Cryptology ePrint Archive: Listing for 2021
Regex
2021/1705 (PDF ) GoUncle: A Blockchain Of, By, For Modest Computers Mao Wenbo, Wang Wenxiang
2021/1704 (PDF ) Verifiable Encryption from MPC-in-the-Head Akira Takahashi, Greg Zaverucha
2021/1703 (PDF ) The Maiorana-McFarland structure based cryptanalysis of Simon Hao Chen
2021/1702 (PDF ) CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake using Gradient Boosting based Ensemble Learning Anand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti
2021/1701 (PDF ) Cryptanalysis of the Cryptosystems Based on the Generalized Hidden Discrete Logarithm Problem Ma Yanlong
2021/1700 (PDF ) A Unified Framework for Non-Universal SNARKs Helger Lipmaa
2021/1699 (PDF ) A Compact Digital Signature Scheme Based on the Module-LWR problem* Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
2021/1698 (PDF ) Efficient Random Beacons with Adaptive Security for Ungrindable Blockchains Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell
2021/1697 (PDF ) Where Star Wars Meets Star Trek: SABER and Dilithium on the Same Polynomial Multiplier Andrea Basso, Furkan Aydin, Daniel Dinu, Joseph Friel, Avinash Varna, Manoj Sastry, Santosh Ghosh
2021/1696 (PDF ) Categorization of Faulty Nonce Misuse Resistant Message Authentication Yu Long Chen, Bart Mennink, Bart Preneel
2021/1695 (PDF ) Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over $\mathbb F_p^n$ Lorenzo Grassi, Silvia Onofri, Marco Pedicini, Luca Sozzi
2021/1694 (PDF ) RLWE-based distributed key generation and threshold decryption Ferran Alborch, Ramiro Martínez, Paz Morillo
2021/1693 (PDF ) Verifiable Decryption for BGV Tjerand Silde
2021/1692 (PDF ) Private Lives Matter: A Differential Private Functional Encryption Scheme (extended version) Alexandtros Bakas, Antonis Michalas, Tassos Dimitriou
2021/1691 (PDF ) Quantum commitments and signatures without one-way functions Tomoyuki Morimae, Takashi Yamakawa
2021/1690 (PDF ) Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX ciphers with Applications to Chaskey Yaqi Xu, Baofeng Wu, Dongdai Lin
2021/1689 (PDF ) Proof of a conjecture on a special class of matrices over commutative rings of characteristic 2 Baofeng Wu
2021/1688 (PDF ) Low-Complexity Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Multiplexed Parallel Convolutions Eunsang Lee, Joon-Woo Lee, Junghyun Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, Woosuk Choi
2021/1687 (PDF ) Computational Irrelevancy: Bridging the Gap between Pseudo- and Real Randomness in MPC Protocols Nariyasu Heseri, Koji Nuida
2021/1686 (PDF ) Hecate: Abuse Reporting in Secure Messengers with Sealed Sender Rawane Issa, Nicolas Alhaddad, Mayank Varia
2021/1685 (PDF ) Divide and Funnel: a Scaling Technique for Mix-Networks Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
2021/1684 (PDF ) Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs Li Yao, Yilei Chen, Yu Yu
2021/1683 (PDF ) PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics Valerie Fetzer, Marcel Keller, Sven Maier, Markus Raiber, Andy Rupp, Rebecca Schwerdt
2021/1682 (PDF ) Making Private Function Evaluation Safer, Faster, and Simpler Yi Liu, Qi Wang, Siu-Ming Yiu
2021/1681 (PDF ) On the security of OSIDH Pierrick Dartois, Luca De Feo
2021/1680 (PDF ) Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equivalence Classes Aisling Connolly, Pascal Lafourcade, Octavio Perez Kempner
2021/1679 (PDF ) Incompressible Cryptography Jiaxin Guan, Daniel Wichs, Mark Zhandry
2021/1678 (PDF ) Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers Matteo Campanelli, Felix Engelmann, Claudio Orlandi
2021/1677 (PDF ) Improving Support-Minors rank attacks: applications to G$e$MSS and Rainbow John Baena, Pierre Briaud, Daniel Cabarcas, Ray Perlner, Daniel Smith-Tone, Javier Verbel
2021/1676 (PDF ) Cryptographic Symmetric Structures Based on Quasigroups George Teseleanu
2021/1675 (PDF ) Traceable PRFs: Full Collusion Resistance and Active Security Sarasij Maitra, David J. Wu
2021/1674 (PDF ) Lattice-based Zero-knowledge Proofs for Blockchain Confidential Transactions Shang Gao, Tianyu ZHENG, Yu GUO, Zhe PENG, Bin XIAO
2021/1673 (PDF ) Proving as Fast as Computing: Succinct Arguments with Constant Prover Overhead Noga Ron-Zewi, Ron D. Rothblum
2021/1672 (PDF ) Succinct Zero-Knowledge Batch Proofs for Set Accumulators Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh
2021/1671 (PDF ) IronMask: Versatile Verification of Masking Security Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb
2021/1670 (PDF ) The complexity of solving Weil restriction systems Alessio Caminata, Michela Ceria, Elisa Gorla
2021/1669 (PDF ) Multi-Issuer Anonymous Credentials Without a Root Authority Kaoutar Elkhiyaoui, Angelo De Caro, Elli Androulaki
2021/1668 (PDF ) Secure Publish-Process-Subscribe System for Dispersed Computing Weizhao Jin, Bhaskar Krishnamachari, Muhammad Naveed, Srivatsan Ravi, Eduard Sanou, Kwame-Lante Wright
2021/1667 (PDF ) Using data compression and randomization to build an unconditionally secure short key cipher Boris Ryabko
2021/1666 (PDF ) Approximate Distance-Comparison-Preserving Symmetric Encryption Georg Fuchsbauer, Riddhi Ghosal, Nathan Hauke, Adam O'Neill
2021/1665 (PDF ) Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices Qiqi Lai, Feng-Hao Liu, Zhedong Wang
2021/1664 (PDF ) Towards a Simpler Lattice Gadget Toolkit Shiduo Zhang, Yang Yu
2021/1663 (PDF ) Cryptography from Pseudorandom Quantum States Prabhanjan Ananth, Luowen Qian, Henry Yuen
2021/1662 (PDF ) Information Security in the Quantum Era. Threats to modern cryptography: Grover’s algorithm Mihai-Zicu Mina, Emil Simion
2021/1661 (PDF ) Waldo: A Private Time-Series Database from Function Secret Sharing Emma Dauterman, Mayank Rathee, Raluca Ada Popa, Ion Stoica
2021/1660 (PDF ) Identity-Based Matchmaking Encryption without Random Oracles Danilo Francati, Alessio Guidi, Luigi Russo, Daniele Venturi
2021/1659 (PDF ) XTR and Tori Martijn Stam
2021/1658 (PDF ) Identifiable Cheating Entity Flexible Round-Optimized Schnorr Threshold (ICE FROST) Signature Protocol Alonso González, Hamy Ratoanina, Robin Salen, Setareh Sharifian, Vladimir Soukharev
2021/1657 (PDF ) SoK: Blockchain Light Clients Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias
2021/1656 (PDF ) Efficient Set Membership Proofs using MPC-in-the-Head Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk
2021/1655 (PDF ) Grover on Present: Quantum Resource Estimation Mostafizar Rahman, Goutam Paul
2021/1654 (PDF ) Quantifiable Assurance: From IPs to Platforms Bulbul Ahmed, Md Kawser Bepary, Nitin Pundir, Mike Borza, Oleg Raikhman, Amit Garg, Dale Donchin, Adam Cron, Mohamed A Abdel-moneum, Farimah Farahmandi, Fahim Rahman, Mark Tehranipoor
2021/1653 (PDF ) A Note on Non-Interactive Key Exchange from Code Equivalence Lindsey Knowles, Edoardo Persichetti, Tovohery Randrianarisoa, Paolo Santini
2021/1652 (PDF ) Financially Backed Covert Security Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2021/1651 (PDF ) A compiler for multi-key homomorphic signatures for Turing machines Somayeh Dolatnezhad Samarin, Dario Fiore, Daniele Venturi, Morteza Amini
2021/1650 (PDF ) “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar
2021/1649 (PDF ) A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels Wasilij Beskorovajnov, Roland Gröll, Jörn Müller-Quade, Astrid Ottenhues, Rebecca Schwerdt
2021/1648 (PDF ) A Scalable SIMD RISC-V based Processor with Customized Vector Extensions for CRYSTALS-Kyber Huimin Li, Nele Mentens, Stjepan Picek
2021/1647 (PDF ) Privacy-Preserving Authenticated Key Exchange for Constrained Devices Loïc Ferreira
2021/1646 (PDF ) A Method for Securely Comparing Integers using Binary Trees Anselme Tueno, Jonas Janneck, David Boehm
2021/1645 (PDF ) Sequential Indifferentiability of Confusion-Diffusion Networks Qi Da, Shanjie Xu, Chun Guo
2021/1644 (PDF ) Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes Zhenyu Lu, Weijia Wang, Kai Hu, Yanhong Fan, Lixuan Wu, Meiqin Wang
2021/1643 (PDF ) STROBE: Stake-based Threshold Random Beacons Donald Beaver, Konstantinos Chalkias, Mahimna Kelkar, Lefteris Kokoris Kogias, Kevin Lewi, Ladi de Naurois, Valeria Nicolaenko, Arnab Roy, Alberto Sonnino
2021/1642 (PDF ) SecNDP: Secure Near-Data Processing with Untrusted Memory Wenjie Xiong, Liu Ke, Dimitrije Jankov, Michael Kounavis, Xiaochen Wang, Eric Northup, Jie Amy Yang, Bilge Acun, Carole-Jean Wu, Ping Tak Peter Tang, G. Edward Suh, Xuan Zhang, Hsien-Hsin S. Lee.
2021/1641 (PDF ) Differential Cryptanalysis of WARP Je Sen Teh, Alex Biryukov
2021/1640 (PDF ) New Differential Cryptanalysis Results for the Lightweight Block Cipher BORON Je Sen Teh, Li Jing Tham, Norziana Jamil, Wun-She Yap
2021/1639 (PDF ) A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over $\mathbb{F}_2$ Charles Bouillaguet, Claire Delaplace, Monika Trimoska
2021/1638 (PDF ) 00 Nguyen Thoi Minh Quan
2021/1637 (PDF ) Internet Security and Quantum Computing Hilarie Orman
2021/1636 (PDF ) Does Fully Homomorphic Encryption Need Compute Acceleration? Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi
2021/1635 (PDF ) Synchronous Distributed Key Generation without Broadcasts Nibesh Shrestha, Adithya Bhat, Aniket Kate, Kartik Nayak
2021/1634 (PDF ) McEliece needs a Break -- Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD Andre Esser, Alexander May, Floyd Zweydinger
2021/1633 (PDF ) Zero Knowledge Proofs towards Verifiable Decentralized AI Pipelines Nitin Singh, Pankaj Dayama, Vinayaka Pandit
2021/1632 (PDF ) Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits Meryem Cherkaoui-Semmouni, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2021/1631 (PDF ) Secure Sampling of Constant-Weight Words – Application to BIKE Nicolas Sendrier
2021/1630 (PDF ) Exponential Increment of RSA Attack Range via Lattice Based Cryptanalysis Abderahmanne Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Domenica Stefania Merenda, Ali Ahmadian
2021/1629 (PDF ) Increment of Insecure RSA Private Exponent Bound Through Perfect Square RSA Diophantine Parameters Cryptanalysis Wan Nur Aqlili Ruzai, Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhammad Asyraf Asbullah
2021/1628 (PDF ) SoK: Mitigation of Front-running in Decentralized Finance Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen, Lorenzo Gentile
2021/1627 (PDF ) A PKI-based Framework for Establishing Efficient MPC Channels Daniel Masny, Gaven Watson
2021/1626 (PDF ) A Successful Subfield Lattice Attack on a Fully Homomorphic Encryption Scheme Martha Norberg Hovd
2021/1625 (PDF ) A note on the QFT randomness spectral test a new approach of DST Emil SIMION, Elena-Corina CIPU, Vasile-Laurențiu DOSAN, Andrei-Voicu TOMUȚ, Eugen Neacsu
2021/1624 (PDF ) On the IND-CCA1 Security of FHE Schemes Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum
2021/1623 (PDF ) On the Short Principal Ideal Problem over some real Kummer fields Andrea Lesavourey, Thomas Plantard, Willy Susilo
2021/1622 (PDF ) Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber Jeroen Delvaux
2021/1621 (PDF ) Alpha-Rays: Key Extraction Attacks on Threshold ECDSA Implementations Dmytro Tymokhanov, Omer Shlomovits
2021/1620 (PDF ) Unicity distance of the Zodiac-340 cipher Joachim von zur Gathen
2021/1618 (PDF ) Succinct Publicly-Certifiable Proofs (or: Can a Blockchain Verify a Designated-Verifier Proof?) Matteo Campanelli, Hamidreza Khoshakhlagh
2021/1617 (PDF ) Richelot Isogenies, Pairings on Squared Kummer Surfaces and Applications Chao Chen, Fangguo Zhang
2021/1616 (PDF ) A Note on the Post-Quantum Security of (Ring) Signatures Rohit Chatterjee, Kai-Min Chung, Xiao Liang, Giulio Malavolta
2021/1615 (PDF ) High-order Polynomial Comparison and Masking Lattice-based Encryption Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
2021/1612 (PDF ) Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sánchez
2021/1611 (PDF ) Solving degree, last fall degree, and related invariants Alessio Caminata, Elisa Gorla
2021/1610 (PDF ) Factoring Primes to Factor Moduli: Backdooring and Distributed Generation of Semiprimes Giuseppe Vitto
2021/1609 (PDF ) Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings Hiroki Furue, Momonari Kudo
2021/1608 (PDF ) An Optimized Quantum Implementation of ISD on Scalable Quantum Resources Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano
2021/1607 (PDF ) Efficient and Extensive Search Linear Approximations with High for Precise Correlations of Full SNOW-V ZhaoCun Zhou, DengGuo Feng, Bin Zhang
2021/1606 (PDF ) An Enhanced Long-term Blockchain Scheme Against Compromise of Cryptography Long Meng, Liqun Chen
2021/1605 (PDF ) Inflation-Tracking Proof-of-Work Crypto-Currencies Charanjit S. Jutla
2021/1604 (PDF ) The most efficient indifferentiable hashing to elliptic curves of $j$-invariant $1728$ Dmitrii Koshelev
2021/1603 (PDF ) CHEX-MIX: Combining Homomorphic Encryption with Trusted Execution Environments for Two-party Oblivious Inference in the Cloud Deepika Natarajan, Andrew Loveless, Wei Dai, Ronald Dreslinski
2021/1602 (PDF ) A Note on P/poly Validity of GVW15 Predicate Encryption Scheme Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu
2021/1601 (PDF ) Post-Quantum Security of the Even-Mansour Cipher Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz
2021/1600 (PDF ) A New Isogeny Representation and Applications to Cryptography Antonin Leroux
2021/1599 (PDF ) How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols Pankaj Dayama, Arpita Patra, Protik Paul, Nitin Singh, Dhinakaran Vinayagamurthy
2021/1598 (PDF ) Modelling IBE-based Key Exchange Protocol using Tamarin Prover Srijanee Mookherji, Vanga Odelu, Rajendra Prasath
2021/1597 (PDF ) Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite Marc Fischlin, Olga Sanina
2021/1596 (PDF ) SHealS and HealS: isogeny-based PKEs from akey validation method for SIDH Tako Boris Fouotsa, Christophe Petit
2021/1595 (PDF ) A formula for disaster: a unified approach to elliptic curve special-point-based attacks Vladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar, Billy Bob Brumley
2021/1594 (PDF ) On the Bottleneck Complexity of MPC with Correlated Randomness Claudio Orlandi, Divya Ravi, Peter Scholl
2021/1593 (PDF ) Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric Encryption Lei Xu, Huayi Duan, Anxin Zhou, Xingliang Yuan, Cong Wang
2021/1592 (PDF ) The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-based SCA Guilherme Perin, Lichao Wu, Stjepan Picek
2021/1591 (PDF ) Practical Asynchronous Distributed Key Generation Sourav Das, Thomas Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, Ling Ren
2021/1590 (PDF ) Garbling, Stacked and Staggered: Faster k-out-of-n Garbled Function Evaluation David Heath, Vladimir Kolesnikov, Stanislav Peceny
2021/1589 (PDF ) SoK: Validating Bridges as a Scaling Solution for Blockchains Patrick McCorry, Chris Buckland, Bennet Yee, Dawn Song
2021/1587 (PDF ) Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators Damiano Abram, Ariel Nof, Claudio Orlandi, Peter Scholl, Omer Shlomovits
2021/1586 (PDF ) Cryptanalysis of a Type of White-Box Implementations of the SM4 Block Cipher Jiqiang Lu, Jingyu Li, Zexuan Chen, Yanan Li
2021/1585 (PDF ) Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy Cong Zuo, Shangqi Lai, Shi-Feng Sun, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang, Liehuang Zhu, Shujie Cui
2021/1584 (PDF ) ppSAT: Towards Two-Party Private SAT Solving Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Xiao Wang
2021/1583 (PDF ) Orientations and the supersingular endomorphism ring problem Benjamin Wesolowski
2021/1582 (PDF ) CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks Changhai Ou, Debiao He, Zhu Wang, Kexin Qiao, Shihui Zheng, Siew-Kei Lam
2021/1581 (PDF ) Anonymous Authenticated Communication Fabio Banfi, Ueli Maurer
2021/1580 (PDF ) High Order Side-Channel Security for Elliptic-Curve Implementations Sonia Belaïd, Matthieu Rivain
2021/1579 (PDF ) Le Mans: Dynamic and Fluid MPC for Dishonest Majority Rahul Rachuri, Peter Scholl
2021/1578 (PDF ) On Quantum Query Complexities of Collision-Finding in Non-Uniform Random Functions Tianci Peng, Shujiao Cao, Rui Xue
2021/1577 (PDF ) SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs Michael Rosenberg, Mary Maller, Ian Miers
2021/1576 (PDF ) Shared Permutation for Syndrome Decoding: New Zero-Knowledge Protocol and Code-Based Signature Thibauld Feneuil, Antoine Joux, Matthieu Rivain
2021/1575 (PDF ) Shorter Lattice-Based Group Signatures via ``Almost Free'' Encryption and Other Optimizations Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon, Gregor Seiler
2021/1574 (PDF ) Ascon PRF, MAC, and Short-Input MAC Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
2021/1573 (PDF ) Improved Security Bound of \textsf{(E/D)WCDM} Nilanjan Datta, Avijit Dutta, Kushankur Dutta
2021/1572 (PDF ) Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128 (Full version) Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang
2021/1571 (PDF ) Tight Security for Key-Alternating Ciphers with Correlated Sub-Keys Stefano Tessaro, Xihu Zhang
2021/1570 (PDF ) Multicast Key Agreement, Revisited Alexander Bienstock, Yevgeniy Dodis, Yi Tang
2021/1569 (PDF ) ABBY: Automating leakage modeling for side-channels analysis Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina
2021/1568 (PDF ) Impeccable Circuits III Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Amir Moradi
2021/1567 (PDF ) Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations Tomer Ashur, Mohsin Khan, Kaisa Nyberg
2021/1566 (PDF ) Towards Using Blockchain Technology to Prevent Diploma Fraud Qiang Tang
2021/1565 (PDF ) Practical, Round-Optimal Lattice-Based Blind Signatures Shweta Agrawal, Elena Kirshanova, Damien Stehle, Anshu Yadav
2021/1564 (PDF ) Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
2021/1563 (PDF ) Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication Sebastian Paul, Patrik Scheible, Friedrich Wiemer
2021/1562 (PDF ) Concurrently Composable Non-Interactive Secure Computation Andrew Morgan, Rafael Pass
2021/1561 (PDF ) Quantum Time/Memory/Data Tradeoff Attacks Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2021/1560 (PDF ) SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations Shiyao Chen, Yanhong Fan, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo
2021/1559 (PDF ) Facial Template Protection via Lattice-based Fuzzy Extractors Kaiyi Zhang, Hongrui Cui, Yu Yu
2021/1558 (PDF ) RSA Key Recovery from Digit Equivalence Information Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom
2021/1557 (PDF ) Performance bounds for QC-MDPC codes decoders Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini
2021/1556 (PDF ) Diving Deep into the Weak Keys of Round Reduced Ascon Raghvendra Rohit, Santanu Sarkar
2021/1555 (PDF ) Accelerator for Computing on Encrypted Data Sujoy Sinha Roy, Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo
2021/1554 (PDF ) How to Claim a Computational Feat Clémence Chevignard, Rémi Géraud-Stewart, Antoine Houssais, David Naccache, Edmond de Roffignac
2021/1553 (PDF ) Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems George Tasopoulos, Jinhui Li, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld
2021/1552 (PDF ) Time-memory Trade-offs for Saber+ on Memory-constrained RISC-V Jipeng Zhang, Junhao Huang, Zhe Liu, Sujoy Sinha Roy
2021/1551 (PDF ) Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev
2021/1550 (PDF ) Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security Ziaur Rahman, Ibrahim Khalil, Mousumi Sumi
2021/1549 (PDF ) Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets Mariana Botelho da Gama, John Cartlidge, Antigoni Polychroniadou, Nigel P. Smart, Younes Talibi Alaoui
2021/1548 (PDF ) Just how hard are rotations of $\mathbb{Z}^n$? Algorithms and cryptography with the simplest lattice Huck Bennett, Atul Ganju, Pura Peetathawatchai, Noah Stephens-Davidowitz
2021/1547 (PDF ) SoK: Plausibly Deniable Storage Chen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion
2021/1546 (PDF ) Improving Deep Learning Networks for Profiled Side-Channel Analysis Using Performance Improvement Techniques Damien Robissout, Lilian Bossuet, Amaury Habrard, Vincent Grosso
2021/1545 (PDF ) Longest Chain Consensus Under Bandwidth Constraint Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse, Mohammad Alizadeh
2021/1544 (PDF ) Information Dispersal with Provable Retrievability for Rollups Kamilla Nazirkhanova, Joachim Neu, David Tse
2021/1543 (PDF ) Post-Quantum Zero Knowledge, Revisited (or: How to do Quantum Rewinding Undetectably) Alex Lombardi, Fermi Ma, Nicholas Spooner
2021/1542 (PDF ) An End-to-End Bitstream Tamper Attack Against Flip-Chip FPGAs Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2021/1541 (PDF ) Revisiting the Security of COMET Authenticated Encryption Scheme Shay Gueron, Ashwin Jha, Mridul Nandi
2021/1540 (PDF ) Lightweight Swarm Authentication George Teseleanu
2021/1539 (PDF ) Route Discovery in Private Payment Channel Networks Zeta Avarikioti, Mahsa Bastankhah, Mohammad Ali Maddah-Ali, Krzysztof Pietrzak, Jakub Svoboda, Michelle Yeo
2021/1538 (PDF ) SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah
2021/1537 (PDF ) PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher Shotaro Miyashita, Ryoma Ito, Atsuko Miyaji
2021/1536 (PDF ) SoK: Tokenization on Blockchain Gang Wang, Mark Nixon
2021/1535 (PDF ) Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Manicillas Lopez, Mridul Nandi
2021/1534 (PDF ) An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang
2021/1533 (PDF ) The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n Lorenzo Grassi, Dmitry Khovratovich, Sondre Rønjom, Markus Schofnegger
2021/1532 (PDF ) On the Download Rate of Homomorphic Secret Sharing Ingerid Fosli, Yuval Ishai, Victor I. Kolobov, Mary Wootters
2021/1531 (PDF ) Squint Hard Enough: Evaluating Perceptual Hashing with Machine Learning Jonathan Prokos, Tushar M. Jois, Neil Fendley, Roei Schuster, Matthew Green, Eran Tromer, Yinzhi Cao
2021/1530 (PDF ) Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets Alex Ozdemir, Dan Boneh
2021/1529 (PDF ) Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges Hosein Hadipour, Maria Eichlseder
2021/1528 (PDF ) An Alternative Approach for Computing Discrete Logarithms in Compressed SIDH Kaizhan Lin, Weize Wang, Lin Wang, Chang-An Zhao
2021/1527 (PDF ) CoHA-NTT: A Configurable Hardware Accelerator for NTT-based Polynomial Multiplication Kemal Derya, Ahmet Can Mert, Erdinç Öztürk, Erkay Savaş
2021/1526 (PDF ) A Performance Evaluation of Pairing-Based Broadcast Encryption Systems Arush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala
2021/1525 (PDF ) Amortizing Rate-1 OT and Applications to PIR and PSI Melissa Chase, Sanjam Garg, Mohammad Hajiabadi, Jialin Li, Peihan Miao
2021/1524 (PDF ) An Improved Range Proof with Base-3 Construction Esra Günsay, Cansu Betin Onur, Murat Cenk
2021/1523 (PDF ) Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang
2021/1522 (PDF ) On Cryptocurrency Wallet Design Ittay Eyal
2021/1521 (PDF ) Security evaluation against side-channel analysis at compilation time Nicolas Bruneau, Charles Christen, Jean-Luc Danger, Adrien Facon, Sylvain Guilley
2021/1520 (PDF ) Ark of the ECC: An open-source ECDSA power analysis attack on a FPGA based Curve P-256 implementation Jean-Pierre Thibault, Colin O’Flynn, Alex Dewar
2021/1519 (PDF ) Practical Garbled RAM: GRAM with $O(\log^2 n)$ Overhead David Heath, Vladimir Kolesnikov, Rafail Ostrovsky
2021/1518 (PDF ) Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs Valence Cristiani, Maxime Lecomte, Philippe Maurine
2021/1517 (PDF ) HOLMES: Efficient Distribution Testing for Secure Collaborative Learning Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca Ada Popa
2021/1516 (PDF ) Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round Nai-Hui Chia, Kai-Min Chung, Xiao Liang, Takashi Yamakawa
2021/1515 (PDF ) Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman
2021/1514 (PDF ) Clarion: Anonymous Communication from Multiparty Shuffling Protocols Saba Eskandarian, Dan Boneh
2021/1513 (PDF ) InterTrust: Towards an Efficient Blockchain Interoperability Architecture with Trusted Services Gang Wang, Mark Nixon
2021/1512 (PDF ) BLOCK CIPHER DEFINED BY MATRIX PRESENTATION OF QUASIGROUPS Smile Markovski, Vesna Dimitrova, Zlatka Trajcheska, Marija Petkovska, Mile Kostadinoski, Damjan Buhov
2021/1511 (PDF ) Compressed SIKE Round 3 on ARM Cortex-M4 Mila Anastasova, Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
2021/1510 (PDF ) Pattern Devoid Cryptography Gideon Samid
2021/1509 (PDF ) More Lessons: Analysis of PUF-based Authentication Protocols for IoT Karim Lounis, Mohammad Zulkernine
2021/1508 (PDF ) High-Speed Hardware Architectures and FPGA Benchmarking of CRYSTALS-Kyber, NTRU, and Saber Viet Ba Dang, Kamyar Mohajerani, Kris Gaj
2021/1507 (PDF ) Parallel Quantum Addition for Korean Block Cipher Kyungbae Jang, Gyeongju Song, Hyunjun Kim, Hyeokdong Kwon, Hyunji Kim, Hwajeong Seo
2021/1506 (PDF ) z-OTS: a one-time hash-based digital signaturescheme with fast verification Amos Zheng, Marcos A. Simplicio Jr.
2021/1505 (PDF ) EVA Improved: Compiler and Extension Library for CKKS Sangeeta Chowdhary, Wei Dai, Kim Laine, Olli Saarikivi
2021/1504 (PDF ) CCA SecureA Posteriori Openable Encryption in the Standard Model Xavier Bultel
2021/1503 (PDF ) Interaction-Preserving Compilers for Secure Computation Nico Döttling, Vipul Goyal, Giulio Malavolta, Justin Raizes
2021/1502 (PDF ) Strong and Tight Security Guarantees against Integral Distinguishers Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo
2021/1501 (PDF ) Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols Alisa Pankova, Jan Willemson
2021/1500 (PDF ) Succinct Erasure Coding Proof Systems Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang
2021/1499 (PDF ) Improved Lattice-Based Mix-Nets for Electronic Voting Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik
2021/1498 (PDF ) Rectangular, Range, and Restricted AONTs: Three Generalizations of All-or-Nothing Transforms Navid Nasr Esfahani, Douglas Stinson
2021/1497 (PDF ) GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2021/1496 (PDF ) Security Analysis Of DGM and GM Group Signature Schemes Instantiated With XMSS-T Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2021/1495 (PDF ) Veri Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver
2021/1494 (PDF ) On the efficiency of a general attack against the MOBS cryptosystem Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, Siamak F. Shahandashti
2021/1493 (PDF ) VASA: Vector AES Instructions for Security Applications Jean-Pierre Münch, Thomas Schneider, Hossein Yalame
2021/1492 (PDF ) SoK: Password-Authenticated Key Exchange -- Theory, Practice, Standardization and Real-World Lessons Feng Hao, Paul C. van Oorschot
2021/1491 (PDF ) The Hidden Lattice Problem Luca Notarnicola, Gabor Wiese
2021/1490 (PDF ) Precio: Private Aggregate Measurement via Oblivious Shuffling F. Betül Durak, Chenkai Weng, Erik Anderson, Kim Laine, Melissa Chase
2021/1489 (PDF ) Estimating the Effectiveness of Lattice Attacks Kotaro Abe, Makoto Ikeda
2021/1488 (PDF ) Accelerating the Delfs-Galbraith algorithm with fast subfield root detection Maria Corte-Real Santos, Craig Costello, Jia Shi
2021/1487 (PDF ) A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert
2021/1486 (PDF ) Mitaka: a simpler, parallelizable, maskable variant of Falcon Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
2021/1485 (PDF ) Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE Qian Guo, Clemens Hlauschek, Thomas Johansson, Norman Lahr, Alexander Nilsson, Robin Leander Schröder
2021/1484 (PDF ) On Forging SPHINCS+-Haraka Signatures on a Fault-tolerant Quantum Computer Robin M. Berger, Marcel Tiepelt
2021/1483 (PDF ) A Practical Forward-Secure DualRing Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen
2021/1482 (PDF ) The Optimal Error Resilience of Interactive Communication Over Binary Channels Meghal Gupta, Rachel Yun Zhang
2021/1481 (PDF ) Interactive Error Correcting Codes Over Binary Erasure Channels Resilient to $>\frac12$ Adversarial Corruption Meghal Gupta, Yael Tauman Kalai, Rachel Zhang
2021/1480 (PDF ) Extractors: Low Entropy Requirements Colliding With Non-Malleability Divesh Aggarwal, Eldon Chung, Maciej Obremski
2021/1479 (PDF ) Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and aPartial ML-Distinguisher Amirhossein Ebrahimi, Francesco Regazzoni, Paolo Palmieri
2021/1478 (PDF ) Zarcanum: A Proof-of-Stake Scheme for Confidential Transactions with Hidden Amounts sowle, koe
2021/1477 (PDF ) Multisignature with double threshold condition in the blockchain and its application to and strong keys generating Ruslan Skuratovskii, Alexandr Kalenyk
2021/1476 (PDF ) Multivariate public key cryptography with polynomial composition Emile Hautefeuille
2021/1475 (PDF ) Circuit-based PSI for Covid-19 Risk Scoring Leonie Reichert, Marcel Pazelt, Björn Scheuermann
2021/1474 (PDF ) Foundations of Transaction Fee Mechanism Design Hao Chung, Elaine Shi
2021/1473 (PDF ) Computational self-testing for entangled magic states Akihiro Mizutani, Yuki Takeuchi, Ryo Hiromasa, Yusuke Aikawa, Seiichiro Tani
2021/1472 (PDF ) Improving Cryptography Based On Entropoids Anisha Mukherjee, Saibal K. Pal
2021/1471 (PDF ) Efficient Searchable Symmetric Encryption for Join Queries Charanjit Jutla, Sikhar Patranabis
2021/1470 (PDF ) Concurrent-Secure Two-Party Computation in Two Rounds from Subexponential LWE Saikrishna Badrinarayanan, Rex Fernando, Amit Sahai
2021/1469 (PDF ) New Indifferentiability Security Proof of MDPH Hash Function Chun Guo, Tetsu Iwata, Kazuhiko Minematsu
2021/1468 (PDF ) LeakageVerif: Scalable and Efficient Leakage Verification in Symbolic Expressions Quentin L. Meunier, Etienne Pons, Karine Heydemann
2021/1467 (PDF ) On the Round Complexity of Black-box Secure MPC Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2021/1466 (PDF ) On semigroups of multivariate transformations constructed in terms of time dependent linguistic graphs and solutions of Post Quantum Multivariate Cryptography. V. Ustimenko
2021/1465 (PDF ) Themis: Fast, Strong Order-Fairness in Byzantine Consensus Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan
2021/1464 (PDF ) Polynomial-time targeted attacks on coin tossing for any number of corruptions Omid Etesami, Ji Gao, Saeed Mahloujifar, Mohammad Mahmoody
2021/1463 (PDF ) 3-Party Distributed ORAM from Oblivious Set Membership Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2021/1462 (PDF ) Prime pairing in algorithms searching for smooth group order Pavel Atnashev, George Woltman
2021/1461 (PDF ) A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange Aikata Aikata, Ahmet Can Mert, David Jacquemin, Amitabh Das, Donald Matthews, Santosh Ghosh, Sujoy Sinha Roy
2021/1460 (PDF ) Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR Itai Dinur, Nathan Keller, Ohad Klein
2021/1459 (PDF ) Privacy-preserving Identity Management System Jeonghyuk Lee, Jaekyung Choi, Hyunok Oh, Jihye Kim
2021/1458 (PDF ) QC-MDPC codes DFR and the IND-CCA security of BIKE Valentin Vasseur
2021/1457 (PDF ) An In-Depth Symbolic Security Analysis of the ACME Standard Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Kuesters, Guido Schmitz, Tim Wuertele
2021/1456 (PDF ) Server-Aided Continuous Group Key Agreement Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk
2021/1455 (PDF ) Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb, Damien Vergnaud
2021/1454 (PDF ) Russian Federal Remote E-voting Scheme of 2021 -- Protocol Description and Analysis Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson
2021/1453 (PDF ) A State-Separating Proof for Yao’s Garbling Scheme Chris Brzuska, Sabine Oechsner
2021/1452 (PDF ) A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks Abubakr Abdulgadir, Kamyar Mohajerani, Viet Ba Dang, Jens-Peter Kaps, Kris Gaj
2021/1451 (PDF ) High-Performance Hardware Implementation of CRYSTALS-Dilithium Luke Beckwith, Duc Tri Nguyen, Kris Gaj
2021/1450 (PDF ) Efficient Zero-Knowledge Argument in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier Sungwook Kim, Hyeonbum Lee, Jae Hong Seo
2021/1449 (PDF ) One-more Unforgeability of Blind ECDSA Xianrui Qin, Cailing Cai, Tsz Hon Yuen
2021/1448 (PDF ) Secure Featurization and Applications to Secure Phishing Detection Akash Shah, Nishanth Chandran, Mesfin Dema, Divya Gupta, Arun Gururajan, Huan Yu
2021/1447 (PDF ) Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3 Sebastian Paul, Yulia Kuzovkova, Norman Lahr, Ruben Niederhagen
2021/1446 (PDF ) Batch point compression in the context of advanced pairing-based protocols Dmitrii Koshelev
2021/1445 (PDF ) Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers Lukas Aumayr, Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei
2021/1444 (PDF ) Streamlined NTRU Prime on FPGA Bo-Yuan Peng, Adrian Marotzke, Ming-Han Tsai, Bo-Yin Yang, Ho-Lin Chen
2021/1443 (PDF ) Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun
2021/1442 (PDF ) On the {\sf P/poly} Validity of the Agr17 FE Scheme Yupu Hu, Siyue Dong, Baocang Wang
2021/1441 (PDF ) Length-preserving encryption with HCTR2 Paul Crowley, Nathan Huckleberry, Eric Biggers
2021/1440 (PDF ) Improved Circuit-based PSI via Equality Preserving Compression Kyoohyung Han, Dukjae Moon, Yongha Son
2021/1439 (PDF ) An Addendum to the ZUC-256 Stream Cipher Bin Zhang, Dengguo Feng, Chenhui Jin, Wen-Feng Qi, Wenling Wu, Chao Xu, Yanfeng Wang, Lin Jiao
2021/1438 (PDF ) Incremental Offline/Online PIR (extended version) Yiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel
2021/1437 (PDF ) ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking Anuj Dubey, Afzal Ahmad, Muhammad Adeel Pasha, Rosario Cammarota, Aydin Aysu
2021/1436 (PDF ) Efficient Representation of Numerical Optimization Problems for SNARKs Sebastian Angel, Andrew J. Blumberg, Eleftherios Ioannidis, Jess Woods
2021/1435 (PDF ) Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a ZhaoCun Zhou, DengGuo Feng, Bin Zhang
2021/1434 (PDF ) The Language's Impact on the Enigma Machine Daniel Matyas Perendi, Prosanta Gope
2021/1433 (PDF ) Oblivious Transfer from Trapdoor Permutations in Minimal Rounds Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
2021/1432 (PDF ) Wavelet: Code-based postquantum signatures with fast verification on microcontrollers Gustavo Banegas, Thomas Debris-Alazard, Milena Nedeljković, Benjamin Smith
2021/1431 (PDF ) Secure and Efficient Multi-Key FHE Scheme Supporting Multi-bit Messages from LWE Preserving Non-Interactive Decryption Chinmoy Biswas, Ratna Dutta
2021/1430 (PDF ) Improved Zero-Knowledge Argument of Encrypted Extended Permutation Yi Liu, Qi Wang, Siu-Ming Yiu
2021/1429 (PDF ) Reviewing ISO/IEC Standard for Time-stamping Services Long Meng, Liqun Chen
2021/1428 (PDF ) Non-randomness of S-unit lattices Daniel J. Bernstein, Tanja Lange
2021/1427 (PDF ) Public-Key Quantum Money with a Classical Bank Omri Shmueli
2021/1426 (PDF ) On Unpadded NTRU Quantum (In)Security Théodore Conrad-Frenkiel, Rémi Géraud-Stewart, David Naccache
2021/1425 (PDF ) Improving First-Order Threshold Implementations of SKINNY Andrea Caforio, Daniel Collins, Ognjen Glamocanin, Subhadeep Banik
2021/1423 (PDF ) Encryption to the Future: A Paradigm for Sending Secret Messages to Future (Anonymous) Committees Matteo Campanelli, Bernardo David, Hamidreza Khoshakhlagh, Anders Konring, Jesper Buus Nielsen
2021/1422 (PDF ) Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography Jan-Pieter D'Anvers, Daniel Heinz, Peter Pessl, Michiel van Beirendonck, Ingrid Verbauwhede
2021/1421 (PDF ) Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 Challenge Aleksei Udovenko, Giuseppe Vitto
2021/1420 (PDF ) Extending the Tally-Hiding Ordinos System: Implementations for Borda, Hare-Niemeyer, Condorcet, and Instant-Runoff Voting Fabian Hertel, Nicolas Huber, Jonas Kittelberger, Ralf Kuesters, Julian Liedtke, Daniel Rausch
2021/1419 (PDF ) With a Little Help from My Friends: Constructing Practical Anonymous Credentials Lucjan Hanzlik, Daniel Slamanig
2021/1418 (PDF ) Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets Qi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma, An Wang
2021/1417 (PDF ) How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption Koji Nuida
2021/1416 (PDF ) SME: Scalable Masking Extensions Ben Marshall, Dan Page
2021/1415 (PDF ) A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers Aayush Jain, Alexis Korb, Paul Lou, Amit Sahai
2021/1414 (PDF ) Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis Guilherme Perin, Lichao Wu, Stjepan Picek
2021/1413 (PDF ) Three Attacks on Proof-of-Stake Ethereum Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, David Tse
2021/1412 (PDF ) A General Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Key-Aggregation Hyesun Kwak, Dongwon Lee, Yongsoo Song, Sameer Wagh
2021/1411 (PDF ) Analysis of Client-side Security for Long-term Time-stamping Services Long Meng, Liqun Chen
2021/1410 (PDF ) Franchised Quantum Money Bhaskar Roberts, Mark Zhandry
2021/1409 (PDF ) Hiding in Plain Sight: Memory-tight Proofs via Randomness Programming Ashrujit Ghoshal, Riddhi Ghosal, Joseph Jaeger, Stefano Tessaro
2021/1408 (PDF ) Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
2021/1407 (PDF ) A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs Keitaro Hashimoto, Shuichi Katsumata, Eamonn Postlethwaite, Thomas Prest, Bas Westerbaan
2021/1406 (PDF ) Non-Slanderability of Linkable Spontaneous Anonymous Group Signature (LSAG) Veronika Kuchta, Joseph K. Liu
2021/1405 (PDF ) Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols Tianyu Zheng, Shang Gao, Yubo Song, Bin Xiao
2021/1404 (PDF ) Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments Dakshita Khurana
2021/1403 (PDF ) Efficient Adaptively-Secure Byzantine Agreement for Long Messages Amey Bhangale, Chen-Da Liu-Zhang, Julian Loss, Kartik Nayak
2021/1402 (PDF ) Guide to Fully Homomorphic Encryption over the [Discretized] Torus Marc Joye
2021/1401 (PDF ) HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, Michelle Yeo
2021/1400 (PDF ) Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version) Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, Takanori Isobe
2021/1399 (PDF ) Iterated Inhomogeneous Polynomials Jiaxin Guan, Mark Zhandry
2021/1398 (PDF ) Universally Composable Almost-Everywhere Secure Computation Nishanth Chandran, Pouyan Forghani, Juan Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas
2021/1397 (PDF ) Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties Craig Gentry, Shai Halevi, Vadim Lyubashevsky
2021/1396 (PDF ) NTT software optimization using an extended Harvey butterfly Jonathan Bradbury, Nir Drucker, Marius Hillenbrand
2021/1395 (PDF ) Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-degree Polynomials Reo Eriguchi, Koji Nuida
2021/1394 (PDF ) Rethinking Modular Multi-Exponentiation in Real-World Applications Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2021/1393 (PDF ) Fiat–Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model) Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
2021/1392 (PDF ) Differential fault attack on DEFAULT Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy, Santanu Sarkar
2021/1391 (PDF ) A note on a Claim of Eldar & Hallgren: LLL already solves it Léo Ducas, Wessel van Woerden
2021/1390 (PDF ) UC Secure Private Branching Program and Decision Tree Evaluation Keyu Ji, Bingsheng Zhang, Tianpei Lu, Lichun Li, Kui Ren
2021/1389 (PDF ) DPCrypto: Acceleration of Post-quantum Cryptographic Algorithms using Dot-Product Instruction on GPUs Wai-Kong Lee, Hwajeong Seo, Seong Oun Hwang, Angshuman Karmakar, Jose Maria Bermudo Mera, Ramachandra Achar
2021/1388 (PDF ) Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 Tarun Yadav, Manoj Kumar
2021/1387 (PDF ) Triplicate functions Lilya Budaghyan, Ivana Ivkovic, Nikolay Kaleyski
2021/1386 (PDF ) Efficient Threshold-Optimal ECDSA Michaella Pettit
2021/1385 (PDF ) BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs Nabil Alkeilani Alkadri, Patrick Harasser, Christian Janson
2021/1384 (PDF ) Log-$\mathcal{S}$-unit lattices using Explicit Stickelberger Generators to solve Approx Ideal-SVP Olivier Bernard, Andrea Lesavourey, Tuong-Huy Nguyen, Adeline Roux-Langlois
2021/1383 (PDF ) MHz2k: MPC from HE over $\mathbb{Z}_{2^k}$ with New Packing, Simpler Reshare, and Better ZKP Jung Hee Cheon, Dongwoo Kim, Keewoo Lee
2021/1382 (PDF ) ZPiE: Zero-knowledge Proofs in Embedded systems Xavier Salleras, Vanesa Daza
2021/1381 (PDF ) Multi-Authority ABE, Revisited Miguel Ambrona, Romain Gay
2021/1380 (PDF ) Orca: Blocklisting in Sender-Anonymous Messaging Nirvan Tyagi, Julia Len, Ian Miers, Thomas Ristenpart
2021/1379 (PDF ) Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work \\ A Provably Secure Blockchain Protocol Matthias Fitzi, Aggelos Kiayias, Giorgos Panagiotakos, Alexander Russell
2021/1378 (PDF ) Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi
2021/1377 (PDF ) Fiat-Shamir Transformation of Multi-Round Interactive Proofs Thomas Attema, Serge Fehr, Michael Klooß
2021/1376 (PDF ) Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks Ivan Damgård, Daniel Escudero, Antigoni Polychroniadou
2021/1375 (PDF ) How to Prove Schnorr Assuming Schnorr: Security of Multi- and Threshold Signatures Elizabeth Crites, Chelsea Komlo, Mary Maller
2021/1374 (PDF ) Information-Combining Differential Fault Attacks on DEFAULT Marcel Nageler, Christoph Dobraunig, Maria Eichlseder
2021/1373 (PDF ) Highly Efficient OT-Based Multiplication Protocols Iftach Haitner, Nikolaos Makriyannis, Samuel Ranellucci, Eliad Tsfadia
2021/1372 (PDF ) Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones Eugene Frimpong, Reyhaneh Rabbaninejad, Antonis Michalas
2021/1371 (PDF ) A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test Kyoichi Asano, Keita Emura, Atsushi Takayasu, Yohei Watanabe
2021/1370 (PDF ) Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments Dimitris Mouris, Nektarios Georgios Tsoutsos
2021/1369 (PDF ) Faster Isogenies for Quantum-Safe SIKE Rami Elkhatib, Brian Koziel, Reza Azarderakhsh
2021/1368 (PDF ) Isogeny-based Group Signatures and Accountable Ring Signatures in QROM Kai-Min Chung, Yao-Ching Hsieh, Mi-Ying Huang, Yu-Hsuan Huang, Tanja Lange, Bo-Yin Yang
2021/1366 (PDF ) Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, Federico Pintore
2021/1365 (PDF ) Collusion Resistant Revocable Ring Signatures and Group Signatures from Hard Homogeneous Spaces Yi-Fu Lai, Samuel Dobson
2021/1364 (PDF ) Non-applicability of the Gaborit&Aguilar-Melchor patent to Kyber and Saber Vadim Lyubashevsky, Damien Stehlé
2021/1363 (PDF ) On Entropy and Bit Patterns of Ring Oscillator Jitter Markku-Juhani O. Saarinen
2021/1362 (PDF ) Practical Multiple Persistent Faults Analysis Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri
2021/1361 (PDF ) Plumo: An Ultralight Blockchain Client Psi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer
2021/1360 (PDF ) Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More Behzad Abdolmaleki, Daniel Slamanig
2021/1359 (PDF ) Families of SNARK-friendly 2-chains of elliptic curves Youssef El Housni, Aurore Guillevic
2021/1358 (PDF ) The Hardness of LWE and Ring-LWE: A Survey David Balbás
2021/1356 (PDF ) Structural Mutual Information and Its Application Youliang Tian, Zhiying Zhang, Jinbo Xiong, Jianfeng Ma
2021/1355 (PDF ) Curve448 on 32-bit ARM Cortex-M4 Hwajeong Seo, Reza Azarderakhsh
2021/1354 (PDF ) SoK: On the Security of Cryptographic Problems from Linear Algebra Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren
2021/1353 (PDF ) Noise-Tolerant Quantum Tokens for MAC Amit Behera, Or Sattath, Uriel Shinar
2021/1352 (PDF ) A Thorough Treatment of Highly-Efficient NTRU Instantiations Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler, Dominique Unruh
2021/1351 (PDF ) Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing Julien Duman, Eike Kiltz, Kathrin Hövelmanns, Vadim Lyubashevsky, Gregor Seiler
2021/1350 (PDF ) Generalized Proof of Liabilities Yan Ji, Konstantinos Chalkias
2021/1349 (PDF ) Updatable Private Set Intersection Saikrishna Badrinarayanan, Peihan Miao, Tiancheng Xie
2021/1348 (PDF ) Beyond quadratic speedups in quantum attacks on symmetric schemes Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras
2021/1347 (PDF ) TOTA: Fully Homomorphic Encryption with Smaller Parameters and Stronger Security Zhaomin Yang, Xiang Xie, Huajie Shen, Shiying Chen, Jun Zhou
2021/1346 (PDF ) WeStat: a Privacy-Preserving Mobile Data Usage Statistics System Sébastien Canard, Nicolas Desmoulins, Sébastien Hallay, Adel Hamdi, Dominique Le Hello
2021/1345 (PDF ) New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair Subhadeep Banik, Khashayar Barooti, Serge Vaudenay, Hailun Yan
2021/1344 (PDF ) Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu
2021/1343 (PDF ) A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW Hanlin Liu, Yu Yu
2021/1342 (PDF ) Efficient Functional Commitments: How to Commit to a Private Function Dan Boneh, Wilson Nguyen, Alex Ozdemir
2021/1341 (PDF ) Anonymous Whistleblowing over Authenticated Channels Thomas Agrikola, Geoffroy Couteau, Sven Maier
2021/1340 (PDF ) TEDT2 - Highly Secure Leakage-resilient TBC-based Authenticated Encryption Eik List
2021/1339 (PDF ) Safe-Error Analysis of Post-Quantum Cryptography Mechanisms Luk Bettale, Simon Montoya, Guénaël Renault
2021/1338 (PDF ) Embedded Multilayer Equations: a New Hard Problem for Constructing Post-Quantum Signatures Smaller than RSA (without Hardness Assumption) Dongxi Liu
2021/1337 (PDF ) Large-Precision Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping Zeyu Liu, Daniele Micciancio, Yuriy Polyakov
2021/1336 (PDF ) Improved Computational Extractors and their Applications Dakshita Khurana, Akshayaram Srinivasan
2021/1335 (PDF ) Integer Functions Suitable for Homomorphic Encryption over Finite Fields Ilia Iliashenko, Christophe Nègre, Vincent Zucca
2021/1334 (PDF ) Indistinguishability Obfuscation from LPN over F_p, DLIN, and PRGs in NC^0 Aayush Jain, Huijia Lin, Amit Sahai
2021/1333 (PDF ) Paradoxical Compression with Verifiable Delay Functions Thomas Pornin
2021/1332 (PDF ) On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography Léo Ducas, Wessel van Woerden
2021/1331 (PDF ) Communicating Through Subliminal-Free Signatures George Teseleanu
2021/1330 (PDF ) On the security of ECDSA with additive key derivation and presignatures Jens Groth, Victor Shoup
2021/1329 (PDF ) Trail Search with CRHS Equations John Petter Indrøy, Håvard Raddum
2021/1328 (PDF ) Cross Subkey Side Channel Analysis Based on Small Samples Fanliang Hu, Huanyu Wang, Junnian Wang
2021/1327 (PDF ) Secure Multiparty Computation in the Bounded Storage Model Jiahui Liu, Satyanarayana Vusirikala
2021/1326 (PDF ) FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices Mo Zhang, Eduard Marin, David Oswald, Dave Singelee
2021/1325 (PDF ) Decentralized Multi-Authority ABE for NC^1 from Computational-BDH Pratish Datta, Ilan Komargodski, Brent Waters
2021/1324 (PDF ) Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption Kamil Kluczniak
2021/1323 (PDF ) Anonymity of NIST PQC Round 3 KEMs Keita Xagawa
2021/1322 (PDF ) A New Adaptive Attack on SIDH Tako Boris Fouotsa, Christophe Petit
2021/1321 (PDF ) Blockchain-based Privacy-preserving Fair Data Trading Protocol Yao Jiang Galteland, Shuang Wu
2021/1320 (PDF ) Faster Key Generation of Supersingular Isogeny Diffie-Hellman Kaizhan Lin, Fangguo Zhang, Chang-An Zhao
2021/1319 (PDF ) Maliciously-Secure MrNISC in the Plain Model Rex Fernando, Aayush Jain, Ilan Komargodski
2021/1318 (PDF ) Supersingular Isogeny-Based Ring Signature Maryam Sheikhi Garjan, N. Gamze Orhon Kılıç, Murat Cenk
2021/1317 (PDF ) m-Stability: Threshold Security Meets Transferable Utility Osman Biçer, Burcu Yıldız, Alptekin Küpçü
2021/1316 (PDF ) Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores
2021/1315 (PDF ) Certified Everlasting Zero-Knowledge Proof for QMA Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2021/1314 (PDF ) High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
2021/1313 (PDF ) Hybrid Memristor-CMOS Obfuscation Against Untrusted Foundries Amin Rezaei, Jie Gu, Hai Zhou
2021/1312 (PDF ) Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability Ashley Fraser, Lydia Garms, Anja Lehmann
2021/1311 (PDF ) Power analysis attack on Kyber Alexandre Karlov, Natacha Linard de Guertechin
2021/1310 (PDF ) Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu
2021/1309 (PDF ) Faster Final Exponentiation on the KSS18 Curve Shiping Cai, Zhi Hu, Chang-An Zhao
2021/1308 (PDF ) No-Commit Proofs: Defeating Livelock in BFT Neil Giridharan, Heidi Howard, Ittai Abraham, Natacha Crooks, Alin Tomescu
2021/1307 (PDF ) In-depth Analysis of Side-Channel Countermeasures for CRYSTALS-Kyber Message Encoding on ARM Cortex-M4 Hauke Malte Steffen, Lucie Johanna Kogelheide, Timo Bartkewitz
2021/1306 (PDF ) Probabilistic micropayments with transferability Taisei Takahashi, Akira Otsuka
2021/1305 (PDF ) (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin Pratish Datta, Tapas Pal
2021/1304 (PDF ) An Open Problem on the Bentness of Mesnager’s Functions Chunming Tang, Peng Han, Qi Wang, Jun Zhang, Yanfeng Qi
2021/1303 (PDF ) Black-Box Accumulation Based on Lattices Sebastian H. Faller, Pascal Baumer, Michael Klooß, Alexander Koch, Astrid Ottenhues, Markus Raiber
2021/1302 (PDF ) Using Blockchain to Achieve Decentralized Privacy In IoT Healthcare Sajad Meisami, Mohammad Beheshti-Atashgah, Mohammad Reza Aref
2021/1301 (PDF ) An Isogeny-Based ID Protocol Using Structured Public Keys Karim Baghery, Daniele Cozzo, Robi Pedersen
2021/1300 (PDF ) Report and Trace Ring Signatures Ashley Fraser, Elizabeth A. Quaglia
2021/1299 (PDF ) Towards Quantum Large-Scale Password Guessing on Real-World Distributions Markus Dürmuth, Maximilian Golla, Philipp Markert, Alexander May, Lars Schlieper
2021/1298 (PDF ) Post-Quantum Authentication with Lightweight Cryptographic Primitives Henrique Faria, José Manuel Valença
2021/1297 (PDF ) Listen to Your Heart: Evaluation of the Cardiologic Ecosystem Endres Puschner, Christoph Saatjohann, Markus Willing, Christian Dresen, Julia Köbe, Benjamin Rath, Christof Paar, Lars Eckardt, Uwe Haverkamp, Sebastian Schinzel
2021/1296 (PDF ) Partition Oracles from Weak Key Forgeries Marcel Armour, Carlos Cid
2021/1295 (PDF ) Improved Quantum Hypercone Locality Sensitive Filtering in Lattice Sieving Max Heiser
2021/1294 (PDF ) Quantum Money from Quaternion Algebras Daniel M. Kane, Shahed Sharif, Alice Silverberg
2021/1293 (PDF ) TIDE: A novel approach to constructing timed-release encryption Angelique Faye Loe, Liam Medley, Christian O’Connell, Elizabeth A. Quaglia
2021/1292 (PDF ) A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion Kavya Sreedhar, Mark Horowitz, Christopher Torng
2021/1291 (PDF ) MyOPE: Malicious securitY for Oblivious Polynomial Evaluation Malika Izabachène, Anca Nitulescu, Paola de Perthuis, David Pointcheval
2021/1290 (PDF ) Large-Scale Non-Interactive Threshold Cryptosystems in the YOSO Model Andreas Erwig, Sebastian Faust, Siavash Riahi
2021/1289 (PDF ) Verifiable Isogeny Walks: Towards an Isogeny-based Postquantum VDF Jorge Chavez-Saab, Francisco Rodríguez Henríquez, Mehdi Tibouchi
2021/1288 (PDF ) FO-like Combiners and Hybrid Post-Quantum Cryptography Loïs Huguenin-Dumittan, Serge Vaudenay
2021/1287 (PDF ) The Exact Security of BIP32 Wallets Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, Siavash Riahi
2021/1286 (PDF ) Post-quantum Efficient Proof for Graph 3-Coloring Problem Ehsan Ebrahimi
2021/1285 (PDF ) Convexity of division property transitions: theory, algorithms and compact models Aleksei Udovenko
2021/1284 (PDF ) APAS: Application-Specific Accelerators for RLWE-based Homomorphic Linear Transformations Song Bian, Dur E Shahwar Kundi, Kazuma Hirozawa, Weiqiang Liu, Takashi Sato
2021/1283 (PDF ) Parallel Verification of Serial MAC and AE Modes Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo
2021/1282 (PDF ) On the Claims of Weak Block Synchronization in Bitcoin Seungjin Baek, Hocheol Nam, Yongwoo Oh, Muoi Tran, Min Suk Kang
2021/1281 (PDF ) Leveled Homomorphic Encryption Schemes with Hensel Codes David W. H. A. da Silva, Luke Harmon, Gaetan Delavignette, Carlos Araujo
2021/1280 (PDF ) Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage Emma Dauterman, Vivian Fang, Ioannis Demertzis, Natacha Crooks, Raluca Ada Popa
2021/1279 (PDF ) Quantum Diffie-Hellman Key Exchange Dirk Fischer
2021/1278 (PDF ) A survey of algorithmic methods in IC reverse engineering Leonid Azriel, Julian Speith, Nils Albartus, Ran Ginosara, Avi Mendelson, Christof Paar
2021/1277 (PDF ) LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier
2021/1276 (PDF ) On the Security and Performance of Blockchain Sharding Runchao Han, Jiangshan Yu, Haoyu Lin, Shiping Chen, Paulo Esteves-Veríssimo
2021/1275 (PDF ) Counterexample to OWF Self-XOR Being a DOWF Nathan Geier
2021/1274 (PDF ) A Tight Computational Indistinguishability Bound for Product Distributions Nathan Geier
2021/1273 (PDF ) OpenSquare: Decentralized Repeated Modular Squaring Service Sri AravindaKrishnan Thyagarajan, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder
2021/1272 (PDF ) Efficient CCA Timed Commitments in Class Groups Sri AravindaKrishnan Thyagarajan, Guilhem Castagnos, Fabien Laguillaumie, Giulio Malavolta
2021/1271 (PDF ) Computing the Jacobi symbol using Bernstein-Yang Mike Hamburg
2021/1270 (PDF ) Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited Yevgeniy Dodis, Willy Quach, Daniel Wichs
2021/1269 (PDF ) Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model Antonio Faonio
2021/1268 (PDF ) Simulation-Based Bi-Selective Opening Security for Public Key Encryption Junzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng
2021/1267 (PDF ) Tight Quantum Indifferentiability of a Rate-1/3 Compression Function Jan Czajkowski
2021/1266 (PDF ) Update-Sensitive Structured Encryption with Backward Privacy Zhiqiang Wu, Jin Wang, Keqin Li
2021/1265 (PDF ) Special Soundness in the Random Oracle Model Douglas Wikström
2021/1264 (PDF ) Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac, Arne Tobias Ødegaard
2021/1263 (PDF ) Transparency Dictionaries with Succinct Proofs of Correct Operation Ioanna Tzialla, Abhiram Kothapalli, Bryan Parno, Srinath Setty
2021/1262 (PDF ) Reverse Firewalls for Adaptively Secure MPC without Setup Suvradip Chakraborty, Chaya Ganesh, Mahak Pancholi, Pratik Sarkar
2021/1261 (PDF ) Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung
2021/1260 (PDF ) Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers Jelle Vos, Zekeriya Erkin, Christian Doerr
2021/1259 (PDF ) Parallel Repetition of $(k_1,\dots,k_{\mu})$-Special-Sound Multi-Round Interactive Proofs Thomas Attema, Serge Fehr
2021/1258 (PDF ) Bit Security as Computational Cost for Winning Games with High Probability Shun Watanabe, Kenji Yasunaga
2021/1257 (PDF ) Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy S. Dov Gordon, Jonathan Katz, Mingyu Liang, Jiayu Xu
2021/1256 (PDF ) Oblivious Message Retrieval Zeyu Liu, Eran Tromer
2021/1255 (PDF ) How to Find Ternary LWE Keys Using Locality Sensitive Hashing Elena Kirshanova, Alexander May
2021/1254 (PDF ) Vector and Functional Commitments from Lattices Chris Peikert, Zachary Pepin, Chad Sharp
2021/1253 (PDF ) EasyPQC: Verifying Post-Quantum Cryptography Manuel Barbosa, Gilles Barthe, Xiong Fan, Benjamin Grégoire, Shih-Han Hung, Jonathan Katz, Pierre-Yves Strub, Xiaodi Wu, Li Zhou
2021/1252 (PDF ) Complete Practical Side-Channel-Assisted Reverse Engineering of AES-Like Ciphers Andrea Caforio, Fatih Balli, Subhadeep Banik
2021/1251 (PDF ) Efficient NIZKs for Algebraic Sets Geoffroy Couteau, Helger Lipmaa, Roberto Parisella, Arne Tobias Ødegaard
2021/1250 (PDF ) Efficient Leakage-Resilient MACs without Idealized Assumptions Francesco Berti, Chun Guo, Thomas Peters, François-Xavier Standaert
2021/1249 (PDF ) Flexible Anonymous Transactions (FLAX): Towards Privacy-Preserving and Composable Decentralized Finance Wei Dai
2021/1248 (PDF ) The Adversary Capabilities In Practical Byzantine Fault Tolerance Yongge Wang
2021/1247 (PDF ) A Geometric Approach to Linear Cryptanalysis Tim Beyne
2021/1246 (PDF ) Astrolabous: A Universally Composable Time-Lock Encryption Scheme Myrto Arapinis, Nikolaos Lamprou, Thomas Zacharias
2021/1245 (PDF ) SeqL+: Secure Scan-Obfuscation with Theoretical and Empirical Validation Seetal Potluri, Shamik Kundu, Akash Kumar, Kanad Basu, Aydin Aysu
2021/1244 (PDF ) IvyCross: A Privacy-Preserving and Concurrency Control Framework for Blockchain Interoperability Ming Li, Jian Weng, Yi Li, Yongdong Wu, Jiasi Weng, Dingcheng Li, Guowen Xu, Robert Deng
2021/1243 (PDF ) Syndrome Decoding Estimator Andre Esser, Emanuele Bellini
2021/1242 (PDF ) Non-Interactive Differentially Anonymous Router Benedikt Bünz, Yuncong Hu, Shin’ichiro Matsuo, Elaine Shi
2021/1241 (PDF ) Shuffling Public Keys (A Peer-to-peer Voting Algorithm) Santi J. Vives
2021/1240 (PDF ) Count Me In! Extendability for Threshold Ring Signatures Diego F. Aranha, Mathias Hall-Andersen, Anca Nitulescu, Elena Pagnin, Sophia Yakoubov
2021/1239 (PDF ) Quantum Linearization Attacks Xavier Bonnetain, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher
2021/1238 (PDF ) Generic Framework for Key-Guessing Improvements Marek Broll, Federico Canale, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia
2021/1237 (PDF ) Hierarchical Integrated Signature and Encryption Yu Chen, Qiang Tang, Yuyu Wang
2021/1236 (PDF ) Architecture Support for Bitslicing Pantea Kiaei, Tom Conroy, Patrick Schaumont
2021/1235 (PDF ) Saidoyoki: Evaluating side-channel leakage in pre- and post-silicon setting Pantea Kiaei, Zhenyuan Liu, Ramazan Kaan Eren, Yuan Yao, Patrick Schaumont
2021/1234 (PDF ) Policy-Compliant Signatures Christian Badertscher, Christian Matt, Hendrik Waldner
2021/1233 (PDF ) Blockchains Enable Non-Interactive MPC Vipul Goyal, Elisaweta Masserova, Bryan Parno, Yifan Song
2021/1232 (PDF ) Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf Gizem Kara, Oğuz Yayla
2021/1231 (PDF ) Estimating (Miner) Extractable Value is Hard, Let’s Go Shopping! Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
2021/1230 (PDF ) Two-Round Maliciously Secure Computation with Super-Polynomial Simulation Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta
2021/1229 (PDF ) Direct Product Hardness Amplification David Lanzenberger, Ueli Maurer
2021/1228 (PDF ) Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy Hanwen Feng, Qiang Tang
2021/1227 (PDF ) Efficient Boolean Search over Encrypted Data with Reduced Leakage Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo
2021/1226 (PDF ) Succinct LWE Sampling, Random Polynomials, and Obfuscation Lalita Devadas, Willy Quach, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs
2021/1225 (PDF ) Massive Superpoly Recovery with Nested Monomial Predictions Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang
2021/1224 (PDF ) Trojan-Resilience without Cryptography Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak, Michelle Yeo
2021/1223 (PDF ) Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation Fabrice Benhamouda, Elette Boyle, Niv Gilboa, Shai Halevi, Yuval Ishai, Ariel Nof
2021/1222 (PDF ) Fault-enabled chosen-ciphertext attacks on Kyber Julius Hermelink, Peter Pessl, Thomas Pöppelmann
2021/1221 (PDF ) Simple, Fast Malicious Multiparty Private Set Intersection Ofri Nevo, Ni Trieu, Avishay Yanai
2021/1220 (PDF ) Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
2021/1219 (PDF ) Towards Tight Adaptive Security of Non-Interactive Key Exchange Julia Hesse, Dennis Hofheinz, Lisa Kohl, Roman Langrehr
2021/1218 (PDF ) Algebraic Adversaries in the Universal Composability Framework Michel Abdalla, Manuel Barbosa, Jonathan Katz, Julian Loss, Jiayu Xu
2021/1217 (PDF ) EMFI for Safety-Critical Testing of Automotive Systems Colin O'Flynn
2021/1216 (PDF ) Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage Akira Ito, Rei Ueno, Naofumi Homma
2021/1215 (PDF ) Optimization of Homomorphic Comparison Algorithm on RNS-CKKS Scheme Eunsang Lee, Joon-Woo Lee, Young-Sik Kim, Jong-Seon No
2021/1214 (PDF ) Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness Susumu Kiyoshima
2021/1213 (PDF ) DualRing: Generic Construction of Ring Signatures with Efficient Instantiations Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding
2021/1212 (PDF ) SPEEDY on Cortex--M3: Efficient Software Implementation of SPEEDY on ARM Cortex--M3 Hyunjun Kim, Kyungbae Jang, Gyeongju Song, Minjoo Sim, Siwoo Eum, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo
2021/1211 (PDF ) Grover on SPEEDY Gyeongju Song, Kyungbae Jang, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo
2021/1210 (PDF ) LedMAC: More Efficient Variants of LightMAC Yaobin Shen, Lei Wang, Dawu Gu
2021/1209 (PDF ) Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions Lior Rotem
2021/1208 (PDF ) On Actively-Secure Elementary MPC Reductions Benny Applebaum, Aarushi Goel
2021/1207 (PDF ) Non-Malleable Vector Commitments via Local Equivocability Lior Rotem, Gil Segev
2021/1206 (PDF ) Efficient Perfectly Secure Computation with Optimal Resilience Ittai Abraham, Gilad Asharov, Avishay Yanai
2021/1205 (PDF ) FASTA - a stream cipher for fast FHE evaluation Carlos Cid, John Petter Indrøy, Håvard Raddum
2021/1204 (PDF ) Attacks on Pseudo Random Number Generators Hiding a Linear Structure Florette Martinez
2021/1203 (PDF ) The irreducible vectors of a lattice: Some theory and applications Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
2021/1202 (PDF ) Design Space Exploration of SABER in 65nm ASIC Malik Imran, Felipe Almeida, Jaan Raik, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini
2021/1201 (PDF ) Provably Improving Election Verifiability in Belenios Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
2021/1200 (PDF ) KDM Security for the Fujisaki-Okamoto Transformations in the QROM Fuyuki Kitagawa, Ryo Nishimaki
2021/1199 (PDF ) Compressed Oblivious Encoding for Homomorphically Encrypted Search Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich
2021/1198 (PDF ) Clustering Effect in Simon and Simeck Gaëtan Leurent, Clara Pernot, André Schrottenloher
2021/1197 (PDF ) ($\epsilon,\delta$)-indistinguishable Mixing for Cryptocurrencies Mingyu Liang, Ioanna Karantaidou, Foteini Baldimtsi, Dov Gordon, Mayank Varia
2021/1196 (PDF ) Concurrent Composition of Differential Privacy Salil Vadhan, Tianhao Wang
2021/1195 (PDF ) Do you feel a chill? Using PIR against chilling effects for censorship-resistant publishing Miti Mazmudar, Stan Gurtler, Ian Goldberg
2021/1194 (PDF ) Automated Truncation of Differential Trails and Trail Clustering in ARX Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto
2021/1193 (PDF ) JUBILEE: Secure Debt Relief and Forgiveness David Cerezo Sánchez
2021/1192 (PDF ) Simple Constructions from (Almost) Regular One-Way Functions Noam Mazor, Jiapeng Zhang
2021/1191 (PDF ) A Simpler Model for Recovering Superpoly onTrivium Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
2021/1190 (PDF ) Differential Fault Attack on Lightweight Block Cipher PIPO SeongHyuck Lim, JaeSeung Han, Tae-Ho Lee, Dong-Guk Han
2021/1189 (PDF ) A Configurable Crystals-Kyber Hardware Implementation with Side-Channel Protection Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
2021/1188 (PDF ) Interhead Hydra Two Heads are Better than One Maxim Jourenko, Mario Larangeira, Keisuke Tanaka
2021/1187 (PDF ) Post-Quantum Signal Key Agreement with SIDH Samuel Dobson, Steven D. Galbraith
2021/1186 (PDF ) A Privacy-Preserving Distributed Identity Offline-First PoCP Blockchain Paradigm Andrew M. K. Nassief
2021/1185 (PDF ) Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework) Ueli Maurer, Christopher Portmann, Guilherme Rito
2021/1184 (PDF ) On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups Aron van Baarsen, Marc Stevens
2021/1183 (PDF ) ZKAttest: Ring and Group Signatures for Existing ECDSA Keys Armando Faz-Hernández, Watson Ladd, Deepak Maram
2021/1182 (PDF ) Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl
2021/1181 (PDF ) Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code Madura A. Shelton, Łukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom
2021/1180 (PDF ) The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? István András Seres, Balázs Pejó, Péter Burcsi
2021/1179 (PDF ) Improved Attacks on GIFT-64 Ling Sun, Wei Wang, Meiqin Wang
2021/1178 (PDF ) Onion Routing with Replies Christiane Kuhn, Dennis Hofheinz, Andy Rupp, Thorsten Strufe
2021/1177 (PDF ) Algebraic Restriction Codes and their Applications Divesh Aggarwal, Nico Döttling, Jesko Dujmovic, Mohammad Hajiabadi, Giulio Malavolta, Maciej Obremski
2021/1176 (PDF ) Amortized Threshold Symmetric-key Encryption Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha
2021/1175 (PDF ) Adaptive Security of Multi-Party Protocols, Revisited Martin Hirt, Chen-Da Liu-Zhang, Ueli Maurer
2021/1174 (PDF ) On Communication-Efficient Asynchronous MPC with Adaptive Security Annick Chopard, Martin Hirt, Chen-Da Liu-Zhang
2021/1173 (PDF ) Lelantus Spark: Secure and Flexible Private Transactions Aram Jivanyan, Aaron Feickert
2021/1172 (PDF ) Systematizing Core Properties of Pairing-Based Attribute-Based Encryption to Uncover Remaining Challenges in Enforcing Access Control in Practice Marloes Venema, Greg Alpár, Jaap-Henk Hoepman
2021/1171 (PDF ) FAST: Secure and High Performance Format-Preserving Encryption and Tokenization F. Betül Durak, Henning Horst, Michael Horst, Serge Vaudenay
2021/1170 (PDF ) Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs Masahito Ishizaka, Shinsaku Kiyomoto
2021/1169 (PDF ) As easy as ABC: Optimal (A)ccountable (B)yzantine (C)onsensus is easy! Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic
2021/1168 (PDF ) Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation (Full Version) Wonseok Choi, Byeonghak Lee, Jooyoung Lee, Yeongmin Lee
2021/1167 (PDF ) fflonk: a Fast-Fourier inspired verifier efficient version of PlonK Ariel Gabizon, Zachary J. Williamson
2021/1166 (PDF ) Fine-tuning the ISO/IEC Standard LightMAC Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
2021/1165 (PDF ) Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery Mario Larangeira
2021/1164 (PDF ) Cube Attacks on Round-Reduced TinyJAMBU Wil Liam Teng, Iftekhar Salam, Wei-Chuen Yau, Josef Pieprzyk, Raphaël C. -W. Phan
2021/1163 (PDF ) Information-Theoretically Secure MPC against Mixed Dynamic Adversaries Ivan Damgård, Daniel Escudero, Divya Ravi
2021/1162 (PDF ) Software Implementation of Optimal Pairings on Elliptic Curves with Odd Prime Embedding Degrees Yu Dai, Zijian Zhou, Fangguo Zhang, Chang-An Zhao
2021/1161 (PDF ) Balanced Non-Adjacent Forms Marc Joye
2021/1160 (PDF ) Classical Attacks on a Variant of the RSA Cryptosystem Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu
2021/1159 (PDF ) Compact and Malicious Private Set Intersection for Small Sets Mike Rosulek, Ni Trieu
2021/1158 (PDF ) Grafting Key Trees: Efficient Key Management for Overlapping Groups Joël Alwen, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter
2021/1157 (PDF ) Private Approximate Nearest Neighbor Search with Sublinear Communication Sacha Servan-Schreiber, Simon Langowski, Srinivas Devadas
2021/1156 (PDF ) Evolving Secret Sharing in Almost Semi-honest Model Jyotirmoy Pramanik, Avishek Adhikari
2021/1155 (PDF ) GPS: Integration of Graphene, PALISADE, and SGX for Large-scale Aggregations of Distributed Data Jonathan Takeshita, Colin McKechney, Justin Pajak, Antonis Papadimitriou, Ryan Karl, Taeho Jung
2021/1154 (PDF ) 1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher Elena Andreeva, Amit Singh Bhati, Bart Preneel, Damian Vizar
2021/1153 (PDF ) SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
2021/1152 (PDF ) Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field Simon Masson, Antonio Sanso, Zhenfei Zhang
2021/1151 (PDF ) Efficient Modular Multiplication Joppe W. Bos, Thorsten Kleinjung, Dan Page
2021/1150 (PDF ) Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes COUTEAU Geoffroy, Peter Rindal, Srinivasan Raghuraman
2021/1149 (PDF ) Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head José Bacelar Almeida, Manuel Barbosa, Manuel L Correia, Karim Eldefrawy, Stéphane Graham-Lengrand, Hugo Pacheco, Vitor Pereira
2021/1148 (PDF ) Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS) Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich
2021/1147 (PDF ) Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels
2021/1146 (PDF ) Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness Shuai Han, Shengli Liu, Dawu Gu
2021/1145 (PDF ) Recurring Contingent Payment for Proofs of Retrievability Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
2021/1144 (PDF ) MAYO: Practical Post-Quantum Signatures from Oil-and-Vinegar Maps Ward Beullens
2021/1143 (PDF ) Facial Recognition for Remote Electronic Voting – Missing Piece of the Puzzle or Yet Another Liability? Sven Heiberg, Kristjan Krips, Jan Willemson, Priit Vinkel
2021/1141 (PDF ) Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback Giovanni Deligios, Martin Hirt, Chen-Da Liu-Zhang
2021/1140 (PDF ) Computing Discrete Logarithms Robert Granger, Antoine Joux
2021/1139 (PDF ) HyperLogLog: Exponentially Bad in Adversarial Settings Kenneth G. Paterson, Mathilde Raynal
2021/1138 (PDF ) Optimal Good-case Latency for Rotating Leader Synchronous BFT Ittai Abraham, Kartik Nayak, Nibesh Shrestha
2021/1137 (PDF ) qTESLA: Practical Implementations of a Quantum Attack Resistant Signature Scheme Michael Burger, Juliane Krämer, Christian Bischof
2021/1136 (PDF ) A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions Michael Burger, Christian Bischof, Juliane Krämer
2021/1135 (PDF ) FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption Kamil Kluczniak, Leonard Schild
2021/1134 (PDF ) Some observations on ZUC-256 Alexander Maximov
2021/1133 (PDF ) Multiradical isogenies Wouter Castryck, Thomas Decru
2021/1132 (PDF ) Safe-Error Attacks on SIKE and CSIDH Fabio Campos, Juliane Krämer, Marcel Müller
2021/1131 (PDF ) Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertexts Tanping Zhou, Long Chen, Xiaoliang Che, Wenchao Liu, Zhenfeng Zhang, Xiaoyuan Yang
2021/1130 (PDF ) A note on group membership tests for $\G_1$, $\G_2$ and $\G_T$ on BLS pairing-friendly curves Michael Scott
2021/1129 (PDF ) Beauty of Cryptography: the Cryptographic Sequences and the Golden Ratio Shenghui Su, Jianhua Zheng, Shuwang Lv
2021/1128 (PDF ) Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity Gianluca Brian, Antonio Faonio, Daniele Venturi
2021/1127 (PDF ) Bigdata-facilitated Two-party Authenticated Key Exchange for IoT Bowen Liu, Qiang Tang, Jianying Zhou
2021/1126 (PDF ) Turn-Based Communication Channels Carlo Brunetta, Mario Larangeira, Bei Liang, Aikaterini Mitrokotsa, Keisuke Tanaka
2021/1125 (PDF ) Towards Explaining Epsilon: A Worst-Case Study of Differential Privacy Risks Luise Mehner, Saskia Nuñez von Voigt, Florian Tschorsch
2021/1124 (PDF ) A Semi-Permanent Stuck-At Fault Analysis on AES Rijndael SBox Priyanka Joshi, Bodhisatwa Mazumdar
2021/1123 (PDF ) Oblivious RAM with Worst-Case Logarithmic Overhead Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi
2021/1122 (PDF ) And Paper-Based is Better? Towards Comparability of Classic and Cryptographic Voting Schemes Marc Nemes, Rebecca Schwerdt, Dirk Achenbach, Bernhard Löwe, Jörn Müller-Quade
2021/1121 (PDF ) Constant-Time Arithmetic for Safer Cryptography Lúcás Críostóir Meier, Simone Colombo, Marin Thiercelin, Bryan Ford
2021/1120 (PDF ) Simpira Gets Simpler: Optimized Simpira on Microcontrollers Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Gyeongju Song, Wai-Kong Lee, Hwajeong Seo
2021/1119 (PDF ) Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu
2021/1118 (PDF ) THC: Practical and Cost-Effective Verification of Delegated Computation Pablo Rauzy, Ali Nehme
2021/1117 (PDF ) All the Polynomial Multiplication You Need on RISC-V Hwajeong Seo, Hyeokdong Kwon, Siwoo Eum, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Minjoo Sim, Gyeongju Song, Wai-Kong Lee
2021/1116 (PDF ) Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, Michael Rosenberg
2021/1115 (PDF ) Evolving Secret Sharing Schemes Based on Polynomial Evaluations and Algebraic Geometry Codes Chaoping Xing, Chen Yuan
2021/1114 (PDF ) Remarks on MOBS and cryptosystems using semidirect products Chris Monico
2021/1113 (PDF ) On the Security of Doubly Efficient PIR Elette Boyle, Justin Holmgren, Fermi Ma, Mor Weiss
2021/1112 (PDF ) Key agreement: security / division Daniel R. L. Brown
2021/1111 (PDF ) A Low-Randomness Second-Order Masked AES Tim Beyne, Siemen Dhooghe, Adrián Ranea, Danilo Šijačić
2021/1110 (PDF ) Secure and Efficient Software Masking on Superscalar Pipelined Processors Barbara Gigerl, Robert Primas, Stefan Mangard
2021/1109 (PDF ) On Actively Secure Fine-grained Access Structures from Isogeny Assumptions Philipp Muth, Fabio Campos
2021/1108 (PDF ) Preservation of DNA Privacy During the Large Scale Detection of COVID Marcel Hollenstein, David Naccache, Peter B. Roenne, Peter Y A Ryan, Robert Weil, Ofer Yifrach-Stav
2021/1107 (PDF ) Multi-Leak Deep-Learning Side-Channel Analysis Fanliang Hu, Huanyu Wang, Junnian Wang
2021/1106 (PDF ) Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More Eric Brier, Rémi Géraud-Stewart, Marc Joye, David Naccache
2021/1105 (PDF ) Improved Linear Approximations of SNOW-V and SNOW-Vi Zhen Shi, Chenhui Jin, Yu Jin
2021/1104 (PDF ) New Cryptanalysis of ZUC-256 Initialization Using Modular Differences Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe
2021/1103 (PDF ) Exploring Differential-Based Distinguishers and Forgeries for ASCON David Gerault, Thomas Peyrin, Quan Quan Tan
2021/1101 (PDF ) Differential Privacy in Constant Function Market Makers Tarun Chitra, Guillermo Angeris, Alex Evans
2021/1100 (PDF ) REDsec: Running Encrypted Discretized Neural Networks in Seconds Lars Folkerts, Charles Gouert, Nektarios Georgios Tsoutsos
2021/1099 (PDF ) MILP modeling of Boolean functions by minimum number of inequalities Aleksei Udovenko
2021/1098 (PDF ) Individual Verifiability and Revoting in the Estonian Internet Voting System Olivier Pereira
2021/1096 (PDF ) Mt. Random: Multi-Tiered Randomness Beacons Ignacio Cascudo, Bernardo David, Omer Shlomovits, Denis Varlakov
2021/1095 (PDF ) Analyzing Masked Ciphers Against Transition and Coupling Effects Siemen Dhooghe
2021/1094 (PDF ) Resilient Uniformity: Applying Resiliency in Masking Siemen Dhooghe, Svetla Nikova
2021/1093 (PDF ) Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering Yilei Chen, Qipeng Liu, Mark Zhandry
2021/1092 (PDF ) SoK: Deep Learning-based Physical Side-channel Analysis Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina
2021/1091 (PDF ) No (Good) Loss no Gain: Systematic Evaluation of Loss functions in Deep Learning-based Side-channel Analysis Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
2021/1090 (PDF ) Towards Accountability in CRS Generation Prabhanjan Ananth, Gilad Asharov, Hila Dahari, Vipul Goyal
2021/1089 (PDF ) Threshold scheme to share a secret by means of sound ranging Sergij V. Goncharov
2021/1088 (PDF ) Studying Bitcoin privacy attacks and their Impact on Bitcoin-based Identity Methods Simin Ghesmati, Walid Fdhila, Edgar Weippl
2021/1087 (PDF ) Methods for Decentralized Identities: Evaluation and Insights Walid Fdhila, Nicholas Stifter, Kristian Kostal, Cihan Saglam, Markus Sabadello
2021/1086 (PDF ) How do the Arbiter PUFs Sample the Boolean Function Class? Animesh Roy, Dibyendu Roy, Subhamoy Maitra
2021/1085 (PDF ) Homomorphic Encryption for Multiple Users with Less Communications Jeongeun Park
2021/1084 (PDF ) Towards the Least Inequalities for Describing a Subset in $Z_2^n$ Yao Sun
2021/1083 (PDF ) Modular Design of Secure Group Messaging Protocols and the Security of MLS Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis
2021/1082 (PDF ) Some remarks on how to hash faster onto elliptic curves Dmitrii Koshelev
2021/1081 (PDF ) OnionPIR: Response Efficient Single-Server PIR Muhammad Haris Mughees, Hao Chen, Ling Ren
2021/1080 (PDF ) SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
2021/1079 (PDF ) The Exact Complexity of Pseudorandom Functions and Tight Barriers to Lower Bound Proofs Zhiyuan Fan, Jiatu Li, Tianqi Yang
2021/1078 (PDF ) Reflection, Rewinding, and Coin-Toss in EasyCrypt Denis Firsov, Dominique Unruh
2021/1077 (PDF ) MProve+ : Privacy Enhancing Proof of Reserves Protocol for Monero Arijit Dutta, Suyash Bagad, Saravanan Vijayakumaran
2021/1076 (PDF ) Hardness of KT Characterizes Parallel Cryptography Hanlin Ren, Rahul Santhanam
2021/1075 (PDF ) The security of the code-based signature scheme based on the Stern identification protocol Victoria Vysotskaya, Ivan Chizhov
2021/1074 (PDF ) UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek
2021/1073 (PDF ) "Act natural!": Having a Private Chat on a Public Blockchain Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, Maciej Liskiewicz
2021/1072 (PDF ) Streaming SPHINCS+ for Embedded Devices using the Example of TPMs Ruben Niederhagen, Johannes Roth, Julian Wälde
2021/1071 (PDF ) Improved Verifiability for BeleniosVS Thomas Haines, Rajeev Gore
2021/1070 (PDF ) Onyx: New Encryption and Signature Schemes with Multivariate Public Key in Degree 3 Gilles Macario-Rat, Jacques Patarin
2021/1069 (PDF ) Djed: A Formally Verified Crypto-Backed Pegged Algorithmic Stablecoin Joachim Zahnentferner, Dmytro Kaidalov, Jean-Frédéric Etienne, Javier Díaz
2021/1068 (PDF ) A Simple Post-Quantum Non-Interactive Zero-Knowledge Proof from Garbled Circuits Hongrui Cui, Kaiyi Zhang
2021/1067 (PDF ) A Tale of Twin Primitives: Single-chip Solution for PUFs and TRNGs Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2021/1066 (PDF ) Taphonomical Security: (DNA) Information with Foreseeable Lifespan Fatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Roenne, Peter Y. A. Ryan, Julien Weibel, Robert Weil
2021/1065 (PDF ) Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol Gergei Bana, Marco Biroli, Megi Dervishi, Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, David Naccache, Peter B. Roenne, Peter Y. A. Ryan, Hugo Waltsburger
2021/1064 (PDF ) Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov
2021/1063 (PDF ) Cairo – a Turing-complete STARK-friendly CPU architecture Lior Goldberg, Shahar Papini, Michael Riabzev
2021/1062 (PDF ) On the Nonsingularity and Equivalence of NFSRs Yingyin Pan, Jianghua Zhong, Dongdai Lin
2021/1061 (PDF ) Edwards curves and FFT-based multiplication Pavel Atnashev, George Woltman
2021/1060 (PDF ) Discovering New $L$-Function Relations Using Algebraic Sieving Hadrien Barral, Éric Brier, Rémi Géraud-Stewart, Arthur Léonard, David Naccache, Quentin Vermande, Samuel Vivien
2021/1059 (PDF ) Revisiting cryptanalysis on ChaCha from Crypto 2020 and Eurocrypt 2021 Sabyasachi Dey, Chandan Dey, Santanu Sarkar, Willi Meier
2021/1058 (PDF ) Cryptanalysis of Caesar using Quantum Support Vector Machine Hyunji Kim, Gyeongju Song, Kyoungbae Jang, Hwajeong Seo
2021/1057 (PDF ) An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, Hui-Chun Huang
2021/1055 (PDF ) Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions François Garillot, Yashvanth Kondi, Payman Mohassel, Valeria Nikolaenko
2021/1054 (PDF ) One-time Traceable Ring Signatures Alessandra Scafuro, Bihan Zhang
2021/1053 (PDF ) XDIVINSA: eXtended DIVersifying INStruction Agent to Mitigate Power Side-Channel Leakage Thinh H. Pham, Ben Marshall, Alexander Fell, Siew-Kei Lam, Daniel Page
2021/1052 (PDF ) Comparing Lattice Families for Bounded Distance Decoding near Minkowski’s Bound. Oleksandra Lapiha
2021/1051 (PDF ) Collisions in Supersingular Isogeny Graphs and the SIDH-based Identification Protocol Wissam Ghantous, Shuichi Katsumata, Federico Pintore, Mattia Veroni
2021/1050 (PDF ) Privacy-Enhancing Group Signcryption Scheme Sara Ricci, Petr Dzurenda, Jan Hajny, Lukas Malina
2021/1049 (PDF ) Binary Search in Secure Computation Marina Blanton, Chen Yuan
2021/1048 (PDF ) Aggregating and thresholdizing hash-based signatures using STARKs Irakliy Khaburzaniya, Konstantinos Chalkias, Kevin Lewi, Harjasleen Malvai
2021/1047 (PDF ) A Correlation Attack on Full SNOW-V and SNOW-Vi Zhen Shi, Chenhui Jin, Jiyan Zhang, Ting Cui, Lin Ding, Yu Jin
2021/1046 (PDF ) On the modifier Q for multivariate signature schemes Yasufumi Hashimoto
2021/1045 (PDF ) An improvement of algorithms to solve under-defined systems of multivariate quadratic equations Yasufumi Hashimoto
2021/1044 (PDF ) On the security of Hufu-UOV Yasufumi Hashimoto
2021/1043 (PDF ) Brakedown: Linear-time and field-agnostic SNARKs for R1CS Alexander Golovnev, Jonathan Lee, Srinath Setty, Justin Thaler, Riad S. Wahby
2021/1042 (PDF ) Rate One-Third Non-malleable Codes Divesh Aggarwal, Sruthi Sekar, Bhavana Kanukurthi, Maciej Obremski, Sai Lakshmi Bhavana Obbattu
2021/1041 (PDF ) On the Multiplicative Complexity of Cubic Boolean Functions Meltem Sonmez Turan, Rene Peralta
2021/1040 (PDF ) MUSE: Secure Inference Resilient to Malicious Clients Ryan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, Raluca Ada Popa
2021/1039 (PDF ) Neyman’s Smoothness Test: a Trade-off between Moment-based and Distribution-based Leakage Detections Si Gao, Elisabeth Oswald, Yan Yan
2021/1038 (PDF ) Reinforced Concrete: A Fast Hash Function for Verifiable Computation Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
2021/1037 (PDF ) Randomness Bounds for Private Simultaneous Messages and Conditional Disclosure of Secrets Akinori Kawachi, Maki Yoshida
2021/1036 (PDF ) Lelantus-CLA Pyrros Chaidos, Vladislav Gelfer
2021/1035 (PDF ) SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
2021/1034 (PDF ) Optimal encodings to elliptic curves of $j$-invariants $0$, $1728$ Dmitrii Koshelev
2021/1033 (PDF ) Limits of Polynomial Packings for $\mathbb{Z}_{p^k}$ and $\mathbb{F}_{p^k}$ Jung Hee Cheon, Keewoo Lee
2021/1032 (PDF ) AdVeil: A Private Targeted Advertising Ecosystem Sacha Servan-Schreiber, Kyle Hogan, Srinivas Devadas
2021/1031 (PDF ) Commitment Schemes from Supersingular Elliptic Curve Isogeny Graphs Bruno Sterner
2021/1030 (PDF ) A lightweight ISE for ChaCha on RISC-V Ben Marshall, Daniel Page, Thinh Hung Pham
2021/1029 (PDF ) LOVE a pairing Diego F. Aranha, Elena Pagnin, Francisco Rodríguez-Henríquez
2021/1028 (PDF ) Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography Claude Carlet, Sylvain Guilley, Sihem Mesnager
2021/1027 (PDF ) On Fingerprinting Attacks and Length-Hiding Encryption Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten
2021/1025 (PDF ) Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings Daniel Escudero, Eduardo Soria-Vazquez
2021/1024 (PDF ) Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications Wai-Kong Lee, Kyungbae Jang, Gyeongju Song, Hyunji Kim, Seong Oun Hwang, Hwajeong Seo
2021/1023 (PDF ) SIDH Proof of Knowledge Luca De Feo, Samuel Dobson, Steven D. Galbraith, Lukas Zobernig
2021/1022 (PDF ) Zero-Knowledge Middleboxes Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish
2021/1021 (PDF ) Power-based Side Channel Attack Analysis on PQC Algorithms Tendayi Kamucheka, Michael Fahr, Tristen Teague, Alexander Nelson, David Andrews, Miaoqing Huang
2021/1020 (PDF ) Designing a Practical Code-based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup Shay Gueron, Edoardo Persichetti, Paolo Santini
2021/1019 (PDF ) Implementing and Measuring KEMTLS Sofía Celi, Armando Faz-Hernández, Nick Sullivan, Goutam Tamvada, Luke Valenta, Thom Wiggers, Bas Westerbaan, Christopher A. Wood
2021/1018 (PDF ) Obfustopia Built on Secret-Key Functional Encryption Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2021/1017 (PDF ) Improve Neural Distinguisher for Cryptanalysis Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
2021/1016 (PDF ) Quantum collision finding for homomorphic hash functions Juan Carlos Garcia-Escartin, Vicent Gimeno, Julio José Moyano-Fernández
2021/1015 (PDF ) Look-up the Rainbow: Efficient Table-based Parallel Implementation of Rainbow Signature on 64-bit ARMv8 Processors Hyeokdong Kwon, Hyunjun Kim, Minjoo Sim, Wai-Kong Lee, Hwajeong Seo
2021/1014 (PDF ) SoC Security Properties and Rules Nusrat Farzana Dipu, Farimah Farahmandi, Mark Tehranipoor
2021/1013 (PDF ) Iterative Oblivious Pseudo-Random Functions and Applications Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry
2021/1012 (PDF ) A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification Quoc Huy Do, Pedram Hosseyni, Ralf Kuesters, Guido Schmitz, Nils Wenzler, Tim Wuertele
2021/1011 (PDF ) A Fast and Flexible Multi-Client Functional Encryption for Set Intersection Mojtaba Rafiee
2021/1010 (PDF ) Circuit friendly, post-quantum dynamic accumulators from RingSIS with logarithmic prover time Endre (Silur) Abraham
2021/1009 (PDF ) Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
2021/1008 (PDF ) Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2021/1007 (PDF ) Provably Solving the Hidden Subset Sum Problem via Statistical Learning Jean-Sebastien Coron, Agnese Gini
2021/1006 (PDF ) UOV-Pepper: New Public Key Short Signature in Degree 3 Gilles Macario-Rat, Jacques Patarin
2021/1005 (PDF ) On the Construction and Cryptanalysis of Multi-Ciphers Arush Chhatrapati
2021/1004 (PDF ) Towards Attack Resilient Arbiter PUF-Based Strong PUFs Nils Wisiol
2021/1003 (PDF ) SCA-secure ECC in software – mission impossible? Lejla Batina, Łukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe
2021/1002 (PDF ) Online Linear Extractors for Independent Sources Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie
2021/1001 (PDF ) Classical Binding for Quantum Commitments Nir Bitansky, Zvika Brakerski
2021/1000 (PDF ) A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model Masayuki Fukumitsu, Shingo Hasegawa
2021/999 (PDF ) NTRU Fatigue: How Stretched is Overstretched? Léo Ducas, Wessel van Woerden
2021/998 (PDF ) Polynomial multiplication on embedded vector architectures Hanno Becker, Jose Maria Bermudo Mera, Angshuman Karmakar, Joseph Yiu, Ingrid Verbauwhede
2021/997 (PDF ) Higher-Order Lookup Table Masking in Essentially Constant Memory Annapurna Valiveti, Srinivas Vivek
2021/996 (PDF ) Kadcast-NG: A Structured Broadcast Protocol for Blockchain Networks Elias Rohrer, Florian Tschorsch
2021/995 (PDF ) Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4 Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang
2021/994 (PDF ) BKW Meets Fourier: New Algorithms for LPN with Sparse Parities Dana Dachman-Soled, Huijing Gong, Hunter Kippen, Aria Shahverdi
2021/993 (PDF ) FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority Ye Dong, Xiaojun Chen, Kaiyun Li, Dakui Wang, Shuai Zeng
2021/992 (PDF ) Faster Public-key Compression of SIDH with Less Memory Kaizhan Lin, Jianming Lin, Weize Wang, Chang-An Zhao
2021/991 (PDF ) Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong
2021/990 (PDF ) Secret Keys in Genus-2 SIDH Sabrina Kunzweiler, Yan Bo Ti, Charlotte Weitkämper
2021/989 (PDF ) Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism Jia Xu, Yiwen Gao, Hoon Wei Lim, Hongbing Wang, Ee-Chien Chang
2021/988 (PDF ) Concurrent Signatures from a Variety of Keys George Teseleanu
2021/987 (PDF ) A Formal Security Analysis of Session Resumption Across Hostnames Kai Gellert, Tobias Handirk
2021/986 (PDF ) Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1 Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang, Shang-Yi Yang
2021/985 (PDF ) PUF Security: Reviewing The Validity of Spoofing Attack Against Safe is the New Smart Karim Lounis
2021/984 (PDF ) On the Use of the Legendre Symbol in Symmetric Cipher Design Alan Szepieniec
2021/983 (PDF ) A Cryptographic Hash Function from Markoff Triples Elena Fuchs, Kristin Lauter, Matthew Litman, Austin Tran
2021/982 (PDF ) Quantum Implementation and Resource Estimates for RECTANGLE and KNOT Anubhab Baksi, Kyungbae Jang, Gyeongju Song, Hwajeong Seo, Zejun Xiang
2021/981 (PDF ) Deep Learning-based Side-channel Analysis against AES Inner Rounds Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek
2021/980 (PDF ) Binary Field Montgomery Multiplication on Quantum Computers Kyoungbae Jang, Gyeong Ju Song, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
2021/979 (PDF ) Constant-Overhead Zero-Knowledge for RAM Programs Nicholas Franzese, Jonathan Katz, Steve Lu, Rafail Ostrovsky, Xiao Wang, Chenkai Weng
2021/978 (PDF ) Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications Donghang Lu, Albert Yu, Aniket Kate, Hemanta Maji
2021/977 (PDF ) Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices Yuval Ishai, Hang Su, David J. Wu
2021/976 (PDF ) Reinventing BrED: A Practical Construction Formal Treatment of Broadcast Encryption with Dealership Avishek Majumder, Sayantan Mukherjee
2021/975 (PDF ) Bridges connecting Encryption Schemes Mugurel Barcau, Cristian Lupascu, Vicentiu Pasol, George C. Turcas
2021/974 (PDF ) Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds Yi-Fan Tseng, Chun-I Fan, Zi-Cheng Liu
2021/973 (PDF ) A Multiplatform Parallel Approach for Lattice Sieving Algorithms Michał Andrzejczak, Kris Gaj
2021/972 (PDF ) Partial Key Exposure Attack on Short Secret Exponent CRT-RSA Alexander May, Julian Nowakowski, Santanu Sarkar
2021/971 (PDF ) Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\Sigma$-Protocols Lior Rotem, Gil Segev
2021/970 (PDF ) Short Identity-Based Signatures with Tight Security from Lattices Jiaxin Pan, Benedikt Wagner
2021/969 (PDF ) Influence of a Set of Variables on a Boolean Function Aniruddha Biswas, Palash Sarkar
2021/968 (PDF ) Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers? Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Şahin, Muhammed Said Gündoğan
2021/967 (PDF ) Assessment of Quantum Threat To Bitcoin and Derived Cryptocurrencies Stephen Holmes, Liqun Chen
2021/966 (PDF ) Soteria: Preserving Privacy in Distributed Machine Learning Cláudia Brito, Pedro Ferreira, Bernardo Portela, Rui Oliveira, João Paulo
2021/965 (PDF ) Automatic Search for Bit-based Division Property Shibam Ghosh, Orr Dunkelman
2021/964 (PDF ) Secure Quantum Computation with Classical Communication James Bartusek
2021/963 (PDF ) Post-Quantum Key-Blinding for Authentication in Anonymity Networks Edward Eaton, Douglas Stebila, Roy Stracovsky
2021/962 (PDF ) Practically Solving LPN Thom Wiggers, Simona Samardjiska
2021/961 (PDF ) Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes Jan Bobolz, Fabian Eidens, Raphael Heitjohann, Jeremy Fell
2021/960 (PDF ) The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh
2021/959 (PDF ) The Best of Two Worlds: Deep Learning-assisted Template Attack Lichao Wu, Guilherme Perin, Stjepan Picek
2021/958 (PDF ) When the Decoder Has to Look Twice: Glitching a PUF Error Correction Jonas Ruchti, Michael Gruber, Michael Pehl
2021/957 (PDF ) Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer Arpita Patra, Akshayaram Srinivasan
2021/956 (PDF ) Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal
2021/955 (PDF ) Higher-degree supersingular group actions Mathilde Chenu, Benjamin Smith
2021/954 (PDF ) Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms Jose Maria Bermudo Mera, Angshuman Karmakar, Suparna Kundu, Ingrid Verbauwhede
2021/953 (PDF ) State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption Keita Emura, Ryoma Ito, Sachiko Kanamori, Ryo Nojima, Yohei Watanabe
2021/952 (PDF ) On the Evaluation of Deep Learning-based Side-channel Analysis Lichao Wu, Guilherme Perin, Stjepan Picek
2021/951 (PDF ) Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software? Melissa Azouaoui, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert
2021/950 (PDF ) Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying Sébastien Duval, Pierrick Méaux, Charles Momin, François-Xavier Standaert
2021/949 (PDF ) A High-Speed Architecture for the Reduction in VDF Based on a Class Group Yifeng Song, Danyang Zhu, Jing Tian, Zhongfeng Wang
2021/948 (PDF ) How to Make a Secure Index for Searchable Symmetric Encryption, Revisited Yohei Watanabe, Takeshi Nakai, Kazuma Ohara, Takuya Nojima, Yexuan Liu, Mitsugu Iwamoto, Kazuo Ohta
2021/947 (PDF ) Autocorrelations of vectorial Boolean functions Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer
2021/946 (PDF ) Hidden Cosets and Applications to Unclonable Cryptography Andrea Coladangelo, Jiahui Liu, Qipeng Liu, Mark Zhandry
2021/945 (PDF ) Limits on the Adaptive Security of Yao's Garbling Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Daniel Wichs
2021/944 (PDF ) Systematic Side-channel Analysis of Curve25519 with Machine Learning Léo Weissbart, Łukasz Chmielewski, Stjepan Picek, Lejla Batina
2021/943 (PDF ) Breaking the Circuit-Size Barrier for Secure Computation under Quasi-Polynomial LPN Geoffroy Couteau, Pierre Meyer
2021/942 (PDF ) Compact Ring Signatures from Learning With Errors Rohit Chatterjee, Sanjam Garg, Mohammad Hajiabadi, Dakshita Khurana, Xiao Liang, Giulio Malavolta, Omkant Pandey, Sina Shiehian
2021/941 (PDF ) Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme Maamar Ouladj, Sylvain Guilley, Philippe Guillot, Farid Mokrane
2021/940 (PDF ) SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user's secret data Ripon Patgiri, Malaya Dutta Borah, Laiphrakpam Dolendro Singh
2021/939 (PDF ) OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning Jiacheng Liang, Songze Li, Wensi Jiang, Bochuan Cao, Chaoyang He
2021/938 (PDF ) Plactic signatures (insecure?) Daniel R. L. Brown
2021/937 (PDF ) Storing data that is updated regularly on a client machine securely Artem Los
2021/936 (PDF ) FIVER -- Robust Verification of Countermeasures against Fault Injections Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu
2021/935 (PDF ) ROTed: Random Oblivious Transfer for embedded devices Pedro Branco, Luís Fiolhais, Manuel Goulão, Paulo Martins, Paulo Mateus, Leonel Sousa
2021/934 (PDF ) ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines Diego F. Aranha, Emil Madsen Bennedsen, Matteo Campanelli, Chaya Ganesh, Claudio Orlandi, Akira Takahashi
2021/933 (PDF ) Fast Factoring Integers by SVP Algorithms, corrected Claus Peter Schnorr
2021/932 (PDF ) Succinct Functional Commitment for a Large Class of Arithmetic Circuits Helger Lipmaa, Kateryna Pavlyk
2021/931 (PDF ) Practical Key Recovery Attacks on FlexAEAD Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger
2021/930 (PDF ) Darlin: Recursive Proofs using Marlin Ulrich Haböck, Alberto Garoffolo, Daniele Di Benedetto
2021/929 (PDF ) A polynomial time key-recovery attack on the Sidon cryptosystem Pierre Briaud, Jean-Pierre Tillich, Javier Verbel
2021/928 (PDF ) Necessary and Sufficient Conditions for Galois NFSRs Conditionally Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium Jianghua Zhong, Yingyin Pan, Wenhui Kong, Dongdai Lin
2021/927 (PDF ) A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs Shuichi Katsumata
2021/926 (PDF ) On Treewidth, Separators and Yao's Garbling Chethan Kamath, Karen Klein, Krzysztof Pietrzak
2021/925 (PDF ) Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
2021/924 (PDF ) On Removing Rejection Conditions in Practical Lattice-Based Signatures Rouzbeh Behnia, Yilei Chen, Daniel Masny
2021/923 (PDF ) On the (in)security of ElGamal in OpenPGP Luca De Feo, Bertram Poettering, Alessandro Sorniotti
2021/920 (PDF ) Non-malleable Commitments against Quantum Attacks Nir Bitansky, Huijia Lin, Omri Shmueli
2021/919 (PDF ) The supersingular isogeny path and endomorphism ring problems are equivalent Benjamin Wesolowski
2021/918 (PDF ) The Round Complexity of Quantum Zero-Knowledge Orestis Chardouvelis, Giulio Malavolta
2021/917 (PDF ) CODBS: A cascading oblivious search protocol optimized for real-world relational database indexes Rogério Pontes, Bernardo Portela, Manuel Barbosa, Ricardo Vilaça
2021/916 (PDF ) Mithril: Stake-based Threshold Multisignatures Pyrros Chaidos, Aggelos Kiayias
2021/915 (PDF ) A PCP Theorem for Interactive Proofs and Applications Gal Arnon, Alessandro Chiesa, Eylon Yogev
2021/914 (PDF ) Principal Component Analysis using CKKS Homomorphic Encryption Scheme Samanvaya Panda
2021/913 (PDF ) Practical complexities of probabilistic algorithms for solving Boolean polynomial systems Stefano Barbero, Emanuele Bellini, Carlo Sanna, Javier Verbel
2021/912 (PDF ) FO derandomization sometimes damages security Daniel J. Bernstein
2021/911 (PDF ) SoK: Understanding BFT Consensus in the Age of Blockchains Gang Wang
2021/910 (PDF ) SECDSA: Mobile signing and authentication under classical ``sole control'' Eric Verheul
2021/909 (PDF ) Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks – A Case Study on Public-Key Algorithms – Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2021/908 (PDF ) Selection of sampling keys for cryptographic tests George Marinakis
2021/907 (PDF ) zkKYC: A solution concept for KYC without knowing your customer, leveraging self-sovereign identity and zero-knowledge proofs Pieter Pauwels
2021/906 (PDF ) Two Public-Key Cryptosystems Based on Expanded Gabidulin Codes Wenshuo Guo, Fang-Wei Fu
2021/905 (PDF ) A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek
2021/904 (PDF ) Spatial Dependency Analysis to Extract Information from Side-Channel Mixtures Aurélien Vasselle, Hugues Thiebeauld, Philippe Maurine
2021/903 (PDF ) Nowhere to Leak: Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting (Extended Version) Alexandros Bakas, Antonis Michalas
2021/902 (PDF ) Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis Kalle Ngo, Elena Dubrova, Thomas Johansson
2021/901 (PDF ) Resolvable Block Designs in Construction of Approximate Real MUBs that are Sparse Ajeet Kumar, Subhamoy Maitra
2021/900 (PDF ) ANS-based Compression and Encryption with 128-bit Security Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk
2021/899 (PDF ) Homomorphic decryption in blockchains via compressed discrete-log lookup tables Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko
2021/898 (PDF ) On Extremal Expanding Algebraic Graphs and post-quantum secure delivery of passwords, encryption maps and tools for multivariate digital signatures. Vasyl Ustimenko
2021/897 (PDF ) A Rational Protocol Treatment of 51% Attacks Christian Badertscher, Yun Lu, Vassilis Zikas
2021/896 (PDF ) Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise" Danilo Gligoroski
2021/895 (PDF ) Targeted Lossy Functions and Applications Willy Quach, Brent Waters, Daniel Wichs
2021/894 (PDF ) History of Cryptographic Key Sizes Nigel P. Smart, Emmanuel Thome
2021/893 (PDF ) DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
2021/892 (PDF ) Low-Latency Keccak at any Arbitrary Order Sara Zarei, Aein Rezaei Shahmirzadi, Hadi Soleimany, Raziye Salarifard, Amir Moradi
2021/891 (PDF ) White Box Traitor Tracing Mark Zhandry
2021/890 (PDF ) On One-way Functions and Sparse Languages Yanyi Liu, Rafael Pass
2021/889 (PDF ) Counterexamples to New Circular Security Assumptions Underlying iO Sam Hopkins, Aayush Jain, Huijia Lin
2021/888 (PDF ) Lifting Standard Model Reductions to Common Setup Assumptions Ngoc Khanh Nguyen, Eftychios Theodorakis, Bogdan Warinschi
2021/886 (PDF ) Computational Records with Aging Hardware: Controlling Half the Output of SHA-256 Mellila Bouam, Charles Bouillaguet, Claire Delaplace, Camille Noûs
2021/885 (PDF ) MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha
2021/884 (PDF ) Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and Simulations Elias Rohrer, Florian Tschorsch
2021/883 (PDF ) Oblivious Key-Value Stores and Amplification for Private Set Intersection Gayathri Garimella, Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
2021/882 (PDF ) Computational Hardness of Optimal FairComputation: Beyond Minicrypt Hemanta K. Maji, Mingyuan Wang
2021/881 (PDF ) Secure Code-Based Key Encapsulation Mechanism with Short Ciphertext and Secret Key Jayashree Dey, Ratna Dutta
2021/880 (PDF ) Towards Tight Random Probing Security Gaëtan Cassiers, Sebastian Faust, Maximilian Orlt, François-Xavier Standaert
2021/879 (PDF ) Rethinking Searchable Symmetric Encryption Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis
2021/878 (PDF ) Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attacks Yuan Yao, Pantea Kiaei, Richa Singh, Shahin Tajik, Patrick Schaumont
2021/877 (PDF ) A Fully Anonymous e-Voting Protocol Employing Universal zk-SNARKs and Smart Contracts Aritra Banerjee
2021/876 (PDF ) Code Constructions and Bounds for Identification via Channels Onur Gunlu, Joerg Kliewer, Rafael F. Schaefer, Vladimir Sidorenko
2021/875 (PDF ) Hybrid Signal protocol for post-quantum email encryption Sara Stadler, Vitor Sakaguti, Harjot Kaur, Anna Lena Fehlhaber
2021/874 (PDF ) Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction Bo-Yeon Sim, Aesun Park, Dong-Guk Han
2021/873 (PDF ) KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk
2021/872 (PDF ) W-OTS(+) up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets David Chaum, Mario Larangeira, Mario Yaksetig, William Carter
2021/871 (PDF ) Traceable Secret Sharing and Applications Vipul Goyal, Yifan Song, Akshayaram Srinivasan
2021/870 (PDF ) SoK: Gröbner Basis Algorithms for Arithmetization Oriented Ciphers Jan Ferdinand Sauer, Alan Szepieniec
2021/869 (PDF ) MiniLedger: Compact-sized Anonymous and Auditable Distributed Payments Panagiotis Chatzigiannis, Foteini Baldimtsi
2021/868 (PDF ) Low-Latency Hardware Masking of PRINCE Nicolai Müller, Thorben Moos, Amir Moradi
2021/867 (PDF ) Key-Policy ABE with Switchable Attributes Cécile Delerablée, Lénaïck Gouriou, David Pointcheval
2021/866 (PDF ) The One-More Discrete Logarithm Assumption in the Generic Group Model Balthazar Bauer, Georg Fuchsbauer, Antoine Plouviez
2021/865 (PDF ) Quantum Key Search for Ternary LWE Iggy van Hoof, Elena Kirshanova, Alexander May
2021/864 (PDF ) A Fast and Simple Partially Oblivious PRF, with Applications Nirvan Tyagi, Sofı́a Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, Christopher A. Wood
2021/863 (PDF ) Authenticated Key Exchange and Signatures with Tight Security in the Standard Model Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge
2021/862 (PDF ) Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung
2021/861 (PDF ) Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors Janaka Alawatugoda, Tatsuaki Okamoto
2021/860 (PDF ) Verification of the security in Boolean masked circuits Vahid Jahandideh
2021/859 (PDF ) Concrete Evaluation of the Random Probing Security Vahid Jahandideh
2021/858 (PDF ) Full key recovery side-channel attack against ephemeral SIKE on the Cortex-M4 Aymeric Genêt, Natacha Linard de Guertechin, Novak Kaluđerović
2021/857 (PDF ) Secure Computation for G-Module and its Applications Qizhi Zhang, Bingsheng Zhang, Lichun Li, Shan Yin, Juanjuan Sun
2021/856 (PDF ) Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang
2021/855 (PDF ) Breaking and Fixing Virtual Channels: Domino Attack and Donner Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
2021/854 (PDF ) PQC: R-Propping of a Simple Oblivious Transfer Pedro Hecht
2021/853 (PDF ) Private Signaling Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov
2021/852 (PDF ) Improved Structured Encryption for SQL Databases via Hybrid Indexing David Cash, Ruth Ng, Adam Rivkin
2021/851 (PDF ) Amun: Securing E-Voting Against Over-the-Shoulder Coercion Riccardo Longo, Chiara Spadafora
2021/850 (PDF ) Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack Élise Tasso, Luca De Feo, Nadia El Mrabet, Simon Pontié
2021/849 (PDF ) Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma
2021/848 (PDF ) Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE Shweta Agrawal, Monosij Maitra, Narasimha Sai Vempati, Shota Yamada
2021/847 (PDF ) Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption Rachit Garg, Rishab Goyal, George Lu, Brent Waters
2021/846 (PDF ) Ergo Hackathon: Crowdfunded Smart Contract Pools Research and Conceptualization Bronson Brooks Richard, Gary Waugh
2021/845 (PDF ) An Intermediate Secret-Guessing Attack on Hash-Based Signatures Roland Booth, Yanhong Xu, Sabyasachi Karati, Reihaneh Safavi-Naini
2021/844 (PDF ) A note on IND-qCCA security in the ROM and its applications: CPA security is sufficient for TLS 1.3 Loïs Huguenin-Dumittan, Serge Vaudenay
2021/843 (PDF ) Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions Brandon Broadnax, Jeremias Mechler, Jörn Müller-Quade
2021/842 (PDF ) PCPs and Instance Compression from a Cryptographic Lens Liron Bronfman, Ron D. Rothblum
2021/841 (PDF ) MPC for $Q_2$ Access Structures over Rings and Fields Robin Jadoul, Nigel P. Smart, Barry Van Leeuwen
2021/840 (PDF ) Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates Keita Xagawa, Akira Ito, Rei Ueno, Junko Takahashi, Naofumi Homma
2021/839 (PDF ) Prudent Practices in Security Standardization Feng Hao
2021/838 (PDF ) Anonymous and Distributed Authentication for Peer-to-Peer Networks Pasan Tennakoon, Supipi Karunathilaka, Rishikeshan Lavakumar, Janaka Alawatugoda
2021/837 (PDF ) On McEliece type cryptosystems using self-dual codes with large minimum weight Luca Mariot, Stjepan Picek, Radinka Yorgova
2021/836 (PDF ) Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs Xiao Liang, Omkant Pandey
2021/835 (PDF ) Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy Sen Yuan, Milan Shen, Ilya Mironov, Anderson C. A. Nascimento
2021/834 (PDF ) Unconditional Communication-Efficient MPC via Hall's Marriage Theorem Vipul Goyal, Antigoni Polychroniadou, Yifan Song
2021/833 (PDF ) ATLAS: Efficient and Scalable MPC in the Honest Majority Setting Vipul Goyal, Hanjun Li, Rafail Ostrovsky, Antigoni Polychroniadou, Yifan Song
2021/832 (PDF ) Progressive And Efficient Verification For Digital Signatures Cecilia Boschini, Dario Fiore, Elena Pagnin
2021/831 (PDF ) Private Remote Sources for Secure Multi-Function Computation Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
2021/830 (PDF ) Analysis and Protection of the Two-metric Helper Data Scheme Lars Tebelmann, Ulrich Kühne, Jean-Luc Danger, Michael Pehl
2021/829 (PDF ) Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers Christof Beierle, Tim Beyne, Patrick Felke, Gregor Leander
2021/828 (PDF ) Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom
2021/827 (PDF ) TransNet: Shift Invariant Transformer Network for Side Channel Analysis Suvadeep Hajra, Sayandeep Saha, Manaar Alam, Debdeep Mukhopadhyay
2021/826 (PDF ) OpenSSLNTRU: Faster post-quantum TLS key exchange Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri
2021/825 (PDF ) Balancing Quality and Efficiency in Private Clustering with Affinity Propagation Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame
2021/824 (PDF ) Security Characterization of J-PAKE and its Variants Michel Abdalla, Manuel Barbosa, Peter B. Rønne, Peter Y. A. Ryan, Petra Šala
2021/823 (PDF ) GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider
2021/822 (PDF ) One-out-of-$q$ OT Combiners Oriol Farràs, Jordi Ribes-González
2021/821 (PDF ) On the hardness of the NTRU problem Alice Pellet-Mary, Damien Stehlé
2021/820 (PDF ) Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent Marek Broll, Federico Canale, Nicolas David, Antonio Florez-Gutierrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo
2021/819 (PDF ) Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes
2021/818 (PDF ) CTng: Secure Certificate and Revocation Transparency Jie Kong, Damon James, Hemi Leibowitz, Ewa Syta, Amir Herzberg
2021/817 (PDF ) Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace Olivier Bronchain, Gaëtan Cassiers, François-Xavier Standaert
2021/816 (PDF ) Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns Alexandra Boldyreva, Tianxin Tang
2021/815 (PDF ) Linear Cryptanalysis of FF3-1 and FEA Tim Beyne
2021/814 (PDF ) A New Way to Achieve Round-Efficient Byzantine Agreement Matthias Fitzi, Chen-Da Liu-Zhang, Julian Loss
2021/813 (PDF ) Intelligent Composed Algorithms Frank Byszio, Dr. Klaus-Dieter Wirth, Dr. Kim Nguyen
2021/812 (PDF ) TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing Elena Pagnin, Gunnar Gunnarsson, Pedram Talebi, Claudio Orlandi, Andrei Sabelfeld
2021/811 (PDF ) A General Purpose Transpiler for Fully Homomorphic Encryption Shruthi Gorantala, Rob Springer, Sean Purser-Haskell, William Lam, Royce Wilson, Asra Ali, Eric P. Astor, Itai Zukerman, Sam Ruth, Christoph Dibak, Phillipp Schoppmann, Sasha Kulankhina, Alain Forget, David Marn, Cameron Tew, Rafael Misoczki, Bernat Guillen, Xinyu Ye, Dennis Kraft, Damien Desfontaines, Aishe Krishnamurthy, Miguel Guevara, Irippuge Milinda Perera, Yurii Sushko, Bryant Gipson
2021/810 (PDF ) Efficient Asynchronous Byzantine Agreement without Private Setups Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2021/809 (PDF ) SoK: Efficient Privacy-preserving Clustering Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame
2021/808 (PDF ) SNARGs for $\mathcal{P}$ from LWE Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin
2021/807 (PDF ) Non-Interactive Batch Arguments for NP from Standard Assumptions Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin
2021/806 (PDF ) Boosting the Security of Blind Signature Schemes Jonathan Katz, Julian Loss, Michael Rosenberg
2021/805 (PDF ) Practical Settlement Bounds for Proof-of-Work Blockchains Peter Gaži, Ling Ren, Alexander Russell
2021/804 (PDF ) A Note on ``Reduction Modulo $2^{448}-2^{224}-1$'' Timothy Shelton
2021/803 (PDF ) On the Privacy of Protocols based on CPA-Secure Homomorphic Encryption Adi Akavia, Margarita Vald
2021/802 (PDF ) On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing Divesh Aggarwal, Eldon Chung, Maciej Obremski, João Ribeiro
2021/801 (PDF ) Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes Mohammad Hassan Ameri, Alexander R. Block, Jeremiah Blocki
2021/800 (PDF ) i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains? Leemon Baird, Pratyay Mukherjee, Rohit Sinha
2021/799 (PDF ) Lattice Attacks on NTRU and LWE: A History of Refinements Martin Albrecht, Léo Ducas
2021/798 (PDF ) Probabilistic Dynamic Input Output Automata (Extended Version) Pierre Civit, Maria Potop-Butucaru
2021/797 (PDF ) LLVM-based Circuit Compilation for Practical Secure Computation Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert, Hossein Yalame
2021/796 (PDF ) How Byzantine is a Send Corruption? Karim Eldefrawy, Julian Loss, Ben Terner
2021/795 (PDF ) Transforming Secure Comparison Protocol from Passive to Active Adversary Model Wei Jiang
2021/794 (PDF ) Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor Si Gao, Elisabeth Oswald, Dan Page
2021/793 (PDF ) Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
2021/792 (PDF ) Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation Madhurima Mukhopadhyay, Palash Sarkar
2021/791 (PDF ) Open Sesame: A Novel Non-SAT-Attack against CAS-Lock Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2021/790 (PDF ) A Side-Channel Assisted Attack on NTRU Amund Askeland, Sondre Rønjom
2021/789 (PDF ) P2DPI: Practical and Privacy-Preserving Deep Packet Inspection Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal
2021/788 (PDF ) Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs Yael Tauman Kalai, Vinod Vaikuntanathan, Rachel Yun Zhang
2021/787 (PDF ) Mobile Voting -- Still Too Risky? Sven Heiberg, Kristjan Krips, Jan Willemson
2021/786 (PDF ) Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy Yongjun Zhao, Huaxiong Wang, Kwok-Yan Lam
2021/785 (PDF ) Lower bounds on lattice sieving and information set decoding Elena Kirshanova, Thijs Laarhoven
2021/784 (PDF ) Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols Ignacio Fernández-Hernández, Tomer Ashur, Vincent Rijmen
2021/783 (PDF ) Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network Joon-Woo Lee, HyungChul Kang, Yongwoo Lee, Woosuk Choi, Jieun Eom, Maxim Deryabin, Eunsang Lee, Junghyun Lee, Donghoon Yoo, Young-Sik Kim, Jong-Seon No
2021/782 (PDF ) On the deployment of FlyClient as a velvet fork: chain-sewing attacks and countermeasures Tristan Nemoz, Alexei Zamyatin
2021/781 (PDF ) Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices Gustavo Banegas, Koen Zandberg, Adrian Herrmann, Emmanuel Baccelli, Benjamin Smith
2021/780 (PDF ) Netlist Decompilation Workflow for Recovered Design Verification, Validation, and Assurance Katie Liszewski, Tim McDonley, Josh Delozier, Andrew Elliott, Dylan Jones, Matt Sutter, Adam Kimura
2021/779 (PDF ) More efficient post-quantum KEMTLS with pre-distributed public keys Peter Schwabe, Douglas Stebila, Thom Wiggers
2021/778 (PDF ) Efficient secret key reusing attribute-based encryption from lattices Xinyuan Qian, Wenyuan Wu
2021/777 (PDF ) Asynchronous Data Dissemination and its Applications Sourav Das, Zhuolun Xiang, Ling Ren
2021/776 (PDF ) SoK: Applying Blockchain Technology in Industrial Internet of Things Gang Wang
2021/775 (PDF ) Completeness Theorems for Adaptively Secure Broadcast Ran Cohen, Juan Garay, Vassilis Zikas
2021/774 (PDF ) On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model Akinori Hosoyamada, Tetsu Iwata
2021/773 (PDF ) HEX-BLOOM: An Efficient Method for Authenticity and Integrity Verification in Privacy-preserving Computing Ripon Patgiri, Malaya Dutta Borah
2021/772 (PDF ) Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks Emre Karabulut, Aydin Aysu
2021/771 (PDF ) Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning Jinhyun So, Ramy E. Ali, Basak Guler, Jiantao Jiao, Salman Avestimehr
2021/770 (PDF ) Multi-key Private Matching for Compute Prasad Buddhavarapu, Benjamin M Case, Logan Gore, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Min Xue
2021/769 (PDF ) Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, Douglas Stebila
2021/768 (PDF ) Privacy-Preserving Decision Trees Training and Prediction Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald
2021/767 (PDF ) White-box cryptography with global device binding from message-recoverable signatures and token-based obfuscation Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven Watson
2021/766 (PDF ) Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum John Andrews, Michele Ciampi, Vassilis Zikas
2021/765 (PDF ) Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption Ghous Amjad, Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
2021/764 (PDF ) Covert Learning: How to Learn with an Untrusted Intermediary Ran Canetti, Ari Karchmer
2021/763 (PDF ) Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation Mathy Vanhoef
2021/762 (PDF ) A wide class of Boolean functions generalizing the hidden weight bit function Claude Carlet
2021/761 (PDF ) Parameterization of Boolean functions by vectorial functions and associated constructions Claude Carlet
2021/760 (PDF ) Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition Saravanan Vijayakumaran
2021/759 (PDF ) Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, Ion Stoica
2021/758 (PDF ) Quantum cryptography based on an algorithm for determining simultaneously all the mappings of a Boolean function Koji Nagata, Renata Wong, Do Ngoc Diep, Tadao Nakamura
2021/757 (PDF ) On the Dual of Generalized Bent Functions Jiaxin Wang, Fang-Wei Fu
2021/756 (PDF ) A Novel Completeness Test and its Application to Side Channel Attacks and Simulators Si Gao, Elisabeth Oswald
2021/755 (PDF ) Tetrad: Actively Secure 4PC for Secure Training and Inference Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh
2021/754 (PDF ) Privacy-Preserving Training of Tree Ensembles over Continuous Data Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen
2021/753 (PDF ) Anonymous Device Authorization for Cellular Networks Abida Haque, Varun Madathil, Bradley Reaves, Alessandra Scafuro
2021/752 (PDF ) Quantum Reduction of Finding Short Code Vectors to the Decoding Problem Thomas Debris-Alazard, Maxime Remaud, Jean-Pierre Tillich
2021/751 (PDF ) Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida
2021/750 (PDF ) Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and $\mathbb{Z}_{2^k}$ Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Benoit Razet, Peter Scholl
2021/749 (PDF ) Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits Mike Rosulek, Lawrence Roy
2021/748 (PDF ) A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss Ke Wu, Gilad Asharov, Elaine Shi
2021/747 (PDF ) Elmo: Recursive Virtual Payment Channels for Bitcoin Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos
2021/746 (PDF ) What is All the FaaS About? - Remote Exploitation of FPGA-as-a-Service Platforms Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2021/745 (PDF ) Generic-Group Identity-Based Encryption: A Tight Impossibility Result Gili Schul-Ganz, Gil Segev
2021/743 (PDF ) Manta: a Plug and Play Private DeFi Stack Shumo Chu, Yu Xia, Zhenfei Zhang
2021/742 (PDF ) Conclave: A Collective Stake Pool Protocol Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira
2021/740 (PDF ) The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application Keita Xagawa
2021/739 (PDF ) A New Approach to Garbled Circuits Anasuya Acharya, Tomer Ashur, Efrat Cohen, Carmit Hazay, Avishay Yanai
2021/738 (PDF ) On the Impossibility of Purely Algebraic Signatures Nico Döttling, Dominik Hartmann, Dennis Hofheinz, Eike Kiltz, Sven Schäge, Bogdan Ursu
2021/737 (PDF ) GIFT-COFB is Tightly Birthday Secure with Encryption Queries Akiko Inoue, Kazuhiko Minematsu
2021/736 (PDF ) Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Takahiro Matsuda, Ibuki Mishina, Hiraku Morita, Jacob C. N. Schuldt
2021/735 (PDF ) Side-Channel Protections for Picnic Signatures Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, Greg Zaverucha
2021/734 (PDF ) Guarding the First Order: The Rise of AES Maskings Amund Askeland, Siemen Dhooghe, Svetla Nikova, Vincent Rijmen, Zhenda Zhang
2021/733 (PDF ) GenoPPML – a framework for genomic privacy-preserving machine learning Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
2021/732 (PDF ) Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang
2021/731 (PDF ) Pasta: A Case for Hybrid Homomorphic Encryption Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch
2021/730 (PDF ) Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, Xiao Wang
2021/729 (PDF ) Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for TFHE Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
2021/728 (PDF ) Laconic Private Set Intersection and Applications Navid Alamati, Pedro Branco, Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Sihang Pu
2021/727 (PDF ) SoK: Privacy-Preserving Computing in the Blockchain Era Ghada Almashaqbeh, Ravital Solomon
2021/726 (PDF ) Asymmetric All-or-nothing Transforms Navid Nasr Esfahani, Douglas R. Stinson
2021/725 (PDF ) KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip Felix Günther, Simon Rastikian, Patrick Towa, Thom Wiggers
2021/724 (PDF ) Tri-op redactable blockchains with block modification, removal, and insertion Mohammad Sadeq Dousti, Alptekin Küpçü
2021/723 (PDF ) Cache attack on MISTY1 Haopeng Fan, Wenhao Wang, Yongjuan Wang, Wenyu Zhang, Qingjun Yuan
2021/722 (PDF ) Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption Yusaku Maeda, Koji Nuida
2021/721 (PDF ) Index Calculus Attacks on Hyperelliptic Jacobians with Effective Endomorphisms Sulamithe Tsakou, Sorina Ionica
2021/720 (PDF ) On Reverse Engineering Neural Network Implementation on GPU Łukasz Chmielewski, Léo Weissbart
2021/719 (PDF ) Enhancing Differential-Neural Cryptanalysis Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu
2021/718 (PDF ) Will You Cross the Threshold for Me? - Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy
2021/717 (PDF ) Ablation Analysis for Multi-device Deep Learning-based Physical Side-channel Analysis Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek
2021/716 (PDF ) SSE and SSD: Page-Efficient Searchable Symmetric Encryption Angèle Bossuat, Raphael Bost, Pierre-Alain Fouque, Brice Minaud, Michael Reichle
2021/715 (PDF ) Hours of Horus: Keyless Cryptocurrency Wallets Dionysis Zindros
2021/714 (PDF ) CARiMoL: A Configurable Hardware Accelerator for Ringand Module Lattice-Based Post-Quantum Cryptography Afifa Ishtiaq, Dr. Muhammad Shafique, Dr. Osman Hassan
2021/713 (PDF ) Public Key Encryption with Flexible Pattern Matching Élie Bouscatié, Guilhem Castagnos, Olivier Sanders
2021/712 (PDF ) DEFAULT: Cipher Level Resistance Against Differential Fault Attack Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim
2021/711 (PDF ) The Matrix Reloaded: Multiplication Strategies in FrodoKEM Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider, Christine van Vredendaal
2021/710 (PDF ) VOProof: Efficient zkSNARKs from Vector Oracle Compilers Yuncong Zhang, Alan Szepieniec, Ren Zhang, Shi-Feng Sun, Geng Wang, Dawu Gu
2021/709 (PDF ) Bounded Collusion ABE for TMs from IBE Rishab Goyal, Ridwan Syed, Brent Waters
2021/708 (PDF ) Anonymous, Robust Post-Quantum Public Key Encryption Paul Grubbs, Varun Maram, Kenneth G. Paterson
2021/707 (PDF ) Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot
2021/706 (PDF ) Cryptanalysis of an oblivious PRF from supersingular isogenies Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso
2021/705 (PDF ) Bridging Machine Learning and Cryptanalysis via EDLCT Yi Chen, Hongbo Yu
2021/704 (PDF ) IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status Elli Androulaki, Ilie Circiumaru, Jesus Diaz Vico, Miguel Prada, Alessandro Sorniotti, Marc Stoecklin, Marko Vukolic, Marie Wallace
2021/703 (PDF ) Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham
2021/702 (PDF ) Symmetric Key Exchange with Full Forward Security and Robust Synchronization Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord
2021/701 (PDF ) Multidimentional ModDiv public key exchange protocol Samir Bouftass
2021/700 (PDF ) DeCSIDH: Delegating isogeny computations in the CSIDH setting Robi Pedersen
2021/699 (PDF ) Radical Isogenies on Montgomery Curves Hiroshi Onuki, Tomoki Moriya
2021/698 (PDF ) Multi-Dimensional Sub/Super-Range Signatures Masahito Ishizaka, Shinsaku Kiyomoto
2021/697 (PDF ) GoAT: File Geolocation via Anchor Timestamping Deepak Maram, Iddo Bentov, Mahimna Kelkar, Ari Juels
2021/696 (PDF ) The "quantum annoying" property of password-authenticated key exchange protocols Edward Eaton, Douglas Stebila
2021/695 (PDF ) Adaptively Secure Lattice-based Revocable IBE in the QROM: Compact Parameters, Tight Security, and Anonymity Atsushi Takayasu
2021/694 (PDF ) On Interactive Oracle Proofs for Boolean R1CS Statements Ignacio Cascudo, Emanuele Giunta
2021/693 (PDF ) Hardware Penetration Testing Knocks Your SoCs Off Mark Fischer, Fabian Langer, Johannes Mono, Clemens Nasenberg, Nils Albartus
2021/692 (PDF ) Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha
2021/691 (PDF ) General Bootstrapping Approach for RLWE-based Homomorphic Encryption Andrey Kim, Maxim Deryabin, Jieun Eom, Rakyong Choi, Yongwoo Lee, Whan Ghang, Donghoon Yoo
2021/690 (PDF ) On Communication Models and Best-Achievable Security in Two-Round MPC Aarushi Goel, Abhishek Jain, Manoj Prabhakaran, Rajeev Raghunath
2021/689 (PDF ) OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm Ripon Patgiri
2021/688 (PDF ) Statistical ZAPs from Group-Based Assumptions Geoffroy Couteau, Shuichi Katsumata, Elahe Sadeghi, Bogdan Ursu
2021/687 (PDF ) Towards Understanding Practical Randomness Beyond Noise: Differential Privacy and Mixup Hanshen Xiao, Srinivas Devadas
2021/686 (PDF ) Meteor: Cryptographically Secure Steganography for Realistic Distributions Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel Rubin
2021/685 (PDF ) Blind Side-Channel SIFA Melissa Azouaoui, Kostas Papagiannopoulos, Dominik Zürner
2021/684 (PDF ) Tight Setup Bounds for Identifiable Abort Nicholas Brandt
2021/683 (PDF ) S2Dedup: SGX-enabled Secure Deduplication Tânia Esteves, Mariana Miranda, João Paulo, Bernardo Portela
2021/682 (PDF ) Batching Base Oblivious Transfers Ian McQuoid, Mike Rosulek, Lawrence Roy
2021/681 (PDF ) Learnability of Multiplexer PUF and $S_N$-PUF : A Fourier-based Approach Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2021/679 (PDF ) Permutation Based EDM: An Inverse Free BBB Secure PRF Avijit Dutta, Mridul Nandi, Suprita Talnikar
2021/678 (PDF ) Faster indifferentiable hashing to elliptic $\mathbb{F}_{\!q^2}$-curves Dmitrii Koshelev
2021/677 (PDF ) Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes Paul Cotan, George Teseleanu
2021/676 (PDF ) Extending the GLS endomorphism to speed up GHS Weil descent using Magma Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez, Benjamin Smith
2021/675 (PDF ) 3-round Feistel is Not Superpseudorandom Over Any Group Hector B. Hougaard
2021/674 (PDF ) On the Effect of the Key-expansion Algorithm in Simon-like Ciphers Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li
2021/673 (PDF ) zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy Tianyi Liu, Xiang Xie, Yupeng Zhang
2021/672 (PDF ) PQC: R-Propping a Chaotic Cellular Automata Pedro Hecht
2021/671 (PDF ) Multi-Threshold Byzantine Fault Tolerance Atsuki Momose, Ling Ren
2021/670 (PDF ) AOT: Anonymization by Oblivious Transfer Farid Javani, Alan T. Sherman
2021/669 (PDF ) Pravuil: Global Consensus for a United World David Cerezo Sánchez
2021/668 (PDF ) Grover on SM3 Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
2021/667 (PDF ) Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors Hyeokdong Kwon, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo
2021/666 (PDF ) Secure cloud-of-clouds storage with space-efficient secret sharing Ahad Niknia, Miguel Correia, Jaber Karimpour
2021/665 (PDF ) On the algebraic immunity of direct sum constructions Pierrick Méaux
2021/664 (PDF ) A Trustless GQ Multi-Signature Scheme with Identifiable Abort Handong Cui, Tsz Hon Yuen
2021/663 (PDF ) On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier
2021/662 (PDF ) Verifying Post-Quantum Signatures in 8 kB of RAM Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang
2021/661 (PDF ) Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives Ling Sun, Wei Wang, Meiqin Wang
2021/660 (PDF ) Best-Possible Unpredictable Proof-of-Stake: An Impossibility and a Practical Design Lei Fan, Jonathan Katz, Zhenghao Lu, Phuc Thai, Hong-Sheng Zhou
2021/659 (PDF ) Technical report: CoPHEE: Co-processor forPartially Homomorphic Encrypted Execution Mohammed Nabeel, Mohammed Ashraf, Eduardo Chielle, Nektarios G. Tsoutsos, Michail Maniatakos
2021/658 (PDF ) A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum
2021/657 (PDF ) Locally Reconstructable Non-malleable Secret Sharing Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Jenit Tomy
2021/656 (PDF ) Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu
2021/655 (PDF ) On the Effect of Projection on Rank Attacks in Multivariate Cryptography Morten Øygarden, Daniel Smith-Tone, Javier Verbel
2021/654 (PDF ) Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa
2021/653 (PDF ) Smooth Zero-Knowledge Hash Functions Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Helger Lipmaa
2021/652 (PDF ) Detector+: An Approach for Detecting, Isolating, and Preventing Timing Attacks Arsalan Javeed, Cemal Yilmaz, Erkay Savas
2021/651 (PDF ) Leo: A Programming Language for Formally Verified, Zero-Knowledge Applications Collin Chin, Howard Wu, Raymond Chu, Alessandro Coglio, Eric McCarthy, Eric Smith
2021/650 (PDF ) Structured Leakage and Applications to Cryptographic Constant-Time and Cost Gilles Barthe, Benjamin Gregoire, Vincent Laporte, Swarn Priya
2021/649 (PDF ) On the Algebraic Immunity - Resiliency trade-off, implications for Goldreich's Pseudorandom Generator Aurélien Dupin, Pierrick Méaux, Mélissa Rossi
2021/648 (PDF ) Security of COFB against Chosen Ciphertext Attacks Mustafa Khairallah
2021/647 (PDF ) privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm Ripon Patgiri
2021/646 (PDF ) Optimization of Advanced Encryption Standard on Graphics Processing Units Cihangir Tezcan
2021/645 (PDF ) Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing Alexander May, Floyd Zweydinger
2021/644 (PDF ) Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti
2021/643 (PDF ) On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers Muhammad ElSheikh, Amr M. Youssef
2021/642 (PDF ) On the Cryptographic Deniability of the Signal Protocol Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk
2021/641 (PDF ) Hydra: Succinct Fully Pipelineable Interactive Arguments of Knowledge William Zhang, Yu Xia
2021/640 (PDF ) Security and Trust in Open Source Security Tokens Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl
2021/639 (PDF ) Indifferentiable Signatures: High Performance and Fallback Security Charalampos Papamanthou, Cong Zhang, Hong-Sheng Zhou
2021/638 (PDF ) Efficient Constructions of Pairing Based Accumulators Ioanna Karantaidou, Foteini Baldimtsi
2021/637 (PDF ) Doubly-Affine Extractors, and their Applications Yevgeniy Dodis, Kevin Yeo
2021/636 (PDF ) Communication Complexity of Private simultaneous Quantum Messages Protocols Akinori Kawachi, Harumichi Nishimura
2021/635 (PDF ) symKrypt: A General-purpose and Lightweight Symmetric-Key Cryptography Ripon Patgiri
2021/634 (PDF ) Setting Up Efficient TFHE Parameters for Multivalue Plaintexts and Multiple Additions Jakub Klemsa
2021/633 (PDF ) CTIDH: faster constant-time CSIDH Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková
2021/632 (PDF ) Internet Computer Consensus Jan Camenisch, Manu Drijvers, Timo Hanke, Yvonne-Anne Pignolet, Victor Shoup, Dominic Williams
2021/631 (PDF ) SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges Felix Engelmann, Lukas Müller, Andreas Peter, Frank Kargl, Christoph Bösch
2021/630 (PDF ) Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
2021/629 (PDF ) SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Mixing Techniques Simin Ghesmati, Walid Fdhila, Edgar Weippl
2021/628 (PDF ) The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets Joachim Neu, Ertem Nusret Tas, David Tse
2021/627 (PDF ) VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries Nirvan Tyagi, Ben Fisch, Andrew Zitek-Estrada, Joseph Bonneau, Stefano Tessaro
2021/626 (PDF ) Help, my Signal has bad Device! Breaking the Signal Messenger’s Post-CompromiseSecurity through a Malicious Device Jan Wichelmann, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth
2021/625 (PDF ) Plactic key agreement (insecure?) Daniel R. L. Brown
2021/624 (PDF ) Group Structure in Correlations and its Applications in Cryptography Guru-Vamsi Policharla, Manoj Prabhakaran, Rajeev Raghunath, Parjanya Vyas
2021/623 (PDF ) Mining in Logarithmic Space Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
2021/622 (PDF ) Stealth: A Highly Secured End-to-End Symmetric Communication Protocol Ripon Patgiri, Naresh Babu Muppalaneni
2021/621 (PDF ) R-SWAP: Relay based atomic cross-chain swap protocol Léonard Lys, Arthur Micoulet, Maria Potop-Butucaru
2021/620 (PDF ) Algebraic attacks on block ciphers using quantum annealing Elżbieta Burek, Michał Misztal, Michał Wroński
2021/619 (PDF ) Polar Coding for Ring-LWE-Based Public Key Encryption Jiabo Wang, Cong Ling
2021/618 (PDF ) Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai
2021/617 (PDF ) Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2021/616 (PDF ) An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest
2021/615 (PDF ) A Tutorial on Concurrent Zero Knowledge Rafael Pass
2021/614 (PDF ) Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit Rafael Pass
2021/613 (PDF ) Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu
2021/612 (PDF ) Privacy-preserving Density-based Clustering Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider
2021/611 (PDF ) Some Applications of Hamming Weight Correlations Fatih Balli, Andrea Caforio, Subhadeep Banik
2021/610 (PDF ) A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems Alexander Nilsson, Irina E. Bocharova, Boris D. Kudryashov, Thomas Johansson
2021/609 (PDF ) FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky, Vassilis Zikas
2021/608 (PDF ) Layering diverse cryptography to lower risks of future and secret attacks: post-quantum estimates Daniel R. L. Brown
2021/607 (PDF ) Signed (Group) Diffie-Hellman Key Exchange with Tight Security Jiaxin Pan, Chen Qian, Magnus Ringerud
2021/606 (PDF ) ZK-PCPs from Leakage-Resilient Secret Sharing Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2021/605 (PDF ) On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs Benny Applebaum, Eyal Golombek
2021/604 (PDF ) Masked Triples: Amortizing Multiplication Triples across Conditionals David Heath, Vladimir Kolesnikov, Stanislav Peceny
2021/603 (PDF ) Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults Justin Kim, Vandan Mehta, Kartik Nayak, Nibesh Shrestha
2021/602 (PDF ) Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
2021/601 (PDF ) The Art of Labeling: Task Augmentation for Private(Collaborative) Learning on Transformed Data Hanshen Xiao, Srinivas Devadas
2021/600 (PDF ) Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group Christian Porter, Andrew Mendelsohn, Cong Ling
2021/599 (PDF ) Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang
2021/598 (PDF ) Proof of Assets in the Diem Blockchain Panagiotis Chatzigiannis, Konstantinos Chalkias
2021/597 (PDF ) Accelerated RISC-V for Post-Quantum SIKE Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2021/596 (PDF ) Mutual Accountability Layer: Accountable Anonymity within Accountable Trust Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico
2021/595 (PDF ) Securing Parallel-chain Protocols under Variable Mining Power Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath
2021/594 (PDF ) Zero Knowledge Contingent Payments for Trained Neural Networks Zhelei Zhou, Xinlei Cao, Jian Liu, Bingsheng Zhang, Kui Ren
2021/593 (PDF ) Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms Shumo Chu, Danyang Zhuo, Elaine Shi, T-H. Hubert Chan
2021/592 (PDF ) Side Channel Analysis against the ANSSI’s protected AES implementation on ARM Loïc Masure, Rémi Strullu
2021/591 (PDF ) Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs! Jan Peter Drees, Pritha Gupta, Eyke Hüllermeier, Tibor Jager, Alexander Konze, Claudia Priesterjahn, Arunselvan Ramaswamy, Juraj Somorovsky
2021/590 (PDF ) An Algebraic Framework for Universal and Updatable SNARKs Carla Ràfols, Arantxa Zapico
2021/589 (PDF ) White-Box Encryption Scheme Using a Quantum Memory Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo
2021/588 (PDF ) A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose Thomas Haines, Johannes Mueller
2021/587 (PDF ) PrORAM: Fast $O(\log n)$ Private Coin ZK ORAM David Heath, Vladimir Kolesnikov
2021/586 (PDF ) A New Approach for finding Low-Weight Polynomial Multiples Laila El Aimani
2021/585 (PDF ) Exact Lattice Sampling from Non-Gaussian Distributions Maxime Plançon, Thomas Prest
2021/584 (PDF ) Effects of Quantization on the Multiple-Round Secret-Key Capacity Onur Gunlu, Ueli Maurer, Joao Ribeiro
2021/583 (PDF ) Entropoids: Groups in Disguise Lorenz Panny
2021/582 (PDF ) ethSTARK Documentation Eli Ben-Sasson
2021/581 (PDF ) Breaking CAS-Lock and Its Variants by Exploiting Structural Traces Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu
2021/580 (PDF ) Lightweight, Maliciously Secure Verifiable Function Secret Sharing Leo de Castro, Antigoni Polychroniadou
2021/579 (PDF ) Quantum Key-length Extension Joseph Jaeger, Fang Song, Stefano Tessaro
2021/578 (PDF ) Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2) Itai Dinur
2021/577 (PDF ) Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks Dionysis Zindros
2021/576 (PDF ) Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares Surya Addanki, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky, Antigoni Polychroniadou
2021/575 (PDF ) Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu
2021/574 (PDF ) Constructing More Quadratic APN Functions with the QAM Method Yuyin Yu, Leo Perrin
2021/573 (PDF ) Compactness of Hashing Modes and Efficiency beyond Merkle Tree Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy
2021/572 (PDF ) Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE Charanjit Singh Jutla, Nathan Manohar
2021/571 (PDF ) Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond Thomas Attema, Nicole Gervasoni, Michiel Marcus, Gabriele Spini
2021/570 (PDF ) Lattice sieving via quantum random walks André Chailloux, Johanna Loyer
2021/569 (PDF ) Automated Generation of Masked Hardware David Knichel, Amir Moradi, Nicolai Müller, Pascal Sasdrich
2021/568 (PDF ) ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra
2021/567 (PDF ) Forward-secure Multi-user Aggregate Signatures based on zk-SNARKs Jeonghyuk Lee, Jihye Kim, Hyunok Oh
2021/566 (PDF ) From Random Oracles to Ideal Signatures, and Back Cong Zhang, Hong-Sheng Zhou
2021/565 (PDF ) The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving Cyprien Delpech de Saint Guilhem, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy
2021/564 (PDF ) SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2021/563 (PDF ) High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2021/562 (PDF ) A fusion algorithm for solving the hidden shift problem in finite abelian groups Wouter Castryck, Ann Dooms, Carlo Emerencia, Alexander Lemmens
2021/561 (PDF ) Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors Pakize Sanal, Emrah Karagoz, Hwajeong Seo, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2021/560 (PDF ) MOBS (Matrices Over Bit Strings) public key exchange Nael Rahman, Vladimir Shpilrain
2021/559 (PDF ) A Fresh Approach to Updatable Symmetric Encryption Andrés Fabrega, Ueli Maurer, Marta Mularczyk
2021/558 (PDF ) Verifiable Decryption in the Head Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter Rønne, Tjerand Silde
2021/557 (PDF ) Dual lattice attacks for closest vector problems (with preprocessing) Thijs Laarhoven, Michael Walter
2021/556 (PDF ) Interactive Physical ZKP for Connectivity:Applications to Nurikabe and Hitori Leo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuk
2021/555 (PDF ) Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited Nils Wisiol, Bipana Thapaliya, Khalid T. Mursi, Jean-Pierre Seifert, Yu Zhuang
2021/554 (PDF ) Grover on Caesar and Vigenère Ciphers Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo
2021/553 (PDF ) PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
2021/552 (PDF ) Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric André Chailloux, Thomas Debris-Alazard, Simona Etinski
2021/551 (PDF ) Efficient Sorting of Homomorphic Encrypted Data with $k$-way Sorting Network Seungwan Hong, Seunghong Kim, Jiheon Choi, Younho Lee, Jung Hee Cheon
2021/550 (PDF ) Quadratic almost bent functions - their partial characterization and design in the spectral domain Amar Bapić, Samir Hodžić, Enes Pasalic
2021/549 (PDF ) High-assurance field inversion for curve-based cryptography Benjamin Salling Hvass, Diego F. Aranha, Bas Spitters
2021/548 (PDF ) Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper) Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
2021/547 (PDF ) Cube Attack against 843-Round Trivium Yao Sun
2021/546 (PDF ) Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V and SNOW-Vi Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto
2021/545 (PDF ) MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao
2021/544 (PDF ) Improved guess-and-determine and distinguishing attacks on SNOW-V Jing Yang, Thomas Johansson, Alexander Maximov
2021/543 (PDF ) The Case for SIKE: A Decade of the Supersingular Isogeny Problem Craig Costello
2021/542 (PDF ) Symetric encryption algorithms based on the mathematical structure underlying the three body problem Samir Bouftass.
2021/541 (PDF ) Hardware Deployment of Hybrid PQC Reza Azarderakhsh, Rami El Khatib, Brian Koziel, Brandon Langenberg
2021/540 (PDF ) Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments Geoffroy Couteau, Michael Klooß, Huang Lin, Michael Reichle
2021/539 (PDF ) More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions Atsushi Takayasu
2021/538 (PDF ) A Composable Look at Updatable Encryption Françoise Levy-dit-Vehel, Maxime Roméas
2021/537 (PDF ) SoK: Exploring Blockchains Interoperability Gang Wang
2021/535 (PDF ) On the Possibility of Basing Cryptography on $\EXP \neq \BPP$ Yanyi Liu, Rafael Pass
2021/534 (PDF ) Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes Maura B. Paterson, Douglas R. Stinson
2021/533 (PDF ) CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU Sijun Tan, Brian Knott, Yuan Tian, David J. Wu
2021/532 (PDF ) Rainbow on Cortex-M4 Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang
2021/531 (PDF ) LogStack: Stacked Garbling with $O(b \log b)$ Computation David Heath, Vladimir Kolesnikov
2021/530 (PDF ) Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level Yuan Yao, Tuna Tufan, Tarun Kathuria, Baris Ege, Ulkuhan Guler, Patrick Schaumont
2021/529 (PDF ) SnarkPack: Practical SNARK Aggregation Nicolas Gailly, Mary Maller, Anca Nitulescu
2021/528 (PDF ) Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping Denis Firsov, Henri Lakk, Ahto Truu
2021/527 (PDF ) Practical solving of discrete logarithm problem over prime fields using quantum annealing Michał Wroński
2021/526 (PDF ) Reinforcement Learning-based Design of Side-channel Countermeasures Jorai Rijsdijk, Lichao Wu, Guilherme Perin
2021/525 (PDF ) On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis Lichao Wu, Guilherme Perin
2021/524 (PDF ) Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency Kwangsu Lee
2021/523 (PDF ) No Time to Hash: On Super Efficient Entropy Accumulation Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie
2021/522 (PDF ) Public-key Cryptosystems and Signature Schemes from p-adic Lattices Yingpu Deng, Lixia Luo, Yanbin Pan, Zhaonan Wang, Guanju Xiao
2021/521 (PDF ) Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert
2021/520 (PDF ) Optimal Randomized Partial Checking for Decryption Mix Nets Thomas Haines, Johannes Mueller
2021/519 (PDF ) Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment Atakan Arslan, Muhammed Ali Bingöl
2021/518 (PDF ) How to Share and Own a Secret Victor Ermolaev, Gamze Tillem
2021/517 (PDF ) Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity Yanyi Liu, Rafael Pass
2021/515 (PDF ) Generic Constructions of Revocable Hierarchical Identity-based Encryption Keita Emura, Atsushi Takayasu, Yohei Watanabe
2021/514 (PDF ) Non-Interactive Zero Knowledge from Sub-exponential DDH Abhishek Jain, Zhengzhong Jin
2021/513 (PDF ) On One-way Functions from NP-Complete Problems Yanyi Liu, Rafael Pass
2021/512 (PDF ) Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF Tapas Pal, Ratna Dutta
2021/511 (PDF ) What Makes Fiat--Shamir zkSNARKs (Updatable SRS) Simulation Extractable? Chaya Ganesh, Hamidreza Khoshakhlagh, Markulf Kohlweiss, Anca Nitulescu, Michal Zajac
2021/510 (PDF ) Signer and Message Ambiguity from a Variety of Keys George Teseleanu
2021/509 (PDF ) On using the same key pair for Ed25519 and an X25519 based KEM Erik Thormarker
2021/508 (PDF ) Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, Younho Lee
2021/507 (PDF ) The t-wise Independence of Substitution-Permutation Networks Tianren Liu, Stefano Tessaro, Vinod Vaikuntanathan
2021/506 (PDF ) Delegating Supersingular Isogenies over $\mathbb{F}_{p^2}$ with Cryptographic Applications Robi Pedersen, Osmanbey Uzunkol
2021/505 (PDF ) Cryptanalysis of Boyen’s Attribute-Based Encryption Scheme in TCC 2013 Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, Shota Yamada
2021/504 (PDF ) A Generic Method for Investigating Nonsingular Galois NFSRs Xiao-Juan Wang, Tian Tian, Wen-Feng Qi
2021/503 (PDF ) Almost-Asynchronous MPC under Honest Majority, Revisited Matthieu Rambaud, Antoine Urban
2021/502 (PDF ) A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption Kwangsu Lee, Joon Sik Kim
2021/501 (PDF ) zkHawk: Practical Private Smart Contracts from MPC-based Hawk Aritra Banerjee, Michael Clear, Hitesh Tewari
2021/500 (PDF ) Order-C Secure Multiparty Computation for Highly Repetitive Circuits Gabrielle Beck, Aarushi Goel, Abhishek Jain, Gabriel Kaptchuk
2021/499 (PDF ) Optimizing Registration Based Encryption Kelong Cong, Karim Eldefrawy, Nigel P. Smart
2021/498 (PDF ) SoK: Multi-Device Secure Instant Messaging Antonio Dimeo, Felix Gohla, Daniel Goßen, Niko Lockenvitz
2021/497 (PDF ) SoK: Design Tools for Side-Channel-Aware Implementations IR Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont
2021/496 (PDF ) Applications of SKREM-like symmetric key ciphers Mircea Digulescu
2021/495 (PDF ) Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One-Way Functions Mircea Digulescu
2021/494 (PDF ) Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures. Surbhi Shaw, Ratna Dutta
2021/493 (PDF ) Optimizing BIKE for the Intel Haswell and ARM Cortex-M4 Ming-Shing Chen, Tung Chou, Markus Krausz
2021/492 (PDF ) Classic McEliece on the ARM Cortex-M4 Ming-Shing Chen, Tung Chou
2021/491 (PDF ) A toolbox for verifiable tally-hiding e-voting systems Véronique Cortier, Pierrick Gaudry, Quentin Yang
2021/490 (PDF ) Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE Chao Liu, Anyu Wang, Zhongxiang Zheng
2021/488 (PDF ) Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle Javier Herranz, Ramiro Martínez, Manuel Sánchez
2021/487 (PDF ) Xifrat Cryptanalysis - Compute the Mixing Function Without the Key "Danny" Niu Jianfang
2021/486 (PDF ) Security Analysis of End-to-End Encryption for Zoom Meetings Takanori Isobe, Ryoma Ito
2021/485 (PDF ) A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme Ferhat Yaman, Ahmet Can Mert, Erdinç Öztürk, Erkay Savaş
2021/484 (PDF ) Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF Alireza Kavousi, Javad Mohajeri, Mahmoud Salmasizadeh
2021/483 (PDF ) Masking Kyber: First- and Higher-Order Implementations Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal
2021/482 (PDF ) Inconsistency of Simulation and Practice in Delay-based Strong PUFs Anita Aghaie, Amir Moradi
2021/481 (PDF ) PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
2021/480 (PDF ) Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform Jakub Klemsa
2021/479 (PDF ) Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl
2021/478 (PDF ) TurboIKOS: Improved Non-interactive Zero Knowledge and Post-Quantum Signatures Yaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang, Xinyuan Zhang
2021/477 (PDF ) Exploiting ROLLO's Constant-Time Implementations with a Single-Trace Analysis Agathe Cheriere, Lina Mortajine, Tania Richmond, Nadia El Mrabet
2021/476 (PDF ) Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions Aaqib Bashir Dar, Mashhood Jeelani Lone, Nuzhat Hussain
2021/475 (PDF ) Private Liquidity Matching using MPC Shahla Atapoor, Nigel P. Smart, Younes Talibi Alaoui
2021/474 (PDF ) Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe
2021/473 (PDF ) Cryptonomial: A Framework for Private Time-Series Polynomial Calculations Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung
2021/472 (PDF ) CryptoGram: Fast Private Calculations of Histograms over Multiple Users’ Inputs Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung
2021/471 (PDF ) Size, Speed, and Security: An Ed25519 Case Study Cesar Pereida García, Sampo Sovio
2021/470 (PDF ) Upslices, Downslices, and Secret-Sharing with Complexity of $1.5^n$ Benny Applebaum, Oded Nir
2021/469 (PDF ) Entropoid Based Cryptography Danilo Gligoroski
2021/468 (PDF ) Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report) Coşku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi
2021/467 (PDF ) Key-schedule Security for the TLS 1.3 Standard Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss
2021/465 (PDF ) Cryptanalysis of `MAKE' Daniel Brown, Neal Koblitz, Jason LeGrow
2021/464 (PDF ) iTimed: Cache Attacks on the Apple A10 Fusion SoC Gregor Haas, Seetal Potluri, Aydin Aysu
2021/463 (PDF ) Improving Recent Side-Channel Attacks Against the DES Key Schedule Andreas Wiemers, Johannes Mittmann
2021/462 (PDF ) SoK: How (not) to Design and Implement Post-Quantum Cryptography James Howe, Thomas Prest, Daniel Apon
2021/461 (PDF ) Second-Order SCA Security with almost no Fresh Randomness Aein Rezaei Shahmirzadi, Amir Moradi
2021/460 (PDF ) Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi
2021/459 (PDF ) SIRNN: A Math Library for Secure RNN Inference Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi
2021/458 (PDF ) FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm Gideon Samid
2021/457 (PDF ) Non-Interactive Composition of Sigma-Protocols via Share-then-Hash Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
2021/456 (PDF ) Hardening Circuit-Design IP Against Reverse-Engineering Attacks Animesh Chhotaray, Thomas Shrimpton
2021/455 (PDF ) Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe
2021/454 (PDF ) Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security Veronika Kuchta, Amin Sakzad, Damien Stehle, Ron Steinfeld, Shi-Feng Sun
2021/453 (PDF ) Merkle^2: A Low-Latency Transparency Log System Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, Raluca Ada Popa
2021/451 (PDF ) RepShard: Reputation-based Sharding Scheme Achieves Linearly Scaling Efficiency and Security Simultaneously Gang Wang
2021/450 (PDF ) RandChain: Practical Scalable Decentralized Randomness Attested by Blockchain Gang Wang, Mark Nixon
2021/449 (PDF ) Towards Cloud-assisted Industrial IoT Platform for Large-scale Continuous Condition Monitoring Gang Wang, Mark Nixon, Mike Boudreaux
2021/448 (PDF ) On the Memory-Tightness of Hashed ElGamal Ashrujit Ghoshal, Stefano Tessaro
2021/447 (PDF ) Explicit, Closed-form, General bounds for Cuckoo Hashing with a Stash Daniel Noble
2021/446 (PDF ) Towards practical GGM-based PRF from (Module-)Learning-with-Rounding Chitchanok Chuengsatiansup, Damien Stehle
2021/445 (PDF ) A Survey on Perfectly-Secure Verifiable Secret-Sharing Anirudh Chandramouli, Ashish Choudhury, Arpita Patra
2021/444 (PDF ) Xifrat - Compact Public-Key Cryptosystems based on Quasigroups Daniel Nager, "Danny" Niu Jianfang
2021/443 (PDF ) Constructing a pairing-free certificateless proxy signature scheme from ECDSA Cholun Kim
2021/442 (PDF ) How to Backdoor a Cipher Raluca Posteuca, Tomer Ashur
2021/441 (PDF ) Watermarking PRFs from Lattices: Public Extract and Collusion Resistant Yukun Wang, Mingqiang Wang
2021/440 (PDF ) Two modifications for Loidreau's code-based cryptosystem Wenshuo Guo, Fangwei Fu
2021/439 (PDF ) Recovering the Key from the Internal State of Grain-128AEAD Donghoon Chang, Meltem Sonmez Turan
2021/438 (PDF ) More Efficient Shuffle Argument from Unique Factorization Toomas Krips, Helger Lipmaa
2021/437 (PDF ) Formal security analysis of MPC-in-the-head zero-knowledge protocols Nikolaj Sidorenco, Sabine Oechsner, Bas Spitters
2021/436 (PDF ) Algebraic Differential Fault Analysis on SIMON block cipher Duc-Phong Le, Sze Ling Yeo, Khoongming Khoo
2021/435 (PDF ) Non-Interactive Anonymous Router Elaine Shi, Ke Wu
2021/434 (PDF ) On the Power of Expansion: More Efficient Constructions in the Random Probing Model Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb
2021/432 (PDF ) XORBoost: Tree Boosting in the Multiparty Computation Setting Kevin Deforth, Marc Desgroseilliers, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Marius Vuille
2021/431 (PDF ) Unbounded Multi-Party Computation from Learning with Errors Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
2021/430 (PDF ) Lattice Enumeration on GPUs for fplll Simon Pohmann, Marc Stevens, Jens Zumbrägel
2021/429 (PDF ) New Practical Multivariate Signatures from a Nonlinear Modifier Daniel Smith-Tone
2021/428 (PDF ) A Coq proof of the correctness of X25519 in TweetNaCl Peter Schwabe, Benoît Viguier, Timmy Weerwag, Freek Wiedijk
2021/427 (PDF ) Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu
2021/426 (PDF ) Generic Plaintext Equality and Inequality Proofs (Extended Version) Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Octavio Perez Kempner
2021/425 (PDF ) Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions Yuqing Zhao, Wenqi Yu, Chun Guo
2021/424 (PDF ) Security Analysis of SFrame Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu
2021/423 (PDF ) On effective computations in special subsemigroups of polynomial transformations and protocol based multivariate cryptosystems Vasyl Ustimenko
2021/422 (PDF ) Stacking Sigmas: A Framework to Compose $\Sigma$-Protocols for Disjunctions Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk
2021/421 (PDF ) Indistinguishability Obfuscation of Null Quantum Circuits and Applications James Bartusek, Giulio Malavolta
2021/420 (PDF ) Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52 Fabian Boemer, Sejun Kim, Gelila Seifu, Fillipe D. M. de Souza, Vinodh Gopal
2021/418 (PDF ) Ring-LWE over two-to-power cyclotomics is not hard Hao Chen
2021/417 (PDF ) History Binding Signature Shlomi Dolev, Matan Liber
2021/416 (PDF ) Cryptocurrencies with Security Policies and Two-Factor Authentication Florian Breuer, Vipul Goyal, Giulio Malavolta
2021/415 (PDF ) Efficient Verification of Optimized Code: Correct High-speed X25519 Marc Schoolderman, Jonathan Moerman, Sjaak Smetsers, Marko van Eekelen
2021/414 (PDF ) Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings Sook Yan Hue, Jason Chia, Ji-Jian Chin
2021/413 (PDF ) Blind Polynomial Evaluation and Data Trading Yi Liu, Qi Wang, Siu-Ming Yiu
2021/412 (PDF ) Unclonable Encryption, Revisited Prabhanjan Ananth, Fatih Kaleoglu
2021/411 (PDF ) Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions Onur Gunlu, Peter Trifonov, Muah Kim, Rafael F. Schaefer, Vladimir Sidorenko
2021/410 (PDF ) Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM Shlomi Dolev, Stav Doolman
2021/409 (PDF ) On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols Markulf Kohlweiss, Varun Madathil, Kartik Nayak, Alessandra Scafuro
2021/408 (PDF ) Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding Christian Majenz, Christian Schaffner, Mehrdad Tahmasbi
2021/407 (PDF ) Improved Quantum Algorithms for the k-XOR Problem André Schrottenloher
2021/406 (PDF ) Disappearing Cryptography in the Bounded Storage Model Jiaxin Guan, Mark Zhandry
2021/405 (PDF ) Revisiting some results on APN and algebraic immune functions Claude Carlet
2021/404 (PDF ) Chain Reductions for Multi-Signatures and the HBMS Scheme Mihir Bellare, Wei Dai
2021/403 (PDF ) Atom: A Stream Cipher with Double Key Filter Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar
2021/402 (PDF ) Leakage Resilient Value Comparison With Application to Message Authentication Christoph Dobraunig, Bart Mennink
2021/401 (PDF ) Output Prediction Attacks on Block Ciphers using Deep Learning Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi
2021/400 (PDF ) Size of IK00 Branching Program Yupu Hu, Xingting Dong, Baocang Wang
2021/399 (PDF ) Latus Incentive Scheme: Enabling Decentralization in Blockchains based on Recursive SNARKs Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
2021/398 (PDF ) Cryptanalysis of the Binary Permuted Kernel Problem Thales Bandiera Paiva, Routo Terada
2021/397 (PDF ) SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq Philipp G. Haselwarter, Exequiel Rivas, Antoine Van Muylder, Théo Winterhalter, Carmine Abate, Nikolaj Sidorenco, Catalin Hritcu, Kenji Maillard, Bas Spitters
2021/396 (PDF ) LESS-FM: Fine-tuning Signatures from the Code Equivalence Problem Alessandro Barenghi, Jean-Francois Biasse, Edoardo Persichetti, Paolo Santini
2021/395 (PDF ) On the Validity of Spoofing Attack Against Safe is the New Smart Harishma Boyapally, Urbi Chatterjee, Debdeep Mukhopadhyay
2021/394 (PDF ) Quantum Encryption with Certified Deletion: Public Key and Attribute-Based Ryo Nishimaki, Takashi Yamakawa
2021/393 (PDF ) Key Agreement with Correlated Noise and Multiple Entities or Enrollments Onur Gunlu
2021/392 (PDF ) How Private Are Commonly-Used Voting Rules? Ao Liu, Yun Lu, Lirong Xia, Vassilis Zikas
2021/391 (PDF ) New Standards for E-Voting Systems: Reflections on Source Code Examinations Thomas Haines, Peter Roenne
2021/390 (PDF ) Orthros: A Low-Latency PRF Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto
2021/389 (PDF ) Physically Related Functions: A New Paradigm for Light-weight Key-Exchange Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2021/388 (PDF ) Topology-Hiding Communication from Minimal Assumptions. Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, Tal Moran
2021/387 (PDF ) Quantum-access security of the Winternitz one-time signature scheme Christian Majenz, Chanelle Matadah Manfouo, Maris Ozols
2021/386 (PDF ) SAFELearn: Secure Aggregation for private FEderated Learning Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni
2021/385 (PDF ) Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices Yasufumi Hashimoto
2021/384 (PDF ) Analysis and Probing of Parallel Channels in the Lightning Network Alex Biryukov, Gleb Naumenko, Sergei Tikhomirov
2021/383 (PDF ) GLV+HWCD for 2y^2=x^3+x/GF(8^91+5) Daniel R. L. Brown
2021/382 (PDF ) Signatures with Tight Multi-User Security from Search Assumptions Jiaxin Pan, Magnus Ringerud
2021/380 (PDF ) Certificateless Designated Verifier Proxy Signature Cholun Kim
2021/379 (PDF ) A Note on the Bias of Rotational Differential-Linear Distinguishers Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu
2021/378 (PDF ) Multiparty Reusable Non-Interactive Secure Computation from LWE Fabrice Benhamouda, Aayush Jain, Ilan Komargodski, Huijia Lin
2021/377 (PDF ) Attacks and weaknesses of BLS aggregate signatures Nguyen Thoi Minh Quan
2021/376 (PDF ) On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds Nai-Hui Chia, Kai-Min Chung, Qipeng Liu, Takashi Yamakawa
2021/375 (PDF ) Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines Rafael Dowsley, Caleb Horst, Anderson C A Nascimento
2021/374 (PDF ) ZXAD: High-volume Attack Mitigation for Tor Akshaya Mani, Ian Goldberg
2021/373 (PDF ) T5: Hashing Five Inputs with Three Compression Calls Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi
2021/372 (PDF ) Explicit connections between supersingular isogeny graphs and Bruhat–Tits trees Laia Amorós, Annamaria Iezzi, Kristin Lauter, Chloe Martindale, Jana Sotáková
2021/371 (PDF ) Construction of minimal linear codes with few weights from weakly regular plateaued functions Ahmet Sinak
2021/370 (PDF ) Nova: Recursive Zero-Knowledge Arguments from Folding Schemes Abhiram Kothapalli, Srinath Setty, Ioanna Tzialla
2021/369 (PDF ) A Note on Algebraic Decomposition Method for Masked Implementation Shoichi Hirose
2021/368 (PDF ) Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE Aaron Hutchinson, Koray Karabina, Geovandro Pereira
2021/367 (PDF ) Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions Arnab Roy, Elena Andreeva, Jan Ferdinand Sauer
2021/366 (PDF ) Multiparty Computation with Covert Security and Public Verifiability Peter Scholl, Mark Simkin, Luisa Siniscalchi
2021/365 (PDF ) Updatable Signatures and Message Authentication Codes Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi
2021/364 (PDF ) RAGHAV: A new low power S-P network encryption design for resource constrained environment GAURAV BANSOD
2021/363 (PDF ) Information Leakages in Code-based Masking: A Unified Quantification Approach Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager
2021/362 (PDF ) Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning Zezhou Hou, Jiongjiong Ren, Shaozhen Chen
2021/361 (PDF ) Some New Constructions of Generalized Plateaued Functions Jiaxin Wang, Fang-Wei Fu
2021/360 (PDF ) An Architecture for Blockchain-based Cloud Banking Thuat Do
2021/359 (PDF ) Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice' Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
2021/358 (PDF ) Time- and Space-Efficient Arguments from Groups of Unknown Order Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
2021/357 (PDF ) AISY - Deep Learning-based Framework for Side-channel Analysis Guilherme Perin, Lichao Wu, Stjepan Picek
2021/356 (PDF ) Active Implementation of End-to-End Post-Quantum Encryption Anton Tutoveanu
2021/355 (PDF ) A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware Georg Land, Pascal Sasdrich, Tim Güneysu
2021/354 (PDF ) Efficient permutation protocol for MPC in the head Peeter Laud
2021/353 (PDF ) Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions Alonso González, Alexandros Zacharakis
2021/352 (PDF ) A Configurable Hardware Implementation of XMSS Jan Philipp Thoma, Tim Güneysu
2021/351 (PDF ) Practical Dynamic Group Signatures Without Knowledge Extractors Hyoseung Kim, Olivier Sanders, Michel Abdalla, Jong Hwan Park
2021/350 (PDF ) Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures Konstantinos Chalkias, Francois Garillot, Yashvanth Kondi, Valeria Nikolaenko
2021/349 (PDF ) Post-quantum Resettably-Sound Zero Knowledge Nir Bitansky, Michael Kellner, Omri Shmueli
2021/348 (PDF ) Decoding supercodes of Gabidulin codes and applications to cryptanalysis Maxime Bombar, Alain Couvreur
2021/347 (PDF ) Attacking (EC)DSA With Partially Known Multiples of Nonces Marios Adamoudis, Konstantinos A. Draziotis, Dimitrios Poulakis
2021/346 (PDF ) Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security Benny Applebaum, Eliran Kachlon, Arpita Patra
2021/345 (PDF ) Private Blocklist Lookups with Checklist Dmitry Kogan, Henry Corrigan-Gibbs
2021/344 (PDF ) Efficient and Universally Composable Single Secret Leader Election from Pairings Dario Catalano, Dario Fiore, Emanuele Giunta
2021/343 (PDF ) Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups Rishab Goyal, Jiahui Liu, Brent Waters
2021/342 (PDF ) MPCAuth: Multi-factor Authentication for Distributed-trust Systems Sijun Tan, Weikeng Chen, Ryan Deng, Raluca Ada Popa
2021/341 (PDF ) Clonable PUF: On the Design of PUFs That Share Equivalent Responses Takashi Sato, Yuki Tanaka, Song Bian
2021/340 (PDF ) Merkle Trees Optimized for Stateless Clients in Bitcoin Bolton Bailey, Suryanarayana Sankagiri
2021/339 (PDF ) Non-interactive distributed key generation and key resharing Jens Groth
2021/338 (PDF ) Lattice-Based Proof of Shuffle and Applications to Electronic Voting Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge
2021/337 (PDF ) Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud Systems Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo
2021/336 (PDF ) On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek
2021/335 (PDF ) Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3 Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2021/334 (PDF ) Post-Quantum Succinct Arguments: Breaking the Quantum Rewinding Barrier Alessandro Chiesa, Fermi Ma, Nicholas Spooner, Mark Zhandry
2021/333 (PDF ) Sumcheck Arguments and their Applications Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki
2021/332 (PDF ) An $\tilde{O}(\log^2 p)$ Approach to Point-Counting on Elliptic Curves From a Prominent Family Over the Prime Field $\mathbb{F}_p$ Yuri Borissov, Miroslav Markov
2021/331 (PDF ) A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications Radhakrishna Bhat, N R Sunitha, S S Iyengar
2021/330 (PDF ) The Key-Dependent Message Security of Key-Alternating Feistel Ciphers Pooya Farshim, Louiza Khati, Yannick Seurin, Damien Vergnaud
2021/329 (PDF ) Two Efficient and Regulatory Confidential Transaction Schemes Min Yang, Changtong Xu, Zhe Xia, Li Wang, Qingshu Meng
2021/328 (PDF ) Mixup Data Augmentation for Deep Learning Side-Channel Attacks Karim M. Abdellatif
2021/327 (PDF ) Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions Matteo Campanelli, Mathias Hall-Andersen
2021/326 (PDF ) Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox François Dupressoir, Konrad Kohbrok, Sabine Oechsner
2021/325 (PDF ) Spectrum: High-Bandwidth Anonymous Broadcast Zachary Newman, Sacha Servan-Schreiber, Srinivas Devadas
2021/324 (PDF ) Private AI: Machine Learning on Encrypted Data Kristin E. Lauter
2021/323 (PDF ) 0 Nguyen Thoi Minh Quan
2021/322 (PDF ) Rinocchio: SNARKs for Ring Arithmetic Chaya Ganesh, Anca Nitulescu, Eduardo Soria-Vazquez
2021/321 (PDF ) Abuse Resistant Law Enforcement Access Systems Matthew Green, Gabriel Kaptchuk, Gijs Van Laer
2021/320 (PDF ) Binding BIKE errors to a key pair Nir Drucker, Shay Gueron, Dusan Kostic
2021/319 (PDF ) Tradeoff attacks on symmetric ciphers Orhun Kara
2021/318 (PDF ) Oblivious TLS via Multi-Party Computation Damiano Abram, Ivan Damgård, Peter Scholl, Sven Trieflinger
2021/317 (PDF ) MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge Duong Tung Nguyen, Ni Trieu
2021/316 (PDF ) Reusable Two-Round MPC from LPN James Bartusek, Sanjam Garg, Akshayaram Srinivasan, Yinuo Zhang
2021/315 (PDF ) Faster homomorphic comparison operations for BGV and BFV Ilia Iliashenko, Vincent Zucca
2021/314 (PDF ) On Security Properties of All-or-nothing Transforms Navid Nasr Esfahani, Douglas R. Stinson
2021/313 (PDF ) Rank Estimation with Bounded Error via Exponential Sampling Liron David, Avishai Wool
2021/312 (PDF ) Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup Zhimin Luo, Mengce Zheng, Ping Wang, Minhui Jin, Jiajia Zhang, Honggang Hu
2021/311 (PDF ) Improved Neural Aided Statistical Attack for Cryptanalysis Yi Chen, Hongbo Yu
2021/310 (PDF ) A New Neural Distinguisher Considering Features Derived from Multiple Ciphertext Pairs Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan
2021/309 (PDF ) SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets Xingyu Meng, Kshitij Raj, Atul Prasad Deb Nath, Kanad Basu, Sandip Ray
2021/308 (PDF ) Threshold Garbled Circuits and Ad Hoc Secure Computation Michele Ciampi, Vipul Goyal, Rafail Ostrovsky
2021/307 (PDF ) A Compressed $\Sigma$-Protocol Theory for Lattices Thomas Attema, Ronald Cramer, Lisa Kohl
2021/306 (PDF ) Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2021/305 (PDF ) SoK: Game-based Security Models for Group Key Exchange Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila
2021/304 (PDF ) Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting Xavier Boyen, Thomas Haines, Johannes Mueller
2021/303 (PDF ) The More The Merrier: Reducing the Cost of Large Scale MPC S. Dov Gordon, Daniel Starin, Arkady Yerukhimovich
2021/302 (PDF ) Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphael Phan, Zhenfei Zhang
2021/301 (PDF ) Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of $j=0$ with the cost of one exponentiation in $\mathbb{F}_{\!q}$ Dmitrii Koshelev
2021/300 (PDF ) Invariants for EA- and CCZ-equivalence of APN and AB functions Nikolay Kaleyski
2021/299 (PDF ) HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David Mohaisen
2021/298 (PDF ) On extensions of the one-time-pad Bhupendra Singh, G. Athithan, Rajesh Pillai
2021/297 (PDF ) HashWires: Hyperefficient Credential-Based Range Proofs Konstantinos Chalkias, Shir Cohen, Kevin Lewi, Fredric Moezinia, Yolan Romailler
2021/296 (PDF ) Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
2021/295 (PDF ) Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design Michael Zuzak, Ankur Srivastava
2021/294 (PDF ) Code-based signatures without trapdoors through restricted vectors Marco Baldi, Franco Chiaraluce, Paolo Santini
2021/293 (PDF ) Thinking Outside the Superbox Nicolas Bordes, Joan Daemen, Daniël Kuijsters, Gilles Van Assche
2021/292 (PDF ) Quantum Collision Attacks on Reduced SHA-256 and SHA-512 Akinori Hosoyamada, Yu Sasaki
2021/291 (PDF ) Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2021/290 (PDF ) Dummy Shuffling against Algebraic Attacks in White-box Implementations Alex Biryukov, Aleksei Udovenko
2021/289 (PDF ) Reactive Key-Loss Protection in Blockchains Sam Blackshear, Konstantinos Chalkias, Panagiotis Chatzigiannis, Riyaz Faizullabhoy, Irakliy Khaburzaniya, Eleftherios Kokoris Kogias, Joshua Lind, David Wong, Tim Zakian
2021/288 (PDF ) Redeeming Reset Indifferentiability and Post-Quantum Groups Mark Zhandry
2021/287 (PDF ) A Deeper Look at Machine Learning-Based Cryptanalysis Adrien Benamira, David Gerault, Thomas Peyrin, Quan Quan Tan
2021/286 (PDF ) Fiat-Shamir via List-Recoverable Codes (or: Parallel Repetition of GMW is not Zero-Knowledge) Justin Holmgren, Alex Lombardi, Ron D. Rothblum
2021/285 (PDF ) Quadratic Secret Sharing and Conditional Disclosure of Secrets Amos Beimel, Hussien Othman, Naty Peter
2021/284 (PDF ) The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State
2021/283 (PDF ) P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange Carsten Baum, Bernardo David, Tore Frederiksen
2021/282 (PDF ) One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper
2021/281 (PDF ) Subquadratic SNARGs in the Random Oracle Model Alessandro Chiesa, Eylon Yogev
2021/280 (PDF ) Online-Extractability in the Quantum Random-Oracle Model Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
2021/279 (PDF ) Information-Set Decoding with Hints Anna-Lena Horlemann, Sven Puchinger, Julian Renner, Thomas Schamberger, Antonia Wachter-Zeh
2021/278 (PDF ) More Communication Lower Bounds for Information-Theoretic MPC Ivan Damgård, Boyang Li, Nikolaj I. Schwartzbach
2021/277 (PDF ) On the Integer Polynomial Learning with Errors Problem Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld
2021/276 (PDF ) Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography Amril Syalim, Takashi Nishide, Kouichi Sakurai
2021/275 (PDF ) Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher Zhengyuan Shi, Gangqiang Yang, Hailiang Xiong, Fudong Li, Honggang Hu
2021/274 (PDF ) Large Message Homomorphic Secret Sharing from DCR and Applications Lawrence Roy, Jaspal Singh
2021/273 (PDF ) On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu
2021/272 (PDF ) Isogeny-based key compression without pairings Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto
2021/271 (PDF ) On the CCA Compatibility of Public-Key Infrastructure Dakshita Khurana, Brent Waters
2021/270 (PDF ) PQC: R-Propping of a New Group-Based Digital Signature Pedro Hecht
2021/269 (PDF ) Steel: Composable Hardware-based Stateful and Randomised Functional Encryption Pramod Bhatotia, Markulf Kohlweiss, Lorenzo Martinico, Yiannis Tselekounis
2021/268 (PDF ) Revisiting Updatable Encryption: Controlled Forward Security, Constructions and a Puncturable Perspective Daniel Slamanig, Christoph Striecks
2021/267 (PDF ) Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields Christoph Dobraunig, Lorenzo Grassi, Anna Guinet, Daniël Kuijsters
2021/266 (PDF ) VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE Peter Rindal, Phillipp Schoppmann
2021/265 (PDF ) On the Hardness of Module-LWE with Binary Secret Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2021/264 (PDF ) FAST: Fair Auctions via Secret Transactions Bernardo David, Lorenzo Gentile, Mohsen Pourpouneh
2021/263 (PDF ) Non-Interactive Half-Aggregate Signatures Based on Module Lattices - A First Attempt Katharina Boudgoust, Adeline Roux-Langlois
2021/262 (PDF ) The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT Claudio Orlandi, Peter Scholl, Sophia Yakoubov
2021/261 (PDF ) MIRACLE: MIcRo-ArChitectural Leakage Evaluation Ben Marshall, Dan Page, James Webb
2021/260 (PDF ) A Geometric Approach to Homomorphic Secret Sharing Yuval Ishai, Russell W. F. Lai, Giulio Malavolta
2021/259 (PDF ) Fully projective radical isogenies in constant-time Jesús-Javier Chi-Domínguez, Krijn Reijnders
2021/258 (PDF ) Secure Wire Shuffling in the Probing Model Jean-Sebastien Coron, Lorenzo Spignoli
2021/256 (PDF ) Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer
2021/255 (PDF ) Low-Memory Algebraic Attacks on Round-Reduced LowMC Fukang Liu, Takanori Isobe, Willi Meier
2021/254 (PDF ) Multivariate Public Key Cryptosystem from Sidon Spaces Netanel Raviv, Ben Langton, Itzhak Tamo
2021/253 (PDF ) Improved single-round secure multiplication using regenerating codes Mark Abspoel, Ronald Cramer, Daniel Escudero, Ivan Damgård, Chaoping Xing
2021/252 (PDF ) A Resource Binding Approach to Logic Obfuscation Michael Zuzak, Yuntao Liu, Ankur Srivastava
2021/251 (PDF ) Generic Compiler for Publicly Verifiable Covert Multi-Party Computation Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2021/250 (PDF ) Key Agreement with Physical Unclonable Functions and Biometric Identifiers Onur Gunlu
2021/249 (PDF ) NeuroSCA: Evolving Activation Functions for Side-channel Analysis Karlo Knezevic, Juraj Fulir, Domagoj Jakobovic, Stjepan Picek
2021/248 (PDF ) Everlasting UC Commitments from Fully Malicious PUFs Bernardo Magri, Giulio Malavolta, Dominique Schröder, Dominique Unruh
2021/247 (PDF ) Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets David Knichel, Pascal Sasdrich, Amir Moradi
2021/246 (PDF ) Master-Key KDM-Secure ABE via Predicate Encoding Shengyuan Feng, Junqing Gong, Jie Chen
2021/245 (PDF ) On the Ideal Shortest Vector Problem over Random Rational Primes Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng
2021/244 (PDF ) Forward Secret Encrypted RAM: Lower Bounds and Applications Alexander Bienstock, Yevgeniy Dodis, Kevin Yeo
2021/243 (PDF ) Private Set Operations from Oblivious Switching Gayathri Garimella, Payman Mohassel, Mike Rosulek, Saeed Sadeghian, Jaspal Singh
2021/242 (PDF ) GAP: Born to Break Hiding Ju-Hwan Kim, Ji-Eun Woo, Soo-Jin Kim, So-Yeon Park, Dong-Guk Han
2021/241 (PDF ) On the Round Complexity of Fully Secure Solitary MPC with Honest Majority Saikrishna Badrinarayanan, Peihan Miao, Pratyay Mukherjee, Divya Ravi
2021/240 (PDF ) The Relationship Between Idealized Models Under Computationally Bounded Adversaries Mark Zhandry, Cong Zhang
2021/239 (PDF ) SoK: Auditability and Accountability in Distributed Payment Systems Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias
2021/238 (PDF ) Weak Tweak-Keys for the CRAFT Block Cipher Gregor Leander, Shahram Rasoolzadeh
2021/237 (PDF ) Post-quantum Security of OAEP Transform Ehsan Ebrahimi
2021/236 (PDF ) SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
2021/235 (PDF ) More Efficient Digital Signatures with Tight Multi-User Security Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
2021/234 (PDF ) New Public-Key Crypto-System EHT Alessandro Budroni, Igor Semaev
2021/233 (PDF ) Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers Inbar Kaslasi, Ron D. Rothblum, Prashant Nalini Vasudevan
2021/230 (PDF ) Subversion-Resilient Public Key Encryption with Practical Watchdogs Pascal Bemmann, Sebastian Berndt, Rongmao Chen, Tibor Jager
2021/229 (PDF ) Fast Boolean Queries with Minimized Leakage for Encrypted Databases in Cloud Computing Zhiqiang Wu, Kenli Li, Keqin Li, Jin Wang
2021/228 (PDF ) On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments Nils Fleischhacker, Mark Simkin
2021/227 (PDF ) Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks Qiqi Lai, Feng-Hao Liu, Zhedong Wang
2021/226 (PDF ) Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng
2021/225 (PDF ) Recovering or Testing Extended-Affine Equivalence Anne Canteaut, Alain Couvreur, Léo Perrin
2021/224 (PDF ) Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha Murilo Coutinho, T. C. Souza Neto
2021/223 (PDF ) Escaping from Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting Xinyu Li, Jing Xu, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang
2021/222 (PDF ) Quantum-safe HIBE: does it cost a Latte? Raymond K. Zhao, Sarah McCarthy, Ron Steinfeld, Amin Sakzad, Máire O’Neill
2021/221 (PDF ) The Direction of Updatable Encryption Does Matter Ryo Nishimaki
2021/220 (PDF ) A New Twofold Cornacchia-Type Algorithm Bei Wang, Yi Ouyang, Songsong Li, Honggang Hu
2021/219 (PDF ) Snarky Ceremonies Markulf Kohlweiss, Mary Maller, Janno Siim, Mikhail Volkhov
2021/218 (PDF ) SimS: a Simplification of SiGamal Tako Boris Fouotsa, Christophe Petit
2021/217 (PDF ) Verifiable Random Functions with Optimal Tightness David Niehues
2021/216 (PDF ) How to Meet Ternary LWE Keys Alexander May
2021/215 (PDF ) Limbo: Efficient Zero-knowledge MPCitH-based Arguments Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy
2021/214 (PDF ) Mesh Messaging in Large-scale Protests: Breaking Bridgefy Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková
2021/213 (PDF ) Accelerating the Search of Differential and Linear Characteristics with the SAT Method Ling Sun, Wei Wang, Meiqin Wang
2021/212 (PDF ) Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe
2021/211 (PDF ) GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy Bernardo David, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi
2021/210 (PDF ) YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov
2021/209 (PDF ) Sampling methods for cryptographic tests George Marinakis
2021/208 (PDF ) Secure Poisson Regression Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth
2021/207 (PDF ) Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank Daniele Cozzo, Nigel P. Smart, Younes Talibi Alaoui
2021/206 (PDF ) WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts Ádám Ficsór, Yuval Kogman, Lucas Ontivero, István András Seres
2021/205 (PDF ) Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup Tsz Hon Yuen, Handong Cui, Xiang Xie
2021/204 (PDF ) Revisiting Homomorphic Encryption Schemes for Finite Fields Andrey Kim, Yuriy Polyakov, Vincent Zucca
2021/203 (PDF ) Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing Tjerand Silde, Martin Strand
2021/202 (PDF ) Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices Martin R. Albrecht, Russell W. F. Lai
2021/201 (PDF ) DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security Hanshen Xiao, Srinivas Devadas
2021/200 (PDF ) Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols Sergiu Carpov, Kevin Deforth, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Jonathan Katz, Iraklis Leontiadis, M. Mohammadi, Abson Sae-Tang, Marius Vuille
2021/199 (PDF ) Generic, Efficient and Isochronous Gaussian Sampling over the Integers Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao
2021/198 (PDF ) Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs Tatsuki Ono, Song Bian, Takashi Sato
2021/197 (PDF ) Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA Guilherme Perin, Lichao Wu, Stjepan Picek
2021/196 (PDF ) QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model Xu Liu, Mingqiang Wang
2021/195 (PDF ) Compilation of Function Representations for Secure Computing Paradigms Karim Baghery, Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy
2021/194 (PDF ) Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun
2021/193 (PDF ) Multitarget decryption failure attacks and their application to Saber and Kyber Jan-Pieter D'Anvers, Senne Batsleer
2021/191 (PDF ) PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution Yaroslav Balytskyi, Manohar Raavi, Anatoliy Pinchuk, Sang-Yoon Chang
2021/190 (PDF ) Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen
2021/189 (PDF ) Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette Yunwen Liu, Siwei Sun, Chao Li
2021/188 (PDF ) Tight Security Bounds for Micali’s SNARGs Alessandro Chiesa, Eylon Yogev
2021/187 (PDF ) Weak Keys in Reduced AEGIS and Tiaoxin Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto
2021/186 (PDF ) Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
2021/185 (PDF ) No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms Hwajeong Seo, Pakize Sanal, Wai-Kong Lee, Reza Azarderakhsh
2021/184 (PDF ) Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter
2021/183 (PDF ) Efficient State Management in Distributed Ledgers Dimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias
2021/182 (PDF ) The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications István András Seres, Máté Horváth, Péter Burcsi
2021/181 (PDF ) Group Signatures with User-Controlled and Sequential Linkability Jesus Diaz, Anja Lehmann
2021/180 (PDF ) Unique Chain Rule and its Applications Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael Reiter
2021/179 (PDF ) Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis An Wang, Yuan Li, Yaoling Ding, Liehuang Zhu, Yongjuan Wang
2021/178 (PDF ) Attribute-Based Access Control for Inner Product Functional Encryption from LWE Tapas Pal, Ratna Dutta
2021/177 (PDF ) Generic Negation of Pair Encodings Miguel Ambrona
2021/176 (PDF ) Blitz: Secure Multi-Hop Payments Without Two-Phase Commits Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
2021/175 (PDF ) On the Relationships between Different Methods for Degree Evaluation (Full Version) Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang
2021/174 (PDF ) Smart Contracts for Incentivized Outsourcing of Computation Alptekin Küpçü, Reihaneh Safavi-Naini
2021/173 (PDF ) TensorCrypto Wai-Kong Lee, Hwajeong Seo, Zhenfei Zhang, Seongoun Hwang
2021/172 (PDF ) Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah
2021/171 (PDF ) Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Revisited Wei Yu, Guangwu Xu
2021/170 (PDF ) Fully Anonymous Group Signature with Verifier-Local Revocation Ai Kitagawa, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
2021/169 (PDF ) Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda
2021/168 (PDF ) Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS Xiaohan Zhang, Chi Cheng, Ruoyu Ding
2021/167 (PDF ) Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware Seetal Potluri, Aydin Aysu
2021/166 (PDF ) Cost Fairness for Blockchain-Based Two-Party Exchange Protocols Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab
2021/165 (PDF ) Composition with Knowledge Assumptions Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss
2021/164 (PDF ) Graph-Based Construction for Non-Malleable Codes Shohei Satake, Yujie Gu, Kouichi Sakurai
2021/163 (PDF ) CNF-FSS and its Applications Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky
2021/162 (PDF ) Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity (Revisiting space-based security in the adaptive setting) Giuseppe Ateniese, Long Chen, Danilo Francati, Dimitrios Papadopoulos, Qiang Tang
2021/160 (PDF ) Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance Tibor Jager, Rafael Kurek, David Niehues
2021/159 (PDF ) hbACSS: How to Robustly Share Many Secrets Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller
2021/158 (PDF ) Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate Nicolas Resch, Chen Yuan
2021/157 (PDF ) Sycon: A New Milestone in Designing ASCON-like Permutations Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo
2021/156 (PDF ) Mechanized Proofs of Adversarial Complexity and Application to Universal Composability Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub
2021/155 (PDF ) Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware James Howe, Marco Martinoli, Elisabeth Oswald, Francesco Regazzoni
2021/154 (PDF ) Generating cryptographically-strong random lattice bases and recognizing rotations of $\mathbb{Z}^n$ Tamar Lichter Blanks, Stephen D. Miller
2021/153 (PDF ) On the Isogeny Problem with Torsion Point Information Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz, Yan Bo Ti
2021/152 (PDF ) Hybrid Dual Attack on LWE with Arbitrary Secrets Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang
2021/151 (PDF ) On Sufficient Oracles for Secure Computation with Identifiable Abort Mark Simkin, Luisa Siniscalchi, Sophia Yakoubov
2021/150 (PDF ) Two-Party Adaptor Signatures From Identification Schemes Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi
2021/149 (PDF ) Quantum Security of the Legendre PRF Paul Frixons, André Schrottenloher
2021/148 (PDF ) On methods of shortening ElGamal-type signatures Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Stanislav Smyshlyaev
2021/147 (PDF ) IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols Greg Morrisett, Elaine Shi, Kristina Sojakova, Xiong Fan, Joshua Gancher
2021/146 (PDF ) Securely Computing Piecewise Constant Codes Benjamin E. Diamond
2021/145 (PDF ) A Security Framework for Distributed Ledgers Mike Graf, Daniel Rausch, Viktoria Ronge, Christoph Egger, Ralf Küsters, Dominique Schröder
2021/144 (PDF ) \(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari
2021/143 (PDF ) On Bitcoin Cash’s Target Recalculation Functions Juan Garay, Yu Shen
2021/142 (PDF ) Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication Muah Kim, Onur Gunlu, Rafael F. Schaefer
2021/141 (PDF ) Advanced Lattice Sieving on GPUs, with Tensor Cores Léo Ducas, Marc Stevens, Wessel van Woerden
2021/140 (PDF ) Practical and Scalable Access Control Mechanism for the Internet of Things using Time-bound Attribute-based Encryption Clémentine Gritti, Emanuel Regnath, Sebastian Steinhorst
2021/139 (PDF ) Order-Fair Consensus in the Permissionless Setting Mahimna Kelkar, Soubhik Deb, Sreeram Kannan
2021/138 (PDF ) Classic McEliece Implementation with Low Memory Footprint Johannes Roth, Evangelos Karatsiolis, Juliane Krämer
2021/137 (PDF ) Cryptographic Security of the MLS RFC, Draft 11 Chris Brzuska, Eric Cornelissen, Konrad Kohbrok
2021/136 (PDF ) An approach for designing fast public key encryption systems using white-box cryptography techniques Dmitry Schelkunov
2021/135 (PDF ) Acyclicity Programming for Sigma-Protocols Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
2021/134 (PDF ) Cryptanalysis of a code-based signature scheme without trapdoors Marco Baldi, Jean-Christophe Deneuville, Edoardo Persichetti, Paolo Santini
2021/133 (PDF ) smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption Ravital Solomon, Rick Weber, Ghada Almashaqbeh
2021/132 (PDF ) Privacy-Preserving Feature Selection with Secure Multiparty Computation Xiling Li, Rafael Dowsley, Martine De Cock
2021/131 (PDF ) Privacy-Preserving Video Classification with Convolutional Neural Networks Sikha Pentyala, Rafael Dowsley, Martine De Cock
2021/130 (PDF ) Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves Bei Wang, Songsong Li, Yi Ouyang, Honggang Hu
2021/129 (PDF ) Lattice-based weak curve fault attack on ECDSA Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei
2021/128 (PDF ) Designing Tweakable Enciphering Schemes Using Public Permutations Debrup Chakraborty, Avijit Dutta, Samir Kundu
2021/127 (PDF ) Cuproof: A Novel Range Proof with Constant Size Cong Deng, Xianghong Tang, Lin You, Gengran Hu, Shuhong Gao
2021/126 (PDF ) Observer Attack on Stream Ciphers Ramachandran Anantharaman, Virendra Sule
2021/125 (PDF ) Privacy Preserving and Resilient RPKI Kris Shrishak, Haya Shulman
2021/124 (PDF ) Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption Ozgun Ozerk, Can Elgezen, Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
2021/123 (PDF ) A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding
2021/122 (PDF ) PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection Aner Ben Efraim, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky
2021/121 (PDF ) BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits Yaron Gvili, Sarah Scheffler, Mayank Varia
2021/120 (PDF ) Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits Aner Ben-Efraim, Kelong Cong, Eran Omri, Emmanuela Orsini, Nigel P. Smart, Eduardo Soria-Vazquez
2021/119 (PDF ) Rabbit: Efficient Comparison for Secure Multi-Party Computation Eleftheria Makri, Dragos Rotaru, Frederik Vercauteren, Sameer Wagh
2021/118 (PDF ) High-Threshold AVSS with Optimal Communication Complexity Nicolas Alhaddad, Mayank Varia, Haibin Zhang
2021/117 (PDF ) FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
2021/116 (PDF ) MAKE: a Matrix Action Key Exchange Nael Rahman, Vladimir Shpilrain
2021/115 (PDF ) Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4 Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani
2021/114 (PDF ) Security Analysis of CPace Michel Abdalla, Björn Haase, Julia Hesse
2021/113 (PDF ) Improvement of Secure Multi-Party Multiplication of (k,n) Threshold Secret Sharing Using Only N=k Servers (Revised Version) Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
2021/111 (PDF ) A note on Post Quantum Onion Routing Kelesidis Evgnosia-Alexandra
2021/110 (PDF ) Replacing Probability Distributions in Security Games via Hellinger Distance Kenji Yasunaga
2021/109 (PDF ) Sequential Logic Encryption Against Model Checking Attack Amin Rezaei, Hai Zhou
2021/108 (PDF ) Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Petr Cibik, Patrik Dobias
2021/107 (PDF ) A Decentralized and Encrypted National Gun Registry Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin
2021/106 (PDF ) MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers Aram Jivanyan, Jesse Lancaster, Arash Afshar, Parnian Alimi
2021/105 (PDF ) A New Efficient Identity-Based Encryption Without Pairing Majid Salimi
2021/104 (PDF ) Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz, Thomas Pöppelmann, Michiel Van Beirendonck
2021/103 (PDF ) OAE-RUP: A Strong Online AEAD Security Notion and its Application to SAEF Amit Singh Bhati, Elena Andreeva, Damian Vizar
2021/102 (PDF ) A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization Madalina Chirita, Alexandru-Mihai Stroie, Andrei-Daniel Safta, Emil Simion
2021/101 (PDF ) Combined Fault and DPA Protection for Lattice-Based Cryptography Daniel Heinz, Thomas Pöppelmann
2021/100 (PDF ) SPURT: Scalable Distributed Randomness Beacon with Transparent Setup Sourav Das, Vinith Krishnan, Irene Miriam Isaac, Ling Ren
2021/099 (PDF ) Property Inference from Poisoning Melissa Chase, Esha Ghosh, Saeed Mahloujifar
2021/098 (PDF ) Image sets of perfectly nonlinear maps Lukas Kölsch, Björn Kriepke, Gohar Kyureghyan
2021/097 (PDF ) A New and Improved Reduction Proof of Cascade PRF Mridul Nandi
2021/096 (PDF ) Gladius: LWR based efficient hybrid public key encryption with distributed decryption Kelong Cong, Daniele Cozzo, Varun Maram, Nigel P. Smart
2021/095 (PDF ) Collusion-Deterrent Threshold Information Escrow Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas, Aniket Kate
2021/094 (PDF ) Reducing HSM Reliance in Payments through Proxy Re-Encryption Sivanarayana Gaddam, Atul Luykx, Rohit Sinha, Gaven Watson
2021/093 (PDF ) Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
2021/092 (PDF ) New Public Key Cryptosystem (First Version) Dieaa I. Nassr, M. Anwar, Hatem M. Bahig
2021/091 (PDF ) Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks Ilaria Chillotti, Marc Joye, Pascal Paillier
2021/090 (PDF ) A New Twofold Cornacchia-Type Algorithm and Its Applications Bei Wang, Yi Ouyang, Honggang Hu, Songsong Li
2021/089 (PDF ) Fuzzy Message Detection Gabrielle Beck, Julia Len, Ian Miers, Matthew Green
2021/088 (PDF ) An Overview of the Hybrid Argument Marc Fischlin, Arno Mittelbach
2021/087 (PDF ) ZEN: An Optimizing Compiler for Verifiable, Zero-Knowledge Neural Network Inferences Boyuan Feng, Lianke Qin, Zhenfei Zhang, Yufei Ding, Shumo Chu
2021/086 (PDF ) On Elapsed Time Consensus Protocols Mic Bowman, Debajyoti Das, Avradip Mandal, Hart Montgomery
2021/085 (PDF ) Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves Suhri Kim
2021/084 (PDF ) Ariadne Thread and Pepper: New Multivariate Cryptographic Schemes with Public Keys in Degree 3 Gilles Macario-Rat, Jacques Patarin
2021/083 (PDF ) The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol Michael Troncoso, Britta Hale
2021/082 (PDF ) Grades of Trust in Multiparty Computation Jaskaran V. Singh, Nicholas Hopper
2021/081 (PDF ) Private Stream Aggregation from Labeled Secret Sharing Schemes Hendrik Waldner, Tilen Marc, Miha Stopar, Michel Abdalla
2021/080 (PDF ) Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption Jan-Pieter D'Anvers, Emmanuela Orsini, Frederik Vercauteren
2021/079 (PDF ) A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson
2021/078 (PDF ) An Incentive-Compatible Smart Contract for Decentralized Commerce Nikolaj I. Schwartzbach
2021/077 (PDF ) Magnetic RSA Rémi Géraud-Stewart, David Naccache
2021/076 (PDF ) QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field Kang Yang, Pratik Sarkar, Chenkai Weng, Xiao Wang
2021/075 (PDF ) A Generalization of the Subfield Construction Kamil Otal
2021/074 (PDF ) Cross-Domain Attribute-Based Access Control Encryption Mahdi Sedaghat, Bart Preneel
2021/073 (PDF ) Application of Velusqrt algorithm to Huff's and general Huff's curves Michał Wroński
2021/072 (PDF ) Toward Practical Autoencoder-based Side-Channel Analysis Evaluations Servio Paguada, Lejla Batina, Igor Armendariz
2021/071 (PDF ) Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek
2021/070 (PDF ) Secure, Accurate, and Practical Narrow-Band Ranging System Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann
2021/069 (PDF ) Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation Amanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha
2021/068 (PDF ) Banquet: Short and Fast Signatures from AES Carsten Baum, Cyprien Delpech de Saint Guilhem, Daniel Kales, Emmanuela Orsini, Peter Scholl, Greg Zaverucha
2021/067 (PDF ) Analysis and Comparison of Table-based Arithmetic to Boolean Masking Michiel Van Beirendonck, Jan-Pieter D’Anvers, Ingrid Verbauwhede
2021/066 (PDF ) A Deep Learning Approach for Active S-box Prediction of Lightweight Generalized Feistel Block Ciphers Mohamed Fadl Idris, Je Sen Teh, Jasy Liew Suet Yan, Wei-Zhu Yeoh
2021/065 (PDF ) FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves Dorin-Marian Ionita, Emil Simion
2021/064 (PDF ) Fault Attacks on CCA-secure Lattice KEMs Peter Pessl, Lukas Prokop
2021/063 (PDF ) CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing Monir Azraoui, Solenn Brunet, Sébastien Canard, Aïda Diop, Lélia Eveillard, Alicia Filipiak, Adel Hamdi, Flavie Misarsky, Donald Nokam Kuate, Marie Paindavoine, Quentin Santos, Bastien Vialla
2021/062 (PDF ) Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3) Dominique Unruh
2021/061 (PDF ) A Note on IBE Performance of a Practical Application Ştefan Maftei, Marius Supuran, Emil Simion
2021/060 (PDF ) UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled
2021/059 (PDF ) The Cost of Adaptivity in Security Games on Graphs Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
2021/058 (PDF ) A Performance Study of Crypto-Hardware in the Low-end IoT Peter Kietzmann, Lena Boeckmann, Leandro Lanzieri, Thomas C. Schmidt, Matthias Wählisch
2021/056 (PDF ) The Study of Modulo $2^n$ Zhongfeng Niu
2021/055 (PDF ) Tech Report: Inerial HSMs Thwart Advanced Physical Attacks Jan Sebastian Götte, Björn Scheuermann
2021/054 (PDF ) The Cost of IEEE Arithmetic in Secure Computation David W. Archer, Shahla Atapoor, Nigel P. Smart
2021/053 (PDF ) On Algebraic Embedding for Unstructured Lattices Madalina Bolboceanu, Zvika Brakerski, Devika Sharma
2021/052 (PDF ) Elementary Attestation of Cryptographically Useful Composite Moduli Rémi Géraud-Stewart, David Naccache
2021/051 (PDF ) How Much can F5 Really Do Jintai Ding, Zheng Zhang, Joshua Deaton
2021/050 (PDF ) The Distinguishing Attack on HFE Joshua Deaton, Jintai Ding
2021/049 (PDF ) ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process Mark D. Aagaard, Nusa Zidaric
2021/048 (PDF ) Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park
2021/047 (PDF ) Evolution of Bulletin Board & its application to E-Voting – A Survey Misni Harjo Suwito, Yoshifumi Ueshige, Kouichi Sakurai
2021/046 (PDF ) Efficient Lattice-Based Inner-Product Functional Encryption Jose Maria Bermudo Mera, Angshuman Karmakar, Tilen Marc, Azam Soleimanian
2021/045 (PDF ) Banners: Binarized Neural Networks with Replicated Secret Sharing Alberto Ibarrondo, Hervé Chabanne, Melek Önen
2021/044 (PDF ) Addra: Metadata-private voice communication over fully untrusted infrastructure Ishtiyaque Ahmad, Yuntian Yang, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
2021/043 (PDF ) Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields Madhurima Mukhopadhyay, Palash Sarkar
2021/042 (PDF ) Correcting Subverted Random Oracles Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu
2021/041 (PDF ) Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff, Md Mahbub Alam
2021/040 (PDF ) On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product Any Muanalifah, Serge˘ı Sergeev
2021/039 (PDF ) Practical FHE parameters against lattice attacks Jung Hee Cheon, Yongha Son, Donggeon Yhee
2021/038 (PDF ) Streaming Merkle Proofs within Binary Numeral Trees Luke Champine
2021/037 (PDF ) New First-Order Secure AES Performance Records Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi
2021/036 (PDF ) The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration Niluka Amarasinghe, Xavier Boyen, Matthew McKague
2021/035 (PDF ) Sketches for Blockchains Ori Rottenstreich
2021/034 (PDF ) Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF Nishanth Chandran, Divya Gupta, Akash Shah
2021/033 (PDF ) Quantum-resistant Anonymous IBE with Traceable Identities Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2021/032 (PDF ) Experimental relativistic zero-knowledge proofs Pouriya Alikhani, Nicolas Brunner, Claude Crépeau, Sébastien Designolle, Raphaël Houlmann, Weixu Shi, Hugo Zbinden
2021/031 (PDF ) A Comparative Study of Cryptographic Key Distribution Protocols Alexandru-Ștefan Gheorghieș, Darius-Marian Lăzăroi, Emil Simion
2021/030 (PDF ) Linear-time and post-quantum zero-knowledge SNARKs for R1CS Jonathan Lee, Srinath Setty, Justin Thaler, Riad Wahby
2021/029 (PDF ) EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs Thomas Schneider, Oleksandr Tkachenko
2021/028 (PDF ) A Side Journey to Titan Victor LOMNE, Thomas ROCHE
2021/027 (PDF ) E-voting protocols in context of COVID19 Sfirnaciuc Emilia, Vasilescu Miruna-Elena, Simion Emil
2021/026 (PDF ) A Gapless Code-Based Hash Proof System based on RQC and its Applications Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Yann Connan, Philippe Gaborit
2021/025 (PDF ) FLAME: Taming Backdoors in Federated Learning Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
2021/024 (PDF ) PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System Pedro Hecht
2021/023 (PDF ) What is Meant by Permissionless Blockchains? Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Andreas Kern, Walid Fdhila
2021/022 (PDF ) Increasing Precision of Division Property Patrick Derbez, Pierre-Alain Fouque
2021/021 (PDF ) Fake Near Collisions Attacks Patrick Derbez, Pierre-Alain Fouque, Victor Mollimard
2021/020 (PDF ) Catching the Fastest Boomerangs - Application to SKINNY Stéphanie Delaune, Patrick Derbez, Mathieu Vavrille
2021/019 (PDF ) Kummer versus Montgomery Face-off over Prime Order Fields Kaushik Nath, Palash Sarkar
2021/018 (PDF ) Comments on ``On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment'' Yuhao Yang, Xiujie Huang
2021/017 (PDF ) Lightweight Techniques for Private Heavy Hitters Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
2021/016 (PDF ) Black-Box Uselessness: Composing Separations in Cryptography Geoffroy Couteau, Pooya Farshim, Mohammad Mahmoody
2021/015 (PDF ) SoK: Remote Power Analysis Macarena C. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, Billy Bob Brumley
2021/013 (PDF ) An atlas of the Richelot isogeny graph Enric Florit, Benjamin Smith
2021/012 (PDF ) Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph Enric Florit, Benjamin Smith
2021/011 (PDF ) Complete solution over $\GF{p^n}$ of the equation $X^{p^k+1}+X+a=0$ Kwang Ho Kim, Jong Hyok Choe, Sihem Mesnager
2021/010 (PDF ) Compcrypt -- Lightweight ANS-based Compression and Encryption Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk
2021/009 (PDF ) Demand-aware Channel Topologies for Off-chain Blockchain Payments Julia Khamis, Ori Rottenstreich
2021/008 (PDF ) A Family of Nonlinear MDS Diffusion Layers over $\mathbb{F}_{2^{4n}}$ M. R. Mirzaee Shamsabad, S. M. Dehnavi
2021/007 (PDF ) Notes on a lattice-based proxy-oriented identity-based encryption with keyword search Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Cheng-Yi Lee
2021/006 (PDF ) Privacy-Preserving Privacy Profile Proposal Protocol Wyatt Howe, Andrei Lapets
2021/005 (PDF ) Aggregatable Distributed Key Generation Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu
2021/004 (PDF ) LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions Ismail San
2021/003 (PDF ) Ciphertext Policy Attribute Based Encryption for Arithmetic circuits Mahdi Mahdavi Oliaee, Zahra Ahmadian
2021/002 (PDF ) Can Lattice Signature be as Efficient as Lattice Encryption? Dingfeng Ye
2021/001 (PDF ) 2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product Michel Abdalla, David Pointcheval, Azam Soleimanian
[ Cryptology ePrint archive ]