LWE, Revisited Valerio Cini, Hoeteck Wee
2024/1506 (PDF ) Bit Security: optimal adversaries, equivalence results, and a toolbox for computational-statistical security analysis Daniele Micciancio, Mark Schultz-Wu
2024/1505 (PDF ) FINALLY: A Multi-Key FHE Scheme Based on NTRU and LWE Jeongeun Park, Barry Van Leeuwen, Oliver Zajonc
2024/1504 (PDF ) Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries" Thomas Schneider, Ajith Suresh, Hossein Yalame
2024/1503 (PDF ) A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts Masayuki Abe, Masaya Nanri, Miyako Ohkubo, Octavio Perez Kempner, Daniel Slamanig, Mehdi Tibouchi
2024/1502 (PDF ) MatriGear: Accelerating Authenticated Matrix Triple Generation with Scalable Prime Fields via Optimized HE Packing Hyunho Cha, Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song
2024/1501 (PDF ) Exploring User Perceptions of Security Auditing in the Web3 Ecosystem Molly Zhuangtong Huang, Rui Jiang, Tanusree Sharma, Kanye Ye Wang
2024/1500 (PDF ) Hard Quantum Extrapolations in Quantum Cryptography Luowen Qian, Justin Raizes, Mark Zhandry
2024/1499 (PDF ) Multi-Key Fully-Homomorphic Aggregate MAC for Arithmetic Circuits Suvasree Biswas, Arkady Yerukhimovich
2024/1498 (PDF ) Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script Federico Barbacovi, Enrique Larraia, Paul Germouty, Wei Zhang
2024/1497 (PDF ) Low-degree Security of the Planted Random Subgraph Problem Andrej Bogdanov, Chris Jones, Alon Rosen, Ilias Zadik
2024/1496 (PDF ) No Fish Is Too Big for Flash Boys! Frontrunning on DAG-based Blockchains Jianting Zhang, Aniket Kate
2024/1495 (PDF ) Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems Anna-Lena Horlemann, Karan Khathuria, Marc Newman, Amin Sakzad, Carlos Vela Cabello
2024/1494 (PDF ) Concretely Efficient Private Set Union via Circuit-based PSI Gowri R Chandran, Thomas Schneider, Maximilian Stillger, Christian Weinert
2024/1493 (PDF ) Rate-1 Zero-Knowledge Proofs from One-Way Functions Noor Athamnah, Eden Florentz – Konopnicki, Ron D. Rothblum
2024/1492 (PDF ) Multi-Designated Detector Watermarking for Language Models Zhengan Huang, Gongxian Zeng, Xin Mu, Yu Wang, Yue Yu
2024/1491 (PDF ) On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud Zhengjun Cao, Lihua Liu
2024/1490 (PDF ) Founding Quantum Cryptography on Quantum Advantage, or, Towards Cryptography from $\#\mathsf{P}$-Hardness Dakshita Khurana, Kabir Tomer
2024/1489 (PDF ) Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC Nishanth Chandran, Juan Garay, Ankit Kumar Misra, Rafail Ostrovsky, Vassilis Zikas
2024/1488 (PDF ) Compact Proofs of Partial Knowledge for Overlapping CNF Formulae Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti
2024/1487 (PDF ) The transition to post-quantum cryptography, metaphorically Stefan-Lukas Gazdag, Sophia Grundner-Culemann
2024/1486 (PDF ) Adaptively Secure Attribute-Based Encryption from Witness Encryption Brent Waters, Daniel Wichs
2024/1485 (PDF ) LARMix$\mathbf{++}$: Latency-Aware Routing in Mix Networks with Free Routes Topology Mahdi Rahimi
2024/1484 (PDF ) Quadratic-like balanced functions and permutations Claude Carlet, Irene Villa
2024/1483 (PDF ) Making Searchable Symmetric Encryption Schemes Smaller and Faster Debrup Chakraborty, Avishek Majumder, Subhabrata Samajder
2024/1482 (PDF ) The Power of NAPs: Compressing OR-Proofs via Collision-Resistant Hashing Katharina Boudgoust, Mark Simkin
2024/1481 (PDF ) Tighter Adaptive IBEs and VRFs: Revisiting Waters' Artificial Abort Goichiro Hanaoka, Shuichi Katsumata, Kei Kimura, Kaoru Takemure, Shota Yamada
2024/1480 (PDF ) On Schubert cells of Projective Geometry and quadratic public keys of Multivariate Cryptography Vasyl Ustimenko
2024/1479 (PDF ) Honest Majority GOD MPC with $O(\mathsf{depth}(C))$ Rounds and Low Online Communication Amit Agarwal, Alexander Bienstock, Ivan Damgård, Daniel Escudero
2024/1478 (PDF ) Mind the Bad Norms: Revisiting Compressed Oracle-based Quantum Indistinguishability Proofs Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, Ashwin Jha
2024/1477 (PDF ) Signature-based Witness Encryption with Compact Ciphertext Gennaro Avitabile, Nico Döttling, Bernardo Magri, Christos Sakkas, Stella Wohnig
2024/1476 (PDF ) The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs Mihir Bellare, Rishabh Ranjan, Doreen Riepel, Ali Aldakheel
2024/1475 (PDF ) On the Spinor Genus and the Distinguishing Lattice Isomorphism Problem Cong Ling, Jingbo Liu, Andrew Mendelsohn
2024/1474 (PDF ) Mystrium: Wide Block Encryption Efficient on Entry-Level Processors Parisa Amiri Eliasi, Koustabh Ghosh, Joan Daemen
2024/1473 (PDF ) A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction Pierre Charbit, Geoffroy Couteau, Pierre Meyer, Reza Naserasr
2024/1472 (PDF ) Isogeny-Based Secure Voting Systems for Large-Scale Elections Mohammed El Baraka, Siham Ezzouak
2024/1471 (PDF ) Communication Efficient Secure and Private Multi-Party Deep Learning Sankha Das, Sayak Ray Chowdhury, Nishanth Chandran, Divya Gupta, Satya Lokam, Rahul Sharma
2024/1470 (PDF ) Quantum Pseudorandom Scramblers Chuhan Lu, Minglong Qin, Fang Song, Penghui Yao, Mingnan Zhao
2024/1469 (PDF ) Password-Protected Threshold Signatures Stefan Dziembowski, Stanislaw Jarecki, Paweł Kędzior, Hugo Krawczyk, Chan Nam Ngo, Jiayu Xu
2024/1468 (PDF ) Dense and smooth lattices in any genus Wessel van Woerden
2024/1467 (PDF ) P2C2T: Preserving the Privacy of Cross-Chain Transfer Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino
2024/1466 (PDF ) Dishonest Majority Constant-Round MPC with Linear Communication from DDH Vipul Goyal, Junru Li, Ankit Kumar Misra, Rafail Ostrovsky, Yifan Song, Chenkai Weng
2024/1465 (PDF ) Linear approximations of the Flystel construction Tim Beyne, Clémence Bouvier
2024/1464 (PDF ) SoK: Descriptive Statistics Under Local Differential Privacy René Raab, Pascal Berrang, Paul Gerhart, Dominique Schröder
2024/1463 (PDF ) Asynchronous Verifiable Secret Sharing with Elastic Thresholds and Distributed Key Generation Junming Li, Zhi Lu, Renfei Shen, Yuanqing Feng, Songfeng Lu
2024/1462 (PDF ) Efficient Fuzzy Private Set Intersection from Fuzzy Mapping Ying Gao, Lin Qi, Xiang Liu, Yuanchao Luo, Longxin Wang
2024/1461 (PDF ) Detecting and Correcting Computationally Bounded Errors: A Simple Construction Under Minimal Assumptions Jad Silbak, Daniel Wichs
2024/1460 (PDF ) PPSA: Polynomial Private Stream Aggregation for Time-Series Data Analysis Antonia Januszewicz, Daniela Medrano Gutierrez, Nirajan Koirala, Jiachen Zhao, Jonathan Takeshita, Jaewoo Lee, Taeho Jung
2024/1459 (PDF ) Verifiable Oblivious Pseudorandom Functions from Lattices: Practical-ish and Thresholdisable Martin R. Albrecht, Kamil Doruk Gur
2024/1458 (PDF ) Providing Integrity for Authenticated Encryption in the Presence of Joint Faults and Leakage Francesco Berti, Itamar Levi
2024/1457 (PDF ) A Combined Design of 4-PLL-TRNG and 64-bit CDC-7-XPUF on a Zynq-7020 SoC Oğuz Yayla, Yunus Emre Yılmaz
2024/1456 (PDF ) Crooked Indifferentiability of the Feistel Construction Alexander Russell, Qiang Tang, Jiadong Zhu
2024/1455 (PDF ) Threshold PAKE with Security against Compromise of all Servers Yanqi Gu, Stanislaw Jarecki, Pawel Kedzior, Phillip Nazarian, Jiayu Xu
2024/1454 (PDF ) Interval Key-Encapsulation Mechanism Alexander Bienstock, Yevgeniy Dodis, Paul Rösler, Daniel Wichs
2024/1453 (PDF ) Breaking and Repairing SQIsign2D-East Wouter Castryck, Mingjie Chen, Riccardo Invernizzi, Gioella Lorenzon, Frederik Vercauteren
2024/1452 (PDF ) On the Complexity of Cryptographic Groups and Generic Group Models Cong Zhang, Keyu Ji, Taiyu Wang, Bingsheng Zhang, Hong-Sheng Zhou, Xin Wang, Kui Ren
2024/1451 (PDF ) Traffic-aware Merkle Trees for Shortening Blockchain Transaction Proofs Avi Mizrahi, Noam Koren, Ori Rottenstreich, Yuval Cassuto
2024/1450 (PDF ) TentLogiX: 5-bit Chaos-Driven S-Boxes for Lightweight Cryptographic Systems Maha Allouzi, Arefeh Rahaei
2024/1449 (PDF ) Marian: An Open Source RISC-V Processor with Zvk Vector Cryptography Extensions Thomas Szymkowiak, Endrit Isufi, Markku-Juhani Saarinen
2024/1448 (PDF ) Randomness in Private Sequential Stateless Protocols Hari Krishnan P. Anilkumar, Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran
2024/1447 (PDF ) Generic Differential Key Recovery Attacks and Beyond Ling Song, Huimin Liu, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng
2024/1446 (PDF ) Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity Saikrishna Badrinarayanan, Peihan Miao, Xinyi Shi, Max Tromanhauser, Ruida Zeng
2024/1445 (PDF ) Another Walk for Monchi Riccardo Taiello, Emre Tosun, Alberto Ibarrondo, Hervé Chabanne, Melek Önen
2024/1444 (PDF ) Attestation Proof of Association – provability that attestation keys are bound to the same hardware and person Eric Verheul
2024/1443 (PDF ) 32-bit and 64-bit CDC-7-XPUF Implementations on a Zynq-7020 SoC Oğuz Yayla, Yunus Emre Yılmaz
2024/1442 (PDF ) Design and Implementation of a Fast, Platform-Adaptive, AIS-20/31 Compliant PLL-Based True Random Number Generator on a Zynq 7020 SoC FPGA Oğuz Yayla, Yunus Emre Yılmaz
2024/1441 (PDF ) FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup Nan Wang, Dongxi Liu
2024/1440 (PDF ) Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort Johann Knechtel, Mohammad Eslami, Peng Zou, Min Wei, Xingyu Tong, Binggang Qiu, Zhijie Cai, Guohao Chen, Benchao Zhu, Jiawei Li, Jun Yu, Jianli Chen, Chun-Wei Chiu, Min-Feng Hsieh, Chia-Hsiu Ou, Ting-Chi Wang, Bangqi Fu, Qijing Wang, Yang Sun, Qin Luo, Anthony W. H. Lau, Fangzhou Wang, Evangeline F. Y. Young, Shunyang Bi, Guangxin Guo, Haonan Wu, Zhengguang Tang, Hailong You, Cong Li, Ramesh Karri, Ozgur Sinanoglu, Samuel Pagliarini
2024/1439 (PDF ) Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms Suparna Kundu, Quinten Norga, Angshuman Karmakar, Shreya Gangopadhyay, Jose Maria Bermudo Mera, Ingrid Verbauwhede
2024/1438 (PDF ) Anamorphic Authenticated Key Exchange: Double Key Distribution under Surveillance Weihao Wang, Shuai Han, Shengli Liu
2024/1437 (PDF ) UNIDLE: A Unified Framework for Deep Learning-based Side-channel Analysis Suvadeep Hajra, Debdeep Mukhopadhyay, Soumi Chatterjee
2024/1436 (PDF ) Eva: Efficient Privacy-Preserving Proof of Authenticity for Lossily Encoded Videos Chengru Zhang, Xiao Yang, David Oswald, Mark Ryan, Philipp Jovanovic
2024/1435 (PDF ) Actively Secure Polynomial Evaluation from Shared Polynomial Encodings Pascal Reisert, Marc Rivinius, Toomas Krips, Sebastian Hasler, Ralf Küsters
2024/1434 (PDF ) Untangling the Security of Kilian's Protocol: Upper and Lower Bounds Alessandro Chiesa, Marcel Dall'Agnol, Ziyi Guan, Nicholas Spooner, Eylon Yogev
2024/1433 (PDF ) $Shortcut$: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases Peizhao Zhou, Xiaojie Guo, Pinzhi Chen, Tong Li, Siyi Lv, Zheli Liu
2024/1432 (PDF ) On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages Masayuki Fukumitsu, Shingo Hasegawa
2024/1431 (PDF ) Interactive Line-Point Zero-Knowledge with Sublinear Communication and Linear Computation Fuchun Lin, Chaoping Xing, Yizhou Yao
2024/1430 (PDF ) MYao: Multiparty ``Yao'' Garbled Circuits with Row Reduction, Half Gates, and Efficient Online Computation Aner Ben-Efraim, Lior Breitman, Jonathan Bronshtein, Olga Nissenbaum, Eran Omri
2024/1429 (PDF ) Powerformer: Efficient and High-Accuracy Privacy-Preserving Language Model with Homomorphic Encryption Dongjin Park, Eunsang Lee, Joon-Woo Lee
2024/1428 (PDF ) Mario: Multi-round Multiple-Aggregator Secure Aggregation with Robustness against Malicious Actors Truong Son Nguyen, Tancrède Lepoint, Ni Trieu
2024/1427 (PDF ) LogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK Carmit Hazay, David Heath, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam, Yibin Yang
2024/1426 (PDF ) Agile Asymmetric Cryptography and the Case for Finite Fields Anna M. Johnston
2024/1425 (PDF ) New constructions of pseudorandom codes Surendra Ghentiyala, Venkatesan Guruswami
2024/1424 (PDF ) A Waterlog for Detecting and Tracing Synthetic Text from Large Language Models Brennon Brimhall, Orion Weller, Matthew Green, Ian Miers
2024/1423 (PDF ) Towards package opening detection at power-up by monitoring thermal dissipation Julien Toulemont, Geoffrey Chancel, Fréderick Mailly, Philippe Maurine, Pascal Nouet
2024/1422 (PDF ) ZKFault: Fault attack analysis on zero-knowledge based post-quantum digital signature schemes Puja Mondal, Supriya Adhikary, Suparna Kundu, Angshuman Karmakar
2024/1421 (PDF ) Provable Security of Linux-DRBG in the Seedless Robustness Model Woohyuk Chung, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee
2024/1420 (PDF ) Privacy-Preserving Breadth-First-Search and Maximal-Flow Vincent Ehrmanntraut, Ulrike Meyer
2024/1419 (PDF ) On the Relationship between Public Key Primitives via Indifferentiability Shuang Hu, Bingsheng Zhang, Cong Zhang, Kui Ren
2024/1418 (PDF ) Public-key encryption from a trapdoor one-way embedding of $SL_2(\mathbb{N})$ Robert Hines
2024/1417 (PDF ) Distributed Broadcast Encryption from Lattices Jeffrey Champion, David J. Wu
2024/1416 (PDF ) Circuit ABE with poly(depth, λ)-sized Ciphertexts and Keys from Lattices Hoeteck Wee
2024/1415 (PDF ) Privacy Comparison for Bitcoin Light Client Implementations Arad Kotzer, Ori Rottenstreich
2024/1414 (PDF ) Code-Based Zero-Knowledge from VOLE-in-the-Head and Their Applications: Simpler, Faster, and Smaller Ying Ouyang, Deng Tang, Yanhong Xu
2024/1413 (PDF ) The Black-Box Simulation Barrier Persists in a Fully Quantum World Nai-Hui Chia, Kai-Min Chung, Xiao Liang, Jiahui Liu
2024/1412 (PDF ) A New Method to Test the Zeros of Riemann Zeta Function Zhengjun Cao, Lihua Liu
2024/1411 (PDF ) Design issues of ``an anonymous authentication and key agreement protocol in smart living'' Zhengjun Cao, Lihua Liu
2024/1410 (PDF ) Cryptobazaar: Private Sealed-bid Auctions at Scale Andrija Novakovic, Alireza Kavousi, Kobi Gurkan, Philipp Jovanovic
2024/1409 (PDF ) Oraqle: A Depth-Aware Secure Computation Compiler Jelle Vos, Mauro Conti, Zekeriya Erkin
2024/1408 (PDF ) Multiple-Tweak Differential Attack Against SCARF Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, Yosuke Todo
2024/1407 (PDF ) Encrypted MultiChannel Communication (EMC2): Johnny Should Use Secret Sharing Gowri R. Chandran, Kilian Demuth, Kasra Edalatnejad, Sebastian Linsner, Christian Reuter, Thomas Schneider
2024/1406 (PDF ) Blind Multisignatures for Anonymous Tokens with Decentralized Issuance Ioanna Karantaidou, Omar Renawi, Foteini Baldimtsi, Nikolaos Kamarinakis, Jonathan Katz, Julian Loss
2024/1405 (PDF ) VECTIS: Efficient Batching Framework for Group-based CP-SNARKs Byeongjun Jang, Gweonho Jeong, Hyuktae Kwon, Hyunok Oh, Jihye Kim
2024/1404 (PDF ) PIsignHD: A New Structure for the SQIsign Family with Flexible Applicability Kaizhan Lin, Weize Wang, Chang-An Zhao, Yunlei Zhao
2024/1403 (PDF ) Hard-Label Cryptanalytic Extraction of Neural Network Models Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang
2024/1402 (PDF ) A Recursive zk-based State Update System Daniel Bloom, Sai Deng
2024/1401 (PDF ) New Techniques for Preimage Sampling: Improved NIZKs and More from LWE Brent Waters, Hoeteck Wee, David J. Wu
2024/1400 (PDF ) Efficient Asymmetric PAKE Compiler from KEM and AE You Lyu, Shengli Liu, Shuai Han
2024/1399 (PDF ) A Note on Ligero and Logarithmic Randomness Guillermo Angeris, Alex Evans, Gyumin Roh
2024/1398 (PDF ) Coercion-resistant i-voting with short PIN and OAuth 2.0 Matteo Bitussi, Riccardo Longo, Francesco Antonio Marino, Umberto Morelli, Amir Sharif, Chiara Spadafora, Alessandro Tomasi
2024/1397 (PDF ) Efficient Batch Algorithms for the Post-Quantum Crystals Dilithium Signature Scheme and Crystals Kyber Encryption Scheme Nazlı Deniz TÜRE, Murat CENK
2024/1396 (PDF ) Rare structures in tensor graphs - Bermuda triangles for cryptosystems based on the Tensor Isomorphism problem Lars Ran, Simona Samardjiska
2024/1395 (PDF ) A Formal Analysis of Apple’s iMessage PQ3 Protocol Felix Linker, Ralf Sasse, David Basin
2024/1394 (PDF ) SLAMP-FSS: Two-Party Multi-Point Function Secret Sharing from Simple Linear Algebra Erki Külaots, Toomas Krips, Hendrik Eerikson, Darya Pisetskaya, Pille Pullonen-Raudvere
2024/1393 (PDF ) Survivable Payment Channel Networks Yekaterina Podiatchev, Ariel Orda, Ori Rottenstreich
2024/1392 (PDF ) Key Policy Attribute-Based Encryption Leveraging Isogeny-Based Cryptography Madické Diadji Mbodj, Anis Bkakria
2024/1391 (PDF ) Scalable Equi-Join Queries over Encrypted Database Kai Du, Jianfeng Wang, Jiaojiao Wu, Yunling Wang
2024/1390 (PDF ) Cache Timing Leakages in Zero-Knowledge Protocols Shibam Mukherjee, Christian Rechberger, Markus Schofnegger
2024/1389 (PDF ) DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES Tomáš Gerlich, Jakub Breier, Pavel Sikora, Zdeněk Martinásek, Aron Gohr, Anubhab Baksi, Xiaolu Hou
2024/1388 (PDF ) One-Way Functions and pKt Complexity Shuichi Hirahara, Zhenjian Lu, Igor C. Oliveira
2024/1387 (PDF ) SPADE: Digging into Selective and PArtial DEcryption using Functional Encryption Camille Nuoskala, Hossein Abdinasibfar, Antonis Michalas
2024/1386 (PDF ) Problems and New Approaches for Crypto-Agility in Operational Technology Tobias Frauenschläger, Jürgen Mottok
2024/1385 (PDF ) Locally Verifiable Distributed SNARGs Eden Aldema Tshuva, Elette Boyle, Ran Cohen, Tal Moran, Rotem Oshman
2024/1384 (PDF ) Password-Protected Key Retrieval with(out) HSM Protection Sebastian Faller, Tobias Handirk, Julia Hesse, Máté Horváth, Anja Lehmann
2024/1383 (PDF ) Self-Orthogonal Minimal Codes From (Vectorial) p-ary Plateaued Functions René Rodríguez Aldama, Enes Pasalic, Fengrong Zhang, Yongzhuang Wei
2024/1382 (PDF ) Universal Context Commitment without Ciphertext Expansion Arghya Bhattacharjee, Ritam Bhaumik, Chandranan Dhar
2024/1381 (PDF ) Reality Check on Side-Channels: Lessons learnt from breaking AES on an ARM Cortex A processor Harishma Boyapally, Dirmanto Jap, Qianmei Wu, Fan Zhang, Shivam Bhasin
2024/1380 (PDF ) EUCLEAK Thomas Roche
2024/1379 (PDF ) EvalRound+ Bootstrapping and its Rigorous Analysis for CKKS Scheme Hyewon Sung, Sieun Seo, Taekyung Kim, Chohong Min
2024/1378 (PDF ) Practical Blind Signatures in Pairing-Free Groups Michael Klooß, Michael Reichle, Benedikt Wagner
2024/1377 (PDF ) Security Strengthening of Threshold Symmetric Schemes Ehsan Ebrahimi
2024/1376 (PDF ) FDFB$^2$: Functional Bootstrapping via Sparse Polynomial Multiplication Kamil Kluczniak, Leonard Schild
2024/1375 (PDF ) ALGAES: An Authenticated Lattice-based Generic Asymmetric Encryption Scheme Aravind Vishnu S S, M Sethumadhavan, Lakshmy K V
2024/1374 (PDF ) Lifting approach against the SNOVA scheme Shuhei Nakamura, Yusuke Tani, Hiroki Furue
2024/1373 (PDF ) Uncompressing Dilithium's public key Paco Azevedo Oliveira, Andersson Calle Viera, Benoît Cogliati, Louis Goubin
2024/1372 (PDF ) Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits Zhicong Huang, Wen-jie Lu, Yuchen Wang, Cheng Hong, Tao Wei, WenGuang Chen
2024/1371 (PDF ) PIGEON: A High Throughput Framework for Private Inference of Neural Networks using Secure Multiparty Computation Christopher Harth-Kitzerow, Yongqin Wang, Rachit Rajat, Georg Carle, Murali Annavaram
2024/1370 (PDF ) ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON Tarun Yadav, Manoj Kumar
2024/1369 (PDF ) AGATE: Augmented Global Attested Trusted Execution in the Universal Composability framework Lorenzo Martinico, Markulf Kohlweiss
2024/1368 (PDF ) Tightly Secure Non-Interactive BLS Multi-Signatures Renas Bacho, Benedikt Wagner
2024/1367 (PDF ) A Better Kyber Butterfly for FPGAs Jonas Bertels, Quinten Norga, Ingrid Verbauwhede
2024/1366 (PDF ) Adaptive Successive Over-Relaxation Method for a Faster Iterative Approximation of Homomorphic Operations Jungho Moon, Zhanibek Omarov, Donghoon Yoo, Yongdae An, Heewon Chung
2024/1365 (PDF ) High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature Shiyu Shen, Hao Yang, Wangchen Dai, Hong Zhang, Zhe Liu, Yunlei Zhao
2024/1364 (PDF ) FLIP-and-prove R1CS Anca Nitulescu, Nikitas Paslis, Carla Ràfols
2024/1362 (PDF ) A Documentation of Ethereum’s PeerDAS Benedikt Wagner, Arantxa Zapico
2024/1361 (PDF ) What Did Come Out of It? Analysis and Improvements of DIDComm Messaging Christian Badertscher, Fabio Banfi, Jesus Diaz
2024/1360 (PDF ) CPA-secure KEMs are also sufficient for Post-Quantum TLS 1.3 Biming Zhou, Haodong Jiang, Yunlei Zhao
2024/1359 (PDF ) Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs Debasmita Chakraborty, Hosein Hadipour, Phuong Hoa Nguyen, Maria Eichlseder
2024/1358 (PDF ) Quantum Sieving for Code-Based Cryptanalysis and Its Limitations for ISD Lynn Engelberts, Simona Etinski, Johanna Loyer
2024/1357 (PDF ) Understanding the Blockchain Interoperability Graph based on Cryptocurrency Price Correlation Ori Mazor, Ori Rottenstreich
2024/1356 (PDF ) Leakage-Resilience of Circuit Garbling Ruiyang Li, Yiteng Sun, Chun Guo, Francois-Xavier Standaert, Weijia Wang, Xiao Wang
2024/1355 (PDF ) Direct Range Proofs for Paillier Cryptosystem and Their Applications Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu
2024/1354 (PDF ) Votexx: Extreme Coercion Resistance David Chaum, Richard T. Carback, Mario Yaksetig, Jeremy Clark, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Filip Zagorski, Bingsheng Zhang, Zeyuan Yin
2024/1353 (PDF ) On the overflow and $p$-adic theory applied to homomorphic encryption Jacob Blindenbach, Jung Hee Cheon, Gamze Gürsoy, Jiayi Kang
2024/1352 (PDF ) ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra Doreen Riepel, Marloes Venema, Tanya Verma
2024/1351 (PDF ) Proximity Gaps in Interleaved Codes Benjamin E. Diamond, Angus Gruen
2024/1350 (PDF ) Update to the Sca25519 Library: Mitigating Tearing-based Side-channel Attacks Lukasz Chmielewski, Lubomír Hrbáček
2024/1348 (PDF ) Zero-Knowledge Validation for an Offline Electronic Document Wallet using Bulletproofs Michael Brand, Benoît Poletti
2024/1347 (PDF ) Secure Multiparty Computation with Lazy Sharing Shuaishuai Li, Cong Zhang, Dongdai Lin
2024/1346 (PDF ) Provably Secure Online Authenticated Encryption and Bidirectional Online Channels Arghya Bhattacharjee, Ritam Bhaumik, Daniel Collins, Mridul Nandi
2024/1345 (PDF ) SoK: The Engineer’s Guide to Post-Quantum Cryptography for Embedded Devices Maximilian Pursche, Nikolai Puch, Sebastian N. Peters, Michael P. Heinl
2024/1344 (PDF ) Quantum Security of a Compact Multi-Signature Shaoquan Jiang
2024/1343 (PDF ) Generalized one-way function and its application Hua-Lei Yin
2024/1342 (PDF ) Unconditionally secure key distribution without quantum channel Hua-Lei Yin
2024/1341 (PDF ) Approach for High-Performance Random Number Generators for Critical Systems Pascal Hammer, Veronika Krause, Tobias Probst, Jürgen Mottok
2024/1340 (PDF ) Unbalanced Private Set Union with Reduced Computation and Communication Cong Zhang, Yu Chen, Weiran Liu, Liqiang Peng, Meng Hao, Anyu Wang, Xiaoyun Wang
2024/1339 (PDF ) Comprehensive Robustness Analysis of GCM, CCM, and OCB3 Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu
2024/1338 (PDF ) Horcrux: Synthesize, Split, Shift and Stay Alive Preventing Channel Depletion via Universal and Enhanced Multi-hop Payments Anqi Tian, Peifang Ni, Yingzi Gao, Jing Xu
2024/1337 (PDF ) Designing bent functions using the Maiorana-McFarland secondary construction Juan Carlos Ku-Cauich, Javier Diaz-Vargas
2024/1336 (PDF ) Fast Low Level Disk Encryption Using FPGAs Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas Lopez, Palash Sarkar
2024/1335 (PDF ) Perfect Monomial Prediction for Modular Addition Kai Hu, Trevor Yap
2024/1334 (PDF ) Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map George Teseleanu
2024/1333 (PDF ) Efficient online and Non-Interactive Threshold Signatures with Identifiable Aborts for Identity-Based Signatures in the IEEE P1363 Standard Yan Jiang, Youwen Zhu, Jian Wang, Yudi Zhang
2024/1332 (PDF ) Attacking trapdoors from matrix products Thomas Decru, Tako Boris Fouotsa, Paul Frixons, Valerie Gilchrist, Christophe Petit
2024/1331 (PDF ) Practical Small Private Exponent Attacks against RSA Yansong Feng, Zhen Liu, Abderrahmane Nitaj, Yanbin Pan
2024/1330 (PDF ) Computing Asymptotic Bounds for Small Roots in Coppersmith's Method via Sumset Theory Yansong Feng, Hengyi Luo, Qiyuan Chen, Abderrahmane Nitaj, Yanbin Pan
2024/1329 (PDF ) Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA Yansong Feng, Abderrahmane Nitaj, Yanbin Pan
2024/1328 (PDF ) A Note on ARADI and LLAMA Roberto Avanzi, Orr Dunkelman, Shibam Ghosh
2024/1327 (PDF ) Public-Key Anamorphism in (CCA-secure) Public-Key Encryption and Beyond Giuseppe Persiano, Duong Hieu Phan, Moti Yung
2024/1326 (PDF ) On the anonymity of one authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks Zhengjun Cao, Lihua Liu
2024/1325 (PDF ) Authenticity in the Presence of Leakage using a Forkcipher Francesco Berti, François-Xavier Standaert, Itamar Levi
2024/1324 (PDF ) CLAASPing ARADI: Automated Analysis of the ARADI Block Cipher Emanuele Bellini, Mattia Formenti, David Gérault, Juan Grados, Anna Hambitzer, Yun Ju Huang, Paul Huynh, Mohamed Rachidi, Raghvendra Rohit, Sharwan K. Tiwari
2024/1323 (PDF ) SoK: Instruction Set Extensions for Cryptographers Hao Cheng, Johann Großschädl, Ben Marshall, Daniel Page, Markku-Juhani O. Saarinen
2024/1322 (PDF ) Revisiting a Realistic EM Side-Channel Attack on a Complex Modern SoC Debao Wang, Yiwen Gao, Yongbin Zhou, Xian Huang
2024/1321 (PDF ) ECC’s Achilles’ Heel: Unveiling Weak Keys in Standardized Curves Enrico Talotti, Matteo Paier, Marino Miculan
2024/1320 (PDF ) Post-Quantum DNSSEC over UDP via QNAME-Based Fragmentation Aditya Singh Rawat, Mahabir Prasad Jhanwar
2024/1319 (PDF ) Quantum-safe Signatureless DNSSEC Aditya Singh Rawat, Mahabir Prasad Jhanwar
2024/1318 (PDF ) Refined TFHE Leveled Homomorphic Evaluation and Its Application Ruida Wang, Jincheol Ha, Xuan Shen, Xianhui Lu, Chunling Chen, Kunpeng Wang, Jooyoung Lee
2024/1317 (PDF ) MAESTRO: Multi-party AES using Lookup Tables Hiraku Morita, Erik Pohle, Kunihiko Sadakane, Peter Scholl, Kazunari Tozawa, Daniel Tschudi
2024/1316 (PDF ) Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields Arnab Roy, Matthias Johann Steiner
2024/1315 (PDF ) PulpFHE: Complex Instruction Set Extensions for FHE Processors Omar Ahmed, Nektarios Georgios Tsoutsos
2024/1314 (PDF ) Verifiable Homomorphic Linear Combinations in Multi-Instance Time-Lock Puzzles Aydin Abadi
2024/1313 (PDF ) A Lattice Attack Against a Family of RSA-like Cryptosystems George Teseleanu
2024/1312 (PDF ) Probabilistic Data Structures in the Wild: A Security Analysis of Redis Mia Filić, Jonas Hofmann, Sam A. Markelon, Kenneth G. Paterson, Anupama Unnikrishnan
2024/1311 (PDF ) Dynamic Threshold Key Encapsulation with a Transparent Setup Joon Sik Kim, Kwangsu Lee, Jong Hwan Park, Hyoseung Kim
2024/1310 (PDF ) On the Effects of Neural Network-based Output Prediction Attacks on the Design of Symmetric-key Ciphers Hayato Watanabe, Ryoma Ito, Toshihiro Ohigashi
2024/1309 (PDF ) R-STELLAR: A Resilient Synthesizable Signature Attenuation SCA Protection on AES-256 with built-in Attack-on-Countermeasure Detection Archisman Ghosh, Dong-Hyun Seo, Debayan Das, Santosh Ghosh, Shreyas Sen
2024/1308 (PDF ) LAMA: Leakage-Abuse Attacks Against Microsoft Always Encrypted Ryan Seah, Daren Khu, Alexander Hoover, Ruth Ng
2024/1307 (PDF ) On Algebraic Homomorphic Encryption and its Applications to Doubly-Efficient PIR Hiroki Okada, Rachel Player, Simon Pohmann, Christian Weinert
2024/1306 (PDF ) Scloud+: a Lightweight LWE-based KEM without Ring/Module Structure Anyu Wang, Zhongxiang Zheng, Chunhuan Zhao, Zhiyuan Qiu, Guang Zeng, Ye Yuan, Changchun Mu, Xiaoyun Wang
2024/1305 (PDF ) Use of Simple Arithmetic Operations to Construct Efficiently Implementable Boolean functions Possessing High Nonlinearity and Good Resistance to Algebraic Attacks Claude Carlet, Palash Sarkar
2024/1304 (PDF ) Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity Xingwei Ren, Yongqiang Li, Mingsheng Wang
2024/1303 (PDF ) Efficient Zero-Knowledge Arguments for Paillier Cryptosystem Borui GONG, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, Lichun Li
2024/1302 (PDF ) Privacy-preserving in cloud networks: An efficient, revocable and authenticated encrypted search scheme Yibo Cao, Shiyuan Xu, Gang Xu, Xiu-Bo Chen, Yuling Chen, Siu-Ming Yiu
2024/1301 (PDF ) Kalos: Hierarchical-auditable and Human-binding Authentication Scheme for Clinical Trial Chang Chen, Zelong Wu, Guoyu Yang, Qi Chen, Wei Wang, Jin Li
2024/1300 (PDF ) Survey: 6 Years of Neural Differential Cryptanalysis David Gerault, Anna Hambitzer, Moritz Huppert, Stjepan Picek
2024/1299 (PDF ) Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups) Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Lei Yang
2024/1298 (PDF ) Point (de)compression for elliptic curves over highly $2$-adic finite fields Dmitrii Koshelev
2024/1297 (PDF ) Improved Cryptanalysis of SNOVA Ward Beullens
2024/1296 (PDF ) Universal Composable Transaction Serialization with Order Fairness Michele Ciampi, Aggelos Kiayias, Yu Shen
2024/1295 (PDF ) Identity-Based Encryption from Lattices with More Compactness in the Standard Model Weidan Ji, Zhedong Wang, Haoxiang Jin, Qi Wang, Geng Wang, Dawu Gu
2024/1294 (PDF ) Don’t Trust Setup! New Directions in Pre-Constrained Cryptography Shweta Agrawal, Simran Kumari, Ryo Nishimaki
2024/1293 (PDF ) Greyhound: Fast Polynomial Commitments from Lattices Ngoc Khanh Nguyen, Gregor Seiler
2024/1292 (PDF ) Hierarchical Identity-Based Matchmaking Encryption Sohto Chiku, Keisuke Hara, Junji Shikata
2024/1291 (PDF ) Raccoon: A Masking-Friendly Signature Proven in the Probing Model Rafaël del Pino, Shuichi Katsumata, Thomas Prest, Mélissa Rossi
2024/1290 (PDF ) SoK: Computational and Distributed Differential Privacy for MPC Fredrik Meisingseth, Christian Rechberger
2024/1289 (PDF ) Improved Lattice Blind Signatures from Recycled Entropy Corentin Jeudy, Olivier Sanders
2024/1288 (PDF ) KpqClean Ver2: Comprehensive Benchmarking and Analysis of KpqC Algorithm Round 2 Submissions Minjoo Sim, Siwoo Eum, Gyeongju Song, Minwoo Lee, Sangwon Kim, Minho Song, Hwajeong Seo
2024/1287 (PDF ) Basic Lattice Cryptography: The concepts behind Kyber (ML-KEM) and Dilithium (ML-DSA) Vadim Lyubashevsky
2024/1286 (PDF ) Towards a Tightly Secure Signature in Multi-User Setting with Corruptions Based on Search Assumptions Hirofumi Yoshioka, Wakaha Ogata, Keitaro Hashimoto
2024/1285 (PDF ) Robust Multiparty Computation from Threshold Encryption Based on RLWE Antoine Urban, Matthieu Rambaud
2024/1284 (PDF ) Plaintext-Ciphertext Matrix Multiplication and FHE Bootstrapping: Fast and Fused Youngjin Bae, Jung Hee Cheon, Guillaume Hanrot, Jai Hyun Park, Damien Stehlé
2024/1283 (PDF ) Password-authenticated Cryptography from Consumable Tokens Ghada Almashaqbeh
2024/1282 (PDF ) NTRU+PKE: Efficient Public-Key Encryption Schemes from the NTRU Problem Jonghyun Kim, Jong Hwan Park
2024/1281 (PDF ) Stackproofs: Private proofs of stack and contract execution using Protogalaxy Liam Eagen, Ariel Gabizon, Marek Sefranek, Patrick Towa, Zachary J. Williamson
2024/1280 (PDF ) A Survey on SoC Security Verification Methods at the Pre-silicon Stage Rasheed Kibria, Farimah Farahmandi, Mark Tehranipoor
2024/1279 (PDF ) Improved Polynomial Division in Cryptography Kostas Kryptos Chalkias, Charanjit Jutla, Jonas Lindstrom, Varun Madathil, Arnab Roy
2024/1278 (PDF ) Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys Ravi Anand, Shibam Ghosh, Takanori Isobe, Rentaro Shiba
2024/1277 (PDF ) Robust but Relaxed Probing Model Nicolai Müller, Amir Moradi
2024/1276 (PDF ) A bound on the quantum value of all compiled nonlocal games Alexander Kulpe, Giulio Malavolta, Connor Paddock, Simon Schmidt, Michael Walter
2024/1275 (PDF ) MIFARE Classic: exposing the static encrypted nonce variant Philippe Teuwen
2024/1274 (PDF ) Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples Vincent Rieder
2024/1273 (PDF ) HyperPianist: Pianist with Linear-Time Prover and Logarithmic Communication Cost Chongrong Li, Pengfei Zhu, Yun Li, Cheng Hong, Wenjie Qu, Jiaheng Zhang
2024/1272 (PDF ) An Improved Algorithm for Code Equivalence Julian Nowakowski
2024/1271 (PDF ) AES-based Multi-instance TCCR Hash with High Security, and Applications Hongrui Cui, Chun Guo, Xiao Wang, Chenkai Weng, Kang Yang, Yu Yu
2024/1270 (PDF ) Meet-in-the-Middle Attack on 4+4 Rounds of SCARF under Single-Tweak Setting Siwei Chen, Kai Hu, Guozhen Liu, Zhongfeng Niu, Quan Quan Tan, Shichang Wang
2024/1269 (PDF ) Cryptographic Security through Kleene’s Theorem and Automata Theory Mike Wa Nkongolo
2024/1268 (PDF ) Improved YOSO Randomness Generation with Worst-Case Corruptions Chen-Da Liu-Zhang, Elisaweta Masserova, João Ribeiro, Pratik Soni, Sri AravindaKrishnan Thyagarajan
2024/1267 (PDF ) Chrysalis Cipher Suite Ian Malloy, Dennis Hollenbeck
2024/1266 (PDF ) Information-Theoretic Topology-Hiding Broadcast: Wheels, Stars, Friendship, and Beyond D'or Banoun, Elette Boyle, Ran Cohen
2024/1265 (PDF ) Safe curves for elliptic-curve cryptography Daniel J. Bernstein, Tanja Lange
2024/1264 (PDF ) Succinct Non-Subsequence Arguments San Ling, Khai Hanh Tang, Khu Vu, Huaxiong Wang, Yingfei Yan
2024/1263 (PDF ) A Security Analysis of Two Classes of RSA-like Cryptosystems Paul Cotan, George Teseleanu
2024/1262 (PDF ) Dilithium-Based Verifiable Timed Signature Scheme Erkan Uslu, Oğuz Yayla
2024/1261 (PDF ) A Key-Recovery Attack on a Leaky Seasign Variant Shai Levin
2024/1260 (PDF ) zk-promises: Anonymous Moderation, Reputation, and Blocking from Anonymous Credentials with Callbacks Maurice Shih, Michael Rosenberg, Hari Kailad, Ian Miers
2024/1259 (PDF ) Efficient (Non-)Membership Tree from Multicollision-Resistance with Applications to Zero-Knowledge Proofs Maksym Petkus
2024/1258 (PDF ) Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange Mihir Bellare, Doreen Riepel, Stefano Tessaro, Yizhao Zhang
2024/1257 (PDF ) Committing Wide Encryption Mode with Minimum Ciphertext Expansion Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2024/1256 (PDF ) Concrete Analysis of Schnorr-type Signatures with Aborts Theo Fanuela Prabowo, Chik How Tan
2024/1255 (PDF ) Compass: Encrypted Semantic Search with High Accuracy Jinhao Zhu, Liana Patel, Matei Zaharia, Raluca Ada Popa
2024/1254 (PDF ) Non-Interactive Zero-Knowledge from LPN and MQ Quang Dao, Aayush Jain, Zhengzhong Jin
2024/1253 (PDF ) FELIX (XGCD for FALCON): FPGA-based Scalable and Lightweight Accelerator for Large Integer Extended GCD Sam Coulon, Tianyou Bao, Jiafeng Xie
2024/1252 (PDF ) The Pseudorandomness of Legendre Symbols under the Quadratic-Residuosity Assumption Henry Corrigan-Gibbs, David J. Wu
2024/1251 (PDF ) EMI Shielding for Use in Side-Channel Security: Analysis, Simulation and Measurements Daniel Dobkin, Edut Katz, David Popovtzer, Itamar Levi
2024/1250 (PDF ) AutoHoG: Automating Homomorphic Gate Design for Large-Scale Logic Circuit Evaluation Zhenyu Guan, Ran Mao, Qianyun Zhang, Zhou Zhang, Zian Zhao, Song Bian
2024/1249 (PDF ) Koala: A Low-Latency Pseudorandom Function Parisa Amiri Eliasi, Yanis Belkheyar, Joan Daemen, Santosh Ghosh, Daniël Kuijsters, Alireza Mehrdad, Silvia Mella, Shahram Rasoolzadeh, Gilles Van Assche
2024/1248 (PDF ) A Not So Discrete Sampler: Power Analysis Attacks on HAWK signature scheme Morgane Guerreau, Mélissa Rossi
2024/1247 (PDF ) A Note on the Quasigroup Lai-Massey Structures George Teseleanu
2024/1246 (PDF ) MSMAC: Accelerating Multi-Scalar Multiplication for Zero-Knowledge Proof Pengcheng Qiu, Guiming Wu, Tingqiang Chu, Changzheng Wei, Runzhou Luo, Ying Yan, Wei Wang, Hui Zhang
2024/1245 (PDF ) Garuda and Pari: Faster and Smaller SNARKs via Equifficient Polynomial Commitments Michel Dellepere, Pratyush Mishra, Alireza Shirzad
2024/1244 (PDF ) A Note on ``Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things'' Zhengjun Cao, Lihua Liu
2024/1243 (PDF ) Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations Thales B. Paiva, Marcos A. Simplicio Jr, Syed Mahbub Hafiz, Bahattin Yildiz, Eduardo L. Cominetti, Henrique S. Ogawa
2024/1242 (PDF ) Beyond the Whitepaper: Where BFT Consensus Protocols Meet Reality David Wong, Denis Kolegov, Ivan Mikushin
2024/1241 (PDF ) PROF: Protected Order Flow in a Profit-Seeking World Kushal Babel, Nerla Jean-Louis, Yan Ji, Ujval Misra, Mahimna Kelkar, Kosala Yapa Mudiyanselage, Andrew Miller, Ari Juels
2024/1240 (PDF ) ARADI and LLAMA: Low-Latency Cryptography for Memory Encryption Patricia Greene, Mark Motley, Bryan Weeks
2024/1239 (PDF ) Efficient Differentially Private Set Intersection Xinyu Peng, Yufei Wang, Weiran Liu, Liqiang Peng, Feng Han, Zhen Gu, Jianling Sun, Yuan Hong
2024/1238 (PDF ) Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption Rachit Garg, Rishab Goyal, George Lu
2024/1237 (PDF ) Efficient Variants of TNT with BBB Security Ritam Bhaumik, Wonseok Choi, Avijit Dutta, Cuauhtemoc Mancillas López, Hrithik Nandi, Yaobin Shen
2024/1236 (PDF ) Optimizing Big Integer Multiplication on Bitcoin: Introducing w-windowed Approach Dmytro Zakharov, Oleksandr Kurbatov, Manish Bista, Belove Bist
2024/1235 (PDF ) Blue fish, red fish, live fish, dead fish Victor Shoup
2024/1234 (PDF ) EagleSignV3 : A new secure variant of EagleSign signature over lattices Abiodoun Clement Hounkpevi, Sidoine Djimnaibeye, Michel Seck, Djiby Sow
2024/1233 (PDF ) Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC Juliane Krämer, Patrick Struck, Maximiliane Weishäupl
2024/1232 (PDF ) Efficient and Privacy-Preserving Collective Remote Attestation for NFV Ghada Arfaoui, Thibaut Jacques, Cristina Onete
2024/1231 (PDF ) A Composable View of Homomorphic Encryption and Authenticator Ganyuan Cao
2024/1230 (PDF ) Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY Jianing Zhang, Haoyang Wang, Deng Tang
2024/1229 (PDF ) Benchmarking Attacks on Learning with Errors Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin Lauter
2024/1228 (PDF ) Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models Elijah Pelofske, Vincent Urias, Lorie M. Liebrock
2024/1227 (PDF ) ZIPNet: Low-bandwidth anonymous broadcast from (dis)Trusted Execution Environments Michael Rosenberg, Maurice Shih, Zhenyu Zhao, Rui Wang, Ian Miers, Fan Zhang
2024/1226 (PDF ) A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David Basin
2024/1225 (PDF ) SIGNITC: Supersingular Isogeny Graph Non-Interactive Timed Commitments Knud Ahrens
2024/1224 (PDF ) Generic Construction of Secure Sketches from Groups Axel Durbet, Koray Karabina, Kevin Thiry-Atighehchi
2024/1223 (PDF ) A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level Diego F. Aranha, Georgios Fotiadis, Aurore Guillevic
2024/1222 (PDF ) Quantum Implementation and Analysis of ARIA Yujin Oh, Kyungbae Jang, Yujin Yang, Hwajeong Seo
2024/1221 (PDF ) Depth Optimized Quantum Circuits for HIGHT and LEA Kyungbae Jang, Yujin Oh, Minwoo Lee, Dukyoung Kim, Hwajeong Seo
2024/1220 (PDF ) Mova: Nova folding without committing to error terms Nikolaos Dimitriou, Albert Garreta, Ignacio Manzur, Ilia Vlasov
2024/1219 (PDF ) Foldable, Recursive Proofs of Isogeny Computation with Reduced Time Complexity Krystal Maughan, Joseph Near, Christelle Vincent
2024/1218 (PDF ) A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities Xavier Bonnetain, Virginie Lallemand
2024/1216 (PDF ) Delegatable Anonymous Credentials From Mercurial Signatures With Stronger Privacy Scott Griffy, Anna Lysyanskaya, Omid Mir, Octavio Perez Kempner, Daniel Slamanig
2024/1215 (PDF ) Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols Chris Brzuska, Cas Cremers, Håkon Jacobsen, Douglas Stebila, Bogdan Warinschi
2024/1214 (PDF ) Less Effort, More Success: Efficient Genetic Algorithm-Based Framework for Side-channel Collision Attacks Jiawei Zhang, Jiangshan Long, Changhai Ou, Kexin Qiao, Fan Zhang, Shi Yan
2024/1213 (PDF ) Dynamic Bounded-Collusion Streaming Functional Encryption from Minimal Assumptions Kaartik Bhushan, Alexis Korb, Amit Sahai
2024/1211 (PDF ) A Generic Framework for Side-Channel Attacks against LWE-based Cryptosystems Julius Hermelink, Silvan Streit, Erik Mårtensson, Richard Petri
2024/1210 (PDF ) More Optimizations to Sum-Check Proving Quang Dao, Justin Thaler
2024/1209 (PDF ) Collaborative CP-NIZKs: Modular, Composable Proofs for Distributed Secrets Mohammed Alghazwi, Tariq Bontekoe, Leon Visscher, Fatih Turkmen
2024/1208 (PDF ) Hekaton: Horizontally-Scalable zkSNARKs via Proof Aggregation Michael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, Pratyush Mishra
2024/1207 (PDF ) What Have SNARGs Ever Done for FHE? Michael Walter
2024/1206 (PDF ) Applying Post-Quantum Cryptography Algorithms to a DLT-Based CBDC Infrastructure: Comparative and Feasibility Analysis Daniel de Haro Moraes, Joao Paulo Aragao Pereira, Bruno Estolano Grossi, Gustavo Mirapalheta, George Marcel Monteiro Arcuri Smetana, Wesley Rodrigues, Courtnay Nery Guimarães Jr., Bruno Domingues, Fábio Saito, Marcos Simplício
2024/1205 (PDF ) Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card Zhengjun Cao, Lihua Liu
2024/1204 (PDF ) A Fast Heuristic for Mapping Boolean Circuits to Functional Bootstrapping Sergiu Carpov
2024/1203 (PDF ) Preservation of Speculative Constant-Time by Compilation Santiago Arranz Olmos, Gilles Barthe, Lionel Blatter, Benjamin Grégoire, Vincent Laporte
2024/1202 (PDF ) Prover - Toward More Efficient Formal Verification of Masking in Probing Model Feng Zhou, Hua Chen, Limin Fan
2024/1201 (PDF ) Designing a General-Purpose 8-bit (T)FHE Processor Abstraction Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey, Nicolas Ye
2024/1200 (PDF ) Depth-Aware Arithmetization of Common Primitives in Prime Fields Jelle Vos, Mauro Conti, Zekeriya Erkin
2024/1199 (PDF ) On degrees of carry and Scholz's conjecture Theophilus Agama
2024/1198 (PDF ) ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA Xinyi Ji, Jiankuo Dong, Junhao Huang, Zhijian Yuan, Wangchen Dai, Fu Xiao, Jingqiang Lin
2024/1197 (PDF ) Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng
2024/1196 (PDF ) Client-Aided Privacy-Preserving Machine Learning Peihan Miao, Xinyi Shi, Chao Wu, Ruofan Xu
2024/1195 (PDF ) Constructing More Super-optimal Pairings via Small Degree Endomorphisms Jianming Lin, Chang-An Zhao, Yuhao Zheng
2024/1194 (PDF ) Hardware Implementation and Security Analysis of Local-Masked NTT for CRYSTALS-Kyber Rafael Carrera Rodriguez, Emanuele Valea, Florent Bruguier, Pascal Benoit
2024/1193 (PDF ) The syzygy distinguisher Hugues RANDRIAMBOLOLONA
2024/1192 (PDF ) Towards ML-KEM & ML-DSA on OpenTitan Amin Abdulrahman, Felix Oberhansl, Hoang Nguyen Hien Pham, Jade Philipoom, Peter Schwabe, Tobias Stelzer, Andreas Zankl
2024/1191 (PDF ) A note on ``a novel authentication protocol for IoT-enabled devices'' Zhengjun Cao, Lihua Liu
2024/1190 (PDF ) Efficient Two-Party Secure Aggregation via Incremental Distributed Point Function Nan Cheng, Aikaterini Mitrokotsa, Feng Zhang, Frank Hartmann
2024/1189 (PDF ) The Espresso Sequencing Network: HotShot Consensus, Tiramisu Data-Availability, and Builder-Exchange Jeb Bearer, Benedikt Bünz, Philippe Camacho, Binyi Chen, Ellie Davidson, Ben Fisch, Brendon Fish, Gus Gutoski, Fernando Krell, Chengyu Lin, Dahlia Malkhi, Kartik Nayak, Keyao Shen, Alex Xiong, Nathan Yospe, Sishan Long
2024/1188 (PDF ) Lightweight Dynamic Linear Components for Symmetric Cryptography S. M. Dehnavi, M. R. Mirzaee Shamsabad
2024/1187 (PDF ) STORM — Small Table Oriented Redundancy-based SCA Mitigation for AES Yaacov Belenky, Hennadii Chernyshchyk, Oleg Karavaev, Oleh Maksymenko, Valery Teper, Daria Ryzhkova, Itamar Levi, Osnat Keren, Yury Kreimer
2024/1186 (PDF ) MATTER: A Wide-Block Tweakable Block Cipher Roberto Avanzi, Orr Dunkelman, Kazuhiko Minematsu
2024/1185 (PDF ) Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies Giacomo Borin, Yi-Fu Lai, Antonin Leroux
2024/1184 (PDF ) Sanitizable and Accountable Endorsement for Dynamic Transactions in Fabric Zhaoman Liu, Jianting Ning, Huiying Hou, Yunlei Zhao
2024/1183 (PDF ) Updatable Private Set Intersection from Structured Encryption Archita Agarwal, David Cash, Marilyn George, Seny Kamara, Tarik Moataz, Jaspal Singh
2024/1182 (PDF ) Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation Aditya Damodaran, Simon Rastikian, Peter B. Rønne, Peter Y A Ryan
2024/1181 (PDF ) AQQUA: Augmenting Quisquis with Auditability George Papadoulis, Danai Balla, Panagiotis Grontas, Aris Pagourtzis
2024/1180 (PDF ) Fast computation of 2-isogenies in dimension 4 and cryptographic applications Pierrick Dartois
2024/1179 (PDF ) Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm for Inner Product Ring LWE Problem and Ring SIS Problem Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai
2024/1178 (PDF ) Towards Quantum-Safe Blockchain: Exploration of PQC and Public-key Recovery on Embedded Systems Dominik Marchsreiter
2024/1177 (PDF ) Cryptanalysis of two post-quantum authenticated key agreement protocols Mehdi Abri, Hamid Mala
2024/1176 (PDF ) A zero-trust swarm security architecture and protocols Alex Shafarenko
2024/1175 (PDF ) AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities Vlasis Koutsos, Sankarshan Damle, Dimitrios Papadopoulos, Sujit Gujar, Dimitris Chatzopoulos
2024/1174 (PDF ) Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber Jinnuo Li, Chi Cheng, Muyan Shen, Peng Chen, Qian Guo, Dongsheng Liu, Liji Wu, Jian Weng
2024/1173 (PDF ) Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms Hengyi Luo, Kaijie Jiang, Yanbin Pan, Anyu Wang
2024/1172 (PDF ) Generalized class group actions on oriented elliptic curves with level structure Sarah Arpin, Wouter Castryck, Jonathan Komada Eriksen, Gioella Lorenzon, Frederik Vercauteren
2024/1171 (PDF ) Tight Time-Space Tradeoffs for the Decisional Diffie-Hellman Problem Akshima, Tyler Besselman, Siyao Guo, Zhiye Xie, Yuping Ye
2024/1170 (PDF ) Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism Suparna Kundu, Archisman Ghosh, Angshuman Karmakar, Shreyas Sen, Ingrid Verbauwhede
2024/1169 (PDF ) Attacking Tropical Stickel Protocol by MILP and Heuristic Optimization Techniques Sulaiman Alhussaini, Serge˘ı Sergeev
2024/1168 (PDF ) Time is not enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-timing Channel Congming Wei, Guangze Hong, An Wang, Jing Wang, Shaofei Sun, Yaoling Ding, Liehuang Zhu, Wenrui Ma
2024/1167 (PDF ) Expanding the Toolbox: Coercion and Vote-Selling at Vote-Casting Revisited Tamara Finogina, Javier Herranz, Peter B. Roenne
2024/1166 (PDF ) Relationships among FuncCPA and Its Related Notions Takumi Shinozaki, Tatsuaki Okamoto, Keisuke Takana, Masayuki Tezuka, Yusuke Yoshida
2024/1165 (PDF ) Respire: High-Rate PIR for Databases with Small Records Alexander Burton, Samir Jordan Menon, David J. Wu
2024/1164 (PDF ) A Crack in the Firmament: Restoring Soundness of the Orion Proof System and More Thomas den Hollander, Daniel Slamanig
2024/1163 (PDF ) On the Number of Restricted Solutions to Constrained Systems and their Applications Benoît Cogliati, Jordan Ethan, Ashwin Jha, Mridul Nandi, Abishanka Saha
2024/1162 (PDF ) Practical Traceable Receipt-Free Encryption Henri Devillez, Olivier Pereira, Thomas Peters
2024/1161 (PDF ) On the Concrete Security of Non-interactive FRI Alexander R. Block, Pratyush Ranjan Tiwari
2024/1159 (PDF ) LaPSuS – A Lattice-Based Private Stream Aggregation Scheme under Scrutiny Johannes Ottenhues, Alexander Koch
2024/1158 (PDF ) A Note on `` Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters'' Zhengjun Cao, Lihua Liu
2024/1157 (PDF ) Shift-invariant transformations and almost liftings Jan Kristian Haugland, Tron Omland
2024/1156 (PDF ) On affine forestry over integral domains and families of deep Jordan-Gauss graphs Tymoteusz Chojecki, Grahame Erskine, James Tuite, Vasyl Ustimenko
2024/1155 (PDF ) Cross Ledger Transaction Consistency for Financial Auditing Vlasis Koutsos, Xiangan Tian, Dimitrios Papadopoulos, Dimitris Chatzopoulos
2024/1154 (PDF ) Blockchain Space Tokenization Aggelos Kiayias, Elias Koutsoupias, Philip Lazos, Giorgos Panagiotakos
2024/1153 (PDF ) Designated-Verifier zk-SNARKs Made Easy Chen Li, Fangguo Zhang
2024/1152 (PDF ) Secure Multiparty Computation of Symmetric Functions with Polylogarithmic Bottleneck Complexity and Correlated Randomness Reo Eriguchi
2024/1151 (PDF ) Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models Aydin Abadi, Vishnu Asutosh Dasu, Sumanta Sarkar
2024/1150 (PDF ) Finding Practical Parameters for Isogeny-based Cryptography Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Francisco Rodríguez-Henríquez
2024/1149 (PDF ) Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, Rina Zeitoun
2024/1148 (PDF ) On hermitian decomposition lattices and the module-LIP problem in rank 2 Thomas Espitau, Heorhii Pliatsok
2024/1147 (PDF ) A reduction from Hawk to the principal ideal problem in a quaternion algebra Clémence Chevignard, Pierre-Alain Fouque, Guilhem Mureau, Alice Pellet-Mary, Alexandre Wallet
2024/1146 (PDF ) Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions Minglang Dong, Cong Zhang, Yujie Bai, Yu Chen
2024/1145 (PDF ) A Practical and Scalable Implementation of the Vernam Cipher, under Shannon Conditions, using Quantum Noise Adrian Neal
2024/1144 (PDF ) A Note on ``Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain'' Zhengjun Cao, Lihua Liu
2024/1143 (PDF ) LR-OT: Leakage-Resilient Oblivious Transfer Francesco Berti, Carmit Hazay, Itamar Levi
2024/1141 (PDF ) Optimized Privacy-Preserving Clustering with Fully Homomorphic Encryption Chen Yang, Jingwei Chen, Wenyuan Wu, Yong Feng
2024/1140 (PDF ) Permutation Superposition Oracles for Quantum Query Lower Bounds Christian Majenz, Giulio Malavolta, Michael Walter
2024/1139 (PDF ) Anonymous Outsourced Statekeeping with Reduced Server Storage Dana Dachman-Soled, Esha Ghosh, Mingyu Liang, Ian Miers, Michael Rosenberg
2024/1138 (PDF ) Dot-Product Proofs and Their Applications Nir Bitansky, Prahladh Harsha, Yuval Ishai, Ron D. Rothblum, David J. Wu
2024/1137 (PDF ) Cryptanalysis of EagleSign Ludo N. Pulles, Mehdi Tibouchi
2024/1136 (PDF ) Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3 Zhongyi Zhang, Chengan Hou, Meicheng Liu
2024/1135 (PDF ) Scalable and Lightweight State-Channel Audits Christian Badertscher, Maxim Jourenko, Dimitris Karakostas, Mario Larangeira
2024/1134 (PDF ) Exploiting signature leakages: breaking Enhanced pqsigRM Thomas Debris-Alazard, Pierre Loisel, Valentin Vasseur
2024/1133 (PDF ) Parameters of Algebraic Representation vs. Efficiency of Algebraic Cryptanalysis Hossein Arabnezhad, Babak Sadeghiyan
2024/1132 (PDF ) A New PPML Paradigm for Quantized Models Tianpei Lu, Bingsheng Zhang, Xiaoyuan Zhang, Kui Ren
2024/1131 (PDF ) Jolt-b: recursion friendly Jolt with basefold commitment Hang Su, Qi Yang, Zhenfei Zhang
2024/1130 (PDF ) Distributed Verifiable Random Function With Compact Proof Ahmet Ramazan Ağırtaş, Arda Buğra Özer, Zülfükar Saygı, Oğuz Yayla
2024/1129 (PDF ) Attribute-Based Signatures for Circuits with Optimal Parameter Size from Standard Assumptions Ryuya Hayashi, Yusuke Sakai, Shota Yamada
2024/1128 (PDF ) Extended Diffie-Hellman Encryption for Secure and Efficient Real-Time Beacon Notifications Liron David, Omer Berkman, Avinatan Hassidim, David Lazarov, Yossi Matias, Moti Yung
2024/1127 (PDF ) Curl: Private LLMs through Wavelet-Encoded Look-Up Tables Manuel B. Santos, Dimitris Mouris, Mehmet Ugurbil, Stanislaw Jarecki, José Reis, Shubho Sengupta, Miguel de Vega
2024/1126 (PDF ) Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods Avital Shafran, Eran Malach, Thomas Ristenpart, Gil Segev, Stefano Tessaro
2024/1125 (PDF ) Revisiting PACD-based Attacks on RSA-CRT Guillaume Barbu, Laurent Grémy, Roch Lescuyer
2024/1124 (PDF ) OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms Maximilian Kroschewski, Anja Lehmann, Cavit Özbay
2024/1123 (PDF ) Switching Off your Device Does Not Protect Against Fault Attacks Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, Vincent Grosso
2024/1122 (PDF ) Finding Bugs and Features Using Cryptographically-Informed Functional Testing Giacomo Fenzi, Jan Gilcher, Fernando Virdia
2024/1121 (PDF ) Implementation and Performance Evaluation of Elliptic Curve Cryptography over SECP256R1 on STM32 Microprocessor Onur İşler
2024/1120 (PDF ) A Fast and Efficient SIKE Co-Design: Coarse-Grained Reconfigurable Accelerators with Custom RISC-V Microcontroller on FPGA Jing Tian, Bo Wu, Lang Feng, Haochen Zhang, Zhongfeng Wang
2024/1119 (PDF ) Generic Anamorphic Encryption, Revisited: New Limitations and Constructions Dario Catalano, Emanuele Giunta, Francesco Migliaro
2024/1118 (PDF ) Shared-Custodial Password-Authenticated Deterministic Wallets Poulami Das, Andreas Erwig, Sebastian Faust
2024/1117 (PDF ) Oryx: Private detection of cycles in federated graphs Ke Zhong, Sebastian Angel
2024/1116 (PDF ) A Simple Post-Quantum Oblivious Transfer Protocol from Mod-LWR Shen Dong, Hongrui Cui, Kaiyi Zhang, Kang Yang, Yu Yu
2024/1115 (PDF ) Public vs Private Blockchains lineage storage Bilel Zaghdoudi, Maria Potop Butucaru
2024/1114 (PDF ) Time-Memory Trade-off Algorithms for Homomorphically Evaluating Look-up Table in TFHE Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Takashi Nishide
2024/1113 (PDF ) Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors Cecilia Boschini, Darya Kaviani, Russell W. F. Lai, Giulio Malavolta, Akira Takahashi, Mehdi Tibouchi
2024/1112 (PDF ) HERatio: Homomorphic Encryption of Rationals using Laurent Polynomials Luke Harmon, Gaetan Delavignette, Hanes Oliveira
2024/1111 (PDF ) Collision-Based Attacks on Block Cipher Modes - Exploiting Collisions and Their Absence John Preuß Mattsson
2024/1110 (PDF ) Legacy Encryption Downgrade Attacks against LibrePGP and CMS Falko Strenzke, Johannes Roth
2024/1109 (PDF ) QuickPool: Privacy-Preserving Ride-Sharing Service Banashri Karmakar, Shyam Murthy, Arpita Patra, Protik Paul
2024/1108 (PDF ) Faster Asynchronous Blockchain Consensus and MVBA Matthieu Rambaud
2024/1107 (PDF ) Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements Colin O'Flynn
2024/1106 (PDF ) Masked Vector Sampling for HQC Maxime Spyropoulos, David Vigilant, Fabrice Perion, Renaud Pacalet, Laurent Sauvage
2024/1105 (PDF ) A New CRT-based Fully Homomorphic Encryption Anil Kumar Pradhan, Abhraneel Dutta, Hansraj Jangir
2024/1104 (PDF ) Structural Lower Bounds on Black-Box Constructions of Pseudorandom Functions Amos Beimel, Tal Malkin, Noam Mazor
2024/1103 (PDF ) A Note on Efficient Computation of the Multilinear Extension Ron D. Rothblum
2024/1102 (PDF ) A Note on ``Privacy Preserving n-Party Scalar Product Protocol'' Lihua Liu
2024/1101 (PDF ) Stickel’s Protocol using Tropical Increasing Matrices Any Muanalifah, Zahari Mahad, Nurwan, Rosalio G Artes
2024/1100 (PDF ) Unforgeability of Blind Schnorr in the Limited Concurrency Setting Franklin Harding, Jiayu Xu
2024/1099 (PDF ) FHE-MENNs: Opportunities and Pitfalls for Accelerating Fully Homomorphic Private Inference with Multi-Exit Neural Networks Lars Wolfgang Folkerts, Nektarios Georgios Tsoutsos
2024/1098 (PDF ) Limits of Black-Box Anamorphic Encryption Dario Catalano, Emanuele Giunta, Francesco Migliaro
2024/1097 (PDF ) The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging Michael Anastos, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto Noval, Matthew Kwan, Guillermo Pascual-Perez, Krzysztof Pietrzak
2024/1096 (PDF ) Post-Quantum Ready Key Agreement for Aviation Marcel Tiepelt, Christian Martin, Nils Maeurer
2024/1095 (PDF ) Lower Bound on Number of Compression Calls of a Collision-Resistance Preserving Hash Debasmita Chakraborty, Mridul Nandi
2024/1094 (PDF ) Notes on Multiplying Cyclotomic Polynomials on a GPU Joseph Johnston
2024/1093 (PDF ) ROTL: Faster Lookup Table Evaluation Xiaoyang Hou, Jian Liu, Jingyu Li, Jiawen Zhang, Kui Ren, Chun Chen
2024/1092 (PDF ) Fusion Channel Attack with POI Learning Encoder Xinyao Li, Xiwen Ren, Ling Ning, Changhai Ou
2024/1091 (PDF ) MatcHEd: Privacy-Preserving Set Similarity based on MinHash Rostin Shokri, Charles Gouert, Nektarios Georgios Tsoutsos
2024/1090 (PDF ) PolyFHEmus: Rethinking Multiplication in Fully Homomorphic Encryption Charles Gouert, Nektarios Georgios Tsoutsos
2024/1089 (PDF ) Juliet: A Configurable Processor for Computing on Encrypted Data Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
2024/1088 (PDF ) HElix: Genome Similarity Detection in the Encrypted Domain Rostin Shokri, Charles Gouert, Nektarios Georgios Tsoutsos
2024/1087 (PDF ) Tyche: Probabilistic Selection over Encrypted Data for Generative Language Models Lars Folkerts, Nektarios Georgios Tsoutsos
2024/1086 (PDF ) Obfuscated Key Exchange Felix Günther, Douglas Stebila, Shannon Veitch
2024/1085 (PDF ) Randomized Distributed Function Computation with Semantic Communications: Applications to Privacy Onur Gunlu
2024/1084 (PDF ) Enabling Complete Atomicity for Cross-chain Applications Through Layered State Commitments Yuandi Cai, Ru Cheng, Yifan Zhou, Shijie Zhang, Jiang Xiao, Hai Jin
2024/1083 (PDF ) LEA Block Cipher in Rust Language: Trade-off between Memory Safety and Performance Sangwon Kim, Siwoo Eum, Minho Song, Hwajeong Seo
2024/1082 (PDF ) Quantum Implementation of LSH Yujin Oh, Kyungbae Jang, Hwajeong Seo
2024/1081 (PDF ) Practical Non-interactive Multi-signatures, and a Multi-to-Aggregate Signatures Compiler Matthieu Rambaud, Christophe Levrat
2024/1080 (PDF ) Separating Selective Opening Security From Standard Security, Assuming IO Justin Holmgren, Brent Waters
2024/1079 (PDF ) QuietOT: Lightweight Oblivious Transfer with a Public-Key Setup Geoffroy Couteau, Lalita Devadas, Srinivas Devadas, Alexander Koch, Sacha Servan-Schreiber
2024/1078 (PDF ) GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song
2024/1077 (PDF ) Securely Training Decision Trees Efficiently Divyanshu Bhardwaj, Sandhya Saravanan, Nishanth Chandran, Divya Gupta
2024/1076 (PDF ) A More Compact AES, and More Dag Arne Osvik, David Canright
2024/1075 (PDF ) TaSSLE: Lasso for the commitment-phobic Tesseract Dore
2024/1074 (PDF ) Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini
2024/1073 (PDF ) Message Latency in Waku Relay with Rate Limiting Nullifiers Alvaro Revuelta, Sergei Tikhomirov, Aaryamann Challani, Hanno Cornelius, Simon Pierre Vivier
2024/1072 (PDF ) A Study of Partial Non-Linear Layers with DEFAULT and BAKSHEESH Anubhab Baksi
2024/1071 (PDF ) On the efficient representation of isogenies (a survey) Damien Robert
2024/1070 (PDF ) Protecting Cryptographic Code Against Spectre-RSB Santiago Arranz Olmos, Gilles Barthe, Chitchanok Chuengsatiansup, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Peter Schwabe, Yuval Yarom, Zhiyuan Zhang
2024/1069 (PDF ) Strong Existential Unforgeability and BUFF Securities of MPC-in-the-Head Signatures Mukul Kulkarni, Keita Xagawa
2024/1068 (PDF ) From Interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote Attestation Shahriar Ebrahimi, Parisa Hassanizadeh
2024/1067 (PDF ) Efficient Lattice-Based Threshold Signatures with Functional Interchangeability Guofeng Tang, Bo Pang, Long Chen, Zhenfeng Zhang
2024/1066 (PDF ) VerITAS: Verifying Image Transformations at Scale Trisha Datta, Binyi Chen, Dan Boneh
2024/1065 (PDF ) AITIA: Efficient Secure Computation of Bivariate Causal Discovery Truong Son Nguyen, Lun Wang, Evgenios M. Kornaropoulos, Ni Trieu
2024/1064 (PDF ) ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption Zhou Zhang, Song Bian, Zian Zhao, Ran Mao, Haoyi Zhou, Jiafeng Hua, Yier Jin, Zhenyu Guan
2024/1063 (PDF ) VIMz: Private Proofs of Image Manipulation using Folding-based zkSNARKs Stefan Dziembowski, Shahriar Ebrahimi, Parisa Hassanizadeh
2024/1062 (PDF ) Compact Key Function Secret Sharing with Non-linear Decoder Chandan Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay
2024/1061 (PDF ) Insta-Pok3r: Real-time Poker on Blockchain Sanjam Garg, Aniket Kate, Pratyay Mukherjee, Rohit Sinha, Sriram Sridhar
2024/1060 (PDF ) Quirky Interactive Reductions of Knowledge Joseph Johnston
2024/1059 (PDF ) HEProfiler: An In-Depth Profiler of Approximate Homomorphic Encryption Libraries Jonathan Takeshita, Nirajan Koirala, Colin McKechney, Taeho Jung
2024/1058 (PDF ) Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them Matteo Campanelli, Dario Fiore, Rosario Gennaro
2024/1057 (PDF ) Password-authenticated Key Exchange and Applications Kristian Gjøsteen
2024/1056 (PDF ) Shuffle Arguments Based on Subset-Checking Behzad Abdolmaleki, Prastudy Fauzi, Toomas Krips, Janno Siim
2024/1055 (PDF ) Enhancing Local Verification: Aggregate and Multi-Signature Schemes Ahmet Ramazan Ağırtaş, Neslihan Yaman Gökce, Oğuz Yayla
2024/1054 (PDF ) Optimized Computation of the Jacobi Symbol Jonas Lindstrøm, Kostas Kryptos Chalkias
2024/1053 (PDF ) Stochastic Secret Sharing with $1$-Bit Shares and Applications to MPC Benny Applebaum, Eliran Kachlon
2024/1052 (PDF ) A New Fine Tuning Method for FHEW/TFHE Bootstrapping with IND-CPAD Security Deokhwa Hong, Young-Sik Kim, Yongwoo Lee, Eunyoung Seo
2024/1051 (PDF ) Adaptor Signatures: New Security Definition and A Generic Construction for NP Relations Xiangyu Liu, Ioannis Tzannetos, Vassilis Zikas
2024/1050 (PDF ) On Sequential Functions and Fine-Grained Cryptography Jiaxin Guan, Hart Montgomery
2024/1049 (PDF ) KyberSlash: Exploiting secret-dependent division timings in Kyber implementations Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales Paiva, Prasanna Ravi, Goutam Tamvada
2024/1048 (PDF ) Distributional Secure Merge Gayathri Garimella, Srinivasan Raghuramam, Peter Rindal
2024/1047 (PDF ) Improved Multi-Party Fixed-Point Multiplication Saikrishna Badrinarayanan, Eysa Lee, Peihan Miao, Peter Rindal
2024/1046 (PDF ) The Sum-Check Protocol over Fields of Small Characteristic Suyash Bagad, Yuval Domb, Justin Thaler
2024/1045 (PDF ) Efficient Secret Sharing for Large-Scale Applications Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo
2024/1044 (PDF ) Searching for differential addition chains Daniel J. Bernstein, Jolijn Cottaar, Tanja Lange
2024/1043 (PDF ) Cryptography in the Common Haar State Model: Feasibility Results and Separations Prabhanjan Ananth, Aditya Gulati, Yao-Ting Lin
2024/1042 (PDF ) Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model Tariq Bontekoe, Hassan Jameel Asghar, Fatih Turkmen
2024/1041 (PDF ) Embedding Integer Lattices as Ideals into Polynomial Rings Yihang Cheng, Yansong Feng, Yanbin Pan
2024/1040 (PDF ) PeaceFounder: centralised E2E verifiable evoting via pseudonym braiding and history trees Janis Erdmanis
2024/1039 (PDF ) Reduction from Average-Case M-ISIS to Worst-Case CVP Over Perfect Lattices Samuel Lavery
2024/1038 (PDF ) Constraint-Packing and the Sum-Check Protocol over Binary Tower Fields Quang Dao, Justin Thaler
2024/1037 (PDF ) A note on adding zero-knowledge to STARKs Ulrich Haböck, Al Kindi
2024/1036 (PDF ) A note on the G-FFT Ulrich Haböck
2024/1035 (PDF ) Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks Sirui Shen, Chenglu Jin
2024/1034 (PDF ) A Practical Protocol for Quantum Oblivious Transfer from One-Way Functions Eleni Diamanti, Alex B. Grilo, Adriano Innocenzi, Pascal Lefebvre, Verena Yacoub, Álvaro Yángüez
2024/1033 (PDF ) Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with Rewinding Shuichi Katsumata, Michael Reichle, Kaoru Takemure
2024/1032 (PDF ) Threshold OPRF from Threshold Additive HE Animesh Singh, Sikhar Patranabis, Debdeep Mukhopadhyay
2024/1031 (PDF ) SACfe: Secure Access Control in Functional Encryption with Unbounded Data Uddipana Dowerah, Subhranil Dutta, Frank Hartmann, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal
2024/1030 (PDF ) GRASP: Accelerating Hash-based PQC Performance on GPU Parallel Architecture Yijing Ning, Jiankuo Dong, Jingqiang Lin, Fangyu Zheng, Yu Fu, Zhenjiang Dong, Fu Xiao
2024/1029 (PDF ) Oblivious Single Access Machines: A New Model for Oblivious Computation Ananya Appan, David Heath, Ling Ren
2024/1028 (PDF ) FASIL: A challenge-based framework for secure and privacy-preserving federated learning Ferhat Karakoç, Betül Güvenç Paltun, Leyli Karaçay, Ömer Tuna, Ramin Fuladi, Utku Gülen
2024/1027 (PDF ) Structured-Seed Local Pseudorandom Generators and their Applications Benny Applebaum, Dung Bui, Geoffroy Couteau, Nikolas Melissaris
2024/1026 (PDF ) MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing without Pre-Processing Martin Zbudila, Erik Pohle, Aysajan Abidin, Bart Preneel
2024/1025 (PDF ) Polynomial sharings on two secrets: Buy one, get one free Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Maximilian Orlt
2024/1024 (PDF ) Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity Behzad Abdolmaleki, Antonis Michalas, Reyhaneh Rabaninejad, Sebastian Ramacher, Daniel Slamanig
2024/1023 (PDF ) Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices Feixiang Zhao, Huaxiong Wang, Jian Weng
2024/1022 (PDF ) Competitive Policies for Online Collateral Maintenance Ghada Almashaqbeh, Sixia Chen, Alexander Russell
2024/1021 (PDF ) ammBoost: State Growth Control for AMMs Nicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh
2024/1020 (PDF ) chainBoost: A Secure Performance Booster for Blockchain-based Resource Markets Zahra Motaqy, Mohamed E. Najd, Ghada Almashaqbeh
2024/1019 (PDF ) Exploiting Clock-Slew Dependent Variability in CMOS Digital Circuits Towards Power and EM SCA Resilience Archisman Ghosh, Md. Abdur Rahman, Debayan Das, Santosh Ghosh, Shreyas Sen
2024/1018 (PDF ) Sparsity-Aware Protocol for ZK-friendly ML Models: Shedding Lights on Practical ZKML Alan Li, Qingkai Liang, Mo Dong
2024/1017 (PDF ) Accelerating pairings on BW10 and BW14 Curves Senegue Gomez Nyamsi, Laurian Guimagang Azebaze, Emmanuel Fouotsa
2024/1016 (PDF ) A Succinct Range Proof for Polynomial-based Vector Commitment Rui Gao, Zhiguo Wan, Yuncong Hu, Huaqun Wang
2024/1015 (PDF ) Expediting Homomorphic Computation via Multiplicative Complexity-aware Multiplicative Depth Minimization Mingfei Yu, Giovanni De Micheli
2024/1014 (PDF ) Grafting: Decoupled Scale Factors and Modulus in RNS-CKKS Jung Hee Cheon, Hyeongmin Choe, Minsik Kang, Jaehyung Kim, Seonghak Kim, Johannes Mono, Taeyeong Noh
2024/1013 (PDF ) Tempora-Fusion: Time-Lock Puzzle with Efficient Verifiable Homomorphic Linear Combination Aydin Abadi
2024/1012 (PDF ) Supersonic OT: Fast Unconditionally Secure Oblivious Transfer Aydin Abadi, Yvo Desmedt
2024/1011 (PDF ) Secure Vickrey Auctions with Rational Parties Chaya Ganesh, Shreyas Gupta, Bhavana Kanukurthi, Girisha Shankar
2024/1010 (PDF ) FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu Ming Yiu, Xuan Wang
2024/1009 (PDF ) Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences Maciej Obremski, João Ribeiro, Lawrence Roy, François-Xavier Standaert, Daniele Venturi
2024/1008 (PDF ) Impossible Boomerang Distinguishers Revisited Xichao Hu, Lin Jiao, Dengguo Feng, Yonglin Hao, Xinxin Gong, Yongqiang Li, Siwei Sun
2024/1007 (PDF ) On the vector subspaces of $\mathbb{F}_{2^n}$ over which the multiplicative inverse function sums to zero Claude Carlet
2024/1006 (PDF ) Delegated-Query Oblivious Transfer and its Practical Applications Yvo Desmedt, Aydin Abadi
2024/1005 (PDF ) Differential Fault Attack on HE-Friendly Stream Ciphers: Masta, Pasta and Elisabeth Weizhe Wang, Deng Tang
2024/1004 (PDF ) Relaxed Vector Commitment for Shorter Signatures Seongkwang Kim, Byeonghak Lee, Mincheol Son
2024/1003 (PDF ) zkVoting : Zero-knowledge proof based coercion-resistant and E2E verifiable e-voting system Seongho Park, Jaekyoung Choi, Jihye Kim, Hyunok Oh
2024/1002 (PDF ) Elementary Formulas for Greatest Common Divisors and Semiprime Factors Joseph M. Shunia
2024/1001 (PDF ) Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption Elena Kirshanova, Chiara Marcolla, Sergi Rovira
2024/1000 (PDF ) File-Injection Attacks on Searchable Encryption, Based on Binomial Structures Tjard Langhout, Huanhuan Chen, Kaitai Liang
2024/999 (PDF ) ProxCode: Efficient Biometric Proximity Searchable Encryption from Error Correcting Codes Maryam Rezapour, Benjamin Fuller
2024/998 (PDF ) Measuring Conditional Anonymity - A Global Study Pascal Berrang, Paul Gerhart, Dominique Schröder
2024/997 (PDF ) Dishonest Majority Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted Verifiers Daniel Escudero, Antigoni Polychroniadou, Yifan Song, Chenkai Weng
2024/996 (PDF ) Great-LaKeys: An Improved Threshold-PRF and a Novel Exponent-VRF from LWR Matthias Geihs
2024/995 (PDF ) Cross-chain bridges via backwards-compatible SNARKs Sergio Juárez, Mark Blunden, Joris Koopman, Anish Mohammed, Kapil Shenvi Pause, Steve Thakur
2024/994 (PDF ) On Knowledge-Soundness of Plonk in ROM from Falsifiable Assumptions Helger Lipmaa, Roberto Parisella, Janno Siim
2024/993 (PDF ) Limits on the Power of Prime-Order Groups: Separating Q-Type from Static Assumptions George Lu, Mark Zhandry
2024/992 (PDF ) An analysis of the Crossbred Algorithm for the MQ Problem Damien Vidal, Sorina Ionica, Claire Delaplace
2024/991 (PDF ) Leveled Homomorphic Encryption Schemes for Homomorphic Encryption Standard Shuhong Gao, Kyle Yates
2024/990 (PDF ) Perfectly-secure Network-agnostic MPC with Optimal Resiliency Shravani Patil, Arpita Patra
2024/989 (PDF ) A Formal Treatment of End-to-End Encrypted Cloud Storage Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller, Kenneth G. Paterson
2024/988 (PDF ) Privacy-Preserving Dijkstra Benjamin Ostrovsky
2024/987 (PDF ) CoGNN: Towards Secure and Efficient Collaborative Graph Learning Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu
2024/986 (PDF ) FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis
2024/985 (PDF ) DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj
2024/984 (PDF ) Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation (Extended Version) Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomáš Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdeněk Martinásek, Shivam Bhasin
2024/983 (PDF ) SoCureLLM: An LLM-driven Approach for Large-Scale System-on-Chip Security Verification and Policy Generation Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi
2024/982 (PDF ) SoK: Programmable Privacy in Distributed Systems Daniel Benarroch, Bryan Gillespie, Ying Tong Lai, Andrew Miller
2024/981 (PDF ) Hadamard Product Arguments and Their Applications Kyeongtae Lee, Donghwan Oh, Hankyung Ko, Jihye Kim, Hyunok Oh
2024/980 (PDF ) FaultyGarble: Fault Attack on Secure Multiparty Neural Network Inference Mohammad Hashemi, Dev Mehta, Kyle Mitard, Shahin Tajik, Fatemeh Ganji
2024/979 (PDF ) Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs Alex Ozdemir, Evan Laufer, Dan Boneh
2024/978 (PDF ) Distributed PIR: Scaling Private Messaging via the Users' Machines Elkana Tovey, Jonathan Weiss, Yossi Gilad
2024/977 (PDF ) Improved Boomerang Attacks on 6-Round AES Augustin Bariant, Orr Dunkelman, Nathan Keller, Gaëtan Leurent, Victor Mollimard
2024/976 (PDF ) PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds Yuval Ishai, Elaine Shi, Daniel Wichs
2024/975 (PDF ) ZLR: a fast online authenticated encryption scheme achieving full security Wonseok Choi, Seongha Hwang, Byeonghak Lee, Jooyoung Lee
2024/974 (PDF ) Towards Optimal Parallel Broadcast under a Dishonest Majority Daniel Collins, Sisi Duan, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos, Haochen Wang
2024/973 (PDF ) ICICLE v2: Polynomial API for Coding ZK Provers to Run on Specialized Hardware Karthik Inbasekar, Yuval Shekel, Michael Asa
2024/972 (PDF ) Efficient Secure Communication Over Dynamic Incomplete Networks With Minimal Connectivity Ivan Damgård, Divya Ravi, Lawrence Roy, Daniel Tschudi, Sophia Yakoubov
2024/971 (PDF ) A Note on (2, 2)-isogenies via Theta Coordinates Jianming Lin, Saiyu Wang, Chang-An Zhao
2024/970 (PDF ) Cryptography at the Crossroads: Ethical Responsibility, the Cypherpunk Movement and Institutions Eric Blair
2024/969 (PDF ) Probabilistic Attacks and Enhanced Security for "Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF" Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai
2024/968 (PDF ) Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility Jia Liu, Mark Manulis
2024/967 (PDF ) Consolidated Linear Masking (CLM): Generalized Randomized Isomorphic Representations, Powerful Degrees of Freedom and Low(er)-cost Itamar Levi, Osnat Keren
2024/966 (PDF ) Diffuse Some Noise: Diffusion Models for Measurement Noise Removal in Side-channel Analysis Sengim Karayalcin, Guilherme Perin, Stjepan Picek
2024/965 (PDF ) Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things Shiyuan Xu, Xue Chen, Yu Guo, Siu-Ming Yiu, Shang Gao, Bin Xiao
2024/964 (PDF ) Malicious Security for PIR (almost) for Free Brett Falk, Pratyush Mishra, Matan Shtepel
2024/963 (PDF ) Shared OT and Its Applications Lucas Piske, Jeroen van de Graaf, Anderson C. A. Nascimento, Ni Trieu
2024/962 (PDF ) Secure Account Recovery for a Privacy-Preserving Web Service Ryan Little, Lucy Qin, Mayank Varia
2024/961 (PDF ) Efficient Execution Auditing for Blockchains under Byzantine Assumptions Jeff Burdges, Alfonso Cevallos, Handan Kılınç Alper, Chen-Da Liu-Zhang, Fatemeh Shirazi, Alistair Stewart, Rob Habermeier, Robert Klotzner, Andronik Ordian
2024/960 (PDF ) Designs for practical SHE schemes based on Ring-LWR Madalina Bolboceanu, Anamaria Costache, Erin Hales, Rachel Player, Miruna Rosca, Radu Titiu
2024/959 (PDF ) Flood and Submerse: Distributed Key Generation and Robust Threshold Signature from Lattices Thomas Espitau, Guilhem Niot, Thomas Prest
2024/958 (PDF ) Signer Revocability for Threshold Ring Signatures Da Teng, Yanqing Yao
2024/957 (PDF ) VRaaS: Verifiable Randomness as a Service on Blockchains Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar, Sri AravindaKrishnan Thyagarajan
2024/956 (PDF ) SNARGs under LWE via Propositional Proofs Zhengzhong Jin, Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan
2024/955 (PDF ) ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections Josh Benaloh, Michael Naehrig, Olivier Pereira, Dan S. Wallach
2024/954 (PDF ) Arithmetisation of computation via polynomial semantics for first-order logic Murdoch J. Gabbay
2024/953 (PDF ) MixBuy: Contingent Payment in the Presence of Coin Mixers Diego Castejon-Molina, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez
2024/952 (PDF ) Communication Complexity vs Randomness Complexity in Interactive Proofs Benny Applebaum, Kaartik Bhushan, Manoj Prabhakaran
2024/951 (PDF ) Notes on (failed) attempts to instantiate TLR3 Alexander Maximov
2024/950 (PDF ) DISCO: Dynamic Searchable Encryption with Constant State Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang
2024/949 (PDF ) Efficient 2PC for Constant Round Secure Equality Testing and Comparison Tianpei Lu, Xin Kang, Bingsheng Zhang, Zhuo Ma, Xiaoyuan Zhang, Yang Liu, Kui Ren, Chun Chen
2024/948 (PDF ) Return of the Kummer: a Toolbox for Genus-2 Cryptography Maria Corte-Real Santos, Krijn Reijnders
2024/947 (PDF ) A Modular Approach to Registered ABE for Unbounded Predicates Nuttapong Attrapadung, Junichi Tomida
2024/946 (PDF ) Provably Secure Butterfly Key Expansion from the CRYSTALS Post-Quantum Schemes Edward Eaton, Philippe Lamontagne, Peter Matsakis
2024/945 (PDF ) Quantum-Safe Public Key Blinding from MPC-in-the-Head Signature Schemes Sathvika Balumuri, Edward Eaton, Philippe Lamontagne
2024/944 (PDF ) Quantum CCA-Secure PKE, Revisited Navid Alamati, Varun Maram
2024/943 (PDF ) Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKs Chaya Ganesh, Vineet Nair, Ashish Sharma
2024/942 (PDF ) Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Client Stragglers Riccardo Taiello, Melek Önen, Clémentine Gritti, Marco Lorenzi
2024/941 (PDF ) SmartZKCP: Towards Practical Data Exchange Marketplace Against Active Attacks Xuanming Liu, Jiawen Zhang, Yinghao Wang, Xinpeng Yang, Xiaohu Yang
2024/940 (PDF ) Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation Xuanming Liu, Zhelei Zhou, Yinghao Wang, Yanxin Pang, Jinye He, Bingsheng Zhang, Xiaohu Yang, Jiaheng Zhang
2024/939 (PDF ) Two RSA-based Cryptosystems A. Telveenus
2024/938 (PDF ) Certifying Private Probabilistic Mechanisms Zoë Ruha Bell, Shafi Goldwasser, Michael P. Kim, Jean-Luc Watson
2024/937 (PDF ) Distributed Point Function with Constraints, Revisited Keyu Ji, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2024/936 (PDF ) Willow: Secure Aggregation with One-Shot Clients James Bell-Clark, Adrià Gascón, Baiyu Li, Mariana Raykova, Phillipp Schoppmann
2024/935 (PDF ) MFKDF: Multiple Factors Knocked Down Flat Matteo Scarlata, Matilda Backendal, Miro Haller
2024/934 (PDF ) An Explicit High-Moment Forking Lemma and its Applications to the Concrete Security of Multi-Signatures Gil Segev, Liat Shapira
2024/933 (PDF ) A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for NP Brent Waters, David J. Wu
2024/932 (PDF ) CISELeaks: Information Leakage Assessment of Cryptographic Instruction Set Extension Prototypes Aruna Jayasena, Richard Bachmann, Prabhat Mishra
2024/931 (PDF ) Multi-Hop Multi-Key Homomorphic Signatures with Context Hiding from Standard Assumptions Abtin Afshar, Jiaqi Cheng, Rishab Goyal
2024/930 (PDF ) Information-Theoretic Single-Server PIR in the Shuffle Model Yuval Ishai, Mahimna Kelkar, Daniel Lee, Yiping Ma
2024/929 (PDF ) Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis Itai Dinur
2024/928 (PDF ) The Committing Security of MACs with Applications to Generic Composition Ritam Bhaumik, Bishwajit Chakraborty, Wonseok Choi, Avijit Dutta, Jérôme Govinden, Yaobin Shen
2024/926 (PDF ) Verifiable and Private Vote-by-Mail Henri Devillez, Olivier Pereira, Thomas Peters
2024/925 (PDF ) Time Sharing - A Novel Approach to Low-Latency Masking Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
2024/924 (PDF ) Climbing and descending tall isogeny volcanos Steven Galbraith
2024/923 (PDF ) On Orchestrating Parallel Broadcasts for Distributed Ledgers Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, Maofan Yin
2024/922 (PDF ) Scalable Private Set Union, with Stronger Security Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu
2024/921 (PDF ) Simple Logarithmic-size LSAG signature Edsger Hughes
2024/920 (PDF ) Leveraging Small Message Spaces for CCA1 Security in Additively Homomorphic and BGN-type Encryption Benoit Libert
2024/919 (PDF ) Multi-Input Functional Encryption for Unbounded Inner Products Bishnu Charan Behera, Somindu C. Ramanna
2024/918 (PDF ) Cryptographic Analysis of Delta Chat Yuanming Song, Lenka Mareková, Kenneth G. Paterson
2024/917 (PDF ) Unbounded Non-Zero Inner Product Encryption Bishnu Charan Behera, Somindu C. Ramanna
2024/916 (PDF ) Polymath: Groth16 Is Not The Limit Helger Lipmaa
2024/915 (PDF ) REACTIVE: Rethinking Effective Approaches Concerning Trustees in Verifiable Elections Josh Benaloh, Michael Naehrig, Olivier Pereira
2024/914 (PDF ) Compact Key Storage: A Modern Approach to Key Backup and Delegation Yevgeniy Dodis, Daniel Jost, Antonio Marcedone
2024/913 (PDF ) SoK: Model Reverse Engineering Threats for Neural Network Hardware Seetal Potluri, Farinaz Koushanfar
2024/912 (PDF ) Quantum Evolving Secret Sharing for General Access Structures Efrat Cohen, Anat Paskin-Cherniavsky
2024/911 (PDF ) Generalized Indifferentiable Sponge and its Application to Polygon Miden VM Tomer Ashur, Amit Singh Bhati
2024/910 (PDF ) A Tight Security Proof for $\mathrm{SPHINCS^{+}}$, Formally Verified Manuel Barbosa, François Dupressoir, Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub
2024/909 (PDF ) Approximate CRT-Based Gadget Decomposition and Application to TFHE Blind Rotation Olivier Bernard, Marc Joye
2024/908 (PDF ) Preliminary Analysis of Ascon-Xof and Ascon-Hash Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
2024/907 (PDF ) Reducing the Number of Qubits in Quantum Information Set Decoding Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher
2024/906 (PDF ) Are Your Keys Protected? Time will Tell Yoav Ben-Dov, Liron David, Moni Naor, Elad Tzalik
2024/905 (PDF ) On the Semidirect Discrete Logarithm Problem in Finite Groups Christopher Battarbee, Giacomo Borin, Julian Brough, Ryann Cartor, Tobias Hemmert, Nadia Heninger, David Jao, Delaram Kahrobaei, Laura Maddison, Edoardo Persichetti, Angela Robinson, Daniel Smith-Tone, Rainer Steinwandt
2024/904 (PDF ) On round elimination for special-sound multi-round identification and the generality of the hypercube for MPCitH Andreas Hülsing, David Joseph, Christian Majenz, Anand Kumar Narayanan
2024/903 (PDF ) Nopenena Untraceable Payments: Defeating Graph Analysis with Small Decoy Sets Jayamine Alupotha, Mathieu Gestin, Christian Cachin
2024/902 (PDF ) Access Structure Hiding Verifiable Tensor Designs Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar
2024/901 (PDF ) Practical Committing Attacks against Rocca-S Ryunosuke Takeuchi, Yosuke Todo, Tetsu Iwata
2024/900 (PDF ) Breaktooth: Breaking Security and Privacy in Bluetooth Power-Saving Mode Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii
2024/899 (PDF ) Monotone-Policy Aggregate Signatures Maya Farber Brodsky, Arka Rai Choudhuri, Abhishek Jain, Omer Paneth
2024/898 (PDF ) Edit Distance Robust Watermarks for Language Models Noah Golowich, Ankur Moitra
2024/897 (PDF ) Laconic Function Evaluation and ABE for RAMs from (Ring-)LWE Fangqi Dong, Zihan Hao, Ethan Mook, Hoeteck Wee, Daniel Wichs
2024/896 (PDF ) Dynamic-FROST: Schnorr Threshold Signatures with a Flexible Committee Annalisa Cimatti, Francesco De Sclavis, Giuseppe Galano, Sara Giammusso, Michela Iezzi, Antonio Muci, Matteo Nardelli, Marco Pedicini
2024/895 (PDF ) Fully-Succinct Multi-Key Homomorphic Signatures from Standard Assumptions Gaspard Anthoine, David Balbás, Dario Fiore
2024/894 (PDF ) Quantum Algorithms for Fast Correlation Attacks on LFSR-Based Stream Ciphers Akinori Hosoyamada
2024/893 (PDF ) How to Construct Quantum FHE, Generically Aparna Gupte, Vinod Vaikuntanathan
2024/892 (PDF ) Flock: A Framework for Deploying On-Demand Distributed Trust Darya Kaviani, Sijun Tan, Pravein Govindan Kannan, Raluca Ada Popa
2024/891 (PDF ) Glitch-Stopping Circuits: Hardware Secure Masking without Registers Zhenda Zhang, Svetla Nikova, Ventzislav Nikov
2024/890 (PDF ) Ring Signatures for Deniable AKEM: Gandalf's Fellowship Phillip Gajland, Jonas Janneck, Eike Kiltz
2024/889 (PDF ) Analyzing and Benchmarking ZK-Rollups Stefanos Chaliasos, Itamar Reif, Adrià Torralba-Agell, Jens Ernstberger, Assimakis Kattis, Benjamin Livshits
2024/888 (PDF ) zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving Auditing Yihao Guo, Minghui Xu, Xiuzhen Cheng, Dongxiao Yu, Wangjie Qiu, Gang Qu, Weibing Wang, Mingming Song
2024/887 (PDF ) Secret Key Recovery in a Global-Scale End-to-End Encryption System Graeme Connell, Vivian Fang, Rolfe Schmidt, Emma Dauterman, Raluca Ada Popa
2024/886 (PDF ) A New Security Evaluation Method Based on Resultant for Arithmetic-Oriented Algorithms Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang, Quan-feng Liu, Deng Tang
2024/885 (PDF ) Bruisable Onions: Anonymous Communication in the Asynchronous Model Megumi Ando, Anna Lysyanskaya, Eli Upfal
2024/884 (PDF ) Security of Fixed-Weight Repetitions of Special-Sound Multi-Round Interactive Proofs Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, Giovanni Tognolini
2024/883 (PDF ) Low-Latency Linear Transformations with Small Key Transmission for Private Neural Network on Homomorphic Encryption Byeong-Seo Min, Joon-Woo Lee
2024/882 (PDF ) Lattice-based Fault Attacks against ECMQV Weiqiong Cao, Hua Chen, Jingyi Feng, Linmin Fan, Wenling Wu
2024/881 (PDF ) PipeSwap: Forcing the Timely Release of a Secret for Atomic Cross-Chain Swaps Peifang Ni, Anqi Tian, Jing Xu
2024/880 (PDF ) Extending class group action attacks via sesquilinear pairings Joseph Macula, Katherine E. Stange
2024/879 (PDF ) Consistency-or-Die: Consistency for Key Transparency Joakim Brorsson, Elena Pagnin, Bernardo David, Paul Stankovski Wagner
2024/878 (PDF ) Radical Vélu Isogeny Formulae Thomas Decru
2024/877 (PDF ) Multiple Sampling Fast Correlation Attack on Small State Stream Ciphers with Limited Round Key Period Zhongzhi Zhou, Vahid Amin-Ghafari, Hui Liu
2024/876 (PDF ) Distributing Keys and Random Secrets with Constant Complexity Benny Applebaum, Benny Pinkas
2024/875 (PDF ) Succinctly-Committing Authenticated Encryption Mihir Bellare, Viet Tung Hoang
2024/874 (PDF ) Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication Marc Fischlin, Olga Sanina
2024/873 (PDF ) Cryptanalysis of Algebraic Verifiable Delay Functions Alex Biryukov, Ben Fisch, Gottfried Herold, Dmitry Khovratovich, Gaëtan Leurent, María Naya-Plasencia, Benjamin Wesolowski
2024/872 (PDF ) Epistle: Elastic Succinct Arguments for Plonk Constraint System Shuangjun Zhang, Dongliang Cai, Yuan Li, Haibin Kan, Liang Zhang
2024/871 (PDF ) New Approaches for Estimating the Bias of Differential-Linear Distinguishers (Full Version) Ting Peng, Wentao Zhang, Jingsui Weng, Tianyou Ding
2024/870 (PDF ) Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model Adrià Gascón, Yuval Ishai, Mahimna Kelkar, Baiyu Li, Yiping Ma, Mariana Raykova
2024/869 (PDF ) On cycles of pairing-friendly abelian varieties Maria Corte-Real Santos, Craig Costello, Michael Naehrig
2024/868 (PDF ) Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, Sushmita Ruj
2024/867 (PDF ) Optimal Traitor Tracing from Pairings Mark Zhandry
2024/866 (PDF ) Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations Charles Gouert, Mehmet Ugurbil, Dimitris Mouris, Miguel de Vega, Nektarios Georgios Tsoutsos
2024/865 (PDF ) Result Pattern Hiding Boolean Searchable Encryption: Achieving Negligible False Positive Rates in Low Storage Overhead Dandan Yuan, Shujie Cui, Giovanni Russello
2024/864 (PDF ) Collaborative, Segregated NIZK (CoSNIZK) and More Efficient Lattice-Based Direct Anonymous Attestation Liqun Chen, Patrick Hough, Nada El Kassem
2024/863 (PDF ) Length Leakage in Oblivious Data Access Mechanisms Grace Jia, Rachit Agarwal, Anurag Khandelwal
2024/862 (PDF ) BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federated Learning Songze Li, Yanbo Dai
2024/861 (PDF ) A new multivariate primitive from CCZ equivalence Marco Calderini, Alessio Caminata, Irene Villa
2024/860 (PDF ) HAWKEYE – Recovering Symmetric Cryptography From Hardware Circuits Gregor Leander, Christof Paar, Julian Speith, Lukas Stennes
2024/859 (PDF ) Novel approximations of elementary functions in zero-knowledge proofs Kaarel August Kurik, Peeter Laud
2024/858 (PDF ) Ascon-Keccak AEAD Algorithm Stephan Müller
2024/857 (PDF ) Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations Zhongfeng Niu, Kai Hu, Siwei Sun, Zhiyu Zhang, Meiqin Wang
2024/856 (PDF ) Indistinguishability Obfuscation from Bilinear Maps and LPN Variants Seyoon Ragavan, Neekon Vafa, Vinod Vaikuntanathan
2024/855 (PDF ) Securing the Future of GenAI: Policy and Technology Mihai Christodorescu, Ryan Craven, Soheil Feizi, Neil Gong, Mia Hoffmann, Somesh Jha, Zhengyuan Jiang, Mehrdad Saberi Kamarposhti, John Mitchell, Jessica Newman, Emelia Probasco, Yanjun Qi, Khawaja Shams, Matthew Turek
2024/854 (PDF ) Simulation-Extractable KZG Polynomial Commitments and Applications to HyperPlonk Benoit Libert
2024/853 (PDF ) Accurate and Composable Noise Estimates for CKKS with Application to Exact HE Computation Jean-Philippe Bossuat, Anamaria Costache, Christian Mouchet, Lea Nürnberger, Juan Ramón Troncoso-Pastoriza
2024/852 (PDF ) A Machine Learning-Based Framework for Assessing Cryptographic Indistinguishability of Lightweight Block Ciphers Jimmy Dani, Kalyan Nakka, Nitesh Saxena
2024/851 (PDF ) On the parallelization of square-root Vélu's formulas Jorge Chávez-Saab, Odalis Ortega, Amalia Pizarro-Madariaga
2024/850 (PDF ) Constant-Round Arguments for Batch-Verification and Bounded-Space Computations from One-Way Functions Noga Amit, Guy N. Rothblum
2024/849 (PDF ) Fast, Large Scale Dimensionality Reduction Schemes Based on CKKS Haonan Yuan, Wenyuan Wu, Jingwei Chen
2024/848 (PDF ) How (Not) to Simulate PLONK Marek Sefranek
2024/847 (PDF ) More Efficient Approximate $k$-wise Independent Permutations from Random Reversible Circuits via log-Sobolev Inequalities Lucas Gretta, William He, Angelos Pelecanos
2024/846 (PDF ) Distributed Asynchronous Remote Key Generation Mark Manulis, Hugo Nartz
2024/845 (PDF ) PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries Francesca Falzon, Esha Ghosh, Kenneth G. Paterson, Roberto Tamassia
2024/844 (PDF ) Finding Dense Submodules with Algebraic Lattice Reduction Alexander Karenin, Elena Kirshanova
2024/843 (PDF ) Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt José Bacelar Almeida, Santiago Arranz Olmos, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Cameron Low, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Pierre-Yves Strub
2024/842 (PDF ) Computation Efficient Structure Aware PSI From Incremental Function Secret Sharing Gayathri Garimella, Benjamin Goff, Peihan Miao
2024/841 (PDF ) Two generalizations of almost perfect nonlinearity Claude Carlet
2024/840 (PDF ) Batching-Efficient RAM using Updatable Lookup Arguments Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh
2024/839 (PDF ) Almost optimal succinct arguments for Boolean circuit on RAM Tiancheng Xie, Tianyi Liu
2024/838 (PDF ) Verifiable Secret Sharing from Symmetric Key Cryptography with Improved Optimistic Complexity Ignacio Cascudo, Daniele Cozzo, Emanuele Giunta
2024/837 (PDF ) Fully Secure MPC and zk-FLIOP Over Rings: New Constructions, Improvements and Extensions Anders Dalskov, Daniel Escudero, Ariel Nof
2024/836 (PDF ) The Round Complexity of Proofs in the Bounded Quantum Storage Model Alex B. Grilo, Philippe Lamontagne
2024/835 (PDF ) Provable security against decryption failure attacks from LWE Christian Majenz, Fabrizio Sisinni
2024/834 (PDF ) Fine-Grained Non-Interactive Key Exchange, Revisited Balthazar Bauer, Geoffroy Couteau, Elahe Sadeghi
2024/833 (PDF ) INDIANA - Verifying (Random) Probing Security through Indistinguishability Analysis Christof Beierle, Jakob Feldtkeller, Anna Guinet, Tim Güneysu, Gregor Leander, Jan Richter-Brockmann, Pascal Sasdrich
2024/832 (PDF ) Hamming Weight Proofs of Proximity with One-Sided Error Gal Arnon, Shany Ben-David, Eylon Yogev
2024/831 (PDF ) Tight Characterizations for Preprocessing against Cryptographic Salting Fangqi Dong, Qipeng Liu, Kewen Wu
2024/830 (PDF ) How (not) to Build Quantum PKE in Minicrypt Longcheng Li, Qian Li, Xingjian Li, Qipeng Liu
2024/829 (PDF ) Multi-Server Doubly Efficient PIR in the Classical Model and Beyond Arthur Lazzaretti, Zeyu Liu, Ben Fisch, Peihan Miao, Charalampos Papamanthou
2024/828 (PDF ) Post-quantum XML and SAML Single Sign-On Johannes Müller, Jan Oupický
2024/827 (PDF ) Multivariate Multi-Polynomial Commitment and its Applications Xiao Yang, Chengru Zhang, Mark Ryan, Gao Meng
2024/826 (PDF ) Securing Lightning Channels against Rational Miners Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Subhra Mazumdar
2024/825 (PDF ) KHAN Encryption Algorithm: Leveraging Full Reptend Primes Ayaz Khan
2024/824 (PDF ) Improved Meet-LWE Attack via Ternary Trees Eunmin Lee, Joohee Lee, Yongha Son, Yuntao Wang
2024/823 (PDF ) Batched Distributed Point Function from Sparse LPN and Homomorphic Secret Sharing Lucas Piske, Jaspal Singh, Ni Trieu
2024/822 (PDF ) Early Stopping Byzantine Agreement in $(1+\epsilon) \cdot f$ Rounds Fatima Elsheimy, Julian Loss, Charalampos Papamanthou
2024/821 (PDF ) A General Framework for Lattice-Based ABE Using Evasive Inner-Product Functional Encryption Yao-Ching Hsieh, Huijia Lin, Ji Luo
2024/820 (PDF ) Rate-1 Arithmetic Garbling from Homomorphic Secret-Sharing Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl
2024/819 (PDF ) A new stand-alone MAC construct called SMAC Dachao Wang, Alexander Maximov, Patrik Ekdahl, Thomas Johansson
2024/818 (PDF ) The Brave New World of Global Generic Groups and UC-Secure Zero-Overhead SNARKs Jan Bobolz, Pooya Farshim, Markulf Kohlweiss, Akira Takahashi
2024/817 (PDF ) DVA: Dangerous Variations of ALTEQ Arnaud Sipasseuth
2024/816 (PDF ) Zero-knowledge IOPs Approaching Witness Length Noga Ron-Zewi, Mor Weiss
2024/815 (PDF ) Faster verifications and smaller signatures: Trade-offs for ALTEQ using rejections Arnaud Sipasseuth
2024/814 (PDF ) Succinct Homomorphic Secret Sharing Damiano Abram, Lawrence Roy, Peter Scholl
2024/813 (PDF ) How to Redact the Bitcoin Backbone Protocol Mehmet Sabir Kiraz, Enrique Larraia, Owen Vaughan
2024/812 (PDF ) Relations among new CCA security notions for approximate FHE Chris Brzuska, Sébastien Canard, Caroline Fontaine, Duong Hieu Phan, David Pointcheval, Marc Renard, Renaud Sirdey
2024/811 (PDF ) Traceable Secret Sharing Based on the Chinese Remainder Theorem Charlotte Hoffmann
2024/810 (PDF ) The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber Qian Guo, Erik Mårtensson, Adrian Åström
2024/809 (PDF ) Reducing Overdefined Systems of Polynomial Equations Derived from Small Scale Variants of the AES via Data Mining Methods Jana Berušková, Martin Jureček, Olha Jurečková
2024/808 (PDF ) Arma: Byzantine Fault Tolerant Consensus with Horizontal Scalability Yacov Manevich, Hagar Meir, Kaoutar Elkhiyaoui, Yoav Tock, May Buzaglo
2024/807 (PDF ) Consensus in the Presence of Overlapping Faults and Total Omission Julian Loss, Kecheng Shi, Gilad Stern
2024/806 (PDF ) Resettable Statistical Zero-Knowledge for NP Susumu Kiyoshima
2024/805 (PDF ) DiTRU: A Resurrection of NTRU over Dihedral Group Ali Raya, Vikas Kumar, Sugata Gangopadhyay
2024/804 (PDF ) Analysis on Sliced Garbling via Algebraic Approach Taechan Kim
2024/803 (PDF ) Can We Beat Three Halves Lower Bound?: (Im)Possibility of Reducing Communication Cost for Garbled Circuits Chunghun Baek, Taechan Kim
2024/802 (PDF ) On Maximum Size Simultaneous Linear Approximations in Ascon and Keccak and Related Translation and Differential Properties Nicolas T. Courtois, Frédéric Amiel, Alexandre Bonnard de Fonvillars
2024/801 (PDF ) Algebraic Structure of the Iterates of $\chi$ Björn Kriepke, Gohar Kyureghyan
2024/800 (PDF ) A Note on Zero-Knowledge for NP and One-Way Functions Yanyi Liu, Noam Mazor, Rafael Pass
2024/799 (PDF ) Symmetric Signcryption and E2EE Group Messaging in Keybase Joseph Jaeger, Akshaya Kumar, Igors Stepanovs
2024/798 (PDF ) Incompressible Functional Encryption Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree, Aman Verma
2024/797 (PDF ) Nonadaptive One-Way to Hiding Implies Adaptive Quantum Reprogramming Joseph Jaeger
2024/796 (PDF ) Weak Consistency mode in Key Transparency: OPTIKS Esha Ghosh, Melissa Chase
2024/795 (PDF ) New Limits of Provable Security and Applications to ElGamal Encryption Sven Schäge
2024/794 (PDF ) Detecting Rogue Decryption in (Threshold) Encryption via Self-Incriminating Proofs James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen, Arup Mondal, Esra Yeniaras
2024/793 (PDF ) Hide-and-Seek and the Non-Resignability of the BUFF Transform Jelle Don, Serge Fehr, Yu-Hsuan Huang, Jyun-Jie Liao, Patrick Struck
2024/792 (PDF ) Stickel's Key Agreement Algebraic Variation Daniel Nager
2024/791 (PDF ) Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, Qingju Wang
2024/790 (PDF ) Physical Ring Signature Xavier Bultel
2024/789 (PDF ) Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF Yaxi Yang, Xiaojian Liang, Xiangfu Song, Ye Dong, Linting Huang, Hongyu Ren, Changyu Dong, Jianying Zhou
2024/788 (PDF ) A Fault-Resistant NTT by Polynomial Evaluation and Interpolation Sven Bauer, Fabrizio De Santis, Kristjane Koleci, Anita Aghaie
2024/787 (PDF ) A new attack against search-LWE using Diophantine approximations Robin Frot, Daniel Zentai
2024/786 (PDF ) Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit Fukang Liu, Mohammad Mahzoun, Willi Meier
2024/784 (PDF ) Universal Blockchain Assets Owen Vaughan
2024/783 (PDF ) Differential Cryptanalysis on Quantum Computers Kyungbae Jang, Yujin Oh, Hwajeong Seo
2024/782 (PDF ) Relating Code Equivalence to Other Isomorphism Problems Huck Bennett, Kaung Myat Htay Win
2024/781 (PDF ) Doubly-Efficient Batch Verification in Statistical Zero-Knowledge Or Keret, Ron D. Rothblum, Prashant Nalini Vasudevan
2024/780 (PDF ) Information-theoretic Multi-server Private Information Retrieval with Client Preprocessing Jaspal Singh, Yu Wei, Vassilis Zikas
2024/779 (PDF ) Elliptic Curve Cryptography for the masses: Simple and fast finite field arithmetic Michael Scott
2024/778 (PDF ) Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign Hiroshi Onuki, Kohei Nakagawa
2024/777 (PDF ) Measure-Rewind-Extract: Tighter Proofs of One-Way to Hiding and CCA Security in the Quantum Random Oracle Model Jiangxia Ge, Heming Liao, Rui Xue
2024/776 (PDF ) Instance-Hiding Interactive Proofs Changrui Mu, Prashant Nalini Vasudevan
2024/775 (PDF ) Spec-o-Scope: Cache Probing at Cache Speed Gal Horowitz, Eyal Ronen, Yuval Yarom
2024/774 (PDF ) Byzantine Reliable Broadcast with One Trusted Monotonic Counter Yackolley Amoussou-Guenou, Lionel Beltrando, Maurice Herlihy, Maria Potop-Butucaru
2024/773 (PDF ) SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies Max Duparc, Tako Boris Fouotsa
2024/772 (PDF ) Reducing the Share Size of Weighted Threshold Secret Sharing Schemes via Chow Parameters Approximation Oriol Farràs, Miquel Guiot
2024/771 (PDF ) SQIsign2D-East: A New Signature Scheme Using 2-dimensional Isogenies Kohei Nakagawa, Hiroshi Onuki
2024/770 (PDF ) Sublinear-Round Broadcast without Trusted Setup Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos, Benedikt Wagner
2024/769 (PDF ) Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More Damiano Abram, Lawrence Roy, Mark Simkin
2024/768 (PDF ) The Ouroboros of ZK: Why Verifying the Verifier Unlocks Longer-Term ZK Innovation Denis Firsov, Benjamin Livshits
2024/767 (PDF ) Bootstrapping Bits with CKKS Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Damien Stehlé
2024/766 (PDF ) Breaking Verifiable Delay Functions in the Random Oracle Model Ziyi Guan, Artur Riazanov, Weiqiang Yuan
2024/765 (PDF ) Scalable Multi-Server Private Information Retrieval Ashrujit Ghoshal, Baitian Li, Yaohua Ma, Chenxin Dai, Elaine Shi
2024/764 (PDF ) Decentralized Multi-Client Functional Encryption with Strong Security Ky Nguyen, David Pointcheval, Robert Schädlich
2024/763 (PDF ) Differential Analysis of Feistel Ciphers Incorporating Ajtai SIS Hash Function Yu Morishima, Masahiro Kaminaga
2024/762 (PDF ) Constant-Cost Batched Partial Decryption in Threshold Encryption Sora Suegami, Shinsaku Ashizawa, Kyohei Shibano
2024/761 (PDF ) Enabling Secure and Efficient Broadcast Encrypted Search in Cloud Computing Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, Gang Xu, Siu-Ming Yiu, Zongpeng Li
2024/760 (PDF ) SQIsign2D-West: The Fast, the Small, and the Safer Andrea Basso, Luca De Feo, Pierrick Dartois, Antonin Leroux, Luciano Maino, Giacomo Pope, Damien Robert, Benjamin Wesolowski
2024/759 (PDF ) Watermarking Language Models for Many Adaptive Users Aloni Cohen, Alexander Hoover, Gabe Schoenbach
2024/758 (PDF ) Admissible Parameters for the Crossbred Algorithm and Semi-regular Sequences over Finite Fields John Baena, Daniel Cabarcas, Sharwan K. Tiwari, Javier Verbel, Luis Villota
2024/757 (PDF ) Formal Definition and Verification for Combined Random Fault and Random Probing Security Sonia Belaid, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, Abdul Rahman Taleb
2024/756 (PDF ) (Strong) aPAKE Revisited: Capturing Multi-User Security and Salting Dennis Dayanikli, Anja Lehmann
2024/755 (PDF ) Efficient Second-Order Masked Software Implementations of Ascon in Theory and Practice Barbara Gigerl, Florian Mendel, Martin Schläffer, Robert Primas
2024/754 (PDF ) Adversary Resilient Learned Bloom Filters Ghada Almashaqbeh, Allison Bishop, Hayder Tirmazi
2024/753 (PDF ) Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Taeho Jung
2024/752 (PDF ) More Embedded Curves for SNARK-Pairing-Friendly Curves Aurore Guillevic
2024/751 (PDF ) Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography Prabhanjan Ananth, Fatih Kaleoglu, Henry Yuen
2024/750 (PDF ) Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs Xinxin Fan, Veronika Kuchta, Francesco Sica, Lei Xu
2024/749 (PDF ) Reducing the CRS Size in Registered ABE Systems Rachit Garg, George Lu, Brent Waters, David J. Wu
2024/748 (PDF ) PERK: Compact Signature Scheme Based on a New Variant of the Permuted Kernel Problem Slim Bettaieb, Loïc Bidoux, Victor Dyseryn, Andre Esser, Philippe Gaborit, Mukul Kulkarni, Marco Palumbi
2024/747 (PDF ) Scaling Lattice Sieves across Multiple Machines Martin R. Albrecht, Joe Rowell
2024/746 (PDF ) The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS Céline Chevalier, Guirec Lebrun, Ange Martinelli, Jérôme Plût
2024/745 (PDF ) FRAST: TFHE-friendly Cipher Based on Random S-boxes Mingyu Cho, Woohyuk Chung, Jincheol Ha, Jooyoung Lee, Eun-Gyeol Oh, Mincheol Son
2024/744 (PDF ) An NVMe-based Secure Computing Platform with FPGA-based TFHE Accelerator Yoshihiro Ohba, Tomoya Sanuki, Claude Gravel, Kentaro Mihara, Asuka Wakasugi, Kenta Adachi
2024/743 (PDF ) Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings -- with a Break-Fix Strategy Kai Hu
2024/742 (PDF ) Efficient Universally-Verifiable Electronic Voting with Everlasting Privacy David Pointcheval
2024/741 (PDF ) A Deniability Analysis of Signal's Initial Handshake PQXDH Rune Fiedler, Christian Janson
2024/740 (PDF ) Multi-Client Functional Encryption with Public Inputs and Strong Security Ky Nguyen, Duong Hieu Phan, David Pointcheval
2024/739 (PDF ) BGJ15 Revisited: Sieving with Streamed Memory Access Ziyu Zhao, Jintai Ding, Bo-Yin Yang
2024/738 (PDF ) Quantum Key-Revocable Dual-Regev Encryption, Revisited Prabhanjan Ananth, Zihan Hu, Zikuan Huang
2024/737 (PDF ) Mutable Batch Arguments and Applications Rishab Goyal
2024/736 (PDF ) Secret Sharing with Certified Deletion James Bartusek, Justin Raizes
2024/735 (PDF ) Secure Multiparty Computation in the Presence of Covert Adaptive Adversaries Isheeta Nargis, Anwar Hasan
2024/734 (PDF ) Proof of Stake and Activity: Rewarding On-Chain Activity Through Consensus Aram Jivanyan, Karen Terjanian
2024/733 (PDF ) Proxying Is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability Zhongtang Luo, Yanxue Jia, Yaobin Shen, Aniket Kate
2024/732 (PDF ) Compact Encryption based on Module-NTRU problems Shi Bai, Hansraj Jangir, Hao Lin, Tran Ngo, Weiqiang Wen, Jinwei Zheng
2024/731 (PDF ) Toward Full $n$-bit Security and Nonce Misuse Resistance of Block Cipher-based MACs Wonseok Choi, Jooyoung Lee, Yeongmin Lee
2024/730 (PDF ) New Solutions to Delsarte's Dual Linear Programs André Chailloux, Thomas Debris-Alazard
2024/729 (PDF ) Covert Adaptive Adversary Model: A New Adversary Model for Multiparty Computation Isheeta Nargis, Anwar Hasan
2024/728 (PDF ) Relativized Succinct Arguments in the ROM Do Not Exist Annalisa Barbara, Alessandro Chiesa, Ziyi Guan
2024/727 (PDF ) Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise Joseph Jaeger
2024/726 (PDF ) Challenger: Blockchain-based Massively Multiplayer Online Game Architecture Boris Chan Yip Hon, Bilel Zaghdoudi, Maria Potop-Butucaru, Sébastien Tixeuil, Serge Fdida
2024/725 (PDF ) Multi User Security of LightMAC and LightMAC_Plus Nilanjan Datta, Shreya Dey, Avijit Dutta, Devdutto Kanungo
2024/724 (PDF ) zkSNARKs in the ROM with Unconditional UC-Security Alessandro Chiesa, Giacomo Fenzi
2024/723 (PDF ) $\mathsf{OPA}$: One-shot Private Aggregation with Single Client Interaction and its Applications to Federated Learning Harish Karthikeyan, Antigoni Polychroniadou
2024/722 (PDF ) Ultrametric integral cryptanalysis Tim Beyne, Michiel Verbauwhede
2024/721 (PDF ) Real-world Universal zkSNARKs are non-malleable Antonio Faonio, Dario Fiore, Luigi Russo
2024/720 (PDF ) Multivariate Blind Signatures Revisited Ward Beullens
2024/719 (PDF ) Client-Efficient Online-Offline Private Information Retrieval Hoang-Dung Nguyen, Jorge Guajardo, Thang Hoang
2024/718 (PDF ) PAC-Private Algorithms Mayuri Sridhar, Hanshen Xiao, Srinivas Devadas
2024/717 (PDF ) An Improved Threshold Homomorphic Cryptosystem Based on Class Groups Lennart Braun, Guilhem Castagnos, Ivan Damgård, Fabien Laguillaumie, Kelsey Melissaris, Claudio Orlandi, Ida Tucker
2024/716 (PDF ) Unclonable Secret Sharing Prabhanjan Ananth, Vipul Goyal, Jiahui Liu, Qipeng Liu
2024/715 (PDF ) A New Cryptographic Algorithm Ali Mahdoum
2024/714 (PDF ) Learning With Quantization: A Ciphertext Efficient Lattice Problem with Tight Security Reduction from LWE Shanxiang Lyu, Ling Liu, Cong Ling
2024/713 (PDF ) Analyzing Pump and jump BKZ algorithm using dynamical systems Leizhang Wang
2024/712 (PDF ) Concrete Quantum Cryptanalysis of Shortest Vector Problem Hyunji Kim, Kyungbae Jang, Anubhab Baksi, Sumanta Chakraborty, Hwajeong Seo
2024/711 (PDF ) Non-Transferable Anonymous Tokens by Secret Binding F. Betül Durak, Laurane Marco, Abdullah Talayhan, Serge Vaudenay
2024/710 (PDF ) BUFFing FALCON without Increasing the Signature Size Samed Düzlü, Rune Fiedler, Marc Fischlin
2024/709 (PDF ) Masked Computation the Floor Function and its Application to the FALCON Signature Pierre-Augustin Berthet, Justine Paillet, Cédric Tavernier
2024/708 (PDF ) Automated Generation of Fault-Resistant Circuits Nicolai Müller, Amir Moradi
2024/707 (PDF ) Towards a Polynomial Instruction Based Compiler for Fully Homomorphic Encryption Accelerators Sejun Kim, Wen Wang, Duhyeong Kim, Adish Vartak, Michael Steiner, Rosario Cammarota
2024/706 (PDF ) Linicrypt in the Ideal Cipher Model Zahra Javar, Bruce M. Kapron
2024/705 (PDF ) Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions of Users Remco Bloemen, Bryan Gillespie, Daniel Kales, Philipp Sippl, Roman Walch
2024/704 (PDF ) Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains Krishnendu Chatterjee, Amirali Ebrahim-Zadeh, Mehrdad Karrabi, Krzysztof Pietrzak, Michelle Yeo, Djordje Zikelic
2024/703 (PDF ) An Efficient and Extensible Zero-knowledge Proof Framework for Neural Networks Tao Lu, Haoyu Wang, Wenjie Qu, Zonghui Wang, Jinye He, Tianyang Tao, Wenzhi Chen, Jiaheng Zhang
2024/702 (PDF ) Security Analysis of Signal's PQXDH Handshake Rune Fiedler, Felix Günther
2024/701 (PDF ) Quantum Unpredictability Tomoyuki Morimae, Shogo Yamada, Takashi Yamakawa
2024/700 (PDF ) Sublinear Distributed Product Checks on Replicated Secret-Shared Data over $\mathbb{Z}_{2^k}$ Without Ring Extensions Yun Li, Daniel Escudero, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song
2024/699 (PDF ) An Efficient All-to-All GCD Algorithm for Low Entropy RSA Key Factorization Elijah Pelofske
2024/698 (PDF ) Private Computations on Streaming Data Vladimir Braverman, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky
2024/697 (PDF ) LINE: Cryptosystem based on linear equations for logarithmic signatures Gennady Khalimov, Yevgen Kotukh, Maksym Kolisnyk, Svitlana Khalimova, Oleksandr Sievierinov
2024/696 (PDF ) A Theoretical Take on a Practical Consensus Protocol Victor Shoup
2024/695 (PDF ) Beale Cipher 1 and Cipher 3: Numbers With No Messages Richard Wassmer
2024/694 (PDF ) Lower-Bounds on Public-Key Operations in PIR Jesko Dujmovic, Mohammad Hajiabadi
2024/692 (PDF ) Blink: An Optimal Proof of Proof-of-Work Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Giulia Scaffino, Dionysis Zindros
2024/691 (PDF ) White-box filtering attacks breaking SEL masking: from exponential to polynomial time Alex Charlès, Aleksei Udovenko
2024/690 (PDF ) LPN-based Attacks in the White-box Setting Alex Charlès, Aleksei Udovenko
2024/689 (PDF ) Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models Elijah Pelofske, Vincent Urias, Lorie M. Liebrock
2024/688 (PDF ) Succinct Functional Commitments for Circuits from k-Lin Hoeteck Wee, David J. Wu
2024/687 (PDF ) Lower Bounds for Levin–Kolmogorov Complexity Nicholas Brandt
2024/686 (PDF ) Unstructured Inversions of New Hope Ian Malloy
2024/685 (PDF ) Committing AVID with Partial Retrieval and Optimal Storage Nicolas Alhaddad, Leonid Reyzin, Mayank Varia
2024/684 (PDF ) A Plug-and-Play Long-Range Defense System for Proof-of-Stake Blockchains Lucien K. L. Ng, Panagiotis Chatzigiannis, Duc V. Le, Mohsen Minaei, Ranjit Kumaresan, Mahdi Zamani
2024/683 (PDF ) A note on ``a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE'' Zhengjun Cao, Lihua Liu
2024/682 (PDF ) Approximate PSI with Near-Linear Communication Wutichai Chongchitmate, Steve Lu, Rafail Ostrovsky
2024/681 (PDF ) HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security Aloni Cohen, David Bruce Cousins, Nicholas Genise, Erik Kline, Yuriy Polyakov, Saraswathy RV
2024/680 (PDF ) Universal Vector Commitments Ojaswi Acharya, Foteini Baldimtsi, Samuel Dov Gordon, Daniel McVicker, Aayush Yadav
2024/679 (PDF ) Isotropic Quadratic Forms, Diophantine equations and Digital Signatures, DEFIv2 Martin Feussner, Igor Semaev
2024/678 (PDF ) Quantum-Safe Account Recovery for WebAuthn Douglas Stebila, Spencer Wilson
2024/677 (PDF ) Asynchronous Consensus without Trusted Setup or Public-Key Cryptography Sourav Das, Sisi Duan, Shengqi Liu, Atsuki Momose, Ling Ren, Victor Shoup
2024/676 (PDF ) Composing Timed Cryptographic Protocols: Foundations and Applications Karim Eldefrawy, Benjamin Terner, Moti Yung
2024/675 (PDF ) Succinctly Verifiable Computation over Additively-Homomorphically Encrypted Data: Making Privacy-Preserving Blueprints Practical Scott Griffy, Markulf Kohlweiss, Anna Lysyanskaya, Meghna Sengupta
2024/674 (PDF ) SigmaSuite: How to Minimize Foreign Arithmetic in ZKP Circuits While Keeping Succinct Final Verification. Wyatt Benno
2024/673 (PDF ) Chocobo: Creating Homomorphic Circuit Operating with Functional Bootstrapping in basis B Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey
2024/672 (PDF ) Secure Coded Distributed Computing and Extensions to Multiple Access Setting Shanuja Sasi, Onur Gunlu
2024/671 (PDF ) Exploiting Internal Randomness for Privacy in Vertical Federated Learning Yulian Sun, Li Duan, Ricardo Mendes, Derui Zhu, Yue Xia, Yong Li, Asja Fischer
2024/670 (PDF ) Secure Implementation of SRAM PUF for Private Key Generation Raja Adhithan Radhakrishnan
2024/669 (PDF ) Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses Arka Rai Choudhuri, Sanjam Garg, Julien Piet, Guru-Vamsi Policharla
2024/668 (PDF ) Blockchain Price vs. Quantity Controls Abdoulaye Ndiaye
2024/667 (PDF ) Agile, Post-quantum Secure Cryptography in Avionics Karolin Varner, Wanja Zaeske, Sven Friedrich, Aaron Kaiser, Alice Bowman
2024/666 (PDF ) Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, Raluca Ada Popa
2024/665 (PDF ) Fast Homomorphic Evaluation of LWR-based PRFs Amit Deo, Marc Joye, Benoit Libert, Benjamin R. Curtis, Mayeul de Bellabre
2024/664 (PDF ) Pando: Extremely Scalable BFT Based on Committee Sampling Xin Wang, Haochen Wang, Haibin Zhang, Sisi Duan
2024/663 (PDF ) Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size Xinwei Yong, Jiaojiao Wu, Jianfeng Wang
2024/662 (PDF ) Faster Private Decision Tree Evaluation for Batched Input from Homomorphic Encryption Kelong Cong, Jiayi Kang, Georgio Nicolas, Jeongeun Park
2024/661 (PDF ) On amortization techniques for FRI-based SNARKs Albert Garreta, Hayk Hovhanissyan, Aram Jivanyan, Ignacio Manzur, Isaac Villalobos, Michał Zając
2024/660 (PDF ) FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption Camille Nuoskala, Reyhaneh Rabbaninejad, Tassos Dimitriou, Antonis Michalas
2024/659 (PDF ) Secure Latent Dirichlet Allocation Thijs Veugen, Vincent Dunning, Michiel Marcus, Bart Kamphorst
2024/658 (PDF ) Information-theoretic security with asymmetries Tim Beyne, Yu Long Chen
2024/657 (PDF ) Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs Anaïs Barthoulot, Olivier Blazy, Sébastien Canard
2024/656 (PDF ) Cryptanalytic Audit of the XHash Sponge Function and its Components Vincent Rijmen
2024/655 (PDF ) Implementation and Performance Analysis of Homomorphic Signature Schemes Davide Carnemolla, Dario Catalano, Mario Di Raimondo, Federico Savasta
2024/654 (PDF ) Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification Alberto Ibarrondo, Ismet Kerenciler, Hervé Chabanne, Vincent Despiegel, Melek Önen
2024/653 (PDF ) Ipotane: Balancing the Good and Bad Cases of Asynchronous BFT Xiaohai Dai, Chaozheng Ding, Hai Jin, Julian Loss, Ling Ren
2024/651 (PDF ) A New Hash-based Enhanced Privacy ID Signature Scheme Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J.P. Newton, Yalan Wang
2024/650 (PDF ) Hash-based Direct Anonymous Attestation Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J.P. Newton, Yalan Wang
2024/649 (PDF ) Sphinx-in-the-Head: Group Signatures from Symmetric Primitives Liqun Chen, Changyu Dong, Christopher J. P. Newton, Yalan Wang
2024/647 (PDF ) Weightwise (almost) perfectly balanced functions based on total orders Pierrick Méaux
2024/646 (PDF ) Efficient Quantum Algorithm for SUBSET-SUM Problem Sanchita Ghosh, Anant Sharma, Sreetama Das, Shibdas Roy
2024/644 (PDF ) Jumping for Bernstein-Yang Inversion Li-Jie Jian, Ting-Yuan Wang, Bo-Yin Yang, Ming-Shing Chen
2024/643 (PDF ) Key-Homomorphic and Aggregate Verifiable Random Functions Giulio Malavolta
2024/642 (PDF ) GraphOS: Towards Oblivious Graph Processing Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili
2024/641 (PDF ) Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon Xuanji Meng, Xiao Sui, Zhaoxin Yang, Kang Rong, Wenbo Xu, Shenglong Chen, Ying Yan, Sisi Duan
2024/640 (PDF ) On Proving Pairings Andrija Novakovic, Liam Eagen
2024/639 (PDF ) Computational Attestations of Polynomial Integrity Towards Verifiable Machine Learning Dustin Ray, Caroline El Jazmi
2024/638 (PDF ) A note on ``a lightweight mutual and transitive authentication mechanism for IoT network'' Zhengjun Cao, Lihua Liu
2024/637 (PDF ) Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity Marshall Ball, Juan Garay, Peter Hall, Aggelos Kiayias, Giorgos Panagiotakos
2024/636 (PDF ) Regev Factoring Beyond Fibonacci: Optimizing Prefactors Seyoon Ragavan
2024/635 (PDF ) Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, Hoda Maleki
2024/634 (PDF ) NTRU-based FHE for Larger Key and Message Space Robin Jadoul, Axel Mertens, Jeongeun Park, Hilder V. L. Pereira
2024/633 (PDF ) Vision Mark-32: ZK-Friendly Hash Function Over Binary Tower Fields Tomer Ashur, Mohammad Mahzoun, Jim Posen, Danilo Šijačić
2024/632 (PDF ) Further Investigations on Nonlinear Complexity of Periodic Binary Sequences Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, Debiao He
2024/631 (PDF ) BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring Tahoura Mosavirik, Shahin Tajik
2024/630 (PDF ) Conditional disclosure of secrets with quantum resources Vahid R. Asadi, Kohdai Kuroiwa, Debbie Leung, Alex May, Sabrina Pasterski, Chris Waddell
2024/629 (PDF ) Unconditional correctness of recent quantum algorithms for factoring and computing discrete logarithms Cédric Pilatte
2024/628 (PDF ) MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications Bernardo David, Rafael Dowsley, Anders Konring, Mario Larangeira
2024/627 (PDF ) Distributed & Scalable Oblivious Sorting and Shuffling Nicholas Ngai, Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos
2024/626 (PDF ) An Efficient Quantum Algorithm for the Traveling Salesman Problem Anant Sharma, Nupur Deshpande, Sanchita Ghosh, Sreetama Das, Shibdas Roy
2024/625 (PDF ) Interactive Threshold Mercurial Signatures and Applications Masayuki Abe, Masaya Nanri, Octavio Perez Kempner, Mehdi Tibouchi
2024/624 (PDF ) POKÉ: A Compact and Efficient PKE from Higher-dimensional Isogenies Andrea Basso, Luciano Maino
2024/623 (PDF ) Complete group law for genus 2 Jacobians on Jacobian coordinates Elif Ozbay Gurler, Huseyin Hisil
2024/622 (PDF ) Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols Roozbeh Sarenche, Svetla Nikova, Bart Preneel
2024/621 (PDF ) How to Lose Some Weight - A Practical Template Syndrome Decoding Attack Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, Antonia Wachter-Zeh
2024/620 (PDF ) New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang
2024/619 (PDF ) BPDTE: Batch Private Decision Tree Evaluation via Amortized Efficient Private Comparison Huiqiang Liang, Haining Lu, Yifeng Guo, Geng Wang, Haining Yu, Hongli Zhang, Baoyu An, Jinyu Li, Li Su
2024/618 (PDF ) Efficient KZG-based Univariate Sum-check and Lookup Argument Yuncong Zhang, Shi-Feng Sun, Dawu Gu
2024/617 (PDF ) Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions and Constructions Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang, Min Xie
2024/616 (PDF ) $\mathsf{Cougar}$: Cubic Root Verifier Inner Product Argument under Discrete Logarithm Assumption Hyeonbum Lee, Seunghun Paik, Hyunjung Son, Jae Hong Seo
2024/615 (PDF ) Subverting Cryptographic Protocols from A Fine-Grained Perspective - A Case Study on 2-Party ECDSA Jialiu Cheng, Yi Wang, Rongmao Chen, Xinyi Huang
2024/614 (PDF ) Non-interactive Blind Signatures: Post-quantum and Stronger Security Foteini Baldimtsi, Jiaqi Cheng, Rishab Goyal, Aayush Yadav
2024/613 (PDF ) Hadamard Product Argument from Lagrange-Based Univariate Polynomials Jie Xie, Yuncong Hu, Yu Yu
2024/612 (PDF ) FHERMA: Building the Open-Source FHE Components Library for Practical Use Gurgen Arakelov, Nikita Kaskov, Daria Pianykh, Yuriy Polyakov
2024/611 (PDF ) A Security Analysis of Restricted Syndrome Decoding Problems Ward Beullens, Pierre Briaud, Morten Øygarden
2024/610 (PDF ) Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation Min Xie, Peichen Ju, Yanqi Zhao, Man Ho Au, Zoe Lin Jiang, Junbin Fang, Yong Yu, Xuan Wang
2024/609 (PDF ) New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes Benoît Cogliati, Pierre-Alain Fouque, Louis Goubin, Brice Minaud
2024/608 (PDF ) The Practical Advantage of RSA over ECC and Pairings Zhengjun Cao, Lihua Liu
2024/607 (PDF ) Low-latency Secure Integrated Sensing and Communication with Transmitter Actions Truman Welling, Onur Gunlu, Aylin Yener
2024/606 (PDF ) Classical Commitments to Quantum States Sam Gunn, Yael Tauman Kalai, Anand Natarajan, Agi Villanyi
2024/605 (PDF ) Security Analysis of XHASH8/12 Léo Perrin
2024/604 (PDF ) Generic MitM Attack Frameworks on Sponge Constructions Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, Xiaoyun Wang
2024/603 (PDF ) Worst-Case to Average-Case Hardness of LWE: An Alternative Perspective Divesh Aggarwal, Leong Jin Ming, Alexandra Veliche
2024/602 (PDF ) Secret-Sharing Schemes for High Slices Amos Beimel, Oriol Farràs, Or Lasri, Oded Nir
2024/601 (PDF ) Improved Provable Reduction of NTRU and Hypercubic Lattices Henry Bambury, Phong Q. Nguyen
2024/600 (PDF ) A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme- Mustafa Khairallah
2024/599 (PDF ) Probabilistically Checkable Arguments for all NP Shany Ben-David
2024/598 (PDF ) Decryption Indistinguishability under Chosen Control Flow Ganyuan Cao
2024/597 (PDF ) Blockchain-based decentralized identity system: Design and security analysis Gewu BU, Serge Fdida, Maria Potop-Butucaru, Bilel Zaghdoudi
2024/596 (PDF ) Cryptanalysis of signature schemes based on the root extraction problem over braid group Djimnaibeye Sidoine, Guy Mobouale Wamba, Abiodoun Clement Hounkpevi, Tieudjo Daniel, Djiby Sow
2024/595 (PDF ) Analysis of Multivariate Encryption Schemes: Application to Dob and C* Morten Øygarden, Patrick Felke, Håvard Raddum
2024/594 (PDF ) Greco: Fast Zero-Knowledge Proofs for Valid FHE RLWE Ciphertexts Formation Enrico Bottazzi
2024/593 (PDF ) The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem George Teseleanu
2024/592 (PDF ) Asymptotics for the standard block size in primal lattice attacks: second order, formally verified Daniel J. Bernstein
2024/591 (PDF ) Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures Thomas Aulbach, Samed Düzlü, Michael Meyer, Patrick Struck, Maximiliane Weishäupl
2024/590 (PDF ) Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks Quan Yuan, Chao Sun, Tsuyoshi Takagi
2024/589 (PDF ) Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training Xunyue Hu, Quentin L. Meunier, Emmanuelle Encrenaz
2024/588 (PDF ) Digital Signatures for Authenticating Compressed JPEG Images Simon Erfurth
2024/587 (PDF ) Hidden $\Delta$-fairness: A Novel Notion for Fair Secure Two-Party Computation Saskia Bayreuther, Robin Berger, Felix Dörre, Jeremias Mechler, Jörn Müller-Quade
2024/586 (PDF ) Encryption Based Covert Channel for Large Language Models Yongge Wang
2024/585 (PDF ) A Complete Beginner Guide to the Number Theoretic Transform (NTT) Ardianto Satriawan, Rella Mareta, Hanho Lee
2024/584 (PDF ) Efficient Implementations of Square-root Vélu's Formulas Jianming Lin, Weize Wang, Chang-An Zhao, Yuhao Zheng
2024/582 (PDF ) Improved Alternating-Moduli PRFs and Post-Quantum Signatures Navid Alamati, Guru-Vamsi Policharla, Srinivasan Raghuraman, Peter Rindal
2024/581 (PDF ) Fault Attack on SQIsign JeongHwan Lee, Donghoe Heo, Hyeonhak Kim, Gyusang Kim, Suhri Kim, Heeseok Kim, Seokhie Hong
2024/580 (PDF ) Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model Duy Nguyen
2024/579 (PDF ) Tight Multi-user Security of Ascon and Its Large Key Extension Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi
2024/578 (PDF ) Assessing the quality of Random Number Generators through Neural Networks José Luis Crespo, Javier González-Villa, Jaime Gutierrez, Angel Valle
2024/577 (PDF ) Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box Said Eddahmani, Sihem Mesnager
2024/576 (PDF ) On the complexity of the problem of solving systems of tropical polynomial equations of degree two Ivan Buchinskiy, Matvei Kotov, Alexander Treier
2024/575 (PDF ) Pairing Optimizations for Isogeny-based Cryptosystems Shiping Cai, Kaizhan Lin, Chang-An Zhao
2024/574 (PDF ) PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software Jannik Zeitschner, Amir Moradi
2024/573 (PDF ) Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay
2024/572 (PDF ) Split Gröbner Bases for Satisfiability Modulo Finite Fields Alex Ozdemir, Shankara Pailoor, Alp Bassa, Kostas Ferles, Clark Barrett, Işil Dillig
2024/571 (PDF ) MiniCast: Minimizing the Communication Complexity of Reliable Broadcast Thomas Locher, Victor Shoup
2024/570 (PDF ) Actively Secure Private Set Intersection in the Client-Server Setting Yunqing Sun, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Xiao Wang
2024/569 (PDF ) An overview of symmetric fuzzy PAKE protocols Johannes Ottenhues
2024/568 (PDF ) Communication-Efficient Multi-Party Computation for RMS Programs Thomas Attema, Aron van Baarsen, Stefan van den Berg, Pedro Capitão, Vincent Dunning, Lisa Kohl
2024/567 (PDF ) Amortizing Circuit-PSI in the Multiple Sender/Receiver Setting Aron van Baarsen, Marc Stevens
2024/566 (PDF ) A Round-Optimal Near-Linear Third-Party Private Set Intersection Protocol Foo Yee Yeo, Jason H. M. Ying
2024/565 (PDF ) On the construction of quantum circuits for S-boxes with different criteria based on the SAT solver Da Lin, Chunli Yang, Shengyuan Xu, Shizhu Tian, Bing Sun
2024/564 (PDF ) Multiple Group Action Dlogs with(out) Precomputation Alexander May, Massimo Ostuzzi
2024/563 (PDF ) A Note on Related-Tweakey Impossible Differential Attacks Xavier Bonnetain, Virginie Lallemand
2024/562 (PDF ) Practical Proofs of Parsing for Context-free Grammars Harjasleen Malvai, Siam Hussain, Gregory Neven, Andrew Miller
2024/561 (PDF ) SQIAsignHD: SQIsignHD Adaptor Signature Farzin Renan, Péter Kutas
2024/560 (PDF ) Two-Party Decision Tree Training from Updatable Order-Revealing Encryption Robin Berger, Felix Dörre, Alexander Koch
2024/559 (PDF ) Convolution-Friendly Image Compression with FHE Axel Mertens, Georgio Nicolas, Sergi Rovira
2024/558 (PDF ) Scoring the predictions: a way to improve profiling side-channel attacks Damien Robissout, Lilian Bossuet, Amaury Habrard
2024/557 (PDF ) Permutation-Based Hash Chains with Application to Password Hashing Charlotte Lefevre, Bart Mennink
2024/556 (PDF ) Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage Leonie Reichert, Gowri R Chandran, Phillipp Schoppmann, Thomas Schneider, Björn Scheuermann
2024/555 (PDF ) Quantum Algorithms for Lattice Problems Yilei Chen
2024/554 (PDF ) Leakage-Abuse Attacks Against Structured Encryption for SQL Alexander Hoover, Ruth Ng, Daren Khu, Yao'an Li, Joelle Lim, Derrick Ng, Jed Lim, Yiyang Song
2024/553 (PDF ) Efficient Linkable Ring Signatures: New Framework and Post-Quantum Instantiations Yuxi Xue, Xingye Lu, Man Ho Au, Chengru Zhang
2024/552 (PDF ) Insights from building a blockchain-based metaverse Mario Yaksetig
2024/551 (PDF ) Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography Nimish Mishra, Debdeep Mukhopadhyay
2024/550 (PDF ) Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV Mustafa Khairallah
2024/549 (PDF ) Integral Attack on the Full FUTURE Block Cipher Zeyu Xu, Jiamin Cui, Kai Hu, Meiqin Wang
2024/548 (PDF ) Efficient isochronous fixed-weight sampling with applications to NTRU Décio Luiz Gazzoni Filho, Tomás S. R. Silva, Julio López
2024/547 (PDF ) Efficient Permutation Correlations and Batched Random Access for Two-Party Computation Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal, Harshal Shah
2024/546 (PDF ) Share with Care: Breaking E2EE in Nextcloud Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson
2024/545 (PDF ) Optimal Asynchronous Byzantine Consensus with Fair Separability Vincent Gramoli, Zhenliang Lu, Qiang Tang, Pouriya Zarbafian
2024/544 (PDF ) A post-quantum Distributed OPRF from the Legendre PRF Novak Kaluđerović, Nan Cheng, Katerina Mitrokotsa
2024/543 (PDF ) A Note on the Common Haar State Model Prabhanjan Ananth, Aditya Gulati, Yao-Ting Lin
2024/542 (PDF ) Breaking Bicoptor from S$\&$P 2023 Based on Practical Secret Recovery Attack Jun Xu, Zhiwei Li, Lei Hu
2024/541 (PDF ) Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank Loïc Bidoux, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, Matthieu Rivain
2024/540 (PDF ) Lattice-Based Timed Cryptography Russell W. F. Lai, Giulio Malavolta
2024/539 (PDF ) Supersingular Hashing using Lattès Maps Daniel Larsson
2024/538 (PDF ) A comment on "Comparing the MOV and FR reductions in elliptic curve cryptography" from EUROCRYPT'99 Qiping Lin, Fengmei Liu
2024/537 (PDF ) Confidential and Verifiable Machine Learning Delegations on the Cloud Wenxuan Wu, Soamar Homsi, Yupeng Zhang
2024/536 (PDF ) Public-Algorithm Substitution Attacks: Subverting Hashing and Verification Mihir Bellare, Doreen Riepel, Laura Shea
2024/535 (PDF ) NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree Tianxiang Dai, Yufan Jiang, Yong Li, Fei Mei
2024/534 (PDF ) CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model Simon Jeanteur, Laura Kovács, Matteo Maffei, Michael Rawson
2024/533 (PDF ) HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger, Tim Weißmantel, Hossein Yalame
2024/532 (PDF ) Analysing Cryptography in the Wild - A Retrospective Martin R. Albrecht, Kenneth G. Paterson
2024/531 (PDF ) Avoiding Trusted Setup in Isogeny-based Commitments Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, Célestin Nkuimi-Jugnia
2024/530 (PDF ) An efficient key generation algorithm for GR-NTRU over dihedral group Vikas Kumar, Ali Raya, Aditi Kar Gangopadhyay
2024/529 (PDF ) Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest Hojune Shin, Jina Choi, Dain Lee, Kyoungok Kim, Younho Lee
2024/528 (PDF ) The solving degrees for computing Gröbner bases of affine semi-regular polynomial sequences Momonari Kudo, Kazuhiro Yokoyama
2024/526 (PDF ) Optimizing and Implementing Fischlin's Transform for UC-Secure Zero-Knowledge Yi-Hsiu Chen, Yehuda Lindell
2024/525 (PDF ) Privacy Preserving Biometric Authentication for Fingerprints and Beyond Marina Blanton, Dennis Murphy
2024/524 (PDF ) A Time-Space Tradeoff for the Sumcheck Prover Alessandro Chiesa, Elisabetta Fedele, Giacomo Fenzi, Andrew Zitek-Estrada
2024/523 (PDF ) Unbindable Kemmy Schmidt: ML-KEM is neither MAL-BIND-K-CT nor MAL-BIND-K-PK Sophie Schmieg
2024/522 (PDF ) Cryptanalysis of Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs Mahender Kumar
2024/521 (PDF ) LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram Tomoki Moriya, Miha Stopar
2024/520 (PDF ) A note on securing insertion-only Cuckoo filters Fernando Virdia, Mia Filić
2024/519 (PDF ) On implementation of Stickel's key exchange protocol over max-min and max-$T$ semirings Sulaiman Alhussaini, Serge˘ı Sergeev
2024/518 (PDF ) Software-Defined Cryptography: A Design Feature of Cryptographic Agility Jihoon Cho, Changhoon Lee, Eunkyung Kim, Jieun Lee, Beumjin Cho
2024/517 (PDF ) Fast pairings via biextensions and cubical arithmetic Damien Robert
2024/516 (PDF ) Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages Björn Ho, Huanhuan Chen, Zeshun Shi, Kaitai Liang
2024/515 (PDF ) Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE Manning Zhang, Zeshun Shi, Huanhuan Chen, Kaitai Liang
2024/514 (PDF ) Zero-Knowledge Proof Vulnerability Analysis and Security Auditing Xueyan Tang, Lingzhi Shi, Xun Wang, Kyle Charbonnet, Shixiang Tang, Shixiao Sun
2024/512 (PDF ) Single Trace is All It Takes: Efficient Side-channel Attack on Dilithium Zehua Qiao, Yuejun Liu, Yongbin Zhou, Yuhan Zhao, Shuyi Chen
2024/511 (PDF ) A Black-box Attack on Fixed-Unitary Quantum Encryption Schemes Cezary Pilaszewicz, Lea R. Muth, Marian Margraf
2024/510 (PDF ) Snake-eye Resistant PKE from LWE for Oblivious Message Retrieval and Robust Encryption Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang
2024/509 (PDF ) Distribution of cycles in supersingular $\ell$-isogeny graphs Eli Orvis
2024/508 (PDF ) Secure Multi-Party Linear Algebra with Perfect Correctness Jules Maire, Damien Vergnaud
2024/507 (PDF ) An Efficient SNARK for Field-Programmable and RAM Circuits Jehyuk Jang, Jamie Judd
2024/506 (PDF ) A Decentralized Federated Learning using Reputation Olive Chakraborty, Aymen Boudguiga
2024/505 (PDF ) RSA-Based Dynamic Accumulator without Hashing into Primes Victor Youdom Kemmoe, Anna Lysyanskaya
2024/504 (PDF ) Polylogarithmic Proofs for Multilinears over Binary Towers Benjamin E. Diamond, Jim Posen
2024/503 (PDF ) Weakly Super-Invertible Matrices and Constant Communication Dishonest Majority MPC Alexander Bienstock, Kevin Yeo
2024/502 (PDF ) Best of Two Worlds: Efficient, Usable and Auditable Biometric ABC on the Blockchain Neyire Deniz Sarier
2024/501 (PDF ) Anonymous Revocable Identity-Based Encryption Supporting Anonymous Revocation Kwangsu Lee
2024/500 (PDF ) Side Channel Resistant Sphincs+ Scott Fluhrer
2024/499 (PDF ) CCA Secure Updatable Encryption from Non-Mappable Group Actions Jonas Meers, Doreen Riepel
2024/498 (PDF ) Number-Theoretic Transform Architecture for Fully Homomorphic Encryption from Hypercube Topology Jingwei Hu, Yuhong Fang, Wangchen Dai
2024/497 (PDF ) On the Security of Data Markets and Private Function Evaluation István Vajda
2024/496 (PDF ) Two-Round Threshold Signature from Algebraic One-More Learning with Errors Thomas Espitau, Shuichi Katsumata, Kaoru Takemure
2024/495 (PDF ) Reducing Signature Size of Matrix-code-based Signature Schemes Tung Chou, Ruben Niederhagen, Lars Ran, Simona Samardjiska
2024/494 (PDF ) HW-token-based Common Random String Setup István Vajda
2024/493 (PDF ) Reckle Trees: Updatable Merkle Batch Proofs with Applications Charalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, Stjepan Golemac
2024/492 (PDF ) Statistical testing of random number generators and their improvement using randomness extraction Cameron Foreman, Richie Yeung, Florian J. Curchod
2024/491 (PDF ) Updatable Policy-Compliant Signatures Christian Badertscher, Monosij Maitra, Christian Matt, Hendrik Waldner
2024/490 (PDF ) One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures Carsten Baum, Ward Beullens, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, Peter Scholl
2024/489 (PDF ) Guess and Determine Analysis Based on Set Split Zhe CEN, Xiutao FENG, Zhangyi WANG, Yamin ZHU, Chunping CAO
2024/488 (PDF ) Improving Generic Attacks Using Exceptional Functions Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, André Schrottenloher
2024/487 (PDF ) Real-Valued Somewhat-Pseudorandom Unitaries Zvika Brakerski, Nir Magrafta
2024/486 (PDF ) Anamorphic Encryption: New Constructions and Homomorphic Realizations Dario Catalano, Emanuele Giunta, Francesco Migliaro
2024/485 (PDF ) A Variation on Knellwolf and Meier's Attack on the Knapsack Generator Florette Martinez
2024/484 (PDF ) Harmonizing PUFs for Forward Secure Authenticated Key Exchange with Symmetric Primitives Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay, Shivam Bhasin
2024/483 (PDF ) Lower data attacks on Advanced Encryption Standard Orhun Kara
2024/482 (PDF ) $\textsf{ThorPIR}$: Single Server PIR via Homomorphic Thorp Shuffles Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Charalampos Papamanthou
2024/481 (PDF ) Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation Charlotte Hoffmann, Krzysztof Pietrzak
2024/480 (PDF ) Folding-based zkLLM Wilbert W
2024/479 (PDF ) Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement Hanwen Feng, Zhenliang Lu, Tiancheng Mai, Qiang Tang
2024/478 (PDF ) The Insecurity of SHA2 under the Differential Fault Characteristic of Boolean Functions Weiqiong Cao, Hua Chen, Hongsong Shi, Haoyuan Li, Jian Wang
2024/477 (PDF ) Large Language Models for Blockchain Security: A Systematic Literature Review Zheyuan He, Zihao Li, Sen Yang, He Ye, Ao Qiao, Xiaosong Zhang, Ting Chen, Xiapu Luo
2024/476 (PDF ) OPSA: Efficient and Verifiable One-Pass Secure Aggregation with TEE for Federated Learning Zhangshuang Guan, Yulin Zhao, Zhiguo Wan, Jinsong Han
2024/475 (PDF ) CheckOut: User-Controlled Anonymization for Customer Loyalty Programs Matthew Gregoire, Rachel Thomas, Saba Eskandarian
2024/474 (PDF ) Accumulation without Homomorphism Benedikt Bünz, Pratyush Mishra, Wilson Nguyen, William Wang
2024/473 (PDF ) Extremely Simple (Almost) Fail-Stop ECDSA Signatures Mario Yaksetig
2024/472 (PDF ) Sailfish: Towards Improving the Latency of DAG-based BFT Nibesh Shrestha, Rohan Shrothrium, Aniket Kate, Kartik Nayak
2024/471 (PDF ) A Knot-based Key Exchange protocol Silvia Sconza, Arno Wildi
2024/470 (PDF ) Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, Damien Vergnaud
2024/469 (PDF ) Malicious Security for Sparse Private Histograms Lennart Braun, Adrià Gascón, Mariana Raykova, Phillipp Schoppmann, Karn Seth
2024/467 (PDF ) Partially Non-Interactive Two-Round Lattice-Based Threshold Signatures Rutchathon Chairattana-Apirom, Stefano Tessaro, Chenzhi Zhu
2024/466 (PDF ) Arctic: Lightweight and Stateless Threshold Schnorr Signatures Chelsea Komlo, Ian Goldberg
2024/465 (PDF ) Efficient Multi-instance Vector Commitment and Application to Post-quantum Signatures Dung Bui
2024/464 (PDF ) ON THE IMPLEMENTATION OF A LATTICE-BASED DAA FOR VANET SYSTEM Doryan Lesaignoux, Mikael Carmona
2024/463 (PDF ) Security Guidelines for Implementing Homomorphic Encryption Jean-Philippe Bossuat, Rosario Cammarota, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Yuriy Polyakov, Luis Antonio Ruiz Lopez, Yongsoo Song, Donggeon Yhee
2024/462 (PDF ) Perfect Zero-Knowledge PCPs for #P Tom Gur, Jack O'Connor, Nicholas Spooner
2024/461 (PDF ) Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, Tucker Balch
2024/460 (PDF ) Encrypted Image Classification with Low Memory Footprint using Fully Homomorphic Encryption Lorenzo Rovida, Alberto Leporati
2024/459 (PDF ) Isogeny problems with level structure Luca De Feo, Tako Boris Fouotsa, Lorenz Panny
2024/458 (PDF ) Classical and Quantum Generic Attacks on 6-round Feistel Schemes Maya Chartouny, Benoit Cogliati, Jacques Patarin
2024/457 (PDF ) Studying Lattice-Based Zero-Knowlege Proofs: A Tutorial and an Implementation of Lantern Lena Heimberger, Florian Lugstein, Christian Rechberger
2024/456 (PDF ) Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam
2024/455 (PDF ) Anonymous Complaint Aggregation for Secure Messaging Connor Bell, Saba Eskandarian
2024/454 (PDF ) The Systemic Errors of Banded Quantum Fourier Transformation Zhengjun Cao, Zhenfu Cao
2024/453 (PDF ) Verifiable Information-Theoretic Function Secret Sharing Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang, Liang Feng Zhang
2024/452 (PDF ) Modeling Mobile Crash in Byzantine Consensus Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu
2024/451 (PDF ) Towards Verifiable FHE in Practice: Proving Correct Execution of TFHE's Bootstrapping using plonky2 Louis Tremblay Thibault, Michael Walter
2024/450 (PDF ) The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations Ward Beullens, Lucas Dodgson, Sebastian Faller, Julia Hesse
2024/449 (PDF ) Practical Lattice-Based Distributed Signatures for a Small Number of Signers Nabil Alkeilani Alkadri, Nico Döttling, Sihang Pu
2024/448 (PDF ) Differential Cryptanalysis of a Lightweight Block Cipher LELBC Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey
2024/447 (PDF ) ORIGO: Proving Provenance of Sensitive Data with Constant Communication Jens Ernstberger, Jan Lauinger, Yinnan Wu, Arthur Gervais, Sebastian Steinhorst
2024/446 (PDF ) Estimating the Unpredictability of Multi-Bit Strong PUF Classes Ahmed Bendary, Wendson A. S. Barbosa, Andrew Pomerance, C. Emre Koksal
2024/445 (PDF ) Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy
2024/444 (PDF ) A trust-minimized e-cash for cryptocurrencies Mario Yaksetig
2024/443 (PDF ) The cool and the cruel: separating hard parts of LWE secrets Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, Francois Charton, Kristin Lauter
2024/442 (PDF ) Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking Kostas Kryptos Chalkias, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Alberto Sonnino, Joy Wang
2024/441 (PDF ) Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields Guilhem Mureau, Alice Pellet-Mary, Heorhii Pliatsok, Alexandre Wallet
2024/440 (PDF ) Secret and Shared Keys Recovery on Hamming Quasi-Cyclic with SASCA Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau
2024/439 (PDF ) Threshold implementations of cryptographic functions between finite Abelian groups Enrico Piccione
2024/438 (PDF ) EFFLUX-F2: A High Performance Hardware Security Evaluation Board Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
2024/437 (PDF ) Insecurity of MuSig and Bellare-Neven Multi-Signatures with Delayed Message Selection Sela Navot
2024/436 (PDF ) Re-Randomized FROST Conrado P. L. Gouvea, Chelsea Komlo
2024/435 (PDF ) Unbiasable Verifiable Random Functions Emanuele Giunta, Alistair Stewart
2024/434 (PDF ) Parameter-Hiding Order-Revealing Encryption without Pairings Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang
2024/433 (PDF ) UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling
2024/432 (PDF ) Perfect Asynchronous MPC with Linear Communication Overhead Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
2024/431 (PDF ) Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version Lorenzo Grassi, Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert
2024/430 (PDF ) SoK: Zero-Knowledge Range Proofs Miranda Christ, Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Deepak Maram, Arnab Roy, Joy Wang
2024/429 (PDF ) FOLEAGE: $\mathbb{F}_4$OLE-Based Multi-Party Computation for Boolean Circuits Maxime Bombar, Dung Bui, Geoffroy Couteau, Alain Couvreur, Clément Ducros, Sacha Servan-Schreiber
2024/428 (PDF ) SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, Debayan Das
2024/427 (PDF ) A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes Hermann Seuschek, Johann Heyszl, Fabrizio De Santis
2024/426 (PDF ) Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, Xiao Wang
2024/425 (PDF ) Kolmogorov Comes to Cryptomania: On Interactive Kolmogorov Complexity and Key-Agreement Marshall Ball, Yanyi Liu, Noam Mazor, Rafael Pass
2024/424 (PDF ) Revisiting the Security of Approximate FHE with Noise-Flooding Countermeasures Flavio Bergamaschi, Anamaria Costache, Dana Dachman-Soled, Hunter Kippen, Lucas LaBuff, Rui Tang
2024/423 (PDF ) Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores Konstantina Miteloudi, Asmita Adhikary, Niels van Drueten, Lejla Batina, Ileana Buhan
2024/422 (PDF ) A Class of Weightwise Almost Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity Deepak Kumar Dalai, Krishna Mallick
2024/421 (PDF ) LLRing: Logarithmic Linkable Ring Signatures with Transparent Setup Xiangyu Hui, Sid Chi-Kin Chau
2024/420 (PDF ) Gap MCSP is not (Levin) NP-complete in Obfustopia Noam Mazor, Rafael Pass
2024/419 (PDF ) New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs Bar Alon, Amos Beimel, Tamar Ben David, Eran Omri, Anat Paskin-Cherniavsky
2024/418 (PDF ) Atomic and Fair Data Exchange via Blockchain Ertem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, Valeria Nikolaenko
2024/417 (PDF ) An improved exact CRR basis conversion algorithm for FHE without floating-point arithmetic Hongyuan Qu, Guangwu Xu
2024/416 (PDF ) Mangrove: A Scalable Framework for Folding-based SNARKs Wilson Nguyen, Trisha Datta, Binyi Chen, Nirvan Tyagi, Dan Boneh
2024/415 (PDF ) Column-wise Garbling, and How to Go Beyond the Linear Model Lei Fan, Zhenghao Lu, Hong-Sheng Zhou
2024/414 (PDF ) Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations Joseph Carolan, Alexander Poremba
2024/413 (PDF ) Bent functions using Maiorana-McFarland secondary construction Juan Carlos Ku-Cauich, Javier Diaz-Vargas, Sara Mandujano-Velazquez
2024/412 (PDF ) Quasi-Optimal Permutation Ranking and Applications to PERK Slim Bettaieb, Alessandro Budroni, Marco Palumbi, Décio Luiz Gazzoni Filho
2024/411 (PDF ) Polytopes in the Fiat-Shamir with Aborts Paradigm Henry Bambury, Hugo Beguinet, Thomas Ricosset, Eric Sageloli
2024/410 (PDF ) Recent Progress in Quantum Computing Relevant to Internet Security Hilarie Orman
2024/409 (PDF ) Nebula: A Privacy-First Platform for Data Backhaul Jean-Luc Watson, Tess Despres, Alvin Tan, Shishir G. Patil, Prabal Dutta, Raluca Ada Popa
2024/408 (PDF ) Stateless and Verifiable Execution Layer for Meta-Protocols on Bitcoin Hongbo Wen, Hanzhi Liu, Shuyang Tang, Tianyue Li, Shuhan Cao, Domo, Yanju Chen, Yu Feng
2024/407 (PDF ) Permutation-Based Hashing Beyond the Birthday Bound Charlotte Lefevre, Bart Mennink
2024/406 (PDF ) Some notes on algorithms for abelian varieties Damien Robert
2024/405 (PDF ) Traceable Secret Sharing: Strong Security and Efficient Constructions Dan Boneh, Aditi Partap, Lior Rotem
2024/404 (PDF ) Breaking the DECT Standard Cipher with Lower Time Cost Lin Ding, Zhengting Li, Ziyu Guan, Xinhai Wang, Zheng Wu
2024/403 (PDF ) DARE to agree: Byzantine Agreement with Optimal Resilience and Adaptive Communication Pierre Civit, Muhammad Ayaz Dzulfikar, Seth Gilbert, Rachid Guerraoui, Jovan Komatovic, Manuel Vidigueira
2024/402 (PDF ) Efficient Unbalanced Quorum PSI from Homomorphic Encryption Xinpeng Yang, Liang Cai, Yinghao Wang, Yinghao Wang, Lu Sun, Jingwei Hu
2024/401 (PDF ) Plover: Masking-Friendly Hash-and-Sign Lattice Signatures Muhammed F. Esgin, Thomas Espitau, Guilhem Niot, Thomas Prest, Amin Sakzad, Ron Steinfeld
2024/400 (PDF ) SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks Max Duparc, Tako Boris Fouotsa, Serge Vaudenay
2024/399 (PDF ) A Direct PRF Construction from Kolmogorov Complexity Yanyi Liu, Rafael Pass
2024/398 (PDF ) The Last Challenge Attack on Fiat-Shamir in KZG-based SNARKs Oana Ciobotaru, Maxim Peter, Vesselin Velichkov
2024/397 (PDF ) Exponent-VRFs and Their Applications Dan Boneh, Iftach Haitner, Yehuda Lindell, Gil Segev
2024/396 (PDF ) On the impact of ionizing and non-ionizing irradiation damage on security microcontrollers in CMOS technology Theresa Krüger
2024/395 (PDF ) Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators Jiajun Xin, Arman Haghighi, Xiangan Tian, Dimitrios Papadopoulos
2024/394 (PDF ) A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System Shuhan Zeng, Yongjian Liao, Chuanhao Zhou, Jinlin He, Hongwei Wang
2024/393 (PDF ) Solving McEliece-1409 in One Day --- Cryptanalysis with the Improved BJMM Algorithm Shintaro Narisada, Shusaku Uemura, Hiroki Okada, Hiroki Furue, Yusuke Aikawa, Kazuhide Fukushima
2024/392 (PDF ) Heuristic Ideal Obfuscation Based on Evasive LWR Zhuang Shan, Leyou Zhang, Qiqi Lai
2024/391 (PDF ) On Information-Theoretic Secure Multiparty Computation with Local Repairability Daniel Escudero, Ivan Tjuawinata, Chaoping Xing
2024/390 (PDF ) STIR: Reed–Solomon Proximity Testing with Fewer Queries Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, Eylon Yogev
2024/389 (PDF ) On the Feasibility of Sliced Garbling Tomer Ashur, Carmit Hazay, Rahul Satish
2024/388 (PDF ) Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding Yijian Zhang, Yunhao Ling, Jie Chen, Luping Wang
2024/387 (PDF ) Ceno: Non-uniform, Segment and Parallel Zero-knowledge Virtual Machine Tianyi Liu, Zhenfei Zhang, Yuncong Zhang, Wenqing Hu, Ye Zhang
2024/386 (PDF ) High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings Christopher Harth-Kitzerow, Ajith Suresh, Yongqin Wang, Hossein Yalame, Georg Carle, Murali Annavaram
2024/385 (PDF ) A New Public Key Cryptosystem Based on the Cubic Pell Curve Michel Seck, Abderrahmane Nitaj
2024/384 (PDF ) Transmitter Actions for Secure Integrated Sensing and Communication Truman Welling, Onur Gunlu, Aylin Yener
2024/383 (PDF ) Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran
2024/382 (PDF ) Decentralized Access Control Infrastructure for Enterprise Digital Asset Management Chirag Madaan, Rohan Agarwal, Vipul Saini, Ujjwal Kumar
2024/381 (PDF ) Quantum Circuits of AES with a Low-depth Linear Layer and a New Structure Haotian Shi, Xiutao Feng
2024/380 (PDF ) Collision Resistance from Multi-Collision Resistance for all Constant Parameters Jan Buzek, Stefano Tessaro
2024/379 (PDF ) SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity Elizabeth Crites, Aggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh
2024/378 (PDF ) Strong PUF Security Metrics: Sensitivity of Responses to Single Challenge Bit Flips Wolfgang Stefani, Fynn Kappelhoff, Martin Gruber, Yu-Neng Wang, Sara Achour, Debdeep Mukhopadhyay, Ulrich Rührmair
2024/377 (PDF ) Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking Sebastian Faust, Loïc Masure, Elena Micheli, Maximilian Orlt, François-Xavier Standaert
2024/376 (PDF ) Perfect (Parallel) Broadcast in Constant Expected Rounds via Statistical VSS Gilad Asharov, Anirudh Chandramouli
2024/375 (PDF ) Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2024/374 (PDF ) Universal Composable Password Authenticated Key Exchange for the Post-Quantum World You Lyu, Shengli Liu, Shuai Han
2024/373 (PDF ) Lower Bounds for Differential Privacy Under Continual Observation and Online Threshold Queries Edith Cohen, Xin Lyu, Jelani Nelson, Tamás Sarlós, Uri Stemmer
2024/372 (PDF ) Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate Pedro Branco, Nico Döttling, Akshayaram Srinivasan
2024/371 (PDF ) Preimage Attacks on Reduced-Round Ascon-Xof Seungjun Baek, Giyoon Kim, Jongsung Kim
2024/370 (PDF ) Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus Daniel Escudero, Yifan Song, Wenhao Wang
2024/369 (PDF ) Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts David Heath, Vladimir Kolesnikov, Lucien K. L. Ng
2024/368 (PDF ) Algorithms for Matrix Code and Alternating Trilinear Form Equivalences via New Isomorphism Invariants Anand Kumar Narayanan, Youming Qiao, Gang Tang
2024/367 (PDF ) Accelerating SLH-DSA by Two Orders of Magnitude with a Single Hash Unit Markku-Juhani O. Saarinen
2024/366 (PDF ) Key Recovery Attack on the Partial Vandermonde Knapsack Problem Dipayan Das, Antoine Joux
2024/365 (PDF ) Combined Threshold Implementation Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
2024/364 (PDF ) Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem Lars Ran, Simona Samardjiska, Monika Trimoska
2024/363 (PDF ) Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure? Roozbeh Sarenche, Ren Zhang, Svetla Nikova, Bart Preneel
2024/362 (PDF ) Integrating Causality in Messaging Channels Shan Chen, Marc Fischlin
2024/361 (PDF ) Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation Jiaxin Pan, Doreen Riepel, Runzhi Zeng
2024/360 (PDF ) The NISQ Complexity of Collision Finding Yassine Hamoudi, Qipeng Liu, Makrand Sinha
2024/359 (PDF ) Key-Recovery Attack on a Public-Key Encryption Related to Planted Clique Caicai Chen, Chris Jones
2024/358 (PDF ) Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication Qi Feng, Kang Yang, Kaiyi Zhang, Xiao Wang, Yu Yu, Xiang Xie
2024/357 (PDF ) Security analysis of the iMessage PQ3 protocol Douglas Stebila
2024/356 (PDF ) On Central Primitives for Quantum Cryptography with Classical Communication Kai-Min Chung, Eli Goldin, Matthew Gray
2024/355 (PDF ) Adaptively Secure Streaming Functional Encryption Pratish Datta, Jiaxin Guan, Alexis Korb, Amit Sahai
2024/354 (PDF ) WARPfold : Wrongfield ARithmetic for Protostar folding Lev Soukhanov
2024/353 (PDF ) FuLeakage: Breaking FuLeeca by Learning Attacks Felicitas Hörmann, Wessel van Woerden
2024/352 (PDF ) Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, Tianyu Zhang
2024/351 (PDF ) Improved Differential Meet-In-The-Middle Cryptanalysis Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia
2024/350 (PDF ) Automating Collision Attacks on RIPEMD-160 Yingxin Li, Fukang Liu, Gaoli Wang
2024/349 (PDF ) New Records in Collision Attacks on SHA-2 Yingxin Li, Fukang Liu, Gaoli Wang
2024/348 (PDF ) A Computational Tsirelson's Theorem for the Value of Compiled XOR Games David Cui, Giulio Malavolta, Arthur Mehta, Anand Natarajan, Connor Paddock, Simon Schmidt, Michael Walter, Tina Zhang
2024/347 (PDF ) The Algebraic Freelunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, Håvard Raddum
2024/346 (PDF ) A data aggregation protocol based on TFHE Maria Ferrara, Antonio Tortora, Maria Tota
2024/345 (PDF ) An Efficient Adaptive Attack Against FESTA Guoqing Zhou, Maozhi Xu
2024/344 (PDF ) Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng
2024/342 (PDF ) Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium Jiahui He, Kai Hu, Hao Lei, Meiqin Wang
2024/341 (PDF ) VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers Leo de Castro, Keewoo Lee
2024/340 (PDF ) A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors Brent Waters
2024/339 (PDF ) From Random Probing to Noisy Leakages Without Field-Size Dependence Gianluca Brian, Stefan Dziembowski, Sebastian Faust
2024/338 (PDF ) Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis Itai Dinur
2024/337 (PDF ) Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme Valerie Gilchrist, Laurane Marco, Christophe Petit, Gang Tang
2024/336 (PDF ) RAMenPaSTA: Parallelizable Scalable Transparent Arguments of Knowledge for RAM Programs Khai Hanh Tang, Nhat Minh Pham, Chan Nam Ngo
2024/335 (PDF ) Split-State Non-Malleable Codes and Secret Sharing Schemes for Quantum Messages Naresh Goud Boddu, Vipul Goyal, Rahul Jain, João Ribeiro
2024/334 (PDF ) The Impact of Reversibility on Parallel Pebbling Jeremiah Blocki, Blake Holman, Seunghoon Lee
2024/333 (PDF ) Practical Attack on All Parameters of the DME Signature Scheme Pierre Briaud, Maxime Bros, Ray Perlner, Daniel Smith-Tone
2024/332 (PDF ) Leakage-Tolerant Circuits Yuval Ishai, Yifan Song
2024/331 (PDF ) Transaction Fee Mechanism Design in a Post-MEV World Maryam Bahrani, Pranav Garimidi, Tim Roughgarden
2024/330 (PDF ) Fuzzy Private Set Intersection with Large Hyperballs Aron van Baarsen, Sihang Pu
2024/329 (PDF ) How to Validate a Verification? Houda Ferradi
2024/328 (PDF ) Attribute-Based Signatures with Advanced Delegation, and Tracing Cécile Delerablée, Lénaïck Gouriou, David Pointcheval
2024/327 (PDF ) Registered Functional Encryptions from Pairings Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian
2024/326 (PDF ) Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications Nicolas Alhaddad, Mayank Varia, Ziling Yang
2024/325 (PDF ) Proofs for Deep Thought: Accumulation for large memories and deterministic computations Benedikt Bünz, Jessica Chen
2024/324 (PDF ) Under What Conditions Is Encrypted Key Exchange Actually Secure? Jake Januzelli, Lawrence Roy, Jiayu Xu
2024/323 (PDF ) Circuit Bootstrapping: Faster and Smaller Ruida Wang, Yundi Wen, Zhihao Li, Xianhui Lu, Benqiang Wei, Kun Liu, Kunpeng Wang
2024/322 (PDF ) On the Explanation and Enhancement of Neural-inspired Differential Cryptanalysis Weixi Zheng, Liu Zhang, Zilong Wang
2024/321 (PDF ) Formal Verification of Emulated Floating-Point Arithmetic in Falcon Vincent Hwang
2024/320 (PDF ) POPSTAR: Lightweight Threshold Reporting with Reduced Leakage Hanjun Li, Sela Navot, Stefano Tessaro
2024/319 (PDF ) On the cryptosystems based on two Eulerian transfor-mations defined over the commutative rings $Z_{2^s}, s>1$. Vasyl Ustimenko
2024/318 (PDF ) Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs Alexander Hoover, Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2024/317 (PDF ) Closing the Efficiency Gap between Synchronous and Network-Agnostic Consensus Giovanni Deligios, Mose Mizrahi Erbes
2024/316 (PDF ) Threshold Garbled Circuits with Low Overhead Schuyler Rosefield, abhi shelat, LaKyah Tyner
2024/315 (PDF ) Alternative Key Schedules for the AES Christina Boura, Patrick Derbez, Margot Funk
2024/314 (PDF ) Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration Andrey Kim, Ahmet Can Mert, Anisha Mukherjee, Aikata Aikata, Maxim Deryabin, Sunmin Kwon, HyungChul Kang, Sujoy Sinha Roy
2024/313 (PDF ) The Complexity of Algebraic Algorithms for LWE Matthias Johann Steiner
2024/312 (PDF ) Trapdoor Memory-Hard Functions Benedikt Auerbach, Christoph U. Günther, Krzysztof Pietrzak
2024/311 (PDF ) Aggregating Falcon Signatures with LaBRADOR Marius A. Aardal, Diego F. Aranha, Katharina Boudgoust, Sebastian Kolby, Akira Takahashi
2024/309 (PDF ) NiLoPher: Breaking a Modern SAT-Hardened Logic-Locking Scheme via Power Analysis Attack Prithwish Basu Roy, Johann Knechtel, Akashdeep Saha, Saideep Sreekumar, Likhitha Mankali, Mohammed Nabeel, Debdeep Mukhopadhyay, Ramesh Karri, Ozgur Sinanoglu
2024/308 (PDF ) C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki, Marjan Skrobot
2024/307 (PDF ) SweetPAKE: Key exchange with decoy passwords Afonso Arriaga, Peter Y.A. Ryan, Marjan Skrobot
2024/306 (PDF ) Concretely Efficient Lattice-based Polynomial Commitment from Standard Assumptions Intak Hwang, Jinyeong Seo, Yongsoo Song
2024/305 (PDF ) Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2024/304 (PDF ) A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, Yongluan Zhou
2024/303 (PDF ) Single Pass Client-Preprocessing Private Information Retrieval Arthur Lazzaretti, Charalampos Papamanthou
2024/302 (PDF ) Simple constructions of linear-depth t-designs and pseudorandom unitaries Tony Metger, Alexander Poremba, Makrand Sinha, Henry Yuen
2024/301 (PDF ) Recommendations for the Design and Validation of a Physical True Random Number Generator Integrated in an Electronic Device David Lubicz, Viktor FIscher
2024/300 (PDF ) Diving Deep into the Preimage Security of AES-like Hashing Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang
2024/299 (PDF ) Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks Robin Leander Schröder, Stefan Gast, Qian Guo
2024/298 (PDF ) New Models for the Cryptanalysis of ASCON Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher
2024/297 (PDF ) Accelerating Training and Enhancing Security Through Message Size Optimization in Symmetric Cryptography ABHISAR, Madhav Yadav, Girish Mishra
2024/296 (PDF ) Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks Yiming Gao, Jinghui Wang, Honggang Hu, Binang He
2024/295 (PDF ) An Efficient Hash Function for Imaginary Class Groups Kostas Kryptos Chalkias, Jonas Lindstrøm, Arnab Roy
2024/294 (PDF ) Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate Thomas Peters, Yaobin Shen, François-Xavier Standaert
2024/293 (PDF ) Registered Attribute-Based Signature Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, Jie Chen
2024/292 (PDF ) IDEA-DAC: Integrity-Driven Editing for Accountable Decentralized Anonymous Credentials via ZK-JSON Shuhao Zheng, Zonglun Li, Junliang Luo, Ziyue Xin, Xue Liu
2024/291 (PDF ) Quantum Pseudorandomness Cannot Be Shrunk In a Black-Box Way Samuel Bouaziz--Ermann, Garazi Muguruza
2024/290 (PDF ) Secure Integrated Sensing and Communication Under Correlated Rayleigh Fading Martin Mittelbach, Rafael F. Schaefer, Matthieu Bloch, Aylin Yener, Onur Gunlu
2024/289 (PDF ) SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov
2024/288 (PDF ) A generic algorithm for efficient key recovery in differential attacks – and its associated tool Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, María Naya-Plasencia
2024/287 (PDF ) CAPABARA: A Combined Attack on CAPA Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov
2024/286 (PDF ) Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head Jules Maire, Damien Vergnaud
2024/285 (PDF ) Mirrored Commitment: Fixing ``Randomized Partial Checking'' and Applications Paweł Lorek, Moti Yung, Filip Zagórski
2024/284 (PDF ) Practical Improvements to Statistical Ineffective Fault Attacks Barış Ege, Bob Swinkels, Dilara Toprakhisar, Praveen Kumar Vadnala
2024/283 (PDF ) Toward Malicious Constant-Rate 2PC via Arithmetic Garbling Carmit Hazay, Yibin Yang
2024/282 (PDF ) A Concrete Analysis of Wagner's $k$-List Algorithm over $\mathbb{Z}_p$ Antoine Joux, Hunter Kippen, Julian Loss
2024/281 (PDF ) Polynomial Commitments from Lattices: Post-Quantum Security, Fast Verification and Transparent Setup Valerio Cini, Giulio Malavolta, Ngoc Khanh Nguyen, Hoeteck Wee
2024/280 (PDF ) HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures Renas Bacho, Julian Loss, Gilad Stern, Benedikt Wagner
2024/279 (PDF ) Polynomial-Time Key-Recovery Attack on the ${\tt NIST}$ Specification of ${\tt PROV}$ River Moreira Ferreira, Ludovic Perret
2024/278 (PDF ) Circle STARKs Ulrich Haböck, David Levit, Shahar Papini
2024/277 (PDF ) Fault Attacks on UOV and Rainbow Juliane Krämer, Mirjam Loiero
2024/276 (PDF ) Reduce and Prange: Revisiting Prange's ISD for Solving LPN/RSD over Large Fields Jiseung Kim, Changmin Lee
2024/275 (PDF ) The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets Chun Guo, Xiao Wang, Xiang Xie, Yu Yu
2024/274 (PDF ) Amortized Large Look-up Table Evaluation with Multivariate Polynomials for Homomorphic Encryption Heewon Chung, Hyojun Kim, Young-Sik Kim, Yongwoo Lee
2024/273 (PDF ) Perfect 2-Party Computation from Additive Somewhat Homomorphic Encryption Jonathan Trostle
2024/272 (PDF ) Deep Learning Based Analysis of Key Scheduling Algorithm of Advanced Ciphers Narendra Kumar Patel, Hemraj Shobharam Lamkuche
2024/271 (PDF ) Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem Janice Jianing Si, Tanusree Sharma, Kanye Ye Wang
2024/270 (PDF ) YPIR: High-Throughput Single-Server PIR with Silent Preprocessing Samir Jordan Menon, David J. Wu
2024/269 (PDF ) A note on PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks Milad Seddigh, Seyed Hamid Baghestani
2024/268 (PDF ) A New Approach to Generic Lower Bounds: Classical/Quantum MDL, Quantum Factoring, and More Minki Hhan
2024/267 (PDF ) zkPi: Proving Lean Theorems in Zero-Knowledge Evan Laufer, Alex Ozdemir, Dan Boneh
2024/266 (PDF ) WhisPIR: Stateless Private Information Retrieval with Low Communication Leo de Castro, Kevin Lewi, Edward Suh
2024/265 (PDF ) Beyond the circuit: How to Minimize Foreign Arithmetic in ZKP Circuits Michele Orrù, George Kadianakis, Mary Maller, Greg Zaverucha
2024/264 (PDF ) Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT Nils Fleischhacker, Mathias Hall-Andersen, Mark Simkin
2024/263 (PDF ) Threshold Encryption with Silent Setup Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, Mingyuan Wang
2024/262 (PDF ) Note on the cryptanalysis of Speedy Tim Beyne, Addie Neyt
2024/261 (PDF ) Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility Véronique Cortier, Alexandre Debant, Anselme Goetschmann, Lucca Hirschi
2024/260 (PDF ) Kleptographic Attacks against Implicit Rejection Antoine Joux, Julian Loss, Benedikt Wagner
2024/259 (PDF ) Anonymity on Byzantine-Resilient Decentralized Computing Kehao Ma, Minghui Xu, Yihao Guo, Lukai Cui, Shiping Ni, Shan Zhang, Weibing Wang, Haiyong Yang, Xiuzhen Cheng
2024/258 (PDF ) SoK: Decentralized Storage Network Chuanlei Li, Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng
2024/257 (PDF ) LatticeFold: A Lattice-based Folding Scheme and its Applications to Succinct Proof Systems Dan Boneh, Binyi Chen
2024/256 (PDF ) Fiat-Shamir for Bounded-Depth Adversaries Liyan Chen, Yilei Chen, Zikuan Huang, Nuozhou Sun, Tianqi Yang, Yiding Zhang
2024/255 (PDF ) Revisiting Differential-Linear Attacks via a Boomerang Perspective With Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT Hosein Hadipour, Patrick Derbez, Maria Eichlseder
2024/254 (PDF ) Adaptive Security in SNARGs via iO and Lossy Functions Brent Waters, Mark Zhandry
2024/253 (PDF ) 2PC-MPC: Emulating Two Party ECDSA in Large-Scale MPC Offir Friedman, Avichai Marmor, Dolev Mutzari, Omer Sadika, Yehonatan C. Scaly, Yuval Spiizer, Avishay Yanai
2024/252 (PDF ) Faster Signatures from MPC-in-the-Head Dung Bui, Eliana Carozza, Geoffroy Couteau, Dahmun Goudarzi, Antoine Joux
2024/251 (PDF ) Communication-Optimal Convex Agreement Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer
2024/250 (PDF ) Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi Katharina Koschatko, Reinhard Lüftenegger, Christian Rechberger
2024/249 (PDF ) Robust Additive Randomized Encodings from IO and Pseudo-Non-linear Codes Nir Bitansky, Sapir Freizeit
2024/248 (PDF ) FRIDA: Data Availability Sampling from FRI Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner
2024/247 (PDF ) Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults Simon Tollec, Vedad Hadžić, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan Mangard
2024/246 (PDF ) OCash: Fully Anonymous Payments between Blockchain Light Clients Adam Blatchley Hansen, Jesper Buus Nielsen, Mark Simkin
2024/245 (PDF ) Linear-Communication Asynchronous Complete Secret Sharing with Optimal Resilience Xiaoyu Ji, Junru Li, Yifan Song
2024/244 (PDF ) Don’t Use It Twice! Solving Relaxed Linear Code Equivalence Problems Alessandro Budroni, Jesús-Javier Chi-Domínguez, Giuseppe D'Alconzo, Antonio J. Di Scala, Mukul Kulkarni
2024/243 (PDF ) Towards Achieving Asynchronous MPC with Linear Communication and Optimal Resilience Vipul Goyal, Chen-Da Liu-Zhang, Yifan Song
2024/242 (PDF ) Perfectly-Secure MPC with Constant Online Communication Complexity Yifan Song, Xiaxi Ye
2024/241 (PDF ) Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings Kaisei Kajita, Go Ohtake, Tsuyoshi Takagi
2024/240 (PDF ) Implementation of Cryptanalytic Programs Using ChatGPT Nobuyuki Sugio
2024/238 (PDF ) A Single Trace Fault Injection Attack on Hedged CRYSTALS-Dilithium Sönke Jendral
2024/237 (PDF ) Collusion-Resilience in Transaction Fee Mechanism Design Hao Chung, Tim Roughgarden, Elaine Shi
2024/236 (PDF ) New Black-Box Separations through Mathematically Structured Primitives Hart Montgomery, Sikhar Patranabis
2024/235 (PDF ) Pseudorandom Error-Correcting Codes Miranda Christ, Sam Gunn
2024/234 (PDF ) Bare PAKE: Universally Composable Key Exchange from just Passwords Manuel Barbosa, Kai Gellert, Julia Hesse, Stanislaw Jarecki
2024/233 (PDF ) Cayley hashing with cookies Vladimir Shpilrain, Bianca Sosnovski
2024/232 (PDF ) On the Security of Nova Recursive Proof System: Limitations of and Alternatives to Bounded-Depth Analysis Hyeonbum Lee, Jae Hong Seo
2024/231 (PDF ) Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices Eugene Frimpong, Alexandros Bakas, Camille Foucault, Antonis Michalas
2024/230 (PDF ) Analysis of Layered ROLLO-I: A BII-LRPC code-based KEM Seongtaek Chee, Kyung Chul Jeong, Tanja Lange, Nari Lee, Alex Pellegrini, Hansol Ryu
2024/229 (PDF ) Strong Batching for Non-Interactive Statistical Zero-Knowledge Changrui Mu, Shafik Nassar, Ron D. Rothblum, Prashant Nalini Vasudevan
2024/228 (PDF ) On the Untapped Potential of the Quantum FLT-based Inversion Ren Taguchi, Atsushi Takayasu
2024/227 (PDF ) Adaptively Sound Zero-Knowledge SNARKs for UP Surya Mathialagan, Spencer Peters, Vinod Vaikuntanathan
2024/226 (PDF ) Attribute-based Keyed (Fully) Homomorphic Encryption Keita Emura, Shingo Sato, Atsushi Takayasu
2024/225 (PDF ) Universal Computational Extractors and Multi-Bit AIPO from Lattice Assumptions Yilei Chen, Xinyu Mao
2024/224 (PDF ) Amplification of Non-Interactive Zero Knowledge, Revisited Nir Bitansky, Nathan Geier
2024/223 (PDF ) Game-Theoretically Fair Distributed Sampling Sri AravindaKrishnan Thyagarajan, Ke Wu, Pratik Soni
2024/222 (PDF ) Reducing the Number of Qubits in Quantum Factoring Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher
2024/221 (PDF ) Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics Dimitris Mouris, Christopher Patton, Hannah Davis, Pratik Sarkar, Nektarios Georgios Tsoutsos
2024/220 (PDF ) Security of Symmetric Ratchets and Key Chains - Implications for Protocols like TLS 1.3, Signal, and PQ3 John Preuß Mattsson
2024/219 (PDF ) Singular points of UOV and VOX Pierre Pébereau
2024/218 (PDF ) Lightweight Leakage-Resilient PRNG from TBCs using Superposition Mustafa Khairallah, Srinivasan Yadhunathan, Shivam Bhasin
2024/217 (PDF ) Hardware Acceleration of the Prime-Factor and Rader NTT for BGV Fully Homomorphic Encryption David Du Pont, Jonas Bertels, Furkan Turan, Michiel Van Beirendonck, Ingrid Verbauwhede
2024/216 (PDF ) Rate-1 Fully Local Somewhere Extractable Hashing from DDH Pedro Branco, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto
2024/215 (PDF ) Batch PIR and Labeled PSI with Oblivious Ciphertext Compression Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo
2024/214 (PDF ) Distributed Fiat-Shamir Transform: from Threshold Identification Protocols to Signatures Michele Battagliola, Andrea Flamini
2024/213 (PDF ) A Note on Adversarial Online Complexity in Security Proofs of Duplex-Based Authenticated Encryption Modes Charlotte Lefevre
2024/212 (PDF ) Analysis of a Programmable Quantum Annealer as a Random Number Generator Elijah Pelofske
2024/211 (PDF ) INSPECT: Investigating Supply Chain and Cyber-Physical Security of Battery Systems Tao Zhang, Shang Shi, Md Habibur Rahman, Nitin Varshney, Akshay Kulkarni, Farimah Farahmandi, Mark Tehranipoor
2024/210 (PDF ) Rollerblade: Replicated Distributed Protocol Emulation on Top of Ledgers Dionysis Zindros, Apostolos Tzinas, David Tse
2024/209 (PDF ) General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption Konstantinos Brazitikos, Vassilis Zikas
2024/207 (PDF ) NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness Prabhanjan Ananth, Gilad Asharov, Vipul Goyal, Hadar Kaner, Pratik Soni, Brent Waters
2024/206 (PDF ) Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead Yizhong Liu, Andi Liu, Yuan Lu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Song Bian, Mauro Conti
2024/204 (PDF ) PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation Zeyu Liu, Eran Tromer, Yunhao Wang
2024/203 (PDF ) Application-Aware Approximate Homomorphic Encryption: Configuring FHE for Practical Use Andreea Alexandru, Ahmad Al Badawi, Daniele Micciancio, Yuriy Polyakov
2024/202 (PDF ) Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability Mark Manulis, Jérôme Nguyen
2024/201 (PDF ) Breaking the decisional Diffie-Hellman problem in totally non-maximal imaginary quadratic orders Antonio Sanso
2024/200 (PDF ) A Better Proof-of-Work Fork Choice Rule Dionysis Zindros, Apostolos Tzinas, Karl Kreder, Shreekara Shastry, Sriram Vishwanath
2024/199 (PDF ) Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul
2024/198 (PDF ) Distributed Randomness using Weighted VUFs Sourav Das, Benny Pinkas, Alin Tomescu, Zhuolun Xiang
2024/197 (PDF ) Alba: The Dawn of Scalable Bridges for Blockchains Giulia Scaffino, Lukas Aumayr, Mahsa Bastankhah, Zeta Avarikioti, Matteo Maffei
2024/196 (PDF ) Subfield attack: leveraging composite-degree extensions in the Quotient Ring transform Pierre Pébereau
2024/195 (PDF ) PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs Décio Luiz Gazzoni Filho, Guilherme Brandão, Gora Adj, Arwa Alblooshi, Isaac A. Canales-Martínez, Jorge Chávez-Saab, Julio López
2024/194 (PDF ) Helium: Scalable MPC among Lightweight Participants and under Churn Christian Mouchet, Sylvain Chatel, Apostolos Pyrgelis, Carmela Troncoso
2024/192 (PDF ) Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism Elette Boyle, Lisa Kohl, Zhe Li, Peter Scholl
2024/191 (PDF ) A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions Steven Galbraith, Yi-Fu Lai, Hart Montgomery
2024/190 (PDF ) Constructing Committing and Leakage-Resilient Authenticated Encryption Patrick Struck, Maximiliane Weishäupl
2024/189 (PDF ) ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution Haoqian Zhang, Michelle Yeo, Vero Estrada-Galinanes, Bryan Ford
2024/188 (PDF ) HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted Yanxue Jia, Varun Madathil, Aniket Kate
2024/187 (PDF ) On the bijectivity of the map $\chi$ Anna-Maurin Graner, Björn Kriepke, Lucas Krompholz, Gohar M. Kyureghyan
2024/186 (PDF ) RAD-FS: Remote Timing and Power SCA Security in DVFS-Augmented Ultra-Low-Power Embedded Systems Daniel Dobkin, Nimrod Cever, Itamar Levi
2024/185 (PDF ) Vortex: A List Polynomial Commitment and its Application to Arguments of Knowledge Alexandre Belling, Azam Soleimanian, Bogdan Ursu
2024/184 (PDF ) Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions Rafael del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani Saarinen
2024/183 (PDF ) On Security Proofs of Existing Equivalence Class Signature Schemes Balthazar Bauer, Georg Fuchsbauer, Fabian Regen
2024/182 (PDF ) FileDES: A Secure, Scalable and Succinct Decentralized Encrypted Storage Network Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng, Dongxiao Yu, Qin Hu, Yijun Li, Yipu Wu
2024/181 (PDF ) Functional Bootstrapping for Packed Ciphertexts via Homomorphic LUT Evaluation Dongwon Lee, Seonhong Min, Yongsoo Song
2024/180 (PDF ) Exploiting RPMB authentication in a closed source TEE implementation Aya Fukami, Richard Buurke, Zeno Geradts
2024/179 (PDF ) Traitor Tracing without Trusted Authority from Registered Functional Encryption Pedro Branco, Russell W. F. Lai, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Ivy K. Y. Woo
2024/178 (PDF ) Fast Public-Key Silent OT and More from Constrained Naor-Reingold Dung Bui, Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia
2024/177 (PDF ) Registered Functional Encryption for Quadratic Functions from MDDH Qiaohan Chu, Li Lin, Chen Qian, Jie Chen
2024/176 (PDF ) The impact of data-heavy, post-quantum TLS 1.3 on the Time-To-Last-Byte of real-world connections Panos Kampanakis, Will Childs-Klein
2024/175 (PDF ) Lossy Cryptography from Code-Based Assumptions Quang Dao, Aayush Jain
2024/174 (PDF ) QPP and HPPK: Unifying Non-Commutativity for Quantum-Secure Cryptography with Galois Permutation Group Randy Kuang
2024/173 (PDF ) Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions Helger Lipmaa, Roberto Parisella, Janno Siim
2024/172 (PDF ) Relaxed Functional Bootstrapping: A New Perspective on BGV and BFV Bootstrapping Zeyu Liu, Yunhao Wang
2024/171 (PDF ) Approximate Methods for the Computation of Step Functions in Homomorphic Encryption Tairong Huang, Shihe Ma, Anyu Wang, XiaoYun Wang
2024/170 (PDF ) Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis Trevor Yap Hong Eng, Shivam Bhasin, Léo Weissbart
2024/169 (PDF ) Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Anupam Chattopadhyay
2024/168 (PDF ) Dragon: Decentralization at the cost of Representation after Arbitrary Grouping and Its Applications to Sub-cubic DKG and Interactive Consistency Hanwen Feng, Zhenliang Lu, Qiang Tang
2024/167 (PDF ) Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack Trevor Yap, Dirmanto Jap
2024/166 (PDF ) A Practical MinRank Attack Against VOX Hao Guo, Jintai Ding
2024/165 (PDF ) Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation Brent Waters, David J. Wu
2024/164 (PDF ) Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang
2024/163 (PDF ) On Tweakable Correlation Robust Hashing against Key Leakages Chun Guo, Xiao Wang, Kang Yang, Yu Yu
2024/162 (PDF ) Zero-Knowledge Proofs of Training for Deep Neural Networks Kasra Abbaszadeh, Christodoulos Pappas, Jonathan Katz, Dimitrios Papadopoulos
2024/161 (PDF ) zkMatrix: Batched Short Proof for Committed Matrix Multiplication Mingshu Cong, Tsz Hon Yuen, Siu Ming Yiu
2024/160 (PDF ) LightDAG: A Low-latency DAG-based BFT Consensus through Lightweight Broadcast Xiaohai Dai, Guanxiong Wang, Jiang Xiao, Zhengxuan Guo, Rui Hao, Xia Xie, Hai Jin
2024/159 (PDF ) Logstar: Efficient Linear* Time Secure Merge Suvradip Chakraborty, Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal
2024/158 (PDF ) HiSE: Hierarchical (Threshold) Symmetric-key Encryption Pousali Dey, Pratyay Mukherjee, Swagata Sasmal, Rohit Sinha
2024/157 (PDF ) Delphi: sharing assessments of cryptographic assumptions Jeroen van de Graaf, Arjen K. Lenstra
2024/156 (PDF ) Homomorphic sign evaluation with a RNS representation of integers Philippe Chartier, Michel Koskas, Mohammed Lemou, Florian Méhats
2024/155 (PDF ) Fully Homomorphic Encryption on large integers Philippe Chartier, Michel Koskas, Mohammed Lemou, Florian Méhats
2024/154 (PDF ) Broadcast Encryption using Sum-Product decomposition of Boolean functions Aurélien Dupin, Simon Abelard
2024/153 (PDF ) Revisiting the Slot-to-Coefficient Transformation for BGV and BFV Robin Geelen
2024/152 (PDF ) Equivalence of Generalised Feistel Networks Patrick Derbez, Marie Euler
2024/151 (PDF ) Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing Antonio Flórez-Gutiérrez, Yosuke Todo
2024/150 (PDF ) SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, Francois Charton, Kristin Lauter
2024/149 (PDF ) Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang
2024/148 (PDF ) Preliminary Cryptanalysis of the Biscuit Signature Scheme Charles Bouillaguet, Julia Sauvage
2024/147 (PDF ) Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks Thorben Moos, Sayandeep Saha, François-Xavier Standaert
2024/146 (PDF ) Computing Orientations from the Endomorphism Ring of Supersingular Curves and Applications Jonathan Komada Eriksen, Antonin Leroux
2024/145 (PDF ) Practical Batch Proofs of Exponentiation Charlotte Hoffmann, Pavel Hubáček, Svetlana Ivanova
2024/144 (PDF ) Efficient (3,3)-isogenies on fast Kummer surfaces Maria Corte-Real Santos, Craig Costello, Benjamin Smith
2024/143 (PDF ) Scalable Collaborative zk-SNARK: Fully Distributed Proof Generation and Malicious Security Xuanming Liu, Zhelei Zhou, Yinghao Wang, Bingsheng Zhang, Xiaohu Yang
2024/142 (PDF ) GradedDAG: An Asynchronous DAG-based BFT Consensus with Lower Latency Xiaohai Dai, Zhaonan Zhang, Jiang Xiao, Jingtao Yue, Xia Xie, Hai Jin
2024/141 (PDF ) Secure Statistical Analysis on Multiple Datasets: Join and Group-By Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Junichi Tomida
2024/140 (PDF ) Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps Binbin Tu, Min Zhang, Yu Chen
2024/139 (PDF ) Efficient Arithmetic in Garbled Circuits David Heath
2024/138 (PDF ) Correction Fault Attacks on Randomized CRYSTALS-Dilithium Elisabeth Krahmer, Peter Pessl, Georg Land, Tim Güneysu
2024/137 (PDF ) Consensus in the Known Participation Model with Byzantine Failures and Sleepy Replicas Chenxu Wang, Sisi Duan, Minghui Xu, Feng Li, Xiuzhen Cheng
2024/136 (PDF ) Secure Transformer Inference Made Non-interactive Jiawen Zhang, Xinpeng Yang, Lipeng He, Kejia Chen, Wen-jie Lu, Yinghao Wang, Xiaoyang Hou, Jian Liu, Kui Ren, Xiaohu Yang
2024/135 (PDF ) A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks Kexin Qiao, Zhaoyang Wang, Heng Chang, Siwei Sun, Zehan Wu, Junjie Cheng, Changhai Ou, An Wang, Liehuang Zhu
2024/134 (PDF ) Byzantine Fault Tolerance with Non-Determinism, Revisited Yue Huang, Huizhong Li, Yi Sun, Sisi Duan
2024/133 (PDF ) Optimizing Implementations of Boolean Functions Meltem Sonmez Turan
2024/132 (PDF ) SimpleFT: A Simple Byzantine Fault Tolerant Consensus Rui Hao, Chenglong Yi, Weiqi Dai, Zhaonan Zhang
2024/131 (PDF ) Practical Post-Quantum Signatures for Privacy Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders
2024/130 (PDF ) HADES: Automated Hardware Design Exploration for Cryptographic Primitives Fabian Buschkowski, Georg Land, Niklas Höher, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
2024/129 (PDF ) Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers Gideon Samid
2024/128 (PDF ) Non-Binding (Designated Verifier) Signature Ehsan Ebrahimi
2024/127 (PDF ) Attacks Against the INDCPA-D Security of Exact FHE Schemes Jung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, Elias Suvanto
2024/126 (PDF ) Monte Carlo Tree Search for automatic differential characteristics search: application to SPECK Emanuele Bellini, David Gerault, Matteo Protopapa, Matteo Rossi
2024/124 (PDF ) Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks Akira Ito, Rei Ueno, Naofumi Homma
2024/123 (PDF ) Memory Checking Requires Logarithmic Overhead Elette Boyle, Ilan Komargodski, Neekon Vafa
2024/122 (PDF ) SPRITE: Secure and Private Routing in Payment Channel Networks Gaurav Panwar, Roopa Vishwanathan, George Torres, Satyajayant Misra
2024/121 (PDF ) An acceleration of the AKS prime identification algorithm Stephen Meredith Williams
2024/120 (PDF ) K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay
2024/119 (PDF ) R3PO: Reach-Restricted Reactive Program Obfuscation and its Application to MA-ABE Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran, Rajeev Raghunath
2024/118 (PDF ) Data Privacy Made Easy: Enhancing Applications with Homomorphic Encryption Charles Gouert, Nektarios Georgios Tsoutsos
2024/117 (PDF ) Breaking HWQCS: a code-based signature scheme from high weight QC-LDPC codes Alex Pellegrini, Giovanni Tognolini
2024/116 (PDF ) On the practical CPAD security of “exact” and threshold FHE schemes and libraries Marina Checri, Renaud Sirdey, Aymen Boudguiga, Jean-Paul Bultel
2024/115 (PDF ) Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$ Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang
2024/114 (PDF ) X2X: Low-Randomness and High-Throughput A2B and B2A Conversions for $d+1$ shares in Hardware Quinten Norga, Jan-Pieter D'Anvers, Suparna Kundu, Ingrid Verbauwhede
2024/113 (PDF ) Improved Linear Key Recovery Attacks on PRESENT Wenhui Wu, Muzhou Li, Meiqin Wang
2024/112 (PDF ) pqm4: Benchmarking NIST Additional Post-Quantum Signature Schemes on Microcontrollers Matthias J. Kannwischer, Markus Krausz, Richard Petri, Shang-Yi Yang
2024/111 (PDF ) A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation Yong Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao, Zehua Qiao, Huaxin Wang
2024/110 (PDF ) Cryptanalysis of the SNOVA signature scheme Peigen Li, Jintai Ding
2024/109 (PDF ) Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS Jaehyung Kim, Jinyeong Seo, Yongsoo Song
2024/108 (PDF ) Some Improvements for the PIOP for ZeroCheck Angus Gruen
2024/107 (PDF ) ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, Antonio Marcedone
2024/106 (PDF ) A Trust-based Recommender System over Arbitrarily Partitioned Data with Privacy Ibrahim Yakut, Huseyin Polat
2024/105 (PDF ) Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gerault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti
2024/104 (PDF ) AnonPSI: An Anonymity Assessment Framework for PSI Bo Jiang, Jian Du, Qiang Yan
2024/103 (PDF ) ChaCha related 64 bit oriented ARX cipher Daniel Nager
2024/102 (PDF ) Laconic Branching Programs from the Diffie-Hellman Assumption Sanjam Garg, Mohammad Hajiabadi, Peihan Miao, Alice Murphy
2024/101 (PDF ) Unconditional Security using (Random) Anonymous Bulletin Board Albert Yu, Hai H. Nguyen, Aniket Kate, Hemanta K. Maji
2024/100 (PDF ) Fuzzy Extractors are Practical: Cryptographic Strength Key Derivation from the Iris Amey Shukla, Luke Demarest, Benjamin Fuller, Sohaib Ahmad, Caleb Manicke, Alexander Russell, Sixia Chen
2024/099 (PDF ) Snarktor: A Decentralized Protocol for Scaling SNARKs Verification in Blockchains Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
2024/098 (PDF ) Theoretical differential fault attacks on FLIP and FiLIP Pierrick Méaux, Dibyendu Roy
2024/097 (PDF ) Faster VOLEitH Signatures from All-but-One Vector Commitment and Half-Tree Dung Bui, Kelong Cong, Cyprien Delpech de Saint Guilhem
2024/096 (PDF ) Revisiting the security analysis of SNOVA Yasuhiko Ikematsu, Rika Akiyama
2024/095 (PDF ) ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin
2024/094 (PDF ) Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade
2024/093 (PDF ) Short Code-based One-out-of-Many Proofs and Applications Xindong Liu, Li-Ping Wang
2024/092 (PDF ) Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries Sofía Celi, Alex Davidson
2024/091 (PDF ) On historical Multivariate Cryptosystems and their restorations as instruments of Post-Quantum Cryptography Vasyl Ustimenko
2024/090 (PDF ) Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller
2024/089 (PDF ) Two-party GOST in two parts: fruitless search and fruitful synthesis Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Lidiia Nikiforova, Stanislav Smyshlyaev
2024/088 (PDF ) Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices Slim Bettaieb, Loïc Bidoux, Alessandro Budroni, Marco Palumbi, Lucas Pandolfo Perin
2024/087 (PDF ) Tree-based Lookup Table on Batched Encrypted Queries using Homomorphic Encryption Jung Hee Cheon, Hyeongmin Choe, Jai Hyun Park
2024/086 (PDF ) On Hilbert-Poincaré series of affine semi-regular polynomial sequences and related Gröbner bases Momonari Kudo, Kazuhiro Yokoyama
2024/085 (PDF ) Simultaneously simple universal and indifferentiable hashing to elliptic curves Dimitri Koshelev
2024/084 (PDF ) Efficient Instances of Docked Double Decker With AES, and Application to Authenticated Encryption Christoph Dobraunig, Krystian Matusiewicz, Bart Mennink, Alexander Tereschenko
2024/083 (PDF ) Layout Graphs, Random Walks and the t-wise Independence of SPN Block Ciphers Tianren Liu, Angelos Pelecanos, Stefano Tessaro, Vinod Vaikuntanathan
2024/082 (PDF ) Quantum State Obfuscation from Classical Oracles James Bartusek, Zvika Brakerski, Vinod Vaikuntanathan
2024/081 (PDF ) SuperFL: Privacy-Preserving Federated Learning with Efficiency and Robustness Yulin Zhao, Hualin Zhou, Zhiguo Wan
2024/080 (PDF ) Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions Samuel Jaques
2024/078 (PDF ) Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process Pedram Hosseyni, Ralf Kuesters, Tim Würtele
2024/077 (PDF ) OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko
2024/076 (PDF ) A provably masked implementation of BIKE Key Encapsulation Mechanism Loïc Demange, Mélissa Rossi
2024/075 (PDF ) Succinct Verification of Compressed Sigma Protocols in the Updatable SRS setting Moumita Dutta, Chaya Ganesh, Neha Jawalkar
2024/074 (PDF ) PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers Beyza Bozdemir, Betül Aşkın Özdemir, Melek Önen
2024/073 (PDF ) A Comparative Examination of Network and Contract-Based Blockchain Storage Solutions for Decentralized Applications Lipeng He
2024/072 (PDF ) 1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji
2024/071 (PDF ) Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis Seyedmohammad Nouraniboosjin, Fatemeh Ganji
2024/070 (PDF ) Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng
2024/069 (PDF ) SDitH in Hardware Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue
2024/068 (PDF ) Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation Fangqi Dong, Zihan Hao, Ethan Mook, Daniel Wichs
2024/067 (PDF ) A Refined Hardness Estimation of LWE in Two-step Mode Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang
2024/066 (PDF ) Exploiting the Central Reduction in Lattice-Based Cryptography Tolun Tosun, Amir Moradi, Erkay Savas
2024/065 (PDF ) Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation Marie Beth van Egmond, Vincent Dunning, Stefan van den Berg, Thomas Rooijakkers, Alex Sangers, Ton Poppe, Jan Veldsink
2024/064 (PDF ) Extreme Algebraic Attacks Pierrick Méaux, Qingju Wang
2024/061 (PDF ) Partial Key Exposure Attack on Common Prime RSA Mengce Zheng
2024/060 (PDF ) The Insecurity of Masked Comparisons: SCAs on ML-KEM’s FO-Transform Julius Hermelink, Kai-Chun Ning, Richard Petri, Emanuele Strieder
2024/059 (PDF ) CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors Oren Ganon, Itamar Levi
2024/058 (PDF ) Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions Sacha Servan-Schreiber
2024/057 (PDF ) Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou
2024/056 (PDF ) Zero-Knowledge Proofs for SIDH variants with Masked Degree or Torsion Youcef Mokrani, David Jao
2024/055 (PDF ) Multi-Hop Fine-Grained Proxy Re-Encryption Yunxiao Zhou, Shengli Liu, Shuai Han
2024/054 (PDF ) FEASE: Fast and Expressive Asymmetric Searchable Encryption Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu
2024/053 (PDF ) Anonymous Homomorphic IBE with Application to Anonymous Aggregation Michael Clear, Ciaran McGoldrick, Hitesh Tewari
2024/052 (PDF ) Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash SAHIBA SURYAWANSHI, Shibam Ghosh, Dhiman Saha, Prathamesh Ram
2024/051 (PDF ) Limits on Authenticated Encryption Use in TLS Atul Luykx, Kenneth G. Paterson
2024/050 (PDF ) Do You Need a Zero Knowledge Proof? Jens Ernstberger, Stefanos Chaliasos, Liyi Zhou, Philipp Jovanovic, Arthur Gervais
2024/049 (PDF ) CL-SCA: A Contrastive Learning Approach for Profiled Side-Channel Analysis Annv Liu, An Wang, Shaofei Sun, Congming Wei, Yaoling Ding, Yongjuan Wang, Liehuang Zhu
2024/048 (PDF ) Computational Differential Privacy for Encrypted Databases Supporting Linear Queries Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, Duong Hieu Phan
2024/047 (PDF ) On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy, Stefano Trevisani
2024/046 (PDF ) Quantum-Secure Hybrid Communication for Aviation Infrastructure Benjamin Dowling, Bhagya Wimalasiri
2024/045 (PDF ) A Low-Latency High-Order Arithmetic to Boolean Masking Conversion Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, Leibo Liu
2024/044 (PDF ) Adaptive Distributional Security for Garbling Schemes with $\mathcal{O}(|x|)$ Online Complexity Estuardo Alpírez Bock, Chris Brzuska, Pihla Karanko, Sabine Oechsner, Kirthivaasan Puniamurthy
2024/043 (PDF ) Fuzzy Identity Based Encryption with a flexible threshold value Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar
2024/042 (PDF ) Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions Jan Bobolz, Jesus Diaz, Markulf Kohlweiss
2024/041 (PDF ) SASTA: Single-Fault Nonce Respecting Differential Attack on Hybrid Homomorphic Encryption Aikata Aikata, Ahaan Dabholkar, Dhiman Saha, Sujoy Sinha Roy
2024/040 (PDF ) ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, Kaiyi Zhang
2024/039 (PDF ) X-Wing: The Hybrid KEM You’ve Been Looking For Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karolin Varner, Bas Westerbaan
2024/038 (PDF ) On Computing the Multidimensional Scalar Multiplication on Elliptic Curves Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, Leila Ben Abdelghani
2024/037 (PDF ) Computing $2$-isogenies between Kummer lines Damien Robert, Nicolas Sarkis
2024/036 (PDF ) Blink: Breaking Lattice-Based Schemes Implemented in Parallel with Chosen-Ciphertext Attack Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li
2024/035 (PDF ) A New Approach to Efficient and Secure Fixed-point Computation Tore Kasper Frederiksen, Jonas Lindstrøm, Mikkel Wienberg Madsen, Anne Dorte Spangsberg
2024/034 (PDF ) How (not) to hash into class groups of imaginary quadratic fields? István András Seres, Péter Burcsi, Péter Kutas
2024/033 (PDF ) Security analysis and improvements on a semi-quantum electronic voting protocol Qiu Shujing, Xin Xiangjun, Zheng Qian, Li Chaoyang, Li Fagen
2024/032 (PDF ) Verifiable FHE via Lattice-based SNARKs Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, Jannik Spiessens
2024/031 (PDF ) Feldman's Verifiable Secret Sharing for a Dishonest Majority Yi-Hsiu Chen, Yehuda Lindell
2024/030 (PDF ) Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs Thomas Debris-Alazard, Pouria Fallahpour, Damien Stehlé
2024/029 (PDF ) YouChoose: A Lightweight Anonymous Proof of Account Ownership Aarav Varshney, Prashant Agrawal, Mahabir Prasad Jhanwar
2024/028 (PDF ) Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis Hoeteck Wee, David J. Wu
2024/027 (PDF ) Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang
2024/026 (PDF ) Towards Compact Identity-based Encryption on Ideal Lattices Huiwen Jia, Yupu Hu, Chunming Tang, Lin Wang
2024/025 (PDF ) Bitcoin Clique: Channel-free Off-chain Payments using Two-Shot Adaptor Signatures Siavash Riahi, Orfeas Stefanos Thyfronitis Litos
2024/024 (PDF ) FlexHi: A Flexible Hierarchical Threshold Signature Scheme Muhammed Ali Bingol, Sermin Kocaman, Ali Dogan, Sibel Kurt Toplu
2024/023 (PDF ) CCA Security with Short AEAD Tags Mustafa Khairallah
2024/022 (PDF ) Fully Dynamic Attribute-Based Signatures for Circuits from Codes San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu
2024/021 (PDF ) Designing homomorphic encryptions with rational functions Gerald Gavin, Sandrine Tainturier
2024/020 (PDF ) EROR: Efficient Repliable Onion Routing with Strong Provable Privacy Michael Klooß, Andy Rupp, Daniel Schadt, Thorsten Strufe, Christiane Weis
2024/019 (PDF ) Benchmark Performance of Homomorphic Polynomial Public Key Cryptography for Key Encapsulation and Digital Signature Schemes Randy Kuang, Maria Perepechaenko, Dafu Lou, Brinda Tank
2024/018 (PDF ) Smaller Sphincs$^{+}$ Scott Fluhrer, Quynh Dang
2024/017 (PDF ) PT-symmetric mapping of three states and its implementation on a cloud quantum processor Yaroslav Balytskyi, Yevgen Kotukh, Gennady Khalimov, Sang-Yoon Chang
2024/016 (PDF ) Reducing the computational complexity of fuzzy identity-based encryption from lattice Sedigheh Khajouei-Nejad, Hamid Haj Seyyed Javadi, Sam Jabbehdari, Seyed Mohammad Hossein Moattar
2024/015 (PDF ) Unconditionally secure MPC for Boolean circuits with constant online communication Zhenkai Hu, Kang Yang, Yu Yu
2024/014 (PDF ) A Lattice-based Accountable Subgroup Multi-signature Scheme with Verifiable Group Setup Ahmet Ramazan Ağırtaş, Oğuz YAYLA
2024/013 (PDF ) A note on ``intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era'' Zhengjun Cao, Lihua Liu
2024/012 (PDF ) Two-Round ID-PAKE with strong PFS and single pairing operation Behnam Zahednejad, Gao Chong-zhi
2024/011 (PDF ) MetaDORAM: Info-Theoretic Distributed ORAM with Less Communication Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2024/010 (PDF ) On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs Sulaiman Alhussaini, Craig Collett, Serge˘ı Sergeev
2024/009 (PDF ) Information-Theoretically Secure Distributed Protocols for Two-Party MPC Primitives Tamir Tassa, Aviad Ben Arie
2024/008 (PDF ) SoK: Methods for Sampling Random Permutations in Post-Quantum Cryptography Alessandro Budroni, Isaac A. Canales-Martínez, Lucas Pandolfo Perin
2024/007 (PDF ) Password Protected Universal Thresholdizer Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, Willy Susilo
2024/006 (PDF ) Towards general-purpose program obfuscation via local mixing Ran Canetti, Claudio Chamon, Eduardo Mucciolo, Andrei Ruckenstein
2024/005 (PDF ) The Multiple Millionaires' Problem: New Algorithmic Approaches and Protocols Tamir Tassa, Avishay Yanai
2024/004 (PDF ) Practical Two-party Computational Differential Privacy with Active Security Fredrik Meisingseth, Christian Rechberger, Fabian Schmid
2024/003 (PDF ) Simple Soundness Proofs Alex Kampa
2024/002 (PDF ) Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López
2024/001 (PDF ) On short digital signatures with Eulerian transformations Vasyl Ustimenko
2023/1973 (PDF ) Combinatorially Homomorphic Encryption Yuval Ishai, Eyal Kushnir, Ron D. Rothblum
2023/1972 (PDF ) Hard Languages in $\mathsf{NP} \cap \mathsf{coNP}$ and NIZK Proofs from Unstructured Hardness Riddhi Ghosal, Yuval Ishai, Alexis Korb, Eyal Kushilevitz, Paul Lou, Amit Sahai
2023/1971 (PDF ) Precision For A Qubit Operation and Failure of Achieving Quantum Supremacy Zhengjun Cao, Zhenfu Cao
2023/1970 (PDF ) Construction of Maiorana-McFarland type cryptographically significant Boolean functions with good implementation properties Deng Tang, Anupam Chattopadhyay, Manmatha Roy, Subhamoy Maitra, Bimal Mandal
2023/1969 (PDF ) Secure and Practical Functional Dependency Discovery in Outsourced Databases Xinle Cao, Yuhan Li, Dmytro Bogatov, Jian Liu, Kui Ren
2023/1968 (PDF ) Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model Kelsey A. Jackson, Carl A. Miller, Daochen Wang
2023/1967 (PDF ) Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption Shafik Nassar, Brent Waters, David J. Wu
2023/1966 (PDF ) How to Make Rational Arguments Practical and Extractable Matteo Campanelli, Chaya Ganesh, Rosario Gennaro
2023/1965 (PDF ) More Efficient Public-Key Cryptography with Leakage and Tamper Resilience Shuai Han, Shengli Liu, Dawu Gu
2023/1964 (PDF ) Maypoles: Lightning Striking Twice Clara Shikhelman
2023/1963 (PDF ) A Small Serving of Mash: (Quantum) Algorithms for SPDH-Sign with Small Parameters Andrew Mendelsohn, Edmund Dable-Heath, Cong Ling
2023/1962 (PDF ) A Survey of Polynomial Multiplications for Lattice-Based Cryptosystems Vincent Hwang
2023/1961 (PDF ) On The Practical Advantage of Committing Challenges in Zero-Knowledge Protocols David Naccache, Ofer Yifrach-Stav
2023/1960 (PDF ) Post Quantum Sphinx David Anthony Stainton
2023/1959 (PDF ) On the notion of carries of numbers $2^n-1$ and Scholz conjecture Theophilus Agama
2023/1958 (PDF ) Revisiting Pairing-friendly Curves with Embedding Degrees 10 and 14 Yu Dai, Debiao He, Cong Peng, Zhijian Yang, Chang-an Zhao
2023/1957 (PDF ) Chosen Ciphertext Security via BARGs Takahiro Matsuda
2023/1956 (PDF ) A Signature Scheme from Full-Distance Syndrome Decoding Abdelhaliem Babiker
2023/1955 (PDF ) Barrett Multiplication for Dilithium on Embedded Devices Vincent Hwang, YoungBeom Kim, Seog Chung Seo
2023/1954 (PDF ) Fiat-Shamir Goes Tropical Rémi Géraud-Stewart, David Naccache, Ofer Yifrach-Stav
2023/1953 (PDF ) Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem Muhammad Imran, Gábor Ivanyos
2023/1952 (PDF ) Overview and Discussion of Attacks on CRYSTALS-Kyber Stone Li
2023/1951 (PDF ) Protection Against Subversion Corruptions via Reverse Firewalls in the Plain Universal Composability Framework Paula Arnold, Sebastian Berndt, Jörn Müller-Quade, Astrid Ottenhues
2023/1950 (PDF ) GigaDORAM: Breaking the Billion Address Barrier Brett Falk, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang
2023/1949 (PDF ) HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical Diego F. Aranha, Anamaria Costache, Antonio Guimarães, Eduardo Soria-Vazquez
2023/1948 (PDF ) PriDe CT: Towards Public Consensus, Private Transactions, and Forward Secrecy in Decentralized Payments Yue Guo, Harish Karthikeyan, Antigoni Polychroniadou, Chaddy Huussin
2023/1947 (PDF ) Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures Marloes Venema, Leon Botros
2023/1946 (PDF ) SnarkFold: Efficient Proof Aggregation from Incrementally Verifiable Computation and Applications Xun Liu, Shang Gao, Tianyu Zheng, Yu Guo, Bin Xiao
2023/1945 (PDF ) The Fiat--Shamir Transformation of $(\Gamma_1,\dots,\Gamma_\mu)$-Special-Sound Interactive Proofs Thomas Attema, Serge Fehr, Michael Klooß, Nicolas Resch
2023/1944 (PDF ) Revisiting The Multiple of Property for SKINNY The Exact Computation of the number of right pairs Hanbeom Shin, Insung Kim, Sunyeop Kim, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
2023/1943 (PDF ) Distinguisher and Related-Key Attack on HALFLOOP-96 Jinpeng Liu, Ling Sun
2023/1942 (PDF ) Traceable mixnets Prashant Agrawal, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, Subhashis Banerjee
2023/1941 (PDF ) Upgrading Fuzzy Extractors Chloe Cachet, Ariel Hamlin, Maryam Rezapour, Benjamin Fuller
2023/1940 (PDF ) Concrete Time/Memory Trade-Offs in Generalised Stern’s ISD Algorithm Sreyosi Bhattacharyya, Palash Sarkar
2023/1939 (PDF ) Applications of Neural Network-Based AI in Cryptography Abderrahmane Nitaj, Tajjeeddine Rachidi
2023/1938 (PDF ) Batch Arguments to NIZKs from One-Way Functions Eli Bradley, Brent Waters, David J. Wu
2023/1937 (PDF ) Revocable Quantum Digital Signatures Tomoyuki Morimae, Alexander Poremba, Takashi Yamakawa
2023/1936 (PDF ) LERNA: Secure Single-Server Aggregation via Key-Homomorphic Masking Hanjun Li, Huijia Lin, Antigoni Polychroniadou, Stefano Tessaro
2023/1935 (PDF ) The Splitting Field of $Y^n-2$, Two-Variable NTT and Lattice-Based Cryptography Wenzhe Yang
2023/1934 (PDF ) More efficient comparison protocols for MPC Wicher Malten, Mehmet Ugurbil, Miguel de Vega
2023/1933 (PDF ) Keeping Up with the KEMs: Stronger Security Notions for KEMs and Automated Analysis of KEM-based protocols Cas Cremers, Alexander Dax, Niklas Medinger
2023/1932 (PDF ) Multipars: Reduced-Communication MPC over Z2k Sebastian Hasler, Pascal Reisert, Marc Rivinius, Ralf Küsters
2023/1931 (PDF ) Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality? Ruize Wang, Kalle Ngo, Joel Gärtner, Elena Dubrova
2023/1930 (PDF ) Toward A Practical Multi-party Private Set Union Jiahui Gao, Son Nguyen, Ni Trieu
2023/1929 (PDF ) Cryptography from Planted Graphs: Security with Logarithmic-Size Messages Damiano Abram, Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan
2023/1928 (PDF ) Unconditionally Secure Quantum Bit Commitment and Quantum Oblivious Transfer Ping Wang, Yikang Lei, Yiting Su
2023/1927 (PDF ) Holepunch: Fast, Secure File Deletion with Crash Consistency Zachary Ratliff, Wittmann Goh, Abe Wieland, James Mickens, Ryan Williams
2023/1926 (PDF ) NOTRY: deniable messaging with retroactive avowal Faxing Wang, Shaanan Cohney, Riad Wahby, Joseph Bonneau
2023/1925 (PDF ) VDOO: A Short, Fast, Post-Quantum Multivariate Digital Signature Scheme Anindya ganguly, Angshuman Karmakar, Nitin Saxena
2023/1924 (PDF ) Analyzing the complexity of reference post-quantum software: the case of lattice-based KEMs Daniel J. Bernstein
2023/1923 (PDF ) Differential Fault Attack on Ascon Cipher Amit Jana
2023/1922 (PDF ) One for All, All for Ascon: Ensemble-based Deep Learning Side-channel Analysis Azade Rezaeezade, Abraham Basurto-Becerra, Léo Weissbart, Guilherme Perin
2023/1921 (PDF ) Automated Issuance of Post-Quantum Certificates: a New Challenge Alexandre Augusto Giron, Frederico Schardong, Lucas Pandolfo Perin, Ricardo Custódio, Victor Valle, Víctor Mateu
2023/1920 (PDF ) Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities Luke Harrison, Samiran Bag, Feng Hao
2023/1919 (PDF ) When and How to Aggregate Message Authentication Codes on Lossy Channels? Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze
2023/1918 (PDF ) FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC Najwa Aaraj, Abdelrahaman Aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria-Vazquez, Victor Sucasas, Ajith Suresh
2023/1917 (PDF ) Regularized PolyKervNets: Optimizing Expressiveness and Efficiency for Private Inference in Deep Neural Networks Toluwani Aremu
2023/1916 (PDF ) Sing a song of Simplex Victor Shoup
2023/1915 (PDF ) Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies Poulami Das, Andreas Erwig, Michael Meyer, Patrick Struck
2023/1914 (PDF ) Efficient Low-Latency Masking of Ascon without Fresh Randomness Srinidhi Hari Prasad, Florian Mendel, Martin Schläffer, Rishub Nagpal
2023/1913 (PDF ) Breaking RSA Authentication on Zynq-7000 SoC and Beyond: Identification of Critical Security Flaw in FSBL Software Prasanna Ravi, Arpan Jati, Shivam Bhasin
2023/1912 (PDF ) Dishonest Majority Multiparty Computation over Matrix Rings Hongqing Liu, Chaoping Xing, Chen Yuan, Taoxu Zou
2023/1911 (PDF ) Non-Interactive Classical Verification of Quantum Depth: A Fine-Grained Characterization Nai-Hui Chia, Shih-Han Hung
2023/1910 (PDF ) Failed crypto: Matrices over non-standard arithmetic Daniel R. L. Brown
2023/1909 (PDF ) Ratel: MPC-extensions for Smart Contracts Yunqi Li, Kyle Soska, Zhen Huang, Sylvain Bellemare, Mikerah Quintyne-Collins, Lun Wang, Xiaoyuan Liu, Dawn Song, Andrew Miller
2023/1908 (PDF ) PARScoin: A Privacy-preserving, Auditable, and Regulation-friendly Stablecoin Amirreza Sarencheh, Aggelos Kiayias, Markulf Kohlweiss
2023/1907 (PDF ) Integral Cryptanalysis Using Algebraic Transition Matrices Tim Beyne, Michiel Verbauwhede
2023/1906 (PDF ) Exploring SIDH-based Signature Parameters Andrea Basso, Mingjie Chen, Tako Boris Fouotsa, Péter Kutas, Abel Laval, Laurane Marco, Gustave Tchoffo Saah
2023/1905 (PDF ) Oops, I did it again revisited: another look at reusing one-time signatures Scott Fluhrer
2023/1904 (PDF ) Generalized Kotov-Ushakov Attack on Tropical Stickel Protocol Based on Modified Tropical Circulant Matrices Sulaiman Alhussaini, Craig Collett, Serge˘ı Sergeev
2023/1903 (PDF ) Quarantined-TreeKEM: a Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users Céline Chevalier, Guirec Lebrun, Ange Martinelli, Abdul Rahman Taleb
2023/1902 (PDF ) A Transaction-Level Model for Blockchain Privacy François-Xavier Wicht, Zhipeng Wang, Duc V. Le, Christian Cachin
2023/1901 (PDF ) Middle-Products of Skew Polynomials and Learning with Errors Cong Ling, Andrew Mendelsohn
2023/1900 (PDF ) Conan: Distributed Proofs of Compliance for Anonymous Data Collection Mingxun Zhou, Elaine Shi, Giulia Fanti
2023/1899 (PDF ) Allowing Blockchain Loans with Low Collateral Tom Azoulay, Uri Carl, Ori Rottenstreich
2023/1898 (PDF ) An Empirical Study of Cross-chain Arbitrage in Decentralized Exchanges Ori Mazor, Ori Rottenstreich
2023/1897 (PDF ) PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures Sajin Sasy, Adithya Vadapalli, Ian Goldberg
2023/1896 (PDF ) Selective Delegation of Attributes in Mercurial Signature Credentials Colin Putman, Keith M. Martin
2023/1895 (PDF ) The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert
2023/1894 (PDF ) Hardness of Range Avoidance and Remote Point for Restricted Circuits via Cryptography Yilei Chen, Jiatu Li
2023/1893 (PDF ) BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, Thomas Schneider
2023/1892 (PDF ) Asymptotics of hybrid primal lattice attacks Daniel J. Bernstein
2023/1891 (PDF ) In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, Yongbin Zhou
2023/1890 (PDF ) Lightning Fast Secure Comparison for 3PC PPML Tianpei Lu, Bingsheng Zhang, Lichun Li, Yuzhou Zhao, Kui Ren
2023/1888 (PDF ) Reverie: an end-to-end accumulation scheme from Cyclefold Lev Soukhanov
2023/1887 (PDF ) GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity Renas Bacho, Christoph Lenzen, Julian Loss, Simon Ochsenreither, Dimitrios Papachristoudis
2023/1886 (PDF ) Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs Sebastian Angel, Eleftherios Ioannidis, Elizabeth Margolin, Srinath Setty, Jess Woods
2023/1885 (PDF ) Falcon Takes Off - A Hardware Implementation of the Falcon Signature Scheme Michael Schmid, Dorian Amiet, Jan Wendler, Paul Zbinden, Tao Wei
2023/1884 (PDF ) Multi-Signatures for Ad-hoc and Privacy-Preserving Group Signing Anja Lehmann, Cavit Özbay
2023/1883 (PDF ) Revisiting the attacker's knowledge in inference attacks against Searchable Symmetric Encryption Marc Damie, Jean-Benoist Leger, Florian Hahn, Andreas Peter
2023/1881 (PDF ) Blockchain Governance via Sharp Anonymous Multisignatures Wonseok Choi, Xiangyu Liu, Vassilis Zikas
2023/1880 (PDF ) Cryptanalysis of Lattice-Based Sequentiality Assumptions and Proofs of Sequential Work Chris Peikert, Yi Tang
2023/1879 (PDF ) A Multiparty Commutative Hashing Protocol based on the Discrete Logarithm Problem Daniel Zentai, Mihail Plesa, Robin Frot
2023/1878 (PDF ) Predicting performance for post-quantum encrypted-file systems Daniel J. Bernstein
2023/1877 (PDF ) Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps George Teseleanu
2023/1876 (PDF ) Thwarting Last-Minute Voter Coercion Rosario Giustolisi, Maryam Sheikhi Garjan, Carsten Schuermann
2023/1875 (PDF ) The Blockwise Rank Syndrome Learning problem and its applications to cryptography Nicolas Aragon, Pierre Briaud, Victor Dyseryn, Philippe Gaborit, Adrien Vinçotte
2023/1874 (PDF ) Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map George Teseleanu
2023/1873 (PDF ) SoK: Post-Quantum TLS Handshake Nouri Alnahawi, Johannes Müller, Jan Oupický, Alexander Wiesmaier
2023/1872 (PDF ) Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields (Full Version) Weizhe Wang, Deng Tang, Haoyang Wang
2023/1871 (PDF ) B2T: The Third Logical Value of a Bit Dipesh, Vishesh Mishra, Urbi chatterjee
2023/1870 (PDF ) An Improved Method for Evaluating Secret Variables and Its Application to WAGE Weizhe Wang, Haoyang Wang, Deng Tang
2023/1869 (PDF ) Accountable Bulletin Boards: Definition and Provably Secure Implementation Mike Graf, Ralf Küsters, Daniel Rausch, Simon Egger, Marvin Bechtold, Marcel Flinspach
2023/1868 (PDF ) COMMON: Order Book with Privacy Albert Garreta, Adam Gągol, Aikaterini-Panagiota Stouka, Damian Straszak, Michal Zajac
2023/1867 (PDF ) Different Flavours of HILL Pseudoentropy and Yao Incompressibility Entropy Pihla Karanko
2023/1866 (PDF ) When NTT Meets SIS: Efficient Side-channel Attacks on Dilithium and Kyber Zehua Qiao, Yuejun Liu, Yongbin Zhou, Mingyao Shao, Shuo Sun
2023/1865 (PDF ) Projective Space Stern Decoding and Application to SDitH Kevin Carrier, Valérian Hatey, Jean-Pierre Tillich
2023/1864 (PDF ) Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier
2023/1863 (PDF ) Efficient Secure Multiparty Computation for Multidimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification Dongyu Wu, Bei Liang, Zijie Lu, Jintai Ding
2023/1862 (PDF ) Analyzing UTXO-Based Blockchain Privacy Threats Simin Ghesmati, Walid Fdhila, Edgar Weippl
2023/1861 (PDF ) Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking Li-Chang Lai, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang
2023/1860 (PDF ) EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis Suvadeep Hajra, Siddhartha Chowdhury, Debdeep Mukhopadhyay
2023/1859 (PDF ) XorSHAP: Privacy-Preserving Explainable AI for Decision Tree Models Dimitar Jetchev, Marius Vuille
2023/1858 (PDF ) A Novel Power-Sum PRG with Applications to Lattice-Based zkSNARKs Charanjit S Jutla, Eamonn W. Postlethwaite, Arnab Roy
2023/1857 (PDF ) A Simple and Efficient Framework of Proof Systems for NP Yuyu Wang, Chuanjie Su, Jiaxin Pan, Yu Chen
2023/1856 (PDF ) Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model Fu Yao, Hua Chen, Yongzhuang Wei, Enes Pasalic, Feng Zhou, Limin Fan
2023/1855 (PDF ) Demystifying DeFi MEV Activities in Flashbots Bundle Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen
2023/1854 (PDF ) A note on quantum approximate optimization algorithm Zhengjun Cao
2023/1853 (PDF ) Report on evaluation of KpqC candidates Jolijn Cottaar, Kathrin Hövelmanns, Andreas Hülsing, Tanja Lange, Mohammad Mahzoun, Alex Pellegrini, Alberto Ravagnani, Sven Schäge, Monika Trimoska, Benne de Weger
2023/1852 (PDF ) Reduction from sparse LPN to LPN, Dual Attack 3.0 Kévin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Jean-Pierre Tillich
2023/1851 (PDF ) Quantum Security of the UMTS-AKA Protocol and its Primitives, Milenage and TUAK Paul Frixons, Sébastien Canard, Loïc Ferreira
2023/1850 (PDF ) Accurate Score Prediction for Dual-Sieve Attacks Léo Ducas, Ludo N. Pulles
2023/1849 (PDF ) Lattice-based Programmable Hash Functions and Applications Jiang Zhang, Yu Chen, Zhenfeng Zhang
2023/1848 (PDF ) Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos
2023/1847 (PDF ) Cycle Structure and Observability of Two Types of Galois NFSRs Xianghan Wang, Jianghua Zhong, Dongdai Lin
2023/1846 (PDF ) New Security Proofs and Complexity Records for Advanced Encryption Standard Orhun Kara
2023/1845 (PDF ) Compact Issuer-Hiding Authentication, Application to Anonymous Credential Olivier Sanders, Jacques Traoré
2023/1844 (PDF ) Unconditionally Secure Commitments with Quantum Auxiliary Inputs Tomoyuki Morimae, Barak Nehoran, Takashi Yamakawa
2023/1843 (PDF ) Zero-day vulnerability prevention with recursive feature elimination and ensemble learning Mike Nkongolo Wa Nkongolo
2023/1842 (PDF ) Leverage Staking with Liquid Staking Derivatives (LSDs): Opportunities and Risks Xihan Xiong, Zhipeng Wang, Xi Chen, William Knottenbelt, Michael Huth
2023/1841 (PDF ) Unclonable Cryptography with Unbounded Collusions and Impossibility of Hyperefficient Shadow Tomography Alper Çakan, Vipul Goyal
2023/1840 (PDF ) Unconditionally secure quantum commitments with preprocessing Luowen Qian
2023/1839 (PDF ) Ring-LWE Hardness Based on Non-invertible Ideals Charanjit S. Jutla, Chengyu Lin
2023/1838 (PDF ) Quantifying risks in cryptographic selection processes Daniel J. Bernstein
2023/1837 (PDF ) More forging (and patching) of tropical signatures Daniel R. L. Brown, Chris Monico
2023/1836 (PDF ) An Incremental PoSW for General Weight Distributions Hamza Abusalah, Valerio Cini
2023/1835 (PDF ) ID-CAKE: Identity-based Cluster Authentication and Key Exchange Scheme for Message Broadcasting and Batch Verification in VANETs Apurva K Vangujar, Alia Umrani, Paolo Palmieri
2023/1834 (PDF ) Building a BBB Pseudorandom Permutation using Lai-Massey Networks Ritam Bhaumik, Mohammad Amin Raeisi
2023/1833 (PDF ) Cryptanalysis of QARMAv2 Hosein Hadipour, Yosuke Todo
2023/1832 (PDF ) A Note On the Universality of Black-box MKtP Solvers Noam Mazor, Rafael Pass
2023/1831 (PDF ) A CP-based Automatic Tool for Instantiating Truncated Differential Characteristics - Extended Version François Delobel, Patrick Derbez, Arthur Gontier, Loïc Rouquette, Christine Solnon
2023/1830 (PDF ) Vector Commitments with Efficient Updates Ertem Nusret Tas, Dan Boneh
2023/1829 (PDF ) End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness Yevgeniy Dodis, Daniel Jost, Balachandar Kesavan, Antonio Marcedone
2023/1828 (PDF ) Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions Yi Wang, Rongmao Chen, Xinyi Huang, Moti Yung
2023/1827 (PDF ) Key Exchange in the Post-Snowden Era: Universally Composable Subversion-Resilient PAKE Suvradip Chakraborty, Lorenzo Magliocco, Bernardo Magri, Daniele Venturi
2023/1826 (PDF ) Load-Balanced Server-Aided MPC in Heterogeneous Computing Yibiao Lu, Bingsheng Zhang, Kui Ren
2023/1825 (PDF ) Towards Unclonable Cryptography in the Plain Model Céline Chevalier, Paul Hermouet, Quoc-Huy Vu
2023/1824 (PDF ) Learning with Errors over Group Rings Constructed by Semi-direct Product Jiaqi Liu, Fang-Wei Fu
2023/1823 (PDF ) PQC-NN: Post-Quantum Cryptography Neural Network Abel C. H. Chen
2023/1822 (PDF ) Rectangular Attack on VOX Gilles Macario-Rat, Jacques Patarin, Benoit Cogliati, Jean-Charles Faugère, Pierre-Alain Fouque, Louis Gouin, Robin Larrieu, Brice Minaud
2023/1821 (PDF ) Cryptanalysis of TS-Hash Aleksei Udovenko
2023/1820 (PDF ) Chipmunk: Better Synchronized Multi-Signatures from Lattices Nils Fleischhacker, Gottfried Herold, Mark Simkin, Zhenfei Zhang
2023/1819 (PDF ) Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2023/1818 (PDF ) On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions Romain Gay, Bogdan Ursu
2023/1817 (PDF ) Authenticating Medications with QR-Codes and Compact Digital Signatures Julien Jainsky, David Naccache, Bassem Ouni, Ofer Yifrach-Stav
2023/1816 (PDF ) ASOZ: a decentralized payment system with privacy preserving and auditing on public blockchain Tianjian Liu, Yang Liu, Dawei Zhang, Chang Chen, Wei Wang
2023/1815 (PDF ) Accelerating Polynomial Multiplication for RLWE using Pipelined FFT Neil Thanawala, Hamid Nejatollahi, Nikil Dutt
2023/1814 (PDF ) Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption Ahmad Khoureich Ka
2023/1813 (PDF ) Early Stopping for Any Number of Corruptions Julian Loss, Jesper Buus Nielsen
2023/1812 (PDF ) The NTT and residues of a polynomial modulo factors of $X^{2^d} + 1$ Sahil Sharma
2023/1811 (PDF ) A note on Failing gracefully: Completing the picture for explicitly rejecting Fujisaki-Okamoto transforms using worst-case correctness Kathrin Hövelmanns, Christian Majenz
2023/1810 (PDF ) Pairing-Free Blind Signatures from Standard Assumptions in the ROM Julia Kastner, Ky Nguyen, Michael Reichle
2023/1809 (PDF ) PURED: A unified framework for resource-hard functions Alex Biryukov, Marius Lombard-Platet
2023/1808 (PDF ) Small Stretch Problem of the DCT Scheme and How to Fix it Yuchao Chen, Tingting Guo, Lei Hu, Lina Shang, Shuping Mao, Peng Wang
2023/1807 (PDF ) Entrada to Secure Graph Convolutional Networks Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2023/1806 (PDF ) Fast and Designated-verifier Friendly zkSNARKs in the BPK Model Xudong Zhu, Xuyang Song, Yi Deng
2023/1805 (PDF ) On the Security of Rate-limited Privacy Pass Hien Chu, Khue Do, Lucjan Hanzlik
2023/1804 (PDF ) Fully Malicious Authenticated PIR Marian Dietz, Stefano Tessaro
2023/1803 (PDF ) Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation Gaëtan Leurent, Clara Pernot
2023/1802 (PDF ) Sublinear-Communication Secure Multiparty Computation does not require FHE Elette Boyle, Geoffroy Couteau, Pierre Meyer
2023/1801 (PDF ) ForgedAttributes: An Existential Forgery Vulnerability of CMS Signatures Falko Strenzke
2023/1800 (PDF ) Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions Fukang Liu, Abul Kalam, Santanu Sarkar, Willi Meier
2023/1799 (PDF ) BabySpartan: Lasso-based SNARK for non-uniform computation Srinath Setty, Justin Thaler
2023/1798 (PDF ) Somewhat Homomorphic Encryption based on Random Codes Carlos Aguilar-Melchor, Victor Dyseryn, Philippe Gaborit
2023/1797 (PDF ) A Modular Approach to Unclonable Cryptography Prabhanjan Ananth, Amit Behera
2023/1796 (PDF ) Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification Andersson Calle Viera, Alexandre Berzati, Karine Heydemann
2023/1795 (PDF ) Efficiently Testable Circuits without Conductivity Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, Krzysztof Pietrzak
2023/1794 (PDF ) Secret-Shared Shuffle with Malicious Security Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, Ee-Chien Chang
2023/1793 (PDF ) Accountable Multi-Signatures with Constant Size Public Keys Dan Boneh, Aditi Partap, Brent Waters
2023/1792 (PDF ) Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones Daniel Hugenroth, Alberto Sonnino, Sam Cutler, Alastair R. Beresford
2023/1791 (PDF ) Decentralized Compromise-Tolerant Public Key Management Ecosystem with Threshold Validation Jamal Mosakheil, Kan Yang
2023/1790 (PDF ) Compromising sensitive information through Padding Oracle and Known Plaintext attacks in Encrypt-then-TLS scenarios Daniel Espinoza Figueroa
2023/1789 (PDF ) Fast and Secure Oblivious Stable Matching over Arithmetic Circuits Arup Mondal, Priyam Panda, Shivam Agarwal, Abdelrahaman Aly, Debayan Gupta
2023/1788 (PDF ) Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Damien Stehlé
2023/1787 (PDF ) Updatable Privacy-Preserving Blueprints Bernardo David, Felix Engelmann, Tore Frederiksen, Markulf Kohlweiss, Elena Pagnin, Mikhail Volkhov
2023/1786 (PDF ) CASE: A New Frontier in Public-Key Authenticated Encryption Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran, Rajeev Raghunath, Jayesh Singla
2023/1785 (PDF ) There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation Yaqing Song, Yuan Zhang, Shiyu Li, Weijia Li, Zeqi Lai, Qiang Tang
2023/1784 (PDF ) Succinct Arguments over Towers of Binary Fields Benjamin E. Diamond, Jim Posen
2023/1783 (PDF ) An efficient quantum parallel repetition theorem and applications John Bostanci, Luowen Qian, Nicholas Spooner, Henry Yuen
2023/1782 (PDF ) A Solution to a Conjecture on the Maps $\chi_n^{(k)}$ Kamil Otal
2023/1781 (PDF ) A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis Yen-Ting Kuo, Atsushi Takayasu
2023/1780 (PDF ) Pairing-Free Blind Signatures from CDH Assumptions Rutchathon Chairattana-Apirom, Stefano Tessaro, Chenzhi Zhu
2023/1779 (PDF ) Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics Shiyu Li, Yuan Zhang, Yaqing Song, Fan Wu, Feng Lyu, Kan Yang, Qiang Tang
2023/1778 (PDF ) Immunizing Backdoored PRGs Marshall Ball, Yevgeniy Dodis, Eli Goldin
2023/1777 (PDF ) SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model Jelle Vos, Mauro Conti, Zekeriya Erkin
2023/1776 (PDF ) Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak
2023/1775 (PDF ) Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery Shiyu Li, Yuan Zhang, Yaqing Song, Hongbo Liu, Nan Cheng, Hongwei Li, Dahai Tao, Kan Yang
2023/1774 (PDF ) Decentralized Private Steam Aggregation from Lattices Uddipana Dowerah, Aikaterini Mitrokotsa
2023/1773 (PDF ) Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing Hanwen Feng, Tiancheng Mai, Qiang Tang
2023/1772 (PDF ) Robust Combiners and Universal Constructions for Quantum Cryptography Taiga Hiroka, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2023/1771 (PDF ) A note on ``HAKECC: highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment'' Zhengjun Cao
2023/1770 (PDF ) On the Feasibility of E2E Verifiable Online Voting - A Case Study From Durga Puja Trial Horia Druliac, Matthew Bardsley, Chris Riches, Christian Dunn, Luke Harrison, Bimal Roy, Feng Hao
2023/1769 (PDF ) A Comprehensive Survey on Non-Invasive Fault Injection Attacks Amit Mazumder Shuvo, Tao Zhang, Farimah Farahmandi, Mark Tehranipoor
2023/1768 (PDF ) Homomorphic Polynomial Public Key Cryptography for Quantum-secure Digital Signature Randy Kuang, Maria Perepechaenko, Mahmoud Sayed, Dafu Lou
2023/1767 (PDF ) The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+ Patrick Karl, Jonas Schupp, Georg Sigl
2023/1766 (PDF ) Introducing Clapoti(s): Evaluating the isogeny class group action in polynomial time Aurel Page, Damien Robert
2023/1765 (PDF ) The Non-Uniform Perebor Conjecture for Time-Bounded Kolmogorov Complexity is False Noam Mazor, Rafael Pass
2023/1764 (PDF ) Distributed Differential Privacy via Shuffling vs Aggregation: a Curious Study Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, Shaowei Wang
2023/1762 (PDF ) ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge Daniel Luick, John Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo
2023/1761 (PDF ) Guardianship in Group Key Exchange for Limited Environments Elsie Mestl Fondevik, Britta Hale, Xisen Tian
2023/1760 (PDF ) Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials Luk Bettale, Delaram Kahrobaei, Ludovic Perret, Javier Verbel
2023/1759 (PDF ) Non-Interactive Zero-Knowledge Functional Proofs Gongxian Zeng, Junzuo Lai, Zhengan Huang, Linru Zhang, Xiangning Wang, Kwok-Yan Lam, Huaxiong Wang, Jian Weng
2023/1758 (PDF ) Pulsar: Secure Steganography for Diffusion Models Tushar M. Jois, Gabrielle Beck, Gabriel Kaptchuk
2023/1757 (PDF ) Adaptively Secure Consensus with Linear Complexity and Constant Round under Honest Majority in the Bare PKI Model, and Separation Bounds from the Idealized Message-Authentication Model Matthieu Rambaud
2023/1756 (PDF ) How to Use Quantum Indistinguishability Obfuscation Andrea Coladangelo, Sam Gunn
2023/1755 (PDF ) Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael Reiter
2023/1754 (PDF ) That’s not my Signature! Fail-Stop Signatures for a Post-Quantum World Cecilia Boschini, Hila Dahari, Moni Naor, Eyal Ronen
2023/1752 (PDF ) Secure Encryption and Key Exchange using Arbiter PUF Raja Adhithan Radhakrishnan
2023/1750 (PDF ) A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai
2023/1749 (PDF ) Dora: A Simple Approach to Zero-Knowledge for RAM Programs Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk
2023/1748 (PDF ) Forging tropical signatures Lorenz Panny
2023/1747 (PDF ) An Algorithmic Approach to $(2,2)$-isogenies in the Theta Model and Applications to Isogeny-based Cryptography Pierrick Dartois, Luciano Maino, Giacomo Pope, Damien Robert
2023/1746 (PDF ) A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier
2023/1745 (PDF ) New Public-Key Cryptosystem Blueprints Using Matrix Products in $\mathbb F_p$ Remi Geraud-Stewart, David Naccache
2023/1744 (PDF ) Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater (Full Version) Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, Hossein Yalame
2023/1743 (PDF ) Explicit Lower Bounds for Communication Complexity of PSM for Concrete Functions Kazumasa Shinagawa, Koji Nuida
2023/1742 (PDF ) Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Hendrik Waldner
2023/1741 (PDF ) Pseudorandom Isometries Prabhanjan Ananth, Aditya Gulati, Fatih Kaleoglu, Yao-Ting Lin
2023/1739 (PDF ) Broadcast-Optimal Four-Round MPC in the Plain Model Michele Ciampi, Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Yu Xia, Sophia Yakoubov
2023/1738 (PDF ) Byzantine Agreement Decomposed: Honest Majority Asynchronous Atomic Broadcast from Reliable Broadcast Simon Holmgaard Kamp, Jesper Buus Nielsen
2023/1737 (PDF ) On the Security of Succinct Interactive Arguments from Vector Commitments Alessandro Chiesa, Marcel Dall'Agnol, Ziyi Guan, Nicholas Spooner
2023/1736 (PDF ) Aloha-HE: A Low-Area Hardware Accelerator for Client-Side Operations in Homomorphic Encryption Florian Krieger, Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy
2023/1735 (PDF ) Exploiting the Symmetry of $\mathbb{Z}^n$: Randomization and the Automorphism Problem Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang
2023/1734 (PDF ) Signatures with Memory-Tight Security in the Quantum Random Oracle Model Keita Xagawa
2023/1733 (PDF ) Hintless Single-Server Private Information Retrieval Baiyu Li, Daniele Micciancio, Mariana Raykova, Mark Schultz-Wu
2023/1732 (PDF ) On the Masking-Friendly Designs for Post-Quantum Cryptography Suparna Kundu, Angshuman Karmakar, Ingrid Verbauwhede
2023/1731 (PDF ) A practical key-recovery attack on LWE-based key- encapsulation mechanism schemes using Rowhammer Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, Ingrid Verbauwhede
2023/1730 (PDF ) Construction-D lattice from Garcia-Stichtenoth tower code Elena Kirshanova, Ekaterina Malygina
2023/1729 (PDF ) CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks Yongqin Wang, Pratik Sarkar, Nishat Koti, Arpita Patra, Murali Annavaram
2023/1728 (PDF ) Simulation-Secure Threshold PKE from LWE with Polynomial Modulus Daniele Micciancio, Adam Suhl
2023/1727 (PDF ) Envelope Encryption in the Symmetric-Key Setting: A Formalization and Generic Constructions Shoichi Hirose, Kazuhiko Minematsu
2023/1726 (PDF ) CSIDH with Level Structure Steven D. Galbraith, Derek Perrin, José Felipe Voloch
2023/1725 (PDF ) Few-weight linear codes over $\mathbb{F}_p$ from $t$-to-one mappings René Rodríguez-Aldama
2023/1724 (PDF ) Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing Dan Boneh, Aditi Partap, Lior Rotem
2023/1723 (PDF ) Deterministic Byzantine Agreement with Adaptive $O(n\cdot f)$ Communication Fatima Elsheimy, Giorgos Tsimos, Charalampos Papamanthou
2023/1722 (PDF ) Quantitative Fault Injection Analysis Jakob Feldtkeller, Tim Güneysu, Patrick Schaumont
2023/1721 (PDF ) Optimizing S-box Implementations Using SAT Solvers: Revisited Fuxin Zhang, Zhenyu Huang
2023/1720 (PDF ) Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions Samuel Bouaziz--Ermann, Alex B. Grilo, Damien Vergnaud, Quoc-Huy Vu
2023/1719 (PDF ) MQ on my Mind: Post-Quantum Signatures from the Non-Structured Multivariate Quadratic Problem Ryad Benadjila, Thibauld Feneuil, Matthieu Rivain
2023/1718 (PDF ) Improved Attacks on LowMC with Algebraic Techniques Yimeng Sun, Jiamin Cui, Meiqin Wang
2023/1717 (PDF ) Fabric-X: Scaling Hyperledger Fabric for Asset Exchange Elli Androulaki, Marcus Brandenburger, May Buzaglo, Angelo De Caro, Kaoutar Elkhiyaoui, Alexandros Filios, Liran Funaro, Yacov Manevich, Hagar Meir, Senthilnathan Natarajan, Manish Sethi, Yoav Tock
2023/1716 (PDF ) Attribute-Based Encryption for Circuits of Unbounded Depth from Lattices: Garbled Circuits of Optimal Size, Laconic Functional Evaluation, and More Yao-Ching Hsieh, Huijia Lin, Ji Luo
2023/1715 (PDF ) Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications Shiyuan Xu, Yibo Cao, Xue Chen, Yu Guo, Yuer Yang, Fangda Guo, Siu-Ming Yiu
2023/1714 (PDF ) On Parallel Repetition of PCPs Alessandro Chiesa, Ziyi Guan, Burcu Yıldız
2023/1713 (PDF ) High-assurance zeroization Santiago Arranz Olmos, Gilles Barthe, Ruben Gonzalez, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Peter Schwabe
2023/1712 (PDF ) Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage Feng Li, Jianfeng Ma, Yinbin Miao, Pengfei Wu, Xiangfu Song
2023/1711 (PDF ) Passive SSH Key Compromise via Lattices Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger
2023/1710 (PDF ) Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies Mingjie Chen, Yi-Fu Lai, Abel Laval, Laurane Marco, Christophe Petit
2023/1709 (PDF ) Signal Leakage Attack Meets Depth First Search: an Improved Approach on DXL Key Exchange Protocol Zhiwei Li, Jun Xu, Lei Hu
2023/1708 (PDF ) Algebraic properties of the maps $\chi_n$ Jan Schoone, Joan Daemen
2023/1707 (PDF ) Analysis of four protocols based on tropical circulant matrices Ivan Buchinskiy, Matvei Kotov, Alexander Treier
2023/1706 (PDF ) Breaking two PSI-CA protocols in polynomial time Yang Tan, Bo Lv
2023/1705 (PDF ) BaseFold: Efficient Field-Agnostic Polynomial Commitment Schemes from Foldable Codes Hadas Zeilberger, Binyi Chen, Ben Fisch
2023/1704 (PDF ) On Overidealizing Ideal Worlds: Xor of Two Permutations and its Applications Wonseok Choi, Minki Hhan, Yu Wei, Vassilis Zikas
2023/1703 (PDF ) Memory Checking for Parallel RAMs Surya Mathialagan
2023/1702 (PDF ) On Quantum Simulation-Soundness Behzad Abdolmaleki, Céline Chevalier, Ehsan Ebrahimi, Giulio Malavolta, Quoc-Huy Vu
2023/1701 (PDF ) Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2 Hosein Hadipour, Simon Gerhalter, Sadegh Sadeghi, Maria Eichlseder
2023/1700 (PDF ) Scalable Mixed-Mode MPC Radhika Garg, Kang Yang, Jonathan Katz, Xiao Wang
2023/1699 (PDF ) Oblivious Homomorphic Encryption Osman Biçer, Christian Tschudin
2023/1698 (PDF ) Another Look at Side-Channel Resistant Encoding Schemes Xiaolu Hou, Jakub Breier, Mladen Kovačević
2023/1697 (PDF ) Full Round Distinguishing and Key-Recovery Attacks on SAND-2 (Full version) Zhuolong Zhang, Shiyao Chen, Wei Wang, Meiqin Wang
2023/1696 (PDF ) A note on ``a novel authentication and key agreement scheme for Internet of Vehicles'' Zhengjun Cao
2023/1695 (PDF ) Implementing Arbitrary Maps over Small Finite Domains using Ring Addition and Scalar Multiplication Andrei Lapets
2023/1694 (PDF ) Predicate Aggregate Signatures and Applications Tian Qiu, Qiang Tang
2023/1693 (PDF ) Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes George Teseleanu, Paul Cotan
2023/1691 (PDF ) Some Results on Related Key-IV Pairs of Espresso George Teseleanu
2023/1690 (PDF ) Efficient VOLE based Multi-Party PSI with Lower Communication Cost Shuqing Zhang
2023/1689 (PDF ) Revisiting the Boomerang Attack from a Perspective of 3-differential Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman, Takanori Isobe
2023/1688 (PDF ) Faster Complete Formulas for the GLS254 Binary Curve Thomas Pornin
2023/1687 (PDF ) Admissible Parameter Sets and Complexity Estimation of Crossbred Algorithm Shuhei Nakamura
2023/1686 (PDF ) The Quantum Decoding Problem André Chailloux, Jean-Pierre Tillich
2023/1685 (PDF ) MPC in the head using the subfield bilinear collision problem Janik Huth, Antoine Joux
2023/1684 (PDF ) Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication Nan Cheng, Melek Önen, Aikaterini Mitrokotsa, Oubaïda Chouchane, Massimiliano Todisco, Alberto Ibarrondo
2023/1683 (PDF ) Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4 Ward Beullens, Fabio Campos, Sofía Celi, Basil Hess, Matthias J. Kannwischer
2023/1682 (PDF ) Selective Opening Security in the Quantum Random Oracle Model, Revisited Jiaxin Pan, Runzhi Zeng
2023/1681 (PDF ) The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression Ioana Savu, Marina Krček, Guilherme Perin, Lichao Wu, Stjepan Picek
2023/1680 (PDF ) On the cryptographic properties of weightwise affine and weightwise quadratic functions Pierrick Méaux, Yassine Ozaim
2023/1679 (PDF ) Plug Your Volt: Protecting Intel Processors against Dynamic Voltage Frequency Scaling based Fault Attacks Nimish Mishra, Rahul Arvind Mool, Anirban Chakraborty, Debdeep Mukhopadhyay
2023/1678 (PDF ) BumbleBee: Secure Two-party Inference Framework for Large Transformers Wen-jie Lu, Zhicong Huang, Zhen Gu, Jingyu Li, Jian Liu, Cheng Hong, Kui Ren, Tao Wei, WenGuang Chen
2023/1677 (PDF ) Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions Michele Ciampi, Yu Xia
2023/1676 (PDF ) FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM Gilad Asharov, Ilan Komargodski, Yehuda Michelson
2023/1675 (PDF ) Another Look at Differential-Linear Attacks Orr Dunkelman, Ariel Weizman
2023/1674 (PDF ) Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede
2023/1673 (PDF ) Designing Full-Rate Sponge based AEAD modes Bishwajit Chakraborty, Nilanjan Datta, Mridul Nandi
2023/1672 (PDF ) Fine-grained Policy Constraints for Distributed Point Function Keyu Ji, Bingsheng Zhang, Kui Ren
2023/1671 (PDF ) A note on ``SCPUAK: smart card-based secure protocol for remote user authentication and key agreement'' Zhengjun Cao, Lihua Liu
2023/1670 (PDF ) Unbalanced Private Set Intersection from Homomorphic Encryption and Nested Cuckoo Hashing Jörn Kußmaul, Matthew Akram, Anselme Tueno
2023/1669 (PDF ) $\Pi$: A Unified Framework for Computational Verifiable Secret Sharing Karim Baghery
2023/1668 (PDF ) Arithmetization Oriented Encryption Tomer Ashur, Al Kindi
2023/1667 (PDF ) Unleashing the Power of Differential Fault Attacks on QARMAv2 Soumya Sahoo, Debasmita Chakraborty, Santanu Sarkar
2023/1666 (PDF ) MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head Gora Adj, Stefano Barbero, Emanuele Bellini, Andre Esser, Luis Rivera-Zamarripa, Carlo Sanna, Javier Verbel, Floyd Zweydinger
2023/1665 (PDF ) Model Stealing Attacks On FHE-based Privacy-Preserving Machine Learning through Adversarial Examples Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2023/1663 (PDF ) Proof-of-Work-based Consensus in Expected-Constant Time Juan Garay, Aggelos Kiayias, Yu Shen
2023/1662 (PDF ) Families of prime-order endomorphism-equipped embedded curves on pairing-friendly curves Antonio Sanso, Youssef El Housni
2023/1661 (PDF ) Publicly-Detectable Watermarking for Language Models Jaiden Fairoze, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang
2023/1660 (PDF ) FaBFT: Flexible Asynchronous BFT Protocol Using DAG Yu Song, Yu Long, Xian Xu, Dawu Gu
2023/1659 (PDF ) Partial Sums Meet FFT: Improved Attack on 6-Round AES Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaetan Leurent, Avichai Marmor, Victor Mollimard
2023/1658 (PDF ) On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweaks Nilanjan Datta, Avijit Dutta, Eik List, Sougata Mandal
2023/1657 (PDF ) PQCMC: Post-Quantum Cryptography McEliece-Chen Implicit Certificate Scheme Abel C. H. Chen
2023/1656 (PDF ) Privacy-Preserving Digital Vaccine Passport Thai Duong, Jiahui Gao, Duong Hieu Phan, Ni Trieu
2023/1655 (PDF ) Approximate Lower Bound Arguments Pyrros Chaidos, Aggelos Kiayias, Leonid Reyzin, Anatoliy Zinovyev
2023/1654 (PDF ) On Gaussian sampling, smoothing parameter and application to signatures Thomas Espitau, Alexandre Wallet, Yang Yu
2023/1653 (PDF ) QCB is Blindly Unforgeable Jannis Leuther, Stefan Lucks
2023/1652 (PDF ) On Sigma-Protocols and (packed) Black-Box Secret Sharing Schemes Claudia Bartoli, Ignacio Cascudo
2023/1651 (PDF ) Publicly Verifiable Secret Sharing over Class Groups and Applications to DKG and YOSO Ignacio Cascudo, Bernardo David
2023/1650 (PDF ) An Efficient Variant of F4 Algorithm for Solving MQ Problem Kosuke Sakata, Tsuyoshi Takagi
2023/1649 (PDF ) A New Framework for Fast Homomorphic Matrix Multiplication Xiaopeng Zheng, Hongbo Li, Dingkang Wang
2023/1648 (PDF ) On-Chain Timestamps Are Accurate Apostolos Tzinas, Srivatsan Sridhar, Dionysis Zindros
2023/1647 (PDF ) Who Watches the Watchers: Attacking Glitch Detection Circuits Amund Askeland, Svetla Nikova, Ventzislav Nikov
2023/1646 (PDF ) Security Bounds for Proof-Carrying Data from Straightline Extractors Alessandro Chiesa, Ziyi Guan, Shahar Samocha, Eylon Yogev
2023/1645 (PDF ) The Dilemma and Prospects of Academic Misconduct in Digital Forensics--A Case Study to Wan's Improved Scheme Chenglian Liu, Sonia Chien-I Chen
2023/1644 (PDF ) An End-to-End Framework for Private DGA Detection as a Service Ricardo Jose Menezes Maia, Dustin Ray, Sikha Pentyala, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento, Ricardo Jacobi
2023/1643 (PDF ) Oblivious Turing Machine Sofiane Azogagh, Victor Delfour, Marc-Olivier Killijian
2023/1642 (PDF ) A New Perspective on Key Switching for BGV-like Schemes Johannes Mono, Tim Güneysu
2023/1641 (PDF ) PSKPIR: Symmetric Keyword Private Information Retrieval based on PSI with Payload Zuodong Wu, Dawei Zhang, Yong Li, Xu Han
2023/1640 (PDF ) Quantum Key Leasing for PKE and FHE with a Classical Lessor Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu
2023/1639 (PDF ) Analysis of a Quantum Attack on the Blum-Micali Pseudorandom Number Generator Tingfei Feng
2023/1638 (PDF ) The One-Wayness of Jacobi Signatures Henry Corrigan-Gibbs, David J. Wu
2023/1637 (PDF ) Algorithmic Views of Vectorized Polynomial Multipliers – NTRU Han-Ting Chen, Yi-Hua Chung, Vincent Hwang, Bo-Yin Yang
2023/1636 (PDF ) Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval Meng Hao, Weiran Liu, Liqiang Peng, Hongwei Li, Cong Zhang, Hanxiao Chen, Tianwei Zhang
2023/1635 (PDF ) Oblivious issuance of proofs Michele Orrù, Stefano Tessaro, Greg Zaverucha, Chenzhi Zhu
2023/1634 (PDF ) On the (In)Security of the BUFF Transform Jelle Don, Serge Fehr, Yu-Hsuan Huang, Patrick Struck
2023/1633 (PDF ) One-time and Revocable Ring Signature with Logarithmic Size in Blockchain Yang Li, Wei Wang, Dawei Zhang, Xu Han
2023/1632 (PDF ) On Decompositions of Permutations in Quadratic Functions Samuele Andreoli, Enrico Piccione, Lilya Budaghyan, Pantelimon Stănică, Svetla Nikova
2023/1631 (PDF ) ASKPIR: Authorized Symmetric Keyword Privacy Information Retrieval Protocol Based on DID Zuodong Wu, Dawei Zhang, Yong Li, Xu Han
2023/1630 (PDF ) Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu
2023/1629 (PDF ) A Note on ``A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0'' Zhengjun Cao, Lihua Liu
2023/1628 (PDF ) Cryptanalysis of the Peregrine Lattice-Based Signature Scheme Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu, Mehdi Tibouchi, Masayuki Abe
2023/1627 (PDF ) Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption - A Case Study on Crystals-Kyber Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, Shivam Bhasin
2023/1626 (PDF ) Et tu, Brute? SCA Assisted CCA using Valid Ciphertexts - A Case Study on HQC KEM Thales Paiva, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Sayan Das, Anupam Chattopadhyay
2023/1625 (PDF ) SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning Ziyu Wang, Yaoling Ding, An Wang, Yuwei Zhang, Congming Wei, Shaofei Sun, Liehuang Zhu
2023/1624 (PDF ) On the (Not So) Surprising Impact of Multi-Path Payments on Performance and Privacy in the Lightning Network Charmaine Ndolo, Florian Tschorsch
2023/1623 (PDF ) Concrete Analysis of Quantum Lattice Enumeration Shi Bai, Maya-Iggy van Hoof, Floyd B. Johnson, Tanja Lange, Tran Ngo
2023/1622 (PDF ) Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS Mingfei Zhang, Rujia Li, Sisi Duan
2023/1621 (PDF ) Withdrawable Signature: How to Call off a Signature Xin Liu, Joonsang Baek, Willy Susilo
2023/1620 (PDF ) Commitments from Quantum One-Wayness Dakshita Khurana, Kabir Tomer
2023/1619 (PDF ) Pai: Private Retrieval with Constant Online Time, Communication, and Client-Side Storage for Data Marketplace Shuaishuai Li, Weiran Liu, Liqiang Peng, Cong Zhang, Xinwei Gao, Aiping Liang, Lei Zhang, Dongdai Lin, Yuan Hong
2023/1618 (PDF ) Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves Benjamin Benčina, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Miha Stopar, Charlotte Weitkämper
2023/1617 (PDF ) Designing Efficient and Flexible NTT Accelerators Ahmet MALAL
2023/1616 (PDF ) DeVoS: Deniable Yet Verifiable Vote Updating Johannes Mueller, Balazs Pejo, Ivan Pryvalov
2023/1615 (PDF ) Order vs. Chaos: A Language Model Approach for Side-channel Attacks Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, Lejla Batina
2023/1614 (PDF ) New proof systems and an OPRF from CSIDH Cyprien Delpech de Saint Guilhem, Robi Pedersen
2023/1613 (PDF ) Toothpicks: More Efficient Fork-Free Two-Round Multi-Signatures Jiaxin Pan, Benedikt Wagner
2023/1612 (PDF ) A Mempool Encryption Scheme for Ethereum via Multiparty Delay Encryption Amirhossein Khajehpour, Hanzaleh Akbarinodehi, Mohammad Jahanara, Chen Feng
2023/1611 (PDF ) Power circuits: a new arithmetization for GKR-styled sumcheck Lev Soukhanov
2023/1610 (PDF ) An Efficient ZK Compiler from SIMD Circuits to General Circuits Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang, Chenkai Weng, Kang Yang, Yu Yu
2023/1609 (PDF ) How to Prove Statements Obliviously? Sanjam Garg, Aarushi Goel, Mingyuan Wang
2023/1608 (PDF ) Can Alice and Bob Guarantee Output to Carol? Bar Alon, Eran Omri, Muthuramakrishnan Venkitasubramaniam
2023/1607 (PDF ) Crust: Verifiable and Efficient Private Information Retrieval With Sublinear Online Time Yinghao Wang, Xuanming Liu, Jiawen Zhang, Jian Liu, Xiaohu Yang
2023/1605 (PDF ) Three Party Secure Computation with Friends and Foes Bar Alon, Amos Beimel, Eran Omri
2023/1604 (PDF ) Manifold Learning Side-Channel Attacks against Masked Cryptographic Implementations Jianye Gao, Xinyao Li, Changhai Ou, Zhu Wang, Fei Yan
2023/1603 (PDF ) Breaking Parallel ROS: Implication for Isogeny and Lattice-based Blind Signatures Shuichi Katsumata, Yi-Fu Lai, Michael Reichle
2023/1602 (PDF ) A one-query lower bound for unitary synthesis and breaking quantum cryptography Alex Lombardi, Fermi Ma, John Wright
2023/1601 (PDF ) The Uber-Knowledge Assumption: A Bridge to the AGM Balthazar Bauer, Pooya Farshim, Patrick Harasser, Markulf Kohlweiss
2023/1600 (PDF ) Compress: Generate Small and Fast Masked Pipelined Circuits Gaëtan Cassiers, Barbara Gigerl, Stefan Mangard, Charles Momin, Rishub Nagpal
2023/1599 (PDF ) Boomy: Batch Opening Of Multivariate polYnomial commitment Thomas Lavaur, Jérôme Lacan
2023/1598 (PDF ) Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller Léo Weissbart, Stjepan Picek
2023/1596 (PDF ) A Black Box Attack Using Side Channel Analysis and Hardware Trojans Raja Adhithan Radhakrishnan
2023/1595 (PDF ) CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness Sofia Celi, Shai Levin, Joe Rowell
2023/1594 (PDF ) Secure Noise Sampling for DP in MPC with Finite Precision Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, Liang Zhao
2023/1593 (PDF ) Multi-Party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN Quang Dao, Yuval Ishai, Aayush Jain, Huijia Lin
2023/1592 (PDF ) Analysis of one semi-quantum-honest key agreement scheme in MSTSA structure without entanglement Zhengjun Cao, Lihua Liu
2023/1591 (PDF ) One-way Functions and Hardness of (Probabilistic) Time-Bounded Kolmogorov Complexity w.r.t. Samplable Distributions Yanyi Liu, Rafael Pass
2023/1590 (PDF ) Single trace HQC shared key recovery with SASCA Guillaume Goy, Julien Maillard, Philippe Gaborit, Antoine Loiseau
2023/1589 (PDF ) Optimized Homomorphic Evaluation of Boolean Functions Nicolas Bon, David Pointcheval, Matthieu Rivain
2023/1588 (PDF ) M&M'S: Mix and Match Attacks on Schnorr-type Blind Signatures with Repetition Khue Do, Lucjan Hanzlik, Eugenio Paracucchi
2023/1587 (PDF ) A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber Sönke Jendral, Kalle Ngo, Ruize Wang, Elena Dubrova
2023/1586 (PDF ) On the Round Complexity of Asynchronous Crusader Agreement Ittai Abraham, Naama Ben-David, Gilad Stern, Sravya Yandamuri
2023/1585 (PDF ) How to Rationally Select Your Delegatee in PoS Yuzhe Zhang, Qin Wang, Shiping Chen, Chen Wang
2023/1584 (PDF ) How to Garble Mixed Circuits that Combine Boolean and Arithmetic Computations Hanjun Li, Tianren Liu
2023/1583 (PDF ) Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory Rachit Garg, George Lu, Brent Waters, David J. Wu
2023/1582 (PDF ) Time-Lock Puzzles with Efficient Batch Solving Jesko Dujmovic, Rachit Garg, Giulio Malavolta
2023/1581 (PDF ) CryptoZoo: A Viewer for Reduction Proofs Chris Brzuska, Christoph Egger, Kirthivaasan Puniamurthy
2023/1580 (PDF ) Algorithmic Views of Vectorized Polynomial Multipliers – NTRU Prime Vincent Hwang, Chi-Ting Liu, Bo-Yin Yang
2023/1579 (PDF ) KiloNova: Preprocessing Folding-based SNARKs for Machine Executions Tianyu Zheng, Shang Gao, Yu Guo, Bin Xiao
2023/1578 (PDF ) A Scalable Coercion-resistant Voting Scheme for Blockchain Decision-making Zeyuan Yin, Bingsheng Zhang, Andrii Nastenko, Roman Oliynykov, Kui Ren
2023/1577 (PDF ) Asymptotics and Improvements of Sieving for Codes Léo Ducas, Andre Esser, Simona Etinski, Elena Kirshanova
2023/1576 (PDF ) Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Twin Smooth Integers and their Isogeny-based Applications Bruno Sterner
2023/1575 (PDF ) SoK: Web3 Recovery Mechanisms Panagiotis Chatzigiannis, Konstantinos Chalkias, Aniket Kate, Easwar Vivek Mangipudi, Mohsen Minaei, Mainack Mondal
2023/1574 (PDF ) Efficient Pre-processing PIR Without Public-Key Cryptography Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi
2023/1573 (PDF ) Threshold Computation in the Head: Improved Framework for Post-Quantum Signatures and Zero-Knowledge Arguments Thibauld Feneuil, Matthieu Rivain
2023/1572 (PDF ) Faulting Winternitz One-Time Signatures to forge LMS, XMSS, or SPHINCS+ signatures Alexander Wagner, Vera Wesselkamp, Felix Oberhansl, Marc Schink, Emanuele Strieder
2023/1571 (PDF ) Key Filtering in Cube Attacks from the Implementation Aspect Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao
2023/1570 (PDF ) Jackpot: Non-Interactive Aggregatable Lotteries Nils Fleischhacker, Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner
2023/1569 (PDF ) Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation Giuseppe Ateniese, Foteini Baldimtsi, Matteo Campanelli, Danilo Francati, Ioanna Karantaidou
2023/1568 (PDF ) Not Just Regular Decoding: Asymptotics and Improvements of Regular Syndrome Decoding Attacks Andre Esser, Paolo Santini
2023/1567 (PDF ) Depth-Optimized Quantum Implementation of ARIA Yujin Yang, Kyungbae Jang, Yujin Oh, Hwajeong Seo
2023/1566 (PDF ) Optimized Quantum Implementation of SEED Yujin Oh, Kyungbae Jang, Yujin Yang, Hwajeong Seo
2023/1565 (PDF ) Finding Shortest Vector Using Quantum NV Sieve on Grover Hyunji Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwangil Bae, Ilkwon Sohn, Hwajeong Seo
2023/1564 (PDF ) Fast Blind Rotation for Bootstrapping FHEs Binwu Xiang, Jiang Zhang, Yi Deng, Yiran Dai, Dengguo Feng
2023/1563 (PDF ) Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks Akira Ito, Rei Ueno, Rikuma Tanaka, Naofumi Homma
2023/1562 (PDF ) Generalized Implicit Factorization Problem Yansong Feng, Abderrahmane Nitaj, Yanbin Pan
2023/1561 (PDF ) LLM for SoC Security: A Paradigm Shift Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark Tehranipoor, Farimah Farahmandi
2023/1560 (PDF ) Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun Samuel Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara, Léo Robert
2023/1559 (PDF ) AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Krijn Reijnders
2023/1558 (PDF ) StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations Siemen Dhooghe, Artemii Ovchinnikov, Dilara Toprakhisar
2023/1557 (PDF ) Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1 Yanbin Xu, Yonglin Hao, Mingxing Wang
2023/1556 (PDF ) Better Safe than Sorry: Recovering after Adversarial Majority Srivatsan Sridhar, Dionysis Zindros, David Tse
2023/1555 (PDF ) Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines Yuncong Zhang, Shi-Feng Sun, Ren Zhang, Dawu Gu
2023/1554 (PDF ) Cornucopia: Distributed randomness beacons at scale Miranda Christ, Kevin Choi, Joseph Bonneau
2023/1553 (PDF ) Adaptively Secure BLS Threshold Signatures from DDH and co-CDH Sourav Das, Ling Ren
2023/1552 (PDF ) Doubly Efficient Batched Private Information Retrieval Xiuquan Ding, Giulio Malavolta, Tianwei Zhang
2023/1551 (PDF ) Evaluating GPT-4’s Proficiency in Addressing Cryptography Examinations Vasily Mikhalev, Nils Kopal, Bernhard Esslinger
2023/1550 (PDF ) A Thorough Evaluation of RAMBAM Daniel Lammers, Amir Moradi, Nicolai Müller, Aein Rezaei Shahmirzadi
2023/1549 (PDF ) Signature-Free Atomic Broadcast with Optimal $O(n^2)$ Messages and $O(1)$ Expected Time Xiao Sui, Xin Wang, Sisi Duan
2023/1548 (PDF ) Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs Carsten Baum, Nikolas Melissaris, Rahul Rachuri, Peter Scholl
2023/1547 (PDF ) Further Improvements of the Estimation of Key Enumeration with Applications to Solving LWE Alessandro Budroni, Erik Mårtensson
2023/1546 (PDF ) PERFORMANCE EVALUATION OF MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTION SYSTEM Sudhanshu Sekhar Tripathy, Bichitrananda Behera
2023/1545 (PDF ) Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, Tobias Schneider
2023/1544 (PDF ) Arithmetic PCA for Encrypted Data Jung Hee Cheon, Hyeongmin Choe, Saebyul Jung, Duhyeong Kim, Dahoon Lee, Jai Hyun Park
2023/1543 (PDF ) Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers Amit Jana, Mostafizar Rahman, Prathamesh Ram, Dhiman Saha, Goutam Paul
2023/1542 (PDF ) Don’t Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees Yu Dai, Fangguo Zhang, Chang-an Zhao
2023/1541 (PDF ) TMVP-based Polynomial Convolution for Saber and Sable on GPU using CUDA-cores and Tensor-cores Muhammad Asfand Hafeez, Wai-Kong Lee, Angshuman Karmakar, Seong Oun Hwang
2023/1540 (PDF ) A Note on ``a two-factor security authentication scheme for wireless sensor networks in IoT environments'' Zhengjun Cao, Lihua Liu
2023/1539 (PDF ) ELCA: Introducing Enterprise-level Cryptographic Agility for a Post-Quantum Era Dimitrios Sikeridis, David Ott, Sean Huntley, Shivali Sharma, Vasantha Kumar Dhanasekar, Megha Bansal, Akhilesh Kumar, Anwitha U N, Daniel Beveridge, Sairam Veeraswamy
2023/1538 (PDF ) Unclonable Commitments and Proofs Vipul Goyal, Giulio Malavolta, Justin Raizes
2023/1537 (PDF ) DEFEND: Towards Verifiable Delay Functions from Endomorphism Rings Knud Ahrens, Jens Zumbrägel
2023/1536 (PDF ) Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, Yuval Yarom
2023/1535 (PDF ) A Total Break of the 3WISE Digital Signature Scheme Daniel Smith-Tone
2023/1534 (PDF ) Evolving Secret Sharing Made Short Danilo Francati, Daniele Venturi
2023/1533 (PDF ) On Linear Equivalence, Canonical Forms, and Digital Signatures Tung Chou, Edoardo Persichetti, Paolo Santini
2023/1532 (PDF ) Unclonable Non-Interactive Zero-Knowledge Ruta Jawale, Dakshita Khurana
2023/1531 (PDF ) Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space Pierrick Méaux, Jeongeun Park, Hilder V. L. Pereira
2023/1530 (PDF ) Proofs of Space with Maximal Hardness Leonid Reyzin
2023/1529 (PDF ) Shufflecake: Plausible Deniability for Multiple Hidden Filesystems on Linux Elia Anzuoni, Tommaso Gagliardoni
2023/1528 (PDF ) Unmodified Half-Gates is Adaptively Secure - So is Unmodified Three-Halves Xiaojie Guo, Kang Yang, Xiao Wang, Yu Yu, Zheli Liu
2023/1527 (PDF ) Adaptive Garbled Circuits and Garbled RAM from Non-Programmable Random Oracles Cruz Barnum, David Heath, Vladimir Kolesnikov, Rafail Ostrovsky
2023/1526 (PDF ) Polynomial Time Cryptanalytic Extraction of Neural Network Models Isaac A. Canales-Martínez, Jorge Chavez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Nitin Satpute, Adi Shamir
2023/1525 (PDF ) Committing AE from Sponges: Security Analysis of the NIST LWC Finalists Juliane Krämer, Patrick Struck, Maximiliane Weishäupl
2023/1524 (PDF ) SoK: Signatures With Randomizable Keys Sofía Celi, Scott Griffy, Lucjan Hanzlik, Octavio Perez Kempner, Daniel Slamanig
2023/1523 (PDF ) On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching Seung Geol Choi, Dana Dachman-Soled, Mingyu Liang, Linsheng Liu, Arkady Yerukhimovich
2023/1522 (PDF ) cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA Shiyu Shen, Hao Yang, Wenqian Li, Yunlei Zhao
2023/1521 (PDF ) A reduced set of submatrices for a faster evaluation of the MDS property of a circulant matrix with entries that are powers of two Dragan Lambić
2023/1520 (PDF ) Kirby: A Robust Permutation-Based PRF Construction Charlotte Lefevre, Yanis Belkheyar, Joan Daemen
2023/1519 (PDF ) Accountable Decryption made Formal and Practical Rujia Li, Yuanzhao Li, Qin Wang, Sisi Duan, Qi Wang, Mark Ryan
2023/1518 (PDF ) Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees Matteo Campanelli, Antonio Faonio, Dario Fiore, Tianyu Li, Helger Lipmaa
2023/1517 (PDF ) Threshold Implementations with Non-Uniform Inputs Siemen Dhooghe, Artemii Ovchinnikov
2023/1516 (PDF ) On the Viability of Open-Source Financial Rails: Economic Security of Permissionless Consensus Jacob D. Leshno, Rafael Pass, Elaine Shi
2023/1515 (PDF ) OPTIKS: An Optimized Key Transparency System Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno
2023/1514 (PDF ) Leakage-Free Probabilistic Jasmin Programs José Bacelar Almeida, Denis Firsov, Tiago Oliveira, Dominique Unruh
2023/1513 (PDF ) Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements Marcel Tiepelt, Edward Eaton, Douglas Stebila
2023/1512 (PDF ) List Oblivious Transfer and Applications to Round-Optimal Black-Box Multiparty Coin Tossing Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Hendrik Waldner
2023/1511 (PDF ) Lower bound of costs of formulas to compute image curves of $3$-isogenies in the framework of generalized Montgomery coordinates Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
2023/1510 (PDF ) Towards Practical Doubly-Efficient Private Information Retrieval Hiroki Okada, Rachel Player, Simon Pohmann, Christian Weinert
2023/1509 (PDF ) Efficient and Usable Coercion-Resistant E-Voting on the Blockchain Neyire Deniz Sarier
2023/1508 (PDF ) Provable Dual Attacks on Learning with Errors Amaury Pouly, Yixin Shen
2023/1507 (PDF ) Efficient Agreement Over Byzantine Gossip Ran Cohen, Julian Loss, Tal Moran
2023/1506 (PDF ) IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram Tomoki Moriya
2023/1505 (PDF ) PQ.V.ALU.E: Post-Quantum RISC-V Custom ALU Extensions on Dilithium and Kyber Konstantina Miteloudi, Joppe Bos, Olivier Bronchain, Björn Fay, Joost Renes
2023/1504 (PDF ) Algebraic Group Model with Oblivious Sampling Helger Lipmaa, Roberto Parisella, Janno Siim
2023/1503 (PDF ) zk-Bench: A Toolset for Comparative Evaluation and Performance Benchmarking of SNARKs Jens Ernstberger, Stefanos Chaliasos, George Kadianakis, Sebastian Steinhorst, Philipp Jovanovic, Arthur Gervais, Benjamin Livshits, Michele Orrù
2023/1501 (PDF ) Space-Efficient and Noise-Robust Quantum Factoring Seyoon Ragavan, Vinod Vaikuntanathan
2023/1500 (PDF ) Holographic SNARGs for P and Batch-NP from (Polynomially Hard) Learning with Errors Susumu Kiyoshima
2023/1499 (PDF ) Linearly-Homomorphic Signatures for Short Randomizable Proofs of Subset Membership David Pointcheval
2023/1498 (PDF ) LWE with Quantum Amplitudes: Algorithm, Hardness, and Oblivious Sampling Yilei Chen, Zihan Hu, Qipeng Liu, Han Luo, Yaxin Tu
2023/1497 (PDF ) A note on ``authenticated key agreement protocols for dew-assisted IoT systems'' Zhengjun Cao, Lihua Liu
2023/1496 (PDF ) A Privacy-preserving Central Bank Ledger for Central Bank Digital Currency Chan Wang Mong Tikvah
2023/1495 (PDF ) Key Committing Security Analysis of AEGIS Takanori Isobe, Mostafizar Rahman
2023/1493 (PDF ) Measuring the Concentration of Control in Contemporary Ethereum Simon Brown
2023/1492 (PDF ) A Quantum Approach For Reducing Communications in Classical Secure Computations with Long Outputs Jiayu Zhang
2023/1491 (PDF ) Subversion-Resilient Signatures without Random Oracles Pascal Bemmann, Sebastian Berndt, Rongmao Chen
2023/1490 (PDF ) Formulations and Constructions of Remote State Preparation with Verifiability, with Applications Jiayu Zhang
2023/1489 (PDF ) To Broadcast or Not to Broadcast: Decision-Making Strategies for Mining Empty Blocks Chon Kit Lao, Rui Jiang, Luyao Zhang, Fan Zhang, Ye Wang
2023/1488 (PDF ) SCALLOP-HD: group action from 2-dimensional isogenies Mingjie Chen, Antonin Leroux, Lorenz Panny
2023/1487 (PDF ) A Novel Mathematical Formal Proof in Unreliability Protocol with XOR in Two's Complement System Chenglian Liu, Sonia Chien-I Chen
2023/1486 (PDF ) RC4OK. An improvement of the RC4 stream cipher Khovayko O., Schelkunov D.
2023/1485 (PDF ) How to Physically Hold Your Bitcoins ? Houda Ferradi, Antoine Houssais, David Naccache
2023/1484 (PDF ) Blind signatures from Zero knowledge in the Kummer variety Paulo L. Barreto, Devin D. Reich, Marcos A. Simplicio Jr., Gustavo H. M. Zanon
2023/1483 (PDF ) Lower Bounds on Anonymous Whistleblowing Willy Quach, LaKyah Tyner, Daniel Wichs
2023/1482 (PDF ) Twinkle: Threshold Signatures from DDH with Full Adaptive Security Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, Chenzhi Zhu
2023/1481 (PDF ) A Total Break of the Scrap Digital Signature Scheme Daniel Smith-Tone
2023/1480 (PDF ) The Pre-Shared Key Modes of HPKE Joël Alwen, Jonas Janneck, Eike Kiltz, Benjamin Lipp
2023/1479 (PDF ) Rational Broadcast Protocols against Timid Adversaries Keigo Yamashita, Kenji Yasunaga
2023/1478 (PDF ) Succinct Proofs and Linear Algebra Alex Evans, Guillermo Angeris
2023/1477 (PDF ) G+G: A Fiat-Shamir Lattice Signature Based on Convolved Gaussians Julien Devevey, Alain Passelègue, Damien Stehlé
2023/1476 (PDF ) Auditable Obfuscation Shalini Banerjee, Steven D. Galbraith
2023/1475 (PDF ) Tropical cryptography III: digital signatures Jiale Chen, Dima Grigoriev, Vladimir Shpilrain
2023/1474 (PDF ) Efficacy and Mitigation of the Cryptanalysis on AIM Seongkwang Kim, Jincheol Ha, Mincheol Son, Byeonghak Lee
2023/1473 (PDF ) Cicada: A framework for private non-interactive on-chain auctions and voting Noemi Glaeser, István András Seres, Michael Zhu, Joseph Bonneau
2023/1472 (PDF ) Naysayer proofs István András Seres, Noemi Glaeser, Joseph Bonneau
2023/1471 (PDF ) NTRU in Quaternion Algebras of Bounded Discriminant Cong Ling, Andrew Mendelsohn
2023/1470 (PDF ) Zero-Knowledge Systems from MPC-in-the-Head and Oblivious Transfer Cyprien Delpech de Saint Guilhem, Ehsan Ebrahimi, Barry van Leeuwen
2023/1469 (PDF ) SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions Martin R. Albrecht, Giacomo Fenzi, Oleksandra Lapiha, Ngoc Khanh Nguyen
2023/1468 (PDF ) QFESTA: Efficient Algorithms and Parameters for FESTA using Quaternion Algebras Kohei Nakagawa, Hiroshi Onuki
2023/1467 (PDF ) GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Takashi Nishide
2023/1466 (PDF ) On Black-Box Verifiable Outsourcing Amit Agarwal, Navid Alamati, Dakshita Khurana, Srinivasan Raghuraman, Peter Rindal
2023/1465 (PDF ) Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search Dominique Dittert, Thomas Schneider, Amos Treiber
2023/1464 (PDF ) Round-Robin is Optimal: Lower Bounds for Group Action Based Protocols Daniele Cozzo, Emanuele Giunta
2023/1463 (PDF ) Aurora: Leaderless State-Machine Replication with High Throughput Hao Lu, Jian Liu, Kui Ren
2023/1462 (PDF ) High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application Rashmi Agrawal, Jung Ho Ahn, Flavio Bergamaschi, Ro Cammarota, Jung Hee Cheon, Fillipe D. M. de Souza, Huijing Gong, Minsik Kang, Duhyeong Kim, Jongmin Kim, Hubert de Lassus, Jai Hyun Park, Michael Steiner, Wen Wang
2023/1461 (PDF ) Do Private Transaction Pools Mitigate Frontrunning Risk? Agostino Capponi, Ruizhe Jia, Ye Wang
2023/1460 (PDF ) Rigorous Foundations for Dual Attacks in Coding Theory Charles Meyer-Hilfiger, Jean-Pierre Tillich
2023/1459 (PDF ) Identity-Based Threshold Signatures from Isogenies Shahla Atapoor
2023/1458 (PDF ) A Further Study of Vectorial Dual-Bent Functions Jiaxin Wang, Fang-Wei Fu, Yadi Wei, Jing Yang
2023/1457 (PDF ) Provable Security Analysis of the Secure Remote Password Protocol Dennis Dayanikli, Anja Lehmann
2023/1456 (PDF ) The Generating Series of Support Minors MinRank Ideals Daniel Smith-Tone
2023/1455 (PDF ) Efficient Secure Two Party ECDSA Sermin Kocaman, Younes Talibi Alaoui
2023/1454 (PDF ) Scalable Off-Chain Auctions Mohsen Minaei, Ranjit Kumaresan, Andrew Beams, Pedro Moreno-Sanchez, Yibin Yang, Srinivasan Raghuraman, Panagiotis Chatzigiannis, Mahdi Zamani, Duc V. Le
2023/1453 (PDF ) Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies Qinggan Fu, Ye Luo, Qianqian Yang, Ling Song
2023/1452 (PDF ) Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems Jules Maire, Damien Vergnaud
2023/1451 (PDF ) Counting Unpredictable Bits: A Simple PRG from One-way Functions Noam Mazor, Rafael Pass
2023/1450 (PDF ) Post-Quantum Fully Homomorphic Encryption with Group Ring Homomorphisms Christopher Leonardi, Maya Gusak
2023/1449 (PDF ) Truncated Differential Cryptanalysis: New Insights and Application to QARMAv1-n and QARMAv2-64 Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia
2023/1448 (PDF ) The supersingular endomorphism ring problem given one endomorphism Arthur Herlédan Le Merdy, Benjamin Wesolowski
2023/1447 (PDF ) Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions Shuichi Katsumata, Michael Reichle, Yusuke Sakai
2023/1446 (PDF ) HE$^3$DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, Zhenyu Guan
2023/1445 (PDF ) HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu
2023/1444 (PDF ) On Time-Space Lower Bounds for Finding Short Collisions in Sponge Hash Functions Akshima, Xiaoqi Duan, Siyao Guo, Qipeng Liu
2023/1443 (PDF ) Security with Functional Re-Encryption from CPA Yevgeniy Dodis, Shai Halevi, Daniel Wichs
2023/1442 (PDF ) Everlasting ROBOT: the Marvin Attack Hubert Kario
2023/1441 (PDF ) Out of the Box Testing Hubert Kario
2023/1440 (PDF ) Comment on Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud Chenglian Liu, Sonia Chien-I Chen
2023/1439 (PDF ) Dynamic Security Aspects of Onion Routing Alessandro Melloni, Martijn Stam, Øyvind Ytrehus
2023/1438 (PDF ) Private Web Search with Tiptoe Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Nickolai Zeldovich
2023/1437 (PDF ) KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates YongRyeol Choi, MinGi Kim, YoungBeom Kim, JinGyo Song, JaeHwan Jin, HeeSeok Kim, Seog Chung Seo
2023/1436 (PDF ) Cryptanalysis of Elisabeth-4 Henri Gilbert, Rachelle Heim Boissier, Jérémy Jean, Jean-René Reinhard
2023/1435 (PDF ) Identity-Based Matchmaking Encryption with Enhanced Privacy Against Chosen-Ciphertext Attacks Sohto Chiku, Keitaro Hashimoto, Keisuke Hara, Junji Shikata
2023/1434 (PDF ) An Efficient Strong Asymmetric PAKE Compiler Instantiable from Group Actions Ian McQuoid, Jiayu Xu
2023/1433 (PDF ) A polynomial-time attack on instances of M-SIDH and FESTA Wouter Castryck, Frederik Vercauteren
2023/1432 (PDF ) Populating the Zoo of Rugged Pseudorandom Permutations Jean Paul Degabriele, Vukašin Karadžić
2023/1431 (PDF ) Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs Yaobin Shen, François-Xavier Standaert, Lei Wang
2023/1430 (PDF ) A note on ``ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor'' Zhengjun Cao, Lihua Liu
2023/1429 (PDF ) Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants Shiyu Shen, Hao Yang, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao
2023/1428 (PDF ) XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption Hao Yang, Shiyu Shen, Siyang Jiang, Lu Zhou, Wangchen Dai, Yunlei Zhao
2023/1427 (PDF ) Efficient Hardware RNS Decomposition for Post-Quantum Signature Scheme FALCON Samuel Coulon, Pengzhou He, Tianyou Bao, Jiafeng Xie
2023/1426 (PDF ) Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC Aysajan Abidin, Erik Pohle, Bart Preneel
2023/1425 (PDF ) Popping “R-propping”: breaking hardness assumptions for matrix groups over F_{2^8} Fernando Virdia
2023/1424 (PDF ) PRIVATON - Privacy Preserving Automaton for Proof of Computations Bala Subramanyan
2023/1423 (PDF ) Quantum Lattice Enumeration in Limited Depth Nina Bindel, Xavier Bonnetain, Marcel Tiepelt, Fernando Virdia
2023/1422 (PDF ) Tight Security Bound of 2k-LightMAC Plus Nilanjan Datta, Avijit Dutta, Samir Kundu
2023/1421 (PDF ) Efficient Secure Storage with Version Control and Key Rotation Long Chen, Hui Guo, Ya-Nan Li, Qiang Tang
2023/1420 (PDF ) Rogue-Instance Security for Batch Knowledge Proofs Gil Segev, Amit Sharabi, Eylon Yogev
2023/1419 (PDF ) Improving the Rectangle Attack on GIFT-64 Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang, Zhuohui Feng
2023/1418 (PDF ) Short Concurrent Covert Authenticated Key Exchange (Short cAKE) Karim Eldafrawy, Nicholas Genise, Stanislaw Jarecki
2023/1417 (PDF ) Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits Qun Liu, Bart Preneel, Zheng Zhao, Meiqin Wang
2023/1416 (PDF ) On Black-Box Knowledge-Sound Commit-And-Prove SNARKs Helger Lipmaa
2023/1415 (PDF ) Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes Jonathan Bootle, Sebastian Faller, Julia Hesse, Kristina Hostáková, Johannes Ottenhues
2023/1414 (PDF ) Differential-Linear Approximation Semi-Unconstrained Searching and Partition Tree: Application to LEA and Speck Yi Chen, Zhenzhen Bao, Hongbo Yu
2023/1413 (PDF ) Scalable Multi-party Private Set Union from Multi-Query Secret-Shared Private Membership Test Xiang Liu, Ying Gao
2023/1412 (PDF ) Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai
2023/1411 (PDF ) zk-SNARKs from Codes with Rank Metrics Xuan-Thanh Do, Dang-Truong Mac, Quoc-Huy Vu
2023/1410 (PDF ) Two Algorithms for Fast GPU Implementation of NTT Ali Şah Özcan, Erkay Savaş
2023/1409 (PDF ) Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith Jonas Meers, Julian Nowakowski
2023/1408 (PDF ) Correlation Cube Attack Revisited: Improved Cube Search and Superpoly Recovery Techniques Jianhua Wang, Lu Qin, Baofeng Wu
2023/1407 (PDF ) Fully Homomorphic Encryption-Based Protocols for Enhanced Private Set Intersection Functionalities JINGWEI HU, Junyan Chen, Wangchen Dai, Huaxiong Wang
2023/1406 (PDF ) Sigmabus: Binding Sigmas in Circuits for Fast Curve Operations George Kadianakis, Mary Maller, Andrija Novakovic
2023/1405 (PDF ) Lattice-based Succinct Arguments from Vanishing Polynomials Valerio Cini, Russell W. F. Lai, Giulio Malavolta
2023/1404 (PDF ) (Verifiable) Delay Functions from Lucas Sequences Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Tomáš Krňák
2023/1403 (PDF ) Searching for ELFs in the Cryptographic Forest Marc Fischlin, Felix Rohrbach
2023/1402 (PDF ) Fully Homomorphic Encryption: A Mathematical Introduction Sara Logsdon
2023/1401 (PDF ) On the Multi-User Security of LWE-based NIKE Roman Langrehr
2023/1400 (PDF ) Efficient Updatable Public-Key Encryption from Lattices Calvin Abou Haidar, Alain Passelègue, Damien Stehlé
2023/1399 (PDF ) The supersingular Endomorphism Ring and One Endomorphism problems are equivalent Aurel Page, Benjamin Wesolowski
2023/1398 (PDF ) To attest or not to attest, this is the question – Provable attestation in FIDO2 Nina Bindel, Nicolas Gama, Sandra Guasch, Eyal Ronen
2023/1397 (PDF ) Algebraic Attacks on Round-Reduced RAIN and Full AIM-III Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, Hongrui Cui
2023/1396 (PDF ) Accelerating Isogeny Walks for VDF Evaluation David Jacquemin, Anisha Mukherjee, Ahmet Can Mert, Sujoy Sinha Roy
2023/1395 (PDF ) Generic SCARE: reverse engineering without knowing the algorithm nor the machine Ronan Lashermes, Hélène Le Bouder
2023/1394 (PDF ) Incrementally Verifiable Computation via Rate-1 Batch Arguments Omer Paneth, Rafael Pass
2023/1393 (PDF ) OpenVoting: Recoverability from Failures in Dual Voting Prashant Agrawal, Kabir Tomer, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Sharma, Subhashis Banerjee
2023/1392 (PDF ) Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng
2023/1391 (PDF ) More Insight on Deep Learning-aided Cryptanalysis Zhenzhen Bao, Jinyu Lu, Yiran Yao, Liu Zhang
2023/1390 (PDF ) Comparse: Provably Secure Formats for Cryptographic Protocols Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan
2023/1389 (PDF ) Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces Dario Fiore, Dimitris Kolonelos, Paola de Perthuis
2023/1388 (PDF ) Sigma Protocols from Verifiable Secret Sharing and Their Applications Min Zhang, Yu Chen, Chuanzhou Yao, Zhichao Wang
2023/1387 (PDF ) Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu
2023/1386 (PDF ) Improving Privacy of Anonymous Proof-of-Stake Protocols Shichen Wu, Zhiying Song, Puwen Wei, Peng Tang, Quan Yuan
2023/1385 (PDF ) WhatsUpp with Sender Keys? Analysis, Improvements and Security Proofs David Balbás, Daniel Collins, Phillip Gajland
2023/1384 (PDF ) Application of Mordell-Weil lattices with large kissing numbers to acceleration of multi-scalar multiplication on elliptic curves Dmitrii Koshelev
2023/1383 (PDF ) Registered ABE via Predicate Encodings Ziqi Zhu, Kai Zhang, Junqing Gong, Haifeng Qian
2023/1382 (PDF ) HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
2023/1381 (PDF ) Sometimes You Can’t Distribute Random-Oracle-Based Proofs Jack Doerner, Yashvanth Kondi, Leah Namisa Rosenbloom
2023/1380 (PDF ) Tighter Security for Generic Authenticated Key Exchange in the QROM Jiaxin Pan, Benedikt Wagner, Runzhi Zeng
2023/1379 (PDF ) GLEVIAN and VIGORNIAN: Robust beyond-birthday AEAD modes Peter Campbell
2023/1378 (PDF ) Advisor-Verifier-Prover Games and the Hardness of Information Theoretic Cryptography Benny Applebaum, Oded Nir
2023/1377 (PDF ) Janus: Fast Privacy-Preserving Data Provenance For TLS Jan Lauinger, Jens Ernstberger, Andreas Finkenzeller, Sebastian Steinhorst
2023/1376 (PDF ) Bootstrapping Homomorphic Encryption via Functional Encryption Nir bitansky, Tomer Solomon
2023/1375 (PDF ) DeepCover DS28C36: A Hardware Vulnerability Identification and Exploitation Using T-Test and Double Laser Fault Injection Karim M. Abdellatif, Olivier Hériveaux
2023/1374 (PDF ) On Weighted-Sum Orthogonal Latin Squares and Secret Sharing Koji Nuida, Tomoko Adachi
2023/1373 (PDF ) Reframing and Extending the Random Probing Expandibility to Make Probing-Secure Compilers Tolerate a Constant Noise Giuseppe Manzoni
2023/1372 (PDF ) Cryptographic Key Exchange: An Innovation Outlook Gideon Samid
2023/1371 (PDF ) Oracle Recording for Non-Uniform Random Oracles, and its Applications Minki Hhan, Aaram Yun
2023/1370 (PDF ) Ideal-SVP is Hard for Small-Norm Uniform Prime Ideals Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé, Benjamin Wesolowski
2023/1369 (PDF ) Ramp hyper-invertible matrices and their applications to MPC protocols Hongqing Liu, Chaoping Xing, Yanjiang Yang, Chen Yuan
2023/1368 (PDF ) Towards post-quantum secure PAKE - A tight security proof for OCAKE in the BPR model Nouri Alnahawi, Kathrin Hövelmanns, Andreas Hülsing, Silvia Ritsch, Alexander Wiesmaier
2023/1367 (PDF ) Practical Constructions for Single Input Functionality against a Dishonest Majority Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2023/1366 (PDF ) Compact Frequency Estimators in Adversarial Environments Sam A. Markelon, Mia Filić, Thomas Shrimpton
2023/1365 (PDF ) On The Black-Box Complexity of Correlation Intractability Nico Döttling, Tamer Mour
2023/1364 (PDF ) Convex Consensus with Asynchronous Fallback Andrei Constantinescu, Diana Ghinea, Roger Wattenhofer, Floris Westermann
2023/1363 (PDF ) Amortized NISC over $\mathbb{Z}_{2^k}$ from RMFE Fuchun Lin, Chaoping Xing, Yizhou Yao, Chen Yuan
2023/1362 (PDF ) Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols David Fifield
2023/1361 (PDF ) Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, Bart Preneel
2023/1360 (PDF ) Payment Splitting in Lightning Network as a Mitigation Against Balance Discovery Attacks Gijs van Dam
2023/1359 (PDF ) Automated Meet-in-the-Middle Attack Goes to Feistel Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang
2023/1358 (PDF ) The Locality of Memory Checking Weijie Wang, Yujie Lu, Charalampos Papamanthou, Fan Zhang
2023/1357 (PDF ) Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication Koustabh Ghosh, Parisa Amiri Eliasi, Joan Daemen
2023/1356 (PDF ) Small Private Key Attack Against a Family of RSA-like Cryptosystems George Teseleanu, Paul Cotan
2023/1355 (PDF ) Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, Xiaolei Dong
2023/1354 (PDF ) Privacy Preserving Feature Selection for Sparse Linear Regression Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini
2023/1353 (PDF ) Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, Mingsheng Wang
2023/1352 (PDF ) ACE-HoT: Accelerating an extreme amount of symmetric Cipher Evaluations for High-Order avalanche Tests Emanuele Bellini, Juan Grados, Mohamed Rachidi, Nitin Satpute, Joan Daemen, Solane Elhirch
2023/1351 (PDF ) Bicameral and Auditably Private Signatures Khoa Nguyen, Partha Sarathi Roy, Willy Susilo, Yanhong Xu
2023/1350 (PDF ) On the Security of KZG Commitment for VSS Atsuki Momose, Sourav Das, Ling Ren
2023/1349 (PDF ) Communication Lower Bounds of Key-Agreement Protocols via Density Increment Arguments Mi-Ying (Miryam) Huang, Xinyu Mao, Guangxu Yang, Jiapeng Zhang
2023/1348 (PDF ) Adaptively Secure (Aggregatable) PVSS and Application to Distributed Randomness Beacons Renas Bacho, Julian Loss
2023/1347 (PDF ) Decentralised Repeated Modular Squaring Service Revisited: Attack and Mitigation Aydin Abadi
2023/1346 (PDF ) Street Rep: A Privacy-Preserving Reputation Aggregation System Christophe Hauser, Shirin Nilizadeh, Yan Shoshitaishvili, Ni Trieu, Srivatsan Ravi, Christopher Kruegel, Giovanni Vigna
2023/1345 (PDF ) Experimenting with Zero-Knowledge Proofs of Training Sanjam Garg, Aarushi Goel, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Guru-Vamsi Policharla, Mingyuan Wang
2023/1344 (PDF ) Analyzing the Real-World Security of the Algorand Blockchain Fabrice Benhamouda, Erica Blum, Jonathan Katz, Derek Leung, Julian Loss, Tal Rabin
2023/1343 (PDF ) Universally Composable Auditable Surveillance Valerie Fetzer, Michael Klooß, Jörn Müller-Quade, Markus Raiber, Andy Rupp
2023/1342 (PDF ) Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing David Balbás, Dario Fiore, Maria Isabel González Vasco, Damien Robissout, Claudio Soriente
2023/1341 (PDF ) Combined Private Circuits - Combined Security Refurbished Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert
2023/1340 (PDF ) Methods for Masking CRYSTALS-Kyber Against Side-Channel Attacks Sıla ÖZEREN, Oğuz YAYLA
2023/1339 (PDF ) FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains Aniket Kate, Easwar Vivek Mangipudi, Siva Mardana, Pratyay Mukherjee
2023/1338 (PDF ) Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, Ari Juels
2023/1337 (PDF ) SoK: Public Key Encryption with Openings Carlo Brunetta, Hans Heum, Martijn Stam
2023/1336 (PDF ) Riggs: Decentralized Sealed-Bid Auctions Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad Wahby, Joseph Bonneau, David Mazières
2023/1335 (PDF ) Antrag: Annular NTRU Trapdoor Generation Thomas Espitau, Thi Thu Quyen Nguyen, Chao Sun, Mehdi Tibouchi, Alexandre Wallet
2023/1334 (PDF ) A Generic Construction of Tightly Secure Password-based Authenticated Key Exchange Jiaxin Pan, Runzhi Zeng
2023/1333 (PDF ) Neutrosophic Boolean Function and Rejection Sampling in Post Quantum Cryptography Shashi Kant Pandey
2023/1332 (PDF ) Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem Harry Eldridge, Gabrielle Beck, Matthew Green, Nadia Heninger, Abhishek Jain
2023/1331 (PDF ) Pantheon: Private Retrieval from Public Key-Value Store Ishtiyaque Ahmad, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
2023/1330 (PDF ) Notes on Small Private Key Attacks on Common Prime RSA Mengce Zheng
2023/1329 (PDF ) Layered Symbolic Security Analysis in DY$^\star$ Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Kuesters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann, Tim Würtele
2023/1328 (PDF ) Optimizing HE operations via Level-aware Key-switching Framework Intak Hwang, Jinyeong Seo, Yongsoo Song
2023/1327 (PDF ) Fine-Grained Secure Attribute-Based Encryption Yuyu Wang, Jiaxin Pan, Yu Chen
2023/1326 (PDF ) Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, Dawu Gu
2023/1325 (PDF ) The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard Florian Helmschmidt, Pedram Hosseyni, Ralf Kuesters, Klaas Pruiksma, Clara Waldmann, Tim Würtele
2023/1324 (PDF ) Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE Yunxiao Zhou, Shengli Liu, Shuai Han, Haibin Zhang
2023/1323 (PDF ) MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks Thomas Chamelot, Damien Couroussé, Karine Heydemann
2023/1322 (PDF ) Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge Samuel Dittmer, Karim Eldefrawy, Stéphane Graham-Lengrand, Steve Lu, Rafail Ostrovsky, Vitor Pereira
2023/1321 (PDF ) Generic Constructions of Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes Jiaxin Pan, Benedikt Wagner, Runzhi Zeng
2023/1320 (PDF ) Practical Privacy-Preserving Machine Learning using Fully Homomorphic Encryption Michael Brand, Gaëtan Pradel
2023/1319 (PDF ) On the Black-Box Separation Between Ring Signatures and Public Key Encryptions Kyosuke Yamashita, Keisuke Hara
2023/1318 (PDF ) Two-Round Threshold Lattice-Based Signatures from Threshold Homomorphic Encryption Kamil Doruk Gur, Jonathan Katz, Tjerand Silde
2023/1317 (PDF ) Pisces: Private and Compliable Cryptocurrency Exchange Ya-Nan Li, Tian Qiu, Qiang Tang
2023/1316 (PDF ) Communication Lower Bounds for Cryptographic Broadcast Protocols Erica Blum, Elette Boyle, Ran Cohen, Chen-Da Liu-Zhang
2023/1315 (PDF ) LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures Erkan Tairi, Pedro Moreno-Sanchez, Clara Schneidewind
2023/1314 (PDF ) Cryptanalysis of HALFLOOP Block Ciphers: Destroying HALFLOOP-24 Gregor Leander, Shahram Rasoolzadeh, Lukas Stennes
2023/1313 (PDF ) Hashing into quadratic residues modulo a safe prime composite Sietse Ringers
2023/1312 (PDF ) Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang
2023/1311 (PDF ) Are continuous stop-and-go mixnets provably secure? Debajyoti Das, Claudia Diaz, Aggelos Kiayias, Thomas Zacharias
2023/1310 (PDF ) FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay
2023/1309 (PDF ) A Lattice-based Publish-Subscribe Communication Protocol using Accelerated Homomorphic Encryption Primitives Anes Abdennebi, Erkay Savaş
2023/1308 (PDF ) How to Recover a Cryptographic Secret From the Cloud David Adei, Chris Orsini, Alessandra Scafuro, Tanner Verber
2023/1307 (PDF ) Constant-Round Private Decision Tree Evaluation for Secret Shared Data Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, Kazunari Tozawa
2023/1306 (PDF ) Single-query Quantum Hidden Shift Attacks Xavier Bonnetain, André Schrottenloher
2023/1305 (PDF ) About “$k$-bit security” of MACs based on hash function Streebog Vitaly Kiryukhin
2023/1304 (PDF ) Homomorphic polynomial evaluation using Galois structure and applications to BFV bootstrapping Hiroki Okada, Rachel Player, Simon Pohmann
2023/1303 (PDF ) On security aspects of CRISP Vitaly Kiryukhin
2023/1302 (PDF ) Revisiting the Differential Meet-In-The-Middle Cryptanalysis Ling Song, Qianqian Yang, Huimin Liu
2023/1301 (PDF ) Short Paper: Accountable Safety Implies Finality Joachim Neu, Ertem Nusret Tas, David Tse
2023/1300 (PDF ) Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix’ Core Martin R. Albrecht, Benjamin Dowling, Daniel Jones
2023/1299 (PDF ) A New RSA Variant Based on Elliptic Curves Maher Boudabra, Abderrahmane Nitaj
2023/1298 (PDF ) NEV: Faster and Smaller NTRU Encryption using Vector Decoding Jiang Zhang, Dengguo Feng, Di Yan
2023/1297 (PDF ) Entropic Quasigroup Based Secret Agreement Using Large Order Automorphisms Daniel Nager
2023/1296 (PDF ) A note on ``blockchain-assisted authentication and key agreement scheme for fog-based smart grid'' Zhengjun Cao, Lihua Liu
2023/1295 (PDF ) Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks Yuqing Zhao, Chun Guo, Weijia Wang
2023/1294 (PDF ) PrivMail: A Privacy-Preserving Framework for Secure Emails Gowri R Chandran, Raine Nieminen, Thomas Schneider, Ajith Suresh
2023/1293 (PDF ) Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era María Isabel González Vasco, Delaram Kahrobaei, Eilidh McKemmie
2023/1292 (PDF ) Enhancing Data Security: A Study of Grain Cipher Encryption using Deep Learning Techniques Payal, Pooja, Girish Mishra
2023/1291 (PDF ) On the Invalidity of LV16/Lin17 Obfuscation Schemes Revisited Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong
2023/1290 (PDF ) Comparative Analysis of ResNet and DenseNet for Differential Cryptanalysis of SPECK 32/64 Lightweight Block Cipher Ayan Sajwan, Girish Mishra
2023/1289 (PDF ) Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations Carmen Wabartha, Julian Liedtke, Nicolas Huber, Daniel Rausch, Ralf Kuesters
2023/1288 (PDF ) An erf Analog for Discrete Gaussian Sampling Nicolas Gama, Anand Kumar Narayanan, Ryder LiuLin, Dongze Yue
2023/1287 (PDF ) To extend or not to extend: Agile Masking Instructions for PQC Markus Krausz, Georg Land, Florian Stolz, Dennis Naujoks, Jan Richter-Brockmann, Tim Güneysu, Lucie Kogelheide
2023/1286 (PDF ) Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory Xiaoyang Dong, Shun Li, Phuong Pham, Guoyan Zhang
2023/1285 (PDF ) Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns Sujaya Maiyya, Sharath Vemula, Divyakant Agrawal, Amr El Abbadi, Florian Kerschbaum
2023/1284 (PDF ) Improving logarithmic derivative lookups using GKR Shahar Papini, Ulrich Haböck
2023/1283 (PDF ) A Univariate Attack against the Limited-Data Instance of Ciminion Augustin Bariant
2023/1282 (PDF ) Proof-Carrying Data from Multi-folding Schemes Zibo Zhou, Zongyang Zhang, Zhiyu Zhang, Jin Dong
2023/1281 (PDF ) Leveraging Machine Learning for Bidding Strategies in Miner Extractable Value (MEV) Auctions Christoffer Raun, Benjamin Estermann, Liyi Zhou, Kaihua Qin, Roger Wattenhofer, Arthur Gervais, Ye Wang
2023/1280 (PDF ) Quantum Security of TNT Shuping Mao, Zhiyu Zhang, Lei Hu, Luying Li, Peng Wang
2023/1279 (PDF ) General Non-interactive Quantum Commitments Are Compatible with Quantum Rewinding Jun Yan
2023/1278 (PDF ) Compositional Formal Verification of Zero-Knowledge Circuits Alessandro Coglio, Eric McCarthy, Eric Smith, Collin Chin, Pranav Gaddamadugu, Michel Dellepere
2023/1277 (PDF ) Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption Anaïs Barthoulot, Olivier Blazy, Sébastien Canard
2023/1276 (PDF ) Witness Authenticating NIZKs and Applications Hanwen Feng, Qiang Tang
2023/1275 (PDF ) Post-Quantum Asynchronous Remote Key Generation for FIDO2 Account Recovery Jacqueline Brendel, Sebastian Clermont, Marc Fischlin
2023/1274 (PDF ) ACABELLA: Automated (Crypt)analysis of Attribute-Based Encryption Leveraging Linear Algebra Antonio de la Piedra, Marloes Venema, Greg Alpár
2023/1273 (PDF ) Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees Peter Gaži, Aggelos Kiayias, Alexander Russell
2023/1272 (PDF ) Tight Security of TNT and Beyond: Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm Ashwin Jha, Mustafa Khairallah, Mridul Nandi, Abishanka Saha
2023/1271 (PDF ) Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs Tianyi Liu, Tiancheng Xie, Jiaheng Zhang, Dawn Song, Yupeng Zhang
2023/1270 (PDF ) Computational Wiretap Coding from Indistinguishability Obfuscation Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry
2023/1269 (PDF ) SIGMA: Secure GPT Inference with Function Secret Sharing Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, Rahul Sharma
2023/1268 (PDF ) Finding Orientations of Supersingular Elliptic Curves and Quaternion Orders Sarah Arpin, James Clements, Pierrick Dartois, Jonathan Komada Eriksen, Péter Kutas, Benjamin Wesolowski
2023/1267 (PDF ) Whipping the MAYO Signature Scheme using Hardware Platforms Florian Hirner, Michael Streibl, Florian Krieger, Ahmet Can Mert, Sujoy Sinha Roy
2023/1266 (PDF ) Automatic Preimage Attack Framework on \ascon Using a Linearize-and-Guess Approach Huina Li, Le He, Shiyao Chen, Jian Guo, Weidong Qiu
2023/1265 (PDF ) Key-Agreement with Perfect Completeness from Random Oracles Noam Mazor
2023/1264 (PDF ) An optimization of the addition gate count in Plonkish circuits Steve Thakur
2023/1263 (PDF ) Quantum security analysis of Wave Johanna Loyer
2023/1262 (PDF ) Phoenixx: Linear consensus with random sampling David Chaum, Bernardo Cardoso, William Carter, Mario Yaksetig, Baltasar Aroso
2023/1261 (PDF ) Faster constant-time evaluation of the Kronecker symbol with application to elliptic curve hashing Diego F. Aranha, Benjamin Salling Hvass, Bas Spitters, Mehdi Tibouchi
2023/1260 (PDF ) Public-Key Encryption from Average Hard NP Language Hongda Li, Peifang Ni, Yao Zan
2023/1259 (PDF ) Nonlinear computations on FinTracer tags Michael Brand, Tania Churchill, Carsten Friedrich
2023/1258 (PDF ) Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting Tianyao Gu, Yilei Wang, Afonso Tinoco, Bingnan Chen, Ke Yi, Elaine Shi
2023/1257 (PDF ) Batchman and Robin: Batched and Non-batched Branching for Interactive ZK Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam
2023/1256 (PDF ) On Soundness Notions for Interactive Oracle Proofs Alexander R. Block, Albert Garreta, Pratyush Ranjan Tiwari, Michał Zając
2023/1255 (PDF ) A flexible Snark via the monomial basis Steve Thakur
2023/1254 (PDF ) LaKey: Efficient Lattice-Based Distributed PRFs Enable Scalable Distributed Key Management Matthias Geihs, Hart Montgomery
2023/1253 (PDF ) Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions Aggelos Kiayias, Nikos Leonardos, Yu Shen
2023/1252 (PDF ) Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger
2023/1251 (PDF ) Verifiable random function from the Deuring correspondence and higher dimensional isogenies Antonin Leroux
2023/1250 (PDF ) Revealable Functional Commitments: How to Partially Reveal a Secret Function Bharath Namboothiry
2023/1249 (PDF ) On the Black-Box Impossibility of Multi-Designated Verifiers Signature Schemes from Ring Signature Schemes Kyosuke Yamashita, Keisuke Hara
2023/1248 (PDF ) A Note on ``Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation'' Zhengjun Cao, Lihua Liu
2023/1247 (PDF ) Representations of Group Actions and their Applications in Cryptography Giuseppe D'Alconzo, Antonio J. Di Scala
2023/1246 (PDF ) Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao
2023/1245 (PDF ) Probabilistic Related-Key Statistical Saturation Cryptanalysis Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang
2023/1244 (PDF ) HERMES: Efficient Ring Packing using MLWE Ciphertexts and Application to Transciphering Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Jai Hyun Park, Damien Stehlé
2023/1243 (PDF ) Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements Cas Cremers, Eyal Ronen, Mang Zhao
2023/1242 (PDF ) Cascading Four Round LRW1 is Beyond Birthday Bound Secure Nilanjan Datta, Shreya Dey, Avijit Dutta, Sougata Mandal
2023/1241 (PDF ) Post-Quantum Single Secret Leader Election (SSLE) From Publicly Re-randomizable Commitments Dan Boneh, Aditi Partap, Lior Rotem
2023/1240 (PDF ) $\mathsf{FREPack}$: Improved SNARK Frontend for Highly Repetitive Computations Sriram Sridhar, Yi-Nuo Zhang
2023/1239 (PDF ) CSI-Otter: Isogeny-based (Partially) Blind Signatures from the Class Group Action with a Twist Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, Ling Qin
2023/1238 (PDF ) On the Independence Heuristic in the Dual Attack Andreas Wiemers, Kaveh Bashiri
2023/1237 (PDF ) More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities Hao Lei, Jiahui He, Kai Hu, Meiqin Wang
2023/1236 (PDF ) Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks Sajin Sasy, Aaron Johnson, Ian Goldberg
2023/1235 (PDF ) LOL: A Highly Flexible Framework for Designing Stream Ciphers Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian
2023/1234 (PDF ) Practical Key-Extraction Attacks in Leading MPC Wallets Nikolaos Makriyannis, Oren Yomtov, Arik Galansky
2023/1233 (PDF ) Tight Security of TNT: Reinforcing Khairallah's Birthday-bound Attack Ashwin Jha, Mridul Nandi, Abishanka Saha
2023/1232 (PDF ) Privacy-Preserving Outsourced Certificate Validation Tarek Galal, Anja Lehmann
2023/1231 (PDF ) Redundancy and equality test in the PMNS, application to Elliptic Curve Diffie–Hellman Fangan Yssouf Dosso, Alexandre Berzati, Nadia El Mrabet, Julien Proy
2023/1230 (PDF ) Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model Shuai Han, Shengli Liu, Zhedong Wang, Dawu Gu
2023/1229 (PDF ) Two Remarks on Torsion-Point Attacks in Isogeny-Based Cryptography Francesco Sica
2023/1228 (PDF ) Snowblind: A Threshold Blind Signature in Pairing-Free Groups Elizabeth Crites, Chelsea Komlo, Mary Maller, Stefano Tessaro, Chenzhi Zhu
2023/1227 (PDF ) Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications Kosei Sakamoto, Ryoma Ito, Takanori Isobe
2023/1226 (PDF ) SoK: Privacy-Preserving Smart Contract Huayi Qi, Minghui Xu, Dongxiao Yu, Xiuzhen Cheng
2023/1225 (PDF ) One-Message Secure Reductions: On the Cost of Converting Correlations Yuval Ishai, Mahimna Kelkar, Varun Narayanan, Liav Zafar
2023/1224 (PDF ) Theoretical analysis of decoding failure rate of non-binary QC-MDPC codes Kirill Vedenev, Yury Kosolapov
2023/1223 (PDF ) Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes Johannes Mono, Kamil Kluczniak, Tim Güneysu
2023/1222 (PDF ) Pay Less for Your Privacy: Towards Cost-Effective On-Chain Mixers Zhipeng Wang, Marko Cirkovic, Duc V. Le, William Knottenbelt, Christian Cachin
2023/1221 (PDF ) Non-distributable key-sharing protocol with particular emphasis on the Internet of Things Mario Mastriani
2023/1220 (PDF ) Advances in Reed-Solomon Code-Based Masking and Application to ML-KEM Pierre-Augustin Berthet, Yoan Rougeolle, Cédric Tavernier, Laurent Sauvage
2023/1219 (PDF ) A Note on “Secure Quantized Training for Deep Learning” Marcel Keller, Ke Sun
2023/1218 (PDF ) Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery Nicolas Mohnblatt, Alberto Sonnino, Kobi Gurkan, Philipp Jovanovic
2023/1217 (PDF ) Jolt: SNARKs for Virtual Machines via Lookups Arasu Arun, Srinath Setty, Justin Thaler
2023/1216 (PDF ) Unlocking the lookup singularity with Lasso Srinath Setty, Justin Thaler, Riad Wahby
2023/1215 (PDF ) Authentica: A Secure Authentication Mechanism using a Software-defined Unclonable Function Ripon Patgiri, Laiphrakpam Dolendro Singh
2023/1214 (PDF ) Verifiable Verification in Cryptographic Protocols Marc Fischlin, Felix Günther
2023/1213 (PDF ) Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu
2023/1212 (PDF ) CLRW1$^{3}$ is not Secure Beyond the Birthday Bound: Breaking TNT with ${O(2^{n/2})}$ queries Mustafa Khairallah
2023/1211 (PDF ) Optimal Flexible Consensus and its Application to Ethereum Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse
2023/1210 (PDF ) Decentralized Finance (DeFi): A Survey Erya Jiang, Bo Qin, Qin Wang, Zhipeng Wang, Qianhong Wu, Jian Weng, Xinyu Li, Chenyang Wang, Yuhang Ding, Yanran Zhang
2023/1209 (PDF ) Infinite families of minimal binary codes via Krawtchouk polynomials Xiaoni Du, René Rodríguez, Hao Wu
2023/1208 (PDF ) Mutator Sets and their Application to Scalable Privacy Alan Szepieniec, Thorkil Værge
2023/1207 (PDF ) DeFi Auditing: Mechanisms, Effectiveness, and User Perceptions Ding Feng, Rupert Hitsch, Kaihua Qin, Arthur Gervais, Roger Wattenhofer, Yaxing Yao, Ye Wang
2023/1205 (PDF ) On the security of REDOG Tanja Lange, Alex Pellegrini, Alberto Ravagnani
2023/1204 (PDF ) On Fully-Secure Honest Majority MPC without $n^2$ Round Overhead Daniel Escudero, Serge Fehr
2023/1203 (PDF ) Collaborative Privacy-Preserving Analysis of Oncological Data using Multiparty Homomorphic Encryption Ravit Geva, Alexander Gusev, Yuriy Polyakov, Lior Liram, Oded Rosolio, Andreea Alexandru, Nicholas Genise, Marcelo Blatt, Zohar Duchin, Barliz Waissengrin, Dan Mirelman, Felix Bukstein, Deborah T. Blumenthal, Ido Wolf, Sharon Pelles-Avraham, Tali Schaffer, Lee A. Lavi, Daniele Micciancio, Vinod Vaikuntanathan, Ahmad Al Badawi, Shafi Goldwasser
2023/1202 (PDF ) Extension of Shannon's theory of ciphers based on Latin rectangles Karel BURDA
2023/1201 (PDF ) Privacy-preserving edit distance computation using secret-sharing two-party computation Hernán Darío Vanegas Madrigal, Daniel Cabarcas Jaramillo, Diego F. Aranha
2023/1200 (PDF ) Shining Light on the Shadow: Full-round Practical Distinguisher for Lightweight Block Cipher Shadow Sunyeop Kim, Myoungsu Shin, Seonkyu Kim, Hanbeom Shin, Insung Kim, Donggeun Kwon, Dongjae Lee, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
2023/1199 (PDF ) RSA Blind Signatures with Public Metadata Ghous Amjad, Kevin Yeo, Moti Yung
2023/1198 (PDF ) A Methodology to Achieve Provable Side-Channel Security in Real-World Implementations Sonia Belaïd, Gaëtan Cassiers, Camille Mutschler, Matthieu Rivain, Thomas Roche, François-Xavier Standaert, Abdul Rahman Taleb
2023/1197 (PDF ) Towards a Quantum-resistant Weak Verifiable Delay Function Thomas Decru, Luciano Maino, Antonio Sanso
2023/1196 (PDF ) Verifiable Secret Sharing Simplified Sourav Das, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, Ling Ren
2023/1195 (PDF ) PicoEMP: A Low-Cost EMFI Platform Compared to BBI and Voltage Fault Injection using TDC and External VCC Measurements Colin O'Flynn
2023/1194 (PDF ) HI-Kyber: A novel high-performance implementation scheme of Kyber based on GPU Xinyi Ji, Jiankuo Dong, Pinchang Zhang, Deng Tonggui, Hua Jiafeng, Fu Xiao
2023/1193 (PDF ) An Anonymous Authenticated Key Agreement Protocol Secure in Partially Trusted Registration Server Scenario for Multi-Server Architectures Inam ul Haq, Jian Wang, Youwen Zhu, Sheharyar Nasir
2023/1192 (PDF ) CycleFold: Folding-scheme-based recursive arguments over a cycle of elliptic curves Abhiram Kothapalli, Srinath Setty
2023/1191 (PDF ) Attribute-Based Multi-Input FE (and more) for Attribute-Weighted Sums Shweta Agrawal, Junichi Tomida, Anshu Yadav
2023/1190 (PDF ) REED: Chiplet-Based Accelerator for Fully Homomorphic Encryption Aikata Aikata, Ahmet Can Mert, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy
2023/1189 (PDF ) PAP: A Privacy-Preserving Authentication Scheme with Anonymous Payment for V2G Networks Xiaohan Yue, Xue Bi, Haibo Yang, Shi Bai, Yuan He
2023/1188 (PDF ) A Novel CCA Attack for NTRU+ KEM Joohee Lee, Minju Lee, Hansol Ryu, Jaehui Park
2023/1187 (PDF ) Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
2023/1186 (PDF ) Faster cellular automata cryptosystems with neighbor sequences Kittiphop Phalakarn, Athasit Surarerks
2023/1185 (PDF ) SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More Nan Wang, Sid Chi-Kin Chau, Dongxi Liu
2023/1184 (PDF ) STAMP-Single Trace Attack on M-LWE Pointwise Multiplication in Kyber Bolin Yang, Prasanna Ravi, Fan Zhang, Ao Shen, Shivam Bhasin
2023/1183 (PDF ) Scalable Time-Lock Puzzles Aydin Abadi, Dan Ristea, Artem Grigor, Steven J. Murdoch
2023/1182 (PDF ) Long Paper: Provable Secure Parallel Gadgets Francesco Berti, Sebastian Faust, Maximilian Orlt
2023/1181 (PDF ) A Relational Credential System from $q$-SDH-based Graph Signatures Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross
2023/1180 (PDF ) Exploring Blockchain Technology through a Modular Lens: A Survey Minghui Xu, Yihao Guo, Chunchi Liu, Qin Hu, Dongxiao Yu, Zehui Xiong, Dusit Niyato, Xiuzhen Cheng
2023/1179 (PDF ) A Systematic Study of Data Augmentation for Protected AES Implementations Huimin Li, Guilherme Perin
2023/1178 (PDF ) Towards Open Scan for the Open-source Hardware Leonid Azriel, Avi Mendelson
2023/1177 (PDF ) DualDory: Logarithmic-Verifier Linkable Ring Signatures through Preprocessing Jonathan Bootle, Kaoutar Elkhiyaoui, Julia Hesse, Yacov Manevich
2023/1176 (PDF ) Composable Oblivious Pseudo-Random Functions via Garbled Circuits Sebastian Faller, Astrid Ottenhues, Johannes Ottenhues
2023/1175 (PDF ) Fast batched asynchronous distributed key generation Jens Groth, Victor Shoup
2023/1174 (PDF ) zkDL: Efficient Zero-Knowledge Proofs of Deep Learning Training Haochen Sun, Tonghe Bai, Jason Li, Hongyang Zhang
2023/1173 (PDF ) Round-Optimal Black-Box MPC in the Plain Model Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2023/1172 (PDF ) Communication and Round Efficient Parallel Broadcast Protocols Nibesh Shrestha, Ittai Abraham, Kartik Nayak
2023/1171 (PDF ) Arena: Multi-leader Synchronous Byzantine Fault Tolerance Hao Lu, Jian Liu, Kui Ren
2023/1170 (PDF ) Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH Navid Alamati, Hart Montgomery, Sikhar Patranabis, Pratik Sarkar
2023/1169 (PDF ) Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA Kittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura
2023/1168 (PDF ) Evolving Homomorphic Secret Sharing for Hierarchical Access Structures Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura
2023/1167 (PDF ) Constructive $t$-secure Homomorphic Secret Sharing for Low Degree Polynomials Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura
2023/1166 (PDF ) Malicious Secure, Structure-Aware Private Set Intersection Gayathri Garimella, Mike Rosulek, Jaspal Singh
2023/1165 (PDF ) On the Security of Universal Re-Encryption Fabio Banfi, Ueli Maurer, Silvia Ritsch
2023/1164 (PDF ) Swiper: a new paradigm for efficient weighted distributed protocols Andrei Tonkikh, Luciano Freitas
2023/1163 (PDF ) Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking Approach Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo
2023/1162 (PDF ) Reduction of Search-LWE Problem to Integer Programming Problem Masaaki Shirase
2023/1161 (PDF ) Benchmarking the Setup of Updatable zk-SNARKs Karim Baghery, Axel Mertens, Mahdi Sedaghat
2023/1160 (PDF ) Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test Yan Yan, Arnab Roy, Elisabeth Oswald
2023/1159 (PDF ) Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction Huan Zou, Yuting Xiao, Rui Zhang
2023/1158 (PDF ) Improved Polynomial Secret-Sharing Schemes Amos Beimel, Oriol Farràs, Or Lasri
2023/1157 (PDF ) Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery Melanie Jauch, Varun Maram
2023/1156 (PDF ) Instant Zero Knowledge Proof of Reserve Trevor Conley, Nilsso Diaz, Diego Espada, Alvin Kuruvilla, Stenton Mayone, Xiang Fu
2023/1155 (PDF ) Secure Function Extensions to Additively Homomorphic Cryptosystems Mounika Pratapa, Aleksander Essex
2023/1154 (PDF ) Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy Preserving Ride-Sharing Application Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Biplab Sikdar
2023/1153 (PDF ) A Multivariate Based Provably Secure Certificateless Signature Scheme with Applications to the Internet of Medical Things Vikas Srivastava, Sumit Kumar Debnath
2023/1152 (PDF ) Haze and Daze: Compliant Privacy Mixers Stanislaw Baranski, Maya Dotan, Ayelet Lotem, Margarita Vald
2023/1151 (PDF ) High-speed Implementation of AIM symmetric primitives within AIMer digital signature Minwoo Lee, Kyungbae Jang, Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Hwajeong Seo
2023/1150 (PDF ) Optimized Quantum Circuit for Quantum Security Strength Analysis of Argon2 Gyeongju Song, Siwoo Eum, Hyeokdong Kwon, Minjoo Sim, Minwoo Lee, Hwajeong Seo
2023/1149 (PDF ) Analysis of Parallel Implementation of Pilsung Block Cipher On Graphics Processing Unit Siwoo Eum, Hyunjun Kim, Minho Song, Hwajeong Seo
2023/1148 (PDF ) Post Quantum Fuzzy Stealth Signatures and Applications Sihang Pu, Sri AravindaKrishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik
2023/1147 (PDF ) CipherGPT: Secure Two-Party GPT Inference Xiaoyang Hou, Jian Liu, Jingyu Li, Yuhan Li, Wen-jie Lu, Cheng Hong, Kui Ren
2023/1146 (PDF ) Structured Encryption for Indirect Addressing Ruth Ng, Alexander Hoover, David Cash, Eileen Ee
2023/1145 (PDF ) Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs. Chris Brzuska, Geoffroy Couteau, Christoph Egger, Pihla Karanko, Pierre Meyer
2023/1144 (PDF ) Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing Saba Eskandarian
2023/1143 (PDF ) Combined Fault and Leakage Resilience: Composability, Constructions and Compiler Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Maximilian Orlt, Okan Seker
2023/1142 (PDF ) On the Efficiency of Generic, Quantum Cryptographic Constructions Keita Xagawa
2023/1141 (PDF ) Composable Gadgets with Reused Fresh Masks $-$ First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks David Knichel, Amir Moradi
2023/1140 (PDF ) Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic Curves Harashta Tatimma Larasati, Howon Kim
2023/1139 (PDF ) Optimal Load-Balanced Scalable Distributed Agreement Yuval Gelles, Ilan Komargodski
2023/1138 (PDF ) Invisible Warning Line: Efficient and Generic Regulation for Anonymous Cryptocurrencies Rui Gao
2023/1137 (PDF ) A New Sieving Approach for Solving the HNP with One Bit of Nonce by Using Built-in Modulo Arithmetic Yao Sun, Shuai Chang
2023/1136 (PDF ) Secure Multiparty Computation with Identifiable Abort from Vindicating Release Ran Cohen, Jack Doerner, Yashvanth Kondi, abhi shelat
2023/1135 (PDF ) HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme Oussama Sayari, Soundes Marzougui, Thomas Aulbach, Juliane Krämer, Jean-Pierre Seifert
2023/1134 (PDF ) Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi, François-Xavier Standaert
2023/1133 (PDF ) Algebraic Attacks on RAIN and AIM Using Equivalent Representations Fukang Liu, Mohammad Mahzoun, Morten Øygarden, Willi Meier
2023/1132 (PDF ) Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme Ali Rezapour, Zahra Ahmadian
2023/1131 (PDF ) One vector to rule them all: Key recovery from one vector in UOV schemes Pierre Pébereau
2023/1130 (PDF ) Asynchronous Agreement on a Core Set in Constant Expected Time and More Efficient Asynchronous VSS and MPC Ittai Abraham, Gilad Asharov, Arpita Patra, Gilad Stern
2023/1129 (PDF ) All You Need Is Fault: Zero-Value Attacks on AES and a New $\lambda$-Detection M&M Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama
2023/1128 (PDF ) Leaking Secrets in Homomorphic Encryption with Side-Channel Attacks Furkan Aydin, Aydin Aysu
2023/1127 (PDF ) TariScript: Bringing dynamic scripting to Mimblewimble Cayle Sharrock, Schalk van Heerden
2023/1126 (PDF ) Non-Observable Quantum Random Oracle Model Navid Alamati, Varun Maram, Daniel Masny
2023/1125 (PDF ) Finding short integer solutions when the modulus is small Léo Ducas, Thomas Espitau, Eamonn W. Postlethwaite
2023/1124 (PDF ) An Algebraic Approach to Circulant Column Parity Mixers Robert Christian Subroto
2023/1123 (PDF ) On the Cost of Post-Compromise Security in Concurrent Continuous Group-Key Agreement Benedikt Auerbach, Miguel Cueto Noval, Guillermo Pascual-Perez, Krzysztof Pietrzak
2023/1122 (PDF ) Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption Xinle Cao, Jian Liu, Yongsheng Shen, Xiaohua Ye, Kui Ren
2023/1121 (PDF ) SoK: Public Randomness Alireza Kavousi, Zhipeng Wang, Philipp Jovanovic
2023/1120 (PDF ) TVA: A multi-party computation system for secure and expressive time series analytics Muhammad Faisal, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Mayank Varia
2023/1119 (PDF ) Outsider-Anonymous Broadcast Encryption with Keyword Search: Generic Construction, CCA Security, and with Sublinear Ciphertexts Keita Emura, Kaisei Kajita, Go Ohtake
2023/1118 (PDF ) Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System Robertas Maleckas, Kenneth G. Paterson, Martin R. Albrecht
2023/1117 (PDF ) Mask Compression: High-Order Masking on Memory-Constrained Devices Markku-Juhani O. Saarinen, Mélissa Rossi
2023/1116 (PDF ) Applying system of equations to factor semiprime numbers Yonatan Zilpa
2023/1115 (PDF ) Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM Yibin Yang, David Heath
2023/1114 (PDF ) On iterated punctured Grover Cezary Pilaszewicz, Marian Margraf
2023/1113 (PDF ) Breaking the Hutton 2 challenge Thomas Kaeding
2023/1112 (PDF ) Tornado Vote: Anonymous Blockchain-Based Voting Robert Muth, Florian Tschorsch
2023/1111 (PDF ) Optimized stream-cipher-based transciphering by means of functional-bootstrapping Adda-Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey
2023/1110 (PDF ) Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis Lichao Wu, Amir Ali-pour, Azade Rezaeezade, Guilherme Perin, Stjepan Picek
2023/1109 (PDF ) An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek
2023/1108 (PDF ) It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis (Extended Version) Sengim Karayalcin, Marina Krcek, Lichao Wu, Stjepan Picek, Guilherme Perin
2023/1107 (PDF ) Verifiable Timed Proxy Signatures and Multi-signatures Duygu Ozden, Oğuz Yayla
2023/1106 (PDF ) ProtoGalaxy: Efficient ProtoStar-style folding of multiple instances Liam Eagen, Ariel Gabizon
2023/1105 (PDF ) MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust Tung Le, Thang Hoang
2023/1104 (PDF ) An Efficient Unicode encoded in UTF-16 text cryptography based on the AES algorithm Sushmit Jahan Rose, Umut Ozkaya, Sabina Yasmin, Suraiya Jabin, Robiul Hasan, Elias Kabir
2023/1103 (PDF ) Practical Large-Scale Proof-of-Stake Asynchronous Total-Order Broadcast Orestis Alpos, Christian Cachin, Simon Holmgaard Kamp, Jesper Buus Nielsen
2023/1102 (PDF ) Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg
2023/1101 (PDF ) $\mathcal{S}_0$-equivalent classes, a new direction to find better weightwise perfectly balanced functions, and more Agnese Gini, Pierrick Méaux
2023/1100 (PDF ) Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis Marina Krček, Lichao Wu, Guilherme Perin, Stjepan Picek
2023/1099 (PDF ) A Digital Identity in the Hands of Swiss Citizens Jean-Luc Beuchat, Valon Rexhepi
2023/1098 (PDF ) $\textsf{Asterisk}$: Super-fast MPC with a Friend Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, Divya Ravi
2023/1097 (PDF ) Quantum Money from Abelian Group Actions Mark Zhandry
2023/1096 (PDF ) White-Box Block Cipher Implementation Based on LS-Design Hatice Kübra Güner, Ceyda Mangır, Oğuz Yayla
2023/1095 (PDF ) Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham
2023/1094 (PDF ) Round Optimal Fully Secure Distributed Key Generation Jonathan Katz
2023/1093 (PDF ) Properties of Lattice Isomorphism as a Cryptographic Group Action Benjamin Benčina, Alessandro Budroni, Jesús-Javier Chi-Domínguez, Mukul Kulkarni
2023/1092 (PDF ) The wrong use of FESTA trapdoor functions leads to an adaptive attack Tomoki Moriya, Hiroshi Onuki
2023/1091 (PDF ) On Derandomizing Yao's Weak-to-Strong OWF Construction Chris Brzuska, Geoffroy Couteau, Pihla Karanko, Felix Rohrbach
2023/1090 (PDF ) Bulletproofs With Stochastic Equation Sets Michael Brand, Benoit Poletti
2023/1089 (PDF ) Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols Shichen Wu, Puwen Wei, Ren Zhang, Bowen Jiang
2023/1088 (PDF ) Building Hard Problems by Combining Easy Ones Riddhi Ghosal, Amit Sahai
2023/1087 (PDF ) Moving a Step of ChaCha in Syncopated Rhythm Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin
2023/1086 (PDF ) On One-way Functions and the Worst-case Hardness of Time-Bounded Kolmogorov Complexity Yanyi Liu, Rafael Pass
2023/1085 (PDF ) Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency Zehui Tang, Shengke Zeng, Tao Li, Shuai Cheng, Haoyu Zheng
2023/1084 (PDF ) A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber Yanning Ji, Elena Dubrova
2023/1083 (PDF ) Keyed Sum of Permutations: a simpler RP-based PRF Ferdinand Sibleyras, Yosuke Todo
2023/1082 (PDF ) Intmax2: A ZK-rollup with Minimal Onchain Data and Computation Costs Featuring Decentralized Aggregators Erik Rybakken, Leona Hioki, Mario Yaksetig, Denisa Diaconescu, František Silváši, Julian Sutherland
2023/1081 (PDF ) ARITHMETIZATION-ORIENTED APN FUNCTIONS Lilya Budaghyan, Mohit Pal
2023/1080 (PDF ) ACORN-QRE: Specification and Analysis of a Method of Generating Secure One-time Pads for Use in Encryption Roy S Wikramaratna
2023/1079 (PDF ) Foundations of Data Availability Sampling Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner
2023/1078 (PDF ) Bypassing Android isolation with fuel gauges: new risks with advanced power ICs Vincent Giraud, David Naccache
2023/1077 (PDF ) Taming Adaptivity in YOSO Protocols: The Modular Way Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov
2023/1076 (PDF ) Non-Interactive Threshold BBS+ From Pseudorandom Correlations Sebastian Faust, Carmit Hazay, David Kretzler, Leandro Rometsch, Benjamin Schlosser
2023/1075 (PDF ) Streebog as a Random Oracle Liliya Akhmetzyanova, Alexandra Babueva, Andrey Bozhko
2023/1074 (PDF ) From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium Mohamed ElGhamrawy, Melissa Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, Christine van Vredendaal
2023/1073 (PDF ) The Reality of Backdoored S-Boxes - An Eye Opener Shah Fahd, Mehreen Afzal, Waseem Iqbal, Dawood Shah, Ijaz Khalid
2023/1072 (PDF ) Simple and Practical Amortized Sublinear Private Information Retrieval using Dummy Subsets Ling Ren, Muhammad Haris Mughees, Sun I
2023/1071 (PDF ) Fiat-Shamir Security of FRI and Related SNARKs Alexander R. Block, Albert Garreta, Jonathan Katz, Justin Thaler, Pratyush Ranjan Tiwari, Michał Zając
2023/1070 (PDF ) Unlinkable Policy-Compliant Signatures for Compliant and Decentralized Anonymous Payments Christian Badertscher, Mahdi Sedaghat, Hendrik Waldner
2023/1069 (PDF ) DuckyZip: Provably Honest Global Linking Service Nadim Kobeissi
2023/1068 (PDF ) Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici
2023/1067 (PDF ) How to Compile Polynomial IOP into Simulation-Extractable SNARKs: A Modular Approach Markulf Kohlweiss, Mahak Pancholi, Akira Takahashi
2023/1066 (PDF ) Efficient Arguments and Proofs for Batch Arithmetic Circuit Satisfiability Jieyi Long
2023/1065 (PDF ) A Note on ``A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment'' Zhengjun Cao, Lihua Liu
2023/1064 (PDF ) Decoding Quasi-Cyclic codes is NP-complete Ernesto Dominguez Fiallo, Pablo Freyre Arrozarena, Luis Ramiro Piñeiro
2023/1063 (PDF ) DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More Sofía Celi, Alex Davidson, Hamed Haddadi, Gonçalo Pestana, Joe Rowell
2023/1062 (PDF ) IOPs with Inverse Polynomial Soundness Error Gal Arnon, Alessandro Chiesa, Eylon Yogev
2023/1061 (PDF ) BlindPerm: Efficient MEV Mitigation with an Encrypted Mempool and Permutation Alireza Kavousi, Duc V. Le, Philipp Jovanovic, George Danezis
2023/1060 (PDF ) Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing Pengfei Wang, Xiangyu Su, Mario Larangeira, Keisuke Tanaka
2023/1059 (PDF ) Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning Xiangyu Su, Mario Larangeira, Keisuke Tanaka
2023/1058 (PDF ) Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM Brent Waters, Daniel Wichs
2023/1057 (PDF ) ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for $\mathbb{Z}_{2^k}$ Lennart Braun, Cyprien Delpech de Saint Guilhem, Robin Jadoul, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy
2023/1056 (PDF ) DIDO: Data Provenance from Restricted TLS 1.3 Websites Kwan Yin Chan, Handong Cui, Tsz Hon Yuen
2023/1055 (PDF ) OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion Trevor Yap, Shivam Bhasin, Stjepan Picek
2023/1054 (PDF ) Quantum Complexity for Discrete Logarithms and Related Problems Minki Hhan, Takashi Yamakawa, Aaram Yun
2023/1053 (PDF ) ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet Alexander Bienstock, Paul Rösler, Yi Tang
2023/1051 (PDF ) Automated Analysis of Halo2 Circuits Fatemeh Heidari Soureshjani, Mathias Hall-Andersen, MohammadMahdi Jahanara, Jeffrey Kam, Jan Gorzny, Mohsen Ahmadvand
2023/1050 (PDF ) SNARGs for Monotone Policy Batch NP Zvika Brakerski, Maya Farber Brodsky, Yael Tauman Kalai, Alex Lombardi, Omer Paneth
2023/1049 (PDF ) Public-Key Encryption, Local Pseudorandom Generators, and the Low-Degree Method Andrej Bogdanov, Pravesh Kothari, Alon Rosen
2023/1048 (PDF ) An Algorithm for Persistent Homology Computation Using Homomorphic Encryption Dominic Gold, Koray Karabina, Francis C. Motta
2023/1047 (PDF ) Private Coin Verifiable Delay Function Peter Chvojka
2023/1046 (PDF ) Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT based Implementations of Lattice-based Cryptography Tolun Tosun, Erkay Savas
2023/1045 (PDF ) XHash: Efficient STARK-friendly Hash Function Tomer Ashur, Amit Singh Bhati, Al Kindi, Mohammad Mahzoun, Léo Perrin
2023/1044 (PDF ) AKE Zoo: 100 two-party protocols (to be continued) Evgeny Alekseev, Alexandra Babueva, Olga Zazykina
2023/1043 (PDF ) An Analysis of Requirements and Privacy Threats in Mobile Data Donations Leonie Reichert
2023/1042 (PDF ) A Side-Channel Attack on a Bitsliced Higher-Order Masked CRYSTALS-Kyber Implementation Ruize Wang, Martin Brisfors, Elena Dubrova
2023/1041 (PDF ) Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance Yevgeniy Dodis, Niels Ferguson, Eli Goldin, Peter Hall, Krzysztof Pietrzak
2023/1040 (PDF ) E2E near-standard and practical authenticated transciphering Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, Omri Soceanu
2023/1039 (PDF ) SoK: Privacy-Preserving Signatures Alishah Chator, Matthew Green, Pratyush Ranjan Tiwari
2023/1038 (PDF ) PQC Cloudization: Rapid Prototyping of Scalable NTT/INTT Architecture to Accelerate Kyber Mojtaba Bisheh-Niasar, Daniel Lo, Anjana Parthasarathy, Blake Pelton, Bharat Pillilli, Bryan Kelly
2023/1036 (PDF ) Reduction of the secret key length in the perfect cipher by data compression and randomisation Boris Ryabko
2023/1035 (PDF ) Short Signatures from Regular Syndrome Decoding in the Head Eliana Carozza, Geoffroy Couteau, Antoine Joux
2023/1034 (PDF ) Transaction Fairness in Blockchains, Revisited Rujia Li, Xuanwei Hu, Qin Wang, Sisi Duan, Qi Wang
2023/1033 (PDF ) OWF Candidates Based on: Xors, Error Detection Codes, Permutations, Polynomials, Interaction and Nesting Paweł Cyprys, Shlomi Dolev, Oded Margalit
2023/1032 (PDF ) Zero Knowledge Virtual Machine step by step Tim Dokchitser, Alexandr Bulkin
2023/1031 (PDF ) Security Analysis of a Color Image Encryption Scheme Based on a Fractional‑Order Hyperchaotic System George Teseleanu
2023/1030 (PDF ) Depth-Optimized Implementation of ASCON Quantum Circuit Yujin Oh, Kyungbae Jang, Anubhab Baksi, Hwajeong Seo
2023/1029 (PDF ) hodlCoin: A Financial Game Zahnentferner, Luca D'Angelo
2023/1027 (PDF ) State Machines across Isomorphic Layer 2 Ledgers Maxim Jourenko, Mario Larangeira
2023/1026 (PDF ) Implementation and performance of a RLWE-based commitment scheme and ZKPoK for its linear and multiplicative relations Ramiro Martínez, Paz Morillo, Sergi Rovira
2023/1025 (PDF ) Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
2023/1024 (PDF ) Timed Secret Sharing Alireza Kavousi, Aydin Abadi, Philipp Jovanovic
2023/1023 (PDF ) An STP-based model toward designing S-boxes with good cryptographic properties Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan, Meiqin Wang
2023/1022 (PDF ) Zombie: Middleboxes that Don’t Snoop Collin Zhang, Zachary DeStefano, Arasu Arun, Joseph Bonneau, Paul Grubbs, Michael Walfish
2023/1021 (PDF ) EDEN - a practical, SNARK-friendly combinator VM and ISA Logan Allen, Brian Klatt, Philip Quirk, Yaseen Shaikh
2023/1020 (PDF ) At Last! A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey
2023/1019 (PDF ) The many faces of Schnorr: a toolkit for the modular design of threshold Schnorr signatures Victor Shoup
2023/1018 (PDF ) SDFA: Statistical-Differential Fault Attack on Linear Structured SBox-Based Ciphers Amit Jana, Anup Kumar Kundu, Goutam Paul
2023/1017 (PDF ) Stronger Lower Bounds for Leakage-Resilient Secret Sharing Charlotte Hoffmann, Mark Simkin
2023/1016 (PDF ) Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig
2023/1015 (PDF ) Fast Unbalanced Private Computing on (Labeled) Set Intersection with Cardinality Binbin Tu, Xiangling Zhang, Yujie Bai, Yu Chen
2023/1014 (PDF ) An Efficient Data-Independent Priority Queue and its Application to Dark Pools Sahar Mazloom, Benjamin E. Diamond, Antigoni Polychroniadou, Tucker Balch
2023/1013 (PDF ) Best of Both Worlds: Revisiting the Spymasters Double Agent Problem Anasuya Acharya, Carmit Hazay, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
2023/1012 (PDF ) Arithmetic Sketching Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
2023/1011 (PDF ) A Framework for Statistically Sender Private OT with Optimal Rate Pedro Branco, Nico Döttling, Akshayaram Srinivasan
2023/1010 (PDF ) End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets Gauri Gupta, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran, Rijurekha Sen
2023/1009 (PDF ) PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption Yongha Son, Jinhyuck Jeong
2023/1008 (PDF ) Cryptanalysis of rank-metric schemes based on distorted Gabidulin codes Pierre Briaud, Pierre Loidreau
2023/1007 (PDF ) On Provable White-Box Security in the Strong Incompressibility Model Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai
2023/1006 (PDF ) Reusable Secure Computation in the Plain Model Vipul Goyal, Akshayaram Srinivasan, Mingyuan Wang
2023/1005 (PDF ) BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks Yuting Zuo, Li Xu, Yuexin Zhang, Chenbin Zhao, Zhaozhe Kang
2023/1004 (PDF ) On the Non-Malleability of ECVRF in the Algebraic Group Model Willow Barkan-Vered, Franklin Harding, Jonathan Keller, Jiayu Xu
2023/1003 (PDF ) Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited Ran Cohen, Pouyan Forghani, Juan Garay, Rutvik Patel, Vassilis Zikas
2023/1002 (PDF ) Oblivious Transfer from Rerandomizable PKE Shuaishuai Li, Cong Zhang, Dongdai Lin
2023/1001 (PDF ) Oblivious Accumulators Foteini Baldimtsi, Ioanna Karantaidou, Srinivasan Raghuraman
2023/1000 (PDF ) Private Timestamps and Selective Verification of Notarised Data on a Blockchain Enrique Larraia, Owen Vaughan
2023/999 (PDF ) Enforcing Data Geolocation Policies in Public Cloud using Trusted Computing Syed Zair Abbas, Mudassar Aslam
2023/998 (PDF ) Tiresias: Large Scale, Maliciously Secure Threshold Paillier Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan C. Scaly, Yuval Spiizer, Avishay Yanai
2023/997 (PDF ) An extension of Overbeck's attack with an application to cryptanalysis of Twisted Gabidulin-based schemes. Alain Couvreur, Ilaria Zappatore
2023/996 (PDF ) Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures From VOLE-in-the-Head Carsten Baum, Lennart Braun, Cyprien Delpech de Saint Guilhem, Michael Klooß, Emmanuela Orsini, Lawrence Roy, Peter Scholl
2023/995 (PDF ) Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields Gustavo Banegas, Valerie Gilchrist, Anaëlle Le Dévéhat, Benjamin Smith
2023/994 (PDF ) A proposal for quantum GRS algorithm and the cryptanalysis for ROLLO and RQC Asuka Wakasugi, Mitsuru Tada
2023/993 (PDF ) A note on ``a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function'' Zhengjun Cao, Lihua Liu
2023/992 (PDF ) VSS from Distributed ZK Proofs and Applications Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
2023/991 (PDF ) Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu, Xiao Wang
2023/990 (PDF ) Privacy Preserving Records Sharing using Blockchain and Format Preserving Encryption Sai Sandilya Konduru, Vishal Saraswat
2023/989 (PDF ) Detection of Password Reuse and Credential Stuffing: A Server-side Approach Sai Sandilya Konduru, Sweta Mishra
2023/988 (PDF ) On the Hardness of Scheme-Switching Between SIMD FHE Schemes Karim Eldefrawy, Nicholas Genise, Nathan Manohar
2023/987 (PDF ) Fuzzification-based Feature Selection for Enhanced Website Content Encryption Mike Wa Nkongolo
2023/986 (PDF ) Efficient Private Multiset ID Protocols Cong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin
2023/985 (PDF ) On the Two-sided Permutation Inversion Problem Gorjan Alagic, Chen Bai, Alexander Poremba, Kaiyan Shi
2023/984 (PDF ) Generating Supersingular Elliptic Curves over $\mathbb{F}_p$ with Unknown Endomorphism Ring Youcef Mokrani, David Jao
2023/983 (PDF ) Secure Range-Searching Using Copy-And-Recurse Eyal Kushnir, Guy Moshkowich, Hayim Shaul
2023/982 (PDF ) On the 32-Character Zodiac Cipher Floe Foxon
2023/981 (PDF ) Practical and Efficient FHE-based MPC Nigel P. Smart
2023/980 (PDF ) Trivial Transciphering With Trivium and TFHE Thibault Balenbois, Jean-Baptiste Orfila, Nigel P. Smart
2023/979 (PDF ) New Secret Keys for Enhanced Performance in (T)FHE Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Adeline Roux-Langlois, Samuel Tap
2023/978 (PDF ) $\textsf{PAE}$: Towards More Efficient and BBB-secure AE From a Single Public Permutation Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Eik List
2023/977 (PDF ) Timed Commitments Revisited Miguel Ambrona, Marc Beunardeau, Raphaël R. Toledo
2023/976 (PDF ) Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction Kyoichi Asano, Yohei Watanabe
2023/975 (PDF ) Design of Blockchain-Based Many-to-Many Anonymous Data Sharing Scheme Esra Günsay, Burcu E. Karakaş, N. Gamze Orhon Kılıç, Oğuz Yayla
2023/974 (PDF ) MuxProofs: Succinct Arguments for Machine Computation from Vector Lookups Zijing Di, Lucas Xia, Wilson Nguyen, Nirvan Tyagi
2023/973 (PDF ) Demystifying Just-in-Time (JIT) Liquidity Attacks on Uniswap V3 Xihan Xiong, Zhipeng Wang, William Knottenbelt, Michael Huth
2023/972 (PDF ) Security of Hybrid Key Establishment using Concatenation Adam Petcher, Matthew Campagna
2023/971 (PDF ) Defining and Controlling Information Leakage in US Equities Trading Arthur Americo, Allison Bishop, Paul Cesaretti, Garrison Grogan, Adam McKoy, Robert Moss, Lisa Oakley, Marcel Ribeiro, Mohammad Shokri
2023/970 (PDF ) A Note on Non-Interactive Zero-Knowledge from CDH Geoffroy Couteau, Abhishek Jain, Zhengzhong Jin, Willy Quach
2023/969 (PDF ) Revisiting the Nova Proof System on a Cycle of Curves Wilson Nguyen, Dan Boneh, Srinath Setty
2023/968 (PDF ) SALSA VERDE: a machine learning attack on Learning with Errors with sparse small secrets Cathy Yuanchen Li, Emily Wenger, Zeyuan Allen-Zhu, Francois Charton, Kristin Lauter
2023/967 (PDF ) SoK: Data Sovereignty Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song
2023/966 (PDF ) eLIMInate: a Leakage-focused ISE for Masked Implementation Hao Cheng, Daniel Page, Weijia Wang
2023/965 (PDF ) Post-Quantum Secure Over-the-Air Update of Automotive Systems Joppe W. Bos, Alexander Dima, Alexander Kiening, Joost Renes
2023/964 (PDF ) Lightweight Authentication of Web Data via Garble-Then-Prove Xiang Xie, Kang Yang, Xiao Wang, Yu Yu
2023/963 (PDF ) An invariant of the round function of QARMAv2-64 Tim Beyne
2023/962 (PDF ) Access structures induced by polymatroids with extreme rank function Mieczysław Kula
2023/961 (PDF ) Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup Matteo Campanelli, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler
2023/960 (PDF ) Beyond-Full-Round Integral Distinguisher of NIST Lightweight Cryptography Competition Finalist TinyJAMBU Akram Khalesi, Zahra Ahmadian
2023/959 (PDF ) Randomness Recoverable Secret Sharing Schemes Mohammad Hajiabadi, Shahram Khazaei, Behzad Vahdani
2023/958 (PDF ) Faster TFHE Bootstrapping with Block Binary Keys Changmin Lee, Seonhong Min, Jinyeong Seo, Yongsoo Song
2023/957 (PDF ) BASS: Boolean Automorphisms Signature Scheme Dima Grigoriev, Ilia Ilmer, Alexey Ovchinnikov, Vladimir Shpilrain
2023/956 (PDF ) Speculative Denial-of-Service Attacks in Ethereum Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, Arthur Gervais
2023/955 (PDF ) Succinct Computational Secret Sharing Benny Applebaum, Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Tianren Liu, Vinod Vaikuntanathan
2023/954 (PDF ) Zombies and Ghosts: Optimal Byzantine Agreement in the Presence of Omission Faults Julian Loss, Gilad Stern
2023/953 (PDF ) Towards Generic MPC Compilers via Variable Instruction Set Architectures (VISAs) Yibin Yang, Stanislav Peceny, David Heath, Vladimir Kolesnikov
2023/952 (PDF ) Limits on Adaptive Security for Attribute-Based Encryption Zvika Brakerski, Stav Medina
2023/951 (PDF ) Latency-First Smart Contract: Overclock the Blockchain for a while Huayi Qi, Minghui Xu, Xiuzhen Cheng, Weifeng Lyu
2023/950 (PDF ) A new approach based on quadratic forms to attack the McEliece cryptosystem Alain Couvreur, Rocco Mora, Jean-Pierre Tillich
2023/948 (PDF ) Compact Circuits for Efficient Mobius Transform Subhadeep Banik, Francesco Regazzoni
2023/947 (PDF ) Concrete Security from Worst-Case to Average-Case Lattice Reductions Joel Gärtner
2023/945 (PDF ) One-Way Functions vs. TFNP: Simpler and Improved Lukáš Folwarczný, Mika Göös, Pavel Hubáček, Gilbert Maystre, Weiqiang Yuan
2023/944 (PDF ) BALoo: First and Efficient Countermeasure dedicated to Persistent Fault Attacks Pierre-Antoine Tissot, Lilian Bossuet, Vincent Grosso
2023/943 (PDF ) Correlated-Output Differential Privacy and Applications to Dark Pools James Hsin-yu Chiang, Bernardo David, Mariana Gama, Christian Janos Lebeda
2023/942 (PDF ) Proactive Secret Sharing with Constant Communication Brett Hemenway Falk, Daniel Noble, Tal Rabin
2023/941 (PDF ) Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE Shweta Agrawal, Melissa Rossi, Anshu Yadav, Shota Yamada
2023/940 (PDF ) CryptAttackTester: high-assurance attack analysis Daniel J. Bernstein, Tung Chou
2023/939 (PDF ) Speeding up elliptic computations for Ethereum Account Abstraction Renaud Dubois
2023/938 (PDF ) Musketeer: Incentive-Compatible Rebalancing for Payment Channel Networks Zeta Avarikioti, Stefan Schmid, Samarth Tiwari
2023/937 (PDF ) WESP: An encryption method that, as the key size increases, require an exponentially growing time to break Sam Widlund
2023/936 (PDF ) Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak Mohammad Vaziri, Vesselin Velichkov
2023/935 (PDF ) Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs (Extended Version) Vincent Meyers, Dennis R. E. Gnad, Nguyen Minh Dang, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori
2023/934 (PDF ) To Pass or Not to Pass: Privacy-Preserving Physical Access Control Jesús García-Rodríguez, Stephan Krenn, Daniel Slamanig
2023/933 (PDF ) More Efficient Lattice-Based Electronic Voting from NTRU Patrick Hough, Caroline Sandsbråten, Tjerand Silde
2023/932 (PDF ) On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model Abtin Afshar, Kai-Min Chung, Yao-Ching Hsieh, Yao-Ting Lin, Mohammad Mahmoody
2023/931 (PDF ) Compact Identity Based Encryption Based on n^{th} - Residuosity Assumption Sree Vivek S, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan
2023/930 (PDF ) Lattice-Based Succinct Arguments for NP with Polylogarithmic-Time Verification Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki
2023/929 (PDF ) The QARMAv2 Family of Tweakable Block Ciphers Roberto Avanzi, Subhadeep Banik, Orr Dunkelman, Maria Eichlseder, Shibam Ghosh, Marcel Nageler, Francesco Regazzoni
2023/928 (PDF ) On vectorial functions mapping strict affine subspaces of their domain into strict affine subspaces of their co-domain, and the strong D-property Claude Carlet, Enrico Piccione
2023/927 (PDF ) Collision Entropy Estimation in a One-Line Formula Alessandro Gecchele
2023/926 (PDF ) Analysis of the security of the PSSI problem and cryptanalysis of the Durandal signature scheme Nicolas Aragon, Victor Dyseryn, Philippe Gaborit
2023/925 (PDF ) Homomorphic Indistinguishability Obfuscation and its Applications Kaartik Bhushan, Venkata Koppula, Manoj Prabhakaran
2023/924 (PDF ) Generalized Initialization of the Duplex Construction Christoph Dobraunig, Bart Mennink
2023/923 (PDF ) Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED Ben Nassi, Etay Iluz, Or Cohen, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici
2023/922 (PDF ) mR$_{\text{LWE}}$-CP-ABE a revocable CP-ABE for Post-Quantum Cryptography Marco Cianfriglia, Elia Onofri, Marco Pedicini
2023/921 (PDF ) Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding Koji Nuida
2023/920 (PDF ) Beware Your Standard Cells! On Their Role in Static Power Side-Channel Attacks Jitendra Bhandari, Likhitha Mankali, Mohammed Nabeel, Ozgur Sinanoglu, Ramesh Karri, Johann Knechtel
2023/919 (PDF ) Threshold Private Set Intersection with Better Communication Complexity Satrajit Ghosh, Mark Simkin
2023/918 (PDF ) Invertible Bloom Lookup Tables with Less Memory and Randomness Nils Fleischhacker, Kasper Green Larsen, Maciej Obremski, Mark Simkin
2023/917 (PDF ) Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments Tohru Kohrita, Patrick Towa
2023/916 (PDF ) Unlinkability and Interoperability in Account-Based Universal Payment Channels Mohsen Minaei, Panagiotis Chatzigiannis, Shan Jin, Srinivasan Raghuraman, Ranjit Kumaresan, Mahdi Zamani, Pedro Moreno-Sanchez
2023/915 (PDF ) Attribute-based Single Sign-On: Secure, Private, and Efficient Tore Kasper Frederiksen, Julia Hesse, Bertram Poettering, Patrick Towa
2023/914 (PDF ) Limits in the Provable Security of ECDSA Signatures Dominik Hartmann, Eike Kiltz
2023/913 (PDF ) Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal John Preuß Mattsson
2023/912 (PDF ) Randomness of random in Cisco ASA Ryad Benadjila, Arnaud Ebalard
2023/911 (PDF ) Link Between the Differential Cryptanalysis and Linear Approximations over Finite Abelian Groups And Its Applications Zhongfeng Niu, Siwei Sun, Hailun Yan, Qi Wang
2023/910 (PDF ) Amortized Functional Bootstrapping in less than 7ms, with $\tilde{O}(1)$ polynomial multiplications Zeyu Liu, Yunhao Wang
2023/909 (PDF ) Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference Yun Li, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song
2023/908 (PDF ) A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature Emre Karabulut, Aydin Aysu
2023/907 (PDF ) Efficient Zero Knowledge for Regular Language Michael Raymond, Gillian Evers, Jan Ponti, Diya Krishnan, Xiang Fu
2023/906 (PDF ) Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions Hoeteck Wee
2023/905 (PDF ) $\mathsf{zkSaaS}$: Zero-Knowledge SNARKs as a Service Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, Sruthi Sekar
2023/904 (PDF ) Pseudorandom Strings from Pseudorandom Quantum States Prabhanjan Ananth, Yao-Ting Lin, Henry Yuen
2023/903 (PDF ) Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo
2023/902 (PDF ) SublonK: Sublinear Prover PlonK Arka Rai Choudhuri, Sanjam Garg, Aarushi Goel, Sruthi Sekar, Rohit Sinha
2023/901 (PDF ) Secure Multiparty Computation with Free Branching Aarushi Goel, Mathias Hall-Andersen, Aditya Hegde, Abhishek Jain
2023/900 (PDF ) What If Alice Wants Her Story Told? Anindya Bhandari, Allison Bishop
2023/899 (PDF ) Practical Schnorr Threshold Signatures Without the Algebraic Group Model Hien Chu, Paul Gerhart, Tim Ruffing, Dominique Schröder
2023/898 (PDF ) Spilling-Cascade: an Optimal PKE Combiner for KEM Hybridization Céline Chevalier, Guirec Lebrun, Ange Martinelli
2023/897 (PDF ) On the Impossibility of Algebraic NIZK In Pairing-Free Groups Emanuele Giunta
2023/896 (PDF ) Improved Gadgets for the High-Order Masking of Dilithium Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun
2023/895 (PDF ) ModHE: Modular Homomorphic Encryption Using Module Lattices: Potentials and Limitations Anisha Mukherjee, Aikata Aikata, Ahmet Can Mert, Yongwoo Lee, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy
2023/894 (PDF ) Differentially Private Selection from Secure Distributed Computing Ivan Damgård, Hannah Keller, Boel Nelson, Claudio Orlandi, Rasmus Pagh
2023/893 (PDF ) Diversity Algorithms for Laser Fault Injection Marina Krček, Thomas Ordas
2023/892 (PDF ) Suboptimality in DeFi Aviv Yaish, Maya Dotan, Kaihua Qin, Aviv Zohar, Arthur Gervais
2023/891 (PDF ) When is Slower Block Propagation More Profitable for Large Miners? Zhichun Lu, Ren Zhang
2023/890 (PDF ) Efficient Evaluation of Frequency Test for Overlapping Vectors Statistic Krzysztof MAŃK
2023/889 (PDF ) A note on ``LAKAF: lightweight authentication and key agreement framework for smart grid network'' Zhengjun Cao, Lihua Liu
2023/887 (PDF ) Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond Mingyao Shao, Yuejun Liu, Yongbin Zhou
2023/886 (PDF ) Reductions from module lattices to free module lattices, and application to dequantizing module-LLL Gabrielle De Micheli, Daniele Micciancio, Alice Pellet-Mary, Nam Tran
2023/885 (PDF ) Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling Kittiphon Phalakarn, Vorapong Suppakitpaisarn, Francisco Rodríguez-Henríquez, M. Anwar Hasan
2023/884 (PDF ) Near Collision Attack Against Grain v1 Subhadeep Banik, Daniel Collins, Willi Meier
2023/883 (PDF ) Prouff & Rivain’s Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model Loïc Masure, François-Xavier Standaert
2023/882 (PDF ) Expand-Convolute Codes for Pseudorandom Correlation Generators from LPN Srinivasan Raghuraman, Peter Rindal, Titouan Tanguy
2023/880 (PDF ) On Active Attack Detection in Messaging with Immediate Decryption Khashayar Barooti, Daniel Collins, Simone Colombo, Loı̈s Huguenin-Dumittan, Serge Vaudenay
2023/879 (PDF ) On cubic-like bent Boolean functions Claude Carlet, Irene Villa
2023/878 (PDF ) Introducing two Low-Latency Cipher Families: Sonic and SuperSonic Yanis Belkheyar, Joan Daemen, Christoph Dobraunig, Santosh Ghosh, Shahram Rasoolzadeh
2023/877 (PDF ) Public-Key Encryption with Quantum Keys Khashayar Barooti, Alex B. Grilo, Loïs Huguenin-Dumittan, Giulio Malavolta, Or Sattath, Quoc-Huy Vu, Michael Walter
2023/876 (PDF ) Circular Multiplicative Modular Exponentiation: A New Public Key Exchange Algorithm Michele Fabbrini
2023/875 (PDF ) The Power of Undirected Rewindings for Adaptive Security Dennis Hofheinz, Julia Kastner, Karen Klein
2023/874 (PDF ) Distributed Broadcast Encryption from Bilinear Groups Dimitris Kolonelos, Giulio Malavolta, Hoeteck Wee
2023/873 (PDF ) Digital signature schemes using non-square matrices or scrap automorphisms Jiale Chen, Dima Grigoriev, Vladimir Shpilrain
2023/872 (PDF ) Conjunctive Searchable Symmetric Encryption from Hard Lattices Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay
2023/871 (PDF ) Improved Multi-User Security Using the Squared-Ratio Method Yu Long Chen, Wonseok Choi, Changmin Lee
2023/870 (PDF ) Additive Randomized Encodings and Their Applications Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
2023/869 (PDF ) UniPlonk: Plonk with Universal Verifier Shumo Chu, Brandon H. Gomes, Francisco Hernandez Iglesias, Todd Norton, Duncan Tebbs
2023/868 (PDF ) Data Independent Order Policy Enforcement: Limitations and Solutions Sarisht Wadhwa, Luca Zanolini, Francesco D'Amato, Aditya Asgaonkar, Chengrui Fang, Fan Zhang, Kartik Nayak
2023/867 (PDF ) Security Analysis of Forward Secure Log Sealing in Journald Felix Dörre, Astrid Ottenhues
2023/866 (PDF ) Decoding LTFs in the Generic Group Model Dennis Hofheinz, Julia Kastner, Akin Ünal, Bogdan Ursu
2023/865 (PDF ) A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier
2023/864 (PDF ) Compact Selective Opening Security From LWE Dennis Hofheinz, Kristina Hostáková, Julia Kastner, Karen Klein, Akin Ünal
2023/862 (PDF ) Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model Jiangxia Ge, Tianshu Shan, Rui Xue
2023/861 (PDF ) When Messages are Keys: Is HMAC a dual-PRF? Matilda Backendal, Mihir Bellare, Felix Günther, Matteo Scarlata
2023/860 (PDF ) Security-Preserving Distributed Samplers: How to Generate any CRS in One Round without Random Oracles Damiano Abram, Brent Waters, Mark Zhandry
2023/859 (PDF ) Cutting the GRASS: Threshold GRoup Action Signature Schemes Michele Battagliola, Giacomo Borin, Alessio Meneghetti, Edoardo Persichetti
2023/858 (PDF ) Effective Pairings in Isogeny-based Cryptography Krijn Reijnders
2023/857 (PDF ) SoK: Vector OLE-Based Zero-Knowledge Protocols Carsten Baum, Samuel Dittmer, Peter Scholl, Xiao Wang
2023/856 (PDF ) The Query-Complexity of Preprocessing Attacks Ashrujit Ghoshal, Stefano Tessaro
2023/855 (PDF ) $\mathsf{Mercury}$: Constant-Round Protocols for Multi-Party Computation with Rationals Luke Harmon, Gaetan Delavignette
2023/854 (PDF ) On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation Kai Gellert, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager
2023/853 (PDF ) How to Bind Anonymous Credentials to Humans Julia Hesse, Nitin Singh, Alessandro Sorniotti
2023/852 (PDF ) Revisiting Oblivious Top-$k$ Selection with Applications to Secure $k$-NN Classification Kelong Cong, Robin Geelen, Jiayi Kang, Jeongeun Park
2023/851 (PDF ) Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN Alex Biryukov, Je Sen Teh, Aleksei Udovenko
2023/850 (PDF ) Revisiting the Constant-sum Winternitz One-time Signature with Applications to SPHINCS+ and XMSS Kaiyi Zhang, Hongrui Cui, Yu Yu
2023/849 (PDF ) Towards Topology-Hiding Computation from Oblivious Transfer Marshall Ball, Alexander Bienstock, Lisa Kohl, Pierre Meyer
2023/848 (PDF ) Extending Updatable Encryption: Public Key, Tighter Security and Signed Ciphertexts Chen Qian, Yao Jiang Galteland, Gareth T. Davies
2023/847 (PDF ) A New Formulation of the Linear Equivalence Problem and Shorter LESS Signatures Edoardo Persichetti, Paolo Santini
2023/846 (PDF ) Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency Giacomo Fenzi, Hossein Moghaddas, Ngoc Khanh Nguyen
2023/845 (PDF ) Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding Maxime Bombar, Geoffroy Couteau, Alain Couvreur, Clément Ducros
2023/844 (PDF ) Inferring Bivariate Polynomials for Homomorphic Encryption Application Diana Maimut, George Teseleanu
2023/843 (PDF ) Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol Gareth T. Davies, Sebastian Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horváth, Tibor Jager
2023/842 (PDF ) Advanced Composition Theorems for Differential Obliviousness Mingxun Zhou, Mengshi Zhao, T-H. Hubert Chan, Elaine Shi
2023/841 (PDF ) The curious case of the half-half Bitcoin ECDSA nonces Dylan Rowe, Joachim Breitner, Nadia Heninger
2023/840 (PDF ) Revisiting the Indifferentiability of the Sum of Permutations Aldo Gunsing, Ritam Bhaumik, Ashwin Jha, Bart Mennink, Yaobin Shen
2023/839 (PDF ) On Linear Communication Complexity for (Maximally) Fluid MPC Alexander Bienstock, Daniel Escudero, Antigoni Polychroniadou
2023/838 (PDF ) How to Recover a Secret with O(n) Additions Benny Applebaum, Oded Nir, Benny Pinkas
2023/837 (PDF ) Faster coercion-resistant e-voting by encrypted sorting Diego F. Aranha, Michele Battagliola, Lawrence Roy
2023/836 (PDF ) Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE Théophile Brézot, Paola de Perthuis, David Pointcheval
2023/835 (PDF ) Unifying Freedom and Separation for Tight Probing-Secure Composition Sonia Belaïd, Gaëtan Cassiers, Matthieu Rivain, Abdul Rahman Taleb
2023/834 (PDF ) Discrete Logarithm Factory Haetham AL ASWAD, Cécile PIERROT, Emmanuel THOMÉ
2023/833 (PDF ) Anonymous, Timed and Revocable Proxy Signatures Ghada Almashaqbeh, Anca Nitulescu
2023/832 (PDF ) Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications Guy Zyskind, Avishay Yanai, Alex "Sandy" Pentland
2023/831 (PDF ) Automated Generation of Masked Nonlinear Components: From Lookup Tables to Private Circuits Lixuan Wu, Yanhong Fan, Bart Preneel, Weijia Wang, Meiqin Wang
2023/830 (PDF ) HPPC: Hidden Product of Polynomial Composition Borja Gomez Rodriguez
2023/829 (PDF ) TGh: A TEE/GC Hybrid Enabling Confidential FaaS Platforms James Choncholas, Ketan Bhardwaj, Ada Gavrilovska
2023/828 (PDF ) Optimized Discrete Logarithm Computation for Faster Square Roots in Finite Fields Thomas Pornin
2023/827 (PDF ) On Concurrent Multi-Party Quantum Computation Vipul Goyal, Xiao Liang, Giulio Malavolta
2023/826 (PDF ) Ring/Module Learning with Errors under Linear Leakage -- Hardness and Applications Zhedong Wang, Qiqi Lai, Feng-Hao Liu
2023/825 (PDF ) Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC) Katerina Mitrokotsa, Sayantan Mukherjee, Jenit Tomy
2023/824 (PDF ) Reed-Solomon Codes over the Circle Group Ulrich Haböck, Daniel Lubarov, Jacqueline Nabaglo
2023/823 (PDF ) Lattice-based Authenticated Key Exchange with Tight Security Jiaxin Pan, Benedikt Wagner, Runzhi Zeng
2023/822 (PDF ) Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, Qingju Wang
2023/821 (PDF ) Securing IoT Devices with Fast and Energy Efficient Implementation of PRIDE and PRESENT Ciphers Vijay Dahiphale, Hrishikesh Raut, Gaurav Bansod, Devendra Dahiphale
2023/820 (PDF ) Network Agnostic MPC with Statistical Security Ananya Appan, Ashish Choudhury
2023/819 (PDF ) NNBits: Bit Profiling with a Deep Learning Ensemble Based Distinguisher Anna Hambitzer, David Gerault, Yun Ju Huang, Najwa Aaraj, Emanuele Bellini
2023/818 (PDF ) Generalized Special-Sound Interactive Proofs and their Knowledge Soundness Thomas Attema, Serge Fehr, Nicolas Resch
2023/817 (PDF ) Oblivious Transfer with Constant Computational Overhead Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
2023/816 (PDF ) Simplified Modeling of MITM Attacks for Block Ciphers: new (Quantum) Attacks André Schrottenloher, Marc Stevens
2023/815 (PDF ) Noah's Ark: Efficient Threshold-FHE Using Noise Flooding Morten Dahl, Daniel Demmler, Sarah El Kazdadi, Arthur Meyre, Jean-Baptiste Orfila, Dragos Rotaru, Nigel P. Smart, Samuel Tap, Michael Walter
2023/814 (PDF ) A Note on ``Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems'' Zhengjun Cao, Lihua Liu
2023/813 (PDF ) Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Cryptography Zachary Espiritu, Seny Kamara, Tarik Moataz
2023/812 (PDF ) How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More Cody Freitag, Brent Waters, David J. Wu
2023/811 (PDF ) Limits of Breach-Resistant and Snapshot-Oblivious RAMs Giuseppe Persiano, Kevin Yeo
2023/810 (PDF ) MAPLE: MArkov Process Leakage attacks on Encrypted Search Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber
2023/809 (PDF ) Password-Based Credentials with Security against Server Compromise Dennis Dayanikli, Anja Lehmann
2023/808 (PDF ) Generic-Group Lower Bounds via Reductions Between Geometric-Search Problems: With and Without Preprocessing Benedikt Auerbach, Charlotte Hoffmann, Guillermo Pascual-Perez
2023/807 (PDF ) Ready to SQI? Safety First! Towards a constant-time implementation of isogeny-based signature, SQIsign David Jacquemin, Anisha Mukherjee, Péter Kutas, Sujoy SINHA ROY
2023/806 (PDF ) SNACKs for Proof-of-Space Blockchains Hamza Abusalah
2023/805 (PDF ) New Bounds on the Local Leakage Resilience of Shamir's Secret Sharing Scheme Ohad Klein, Ilan Komargodski
2023/804 (PDF ) Falkor: Federated Learning Secure Aggregation Powered by AES-CTR GPU Implementation Mariya Georgieva Belorgey, Sofia Dandjee, Nicolas Gama, Dimitar Jetchev, Dmitry Mikushin
2023/803 (PDF ) "Tesla Cryptography:" Powering Up Security with Other Than Mathematical Complexity Gideon Samid
2023/802 (PDF ) Constant-Round Arguments from One-Way Functions Noga Amit, Guy Rothblum
2023/801 (PDF ) We Are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve Charles Bouillaguet, Ambroise Fleury, Pierre-Alain Fouque, Paul Kirchner
2023/800 (PDF ) Vector Commitments With Proofs of Smallness: Short Range Proofs and More Benoit Libert
2023/799 (PDF ) Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim
2023/798 (PDF ) Generalized Hybrid Search and Applications Alexandru Cojocaru, Juan Garay, Fang Song
2023/797 (PDF ) Super-Quadratic Quantum Speed-Ups and Guessing Many Likely Keys Timo Glaser, Alexander May, Julian Nowakowski
2023/796 (PDF ) Generic Security of the Ascon Mode: On the Power of Key Blinding Charlotte Lefevre, Bart Mennink
2023/795 (PDF ) Bit-Security Preserving Hardness Amplification Shun Watanabe, Kenji Yasunaga
2023/794 (PDF ) Areion: Highly-Efficient Permutations and Its Applications (Extended Version) Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba
2023/793 (PDF ) Optimizations and Practicality of High-Security CSIDH Fabio Campos, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, Thom Wiggers
2023/792 (PDF ) On the Fujisaki-Okamoto transform: from Classical CCA Security to Quantum CCA Security Jiangxia Ge, Tianshu Shan, Rui Xue
2023/791 (PDF ) New SIDH Countermeasures for a More Efficient Key Exchange Andrea Basso, Tako Boris Fouotsa
2023/790 (PDF ) Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers Yaobin Shen, François-Xavier Standaert
2023/789 (PDF ) Where are the constants? New Insights On The Role of Round Constant Addition in The SymSum Distinguisher Sahiba Suryawanshi, Dhiman Saha
2023/787 (PDF ) Private Proof-of-Stake Blockchains using Differentially-private Stake Distortion Chenghong Wang, David Pujo, Kartik Nayak, Ashwin Machanavajjhala
2023/786 (PDF ) Blockchain Transaction Censorship: (In)secure and (In)efficient? Zhipeng Wang, Xihan Xiong, William J. Knottenbelt
2023/785 (PDF ) Generation of two ''independent'' points on an elliptic curve of $j$-invariant $\neq 0, 1728$ Dimitri Koshelev
2023/784 (PDF ) History-Free Sequential Aggregation of Hash-and-Sign Signatures Alessio Meneghetti, Edoardo Signorini
2023/783 (PDF ) Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings Andrea Di Giusto, Chiara Marcolla
2023/782 (PDF ) Coefficient Grouping for Complex Affine Layers Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier, Takanori Isobe
2023/781 (PDF ) $\mathsf{Skye}$: An Expanding PRF based Fast KDF and its Applications Amit Singh Bhati, Antonin Dufka, Elena Andreeva, Arnab Roy, Bart Preneel
2023/779 (PDF ) Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH Mingjie Chen, Muhammad Imran, Gábor Ivanyos, Péter Kutas, Antonin Leroux, Christophe Petit
2023/778 (PDF ) Bounded Verification for Finite-Field-Blasting (In a Compiler for Zero Knowledge Proofs) Alex Ozdemir, Riad S. Wahby, Fraser Brown, Clark Barrett
2023/777 (PDF ) Too Many Hints - When LLL Breaks LWE Alexander May, Julian Nowakowski
2023/776 (PDF ) Quantum Attacks on Type-1 Generalized Feistel Schemes Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao
2023/775 (PDF ) Exact Security Analysis of ASCON Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi
2023/774 (PDF ) Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain Yiming Li, Shengli Liu
2023/773 (PDF ) An update on Keccak performance on ARMv7-M Alexandre Adomnicai
2023/772 (PDF ) Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu
2023/771 (PDF ) Revisiting Key Decomposition Techniques for FHE: Simpler, Faster and More Generic Mariya Georgieva Belorgey, Sergiu Carpov, Nicolas Gama, Sandra Guasch, Dimitar Jetchev
2023/770 (PDF ) Towards compressed permutation oracles Dominique Unruh
2023/769 (PDF ) Brakedown's expander code Ulrich Haböck
2023/768 (PDF ) Owl: An Augmented Password-Authenticated Key Exchange Scheme Feng Hao, Samiran Bag, Liqun Chen, Paul C. van Oorschot
2023/767 (PDF ) LFHE: Fully Homomorphic Encryption with Bootstrapping Key Size Less than a Megabyte Andrey Kim, Yongwoo Lee, Maxim Deryabin, Jieun Eom, Rakyong Choi
2023/766 (PDF ) Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials Qiqi Lai, Chongshen Chen, Feng-Hao Liu, Anna Lysyanskaya, Zhedong Wang
2023/765 (PDF ) Threshold ECDSA in Three Rounds Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
2023/764 (PDF ) Subversion-Resilient Authenticated Encryption without Random Oracles Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth, Tibor Jager
2023/763 (PDF ) Undetectable Watermarks for Language Models Miranda Christ, Sam Gunn, Or Zamir
2023/762 (PDF ) How to Design Fair Protocols in the Multi-Blockchain Setting Sivanarayana Gaddam, Ranjit Kumaresan, Srinivasan Raghuraman, Rohit Sinha
2023/761 (PDF ) Nimble: Rollback Protection for Confidential Cloud Services (extended version) Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath Setty, Sudheesh Singanamalla
2023/760 (PDF ) Time to Bribe: Measuring Block Construction Market Anton Wahrstätter, Liyi Zhou, Kaihua Qin, Davor Svetinovic, Arthur Gervais
2023/759 (PDF ) Efficient TFHE Bootstrapping in the Multiparty Setting Jeongeun Park, Sergi Rovira
2023/758 (PDF ) Scaling Mobile Private Contact Discovery to Billions of Users Laura Hetz, Thomas Schneider, Christian Weinert
2023/757 (PDF ) A Note on ``On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System'' Zhengjun Cao, Lihua Liu
2023/756 (PDF ) SDitH in the QROM Carlos Aguilar-Melchor, Andreas Hülsing, David Joseph, Christian Majenz, Eyal Ronen, Dongze Yue
2023/755 (PDF ) The security of Kyber's FO-transform Manuel Barbosa, Andreas Hülsing
2023/754 (PDF ) Batch Proofs are Statistically Hiding Nir Bitansky, Chethan Kamath, Omer Paneth, Ron Rothblum, Prashant Nalini Vasudevan
2023/753 (PDF ) A Faster Software Implementation of SQISign Kaizhan Lin, Weize Wang, Zheng Xu, Chang-An Zhao
2023/752 (PDF ) Schnorr protocol in Jasmin José Bacelar Almeida, Denis Firsov, Tiago Oliveira, Dominique Unruh
2023/751 (PDF ) Scalable Agreement Protocols with Optimal Optimistic Efficiency Yuval Gelles, Ilan Komargodski
2023/750 (PDF ) BAKSHEESH: Similar Yet Different From GIFT Anubhab Baksi, Jakub Breier, Anupam Chattopadhyay, Tomáš Gerlich, Sylvain Guilley, Naina Gupta, Takanori Isobe, Arpan Jati, Petr Jedlicka, Hyunjun Kim, Fukang Liu, Zdeněk Martinásek, Kosei Sakamoto, Hwajeong Seo, Rentaro Shiba, Ritu Ranjan Shrivastwa
2023/749 (PDF ) Note on Subversion-Resilient Key Exchange Magnus Ringerud
2023/748 (PDF ) Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu
2023/747 (PDF ) Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications Masahito Ishizaka
2023/746 (PDF ) Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications Masahito Ishizaka, Kazuhide Fukushima
2023/745 (PDF ) PSI from ring-OLE Wutichai Chongchitmate, Yuval Ishai, Steve Lu, Rafail Ostrovsky
2023/744 (PDF ) On Extremal Algebraic Graphs and implementations of new cubic Multivariate Public Keys Vasyl Ustimenko, Tymoteusz Chojecki, Michal Klisowski
2023/743 (PDF ) On Sustainable Ring-based Anonymous Systems Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo
2023/742 (PDF ) Finding Desirable Substitution Box with SASQUATCH Manas Wadhwa, Anubhab Baksi, Kai Hu, Anupam Chattopadhyay, Takanori Isobe, Dhiman Saha
2023/741 (PDF ) The Referendum Problem in Anonymous Voting for Decentralized Autonomous Organizations Artem Grigor, Vincenzo Iovino, Giuseppe Visconti
2023/740 (PDF ) Practical Robust DKG Protocols for CSIDH Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
2023/739 (PDF ) SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits Jung Hee Cheon, Hyeongmin Choe, Dongyeon Hong, MinJune Yi
2023/738 (PDF ) Extremal algebraic graphs, quadratic multivariate public keys and temporal rules Vasyl Ustimenko, Aneta Wróblewska
2023/736 (PDF ) Private Eyes: Zero-Leakage Iris Searchable Encryption Julie Ha, Chloe Cachet, Luke Demarest, Sohaib Ahmad, Benjamin Fuller
2023/735 (PDF ) Towards a Privacy-preserving Attestation for Virtualized Networks Ghada Arfaoui, Thibaut Jacques, Marc Lacoste, Cristina Onete, Léo Robert
2023/734 (PDF ) TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android Dimitri Mankowski, Thom Wiggers, Veelasha Moonsamy
2023/733 (PDF ) On implemented graph based generator of cryptographically strong pseudorandom sequences of multivariate nature Vasyl Ustimenko, Tymoteusz Chojecki
2023/732 (PDF ) VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations Quentin L. Meunier, Abdul Rahman Taleb
2023/731 (PDF ) Fast Exhaustive Search for Polynomial Systems over F3 Bo-Yin Yang, Wei-Jeng Wang, Shang-Yi Yang, Char-Shin Miou, Chen-Mou Cheng
2023/730 (PDF ) The Problem of Half Round Key XOR Anubhab Baksi
2023/729 (PDF ) Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures Yang Yu, Huiwen Jia, Xiaoyun Wang
2023/728 (PDF ) SoK: Distributed Randomness Beacons Kevin Choi, Aathira Manoj, Joseph Bonneau
2023/727 (PDF ) Safeguarding Physical Sneaker Sale Through a Decentralized Medium Marwan Zeggari, Aydin Abadi, Renaud Lambiotte, Mohamad Kassab
2023/726 (PDF ) A Note on ``A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT'' Zhengjun Cao, Lihua Liu
2023/725 (PDF ) On Perfect Linear Approximations and Differentials over Two-Round SPNs Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes
2023/724 (PDF ) Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme Lichao Wu, Guilherme Perin, Stjepan Picek
2023/723 (PDF ) Non-Interactive Commitment from Non-Transitive Group Actions Giuseppe D'Alconzo, Andrea Flamini, Andrea Gangemi
2023/722 (PDF ) Composing Bridges Mugurel Barcau, Vicentiu Pasol, George C Turcas
2023/721 (PDF ) A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication Supriya Adhikary, Angshuman Karmakar
2023/720 (PDF ) MUSES: Efficient Multi-User Searchable Encrypted Database Tung Le, Rouzbeh Behnia, Jorge Guajardo, Thang Hoang
2023/719 (PDF ) Lower Bounds for Lattice-based Compact Functional Encryption Erkan Tairi, Akın Ünal
2023/718 (PDF ) A Guide to the Design of Digital Signatures based on Cryptographic Group Actions Giacomo Borin, Edoardo Persichetti, Paolo Santini, Federico Pintore, Krijn Reijnders
2023/717 (PDF ) Generic Error SDP and Generic Error CVE Felice Manganiello, Freeman Slaughter
2023/716 (PDF ) Towards High-speed ASIC Implementations of Post-Quantum Cryptography Malik Imran, Aikata Aikata, Sujoy Sinha Roy, Samuel pagliarini
2023/715 (PDF ) SOK: Research Motivations of Public-Key Cryptography Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao
2023/714 (PDF ) A Two-Party Hierarchical Deterministic Wallets in Practice ChihYun Chuang, IHung Hsu, TingFang Lee
2023/713 (PDF ) KAIME : Central Bank Digital Currency with Realistic and Modular Privacy Ali Dogan, Kemal Bicakci
2023/712 (PDF ) Optimizing Attribute-based Encryption for Circuits using Compartmented Access Structures Alexandru Ionita
2023/711 (PDF ) On the Quantum Security of HAWK Serge Fehr, Yu-Hsuan Huang
2023/710 (PDF ) PriFHEte: Achieving Full-Privacy in Account-based Cryptocurrencies is Possible Varun Madathil, Alessandra Scafuro
2023/709 (PDF ) Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement Alexandre Augusto Giron
2023/708 (PDF ) Kyber terminates Manuel Barbosa, Peter Schwabe
2023/707 (PDF ) Concurrent Security of Anonymous Credentials Light, Revisited Julia Kastner, Julian Loss, Omar Renawi
2023/706 (PDF ) Two-Message Authenticated Key Exchange from Public-Key Encryption You Lyu, Shengli Liu
2023/705 (PDF ) Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang
2023/704 (PDF ) Asymmetric Multi-Party Computation Vipul Goyal, Chen-Da Liu-Zhang, Rafail Ostrovsky
2023/703 (PDF ) BQP $\neq$ QMA Ping Wang, Yiting Su
2023/702 (PDF ) Building Unclonable Cryptography: A Tale of Two No-cloning Paradigms Ghada Almashaqbeh, Rohit Chatterjee
2023/701 (PDF ) Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption Tabitha Ogilvie
2023/700 (PDF ) PIE: $p$-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption Luke Harmon, Gaetan Delavignette, Arnab Roy, David Silva
2023/699 (PDF ) Lattice-based, more general anti-leakage model and its application in decentralization Xiaokang Dai, Jingwei Chen, Wenyuan Wu, Yong Feng
2023/697 (PDF ) NFT Trades in Bitcoin with Off-chain Receipts Mehmet Sabir Kiraz, Enrique Larraia, Owen Vaughan
2023/696 (PDF ) Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices Koustabh Ghosh, Jonathan Fuchs, Parisa Amiri Eliasi, Joan Daemen
2023/695 (PDF ) Non-Interactive Zero-Knowledge from Non-Interactive Batch Arguments Jeffrey Champion, David J. Wu
2023/694 (PDF ) VeriVoting: A decentralized, verifiable and privacy-preserving scheme for weighted voting Xiaohan Yue
2023/693 (PDF ) LeakyOhm: Secret Bits Extraction using Impedance Analysis Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik
2023/692 (PDF ) On the Invalidity of LV16/Lin17 Obfuscation Schemes Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong
2023/691 (PDF ) Weak Fiat-Shamir Attacks on Modern Proof Systems Quang Dao, Jim Miller, Opal Wright, Paul Grubbs
2023/690 (PDF ) Invertible Quadratic Non-Linear Functions over $\mathbb F_p^n$ via Multiple Local Maps Ginevra Giordani, Lorenzo Grassi, Silvia Onofri, Marco Pedicini
2023/689 (PDF ) Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus Erica Blum, Jonathan Katz, Julian Loss, Kartik Nayak, Simon Ochsenreither
2023/688 (PDF ) Applications of Timed-release Encryption with Implicit Authentication Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia
2023/687 (PDF ) SoK: Delay-based Cryptography Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia
2023/686 (PDF ) Efficient Accelerator for NTT-based Polynomial Multiplication Raziyeh Salarifard, Hadi Soleimany
2023/685 (PDF ) Third-Party Private Set Intersection Foo Yee Yeo, Jason H. M. Ying
2023/684 (PDF ) A note on ``a lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment'' Zhengjun Cao, Lihua Liu
2023/683 (PDF ) MPC with Low Bottleneck-Complexity: Information-Theoretic Security and More Hannah Keller, Claudio Orlandi, Anat Paskin-Cherniavsky, Divya Ravi
2023/682 (PDF ) Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman
2023/681 (PDF ) Benchmarking ZK-Circuits in Circom Colin Steidtmann, Sanjay Gollapudi
2023/680 (PDF ) Private Polynomial Commitments and Applications to MPC Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Wenxuan Wu, Yupeng Zhang
2023/679 (PDF ) ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path Xiaohai Dai, Bolin Zhang, Hai Jin, Ling Ren
2023/678 (PDF ) A 334µW 0.158mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber with Low-latency Striding Toom-Cook Multiplication Extended Version Archisman Ghosh, Jose Maria Bermudo Mera, Angshuman Karmakar, Debayan Das, Santosh Ghosh, Ingrid Verbauwhede, Shreyas Sen
2023/677 (PDF ) Secure Context Switching of Masked Software Implementations Barbara Gigerl, Robert Primas, Stefan Mangard
2023/676 (PDF ) From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers Jikang Lin, Jiahui He, Yanhong Fan, Meiqin Wang
2023/675 (PDF ) Efficient and Secure Quantile Aggregation of Private Data Streams Xiao Lan, Hongjian Jin, Hui Guo, Xiao Wang
2023/674 (PDF ) An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros Kazuma Taka, Tatusya Ishikawa, Kosei Sakamoto, Takanori Isobe
2023/673 (PDF ) Tracing Quantum State Distinguishers via Backtracking Mark Zhandry
2023/672 (PDF ) SigRec: Automatic Recovery of Function Signatures in Smart Contracts Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang
2023/671 (PDF ) Proving knowledge of isogenies – A survey Ward Beullens, Luca De Feo, Steven D. Galbraith, Christophe Petit
2023/670 (PDF ) Behemoth: transparent polynomial commitment scheme with constant opening proof size and verifier time István András Seres, Péter Burcsi
2023/669 (PDF ) Classical substitution ciphers and group theory Thomas Kaeding
2023/668 (PDF ) Statement-Oblivious Threshold Witness Encryption Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2023/666 (PDF ) Arithmetization of predicates into Halo 2 using application specific trace types Morgan Thomas
2023/665 (PDF ) On the Feasibility of Identity-based Encryption with Equality Test against Insider Attacks Keita Emura
2023/664 (PDF ) MPC in the head for isomorphisms and group actions Antoine Joux
2023/663 (PDF ) NTWE: A Natural Combination of NTRU and LWE Joel Gärtner
2023/662 (PDF ) Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexity Reo Eriguchi
2023/661 (PDF ) Study of Arithmetization Methods for STARKs Tiago Martins, João Farinha
2023/660 (PDF ) FESTA: Fast Encryption from Supersingular Torsion Attacks Andrea Basso, Luciano Maino, Giacomo Pope
2023/659 (PDF ) Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks Tianrui Wang, Anyu Wang, Xiaoyun Wang
2023/658 (PDF ) A note on ``faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things'' Zhengjun Cao, Lihua Liu
2023/657 (PDF ) Ou: Automating the Parallelization of Zero-Knowledge Protocols Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, Zhong Shao
2023/656 (PDF ) Formalizing Soundness Proofs of SNARKs Bolton Bailey, Andrew Miller
2023/655 (PDF ) TandaPay Whistleblowing Communities: Shifting Workplace Culture Towards Zero-Tolerance Sexual Harassment Policies Joshua Davis, Dr. Rashid Minhas, Michelle Casario, William Bentley, Kevin Cosby
2023/654 (PDF ) Griffin: Towards Mixed Multi-Key Homomorphic Encryption Thomas Schneider, Hossein Yalame, Michael Yonli
2023/653 (PDF ) Muckle+: End-to-End Hybrid Authenticated Key Exchanges Sonja Bruckner, Sebastian Ramacher, Christoph Striecks
2023/652 (PDF ) ScionFL: Efficient and Robust Secure Quantized Aggregation Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai
2023/651 (PDF ) Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3 Marc Fischlin
2023/650 (PDF ) Pseudorandom Correlation Functions from Variable-Density LPN, Revisited Geoffroy Couteau, Clément Ducros
2023/649 (PDF ) FinTracer: A privacy-preserving mechanism for tracing electronic money Michael Brand, Hamish Ivey-Law, Tania Churchill
2023/648 (PDF ) Collatz Computation Sequence for Sufficient Large Integers is Random Wei Ren
2023/647 (PDF ) Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service Kwok-Yan Lam, Xianhui Lu, Linru Zhang, Xiangning Wang, Huaxiong Wang, Si Qi Goh
2023/646 (PDF ) A Note on ``Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT'' Zhengjun Cao, Lihua Liu
2023/645 (PDF ) Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation Shihe Ma, Tairong Huang, Anyu Wang, Qixian Zhou, Xiaoyun Wang
2023/644 (PDF ) Improved Distributed RSA Key Generation Using the Miller-Rabin Test Jakob Burkhardt, Ivan Damgård, Tore Frederiksen, Satrajit Ghosh, Claudio Orlandi
2023/643 (PDF ) Privacy-Preserving Regular Expression Matching using Nondeterministic Finite Automata Ning Luo, Chenkai Weng, Jaspal Singh, Gefei Tan, Ruzica Piskac, Mariana Raykova
2023/642 (PDF ) PELTA -- Shielding Multiparty-FHE against Malicious Adversaries Sylvain Chatel, Christian Mouchet, Ali Utkan Sahin, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux
2023/641 (PDF ) Hardware-Accelerated Encrypted Execution of General-Purpose Applications Charles Gouert, Vinu Joseph, Steven Dalton, Cedric Augonnet, Michael Garland, Nektarios Georgios Tsoutsos
2023/640 (PDF ) A Direct Key Recovery Attack on SIDH Luciano Maino, Chloe Martindale, Lorenz Panny, Giacomo Pope, Benjamin Wesolowski
2023/639 (PDF ) OPRFs from Isogenies: Designs and Analysis Lena Heimberger, Tobias Hennerbichler, Fredrik Meisingseth, Sebastian Ramacher, Christian Rechberger
2023/638 (PDF ) Classification of All $t$-Resilient Boolean Functions with $t+4$ Variables Shahram Rasoolzadeh
2023/637 (PDF ) Padding-based forgeries in the mode XOCB Jean Liénardy
2023/636 (PDF ) Multi-Armed SPHINCS+ Gustavo Banegas, Florian Caullery
2023/635 (PDF ) Cassiopeia: Practical On-Chain Witness Encryption Schwinn Saereesitthipitak, Dionysis Zindros
2023/634 (PDF ) Polynomial Hashing over Prime Order Fields Sreyosi Bhattacharyya, Kaushik Nath, Palash Sarkar
2023/633 (PDF ) From Substitution Box To Threshold Anubhab Baksi, Sylvain Guilley, Ritu-Ranjan Shrivastwa, Sofiane Takarabt
2023/632 (PDF ) Batch Inference on Deep Convolutional Neural Networks With Fully Homomorphic Encryption Using Channel-By-Channel Convolutions Jung Hee Cheon, Minsik Kang, Taeseong Kim, Junyoung Jung, Yongdong Yeo
2023/630 (PDF ) Proximity Testing with Logarithmic Randomness Benjamin E. Diamond, Jim Posen
2023/629 (PDF ) Publicly Auditable Functional Encryption Vlasis Koutsos, Dimitrios Papadopoulos
2023/628 (PDF ) SEC: Symmetric Encrypted Computation via Fast Look-ups Debadrita Talapatra, Nimish Mishra, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay
2023/627 (PDF ) Conflict Checkable and Decodable Codes and Their Applications Benny Applebaum, Eliran Kachlon
2023/626 (PDF ) Sprints: Intermittent Blockchain PoW Mining Michael Mirkin, Lulu Zhou, Ittay Eyal, Fan Zhang
2023/625 (PDF ) Efficient Information-Theoretic Distributed Point Function with General Output Groups Junru Li, Pengzhen Ke, Liang Feng Zhang
2023/624 (PDF ) HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, MinJune Yi
2023/623 (PDF ) Toward Practical Lattice-based Proof of Knowledge from Hint-MLWE Duhyeong Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song
2023/622 (PDF ) CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives Emanuele Bellini, David Gerault, Juan Grados, Yun Ju Huang, Mohamed Rachidi, Sharwan Tiwari, Rusydi H. Makarim
2023/621 (PDF ) On APN functions whose graphs are maximal Sidon sets Claude Carlet
2023/620 (PDF ) ProtoStar: Generic Efficient Accumulation/Folding for Special Sound Protocols Benedikt Bünz, Binyi Chen
2023/619 (PDF ) Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields Hiroki Furue, Tsuyoshi Takagi
2023/618 (PDF ) Hardware Acceleration of FHEW Jonas Bertels, Michiel Van Beirendonck, Furkan Turan, Ingrid Verbauwhede
2023/616 (PDF ) vetKeys: How a Blockchain Can Keep Many Secrets Andrea Cerulli, Aisling Connolly, Gregory Neven, Franz-Stefan Preiss, Victor Shoup
2023/615 (PDF ) Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles Elaine Shi, Nikhil Vanjani
2023/614 (PDF ) Comprehensive Preimage Security Evaluations on Rijndael-based Hashing Tianyu Zhang
2023/613 (PDF ) Computational Quantum Secret Sharing Alper Cakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro
2023/612 (PDF ) Cryptanalysis of SPEEDY Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, Meiqin Wang
2023/611 (PDF ) A Comparison of Multi-task learning and Single-task learning Approaches Thomas Marquet, Elisabeth Oswald
2023/609 (PDF ) Enabling Two-Party Secure Computation on Set Intersection Ferhat Karakoç, Alptekin Küpçü
2023/608 (PDF ) Publicly Verifiable Auctions with Privacy Paul Germouty, Enrique Larraia, Wei Zhang
2023/607 (PDF ) Security analysis of the Milenage-construction based on a PRF Alexander Maximov, Mats Näslund
2023/606 (PDF ) Novel Approach to Cryptography Implementation using ChatGPT Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo
2023/605 (PDF ) The Principal–Agent Problem in Liquid Staking Apostolos Tzinas, Dionysis Zindros
2023/604 (PDF ) Pushing the Limit of Vectorized Polynomial Multiplication for NTRU Prime Vincent Hwang
2023/603 (PDF ) TFHE Public-Key Encryption Revisited Marc Joye
2023/602 (PDF ) Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat, LaKyah Tyner
2023/601 (PDF ) Threshold Cryptosystems Based on $2^k$-th Power Residue Symbols George Teseleanu
2023/600 (PDF ) Improving and Automating BFV Parameters Selection: An Average-Case Approach Beatrice Biasioli, Chiara Marcolla, Marco Calderini, Johannes Mono
2023/599 (PDF ) A Note on a CBC-Type Mode of Operation George Teseleanu
2023/598 (PDF ) Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold Sourav Das, Philippe Camacho, Zhuolun Xiang, Javier Nieto, Benedikt Bunz, Ling Ren
2023/597 (PDF ) FedVS: Straggler-Resilient and Privacy-Preserving Vertical Federated Learning for Split Models Songze Li, Duanyi Yao, Jin Liu
2023/596 (PDF ) Time Complexities of Multiple-precision Modular Operations and Related Ratios Shenghui Su, Ping Luo
2023/595 (PDF ) SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti
2023/594 (PDF ) Semidirect Product Key Exchange: the State of Play Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti
2023/593 (PDF ) Implementing and Optimizing Matrix Triples with Homomorphic Encryption Johannes Mono, Tim Güneysu
2023/592 (PDF ) Blockchain Large Language Models Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais
2023/591 (PDF ) Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao, Siu-Ming Yiu
2023/590 (PDF ) Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure Francesco Berti
2023/589 (PDF ) $\texttt{CryptographicEstimators}$: a Software Library for Cryptographic Hardness Estimation Andre Esser, Javier Verbel, Floyd Zweydinger, Emanuele Bellini
2023/588 (PDF ) Wave Parameter Selection Nicolas Sendrier
2023/587 (PDF ) Proof-Carrying Data From Arithmetized Random Oracles Megan Chen, Alessandro Chiesa, Tom Gur, Jack O'Connor, Nicholas Spooner
2023/586 (PDF ) A Novel Preprocessing-Free Proofless Verifiable Computation Scheme from Integer Factoring Alex Dalton, David Thomas, Peter Cheung
2023/585 (PDF ) Two Party Fair Exchange Alex Dalton, David Thomas, Peter Cheung
2023/584 (PDF ) General-Purpose Secure Conflict-free Replicated Data Types Bernardo Portela, Hugo Pacheco, Pedro Jorge, Rogério Pontes
2023/583 (PDF ) Reusable, Instant and Private Payment Guarantees for Cryptocurrencies Akash Madhusudan, Mahdi Sedaghat, Samarth Tiwari, Kelong Cong, Bart Preneel
2023/582 (PDF ) New NTRU Records with Improved Lattice Bases Elena Kirshanova, Alexander May, Julian Nowakowski
2023/581 (PDF ) A security analysis on MQ-Sign Yasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda
2023/580 (PDF ) Neural-Linear Attack Based on Distribution Data and Its Application on DES Rui Zhou, Ming Duan, Qi Wang, Qianqiong Wu, Sheng Guo, Lulu Guo, Zheng Gong
2023/579 (PDF ) Revealing the Secrets of Radio-Enabled Embedded Systems: on extraction of raw information from any on-board signal through RF Erez Danieli, Menachem Goldzweig, Moshe Avital, Itamar Levi
2023/578 (PDF ) DORAM revisited: Maliciously secure RAM-MPC with logarithmic overhead Brett Falk, Daniel Noble, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang
2023/577 (PDF ) Exploring Formal Methods for Cryptographic Hash Function Implementations Nicky Mouha
2023/576 (PDF ) IGD-ScoreChain: A Lightweight and Scalable Blockchain Based on Node Sharding for the Internet of Things Elnaz Mehraein, Reza Nourmohammadi
2023/575 (PDF ) On Central Bank Digital Currency: A composable treatment István Vajda
2023/573 (PDF ) HyperNova: Recursive arguments for customizable constraint systems Abhiram Kothapalli, Srinath Setty
2023/572 (PDF ) Scalable Private Signaling Sashidhar Jakkamsetti, Zeyu Liu, Varun Madathil
2023/571 (PDF ) Fine-Grained Non-Interactive Key-Exchange: Constructions and Lower Bounds Abtin Afshar, Geoffroy Couteau, Mohammad Mahmoody, Elahe Sadeghi
2023/570 (PDF ) Black-Box Separations for Non-Interactive Commitments in a Quantum World Kai-Min Chung, Yao-Ting Lin, Mohammad Mahmoody
2023/569 (PDF ) From Polynomial IOP and Commitments to Non-malleable zkSNARKs Antonio Faonio, Dario Fiore, Markulf Kohlweiss, Luigi Russo, Michal Zajac
2023/568 (PDF ) Enhancing the Privacy of Machine Learning via faster arithmetic over Torus FHE Marc Titus Trifan, Alexandru Nicolau, Alexander Veidenbaum
2023/567 (PDF ) hinTS: Threshold Signatures with Silent Setup Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
2023/566 (PDF ) Improved Differential Cryptanalysis on SPECK Using Plaintext Structures Zhuohui Feng, Ye Luo, Chao Wang, Qianqian Yang, Zhiquan Liu, Ling Song
2023/565 (PDF ) Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded Pratish Datta, Tapas Pal
2023/564 (PDF ) Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge) James Bartusek, Dakshita Khurana, Akshayaram Srinivasan
2023/563 (PDF ) FUSE – Flexible File Format and Intermediate Representation for Secure Multi-Party Computation Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko
2023/562 (PDF ) Cryptanalysis of Strong Physically Unclonable Functions Liliya Kraleva, Mohammad Mahzoun, Raluca Posteuca, Dilara Toprakhisar, Tomer Ashur, Ingrid Verbauwhede
2023/561 (PDF ) vr$^2$FHE- Securing FHE from Reaction-based Key Recovery Attacks Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2023/560 (PDF ) A Framework for Practical Anonymous Credentials from Lattices Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Alessandro Sorniotti
2023/559 (PDF ) Weakening Assumptions for Publicly-Verifiable Deletion James Bartusek, Dakshita Khurana, Giulio Malavolta, Alexander Poremba, Michael Walter
2023/557 (PDF ) Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
2023/556 (PDF ) Quantum-access Security of Hash-based Signature Schemes Quan Yuan, Mehdi Tibouchi, Masayuki Abe
2023/555 (PDF ) SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame
2023/554 (PDF ) Hybrid Encryption Scheme based on Polar Codes Reza Hooshmand
2023/553 (PDF ) Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain Ren Taguchi, Atsushi Takayasu
2023/552 (PDF ) Customizable constraint systems for succinct arguments Srinath Setty, Justin Thaler, Riad Wahby
2023/551 (PDF ) Breaking DPA-protected Kyber via the pair-pointwise multiplication Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Łukasz Chmielewski, Kirthivaasan Puniamurthy, Milan Šorf
2023/550 (PDF ) New Baselines for Local Pseudorandom Number Generators by Field Extensions Akin Ünal
2023/549 (PDF ) Weak instances of class group action based cryptography via self-pairings Wouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam van Buuren, Frederik Vercauteren
2023/548 (PDF ) Compartment-based and Hierarchical Threshold Delegated Verifiable Accountable Subgroup Multi-signatures Ahmet Ramazan Ağırtaş, Oğuz Yayla
2023/547 (PDF ) Certifying Zero-Knowledge Circuits with Refinement Types Junrui Liu, Ian Kretz, Hanzhi Liu, Bryan Tan, Jonathan Wang, Yi Sun, Luke Pearson, Anders Miltner, Işıl Dillig, Yu Feng
2023/546 (PDF ) Horizontal Correlation Attack on Classic McEliece Brice Colombier, Vincent Grosso, Pierre-Louis Cayrel, Vlad-Florin Drăgoi
2023/545 (PDF ) Improved Universal Thresholdizer from Iterative Shamir Secret Sharing Jung Hee Cheon, Wonhee Cho, Jiseung Kim
2023/544 (PDF ) PARMESAN: Parallel ARithMEticS over ENcrypted data Jakub Klemsa, Melek Önen
2023/543 (PDF ) Pseudorandomness with Proof of Destruction and Applications Amit Behera, Zvika Brakerski, Or Sattath, Omri Shmueli
2023/542 (PDF ) A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, Andrea Visconti
2023/541 (PDF ) Algorithmic Views of Vectorized Polynomial Multipliers for NTRU and NTRU Prime (Long Paper) Han-Ting Chen, Yi-Hua Chung, Vincent Hwang, Chi-Ting Liu, Bo-Yin Yang
2023/540 (PDF ) MAYO: Optimized Implementation with Revised Parameters for ARMv7-M Arianna Gringiani, Alessio Meneghetti, Edoardo Signorini, Ruggero Susella
2023/539 (PDF ) Dlog is Practically as Hard (or Easy) as DH – Solving Dlogs via DH Oracles on EC Standards Alexander May, Carl Richard Theodor Schneider
2023/538 (PDF ) Publicly Verifiable Deletion from Minimal Assumptions Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2023/537 (PDF ) Algebraic Cryptanalysis of HADES Design Strategy: Application to POSEIDON and Poseidon2 Tomer Ashur, Thomas Buschman, Mohammad Mahzoun
2023/536 (PDF ) Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience Victor Shoup, Nigel P. Smart
2023/535 (PDF ) Practical Randomized Lattice Gadget Decomposition With Application to FHE Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park
2023/534 (PDF ) Group Oblivious Message Retrieval Zeyu Liu, Eran Tromer, Yunhao Wang
2023/533 (PDF ) Injection-Secure Structured and Searchable Symmetric Encryption Ghous Amjad, Seny Kamara, Tarik Moataz
2023/532 (PDF ) HLG: A framework for computing graphs in Residue Number System and its application in Fully Homomorphic Encryption Shuang Wu, Chunhuan Zhao, Ye Yuan, Shuzhou Sun, Jie Li, Yamin Liu
2023/531 (PDF ) Practical Randomness Measure Tool Boaz Shahar
2023/530 (PDF ) Breaking and Fixing Garbled Circuits when a Gate has Duplicate Input Wires Raine Nieminen, Thomas Schneider
2023/529 (PDF ) Secure Communication in Dynamic Incomplete Networks Ivan Damgård, Divya Ravi, Daniel Tschudi, Sophia Yakoubov
2023/528 (PDF ) NP-Hardness of Approximating Meta-Complexity: A Cryptographic Approach Yizhi Huang, Rahul Ilango, Hanlin Ren
2023/527 (PDF ) Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong
2023/526 (PDF ) Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart
2023/525 (PDF ) Error Correction and Ciphertext Quantization in Lattice Cryptography Daniele Micciancio, Mark Schultz
2023/524 (PDF ) AI Resistant (AIR) Cryptography Gideon Samid
2023/523 (PDF ) Adding more parallelism to the AEGIS authenticated encryption algorithms Frank Denis
2023/522 (PDF ) SAFE: Sponge API for Field Elements JP Aumasson, Dmitry Khovratovich, Bart Mennink, Porçu Quine
2023/521 (PDF ) TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew Schmidt, Ajey Jacob, Benedict Reynwar, Kellie Canida, Akhilesh Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram
2023/520 (PDF ) Generic Security of the SAFE API and Its Applications Dmitry Khovratovich, Mario Marhuenda Beltrán, Bart Mennink
2023/517 (PDF ) Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography Aikata Aikata, Andrea Basso, Gaetan Cassiers, Ahmet Can Mert, Sujoy Sinha Roy
2023/516 (PDF ) 3-Party Secure Computation for RAMs: Optimal and Concretely Efficient Atsunori Ichikawa, Ilan Komargodski, Koki Hamada, Ryo Kikuchi, Dai Ikarashi
2023/515 (PDF ) stoRNA: Stateless Transparent Proofs of Storage-time Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas, Amir Nabizadeh
2023/514 (PDF ) Black-Box Reusable NISC with Random Oracles Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2023/513 (PDF ) Sublinear Secure Computation from New Assumptions Elette Boyle, Geoffroy Couteau, Pierre Meyer
2023/512 (PDF ) Automated Detection of Underconstrained Circuits for Zero-Knowledge Proofs Shankara Pailoor, Yanju Chen, Franklyn Wang, Clara Rodríguez, Jacob Van Gaffen, Jason Morton, Michael Chu, Brian Gu, Yu Feng, Isil Dillig
2023/511 (PDF ) $\text{MP}\ell\circ \mathrm{C}$: Privacy-Preserving IP Verification Using Logic Locking and Secure Multiparty Computation Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos
2023/510 (PDF ) Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model Anit Kumar Ghosal, Dipanwita Roychowdhury
2023/508 (PDF ) Computing Isogenies of Power-Smooth Degrees Between PPAVs Jesús-Javier Chi-Domínguez, Amalia Pizarro-Madariaga, Edgardo Riquelme
2023/507 (PDF ) Low Memory Attacks on Small Key CSIDH Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May
2023/506 (PDF ) Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices George Tasopoulos, Charis Dimopoulos, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld
2023/505 (PDF ) Side-Channel Analysis of Integrate-and-Fire Neurons within Spiking Neural Networks Matthias Probst, Manuel Brosch, Georg Sigl
2023/504 (PDF ) Private Computation Based On Polynomial Operation Shuailiang Hu
2023/503 (PDF ) Neural Network Quantisation for Faster Homomorphic Encryption Wouter Legiest, Furkan Turan, Michiel Van Beirendonck, Jan-Pieter D'Anvers, Ingrid Verbauwhede
2023/502 (PDF ) Laconic Function Evaluation for Turing Machines Nico Döttling, Phillip Gajland, Giulio Malavolta
2023/501 (PDF ) New Ways to Garble Arithmetic Circuits Marshall Ball, Hanjun Li, Huijia Lin, Tianren Liu
2023/500 (PDF ) Robust Quantum Public-Key Encryption with Applications to Quantum Key Distribution Giulio Malavolta, Michael Walter
2023/499 (PDF ) FLUTE: Fast and Secure Lookup Table Evaluations (Full Version) Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame
2023/498 (PDF ) Subset-optimized BLS Multi-signature with Key Aggregation Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Francois Garillot, Jonas Lindstrom, Ben Riva, Arnab Roy, Mahdi Sedaghat, Alberto Sonnino, Pun Waiwitlikhit, Joy Wang
2023/497 (PDF ) Upper bounding the number of bent functions using 2-row bent rectangles Sergey Agievich
2023/496 (PDF ) Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect Xichao Hu, Yongqiang Li, Lin Jiao, Zhengbin Liu, Mingsheng Wang
2023/495 (PDF ) On the algebraic immunity of weightwise perfectly balanced functions Agnese Gini, Pierrick Méaux
2023/494 (PDF ) Spartan and Bulletproofs are simulation-extractable (for free!) Quang Dao, Paul Grubbs
2023/493 (PDF ) Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU Tianxiang Dai, Li Duan, Yufan Jiang, Yong Li, Fei Mei, Yulian Sun
2023/492 (PDF ) Batch Signatures, Revisited Carlos Aguilar-Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano
2023/491 (PDF ) On the Security of Blind Signatures in the Multi-Signer Setting Samuel Bedassa Alemu, Julia Kastner
2023/490 (PDF ) Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2023/489 (PDF ) Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices Eric Sageloli, Pierre Pébereau, Pierrick Méaux, Céline Chevalier
2023/488 (PDF ) $k$-SUM in the Sparse Regime Shweta Agrawal, Sagnik Saha, Nikolaj Ignatieff Schwartzbach, Akhil Vanukuri, Prashant Nalini Vasudevan
2023/487 (PDF ) On the State of Crypto-Agility Nouri Alnahawi, Nicolai Schmitt, Alexander Wiesmaier, Andreas Heinemann, Tobias Grasmeyer
2023/486 (PDF ) Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin
2023/485 (PDF ) Practically-exploitable Cryptographic Vulnerabilities in Matrix Martin R. Albrecht, Sofía Celi, Benjamin Dowling, Daniel Jones
2023/484 (PDF ) SCA Evaluation and Benchmarking of Finalists in the NIST Lightweight Cryptography Standardization Process Kamyar Mohajerani, Luke Beckwith, Abubakr Abdulgadir, Eduardo Ferrufino, Jens-Peter Kaps, Kris Gaj
2023/483 (PDF ) Unbounded Predicate Inner Product Functional Encryption from Pairings Uddipana Dowerah, Subhranil Dutta, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal
2023/482 (PDF ) Homomorphic Trapdoors for Identity-based and Group Signatures Buvana Ganesh, Apurva Vangujar, Alia Umrani, Paolo Palmieri
2023/481 (PDF ) A Framework for UC Secure Privacy Preserving Biometric Authentication using Efficient Functional Encryption Johannes Ernst, Aikaterini Mitrokotsa
2023/480 (PDF ) Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications Adda-Akram Bendoukha, Oana Stan, Renaud Sirdey, Nicolas Quero, Luciano Freitas
2023/479 (PDF ) Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
2023/478 (PDF ) TENET : Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup Hyeonbum Lee, Jae Hong Seo
2023/477 (PDF ) Separations between simulation-based and simulation-free formulations of security for public key encryption Yodai Watanabe
2023/476 (PDF ) A private set intersection protocol based on multi-party quantum computation for greatest common divisor Muhammad Imran
2023/475 (PDF ) The Jacobi Symbol Problem for Quadratic Congruences and Applications to Cryptography Ferucio Laurențiu Țiplea
2023/474 (PDF ) eSTARK: Extending STARKs with Arguments Héctor Masip-Ardevol, Marc Guzmán-Albiol, Jordi Baylina-Melé, Jose Luis Muñoz-Tapia
2023/473 (PDF ) Owl: Compositional Verification of Security Protocols via an Information-Flow Type System Joshua Gancher, Sydney Gibson, Pratap Singh, Samvid Dharanikota, Bryan Parno
2023/472 (PDF ) Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL Roi Bar-Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar
2023/471 (PDF ) Compact Aggregate Signature from Module-Lattices Toi Tomita, Junji Shikata
2023/470 (PDF ) GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi
2023/469 (PDF ) Four Attacks and a Proof for Telegram Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs
2023/468 (PDF ) A new approach on IoT security: n-out-of-n Tuğberk KOCATEKİN, Cafer ÇALIŞKAN
2023/467 (PDF ) Secure Floating-Point Training Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song
2023/466 (PDF ) Don't be Dense: Efficient Keyword PIR for Sparse Databases Sarvar Patel, Joon Young Seo, Kevin Yeo
2023/465 (PDF ) RPU: The Ring Processing Unit Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Nabeel Thari Moopan, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew Schmidt, Brandon Reagen
2023/464 (PDF ) A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices Johannes Blömer, Jan Bobolz, Laurens Porzenheim
2023/463 (PDF ) Simplex Consensus: A Simple and Fast Consensus Protocol Benjamin Y Chan, Rafael Pass
2023/462 (PDF ) Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice Sebastian Hasler, Toomas Krips, Ralf Küsters, Pascal Reisert, Marc Rivinius
2023/461 (PDF ) Deep Learning based Differential Classifier of PRIDE and RC5 Debranjan Pal, Upasana Mandal, Abhijit Das, Dipanwita Roy Chowdhury
2023/460 (PDF ) A unified construction of weightwise perfectly balanced Boolean functions Qinglan Zhao, Mengran Li, Zhixiong Chen, Baodong Qin, Dong Zheng
2023/459 (PDF ) SCMA: Plaintext Classification Assisted Side Channel Spectral Modulation Attacks. Towards Noise-insensitive SCA Attacks... Moshe Avital, Itamar Levi
2023/458 (PDF ) Non-interactive Universal Arguments Nir Bitansky, Omer Paneth, Dana Shamir, Tomer Solomon
2023/457 (PDF ) Registered FE beyond Predicates: (Attribute-Based) Linear Functions and more Pratish Datta, Tapas Pal, Shota Yamada
2023/456 (PDF ) Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz
2023/455 (PDF ) Tri-State Circuits: A Circuit Model that Captures RAM David Heath, Vladimir Kolesnikov, Rafail Ostrovsky
2023/454 (PDF ) Wireless-channel Key Exchange Afonso Arriaga, Petra Sala, Marjan Škrobot
2023/453 (PDF ) An algebraic attack for forging signatures of MPPK/DS Hao Guo
2023/452 (PDF ) Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation Mingxun Zhou, Andrew Park, Elaine Shi, Wenting Zheng
2023/451 (PDF ) Non-interactive VSS using Class Groups and Application to DKG Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, Sri Aravinda Krishnan Thyagarajan
2023/450 (PDF ) Unlocking doors from half a continent away: A relay attack against HID Seos Sam Haskins, Trevor Stevado
2023/449 (PDF ) Multidimensional Approximate Agreement with Asynchronous Fallback Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer
2023/447 (PDF ) Provable Lattice Reduction of $\mathbb Z^n$ with Blocksize $n/2$ Léo Ducas
2023/446 (PDF ) Phoenix: Hash-and-Sign with Aborts from Lattice Gadgets Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders
2023/445 (PDF ) Fully Adaptive Schnorr Threshold Signatures Elizabeth Crites, Chelsea Komlo, Mary Maller
2023/444 (PDF ) Compact Bounded-Collusion Identity-based Encryption via Group Testing Shingo Sato, Junji Shikata
2023/443 (PDF ) Abstraction Model of Probing and DFA Attacks on Block Ciphers Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Sakiyama
2023/442 (PDF ) Non-interactive privacy-preserving naive Bayes classifier using homomorphic encryption Jingwei Chen, Yong Feng, Yang Liu, Wenyuan Wu, Guanci Yang
2023/441 (PDF ) Unconditionally secure ciphers with a short key for a source with unknown statistics Boris Ryabko
2023/440 (PDF ) On the Possibility of a Backdoor in the Micali-Schnorr Generator Hannah Davis, Matthew Green, Nadia Heninger, Keegan Ryan, Adam Suhl
2023/439 (PDF ) Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition Karim Eldefrawy, Sashidhar Jakkamsetti, Ben Terner, Moti Yung
2023/438 (PDF ) Minimal $p$-ary codes via the direct sum of functions, non-covering permutations and subspaces of derivatives René Rodríguez, Enes Pasalic, Fengrong Zhang, Yongzhuang Wei
2023/437 (PDF ) Interoperable Private Attribution: A Distributed Attribution and Aggregation Protocol Benjamin Case, Richa Jain, Alex Koshelev, Andy Leiserson, Daniel Masny, Thurston Sandberg, Ben Savage, Erik Taubeneck, Martin Thomson, Taiki Yamaguchi
2023/436 (PDF ) SQISignHD: New Dimensions in Cryptography Pierrick Dartois, Antonin Leroux, Damien Robert, Benjamin Wesolowski
2023/435 (PDF ) Optimal Security Notion for Decentralized Multi-Client Functional Encryption Ky Nguyen, Duong Hieu Phan, David Pointcheval
2023/434 (PDF ) The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada
2023/433 (PDF ) Efficiency of SIDH-based signatures (yes, SIDH) Wissam Ghantous, Federico Pintore, Mattia Veroni
2023/432 (PDF ) Practical key-recovery attack on MQ-Sign Thomas Aulbach, Simona Samardjiska, Monika Trimoska
2023/431 (PDF ) Ruffle: Rapid 3-party shuffle protocols Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
2023/430 (PDF ) QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen
2023/429 (PDF ) CPU to FPGA Power Covert Channel in FPGA-SoCs Mathieu Gross, Robert Kunzelmann, Georg Sigl
2023/428 (PDF ) Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory Yu Li, Li-Ping Wang
2023/427 (PDF ) SPRINT: High-Throughput Robust Distributed Schnorr Signatures Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Yiping Ma, Tal Rabin
2023/426 (PDF ) A Tightly Secure Identity-based Signature Scheme from Isogenies Hyungrok Jo, Shingo Sato, Junji Shikata
2023/425 (PDF ) Generic Construction of Dual-Server Public Key Authenticated Encryption with Keyword Search Keita Emura
2023/424 (PDF ) A Duality Between One-Way Functions and Average-Case Symmetry of Information Shuichi Hirahara, Rahul Ilango, Zhenjian Lu, Mikito Nanashima, Igor C. Oliveira
2023/423 (PDF ) A Note on Hybrid Signature Schemes Nina Bindel, Britta Hale
2023/422 (PDF ) A Differential Fault Attack against Deterministic Falcon Signatures Sven Bauer, Fabrizio De Santis
2023/421 (PDF ) Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation Islam Faisal
2023/420 (PDF ) Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger Laurane Marco, Abdullah Talayhan, Serge Vaudenay
2023/419 (PDF ) Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices Nick Frymann, Daniel Gardham, Mark Manulis
2023/418 (PDF ) The Round Complexity of Statistical MPC with Optimal Resiliency Benny Applebaum, Eliran Kachlon, Arpita Patra
2023/417 (PDF ) Multivariate Correlation Attacks and the Cryptanalysis of LFSR-based Stream Ciphers Isaac A. Canales-Martínez, Igor Semaev
2023/416 (PDF ) Single Instance Self-Masking via Permutations Asaf Cohen, Paweł Cyprys, Shlomi Dolev
2023/415 (PDF ) Maximally-Fluid MPC with Guaranteed Output Delivery Giovanni Deligios, Aarushi Goel, Chen-Da Liu-Zhang
2023/414 (PDF ) Post-Quantum Privacy Pass via Post-Quantum Anonymous Credentials Guru-Vamsi Policharla, Bas Westerbaan, Armando Faz-Hernández, Christopher A Wood
2023/413 (PDF ) Accelerating HE Operations from Key Decomposition Technique Miran Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song
2023/412 (PDF ) Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search Keita Emura
2023/411 (PDF ) An Overview of Hash Based Signatures Vikas Srivastava, Anubhab Baksi, Sumit Kumar Debnath
2023/410 (PDF ) Unbounded Leakage-Resilience and Intrusion-Detection in a Quantum World Alper Cakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro
2023/409 (PDF ) Multi-Instance Randomness Extraction and Security against Bounded-Storage Mass Surveillance Jiaxin Guan, Daniel Wichs, Mark Zhandry
2023/408 (PDF ) Machine-Checked Security for $\mathrm{XMSS}$ as in RFC 8391 and $\mathrm{SPHINCS}^{+}$ Manuel Barbosa, François Dupressoir, Benjamin Grégoire, Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub
2023/407 (PDF ) Game Theoretical Analysis of DAG-Ledgers Backbone Yackolley Amoussou-Guenou, Simone Galimberti, Maria Potop-Butucaru
2023/406 (PDF ) Quasi-linear masking to protect against both SCA and FIA Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier
2023/405 (PDF ) CaSCaDE: (Time-Based) Cryptography from Space Communications DElay Carsten Baum, Bernardo David, Elena Pagnin, Akira Takahashi
2023/404 (PDF ) Efficient Laconic Cryptography from Learning With Errors Nico Döttling, Dimitris Kolonelos, Russell W. F. Lai, Chuanwei Lin, Giulio Malavolta, Ahmadreza Rahimi
2023/403 (PDF ) Real-World Deniability in Messaging Daniel Collins, Simone Colombo, Loïs Huguenin-Dumittan
2023/402 (PDF ) Discretization Error Reduction for Torus Fully Homomorphic Encryption Kang Hoon Lee, Ji Won Yoon
2023/401 (PDF ) Generic Construction of Broadcast Authenticated Encryption with Keyword Search Keita Emura
2023/400 (PDF ) Prime Match: A Privacy-Preserving Inventory Matching System Antigoni Polychroniadou, Gilad Asharov, Benjamin Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso
2023/399 (PDF ) High Throughput Lattice-based Signatures on GPUs: Comparing Falcon and Mitaka Wai-Kong Lee, Raymond K. Zhao, Ron Steinfeld, Amin Sakzad, Seong Oun Hwang
2023/398 (PDF ) A New Linear Distinguisher for Four-Round AES Tomer Ashur, Erik Takke
2023/397 (PDF ) Extended Abstract: HotStuff-2: Optimal Two-Phase Responsive BFT Dahlia Malkhi, Kartik Nayak
2023/396 (PDF ) Monomial Isomorphism for Tensors and Applications to Code Equivalence Problems Giuseppe D'Alconzo
2023/395 (PDF ) Registered (Inner-Product) Functional Encryption Danilo Francati, Daniele Friolo, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Daniele Venturi
2023/394 (PDF ) Fork-Resilient Continuous Group Key Agreement Joël Alwen, Marta Mularczyk, Yiannis Tselekounis
2023/393 (PDF ) cqlin: Efficient linear operations on KZG commitments with cached quotients Liam Eagen, Ariel Gabizon
2023/392 (PDF ) Locally Covert Learning Justin Holmgren, Ruta Jawale
2023/391 (PDF ) Additional Modes for ASCON Rhys Weatherley
2023/390 (PDF ) Hashing to elliptic curves through Cipolla–Lehmer–Müller’s square root algorithm Dmitrii Koshelev
2023/389 (PDF ) TIDAL: Practical Collisions on State-Reduced Keccak Variants Sahiba Suryawanshi, Dhiman Saha, Shashwat jaiswal
2023/388 (PDF ) Non-Interactive Blind Signatures for Random Messages Lucjan Hanzlik
2023/387 (PDF ) Constrained Pseudorandom Functions from Homomorphic Secret Sharing Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia
2023/386 (PDF ) Interoperability in End-to-End Encrypted Messaging Julia Len, Esha Ghosh, Paul Grubbs, Paul Rösler
2023/385 (PDF ) Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem Marco Baldi, Sebastian Bitzer, Alessio Pavoni, Paolo Santini, Antonia Wachter-Zeh, Violetta Weger
2023/383 (PDF ) The Prospect of a New Cryptography: Extensive use of non-algorithmic randomness competes with mathematical complexity Gideon Samid
2023/382 (PDF ) On Homomorphic Secret Sharing from Polynomial-Modulus LWE Thomas Attema, Pedro Capitão, Lisa Kohl
2023/381 (PDF ) Nakamoto Consensus under Bounded Processing Capacity Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse
2023/380 (PDF ) Security Analysis of Signature Schemes with Key Blinding Edward Eaton, Tancrède Lepoint, Christopher A. Wood
2023/379 (PDF ) Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier
2023/378 (PDF ) SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller
2023/377 (PDF ) FuLeeca: A Lee-based Signature Scheme Stefan Ritterhoff, Georg Maringer, Sebastian Bitzer, Violetta Weger, Patrick Karl, Thomas Schamberger, Jonas Schupp, Antonia Wachter-Zeh
2023/376 (PDF ) Efficient computation of $(3^n,3^n)$-isogenies Thomas Decru, Sabrina Kunzweiler
2023/375 (PDF ) Accelerating exp-log based finite field multiplication Nicolas Belleville
2023/374 (PDF ) Practical-Time Related-Key Attack on GOST with Secret S-boxes Orr Dunkelman, Nathan Keller, Ariel Weizman
2023/373 (PDF ) Consensus Algorithm Using Transaction History for Cryptocurrency Yuuki Komi, Takayuki Tatekawa
2023/372 (PDF ) Practically Solving LPN in High Noise Regimes Faster Using Neural Networks Haozhe Jiang, Kaiyue Wen, Yilei Chen
2023/371 (PDF ) PACIFIC: Privacy-preserving automated contact tracing scheme featuring integrity against cloning Scott Griffy, Anna Lysyanskaya
2023/370 (PDF ) Publicly-Verifiable Deletion via Target-Collapsing Functions James Bartusek, Dakshita Khurana, Alexander Poremba
2023/369 (PDF ) LURK: Lambda, the Ultimate Recursive Knowledge Nada Amin, John Burnham, François Garillot, Rosario Gennaro, Chhi'mèd Künzang, Daniel Rogozin, Cameron Wong
2023/368 (PDF ) AI Attacks AI: Recovering Neural Network architecture from NVDLA using AI-assisted Side Channel Attack Naina Gupta, Arpan Jati, Anupam Chattopadhyay
2023/367 (PDF ) Practical Attacks on Small Private Exponent RSA: New Records and New Insights Qiang Li, Qun-xiong Zheng, Wen-feng Qi
2023/366 (PDF ) Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide
2023/365 (PDF ) Verifiable encodings in multigroup fully homomorphic encryption Ramsès Fernàndez-València
2023/364 (PDF ) Zero-Knowledge Arguments for Subverted RSA Groups Dimitris Kolonelos, Mary Maller, Mikhail Volkhov
2023/363 (PDF ) Composable Long-Term Security with Rewinding Robin Berger, Brandon Broadnax, Michael Klooß, Jeremias Mechler, Jörn Müller-Quade, Astrid Ottenhues, Markus Raiber
2023/362 (PDF ) Protecting Quantum Procrastinators with Signature Lifting: A Case Study in Cryptocurrencies Or Sattath, Shai Wyborski
2023/361 (PDF ) Authenticated Encryption for Very Short Inputs Alexandre Adomnicai, Kazuhiko Minematsu, Junji Shikata
2023/359 (PDF ) Convolutions in Overdrive: Maliciously Secure Convolutions for MPC Marc Rivinius, Pascal Reisert, Sebastian Hasler, Ralf Kuesters
2023/356 (PDF ) Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication! Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada
2023/354 (PDF ) Guessing Less and Better: Improved Attacks on GIFT-64 Federico Canale, María Naya-Plasencia
2023/353 (PDF ) Searching for S-boxes with better Diffusion using Evolutionary Algorithm Rahul Mishra, Bhupendra Singh, Radhakrishnan Delhibabu
2023/352 (PDF ) Post-Quantum Security for the Extended Access Control Protocol Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock
2023/351 (PDF ) Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from DLP or LWE Yoshinori Aono, Junji Shikata
2023/350 (PDF ) Weighted Oblivious RAM, with Applications to Searchable Symmetric Encryption Leonard Assouline, Brice Minaud
2023/348 (PDF ) Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski
2023/347 (PDF ) Programmable Payment Channels Yibin Yang, Mohsen Minaei, Srinivasan Raghuraman, Ranjit Kumaresan, Duc V. Le, Mahdi Zamani
2023/346 (PDF ) How to achieve bidirectional zero-knowledge authentication? Jin Li, Xingyu Li, Chang Chen, Guoyu Yang, Junyang Li, Qi Chen, Hongyang Yan
2023/345 (PDF ) Encryption with Quantum Public Keys Alex B. Grilo, Or Sattath, Quoc-Huy Vu
2023/344 (PDF ) Quantum Search-to-Decision Reduction for the LWE Problem Kyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida
2023/343 (PDF ) A Map of Witness Maps: New Definitions and Connections Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs
2023/342 (PDF ) TurboSHAKE Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier
2023/341 (PDF ) On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Benjamin Livshits, Arthur Gervais
2023/340 (PDF ) SALSA PICANTE: a machine learning attack on LWE with binary secrets Cathy Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, Kristin Lauter
2023/339 (PDF ) An Analysis of the Post Quantum and Classical Security of 4x4 and 16x4 S-Boxes and Their Implementations in Simplified-AES Christopher Dunne
2023/338 (PDF ) Shield: Secure Allegation Escrow System with Stronger Guarantees Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2023/337 (PDF ) Quantum Implementation of AIM: Aiming for Low-Depth Kyungbae Jang, Dukyoung Kim, Yujin Oh, Sejin Lim, Yujin Yang, Hyunji Kim, Hwajeong Seo
2023/336 (PDF ) A Novel Approach to e-Voting with Group Identity Based Identification and Homomorphic Encryption Apurva K Vangujar, Buvana Ganesh, Alia Umrani, Paolo Palmieri
2023/335 (PDF ) Separating Oil and Vinegar with a Single Trace Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger
2023/334 (PDF ) A Generic Transform from Multi-Round Interactive Proof to NIZK Pierre-Alain Fouque, Adela Georgescu, Chen Qian, Adeline Roux-Langlois, Weiqiang Wen
2023/333 (PDF ) Secret Sharing Scheme with Perfect Concealment Izumi Takeuti, Tomoko Adachi
2023/332 (PDF ) Asymmetric Group Message Franking: Definitions & Constructions Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng
2023/331 (PDF ) A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms Nicky Mouha, Christopher Celi
2023/330 (PDF ) Perfect MPC over Layered Graphs Bernardo David, Yuval Ishai, Anders Konring, Eyal Kushilevitz, Varun Narayanan
2023/329 (PDF ) Caveat Implementor! Key Recovery Attacks on MEGA Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson
2023/328 (PDF ) The state diagram of $\chi$ Jan Schoone, Joan Daemen
2023/326 (PDF ) A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality Jean Liénardy, Frédéric Lafitte
2023/325 (PDF ) Revocable Cryptography from Learning with Errors Prabhanjan Ananth, Alexander Poremba, Vinod Vaikuntanathan
2023/324 (PDF ) LATKE: A Framework for Constructing Identity-Binding PAKEs Jonathan Katz, Michael Rosenberg
2023/323 (PDF ) Poseidon2: A Faster Version of the Poseidon Hash Function Lorenzo Grassi, Dmitry Khovratovich, Markus Schofnegger
2023/322 (PDF ) Differential Fault Attack on Rasta and $\text {FiLIP} _ {\text {DSM}}$ R Radheshwar, Meenakshi Kansal, Pierrick Méaux, Dibyendu Roy
2023/321 (PDF ) A Holistic Security Analysis of Monero Transactions Cas Cremers, Julian Loss, Benedikt Wagner
2023/320 (PDF ) Anonymous Counting Tokens Fabrice Benhamouda, Mariana Raykova, Karn Seth
2023/319 (PDF ) A Sharding-Based Approach for Enhancing Efficiency in ISSDOs for Sharing Scattered Values Reza Ghasemi
2023/318 (PDF ) A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography Danilo Gligoroski
2023/317 (PDF ) The special case of cyclotomic fields in quantum algorithms for unit groups Razvan Barbulescu, Adrien Poulalion
2023/316 (PDF ) New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Ting Cui, Tairong Shi, Kai Zhang
2023/315 (PDF ) SoK on Blockchain Evolution and a Taxonomy for Public Blockchain Generations Thuat Do
2023/314 (PDF ) Memory-Tight Multi-Challenge Security of Public-Key Encryption Joseph Jaeger, Akshaya Kumar
2023/313 (PDF ) SoK: Metadata-Protecting Communication Systems Sajin Sasy, Ian Goldberg
2023/312 (PDF ) BIP32-Compatible Threshold Wallets Poulami Das, Andreas Erwig, Sebastian Faust, Philipp-Florens Lehwalder, Julian Loss, Ziyan Qu, Siavash Riahi
2023/311 (PDF ) Oblivious Transfer from Zero-Knowledge Proofs, or How to Achieve Round-Optimal Quantum Oblivious Transfer and Zero-Knowledge Proofs on Quantum States Léo Colisson, Garazi Muguruza, Florian Speelman
2023/310 (PDF ) Ramen: Souper Fast Three-Party Computation for RAM Programs Lennart Braun, Mahak Pancholi, Rahul Rachuri, Mark Simkin
2023/309 (PDF ) Practical Construction for Secure Trick-Taking Games Even With Cards Set Aside Rohann Bella, Xavier Bultel, Céline Chevalier, Pascal Lafourcade, Charles Olivier-Anclin
2023/308 (PDF ) Punctured Syndrome Decoding Problem Efficient Side-Channel Attacks Against Classic McEliece Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi
2023/307 (PDF ) SUPERPACK: Dishonest Majority MPC with Constant Online Communication Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song, Chenkai Weng
2023/306 (PDF ) A Simple Construction of Quantum Public-Key Encryption from Quantum-Secure One-Way Functions Khashayar Barooti, Giulio Malavolta, Michael Walter
2023/305 (PDF ) A Novel Related Nonce Attack for ECDSA Marco Macchetti
2023/304 (PDF ) On homomorphic encryption using abelian groups: Classical security analysis Eleni Agathocleous, Vishnupriya Anupindi, Annette Bachmayr, Chloe Martindale, Rahinatou Yuh Njah Nchiwo, Mima Stanojkovski
2023/303 (PDF ) Fusion One-Time Non-Interactively-Aggregatable Digital Signatures From Lattices Brandon Goodell, Aaron Feickert
2023/302 (PDF ) Does the Dual-Sieve Attack on Learning with Errors even Work? Léo Ducas, Ludo Pulles
2023/301 (PDF ) On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption Kamil Kluczniak, Giacomo Santato
2023/300 (PDF ) CNF Characterization of Sets over $\mathbb{Z}_2^n$ and Its Applications in Cryptography Hu Xiaobo, Xu Shengyuan, Tu Yinzi, Feng Xiutao
2023/299 (PDF ) Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE Yonglin Hao, Qingju Wang, Lin Jiao, Xinxin Gong
2023/298 (PDF ) Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA Mihir Bellare, Hannah Davis, Zijing Di
2023/297 (PDF ) Authenticated private information retrieval Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford
2023/296 (PDF ) OpenPubkey: Augmenting OpenID Connect with User held Signing Keys Ethan Heilman, Lucie Mugnier, Athanasios Filippidis, Sharon Goldberg, Sebastien Lipman, Yuval Marcus, Mike Milano, Sidhartha Premkumar, Chad Unrein, John Merfeld
2023/295 (PDF ) Randomized Half-Ideal Cipher on Groups with applications to UC (a)PAKE Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki
2023/294 (PDF ) SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes Qian Guo, Denis Nabokov, Alexander Nilsson, Thomas Johansson
2023/293 (PDF ) Searching for Gemstones: Flawed Stegosystems May Hide Promissing Ideas Diana Maimut, Evgnosia-Alexandra Kelesidis, Ilona Teodora Ciocan
2023/292 (PDF ) A Formal Treatment of Distributed Key Generation, and New Constructions Chelsea Komlo, Ian Goldberg, Douglas Stebila
2023/291 (PDF ) PEO-Store: Practical and Economical Oblivious Store with Peer-to-Peer Delegation Wenlong Tian, Jian Guo, Zhiyong Xu, Ruixuan Li, Weijun Xiao
2023/290 (PDF ) Improved Key Pair Generation for Falcon, BAT and Hawk Thomas Pornin
2023/289 (PDF ) Lower Bounds for Secret-Sharing Schemes for k-Hypergraphs Amos Beimel
2023/288 (PDF ) Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2023/287 (PDF ) Modelling Delay-based Physically Unclonable Functions through Particle Swarm Optimization Nimish Mishra, Kuheli Pratihar, Anirban Chakraborty, Debdeep Mukhopadhyay
2023/286 (PDF ) DORCIS: Depth Optimized Quantum Implementation of Substitution Boxes Matthew Chun, Anubhab Baksi, Anupam Chattopadhyay
2023/285 (PDF ) New Records in Collision Attacks on RIPEMD-160 and SHA-256 Yingxin Li, Fukang Liu, Gaoli Wang
2023/284 (PDF ) Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data Somnath Panja, Nikita Tripathi, Shaoquan Jiang, Reihaneh Safavi-Naini
2023/283 (PDF ) Maximizing Miner Revenue in Transaction Fee Mechanism Design Ke Wu, Elaine Shi, Hao Chung
2023/282 (PDF ) Quantum trapdoor functions from classical one-way functions Andrea Coladangelo
2023/281 (PDF ) Towards A Correct-by-Construction FHE Model Zhenkun Yang, Wen Wang, Jeremy Casas, Pasquale Cocchini, Jin Yang
2023/280 (PDF ) A Simple Single Slot Finality Protocol For Ethereum Francesco D'Amato, Luca Zanolini
2023/279 (PDF ) Recent Latest Message Driven GHOST: Balancing Dynamic Availability With Asynchrony Resilience Francesco D'Amato, Luca Zanolini
2023/278 (PDF ) Actively Secure Half-Gates with Minimum Overhead under Duplex Networks Hongrui Cui, Xiao Wang, Kang Yang, Yu Yu
2023/277 (PDF ) Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe
2023/276 (PDF ) Threshold and Multi-Signature Schemes from Linear Hash Functions Stefano Tessaro, Chenzhi Zhu
2023/275 (PDF ) Revisiting BBS Signatures Stefano Tessaro, Chenzhi Zhu
2023/274 (PDF ) Panacea: Non-interactive and Stateless Oblivious RAM Kelong Cong, Debajyoti Das, Georgio Nicolas, Jeongeun Park
2023/273 (PDF ) Derecho: Privacy Pools with Proof-Carrying Disclosures Josh Beal, Ben Fisch
2023/272 (PDF ) A study of KEM generalizations Bertram Poettering, Simon Rastikian
2023/271 (PDF ) Swoosh: Efficient Lattice-Based Non-Interactive Key Exchange Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe
2023/270 (PDF ) Actively Secure Arithmetic Computation and VOLE with Constant Computational Overhead Benny Applebaum, Niv Konstantini
2023/269 (PDF ) Simple Two-Round OT in the Explicit Isogeny Model Emmanuela Orsini, Riccardo Zanotto
2023/268 (PDF ) Verifiable Decentralized Multi-Client Functional Encryption for Inner Product Dinh Duy Nguyen, Duong Hieu Phan, David Pointcheval
2023/267 (PDF ) Proteus: A Pipelined NTT Architecture Generator Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy
2023/266 (PDF ) Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments Panos Kampanakis, Tancrède Lepoint
2023/265 (PDF ) Software with Certified Deletion James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta, Justin Raizes, Bhaskar Roberts
2023/264 (PDF ) Public Key Encryption with Secure Key Leasing Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2023/263 (PDF ) DualMS: Efficient Lattice-Based Two-Round Multi-Signature with Trapdoor-Free Simulation Yanbo Chen
2023/262 (PDF ) Generic Attack on Duplex-Based AEAD Modes using Random Function Statistics Henri Gilbert, Rachelle Heim Boissier, Louiza Khati, Yann Rotella
2023/261 (PDF ) A Greedy Global Framework for Lattice Reduction Using Deep Insertions Sanjay Bhattacherjee, Julio Hernandez-Castro, Jack Moyler
2023/260 (PDF ) Webb Protocol: A cross-chain private application and governance protocol. Drew Stone
2023/259 (PDF ) A MIQCP-Based Automatic Search Algorithm for Differential-Linear Trails of ARX Ciphers(Long Paper) Guangqiu Lv, Chenhui Jin, Ting Cui
2023/258 (PDF ) Privacy-Preserving Tree-Based Inference with Fully Homomorphic Encryption Jordan Frery, Andrei Stoian, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoit Chevallier-Mames, Arthur Meyre
2023/257 (PDF ) Deep Neural Networks for Encrypted Inference with TFHE Andrei Stoian, Jordan Frery, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoit Chevallier-Mames
2023/256 (PDF ) Traitor Tracing with N^(1/3)-size Ciphertexts and O(1)-size Keys from k-Lin Junqing Gong, Ji Luo, Hoeteck Wee
2023/255 (PDF ) Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY Danping Shi, Siwei Sun, Ling Song, Lei Hu, Qianqian Yang
2023/254 (PDF ) Mitigating Decentralized Finance Liquidations with Reversible Call Options Kaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais
2023/253 (PDF ) XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version) Zhenzhen Bao, Seongha Hwang, Akiko Inoue, Byeonghak Lee, Jooyoung Lee, Kazuhiko Minematsu
2023/252 (PDF ) Obfuscation of Pseudo-Deterministic Quantum Circuits James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2023/251 (PDF ) Hardware Root-of-Trust implementations in Trusted Execution Environments Usman Ali, Hamza Omar, Chujiao Ma, Vaibhav Garg, Omer Khan
2023/250 (PDF ) A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies Dan Boneh, Jiaxin Guan, Mark Zhandry
2023/249 (PDF ) Anamorphic Encryption, Revisited Fabio Banfi, Konstantin Gegier, Martin Hirt, Ueli Maurer, Guilherme Rito
2023/248 (PDF ) Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging Paul Rösler, Daniel Slamanig, Christoph Striecks
2023/247 (PDF ) A New Sieving-Style Information-Set Decoding Algorithm Qian Guo, Thomas Johansson, Vu Nguyen
2023/246 (PDF ) Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium Manuel Barbosa, Gilles Barthe, Christian Doczkal, Jelle Don, Serge Fehr, Benjamin Grégoire, Yu-Hsuan Huang, Andreas Hülsing, Yi Lee, Xiaodi Wu
2023/245 (PDF ) A Detailed Analysis of Fiat-Shamir with Aborts Julien Devevey, Pouria Fallahpour, Alain Passelègue, Damien Stehlé, Keita Xagawa
2023/244 (PDF ) Semi-Quantum Copy-Protection and More Céline Chevalier, Paul Hermouet, Quoc-Huy Vu
2023/243 (PDF ) Memory-Efficient Attacks on Small LWE Keys Andre Esser, Arindam Mukherjee, Santanu Sarkar
2023/242 (PDF ) The propagation game: on simulatability, correlation matrices, and probing security Vittorio Zaccaria
2023/241 (PDF ) Lynx: Family of Lightweight Authenticated Encryption Schemes based on Tweakable Blockcipher Munawar Hasan, Donghoon Chang
2023/240 (PDF ) Pitfalls and Shortcomings for Decompositions and Alignment (Full Version) Baptiste Lambin, Gregor Leander, Patrick Neumann
2023/238 (PDF ) Certifying Giant Nonprimes Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Krzysztof Pietrzak
2023/237 (PDF ) Fast Practical Lattice Reduction through Iterated Compression Keegan Ryan, Nadia Heninger
2023/236 (PDF ) Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More Taiga Hiroka, Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Tapas Pal, Takashi Yamakawa
2023/235 (PDF ) New Results on Machine Learning Based Distinguishers Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaolu Hou, Hyunji Kim, Hwajeong Seo
2023/234 (PDF ) Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness Rupeng Yang
2023/233 (PDF ) Complete Characterization of Broadcast and Pseudo-Signatures from Correlations Varun Narayanan, Vinod M. Prabhakaran, Neha Sangwan, Shun Watanabe
2023/232 (PDF ) Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and FHE Martin R. Albrecht, Alex Davidson, Amit Deo, Daniel Gardham
2023/231 (PDF ) One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations Mostefa Kara, Abdelkader Laouid, Omer Al dabbas, Mohammad Hammoudeh, Ahcène Bounceur
2023/230 (PDF ) Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM Orr Dunkelman, Shibam Ghosh, Eran Lambooij
2023/229 (PDF ) One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More Fuyuki Kitagawa, Ryo Nishimaki
2023/228 (PDF ) Authenticated Continuous Key Agreement: Active MitM Detection and Prevention Benjamin Dowling, Britta Hale
2023/227 (PDF ) A Novel Automatic Technique Based on MILP to Search for Impossible Differentials Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang, Xiangyong Zeng
2023/226 (PDF ) Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls Chun Guo, Lei Wang, Dongdai Lin
2023/225 (PDF ) A Post-Quantum Round-Optimal Oblivious PRF from Isogenies Andrea Basso
2023/224 (PDF ) Improved Power Analysis Attacks on Falcon Shiduo Zhang, Xiuhan Lin, Yang Yu, Weijia Wang
2023/223 (PDF ) Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability Chris Peikert, Jiayu Xu
2023/222 (PDF ) A Lightweight Identification Protocol Based on Lattices Samed Düzlü, Juliane Krämer, Thomas Pöppelmann, Patrick Struck
2023/221 (PDF ) Bicorn: An optimistically efficient distributed randomness beacon Kevin Choi, Arasu Arun, Nirvan Tyagi, Joseph Bonneau
2023/220 (PDF ) Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood
2023/219 (PDF ) Sieving for large twin smooth integers using single solutions to Prouhet-Tarry-Escott Knud Ahrens
2023/218 (PDF ) On the Post-Quantum Security of Classical Authenticated Encryption Schemes Nathalie Lang, Stefan Lucks
2023/217 (PDF ) Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks Charlotte Lefevre
2023/216 (PDF ) Two-Round Stateless Deterministic Two-Party Schnorr Signatures From Pseudorandom Correlation Functions Yashvanth Kondi, Claudio Orlandi, Lawrence Roy
2023/215 (PDF ) Formally verifying Kyber Episode IV: Implementation Correctness José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Antoine Séré, Pierre-Yves Strub
2023/214 (PDF ) DIPSAUCE: Efficient Private Stream Aggregation Without Trusted Parties Joakim Brorsson, Martin Gunnarsson
2023/213 (PDF ) Deniable Authentication when Signing Keys Leak Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, Guilherme Rito
2023/212 (PDF ) Generating Secure Hardware using ChatGPT Resistant to CWEs Madhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay
2023/211 (PDF ) Improved Low-depth SHA3 Quantum Circuit for Fault-tolerant Quantum Computers Gyeongju Song, Kyungbae Jang, Hwajeong Seo
2023/210 (PDF ) New Generic Constructions of Error-Correcting PIR and Efficient Instantiations Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2023/209 (PDF ) Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext Lichao Wu, Guilherme Perin, Stjepan Picek
2023/208 (PDF ) zkTree: A Zero-Knowledge Recursion Tree with ZKP Membership Proofs Sai Deng, Bo Du
2023/207 (PDF ) On Quantum Secure Compressing Pseudorandom Functions Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, Ashwin Jha
2023/206 (PDF ) Orca: FSS-based Secure Training and Inference with GPUs Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, Rahul Sharma
2023/205 (PDF ) DEFending Integrated Circuit Layouts Jitendra Bhandari, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel, Ramesh Karri
2023/204 (PDF ) TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH Arthur Lazzaretti, Charalampos Papamanthou
2023/203 (PDF ) A Different Base Approach for Better Efficiency on Range Proofs Esra Günsay, Cansu Betin Onur, Murat Cenk
2023/202 (PDF ) SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper) Dachao Wang, Baocang Wang, Siwei Sun
2023/201 (PDF ) DenseQMC: an efficient bit-slice implementation of the Quine-McCluskey algorithm Aleksei Udovenko
2023/200 (PDF ) Classical and quantum 3 and 4-sieves to solve SVP with low memory Johanna Loyer, André Chailloux
2023/199 (PDF ) MixFlow: Assessing Mixnets Anonymity with Contrastive Architectures and Semantic Network Information Reyhane Attarian, Esfandiar Mohammadi, Tao Wang, Emad Heydari Beni
2023/198 (PDF ) Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive Assumptions Jiaxin Pan, Benedikt Wagner
2023/197 (PDF ) Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle Attacks Mihir Bellare, Laura Shea
2023/196 (PDF ) On Two Factors Affecting the Efficiency of MILP Models in Automated Cryptanalyses Shengyuan Xu, Xiutao Feng, Yongxing Wang
2023/195 (PDF ) A simpler alternative to Lucas–Lehmer–Riesel primality test Pavel Atnashev
2023/194 (PDF ) Hull Attacks on the Lattice Isomorphism Problem Léo Ducas, Shane Gibbons
2023/193 (PDF ) Traceable Policy-Based Signatures with Delegation Ismail Afia, Riham AlTawy
2023/192 (PDF ) Faithful Simulation of Randomized BFT Protocols on Block DAGs Hagit Attiya, Constantin Enea, Shafik Nassar
2023/191 (PDF ) Beyond the Blockchain Address: Zero-Knowledge Address Abstraction Sanghyeon Park, Jeong Hyuk Lee, Seunghwa Lee, Jung Hyun Chun, Hyeonmyeong Cho, MinGi Kim, Hyun Ki Cho, Soo-Mook Moon
2023/190 (PDF ) Practical Security Analysis of Zero-Knowledge Proof Circuits Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, Yu Feng
2023/189 (PDF ) tlock: Practical Timelock Encryption from Threshold BLS Nicolas Gailly, Kelsey Melissaris, Yolan Romailler
2023/188 (PDF ) Cryptanalysis of a key agreement scheme using determinants and rectangular matrices Daniel R. L. Brown
2023/187 (PDF ) Towards Modular Foundations for Protocol Security Lúcás Críostóir Meier
2023/186 (PDF ) Generic Models for Group Actions Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel
2023/185 (PDF ) The Last Yard: Foundational End-to-End Verification of High-Speed Cryptography Philipp G. Haselwarter, Benjamin Salling Hvass, Lasse Letager Hansen, Théo Winterhalter, Catalin Hritcu, Bas Spitters
2023/184 (PDF ) Quantum Linear Key-recovery Attacks Using the QFT André Schrottenloher
2023/183 (PDF ) Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality Mario Larangeira, Maxim Jourenko
2023/182 (PDF ) CAPYBARA and TSUBAKI: Verifiable Random Functions from Group Actions and Isogenies Yi-Fu Lai
2023/181 (PDF ) Fully Automated Differential-Linear Attacks against ARX Ciphers Emanuele Bellini, David Gerault, Juan Grados, Rusydi Makarim, Thomas Peyrin
2023/180 (PDF ) Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys Jinpeng Hou, Yansong Gao, Anmin Fu, Jie Chen, Xiaofeng Chen, Yuqing Zhang, Willy Susilo, Josef Pieprzyk
2023/179 (PDF ) TS-Hash: a lightweight cryptographic hash family based on Galois LFSRs Itay Bookstein, Boaz Tsaban
2023/178 (PDF ) Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers Siwei Chen, Mingming Zhu, Zejun Xiang, Runqing Xu, Xiangyong Zeng, Shasha Zhang
2023/177 (PDF ) The geometric interpretation of the Tate pairing and its applications Damien Robert
2023/176 (PDF ) A New Algebraic Approach to the Regular Syndrome Decoding Problem and Implications for PCG Constructions Pierre Briaud, Morten Øygarden
2023/175 (PDF ) Linear codes of Schubert type and quadratic public keys of Multivariate Cryptography Vasyl Ustimenko
2023/174 (PDF ) Improved Heuristics for Low-latency Implementations of Linear Layers Qun Liu, Zheng Zhao, Meiqin Wang
2023/173 (PDF ) Degree-$D$ Reverse Multiplication-Friendly Embeddings: Constructions and Applications Daniel Escudero, Cheng Hong, Hongqing Liu, Chaoping Xing, Chen Yuan
2023/172 (PDF ) Impossibility of Efficient Information-Theoretic Fuzzy Extraction Benjamin Fuller
2023/171 (PDF ) On Differential Privacy and Adaptive Data Analysis with Bounded Space Itai Dinur, Uri Stemmer, David P. Woodruff, Samson Zhou
2023/170 (PDF ) EKE Meets Tight Security in the Universally Composable Framework Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu
2023/169 (PDF ) Reputation-based state machine replication Muhong Huang, Runchao Han, Zhiqiang Du, Yanfang Fu, Liangxin Liu
2023/168 (PDF ) Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4 Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani, Lubjana Beshaj
2023/167 (PDF ) Modular Design of KEM-Based Authenticated Key Exchange Colin Boyd, Bor de Kock, Lise Millerjord
2023/166 (PDF ) Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption Brice Minaud, Michael Reichle
2023/165 (PDF ) Optimizing the depth of quantum implementations of linear layers Chengkai Zhu, Zhenyu Huang
2023/164 (PDF ) Fast Zero-Knowledge Argument System with Short Polynomial Using Direct Computation Frank Y.C. Lu
2023/163 (PDF ) Hardware-Software Co-design for Side-Channel Protected Neural Network Inference Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu
2023/162 (PDF ) AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE Wei Ao, Vishnu Naresh Boddeti
2023/161 (PDF ) Quantum Advantage from One-Way Functions Tomoyuki Morimae, Takashi Yamakawa
2023/160 (PDF ) Improving Gaudry-Schost algorithm for multi-dimensional discrete logarithm calculations: Implementations relevant to electronic voting and cash schemes Madhurima Mukhopadhyay
2023/159 (PDF ) Sequential Half-Aggregation of Lattice-Based Signatures Katharina Boudgoust, Akira Takahashi
2023/158 (PDF ) Enabling FrodoKEM on Embedded Devices Joppe W. Bos, Olivier Bronchain, Frank Custers, Joost Renes, Denise Verbakel, Christine van Vredendaal
2023/157 (PDF ) A Key-Recovery Attack against Mitaka in the t-Probing Model Thomas Prest
2023/156 (PDF ) Zero-Knowledge Functional Elementary Databases Xinxuan Zhang, Yi Deng
2023/155 (PDF ) More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo Ohta
2023/154 (PDF ) FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time Sisi Duan, Xin Wang, Haibin Zhang
2023/153 (PDF ) Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model Shuai Han, Shengli Liu, Dawu Gu
2023/152 (PDF ) Almost Tightly-Secure Re-Randomizable and Replayable CCA-secure Public Key Encryption Antonio Faonio, Dennis Hofheinz, Luigi Russo
2023/151 (PDF ) Analysis of the XSL Attack Coteanu Maria Gabriela, Țîflea Denisa-Ionela
2023/150 (PDF ) More Efficient Zero-Knowledge Protocols over $\mathbb{Z}_{2^k}$ via Galois Rings Fuchun Lin, Chaoping Xing, Yizhou Yao
2023/149 (PDF ) Demystifying Bootstrapping in Fully Homomorphic Encryption Ahmad Al Badawi, Yuriy Polyakov
2023/148 (PDF ) PassPro: A Secure Password-based Authentication Mechanism using SHF Ripon Patgiri, Laiphrakpam Dolendro Singh
2023/147 (PDF ) Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model) Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
2023/146 (PDF ) Optimized Quantum Implementation of AES Da Lin, Zejun Xiang, Runqing Xu, Shasha Zhang, Xiangyong Zeng
2023/145 (PDF ) Combining MILP Modeling with Algebraic Bias Evaluation for Linear Mask Search: Improved Fast Correlation Attacks on SNOW Xinxin Gong, Yonglin Hao, Qingju Wang
2023/144 (PDF ) Aegis: Privacy-Preserving Market for Non-Fungible Tokens Hisham S. Galal, Amr M. Youssef
2023/143 (PDF ) A Practical Compiler for Attribute-Based Encryption: New Decentralized Constructions and More Marloes Venema
2023/142 (PDF ) On the Feasibility of Single-Trace Attacks on the Gaussian Sampler using a CDT Soundes Marzougui, Ievgan Kabin, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert
2023/141 (PDF ) A Secure Bandwidth-Efficient Treatment for Dropout-Resistant Time-Series Data Aggregation Reyhaneh Rabaninejad, Alexandros Bakas, Eugene Frimpong, Antonis Michalas
2023/140 (PDF ) Improving Convergence and Practicality of Slide-type Reductions Jianwei Li, Michael Walter
2023/139 (PDF ) Improved Estimation of Key Enumeration with Applications to Solving LWE Alessandro Budroni, Erik Mårtensson
2023/138 (PDF ) Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures Chloé Hébant, David Pointcheval, Robert Schädlich
2023/137 (PDF ) PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials Joakim Brorsson, Bernardo David, Lorenzo Gentile, Elena Pagnin, Paul Stankovski Wagner
2023/136 (PDF ) Compressed M-SIDH: An Instance of Compressed SIDH-like Schemes with Isogenies of Highly Composite Degrees Kaizhan Lin, Jianming Lin, Shiping Cai, Weize Wang, Chang-An Zhao
2023/135 (PDF ) Uncovering Vulnerabilities in Smartphone Cryptography: A Timing Analysis of the Bouncy Castle RSA Implementation Sarani Bhattacharya, Dilip Kumar Shanmugasundaram Veeraraghavan, Shivam Bhasin, Debdeep Mukhopadhyay
2023/134 (PDF ) Cryptanalysis of Reduced Round ChaCha- New Attack and Deeper Analysis Sabyasachi Dey, Hirendra Kumar Garai, Subhamoy Maitra
2023/133 (PDF ) Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Dhrubajyoti Ghosh, Peeyush Gupta
2023/132 (PDF ) Security analysis of DBTRU cryptosystem Alexandra Ciobanu, Marina Stefiuc
2023/130 (PDF ) Verifiable Distributed Aggregation Functions Hannah Davis, Christopher Patton, Mike Rosulek, Phillipp Schoppmann
2023/129 (PDF ) A Lower Bound on the Share Size in Evolving Secret Sharing Noam Mazor
2023/128 (PDF ) Cloning Games: A General Framework for Unclonable Primitives Prabhanjan Ananth, Fatih Kaleoglu, Qipeng Liu
2023/127 (PDF ) Sender-binding Key Encapsulation Rebecca Schwerdt, Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Jörn Müller-Quade, Astrid Ottenhues
2023/126 (PDF ) Privacy-Preserving Payment System With Verifiable Local Differential Privacy Danielle Movsowitz Davidow, Yacov Manevich, Eran Toch
2023/125 (PDF ) Ransomware data recovery techniques Irimia Alexandru-Vasile
2023/124 (PDF ) Security of Ethereum Layer 2s Ionuț Roșca, Alexandra-Ina Butnaru, Emil Simion
2023/123 (PDF ) A way of decrypting particular malware payloads found in MZPE files Tudorică Radu, Rares Radu, Emil Simion
2023/122 (PDF ) SoK: Privacy-Enhancing Technologies in Finance Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen
2023/121 (PDF ) Hashing to elliptic curves over highly $2$-adic fields $\mathbb{F}_{\!q}$ with $O(\log(q))$ operations in $\mathbb{F}_{\!q}$ Dmitrii Koshelev
2023/120 (PDF ) X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts Adam Caulfield, Nabiha Raza, Peizhao Hu
2023/119 (PDF ) Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant Locality Akin Ünal
2023/118 (PDF ) A New Generic Fault Resistant Masking Scheme using Error-Correcting Codes Chloé Gravouil
2023/117 (PDF ) Full-Round Differential Attack on ULC and LICID Block Ciphers Designed for IoT Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey
2023/116 (PDF ) A Cryptographic Layer for the Interoperability of CBDC and Cryptocurrency Ledgers Diego Castejon-Molina, Alberto del Amo Pastelero, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez
2023/115 (PDF ) Multi-User CDH Problems and the Concrete Security of NAXOS and HMQV Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud
2023/114 (PDF ) Credible, Optimal Auctions via Blockchains Tarun Chitra, Matheus V. X. Ferreira, Kshitij Kulkarni
2023/113 (PDF ) Homomorphic Sortition – Single Secret Leader Election for PoS Blockchains Luciano Freitas, Andrei Tonkikh, Adda-Akram Bendoukha, Sara Tucci-Piergiovanni, Renaud Sirdey, Oana Stan, Petr Kuznetsov
2023/112 (PDF ) Faster Amortized FHEW bootstrapping using Ring Automorphisms Gabrielle De Micheli, Duhyeong Kim, Daniele Micciancio, Adam Suhl
2023/111 (PDF ) An Attack on the LILLE Stream Cipher Vahid Amin-Ghafari, Mohammad Ali Orumiehchiha, Saeed Rostami
2023/110 (PDF ) VORSHA: A Variable-sized, One-way and Randomized Secure Hash Algorithm Ripon Patgiri, Laiphrakpam Dolendro Singh, Dalton Meitei Thounaojam
2023/109 (PDF ) SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations (Long Paper) Ling Sun, Meiqin Wang
2023/108 (PDF ) Grotto: Screaming fast $(2 + 1)$-PC for $\mathbb{Z}_{2^{n}}$ via (2, 2)-DPFs Kyle Storrier, Adithya Vadapalli, Allan Lyons, Ryan Henry
2023/107 (PDF ) The Tip5 Hash Function for Recursive STARKs Alan Szepieniec, Alexander Lemmens, Jan Ferdinand Sauer, Bobbin Threadbare, Al-Kindi
2023/106 (PDF ) Deuring for the People: Supersingular Elliptic Curves with Prescribed Endomorphism Ring in General Characteristic Jonathan Komada Eriksen, Lorenz Panny, Jana Sotáková, Mattia Veroni
2023/105 (PDF ) Gate-Level Masking of Streamlined NTRU Prime Decapsulation in Hardware Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu
2023/104 (PDF ) Optimizations and Trade-offs for HElib Anamaria Costache, Lea Nürnberger, Rachel Player
2023/103 (PDF ) Fair Delivery of Decentralised Randomness Beacon Runchao Han, Jiangshan Yu
2023/102 (PDF ) Cache-timing attack against HQC Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson
2023/101 (PDF ) Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160] Xiaoen Lin, Le He, Hongbo Yu
2023/100 (PDF ) Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs Ye Dong, Xiaojun Chen, Weizhan Jing, Kaiyun Li, Weiping Wang
2023/099 (PDF ) Scalable Multiparty Garbling Gabrielle Beck, Aarushi Goel, Aditya Hegde, Abhishek Jain, Zhengzhong Jin, Gabriel Kaptchuk
2023/098 (PDF ) Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek
2023/097 (PDF ) Circuit-Succinct Universally-Composable NIZKs with Updatable CRS Behzad Abdolmaleki, Noemi Glaeser, Sebastian Ramacher, Daniel Slamanig
2023/096 (PDF ) MPC With Delayed Parties Over Star-Like Networks Mariana Gama, Emad Heydari Beni, Emmanuela Orsini, Nigel P. Smart, Oliver Zajonc
2023/095 (PDF ) On TLS for the Internet of Things, in a Post Quantum world Michael Scott
2023/094 (PDF ) Portunus: Re-imagining access control in distributed systems Watson Ladd, Tanya Verma, Marloes Venema, Armando Faz Hernandez, Brendan McMillion, Avani Wildani, Nick Sullivan
2023/093 (PDF ) Automated Side-Channel Attacks using Black-Box Neural Architecture Search Pritha Gupta, Jan Peter Drees, Eyke Hüllermeier
2023/092 (PDF ) Estimation of Shor's Circuit for 2048-bit Integers based on Quantum Simulator Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro
2023/091 (PDF ) Satisfiability Modulo Finite Fields Alex Ozdemir, Gereon Kremer, Cesare Tinelli, Clark Barrett
2023/090 (PDF ) Unlimited Results: Breaking Firmware Encryption of ESP32-V3 Karim M. Abdellatif, Olivier Hériveaux, Adrian Thillard
2023/089 (PDF ) COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party Computation Benjamin Levy, Muhammad Ishaq, Ben Sherman, Lindsey Kennard, Ana Milanova, Vassilis Zikas
2023/088 (PDF ) Individual Cryptography Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej
2023/087 (PDF ) Verification of Correctness and Security Properties for CRYSTALS-KYBER Katharina Kreuzer
2023/086 (PDF ) Flyover: A Repayment Protocol for Fast Bitcoin Transfers over Federated Pegs Javier Álvarez Cid-Fuentes, Diego Angel Masini, Sergio Demian Lerner
2023/085 (PDF ) The Security of ChaCha20-Poly1305 in the Multi-user Setting Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson
2023/084 (PDF ) Single-tiered hybrid PoW consensus protocol to encourage decentralization in bitcoin GyuChol.Kim
2023/083 (PDF ) MacORAMa: Optimal Oblivious RAM with Integrity Surya Mathialagan, Neekon Vafa
2023/082 (PDF ) Specialized Proof of Confidential Knowledge (SPoCK) Tarak Ben Youssef, Riad S. Wahby
2023/081 (PDF ) Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean Lawlor
2023/080 (PDF ) PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries Dimitris Mouris, Pratik Sarkar, Nektarios Georgios Tsoutsos
2023/079 (PDF ) The challenges of proving solvency while preserving privacy. Tabacaru Robert, Anghel Florin, Asandoaiei David, Simion Emil
2023/077 (PDF ) Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal Ward Beullens, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2023/076 (PDF ) Bake It Till You Make It: Heat-induced Power Leakage from Masked Neural Networks Dev M. Mehta, Mohammad Hashemi, David S. Koblah, Domenic Forte, Fatemeh Ganji
2023/075 (PDF ) Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat Safa, Shahin Tajik
2023/074 (PDF ) Random Sources in Private Computation Geoffroy Couteau, Adi Rosén
2023/073 (PDF ) FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing Peng Yang, Zoe Lin Jiang, Shiqi Gao, Hongxiao Wang, Jun Zhou, Yangyiye Jin, Siu-Ming Yiu, Junbin Fang
2023/072 (PDF ) Non-Interactive Secure Computation of Inner-Product from LPN and LWE Geoffroy Couteau, Maryam Zarezadeh
2023/071 (PDF ) A security analysis comparison between Signal, WhatsApp and Telegram Corina-Elena Bogos, Răzvan Mocanu, Emil Simion
2023/069 (PDF ) On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions Prabhanjan Ananth, Zihan Hu, Henry Yuen
2023/068 (PDF ) Obfuscating Evasive Decision Trees Shalini Banerjee, Steven D. Galbraith, Giovanni Russello
2023/067 (PDF ) Blind signatures from Zero-knowledge arguments Paulo L. Barreto, Gustavo H. M. Zanon
2023/066 (PDF ) Plonkup scheme with multiple queries Alexandr Bulkin, Tim Dokchitser
2023/065 (PDF ) A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth Jakub Klemsa, Melek Önen, Yavuz Akın
2023/064 (PDF ) Computation of Hilbert class polynomials and modular polynomials from supersingular elliptic curves Antonin Leroux
2023/063 (PDF ) Threshold Signatures in the Multiverse Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
2023/062 (PDF ) Post-Quantum Secure Deterministic Wallet: Stateless, Hot/Cold Setting, and More Secure Mingxing Hu
2023/061 (PDF ) Key-and-Signature Compact Multi-Signatures for Blockchain: A Compiler with Realizations Shaoquan Jiang, Dima Alhadidi, Hamid Fazli Khojir
2023/060 (PDF ) Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols Edward Chen, Jinhao Zhu, Alex Ozdemir, Riad S. Wahby, Fraser Brown, Wenting Zheng
2023/059 (PDF ) Oil and Vinegar: Modern Parameters and Implementations Ward Beullens, Ming-Shing Chen, Shih-Hao Hung, Matthias J. Kannwischer, Bo-Yuan Peng, Cheng-Jhih Shih, Bo-Yin Yang
2023/058 (PDF ) SCALLOP: scaling the CSI-FiSh Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, Benjamin Wesolowski
2023/057 (PDF ) DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing Max Ammann, Lucca Hirschi, Steve Kremer
2023/056 (PDF ) Quantum Annealing for Subset Product and Noisy Subset Product Trey Li
2023/055 (PDF ) An analysis of a scheme proposed for electronic voting systems Nicu Neculache, Vlad-Andrei Petcu, Emil Simion
2023/054 (PDF ) On the Incoercibility of Digital Signatures Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia
2023/053 (PDF ) P3V: Privacy-Preserving Path Validation System for Multi-Authority Sliced Networks Weizhao Jin, Erik Kline, T. K. Satish Kumar, Lincoln Thurlow, Srivatsan Ravi
2023/052 (PDF ) Putting the Online Phase on a Diet: Covert Security from Short MACs Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2023/051 (PDF ) On the Scholz conjecture on addition chains Theophilus Agama
2023/050 (PDF ) Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach Alexandre Berzati, Andersson Calle Viera, Maya Chartouny, Steven Madec, Damien Vergnaud, David Vigilant
2023/049 (PDF ) Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao
2023/048 (PDF ) On-Line/Off-Line DCR-based Homomorphic Encryption and Applications Marc Joye
2023/047 (PDF ) Side-Channel Resistant Implementation Using Arbiter PUF Raja Adhithan RadhaKrishnan
2023/046 (PDF ) Cognitive Cryptography using behavioral features from linguistic-biometric data Jose Contreras
2023/045 (PDF ) A note on machine learning applied in ransomware detection Manuela Horduna, Simona-Maria Lăzărescu, Emil Simion
2023/044 (PDF ) Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets Mahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, Ari Juels
2023/043 (PDF ) RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks David Spielmann, Ognjen Glamocanin, Mirjana Stojilovic
2023/042 (PDF ) On Protecting SPHINCS+ Against Fault Attacks Aymeric Genêt
2023/041 (PDF ) Quantum-Safe Protocols and Application in Data Security of Medical Records Adrian-Daniel Stefan, Ionut-Petrisor Anghel, Emil Simion
2023/040 (PDF ) A Closer Look at the Chaotic Ring Oscillators based TRNG Design Shuqin Su, Bohan Yang, Vladimir Rožić, Mingyuan Yang, Min Zhu, Shaojun Wei, Leibo Liu
2023/039 (PDF ) Server-Supported Decryption for Mobile Devices Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk
2023/038 (PDF ) On the Amortized Communication Complexity of Byzantine Broadcast Atsuki Momose, Ling Ren, Elaine Shi, Jun Wan, Zhuolun Xiang
2023/037 (PDF ) Efficient Isogeny Proofs Using Generic Techniques Kelong Cong, Yi-Fu Lai, Shai Levin
2023/036 (PDF ) Differential analysis of the ternary hash function Troika Christina Boura, Margot Funk, Yann Rotella
2023/035 (PDF ) A Deep Analysis of two Glitch-Free Hardware Masking Schemes SESYM and LMDPL Nicolai Müller, Daniel Lammers, Amir Moradi
2023/034 (PDF ) PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries Jannik Zeitschner, Nicolai Müller, Amir Moradi
2023/033 (PDF ) Fast amortized KZG proofs Dankrad Feist, Dmitry Khovratovich
2023/032 (PDF ) A Gentle Tutorial for Lattice-Based Cryptanalysis Joseph Surin, Shaanan Cohney
2023/031 (PDF ) Sassafras: Efficient Batch Single Leader Election Jeffrey Burdges, Elizabeth Crites, Handan Kılınç Alper, Alistair Stewart, Sergey Vasilyev
2023/030 (PDF ) Earn While You Reveal: Private Set Intersection that Rewards Participants Aydin Abadi
2023/029 (PDF ) Public Verification for Private Hash Matching Sarah Scheffler, Anunay Kulshrestha, Jonathan Mayer
2023/028 (PDF ) Information-Theoretic Distributed Point Functions Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov
2023/027 (PDF ) Verification of the (1–δ)-Correctness Proof of CRYSTALS-KYBER with Number Theoretic Transform Katharina Kreuzer
2023/026 (PDF ) Fermat Factorization in the Wild Hanno Böck
2023/025 (PDF ) Quantum Attacks on Beyond-Birthday-Bound MACs Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao
2023/024 (PDF ) It Runs and it Hides: A Function-Hiding Construction for Private-Key Multi-Input Functional Encryption Alexandros Bakas, Antonis Michalas
2023/023 (PDF ) New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
2023/022 (PDF ) Recommendation for a holistic secure embedded ISA extension Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu
2023/021 (PDF ) DLFA: Deep Learning based Fault Analysis against Block Ciphers Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng, Shengmin Xu, Jiangshan Long
2023/020 (PDF ) The Scholz conjecture on addition chain is true for infinitely many integers with ℓ(2n) = ℓ(n) Amadou TALL
2023/019 (PDF ) Autoencoder-enabled Model Portability for Reducing Hyperparameter Tuning Efforts in Side-channel Analysis Marina Krček, Guilherme Perin
2023/018 (PDF ) New record in the number of qubits for a quantum implementation of AES Zhenqiang Li, Fei Gao, Sujuan Qin, Qiaoyan Wen
2023/017 (PDF ) Cryptographic Group and Semigroup Actions Oliver W. Gnilke, Jens Zumbrägel
2023/016 (PDF ) Simple Threshold (Fully Homomorphic) Encryption From LWE With Polynomial Modulus Katharina Boudgoust, Peter Scholl
2023/015 (PDF ) Unconditionally Secure NIZK in the Fine-Grained Setting Yuyu Wang, Jiaxin Pan
2023/014 (PDF ) Amortized Bootstrapping Revisited: Simpler, Asymptotically-faster, Implemented Antonio Guimarães, Hilder V. L. Pereira, Barry van Leeuwen
2023/013 (PDF ) M-SIDH and MD-SIDH: countering SIDH attacks by masking information Tako Boris Fouotsa, Tomoki Moriya, Christophe Petit
2023/012 (PDF ) Delegated Private Matching for Compute Dimitris Mouris, Daniel Masny, Ni Trieu, Shubho Sengupta, Prasad Buddhavarapu, Benjamin Case
2023/011 (PDF ) Using the RSA or RSA-B accumulator in anonymous credential schemes Sietse Ringers
2023/010 (PDF ) Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation Martin Brain, Carlos Cid, Rachel Player, Wrenna Robson
2023/009 (PDF ) Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini
2023/008 (PDF ) AutoPOI: Automated Points Of Interest Selection for Side-channel Analysis Mick G.D. Remmerswaal, Lichao Wu, Sébastien Tiran, Nele Mentens
2023/007 (PDF ) Post-Quantum Security of Key Encapsulation Mechanism against CCA Attacks with a Single Decapsulation Query Haodong Jiang, Zhi Ma, Zhenfeng Zhang
2023/006 (PDF ) Exploring multi-task learning in the context of masked AES implementations Thomas Marquet, Elisabeth Oswald
2023/005 (PDF ) Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud Shuai Cheng, Shengke Zeng, Haoyu Zeng, Yawen Feng, Jixiang Xiao
2023/004 (PDF ) Quantum Artificial Intelligence on Cryptanalysis Hyunji Kim, Sejin Lim, Anubhab Baksi, Dukyoung Kim, Seyoung Yoon, Kyungbae Jang, Hwajeong Seo
2023/003 (PDF ) How to Use Sigstore without Sigstore Yan-Cheng Chang
2023/002 (PDF ) Ring Verifiable Random Functions and Zero-Knowledge Continuations Jeffrey Burdges, Oana Ciobotaru, Handan Kılınç Alper, Alistair Stewart, Sergey Vasilyev
2023/001 (PDF ) Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions Mohammad Hashemi, Domenic Forte, Fatemeh Ganji
2022/1781 (PDF ) COA-Secure Obfuscation and Applications Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishanth Kumar, Oxana Poburinnaya, Manoj Prabhakaran
2022/1779 (PDF ) Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators Shravan Srinivasan, Ioanna Karantaidou, Foteini Baldimtsi, Charalampos Papamanthou
2022/1778 (PDF ) Asynchronous Delegated Private Set Intersection with Hiding of Intersection Size Wyatt Howe, Andrei Lapets, Frederick Jansen, Tanner Braun, Ben Getchell
2022/1777 (PDF ) Weightwise perfectly balanced functions and nonlinearity Agnese Gini, Pierrick Méaux
2022/1776 (PDF ) Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
2022/1775 (PDF ) Candidate Trapdoor Claw-Free Functions from Group Actions with Applications to Quantum Protocols Navid Alamati, Giulio Malavolta, Ahmadreza Rahimi
2022/1774 (PDF ) PECO: methods to enhance the privacy of DECO protocol Manuel B. Santos
2022/1773 (PDF ) SoK: Decentralized Finance (DeFi) Attacks Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais
2022/1772 (PDF ) You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature Min Zhang, Binbin Tu, Yu Chen
2022/1771 (PDF ) Security analysis for BIKE, Classic McEliece and HQC against the quantum ISD algorithms Asuka Wakasugi, Mitsuru Tada
2022/1770 (PDF ) Cryptographic Primitives with Hinting Property Navid Alamati, Sikhar Patranabis
2022/1769 (PDF ) PoRt: Non-Interactive Continuous Availability Proof of Replicated Storage Reyhaneh Rabaninejad, Bin Liu, Antonis Michalas
2022/1768 (PDF ) Continuous Group Key Agreement with Flexible Authorization and Its Applications Kaisei Kajita, Keita Emura, Kazuto Ogawa, Ryo Nojima, Go Ohtake
2022/1767 (PDF ) Do Not Trust in Numbers: Practical Distributed Cryptography With General Trust Orestis Alpos, Christian Cachin
2022/1766 (PDF ) Systematically Quantifying Cryptanalytic Non-Linearities in Strong PUFs Durba Chatterjee, Kuheli Pratihar, Aritra Hazra, Ulrich Rührmair, Debdeep Mukhopadhyay
2022/1764 (PDF ) Wi-Fi Security: Do We Still Have to Look Back? Karim Lounis
2022/1763 (PDF ) cq: Cached quotients for fast lookups Liam Eagen, Dario Fiore, Ariel Gabizon
2022/1762 (PDF ) On the Impossibility of Surviving (Iterated) Deletion of Weakly Dominated Strategies in Rational MPC Johannes Blömer, Jan Bobolz, Henrik Bröcher
2022/1761 (PDF ) A Family of Block Ciphers Based on Multiple Quasigroups Umesh Kumar, V. Ch. Venkaiah
2022/1760 (PDF ) Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation Rachit Garg, Kristin Sheridan, Brent Waters, David J. Wu
2022/1759 (PDF ) Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern
2022/1758 (PDF ) SuperNova: Proving universal machine executions without universal circuits Abhiram Kothapalli, Srinath Setty
2022/1757 (PDF ) An Injectivity Analysis of CRYSTALS-Kyber and Implications on Quantum Security Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld
2022/1756 (PDF ) CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments Behzad Abdolmaleki, Daniel Slamanig
2022/1755 (PDF ) Towards Secure Evaluation of Online Functionalities (Corrected and Extended Version) Andreas Klinger, Ulrike Meyer
2022/1754 (PDF ) An SVP attack on Vortex zhenfei zhang
2022/1753 (PDF ) DSKE: Digital Signatures with Key Extraction Zhipeng Wang, Orestis Alpos, Alireza Kavousi, Harry W. H. Wong, Sze Yiu Chau, Duc V. Le, Christian Cachin
2022/1752 (PDF ) IsoLock: Thwarting Link-Prediction Attacks on Routing Obfuscation by Graph Isomorphism Shaza Elsharief, Lilas Alrahis, Johann Knechtel, Ozgur Sinanoglu
2022/1751 (PDF ) Pseudorandomness of Decoding, Revisited: Adapting OHCP to Code-Based Cryptography Maxime Bombar, Alain Couvreur, Thomas Debris-Alazard
2022/1750 (PDF ) Assessing the Impact of a Variant of MATZOV's Dual Attack on Kyber Kevin Carrier, Charles Meyer-Hilfiger, Yixin Shen, Jean-Pierre Tillich
2022/1749 (PDF ) Computational Hardness of the Permuted Kernel and Subcode Equivalence Problems Paolo Santini, Marco Baldi, Franco Chiaraluce
2022/1748 (PDF ) RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol (Long version) Pascal Lafourcade, Gael Marcadet, Léo Robert
2022/1747 (PDF ) Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation Adithya Vadapalli, Ryan Henry, Ian Goldberg
2022/1746 (PDF ) Clipaha: A Scheme to Perform Password Stretching on the Client Francisco Blas Izquierdo Riera, Magnus Almgren, Pablo Picazo-Sanchez, Christian Rohner
2022/1745 (PDF ) Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
2022/1744 (PDF ) Worst and Average Case Hardness of Decoding via Smoothing Bounds Thomas Debris-Alazard, Nicolas Resch
2022/1743 (PDF ) Ring Signatures with User-Controlled Linkability Dario Fiore, Lydia Garms, Dimitris Kolonelos, Claudio Soriente, Ida Tucker
2022/1742 (PDF ) A Simple Noncommutative UOV Scheme Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, Chun-Yen Chou
2022/1741 (PDF ) Demystifying the comments made on “A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors” Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/1740 (PDF ) A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu
2022/1739 (PDF ) On blindness of several ElGamal-type blind signatures Alexandra Babueva, Liliya Akhmetzyanova, Evgeny Alekseev, Oleg Taraskin
2022/1738 (PDF ) Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert
2022/1737 (PDF ) Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis Azade Rezaeezade, Lejla Batina
2022/1736 (PDF ) An algorithm for efficient detection of $(N,N)$-splittings and its application to the isogeny problem in dimension 2 Maria Corte-Real Santos, Craig Costello, Sam Frengley
2022/1735 (PDF ) BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oğuzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen
2022/1734 (PDF ) Mind Your Path: On (Key) Dependencies in Differential Characteristics Thomas Peyrin, Quan Quan Tan
2022/1733 (PDF ) New and Improved Constructions for Partially Equivocable Public Key Encryption Benoît Libert, Alain Passelègue, Mahshid Riahinia
2022/1732 (PDF ) TreeSync: Authenticated Group Management for Messaging Layer Security Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan
2022/1731 (PDF ) Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds Reham Almukhlifi, Poorvi Vora
2022/1730 (PDF ) Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in Practice Andrew Fregly, Joseph Harvey, Burton S. Kaliski Jr., Swapneel Sheth
2022/1729 (PDF ) Acsesor: A New Framework for Auditable Custodial Secret Storage and Recovery Melissa Chase, Hannah Davis, Esha Ghosh, Kim Laine
2022/1728 (PDF ) Efficient Zero Knowledge Arguments for Bilinear Matrix Relations over Finite Fields and Knowledge-Soundness Enhancement via Operations over Extended Field Yuan Tian
2022/1727 (PDF ) Find Thy Neighbourhood: Privacy-Preserving Local Clustering Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2022/1726 (PDF ) Optimization for SPHINCS+ using Intel Secure Hash Algorithm Extensions Thomas Hanson, Qian Wang, Santosh Ghosh, Fernando Virdia, Anne Reinders, Manoj R. Sastry
2022/1725 (PDF ) A note on SPHINCS+ parameter sets Stefan Kölbl, Jade Philipoom
2022/1724 (PDF ) Formal Analysis of SPDM: Security Protocol and Data Model version 1.2 Cas Cremers, Alexander Dax, Aurora Naska
2022/1723 (PDF ) Asymptotically Optimal Message Dissemination with Applications to Blockchains Chen-Da Liu-Zhang, Christian Matt, Søren Eller Thomsen
2022/1722 (PDF ) On Side-Channel and CVO Attacks against TFHE and FHEW Michael Walter
2022/1721 (PDF ) Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei
2022/1720 (PDF ) Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, Amir Moradi, Christof Paar
2022/1719 (PDF ) Two-Round Concurrent 2PC from Sub-Exponential LWE Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, Amit Sahai
2022/1718 (PDF ) Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan
2022/1717 (PDF ) Scaling Blockchain-Based Tokens with Joint Cryptographic Accumulators Trevor Miller
2022/1716 (PDF ) Area-time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications Safiullah Khan, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Abdul Majeed, Seong Oun Hwang
2022/1715 (PDF ) An Algebraic Attack Against McEliece-like Cryptosystems Based on BCH Codes Freja Elbro, Christian Majenz
2022/1714 (PDF ) Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang
2022/1713 (PDF ) Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste Elena Dubrova, Kalle Ngo, Joel Gärtner
2022/1712 (PDF ) KEMTLS vs. Post-Quantum TLS: Performance On Embedded Systems Ruben Gonzalez, Thom Wiggers
2022/1711 (PDF ) Nonce- and Redundancy-encrypting Modes with Farfalle Seth Hoffert
2022/1710 (PDF ) Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations Cas Cremers, Charlie Jacomme, Aurora Naska
2022/1709 (PDF ) Dory: Faster Asynchronous BFT with Reduced Communication for Permissioned Blockchains Zongyang Zhang, You Zhou, Sisi Duan, Haibin Zhang, Bin Hu, Licheng Wang, Jianwei Liu
2022/1708 (PDF ) Expert Mental Models of SSI Systems and Implications for End-User Understanding Alexandra Mai
2022/1707 (PDF ) Private Access Control for Function Secret Sharing Sacha Servan-Schreiber, Simon Beyzerov, Eli Yablon, Hyojae Park
2022/1706 (PDF ) Optimized Implementation of Encapsulation and Decapsulation of Classic McEliece on ARMv8 Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Hyunjun Kim, Hwajeong Seo
2022/1705 (PDF ) Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol Felix Günther, Marc Ilunga Tshibumbu Mukendi
2022/1704 (PDF ) Some applications of higher dimensional isogenies to elliptic curves (overview of results) Damien Robert
2022/1703 (PDF ) Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE Wei-Kai Lin, Ethan Mook, Daniel Wichs
2022/1702 (PDF ) SCB Mode: Semantically Secure Length-Preserving Encryption Fabio Banfi
2022/1701 (PDF ) On Zero-Knowledge Proofs over the Quantum Internet Mark Carney
2022/1699 (PDF ) SoK: Use of Cryptography in Malware Obfuscation Hassan Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia
2022/1698 (PDF ) Digital Signature from Syndrome Decoding Problem Abdelhaliem Babiker
2022/1697 (PDF ) RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham
2022/1696 (PDF ) Post-Quantum Anonymity of Kyber Varun Maram, Keita Xagawa
2022/1695 (PDF ) ELSA: Secure Aggregation for Federated Learning with Malicious Actors Mayank Rathee, Conghao Shen, Sameer Wagh, Raluca Ada Popa
2022/1694 (PDF ) Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations George Teseleanu
2022/1693 (PDF ) More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model Kyoichi Asano, Keita Emura, Atsushi Takayasu
2022/1692 (PDF ) Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber Linus Backlund, Kalle Ngo, Joel Gärtner, Elena Dubrova
2022/1691 (PDF ) TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation Cas Cremers, Gal Horowitz, Charlie Jacomme, Eyal Ronen
2022/1690 (PDF ) LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta, Mert Yassi, Raymond K. Zhao
2022/1689 (PDF ) Efficient Zero-Knowledge Arguments for Some Matrix Relations over Ring and Non-malleable Enhancement Yuan Tian
2022/1688 (PDF ) Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation Alberto Ibarrondo, Hervé Chabanne, Melek Önen
2022/1687 (PDF ) Stronger Security and Generic Constructions for Adaptor Signatures Wei Dai, Tatsuaki Okamoto, Go Yamamoto
2022/1686 (PDF ) Practical Quantum-Safe Voting from Lattices, Extended Ian Black, Emma McFall, Juliet Whidden, Bryant Xie, Ryann Cartor
2022/1685 (PDF ) CoRA: Collaborative Risk-Aware Authentication Mastooreh Salajegheh, Shashank Agrawal, Maliheh Shirvanian, Mihai Christodorescu, Payman Mohassel
2022/1684 (PDF ) Division in the Plactic Monoid Chris Monico
2022/1683 (PDF ) Powers of Tau in Asynchrony Sourav Das, Zhuolun Xiang, Ling Ren
2022/1682 (PDF ) Interactive Authentication Deepak Maram, Mahimna Kelkar, Ittay Eyal
2022/1681 (PDF ) Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Aikata, Sujoy Sinha Roy
2022/1680 (PDF ) Authenticated Encryption with Key Identification Julia Len, Paul Grubbs, Thomas Ristenpart
2022/1679 (PDF ) Integer Polynomial Recovery from Outputs and its Application to Cryptanalysis of a Protocol for Secure Sorting Srinivas Vivek, Shyam Murthy, Deepak Kumaraswamy
2022/1678 (PDF ) Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu
2022/1677 (PDF ) Quagmire ciphers and group theory: What is a Porta cipher? Thomas Kaeding
2022/1676 (PDF ) Concurrently Secure Blind Schnorr Signatures Georg Fuchsbauer, Mathias Wolf
2022/1675 (PDF ) SoK: Assisted Fault Simulation - Existing Challenges and Opportunities Offered by AI Asmita Adhikary, Ileana Buhan
2022/1674 (PDF ) Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Aggregation (preliminary work) Alberto Pedrouzo-Ulloa, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, Martin Zuber
2022/1673 (PDF ) DeV-IP: A k-out-n Decentralized and verifiable BFV for Inner Product evaluation Jose Contreras, Hardik Gajera
2022/1672 (PDF ) An Auditable Confidentiality Protocol for Blockchain Transactions Aoxuan Li, Gabriele D’Angelo, Jacky Tang, Frank Fang, Baron Gong
2022/1671 (PDF ) Quantum Neural Network based Distinguisher for Differential Cryptanalysis on Simplified Block Ciphers Hyunji Kim, Kyungbae Jang, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
2022/1670 (PDF ) Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher Shoichi Hirose, Kazuhiko Minematsu
2022/1669 (PDF ) Jolt: Recovering TLS Signing Keys via Rowhammer Faults Koksal Mus, Yarkın Doröz, M. Caner Tol, Kristi Rahman, Berk Sunar
2022/1668 (PDF ) On the families of algebraic graphs with the fastest growth of cycle indicator and their applications Vasyl Ustimenko
2022/1667 (PDF ) Applying Castryck-Decru Attack on the Masked Torsion Point Images SIDH variant Jesús-Javier Chi-Domínguez
2022/1666 (PDF ) Cryptanalysis of Ivanov-Krouk-Zyablov cryptosystem Kirill Vedenev, Yury Kosolapov
2022/1665 (PDF ) GCKSign: Simple and Efficient Signatures from Generalized Compact Knapsacks Joo Woo, Kwangsu Lee, Jong Hwan Park
2022/1664 (PDF ) NTRU+: Compact Construction of NTRU Using Simple Encoding Method Jonghyun Kim, Jong Hwan Park
2022/1663 (PDF ) REDOG and Its Performance Analysis Jon-Lark Kim, Jihoon Hong, Terry Shue Chien Lau, YounJae Lim, Byung-Sun Won
2022/1662 (PDF ) Revisiting cycles of pairing-friendly elliptic curves Marta Bellés-Muñoz, Jorge Jiménez Urroz, Javier Silva
2022/1661 (PDF ) Enhancing the Dual Attack against MLWE: Constructing More Short Vectors Using Its Algebraic Structure Han Wu, Guangwu Xu
2022/1660 (PDF ) Owner Identity Verification in the Internet of Connected Vehicles: Zero Trust Based Solution Mashrukh Zayed, Adnan Anwar, Ziaur Rahman, Sk. Shezan Arefin, Rafiqul Islam
2022/1659 (PDF ) A Deep Learning aided Key Recovery Framework for Large-State Block Ciphers Yi Chen, Zhenzhen Bao, Yantian Shen, Hongbo Yu
2022/1658 (PDF ) A new Privacy Preserving and Scalable Revocation Method for Self Sovereign Identity - The Perfect Revocation Method does not exist yet Andreas Freitag
2022/1657 (PDF ) CycloneNTT: An NTT/FFT Architecture Using Quasi-Streaming of Large Datasets on DDR- and HBM-based FPGA Platforms Kaveh Aasaraai, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela, Kevin Bowers
2022/1656 (PDF ) Proactive Refresh for Accountable Threshold Signatures Dan Boneh, Aditi Partap, Lior Rotem
2022/1655 (PDF ) Just How Fair is an Unreactive World? Srinivasan Raghuraman, Yibin Yang
2022/1654 (PDF ) On the Complete Non-Malleability of the Fujisaki-Okamoto Transform Daniele Friolo, Matteo Salvino, Daniele Venturi
2022/1653 (PDF ) Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol Alexandre Debant, Lucca Hirschi
2022/1652 (PDF ) Breaking the Size Barrier: Universal Circuits meet Lookup Tables Yann Disser, Daniel Günther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt, Hossein Yalame
2022/1651 (PDF ) TiGER: Tiny bandwidth key encapsulation mechanism for easy miGration based on RLWE(R) Seunghwan Park, Chi-Gon Jung, Aesun Park, Joongeun Choi, Honggoo Kang
2022/1650 (PDF ) LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains Philipp Hoenisch, Subhra Mazumdar, Pedro Moreno-Sanchez, Sushmita Ruj
2022/1649 (PDF ) Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis Shah Fahd, Mehreen Afzal, Dawood Shah, Waseem Iqbal, Atiya Hai
2022/1648 (PDF ) Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Nitin Singh
2022/1647 (PDF ) Quantum Algorithm for Oracle Subset Product Trey Li
2022/1646 (PDF ) Blockin: Multi-Chain Sign-In Standard with Micro-Authorizations Matt Davison, Ken King, Trevor Miller
2022/1645 (PDF ) The Return of the SDitH Carlos Aguilar-Melchor, Nicolas Gama, James Howe, Andreas Hülsing, David Joseph, Dongze Yue
2022/1644 (PDF ) An attack on a key exchange protocol based on max-times and min-times algebras Ivan Buchinskiy, Matvei Kotov, Alexander Treier
2022/1643 (PDF ) End-to-End Secure Messaging with Traceability Only for Illegal Content James Bartusek, Sanjam Garg, Abhishek Jain, Guru-Vamsi Policharla
2022/1642 (PDF ) Proofs of Proof-of-Stake with Sublinear Complexity Shresth Agrawal, Joachim Neu, Ertem Nusret Tas, Dionysis Zindros
2022/1641 (PDF ) AlgSAT --- a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective Huina Li, Haochen Zhang, Guozhen Liu, Kai Hu, Jian Guo, Weidong Qiu
2022/1640 (PDF ) Differential Meet-In-The-Middle Cryptanalysis Christina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia
2022/1639 (PDF ) Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments Alexandre Augusto Giron, João Pedro Adami do Nascimento, Ricardo Custódio, Lucas Pandolfo Perin
2022/1638 (PDF ) The Security of Quasigroups Based Substitution Permutation Networks George Teseleanu
2022/1637 (PDF ) Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum $i\mathcal{O}$ Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai
2022/1636 (PDF ) Threshold Signatures with Private Accountability Dan Boneh, Chelsea Komlo
2022/1635 (PDF ) FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption Michiel Van Beirendonck, Jan-Pieter D'Anvers, Furkan Turan, Ingrid Verbauwhede
2022/1634 (PDF ) Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains Tianyu Zhaolu, Zhiguo Wan, Huaqun Wang
2022/1633 (PDF ) Linea Prover Documentation Linea Prover
2022/1632 (PDF ) Cryptography with Weights: MPC, Encryption and Signatures Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
2022/1631 (PDF ) Enhancing Ring-LWE Hardness using Dedekind Index Theorem Charanjit S Jutla, Chengyu Lin
2022/1630 (PDF ) Finding Collisions for Round-Reduced Romulus-H Marcel Nageler, Felix Pallua, Maria Eichlseder
2022/1629 (PDF ) Temporary Block Withholding Attacks on Filecoin's Expected Consensus Tong Cao, Xin Li
2022/1628 (PDF ) Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Competition's Finalists Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert
2022/1627 (PDF ) The Random Fault Model Siemen Dhooghe, Svetla Nikova
2022/1626 (PDF ) MinRoot: Candidate Sequential Function for Ethereum VDF Dmitry Khovratovich, Mary Maller, Pratyush Ranjan Tiwari
2022/1625 (PDF ) Efficient Threshold FHE for Privacy-Preserving Applications Siddhartha Chowdhury, Sayani Sinha, Animesh Singh, Shubham Mishra, Chandan Chaudhary, Sikhar Patranabis, Pratyay Mukherjee, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/1624 (PDF ) Algorithms for switching between block-wise and arithmetic masking Evgeny Alekseev, Andrey Bozhko
2022/1623 (PDF ) WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership David Chaum, Mario Larangeira, Mario Yaksetig
2022/1622 (PDF ) Anonymous Tokens with Hidden Metadata Bit from Algebraic MACs Melissa Chase, F. Betül Durak, Serge Vaudenay
2022/1621 (PDF ) cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption Hao Yang, Shiyu Shen, Zhe Liu, Yunlei Zhao
2022/1620 (PDF ) Another Round of Breaking and Making Quantum Money: How to Not Build It from Lattices, and More Jiahui Liu, Hart Montgomery, Mark Zhandry
2022/1619 (PDF ) The Performance Analysis of Post-Quantum Cryptography for Vehicular Communications Abel C. H. Chen
2022/1618 (PDF ) Witness-Succinct Universally-Composable SNARKs Chaya Ganesh, Yashvanth Kondi, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
2022/1617 (PDF ) A New Higher Order Differential of RAGHAV Naoki Shibayama, Yasutaka Igarashi
2022/1616 (PDF ) Secret Sharing for Generic Access Structures James Smith
2022/1615 (PDF ) Efficient Methods for Implementation of Generalized Access Structures James Smith
2022/1614 (PDF ) Throughput Limitation of the Off-chain Payment Networks Shayan Hamidi Dehshali, Seyed Mahdi Hosseini, Soheil Zibakhsh Shabgahi, Behnam Bahrak
2022/1613 (PDF ) Classic McEliece Key Generation on RAM constrained devices Rainer Urian, Raphael Schermann
2022/1612 (PDF ) On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives Laasya Bangalore, Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2022/1611 (PDF ) Efficient Aggregatable BLS Signatures with Chaum-Pedersen Proofs Jeff Burdges, Oana Ciobotaru, Syed Lavasani, Alistair Stewart
2022/1610 (PDF ) ADMM and Reproducing Sum-Product Decoding Algorithm Applied to QC-MDPC Code-based McEliece Cryptosystems Kohtaro Watanabe, Motonari Ohtsuka, Yuta Tsukie
2022/1609 (PDF ) Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs Avijit Dutta, Jian Guo, Eik List
2022/1608 (PDF ) Ligero: Lightweight Sublinear Arguments Without a Trusted Setup Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
2022/1607 (PDF ) A Universally Composable PAKE with Zero Communication Cost (And Why It Shouldn't Be Considered UC-Secure) Lawrence Roy, Jiayu Xu
2022/1606 (PDF ) AUC: Accountable Universal Composability Mike Graf, Ralf Küsters, Daniel Rausch
2022/1605 (PDF ) Sweep-UC: Swapping Coins Privately Lucjan Hanzlik, Julian Loss, Sri AravindaKrishnan Thyagarajan, Benedikt Wagner
2022/1604 (PDF ) Quantum Rebound Attacks on Reduced-Round ARIA-Based Hash Functions Seungjun Baek, Jongsung Kim
2022/1603 (PDF ) Slid Pairs of the Fruit-80 Stream Cipher Pang Kok An, Shekh Faisal Abdul-Latip, Hazlin Abdul Rani
2022/1602 (PDF ) Survey on Fully Homomorphic Encryption, Theory, and Applications Chiara Marcolla, Victor Sucasas, Marc Manzano, Riccardo Bassoli, Frank H.P. Fitzek, Najwa Aaraj
2022/1600 (PDF ) Secret-Shared Joins with Multiplicity from Aggregation Trees Saikrishna Badrinarayanan, Sourav Das, Gayathri Garimella, Srinivasan Raghuraman, Peter Rindal
2022/1599 (PDF ) Streaming Functional Encryption Jiaxin Guan, Alexis Korb, Amit Sahai
2022/1598 (PDF ) Efficiently Testable Circuits Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, Krzysztof Pietrzak
2022/1597 (PDF ) A Closer Look at a Recent Pipelined True Random Number Generator Design Markus Dichtl
2022/1596 (PDF ) LowMS: a new rank metric code-based KEM without ideal structure Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Pierre Loidreau, Julian Renner, Antonia Wachter-Zeh
2022/1595 (PDF ) Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida
2022/1594 (PDF ) Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH Pratish Datta, Tapas Pal, Katsuyuki Takashima
2022/1593 (PDF ) Proofs of discrete logarithm equality across groups Melissa Chase, Michele Orrù, Trevor Perrin, Greg Zaverucha
2022/1592 (PDF ) Powers-of-Tau to the People: Decentralizing Setup Ceremonies Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh
2022/1591 (PDF ) ISAP+: ISAP with Fast Authentication Arghya Bhattacharjee, Avik Chakraborti, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi
2022/1590 (PDF ) Misuse-resistant MGM2 mode Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev
2022/1589 (PDF ) Cryptanalysis of a privacy-preserving behavior-oriented authentication scheme Sigurd Eskeland, Ahmed Fraz Baig
2022/1588 (PDF ) Factoring using multiplicative relations modulo n: a subexponential algorithm inspired by the index calculus Katherine E. Stange
2022/1587 (PDF ) Applications of the indirect sum in the design of several special classes of bent functions outside the completed $\mathcal{MM}$ class Fengrong Zhang, Enes Pasalic, Amar Bapić, Baocang Wang
2022/1586 (PDF ) Practical Asynchronous Proactive Secret Sharing and Key Refresh Christoph U. Günther, Sourav Das, Lefteris Kokoris-Kogias
2022/1585 (PDF ) Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use Kwan Yin Chan, Tsz Hon Yuen
2022/1584 (PDF ) Instantiability of Classical Random-Oracle-Model Encryption Transforms Alice Murphy, Adam O'Neill, Mohammad Zaheri
2022/1583 (PDF ) Asynchronous Multi-Party Quantum Computation Vipul Goyal, Chen-Da Liu-Zhang, Justin Raizes, João Ribeiro
2022/1581 (PDF ) Truncator: Time-space Tradeoff of Cryptographic Primitives Foteini Baldimtsi, Konstantinos Chalkias, Panagiotis Chatzigiannis, Mahimna Kelkar
2022/1580 (PDF ) Multi-ciphertext security degradation for lattices Daniel J. Bernstein
2022/1579 (PDF ) New Properties of Double Boomerang Connectivity Table Qianqian Yang, Ling Song, Siwei Sun, Danping Shi, Lei Hu
2022/1578 (PDF ) Weighted Secret Sharing from Wiretap Channels Fabrice Benhamouda, Shai Halevi, Lev Stambler
2022/1577 (PDF ) Rescue-Prime Optimized Tomer Ashur, Al Kindi, Willi Meier, Alan Szepieniec, Bobbin Threadbare
2022/1576 (PDF ) Folding Schemes with Selective Verification Carla Ràfols, Alexandros Zacharakis
2022/1575 (PDF ) On Linearization Attack of Entropic Quasigroups Cryptography Daniel Nager
2022/1574 (PDF ) Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines Anita Aghaie, Amir Moradi, Johannes Tobisch, Nils Wisiol
2022/1573 (PDF ) Solving Small Exponential ECDLP in EC-based Additively Homomorphic Encryption and Applications Fei Tang, Guowei Ling, Chaochao Cai, Jinyong Shan, Xuanqi Liu, Peng Tang, Weidong Qiu
2022/1572 (PDF ) Layered ROLLO-I: Faster rank-metric code-based KEM using ideal LRPC codes Chanki Kim, Young-Sik Kim, Jong-Seon No
2022/1571 (PDF ) Practical Settlement Bounds for Longest-Chain Consensus Peter Gaži, Ling Ren, Alexander Russell
2022/1570 (PDF ) Set (Non-)Membership NIZKs from Determinantal Accumulators Helger Lipmaa, Roberto Parisella
2022/1569 (PDF ) DAG-$\Sigma$: A DAG-based Sigma Protocol for Relations in CNF Gongxian Zeng, Junzuo Lai, Zhengan Huang, Yu Wang, Zhiming Zheng
2022/1568 (PDF ) Extendable Threshold Ring Signatures with Enhanced Anonymity Gennaro Avitabile, Vincenzo Botta, Dario Fiore
2022/1567 (PDF ) Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-permutation in the Known-key setting Orr Dunkelman, Shibam Ghosh, Eran Lambooij
2022/1566 (PDF ) Characterisation of Bijectivity Preserving Componentwise Modification of S-Boxes Kaisa Nyberg
2022/1565 (PDF ) Baloo: Nearly Optimal Lookup Arguments Arantxa Zapico, Ariel Gabizon, Dmitry Khovratovich, Mary Maller, Carla Ràfols
2022/1564 (PDF ) Efficient privacy preserving top-k recommendation using homomorphic sorting Pranav Verma, Anish Mathuria, Sourish Dasgupta
2022/1563 (PDF ) A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/1562 (PDF ) A Systematization of Voter Registration Security Jack Cable, Andrés Fábrega, Sunoo Park, Michael A. Specter
2022/1561 (PDF ) Vogue: Faster Computation of Private Heavy Hitters Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
2022/1560 (PDF ) Verifiable Private Information Retrieval Shany Ben-David, Yael Tauman Kalai, Omer Paneth
2022/1559 (PDF ) Take your MEDS: Digital Signatures from Matrix Code Equivalence Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska
2022/1558 (PDF ) Quantum Speed-Up for Multidimensional (Zero Correlation) Linear Distinguishers Akinori Hosoyamada
2022/1557 (PDF ) Less is more: refinement proofs for probabilistic proofs Kunming Jiang, Devora Chait-Roth, Zachary DeStefano, Michael Walfish, Thomas Wies
2022/1556 (PDF ) Intermediate Certificate Suppression in Post-Quantum TLS: An Approximate Membership Querying Approach Dimitrios Sikeridis, Sean Huntley, David Ott, Michael Devetsikiotis
2022/1555 (PDF ) Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures Sunpreet S. Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman, Maliheh Shirvanian, Kim Wagner, Gaven Watson
2022/1554 (PDF ) Executing and Proving over Dirty Ledgers Christos Stefo, Zhuolun Xiang, Lefteris Kokoris-Kogias
2022/1553 (PDF ) Lower Bound Framework for Differentially Private and Oblivious Data Structures Giuseppe Persiano, Kevin Yeo
2022/1552 (PDF ) XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3 Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan
2022/1551 (PDF ) Extensible Decentralized Secret Sharing and Application to Schnorr Signatures Michele Battagliola, Riccardo Longo, Alessio Meneghetti
2022/1550 (PDF ) Modifications of Bijective S-Boxes with Linear Structures Kaisa Nyberg
2022/1549 (PDF ) The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64 Yingying Li, Qichun Wang
2022/1548 (PDF ) Trellis: Robust and Scalable Metadata-private Anonymous Broadcast Simon Langowski, Sacha Servan-Schreiber, Srinivas Devadas
2022/1547 (PDF ) A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm Tendayi Kamucheka, Alexander Nelson, David Andrews, Miaoqing Huang
2022/1546 (PDF ) Threshold Implementations in Software: Micro-architectural Leakages in Algorithms John Gaspoz, Siemen Dhooghe
2022/1545 (PDF ) On Structure-Preserving Cryptography and Lattices Dennis Hofheinz, Kristina Hostáková, Roman Langrehr, Bogdan Ursu
2022/1544 (PDF ) Towards Efficient Decentralized Federated Learning Christodoulos Pappas, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Eleni Panagou, Spyros Lalis, Manolis Vavalis
2022/1543 (PDF ) Four-Round Black-Box Non-Malleable Commitments from One-Way Permutations Michele Ciampi, Emmanuela Orsini, Luisa Siniscalchi
2022/1542 (PDF ) Scalable and Transparent Proofs over All Large Fields, via Elliptic Curves (ECFFT part II) Eli Ben-Sasson, Dan Carmon, Swastik Kopparty, David Levit
2022/1541 (PDF ) Secure Auctions in the Presence of Rational Adversaries Chaya Ganesh, Bhavana Kanukurthi, Girisha Shankar
2022/1540 (PDF ) Exploiting algebraic structures in probing security Maxime Plançon
2022/1539 (PDF ) Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions Saumya Goyal, Varun Narayanan, Manoj Prabhakaran
2022/1538 (PDF ) DME: a full encryption, signature and KEM multivariate public key cryptosystem Ignacio Luengo, Martín Avendaño
2022/1537 (PDF ) On Extremal Algebraic Graphs and Multivariate Cryptosystems Vasyl Ustimenko
2022/1536 (PDF ) Privacy-Preserving Blueprints Markulf Kohlweiss, Anna Lysyanskaya, An Nguyen
2022/1535 (PDF ) Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar
2022/1534 (PDF ) Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function Elena Andreeva, Benoit Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy
2022/1533 (PDF ) How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest
2022/1532 (PDF ) Dynamic Decentralized Functional Encryption with Strong Security Ky Nguyen, David Pointcheval, Robert Schädlich
2022/1531 (PDF ) The Key Lattice Framework for Concurrent Group Messaging Kelong Cong, Karim Eldefrawy, Nigel P. Smart, Ben Terner
2022/1530 (PDF ) Multivariate lookups based on logarithmic derivatives Ulrich Haböck
2022/1529 (PDF ) Key-Recovery Fault Injection Attack on the Classic McEliece KEM Sabine Pircher, Johannes Geier, Julian Danner, Daniel Mueller-Gritschneder, Antonia Wachter-Zeh
2022/1528 (PDF ) Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence Problem Ward Beullens
2022/1527 (PDF ) Pattern Matching in Encrypted Stream from Inner Product Encryption Élie Bouscatié, Guilhem Castagnos, Olivier Sanders
2022/1526 (PDF ) Threshold-Optimal MPC With Friends and Foes Nikolas Melissaris, Divya Ravi, Sophia Yakoubov
2022/1525 (PDF ) Endemic Oblivious Transfer via Random Oracles, Revisited Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2022/1524 (PDF ) Shielding Probabilistically Checkable Proofs: Zero-Knowledge PCPs from Leakage Resilience Mor Weiss
2022/1523 (PDF ) Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2022/1522 (PDF ) Two new infinite families of APN functions in trivariate form Kangquan Li, Nikolay Kaleyski
2022/1521 (PDF ) An Assessment of Differential-Neural Distinguishers Aron Gohr, Gregor Leander, Patrick Neumann
2022/1520 (PDF ) Censorship-Resilient and Confidential Collateralized Second-Layer Payments Kari Kostiainen, Sven Gnap, Ghassan Karame
2022/1519 (PDF ) Collusion-resistant broadcast encryption based on hidden RSA subgroups Sigurd Eskeland
2022/1518 (PDF ) An Experimentally Verified Attack on 820-Round Trivium (Full Version) Cheng Che, Tian Tian
2022/1517 (PDF ) Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable Abort Kai-Min Chung, Mi-Ying (Miryam) Huang, Er-Cheng Tang, Jiapeng Zhang
2022/1516 (PDF ) Obfuscation of Evasive Algebraic Set Membership Steven D. Galbraith, Trey Li
2022/1515 (PDF ) Succinct Vector, Polynomial, and Functional Commitments from Lattices Hoeteck Wee, David J. Wu
2022/1514 (PDF ) Pseudorandom (Function-Like) Quantum State Generators: New Definitions and Applications Prabhanjan Ananth, Aditya Gulati, Luowen Qian, Henry Yuen
2022/1513 (PDF ) Player-Replaceability and Forensic Support are Two Sides of the Same (Crypto) Coin Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath
2022/1512 (PDF ) Building MPCitH-based Signatures from MQ, MinRank, Rank SD and PKP Thibauld Feneuil
2022/1511 (PDF ) Round-Optimal Oblivious Transfer and MPC from Computational CSIDH Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar
2022/1510 (PDF ) Witness Encryption for Succinct Functional Commitments and Applications Matteo Campanelli, Dario Fiore, Hamidreza Khoshakhlagh
2022/1509 (PDF ) sVote with Control Components Voting Protocol. Computational Proof of Complete Verifiability and Privacy. Enrique Larraia, Tamara Finogina, Nuria Costa
2022/1508 (PDF ) Non-Interactive Publicly-Verifiable Delegation of Committed Programs Riddhi Ghosal, Amit Sahai, Brent Waters
2022/1507 (PDF ) Label Correlation in Deep Learning-based Side-channel Analysis Lichao Wu, Léo Weissbart, Marina Krček, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek
2022/1506 (PDF ) ORTOA: One Round Trip Oblivious Access Sujaya Maiyya, Yuval Steinhart, Divyakant Agrawal, Prabhanjan Ananth, Amr El Abbadi
2022/1505 (PDF ) Efficient Registration-Based Encryption Noemi Glaeser, Dimitris Kolonelos, Giulio Malavolta, Ahmadreza Rahimi
2022/1504 (PDF ) On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness Bar Alon, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky, Arpita Patra
2022/1503 (PDF ) The Parallel Reversible Pebbling Game: Analyzing the Post-Quantum Security of iMHFs Jeremiah Blocki, Blake Holman, Seunghoon Lee
2022/1502 (PDF ) Beyond Uber: Instantiating Generic Groups via PGGs Balthazar Bauer, Pooya Farshim, Patrick Harasser, Adam O'Neill
2022/1501 (PDF ) MinRank in the Head: Short Signatures from Zero-Knowledge Proofs Gora Adj, Luis Rivera-Zamarripa, Javier Verbel
2022/1500 (PDF ) Registered Attribute-Based Encryption Susan Hohenberger, George Lu, Brent Waters, David J. Wu
2022/1499 (PDF ) WrapQ: Side-Channel Secure Key Management for Post-Quantum Cryptography Markku-Juhani O. Saarinen
2022/1498 (PDF ) Simple, Fast, Efficient, and Tightly-Secure Non-Malleable Non-Interactive Timed Commitments Peter Chvojka, Tibor Jager
2022/1497 (PDF ) Lattice-Based Quantum Advantage from Rotated Measurements Yusuf Alnawakhtha, Atul Mantri, Carl A. Miller, Daochen Wang
2022/1496 (PDF ) Multiplicative Partially Homomorphic CRT Secret Sharing Shlomi Dolev, Yaniv Kleinman
2022/1495 (PDF ) Peregrine: Toward Fastest FALCON Based on GPV Framework Eun-Young Seo, Young-Sik Kim, Joon-Woo Lee, Jong-Seon No
2022/1494 (PDF ) The DAG KNIGHT Protocol: A Parameterless Generalization of Nakamoto Consensus Yonatan Sompolinsky, Michael Sutton
2022/1493 (PDF ) Enhanced pqsigRM: Code-Based Digital Signature Scheme with Short Signature and Fast Verification for Post-Quantum Cryptography Jinkyu Cho, Jong-Seon No, Yongwoo Lee, Zahyun Koo, Young-Sik Kim
2022/1492 (PDF ) A Control Theoretic Approach to Infrastructure-Centric Blockchain Tokenomics Oguzhan Akcin, Robert P. Streit, Benjamin Oommen, Sriram Vishwanath, Sandeep Chinchali
2022/1491 (PDF ) LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3 Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan
2022/1490 (PDF ) Efficient Gaussian sampling for RLWE-based cryptography through a fast Fourier transform Marcio Barbado Junior
2022/1489 (PDF ) On new results on Extremal Algebraic Graph Theory and their connections with Algebraic Cryptography Vasyl Ustimenko
2022/1488 (PDF ) Quagmire ciphers and group theory: What is a Beaufort cipher? Thomas Kaeding
2022/1487 (PDF ) An efficient verifiable state for zk-EVM and beyond from the Anemoi hash function Jianwei Liu, Harshad Patil, Akhil Sai Peddireddy, Kevin Singh, Haifeng Sun, Huachuang Sun, Weikeng Chen
2022/1486 (PDF ) Correlation Intractability and SNARGs from Sub-exponential DDH Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Jiaheng Zhang
2022/1485 (PDF ) Policy-Based Redactable Signatures Zachary A Kissel
2022/1484 (PDF ) Adaptive UC NIZK for Practical Applications Anna Lysyanskaya, Leah Namisa Rosenbloom
2022/1483 (PDF ) Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead Zoltán Ádám Mann, Christian Weinert, Daphnee Chabal, Joppe W. Bos
2022/1482 (PDF ) Multi-Point HashDH OPRF using Multiplicative Blinding with Application to Private Set Intersection Minglang Dong
2022/1481 (PDF ) Secure Messaging with Strong Compromise Resilience, Temporal Privacy, and Immediate Decryption Cas Cremers, Mang Zhao
2022/1480 (PDF ) A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption Benoit Chevallier-Mames
2022/1479 (PDF ) A Note on Constructing SIDH-PoK-based Signatures after Castryck-Decru Attack Jesús-Javier Chi-Domínguez
2022/1478 (PDF ) Limits on revocable proof systems, with applications to stateless blockchains Miranda Christ, Joseph Bonneau
2022/1477 (PDF ) A Post-Quantum Digital Signature Scheme from QC-LDPC Codes Christian Picozzi, Alessio Meneghetti, Giovanni Tognolini
2022/1476 (PDF ) The EVIL Machine: Encode, Visualize and Interpret the Leakage Valence Cristiani, Maxime Lecomte, Philippe Maurine
2022/1475 (PDF ) Quagmire ciphers and group theory: Recovering keywords from the key table Thomas Kaeding
2022/1474 (PDF ) Quantum security of subset cover problems Samuel Bouaziz--Ermann, Alex B. Grilo, Damien Vergnaud
2022/1473 (PDF ) A Hybrid of Lattice-reduction and Meet-LWE via Near-Collision on Babai's Plane Minki Hhan, Jiseung Kim, Changmin Lee, Yongha Son
2022/1472 (PDF ) Hardware-Supported Cryptographic Protection of Random Access Memory Roberto Avanzi, Ionut Mihalcea, David Schall, Héctor Montaner, Andreas Sandberg
2022/1471 (PDF ) Double Auction Meets Blockchain: Consensus from Scored Bid-Assignment Xiangyu Su, Xavier Défago, Mario Larangeira, Kazuyuki Mori, Takuya Oda, Yasumasa Tamura, Keisuke Tanaka
2022/1470 (PDF ) Casting out Primes: Bignum Arithmetic for Zero-Knowledge Proofs Daniel Lubarov, Jordi Baylina Melé
2022/1469 (PDF ) Supersingular Curves You Can Trust Andrea Basso, Giulio Codogni, Deirdre Connolly, Luca De Feo, Tako Boris Fouotsa, Guido Maria Lido, Travis Morrison, Lorenz Panny, Sikhar Patranabis, Benjamin Wesolowski
2022/1468 (PDF ) Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning Hao Guo, Sayandeep Saha, Satwik Patnaik, Vasudev Gohil, Debdeep Mukhopadhyay, Jeyavijayan (JV) Rajendran
2022/1467 (PDF ) A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences Emanuele Bellini, David Gerault, Anna Hambitzer, Matteo Rossi
2022/1466 (PDF ) I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groups Cyril Bouvier, Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie
2022/1465 (PDF ) Private Collaborative Data Cleaning via Non-Equi PSI Erik-Oliver Blass, Florian Kerschbaum
2022/1464 (PDF ) Parallel Isogeny Path Finding with Limited Memory Emanuele Bellini, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Andre Esser, Sorina Ionica, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez, Monika Trimoska, Floyd Zweydinger
2022/1463 (PDF ) How to Obfuscate MPC Inputs Ian McQuoid, Mike Rosulek, Jiayu Xu
2022/1461 (PDF ) ACORN: Input Validation for Secure Aggregation James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun
2022/1460 (PDF ) Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity Hyesun Kwak, Seonhong Min, Yongsoo Song
2022/1459 (PDF ) Circuit Privacy for FHEW/TFHE-Style Fully Homomorphic Encryption in Practice Kamil Kluczniak
2022/1458 (PDF ) Speeding-Up Elliptic Curve Cryptography Algorithms Diana Maimut, Alexandru Cristian Matei
2022/1457 (PDF ) Secure Non-Interactive Reducibility is Decidable Kaartik Bhushan, Ankit Kumar Misra, Varun Narayanan, Manoj Prabhakaran
2022/1456 (PDF ) Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan
2022/1455 (PDF ) Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications Kevin Yeo
2022/1454 (PDF ) Unjamming Lightning: A Systematic Approach Clara Shikhelman, Sergei Tikhomirov
2022/1453 (PDF ) Assisted MPC Philipp Muth, Stefan Katzenbeisser
2022/1452 (PDF ) A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber Yanning Ji, Ruize Wang, Kalle Ngo, Elena Dubrova, Linus Backlund
2022/1451 (PDF ) Attribute-Based Signatures for Range of Inner Product and Its Applications Masahito Ishizaka, Kazuhide Fukushima
2022/1450 (PDF ) Deterministic Wallets for Adaptor Signatures Andreas Erwig, Siavash Riahi
2022/1449 (PDF ) ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal
2022/1448 (PDF ) Towards Practical Sleepy BFT Dahlia Malkhi, Atsuki Momose, Ling Ren
2022/1447 (PDF ) flookup: Fractional decomposition-based lookups in quasi-linear time independent of table size Ariel Gabizon, Dmitry Khovratovich
2022/1446 (PDF ) Radical isogenies and modular curves Valentina Pribanić
2022/1445 (PDF ) Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules) Shanjie Xu, Qi Da, Chun Guo
2022/1444 (PDF ) Finding Three-Subset Division Property for Ciphers with Complex Linear Layers (Full Version) Debasmita Chakraborty
2022/1443 (PDF ) DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices Bo Yang, Yanchao Zhang, Dong Tong
2022/1442 (PDF ) FairPoS: Input Fairness in Permissionless Consensus James Hsin-yu Chiang, Bernardo David, Ittay Eyal, Tiantian Gong
2022/1441 (PDF ) Tighter Post-quantum Proof for Plain FDH, PFDH and GPV-IBE Yu Liu, Haodong Jiang, Yunlei Zhao
2022/1440 (PDF ) An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version) Marwan Zeggari, Renaud Lambiotte, Aydin Abadi, Louise Axon, Mohamad Kassab
2022/1439 (PDF ) Cryptographic Smooth Neighbors Giacomo Bruno, Maria Corte-Real Santos, Craig Costello, Jonathan Komada Eriksen, Michael Meyer, Michael Naehrig, Bruno Sterner
2022/1438 (PDF ) Plug-and-play sanitization for TFHE Florian Bourse, Malika Izabachène
2022/1437 (PDF ) Secure Multiparty Computation from Threshold Encryption Based on Class Groups Lennart Braun, Ivan Damgård, Claudio Orlandi
2022/1436 (PDF ) Efficient and Generic Transformations for Chosen-Ciphertext Secure Predicate Encryption Marloes Venema, Leon Botros
2022/1435 (PDF ) Eagle: Efficient Privacy Preserving Smart Contracts Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen
2022/1434 (PDF ) Weightwise almost perfectly balanced functions: secondary constructions for all $n$ and better weightwise nonlinearities Agnese Gini, Pierrick Méaux
2022/1433 (PDF ) BG: A Modular Treatment of BFT Consensus Xiao Sui, Sisi Duan, Haibin Zhang
2022/1432 (PDF ) A Lattice-based Ring Signature Scheme Secure against Key Exposure Xiaoling Yu, Yuntao Wang
2022/1431 (PDF ) Half-Tree: Halving the Cost of Tree Expansion in COT and DPF Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, Zheli Liu
2022/1430 (PDF ) Indistinguishability Obfuscation via Mathematical Proofs of Equivalence Abhishek Jain, Zhengzhong Jin
2022/1429 (PDF ) Collusion Resistant Copy-Protection for Watermarkable Functionalities Jiahui Liu, Qipeng Liu, Luowen Qian, Mark Zhandry
2022/1428 (PDF ) TrustBoost: Boosting Trust among Interoperable Blockchains Xuechao Wang, Peiyao Sheng, Sreeram Kannan, Kartik Nayak, Pramod Viswanath
2022/1427 (PDF ) Improved Quantum Analysis of SPECK and LowMC (Full Version) Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Hwajeong Seo, Anupam Chattopadhyay
2022/1425 (PDF ) Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, Vincent Migliore, Mamuri Nawan, Kashif Nawaz
2022/1424 (PDF ) DeFi That Defies: Imported Off-Chain Metrics and Pseudonymous On-Chain Activity David W. Kravitz, Mollie Z. Halverson
2022/1423 (PDF ) The Superlinearity Problem in Post-Quantum Blockchains Sunoo Park, Nicholas Spooner
2022/1422 (PDF ) Unlinkable Policy-based Sanitizable Signatures Ismail Afia, Riham AlTawy
2022/1421 (PDF ) Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus Shravan Srinivasan, Julian Loss, Giulio Malavolta, Kartik Nayak, Charalampos Papamanthou, Sri AravindaKrishnan Thyagarajan
2022/1420 (PDF ) Diamonds are Forever, Loss-Versus-Rebalancing is Not Conor McMenamin, Vanesa Daza, Bruno Mazorra
2022/1419 (PDF ) Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk, Nicholas Spooner
2022/1418 (PDF ) Da Yan Concentrator and Extender of Random Data (DYCE) Anna M. Johnston, Puru Kulkarni
2022/1417 (PDF ) Efficient Dynamic Proof of Retrievability for Cold Storage Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang
2022/1416 (PDF ) Side-Channel Attack Countermeasures Based On Clock Randomization Have a Fundamental Flaw Martin Brisfors, Michail Moraitis, Elena Dubrova
2022/1415 (PDF ) FABEO: Fast Attribute-Based Encryption with Optimal Security Doreen Riepel, Hoeteck Wee
2022/1414 (PDF ) INT-RUP Security of SAEB and TinyJAMBU Nilanjan Datta, Avijit Dutta, Shibam Ghosh
2022/1413 (PDF ) How to Compress Encrypted Data Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
2022/1412 (PDF ) Algorithm xxx: Evaluating a Boolean Polynomial on All Possible Inputs Charles Bouillaguet
2022/1411 (PDF ) Cryptographic Administration for Secure Group Messaging David Balbás, Daniel Collins, Serge Vaudenay
2022/1410 (PDF ) Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware Hauke Steffen, Georg Land, Lucie Kogelheide, Tim Güneysu
2022/1409 (PDF ) SNARGs and PPAD Hardness from the Decisional Diffie-Hellman Assumption Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan
2022/1408 (PDF ) BRAKE: Biometric Resilient Authenticated Key Exchange Pia Bauspieß, Tjerand Silde, Matej Poljuha, Alexandre Tullot, Anamaria Costache, Christian Rathgeb, Jascha Kolberg, Christoph Busch
2022/1407 (PDF ) Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head Thibauld Feneuil, Matthieu Rivain
2022/1406 (PDF ) Protecting Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Markus Schönauer, Tobias Schneider, François-Xavier Standaert, Christine van Vredendaal
2022/1405 (PDF ) Subverting Deniability Marcel Armour, Elizabeth A. Quaglia
2022/1404 (PDF ) Reducing an LWE Instance by Modular Hints and its Applications to Primal Attack, Dual Attack and BKW Attack Han Wu, Xiaoyun Wang, Guangwu Xu
2022/1403 (PDF ) On the Dual Attack of LWE Schemes in the Presence of Hints Han Wu, Xiaoyun Wang, Guangwu Xu
2022/1401 (PDF ) PIRANA: Faster Multi-query PIR via Constant-weight Codes Jian Liu, Jingyu Li, Di Wu, Kui Ren
2022/1400 (PDF ) EdMSM: Multi-Scalar-Multiplication for SNARKs and Faster Montgomery multiplication Youssef El Housni, Gautam Botrel
2022/1399 (PDF ) Low-latency implementation of the GIFT cipher on RISC-V architectures Gheorghe Pojoga, Kostas Papagiannopoulos
2022/1398 (PDF ) MILP-aided Cryptanalysis of the FUTURE Block Cipher Murat Burhan İlter, Ali Aydin Selcuk
2022/1397 (PDF ) Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees Giovanni Deligios, Chen-Da Liu-Zhang
2022/1396 (PDF ) FPGA Acceleration of Multi-Scalar Multiplication: CycloneMSM Kaveh Aasaraai, Don Beaver, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela
2022/1395 (PDF ) Non-Interactive Anonymous Router with Quasi-Linear Router Computation Rex Fernando, Elaine Shi, Pratik Soni, Nikhil Vanjani, Brent Waters
2022/1394 (PDF ) Risky Translations: Securing TLBs against Timing Side Channels Florian Stolz, Jan Philipp Thoma, Pascal Sasdrich, Tim Güneysu
2022/1393 (PDF ) Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams Dario Fiore, Ida Tucker
2022/1392 (PDF ) A Faster Third-Order Masking of Lookup Tables Anju Alexander, Annapurna Valiveti, Srinivas Vivek
2022/1391 (PDF ) Efficient Noise Generation Protocols for Differentially Private Multiparty Computation Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida
2022/1390 (PDF ) Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures Reo Eriguchi, Noboru Kunihiro, Koji Nuida
2022/1389 (PDF ) Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren
2022/1388 (PDF ) MIPS Assembly Language Implementation of GIFT-64-128 Encryption William Diehl
2022/1387 (PDF ) AIM: Symmetric Primitive for Shorter Signatures with Stronger Security (Full Version) Seongkwang Kim, Jincheol Ha, Mincheol Son, Byeonghak Lee, Dukjae Moon, Joohee Lee, Sangyub Lee, Jihoon Kwon, Jihoon Cho, Hyojin Yoon, Jooyoung Lee
2022/1386 (PDF ) A multivariate noise-free HE proposal Gerald Gavin, Sandrine Tainturier
2022/1385 (PDF ) Deep Reinforcement Learning-based Rebalancing Policies for Profit Maximization of Relay Nodes in Payment Channel Networks Nikolaos Papadis, Leandros Tassiulas
2022/1384 (PDF ) Non-uniformity and Quantum Advice in the Random Oracle Model Qipeng Liu
2022/1383 (PDF ) Sublinear-Round Broadcast without Trusted Setup against Dishonest Majority Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos
2022/1382 (PDF ) Quagmire ciphers, group theory, and information: Key amplification in crib-based attacks Thomas Kaeding
2022/1381 (PDF ) How to backdoor LWE-like cryptosystems Tobias Hemmert
2022/1380 (PDF ) Post-Quantum Zero-Knowledge with Space-Bounded Simulation Prabhanjan Ananth, Alex B. Grilo
2022/1379 (PDF ) Zero-Knowledge Optimal Monetary Policy under Stochastic Dominance David Cerezo Sánchez
2022/1378 (PDF ) A Fast Hash Family for Memory Integrity Qiming Li, Sampo Sovio
2022/1377 (PDF ) Improved Differential and Linear Trail Bounds for ASCON Solane El Hirch, Silvia Mella, Alireza Mehrdad, Joan Daemen
2022/1376 (PDF ) Modeling Effective Lifespan of Payment Channels Soheil Zibakhsh Shabgahi, Seyed Mahdi Hosseini, Seyed Pooya Shariatpanahi, Behnam Bahrak
2022/1375 (PDF ) From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments Minki Hhan, Tomoyuki Morimae, Takashi Yamakawa
2022/1374 (PDF ) Efficient Public Key Searchable Encryption Schemes from Standard Hard Lattice Problems for Cloud Computing Lijun Qi, Jincheng Zhuang
2022/1373 (PDF ) ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou
2022/1372 (PDF ) Security and Quantum Computing: An Overview Prasannna Ravi, Anupam Chattopadhyay, Shivam Bhasin
2022/1371 (PDF ) On the Security of KOS Benjamin E. Diamond
2022/1370 (PDF ) A New Post-Quantum Key Agreement Protocol and Derived Cryptosystem Based on Rectangular Matrices Hugo Daniel Scolnik, Juan Pedro Hecht
2022/1369 (PDF ) Network-Agnostic Security Comes (Almost) for Free in DKG and MPC Renas Bacho, Daniel Collins, Chen-Da Liu-Zhang, Julian Loss
2022/1368 (PDF ) Functional Commitments for All Functions, with Transparent Setup and from SIS Leo de Castro, Chris Peikert
2022/1367 (PDF ) Agile Cryptography: A Universally Composable Approach Christian Badertscher, Michele Ciampi, Aggelos Kiayias
2022/1366 (PDF ) Two remarks on the vectorization problem Wouter Castryck, Natan Vander Meeren
2022/1365 (PDF ) Chainable Functional Commitments for Unbounded-Depth Circuits David Balbás, Dario Catalano, Dario Fiore, Russell W. F. Lai
2022/1364 (PDF ) On Polynomial Functions Modulo $p^e$ and Faster Bootstrapping for Homomorphic Encryption Robin Geelen, Ilia Iliashenko, Jiayi Kang, Frederik Vercauteren
2022/1363 (PDF ) Bootstrapping for BGV and BFV Revisited Robin Geelen, Frederik Vercauteren
2022/1362 (PDF ) ALLOSAUR: Accumulator with Low-Latency Oblivious Sublinear Anonymous credential Updates with Revocations Samuel Jaques, Michael Lodder, Hart Montgomery
2022/1361 (PDF ) Correlation Electromagnetic Analysis on an FPGA Implementation of CRYSTALS-Kyber Rafael Carrera Rodriguez, Florent Bruguier, Emanuele Valea, Pascal Benoit
2022/1360 (PDF ) One for All, All for One: A Unified Evaluation Framework for Univariate DPA Attacks Jiangshan Long, Chenxu Wang, Changhai Ou, Zhu Wang, Yongbin Zhou, Ming Tang
2022/1359 (PDF ) Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model Haruhisa Kosuge, Keita Xagawa
2022/1358 (PDF ) Commitments to Quantum States Sam Gunn, Nathan Ju, Fermi Ma, Mark Zhandry
2022/1357 (PDF ) A Theory of Composition for Differential Obliviousness Mingxun Zhou, Elaine Shi, T-H. Hubert Chan, Shir Maimon
2022/1356 (PDF ) A fully classical LLL algorithm for modules Gabrielle De Micheli, Daniele Micciancio
2022/1355 (PDF ) HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates Binyi Chen, Benedikt Bünz, Dan Boneh, Zhenfei Zhang
2022/1354 (PDF ) Embracing Hellman: A Simple Proof-of-Space Search consensus algorithm with stable block times using Logarithmic Embargo Marijn F. Stollenga
2022/1353 (PDF ) Anonymous Permutation Routing Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky
2022/1352 (PDF ) aPlonK : Aggregated PlonK from Multi-Polynomial Commitment Schemes Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt, Raphaël R. Toledo
2022/1351 (PDF ) Better Steady than Speedy: Full break of SPEEDY-7-192 Christina Boura, Nicolas David, Rachelle Heim Boissier, Maria Naya-Plasencia
2022/1350 (PDF ) Rai-Choo! Evolving Blind Signatures to the Next Level Lucjan Hanzlik, Julian Loss, Benedikt Wagner
2022/1349 (PDF ) Invertibility of multiple random functions and its application to symmetric ciphers Xiutao Feng, Xiaoshan GAO, Zhangyi WANG, Xiangyong ZENG
2022/1348 (PDF ) ABE for DFA from LWE against Bounded Collusions, Revisited Hoeteck Wee
2022/1347 (PDF ) Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada
2022/1346 (PDF ) Generic Signature from Noisy Systems Trey Li
2022/1345 (PDF ) Revisiting Security Estimation for LWE with Hints from a Geometric Perspective Dana Dachman-Soled, Huijing Gong, Tom Hanson, Hunter Kippen
2022/1344 (PDF ) Discrete Exponential Equations and Noisy Systems Trey Li
2022/1343 (PDF ) Refined Strategy for Solving LWE in Two-step Mode Wenwen Xia, Leizhang Wang, GengWang, Dawu Gu, Baocang Wang
2022/1342 (PDF ) Block Cipher Doubling for a Post-Quantum World Ritam Bhaumik, André Chailloux, Paul Frixons, Bart Mennink, María Naya-Plasencia
2022/1341 (PDF ) LaBRADOR: Compact Proofs for R1CS from Module-SIS Ward Beullens, Gregor Seiler
2022/1340 (PDF ) Understanding the Duplex and Its Security Bart Mennink
2022/1339 (PDF ) CCA-1 Secure Updatable Encryption with Adaptive Security Huanhuan Chen, Yao Jiang Galteland, Kaitai Liang
2022/1338 (PDF ) Privacy-Preserving Authenticated Key Exchange: Stronger Privacy and Generic Constructions Sebastian Ramacher, Daniel Slamanig, Andreas Weninger
2022/1337 (PDF ) How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium Timo Glaser, Alexander May
2022/1336 (PDF ) One-Wayness in Quantum Cryptography Tomoyuki Morimae, Takashi Yamakawa
2022/1335 (PDF ) Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective Kai Hu, Thomas Peyrin, Quan Quan Tan, Trevor Yap
2022/1334 (PDF ) Post-Quantum Signature from Subset Product with Errors Trey Li
2022/1333 (PDF ) Fast Fully Oblivious Compaction and Shuffling Sajin Sasy, Aaron Johnson, Ian Goldberg
2022/1332 (PDF ) On the Classic Protocol for MPC Schnorr Signatures Nikolaos Makriyannis
2022/1331 (PDF ) Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures Dario Catalano, Dario Fiore, Ida Tucker
2022/1330 (PDF ) Hybrid Dual and Meet-LWE Attack Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang
2022/1329 (PDF ) New Time-Memory Trade-Offs for Subset Sum -- Improving ISD in Theory and Practice Andre Esser, Floyd Zweydinger
2022/1328 (PDF ) Revisiting Nearest-Neighbor-Based Information Set Decoding Andre Esser
2022/1327 (PDF ) Post-Quantum Public Key Cryptosystem from Subset Product with Errors Trey Li
2022/1326 (PDF ) Survey: Non-malleable code in the split-state model Divesh Aggarwal, Marshall Ball, Maciej Obremski
2022/1325 (PDF ) Efficient and Complete Formulas for Binary Curves Thomas Pornin
2022/1324 (PDF ) Adaptive Multiparty NIKE Venkata Koppula, Brent Waters, Mark Zhandry
2022/1323 (PDF ) On Constructing One-Way Quantum State Generators, and More Shujiao Cao, Rui Xue
2022/1322 (PDF ) Efficient Linkable Ring Signature from Vector Commitment inexplicably named Multratug Anton A. Sokolov
2022/1321 (PDF ) cuZK: Accelerating Zero-Knowledge Proof with A Faster Parallel Multi-Scalar Multiplication Algorithm on GPUs Tao Lu, Chengkun Wei, Ruijing Yu, Chaochao Chen, Wenjing Fang, Lei Wang, Zeke Wang, Wenzhi Chen
2022/1320 (PDF ) Boosting Batch Arguments and RAM Delegation Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
2022/1319 (PDF ) Post-Quantum Key Exchange from Subset Product With Errors Trey Li
2022/1318 (PDF ) General Partially Fair Multi-Party Computation with VDFs Bolton Bailey, Andrew Miller, Or Sattath
2022/1317 (PDF ) On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption Aayush Jain, Huijia Lin, Ji Luo
2022/1316 (PDF ) TurboPack: Honest Majority MPC with Constant Online Communication Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song
2022/1315 (PDF ) Hitchhiker’s Guide to a Practical Automated TFHE Parameter Setup for Custom Applications Jakub Klemsa
2022/1314 (PDF ) Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer
2022/1313 (PDF ) Bounded Surjective Quadratic Functions over $\mathbb F_p^n$ for MPC-/ZK-/FHE-Friendly Symmetric Primitives Lorenzo Grassi
2022/1312 (PDF ) Multiple Modular Unique Factorization Domain Subset Product with Errors Trey Li
2022/1311 (PDF ) Fully Adaptive Decentralized Multi-Authority ABE Pratish Datta, Ilan Komargodski, Brent Waters
2022/1310 (PDF ) Power Residue Symbol Order Detecting Algorithm for Subset Product over Algebraic Integers Trey Li
2022/1309 (PDF ) MPC as a service using Ethereum Registry Smart Contracts - dCommon CIP Matt Shams(Anis), Bingsheng Zhang, Justinas Zaliaduonis
2022/1308 (PDF ) Jacobi Symbol Parity Checking Algorithm for Subset Product Trey Li
2022/1307 (PDF ) BLOOM: Bimodal Lattice One-Out-of-Many Proofs and Applications Vadim Lyubashevsky, Ngoc Khanh Nguyen
2022/1306 (PDF ) Single-shuffle Full-open Card-based Protocols Imply Private Simultaneous Messages Protocols Kazumasa Shinagawa, Koji Nuida
2022/1305 (PDF ) Subset Product with Errors over Unique Factorization Domains and Ideal Class Groups of Dedekind Domains Trey Li
2022/1304 (PDF ) Unifying Quantum Verification and Error-Detection: Theory and Tools for Optimisations Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier
2022/1303 (PDF ) Fast and Clean: Auditable high-performance assembly via constraint solving Amin Abdulrahman, Hanno Becker, Matthias J. Kannwischer, Fabien Klein
2022/1302 (PDF ) Private Certifier Intersection Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty
2022/1300 (PDF ) Garrison: A Novel Watchtower Scheme for Bitcoin Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
2022/1299 (PDF ) Addax: A fast, private, and accountable ad exchange infrastructure Ke Zhong, Yiping Ma, Yifeng Mao, Sebastian Angel
2022/1298 (PDF ) BLEACH: Cleaning Errors in Discrete Computations over CKKS Nir Drucker, Guy Moshkowich, Tomer Pelleg, Hayim Shaul
2022/1297 (PDF ) Toward a Post-Quantum Zero-Knowledge Verifiable Credential System for Self-Sovereign Identity Simone Dutto, Davide Margaria, Carlo Sanna, Andrea Vesco
2022/1296 (PDF ) Efficient Asymmetric Threshold ECDSA for MPC-based Cold Storage Constantin Blokh, Nikolaos Makriyannis, Udi Peled
2022/1295 (PDF ) Daric: A Storage Efficient Payment Channel With Penalization Mechanism Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
2022/1294 (PDF ) What Can Cryptography Do For Decentralized Mechanism Design? Elaine Shi, Hao Chung, Ke Wu
2022/1293 (PDF ) Improving the Efficiency of Report and Trace Ring Signatures Xavier Bultel, Ashley Fraser, Elizabeth A. Quaglia
2022/1292 (PDF ) Bet-or-Pass: Adversarially Robust Bloom Filters Moni Naor, Noa Oved
2022/1291 (PDF ) sMGM: parameterizable AEAD-mode Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev
2022/1290 (PDF ) Bool Network: An Open, Distributed, Secure Cross-chain Notary Platform Zeyuan Yin, Bingsheng Zhang, Jingzhong Xu, Kaiyu Lu, Kui Ren
2022/1289 (PDF ) Exploring RNS for Isogeny-based Cryptography David Jacquemin, Ahmet Can Mert, Sujoy Sinha Roy
2022/1288 (PDF ) Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2022/1287 (PDF ) On a Conjecture From a Failed CryptoAnalysis Shengtong Zhang
2022/1286 (PDF ) ZEBRA: SNARK-based Anonymous Credentials for Practical, Private and Accountable On-chain Access Control Deevashwer Rathee, Guru Vamsi Policharla, Tiancheng Xie, Ryan Cottone, Dawn Song
2022/1285 (PDF ) Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption Mohammad Mahmoody, Wei Qi, Ahmadreza Rahimi
2022/1284 (PDF ) (Inner-Product) Functional Encryption with Updatable Ciphertexts Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi
2022/1283 (PDF ) A Note on Reimplementing the Castryck-Decru Attack and Lessons Learned for SageMath Rémy Oudompheng, Giacomo Pope
2022/1282 (PDF ) Comparing Key Rank Estimation Methods Rebecca Young, Luke Mather, Elisabeth Oswald
2022/1281 (PDF ) LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X Zheng Yang, Tien Tuan Anh Dinh, Chao Yin, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou
2022/1280 (PDF ) Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou
2022/1278 (PDF ) Fast Evaluation of S-boxes with Garbled Circuits Erik Pohle, Aysajan Abidin, Bart Preneel
2022/1277 (PDF ) Compact GF(2) systemizer and optimized constant-time hardware sorters for Key Generation in Classic McEliece Yihong Zhu, Wenping Zhu, Chen Chen, Min Zhu, Zhengdong Li, Shaojun Wei, Leibo Liu
2022/1276 (PDF ) Second-Order Low-Randomness $d+1$ Hardware Sharing of the AES Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi
2022/1275 (PDF ) DiAE: Re-rolling the DiSE Alexandre Duc, Robin Müller, Damian Vizár
2022/1274 (PDF ) Self Masking for Hardering Inversions Paweł Cyprys, Shlomi Dolev, Shlomo Moran
2022/1273 (PDF ) A Conjecture From a Failed Cryptanalysis David Naccache, Ofer Yifrach-Stav
2022/1272 (PDF ) PPAD is as Hard as LWE and Iterated Squaring Nir Bitansky, Arka Rai Choudhuri, Justin Holmgren, Chethan Kamath, Alex Lombardi, Omer Paneth, Ron D. Rothblum
2022/1271 (PDF ) Privacy-preserving Federated Singular Value Decomposition Bowen LIU, Balázs Pejó, Qiang TANG
2022/1270 (PDF ) Typing High-Speed Cryptography against Spectre v1 Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, Peter Schwabe, Lucas Tabary-Maujean
2022/1269 (PDF ) Collusion-Resistant Functional Encryption for RAMs Prabhanjan Ananth, Kai-Min Chung, Xiong Fan, Luowen Qian
2022/1268 (PDF ) Cryptographic Role-Based Access Control, Reconsidered Bin Liu, Antonis Michalas, Bogdan Warinschi
2022/1266 (PDF ) Asymptotically Free Broadcast in Constant Expected Time via Packed VSS Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
2022/1265 (PDF ) Universal Ring Signatures in the Standard Model Pedro Branco, Nico Döttling, Stella Wohnig
2022/1264 (PDF ) Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with application to Key Transparency Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou
2022/1263 (PDF ) Steganography-Free Zero-Knowledge Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta
2022/1262 (PDF ) Vectorized Batch Private Information Retrieval Muhammad Haris Mughees, Ling Ren
2022/1261 (PDF ) Breaking RSA Generically is Equivalent to Factoring, with Preprocessing Dana Dachman-Soled, Julian Loss, Adam O'Neill
2022/1260 (PDF ) On Committing Authenticated Encryption John Chan, Phillip Rogaway
2022/1259 (PDF ) Horizontal racewalking using radical isogenies Wouter Castryck, Thomas Decru, Marc Houben, Frederik Vercauteren
2022/1258 (PDF ) Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications Xiangyu Liu, Shengli Liu, Dawu Gu
2022/1257 (PDF ) One-Time Programs from Commodity Hardware Harry Eldridge, Aarushi Goel, Matthew Green, Abhishek Jain, Maximilian Zinkus
2022/1256 (PDF ) EvalRound Algorithm in CKKS Bootstrapping Seonghak Kim, Minji Park, Jaehyung Kim, Taekyung Kim, Chohong Min
2022/1255 (PDF ) PLUME: An ECDSA Nullifier Scheme for Unique Pseudonymity within Zero Knowledge Proofs Aayush Gupta, Kobi Gurkan
2022/1254 (PDF ) Protecting the most significant bits in scalar multiplication algorithms Estuardo Alpirez Bock, Lukasz Chmielewski, Konstantina Miteloudi
2022/1253 (PDF ) A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda
2022/1252 (PDF ) Functional Encryption with Secure Key Leasing Fuyuki Kitagawa, Ryo Nishimaki
2022/1251 (PDF ) Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup Nan Wang, Sid Chi-Kin Chau
2022/1250 (PDF ) Eureka: A General Framework for Black-box Differential Privacy Estimators Yun Lu, Malik Magdon-Ismail, Yu Wei, Vassilis Zikas
2022/1249 (PDF ) On Rejection Sampling in Lyubashevsky's Signature Scheme Julien Devevey, Omar Fawzi, Alain Passelègue, Damien Stehlé
2022/1248 (PDF ) Fully-Secure MPC with Minimal Trust Yuval Ishai, Arpita Patra, Sikhar Patranabis, Divya Ravi, Akshayaram Srinivasan
2022/1247 (PDF ) Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin
2022/1246 (PDF ) Identity-Based Matchmaking Encryption from Standard Assumptions Jie Chen, Yu Li, Jinming Wen, Jian Weng
2022/1245 (PDF ) On generalizations of the Lai-Massey scheme Lorenzo Grassi
2022/1244 (PDF ) A Modular Approach to the Security Analysis of Two-Permutation Constructions Yu Long Chen
2022/1243 (PDF ) Hybrid scalar/vector implementations of Keccak and SPHINCS+ on AArch64 Hanno Becker, Matthias J. Kannwischer
2022/1242 (PDF ) Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies Amos Treiber, Dirk Müllmann, Thomas Schneider, Indra Spiecker genannt Döhmann
2022/1241 (PDF ) Continued Fractions Applied to a Family of RSA-like Cryptosystems George Teseleanu, Paul Cotan
2022/1240 (PDF ) Sherlock Holmes Zero-Knowledge Protocols George Teseleanu
2022/1239 (PDF ) Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu
2022/1238 (PDF ) Secure Quantum Bit Commitment Ping Wang, Yiting Su, Fangguo Zhang
2022/1237 (PDF ) On the Worst-Case Inefficiency of CGKA Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg, Garrison Grogan, Mohammad Hajiabadi, Paul Rösler
2022/1236 (PDF ) Rate-1 Non-Interactive Arguments for Batch-NP and Applications Lalita Devadas, Rishab Goyal, Yael Kalai, Vinod Vaikuntanathan
2022/1235 (PDF ) QCCA-Secure Generic Transformations in the Quantum Random Oracle Model Tianshu Shan, Jiangxia Ge, Rui Xue
2022/1234 (PDF ) Towards Tight Security Bounds for OMAC, XCBC and TMAC Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
2022/1233 (PDF ) Forward-Secure Encryption with Fast Forwarding Yevgeniy Dodis, Daniel Jost, Harish Karthikeyan
2022/1232 (PDF ) The Abe-Okamoto Partially Blind Signature Scheme Revisited Julia Kastner, Julian Loss, Jiayu Xu
2022/1231 (PDF ) Continuously Non-Malleable Codes against Bounded-Depth Tampering Gianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi
2022/1230 (PDF ) Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel
2022/1229 (PDF ) Cumulatively All-Lossy-But-One Trapdoor Functions from Standard Assumptions Benoît Libert, Ky Nguyen, Alain Passelègue
2022/1228 (PDF ) SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno
2022/1227 (PDF ) How to Sample a Discrete Gaussian (and more) from a Random Oracle George Lu, Brent Waters
2022/1226 (PDF ) Algebraic Relation of Three MinRank Algebraic Modelings Hao Guo, Jintai Ding
2022/1225 (PDF ) Hybrid Post-Quantum Signatures in Hardware Security Keys Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, Elie Bursztein
2022/1224 (PDF ) From Plaintext-extractability to IND-CCA Security Ehsan Ebrahimi
2022/1223 (PDF ) Efficient Proofs of Software Exploitability for Real-world Processors Matthew Green, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer
2022/1222 (PDF ) Homomorphic Encryption on GPU Ali Şah Özcan, Can Ayduman, Enes Recep Türkoğlu, Erkay Savaş
2022/1221 (PDF ) Multi-User Security of the Sum of Truncated Random Permutations (Full Version) Wonseok Choi, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee
2022/1220 (PDF ) Permissionless Clock Synchronization with Public Setup Juan Garay, Aggelos Kiayias, Yu Shen
2022/1219 (PDF ) Anonymous Random Allocation and Its Applications; Generalizing Single Secret Leader Election Azam Soleimanian
2022/1218 (PDF ) Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies Jiahui He, Kai Hu, Bart Preneel, Meiqin Wang
2022/1217 (PDF ) Privacy-Preserving Authenticated Key Exchange in the Standard Model You Lyu, Shengli Liu, Shuai Han, Dawu Gu
2022/1216 (PDF ) A summary on the FRI low degree test Ulrich Haböck
2022/1215 (PDF ) Continuous Authentication in Secure Messaging Benjamin Dowling, Felix Günther, Alexandre Poirrier
2022/1214 (PDF ) Updatable NIZKs from Non-Interactive Zaps Karim Baghery, Navid Ghaedi Bardeh
2022/1213 (PDF ) Nostradamus goes Quantum Barbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert
2022/1212 (PDF ) VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections David Chaum, Richard T. Carback, Jeremy Clark, Chao Liu, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Mario Yaksetig, Zeyuan Yin, Filip Zagórski, Bingsheng Zhang
2022/1211 (PDF ) Arithmetization of Functional Program Execution via Interaction Nets in Halo 2 Anthony Hart
2022/1210 (PDF ) On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC (Full Version) Jiamin Cui, Kai Hu, Meiqin Wang, Puwen Wei
2022/1209 (PDF ) Puncturable Key Wrapping and Its Applications Matilda Backendal, Felix Günther, Kenneth G. Paterson
2022/1208 (PDF ) Notes on Reusable Garbling Hu Yupu, Dong Siyue, Wang Baocang, Liu Jun
2022/1207 (PDF ) Attaining GOD Beyond Honest Majority With Friends and Foes Aditya Hegde, Nishat Koti, Varsha Bhat Kukkala, Shravani Patil, Arpita Patra, Protik Paul
2022/1206 (PDF ) On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2022/1205 (PDF ) Accountable Light Client Systems for Proof-of-Stake Blockchains Oana Ciobotaru, Fatemeh Shirazi, Alistair Stewart, Sergey Vasilyev
2022/1204 (PDF ) The Pseudorandom Oracle Model and Ideal Obfuscation Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs
2022/1203 (PDF ) On Module Unique-SVP and NTRU Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé
2022/1202 (PDF ) Disorientation faults in CSIDH Gustavo Banegas, Juliane Krämer, Tanja Lange, Michael Meyer, Lorenz Panny, Krijn Reijnders, Jana Sotáková, Monika Trimoska
2022/1201 (PDF ) Leakage Certification Made Simple Aakash Chowdhury, Carlo Brunetta, Arnab Roy, Elisabeth Oswald
2022/1200 (PDF ) SEEK: model extraction attack against hybrid secure inference protocols Si Chen, Junfeng Fan
2022/1199 (PDF ) Structure Evaluation of AES-like Ciphers against Mixture Differential Cryptanalysis Xiaofeng Xie, Tian Tian
2022/1198 (PDF ) To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures Alexander Wagner, Felix Oberhansl, Marc Schink
2022/1197 (PDF ) On Squaring Modulo Mersenne Numbers David Naccache, Ofer Yifrach-Stav
2022/1196 (PDF ) Embedded Identity Traceable Identity-Based IPFE from Pairings and Lattices Subhranil Dutta, Tapas Pal, Amit Kumar Singh, Sourav Mukhopadhyay
2022/1195 (PDF ) A Deep Neural Differential Distinguisher for ARX based Block Cipher Debranjan Pal, Upasana Mandal, Mainak Chaudhury, Abhijit Das, Dipanwita Roy Chowdhury
2022/1194 (PDF ) Multi-Authority ABE from Lattices without Random Oracles Brent Waters, Hoeteck Wee, David J. Wu
2022/1193 (PDF ) Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity Yi Deng, Xinxuan Zhang
2022/1192 (PDF ) (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard Anaïs Barthoulot, Olivier Blazy, Sébastien Canard
2022/1191 (PDF ) A New Framework for Quantum Oblivious Transfer Amit Agarwal, James Bartusek, Dakshita Khurana, Nishant Kumar
2022/1190 (PDF ) Statistical Security in Two-Party Computation Revisited Saikrishna Badrinarayanan, Sikhar Patranabis, Pratik Sarkar
2022/1189 (PDF ) CSI-SharK: CSI-FiSh with Sharing-friendly Keys Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
2022/1188 (PDF ) High-order masking of NTRU Jean-Sebastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun
2022/1187 (PDF ) Strongly Anonymous Ratcheted Key Exchange Benjamin Dowling, Eduard Hauck, Doreen Riepel, Paul Rösler
2022/1186 (PDF ) Adversarial Correctness and Privacy for Probabilistic Data Structures Mia Filić, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia
2022/1185 (PDF ) PEA: Practical private epistasis analysis using MPC Kay Hamacher, Tobias Kussel, Thomas Schneider, Oleksandr Tkachenko
2022/1184 (PDF ) On digital signatures based on group actions: QROM security and ring signatures Markus Bläser, Zhili Chen, Dung Hoang Duong, Antoine Joux, Ngoc Tuong Nguyen, Thomas Plantard, Youming Qiao, Willy Susilo, Gang Tang
2022/1183 (PDF ) Fast and Efficient Hardware Implementation of HQC Sanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz, Jakub Szefer
2022/1182 (PDF ) Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co Constantin Cătălin Drăgan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg
2022/1181 (PDF ) On the computational hardness needed for quantum cryptography Zvika Brakerski, Ran Canetti, Luowen Qian
2022/1180 (PDF ) Cryptographic multilinear maps using pro-p groups Delaram Kahrobaei, Mima Stanojkovski
2022/1179 (PDF ) Trustless Cross-chain Communication for Zendoo Sidechains Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
2022/1178 (PDF ) Cryptography with Certified Deletion James Bartusek, Dakshita Khurana
2022/1177 (PDF ) Liberating TFHE: Programmable Bootstrapping with General Quotient Polynomials Marc Joye, Michael Walter
2022/1176 (PDF ) Anonymous Public Key Encryption under Corruptions Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng
2022/1174 (PDF ) Ibex: Privacy-preserving ad conversion tracking and bidding (full version) Ke Zhong, Yiping Ma, Sebastian Angel
2022/1173 (PDF ) Secure Maximum Weight Matching Approximation on General Graphs (Full Version) Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer
2022/1172 (PDF ) On the Security of Keyed Hashing Based on Public Permutations Jonathan Fuchs, Yann Rotella, Joan Daemen
2022/1171 (PDF ) Goldfish: No More Attacks on Ethereum?! Francesco D'Amato, Joachim Neu, Ertem Nusret Tas, David Tse
2022/1170 (PDF ) TRIFORS: LINKable Trilinear Forms Ring Signature Giuseppe D'Alconzo, Andrea Gangemi
2022/1169 (PDF ) DyCAPS: Asynchronous Dynamic-committee Proactive Secret Sharing Bin Hu, Zongyang Zhang, Han Chen, You Zhou, Huazu Jiang, Jianwei Liu
2022/1168 (PDF ) Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality Shweta Agrawal, Rishab Goyal, Junichi Tomida
2022/1167 (PDF ) META-BTS: Bootstrapping Precision Beyond the Limit Youngjin Bae, Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Taekyung Kim
2022/1166 (PDF ) McEliece-type encryption based on Gabidulin codes with no hidden structure Wenshuo Guo, Fang-Wei Fu
2022/1165 (PDF ) A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti
2022/1164 (PDF ) Point-Halving and Subgroup Membership in Twisted Edwards Curves Thomas Pornin
2022/1163 (PDF ) A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding Yuanyuan Zhou, Joop van de Pol, Yu Yu, François-Xavier Standaert
2022/1162 (PDF ) Pairings in Rank-1 Constraint Systems Youssef El Housni
2022/1161 (PDF ) Group-based Cryptography in the Quantum Era Delaram Kahrobaei, Ramón Flores, Marialaura Noce
2022/1160 (PDF ) The Scholz conjecture on addition chain is true for $v(n)= 4$ Amadou TALL
2022/1159 (PDF ) Decomposing Linear Layers Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom
2022/1158 (PDF ) Differential Cryptanalysis of K-Cipher Mohammad Mahzoun, Liliya Kraleva, Raluca Posteuca, Tomer Ashur
2022/1157 (PDF ) Classically Verifiable NIZK for QMA with Preprocessing Tomoyuki Morimae, Takashi Yamakawa
2022/1156 (PDF ) On the security of data markets: controlled Private Function Evaluation István Vajda
2022/1155 (PDF ) Hawk: Module LIP makes Lattice Signatures Fast, Compact and Simple Léo Ducas, Eamonn W. Postlethwaite, Ludo N. Pulles, Wessel van Woerden
2022/1154 (PDF ) Efficient Constant-Time Implementation of SM4 with Intel GFNI instruction set extension and Arm NEON coprocessor Weiji Guo
2022/1153 (PDF ) Sharp: Short Relaxed Range Proofs Geoffroy Couteau, Dahmun Goudarzi, Michael Klooß, Michael Reichle
2022/1152 (PDF ) Fully Collusion Resistant Trace-and-Revoke Functional Encryption for Arbitrary Identities Fucai Luo, Saif Al-Kuwari, Haiyan Wang, Xingfu Yan
2022/1151 (PDF ) A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphael C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu
2022/1150 (PDF ) Farasha: A Provable Permutation-based Parallelizable PRF Najwa Aaraj, Emanuele Bellin, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit, Eugenio Salazar
2022/1149 (PDF ) Secure Anycast Channels with Applications to 4G and 5G Handovers Karl Norrman
2022/1148 (PDF ) On Security Against Time Traveling Adversaries Lúcás Críostóir Meier
2022/1147 (PDF ) Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks Hosein Hadipour, Sadegh Sadeghi, Maria Eichlseder
2022/1146 (PDF ) A Sponge-Based PRF with Good Multi-user Security Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
2022/1145 (PDF ) Yafa-108/146: Implementing ed25519-embedding Cocks-Pinch curves in arkworks-rs Rami Akeela, Weikeng Chen
2022/1144 (PDF ) On the Higher bit Version of Approximate Inhomogeneous Short Integer Solution Problem Anaëlle Le Dévéhat, Hiroki Shizuya, Shingo Hasegawa
2022/1143 (PDF ) Threshold Linearly Homomorphic Encryption on $\mathbf{Z}/2^k\mathbf{Z}$ Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
2022/1142 (PDF ) Secure Message Authentication in the Presence of Leakage and Faults Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert
2022/1141 (PDF ) An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes Enrico Piccione, Samuele Andreoli, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Svetla Nikova, George Petrides, Vincent Rijmen
2022/1140 (PDF ) Witness Encryption and Null-IO from Evasive LWE Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs
2022/1139 (PDF ) Formal Security Definition of Metadata-Private Messaging Shengtong Zhang, Arvid Lunnemark, Sualeh Asif
2022/1138 (PDF ) Designated-Verifier Linkable Ring Signatures with unconditional anonymity Danai Balla, Pourandokht Behrouz, Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou, Giannis Vrettos
2022/1137 (PDF ) Private Computation On Set Intersection With Sublinear Communication Jonas Janneck, Anselme Tueno, Jörn Kußmaul, Matthew Akram
2022/1136 (PDF ) The Tropical Version of ElGamal Encryption Any Muanalifah, Ayus Riana Isnawati
2022/1135 (PDF ) Full Quantum Equivalence of Group Action DLog and CDH, and More Hart Montgomery, Mark Zhandry
2022/1134 (PDF ) An improved method for predicting truncated multiple recursive generators with unknown parameters Han-Bing Yu, Qun-Xiong Zheng, Yi-Jian Liu, Jing-Guo Bi, Yu-Fei Duan, Jing-Wen Xue, You Wu, Yue Cao, Rong Cheng, Lin Wang, Bai-Shun Sun
2022/1133 (PDF ) Secure Batch Deduplication Without Dual Servers in Backup System Haoyu Zheng, Shengke Zeng, Hongwei Li, Zhijun Li
2022/1132 (PDF ) Kryvos: Publicly Tally-Hiding Verifiable E-Voting Nicolas Huber, Ralf Kuesters, Toomas Krips, Julian Liedtke, Johannes Mueller, Daniel Rausch, Pascal Reisert, Andreas Vogt
2022/1131 (PDF ) CINI MINIS: Domain Isolation for Fault and Combined Security Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
2022/1130 (PDF ) Subterm-based proof techniques for improving the automation and scope of security protocol analysis Cas Cremers, Charlie Jacomme, Philip Lukert
2022/1128 (PDF ) On the (im)possibility of ElGamal blind signatures Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Stanislav Smyshlyaev
2022/1127 (PDF ) GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2022/1126 (PDF ) Explicit infinite families of bent functions outside $\mathcal{MM}^\#$ Enes Pasalic, Amar Bapić, Fengrong Zhang, Yongzhuang Wei
2022/1125 (PDF ) A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack Daniel J. Bernstein
2022/1124 (PDF ) Unbounded Quadratic Functional Encryption and More from Pairings Junichi Tomida
2022/1123 (PDF ) Depending on DEEPAND: Cryptanalysis of NLFSR-based Lightweight Ciphers TinyJAMBU, KATAN and KTANTAN Amit Jana, Mostafizar Rahman, Dhiman Saha
2022/1122 (PDF ) Practical Related-Key Forgery Attacks on the Full TinyJAMBU-192/256 Orr Dunkelman, Eran Lambooij, Shibam Ghosh
2022/1121 (PDF ) Practical Attacks on Full-round FRIET Senpeng wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi
2022/1120 (PDF ) VMEO: Vector Modeling Errors and Operands for Approximate adders Vishesh Mishra, Urbi Chatterjee
2022/1119 (PDF ) PESCA: A Privacy-Enhancing Smart-Contract Architecture Wei Dai
2022/1118 (PDF ) PentaGOD: Stepping beyond Traditional GOD with Five Parties Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2022/1117 (PDF ) Two-Round Multi-Signatures from Okamoto Signatures Kwangsu Lee, Hyoseung Kim
2022/1116 (PDF ) Automatic Certified Verification of Cryptographic Programs with COQCRYPTOLINE Ming-Hsien Tsai, Yu-Fu Fu, Xiaomu Shi, Jiaxiang Liu, Bow-Yaw Wang, Bo-Yin Yang
2022/1115 (PDF ) Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang
2022/1114 (PDF ) Multi-User Dynamic Searchable Symmetric Encryption with Corrupted Participants Javad Ghareh Chamani, Yun Wang, Dimitrios Papadopoulos, Mingyang Zhang, Rasool Jalili
2022/1113 (PDF ) A new algorithm for solving the rSUM problem Valerii Sopin
2022/1112 (PDF ) Ergodic dynamical systems over the Cartesian power of the ring of p-adic integers Valerii Sopin
2022/1111 (PDF ) A tale of two models: formal verification of KEMTLS via Tamarin Sofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers
2022/1110 (PDF ) Invisible Formula Attacks David Naccache, Ofer Yifrach-Stav
2022/1109 (PDF ) A Note on Copy-Protection from Random Oracles Prabhanjan Ananth, Fatih Kaleoglu
2022/1108 (PDF ) Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model Daniel Apon, Chloe Cachet, Benjamin Fuller, Peter Hall, Feng-Hao Liu
2022/1107 (PDF ) Projective Geometry of Hessian Elliptic Curves and Genus 2 Triple Covers of Cubics Rémy Oudompheng
2022/1106 (PDF ) Towards Practical Topology-Hiding Computation Shuaishuai Li
2022/1105 (PDF ) Arithmetization of Σ¹₁ relations with polynomial bounds in Halo 2 Anthony Hart, Morgan Thomas
2022/1104 (PDF ) $\mu$Cash: Transparent Anonymous Transactions Liam Eagen
2022/1103 (PDF ) Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan
2022/1102 (PDF ) Proofs of Quantumness from Trapdoor Permutations Tomoyuki Morimae, Takashi Yamakawa
2022/1101 (PDF ) Solutions to quantum weak coin flipping Atul Singh Arora, Jérémie Roland, Chrysoula Vlachou, Stephan Weis
2022/1100 (PDF ) Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited Gianluca Brian, Antonio Faonio, João Ribeiro, Daniele Venturi
2022/1099 (PDF ) One-Hot Conversion: Towards Faster Table-based A2B Conversion Jan-Pieter D'Anvers
2022/1098 (PDF ) SoK: Security Evaluation of SBox-Based Block Ciphers Joelle Lim, Derrick Ng, Ruth Ng
2022/1097 (PDF ) Post-Quantum Security of Tweakable Even-Mansour, and Applications Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz, Patrick Struck
2022/1096 (PDF ) TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries Arnab Bag, Debadrita Talapatra, Ayushi Rastogi, Sikhar Patranabis, Debdeep Mukhopadhyay
2022/1095 (PDF ) Toffoli gate count Optimized Space-Efficient Quantum Circuit for Binary Field Multiplication KIM, SUNYEOP, KIM, INSUNG, Seonggyeom Kim, Seokhie Hong
2022/1094 (PDF ) Secure Integrated Sensing and Communication Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener
2022/1093 (PDF ) HPKA: A High-Performance CRYSTALS-Kyber Accelerator Exploring Efficient Pipelining Ziying Ni, Ayesha Khalid, Dur-e-Shahwar Kundi, Máire O’Neill, Weiqiang Liu
2022/1092 (PDF ) On NTRU-ν-um Modulo $X^N − 1$ Marc Joye
2022/1091 (PDF ) Mul-IBS: A Multivariate Identity-Based Signature Scheme Compatible with IoT-based NDN Architecture Sumit Kumar Debnath, Sihem Mesnager, Vikas Srivastava, Saibal Kumar Pal, Nibedita Kundu
2022/1090 (PDF ) How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert
2022/1088 (PDF ) Tighter trail bounds for Xoodoo Joan Daemen, Silvia Mella, Gilles Van Assche
2022/1087 (PDF ) I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis Guilherme Perin, Sengim Karayalcin, Lichao Wu, Stjepan Picek
2022/1086 (PDF ) KaLi: A Crystal for Post-Quantum Security using Kyber and Dilithium Aikata Aikata, Ahmet Can Mert, Malik Imran, Samuel Pagliarini, Sujoy Sinha Roy
2022/1084 (PDF ) Glass-Vault: A Generic Transparent Privacy-preserving Exposure Notification Analytics Platform Lorenzo Martinico, Aydin Abadi, Thomas Zacharias, Thomas Win
2022/1083 (PDF ) Enigmap : External-Memory Oblivious Map for Secure Enclaves Afonso Tinoco, Sixiang Gao, Elaine Shi
2022/1082 (PDF ) Assisted Private Information Retrieval Natnatee Dokmai, L. Jean Camp, Ryan Henry
2022/1081 (PDF ) Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception Xavier Bultel, Cristina Onete
2022/1079 (PDF ) The inspection model for zero-knowledge proofs and efficient Zerocash with secp256k1 keys Huachuang Sun, Haifeng Sun, Kevin Singh, Akhil Sai Peddireddy, Harshad Patil, Jianwei Liu, Weikeng Chen
2022/1078 (PDF ) Skip Ratchet: A Hierarchical Hash System Brooklyn Zelenka
2022/1077 (PDF ) New Bounds on the Multiplicative Complexity of Boolean Functions Meltem Sonmez Turan
2022/1076 (PDF ) Range Search over Encrypted Multi-Attribute Data Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia
2022/1075 (PDF ) Secure Branching Program Evaluation Jonas Janneck, Anas Boudi, Anselme Tueno, Matthew Akram
2022/1074 (PDF ) On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP Juliane Krämer, Patrick Struck
2022/1073 (PDF ) Fixing Issues and Achieving Maliciously Secure Verifiable Aggregation in ``VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning'' Xiaojie Guo
2022/1072 (PDF ) Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification Alexandre Belling, Azam Soleimanian, Olivier Bégassat
2022/1071 (PDF ) Performance Evaluation of NIST LWC Finalists on AVR ATmega and ARM Cortex-M3 Microcontrollers Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida
2022/1070 (PDF ) Efficient Unique Ring Signatures From Lattices Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto
2022/1069 (PDF ) A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and its Relation to the Random Oracle Model Marten van Dijk, Chenglu Jin
2022/1068 (PDF ) Evaluating isogenies in polylogarithmic time Damien Robert
2022/1067 (PDF ) Lattice Enumeration with Discrete Pruning: Improvement, Cost Estimation and Optimal Parameters Luan Luan, Chunxiang Gu, Yonghui Zheng, Yanan Shi
2022/1066 (PDF ) FairBlock: Preventing Blockchain Front-running with Minimal Overheads Peyman Momeni, Sergey Gorbunov, Bohan Zhang
2022/1065 (PDF ) A Note on the Theoretical and Practical Security of Block Ciphers Öznur MUT SAĞDIÇOĞLU, Serhat Sağdıçoğlu, Ebru Küçükkubaş
2022/1064 (PDF ) Lattice Reduction Meets Key-Mismatch: New Misuse Attack on Lattice-Based NIST Candidate KEMs Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang
2022/1063 (PDF ) Rapidash: Atomic Swaps Secure under User-Miner Collusion Hao Chung, Elisaweta Masserova, Elaine Shi, Sri AravindaKrishnan Thyagarajan
2022/1062 (PDF ) A Password-Based Access Control Framework for Time-Sequence Aware Media Cloudization Haiyan Wang
2022/1061 (PDF ) Breaking Category Five SPHINCS+ with SHA-256 Ray Perlner, John Kelsey, David Cooper
2022/1060 (PDF ) Programmable Distributed Point Functions Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov
2022/1059 (PDF ) Classification of all DO planar polynomials with prime field coefficients over GF(3^n) for n up to 7 Diana Davidova, Nikolay Kaleyski
2022/1058 (PDF ) Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham
2022/1057 (PDF ) Rebound Attacks on SKINNY Hashing with Automatic Tools Shun Li, Guozhen Liu, Phuong Pham
2022/1056 (PDF ) Linear-Time Probabilistic Proofs with Sublinear Verification for Algebraic Automata Over Every Field Jonathan Bootle, Alessandro Chiesa, Ziyi Guan, Siqi Liu
2022/1055 (PDF ) Exploring Integrity of AEADs with Faults: Definitions and Constructions Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin
2022/1054 (PDF ) SIDH with masked torsion point images Tako Boris Fouotsa
2022/1053 (PDF ) Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
2022/1052 (PDF ) Double-Odd Jacobi Quartic Thomas Pornin
2022/1051 (PDF ) How to Verifiably Encrypt Many Bits for an Election? Henri Devillez, Olivier Pereira, Thomas Peters
2022/1050 (PDF ) RapidUp: Multi-Domain Permutation Protocol for Lookup Tables Héctor Masip Ardevol, Jordi Baylina Melé, Daniel Lubarov, José L. Muñoz-Tapia
2022/1049 (PDF ) Post Quantum Design in SPDM for Device Authentication and Key Establishment Jiewen Yao, Krystian Matusiewicz, Vincent Zimmer
2022/1048 (PDF ) Practical Sublinear Proofs for R1CS from Lattices Ngoc Khanh Nguyen, Gregor Seiler
2022/1047 (PDF ) Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
2022/1046 (PDF ) Post-Quantum Multi-Recipient Public Key Encryption Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe
2022/1045 (PDF ) On UC-Secure Range Extension and Batch Verification for ECVRF Christian Badertscher, Peter Gaži, Iñigo Querejeta-Azurmendi, Alexander Russell
2022/1044 (PDF ) Oblivious Revocable Functions and Encrypted Indexing Kevin Lewi, Jon Millican, Ananth Raghunathan, Arnab Roy
2022/1043 (PDF ) A Study of Error Floor Behavior in QC-MDPC Codes Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray Perlner, Angela Robinson
2022/1042 (PDF ) Weak Subtweakeys in SKINNY Daniël Kuijsters, Denise Verbakel, Joan Daemen
2022/1041 (PDF ) Lattice-Based Cryptography in Miden VM Alan Szepieniec, Frederik Vercauteren
2022/1040 (PDF ) A framework for constructing Single Secret Leader Election from MPC Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov
2022/1039 (PDF ) Theoretical Limits of Provable Security Against Model Extraction by Efficient Observational Defenses Ari Karchmer
2022/1038 (PDF ) Breaking SIDH in polynomial time Damien Robert
2022/1037 (PDF ) RPM: Robust Anonymity at Scale Donghang Lu, Aniket Kate
2022/1036 (PDF ) MuSig-L: Lattice-Based Multi-Signature With Single-Round Online Phase Cecilia Boschini, Akira Takahashi, Mehdi Tibouchi
2022/1035 (PDF ) Efficient Pseudorandom Correlation Generators from Ring-LPN Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
2022/1034 (PDF ) Finding All Impossible Differentials When Considering the DDT Kai Hu, Thomas Peyrin, Meiqin Wang
2022/1033 (PDF ) A Complete Characterization of Security for Linicrypt Block Cipher Modes Tommy Hollenberg, Mike Rosulek, Lawrence Roy
2022/1032 (PDF ) On Non-uniform Security for Black-box Non-Interactive CCA Commitments Rachit Garg, Dakshita Khurana, George Lu, Brent Waters
2022/1031 (PDF ) Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem Magali Bardet, Pierre Briaud, Maxime Bros, Philippe Gaborit, Jean-Pierre Tillich
2022/1030 (PDF ) Oblivious Extractors and Improved Security in Biometric-based Authentication Systems Ivan De Oliveira Nunes, Peter Rindal, Maliheh Shirvanian
2022/1029 (PDF ) FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation Nina Bindel, Cas Cremers, Mang Zhao
2022/1028 (PDF ) New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen
2022/1027 (PDF ) Maliciously Secure Massively Parallel Computation for All-but-One Corruptions Rex Fernando, Yuval Gelles, Ilan Komargodski, Elaine Shi
2022/1026 (PDF ) An attack on SIDH with arbitrary starting curve Luciano Maino, Chloe Martindale
2022/1025 (PDF ) Parallelizable Delegation from LWE Cody Freitag, Rafael Pass, Naomi Sirkin
2022/1024 (PDF ) Multi-Input Attribute Based Encryption and Predicate Encryption Shweta Agrawal, Anshu Yadav, Shota Yamada
2022/1023 (PDF ) SIM: Secure Interval Membership Testing and Applications to Secure Comparison Albert Yu, Donghang Lu, Aniket Kate, Hemanta K. Maji
2022/1022 (PDF ) New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe
2022/1021 (PDF ) Practical Statistically-Sound Proofs of Exponentiation in any Group Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
2022/1020 (PDF ) Uncle Maker: (Time)Stamping Out The Competition in Ethereum Aviv Yaish, Gilad Stern, Aviv Zohar
2022/1019 (PDF ) Masked-degree SIDH Tomoki Moriya
2022/1018 (PDF ) Time-Deniable Signatures Gabrielle Beck, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Pratyush Ranjan Tiwari
2022/1017 (PDF ) PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords Gareth T. Davies, Jeroen Pijnenburg
2022/1016 (PDF ) Public Key Authenticated Encryption with Keyword Search from LWE Leixiao Cheng, Fei Meng
2022/1015 (PDF ) Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes Maya Chartouny, Jacques Patarin, Ambre Toulemonde
2022/1014 (PDF ) Correlated Pseudorandomness from Expand-Accumulate Codes Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
2022/1013 (PDF ) Dynamic Local Searchable Symmetric Encryption Brice Minaud, Michael Reichle
2022/1012 (PDF ) Nonce-Misuse Resilience of Romulus-N and GIFT-COFB Akiko Inoue, Chun Guo, Kazuhiko Minematsu
2022/1011 (PDF ) Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching Gayathri Garimella, Mike Rosulek, Jaspal Singh
2022/1010 (PDF ) Orion: Zero Knowledge Proof with Linear Prover Time Tiancheng Xie, Yupeng Zhang, Dawn Song
2022/1009 (PDF ) Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski
2022/1008 (PDF ) Multimodal Private Signatures Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang
2022/1007 (PDF ) zkQMC: Zero-Knowledge Proofs For (Some) Probabilistic Computations Using Quasi-Randomness Zachary DeStefano, Dani Barrack, Michael Dixon
2022/1006 (PDF ) A Forward-secure Efficient Two-factor Authentication Protocol Steven J. Murdoch, Aydin Abadi
2022/1005 (PDF ) PUF-COTE: A PUF Construction with Challenge Obfuscation and Throughput Enhancement Boyapally Harishma, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay
2022/1004 (PDF ) Interactive Non-Malleable Codes Against Desynchronizing Attacks in the Multi-Party Setting Nils Fleischhacker, Suparno Ghoshal, Mark Simkin
2022/1003 (PDF ) Orbis Specification Language: a type theory for zk-SNARK programming Morgan Thomas
2022/1002 (PDF ) Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps Felix Engelmann, Thomas Kerber, Markulf Kohlweiss, Mikhail Volkhov
2022/1001 (PDF ) Quantum Security of FOX Construction based on Lai-Massey Scheme Amit Kumar Chauhan, Somitra Sanadhya
2022/1000 (PDF ) Statistical Decoding 2.0: Reducing Decoding to LPN Kevin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Jean-Pierre Tillich
2022/999 (PDF ) PipeMSM: Hardware Acceleration for Multi-Scalar Multiplication Charles. F. Xavier
2022/998 (PDF ) On the Hardness of the Finite Field Isomorphism Problem Dipayan Das, Antoine Joux
2022/997 (PDF ) Key-Recovery Attacks on CRAFT and WARP (Full Version) Ling Sun, Wei Wang, Meiqin Wang
2022/996 (PDF ) Fast Hashing to $\mathbb{G}_2$ on Pairing-friendly Curves with the Lack of Twists Yu Dai, Fangguo Zhang, Chang-An Zhao
2022/995 (PDF ) Sequential Digital Signatures for Cryptographic Software-Update Authentication Bertram Poettering, Simon Rastikian
2022/994 (PDF ) Faster Sounder Succinct Arguments and IOPs Justin Holmgren, Ron Rothblum
2022/993 (PDF ) A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Xiangwen Yang, Raymond K. Zhao
2022/992 (PDF ) An $\mathcal{O}(n)$ Algorithm for Coefficient Grouping Fukang Liu
2022/991 (PDF ) Coefficient Grouping: Breaking Chaghri and More Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe
2022/990 (PDF ) Efficient Computation of (2^n,2^n)-Isogenies Sabrina Kunzweiler
2022/989 (PDF ) Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key Jingwei Jiang, Ding Wang, Guoyin Zhang, Zhiyuan Chen
2022/988 (PDF ) Modeling and Simulating the Sample Complexity of solving LWE using BKW-Style Algorithms Qian Guo, Erik Mårtensson, Paul Stankovski Wagner
2022/987 (PDF ) A Signature-Based Gröbner Basis Algorithm with Tail-Reduced Reductors (M5GB) Manuel Hauke, Lukas Lamster, Reinhard Lüftenegger, Christian Rechberger
2022/986 (PDF ) Quantum Attacks on Lai-Massey Structure Shuping Mao, Tingting Guo, Peng Wang, Lei Hu
2022/985 (PDF ) Privacy when Everyone is Watching: An SOK on Anonymity on the Blockchain Roy Rinberg, Nilaksh Agarwal
2022/984 (PDF ) ToSHI - Towards Secure Heterogeneous Integration: Security Risks, Threat Assessment, and Assurance Nidish Vashistha, Md Latifur Rahman, Md Saad Ul Haque, Azim Uddin, Md Sami Ul Islam Sami, Amit Mazumder Shuo, Paul Calzada, Farimah Farahmandi, Navid Asadizanjani, Fahim Rahman, Mark Tehranipoor
2022/983 (PDF ) Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber Qian Guo, Erik Mårtensson
2022/982 (PDF ) Random-Index Oblivious RAM Shai Halevi, Eyal Kushilevitz
2022/981 (PDF ) FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval Alex Davidson, Gonçalo Pestana, Sofía Celi
2022/980 (PDF ) Fast norm computation in smooth-degree Abelian number fields Daniel J. Bernstein
2022/978 (PDF ) Non-Malleable Multi-Party Computation Fuchun Lin
2022/977 (PDF ) Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang
2022/976 (PDF ) Paras - A Private NFT Protocol Vanishree Rao
2022/975 (PDF ) An efficient key recovery attack on SIDH Wouter Castryck, Thomas Decru
2022/974 (PDF ) PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies Amirreza Sarencheh, Aggelos Kiayias, Markulf Kohlweiss
2022/973 (PDF ) MR-DSS – Smaller MinRank-based (Ring-)Signatures Emanuele Bellini, Andre Esser, Carlo Sanna, Javier Verbel
2022/972 (PDF ) Keyed Streebog is a secure PRF and MAC Vitaly Kiryukhin
2022/971 (PDF ) Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller
2022/970 (PDF ) Related-key attacks on the compression function of Streebog Vitaly Kiryukhin
2022/969 (PDF ) Certified Everlasting Functional Encryption Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2022/967 (PDF ) On the Computational Hardness of the Code Equivalence Problem in Cryptography Alessandro Barenghi, Jean-Francois Biasse, Edoardo Persichetti, Paolo Santini
2022/966 (PDF ) On Linear Complexity of Finite Sequences : Coding Theory and Applications to Cryptography Edoardo Persichetti, Tovohery Randrianarisoa
2022/965 (PDF ) PROLEAD - A Probing-Based Hardware Leakage Detection Tool Nicolai Müller, Amir Moradi
2022/964 (PDF ) Hybrid Decoding -- Classical-Quantum Trade-Offs for Information Set Decoding Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José Ignacio Latorre, Marc Manzano
2022/963 (PDF ) Resolving the Doubts: On the Construction and Use of ResNets for Side-channel Analysis Sengim Karayalcin, Stjepan Picek
2022/962 (PDF ) Group Signatures with Designated Traceability over Openers' Attributes Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa
2022/961 (PDF ) Secure and Efficient Implicit Certificates: Improving the Performance for Host Identity Protocol in IoT Zhaokang Lu, Jianzhu Lu
2022/960 (PDF ) Scan, Shuffle, Rescan: Machine-Assisted Election Audits With Untrusted Scanners Douglas W. Jones, Sunoo Park, Ronald L. Rivest, Adam Sealfon
2022/959 (PDF ) MEGA: Malleable Encryption Goes Awry Matilda Backendal, Miro Haller, Kenneth G. Paterson
2022/958 (PDF ) Get Me out of This Payment! Bailout: An HTLC Re-routing Protocol Oguzhan Ersoy, Pedro Moreno-Sanchez, Stefanie Roos
2022/957 (PDF ) Caulk+: Table-independent lookup arguments Jim Posen, Assimakis A. Kattis
2022/956 (PDF ) Improved Plantard Arithmetic for Lattice-based Cryptography Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen
2022/955 (PDF ) A Small GIFT-COFB: Lightweight Bit-Serial Architectures Andrea Caforio, Daniel Collins, Subhadeep Banik, Francesco Regazzoni
2022/954 (PDF ) XOR Compositions of Physically Related Functions Harishma Boyapally, Sikhar Patranabis, Debdeep Mukhopadhyay
2022/953 (PDF ) Big Brother Is Watching You: A Closer Look At Backdoor Construction Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi
2022/952 (PDF ) When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer Michael Fahr Jr., Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray Perlner, Arkady Yerukhimovich, Daniel Apon
2022/951 (PDF ) MixCT: Mixing Confidential Transactions from Homomorphic Commitment Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu
2022/950 (PDF ) Private Balance-Checking on Blockchain Accounts Using Private Integer Addition Birenjith Sasidharan, Emanuele Viterbo
2022/949 (PDF ) One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan
2022/947 (PDF ) Volume and Access Pattern Leakage-abuse Attack with Leaked Documents Steven Lambregts, Huanhuan Chen, Jianting Ning, Kaitai Liang
2022/946 (PDF ) ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik
2022/945 (PDF ) Searchable Encryption with randomized ciphertext and randomized keyword search Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa
2022/944 (PDF ) Two-Round MPC without Round Collapsing Revisited -- Towards Efficient Malicious Protocols Huijia Lin, Tianren Liu
2022/943 (PDF ) DiSSECT: Distinguisher of Standard & Simulated Elliptic Curves via Traits Vladimir Sedlacek, Vojtech Suchanek, Antonin Dufka, Marek Sys, Vashek Matyas
2022/942 (PDF ) Foundations of Coin Mixing Services Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri AravindaKrishnan Thyagarajan
2022/941 (PDF ) Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable Martin R. Albrecht, Valerio Cini, Russell W. F. Lai, Giulio Malavolta, Sri AravindaKrishnan Thyagarajan
2022/940 (PDF ) Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma
2022/939 (PDF ) Multi-party Private Function Evaluation for RAM Keyu Ji, Bingsheng Zhang, Tianpei Lu, Kui Ren
2022/938 (PDF ) Truncated EdDSA/ECDSA Signatures Thomas Pornin
2022/937 (PDF ) Post-quantum Plaintext-awareness Ehsan Ebrahimi, Jeroen van Wier
2022/936 (PDF ) PROBONITE : PRivate One-Branch-Only Non-Interactive decision Tree Evaluation Sofiane Azogagh, Victor Delfour, Sébastien Gambs, Marc-Olivier Killijian
2022/935 (PDF ) SALSA: Attacking Lattice Cryptography with Transformers Emily Wenger, Mingjie Chen, Francois Charton, Kristin Lauter
2022/934 (PDF ) On Secure Computation of Solitary Output Functionalities With and Without Broadcast Bar Alon, Eran Omri
2022/933 (PDF ) Secure Quantized Training for Deep Learning Marcel Keller, Ke Sun
2022/932 (PDF ) Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu
2022/931 (PDF ) Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D'Anvers, Shivam Bhasin, Anupam Chattopadhyay
2022/930 (PDF ) Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4 Erdem Alkim, Vincent Hwang, Bo-Yin Yang
2022/929 (PDF ) PH = PSPACE Valerii Sopin
2022/928 (PDF ) Universal Gaussian Elimination Hardware for Cryptographic Purposes Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang
2022/927 (PDF ) Fit The Joint Moments - How to Attack any Masking Schemes Valence Cristiani, Maxime Lecomte, Thomas Hiscock, Philippe Maurine
2022/926 (PDF ) Zero-Knowledge in EasyCrypt Denis Firsov, Dominique Unruh
2022/925 (PDF ) Ad Hoc Broadcast, Trace, and Revoke --- Plus Time-Space Trade-Offs for Attribute-Based Encryption Ji Luo
2022/924 (PDF ) FICS PCB X-ray: A dataset for automated printed circuit board inter-layers inspection Dhwani Mehta, John True, Olivia P. Dizon-Paradis, Nathan Jessurun, Damon L. Woodard, Navid Asadizanjani, Mark Tehranipoor
2022/923 (PDF ) All for one and one for all: Fully decentralised privacy-preserving dark pool trading using multi-party computation Mariana Botelho da Gama, John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
2022/922 (PDF ) Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm Léo Ducas
2022/921 (PDF ) Low-Delay 4, 5 and 6-Term Karatsuba Formulae in $\mathbb{F}_2[x]$ Using Overlap-free Splitting Haining Fan
2022/920 (PDF ) Distributed, Private, Sparse Histograms in the Two-Server Model James Bell, Adria Gascon, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann
2022/919 (PDF ) Side-Channel Attacks on Lattice-Based KEMs Are Not Prevented by Higher-Order Masking Kalle Ngo, Ruize Wang, Elena Dubrova, Nils Paulsrud
2022/918 (PDF ) Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds Wonseok Choi, Jooyoung Lee, Yeongmin Lee
2022/917 (PDF ) Almost-Surely Terminating Asynchronous Byzantine Agreement Against General Adversaries with Optimal Resilience Ashish Choudhury
2022/916 (PDF ) Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks Melissa Azouaoui, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal
2022/915 (PDF ) OpenFHE: Open-Source Fully Homomorphic Encryption Library Ahmad Al Badawi, Andreea Alexandru, Jack Bates, Flavio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Carlo Pascoe, Yuriy Polyakov, Ian Quah, Saraswathy R.V., Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, Vincent Zucca
2022/914 (PDF ) The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications Keegan Ryan, Nadia Heninger
2022/913 (PDF ) On the Communication Efficiency of Statistically-Secure Asynchronous MPC with Optimal Resilience Ashish Choudhury, Arpita Patra
2022/912 (PDF ) Individual Discrete Logarithm with Sublattice Reduction Haetham AL ASWAD, Cécile PIERROT
2022/911 (PDF ) Some Security Arguments For Xifrat1 Jianfang "Danny" Niu
2022/909 (PDF ) Multi-Instance Secure Public-Key Encryption Carlo Brunetta, Hans Heum, Martijn Stam
2022/908 (PDF ) On fast computations of numerical parameters of homogeneous algebraic graphs of large girth and small diameter and encryption of large files. Tymoteusz Chojecki, Vasyl Ustimenko
2022/907 (PDF ) A New Approach to Post-Quantum Non-Malleability Xiao Liang, Omkant Pandey, Takashi Yamakawa
2022/906 (PDF ) A Random Oracle for All of Us Marc Fischlin, Felix Rohrbach, Tobias Schmalz
2022/905 (PDF ) Tight Security Analysis of the Public Permutation-Based PMAC_Plus Avijit Dutta, Mridul Nandi, Suprita Talnikar
2022/904 (PDF ) Patient Zero and Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE Fabio Campos, Michael Meyer, Krijn Reijnders, Marc Stöttinger
2022/903 (PDF ) Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert
2022/902 (PDF ) MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably Bar Alon, Moni Naor, Eran Omri, Uri Stemmer
2022/901 (PDF ) Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . . Itamar Levi, Carmit Hazay
2022/900 (PDF ) On the key generation in SQISign Hiroshi Onuki
2022/899 (PDF ) Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi
2022/898 (PDF ) Ferveo: Threshold Decryption for Mempool Privacy in BFT networks Joseph Bebel, Dev Ojha
2022/897 (PDF ) Constrained Pseudorandom Functions from Pseudorandom Synthesizers Zachary A Kissel
2022/896 (PDF ) Post-quantum hash functions using $\mathrm{SL}_n(\mathbb{F}_p)$ Corentin Le Coz, Christopher Battarbee, Ramón Flores, Thomas Koberda, Delaram Kahrobaei
2022/895 (PDF ) Security Analysis of RSA-BSSA Anna Lysyanskaya
2022/894 (PDF ) Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia
2022/893 (PDF ) NJS: Database Protection Algorithm Edimar Veríssimo da Silva
2022/892 (PDF ) Piranha: A GPU Platform for Secure Computation Jean-Luc Watson, Sameer Wagh, Raluca Ada Popa
2022/891 (PDF ) Secure Physical Design Sukanta Dey, Jungmin Park, Nitin Pundir, Dipayan Saha, Amit Mazumder Shuvo, Dhwani Mehta, Navid Asadi, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2022/890 (PDF ) One Network to rule them all. An autoencoder approach to encode datasets Cristian-Alexandru Botocan
2022/889 (PDF ) Quantum Rewinding for Many-Round Protocols Russell W. F. Lai, Giulio Malavolta, Nicholas Spooner
2022/888 (PDF ) Tweakable Sleeve: A Novel Sleeve Construction based on Tweakable Hash Functions David Chaum, Mario Larangeira, Mario Yaksetig
2022/887 (PDF ) Round-Optimal Black-Box Protocol Compilers Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2022/886 (PDF ) Deep Learning based Cryptanalysis of Lightweight Block Ciphers, Revisited Hyunji Kim, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
2022/885 (PDF ) Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions Akshima, Siyao Guo, Qipeng Liu
2022/884 (PDF ) On the Feasibility of Unclonable Encryption, and More Prabhanjan Ananth, Fatih Kaleoglu, Xingjian Li, Qipeng Liu, Mark Zhandry
2022/883 (PDF ) Differentially Oblivious Turing Machines Ilan Komargodski, Elaine Shi
2022/882 (PDF ) Randomness Optimization for Gadget Compositions in Higher-Order Masking Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu
2022/881 (PDF ) A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Jiankuo Dong, Jingqiang Lin, Yuewu Wang
2022/880 (PDF ) Efficient supersingularity testing over $\mathbb{F}_p$ and CSIDH key validation Gustavo Banegas, Valerie Gilchrist, Benjamin Smith
2022/879 (PDF ) Modular Polynomial Multiplication Using RSA/ECC coprocessor Aurélien Greuet, Simon Montoya, Clémence Vermeersch
2022/878 (PDF ) zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure Michael Rosenberg, Jacob White, Christina Garman, Ian Miers
2022/877 (PDF ) A New Approach to the Constant-Round Re-encryption Mix-Net Myungsun Kim
2022/876 (PDF ) Watermarkable Public key Encryption With Efficient Extraction Under Standard Assumptions Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
2022/875 (PDF ) Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
2022/874 (PDF ) Lattice Codes for Lattice-Based PKE Shanxiang Lyu, Ling Liu, Cong Ling, Junzuo Lai, Hao Chen
2022/873 (PDF ) \(\texttt{POLKA}\): Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert
2022/872 (PDF ) Nirvana: Instant and Anonymous Payment-Guarantees Akash Madhusudan, Mahdi Sedaghat, Philipp Jovanovic, Bart Preneel
2022/871 (PDF ) Secure Plot Transfer for the Chia Blockchain Shashank Agrawal
2022/870 (PDF ) Computing \(2^a\)-isogenies in Legendre Form Jesse Elliott, Aaron Hutchinson, David Jao
2022/869 (PDF ) Post-Quantum Insecurity from LWE Alex Lombardi, Ethan Mook, Willy Quach, Daniel Wichs
2022/868 (PDF ) Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions Huimin Li, Nele Mentens, Stjepan Picek
2022/867 (PDF ) The State of the Union: Union-Only Signatures for Data Aggregation Diego F. Aranha, Felix Engelmann, Sebastian Kolby, Sophia Yakoubov
2022/866 (PDF ) Communication-Efficient Secure Logistic Regression Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth
2022/865 (PDF ) Linked Fault Analysis Ali Asghar Beigizad, Hadi Soleimany, Sara Zarei, Hamed Ramzanipour
2022/864 (PDF ) BalanceProofs: Maintainable Vector Commitments with Fast Aggregation Weijie Wang, Annie Ulichney, Charalampos Papamanthou
2022/863 (PDF ) Effective and Efficient Masking with Low Noise using Small-Mersenne-Prime Ciphers Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert
2022/862 (PDF ) Scooby: Improved Multi-Party Homomorphic Secret Sharing Based on FHE Ilaria Chillotti, Emmanuela Orsini, Peter Scholl, Nigel Paul Smart, Barry Van Leeuwen
2022/861 (PDF ) Genus Distribution of Random q-ary Lattices Peter J. Bruin, Léo Ducas, Shane Gibbons
2022/860 (PDF ) AB-SIFA: SIFA with Adjacent-Byte Model Chunya Hu, Yongbo Hu, Wenfeng Zhu, Zixin Tan, Qi Zhang, Zichao Gong, Yanhao Gong, Luyao Jin, Pengwei Feng
2022/859 (PDF ) Practical Side-Channel Attack on Masked Message Encoding in Latticed-Based KEM Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li
2022/858 (PDF ) Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts Yang Du, Daniel Genkin, Paul Grubbs
2022/857 (PDF ) Succinct Classical Verification of Quantum Computation James Bartusek, Yael Tauman Kalai, Alex Lombardi, Fermi Ma, Giulio Malavolta, Vinod Vaikuntanathan, Thomas Vidick, Lisa Yang
2022/856 (PDF ) Mix-Nets from Re-Randomizable and Replayable CCA-secure Public-Key Encryption Antonio Faonio, Luigi Russo
2022/855 (PDF ) Tightness Subtleties for Multi-user PKE Notions Hans Heum, Martijn Stam
2022/854 (PDF ) On Access Control Encryption without Sanitization Cecilia Boschini, Ivan Damgård, Claudio Orlandi
2022/853 (PDF ) Hashing to Prime in Zero-Knowledge Thomas Groß
2022/852 (PDF ) Making Biased DL Models Work: Message and Key Recovery Attacks on Saber Using Amplitude-Modulated EM Emanations Ruize Wang, Kalle Ngo, Elena Dubrova
2022/851 (PDF ) NIWI and New Notions of Extraction for Algebraic Languages Chaya Ganesh, Hamidreza Khoshakhlagh, Roberto Parisella
2022/850 (PDF ) Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling
2022/849 (PDF ) Formal Verification of Arithmetic Masking in Hardware and Software Barbara Gigerl, Robert Primas, Stefan Mangard
2022/848 (PDF ) Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives (extended version) Alexandros Bakas, Eugene Frimpong, Antonis Michalas
2022/847 (PDF ) A note on key control in CSIDH Antonio Sanso
2022/846 (PDF ) A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin
2022/845 (PDF ) Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 Jian Guo, Ling Song, Haoyang Wang
2022/844 (PDF ) Security Analysis of a Recent Pairing-based Certificateless Authenticated Key Agreement Protocol for Blockchain-based WBANs Yong-Jin Kim, Dok-Jun An, Kum-Sok Sin, Son-Gyong Kim
2022/842 (PDF ) Nearly Optimal Property Preserving Hashing Justin Holmgren, Minghao Liu, LaKyah Tyner, Daniel Wichs
2022/841 (PDF ) Faster Yet Safer: Logging System Via Fixed-Key Blockcipher Viet Tung Hoang, Cong Wu, Xin Yuan
2022/840 (PDF ) New Design Techniques for Efficient Arithmetization-Oriented Hash Functions:Anemoi Permutations and Jive Compression Mode Clémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Robin Salen, Vesselin Velichkov, Danny Willems
2022/839 (PDF ) Threshold Structure-Preserving Signatures Elizabeth Crites, Markulf Kohlweiss, Bart Preneel, Mahdi Sedaghat, Daniel Slamanig
2022/838 (PDF ) An Efficient Query Recovery Attack Against a Graph Encryption Scheme Francesca Falzon, Kenneth G. Paterson
2022/837 (PDF ) Differential Cryptanalysis in the Fixed-Key Model Tim Beyne, Vincent Rijmen
2022/836 (PDF ) Authenticated Garbling from Simple Correlations Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
2022/835 (PDF ) Covert Authentication from Lattices Rajendra Kumar, Khoa Nguyen
2022/834 (PDF ) A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling Rafael del Pino, Shuichi Katsumata
2022/833 (PDF ) Stronger Security for Non-Interactive Threshold Signatures: BLS and FROST Mihir Bellare, Stefano Tessaro, Chenzhi Zhu
2022/832 (PDF ) Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions Jeremiah Blocki, Blake Holman
2022/831 (PDF ) Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing Vipul Goyal, Antigoni Polychroniadou, Yifan Song
2022/830 (PDF ) Near-Optimal Private Information Retrieval with Preprocessing Arthur Lazzaretti, Charalampos Papamanthou
2022/829 (PDF ) TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung
2022/828 (PDF ) Lower Bounds for (Batch) PIR with Private Preprocessing Kevin Yeo
2022/827 (PDF ) Privacy-Preserving IP Verification Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos
2022/826 (PDF ) Pika: Secure Computation using Function Secret Sharing over Rings Sameer Wagh
2022/825 (PDF ) Romeo: Conversion and Evaluation of HDL Designs in the Encrypted Domain Charles Gouert, Nektarios Georgios Tsoutsos
2022/824 (PDF ) Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay
2022/823 (PDF ) Round Efficient Byzantine Agreement from VDFs Poulami Das, Lisa Eckey, Sebastian Faust, Julian Loss, Monosij Maitra
2022/822 (PDF ) Traceable Receipt-Free Encryption Henri Devillez, Olivier Pereira, Thomas Peters
2022/821 (PDF ) MPC for Group Reconstruction Circuits Lúcás Críostóir Meier
2022/820 (PDF ) Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resistant Hash Susumu Kiyoshima
2022/819 (PDF ) Moz$\mathbb{Z}_{2^k}$arella: Efficient Vector-OLE and Zero-Knowledge Proofs Over $\mathbb{Z}_{2^k}$ Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Peter Scholl
2022/818 (PDF ) Provably Secure Reflection Ciphers Tim Beyne, Yu Long Chen
2022/817 (PDF ) Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels Jean Paul Degabriele, Vukašin Karadžić
2022/816 (PDF ) Securing Approximate Homomorphic Encryption Using Differential Privacy Baiyu Li, Daniele Micciancio, Mark Schultz, Jessica Sorrell
2022/815 (PDF ) More Efficient Dishonest Majority Secure Computation over $\mathbb{Z}_{2^k}$ via Galois Rings Daniel Escudero, Chaoping Xing, Chen Yuan
2022/814 (PDF ) Suborn Channels: Incentives Against Timelock Bribes Zeta Avarikioti, Orfeas Stefanos Thyfronitis Litos
2022/813 (PDF ) Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications Benny Applebaum, Yuval Ishai, Or Karni, Arpita Patra
2022/812 (PDF ) Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2022/811 (PDF ) EZEE: Epoch Parallel Zero Knowledge for ANSI C Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery
2022/810 (PDF ) Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached RAM for ANSI C Programs David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov
2022/809 (PDF ) A 2.1 KHz Zero-Knowledge Processor with BubbleRAM David Heath, Vladimir Kolesnikov
2022/808 (PDF ) Secret key generation from Gaussian sources using lattice-based extractors Laura Luzzi, Cong Ling, Matthieu R. Bloch
2022/807 (PDF ) Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations Ruize Wang, Kalle Ngo, Elena Dubrova
2022/806 (PDF ) Multi-key and Multi-input Predicate Encryption from Learning with Errors Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi
2022/805 (PDF ) Authenticated Consensus in Synchronous Systems with Mixed Faults Ittai Abraham, Danny Dolev, Alon Kagan, Gilad Stern
2022/804 (PDF ) Review of the White-Box Encodability of NIST Lightweight Finalists Alex Charlès, Chloé Gravouil
2022/803 (PDF ) How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs Xavier Arnal, Abraham Cano, Tamara Finogina, Javier Herranz
2022/802 (PDF ) VERI-ZEXE: Decentralized Private Computation with Universal Setup Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho
2022/801 (PDF ) Secure and Robust Key-Trapped Design-for-Security Architecture for Protecting Obfuscated Logic Hadi Mardani Kamali
2022/800 (PDF ) BarnOwl: Secure Comparisons using Silent Pseudorandom Correlation Generators Sameer Wagh
2022/799 (PDF ) Tight Bounds on the Randomness Complexity of Secure Multiparty Computation Vipul Goyal, Yuval Ishai, Yifan Song
2022/798 (PDF ) One Hot Garbling David Heath, Vladimir Kolesnikov
2022/797 (PDF ) Garbled Circuits With Sublinear Evaluator Abida Haque, David Heath, Vladimir Kolesnikov, Steve Lu, Rafail Ostrovsky, Akash Shah
2022/796 (PDF ) Safe Permissionless Consensus Youer Pu, Lorenzo Alvisi, Ittay Eyal
2022/795 (PDF ) Efficient Generic Arithmetic for KKW Practical Linear: MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup David Heath, Vladimir Kolesnikov, Jiahui Lu
2022/794 (PDF ) Generation of "independent" points on elliptic curves by means of Mordell--Weil lattices Dmitrii Koshelev
2022/793 (PDF ) LLAMA: A Low Latency Math Library for Secure Inference Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, Divya Gupta
2022/792 (PDF ) Reliable Password Hardening Service with Opt-Out Chunfu Jia, Shaoqiang Wu, Ding Wang
2022/791 (PDF ) log*-Round Game-Theoretically-Fair Leader Election Ilan Komargodski, Shin’ichiro Matsuo, Elaine Shi, Ke Wu
2022/790 (PDF ) A Toolbox for Barriers on Interactive Oracle Proofs Gal Arnon, Amey Bhangale, Alessandro Chiesa, Eylon Yogev
2022/789 (PDF ) Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256 Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang
2022/788 (PDF ) Improved Preimage Attacks on Round-Reduced Keccak-384/512 Le He, Xiaoen Lin, Hongbo Yu, Jian Guo
2022/787 (PDF ) Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohmmad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla
2022/786 (PDF ) On the Necessity of Collapsing for Post-Quantum and Quantum Commitments Marcel Dall'Agnol, Nicholas Spooner
2022/785 (PDF ) Shorter Hash-and-Sign Lattice-Based Signatures Thomas Espitau, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
2022/784 (PDF ) Fully Privacy-Preserving Federated Representation Learning via Secure Embedding Aggregation Jiaxiang Tang, Jinbao Zhu, Songze Li, Kai Zhang, Lichao Sun
2022/783 (PDF ) Augmented Random Oracles Mark Zhandry
2022/782 (PDF ) Simon’s Algorithm and Symmetric Crypto: Generalizations and Automatized Applications Federico Canale, Gregor Leander, Lukas Stennes
2022/781 (PDF ) Linear Communication in Malicious Majority MPC S. Dov Gordon, Phi Hung Le, Daniel McVicker
2022/780 (PDF ) An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption Christian Mouchet, Elliott Bertrand, Jean-Pierre Hubaux
2022/779 (PDF ) New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption -- Stronger Security and Smaller Ciphertexts Qiqi Lai, Feng-Hao Liu, Zhedong Wang
2022/778 (PDF ) SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost Mikhail Kudinov, Andreas Hülsing, Eyal Ronen, Eylon Yogev
2022/777 (PDF ) Arithmetization of Σ¹₁ relations in Halo 2 Morgan Thomas
2022/776 (PDF ) Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
2022/775 (PDF ) Asynchronous Verifiable Information Dispersal with Near-Optimal Communication Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
2022/773 (PDF ) Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF Jelle Don, Serge Fehr, Yu-Hsuan Huang
2022/772 (PDF ) Maliciously Secure Multi-Party PSI with Lower Bandwidth and Faster Computation Zhi Qiu, Kang Yang, Yu Yu, Lijing Zhou
2022/771 (PDF ) Field Instruction Multiple Data Khin Mi Mi Aung, Enhui Lim, Jun Jie Sim, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo
2022/770 (PDF ) Password-Authenticated Key Exchange from Group Actions Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel
2022/769 (PDF ) Faster Beta Weil Pairing on BLS Pairing Friendly Curves with Odd Embedding Degree Azebaze Guimagang Laurian, Fouotsa Emmanuel, El Mrabet Nadia, Pecha Njiahouo Aminatou
2022/768 (PDF ) Public-Key Watermarking Schemes for Pseudorandom Functions Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo
2022/767 (PDF ) A New Approach to Efficient Non-Malleable Zero-Knowledge Allen Kim, Xiao Liang, Omkant Pandey
2022/766 (PDF ) The Cost of Statistical Security in Interactive Proofs for Repeated Squaring Cody Freitag, Ilan Komargodski
2022/765 (PDF ) Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks Zhongfeng Niu, Siwei Sun, Yunwen Liu, Chao Li
2022/764 (PDF ) Efficient Proofs of Retrievability using Expander Codes Françoise Levy-dit-Vehel, Maxime Roméas
2022/763 (PDF ) SoK: Assumptions Underlying Cryptocurrency Deanonymizations -- A Taxonomy for Scientific Experts and Legal Practitioners Dominic Deuber, Viktoria Ronge, Christian Rückert
2022/762 (PDF ) The Price of Verifiability: Lower Bounds for Verifiable Random Functions Nicholas Brandt, Dennis Hofheinz, Julia Kastner, Akin Ünal
2022/761 (PDF ) Quantum Procedures for Nested Search Problems with Applications in Cryptanalysis André Schrottenloher, Marc Stevens
2022/760 (PDF ) Privacy Preserving Opinion Aggregation Aggelos Kiayias, Vanessa Teague, Orfeas Stefanos Thyfronitis Litos
2022/759 (PDF ) SwiftEC: Shallue–van de Woestijne Indifferentiable Function To Elliptic Curves Jorge Chávez-Saab, Francisco Rodrı́guez-Henrı́quez, Mehdi Tibouchi
2022/758 (PDF ) Static vs. Adaptive Security in Perfect MPC: A Separation and the Adaptive Security of BGW Gilad Asharov, Ran Cohen, Oren Shochat
2022/757 (PDF ) SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V. L. Pereira
2022/756 (PDF ) Curve Trees: Practical and Transparent Zero-Knowledge Accumulators Matteo Campanelli, Mathias Hall-Andersen, Simon Holmgaard Kamp
2022/755 (PDF ) Low-latency Hardware Architecture for VDF Evaluation in Class Groups Danyang Zhu, Jing Tian, Minghao Li, Zhongfeng Wang
2022/754 (PDF ) Quantum impossible differential attacks: Applications to AES and SKINNY Nicolas David, María Naya-Plasencia, André Schrottenloher
2022/753 (PDF ) Fast MILP Models for Division Property Patrick Derbez, Baptiste Lambin
2022/752 (PDF ) Provably Minimum Data Complexity Integral Distinguisher Based on Conventional Division Property Akram Khalesi, Zahra Ahmadian
2022/751 (PDF ) SCALES: MPC with Small Clients and Larger Ephemeral Servers Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran
2022/750 (PDF ) The Ideal Functionalities for Private Set Union, Revisited Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu
2022/749 (PDF ) Cryptanalysis of Draco Subhadeep Banik
2022/748 (PDF ) 2DT-GLS: Faster and exception-free scalar multiplication in the GLS254 binary curve Marius A. Aardal, Diego F. Aranha
2022/747 (PDF ) More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan, Lixuan Wu, Meiqin Wang
2022/746 (PDF ) Efficient Proofs of Knowledge for Threshold Relations Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Ivan Visconti
2022/745 (PDF ) Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE Hosein Hadipour, Marcel Nageler, Maria Eichlseder
2022/744 (PDF ) MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency Monero Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Xianrui Qin
2022/743 (PDF ) How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis David Mestel, Johannes Mueller, Pascal Reisert
2022/742 (PDF ) Application of Automorphic Forms to Lattice Problems Samed Düzlü, Juliane Krämer
2022/741 (PDF ) Sapic+: protocol verifiers of the world, unite! Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann
2022/740 (PDF ) Practical Privacy-Preserving Authentication for SSH Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek
2022/739 (PDF ) Updatable Encryption from Group Actions Antonin Leroux, Maxime Roméas
2022/738 (PDF ) Secure Search on Multi-key Homomorphically Encrypted Data with Finite Fields Buvana Ganesh, Paolo Palmieri
2022/737 (PDF ) Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results Prasanna Ravi, Anupam Chattopadhyay, Jan Pieter D'Anvers, Anubhab Baksi
2022/736 (PDF ) Mathematical Aspects of Division Property Phil Hebborn, Gregor Leander, Aleksei Udovenko
2022/735 (PDF ) Multiparty Private Set Intersection Cardinality and Its Applications Jiahui Gao, Ni Trieu, Avishay Yanai
2022/734 (PDF ) Tight Preimage Resistance of the Sponge Construction Charlotte Lefevre, Bart Mennink
2022/733 (PDF ) Breaking the quadratic barrier: Quantum cryptanalysis of Milenage, telecommunications’ cryptographic backbone Vincent Ulitzsch, Jean-Pierre Seifert
2022/732 (PDF ) Structure-Preserving Compilers from New Notions of Obfuscations Matteo Campanelli, Danilo Francati, Claudio Orlandi
2022/731 (PDF ) Triangulating Rebound Attack on AES-like Hashing Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham
2022/730 (PDF ) New Dolev-Reischuk Lower Bounds Meet Blockchain Eclipse Attacks Ittai Abraham, Gilad Stern
2022/729 (PDF ) Integral Cryptanalysis of WARP based on Monomial Prediction Hosein Hadipour, Maria Eichlseder
2022/728 (PDF ) Snowball: Another View on Side-Channel Key Recovery Tools Jiangshan Long, Changhai Ou, Zhu Wang, Shihui Zheng, Fei Yan, Fan Zhang, Siew-Kei Lam
2022/727 (PDF ) A Lower Bound for Proving Hardness of Learning with Rounding with Polynomial Modulus Parker Newton, Silas Richelson
2022/726 (PDF ) Radix-3 NTT-Based Polynomial Multiplication for Lattice-Based Cryptography Chenar Abdulla Hassan, Oğuz Yayla
2022/725 (PDF ) Revisiting Related-Key Boomerang attacks on AES using computer-aided tool Patrick Derbez, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen
2022/724 (PDF ) A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem Thomas Schamberger, Lukas Holzbaur, Julian Renner, Antonia Wachter-Zeh, Georg Sigl
2022/723 (PDF ) Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng
2022/722 (PDF ) Speedy Error Reconciliation Kaibo Liu, Xiaozhuo Gu, Peixin Ren, Xuwen Nie
2022/721 (PDF ) Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs Jelle Vos, Mauro Conti, Zekeriya Erkin
2022/720 (PDF ) A Model Set Method to Search Integral Distinguishers Based on Division Property for Block Ciphers Liu Zhang, Huawei Liu, Zilong Wang
2022/719 (PDF ) Contingent payments from two-party signing and verification for abelian groups Sergiu Bursuc, Sjouke Mauw
2022/718 (PDF ) A Post-Quantum Four-Party Outsourced Authentication Reza Ghasemi, Alptekin Küpçü
2022/717 (PDF ) Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments Yacov Manevich, Adi Akavia
2022/716 (PDF ) x-Superoptimal Pairings on some Elliptic Curves with Odd Prime Embedding Degrees Emmanuel Fouotsa, Azebaze Guimagang Laurian, Ayissi Raoul
2022/715 (PDF ) Ultimate SLH: Taking Speculative Load Hardening to the Next Level Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom
2022/714 (PDF ) MicroSecAgg: Streamlined Single-Server Secure Aggregation Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, Tucker Balch
2022/713 (PDF ) More Efficient (Reusable) Private Set Union Dov Gordon, Carmit Hazay, Phi Hung Le, Mingyu Liang
2022/712 (PDF ) The Hardness of LPN over Any Integer Ring and Field for PCG Applications Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu
2022/711 (PDF ) Efficient and Adaptively Secure Asynchronous Binary Agreement via Binding Crusader Agreement Ittai Abraham, Naama Ben-David, Sravya Yandamuri
2022/710 (PDF ) Advanced Signature Functionalities from the Code Equivalence Problem Alessandro Barenghi, Jean-Francois Biasse, Tran Ngo, Edoardo Persichetti, Paolo Santini
2022/709 (PDF ) Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde Knapsack Problem Katharina Boudgoust, Erell Gachon, Alice Pellet-Mary
2022/708 (PDF ) An Estimator for the Hardness of the MQ Problem Emanuele Bellini, Rusydi H. Makarim, Carlo Sanna, Javier Verbel
2022/707 (PDF ) Efficiently Masking Polynomial Inversion at Arbitrary Order Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu
2022/706 (PDF ) Finding and Evaluating Parameters for BGV Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj
2022/705 (PDF ) Linear-map Vector Commitments and their Practical Applications Matteo Campanelli, Anca Nitulescu, Carla Ràfols, Alexandros Zacharakis, Arantxa Zapico
2022/704 (PDF ) Parameter Optimization & Larger Precision for (T)FHE Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
2022/703 (PDF ) Proof-of-possession for KEM certificates using verifiable generation Tim Güneysu, Philip Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha
2022/701 (PDF ) Truncated Boomerang Attacks and Application to AES-based Ciphers Augustin Bariant, Gaëtan Leurent
2022/700 (PDF ) Grief-free Atomic Swaps Tejaswi Nadahalli, Majid Khabbazian, Roger Wattenhofer
2022/699 (PDF ) On the Quantum Security of OCB Varun Maram, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman
2022/698 (PDF ) State Machine Replication under Changing Network Conditions Andreea B. Alexandru, Erica Blum, Jonathan Katz, Julian Loss
2022/697 (PDF ) Rate-1 Incompressible Encryption from Standard Assumptions Pedro Branco, Nico Döttling, Jesko Dujmovic
2022/696 (PDF ) On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups Dario Catalano, Dario Fiore, Rosario Gennaro, Emanuele Giunta
2022/695 (PDF ) Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES Marek Bielik, Martin Jureček, Olha Jurečková, Róbert Lórencz
2022/694 (PDF ) Squirrel: Efficient Synchronized Multi-Signatures from Lattices Nils Fleischhacker, Mark Simkin, Zhenfei Zhang
2022/693 (PDF ) Unified View for Notions of Bit Security Shun Watanabe, Kenji Yasunaga
2022/691 (PDF ) QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore Sujaya Maiyya, Seif Ibrahim, Caitlin Scarberry, Divyakant Agrawal, Amr El Abbadi, Huijia Lin, Stefano Tessaro, Victor Zakhary
2022/690 (PDF ) Authentication in the Bounded Storage Model Yevgeniy Dodis, Willy Quach, Daniel Wichs
2022/689 (PDF ) Tight Multi-User Security Bound of $\textsf{DbHtS}$ Nilanjan Datta, Avijit Dutta, Mridul Nandi, Suprita Talnikar
2022/688 (PDF ) Memory-Efficient Single Data-Complexity Attacks on LowMC Using Partial Sets Subhadeep Banik, Khashayar Barooti, Andrea Caforio, Serge Vaudenay
2022/687 (PDF ) Adaptively Secure Single Secret Leader Election from DDH Dario Catalano, Dario Fiore, Emanuele Giunta
2022/686 (PDF ) Proof of Mirror Theory for a Wide Range of $\xi_{\max}$ Benoît Cogliati, Avijit Dutta, Mridul Nandi, Jacques Patarin, Abishanka Saha
2022/685 (PDF ) Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/684 (PDF ) RSK: A Bitcoin sidechain with stateful smart-contracts Sergio Demian Lerner, Javier Álvarez Cid-Fuentes, Julian Len, Ramsès Fernàndez-València, Patricio Gallardo, Nicolás Vescovo, Raúl Laprida, Shreemoy Mishra, Federico Jinich, Diego Masini
2022/683 (PDF ) Quantum Analysis of AES Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, Anupam Chattopadhyay
2022/682 (PDF ) Secure Federated Clustering Songze Li, Sizai Hou, Baturalp Buyukates, Salman Avestimehr
2022/681 (PDF ) Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs
2022/680 (PDF ) Practical Delegatable Anonymous Credentials From Equivalence Class Signatures Omid Mir, Daniel Slamanig, Balthazar Bauer, René Mayrhofer
2022/679 (PDF ) Vandermonde meets Regev: Public Key Encryption Schemes Based on Partial Vandermonde Problems Katharina Boudgoust, Amin Sakzad, Ron Steinfeld
2022/678 (PDF ) New Constructions of Collapsing Hashes Mark Zhandry
2022/677 (PDF ) A Conjecture on Hermite Constants Leon Mächler, David Naccache
2022/676 (PDF ) Finding many Collisions via Reusable Quantum Walks Xavier Bonnetain, André Chailloux, André Schrottenloher, Yixin Shen
2022/675 (PDF ) MPClan: Protocol Suite for Privacy-Conscious Computations Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh
2022/673 (PDF ) Meet-in-the-Filter and Dynamic Counting with Applications to Speck Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov
2022/672 (PDF ) CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas Tassos Dimitriou, Khazam Alhamdan
2022/671 (PDF ) The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions Shujiao Cao, Rui Xue
2022/670 (PDF ) Practical UC-Secure Zero-Knowledge Smart Contracts Jayamine Alupotha, Xavier Boyen
2022/669 (PDF ) On those Boolean functions that are coset leaders of first order Reed-Muller codes Claude Carlet, Serge Feukoua
2022/668 (PDF ) Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security Yaobin Shen, Ferdinand Sibleyras
2022/667 (PDF ) Arithmetic Tuples for MPC Pascal Reisert, Marc Rivinius, Toomas Krips, Ralf Küsters
2022/666 (PDF ) Deciding and reconstructing linear equivalence of uniformly distributed functions Ivana Ivkovic, Nikolay Kaleyski
2022/665 (PDF ) NOVA, a Noncommutative-ring Based Unbalanced Oil and Vinegar Signature Scheme with Key-randomness Alignment Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, Chun-Yen Chou
2022/664 (PDF ) The $c-$differential uniformity and boomerang uniformity of three classes of permutation polynomials over $\mathbb{F}_{2^n}$ Qian Liu, Zhiwei Huang, Jianrui Xie, Ximeng Liu, Jian Zou
2022/663 (PDF ) SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning Harsh Chaudhari, Matthew Jagielski, Alina Oprea
2022/662 (PDF ) SHORTSTACK : Distributed, Fault-tolerant, Oblivious Data Access Midhul Vuppalapati, Kushal Babel, Anurag Khandelwal, Rachit Agarwal
2022/661 (PDF ) Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric Aisling Connolly, Jerome Deschamps, Pascal Lafourcade, Octavio Perez Kempner
2022/660 (PDF ) Secure Sampling with Sublinear Communication Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich
2022/659 (PDF ) ABE for Circuits with Constant-Size Secret Keys and Adaptive Security Hanjun Li, Huijia Lin, Ji Luo
2022/658 (PDF ) Unclonable Polymers and Their Cryptographic Applications Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe’er, Anna Roitburd-Berman, Eran Tromer
2022/657 (PDF ) BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer
2022/656 (PDF ) Quantum Augmented Dual Attack Martin R. Albrecht, Yixin Shen
2022/655 (PDF ) Bit Security as Cost to Demonstrate Advantage Keewoo Lee
2022/654 (PDF ) Torsion point attacks on ``SIDH-like'' cryptosystems Péter Kutas, Christophe Petit
2022/653 (PDF ) Fast Unbalanced Private Set Union from Fully Homomorphic Encryption Binbin Tu, Yu Chen, Qi Liu, Cong Zhang
2022/652 (PDF ) Private Set Operations from Multi-Query Reverse Private Membership Test Yu Chen, Min Zhang, Cong Zhang, Minglang Dong, Weiran Liu
2022/651 (PDF ) Revisiting the Efficiency of Asynchronous Multi Party Computation Against General Adversaries Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
2022/650 (PDF ) Supersingular Non-Superspecial Abelian Surfaces in Cryptography Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig
2022/649 (PDF ) IBE with Incompressible Master Secret and Small Identity Secrets Nico Döttling, Sanjam Garg, Sruthi Sekar, Mingyuan Wang
2022/648 (PDF ) Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, Ioannis Demertzis
2022/647 (PDF ) Quantum Implementation and Analysis of DEFAULT Kyungbae Jang, Anubhab Baksi, Jakub Breier, Hwajeong Seo, Anupam Chattopadhyay
2022/645 (PDF ) Round-Optimal Multi-Party Computation with Identifiable Abort Michele Ciampi, Divya Ravi, Luisa Siniscalchi, Hendrik Waldner
2022/644 (PDF ) DiLizium 2.0: Revisiting Two-Party Crystals-Dilithium Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk
2022/643 (PDF ) Accelerating the Best Trail Search on AES-Like Ciphers Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
2022/642 (PDF ) Statistical Effective Fault Attacks: The other Side of the Coin Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany
2022/641 (PDF ) Self-Timed Masking: Implementing Masked S-Boxes Without Registers Mateus Simões, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno
2022/640 (PDF ) Dialektos: Privacy-preserving Smart Contracts Tadas Vaitiekūnas
2022/639 (PDF ) Anamorphic Encryption: Private Communication against a Dictator Giuseppe Persiano, Duong Hieu Phan, Moti Yung
2022/638 (PDF ) Impossibilities in Succinct Arguments: Black-box Extraction and More Matteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh, Janno Siim
2022/637 (PDF ) Conditional Attribute-Based Proxy Re-Encryption: Definitions and Constructions from LWE Lisha Yao, Jian Weng, Pengfei Wu, Xiaoguo Li, Yi Liu, Junzuo Lai, Guomin Yang, Robert H. Deng
2022/636 (PDF ) Integer Syndrome Decoding in the Presence of Noise Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso
2022/635 (PDF ) Post-Quantum Secure Boot on Vehicle Network Processors Joppe W. Bos, Brian Carlson, Joost Renes, Marius Rotaru, Daan Sprenkels, Geoffrey P. Waters
2022/634 (PDF ) Round-Optimal Lattice-Based Threshold Signatures, Revisited Shweta Agrawal, Damien Stehle, Anshu Yadav
2022/633 (PDF ) CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes Shiyu Shen, Hao Yang, Yu Liu, Zhe Liu, Yunlei Zhao
2022/632 (PDF ) Recovering Rainbow's Secret Key with a First-Order Fault Attack Thomas Aulbach, Tobias Kovats, Juliane Krämer, Soundes Marzougui
2022/631 (PDF ) Watermarking PRFs against Quantum Adversaries Fuyuki Kitagawa, Ryo Nishimaki
2022/630 (PDF ) Enforcing fine-grained constant-time policies Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya
2022/629 (PDF ) Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors (extended version)? Alexandros Bakas, Antonis Michalas, Eugene Frimpong, Reyhaneh Rabbaninejad
2022/628 (PDF ) High-Performance Polynomial Multiplication Hardware Accelerators for KEM Saber and NTRU Elizabeth Carter, Pengzhou He, Jiafeng Xie
2022/627 (PDF ) Secure Hierarchical Deterministic Wallet Supporting Stealth Address Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu
2022/626 (PDF ) New method for combining Matsui’s bounding conditions with sequential encoding method Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
2022/625 (PDF ) Dashing and Star: Byzantine Fault Tolerance with Weak Certificates Sisi Duan, Haibin Zhang, Xiao Sui, Baohan Huang, Changchun Mu, Gang Di, Xiaoyun Wang
2022/624 (PDF ) Cryptanalysis of Three Quantum Money Schemes Andriyan Bilyk, Javad Doliskani, Zhiyong Gong
2022/623 (PDF ) Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority Anders Dalskov, Daniel Escudero, Ariel Nof
2022/622 (PDF ) Efficient and Accurate homomorphic comparisons Olive Chakraborty, Martin Zuber
2022/621 (PDF ) Caulk: Lookup Arguments in Sublinear Time Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin
2022/620 (PDF ) Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits Zhenyu Huang, Siwei Sun
2022/619 (PDF ) Breaking the $t< n/3$ Consensus Bound: Asynchronous Dynamic Proactive Secret Sharing under Honest Majority Christophe Levrat, Matthieu Rambaud, Antoine Urban
2022/618 (PDF ) A simple proof of ARX completeness Adriano Koleci
2022/617 (PDF ) SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model Shingo Sato, Junji Shikata
2022/616 (PDF ) Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles Ren Ishibashi, Kazuki Yoneyama
2022/615 (PDF ) Smoothing Codes and Lattices: Systematic Study and New Bounds Thomas Debris, Léo Ducas, Nicolas Resch, Jean-Pierre Tillich
2022/613 (PDF ) GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs Marloes Venema, Greg Alpár
2022/612 (PDF ) Cryptanalysis of Reduced Round SPEEDY Raghvendra Rohit, Santanu Sarkar
2022/611 (PDF ) Further Cryptanalysis of a Type of RSA Variants Gongyu Shi, Geng Wang, Dawu Gu
2022/610 (PDF ) On the Differential Spectrum of a Differentially $3$-Uniform Power Function Tingting Pang, Nian Li, Xiangyong Zeng
2022/609 (PDF ) Optimal Single-Server Private Information Retrieval Mingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, Elaine Shi
2022/608 (PDF ) Practical Provably Secure Flooding for Blockchains Chen-Da Liu-Zhang, Christian Matt, Ueli Maurer, Guilherme Rito, Søren Eller Thomsen
2022/607 (PDF ) Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations (Long Version) Son Ho, Jonathan Protzenko, Abhishek Bichhawat, Karthikeyan Bhargavan
2022/606 (PDF ) Honorific Security: Efficient Two-Party Computation with Offloaded Arbitration and Public Verifiability Tianxiang Dai, Yufan Jiang, Yong Li, Jörn Müller-Quade, Andy Rupp
2022/605 (PDF ) Weighted Attribute-Based Encryption with Parallelized Decryption Alexandru Ionita
2022/604 (PDF ) Algorithm Substitution Attacks against Receivers Marcel Armour, Bertram Poettering
2022/603 (PDF ) Distributed Blockchain Price Oracle Léonard Lys, Maria Potop-Butucaru
2022/602 (PDF ) Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin
2022/601 (PDF ) A Better Method to Analyze Blockchain Consistency Lucianna Kiffer, Rajmohan Rajaraman, abhi shelat
2022/600 (PDF ) A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations Loïc Masure, Olivier Rioul, François-Xavier Standaert
2022/599 (PDF ) TenderTee: Secure Tendermint Lionel Beltrando, Maria Potop-Butucaru, Jose Alfaro
2022/598 (PDF ) Verifiable and forward private conjunctive keyword search from DIA tree Laltu Sardar, Sushmita Ruj
2022/597 (PDF ) Foundations of Dynamic BFT Sisi Duan, Haibin Zhang
2022/596 (PDF ) Zero Knowledge Proofs of Elliptic Curve Inner Products from Principal Divisors and Weil Reciprocity Liam Eagen
2022/595 (PDF ) On the Cryptographic Fragility of the Telegram Ecosystem Theo von Arx, Kenneth G. Paterson
2022/592 (PDF ) Chaghri --- an FHE-friendly Block Cipher Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar
2022/591 (PDF ) Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, Kazuo Sakiyama
2022/590 (PDF ) Secure Merge in Linear Time and O(log log N) Rounds Mark Blunk, Paul Bunn, Samuel Dittmer, Steve Lu, Rafail Ostrovsky
2022/589 (PDF ) Unnecessary Input Heuristics & PayJoin Transactions Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter and
2022/588 (PDF ) Efficient Lifting for Shorter Zero-Knowledge Proofs and Post-Quantum Signatures Daniel Kales, Greg Zaverucha
2022/587 (PDF ) Doubly Efficient Interactive Proofs over Infinite and Non-Commutative Rings Eduardo Soria-Vazquez
2022/586 (PDF ) A survey of elliptic curves for proof systems Diego F. Aranha, Youssef El Housni, Aurore Guillevic
2022/585 (PDF ) Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability Yi Liu, Qi Wang, Siu-Ming Yiu
2022/584 (PDF ) Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups Lior Rotem
2022/583 (PDF ) A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff Lior Rotem, Gil Segev
2022/582 (PDF ) Ponyta: Foundations of Side-Contract-Resilient Fair Exchange Hao Chung, Elisaweta Masserova, Elaine Shi, Sri AravindaKrishnan Thyagarajan
2022/581 (PDF ) Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage Lidong Han, Guangwu Xu, Qi Xie, Xiao Tan, Chengliang Tian
2022/580 (PDF ) How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing Samuel Sousa, Roman Kern
2022/579 (PDF ) Compact and Efficient KEMs over NTRU Lattices Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao
2022/578 (PDF ) Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri
2022/577 (PDF ) Construction of generalized-involutory MDS matrices Xuting Zhou, Tianshuo Cong
2022/576 (PDF ) On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage Akira Ito, Rei Ueno, Naofumi Homma
2022/575 (PDF ) Optimizing Homomorphic Encryption Parameters for Arbitrary Applications Charles Gouert, Rishi Khan, Nektarios Georgios Tsoutsos
2022/574 (PDF ) Comparison-Based MPC in Star Topology (Full Version) Gowri R Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider
2022/573 (PDF ) Finding One Common Item, Privately Tyler Beauregard, Janabel Xia, Mike Rosulek
2022/572 (PDF ) Homomorphically counting elements with the same property Ilia Iliashenko, Malika Izabachène, Axel Mertens, Hilder V. L. Pereira.
2022/571 (PDF ) Entropically secure cipher for messages generated by Markov chains with unknown statistics Boris Ryabko
2022/570 (PDF ) Secure and Private Source Coding with Private Key and Decoder Side Information Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
2022/569 (PDF ) TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks Marloes Venema, Greg Alpár
2022/568 (PDF ) Improved MITM Cryptanalysis on Streebog Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang
2022/567 (PDF ) FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher Michele Fabbrini
2022/566 (PDF ) AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang
2022/565 (PDF ) Power Contracts: Provably Complete Power Leakage Models for Processors Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadžić, Stefan Mangard, Robert Primas
2022/564 (PDF ) FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization Christopher van der Beets, Raine Nieminen, Thomas Schneider
2022/563 (PDF ) Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang
2022/562 (PDF ) Orientations and cycles in supersingular isogeny graphs Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine Stange, Ha T. N. Tran
2022/561 (PDF ) Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes Shivam Bhasin, Dirmanto Jap, Wei Cheng Ng, Siang Meng Sim
2022/560 (PDF ) Distributed Shuffling in Adversarial Environments Kasper Green Larsen, Maciej Obremski, Mark Simkin
2022/559 (PDF ) DeCAF: Decentralizable Continuous Group Key Agreement with Fast Healing Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak
2022/558 (PDF ) On Seedless PRNGs and Premature Next Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro
2022/557 (PDF ) Honest Majority Multi-Prover Interactive Arguments Alexander R. Block, Christina Garman
2022/556 (PDF ) Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu
2022/555 (PDF ) Adapting Belief Propagation to Counter Shuffling of NTTs Julius Hermelink, Silvan Streit, Emanuele Strieder, Katharina Thieme
2022/554 (PDF ) Byzantine Reliable Broadcast with $O(nL+kn+n^2 log n)$ Communication Sisi Duan, Haibin Zhang
2022/553 (PDF ) Secure Storage with Deduplication John Best, Wayne Hineman, Steven Hetzler, Guerney Hunt, Charanjit S. Jutla
2022/552 (PDF ) Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
2022/551 (PDF ) Marlin: Two-Phase BFT with Linearity Xiao Sui, Sisi Duan, Haibin Zhang
2022/550 (PDF ) ROAST: Robust Asynchronous Schnorr Threshold Signatures Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder
2022/549 (PDF ) Smart Contracts Obfuscation from Blockchain-based One-time Program Sora Suegami
2022/548 (PDF ) Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security Yuyu Wang, Jiaxin Pan
2022/547 (PDF ) Fast signing method in RSA with high speed verification GyuChol. Kim, YongBok. Jong
2022/546 (PDF ) He-HTLC: Revisiting Incentives in HTLC Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, Kartik Nayak
2022/545 (PDF ) Logic Locking - Connecting Theory and Practice Elisaweta Masserova, Deepali Garg, Ken Mai, Lawrence Pileggi, Vipul Goyal, Bryan Parno
2022/544 (PDF ) Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting Donghoon Chang, Deukjo Hong, Jinkeon Kang
2022/543 (PDF ) Aura: private voting with reduced trust on tallying authorities Aram Jivanyan, Aaron Feickert
2022/542 (PDF ) On Valiant's Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles Mathias Hall-Andersen, Jesper Buus Nielsen
2022/541 (PDF ) The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell
2022/540 (PDF ) On the revision of NIST 800-22 Test Suites Katarzyna Anna Kowalska, Davide Fogliano, Jose Garcia Coello
2022/539 (PDF ) Post Quantum Noise Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, Fiona Johanna Weber
2022/538 (PDF ) Post-Quantum Signatures on RISC-V with Hardware Acceleration Patrick Karl, Jonas Schupp, Tim Fritzmann, Georg Sigl
2022/537 (PDF ) Rubato: Noisy Ciphers for Approximate Homomorphic Encryption (Full Version) Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Jooyoung Lee, Mincheol Son
2022/536 (PDF ) Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha Sabyasachi Dey, Hirendra Kumar Garai, Santanu Sarkar, Nitin Kumar Sharma
2022/535 (PDF ) Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round Damiano Abram, Peter Scholl, Sophia Yakoubov
2022/534 (PDF ) On the Adaptive Security of the Threshold BLS Signature Scheme Renas Bacho, Julian Loss
2022/533 (PDF ) Băhēm: A Symmetric Cipher with Provable 128-bit Security M. Rajululkahf
2022/532 (PDF ) Rotation Key Reduction for Client-Server Systems of Deep Neural Network on Fully Homomorphic Encryption Joon-Woo Lee, Eunsang Lee, Young-Sik Kim, Jong-Seon No
2022/531 (PDF ) Jammin' on the deck Norica Băcuieți, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer
2022/530 (PDF ) High-speed SABER Key Encapsulation Mechanism in 65nm CMOS Malik Imran, Felipe Almeida, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini
2022/529 (PDF ) Laconic Private Set-Intersection From Pairings Diego Aranha, Chuanwei Lin, Claudio Orlandi, Mark Simkin
2022/528 (PDF ) On Random Sampling of Supersingular Elliptic Curves Marzio Mula, Nadir Murru, Federico Pintore
2022/527 (PDF ) PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms Jungmin Park, N. Nalla Anandakumar, Dipayan Saha, Dhwani Mehta, Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor
2022/526 (PDF ) Optimal Tightness for Chain-Based Unique Signatures Fuchun Guo, Willy Susilo
2022/525 (PDF ) Breaking Goppa-Based McEliece with Hints Elena Kirshanova, Alexander May
2022/524 (PDF ) Inner Product Functional Commitments with Constant-Size Public Parameters and Openings Hien Chu, Dario Fiore, Dimitris Kolonelos, Dominique Schröder
2022/523 (PDF ) A side-channel based disassembler for the ARM-Cortex M0 Jurian van Geest, Ileana Buhan
2022/522 (PDF ) The Case of Small Prime Numbers Versus the Joye-Libert Cryptosystem George Teseleanu
2022/521 (PDF ) On The Distributed Discrete Logarithm Problem with Preprocessing Pavel Hubáček, Ľubica Jančová, Veronika Králová
2022/520 (PDF ) Efficient Verification of the Wesolowski Verifiable Delay Function for Distributed Environments Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2022/519 (PDF ) HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest Md Rasid Ali, Debranjan Pal, Abhijit Das, Dipanwita Roychowdhury
2022/518 (PDF ) Failing to hash into supersingular isogeny graphs Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig
2022/517 (PDF ) Local permutation polynomials and the action of e-Klenian groups Jaime Gutierrez, Jorge Jimenez Urroz
2022/516 (PDF ) zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos
2022/515 (PDF ) MOSFHET: Optimized Software for FHE over the Torus Antonio Guimarães, Edson Borin, Diego F. Aranha
2022/514 (PDF ) A Key-Recovery Side-Channel Attack on Classic McEliece Qian Guo, Andreas Johansson, Thomas Johansson
2022/513 (PDF ) Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks (CASCADA) Adrián Ranea, Vincent Rijmen
2022/512 (PDF ) A Bit-Vector Differential Model for the Modular Addition by a Constant and its Applications to Differential and Impossible-Differential Cryptanalysis Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
2022/510 (PDF ) Bulletproofs++: Next Generation Confidential Transactions via Reciprocal Set Membership Arguments Liam Eagen, Sanket Kanjalkar, Tim Ruffing, Jonas Nick
2022/509 (PDF ) Lattice Signature with Efficient Protocols, Application to Anonymous Credentials Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders
2022/508 (PDF ) Security of Truncated Permutation Without Initial Value Lorenzo Grassi, Bart Mennink
2022/507 (PDF ) Low-Latency Hardware Private Circuits David Knichel, Amir Moradi
2022/506 (PDF ) Design and analysis of a distributed ECDSA signing service Jens Groth, Victor Shoup
2022/505 (PDF ) Riding the Waves Towards Generic Single-Cycle Masking in Hardware Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard
2022/504 (PDF ) Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev
2022/503 (PDF ) Towards a Formal Treatment of Logic Locking Peter Beerel, Marios Georgiou, Ben Hamlin, Alex J. Malozemoff, Pierluigi Nuzzo
2022/502 (PDF ) Fast Diffusion Block for Secret Key Cryptography Vlastimil Klima
2022/501 (PDF ) Another Concrete Quantum Cryptanalysis of Binary Elliptic Curves Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Harashta Tatimma Larasati, Howon Kim
2022/500 (PDF ) Multi-Server PIR with Full Error Detection and Limited Error Correction Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2022/499 (PDF ) Cryptographic Oracle-Based Conditional Payments Varun Madathil, Sri AravindaKrishnan Thyagarajan, Dimitrios Vasilopoulos, Lloyd Fournier, Giulio Malavolta, Pedro Moreno-Sanchez
2022/498 (PDF ) Limitations of Information-theoretic Incompressible Encodings Petr Sedláček
2022/497 (PDF ) Protecting Distributed Primitives against Leakage: Equivocal Secret Sharing and More Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2022/496 (PDF ) Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium Naina Gupta, Arpan Jati, Anupam Chattopadhyay, Gautam Jha
2022/495 (PDF ) Maliciously Circuit-Private FHE from Information-Theoretic Principles Nico Döttling, Jesko Dujmovic
2022/494 (PDF ) Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM Emre Karabulut, Erdem Alkim, Aydin Aysu
2022/493 (PDF ) Don’t Learn What You Already Know: Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking Loïc Masure, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert
2022/492 (PDF ) Towards Smart Contract-based Verification of Anonymous Credentials Robert Muth, Tarek Galal, Jonathan Heiss, Florian Tschorsch
2022/491 (PDF ) Multi-Party Computation in the GDPR Lukas Helminger, Christian Rechberger
2022/490 (PDF ) Information Bounds and Convergence Rates for Side-Channel Security Evaluators Loïc Masure, Gaëtan Cassiers, Julien Hendrickx, François-Xavier Standaert
2022/489 (PDF ) A Practical-Quantum Differential Attack on Block Ciphers Tarun Yadav, Manoj Kumar, Amit Kumar, S K Pal
2022/488 (PDF ) OrgAn: Organizational Anonymity with Low Latency Debajyoti Das, Easwar Vivek Mangipudi, Aniket Kate
2022/487 (PDF ) New Key-Recovery Attack on Reduced-Round AES Navid Ghaedi Bardeh, Vincent Rijmen
2022/486 (PDF ) MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete, Léo Robert
2022/485 (PDF ) Two new classes of permutation trinomials over $\mathbb{F}_{q^3}$ with odd characteristic Xi Xie, Nian Li, Linjie Xu, Xiangyong Zeng, Xiaohu Tang
2022/484 (PDF ) VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu
2022/483 (PDF ) When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications Geoff Twardokus, Nina Bindel, Hanif Rahbari, Sarah McCarthy
2022/482 (PDF ) cuFE: High Performance Privacy Preserving Support Vector Machine with Inner-Product Functional Encryption KyungHyun Han, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Seong Oun Hwang
2022/481 (PDF ) India’s “Aadhaar” Biometric ID: Structure, Security, and Vulnerabilities Pratyush Ranjan Tiwari, Dhruv Agarwal, Prakhar Jain, Swagam Dasgupta, Preetha Datta, Vineet Reddy, Debayan Gupta
2022/480 (PDF ) Medha: Microcoded Hardware Accelerator for computing on Encrypted Data Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy
2022/479 (PDF ) Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi
2022/478 (PDF ) Property-Preserving Hash Functions and Combinatorial Group Testing Kazuhiko Minematsu
2022/477 (PDF ) Subverting Cryptographic Hardware used in Blockchain Consensus Pratyush Ranjan Tiwari, Matthew Green
2022/476 (PDF ) On the Security of TrCBC Debrup Chakraborty, Samir Kundu
2022/475 (PDF ) SIDH-sign: an efficient SIDH PoK-based signature Jesús-Javier Chi-Domínguez, Víctor Mateu, Lucas Pandolfo Perin
2022/474 (PDF ) Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication Catinca Mujdei, Arthur Beckers, Jose Maria Bermudo Mera, Angshuman Karmakar, Lennert Wouters, Ingrid Verbauwhede
2022/473 (PDF ) Understanding binary-Goppa decoding Daniel J. Bernstein
2022/472 (PDF ) On the Hardness of Module Learning With Errors with Short Distributions Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2022/471 (PDF ) Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis - A Report on the CHES Challenge Side-Channel Contest 2020 Aron Gohr, Friederike Laus, Werner Schindler
2022/470 (PDF ) Designated-Verifier Linkable Ring Signatures Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou
2022/469 (PDF ) Efficient ASIC Architectures for Low Latency Niederreiter Decryption Daniel Fallnich, Shutao Zhang, Tobias Gemmeke
2022/468 (PDF ) Improved Pump and Jump BKZ by Sharp Simulator Leizhang Wang, Wenwen Xia, Geng Wang, Baocang Wang, Dawu Gu
2022/467 (PDF ) Armistice: Micro-Architectural Leakage Modelling for Masked Software Formal Verification Arnaud de Grandmaison, Karine Heydemann, Quentin L. Meunier
2022/466 (PDF ) Quantum binary quadratic form reduction Nicolas David, Thomas Espitau, Akinori Hosoyamada
2022/463 (PDF ) Reducing the Depth of Quantum FLT-Based Inversion Circuit Harashta Tatimma Larasati, Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Howon Kim
2022/462 (PDF ) New optimization techniques for PlonK’s arithmetization Miguel Ambrona, Anne-Laure Schmitt, Raphael R. Toledo, Danny Willems
2022/461 (PDF ) Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks Wei Cheng, Sylvain Guilley, Jean-Luc Danger
2022/459 (PDF ) SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany
2022/458 (PDF ) Multilinear Schwartz-Zippel mod N with Applications to Succinct Arguments Benedikt Bünz, Ben Fisch
2022/457 (PDF ) Improving Differential-Neural Distinguisher Model For DES, Chaskey and PRESENT Liu Zhang, Zilong Wang
2022/456 (PDF ) Robust, Revocable and Adaptively Secure Attribute-Based Encryption with Outsourced Decryption Anis Bkakria
2022/455 (PDF ) Proof of Availability & Retrieval in a Modular Blockchain Architecture Shir Cohen, Guy Goren, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman
2022/454 (PDF ) Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC Thomas Attema, Vincent Dunning, Maarten Everts, Peter Langenkamp
2022/452 (PDF ) UTT: Decentralized Ecash with Accountable Privacy Alin Tomescu, Adithya Bhat, Benny Applebaum, Ittai Abraham, Guy Gueta, Benny Pinkas, Avishay Yanai
2022/451 (PDF ) Improved Stock Market Structure Using Cryptography Charanjit S. Jutla, Barry Mishra
2022/450 (PDF ) Astrape: Anonymous Payment Channels with Boring Cryptography Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba
2022/449 (PDF ) On End-to-End Encryption Britta Hale, Chelsea Komlo
2022/448 (PDF ) Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021 Sven Bauer, Hermann Drexler, Maximilian Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann
2022/447 (PDF ) Leveled Multikey FHE with constant-size ciphertexts from RLWE Vanesa Daza, Paz Morillo, Sergi Rovira
2022/446 (PDF ) Fast Side-Channel Key-Recovery Attack against Elephant Dumbo Louis Vialar
2022/445 (PDF ) TWAP Oracle Attacks: Easier Done than Said? Torgin Mackinga, Tejaswi Nadahalli, Roger Wattenhofer
2022/444 (PDF ) A White-Box Speck Implementation using Self-Equivalence Encodings (Full Version) Joachim Vandersmissen, Adrián Ranea, Bart Preneel
2022/443 (PDF ) Attack on SHealS and HealS: the Second Wave of GPST Steven D. Galbraith, Yi-Fu Lai
2022/442 (PDF ) Quantum Attacks on PRFs Based on Public Random Permutations Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye
2022/441 (PDF ) Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection Paola de Perthuis, David Pointcheval
2022/440 (PDF ) A Security Model for Randomization-based Protected Caches Jordi Ribes-González, Oriol Farràs, Carles Hernández, Vatistas Kostalabros, Miquel Moretó
2022/439 (PDF ) Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang
2022/438 (PDF ) Computing isogenies between finite Drinfeld modules Benjamin Wesolowski
2022/437 (PDF ) Continuous LWE is as Hard as LWE & Applications to Learning Gaussian Mixtures Aparna Gupte, Neekon Vafa, Vinod Vaikuntanathan
2022/436 (PDF ) Publicly Accountable Robust Multi-Party Computation Marc Rivinius, Pascal Reisert, Daniel Rausch, Ralf Kuesters
2022/435 (PDF ) Fiat-Shamir for Proofs Lacks a Proof Even in the Presence of Shared Entanglement Frédéric Dupuis, Philippe Lamontagne, Louis Salvail
2022/434 (PDF ) Verifiable Quantum Advantage without Structure Takashi Yamakawa, Mark Zhandry
2022/433 (PDF ) McFly: Verifiable Encryption to the Future Made Practical Nico Döttling, Lucjan Hanzlik, Bernardo Magri, Stella Wohnig
2022/432 (PDF ) Classical Verification of Quantum Computations in Linear Time Jiayu Zhang
2022/431 (PDF ) Non-Adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions Xinyu Mao, Noam Mazor, Jiapeng Zhang
2022/430 (PDF ) Is the JCJ voting system really coercion-resistant? Véronique Cortier, Pierrick Gaudry, Quentin Yang
2022/429 (PDF ) Resurrecting Xifrat - Compact Cryptosystems 2nd Attempt Jianfang "Danny" Niu
2022/428 (PDF ) Implicit White-Box Implementations: White-Boxing ARX Ciphers Adrián Ranea, Joachim Vandersmissen, Bart Preneel
2022/427 (PDF ) Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications Katarzyna Kapusta, Matthieu Rambaud, Ferdinand Sibleyras
2022/426 (PDF ) Spectre Declassified: Reading from the Right Place at the Wrong Time Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom
2022/425 (PDF ) SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
2022/424 (PDF ) Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2 Dor Amzaleg, Itai Dinur
2022/423 (PDF ) Polynomial Approximation of Inverse sqrt Function for FHE Samanvaya Panda
2022/422 (PDF ) Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde
2022/421 (PDF ) Multiverse of HawkNess: A Universally-Composable MPC-based Hawk Variant Aritra Banerjee, Hitesh Tewari
2022/420 (PDF ) Gemini: Elastic SNARKs for Diverse Environments Jonathan Bootle, Alessandro Chiesa, Yuncong Hu, Michele Orrù
2022/419 (PDF ) Dew: Transparent Constant-sized zkSNARKs Arasu Arun, Chaya Ganesh, Satya Lokam, Tushar Mopuri, Sriram Sridhar
2022/418 (PDF ) LLTI: Low-Latency Threshold Implementations Victor Arribas, Zhenda Zhang, Svetla Nikova
2022/417 (PDF ) Efficient, Actively Secure MPC with a Dishonest Majority: a Survey Emmanuela Orsini
2022/416 (PDF ) Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad
2022/415 (PDF ) Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee
2022/414 (PDF ) PQ-HPKE: Post-Quantum Hybrid Public Key Encryption Mila Anastasova, Panos Kampanakis, Jake Massimo
2022/413 (PDF ) Instachain: Breaking the Sharding Limits via Adjustable Quorums Mustafa Safa Ozdayi, Yue Guo, Mahdi Zamani
2022/412 (PDF ) Complete and Improved FPGA Implementation of Classic McEliece Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang
2022/411 (PDF ) Quotient Approximation Modular Reduction Aurélien Greuet, Simon Montoya, Clémence Vermeersch
2022/410 (PDF ) Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Sumi, Adnan Anwar
2022/409 (PDF ) Proof-of-Stake Is a Defective Mechanism Vicent Sus
2022/408 (PDF ) On the weightwise nonlinearity of weightwise perfectly balanced functions Agnese Gini, Pierrick Méaux
2022/407 (PDF ) Improving the Privacy of Tor Onion Services Edward Eaton, Sajin Sasy, Ian Goldberg
2022/406 (PDF ) Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK Helger Lipmaa, Janno Siim, Michal Zajac
2022/405 (PDF ) Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7 James Howe, Bas Westerbaan
2022/404 (PDF ) Constant Latency in Sleepy Consensus Atsuki Momose, Ling Ren
2022/403 (PDF ) Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang
2022/402 (PDF ) Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li
2022/401 (PDF ) A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols Cas Cremers, Caroline Fontaine, Charlie Jacomme
2022/400 (PDF ) Quantum Advantage from Any Non-Local Game Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Lisa Yang
2022/399 (PDF ) The Inverse of $\chi$ and Its Applications to Rasta-like Ciphers Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe
2022/398 (PDF ) Auditable, Available and Resilient Private Computation on the Blockchain via MPC Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C. Kao, Vladimir Kolesnikov, Abrahim Ladha, Nicholas Pattengale
2022/397 (PDF ) Revocable Hierarchical Attribute-based Signatures from Lattices Daniel Gardham, Mark Manulis
2022/395 (PDF ) A lightweight verifiable secret sharing scheme in IoTs Likang Lu, Jianzhu Lu
2022/394 (PDF ) Fuzz, Penetration, and AI Testing for SoC Security Verification: Challenges and Solutions Kimia Zamiri Azar, Muhammad Monir Hossain, Arash Vafaei, Hasan Al Shaikh, Nurun N. Mondol, Fahim Rahman, Mark Tehranipoor, Farimah Farahmandi
2022/393 (PDF ) Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation Yashvanth Kondi, abhi shelat
2022/392 (PDF ) Poly Onions: Achieving Anonymity in the Presence of Churn Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin
2022/389 (PDF ) Higher-order masked Saber Suparna Kundu, Jan-Pieter D’Anvers, Michiel Van Beirendonck, Angshuman Karmakar, Ingrid Verbauwhede
2022/388 (PDF ) Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu
2022/387 (PDF ) Phase-shift Fault Analysis of Grain-128 HRIDYA P R, Jimmy Jose
2022/386 (PDF ) Secure Two-party Computation Approach for NTRUEncrypt Lin You, Yan Wang, Liang Li, Gengran Hu
2022/385 (PDF ) ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie
2022/384 (PDF ) Light Clients for Lazy Blockchains Ertem Nusret Tas, David Tse, Lei Yang, Dionysis Zindros
2022/383 (PDF ) On Succinct Non-Interactive Arguments in Relativized Worlds Megan Chen, Alessandro Chiesa, Nicholas Spooner
2022/382 (PDF ) Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups Matteo Campanelli, Rosario Gennaro, Kelsey Melissaris, Luca Nizzardo
2022/381 (PDF ) On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption Hirotomo Shinoki, Koji Nuida
2022/380 (PDF ) A Linear-Time 2-Party Secure Merge Protocol Brett Hemenway Falk, Rohit Nema, Rafail Ostrovsky
2022/379 (PDF ) Fully Secure PSI via MPC-in-the-Head S. Dov Gordon, Carmit Hazay, Phi Hung Le
2022/378 (PDF ) Share $\&$ Shrink: (In-)Feasibility of MPC from one Broadcast-then-Asynchrony, and Delegated Computation Antoine Urban, Matthieu Rambaud
2022/377 (PDF ) (Commit-and-Prove) Predictable Arguments with Privacy Hamidreza Khoshakhlagh
2022/376 (PDF ) Universally Composable End-to-End Secure Messaging Ran Canetti, Palak Jain, Marika Swanberg, Mayank Varia
2022/375 (PDF ) A Note on the Security Framework of Two-key DbHtS MACs Tingting Guo, Peng Wang
2022/374 (PDF ) Simple Three-Round Multiparty Schnorr Signing with Full Simulatability Yehuda Lindell
2022/373 (PDF ) Blind accumulators for e-voting Sergey Agievich
2022/372 (PDF ) Shorter quantum circuits Vadym Kliuchnikov, Kristin Lauter, Romy Minko, Christophe Petit, Adam Paetznick
2022/371 (PDF ) A High-performance ECC Processor over Curve448 based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier Asep Muhamad Awaludin, Jonguk Park, Rini Wisnu Wardhani, Howon Kim
2022/370 (PDF ) Efficient NIZKs from LWE via Polynomial Reconstruction and ``MPC in the Head" Riddhi Ghosal, Paul Lou, Amit Sahai
2022/369 (PDF ) Matching Attacks on Romulus-M Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata
2022/368 (PDF ) Spiral: Fast, High-Rate Single-Server PIR via FHE Composition Samir Jordan Menon, David J. Wu
2022/367 (PDF ) Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings Patrick Longa
2022/366 (PDF ) On the Algebraic Degree of Iterated Power Functions Clémence Bouvier, Anne Canteaut, Léo Perrin
2022/365 (PDF ) Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz
2022/364 (PDF ) Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE Aymeric Genêt, Novak Kaluđerović
2022/363 (PDF ) An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security Damiano Abram, Ivan Damgård, Claudio Orlandi, Peter Scholl
2022/362 (PDF ) How to Backdoor (Classic) McEliece and How to Guard Against Backdoors Tobias Hemmert, Alexander May, Johannes Mittmann, Carl Richard Theodor Schneider
2022/361 (PDF ) Base64 Malleability in Practice Panagiotis Chatzigiannis, Konstantinos Chalkias
2022/360 (PDF ) Privacy-Preserving Contrastive Explanations with Local Foil Trees Thijs Veugen, Bart Kamphorst, Michiel Marcus
2022/359 (PDF ) How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippel
2022/358 (PDF ) Linear Private Set Union from Multi-Query Reverse Private Membership Test Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin
2022/357 (PDF ) An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves Antonin Leroux
2022/356 (PDF ) A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles MUSTAIN BILLAH, SK. TANZIR MEHEDI, ADNAN ANWAR, ZIAUR RAHMAN, RAFIQUL ISLAM
2022/355 (PDF ) A More Complete Analysis of the Signal Double Ratchet Algorithm Alexander Bienstock, Jaiden Fairoze, Sanjam Garg, Pratyay Mukherjee, Srinivasan Raghuraman
2022/354 (PDF ) Optimal Synchronous Approximate Agreement with Asynchronous Fallback Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer
2022/353 (PDF ) SNARGs for P from Sub-exponential DDH and QR James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan
2022/352 (PDF ) Co-factor clearing and subgroup membership testing on pairing-friendly curves Youssef El Housni, Aurore Guillevic, Thomas Piellard
2022/351 (PDF ) Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub
2022/350 (PDF ) DO NOT RUG ON ME: ZERO-DIMENSIONAL SCAM DETECTION Bruno Mazorra, Victor Adan, Vanesa Daza
2022/349 (PDF ) Hard Homogeneous Spaces from the Class Field Theory of Imaginary Hyperelliptic Function Fields Antoine Leudière, Pierre-Jean Spaenlehauer
2022/348 (PDF ) Fast Subgroup Membership Testings for $\mathbb{G}_1$, $\mathbb{G}_2$ and $\mathbb{G}_T$ on Pairing-friendly Curves Yu Dai, Kaizhan Lin, Chang-An Zhao, Zijian Zhou
2022/347 (PDF ) Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, Yongsoo Song
2022/346 (PDF ) Recovering the tight security proof of $SPHINCS^{+}$ Andreas Hülsing, Mikhail Kudinov
2022/345 (PDF ) On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves Wouter Castryck, Marc Houben, Frederik Vercauteren, Benjamin Wesolowski
2022/344 (PDF ) Shorter Signatures from MQ William Wang
2022/343 (PDF ) Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai
2022/342 (PDF ) From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications Lorenzo Grassi, Morten Øygarden, Markus Schofnegger, Roman Walch
2022/341 (PDF ) Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher Nicoleta-Norica Băcuieți, Lejla Batina, Stjepan Picek
2022/340 (PDF ) To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA Azade Rezaeezade, Guilherme Perin, Stjepan Picek
2022/339 (PDF ) New Digital Signature Algorithm EHT Igor Semaev
2022/338 (PDF ) Communication-Efficient Inner Product Private Join and Compute with Cardinality Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, Junichi Tomida
2022/337 (PDF ) Improving Software Quality in Cryptography Standardization Projects Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers
2022/336 (PDF ) Batch Arguments for NP and More from Standard Bilinear Group Assumptions Brent Waters, David J. Wu
2022/335 (PDF ) Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System Tuan-Hong Chua, Iftekhar Salam
2022/334 (PDF ) Improved Private Set Intersection for Sets with Small Entries Dung Bui, Geoffroy Couteau
2022/333 (PDF ) We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption Dandan Yuan, Shujie Cui, Giovanni Russello
2022/332 (PDF ) CostCO: An automatic cost modeling framework for secure multi-party computation Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa
2022/331 (PDF ) Parallelizable Authenticated Encryption with Small State Size Akiko Inoue, Kazuhiko Minematsu
2022/330 (PDF ) A Simple and Generic Approach to Dynamic Collusion Model Rachit Garg, Rishab Goyal, George Lu
2022/329 (PDF ) Rolling up lattice cryptography primes Daniel R. L. Brown
2022/328 (PDF ) On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks Lennert Wouters, Benedikt Gierlichs, Bart Preneel
2022/327 (PDF ) Provable Secure Software Masking in the Real-World Arthur Beckers, Lennert Wouters, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
2022/326 (PDF ) Composable Dynamic Secure Emulation Pierre Civit, Maria Potop-Butucaru
2022/325 (PDF ) FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level Michail Moraitis, Elena Dubrova
2022/324 (PDF ) Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption Yao Jiang Galteland, Jiaxin Pan
2022/323 (PDF ) Dilithium for Memory Constrained Devices Joppe W. Bos, Joost Renes, Amber Sprenkels
2022/322 (PDF ) SecFloat: Accurate Floating-Point meets Secure 2-Party Computation Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi
2022/321 (PDF ) zkKYC in DeFi: An approach for implementing the zkKYC solution concept in Decentralized Finance Pieter Pauwels, Joni Pirovich, Peter Braunz, Jack Deeb
2022/320 (PDF ) Blazing Fast PSI from Improved OKVS and Subfield VOLE Srinivasan Raghuraman, Peter Rindal
2022/319 (PDF ) A Blockchain-based Long-term Time-Stamping Scheme Long Meng, Liqun Chen
2022/318 (PDF ) Efficient Online-friendly Two-Party ECDSA Signature Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui
2022/317 (PDF ) Thora: Atomic and Privacy-Preserving Multi-Channel Updates Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei
2022/316 (PDF ) Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2022/315 (PDF ) Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN Damiano Abram, Peter Scholl
2022/314 (PDF ) Batch-OT with Optimal Rate Zvika Brakerski, Pedro Branco, Nico Döttling, Sihang Pu
2022/313 (PDF ) Efficient Proof of RAM Programs from Any Public-Coin Zero-Knowledge System Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy, Michiel Verbauwhede
2022/312 (PDF ) Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols Shahar P. Cohen, Moni Naor
2022/311 (PDF ) Unidirectional Updatable Encryption and Proxy Re-encryption from DDH Peihan Miao, Sikhar Patranabis, Gaven Watson
2022/310 (PDF ) Dispute-free Scalable Open Vote Network using zk-SNARKs Muhammad ElSheikh, Amr M. Youssef
2022/309 (PDF ) On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing Ashrujit Ghoshal, Ilan Komargodski
2022/308 (PDF ) Colordag: An Incentive-Compatible Blockchain Ittai Abraham, Danny Dolev, Ittay Eyal, Joseph Y. Halpern
2022/307 (PDF ) An Anonymous Trace-and-Revoke Broadcast Encryption Scheme Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehle
2022/306 (PDF ) The More You Know: Improving Laser Fault Injection with Prior Knowledge Marina Krček, Thomas Ordas, Daniele Fronte, Stjepan Picek
2022/305 (PDF ) Surveying definitions of election verifiability Ben Smyth, Michael R. Clarkson
2022/304 (PDF ) Multi-User BBB Security of Public Permutations Based MAC Yu Long Chen, Avijit Dutta, Mridul Nandi
2022/303 (PDF ) Unlinkable Delegation of WebAuthn Credentials Nick Frymann, Daniel Gardham, Mark Manulis
2022/302 (PDF ) SoK: Oblivious Pseudorandom Functions Sílvia Casacuberta, Julia Hesse, Anja Lehmann
2022/301 (PDF ) How Practical are Fault Injection Attacks, Really? Jakub Breier, Xiaolu Hou
2022/300 (PDF ) Faster NTRU on ARM Cortex-M4 with TMVP-based multiplication Irem Keskinkurt Paksoy, Murat Cenk
2022/299 (PDF ) Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3 Yanhong Fan,Muzhou Li,Chao Niu,Zhenyu Lu,Meiqin Wang
2022/298 (PDF ) Constructive Post-Quantum Reductions Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai
2022/297 (PDF ) Promise $\Sigma$-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups Yi Deng, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie
2022/296 (PDF ) On new results on Extremal Graph Theory, Theory of Algebraic Graphs and their applications in Cryptography and Coding Theory. Vasyl Ustimenko
2022/295 (PDF ) Quantum Proofs of Deletion for Learning with Errors Alexander Poremba
2022/294 (PDF ) A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu
2022/293 (PDF ) Minimizing Setup in Broadcast-Optimal Two Round MPC Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
2022/292 (PDF ) Comment on ``SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices'' Michael Amar, Amit Kama, Kang Wang, Yossi Oren
2022/291 (PDF ) Provable security of CFB mode of operation with external re-keying Vadim Tsypyschev, Iliya Morgasov
2022/290 (PDF ) Universally Composable Sigma-protocols in the Global Random-Oracle Model Anna Lysyanskaya, Leah Namisa Rosenbloom
2022/289 (PDF ) Two Attacks On Proof-of-Stake GHOST/Ethereum Joachim Neu, Ertem Nusret Tas, David Tse
2022/288 (PDF ) Spats: confidential assets and non-fungible tokens Aaron Feickert, Aram Jivanyan
2022/287 (PDF ) User-Perceived Privacy in Blockchain Simin Ghesmati, Walid Fdhila, Edgar Weippl
2022/286 (PDF ) Provably Secure Identity-Based Remote Password Registration Csanád Bertók, Andrea Huszti, Szabolcs Kovács, Norbert Oláh
2022/285 (PDF ) Usability of Cryptocurrency Wallets Providing CoinJoin Transactions Simin Ghesmati, Walid Fdhila, Edgar Weippl
2022/284 (PDF ) Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
2022/283 (PDF ) Block-Cipher-Based Tree Hashing Aldo Gunsing
2022/282 (PDF ) Achievable CCA2 Relaxation for Homomorphic Encryption Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald
2022/281 (PDF ) Succinct Interactive Oracle Proofs: Applications and Limitations Shafik Nassar, Ron D. Rothblum
2022/280 (PDF ) Efficient Homomorphic Evaluation on Large Intervals Jung Hee Cheon, Wootae Kim, Jai Hyun Park
2022/279 (PDF ) Permutation rotation-symmetric S-boxes, liftings and affine equivalence Tron Omland, Pantelimon Stanica
2022/278 (PDF ) Incompressiblity and Next-Block Pseudoentropy Iftach Haitner, Noam Mazor, Jad Silbak
2022/277 (PDF ) Security Analysis of Elliptic Curves over Sextic Extension of Small Prime Fields Robin Salen, Vijaykumar Singh, Vladimir Soukharev
2022/276 (PDF ) Hardness estimates of the Code Equivalence Problem in the Rank Metric Krijn Reijnders, Simona Samardjiska, Monika Trimoska
2022/275 (PDF ) Concrete Analysis of Approximate Ideal-SIVP to Decision Ring-LWE Reduction Neal Koblitz, Subhabrata Samajder, Palash Sarkar, Subhadip Singha
2022/274 (PDF ) EcGFp5: a Specialized Elliptic Curve Thomas Pornin
2022/273 (PDF ) Compact Storage for Homomorphic Encryption Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald
2022/272 (PDF ) Quantum-Secure Aggregate One-time Signatures with Detecting Functionality Shingo Sato, Junji Shikata
2022/271 (PDF ) Approximate Divisor Multiples -- Factoring with Only a Third of the Secret CRT-Exponents Alexander May, Julian Nowakowski, Santanu Sarkar
2022/270 (PDF ) Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
2022/269 (PDF ) On Codes and Learning With Errors over Function Fields Maxime Bombar, Alain Couvreur, Thomas Debris-Alazard
2022/268 (PDF ) Efficient Schemes for Committing Authenticated Encryption Mihir Bellare, Viet Tung Hoang
2022/267 (PDF ) Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo
2022/266 (PDF ) Verifiably Distributed Multi-User Secret Sharing schemes Likang Lu, Jianzhu Lu
2022/265 (PDF ) Non-interactive Mimblewimble transactions, revisited Georg Fuchsbauer, Michele Orrù
2022/264 (PDF ) Gradecast in Synchrony and Reliable Broadcast in Asynchrony with Optimal Resilience, Efficiency, and Unconditional Security Ittai Abraham, Gilad Asharov
2022/263 (PDF ) Rethinking Modular Multi-Exponentiation in Real-World Applications Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2022/262 (PDF ) Secure Non-Interactive Reduction and Spectral Analysis of Correlations Pratyush Agarwal, Varun Narayanan, Shreya Pathak, Manoj Prabhakaran, Vinod M. Prabhakaran, Mohammad Ali Rehan
2022/261 (PDF ) Sublinear GMW-Style Compiler for MPC with Preprocessing Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
2022/260 (PDF ) Advances in Logic Locking: Past, Present, and Prospects Hadi Mardani Kamali, Kimia Zamiri Azar, Farimah Farahmandi, Mark Tehranipoor
2022/259 (PDF ) Partial Key Exposure Attacks on BIKE, Rainbow and NTRU Andre Esser, Alexander May, Javier Verbel, Weiqiang Wen
2022/258 (PDF ) Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications Hasan Al Shaikh, Mohammad Bin Monjil, Shigang Chen, Farimah Farahmandi, Navid Asadizanjani, Mark Tehranipoor, Fahim Rahman
2022/257 (PDF ) Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols Ran Cohen, Jack Doerner, Yashvanth Kondi, abhi shelat
2022/256 (PDF ) Multi-Designated Receiver Signed Public Key Encryption Ueli Maurer, Christopher Portmann, Guilherme Rito
2022/255 (PDF ) Round-Optimal Byzantine Agreement Diana Ghinea, Vipul Goyal, Chen-Da Liu-Zhang
2022/254 (PDF ) Unprotected and Masked Hardware Implementations of Spook v2 Charles Momin, Gaëtan Cassiers, François-Xavier Standaert
2022/253 (PDF ) The Side-Channel Metrics Cheat Sheet Kostas Papagiannopoulos, Ognjen Glamocanin, Melissa Azouaoui, Dorian Ros, Francesco Regazzoni, Mirjana Stojilovic
2022/252 (PDF ) Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations Charles Momin, Gaëtan Cassiers, François-Xavier Standaert
2022/251 (PDF ) CoCoA: Concurrent Continuous Group Key Agreement Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter
2022/250 (PDF ) Private Circuits with Quasilinear Randomness Vipul Goyal, Yuval Ishai, Yifan Song
2022/249 (PDF ) The Summation-Truncation Hybrid: Reusing Discarded Bits for Free Aldo Gunsing, Bart Mennink
2022/248 (PDF ) Collapseability of Tree Hashes Aldo Gunsing, Bart Mennink
2022/247 (PDF ) Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model Aldo Gunsing, Joan Daemen, Bart Mennink
2022/246 (PDF ) On the Concrete Security of TLS 1.3 PSK Mode Hannah Davis, Denis Diemert, Felix Günther, Tibor Jager
2022/245 (PDF ) Entropic Hardness of Module-LWE from Module-NTRU Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2022/244 (PDF ) Universally Composable Subversion-Resilient Cryptography Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, Daniele Venturi
2022/243 (PDF ) A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang
2022/242 (PDF ) YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring
2022/241 (PDF ) Coalition and Threshold Hash-Based Signatures John Kelsey, Stefan Lucks, Nathalie Lang
2022/240 (PDF ) SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients Hamza Abusalah, Georg Fuchsbauer, Peter Gaži, Karen Klein
2022/239 (PDF ) Several Improvements on BKZ Algorithm Ziyu Zhao, Jintai Ding
2022/238 (PDF ) HEAD: an FHE-based Privacy-preserving Cloud Computing Protocol with Compact Storage and Efficient Computation Lijing Zhou, Ziyu Wang, Hongrui Cui, Xiao Zhang, Xianggui Wang, Yu Yu
2022/237 (PDF ) Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions Jesper Buus Nielsen, João Ribeiro, Maciej Obremski
2022/236 (PDF ) Characterizing the qIND-qCPA (in)security of the CBC, CFB, OFB and CTR modes of operation Tristan Nemoz, Zoé AMBLARD, Aurélien DUPIN
2022/235 (PDF ) Limits of Preprocessing for Single-Server PIR Giuseppe Persiano, Kevin Yeo
2022/234 (PDF ) New algorithms for the Deuring correspondence: Towards practical and secure SQISign signatures Luca De Feo, Antonin Leroux, Patrick Longa, Benjamin Wesolowski
2022/233 (PDF ) Variational quantum solutions to the Shortest Vector Problem Martin R. Albrecht, Miloš Prokop, Yixin Shen, Petros Wallden
2022/232 (PDF ) Conditional Variational AutoEncoder based on Stochastic Attack Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli
2022/231 (PDF ) Towards Low-Latency Implementation of Linear Layers Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang
2022/230 (PDF ) Apple vs. EMA: Electromagnetic Side Channel Attacks on Apple CoreCrypto Gregor Haas, Aydin Aysu
2022/229 (PDF ) WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography Markku-Juhani O. Saarinen
2022/228 (PDF ) Semi-Quantum Tokenized Signatures Omri Shmueli
2022/227 (PDF ) The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects Ben Nassi, Ras Swissa, Yuval Elovici, Boris Zadov
2022/226 (PDF ) To Label, or Not To Label (in Generic Groups) Mark Zhandry
2022/225 (PDF ) Constant matters: Fine-grained Complexity of Differentially Private Continual Observation Using Completely Bounded Norms Monika Henzinger, Jalaj Upadhyay
2022/224 (PDF ) Embedding the UC Model into the IITM Model Daniel Rausch, Ralf Kuesters, Céline Chevalier
2022/223 (PDF ) Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection Thibauld Feneuil, Jules Maire, Matthieu Rivain, Damien Vergnaud
2022/222 (PDF ) Half-Aggregation of Schnorr Signatures with Tight Reductions Yanbo Chen, Yunlei Zhao
2022/221 (PDF ) Secure Joint Communication and Sensing Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener
2022/220 (PDF ) Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security Keita Emura, Shiho Moriai, Takuma Nakajima, Masato Yoshimi
2022/219 (PDF ) PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication Hanyu Jia, Xiangxue Li
2022/218 (PDF ) On the Impossibility of Key Agreements from Quantum Random Oracles Per Austrin, Hao Chung, Kai-Min Chung, Shiuan Fu, Yao-Ting Lin, Mohammad Mahmoody
2022/217 (PDF ) High-Performance Hardware Implementation of Lattice-Based Digital Signatures Luke Beckwith, Duc Tri Nguyen, Kris Gaj
2022/216 (PDF ) Short Leakage Resilient and Non-malleable Secret Sharing Schemes Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2022/215 (PDF ) Multi-Client Functional Encryption with Fine-Grained Access Control Ky Nguyen, Duong Hieu Phan, David Pointcheval
2022/214 (PDF ) Breaking Rainbow Takes a Weekend on a Laptop Ward Beullens
2022/213 (PDF ) Issuer-Hiding Attribute-Based Credentials Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, Kai Samelin
2022/212 (PDF ) Tight Analysis of Decrypton Failure Probability of Kyber in Reality Boyue Fang, Weize Wang, Yunlei Zhao
2022/211 (PDF ) Azeroth: Auditable Zero-knowledge Transactions in Smart Contracts Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh
2022/210 (PDF ) An Analysis of the Algebraic Group Model Jonathan Katz, Cong Zhang, Hong-Sheng Zhou
2022/209 (PDF ) Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection ZiXi Hee, Iftekhar Salam
2022/208 (PDF ) Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design Alon Shakevsky, Eyal Ronen, Avishai Wool
2022/207 (PDF ) Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference Zhicong Huang, Wen-jie Lu, Cheng Hong, Jiansheng Ding
2022/206 (PDF ) Proving UNSAT in Zero Knowledge Ning Luo, Timos Antonopoulos, William Harris, Ruzica Piskac, Eran Tromer, Xiao Wang
2022/205 (PDF ) Fiat-Shamir signatures without aborts using Ring-and-Noise assumptions Dipayan Das, Antoine Joux, Anand Kumar Narayanan
2022/204 (PDF ) RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library Furkan Aydin, Emre Karabulut, Seetal Potluri, Erdem Alkim, Aydin Aysu
2022/203 (PDF ) A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV Jean-Charles Faugère, Gilles macario-Rat, Jacques Patarin, Ludovic Perret
2022/202 (PDF ) Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLU's Abdelrahaman Aly, Kashif Nawaz, Eugenio Salazar, Victor Sucasas
2022/201 (PDF ) Enig: Player Replaceable Finality Layers with Optimal Validity Simon Holmgaard Kamp, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi
2022/200 (PDF ) Non-Black-Box Approach to Secure Two-Party Computation in Three Rounds Akshayaram Srinivasan
2022/199 (PDF ) Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing Giang Linh Duc Nguyen, Dung Hoang Duong, Huy Quoc Le, Willy Susilo
2022/198 (PDF ) Efficient FHEW Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption Yongwoo Lee, Daniele Micciancio, Andrey Kim, Rakyong Choi, Maxim Deryabin, Jieun Eom, Donghoon Yoo
2022/197 (PDF ) Nice Attacks --- but What is the Cost? Computational Models for Cryptanalysis Charles Bouillaguet
2022/196 (PDF ) Generalising Fault Attacks to Genus Two Isogeny Cryptosystems Ariana Goh, Chu-Wee Lim, Yan Bo Ti
2022/195 (PDF ) Quantum and Classical Algorithms for Bounded Distance Decoding Richard Allen, Ratip Emin Berker, Sílvia Casacuberta, Michael Gul
2022/194 (PDF ) Finding Collisions against 4-round SHA3-384 in Practical Time Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov
2022/193 (PDF ) OptRand: Optimistically responsive distributed random beacons Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak
2022/192 (PDF ) SoftSpokenOT: Quieter OT Extension From Small-Field Silent VOLE in the Minicrypt Model Lawrence Roy
2022/191 (PDF ) NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead Andrew Park, Wei-Kai Lin, Elaine Shi
2022/190 (PDF ) Short-lived zero-knowledge proofs and signatures Arasu Arun, Joseph Bonneau, Jeremy Clark
2022/189 (PDF ) Simplified MITM Modeling for Permutations: New (Quantum) Attacks André Schrottenloher, Marc Stevens
2022/188 (PDF ) Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs Thibauld Feneuil, Antoine Joux, Matthieu Rivain
2022/187 (PDF ) Constant-Round YOSO MPC Without Setup Sebastian Kolby, Divya Ravi, Sophia Yakoubov
2022/186 (PDF ) Overflow-detectable Floating-point Fully Homomorphic Encryption Seunghwan Lee, Dong-Joon Shin
2022/185 (PDF ) Statistically Sender-Private OT from LPN and Derandomization Nir Bitansky, Sapir Freizeit
2022/184 (PDF ) Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3 (Full Version) Jian Guo, Guozhen Liu, Ling Song, Yi Tu
2022/183 (PDF ) Improving Differential-Neural Cryptanalysis Liu Zhang, Zilong Wang, Baocang wang
2022/182 (PDF ) A Novel Framework for Explainable Leakage Assessment Si Gao, Elisabeth Oswald
2022/181 (PDF ) Vector Commitments over Rings and Compressed $\Sigma$-Protocols Thomas Attema, Ignacio Cascudo, Ronald Cramer, Ivan Bjerre Damgård, Daniel Escudero
2022/180 (PDF ) Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher Orel Cosseron, Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert
2022/179 (PDF ) Locally Verifiable Signature and Key Aggregation Rishab Goyal, Vinod Vaikuntanathan
2022/178 (PDF ) Lower Bound on SNARGs in the Random Oracle Model Iftach Haitner, Daniel Nukrai, Eylon Yogev
2022/177 (PDF ) The Power of the Differentially Oblivious Shuffle in Distributed Privacy Mechanisms Mingxun Zhou, Elaine Shi
2022/176 (PDF ) Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems Minze Xu, Yuan Zhang, Sheng Zhong
2022/175 (PDF ) WeRLman: To Tackle Whale (Transactions), Go Deep (RL) Roi Bar-Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar
2022/174 (PDF ) How to Launch a Powerful Side-Channel Collision Attack? Jiangshan Long, Changhai Ou, Yajun Ma, Yifan Fan, Hua Chen, Shihui Zheng
2022/173 (PDF ) Collision-Resistance from Multi-Collision-Resistance Ron D. Rothblum, Prashant Nalini Vasudevan
2022/172 (PDF ) A remark on NIST SP 800-22 serial test Corina-Elena Bogos, Razvan Mocanu, Emil Simion
2022/171 (PDF ) Practical and Improved Byzantine Reliable Broadcast and Asynchronous Verifiable Information Dispersal from Hash Functions Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang
2022/170 (PDF ) gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies Foteini Baldimtsi, Panagiotis Chatzigiannis, S. Dov Gordon, Phi Hung Le, Daniel McVicker
2022/169 (PDF ) SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful Markku-Juhani O. Saarinen
2022/168 (PDF ) Hardness of Approximation for Stochastic Problems via Interactive Oracle Proofs Gal Arnon, Alessandro Chiesa, Eylon Yogev
2022/167 (PDF ) Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority Benny Applebaum, Eliran Kachlon, Arpita Patra
2022/166 (PDF ) Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti
2022/165 (PDF ) PAC Learnability of iPUF Variants Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2022/164 (PDF ) Shanrang: Fully Asynchronous Proactive Secret Sharing with Dynamic Committees Yunzhou Yan, Yu Xia, Srinivas Devadas
2022/163 (PDF ) A High Performance Payment Processing System Designed for Central Bank Digital Currencies James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula
2022/162 (PDF ) On the precision loss in approximate homomorphic encryption Anamaria Costache, Benjamin R. Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie, Rachel Player
2022/161 (PDF ) D-KODE: Mechanism to Generate and Maintain a Billion Keys Easwar Vivek Mangipudi, Aniket Kate
2022/160 (PDF ) Random primes in arithmetic progressions Pascal Giorgi, Bruno Grenet, Armelle Perret du Cray, Daniel S. Roche
2022/158 (PDF ) Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs Olivier Bronchain, Gaëtan Cassiers
2022/157 (PDF ) Shuffle-based Private Set Union: Faster and More Secure Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu
2022/156 (PDF ) Universal Reductions: Reductions Relative to Stateful Oracles Benjamin Chan, Cody Freitag, Rafael Pass
2022/155 (PDF ) FairTraDEX: A Decentralised Exchange Preventing Value Extraction Conor McMenamin, Vanesa Daza, Matthias Fitzi, Padraic O'Donoghue
2022/154 (PDF ) Coeus: A System for Oblivious Document Ranking and Retrieval Ishtiyaque Ahmad, Laboni Sarker, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
2022/153 (PDF ) Faulty isogenies: a new kind of leakage Gora Adj, Jesús-Javier Chi-Domínguez, Víctor Mateu, Francisco Rodríguez-Henríquez
2022/152 (PDF ) K-XMSS and K-SPHINCS$^+$:Hash based Signatures with\\Korean Cryptography Algorithms Minjoo Sim, Siwoo Eum, Gyeongju Song, HyeokDong Kwon, Kyungbae Jang, HyunJun Kim, HyunJi Kim, Yujin Yang, Wonwoong Kim, Wai-Kong Lee, Hwajeong Seo
2022/151 (PDF ) Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives Ling Sun, Wei Wang, Meiqin Wang
2022/150 (PDF ) The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
2022/149 (PDF ) Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping Pierre-Emmanuel Clet, Martin Zuber, Aymen Boudguiga, Renaud Sirdey, Cédric Gouy-Pailler
2022/148 (PDF ) Attacks on the Firekite cipher Thomas Johansson, Willi Meier, Vu Nguyen
2022/147 (PDF ) Constructing new superclasses of bent functions from known ones Amar Bapić, Enes Pasalic, Fengrong Zhang, Samir Hodžić
2022/146 (PDF ) Training Differentially Private Models with Secure Multiparty Computation Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson Nascimento, Martine De Cock
2022/145 (PDF ) An elementary construction of QR-UOV Yasufumi Hashimoto
2022/144 (PDF ) Rainbow Differential Privacy Ziqi Zhou, Onur Gunlu, Rafael G. L. D'Oliveira, Muriel Medard, Parastoo Sadeghi, Rafael F. Schaefer
2022/143 (PDF ) Composition construction of new bent functions from known dually isomorphic bent functions Guangpu Gao, Weiguo Zhang, Yongjuan Wang
2022/142 (PDF ) Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao
2022/141 (PDF ) Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, Sushmita Ruj
2022/140 (PDF ) On the Related-Key Attack Security of Authenticated Encryption Schemes Sebastian Faust, Juliane Krämer, Maximilian Orlt, Patrick Struck
2022/139 (PDF ) Sponge-based Authenticated Encryption: Security against Quantum Attackers Christian Janson, Patrick Struck
2022/138 (PDF ) Resisting Key-Extraction and Code-Compression: a Secure Implementation of the HFE Signature Scheme in the White-Box Model Pierre Galissant, Louis Goubin
2022/137 (PDF ) Ten years of cube attacks Marco Cianfriglia, Elia Onofri, Silvia Onofri, Marco Pedicini
2022/136 (PDF ) Twilight: A Differentially Private Payment Channel Network Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad
2022/135 (PDF ) Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers Zheng Xu, Yongqiang Li, Lin Jiao, Mingsheng Wang, Willi Meier
2022/134 (PDF ) Functional Cryptanalysis: Application to reduced-round Xoodoo Emanuele Bellini, Rusydi H. Makarim
2022/133 (PDF ) Faster verification of V2X BSM messages via Message Chaining Eduardo Lopes Cominetti, Marcos Vinicius M. Silva, Marcos A. Simplicio Jr., Harsh Kupwade Patil, Jefferson E. Ricardini
2022/132 (PDF ) On Defeating Graph Analysis of Anonymous Transactions Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo, Hoover H. F. Yin
2022/131 (PDF ) Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding
2022/130 (PDF ) A LeVeL Paying Field: Cryptographic Solutions towards Social Accountability and Financial Inclusion Gideon Samid
2022/129 (PDF ) TOFU - Toggle Count Analysis made simple Michael Gruber, Georg Sigl
2022/128 (PDF ) Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes Pierre Karpman, Charlotte Lefevre
2022/127 (PDF ) CCA secure ElGamal encryption over an integer group where ICDH assumption holds Gyu-Chol. Kim, Jae-Yong. Sin, Yong-Bok. Jong
2022/126 (PDF ) Storage Security in Cloud Computing: Data Auditing Protocols Andrei-Alexandru Brebu, Mihai Iacov, Emil Simion
2022/125 (PDF ) Profiled Side-channel Attack on Cryptosystems based on the Binary Syndrome Decoding Problem Brice Colombier, Vlad-Florin Drăgoi, Pierre-Louis Cayrel, Vincent Grosso
2022/124 (PDF ) On the Performance Gap of a Generic C Optimized Assembler and Wide Vector Extensions for Masked Software with an Ascon-{\it{p}} test case Dor Salomon, Itamar Levi
2022/123 (PDF ) CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments Subhra Mazumdar, Sushmita Ruj
2022/122 (PDF ) Quantum cryptography with classical communication: parallel remote state preparation for copy-protection, verification, and more Alexandru Gheorghiu, Tony Metger, Alexander Poremba
2022/121 (PDF ) Crime and Punishment in Distributed Byzantine Decision Tasks (Extended Version) Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic, Zarko Milosevic, Adi Serendinschi
2022/120 (PDF ) Practical Seed Recovery of Fast Cryptographic Pseudo Random Number Generators Florette Martinez
2022/119 (PDF ) Hardware Implementation of SpoC-128 Ambati Sathvik, Tirunagari Rahul, Anubhab Baksi, Vikramkumar Pudi
2022/118 (PDF ) Streebog compression function as PRF in secret-key settings Vitaly Kiryukhin
2022/117 (PDF ) AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu
2022/116 (PDF ) Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version) Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe
2022/115 (PDF ) GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks Zilin Liu, Anjia Yang, Jian Weng, Tao Li, Huang Zeng, Xiaojian Liang
2022/114 (PDF ) Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat Ziaur Rahman, Xun Yi, Ibrahim Khalil
2022/113 (PDF ) XCC: Theft-Resilient and Collateral-Optimized Cryptocurrency-Backed Assets Theodore Bugnet, Alexei Zamyatin
2022/112 (PDF ) Faster Kyber and Dilithium on the Cortex-M4 Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, Amber Sprenkels
2022/111 (PDF ) Breaking Panther Christina Boura, Rachelle Heim Boissier, Yann Rotella
2022/110 (PDF ) Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-sliced Implementations Jan-Pieter D'Anvers, Michiel Van Beirendonck, Ingrid Verbauwhede
2022/109 (PDF ) Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
2022/108 (PDF ) Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method Rohon Kundu, Alessandro de Piccoli, Andrea Visconti
2022/107 (PDF ) Payment with Dispute Resolution: A Protocol For Reimbursing Frauds' Victims Aydin Abadi, Steven J. Murdoch
2022/106 (PDF ) Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All Soundes Marzougui, Vincent Ulitzsch, Mehdi Tibouchi, Jean-Pierre Seifert
2022/105 (PDF ) Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces Varun Madathil, Alessandra Scafuro, Kemafor Anyanwu, Sen Qiao, Akash Pateria, Binil Starly
2022/104 (PDF ) Minotaur: Multi-Resource Blockchain Consensus Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang
2022/102 (PDF ) MPC-Friendly Commitments for Publicly Verifiable Covert Security Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner
2022/101 (PDF ) Lattice-Based Linkable Ring Signature in the Standard Model Mingxing Hu, Zhen Liu
2022/100 (PDF ) Development of Cryptography since Shannon Funda Özdemir, Çetin Kaya Koç
2022/099 (PDF ) Performance of Hierarchical Transforms in Homomorphic Encryption: A case study on Logistic Regression inference Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
2022/098 (PDF ) Orienteering with one endomorphism Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran
2022/097 (PDF ) Lattice Signature can be as Simple as Lattice Encryption Dingfeng Ye, Jun Xu, Guifang Huang, Lei Hu
2022/096 (PDF ) On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications Karim Eldefrawy, Nicholas Genise, Rutuja Kshirsagar, Moti Yung
2022/095 (PDF ) Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk
2022/094 (PDF ) Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies Nir Drucker, Tomer Pelleg
2022/093 (PDF ) Public-Key Encryption from Homogeneous CLWE Andrej Bogdanov, Miguel Cueto Noval, Charlotte Hoffmann, Alon Rosen
2022/092 (PDF ) Rethinking Watermark: Providing Proof of IP Ownership in Modern SoCs N. Nalla Anandakumar, M. Sazadur Rahman, Mridha Md Mashahedur Rahman, Rasheed Kibria, Upoma Das, Farimah Farahmandi, Fahim Rahman, Mark M. Tehranipoor
2022/091 (PDF ) The multiplicative complexity of interval checking Thomas Häner, Mathias Soeken
2022/090 (PDF ) Attacks on Encrypted Range Search Schemes in Multiple Dimensions Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia
2022/089 (PDF ) NTRU-$\nu$-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus Kamil Kluczniak
2022/088 (PDF ) A survey on the security protocols employed by mobile messaging applications Ștefania Andrieș, Andrei-Daniel Miron, Andrei Cristian, Emil Simion
2022/087 (PDF ) The Internet Computer for Geeks Jan Camenisch, Andrea Cerulli, David Derler, Manu Drijvers, Maria Dubovitskaya, Jens Groth, Timo Hanke, Gregory Neven, Yvonne-Anne Pignolet, Victor Shoup, Björn Tackmann, Dominic Williams
2022/086 (PDF ) PlonKup: Reconciling PlonK with plookup Luke Pearson, Joshua Fitzgerald, Héctor Masip, Marta Bellés-Muñoz, Jose Luis Muñoz-Tapia
2022/085 (PDF ) Cross-Domain Identity-based Matchmaking Encryption Axin Wu, Jian Weng, Weiqi Luo, Anjia Yang, Jia-Nan Liu, Zike Jiang
2022/084 (PDF ) Token meets Wallet: Formalizing Privacy and Revocation for FIDO2 Lucjan Hanzlik, Julian Loss, Benedikt Wagner
2022/083 (PDF ) Zef: Low-latency, Scalable, Private Payments Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis
2022/082 (PDF ) Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs Carsten Baum, Robin Jadoul, Emmanuela Orsini, Peter Scholl, Nigel P. Smart
2022/081 (PDF ) Single-Server Private Information Retrieval with Sublinear Amortized Time Henry Corrigan-Gibbs, Alexandra Henzinger, Dmitry Kogan
2022/080 (PDF ) Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation Yu Long Chen, Stefano Tessaro
2022/079 (PDF ) Lightweight Secure Integer Comparison Thijs Veugen
2022/078 (PDF ) Secure Lossy Function Computation with Multiple Private Remote Source Observations Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
2022/077 (PDF ) Multiple Noisy Private Remote Source Observations for Secure Function Computation Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
2022/076 (PDF ) Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security Ertem Nusret Tas, David Tse, Fisher Yu, Sreeram Kannan
2022/075 (PDF ) Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, Aniket Kate
2022/074 (PDF ) FINAL: Faster FHE instantiated with NTRU and LWE Charlotte Bonte, Ilia Iliashenko, Jeongeun Park, Hilder V. L. Pereira, Nigel P. Smart
2022/073 (PDF ) Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide
2022/072 (PDF ) Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction Keita Emura
2022/071 (PDF ) Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor
2022/070 (PDF ) (Nondeterministic) Hardness vs. Non-Malleability Marshall Ball, Dana Dachman-Soled, Julian Loss
2022/069 (PDF ) Small-Box Cryptography Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs
2022/068 (PDF ) Updatable Public Key Encryption in the Standard Model Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs
2022/067 (PDF ) Parallel Operations over TFHE-Encrypted Multi-Digit Integers Jakub Klemsa, Melek Önen
2022/066 (PDF ) A remark on the Discrete Fourier Transform statistical test Anghel Florin, Asandoaiei David, Tabacaru Robert
2022/065 (PDF ) Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS Nimrod Aviram, Benjamin Dowling, Ilan Komargodski, Kenneth G. Paterson, Eyal Ronen, Eylon Yogev
2022/064 (PDF ) A Framework for the Design of Secure and Efficient Proofs of Retrievability Françoise Levy-dit-Vehel, Maxime Roméas
2022/063 (PDF ) Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers Kang Yang, Xiao Wang
2022/062 (PDF ) An Introduction to Secret-Sharing-Based Secure Multiparty Computation Daniel Escudero
2022/061 (PDF ) A remark on the NIST 800-22 Binary Matrix Rank Test Nicu Neculache, Vlad-Andrei Petcu, Emil Simion
2022/060 (PDF ) Quantum Boomerang Attacks and Some Applications Paul Frixons, María Naya-Plasencia, André Schrottenloher
2022/059 (PDF ) SPHINCS-$\alpha$: A Compact Stateless Hash-Based Signature Scheme Kaiyi Zhang, Hongrui Cui, Yu Yu
2022/058 (PDF ) First-Order Masked Kyber on ARM Cortex-M4 Daniel Heinz, Matthias J. Kannwischer, Georg Land, Thomas Pöppelmann, Peter Schwabe, Amber Sprenkels
2022/057 (PDF ) The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi
2022/056 (PDF ) LedgerHedger: Gas Reservation for Smart-Contract Security Itay Tsabary, Alex Manuskin, Roi Bar-Zur, Ittay Eyal
2022/055 (PDF ) Multi-Key Fully Homomorphic Encryption: removing noise flooding in distributed decryption via the smudging lemma on discrete Gaussian distribution Xiaokang Dai, Wenyuan Wu, Yong Feng
2022/054 (PDF ) SIKE Channels Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluđerović, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso
2022/053 (PDF ) Brute Force Cryptanalysis Aron Gohr
2022/052 (PDF ) Near-optimal Balanced Reliable Broadcast and Asynchronous Verifiable Information Dispersal Sourav Das, Zhuolun Xiang, Ling Ren
2022/051 (PDF ) Titanium: A Metadata-Hiding File-Sharing System with Malicious Security Weikeng Chen, Thang Hoang, Jorge Guajardo, Attila A. Yavuz
2022/050 (PDF ) High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA Asep Muhamad Awaludin, Harashta Tatimma Larasati, Howon Kim
2022/049 (PDF ) Small MACs from Small Permutations Maria Eichlseder, Ahmet Can Mert, Christian Rechberger, Markus Schofnegger
2022/048 (PDF ) RSA, DH, and DSA in the Wild Nadia Heninger
2022/047 (PDF ) Short Pairing-Free Blind Signatures with Exponential Security Stefano Tessaro, Chenzhi Zhu
2022/046 (PDF ) Membership Privacy for Asynchronous Group Messaging Keita Emura, Kaisei Kajita, Ryo Nojima, Kazuto Ogawa, Go Ohtake
2022/045 (PDF ) Probing Security through Input-Output Separation and Revisited Quasilinear Masking Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud
2022/044 (PDF ) Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes Atakan Arslan, Muhammed Ali Bingöl
2022/043 (PDF ) Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges Konstantinos Chalkias, Panagiotis Chatzigiannis, Yan Ji
2022/042 (PDF ) Inapplicability of Differential Fault Attacks against Cellular Automata based Lightweight Authenticated Cipher AMBILI K N, JIMMY JOSE
2022/041 (PDF ) Reinforcing Lightweight Authenticated Encryption Schemes against Statistical Ineffective Fault Attack AMBILI K N, JIMMY JOSE
2022/038 (PDF ) ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption Antonio de la Piedra, Marloes Venema, Greg Alpár
2022/037 (PDF ) Subgroup membership testing on elliptic curves via the Tate pairing Dmitrii Koshelev
2022/036 (PDF ) Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider, François-Xavier Standaert
2022/035 (PDF ) Time-Traveling Simulators Using Blockchains and Their Applications Vipul Goyal, Justin Raizes, Pratik Soni
2022/034 (PDF ) From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic Varun Madathil, Chris Orsini, Alessandra Scafuro, Daniele Venturi
2022/033 (PDF ) Deletion-Compliance in the Absence of Privacy Jonathan Godin, Philippe Lamontagne
2022/032 (PDF ) Formal Analysis of Non-Malleability for Commitments in EasyCrypt Denis Firsov, Sven Laur, Ekaterina Zhuchko
2022/031 (PDF ) BAT: Small and Fast KEM over NTRU Lattices Pierre-Alain Fouque, Paul Kirchner, Thomas Pornin, Yang Yu
2022/030 (PDF ) Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block Ciphers Jinyu Lu, Guoqiang Liu, Bing Sun, Chao Li, Li Liu
2022/029 (PDF ) CRYScanner: Finding cryptographic libraries misuse Amit Choudhari, Sylvain Guilley, Khaled Karray
2022/028 (PDF ) Locality-Preserving Hashing for Shifts with Connections to Cryptography Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein
2022/027 (PDF ) Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2022/026 (PDF ) Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective Andrada-Teodora Ciulei, Marian-Codrin Crețu, Emil Simion
2022/025 (PDF ) Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos Mostafizar Rahman, Dhiman Saha, Goutam Paul
2022/024 (PDF ) Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
2022/023 (PDF ) Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi
2022/022 (PDF ) Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation Xiuju Huang, Jiashuo Song, Zichen Li
2022/021 (PDF ) WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT Haibin Zhang, Sisi Duan, Boxin Zhao, Liehuang Zhu
2022/020 (PDF ) PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement Haibin Zhang, Sisi Duan
2022/019 (PDF ) Algebraic Meet-in-the-Middle Attack on LowMC Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe
2022/018 (PDF ) Pairing-based Accountable Subgroup Multi-signatures with Verifiable Group Setup Ahmet Ramazan Ağırtaş, Oğuz Yayla
2022/017 (PDF ) Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation Shingo Sato, Keita Emura, Atsushi Takayasu
2022/016 (PDF ) An algebraic attack to the Bluetooth stream cipher E0 Roberto La Scala, Sergio Polese, Sharwan K. Tiwari, Andrea Visconti
2022/015 (PDF ) Lattice-based Signatures with Tight Adaptive Corruptions and More Jiaxin Pan, Benedikt Wagner
2022/014 (PDF ) Transformer encoder-based Crypto-Ransomware Detection for Low-Power Embedded Processors Hyunji Kim, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
2022/013 (PDF ) Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang
2022/012 (PDF ) Security of Identity-based Encryption Schemes from Quadratic Residues Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica
2022/011 (PDF ) Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance Alfredo Rial, Ania M. Piotrowska
2022/010 (PDF ) Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen
2022/009 (PDF ) Algebraic Reductions of Knowledge Abhiram Kothapalli, Bryan Parno
2022/008 (PDF ) Beating Classical Impossibility of Position Verification Jiahui Liu, Qipeng Liu, Luowen Qian
2022/007 (PDF ) PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More Rutchathon Chairattana-Apirom, Lucjan Hanzlik, Julian Loss, Anna Lysyanskaya, Benedikt Wagner
2022/006 (PDF ) Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
2022/005 (PDF ) Pseudorandom Bit Generation with Asymmetric Numeral Systems Josef Pieprzyk, Marcin Pawlowski, Pawel Morawiecki, Arash Mahboubi, Jarek Duda, Seyit Camtepe
2022/004 (PDF ) Publicly verifiable anonymous tokens with private metadata bit Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova
2022/003 (PDF ) Merged with 2022/007 Rutchathon Chairattana-Apirom, Anna Lysyanskaya
2022/001 (PDF ) Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu
2021/1705 (PDF ) GoUncle: A Blockchain Of, By, For Modest Computers Mao Wenbo, Wang Wenxiang
2021/1704 (PDF ) Verifiable Encryption from MPC-in-the-Head Akira Takahashi, Greg Zaverucha
2021/1703 (PDF ) The Maiorana-McFarland structure based cryptanalysis of Simon Hao Chen
2021/1702 (PDF ) CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake using Gradient Boosting based Ensemble Learning Anand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti
2021/1701 (PDF ) Cryptanalysis of the Cryptosystems Based on the Generalized Hidden Discrete Logarithm Problem Ma Yanlong
2021/1700 (PDF ) A Unified Framework for Non-Universal SNARKs Helger Lipmaa
2021/1699 (PDF ) A Compact Digital Signature Scheme Based on the Module-LWR problem* Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
2021/1698 (PDF ) Efficient Random Beacons with Adaptive Security for Ungrindable Blockchains Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell
2021/1697 (PDF ) Where Star Wars Meets Star Trek: SABER and Dilithium on the Same Polynomial Multiplier Andrea Basso, Furkan Aydin, Daniel Dinu, Joseph Friel, Avinash Varna, Manoj Sastry, Santosh Ghosh
2021/1696 (PDF ) Categorization of Faulty Nonce Misuse Resistant Message Authentication Yu Long Chen, Bart Mennink, Bart Preneel
2021/1695 (PDF ) Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over $\mathbb F_p^n$ Lorenzo Grassi, Silvia Onofri, Marco Pedicini, Luca Sozzi
2021/1694 (PDF ) RLWE-based distributed key generation and threshold decryption Ferran Alborch, Ramiro Martínez, Paz Morillo
2021/1693 (PDF ) Verifiable Decryption for BGV Tjerand Silde
2021/1692 (PDF ) Private Lives Matter: A Differential Private Functional Encryption Scheme (extended version) Alexandtros Bakas, Antonis Michalas, Tassos Dimitriou
2021/1691 (PDF ) Quantum commitments and signatures without one-way functions Tomoyuki Morimae, Takashi Yamakawa
2021/1690 (PDF ) Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX ciphers with Applications to Chaskey Yaqi Xu, Baofeng Wu, Dongdai Lin
2021/1689 (PDF ) Proof of a conjecture on a special class of matrices over commutative rings of characteristic 2 Baofeng Wu
2021/1688 (PDF ) Low-Complexity Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Multiplexed Parallel Convolutions Eunsang Lee, Joon-Woo Lee, Junghyun Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, Woosuk Choi
2021/1687 (PDF ) Computational Irrelevancy: Bridging the Gap between Pseudo- and Real Randomness in MPC Protocols Nariyasu Heseri, Koji Nuida
2021/1686 (PDF ) Hecate: Abuse Reporting in Secure Messengers with Sealed Sender Rawane Issa, Nicolas Alhaddad, Mayank Varia
2021/1685 (PDF ) Divide and Funnel: a Scaling Technique for Mix-Networks Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
2021/1684 (PDF ) Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs Li Yao, Yilei Chen, Yu Yu
2021/1683 (PDF ) PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics Valerie Fetzer, Marcel Keller, Sven Maier, Markus Raiber, Andy Rupp, Rebecca Schwerdt
2021/1682 (PDF ) Making Private Function Evaluation Safer, Faster, and Simpler Yi Liu, Qi Wang, Siu-Ming Yiu
2021/1681 (PDF ) On the security of OSIDH Pierrick Dartois, Luca De Feo
2021/1680 (PDF ) Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equivalence Classes Aisling Connolly, Pascal Lafourcade, Octavio Perez Kempner
2021/1679 (PDF ) Incompressible Cryptography Jiaxin Guan, Daniel Wichs, Mark Zhandry
2021/1678 (PDF ) Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers Matteo Campanelli, Felix Engelmann, Claudio Orlandi
2021/1677 (PDF ) Improving Support-Minors rank attacks: applications to G$e$MSS and Rainbow John Baena, Pierre Briaud, Daniel Cabarcas, Ray Perlner, Daniel Smith-Tone, Javier Verbel
2021/1676 (PDF ) Cryptographic Symmetric Structures Based on Quasigroups George Teseleanu
2021/1675 (PDF ) Traceable PRFs: Full Collusion Resistance and Active Security Sarasij Maitra, David J. Wu
2021/1674 (PDF ) Lattice-based Zero-knowledge Proofs for Blockchain Confidential Transactions Shang Gao, Tianyu ZHENG, Yu GUO, Zhe PENG, Bin XIAO
2021/1673 (PDF ) Proving as Fast as Computing: Succinct Arguments with Constant Prover Overhead Noga Ron-Zewi, Ron D. Rothblum
2021/1672 (PDF ) Succinct Zero-Knowledge Batch Proofs for Set Accumulators Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh
2021/1671 (PDF ) IronMask: Versatile Verification of Masking Security Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb
2021/1670 (PDF ) The complexity of solving Weil restriction systems Alessio Caminata, Michela Ceria, Elisa Gorla
2021/1669 (PDF ) Multi-Issuer Anonymous Credentials Without a Root Authority Kaoutar Elkhiyaoui, Angelo De Caro, Elli Androulaki
2021/1668 (PDF ) Secure Publish-Process-Subscribe System for Dispersed Computing Weizhao Jin, Bhaskar Krishnamachari, Muhammad Naveed, Srivatsan Ravi, Eduard Sanou, Kwame-Lante Wright
2021/1667 (PDF ) Using data compression and randomization to build an unconditionally secure short key cipher Boris Ryabko
2021/1666 (PDF ) Approximate Distance-Comparison-Preserving Symmetric Encryption Georg Fuchsbauer, Riddhi Ghosal, Nathan Hauke, Adam O'Neill
2021/1665 (PDF ) Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices Qiqi Lai, Feng-Hao Liu, Zhedong Wang
2021/1664 (PDF ) Towards a Simpler Lattice Gadget Toolkit Shiduo Zhang, Yang Yu
2021/1663 (PDF ) Cryptography from Pseudorandom Quantum States Prabhanjan Ananth, Luowen Qian, Henry Yuen
2021/1662 (PDF ) Information Security in the Quantum Era. Threats to modern cryptography: Grover’s algorithm Mihai-Zicu Mina, Emil Simion
2021/1661 (PDF ) Waldo: A Private Time-Series Database from Function Secret Sharing Emma Dauterman, Mayank Rathee, Raluca Ada Popa, Ion Stoica
2021/1660 (PDF ) Identity-Based Matchmaking Encryption without Random Oracles Danilo Francati, Alessio Guidi, Luigi Russo, Daniele Venturi
2021/1659 (PDF ) XTR and Tori Martijn Stam
2021/1658 (PDF ) Identifiable Cheating Entity Flexible Round-Optimized Schnorr Threshold (ICE FROST) Signature Protocol Alonso González, Hamy Ratoanina, Robin Salen, Setareh Sharifian, Vladimir Soukharev
2021/1657 (PDF ) SoK: Blockchain Light Clients Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias
2021/1656 (PDF ) Efficient Set Membership Proofs using MPC-in-the-Head Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk
2021/1655 (PDF ) Grover on Present: Quantum Resource Estimation Mostafizar Rahman, Goutam Paul
2021/1654 (PDF ) Quantifiable Assurance: From IPs to Platforms Bulbul Ahmed, Md Kawser Bepary, Nitin Pundir, Mike Borza, Oleg Raikhman, Amit Garg, Dale Donchin, Adam Cron, Mohamed A Abdel-moneum, Farimah Farahmandi, Fahim Rahman, Mark Tehranipoor
2021/1653 (PDF ) A Note on Non-Interactive Key Exchange from Code Equivalence Lindsey Knowles, Edoardo Persichetti, Tovohery Randrianarisoa, Paolo Santini
2021/1652 (PDF ) Financially Backed Covert Security Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2021/1651 (PDF ) A compiler for multi-key homomorphic signatures for Turing machines Somayeh Dolatnezhad Samarin, Dario Fiore, Daniele Venturi, Morteza Amini
2021/1650 (PDF ) “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar
2021/1649 (PDF ) A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels Wasilij Beskorovajnov, Roland Gröll, Jörn Müller-Quade, Astrid Ottenhues, Rebecca Schwerdt
2021/1648 (PDF ) A Scalable SIMD RISC-V based Processor with Customized Vector Extensions for CRYSTALS-Kyber Huimin Li, Nele Mentens, Stjepan Picek
2021/1647 (PDF ) Privacy-Preserving Authenticated Key Exchange for Constrained Devices Loïc Ferreira
2021/1646 (PDF ) A Method for Securely Comparing Integers using Binary Trees Anselme Tueno, Jonas Janneck, David Boehm
2021/1645 (PDF ) Sequential Indifferentiability of Confusion-Diffusion Networks Qi Da, Shanjie Xu, Chun Guo
2021/1644 (PDF ) Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes Zhenyu Lu, Weijia Wang, Kai Hu, Yanhong Fan, Lixuan Wu, Meiqin Wang
2021/1643 (PDF ) STROBE: Stake-based Threshold Random Beacons Donald Beaver, Konstantinos Chalkias, Mahimna Kelkar, Lefteris Kokoris Kogias, Kevin Lewi, Ladi de Naurois, Valeria Nicolaenko, Arnab Roy, Alberto Sonnino
2021/1642 (PDF ) SecNDP: Secure Near-Data Processing with Untrusted Memory Wenjie Xiong, Liu Ke, Dimitrije Jankov, Michael Kounavis, Xiaochen Wang, Eric Northup, Jie Amy Yang, Bilge Acun, Carole-Jean Wu, Ping Tak Peter Tang, G. Edward Suh, Xuan Zhang, Hsien-Hsin S. Lee.
2021/1641 (PDF ) Differential Cryptanalysis of WARP Je Sen Teh, Alex Biryukov
2021/1640 (PDF ) New Differential Cryptanalysis Results for the Lightweight Block Cipher BORON Je Sen Teh, Li Jing Tham, Norziana Jamil, Wun-She Yap
2021/1639 (PDF ) A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over $\mathbb{F}_2$ Charles Bouillaguet, Claire Delaplace, Monika Trimoska
2021/1638 (PDF ) 00 Nguyen Thoi Minh Quan
2021/1637 (PDF ) Internet Security and Quantum Computing Hilarie Orman
2021/1636 (PDF ) Does Fully Homomorphic Encryption Need Compute Acceleration? Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi
2021/1635 (PDF ) Synchronous Distributed Key Generation without Broadcasts Nibesh Shrestha, Adithya Bhat, Aniket Kate, Kartik Nayak
2021/1634 (PDF ) McEliece needs a Break -- Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD Andre Esser, Alexander May, Floyd Zweydinger
2021/1633 (PDF ) Zero Knowledge Proofs towards Verifiable Decentralized AI Pipelines Nitin Singh, Pankaj Dayama, Vinayaka Pandit
2021/1632 (PDF ) Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits Meryem Cherkaoui-Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2021/1631 (PDF ) Secure Sampling of Constant-Weight Words – Application to BIKE Nicolas Sendrier
2021/1630 (PDF ) Exponential Increment of RSA Attack Range via Lattice Based Cryptanalysis Abderahmanne Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Domenica Stefania Merenda, Ali Ahmadian
2021/1629 (PDF ) Increment of Insecure RSA Private Exponent Bound Through Perfect Square RSA Diophantine Parameters Cryptanalysis Wan Nur Aqlili Ruzai, Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhammad Asyraf Asbullah
2021/1628 (PDF ) SoK: Mitigation of Front-running in Decentralized Finance Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen, Lorenzo Gentile
2021/1627 (PDF ) A PKI-based Framework for Establishing Efficient MPC Channels Daniel Masny, Gaven Watson
2021/1626 (PDF ) A Successful Subfield Lattice Attack on a Fully Homomorphic Encryption Scheme Martha Norberg Hovd
2021/1625 (PDF ) A note on the QFT randomness spectral test a new approach of DST Emil SIMION, Elena-Corina CIPU, Vasile-Laurențiu DOSAN, Andrei-Voicu TOMUȚ, Eugen Neacsu
2021/1624 (PDF ) On the IND-CCA1 Security of FHE Schemes Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum
2021/1623 (PDF ) On the Short Principal Ideal Problem over some real Kummer fields Andrea Lesavourey, Thomas Plantard, Willy Susilo
2021/1622 (PDF ) Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber Jeroen Delvaux
2021/1621 (PDF ) Alpha-Rays: Key Extraction Attacks on Threshold ECDSA Implementations Dmytro Tymokhanov, Omer Shlomovits
2021/1620 (PDF ) Unicity distance of the Zodiac-340 cipher Joachim von zur Gathen
2021/1618 (PDF ) Succinct Publicly-Certifiable Proofs (or: Can a Blockchain Verify a Designated-Verifier Proof?) Matteo Campanelli, Hamidreza Khoshakhlagh
2021/1617 (PDF ) Richelot Isogenies, Pairings on Squared Kummer Surfaces and Applications Chao Chen, Fangguo Zhang
2021/1616 (PDF ) A Note on the Post-Quantum Security of (Ring) Signatures Rohit Chatterjee, Kai-Min Chung, Xiao Liang, Giulio Malavolta
2021/1615 (PDF ) High-order Polynomial Comparison and Masking Lattice-based Encryption Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
2021/1612 (PDF ) Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sánchez
2021/1611 (PDF ) Solving degree, last fall degree, and related invariants Alessio Caminata, Elisa Gorla
2021/1610 (PDF ) Factoring Primes to Factor Moduli: Backdooring and Distributed Generation of Semiprimes Giuseppe Vitto
2021/1609 (PDF ) Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings Hiroki Furue, Momonari Kudo
2021/1608 (PDF ) An Optimized Quantum Implementation of ISD on Scalable Quantum Resources Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano
2021/1607 (PDF ) Efficient and Extensive Search Linear Approximations with High for Precise Correlations of Full SNOW-V ZhaoCun Zhou, DengGuo Feng, Bin Zhang
2021/1606 (PDF ) An Enhanced Long-term Blockchain Scheme Against Compromise of Cryptography Long Meng, Liqun Chen
2021/1605 (PDF ) Inflation-Tracking Proof-of-Work Crypto-Currencies Charanjit S. Jutla
2021/1604 (PDF ) The most efficient indifferentiable hashing to elliptic curves of $j$-invariant $1728$ Dmitrii Koshelev
2021/1603 (PDF ) CHEX-MIX: Combining Homomorphic Encryption with Trusted Execution Environments for Two-party Oblivious Inference in the Cloud Deepika Natarajan, Andrew Loveless, Wei Dai, Ronald Dreslinski
2021/1602 (PDF ) A Note on P/poly Validity of GVW15 Predicate Encryption Scheme Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu
2021/1601 (PDF ) Post-Quantum Security of the Even-Mansour Cipher Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz
2021/1600 (PDF ) A New Isogeny Representation and Applications to Cryptography Antonin Leroux
2021/1599 (PDF ) How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols Pankaj Dayama, Arpita Patra, Protik Paul, Nitin Singh, Dhinakaran Vinayagamurthy
2021/1598 (PDF ) Modelling IBE-based Key Exchange Protocol using Tamarin Prover Srijanee Mookherji, Vanga Odelu, Rajendra Prasath
2021/1597 (PDF ) Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite Marc Fischlin, Olga Sanina
2021/1596 (PDF ) SHealS and HealS: isogeny-based PKEs from akey validation method for SIDH Tako Boris Fouotsa, Christophe Petit
2021/1595 (PDF ) A formula for disaster: a unified approach to elliptic curve special-point-based attacks Vladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar, Billy Bob Brumley
2021/1594 (PDF ) On the Bottleneck Complexity of MPC with Correlated Randomness Claudio Orlandi, Divya Ravi, Peter Scholl
2021/1593 (PDF ) Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, Cong Wang
2021/1592 (PDF ) The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-based SCA Guilherme Perin, Lichao Wu, Stjepan Picek
2021/1591 (PDF ) Practical Asynchronous Distributed Key Generation Sourav Das, Thomas Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, Ling Ren
2021/1590 (PDF ) Garbling, Stacked and Staggered: Faster k-out-of-n Garbled Function Evaluation David Heath, Vladimir Kolesnikov, Stanislav Peceny
2021/1589 (PDF ) SoK: Validating Bridges as a Scaling Solution for Blockchains Patrick McCorry, Chris Buckland, Bennet Yee, Dawn Song
2021/1587 (PDF ) Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators Damiano Abram, Ariel Nof, Claudio Orlandi, Peter Scholl, Omer Shlomovits
2021/1586 (PDF ) Cryptanalysis of a Type of White-Box Implementations of the SM4 Block Cipher Jiqiang Lu, Jingyu Li, Zexuan Chen, Yanan Li
2021/1585 (PDF ) Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy Cong Zuo, Shangqi Lai, Shi-Feng Sun, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang, Liehuang Zhu, Shujie Cui
2021/1584 (PDF ) ppSAT: Towards Two-Party Private SAT Solving Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Xiao Wang
2021/1583 (PDF ) Orientations and the supersingular endomorphism ring problem Benjamin Wesolowski
2021/1582 (PDF ) CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks Changhai Ou, Debiao He, Zhu Wang, Kexin Qiao, Shihui Zheng, Siew-Kei Lam
2021/1581 (PDF ) Anonymous Authenticated Communication Fabio Banfi, Ueli Maurer
2021/1580 (PDF ) High Order Side-Channel Security for Elliptic-Curve Implementations Sonia Belaïd, Matthieu Rivain
2021/1579 (PDF ) Le Mans: Dynamic and Fluid MPC for Dishonest Majority Rahul Rachuri, Peter Scholl
2021/1578 (PDF ) On Quantum Query Complexities of Collision-Finding in Non-Uniform Random Functions Tianci Peng, Shujiao Cao, Rui Xue
2021/1577 (PDF ) SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs Michael Rosenberg, Mary Maller, Ian Miers
2021/1576 (PDF ) Shared Permutation for Syndrome Decoding: New Zero-Knowledge Protocol and Code-Based Signature Thibauld Feneuil, Antoine Joux, Matthieu Rivain
2021/1575 (PDF ) Shorter Lattice-Based Group Signatures via ``Almost Free'' Encryption and Other Optimizations Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon, Gregor Seiler
2021/1574 (PDF ) Ascon PRF, MAC, and Short-Input MAC Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
2021/1573 (PDF ) Improved Security Bound of \textsf{(E/D)WCDM} Nilanjan Datta, Avijit Dutta, Kushankur Dutta
2021/1572 (PDF ) Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128 (Full version) Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang
2021/1571 (PDF ) Tight Security for Key-Alternating Ciphers with Correlated Sub-Keys Stefano Tessaro, Xihu Zhang
2021/1570 (PDF ) Multicast Key Agreement, Revisited Alexander Bienstock, Yevgeniy Dodis, Yi Tang
2021/1569 (PDF ) ABBY: Automating leakage modeling for side-channels analysis Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina
2021/1568 (PDF ) Impeccable Circuits III Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Amir Moradi
2021/1567 (PDF ) Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations Tomer Ashur, Mohsin Khan, Kaisa Nyberg
2021/1566 (PDF ) Towards Using Blockchain Technology to Prevent Diploma Fraud Qiang Tang
2021/1565 (PDF ) Practical, Round-Optimal Lattice-Based Blind Signatures Shweta Agrawal, Elena Kirshanova, Damien Stehle, Anshu Yadav
2021/1564 (PDF ) Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
2021/1563 (PDF ) Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication Sebastian Paul, Patrik Scheible, Friedrich Wiemer
2021/1562 (PDF ) Concurrently Composable Non-Interactive Secure Computation Andrew Morgan, Rafael Pass
2021/1561 (PDF ) Quantum Time/Memory/Data Tradeoff Attacks Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2021/1560 (PDF ) SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations Shiyao Chen, Yanhong Fan, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo
2021/1559 (PDF ) Facial Template Protection via Lattice-based Fuzzy Extractors Kaiyi Zhang, Hongrui Cui, Yu Yu
2021/1558 (PDF ) RSA Key Recovery from Digit Equivalence Information Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom
2021/1557 (PDF ) Performance bounds for QC-MDPC codes decoders Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini
2021/1556 (PDF ) Diving Deep into the Weak Keys of Round Reduced Ascon Raghvendra Rohit, Santanu Sarkar
2021/1555 (PDF ) Accelerator for Computing on Encrypted Data Sujoy Sinha Roy, Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo
2021/1554 (PDF ) How to Claim a Computational Feat Clémence Chevignard, Rémi Géraud-Stewart, Antoine Houssais, David Naccache, Edmond de Roffignac
2021/1553 (PDF ) Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems George Tasopoulos, Jinhui Li, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld
2021/1552 (PDF ) Time-memory Trade-offs for Saber+ on Memory-constrained RISC-V Jipeng Zhang, Junhao Huang, Zhe Liu, Sujoy Sinha Roy
2021/1551 (PDF ) Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev
2021/1550 (PDF ) Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security Ziaur Rahman, Ibrahim Khalil, Mousumi Sumi
2021/1549 (PDF ) Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets Mariana Botelho da Gama, John Cartlidge, Antigoni Polychroniadou, Nigel P. Smart, Younes Talibi Alaoui
2021/1548 (PDF ) Just how hard are rotations of $\mathbb{Z}^n$? Algorithms and cryptography with the simplest lattice Huck Bennett, Atul Ganju, Pura Peetathawatchai, Noah Stephens-Davidowitz
2021/1547 (PDF ) SoK: Plausibly Deniable Storage Chen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion
2021/1546 (PDF ) Improving Deep Learning Networks for Profiled Side-Channel Analysis Using Performance Improvement Techniques Damien Robissout, Lilian Bossuet, Amaury Habrard, Vincent Grosso
2021/1545 (PDF ) Longest Chain Consensus Under Bandwidth Constraint Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse, Mohammad Alizadeh
2021/1544 (PDF ) Information Dispersal with Provable Retrievability for Rollups Kamilla Nazirkhanova, Joachim Neu, David Tse
2021/1543 (PDF ) Post-Quantum Zero Knowledge, Revisited (or: How to do Quantum Rewinding Undetectably) Alex Lombardi, Fermi Ma, Nicholas Spooner
2021/1542 (PDF ) An End-to-End Bitstream Tamper Attack Against Flip-Chip FPGAs Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2021/1541 (PDF ) Revisiting the Security of COMET Authenticated Encryption Scheme Shay Gueron, Ashwin Jha, Mridul Nandi
2021/1540 (PDF ) Lightweight Swarm Authentication George Teseleanu
2021/1539 (PDF ) Route Discovery in Private Payment Channel Networks Zeta Avarikioti, Mahsa Bastankhah, Mohammad Ali Maddah-Ali, Krzysztof Pietrzak, Jakub Svoboda, Michelle Yeo
2021/1538 (PDF ) SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah
2021/1537 (PDF ) PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher Shotaro Miyashita, Ryoma Ito, Atsuko Miyaji
2021/1536 (PDF ) SoK: Tokenization on Blockchain Gang Wang, Mark Nixon
2021/1535 (PDF ) Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Manicillas Lopez, Mridul Nandi
2021/1534 (PDF ) An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang
2021/1533 (PDF ) The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n Lorenzo Grassi, Dmitry Khovratovich, Sondre Rønjom, Markus Schofnegger
2021/1532 (PDF ) On the Download Rate of Homomorphic Secret Sharing Ingerid Fosli, Yuval Ishai, Victor I. Kolobov, Mary Wootters
2021/1531 (PDF ) Squint Hard Enough: Evaluating Perceptual Hashing with Machine Learning Jonathan Prokos, Tushar M. Jois, Neil Fendley, Roei Schuster, Matthew Green, Eran Tromer, Yinzhi Cao
2021/1530 (PDF ) Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets Alex Ozdemir, Dan Boneh
2021/1529 (PDF ) Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges Hosein Hadipour, Maria Eichlseder
2021/1528 (PDF ) An Alternative Approach for Computing Discrete Logarithms in Compressed SIDH Kaizhan Lin, Weize Wang, Lin Wang, Chang-An Zhao
2021/1527 (PDF ) CoHA-NTT: A Configurable Hardware Accelerator for NTT-based Polynomial Multiplication Kemal Derya, Ahmet Can Mert, Erdinç Öztürk, Erkay Savaş
2021/1526 (PDF ) A Performance Evaluation of Pairing-Based Broadcast Encryption Systems Arush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala
2021/1525 (PDF ) Amortizing Rate-1 OT and Applications to PIR and PSI Melissa Chase, Sanjam Garg, Mohammad Hajiabadi, Jialin Li, Peihan Miao
2021/1524 (PDF ) An Improved Range Proof with Base-3 Construction Esra Günsay, Cansu Betin Onur, Murat Cenk
2021/1523 (PDF ) Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang
2021/1522 (PDF ) On Cryptocurrency Wallet Design Ittay Eyal
2021/1521 (PDF ) Security evaluation against side-channel analysis at compilation time Nicolas Bruneau, Charles Christen, Jean-Luc Danger, Adrien Facon, Sylvain Guilley
2021/1520 (PDF ) Ark of the ECC: An open-source ECDSA power analysis attack on a FPGA based Curve P-256 implementation Jean-Pierre Thibault, Colin O’Flynn, Alex Dewar
2021/1519 (PDF ) Practical Garbled RAM: GRAM with $O(\log^2 n)$ Overhead David Heath, Vladimir Kolesnikov, Rafail Ostrovsky
2021/1518 (PDF ) Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs Valence Cristiani, Maxime Lecomte, Philippe Maurine
2021/1517 (PDF ) HOLMES: Efficient Distribution Testing for Secure Collaborative Learning Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca Ada Popa
2021/1516 (PDF ) Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round Nai-Hui Chia, Kai-Min Chung, Xiao Liang, Takashi Yamakawa
2021/1515 (PDF ) Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman
2021/1514 (PDF ) Clarion: Anonymous Communication from Multiparty Shuffling Protocols Saba Eskandarian, Dan Boneh
2021/1513 (PDF ) InterTrust: Towards an Efficient Blockchain Interoperability Architecture with Trusted Services Gang Wang, Mark Nixon
2021/1512 (PDF ) BLOCK CIPHER DEFINED BY MATRIX PRESENTATION OF QUASIGROUPS Smile Markovski, Vesna Dimitrova, Zlatka Trajcheska, Marija Petkovska, Mile Kostadinoski, Damjan Buhov
2021/1511 (PDF ) Compressed SIKE Round 3 on ARM Cortex-M4 Mila Anastasova, Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
2021/1510 (PDF ) Pattern Devoid Cryptography Gideon Samid
2021/1509 (PDF ) More Lessons: Analysis of PUF-based Authentication Protocols for IoT Karim Lounis, Mohammad Zulkernine
2021/1508 (PDF ) High-Speed Hardware Architectures and FPGA Benchmarking of CRYSTALS-Kyber, NTRU, and Saber Viet Ba Dang, Kamyar Mohajerani, Kris Gaj
2021/1507 (PDF ) Parallel Quantum Addition for Korean Block Cipher Kyungbae Jang, Gyeongju Song, Hyunjun Kim, Hyeokdong Kwon, Hyunji Kim, Hwajeong Seo
2021/1506 (PDF ) z-OTS: a one-time hash-based digital signaturescheme with fast verification Amos Zheng, Marcos A. Simplicio Jr.
2021/1505 (PDF ) EVA Improved: Compiler and Extension Library for CKKS Sangeeta Chowdhary, Wei Dai, Kim Laine, Olli Saarikivi
2021/1504 (PDF ) CCA SecureA Posteriori Openable Encryption in the Standard Model Xavier Bultel
2021/1503 (PDF ) Interaction-Preserving Compilers for Secure Computation Nico Döttling, Vipul Goyal, Giulio Malavolta, Justin Raizes
2021/1502 (PDF ) Strong and Tight Security Guarantees against Integral Distinguishers Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo
2021/1501 (PDF ) Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols Alisa Pankova, Jan Willemson
2021/1500 (PDF ) Succinct Erasure Coding Proof Systems Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang
2021/1499 (PDF ) Improved Lattice-Based Mix-Nets for Electronic Voting Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik
2021/1498 (PDF ) Rectangular, Range, and Restricted AONTs: Three Generalizations of All-or-Nothing Transforms Navid Nasr Esfahani, Douglas Stinson
2021/1497 (PDF ) GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2021/1496 (PDF ) Security Analysis Of DGM and GM Group Signature Schemes Instantiated With XMSS-T Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2021/1495 (PDF ) Veri Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2021/1494 (PDF ) On the efficiency of a general attack against the MOBS cryptosystem Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, Siamak F. Shahandashti
2021/1493 (PDF ) VASA: Vector AES Instructions for Security Applications Jean-Pierre Münch, Thomas Schneider, Hossein Yalame
2021/1492 (PDF ) SoK: Password-Authenticated Key Exchange -- Theory, Practice, Standardization and Real-World Lessons Feng Hao, Paul C. van Oorschot
2021/1491 (PDF ) The Hidden Lattice Problem Luca Notarnicola, Gabor Wiese
2021/1490 (PDF ) Precio: Private Aggregate Measurement via Oblivious Shuffling F. Betül Durak, Chenkai Weng, Erik Anderson, Kim Laine, Melissa Chase
2021/1489 (PDF ) Estimating the Effectiveness of Lattice Attacks Kotaro Abe, Makoto Ikeda
2021/1488 (PDF ) Accelerating the Delfs-Galbraith algorithm with fast subfield root detection Maria Corte-Real Santos, Craig Costello, Jia Shi
2021/1487 (PDF ) A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert
2021/1486 (PDF ) Mitaka: a simpler, parallelizable, maskable variant of Falcon Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
2021/1485 (PDF ) Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE Qian Guo, Clemens Hlauschek, Thomas Johansson, Norman Lahr, Alexander Nilsson, Robin Leander Schröder
2021/1484 (PDF ) On Forging SPHINCS+-Haraka Signatures on a Fault-tolerant Quantum Computer Robin M. Berger, Marcel Tiepelt
2021/1483 (PDF ) A Practical Forward-Secure DualRing Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen
2021/1482 (PDF ) The Optimal Error Resilience of Interactive Communication Over Binary Channels Meghal Gupta, Rachel Yun Zhang
2021/1481 (PDF ) Interactive Error Correcting Codes Over Binary Erasure Channels Resilient to $>\frac12$ Adversarial Corruption Meghal Gupta, Yael Tauman Kalai, Rachel Zhang
2021/1480 (PDF ) Extractors: Low Entropy Requirements Colliding With Non-Malleability Divesh Aggarwal, Eldon Chung, Maciej Obremski
2021/1479 (PDF ) Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and aPartial ML-Distinguisher Amirhossein Ebrahimi, Francesco Regazzoni, Paolo Palmieri
2021/1478 (PDF ) Zarcanum: A Proof-of-Stake Scheme for Confidential Transactions with Hidden Amounts sowle, koe
2021/1477 (PDF ) Multisignature with double threshold condition in the blockchain and its application to and strong keys generating Ruslan Skuratovskii, Alexandr Kalenyk
2021/1476 (PDF ) Multivariate public key cryptography with polynomial composition Emile Hautefeuille
2021/1475 (PDF ) Circuit-based PSI for Covid-19 Risk Scoring Leonie Reichert, Marcel Pazelt, Björn Scheuermann
2021/1474 (PDF ) Foundations of Transaction Fee Mechanism Design Hao Chung, Elaine Shi
2021/1473 (PDF ) Computational self-testing for entangled magic states Akihiro Mizutani, Yuki Takeuchi, Ryo Hiromasa, Yusuke Aikawa, Seiichiro Tani
2021/1472 (PDF ) Improving Cryptography Based On Entropoids Anisha Mukherjee, Saibal K. Pal
2021/1471 (PDF ) Efficient Searchable Symmetric Encryption for Join Queries Charanjit Jutla, Sikhar Patranabis
2021/1470 (PDF ) Concurrent-Secure Two-Party Computation in Two Rounds from Subexponential LWE Saikrishna Badrinarayanan, Rex Fernando, Amit Sahai
2021/1469 (PDF ) New Indifferentiability Security Proof of MDPH Hash Function Chun Guo, Tetsu Iwata, Kazuhiko Minematsu
2021/1468 (PDF ) LeakageVerif: Scalable and Efficient Leakage Verification in Symbolic Expressions Quentin L. Meunier, Etienne Pons, Karine Heydemann
2021/1467 (PDF ) On the Round Complexity of Black-box Secure MPC Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2021/1466 (PDF ) On semigroups of multivariate transformations constructed in terms of time dependent linguistic graphs and solutions of Post Quantum Multivariate Cryptography. V. Ustimenko
2021/1465 (PDF ) Themis: Fast, Strong Order-Fairness in Byzantine Consensus Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan
2021/1464 (PDF ) Polynomial-time targeted attacks on coin tossing for any number of corruptions Omid Etesami, Ji Gao, Saeed Mahloujifar, Mohammad Mahmoody
2021/1463 (PDF ) 3-Party Distributed ORAM from Oblivious Set Membership Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2021/1462 (PDF ) Prime pairing in algorithms searching for smooth group order Pavel Atnashev, George Woltman
2021/1461 (PDF ) A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange Aikata Aikata, Ahmet Can Mert, David Jacquemin, Amitabh Das, Donald Matthews, Santosh Ghosh, Sujoy Sinha Roy
2021/1460 (PDF ) Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR Itai Dinur, Nathan Keller, Ohad Klein
2021/1459 (PDF ) Privacy-preserving Identity Management System Jeonghyuk Lee, Jaekyung Choi, Hyunok Oh, Jihye Kim
2021/1458 (PDF ) QC-MDPC codes DFR and the IND-CCA security of BIKE Valentin Vasseur
2021/1457 (PDF ) An In-Depth Symbolic Security Analysis of the ACME Standard Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Kuesters, Guido Schmitz, Tim Wuertele
2021/1456 (PDF ) Server-Aided Continuous Group Key Agreement Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk
2021/1455 (PDF ) Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb, Damien Vergnaud
2021/1454 (PDF ) Russian Federal Remote E-voting Scheme of 2021 -- Protocol Description and Analysis Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson
2021/1453 (PDF ) A State-Separating Proof for Yao’s Garbling Scheme Chris Brzuska, Sabine Oechsner
2021/1452 (PDF ) A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks Abubakr Abdulgadir, Kamyar Mohajerani, Viet Ba Dang, Jens-Peter Kaps, Kris Gaj
2021/1451 (PDF ) High-Performance Hardware Implementation of CRYSTALS-Dilithium Luke Beckwith, Duc Tri Nguyen, Kris Gaj
2021/1450 (PDF ) Efficient Zero-Knowledge Argument in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier Sungwook Kim, Hyeonbum Lee, Jae Hong Seo
2021/1449 (PDF ) One-more Unforgeability of Blind ECDSA Xianrui Qin, Cailing Cai, Tsz Hon Yuen
2021/1448 (PDF ) Secure Featurization and Applications to Secure Phishing Detection Akash Shah, Nishanth Chandran, Mesfin Dema, Divya Gupta, Arun Gururajan, Huan Yu
2021/1447 (PDF ) Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3 Sebastian Paul, Yulia Kuzovkova, Norman Lahr, Ruben Niederhagen
2021/1446 (PDF ) Batch point compression in the context of advanced pairing-based protocols Dmitrii Koshelev
2021/1445 (PDF ) Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers Lukas Aumayr, Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei
2021/1444 (PDF ) Streamlined NTRU Prime on FPGA Bo-Yuan Peng, Adrian Marotzke, Ming-Han Tsai, Bo-Yin Yang, Ho-Lin Chen
2021/1443 (PDF ) Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun
2021/1442 (PDF ) On the {\sf P/poly} Validity of the Agr17 FE Scheme Yupu Hu, Siyue Dong, Baocang Wang
2021/1441 (PDF ) Length-preserving encryption with HCTR2 Paul Crowley, Nathan Huckleberry, Eric Biggers
2021/1440 (PDF ) Improved Circuit-based PSI via Equality Preserving Compression Kyoohyung Han, Dukjae Moon, Yongha Son
2021/1439 (PDF ) An Addendum to the ZUC-256 Stream Cipher Bin Zhang, Dengguo Feng, Chenhui Jin, Wen-Feng Qi, Wenling Wu, Chao Xu, Yanfeng Wang, Lin Jiao
2021/1438 (PDF ) Incremental Offline/Online PIR (extended version) Yiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel
2021/1437 (PDF ) ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking Anuj Dubey, Afzal Ahmad, Muhammad Adeel Pasha, Rosario Cammarota, Aydin Aysu
2021/1436 (PDF ) Efficient Representation of Numerical Optimization Problems for SNARKs Sebastian Angel, Andrew J. Blumberg, Eleftherios Ioannidis, Jess Woods
2021/1435 (PDF ) Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a ZhaoCun Zhou, DengGuo Feng, Bin Zhang
2021/1434 (PDF ) The Language's Impact on the Enigma Machine Daniel Matyas Perendi, Prosanta Gope
2021/1433 (PDF ) Oblivious Transfer from Trapdoor Permutations in Minimal Rounds Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
2021/1432 (PDF ) Wavelet: Code-based postquantum signatures with fast verification on microcontrollers Gustavo Banegas, Thomas Debris-Alazard, Milena Nedeljković, Benjamin Smith
2021/1431 (PDF ) Secure and Efficient Multi-Key FHE Scheme Supporting Multi-bit Messages from LWE Preserving Non-Interactive Decryption Chinmoy Biswas, Ratna Dutta
2021/1430 (PDF ) Improved Zero-Knowledge Argument of Encrypted Extended Permutation Yi Liu, Qi Wang, Siu-Ming Yiu
2021/1429 (PDF ) Reviewing ISO/IEC Standard for Time-stamping Services Long Meng, Liqun Chen
2021/1428 (PDF ) Non-randomness of S-unit lattices Daniel J. Bernstein, Tanja Lange
2021/1427 (PDF ) Public-Key Quantum Money with a Classical Bank Omri Shmueli
2021/1426 (PDF ) On Unpadded NTRU Quantum (In)Security Théodore Conrad-Frenkiel, Rémi Géraud-Stewart, David Naccache
2021/1425 (PDF ) Improving First-Order Threshold Implementations of SKINNY Andrea Caforio, Daniel Collins, Ognjen Glamocanin, Subhadeep Banik
2021/1423 (PDF ) Encryption to the Future: A Paradigm for Sending Secret Messages to Future (Anonymous) Committees Matteo Campanelli, Bernardo David, Hamidreza Khoshakhlagh, Anders Konring, Jesper Buus Nielsen
2021/1422 (PDF ) Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography Jan-Pieter D'Anvers, Daniel Heinz, Peter Pessl, Michiel van Beirendonck, Ingrid Verbauwhede
2021/1421 (PDF ) Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 Challenge Aleksei Udovenko, Giuseppe Vitto
2021/1420 (PDF ) Extending the Tally-Hiding Ordinos System: Implementations for Borda, Hare-Niemeyer, Condorcet, and Instant-Runoff Voting Fabian Hertel, Nicolas Huber, Jonas Kittelberger, Ralf Kuesters, Julian Liedtke, Daniel Rausch
2021/1419 (PDF ) With a Little Help from My Friends: Constructing Practical Anonymous Credentials Lucjan Hanzlik, Daniel Slamanig
2021/1418 (PDF ) Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets Qi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma, An Wang
2021/1417 (PDF ) How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption Koji Nuida
2021/1416 (PDF ) SME: Scalable Masking Extensions Ben Marshall, Dan Page
2021/1415 (PDF ) A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers Aayush Jain, Alexis Korb, Paul Lou, Amit Sahai
2021/1414 (PDF ) Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis Guilherme Perin, Lichao Wu, Stjepan Picek
2021/1413 (PDF ) Three Attacks on Proof-of-Stake Ethereum Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, David Tse
2021/1412 (PDF ) A General Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Key-Aggregation Hyesun Kwak, Dongwon Lee, Yongsoo Song, Sameer Wagh
2021/1411 (PDF ) Analysis of Client-side Security for Long-term Time-stamping Services Long Meng, Liqun Chen
2021/1410 (PDF ) Franchised Quantum Money Bhaskar Roberts, Mark Zhandry
2021/1409 (PDF ) Hiding in Plain Sight: Memory-tight Proofs via Randomness Programming Ashrujit Ghoshal, Riddhi Ghosal, Joseph Jaeger, Stefano Tessaro
2021/1408 (PDF ) Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
2021/1407 (PDF ) A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs Keitaro Hashimoto, Shuichi Katsumata, Eamonn Postlethwaite, Thomas Prest, Bas Westerbaan
2021/1406 (PDF ) Non-Slanderability of Linkable Spontaneous Anonymous Group Signature (LSAG) Veronika Kuchta, Joseph K. Liu
2021/1405 (PDF ) Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols Tianyu Zheng, Shang Gao, Yubo Song, Bin Xiao
2021/1404 (PDF ) Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments Dakshita Khurana
2021/1403 (PDF ) Efficient Adaptively-Secure Byzantine Agreement for Long Messages Amey Bhangale, Chen-Da Liu-Zhang, Julian Loss, Kartik Nayak
2021/1402 (PDF ) Guide to Fully Homomorphic Encryption over the [Discretized] Torus Marc Joye
2021/1401 (PDF ) HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, Michelle Yeo
2021/1400 (PDF ) Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version) Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, Takanori Isobe
2021/1399 (PDF ) Iterated Inhomogeneous Polynomials Jiaxin Guan, Mark Zhandry
2021/1398 (PDF ) Universally Composable Almost-Everywhere Secure Computation Nishanth Chandran, Pouyan Forghani, Juan Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas
2021/1397 (PDF ) Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties Craig Gentry, Shai Halevi, Vadim Lyubashevsky
2021/1396 (PDF ) NTT software optimization using an extended Harvey butterfly Jonathan Bradbury, Nir Drucker, Marius Hillenbrand
2021/1395 (PDF ) Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-degree Polynomials Reo Eriguchi, Koji Nuida
2021/1394 (PDF ) Rethinking Modular Multi-Exponentiation in Real-World Applications Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2021/1393 (PDF ) Fiat–Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model) Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
2021/1392 (PDF ) Differential fault attack on DEFAULT Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy, Santanu Sarkar
2021/1391 (PDF ) A note on a Claim of Eldar & Hallgren: LLL already solves it Léo Ducas, Wessel van Woerden
2021/1390 (PDF ) UC Secure Private Branching Program and Decision Tree Evaluation Keyu Ji, Bingsheng Zhang, Tianpei Lu, Lichun Li, Kui Ren
2021/1389 (PDF ) DPCrypto: Acceleration of Post-quantum Cryptographic Algorithms using Dot-Product Instruction on GPUs Wai-Kong Lee, Hwajeong Seo, Seong Oun Hwang, Angshuman Karmakar, Jose Maria Bermudo Mera, Ramachandra Achar
2021/1388 (PDF ) Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 Tarun Yadav, Manoj Kumar
2021/1387 (PDF ) Triplicate functions Lilya Budaghyan, Ivana Ivkovic, Nikolay Kaleyski
2021/1386 (PDF ) Efficient Threshold-Optimal ECDSA Michaella Pettit
2021/1385 (PDF ) BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs Nabil Alkeilani Alkadri, Patrick Harasser, Christian Janson
2021/1384 (PDF ) Log-$\mathcal{S}$-unit lattices using Explicit Stickelberger Generators to solve Approx Ideal-SVP Olivier Bernard, Andrea Lesavourey, Tuong-Huy Nguyen, Adeline Roux-Langlois
2021/1383 (PDF ) MHz2k: MPC from HE over $\mathbb{Z}_{2^k}$ with New Packing, Simpler Reshare, and Better ZKP Jung Hee Cheon, Dongwoo Kim, Keewoo Lee
2021/1382 (PDF ) ZPiE: Zero-knowledge Proofs in Embedded systems Xavier Salleras, Vanesa Daza
2021/1381 (PDF ) Multi-Authority ABE, Revisited Miguel Ambrona, Romain Gay
2021/1380 (PDF ) Orca: Blocklisting in Sender-Anonymous Messaging Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart
2021/1379 (PDF ) Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work \\ A Provably Secure Blockchain Protocol Matthias Fitzi, Aggelos Kiayias, Giorgos Panagiotakos, Alexander Russell
2021/1378 (PDF ) Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi
2021/1377 (PDF ) Fiat-Shamir Transformation of Multi-Round Interactive Proofs Thomas Attema, Serge Fehr, Michael Klooß
2021/1376 (PDF ) Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks Ivan Damgård, Daniel Escudero, Antigoni Polychroniadou
2021/1375 (PDF ) How to Prove Schnorr Assuming Schnorr: Security of Multi- and Threshold Signatures Elizabeth Crites, Chelsea Komlo, Mary Maller
2021/1374 (PDF ) Information-Combining Differential Fault Attacks on DEFAULT Marcel Nageler, Christoph Dobraunig, Maria Eichlseder
2021/1373 (PDF ) Highly Efficient OT-Based Multiplication Protocols Iftach Haitner, Nikolaos Makriyannis, Samuel Ranellucci, Eliad Tsfadia
2021/1372 (PDF ) Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones Eugene Frimpong, Reyhaneh Rabbaninejad, Antonis Michalas
2021/1371 (PDF ) A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test Kyoichi Asano, Keita Emura, Atsushi Takayasu, Yohei Watanabe
2021/1370 (PDF ) Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments Dimitris Mouris, Nektarios Georgios Tsoutsos
2021/1369 (PDF ) Faster Isogenies for Quantum-Safe SIKE Rami Elkhatib, Brian Koziel, Reza Azarderakhsh
2021/1368 (PDF ) Isogeny-based Group Signatures and Accountable Ring Signatures in QROM Kai-Min Chung, Yao-Ching Hsieh, Mi-Ying Huang, Yu-Hsuan Huang, Tanja Lange, Bo-Yin Yang
2021/1366 (PDF ) Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, Federico Pintore
2021/1365 (PDF ) Collusion Resistant Revocable Ring Signatures and Group Signatures from Hard Homogeneous Spaces Yi-Fu Lai, Samuel Dobson
2021/1364 (PDF ) Non-applicability of the Gaborit&Aguilar-Melchor patent to Kyber and Saber Vadim Lyubashevsky, Damien Stehlé
2021/1363 (PDF ) On Entropy and Bit Patterns of Ring Oscillator Jitter Markku-Juhani O. Saarinen
2021/1362 (PDF ) Practical Multiple Persistent Faults Analysis Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri
2021/1361 (PDF ) Plumo: An Ultralight Blockchain Client Psi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer
2021/1360 (PDF ) Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More Behzad Abdolmaleki, Daniel Slamanig
2021/1359 (PDF ) Families of SNARK-friendly 2-chains of elliptic curves Youssef El Housni, Aurore Guillevic
2021/1358 (PDF ) The Hardness of LWE and Ring-LWE: A Survey David Balbás
2021/1356 (PDF ) Structural Mutual Information and Its Application Youliang Tian, Zhiying Zhang, Jinbo Xiong, Jianfeng Ma
2021/1355 (PDF ) Curve448 on 32-bit ARM Cortex-M4 Hwajeong Seo, Reza Azarderakhsh
2021/1354 (PDF ) SoK: On the Security of Cryptographic Problems from Linear Algebra Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren
2021/1353 (PDF ) Noise-Tolerant Quantum Tokens for MAC Amit Behera, Or Sattath, Uriel Shinar
2021/1352 (PDF ) A Thorough Treatment of Highly-Efficient NTRU Instantiations Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler, Dominique Unruh
2021/1351 (PDF ) Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing Julien Duman, Eike Kiltz, Kathrin Hövelmanns, Vadim Lyubashevsky, Gregor Seiler
2021/1350 (PDF ) Generalized Proof of Liabilities Yan Ji, Konstantinos Chalkias
2021/1349 (PDF ) Updatable Private Set Intersection Saikrishna Badrinarayanan, Peihan Miao, Tiancheng Xie
2021/1348 (PDF ) Beyond quadratic speedups in quantum attacks on symmetric schemes Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras
2021/1347 (PDF ) TOTA: Fully Homomorphic Encryption with Smaller Parameters and Stronger Security Zhaomin Yang, Xiang Xie, Huajie Shen, Shiying Chen, Jun Zhou
2021/1346 (PDF ) WeStat: a Privacy-Preserving Mobile Data Usage Statistics System Sébastien Canard, Nicolas Desmoulins, Sébastien Hallay, Adel Hamdi, Dominique Le Hello
2021/1345 (PDF ) New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair Subhadeep Banik, Khashayar Barooti, Serge Vaudenay, Hailun Yan
2021/1344 (PDF ) Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu
2021/1343 (PDF ) A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW Hanlin Liu, Yu Yu
2021/1342 (PDF ) Efficient Functional Commitments: How to Commit to a Private Function Dan Boneh, Wilson Nguyen, Alex Ozdemir
2021/1341 (PDF ) Anonymous Whistleblowing over Authenticated Channels Thomas Agrikola, Geoffroy Couteau, Sven Maier
2021/1340 (PDF ) TEDT2 - Highly Secure Leakage-resilient TBC-based Authenticated Encryption Eik List
2021/1339 (PDF ) Safe-Error Analysis of Post-Quantum Cryptography Mechanisms Luk Bettale, Simon Montoya, Guénaël Renault
2021/1338 (PDF ) Embedded Multilayer Equations: a New Hard Problem for Constructing Post-Quantum Signatures Smaller than RSA (without Hardness Assumption) Dongxi Liu
2021/1337 (PDF ) Large-Precision Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping Zeyu Liu, Daniele Micciancio, Yuriy Polyakov
2021/1336 (PDF ) Improved Computational Extractors and their Applications Dakshita Khurana, Akshayaram Srinivasan
2021/1335 (PDF ) Integer Functions Suitable for Homomorphic Encryption over Finite Fields Ilia Iliashenko, Christophe Nègre, Vincent Zucca
2021/1334 (PDF ) Indistinguishability Obfuscation from LPN over F_p, DLIN, and PRGs in NC^0 Aayush Jain, Huijia Lin, Amit Sahai
2021/1333 (PDF ) Paradoxical Compression with Verifiable Delay Functions Thomas Pornin
2021/1332 (PDF ) On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography Léo Ducas, Wessel van Woerden
2021/1331 (PDF ) Communicating Through Subliminal-Free Signatures George Teseleanu
2021/1330 (PDF ) On the security of ECDSA with additive key derivation and presignatures Jens Groth, Victor Shoup
2021/1329 (PDF ) Trail Search with CRHS Equations John Petter Indrøy, Håvard Raddum
2021/1328 (PDF ) Cross Subkey Side Channel Analysis Based on Small Samples Fanliang Hu, Huanyu Wang, Junnian Wang
2021/1327 (PDF ) Secure Multiparty Computation in the Bounded Storage Model Jiahui Liu, Satyanarayana Vusirikala
2021/1326 (PDF ) FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices Mo Zhang, Eduard Marin, David Oswald, Dave Singelee
2021/1325 (PDF ) Decentralized Multi-Authority ABE for NC^1 from Computational-BDH Pratish Datta, Ilan Komargodski, Brent Waters
2021/1324 (PDF ) Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption Kamil Kluczniak
2021/1323 (PDF ) Anonymity of NIST PQC Round 3 KEMs Keita Xagawa
2021/1322 (PDF ) A New Adaptive Attack on SIDH Tako Boris Fouotsa, Christophe Petit
2021/1321 (PDF ) Blockchain-based Privacy-preserving Fair Data Trading Protocol Yao Jiang Galteland, Shuang Wu
2021/1320 (PDF ) Faster Key Generation of Supersingular Isogeny Diffie-Hellman Kaizhan Lin, Fangguo Zhang, Chang-An Zhao
2021/1319 (PDF ) Maliciously-Secure MrNISC in the Plain Model Rex Fernando, Aayush Jain, Ilan Komargodski
2021/1318 (PDF ) Supersingular Isogeny-Based Ring Signature Maryam Sheikhi Garjan, N. Gamze Orhon Kılıç, Murat Cenk
2021/1317 (PDF ) m-Stability: Threshold Security Meets Transferable Utility Osman Biçer, Burcu Yıldız, Alptekin Küpçü
2021/1316 (PDF ) Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores
2021/1315 (PDF ) Certified Everlasting Zero-Knowledge Proof for QMA Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2021/1314 (PDF ) High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
2021/1313 (PDF ) Hybrid Memristor-CMOS Obfuscation Against Untrusted Foundries Amin Rezaei, Jie Gu, Hai Zhou
2021/1312 (PDF ) Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability Ashley Fraser, Lydia Garms, Anja Lehmann
2021/1311 (PDF ) Power analysis attack on Kyber Alexandre Karlov, Natacha Linard de Guertechin
2021/1310 (PDF ) Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu
2021/1309 (PDF ) Faster Final Exponentiation on the KSS18 Curve Shiping Cai, Zhi Hu, Chang-An Zhao
2021/1308 (PDF ) No-Commit Proofs: Defeating Livelock in BFT Neil Giridharan, Heidi Howard, Ittai Abraham, Natacha Crooks, Alin Tomescu
2021/1307 (PDF ) In-depth Analysis of Side-Channel Countermeasures for CRYSTALS-Kyber Message Encoding on ARM Cortex-M4 Hauke Malte Steffen, Lucie Johanna Kogelheide, Timo Bartkewitz
2021/1306 (PDF ) Probabilistic micropayments with transferability Taisei Takahashi, Akira Otsuka
2021/1305 (PDF ) (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin Pratish Datta, Tapas Pal
2021/1304 (PDF ) An Open Problem on the Bentness of Mesnager’s Functions Chunming Tang, Peng Han, Qi Wang, Jun Zhang, Yanfeng Qi
2021/1303 (PDF ) Black-Box Accumulation Based on Lattices Sebastian H. Faller, Pascal Baumer, Michael Klooß, Alexander Koch, Astrid Ottenhues, Markus Raiber
2021/1302 (PDF ) Using Blockchain to Achieve Decentralized Privacy In IoT Healthcare Sajad Meisami, Mohammad Beheshti-Atashgah, Mohammad Reza Aref
2021/1301 (PDF ) An Isogeny-Based ID Protocol Using Structured Public Keys Karim Baghery, Daniele Cozzo, Robi Pedersen
2021/1300 (PDF ) Report and Trace Ring Signatures Ashley Fraser, Elizabeth A. Quaglia
2021/1299 (PDF ) Towards Quantum Large-Scale Password Guessing on Real-World Distributions Markus Dürmuth, Maximilian Golla, Philipp Markert, Alexander May, Lars Schlieper
2021/1298 (PDF ) Post-Quantum Authentication with Lightweight Cryptographic Primitives Henrique Faria, José Manuel Valença
2021/1297 (PDF ) Listen to Your Heart: Evaluation of the Cardiologic Ecosystem Endres Puschner, Christoph Saatjohann, Markus Willing, Christian Dresen, Julia Köbe, Benjamin Rath, Christof Paar, Lars Eckardt, Uwe Haverkamp, Sebastian Schinzel
2021/1296 (PDF ) Partition Oracles from Weak Key Forgeries Marcel Armour, Carlos Cid
2021/1295 (PDF ) Improved Quantum Hypercone Locality Sensitive Filtering in Lattice Sieving Max Heiser
2021/1294 (PDF ) Quantum Money from Quaternion Algebras Daniel M. Kane, Shahed Sharif, Alice Silverberg
2021/1293 (PDF ) TIDE: A novel approach to constructing timed-release encryption Angelique Faye Loe, Liam Medley, Christian O’Connell, Elizabeth A. Quaglia
2021/1292 (PDF ) A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion Kavya Sreedhar, Mark Horowitz, Christopher Torng
2021/1291 (PDF ) MyOPE: Malicious securitY for Oblivious Polynomial Evaluation Malika Izabachène, Anca Nitulescu, Paola de Perthuis, David Pointcheval
2021/1290 (PDF ) Large-Scale Non-Interactive Threshold Cryptosystems in the YOSO Model Andreas Erwig, Sebastian Faust, Siavash Riahi
2021/1289 (PDF ) Verifiable Isogeny Walks: Towards an Isogeny-based Postquantum VDF Jorge Chavez-Saab, Francisco Rodríguez Henríquez, Mehdi Tibouchi
2021/1288 (PDF ) FO-like Combiners and Hybrid Post-Quantum Cryptography Loïs Huguenin-Dumittan, Serge Vaudenay
2021/1287 (PDF ) The Exact Security of BIP32 Wallets Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, Siavash Riahi
2021/1286 (PDF ) Post-quantum Efficient Proof for Graph 3-Coloring Problem Ehsan Ebrahimi
2021/1285 (PDF ) Convexity of division property transitions: theory, algorithms and compact models Aleksei Udovenko
2021/1284 (PDF ) APAS: Application-Specific Accelerators for RLWE-based Homomorphic Linear Transformations Song Bian, Dur E Shahwar Kundi, Kazuma Hirozawa, Weiqiang Liu, Takashi Sato
2021/1283 (PDF ) Parallel Verification of Serial MAC and AE Modes Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo
2021/1282 (PDF ) On the Claims of Weak Block Synchronization in Bitcoin Seungjin Baek, Hocheol Nam, Yongwoo Oh, Muoi Tran, Min Suk Kang
2021/1281 (PDF ) Leveled Homomorphic Encryption Schemes with Hensel Codes David W. H. A. da Silva, Luke Harmon, Gaetan Delavignette, Carlos Araujo
2021/1280 (PDF ) Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage Emma Dauterman, Vivian Fang, Ioannis Demertzis, Natacha Crooks, Raluca Ada Popa
2021/1279 (PDF ) Quantum Diffie-Hellman Key Exchange Dirk Fischer
2021/1278 (PDF ) A survey of algorithmic methods in IC reverse engineering Leonid Azriel, Julian Speith, Nils Albartus, Ran Ginosara, Avi Mendelson, Christof Paar
2021/1277 (PDF ) LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier
2021/1276 (PDF ) On the Security and Performance of Blockchain Sharding Runchao Han, Jiangshan Yu, Haoyu Lin, Shiping Chen, Paulo Esteves-Veríssimo
2021/1275 (PDF ) Counterexample to OWF Self-XOR Being a DOWF Nathan Geier
2021/1274 (PDF ) A Tight Computational Indistinguishability Bound for Product Distributions Nathan Geier
2021/1273 (PDF ) OpenSquare: Decentralized Repeated Modular Squaring Service Sri AravindaKrishnan Thyagarajan, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder
2021/1272 (PDF ) Efficient CCA Timed Commitments in Class Groups Sri AravindaKrishnan Thyagarajan, Guilhem Castagnos, Fabien Laguillaumie, Giulio Malavolta
2021/1271 (PDF ) Computing the Jacobi symbol using Bernstein-Yang Mike Hamburg
2021/1270 (PDF ) Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited Yevgeniy Dodis, Willy Quach, Daniel Wichs
2021/1269 (PDF ) Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model Antonio Faonio
2021/1268 (PDF ) Simulation-Based Bi-Selective Opening Security for Public Key Encryption Junzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng
2021/1267 (PDF ) Tight Quantum Indifferentiability of a Rate-1/3 Compression Function Jan Czajkowski
2021/1266 (PDF ) Update-Sensitive Structured Encryption with Backward Privacy Zhiqiang Wu, Jin Wang, Keqin Li
2021/1265 (PDF ) Special Soundness in the Random Oracle Model Douglas Wikström
2021/1264 (PDF ) Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac, Arne Tobias Ødegaard
2021/1263 (PDF ) Transparency Dictionaries with Succinct Proofs of Correct Operation Ioanna Tzialla, Abhiram Kothapalli, Bryan Parno, Srinath Setty
2021/1262 (PDF ) Reverse Firewalls for Adaptively Secure MPC without Setup Suvradip Chakraborty, Chaya Ganesh, Mahak Pancholi, Pratik Sarkar
2021/1261 (PDF ) Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung
2021/1260 (PDF ) Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers Jelle Vos, Zekeriya Erkin, Christian Doerr
2021/1259 (PDF ) Parallel Repetition of $(k_1,\dots,k_{\mu})$-Special-Sound Multi-Round Interactive Proofs Thomas Attema, Serge Fehr
2021/1258 (PDF ) Bit Security as Computational Cost for Winning Games with High Probability Shun Watanabe, Kenji Yasunaga
2021/1257 (PDF ) Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy S. Dov Gordon, Jonathan Katz, Mingyu Liang, Jiayu Xu
2021/1256 (PDF ) Oblivious Message Retrieval Zeyu Liu, Eran Tromer
2021/1255 (PDF ) How to Find Ternary LWE Keys Using Locality Sensitive Hashing Elena Kirshanova, Alexander May
2021/1254 (PDF ) Vector and Functional Commitments from Lattices Chris Peikert, Zachary Pepin, Chad Sharp
2021/1253 (PDF ) EasyPQC: Verifying Post-Quantum Cryptography Manuel Barbosa, Gilles Barthe, Xiong Fan, Benjamin Grégoire, Shih-Han Hung, Jonathan Katz, Pierre-Yves Strub, Xiaodi Wu, Li Zhou
2021/1252 (PDF ) Complete Practical Side-Channel-Assisted Reverse Engineering of AES-Like Ciphers Andrea Caforio, Fatih Balli, Subhadeep Banik
2021/1251 (PDF ) Efficient NIZKs for Algebraic Sets Geoffroy Couteau, Helger Lipmaa, Roberto Parisella, Arne Tobias Ødegaard
2021/1250 (PDF ) Efficient Leakage-Resilient MACs without Idealized Assumptions Francesco Berti, Chun Guo, Thomas Peters, François-Xavier Standaert
2021/1249 (PDF ) Flexible Anonymous Transactions (FLAX): Towards Privacy-Preserving and Composable Decentralized Finance Wei Dai
2021/1248 (PDF ) The Adversary Capabilities In Practical Byzantine Fault Tolerance Yongge Wang
2021/1247 (PDF ) A Geometric Approach to Linear Cryptanalysis Tim Beyne
2021/1246 (PDF ) Astrolabous: A Universally Composable Time-Lock Encryption Scheme Myrto Arapinis, Nikolaos Lamprou, Thomas Zacharias
2021/1245 (PDF ) SeqL+: Secure Scan-Obfuscation with Theoretical and Empirical Validation Seetal Potluri, Shamik Kundu, Akash Kumar, Kanad Basu, Aydin Aysu
2021/1244 (PDF ) IvyCross: A Privacy-Preserving and Concurrency Control Framework for Blockchain Interoperability Ming Li, Jian Weng, Yi Li, Yongdong Wu, Jiasi Weng, Dingcheng Li, Guowen Xu, Robert Deng
2021/1243 (PDF ) Syndrome Decoding Estimator Andre Esser, Emanuele Bellini
2021/1242 (PDF ) Non-Interactive Differentially Anonymous Router Benedikt Bünz, Yuncong Hu, Shin’ichiro Matsuo, Elaine Shi
2021/1241 (PDF ) Shuffling Public Keys (A Peer-to-peer Voting Algorithm) Santi J. Vives
2021/1240 (PDF ) Count Me In! Extendability for Threshold Ring Signatures Diego F. Aranha, Mathias Hall-Andersen, Anca Nitulescu, Elena Pagnin, Sophia Yakoubov
2021/1239 (PDF ) Quantum Linearization Attacks Xavier Bonnetain, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher
2021/1238 (PDF ) Generic Framework for Key-Guessing Improvements Marek Broll, Federico Canale, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia
2021/1237 (PDF ) Hierarchical Integrated Signature and Encryption Yu Chen, Qiang Tang, Yuyu Wang
2021/1236 (PDF ) Architecture Support for Bitslicing Pantea Kiaei, Tom Conroy, Patrick Schaumont
2021/1235 (PDF ) Saidoyoki: Evaluating side-channel leakage in pre- and post-silicon setting Pantea Kiaei, Zhenyuan Liu, Ramazan Kaan Eren, Yuan Yao, Patrick Schaumont
2021/1234 (PDF ) Policy-Compliant Signatures Christian Badertscher, Christian Matt, Hendrik Waldner
2021/1233 (PDF ) Blockchains Enable Non-Interactive MPC Vipul Goyal, Elisaweta Masserova, Bryan Parno, Yifan Song
2021/1232 (PDF ) Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf Gizem Kara, Oğuz Yayla
2021/1231 (PDF ) Estimating (Miner) Extractable Value is Hard, Let’s Go Shopping! Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
2021/1230 (PDF ) Two-Round Maliciously Secure Computation with Super-Polynomial Simulation Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta
2021/1229 (PDF ) Direct Product Hardness Amplification David Lanzenberger, Ueli Maurer
2021/1228 (PDF ) Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy Hanwen Feng, Qiang Tang
2021/1227 (PDF ) Efficient Boolean Search over Encrypted Data with Reduced Leakage Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo
2021/1226 (PDF ) Succinct LWE Sampling, Random Polynomials, and Obfuscation Lalita Devadas, Willy Quach, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs
2021/1225 (PDF ) Massive Superpoly Recovery with Nested Monomial Predictions Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang
2021/1224 (PDF ) Trojan-Resilience without Cryptography Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak, Michelle Yeo
2021/1223 (PDF ) Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation Fabrice Benhamouda, Elette Boyle, Niv Gilboa, Shai Halevi, Yuval Ishai, Ariel Nof
2021/1222 (PDF ) Fault-enabled chosen-ciphertext attacks on Kyber Julius Hermelink, Peter Pessl, Thomas Pöppelmann
2021/1221 (PDF ) Simple, Fast Malicious Multiparty Private Set Intersection Ofri Nevo, Ni Trieu, Avishay Yanai
2021/1220 (PDF ) Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
2021/1219 (PDF ) Towards Tight Adaptive Security of Non-Interactive Key Exchange Julia Hesse, Dennis Hofheinz, Lisa Kohl, Roman Langrehr
2021/1218 (PDF ) Algebraic Adversaries in the Universal Composability Framework Michel Abdalla, Manuel Barbosa, Jonathan Katz, Julian Loss, Jiayu Xu
2021/1217 (PDF ) EMFI for Safety-Critical Testing of Automotive Systems Colin O'Flynn
2021/1216 (PDF ) Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage Akira Ito, Rei Ueno, Naofumi Homma
2021/1215 (PDF ) Optimization of Homomorphic Comparison Algorithm on RNS-CKKS Scheme Eunsang Lee, Joon-Woo Lee, Young-Sik Kim, Jong-Seon No
2021/1214 (PDF ) Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness Susumu Kiyoshima
2021/1213 (PDF ) DualRing: Generic Construction of Ring Signatures with Efficient Instantiations Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding
2021/1212 (PDF ) SPEEDY on Cortex--M3: Efficient Software Implementation of SPEEDY on ARM Cortex--M3 Hyunjun Kim, Kyungbae Jang, Gyeongju Song, Minjoo Sim, Siwoo Eum, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo
2021/1211 (PDF ) Grover on SPEEDY Gyeongju Song, Kyungbae Jang, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo
2021/1210 (PDF ) LedMAC: More Efficient Variants of LightMAC Yaobin Shen, Lei Wang, Dawu Gu
2021/1209 (PDF ) Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions Lior Rotem
2021/1208 (PDF ) On Actively-Secure Elementary MPC Reductions Benny Applebaum, Aarushi Goel
2021/1207 (PDF ) Non-Malleable Vector Commitments via Local Equivocability Lior Rotem, Gil Segev
2021/1206 (PDF ) Efficient Perfectly Secure Computation with Optimal Resilience Ittai Abraham, Gilad Asharov, Avishay Yanai
2021/1205 (PDF ) FASTA - a stream cipher for fast FHE evaluation Carlos Cid, John Petter Indrøy, Håvard Raddum
2021/1204 (PDF ) Attacks on Pseudo Random Number Generators Hiding a Linear Structure Florette Martinez
2021/1203 (PDF ) The irreducible vectors of a lattice: Some theory and applications Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
2021/1202 (PDF ) Design Space Exploration of SABER in 65nm ASIC Malik Imran, Felipe Almeida, Jaan Raik, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini
2021/1201 (PDF ) Provably Improving Election Verifiability in Belenios Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
2021/1200 (PDF ) KDM Security for the Fujisaki-Okamoto Transformations in the QROM Fuyuki Kitagawa, Ryo Nishimaki
2021/1199 (PDF ) Compressed Oblivious Encoding for Homomorphically Encrypted Search Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich
2021/1198 (PDF ) Clustering Effect in Simon and Simeck Gaëtan Leurent, Clara Pernot, André Schrottenloher
2021/1197 (PDF ) ($\epsilon,\delta$)-indistinguishable Mixing for Cryptocurrencies Mingyu Liang, Ioanna Karantaidou, Foteini Baldimtsi, Dov Gordon, Mayank Varia
2021/1196 (PDF ) Concurrent Composition of Differential Privacy Salil Vadhan, Tianhao Wang
2021/1195 (PDF ) Do you feel a chill? Using PIR against chilling effects for censorship-resistant publishing Miti Mazmudar, Stan Gurtler, Ian Goldberg
2021/1194 (PDF ) Automated Truncation of Differential Trails and Trail Clustering in ARX Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto
2021/1193 (PDF ) JUBILEE: Secure Debt Relief and Forgiveness David Cerezo Sánchez
2021/1192 (PDF ) Simple Constructions from (Almost) Regular One-Way Functions Noam Mazor, Jiapeng Zhang
2021/1191 (PDF ) A Simpler Model for Recovering Superpoly onTrivium Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
2021/1190 (PDF ) Differential Fault Attack on Lightweight Block Cipher PIPO SeongHyuck Lim, JaeSeung Han, Tae-Ho Lee, Dong-Guk Han
2021/1189 (PDF ) A Configurable Crystals-Kyber Hardware Implementation with Side-Channel Protection Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
2021/1188 (PDF ) Interhead Hydra Two Heads are Better than One Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2021/1187 (PDF ) Post-Quantum Signal Key Agreement with SIDH Samuel Dobson, Steven D. Galbraith
2021/1186 (PDF ) A Privacy-Preserving Distributed Identity Offline-First PoCP Blockchain Paradigm Andrew M. K. Nassief
2021/1185 (PDF ) Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework) Ueli Maurer, Christopher Portmann, Guilherme Rito
2021/1184 (PDF ) On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups Aron van Baarsen, Marc Stevens
2021/1183 (PDF ) ZKAttest: Ring and Group Signatures for Existing ECDSA Keys Armando Faz-Hernández, Watson Ladd, Deepak Maram
2021/1182 (PDF ) Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl
2021/1181 (PDF ) Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code Madura A. Shelton, Łukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom
2021/1180 (PDF ) The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? István András Seres, Balázs Pejó, Péter Burcsi
2021/1179 (PDF ) Improved Attacks on GIFT-64 Ling Sun, Wei Wang, Meiqin Wang
2021/1178 (PDF ) Onion Routing with Replies Christiane Kuhn, Dennis Hofheinz, Andy Rupp, Thorsten Strufe
2021/1177 (PDF ) Algebraic Restriction Codes and their Applications Divesh Aggarwal, Nico Döttling, Jesko Dujmovic, Mohammad Hajiabadi, Giulio Malavolta, Maciej Obremski
2021/1176 (PDF ) Amortized Threshold Symmetric-key Encryption Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha
2021/1175 (PDF ) Adaptive Security of Multi-Party Protocols, Revisited Martin Hirt, Chen-Da Liu-Zhang, Ueli Maurer
2021/1174 (PDF ) On Communication-Efficient Asynchronous MPC with Adaptive Security Annick Chopard, Martin Hirt, Chen-Da Liu-Zhang
2021/1173 (PDF ) Lelantus Spark: Secure and Flexible Private Transactions Aram Jivanyan, Aaron Feickert
2021/1172 (PDF ) Systematizing Core Properties of Pairing-Based Attribute-Based Encryption to Uncover Remaining Challenges in Enforcing Access Control in Practice Marloes Venema, Greg Alpár, Jaap-Henk Hoepman
2021/1171 (PDF ) FAST: Secure and High Performance Format-Preserving Encryption and Tokenization F. Betül Durak, Henning Horst, Michael Horst, Serge Vaudenay
2021/1170 (PDF ) Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs Masahito Ishizaka, Shinsaku Kiyomoto
2021/1169 (PDF ) As easy as ABC: Optimal (A)ccountable (B)yzantine (C)onsensus is easy! Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic
2021/1168 (PDF ) Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation (Full Version) Wonseok Choi, Byeonghak Lee, Jooyoung Lee, Yeongmin Lee
2021/1167 (PDF ) fflonk: a Fast-Fourier inspired verifier efficient version of PlonK Ariel Gabizon, Zachary J. Williamson
2021/1166 (PDF ) Fine-tuning the ISO/IEC Standard LightMAC Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
2021/1165 (PDF ) Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery Mario Larangeira
2021/1164 (PDF ) Cube Attacks on Round-Reduced TinyJAMBU Wil Liam Teng, Iftekhar Salam, Wei-Chuen Yau, Josef Pieprzyk, Raphaël C. -W. Phan
2021/1163 (PDF ) Information-Theoretically Secure MPC against Mixed Dynamic Adversaries Ivan Damgård, Daniel Escudero, Divya Ravi
2021/1162 (PDF ) Software Implementation of Optimal Pairings on Elliptic Curves with Odd Prime Embedding Degrees Yu Dai, Zijian Zhou, Fangguo Zhang, Chang-An Zhao
2021/1161 (PDF ) Balanced Non-Adjacent Forms Marc Joye
2021/1160 (PDF ) Classical Attacks on a Variant of the RSA Cryptosystem Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu
2021/1159 (PDF ) Compact and Malicious Private Set Intersection for Small Sets Mike Rosulek, Ni Trieu
2021/1158 (PDF ) Grafting Key Trees: Efficient Key Management for Overlapping Groups Joël Alwen, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter
2021/1157 (PDF ) Private Approximate Nearest Neighbor Search with Sublinear Communication Sacha Servan-Schreiber, Simon Langowski, Srinivas Devadas
2021/1156 (PDF ) Evolving Secret Sharing in Almost Semi-honest Model Jyotirmoy Pramanik, Avishek Adhikari
2021/1155 (PDF ) GPS: Integration of Graphene, PALISADE, and SGX for Large-scale Aggregations of Distributed Data Jonathan Takeshita, Colin McKechney, Justin Pajak, Antonis Papadimitriou, Ryan Karl, Taeho Jung
2021/1154 (PDF ) 1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher Elena Andreeva, Amit Singh Bhati, Bart Preneel, Damian Vizar
2021/1153 (PDF ) SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
2021/1152 (PDF ) Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field Simon Masson, Antonio Sanso, Zhenfei Zhang
2021/1151 (PDF ) Efficient Modular Multiplication Joppe W. Bos, Thorsten Kleinjung, Dan Page
2021/1150 (PDF ) Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes COUTEAU Geoffroy, Peter Rindal, Srinivasan Raghuraman
2021/1149 (PDF ) Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head José Bacelar Almeida, Manuel Barbosa, Manuel L Correia, Karim Eldefrawy, Stéphane Graham-Lengrand, Hugo Pacheco, Vitor Pereira
2021/1148 (PDF ) Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS) Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich
2021/1147 (PDF ) Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels
2021/1146 (PDF ) Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness Shuai Han, Shengli Liu, Dawu Gu
2021/1145 (PDF ) Recurring Contingent Payment for Proofs of Retrievability Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
2021/1144 (PDF ) MAYO: Practical Post-Quantum Signatures from Oil-and-Vinegar Maps Ward Beullens
2021/1143 (PDF ) Facial Recognition for Remote Electronic Voting – Missing Piece of the Puzzle or Yet Another Liability? Sven Heiberg, Kristjan Krips, Jan Willemson, Priit Vinkel
2021/1141 (PDF ) Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback Giovanni Deligios, Martin Hirt, Chen-Da Liu-Zhang
2021/1140 (PDF ) Computing Discrete Logarithms Robert Granger, Antoine Joux
2021/1139 (PDF ) HyperLogLog: Exponentially Bad in Adversarial Settings Kenneth G. Paterson, Mathilde Raynal
2021/1138 (PDF ) Optimal Good-case Latency for Rotating Leader Synchronous BFT Ittai Abraham, Kartik Nayak, Nibesh Shrestha
2021/1137 (PDF ) qTESLA: Practical Implementations of a Quantum Attack Resistant Signature Scheme Michael Burger, Juliane Krämer, Christian Bischof
2021/1136 (PDF ) A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions Michael Burger, Christian Bischof, Juliane Krämer
2021/1135 (PDF ) FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption Kamil Kluczniak, Leonard Schild
2021/1134 (PDF ) Some observations on ZUC-256 Alexander Maximov
2021/1133 (PDF ) Multiradical isogenies Wouter Castryck, Thomas Decru
2021/1132 (PDF ) Safe-Error Attacks on SIKE and CSIDH Fabio Campos, Juliane Krämer, Marcel Müller
2021/1131 (PDF ) Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertexts Tanping Zhou, Long Chen, Xiaoliang Che, Wenchao Liu, Zhenfeng Zhang, Xiaoyuan Yang
2021/1130 (PDF ) A note on group membership tests for $\G_1$, $\G_2$ and $\G_T$ on BLS pairing-friendly curves Michael Scott
2021/1129 (PDF ) Beauty of Cryptography: the Cryptographic Sequences and the Golden Ratio Shenghui Su, Jianhua Zheng, Shuwang Lv
2021/1128 (PDF ) Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity Gianluca Brian, Antonio Faonio, Daniele Venturi
2021/1127 (PDF ) Bigdata-facilitated Two-party Authenticated Key Exchange for IoT Bowen Liu, Qiang Tang, Jianying Zhou
2021/1126 (PDF ) Turn-Based Communication Channels Carlo Brunetta, Mario Larangeira, Bei Liang, Aikaterini Mitrokotsa, Keisuke Tanaka
2021/1125 (PDF ) Towards Explaining Epsilon: A Worst-Case Study of Differential Privacy Risks Luise Mehner, Saskia Nuñez von Voigt, Florian Tschorsch
2021/1124 (PDF ) A Semi-Permanent Stuck-At Fault Analysis on AES Rijndael SBox Priyanka Joshi, Bodhisatwa Mazumdar
2021/1123 (PDF ) Oblivious RAM with Worst-Case Logarithmic Overhead Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi
2021/1122 (PDF ) And Paper-Based is Better? Towards Comparability of Classic and Cryptographic Voting Schemes Marc Nemes, Rebecca Schwerdt, Dirk Achenbach, Bernhard Löwe, Jörn Müller-Quade
2021/1121 (PDF ) Constant-Time Arithmetic for Safer Cryptography Lúcás Críostóir Meier, Simone Colombo, Marin Thiercelin, Bryan Ford
2021/1120 (PDF ) Simpira Gets Simpler: Optimized Simpira on Microcontrollers Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Gyeongju Song, Wai-Kong Lee, Hwajeong Seo
2021/1119 (PDF ) Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu
2021/1118 (PDF ) THC: Practical and Cost-Effective Verification of Delegated Computation Pablo Rauzy, Ali Nehme
2021/1117 (PDF ) All the Polynomial Multiplication You Need on RISC-V Hwajeong Seo, Hyeokdong Kwon, Siwoo Eum, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Minjoo Sim, Gyeongju Song, Wai-Kong Lee
2021/1116 (PDF ) Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, Michael Rosenberg
2021/1115 (PDF ) Evolving Secret Sharing Schemes Based on Polynomial Evaluations and Algebraic Geometry Codes Chaoping Xing, Chen Yuan
2021/1114 (PDF ) Remarks on MOBS and cryptosystems using semidirect products Chris Monico
2021/1113 (PDF ) On the Security of Doubly Efficient PIR Elette Boyle, Justin Holmgren, Fermi Ma, Mor Weiss
2021/1112 (PDF ) Key agreement: security / division Daniel R. L. Brown
2021/1111 (PDF ) A Low-Randomness Second-Order Masked AES Tim Beyne, Siemen Dhooghe, Adrián Ranea, Danilo Šijačić
2021/1110 (PDF ) Secure and Efficient Software Masking on Superscalar Pipelined Processors Barbara Gigerl, Robert Primas, Stefan Mangard
2021/1109 (PDF ) On Actively Secure Fine-grained Access Structures from Isogeny Assumptions Philipp Muth, Fabio Campos
2021/1108 (PDF ) Preservation of DNA Privacy During the Large Scale Detection of COVID Marcel Hollenstein, David Naccache, Peter B. Roenne, Peter Y A Ryan, Robert Weil, Ofer Yifrach-Stav
2021/1107 (PDF ) Multi-Leak Deep-Learning Side-Channel Analysis Fanliang Hu, Huanyu Wang, Junnian Wang
2021/1106 (PDF ) Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More Eric Brier, Rémi Géraud-Stewart, Marc Joye, David Naccache
2021/1105 (PDF ) Improved Linear Approximations of SNOW-V and SNOW-Vi Zhen Shi, Chenhui Jin, Yu Jin
2021/1104 (PDF ) New Cryptanalysis of ZUC-256 Initialization Using Modular Differences Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe
2021/1103 (PDF ) Exploring Differential-Based Distinguishers and Forgeries for ASCON David Gerault, Thomas Peyrin, Quan Quan Tan
2021/1101 (PDF ) Differential Privacy in Constant Function Market Makers Tarun Chitra, Guillermo Angeris, Alex Evans
2021/1100 (PDF ) REDsec: Running Encrypted Discretized Neural Networks in Seconds Lars Folkerts, Charles Gouert, Nektarios Georgios Tsoutsos
2021/1099 (PDF ) MILP modeling of Boolean functions by minimum number of inequalities Aleksei Udovenko
2021/1098 (PDF ) Individual Verifiability and Revoting in the Estonian Internet Voting System Olivier Pereira
2021/1096 (PDF ) Mt. Random: Multi-Tiered Randomness Beacons Ignacio Cascudo, Bernardo David, Omer Shlomovits, Denis Varlakov
2021/1095 (PDF ) Analyzing Masked Ciphers Against Transition and Coupling Effects Siemen Dhooghe
2021/1094 (PDF ) Resilient Uniformity: Applying Resiliency in Masking Siemen Dhooghe, Svetla Nikova
2021/1093 (PDF ) Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering Yilei Chen, Qipeng Liu, Mark Zhandry
2021/1092 (PDF ) SoK: Deep Learning-based Physical Side-channel Analysis Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina
2021/1091 (PDF ) No (Good) Loss no Gain: Systematic Evaluation of Loss functions in Deep Learning-based Side-channel Analysis Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
2021/1090 (PDF ) Towards Accountability in CRS Generation Prabhanjan Ananth, Gilad Asharov, Hila Dahari, Vipul Goyal
2021/1089 (PDF ) Threshold scheme to share a secret by means of sound ranging Sergij V. Goncharov
2021/1088 (PDF ) Studying Bitcoin privacy attacks and their Impact on Bitcoin-based Identity Methods Simin Ghesmati, Walid Fdhila, Edgar Weippl
2021/1087 (PDF ) Methods for Decentralized Identities: Evaluation and Insights Walid Fdhila, Nicholas Stifter, Kristian Kostal, Cihan Saglam, Markus Sabadello
2021/1086 (PDF ) How do the Arbiter PUFs Sample the Boolean Function Class? Animesh Roy, Dibyendu Roy, Subhamoy Maitra
2021/1085 (PDF ) Homomorphic Encryption for Multiple Users with Less Communications Jeongeun Park
2021/1084 (PDF ) Towards the Least Inequalities for Describing a Subset in $Z_2^n$ Yao Sun
2021/1083 (PDF ) Modular Design of Secure Group Messaging Protocols and the Security of MLS Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis
2021/1082 (PDF ) Some remarks on how to hash faster onto elliptic curves Dmitrii Koshelev
2021/1081 (PDF ) OnionPIR: Response Efficient Single-Server PIR Muhammad Haris Mughees, Hao Chen, Ling Ren
2021/1080 (PDF ) SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
2021/1079 (PDF ) The Exact Complexity of Pseudorandom Functions and Tight Barriers to Lower Bound Proofs Zhiyuan Fan, Jiatu Li, Tianqi Yang
2021/1078 (PDF ) Reflection, Rewinding, and Coin-Toss in EasyCrypt Denis Firsov, Dominique Unruh
2021/1077 (PDF ) MProve+ : Privacy Enhancing Proof of Reserves Protocol for Monero Arijit Dutta, Suyash Bagad, Saravanan Vijayakumaran
2021/1076 (PDF ) Hardness of KT Characterizes Parallel Cryptography Hanlin Ren, Rahul Santhanam
2021/1075 (PDF ) The security of the code-based signature scheme based on the Stern identification protocol Victoria Vysotskaya, Ivan Chizhov
2021/1074 (PDF ) UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
2021/1073 (PDF ) "Act natural!": Having a Private Chat on a Public Blockchain Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, Maciej Liskiewicz
2021/1072 (PDF ) Streaming SPHINCS+ for Embedded Devices using the Example of TPMs Ruben Niederhagen, Johannes Roth, Julian Wälde
2021/1071 (PDF ) Improved Verifiability for BeleniosVS Thomas Haines, Rajeev Gore
2021/1070 (PDF ) Onyx: New Encryption and Signature Schemes with Multivariate Public Key in Degree 3 Gilles Macario-Rat, Jacques Patarin
2021/1069 (PDF ) Djed: A Formally Verified Crypto-Backed Pegged Algorithmic Stablecoin Joachim Zahnentferner, Dmytro Kaidalov, Jean-Frédéric Etienne, Javier Díaz
2021/1068 (PDF ) A Simple Post-Quantum Non-Interactive Zero-Knowledge Proof from Garbled Circuits Hongrui Cui, Kaiyi Zhang
2021/1067 (PDF ) A Tale of Twin Primitives: Single-chip Solution for PUFs and TRNGs Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2021/1066 (PDF ) Taphonomical Security: (DNA) Information with Foreseeable Lifespan Fatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Roenne, Peter Y. A. Ryan, Julien Weibel, Robert Weil
2021/1065 (PDF ) Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol Gergei Bana, Marco Biroli, Megi Dervishi, Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, David Naccache, Peter B. Roenne, Peter Y. A. Ryan, Hugo Waltsburger
2021/1064 (PDF ) Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov
2021/1063 (PDF ) Cairo – a Turing-complete STARK-friendly CPU architecture Lior Goldberg, Shahar Papini, Michael Riabzev
2021/1062 (PDF ) On the Nonsingularity and Equivalence of NFSRs Yingyin Pan, Jianghua Zhong, Dongdai Lin
2021/1061 (PDF ) Edwards curves and FFT-based multiplication Pavel Atnashev, George Woltman
2021/1060 (PDF ) Discovering New $L$-Function Relations Using Algebraic Sieving Hadrien Barral, Éric Brier, Rémi Géraud-Stewart, Arthur Léonard, David Naccache, Quentin Vermande, Samuel Vivien
2021/1059 (PDF ) Revisiting cryptanalysis on ChaCha from Crypto 2020 and Eurocrypt 2021 Sabyasachi Dey, Chandan Dey, Santanu Sarkar, Willi Meier
2021/1058 (PDF ) Cryptanalysis of Caesar using Quantum Support Vector Machine Hyunji Kim, Gyeongju Song, Kyoungbae Jang, Hwajeong Seo
2021/1057 (PDF ) An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, Hui-Chun Huang
2021/1055 (PDF ) Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions François Garillot, Yashvanth Kondi, Payman Mohassel, Valeria Nikolaenko
2021/1054 (PDF ) One-time Traceable Ring Signatures Alessandra Scafuro, Bihan Zhang
2021/1053 (PDF ) XDIVINSA: eXtended DIVersifying INStruction Agent to Mitigate Power Side-Channel Leakage Thinh H. Pham, Ben Marshall, Alexander Fell, Siew-Kei Lam, Daniel Page
2021/1052 (PDF ) Comparing Lattice Families for Bounded Distance Decoding near Minkowski’s Bound. Oleksandra Lapiha
2021/1051 (PDF ) Collisions in Supersingular Isogeny Graphs and the SIDH-based Identification Protocol Wissam Ghantous, Shuichi Katsumata, Federico Pintore, Mattia Veroni
2021/1050 (PDF ) Privacy-Enhancing Group Signcryption Scheme Sara Ricci, Petr Dzurenda, Jan Hajny, Lukas Malina
2021/1049 (PDF ) Binary Search in Secure Computation Marina Blanton, Chen Yuan
2021/1048 (PDF ) Aggregating and thresholdizing hash-based signatures using STARKs Irakliy Khaburzaniya, Konstantinos Chalkias, Kevin Lewi, Harjasleen Malvai
2021/1047 (PDF ) A Correlation Attack on Full SNOW-V and SNOW-Vi Zhen Shi, Chenhui Jin, Jiyan Zhang, Ting Cui, Lin Ding, Yu Jin
2021/1046 (PDF ) On the modifier Q for multivariate signature schemes Yasufumi Hashimoto
2021/1045 (PDF ) An improvement of algorithms to solve under-defined systems of multivariate quadratic equations Yasufumi Hashimoto
2021/1044 (PDF ) On the security of Hufu-UOV Yasufumi Hashimoto
2021/1043 (PDF ) Brakedown: Linear-time and field-agnostic SNARKs for R1CS Alexander Golovnev, Jonathan Lee, Srinath Setty, Justin Thaler, Riad S. Wahby
2021/1042 (PDF ) Rate One-Third Non-malleable Codes Divesh Aggarwal, Sruthi Sekar, Bhavana Kanukurthi, Maciej Obremski, Sai Lakshmi Bhavana Obbattu
2021/1041 (PDF ) On the Multiplicative Complexity of Cubic Boolean Functions Meltem Sonmez Turan, Rene Peralta
2021/1040 (PDF ) MUSE: Secure Inference Resilient to Malicious Clients Ryan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, Raluca Ada Popa
2021/1039 (PDF ) Neyman’s Smoothness Test: a Trade-off between Moment-based and Distribution-based Leakage Detections Si Gao, Elisabeth Oswald, Yan Yan
2021/1038 (PDF ) Reinforced Concrete: A Fast Hash Function for Verifiable Computation Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
2021/1037 (PDF ) Randomness Bounds for Private Simultaneous Messages and Conditional Disclosure of Secrets Akinori Kawachi, Maki Yoshida
2021/1036 (PDF ) Lelantus-CLA Pyrros Chaidos, Vladislav Gelfer
2021/1035 (PDF ) SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
2021/1034 (PDF ) Optimal encodings to elliptic curves of $j$-invariants $0$, $1728$ Dmitrii Koshelev
2021/1033 (PDF ) Limits of Polynomial Packings for $\mathbb{Z}_{p^k}$ and $\mathbb{F}_{p^k}$ Jung Hee Cheon, Keewoo Lee
2021/1032 (PDF ) AdVeil: A Private Targeted Advertising Ecosystem Sacha Servan-Schreiber, Kyle Hogan, Srinivas Devadas
2021/1031 (PDF ) Commitment Schemes from Supersingular Elliptic Curve Isogeny Graphs Bruno Sterner
2021/1030 (PDF ) A lightweight ISE for ChaCha on RISC-V Ben Marshall, Daniel Page, Thinh Hung Pham
2021/1029 (PDF ) LOVE a pairing Diego F. Aranha, Elena Pagnin, Francisco Rodríguez-Henríquez
2021/1028 (PDF ) Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography Claude Carlet, Sylvain Guilley, Sihem Mesnager
2021/1027 (PDF ) On Fingerprinting Attacks and Length-Hiding Encryption Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten
2021/1025 (PDF ) Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings Daniel Escudero, Eduardo Soria-Vazquez
2021/1024 (PDF ) Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications Wai-Kong Lee, Kyungbae Jang, Gyeongju Song, Hyunji Kim, Seong Oun Hwang, Hwajeong Seo
2021/1023 (PDF ) SIDH Proof of Knowledge Luca De Feo, Samuel Dobson, Steven D. Galbraith, Lukas Zobernig
2021/1022 (PDF ) Zero-Knowledge Middleboxes Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish
2021/1021 (PDF ) Power-based Side Channel Attack Analysis on PQC Algorithms Tendayi Kamucheka, Michael Fahr, Tristen Teague, Alexander Nelson, David Andrews, Miaoqing Huang
2021/1020 (PDF ) Designing a Practical Code-based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup Shay Gueron, Edoardo Persichetti, Paolo Santini
2021/1019 (PDF ) Implementing and Measuring KEMTLS Sofía Celi, Armando Faz-Hernández, Nick Sullivan, Goutam Tamvada, Luke Valenta, Thom Wiggers, Bas Westerbaan, Christopher A. Wood
2021/1018 (PDF ) Obfustopia Built on Secret-Key Functional Encryption Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2021/1017 (PDF ) Improve Neural Distinguisher for Cryptanalysis Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
2021/1016 (PDF ) Quantum collision finding for homomorphic hash functions Juan Carlos Garcia-Escartin, Vicent Gimeno, Julio José Moyano-Fernández
2021/1015 (PDF ) Look-up the Rainbow: Efficient Table-based Parallel Implementation of Rainbow Signature on 64-bit ARMv8 Processors Hyeokdong Kwon, Hyunjun Kim, Minjoo Sim, Wai-Kong Lee, Hwajeong Seo
2021/1014 (PDF ) SoC Security Properties and Rules Nusrat Farzana Dipu, Farimah Farahmandi, Mark Tehranipoor
2021/1013 (PDF ) Iterative Oblivious Pseudo-Random Functions and Applications Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry
2021/1012 (PDF ) A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification Quoc Huy Do, Pedram Hosseyni, Ralf Kuesters, Guido Schmitz, Nils Wenzler, Tim Wuertele
2021/1011 (PDF ) A Fast and Flexible Multi-Client Functional Encryption for Set Intersection Mojtaba Rafiee
2021/1010 (PDF ) Circuit friendly, post-quantum dynamic accumulators from RingSIS with logarithmic prover time Endre (Silur) Abraham
2021/1009 (PDF ) Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
2021/1008 (PDF ) Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2021/1007 (PDF ) Provably Solving the Hidden Subset Sum Problem via Statistical Learning Jean-Sebastien Coron, Agnese Gini
2021/1006 (PDF ) UOV-Pepper: New Public Key Short Signature in Degree 3 Gilles Macario-Rat, Jacques Patarin
2021/1005 (PDF ) On the Construction and Cryptanalysis of Multi-Ciphers Arush Chhatrapati
2021/1004 (PDF ) Towards Attack Resilient Arbiter PUF-Based Strong PUFs Nils Wisiol
2021/1003 (PDF ) SCA-secure ECC in software – mission impossible? Lejla Batina, Łukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe
2021/1002 (PDF ) Online Linear Extractors for Independent Sources Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie
2021/1001 (PDF ) Classical Binding for Quantum Commitments Nir Bitansky, Zvika Brakerski
2021/1000 (PDF ) A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model Masayuki Fukumitsu, Shingo Hasegawa
2021/999 (PDF ) NTRU Fatigue: How Stretched is Overstretched? Léo Ducas, Wessel van Woerden
2021/998 (PDF ) Polynomial multiplication on embedded vector architectures Hanno Becker, Jose Maria Bermudo Mera, Angshuman Karmakar, Joseph Yiu, Ingrid Verbauwhede
2021/997 (PDF ) Higher-Order Lookup Table Masking in Essentially Constant Memory Annapurna Valiveti, Srinivas Vivek
2021/996 (PDF ) Kadcast-NG: A Structured Broadcast Protocol for Blockchain Networks Elias Rohrer, Florian Tschorsch
2021/995 (PDF ) Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4 Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang
2021/994 (PDF ) BKW Meets Fourier: New Algorithms for LPN with Sparse Parities Dana Dachman-Soled, Huijing Gong, Hunter Kippen, Aria Shahverdi
2021/993 (PDF ) FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority Ye Dong, Xiaojun Chen, Kaiyun Li, Dakui Wang, Shuai Zeng
2021/992 (PDF ) Faster Public-key Compression of SIDH with Less Memory Kaizhan Lin, Jianming Lin, Weize Wang, Chang-An Zhao
2021/991 (PDF ) Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong
2021/990 (PDF ) Secret Keys in Genus-2 SIDH Sabrina Kunzweiler, Yan Bo Ti, Charlotte Weitkämper
2021/989 (PDF ) Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism Jia Xu, Yiwen Gao, Hoon Wei Lim, Hongbing Wang, Ee-Chien Chang
2021/988 (PDF ) Concurrent Signatures from a Variety of Keys George Teseleanu
2021/987 (PDF ) A Formal Security Analysis of Session Resumption Across Hostnames Kai Gellert, Tobias Handirk
2021/986 (PDF ) Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1 Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang, Shang-Yi Yang
2021/985 (PDF ) PUF Security: Reviewing The Validity of Spoofing Attack Against Safe is the New Smart Karim Lounis
2021/984 (PDF ) On the Use of the Legendre Symbol in Symmetric Cipher Design Alan Szepieniec
2021/983 (PDF ) A Cryptographic Hash Function from Markoff Triples Elena Fuchs, Kristin Lauter, Matthew Litman, Austin Tran
2021/982 (PDF ) Quantum Implementation and Resource Estimates for RECTANGLE and KNOT Anubhab Baksi, Kyungbae Jang, Gyeongju Song, Hwajeong Seo, Zejun Xiang
2021/981 (PDF ) Deep Learning-based Side-channel Analysis against AES Inner Rounds Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek
2021/980 (PDF ) Binary Field Montgomery Multiplication on Quantum Computers Kyoungbae Jang, Gyeong Ju Song, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
2021/979 (PDF ) Constant-Overhead Zero-Knowledge for RAM Programs Nicholas Franzese, Jonathan Katz, Steve Lu, Rafail Ostrovsky, Xiao Wang, Chenkai Weng
2021/978 (PDF ) Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications Donghang Lu, Albert Yu, Aniket Kate, Hemanta Maji
2021/977 (PDF ) Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices Yuval Ishai, Hang Su, David J. Wu
2021/976 (PDF ) Reinventing BrED: A Practical Construction Formal Treatment of Broadcast Encryption with Dealership Avishek Majumder, Sayantan Mukherjee
2021/975 (PDF ) Bridges connecting Encryption Schemes Mugurel Barcau, Cristian Lupascu, Vicentiu Pasol, George C. Turcas
2021/974 (PDF ) Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds Yi-Fan Tseng, Chun-I Fan, Zi-Cheng Liu
2021/973 (PDF ) A Multiplatform Parallel Approach for Lattice Sieving Algorithms Michał Andrzejczak, Kris Gaj
2021/972 (PDF ) Partial Key Exposure Attack on Short Secret Exponent CRT-RSA Alexander May, Julian Nowakowski, Santanu Sarkar
2021/971 (PDF ) Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\Sigma$-Protocols Lior Rotem, Gil Segev
2021/970 (PDF ) Short Identity-Based Signatures with Tight Security from Lattices Jiaxin Pan, Benedikt Wagner
2021/969 (PDF ) Influence of a Set of Variables on a Boolean Function Aniruddha Biswas, Palash Sarkar
2021/968 (PDF ) Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers? Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Şahin, Muhammed Said Gündoğan
2021/967 (PDF ) Assessment of Quantum Threat To Bitcoin and Derived Cryptocurrencies Stephen Holmes, Liqun Chen
2021/966 (PDF ) Soteria: Preserving Privacy in Distributed Machine Learning Cláudia Brito, Pedro Ferreira, Bernardo Portela, Rui Oliveira, João Paulo
2021/965 (PDF ) Automatic Search for Bit-based Division Property Shibam Ghosh, Orr Dunkelman
2021/964 (PDF ) Secure Quantum Computation with Classical Communication James Bartusek
2021/963 (PDF ) Post-Quantum Key-Blinding for Authentication in Anonymity Networks Edward Eaton, Douglas Stebila, Roy Stracovsky
2021/962 (PDF ) Practically Solving LPN Thom Wiggers, Simona Samardjiska
2021/961 (PDF ) Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes Jan Bobolz, Fabian Eidens, Raphael Heitjohann, Jeremy Fell
2021/960 (PDF ) The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh
2021/959 (PDF ) The Best of Two Worlds: Deep Learning-assisted Template Attack Lichao Wu, Guilherme Perin, Stjepan Picek
2021/958 (PDF ) When the Decoder Has to Look Twice: Glitching a PUF Error Correction Jonas Ruchti, Michael Gruber, Michael Pehl
2021/957 (PDF ) Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer Arpita Patra, Akshayaram Srinivasan
2021/956 (PDF ) Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal
2021/955 (PDF ) Higher-degree supersingular group actions Mathilde Chenu, Benjamin Smith
2021/954 (PDF ) Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms Jose Maria Bermudo Mera, Angshuman Karmakar, Suparna Kundu, Ingrid Verbauwhede
2021/953 (PDF ) State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption Keita Emura, Ryoma Ito, Sachiko Kanamori, Ryo Nojima, Yohei Watanabe
2021/952 (PDF ) On the Evaluation of Deep Learning-based Side-channel Analysis Lichao Wu, Guilherme Perin, Stjepan Picek
2021/951 (PDF ) Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software? Melissa Azouaoui, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert
2021/950 (PDF ) Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying Sébastien Duval, Pierrick Méaux, Charles Momin, François-Xavier Standaert
2021/949 (PDF ) A High-Speed Architecture for the Reduction in VDF Based on a Class Group Yifeng Song, Danyang Zhu, Jing Tian, Zhongfeng Wang
2021/948 (PDF ) How to Make a Secure Index for Searchable Symmetric Encryption, Revisited Yohei Watanabe, Takeshi Nakai, Kazuma Ohara, Takuya Nojima, Yexuan Liu, Mitsugu Iwamoto, Kazuo Ohta
2021/947 (PDF ) Autocorrelations of vectorial Boolean functions Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer
2021/946 (PDF ) Hidden Cosets and Applications to Unclonable Cryptography Andrea Coladangelo, Jiahui Liu, Qipeng Liu, Mark Zhandry
2021/945 (PDF ) Limits on the Adaptive Security of Yao's Garbling Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Daniel Wichs
2021/944 (PDF ) Systematic Side-channel Analysis of Curve25519 with Machine Learning Léo Weissbart, Łukasz Chmielewski, Stjepan Picek, Lejla Batina
2021/943 (PDF ) Breaking the Circuit-Size Barrier for Secure Computation under Quasi-Polynomial LPN Geoffroy Couteau, Pierre Meyer
2021/942 (PDF ) Compact Ring Signatures from Learning With Errors Rohit Chatterjee, Sanjam Garg, Mohammad Hajiabadi, Dakshita Khurana, Xiao Liang, Giulio Malavolta, Omkant Pandey, Sina Shiehian
2021/941 (PDF ) Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme Maamar Ouladj, Sylvain Guilley, Philippe Guillot, Farid Mokrane
2021/940 (PDF ) SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user's secret data Ripon Patgiri, Malaya Dutta Borah, Laiphrakpam Dolendro Singh
2021/939 (PDF ) OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning Jiacheng Liang, Songze Li, Wensi Jiang, Bochuan Cao, Chaoyang He
2021/938 (PDF ) Plactic signatures (insecure?) Daniel R. L. Brown
2021/937 (PDF ) Storing data that is updated regularly on a client machine securely Artem Los
2021/936 (PDF ) FIVER -- Robust Verification of Countermeasures against Fault Injections Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu
2021/935 (PDF ) ROTed: Random Oblivious Transfer for embedded devices Pedro Branco, Luís Fiolhais, Manuel Goulão, Paulo Martins, Paulo Mateus, Leonel Sousa
2021/934 (PDF ) ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines Diego F. Aranha, Emil Madsen Bennedsen, Matteo Campanelli, Chaya Ganesh, Claudio Orlandi, Akira Takahashi
2021/933 (PDF ) Fast Factoring Integers by SVP Algorithms, corrected Claus Peter Schnorr
2021/932 (PDF ) Succinct Functional Commitment for a Large Class of Arithmetic Circuits Helger Lipmaa, Kateryna Pavlyk
2021/931 (PDF ) Practical Key Recovery Attacks on FlexAEAD Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger
2021/930 (PDF ) Darlin: Recursive Proofs using Marlin Ulrich Haböck, Alberto Garoffolo, Daniele Di Benedetto
2021/929 (PDF ) A polynomial time key-recovery attack on the Sidon cryptosystem Pierre Briaud, Jean-Pierre Tillich, Javier Verbel
2021/928 (PDF ) Necessary and Sufficient Conditions for Galois NFSRs Conditionally Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium Jianghua Zhong, Yingyin Pan, Wenhui Kong, Dongdai Lin
2021/927 (PDF ) A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs Shuichi Katsumata
2021/926 (PDF ) On Treewidth, Separators and Yao's Garbling Chethan Kamath, Karen Klein, Krzysztof Pietrzak
2021/925 (PDF ) Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
2021/924 (PDF ) On Removing Rejection Conditions in Practical Lattice-Based Signatures Rouzbeh Behnia, Yilei Chen, Daniel Masny
2021/923 (PDF ) On the (in)security of ElGamal in OpenPGP Luca De Feo, Bertram Poettering, Alessandro Sorniotti
2021/920 (PDF ) Non-malleable Commitments against Quantum Attacks Nir Bitansky, Huijia Lin, Omri Shmueli
2021/919 (PDF ) The supersingular isogeny path and endomorphism ring problems are equivalent Benjamin Wesolowski
2021/918 (PDF ) The Round Complexity of Quantum Zero-Knowledge Orestis Chardouvelis, Giulio Malavolta
2021/917 (PDF ) CODBS: A cascading oblivious search protocol optimized for real-world relational database indexes Rogério Pontes, Bernardo Portela, Manuel Barbosa, Ricardo Vilaça
2021/916 (PDF ) Mithril: Stake-based Threshold Multisignatures Pyrros Chaidos, Aggelos Kiayias
2021/915 (PDF ) A PCP Theorem for Interactive Proofs and Applications Gal Arnon, Alessandro Chiesa, Eylon Yogev
2021/914 (PDF ) Principal Component Analysis using CKKS Homomorphic Encryption Scheme Samanvaya Panda
2021/913 (PDF ) Practical complexities of probabilistic algorithms for solving Boolean polynomial systems Stefano Barbero, Emanuele Bellini, Carlo Sanna, Javier Verbel
2021/912 (PDF ) FO derandomization sometimes damages security Daniel J. Bernstein
2021/911 (PDF ) SoK: Understanding BFT Consensus in the Age of Blockchains Gang Wang
2021/910 (PDF ) SECDSA: Mobile signing and authentication under classical ``sole control'' Eric Verheul
2021/909 (PDF ) Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks – A Case Study on Public-Key Algorithms – Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2021/908 (PDF ) Selection of sampling keys for cryptographic tests George Marinakis
2021/907 (PDF ) zkKYC: A solution concept for KYC without knowing your customer, leveraging self-sovereign identity and zero-knowledge proofs Pieter Pauwels
2021/906 (PDF ) Two Public-Key Cryptosystems Based on Expanded Gabidulin Codes Wenshuo Guo, Fang-Wei Fu
2021/905 (PDF ) A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek
2021/904 (PDF ) Spatial Dependency Analysis to Extract Information from Side-Channel Mixtures Aurélien Vasselle, Hugues Thiebeauld, Philippe Maurine
2021/903 (PDF ) Nowhere to Leak: Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting (Extended Version) Alexandros Bakas, Antonis Michalas
2021/902 (PDF ) Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis Kalle Ngo, Elena Dubrova, Thomas Johansson
2021/901 (PDF ) Resolvable Block Designs in Construction of Approximate Real MUBs that are Sparse Ajeet Kumar, Subhamoy Maitra
2021/900 (PDF ) ANS-based Compression and Encryption with 128-bit Security Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk
2021/899 (PDF ) Homomorphic decryption in blockchains via compressed discrete-log lookup tables Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko
2021/898 (PDF ) On Extremal Expanding Algebraic Graphs and post-quantum secure delivery of passwords, encryption maps and tools for multivariate digital signatures. Vasyl Ustimenko
2021/897 (PDF ) A Rational Protocol Treatment of 51% Attacks Christian Badertscher, Yun Lu, Vassilis Zikas
2021/896 (PDF ) Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise" Danilo Gligoroski
2021/895 (PDF ) Targeted Lossy Functions and Applications Willy Quach, Brent Waters, Daniel Wichs
2021/894 (PDF ) History of Cryptographic Key Sizes Nigel P. Smart, Emmanuel Thome
2021/893 (PDF ) DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
2021/892 (PDF ) Low-Latency Keccak at any Arbitrary Order Sara Zarei, Aein Rezaei Shahmirzadi, Hadi Soleimany, Raziye Salarifard, Amir Moradi
2021/891 (PDF ) White Box Traitor Tracing Mark Zhandry
2021/890 (PDF ) On One-way Functions and Sparse Languages Yanyi Liu, Rafael Pass
2021/889 (PDF ) Counterexamples to New Circular Security Assumptions Underlying iO Sam Hopkins, Aayush Jain, Huijia Lin
2021/888 (PDF ) Lifting Standard Model Reductions to Common Setup Assumptions Ngoc Khanh Nguyen, Eftychios Theodorakis, Bogdan Warinschi
2021/886 (PDF ) Computational Records with Aging Hardware: Controlling Half the Output of SHA-256 Mellila Bouam, Charles Bouillaguet, Claire Delaplace, Camille Noûs
2021/885 (PDF ) MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha
2021/884 (PDF ) Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and Simulations Elias Rohrer, Florian Tschorsch
2021/883 (PDF ) Oblivious Key-Value Stores and Amplification for Private Set Intersection Gayathri Garimella, Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
2021/882 (PDF ) Computational Hardness of Optimal FairComputation: Beyond Minicrypt Hemanta K. Maji, Mingyuan Wang
2021/881 (PDF ) Secure Code-Based Key Encapsulation Mechanism with Short Ciphertext and Secret Key Jayashree Dey, Ratna Dutta
2021/880 (PDF ) Towards Tight Random Probing Security Gaëtan Cassiers, Sebastian Faust, Maximilian Orlt, François-Xavier Standaert
2021/879 (PDF ) Rethinking Searchable Symmetric Encryption Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis
2021/878 (PDF ) Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attacks Yuan Yao, Pantea Kiaei, Richa Singh, Shahin Tajik, Patrick Schaumont
2021/877 (PDF ) A Fully Anonymous e-Voting Protocol Employing Universal zk-SNARKs and Smart Contracts Aritra Banerjee
2021/876 (PDF ) Code Constructions and Bounds for Identification via Channels Onur Gunlu, Joerg Kliewer, Rafael F. Schaefer, Vladimir Sidorenko
2021/875 (PDF ) Hybrid Signal protocol for post-quantum email encryption Sara Stadler, Vitor Sakaguti, Harjot Kaur, Anna Lena Fehlhaber
2021/874 (PDF ) Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction Bo-Yeon Sim, Aesun Park, Dong-Guk Han
2021/873 (PDF ) KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk
2021/872 (PDF ) W-OTS(+) up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets David Chaum, Mario Larangeira, Mario Yaksetig, William Carter
2021/871 (PDF ) Traceable Secret Sharing and Applications Vipul Goyal, Yifan Song, Akshayaram Srinivasan
2021/870 (PDF ) SoK: Gröbner Basis Algorithms for Arithmetization Oriented Ciphers Jan Ferdinand Sauer, Alan Szepieniec
2021/869 (PDF ) MiniLedger: Compact-sized Anonymous and Auditable Distributed Payments Panagiotis Chatzigiannis, Foteini Baldimtsi
2021/868 (PDF ) Low-Latency Hardware Masking of PRINCE Nicolai Müller, Thorben Moos, Amir Moradi
2021/867 (PDF ) Key-Policy ABE with Switchable Attributes Cécile Delerablée, Lénaïck Gouriou, David Pointcheval
2021/866 (PDF ) The One-More Discrete Logarithm Assumption in the Generic Group Model Balthazar Bauer, Georg Fuchsbauer, Antoine Plouviez
2021/865 (PDF ) Quantum Key Search for Ternary LWE Iggy van Hoof, Elena Kirshanova, Alexander May
2021/864 (PDF ) A Fast and Simple Partially Oblivious PRF, with Applications Nirvan Tyagi, Sofı́a Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, Christopher A. Wood
2021/863 (PDF ) Authenticated Key Exchange and Signatures with Tight Security in the Standard Model Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge
2021/862 (PDF ) Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung
2021/861 (PDF ) Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors Janaka Alawatugoda, Tatsuaki Okamoto
2021/860 (PDF ) Verification of the security in Boolean masked circuits Vahid Jahandideh
2021/859 (PDF ) Concrete Evaluation of the Random Probing Security Vahid Jahandideh
2021/858 (PDF ) Full key recovery side-channel attack against ephemeral SIKE on the Cortex-M4 Aymeric Genêt, Natacha Linard de Guertechin, Novak Kaluđerović
2021/857 (PDF ) Secure Computation for G-Module and its Applications Qizhi Zhang, Bingsheng Zhang, Lichun Li, Shan Yin, Juanjuan Sun
2021/856 (PDF ) Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang
2021/855 (PDF ) Breaking and Fixing Virtual Channels: Domino Attack and Donner Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
2021/854 (PDF ) PQC: R-Propping of a Simple Oblivious Transfer Pedro Hecht
2021/853 (PDF ) Private Signaling Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov
2021/852 (PDF ) Improved Structured Encryption for SQL Databases via Hybrid Indexing David Cash, Ruth Ng, Adam Rivkin
2021/851 (PDF ) Amun: Securing E-Voting Against Over-the-Shoulder Coercion Riccardo Longo, Chiara Spadafora
2021/850 (PDF ) Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack Élise Tasso, Luca De Feo, Nadia El Mrabet, Simon Pontié
2021/849 (PDF ) Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma
2021/848 (PDF ) Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE Shweta Agrawal, Monosij Maitra, Narasimha Sai Vempati, Shota Yamada
2021/847 (PDF ) Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption Rachit Garg, Rishab Goyal, George Lu, Brent Waters
2021/846 (PDF ) Ergo Hackathon: Crowdfunded Smart Contract Pools Research and Conceptualization Bronson Brooks Richard, Gary Waugh
2021/845 (PDF ) An Intermediate Secret-Guessing Attack on Hash-Based Signatures Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini
2021/844 (PDF ) A note on IND-qCCA security in the ROM and its applications: CPA security is sufficient for TLS 1.3 Loïs Huguenin-Dumittan, Serge Vaudenay
2021/843 (PDF ) Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions Brandon Broadnax, Jeremias Mechler, Jörn Müller-Quade
2021/842 (PDF ) PCPs and Instance Compression from a Cryptographic Lens Liron Bronfman, Ron D. Rothblum
2021/841 (PDF ) MPC for $Q_2$ Access Structures over Rings and Fields Robin Jadoul, Nigel P. Smart, Barry Van Leeuwen
2021/840 (PDF ) Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates Keita Xagawa, Akira Ito, Rei Ueno, Junko Takahashi, Naofumi Homma
2021/839 (PDF ) Prudent Practices in Security Standardization Feng Hao
2021/838 (PDF ) Anonymous and Distributed Authentication for Peer-to-Peer Networks Pasan Tennakoon, Supipi Karunathilaka, Rishikeshan Lavakumar, Janaka Alawatugoda
2021/837 (PDF ) On McEliece type cryptosystems using self-dual codes with large minimum weight Luca Mariot, Stjepan Picek, Radinka Yorgova
2021/836 (PDF ) Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs Xiao Liang, Omkant Pandey
2021/835 (PDF ) Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy Sen Yuan, Milan Shen, Ilya Mironov, Anderson C. A. Nascimento
2021/834 (PDF ) Unconditional Communication-Efficient MPC via Hall's Marriage Theorem Vipul Goyal, Antigoni Polychroniadou, Yifan Song
2021/833 (PDF ) ATLAS: Efficient and Scalable MPC in the Honest Majority Setting Vipul Goyal, Hanjun Li, Rafail Ostrovsky, Antigoni Polychroniadou, Yifan Song
2021/832 (PDF ) Progressive And Efficient Verification For Digital Signatures Cecilia Boschini, Dario Fiore, Elena Pagnin
2021/831 (PDF ) Private Remote Sources for Secure Multi-Function Computation Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
2021/830 (PDF ) Analysis and Protection of the Two-metric Helper Data Scheme Lars Tebelmann, Ulrich Kühne, Jean-Luc Danger, Michael Pehl
2021/829 (PDF ) Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers Christof Beierle, Tim Beyne, Patrick Felke, Gregor Leander
2021/828 (PDF ) Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom
2021/827 (PDF ) TransNet: Shift Invariant Transformer Network for Side Channel Analysis Suvadeep Hajra, Sayandeep Saha, Manaar Alam, Debdeep Mukhopadhyay
2021/826 (PDF ) OpenSSLNTRU: Faster post-quantum TLS key exchange Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri
2021/825 (PDF ) Balancing Quality and Efficiency in Private Clustering with Affinity Propagation Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame
2021/824 (PDF ) Security Characterization of J-PAKE and its Variants Michel Abdalla, Manuel Barbosa, Peter B. Rønne, Peter Y. A. Ryan, Petra Šala
2021/823 (PDF ) GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider
2021/822 (PDF ) One-out-of-$q$ OT Combiners Oriol Farràs, Jordi Ribes-González
2021/821 (PDF ) On the hardness of the NTRU problem Alice Pellet-Mary, Damien Stehlé
2021/820 (PDF ) Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent Marek Broll, Federico Canale, Nicolas David, Antonio Florez-Gutierrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo
2021/819 (PDF ) Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes
2021/818 (PDF ) CTng: Secure Certificate and Revocation Transparency Jie Kong, Damon James, Hemi Leibowitz, Ewa Syta, Amir Herzberg
2021/817 (PDF ) Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace Olivier Bronchain, Gaëtan Cassiers, François-Xavier Standaert
2021/816 (PDF ) Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns Alexandra Boldyreva, Tianxin Tang
2021/815 (PDF ) Linear Cryptanalysis of FF3-1 and FEA Tim Beyne
2021/814 (PDF ) A New Way to Achieve Round-Efficient Byzantine Agreement Matthias Fitzi, Chen-Da Liu-Zhang, Julian Loss
2021/813 (PDF ) Intelligent Composed Algorithms Frank Byszio, Dr. Klaus-Dieter Wirth, Dr. Kim Nguyen
2021/812 (PDF ) TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing Elena Pagnin, Gunnar Gunnarsson, Pedram Talebi, Claudio Orlandi, Andrei Sabelfeld
2021/811 (PDF ) A General Purpose Transpiler for Fully Homomorphic Encryption Shruthi Gorantala, Rob Springer, Sean Purser-Haskell, William Lam, Royce Wilson, Asra Ali, Eric P. Astor, Itai Zukerman, Sam Ruth, Christoph Dibak, Phillipp Schoppmann, Sasha Kulankhina, Alain Forget, David Marn, Cameron Tew, Rafael Misoczki, Bernat Guillen, Xinyu Ye, Dennis Kraft, Damien Desfontaines, Aishe Krishnamurthy, Miguel Guevara, Irippuge Milinda Perera, Yurii Sushko, Bryant Gipson
2021/810 (PDF ) Efficient Asynchronous Byzantine Agreement without Private Setups Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2021/809 (PDF ) SoK: Efficient Privacy-preserving Clustering Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame
2021/808 (PDF ) SNARGs for $\mathcal{P}$ from LWE Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin
2021/807 (PDF ) Non-Interactive Batch Arguments for NP from Standard Assumptions Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin
2021/806 (PDF ) Boosting the Security of Blind Signature Schemes Jonathan Katz, Julian Loss, Michael Rosenberg
2021/805 (PDF ) Practical Settlement Bounds for Proof-of-Work Blockchains Peter Gaži, Ling Ren, Alexander Russell
2021/804 (PDF ) A Note on ``Reduction Modulo $2^{448}-2^{224}-1$'' Timothy Shelton
2021/803 (PDF ) On the Privacy of Protocols based on CPA-Secure Homomorphic Encryption Adi Akavia, Margarita Vald
2021/802 (PDF ) On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing Divesh Aggarwal, Eldon Chung, Maciej Obremski, João Ribeiro
2021/801 (PDF ) Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes Mohammad Hassan Ameri, Alexander R. Block, Jeremiah Blocki
2021/800 (PDF ) i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains? Leemon Baird, Pratyay Mukherjee, Rohit Sinha
2021/799 (PDF ) Lattice Attacks on NTRU and LWE: A History of Refinements Martin Albrecht, Léo Ducas
2021/798 (PDF ) Probabilistic Dynamic Input Output Automata (Extended Version) Pierre Civit, Maria Potop-Butucaru
2021/797 (PDF ) LLVM-based Circuit Compilation for Practical Secure Computation Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert, Hossein Yalame
2021/796 (PDF ) How Byzantine is a Send Corruption? Karim Eldefrawy, Julian Loss, Ben Terner
2021/795 (PDF ) Transforming Secure Comparison Protocol from Passive to Active Adversary Model Wei Jiang
2021/794 (PDF ) Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor Si Gao, Elisabeth Oswald, Dan Page
2021/793 (PDF ) Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
2021/792 (PDF ) Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation Madhurima Mukhopadhyay, Palash Sarkar
2021/791 (PDF ) Open Sesame: A Novel Non-SAT-Attack against CAS-Lock Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2021/790 (PDF ) A Side-Channel Assisted Attack on NTRU Amund Askeland, Sondre Rønjom
2021/789 (PDF ) P2DPI: Practical and Privacy-Preserving Deep Packet Inspection Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal
2021/788 (PDF ) Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs Yael Tauman Kalai, Vinod Vaikuntanathan, Rachel Yun Zhang
2021/787 (PDF ) Mobile Voting -- Still Too Risky? Sven Heiberg, Kristjan Krips, Jan Willemson
2021/786 (PDF ) Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy Yongjun Zhao, Huaxiong Wang, Kwok-Yan Lam
2021/785 (PDF ) Lower bounds on lattice sieving and information set decoding Elena Kirshanova, Thijs Laarhoven
2021/784 (PDF ) Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols Ignacio Fernández-Hernández, Tomer Ashur, Vincent Rijmen
2021/783 (PDF ) Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network Joon-Woo Lee, HyungChul Kang, Yongwoo Lee, Woosuk Choi, Jieun Eom, Maxim Deryabin, Eunsang Lee, Junghyun Lee, Donghoon Yoo, Young-Sik Kim, Jong-Seon No
2021/782 (PDF ) On the deployment of FlyClient as a velvet fork: chain-sewing attacks and countermeasures Tristan Nemoz, Alexei Zamyatin
2021/781 (PDF ) Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices Gustavo Banegas, Koen Zandberg, Adrian Herrmann, Emmanuel Baccelli, Benjamin Smith
2021/780 (PDF ) Netlist Decompilation Workflow for Recovered Design Verification, Validation, and Assurance Katie Liszewski, Tim McDonley, Josh Delozier, Andrew Elliott, Dylan Jones, Matt Sutter, Adam Kimura
2021/779 (PDF ) More efficient post-quantum KEMTLS with pre-distributed public keys Peter Schwabe, Douglas Stebila, Thom Wiggers
2021/778 (PDF ) Efficient secret key reusing attribute-based encryption from lattices Xinyuan Qian, Wenyuan Wu
2021/777 (PDF ) Asynchronous Data Dissemination and its Applications Sourav Das, Zhuolun Xiang, Ling Ren
2021/776 (PDF ) SoK: Applying Blockchain Technology in Industrial Internet of Things Gang Wang
2021/775 (PDF ) Completeness Theorems for Adaptively Secure Broadcast Ran Cohen, Juan Garay, Vassilis Zikas
2021/774 (PDF ) On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model Akinori Hosoyamada, Tetsu Iwata
2021/773 (PDF ) HEX-BLOOM: An Efficient Method for Authenticity and Integrity Verification in Privacy-preserving Computing Ripon Patgiri, Malaya Dutta Borah
2021/772 (PDF ) Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks Emre Karabulut, Aydin Aysu
2021/771 (PDF ) Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning Jinhyun So, Ramy E. Ali, Basak Guler, Jiantao Jiao, Salman Avestimehr
2021/770 (PDF ) Multi-key Private Matching for Compute Prasad Buddhavarapu, Benjamin M Case, Logan Gore, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Min Xue
2021/769 (PDF ) Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, Douglas Stebila
2021/768 (PDF ) Privacy-Preserving Decision Trees Training and Prediction Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald
2021/767 (PDF ) White-box cryptography with global device binding from message-recoverable signatures and token-based obfuscation Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven Watson
2021/766 (PDF ) Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum John Andrews, Michele Ciampi, Vassilis Zikas
2021/765 (PDF ) Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption Ghous Amjad, Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
2021/764 (PDF ) Covert Learning: How to Learn with an Untrusted Intermediary Ran Canetti, Ari Karchmer
2021/763 (PDF ) Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation Mathy Vanhoef
2021/762 (PDF ) A wide class of Boolean functions generalizing the hidden weight bit function Claude Carlet
2021/761 (PDF ) Parameterization of Boolean functions by vectorial functions and associated constructions Claude Carlet
2021/760 (PDF ) Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition Saravanan Vijayakumaran
2021/759 (PDF ) Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, Ion Stoica
2021/758 (PDF ) Quantum cryptography based on an algorithm for determining simultaneously all the mappings of a Boolean function Koji Nagata, Renata Wong, Do Ngoc Diep, Tadao Nakamura
2021/757 (PDF ) On the Dual of Generalized Bent Functions Jiaxin Wang, Fang-Wei Fu
2021/756 (PDF ) A Novel Completeness Test and its Application to Side Channel Attacks and Simulators Si Gao, Elisabeth Oswald
2021/755 (PDF ) Tetrad: Actively Secure 4PC for Secure Training and Inference Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh
2021/754 (PDF ) Privacy-Preserving Training of Tree Ensembles over Continuous Data Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen
2021/753 (PDF ) Anonymous Device Authorization for Cellular Networks Abida Haque, Varun Madathil, Bradley Reaves, Alessandra Scafuro
2021/752 (PDF ) Quantum Reduction of Finding Short Code Vectors to the Decoding Problem Thomas Debris-Alazard, Maxime Remaud, Jean-Pierre Tillich
2021/751 (PDF ) Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida
2021/750 (PDF ) Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and $\mathbb{Z}_{2^k}$ Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Benoit Razet, Peter Scholl
2021/749 (PDF ) Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits Mike Rosulek, Lawrence Roy
2021/748 (PDF ) A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss Ke Wu, Gilad Asharov, Elaine Shi
2021/747 (PDF ) Elmo: Recursive Virtual Payment Channels for Bitcoin Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos
2021/746 (PDF ) What is All the FaaS About? - Remote Exploitation of FPGA-as-a-Service Platforms Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2021/745 (PDF ) Generic-Group Identity-Based Encryption: A Tight Impossibility Result Gili Schul-Ganz, Gil Segev
2021/743 (PDF ) Manta: a Plug and Play Private DeFi Stack Shumo Chu, Yu Xia, Zhenfei Zhang
2021/742 (PDF ) Conclave: A Collective Stake Pool Protocol Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira
2021/740 (PDF ) The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application Keita Xagawa
2021/739 (PDF ) A New Approach to Garbled Circuits Anasuya Acharya, Tomer Ashur, Efrat Cohen, Carmit Hazay, Avishay Yanai
2021/738 (PDF ) On the Impossibility of Purely Algebraic Signatures Nico Döttling, Dominik Hartmann, Dennis Hofheinz, Eike Kiltz, Sven Schäge, Bogdan Ursu
2021/737 (PDF ) GIFT-COFB is Tightly Birthday Secure with Encryption Queries Akiko Inoue, Kazuhiko Minematsu
2021/736 (PDF ) Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Takahiro Matsuda, Ibuki Mishina, Hiraku Morita, Jacob C. N. Schuldt
2021/735 (PDF ) Side-Channel Protections for Picnic Signatures Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, Greg Zaverucha
2021/734 (PDF ) Guarding the First Order: The Rise of AES Maskings Amund Askeland, Siemen Dhooghe, Svetla Nikova, Vincent Rijmen, Zhenda Zhang
2021/733 (PDF ) GenoPPML – a framework for genomic privacy-preserving machine learning Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
2021/732 (PDF ) Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang
2021/731 (PDF ) Pasta: A Case for Hybrid Homomorphic Encryption Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch
2021/730 (PDF ) Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, Xiao Wang
2021/729 (PDF ) Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for TFHE Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
2021/728 (PDF ) Laconic Private Set Intersection and Applications Navid Alamati, Pedro Branco, Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Sihang Pu
2021/727 (PDF ) SoK: Privacy-Preserving Computing in the Blockchain Era Ghada Almashaqbeh, Ravital Solomon
2021/726 (PDF ) Asymmetric All-or-nothing Transforms Navid Nasr Esfahani, Douglas R. Stinson
2021/725 (PDF ) KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip Felix Günther, Simon Rastikian, Patrick Towa, Thom Wiggers
2021/724 (PDF ) Tri-op redactable blockchains with block modification, removal, and insertion Mohammad Sadeq Dousti, Alptekin Küpçü
2021/723 (PDF ) Cache attack on MISTY1 Haopeng Fan, Wenhao Wang, Yongjuan Wang, Wenyu Zhang, Qingjun Yuan
2021/722 (PDF ) Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption Yusaku Maeda, Koji Nuida
2021/721 (PDF ) Index Calculus Attacks on Hyperelliptic Jacobians with Effective Endomorphisms Sulamithe Tsakou, Sorina Ionica
2021/720 (PDF ) On Reverse Engineering Neural Network Implementation on GPU Łukasz Chmielewski, Léo Weissbart
2021/719 (PDF ) Enhancing Differential-Neural Cryptanalysis Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu
2021/718 (PDF ) Will You Cross the Threshold for Me? - Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy
2021/717 (PDF ) Ablation Analysis for Multi-device Deep Learning-based Physical Side-channel Analysis Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek
2021/716 (PDF ) SSE and SSD: Page-Efficient Searchable Symmetric Encryption Angèle Bossuat, Raphael Bost, Pierre-Alain Fouque, Brice Minaud, Michael Reichle
2021/715 (PDF ) Hours of Horus: Keyless Cryptocurrency Wallets Dionysis Zindros
2021/714 (PDF ) CARiMoL: A Configurable Hardware Accelerator for Ringand Module Lattice-Based Post-Quantum Cryptography Afifa Ishtiaq, Dr. Muhammad Shafique, Dr. Osman Hassan
2021/713 (PDF ) Public Key Encryption with Flexible Pattern Matching Élie Bouscatié, Guilhem Castagnos, Olivier Sanders
2021/712 (PDF ) DEFAULT: Cipher Level Resistance Against Differential Fault Attack Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim
2021/711 (PDF ) The Matrix Reloaded: Multiplication Strategies in FrodoKEM Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider, Christine van Vredendaal
2021/710 (PDF ) VOProof: Efficient zkSNARKs from Vector Oracle Compilers Yuncong Zhang, Alan Szepieniec, Ren Zhang, Shi-Feng Sun, Geng Wang, Dawu Gu
2021/709 (PDF ) Bounded Collusion ABE for TMs from IBE Rishab Goyal, Ridwan Syed, Brent Waters
2021/708 (PDF ) Anonymous, Robust Post-Quantum Public Key Encryption Paul Grubbs, Varun Maram, Kenneth G. Paterson
2021/707 (PDF ) Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot
2021/706 (PDF ) Cryptanalysis of an oblivious PRF from supersingular isogenies Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso
2021/705 (PDF ) Bridging Machine Learning and Cryptanalysis via EDLCT Yi Chen, Hongbo Yu
2021/704 (PDF ) IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status Elli Androulaki, Ilie Circiumaru, Jesus Diaz Vico, Miguel Prada, Alessandro Sorniotti, Marc Stoecklin, Marko Vukolic, Marie Wallace
2021/703 (PDF ) Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham
2021/702 (PDF ) Symmetric Key Exchange with Full Forward Security and Robust Synchronization Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord
2021/701 (PDF ) Multidimentional ModDiv public key exchange protocol Samir Bouftass
2021/700 (PDF ) DeCSIDH: Delegating isogeny computations in the CSIDH setting Robi Pedersen
2021/699 (PDF ) Radical Isogenies on Montgomery Curves Hiroshi Onuki, Tomoki Moriya
2021/698 (PDF ) Multi-Dimensional Sub/Super-Range Signatures Masahito Ishizaka, Shinsaku Kiyomoto
2021/697 (PDF ) GoAT: File Geolocation via Anchor Timestamping Deepak Maram, Iddo Bentov, Mahimna Kelkar, Ari Juels
2021/696 (PDF ) The "quantum annoying" property of password-authenticated key exchange protocols Edward Eaton, Douglas Stebila
2021/695 (PDF ) Adaptively Secure Lattice-based Revocable IBE in the QROM: Compact Parameters, Tight Security, and Anonymity Atsushi Takayasu
2021/694 (PDF ) On Interactive Oracle Proofs for Boolean R1CS Statements Ignacio Cascudo, Emanuele Giunta
2021/693 (PDF ) Hardware Penetration Testing Knocks Your SoCs Off Mark Fischer, Fabian Langer, Johannes Mono, Clemens Nasenberg, Nils Albartus
2021/692 (PDF ) Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha
2021/691 (PDF ) General Bootstrapping Approach for RLWE-based Homomorphic Encryption Andrey Kim, Maxim Deryabin, Jieun Eom, Rakyong Choi, Yongwoo Lee, Whan Ghang, Donghoon Yoo
2021/690 (PDF ) On Communication Models and Best-Achievable Security in Two-Round MPC Aarushi Goel, Abhishek Jain, Manoj Prabhakaran, Rajeev Raghunath
2021/689 (PDF ) OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm Ripon Patgiri
2021/688 (PDF ) Statistical ZAPs from Group-Based Assumptions Geoffroy Couteau, Shuichi Katsumata, Elahe Sadeghi, Bogdan Ursu
2021/687 (PDF ) Towards Understanding Practical Randomness Beyond Noise: Differential Privacy and Mixup Hanshen Xiao, Srinivas Devadas
2021/686 (PDF ) Meteor: Cryptographically Secure Steganography for Realistic Distributions Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel Rubin
2021/685 (PDF ) Blind Side-Channel SIFA Melissa Azouaoui, Kostas Papagiannopoulos, Dominik Zürner
2021/684 (PDF ) Tight Setup Bounds for Identifiable Abort Nicholas Brandt
2021/683 (PDF ) S2Dedup: SGX-enabled Secure Deduplication Tânia Esteves, Mariana Miranda, João Paulo, Bernardo Portela
2021/682 (PDF ) Batching Base Oblivious Transfers Ian McQuoid, Mike Rosulek, Lawrence Roy
2021/681 (PDF ) Learnability of Multiplexer PUF and $S_N$-PUF : A Fourier-based Approach Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2021/679 (PDF ) Permutation Based EDM: An Inverse Free BBB Secure PRF Avijit Dutta, Mridul Nandi, Suprita Talnikar
2021/678 (PDF ) Faster indifferentiable hashing to elliptic $\mathbb{F}_{\!q^2}$-curves Dmitrii Koshelev
2021/677 (PDF ) Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes Paul Cotan, George Teseleanu
2021/676 (PDF ) Extending the GLS endomorphism to speed up GHS Weil descent using Magma Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez, Benjamin Smith
2021/675 (PDF ) 3-round Feistel is Not Superpseudorandom Over Any Group Hector B. Hougaard
2021/674 (PDF ) On the Effect of the Key-expansion Algorithm in Simon-like Ciphers Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li
2021/673 (PDF ) zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy Tianyi Liu, Xiang Xie, Yupeng Zhang
2021/672 (PDF ) PQC: R-Propping a Chaotic Cellular Automata Pedro Hecht
2021/671 (PDF ) Multi-Threshold Byzantine Fault Tolerance Atsuki Momose, Ling Ren
2021/670 (PDF ) AOT: Anonymization by Oblivious Transfer Farid Javani, Alan T. Sherman
2021/669 (PDF ) Pravuil: Global Consensus for a United World David Cerezo Sánchez
2021/668 (PDF ) Grover on SM3 Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
2021/667 (PDF ) Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors Hyeokdong Kwon, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
2021/666 (PDF ) Secure cloud-of-clouds storage with space-efficient secret sharing Ahad Niknia, Miguel Correia, Jaber Karimpour
2021/665 (PDF ) On the algebraic immunity of direct sum constructions Pierrick Méaux
2021/664 (PDF ) A Trustless GQ Multi-Signature Scheme with Identifiable Abort Handong Cui, Tsz Hon Yuen
2021/663 (PDF ) On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier
2021/662 (PDF ) Verifying Post-Quantum Signatures in 8 kB of RAM Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang
2021/661 (PDF ) Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives Ling Sun, Wei Wang, Meiqin Wang
2021/660 (PDF ) Best-Possible Unpredictable Proof-of-Stake: An Impossibility and a Practical Design Lei Fan, Jonathan Katz, Zhenghao Lu, Phuc Thai, Hong-Sheng Zhou
2021/659 (PDF ) Technical report: CoPHEE: Co-processor forPartially Homomorphic Encrypted Execution Mohammed Nabeel, Mohammed Ashraf, Eduardo Chielle, Nektarios G. Tsoutsos, Michail Maniatakos
2021/658 (PDF ) A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum
2021/657 (PDF ) Locally Reconstructable Non-malleable Secret Sharing Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Jenit Tomy
2021/656 (PDF ) Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu
2021/655 (PDF ) On the Effect of Projection on Rank Attacks in Multivariate Cryptography Morten Øygarden, Daniel Smith-Tone, Javier Verbel
2021/654 (PDF ) Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa
2021/653 (PDF ) Smooth Zero-Knowledge Hash Functions Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Helger Lipmaa
2021/652 (PDF ) Detector+: An Approach for Detecting, Isolating, and Preventing Timing Attacks Arsalan Javeed, Cemal Yilmaz, Erkay Savas
2021/651 (PDF ) Leo: A Programming Language for Formally Verified, Zero-Knowledge Applications Collin Chin, Howard Wu, Raymond Chu, Alessandro Coglio, Eric McCarthy, Eric Smith
2021/650 (PDF ) Structured Leakage and Applications to Cryptographic Constant-Time and Cost Gilles Barthe, Benjamin Gregoire, Vincent Laporte, Swarn Priya
2021/649 (PDF ) On the Algebraic Immunity - Resiliency trade-off, implications for Goldreich's Pseudorandom Generator Aurélien Dupin, Pierrick Méaux, Mélissa Rossi
2021/648 (PDF ) Security of COFB against Chosen Ciphertext Attacks Mustafa Khairallah
2021/647 (PDF ) privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm Ripon Patgiri
2021/646 (PDF ) Optimization of Advanced Encryption Standard on Graphics Processing Units Cihangir Tezcan
2021/645 (PDF ) Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing Alexander May, Floyd Zweydinger
2021/644 (PDF ) Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti
2021/643 (PDF ) On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers Muhammad ElSheikh, Amr M. Youssef
2021/642 (PDF ) On the Cryptographic Deniability of the Signal Protocol Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk
2021/641 (PDF ) Hydra: Succinct Fully Pipelineable Interactive Arguments of Knowledge William Zhang, Yu Xia
2021/640 (PDF ) Security and Trust in Open Source Security Tokens Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl
2021/639 (PDF ) Indifferentiable Signatures: High Performance and Fallback Security Charalampos Papamanthou, Cong Zhang, Hong-Sheng Zhou
2021/638 (PDF ) Efficient Constructions of Pairing Based Accumulators Ioanna Karantaidou, Foteini Baldimtsi
2021/637 (PDF ) Doubly-Affine Extractors, and their Applications Yevgeniy Dodis, Kevin Yeo
2021/636 (PDF ) Communication Complexity of Private simultaneous Quantum Messages Protocols Akinori Kawachi, Harumichi Nishimura
2021/635 (PDF ) symKrypt: A General-purpose and Lightweight Symmetric-Key Cryptography Ripon Patgiri
2021/634 (PDF ) Setting Up Efficient TFHE Parameters for Multivalue Plaintexts and Multiple Additions Jakub Klemsa
2021/633 (PDF ) CTIDH: faster constant-time CSIDH Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková
2021/632 (PDF ) Internet Computer Consensus Jan Camenisch, Manu Drijvers, Timo Hanke, Yvonne-Anne Pignolet, Victor Shoup, Dominic Williams
2021/631 (PDF ) SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges Felix Engelmann, Lukas Müller, Andreas Peter, Frank Kargl, Christoph Bösch
2021/630 (PDF ) Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
2021/629 (PDF ) SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Mixing Techniques Simin Ghesmati, Walid Fdhila, Edgar Weippl
2021/628 (PDF ) The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets Joachim Neu, Ertem Nusret Tas, David Tse
2021/627 (PDF ) VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries Nirvan Tyagi, Ben Fisch, Andrew Zitek-Estrada, Joseph Bonneau, Stefano Tessaro
2021/626 (PDF ) Help, my Signal has bad Device! Breaking the Signal Messenger’s Post-CompromiseSecurity through a Malicious Device Jan Wichelmann, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth
2021/625 (PDF ) Plactic key agreement (insecure?) Daniel R. L. Brown
2021/624 (PDF ) Group Structure in Correlations and its Applications in Cryptography Guru-Vamsi Policharla, Manoj Prabhakaran, Rajeev Raghunath, Parjanya Vyas
2021/623 (PDF ) Mining in Logarithmic Space Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
2021/622 (PDF ) Stealth: A Highly Secured End-to-End Symmetric Communication Protocol Ripon Patgiri, Naresh Babu Muppalaneni
2021/621 (PDF ) R-SWAP: Relay based atomic cross-chain swap protocol Léonard Lys, Arthur Micoulet, Maria Potop-Butucaru
2021/620 (PDF ) Algebraic attacks on block ciphers using quantum annealing Elżbieta Burek, Michał Misztal, Michał Wroński
2021/619 (PDF ) Polar Coding for Ring-LWE-Based Public Key Encryption Jiabo Wang, Cong Ling
2021/618 (PDF ) Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai
2021/617 (PDF ) Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2021/616 (PDF ) An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest
2021/615 (PDF ) A Tutorial on Concurrent Zero Knowledge Rafael Pass
2021/614 (PDF ) Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit Rafael Pass
2021/613 (PDF ) Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu
2021/612 (PDF ) Privacy-preserving Density-based Clustering Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider
2021/611 (PDF ) Some Applications of Hamming Weight Correlations Fatih Balli, Andrea Caforio, Subhadeep Banik
2021/610 (PDF ) A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems Alexander Nilsson, Irina E. Bocharova, Boris D. Kudryashov, Thomas Johansson
2021/609 (PDF ) FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky, Vassilis Zikas
2021/608 (PDF ) Layering diverse cryptography to lower risks of future and secret attacks: post-quantum estimates Daniel R. L. Brown
2021/607 (PDF ) Signed (Group) Diffie-Hellman Key Exchange with Tight Security Jiaxin Pan, Chen Qian, Magnus Ringerud
2021/606 (PDF ) ZK-PCPs from Leakage-Resilient Secret Sharing Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2021/605 (PDF ) On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs Benny Applebaum, Eyal Golombek
2021/604 (PDF ) Masked Triples: Amortizing Multiplication Triples across Conditionals David Heath, Vladimir Kolesnikov, Stanislav Peceny
2021/603 (PDF ) Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults Justin Kim, Vandan Mehta, Kartik Nayak, Nibesh Shrestha
2021/602 (PDF ) Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
2021/601 (PDF ) The Art of Labeling: Task Augmentation for Private(Collaborative) Learning on Transformed Data Hanshen Xiao, Srinivas Devadas
2021/600 (PDF ) Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group Christian Porter, Andrew Mendelsohn, Cong Ling
2021/599 (PDF ) Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang
2021/598 (PDF ) Proof of Assets in the Diem Blockchain Panagiotis Chatzigiannis, Konstantinos Chalkias
2021/597 (PDF ) Accelerated RISC-V for Post-Quantum SIKE Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2021/596 (PDF ) Mutual Accountability Layer: Accountable Anonymity within Accountable Trust Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico
2021/595 (PDF ) Securing Parallel-chain Protocols under Variable Mining Power Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath
2021/594 (PDF ) Zero Knowledge Contingent Payments for Trained Neural Networks Zhelei Zhou, Xinlei Cao, Jian Liu, Bingsheng Zhang, Kui Ren
2021/593 (PDF ) Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms Shumo Chu, Danyang Zhuo, Elaine Shi, T-H. Hubert Chan
2021/592 (PDF ) Side Channel Analysis against the ANSSI’s protected AES implementation on ARM Loïc Masure, Rémi Strullu
2021/591 (PDF ) Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs! Jan Peter Drees, Pritha Gupta, Eyke Hüllermeier, Tibor Jager, Alexander Konze, Claudia Priesterjahn, Arunselvan Ramaswamy, Juraj Somorovsky
2021/590 (PDF ) An Algebraic Framework for Universal and Updatable SNARKs Carla Ràfols, Arantxa Zapico
2021/589 (PDF ) White-Box Encryption Scheme Using a Quantum Memory Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo
2021/588 (PDF ) A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose Thomas Haines, Johannes Mueller
2021/587 (PDF ) PrORAM: Fast $O(\log n)$ Private Coin ZK ORAM David Heath, Vladimir Kolesnikov
2021/586 (PDF ) A New Approach for finding Low-Weight Polynomial Multiples Laila El Aimani
2021/585 (PDF ) Exact Lattice Sampling from Non-Gaussian Distributions Maxime Plançon, Thomas Prest
2021/584 (PDF ) Effects of Quantization on the Multiple-Round Secret-Key Capacity Onur Gunlu, Ueli Maurer, Joao Ribeiro
2021/583 (PDF ) Entropoids: Groups in Disguise Lorenz Panny
2021/582 (PDF ) ethSTARK Documentation Eli Ben-Sasson
2021/581 (PDF ) Breaking CAS-Lock and Its Variants by Exploiting Structural Traces Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu
2021/580 (PDF ) Lightweight, Maliciously Secure Verifiable Function Secret Sharing Leo de Castro, Antigoni Polychroniadou
2021/579 (PDF ) Quantum Key-length Extension Joseph Jaeger, Fang Song, Stefano Tessaro
2021/578 (PDF ) Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2) Itai Dinur
2021/577 (PDF ) Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks Dionysis Zindros
2021/576 (PDF ) Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares Surya Addanki, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky, Antigoni Polychroniadou
2021/575 (PDF ) Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu
2021/574 (PDF ) Constructing More Quadratic APN Functions with the QAM Method Yuyin Yu, Leo Perrin
2021/573 (PDF ) Compactness of Hashing Modes and Efficiency beyond Merkle Tree Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy
2021/572 (PDF ) Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE Charanjit Singh Jutla, Nathan Manohar
2021/571 (PDF ) Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond Thomas Attema, Nicole Gervasoni, Michiel Marcus, Gabriele Spini
2021/570 (PDF ) Lattice sieving via quantum random walks André Chailloux, Johanna Loyer
2021/569 (PDF ) Automated Generation of Masked Hardware David Knichel, Amir Moradi, Nicolai Müller, Pascal Sasdrich
2021/568 (PDF ) ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra
2021/567 (PDF ) Forward-secure Multi-user Aggregate Signatures based on zk-SNARKs Jeonghyuk Lee, Jihye Kim, Hyunok Oh
2021/566 (PDF ) From Random Oracles to Ideal Signatures, and Back Cong Zhang, Hong-Sheng Zhou
2021/565 (PDF ) The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving Cyprien Delpech de Saint Guilhem, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy
2021/564 (PDF ) SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2021/563 (PDF ) High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2021/562 (PDF ) A fusion algorithm for solving the hidden shift problem in finite abelian groups Wouter Castryck, Ann Dooms, Carlo Emerencia, Alexander Lemmens
2021/561 (PDF ) Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors Pakize Sanal, Emrah Karagoz, Hwajeong Seo, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2021/560 (PDF ) MOBS (Matrices Over Bit Strings) public key exchange Nael Rahman, Vladimir Shpilrain
2021/559 (PDF ) A Fresh Approach to Updatable Symmetric Encryption Andrés Fabrega, Ueli Maurer, Marta Mularczyk
2021/558 (PDF ) Verifiable Decryption in the Head Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter Rønne, Tjerand Silde
2021/557 (PDF ) Dual lattice attacks for closest vector problems (with preprocessing) Thijs Laarhoven, Michael Walter
2021/556 (PDF ) Interactive Physical ZKP for Connectivity:Applications to Nurikabe and Hitori Leo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuk
2021/555 (PDF ) Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited Nils Wisiol, Bipana Thapaliya, Khalid T. Mursi, Jean-Pierre Seifert, Yu Zhuang
2021/554 (PDF ) Grover on Caesar and Vigenère Ciphers Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo
2021/553 (PDF ) PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
2021/552 (PDF ) Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric André Chailloux, Thomas Debris-Alazard, Simona Etinski
2021/551 (PDF ) Efficient Sorting of Homomorphic Encrypted Data with $k$-way Sorting Network Seungwan Hong, Seunghong Kim, Jiheon Choi, Younho Lee, Jung Hee Cheon
2021/550 (PDF ) Quadratic almost bent functions - their partial characterization and design in the spectral domain Amar Bapić, Samir Hodžić, Enes Pasalic
2021/549 (PDF ) High-assurance field inversion for curve-based cryptography Benjamin Salling Hvass, Diego F. Aranha, Bas Spitters
2021/548 (PDF ) Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper) Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
2021/547 (PDF ) Cube Attack against 843-Round Trivium Yao Sun
2021/546 (PDF ) Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V and SNOW-Vi Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto
2021/545 (PDF ) MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao
2021/544 (PDF ) Improved guess-and-determine and distinguishing attacks on SNOW-V Jing Yang, Thomas Johansson, Alexander Maximov
2021/543 (PDF ) The Case for SIKE: A Decade of the Supersingular Isogeny Problem Craig Costello
2021/542 (PDF ) Symetric encryption algorithms based on the mathematical structure underlying the three body problem Samir Bouftass.
2021/541 (PDF ) Hardware Deployment of Hybrid PQC Reza Azarderakhsh, Rami El Khatib, Brian Koziel, Brandon Langenberg
2021/540 (PDF ) Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments Geoffroy Couteau, Michael Klooß, Huang Lin, Michael Reichle
2021/539 (PDF ) More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions Atsushi Takayasu
2021/538 (PDF ) A Composable Look at Updatable Encryption Françoise Levy-dit-Vehel, Maxime Roméas
2021/537 (PDF ) SoK: Exploring Blockchains Interoperability Gang Wang
2021/535 (PDF ) On the Possibility of Basing Cryptography on $\EXP \neq \BPP$ Yanyi Liu, Rafael Pass
2021/534 (PDF ) Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes Maura B. Paterson, Douglas R. Stinson
2021/533 (PDF ) CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU Sijun Tan, Brian Knott, Yuan Tian, David J. Wu
2021/532 (PDF ) Rainbow on Cortex-M4 Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang
2021/531 (PDF ) LogStack: Stacked Garbling with $O(b \log b)$ Computation David Heath, Vladimir Kolesnikov
2021/530 (PDF ) Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level Yuan Yao, Tuna Tufan, Tarun Kathuria, Baris Ege, Ulkuhan Guler, Patrick Schaumont
2021/529 (PDF ) SnarkPack: Practical SNARK Aggregation Nicolas Gailly, Mary Maller, Anca Nitulescu
2021/528 (PDF ) Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping Denis Firsov, Henri Lakk, Ahto Truu
2021/527 (PDF ) Practical solving of discrete logarithm problem over prime fields using quantum annealing Michał Wroński
2021/526 (PDF ) Reinforcement Learning-based Design of Side-channel Countermeasures Jorai Rijsdijk, Lichao Wu, Guilherme Perin
2021/525 (PDF ) On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis Lichao Wu, Guilherme Perin
2021/524 (PDF ) Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency Kwangsu Lee
2021/523 (PDF ) No Time to Hash: On Super Efficient Entropy Accumulation Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie
2021/522 (PDF ) Public-key Cryptosystems and Signature Schemes from p-adic Lattices Yingpu Deng, Lixia Luo, Yanbin Pan, Zhaonan Wang, Guanju Xiao
2021/521 (PDF ) Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert
2021/520 (PDF ) Optimal Randomized Partial Checking for Decryption Mix Nets Thomas Haines, Johannes Mueller
2021/519 (PDF ) Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment Atakan Arslan, Muhammed Ali Bingöl
2021/518 (PDF ) How to Share and Own a Secret Victor Ermolaev, Gamze Tillem
2021/517 (PDF ) Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity Yanyi Liu, Rafael Pass
2021/515 (PDF ) Generic Constructions of Revocable Hierarchical Identity-based Encryption Keita Emura, Atsushi Takayasu, Yohei Watanabe
2021/514 (PDF ) Non-Interactive Zero Knowledge from Sub-exponential DDH Abhishek Jain, Zhengzhong Jin
2021/513 (PDF ) On One-way Functions from NP-Complete Problems Yanyi Liu, Rafael Pass
2021/512 (PDF ) Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF Tapas Pal, Ratna Dutta
2021/511 (PDF ) What Makes Fiat--Shamir zkSNARKs (Updatable SRS) Simulation Extractable? Chaya Ganesh, Hamidreza Khoshakhlagh, Markulf Kohlweiss, Anca Nitulescu, Michal Zajac
2021/510 (PDF ) Signer and Message Ambiguity from a Variety of Keys George Teseleanu
2021/509 (PDF ) On using the same key pair for Ed25519 and an X25519 based KEM Erik Thormarker
2021/508 (PDF ) Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, Younho Lee
2021/507 (PDF ) The t-wise Independence of Substitution-Permutation Networks Tianren Liu, Stefano Tessaro, Vinod Vaikuntanathan
2021/506 (PDF ) Delegating Supersingular Isogenies over $\mathbb{F}_{p^2}$ with Cryptographic Applications Robi Pedersen, Osmanbey Uzunkol
2021/505 (PDF ) Cryptanalysis of Boyen’s Attribute-Based Encryption Scheme in TCC 2013 Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, Shota Yamada
2021/504 (PDF ) A Generic Method for Investigating Nonsingular Galois NFSRs Xiao-Juan Wang, Tian Tian, Wen-Feng Qi
2021/503 (PDF ) Almost-Asynchronous MPC under Honest Majority, Revisited Matthieu Rambaud, Antoine Urban
2021/502 (PDF ) A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption Kwangsu Lee, Joon Sik Kim
2021/501 (PDF ) zkHawk: Practical Private Smart Contracts from MPC-based Hawk Aritra Banerjee, Michael Clear, Hitesh Tewari
2021/500 (PDF ) Order-C Secure Multiparty Computation for Highly Repetitive Circuits Gabrielle Beck, Aarushi Goel, Abhishek Jain, Gabriel Kaptchuk
2021/499 (PDF ) Optimizing Registration Based Encryption Kelong Cong, Karim Eldefrawy, Nigel P. Smart
2021/498 (PDF ) SoK: Multi-Device Secure Instant Messaging Antonio Dimeo, Felix Gohla, Daniel Goßen, Niko Lockenvitz
2021/497 (PDF ) SoK: Design Tools for Side-Channel-Aware Implementations IR Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont
2021/496 (PDF ) Applications of SKREM-like symmetric key ciphers Mircea Digulescu
2021/495 (PDF ) Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One-Way Functions Mircea Digulescu
2021/494 (PDF ) Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures. Surbhi Shaw, Ratna Dutta
2021/493 (PDF ) Optimizing BIKE for the Intel Haswell and ARM Cortex-M4 Ming-Shing Chen, Tung Chou, Markus Krausz
2021/492 (PDF ) Classic McEliece on the ARM Cortex-M4 Ming-Shing Chen, Tung Chou
2021/491 (PDF ) A toolbox for verifiable tally-hiding e-voting systems Véronique Cortier, Pierrick Gaudry, Quentin Yang
2021/490 (PDF ) Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE Chao Liu, Anyu Wang, Zhongxiang Zheng
2021/488 (PDF ) Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle Javier Herranz, Ramiro Martínez, Manuel Sánchez
2021/487 (PDF ) Xifrat Cryptanalysis - Compute the Mixing Function Without the Key "Danny" Niu Jianfang
2021/486 (PDF ) Security Analysis of End-to-End Encryption for Zoom Meetings Takanori Isobe, Ryoma Ito
2021/485 (PDF ) A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme Ferhat Yaman, Ahmet Can Mert, Erdinç Öztürk, Erkay Savaş
2021/484 (PDF ) Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF Alireza Kavousi, Javad Mohajeri, Mahmoud Salmasizadeh
2021/483 (PDF ) Masking Kyber: First- and Higher-Order Implementations Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal
2021/482 (PDF ) Inconsistency of Simulation and Practice in Delay-based Strong PUFs Anita Aghaie, Amir Moradi
2021/481 (PDF ) PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
2021/480 (PDF ) Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform Jakub Klemsa
2021/479 (PDF ) Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl
2021/478 (PDF ) TurboIKOS: Improved Non-interactive Zero Knowledge and Post-Quantum Signatures Yaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang, Xinyuan Zhang
2021/477 (PDF ) Exploiting ROLLO's Constant-Time Implementations with a Single-Trace Analysis Agathe Cheriere, Lina Mortajine, Tania Richmond, Nadia El Mrabet
2021/476 (PDF ) Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions Aaqib Bashir Dar, Mashhood Jeelani Lone, Nuzhat Hussain
2021/475 (PDF ) Private Liquidity Matching using MPC Shahla Atapoor, Nigel P. Smart, Younes Talibi Alaoui
2021/474 (PDF ) Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe
2021/473 (PDF ) Cryptonomial: A Framework for Private Time-Series Polynomial Calculations Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung
2021/472 (PDF ) CryptoGram: Fast Private Calculations of Histograms over Multiple Users’ Inputs Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung
2021/471 (PDF ) Size, Speed, and Security: An Ed25519 Case Study Cesar Pereida García, Sampo Sovio
2021/470 (PDF ) Upslices, Downslices, and Secret-Sharing with Complexity of $1.5^n$ Benny Applebaum, Oded Nir
2021/469 (PDF ) Entropoid Based Cryptography Danilo Gligoroski
2021/468 (PDF ) Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report) Coşku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi
2021/467 (PDF ) Key-schedule Security for the TLS 1.3 Standard Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss
2021/465 (PDF ) Cryptanalysis of `MAKE' Daniel Brown, Neal Koblitz, Jason LeGrow
2021/464 (PDF ) iTimed: Cache Attacks on the Apple A10 Fusion SoC Gregor Haas, Seetal Potluri, Aydin Aysu
2021/463 (PDF ) Improving Recent Side-Channel Attacks Against the DES Key Schedule Andreas Wiemers, Johannes Mittmann
2021/462 (PDF ) SoK: How (not) to Design and Implement Post-Quantum Cryptography James Howe, Thomas Prest, Daniel Apon
2021/461 (PDF ) Second-Order SCA Security with almost no Fresh Randomness Aein Rezaei Shahmirzadi, Amir Moradi
2021/460 (PDF ) Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi
2021/459 (PDF ) SIRNN: A Math Library for Secure RNN Inference Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi
2021/458 (PDF ) FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm Gideon Samid
2021/457 (PDF ) Non-Interactive Composition of Sigma-Protocols via Share-then-Hash Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
2021/456 (PDF ) Hardening Circuit-Design IP Against Reverse-Engineering Attacks Animesh Chhotaray, Thomas Shrimpton
2021/455 (PDF ) Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe
2021/454 (PDF ) Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security Veronika Kuchta, Amin Sakzad, Damien Stehle, Ron Steinfeld, Shi-Feng Sun
2021/453 (PDF ) Merkle^2: A Low-Latency Transparency Log System Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, Raluca Ada Popa
2021/451 (PDF ) RepShard: Reputation-based Sharding Scheme Achieves Linearly Scaling Efficiency and Security Simultaneously Gang Wang
2021/450 (PDF ) RandChain: Practical Scalable Decentralized Randomness Attested by Blockchain Gang Wang, Mark Nixon
2021/449 (PDF ) Towards Cloud-assisted Industrial IoT Platform for Large-scale Continuous Condition Monitoring Gang Wang, Mark Nixon, Mike Boudreaux
2021/448 (PDF ) On the Memory-Tightness of Hashed ElGamal Ashrujit Ghoshal, Stefano Tessaro
2021/447 (PDF ) Explicit, Closed-form, General bounds for Cuckoo Hashing with a Stash Daniel Noble
2021/446 (PDF ) Towards practical GGM-based PRF from (Module-)Learning-with-Rounding Chitchanok Chuengsatiansup, Damien Stehle
2021/445 (PDF ) A Survey on Perfectly-Secure Verifiable Secret-Sharing Anirudh Chandramouli, Ashish Choudhury, Arpita Patra
2021/444 (PDF ) Xifrat - Compact Public-Key Cryptosystems based on Quasigroups Daniel Nager, "Danny" Niu Jianfang
2021/443 (PDF ) Constructing a pairing-free certificateless proxy signature scheme from ECDSA Cholun Kim
2021/442 (PDF ) How to Backdoor a Cipher Raluca Posteuca, Tomer Ashur
2021/441 (PDF ) Watermarking PRFs from Lattices: Public Extract and Collusion Resistant Yukun Wang, Mingqiang Wang
2021/440 (PDF ) Two modifications for Loidreau's code-based cryptosystem Wenshuo Guo, Fangwei Fu
2021/439 (PDF ) Recovering the Key from the Internal State of Grain-128AEAD Donghoon Chang, Meltem Sonmez Turan
2021/438 (PDF ) More Efficient Shuffle Argument from Unique Factorization Toomas Krips, Helger Lipmaa
2021/437 (PDF ) Formal security analysis of MPC-in-the-head zero-knowledge protocols Nikolaj Sidorenco, Sabine Oechsner, Bas Spitters
2021/436 (PDF ) Algebraic Differential Fault Analysis on SIMON block cipher Duc-Phong Le, Sze Ling Yeo, Khoongming Khoo
2021/435 (PDF ) Non-Interactive Anonymous Router Elaine Shi, Ke Wu
2021/434 (PDF ) On the Power of Expansion: More Efficient Constructions in the Random Probing Model Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb
2021/432 (PDF ) XORBoost: Tree Boosting in the Multiparty Computation Setting Kevin Deforth, Marc Desgroseilliers, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Marius Vuille
2021/431 (PDF ) Unbounded Multi-Party Computation from Learning with Errors Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
2021/430 (PDF ) Lattice Enumeration on GPUs for fplll Simon Pohmann, Marc Stevens, Jens Zumbrägel
2021/429 (PDF ) New Practical Multivariate Signatures from a Nonlinear Modifier Daniel Smith-Tone
2021/428 (PDF ) A Coq proof of the correctness of X25519 in TweetNaCl Peter Schwabe, Benoît Viguier, Timmy Weerwag, Freek Wiedijk
2021/427 (PDF ) Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu
2021/426 (PDF ) Generic Plaintext Equality and Inequality Proofs (Extended Version) Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Octavio Perez Kempner
2021/425 (PDF ) Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions Yuqing Zhao, Wenqi Yu, Chun Guo
2021/424 (PDF ) Security Analysis of SFrame Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu
2021/423 (PDF ) On effective computations in special subsemigroups of polynomial transformations and protocol based multivariate cryptosystems Vasyl Ustimenko
2021/422 (PDF ) Stacking Sigmas: A Framework to Compose $\Sigma$-Protocols for Disjunctions Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk
2021/421 (PDF ) Indistinguishability Obfuscation of Null Quantum Circuits and Applications James Bartusek, Giulio Malavolta
2021/420 (PDF ) Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52 Fabian Boemer, Sejun Kim, Gelila Seifu, Fillipe D. M. de Souza, Vinodh Gopal
2021/418 (PDF ) Ring-LWE over two-to-power cyclotomics is not hard Hao Chen
2021/417 (PDF ) History Binding Signature Shlomi Dolev, Matan Liber
2021/416 (PDF ) Cryptocurrencies with Security Policies and Two-Factor Authentication Florian Breuer, Vipul Goyal, Giulio Malavolta
2021/415 (PDF ) Efficient Verification of Optimized Code: Correct High-speed X25519 Marc Schoolderman, Jonathan Moerman, Sjaak Smetsers, Marko van Eekelen
2021/414 (PDF ) Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings Sook Yan Hue, Jason Chia, Ji-Jian Chin
2021/413 (PDF ) Blind Polynomial Evaluation and Data Trading Yi Liu, Qi Wang, Siu-Ming Yiu
2021/412 (PDF ) Unclonable Encryption, Revisited Prabhanjan Ananth, Fatih Kaleoglu
2021/411 (PDF ) Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions Onur Gunlu, Peter Trifonov, Muah Kim, Rafael F. Schaefer, Vladimir Sidorenko
2021/410 (PDF ) Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM Shlomi Dolev, Stav Doolman
2021/409 (PDF ) On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols Markulf Kohlweiss, Varun Madathil, Kartik Nayak, Alessandra Scafuro
2021/408 (PDF ) Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding Christian Majenz, Christian Schaffner, Mehrdad Tahmasbi
2021/407 (PDF ) Improved Quantum Algorithms for the k-XOR Problem André Schrottenloher
2021/406 (PDF ) Disappearing Cryptography in the Bounded Storage Model Jiaxin Guan, Mark Zhandry
2021/405 (PDF ) Revisiting some results on APN and algebraic immune functions Claude Carlet
2021/404 (PDF ) Chain Reductions for Multi-Signatures and the HBMS Scheme Mihir Bellare, Wei Dai
2021/403 (PDF ) Atom: A Stream Cipher with Double Key Filter Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar
2021/402 (PDF ) Leakage Resilient Value Comparison With Application to Message Authentication Christoph Dobraunig, Bart Mennink
2021/401 (PDF ) Output Prediction Attacks on Block Ciphers using Deep Learning Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi
2021/400 (PDF ) Size of IK00 Branching Program Yupu Hu, Xingting Dong, Baocang Wang
2021/399 (PDF ) Latus Incentive Scheme: Enabling Decentralization in Blockchains based on Recursive SNARKs Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
2021/398 (PDF ) Cryptanalysis of the Binary Permuted Kernel Problem Thales Bandiera Paiva, Routo Terada
2021/397 (PDF ) SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq Philipp G. Haselwarter, Exequiel Rivas, Antoine Van Muylder, Théo Winterhalter, Carmine Abate, Nikolaj Sidorenco, Catalin Hritcu, Kenji Maillard, Bas Spitters
2021/396 (PDF ) LESS-FM: Fine-tuning Signatures from the Code Equivalence Problem Alessandro Barenghi, Jean-Francois Biasse, Edoardo Persichetti, Paolo Santini
2021/395 (PDF ) On the Validity of Spoofing Attack Against Safe is the New Smart Harishma Boyapally, Urbi Chatterjee, Debdeep Mukhopadhyay
2021/394 (PDF ) Quantum Encryption with Certified Deletion: Public Key and Attribute-Based Ryo Nishimaki, Takashi Yamakawa
2021/393 (PDF ) Key Agreement with Correlated Noise and Multiple Entities or Enrollments Onur Gunlu
2021/392 (PDF ) How Private Are Commonly-Used Voting Rules? Ao Liu, Yun Lu, Lirong Xia, Vassilis Zikas
2021/391 (PDF ) New Standards for E-Voting Systems: Reflections on Source Code Examinations Thomas Haines, Peter Roenne
2021/390 (PDF ) Orthros: A Low-Latency PRF Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto
2021/389 (PDF ) Physically Related Functions: A New Paradigm for Light-weight Key-Exchange Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2021/388 (PDF ) Topology-Hiding Communication from Minimal Assumptions. Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, Tal Moran
2021/387 (PDF ) Quantum-access security of the Winternitz one-time signature scheme Christian Majenz, Chanelle Matadah Manfouo, Maris Ozols
2021/386 (PDF ) SAFELearn: Secure Aggregation for private FEderated Learning Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni
2021/385 (PDF ) Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices Yasufumi Hashimoto
2021/384 (PDF ) Analysis and Probing of Parallel Channels in the Lightning Network Alex Biryukov, Gleb Naumenko, Sergei Tikhomirov
2021/383 (PDF ) GLV+HWCD for 2y^2=x^3+x/GF(8^91+5) Daniel R. L. Brown
2021/382 (PDF ) Signatures with Tight Multi-User Security from Search Assumptions Jiaxin Pan, Magnus Ringerud
2021/380 (PDF ) Certificateless Designated Verifier Proxy Signature Cholun Kim
2021/379 (PDF ) A Note on the Bias of Rotational Differential-Linear Distinguishers Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu
2021/378 (PDF ) Multiparty Reusable Non-Interactive Secure Computation from LWE Fabrice Benhamouda, Aayush Jain, Ilan Komargodski, Huijia Lin
2021/377 (PDF ) Attacks and weaknesses of BLS aggregate signatures Nguyen Thoi Minh Quan
2021/376 (PDF ) On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds Nai-Hui Chia, Kai-Min Chung, Qipeng Liu, Takashi Yamakawa
2021/375 (PDF ) Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines Rafael Dowsley, Caleb Horst, Anderson C A Nascimento
2021/374 (PDF ) ZXAD: High-volume Attack Mitigation for Tor Akshaya Mani, Ian Goldberg
2021/373 (PDF ) T5: Hashing Five Inputs with Three Compression Calls Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi
2021/372 (PDF ) Explicit connections between supersingular isogeny graphs and Bruhat–Tits trees Laia Amorós, Annamaria Iezzi, Kristin Lauter, Chloe Martindale, Jana Sotáková
2021/371 (PDF ) Construction of minimal linear codes with few weights from weakly regular plateaued functions Ahmet Sinak
2021/370 (PDF ) Nova: Recursive Zero-Knowledge Arguments from Folding Schemes Abhiram Kothapalli, Srinath Setty, Ioanna Tzialla
2021/369 (PDF ) A Note on Algebraic Decomposition Method for Masked Implementation Shoichi Hirose
2021/368 (PDF ) Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE Aaron Hutchinson, Koray Karabina, Geovandro Pereira
2021/367 (PDF ) Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions Arnab Roy, Elena Andreeva, Jan Ferdinand Sauer
2021/366 (PDF ) Multiparty Computation with Covert Security and Public Verifiability Peter Scholl, Mark Simkin, Luisa Siniscalchi
2021/365 (PDF ) Updatable Signatures and Message Authentication Codes Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi
2021/364 (PDF ) RAGHAV: A new low power S-P network encryption design for resource constrained environment GAURAV BANSOD
2021/363 (PDF ) Information Leakages in Code-based Masking: A Unified Quantification Approach Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager
2021/362 (PDF ) Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
2021/361 (PDF ) Some New Constructions of Generalized Plateaued Functions Jiaxin Wang, Fang-Wei Fu
2021/360 (PDF ) An Architecture for Blockchain-based Cloud Banking Thuat Do
2021/359 (PDF ) Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice' Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
2021/358 (PDF ) Time- and Space-Efficient Arguments from Groups of Unknown Order Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
2021/357 (PDF ) AISY - Deep Learning-based Framework for Side-channel Analysis Guilherme Perin, Lichao Wu, Stjepan Picek
2021/356 (PDF ) Active Implementation of End-to-End Post-Quantum Encryption Anton Tutoveanu
2021/355 (PDF ) A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware Georg Land, Pascal Sasdrich, Tim Güneysu
2021/354 (PDF ) Efficient permutation protocol for MPC in the head Peeter Laud
2021/353 (PDF ) Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions Alonso González, Alexandros Zacharakis
2021/352 (PDF ) A Configurable Hardware Implementation of XMSS Jan Philipp Thoma, Tim Güneysu
2021/351 (PDF ) Practical Dynamic Group Signatures Without Knowledge Extractors Hyoseung Kim, Olivier Sanders, Michel Abdalla, Jong Hwan Park
2021/350 (PDF ) Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures Konstantinos Chalkias, Francois Garillot, Yashvanth Kondi, Valeria Nikolaenko
2021/349 (PDF ) Post-quantum Resettably-Sound Zero Knowledge Nir Bitansky, Michael Kellner, Omri Shmueli
2021/348 (PDF ) Decoding supercodes of Gabidulin codes and applications to cryptanalysis Maxime Bombar, Alain Couvreur
2021/347 (PDF ) Attacking (EC)DSA With Partially Known Multiples of Nonces Marios Adamoudis, Konstantinos A. Draziotis, Dimitrios Poulakis
2021/346 (PDF ) Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security Benny Applebaum, Eliran Kachlon, Arpita Patra
2021/345 (PDF ) Private Blocklist Lookups with Checklist Dmitry Kogan, Henry Corrigan-Gibbs
2021/344 (PDF ) Efficient and Universally Composable Single Secret Leader Election from Pairings Dario Catalano, Dario Fiore, Emanuele Giunta
2021/343 (PDF ) Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups Rishab Goyal, Jiahui Liu, Brent Waters
2021/342 (PDF ) MPCAuth: Multi-factor Authentication for Distributed-trust Systems Sijun Tan, Weikeng Chen, Ryan Deng, Raluca Ada Popa
2021/341 (PDF ) Clonable PUF: On the Design of PUFs That Share Equivalent Responses Takashi Sato, Yuki Tanaka, Song Bian
2021/340 (PDF ) Merkle Trees Optimized for Stateless Clients in Bitcoin Bolton Bailey, Suryanarayana Sankagiri
2021/339 (PDF ) Non-interactive distributed key generation and key resharing Jens Groth
2021/338 (PDF ) Lattice-Based Proof of Shuffle and Applications to Electronic Voting Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge
2021/337 (PDF ) Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud Systems Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo
2021/336 (PDF ) On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek
2021/335 (PDF ) Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3 Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2021/334 (PDF ) Post-Quantum Succinct Arguments: Breaking the Quantum Rewinding Barrier Alessandro Chiesa, Fermi Ma, Nicholas Spooner, Mark Zhandry
2021/333 (PDF ) Sumcheck Arguments and their Applications Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki
2021/332 (PDF ) An $\tilde{O}(\log^2 p)$ Approach to Point-Counting on Elliptic Curves From a Prominent Family Over the Prime Field $\mathbb{F}_p$ Yuri Borissov, Miroslav Markov
2021/331 (PDF ) A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications Radhakrishna Bhat, N R Sunitha, S S Iyengar
2021/330 (PDF ) The Key-Dependent Message Security of Key-Alternating Feistel Ciphers Pooya Farshim, Louiza Khati, Yannick Seurin, Damien Vergnaud
2021/329 (PDF ) Two Efficient and Regulatory Confidential Transaction Schemes Min Yang, Changtong Xu, Zhe Xia, Li Wang, Qingshu Meng
2021/328 (PDF ) Mixup Data Augmentation for Deep Learning Side-Channel Attacks Karim M. Abdellatif
2021/327 (PDF ) Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions Matteo Campanelli, Mathias Hall-Andersen
2021/326 (PDF ) Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox François Dupressoir, Konrad Kohbrok, Sabine Oechsner
2021/325 (PDF ) Spectrum: High-Bandwidth Anonymous Broadcast Zachary Newman, Sacha Servan-Schreiber, Srinivas Devadas
2021/324 (PDF ) Private AI: Machine Learning on Encrypted Data Kristin E. Lauter
2021/323 (PDF ) 0 Nguyen Thoi Minh Quan
2021/322 (PDF ) Rinocchio: SNARKs for Ring Arithmetic Chaya Ganesh, Anca Nitulescu, Eduardo Soria-Vazquez
2021/321 (PDF ) Abuse Resistant Law Enforcement Access Systems Matthew Green, Gabriel Kaptchuk, Gijs Van Laer
2021/320 (PDF ) Binding BIKE errors to a key pair Nir Drucker, Shay Gueron, Dusan Kostic
2021/319 (PDF ) Tradeoff attacks on symmetric ciphers Orhun Kara
2021/318 (PDF ) Oblivious TLS via Multi-Party Computation Damiano Abram, Ivan Damgård, Peter Scholl, Sven Trieflinger
2021/317 (PDF ) MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge Duong Tung Nguyen, Ni Trieu
2021/316 (PDF ) Reusable Two-Round MPC from LPN James Bartusek, Sanjam Garg, Akshayaram Srinivasan, Yinuo Zhang
2021/315 (PDF ) Faster homomorphic comparison operations for BGV and BFV Ilia Iliashenko, Vincent Zucca
2021/314 (PDF ) On Security Properties of All-or-nothing Transforms Navid Nasr Esfahani, Douglas R. Stinson
2021/313 (PDF ) Rank Estimation with Bounded Error via Exponential Sampling Liron David, Avishai Wool
2021/312 (PDF ) Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup Zhimin Luo, Mengce Zheng, Ping Wang, Minhui Jin, Jiajia Zhang, Honggang Hu
2021/311 (PDF ) Improved Neural Aided Statistical Attack for Cryptanalysis Yi Chen, Hongbo Yu
2021/310 (PDF ) A New Neural Distinguisher Considering Features Derived from Multiple Ciphertext Pairs Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan
2021/309 (PDF ) SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets Xingyu Meng, Kshitij Raj, Atul Prasad Deb Nath, Kanad Basu, Sandip Ray
2021/308 (PDF ) Threshold Garbled Circuits and Ad Hoc Secure Computation Michele Ciampi, Vipul Goyal, Rafail Ostrovsky
2021/307 (PDF ) A Compressed $\Sigma$-Protocol Theory for Lattices Thomas Attema, Ronald Cramer, Lisa Kohl
2021/306 (PDF ) Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2021/305 (PDF ) SoK: Game-based Security Models for Group Key Exchange Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila
2021/304 (PDF ) Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting Xavier Boyen, Thomas Haines, Johannes Mueller
2021/303 (PDF ) The More The Merrier: Reducing the Cost of Large Scale MPC S. Dov Gordon, Daniel Starin, Arkady Yerukhimovich
2021/302 (PDF ) Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphael Phan, Zhenfei Zhang
2021/301 (PDF ) Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of $j=0$ with the cost of one exponentiation in $\mathbb{F}_{\!q}$ Dmitrii Koshelev
2021/300 (PDF ) Invariants for EA- and CCZ-equivalence of APN and AB functions Nikolay Kaleyski
2021/299 (PDF ) HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen
2021/298 (PDF ) On extensions of the one-time-pad Bhupendra Singh, G. Athithan, Rajesh Pillai
2021/297 (PDF ) HashWires: Hyperefficient Credential-Based Range Proofs Konstantinos Chalkias, Shir Cohen, Kevin Lewi, Fredric Moezinia, Yolan Romailler
2021/296 (PDF ) Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
2021/295 (PDF ) Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design Michael Zuzak, Ankur Srivastava
2021/294 (PDF ) Code-based signatures without trapdoors through restricted vectors Marco Baldi, Franco Chiaraluce, Paolo Santini
2021/293 (PDF ) Thinking Outside the Superbox Nicolas Bordes, Joan Daemen, Daniël Kuijsters, Gilles Van Assche
2021/292 (PDF ) Quantum Collision Attacks on Reduced SHA-256 and SHA-512 Akinori Hosoyamada, Yu Sasaki
2021/291 (PDF ) Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2021/290 (PDF ) Dummy Shuffling against Algebraic Attacks in White-box Implementations Alex Biryukov, Aleksei Udovenko
2021/289 (PDF ) Reactive Key-Loss Protection in Blockchains Sam Blackshear, Konstantinos Chalkias, Panagiotis Chatzigiannis, Riyaz Faizullabhoy, Irakliy Khaburzaniya, Eleftherios Kokoris Kogias, Joshua Lind, David Wong, Tim Zakian
2021/288 (PDF ) Redeeming Reset Indifferentiability and Post-Quantum Groups Mark Zhandry
2021/287 (PDF ) A Deeper Look at Machine Learning-Based Cryptanalysis Adrien Benamira, David Gerault, Thomas Peyrin, Quan Quan Tan
2021/286 (PDF ) Fiat-Shamir via List-Recoverable Codes (or: Parallel Repetition of GMW is not Zero-Knowledge) Justin Holmgren, Alex Lombardi, Ron D. Rothblum
2021/285 (PDF ) Quadratic Secret Sharing and Conditional Disclosure of Secrets Amos Beimel, Hussien Othman, Naty Peter
2021/284 (PDF ) The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State
2021/283 (PDF ) P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange Carsten Baum, Bernardo David, Tore Frederiksen
2021/282 (PDF ) One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper
2021/281 (PDF ) Subquadratic SNARGs in the Random Oracle Model Alessandro Chiesa, Eylon Yogev
2021/280 (PDF ) Online-Extractability in the Quantum Random-Oracle Model Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
2021/279 (PDF ) Information-Set Decoding with Hints Anna-Lena Horlemann, Sven Puchinger, Julian Renner, Thomas Schamberger, Antonia Wachter-Zeh
2021/278 (PDF ) More Communication Lower Bounds for Information-Theoretic MPC Ivan Damgård, Boyang Li, Nikolaj I. Schwartzbach
2021/277 (PDF ) On the Integer Polynomial Learning with Errors Problem Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld
2021/276 (PDF ) Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography Amril Syalim, Takashi Nishide, Kouichi Sakurai
2021/275 (PDF ) Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher Zhengyuan Shi, Gangqiang Yang, Hailiang Xiong, Fudong Li, Honggang Hu
2021/274 (PDF ) Large Message Homomorphic Secret Sharing from DCR and Applications Lawrence Roy, Jaspal Singh
2021/273 (PDF ) On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu
2021/272 (PDF ) Isogeny-based key compression without pairings Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto
2021/271 (PDF ) On the CCA Compatibility of Public-Key Infrastructure Dakshita Khurana, Brent Waters
2021/270 (PDF ) PQC: R-Propping of a New Group-Based Digital Signature Pedro Hecht
2021/269 (PDF ) Steel: Composable Hardware-based Stateful and Randomised Functional Encryption Pramod Bhatotia, Markulf Kohlweiss, Lorenzo Martinico, Yiannis Tselekounis
2021/268 (PDF ) Revisiting Updatable Encryption: Controlled Forward Security, Constructions and a Puncturable Perspective Daniel Slamanig, Christoph Striecks
2021/267 (PDF ) Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields Christoph Dobraunig, Lorenzo Grassi, Anna Guinet, Daniël Kuijsters
2021/266 (PDF ) VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE Peter Rindal, Phillipp Schoppmann
2021/265 (PDF ) On the Hardness of Module-LWE with Binary Secret Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2021/264 (PDF ) FAST: Fair Auctions via Secret Transactions Bernardo David, Lorenzo Gentile, Mohsen Pourpouneh
2021/263 (PDF ) Non-Interactive Half-Aggregate Signatures Based on Module Lattices - A First Attempt Katharina Boudgoust, Adeline Roux-Langlois
2021/262 (PDF ) The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT Claudio Orlandi, Peter Scholl, Sophia Yakoubov
2021/261 (PDF ) MIRACLE: MIcRo-ArChitectural Leakage Evaluation Ben Marshall, Dan Page, James Webb
2021/260 (PDF ) A Geometric Approach to Homomorphic Secret Sharing Yuval Ishai, Russell W. F. Lai, Giulio Malavolta
2021/259 (PDF ) Fully projective radical isogenies in constant-time Jesús-Javier Chi-Domínguez, Krijn Reijnders
2021/258 (PDF ) Secure Wire Shuffling in the Probing Model Jean-Sebastien Coron, Lorenzo Spignoli
2021/256 (PDF ) Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer
2021/255 (PDF ) Low-Memory Algebraic Attacks on Round-Reduced LowMC Fukang Liu, Takanori Isobe, Willi Meier
2021/254 (PDF ) Multivariate Public Key Cryptosystem from Sidon Spaces Netanel Raviv, Ben Langton, Itzhak Tamo
2021/253 (PDF ) Improved single-round secure multiplication using regenerating codes Mark Abspoel, Ronald Cramer, Daniel Escudero, Ivan Damgård, Chaoping Xing
2021/252 (PDF ) A Resource Binding Approach to Logic Obfuscation Michael Zuzak, Yuntao Liu, Ankur Srivastava
2021/251 (PDF ) Generic Compiler for Publicly Verifiable Covert Multi-Party Computation Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2021/250 (PDF ) Key Agreement with Physical Unclonable Functions and Biometric Identifiers Onur Gunlu
2021/249 (PDF ) NeuroSCA: Evolving Activation Functions for Side-channel Analysis Karlo Knezevic, Juraj Fulir, Domagoj Jakobovic, Stjepan Picek
2021/248 (PDF ) Everlasting UC Commitments from Fully Malicious PUFs Bernardo Magri, Giulio Malavolta, Dominique Schröder, Dominique Unruh
2021/247 (PDF ) Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets David Knichel, Pascal Sasdrich, Amir Moradi
2021/246 (PDF ) Master-Key KDM-Secure ABE via Predicate Encoding Shengyuan Feng, Junqing Gong, Jie Chen
2021/245 (PDF ) On the Ideal Shortest Vector Problem over Random Rational Primes Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng
2021/244 (PDF ) Forward Secret Encrypted RAM: Lower Bounds and Applications Alexander Bienstock, Yevgeniy Dodis, Kevin Yeo
2021/243 (PDF ) Private Set Operations from Oblivious Switching Gayathri Garimella, Payman Mohassel, Mike Rosulek, Saeed Sadeghian, Jaspal Singh
2021/242 (PDF ) GAP: Born to Break Hiding Ju-Hwan Kim, Ji-Eun Woo, Soo-Jin Kim, So-Yeon Park, Dong-Guk Han
2021/241 (PDF ) On the Round Complexity of Fully Secure Solitary MPC with Honest Majority Saikrishna Badrinarayanan, Peihan Miao, Pratyay Mukherjee, Divya Ravi
2021/240 (PDF ) The Relationship Between Idealized Models Under Computationally Bounded Adversaries Mark Zhandry, Cong Zhang
2021/239 (PDF ) SoK: Auditability and Accountability in Distributed Payment Systems Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias
2021/238 (PDF ) Weak Tweak-Keys for the CRAFT Block Cipher Gregor Leander, Shahram Rasoolzadeh
2021/237 (PDF ) Post-quantum Security of OAEP Transform Ehsan Ebrahimi
2021/236 (PDF ) SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
2021/235 (PDF ) More Efficient Digital Signatures with Tight Multi-User Security Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
2021/234 (PDF ) New Public-Key Crypto-System EHT Alessandro Budroni, Igor Semaev
2021/233 (PDF ) Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers Inbar Kaslasi, Ron D. Rothblum, Prashant Nalini Vasudevan
2021/230 (PDF ) Subversion-Resilient Public Key Encryption with Practical Watchdogs Pascal Bemmann, Sebastian Berndt, Rongmao Chen, Tibor Jager
2021/229 (PDF ) Fast Boolean Queries with Minimized Leakage for Encrypted Databases in Cloud Computing Zhiqiang Wu, Kenli Li, Keqin Li, Jin Wang
2021/228 (PDF ) On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments Nils Fleischhacker, Mark Simkin
2021/227 (PDF ) Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks Qiqi Lai, Feng-Hao Liu, Zhedong Wang
2021/226 (PDF ) Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng
2021/225 (PDF ) Recovering or Testing Extended-Affine Equivalence Anne Canteaut, Alain Couvreur, Léo Perrin
2021/224 (PDF ) Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha Murilo Coutinho, T. C. Souza Neto
2021/223 (PDF ) Escaping from Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting Xinyu Li, Jing Xu, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang
2021/222 (PDF ) Quantum-safe HIBE: does it cost a Latte? Raymond K. Zhao, Sarah McCarthy, Ron Steinfeld, Amin Sakzad, Máire O’Neill
2021/221 (PDF ) The Direction of Updatable Encryption Does Matter Ryo Nishimaki
2021/220 (PDF ) A New Twofold Cornacchia-Type Algorithm Bei Wang, Yi Ouyang, Songsong Li, Honggang Hu
2021/219 (PDF ) Snarky Ceremonies Markulf Kohlweiss, Mary Maller, Janno Siim, Mikhail Volkhov
2021/218 (PDF ) SimS: a Simplification of SiGamal Tako Boris Fouotsa, Christophe Petit
2021/217 (PDF ) Verifiable Random Functions with Optimal Tightness David Niehues
2021/216 (PDF ) How to Meet Ternary LWE Keys Alexander May
2021/215 (PDF ) Limbo: Efficient Zero-knowledge MPCitH-based Arguments Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy
2021/214 (PDF ) Mesh Messaging in Large-scale Protests: Breaking Bridgefy Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková
2021/213 (PDF ) Accelerating the Search of Differential and Linear Characteristics with the SAT Method Ling Sun, Wei Wang, Meiqin Wang
2021/212 (PDF ) Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe
2021/211 (PDF ) GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy Bernardo David, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi
2021/210 (PDF ) YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov
2021/209 (PDF ) Sampling methods for cryptographic tests George Marinakis
2021/208 (PDF ) Secure Poisson Regression Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth
2021/207 (PDF ) Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank Daniele Cozzo, Nigel P. Smart, Younes Talibi Alaoui
2021/206 (PDF ) WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts Ádám Ficsór, Yuval Kogman, Lucas Ontivero, István András Seres
2021/205 (PDF ) Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup Tsz Hon Yuen, Handong Cui, Xiang Xie
2021/204 (PDF ) Revisiting Homomorphic Encryption Schemes for Finite Fields Andrey Kim, Yuriy Polyakov, Vincent Zucca
2021/203 (PDF ) Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing Tjerand Silde, Martin Strand
2021/202 (PDF ) Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices Martin R. Albrecht, Russell W. F. Lai
2021/201 (PDF ) DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security Hanshen Xiao, Srinivas Devadas
2021/200 (PDF ) Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols Sergiu Carpov, Kevin Deforth, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Jonathan Katz, Iraklis Leontiadis, M. Mohammadi, Abson Sae-Tang, Marius Vuille
2021/199 (PDF ) Generic, Efficient and Isochronous Gaussian Sampling over the Integers Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao
2021/198 (PDF ) Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs Tatsuki Ono, Song Bian, Takashi Sato
2021/197 (PDF ) Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA Guilherme Perin, Lichao Wu, Stjepan Picek
2021/196 (PDF ) QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model Xu Liu, Mingqiang Wang
2021/195 (PDF ) Compilation of Function Representations for Secure Computing Paradigms Karim Baghery, Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy
2021/194 (PDF ) Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun
2021/193 (PDF ) Multitarget decryption failure attacks and their application to Saber and Kyber Jan-Pieter D'Anvers, Senne Batsleer
2021/191 (PDF ) PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution Yaroslav Balytskyi, Manohar Raavi, Anatoliy Pinchuk, Sang-Yoon Chang
2021/190 (PDF ) Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen
2021/189 (PDF ) Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette Yunwen Liu, Siwei Sun, Chao Li
2021/188 (PDF ) Tight Security Bounds for Micali’s SNARGs Alessandro Chiesa, Eylon Yogev
2021/187 (PDF ) Weak Keys in Reduced AEGIS and Tiaoxin Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto
2021/186 (PDF ) Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
2021/185 (PDF ) No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms Hwajeong Seo, Pakize Sanal, Wai-Kong Lee, Reza Azarderakhsh
2021/184 (PDF ) Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter
2021/183 (PDF ) Efficient State Management in Distributed Ledgers Dimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias
2021/182 (PDF ) The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications István András Seres, Máté Horváth, Péter Burcsi
2021/181 (PDF ) Group Signatures with User-Controlled and Sequential Linkability Jesus Diaz, Anja Lehmann
2021/180 (PDF ) Unique Chain Rule and its Applications Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael Reiter
2021/179 (PDF ) Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis An Wang, Yuan Li, Yaoling Ding, Liehuang Zhu, Yongjuan Wang
2021/178 (PDF ) Attribute-Based Access Control for Inner Product Functional Encryption from LWE Tapas Pal, Ratna Dutta
2021/177 (PDF ) Generic Negation of Pair Encodings Miguel Ambrona
2021/176 (PDF ) Blitz: Secure Multi-Hop Payments Without Two-Phase Commits Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
2021/175 (PDF ) On the Relationships between Different Methods for Degree Evaluation (Full Version) Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang
2021/174 (PDF ) Smart Contracts for Incentivized Outsourcing of Computation Alptekin Küpçü, Reihaneh Safavi-Naini
2021/173 (PDF ) TensorCrypto Wai-Kong Lee, Hwajeong Seo, Zhenfei Zhang, Seongoun Hwang
2021/172 (PDF ) Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah
2021/171 (PDF ) Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Revisited Wei Yu, Guangwu Xu
2021/170 (PDF ) Fully Anonymous Group Signature with Verifier-Local Revocation Ai Kitagawa, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
2021/169 (PDF ) Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda
2021/168 (PDF ) Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS Xiaohan Zhang, Chi Cheng, Ruoyu Ding
2021/167 (PDF ) Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware Seetal Potluri, Aydin Aysu
2021/166 (PDF ) Cost Fairness for Blockchain-Based Two-Party Exchange Protocols Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab
2021/165 (PDF ) Composition with Knowledge Assumptions Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
2021/164 (PDF ) Graph-Based Construction for Non-Malleable Codes Shohei Satake, Yujie Gu, Kouichi Sakurai
2021/163 (PDF ) CNF-FSS and its Applications Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky
2021/162 (PDF ) Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity (Revisiting space-based security in the adaptive setting) Giuseppe Ateniese, Long Chen, Danilo Francati, Dimitrios Papadopoulos, Qiang Tang
2021/160 (PDF ) Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance Tibor Jager, Rafael Kurek, David Niehues
2021/159 (PDF ) hbACSS: How to Robustly Share Many Secrets Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller
2021/158 (PDF ) Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate Nicolas Resch, Chen Yuan
2021/157 (PDF ) Sycon: A New Milestone in Designing ASCON-like Permutations Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo
2021/156 (PDF ) Mechanized Proofs of Adversarial Complexity and Application to Universal Composability Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub
2021/155 (PDF ) Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware James Howe, Marco Martinoli, Elisabeth Oswald, Francesco Regazzoni
2021/154 (PDF ) Generating cryptographically-strong random lattice bases and recognizing rotations of $\mathbb{Z}^n$ Tamar Lichter Blanks, Stephen D. Miller
2021/153 (PDF ) On the Isogeny Problem with Torsion Point Information Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz, Yan Bo Ti
2021/152 (PDF ) Hybrid Dual Attack on LWE with Arbitrary Secrets Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang
2021/151 (PDF ) On Sufficient Oracles for Secure Computation with Identifiable Abort Mark Simkin, Luisa Siniscalchi, Sophia Yakoubov
2021/150 (PDF ) Two-Party Adaptor Signatures From Identification Schemes Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi
2021/149 (PDF ) Quantum Security of the Legendre PRF Paul Frixons, André Schrottenloher
2021/148 (PDF ) On methods of shortening ElGamal-type signatures Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Stanislav Smyshlyaev
2021/147 (PDF ) IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols Greg Morrisett, Elaine Shi, Kristina Sojakova, Xiong Fan, Joshua Gancher
2021/146 (PDF ) Securely Computing Piecewise Constant Codes Benjamin E. Diamond
2021/145 (PDF ) A Security Framework for Distributed Ledgers Mike Graf, Daniel Rausch, Viktoria Ronge, Christoph Egger, Ralf Küsters, Dominique Schröder
2021/144 (PDF ) \(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari
2021/143 (PDF ) On Bitcoin Cash’s Target Recalculation Functions Juan Garay, Yu Shen
2021/142 (PDF ) Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication Muah Kim, Onur Gunlu, Rafael F. Schaefer
2021/141 (PDF ) Advanced Lattice Sieving on GPUs, with Tensor Cores Léo Ducas, Marc Stevens, Wessel van Woerden
2021/140 (PDF ) Practical and Scalable Access Control Mechanism for the Internet of Things using Time-bound Attribute-based Encryption Clémentine Gritti, Emanuel Regnath, Sebastian Steinhorst
2021/139 (PDF ) Order-Fair Consensus in the Permissionless Setting Mahimna Kelkar, Soubhik Deb, Sreeram Kannan
2021/138 (PDF ) Classic McEliece Implementation with Low Memory Footprint Johannes Roth, Evangelos Karatsiolis, Juliane Krämer
2021/137 (PDF ) Cryptographic Security of the MLS RFC, Draft 11 Chris Brzuska, Eric Cornelissen, Konrad Kohbrok
2021/136 (PDF ) An approach for designing fast public key encryption systems using white-box cryptography techniques Dmitry Schelkunov
2021/135 (PDF ) Acyclicity Programming for Sigma-Protocols Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
2021/134 (PDF ) Cryptanalysis of a code-based signature scheme without trapdoors Marco Baldi, Jean-Christophe Deneuville, Edoardo Persichetti, Paolo Santini
2021/133 (PDF ) smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption Ravital Solomon, Rick Weber, Ghada Almashaqbeh
2021/132 (PDF ) Privacy-Preserving Feature Selection with Secure Multiparty Computation Xiling Li, Rafael Dowsley, Martine De Cock
2021/131 (PDF ) Privacy-Preserving Video Classification with Convolutional Neural Networks Sikha Pentyala, Rafael Dowsley, Martine De Cock
2021/130 (PDF ) Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves Bei Wang, Songsong Li, Yi Ouyang, Honggang Hu
2021/129 (PDF ) Lattice-based weak curve fault attack on ECDSA Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei
2021/128 (PDF ) Designing Tweakable Enciphering Schemes Using Public Permutations Debrup Chakraborty, Avijit Dutta, Samir Kundu
2021/127 (PDF ) Cuproof: A Novel Range Proof with Constant Size Cong Deng, Xianghong Tang, Lin You, Gengran Hu, Shuhong Gao
2021/126 (PDF ) Observer Attack on Stream Ciphers Ramachandran Anantharaman, Virendra Sule
2021/125 (PDF ) Privacy Preserving and Resilient RPKI Kris Shrishak, Haya Shulman
2021/124 (PDF ) Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption Ozgun Ozerk, Can Elgezen, Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
2021/123 (PDF ) A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding
2021/122 (PDF ) PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection Aner Ben Efraim, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky
2021/121 (PDF ) BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits Yaron Gvili, Sarah Scheffler, Mayank Varia
2021/120 (PDF ) Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits Aner Ben-Efraim, Kelong Cong, Eran Omri, Emmanuela Orsini, Nigel P. Smart, Eduardo Soria-Vazquez
2021/119 (PDF ) Rabbit: Efficient Comparison for Secure Multi-Party Computation Eleftheria Makri, Dragos Rotaru, Frederik Vercauteren, Sameer Wagh
2021/118 (PDF ) High-Threshold AVSS with Optimal Communication Complexity Nicolas Alhaddad, Mayank Varia, Haibin Zhang
2021/117 (PDF ) FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
2021/116 (PDF ) MAKE: a Matrix Action Key Exchange Nael Rahman, Vladimir Shpilrain
2021/115 (PDF ) Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4 Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani
2021/114 (PDF ) Security Analysis of CPace Michel Abdalla, Björn Haase, Julia Hesse
2021/113 (PDF ) Improvement of Secure Multi-Party Multiplication of (k,n) Threshold Secret Sharing Using Only N=k Servers (Revised Version) Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
2021/111 (PDF ) A note on Post Quantum Onion Routing Kelesidis Evgnosia-Alexandra
2021/110 (PDF ) Replacing Probability Distributions in Security Games via Hellinger Distance Kenji Yasunaga
2021/109 (PDF ) Sequential Logic Encryption Against Model Checking Attack Amin Rezaei, Hai Zhou
2021/108 (PDF ) Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Petr Cibik, Patrik Dobias
2021/107 (PDF ) A Decentralized and Encrypted National Gun Registry Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin
2021/106 (PDF ) MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers Aram Jivanyan, Jesse Lancaster, Arash Afshar, Parnian Alimi
2021/105 (PDF ) A New Efficient Identity-Based Encryption Without Pairing Majid Salimi
2021/104 (PDF ) Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz, Thomas Pöppelmann, Michiel Van Beirendonck
2021/103 (PDF ) OAE-RUP: A Strong Online AEAD Security Notion and its Application to SAEF Amit Singh Bhati, Elena Andreeva, Damian Vizar
2021/102 (PDF ) A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization Madalina Chirita, Alexandru-Mihai Stroie, Andrei-Daniel Safta, Emil Simion
2021/101 (PDF ) Combined Fault and DPA Protection for Lattice-Based Cryptography Daniel Heinz, Thomas Pöppelmann
2021/100 (PDF ) SPURT: Scalable Distributed Randomness Beacon with Transparent Setup Sourav Das, Vinith Krishnan, Irene Miriam Isaac, Ling Ren
2021/099 (PDF ) Property Inference from Poisoning Melissa Chase, Esha Ghosh, Saeed Mahloujifar
2021/098 (PDF ) Image sets of perfectly nonlinear maps Lukas Kölsch, Björn Kriepke, Gohar Kyureghyan
2021/097 (PDF ) A New and Improved Reduction Proof of Cascade PRF Mridul Nandi
2021/096 (PDF ) Gladius: LWR based efficient hybrid public key encryption with distributed decryption Kelong Cong, Daniele Cozzo, Varun Maram, Nigel P. Smart
2021/095 (PDF ) Collusion-Deterrent Threshold Information Escrow Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas, Aniket Kate
2021/094 (PDF ) Reducing HSM Reliance in Payments through Proxy Re-Encryption Sivanarayana Gaddam, Atul Luykx, Rohit Sinha, Gaven Watson
2021/093 (PDF ) Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
2021/092 (PDF ) New Public Key Cryptosystem (First Version) Dieaa I. Nassr, M. Anwar, Hatem M. Bahig
2021/091 (PDF ) Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks Ilaria Chillotti, Marc Joye, Pascal Paillier
2021/090 (PDF ) A New Twofold Cornacchia-Type Algorithm and Its Applications Bei Wang, Yi Ouyang, Honggang Hu, Songsong Li
2021/089 (PDF ) Fuzzy Message Detection Gabrielle Beck, Julia Len, Ian Miers, Matthew Green
2021/088 (PDF ) An Overview of the Hybrid Argument Marc Fischlin, Arno Mittelbach
2021/087 (PDF ) ZEN: An Optimizing Compiler for Verifiable, Zero-Knowledge Neural Network Inferences Boyuan Feng, Lianke Qin, Zhenfei Zhang, Yufei Ding, Shumo Chu
2021/086 (PDF ) On Elapsed Time Consensus Protocols Mic Bowman, Debajyoti Das, Avradip Mandal, Hart Montgomery
2021/085 (PDF ) Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves Suhri Kim
2021/084 (PDF ) Ariadne Thread and Pepper: New Multivariate Cryptographic Schemes with Public Keys in Degree 3 Gilles Macario-Rat, Jacques Patarin
2021/083 (PDF ) The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol Michael Troncoso, Britta Hale
2021/082 (PDF ) Grades of Trust in Multiparty Computation Jaskaran V. Singh, Nicholas Hopper
2021/081 (PDF ) Private Stream Aggregation from Labeled Secret Sharing Schemes Hendrik Waldner, Tilen Marc, Miha Stopar, Michel Abdalla
2021/080 (PDF ) Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption Jan-Pieter D'Anvers, Emmanuela Orsini, Frederik Vercauteren
2021/079 (PDF ) A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson
2021/078 (PDF ) An Incentive-Compatible Smart Contract for Decentralized Commerce Nikolaj I. Schwartzbach
2021/077 (PDF ) Magnetic RSA Rémi Géraud-Stewart, David Naccache
2021/076 (PDF ) QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field Kang Yang, Pratik Sarkar, Chenkai Weng, Xiao Wang
2021/075 (PDF ) A Generalization of the Subfield Construction Kamil Otal
2021/074 (PDF ) Cross-Domain Attribute-Based Access Control Encryption Mahdi Sedaghat, Bart Preneel
2021/073 (PDF ) Application of Velusqrt algorithm to Huff's and general Huff's curves Michał Wroński
2021/072 (PDF ) Toward Practical Autoencoder-based Side-Channel Analysis Evaluations Servio Paguada, Lejla Batina, Igor Armendariz
2021/071 (PDF ) Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek
2021/070 (PDF ) Secure, Accurate, and Practical Narrow-Band Ranging System Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann
2021/069 (PDF ) Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation Amanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha
2021/068 (PDF ) Banquet: Short and Fast Signatures from AES Carsten Baum, Cyprien Delpech de Saint Guilhem, Daniel Kales, Emmanuela Orsini, Peter Scholl, Greg Zaverucha
2021/067 (PDF ) Analysis and Comparison of Table-based Arithmetic to Boolean Masking Michiel Van Beirendonck, Jan-Pieter D’Anvers, Ingrid Verbauwhede
2021/066 (PDF ) A Deep Learning Approach for Active S-box Prediction of Lightweight Generalized Feistel Block Ciphers Mohamed Fadl Idris, Je Sen Teh, Jasy Liew Suet Yan, Wei-Zhu Yeoh
2021/065 (PDF ) FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves Dorin-Marian Ionita, Emil Simion
2021/064 (PDF ) Fault Attacks on CCA-secure Lattice KEMs Peter Pessl, Lukas Prokop
2021/063 (PDF ) CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing Monir Azraoui, Solenn Brunet, Sébastien Canard, Aïda Diop, Lélia Eveillard, Alicia Filipiak, Adel Hamdi, Flavie Misarsky, Donald Nokam Kuate, Marie Paindavoine, Quentin Santos, Bastien Vialla
2021/062 (PDF ) Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3) Dominique Unruh
2021/061 (PDF ) A Note on IBE Performance of a Practical Application Ştefan Maftei, Marius Supuran, Emil Simion
2021/060 (PDF ) UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled
2021/059 (PDF ) The Cost of Adaptivity in Security Games on Graphs Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
2021/058 (PDF ) A Performance Study of Crypto-Hardware in the Low-end IoT Peter Kietzmann, Lena Boeckmann, Leandro Lanzieri, Thomas C. Schmidt, Matthias Wählisch
2021/056 (PDF ) The Study of Modulo $2^n$ Zhongfeng Niu
2021/055 (PDF ) Tech Report: Inerial HSMs Thwart Advanced Physical Attacks Jan Sebastian Götte, Björn Scheuermann
2021/054 (PDF ) The Cost of IEEE Arithmetic in Secure Computation David W. Archer, Shahla Atapoor, Nigel P. Smart
2021/053 (PDF ) On Algebraic Embedding for Unstructured Lattices Madalina Bolboceanu, Zvika Brakerski, Devika Sharma
2021/052 (PDF ) Elementary Attestation of Cryptographically Useful Composite Moduli Rémi Géraud-Stewart, David Naccache
2021/051 (PDF ) How Much can F5 Really Do Jintai Ding, Zheng Zhang, Joshua Deaton
2021/050 (PDF ) The Distinguishing Attack on HFE Joshua Deaton, Jintai Ding
2021/049 (PDF ) ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process Mark D. Aagaard, Nusa Zidaric
2021/048 (PDF ) Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park
2021/047 (PDF ) Evolution of Bulletin Board & its application to E-Voting – A Survey Misni Harjo Suwito, Yoshifumi Ueshige, Kouichi Sakurai
2021/046 (PDF ) Efficient Lattice-Based Inner-Product Functional Encryption Jose Maria Bermudo Mera, Angshuman Karmakar, Tilen Marc, Azam Soleimanian
2021/045 (PDF ) Banners: Binarized Neural Networks with Replicated Secret Sharing Alberto Ibarrondo, Hervé Chabanne, Melek Önen
2021/044 (PDF ) Addra: Metadata-private voice communication over fully untrusted infrastructure Ishtiyaque Ahmad, Yuntian Yang, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
2021/043 (PDF ) Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields Madhurima Mukhopadhyay, Palash Sarkar
2021/042 (PDF ) Correcting Subverted Random Oracles Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu
2021/041 (PDF ) Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff, Md Mahbub Alam
2021/040 (PDF ) On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product Any Muanalifah, Serge˘ı Sergeev
2021/039 (PDF ) Practical FHE parameters against lattice attacks Jung Hee Cheon, Yongha Son, Donggeon Yhee
2021/038 (PDF ) Streaming Merkle Proofs within Binary Numeral Trees Luke Champine
2021/037 (PDF ) New First-Order Secure AES Performance Records Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi
2021/036 (PDF ) The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration Niluka Amarasinghe, Xavier Boyen, Matthew McKague
2021/035 (PDF ) Sketches for Blockchains Ori Rottenstreich
2021/034 (PDF ) Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF Nishanth Chandran, Divya Gupta, Akash Shah
2021/033 (PDF ) Quantum-resistant Anonymous IBE with Traceable Identities Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2021/032 (PDF ) Experimental relativistic zero-knowledge proofs Pouriya Alikhani, Nicolas Brunner, Claude Crépeau, Sébastien Designolle, Raphaël Houlmann, Weixu Shi, Hugo Zbinden
2021/031 (PDF ) A Comparative Study of Cryptographic Key Distribution Protocols Alexandru-Ștefan Gheorghieș, Darius-Marian Lăzăroi, Emil Simion
2021/030 (PDF ) Linear-time and post-quantum zero-knowledge SNARKs for R1CS Jonathan Lee, Srinath Setty, Justin Thaler, Riad Wahby
2021/029 (PDF ) EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs Thomas Schneider, Oleksandr Tkachenko
2021/028 (PDF ) A Side Journey to Titan Victor LOMNE, Thomas ROCHE
2021/027 (PDF ) E-voting protocols in context of COVID19 Sfirnaciuc Emilia, Vasilescu Miruna-Elena, Simion Emil
2021/026 (PDF ) A Gapless Code-Based Hash Proof System based on RQC and its Applications Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Yann Connan, Philippe Gaborit
2021/025 (PDF ) FLAME: Taming Backdoors in Federated Learning Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
2021/024 (PDF ) PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System Pedro Hecht
2021/023 (PDF ) What is Meant by Permissionless Blockchains? Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Andreas Kern, Walid Fdhila
2021/022 (PDF ) Increasing Precision of Division Property Patrick Derbez, Pierre-Alain Fouque
2021/021 (PDF ) Fake Near Collisions Attacks Patrick Derbez, Pierre-Alain Fouque, Victor Mollimard
2021/020 (PDF ) Catching the Fastest Boomerangs - Application to SKINNY Stéphanie Delaune, Patrick Derbez, Mathieu Vavrille
2021/019 (PDF ) Kummer versus Montgomery Face-off over Prime Order Fields Kaushik Nath, Palash Sarkar
2021/018 (PDF ) Comments on ``On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment'' Yuhao Yang, Xiujie Huang
2021/017 (PDF ) Lightweight Techniques for Private Heavy Hitters Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
2021/016 (PDF ) Black-Box Uselessness: Composing Separations in Cryptography Geoffroy Couteau, Pooya Farshim, Mohammad Mahmoody
2021/015 (PDF ) SoK: Remote Power Analysis Macarena C. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, Billy Bob Brumley
2021/013 (PDF ) An atlas of the Richelot isogeny graph Enric Florit, Benjamin Smith
2021/012 (PDF ) Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph Enric Florit, Benjamin Smith
2021/011 (PDF ) Complete solution over $\GF{p^n}$ of the equation $X^{p^k+1}+X+a=0$ Kwang Ho Kim, Jong Hyok Choe, Sihem Mesnager
2021/010 (PDF ) Compcrypt -- Lightweight ANS-based Compression and Encryption Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk
2021/009 (PDF ) Demand-aware Channel Topologies for Off-chain Blockchain Payments Julia Khamis, Ori Rottenstreich
2021/008 (PDF ) A Family of Nonlinear MDS Diffusion Layers over $\mathbb{F}_{2^{4n}}$ M. R. Mirzaee Shamsabad, S. M. Dehnavi
2021/007 (PDF ) Notes on a lattice-based proxy-oriented identity-based encryption with keyword search Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Cheng-Yi Lee
2021/006 (PDF ) Privacy-Preserving Privacy Profile Proposal Protocol Wyatt Howe, Andrei Lapets
2021/005 (PDF ) Aggregatable Distributed Key Generation Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu
2021/004 (PDF ) LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions Ismail San
2021/003 (PDF ) Ciphertext Policy Attribute Based Encryption for Arithmetic circuits Mahdi Mahdavi Oliaee, Zahra Ahmadian
2021/002 (PDF ) Can Lattice Signature be as Efficient as Lattice Encryption? Dingfeng Ye
2021/001 (PDF ) 2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product Michel Abdalla, David Pointcheval, Azam Soleimanian
2020/1620 (PDF ) Neural Aided Statistical Attack for Cryptanalysis Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan
2020/1619 (PDF ) Getting Rid of Linear Algebra in Number Theory Problems Paul Kirchner, Pierre-Alain Fouque
2020/1618 (PDF ) Proof-Carrying Data without Succinct Arguments Benedikt Bünz, Alessandro Chiesa, William Lin, Pratyush Mishra, Nicholas Spooner
2020/1617 (PDF ) Arguments of Knowledge via hidden order groups Steve Thakur
2020/1616 (PDF ) Algebraic Geometric Secret Sharing Schemes over Large Fields Are Asymptotically Threshold Fan Peng, Hao Chen, Chang-An Zhao
2020/1615 (PDF ) An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations Jiangtao Yuan, Guoai Xu, Guosheng Xu
2020/1614 (PDF ) SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gaži, Sarah Meiklejohn, Edgar Weippl
2020/1613 (PDF ) Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta
2020/1612 (PDF ) A New Efficient Hierarchical Multi-secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations Jiangtao Yuan, Jing Yang, Guoai Xu, Xingxing Jia, Fang-wei Fu, Chenyu Wang
2020/1611 (PDF ) SLAP: Simple Lattice-Based Private Stream Aggregation Protocol Jonathan Takeshita, Ryan Karl, Ting Gong, Taeho Jung
2020/1610 (PDF ) New directions in the ransomware phenomenon Mihai-Andrei Costandache, Marian-Stefan Mihalache, Emil Simion
2020/1609 (PDF ) A new method for secondary constructions of vectorial bent functions Amar Bapić, Enes Pasalic
2020/1608 (PDF ) Cryptographic competitions Daniel J. Bernstein
2020/1607 (PDF ) Manta: Privacy Preserving Decentralized Exchange Shumo Chu, Qiudong Xia, Zhenfei Zhang
2020/1606 (PDF ) PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, Hunter Qu
2020/1605 (PDF ) $P_4$-free Partition and Cover Numbers and Application Alexander R. Block, Simina Branzei, Hemanta K. Maji, Himanshi Mehta, Tamalika Mukherjee, Hai H. Nguyen
2020/1604 (PDF ) An Embedded Domain-Specific Language for Logical Circuit Descriptions with Applications to Garbled Circuits Andrei Lapets, Wyatt Howe, Ben Getchell, Frederick Jansen
2020/1603 (PDF ) One-Time Delegation of Unlinkable Signing Rights and Its Application Takashi Nishide
2020/1602 (PDF ) Speeding-up Ideal Lattice-Based Key Exchange Using a RSA/ECC Coprocessor Aurélien Greuet, Simon Montoya, Guénaël Renault
2020/1601 (PDF ) Adaptive layer-two dispute periods in blockchains Rami Khalil, Naranker Dulay
2020/1600 (PDF ) Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz
2020/1599 (PDF ) Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou
2020/1598 (PDF ) MILP Based Differential Attack on Round Reduced WARP Manoj Kumar, Tarun Yadav
2020/1597 (PDF ) A New Improved AES S-box With Enhanced Properties Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2020/1596 (PDF ) Batched Differentially Private Information Retrieval Kinan Dak Albab, Rawane Issa, Mayank Varia, Kalman Graffi
2020/1595 (PDF ) Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye
2020/1594 (PDF ) Bootstrapping on SEAL HyungChul Kang, Joon-Woo Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No
2020/1593 (PDF ) Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies Edward Eaton, David Jao, Chelsea Komlo, Youcef Mokrani
2020/1592 (PDF ) Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time Elaine Shi, Waqar Aqeel, Balakrishnan Chandrasekaran, Bruce Maggs
2020/1591 (PDF ) Game-Theoretic Fairness Meets Multi-Party Protocols: The Case of Leader Election Kai-Min Chung, T-H. Hubert Chan, Ting Wen, Elaine Shi
2020/1590 (PDF ) RandPiper -- Reconfiguration-Friendly Random Beacons with Quadratic Communication Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak
2020/1589 (PDF ) Unifying Presampling via Concentration Bounds Siyao Guo, Qian Li, Qipeng Liu, Jiapeng Zhang
2020/1588 (PDF ) Deniable Fully Homomorphic Encryption from LWE Shweta Agrawal, Shafi Goldwasser, Saleet Mossel
2020/1587 (PDF ) On the properties of the Boolean functions associated to the differential spectrum of general APN functions and their consequences Claude Carlet
2020/1586 (PDF ) CirC: Compiler infrastructure for proof systems, software verification, and more Alex Ozdemir, Fraser Brown, Riad S. Wahby
2020/1585 (PDF ) Semi-Regularity of Pairs of Boolean Polynomials Timothy J. Hodges, Hari R. Iyer
2020/1584 (PDF ) Post-Quantum Hash-Based Signatures for Secure Boot Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff
2020/1583 (PDF ) HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System Iraklis Symeonidis, Dragos Rotaru, Mustafa A. Mustafa, Bart Mennink, Bart Preneel, Panos Papadimitratos
2020/1582 (PDF ) A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong
2020/1581 (PDF ) Remark on the Security of CKKS Scheme in Practice Jung Hee Cheon, Seungwan Hong, Duhyeong Kim
2020/1580 (PDF ) Achieving State Machine Replication without Honest Players Conor McMenamin, Vanesa Daza, Matteo Pontecorvi
2020/1579 (PDF ) Efficient Verifiable Image Redacting based on zk-SNARKs Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh
2020/1578 (PDF ) An IND-CCA2 Attack Against the 1st- and 2nd-round Versions of NTS-KEM Tung Chou
2020/1577 (PDF ) Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning Alessandro Baccarini, Marina Blanton, Chen Yuan
2020/1576 (PDF ) How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free Changhui Hu, Jin Li, Zheli Liu, Xiaojie Guo, Yu Wei, Xuan Guang, Grigorios Loukides, Changyu Dong
2020/1575 (PDF ) (In)security of the Radio Interface in Sigfox Loïc Ferreira
2020/1574 (PDF ) Analysing Mining Machine Shutdown Price Shange Fu, Jiangshan Yu, Rafael Dowsley, Joseph Liu
2020/1571 (PDF ) Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server Olivier Blazy, Laura Brouilhet, Celine Chevalier, Patrick Towa, Ida Tucker, Damien Vergnaud
2020/1570 (PDF ) Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary Onur Gunlu, Rafael F. Schaefer
2020/1569 (PDF ) Optimal Communication Complexity of Authenticated Byzantine Agreement Atsuki Momose, Ling Ren
2020/1568 (PDF ) Compact Certificates of Collective Knowledge Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, Nickolai Zeldovich
2020/1567 (PDF ) Secure Decentralized Access Control Policy for Data Sharing in Smart Grid Yadi Ye, Leyou Zhang, Yi Mu, Wenting You
2020/1566 (PDF ) An efficient and provably secure authenticated key agreement scheme for mobile edge computing Mohammad Amin Rakeei, Farokhlagha Moazami
2020/1565 (PDF ) Achieving privacy and accountability in traceable digital currency Amira Barki, Aline Gouget
2020/1564 (PDF ) Prime Proof Protocol Anna M. Johnston, Rathna Ramesh
2020/1563 (PDF ) Verifiable Timed Signatures Made Practical Sri Aravinda KrishnanThyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder
2020/1562 (PDF ) A complete study of two classes of Boolean functions for homomorphic-friendly stream ciphers Claude Carlet, Pierrick Méaux
2020/1561 (PDF ) Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Online Fault Tolerance Ryan Karl, Jonathan Takeshita, Nirajan Koirla, Taeho Jung
2020/1560 (PDF ) Modified Cache Template Attack on AES Mahdi Esfahani, Hadi Soleimany, Mohammad Reza Aref
2020/1559 (PDF ) On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
2020/1558 (PDF ) Double-Odd Elliptic Curves Thomas Pornin
2020/1557 (PDF ) Efficient Quantum Public-Key Encryption From Learning With Errors Javad Doliskani
2020/1556 (PDF ) Honest Majority MPC with Abort with Minimal Online Communication Daniel Escudero, Anders Dalskov
2020/1555 (PDF ) Limits on the Efficiency of (Ring) LWE based Non-Interactive Key Exchange Siyao Guo, Pritish Kamath, Alon Rosen, Katerina Sotiraki
2020/1554 (PDF ) DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel Xiaolu Hou, Jakub Breier, Shivam Bhasin
2020/1553 (PDF ) A Novel Asymmetric Searchable Encryption Scheme with Granting search capability Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh
2020/1552 (PDF ) Threshold Password-Hardened Encryption Services Julian Brost, Christoph Egger, Russell W. F. Lai, Fritz Schmid, Dominique Schröder, Markus Zoppelt
2020/1551 (PDF ) Multi-Client Oblivious RAM with Poly-Logarithmic Communication Sherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta
2020/1550 (PDF ) Foundations of Ring Sampling Viktoria Ronge, Christoph Egger, Russell W. F. Lai, Dominique Schröder, Hoover H. F. Yin
2020/1549 (PDF ) High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimization Yongwoo Lee, Joon-Woo Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, HyungChul Kang
2020/1548 (PDF ) CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
2020/1547 (PDF ) Two-server Distributed ORAM with Sublinear Computation and Constant Rounds Ariel Hamlin, Mayank Varia
2020/1546 (PDF ) Privacy-Preserving Epidemiological Modeling on Mobile Graphs Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh
2020/1545 (PDF ) A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications Howard M. Heys
2020/1544 (PDF ) PAS-TA-U: PASsword-based Threshold Authentication with PASsword Update Rachit Rawat, Mahabir Prasad Jhanwar
2020/1543 (PDF ) CovidBloc: A Blockchain Powered Exposure Database for Contact Tracing Deepraj Pandey, Nandini Agrawal, Mahabir Prasad Jhanwar
2020/1542 (PDF ) Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version) Anubhab Baksi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay, Vinay B. Y. Kumar
2020/1541 (PDF ) PsiBench: Pragmatic Benchmark of Two-party Private Set Intersection. Ziyuan Liang, Weiran Liu, Hanwen Feng, Feng Han, Liqiang Peng, Li Peng, Chao Li, Guorui Xu, Lei Zhang, Fan Zhang
2020/1540 (PDF ) On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem Martin R. Albrecht, Nadia Heninger
2020/1539 (PDF ) Information-Theoretic Security of Cryptographic Channels Marc Fischlin, Felix Günther, Philipp Muth
2020/1538 (PDF ) Homological Characterization of bounded $F_2$-regularity Timothy J. Hodges, Sergio Molina
2020/1536 (PDF ) Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon
2020/1535 (PDF ) Designer Primes Anna M. Johnston
2020/1534 (PDF ) Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition SeongHyuck Lim, JongHyeok Lee, Dong-Guk Han
2020/1533 (PDF ) On the Security of Homomorphic Encryption on Approximate Numbers Baiyu Li, Daniele Micciancio
2020/1532 (PDF ) Oblivious Pseudorandom Functions from Isogenies Dan Boneh, Dmitry Kogan, Katharine Woo
2020/1531 (PDF ) Reconstructing with Less: Leakage Abuse Attacks in Two-Dimensions Evangelia Anna Markatou, Francesca Falzon, William Schor, Roberto Tamassia
2020/1530 (PDF ) Security Analysis of Public Key Searchable Encryption Schemes against Injection Attacks Arian Arabnouri, Reza Ebrahimi Atani, Shiva Azizzadeh
2020/1529 (PDF ) Bounds on the nonlinearity of differentially uniform functions by means of their image set size, and on their distance to affine functions Claude Carlet
2020/1528 (PDF ) On the Concurrent Composition of Quantum Zero-Knowledge Prabhanjan Ananth, Kai-Min Chung, Rolando L. La Placa
2020/1527 (PDF ) Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier Jonathan Bootle, Alessandro Chiesa, Siqi Liu
2020/1526 (PDF ) Flexible and Efficient Verifiable Computation on Encrypted Data Alexandre Bois, Ignacio Cascudo, Dario Fiore, Dongwoo Kim
2020/1525 (PDF ) BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, Christian Janson
2020/1524 (PDF ) Nonce-Misuse Security of the SAEF Authenticated Encryption mode Elena Andreeva, Amit Singh Bhati, Damian Vizar
2020/1523 (PDF ) Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng
2020/1522 (PDF ) Reducing Participation Costs via Incremental Verification for Ledger Systems Weikeng Chen, Alessandro Chiesa, Emma Dauterman, Nicholas P. Ward
2020/1521 (PDF ) Delegated RingCT: faster anonymous transactions Rui Morais, Paul Crocker, Simao Melo de Sousa
2020/1520 (PDF ) The SQALE of CSIDH: Sublinear Vélu Quantum-resistant isogeny Action with Low Exponents Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, Francisco Rodríguez-Henríquez
2020/1519 (PDF ) Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2 Sven Schäge, Jörg Schwenk, Sebastian Lauer
2020/1518 (PDF ) Botnet IND: About Botnets of Botless IoT Devices Ben Nassi, Yair Meidan, Dudi Nassi, Asaf Shabtai, Yuval Elovici
2020/1517 (PDF ) Constructing Locally Leakage-resilient Linear Secret-sharing Schemes Hemanta Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
2020/1516 (PDF ) How to compute all Pointproofs Alin Tomescu
2020/1515 (PDF ) The classification of quadratic APN functions in 7 variables Konstantin Kalgin, Valeriya Idrisova
2020/1514 (PDF ) Improved privacy-preserving training using fixed-Hessian minimisation Tabitha Ogilvie, Rachel Player, Joe Rowell
2020/1513 (PDF ) Indifferentiable hashing from Elligator 2 Mike Hamburg
2020/1512 (PDF ) Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking Jan Pennekamp, Patrick Sapel, Ina Berenice Fink, Simon Wagner, Sebastian Reuter, Christian Hopmann, Klaus Wehrle, Martin Henze
2020/1511 (PDF ) Balancing Privacy and Accountability in Blockchain Identity Management Ivan Damgård, Chaya Ganesh, Hamidreza Khoshakhlagh, Claudio Orlandi, Luisa Siniscalchi
2020/1510 (PDF ) Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP Jun Yan
2020/1509 (PDF ) Single-Message Credential-Hiding Login Kevin Lewi, Payman Mohassel, Arnab Roy
2020/1508 (PDF ) A Combinatorial Approach to Quantum Random Functions Nico Döttling, Giulio Malavolta, Sihang Pu
2020/1507 (PDF ) Improvements to RSA key generation and CRT on embedded devices Mike Hamburg, Mike Tunstall, Qinglai Xiao
2020/1506 (PDF ) Recovering cryptographic keys from partial information, by example Gabrielle De Micheli, Nadia Heninger
2020/1505 (PDF ) Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model Mariusz Jurkiewicz
2020/1504 (PDF ) The Age of Testifying Wearable Devices: The Case of Intoxication Detection Ben Nassi, Lior Rokach, Yuval Elovici
2020/1503 (PDF ) Recovery Attack on Bob's Secrets in CRYSTALS-KYBER and SABER Satoshi Okada, Yuntao Wang
2020/1502 (PDF ) Witness Encryption from Garbled Circuit and Multikey Fully Homomorphic Encryption Techniques Kamil Kluczniak
2020/1501 (PDF ) PANCAKE: Frequency Smoothing for Encrypted Data Stores Paul Grubbs, Anurag Khandelwal, Marie-Sarah Lacharité, Lloyd Brown, Lucy Li, Rachit Agarwal, Thomas Ristenpart
2020/1500 (PDF ) Oblivious Transfer is in MiniQCrypt Alex B. Grilo, Huijia Lin, Fang Song, Vinod Vaikuntanathan
2020/1499 (PDF ) Analysing the HPKE Standard Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel
2020/1498 (PDF ) EPID with Malicious Revocation Olivier Sanders, Jacques Traoré
2020/1497 (PDF ) A note on the calculation of some functions in finite fields: Tricks of the Trade Michael Scott
2020/1496 (PDF ) Pseudo-Free Families and Cryptographic Primitives Mikhail Anokhin
2020/1495 (PDF ) CloudMoles: Surveillance of Power-Wasting Activities by Infiltrating Undercover Sensors Seyedeh Sharareh Mirzargar, Andrea Guerrieri, Mirjana Stojilović
2020/1494 (PDF ) Nonintrusive and Adaptive Monitoring for Locating Voltage Attacks in Virtualized FPGAs Seyedeh Sharareh Mirzargar, Gaiëtan Renault, Andrea Guerrieri, Mirjana Stojilović
2020/1493 (PDF ) Verified fast formulas for control bits for permutation networks Daniel J. Bernstein
2020/1492 (PDF ) Automated ciphertext-only attack on the Wheatstone Cryptograph and related devices Thomas Kaeding
2020/1491 (PDF ) Partitioning Oracle Attacks Julia Len, Paul Grubbs, Thomas Ristenpart
2020/1490 (PDF ) Unlinkable and Invisible γ-Sanitizable Signatures Angèle Bossuat, Xavier Bultel
2020/1489 (PDF ) On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger Christian Badertscher, Julia Hesse, Vassilis Zikas
2020/1488 (PDF ) General Properties of Quantum Bit Commitments Jun Yan
2020/1487 (PDF ) One-Way Functions Imply Secure Computation in a Quantum World James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
2020/1486 (PDF ) CommiTEE: An Efficient and Secure Commit-Chain Protocol using TEEs Andreas Erwig, Sebastian Faust, Siavash Riahi, Tobias Stöckert
2020/1485 (PDF ) Quantum Search for Lightweight Block Ciphers: GIFT, SKINNY, SATURNIN Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya
2020/1484 (PDF ) Cryptanalysis of Aggregate $\Gamma$-Signature and Practical Countermeasures in Application to Bitcoin Goichiro Hanaoka, Kazuo Ohta, Yusuke Sakai, Bagus Santoso, Kaoru Takemure, Yunlei Zhao
2020/1483 (PDF ) A Low-Depth Homomorphic Circuit for Logistic Regression Model Training Eric Crockett
2020/1482 (PDF ) Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber Andrea Basso, Sujoy Sinha Roy
2020/1481 (PDF ) Design and implementation of HElib: a homomorphic encryption library Shai Halevi, Victor Shoup
2020/1480 (PDF ) Proofs of non-Supermajority: the missing link for two-phase BFT with responsive view-change and linear complexity Christophe Levrat, Matthieu Rambaud
2020/1479 (PDF ) Automatic Privacy-Preserving Contact Tracing of Novel Coronavirus Infection by Cloud-Enabled WBAN using Blockchain Anupam Pattanayak, Subhasish Dhal, Sourav Kanti Addya
2020/1478 (PDF ) Robust Subgroup Multi-Signatures for Consensus David Galindo, Jia Liu
2020/1477 (PDF ) Machine-checking the universal verifiability of ElectionGuard Thomas Haines, Rajeev Gore, Jack Stodart
2020/1476 (PDF ) Carbon Trading with Blockchain Andreas Richardson, Jiahua Xu
2020/1475 (PDF ) Delegate and Verify the Update Keys of Revocable Identity-Based Encryption Kwangsu Lee
2020/1474 (PDF ) New method of verifying cryptographic protocols based on the process model A. M. Mironov
2020/1473 (PDF ) Lighthouses: A Warning System for Super-Spreader Events Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/1472 (PDF ) Enhancing Code Based Zero-knowledge Proofs using Rank Metric Emanuele Bellini, Philippe Gaborit, Alexandros Hasikos, Victor Mateu
2020/1471 (PDF ) On The Round Complexity of Secure Quantum Computation James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma
2020/1470 (PDF ) TaiJi: Longest Chain Availability with BFT Fast Confirmation Songze Li, David Tse
2020/1469 (PDF ) Succinct Blind Quantum Computation Using a Random Oracle Jiayu Zhang
2020/1468 (PDF ) Secure Cloud Auditing with Efficient Ownership Transfer (Full Version) Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo
2020/1467 (PDF ) Making the BKW Algorithm Practical for LWE Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
2020/1466 (PDF ) Load Balancing for Sharded Blockchains Naoya Okanami, Ryuya Nakamura, Takashi Nishide
2020/1465 (PDF ) Cryptanalysis of an Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network Mohammad Amin Rakeei, Farokhlagha Moazami
2020/1464 (PDF ) Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort Bar Alon, Hao Chung, Kai-Min Chung, Mi-Ying Huang, Yi Lee, Yu-Ching Shen
2020/1463 (PDF ) Observations on the Tightness of the Security Bounds of GIFT-COFB and HyENA Mustafa Khairallah
2020/1462 (PDF ) Ovid: Message-based Automatic Contact Tracing Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/1461 (PDF ) Lower bounds for the depth of modular squaring Benjamin Wesolowski, Ryan Williams
2020/1460 (PDF ) The MAGIC Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction Michael Kounavis, David Durham, Sergej Deutsch, Krystian Matusiewicz, David Wheeler
2020/1459 (PDF ) Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates Mustafa Khairallah, Thomas Peyrin, Anupam Chattopadhyay
2020/1458 (PDF ) Analysis of Ascon, DryGASCON, and Shamash Permutations Cihangir Tezcan
2020/1457 (PDF ) The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3 Patrick Longa, Wen Wang, Jakub Szefer
2020/1456 (PDF ) How to Abuse and Fix Authenticated Encryption Without Key Commitment Ange Albertini, Thai Duong, Shay Gueron, Stefan Kölbl, Atul Luykx, Sophie Schmieg
2020/1455 (PDF ) An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage Yan Yan, Elisabeth Oswald, Srinivas Vivek
2020/1454 (PDF ) Rate-1 Quantum Fully Homomorphic Encryption Orestis Chardouvelis, Nico Doettling, Giulio Malavolta
2020/1453 (PDF ) New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system Jing Yang, Fang-Wei Fu
2020/1452 (PDF ) ASAP: Algorithm Substitution Attacks on Cryptographic Protocols Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth
2020/1451 (PDF ) Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
2020/1450 (PDF ) Subversion-Resilient Enhanced Privacy ID Antonio Faonio, Dario Fiore, Luca Nizzardo, Claudio Soriente
2020/1449 (PDF ) More Efficient Amortization of Exact Zero-Knowledge Proofs for LWE Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/1448 (PDF ) Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/1447 (PDF ) Compressed $\Sigma$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures Thomas Attema, Ronald Cramer, Matthieu Rambaud
2020/1446 (PDF ) Line-Point Zero Knowledge and Its Applications Samuel Dittmer, Yuval Ishai, Rafail Ostrovsky
2020/1445 (PDF ) Observations on COMET Daniel J. Bernstein, Henri Gilbert, Meltem Sonmez Turan
2020/1444 (PDF ) On known constructions of APN and AB functions and their relation to each other Marco Calderini, Lilya Budaghyan, Claude Carlet
2020/1443 (PDF ) DPaSE: Distributed Password-Authenticated Symmetric Encryption Poulami Das, Julia Hesse, Anja Lehmann
2020/1442 (PDF ) Analysis of Multivariate Encryption Schemes: Application to Dob Morten Øygarden, Patrick Felke, Håvard Raddum
2020/1441 (PDF ) PayMo: Payment Channels For Monero Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Fritz Schmidt, Dominique Schröder
2020/1440 (PDF ) SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures Ralph Ankele, Kai Nahrgang, Branka Stojanovic, Atta Badii
2020/1439 (PDF ) Cryptographic Vulnerabilities and Other Shortcomings of the Nextcloud Server Side Encryption as implemented by the Default Encryption Module Kevin "Kenny" Niehage
2020/1438 (PDF ) Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers Ravi Anand, Subhamoy Maitra, Arpita Maitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay
2020/1437 (PDF ) Round-Optimal and Communication-Efficient Multiparty Computation Michele Ciampi, Rafail Ostrovsky, Hendrik Waldner, Vassilis Zikas
2020/1436 (PDF ) Removable Weak Keys for Discrete Logarithm Based Cryptography Michael John Jacobson Jr., Prabhat Kushwaha
2020/1435 (PDF ) Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2020/1434 (PDF ) Towards Multiparty Computation Withstanding Coercion of All Parties Ran Canetti, Oxana Poburinnaya
2020/1433 (PDF ) Interactive Proofs for Social Graphs Liran Katzir, Clara Shikhelman, Eylon Yogev
2020/1432 (PDF ) CP-ABE for Circuits (and more) in the Symmetric Key Setting Shweta Agrawal, Shota Yamada
2020/1431 (PDF ) Information-Theoretic 2-Round MPC without Round Collapsing: Adaptive Security, and More Huijia Lin, Tianren Liu, Hoeteck Wee
2020/1430 (PDF ) Revisiting Fairness in MPC: Polynomial Number of Parties and General Adversarial Structures Dana Dachman-Soled
2020/1429 (PDF ) On Computational Shortcuts for Information-Theoretic PIR Matthew M. Hong, Yuval Ishai, Victor I. Kolobov, Russell W. F. Lai
2020/1428 (PDF ) On Statistical Security in Two-Party Computation Dakshita Khurana, Muhammad Haris Mughees
2020/1427 (PDF ) Barriers for Succinct Arguments in the Random Oracle Model Alessandro Chiesa, Eylon Yogev
2020/1426 (PDF ) Linear-Time Arguments with Sublinear Verification from Tensor Codes Jonathan Bootle, Alessandro Chiesa, Jens Groth
2020/1425 (PDF ) Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
2020/1424 (PDF ) Improved Key Recovery of the HFEv- Signature Scheme Chengdong Tao, Albrecht Petzoldt, Jintai Ding
2020/1423 (PDF ) Quantum encryption with certified deletion Anne Broadbent, Rabib Islam
2020/1422 (PDF ) Non-interactive classical verification of quantum computation Gorjan Alagic, Andrew M. Childs, Alex B. Grilo, Shih-Han Hung
2020/1421 (PDF ) Weakly Extractable One-Way Functions Nir Bitansky, Noa Eizenstadt, Omer Paneth
2020/1420 (PDF ) Functional Encryption for Quadratic Functions from k-Lin, Revisited Hoeteck Wee
2020/1419 (PDF ) The Resiliency of MPC with Low Interaction: The Benefit of Making Errors Benny Applebaum, Eliran Kachlon, Arpita Patra
2020/1418 (PDF ) Quantum Period Finding against Symmetric Primitives in Practice Xavier Bonnetain, Samuel Jaques
2020/1417 (PDF ) Correlated Pseudorandom Functions from Variable-Density LPN Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
2020/1416 (PDF ) Further on the Construction of Feedback Shift Registers with Maximum Strong Linear Complexity Congwei Zhou, Bin Hu, Jie Guan
2020/1415 (PDF ) Secure Graph Database Search with Oblivious Filter Jamie Cui, Chaochao Chen, Alex X. Liu, Li Wang
2020/1414 (PDF ) New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming (Full Version) Anubhab Baksi
2020/1413 (PDF ) Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers Daniele Micciancio, Jessica Sorrell
2020/1412 (PDF ) Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields Antigoni Polychroniadou, Yifan Song
2020/1411 (PDF ) Transparent Error Correcting in a Computationally Bounded World Ofer Grossman, Justin Holmgren, Eylon Yogev
2020/1410 (PDF ) Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions Carsten Baum, Alex J. Malozemoff, Marc B. Rosen, Peter Scholl
2020/1409 (PDF ) The Convergence of Slide-type Reductions Michael Walter
2020/1408 (PDF ) On Broadcast in Generalized Network and Adversarial Models Chen-Da Liu-Zhang, Varun Maram, Ueli Maurer
2020/1407 (PDF ) Computing Square Roots Faster than the Tonelli-Shanks/Bernstein Algorithm Palash Sarkar
2020/1406 (PDF ) How not to VoteAgain: Pitfalls of Scalable Coercion-Resistant E-Voting Thomas Haines, Johannes Mueller
2020/1405 (PDF ) Grover on GIFT Kyoungbae Jang, Hyunjun Kim, Siwoo Eum, Hwajeong Seo
2020/1404 (PDF ) A Practical Key-Recovery Attack on 805-Round Trivium Chen-Dong Ye, Tian Tian
2020/1403 (PDF ) A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross
2020/1402 (PDF ) SKINNY with Scalpel - Comparing Tools for Differential Analysis Stéphanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard, Charles Prud'homme
2020/1401 (PDF ) Quantum Garbled Circuits Zvika Brakerski, Henry Yuen
2020/1400 (PDF ) Transferable E-cash: A Cleaner Model and the First Practical Instantiation Balthazar Bauer, Georg Fuchsbauer, Chen Qian
2020/1399 (PDF ) A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption Diana Maimut, George Teseleanu
2020/1398 (PDF ) Minimal binary linear codes - a general framework based on bent concatenation Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei
2020/1397 (PDF ) NTT Multiplication for NTT-unfriendly Rings Chi-Ming Marvin Chung, Vincent Hwang, Matthias J. Kannwischer, Gregor Seiler, Cheng-Jhih Shih, Bo-Yin Yang
2020/1396 (PDF ) Efficient Privacy Preserving Logistic Regression Inference and Training Kyoohyung Han, Jinhyuck Jeong, Jung Hoon Sohn, Yongha Son
2020/1395 (PDF ) Post-Quantum Multi-Party Computation Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta
2020/1394 (PDF ) Practical and Secure Circular Range Search on Private Spatial Data Zhihao Zheng, Jiachen Shen, Zhenfu Cao
2020/1393 (PDF ) On the Effectiveness of Time Travel to Inject COVID-19 Alerts Vincenzo Iovino, Serge Vaudenay, Martin Vuagnoux
2020/1392 (PDF ) Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, Mayank Rathee
2020/1391 (PDF ) Interactive Proofs for Quantum Black-Box Computations Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang, Kang Yang
2020/1390 (PDF ) A Survey of ECDSA Threshold Signing Jean-Philippe Aumasson, Adrian Hamelink, Omer Shlomovits
2020/1389 (PDF ) Key Mismatch Attack on NewHope Revisited Jan Vacek, Jan Václavek
2020/1388 (PDF ) Signcryption in a Quantum World Sanjit Chatterjee, Tapas Pandit, Shravan Kumar Parshuram Puria, Akash Shah
2020/1386 (PDF ) Decentralized Multi-Authority ABE for DNFs from LWE Pratish Datta, Ilan Komargodski, Brent Waters
2020/1385 (PDF ) An Alternative Approach for SIDH Arithmetic Cyril Bouvier, Laurent Imbert
2020/1384 (PDF ) A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa
2020/1383 (PDF ) Novel Single-Trace ML Profiling Attacks on NIST 3 Round candidate Dilithium Il-Ju Kim, Tae-Ho Lee, Jaeseung Han, Bo-Yeon Sim, Dong-Guk Han
2020/1382 (PDF ) Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE Tapas Pal, Ratna Dutta
2020/1381 (PDF ) PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates Jia-Chng Loh, Geong-Sen Poh, Jason H. M. Ying, Jia Xu, Hoon Wei Lim, Jonathan Pan, Weiyang Wong
2020/1380 (PDF ) Fast Computing of Quadratic Forms of HFE Polynomials over fields of characteristic two Borja Gómez
2020/1378 (PDF ) Correlation-Intractable Hash Functions via Shift-Hiding Alex Lombardi, Vinod Vaikuntanathan
2020/1377 (PDF ) When to Barrett reduce in the inverse NTT Bas Westerbaan
2020/1376 (PDF ) Stronger bounds on the cost of computing Groebner bases for HFE systems Elisa Gorla, Daniela Mueller, Christophe Petit
2020/1375 (PDF ) Semi-regular sequences and other random systems of equations M. Bigdeli, E. De Negri, M. M. Dizdarevic, E. Gorla, R. Minko, S. Tsakou
2020/1374 (PDF ) ELM : A Low-Latency and Scalable Memory Encryption Scheme Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma
2020/1373 (PDF ) Transciphering, using FiLIP and TFHE for an efficient delegation of computation Clément Hoffmann, Pierrick Méaux, Thomas Ricosset
2020/1372 (PDF ) VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
2020/1371 (PDF ) Privacy Amplification with Tamperable Memory via Non-malleable Two-source Extractors Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
2020/1370 (PDF ) A discretization attack Daniel J. Bernstein
2020/1369 (PDF ) Multiplication over Extension Fields for Pairing-based Cryptography: an Hardware Point of View Arthur Lavice, Nadia El Mrabet, Alexandre Berzati, Jean-Baptiste Rigaud
2020/1368 (PDF ) On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices Melissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert, Kostas Papagiannopoulos, Vincent Verneuil
2020/1367 (PDF ) Costs of an Attack Against Proof-of-Work Loïc Etienne
2020/1366 (PDF ) LURK: Server-Controlled TLS Delegation Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan
2020/1365 (PDF ) Evaluation Methods for Chebyshev Polynomials Zhengjun Cao, Lihua Liu, Leming Hong
2020/1364 (PDF ) Security of Hybrid Key Encapsulation Matthew Campagna, Adam Petcher
2020/1363 (PDF ) Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal
2020/1362 (PDF ) Lattice-Based Proof-of-Work for Post-Quantum Blockchains Rouzbeh Behnia, Eamonn W. Postlethwaite, Muslum Ozgur Ozmen, Attila Altay Yavuz
2020/1361 (PDF ) Tight adaptive reprogramming in the QROM Alex B. Grilo, Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz
2020/1360 (PDF ) Incremental Cryptography Revisited: PRFs, Nonces and Modular Design Vivek Arte, Mihir Bellare, Louiza Khati
2020/1359 (PDF ) On two fundamental problems on APN power functions Lilya Budaghyan, Marco Calderini, Claude Carlet, Diana Davidova, Nikolay Kaleyski
2020/1358 (PDF ) Toward Provable One Way Functions Hagar Dolev, Shlomi Dolev
2020/1357 (PDF ) Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Guiyi Wei
2020/1356 (PDF ) Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers Maria Eichlseder, Gregor Leander, Shahram Rasoolzadeh
2020/1355 (PDF ) Modular Lagrange Interpolation of the Mod Function for Bootstrapping of Approximate HE Charanjit S. Jutla, Nathan Manohar
2020/1354 (PDF ) Gadget-Based iNTRU Lattice Trapdoors Nicholas Genise, Baiyu Li
2020/1353 (PDF ) Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu
2020/1352 (PDF ) Reducing Round Complexity of Byzantine Broadcast Linda Chen, Jun Wan
2020/1351 (PDF ) Tight State-Restoration Soundness in the Algebraic Group Model Ashrujit Ghoshal, Stefano Tessaro
2020/1350 (PDF ) Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein
2020/1349 (PDF ) Key Dependency of Differentials: Experiments in the Differential Cryptanalysis of Block Ciphers Using Small S-boxes Howard M. Heys
2020/1348 (PDF ) Vetted Encryption Martha Norberg Hovd, Martijn Stam
2020/1347 (PDF ) A Systematic Appraisal of Side Channel Evaluation Strategies Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sebastien Duval, Christophe Giraud, Eliane Jaulmes, Francois Koeune, Elisabeth Oswald, Francois-Xavier Standaert, Carolyn Whitnall
2020/1346 (PDF ) SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts Shlomi Dolev, Ziyu Wang
2020/1345 (PDF ) Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
2020/1344 (PDF ) Indifferentiability of SKINNY-HASH Internal Functions Akinori Hosoyamada, Tetsu Iwata
2020/1343 (PDF ) Improved Cryptanalysis of UOV and Rainbow Ward Beullens
2020/1342 (PDF ) Forward and Backward Private Conjunctive Searchable Symmetric Encryption Sikhar Patranabis, Debdeep Mukhopadhyay
2020/1341 (PDF ) Zero-Communication Reductions Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran
2020/1340 (PDF ) Homomorphic Evaluation of the SM4 Yu Xue
2020/1339 (PDF ) New Approaches for Quantum Copy-Protection Scott Aaronson, Jiahui Liu, Qipeng Liu, Mark Zhandry, Ruizhe Zhang
2020/1338 (PDF ) Optimized Architectures for Elliptic Curve Cryptography over Curve448 Mojtaba Bisheh Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
2020/1337 (PDF ) Multiplicative Depth Independent & Efficient MPC in the Presence of Mixed Adversary Achintya Desai, Shubham Raj, Kannan Srinathan
2020/1336 (PDF ) Faster Characteristic Three Polynomial Multiplication and Its Application to NTRU Prime Decapsulation Esra Yeniaras, Murat Cenk
2020/1335 (PDF ) Transciphering Framework for Approximate Homomorphic Encryption (Full Version) Jihoon Cho, Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Joohee Lee, Jooyoung Lee, Dukjae Moon, Hyojin Yoon
2020/1334 (PDF ) One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
2020/1333 (PDF ) Updateable Inner Product Argument with Logarithmic Verifier and Applications Vanesa Daza, Carla Ràfols, Alexandros Zacharakis
2020/1332 (PDF ) Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting Ashley Fraser, Elizabeth A. Quaglia
2020/1331 (PDF ) Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg
2020/1330 (PDF ) Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security Anders Dalskov, Daniel Escudero, Marcel Keller
2020/1329 (PDF ) Adaptively secure Threshold Symmetric-key Encryption Pratyay Mukherjee
2020/1328 (PDF ) SWiSSSE: System-Wide Security for Searchable Symmetric Encryption Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi
2020/1327 (PDF ) On The Insider Security of MLS Joël Alwen, Daniel Jost, Marta Mularczyk
2020/1326 (PDF ) Towards Fine-Grained One-Way Functions from Strong Average-Case Hardness Chris Brzuska, Geoffroy Couteau
2020/1325 (PDF ) On Self-Equivalence Encodings in White-Box Implementations Adrián Ranea, Bart Preneel
2020/1324 (PDF ) Separation Results for Boolean Function Classes Aniruddha Biswas, Palash Sarkar
2020/1323 (PDF ) CSI-RAShi: Distributed key generation for CSIDH Ward Beullens, Lucas Disson, Robi Pedersen, Frederik Vercauteren
2020/1322 (PDF ) Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication Sebastian Paul, Patrik Scheible
2020/1321 (PDF ) Provably Quantum-Secure Tweakable Block Ciphers Akinori Hosoyamada, Tetsu Iwata
2020/1320 (PDF ) WARP : Revisiting GFN for Lightweight 128-bit Block Cipher Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri
2020/1319 (PDF ) On Succinct Arguments and Witness Encryption from Groups Ohad Barta, Yuval Ishai, Rafail Ostrovsky, David J. Wu
2020/1318 (PDF ) Poppins: A Direct Construction for Asymptotically Optimal zkSNARKs Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno
2020/1317 (PDF ) Improved Rectangle Attacks on SKINNY and CRAFT Hosein Hadipour, Nasour Bagheri, Ling Song
2020/1316 (PDF ) Security of Public Key Encryption against Resetting Attacks Juliane Krämer, Patrick Struck
2020/1315 (PDF ) On Index Calculus Algorithms for Subfield Curves Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit
2020/1314 (PDF ) Secure Software Leasing from Standard Assumptions Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2020/1313 (PDF ) Payment Trees: Low Collateral Payments for Payment Channel Networks Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2020/1312 (PDF ) Individual Simulations Yi Deng
2020/1311 (PDF ) Cryptanalysis of Feistel-Based Format-Preserving Encryption Orr Dunkelman, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya
2020/1310 (PDF ) A note on the low order assumption in class groups of imaginary quadratic number fields Karim Belabas, Thorsten Kleinjung, Antonio Sanso, Benjamin Wesolowski
2020/1309 (PDF ) Provable Security Analysis of Decentralized Cryptographic Contact Tracing Noel Danz, Oliver Derwisch, Anja Lehmann, Wenzel Puenter, Marvin Stolle, Joshua Ziemann
2020/1308 (PDF ) On the Success Probability of Solving Unique SVP via BKZ Eamonn W. Postlethwaite, Fernando Virdia
2020/1307 (PDF ) Multiparty Cardinality Testing for Threshold Private Set Intersection Pedro Branco, Nico Döttling, Sihang Pu
2020/1306 (PDF ) Simulation Extractable Versions of Groth’s zk-SNARK Revisited Oussama Amine, Karim Baghery, Zaira Pindado, Carla Ràfols
2020/1305 (PDF ) On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work Kai-Min Chung, Serge Fehr, Yu-Hsuan Huang, Tai-Ning Liao
2020/1304 (PDF ) QCB: Efficient Quantum-secure Authenticated Encryption Ritam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin
2020/1303 (PDF ) Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer Joppe W. Bos, Joost Renes, Christine van Vredendaal
2020/1302 (PDF ) TMVP-based Multiplication for Polynomial Quotient Rings and Application to Saber on ARM Cortex-M4 İrem Keskinkurt Paksoy, Murat Cenk
2020/1301 (PDF ) Robust Property-Preserving Hash Functions for Hamming Distance and More Nils Fleischhacker, Mark Simkin
2020/1300 (PDF ) Byzantine Ordered Consensus without Byzantine Oligarchy Yunhao Zhang, Srinath Setty, Qi Chen, Lidong Zhou, Lorenzo Alvisi
2020/1298 (PDF ) Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Čapkun
2020/1297 (PDF ) On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software Lauren De Meyer, Elke De Mulder, Michael Tunstall
2020/1296 (PDF ) Concrete quantum cryptanalysis of binary elliptic curves Gustavo Banegas, Daniel J. Bernstein, Iggy van Hoof, Tanja Lange
2020/1295 (PDF ) Optimized Software Implementations for theLightweight Encryption Scheme ForkAE Arne Deprez, Elena Andreeva, Jose Maria Bermudo Mera, Angshuman Karmakar, Antoon Purnal
2020/1294 (PDF ) Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem
2020/1293 (PDF ) I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis Lichao Wu, Guilherme Perin, Stjepan Picek
2020/1292 (PDF ) Optimal Oblivious Parallel RAM Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Runting Shi
2020/1291 (PDF ) Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model Bernardo David, Rafael Dowsley
2020/1290 (PDF ) FORTIS: Selfish Mining Mitigation by (FOR)geable (TI)me(S)tamps Osman Biçer, Alptekin Küpçü
2020/1289 (PDF ) Sword: An Opaque Blockchain Protocol Farid Elwailly
2020/1288 (PDF ) Improved attacks against key reuse in learning with errors key exchange Nina Bindel, Douglas Stebila, Shannon Veitch
2020/1287 (PDF ) Multivariate Cryptographic Primitive based on the product of the roots of a polynomial over a field Borja Gómez
2020/1286 (PDF ) Secure Two-Party Quantum Computation Over Classical Channels Michele Ciampi, Alexandru Cojocaru, Elham Kashefi, Atul Mantri
2020/1285 (PDF ) Multi-Input Quadratic Functional Encryption from Pairings Shweta Agrawal, Rishab Goyal, Junichi Tomida
2020/1284 (PDF ) Entropy Estimation of Physically Unclonable Functions with Offset Error Mitsuru Shiozaki, Yohei Hori, Takeshi Fujino
2020/1283 (PDF ) Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem Craig Costello, Michael Meyer, Michael Naehrig
2020/1282 (PDF ) Compact Authenticated Key Exchange in the Quantum Random Oracle Model Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang
2020/1281 (PDF ) Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees Matthew Weidner, Martin Kleppmann, Daniel Hugenroth, Alastair R. Beresford
2020/1280 (PDF ) DORY: An Encrypted Search System with Distributed Trust Emma Dauterman, Eric Feng, Ellen Luo, Raluca Ada Popa, Ion Stoica
2020/1279 (PDF ) Tightly-Secure Authenticated Key Exchange, Revisited Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge
2020/1278 (PDF ) Compact Dilithium Implementations on Cortex-M3 and Cortex-M4 Denisa O. C. Greconici, Matthias J. Kannwischer, Amber Sprenkels
2020/1277 (PDF ) A Simple Protocol to Compare EMFI Platforms J. Toulemont, N. Ouldei-Tebina, J. M. Galliere, P. Nouet, E. Bourbao, P. Maurine
2020/1276 (PDF ) Lattice-based Key Sharing Schemes - A Survey Prasanna Ravi, James Howe, Anupam Chattopadhyay, Shivam Bhasin
2020/1275 (PDF ) Quarks: Quadruple-efficient transparent zkSNARKs Srinath Setty, Jonathan Lee
2020/1274 (PDF ) Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments Jonathan Lee
2020/1273 (PDF ) Classical Verification of Quantum Computations with Efficient Verifier Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa
2020/1272 (PDF ) Bent Functions from Cellular Automata Maximilien Gadouleau, Luca Mariot, Stjepan Picek
2020/1271 (PDF ) (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version) Alexandros Bakas, Antonis Michalas
2020/1270 (PDF ) Classical vs Quantum Random Oracles Takashi Yamakawa, Mark Zhandry
2020/1269 (PDF ) PRINCEv2 - More Security for (Almost) No Overhead Dušan Božilov, Maria Eichlseder, Miroslav Kneževic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer
2020/1268 (PDF ) A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay
2020/1267 (PDF ) Fault Attacks In Symmetric Key Cryptosystems Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha
2020/1266 (PDF ) Multi-Party Functional Encryption Shweta Agrawal, Rishab Goyal, Junichi Tomida
2020/1265 (PDF ) Revisiting ECM on GPUs Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu
2020/1263 (PDF ) Improved Fault Analysis on SIMECK Ciphers Duc-Phong Le, Rongxing Lu, Ali A. Ghorbani
2020/1262 (PDF ) Multi-stage Proof-of-Works: Properties and Vulnerabilities Paolo D'Arco, Zahra Ebadi Ansaroudi, Francesco Mogavero
2020/1261 (PDF ) MuSig2: Simple Two-Round Schnorr Multi-Signatures Jonas Nick, Tim Ruffing, Yannick Seurin
2020/1260 (PDF ) Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell
2020/1259 (PDF ) Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation Yibiao Lu, Bingsheng Zhang, Hong-Sheng Zhou, Weiran Liu, Lei Zhang, Kui Ren
2020/1258 (PDF ) TranSCA: Cross-Family Profiled Side-Channel Attacks using Transfer Learning on Deep Neural Networks Dhruv Thapar, Manaar Alam, Debdeep Mukhopadhyay
2020/1257 (PDF ) Improved Reduction Between SIS Problems over Structured Lattices ZaHyun Koo, Yongwoo Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim
2020/1256 (PDF ) Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/p^k Z Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Matthieu Rambaud, Chaoping Xing, Chen Yuan
2020/1255 (PDF ) Boolean Ring Cryptographic Equation Solving Sean Murphy, Maura Paterson, Christine Swart
2020/1254 (PDF ) Broadcast-Optimal Two Round MPC with an Honest Majority Ivan Damgård, Bernardo Magri, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
2020/1253 (PDF ) New Representations of the AES Key Schedule Gaëtan Leurent, Clara Pernot
2020/1252 (PDF ) Adaptive Extractors and their Application to Leakage Resilient Secret Sharing Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2020/1251 (PDF ) Bit Security Estimation Using Various Information-Theoretic Measures Dong-Hoon Lee, Young-Sik Kim, Jong-Seon No
2020/1250 (PDF ) A New Code Based Signature Scheme without Trapdoors Zhe Li, Chaoping Xing, Sze Ling Yeo
2020/1249 (PDF ) Adversarial Level Agreements for Two-Party Protocols Marilyn George, Seny Kamara
2020/1248 (PDF ) Random-index PIR and Applications Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, Sophia Yakoubov
2020/1247 (PDF ) Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time Jiaheng Zhang, Tianyi Liu, Weijie Wang, Yinuo Zhang, Dawn Song, Xiang Xie, Yupeng Zhang
2020/1246 (PDF ) The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free Gianluca Brian, Antonio Faonio, Maciej Obremski, João Ribeiro, Mark Simkin, Maciej Skórski, Daniele Venturi
2020/1245 (PDF ) Two-round trip Schnorr multi-signatures via delinearized witnesses Handan Kilinc Alper, Jeffrey Burdges
2020/1244 (PDF ) Taming the many EdDSAs Konstantinos Chalkias, François Garillot, Valeria Nikolaenko
2020/1243 (PDF ) A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi
2020/1242 (PDF ) Improved (Related-key) Differential Cryptanalysis on GIFT Fulei Ji, Wentao Zhang, Chunning Zhou, Tianyou Ding
2020/1241 (PDF ) DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version) Siang Meng Sim, Dirmanto Jap, Shivam Bhasin
2020/1240 (PDF ) SQISign: compact post-quantum signatures from quaternions and isogenies Luca De Feo, David Kohel, Antonin Leroux, Christophe Petit, Benjamin Wesolowski
2020/1239 (PDF ) Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation Alin Tomescu, Yu Xia, Zachary Newman
2020/1238 (PDF ) Hardness of Entropic Module-LWE Hao Lin, Mingqiang Wang, Jincheng Zhuang, Yang Wang
2020/1237 (PDF ) A Complete Analysis of the BKZ Lattice Reduction Algorithm Jianwei Li, Phong Q. Nguyen
2020/1236 (PDF ) Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions Jun Wan, Hanshen Xiao, Srinivas Devadas, Elaine Shi
2020/1235 (PDF ) Assessing Lightweight Block Cipher Security using Linear and Nonlinear Machine Learning Classifiers Ting Rong Lee, Je Sen Teh, Norziana Jamil, Jasy Liew Suet Yan, Jiageng Chen
2020/1234 (PDF ) Impossibility on the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model Masayuki Fukumitsu, Shingo Hasegawa
2020/1233 (PDF ) BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer Farid Javani, Alan T. Sherman
2020/1232 (PDF ) On the Existence of Weak Keys for QC-MDPC Decoding Nicolas Sendrier, Valentin Vasseur
2020/1231 (PDF ) vault1317/signal-dakez: An authenticated key exchange protocol with a public key concealing and a participation deniability designed for secure messaging Richard B. Riddick
2020/1229 (PDF ) Decentralized Asset Custody Scheme with Security against Rational Adversary Zhaohua Chen, Guang Yang
2020/1228 (PDF ) Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices Colin O'Flynn
2020/1227 (PDF ) Integral Cryptanalysis of Reduced-Round Tweakable TWINE Muhammad ElSheikh, Amr M. Youssef
2020/1226 (PDF ) Synchronous Constructive Cryptography Chen-Da Liu-Zhang, Ueli Maurer
2020/1225 (PDF ) ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
2020/1224 (PDF ) Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives (extended version) Alexandros Bakas, Antonis Michalas
2020/1223 (PDF ) Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM Jonathan Takeshita, Dayane Reis, Ting Gong, Michael Niemier, X. Sharon Hu, Taeho Jung
2020/1222 (PDF ) Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand Muhammed F. Esgin, Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Zhenfei Zhang, Shifeng Sun, Shumo Chu
2020/1221 (PDF ) Verifiable Functional Encryption using Intel SGX Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote
2020/1220 (PDF ) The Topographic Signature (TopoSign) Protocol Hassan Jameel Asghar, Slawomir Matelski, Josef Pieprzyk
2020/1219 (PDF ) Aggregate Signature with Detecting Functionality from Group Testing Shingo Sato, Junji Shikata, Tsutomu Matsumoto
2020/1218 (PDF ) Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing Shingo Sato, Junji Shikata
2020/1217 (PDF ) R-Propping of HK17: Upgrade for a Detached Proposal of NIST PQC First Round Survey Pedro Hecht
2020/1216 (PDF ) Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4 Erdem Alkim, Dean Yun-Li Cheng, Chi-Ming Marvin Chung, Hülya Evkan, Leo Wei-Lun Huang, Vincent Hwang, Ching-Lin Trista Li, Ruben Niederhagen, Cheng-Jhih Shih, Julian Wälde, Bo-Yin Yang
2020/1215 (PDF ) Differential analysis of the ZUC-256 initialisation Steve Babbage, Alexander Maximov
2020/1214 (PDF ) Cryptanalysis of RSA: A Special Case of Boneh-Durfee’s Attack Majid Mumtaz, Ping Luo
2020/1213 (PDF ) Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness Joseph Jaeger, Stefano Tessaro
2020/1212 (PDF ) Triply Adaptive UC NIZK Ran Canetti, Pratik Sarkar, Xiao Wang
2020/1210 (PDF ) Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions Yusuke Yoshida, Fuyuki Kitagawa, Keita Xagawa, Keisuke Tanaka
2020/1209 (PDF ) Universal Composition with Global Subroutines: Capturing Global Setup within plain UC Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas
2020/1208 (PDF ) An algorithm for bounding non-minimum weight differentials in 2-round LSX-ciphers Vitaly Kiryukhin
2020/1207 (PDF ) FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results Kamyar Mohajerani, Richard Haeussler, Rishub Nagpal, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
2020/1206 (PDF ) Frontrunning on Automated Decentralized Exchange in Proof Of Stake Environment Andrey Sobol
2020/1205 (PDF ) Towards Non-Interactive Witness Hiding Benjamin Kuykendall, Mark Zhandry
2020/1204 (PDF ) Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge Marc Fischlin, Felix Rohrbach
2020/1203 (PDF ) Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys Jean-Philippe Bossuat, Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Pierre Hubaux
2020/1202 (PDF ) Correlation Power Analysis and Higher-order Masking Implementation of WAGE Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric
2020/1201 (PDF ) Algebraic Key-Recovery Attacks on Reduced-Round Xoofff Tingting Cui, Lorenzo Grassi
2020/1199 (PDF ) Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, Stefano Tessaro
2020/1198 (PDF ) Finding EM leakages at design stage: a simulation methodology Davide Poggi, Philippe Maurine, Thomas Ordas, Alexandre Sarafianos, Jérémy Raoult
2020/1197 (PDF ) Black-Box Non-Interactive Non-Malleable Commitments Rachit Garg, Dakshita Khurana, George Lu, Brent Waters
2020/1196 (PDF ) TR-31 and AS 2805 (Non)equivalence report Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
2020/1195 (PDF ) A Lower Bound for One-Round Oblivious RAM David Cash, Andrew Drucker, Alexander Hoover
2020/1194 (PDF ) Quantum copy-protection of compute-and-compare programs in the quantum random oracle model Andrea Coladangelo, Christian Majenz, Alexander Poremba
2020/1193 (PDF ) Bypassing Isolated Execution on RISC-V with Fault Injection Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma
2020/1192 (PDF ) Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level Yuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont
2020/1191 (PDF ) Schrödinger's Pirate: How To Trace a Quantum Decoder Mark Zhandry
2020/1190 (PDF ) Efficient Post-Quantum SNARKs for RSIS and RLWE and their Applications to Privacy Cecilia Boschini, Jan Camenisch, Max Ovsiankin, Nicholas Spooner
2020/1189 (PDF ) Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version) Karim Baghery, Alonso González, Zaira Pindado, Carla Ràfols
2020/1188 (PDF ) Cryptographic Group Actions and Applications Navid Alamati, Luca De Feo, Hart Montgomery, Sikhar Patranabis
2020/1187 (PDF ) Coupling of Random Systems David Lanzenberger, Ueli Maurer
2020/1186 (PDF ) Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions Zvika Brakerski, Pedro Branco, Nico Döttling, Sanjam Garg, Giulio Malavolta
2020/1185 (PDF ) Lossiness and Entropic Hardness for Ring-LWE Zvika Brakerski, Nico Döttling
2020/1184 (PDF ) Constant-time verification for cut-and-choose-based signatures Robert Ransom
2020/1183 (PDF ) Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/1182 (PDF ) On the Round Complexity of the Shuffle Model Amos Beimel, Iftach Haitner, Kobbi Nissim, Uri Stemmer
2020/1181 (PDF ) TinyGarble2: Smart, Efficient, and Scalable Yao’s Garble Circuit Siam Hussain, Baiyu Li, Farinaz Koushanfar, Rosario Cammarota
2020/1180 (PDF ) MultiTLS: Secure communication channels with cipher suite diversity Ricardo Moura, David R. Matos, Miguel Pardal, Miguel Correia
2020/1179 (PDF ) Optimal Broadcast Encryption from LWE and Pairings in the Standard Model Shweta Agrawal, Daniel Wichs, Shota Yamada
2020/1178 (PDF ) An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi
2020/1177 (PDF ) Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang
2020/1176 (PDF ) Short Paper: PoSH Proof of Staked Hardware Consensus Rami Khalil, Naranker Dulay
2020/1175 (PDF ) MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication David Heath, Vladimir Kolesnikov, Stanislav Peceny
2020/1174 (PDF ) Multi Random Projection Inner Product Encryption, Applications to Proximity Searchable Encryption for the Iris Biometric Chloe Cachet, Sohaib Ahmad, Luke Demarest, Serena Riback, Ariel Hamlin, Benjamin Fuller
2020/1173 (PDF ) Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark) Ryo Nishimaki
2020/1172 (PDF ) Cryptanalysis of a round optimal lattice-based multisignature scheme Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
2020/1171 (PDF ) On the Price of Concurrency in Group Ratcheting Protocols Alexander Bienstock, Yevgeniy Dodis, Paul Rösler
2020/1170 (PDF ) On the Power of an Honest Majority in Three-Party Computation Without Broadcast Bar Alon, Ran Cohen, Eran Omri, Tom Suad
2020/1169 (PDF ) Privacy-preserving greater-than integer comparison without binary decomposition in the malicious model Sigurd Eskeland
2020/1168 (PDF ) FHE-Based Bootstrapping of Designated-Prover NIZK Zvika Brakerski, Sanjam Garg, Rotem Tsabary
2020/1167 (PDF ) Batch Verification for Statistical Zero Knowledge Proofs Inbar Kaslasi, Guy N. Rothblum, Ron D. Rothblum, Adam Sealfon, Prashant Nalini Vasudevan
2020/1166 (PDF ) A Differential and Linear Analysis of the Inversion Mapping in Odd-Characteristic Finite Fields Jorge Nakahara Jr
2020/1165 (PDF ) Practical Isogeny-Based Key-exchange with Optimal Tightness Bor de Kock, Kristian Gjøsteen, Mattia Veroni
2020/1164 (PDF ) Template Attacks Based on the Multivariate Joint Distribution Min Yang, Qingshu Meng, An Wang, Xin Liu
2020/1163 (PDF ) Specifying cycles of minimal length for commonly used linear layers in block ciphers Guoqiang Deng, Yongzhuang Wei, Xuefeng Duan, Enes Pasalic, Samir Hodzic
2020/1162 (PDF ) On Average-Case Hardness in TFNP from One-Way Functions Pavel Hubáček, Chethan Kamath, Karel Král, Veronika Slívová
2020/1161 (PDF ) KVaC: Key-Value Commitments for Blockchains and Beyond Shashank Agrawal, Srinivasan Raghuraman
2020/1160 (PDF ) Characterizing Deterministic-Prover Zero Knowledge Nir Bitansky, Arka Rai Choudhuri
2020/1159 (PDF ) ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ? Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu
2020/1158 (PDF ) Don't throw your nonces out with the bathwater: Speeding up Dilithium by reusing the tail of y Amber Sprenkels, Bas Westerbaan
2020/1157 (PDF ) Secure Massively Parallel Computation for Dishonest Majority Rex Fernando, Ilan Komargodski, Yanyi Liu, Elaine Shi
2020/1156 (PDF ) Verifiable Hierarchical Key Assignment Schemes Anna Lisa Ferrara, Chiara Ricciardi
2020/1155 (PDF ) Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs Dimitris Mouris, Nektarios Georgios Tsoutsos
2020/1154 (PDF ) Functional Encryption for Set Intersection in the Multi-Client Setting Kwangsu Lee, Minhye Seo
2020/1153 (PDF ) Key Committing AEADs Shay Gueron
2020/1152 (PDF ) An Automatic Search Tool for Iterative Trails and its Application to estimation of differentials and linear hulls Tianyou Ding, Wentao Zhang, Chunning Zhou, Fulei Ji
2020/1151 (PDF ) Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk
2020/1150 (PDF ) Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems Gennaro Avitabile, Daniele Friolo, Ivan Visconti
2020/1149 (PDF ) Deterministic Wallets in a Quantum World Nabil Alkeilani Alkadri, Poulami Das, Andreas Erwig, Sebastian Faust, Juliane Krämer, Siavash Riahi, Patrick Struck
2020/1148 (PDF ) An Area Aware Accelerator for Elliptic Curve Point Multiplication Malik Imran, Samuel Pagliarini, Muhammad Rashid
2020/1146 (PDF ) Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries Siemen Dhooghe, Svetla Nikova
2020/1145 (PDF ) Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs Wonseok Choi, Byeonghak Lee, Yeongmin Lee, Jooyoung Lee
2020/1144 (PDF ) Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions Lior Rotem, Gil Segev
2020/1143 (PDF ) Rescue-Prime: a Standard Specification (SoK) Alan Szepieniec, Tomer Ashur, Siemen Dhooghe
2020/1142 (PDF ) Factoring Algorithm Based on Parameterized Newton Method Zhengjun Cao, Lihua Liu
2020/1141 (PDF ) A post-quantum signature scheme from the secant variety of the Grassmannian Daniele Di Tullio, Manoj Gyawali
2020/1140 (PDF ) On the Efficient Estimation of Min-Entropy Yongjune Kim, Cyril Guyot, Young-Sik Kim
2020/1139 (PDF ) Succinct and Adaptively Secure ABE for ABP from k-Lin Huijia Lin, Ji Luo
2020/1138 (PDF ) Epochal Signatures for Deniable Group Chats Andreas Hülsing, Fiona Johanna Weber
2020/1137 (PDF ) MOTION - A Framework for Mixed-Protocol Multi-Party Computation Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko
2020/1136 (PDF ) A Note on Koblitz Curves over Prime Fields Han Wu, Guangwu Xu
2020/1135 (PDF ) Adaptively Secure Inner Product Encryption from LWE Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2020/1134 (PDF ) Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier, Shivam Bhasin
2020/1133 (PDF ) Security Analysis of Subterranean 2.0 Ling Song, Yi Tu, Danping Shi, Lei Hu
2020/1132 (PDF ) A Logarithmic Lower Bound for Oblivious RAM (for all parameters) Ilan Komargodski, Wei-Kai Lin
2020/1131 (PDF ) Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound Enes Pasalic, René Rodríguez, Fengrong Zhang, Yongzhuang Wei
2020/1130 (PDF ) Secure training of decision trees with continuous attributes Mark Abspoel, Daniel Escudero, Nikolaj Volgushev
2020/1129 (PDF ) A Secure Software Defined Networking based Framework for IoT Networks Ambili K N, Jimmy Jose
2020/1127 (PDF ) SideLine: How Delay-Lines (May) Leak Secrets from your SoC Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet Moundi
2020/1126 (PDF ) Bitcoin-Monero Cross-chain Atomic Swap Joël Gugger
2020/1125 (PDF ) High-Speed FPGA Implementation of SIKE Based on An Ultra-Low-Latency Modular Multiplier Jing Tian, Bo Wu, Zhongfeng Wang
2020/1124 (PDF ) Optimized Voronoi-based algorithms for parallel shortest vector computations Artur Mariano, Filipe Cabeleira, Gabriel Falcao, Luís Paulo Santos
2020/1123 (PDF ) Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V Alexandre Adomnicai, Thomas Peyrin
2020/1122 (PDF ) The Velvet Path to Superlight Blockchain Clients Aggelos Kiayias, Andrianna Polydouri, Dionysis Zindros
2020/1121 (PDF ) Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Veronika Kuchta
2020/1120 (PDF ) On the security of Diene-Thabet-Yusuf's cubic multivariate signature scheme Yasufumi Hashimoto
2020/1119 (PDF ) All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
2020/1118 (PDF ) Approximate Homomorphic Encryption with Reduced Approximation Error Andrey Kim, Antonis Papadimitriou, Yuriy Polyakov
2020/1117 (PDF ) Economic Proof of Work Jia Kan
2020/1116 (PDF ) On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode. V. Ustimenko
2020/1115 (PDF ) SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets Karim M. Abdellatif, Olivier Hériveaux
2020/1114 (PDF ) Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting Thomas Haines, Rajeev Gore, Bhavesh Sharma
2020/1113 (PDF ) On combinatorial approaches to search for quadratic APN functions Konstantin Kalgin, Valeriya Idrisova
2020/1112 (PDF ) A cautionary note on the use of Gurobi for cryptanalysis Muhammad ElSheikh, Amr M. Youssef
2020/1111 (PDF ) Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography Abhraneel Dutta, Aaron Hutchinson, Koray Karabina
2020/1110 (PDF ) Two-round $n$-out-of-$n$ and Multi-Signatures and Trapdoor Commitment from Lattices Ivan Damgård, Claudio Orlandi, Akira Takahashi, Mehdi Tibouchi
2020/1109 (PDF ) Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols Gora Adj, Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
2020/1108 (PDF ) Radical isogenies Wouter Castryck, Thomas Decru, Frederik Vercauteren
2020/1107 (PDF ) Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest
2020/1106 (PDF ) Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction Gili Schul-Ganz, Gil Segev
2020/1105 (PDF ) Catalic: Delegated PSI Cardinality with Applications to Contact Tracing Thai Duong, Duong Hieu Phan, Ni Trieu
2020/1104 (PDF ) High-Assurance Cryptography Software in the Spectre Era Gilles Barthe, Sunjay Cauligi, Benjamin Gregoire, Adrien Koutsos, Kevin Liao, Tiago Oliveira, Swarn Priya, Tamara Rezk, Peter Schwabe
2020/1103 (PDF ) Packed Multiplication: How to Amortize the Cost of Side-channel Masking ? Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers
2020/1102 (PDF ) PQC: R-Propping of Public-Key Cryptosystems Using Polynomials over Non-commutative Algebraic Extension Rings Pedro Hecht
2020/1101 (PDF ) NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus Ren Zhang, Dingwei Zhang, Quake Wang, Shichen Wu, Jan Xie, Bart Preneel
2020/1100 (PDF ) Towards Efficiency-Preserving Round Compression in MPC: Do fewer rounds mean more computation? Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
2020/1099 (PDF ) Unbounded HIBE with Tight Security Roman Langrehr, Jiaxin Pan
2020/1098 (PDF ) Formalizing Bitcoin Crashes with Universally Composable Security Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu
2020/1097 (PDF ) How to Build Optimally Secure PRFs Using Block Ciphers Benoît Cogliati, Ashwin Jha, Mridul Nandi
2020/1096 (PDF ) Far Field EM Side-Channel Attack on AES Using Deep Learning Ruize Wang, Huanyu Wang, Elena Dubrova
2020/1095 (PDF ) Cycle structure of generalized and closed loop invariants Yongzhuang Wei, Rene Rodriguez, Enes Pasalic
2020/1094 (PDF ) TN-IDS for Network Layer Attacks in RPL based IoT Systems Ambili K N, Jimmy Jose
2020/1093 (PDF ) Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version) Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, Mingsheng Wang
2020/1092 (PDF ) The Round Complexity of Secure Computation Against Covert Adversaries Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain
2020/1091 (PDF ) Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma Joachim Neu, Ertem Nusret Tas, David Tse
2020/1090 (PDF ) On the Adaptive Security of MACs and PRFs Andrew Morgan, Rafael Pass, Elaine Shi
2020/1089 (PDF ) Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki
2020/1088 (PDF ) Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng
2020/1087 (PDF ) Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE Keita Emura, Atsushi Takayasu, Yohei Watanabe
2020/1086 (PDF ) Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme Daniel Apon, Dustin Moody, Ray Perlner, Daniel Smith-Tone, Javier Verbel
2020/1085 (PDF ) Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications Tapas Pal, Ratna Dutta
2020/1084 (PDF ) Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig
2020/1083 (PDF ) A Fast and Compact RISC-V Accelerator for Ascon and Friends Stefan Steinegger, Robert Primas
2020/1082 (PDF ) Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption Bart Mennink
2020/1081 (PDF ) Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices Olivier Bernard, Adeline Roux-Langlois
2020/1080 (PDF ) Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo
2020/1079 (PDF ) Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption Rongmao Chen, Xinyi Huang, Moti Yung
2020/1078 (PDF ) Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles Jodie Knapp, Elizabeth A. Quaglia
2020/1077 (PDF ) Unconditionally secure quantum bit commitment: Revised Ming-Xing Luo, Xiaojun Wang
2020/1076 (PDF ) Minimizing the Two-Round Tweakable Even-Mansour Cipher Avijit Dutta
2020/1075 (PDF ) On the Query Complexity of Constructing PRFs from Non-adaptive PRFs Pratik Soni, Stefano Tessaro
2020/1074 (PDF ) A Scalable Simulation of the BB84 Protocol Involving Eavesdropping Mihai-Zicu Mina, Emil Simion
2020/1073 (PDF ) Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation Yusai Wu, Liqing Yu, Zhenfu Cao, Xiaolei Dong
2020/1072 (PDF ) Cryptanalysis of the permutation based algorithm SpoC Liliya Kraleva, Raluca Posteuca, Vincent Rijmen
2020/1071 (PDF ) On Pairing-Free Blind Signature Schemes in the Algebraic Group Model Julia Kastner, Julian Loss, Jiayu Xu
2020/1070 (PDF ) Efficient indifferentiable hashing to elliptic curves $y^2 = x^3 + b$ provided that $b$ is a quadratic residue Dmitrii Koshelev
2020/1069 (PDF ) Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions Matteo Campanelli, Antonio Faonio, Dario Fiore, Anaïs Querol, Hadrián Rodríguez
2020/1068 (PDF ) An Efficient Transformation Capabilities of Single Database Private Block Retrieval Radhakrishna Bhat, N R Sunitha
2020/1067 (PDF ) A Constant Time Full Hardware Implementation of Streamlined NTRU Prime Adrian Marotzke
2020/1066 (PDF ) Constant time algorithms for ROLLO-I-128 Carlos Aguilar-Melchor, Nicolas Aragon, Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Chiara Marcolla
2020/1065 (PDF ) Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong
2020/1064 (PDF ) Mimblewimble Non-Interactive Transaction Scheme Gary Yu
2020/1062 (PDF ) Quantum Search for Scaled Hash Function Preimages Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano, Victor Mateu
2020/1061 (PDF ) A new idea in response to fast correlation attacks on small-state stream ciphers Vahid Amin Ghafari, Fujiang Lin
2020/1060 (PDF ) Circular Security Is Complete for KDM Security Fuyuki Kitagawa, Takahiro Matsuda
2020/1059 (PDF ) Incorrectly Generated RSA Keys: How To Recover Lost Plaintexts Daniel Shumow
2020/1057 (PDF ) MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille
2020/1056 (PDF ) Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen
2020/1055 (PDF ) Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain Santi J. Vives
2020/1054 (PDF ) Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems Ben Smyth
2020/1053 (PDF ) Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation Anders Dalskov, Eysa Lee, Eduardo Soria-Vazquez
2020/1052 (PDF ) Attacking Threshold Wallets Jean-Philippe Aumasson, Omer Shlomovits
2020/1051 (PDF ) Lower Bounds on the Degree of Block Ciphers Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo
2020/1050 (PDF ) On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation Arpita Patra, Divya Ravi, Swati Singla
2020/1049 (PDF ) Rotational analysis of ChaCha permutation Stefano Barbero, Emanuele Bellini, Rusydi Makarim
2020/1048 (PDF ) An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang
2020/1047 (PDF ) Side-channel Attacks with Multi-thread Mixed Leakage Yiwen Gao, Yongbin Zhou
2020/1046 (PDF ) On the Linear Distinguishing Attack against ZUC-256 Stream Cipher Bin Zhang, Dengguo Feng, Chenhui Jin, Wen-Feng Qi, Wenling Wu, Chao Xu, Yanfeng Wang, Lin Jiao
2020/1045 (PDF ) On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang
2020/1044 (PDF ) A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
2020/1043 (PDF ) Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions Ian McQuoid, Mike Rosulek, Lawrence Roy
2020/1042 (PDF ) Candidate Obfuscation via Oblivious LWE Sampling Hoeteck Wee, Daniel Wichs
2020/1041 (PDF ) Sign in finite fields Abraham Westerbaan, Bas Westerbaan
2020/1040 (PDF ) MoSS: Modular Security Specifications Framework Amir Herzberg, Hemi Leibowitz, Ewa Syta, Sara Wrotniak
2020/1039 (PDF ) Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct Mohammad Sadeq Dousti, Alptekin Küpçü
2020/1038 (PDF ) On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4 Prasanna Ravi, Romain Poussier, Shivam Bhasin, Anupam Chattopadhyay
2020/1037 (PDF ) A High-performance Hardware Implementation of Saber Based on Karatsuba Algorithm Yihong Zhu, Min Zhu, Bohan Yang, Wenping Zhu, Chenchen Deng, Chen Chen, Shaojun Wei, Leibo Liu
2020/1036 (PDF ) Security in banking Arthur Van Der Merwe, David Paul, Jelena Schmalz, Timothy M. Schaerf
2020/1035 (PDF ) Evolving Secret Sharing with Essential Participants Jyotirmoy Pramanik, Avishek Adhikari
2020/1034 (PDF ) Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques Fukang Liu, Takanori Isobe, Willi Meier
2020/1033 (PDF ) RandChain: A Scalable and Fair Decentralised Randomness Beacon Runchao Han, Haoyu Lin, Jiangshan Yu
2020/1032 (PDF ) Cryptanalysis of the MALICIOUS Framework Tim Beyne, Chaoyun Li
2020/1031 (PDF ) Profiled Deep Learning Side-Channel Attack on a Protected Arbiter PUF Combined with Bitstream Modification Yang Yu, Michail Moraitis, Elena Dubrova
2020/1030 (PDF ) Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu
2020/1029 (PDF ) Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols Hannah Davis, Felix Günther
2020/1028 (PDF ) Secure Data Hiding for Contact Tracing Craig Gotsman, Kai Hormann
2020/1027 (PDF ) Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things Hu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari
2020/1026 (PDF ) Simple and Efficient FE for Quadratic Functions Junqing Gong, Haifeng Qian
2020/1025 (PDF ) A Bit-Vector Differential Model for the Modular Addition by a Constant Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
2020/1024 (PDF ) Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
2020/1023 (PDF ) Post-Quantum Anonymous Veto Networks Jintai Ding, Doug Emery, Johannes Mueller, Peter Y. A. Ryan, Vonn Kee Wong
2020/1022 (PDF ) Polynomial IOPs for Linear Algebra Relations Alan Szepieniec, Yuncong Zhang
2020/1021 (PDF ) Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
2020/1020 (PDF ) Towards Classical Hardness of Module-LWE: The Linear Rank Case Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2020/1019 (PDF ) Security of Streaming Encryption in Google's Tink Library Viet Tung Hoang, Yaobin Shen
2020/1018 (PDF ) Small Superset and Big Subset Obfuscation Steven D. Galbraith, Trey Li
2020/1017 (PDF ) Governance framework for Quipuswap - automated decentralized exchange Andrey Sobol, Anastasiia Kondaurova
2020/1016 (PDF ) Hardware-Assisted Intellectual Property Protection of Deep Learning Models Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava
2020/1015 (PDF ) On Multivariate Algorithms of Digital Signatures of Linear Degree and Low Density. Vasyl Ustimenko
2020/1014 (PDF ) GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel Yuntao Liu, Ankur Srivastava
2020/1013 (PDF ) A Study on Privacy-Preserving GRU Inference Framework Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso
2020/1012 (PDF ) Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer Yi-Fu Lai, Steven D. Galbraith, Cyprien Delpech de Saint Guilhem
2020/1011 (PDF ) Private Join and Compute from PIR with Default Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, Ni Trieu
2020/1010 (PDF ) Indistinguishability Obfuscation from Circular Security Romain Gay, Rafael Pass
2020/1009 (PDF ) Obfuscating Finite Automata Steven D. Galbraith, Lukas Zobernig
2020/1008 (PDF ) Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano Leah Lathrop
2020/1007 (PDF ) Attacks on Integer-RLWE Alessandro Budroni, Benjamin Chetioui, Ermes Franch
2020/1006 (PDF ) An Analysis of Fault Attacks on CSIDH Jason LeGrow, Aaron Hutchinson
2020/1005 (PDF ) Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, Marc Stöttinger
2020/1004 (PDF ) Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson
2020/1003 (PDF ) Indistinguishability Obfuscation from Well-Founded Assumptions Aayush Jain, Huijia Lin, Amit Sahai
2020/1002 (PDF ) CrypTFlow2: Practical 2-Party Secure Inference Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
2020/1001 (PDF ) Robust distributed symmetric-key encryption Xunhua Wang, Ben Huson
2020/1000 (PDF ) Mechanised Models and Proofs for Distance-Bounding Ioana Boureanu, Constantin Catalin Dragan, François Dupressoir, David Gerault, Pascal Lafourcade
2020/999 (PDF ) Attribute-Based Symmetric Searchable Encryption Hai-Van Dang, Amjad Ullah, Alexandros Bakas, Antonis Michalas
2020/998 (PDF ) Lightweight Virtual Payment Channels Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2020/997 (PDF ) Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2020/996 (PDF ) Unifying Generic Group Models Ueli Maurer, Christopher Portmann, Jiamin Zhu
2020/995 (PDF ) Bootstrapping fully homomorphic encryption over the integers in less than one second Hilder Vitor Lima Pereira
2020/994 (PDF ) SPARKs: Succinct Parallelizable Arguments of Knowledge Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass
2020/993 (PDF ) Cryptanalysis of Masked Ciphers: A not so Random Idea Tim Beyne, Siemen Dhooghe, Zhenda Zhang
2020/992 (PDF ) Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs Bo-Yeon Sim, Jihoon Kwon, Joohee Lee, Il-Ju Kim, Taeho Lee, Jaeseung Han, Hyojin Yoon, Jihoon Cho, Dong-Guk Han
2020/990 (PDF ) Performance Comparisons and Migration Analyses of Lattice-based Cryptosystems on Hardware Security Module Junting Xiao, Tadahiko Ito
2020/989 (PDF ) Algorithm for SIS and MultiSIS problems Igor Semaev
2020/988 (PDF ) 120.147 Efficient Electromagnetic Side Channel Analysis by Probe Positioning using Multi-Layer Perceptron Anupam Golder, Baogeng Ma, Debayan Das, Josef Danial, Shreyas Sen, Arijit Raychowdhury
2020/987 (PDF ) Fuzzy Asymmetric Password-Authenticated Key Exchange Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi
2020/986 (PDF ) The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers Thomas Peyrin, Haoyang Wang
2020/985 (PDF ) Orienting supersingular isogeny graphs Leonardo Colò, David Kohel
2020/984 (PDF ) On Multivariate Algorithms of Digital Signatures on Secure El Gamal Type Mode. Vasyl Ustimenko
2020/983 (PDF ) A Differential Meet-in-the-Middle Attack on the Zip cipher Michael Stay
2020/982 (PDF ) Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
2020/981 (PDF ) Deep Learning based analysis of Key Scheduling Algorithm of PRESENT cipher Manan Pareek, Dr. Girish Mishra, Varun Kohli
2020/980 (PDF ) SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE Ruta Jawale, Yael Tauman Kalai, Dakshita Khurana, Rachel Zhang
2020/979 (PDF ) Mercurial Signatures for Variable-Length Messages Elizabeth C. Crites, Anna Lysyanskaya
2020/978 (PDF ) Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher Sarah Alzakari, Poorvi Vora
2020/977 (PDF ) On the Influence of Optimizers in Deep Learning-based Side-channel Analysis Guilherme Perin, Stjepan Picek
2020/976 (PDF ) Synchronizable Exchange Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon
2020/975 (PDF ) Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich
2020/974 (PDF ) Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions Dongxi Liu, Surya Nepal
2020/973 (PDF ) Stacked Garbling: Garbled Circuit Proportional to Longest Execution Path David Heath, Vladimir Kolesnikov
2020/972 (PDF ) Optimized Binary GCD for Modular Inversion Thomas Pornin
2020/971 (PDF ) QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme Koksal Mus, Saad Islam, Berk Sunar
2020/970 (PDF ) Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl, Juan Ramón Troncoso-Pastoriza
2020/969 (PDF ) Hashing to elliptic curves of $j=0$ and quadratic imaginary orders of class number $2$ Dmitrii Koshelev
2020/968 (PDF ) Feeding Cryptographic Protocols with Rich and Reliable Supply of Quantum-Grade Randomness Gideon Samid
2020/967 (PDF ) The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes Jintai Ding, Joshua Deaton, Vishakha, Bo-Yin Yang
2020/966 (PDF ) EM-Side-Channel Resistant Symmetric-Key Authentication Mechanism for Small Devices Rick Boivie, Charanjit S. Jutla, Daniel Friedman, Ghavam Shahidi
2020/965 (PDF ) Computation of a 30750-Bit Binary Field Discrete Logarithm Robert Granger, Thorsten Kleinjung, Arjen K. Lenstra, Benjamin Wesolowski, Jens Zumbragel
2020/964 (PDF ) Configurable Private Querying: Lookup and Partial Matching under Homomorphic Encryption Hamish Hunt, Jack Crawford, Oliver Masters, Enrico Steffinlongo, Flavio Bergamaschi
2020/963 (PDF ) From Partial to Global Asynchronous Reliable Broadcast Diana Ghinea, Martin Hirt, Chen-Da Liu-Zhang
2020/962 (PDF ) Post-Quantum Verification of Fujisaki-Okamoto Dominique Unruh
2020/961 (PDF ) Enable Dynamic Parameters Combination to Boost Linear Convolutional Neural Network for Sensitive Data Inference Qizheng Wang, Wenping Ma, Jie Li, Ge Liu
2020/960 (PDF ) Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl
2020/959 (PDF ) Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key Settings Carlos Cid, Akinori Hosoyamada, Yunwen Liu, Siang Meng Sim
2020/958 (PDF ) Multi-Threshold Asynchronous Reliable Broadcast and Consensus Martin Hirt, Ard Kastrati, Chen-Da Liu-Zhang
2020/957 (PDF ) Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs Johannes Tobisch, Anita Aghaie, Georg T. Becker
2020/956 (PDF ) Constant Time Montgomery Ladder Kaushik Nath, Palash Sarkar
2020/955 (PDF ) Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2020/954 (PDF ) New Techniques for Traitor Tracing: Size $N^{1/3}$ and More from Pairings Mark Zhandry
2020/953 (PDF ) Performance comparison between deep learning-based and conventional cryptographic distinguishers Emanuele Bellini, Matteo Rossi
2020/952 (PDF ) On What to Learn: Train or Adapt a Deeply Learned Profile? Christophe Genevey-Metat, Benoît Gérard, Annelie Heuser
2020/951 (PDF ) Amplifying the Security of Functional Encryption, Unconditionally Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai
2020/950 (PDF ) Self-Processing Private Sensor Data via Garbled Encryption Nathan Manohar, Abhishek Jain, Amit Sahai
2020/949 (PDF ) HABIT: Hardware-Assisted Bluetooth-based Infection Tracking Nathan Manohar, Peter Manohar, Rajit Manohar
2020/948 (PDF ) STARK Friendly Hash -- Survey and Recommendation Eli Ben-Sasson, Lior Goldberg, David Levit
2020/947 (PDF ) Data Oblivious Algorithms for Multicores Vijaya Ramachandran, Elaine Shi
2020/946 (PDF ) Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm Johannes Mittmann, Werner Schindler
2020/945 (PDF ) On the (in)security of ROS Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, Mariana Raykova
2020/944 (PDF ) Secure Conflict-free Replicated Data Types Manuel Barbosa, Bernardo Ferreira, João Marques, Bernardo Portela, Nuno Preguiça
2020/943 (PDF ) Analysing and Improving Shard Allocation Protocols for Sharded Blockchains Runchao Han, Jiangshan Yu, Ren Zhang
2020/942 (PDF ) RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar Weippl
2020/941 (PDF ) Alternative Tower Field Construction for Quantum Implementation of the AES S-box Doyoung Chung, Seungkwang Lee, Dooho choi, Jooyoung Lee
2020/940 (PDF ) Directly revocable ciphertext-policy attribute-based encryption from lattices Fei Meng
2020/939 (PDF ) DLDDO: Deep Learning to Detect Dummy Operations JongHyeok Lee, Dong-Guk Han
2020/938 (PDF ) Performance Trade-offs in Design of MimbleWimble Proofs of Reserves Suyash Bagad, Saravanan Vijayakumaran
2020/937 (PDF ) BAM BAM!! On Reliability of EMFI for in-situ Automotive ECU Attacks Colin O'Flynn
2020/936 (PDF ) Cryptanalysis and Improvement of Anonymous Authentication for Wireless Body Area Networks with Provable Security Mahender Kumar
2020/935 (PDF ) Privacy-Preserving Multi-Operator Contact Tracing for Early Detection of Covid19 Contagions Davide Andreoletti, Omran Ayoub, Silvia Giordano, Massimo Tornatore, Giacomo Verticale
2020/934 (PDF ) CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller
2020/932 (PDF ) A Note on Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near – Rings Atul Chaturvedi, Varun Shukla, Manoj K. Misra
2020/931 (PDF ) Homomorphic string search with constant multiplicative depth Charlotte Bonte, Ilia Iliashenko
2020/930 (PDF ) The design of scalar AES Instruction Set Extensions for RISC-V Ben Marshall, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, Claire Wolf
2020/929 (PDF ) Local XOR Unification: Definitions, Algorithms and Application to Cryptography Hai Lin, Christopher Lynch
2020/928 (PDF ) Multi-theorem (Malicious) Designated-Verifier NIZK for QMA Omri Shmueli
2020/927 (PDF ) A Gas-Efficient Superlight Bitcoin Client in Solidity Stelios Daveas, Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
2020/926 (PDF ) Secure Computation over Lattices and Elliptic Curves Brett Hemenway Falk, Daniel Noble
2020/925 (PDF ) Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits Chenkai Weng, Kang Yang, Jonathan Katz, Xiao Wang
2020/924 (PDF ) Ferret: Fast Extension for coRRElated oT with small communication Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang
2020/923 (PDF ) Another code-based adaptation of Lyubashevsky’s signature cryptanalysed Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit
2020/921 (PDF ) Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications Hyoseung Kim, Youngkyung Lee, Michel Abdalla, Jong Hwan Park
2020/920 (PDF ) Further Cryptographic Properties of the Multiplicative Inverse Function Deng Tang, Bimal Mandal, Subhamoy Maitra
2020/919 (PDF ) Tight Bounds for Simon's Algorithm Xavier Bonnetain
2020/917 (PDF ) Formalizing Nakamoto-Style Proof of Stake Søren Eller Thomsen, Bas Spitters
2020/916 (PDF ) Black-Box Transformations from Passive to Covert Security with Public Verifiability Ivan Damgård, Claudio Orlandi, Mark Simkin
2020/915 (PDF ) Does Fiat-Shamir Require a Cryptographic Hash Function? Yilei Chen, Alex Lombardi, Fermi Ma, Willy Quach
2020/914 (PDF ) Ultra-Short Multivariate Public Key Signatures Jacques Patarin, Gilles Macario-Rat, Maxime Bros, Eliane Koussa
2020/913 (PDF ) Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis Tarun Yadav, Manoj Kumar
2020/912 (PDF ) Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber Zhuang Xu, Owen Pemberton, Sujoy Sinha Roy, David Oswald, Wang Yao, Zhiming Zheng
2020/911 (PDF ) Lossy Correlation Intractability and PPAD Hardness from Sub-exponential LWE Ruta Jawale, Dakshita Khurana
2020/910 (PDF ) A Power Side-Channel Attack on the CCA2-Secure HQC KEM Thomas Schamberger, Julian Renner, Georg Sigl, Antonia Wachter-Zeh
2020/909 (PDF ) When is a test not a proof? Eleanor McMurtry, Olivier Pereira, Vanessa Teague
2020/908 (PDF ) Analysis on the MinRank Attack using Kipnis-Shamir Method Against Rainbow Shuhei Nakamura, Yacheng Wang, Yasuhiko Ikematsu
2020/907 (PDF ) Enhanced Flush+Reload Attack on AES Milad Seddigh, Hadi Soleimany
2020/906 (PDF ) Optimally-resilient Unconditionally-secure Asynchronous Multi-party Computation Revisited Ashish Choudhury
2020/905 (PDF ) Cryptanalysis of a Code-Based Signature Scheme Based on the Lyubashevsky Framework Marco Baldi, Karan Khathuria, Edoardo Persichetti, Paolo Santini
2020/904 (PDF ) A Comparison of Weight Initializers in Deep Learning-based Side-channel Analysis Huimin Li, Marina Krček, Guilherme Perin
2020/903 (PDF ) Optimizing Implementations of Linear Layers Zejun Xiang, Xiangyong Zeng, Da Lin, Zhenzhen Bao, Shasha Zhang
2020/902 (PDF ) Federated Learning in Side-Channel Analysis Huanyu Wang, Elena Dubrova
2020/901 (PDF ) A Not-So-Trival Replay Attack Against DH-PSI Hongrui Cui, Yu Yu
2020/900 (PDF ) Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet
2020/899 (PDF ) On the Attack Evaluation and the Generalization Ability in Profiling Side-channel Analysis Lichao Wu, Léo Weissbart, Marina Krček, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek
2020/898 (PDF ) Rapidly Verifiable XMSS Signatures Joppe W. Bos, Andreas Hülsing, Joost Renes, Christine van Vredendaal
2020/897 (PDF ) Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices Jan Richter-Brockmann, Johannes Mono, Tim Güneysu
2020/896 (PDF ) Fault Injection as an Oscilloscope: Fault Correlation Analysis Albert Spruyt, Alyssa Milburn, Lukasz Chmielewski
2020/895 (PDF ) Multi-Currency Ledgers Joachim Zahnentferner
2020/894 (PDF ) Gossiping For Communication-Efficient Broadcast Georgios Tsimos, Julian Loss, Charalampos Papamanthou
2020/893 (PDF ) Toward an Asymmetric White-Box Proposal Lucas Barthelemy
2020/892 (PDF ) Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks Sayandeep Saha, Arnab Bag, Dirmanto Jap, Debdeep Mukhopadhyay, Shivam Bhasin
2020/891 (PDF ) Keep it Unsupervised: Horizontal Attacks Meet Deep Learning Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek
2020/890 (PDF ) Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness Aein Rezaei Shahmirzadi, Amir Moradi
2020/889 (PDF ) Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry
2020/888 (PDF ) Machine Learning of Physical Unclonable Functions using Helper Data - Revealing a Pitfall in the Fuzzy Commitment Scheme Emanuele Strieder, Christoph Frisch, Michael Pehl
2020/887 (PDF ) Updatable Blockchains Michele Ciampi, Nikos Karayannidis, Aggelos Kiayias, Dionysis Zindros
2020/886 (PDF ) Adaptively Secure Revocable Hierarchical IBE from $k$-linear Assumption Keita Emura, Atsushi Takayasu, Yohei Watanabe
2020/885 (PDF ) Wendy, the Good Little Fairness Widget Klaus Kursawe
2020/884 (PDF ) Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu
2020/883 (PDF ) On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis Jeroen Delvaux
2020/882 (PDF ) Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk
2020/881 (PDF ) Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES Loïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie, Damien Couroussé, Cécile Dumas, Laurent Maingault
2020/880 (PDF ) Classical Reduction of Gap SVP to LWE: A Concrete Security Analysis Palash Sarkar, Subhadip Singha
2020/879 (PDF ) Second-Order Masked Lookup Table Compression Scheme Annapurna Valiveti, Srinivas Vivek
2020/878 (PDF ) Bent Boolean functions A better procedure to generate non-crypto 4-bit S-boxes Sankhanil De, Ranjan Ghosh
2020/877 (PDF ) Unclonable Decryption Keys Marios Georgiou, Mark Zhandry
2020/876 (PDF ) Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks Claude Carlet, Sylvain Guilley, Sihem Mesnager
2020/875 (PDF ) Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves Daiki Hayashida, Kenichiro Hayasaka, Tadanori Teruya
2020/874 (PDF ) New Methods and Abstractions for RSA-Based Forward Secure Signatures Susan Hohenberger, Brent Waters
2020/873 (PDF ) Post-Quantum Group Key Agreement Scheme Julia Bobrysheva, Sergey Zapechnikov
2020/872 (PDF ) Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis Gabriel Zaid, Lilian Bossuet, François Dassance, Amaury Habrard, Alexandre Venelli
2020/871 (PDF ) Quantum Immune One-Time Memories Qipeng Liu, Amit Sahai, Mark Zhandry
2020/870 (PDF ) Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN Yu Yu, Jiang Zhang
2020/869 (PDF ) An Algorithmic Reduction Theory for Binary Codes: LLL and more Thomas Debris-Alazard, Léo Ducas, Wessel P. J. van Woerden
2020/868 (PDF ) SoK: A Taxonomy of Cryptocurrency Wallets Kostis Karantias
2020/867 (PDF ) Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks Ping Wang, Ping Chen, Zhimin Luo, Gaofeng Dong, Mengce Zheng, Nenghai Yu, Honggang Hu
2020/866 (PDF ) Development of The RISC-V Entropy Source Interface Markku-Juhani O. Saarinen, G. Richard Newell, Ben Marshall
2020/865 (PDF ) Agora: A Privacy-Aware Data Marketplace Vlasis Koutsos, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Sasu Tarkoma, Pan Hui
2020/864 (PDF ) Linear Complexity Private Set Intersection for Secure Two-Party Protocols Ferhat Karakoç, Alptekin Küpçü
2020/863 (PDF ) Privacy-Preserving Automated Exposure Notification Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner
2020/862 (PDF ) Protecting Cryptography Against Compelled Self-Incrimination Sarah Scheffler, Mayank Varia
2020/861 (PDF ) Faster Homomorphic Encryption over GPGPUs via hierarchical DGT Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
2020/860 (PDF ) SNARGs for Bounded Depth Computations from Sub-Exponential LWE Yael Tauman Kalai, Rachel Zhang
2020/859 (PDF ) A Classification of Computational Assumptions in the Algebraic Group Model Balthazar Bauer, Georg Fuchsbauer, Julian Loss
2020/858 (PDF ) Client-oblivious OPRAM Gareth T. Davies, Christian Janson, Daniel P. Martin
2020/857 (PDF ) Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld
2020/856 (PDF ) Improving Revocation for Group Signature with Redactable Signature Olivier Sanders
2020/855 (PDF ) Fooling primality tests on smartcards Vladimir Sedlacek, Jan Jancar, Petr Svenda
2020/854 (PDF ) Designing Reverse Firewalls for the Real World Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe
2020/853 (PDF ) Linear-Complexity Private Function Evaluation is Practical Marco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider
2020/852 (PDF ) FROST: Flexible Round-Optimized Schnorr Threshold Signatures Chelsea Komlo, Ian Goldberg
2020/851 (PDF ) Asynchronous Byzantine Agreement with Subquadratic Communication Erica Blum, Jonathan Katz, Chen-Da Liu-Zhang, Julian Loss
2020/850 (PDF ) On the Guaranteed Number of Activations in XS-circuits Sergey Agievich
2020/849 (PDF ) Surveying global verifiability Ben Smyth
2020/848 (PDF ) On Composability of Game-based Password Authenticated Key Exchange Marjan Škrobot, Jean Lancrenon
2020/847 (PDF ) Encrypt-to-self: Securely Outsourcing Storage Jeroen Pijnenburg, Bertram Poettering
2020/846 (PDF ) Deep Learning based Differential Distinguisher for Lightweight Cipher PRESENT Aayush Jain, Varun Kohli, Girish Mishra
2020/845 (PDF ) Post-Quantum Adaptor Signatures and Payment Channel Networks Muhammed F. Esgin, Oguzhan Ersoy, Zekeriya Erkin
2020/844 (PDF ) Generic Superlight Client for Permissionless Blockchains Yuan Lu, Qiang Tang, Guiling Wang
2020/843 (PDF ) Dragoon: Private Decentralized HITs Made Practical Yuan Lu, Qiang Tang, Guiling Wang
2020/842 (PDF ) Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited Yuan Lu, Zhenliang Lu, Qiang Tang, Guiling Wang
2020/841 (PDF ) Dumbo: Faster Asynchronous BFT Protocols Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2020/840 (PDF ) Proof of Storage-Time: Efficiently Checking Continuous Data Availability Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang
2020/839 (PDF ) Cryptanalysis of a ``Strengthened'' Key Exchange Protocol for IoT, or When SAKE$^+$ Turns Out to Be SAKE$^-$ Loïc Ferreira
2020/838 (PDF ) PudgyTurtle: variable-length, keystream-dependent encoding to resist time-memory tradeoff attacks David A August, Anne C Smith
2020/837 (PDF ) An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes Daniel Kales, Greg Zaverucha
2020/836 (PDF ) Assembly or Optimized C for Lightweight Cryptography on RISC-V? Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Amber Sprenkels, Benoit Viguier
2020/835 (PDF ) On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function Congwei Zhou, Bin Hu, Jie Guan
2020/834 (PDF ) Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison Eunsang Lee, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim
2020/833 (PDF ) Secure Update of FPGA-based Secure Elements using Partial Reconfiguration Florian Unterstein, Tolga Sel, Thomas Zeschg, Nisha Jacob, Michael Tempelmeier, Michael Pehl, Fabrizio De Santis
2020/832 (PDF ) Round-optimal Black-box Commit-and-prove with Succinct Communication Susumu Kiyoshima
2020/831 (PDF ) On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs Michele Ciampi, Roberto Parisella, Daniele Venturi
2020/830 (PDF ) Terakey - An Encryption Method Whose Security Can Be Analyzed from First Principles Arnold G. Reinhold
2020/829 (PDF ) Refined Analysis of the Asymptotic Complexity of the Number Field Sieve Aude Le Gluher, Pierre-Jean Spaenlehauer, Emmanuel Thomé
2020/827 (PDF ) Encrypted Blockchain Databases Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz
2020/826 (PDF ) A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes Xuan Thanh Do, Duong Hieu Phan, Moti Yung
2020/824 (PDF ) Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC Fynn Dallmeier, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf
2020/823 (PDF ) The Provable Security of Ed25519: Theory and Practice Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao
2020/822 (PDF ) Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries Kwangsu Lee
2020/821 (PDF ) Interconnect-Aware Bitstream Modification Michail Moraitis, Elena Dubrova
2020/820 (PDF ) On the security of the Rescue hash function Tim Beyne, Anne Canteaut, Gregor Leander, María Naya-Plasencia, Léo Perrin, Friedrich Wiemer
2020/819 (PDF ) UC-Secure OT from LWE, Revisited Willy Quach
2020/818 (PDF ) Security Limitations of Classical-Client Delegated Quantum Computing Christian Badertscher, Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Dominik Leichtle, Atul Mantri, Petros Wallden
2020/817 (PDF ) Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation Osman Biçer, Alptekin Küpçü
2020/816 (PDF ) Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses Luka Music, Céline Chevalier, Elham Kashefi
2020/815 (PDF ) Cryptographic Divergences: New Techniques and New Applications Marc Abboud, Thomas Prest
2020/814 (PDF ) Incompressible Encodings Tal Moran, Daniel Wichs
2020/813 (PDF ) Strengthening Sequential Side-Channel Attacks Through Change Detection Luca Frittoli, Matteo Bocchi, Silvia Mella, Diego Carrera, Beatrice Rossi, Pasqualina Fragneto, Ruggero Susella, Giacomo Boracchi
2020/812 (PDF ) Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions Lior Rotem, Gil Segev
2020/811 (PDF ) Another Look at Extraction and Randomization of Groth's zk-SNARK Karim Baghery, Markulf Kohlweiss, Janno Siim, Mikhail Volkhov
2020/809 (PDF ) On (expected polynomial) runtime in cryptography Michael Klooß
2020/808 (PDF ) Security Analysis of Olvid's SAS-based Trust Establishment Protocol Michel Abdalla
2020/807 (PDF ) Secure merge with $O(n \log \log n)$ secure operation Brett Hemenway Falk, Rafail Ostrovsky
2020/806 (PDF ) Toward Comparable Homomorphic Encryption for Crowd-sensing Network Daxin Huang, Qingqing Gan, Xiaoming Wang, Chengpeng Huang, Yijian Lin
2020/805 (PDF ) Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud Furkan Turan, Ingrid Verbauwhede
2020/804 (PDF ) Lightweight Ciphers on a 65 nm ASIC - A Comparative Study on Energy Consumption Bastian Richter, Amir Moradi
2020/803 (PDF ) Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen, Limin Fan, Wenling Wu
2020/802 (PDF ) Quantum Attacks on HCTR and its Variants Mostafizar Rahman, Goutam Paul
2020/801 (PDF ) Not enough LESS: An improved algorithm for solving Code Equivalence Problems over $\mathbb{F}_q$ Ward Beullens
2020/800 (PDF ) Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements Mihir Bellare, Wei Dai, Phillip Rogaway
2020/799 (PDF ) Secure Generalized Deduplication via Multi-Key Revealing Encryption Daniel E. Lucani, Lars Nielsen, Claudio Orlandi, Elena Pagnin, Rasmus Vestergaard
2020/798 (PDF ) Superposition Attack on OT Protocols Ehsan Ebrahimi, Céline Chevalier, Marc Kaplan, Michele Minelli
2020/797 (PDF ) Fast, Small, and Area-Time Efficient Architectures for Key-Exchange on Curve25519 Mojtaba Bisheh Niasar, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2020/796 (PDF ) A Generalization of Paillier's Public-Key System With Fast Decryption Ying Guo, Zhenfu Cao, Xiaolei Dong
2020/795 (PDF ) Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches Viet Ba Dang, Farnoud Farahmand, Michal Andrzejczak, Kamyar Mohajerani, Duc Tri Nguyen, Kris Gaj
2020/794 (PDF ) Symbolic and Computational Reasoning About Cryptographic Modes of Operation Catherine Meadows
2020/793 (PDF ) PHyCT : Privacy preserving Hybrid Contact Tracing Mahabir Prasad Jhanwar, Sumanta Sarkar
2020/792 (PDF ) Trace-$\Sigma$: a privacy-preserving contact tracing app Jean-François Biasse, Sriram Chellappan, Sherzod Kariev, Noyem Khan, Lynette Menezes, Efe Seyitoglu, Charurut Somboonwit, Attila Yavuz
2020/791 (PDF ) Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies Chaya Ganesh, Claudio Orlandi, Daniel Tschudi, Aviv Zohar
2020/790 (PDF ) Anonymity and Rewards in Peer Rating Systems Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso
2020/789 (PDF ) Double-Authentication-Preventing Signatures in the Standard Model Dario Catalano, Georg Fuchsbauer, Azam Soleimanian
2020/788 (PDF ) Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model Michel Abdalla, Florian Bourse, Hugo Marival, David Pointcheval, Azam Soleimanian, Hendrik Waldner
2020/787 (PDF ) A Note on Separating Classical and Quantum Random Oracles Takashi Yamakawa, Mark Zhandry
2020/786 (PDF ) Random Probing Security: Verification, Composition, Expansion and New Constructions Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb
2020/785 (PDF ) The Memory-Tightness of Authenticated Encryption Ashrujit Ghoshal, Joseph Jaeger, Stefano Tessaro
2020/784 (PDF ) CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time Carsten Baum, Bernardo David, Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, Sabine Oechsner
2020/783 (PDF ) Adventures in Crypto Dark Matter: Attacks, Fixes for Weak Pseudorandom Functions Jung Hee Cheon, Wonhee Cho, Jeong Han Kim, Jiseung Kim
2020/782 (PDF ) A Love Affair Between Bias Amplifiers and Broken Noise Sources George Teseleanu
2020/781 (PDF ) Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier
2020/780 (PDF ) The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10 Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
2020/779 (PDF ) Non-Malleable Time-Lock Puzzles and Applications Cody Freitag, Ilan Komargodski, Rafael Pass, Naomi Sirkin
2020/778 (PDF ) SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT Seyed Farhad Aghili, Amirhossein Adavoudi Jolfaei, Aysajan Abidin
2020/777 (PDF ) Dynamic Universal Accumulator with Batch Update over Bilinear Groups Giuseppe Vitto, Alex Biryukov
2020/776 (PDF ) Non-Malleable Codes for Bounded Polynomial-Depth Tampering Dana Dachman-Soled, Ilan Komargodski, Rafael Pass
2020/775 (PDF ) Improved Differential-Linear Attacks with Applications to ARX Ciphers Christof Beierle, Gregor Leander, Yosuke Todo
2020/774 (PDF ) Timelocked Bribing Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer
2020/773 (PDF ) An Instruction Set Extension to Support Software-Based Masking Si Gao, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham, Francesco Regazzoni
2020/772 (PDF ) Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs Alex Lombardi, Vinod Vaikuntanathan
2020/771 (PDF ) Leakage-Resilient Key Exchange and Two-Seed Extractors Xin Li, Fermi Ma, Willy Quach, Daniel Wichs
2020/770 (PDF ) Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions Akshima, David Cash, Andrew Drucker, Hoeteck Wee
2020/769 (PDF ) Lattice-Based Blind Signatures, Revisited Eduard Hauck, Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen
2020/768 (PDF ) Perfect Zero Knowledge: New Upperbounds and Relativized Separations Peter Dixon, Sutanu Gayen, A. Pavan, N. V. Vinodchandran
2020/767 (PDF ) Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability Carsten Baum, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
2020/766 (PDF ) The uncertainty of Side-Channel Analysis: A way to leverage from heuristics Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz
2020/765 (PDF ) Handling Adaptive Compromise for Practical Encryption Schemes Joseph Jaeger, Nirvan Tyagi
2020/764 (PDF ) Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai
2020/763 (PDF ) Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol Jia Xu, Yiwen Gao, Hoonwei Lim, Hongbing Wang, Ee-Chien Chang
2020/762 (PDF ) Functional Encryption for Attribute-Weighted Sums from $k$-Lin Michel Abdalla, Junqing Gong, Hoeteck Wee
2020/761 (PDF ) Decentralized reputation Tassos Dimitriou
2020/760 (PDF ) Curves with fast computations in the first pairing group Rémi Clarisse, Sylvain Duquesne, Olivier Sanders
2020/759 (PDF ) Chosen Ciphertext Security from Injective Trapdoor Functions Susan Hohenberger, Venkata Koppula, Brent Waters
2020/758 (PDF ) Verifiable state machines: Proofs that untrusted services operate correctly Srinath Setty, Sebastian Angel, Jonathan Lee
2020/757 (PDF ) Understanding Methodology for Efficient CNN Architectures in Profiling Attacks Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2020/756 (PDF ) Provable Security Analysis of FIDO2 Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Bogdan Warinschi
2020/755 (PDF ) Time-release Cryptography from Minimal Circuit Assumptions Samuel Jaques, Hart Montgomery, Arnab Roy
2020/754 (PDF ) Fluid MPC: Secure Multiparty Computation with Dynamic Participants Arka Rai Choudhuri, Aarushi Goel, Matthew Green, Abhishek Jain, Gabriel Kaptchuk
2020/753 (PDF ) Compressing Proofs of $k$-Out-Of-$n$ Partial Knowledge Thomas Attema, Ronald Cramer, Serge Fehr
2020/752 (PDF ) Continuous Group Key Agreement with Active Security Joël Alwen, Sandro Coretti, Daniel Jost, Marta Mularczyk
2020/751 (PDF ) DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Christof Paar
2020/750 (PDF ) Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging Max Hoffmann, Christof Paar
2020/749 (PDF ) Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al. Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang
2020/748 (PDF ) Anonymous probabilistic payment in payment hub Tatsuo Mitani, Akira Otsuka
2020/747 (PDF ) Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups Karim Eldefrawy, Seoyeon Hwang, Rafail Ostrovsky, Moti Yung
2020/746 (PDF ) Comparison of RISC-V and transport triggered architectures for a post-quantum cryptography application Latif AKÇAY, Berna ÖRS
2020/745 (PDF ) True Random Number Generation Based on DNA molecule Genetic Information (DNA-TRNG) Siddaramappa V, Ramesh K B
2020/744 (PDF ) Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras
2020/743 (PDF ) A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM Qian Guo, Thomas Johansson, Alexander Nilsson
2020/742 (PDF ) Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures Jan Richter-Brockmann, Tim Güneysu
2020/741 (PDF ) Fast Privacy-Preserving Punch Cards Saba Eskandarian
2020/740 (PDF ) Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback Erica Blum, Chen-Da Liu-Zhang, Julian Loss
2020/739 (PDF ) Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles Peter Chvojka, Tibor Jager, Daniel Slamanig, Christoph Striecks
2020/738 (PDF ) GIFT-COFB Subhadeep Banik, Avik Chakraborti, Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
2020/737 (PDF ) A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2020/736 (PDF ) Forward Security under Leakage Resilience, Revisited Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan
2020/735 (PDF ) Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger Heewon Chung, Kyoohyung Han, Chanyang Ju, Myungsun Kim, Jae Hong Seo
2020/734 (PDF ) Mirror Theory: A simple proof of the Pi+Pj Theorem with xi_max=2 Benoît Cogliati, Jacques Patarin
2020/733 (PDF ) A Side-Channel Resistant Implementation of SABER Michiel Van Beirendonck, Jan-Pieter D'Anvers, Angshuman Karmakar, Josep Balasch, Ingrid Verbauwhede
2020/732 (PDF ) Security of Multi-Adjustable Join Schemes: Separations and Implications Mojtaba Rafiee, Shahram Khazaei
2020/731 (PDF ) The Exact Security of PMAC with Three Powering-Up Masks Yusuke Naito
2020/730 (PDF ) On the Security of Time-Lock Puzzles and Timed Commitments Jonathan Katz, Julian Loss, Jiayu Xu
2020/729 (PDF ) Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF Melissa Chase, Peihan Miao
2020/728 (PDF ) Minerva: The curse of ECDSA nonces Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sys
2020/727 (PDF ) An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers Adrian Ranea, Yunwen Liu, Tomer Ashur
2020/726 (PDF ) On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments Denis Diemert, Tibor Jager
2020/725 (PDF ) Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model Gianluca Brian, Antonio Faonio, Maciej Obremski, Mark Simkin, Daniele Venturi
2020/724 (PDF ) Multi-Party Revocation in Sovrin: Performance through Distributed Trust Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch
2020/723 (PDF ) On the Confidentiality of Amounts in Grin Suyash Bagad, Saravanan Vijayakumaran
2020/722 (PDF ) NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities Yehuda Afek, Anat Bremler-Barr, Lior Shafir
2020/721 (PDF ) MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame
2020/720 (PDF ) Fast algebraic immunity of Boolean functions and LCD codes Sihem Mesnager, Chunming Tang
2020/719 (PDF ) Hypercube and Cascading-based Algorithms for Secret Sharing Schemes Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai
2020/718 (PDF ) Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3 Marc Fischlin, Felix Günther, Christian Janson
2020/717 (PDF ) Fault Location Identification By Machine Learning Anubhab Baksi, Santanu Sarkar, Akhilesh Siddhanti, Ravi Anand, Anupam Chattopadhyay
2020/716 (PDF ) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function Takeshi Sugawara, Tatsuya Onuma, Yang Li
2020/715 (PDF ) On (impracticality of) transfinite symmetric encryption with keys smaller than messages under GCH Sergij V. Goncharov
2020/714 (PDF ) One-One Constrained Pseudorandom Functions Naty Peter, Rotem Tsabary, Hoeteck Wee
2020/713 (PDF ) A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
2020/712 (PDF ) Anonymous IBE From Quadratic Residuosity With Fast Encryption Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng
2020/711 (PDF ) Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2020/710 (PDF ) Rational Behavior in Committee-Based Blockchains Yackolley Amoussou-Guenou, Bruno Biais, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2020/709 (PDF ) Reputable List Curation from Decentralized Voting Elizabeth C. Crites, Mary Maller, Sarah Meiklejohn, Rebekah Mercer
2020/708 (PDF ) Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov
2020/707 (PDF ) Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)) Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen
2020/706 (PDF ) A Logic Synthesis Toolbox for Reducing the Multiplicative Complexity in Logic Networks Eleonora Testa, Mathias Soeken, Heinz Riener, Luca Amaru, Giovanni De Micheli
2020/705 (PDF ) On the minimal value set size of APN functions Ingo Czerwinski
2020/704 (PDF ) Secure Single-Server Aggregation with (Poly)Logarithmic Overhead James Bell, K. A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova
2020/703 (PDF ) New Complexity Estimation on the Rainbow-Band-Separation Attack Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi
2020/702 (PDF ) Rainbow Band Separation is Better than we Thought Ray Perlner, Daniel Smith-Tone
2020/701 (PDF ) MPC with Friends and Foes Bar Alon, Eran Omri, Anat Paskin-Cherniavsky
2020/700 (PDF ) Personal data exchange protocol: X Vladimir Belsky, Ilia Gerasimov, Kirill Tsaregorodtsev, Ivan Chizhov
2020/699 (PDF ) Looking at the NIST Lightweight Candidates from a Masking Point-of-View Lauren De Meyer
2020/697 (PDF ) Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment F. Boudot, P. Gaudry, A. Guillevic, N. Heninger, E. Thomé, P. Zimmermann
2020/696 (PDF ) An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials Yin Li, Yu Zhang
2020/695 (PDF ) Collusion Resistant Watermarkable PRFs from Standard Assumptions Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu
2020/694 (PDF ) The nearest-colattice algorithm Thomas Espitau, Paul Kirchner
2020/693 (PDF ) Tight Quantum Time-Space Tradeoffs for Function Inversion Kai-Min Chung, Siyao Guo, Qipeng Liu, Luowen Qian
2020/692 (PDF ) Optimizing Inner Product Masking Scheme by A Coding Theory Approach Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger
2020/691 (PDF ) Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms Diego Aranha, Anders Dalskov, Daniel Escudero, Claudio Orlandi
2020/690 (PDF ) SAFE: A Secure and Efficient Long-Term Distributed Storage System Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni
2020/689 (PDF ) Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64 Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle
2020/688 (PDF ) Lin2-Xor Lemma: an OR-proof that leads to the membership proof and signature Anton A. Sokolov
2020/687 (PDF ) Lower Bounds on the Time/Memory Tradeoff of Function Inversion Dror Chawin, Iftach Haitner, Noam Mazor
2020/686 (PDF ) A Level Dependent Authentication for IoT Paradigm Chintan Patel, Nishant Doshi
2020/685 (PDF ) Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors Leo de Castro, Chiraag Juvekar, Vinod Vaikuntanathan
2020/684 (PDF ) How to (legally) keep secrets from mobile operators Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Thibaut Jacques, Adina Nedelcu, Cristina Onete
2020/683 (PDF ) Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model Abida Haque, Stephan Krenn, Daniel Slamanig, Christoph Striecks
2020/682 (PDF ) Succinct Diophantine-Satisfiability Arguments Patrick Towa, Damien Vergnaud
2020/681 (PDF ) An F-algebra for analysing information leaks in the presence of glitches Vittorio Zaccaria
2020/680 (PDF ) On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition Sumanta Sarkar, Yu Sasaki, Siang Meng Sim
2020/679 (PDF ) BETA: Biometric Enabled Threshold Authentication Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis
2020/678 (PDF ) Stronger Notions and a More Efficient Construction of Threshold Ring Signatures Alexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov
2020/677 (PDF ) Blockchain with Varying Number of Players T-H. Hubert Chan, Naomi Ephraim, Antonio Marcedone, Andrew Morgan, Rafael Pass, Elaine Shi
2020/676 (PDF ) An airdrop that preserves recipient privacy Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon
2020/675 (PDF ) Ledger Combiners for Fast Settlement Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell
2020/674 (PDF ) Coercion-Resistant Blockchain-Based E-Voting Protocol Chiara Spadafora, Riccardo Longo, Massimiliano Sala
2020/673 (PDF ) LotMint: Blockchain Returning to Decentralization with Decentralized Clock Wenbo MAO, Wenxiang WANG
2020/672 (PDF ) A Survey of Automatic Contact Tracing Approaches Using Bluetooth Low Energy Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/671 (PDF ) Persistent Fault Analysis With Few Encryptions Sebastien Carre, Sylvain Guilley, Olivier Rioul
2020/670 (PDF ) Inverse-Sybil Attacks in Automated Contact Tracing Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
2020/669 (PDF ) Proof of Mirror Theory for $\xi_{\max}=2$ Avijit Dutta, Mridul Nandi, Abishanka Saha
2020/668 (PDF ) On Subversion-Resistant SNARKs Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michał Zając
2020/667 (PDF ) New Results on the SymSum Distinguisher on Round-Reduced SHA3 Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan
2020/666 (PDF ) Revisiting the Hardness of Binary Error LWE Chao Sun, Mehdi Tibouchi, Masayuki Abe
2020/665 (PDF ) Montgomery-friendly primes and applications to cryptography Jean Claude Bajard, Sylvain Duquesne
2020/664 (PDF ) The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs Amos Beimel, Oriol Farràs
2020/663 (PDF ) Super-Linear Time-Memory Trade-Offs for Symmetric Encryption Wei Dai, Stefano Tessaro, Xihu Zhang
2020/662 (PDF ) Multi-Party Computation Mechanism for Anonymous Equity Block Trading: A Secure Implementation of Turquoise Plato Uncross John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
2020/661 (PDF ) Tight Consistency Bounds for Bitcoin Peter Gaži, Aggelos Kiayias, Alexander Russell
2020/660 (PDF ) Efficient Software Implementation of the SIKE Protocol Using a New Data Representation Jing Tian, Piaoyang Wang, Zhe Liu, Jun Lin, Zhongfeng Wang, Johann Großschädl
2020/659 (PDF ) Software Evaluation of Grain-128AEAD for Embedded Platforms Alexander Maximov, Martin Hell
2020/658 (PDF ) Time-Specific Signatures Masahito Ishizaka, Shinsaku Kiyomoto
2020/657 (PDF ) Traceable Constant-Size Multi-Authority Credentials Chloé Hébant, David Pointcheval
2020/656 (PDF ) On Length Independent Security Bounds for the PMAC Family Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
2020/655 (PDF ) Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel Yoo-Seung Won, Dirmanto Jap, Shivam Bhasin
2020/654 (PDF ) Proximity Gaps for Reed-Solomon Codes Eli Ben-Sasson, Dan Carmon, Yuval Ishai, Swastik Kopparty, Shubhangi Saraf
2020/653 (PDF ) MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation Zhen Hang Jiang, Yunsi Fei, Aidong Adam Ding, Thomas Wahl
2020/652 (PDF ) Somewhere Statistically Binding Commitment Schemes with Applications Prastudy Fauzi, Helger Lipmaa, Zaira Pindado, Janno Siim
2020/651 (PDF ) Cryptanalysis of ``FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things'' Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
2020/650 (PDF ) End-to-End Verifiable E-Voting Trial for Polling Station Voting Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Liu
2020/649 (PDF ) NIZK from SNARG Fuyuki Kitagawa, Takahiro Matsuda, Takashi Yamakawa
2020/648 (PDF ) Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust Yuncong Hu, Sam Kumar, Raluca Ada Popa
2020/647 (PDF ) A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes Saeid Esmaeilzade, Ziba Eslami, Nasrollah Pakniat
2020/646 (PDF ) Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices Ward Beullens, Shuichi Katsumata, Federico Pintore
2020/645 (PDF ) Correlation distribution analysis of a two-round key-alternating block cipher Liliya Kraleva, Nikolai L. Manev, Vincent Rijmen
2020/644 (PDF ) ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing Ignacio Cascudo, Bernardo David
2020/643 (PDF ) About Blockchain Interoperability Pascal Lafourcade, Marius Lombard-Platet
2020/642 (PDF ) The Ritva Blockchain: Enabling Confidential Transactions at Scale Henri Aare, Peter Vitols
2020/641 (PDF ) Overview of Polkadot and its Design Considerations Jeff Burdges, Alfonso Cevallos, Peter Czaban, Rob Habermeier, Syed Hosseini, Fabio Lama, Handan Kilinc Alper, Ximin Luo, Fatemeh Shirazi, Alistair Stewart, Gavin Wood
2020/640 (PDF ) Grover on SPECK: Quantum Resource Estimates Kyungbae Jang, Seungjoo Choi, Hyeokdong Kwon, Hwajeong Seo
2020/639 (PDF ) Constructions for Quantum Indistinguishability Obfuscation Anne Broadbent, Raza Ali Kazmi
2020/638 (PDF ) Delay Encryption Jeffrey Burdges, Luca De Feo
2020/636 (PDF ) Mixed-Technique Multi-Party Computations Composed of Two-Party Computations Erik-Oliver Blass, Florian Kerschbaum
2020/635 (PDF ) Two-Round Oblivious Linear Evaluation from Learning with Errors Pedro Branco, Nico Döttling, Paulo Mateus
2020/634 (PDF ) SILVER - Statistical Independence and Leakage Verification David Knichel, Pascal Sasdrich, Amir Moradi
2020/633 (PDF ) Improved torsion-point attacks on SIDH variants Victoria de Quehen, Péter Kutas, Chris Leonardi, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange
2020/632 (PDF ) Proposing an MILP-based Method for the Experimental Verification of Difference Trails Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri
2020/631 (PDF ) Simultaneous Diagonalization of Incomplete Matrices and Applications Jean-Sébastien Coron, Luca Notarnicola, Gabor Wiese
2020/630 (PDF ) ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy Zhiguo Wan, Xiaotong Liu
2020/629 (PDF ) Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer Vivek Arte, Mihir Bellare
2020/628 (PDF ) A post-quantum key exchange protocol from the intersection of quadric surfaces Daniele Di Tullio, Manoj Gyawali
2020/627 (PDF ) Attacking Zcash For Fun And Profit Duke Leto, The Hush Developers
2020/626 (PDF ) Game theoretical framework for analyzing Blockchains Robustness Paolo Zappalà, Marianna Belotti, Maria Potop-Butucaru, Stefano Secci
2020/625 (PDF ) Probability theory and public-key cryptography Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
2020/624 (PDF ) RSA for poor men: a cryptosystem based on probable primes to base 2 numbers Marek Wójtowicz
2020/623 (PDF ) PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim
2020/622 (PDF ) The Direction of Updatable Encryption does not Matter Much Yao Jiang
2020/621 (PDF ) How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment? Junbin Fang, Dominique Unruh, Jun Yan, Dehua Zhou
2020/620 (PDF ) Private Identity Agreement for Private Set Functionalities Ben Kreuter, Sarvar Patel, Ben Terner
2020/619 (PDF ) Security Analysis of NIST CTR-DRBG Viet Tung Hoang, Yaobin Shen
2020/618 (PDF ) Broadcast Secret-Sharing, Bounds and Applications Ivan Damgård, Kasper Green Larsen, Sophia Yakoubov
2020/617 (PDF ) New Techniques in Replica Encodings with Client Setup Rachit Garg, George Lu, Brent Waters
2020/616 (PDF ) Master-Key KDM-Secure IBE from Pairings Sanjam Garg, Romain Gay, Mohammad Hajiabadi
2020/615 (PDF ) LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom
2020/614 (PDF ) Lattice-Based E-Cash, Revisited Amit Deo, Benoit Libert, Khoa Nguyen, Olivier Sanders
2020/613 (PDF ) SiGamal: A supersingular isogeny-based PKE and its application to a PRF Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi
2020/612 (PDF ) Key Assignment Schemes with Authenticated Encryption, revisited Jeroen Pijnenburg, Bertram Poettering
2020/611 (PDF ) Efficient and Fast Hardware Architectures for SIKE Round 2 on FPGA Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2020/609 (PDF ) Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers Behnaz Rezvani, Thomas Conroy, Luke Beckwith, Matthew Bozzay, Trevor Laffoon, David McFeeters, Yijia Shi, Minh Vu, William Diehl
2020/608 (PDF ) The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits Fatih Balli, Andrea Caforio, Subhadeep Banik
2020/607 (PDF ) Energy Analysis of Lightweight AEAD Circuits Andrea Caforio, Fatih Balli, Subhadeep Banik
2020/606 (PDF ) Multiparty Noninteractive Key Exchange from Ring Key-Homomorphic Weak PRFs Navid Alamati, Hart Montgomery, Sikhar Patranabis
2020/605 (PDF ) LUSA: the HPC library for lattice-based cryptanalysis Artur Mariano
2020/604 (PDF ) Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions T-H. Hubert Chan, Elaine Shi, Wei-Kai Lin, Kartik Nayak
2020/603 (PDF ) Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification Gilles Barthe, Marc Gourjon, Benjamin Gregoire, Maximilian Orlt, Clara Paglialonga, Lars Porth
2020/602 (PDF ) CENCPP* - Beyond-birthday-secure Encryption from Public Permutations Arghya Bhattacharjee, Avijit Dutta, Eik List, Mridul Nandi
2020/601 (PDF ) Everything is a Race and Nakamoto Always Wins Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni
2020/600 (PDF ) Multi-Party Threshold Private Set Intersection with Sublinear Communication Saikrishna Badrinarayanan, Peihan Miao, Srinivasan Raghuraman, Peter Rindal
2020/599 (PDF ) Private Matching for Compute Prasad Buddhavarapu, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Vlad Vlaskin
2020/598 (PDF ) Cryptanalysis of Au et al. Dynamic Universal Accumulator Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto
2020/597 (PDF ) Bitstream Modification of Trivium Kalle Ngo, Elena Dubrova, Michail Moraitis
2020/596 (PDF ) Relationships between quantum IND-CPA notions Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Tabia, Dominique Unruh
2020/595 (PDF ) Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption Masahito Ishizaka, Shinsaku Kiyomoto
2020/594 (PDF ) LESS is More: Code-Based Signatures without Syndromes Jean-Francois Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini
2020/593 (PDF ) Alt-Coin Traceability Claire Ye, Chinedu Ojukwu, Anthony Hsu, Ruiqi Hu
2020/592 (PDF ) SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh
2020/591 (PDF ) Automatic Verification of Differential Characteristics: Application to Reduced Gimli (Full Version) Fukang Liu, Takanori Isobe, Willi Meier
2020/590 (PDF ) Expected Constant Round Byzantine Broadcast under Dishonest Majority Jun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas
2020/589 (PDF ) Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity Mykhailo Kasianchuk, Mikolaj Karpinski, Roman Kochan, Volodymyr Karpinskyi, Grzegorz Litawa, Inna Shylinska, Igor Yakymenko
2020/588 (PDF ) Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS ZaHyun Koo, Jong-Seon No, Young-Sik Kim
2020/587 (PDF ) MoniPoly---An Expressive $q$-SDH-Based Anonymous Attribute-Based Credential System Syh-Yuan Tan, Thomas Gross
2020/586 (PDF ) Component-Based Comparison of Privacy-First Exposure Notification Protocols Ellie Daw
2020/585 (PDF ) Improving Key Mismatch Attack on NewHope with Fewer Queries Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi
2020/584 (PDF ) vCNN: Verifiable Convolutional Neural Network based on zk-SNARKs Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh
2020/583 (PDF ) A New Targeted Password Guessing Model Xie Zhijie, Zhang Min, Yin Anqi, Li Zhenhan
2020/582 (PDF ) Risk and Architecture factors in Digital Exposure Notification Archanaa S. Krishnan, Yaling Yang, Patrick Schaumont
2020/581 (PDF ) The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency Benny Applebaum, Eliran Kachlon, Arpita Patra
2020/580 (PDF ) TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation Alexei Zamyatin, Zeta Avarikioti, Daniel Perez, William J. Knottenbelt
2020/579 (PDF ) BitFund: A Benevolent Blockchain Funding Network Darrow R Hartman
2020/578 (PDF ) HyperService: Interoperability and Programmability Across Heterogeneous Blockchains Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu
2020/577 (PDF ) Inner-Product Functional Encryption with Fine-Grained Access Control Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu
2020/576 (PDF ) How Low Can We Go? Yuval Ishai
2020/575 (PDF ) From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption Sanjit Chatterjee, R. Kabaleeshwaran
2020/574 (PDF ) Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization Ming Li, Jian Weng, Anjia Yang, Jiasi Weng, Yue Zhang
2020/573 (PDF ) Quantifying the Security Cost of Migrating Protocols to Practice Christopher Patton, Thomas Shrimpton
2020/572 (PDF ) HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms) Marina Polubelova, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche, Aymeric Fromherz, Natalia Kulatova, Santiago Zanella-Béguelin
2020/571 (PDF ) Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers (Extended Version) Anubhab Baksi, Jakub Breier, Yi Chen, Xiaoyang Dong
2020/570 (PDF ) On Optimality of d + 1 TI Shared Functions of 8 Bits or Less Dušan Božilov
2020/569 (PDF ) QA-NIZK Arguments of Same Opening for Bilateral Commitments Carla Ràfols, Javier Silva
2020/568 (PDF ) Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy) Tomer Ashur, Siemen Dhooghe
2020/567 (PDF ) An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster Yi Liu, Qi Wang, Siu-Ming Yiu
2020/566 (PDF ) Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain Auqib Hamid Lone, Roohie Naaz
2020/565 (PDF ) Homomorphic Computation in Reed-Muller Codes Jinkyu Cho, Young-Sik Kim, Jong-Seon No
2020/564 (PDF ) Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2020/563 (PDF ) Secure large-scale genome-wide association studies using homomorphic encryption Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Shafi Goldwasser
2020/562 (PDF ) The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure Hocheol Shin, Juhwan Noh, Dohyun Kim, Yongdae Kim
2020/561 (PDF ) Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks Fukang Liu, Takanori Isobe, Willi Meier
2020/560 (PDF ) Zerojoin: Combining Zerocoin and CoinJoin Alexander Chepurnoy, Amitabh Saxena
2020/559 (PDF ) PIVOT: PrIVate and effective cOntact Tracing Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa
2020/558 (PDF ) BSPL: Balanced Static Power Logic Bijan Fadaeinia, Thorben Moos, Amir Moradi
2020/557 (PDF ) On the sensitivity of some APN permutations to swapping points Lilya Budaghyan, Nikolay Kaleyski, Constanza Riera, Pantelimon Stanica
2020/556 (PDF ) Kerckhoffs' Legacy Jean-Claude Caraco, Rémi Géraud-Stewart, David Naccache
2020/555 (PDF ) Splitting Payments Locally While Routing Interdimensionally Lisa Eckey, Sebastian Faust, Kristina Hostáková, Stefanie Roos
2020/554 (PDF ) Bitcoin-Compatible Virtual Channels Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi
2020/553 (PDF ) Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang
2020/552 (PDF ) High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function Joon-Woo Lee, Eunsang Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No
2020/551 (PDF ) Higher Order Differential Attack against Full-Round BIG Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko
2020/550 (PDF ) Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation Ruiyu Zhu, Changchang Ding, Yan Huang
2020/549 (PDF ) Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay
2020/548 (PDF ) Blockchain Stealth Address Schemes Gary Yu
2020/547 (PDF ) Finding Bit-Based Division Property for Ciphers with Complex Linear Layer Kai Hu, Qingju Wang, Meiqin Wang
2020/546 (PDF ) MixColumns Coefficient Property and Security of the AES with A Secret S-Box Xin An, Kai Hu, Meiqin Wang
2020/545 (PDF ) Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security Ran Canetti, Pratik Sarkar, Xiao Wang
2020/544 (PDF ) SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis Okan Seker, Sebastian Berndt, Luca Wilke, Thomas Eisenbarth
2020/543 (PDF ) Kachina - Foundations of Private Smart Contracts Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
2020/542 (PDF ) Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2020/541 (PDF ) There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging Benjamin Dowling, Britta Hale
2020/540 (PDF ) One Round Threshold ECDSA with Identifiable Abort Rosario Gennaro, Steven Goldfeder
2020/539 (PDF ) On the Concrete Security of LWE with Small Secret Hao Chen, Lynn Chua, Kristin Lauter, Yongsoo Song
2020/538 (PDF ) Rotational Cryptanalysis on MAC Algorithm Chaskey Liliya Kraleva, Tomer Ashur, Vincent Rijmen
2020/537 (PDF ) TARDIS: A Foundation of Time-Lock Puzzles in UC Carsten Baum, Bernardo David, Rafael Dowsley, Jesper Buus Nielsen, Sabine Oechsner
2020/536 (PDF ) Influence of the Linear Layer on the Algebraic Degree in SP-Networks Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
2020/535 (PDF ) Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu
2020/534 (PDF ) Post-quantum TLS without handshake signatures Peter Schwabe, Douglas Stebila, Thom Wiggers
2020/533 (PDF ) Anonymous Lottery in the Proof-of-Stake Setting Foteini Baldimtsi, Varun Madathil, Alessandra Scafuro, Linfeng Zhou
2020/532 (PDF ) Promise: Leveraging Future Gains for Collateral Reduction Dominik Harz, Lewis Gudgeon, Rami Khalil, Alexei Zamyatin
2020/531 (PDF ) Centralized or Decentralized? The Contact Tracing Dilemma Serge Vaudenay
2020/530 (PDF ) Determining the Multiplicative Complexity of Boolean Functions using SAT Mathias Soeken
2020/529 (PDF ) CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs Cas Cremers, Moni Naor, Shahar Paz, Eyal Ronen
2020/528 (PDF ) Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo
2020/527 (PDF ) Aggregatable Subvector Commitments for Stateless Cryptocurrencies Alin Tomescu, Ittai Abraham, Vitalik Buterin, Justin Drake, Dankrad Feist, Dmitry Khovratovich
2020/526 (PDF ) Efficient Montgomery-like formulas for general Huff's and Huff's elliptic curves and their applications to the isogeny-based cryptography Robert Dryło, Tomasz Kijko, Michał Wroński
2020/525 (PDF ) Account Management in Proof of Stake Ledgers Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira
2020/524 (PDF ) Efficient Signatures on Randomizable Ciphertexts Balthazar Bauer, Georg Fuchsbauer
2020/523 (PDF ) Generalized Matsui Algorithm 1 with application for the full DES Tomer Ashur, Raluca Posteuca, Danilo Šijačić, Stef D’haeseleer
2020/522 (PDF ) Privately Connecting Mobility to Infectious Diseases via Applied Cryptography Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch
2020/521 (PDF ) MP-SPDZ: A Versatile Framework for Multi-Party Computation Marcel Keller
2020/520 (PDF ) MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation Yarkın Doröz, Jeffrey Hoffstein, Joseph H. Silverman, Berk Sunar
2020/519 (PDF ) Optimally-secure Coin-tossing against a Byzantine Adversary Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang
2020/518 (PDF ) Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings Muhammed F. Esgin, Ngoc Khanh Nguyen, Gregor Seiler
2020/517 (PDF ) Practical Product Proofs for Lattice Commitments Thomas Attema, Vadim Lyubashevsky, Gregor Seiler
2020/516 (PDF ) POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers Mordechai Guri
2020/515 (PDF ) On a hybrid approach to solve small secret LWE Thomas Espitau, Antoine Joux, Natalia Kharchenko
2020/514 (PDF ) On the Deployment of curve based cryptography for the Internet of Things Michael Scott
2020/513 (PDF ) E-cclesia: Universally Composable Self-Tallying Elections Myrto Arapinis, Nikolaos Lamprou, Lenka Mareková, Thomas Zacharias, Léo Ackermann, Pavlos Georgiou
2020/512 (PDF ) Glimpses are Forever in RC4 amidst the Spectre of Biases Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra
2020/511 (PDF ) JaxNet: Scalable Blockchain Network Iurii Shyshatsky, Vinod Manoharan, Taras Emelyanenko, Lucas Leger
2020/510 (PDF ) On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM Nir Drucker, Shay Gueron, Dusan Kostic, Edoardo Persichetti
2020/509 (PDF ) BBB Secure Nonce Based MAC Using Public Permutations Avijit Dutta, Mridul Nandi
2020/508 (PDF ) Augmenting Leakage Detection using Bootstrapping Yuan Yao, Michael Tunstall, Elke De Mulder, Anton Kochepasov, Patrick Schaumont
2020/507 (PDF ) Characteristics of Hadamard square of Reed--Muller subcodes of special type (Extended abstract) Victoria Vysotskaya
2020/506 (PDF ) Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations Sonia Belaïd, Pierre-Evariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff
2020/505 (PDF ) ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy Wasilij Beskorovajnov, Felix Dörre, Gunnar Hartung, Alexander Koch, Jörn Müller-Quade, Thorsten Strufe
2020/504 (PDF ) Storing and Retrieving Secrets on a Blockchain Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song
2020/503 (PDF ) A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder Aaron Hutchinson, Koray Karabina
2020/502 (PDF ) Applying Blockchain Layer2 Technology to Mass E-Commerce Sijia Zhao, Donal O’Mahony
2020/501 (PDF ) Fast Threshold ECDSA with Honest Majority Ivan Damgård, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergård
2020/500 (PDF ) Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer Lorenzo Grassi, Christian Rechberger, Markus Schofnegger
2020/499 (PDF ) Proof-Carrying Data from Accumulation Schemes Benedikt Bünz, Alessandro Chiesa, Pratyush Mishra, Nicholas Spooner
2020/498 (PDF ) Threshold ECDSA for Decentralized Asset Custody Adam Gągol, Jędrzej Kula, Damian Straszak, Michał Świętek
2020/497 (PDF ) Collusion-Preserving Computation without a Mediator Michele Ciampi, Yun Lu, Vassilis Zikas
2020/496 (PDF ) Linear Generalized ElGamal Encryption Scheme Demba Sow, Léo Robert, Pascal Lafourcade
2020/495 (PDF ) Disperse rotation operator DRT and use in some stream ciphers Kim Yong-Jin, Yon Yong-Ho, Jong Yu-Jin, Li Ok-Chol
2020/494 (PDF ) Improved Black-Box Constructions of Composable Secure Computation Rohit Chatterjee, Xiao Liang, Omkant Pandey
2020/493 (PDF ) Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti
2020/492 (PDF ) UC Non-Interactive, Proactive, Threshold ECDSA Ran Canetti, Nikolaos Makriyannis, Udi Peled
2020/491 (PDF ) Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic Hilder Vitor Lima Pereira
2020/490 (PDF ) SoK: Techniques for Verifiable Mix Nets Thomas Haines, Johannes Mueller
2020/489 (PDF ) Pandemic Contact Tracing Apps: DP-3T, PEPP-PT NTK, and ROBERT from a Privacy Perspective Fraunhofer AISEC
2020/488 (PDF ) Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption Yongwoo Lee, Joonwoo Lee, Young-Sik Kim, Jong-Seon No
2020/487 (PDF ) Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
2020/486 (PDF ) Rotational-XOR Cryptanalysis of Simon-like Block Ciphers Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li
2020/485 (PDF ) Edwards curve points counting method and supersingular Edwards and Montgomery curves Ruslan V. Skuratovskii
2020/484 (PDF ) Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions Aaqib Bashir Dar, Auqib Hamid Lone, Saniya Zahoor, Afshan Amin Khan, Roohie Naaz
2020/483 (PDF ) On Ideal and Weakly-Ideal Access Structures Reza Kaboli, Shahram Khazaei, Maghsoud Parviz
2020/482 (PDF ) A Trace Based $GF(2^n)$ Inversion Algorithm Haining Fan
2020/481 (PDF ) Using z14 Fused-Multiply-Add Instructions to Accelerate Elliptic Curve Cryptography James You, Qi Zhang, Curtis D'Alves, Bill O'Farrell, Christopher K. Anand
2020/480 (PDF ) Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Evaluation Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
2020/479 (PDF ) Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRF Tapas Pal, Ratna Dutta
2020/478 (PDF ) Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li
2020/477 (PDF ) Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More Essam Ghadafi
2020/476 (PDF ) Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostakova, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi
2020/475 (PDF ) Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews Zachary Zaccagni, Ram Dantu
2020/474 (PDF ) Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model Karim Baghery, Mahdi Sedaghat
2020/473 (PDF ) Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing Ashutosh Kumar, Raghu Meka, David Zuckerman
2020/471 (PDF ) Interpose PUF can be PAC Learned Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2020/470 (PDF ) LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4 Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stoettinger
2020/469 (PDF ) Dedicated Security Chips in the Age of Secure Enclaves Kari Kostiainen, Aritra Dhar, Srdjan Capkun
2020/468 (PDF ) Distributed Auditing Proofs of Liabilities Konstantinos Chalkias, Kevin Lewi, Payman Mohassel, Valeria Nikolaenko
2020/467 (PDF ) Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang
2020/466 (PDF ) Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks Pantea Kiaei, Darius Mercadier, Pierre-Evariste Dagand, Karine Heydemann, Patrick Schaumont
2020/465 (PDF ) Domain-Oriented Masked Instruction Set Architecture for RISC-V Pantea Kiaei, Patrick Schaumont
2020/464 (PDF ) Can a Public Blockchain Keep a Secret? Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin
2020/463 (PDF ) Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi
2020/462 (PDF ) An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption Ido Shahaf, Or Ordentlich, Gil Segev
2020/461 (PDF ) A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem Jean-Sébastien Coron, Agnese Gini
2020/460 (PDF ) A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption Marloes Venema, Greg Alpár
2020/459 (PDF ) Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations Debdeep Mukhopadhyay
2020/458 (PDF ) On the Optimality of Optimistic Responsiveness Ittai Abraham, Kartik Nayak, Ling Ren, Nibesh Shrestha
2020/457 (PDF ) Cryptographic Scheme for analyzing protected files on Sandboxes and share them privately Ahmad Almorabea
2020/456 (PDF ) General Congestion Attack on HTLC-Based Payment Channel Networks Zhichun Lu, Runchao Han, Jiangshan Yu
2020/455 (PDF ) Cryptanalysis of LEDAcrypt Daniel Apon, Ray Perlner, Angela Robinson, Paolo Santini
2020/454 (PDF ) Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification Thomas Pornin
2020/453 (PDF ) BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein F. Betül Durak, Loïs Huguenin-Dumittan, Serge Vaudenay
2020/452 (PDF ) Almost Public Quantum Coins Amit Behera, Or Sattath
2020/451 (PDF ) Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning Hao Chen, Miran Kim, Ilya Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh
2020/450 (PDF ) The Landscape of Pointcheval-Sanders Signatures: Mapping to Polynomial-Based Signatures and Beyond Kristian L. McDonald
2020/449 (PDF ) Switched Threshold Signatures from K-Private PolyShamir Secret Sharing Kristian L. McDonald
2020/448 (PDF ) Partial Secret Sharing Schemes Amir Jafari, Shahram Khazaei
2020/446 (PDF ) RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography Tim Fritzmann, Georg Sigl, Johanna Sepúlveda
2020/445 (PDF ) On Pseudorandom Encodings Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai
2020/444 (PDF ) A modern signature scheme with message recovery: Abe--Okamoto signatures with EdDSA elements Satō Shinichi
2020/443 (PDF ) A White-Box Masking Scheme Resisting Computational and Algebraic Attacks Okan Seker, Thomas Eisenbarth, Maciej Liskiewicz
2020/442 (PDF ) Fine-Grained Cryptography: A New Frontier? Alon Rosen
2020/441 (PDF ) Modeling for Three-Subset Division Property without Unknown Subset Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang
2020/440 (PDF ) Sublattice Attack on Poly-LWE with Wide Error Distributions Hao Chen
2020/439 (PDF ) The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
2020/438 (PDF ) Fast hybrid Karatsuba multiplier for Type II pentanomials Yin Li, Yu Zhang, Wei He
2020/437 (PDF ) Faster Montgomery and double-add ladders for short Weierstrass curves Mike Hamburg
2020/436 (PDF ) Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification Houssem Maghrebi
2020/435 (PDF ) WAGE: An Authenticated Encryption with a Twist Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit
2020/434 (PDF ) High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware Sujoy Sinha Roy, Andrea Basso
2020/433 (PDF ) zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays Martin Westerkamp, Jacob Eberhardt
2020/432 (PDF ) From A to Z: Projective coordinates leakage in the wild Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley
2020/431 (PDF ) x-only point addition formula and faster compressed SIKE Geovandro Pereira, Javad Doliskani, David Jao
2020/430 (PDF ) Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures Aram Jivanyan, Tigran Mamikonyan
2020/429 (PDF ) Mathematics and Cryptography: A Marriage of Convenience? Alice Silverberg
2020/428 (PDF ) Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc. Yaron Gvili
2020/427 (PDF ) Improving the Performance of the Picnic Signature Scheme Daniel Kales, Greg Zaverucha
2020/426 (PDF ) Privacy-Preserving Contact Tracing: current solutions and open questions Qiang Tang
2020/425 (PDF ) Friet: An Authenticated Encryption Scheme with Built-in Fault Detection Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel
2020/424 (PDF ) Low-gate Quantum Golden Collision Finding Samuel Jaques, André Schrottenloher
2020/423 (PDF ) On One-way Functions and Kolmogorov Complexity Yanyi Liu, Rafael Pass
2020/422 (PDF ) Pattern Matching on Encrypted Data Anis Bkakria, Nora Cuppens, Frédéric Cuppens
2020/420 (PDF ) Practical Card-Based Protocol for Three-Input Majority Kenji Yasunaga
2020/419 (PDF ) Pointproofs: Aggregating Proofs for Multiple Vector Commitments Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang
2020/418 (PDF ) Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing Krzysztof Pietrzak
2020/417 (PDF ) Optimal strategies for CSIDH Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
2020/416 (PDF ) The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-Rewinding Proofs for Schnorr Identification and Signatures Mihir Bellare, Wei Dai
2020/415 (PDF ) Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE Shweta Agrawal, Alice Pellet-Mary
2020/414 (PDF ) Semi-Quantum Money Roy Radian, Or Sattath
2020/413 (PDF ) Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks Louis Goubin, Matthieu Rivain, Junwei Wang
2020/412 (PDF ) Fixslicing: A New GIFT Representation Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin
2020/411 (PDF ) Secure Two-Party Computation in a Quantum World Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, Patrick Struck
2020/410 (PDF ) Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4 Hwajeong Seo, Mila Anastasova, Amir Jalali, Reza Azarderakhsh
2020/409 (PDF ) Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes Loïs Huguenin-Dumittan, Serge Vaudenay
2020/408 (PDF ) Speed up over the Rainbow Nir Drucker, Shay Gueron
2020/407 (PDF ) Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection Aydin Abadi, Sotirios Terzis, Changyu Dong
2020/406 (PDF ) Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience Atsuki Momose, Jason Paul Cruz, Yuichi Kaji
2020/405 (PDF ) Ordinos: A Verifiable Tally-Hiding E-Voting System Ralf Kuesters, Julian Liedtke, Johannes Mueller, Daniel Rausch, Andreas Vogt
2020/404 (PDF ) From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards Tassos Dimitriou
2020/403 (PDF ) Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes David Derler, Kai Samelin, Daniel Slamanig
2020/402 (PDF ) A Note on Low Order Assumptions in RSA groups István András Seres, Péter Burcsi
2020/401 (PDF ) Mining for Privacy: How to Bootstrap a Snarky Blockchain Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
2020/400 (PDF ) Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis Jeroen Delvaux
2020/399 (PDF ) Analysis of DP3T Serge Vaudenay
2020/398 (PDF ) CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures Samuel Brack, Leonie Reichert, Björn Scheuermann
2020/397 (PDF ) Classification of 4-bit S-boxes for BOGI-permutation Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
2020/396 (PDF ) Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing Donggeun Kwon, HeeSeok Kim, Seokhie Hong
2020/395 (PDF ) Cryptography from Information Loss Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod Vaikuntanathan, Prashant Nalini Vasudevan
2020/394 (PDF ) Candidate iO from Homomorphic Encryption Schemes Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
2020/393 (PDF ) LevioSA: Lightweight Secure Arithmetic Computation Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam
2020/392 (PDF ) An argument on the security of LRBC, a recently proposed lightweight block cipher Sadegh Sadeghi, Nasour Bagheri
2020/391 (PDF ) Optimized CSIDH Implementation Using a 2-torsion Point Donghoe Heo, Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
2020/390 (PDF ) A French cipher from the late 19th century Rémi Géraud-Stewart, David Naccache
2020/389 (PDF ) A Unary Cipher with Advantages over the Vernam Cipher Gideon Samid
2020/388 (PDF ) Fast 4 way vectorized ladder for the complete set of Montgomery curves Huseyin Hisil, Berkan Egrice, Mert Yassi
2020/387 (PDF ) Low-complexity and Reliable Transforms for Physical Unclonable Functions Onur Gunlu, Rafael F. Schaefer
2020/386 (PDF ) Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric Ralf Kuesters, Daniel Rausch, Mike Simon
2020/385 (PDF ) Two-Sided Malicious Security for Private Intersection-Sum with Cardinality Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung
2020/384 (PDF ) A ”Final” Security Bug Nguyen Thoi Minh Quan
2020/383 (PDF ) Parallel strategies for SIDH: Towards computing SIDH twice as fast Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
2020/382 (PDF ) Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks
2020/381 (PDF ) Proof-of-Reputation Blockchain with Nakamoto Fallback Leonard Kleinrock, Rafail Ostrovsky, Vassilis Zikas
2020/380 (PDF ) Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopdhyay
2020/379 (PDF ) Post-quantum WireGuard Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Fiona Johanna Weber, Philip R. Zimmermann
2020/378 (PDF ) Efficient 4-way Vectorizations of the Montgomery Ladder Kaushik Nath, Palash Sarkar
2020/377 (PDF ) Oblivious tight compaction in O(n) time with smaller constant Samuel Dittmer, Rafail Ostrovsky
2020/376 (PDF ) On the privacy of a code-based single-server computational PIR scheme Sarah Bordage, Julien Lavauzelle
2020/375 (PDF ) Privacy-Preserving Contact Tracing of COVID-19 Patients Leonie Reichert, Samuel Brack, Björn Scheuermann
2020/374 (PDF ) Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, abhi shelat, Muthu Venkitasubramaniam, Ruihan Wang
2020/373 (PDF ) Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES Huanyu Wang, Elena Dubrova
2020/372 (PDF ) Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions Claude Carlet
2020/371 (PDF ) Single-Trace Attacks on Keccak Matthias J. Kannwischer, Peter Pessl, Robert Primas
2020/370 (PDF ) Multiparty Generation of an RSA Modulus Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, abhi shelat
2020/369 (PDF ) The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs David Knichel, Thorben Moos, Amir Moradi
2020/368 (PDF ) Defeating NewHope with a Single Trace Dorian Amiet, Andreas Curiger, Lukas Leuenberger, Paul Zbinden
2020/367 (PDF ) Exploiting Decryption Failures in Mersenne Number Cryptosystems Marcel Tiepelt, Jan-Pieter D'Anvers
2020/366 (PDF ) FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection Hangwei Lu, Dhwani Mehta, Olivia Paradis, Navid Asadizanjani, Mark Tehranipoor, Damon L. Woodard
2020/365 (PDF ) A New Algorithm to Find Monic Irreducible Polynomials over Extended Galois field GF prime p and extension q using Positional Arithmetic Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/364 (PDF ) Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs Behzad Abdolmaleki, Daniel Slamanig
2020/363 (PDF ) On equivalence between known polynomial APN functions and power APN functions Qianhong Wan, Longjiang Qu, Chao Li
2020/361 (PDF ) How Not to Create an Isogeny-Based PAKE Reza Azarderakhsh, David Jao, Brian Koziel, Jason T. LeGrow, Vladimir Soukharev, Oleg Taraskin
2020/360 (PDF ) Composite Algorithm The New Algorithm to Search for Monic Irreducible Polynomials over Extended Galois Fields Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/359 (PDF ) 4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes. Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/358 (PDF ) Division Algorithm to search for monic irreducible polynomials over extended Galois Field GF(p^q). Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh
2020/357 (PDF ) Quasigroups and Substitution Permutation Networks: A Failed Experiment George Teseleanu
2020/356 (PDF ) Efficient MPC with a Mixed Adversary Martin Hirt, Marta Mularczyk
2020/355 (PDF ) Permissionless Consensus in the Resource Model Benjamin Terner
2020/352 (PDF ) Mina: Decentralized Cryptocurrency at Scale Joseph Bonneau, Izaak Meckler, Vanishree Rao, Evan Shapiro
2020/351 (PDF ) Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition Youssef El Housni, Aurore Guillevic
2020/350 (PDF ) New Multi-bit Differentials to Improve Attacks Against ChaCha Murilo Coutinho, T. C. Souza Neto
2020/349 (PDF ) Differential Power Analysis on (Non-)Linear Feedback Shift Registers Siang Meng Sim
2020/348 (PDF ) Constructing hidden order groups using genus three Jacobians Steve Thakur
2020/347 (PDF ) Some Low Round Zero Knowledge Protocols Hongda Li, Peifang Ni, Dongxue Pan
2020/346 (PDF ) Algebraic Attacks on Round-Reduced Keccak/Xoodoo Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang
2020/345 (PDF ) Bent functions stemming from Maiorana-McFarland class being provably outside its completed version Fengrong Zhangand, Nastja Cepak, Enes Pasalic, Yongzhuang Wei
2020/344 (PDF ) Anchoring the Value of Cryptocurrency Yibin Xu, Yangyu Huang, Jianhua Shao
2020/343 (PDF ) BSC: A Bitcoin Smart Contract Implementation Hiro Midas
2020/342 (PDF ) Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge Estuardo Alpirez Bock, Alexander Treff
2020/341 (PDF ) Faster computation of isogenies of large prime degree Daniel J. Bernstein, Luca De Feo, Antonin Leroux, Benjamin Smith
2020/340 (PDF ) Differential Privacy for Eye Tracking with Temporal Correlations Efe Bozkir, Onur Gunlu, Wolfgang Fuhl, Rafael F. Schaefer, Enkelejda Kasneci
2020/339 (PDF ) Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics George Teseleanu
2020/338 (PDF ) Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits Daniel Escudero, Satrajit Ghosh, Marcel Keller, Rahul Rachuri, Peter Scholl
2020/337 (PDF ) Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter
2020/336 (PDF ) Gimli Encryption in 715.9 psec Santosh Ghosh, Michael Kounavis, Sergej Deutsch
2020/335 (PDF ) An n/2 byzantine node tolerated blockchain sharding approach Yibin Xu, Yangyu Huang
2020/334 (PDF ) 4-Uniform Permutations with Null Nonlinearity Christof Beierle, Gregor Leander
2020/332 (PDF ) Implementation Study of Two Verifiable Delay Functions Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2020/331 (PDF ) The CTR mode with encrypted nonces and its extension to AE Sergey Agievich
2020/330 (PDF ) Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective Gil Segev, Ido Shahaf
2020/329 (PDF ) Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot
2020/328 (PDF ) Weight-Based Nakamoto-Style Blockchains Simon Holmgaard Kamp, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi
2020/327 (PDF ) On the design of stream ciphers with Cellular Automata having radius = 2 Anita John, Rohit Lakra, Jimmy Jose
2020/326 (PDF ) An upper bound on the decryption failure rate of static-key NewHope John M. Schanck
2020/325 (PDF ) SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts Robert Muth, Florian Tschorsch
2020/324 (PDF ) Defeating CAS-Unlock Bicky Shakya, Xiaolin Xu, Mark Tehranipoor, Domenic Forte
2020/323 (PDF ) A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos
2020/322 (PDF ) Optimal and Error-Free Multi-Valued Byzantine Consensus Through Parallel Execution Andrew Loveless, Ronald Dreslinski, Baris Kasikci
2020/321 (PDF ) Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism Jose Maria Bermudo Mera, Furkan Turan, Angshuman Karmakar, Sujoy Sinha Roy, Ingrid Verbauwhede
2020/320 (PDF ) Universally Composable Relaxed Password Authenticated Key Exchange Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu
2020/319 (PDF ) Secure k-ish nearest neighbors classifier Hayim Shaul, Dan Feldman, Daniela Rus
2020/318 (PDF ) Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL Huijia Lin, Ji Luo
2020/317 (PDF ) Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure Archisman Ghosh, Debayan Das, Shreyas Sen
2020/316 (PDF ) Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions Rishab Goyal, Sam Kim, Brent Waters, David J. Wu
2020/315 (PDF ) plookup: A simplified polynomial protocol for lookup tables Ariel Gabizon, Zachary J. Williamson
2020/314 (PDF ) Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi
2020/313 (PDF ) Security analysis of SPAKE2+ Victor Shoup
2020/311 (PDF ) A Blockchain Traceable Scheme with Oversight Function Tianjun Ma, Haixia Xu, Peili Li
2020/310 (PDF ) Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis Gabriel Destouet, Cécile Dumas, Anne Frassati, Valérie Perrier
2020/309 (PDF ) Cryptanalysis Results on Spook Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher
2020/308 (PDF ) Post-Quantum TLS on Embedded Systems Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, Michael Schneider
2020/307 (PDF ) Handling vectorial functions by means of their graph indicators Claude Carlet
2020/306 (PDF ) Leakage Assessment in Fault Attacks: A Deep Learning Perspective Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta
2020/305 (PDF ) 3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Masahito Gotaishi, Kou Shikata, Koji Sasaki, Nobuharu Suzuki, Masaki Hashiyada
2020/304 (PDF ) Multiparty Homomorphic Encryption from Ring-Learning-With-Errors Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Philippe Bossuat, Jean-Pierre Hubaux
2020/303 (PDF ) A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network Sergei Tikhomirov, Pedro Moreno-Sanchez, Matteo Maffei
2020/302 (PDF ) Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers Thomas Kaeding
2020/301 (PDF ) MadHatter: A toy cipher that conceals two plaintexts in the same ciphertext Thomas Kaeding
2020/300 (PDF ) Secure Multiparty Computation (MPC) Yehuda Lindell
2020/299 (PDF ) Hydra: Fast Isomorphic State Channels Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell
2020/298 (PDF ) Fast polynomial inversion for post quantum QC-MDPC cryptography Nir Drucker, Shay Gueron, Dusan Kostic
2020/297 (PDF ) Random Self-reducibility of Ideal-SVP via Arakelov Random Walks Koen de Boer, Léo Ducas, Alice Pellet-Mary, Benjamin Wesolowski
2020/296 (PDF ) Multidimensional Database Reconstruction from Range Query Access Patterns Akshima, David Cash, Francesca Falzon, Adam Rivkin, Jesse Stern
2020/295 (PDF ) Generalized Isotopic Shift Construction for APN Functions Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert Coulter, Irene Villa
2020/294 (PDF ) Public-Key Generation with Verifiable Randomness Olivier Blazy, Patrick Towa, Damien Vergnaud
2020/293 (PDF ) Many-out-of-Many Proofs and Applications to Anonymous Zether Benjamin E. Diamond
2020/292 (PDF ) LWE with Side Information: Attacks and Concrete Security Estimation Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi
2020/290 (PDF ) Linear Cryptanalysis of Reduced-Round SIMON Using Super Rounds Reham Almukhlifi, Poorvi Vora
2020/289 (PDF ) The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves Jonathan Lee
2020/288 (PDF ) Secure Key-Alternating Feistel Ciphers Without Key Schedule Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai
2020/287 (PDF ) Private resource allocators and their applications Sebastian Angel, Sampath Kannan, Zachary Ratliff
2020/286 (PDF ) Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages Geoffroy Couteau, Dominik Hartmann
2020/285 (PDF ) Improved Security Bounds for Generalized Feistel Networks Yaobin Shen, Chun Guo, Lei Wang
2020/284 (PDF ) Database Reconstruction Attacks in Two Dimensions Evangelia Anna Markatou, Roberto Tamassia
2020/283 (PDF ) CryptoWills: How to Bequeath Cryptoassets István András Seres, Omer Shlomovits, Pratyush Ranjan Tiwari
2020/282 (PDF ) The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More Jelle Don, Serge Fehr, Christian Majenz
2020/281 (PDF ) Privacy-friendly Monero transaction signing on a hardware wallet, extended version Dusan Klinec Vashek Matyas
2020/280 (PDF ) Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions Juliane Krämer, Patrick Struck
2020/279 (PDF ) Impact of System-on-Chip Integration of AEAD Ciphers Shashank Raghuraman, Leyla Nazhandali
2020/278 (PDF ) MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs Ahmed Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song
2020/277 (PDF ) How Does Satoshi Set His Clock? Full Analysis of Nakamoto Consensus Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
2020/276 (PDF ) CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware Hamid Nejatollahi, Saransh Gupta, Mohsen Imani, Tajana Simunic Rosing, Rosario Cammarota, Nikil Dutt
2020/275 (PDF ) Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz
2020/274 (PDF ) An Optimal Relational Database Encryption Scheme Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao
2020/273 (PDF ) On the Fast Algebraic Immunity of Threshold Functions Pierrick Méaux
2020/272 (PDF ) Privacy-Preserving Fast and Exact Linear Equations Solver with Fully Homomorphic Encryption Keita Arimitsu, Kazuki Otsuka
2020/271 (PDF ) Signatures from Sequential-OR Proofs Marc Fischlin, Patrick Harasser, Christian Janson
2020/270 (PDF ) Practical Predicate Encryption for Inner Product Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
2020/269 (PDF ) Order-Fairness for Byzantine Consensus Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels
2020/268 (PDF ) Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography Jose Maria Bermudo Mera, Angshuman Karmakar, Ingrid Verbauwhede
2020/267 (PDF ) Differential Power Analysis of the Picnic Signature Scheme Tim Gellersen, Okan Seker, Thomas Eisenbarth
2020/266 (PDF ) Quantum Indistinguishability for Public Key Encryption Tommaso Gagliardoni, Juliane Krämer, Patrick Struck
2020/265 (PDF ) New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More Benoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu
2020/264 (PDF ) Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi
2020/263 (PDF ) FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups Jihoon Kwon, Byeonghak Lee, Jooyoung Lee, Dukjae Moon
2020/262 (PDF ) A Note on the Ending Elliptic Curve in SIDH Christopher Leonardi
2020/261 (PDF ) Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk
2020/260 (PDF ) Lattice-based (Partially) Blind Signature without Restart Samuel Bouaziz-Ermann, Sébastien Canard, Gautier Eberhart, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré
2020/259 (PDF ) Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi
2020/258 (PDF ) NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations Zvika Brakerski, Venkata Koppula, Tamer Mour
2020/257 (PDF ) Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication Onur Gunlu, Rafael F. Schaefer, H. Vincent Poor
2020/256 (PDF ) Statistical ZAPR Arguments from Bilinear Maps Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
2020/255 (PDF ) Novel Deception Techniques for Malware Detection on Industrial Control Systems Takanori Machida, Dai Yamamoto, Yuki Unno, Hisashi Kojima
2020/254 (PDF ) Formalizing Data Deletion in the Context of the Right to be Forgotten Sanjam Garg, Shafi Goldwasser, Prashant Nalini Vasudevan
2020/253 (PDF ) Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing Hemanta K. Maji, Mingyuan Wang
2020/252 (PDF ) Secure Non-interactive Simulation: Feasibility & Rate Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen
2020/251 (PDF ) Communication Lower Bounds for Perfect Maliciously Secure MPC Ivan Damgård, Nikolaj I. Schwartzbach
2020/250 (PDF ) On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations Ehsan Aerabi, Athanasios Papadimitriou, David Hely
2020/248 (PDF ) Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast Ittai Abraham, Benny Pinkas, Avishay Yanai
2020/246 (PDF ) Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography Jing Tian, Jun Lin, Zhongfeng Wang
2020/245 (PDF ) New Assumptions and Efficient Cryptosystems from the $e$-th Power Residue Symbol Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu
2020/244 (PDF ) On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper
2020/243 (PDF ) An Analysis of Hybrid Public Key Encryption Benjamin Lipp
2020/241 (PDF ) Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability Mihir Bellare, Hannah Davis, Felix Günther
2020/240 (PDF ) MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture T-H. Hubert Chan, Kai-Min Chung, Wei-Kai Lin, Elaine Shi
2020/239 (PDF ) Viktoria: A new Paradigm for Hash Functions Edimar Veríssimo
2020/238 (PDF ) Efficient ECM factorization in parallel with the Lyness map Andrew Hone
2020/237 (PDF ) On Security Notions for Encryption in a Quantum World Céline Chevalier, Ehsan Ebrahimi, Quoc-Huy Vu
2020/236 (PDF ) Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21 Mridul Nandi
2020/235 (PDF ) Statistical Zaps and New Oblivious Transfer Protocols Vipul Goyal, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
2020/234 (PDF ) Application of commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups to Key Exchange Protocol Ruslan V. Skuratovskii, Aled Williams
2020/233 (PDF ) Key-Homomorphic Pseudorandom Functions from LWE with a Small Modulus Sam Kim
2020/232 (PDF ) Combiners for AEAD Bertram Poettering, Paul Rösler
2020/231 (PDF ) Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions Nuttapong Attrapadung, Junichi Tomida
2020/230 (PDF ) Lattice analysis on MiNTRU problem Changmin Lee, Alexandre Wallet
2020/229 (PDF ) Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications Itai Dinur
2020/228 (PDF ) Optimal Broadcast Encryption from Pairings and LWE Shweta Agrawal, Shota Yamada
2020/227 (PDF ) About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10 Yindong Chen, Limin Lin, Chuliang Wei
2020/226 (PDF ) Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol Meher Krishna Duggirala, Ravi Duggirala, Krishna Subba Rao Pulugurtha
2020/225 (PDF ) Generic-Group Delay Functions Require Hidden-Order Groups Lior Rotem, Gil Segev, Ido Shahaf
2020/224 (PDF ) Security under Message-Derived Keys: Signcryption in iMessage Mihir Bellare, Igors Stepanovs
2020/223 (PDF ) Compact NIZKs from Standard Assumptions on Bilinear Maps Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2020/222 (PDF ) Improving Speed and Security in Updatable Encryption Schemes Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih
2020/221 (PDF ) Multiparty Reusable Non-Interactive Secure Computation Fabrice Benhamouda, Huijia Lin
2020/220 (PDF ) Remote Side-Channel Attacks on Anonymous Transactions Florian Tramèr, Dan Boneh, Kenneth G. Paterson
2020/219 (PDF ) Multi-Client Functional Encryption for Separable Functions Michele Ciampi, Luisa Siniscalchi, Hendrik Waldner
2020/218 (PDF ) Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs Ehsan Aerabi, Milad Bohlouli, MohammadHasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, David Hely
2020/217 (PDF ) SynFi: Automatic Synthetic Fingerprint Generation M. Sadegh Riazi, Seyed M. Chavoshian, Farinaz Koushanfar
2020/216 (PDF ) Black-Box Constructions of Bounded-Concurrent Secure Computation Sanjam Garg, Xiao Liang, Omkant Pandey, Ivan Visconti
2020/215 (PDF ) Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption Megumi Ando, Anna Lysyanskaya
2020/214 (PDF ) Thresholdizing HashEdDSA: MPC to the Rescue Charlotte Bonte, Nigel P. Smart, Titouan Tanguy
2020/213 (PDF ) Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound Akinori Hosoyamada, Yu Sasaki
2020/212 (PDF ) Isogenies of certain abelian varieties over finite fields with p-ranks zero Steve Thakur
2020/211 (PDF ) Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2020/210 (PDF ) SITM: See-In-The-Middle--Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim
2020/209 (PDF ) Adaptive Simulation Security for Inner Product Functional Encryption Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu
2020/208 (PDF ) Random Integer Lattice Generation via HNF Gengran Hu, Lin You, Liqin Hu, Hui Wang
2020/207 (PDF ) (Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge Carsten Baum, Bernardo David, Rafael Dowsley
2020/205 (PDF ) SodsBC: A Post-quantum by Design Asynchronous Blockchain Framework Shlomi Dolev, Bingyong Guo, Jianyu Niu, Ziyu Wang
2020/204 (PDF ) Cryptographic Reverse Firewalls for Interactive Proof Systems Chaya Ganesh, Bernardo Magri, Daniele Venturi
2020/203 (PDF ) MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework Thang Hoang, Jorge Guajardo, Attila A. Yavuz
2020/202 (PDF ) Strong Anti-SAT: Secure and Effective Logic Locking Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava
2020/201 (PDF ) A Survey on Neural Trojans Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, Ankur Srivastava
2020/200 (PDF ) Leakage and Tamper Resilient Permutation-Based Cryptography Christoph Dobraunig, Bart Mennink, Robert Primas
2020/199 (PDF ) Improvement on a Masked White-box Cryptographic Implementation Seungkwang Lee, Myungchul Kim
2020/198 (PDF ) MPSign: A Signature from Small-Secret Middle-Product Learning with Errors Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang
2020/197 (PDF ) Dynamic Decentralized Functional Encryption Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2020/196 (PDF ) Trustless unknown-order groups Samuel Dobson, Steven D. Galbraith, Benjamin Smith
2020/195 (PDF ) Replicated state machines without replicated execution Jonathan Lee, Kirill Nikitin, Srinath Setty
2020/194 (PDF ) Adaptively Secure ABE for DFA from k-Lin and More Junqing Gong, Hoeteck Wee
2020/193 (PDF ) PSI from PaXoS: Fast, Malicious Private Set Intersection Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
2020/191 (PDF ) Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE Zvika Brakerski, Vinod Vaikuntanathan
2020/190 (PDF ) Proof of Necessary Work: Succinct State Verification with Fairness Guarantees Assimakis Kattis, Joseph Bonneau
2020/189 (PDF ) Guaranteed Output Delivery Comes Free in Honest Majority MPC Vipul Goyal, Yifan Song, Chenzhi Zhu
2020/188 (PDF ) Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer
2020/187 (PDF ) Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack Dragos Ioan Ilie, William J. Knottenbelt, Iain Stewart
2020/186 (PDF ) Bitcoin Crypto–Bounties for Quantum Capable Adversaries Dragos Ioan Ilie, Kostis Karantias, William J. Knottenbelt
2020/185 (PDF ) Hardware Private Circuits: From Trivial Composition to Full Verification Gaëtan Cassiers, Benjamin Grégoire, Itamar Levi, François-Xavier Standaert
2020/184 (PDF ) Fair and Decentralized Exchange of Digital Goods Ariel Futoransky, Carlos Sarraute, Daniel Fernandez, Matias Travizano, Ariel Waissbein
2020/183 (PDF ) A note on secure multiparty computation via higher residue symbols Ignacio Cascudo, Reto Schnyder
2020/182 (PDF ) An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang
2020/181 (PDF ) $L_1$-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi
2020/180 (PDF ) Multi-key Fully-Homomorphic Encryption in the Plain Model Prabhanjan Ananth, Abhishek Jain, ZhengZhong Jin, Giulio Malavolta
2020/179 (PDF ) Mind the Middle Layer: The HADES Design Strategy Revisited Nathan Keller, Asaf Rosemarin
2020/178 (PDF ) A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device Santosh Ghosh, Luis S Kida, Soham Jayesh Desai, Reshma Lal
2020/177 (PDF ) Revisiting (R)CCA Security and Replay Protection Christian Badertscher, Ueli Maurer, Christopher Portmann, Guilherme Rito
2020/176 (PDF ) Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version) Eugene Frimpong, Alexandros Bakas, Hai-Van Dang, Antonis Michalas
2020/175 (PDF ) Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma Stefan Dziembowski, Grzegorz Fabiański, Sebastian Faust, Siavash Riahi
2020/174 (PDF ) On Selective-Opening Security of Deterministic Primitives Mohammad Zaheri, Adam O'Neill
2020/173 (PDF ) Securing Proof-of-Work Ledgers via Checkpointing Dimitris Karakostas, Aggelos Kiayias
2020/172 (PDF ) Qubit-based Unclonable Encryption with Key Recycling Daan Leermakers, Boris Skoric
2020/171 (PDF ) High Performance Logistic Regression for Privacy-Preserving Genome Analysis Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki
2020/170 (PDF ) Reusable Two-Round MPC from DDH James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee
2020/169 (PDF ) Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE) Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin
2020/168 (PDF ) Improved Classical and Quantum Algorithms for Subset-Sum Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen
2020/167 (PDF ) Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning Jinhyun So, Basak Guler, A. Salman Avestimehr
2020/166 (PDF ) Non Atomic Payment Splitting in Channel Networks Stefan Dziembowski, Paweł Kędzior
2020/165 (PDF ) Subsampling and Knowledge Distillation On Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations Aron Gohr, Sven Jacob, Werner Schindler
2020/164 (PDF ) From discrete-log to lattices: maybe the real lessons were our broken schemes along the way? Alex Bienstock, Allison Bishop, Eli Goldin, Garrison Grogan, Victor Lecomte
2020/163 (PDF ) Impossibility Results for Lattice-Based Functional Encryption Schemes Akin Ünal
2020/162 (PDF ) A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity Ignacio Cascudo, Jaron Skovsted Gundersen
2020/161 (PDF ) Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu, Zhenkai Hu
2020/160 (PDF ) Solving Some Affine Equations over Finite Fields Sihem Mesnager, Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee
2020/159 (PDF ) Privacy-preserving collaborative machine learning on genomic data using TensorFlow Cheng Hong, Zhicong Huang, Wen-jie Lu, Hunter Qu, Li Ma, Morten Dahl, Jason Mancuso
2020/158 (PDF ) Jump index in T-functions for designing a new basic structure of stream ciphers Ali Hadipour, Seyed Mahdi Sajadieh, Raheleh Afifi
2020/157 (PDF ) Multi-Source Non-Malleable Extractors and Applications Vipul Goyal, Akshayaram Srinivasan, Chenzhi Zhu
2020/156 (PDF ) Phantom: An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts Xing Li, Yi Zheng, Kunxian Xia, Tongcheng Sun, John Beyler
2020/155 (PDF ) Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference Yifan Tian, Laurent Njilla, Jiawei Yuan, Shucheng Yu
2020/154 (PDF ) Combiners for Functional Encryption, Unconditionally Aayush Jain, Nathan Manohar, Amit Sahai
2020/153 (PDF ) Constructing Secure Multi-Party Computation with Identifiable Abort Nicholas Brandt, Sven Maier, Tobias Müller, Jörn Müller-Quade
2020/152 (PDF ) Compressed $\Sigma$-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics Thomas Attema, Ronald Cramer
2020/151 (PDF ) Breaking the decisional Diffie-Hellman problem for class group actions using genus theory -- extended version Wouter Castryck, Jana Sotáková, Frederik Vercauteren
2020/150 (PDF ) On the Security of NTS-KEM in the Quantum Random Oracle Model Varun Maram
2020/149 (PDF ) Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage Matteo Campanelli, Dario Fiore, Nicola Greco, Dimitris Kolonelos, Luca Nizzardo
2020/148 (PDF ) Determining the Core Primitive for Optimally Secure Ratcheting Fatih Balli, Paul Rösler, Serge Vaudenay
2020/147 (PDF ) Non-Malleability against Polynomial Tampering Marshall Ball, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan
2020/146 (PDF ) Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security Roman Langrehr, Jiaxin Pan
2020/145 (PDF ) Self-Secured PUF: Protecting the Loop PUF by Masking Lars Tebelmann, Jean-Luc Danger, Michael Pehl
2020/144 (PDF ) Double-Base Chains for Scalar Multiplications on Elliptic Curves Wei Yu, Saud Al Musa, Bao Li
2020/143 (PDF ) Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT Hailong Yao, Caifen Wang, Xingbing Fu, Chao Liu, Bin Wu, Fagen Li
2020/142 (PDF ) TARDIGRADE: An Atomic Broadcast Protocol for Arbitrary Network Conditions Erica Blum, Jonathan Katz, Julian Loss
2020/141 (PDF ) Deterministic-Prover Zero-Knowledge Proofs Hila Dahari, Yehuda Lindell
2020/140 (PDF ) PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang
2020/139 (PDF ) Going Beyond Dual Execution: MPC for Functions with Efficient Verification Carmit Hazay, abhi shelat, Muthuramakrishnan Venkitasubramaniam
2020/138 (PDF ) Smart Contract Derivatives Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
2020/137 (PDF ) Consistency for Functional Encryption Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss, Hendrik Waldner
2020/136 (PDF ) Stacked Garbling for Disjunctive Zero-Knowledge Proofs David Heath, Vladimir Kolesnikov
2020/135 (PDF ) Threshold Ring Signatures: New Definitions and Post-Quantum Security Abida Haque, Alessandra Scafuro
2020/134 (PDF ) Malicious Security Comes Free in Honest-Majority MPC Vipul Goyal, Yifan Song
2020/133 (PDF ) Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware Souradyuti Paul, Ananya Shrivastava
2020/132 (PDF ) Boosting Verifiable Computation on Encrypted Data Dario Fiore, Anca Nitulescu, David Pointcheval
2020/131 (PDF ) Coin Tossing with Lazy Defense: Hardness of Computation Results Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang
2020/130 (PDF ) Breaking the $O(\sqrt n)$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party Elette Boyle, Ran Cohen, Aarushi Goel
2020/129 (PDF ) Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security Juliane Krämer, Patrick Struck
2020/128 (PDF ) LegRoast: Efficient post-quantum signatures from the Legendre PRF Ward Beullens, Cyprien Delpech de Saint Guilhem
2020/127 (PDF ) Fifty Shades of Ballot Privacy: Privacy against a Malicious Board Véronique Cortier, Joseph Lallemand, Bogdan Warinschi
2020/126 (PDF ) Public-Key Puncturable Encryption: Modular and Compact Constructions Shi-Feng Sun, Amin Sakzad, Ron Steinfeld, Joseph Liu, Dawu Gu
2020/125 (PDF ) Oblivious Parallel Tight Compaction Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi
2020/124 (PDF ) Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512 Ali El Kaafarani, Shuichi Katsumata, Federico Pintore
2020/123 (PDF ) Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
2020/122 (PDF ) Verifiable Inner Product Encryption Scheme Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan
2020/121 (PDF ) When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead Hao Chen, Ilia Iliashenko, Kim Laine
2020/120 (PDF ) The randomized slicer for CVPP: sharper, faster, smaller, batchier Léo Ducas, Thijs Laarhoven, Wessel P. J. van Woerden
2020/119 (PDF ) Hardness of LWE on General Entropic Distributions Zvika Brakerski, Nico Döttling
2020/118 (PDF ) InfoCommit: Information-Theoretic Polynomial Commitment and Verification Saeid Sahraei, Salman Avestimehr
2020/117 (PDF ) Efficient BIKE Hardware Design with Constant-Time Decoder Andrew Reinders, Rafael Misoczki, Santosh Ghosh, Manoj Sastry
2020/116 (PDF ) Separating Two-Round Secure Computation from Oblivious Transfer Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
2020/115 (PDF ) A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing Xavier Boyen, Thomas Haines, Johannes Mueller
2020/114 (PDF ) A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou
2020/113 (PDF ) New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh, Emmanuel Thome
2020/112 (PDF ) A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography Patrick Karl, Michael Tempelmeier
2020/111 (PDF ) Adaptively Secure Constrained Pseudorandom Functions in the Standard Model Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2020/110 (PDF ) Blazing Fast OT for Three-Round UC OT Extension Ran Canetti, Pratik Sarkar, Xiao Wang
2020/109 (PDF ) Fixing the Achilles Heel of E-Voting: The Bulletin Board Lucca Hirschi, Lara Schmid, David Basin
2020/108 (PDF ) Practical Forgeries for ORANGE Christoph Dobraunig, Florian Mendel, Bart Mennink
2020/107 (PDF ) One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication Ryan Amos, Marios Georgiou, Aggelos Kiayias, Mark Zhandry
2020/106 (PDF ) Relaxed freshness in component authentication Frank Schuhmacher
2020/105 (PDF ) MCU intrinsic group features for component authentication Frank Schuhmacher
2020/104 (PDF ) On the Security Goals of White-Box Cryptography Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels
2020/103 (PDF ) Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128 Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier
2020/102 (PDF ) New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect Boxin Zhao, Xiaoyang Dong, Keting Jia
2020/101 (PDF ) A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future Haibat Khan, Keith M. Martin
2020/100 (PDF ) A direct proof of APN-ness of the Kasami functions Claude Carlet, Kwang Ho Kim, Sihem Mesnager
2020/099 (PDF ) Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson
2020/098 (PDF ) Improved key recovery on the Legendre PRF Novak Kaluđerović, Thorsten Kleinjung, Dusan Kostic
2020/097 (PDF ) Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard Stanislav S. Malakhov
2020/096 (PDF ) Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons David Galindo, Jia Liu, Mihai Ordean, Jin-Mann Wong
2020/095 (PDF ) SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors Zhongxiang Zheng, Anyu Wang, Haining Fan, Chunhuan Zhao, Chao Liu, Xue Zhang
2020/094 (PDF ) On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms Michael Davidson, Tyler Diamond
2020/093 (PDF ) A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials Romain Gay
2020/092 (PDF ) Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees Daniel Jost, Ueli Maurer
2020/091 (PDF ) Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption Jonathan Takeshita, Matthew Schoenbauer, Ryan Karl, Taeho Jung
2020/090 (PDF ) Witness Maps and Applications Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs
2020/089 (PDF ) The MILP-Aided Conditional Differential Attack and Its Application to Trivium Chen-Dong Ye, Tian Tian, Fan-Yang Zeng
2020/088 (PDF ) Streamlet: Textbook Streamlined Blockchains Benjamin Y Chan, Elaine Shi
2020/087 (PDF ) Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey) Elaine Shi
2020/086 (PDF ) Bootstrapping in FHEW-like Cryptosystems Daniele Micciancio, Yuriy Polyakov
2020/085 (PDF ) Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval Elovici
2020/084 (PDF ) Bandwidth-efficient threshold EC-DSA Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2020/083 (PDF ) Metal: A Metadata-Hiding File-Sharing System Weikeng Chen, Raluca Ada Popa
2020/082 (PDF ) Random Walks and Concurrent Zero-Knowledge Anand Aiyer, Xiao Liang, Nilu Nalini, Omkant Pandey
2020/081 (PDF ) Efficient polynomial commitment schemes for multiple points and polynomials Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon
2020/080 (PDF ) Better Secret-Sharing via Robust Conditional Disclosure of Secrets Benny Applebaum, Amos Beimel, Oded Nir, Naty Peter
2020/079 (PDF ) Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
2020/078 (PDF ) Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo Kentaro Tamura, Yutaka Shikano
2020/077 (PDF ) Improved Quantum Circuits for Elliptic Curve Discrete Logarithms Thomas Häner, Samuel Jaques, Michael Naehrig, Martin Roetteler, Mathias Soeken
2020/076 (PDF ) Wyner-Ziv reconciliation for key exchange based on Ring-LWE Charbel Saliba, Laura Luzzi, Cong Ling
2020/075 (PDF ) Memory-Tight Reductions for Practical Key Encapsulation Mechanisms Rishiraj Bhattacharyya
2020/074 (PDF ) Rolling up sleeves when subversion's in a field? Daniel R. L. Brown
2020/073 (PDF ) Anonymous Symmetric-Key Communication Fabio Banfi, Ueli Maurer
2020/072 (PDF ) Anonymous Tokens with Private Metadata Bit Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova
2020/071 (PDF ) Post-Quantum Authentication in TLS 1.3: A Performance Study Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis
2020/070 (PDF ) On Instantiating the Algebraic Group Model from Falsifiable Assumptions Thomas Agrikola, Dennis Hofheinz, Julia Kastner
2020/069 (PDF ) RSA and redactable blockchains Dima Grigoriev, Vladimir Shpilrain
2020/068 (PDF ) Further Clarification on Mantin's Digraph Repetition Bias in RC4 Pranab Chakraborty, Subhamoy Maitra
2020/067 (PDF ) Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse Taylor R Campbell
2020/066 (PDF ) Talek: Private Group Messaging with Hidden Access Patterns Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas Anderson, Arvind Krishnamurthy, Bryan Parno
2020/065 (PDF ) A Performant, Misuse-Resistant API for Primality Testing Jake Massimo, Kenneth G. Paterson
2020/063 (PDF ) Attack on LAC Key Exchange in Misuse Situation Aurelien Greuet, Simon Montoya, Guenael Renault
2020/062 (PDF ) Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig
2020/061 (PDF ) Simple Schnorr Signature with Pedersen Commitment as Key Gary Yu
2020/060 (PDF ) Auditable Asymmetric Password Authenticated Public Key Establishment Antonio Faonio, Maria Isabel Gonzalez Vasco, Claudio Soriente, Hien Thi Thu Truong
2020/059 (PDF ) ARX-KW, a family of key wrapping constructions using SipHash and ChaCha Satō Shinichi
2020/058 (PDF ) Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis Guilherme Perin, Ileana Buhan, Stjepan Picek
2020/057 (PDF ) On the smoothing parameter and last minimum of random orthogonal lattices Elena Kirshanova, Huyen Nguyen, Damien Stehlé, Alexandre Wallet
2020/056 (PDF ) AKCN-E8: Compact and Flexible KEM from Ideal Lattice Zhengzhong JIn, Yunlei Zhao
2020/055 (PDF ) When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA Alejandro Cabrera Aldaya, Billy Bob Brumley
2020/054 (PDF ) Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer
2020/053 (PDF ) Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems" Yasuhiko Ikematsu, Shuhei Nakamura
2020/052 (PDF ) Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef
2020/051 (PDF ) Low-Latency Hardware Masking with Application to AES Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark Marson
2020/050 (PDF ) Delphi: A Cryptographic Inference Service for Neural Networks Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa
2020/049 (PDF ) ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri
2020/048 (PDF ) Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage Changshe Ma, Yiping Gu, Hongfei Li
2020/047 (PDF ) New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version) Tianshuo Cong, Ximing Fu, Xuting Zhou, Yuli Zou, Haining Fan
2020/046 (PDF ) On Analysis of Lightweight Stream Ciphers with Keyed Update Orhun Kara, Muhammed F. Esgin
2020/045 (PDF ) Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6 Haibat Khan, Benjamin Dowling, Keith M. Martin
2020/044 (PDF ) Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts Alexander Chepurnoy, Amitabh Saxena
2020/043 (PDF ) Zone Encryption with Anonymous Authentication for V2V Communication Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
2020/042 (PDF ) BLAZE: Blazing Fast Privacy-Preserving Machine Learning Arpita Patra, Ajith Suresh
2020/041 (PDF ) Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders Aggelos Kiayias, Saad Quader, Alexander Russell
2020/040 (PDF ) A Compact and Scalable Hardware/Software Co-design of SIKE Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina
2020/039 (PDF ) Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis Damien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard
2020/038 (PDF ) Bitstream Modification Attack on SNOW 3G Michail Moraitis, Elena Dubrova
2020/037 (PDF ) Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput Matthias Fitzi, Peter Gaži, Aggelos Kiayias, Alexander Russell
2020/036 (PDF ) Analysis on Aigis-Enc: asymmetrical and symmetrical Yupu Hu, Siyue Dong, Xingting Dong
2020/035 (PDF ) Constant-round Dynamic Group Key Exchange from RLWE Assumption Rakyong Choi, Dongyeon Hong, Kwangjo Kim
2020/034 (PDF ) SkyEye: A Traceable Scheme for Blockchain Tianjun Ma, Haixia Xu, Peili Li
2020/033 (PDF ) Scalable Open-Vote Network on Ethereum Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef
2020/032 (PDF ) A New Approach for the Implementation of Binary Matrices Using SLP Applications Mahdi Sajadieh, Mohsen Mousavi
2020/031 (PDF ) Locally Decodable Codes with Randomized Encoding Kuan Cheng, Xin Li, Yu Zheng
2020/030 (PDF ) K-Cipher: A Low Latency, Bit Length Parameterizable Cipher Michael Kounavis, Sergej Deutsch, Santosh Ghosh, David Durham
2020/029 (PDF ) Differentially-Private Multi-Party Sketching for Large-Scale Statistics Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, Arkady Yerukhimovich
2020/028 (PDF ) Verified Security of BLT Signature Scheme Denis Firsov, Ahto Buldas, Ahto Truu, Risto Laanoja
2020/027 (PDF ) On Roots Factorization for PQC Algorithms Alexander Maximov
2020/026 (PDF ) Post-Quantum Secure Architectures for Automotive Hardware Secure Modules Wen Wang, Marc Stöttinger
2020/025 (PDF ) Single Secret Leader Election Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco
2020/024 (PDF ) The Arwen Trading Protocols (Full Version) Ethan Heilman, Sebastien Lipmann, Sharon Goldberg
2020/023 (PDF ) Threshold Multi-Signature with an Offline Recovery Party Riccardo Longo, Alessio Meneghetti, Massimiliano Sala
2020/022 (PDF ) Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material) Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
2020/021 (PDF ) eSIDH: the revenge of the SIDH Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
2020/020 (PDF ) Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu
2020/019 (PDF ) Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains Suhyeon Lee, Seungjoo Kim
2020/018 (PDF ) Triptych: logarithmic-sized linkable ring signatures with applications Sarang Noether, Brandon Goodell
2020/017 (PDF ) Biometric-Authenticated Searchable Encryption Daniel Gardham, Mark Manulis, Constantin Cătălin Drăgan
2020/016 (PDF ) Short Threshold Dynamic Group Signatures Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
2020/015 (PDF ) Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts Hao Chen, Wei Dai, Miran Kim, Yongsoo Song
2020/014 (PDF ) SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust Gaëtan Leurent, Thomas Peyrin
2020/013 (PDF ) On the Cryptographic Hardness of Local Search Nir Bitansky, Idan Gerichter
2020/012 (PDF ) Cortex-M4 Optimizations for \{R,M\}LWE Schemes Erdem Alkim, Yusuf Alper Bilgin, Murat Cenk, François Gérard
2020/011 (PDF ) Towards Vehicular Digital Forensics from Decentralized Trust: An Accountable, Privacy-preservation, and Secure Realization Ming Li, Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo
2020/010 (PDF ) Faster point compression for elliptic curves of $j$-invariant $0$ Dmitrii Koshelev
2020/009 (PDF ) Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions Thomas Pornin
2020/008 (PDF ) Secret Sharing Schemes for Ports of Matroids of Rank 3 Oriol Farràs
2020/007 (PDF ) On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann
2020/006 (PDF ) Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures André Chailloux, Thomas Debris-Alazard
2020/005 (PDF ) Lai-Massey Scheme Revisited M. R. Mirzaee Shamsabad, S. M. Dehnavi
2020/002 (PDF ) On a Conjecture of O'Donnell Qichun Wang
2020/001 (PDF ) Elliptic Curves of Nearly Prime Order Manoj Gyawali, Daniele Di Tullio
[ Cryptology ePrint archive ]