Cryptology ePrint Archive: Listing for 2022
Regex
2022/1781 (PDF ) COA-Secure Obfuscation and Applications Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishanth Kumar, Oxana Poburinnaya, Manoj Prabhakaran
2022/1779 (PDF ) Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators Shravan Srinivasan, Ioanna Karantaidou, Foteini Baldimtsi, Charalampos Papamanthou
2022/1778 (PDF ) Asynchronous Delegated Private Set Intersection with Hiding of Intersection Size Wyatt Howe, Andrei Lapets, Frederick Jansen, Tanner Braun, Ben Getchell
2022/1777 (PDF ) Weightwise perfectly balanced functions and nonlinearity Agnese Gini, Pierrick Méaux
2022/1776 (PDF ) Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
2022/1775 (PDF ) Candidate Trapdoor Claw-Free Functions from Group Actions with Applications to Quantum Protocols Navid Alamati, Giulio Malavolta, Ahmadreza Rahimi
2022/1774 (PDF ) PECO: methods to enhance the privacy of DECO protocol Manuel B. Santos
2022/1773 (PDF ) SoK: Decentralized Finance (DeFi) Attacks Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais
2022/1772 (PDF ) You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature Min Zhang, Binbin Tu, Yu Chen
2022/1771 (PDF ) Security analysis for BIKE, Classic McEliece and HQC against the quantum ISD algorithms Asuka Wakasugi, Mitsuru Tada
2022/1770 (PDF ) Cryptographic Primitives with Hinting Property Navid Alamati, Sikhar Patranabis
2022/1769 (PDF ) PoRt: Non-Interactive Continuous Availability Proof of Replicated Storage Reyhaneh Rabaninejad, Bin Liu, Antonis Michalas
2022/1768 (PDF ) Continuous Group Key Agreement with Flexible Authorization and Its Applications Kaisei Kajita, Keita Emura, Kazuto Ogawa, Ryo Nojima, Go Ohtake
2022/1767 (PDF ) Do Not Trust in Numbers: Practical Distributed Cryptography With General Trust Orestis Alpos, Christian Cachin
2022/1766 (PDF ) Systematically Quantifying Cryptanalytic Non-Linearities in Strong PUFs Durba Chatterjee, Kuheli Pratihar, Aritra Hazra, Ulrich Rührmair, Debdeep Mukhopadhyay
2022/1764 (PDF ) Wi-Fi Security: Do We Still Have to Look Back? Karim Lounis
2022/1763 (PDF ) cq: Cached quotients for fast lookups Liam Eagen, Dario Fiore, Ariel Gabizon
2022/1762 (PDF ) On the Impossibility of Surviving (Iterated) Deletion of Weakly Dominated Strategies in Rational MPC Johannes Blömer, Jan Bobolz, Henrik Bröcher
2022/1761 (PDF ) A Family of Block Ciphers Based on Multiple Quasigroups Umesh Kumar, V. Ch. Venkaiah
2022/1760 (PDF ) Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation Rachit Garg, Kristin Sheridan, Brent Waters, David J. Wu
2022/1759 (PDF ) Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern
2022/1758 (PDF ) SuperNova: Proving universal machine executions without universal circuits Abhiram Kothapalli, Srinath Setty
2022/1757 (PDF ) An Injectivity Analysis of CRYSTALS-Kyber and Implications on Quantum Security Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld
2022/1756 (PDF ) CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments Behzad Abdolmaleki, Daniel Slamanig
2022/1755 (PDF ) Towards Secure Evaluation of Online Functionalities (Corrected and Extended Version) Andreas Klinger, Ulrike Meyer
2022/1754 (PDF ) An SVP attack on Vortex zhenfei zhang
2022/1753 (PDF ) DSKE: Digital Signatures with Key Extraction Zhipeng Wang, Orestis Alpos, Alireza Kavousi, Harry W. H. Wong, Sze Yiu Chau, Duc V. Le, Christian Cachin
2022/1752 (PDF ) IsoLock: Thwarting Link-Prediction Attacks on Routing Obfuscation by Graph Isomorphism Shaza Elsharief, Lilas Alrahis, Johann Knechtel, Ozgur Sinanoglu
2022/1751 (PDF ) Pseudorandomness of Decoding, Revisited: Adapting OHCP to Code-Based Cryptography Maxime Bombar, Alain Couvreur, Thomas Debris-Alazard
2022/1750 (PDF ) Assessing the Impact of a Variant of MATZOV's Dual Attack on Kyber Kevin Carrier, Charles Meyer-Hilfiger, Yixin Shen, Jean-Pierre Tillich
2022/1749 (PDF ) Computational Hardness of the Permuted Kernel and Subcode Equivalence Problems Paolo Santini, Marco Baldi, Franco Chiaraluce
2022/1748 (PDF ) RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol (Long version) Pascal Lafourcade, Gael Marcadet, Léo Robert
2022/1747 (PDF ) Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation Adithya Vadapalli, Ryan Henry, Ian Goldberg
2022/1746 (PDF ) Clipaha: A Scheme to Perform Password Stretching on the Client Francisco Blas Izquierdo Riera, Magnus Almgren, Pablo Picazo-Sanchez, Christian Rohner
2022/1745 (PDF ) Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
2022/1744 (PDF ) Worst and Average Case Hardness of Decoding via Smoothing Bounds Thomas Debris-Alazard, Nicolas Resch
2022/1743 (PDF ) Ring Signatures with User-Controlled Linkability Dario Fiore, Lydia Garms, Dimitris Kolonelos, Claudio Soriente, Ida Tucker
2022/1742 (PDF ) A Simple Noncommutative UOV Scheme Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, Chun-Yen Chou
2022/1741 (PDF ) Demystifying the comments made on “A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors” Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/1740 (PDF ) A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu
2022/1739 (PDF ) On blindness of several ElGamal-type blind signatures Alexandra Babueva, Liliya Akhmetzyanova, Evgeny Alekseev, Oleg Taraskin
2022/1738 (PDF ) Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert
2022/1737 (PDF ) Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis Azade Rezaeezade, Lejla Batina
2022/1736 (PDF ) An algorithm for efficient detection of $(N,N)$-splittings and its application to the isogeny problem in dimension 2 Maria Corte-Real Santos, Craig Costello, Sam Frengley
2022/1735 (PDF ) BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oğuzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen
2022/1734 (PDF ) Mind Your Path: On (Key) Dependencies in Differential Characteristics Thomas Peyrin, Quan Quan Tan
2022/1733 (PDF ) New and Improved Constructions for Partially Equivocable Public Key Encryption Benoît Libert, Alain Passelègue, Mahshid Riahinia
2022/1732 (PDF ) TreeSync: Authenticated Group Management for Messaging Layer Security Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan
2022/1731 (PDF ) Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds Reham Almukhlifi, Poorvi Vora
2022/1730 (PDF ) Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in Practice Andrew Fregly, Joseph Harvey, Burton S. Kaliski Jr., Swapneel Sheth
2022/1729 (PDF ) Acsesor: A New Framework for Auditable Custodial Secret Storage and Recovery Melissa Chase, Hannah Davis, Esha Ghosh, Kim Laine
2022/1728 (PDF ) Efficient Zero Knowledge Arguments for Bilinear Matrix Relations over Finite Fields and Knowledge-Soundness Enhancement via Operations over Extended Field Yuan Tian
2022/1727 (PDF ) Find Thy Neighbourhood: Privacy-Preserving Local Clustering Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2022/1726 (PDF ) Optimization for SPHINCS+ using Intel Secure Hash Algorithm Extensions Thomas Hanson, Qian Wang, Santosh Ghosh, Fernando Virdia, Anne Reinders, Manoj R. Sastry
2022/1725 (PDF ) A note on SPHINCS+ parameter sets Stefan Kölbl, Jade Philipoom
2022/1724 (PDF ) Formal Analysis of SPDM: Security Protocol and Data Model version 1.2 Cas Cremers, Alexander Dax, Aurora Naska
2022/1723 (PDF ) Asymptotically Optimal Message Dissemination with Applications to Blockchains Chen-Da Liu-Zhang, Christian Matt, Søren Eller Thomsen
2022/1722 (PDF ) On Side-Channel and CVO Attacks against TFHE and FHEW Michael Walter
2022/1721 (PDF ) Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei
2022/1720 (PDF ) Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, Amir Moradi, Christof Paar
2022/1719 (PDF ) Two-Round Concurrent 2PC from Sub-Exponential LWE Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, Amit Sahai
2022/1718 (PDF ) Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan
2022/1717 (PDF ) Scaling Blockchain-Based Tokens with Joint Cryptographic Accumulators Trevor Miller
2022/1716 (PDF ) Area-time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications Safiullah Khan, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Abdul Majeed, Seong Oun Hwang
2022/1715 (PDF ) An Algebraic Attack Against McEliece-like Cryptosystems Based on BCH Codes Freja Elbro, Christian Majenz
2022/1714 (PDF ) Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang
2022/1713 (PDF ) Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste Elena Dubrova, Kalle Ngo, Joel Gärtner
2022/1712 (PDF ) KEMTLS vs. Post-Quantum TLS: Performance On Embedded Systems Ruben Gonzalez, Thom Wiggers
2022/1711 (PDF ) Nonce- and Redundancy-encrypting Modes with Farfalle Seth Hoffert
2022/1710 (PDF ) Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations Cas Cremers, Charlie Jacomme, Aurora Naska
2022/1709 (PDF ) Dory: Faster Asynchronous BFT with Reduced Communication for Permissioned Blockchains Zongyang Zhang, You Zhou, Sisi Duan, Haibin Zhang, Bin Hu, Licheng Wang, Jianwei Liu
2022/1708 (PDF ) Expert Mental Models of SSI Systems and Implications for End-User Understanding Alexandra Mai
2022/1707 (PDF ) Private Access Control for Function Secret Sharing Sacha Servan-Schreiber, Simon Beyzerov, Eli Yablon, Hyojae Park
2022/1706 (PDF ) Optimized Implementation of Encapsulation and Decapsulation of Classic McEliece on ARMv8 Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Hyunjun Kim, Hwajeong Seo
2022/1705 (PDF ) Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol Felix Günther, Marc Ilunga Tshibumbu Mukendi
2022/1704 (PDF ) Some applications of higher dimensional isogenies to elliptic curves (overview of results) Damien Robert
2022/1703 (PDF ) Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE Wei-Kai Lin, Ethan Mook, Daniel Wichs
2022/1702 (PDF ) SCB Mode: Semantically Secure Length-Preserving Encryption Fabio Banfi
2022/1701 (PDF ) On Zero-Knowledge Proofs over the Quantum Internet Mark Carney
2022/1699 (PDF ) SoK: Use of Cryptography in Malware Obfuscation Hassan Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia
2022/1698 (PDF ) Digital Signature from Syndrome Decoding Problem Abdelhaliem Babiker
2022/1697 (PDF ) RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham
2022/1696 (PDF ) Post-Quantum Anonymity of Kyber Varun Maram, Keita Xagawa
2022/1695 (PDF ) ELSA: Secure Aggregation for Federated Learning with Malicious Actors Mayank Rathee, Conghao Shen, Sameer Wagh, Raluca Ada Popa
2022/1694 (PDF ) Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion Operations George Teseleanu
2022/1693 (PDF ) More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model Kyoichi Asano, Keita Emura, Atsushi Takayasu
2022/1692 (PDF ) Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber Linus Backlund, Kalle Ngo, Joel Gärtner, Elena Dubrova
2022/1691 (PDF ) TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation Cas Cremers, Gal Horowitz, Charlie Jacomme, Eyal Ronen
2022/1690 (PDF ) LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta, Mert Yassi, Raymond K. Zhao
2022/1689 (PDF ) Efficient Zero-Knowledge Arguments for Some Matrix Relations over Ring and Non-malleable Enhancement Yuan Tian
2022/1688 (PDF ) Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation Alberto Ibarrondo, Hervé Chabanne, Melek Önen
2022/1687 (PDF ) Stronger Security and Generic Constructions for Adaptor Signatures Wei Dai, Tatsuaki Okamoto, Go Yamamoto
2022/1686 (PDF ) Practical Quantum-Safe Voting from Lattices, Extended Ian Black, Emma McFall, Juliet Whidden, Bryant Xie, Ryann Cartor
2022/1685 (PDF ) CoRA: Collaborative Risk-Aware Authentication Mastooreh Salajegheh, Shashank Agrawal, Maliheh Shirvanian, Mihai Christodorescu, Payman Mohassel
2022/1684 (PDF ) Division in the Plactic Monoid Chris Monico
2022/1683 (PDF ) Powers of Tau in Asynchrony Sourav Das, Zhuolun Xiang, Ling Ren
2022/1682 (PDF ) Interactive Authentication Deepak Maram, Mahimna Kelkar, Ittay Eyal
2022/1681 (PDF ) Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Aikata, Sujoy Sinha Roy
2022/1680 (PDF ) Authenticated Encryption with Key Identification Julia Len, Paul Grubbs, Thomas Ristenpart
2022/1679 (PDF ) Integer Polynomial Recovery from Outputs and its Application to Cryptanalysis of a Protocol for Secure Sorting Srinivas Vivek, Shyam Murthy, Deepak Kumaraswamy
2022/1678 (PDF ) Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu
2022/1677 (PDF ) Quagmire ciphers and group theory: What is a Porta cipher? Thomas Kaeding
2022/1676 (PDF ) Concurrently Secure Blind Schnorr Signatures Georg Fuchsbauer, Mathias Wolf
2022/1675 (PDF ) SoK: Assisted Fault Simulation - Existing Challenges and Opportunities Offered by AI Asmita Adhikary, Ileana Buhan
2022/1674 (PDF ) Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Aggregation (preliminary work) Alberto Pedrouzo-Ulloa, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, Martin Zuber
2022/1673 (PDF ) DeV-IP: A k-out-n Decentralized and verifiable BFV for Inner Product evaluation Jose Contreras, Hardik Gajera
2022/1672 (PDF ) An Auditable Confidentiality Protocol for Blockchain Transactions Aoxuan Li, Gabriele D’Angelo, Jacky Tang, Frank Fang, Baron Gong
2022/1671 (PDF ) Quantum Neural Network based Distinguisher for Differential Cryptanalysis on Simplified Block Ciphers Hyunji Kim, Kyungbae Jang, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
2022/1670 (PDF ) Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher Shoichi Hirose, Kazuhiko Minematsu
2022/1669 (PDF ) Jolt: Recovering TLS Signing Keys via Rowhammer Faults Koksal Mus, Yarkın Doröz, M. Caner Tol, Kristi Rahman, Berk Sunar
2022/1668 (PDF ) On the families of algebraic graphs with the fastest growth of cycle indicator and their applications Vasyl Ustimenko
2022/1667 (PDF ) Applying Castryck-Decru Attack on the Masked Torsion Point Images SIDH variant Jesús-Javier Chi-Domínguez
2022/1666 (PDF ) Cryptanalysis of Ivanov-Krouk-Zyablov cryptosystem Kirill Vedenev, Yury Kosolapov
2022/1665 (PDF ) GCKSign: Simple and Efficient Signatures from Generalized Compact Knapsacks Joo Woo, Kwangsu Lee, Jong Hwan Park
2022/1664 (PDF ) NTRU+: Compact Construction of NTRU Using Simple Encoding Method Jonghyun Kim, Jong Hwan Park
2022/1663 (PDF ) REDOG and Its Performance Analysis Jon-Lark Kim, Jihoon Hong, Terry Shue Chien Lau, YounJae Lim, Byung-Sun Won
2022/1662 (PDF ) Revisiting cycles of pairing-friendly elliptic curves Marta Bellés-Muñoz, Jorge Jiménez Urroz, Javier Silva
2022/1661 (PDF ) Enhancing the Dual Attack against MLWE: Constructing More Short Vectors Using Its Algebraic Structure Han Wu, Guangwu Xu
2022/1660 (PDF ) Owner Identity Verification in the Internet of Connected Vehicles: Zero Trust Based Solution Mashrukh Zayed, Adnan Anwar, Ziaur Rahman, Sk. Shezan Arefin, Rafiqul Islam
2022/1659 (PDF ) A Deep Learning aided Key Recovery Framework for Large-State Block Ciphers Yi Chen, Zhenzhen Bao, Yantian Shen, Hongbo Yu
2022/1658 (PDF ) A new Privacy Preserving and Scalable Revocation Method for Self Sovereign Identity - The Perfect Revocation Method does not exist yet Andreas Freitag
2022/1657 (PDF ) CycloneNTT: An NTT/FFT Architecture Using Quasi-Streaming of Large Datasets on DDR- and HBM-based FPGA Platforms Kaveh Aasaraai, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela, Kevin Bowers
2022/1656 (PDF ) Proactive Refresh for Accountable Threshold Signatures Dan Boneh, Aditi Partap, Lior Rotem
2022/1655 (PDF ) Just How Fair is an Unreactive World? Srinivasan Raghuraman, Yibin Yang
2022/1654 (PDF ) On the Complete Non-Malleability of the Fujisaki-Okamoto Transform Daniele Friolo, Matteo Salvino, Daniele Venturi
2022/1653 (PDF ) Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol Alexandre Debant, Lucca Hirschi
2022/1652 (PDF ) Breaking the Size Barrier: Universal Circuits meet Lookup Tables Yann Disser, Daniel Günther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt, Hossein Yalame
2022/1651 (PDF ) TiGER: Tiny bandwidth key encapsulation mechanism for easy miGration based on RLWE(R) Seunghwan Park, Chi-Gon Jung, Aesun Park, Joongeun Choi, Honggoo Kang
2022/1650 (PDF ) LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains Philipp Hoenisch, Subhra Mazumdar, Pedro Moreno-Sanchez, Sushmita Ruj
2022/1649 (PDF ) Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis Shah Fahd, Mehreen Afzal, Dawood Shah, Waseem Iqbal, Atiya Hai
2022/1648 (PDF ) Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Nitin Singh
2022/1647 (PDF ) Quantum Algorithm for Oracle Subset Product Trey Li
2022/1646 (PDF ) Blockin: Multi-Chain Sign-In Standard with Micro-Authorizations Matt Davison, Ken King, Trevor Miller
2022/1645 (PDF ) The Return of the SDitH Carlos Aguilar-Melchor, Nicolas Gama, James Howe, Andreas Hülsing, David Joseph, Dongze Yue
2022/1644 (PDF ) An attack on a key exchange protocol based on max-times and min-times algebras Ivan Buchinskiy, Matvei Kotov, Alexander Treier
2022/1643 (PDF ) End-to-End Secure Messaging with Traceability Only for Illegal Content James Bartusek, Sanjam Garg, Abhishek Jain, Guru-Vamsi Policharla
2022/1642 (PDF ) Proofs of Proof-of-Stake with Sublinear Complexity Shresth Agrawal, Joachim Neu, Ertem Nusret Tas, Dionysis Zindros
2022/1641 (PDF ) AlgSAT --- a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective Huina Li, Haochen Zhang, Guozhen Liu, Kai Hu, Jian Guo, Weidong Qiu
2022/1640 (PDF ) Differential Meet-In-The-Middle Cryptanalysis Christina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia
2022/1639 (PDF ) Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments Alexandre Augusto Giron, João Pedro Adami do Nascimento, Ricardo Custódio, Lucas Pandolfo Perin
2022/1638 (PDF ) The Security of Quasigroups Based Substitution Permutation Networks George Teseleanu
2022/1637 (PDF ) Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum $i\mathcal{O}$ Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai
2022/1636 (PDF ) Threshold Signatures with Private Accountability Dan Boneh, Chelsea Komlo
2022/1635 (PDF ) FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption Michiel Van Beirendonck, Jan-Pieter D'Anvers, Furkan Turan, Ingrid Verbauwhede
2022/1634 (PDF ) Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains Tianyu Zhaolu, Zhiguo Wan, Huaqun Wang
2022/1633 (PDF ) Linea Prover Documentation Linea Prover
2022/1632 (PDF ) Cryptography with Weights: MPC, Encryption and Signatures Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
2022/1631 (PDF ) Enhancing Ring-LWE Hardness using Dedekind Index Theorem Charanjit S Jutla, Chengyu Lin
2022/1630 (PDF ) Finding Collisions for Round-Reduced Romulus-H Marcel Nageler, Felix Pallua, Maria Eichlseder
2022/1629 (PDF ) Temporary Block Withholding Attacks on Filecoin's Expected Consensus Tong Cao, Xin Li
2022/1628 (PDF ) Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Competition's Finalists Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert
2022/1627 (PDF ) The Random Fault Model Siemen Dhooghe, Svetla Nikova
2022/1626 (PDF ) MinRoot: Candidate Sequential Function for Ethereum VDF Dmitry Khovratovich, Mary Maller, Pratyush Ranjan Tiwari
2022/1625 (PDF ) Efficient Threshold FHE for Privacy-Preserving Applications Siddhartha Chowdhury, Sayani Sinha, Animesh Singh, Shubham Mishra, Chandan Chaudhary, Sikhar Patranabis, Pratyay Mukherjee, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/1624 (PDF ) Algorithms for switching between block-wise and arithmetic masking Evgeny Alekseev, Andrey Bozhko
2022/1623 (PDF ) WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership David Chaum, Mario Larangeira, Mario Yaksetig
2022/1622 (PDF ) Anonymous Tokens with Hidden Metadata Bit from Algebraic MACs Melissa Chase, F. Betül Durak, Serge Vaudenay
2022/1621 (PDF ) cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption Hao Yang, Shiyu Shen, Zhe Liu, Yunlei Zhao
2022/1620 (PDF ) Another Round of Breaking and Making Quantum Money: How to Not Build It from Lattices, and More Jiahui Liu, Hart Montgomery, Mark Zhandry
2022/1619 (PDF ) The Performance Analysis of Post-Quantum Cryptography for Vehicular Communications Abel C. H. Chen
2022/1618 (PDF ) Witness-Succinct Universally-Composable SNARKs Chaya Ganesh, Yashvanth Kondi, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
2022/1617 (PDF ) A New Higher Order Differential of RAGHAV Naoki Shibayama, Yasutaka Igarashi
2022/1616 (PDF ) Secret Sharing for Generic Access Structures James Smith
2022/1615 (PDF ) Efficient Methods for Implementation of Generalized Access Structures James Smith
2022/1614 (PDF ) Throughput Limitation of the Off-chain Payment Networks Shayan Hamidi Dehshali, Seyed Mahdi Hosseini, Soheil Zibakhsh Shabgahi, Behnam Bahrak
2022/1613 (PDF ) Classic McEliece Key Generation on RAM constrained devices Rainer Urian, Raphael Schermann
2022/1612 (PDF ) On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives Laasya Bangalore, Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2022/1611 (PDF ) Efficient Aggregatable BLS Signatures with Chaum-Pedersen Proofs Jeff Burdges, Oana Ciobotaru, Syed Lavasani, Alistair Stewart
2022/1610 (PDF ) ADMM and Reproducing Sum-Product Decoding Algorithm Applied to QC-MDPC Code-based McEliece Cryptosystems Kohtaro Watanabe, Motonari Ohtsuka, Yuta Tsukie
2022/1609 (PDF ) Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs Avijit Dutta, Jian Guo, Eik List
2022/1608 (PDF ) Ligero: Lightweight Sublinear Arguments Without a Trusted Setup Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
2022/1607 (PDF ) A Universally Composable PAKE with Zero Communication Cost (And Why It Shouldn't Be Considered UC-Secure) Lawrence Roy, Jiayu Xu
2022/1606 (PDF ) AUC: Accountable Universal Composability Mike Graf, Ralf Küsters, Daniel Rausch
2022/1605 (PDF ) Sweep-UC: Swapping Coins Privately Lucjan Hanzlik, Julian Loss, Sri AravindaKrishnan Thyagarajan, Benedikt Wagner
2022/1604 (PDF ) Quantum Rebound Attacks on Reduced-Round ARIA-Based Hash Functions Seungjun Baek, Jongsung Kim
2022/1603 (PDF ) Slid Pairs of the Fruit-80 Stream Cipher Pang Kok An, Shekh Faisal Abdul-Latip, Hazlin Abdul Rani
2022/1602 (PDF ) Survey on Fully Homomorphic Encryption, Theory, and Applications Chiara Marcolla, Victor Sucasas, Marc Manzano, Riccardo Bassoli, Frank H.P. Fitzek, Najwa Aaraj
2022/1600 (PDF ) Secret-Shared Joins with Multiplicity from Aggregation Trees Saikrishna Badrinarayanan, Sourav Das, Gayathri Garimella, Srinivasan Raghuraman, Peter Rindal
2022/1599 (PDF ) Streaming Functional Encryption Jiaxin Guan, Alexis Korb, Amit Sahai
2022/1598 (PDF ) Efficiently Testable Circuits Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, Krzysztof Pietrzak
2022/1597 (PDF ) A Closer Look at a Recent Pipelined True Random Number Generator Design Markus Dichtl
2022/1596 (PDF ) LowMS: a new rank metric code-based KEM without ideal structure Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Pierre Loidreau, Julian Renner, Antonia Wachter-Zeh
2022/1595 (PDF ) Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida
2022/1594 (PDF ) Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH Pratish Datta, Tapas Pal, Katsuyuki Takashima
2022/1593 (PDF ) Proofs of discrete logarithm equality across groups Melissa Chase, Michele Orrù, Trevor Perrin, Greg Zaverucha
2022/1592 (PDF ) Powers-of-Tau to the People: Decentralizing Setup Ceremonies Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh
2022/1591 (PDF ) ISAP+: ISAP with Fast Authentication Arghya Bhattacharjee, Avik Chakraborti, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi
2022/1590 (PDF ) Misuse-resistant MGM2 mode Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev
2022/1589 (PDF ) Cryptanalysis of a privacy-preserving behavior-oriented authentication scheme Sigurd Eskeland, Ahmed Fraz Baig
2022/1588 (PDF ) Factoring using multiplicative relations modulo n: a subexponential algorithm inspired by the index calculus Katherine E. Stange
2022/1587 (PDF ) Applications of the indirect sum in the design of several special classes of bent functions outside the completed $\mathcal{MM}$ class Fengrong Zhang, Enes Pasalic, Amar Bapić, Baocang Wang
2022/1586 (PDF ) Practical Asynchronous Proactive Secret Sharing and Key Refresh Christoph U. Günther, Sourav Das, Lefteris Kokoris-Kogias
2022/1585 (PDF ) Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use Kwan Yin Chan, Tsz Hon Yuen
2022/1584 (PDF ) Instantiability of Classical Random-Oracle-Model Encryption Transforms Alice Murphy, Adam O'Neill, Mohammad Zaheri
2022/1583 (PDF ) Asynchronous Multi-Party Quantum Computation Vipul Goyal, Chen-Da Liu-Zhang, Justin Raizes, João Ribeiro
2022/1581 (PDF ) Truncator: Time-space Tradeoff of Cryptographic Primitives Foteini Baldimtsi, Konstantinos Chalkias, Panagiotis Chatzigiannis, Mahimna Kelkar
2022/1580 (PDF ) Multi-ciphertext security degradation for lattices Daniel J. Bernstein
2022/1579 (PDF ) New Properties of Double Boomerang Connectivity Table Qianqian Yang, Ling Song, Siwei Sun, Danping Shi, Lei Hu
2022/1578 (PDF ) Weighted Secret Sharing from Wiretap Channels Fabrice Benhamouda, Shai Halevi, Lev Stambler
2022/1577 (PDF ) Rescue-Prime Optimized Tomer Ashur, Al Kindi, Willi Meier, Alan Szepieniec, Bobbin Threadbare
2022/1576 (PDF ) Folding Schemes with Selective Verification Carla Ràfols, Alexandros Zacharakis
2022/1575 (PDF ) On Linearization Attack of Entropic Quasigroups Cryptography Daniel Nager
2022/1574 (PDF ) Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines Anita Aghaie, Amir Moradi, Johannes Tobisch, Nils Wisiol
2022/1573 (PDF ) Solving Small Exponential ECDLP in EC-based Additively Homomorphic Encryption and Applications Fei Tang, Guowei Ling, Chaochao Cai, Jinyong Shan, Xuanqi Liu, Peng Tang, Weidong Qiu
2022/1572 (PDF ) Layered ROLLO-I: Faster rank-metric code-based KEM using ideal LRPC codes Chanki Kim, Young-Sik Kim, Jong-Seon No
2022/1571 (PDF ) Practical Settlement Bounds for Longest-Chain Consensus Peter Gaži, Ling Ren, Alexander Russell
2022/1570 (PDF ) Set (Non-)Membership NIZKs from Determinantal Accumulators Helger Lipmaa, Roberto Parisella
2022/1569 (PDF ) DAG-$\Sigma$: A DAG-based Sigma Protocol for Relations in CNF Gongxian Zeng, Junzuo Lai, Zhengan Huang, Yu Wang, Zhiming Zheng
2022/1568 (PDF ) Extendable Threshold Ring Signatures with Enhanced Anonymity Gennaro Avitabile, Vincenzo Botta, Dario Fiore
2022/1567 (PDF ) Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-permutation in the Known-key setting Orr Dunkelman, Shibam Ghosh, Eran Lambooij
2022/1566 (PDF ) Characterisation of Bijectivity Preserving Componentwise Modification of S-Boxes Kaisa Nyberg
2022/1565 (PDF ) Baloo: Nearly Optimal Lookup Arguments Arantxa Zapico, Ariel Gabizon, Dmitry Khovratovich, Mary Maller, Carla Ràfols
2022/1564 (PDF ) Efficient privacy preserving top-k recommendation using homomorphic sorting Pranav Verma, Anish Mathuria, Sourish Dasgupta
2022/1563 (PDF ) A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/1562 (PDF ) A Systematization of Voter Registration Security Jack Cable, Andrés Fábrega, Sunoo Park, Michael A. Specter
2022/1561 (PDF ) Vogue: Faster Computation of Private Heavy Hitters Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
2022/1560 (PDF ) Verifiable Private Information Retrieval Shany Ben-David, Yael Tauman Kalai, Omer Paneth
2022/1559 (PDF ) Take your MEDS: Digital Signatures from Matrix Code Equivalence Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska
2022/1558 (PDF ) Quantum Speed-Up for Multidimensional (Zero Correlation) Linear Distinguishers Akinori Hosoyamada
2022/1557 (PDF ) Less is more: refinement proofs for probabilistic proofs Kunming Jiang, Devora Chait-Roth, Zachary DeStefano, Michael Walfish, Thomas Wies
2022/1556 (PDF ) Intermediate Certificate Suppression in Post-Quantum TLS: An Approximate Membership Querying Approach Dimitrios Sikeridis, Sean Huntley, David Ott, Michael Devetsikiotis
2022/1555 (PDF ) Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures Sunpreet S. Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman, Maliheh Shirvanian, Kim Wagner, Gaven Watson
2022/1554 (PDF ) Executing and Proving over Dirty Ledgers Christos Stefo, Zhuolun Xiang, Lefteris Kokoris-Kogias
2022/1553 (PDF ) Lower Bound Framework for Differentially Private and Oblivious Data Structures Giuseppe Persiano, Kevin Yeo
2022/1552 (PDF ) XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3 Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan
2022/1551 (PDF ) Extensible Decentralized Secret Sharing and Application to Schnorr Signatures Michele Battagliola, Riccardo Longo, Alessio Meneghetti
2022/1550 (PDF ) Modifications of Bijective S-Boxes with Linear Structures Kaisa Nyberg
2022/1549 (PDF ) The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64 Yingying Li, Qichun Wang
2022/1548 (PDF ) Trellis: Robust and Scalable Metadata-private Anonymous Broadcast Simon Langowski, Sacha Servan-Schreiber, Srinivas Devadas
2022/1547 (PDF ) A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm Tendayi Kamucheka, Alexander Nelson, David Andrews, Miaoqing Huang
2022/1546 (PDF ) Threshold Implementations in Software: Micro-architectural Leakages in Algorithms John Gaspoz, Siemen Dhooghe
2022/1545 (PDF ) On Structure-Preserving Cryptography and Lattices Dennis Hofheinz, Kristina Hostáková, Roman Langrehr, Bogdan Ursu
2022/1544 (PDF ) Towards Efficient Decentralized Federated Learning Christodoulos Pappas, Dimitrios Papadopoulos, Dimitris Chatzopoulos, Eleni Panagou, Spyros Lalis, Manolis Vavalis
2022/1543 (PDF ) Four-Round Black-Box Non-Malleable Commitments from One-Way Permutations Michele Ciampi, Emmanuela Orsini, Luisa Siniscalchi
2022/1542 (PDF ) Scalable and Transparent Proofs over All Large Fields, via Elliptic Curves (ECFFT part II) Eli Ben-Sasson, Dan Carmon, Swastik Kopparty, David Levit
2022/1541 (PDF ) Secure Auctions in the Presence of Rational Adversaries Chaya Ganesh, Bhavana Kanukurthi, Girisha Shankar
2022/1540 (PDF ) Exploiting algebraic structures in probing security Maxime Plançon
2022/1539 (PDF ) Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions Saumya Goyal, Varun Narayanan, Manoj Prabhakaran
2022/1538 (PDF ) DME: a full encryption, signature and KEM multivariate public key cryptosystem Ignacio Luengo, Martín Avendaño
2022/1537 (PDF ) On Extremal Algebraic Graphs and Multivariate Cryptosystems Vasyl Ustimenko
2022/1536 (PDF ) Privacy-Preserving Blueprints Markulf Kohlweiss, Anna Lysyanskaya, An Nguyen
2022/1535 (PDF ) Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar
2022/1534 (PDF ) Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function Elena Andreeva, Benoit Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy
2022/1533 (PDF ) How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest
2022/1532 (PDF ) Dynamic Decentralized Functional Encryption with Strong Security Ky Nguyen, David Pointcheval, Robert Schädlich
2022/1531 (PDF ) The Key Lattice Framework for Concurrent Group Messaging Kelong Cong, Karim Eldefrawy, Nigel P. Smart, Ben Terner
2022/1530 (PDF ) Multivariate lookups based on logarithmic derivatives Ulrich Haböck
2022/1529 (PDF ) Key-Recovery Fault Injection Attack on the Classic McEliece KEM Sabine Pircher, Johannes Geier, Julian Danner, Daniel Mueller-Gritschneder, Antonia Wachter-Zeh
2022/1528 (PDF ) Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence Problem Ward Beullens
2022/1527 (PDF ) Pattern Matching in Encrypted Stream from Inner Product Encryption Élie Bouscatié, Guilhem Castagnos, Olivier Sanders
2022/1526 (PDF ) Threshold-Optimal MPC With Friends and Foes Nikolas Melissaris, Divya Ravi, Sophia Yakoubov
2022/1525 (PDF ) Endemic Oblivious Transfer via Random Oracles, Revisited Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2022/1524 (PDF ) Shielding Probabilistically Checkable Proofs: Zero-Knowledge PCPs from Leakage Resilience Mor Weiss
2022/1523 (PDF ) Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2022/1522 (PDF ) Two new infinite families of APN functions in trivariate form Kangquan Li, Nikolay Kaleyski
2022/1521 (PDF ) An Assessment of Differential-Neural Distinguishers Aron Gohr, Gregor Leander, Patrick Neumann
2022/1520 (PDF ) Censorship-Resilient and Confidential Collateralized Second-Layer Payments Kari Kostiainen, Sven Gnap, Ghassan Karame
2022/1519 (PDF ) Collusion-resistant broadcast encryption based on hidden RSA subgroups Sigurd Eskeland
2022/1518 (PDF ) An Experimentally Verified Attack on 820-Round Trivium (Full Version) Cheng Che, Tian Tian
2022/1517 (PDF ) Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable Abort Kai-Min Chung, Mi-Ying (Miryam) Huang, Er-Cheng Tang, Jiapeng Zhang
2022/1516 (PDF ) Obfuscation of Evasive Algebraic Set Membership Steven D. Galbraith, Trey Li
2022/1515 (PDF ) Succinct Vector, Polynomial, and Functional Commitments from Lattices Hoeteck Wee, David J. Wu
2022/1514 (PDF ) Pseudorandom (Function-Like) Quantum State Generators: New Definitions and Applications Prabhanjan Ananth, Aditya Gulati, Luowen Qian, Henry Yuen
2022/1513 (PDF ) Player-Replaceability and Forensic Support are Two Sides of the Same (Crypto) Coin Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath
2022/1512 (PDF ) Building MPCitH-based Signatures from MQ, MinRank, Rank SD and PKP Thibauld Feneuil
2022/1511 (PDF ) Round-Optimal Oblivious Transfer and MPC from Computational CSIDH Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar
2022/1510 (PDF ) Witness Encryption for Succinct Functional Commitments and Applications Matteo Campanelli, Dario Fiore, Hamidreza Khoshakhlagh
2022/1509 (PDF ) sVote with Control Components Voting Protocol. Computational Proof of Complete Verifiability and Privacy. Enrique Larraia, Tamara Finogina, Nuria Costa
2022/1508 (PDF ) Non-Interactive Publicly-Verifiable Delegation of Committed Programs Riddhi Ghosal, Amit Sahai, Brent Waters
2022/1507 (PDF ) Label Correlation in Deep Learning-based Side-channel Analysis Lichao Wu, Léo Weissbart, Marina Krček, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek
2022/1506 (PDF ) ORTOA: One Round Trip Oblivious Access Sujaya Maiyya, Yuval Steinhart, Divyakant Agrawal, Prabhanjan Ananth, Amr El Abbadi
2022/1505 (PDF ) Efficient Registration-Based Encryption Noemi Glaeser, Dimitris Kolonelos, Giulio Malavolta, Ahmadreza Rahimi
2022/1504 (PDF ) On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness Bar Alon, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky, Arpita Patra
2022/1503 (PDF ) The Parallel Reversible Pebbling Game: Analyzing the Post-Quantum Security of iMHFs Jeremiah Blocki, Blake Holman, Seunghoon Lee
2022/1502 (PDF ) Beyond Uber: Instantiating Generic Groups via PGGs Balthazar Bauer, Pooya Farshim, Patrick Harasser, Adam O'Neill
2022/1501 (PDF ) MinRank in the Head: Short Signatures from Zero-Knowledge Proofs Gora Adj, Luis Rivera-Zamarripa, Javier Verbel
2022/1500 (PDF ) Registered Attribute-Based Encryption Susan Hohenberger, George Lu, Brent Waters, David J. Wu
2022/1499 (PDF ) WrapQ: Side-Channel Secure Key Management for Post-Quantum Cryptography Markku-Juhani O. Saarinen
2022/1498 (PDF ) Simple, Fast, Efficient, and Tightly-Secure Non-Malleable Non-Interactive Timed Commitments Peter Chvojka, Tibor Jager
2022/1497 (PDF ) Lattice-Based Quantum Advantage from Rotated Measurements Yusuf Alnawakhtha, Atul Mantri, Carl A. Miller, Daochen Wang
2022/1496 (PDF ) Multiplicative Partially Homomorphic CRT Secret Sharing Shlomi Dolev, Yaniv Kleinman
2022/1495 (PDF ) Peregrine: Toward Fastest FALCON Based on GPV Framework Eun-Young Seo, Young-Sik Kim, Joon-Woo Lee, Jong-Seon No
2022/1494 (PDF ) The DAG KNIGHT Protocol: A Parameterless Generalization of Nakamoto Consensus Yonatan Sompolinsky, Michael Sutton
2022/1493 (PDF ) Enhanced pqsigRM: Code-Based Digital Signature Scheme with Short Signature and Fast Verification for Post-Quantum Cryptography Jinkyu Cho, Jong-Seon No, Yongwoo Lee, Zahyun Koo, Young-Sik Kim
2022/1492 (PDF ) A Control Theoretic Approach to Infrastructure-Centric Blockchain Tokenomics Oguzhan Akcin, Robert P. Streit, Benjamin Oommen, Sriram Vishwanath, Sandeep Chinchali
2022/1491 (PDF ) LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3 Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan
2022/1490 (PDF ) Efficient Gaussian sampling for RLWE-based cryptography through a fast Fourier transform Marcio Barbado Junior
2022/1489 (PDF ) On new results on Extremal Algebraic Graph Theory and their connections with Algebraic Cryptography Vasyl Ustimenko
2022/1488 (PDF ) Quagmire ciphers and group theory: What is a Beaufort cipher? Thomas Kaeding
2022/1487 (PDF ) An efficient verifiable state for zk-EVM and beyond from the Anemoi hash function Jianwei Liu, Harshad Patil, Akhil Sai Peddireddy, Kevin Singh, Haifeng Sun, Huachuang Sun, Weikeng Chen
2022/1486 (PDF ) Correlation Intractability and SNARGs from Sub-exponential DDH Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Jiaheng Zhang
2022/1485 (PDF ) Policy-Based Redactable Signatures Zachary A Kissel
2022/1484 (PDF ) Adaptive UC NIZK for Practical Applications Anna Lysyanskaya, Leah Namisa Rosenbloom
2022/1483 (PDF ) Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead Zoltán Ádám Mann, Christian Weinert, Daphnee Chabal, Joppe W. Bos
2022/1482 (PDF ) Multi-Point HashDH OPRF using Multiplicative Blinding with Application to Private Set Intersection Minglang Dong
2022/1481 (PDF ) Secure Messaging with Strong Compromise Resilience, Temporal Privacy, and Immediate Decryption Cas Cremers, Mang Zhao
2022/1480 (PDF ) A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption Benoit Chevallier-Mames
2022/1479 (PDF ) A Note on Constructing SIDH-PoK-based Signatures after Castryck-Decru Attack Jesús-Javier Chi-Domínguez
2022/1478 (PDF ) Limits on revocable proof systems, with applications to stateless blockchains Miranda Christ, Joseph Bonneau
2022/1477 (PDF ) A Post-Quantum Digital Signature Scheme from QC-LDPC Codes Christian Picozzi, Alessio Meneghetti, Giovanni Tognolini
2022/1476 (PDF ) The EVIL Machine: Encode, Visualize and Interpret the Leakage Valence Cristiani, Maxime Lecomte, Philippe Maurine
2022/1475 (PDF ) Quagmire ciphers and group theory: Recovering keywords from the key table Thomas Kaeding
2022/1474 (PDF ) Quantum security of subset cover problems Samuel Bouaziz--Ermann, Alex B. Grilo, Damien Vergnaud
2022/1473 (PDF ) A Hybrid of Lattice-reduction and Meet-LWE via Near-Collision on Babai's Plane Minki Hhan, Jiseung Kim, Changmin Lee, Yongha Son
2022/1472 (PDF ) Hardware-Supported Cryptographic Protection of Random Access Memory Roberto Avanzi, Ionut Mihalcea, David Schall, Héctor Montaner, Andreas Sandberg
2022/1471 (PDF ) Double Auction Meets Blockchain: Consensus from Scored Bid-Assignment Xiangyu Su, Xavier Défago, Mario Larangeira, Kazuyuki Mori, Takuya Oda, Yasumasa Tamura, Keisuke Tanaka
2022/1470 (PDF ) Casting out Primes: Bignum Arithmetic for Zero-Knowledge Proofs Daniel Lubarov, Jordi Baylina Melé
2022/1469 (PDF ) Supersingular Curves You Can Trust Andrea Basso, Giulio Codogni, Deirdre Connolly, Luca De Feo, Tako Boris Fouotsa, Guido Maria Lido, Travis Morrison, Lorenz Panny, Sikhar Patranabis, Benjamin Wesolowski
2022/1468 (PDF ) Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning Hao Guo, Sayandeep Saha, Satwik Patnaik, Vasudev Gohil, Debdeep Mukhopadhyay, Jeyavijayan (JV) Rajendran
2022/1467 (PDF ) A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences Emanuele Bellini, David Gerault, Anna Hambitzer, Matteo Rossi
2022/1466 (PDF ) I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groups Cyril Bouvier, Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie
2022/1465 (PDF ) Private Collaborative Data Cleaning via Non-Equi PSI Erik-Oliver Blass, Florian Kerschbaum
2022/1464 (PDF ) Parallel Isogeny Path Finding with Limited Memory Emanuele Bellini, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Andre Esser, Sorina Ionica, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez, Monika Trimoska, Floyd Zweydinger
2022/1463 (PDF ) How to Obfuscate MPC Inputs Ian McQuoid, Mike Rosulek, Jiayu Xu
2022/1461 (PDF ) ACORN: Input Validation for Secure Aggregation James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun
2022/1460 (PDF ) Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity Hyesun Kwak, Seonhong Min, Yongsoo Song
2022/1459 (PDF ) Circuit Privacy for FHEW/TFHE-Style Fully Homomorphic Encryption in Practice Kamil Kluczniak
2022/1458 (PDF ) Speeding-Up Elliptic Curve Cryptography Algorithms Diana Maimut, Alexandru Cristian Matei
2022/1457 (PDF ) Secure Non-Interactive Reducibility is Decidable Kaartik Bhushan, Ankit Kumar Misra, Varun Narayanan, Manoj Prabhakaran
2022/1456 (PDF ) Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan
2022/1455 (PDF ) Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications Kevin Yeo
2022/1454 (PDF ) Unjamming Lightning: A Systematic Approach Clara Shikhelman, Sergei Tikhomirov
2022/1453 (PDF ) Assisted MPC Philipp Muth, Stefan Katzenbeisser
2022/1452 (PDF ) A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber Yanning Ji, Ruize Wang, Kalle Ngo, Elena Dubrova, Linus Backlund
2022/1451 (PDF ) Attribute-Based Signatures for Range of Inner Product and Its Applications Masahito Ishizaka, Kazuhide Fukushima
2022/1450 (PDF ) Deterministic Wallets for Adaptor Signatures Andreas Erwig, Siavash Riahi
2022/1449 (PDF ) ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal
2022/1448 (PDF ) Towards Practical Sleepy BFT Dahlia Malkhi, Atsuki Momose, Ling Ren
2022/1447 (PDF ) flookup: Fractional decomposition-based lookups in quasi-linear time independent of table size Ariel Gabizon, Dmitry Khovratovich
2022/1446 (PDF ) Radical isogenies and modular curves Valentina Pribanić
2022/1445 (PDF ) Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules) Shanjie Xu, Qi Da, Chun Guo
2022/1444 (PDF ) Finding Three-Subset Division Property for Ciphers with Complex Linear Layers (Full Version) Debasmita Chakraborty
2022/1443 (PDF ) DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices Bo Yang, Yanchao Zhang, Dong Tong
2022/1442 (PDF ) FairPoS: Input Fairness in Permissionless Consensus James Hsin-yu Chiang, Bernardo David, Ittay Eyal, Tiantian Gong
2022/1441 (PDF ) Tighter Post-quantum Proof for Plain FDH, PFDH and GPV-IBE Yu Liu, Haodong Jiang, Yunlei Zhao
2022/1440 (PDF ) An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version) Marwan Zeggari, Renaud Lambiotte, Aydin Abadi, Louise Axon, Mohamad Kassab
2022/1439 (PDF ) Cryptographic Smooth Neighbors Giacomo Bruno, Maria Corte-Real Santos, Craig Costello, Jonathan Komada Eriksen, Michael Meyer, Michael Naehrig, Bruno Sterner
2022/1438 (PDF ) Plug-and-play sanitization for TFHE Florian Bourse, Malika Izabachène
2022/1437 (PDF ) Secure Multiparty Computation from Threshold Encryption Based on Class Groups Lennart Braun, Ivan Damgård, Claudio Orlandi
2022/1436 (PDF ) Efficient and Generic Transformations for Chosen-Ciphertext Secure Predicate Encryption Marloes Venema, Leon Botros
2022/1435 (PDF ) Eagle: Efficient Privacy Preserving Smart Contracts Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen
2022/1434 (PDF ) Weightwise almost perfectly balanced functions: secondary constructions for all $n$ and better weightwise nonlinearities Agnese Gini, Pierrick Méaux
2022/1433 (PDF ) BG: A Modular Treatment of BFT Consensus Xiao Sui, Sisi Duan, Haibin Zhang
2022/1432 (PDF ) A Lattice-based Ring Signature Scheme Secure against Key Exposure Xiaoling Yu, Yuntao Wang
2022/1431 (PDF ) Half-Tree: Halving the Cost of Tree Expansion in COT and DPF Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, Zheli Liu
2022/1430 (PDF ) Indistinguishability Obfuscation via Mathematical Proofs of Equivalence Abhishek Jain, Zhengzhong Jin
2022/1429 (PDF ) Collusion Resistant Copy-Protection for Watermarkable Functionalities Jiahui Liu, Qipeng Liu, Luowen Qian, Mark Zhandry
2022/1428 (PDF ) TrustBoost: Boosting Trust among Interoperable Blockchains Xuechao Wang, Peiyao Sheng, Sreeram Kannan, Kartik Nayak, Pramod Viswanath
2022/1427 (PDF ) Improved Quantum Analysis of SPECK and LowMC (Full Version) Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Hwajeong Seo, Anupam Chattopadhyay
2022/1425 (PDF ) Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, Vincent Migliore, Mamuri Nawan, Kashif Nawaz
2022/1424 (PDF ) DeFi That Defies: Imported Off-Chain Metrics and Pseudonymous On-Chain Activity David W. Kravitz, Mollie Z. Halverson
2022/1423 (PDF ) The Superlinearity Problem in Post-Quantum Blockchains Sunoo Park, Nicholas Spooner
2022/1422 (PDF ) Unlinkable Policy-based Sanitizable Signatures Ismail Afia, Riham AlTawy
2022/1421 (PDF ) Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus Shravan Srinivasan, Julian Loss, Giulio Malavolta, Kartik Nayak, Charalampos Papamanthou, Sri AravindaKrishnan Thyagarajan
2022/1420 (PDF ) Diamonds are Forever, Loss-Versus-Rebalancing is Not Conor McMenamin, Vanesa Daza, Bruno Mazorra
2022/1419 (PDF ) Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk, Nicholas Spooner
2022/1418 (PDF ) Da Yan Concentrator and Extender of Random Data (DYCE) Anna M. Johnston, Puru Kulkarni
2022/1417 (PDF ) Efficient Dynamic Proof of Retrievability for Cold Storage Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang
2022/1416 (PDF ) Side-Channel Attack Countermeasures Based On Clock Randomization Have a Fundamental Flaw Martin Brisfors, Michail Moraitis, Elena Dubrova
2022/1415 (PDF ) FABEO: Fast Attribute-Based Encryption with Optimal Security Doreen Riepel, Hoeteck Wee
2022/1414 (PDF ) INT-RUP Security of SAEB and TinyJAMBU Nilanjan Datta, Avijit Dutta, Shibam Ghosh
2022/1413 (PDF ) How to Compress Encrypted Data Nils Fleischhacker, Kasper Green Larsen, Mark Simkin
2022/1412 (PDF ) Algorithm xxx: Evaluating a Boolean Polynomial on All Possible Inputs Charles Bouillaguet
2022/1411 (PDF ) Cryptographic Administration for Secure Group Messaging David Balbás, Daniel Collins, Serge Vaudenay
2022/1410 (PDF ) Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware Hauke Steffen, Georg Land, Lucie Kogelheide, Tim Güneysu
2022/1409 (PDF ) SNARGs and PPAD Hardness from the Decisional Diffie-Hellman Assumption Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan
2022/1408 (PDF ) BRAKE: Biometric Resilient Authenticated Key Exchange Pia Bauspieß, Tjerand Silde, Matej Poljuha, Alexandre Tullot, Anamaria Costache, Christian Rathgeb, Jascha Kolberg, Christoph Busch
2022/1407 (PDF ) Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head Thibauld Feneuil, Matthieu Rivain
2022/1406 (PDF ) Protecting Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Markus Schönauer, Tobias Schneider, François-Xavier Standaert, Christine van Vredendaal
2022/1405 (PDF ) Subverting Deniability Marcel Armour, Elizabeth A. Quaglia
2022/1404 (PDF ) Reducing an LWE Instance by Modular Hints and its Applications to Primal Attack, Dual Attack and BKW Attack Han Wu, Xiaoyun Wang, Guangwu Xu
2022/1403 (PDF ) On the Dual Attack of LWE Schemes in the Presence of Hints Han Wu, Xiaoyun Wang, Guangwu Xu
2022/1401 (PDF ) PIRANA: Faster Multi-query PIR via Constant-weight Codes Jian Liu, Jingyu Li, Di Wu, Kui Ren
2022/1400 (PDF ) EdMSM: Multi-Scalar-Multiplication for SNARKs and Faster Montgomery multiplication Youssef El Housni, Gautam Botrel
2022/1399 (PDF ) Low-latency implementation of the GIFT cipher on RISC-V architectures Gheorghe Pojoga, Kostas Papagiannopoulos
2022/1398 (PDF ) MILP-aided Cryptanalysis of the FUTURE Block Cipher Murat Burhan İlter, Ali Aydin Selcuk
2022/1397 (PDF ) Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees Giovanni Deligios, Chen-Da Liu-Zhang
2022/1396 (PDF ) FPGA Acceleration of Multi-Scalar Multiplication: CycloneMSM Kaveh Aasaraai, Don Beaver, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, Javier Varela
2022/1395 (PDF ) Non-Interactive Anonymous Router with Quasi-Linear Router Computation Rex Fernando, Elaine Shi, Pratik Soni, Nikhil Vanjani, Brent Waters
2022/1394 (PDF ) Risky Translations: Securing TLBs against Timing Side Channels Florian Stolz, Jan Philipp Thoma, Pascal Sasdrich, Tim Güneysu
2022/1393 (PDF ) Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams Dario Fiore, Ida Tucker
2022/1392 (PDF ) A Faster Third-Order Masking of Lookup Tables Anju Alexander, Annapurna Valiveti, Srinivas Vivek
2022/1391 (PDF ) Efficient Noise Generation Protocols for Differentially Private Multiparty Computation Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida
2022/1390 (PDF ) Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures Reo Eriguchi, Noboru Kunihiro, Koji Nuida
2022/1389 (PDF ) Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren
2022/1388 (PDF ) MIPS Assembly Language Implementation of GIFT-64-128 Encryption William Diehl
2022/1387 (PDF ) AIM: Symmetric Primitive for Shorter Signatures with Stronger Security (Full Version) Seongkwang Kim, Jincheol Ha, Mincheol Son, Byeonghak Lee, Dukjae Moon, Joohee Lee, Sangyub Lee, Jihoon Kwon, Jihoon Cho, Hyojin Yoon, Jooyoung Lee
2022/1386 (PDF ) A multivariate noise-free HE proposal Gerald Gavin, Sandrine Tainturier
2022/1385 (PDF ) Deep Reinforcement Learning-based Rebalancing Policies for Profit Maximization of Relay Nodes in Payment Channel Networks Nikolaos Papadis, Leandros Tassiulas
2022/1384 (PDF ) Non-uniformity and Quantum Advice in the Random Oracle Model Qipeng Liu
2022/1383 (PDF ) Sublinear-Round Broadcast without Trusted Setup against Dishonest Majority Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos
2022/1382 (PDF ) Quagmire ciphers, group theory, and information: Key amplification in crib-based attacks Thomas Kaeding
2022/1381 (PDF ) How to backdoor LWE-like cryptosystems Tobias Hemmert
2022/1380 (PDF ) Post-Quantum Zero-Knowledge with Space-Bounded Simulation Prabhanjan Ananth, Alex B. Grilo
2022/1379 (PDF ) Zero-Knowledge Optimal Monetary Policy under Stochastic Dominance David Cerezo Sánchez
2022/1378 (PDF ) A Fast Hash Family for Memory Integrity Qiming Li, Sampo Sovio
2022/1377 (PDF ) Improved Differential and Linear Trail Bounds for ASCON Solane El Hirch, Silvia Mella, Alireza Mehrdad, Joan Daemen
2022/1376 (PDF ) Modeling Effective Lifespan of Payment Channels Soheil Zibakhsh Shabgahi, Seyed Mahdi Hosseini, Seyed Pooya Shariatpanahi, Behnam Bahrak
2022/1375 (PDF ) From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments Minki Hhan, Tomoyuki Morimae, Takashi Yamakawa
2022/1374 (PDF ) Efficient Public Key Searchable Encryption Schemes from Standard Hard Lattice Problems for Cloud Computing Lijun Qi, Jincheng Zhuang
2022/1373 (PDF ) ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou
2022/1372 (PDF ) Security and Quantum Computing: An Overview Prasannna Ravi, Anupam Chattopadhyay, Shivam Bhasin
2022/1371 (PDF ) On the Security of KOS Benjamin E. Diamond
2022/1370 (PDF ) A New Post-Quantum Key Agreement Protocol and Derived Cryptosystem Based on Rectangular Matrices Hugo Daniel Scolnik, Juan Pedro Hecht
2022/1369 (PDF ) Network-Agnostic Security Comes (Almost) for Free in DKG and MPC Renas Bacho, Daniel Collins, Chen-Da Liu-Zhang, Julian Loss
2022/1368 (PDF ) Functional Commitments for All Functions, with Transparent Setup and from SIS Leo de Castro, Chris Peikert
2022/1367 (PDF ) Agile Cryptography: A Universally Composable Approach Christian Badertscher, Michele Ciampi, Aggelos Kiayias
2022/1366 (PDF ) Two remarks on the vectorization problem Wouter Castryck, Natan Vander Meeren
2022/1365 (PDF ) Chainable Functional Commitments for Unbounded-Depth Circuits David Balbás, Dario Catalano, Dario Fiore, Russell W. F. Lai
2022/1364 (PDF ) On Polynomial Functions Modulo $p^e$ and Faster Bootstrapping for Homomorphic Encryption Robin Geelen, Ilia Iliashenko, Jiayi Kang, Frederik Vercauteren
2022/1363 (PDF ) Bootstrapping for BGV and BFV Revisited Robin Geelen, Frederik Vercauteren
2022/1362 (PDF ) ALLOSAUR: Accumulator with Low-Latency Oblivious Sublinear Anonymous credential Updates with Revocations Samuel Jaques, Michael Lodder, Hart Montgomery
2022/1361 (PDF ) Correlation Electromagnetic Analysis on an FPGA Implementation of CRYSTALS-Kyber Rafael Carrera Rodriguez, Florent Bruguier, Emanuele Valea, Pascal Benoit
2022/1360 (PDF ) One for All, All for One: A Unified Evaluation Framework for Univariate DPA Attacks Jiangshan Long, Chenxu Wang, Changhai Ou, Zhu Wang, Yongbin Zhou, Ming Tang
2022/1359 (PDF ) Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model Haruhisa Kosuge, Keita Xagawa
2022/1358 (PDF ) Commitments to Quantum States Sam Gunn, Nathan Ju, Fermi Ma, Mark Zhandry
2022/1357 (PDF ) A Theory of Composition for Differential Obliviousness Mingxun Zhou, Elaine Shi, T-H. Hubert Chan, Shir Maimon
2022/1356 (PDF ) A fully classical LLL algorithm for modules Gabrielle De Micheli, Daniele Micciancio
2022/1355 (PDF ) HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates Binyi Chen, Benedikt Bünz, Dan Boneh, Zhenfei Zhang
2022/1354 (PDF ) Embracing Hellman: A Simple Proof-of-Space Search consensus algorithm with stable block times using Logarithmic Embargo Marijn F. Stollenga
2022/1353 (PDF ) Anonymous Permutation Routing Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky
2022/1352 (PDF ) aPlonK : Aggregated PlonK from Multi-Polynomial Commitment Schemes Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt, Raphaël R. Toledo
2022/1351 (PDF ) Better Steady than Speedy: Full break of SPEEDY-7-192 Christina Boura, Nicolas David, Rachelle Heim Boissier, Maria Naya-Plasencia
2022/1350 (PDF ) Rai-Choo! Evolving Blind Signatures to the Next Level Lucjan Hanzlik, Julian Loss, Benedikt Wagner
2022/1349 (PDF ) Invertibility of multiple random functions and its application to symmetric ciphers Xiutao Feng, Xiaoshan GAO, Zhangyi WANG, Xiangyong ZENG
2022/1348 (PDF ) ABE for DFA from LWE against Bounded Collusions, Revisited Hoeteck Wee
2022/1347 (PDF ) Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada
2022/1346 (PDF ) Generic Signature from Noisy Systems Trey Li
2022/1345 (PDF ) Revisiting Security Estimation for LWE with Hints from a Geometric Perspective Dana Dachman-Soled, Huijing Gong, Tom Hanson, Hunter Kippen
2022/1344 (PDF ) Discrete Exponential Equations and Noisy Systems Trey Li
2022/1343 (PDF ) Refined Strategy for Solving LWE in Two-step Mode Wenwen Xia, Leizhang Wang, GengWang, Dawu Gu, Baocang Wang
2022/1342 (PDF ) Block Cipher Doubling for a Post-Quantum World Ritam Bhaumik, André Chailloux, Paul Frixons, Bart Mennink, María Naya-Plasencia
2022/1341 (PDF ) LaBRADOR: Compact Proofs for R1CS from Module-SIS Ward Beullens, Gregor Seiler
2022/1340 (PDF ) Understanding the Duplex and Its Security Bart Mennink
2022/1339 (PDF ) CCA-1 Secure Updatable Encryption with Adaptive Security Huanhuan Chen, Yao Jiang Galteland, Kaitai Liang
2022/1338 (PDF ) Privacy-Preserving Authenticated Key Exchange: Stronger Privacy and Generic Constructions Sebastian Ramacher, Daniel Slamanig, Andreas Weninger
2022/1337 (PDF ) How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium Timo Glaser, Alexander May
2022/1336 (PDF ) One-Wayness in Quantum Cryptography Tomoyuki Morimae, Takashi Yamakawa
2022/1335 (PDF ) Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective Kai Hu, Thomas Peyrin, Quan Quan Tan, Trevor Yap
2022/1334 (PDF ) Post-Quantum Signature from Subset Product with Errors Trey Li
2022/1333 (PDF ) Fast Fully Oblivious Compaction and Shuffling Sajin Sasy, Aaron Johnson, Ian Goldberg
2022/1332 (PDF ) On the Classic Protocol for MPC Schnorr Signatures Nikolaos Makriyannis
2022/1331 (PDF ) Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures Dario Catalano, Dario Fiore, Ida Tucker
2022/1330 (PDF ) Hybrid Dual and Meet-LWE Attack Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang
2022/1329 (PDF ) New Time-Memory Trade-Offs for Subset Sum -- Improving ISD in Theory and Practice Andre Esser, Floyd Zweydinger
2022/1328 (PDF ) Revisiting Nearest-Neighbor-Based Information Set Decoding Andre Esser
2022/1327 (PDF ) Post-Quantum Public Key Cryptosystem from Subset Product with Errors Trey Li
2022/1326 (PDF ) Survey: Non-malleable code in the split-state model Divesh Aggarwal, Marshall Ball, Maciej Obremski
2022/1325 (PDF ) Efficient and Complete Formulas for Binary Curves Thomas Pornin
2022/1324 (PDF ) Adaptive Multiparty NIKE Venkata Koppula, Brent Waters, Mark Zhandry
2022/1323 (PDF ) On Constructing One-Way Quantum State Generators, and More Shujiao Cao, Rui Xue
2022/1322 (PDF ) Efficient Linkable Ring Signature from Vector Commitment inexplicably named Multratug Anton A. Sokolov
2022/1321 (PDF ) cuZK: Accelerating Zero-Knowledge Proof with A Faster Parallel Multi-Scalar Multiplication Algorithm on GPUs Tao Lu, Chengkun Wei, Ruijing Yu, Chaochao Chen, Wenjing Fang, Lei Wang, Zeke Wang, Wenzhi Chen
2022/1320 (PDF ) Boosting Batch Arguments and RAM Delegation Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
2022/1319 (PDF ) Post-Quantum Key Exchange from Subset Product With Errors Trey Li
2022/1318 (PDF ) General Partially Fair Multi-Party Computation with VDFs Bolton Bailey, Andrew Miller, Or Sattath
2022/1317 (PDF ) On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption Aayush Jain, Huijia Lin, Ji Luo
2022/1316 (PDF ) TurboPack: Honest Majority MPC with Constant Online Communication Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song
2022/1315 (PDF ) Hitchhiker’s Guide to a Practical Automated TFHE Parameter Setup for Custom Applications Jakub Klemsa
2022/1314 (PDF ) Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer
2022/1313 (PDF ) Bounded Surjective Quadratic Functions over $\mathbb F_p^n$ for MPC-/ZK-/FHE-Friendly Symmetric Primitives Lorenzo Grassi
2022/1312 (PDF ) Multiple Modular Unique Factorization Domain Subset Product with Errors Trey Li
2022/1311 (PDF ) Fully Adaptive Decentralized Multi-Authority ABE Pratish Datta, Ilan Komargodski, Brent Waters
2022/1310 (PDF ) Power Residue Symbol Order Detecting Algorithm for Subset Product over Algebraic Integers Trey Li
2022/1309 (PDF ) MPC as a service using Ethereum Registry Smart Contracts - dCommon CIP Matt Shams(Anis), Bingsheng Zhang, Justinas Zaliaduonis
2022/1308 (PDF ) Jacobi Symbol Parity Checking Algorithm for Subset Product Trey Li
2022/1307 (PDF ) BLOOM: Bimodal Lattice One-Out-of-Many Proofs and Applications Vadim Lyubashevsky, Ngoc Khanh Nguyen
2022/1306 (PDF ) Single-shuffle Full-open Card-based Protocols Imply Private Simultaneous Messages Protocols Kazumasa Shinagawa, Koji Nuida
2022/1305 (PDF ) Subset Product with Errors over Unique Factorization Domains and Ideal Class Groups of Dedekind Domains Trey Li
2022/1304 (PDF ) Unifying Quantum Verification and Error-Detection: Theory and Tools for Optimisations Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier
2022/1303 (PDF ) Fast and Clean: Auditable high-performance assembly via constraint solving Amin Abdulrahman, Hanno Becker, Matthias J. Kannwischer, Fabien Klein
2022/1302 (PDF ) Private Certifier Intersection Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty
2022/1300 (PDF ) Garrison: A Novel Watchtower Scheme for Bitcoin Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
2022/1299 (PDF ) Addax: A fast, private, and accountable ad exchange infrastructure Ke Zhong, Yiping Ma, Yifeng Mao, Sebastian Angel
2022/1298 (PDF ) BLEACH: Cleaning Errors in Discrete Computations over CKKS Nir Drucker, Guy Moshkowich, Tomer Pelleg, Hayim Shaul
2022/1297 (PDF ) Toward a Post-Quantum Zero-Knowledge Verifiable Credential System for Self-Sovereign Identity Simone Dutto, Davide Margaria, Carlo Sanna, Andrea Vesco
2022/1296 (PDF ) Efficient Asymmetric Threshold ECDSA for MPC-based Cold Storage Constantin Blokh, Nikolaos Makriyannis, Udi Peled
2022/1295 (PDF ) Daric: A Storage Efficient Payment Channel With Penalization Mechanism Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
2022/1294 (PDF ) What Can Cryptography Do For Decentralized Mechanism Design? Elaine Shi, Hao Chung, Ke Wu
2022/1293 (PDF ) Improving the Efficiency of Report and Trace Ring Signatures Xavier Bultel, Ashley Fraser, Elizabeth A. Quaglia
2022/1292 (PDF ) Bet-or-Pass: Adversarially Robust Bloom Filters Moni Naor, Noa Oved
2022/1291 (PDF ) sMGM: parameterizable AEAD-mode Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Andrey Bozhko, Stanislav Smyshlyaev
2022/1290 (PDF ) Bool Network: An Open, Distributed, Secure Cross-chain Notary Platform Zeyuan Yin, Bingsheng Zhang, Jingzhong Xu, Kaiyu Lu, Kui Ren
2022/1289 (PDF ) Exploring RNS for Isogeny-based Cryptography David Jacquemin, Ahmet Can Mert, Sujoy Sinha Roy
2022/1288 (PDF ) Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2022/1287 (PDF ) On a Conjecture From a Failed CryptoAnalysis Shengtong Zhang
2022/1286 (PDF ) ZEBRA: SNARK-based Anonymous Credentials for Practical, Private and Accountable On-chain Access Control Deevashwer Rathee, Guru Vamsi Policharla, Tiancheng Xie, Ryan Cottone, Dawn Song
2022/1285 (PDF ) Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption Mohammad Mahmoody, Wei Qi, Ahmadreza Rahimi
2022/1284 (PDF ) (Inner-Product) Functional Encryption with Updatable Ciphertexts Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi
2022/1283 (PDF ) A Note on Reimplementing the Castryck-Decru Attack and Lessons Learned for SageMath Rémy Oudompheng, Giacomo Pope
2022/1282 (PDF ) Comparing Key Rank Estimation Methods Rebecca Young, Luke Mather, Elisabeth Oswald
2022/1281 (PDF ) LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X Zheng Yang, Tien Tuan Anh Dinh, Chao Yin, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou
2022/1280 (PDF ) Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou
2022/1278 (PDF ) Fast Evaluation of S-boxes with Garbled Circuits Erik Pohle, Aysajan Abidin, Bart Preneel
2022/1277 (PDF ) Compact GF(2) systemizer and optimized constant-time hardware sorters for Key Generation in Classic McEliece Yihong Zhu, Wenping Zhu, Chen Chen, Min Zhu, Zhengdong Li, Shaojun Wei, Leibo Liu
2022/1276 (PDF ) Second-Order Low-Randomness $d+1$ Hardware Sharing of the AES Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi
2022/1275 (PDF ) DiAE: Re-rolling the DiSE Alexandre Duc, Robin Müller, Damian Vizár
2022/1274 (PDF ) Self Masking for Hardering Inversions Paweł Cyprys, Shlomi Dolev, Shlomo Moran
2022/1273 (PDF ) A Conjecture From a Failed Cryptanalysis David Naccache, Ofer Yifrach-Stav
2022/1272 (PDF ) PPAD is as Hard as LWE and Iterated Squaring Nir Bitansky, Arka Rai Choudhuri, Justin Holmgren, Chethan Kamath, Alex Lombardi, Omer Paneth, Ron D. Rothblum
2022/1271 (PDF ) Privacy-preserving Federated Singular Value Decomposition Bowen LIU, Balázs Pejó, Qiang TANG
2022/1270 (PDF ) Typing High-Speed Cryptography against Spectre v1 Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, Peter Schwabe, Lucas Tabary-Maujean
2022/1269 (PDF ) Collusion-Resistant Functional Encryption for RAMs Prabhanjan Ananth, Kai-Min Chung, Xiong Fan, Luowen Qian
2022/1268 (PDF ) Cryptographic Role-Based Access Control, Reconsidered Bin Liu, Antonis Michalas, Bogdan Warinschi
2022/1266 (PDF ) Asymptotically Free Broadcast in Constant Expected Time via Packed VSS Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
2022/1265 (PDF ) Universal Ring Signatures in the Standard Model Pedro Branco, Nico Döttling, Stella Wohnig
2022/1264 (PDF ) Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with application to Key Transparency Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou
2022/1263 (PDF ) Steganography-Free Zero-Knowledge Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta
2022/1262 (PDF ) Vectorized Batch Private Information Retrieval Muhammad Haris Mughees, Ling Ren
2022/1261 (PDF ) Breaking RSA Generically is Equivalent to Factoring, with Preprocessing Dana Dachman-Soled, Julian Loss, Adam O'Neill
2022/1260 (PDF ) On Committing Authenticated Encryption John Chan, Phillip Rogaway
2022/1259 (PDF ) Horizontal racewalking using radical isogenies Wouter Castryck, Thomas Decru, Marc Houben, Frederik Vercauteren
2022/1258 (PDF ) Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications Xiangyu Liu, Shengli Liu, Dawu Gu
2022/1257 (PDF ) One-Time Programs from Commodity Hardware Harry Eldridge, Aarushi Goel, Matthew Green, Abhishek Jain, Maximilian Zinkus
2022/1256 (PDF ) EvalRound Algorithm in CKKS Bootstrapping Seonghak Kim, Minji Park, Jaehyung Kim, Taekyung Kim, Chohong Min
2022/1255 (PDF ) PLUME: An ECDSA Nullifier Scheme for Unique Pseudonymity within Zero Knowledge Proofs Aayush Gupta, Kobi Gurkan
2022/1254 (PDF ) Protecting the most significant bits in scalar multiplication algorithms Estuardo Alpirez Bock, Lukasz Chmielewski, Konstantina Miteloudi
2022/1253 (PDF ) A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda
2022/1252 (PDF ) Functional Encryption with Secure Key Leasing Fuyuki Kitagawa, Ryo Nishimaki
2022/1251 (PDF ) Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup Nan Wang, Sid Chi-Kin Chau
2022/1250 (PDF ) Eureka: A General Framework for Black-box Differential Privacy Estimators Yun Lu, Malik Magdon-Ismail, Yu Wei, Vassilis Zikas
2022/1249 (PDF ) On Rejection Sampling in Lyubashevsky's Signature Scheme Julien Devevey, Omar Fawzi, Alain Passelègue, Damien Stehlé
2022/1248 (PDF ) Fully-Secure MPC with Minimal Trust Yuval Ishai, Arpita Patra, Sikhar Patranabis, Divya Ravi, Akshayaram Srinivasan
2022/1247 (PDF ) Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin
2022/1246 (PDF ) Identity-Based Matchmaking Encryption from Standard Assumptions Jie Chen, Yu Li, Jinming Wen, Jian Weng
2022/1245 (PDF ) On generalizations of the Lai-Massey scheme Lorenzo Grassi
2022/1244 (PDF ) A Modular Approach to the Security Analysis of Two-Permutation Constructions Yu Long Chen
2022/1243 (PDF ) Hybrid scalar/vector implementations of Keccak and SPHINCS+ on AArch64 Hanno Becker, Matthias J. Kannwischer
2022/1242 (PDF ) Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies Amos Treiber, Dirk Müllmann, Thomas Schneider, Indra Spiecker genannt Döhmann
2022/1241 (PDF ) Continued Fractions Applied to a Family of RSA-like Cryptosystems George Teseleanu, Paul Cotan
2022/1240 (PDF ) Sherlock Holmes Zero-Knowledge Protocols George Teseleanu
2022/1239 (PDF ) Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu
2022/1238 (PDF ) Secure Quantum Bit Commitment Ping Wang, Yiting Su, Fangguo Zhang
2022/1237 (PDF ) On the Worst-Case Inefficiency of CGKA Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg, Garrison Grogan, Mohammad Hajiabadi, Paul Rösler
2022/1236 (PDF ) Rate-1 Non-Interactive Arguments for Batch-NP and Applications Lalita Devadas, Rishab Goyal, Yael Kalai, Vinod Vaikuntanathan
2022/1235 (PDF ) QCCA-Secure Generic Transformations in the Quantum Random Oracle Model Tianshu Shan, Jiangxia Ge, Rui Xue
2022/1234 (PDF ) Towards Tight Security Bounds for OMAC, XCBC and TMAC Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
2022/1233 (PDF ) Forward-Secure Encryption with Fast Forwarding Yevgeniy Dodis, Daniel Jost, Harish Karthikeyan
2022/1232 (PDF ) The Abe-Okamoto Partially Blind Signature Scheme Revisited Julia Kastner, Julian Loss, Jiayu Xu
2022/1231 (PDF ) Continuously Non-Malleable Codes against Bounded-Depth Tampering Gianluca Brian, Sebastian Faust, Elena Micheli, Daniele Venturi
2022/1230 (PDF ) Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel
2022/1229 (PDF ) Cumulatively All-Lossy-But-One Trapdoor Functions from Standard Assumptions Benoît Libert, Ky Nguyen, Alain Passelègue
2022/1228 (PDF ) SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno
2022/1227 (PDF ) How to Sample a Discrete Gaussian (and more) from a Random Oracle George Lu, Brent Waters
2022/1226 (PDF ) Algebraic Relation of Three MinRank Algebraic Modelings Hao Guo, Jintai Ding
2022/1225 (PDF ) Hybrid Post-Quantum Signatures in Hardware Security Keys Diana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean-Michel Picod, Luca Invernizzi, Elie Bursztein
2022/1224 (PDF ) From Plaintext-extractability to IND-CCA Security Ehsan Ebrahimi
2022/1223 (PDF ) Efficient Proofs of Software Exploitability for Real-world Processors Matthew Green, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer
2022/1222 (PDF ) Homomorphic Encryption on GPU Ali Şah Özcan, Can Ayduman, Enes Recep Türkoğlu, Erkay Savaş
2022/1221 (PDF ) Multi-User Security of the Sum of Truncated Random Permutations (Full Version) Wonseok Choi, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee
2022/1220 (PDF ) Permissionless Clock Synchronization with Public Setup Juan Garay, Aggelos Kiayias, Yu Shen
2022/1219 (PDF ) Anonymous Random Allocation and Its Applications; Generalizing Single Secret Leader Election Azam Soleimanian
2022/1218 (PDF ) Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies Jiahui He, Kai Hu, Bart Preneel, Meiqin Wang
2022/1217 (PDF ) Privacy-Preserving Authenticated Key Exchange in the Standard Model You Lyu, Shengli Liu, Shuai Han, Dawu Gu
2022/1216 (PDF ) A summary on the FRI low degree test Ulrich Haböck
2022/1215 (PDF ) Continuous Authentication in Secure Messaging Benjamin Dowling, Felix Günther, Alexandre Poirrier
2022/1214 (PDF ) Updatable NIZKs from Non-Interactive Zaps Karim Baghery, Navid Ghaedi Bardeh
2022/1213 (PDF ) Nostradamus goes Quantum Barbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert
2022/1212 (PDF ) VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections David Chaum, Richard T. Carback, Jeremy Clark, Chao Liu, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Mario Yaksetig, Zeyuan Yin, Filip Zagórski, Bingsheng Zhang
2022/1211 (PDF ) Arithmetization of Functional Program Execution via Interaction Nets in Halo 2 Anthony Hart
2022/1210 (PDF ) On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC (Full Version) Jiamin Cui, Kai Hu, Meiqin Wang, Puwen Wei
2022/1209 (PDF ) Puncturable Key Wrapping and Its Applications Matilda Backendal, Felix Günther, Kenneth G. Paterson
2022/1208 (PDF ) Notes on Reusable Garbling Hu Yupu, Dong Siyue, Wang Baocang, Liu Jun
2022/1207 (PDF ) Attaining GOD Beyond Honest Majority With Friends and Foes Aditya Hegde, Nishat Koti, Varsha Bhat Kukkala, Shravani Patil, Arpita Patra, Protik Paul
2022/1206 (PDF ) On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2022/1205 (PDF ) Accountable Light Client Systems for Proof-of-Stake Blockchains Oana Ciobotaru, Fatemeh Shirazi, Alistair Stewart, Sergey Vasilyev
2022/1204 (PDF ) The Pseudorandom Oracle Model and Ideal Obfuscation Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs
2022/1203 (PDF ) On Module Unique-SVP and NTRU Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé
2022/1202 (PDF ) Disorientation faults in CSIDH Gustavo Banegas, Juliane Krämer, Tanja Lange, Michael Meyer, Lorenz Panny, Krijn Reijnders, Jana Sotáková, Monika Trimoska
2022/1201 (PDF ) Leakage Certification Made Simple Aakash Chowdhury, Carlo Brunetta, Arnab Roy, Elisabeth Oswald
2022/1200 (PDF ) SEEK: model extraction attack against hybrid secure inference protocols Si Chen, Junfeng Fan
2022/1199 (PDF ) Structure Evaluation of AES-like Ciphers against Mixture Differential Cryptanalysis Xiaofeng Xie, Tian Tian
2022/1198 (PDF ) To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures Alexander Wagner, Felix Oberhansl, Marc Schink
2022/1197 (PDF ) On Squaring Modulo Mersenne Numbers David Naccache, Ofer Yifrach-Stav
2022/1196 (PDF ) Embedded Identity Traceable Identity-Based IPFE from Pairings and Lattices Subhranil Dutta, Tapas Pal, Amit Kumar Singh, Sourav Mukhopadhyay
2022/1195 (PDF ) A Deep Neural Differential Distinguisher for ARX based Block Cipher Debranjan Pal, Upasana Mandal, Mainak Chaudhury, Abhijit Das, Dipanwita Roy Chowdhury
2022/1194 (PDF ) Multi-Authority ABE from Lattices without Random Oracles Brent Waters, Hoeteck Wee, David J. Wu
2022/1193 (PDF ) Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity Yi Deng, Xinxuan Zhang
2022/1192 (PDF ) (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard Anaïs Barthoulot, Olivier Blazy, Sébastien Canard
2022/1191 (PDF ) A New Framework for Quantum Oblivious Transfer Amit Agarwal, James Bartusek, Dakshita Khurana, Nishant Kumar
2022/1190 (PDF ) Statistical Security in Two-Party Computation Revisited Saikrishna Badrinarayanan, Sikhar Patranabis, Pratik Sarkar
2022/1189 (PDF ) CSI-SharK: CSI-FiSh with Sharing-friendly Keys Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
2022/1188 (PDF ) High-order masking of NTRU Jean-Sebastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun
2022/1187 (PDF ) Strongly Anonymous Ratcheted Key Exchange Benjamin Dowling, Eduard Hauck, Doreen Riepel, Paul Rösler
2022/1186 (PDF ) Adversarial Correctness and Privacy for Probabilistic Data Structures Mia Filić, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia
2022/1185 (PDF ) PEA: Practical private epistasis analysis using MPC Kay Hamacher, Tobias Kussel, Thomas Schneider, Oleksandr Tkachenko
2022/1184 (PDF ) On digital signatures based on group actions: QROM security and ring signatures Markus Bläser, Zhili Chen, Dung Hoang Duong, Antoine Joux, Ngoc Tuong Nguyen, Thomas Plantard, Youming Qiao, Willy Susilo, Gang Tang
2022/1183 (PDF ) Fast and Efficient Hardware Implementation of HQC Sanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz, Jakub Szefer
2022/1182 (PDF ) Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co Constantin Cătălin Drăgan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg
2022/1181 (PDF ) On the computational hardness needed for quantum cryptography Zvika Brakerski, Ran Canetti, Luowen Qian
2022/1180 (PDF ) Cryptographic multilinear maps using pro-p groups Delaram Kahrobaei, Mima Stanojkovski
2022/1179 (PDF ) Trustless Cross-chain Communication for Zendoo Sidechains Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
2022/1178 (PDF ) Cryptography with Certified Deletion James Bartusek, Dakshita Khurana
2022/1177 (PDF ) Liberating TFHE: Programmable Bootstrapping with General Quotient Polynomials Marc Joye, Michael Walter
2022/1176 (PDF ) Anonymous Public Key Encryption under Corruptions Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng
2022/1174 (PDF ) Ibex: Privacy-preserving ad conversion tracking and bidding (full version) Ke Zhong, Yiping Ma, Sebastian Angel
2022/1173 (PDF ) Secure Maximum Weight Matching Approximation on General Graphs (Full Version) Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer
2022/1172 (PDF ) On the Security of Keyed Hashing Based on Public Permutations Jonathan Fuchs, Yann Rotella, Joan Daemen
2022/1171 (PDF ) Goldfish: No More Attacks on Ethereum?! Francesco D'Amato, Joachim Neu, Ertem Nusret Tas, David Tse
2022/1170 (PDF ) TRIFORS: LINKable Trilinear Forms Ring Signature Giuseppe D'Alconzo, Andrea Gangemi
2022/1169 (PDF ) DyCAPS: Asynchronous Dynamic-committee Proactive Secret Sharing Bin Hu, Zongyang Zhang, Han Chen, You Zhou, Huazu Jiang, Jianwei Liu
2022/1168 (PDF ) Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality Shweta Agrawal, Rishab Goyal, Junichi Tomida
2022/1167 (PDF ) META-BTS: Bootstrapping Precision Beyond the Limit Youngjin Bae, Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Taekyung Kim
2022/1166 (PDF ) McEliece-type encryption based on Gabidulin codes with no hidden structure Wenshuo Guo, Fang-Wei Fu
2022/1165 (PDF ) A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti
2022/1164 (PDF ) Point-Halving and Subgroup Membership in Twisted Edwards Curves Thomas Pornin
2022/1163 (PDF ) A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding Yuanyuan Zhou, Joop van de Pol, Yu Yu, François-Xavier Standaert
2022/1162 (PDF ) Pairings in Rank-1 Constraint Systems Youssef El Housni
2022/1161 (PDF ) Group-based Cryptography in the Quantum Era Delaram Kahrobaei, Ramón Flores, Marialaura Noce
2022/1160 (PDF ) The Scholz conjecture on addition chain is true for $v(n)= 4$ Amadou TALL
2022/1159 (PDF ) Decomposing Linear Layers Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom
2022/1158 (PDF ) Differential Cryptanalysis of K-Cipher Mohammad Mahzoun, Liliya Kraleva, Raluca Posteuca, Tomer Ashur
2022/1157 (PDF ) Classically Verifiable NIZK for QMA with Preprocessing Tomoyuki Morimae, Takashi Yamakawa
2022/1156 (PDF ) On the security of data markets: controlled Private Function Evaluation István Vajda
2022/1155 (PDF ) Hawk: Module LIP makes Lattice Signatures Fast, Compact and Simple Léo Ducas, Eamonn W. Postlethwaite, Ludo N. Pulles, Wessel van Woerden
2022/1154 (PDF ) Efficient Constant-Time Implementation of SM4 with Intel GFNI instruction set extension and Arm NEON coprocessor Weiji Guo
2022/1153 (PDF ) Sharp: Short Relaxed Range Proofs Geoffroy Couteau, Dahmun Goudarzi, Michael Klooß, Michael Reichle
2022/1152 (PDF ) Fully Collusion Resistant Trace-and-Revoke Functional Encryption for Arbitrary Identities Fucai Luo, Saif Al-Kuwari, Haiyan Wang, Xingfu Yan
2022/1151 (PDF ) A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphael C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu
2022/1150 (PDF ) Farasha: A Provable Permutation-based Parallelizable PRF Najwa Aaraj, Emanuele Bellin, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit, Eugenio Salazar
2022/1149 (PDF ) Secure Anycast Channels with Applications to 4G and 5G Handovers Karl Norrman
2022/1148 (PDF ) On Security Against Time Traveling Adversaries Lúcás Críostóir Meier
2022/1147 (PDF ) Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks Hosein Hadipour, Sadegh Sadeghi, Maria Eichlseder
2022/1146 (PDF ) A Sponge-Based PRF with Good Multi-user Security Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
2022/1145 (PDF ) Yafa-108/146: Implementing ed25519-embedding Cocks-Pinch curves in arkworks-rs Rami Akeela, Weikeng Chen
2022/1144 (PDF ) On the Higher bit Version of Approximate Inhomogeneous Short Integer Solution Problem Anaëlle Le Dévéhat, Hiroki Shizuya, Shingo Hasegawa
2022/1143 (PDF ) Threshold Linearly Homomorphic Encryption on $\mathbf{Z}/2^k\mathbf{Z}$ Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
2022/1142 (PDF ) Secure Message Authentication in the Presence of Leakage and Faults Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert
2022/1141 (PDF ) An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes Enrico Piccione, Samuele Andreoli, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Svetla Nikova, George Petrides, Vincent Rijmen
2022/1140 (PDF ) Witness Encryption and Null-IO from Evasive LWE Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs
2022/1139 (PDF ) Formal Security Definition of Metadata-Private Messaging Shengtong Zhang, Arvid Lunnemark, Sualeh Asif
2022/1138 (PDF ) Designated-Verifier Linkable Ring Signatures with unconditional anonymity Danai Balla, Pourandokht Behrouz, Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou, Giannis Vrettos
2022/1137 (PDF ) Private Computation On Set Intersection With Sublinear Communication Jonas Janneck, Anselme Tueno, Jörn Kußmaul, Matthew Akram
2022/1136 (PDF ) The Tropical Version of ElGamal Encryption Any Muanalifah, Ayus Riana Isnawati
2022/1135 (PDF ) Full Quantum Equivalence of Group Action DLog and CDH, and More Hart Montgomery, Mark Zhandry
2022/1134 (PDF ) An improved method for predicting truncated multiple recursive generators with unknown parameters Han-Bing Yu, Qun-Xiong Zheng, Yi-Jian Liu, Jing-Guo Bi, Yu-Fei Duan, Jing-Wen Xue, You Wu, Yue Cao, Rong Cheng, Lin Wang, Bai-Shun Sun
2022/1133 (PDF ) Secure Batch Deduplication Without Dual Servers in Backup System Haoyu Zheng, Shengke Zeng, Hongwei Li, Zhijun Li
2022/1132 (PDF ) Kryvos: Publicly Tally-Hiding Verifiable E-Voting Nicolas Huber, Ralf Kuesters, Toomas Krips, Julian Liedtke, Johannes Mueller, Daniel Rausch, Pascal Reisert, Andreas Vogt
2022/1131 (PDF ) CINI MINIS: Domain Isolation for Fault and Combined Security Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
2022/1130 (PDF ) Subterm-based proof techniques for improving the automation and scope of security protocol analysis Cas Cremers, Charlie Jacomme, Philip Lukert
2022/1128 (PDF ) On the (im)possibility of ElGamal blind signatures Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Stanislav Smyshlyaev
2022/1127 (PDF ) GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2022/1126 (PDF ) Explicit infinite families of bent functions outside $\mathcal{MM}^\#$ Enes Pasalic, Amar Bapić, Fengrong Zhang, Yongzhuang Wei
2022/1125 (PDF ) A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack Daniel J. Bernstein
2022/1124 (PDF ) Unbounded Quadratic Functional Encryption and More from Pairings Junichi Tomida
2022/1123 (PDF ) Depending on DEEPAND: Cryptanalysis of NLFSR-based Lightweight Ciphers TinyJAMBU, KATAN and KTANTAN Amit Jana, Mostafizar Rahman, Dhiman Saha
2022/1122 (PDF ) Practical Related-Key Forgery Attacks on the Full TinyJAMBU-192/256 Orr Dunkelman, Eran Lambooij, Shibam Ghosh
2022/1121 (PDF ) Practical Attacks on Full-round FRIET Senpeng wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi
2022/1120 (PDF ) VMEO: Vector Modeling Errors and Operands for Approximate adders Vishesh Mishra, Urbi Chatterjee
2022/1119 (PDF ) PESCA: A Privacy-Enhancing Smart-Contract Architecture Wei Dai
2022/1118 (PDF ) PentaGOD: Stepping beyond Traditional GOD with Five Parties Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2022/1117 (PDF ) Two-Round Multi-Signatures from Okamoto Signatures Kwangsu Lee, Hyoseung Kim
2022/1116 (PDF ) Automatic Certified Verification of Cryptographic Programs with COQCRYPTOLINE Ming-Hsien Tsai, Yu-Fu Fu, Xiaomu Shi, Jiaxiang Liu, Bow-Yaw Wang, Bo-Yin Yang
2022/1115 (PDF ) Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang
2022/1114 (PDF ) Multi-User Dynamic Searchable Symmetric Encryption with Corrupted Participants Javad Ghareh Chamani, Yun Wang, Dimitrios Papadopoulos, Mingyang Zhang, Rasool Jalili
2022/1113 (PDF ) A new algorithm for solving the rSUM problem Valerii Sopin
2022/1112 (PDF ) Ergodic dynamical systems over the Cartesian power of the ring of p-adic integers Valerii Sopin
2022/1111 (PDF ) A tale of two models: formal verification of KEMTLS via Tamarin Sofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers
2022/1110 (PDF ) Invisible Formula Attacks David Naccache, Ofer Yifrach-Stav
2022/1109 (PDF ) A Note on Copy-Protection from Random Oracles Prabhanjan Ananth, Fatih Kaleoglu
2022/1108 (PDF ) Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model Daniel Apon, Chloe Cachet, Benjamin Fuller, Peter Hall, Feng-Hao Liu
2022/1107 (PDF ) Projective Geometry of Hessian Elliptic Curves and Genus 2 Triple Covers of Cubics Rémy Oudompheng
2022/1106 (PDF ) Towards Practical Topology-Hiding Computation Shuaishuai Li
2022/1105 (PDF ) Arithmetization of Σ¹₁ relations with polynomial bounds in Halo 2 Anthony Hart, Morgan Thomas
2022/1104 (PDF ) $\mu$Cash: Transparent Anonymous Transactions Liam Eagen
2022/1103 (PDF ) Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny using Precedence-Constrained Scheduling Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan
2022/1102 (PDF ) Proofs of Quantumness from Trapdoor Permutations Tomoyuki Morimae, Takashi Yamakawa
2022/1101 (PDF ) Solutions to quantum weak coin flipping Atul Singh Arora, Jérémie Roland, Chrysoula Vlachou, Stephan Weis
2022/1100 (PDF ) Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited Gianluca Brian, Antonio Faonio, João Ribeiro, Daniele Venturi
2022/1099 (PDF ) One-Hot Conversion: Towards Faster Table-based A2B Conversion Jan-Pieter D'Anvers
2022/1098 (PDF ) SoK: Security Evaluation of SBox-Based Block Ciphers Joelle Lim, Derrick Ng, Ruth Ng
2022/1097 (PDF ) Post-Quantum Security of Tweakable Even-Mansour, and Applications Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz, Patrick Struck
2022/1096 (PDF ) TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries Arnab Bag, Debadrita Talapatra, Ayushi Rastogi, Sikhar Patranabis, Debdeep Mukhopadhyay
2022/1095 (PDF ) Toffoli gate count Optimized Space-Efficient Quantum Circuit for Binary Field Multiplication KIM, SUNYEOP, KIM, INSUNG, Seonggyeom Kim, Seokhie Hong
2022/1094 (PDF ) Secure Integrated Sensing and Communication Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener
2022/1093 (PDF ) HPKA: A High-Performance CRYSTALS-Kyber Accelerator Exploring Efficient Pipelining Ziying Ni, Ayesha Khalid, Dur-e-Shahwar Kundi, Máire O’Neill, Weiqiang Liu
2022/1092 (PDF ) On NTRU-ν-um Modulo $X^N − 1$ Marc Joye
2022/1091 (PDF ) Mul-IBS: A Multivariate Identity-Based Signature Scheme Compatible with IoT-based NDN Architecture Sumit Kumar Debnath, Sihem Mesnager, Vikas Srivastava, Saibal Kumar Pal, Nibedita Kundu
2022/1090 (PDF ) How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert
2022/1088 (PDF ) Tighter trail bounds for Xoodoo Joan Daemen, Silvia Mella, Gilles Van Assche
2022/1087 (PDF ) I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis Guilherme Perin, Sengim Karayalcin, Lichao Wu, Stjepan Picek
2022/1086 (PDF ) KaLi: A Crystal for Post-Quantum Security using Kyber and Dilithium Aikata Aikata, Ahmet Can Mert, Malik Imran, Samuel Pagliarini, Sujoy Sinha Roy
2022/1084 (PDF ) Glass-Vault: A Generic Transparent Privacy-preserving Exposure Notification Analytics Platform Lorenzo Martinico, Aydin Abadi, Thomas Zacharias, Thomas Win
2022/1083 (PDF ) Enigmap : External-Memory Oblivious Map for Secure Enclaves Afonso Tinoco, Sixiang Gao, Elaine Shi
2022/1082 (PDF ) Assisted Private Information Retrieval Natnatee Dokmai, L. Jean Camp, Ryan Henry
2022/1081 (PDF ) Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception Xavier Bultel, Cristina Onete
2022/1079 (PDF ) The inspection model for zero-knowledge proofs and efficient Zerocash with secp256k1 keys Huachuang Sun, Haifeng Sun, Kevin Singh, Akhil Sai Peddireddy, Harshad Patil, Jianwei Liu, Weikeng Chen
2022/1078 (PDF ) Skip Ratchet: A Hierarchical Hash System Brooklyn Zelenka
2022/1077 (PDF ) New Bounds on the Multiplicative Complexity of Boolean Functions Meltem Sonmez Turan
2022/1076 (PDF ) Range Search over Encrypted Multi-Attribute Data Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia
2022/1075 (PDF ) Secure Branching Program Evaluation Jonas Janneck, Anas Boudi, Anselme Tueno, Matthew Akram
2022/1074 (PDF ) On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP Juliane Krämer, Patrick Struck
2022/1073 (PDF ) Fixing Issues and Achieving Maliciously Secure Verifiable Aggregation in ``VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning'' Xiaojie Guo
2022/1072 (PDF ) Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification Alexandre Belling, Azam Soleimanian, Olivier Bégassat
2022/1071 (PDF ) Performance Evaluation of NIST LWC Finalists on AVR ATmega and ARM Cortex-M3 Microcontrollers Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida
2022/1070 (PDF ) Efficient Unique Ring Signatures From Lattices Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto
2022/1069 (PDF ) A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and its Relation to the Random Oracle Model Marten van Dijk, Chenglu Jin
2022/1068 (PDF ) Evaluating isogenies in polylogarithmic time Damien Robert
2022/1067 (PDF ) Lattice Enumeration with Discrete Pruning: Improvement, Cost Estimation and Optimal Parameters Luan Luan, Chunxiang Gu, Yonghui Zheng, Yanan Shi
2022/1066 (PDF ) FairBlock: Preventing Blockchain Front-running with Minimal Overheads Peyman Momeni, Sergey Gorbunov, Bohan Zhang
2022/1065 (PDF ) A Note on the Theoretical and Practical Security of Block Ciphers Öznur MUT SAĞDIÇOĞLU, Serhat Sağdıçoğlu, Ebru Küçükkubaş
2022/1064 (PDF ) Lattice Reduction Meets Key-Mismatch: New Misuse Attack on Lattice-Based NIST Candidate KEMs Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang
2022/1063 (PDF ) Rapidash: Atomic Swaps Secure under User-Miner Collusion Hao Chung, Elisaweta Masserova, Elaine Shi, Sri AravindaKrishnan Thyagarajan
2022/1062 (PDF ) A Password-Based Access Control Framework for Time-Sequence Aware Media Cloudization Haiyan Wang
2022/1061 (PDF ) Breaking Category Five SPHINCS+ with SHA-256 Ray Perlner, John Kelsey, David Cooper
2022/1060 (PDF ) Programmable Distributed Point Functions Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov
2022/1059 (PDF ) Classification of all DO planar polynomials with prime field coefficients over GF(3^n) for n up to 7 Diana Davidova, Nikolay Kaleyski
2022/1058 (PDF ) Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham
2022/1057 (PDF ) Rebound Attacks on SKINNY Hashing with Automatic Tools Shun Li, Guozhen Liu, Phuong Pham
2022/1056 (PDF ) Linear-Time Probabilistic Proofs with Sublinear Verification for Algebraic Automata Over Every Field Jonathan Bootle, Alessandro Chiesa, Ziyi Guan, Siqi Liu
2022/1055 (PDF ) Exploring Integrity of AEADs with Faults: Definitions and Constructions Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin
2022/1054 (PDF ) SIDH with masked torsion point images Tako Boris Fouotsa
2022/1053 (PDF ) Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
2022/1052 (PDF ) Double-Odd Jacobi Quartic Thomas Pornin
2022/1051 (PDF ) How to Verifiably Encrypt Many Bits for an Election? Henri Devillez, Olivier Pereira, Thomas Peters
2022/1050 (PDF ) RapidUp: Multi-Domain Permutation Protocol for Lookup Tables Héctor Masip Ardevol, Jordi Baylina Melé, Daniel Lubarov, José L. Muñoz-Tapia
2022/1049 (PDF ) Post Quantum Design in SPDM for Device Authentication and Key Establishment Jiewen Yao, Krystian Matusiewicz, Vincent Zimmer
2022/1048 (PDF ) Practical Sublinear Proofs for R1CS from Lattices Ngoc Khanh Nguyen, Gregor Seiler
2022/1047 (PDF ) Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
2022/1046 (PDF ) Post-Quantum Multi-Recipient Public Key Encryption Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe
2022/1045 (PDF ) On UC-Secure Range Extension and Batch Verification for ECVRF Christian Badertscher, Peter Gaži, Iñigo Querejeta-Azurmendi, Alexander Russell
2022/1044 (PDF ) Oblivious Revocable Functions and Encrypted Indexing Kevin Lewi, Jon Millican, Ananth Raghunathan, Arnab Roy
2022/1043 (PDF ) A Study of Error Floor Behavior in QC-MDPC Codes Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray Perlner, Angela Robinson
2022/1042 (PDF ) Weak Subtweakeys in SKINNY Daniël Kuijsters, Denise Verbakel, Joan Daemen
2022/1041 (PDF ) Lattice-Based Cryptography in Miden VM Alan Szepieniec, Frederik Vercauteren
2022/1040 (PDF ) A framework for constructing Single Secret Leader Election from MPC Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov
2022/1039 (PDF ) Theoretical Limits of Provable Security Against Model Extraction by Efficient Observational Defenses Ari Karchmer
2022/1038 (PDF ) Breaking SIDH in polynomial time Damien Robert
2022/1037 (PDF ) RPM: Robust Anonymity at Scale Donghang Lu, Aniket Kate
2022/1036 (PDF ) MuSig-L: Lattice-Based Multi-Signature With Single-Round Online Phase Cecilia Boschini, Akira Takahashi, Mehdi Tibouchi
2022/1035 (PDF ) Efficient Pseudorandom Correlation Generators from Ring-LPN Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
2022/1034 (PDF ) Finding All Impossible Differentials When Considering the DDT Kai Hu, Thomas Peyrin, Meiqin Wang
2022/1033 (PDF ) A Complete Characterization of Security for Linicrypt Block Cipher Modes Tommy Hollenberg, Mike Rosulek, Lawrence Roy
2022/1032 (PDF ) On Non-uniform Security for Black-box Non-Interactive CCA Commitments Rachit Garg, Dakshita Khurana, George Lu, Brent Waters
2022/1031 (PDF ) Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem Magali Bardet, Pierre Briaud, Maxime Bros, Philippe Gaborit, Jean-Pierre Tillich
2022/1030 (PDF ) Oblivious Extractors and Improved Security in Biometric-based Authentication Systems Ivan De Oliveira Nunes, Peter Rindal, Maliheh Shirvanian
2022/1029 (PDF ) FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation Nina Bindel, Cas Cremers, Mang Zhao
2022/1028 (PDF ) New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen
2022/1027 (PDF ) Maliciously Secure Massively Parallel Computation for All-but-One Corruptions Rex Fernando, Yuval Gelles, Ilan Komargodski, Elaine Shi
2022/1026 (PDF ) An attack on SIDH with arbitrary starting curve Luciano Maino, Chloe Martindale
2022/1025 (PDF ) Parallelizable Delegation from LWE Cody Freitag, Rafael Pass, Naomi Sirkin
2022/1024 (PDF ) Multi-Input Attribute Based Encryption and Predicate Encryption Shweta Agrawal, Anshu Yadav, Shota Yamada
2022/1023 (PDF ) SIM: Secure Interval Membership Testing and Applications to Secure Comparison Albert Yu, Donghang Lu, Aniket Kate, Hemanta K. Maji
2022/1022 (PDF ) New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe
2022/1021 (PDF ) Practical Statistically-Sound Proofs of Exponentiation in any Group Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
2022/1020 (PDF ) Uncle Maker: (Time)Stamping Out The Competition in Ethereum Aviv Yaish, Gilad Stern, Aviv Zohar
2022/1019 (PDF ) Masked-degree SIDH Tomoki Moriya
2022/1018 (PDF ) Time-Deniable Signatures Gabrielle Beck, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Pratyush Ranjan Tiwari
2022/1017 (PDF ) PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords Gareth T. Davies, Jeroen Pijnenburg
2022/1016 (PDF ) Public Key Authenticated Encryption with Keyword Search from LWE Leixiao Cheng, Fei Meng
2022/1015 (PDF ) Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes Maya Chartouny, Jacques Patarin, Ambre Toulemonde
2022/1014 (PDF ) Correlated Pseudorandomness from Expand-Accumulate Codes Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
2022/1013 (PDF ) Dynamic Local Searchable Symmetric Encryption Brice Minaud, Michael Reichle
2022/1012 (PDF ) Nonce-Misuse Resilience of Romulus-N and GIFT-COFB Akiko Inoue, Chun Guo, Kazuhiko Minematsu
2022/1011 (PDF ) Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching Gayathri Garimella, Mike Rosulek, Jaspal Singh
2022/1010 (PDF ) Orion: Zero Knowledge Proof with Linear Prover Time Tiancheng Xie, Yupeng Zhang, Dawn Song
2022/1009 (PDF ) Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski
2022/1008 (PDF ) Multimodal Private Signatures Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang
2022/1007 (PDF ) zkQMC: Zero-Knowledge Proofs For (Some) Probabilistic Computations Using Quasi-Randomness Zachary DeStefano, Dani Barrack, Michael Dixon
2022/1006 (PDF ) A Forward-secure Efficient Two-factor Authentication Protocol Steven J. Murdoch, Aydin Abadi
2022/1005 (PDF ) PUF-COTE: A PUF Construction with Challenge Obfuscation and Throughput Enhancement Boyapally Harishma, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay
2022/1004 (PDF ) Interactive Non-Malleable Codes Against Desynchronizing Attacks in the Multi-Party Setting Nils Fleischhacker, Suparno Ghoshal, Mark Simkin
2022/1003 (PDF ) Orbis Specification Language: a type theory for zk-SNARK programming Morgan Thomas
2022/1002 (PDF ) Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps Felix Engelmann, Thomas Kerber, Markulf Kohlweiss, Mikhail Volkhov
2022/1001 (PDF ) Quantum Security of FOX Construction based on Lai-Massey Scheme Amit Kumar Chauhan, Somitra Sanadhya
2022/1000 (PDF ) Statistical Decoding 2.0: Reducing Decoding to LPN Kevin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Jean-Pierre Tillich
2022/999 (PDF ) PipeMSM: Hardware Acceleration for Multi-Scalar Multiplication Charles. F. Xavier
2022/998 (PDF ) On the Hardness of the Finite Field Isomorphism Problem Dipayan Das, Antoine Joux
2022/997 (PDF ) Key-Recovery Attacks on CRAFT and WARP (Full Version) Ling Sun, Wei Wang, Meiqin Wang
2022/996 (PDF ) Fast Hashing to $\mathbb{G}_2$ on Pairing-friendly Curves with the Lack of Twists Yu Dai, Fangguo Zhang, Chang-An Zhao
2022/995 (PDF ) Sequential Digital Signatures for Cryptographic Software-Update Authentication Bertram Poettering, Simon Rastikian
2022/994 (PDF ) Faster Sounder Succinct Arguments and IOPs Justin Holmgren, Ron Rothblum
2022/993 (PDF ) A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Xiangwen Yang, Raymond K. Zhao
2022/992 (PDF ) An $\mathcal{O}(n)$ Algorithm for Coefficient Grouping Fukang Liu
2022/991 (PDF ) Coefficient Grouping: Breaking Chaghri and More Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe
2022/990 (PDF ) Efficient Computation of (2^n,2^n)-Isogenies Sabrina Kunzweiler
2022/989 (PDF ) Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key Jingwei Jiang, Ding Wang, Guoyin Zhang, Zhiyuan Chen
2022/988 (PDF ) Modeling and Simulating the Sample Complexity of solving LWE using BKW-Style Algorithms Qian Guo, Erik Mårtensson, Paul Stankovski Wagner
2022/987 (PDF ) A Signature-Based Gröbner Basis Algorithm with Tail-Reduced Reductors (M5GB) Manuel Hauke, Lukas Lamster, Reinhard Lüftenegger, Christian Rechberger
2022/986 (PDF ) Quantum Attacks on Lai-Massey Structure Shuping Mao, Tingting Guo, Peng Wang, Lei Hu
2022/985 (PDF ) Privacy when Everyone is Watching: An SOK on Anonymity on the Blockchain Roy Rinberg, Nilaksh Agarwal
2022/984 (PDF ) ToSHI - Towards Secure Heterogeneous Integration: Security Risks, Threat Assessment, and Assurance Nidish Vashistha, Md Latifur Rahman, Md Saad Ul Haque, Azim Uddin, Md Sami Ul Islam Sami, Amit Mazumder Shuo, Paul Calzada, Farimah Farahmandi, Navid Asadizanjani, Fahim Rahman, Mark Tehranipoor
2022/983 (PDF ) Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber Qian Guo, Erik Mårtensson
2022/982 (PDF ) Random-Index Oblivious RAM Shai Halevi, Eyal Kushilevitz
2022/981 (PDF ) FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval Alex Davidson, Gonçalo Pestana, Sofía Celi
2022/980 (PDF ) Fast norm computation in smooth-degree Abelian number fields Daniel J. Bernstein
2022/978 (PDF ) Non-Malleable Multi-Party Computation Fuchun Lin
2022/977 (PDF ) Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang
2022/976 (PDF ) Paras - A Private NFT Protocol Vanishree Rao
2022/975 (PDF ) An efficient key recovery attack on SIDH Wouter Castryck, Thomas Decru
2022/974 (PDF ) PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies Amirreza Sarencheh, Aggelos Kiayias, Markulf Kohlweiss
2022/973 (PDF ) MR-DSS – Smaller MinRank-based (Ring-)Signatures Emanuele Bellini, Andre Esser, Carlo Sanna, Javier Verbel
2022/972 (PDF ) Keyed Streebog is a secure PRF and MAC Vitaly Kiryukhin
2022/971 (PDF ) Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller
2022/970 (PDF ) Related-key attacks on the compression function of Streebog Vitaly Kiryukhin
2022/969 (PDF ) Certified Everlasting Functional Encryption Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2022/967 (PDF ) On the Computational Hardness of the Code Equivalence Problem in Cryptography Alessandro Barenghi, Jean-Francois Biasse, Edoardo Persichetti, Paolo Santini
2022/966 (PDF ) On Linear Complexity of Finite Sequences : Coding Theory and Applications to Cryptography Edoardo Persichetti, Tovohery Randrianarisoa
2022/965 (PDF ) PROLEAD - A Probing-Based Hardware Leakage Detection Tool Nicolai Müller, Amir Moradi
2022/964 (PDF ) Hybrid Decoding -- Classical-Quantum Trade-Offs for Information Set Decoding Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José Ignacio Latorre, Marc Manzano
2022/963 (PDF ) Resolving the Doubts: On the Construction and Use of ResNets for Side-channel Analysis Sengim Karayalcin, Stjepan Picek
2022/962 (PDF ) Group Signatures with Designated Traceability over Openers' Attributes Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa
2022/961 (PDF ) Secure and Efficient Implicit Certificates: Improving the Performance for Host Identity Protocol in IoT Zhaokang Lu, Jianzhu Lu
2022/960 (PDF ) Scan, Shuffle, Rescan: Machine-Assisted Election Audits With Untrusted Scanners Douglas W. Jones, Sunoo Park, Ronald L. Rivest, Adam Sealfon
2022/959 (PDF ) MEGA: Malleable Encryption Goes Awry Matilda Backendal, Miro Haller, Kenneth G. Paterson
2022/958 (PDF ) Get Me out of This Payment! Bailout: An HTLC Re-routing Protocol Oguzhan Ersoy, Pedro Moreno-Sanchez, Stefanie Roos
2022/957 (PDF ) Caulk+: Table-independent lookup arguments Jim Posen, Assimakis A. Kattis
2022/956 (PDF ) Improved Plantard Arithmetic for Lattice-based Cryptography Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen
2022/955 (PDF ) A Small GIFT-COFB: Lightweight Bit-Serial Architectures Andrea Caforio, Daniel Collins, Subhadeep Banik, Francesco Regazzoni
2022/954 (PDF ) XOR Compositions of Physically Related Functions Harishma Boyapally, Sikhar Patranabis, Debdeep Mukhopadhyay
2022/953 (PDF ) Big Brother Is Watching You: A Closer Look At Backdoor Construction Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi
2022/952 (PDF ) When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer Michael Fahr Jr., Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray Perlner, Arkady Yerukhimovich, Daniel Apon
2022/951 (PDF ) MixCT: Mixing Confidential Transactions from Homomorphic Commitment Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu
2022/950 (PDF ) Private Balance-Checking on Blockchain Accounts Using Private Integer Addition Birenjith Sasidharan, Emanuele Viterbo
2022/949 (PDF ) One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan
2022/947 (PDF ) Volume and Access Pattern Leakage-abuse Attack with Leaked Documents Steven Lambregts, Huanhuan Chen, Jianting Ning, Kaitai Liang
2022/946 (PDF ) ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik
2022/945 (PDF ) Searchable Encryption with randomized ciphertext and randomized keyword search Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa
2022/944 (PDF ) Two-Round MPC without Round Collapsing Revisited -- Towards Efficient Malicious Protocols Huijia Lin, Tianren Liu
2022/943 (PDF ) DiSSECT: Distinguisher of Standard & Simulated Elliptic Curves via Traits Vladimir Sedlacek, Vojtech Suchanek, Antonin Dufka, Marek Sys, Vashek Matyas
2022/942 (PDF ) Foundations of Coin Mixing Services Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri AravindaKrishnan Thyagarajan
2022/941 (PDF ) Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable Martin R. Albrecht, Valerio Cini, Russell W. F. Lai, Giulio Malavolta, Sri AravindaKrishnan Thyagarajan
2022/940 (PDF ) Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma
2022/939 (PDF ) Multi-party Private Function Evaluation for RAM Keyu Ji, Bingsheng Zhang, Tianpei Lu, Kui Ren
2022/938 (PDF ) Truncated EdDSA/ECDSA Signatures Thomas Pornin
2022/937 (PDF ) Post-quantum Plaintext-awareness Ehsan Ebrahimi, Jeroen van Wier
2022/936 (PDF ) PROBONITE : PRivate One-Branch-Only Non-Interactive decision Tree Evaluation Sofiane Azogagh, Victor Delfour, Sébastien Gambs, Marc-Olivier Killijian
2022/935 (PDF ) SALSA: Attacking Lattice Cryptography with Transformers Emily Wenger, Mingjie Chen, Francois Charton, Kristin Lauter
2022/934 (PDF ) On Secure Computation of Solitary Output Functionalities With and Without Broadcast Bar Alon, Eran Omri
2022/933 (PDF ) Secure Quantized Training for Deep Learning Marcel Keller, Ke Sun
2022/932 (PDF ) Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu
2022/931 (PDF ) Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D'Anvers, Shivam Bhasin, Anupam Chattopadhyay
2022/930 (PDF ) Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4 Erdem Alkim, Vincent Hwang, Bo-Yin Yang
2022/929 (PDF ) PH = PSPACE Valerii Sopin
2022/928 (PDF ) Universal Gaussian Elimination Hardware for Cryptographic Purposes Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang
2022/927 (PDF ) Fit The Joint Moments - How to Attack any Masking Schemes Valence Cristiani, Maxime Lecomte, Thomas Hiscock, Philippe Maurine
2022/926 (PDF ) Zero-Knowledge in EasyCrypt Denis Firsov, Dominique Unruh
2022/925 (PDF ) Ad Hoc Broadcast, Trace, and Revoke --- Plus Time-Space Trade-Offs for Attribute-Based Encryption Ji Luo
2022/924 (PDF ) FICS PCB X-ray: A dataset for automated printed circuit board inter-layers inspection Dhwani Mehta, John True, Olivia P. Dizon-Paradis, Nathan Jessurun, Damon L. Woodard, Navid Asadizanjani, Mark Tehranipoor
2022/923 (PDF ) All for one and one for all: Fully decentralised privacy-preserving dark pool trading using multi-party computation Mariana Botelho da Gama, John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
2022/922 (PDF ) Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm Léo Ducas
2022/921 (PDF ) Low-Delay 4, 5 and 6-Term Karatsuba Formulae in $\mathbb{F}_2[x]$ Using Overlap-free Splitting Haining Fan
2022/920 (PDF ) Distributed, Private, Sparse Histograms in the Two-Server Model James Bell, Adria Gascon, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann
2022/919 (PDF ) Side-Channel Attacks on Lattice-Based KEMs Are Not Prevented by Higher-Order Masking Kalle Ngo, Ruize Wang, Elena Dubrova, Nils Paulsrud
2022/918 (PDF ) Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds Wonseok Choi, Jooyoung Lee, Yeongmin Lee
2022/917 (PDF ) Almost-Surely Terminating Asynchronous Byzantine Agreement Against General Adversaries with Optimal Resilience Ashish Choudhury
2022/916 (PDF ) Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks Melissa Azouaoui, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal
2022/915 (PDF ) OpenFHE: Open-Source Fully Homomorphic Encryption Library Ahmad Al Badawi, Andreea Alexandru, Jack Bates, Flavio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Carlo Pascoe, Yuriy Polyakov, Ian Quah, Saraswathy R.V., Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, Vincent Zucca
2022/914 (PDF ) The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications Keegan Ryan, Nadia Heninger
2022/913 (PDF ) On the Communication Efficiency of Statistically-Secure Asynchronous MPC with Optimal Resilience Ashish Choudhury, Arpita Patra
2022/912 (PDF ) Individual Discrete Logarithm with Sublattice Reduction Haetham AL ASWAD, Cécile PIERROT
2022/911 (PDF ) Some Security Arguments For Xifrat1 Jianfang "Danny" Niu
2022/909 (PDF ) Multi-Instance Secure Public-Key Encryption Carlo Brunetta, Hans Heum, Martijn Stam
2022/908 (PDF ) On fast computations of numerical parameters of homogeneous algebraic graphs of large girth and small diameter and encryption of large files. Tymoteusz Chojecki, Vasyl Ustimenko
2022/907 (PDF ) A New Approach to Post-Quantum Non-Malleability Xiao Liang, Omkant Pandey, Takashi Yamakawa
2022/906 (PDF ) A Random Oracle for All of Us Marc Fischlin, Felix Rohrbach, Tobias Schmalz
2022/905 (PDF ) Tight Security Analysis of the Public Permutation-Based PMAC_Plus Avijit Dutta, Mridul Nandi, Suprita Talnikar
2022/904 (PDF ) Patient Zero and Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE Fabio Campos, Michael Meyer, Krijn Reijnders, Marc Stöttinger
2022/903 (PDF ) Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert
2022/902 (PDF ) MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably Bar Alon, Moni Naor, Eran Omri, Uri Stemmer
2022/901 (PDF ) Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . . Itamar Levi, Carmit Hazay
2022/900 (PDF ) On the key generation in SQISign Hiroshi Onuki
2022/899 (PDF ) Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi
2022/898 (PDF ) Ferveo: Threshold Decryption for Mempool Privacy in BFT networks Joseph Bebel, Dev Ojha
2022/897 (PDF ) Constrained Pseudorandom Functions from Pseudorandom Synthesizers Zachary A Kissel
2022/896 (PDF ) Post-quantum hash functions using $\mathrm{SL}_n(\mathbb{F}_p)$ Corentin Le Coz, Christopher Battarbee, Ramón Flores, Thomas Koberda, Delaram Kahrobaei
2022/895 (PDF ) Security Analysis of RSA-BSSA Anna Lysyanskaya
2022/894 (PDF ) Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, Xiaohua Jia
2022/893 (PDF ) NJS: Database Protection Algorithm Edimar Veríssimo da Silva
2022/892 (PDF ) Piranha: A GPU Platform for Secure Computation Jean-Luc Watson, Sameer Wagh, Raluca Ada Popa
2022/891 (PDF ) Secure Physical Design Sukanta Dey, Jungmin Park, Nitin Pundir, Dipayan Saha, Amit Mazumder Shuvo, Dhwani Mehta, Navid Asadi, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2022/890 (PDF ) One Network to rule them all. An autoencoder approach to encode datasets Cristian-Alexandru Botocan
2022/889 (PDF ) Quantum Rewinding for Many-Round Protocols Russell W. F. Lai, Giulio Malavolta, Nicholas Spooner
2022/888 (PDF ) Tweakable Sleeve: A Novel Sleeve Construction based on Tweakable Hash Functions David Chaum, Mario Larangeira, Mario Yaksetig
2022/887 (PDF ) Round-Optimal Black-Box Protocol Compilers Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2022/886 (PDF ) Deep Learning based Cryptanalysis of Lightweight Block Ciphers, Revisited Hyunji Kim, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
2022/885 (PDF ) Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions Akshima, Siyao Guo, Qipeng Liu
2022/884 (PDF ) On the Feasibility of Unclonable Encryption, and More Prabhanjan Ananth, Fatih Kaleoglu, Xingjian Li, Qipeng Liu, Mark Zhandry
2022/883 (PDF ) Differentially Oblivious Turing Machines Ilan Komargodski, Elaine Shi
2022/882 (PDF ) Randomness Optimization for Gadget Compositions in Higher-Order Masking Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu
2022/881 (PDF ) A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Jiankuo Dong, Jingqiang Lin, Yuewu Wang
2022/880 (PDF ) Efficient supersingularity testing over $\mathbb{F}_p$ and CSIDH key validation Gustavo Banegas, Valerie Gilchrist, Benjamin Smith
2022/879 (PDF ) Modular Polynomial Multiplication Using RSA/ECC coprocessor Aurélien Greuet, Simon Montoya, Clémence Vermeersch
2022/878 (PDF ) zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure Michael Rosenberg, Jacob White, Christina Garman, Ian Miers
2022/877 (PDF ) A New Approach to the Constant-Round Re-encryption Mix-Net Myungsun Kim
2022/876 (PDF ) Watermarkable Public key Encryption With Efficient Extraction Under Standard Assumptions Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
2022/875 (PDF ) Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
2022/874 (PDF ) Lattice Codes for Lattice-Based PKE Shanxiang Lyu, Ling Liu, Cong Ling, Junzuo Lai, Hao Chen
2022/873 (PDF ) \(\texttt{POLKA}\): Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert
2022/872 (PDF ) Nirvana: Instant and Anonymous Payment-Guarantees Akash Madhusudan, Mahdi Sedaghat, Philipp Jovanovic, Bart Preneel
2022/871 (PDF ) Secure Plot Transfer for the Chia Blockchain Shashank Agrawal
2022/870 (PDF ) Computing \(2^a\)-isogenies in Legendre Form Jesse Elliott, Aaron Hutchinson, David Jao
2022/869 (PDF ) Post-Quantum Insecurity from LWE Alex Lombardi, Ethan Mook, Willy Quach, Daniel Wichs
2022/868 (PDF ) Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions Huimin Li, Nele Mentens, Stjepan Picek
2022/867 (PDF ) The State of the Union: Union-Only Signatures for Data Aggregation Diego F. Aranha, Felix Engelmann, Sebastian Kolby, Sophia Yakoubov
2022/866 (PDF ) Communication-Efficient Secure Logistic Regression Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth
2022/865 (PDF ) Linked Fault Analysis Ali Asghar Beigizad, Hadi Soleimany, Sara Zarei, Hamed Ramzanipour
2022/864 (PDF ) BalanceProofs: Maintainable Vector Commitments with Fast Aggregation Weijie Wang, Annie Ulichney, Charalampos Papamanthou
2022/863 (PDF ) Effective and Efficient Masking with Low Noise using Small-Mersenne-Prime Ciphers Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert
2022/862 (PDF ) Scooby: Improved Multi-Party Homomorphic Secret Sharing Based on FHE Ilaria Chillotti, Emmanuela Orsini, Peter Scholl, Nigel Paul Smart, Barry Van Leeuwen
2022/861 (PDF ) Genus Distribution of Random q-ary Lattices Peter J. Bruin, Léo Ducas, Shane Gibbons
2022/860 (PDF ) AB-SIFA: SIFA with Adjacent-Byte Model Chunya Hu, Yongbo Hu, Wenfeng Zhu, Zixin Tan, Qi Zhang, Zichao Gong, Yanhao Gong, Luyao Jin, Pengwei Feng
2022/859 (PDF ) Practical Side-Channel Attack on Masked Message Encoding in Latticed-Based KEM Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li
2022/858 (PDF ) Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts Yang Du, Daniel Genkin, Paul Grubbs
2022/857 (PDF ) Succinct Classical Verification of Quantum Computation James Bartusek, Yael Tauman Kalai, Alex Lombardi, Fermi Ma, Giulio Malavolta, Vinod Vaikuntanathan, Thomas Vidick, Lisa Yang
2022/856 (PDF ) Mix-Nets from Re-Randomizable and Replayable CCA-secure Public-Key Encryption Antonio Faonio, Luigi Russo
2022/855 (PDF ) Tightness Subtleties for Multi-user PKE Notions Hans Heum, Martijn Stam
2022/854 (PDF ) On Access Control Encryption without Sanitization Cecilia Boschini, Ivan Damgård, Claudio Orlandi
2022/853 (PDF ) Hashing to Prime in Zero-Knowledge Thomas Groß
2022/852 (PDF ) Making Biased DL Models Work: Message and Key Recovery Attacks on Saber Using Amplitude-Modulated EM Emanations Ruize Wang, Kalle Ngo, Elena Dubrova
2022/851 (PDF ) NIWI and New Notions of Extraction for Algebraic Languages Chaya Ganesh, Hamidreza Khoshakhlagh, Roberto Parisella
2022/850 (PDF ) Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling
2022/849 (PDF ) Formal Verification of Arithmetic Masking in Hardware and Software Barbara Gigerl, Robert Primas, Stefan Mangard
2022/848 (PDF ) Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives (extended version) Alexandros Bakas, Eugene Frimpong, Antonis Michalas
2022/847 (PDF ) A note on key control in CSIDH Antonio Sanso
2022/846 (PDF ) A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin
2022/845 (PDF ) Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 Jian Guo, Ling Song, Haoyang Wang
2022/844 (PDF ) Security Analysis of a Recent Pairing-based Certificateless Authenticated Key Agreement Protocol for Blockchain-based WBANs Yong-Jin Kim, Dok-Jun An, Kum-Sok Sin, Son-Gyong Kim
2022/842 (PDF ) Nearly Optimal Property Preserving Hashing Justin Holmgren, Minghao Liu, LaKyah Tyner, Daniel Wichs
2022/841 (PDF ) Faster Yet Safer: Logging System Via Fixed-Key Blockcipher Viet Tung Hoang, Cong Wu, Xin Yuan
2022/840 (PDF ) New Design Techniques for Efficient Arithmetization-Oriented Hash Functions:Anemoi Permutations and Jive Compression Mode Clémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Robin Salen, Vesselin Velichkov, Danny Willems
2022/839 (PDF ) Threshold Structure-Preserving Signatures Elizabeth Crites, Markulf Kohlweiss, Bart Preneel, Mahdi Sedaghat, Daniel Slamanig
2022/838 (PDF ) An Efficient Query Recovery Attack Against a Graph Encryption Scheme Francesca Falzon, Kenneth G. Paterson
2022/837 (PDF ) Differential Cryptanalysis in the Fixed-Key Model Tim Beyne, Vincent Rijmen
2022/836 (PDF ) Authenticated Garbling from Simple Correlations Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
2022/835 (PDF ) Covert Authentication from Lattices Rajendra Kumar, Khoa Nguyen
2022/834 (PDF ) A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling Rafael del Pino, Shuichi Katsumata
2022/833 (PDF ) Stronger Security for Non-Interactive Threshold Signatures: BLS and FROST Mihir Bellare, Stefano Tessaro, Chenzhi Zhu
2022/832 (PDF ) Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions Jeremiah Blocki, Blake Holman
2022/831 (PDF ) Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing Vipul Goyal, Antigoni Polychroniadou, Yifan Song
2022/830 (PDF ) Near-Optimal Private Information Retrieval with Preprocessing Arthur Lazzaretti, Charalampos Papamanthou
2022/829 (PDF ) TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung
2022/828 (PDF ) Lower Bounds for (Batch) PIR with Private Preprocessing Kevin Yeo
2022/827 (PDF ) Privacy-Preserving IP Verification Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos
2022/826 (PDF ) Pika: Secure Computation using Function Secret Sharing over Rings Sameer Wagh
2022/825 (PDF ) Romeo: Conversion and Evaluation of HDL Designs in the Encrypted Domain Charles Gouert, Nektarios Georgios Tsoutsos
2022/824 (PDF ) Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay
2022/823 (PDF ) Round Efficient Byzantine Agreement from VDFs Poulami Das, Lisa Eckey, Sebastian Faust, Julian Loss, Monosij Maitra
2022/822 (PDF ) Traceable Receipt-Free Encryption Henri Devillez, Olivier Pereira, Thomas Peters
2022/821 (PDF ) MPC for Group Reconstruction Circuits Lúcás Críostóir Meier
2022/820 (PDF ) Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resistant Hash Susumu Kiyoshima
2022/819 (PDF ) Moz$\mathbb{Z}_{2^k}$arella: Efficient Vector-OLE and Zero-Knowledge Proofs Over $\mathbb{Z}_{2^k}$ Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Peter Scholl
2022/818 (PDF ) Provably Secure Reflection Ciphers Tim Beyne, Yu Long Chen
2022/817 (PDF ) Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels Jean Paul Degabriele, Vukašin Karadžić
2022/816 (PDF ) Securing Approximate Homomorphic Encryption Using Differential Privacy Baiyu Li, Daniele Micciancio, Mark Schultz, Jessica Sorrell
2022/815 (PDF ) More Efficient Dishonest Majority Secure Computation over $\mathbb{Z}_{2^k}$ via Galois Rings Daniel Escudero, Chaoping Xing, Chen Yuan
2022/814 (PDF ) Suborn Channels: Incentives Against Timelock Bribes Zeta Avarikioti, Orfeas Stefanos Thyfronitis Litos
2022/813 (PDF ) Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications Benny Applebaum, Yuval Ishai, Or Karni, Arpita Patra
2022/812 (PDF ) Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2022/811 (PDF ) EZEE: Epoch Parallel Zero Knowledge for ANSI C Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery
2022/810 (PDF ) Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached RAM for ANSI C Programs David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov
2022/809 (PDF ) A 2.1 KHz Zero-Knowledge Processor with BubbleRAM David Heath, Vladimir Kolesnikov
2022/808 (PDF ) Secret key generation from Gaussian sources using lattice-based extractors Laura Luzzi, Cong Ling, Matthieu R. Bloch
2022/807 (PDF ) Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations Ruize Wang, Kalle Ngo, Elena Dubrova
2022/806 (PDF ) Multi-key and Multi-input Predicate Encryption from Learning with Errors Danilo Francati, Daniele Friolo, Giulio Malavolta, Daniele Venturi
2022/805 (PDF ) Authenticated Consensus in Synchronous Systems with Mixed Faults Ittai Abraham, Danny Dolev, Alon Kagan, Gilad Stern
2022/804 (PDF ) Review of the White-Box Encodability of NIST Lightweight Finalists Alex Charlès, Chloé Gravouil
2022/803 (PDF ) How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs Xavier Arnal, Abraham Cano, Tamara Finogina, Javier Herranz
2022/802 (PDF ) VERI-ZEXE: Decentralized Private Computation with Universal Setup Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho
2022/801 (PDF ) Secure and Robust Key-Trapped Design-for-Security Architecture for Protecting Obfuscated Logic Hadi Mardani Kamali
2022/800 (PDF ) BarnOwl: Secure Comparisons using Silent Pseudorandom Correlation Generators Sameer Wagh
2022/799 (PDF ) Tight Bounds on the Randomness Complexity of Secure Multiparty Computation Vipul Goyal, Yuval Ishai, Yifan Song
2022/798 (PDF ) One Hot Garbling David Heath, Vladimir Kolesnikov
2022/797 (PDF ) Garbled Circuits With Sublinear Evaluator Abida Haque, David Heath, Vladimir Kolesnikov, Steve Lu, Rafail Ostrovsky, Akash Shah
2022/796 (PDF ) Safe Permissionless Consensus Youer Pu, Lorenzo Alvisi, Ittay Eyal
2022/795 (PDF ) Efficient Generic Arithmetic for KKW Practical Linear: MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup David Heath, Vladimir Kolesnikov, Jiahui Lu
2022/794 (PDF ) Generation of "independent" points on elliptic curves by means of Mordell--Weil lattices Dmitrii Koshelev
2022/793 (PDF ) LLAMA: A Low Latency Math Library for Secure Inference Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, Divya Gupta
2022/792 (PDF ) Reliable Password Hardening Service with Opt-Out Chunfu Jia, Shaoqiang Wu, Ding Wang
2022/791 (PDF ) log*-Round Game-Theoretically-Fair Leader Election Ilan Komargodski, Shin’ichiro Matsuo, Elaine Shi, Ke Wu
2022/790 (PDF ) A Toolbox for Barriers on Interactive Oracle Proofs Gal Arnon, Amey Bhangale, Alessandro Chiesa, Eylon Yogev
2022/789 (PDF ) Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256 Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang
2022/788 (PDF ) Improved Preimage Attacks on Round-Reduced Keccak-384/512 Le He, Xiaoen Lin, Hongbo Yu, Jian Guo
2022/787 (PDF ) Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohmmad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla
2022/786 (PDF ) On the Necessity of Collapsing for Post-Quantum and Quantum Commitments Marcel Dall'Agnol, Nicholas Spooner
2022/785 (PDF ) Shorter Hash-and-Sign Lattice-Based Signatures Thomas Espitau, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
2022/784 (PDF ) Fully Privacy-Preserving Federated Representation Learning via Secure Embedding Aggregation Jiaxiang Tang, Jinbao Zhu, Songze Li, Kai Zhang, Lichao Sun
2022/783 (PDF ) Augmented Random Oracles Mark Zhandry
2022/782 (PDF ) Simon’s Algorithm and Symmetric Crypto: Generalizations and Automatized Applications Federico Canale, Gregor Leander, Lukas Stennes
2022/781 (PDF ) Linear Communication in Malicious Majority MPC S. Dov Gordon, Phi Hung Le, Daniel McVicker
2022/780 (PDF ) An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption Christian Mouchet, Elliott Bertrand, Jean-Pierre Hubaux
2022/779 (PDF ) New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption -- Stronger Security and Smaller Ciphertexts Qiqi Lai, Feng-Hao Liu, Zhedong Wang
2022/778 (PDF ) SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost Mikhail Kudinov, Andreas Hülsing, Eyal Ronen, Eylon Yogev
2022/777 (PDF ) Arithmetization of Σ¹₁ relations in Halo 2 Morgan Thomas
2022/776 (PDF ) Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
2022/775 (PDF ) Asynchronous Verifiable Information Dispersal with Near-Optimal Communication Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, Haibin Zhang
2022/773 (PDF ) Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF Jelle Don, Serge Fehr, Yu-Hsuan Huang
2022/772 (PDF ) Maliciously Secure Multi-Party PSI with Lower Bandwidth and Faster Computation Zhi Qiu, Kang Yang, Yu Yu, Lijing Zhou
2022/771 (PDF ) Field Instruction Multiple Data Khin Mi Mi Aung, Enhui Lim, Jun Jie Sim, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo
2022/770 (PDF ) Password-Authenticated Key Exchange from Group Actions Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel
2022/769 (PDF ) Faster Beta Weil Pairing on BLS Pairing Friendly Curves with Odd Embedding Degree Azebaze Guimagang Laurian, Fouotsa Emmanuel, El Mrabet Nadia, Pecha Njiahouo Aminatou
2022/768 (PDF ) Public-Key Watermarking Schemes for Pseudorandom Functions Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo
2022/767 (PDF ) A New Approach to Efficient Non-Malleable Zero-Knowledge Allen Kim, Xiao Liang, Omkant Pandey
2022/766 (PDF ) The Cost of Statistical Security in Interactive Proofs for Repeated Squaring Cody Freitag, Ilan Komargodski
2022/765 (PDF ) Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks Zhongfeng Niu, Siwei Sun, Yunwen Liu, Chao Li
2022/764 (PDF ) Efficient Proofs of Retrievability using Expander Codes Françoise Levy-dit-Vehel, Maxime Roméas
2022/763 (PDF ) SoK: Assumptions Underlying Cryptocurrency Deanonymizations -- A Taxonomy for Scientific Experts and Legal Practitioners Dominic Deuber, Viktoria Ronge, Christian Rückert
2022/762 (PDF ) The Price of Verifiability: Lower Bounds for Verifiable Random Functions Nicholas Brandt, Dennis Hofheinz, Julia Kastner, Akin Ünal
2022/761 (PDF ) Quantum Procedures for Nested Search Problems with Applications in Cryptanalysis André Schrottenloher, Marc Stevens
2022/760 (PDF ) Privacy Preserving Opinion Aggregation Aggelos Kiayias, Vanessa Teague, Orfeas Stefanos Thyfronitis Litos
2022/759 (PDF ) SwiftEC: Shallue–van de Woestijne Indifferentiable Function To Elliptic Curves Jorge Chávez-Saab, Francisco Rodrı́guez-Henrı́quez, Mehdi Tibouchi
2022/758 (PDF ) Static vs. Adaptive Security in Perfect MPC: A Separation and the Adaptive Security of BGW Gilad Asharov, Ran Cohen, Oren Shochat
2022/757 (PDF ) SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V. L. Pereira
2022/756 (PDF ) Curve Trees: Practical and Transparent Zero-Knowledge Accumulators Matteo Campanelli, Mathias Hall-Andersen, Simon Holmgaard Kamp
2022/755 (PDF ) Low-latency Hardware Architecture for VDF Evaluation in Class Groups Danyang Zhu, Jing Tian, Minghao Li, Zhongfeng Wang
2022/754 (PDF ) Quantum impossible differential attacks: Applications to AES and SKINNY Nicolas David, María Naya-Plasencia, André Schrottenloher
2022/753 (PDF ) Fast MILP Models for Division Property Patrick Derbez, Baptiste Lambin
2022/752 (PDF ) Provably Minimum Data Complexity Integral Distinguisher Based on Conventional Division Property Akram Khalesi, Zahra Ahmadian
2022/751 (PDF ) SCALES: MPC with Small Clients and Larger Ephemeral Servers Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran
2022/750 (PDF ) The Ideal Functionalities for Private Set Union, Revisited Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu
2022/749 (PDF ) Cryptanalysis of Draco Subhadeep Banik
2022/748 (PDF ) 2DT-GLS: Faster and exception-free scalar multiplication in the GLS254 binary curve Marius A. Aardal, Diego F. Aranha
2022/747 (PDF ) More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan, Lixuan Wu, Meiqin Wang
2022/746 (PDF ) Efficient Proofs of Knowledge for Threshold Relations Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Ivan Visconti
2022/745 (PDF ) Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE Hosein Hadipour, Marcel Nageler, Maria Eichlseder
2022/744 (PDF ) MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency Monero Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Xianrui Qin
2022/743 (PDF ) How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis David Mestel, Johannes Mueller, Pascal Reisert
2022/742 (PDF ) Application of Automorphic Forms to Lattice Problems Samed Düzlü, Juliane Krämer
2022/741 (PDF ) Sapic+: protocol verifiers of the world, unite! Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann
2022/740 (PDF ) Practical Privacy-Preserving Authentication for SSH Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek
2022/739 (PDF ) Updatable Encryption from Group Actions Antonin Leroux, Maxime Roméas
2022/738 (PDF ) Secure Search on Multi-key Homomorphically Encrypted Data with Finite Fields Buvana Ganesh, Paolo Palmieri
2022/737 (PDF ) Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results Prasanna Ravi, Anupam Chattopadhyay, Jan Pieter D'Anvers, Anubhab Baksi
2022/736 (PDF ) Mathematical Aspects of Division Property Phil Hebborn, Gregor Leander, Aleksei Udovenko
2022/735 (PDF ) Multiparty Private Set Intersection Cardinality and Its Applications Jiahui Gao, Ni Trieu, Avishay Yanai
2022/734 (PDF ) Tight Preimage Resistance of the Sponge Construction Charlotte Lefevre, Bart Mennink
2022/733 (PDF ) Breaking the quadratic barrier: Quantum cryptanalysis of Milenage, telecommunications’ cryptographic backbone Vincent Ulitzsch, Jean-Pierre Seifert
2022/732 (PDF ) Structure-Preserving Compilers from New Notions of Obfuscations Matteo Campanelli, Danilo Francati, Claudio Orlandi
2022/731 (PDF ) Triangulating Rebound Attack on AES-like Hashing Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham
2022/730 (PDF ) New Dolev-Reischuk Lower Bounds Meet Blockchain Eclipse Attacks Ittai Abraham, Gilad Stern
2022/729 (PDF ) Integral Cryptanalysis of WARP based on Monomial Prediction Hosein Hadipour, Maria Eichlseder
2022/728 (PDF ) Snowball: Another View on Side-Channel Key Recovery Tools Jiangshan Long, Changhai Ou, Zhu Wang, Shihui Zheng, Fei Yan, Fan Zhang, Siew-Kei Lam
2022/727 (PDF ) A Lower Bound for Proving Hardness of Learning with Rounding with Polynomial Modulus Parker Newton, Silas Richelson
2022/726 (PDF ) Radix-3 NTT-Based Polynomial Multiplication for Lattice-Based Cryptography Chenar Abdulla Hassan, Oğuz Yayla
2022/725 (PDF ) Revisiting Related-Key Boomerang attacks on AES using computer-aided tool Patrick Derbez, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen
2022/724 (PDF ) A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem Thomas Schamberger, Lukas Holzbaur, Julian Renner, Antonia Wachter-Zeh, Georg Sigl
2022/723 (PDF ) Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng
2022/722 (PDF ) Speedy Error Reconciliation Kaibo Liu, Xiaozhuo Gu, Peixin Ren, Xuwen Nie
2022/721 (PDF ) Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs Jelle Vos, Mauro Conti, Zekeriya Erkin
2022/720 (PDF ) A Model Set Method to Search Integral Distinguishers Based on Division Property for Block Ciphers Liu Zhang, Huawei Liu, Zilong Wang
2022/719 (PDF ) Contingent payments from two-party signing and verification for abelian groups Sergiu Bursuc, Sjouke Mauw
2022/718 (PDF ) A Post-Quantum Four-Party Outsourced Authentication Reza Ghasemi, Alptekin Küpçü
2022/717 (PDF ) Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments Yacov Manevich, Adi Akavia
2022/716 (PDF ) x-Superoptimal Pairings on some Elliptic Curves with Odd Prime Embedding Degrees Emmanuel Fouotsa, Azebaze Guimagang Laurian, Ayissi Raoul
2022/715 (PDF ) Ultimate SLH: Taking Speculative Load Hardening to the Next Level Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom
2022/714 (PDF ) MicroSecAgg: Streamlined Single-Server Secure Aggregation Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, Tucker Balch
2022/713 (PDF ) More Efficient (Reusable) Private Set Union Dov Gordon, Carmit Hazay, Phi Hung Le, Mingyu Liang
2022/712 (PDF ) The Hardness of LPN over Any Integer Ring and Field for PCG Applications Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu
2022/711 (PDF ) Efficient and Adaptively Secure Asynchronous Binary Agreement via Binding Crusader Agreement Ittai Abraham, Naama Ben-David, Sravya Yandamuri
2022/710 (PDF ) Advanced Signature Functionalities from the Code Equivalence Problem Alessandro Barenghi, Jean-Francois Biasse, Tran Ngo, Edoardo Persichetti, Paolo Santini
2022/709 (PDF ) Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde Knapsack Problem Katharina Boudgoust, Erell Gachon, Alice Pellet-Mary
2022/708 (PDF ) An Estimator for the Hardness of the MQ Problem Emanuele Bellini, Rusydi H. Makarim, Carlo Sanna, Javier Verbel
2022/707 (PDF ) Efficiently Masking Polynomial Inversion at Arbitrary Order Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu
2022/706 (PDF ) Finding and Evaluating Parameters for BGV Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj
2022/705 (PDF ) Linear-map Vector Commitments and their Practical Applications Matteo Campanelli, Anca Nitulescu, Carla Ràfols, Alexandros Zacharakis, Arantxa Zapico
2022/704 (PDF ) Parameter Optimization & Larger Precision for (T)FHE Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
2022/703 (PDF ) Proof-of-possession for KEM certificates using verifiable generation Tim Güneysu, Philip Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha
2022/701 (PDF ) Truncated Boomerang Attacks and Application to AES-based Ciphers Augustin Bariant, Gaëtan Leurent
2022/700 (PDF ) Grief-free Atomic Swaps Tejaswi Nadahalli, Majid Khabbazian, Roger Wattenhofer
2022/699 (PDF ) On the Quantum Security of OCB Varun Maram, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman
2022/698 (PDF ) State Machine Replication under Changing Network Conditions Andreea B. Alexandru, Erica Blum, Jonathan Katz, Julian Loss
2022/697 (PDF ) Rate-1 Incompressible Encryption from Standard Assumptions Pedro Branco, Nico Döttling, Jesko Dujmovic
2022/696 (PDF ) On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups Dario Catalano, Dario Fiore, Rosario Gennaro, Emanuele Giunta
2022/695 (PDF ) Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES Marek Bielik, Martin Jureček, Olha Jurečková, Róbert Lórencz
2022/694 (PDF ) Squirrel: Efficient Synchronized Multi-Signatures from Lattices Nils Fleischhacker, Mark Simkin, Zhenfei Zhang
2022/693 (PDF ) Unified View for Notions of Bit Security Shun Watanabe, Kenji Yasunaga
2022/691 (PDF ) QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore Sujaya Maiyya, Seif Ibrahim, Caitlin Scarberry, Divyakant Agrawal, Amr El Abbadi, Huijia Lin, Stefano Tessaro, Victor Zakhary
2022/690 (PDF ) Authentication in the Bounded Storage Model Yevgeniy Dodis, Willy Quach, Daniel Wichs
2022/689 (PDF ) Tight Multi-User Security Bound of $\textsf{DbHtS}$ Nilanjan Datta, Avijit Dutta, Mridul Nandi, Suprita Talnikar
2022/688 (PDF ) Memory-Efficient Single Data-Complexity Attacks on LowMC Using Partial Sets Subhadeep Banik, Khashayar Barooti, Andrea Caforio, Serge Vaudenay
2022/687 (PDF ) Adaptively Secure Single Secret Leader Election from DDH Dario Catalano, Dario Fiore, Emanuele Giunta
2022/686 (PDF ) Proof of Mirror Theory for a Wide Range of $\xi_{\max}$ Benoît Cogliati, Avijit Dutta, Mridul Nandi, Jacques Patarin, Abishanka Saha
2022/685 (PDF ) Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2022/684 (PDF ) RSK: A Bitcoin sidechain with stateful smart-contracts Sergio Demian Lerner, Javier Álvarez Cid-Fuentes, Julian Len, Ramsès Fernàndez-València, Patricio Gallardo, Nicolás Vescovo, Raúl Laprida, Shreemoy Mishra, Federico Jinich, Diego Masini
2022/683 (PDF ) Quantum Analysis of AES Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, Anupam Chattopadhyay
2022/682 (PDF ) Secure Federated Clustering Songze Li, Sizai Hou, Baturalp Buyukates, Salman Avestimehr
2022/681 (PDF ) Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs
2022/680 (PDF ) Practical Delegatable Anonymous Credentials From Equivalence Class Signatures Omid Mir, Daniel Slamanig, Balthazar Bauer, René Mayrhofer
2022/679 (PDF ) Vandermonde meets Regev: Public Key Encryption Schemes Based on Partial Vandermonde Problems Katharina Boudgoust, Amin Sakzad, Ron Steinfeld
2022/678 (PDF ) New Constructions of Collapsing Hashes Mark Zhandry
2022/677 (PDF ) A Conjecture on Hermite Constants Leon Mächler, David Naccache
2022/676 (PDF ) Finding many Collisions via Reusable Quantum Walks Xavier Bonnetain, André Chailloux, André Schrottenloher, Yixin Shen
2022/675 (PDF ) MPClan: Protocol Suite for Privacy-Conscious Computations Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh
2022/673 (PDF ) Meet-in-the-Filter and Dynamic Counting with Applications to Speck Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov
2022/672 (PDF ) CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas Tassos Dimitriou, Khazam Alhamdan
2022/671 (PDF ) The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions Shujiao Cao, Rui Xue
2022/670 (PDF ) Practical UC-Secure Zero-Knowledge Smart Contracts Jayamine Alupotha, Xavier Boyen
2022/669 (PDF ) On those Boolean functions that are coset leaders of first order Reed-Muller codes Claude Carlet, Serge Feukoua
2022/668 (PDF ) Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security Yaobin Shen, Ferdinand Sibleyras
2022/667 (PDF ) Arithmetic Tuples for MPC Pascal Reisert, Marc Rivinius, Toomas Krips, Ralf Küsters
2022/666 (PDF ) Deciding and reconstructing linear equivalence of uniformly distributed functions Ivana Ivkovic, Nikolay Kaleyski
2022/665 (PDF ) NOVA, a Noncommutative-ring Based Unbalanced Oil and Vinegar Signature Scheme with Key-randomness Alignment Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, Chun-Yen Chou
2022/664 (PDF ) The $c-$differential uniformity and boomerang uniformity of three classes of permutation polynomials over $\mathbb{F}_{2^n}$ Qian Liu, Zhiwei Huang, Jianrui Xie, Ximeng Liu, Jian Zou
2022/663 (PDF ) SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning Harsh Chaudhari, Matthew Jagielski, Alina Oprea
2022/662 (PDF ) SHORTSTACK : Distributed, Fault-tolerant, Oblivious Data Access Midhul Vuppalapati, Kushal Babel, Anurag Khandelwal, Rachit Agarwal
2022/661 (PDF ) Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric Aisling Connolly, Jerome Deschamps, Pascal Lafourcade, Octavio Perez Kempner
2022/660 (PDF ) Secure Sampling with Sublinear Communication Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich
2022/659 (PDF ) ABE for Circuits with Constant-Size Secret Keys and Adaptive Security Hanjun Li, Huijia Lin, Ji Luo
2022/658 (PDF ) Unclonable Polymers and Their Cryptographic Applications Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe’er, Anna Roitburd-Berman, Eran Tromer
2022/657 (PDF ) BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer
2022/656 (PDF ) Quantum Augmented Dual Attack Martin R. Albrecht, Yixin Shen
2022/655 (PDF ) Bit Security as Cost to Demonstrate Advantage Keewoo Lee
2022/654 (PDF ) Torsion point attacks on ``SIDH-like'' cryptosystems Péter Kutas, Christophe Petit
2022/653 (PDF ) Fast Unbalanced Private Set Union from Fully Homomorphic Encryption Binbin Tu, Yu Chen, Qi Liu, Cong Zhang
2022/652 (PDF ) Private Set Operations from Multi-Query Reverse Private Membership Test Yu Chen, Min Zhang, Cong Zhang, Minglang Dong, Weiran Liu
2022/651 (PDF ) Revisiting the Efficiency of Asynchronous Multi Party Computation Against General Adversaries Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
2022/650 (PDF ) Supersingular Non-Superspecial Abelian Surfaces in Cryptography Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig
2022/649 (PDF ) IBE with Incompressible Master Secret and Small Identity Secrets Nico Döttling, Sanjam Garg, Sruthi Sekar, Mingyuan Wang
2022/648 (PDF ) Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, Ioannis Demertzis
2022/647 (PDF ) Quantum Implementation and Analysis of DEFAULT Kyungbae Jang, Anubhab Baksi, Jakub Breier, Hwajeong Seo, Anupam Chattopadhyay
2022/645 (PDF ) Round-Optimal Multi-Party Computation with Identifiable Abort Michele Ciampi, Divya Ravi, Luisa Siniscalchi, Hendrik Waldner
2022/644 (PDF ) DiLizium 2.0: Revisiting Two-Party Crystals-Dilithium Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk
2022/643 (PDF ) Accelerating the Best Trail Search on AES-Like Ciphers Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
2022/642 (PDF ) Statistical Effective Fault Attacks: The other Side of the Coin Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany
2022/641 (PDF ) Self-Timed Masking: Implementing Masked S-Boxes Without Registers Mateus Simões, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno
2022/640 (PDF ) Dialektos: Privacy-preserving Smart Contracts Tadas Vaitiekūnas
2022/639 (PDF ) Anamorphic Encryption: Private Communication against a Dictator Giuseppe Persiano, Duong Hieu Phan, Moti Yung
2022/638 (PDF ) Impossibilities in Succinct Arguments: Black-box Extraction and More Matteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh, Janno Siim
2022/637 (PDF ) Conditional Attribute-Based Proxy Re-Encryption: Definitions and Constructions from LWE Lisha Yao, Jian Weng, Pengfei Wu, Xiaoguo Li, Yi Liu, Junzuo Lai, Guomin Yang, Robert H. Deng
2022/636 (PDF ) Integer Syndrome Decoding in the Presence of Noise Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso
2022/635 (PDF ) Post-Quantum Secure Boot on Vehicle Network Processors Joppe W. Bos, Brian Carlson, Joost Renes, Marius Rotaru, Daan Sprenkels, Geoffrey P. Waters
2022/634 (PDF ) Round-Optimal Lattice-Based Threshold Signatures, Revisited Shweta Agrawal, Damien Stehle, Anshu Yadav
2022/633 (PDF ) CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes Shiyu Shen, Hao Yang, Yu Liu, Zhe Liu, Yunlei Zhao
2022/632 (PDF ) Recovering Rainbow's Secret Key with a First-Order Fault Attack Thomas Aulbach, Tobias Kovats, Juliane Krämer, Soundes Marzougui
2022/631 (PDF ) Watermarking PRFs against Quantum Adversaries Fuyuki Kitagawa, Ryo Nishimaki
2022/630 (PDF ) Enforcing fine-grained constant-time policies Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya
2022/629 (PDF ) Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors (extended version)? Alexandros Bakas, Antonis Michalas, Eugene Frimpong, Reyhaneh Rabbaninejad
2022/628 (PDF ) High-Performance Polynomial Multiplication Hardware Accelerators for KEM Saber and NTRU Elizabeth Carter, Pengzhou He, Jiafeng Xie
2022/627 (PDF ) Secure Hierarchical Deterministic Wallet Supporting Stealth Address Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu
2022/626 (PDF ) New method for combining Matsui’s bounding conditions with sequential encoding method Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
2022/625 (PDF ) Dashing and Star: Byzantine Fault Tolerance with Weak Certificates Sisi Duan, Haibin Zhang, Xiao Sui, Baohan Huang, Changchun Mu, Gang Di, Xiaoyun Wang
2022/624 (PDF ) Cryptanalysis of Three Quantum Money Schemes Andriyan Bilyk, Javad Doliskani, Zhiyong Gong
2022/623 (PDF ) Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority Anders Dalskov, Daniel Escudero, Ariel Nof
2022/622 (PDF ) Efficient and Accurate homomorphic comparisons Olive Chakraborty, Martin Zuber
2022/621 (PDF ) Caulk: Lookup Arguments in Sublinear Time Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin
2022/620 (PDF ) Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits Zhenyu Huang, Siwei Sun
2022/619 (PDF ) Breaking the $t< n/3$ Consensus Bound: Asynchronous Dynamic Proactive Secret Sharing under Honest Majority Christophe Levrat, Matthieu Rambaud, Antoine Urban
2022/618 (PDF ) A simple proof of ARX completeness Adriano Koleci
2022/617 (PDF ) SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model Shingo Sato, Junji Shikata
2022/616 (PDF ) Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles Ren Ishibashi, Kazuki Yoneyama
2022/615 (PDF ) Smoothing Codes and Lattices: Systematic Study and New Bounds Thomas Debris, Léo Ducas, Nicolas Resch, Jean-Pierre Tillich
2022/613 (PDF ) GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs Marloes Venema, Greg Alpár
2022/612 (PDF ) Cryptanalysis of Reduced Round SPEEDY Raghvendra Rohit, Santanu Sarkar
2022/611 (PDF ) Further Cryptanalysis of a Type of RSA Variants Gongyu Shi, Geng Wang, Dawu Gu
2022/610 (PDF ) On the Differential Spectrum of a Differentially $3$-Uniform Power Function Tingting Pang, Nian Li, Xiangyong Zeng
2022/609 (PDF ) Optimal Single-Server Private Information Retrieval Mingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, Elaine Shi
2022/608 (PDF ) Practical Provably Secure Flooding for Blockchains Chen-Da Liu-Zhang, Christian Matt, Ueli Maurer, Guilherme Rito, Søren Eller Thomsen
2022/607 (PDF ) Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations (Long Version) Son Ho, Jonathan Protzenko, Abhishek Bichhawat, Karthikeyan Bhargavan
2022/606 (PDF ) Honorific Security: Efficient Two-Party Computation with Offloaded Arbitration and Public Verifiability Tianxiang Dai, Yufan Jiang, Yong Li, Jörn Müller-Quade, Andy Rupp
2022/605 (PDF ) Weighted Attribute-Based Encryption with Parallelized Decryption Alexandru Ionita
2022/604 (PDF ) Algorithm Substitution Attacks against Receivers Marcel Armour, Bertram Poettering
2022/603 (PDF ) Distributed Blockchain Price Oracle Léonard Lys, Maria Potop-Butucaru
2022/602 (PDF ) Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin
2022/601 (PDF ) A Better Method to Analyze Blockchain Consistency Lucianna Kiffer, Rajmohan Rajaraman, abhi shelat
2022/600 (PDF ) A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations Loïc Masure, Olivier Rioul, François-Xavier Standaert
2022/599 (PDF ) TenderTee: Secure Tendermint Lionel Beltrando, Maria Potop-Butucaru, Jose Alfaro
2022/598 (PDF ) Verifiable and forward private conjunctive keyword search from DIA tree Laltu Sardar, Sushmita Ruj
2022/597 (PDF ) Foundations of Dynamic BFT Sisi Duan, Haibin Zhang
2022/596 (PDF ) Zero Knowledge Proofs of Elliptic Curve Inner Products from Principal Divisors and Weil Reciprocity Liam Eagen
2022/595 (PDF ) On the Cryptographic Fragility of the Telegram Ecosystem Theo von Arx, Kenneth G. Paterson
2022/592 (PDF ) Chaghri --- an FHE-friendly Block Cipher Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar
2022/591 (PDF ) Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, Kazuo Sakiyama
2022/590 (PDF ) Secure Merge in Linear Time and O(log log N) Rounds Mark Blunk, Paul Bunn, Samuel Dittmer, Steve Lu, Rafail Ostrovsky
2022/589 (PDF ) Unnecessary Input Heuristics & PayJoin Transactions Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter and
2022/588 (PDF ) Efficient Lifting for Shorter Zero-Knowledge Proofs and Post-Quantum Signatures Daniel Kales, Greg Zaverucha
2022/587 (PDF ) Doubly Efficient Interactive Proofs over Infinite and Non-Commutative Rings Eduardo Soria-Vazquez
2022/586 (PDF ) A survey of elliptic curves for proof systems Diego F. Aranha, Youssef El Housni, Aurore Guillevic
2022/585 (PDF ) Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability Yi Liu, Qi Wang, Siu-Ming Yiu
2022/584 (PDF ) Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups Lior Rotem
2022/583 (PDF ) A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff Lior Rotem, Gil Segev
2022/582 (PDF ) Ponyta: Foundations of Side-Contract-Resilient Fair Exchange Hao Chung, Elisaweta Masserova, Elaine Shi, Sri AravindaKrishnan Thyagarajan
2022/581 (PDF ) Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage Lidong Han, Guangwu Xu, Qi Xie, Xiao Tan, Chengliang Tian
2022/580 (PDF ) How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing Samuel Sousa, Roman Kern
2022/579 (PDF ) Compact and Efficient KEMs over NTRU Lattices Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao
2022/578 (PDF ) Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri
2022/577 (PDF ) Construction of generalized-involutory MDS matrices Xuting Zhou, Tianshuo Cong
2022/576 (PDF ) On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage Akira Ito, Rei Ueno, Naofumi Homma
2022/575 (PDF ) Optimizing Homomorphic Encryption Parameters for Arbitrary Applications Charles Gouert, Rishi Khan, Nektarios Georgios Tsoutsos
2022/574 (PDF ) Comparison-Based MPC in Star Topology (Full Version) Gowri R Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider
2022/573 (PDF ) Finding One Common Item, Privately Tyler Beauregard, Janabel Xia, Mike Rosulek
2022/572 (PDF ) Homomorphically counting elements with the same property Ilia Iliashenko, Malika Izabachène, Axel Mertens, Hilder V. L. Pereira.
2022/571 (PDF ) Entropically secure cipher for messages generated by Markov chains with unknown statistics Boris Ryabko
2022/570 (PDF ) Secure and Private Source Coding with Private Key and Decoder Side Information Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor
2022/569 (PDF ) TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks Marloes Venema, Greg Alpár
2022/568 (PDF ) Improved MITM Cryptanalysis on Streebog Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang
2022/567 (PDF ) FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher Michele Fabbrini
2022/566 (PDF ) AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang
2022/565 (PDF ) Power Contracts: Provably Complete Power Leakage Models for Processors Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadžić, Stefan Mangard, Robert Primas
2022/564 (PDF ) FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization Christopher van der Beets, Raine Nieminen, Thomas Schneider
2022/563 (PDF ) Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang
2022/562 (PDF ) Orientations and cycles in supersingular isogeny graphs Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine Stange, Ha T. N. Tran
2022/561 (PDF ) Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes Shivam Bhasin, Dirmanto Jap, Wei Cheng Ng, Siang Meng Sim
2022/560 (PDF ) Distributed Shuffling in Adversarial Environments Kasper Green Larsen, Maciej Obremski, Mark Simkin
2022/559 (PDF ) DeCAF: Decentralizable Continuous Group Key Agreement with Fast Healing Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak
2022/558 (PDF ) On Seedless PRNGs and Premature Next Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro
2022/557 (PDF ) Honest Majority Multi-Prover Interactive Arguments Alexander R. Block, Christina Garman
2022/556 (PDF ) Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu
2022/555 (PDF ) Adapting Belief Propagation to Counter Shuffling of NTTs Julius Hermelink, Silvan Streit, Emanuele Strieder, Katharina Thieme
2022/554 (PDF ) Byzantine Reliable Broadcast with $O(nL+kn+n^2 log n)$ Communication Sisi Duan, Haibin Zhang
2022/553 (PDF ) Secure Storage with Deduplication John Best, Wayne Hineman, Steven Hetzler, Guerney Hunt, Charanjit S. Jutla
2022/552 (PDF ) Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
2022/551 (PDF ) Marlin: Two-Phase BFT with Linearity Xiao Sui, Sisi Duan, Haibin Zhang
2022/550 (PDF ) ROAST: Robust Asynchronous Schnorr Threshold Signatures Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder
2022/549 (PDF ) Smart Contracts Obfuscation from Blockchain-based One-time Program Sora Suegami
2022/548 (PDF ) Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security Yuyu Wang, Jiaxin Pan
2022/547 (PDF ) Fast signing method in RSA with high speed verification GyuChol. Kim, YongBok. Jong
2022/546 (PDF ) He-HTLC: Revisiting Incentives in HTLC Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, Kartik Nayak
2022/545 (PDF ) Logic Locking - Connecting Theory and Practice Elisaweta Masserova, Deepali Garg, Ken Mai, Lawrence Pileggi, Vipul Goyal, Bryan Parno
2022/544 (PDF ) Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting Donghoon Chang, Deukjo Hong, Jinkeon Kang
2022/543 (PDF ) Aura: private voting with reduced trust on tallying authorities Aram Jivanyan, Aaron Feickert
2022/542 (PDF ) On Valiant's Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles Mathias Hall-Andersen, Jesper Buus Nielsen
2022/541 (PDF ) The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell
2022/540 (PDF ) On the revision of NIST 800-22 Test Suites Katarzyna Anna Kowalska, Davide Fogliano, Jose Garcia Coello
2022/539 (PDF ) Post Quantum Noise Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, Fiona Johanna Weber
2022/538 (PDF ) Post-Quantum Signatures on RISC-V with Hardware Acceleration Patrick Karl, Jonas Schupp, Tim Fritzmann, Georg Sigl
2022/537 (PDF ) Rubato: Noisy Ciphers for Approximate Homomorphic Encryption (Full Version) Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Jooyoung Lee, Mincheol Son
2022/536 (PDF ) Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha Sabyasachi Dey, Hirendra Kumar Garai, Santanu Sarkar, Nitin Kumar Sharma
2022/535 (PDF ) Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round Damiano Abram, Peter Scholl, Sophia Yakoubov
2022/534 (PDF ) On the Adaptive Security of the Threshold BLS Signature Scheme Renas Bacho, Julian Loss
2022/533 (PDF ) Băhēm: A Symmetric Cipher with Provable 128-bit Security M. Rajululkahf
2022/532 (PDF ) Rotation Key Reduction for Client-Server Systems of Deep Neural Network on Fully Homomorphic Encryption Joon-Woo Lee, Eunsang Lee, Young-Sik Kim, Jong-Seon No
2022/531 (PDF ) Jammin' on the deck Norica Băcuieți, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer
2022/530 (PDF ) High-speed SABER Key Encapsulation Mechanism in 65nm CMOS Malik Imran, Felipe Almeida, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini
2022/529 (PDF ) Laconic Private Set-Intersection From Pairings Diego Aranha, Chuanwei Lin, Claudio Orlandi, Mark Simkin
2022/528 (PDF ) On Random Sampling of Supersingular Elliptic Curves Marzio Mula, Nadir Murru, Federico Pintore
2022/527 (PDF ) PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms Jungmin Park, N. Nalla Anandakumar, Dipayan Saha, Dhwani Mehta, Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor
2022/526 (PDF ) Optimal Tightness for Chain-Based Unique Signatures Fuchun Guo, Willy Susilo
2022/525 (PDF ) Breaking Goppa-Based McEliece with Hints Elena Kirshanova, Alexander May
2022/524 (PDF ) Inner Product Functional Commitments with Constant-Size Public Parameters and Openings Hien Chu, Dario Fiore, Dimitris Kolonelos, Dominique Schröder
2022/523 (PDF ) A side-channel based disassembler for the ARM-Cortex M0 Jurian van Geest, Ileana Buhan
2022/522 (PDF ) The Case of Small Prime Numbers Versus the Joye-Libert Cryptosystem George Teseleanu
2022/521 (PDF ) On The Distributed Discrete Logarithm Problem with Preprocessing Pavel Hubáček, Ľubica Jančová, Veronika Králová
2022/520 (PDF ) Efficient Verification of the Wesolowski Verifiable Delay Function for Distributed Environments Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2022/519 (PDF ) HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest Md Rasid Ali, Debranjan Pal, Abhijit Das, Dipanwita Roychowdhury
2022/518 (PDF ) Failing to hash into supersingular isogeny graphs Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig
2022/517 (PDF ) Local permutation polynomials and the action of e-Klenian groups Jaime Gutierrez, Jorge Jimenez Urroz
2022/516 (PDF ) zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos
2022/515 (PDF ) MOSFHET: Optimized Software for FHE over the Torus Antonio Guimarães, Edson Borin, Diego F. Aranha
2022/514 (PDF ) A Key-Recovery Side-Channel Attack on Classic McEliece Qian Guo, Andreas Johansson, Thomas Johansson
2022/513 (PDF ) Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks (CASCADA) Adrián Ranea, Vincent Rijmen
2022/512 (PDF ) A Bit-Vector Differential Model for the Modular Addition by a Constant and its Applications to Differential and Impossible-Differential Cryptanalysis Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
2022/510 (PDF ) Bulletproofs++: Next Generation Confidential Transactions via Reciprocal Set Membership Arguments Liam Eagen, Sanket Kanjalkar, Tim Ruffing, Jonas Nick
2022/509 (PDF ) Lattice Signature with Efficient Protocols, Application to Anonymous Credentials Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders
2022/508 (PDF ) Security of Truncated Permutation Without Initial Value Lorenzo Grassi, Bart Mennink
2022/507 (PDF ) Low-Latency Hardware Private Circuits David Knichel, Amir Moradi
2022/506 (PDF ) Design and analysis of a distributed ECDSA signing service Jens Groth, Victor Shoup
2022/505 (PDF ) Riding the Waves Towards Generic Single-Cycle Masking in Hardware Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard
2022/504 (PDF ) Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev
2022/503 (PDF ) Towards a Formal Treatment of Logic Locking Peter Beerel, Marios Georgiou, Ben Hamlin, Alex J. Malozemoff, Pierluigi Nuzzo
2022/502 (PDF ) Fast Diffusion Block for Secret Key Cryptography Vlastimil Klima
2022/501 (PDF ) Another Concrete Quantum Cryptanalysis of Binary Elliptic Curves Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Harashta Tatimma Larasati, Howon Kim
2022/500 (PDF ) Multi-Server PIR with Full Error Detection and Limited Error Correction Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2022/499 (PDF ) Cryptographic Oracle-Based Conditional Payments Varun Madathil, Sri AravindaKrishnan Thyagarajan, Dimitrios Vasilopoulos, Lloyd Fournier, Giulio Malavolta, Pedro Moreno-Sanchez
2022/498 (PDF ) Limitations of Information-theoretic Incompressible Encodings Petr Sedláček
2022/497 (PDF ) Protecting Distributed Primitives against Leakage: Equivocal Secret Sharing and More Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2022/496 (PDF ) Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium Naina Gupta, Arpan Jati, Anupam Chattopadhyay, Gautam Jha
2022/495 (PDF ) Maliciously Circuit-Private FHE from Information-Theoretic Principles Nico Döttling, Jesko Dujmovic
2022/494 (PDF ) Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM Emre Karabulut, Erdem Alkim, Aydin Aysu
2022/493 (PDF ) Don’t Learn What You Already Know: Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking Loïc Masure, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert
2022/492 (PDF ) Towards Smart Contract-based Verification of Anonymous Credentials Robert Muth, Tarek Galal, Jonathan Heiss, Florian Tschorsch
2022/491 (PDF ) Multi-Party Computation in the GDPR Lukas Helminger, Christian Rechberger
2022/490 (PDF ) Information Bounds and Convergence Rates for Side-Channel Security Evaluators Loïc Masure, Gaëtan Cassiers, Julien Hendrickx, François-Xavier Standaert
2022/489 (PDF ) A Practical-Quantum Differential Attack on Block Ciphers Tarun Yadav, Manoj Kumar, Amit Kumar, S K Pal
2022/488 (PDF ) OrgAn: Organizational Anonymity with Low Latency Debajyoti Das, Easwar Vivek Mangipudi, Aniket Kate
2022/487 (PDF ) New Key-Recovery Attack on Reduced-Round AES Navid Ghaedi Bardeh, Vincent Rijmen
2022/486 (PDF ) MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete, Léo Robert
2022/485 (PDF ) Two new classes of permutation trinomials over $\mathbb{F}_{q^3}$ with odd characteristic Xi Xie, Nian Li, Linjie Xu, Xiangyong Zeng, Xiaohu Tang
2022/484 (PDF ) VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu
2022/483 (PDF ) When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications Geoff Twardokus, Nina Bindel, Hanif Rahbari, Sarah McCarthy
2022/482 (PDF ) cuFE: High Performance Privacy Preserving Support Vector Machine with Inner-Product Functional Encryption KyungHyun Han, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Seong Oun Hwang
2022/481 (PDF ) India’s “Aadhaar” Biometric ID: Structure, Security, and Vulnerabilities Pratyush Ranjan Tiwari, Dhruv Agarwal, Prakhar Jain, Swagam Dasgupta, Preetha Datta, Vineet Reddy, Debayan Gupta
2022/480 (PDF ) Medha: Microcoded Hardware Accelerator for computing on Encrypted Data Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy
2022/479 (PDF ) Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi
2022/478 (PDF ) Property-Preserving Hash Functions and Combinatorial Group Testing Kazuhiko Minematsu
2022/477 (PDF ) Subverting Cryptographic Hardware used in Blockchain Consensus Pratyush Ranjan Tiwari, Matthew Green
2022/476 (PDF ) On the Security of TrCBC Debrup Chakraborty, Samir Kundu
2022/475 (PDF ) SIDH-sign: an efficient SIDH PoK-based signature Jesús-Javier Chi-Domínguez, Víctor Mateu, Lucas Pandolfo Perin
2022/474 (PDF ) Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication Catinca Mujdei, Arthur Beckers, Jose Maria Bermudo Mera, Angshuman Karmakar, Lennert Wouters, Ingrid Verbauwhede
2022/473 (PDF ) Understanding binary-Goppa decoding Daniel J. Bernstein
2022/472 (PDF ) On the Hardness of Module Learning With Errors with Short Distributions Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2022/471 (PDF ) Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis - A Report on the CHES Challenge Side-Channel Contest 2020 Aron Gohr, Friederike Laus, Werner Schindler
2022/470 (PDF ) Designated-Verifier Linkable Ring Signatures Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou
2022/469 (PDF ) Efficient ASIC Architectures for Low Latency Niederreiter Decryption Daniel Fallnich, Shutao Zhang, Tobias Gemmeke
2022/468 (PDF ) Improved Pump and Jump BKZ by Sharp Simulator Leizhang Wang, Wenwen Xia, Geng Wang, Baocang Wang, Dawu Gu
2022/467 (PDF ) Armistice: Micro-Architectural Leakage Modelling for Masked Software Formal Verification Arnaud de Grandmaison, Karine Heydemann, Quentin L. Meunier
2022/466 (PDF ) Quantum binary quadratic form reduction Nicolas David, Thomas Espitau, Akinori Hosoyamada
2022/463 (PDF ) Reducing the Depth of Quantum FLT-Based Inversion Circuit Harashta Tatimma Larasati, Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Howon Kim
2022/462 (PDF ) New optimization techniques for PlonK’s arithmetization Miguel Ambrona, Anne-Laure Schmitt, Raphael R. Toledo, Danny Willems
2022/461 (PDF ) Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks Wei Cheng, Sylvain Guilley, Jean-Luc Danger
2022/459 (PDF ) SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany
2022/458 (PDF ) Multilinear Schwartz-Zippel mod N with Applications to Succinct Arguments Benedikt Bünz, Ben Fisch
2022/457 (PDF ) Improving Differential-Neural Distinguisher Model For DES, Chaskey and PRESENT Liu Zhang, Zilong Wang
2022/456 (PDF ) Robust, Revocable and Adaptively Secure Attribute-Based Encryption with Outsourced Decryption Anis Bkakria
2022/455 (PDF ) Proof of Availability & Retrieval in a Modular Blockchain Architecture Shir Cohen, Guy Goren, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman
2022/454 (PDF ) Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC Thomas Attema, Vincent Dunning, Maarten Everts, Peter Langenkamp
2022/452 (PDF ) UTT: Decentralized Ecash with Accountable Privacy Alin Tomescu, Adithya Bhat, Benny Applebaum, Ittai Abraham, Guy Gueta, Benny Pinkas, Avishay Yanai
2022/451 (PDF ) Improved Stock Market Structure Using Cryptography Charanjit S. Jutla, Barry Mishra
2022/450 (PDF ) Astrape: Anonymous Payment Channels with Boring Cryptography Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba
2022/449 (PDF ) On End-to-End Encryption Britta Hale, Chelsea Komlo
2022/448 (PDF ) Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021 Sven Bauer, Hermann Drexler, Maximilian Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann
2022/447 (PDF ) Leveled Multikey FHE with constant-size ciphertexts from RLWE Vanesa Daza, Paz Morillo, Sergi Rovira
2022/446 (PDF ) Fast Side-Channel Key-Recovery Attack against Elephant Dumbo Louis Vialar
2022/445 (PDF ) TWAP Oracle Attacks: Easier Done than Said? Torgin Mackinga, Tejaswi Nadahalli, Roger Wattenhofer
2022/444 (PDF ) A White-Box Speck Implementation using Self-Equivalence Encodings (Full Version) Joachim Vandersmissen, Adrián Ranea, Bart Preneel
2022/443 (PDF ) Attack on SHealS and HealS: the Second Wave of GPST Steven D. Galbraith, Yi-Fu Lai
2022/442 (PDF ) Quantum Attacks on PRFs Based on Public Random Permutations Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye
2022/441 (PDF ) Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection Paola de Perthuis, David Pointcheval
2022/440 (PDF ) A Security Model for Randomization-based Protected Caches Jordi Ribes-González, Oriol Farràs, Carles Hernández, Vatistas Kostalabros, Miquel Moretó
2022/439 (PDF ) Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang
2022/438 (PDF ) Computing isogenies between finite Drinfeld modules Benjamin Wesolowski
2022/437 (PDF ) Continuous LWE is as Hard as LWE & Applications to Learning Gaussian Mixtures Aparna Gupte, Neekon Vafa, Vinod Vaikuntanathan
2022/436 (PDF ) Publicly Accountable Robust Multi-Party Computation Marc Rivinius, Pascal Reisert, Daniel Rausch, Ralf Kuesters
2022/435 (PDF ) Fiat-Shamir for Proofs Lacks a Proof Even in the Presence of Shared Entanglement Frédéric Dupuis, Philippe Lamontagne, Louis Salvail
2022/434 (PDF ) Verifiable Quantum Advantage without Structure Takashi Yamakawa, Mark Zhandry
2022/433 (PDF ) McFly: Verifiable Encryption to the Future Made Practical Nico Döttling, Lucjan Hanzlik, Bernardo Magri, Stella Wohnig
2022/432 (PDF ) Classical Verification of Quantum Computations in Linear Time Jiayu Zhang
2022/431 (PDF ) Non-Adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions Xinyu Mao, Noam Mazor, Jiapeng Zhang
2022/430 (PDF ) Is the JCJ voting system really coercion-resistant? Véronique Cortier, Pierrick Gaudry, Quentin Yang
2022/429 (PDF ) Resurrecting Xifrat - Compact Cryptosystems 2nd Attempt Jianfang "Danny" Niu
2022/428 (PDF ) Implicit White-Box Implementations: White-Boxing ARX Ciphers Adrián Ranea, Joachim Vandersmissen, Bart Preneel
2022/427 (PDF ) Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications Katarzyna Kapusta, Matthieu Rambaud, Ferdinand Sibleyras
2022/426 (PDF ) Spectre Declassified: Reading from the Right Place at the Wrong Time Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom
2022/425 (PDF ) SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
2022/424 (PDF ) Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2 Dor Amzaleg, Itai Dinur
2022/423 (PDF ) Polynomial Approximation of Inverse sqrt Function for FHE Samanvaya Panda
2022/422 (PDF ) Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde
2022/421 (PDF ) Multiverse of HawkNess: A Universally-Composable MPC-based Hawk Variant Aritra Banerjee, Hitesh Tewari
2022/420 (PDF ) Gemini: Elastic SNARKs for Diverse Environments Jonathan Bootle, Alessandro Chiesa, Yuncong Hu, Michele Orrù
2022/419 (PDF ) Dew: Transparent Constant-sized zkSNARKs Arasu Arun, Chaya Ganesh, Satya Lokam, Tushar Mopuri, Sriram Sridhar
2022/418 (PDF ) LLTI: Low-Latency Threshold Implementations Victor Arribas, Zhenda Zhang, Svetla Nikova
2022/417 (PDF ) Efficient, Actively Secure MPC with a Dishonest Majority: a Survey Emmanuela Orsini
2022/416 (PDF ) Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad
2022/415 (PDF ) Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee
2022/414 (PDF ) PQ-HPKE: Post-Quantum Hybrid Public Key Encryption Mila Anastasova, Panos Kampanakis, Jake Massimo
2022/413 (PDF ) Instachain: Breaking the Sharding Limits via Adjustable Quorums Mustafa Safa Ozdayi, Yue Guo, Mahdi Zamani
2022/412 (PDF ) Complete and Improved FPGA Implementation of Classic McEliece Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang
2022/411 (PDF ) Quotient Approximation Modular Reduction Aurélien Greuet, Simon Montoya, Clémence Vermeersch
2022/410 (PDF ) Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Sumi, Adnan Anwar
2022/409 (PDF ) Proof-of-Stake Is a Defective Mechanism Vicent Sus
2022/408 (PDF ) On the weightwise nonlinearity of weightwise perfectly balanced functions Agnese Gini, Pierrick Méaux
2022/407 (PDF ) Improving the Privacy of Tor Onion Services Edward Eaton, Sajin Sasy, Ian Goldberg
2022/406 (PDF ) Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK Helger Lipmaa, Janno Siim, Michal Zajac
2022/405 (PDF ) Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7 James Howe, Bas Westerbaan
2022/404 (PDF ) Constant Latency in Sleepy Consensus Atsuki Momose, Ling Ren
2022/403 (PDF ) Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang
2022/402 (PDF ) Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li
2022/401 (PDF ) A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols Cas Cremers, Caroline Fontaine, Charlie Jacomme
2022/400 (PDF ) Quantum Advantage from Any Non-Local Game Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Lisa Yang
2022/399 (PDF ) The Inverse of $\chi$ and Its Applications to Rasta-like Ciphers Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe
2022/398 (PDF ) Auditable, Available and Resilient Private Computation on the Blockchain via MPC Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C. Kao, Vladimir Kolesnikov, Abrahim Ladha, Nicholas Pattengale
2022/397 (PDF ) Revocable Hierarchical Attribute-based Signatures from Lattices Daniel Gardham, Mark Manulis
2022/395 (PDF ) A lightweight verifiable secret sharing scheme in IoTs Likang Lu, Jianzhu Lu
2022/394 (PDF ) Fuzz, Penetration, and AI Testing for SoC Security Verification: Challenges and Solutions Kimia Zamiri Azar, Muhammad Monir Hossain, Arash Vafaei, Hasan Al Shaikh, Nurun N. Mondol, Fahim Rahman, Mark Tehranipoor, Farimah Farahmandi
2022/393 (PDF ) Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation Yashvanth Kondi, abhi shelat
2022/392 (PDF ) Poly Onions: Achieving Anonymity in the Presence of Churn Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin
2022/389 (PDF ) Higher-order masked Saber Suparna Kundu, Jan-Pieter D’Anvers, Michiel Van Beirendonck, Angshuman Karmakar, Ingrid Verbauwhede
2022/388 (PDF ) Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu
2022/387 (PDF ) Phase-shift Fault Analysis of Grain-128 HRIDYA P R, Jimmy Jose
2022/386 (PDF ) Secure Two-party Computation Approach for NTRUEncrypt Lin You, Yan Wang, Liang Li, Gengran Hu
2022/385 (PDF ) ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie
2022/384 (PDF ) Light Clients for Lazy Blockchains Ertem Nusret Tas, David Tse, Lei Yang, Dionysis Zindros
2022/383 (PDF ) On Succinct Non-Interactive Arguments in Relativized Worlds Megan Chen, Alessandro Chiesa, Nicholas Spooner
2022/382 (PDF ) Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups Matteo Campanelli, Rosario Gennaro, Kelsey Melissaris, Luca Nizzardo
2022/381 (PDF ) On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption Hirotomo Shinoki, Koji Nuida
2022/380 (PDF ) A Linear-Time 2-Party Secure Merge Protocol Brett Hemenway Falk, Rohit Nema, Rafail Ostrovsky
2022/379 (PDF ) Fully Secure PSI via MPC-in-the-Head S. Dov Gordon, Carmit Hazay, Phi Hung Le
2022/378 (PDF ) Share $\&$ Shrink: (In-)Feasibility of MPC from one Broadcast-then-Asynchrony, and Delegated Computation Antoine Urban, Matthieu Rambaud
2022/377 (PDF ) (Commit-and-Prove) Predictable Arguments with Privacy Hamidreza Khoshakhlagh
2022/376 (PDF ) Universally Composable End-to-End Secure Messaging Ran Canetti, Palak Jain, Marika Swanberg, Mayank Varia
2022/375 (PDF ) A Note on the Security Framework of Two-key DbHtS MACs Tingting Guo, Peng Wang
2022/374 (PDF ) Simple Three-Round Multiparty Schnorr Signing with Full Simulatability Yehuda Lindell
2022/373 (PDF ) Blind accumulators for e-voting Sergey Agievich
2022/372 (PDF ) Shorter quantum circuits Vadym Kliuchnikov, Kristin Lauter, Romy Minko, Christophe Petit, Adam Paetznick
2022/371 (PDF ) A High-performance ECC Processor over Curve448 based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier Asep Muhamad Awaludin, Jonguk Park, Rini Wisnu Wardhani, Howon Kim
2022/370 (PDF ) Efficient NIZKs from LWE via Polynomial Reconstruction and ``MPC in the Head" Riddhi Ghosal, Paul Lou, Amit Sahai
2022/369 (PDF ) Matching Attacks on Romulus-M Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata
2022/368 (PDF ) Spiral: Fast, High-Rate Single-Server PIR via FHE Composition Samir Jordan Menon, David J. Wu
2022/367 (PDF ) Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings Patrick Longa
2022/366 (PDF ) On the Algebraic Degree of Iterated Power Functions Clémence Bouvier, Anne Canteaut, Léo Perrin
2022/365 (PDF ) Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz
2022/364 (PDF ) Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE Aymeric Genêt, Novak Kaluđerović
2022/363 (PDF ) An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security Damiano Abram, Ivan Damgård, Claudio Orlandi, Peter Scholl
2022/362 (PDF ) How to Backdoor (Classic) McEliece and How to Guard Against Backdoors Tobias Hemmert, Alexander May, Johannes Mittmann, Carl Richard Theodor Schneider
2022/361 (PDF ) Base64 Malleability in Practice Panagiotis Chatzigiannis, Konstantinos Chalkias
2022/360 (PDF ) Privacy-Preserving Contrastive Explanations with Local Foil Trees Thijs Veugen, Bart Kamphorst, Michiel Marcus
2022/359 (PDF ) How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippel
2022/358 (PDF ) Linear Private Set Union from Multi-Query Reverse Private Membership Test Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin
2022/357 (PDF ) An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves Antonin Leroux
2022/356 (PDF ) A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles MUSTAIN BILLAH, SK. TANZIR MEHEDI, ADNAN ANWAR, ZIAUR RAHMAN, RAFIQUL ISLAM
2022/355 (PDF ) A More Complete Analysis of the Signal Double Ratchet Algorithm Alexander Bienstock, Jaiden Fairoze, Sanjam Garg, Pratyay Mukherjee, Srinivasan Raghuraman
2022/354 (PDF ) Optimal Synchronous Approximate Agreement with Asynchronous Fallback Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer
2022/353 (PDF ) SNARGs for P from Sub-exponential DDH and QR James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan
2022/352 (PDF ) Co-factor clearing and subgroup membership testing on pairing-friendly curves Youssef El Housni, Aurore Guillevic, Thomas Piellard
2022/351 (PDF ) Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub
2022/350 (PDF ) DO NOT RUG ON ME: ZERO-DIMENSIONAL SCAM DETECTION Bruno Mazorra, Victor Adan, Vanesa Daza
2022/349 (PDF ) Hard Homogeneous Spaces from the Class Field Theory of Imaginary Hyperelliptic Function Fields Antoine Leudière, Pierre-Jean Spaenlehauer
2022/348 (PDF ) Fast Subgroup Membership Testings for $\mathbb{G}_1$, $\mathbb{G}_2$ and $\mathbb{G}_T$ on Pairing-friendly Curves Yu Dai, Kaizhan Lin, Chang-An Zhao, Zijian Zhou
2022/347 (PDF ) Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, Yongsoo Song
2022/346 (PDF ) Recovering the tight security proof of $SPHINCS^{+}$ Andreas Hülsing, Mikhail Kudinov
2022/345 (PDF ) On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves Wouter Castryck, Marc Houben, Frederik Vercauteren, Benjamin Wesolowski
2022/344 (PDF ) Shorter Signatures from MQ William Wang
2022/343 (PDF ) Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai
2022/342 (PDF ) From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications Lorenzo Grassi, Morten Øygarden, Markus Schofnegger, Roman Walch
2022/341 (PDF ) Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher Nicoleta-Norica Băcuieți, Lejla Batina, Stjepan Picek
2022/340 (PDF ) To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA Azade Rezaeezade, Guilherme Perin, Stjepan Picek
2022/339 (PDF ) New Digital Signature Algorithm EHT Igor Semaev
2022/338 (PDF ) Communication-Efficient Inner Product Private Join and Compute with Cardinality Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, Junichi Tomida
2022/337 (PDF ) Improving Software Quality in Cryptography Standardization Projects Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers
2022/336 (PDF ) Batch Arguments for NP and More from Standard Bilinear Group Assumptions Brent Waters, David J. Wu
2022/335 (PDF ) Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System Tuan-Hong Chua, Iftekhar Salam
2022/334 (PDF ) Improved Private Set Intersection for Sets with Small Entries Dung Bui, Geoffroy Couteau
2022/333 (PDF ) We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption Dandan Yuan, Shujie Cui, Giovanni Russello
2022/332 (PDF ) CostCO: An automatic cost modeling framework for secure multi-party computation Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa
2022/331 (PDF ) Parallelizable Authenticated Encryption with Small State Size Akiko Inoue, Kazuhiko Minematsu
2022/330 (PDF ) A Simple and Generic Approach to Dynamic Collusion Model Rachit Garg, Rishab Goyal, George Lu
2022/329 (PDF ) Rolling up lattice cryptography primes Daniel R. L. Brown
2022/328 (PDF ) On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks Lennert Wouters, Benedikt Gierlichs, Bart Preneel
2022/327 (PDF ) Provable Secure Software Masking in the Real-World Arthur Beckers, Lennert Wouters, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
2022/326 (PDF ) Composable Dynamic Secure Emulation Pierre Civit, Maria Potop-Butucaru
2022/325 (PDF ) FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level Michail Moraitis, Elena Dubrova
2022/324 (PDF ) Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption Yao Jiang Galteland, Jiaxin Pan
2022/323 (PDF ) Dilithium for Memory Constrained Devices Joppe W. Bos, Joost Renes, Amber Sprenkels
2022/322 (PDF ) SecFloat: Accurate Floating-Point meets Secure 2-Party Computation Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi
2022/321 (PDF ) zkKYC in DeFi: An approach for implementing the zkKYC solution concept in Decentralized Finance Pieter Pauwels, Joni Pirovich, Peter Braunz, Jack Deeb
2022/320 (PDF ) Blazing Fast PSI from Improved OKVS and Subfield VOLE Srinivasan Raghuraman, Peter Rindal
2022/319 (PDF ) A Blockchain-based Long-term Time-Stamping Scheme Long Meng, Liqun Chen
2022/318 (PDF ) Efficient Online-friendly Two-Party ECDSA Signature Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui
2022/317 (PDF ) Thora: Atomic and Privacy-Preserving Multi-Channel Updates Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei
2022/316 (PDF ) Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2022/315 (PDF ) Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN Damiano Abram, Peter Scholl
2022/314 (PDF ) Batch-OT with Optimal Rate Zvika Brakerski, Pedro Branco, Nico Döttling, Sihang Pu
2022/313 (PDF ) Efficient Proof of RAM Programs from Any Public-Coin Zero-Knowledge System Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy, Michiel Verbauwhede
2022/312 (PDF ) Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols Shahar P. Cohen, Moni Naor
2022/311 (PDF ) Unidirectional Updatable Encryption and Proxy Re-encryption from DDH Peihan Miao, Sikhar Patranabis, Gaven Watson
2022/310 (PDF ) Dispute-free Scalable Open Vote Network using zk-SNARKs Muhammad ElSheikh, Amr M. Youssef
2022/309 (PDF ) On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing Ashrujit Ghoshal, Ilan Komargodski
2022/308 (PDF ) Colordag: An Incentive-Compatible Blockchain Ittai Abraham, Danny Dolev, Ittay Eyal, Joseph Y. Halpern
2022/307 (PDF ) An Anonymous Trace-and-Revoke Broadcast Encryption Scheme Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehle
2022/306 (PDF ) The More You Know: Improving Laser Fault Injection with Prior Knowledge Marina Krček, Thomas Ordas, Daniele Fronte, Stjepan Picek
2022/305 (PDF ) Surveying definitions of election verifiability Ben Smyth, Michael R. Clarkson
2022/304 (PDF ) Multi-User BBB Security of Public Permutations Based MAC Yu Long Chen, Avijit Dutta, Mridul Nandi
2022/303 (PDF ) Unlinkable Delegation of WebAuthn Credentials Nick Frymann, Daniel Gardham, Mark Manulis
2022/302 (PDF ) SoK: Oblivious Pseudorandom Functions Sílvia Casacuberta, Julia Hesse, Anja Lehmann
2022/301 (PDF ) How Practical are Fault Injection Attacks, Really? Jakub Breier, Xiaolu Hou
2022/300 (PDF ) Faster NTRU on ARM Cortex-M4 with TMVP-based multiplication Irem Keskinkurt Paksoy, Murat Cenk
2022/299 (PDF ) Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3 Yanhong Fan,Muzhou Li,Chao Niu,Zhenyu Lu,Meiqin Wang
2022/298 (PDF ) Constructive Post-Quantum Reductions Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai
2022/297 (PDF ) Promise $\Sigma$-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups Yi Deng, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie
2022/296 (PDF ) On new results on Extremal Graph Theory, Theory of Algebraic Graphs and their applications in Cryptography and Coding Theory. Vasyl Ustimenko
2022/295 (PDF ) Quantum Proofs of Deletion for Learning with Errors Alexander Poremba
2022/294 (PDF ) A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu
2022/293 (PDF ) Minimizing Setup in Broadcast-Optimal Two Round MPC Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
2022/292 (PDF ) Comment on ``SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices'' Michael Amar, Amit Kama, Kang Wang, Yossi Oren
2022/291 (PDF ) Provable security of CFB mode of operation with external re-keying Vadim Tsypyschev, Iliya Morgasov
2022/290 (PDF ) Universally Composable Sigma-protocols in the Global Random-Oracle Model Anna Lysyanskaya, Leah Namisa Rosenbloom
2022/289 (PDF ) Two Attacks On Proof-of-Stake GHOST/Ethereum Joachim Neu, Ertem Nusret Tas, David Tse
2022/288 (PDF ) Spats: confidential assets and non-fungible tokens Aaron Feickert, Aram Jivanyan
2022/287 (PDF ) User-Perceived Privacy in Blockchain Simin Ghesmati, Walid Fdhila, Edgar Weippl
2022/286 (PDF ) Provably Secure Identity-Based Remote Password Registration Csanád Bertók, Andrea Huszti, Szabolcs Kovács, Norbert Oláh
2022/285 (PDF ) Usability of Cryptocurrency Wallets Providing CoinJoin Transactions Simin Ghesmati, Walid Fdhila, Edgar Weippl
2022/284 (PDF ) Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
2022/283 (PDF ) Block-Cipher-Based Tree Hashing Aldo Gunsing
2022/282 (PDF ) Achievable CCA2 Relaxation for Homomorphic Encryption Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald
2022/281 (PDF ) Succinct Interactive Oracle Proofs: Applications and Limitations Shafik Nassar, Ron D. Rothblum
2022/280 (PDF ) Efficient Homomorphic Evaluation on Large Intervals Jung Hee Cheon, Wootae Kim, Jai Hyun Park
2022/279 (PDF ) Permutation rotation-symmetric S-boxes, liftings and affine equivalence Tron Omland, Pantelimon Stanica
2022/278 (PDF ) Incompressiblity and Next-Block Pseudoentropy Iftach Haitner, Noam Mazor, Jad Silbak
2022/277 (PDF ) Security Analysis of Elliptic Curves over Sextic Extension of Small Prime Fields Robin Salen, Vijaykumar Singh, Vladimir Soukharev
2022/276 (PDF ) Hardness estimates of the Code Equivalence Problem in the Rank Metric Krijn Reijnders, Simona Samardjiska, Monika Trimoska
2022/275 (PDF ) Concrete Analysis of Approximate Ideal-SIVP to Decision Ring-LWE Reduction Neal Koblitz, Subhabrata Samajder, Palash Sarkar, Subhadip Singha
2022/274 (PDF ) EcGFp5: a Specialized Elliptic Curve Thomas Pornin
2022/273 (PDF ) Compact Storage for Homomorphic Encryption Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald
2022/272 (PDF ) Quantum-Secure Aggregate One-time Signatures with Detecting Functionality Shingo Sato, Junji Shikata
2022/271 (PDF ) Approximate Divisor Multiples -- Factoring with Only a Third of the Secret CRT-Exponents Alexander May, Julian Nowakowski, Santanu Sarkar
2022/270 (PDF ) Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
2022/269 (PDF ) On Codes and Learning With Errors over Function Fields Maxime Bombar, Alain Couvreur, Thomas Debris-Alazard
2022/268 (PDF ) Efficient Schemes for Committing Authenticated Encryption Mihir Bellare, Viet Tung Hoang
2022/267 (PDF ) Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo
2022/266 (PDF ) Verifiably Distributed Multi-User Secret Sharing schemes Likang Lu, Jianzhu Lu
2022/265 (PDF ) Non-interactive Mimblewimble transactions, revisited Georg Fuchsbauer, Michele Orrù
2022/264 (PDF ) Gradecast in Synchrony and Reliable Broadcast in Asynchrony with Optimal Resilience, Efficiency, and Unconditional Security Ittai Abraham, Gilad Asharov
2022/263 (PDF ) Rethinking Modular Multi-Exponentiation in Real-World Applications Vidal Attias, Luigi Vigneri, Vassil Dimitrov
2022/262 (PDF ) Secure Non-Interactive Reduction and Spectral Analysis of Correlations Pratyush Agarwal, Varun Narayanan, Shreya Pathak, Manoj Prabhakaran, Vinod M. Prabhakaran, Mohammad Ali Rehan
2022/261 (PDF ) Sublinear GMW-Style Compiler for MPC with Preprocessing Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
2022/260 (PDF ) Advances in Logic Locking: Past, Present, and Prospects Hadi Mardani Kamali, Kimia Zamiri Azar, Farimah Farahmandi, Mark Tehranipoor
2022/259 (PDF ) Partial Key Exposure Attacks on BIKE, Rainbow and NTRU Andre Esser, Alexander May, Javier Verbel, Weiqiang Wen
2022/258 (PDF ) Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications Hasan Al Shaikh, Mohammad Bin Monjil, Shigang Chen, Farimah Farahmandi, Navid Asadizanjani, Mark Tehranipoor, Fahim Rahman
2022/257 (PDF ) Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols Ran Cohen, Jack Doerner, Yashvanth Kondi, abhi shelat
2022/256 (PDF ) Multi-Designated Receiver Signed Public Key Encryption Ueli Maurer, Christopher Portmann, Guilherme Rito
2022/255 (PDF ) Round-Optimal Byzantine Agreement Diana Ghinea, Vipul Goyal, Chen-Da Liu-Zhang
2022/254 (PDF ) Unprotected and Masked Hardware Implementations of Spook v2 Charles Momin, Gaëtan Cassiers, François-Xavier Standaert
2022/253 (PDF ) The Side-Channel Metrics Cheat Sheet Kostas Papagiannopoulos, Ognjen Glamocanin, Melissa Azouaoui, Dorian Ros, Francesco Regazzoni, Mirjana Stojilovic
2022/252 (PDF ) Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations Charles Momin, Gaëtan Cassiers, François-Xavier Standaert
2022/251 (PDF ) CoCoA: Concurrent Continuous Group Key Agreement Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter
2022/250 (PDF ) Private Circuits with Quasilinear Randomness Vipul Goyal, Yuval Ishai, Yifan Song
2022/249 (PDF ) The Summation-Truncation Hybrid: Reusing Discarded Bits for Free Aldo Gunsing, Bart Mennink
2022/248 (PDF ) Collapseability of Tree Hashes Aldo Gunsing, Bart Mennink
2022/247 (PDF ) Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model Aldo Gunsing, Joan Daemen, Bart Mennink
2022/246 (PDF ) On the Concrete Security of TLS 1.3 PSK Mode Hannah Davis, Denis Diemert, Felix Günther, Tibor Jager
2022/245 (PDF ) Entropic Hardness of Module-LWE from Module-NTRU Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
2022/244 (PDF ) Universally Composable Subversion-Resilient Cryptography Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, Daniele Venturi
2022/243 (PDF ) A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang
2022/242 (PDF ) YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring
2022/241 (PDF ) Coalition and Threshold Hash-Based Signatures John Kelsey, Stefan Lucks, Nathalie Lang
2022/240 (PDF ) SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients Hamza Abusalah, Georg Fuchsbauer, Peter Gaži, Karen Klein
2022/239 (PDF ) Several Improvements on BKZ Algorithm Ziyu Zhao, Jintai Ding
2022/238 (PDF ) HEAD: an FHE-based Privacy-preserving Cloud Computing Protocol with Compact Storage and Efficient Computation Lijing Zhou, Ziyu Wang, Hongrui Cui, Xiao Zhang, Xianggui Wang, Yu Yu
2022/237 (PDF ) Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions Jesper Buus Nielsen, João Ribeiro, Maciej Obremski
2022/236 (PDF ) Characterizing the qIND-qCPA (in)security of the CBC, CFB, OFB and CTR modes of operation Tristan Nemoz, Zoé AMBLARD, Aurélien DUPIN
2022/235 (PDF ) Limits of Preprocessing for Single-Server PIR Giuseppe Persiano, Kevin Yeo
2022/234 (PDF ) New algorithms for the Deuring correspondence: Towards practical and secure SQISign signatures Luca De Feo, Antonin Leroux, Patrick Longa, Benjamin Wesolowski
2022/233 (PDF ) Variational quantum solutions to the Shortest Vector Problem Martin R. Albrecht, Miloš Prokop, Yixin Shen, Petros Wallden
2022/232 (PDF ) Conditional Variational AutoEncoder based on Stochastic Attack Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli
2022/231 (PDF ) Towards Low-Latency Implementation of Linear Layers Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang
2022/230 (PDF ) Apple vs. EMA: Electromagnetic Side Channel Attacks on Apple CoreCrypto Gregor Haas, Aydin Aysu
2022/229 (PDF ) WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography Markku-Juhani O. Saarinen
2022/228 (PDF ) Semi-Quantum Tokenized Signatures Omri Shmueli
2022/227 (PDF ) The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects Ben Nassi, Ras Swissa, Yuval Elovici, Boris Zadov
2022/226 (PDF ) To Label, or Not To Label (in Generic Groups) Mark Zhandry
2022/225 (PDF ) Constant matters: Fine-grained Complexity of Differentially Private Continual Observation Using Completely Bounded Norms Monika Henzinger, Jalaj Upadhyay
2022/224 (PDF ) Embedding the UC Model into the IITM Model Daniel Rausch, Ralf Kuesters, Céline Chevalier
2022/223 (PDF ) Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection Thibauld Feneuil, Jules Maire, Matthieu Rivain, Damien Vergnaud
2022/222 (PDF ) Half-Aggregation of Schnorr Signatures with Tight Reductions Yanbo Chen, Yunlei Zhao
2022/221 (PDF ) Secure Joint Communication and Sensing Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener
2022/220 (PDF ) Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security Keita Emura, Shiho Moriai, Takuma Nakajima, Masato Yoshimi
2022/219 (PDF ) PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication Hanyu Jia, Xiangxue Li
2022/218 (PDF ) On the Impossibility of Key Agreements from Quantum Random Oracles Per Austrin, Hao Chung, Kai-Min Chung, Shiuan Fu, Yao-Ting Lin, Mohammad Mahmoody
2022/217 (PDF ) High-Performance Hardware Implementation of Lattice-Based Digital Signatures Luke Beckwith, Duc Tri Nguyen, Kris Gaj
2022/216 (PDF ) Short Leakage Resilient and Non-malleable Secret Sharing Schemes Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2022/215 (PDF ) Multi-Client Functional Encryption with Fine-Grained Access Control Ky Nguyen, Duong Hieu Phan, David Pointcheval
2022/214 (PDF ) Breaking Rainbow Takes a Weekend on a Laptop Ward Beullens
2022/213 (PDF ) Issuer-Hiding Attribute-Based Credentials Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, Kai Samelin
2022/212 (PDF ) Tight Analysis of Decrypton Failure Probability of Kyber in Reality Boyue Fang, Weize Wang, Yunlei Zhao
2022/211 (PDF ) Azeroth: Auditable Zero-knowledge Transactions in Smart Contracts Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh
2022/210 (PDF ) An Analysis of the Algebraic Group Model Jonathan Katz, Cong Zhang, Hong-Sheng Zhou
2022/209 (PDF ) Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection ZiXi Hee, Iftekhar Salam
2022/208 (PDF ) Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design Alon Shakevsky, Eyal Ronen, Avishai Wool
2022/207 (PDF ) Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference Zhicong Huang, Wen-jie Lu, Cheng Hong, Jiansheng Ding
2022/206 (PDF ) Proving UNSAT in Zero Knowledge Ning Luo, Timos Antonopoulos, William Harris, Ruzica Piskac, Eran Tromer, Xiao Wang
2022/205 (PDF ) Fiat-Shamir signatures without aborts using Ring-and-Noise assumptions Dipayan Das, Antoine Joux, Anand Kumar Narayanan
2022/204 (PDF ) RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library Furkan Aydin, Emre Karabulut, Seetal Potluri, Erdem Alkim, Aydin Aysu
2022/203 (PDF ) A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV Jean-Charles Faugère, Gilles macario-Rat, Jacques Patarin, Ludovic Perret
2022/202 (PDF ) Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLU's Abdelrahaman Aly, Kashif Nawaz, Eugenio Salazar, Victor Sucasas
2022/201 (PDF ) Enig: Player Replaceable Finality Layers with Optimal Validity Simon Holmgaard Kamp, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi
2022/200 (PDF ) Non-Black-Box Approach to Secure Two-Party Computation in Three Rounds Akshayaram Srinivasan
2022/199 (PDF ) Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing Giang Linh Duc Nguyen, Dung Hoang Duong, Huy Quoc Le, Willy Susilo
2022/198 (PDF ) Efficient FHEW Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption Yongwoo Lee, Daniele Micciancio, Andrey Kim, Rakyong Choi, Maxim Deryabin, Jieun Eom, Donghoon Yoo
2022/197 (PDF ) Nice Attacks --- but What is the Cost? Computational Models for Cryptanalysis Charles Bouillaguet
2022/196 (PDF ) Generalising Fault Attacks to Genus Two Isogeny Cryptosystems Ariana Goh, Chu-Wee Lim, Yan Bo Ti
2022/195 (PDF ) Quantum and Classical Algorithms for Bounded Distance Decoding Richard Allen, Ratip Emin Berker, Sílvia Casacuberta, Michael Gul
2022/194 (PDF ) Finding Collisions against 4-round SHA3-384 in Practical Time Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov
2022/193 (PDF ) OptRand: Optimistically responsive distributed random beacons Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak
2022/192 (PDF ) SoftSpokenOT: Quieter OT Extension From Small-Field Silent VOLE in the Minicrypt Model Lawrence Roy
2022/191 (PDF ) NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead Andrew Park, Wei-Kai Lin, Elaine Shi
2022/190 (PDF ) Short-lived zero-knowledge proofs and signatures Arasu Arun, Joseph Bonneau, Jeremy Clark
2022/189 (PDF ) Simplified MITM Modeling for Permutations: New (Quantum) Attacks André Schrottenloher, Marc Stevens
2022/188 (PDF ) Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs Thibauld Feneuil, Antoine Joux, Matthieu Rivain
2022/187 (PDF ) Constant-Round YOSO MPC Without Setup Sebastian Kolby, Divya Ravi, Sophia Yakoubov
2022/186 (PDF ) Overflow-detectable Floating-point Fully Homomorphic Encryption Seunghwan Lee, Dong-Joon Shin
2022/185 (PDF ) Statistically Sender-Private OT from LPN and Derandomization Nir Bitansky, Sapir Freizeit
2022/184 (PDF ) Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3 (Full Version) Jian Guo, Guozhen Liu, Ling Song, Yi Tu
2022/183 (PDF ) Improving Differential-Neural Cryptanalysis Liu Zhang, Zilong Wang, Baocang wang
2022/182 (PDF ) A Novel Framework for Explainable Leakage Assessment Si Gao, Elisabeth Oswald
2022/181 (PDF ) Vector Commitments over Rings and Compressed $\Sigma$-Protocols Thomas Attema, Ignacio Cascudo, Ronald Cramer, Ivan Bjerre Damgård, Daniel Escudero
2022/180 (PDF ) Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher Orel Cosseron, Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert
2022/179 (PDF ) Locally Verifiable Signature and Key Aggregation Rishab Goyal, Vinod Vaikuntanathan
2022/178 (PDF ) Lower Bound on SNARGs in the Random Oracle Model Iftach Haitner, Daniel Nukrai, Eylon Yogev
2022/177 (PDF ) The Power of the Differentially Oblivious Shuffle in Distributed Privacy Mechanisms Mingxun Zhou, Elaine Shi
2022/176 (PDF ) Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems Minze Xu, Yuan Zhang, Sheng Zhong
2022/175 (PDF ) WeRLman: To Tackle Whale (Transactions), Go Deep (RL) Roi Bar-Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar
2022/174 (PDF ) How to Launch a Powerful Side-Channel Collision Attack? Jiangshan Long, Changhai Ou, Yajun Ma, Yifan Fan, Hua Chen, Shihui Zheng
2022/173 (PDF ) Collision-Resistance from Multi-Collision-Resistance Ron D. Rothblum, Prashant Nalini Vasudevan
2022/172 (PDF ) A remark on NIST SP 800-22 serial test Corina-Elena Bogos, Razvan Mocanu, Emil Simion
2022/171 (PDF ) Practical and Improved Byzantine Reliable Broadcast and Asynchronous Verifiable Information Dispersal from Hash Functions Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang
2022/170 (PDF ) gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies Foteini Baldimtsi, Panagiotis Chatzigiannis, S. Dov Gordon, Phi Hung Le, Daniel McVicker
2022/169 (PDF ) SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful Markku-Juhani O. Saarinen
2022/168 (PDF ) Hardness of Approximation for Stochastic Problems via Interactive Oracle Proofs Gal Arnon, Alessandro Chiesa, Eylon Yogev
2022/167 (PDF ) Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority Benny Applebaum, Eliran Kachlon, Arpita Patra
2022/166 (PDF ) Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti
2022/165 (PDF ) PAC Learnability of iPUF Variants Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra
2022/164 (PDF ) Shanrang: Fully Asynchronous Proactive Secret Sharing with Dynamic Committees Yunzhou Yan, Yu Xia, Srinivas Devadas
2022/163 (PDF ) A High Performance Payment Processing System Designed for Central Bank Digital Currencies James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula
2022/162 (PDF ) On the precision loss in approximate homomorphic encryption Anamaria Costache, Benjamin R. Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie, Rachel Player
2022/161 (PDF ) D-KODE: Mechanism to Generate and Maintain a Billion Keys Easwar Vivek Mangipudi, Aniket Kate
2022/160 (PDF ) Random primes in arithmetic progressions Pascal Giorgi, Bruno Grenet, Armelle Perret du Cray, Daniel S. Roche
2022/158 (PDF ) Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs Olivier Bronchain, Gaëtan Cassiers
2022/157 (PDF ) Shuffle-based Private Set Union: Faster and More Secure Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu
2022/156 (PDF ) Universal Reductions: Reductions Relative to Stateful Oracles Benjamin Chan, Cody Freitag, Rafael Pass
2022/155 (PDF ) FairTraDEX: A Decentralised Exchange Preventing Value Extraction Conor McMenamin, Vanesa Daza, Matthias Fitzi, Padraic O'Donoghue
2022/154 (PDF ) Coeus: A System for Oblivious Document Ranking and Retrieval Ishtiyaque Ahmad, Laboni Sarker, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
2022/153 (PDF ) Faulty isogenies: a new kind of leakage Gora Adj, Jesús-Javier Chi-Domínguez, Víctor Mateu, Francisco Rodríguez-Henríquez
2022/152 (PDF ) K-XMSS and K-SPHINCS$^+$:Hash based Signatures with\\Korean Cryptography Algorithms Minjoo Sim, Siwoo Eum, Gyeongju Song, HyeokDong Kwon, Kyungbae Jang, HyunJun Kim, HyunJi Kim, Yujin Yang, Wonwoong Kim, Wai-Kong Lee, Hwajeong Seo
2022/151 (PDF ) Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives Ling Sun, Wei Wang, Meiqin Wang
2022/150 (PDF ) The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
2022/149 (PDF ) Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping Pierre-Emmanuel Clet, Martin Zuber, Aymen Boudguiga, Renaud Sirdey, Cédric Gouy-Pailler
2022/148 (PDF ) Attacks on the Firekite cipher Thomas Johansson, Willi Meier, Vu Nguyen
2022/147 (PDF ) Constructing new superclasses of bent functions from known ones Amar Bapić, Enes Pasalic, Fengrong Zhang, Samir Hodžić
2022/146 (PDF ) Training Differentially Private Models with Secure Multiparty Computation Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson Nascimento, Martine De Cock
2022/145 (PDF ) An elementary construction of QR-UOV Yasufumi Hashimoto
2022/144 (PDF ) Rainbow Differential Privacy Ziqi Zhou, Onur Gunlu, Rafael G. L. D'Oliveira, Muriel Medard, Parastoo Sadeghi, Rafael F. Schaefer
2022/143 (PDF ) Composition construction of new bent functions from known dually isomorphic bent functions Guangpu Gao, Weiguo Zhang, Yongjuan Wang
2022/142 (PDF ) Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao
2022/141 (PDF ) Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, Sushmita Ruj
2022/140 (PDF ) On the Related-Key Attack Security of Authenticated Encryption Schemes Sebastian Faust, Juliane Krämer, Maximilian Orlt, Patrick Struck
2022/139 (PDF ) Sponge-based Authenticated Encryption: Security against Quantum Attackers Christian Janson, Patrick Struck
2022/138 (PDF ) Resisting Key-Extraction and Code-Compression: a Secure Implementation of the HFE Signature Scheme in the White-Box Model Pierre Galissant, Louis Goubin
2022/137 (PDF ) Ten years of cube attacks Marco Cianfriglia, Elia Onofri, Silvia Onofri, Marco Pedicini
2022/136 (PDF ) Twilight: A Differentially Private Payment Channel Network Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad
2022/135 (PDF ) Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers Zheng Xu, Yongqiang Li, Lin Jiao, Mingsheng Wang, Willi Meier
2022/134 (PDF ) Functional Cryptanalysis: Application to reduced-round Xoodoo Emanuele Bellini, Rusydi H. Makarim
2022/133 (PDF ) Faster verification of V2X BSM messages via Message Chaining Eduardo Lopes Cominetti, Marcos Vinicius M. Silva, Marcos A. Simplicio Jr., Harsh Kupwade Patil, Jefferson E. Ricardini
2022/132 (PDF ) On Defeating Graph Analysis of Anonymous Transactions Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo, Hoover H. F. Yin
2022/131 (PDF ) Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding
2022/130 (PDF ) A LeVeL Paying Field: Cryptographic Solutions towards Social Accountability and Financial Inclusion Gideon Samid
2022/129 (PDF ) TOFU - Toggle Count Analysis made simple Michael Gruber, Georg Sigl
2022/128 (PDF ) Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes Pierre Karpman, Charlotte Lefevre
2022/127 (PDF ) CCA secure ElGamal encryption over an integer group where ICDH assumption holds Gyu-Chol. Kim, Jae-Yong. Sin, Yong-Bok. Jong
2022/126 (PDF ) Storage Security in Cloud Computing: Data Auditing Protocols Andrei-Alexandru Brebu, Mihai Iacov, Emil Simion
2022/125 (PDF ) Profiled Side-channel Attack on Cryptosystems based on the Binary Syndrome Decoding Problem Brice Colombier, Vlad-Florin Drăgoi, Pierre-Louis Cayrel, Vincent Grosso
2022/124 (PDF ) On the Performance Gap of a Generic C Optimized Assembler and Wide Vector Extensions for Masked Software with an Ascon-{\it{p}} test case Dor Salomon, Itamar Levi
2022/123 (PDF ) CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments Subhra Mazumdar, Sushmita Ruj
2022/122 (PDF ) Quantum cryptography with classical communication: parallel remote state preparation for copy-protection, verification, and more Alexandru Gheorghiu, Tony Metger, Alexander Poremba
2022/121 (PDF ) Crime and Punishment in Distributed Byzantine Decision Tasks (Extended Version) Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic, Zarko Milosevic, Adi Serendinschi
2022/120 (PDF ) Practical Seed Recovery of Fast Cryptographic Pseudo Random Number Generators Florette Martinez
2022/119 (PDF ) Hardware Implementation of SpoC-128 Ambati Sathvik, Tirunagari Rahul, Anubhab Baksi, Vikramkumar Pudi
2022/118 (PDF ) Streebog compression function as PRF in secret-key settings Vitaly Kiryukhin
2022/117 (PDF ) AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu
2022/116 (PDF ) Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version) Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe
2022/115 (PDF ) GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks Zilin Liu, Anjia Yang, Jian Weng, Tao Li, Huang Zeng, Xiaojian Liang
2022/114 (PDF ) Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat Ziaur Rahman, Xun Yi, Ibrahim Khalil
2022/113 (PDF ) XCC: Theft-Resilient and Collateral-Optimized Cryptocurrency-Backed Assets Theodore Bugnet, Alexei Zamyatin
2022/112 (PDF ) Faster Kyber and Dilithium on the Cortex-M4 Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, Amber Sprenkels
2022/111 (PDF ) Breaking Panther Christina Boura, Rachelle Heim Boissier, Yann Rotella
2022/110 (PDF ) Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-sliced Implementations Jan-Pieter D'Anvers, Michiel Van Beirendonck, Ingrid Verbauwhede
2022/109 (PDF ) Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees Ananya Appan, Anirudh Chandramouli, Ashish Choudhury
2022/108 (PDF ) Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method Rohon Kundu, Alessandro de Piccoli, Andrea Visconti
2022/107 (PDF ) Payment with Dispute Resolution: A Protocol For Reimbursing Frauds' Victims Aydin Abadi, Steven J. Murdoch
2022/106 (PDF ) Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All Soundes Marzougui, Vincent Ulitzsch, Mehdi Tibouchi, Jean-Pierre Seifert
2022/105 (PDF ) Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces Varun Madathil, Alessandra Scafuro, Kemafor Anyanwu, Sen Qiao, Akash Pateria, Binil Starly
2022/104 (PDF ) Minotaur: Multi-Resource Blockchain Consensus Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang
2022/102 (PDF ) MPC-Friendly Commitments for Publicly Verifiable Covert Security Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner
2022/101 (PDF ) Lattice-Based Linkable Ring Signature in the Standard Model Mingxing Hu, Zhen Liu
2022/100 (PDF ) Development of Cryptography since Shannon Funda Özdemir, Çetin Kaya Koç
2022/099 (PDF ) Performance of Hierarchical Transforms in Homomorphic Encryption: A case study on Logistic Regression inference Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
2022/098 (PDF ) Orienteering with one endomorphism Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran
2022/097 (PDF ) Lattice Signature can be as Simple as Lattice Encryption Dingfeng Ye, Jun Xu, Guifang Huang, Lei Hu
2022/096 (PDF ) On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications Karim Eldefrawy, Nicholas Genise, Rutuja Kshirsagar, Moti Yung
2022/095 (PDF ) Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk
2022/094 (PDF ) Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies Nir Drucker, Tomer Pelleg
2022/093 (PDF ) Public-Key Encryption from Homogeneous CLWE Andrej Bogdanov, Miguel Cueto Noval, Charlotte Hoffmann, Alon Rosen
2022/092 (PDF ) Rethinking Watermark: Providing Proof of IP Ownership in Modern SoCs N. Nalla Anandakumar, M. Sazadur Rahman, Mridha Md Mashahedur Rahman, Rasheed Kibria, Upoma Das, Farimah Farahmandi, Fahim Rahman, Mark M. Tehranipoor
2022/091 (PDF ) The multiplicative complexity of interval checking Thomas Häner, Mathias Soeken
2022/090 (PDF ) Attacks on Encrypted Range Search Schemes in Multiple Dimensions Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia
2022/089 (PDF ) NTRU-$\nu$-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus Kamil Kluczniak
2022/088 (PDF ) A survey on the security protocols employed by mobile messaging applications Ștefania Andrieș, Andrei-Daniel Miron, Andrei Cristian, Emil Simion
2022/087 (PDF ) The Internet Computer for Geeks Jan Camenisch, Andrea Cerulli, David Derler, Manu Drijvers, Maria Dubovitskaya, Jens Groth, Timo Hanke, Gregory Neven, Yvonne-Anne Pignolet, Victor Shoup, Björn Tackmann, Dominic Williams
2022/086 (PDF ) PlonKup: Reconciling PlonK with plookup Luke Pearson, Joshua Fitzgerald, Héctor Masip, Marta Bellés-Muñoz, Jose Luis Muñoz-Tapia
2022/085 (PDF ) Cross-Domain Identity-based Matchmaking Encryption Axin Wu, Jian Weng, Weiqi Luo, Anjia Yang, Jia-Nan Liu, Zike Jiang
2022/084 (PDF ) Token meets Wallet: Formalizing Privacy and Revocation for FIDO2 Lucjan Hanzlik, Julian Loss, Benedikt Wagner
2022/083 (PDF ) Zef: Low-latency, Scalable, Private Payments Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis
2022/082 (PDF ) Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs Carsten Baum, Robin Jadoul, Emmanuela Orsini, Peter Scholl, Nigel P. Smart
2022/081 (PDF ) Single-Server Private Information Retrieval with Sublinear Amortized Time Henry Corrigan-Gibbs, Alexandra Henzinger, Dmitry Kogan
2022/080 (PDF ) Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation Yu Long Chen, Stefano Tessaro
2022/079 (PDF ) Lightweight Secure Integer Comparison Thijs Veugen
2022/078 (PDF ) Secure Lossy Function Computation with Multiple Private Remote Source Observations Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
2022/077 (PDF ) Multiple Noisy Private Remote Source Observations for Secure Function Computation Onur Gunlu, Matthieu Bloch, Rafael F. Schaefer
2022/076 (PDF ) Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security Ertem Nusret Tas, David Tse, Fisher Yu, Sreeram Kannan
2022/075 (PDF ) Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, Aniket Kate
2022/074 (PDF ) FINAL: Faster FHE instantiated with NTRU and LWE Charlotte Bonte, Ilia Iliashenko, Jeongeun Park, Hilder V. L. Pereira, Nigel P. Smart
2022/073 (PDF ) Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide
2022/072 (PDF ) Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction Keita Emura
2022/071 (PDF ) Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor
2022/070 (PDF ) (Nondeterministic) Hardness vs. Non-Malleability Marshall Ball, Dana Dachman-Soled, Julian Loss
2022/069 (PDF ) Small-Box Cryptography Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs
2022/068 (PDF ) Updatable Public Key Encryption in the Standard Model Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs
2022/067 (PDF ) Parallel Operations over TFHE-Encrypted Multi-Digit Integers Jakub Klemsa, Melek Önen
2022/066 (PDF ) A remark on the Discrete Fourier Transform statistical test Anghel Florin, Asandoaiei David, Tabacaru Robert
2022/065 (PDF ) Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS Nimrod Aviram, Benjamin Dowling, Ilan Komargodski, Kenneth G. Paterson, Eyal Ronen, Eylon Yogev
2022/064 (PDF ) A Framework for the Design of Secure and Efficient Proofs of Retrievability Françoise Levy-dit-Vehel, Maxime Roméas
2022/063 (PDF ) Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers Kang Yang, Xiao Wang
2022/062 (PDF ) An Introduction to Secret-Sharing-Based Secure Multiparty Computation Daniel Escudero
2022/061 (PDF ) A remark on the NIST 800-22 Binary Matrix Rank Test Nicu Neculache, Vlad-Andrei Petcu, Emil Simion
2022/060 (PDF ) Quantum Boomerang Attacks and Some Applications Paul Frixons, María Naya-Plasencia, André Schrottenloher
2022/059 (PDF ) SPHINCS-$\alpha$: A Compact Stateless Hash-Based Signature Scheme Kaiyi Zhang, Hongrui Cui, Yu Yu
2022/058 (PDF ) First-Order Masked Kyber on ARM Cortex-M4 Daniel Heinz, Matthias J. Kannwischer, Georg Land, Thomas Pöppelmann, Peter Schwabe, Amber Sprenkels
2022/057 (PDF ) The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi
2022/056 (PDF ) LedgerHedger: Gas Reservation for Smart-Contract Security Itay Tsabary, Alex Manuskin, Roi Bar-Zur, Ittay Eyal
2022/055 (PDF ) Multi-Key Fully Homomorphic Encryption: removing noise flooding in distributed decryption via the smudging lemma on discrete Gaussian distribution Xiaokang Dai, Wenyuan Wu, Yong Feng
2022/054 (PDF ) SIKE Channels Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluđerović, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso
2022/053 (PDF ) Brute Force Cryptanalysis Aron Gohr
2022/052 (PDF ) Near-optimal Balanced Reliable Broadcast and Asynchronous Verifiable Information Dispersal Sourav Das, Zhuolun Xiang, Ling Ren
2022/051 (PDF ) Titanium: A Metadata-Hiding File-Sharing System with Malicious Security Weikeng Chen, Thang Hoang, Jorge Guajardo, Attila A. Yavuz
2022/050 (PDF ) High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA Asep Muhamad Awaludin, Harashta Tatimma Larasati, Howon Kim
2022/049 (PDF ) Small MACs from Small Permutations Maria Eichlseder, Ahmet Can Mert, Christian Rechberger, Markus Schofnegger
2022/048 (PDF ) RSA, DH, and DSA in the Wild Nadia Heninger
2022/047 (PDF ) Short Pairing-Free Blind Signatures with Exponential Security Stefano Tessaro, Chenzhi Zhu
2022/046 (PDF ) Membership Privacy for Asynchronous Group Messaging Keita Emura, Kaisei Kajita, Ryo Nojima, Kazuto Ogawa, Go Ohtake
2022/045 (PDF ) Probing Security through Input-Output Separation and Revisited Quasilinear Masking Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud
2022/044 (PDF ) Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes Atakan Arslan, Muhammed Ali Bingöl
2022/043 (PDF ) Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges Konstantinos Chalkias, Panagiotis Chatzigiannis, Yan Ji
2022/042 (PDF ) Inapplicability of Differential Fault Attacks against Cellular Automata based Lightweight Authenticated Cipher AMBILI K N, JIMMY JOSE
2022/041 (PDF ) Reinforcing Lightweight Authenticated Encryption Schemes against Statistical Ineffective Fault Attack AMBILI K N, JIMMY JOSE
2022/038 (PDF ) ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption Antonio de la Piedra, Marloes Venema, Greg Alpár
2022/037 (PDF ) Subgroup membership testing on elliptic curves via the Tate pairing Dmitrii Koshelev
2022/036 (PDF ) Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider, François-Xavier Standaert
2022/035 (PDF ) Time-Traveling Simulators Using Blockchains and Their Applications Vipul Goyal, Justin Raizes, Pratik Soni
2022/034 (PDF ) From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic Varun Madathil, Chris Orsini, Alessandra Scafuro, Daniele Venturi
2022/033 (PDF ) Deletion-Compliance in the Absence of Privacy Jonathan Godin, Philippe Lamontagne
2022/032 (PDF ) Formal Analysis of Non-Malleability for Commitments in EasyCrypt Denis Firsov, Sven Laur, Ekaterina Zhuchko
2022/031 (PDF ) BAT: Small and Fast KEM over NTRU Lattices Pierre-Alain Fouque, Paul Kirchner, Thomas Pornin, Yang Yu
2022/030 (PDF ) Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block Ciphers Jinyu Lu, Guoqiang Liu, Bing Sun, Chao Li, Li Liu
2022/029 (PDF ) CRYScanner: Finding cryptographic libraries misuse Amit Choudhari, Sylvain Guilley, Khaled Karray
2022/028 (PDF ) Locality-Preserving Hashing for Shifts with Connections to Cryptography Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein
2022/027 (PDF ) Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2022/026 (PDF ) Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective Andrada-Teodora Ciulei, Marian-Codrin Crețu, Emil Simion
2022/025 (PDF ) Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos Mostafizar Rahman, Dhiman Saha, Goutam Paul
2022/024 (PDF ) Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
2022/023 (PDF ) Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi
2022/022 (PDF ) Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation Xiuju Huang, Jiashuo Song, Zichen Li
2022/021 (PDF ) WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT Haibin Zhang, Sisi Duan, Boxin Zhao, Liehuang Zhu
2022/020 (PDF ) PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement Haibin Zhang, Sisi Duan
2022/019 (PDF ) Algebraic Meet-in-the-Middle Attack on LowMC Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe
2022/018 (PDF ) Pairing-based Accountable Subgroup Multi-signatures with Verifiable Group Setup Ahmet Ramazan Ağırtaş, Oğuz Yayla
2022/017 (PDF ) Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation Shingo Sato, Keita Emura, Atsushi Takayasu
2022/016 (PDF ) An algebraic attack to the Bluetooth stream cipher E0 Roberto La Scala, Sergio Polese, Sharwan K. Tiwari, Andrea Visconti
2022/015 (PDF ) Lattice-based Signatures with Tight Adaptive Corruptions and More Jiaxin Pan, Benedikt Wagner
2022/014 (PDF ) Transformer encoder-based Crypto-Ransomware Detection for Low-Power Embedded Processors Hyunji Kim, Sejin Lim, Yeajun Kang, Wonwoong Kim, Hwajeong Seo
2022/013 (PDF ) Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang
2022/012 (PDF ) Security of Identity-based Encryption Schemes from Quadratic Residues Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica
2022/011 (PDF ) Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance Alfredo Rial, Ania M. Piotrowska
2022/010 (PDF ) Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen
2022/009 (PDF ) Algebraic Reductions of Knowledge Abhiram Kothapalli, Bryan Parno
2022/008 (PDF ) Beating Classical Impossibility of Position Verification Jiahui Liu, Qipeng Liu, Luowen Qian
2022/007 (PDF ) PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More Rutchathon Chairattana-Apirom, Lucjan Hanzlik, Julian Loss, Anna Lysyanskaya, Benedikt Wagner
2022/006 (PDF ) Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plancon
2022/005 (PDF ) Pseudorandom Bit Generation with Asymmetric Numeral Systems Josef Pieprzyk, Marcin Pawlowski, Pawel Morawiecki, Arash Mahboubi, Jarek Duda, Seyit Camtepe
2022/004 (PDF ) Publicly verifiable anonymous tokens with private metadata bit Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova
2022/003 (PDF ) Merged with 2022/007 Rutchathon Chairattana-Apirom, Anna Lysyanskaya
2022/001 (PDF ) Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu
[ Cryptology ePrint archive ]