Cryptology ePrint Archive: Listing for 2023
Regex
2023/1973 (PDF ) Combinatorially Homomorphic Encryption Yuval Ishai, Eyal Kushnir, Ron D. Rothblum
2023/1972 (PDF ) Hard Languages in $\mathsf{NP} \cap \mathsf{coNP}$ and NIZK Proofs from Unstructured Hardness Riddhi Ghosal, Yuval Ishai, Alexis Korb, Eyal Kushilevitz, Paul Lou, Amit Sahai
2023/1971 (PDF ) Precision For A Qubit Operation and Failure of Achieving Quantum Supremacy Zhengjun Cao, Zhenfu Cao
2023/1970 (PDF ) Construction of Maiorana-McFarland type cryptographically significant Boolean functions with good implementation properties Deng Tang, Anupam Chattopadhyay, Manmatha Roy, Subhamoy Maitra, Bimal Mandal
2023/1969 (PDF ) Secure and Practical Functional Dependency Discovery in Outsourced Databases Xinle Cao, Yuhan Li, Dmytro Bogatov, Jian Liu, Kui Ren
2023/1968 (PDF ) Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model Kelsey A. Jackson, Carl A. Miller, Daochen Wang
2023/1967 (PDF ) Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption Shafik Nassar, Brent Waters, David J. Wu
2023/1966 (PDF ) How to Make Rational Arguments Practical and Extractable Matteo Campanelli, Chaya Ganesh, Rosario Gennaro
2023/1965 (PDF ) More Efficient Public-Key Cryptography with Leakage and Tamper Resilience Shuai Han, Shengli Liu, Dawu Gu
2023/1964 (PDF ) Maypoles: Lightning Striking Twice Clara Shikhelman
2023/1963 (PDF ) A Small Serving of Mash: (Quantum) Algorithms for SPDH-Sign with Small Parameters Andrew Mendelsohn, Edmund Dable-Heath, Cong Ling
2023/1962 (PDF ) A Survey of Polynomial Multiplications for Lattice-Based Cryptosystems Vincent Hwang
2023/1961 (PDF ) On The Practical Advantage of Committing Challenges in Zero-Knowledge Protocols David Naccache, Ofer Yifrach-Stav
2023/1960 (PDF ) Post Quantum Sphinx David Anthony Stainton
2023/1959 (PDF ) On the notion of carries of numbers $2^n-1$ and Scholz conjecture Theophilus Agama
2023/1958 (PDF ) Revisiting Pairing-friendly Curves with Embedding Degrees 10 and 14 Yu Dai, Debiao He, Cong Peng, Zhijian Yang, Chang-an Zhao
2023/1957 (PDF ) Chosen Ciphertext Security via BARGs Takahiro Matsuda
2023/1956 (PDF ) A Signature Scheme from Full-Distance Syndrome Decoding Abdelhaliem Babiker
2023/1955 (PDF ) Barrett Multiplication for Dilithium on Embedded Devices Vincent Hwang, YoungBeom Kim, Seog Chung Seo
2023/1954 (PDF ) Fiat-Shamir Goes Tropical Rémi Géraud-Stewart, David Naccache, Ofer Yifrach-Stav
2023/1953 (PDF ) Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem Muhammad Imran, Gábor Ivanyos
2023/1952 (PDF ) Overview and Discussion of Attacks on CRYSTALS-Kyber Stone Li
2023/1951 (PDF ) Protection Against Subversion Corruptions via Reverse Firewalls in the Plain Universal Composability Framework Paula Arnold, Sebastian Berndt, Jörn Müller-Quade, Astrid Ottenhues
2023/1950 (PDF ) GigaDORAM: Breaking the Billion Address Barrier Brett Falk, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang
2023/1949 (PDF ) HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical Diego F. Aranha, Anamaria Costache, Antonio Guimarães, Eduardo Soria-Vazquez
2023/1948 (PDF ) PriDe CT: Towards Public Consensus, Private Transactions, and Forward Secrecy in Decentralized Payments Yue Guo, Harish Karthikeyan, Antigoni Polychroniadou, Chaddy Huussin
2023/1947 (PDF ) Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures Marloes Venema, Leon Botros
2023/1946 (PDF ) SnarkFold: Efficient Proof Aggregation from Incrementally Verifiable Computation and Applications Xun Liu, Shang Gao, Tianyu Zheng, Yu Guo, Bin Xiao
2023/1945 (PDF ) The Fiat--Shamir Transformation of $(\Gamma_1,\dots,\Gamma_\mu)$-Special-Sound Interactive Proofs Thomas Attema, Serge Fehr, Michael Klooß, Nicolas Resch
2023/1944 (PDF ) Revisiting The Multiple of Property for SKINNY The Exact Computation of the number of right pairs Hanbeom Shin, Insung Kim, Sunyeop Kim, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
2023/1943 (PDF ) Distinguisher and Related-Key Attack on HALFLOOP-96 Jinpeng Liu, Ling Sun
2023/1942 (PDF ) Traceable mixnets Prashant Agrawal, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, Subhashis Banerjee
2023/1941 (PDF ) Upgrading Fuzzy Extractors Chloe Cachet, Ariel Hamlin, Maryam Rezapour, Benjamin Fuller
2023/1940 (PDF ) Concrete Time/Memory Trade-Offs in Generalised Stern’s ISD Algorithm Sreyosi Bhattacharyya, Palash Sarkar
2023/1939 (PDF ) Applications of Neural Network-Based AI in Cryptography Abderrahmane Nitaj, Tajjeeddine Rachidi
2023/1938 (PDF ) Batch Arguments to NIZKs from One-Way Functions Eli Bradley, Brent Waters, David J. Wu
2023/1937 (PDF ) Revocable Quantum Digital Signatures Tomoyuki Morimae, Alexander Poremba, Takashi Yamakawa
2023/1936 (PDF ) LERNA: Secure Single-Server Aggregation via Key-Homomorphic Masking Hanjun Li, Huijia Lin, Antigoni Polychroniadou, Stefano Tessaro
2023/1935 (PDF ) The Splitting Field of $Y^n-2$, Two-Variable NTT and Lattice-Based Cryptography Wenzhe Yang
2023/1934 (PDF ) More efficient comparison protocols for MPC Wicher Malten, Mehmet Ugurbil, Miguel de Vega
2023/1933 (PDF ) Keeping Up with the KEMs: Stronger Security Notions for KEMs and Automated Analysis of KEM-based protocols Cas Cremers, Alexander Dax, Niklas Medinger
2023/1932 (PDF ) Multipars: Reduced-Communication MPC over Z2k Sebastian Hasler, Pascal Reisert, Marc Rivinius, Ralf Küsters
2023/1931 (PDF ) Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality? Ruize Wang, Kalle Ngo, Joel Gärtner, Elena Dubrova
2023/1930 (PDF ) Toward A Practical Multi-party Private Set Union Jiahui Gao, Son Nguyen, Ni Trieu
2023/1929 (PDF ) Cryptography from Planted Graphs: Security with Logarithmic-Size Messages Damiano Abram, Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan
2023/1928 (PDF ) Unconditionally Secure Quantum Bit Commitment and Quantum Oblivious Transfer Ping Wang, Yikang Lei, Yiting Su
2023/1927 (PDF ) Holepunch: Fast, Secure File Deletion with Crash Consistency Zachary Ratliff, Wittmann Goh, Abe Wieland, James Mickens, Ryan Williams
2023/1926 (PDF ) NOTRY: deniable messaging with retroactive avowal Faxing Wang, Shaanan Cohney, Riad Wahby, Joseph Bonneau
2023/1925 (PDF ) VDOO: A Short, Fast, Post-Quantum Multivariate Digital Signature Scheme Anindya ganguly, Angshuman Karmakar, Nitin Saxena
2023/1924 (PDF ) Analyzing the complexity of reference post-quantum software: the case of lattice-based KEMs Daniel J. Bernstein
2023/1923 (PDF ) Differential Fault Attack on Ascon Cipher Amit Jana
2023/1922 (PDF ) One for All, All for Ascon: Ensemble-based Deep Learning Side-channel Analysis Azade Rezaeezade, Abraham Basurto-Becerra, Léo Weissbart, Guilherme Perin
2023/1921 (PDF ) Automated Issuance of Post-Quantum Certificates: a New Challenge Alexandre Augusto Giron, Frederico Schardong, Lucas Pandolfo Perin, Ricardo Custódio, Victor Valle, Víctor Mateu
2023/1920 (PDF ) Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities Luke Harrison, Samiran Bag, Feng Hao
2023/1919 (PDF ) When and How to Aggregate Message Authentication Codes on Lossy Channels? Eric Wagner, Martin Serror, Klaus Wehrle, Martin Henze
2023/1918 (PDF ) FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC Najwa Aaraj, Abdelrahaman Aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria-Vazquez, Victor Sucasas, Ajith Suresh
2023/1917 (PDF ) Regularized PolyKervNets: Optimizing Expressiveness and Efficiency for Private Inference in Deep Neural Networks Toluwani Aremu
2023/1916 (PDF ) Sing a song of Simplex Victor Shoup
2023/1915 (PDF ) Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies Poulami Das, Andreas Erwig, Michael Meyer, Patrick Struck
2023/1914 (PDF ) Efficient Low-Latency Masking of Ascon without Fresh Randomness Srinidhi Hari Prasad, Florian Mendel, Martin Schläffer, Rishub Nagpal
2023/1913 (PDF ) Breaking RSA Authentication on Zynq-7000 SoC and Beyond: Identification of Critical Security Flaw in FSBL Software Prasanna Ravi, Arpan Jati, Shivam Bhasin
2023/1912 (PDF ) Dishonest Majority Multiparty Computation over Matrix Rings Hongqing Liu, Chaoping Xing, Chen Yuan, Taoxu Zou
2023/1911 (PDF ) Non-Interactive Classical Verification of Quantum Depth: A Fine-Grained Characterization Nai-Hui Chia, Shih-Han Hung
2023/1910 (PDF ) Failed crypto: Matrices over non-standard arithmetic Daniel R. L. Brown
2023/1909 (PDF ) Ratel: MPC-extensions for Smart Contracts Yunqi Li, Kyle Soska, Zhen Huang, Sylvain Bellemare, Mikerah Quintyne-Collins, Lun Wang, Xiaoyuan Liu, Dawn Song, Andrew Miller
2023/1908 (PDF ) PARScoin: A Privacy-preserving, Auditable, and Regulation-friendly Stablecoin Amirreza Sarencheh, Aggelos Kiayias, Markulf Kohlweiss
2023/1907 (PDF ) Integral Cryptanalysis Using Algebraic Transition Matrices Tim Beyne, Michiel Verbauwhede
2023/1906 (PDF ) Exploring SIDH-based Signature Parameters Andrea Basso, Mingjie Chen, Tako Boris Fouotsa, Péter Kutas, Abel Laval, Laurane Marco, Gustave Tchoffo Saah
2023/1905 (PDF ) Oops, I did it again revisited: another look at reusing one-time signatures Scott Fluhrer
2023/1904 (PDF ) Generalized Kotov-Ushakov Attack on Tropical Stickel Protocol Based on Modified Tropical Circulant Matrices Sulaiman Alhussaini, Craig Collett, Serge˘ı Sergeev
2023/1903 (PDF ) Quarantined-TreeKEM: a Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users Céline Chevalier, Guirec Lebrun, Ange Martinelli, Abdul Rahman Taleb
2023/1902 (PDF ) A Transaction-Level Model for Blockchain Privacy François-Xavier Wicht, Zhipeng Wang, Duc V. Le, Christian Cachin
2023/1901 (PDF ) Middle-Products of Skew Polynomials and Learning with Errors Cong Ling, Andrew Mendelsohn
2023/1900 (PDF ) Conan: Distributed Proofs of Compliance for Anonymous Data Collection Mingxun Zhou, Elaine Shi, Giulia Fanti
2023/1899 (PDF ) Allowing Blockchain Loans with Low Collateral Tom Azoulay, Uri Carl, Ori Rottenstreich
2023/1898 (PDF ) An Empirical Study of Cross-chain Arbitrage in Decentralized Exchanges Ori Mazor, Ori Rottenstreich
2023/1897 (PDF ) PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures Sajin Sasy, Adithya Vadapalli, Ian Goldberg
2023/1896 (PDF ) Selective Delegation of Attributes in Mercurial Signature Credentials Colin Putman, Keith M. Martin
2023/1895 (PDF ) The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert
2023/1894 (PDF ) Hardness of Range Avoidance and Remote Point for Restricted Circuits via Cryptography Yilei Chen, Jiatu Li
2023/1893 (PDF ) BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, Thomas Schneider
2023/1892 (PDF ) Asymptotics of hybrid primal lattice attacks Daniel J. Bernstein
2023/1891 (PDF ) In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, Yongbin Zhou
2023/1890 (PDF ) Lightning Fast Secure Comparison for 3PC PPML Tianpei Lu, Bingsheng Zhang, Lichun Li, Yuzhou Zhao, Kui Ren
2023/1888 (PDF ) Reverie: an end-to-end accumulation scheme from Cyclefold Lev Soukhanov
2023/1887 (PDF ) GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity Renas Bacho, Christoph Lenzen, Julian Loss, Simon Ochsenreither, Dimitrios Papachristoudis
2023/1886 (PDF ) Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs Sebastian Angel, Eleftherios Ioannidis, Elizabeth Margolin, Srinath Setty, Jess Woods
2023/1885 (PDF ) Falcon Takes Off - A Hardware Implementation of the Falcon Signature Scheme Michael Schmid, Dorian Amiet, Jan Wendler, Paul Zbinden, Tao Wei
2023/1884 (PDF ) Multi-Signatures for Ad-hoc and Privacy-Preserving Group Signing Anja Lehmann, Cavit Özbay
2023/1883 (PDF ) Revisiting the attacker's knowledge in inference attacks against Searchable Symmetric Encryption Marc Damie, Jean-Benoist Leger, Florian Hahn, Andreas Peter
2023/1881 (PDF ) Blockchain Governance via Sharp Anonymous Multisignatures Wonseok Choi, Xiangyu Liu, Vassilis Zikas
2023/1880 (PDF ) Cryptanalysis of Lattice-Based Sequentiality Assumptions and Proofs of Sequential Work Chris Peikert, Yi Tang
2023/1879 (PDF ) A Multiparty Commutative Hashing Protocol based on the Discrete Logarithm Problem Daniel Zentai, Mihail Plesa, Robin Frot
2023/1878 (PDF ) Predicting performance for post-quantum encrypted-file systems Daniel J. Bernstein
2023/1877 (PDF ) Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps George Teseleanu
2023/1876 (PDF ) Thwarting Last-Minute Voter Coercion Rosario Giustolisi, Maryam Sheikhi Garjan, Carsten Schuermann
2023/1875 (PDF ) The Blockwise Rank Syndrome Learning problem and its applications to cryptography Nicolas Aragon, Pierre Briaud, Victor Dyseryn, Philippe Gaborit, Adrien Vinçotte
2023/1874 (PDF ) Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map George Teseleanu
2023/1873 (PDF ) SoK: Post-Quantum TLS Handshake Nouri Alnahawi, Johannes Müller, Jan Oupický, Alexander Wiesmaier
2023/1872 (PDF ) Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields (Full Version) Weizhe Wang, Deng Tang, Haoyang Wang
2023/1871 (PDF ) B2T: The Third Logical Value of a Bit Dipesh, Vishesh Mishra, Urbi chatterjee
2023/1870 (PDF ) An Improved Method for Evaluating Secret Variables and Its Application to WAGE Weizhe Wang, Haoyang Wang, Deng Tang
2023/1869 (PDF ) Accountable Bulletin Boards: Definition and Provably Secure Implementation Mike Graf, Ralf Küsters, Daniel Rausch, Simon Egger, Marvin Bechtold, Marcel Flinspach
2023/1868 (PDF ) COMMON: Order Book with Privacy Albert Garreta, Adam Gągol, Aikaterini-Panagiota Stouka, Damian Straszak, Michal Zajac
2023/1867 (PDF ) Different Flavours of HILL Pseudoentropy and Yao Incompressibility Entropy Pihla Karanko
2023/1866 (PDF ) When NTT Meets SIS: Efficient Side-channel Attacks on Dilithium and Kyber Zehua Qiao, Yuejun Liu, Yongbin Zhou, Mingyao Shao, Shuo Sun
2023/1865 (PDF ) Projective Space Stern Decoding and Application to SDitH Kevin Carrier, Valérian Hatey, Jean-Pierre Tillich
2023/1864 (PDF ) Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier
2023/1863 (PDF ) Efficient Secure Multiparty Computation for Multidimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification Dongyu Wu, Bei Liang, Zijie Lu, Jintai Ding
2023/1862 (PDF ) Analyzing UTXO-Based Blockchain Privacy Threats Simin Ghesmati, Walid Fdhila, Edgar Weippl
2023/1861 (PDF ) Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking Li-Chang Lai, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang
2023/1860 (PDF ) EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis Suvadeep Hajra, Siddhartha Chowdhury, Debdeep Mukhopadhyay
2023/1859 (PDF ) XorSHAP: Privacy-Preserving Explainable AI for Decision Tree Models Dimitar Jetchev, Marius Vuille
2023/1858 (PDF ) A Novel Power-Sum PRG with Applications to Lattice-Based zkSNARKs Charanjit S Jutla, Eamonn W. Postlethwaite, Arnab Roy
2023/1857 (PDF ) A Simple and Efficient Framework of Proof Systems for NP Yuyu Wang, Chuanjie Su, Jiaxin Pan, Yu Chen
2023/1856 (PDF ) Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model Fu Yao, Hua Chen, Yongzhuang Wei, Enes Pasalic, Feng Zhou, Limin Fan
2023/1855 (PDF ) Demystifying DeFi MEV Activities in Flashbots Bundle Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen
2023/1854 (PDF ) A note on quantum approximate optimization algorithm Zhengjun Cao
2023/1853 (PDF ) Report on evaluation of KpqC candidates Jolijn Cottaar, Kathrin Hövelmanns, Andreas Hülsing, Tanja Lange, Mohammad Mahzoun, Alex Pellegrini, Alberto Ravagnani, Sven Schäge, Monika Trimoska, Benne de Weger
2023/1852 (PDF ) Reduction from sparse LPN to LPN, Dual Attack 3.0 Kévin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Jean-Pierre Tillich
2023/1851 (PDF ) Quantum Security of the UMTS-AKA Protocol and its Primitives, Milenage and TUAK Paul Frixons, Sébastien Canard, Loïc Ferreira
2023/1850 (PDF ) Accurate Score Prediction for Dual-Sieve Attacks Léo Ducas, Ludo N. Pulles
2023/1849 (PDF ) Lattice-based Programmable Hash Functions and Applications Jiang Zhang, Yu Chen, Zhenfeng Zhang
2023/1848 (PDF ) Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos
2023/1847 (PDF ) Cycle Structure and Observability of Two Types of Galois NFSRs Xianghan Wang, Jianghua Zhong, Dongdai Lin
2023/1846 (PDF ) New Security Proofs and Complexity Records for Advanced Encryption Standard Orhun Kara
2023/1845 (PDF ) Compact Issuer-Hiding Authentication, Application to Anonymous Credential Olivier Sanders, Jacques Traoré
2023/1844 (PDF ) Unconditionally Secure Commitments with Quantum Auxiliary Inputs Tomoyuki Morimae, Barak Nehoran, Takashi Yamakawa
2023/1843 (PDF ) Zero-day vulnerability prevention with recursive feature elimination and ensemble learning Mike Nkongolo Wa Nkongolo
2023/1842 (PDF ) Leverage Staking with Liquid Staking Derivatives (LSDs): Opportunities and Risks Xihan Xiong, Zhipeng Wang, Xi Chen, William Knottenbelt, Michael Huth
2023/1841 (PDF ) Unclonable Cryptography with Unbounded Collusions and Impossibility of Hyperefficient Shadow Tomography Alper Çakan, Vipul Goyal
2023/1840 (PDF ) Unconditionally secure quantum commitments with preprocessing Luowen Qian
2023/1839 (PDF ) Ring-LWE Hardness Based on Non-invertible Ideals Charanjit S. Jutla, Chengyu Lin
2023/1838 (PDF ) Quantifying risks in cryptographic selection processes Daniel J. Bernstein
2023/1837 (PDF ) More forging (and patching) of tropical signatures Daniel R. L. Brown, Chris Monico
2023/1836 (PDF ) An Incremental PoSW for General Weight Distributions Hamza Abusalah, Valerio Cini
2023/1835 (PDF ) ID-CAKE: Identity-based Cluster Authentication and Key Exchange Scheme for Message Broadcasting and Batch Verification in VANETs Apurva K Vangujar, Alia Umrani, Paolo Palmieri
2023/1834 (PDF ) Building a BBB Pseudorandom Permutation using Lai-Massey Networks Ritam Bhaumik, Mohammad Amin Raeisi
2023/1833 (PDF ) Cryptanalysis of QARMAv2 Hosein Hadipour, Yosuke Todo
2023/1832 (PDF ) A Note On the Universality of Black-box MKtP Solvers Noam Mazor, Rafael Pass
2023/1831 (PDF ) A CP-based Automatic Tool for Instantiating Truncated Differential Characteristics - Extended Version François Delobel, Patrick Derbez, Arthur Gontier, Loïc Rouquette, Christine Solnon
2023/1830 (PDF ) Vector Commitments with Efficient Updates Ertem Nusret Tas, Dan Boneh
2023/1829 (PDF ) End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness Yevgeniy Dodis, Daniel Jost, Balachandar Kesavan, Antonio Marcedone
2023/1828 (PDF ) Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions Yi Wang, Rongmao Chen, Xinyi Huang, Moti Yung
2023/1827 (PDF ) Key Exchange in the Post-Snowden Era: Universally Composable Subversion-Resilient PAKE Suvradip Chakraborty, Lorenzo Magliocco, Bernardo Magri, Daniele Venturi
2023/1826 (PDF ) Load-Balanced Server-Aided MPC in Heterogeneous Computing Yibiao Lu, Bingsheng Zhang, Kui Ren
2023/1825 (PDF ) Towards Unclonable Cryptography in the Plain Model Céline Chevalier, Paul Hermouet, Quoc-Huy Vu
2023/1824 (PDF ) Learning with Errors over Group Rings Constructed by Semi-direct Product Jiaqi Liu, Fang-Wei Fu
2023/1823 (PDF ) PQC-NN: Post-Quantum Cryptography Neural Network Abel C. H. Chen
2023/1822 (PDF ) Rectangular Attack on VOX Gilles Macario-Rat, Jacques Patarin, Benoit Cogliati, Jean-Charles Faugère, Pierre-Alain Fouque, Louis Gouin, Robin Larrieu, Brice Minaud
2023/1821 (PDF ) Cryptanalysis of TS-Hash Aleksei Udovenko
2023/1820 (PDF ) Chipmunk: Better Synchronized Multi-Signatures from Lattices Nils Fleischhacker, Gottfried Herold, Mark Simkin, Zhenfei Zhang
2023/1819 (PDF ) Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2023/1818 (PDF ) On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions Romain Gay, Bogdan Ursu
2023/1817 (PDF ) Authenticating Medications with QR-Codes and Compact Digital Signatures Julien Jainsky, David Naccache, Bassem Ouni, Ofer Yifrach-Stav
2023/1816 (PDF ) ASOZ: a decentralized payment system with privacy preserving and auditing on public blockchain Tianjian Liu, Yang Liu, Dawei Zhang, Chang Chen, Wei Wang
2023/1815 (PDF ) Accelerating Polynomial Multiplication for RLWE using Pipelined FFT Neil Thanawala, Hamid Nejatollahi, Nikil Dutt
2023/1814 (PDF ) Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption Ahmad Khoureich Ka
2023/1813 (PDF ) Early Stopping for Any Number of Corruptions Julian Loss, Jesper Buus Nielsen
2023/1812 (PDF ) The NTT and residues of a polynomial modulo factors of $X^{2^d} + 1$ Sahil Sharma
2023/1811 (PDF ) A note on Failing gracefully: Completing the picture for explicitly rejecting Fujisaki-Okamoto transforms using worst-case correctness Kathrin Hövelmanns, Christian Majenz
2023/1810 (PDF ) Pairing-Free Blind Signatures from Standard Assumptions in the ROM Julia Kastner, Ky Nguyen, Michael Reichle
2023/1809 (PDF ) PURED: A unified framework for resource-hard functions Alex Biryukov, Marius Lombard-Platet
2023/1808 (PDF ) Small Stretch Problem of the DCT Scheme and How to Fix it Yuchao Chen, Tingting Guo, Lei Hu, Lina Shang, Shuping Mao, Peng Wang
2023/1807 (PDF ) Entrada to Secure Graph Convolutional Networks Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2023/1806 (PDF ) Fast and Designated-verifier Friendly zkSNARKs in the BPK Model Xudong Zhu, Xuyang Song, Yi Deng
2023/1805 (PDF ) On the Security of Rate-limited Privacy Pass Hien Chu, Khue Do, Lucjan Hanzlik
2023/1804 (PDF ) Fully Malicious Authenticated PIR Marian Dietz, Stefano Tessaro
2023/1803 (PDF ) Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation Gaëtan Leurent, Clara Pernot
2023/1802 (PDF ) Sublinear-Communication Secure Multiparty Computation does not require FHE Elette Boyle, Geoffroy Couteau, Pierre Meyer
2023/1801 (PDF ) ForgedAttributes: An Existential Forgery Vulnerability of CMS Signatures Falko Strenzke
2023/1800 (PDF ) Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions Fukang Liu, Abul Kalam, Santanu Sarkar, Willi Meier
2023/1799 (PDF ) BabySpartan: Lasso-based SNARK for non-uniform computation Srinath Setty, Justin Thaler
2023/1798 (PDF ) Somewhat Homomorphic Encryption based on Random Codes Carlos Aguilar-Melchor, Victor Dyseryn, Philippe Gaborit
2023/1797 (PDF ) A Modular Approach to Unclonable Cryptography Prabhanjan Ananth, Amit Behera
2023/1796 (PDF ) Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification Andersson Calle Viera, Alexandre Berzati, Karine Heydemann
2023/1795 (PDF ) Efficiently Testable Circuits without Conductivity Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, Krzysztof Pietrzak
2023/1794 (PDF ) Secret-Shared Shuffle with Malicious Security Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, Ee-Chien Chang
2023/1793 (PDF ) Accountable Multi-Signatures with Constant Size Public Keys Dan Boneh, Aditi Partap, Brent Waters
2023/1792 (PDF ) Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones Daniel Hugenroth, Alberto Sonnino, Sam Cutler, Alastair R. Beresford
2023/1791 (PDF ) Decentralized Compromise-Tolerant Public Key Management Ecosystem with Threshold Validation Jamal Mosakheil, Kan Yang
2023/1790 (PDF ) Compromising sensitive information through Padding Oracle and Known Plaintext attacks in Encrypt-then-TLS scenarios Daniel Espinoza Figueroa
2023/1789 (PDF ) Fast and Secure Oblivious Stable Matching over Arithmetic Circuits Arup Mondal, Priyam Panda, Shivam Agarwal, Abdelrahaman Aly, Debayan Gupta
2023/1788 (PDF ) Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Damien Stehlé
2023/1787 (PDF ) Updatable Privacy-Preserving Blueprints Bernardo David, Felix Engelmann, Tore Frederiksen, Markulf Kohlweiss, Elena Pagnin, Mikhail Volkhov
2023/1786 (PDF ) CASE: A New Frontier in Public-Key Authenticated Encryption Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran, Rajeev Raghunath, Jayesh Singla
2023/1785 (PDF ) There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation Yaqing Song, Yuan Zhang, Shiyu Li, Weijia Li, Zeqi Lai, Qiang Tang
2023/1784 (PDF ) Succinct Arguments over Towers of Binary Fields Benjamin E. Diamond, Jim Posen
2023/1783 (PDF ) An efficient quantum parallel repetition theorem and applications John Bostanci, Luowen Qian, Nicholas Spooner, Henry Yuen
2023/1782 (PDF ) A Solution to a Conjecture on the Maps $\chi_n^{(k)}$ Kamil Otal
2023/1781 (PDF ) A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis Yen-Ting Kuo, Atsushi Takayasu
2023/1780 (PDF ) Pairing-Free Blind Signatures from CDH Assumptions Rutchathon Chairattana-Apirom, Stefano Tessaro, Chenzhi Zhu
2023/1779 (PDF ) Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics Shiyu Li, Yuan Zhang, Yaqing Song, Fan Wu, Feng Lyu, Kan Yang, Qiang Tang
2023/1778 (PDF ) Immunizing Backdoored PRGs Marshall Ball, Yevgeniy Dodis, Eli Goldin
2023/1777 (PDF ) SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model Jelle Vos, Mauro Conti, Zekeriya Erkin
2023/1776 (PDF ) Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak
2023/1775 (PDF ) Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery Shiyu Li, Yuan Zhang, Yaqing Song, Hongbo Liu, Nan Cheng, Hongwei Li, Dahai Tao, Kan Yang
2023/1774 (PDF ) Decentralized Private Steam Aggregation from Lattices Uddipana Dowerah, Aikaterini Mitrokotsa
2023/1773 (PDF ) Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing Hanwen Feng, Tiancheng Mai, Qiang Tang
2023/1772 (PDF ) Robust Combiners and Universal Constructions for Quantum Cryptography Taiga Hiroka, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2023/1771 (PDF ) A note on ``HAKECC: highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment'' Zhengjun Cao
2023/1770 (PDF ) On the Feasibility of E2E Verifiable Online Voting - A Case Study From Durga Puja Trial Horia Druliac, Matthew Bardsley, Chris Riches, Christian Dunn, Luke Harrison, Bimal Roy, Feng Hao
2023/1769 (PDF ) A Comprehensive Survey on Non-Invasive Fault Injection Attacks Amit Mazumder Shuvo, Tao Zhang, Farimah Farahmandi, Mark Tehranipoor
2023/1768 (PDF ) Homomorphic Polynomial Public Key Cryptography for Quantum-secure Digital Signature Randy Kuang, Maria Perepechaenko, Mahmoud Sayed, Dafu Lou
2023/1767 (PDF ) The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+ Patrick Karl, Jonas Schupp, Georg Sigl
2023/1766 (PDF ) Introducing Clapoti(s): Evaluating the isogeny class group action in polynomial time Aurel Page, Damien Robert
2023/1765 (PDF ) The Non-Uniform Perebor Conjecture for Time-Bounded Kolmogorov Complexity is False Noam Mazor, Rafael Pass
2023/1764 (PDF ) Distributed Differential Privacy via Shuffling vs Aggregation: a Curious Study Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, Shaowei Wang
2023/1762 (PDF ) ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge Daniel Luick, John Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, Ning Luo
2023/1761 (PDF ) Guardianship in Group Key Exchange for Limited Environments Elsie Mestl Fondevik, Britta Hale, Xisen Tian
2023/1760 (PDF ) Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials Luk Bettale, Delaram Kahrobaei, Ludovic Perret, Javier Verbel
2023/1759 (PDF ) Non-Interactive Zero-Knowledge Functional Proofs Gongxian Zeng, Junzuo Lai, Zhengan Huang, Linru Zhang, Xiangning Wang, Kwok-Yan Lam, Huaxiong Wang, Jian Weng
2023/1758 (PDF ) Pulsar: Secure Steganography for Diffusion Models Tushar M. Jois, Gabrielle Beck, Gabriel Kaptchuk
2023/1757 (PDF ) Adaptively Secure Consensus with Linear Complexity and Constant Round under Honest Majority in the Bare PKI Model, and Separation Bounds from the Idealized Message-Authentication Model Matthieu Rambaud
2023/1756 (PDF ) How to Use Quantum Indistinguishability Obfuscation Andrea Coladangelo, Sam Gunn
2023/1755 (PDF ) Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael Reiter
2023/1754 (PDF ) That’s not my Signature! Fail-Stop Signatures for a Post-Quantum World Cecilia Boschini, Hila Dahari, Moni Naor, Eyal Ronen
2023/1752 (PDF ) Secure Encryption and Key Exchange using Arbiter PUF Raja Adhithan Radhakrishnan
2023/1750 (PDF ) A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai
2023/1749 (PDF ) Dora: A Simple Approach to Zero-Knowledge for RAM Programs Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk
2023/1748 (PDF ) Forging tropical signatures Lorenz Panny
2023/1747 (PDF ) An Algorithmic Approach to $(2,2)$-isogenies in the Theta Model and Applications to Isogeny-based Cryptography Pierrick Dartois, Luciano Maino, Giacomo Pope, Damien Robert
2023/1746 (PDF ) A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier
2023/1745 (PDF ) New Public-Key Cryptosystem Blueprints Using Matrix Products in $\mathbb F_p$ Remi Geraud-Stewart, David Naccache
2023/1744 (PDF ) Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater (Full Version) Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, Hossein Yalame
2023/1743 (PDF ) Explicit Lower Bounds for Communication Complexity of PSM for Concrete Functions Kazumasa Shinagawa, Koji Nuida
2023/1742 (PDF ) Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Hendrik Waldner
2023/1741 (PDF ) Pseudorandom Isometries Prabhanjan Ananth, Aditya Gulati, Fatih Kaleoglu, Yao-Ting Lin
2023/1739 (PDF ) Broadcast-Optimal Four-Round MPC in the Plain Model Michele Ciampi, Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Yu Xia, Sophia Yakoubov
2023/1738 (PDF ) Byzantine Agreement Decomposed: Honest Majority Asynchronous Atomic Broadcast from Reliable Broadcast Simon Holmgaard Kamp, Jesper Buus Nielsen
2023/1737 (PDF ) On the Security of Succinct Interactive Arguments from Vector Commitments Alessandro Chiesa, Marcel Dall'Agnol, Ziyi Guan, Nicholas Spooner
2023/1736 (PDF ) Aloha-HE: A Low-Area Hardware Accelerator for Client-Side Operations in Homomorphic Encryption Florian Krieger, Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy
2023/1735 (PDF ) Exploiting the Symmetry of $\mathbb{Z}^n$: Randomization and the Automorphism Problem Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang
2023/1734 (PDF ) Signatures with Memory-Tight Security in the Quantum Random Oracle Model Keita Xagawa
2023/1733 (PDF ) Hintless Single-Server Private Information Retrieval Baiyu Li, Daniele Micciancio, Mariana Raykova, Mark Schultz-Wu
2023/1732 (PDF ) On the Masking-Friendly Designs for Post-Quantum Cryptography Suparna Kundu, Angshuman Karmakar, Ingrid Verbauwhede
2023/1731 (PDF ) A practical key-recovery attack on LWE-based key- encapsulation mechanism schemes using Rowhammer Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, Ingrid Verbauwhede
2023/1730 (PDF ) Construction-D lattice from Garcia-Stichtenoth tower code Elena Kirshanova, Ekaterina Malygina
2023/1729 (PDF ) CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks Yongqin Wang, Pratik Sarkar, Nishat Koti, Arpita Patra, Murali Annavaram
2023/1728 (PDF ) Simulation-Secure Threshold PKE from LWE with Polynomial Modulus Daniele Micciancio, Adam Suhl
2023/1727 (PDF ) Envelope Encryption in the Symmetric-Key Setting: A Formalization and Generic Constructions Shoichi Hirose, Kazuhiko Minematsu
2023/1726 (PDF ) CSIDH with Level Structure Steven D. Galbraith, Derek Perrin, José Felipe Voloch
2023/1725 (PDF ) Few-weight linear codes over $\mathbb{F}_p$ from $t$-to-one mappings René Rodríguez-Aldama
2023/1724 (PDF ) Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing Dan Boneh, Aditi Partap, Lior Rotem
2023/1723 (PDF ) Deterministic Byzantine Agreement with Adaptive $O(n\cdot f)$ Communication Fatima Elsheimy, Giorgos Tsimos, Charalampos Papamanthou
2023/1722 (PDF ) Quantitative Fault Injection Analysis Jakob Feldtkeller, Tim Güneysu, Patrick Schaumont
2023/1721 (PDF ) Optimizing S-box Implementations Using SAT Solvers: Revisited Fuxin Zhang, Zhenyu Huang
2023/1720 (PDF ) Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions Samuel Bouaziz--Ermann, Alex B. Grilo, Damien Vergnaud, Quoc-Huy Vu
2023/1719 (PDF ) MQ on my Mind: Post-Quantum Signatures from the Non-Structured Multivariate Quadratic Problem Ryad Benadjila, Thibauld Feneuil, Matthieu Rivain
2023/1718 (PDF ) Improved Attacks on LowMC with Algebraic Techniques Yimeng Sun, Jiamin Cui, Meiqin Wang
2023/1717 (PDF ) Fabric-X: Scaling Hyperledger Fabric for Asset Exchange Elli Androulaki, Marcus Brandenburger, May Buzaglo, Angelo De Caro, Kaoutar Elkhiyaoui, Alexandros Filios, Liran Funaro, Yacov Manevich, Hagar Meir, Senthilnathan Natarajan, Manish Sethi, Yoav Tock
2023/1716 (PDF ) Attribute-Based Encryption for Circuits of Unbounded Depth from Lattices: Garbled Circuits of Optimal Size, Laconic Functional Evaluation, and More Yao-Ching Hsieh, Huijia Lin, Ji Luo
2023/1715 (PDF ) Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications Shiyuan Xu, Yibo Cao, Xue Chen, Yu Guo, Yuer Yang, Fangda Guo, Siu-Ming Yiu
2023/1714 (PDF ) On Parallel Repetition of PCPs Alessandro Chiesa, Ziyi Guan, Burcu Yıldız
2023/1713 (PDF ) High-assurance zeroization Santiago Arranz Olmos, Gilles Barthe, Ruben Gonzalez, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Peter Schwabe
2023/1712 (PDF ) Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage Feng Li, Jianfeng Ma, Yinbin Miao, Pengfei Wu, Xiangfu Song
2023/1711 (PDF ) Passive SSH Key Compromise via Lattices Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger
2023/1710 (PDF ) Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies Mingjie Chen, Yi-Fu Lai, Abel Laval, Laurane Marco, Christophe Petit
2023/1709 (PDF ) Signal Leakage Attack Meets Depth First Search: an Improved Approach on DXL Key Exchange Protocol Zhiwei Li, Jun Xu, Lei Hu
2023/1708 (PDF ) Algebraic properties of the maps $\chi_n$ Jan Schoone, Joan Daemen
2023/1707 (PDF ) Analysis of four protocols based on tropical circulant matrices Ivan Buchinskiy, Matvei Kotov, Alexander Treier
2023/1706 (PDF ) Breaking two PSI-CA protocols in polynomial time Yang Tan, Bo Lv
2023/1705 (PDF ) BaseFold: Efficient Field-Agnostic Polynomial Commitment Schemes from Foldable Codes Hadas Zeilberger, Binyi Chen, Ben Fisch
2023/1704 (PDF ) On Overidealizing Ideal Worlds: Xor of Two Permutations and its Applications Wonseok Choi, Minki Hhan, Yu Wei, Vassilis Zikas
2023/1703 (PDF ) Memory Checking for Parallel RAMs Surya Mathialagan
2023/1702 (PDF ) On Quantum Simulation-Soundness Behzad Abdolmaleki, Céline Chevalier, Ehsan Ebrahimi, Giulio Malavolta, Quoc-Huy Vu
2023/1701 (PDF ) Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2 Hosein Hadipour, Simon Gerhalter, Sadegh Sadeghi, Maria Eichlseder
2023/1700 (PDF ) Scalable Mixed-Mode MPC Radhika Garg, Kang Yang, Jonathan Katz, Xiao Wang
2023/1699 (PDF ) Oblivious Homomorphic Encryption Osman Biçer, Christian Tschudin
2023/1698 (PDF ) Another Look at Side-Channel Resistant Encoding Schemes Xiaolu Hou, Jakub Breier, Mladen Kovačević
2023/1697 (PDF ) Full Round Distinguishing and Key-Recovery Attacks on SAND-2 (Full version) Zhuolong Zhang, Shiyao Chen, Wei Wang, Meiqin Wang
2023/1696 (PDF ) A note on ``a novel authentication and key agreement scheme for Internet of Vehicles'' Zhengjun Cao
2023/1695 (PDF ) Implementing Arbitrary Maps over Small Finite Domains using Ring Addition and Scalar Multiplication Andrei Lapets
2023/1694 (PDF ) Predicate Aggregate Signatures and Applications Tian Qiu, Qiang Tang
2023/1693 (PDF ) Elementary Remarks on Some Quadratic Based Identity Based Encryption Schemes George Teseleanu, Paul Cotan
2023/1691 (PDF ) Some Results on Related Key-IV Pairs of Espresso George Teseleanu
2023/1690 (PDF ) Efficient VOLE based Multi-Party PSI with Lower Communication Cost Shuqing Zhang
2023/1689 (PDF ) Revisiting the Boomerang Attack from a Perspective of 3-differential Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman, Takanori Isobe
2023/1688 (PDF ) Faster Complete Formulas for the GLS254 Binary Curve Thomas Pornin
2023/1687 (PDF ) Admissible Parameter Sets and Complexity Estimation of Crossbred Algorithm Shuhei Nakamura
2023/1686 (PDF ) The Quantum Decoding Problem André Chailloux, Jean-Pierre Tillich
2023/1685 (PDF ) MPC in the head using the subfield bilinear collision problem Janik Huth, Antoine Joux
2023/1684 (PDF ) Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication Nan Cheng, Melek Önen, Aikaterini Mitrokotsa, Oubaïda Chouchane, Massimiliano Todisco, Alberto Ibarrondo
2023/1683 (PDF ) Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4 Ward Beullens, Fabio Campos, Sofía Celi, Basil Hess, Matthias J. Kannwischer
2023/1682 (PDF ) Selective Opening Security in the Quantum Random Oracle Model, Revisited Jiaxin Pan, Runzhi Zeng
2023/1681 (PDF ) The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression Ioana Savu, Marina Krček, Guilherme Perin, Lichao Wu, Stjepan Picek
2023/1680 (PDF ) On the cryptographic properties of weightwise affine and weightwise quadratic functions Pierrick Méaux, Yassine Ozaim
2023/1679 (PDF ) Plug Your Volt: Protecting Intel Processors against Dynamic Voltage Frequency Scaling based Fault Attacks Nimish Mishra, Rahul Arvind Mool, Anirban Chakraborty, Debdeep Mukhopadhyay
2023/1678 (PDF ) BumbleBee: Secure Two-party Inference Framework for Large Transformers Wen-jie Lu, Zhicong Huang, Zhen Gu, Jingyu Li, Jian Liu, Cheng Hong, Kui Ren, Tao Wei, WenGuang Chen
2023/1677 (PDF ) Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions Michele Ciampi, Yu Xia
2023/1676 (PDF ) FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM Gilad Asharov, Ilan Komargodski, Yehuda Michelson
2023/1675 (PDF ) Another Look at Differential-Linear Attacks Orr Dunkelman, Ariel Weizman
2023/1674 (PDF ) Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede
2023/1673 (PDF ) Designing Full-Rate Sponge based AEAD modes Bishwajit Chakraborty, Nilanjan Datta, Mridul Nandi
2023/1672 (PDF ) Fine-grained Policy Constraints for Distributed Point Function Keyu Ji, Bingsheng Zhang, Kui Ren
2023/1671 (PDF ) A note on ``SCPUAK: smart card-based secure protocol for remote user authentication and key agreement'' Zhengjun Cao, Lihua Liu
2023/1670 (PDF ) Unbalanced Private Set Intersection from Homomorphic Encryption and Nested Cuckoo Hashing Jörn Kußmaul, Matthew Akram, Anselme Tueno
2023/1669 (PDF ) $\Pi$: A Unified Framework for Computational Verifiable Secret Sharing Karim Baghery
2023/1668 (PDF ) Arithmetization Oriented Encryption Tomer Ashur, Al Kindi
2023/1667 (PDF ) Unleashing the Power of Differential Fault Attacks on QARMAv2 Soumya Sahoo, Debasmita Chakraborty, Santanu Sarkar
2023/1666 (PDF ) MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head Gora Adj, Stefano Barbero, Emanuele Bellini, Andre Esser, Luis Rivera-Zamarripa, Carlo Sanna, Javier Verbel, Floyd Zweydinger
2023/1665 (PDF ) Model Stealing Attacks On FHE-based Privacy-Preserving Machine Learning through Adversarial Examples Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2023/1663 (PDF ) Proof-of-Work-based Consensus in Expected-Constant Time Juan Garay, Aggelos Kiayias, Yu Shen
2023/1662 (PDF ) Families of prime-order endomorphism-equipped embedded curves on pairing-friendly curves Antonio Sanso, Youssef El Housni
2023/1661 (PDF ) Publicly-Detectable Watermarking for Language Models Jaiden Fairoze, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang
2023/1660 (PDF ) FaBFT: Flexible Asynchronous BFT Protocol Using DAG Yu Song, Yu Long, Xian Xu, Dawu Gu
2023/1659 (PDF ) Partial Sums Meet FFT: Improved Attack on 6-Round AES Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaetan Leurent, Avichai Marmor, Victor Mollimard
2023/1658 (PDF ) On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweaks Nilanjan Datta, Avijit Dutta, Eik List, Sougata Mandal
2023/1657 (PDF ) PQCMC: Post-Quantum Cryptography McEliece-Chen Implicit Certificate Scheme Abel C. H. Chen
2023/1656 (PDF ) Privacy-Preserving Digital Vaccine Passport Thai Duong, Jiahui Gao, Duong Hieu Phan, Ni Trieu
2023/1655 (PDF ) Approximate Lower Bound Arguments Pyrros Chaidos, Aggelos Kiayias, Leonid Reyzin, Anatoliy Zinovyev
2023/1654 (PDF ) On Gaussian sampling, smoothing parameter and application to signatures Thomas Espitau, Alexandre Wallet, Yang Yu
2023/1653 (PDF ) QCB is Blindly Unforgeable Jannis Leuther, Stefan Lucks
2023/1652 (PDF ) On Sigma-Protocols and (packed) Black-Box Secret Sharing Schemes Claudia Bartoli, Ignacio Cascudo
2023/1651 (PDF ) Publicly Verifiable Secret Sharing over Class Groups and Applications to DKG and YOSO Ignacio Cascudo, Bernardo David
2023/1650 (PDF ) An Efficient Variant of F4 Algorithm for Solving MQ Problem Kosuke Sakata, Tsuyoshi Takagi
2023/1649 (PDF ) A New Framework for Fast Homomorphic Matrix Multiplication Xiaopeng Zheng, Hongbo Li, Dingkang Wang
2023/1648 (PDF ) On-Chain Timestamps Are Accurate Apostolos Tzinas, Srivatsan Sridhar, Dionysis Zindros
2023/1647 (PDF ) Who Watches the Watchers: Attacking Glitch Detection Circuits Amund Askeland, Svetla Nikova, Ventzislav Nikov
2023/1646 (PDF ) Security Bounds for Proof-Carrying Data from Straightline Extractors Alessandro Chiesa, Ziyi Guan, Shahar Samocha, Eylon Yogev
2023/1645 (PDF ) The Dilemma and Prospects of Academic Misconduct in Digital Forensics--A Case Study to Wan's Improved Scheme Chenglian Liu, Sonia Chien-I Chen
2023/1644 (PDF ) An End-to-End Framework for Private DGA Detection as a Service Ricardo Jose Menezes Maia, Dustin Ray, Sikha Pentyala, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento, Ricardo Jacobi
2023/1643 (PDF ) Oblivious Turing Machine Sofiane Azogagh, Victor Delfour, Marc-Olivier Killijian
2023/1642 (PDF ) A New Perspective on Key Switching for BGV-like Schemes Johannes Mono, Tim Güneysu
2023/1641 (PDF ) PSKPIR: Symmetric Keyword Private Information Retrieval based on PSI with Payload Zuodong Wu, Dawei Zhang, Yong Li, Xu Han
2023/1640 (PDF ) Quantum Key Leasing for PKE and FHE with a Classical Lessor Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu
2023/1639 (PDF ) Analysis of a Quantum Attack on the Blum-Micali Pseudorandom Number Generator Tingfei Feng
2023/1638 (PDF ) The One-Wayness of Jacobi Signatures Henry Corrigan-Gibbs, David J. Wu
2023/1637 (PDF ) Algorithmic Views of Vectorized Polynomial Multipliers – NTRU Han-Ting Chen, Yi-Hua Chung, Vincent Hwang, Bo-Yin Yang
2023/1636 (PDF ) Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval Meng Hao, Weiran Liu, Liqiang Peng, Hongwei Li, Cong Zhang, Hanxiao Chen, Tianwei Zhang
2023/1635 (PDF ) Oblivious issuance of proofs Michele Orrù, Stefano Tessaro, Greg Zaverucha, Chenzhi Zhu
2023/1634 (PDF ) On the (In)Security of the BUFF Transform Jelle Don, Serge Fehr, Yu-Hsuan Huang, Patrick Struck
2023/1633 (PDF ) One-time and Revocable Ring Signature with Logarithmic Size in Blockchain Yang Li, Wei Wang, Dawei Zhang, Xu Han
2023/1632 (PDF ) On Decompositions of Permutations in Quadratic Functions Samuele Andreoli, Enrico Piccione, Lilya Budaghyan, Pantelimon Stănică, Svetla Nikova
2023/1631 (PDF ) ASKPIR: Authorized Symmetric Keyword Privacy Information Retrieval Protocol Based on DID Zuodong Wu, Dawei Zhang, Yong Li, Xu Han
2023/1630 (PDF ) Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu
2023/1629 (PDF ) A Note on ``A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0'' Zhengjun Cao, Lihua Liu
2023/1628 (PDF ) Cryptanalysis of the Peregrine Lattice-Based Signature Scheme Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu, Mehdi Tibouchi, Masayuki Abe
2023/1627 (PDF ) Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption - A Case Study on Crystals-Kyber Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, Shivam Bhasin
2023/1626 (PDF ) Et tu, Brute? SCA Assisted CCA using Valid Ciphertexts - A Case Study on HQC KEM Thales Paiva, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Sayan Das, Anupam Chattopadhyay
2023/1625 (PDF ) SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning Ziyu Wang, Yaoling Ding, An Wang, Yuwei Zhang, Congming Wei, Shaofei Sun, Liehuang Zhu
2023/1624 (PDF ) On the (Not So) Surprising Impact of Multi-Path Payments on Performance and Privacy in the Lightning Network Charmaine Ndolo, Florian Tschorsch
2023/1623 (PDF ) Concrete Analysis of Quantum Lattice Enumeration Shi Bai, Maya-Iggy van Hoof, Floyd B. Johnson, Tanja Lange, Tran Ngo
2023/1622 (PDF ) Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS Mingfei Zhang, Rujia Li, Sisi Duan
2023/1621 (PDF ) Withdrawable Signature: How to Call off a Signature Xin Liu, Joonsang Baek, Willy Susilo
2023/1620 (PDF ) Commitments from Quantum One-Wayness Dakshita Khurana, Kabir Tomer
2023/1619 (PDF ) Pai: Private Retrieval with Constant Online Time, Communication, and Client-Side Storage for Data Marketplace Shuaishuai Li, Weiran Liu, Liqiang Peng, Cong Zhang, Xinwei Gao, Aiping Liang, Lei Zhang, Dongdai Lin, Yuan Hong
2023/1618 (PDF ) Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves Benjamin Benčina, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Miha Stopar, Charlotte Weitkämper
2023/1617 (PDF ) Designing Efficient and Flexible NTT Accelerators Ahmet MALAL
2023/1616 (PDF ) DeVoS: Deniable Yet Verifiable Vote Updating Johannes Mueller, Balazs Pejo, Ivan Pryvalov
2023/1615 (PDF ) Order vs. Chaos: A Language Model Approach for Side-channel Attacks Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, Lejla Batina
2023/1614 (PDF ) New proof systems and an OPRF from CSIDH Cyprien Delpech de Saint Guilhem, Robi Pedersen
2023/1613 (PDF ) Toothpicks: More Efficient Fork-Free Two-Round Multi-Signatures Jiaxin Pan, Benedikt Wagner
2023/1612 (PDF ) A Mempool Encryption Scheme for Ethereum via Multiparty Delay Encryption Amirhossein Khajehpour, Hanzaleh Akbarinodehi, Mohammad Jahanara, Chen Feng
2023/1611 (PDF ) Power circuits: a new arithmetization for GKR-styled sumcheck Lev Soukhanov
2023/1610 (PDF ) An Efficient ZK Compiler from SIMD Circuits to General Circuits Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang, Chenkai Weng, Kang Yang, Yu Yu
2023/1609 (PDF ) How to Prove Statements Obliviously? Sanjam Garg, Aarushi Goel, Mingyuan Wang
2023/1608 (PDF ) Can Alice and Bob Guarantee Output to Carol? Bar Alon, Eran Omri, Muthuramakrishnan Venkitasubramaniam
2023/1607 (PDF ) Crust: Verifiable and Efficient Private Information Retrieval With Sublinear Online Time Yinghao Wang, Xuanming Liu, Jiawen Zhang, Jian Liu, Xiaohu Yang
2023/1605 (PDF ) Three Party Secure Computation with Friends and Foes Bar Alon, Amos Beimel, Eran Omri
2023/1604 (PDF ) Manifold Learning Side-Channel Attacks against Masked Cryptographic Implementations Jianye Gao, Xinyao Li, Changhai Ou, Zhu Wang, Fei Yan
2023/1603 (PDF ) Breaking Parallel ROS: Implication for Isogeny and Lattice-based Blind Signatures Shuichi Katsumata, Yi-Fu Lai, Michael Reichle
2023/1602 (PDF ) A one-query lower bound for unitary synthesis and breaking quantum cryptography Alex Lombardi, Fermi Ma, John Wright
2023/1601 (PDF ) The Uber-Knowledge Assumption: A Bridge to the AGM Balthazar Bauer, Pooya Farshim, Patrick Harasser, Markulf Kohlweiss
2023/1600 (PDF ) Compress: Generate Small and Fast Masked Pipelined Circuits Gaëtan Cassiers, Barbara Gigerl, Stefan Mangard, Charles Momin, Rishub Nagpal
2023/1599 (PDF ) Boomy: Batch Opening Of Multivariate polYnomial commitment Thomas Lavaur, Jérôme Lacan
2023/1598 (PDF ) Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller Léo Weissbart, Stjepan Picek
2023/1596 (PDF ) A Black Box Attack Using Side Channel Analysis and Hardware Trojans Raja Adhithan Radhakrishnan
2023/1595 (PDF ) CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness Sofia Celi, Shai Levin, Joe Rowell
2023/1594 (PDF ) Secure Noise Sampling for DP in MPC with Finite Precision Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, Liang Zhao
2023/1593 (PDF ) Multi-Party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN Quang Dao, Yuval Ishai, Aayush Jain, Huijia Lin
2023/1592 (PDF ) Analysis of one semi-quantum-honest key agreement scheme in MSTSA structure without entanglement Zhengjun Cao, Lihua Liu
2023/1591 (PDF ) One-way Functions and Hardness of (Probabilistic) Time-Bounded Kolmogorov Complexity w.r.t. Samplable Distributions Yanyi Liu, Rafael Pass
2023/1590 (PDF ) Single trace HQC shared key recovery with SASCA Guillaume Goy, Julien Maillard, Philippe Gaborit, Antoine Loiseau
2023/1589 (PDF ) Optimized Homomorphic Evaluation of Boolean Functions Nicolas Bon, David Pointcheval, Matthieu Rivain
2023/1588 (PDF ) M&M'S: Mix and Match Attacks on Schnorr-type Blind Signatures with Repetition Khue Do, Lucjan Hanzlik, Eugenio Paracucchi
2023/1587 (PDF ) A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber Sönke Jendral, Kalle Ngo, Ruize Wang, Elena Dubrova
2023/1586 (PDF ) On the Round Complexity of Asynchronous Crusader Agreement Ittai Abraham, Naama Ben-David, Gilad Stern, Sravya Yandamuri
2023/1585 (PDF ) How to Rationally Select Your Delegatee in PoS Yuzhe Zhang, Qin Wang, Shiping Chen, Chen Wang
2023/1584 (PDF ) How to Garble Mixed Circuits that Combine Boolean and Arithmetic Computations Hanjun Li, Tianren Liu
2023/1583 (PDF ) Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory Rachit Garg, George Lu, Brent Waters, David J. Wu
2023/1582 (PDF ) Time-Lock Puzzles with Efficient Batch Solving Jesko Dujmovic, Rachit Garg, Giulio Malavolta
2023/1581 (PDF ) CryptoZoo: A Viewer for Reduction Proofs Chris Brzuska, Christoph Egger, Kirthivaasan Puniamurthy
2023/1580 (PDF ) Algorithmic Views of Vectorized Polynomial Multipliers – NTRU Prime Vincent Hwang, Chi-Ting Liu, Bo-Yin Yang
2023/1579 (PDF ) KiloNova: Preprocessing Folding-based SNARKs for Machine Executions Tianyu Zheng, Shang Gao, Yu Guo, Bin Xiao
2023/1578 (PDF ) A Scalable Coercion-resistant Voting Scheme for Blockchain Decision-making Zeyuan Yin, Bingsheng Zhang, Andrii Nastenko, Roman Oliynykov, Kui Ren
2023/1577 (PDF ) Asymptotics and Improvements of Sieving for Codes Léo Ducas, Andre Esser, Simona Etinski, Elena Kirshanova
2023/1576 (PDF ) Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Twin Smooth Integers and their Isogeny-based Applications Bruno Sterner
2023/1575 (PDF ) SoK: Web3 Recovery Mechanisms Panagiotis Chatzigiannis, Konstantinos Chalkias, Aniket Kate, Easwar Vivek Mangipudi, Mohsen Minaei, Mainack Mondal
2023/1574 (PDF ) Efficient Pre-processing PIR Without Public-Key Cryptography Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi
2023/1573 (PDF ) Threshold Computation in the Head: Improved Framework for Post-Quantum Signatures and Zero-Knowledge Arguments Thibauld Feneuil, Matthieu Rivain
2023/1572 (PDF ) Faulting Winternitz One-Time Signatures to forge LMS, XMSS, or SPHINCS+ signatures Alexander Wagner, Vera Wesselkamp, Felix Oberhansl, Marc Schink, Emanuele Strieder
2023/1571 (PDF ) Key Filtering in Cube Attacks from the Implementation Aspect Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao
2023/1570 (PDF ) Jackpot: Non-Interactive Aggregatable Lotteries Nils Fleischhacker, Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner
2023/1569 (PDF ) Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation Giuseppe Ateniese, Foteini Baldimtsi, Matteo Campanelli, Danilo Francati, Ioanna Karantaidou
2023/1568 (PDF ) Not Just Regular Decoding: Asymptotics and Improvements of Regular Syndrome Decoding Attacks Andre Esser, Paolo Santini
2023/1567 (PDF ) Depth-Optimized Quantum Implementation of ARIA Yujin Yang, Kyungbae Jang, Yujin Oh, Hwajeong Seo
2023/1566 (PDF ) Optimized Quantum Implementation of SEED Yujin Oh, Kyungbae Jang, Yujin Yang, Hwajeong Seo
2023/1565 (PDF ) Finding Shortest Vector Using Quantum NV Sieve on Grover Hyunji Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwangil Bae, Ilkwon Sohn, Hwajeong Seo
2023/1564 (PDF ) Fast Blind Rotation for Bootstrapping FHEs Binwu Xiang, Jiang Zhang, Yi Deng, Yiran Dai, Dengguo Feng
2023/1563 (PDF ) Formal Analysis of Non-profiled Deep-learning Based Side-channel Attacks Akira Ito, Rei Ueno, Rikuma Tanaka, Naofumi Homma
2023/1562 (PDF ) Generalized Implicit Factorization Problem Yansong Feng, Abderrahmane Nitaj, Yanbin Pan
2023/1561 (PDF ) LLM for SoC Security: A Paradigm Shift Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark Tehranipoor, Farimah Farahmandi
2023/1560 (PDF ) Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun Samuel Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara, Léo Robert
2023/1559 (PDF ) AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Krijn Reijnders
2023/1558 (PDF ) StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations Siemen Dhooghe, Artemii Ovchinnikov, Dilara Toprakhisar
2023/1557 (PDF ) Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1 Yanbin Xu, Yonglin Hao, Mingxing Wang
2023/1556 (PDF ) Better Safe than Sorry: Recovering after Adversarial Majority Srivatsan Sridhar, Dionysis Zindros, David Tse
2023/1555 (PDF ) Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines Yuncong Zhang, Shi-Feng Sun, Ren Zhang, Dawu Gu
2023/1554 (PDF ) Cornucopia: Distributed randomness beacons at scale Miranda Christ, Kevin Choi, Joseph Bonneau
2023/1553 (PDF ) Adaptively Secure BLS Threshold Signatures from DDH and co-CDH Sourav Das, Ling Ren
2023/1552 (PDF ) Doubly Efficient Batched Private Information Retrieval Xiuquan Ding, Giulio Malavolta, Tianwei Zhang
2023/1551 (PDF ) Evaluating GPT-4’s Proficiency in Addressing Cryptography Examinations Vasily Mikhalev, Nils Kopal, Bernhard Esslinger
2023/1550 (PDF ) A Thorough Evaluation of RAMBAM Daniel Lammers, Amir Moradi, Nicolai Müller, Aein Rezaei Shahmirzadi
2023/1549 (PDF ) Signature-Free Atomic Broadcast with Optimal $O(n^2)$ Messages and $O(1)$ Expected Time Xiao Sui, Xin Wang, Sisi Duan
2023/1548 (PDF ) Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs Carsten Baum, Nikolas Melissaris, Rahul Rachuri, Peter Scholl
2023/1547 (PDF ) Further Improvements of the Estimation of Key Enumeration with Applications to Solving LWE Alessandro Budroni, Erik Mårtensson
2023/1546 (PDF ) PERFORMANCE EVALUATION OF MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTION SYSTEM Sudhanshu Sekhar Tripathy, Bichitrananda Behera
2023/1545 (PDF ) Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, Tobias Schneider
2023/1544 (PDF ) Arithmetic PCA for Encrypted Data Jung Hee Cheon, Hyeongmin Choe, Saebyul Jung, Duhyeong Kim, Dahoon Lee, Jai Hyun Park
2023/1543 (PDF ) Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers Amit Jana, Mostafizar Rahman, Prathamesh Ram, Dhiman Saha, Goutam Paul
2023/1542 (PDF ) Don’t Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees Yu Dai, Fangguo Zhang, Chang-an Zhao
2023/1541 (PDF ) TMVP-based Polynomial Convolution for Saber and Sable on GPU using CUDA-cores and Tensor-cores Muhammad Asfand Hafeez, Wai-Kong Lee, Angshuman Karmakar, Seong Oun Hwang
2023/1540 (PDF ) A Note on ``a two-factor security authentication scheme for wireless sensor networks in IoT environments'' Zhengjun Cao, Lihua Liu
2023/1539 (PDF ) ELCA: Introducing Enterprise-level Cryptographic Agility for a Post-Quantum Era Dimitrios Sikeridis, David Ott, Sean Huntley, Shivali Sharma, Vasantha Kumar Dhanasekar, Megha Bansal, Akhilesh Kumar, Anwitha U N, Daniel Beveridge, Sairam Veeraswamy
2023/1538 (PDF ) Unclonable Commitments and Proofs Vipul Goyal, Giulio Malavolta, Justin Raizes
2023/1537 (PDF ) DEFEND: Towards Verifiable Delay Functions from Endomorphism Rings Knud Ahrens, Jens Zumbrägel
2023/1536 (PDF ) Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, Yuval Yarom
2023/1535 (PDF ) A Total Break of the 3WISE Digital Signature Scheme Daniel Smith-Tone
2023/1534 (PDF ) Evolving Secret Sharing Made Short Danilo Francati, Daniele Venturi
2023/1533 (PDF ) On Linear Equivalence, Canonical Forms, and Digital Signatures Tung Chou, Edoardo Persichetti, Paolo Santini
2023/1532 (PDF ) Unclonable Non-Interactive Zero-Knowledge Ruta Jawale, Dakshita Khurana
2023/1531 (PDF ) Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space Pierrick Méaux, Jeongeun Park, Hilder V. L. Pereira
2023/1530 (PDF ) Proofs of Space with Maximal Hardness Leonid Reyzin
2023/1529 (PDF ) Shufflecake: Plausible Deniability for Multiple Hidden Filesystems on Linux Elia Anzuoni, Tommaso Gagliardoni
2023/1528 (PDF ) Unmodified Half-Gates is Adaptively Secure - So is Unmodified Three-Halves Xiaojie Guo, Kang Yang, Xiao Wang, Yu Yu, Zheli Liu
2023/1527 (PDF ) Adaptive Garbled Circuits and Garbled RAM from Non-Programmable Random Oracles Cruz Barnum, David Heath, Vladimir Kolesnikov, Rafail Ostrovsky
2023/1526 (PDF ) Polynomial Time Cryptanalytic Extraction of Neural Network Models Isaac A. Canales-Martínez, Jorge Chavez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Nitin Satpute, Adi Shamir
2023/1525 (PDF ) Committing AE from Sponges: Security Analysis of the NIST LWC Finalists Juliane Krämer, Patrick Struck, Maximiliane Weishäupl
2023/1524 (PDF ) SoK: Signatures With Randomizable Keys Sofía Celi, Scott Griffy, Lucjan Hanzlik, Octavio Perez Kempner, Daniel Slamanig
2023/1523 (PDF ) On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching Seung Geol Choi, Dana Dachman-Soled, Mingyu Liang, Linsheng Liu, Arkady Yerukhimovich
2023/1522 (PDF ) cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA Shiyu Shen, Hao Yang, Wenqian Li, Yunlei Zhao
2023/1521 (PDF ) A reduced set of submatrices for a faster evaluation of the MDS property of a circulant matrix with entries that are powers of two Dragan Lambić
2023/1520 (PDF ) Kirby: A Robust Permutation-Based PRF Construction Charlotte Lefevre, Yanis Belkheyar, Joan Daemen
2023/1519 (PDF ) Accountable Decryption made Formal and Practical Rujia Li, Yuanzhao Li, Qin Wang, Sisi Duan, Qi Wang, Mark Ryan
2023/1518 (PDF ) Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees Matteo Campanelli, Antonio Faonio, Dario Fiore, Tianyu Li, Helger Lipmaa
2023/1517 (PDF ) Threshold Implementations with Non-Uniform Inputs Siemen Dhooghe, Artemii Ovchinnikov
2023/1516 (PDF ) On the Viability of Open-Source Financial Rails: Economic Security of Permissionless Consensus Jacob D. Leshno, Rafael Pass, Elaine Shi
2023/1515 (PDF ) OPTIKS: An Optimized Key Transparency System Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno
2023/1514 (PDF ) Leakage-Free Probabilistic Jasmin Programs José Bacelar Almeida, Denis Firsov, Tiago Oliveira, Dominique Unruh
2023/1513 (PDF ) Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements Marcel Tiepelt, Edward Eaton, Douglas Stebila
2023/1512 (PDF ) List Oblivious Transfer and Applications to Round-Optimal Black-Box Multiparty Coin Tossing Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Hendrik Waldner
2023/1511 (PDF ) Lower bound of costs of formulas to compute image curves of $3$-isogenies in the framework of generalized Montgomery coordinates Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi
2023/1510 (PDF ) Towards Practical Doubly-Efficient Private Information Retrieval Hiroki Okada, Rachel Player, Simon Pohmann, Christian Weinert
2023/1509 (PDF ) Efficient and Usable Coercion-Resistant E-Voting on the Blockchain Neyire Deniz Sarier
2023/1508 (PDF ) Provable Dual Attacks on Learning with Errors Amaury Pouly, Yixin Shen
2023/1507 (PDF ) Efficient Agreement Over Byzantine Gossip Ran Cohen, Julian Loss, Tal Moran
2023/1506 (PDF ) IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram Tomoki Moriya
2023/1505 (PDF ) PQ.V.ALU.E: Post-Quantum RISC-V Custom ALU Extensions on Dilithium and Kyber Konstantina Miteloudi, Joppe Bos, Olivier Bronchain, Björn Fay, Joost Renes
2023/1504 (PDF ) Algebraic Group Model with Oblivious Sampling Helger Lipmaa, Roberto Parisella, Janno Siim
2023/1503 (PDF ) zk-Bench: A Toolset for Comparative Evaluation and Performance Benchmarking of SNARKs Jens Ernstberger, Stefanos Chaliasos, George Kadianakis, Sebastian Steinhorst, Philipp Jovanovic, Arthur Gervais, Benjamin Livshits, Michele Orrù
2023/1501 (PDF ) Space-Efficient and Noise-Robust Quantum Factoring Seyoon Ragavan, Vinod Vaikuntanathan
2023/1500 (PDF ) Holographic SNARGs for P and Batch-NP from (Polynomially Hard) Learning with Errors Susumu Kiyoshima
2023/1499 (PDF ) Linearly-Homomorphic Signatures for Short Randomizable Proofs of Subset Membership David Pointcheval
2023/1498 (PDF ) LWE with Quantum Amplitudes: Algorithm, Hardness, and Oblivious Sampling Yilei Chen, Zihan Hu, Qipeng Liu, Han Luo, Yaxin Tu
2023/1497 (PDF ) A note on ``authenticated key agreement protocols for dew-assisted IoT systems'' Zhengjun Cao, Lihua Liu
2023/1496 (PDF ) A Privacy-preserving Central Bank Ledger for Central Bank Digital Currency Chan Wang Mong Tikvah
2023/1495 (PDF ) Key Committing Security Analysis of AEGIS Takanori Isobe, Mostafizar Rahman
2023/1493 (PDF ) Measuring the Concentration of Control in Contemporary Ethereum Simon Brown
2023/1492 (PDF ) A Quantum Approach For Reducing Communications in Classical Secure Computations with Long Outputs Jiayu Zhang
2023/1491 (PDF ) Subversion-Resilient Signatures without Random Oracles Pascal Bemmann, Sebastian Berndt, Rongmao Chen
2023/1490 (PDF ) Formulations and Constructions of Remote State Preparation with Verifiability, with Applications Jiayu Zhang
2023/1489 (PDF ) To Broadcast or Not to Broadcast: Decision-Making Strategies for Mining Empty Blocks Chon Kit Lao, Rui Jiang, Luyao Zhang, Fan Zhang, Ye Wang
2023/1488 (PDF ) SCALLOP-HD: group action from 2-dimensional isogenies Mingjie Chen, Antonin Leroux, Lorenz Panny
2023/1487 (PDF ) A Novel Mathematical Formal Proof in Unreliability Protocol with XOR in Two's Complement System Chenglian Liu, Sonia Chien-I Chen
2023/1486 (PDF ) RC4OK. An improvement of the RC4 stream cipher Khovayko O., Schelkunov D.
2023/1485 (PDF ) How to Physically Hold Your Bitcoins ? Houda Ferradi, Antoine Houssais, David Naccache
2023/1484 (PDF ) Blind signatures from Zero knowledge in the Kummer variety Paulo L. Barreto, Devin D. Reich, Marcos A. Simplicio Jr., Gustavo H. M. Zanon
2023/1483 (PDF ) Lower Bounds on Anonymous Whistleblowing Willy Quach, LaKyah Tyner, Daniel Wichs
2023/1482 (PDF ) Twinkle: Threshold Signatures from DDH with Full Adaptive Security Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, Chenzhi Zhu
2023/1481 (PDF ) A Total Break of the Scrap Digital Signature Scheme Daniel Smith-Tone
2023/1480 (PDF ) The Pre-Shared Key Modes of HPKE Joël Alwen, Jonas Janneck, Eike Kiltz, Benjamin Lipp
2023/1479 (PDF ) Rational Broadcast Protocols against Timid Adversaries Keigo Yamashita, Kenji Yasunaga
2023/1478 (PDF ) Succinct Proofs and Linear Algebra Alex Evans, Guillermo Angeris
2023/1477 (PDF ) G+G: A Fiat-Shamir Lattice Signature Based on Convolved Gaussians Julien Devevey, Alain Passelègue, Damien Stehlé
2023/1476 (PDF ) Auditable Obfuscation Shalini Banerjee, Steven D. Galbraith
2023/1475 (PDF ) Tropical cryptography III: digital signatures Jiale Chen, Dima Grigoriev, Vladimir Shpilrain
2023/1474 (PDF ) Efficacy and Mitigation of the Cryptanalysis on AIM Seongkwang Kim, Jincheol Ha, Mincheol Son, Byeonghak Lee
2023/1473 (PDF ) Cicada: A framework for private non-interactive on-chain auctions and voting Noemi Glaeser, István András Seres, Michael Zhu, Joseph Bonneau
2023/1472 (PDF ) Naysayer proofs István András Seres, Noemi Glaeser, Joseph Bonneau
2023/1471 (PDF ) NTRU in Quaternion Algebras of Bounded Discriminant Cong Ling, Andrew Mendelsohn
2023/1470 (PDF ) Zero-Knowledge Systems from MPC-in-the-Head and Oblivious Transfer Cyprien Delpech de Saint Guilhem, Ehsan Ebrahimi, Barry van Leeuwen
2023/1469 (PDF ) SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions Martin R. Albrecht, Giacomo Fenzi, Oleksandra Lapiha, Ngoc Khanh Nguyen
2023/1468 (PDF ) QFESTA: Efficient Algorithms and Parameters for FESTA using Quaternion Algebras Kohei Nakagawa, Hiroshi Onuki
2023/1467 (PDF ) GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Takashi Nishide
2023/1466 (PDF ) On Black-Box Verifiable Outsourcing Amit Agarwal, Navid Alamati, Dakshita Khurana, Srinivasan Raghuraman, Peter Rindal
2023/1465 (PDF ) Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search Dominique Dittert, Thomas Schneider, Amos Treiber
2023/1464 (PDF ) Round-Robin is Optimal: Lower Bounds for Group Action Based Protocols Daniele Cozzo, Emanuele Giunta
2023/1463 (PDF ) Aurora: Leaderless State-Machine Replication with High Throughput Hao Lu, Jian Liu, Kui Ren
2023/1462 (PDF ) High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application Rashmi Agrawal, Jung Ho Ahn, Flavio Bergamaschi, Ro Cammarota, Jung Hee Cheon, Fillipe D. M. de Souza, Huijing Gong, Minsik Kang, Duhyeong Kim, Jongmin Kim, Hubert de Lassus, Jai Hyun Park, Michael Steiner, Wen Wang
2023/1461 (PDF ) Do Private Transaction Pools Mitigate Frontrunning Risk? Agostino Capponi, Ruizhe Jia, Ye Wang
2023/1460 (PDF ) Rigorous Foundations for Dual Attacks in Coding Theory Charles Meyer-Hilfiger, Jean-Pierre Tillich
2023/1459 (PDF ) Identity-Based Threshold Signatures from Isogenies Shahla Atapoor
2023/1458 (PDF ) A Further Study of Vectorial Dual-Bent Functions Jiaxin Wang, Fang-Wei Fu, Yadi Wei, Jing Yang
2023/1457 (PDF ) Provable Security Analysis of the Secure Remote Password Protocol Dennis Dayanikli, Anja Lehmann
2023/1456 (PDF ) The Generating Series of Support Minors MinRank Ideals Daniel Smith-Tone
2023/1455 (PDF ) Efficient Secure Two Party ECDSA Sermin Kocaman, Younes Talibi Alaoui
2023/1454 (PDF ) Scalable Off-Chain Auctions Mohsen Minaei, Ranjit Kumaresan, Andrew Beams, Pedro Moreno-Sanchez, Yibin Yang, Srinivasan Raghuraman, Panagiotis Chatzigiannis, Mahdi Zamani, Duc V. Le
2023/1453 (PDF ) Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies Qinggan Fu, Ye Luo, Qianqian Yang, Ling Song
2023/1452 (PDF ) Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems Jules Maire, Damien Vergnaud
2023/1451 (PDF ) Counting Unpredictable Bits: A Simple PRG from One-way Functions Noam Mazor, Rafael Pass
2023/1450 (PDF ) Post-Quantum Fully Homomorphic Encryption with Group Ring Homomorphisms Christopher Leonardi, Maya Gusak
2023/1449 (PDF ) Truncated Differential Cryptanalysis: New Insights and Application to QARMAv1-n and QARMAv2-64 Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia
2023/1448 (PDF ) The supersingular endomorphism ring problem given one endomorphism Arthur Herlédan Le Merdy, Benjamin Wesolowski
2023/1447 (PDF ) Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions Shuichi Katsumata, Michael Reichle, Yusuke Sakai
2023/1446 (PDF ) HE$^3$DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, Zhenyu Guan
2023/1445 (PDF ) HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu
2023/1444 (PDF ) On Time-Space Lower Bounds for Finding Short Collisions in Sponge Hash Functions Akshima, Xiaoqi Duan, Siyao Guo, Qipeng Liu
2023/1443 (PDF ) Security with Functional Re-Encryption from CPA Yevgeniy Dodis, Shai Halevi, Daniel Wichs
2023/1442 (PDF ) Everlasting ROBOT: the Marvin Attack Hubert Kario
2023/1441 (PDF ) Out of the Box Testing Hubert Kario
2023/1440 (PDF ) Comment on Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud Chenglian Liu, Sonia Chien-I Chen
2023/1439 (PDF ) Dynamic Security Aspects of Onion Routing Alessandro Melloni, Martijn Stam, Øyvind Ytrehus
2023/1438 (PDF ) Private Web Search with Tiptoe Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Nickolai Zeldovich
2023/1437 (PDF ) KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates YongRyeol Choi, MinGi Kim, YoungBeom Kim, JinGyo Song, JaeHwan Jin, HeeSeok Kim, Seog Chung Seo
2023/1436 (PDF ) Cryptanalysis of Elisabeth-4 Henri Gilbert, Rachelle Heim Boissier, Jérémy Jean, Jean-René Reinhard
2023/1435 (PDF ) Identity-Based Matchmaking Encryption with Enhanced Privacy Against Chosen-Ciphertext Attacks Sohto Chiku, Keitaro Hashimoto, Keisuke Hara, Junji Shikata
2023/1434 (PDF ) An Efficient Strong Asymmetric PAKE Compiler Instantiable from Group Actions Ian McQuoid, Jiayu Xu
2023/1433 (PDF ) A polynomial-time attack on instances of M-SIDH and FESTA Wouter Castryck, Frederik Vercauteren
2023/1432 (PDF ) Populating the Zoo of Rugged Pseudorandom Permutations Jean Paul Degabriele, Vukašin Karadžić
2023/1431 (PDF ) Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs Yaobin Shen, François-Xavier Standaert, Lei Wang
2023/1430 (PDF ) A note on ``ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor'' Zhengjun Cao, Lihua Liu
2023/1429 (PDF ) Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants Shiyu Shen, Hao Yang, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao
2023/1428 (PDF ) XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption Hao Yang, Shiyu Shen, Siyang Jiang, Lu Zhou, Wangchen Dai, Yunlei Zhao
2023/1427 (PDF ) Efficient Hardware RNS Decomposition for Post-Quantum Signature Scheme FALCON Samuel Coulon, Pengzhou He, Tianyou Bao, Jiafeng Xie
2023/1426 (PDF ) Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC Aysajan Abidin, Erik Pohle, Bart Preneel
2023/1425 (PDF ) Popping “R-propping”: breaking hardness assumptions for matrix groups over F_{2^8} Fernando Virdia
2023/1424 (PDF ) PRIVATON - Privacy Preserving Automaton for Proof of Computations Bala Subramanyan
2023/1423 (PDF ) Quantum Lattice Enumeration in Limited Depth Nina Bindel, Xavier Bonnetain, Marcel Tiepelt, Fernando Virdia
2023/1422 (PDF ) Tight Security Bound of 2k-LightMAC Plus Nilanjan Datta, Avijit Dutta, Samir Kundu
2023/1421 (PDF ) Efficient Secure Storage with Version Control and Key Rotation Long Chen, Hui Guo, Ya-Nan Li, Qiang Tang
2023/1420 (PDF ) Rogue-Instance Security for Batch Knowledge Proofs Gil Segev, Amit Sharabi, Eylon Yogev
2023/1419 (PDF ) Improving the Rectangle Attack on GIFT-64 Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang, Zhuohui Feng
2023/1418 (PDF ) Short Concurrent Covert Authenticated Key Exchange (Short cAKE) Karim Eldafrawy, Nicholas Genise, Stanislaw Jarecki
2023/1417 (PDF ) Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits Qun Liu, Bart Preneel, Zheng Zhao, Meiqin Wang
2023/1416 (PDF ) On Black-Box Knowledge-Sound Commit-And-Prove SNARKs Helger Lipmaa
2023/1415 (PDF ) Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes Jonathan Bootle, Sebastian Faller, Julia Hesse, Kristina Hostáková, Johannes Ottenhues
2023/1414 (PDF ) Differential-Linear Approximation Semi-Unconstrained Searching and Partition Tree: Application to LEA and Speck Yi Chen, Zhenzhen Bao, Hongbo Yu
2023/1413 (PDF ) Scalable Multi-party Private Set Union from Multi-Query Secret-Shared Private Membership Test Xiang Liu, Ying Gao
2023/1412 (PDF ) Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai
2023/1411 (PDF ) zk-SNARKs from Codes with Rank Metrics Xuan-Thanh Do, Dang-Truong Mac, Quoc-Huy Vu
2023/1410 (PDF ) Two Algorithms for Fast GPU Implementation of NTT Ali Şah Özcan, Erkay Savaş
2023/1409 (PDF ) Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith Jonas Meers, Julian Nowakowski
2023/1408 (PDF ) Correlation Cube Attack Revisited: Improved Cube Search and Superpoly Recovery Techniques Jianhua Wang, Lu Qin, Baofeng Wu
2023/1407 (PDF ) Fully Homomorphic Encryption-Based Protocols for Enhanced Private Set Intersection Functionalities JINGWEI HU, Junyan Chen, Wangchen Dai, Huaxiong Wang
2023/1406 (PDF ) Sigmabus: Binding Sigmas in Circuits for Fast Curve Operations George Kadianakis, Mary Maller, Andrija Novakovic
2023/1405 (PDF ) Lattice-based Succinct Arguments from Vanishing Polynomials Valerio Cini, Russell W. F. Lai, Giulio Malavolta
2023/1404 (PDF ) (Verifiable) Delay Functions from Lucas Sequences Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Tomáš Krňák
2023/1403 (PDF ) Searching for ELFs in the Cryptographic Forest Marc Fischlin, Felix Rohrbach
2023/1402 (PDF ) Fully Homomorphic Encryption: A Mathematical Introduction Sara Logsdon
2023/1401 (PDF ) On the Multi-User Security of LWE-based NIKE Roman Langrehr
2023/1400 (PDF ) Efficient Updatable Public-Key Encryption from Lattices Calvin Abou Haidar, Alain Passelègue, Damien Stehlé
2023/1399 (PDF ) The supersingular Endomorphism Ring and One Endomorphism problems are equivalent Aurel Page, Benjamin Wesolowski
2023/1398 (PDF ) To attest or not to attest, this is the question – Provable attestation in FIDO2 Nina Bindel, Nicolas Gama, Sandra Guasch, Eyal Ronen
2023/1397 (PDF ) Algebraic Attacks on Round-Reduced RAIN and Full AIM-III Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, Hongrui Cui
2023/1396 (PDF ) Accelerating Isogeny Walks for VDF Evaluation David Jacquemin, Anisha Mukherjee, Ahmet Can Mert, Sujoy Sinha Roy
2023/1395 (PDF ) Generic SCARE: reverse engineering without knowing the algorithm nor the machine Ronan Lashermes, Hélène Le Bouder
2023/1394 (PDF ) Incrementally Verifiable Computation via Rate-1 Batch Arguments Omer Paneth, Rafael Pass
2023/1393 (PDF ) OpenVoting: Recoverability from Failures in Dual Voting Prashant Agrawal, Kabir Tomer, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Sharma, Subhashis Banerjee
2023/1392 (PDF ) Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng
2023/1391 (PDF ) More Insight on Deep Learning-aided Cryptanalysis Zhenzhen Bao, Jinyu Lu, Yiran Yao, Liu Zhang
2023/1390 (PDF ) Comparse: Provably Secure Formats for Cryptographic Protocols Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan
2023/1389 (PDF ) Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces Dario Fiore, Dimitris Kolonelos, Paola de Perthuis
2023/1388 (PDF ) Sigma Protocols from Verifiable Secret Sharing and Their Applications Min Zhang, Yu Chen, Chuanzhou Yao, Zhichao Wang
2023/1387 (PDF ) Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu
2023/1386 (PDF ) Improving Privacy of Anonymous Proof-of-Stake Protocols Shichen Wu, Zhiying Song, Puwen Wei, Peng Tang, Quan Yuan
2023/1385 (PDF ) WhatsUpp with Sender Keys? Analysis, Improvements and Security Proofs David Balbás, Daniel Collins, Phillip Gajland
2023/1384 (PDF ) Application of Mordell-Weil lattices with large kissing numbers to acceleration of multi-scalar multiplication on elliptic curves Dmitrii Koshelev
2023/1383 (PDF ) Registered ABE via Predicate Encodings Ziqi Zhu, Kai Zhang, Junqing Gong, Haifeng Qian
2023/1382 (PDF ) HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
2023/1381 (PDF ) Sometimes You Can’t Distribute Random-Oracle-Based Proofs Jack Doerner, Yashvanth Kondi, Leah Namisa Rosenbloom
2023/1380 (PDF ) Tighter Security for Generic Authenticated Key Exchange in the QROM Jiaxin Pan, Benedikt Wagner, Runzhi Zeng
2023/1379 (PDF ) GLEVIAN and VIGORNIAN: Robust beyond-birthday AEAD modes Peter Campbell
2023/1378 (PDF ) Advisor-Verifier-Prover Games and the Hardness of Information Theoretic Cryptography Benny Applebaum, Oded Nir
2023/1377 (PDF ) Janus: Fast Privacy-Preserving Data Provenance For TLS Jan Lauinger, Jens Ernstberger, Andreas Finkenzeller, Sebastian Steinhorst
2023/1376 (PDF ) Bootstrapping Homomorphic Encryption via Functional Encryption Nir bitansky, Tomer Solomon
2023/1375 (PDF ) DeepCover DS28C36: A Hardware Vulnerability Identification and Exploitation Using T-Test and Double Laser Fault Injection Karim M. Abdellatif, Olivier Hériveaux
2023/1374 (PDF ) On Weighted-Sum Orthogonal Latin Squares and Secret Sharing Koji Nuida, Tomoko Adachi
2023/1373 (PDF ) Reframing and Extending the Random Probing Expandibility to Make Probing-Secure Compilers Tolerate a Constant Noise Giuseppe Manzoni
2023/1372 (PDF ) Cryptographic Key Exchange: An Innovation Outlook Gideon Samid
2023/1371 (PDF ) Oracle Recording for Non-Uniform Random Oracles, and its Applications Minki Hhan, Aaram Yun
2023/1370 (PDF ) Ideal-SVP is Hard for Small-Norm Uniform Prime Ideals Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé, Benjamin Wesolowski
2023/1369 (PDF ) Ramp hyper-invertible matrices and their applications to MPC protocols Hongqing Liu, Chaoping Xing, Yanjiang Yang, Chen Yuan
2023/1368 (PDF ) Towards post-quantum secure PAKE - A tight security proof for OCAKE in the BPR model Nouri Alnahawi, Kathrin Hövelmanns, Andreas Hülsing, Silvia Ritsch, Alexander Wiesmaier
2023/1367 (PDF ) Practical Constructions for Single Input Functionality against a Dishonest Majority Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2023/1366 (PDF ) Compact Frequency Estimators in Adversarial Environments Sam A. Markelon, Mia Filić, Thomas Shrimpton
2023/1365 (PDF ) On The Black-Box Complexity of Correlation Intractability Nico Döttling, Tamer Mour
2023/1364 (PDF ) Convex Consensus with Asynchronous Fallback Andrei Constantinescu, Diana Ghinea, Roger Wattenhofer, Floris Westermann
2023/1363 (PDF ) Amortized NISC over $\mathbb{Z}_{2^k}$ from RMFE Fuchun Lin, Chaoping Xing, Yizhou Yao, Chen Yuan
2023/1362 (PDF ) Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols David Fifield
2023/1361 (PDF ) Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, Bart Preneel
2023/1360 (PDF ) Payment Splitting in Lightning Network as a Mitigation Against Balance Discovery Attacks Gijs van Dam
2023/1359 (PDF ) Automated Meet-in-the-Middle Attack Goes to Feistel Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang
2023/1358 (PDF ) The Locality of Memory Checking Weijie Wang, Yujie Lu, Charalampos Papamanthou, Fan Zhang
2023/1357 (PDF ) Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication Koustabh Ghosh, Parisa Amiri Eliasi, Joan Daemen
2023/1356 (PDF ) Small Private Key Attack Against a Family of RSA-like Cryptosystems George Teseleanu, Paul Cotan
2023/1355 (PDF ) Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, Xiaolei Dong
2023/1354 (PDF ) Privacy Preserving Feature Selection for Sparse Linear Regression Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini
2023/1353 (PDF ) Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, Mingsheng Wang
2023/1352 (PDF ) ACE-HoT: Accelerating an extreme amount of symmetric Cipher Evaluations for High-Order avalanche Tests Emanuele Bellini, Juan Grados, Mohamed Rachidi, Nitin Satpute, Joan Daemen, Solane Elhirch
2023/1351 (PDF ) Bicameral and Auditably Private Signatures Khoa Nguyen, Partha Sarathi Roy, Willy Susilo, Yanhong Xu
2023/1350 (PDF ) On the Security of KZG Commitment for VSS Atsuki Momose, Sourav Das, Ling Ren
2023/1349 (PDF ) Communication Lower Bounds of Key-Agreement Protocols via Density Increment Arguments Mi-Ying (Miryam) Huang, Xinyu Mao, Guangxu Yang, Jiapeng Zhang
2023/1348 (PDF ) Adaptively Secure (Aggregatable) PVSS and Application to Distributed Randomness Beacons Renas Bacho, Julian Loss
2023/1347 (PDF ) Decentralised Repeated Modular Squaring Service Revisited: Attack and Mitigation Aydin Abadi
2023/1346 (PDF ) Street Rep: A Privacy-Preserving Reputation Aggregation System Christophe Hauser, Shirin Nilizadeh, Yan Shoshitaishvili, Ni Trieu, Srivatsan Ravi, Christopher Kruegel, Giovanni Vigna
2023/1345 (PDF ) Experimenting with Zero-Knowledge Proofs of Training Sanjam Garg, Aarushi Goel, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Guru-Vamsi Policharla, Mingyuan Wang
2023/1344 (PDF ) Analyzing the Real-World Security of the Algorand Blockchain Fabrice Benhamouda, Erica Blum, Jonathan Katz, Derek Leung, Julian Loss, Tal Rabin
2023/1343 (PDF ) Universally Composable Auditable Surveillance Valerie Fetzer, Michael Klooß, Jörn Müller-Quade, Markus Raiber, Andy Rupp
2023/1342 (PDF ) Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing David Balbás, Dario Fiore, Maria Isabel González Vasco, Damien Robissout, Claudio Soriente
2023/1341 (PDF ) Combined Private Circuits - Combined Security Refurbished Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert
2023/1340 (PDF ) Methods for Masking CRYSTALS-Kyber Against Side-Channel Attacks Sıla ÖZEREN, Oğuz YAYLA
2023/1339 (PDF ) FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains Aniket Kate, Easwar Vivek Mangipudi, Siva Mardana, Pratyay Mukherjee
2023/1338 (PDF ) Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, Ari Juels
2023/1337 (PDF ) SoK: Public Key Encryption with Openings Carlo Brunetta, Hans Heum, Martijn Stam
2023/1336 (PDF ) Riggs: Decentralized Sealed-Bid Auctions Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad Wahby, Joseph Bonneau, David Mazières
2023/1335 (PDF ) Antrag: Annular NTRU Trapdoor Generation Thomas Espitau, Thi Thu Quyen Nguyen, Chao Sun, Mehdi Tibouchi, Alexandre Wallet
2023/1334 (PDF ) A Generic Construction of Tightly Secure Password-based Authenticated Key Exchange Jiaxin Pan, Runzhi Zeng
2023/1333 (PDF ) Neutrosophic Boolean Function and Rejection Sampling in Post Quantum Cryptography Shashi Kant Pandey
2023/1332 (PDF ) Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem Harry Eldridge, Gabrielle Beck, Matthew Green, Nadia Heninger, Abhishek Jain
2023/1331 (PDF ) Pantheon: Private Retrieval from Public Key-Value Store Ishtiyaque Ahmad, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta
2023/1330 (PDF ) Notes on Small Private Key Attacks on Common Prime RSA Mengce Zheng
2023/1329 (PDF ) Layered Symbolic Security Analysis in DY$^\star$ Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Kuesters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann, Tim Würtele
2023/1328 (PDF ) Optimizing HE operations via Level-aware Key-switching Framework Intak Hwang, Jinyeong Seo, Yongsoo Song
2023/1327 (PDF ) Fine-Grained Secure Attribute-Based Encryption Yuyu Wang, Jiaxin Pan, Yu Chen
2023/1326 (PDF ) Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, Dawu Gu
2023/1325 (PDF ) The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard Florian Helmschmidt, Pedram Hosseyni, Ralf Kuesters, Klaas Pruiksma, Clara Waldmann, Tim Würtele
2023/1324 (PDF ) Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE Yunxiao Zhou, Shengli Liu, Shuai Han, Haibin Zhang
2023/1323 (PDF ) MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks Thomas Chamelot, Damien Couroussé, Karine Heydemann
2023/1322 (PDF ) Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge Samuel Dittmer, Karim Eldefrawy, Stéphane Graham-Lengrand, Steve Lu, Rafail Ostrovsky, Vitor Pereira
2023/1321 (PDF ) Generic Constructions of Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes Jiaxin Pan, Benedikt Wagner, Runzhi Zeng
2023/1320 (PDF ) Practical Privacy-Preserving Machine Learning using Fully Homomorphic Encryption Michael Brand, Gaëtan Pradel
2023/1319 (PDF ) On the Black-Box Separation Between Ring Signatures and Public Key Encryptions Kyosuke Yamashita, Keisuke Hara
2023/1318 (PDF ) Two-Round Threshold Lattice-Based Signatures from Threshold Homomorphic Encryption Kamil Doruk Gur, Jonathan Katz, Tjerand Silde
2023/1317 (PDF ) Pisces: Private and Compliable Cryptocurrency Exchange Ya-Nan Li, Tian Qiu, Qiang Tang
2023/1316 (PDF ) Communication Lower Bounds for Cryptographic Broadcast Protocols Erica Blum, Elette Boyle, Ran Cohen, Chen-Da Liu-Zhang
2023/1315 (PDF ) LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures Erkan Tairi, Pedro Moreno-Sanchez, Clara Schneidewind
2023/1314 (PDF ) Cryptanalysis of HALFLOOP Block Ciphers: Destroying HALFLOOP-24 Gregor Leander, Shahram Rasoolzadeh, Lukas Stennes
2023/1313 (PDF ) Hashing into quadratic residues modulo a safe prime composite Sietse Ringers
2023/1312 (PDF ) Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang
2023/1311 (PDF ) Are continuous stop-and-go mixnets provably secure? Debajyoti Das, Claudia Diaz, Aggelos Kiayias, Thomas Zacharias
2023/1310 (PDF ) FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay
2023/1309 (PDF ) A Lattice-based Publish-Subscribe Communication Protocol using Accelerated Homomorphic Encryption Primitives Anes Abdennebi, Erkay Savaş
2023/1308 (PDF ) How to Recover a Cryptographic Secret From the Cloud David Adei, Chris Orsini, Alessandra Scafuro, Tanner Verber
2023/1307 (PDF ) Constant-Round Private Decision Tree Evaluation for Secret Shared Data Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, Kazunari Tozawa
2023/1306 (PDF ) Single-query Quantum Hidden Shift Attacks Xavier Bonnetain, André Schrottenloher
2023/1305 (PDF ) About “$k$-bit security” of MACs based on hash function Streebog Vitaly Kiryukhin
2023/1304 (PDF ) Homomorphic polynomial evaluation using Galois structure and applications to BFV bootstrapping Hiroki Okada, Rachel Player, Simon Pohmann
2023/1303 (PDF ) On security aspects of CRISP Vitaly Kiryukhin
2023/1302 (PDF ) Revisiting the Differential Meet-In-The-Middle Cryptanalysis Ling Song, Qianqian Yang, Huimin Liu
2023/1301 (PDF ) Short Paper: Accountable Safety Implies Finality Joachim Neu, Ertem Nusret Tas, David Tse
2023/1300 (PDF ) Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix’ Core Martin R. Albrecht, Benjamin Dowling, Daniel Jones
2023/1299 (PDF ) A New RSA Variant Based on Elliptic Curves Maher Boudabra, Abderrahmane Nitaj
2023/1298 (PDF ) NEV: Faster and Smaller NTRU Encryption using Vector Decoding Jiang Zhang, Dengguo Feng, Di Yan
2023/1297 (PDF ) Entropic Quasigroup Based Secret Agreement Using Large Order Automorphisms Daniel Nager
2023/1296 (PDF ) A note on ``blockchain-assisted authentication and key agreement scheme for fog-based smart grid'' Zhengjun Cao, Lihua Liu
2023/1295 (PDF ) Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks Yuqing Zhao, Chun Guo, Weijia Wang
2023/1294 (PDF ) PrivMail: A Privacy-Preserving Framework for Secure Emails Gowri R Chandran, Raine Nieminen, Thomas Schneider, Ajith Suresh
2023/1293 (PDF ) Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era María Isabel González Vasco, Delaram Kahrobaei, Eilidh McKemmie
2023/1292 (PDF ) Enhancing Data Security: A Study of Grain Cipher Encryption using Deep Learning Techniques Payal, Pooja, Girish Mishra
2023/1291 (PDF ) On the Invalidity of LV16/Lin17 Obfuscation Schemes Revisited Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong
2023/1290 (PDF ) Comparative Analysis of ResNet and DenseNet for Differential Cryptanalysis of SPECK 32/64 Lightweight Block Cipher Ayan Sajwan, Girish Mishra
2023/1289 (PDF ) Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations Carmen Wabartha, Julian Liedtke, Nicolas Huber, Daniel Rausch, Ralf Kuesters
2023/1288 (PDF ) An erf Analog for Discrete Gaussian Sampling Nicolas Gama, Anand Kumar Narayanan, Ryder LiuLin, Dongze Yue
2023/1287 (PDF ) To extend or not to extend: Agile Masking Instructions for PQC Markus Krausz, Georg Land, Florian Stolz, Dennis Naujoks, Jan Richter-Brockmann, Tim Güneysu, Lucie Kogelheide
2023/1286 (PDF ) Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory Xiaoyang Dong, Shun Li, Phuong Pham, Guoyan Zhang
2023/1285 (PDF ) Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns Sujaya Maiyya, Sharath Vemula, Divyakant Agrawal, Amr El Abbadi, Florian Kerschbaum
2023/1284 (PDF ) Improving logarithmic derivative lookups using GKR Shahar Papini, Ulrich Haböck
2023/1283 (PDF ) A Univariate Attack against the Limited-Data Instance of Ciminion Augustin Bariant
2023/1282 (PDF ) Proof-Carrying Data from Multi-folding Schemes Zibo Zhou, Zongyang Zhang, Zhiyu Zhang, Jin Dong
2023/1281 (PDF ) Leveraging Machine Learning for Bidding Strategies in Miner Extractable Value (MEV) Auctions Christoffer Raun, Benjamin Estermann, Liyi Zhou, Kaihua Qin, Roger Wattenhofer, Arthur Gervais, Ye Wang
2023/1280 (PDF ) Quantum Security of TNT Shuping Mao, Zhiyu Zhang, Lei Hu, Luying Li, Peng Wang
2023/1279 (PDF ) General Non-interactive Quantum Commitments Are Compatible with Quantum Rewinding Jun Yan
2023/1278 (PDF ) Compositional Formal Verification of Zero-Knowledge Circuits Alessandro Coglio, Eric McCarthy, Eric Smith, Collin Chin, Pranav Gaddamadugu, Michel Dellepere
2023/1277 (PDF ) Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption Anaïs Barthoulot, Olivier Blazy, Sébastien Canard
2023/1276 (PDF ) Witness Authenticating NIZKs and Applications Hanwen Feng, Qiang Tang
2023/1275 (PDF ) Post-Quantum Asynchronous Remote Key Generation for FIDO2 Account Recovery Jacqueline Brendel, Sebastian Clermont, Marc Fischlin
2023/1274 (PDF ) ACABELLA: Automated (Crypt)analysis of Attribute-Based Encryption Leveraging Linear Algebra Antonio de la Piedra, Marloes Venema, Greg Alpár
2023/1273 (PDF ) Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees Peter Gaži, Aggelos Kiayias, Alexander Russell
2023/1272 (PDF ) Tight Security of TNT and Beyond: Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm Ashwin Jha, Mustafa Khairallah, Mridul Nandi, Abishanka Saha
2023/1271 (PDF ) Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs Tianyi Liu, Tiancheng Xie, Jiaheng Zhang, Dawn Song, Yupeng Zhang
2023/1270 (PDF ) Computational Wiretap Coding from Indistinguishability Obfuscation Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry
2023/1269 (PDF ) SIGMA: Secure GPT Inference with Function Secret Sharing Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, Rahul Sharma
2023/1268 (PDF ) Finding Orientations of Supersingular Elliptic Curves and Quaternion Orders Sarah Arpin, James Clements, Pierrick Dartois, Jonathan Komada Eriksen, Péter Kutas, Benjamin Wesolowski
2023/1267 (PDF ) Whipping the MAYO Signature Scheme using Hardware Platforms Florian Hirner, Michael Streibl, Florian Krieger, Ahmet Can Mert, Sujoy Sinha Roy
2023/1266 (PDF ) Automatic Preimage Attack Framework on \ascon Using a Linearize-and-Guess Approach Huina Li, Le He, Shiyao Chen, Jian Guo, Weidong Qiu
2023/1265 (PDF ) Key-Agreement with Perfect Completeness from Random Oracles Noam Mazor
2023/1264 (PDF ) An optimization of the addition gate count in Plonkish circuits Steve Thakur
2023/1263 (PDF ) Quantum security analysis of Wave Johanna Loyer
2023/1262 (PDF ) Phoenixx: Linear consensus with random sampling David Chaum, Bernardo Cardoso, William Carter, Mario Yaksetig, Baltasar Aroso
2023/1261 (PDF ) Faster constant-time evaluation of the Kronecker symbol with application to elliptic curve hashing Diego F. Aranha, Benjamin Salling Hvass, Bas Spitters, Mehdi Tibouchi
2023/1260 (PDF ) Public-Key Encryption from Average Hard NP Language Hongda Li, Peifang Ni, Yao Zan
2023/1259 (PDF ) Nonlinear computations on FinTracer tags Michael Brand, Tania Churchill, Carsten Friedrich
2023/1258 (PDF ) Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting Tianyao Gu, Yilei Wang, Afonso Tinoco, Bingnan Chen, Ke Yi, Elaine Shi
2023/1257 (PDF ) Batchman and Robin: Batched and Non-batched Branching for Interactive ZK Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam
2023/1256 (PDF ) On Soundness Notions for Interactive Oracle Proofs Alexander R. Block, Albert Garreta, Pratyush Ranjan Tiwari, Michał Zając
2023/1255 (PDF ) A flexible Snark via the monomial basis Steve Thakur
2023/1254 (PDF ) LaKey: Efficient Lattice-Based Distributed PRFs Enable Scalable Distributed Key Management Matthias Geihs, Hart Montgomery
2023/1253 (PDF ) Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions Aggelos Kiayias, Nikos Leonardos, Yu Shen
2023/1252 (PDF ) Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger
2023/1251 (PDF ) Verifiable random function from the Deuring correspondence and higher dimensional isogenies Antonin Leroux
2023/1250 (PDF ) Revealable Functional Commitments: How to Partially Reveal a Secret Function Bharath Namboothiry
2023/1249 (PDF ) On the Black-Box Impossibility of Multi-Designated Verifiers Signature Schemes from Ring Signature Schemes Kyosuke Yamashita, Keisuke Hara
2023/1248 (PDF ) A Note on ``Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation'' Zhengjun Cao, Lihua Liu
2023/1247 (PDF ) Representations of Group Actions and their Applications in Cryptography Giuseppe D'Alconzo, Antonio J. Di Scala
2023/1246 (PDF ) Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao
2023/1245 (PDF ) Probabilistic Related-Key Statistical Saturation Cryptanalysis Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang
2023/1244 (PDF ) HERMES: Efficient Ring Packing using MLWE Ciphertexts and Application to Transciphering Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Jai Hyun Park, Damien Stehlé
2023/1243 (PDF ) Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements Cas Cremers, Eyal Ronen, Mang Zhao
2023/1242 (PDF ) Cascading Four Round LRW1 is Beyond Birthday Bound Secure Nilanjan Datta, Shreya Dey, Avijit Dutta, Sougata Mandal
2023/1241 (PDF ) Post-Quantum Single Secret Leader Election (SSLE) From Publicly Re-randomizable Commitments Dan Boneh, Aditi Partap, Lior Rotem
2023/1240 (PDF ) $\mathsf{FREPack}$: Improved SNARK Frontend for Highly Repetitive Computations Sriram Sridhar, Yi-Nuo Zhang
2023/1239 (PDF ) CSI-Otter: Isogeny-based (Partially) Blind Signatures from the Class Group Action with a Twist Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, Ling Qin
2023/1238 (PDF ) On the Independence Heuristic in the Dual Attack Andreas Wiemers, Kaveh Bashiri
2023/1237 (PDF ) More Balanced Polynomials: Cube Attacks on 810- and 825-Round Trivium with Practical Complexities Hao Lei, Jiahui He, Kai Hu, Meiqin Wang
2023/1236 (PDF ) Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks Sajin Sasy, Aaron Johnson, Ian Goldberg
2023/1235 (PDF ) LOL: A Highly Flexible Framework for Designing Stream Ciphers Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian
2023/1234 (PDF ) Practical Key-Extraction Attacks in Leading MPC Wallets Nikolaos Makriyannis, Oren Yomtov, Arik Galansky
2023/1233 (PDF ) Tight Security of TNT: Reinforcing Khairallah's Birthday-bound Attack Ashwin Jha, Mridul Nandi, Abishanka Saha
2023/1232 (PDF ) Privacy-Preserving Outsourced Certificate Validation Tarek Galal, Anja Lehmann
2023/1231 (PDF ) Redundancy and equality test in the PMNS, application to Elliptic Curve Diffie–Hellman Fangan Yssouf Dosso, Alexandre Berzati, Nadia El Mrabet, Julien Proy
2023/1230 (PDF ) Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model Shuai Han, Shengli Liu, Zhedong Wang, Dawu Gu
2023/1229 (PDF ) Two Remarks on Torsion-Point Attacks in Isogeny-Based Cryptography Francesco Sica
2023/1228 (PDF ) Snowblind: A Threshold Blind Signature in Pairing-Free Groups Elizabeth Crites, Chelsea Komlo, Mary Maller, Stefano Tessaro, Chenzhi Zhu
2023/1227 (PDF ) Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications Kosei Sakamoto, Ryoma Ito, Takanori Isobe
2023/1226 (PDF ) SoK: Privacy-Preserving Smart Contract Huayi Qi, Minghui Xu, Dongxiao Yu, Xiuzhen Cheng
2023/1225 (PDF ) One-Message Secure Reductions: On the Cost of Converting Correlations Yuval Ishai, Mahimna Kelkar, Varun Narayanan, Liav Zafar
2023/1224 (PDF ) Theoretical analysis of decoding failure rate of non-binary QC-MDPC codes Kirill Vedenev, Yury Kosolapov
2023/1223 (PDF ) Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes Johannes Mono, Kamil Kluczniak, Tim Güneysu
2023/1222 (PDF ) Pay Less for Your Privacy: Towards Cost-Effective On-Chain Mixers Zhipeng Wang, Marko Cirkovic, Duc V. Le, William Knottenbelt, Christian Cachin
2023/1221 (PDF ) Non-distributable key-sharing protocol with particular emphasis on the Internet of Things Mario Mastriani
2023/1220 (PDF ) Advances in Reed-Solomon Code-Based Masking and Application to ML-KEM Pierre-Augustin Berthet, Yoan Rougeolle, Cédric Tavernier, Laurent Sauvage
2023/1219 (PDF ) A Note on “Secure Quantized Training for Deep Learning” Marcel Keller, Ke Sun
2023/1218 (PDF ) Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery Nicolas Mohnblatt, Alberto Sonnino, Kobi Gurkan, Philipp Jovanovic
2023/1217 (PDF ) Jolt: SNARKs for Virtual Machines via Lookups Arasu Arun, Srinath Setty, Justin Thaler
2023/1216 (PDF ) Unlocking the lookup singularity with Lasso Srinath Setty, Justin Thaler, Riad Wahby
2023/1215 (PDF ) Authentica: A Secure Authentication Mechanism using a Software-defined Unclonable Function Ripon Patgiri, Laiphrakpam Dolendro Singh
2023/1214 (PDF ) Verifiable Verification in Cryptographic Protocols Marc Fischlin, Felix Günther
2023/1213 (PDF ) Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu
2023/1212 (PDF ) CLRW1$^{3}$ is not Secure Beyond the Birthday Bound: Breaking TNT with ${O(2^{n/2})}$ queries Mustafa Khairallah
2023/1211 (PDF ) Optimal Flexible Consensus and its Application to Ethereum Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse
2023/1210 (PDF ) Decentralized Finance (DeFi): A Survey Erya Jiang, Bo Qin, Qin Wang, Zhipeng Wang, Qianhong Wu, Jian Weng, Xinyu Li, Chenyang Wang, Yuhang Ding, Yanran Zhang
2023/1209 (PDF ) Infinite families of minimal binary codes via Krawtchouk polynomials Xiaoni Du, René Rodríguez, Hao Wu
2023/1208 (PDF ) Mutator Sets and their Application to Scalable Privacy Alan Szepieniec, Thorkil Værge
2023/1207 (PDF ) DeFi Auditing: Mechanisms, Effectiveness, and User Perceptions Ding Feng, Rupert Hitsch, Kaihua Qin, Arthur Gervais, Roger Wattenhofer, Yaxing Yao, Ye Wang
2023/1205 (PDF ) On the security of REDOG Tanja Lange, Alex Pellegrini, Alberto Ravagnani
2023/1204 (PDF ) On Fully-Secure Honest Majority MPC without $n^2$ Round Overhead Daniel Escudero, Serge Fehr
2023/1203 (PDF ) Collaborative Privacy-Preserving Analysis of Oncological Data using Multiparty Homomorphic Encryption Ravit Geva, Alexander Gusev, Yuriy Polyakov, Lior Liram, Oded Rosolio, Andreea Alexandru, Nicholas Genise, Marcelo Blatt, Zohar Duchin, Barliz Waissengrin, Dan Mirelman, Felix Bukstein, Deborah T. Blumenthal, Ido Wolf, Sharon Pelles-Avraham, Tali Schaffer, Lee A. Lavi, Daniele Micciancio, Vinod Vaikuntanathan, Ahmad Al Badawi, Shafi Goldwasser
2023/1202 (PDF ) Extension of Shannon's theory of ciphers based on Latin rectangles Karel BURDA
2023/1201 (PDF ) Privacy-preserving edit distance computation using secret-sharing two-party computation Hernán Darío Vanegas Madrigal, Daniel Cabarcas Jaramillo, Diego F. Aranha
2023/1200 (PDF ) Shining Light on the Shadow: Full-round Practical Distinguisher for Lightweight Block Cipher Shadow Sunyeop Kim, Myoungsu Shin, Seonkyu Kim, Hanbeom Shin, Insung Kim, Donggeun Kwon, Dongjae Lee, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
2023/1199 (PDF ) RSA Blind Signatures with Public Metadata Ghous Amjad, Kevin Yeo, Moti Yung
2023/1198 (PDF ) A Methodology to Achieve Provable Side-Channel Security in Real-World Implementations Sonia Belaïd, Gaëtan Cassiers, Camille Mutschler, Matthieu Rivain, Thomas Roche, François-Xavier Standaert, Abdul Rahman Taleb
2023/1197 (PDF ) Towards a Quantum-resistant Weak Verifiable Delay Function Thomas Decru, Luciano Maino, Antonio Sanso
2023/1196 (PDF ) Verifiable Secret Sharing Simplified Sourav Das, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, Ling Ren
2023/1195 (PDF ) PicoEMP: A Low-Cost EMFI Platform Compared to BBI and Voltage Fault Injection using TDC and External VCC Measurements Colin O'Flynn
2023/1194 (PDF ) HI-Kyber: A novel high-performance implementation scheme of Kyber based on GPU Xinyi Ji, Jiankuo Dong, Pinchang Zhang, Deng Tonggui, Hua Jiafeng, Fu Xiao
2023/1193 (PDF ) An Anonymous Authenticated Key Agreement Protocol Secure in Partially Trusted Registration Server Scenario for Multi-Server Architectures Inam ul Haq, Jian Wang, Youwen Zhu, Sheharyar Nasir
2023/1192 (PDF ) CycleFold: Folding-scheme-based recursive arguments over a cycle of elliptic curves Abhiram Kothapalli, Srinath Setty
2023/1191 (PDF ) Attribute-Based Multi-Input FE (and more) for Attribute-Weighted Sums Shweta Agrawal, Junichi Tomida, Anshu Yadav
2023/1190 (PDF ) REED: Chiplet-Based Accelerator for Fully Homomorphic Encryption Aikata Aikata, Ahmet Can Mert, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy
2023/1189 (PDF ) PAP: A Privacy-Preserving Authentication Scheme with Anonymous Payment for V2G Networks Xiaohan Yue, Xue Bi, Haibo Yang, Shi Bai, Yuan He
2023/1188 (PDF ) A Novel CCA Attack for NTRU+ KEM Joohee Lee, Minju Lee, Hansol Ryu, Jaehui Park
2023/1187 (PDF ) Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
2023/1186 (PDF ) Faster cellular automata cryptosystems with neighbor sequences Kittiphop Phalakarn, Athasit Surarerks
2023/1185 (PDF ) SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More Nan Wang, Sid Chi-Kin Chau, Dongxi Liu
2023/1184 (PDF ) STAMP-Single Trace Attack on M-LWE Pointwise Multiplication in Kyber Bolin Yang, Prasanna Ravi, Fan Zhang, Ao Shen, Shivam Bhasin
2023/1183 (PDF ) Scalable Time-Lock Puzzles Aydin Abadi, Dan Ristea, Artem Grigor, Steven J. Murdoch
2023/1182 (PDF ) Long Paper: Provable Secure Parallel Gadgets Francesco Berti, Sebastian Faust, Maximilian Orlt
2023/1181 (PDF ) A Relational Credential System from $q$-SDH-based Graph Signatures Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross
2023/1180 (PDF ) Exploring Blockchain Technology through a Modular Lens: A Survey Minghui Xu, Yihao Guo, Chunchi Liu, Qin Hu, Dongxiao Yu, Zehui Xiong, Dusit Niyato, Xiuzhen Cheng
2023/1179 (PDF ) A Systematic Study of Data Augmentation for Protected AES Implementations Huimin Li, Guilherme Perin
2023/1178 (PDF ) Towards Open Scan for the Open-source Hardware Leonid Azriel, Avi Mendelson
2023/1177 (PDF ) DualDory: Logarithmic-Verifier Linkable Ring Signatures through Preprocessing Jonathan Bootle, Kaoutar Elkhiyaoui, Julia Hesse, Yacov Manevich
2023/1176 (PDF ) Composable Oblivious Pseudo-Random Functions via Garbled Circuits Sebastian Faller, Astrid Ottenhues, Johannes Ottenhues
2023/1175 (PDF ) Fast batched asynchronous distributed key generation Jens Groth, Victor Shoup
2023/1174 (PDF ) zkDL: Efficient Zero-Knowledge Proofs of Deep Learning Training Haochen Sun, Tonghe Bai, Jason Li, Hongyang Zhang
2023/1173 (PDF ) Round-Optimal Black-Box MPC in the Plain Model Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2023/1172 (PDF ) Communication and Round Efficient Parallel Broadcast Protocols Nibesh Shrestha, Ittai Abraham, Kartik Nayak
2023/1171 (PDF ) Arena: Multi-leader Synchronous Byzantine Fault Tolerance Hao Lu, Jian Liu, Kui Ren
2023/1170 (PDF ) Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH Navid Alamati, Hart Montgomery, Sikhar Patranabis, Pratik Sarkar
2023/1169 (PDF ) Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA Kittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura
2023/1168 (PDF ) Evolving Homomorphic Secret Sharing for Hierarchical Access Structures Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura
2023/1167 (PDF ) Constructive $t$-secure Homomorphic Secret Sharing for Low Degree Polynomials Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura
2023/1166 (PDF ) Malicious Secure, Structure-Aware Private Set Intersection Gayathri Garimella, Mike Rosulek, Jaspal Singh
2023/1165 (PDF ) On the Security of Universal Re-Encryption Fabio Banfi, Ueli Maurer, Silvia Ritsch
2023/1164 (PDF ) Swiper: a new paradigm for efficient weighted distributed protocols Andrei Tonkikh, Luciano Freitas
2023/1163 (PDF ) Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking Approach Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo
2023/1162 (PDF ) Reduction of Search-LWE Problem to Integer Programming Problem Masaaki Shirase
2023/1161 (PDF ) Benchmarking the Setup of Updatable zk-SNARKs Karim Baghery, Axel Mertens, Mahdi Sedaghat
2023/1160 (PDF ) Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test Yan Yan, Arnab Roy, Elisabeth Oswald
2023/1159 (PDF ) Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction Huan Zou, Yuting Xiao, Rui Zhang
2023/1158 (PDF ) Improved Polynomial Secret-Sharing Schemes Amos Beimel, Oriol Farràs, Or Lasri
2023/1157 (PDF ) Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery Melanie Jauch, Varun Maram
2023/1156 (PDF ) Instant Zero Knowledge Proof of Reserve Trevor Conley, Nilsso Diaz, Diego Espada, Alvin Kuruvilla, Stenton Mayone, Xiang Fu
2023/1155 (PDF ) Secure Function Extensions to Additively Homomorphic Cryptosystems Mounika Pratapa, Aleksander Essex
2023/1154 (PDF ) Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy Preserving Ride-Sharing Application Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Biplab Sikdar
2023/1153 (PDF ) A Multivariate Based Provably Secure Certificateless Signature Scheme with Applications to the Internet of Medical Things Vikas Srivastava, Sumit Kumar Debnath
2023/1152 (PDF ) Haze and Daze: Compliant Privacy Mixers Stanislaw Baranski, Maya Dotan, Ayelet Lotem, Margarita Vald
2023/1151 (PDF ) High-speed Implementation of AIM symmetric primitives within AIMer digital signature Minwoo Lee, Kyungbae Jang, Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Hwajeong Seo
2023/1150 (PDF ) Optimized Quantum Circuit for Quantum Security Strength Analysis of Argon2 Gyeongju Song, Siwoo Eum, Hyeokdong Kwon, Minjoo Sim, Minwoo Lee, Hwajeong Seo
2023/1149 (PDF ) Analysis of Parallel Implementation of Pilsung Block Cipher On Graphics Processing Unit Siwoo Eum, Hyunjun Kim, Minho Song, Hwajeong Seo
2023/1148 (PDF ) Post Quantum Fuzzy Stealth Signatures and Applications Sihang Pu, Sri AravindaKrishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik
2023/1147 (PDF ) CipherGPT: Secure Two-Party GPT Inference Xiaoyang Hou, Jian Liu, Jingyu Li, Yuhan Li, Wen-jie Lu, Cheng Hong, Kui Ren
2023/1146 (PDF ) Structured Encryption for Indirect Addressing Ruth Ng, Alexander Hoover, David Cash, Eileen Ee
2023/1145 (PDF ) Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs. Chris Brzuska, Geoffroy Couteau, Christoph Egger, Pihla Karanko, Pierre Meyer
2023/1144 (PDF ) Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing Saba Eskandarian
2023/1143 (PDF ) Combined Fault and Leakage Resilience: Composability, Constructions and Compiler Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Maximilian Orlt, Okan Seker
2023/1142 (PDF ) On the Efficiency of Generic, Quantum Cryptographic Constructions Keita Xagawa
2023/1141 (PDF ) Composable Gadgets with Reused Fresh Masks $-$ First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks David Knichel, Amir Moradi
2023/1140 (PDF ) Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic Curves Harashta Tatimma Larasati, Howon Kim
2023/1139 (PDF ) Optimal Load-Balanced Scalable Distributed Agreement Yuval Gelles, Ilan Komargodski
2023/1138 (PDF ) Invisible Warning Line: Efficient and Generic Regulation for Anonymous Cryptocurrencies Rui Gao
2023/1137 (PDF ) A New Sieving Approach for Solving the HNP with One Bit of Nonce by Using Built-in Modulo Arithmetic Yao Sun, Shuai Chang
2023/1136 (PDF ) Secure Multiparty Computation with Identifiable Abort from Vindicating Release Ran Cohen, Jack Doerner, Yashvanth Kondi, abhi shelat
2023/1135 (PDF ) HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme Oussama Sayari, Soundes Marzougui, Thomas Aulbach, Juliane Krämer, Jean-Pierre Seifert
2023/1134 (PDF ) Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi, François-Xavier Standaert
2023/1133 (PDF ) Algebraic Attacks on RAIN and AIM Using Equivalent Representations Fukang Liu, Mohammad Mahzoun, Morten Øygarden, Willi Meier
2023/1132 (PDF ) Cryptanalysis and Improvement of a Flexible and Lightweight Group Authentication Scheme Ali Rezapour, Zahra Ahmadian
2023/1131 (PDF ) One vector to rule them all: Key recovery from one vector in UOV schemes Pierre Pébereau
2023/1130 (PDF ) Asynchronous Agreement on a Core Set in Constant Expected Time and More Efficient Asynchronous VSS and MPC Ittai Abraham, Gilad Asharov, Arpita Patra, Gilad Stern
2023/1129 (PDF ) All You Need Is Fault: Zero-Value Attacks on AES and a New $\lambda$-Detection M&M Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama
2023/1128 (PDF ) Leaking Secrets in Homomorphic Encryption with Side-Channel Attacks Furkan Aydin, Aydin Aysu
2023/1127 (PDF ) TariScript: Bringing dynamic scripting to Mimblewimble Cayle Sharrock, Schalk van Heerden
2023/1126 (PDF ) Non-Observable Quantum Random Oracle Model Navid Alamati, Varun Maram, Daniel Masny
2023/1125 (PDF ) Finding short integer solutions when the modulus is small Léo Ducas, Thomas Espitau, Eamonn W. Postlethwaite
2023/1124 (PDF ) An Algebraic Approach to Circulant Column Parity Mixers Robert Christian Subroto
2023/1123 (PDF ) On the Cost of Post-Compromise Security in Concurrent Continuous Group-Key Agreement Benedikt Auerbach, Miguel Cueto Noval, Guillermo Pascual-Perez, Krzysztof Pietrzak
2023/1122 (PDF ) Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption Xinle Cao, Jian Liu, Yongsheng Shen, Xiaohua Ye, Kui Ren
2023/1121 (PDF ) SoK: Public Randomness Alireza Kavousi, Zhipeng Wang, Philipp Jovanovic
2023/1120 (PDF ) TVA: A multi-party computation system for secure and expressive time series analytics Muhammad Faisal, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Mayank Varia
2023/1119 (PDF ) Outsider-Anonymous Broadcast Encryption with Keyword Search: Generic Construction, CCA Security, and with Sublinear Ciphertexts Keita Emura, Kaisei Kajita, Go Ohtake
2023/1118 (PDF ) Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System Robertas Maleckas, Kenneth G. Paterson, Martin R. Albrecht
2023/1117 (PDF ) Mask Compression: High-Order Masking on Memory-Constrained Devices Markku-Juhani O. Saarinen, Mélissa Rossi
2023/1116 (PDF ) Applying system of equations to factor semiprime numbers Yonatan Zilpa
2023/1115 (PDF ) Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM Yibin Yang, David Heath
2023/1114 (PDF ) On iterated punctured Grover Cezary Pilaszewicz, Marian Margraf
2023/1113 (PDF ) Breaking the Hutton 2 challenge Thomas Kaeding
2023/1112 (PDF ) Tornado Vote: Anonymous Blockchain-Based Voting Robert Muth, Florian Tschorsch
2023/1111 (PDF ) Optimized stream-cipher-based transciphering by means of functional-bootstrapping Adda-Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey
2023/1110 (PDF ) Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis Lichao Wu, Amir Ali-pour, Azade Rezaeezade, Guilherme Perin, Stjepan Picek
2023/1109 (PDF ) An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek
2023/1108 (PDF ) It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis (Extended Version) Sengim Karayalcin, Marina Krcek, Lichao Wu, Stjepan Picek, Guilherme Perin
2023/1107 (PDF ) Verifiable Timed Proxy Signatures and Multi-signatures Duygu Ozden, Oğuz Yayla
2023/1106 (PDF ) ProtoGalaxy: Efficient ProtoStar-style folding of multiple instances Liam Eagen, Ariel Gabizon
2023/1105 (PDF ) MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust Tung Le, Thang Hoang
2023/1104 (PDF ) An Efficient Unicode encoded in UTF-16 text cryptography based on the AES algorithm Sushmit Jahan Rose, Umut Ozkaya, Sabina Yasmin, Suraiya Jabin, Robiul Hasan, Elias Kabir
2023/1103 (PDF ) Practical Large-Scale Proof-of-Stake Asynchronous Total-Order Broadcast Orestis Alpos, Christian Cachin, Simon Holmgaard Kamp, Jesper Buus Nielsen
2023/1102 (PDF ) Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg
2023/1101 (PDF ) $\mathcal{S}_0$-equivalent classes, a new direction to find better weightwise perfectly balanced functions, and more Agnese Gini, Pierrick Méaux
2023/1100 (PDF ) Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis Marina Krček, Lichao Wu, Guilherme Perin, Stjepan Picek
2023/1099 (PDF ) A Digital Identity in the Hands of Swiss Citizens Jean-Luc Beuchat, Valon Rexhepi
2023/1098 (PDF ) $\textsf{Asterisk}$: Super-fast MPC with a Friend Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, Divya Ravi
2023/1097 (PDF ) Quantum Money from Abelian Group Actions Mark Zhandry
2023/1096 (PDF ) White-Box Block Cipher Implementation Based on LS-Design Hatice Kübra Güner, Ceyda Mangır, Oğuz Yayla
2023/1095 (PDF ) Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham
2023/1094 (PDF ) Round Optimal Fully Secure Distributed Key Generation Jonathan Katz
2023/1093 (PDF ) Properties of Lattice Isomorphism as a Cryptographic Group Action Benjamin Benčina, Alessandro Budroni, Jesús-Javier Chi-Domínguez, Mukul Kulkarni
2023/1092 (PDF ) The wrong use of FESTA trapdoor functions leads to an adaptive attack Tomoki Moriya, Hiroshi Onuki
2023/1091 (PDF ) On Derandomizing Yao's Weak-to-Strong OWF Construction Chris Brzuska, Geoffroy Couteau, Pihla Karanko, Felix Rohrbach
2023/1090 (PDF ) Bulletproofs With Stochastic Equation Sets Michael Brand, Benoit Poletti
2023/1089 (PDF ) Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols Shichen Wu, Puwen Wei, Ren Zhang, Bowen Jiang
2023/1088 (PDF ) Building Hard Problems by Combining Easy Ones Riddhi Ghosal, Amit Sahai
2023/1087 (PDF ) Moving a Step of ChaCha in Syncopated Rhythm Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin
2023/1086 (PDF ) On One-way Functions and the Worst-case Hardness of Time-Bounded Kolmogorov Complexity Yanyi Liu, Rafael Pass
2023/1085 (PDF ) Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency Zehui Tang, Shengke Zeng, Tao Li, Shuai Cheng, Haoyu Zheng
2023/1084 (PDF ) A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber Yanning Ji, Elena Dubrova
2023/1083 (PDF ) Keyed Sum of Permutations: a simpler RP-based PRF Ferdinand Sibleyras, Yosuke Todo
2023/1082 (PDF ) Intmax2: A ZK-rollup with Minimal Onchain Data and Computation Costs Featuring Decentralized Aggregators Erik Rybakken, Leona Hioki, Mario Yaksetig, Denisa Diaconescu, František Silváši, Julian Sutherland
2023/1081 (PDF ) ARITHMETIZATION-ORIENTED APN FUNCTIONS Lilya Budaghyan, Mohit Pal
2023/1080 (PDF ) ACORN-QRE: Specification and Analysis of a Method of Generating Secure One-time Pads for Use in Encryption Roy S Wikramaratna
2023/1079 (PDF ) Foundations of Data Availability Sampling Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner
2023/1078 (PDF ) Bypassing Android isolation with fuel gauges: new risks with advanced power ICs Vincent Giraud, David Naccache
2023/1077 (PDF ) Taming Adaptivity in YOSO Protocols: The Modular Way Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov
2023/1076 (PDF ) Non-Interactive Threshold BBS+ From Pseudorandom Correlations Sebastian Faust, Carmit Hazay, David Kretzler, Leandro Rometsch, Benjamin Schlosser
2023/1075 (PDF ) Streebog as a Random Oracle Liliya Akhmetzyanova, Alexandra Babueva, Andrey Bozhko
2023/1074 (PDF ) From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium Mohamed ElGhamrawy, Melissa Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, Christine van Vredendaal
2023/1073 (PDF ) The Reality of Backdoored S-Boxes - An Eye Opener Shah Fahd, Mehreen Afzal, Waseem Iqbal, Dawood Shah, Ijaz Khalid
2023/1072 (PDF ) Simple and Practical Amortized Sublinear Private Information Retrieval using Dummy Subsets Ling Ren, Muhammad Haris Mughees, Sun I
2023/1071 (PDF ) Fiat-Shamir Security of FRI and Related SNARKs Alexander R. Block, Albert Garreta, Jonathan Katz, Justin Thaler, Pratyush Ranjan Tiwari, Michał Zając
2023/1070 (PDF ) Unlinkable Policy-Compliant Signatures for Compliant and Decentralized Anonymous Payments Christian Badertscher, Mahdi Sedaghat, Hendrik Waldner
2023/1069 (PDF ) DuckyZip: Provably Honest Global Linking Service Nadim Kobeissi
2023/1068 (PDF ) Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici
2023/1067 (PDF ) How to Compile Polynomial IOP into Simulation-Extractable SNARKs: A Modular Approach Markulf Kohlweiss, Mahak Pancholi, Akira Takahashi
2023/1066 (PDF ) Efficient Arguments and Proofs for Batch Arithmetic Circuit Satisfiability Jieyi Long
2023/1065 (PDF ) A Note on ``A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment'' Zhengjun Cao, Lihua Liu
2023/1064 (PDF ) Decoding Quasi-Cyclic codes is NP-complete Ernesto Dominguez Fiallo, Pablo Freyre Arrozarena, Luis Ramiro Piñeiro
2023/1063 (PDF ) DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More Sofía Celi, Alex Davidson, Hamed Haddadi, Gonçalo Pestana, Joe Rowell
2023/1062 (PDF ) IOPs with Inverse Polynomial Soundness Error Gal Arnon, Alessandro Chiesa, Eylon Yogev
2023/1061 (PDF ) BlindPerm: Efficient MEV Mitigation with an Encrypted Mempool and Permutation Alireza Kavousi, Duc V. Le, Philipp Jovanovic, George Danezis
2023/1060 (PDF ) Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing Pengfei Wang, Xiangyu Su, Mario Larangeira, Keisuke Tanaka
2023/1059 (PDF ) Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning Xiangyu Su, Mario Larangeira, Keisuke Tanaka
2023/1058 (PDF ) Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM Brent Waters, Daniel Wichs
2023/1057 (PDF ) ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for $\mathbb{Z}_{2^k}$ Lennart Braun, Cyprien Delpech de Saint Guilhem, Robin Jadoul, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy
2023/1056 (PDF ) DIDO: Data Provenance from Restricted TLS 1.3 Websites Kwan Yin Chan, Handong Cui, Tsz Hon Yuen
2023/1055 (PDF ) OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion Trevor Yap, Shivam Bhasin, Stjepan Picek
2023/1054 (PDF ) Quantum Complexity for Discrete Logarithms and Related Problems Minki Hhan, Takashi Yamakawa, Aaram Yun
2023/1053 (PDF ) ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet Alexander Bienstock, Paul Rösler, Yi Tang
2023/1051 (PDF ) Automated Analysis of Halo2 Circuits Fatemeh Heidari Soureshjani, Mathias Hall-Andersen, MohammadMahdi Jahanara, Jeffrey Kam, Jan Gorzny, Mohsen Ahmadvand
2023/1050 (PDF ) SNARGs for Monotone Policy Batch NP Zvika Brakerski, Maya Farber Brodsky, Yael Tauman Kalai, Alex Lombardi, Omer Paneth
2023/1049 (PDF ) Public-Key Encryption, Local Pseudorandom Generators, and the Low-Degree Method Andrej Bogdanov, Pravesh Kothari, Alon Rosen
2023/1048 (PDF ) An Algorithm for Persistent Homology Computation Using Homomorphic Encryption Dominic Gold, Koray Karabina, Francis C. Motta
2023/1047 (PDF ) Private Coin Verifiable Delay Function Peter Chvojka
2023/1046 (PDF ) Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT based Implementations of Lattice-based Cryptography Tolun Tosun, Erkay Savas
2023/1045 (PDF ) XHash: Efficient STARK-friendly Hash Function Tomer Ashur, Amit Singh Bhati, Al Kindi, Mohammad Mahzoun, Léo Perrin
2023/1044 (PDF ) AKE Zoo: 100 two-party protocols (to be continued) Evgeny Alekseev, Alexandra Babueva, Olga Zazykina
2023/1043 (PDF ) An Analysis of Requirements and Privacy Threats in Mobile Data Donations Leonie Reichert
2023/1042 (PDF ) A Side-Channel Attack on a Bitsliced Higher-Order Masked CRYSTALS-Kyber Implementation Ruize Wang, Martin Brisfors, Elena Dubrova
2023/1041 (PDF ) Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance Yevgeniy Dodis, Niels Ferguson, Eli Goldin, Peter Hall, Krzysztof Pietrzak
2023/1040 (PDF ) E2E near-standard and practical authenticated transciphering Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, Omri Soceanu
2023/1039 (PDF ) SoK: Privacy-Preserving Signatures Alishah Chator, Matthew Green, Pratyush Ranjan Tiwari
2023/1038 (PDF ) PQC Cloudization: Rapid Prototyping of Scalable NTT/INTT Architecture to Accelerate Kyber Mojtaba Bisheh-Niasar, Daniel Lo, Anjana Parthasarathy, Blake Pelton, Bharat Pillilli, Bryan Kelly
2023/1036 (PDF ) Reduction of the secret key length in the perfect cipher by data compression and randomisation Boris Ryabko
2023/1035 (PDF ) Short Signatures from Regular Syndrome Decoding in the Head Eliana Carozza, Geoffroy Couteau, Antoine Joux
2023/1034 (PDF ) Transaction Fairness in Blockchains, Revisited Rujia Li, Xuanwei Hu, Qin Wang, Sisi Duan, Qi Wang
2023/1033 (PDF ) OWF Candidates Based on: Xors, Error Detection Codes, Permutations, Polynomials, Interaction and Nesting Paweł Cyprys, Shlomi Dolev, Oded Margalit
2023/1032 (PDF ) Zero Knowledge Virtual Machine step by step Tim Dokchitser, Alexandr Bulkin
2023/1031 (PDF ) Security Analysis of a Color Image Encryption Scheme Based on a Fractional‑Order Hyperchaotic System George Teseleanu
2023/1030 (PDF ) Depth-Optimized Implementation of ASCON Quantum Circuit Yujin Oh, Kyungbae Jang, Anubhab Baksi, Hwajeong Seo
2023/1029 (PDF ) hodlCoin: A Financial Game Zahnentferner, Luca D'Angelo
2023/1027 (PDF ) State Machines across Isomorphic Layer 2 Ledgers Maxim Jourenko, Mario Larangeira
2023/1026 (PDF ) Implementation and performance of a RLWE-based commitment scheme and ZKPoK for its linear and multiplicative relations Ramiro Martínez, Paz Morillo, Sergi Rovira
2023/1025 (PDF ) Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
2023/1024 (PDF ) Timed Secret Sharing Alireza Kavousi, Aydin Abadi, Philipp Jovanovic
2023/1023 (PDF ) An STP-based model toward designing S-boxes with good cryptographic properties Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan, Meiqin Wang
2023/1022 (PDF ) Zombie: Middleboxes that Don’t Snoop Collin Zhang, Zachary DeStefano, Arasu Arun, Joseph Bonneau, Paul Grubbs, Michael Walfish
2023/1021 (PDF ) EDEN - a practical, SNARK-friendly combinator VM and ISA Logan Allen, Brian Klatt, Philip Quirk, Yaseen Shaikh
2023/1020 (PDF ) At Last! A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey
2023/1019 (PDF ) The many faces of Schnorr: a toolkit for the modular design of threshold Schnorr signatures Victor Shoup
2023/1018 (PDF ) SDFA: Statistical-Differential Fault Attack on Linear Structured SBox-Based Ciphers Amit Jana, Anup Kumar Kundu, Goutam Paul
2023/1017 (PDF ) Stronger Lower Bounds for Leakage-Resilient Secret Sharing Charlotte Hoffmann, Mark Simkin
2023/1016 (PDF ) Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig
2023/1015 (PDF ) Fast Unbalanced Private Computing on (Labeled) Set Intersection with Cardinality Binbin Tu, Xiangling Zhang, Yujie Bai, Yu Chen
2023/1014 (PDF ) An Efficient Data-Independent Priority Queue and its Application to Dark Pools Sahar Mazloom, Benjamin E. Diamond, Antigoni Polychroniadou, Tucker Balch
2023/1013 (PDF ) Best of Both Worlds: Revisiting the Spymasters Double Agent Problem Anasuya Acharya, Carmit Hazay, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
2023/1012 (PDF ) Arithmetic Sketching Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
2023/1011 (PDF ) A Framework for Statistically Sender Private OT with Optimal Rate Pedro Branco, Nico Döttling, Akshayaram Srinivasan
2023/1010 (PDF ) End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets Gauri Gupta, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran, Rijurekha Sen
2023/1009 (PDF ) PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption Yongha Son, Jinhyuck Jeong
2023/1008 (PDF ) Cryptanalysis of rank-metric schemes based on distorted Gabidulin codes Pierre Briaud, Pierre Loidreau
2023/1007 (PDF ) On Provable White-Box Security in the Strong Incompressibility Model Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai
2023/1006 (PDF ) Reusable Secure Computation in the Plain Model Vipul Goyal, Akshayaram Srinivasan, Mingyuan Wang
2023/1005 (PDF ) BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks Yuting Zuo, Li Xu, Yuexin Zhang, Chenbin Zhao, Zhaozhe Kang
2023/1004 (PDF ) On the Non-Malleability of ECVRF in the Algebraic Group Model Willow Barkan-Vered, Franklin Harding, Jonathan Keller, Jiayu Xu
2023/1003 (PDF ) Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited Ran Cohen, Pouyan Forghani, Juan Garay, Rutvik Patel, Vassilis Zikas
2023/1002 (PDF ) Oblivious Transfer from Rerandomizable PKE Shuaishuai Li, Cong Zhang, Dongdai Lin
2023/1001 (PDF ) Oblivious Accumulators Foteini Baldimtsi, Ioanna Karantaidou, Srinivasan Raghuraman
2023/1000 (PDF ) Private Timestamps and Selective Verification of Notarised Data on a Blockchain Enrique Larraia, Owen Vaughan
2023/999 (PDF ) Enforcing Data Geolocation Policies in Public Cloud using Trusted Computing Syed Zair Abbas, Mudassar Aslam
2023/998 (PDF ) Tiresias: Large Scale, Maliciously Secure Threshold Paillier Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan C. Scaly, Yuval Spiizer, Avishay Yanai
2023/997 (PDF ) An extension of Overbeck's attack with an application to cryptanalysis of Twisted Gabidulin-based schemes. Alain Couvreur, Ilaria Zappatore
2023/996 (PDF ) Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures From VOLE-in-the-Head Carsten Baum, Lennart Braun, Cyprien Delpech de Saint Guilhem, Michael Klooß, Emmanuela Orsini, Lawrence Roy, Peter Scholl
2023/995 (PDF ) Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields Gustavo Banegas, Valerie Gilchrist, Anaëlle Le Dévéhat, Benjamin Smith
2023/994 (PDF ) A proposal for quantum GRS algorithm and the cryptanalysis for ROLLO and RQC Asuka Wakasugi, Mitsuru Tada
2023/993 (PDF ) A note on ``a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function'' Zhengjun Cao, Lihua Liu
2023/992 (PDF ) VSS from Distributed ZK Proofs and Applications Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
2023/991 (PDF ) Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu, Xiao Wang
2023/990 (PDF ) Privacy Preserving Records Sharing using Blockchain and Format Preserving Encryption Sai Sandilya Konduru, Vishal Saraswat
2023/989 (PDF ) Detection of Password Reuse and Credential Stuffing: A Server-side Approach Sai Sandilya Konduru, Sweta Mishra
2023/988 (PDF ) On the Hardness of Scheme-Switching Between SIMD FHE Schemes Karim Eldefrawy, Nicholas Genise, Nathan Manohar
2023/987 (PDF ) Fuzzification-based Feature Selection for Enhanced Website Content Encryption Mike Wa Nkongolo
2023/986 (PDF ) Efficient Private Multiset ID Protocols Cong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin
2023/985 (PDF ) On the Two-sided Permutation Inversion Problem Gorjan Alagic, Chen Bai, Alexander Poremba, Kaiyan Shi
2023/984 (PDF ) Generating Supersingular Elliptic Curves over $\mathbb{F}_p$ with Unknown Endomorphism Ring Youcef Mokrani, David Jao
2023/983 (PDF ) Secure Range-Searching Using Copy-And-Recurse Eyal Kushnir, Guy Moshkowich, Hayim Shaul
2023/982 (PDF ) On the 32-Character Zodiac Cipher Floe Foxon
2023/981 (PDF ) Practical and Efficient FHE-based MPC Nigel P. Smart
2023/980 (PDF ) Trivial Transciphering With Trivium and TFHE Thibault Balenbois, Jean-Baptiste Orfila, Nigel P. Smart
2023/979 (PDF ) New Secret Keys for Enhanced Performance in (T)FHE Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Adeline Roux-Langlois, Samuel Tap
2023/978 (PDF ) $\textsf{PAE}$: Towards More Efficient and BBB-secure AE From a Single Public Permutation Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Eik List
2023/977 (PDF ) Timed Commitments Revisited Miguel Ambrona, Marc Beunardeau, Raphaël R. Toledo
2023/976 (PDF ) Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction Kyoichi Asano, Yohei Watanabe
2023/975 (PDF ) Design of Blockchain-Based Many-to-Many Anonymous Data Sharing Scheme Esra Günsay, Burcu E. Karakaş, N. Gamze Orhon Kılıç, Oğuz Yayla
2023/974 (PDF ) MuxProofs: Succinct Arguments for Machine Computation from Vector Lookups Zijing Di, Lucas Xia, Wilson Nguyen, Nirvan Tyagi
2023/973 (PDF ) Demystifying Just-in-Time (JIT) Liquidity Attacks on Uniswap V3 Xihan Xiong, Zhipeng Wang, William Knottenbelt, Michael Huth
2023/972 (PDF ) Security of Hybrid Key Establishment using Concatenation Adam Petcher, Matthew Campagna
2023/971 (PDF ) Defining and Controlling Information Leakage in US Equities Trading Arthur Americo, Allison Bishop, Paul Cesaretti, Garrison Grogan, Adam McKoy, Robert Moss, Lisa Oakley, Marcel Ribeiro, Mohammad Shokri
2023/970 (PDF ) A Note on Non-Interactive Zero-Knowledge from CDH Geoffroy Couteau, Abhishek Jain, Zhengzhong Jin, Willy Quach
2023/969 (PDF ) Revisiting the Nova Proof System on a Cycle of Curves Wilson Nguyen, Dan Boneh, Srinath Setty
2023/968 (PDF ) SALSA VERDE: a machine learning attack on Learning with Errors with sparse small secrets Cathy Yuanchen Li, Emily Wenger, Zeyuan Allen-Zhu, Francois Charton, Kristin Lauter
2023/967 (PDF ) SoK: Data Sovereignty Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song
2023/966 (PDF ) eLIMInate: a Leakage-focused ISE for Masked Implementation Hao Cheng, Daniel Page, Weijia Wang
2023/965 (PDF ) Post-Quantum Secure Over-the-Air Update of Automotive Systems Joppe W. Bos, Alexander Dima, Alexander Kiening, Joost Renes
2023/964 (PDF ) Lightweight Authentication of Web Data via Garble-Then-Prove Xiang Xie, Kang Yang, Xiao Wang, Yu Yu
2023/963 (PDF ) An invariant of the round function of QARMAv2-64 Tim Beyne
2023/962 (PDF ) Access structures induced by polymatroids with extreme rank function Mieczysław Kula
2023/961 (PDF ) Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup Matteo Campanelli, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler
2023/960 (PDF ) Beyond-Full-Round Integral Distinguisher of NIST Lightweight Cryptography Competition Finalist TinyJAMBU Akram Khalesi, Zahra Ahmadian
2023/959 (PDF ) Randomness Recoverable Secret Sharing Schemes Mohammad Hajiabadi, Shahram Khazaei, Behzad Vahdani
2023/958 (PDF ) Faster TFHE Bootstrapping with Block Binary Keys Changmin Lee, Seonhong Min, Jinyeong Seo, Yongsoo Song
2023/957 (PDF ) BASS: Boolean Automorphisms Signature Scheme Dima Grigoriev, Ilia Ilmer, Alexey Ovchinnikov, Vladimir Shpilrain
2023/956 (PDF ) Speculative Denial-of-Service Attacks in Ethereum Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, Arthur Gervais
2023/955 (PDF ) Succinct Computational Secret Sharing Benny Applebaum, Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Tianren Liu, Vinod Vaikuntanathan
2023/954 (PDF ) Zombies and Ghosts: Optimal Byzantine Agreement in the Presence of Omission Faults Julian Loss, Gilad Stern
2023/953 (PDF ) Towards Generic MPC Compilers via Variable Instruction Set Architectures (VISAs) Yibin Yang, Stanislav Peceny, David Heath, Vladimir Kolesnikov
2023/952 (PDF ) Limits on Adaptive Security for Attribute-Based Encryption Zvika Brakerski, Stav Medina
2023/951 (PDF ) Latency-First Smart Contract: Overclock the Blockchain for a while Huayi Qi, Minghui Xu, Xiuzhen Cheng, Weifeng Lyu
2023/950 (PDF ) A new approach based on quadratic forms to attack the McEliece cryptosystem Alain Couvreur, Rocco Mora, Jean-Pierre Tillich
2023/948 (PDF ) Compact Circuits for Efficient Mobius Transform Subhadeep Banik, Francesco Regazzoni
2023/947 (PDF ) Concrete Security from Worst-Case to Average-Case Lattice Reductions Joel Gärtner
2023/945 (PDF ) One-Way Functions vs. TFNP: Simpler and Improved Lukáš Folwarczný, Mika Göös, Pavel Hubáček, Gilbert Maystre, Weiqiang Yuan
2023/944 (PDF ) BALoo: First and Efficient Countermeasure dedicated to Persistent Fault Attacks Pierre-Antoine Tissot, Lilian Bossuet, Vincent Grosso
2023/943 (PDF ) Correlated-Output Differential Privacy and Applications to Dark Pools James Hsin-yu Chiang, Bernardo David, Mariana Gama, Christian Janos Lebeda
2023/942 (PDF ) Proactive Secret Sharing with Constant Communication Brett Hemenway Falk, Daniel Noble, Tal Rabin
2023/941 (PDF ) Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE Shweta Agrawal, Melissa Rossi, Anshu Yadav, Shota Yamada
2023/940 (PDF ) CryptAttackTester: high-assurance attack analysis Daniel J. Bernstein, Tung Chou
2023/939 (PDF ) Speeding up elliptic computations for Ethereum Account Abstraction Renaud Dubois
2023/938 (PDF ) Musketeer: Incentive-Compatible Rebalancing for Payment Channel Networks Zeta Avarikioti, Stefan Schmid, Samarth Tiwari
2023/937 (PDF ) WESP: An encryption method that, as the key size increases, require an exponentially growing time to break Sam Widlund
2023/936 (PDF ) Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak Mohammad Vaziri, Vesselin Velichkov
2023/935 (PDF ) Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs (Extended Version) Vincent Meyers, Dennis R. E. Gnad, Nguyen Minh Dang, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori
2023/934 (PDF ) To Pass or Not to Pass: Privacy-Preserving Physical Access Control Jesús García-Rodríguez, Stephan Krenn, Daniel Slamanig
2023/933 (PDF ) More Efficient Lattice-Based Electronic Voting from NTRU Patrick Hough, Caroline Sandsbråten, Tjerand Silde
2023/932 (PDF ) On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model Abtin Afshar, Kai-Min Chung, Yao-Ching Hsieh, Yao-Ting Lin, Mohammad Mahmoody
2023/931 (PDF ) Compact Identity Based Encryption Based on n^{th} - Residuosity Assumption Sree Vivek S, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan
2023/930 (PDF ) Lattice-Based Succinct Arguments for NP with Polylogarithmic-Time Verification Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki
2023/929 (PDF ) The QARMAv2 Family of Tweakable Block Ciphers Roberto Avanzi, Subhadeep Banik, Orr Dunkelman, Maria Eichlseder, Shibam Ghosh, Marcel Nageler, Francesco Regazzoni
2023/928 (PDF ) On vectorial functions mapping strict affine subspaces of their domain into strict affine subspaces of their co-domain, and the strong D-property Claude Carlet, Enrico Piccione
2023/927 (PDF ) Collision Entropy Estimation in a One-Line Formula Alessandro Gecchele
2023/926 (PDF ) Analysis of the security of the PSSI problem and cryptanalysis of the Durandal signature scheme Nicolas Aragon, Victor Dyseryn, Philippe Gaborit
2023/925 (PDF ) Homomorphic Indistinguishability Obfuscation and its Applications Kaartik Bhushan, Venkata Koppula, Manoj Prabhakaran
2023/924 (PDF ) Generalized Initialization of the Duplex Construction Christoph Dobraunig, Bart Mennink
2023/923 (PDF ) Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED Ben Nassi, Etay Iluz, Or Cohen, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici
2023/922 (PDF ) mR$_{\text{LWE}}$-CP-ABE a revocable CP-ABE for Post-Quantum Cryptography Marco Cianfriglia, Elia Onofri, Marco Pedicini
2023/921 (PDF ) Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding Koji Nuida
2023/920 (PDF ) Beware Your Standard Cells! On Their Role in Static Power Side-Channel Attacks Jitendra Bhandari, Likhitha Mankali, Mohammed Nabeel, Ozgur Sinanoglu, Ramesh Karri, Johann Knechtel
2023/919 (PDF ) Threshold Private Set Intersection with Better Communication Complexity Satrajit Ghosh, Mark Simkin
2023/918 (PDF ) Invertible Bloom Lookup Tables with Less Memory and Randomness Nils Fleischhacker, Kasper Green Larsen, Maciej Obremski, Mark Simkin
2023/917 (PDF ) Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments Tohru Kohrita, Patrick Towa
2023/916 (PDF ) Unlinkability and Interoperability in Account-Based Universal Payment Channels Mohsen Minaei, Panagiotis Chatzigiannis, Shan Jin, Srinivasan Raghuraman, Ranjit Kumaresan, Mahdi Zamani, Pedro Moreno-Sanchez
2023/915 (PDF ) Attribute-based Single Sign-On: Secure, Private, and Efficient Tore Kasper Frederiksen, Julia Hesse, Bertram Poettering, Patrick Towa
2023/914 (PDF ) Limits in the Provable Security of ECDSA Signatures Dominik Hartmann, Eike Kiltz
2023/913 (PDF ) Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal John Preuß Mattsson
2023/912 (PDF ) Randomness of random in Cisco ASA Ryad Benadjila, Arnaud Ebalard
2023/911 (PDF ) Link Between the Differential Cryptanalysis and Linear Approximations over Finite Abelian Groups And Its Applications Zhongfeng Niu, Siwei Sun, Hailun Yan, Qi Wang
2023/910 (PDF ) Amortized Functional Bootstrapping in less than 7ms, with $\tilde{O}(1)$ polynomial multiplications Zeyu Liu, Yunhao Wang
2023/909 (PDF ) Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference Yun Li, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song
2023/908 (PDF ) A Hardware-Software Co-Design for the Discrete Gaussian Sampling of FALCON Digital Signature Emre Karabulut, Aydin Aysu
2023/907 (PDF ) Efficient Zero Knowledge for Regular Language Michael Raymond, Gillian Evers, Jan Ponti, Diya Krishnan, Xiang Fu
2023/906 (PDF ) Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions Hoeteck Wee
2023/905 (PDF ) $\mathsf{zkSaaS}$: Zero-Knowledge SNARKs as a Service Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, Sruthi Sekar
2023/904 (PDF ) Pseudorandom Strings from Pseudorandom Quantum States Prabhanjan Ananth, Yao-Ting Lin, Henry Yuen
2023/903 (PDF ) Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo
2023/902 (PDF ) SublonK: Sublinear Prover PlonK Arka Rai Choudhuri, Sanjam Garg, Aarushi Goel, Sruthi Sekar, Rohit Sinha
2023/901 (PDF ) Secure Multiparty Computation with Free Branching Aarushi Goel, Mathias Hall-Andersen, Aditya Hegde, Abhishek Jain
2023/900 (PDF ) What If Alice Wants Her Story Told? Anindya Bhandari, Allison Bishop
2023/899 (PDF ) Practical Schnorr Threshold Signatures Without the Algebraic Group Model Hien Chu, Paul Gerhart, Tim Ruffing, Dominique Schröder
2023/898 (PDF ) Spilling-Cascade: an Optimal PKE Combiner for KEM Hybridization Céline Chevalier, Guirec Lebrun, Ange Martinelli
2023/897 (PDF ) On the Impossibility of Algebraic NIZK In Pairing-Free Groups Emanuele Giunta
2023/896 (PDF ) Improved Gadgets for the High-Order Masking of Dilithium Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun
2023/895 (PDF ) ModHE: Modular Homomorphic Encryption Using Module Lattices: Potentials and Limitations Anisha Mukherjee, Aikata Aikata, Ahmet Can Mert, Yongwoo Lee, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy
2023/894 (PDF ) Differentially Private Selection from Secure Distributed Computing Ivan Damgård, Hannah Keller, Boel Nelson, Claudio Orlandi, Rasmus Pagh
2023/893 (PDF ) Diversity Algorithms for Laser Fault Injection Marina Krček, Thomas Ordas
2023/892 (PDF ) Suboptimality in DeFi Aviv Yaish, Maya Dotan, Kaihua Qin, Aviv Zohar, Arthur Gervais
2023/891 (PDF ) When is Slower Block Propagation More Profitable for Large Miners? Zhichun Lu, Ren Zhang
2023/890 (PDF ) Efficient Evaluation of Frequency Test for Overlapping Vectors Statistic Krzysztof MAŃK
2023/889 (PDF ) A note on ``LAKAF: lightweight authentication and key agreement framework for smart grid network'' Zhengjun Cao, Lihua Liu
2023/887 (PDF ) Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond Mingyao Shao, Yuejun Liu, Yongbin Zhou
2023/886 (PDF ) Reductions from module lattices to free module lattices, and application to dequantizing module-LLL Gabrielle De Micheli, Daniele Micciancio, Alice Pellet-Mary, Nam Tran
2023/885 (PDF ) Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling Kittiphon Phalakarn, Vorapong Suppakitpaisarn, Francisco Rodríguez-Henríquez, M. Anwar Hasan
2023/884 (PDF ) Near Collision Attack Against Grain v1 Subhadeep Banik, Daniel Collins, Willi Meier
2023/883 (PDF ) Prouff & Rivain’s Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model Loïc Masure, François-Xavier Standaert
2023/882 (PDF ) Expand-Convolute Codes for Pseudorandom Correlation Generators from LPN Srinivasan Raghuraman, Peter Rindal, Titouan Tanguy
2023/880 (PDF ) On Active Attack Detection in Messaging with Immediate Decryption Khashayar Barooti, Daniel Collins, Simone Colombo, Loı̈s Huguenin-Dumittan, Serge Vaudenay
2023/879 (PDF ) On cubic-like bent Boolean functions Claude Carlet, Irene Villa
2023/878 (PDF ) Introducing two Low-Latency Cipher Families: Sonic and SuperSonic Yanis Belkheyar, Joan Daemen, Christoph Dobraunig, Santosh Ghosh, Shahram Rasoolzadeh
2023/877 (PDF ) Public-Key Encryption with Quantum Keys Khashayar Barooti, Alex B. Grilo, Loïs Huguenin-Dumittan, Giulio Malavolta, Or Sattath, Quoc-Huy Vu, Michael Walter
2023/876 (PDF ) Circular Multiplicative Modular Exponentiation: A New Public Key Exchange Algorithm Michele Fabbrini
2023/875 (PDF ) The Power of Undirected Rewindings for Adaptive Security Dennis Hofheinz, Julia Kastner, Karen Klein
2023/874 (PDF ) Distributed Broadcast Encryption from Bilinear Groups Dimitris Kolonelos, Giulio Malavolta, Hoeteck Wee
2023/873 (PDF ) Digital signature schemes using non-square matrices or scrap automorphisms Jiale Chen, Dima Grigoriev, Vladimir Shpilrain
2023/872 (PDF ) Conjunctive Searchable Symmetric Encryption from Hard Lattices Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay
2023/871 (PDF ) Improved Multi-User Security Using the Squared-Ratio Method Yu Long Chen, Wonseok Choi, Changmin Lee
2023/870 (PDF ) Additive Randomized Encodings and Their Applications Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
2023/869 (PDF ) UniPlonk: Plonk with Universal Verifier Shumo Chu, Brandon H. Gomes, Francisco Hernandez Iglesias, Todd Norton, Duncan Tebbs
2023/868 (PDF ) Data Independent Order Policy Enforcement: Limitations and Solutions Sarisht Wadhwa, Luca Zanolini, Francesco D'Amato, Aditya Asgaonkar, Chengrui Fang, Fan Zhang, Kartik Nayak
2023/867 (PDF ) Security Analysis of Forward Secure Log Sealing in Journald Felix Dörre, Astrid Ottenhues
2023/866 (PDF ) Decoding LTFs in the Generic Group Model Dennis Hofheinz, Julia Kastner, Akin Ünal, Bogdan Ursu
2023/865 (PDF ) A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier
2023/864 (PDF ) Compact Selective Opening Security From LWE Dennis Hofheinz, Kristina Hostáková, Julia Kastner, Karen Klein, Akin Ünal
2023/862 (PDF ) Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model Jiangxia Ge, Tianshu Shan, Rui Xue
2023/861 (PDF ) When Messages are Keys: Is HMAC a dual-PRF? Matilda Backendal, Mihir Bellare, Felix Günther, Matteo Scarlata
2023/860 (PDF ) Security-Preserving Distributed Samplers: How to Generate any CRS in One Round without Random Oracles Damiano Abram, Brent Waters, Mark Zhandry
2023/859 (PDF ) Cutting the GRASS: Threshold GRoup Action Signature Schemes Michele Battagliola, Giacomo Borin, Alessio Meneghetti, Edoardo Persichetti
2023/858 (PDF ) Effective Pairings in Isogeny-based Cryptography Krijn Reijnders
2023/857 (PDF ) SoK: Vector OLE-Based Zero-Knowledge Protocols Carsten Baum, Samuel Dittmer, Peter Scholl, Xiao Wang
2023/856 (PDF ) The Query-Complexity of Preprocessing Attacks Ashrujit Ghoshal, Stefano Tessaro
2023/855 (PDF ) $\mathsf{Mercury}$: Constant-Round Protocols for Multi-Party Computation with Rationals Luke Harmon, Gaetan Delavignette
2023/854 (PDF ) On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation Kai Gellert, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager
2023/853 (PDF ) How to Bind Anonymous Credentials to Humans Julia Hesse, Nitin Singh, Alessandro Sorniotti
2023/852 (PDF ) Revisiting Oblivious Top-$k$ Selection with Applications to Secure $k$-NN Classification Kelong Cong, Robin Geelen, Jiayi Kang, Jeongeun Park
2023/851 (PDF ) Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN Alex Biryukov, Je Sen Teh, Aleksei Udovenko
2023/850 (PDF ) Revisiting the Constant-sum Winternitz One-time Signature with Applications to SPHINCS+ and XMSS Kaiyi Zhang, Hongrui Cui, Yu Yu
2023/849 (PDF ) Towards Topology-Hiding Computation from Oblivious Transfer Marshall Ball, Alexander Bienstock, Lisa Kohl, Pierre Meyer
2023/848 (PDF ) Extending Updatable Encryption: Public Key, Tighter Security and Signed Ciphertexts Chen Qian, Yao Jiang Galteland, Gareth T. Davies
2023/847 (PDF ) A New Formulation of the Linear Equivalence Problem and Shorter LESS Signatures Edoardo Persichetti, Paolo Santini
2023/846 (PDF ) Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency Giacomo Fenzi, Hossein Moghaddas, Ngoc Khanh Nguyen
2023/845 (PDF ) Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding Maxime Bombar, Geoffroy Couteau, Alain Couvreur, Clément Ducros
2023/844 (PDF ) Inferring Bivariate Polynomials for Homomorphic Encryption Application Diana Maimut, George Teseleanu
2023/843 (PDF ) Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol Gareth T. Davies, Sebastian Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horváth, Tibor Jager
2023/842 (PDF ) Advanced Composition Theorems for Differential Obliviousness Mingxun Zhou, Mengshi Zhao, T-H. Hubert Chan, Elaine Shi
2023/841 (PDF ) The curious case of the half-half Bitcoin ECDSA nonces Dylan Rowe, Joachim Breitner, Nadia Heninger
2023/840 (PDF ) Revisiting the Indifferentiability of the Sum of Permutations Aldo Gunsing, Ritam Bhaumik, Ashwin Jha, Bart Mennink, Yaobin Shen
2023/839 (PDF ) On Linear Communication Complexity for (Maximally) Fluid MPC Alexander Bienstock, Daniel Escudero, Antigoni Polychroniadou
2023/838 (PDF ) How to Recover a Secret with O(n) Additions Benny Applebaum, Oded Nir, Benny Pinkas
2023/837 (PDF ) Faster coercion-resistant e-voting by encrypted sorting Diego F. Aranha, Michele Battagliola, Lawrence Roy
2023/836 (PDF ) Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE Théophile Brézot, Paola de Perthuis, David Pointcheval
2023/835 (PDF ) Unifying Freedom and Separation for Tight Probing-Secure Composition Sonia Belaïd, Gaëtan Cassiers, Matthieu Rivain, Abdul Rahman Taleb
2023/834 (PDF ) Discrete Logarithm Factory Haetham AL ASWAD, Cécile PIERROT, Emmanuel THOMÉ
2023/833 (PDF ) Anonymous, Timed and Revocable Proxy Signatures Ghada Almashaqbeh, Anca Nitulescu
2023/832 (PDF ) Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications Guy Zyskind, Avishay Yanai, Alex "Sandy" Pentland
2023/831 (PDF ) Automated Generation of Masked Nonlinear Components: From Lookup Tables to Private Circuits Lixuan Wu, Yanhong Fan, Bart Preneel, Weijia Wang, Meiqin Wang
2023/830 (PDF ) HPPC: Hidden Product of Polynomial Composition Borja Gomez Rodriguez
2023/829 (PDF ) TGh: A TEE/GC Hybrid Enabling Confidential FaaS Platforms James Choncholas, Ketan Bhardwaj, Ada Gavrilovska
2023/828 (PDF ) Optimized Discrete Logarithm Computation for Faster Square Roots in Finite Fields Thomas Pornin
2023/827 (PDF ) On Concurrent Multi-Party Quantum Computation Vipul Goyal, Xiao Liang, Giulio Malavolta
2023/826 (PDF ) Ring/Module Learning with Errors under Linear Leakage -- Hardness and Applications Zhedong Wang, Qiqi Lai, Feng-Hao Liu
2023/825 (PDF ) Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC) Katerina Mitrokotsa, Sayantan Mukherjee, Jenit Tomy
2023/824 (PDF ) Reed-Solomon Codes over the Circle Group Ulrich Haböck, Daniel Lubarov, Jacqueline Nabaglo
2023/823 (PDF ) Lattice-based Authenticated Key Exchange with Tight Security Jiaxin Pan, Benedikt Wagner, Runzhi Zeng
2023/822 (PDF ) Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, Qingju Wang
2023/821 (PDF ) Securing IoT Devices with Fast and Energy Efficient Implementation of PRIDE and PRESENT Ciphers Vijay Dahiphale, Hrishikesh Raut, Gaurav Bansod, Devendra Dahiphale
2023/820 (PDF ) Network Agnostic MPC with Statistical Security Ananya Appan, Ashish Choudhury
2023/819 (PDF ) NNBits: Bit Profiling with a Deep Learning Ensemble Based Distinguisher Anna Hambitzer, David Gerault, Yun Ju Huang, Najwa Aaraj, Emanuele Bellini
2023/818 (PDF ) Generalized Special-Sound Interactive Proofs and their Knowledge Soundness Thomas Attema, Serge Fehr, Nicolas Resch
2023/817 (PDF ) Oblivious Transfer with Constant Computational Overhead Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
2023/816 (PDF ) Simplified Modeling of MITM Attacks for Block Ciphers: new (Quantum) Attacks André Schrottenloher, Marc Stevens
2023/815 (PDF ) Noah's Ark: Efficient Threshold-FHE Using Noise Flooding Morten Dahl, Daniel Demmler, Sarah El Kazdadi, Arthur Meyre, Jean-Baptiste Orfila, Dragos Rotaru, Nigel P. Smart, Samuel Tap, Michael Walter
2023/814 (PDF ) A Note on ``Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems'' Zhengjun Cao, Lihua Liu
2023/813 (PDF ) Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Cryptography Zachary Espiritu, Seny Kamara, Tarik Moataz
2023/812 (PDF ) How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More Cody Freitag, Brent Waters, David J. Wu
2023/811 (PDF ) Limits of Breach-Resistant and Snapshot-Oblivious RAMs Giuseppe Persiano, Kevin Yeo
2023/810 (PDF ) MAPLE: MArkov Process Leakage attacks on Encrypted Search Seny Kamara, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber
2023/809 (PDF ) Password-Based Credentials with Security against Server Compromise Dennis Dayanikli, Anja Lehmann
2023/808 (PDF ) Generic-Group Lower Bounds via Reductions Between Geometric-Search Problems: With and Without Preprocessing Benedikt Auerbach, Charlotte Hoffmann, Guillermo Pascual-Perez
2023/807 (PDF ) Ready to SQI? Safety First! Towards a constant-time implementation of isogeny-based signature, SQIsign David Jacquemin, Anisha Mukherjee, Péter Kutas, Sujoy SINHA ROY
2023/806 (PDF ) SNACKs for Proof-of-Space Blockchains Hamza Abusalah
2023/805 (PDF ) New Bounds on the Local Leakage Resilience of Shamir's Secret Sharing Scheme Ohad Klein, Ilan Komargodski
2023/804 (PDF ) Falkor: Federated Learning Secure Aggregation Powered by AES-CTR GPU Implementation Mariya Georgieva Belorgey, Sofia Dandjee, Nicolas Gama, Dimitar Jetchev, Dmitry Mikushin
2023/803 (PDF ) "Tesla Cryptography:" Powering Up Security with Other Than Mathematical Complexity Gideon Samid
2023/802 (PDF ) Constant-Round Arguments from One-Way Functions Noga Amit, Guy Rothblum
2023/801 (PDF ) We Are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve Charles Bouillaguet, Ambroise Fleury, Pierre-Alain Fouque, Paul Kirchner
2023/800 (PDF ) Vector Commitments With Proofs of Smallness: Short Range Proofs and More Benoit Libert
2023/799 (PDF ) Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim
2023/798 (PDF ) Generalized Hybrid Search and Applications Alexandru Cojocaru, Juan Garay, Fang Song
2023/797 (PDF ) Super-Quadratic Quantum Speed-Ups and Guessing Many Likely Keys Timo Glaser, Alexander May, Julian Nowakowski
2023/796 (PDF ) Generic Security of the Ascon Mode: On the Power of Key Blinding Charlotte Lefevre, Bart Mennink
2023/795 (PDF ) Bit-Security Preserving Hardness Amplification Shun Watanabe, Kenji Yasunaga
2023/794 (PDF ) Areion: Highly-Efficient Permutations and Its Applications (Extended Version) Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba
2023/793 (PDF ) Optimizations and Practicality of High-Security CSIDH Fabio Campos, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, Thom Wiggers
2023/792 (PDF ) On the Fujisaki-Okamoto transform: from Classical CCA Security to Quantum CCA Security Jiangxia Ge, Tianshu Shan, Rui Xue
2023/791 (PDF ) New SIDH Countermeasures for a More Efficient Key Exchange Andrea Basso, Tako Boris Fouotsa
2023/790 (PDF ) Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers Yaobin Shen, François-Xavier Standaert
2023/789 (PDF ) Where are the constants? New Insights On The Role of Round Constant Addition in The SymSum Distinguisher Sahiba Suryawanshi, Dhiman Saha
2023/787 (PDF ) Private Proof-of-Stake Blockchains using Differentially-private Stake Distortion Chenghong Wang, David Pujo, Kartik Nayak, Ashwin Machanavajjhala
2023/786 (PDF ) Blockchain Transaction Censorship: (In)secure and (In)efficient? Zhipeng Wang, Xihan Xiong, William J. Knottenbelt
2023/785 (PDF ) Generation of two ''independent'' points on an elliptic curve of $j$-invariant $\neq 0, 1728$ Dimitri Koshelev
2023/784 (PDF ) History-Free Sequential Aggregation of Hash-and-Sign Signatures Alessio Meneghetti, Edoardo Signorini
2023/783 (PDF ) Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings Andrea Di Giusto, Chiara Marcolla
2023/782 (PDF ) Coefficient Grouping for Complex Affine Layers Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier, Takanori Isobe
2023/781 (PDF ) $\mathsf{Skye}$: An Expanding PRF based Fast KDF and its Applications Amit Singh Bhati, Antonin Dufka, Elena Andreeva, Arnab Roy, Bart Preneel
2023/779 (PDF ) Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH Mingjie Chen, Muhammad Imran, Gábor Ivanyos, Péter Kutas, Antonin Leroux, Christophe Petit
2023/778 (PDF ) Bounded Verification for Finite-Field-Blasting (In a Compiler for Zero Knowledge Proofs) Alex Ozdemir, Riad S. Wahby, Fraser Brown, Clark Barrett
2023/777 (PDF ) Too Many Hints - When LLL Breaks LWE Alexander May, Julian Nowakowski
2023/776 (PDF ) Quantum Attacks on Type-1 Generalized Feistel Schemes Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao
2023/775 (PDF ) Exact Security Analysis of ASCON Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi
2023/774 (PDF ) Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain Yiming Li, Shengli Liu
2023/773 (PDF ) An update on Keccak performance on ARMv7-M Alexandre Adomnicai
2023/772 (PDF ) Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu
2023/771 (PDF ) Revisiting Key Decomposition Techniques for FHE: Simpler, Faster and More Generic Mariya Georgieva Belorgey, Sergiu Carpov, Nicolas Gama, Sandra Guasch, Dimitar Jetchev
2023/770 (PDF ) Towards compressed permutation oracles Dominique Unruh
2023/769 (PDF ) Brakedown's expander code Ulrich Haböck
2023/768 (PDF ) Owl: An Augmented Password-Authenticated Key Exchange Scheme Feng Hao, Samiran Bag, Liqun Chen, Paul C. van Oorschot
2023/767 (PDF ) LFHE: Fully Homomorphic Encryption with Bootstrapping Key Size Less than a Megabyte Andrey Kim, Yongwoo Lee, Maxim Deryabin, Jieun Eom, Rakyong Choi
2023/766 (PDF ) Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials Qiqi Lai, Chongshen Chen, Feng-Hao Liu, Anna Lysyanskaya, Zhedong Wang
2023/765 (PDF ) Threshold ECDSA in Three Rounds Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
2023/764 (PDF ) Subversion-Resilient Authenticated Encryption without Random Oracles Pascal Bemmann, Sebastian Berndt, Denis Diemert, Thomas Eisenbarth, Tibor Jager
2023/763 (PDF ) Undetectable Watermarks for Language Models Miranda Christ, Sam Gunn, Or Zamir
2023/762 (PDF ) How to Design Fair Protocols in the Multi-Blockchain Setting Sivanarayana Gaddam, Ranjit Kumaresan, Srinivasan Raghuraman, Rohit Sinha
2023/761 (PDF ) Nimble: Rollback Protection for Confidential Cloud Services (extended version) Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath Setty, Sudheesh Singanamalla
2023/760 (PDF ) Time to Bribe: Measuring Block Construction Market Anton Wahrstätter, Liyi Zhou, Kaihua Qin, Davor Svetinovic, Arthur Gervais
2023/759 (PDF ) Efficient TFHE Bootstrapping in the Multiparty Setting Jeongeun Park, Sergi Rovira
2023/758 (PDF ) Scaling Mobile Private Contact Discovery to Billions of Users Laura Hetz, Thomas Schneider, Christian Weinert
2023/757 (PDF ) A Note on ``On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System'' Zhengjun Cao, Lihua Liu
2023/756 (PDF ) SDitH in the QROM Carlos Aguilar-Melchor, Andreas Hülsing, David Joseph, Christian Majenz, Eyal Ronen, Dongze Yue
2023/755 (PDF ) The security of Kyber's FO-transform Manuel Barbosa, Andreas Hülsing
2023/754 (PDF ) Batch Proofs are Statistically Hiding Nir Bitansky, Chethan Kamath, Omer Paneth, Ron Rothblum, Prashant Nalini Vasudevan
2023/753 (PDF ) A Faster Software Implementation of SQISign Kaizhan Lin, Weize Wang, Zheng Xu, Chang-An Zhao
2023/752 (PDF ) Schnorr protocol in Jasmin José Bacelar Almeida, Denis Firsov, Tiago Oliveira, Dominique Unruh
2023/751 (PDF ) Scalable Agreement Protocols with Optimal Optimistic Efficiency Yuval Gelles, Ilan Komargodski
2023/750 (PDF ) BAKSHEESH: Similar Yet Different From GIFT Anubhab Baksi, Jakub Breier, Anupam Chattopadhyay, Tomáš Gerlich, Sylvain Guilley, Naina Gupta, Takanori Isobe, Arpan Jati, Petr Jedlicka, Hyunjun Kim, Fukang Liu, Zdeněk Martinásek, Kosei Sakamoto, Hwajeong Seo, Rentaro Shiba, Ritu Ranjan Shrivastwa
2023/749 (PDF ) Note on Subversion-Resilient Key Exchange Magnus Ringerud
2023/748 (PDF ) Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu
2023/747 (PDF ) Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications Masahito Ishizaka
2023/746 (PDF ) Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications Masahito Ishizaka, Kazuhide Fukushima
2023/745 (PDF ) PSI from ring-OLE Wutichai Chongchitmate, Yuval Ishai, Steve Lu, Rafail Ostrovsky
2023/744 (PDF ) On Extremal Algebraic Graphs and implementations of new cubic Multivariate Public Keys Vasyl Ustimenko, Tymoteusz Chojecki, Michal Klisowski
2023/743 (PDF ) On Sustainable Ring-based Anonymous Systems Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo
2023/742 (PDF ) Finding Desirable Substitution Box with SASQUATCH Manas Wadhwa, Anubhab Baksi, Kai Hu, Anupam Chattopadhyay, Takanori Isobe, Dhiman Saha
2023/741 (PDF ) The Referendum Problem in Anonymous Voting for Decentralized Autonomous Organizations Artem Grigor, Vincenzo Iovino, Giuseppe Visconti
2023/740 (PDF ) Practical Robust DKG Protocols for CSIDH Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
2023/739 (PDF ) SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits Jung Hee Cheon, Hyeongmin Choe, Dongyeon Hong, MinJune Yi
2023/738 (PDF ) Extremal algebraic graphs, quadratic multivariate public keys and temporal rules Vasyl Ustimenko, Aneta Wróblewska
2023/736 (PDF ) Private Eyes: Zero-Leakage Iris Searchable Encryption Julie Ha, Chloe Cachet, Luke Demarest, Sohaib Ahmad, Benjamin Fuller
2023/735 (PDF ) Towards a Privacy-preserving Attestation for Virtualized Networks Ghada Arfaoui, Thibaut Jacques, Marc Lacoste, Cristina Onete, Léo Robert
2023/734 (PDF ) TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android Dimitri Mankowski, Thom Wiggers, Veelasha Moonsamy
2023/733 (PDF ) On implemented graph based generator of cryptographically strong pseudorandom sequences of multivariate nature Vasyl Ustimenko, Tymoteusz Chojecki
2023/732 (PDF ) VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations Quentin L. Meunier, Abdul Rahman Taleb
2023/731 (PDF ) Fast Exhaustive Search for Polynomial Systems over F3 Bo-Yin Yang, Wei-Jeng Wang, Shang-Yi Yang, Char-Shin Miou, Chen-Mou Cheng
2023/730 (PDF ) The Problem of Half Round Key XOR Anubhab Baksi
2023/729 (PDF ) Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures Yang Yu, Huiwen Jia, Xiaoyun Wang
2023/728 (PDF ) SoK: Distributed Randomness Beacons Kevin Choi, Aathira Manoj, Joseph Bonneau
2023/727 (PDF ) Safeguarding Physical Sneaker Sale Through a Decentralized Medium Marwan Zeggari, Aydin Abadi, Renaud Lambiotte, Mohamad Kassab
2023/726 (PDF ) A Note on ``A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT'' Zhengjun Cao, Lihua Liu
2023/725 (PDF ) On Perfect Linear Approximations and Differentials over Two-Round SPNs Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes
2023/724 (PDF ) Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme Lichao Wu, Guilherme Perin, Stjepan Picek
2023/723 (PDF ) Non-Interactive Commitment from Non-Transitive Group Actions Giuseppe D'Alconzo, Andrea Flamini, Andrea Gangemi
2023/722 (PDF ) Composing Bridges Mugurel Barcau, Vicentiu Pasol, George C Turcas
2023/721 (PDF ) A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication Supriya Adhikary, Angshuman Karmakar
2023/720 (PDF ) MUSES: Efficient Multi-User Searchable Encrypted Database Tung Le, Rouzbeh Behnia, Jorge Guajardo, Thang Hoang
2023/719 (PDF ) Lower Bounds for Lattice-based Compact Functional Encryption Erkan Tairi, Akın Ünal
2023/718 (PDF ) A Guide to the Design of Digital Signatures based on Cryptographic Group Actions Giacomo Borin, Edoardo Persichetti, Paolo Santini, Federico Pintore, Krijn Reijnders
2023/717 (PDF ) Generic Error SDP and Generic Error CVE Felice Manganiello, Freeman Slaughter
2023/716 (PDF ) Towards High-speed ASIC Implementations of Post-Quantum Cryptography Malik Imran, Aikata Aikata, Sujoy Sinha Roy, Samuel pagliarini
2023/715 (PDF ) SOK: Research Motivations of Public-Key Cryptography Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao
2023/714 (PDF ) A Two-Party Hierarchical Deterministic Wallets in Practice ChihYun Chuang, IHung Hsu, TingFang Lee
2023/713 (PDF ) KAIME : Central Bank Digital Currency with Realistic and Modular Privacy Ali Dogan, Kemal Bicakci
2023/712 (PDF ) Optimizing Attribute-based Encryption for Circuits using Compartmented Access Structures Alexandru Ionita
2023/711 (PDF ) On the Quantum Security of HAWK Serge Fehr, Yu-Hsuan Huang
2023/710 (PDF ) PriFHEte: Achieving Full-Privacy in Account-based Cryptocurrencies is Possible Varun Madathil, Alessandra Scafuro
2023/709 (PDF ) Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement Alexandre Augusto Giron
2023/708 (PDF ) Kyber terminates Manuel Barbosa, Peter Schwabe
2023/707 (PDF ) Concurrent Security of Anonymous Credentials Light, Revisited Julia Kastner, Julian Loss, Omar Renawi
2023/706 (PDF ) Two-Message Authenticated Key Exchange from Public-Key Encryption You Lyu, Shengli Liu
2023/705 (PDF ) Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang
2023/704 (PDF ) Asymmetric Multi-Party Computation Vipul Goyal, Chen-Da Liu-Zhang, Rafail Ostrovsky
2023/703 (PDF ) BQP $\neq$ QMA Ping Wang, Yiting Su
2023/702 (PDF ) Building Unclonable Cryptography: A Tale of Two No-cloning Paradigms Ghada Almashaqbeh, Rohit Chatterjee
2023/701 (PDF ) Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption Tabitha Ogilvie
2023/700 (PDF ) PIE: $p$-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption Luke Harmon, Gaetan Delavignette, Arnab Roy, David Silva
2023/699 (PDF ) Lattice-based, more general anti-leakage model and its application in decentralization Xiaokang Dai, Jingwei Chen, Wenyuan Wu, Yong Feng
2023/697 (PDF ) NFT Trades in Bitcoin with Off-chain Receipts Mehmet Sabir Kiraz, Enrique Larraia, Owen Vaughan
2023/696 (PDF ) Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices Koustabh Ghosh, Jonathan Fuchs, Parisa Amiri Eliasi, Joan Daemen
2023/695 (PDF ) Non-Interactive Zero-Knowledge from Non-Interactive Batch Arguments Jeffrey Champion, David J. Wu
2023/694 (PDF ) VeriVoting: A decentralized, verifiable and privacy-preserving scheme for weighted voting Xiaohan Yue
2023/693 (PDF ) LeakyOhm: Secret Bits Extraction using Impedance Analysis Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik
2023/692 (PDF ) On the Invalidity of LV16/Lin17 Obfuscation Schemes Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong
2023/691 (PDF ) Weak Fiat-Shamir Attacks on Modern Proof Systems Quang Dao, Jim Miller, Opal Wright, Paul Grubbs
2023/690 (PDF ) Invertible Quadratic Non-Linear Functions over $\mathbb F_p^n$ via Multiple Local Maps Ginevra Giordani, Lorenzo Grassi, Silvia Onofri, Marco Pedicini
2023/689 (PDF ) Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus Erica Blum, Jonathan Katz, Julian Loss, Kartik Nayak, Simon Ochsenreither
2023/688 (PDF ) Applications of Timed-release Encryption with Implicit Authentication Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia
2023/687 (PDF ) SoK: Delay-based Cryptography Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia
2023/686 (PDF ) Efficient Accelerator for NTT-based Polynomial Multiplication Raziyeh Salarifard, Hadi Soleimany
2023/685 (PDF ) Third-Party Private Set Intersection Foo Yee Yeo, Jason H. M. Ying
2023/684 (PDF ) A note on ``a lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment'' Zhengjun Cao, Lihua Liu
2023/683 (PDF ) MPC with Low Bottleneck-Complexity: Information-Theoretic Security and More Hannah Keller, Claudio Orlandi, Anat Paskin-Cherniavsky, Divya Ravi
2023/682 (PDF ) Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman
2023/681 (PDF ) Benchmarking ZK-Circuits in Circom Colin Steidtmann, Sanjay Gollapudi
2023/680 (PDF ) Private Polynomial Commitments and Applications to MPC Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Wenxuan Wu, Yupeng Zhang
2023/679 (PDF ) ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path Xiaohai Dai, Bolin Zhang, Hai Jin, Ling Ren
2023/678 (PDF ) A 334µW 0.158mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber with Low-latency Striding Toom-Cook Multiplication Extended Version Archisman Ghosh, Jose Maria Bermudo Mera, Angshuman Karmakar, Debayan Das, Santosh Ghosh, Ingrid Verbauwhede, Shreyas Sen
2023/677 (PDF ) Secure Context Switching of Masked Software Implementations Barbara Gigerl, Robert Primas, Stefan Mangard
2023/676 (PDF ) From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers Jikang Lin, Jiahui He, Yanhong Fan, Meiqin Wang
2023/675 (PDF ) Efficient and Secure Quantile Aggregation of Private Data Streams Xiao Lan, Hongjian Jin, Hui Guo, Xiao Wang
2023/674 (PDF ) An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros Kazuma Taka, Tatusya Ishikawa, Kosei Sakamoto, Takanori Isobe
2023/673 (PDF ) Tracing Quantum State Distinguishers via Backtracking Mark Zhandry
2023/672 (PDF ) SigRec: Automatic Recovery of Function Signatures in Smart Contracts Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang
2023/671 (PDF ) Proving knowledge of isogenies – A survey Ward Beullens, Luca De Feo, Steven D. Galbraith, Christophe Petit
2023/670 (PDF ) Behemoth: transparent polynomial commitment scheme with constant opening proof size and verifier time István András Seres, Péter Burcsi
2023/669 (PDF ) Classical substitution ciphers and group theory Thomas Kaeding
2023/668 (PDF ) Statement-Oblivious Threshold Witness Encryption Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2023/666 (PDF ) Arithmetization of predicates into Halo 2 using application specific trace types Morgan Thomas
2023/665 (PDF ) On the Feasibility of Identity-based Encryption with Equality Test against Insider Attacks Keita Emura
2023/664 (PDF ) MPC in the head for isomorphisms and group actions Antoine Joux
2023/663 (PDF ) NTWE: A Natural Combination of NTRU and LWE Joel Gärtner
2023/662 (PDF ) Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexity Reo Eriguchi
2023/661 (PDF ) Study of Arithmetization Methods for STARKs Tiago Martins, João Farinha
2023/660 (PDF ) FESTA: Fast Encryption from Supersingular Torsion Attacks Andrea Basso, Luciano Maino, Giacomo Pope
2023/659 (PDF ) Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks Tianrui Wang, Anyu Wang, Xiaoyun Wang
2023/658 (PDF ) A note on ``faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things'' Zhengjun Cao, Lihua Liu
2023/657 (PDF ) Ou: Automating the Parallelization of Zero-Knowledge Protocols Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, Zhong Shao
2023/656 (PDF ) Formalizing Soundness Proofs of SNARKs Bolton Bailey, Andrew Miller
2023/655 (PDF ) TandaPay Whistleblowing Communities: Shifting Workplace Culture Towards Zero-Tolerance Sexual Harassment Policies Joshua Davis, Dr. Rashid Minhas, Michelle Casario, William Bentley, Kevin Cosby
2023/654 (PDF ) Griffin: Towards Mixed Multi-Key Homomorphic Encryption Thomas Schneider, Hossein Yalame, Michael Yonli
2023/653 (PDF ) Muckle+: End-to-End Hybrid Authenticated Key Exchanges Sonja Bruckner, Sebastian Ramacher, Christoph Striecks
2023/652 (PDF ) ScionFL: Efficient and Robust Secure Quantized Aggregation Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai
2023/651 (PDF ) Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3 Marc Fischlin
2023/650 (PDF ) Pseudorandom Correlation Functions from Variable-Density LPN, Revisited Geoffroy Couteau, Clément Ducros
2023/649 (PDF ) FinTracer: A privacy-preserving mechanism for tracing electronic money Michael Brand, Hamish Ivey-Law, Tania Churchill
2023/648 (PDF ) Collatz Computation Sequence for Sufficient Large Integers is Random Wei Ren
2023/647 (PDF ) Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service Kwok-Yan Lam, Xianhui Lu, Linru Zhang, Xiangning Wang, Huaxiong Wang, Si Qi Goh
2023/646 (PDF ) A Note on ``Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT'' Zhengjun Cao, Lihua Liu
2023/645 (PDF ) Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation Shihe Ma, Tairong Huang, Anyu Wang, Qixian Zhou, Xiaoyun Wang
2023/644 (PDF ) Improved Distributed RSA Key Generation Using the Miller-Rabin Test Jakob Burkhardt, Ivan Damgård, Tore Frederiksen, Satrajit Ghosh, Claudio Orlandi
2023/643 (PDF ) Privacy-Preserving Regular Expression Matching using Nondeterministic Finite Automata Ning Luo, Chenkai Weng, Jaspal Singh, Gefei Tan, Ruzica Piskac, Mariana Raykova
2023/642 (PDF ) PELTA -- Shielding Multiparty-FHE against Malicious Adversaries Sylvain Chatel, Christian Mouchet, Ali Utkan Sahin, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux
2023/641 (PDF ) Hardware-Accelerated Encrypted Execution of General-Purpose Applications Charles Gouert, Vinu Joseph, Steven Dalton, Cedric Augonnet, Michael Garland, Nektarios Georgios Tsoutsos
2023/640 (PDF ) A Direct Key Recovery Attack on SIDH Luciano Maino, Chloe Martindale, Lorenz Panny, Giacomo Pope, Benjamin Wesolowski
2023/639 (PDF ) OPRFs from Isogenies: Designs and Analysis Lena Heimberger, Tobias Hennerbichler, Fredrik Meisingseth, Sebastian Ramacher, Christian Rechberger
2023/638 (PDF ) Classification of All $t$-Resilient Boolean Functions with $t+4$ Variables Shahram Rasoolzadeh
2023/637 (PDF ) Padding-based forgeries in the mode XOCB Jean Liénardy
2023/636 (PDF ) Multi-Armed SPHINCS+ Gustavo Banegas, Florian Caullery
2023/635 (PDF ) Cassiopeia: Practical On-Chain Witness Encryption Schwinn Saereesitthipitak, Dionysis Zindros
2023/634 (PDF ) Polynomial Hashing over Prime Order Fields Sreyosi Bhattacharyya, Kaushik Nath, Palash Sarkar
2023/633 (PDF ) From Substitution Box To Threshold Anubhab Baksi, Sylvain Guilley, Ritu-Ranjan Shrivastwa, Sofiane Takarabt
2023/632 (PDF ) Batch Inference on Deep Convolutional Neural Networks With Fully Homomorphic Encryption Using Channel-By-Channel Convolutions Jung Hee Cheon, Minsik Kang, Taeseong Kim, Junyoung Jung, Yongdong Yeo
2023/630 (PDF ) Proximity Testing with Logarithmic Randomness Benjamin E. Diamond, Jim Posen
2023/629 (PDF ) Publicly Auditable Functional Encryption Vlasis Koutsos, Dimitrios Papadopoulos
2023/628 (PDF ) SEC: Symmetric Encrypted Computation via Fast Look-ups Debadrita Talapatra, Nimish Mishra, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay
2023/627 (PDF ) Conflict Checkable and Decodable Codes and Their Applications Benny Applebaum, Eliran Kachlon
2023/626 (PDF ) Sprints: Intermittent Blockchain PoW Mining Michael Mirkin, Lulu Zhou, Ittay Eyal, Fan Zhang
2023/625 (PDF ) Efficient Information-Theoretic Distributed Point Function with General Output Groups Junru Li, Pengzhen Ke, Liang Feng Zhang
2023/624 (PDF ) HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, MinJune Yi
2023/623 (PDF ) Toward Practical Lattice-based Proof of Knowledge from Hint-MLWE Duhyeong Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song
2023/622 (PDF ) CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives Emanuele Bellini, David Gerault, Juan Grados, Yun Ju Huang, Mohamed Rachidi, Sharwan Tiwari, Rusydi H. Makarim
2023/621 (PDF ) On APN functions whose graphs are maximal Sidon sets Claude Carlet
2023/620 (PDF ) ProtoStar: Generic Efficient Accumulation/Folding for Special Sound Protocols Benedikt Bünz, Binyi Chen
2023/619 (PDF ) Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields Hiroki Furue, Tsuyoshi Takagi
2023/618 (PDF ) Hardware Acceleration of FHEW Jonas Bertels, Michiel Van Beirendonck, Furkan Turan, Ingrid Verbauwhede
2023/616 (PDF ) vetKeys: How a Blockchain Can Keep Many Secrets Andrea Cerulli, Aisling Connolly, Gregory Neven, Franz-Stefan Preiss, Victor Shoup
2023/615 (PDF ) Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles Elaine Shi, Nikhil Vanjani
2023/614 (PDF ) Comprehensive Preimage Security Evaluations on Rijndael-based Hashing Tianyu Zhang
2023/613 (PDF ) Computational Quantum Secret Sharing Alper Cakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro
2023/612 (PDF ) Cryptanalysis of SPEEDY Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, Meiqin Wang
2023/611 (PDF ) A Comparison of Multi-task learning and Single-task learning Approaches Thomas Marquet, Elisabeth Oswald
2023/609 (PDF ) Enabling Two-Party Secure Computation on Set Intersection Ferhat Karakoç, Alptekin Küpçü
2023/608 (PDF ) Publicly Verifiable Auctions with Privacy Paul Germouty, Enrique Larraia, Wei Zhang
2023/607 (PDF ) Security analysis of the Milenage-construction based on a PRF Alexander Maximov, Mats Näslund
2023/606 (PDF ) Novel Approach to Cryptography Implementation using ChatGPT Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo
2023/605 (PDF ) The Principal–Agent Problem in Liquid Staking Apostolos Tzinas, Dionysis Zindros
2023/604 (PDF ) Pushing the Limit of Vectorized Polynomial Multiplication for NTRU Prime Vincent Hwang
2023/603 (PDF ) TFHE Public-Key Encryption Revisited Marc Joye
2023/602 (PDF ) Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat, LaKyah Tyner
2023/601 (PDF ) Threshold Cryptosystems Based on $2^k$-th Power Residue Symbols George Teseleanu
2023/600 (PDF ) Improving and Automating BFV Parameters Selection: An Average-Case Approach Beatrice Biasioli, Chiara Marcolla, Marco Calderini, Johannes Mono
2023/599 (PDF ) A Note on a CBC-Type Mode of Operation George Teseleanu
2023/598 (PDF ) Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold Sourav Das, Philippe Camacho, Zhuolun Xiang, Javier Nieto, Benedikt Bunz, Ling Ren
2023/597 (PDF ) FedVS: Straggler-Resilient and Privacy-Preserving Vertical Federated Learning for Split Models Songze Li, Duanyi Yao, Jin Liu
2023/596 (PDF ) Time Complexities of Multiple-precision Modular Operations and Related Ratios Shenghui Su, Ping Luo
2023/595 (PDF ) SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti
2023/594 (PDF ) Semidirect Product Key Exchange: the State of Play Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti
2023/593 (PDF ) Implementing and Optimizing Matrix Triples with Homomorphic Encryption Johannes Mono, Tim Güneysu
2023/592 (PDF ) Blockchain Large Language Models Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais
2023/591 (PDF ) Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao, Siu-Ming Yiu
2023/590 (PDF ) Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure Francesco Berti
2023/589 (PDF ) $\texttt{CryptographicEstimators}$: a Software Library for Cryptographic Hardness Estimation Andre Esser, Javier Verbel, Floyd Zweydinger, Emanuele Bellini
2023/588 (PDF ) Wave Parameter Selection Nicolas Sendrier
2023/587 (PDF ) Proof-Carrying Data From Arithmetized Random Oracles Megan Chen, Alessandro Chiesa, Tom Gur, Jack O'Connor, Nicholas Spooner
2023/586 (PDF ) A Novel Preprocessing-Free Proofless Verifiable Computation Scheme from Integer Factoring Alex Dalton, David Thomas, Peter Cheung
2023/585 (PDF ) Two Party Fair Exchange Alex Dalton, David Thomas, Peter Cheung
2023/584 (PDF ) General-Purpose Secure Conflict-free Replicated Data Types Bernardo Portela, Hugo Pacheco, Pedro Jorge, Rogério Pontes
2023/583 (PDF ) Reusable, Instant and Private Payment Guarantees for Cryptocurrencies Akash Madhusudan, Mahdi Sedaghat, Samarth Tiwari, Kelong Cong, Bart Preneel
2023/582 (PDF ) New NTRU Records with Improved Lattice Bases Elena Kirshanova, Alexander May, Julian Nowakowski
2023/581 (PDF ) A security analysis on MQ-Sign Yasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda
2023/580 (PDF ) Neural-Linear Attack Based on Distribution Data and Its Application on DES Rui Zhou, Ming Duan, Qi Wang, Qianqiong Wu, Sheng Guo, Lulu Guo, Zheng Gong
2023/579 (PDF ) Revealing the Secrets of Radio-Enabled Embedded Systems: on extraction of raw information from any on-board signal through RF Erez Danieli, Menachem Goldzweig, Moshe Avital, Itamar Levi
2023/578 (PDF ) DORAM revisited: Maliciously secure RAM-MPC with logarithmic overhead Brett Falk, Daniel Noble, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang
2023/577 (PDF ) Exploring Formal Methods for Cryptographic Hash Function Implementations Nicky Mouha
2023/576 (PDF ) IGD-ScoreChain: A Lightweight and Scalable Blockchain Based on Node Sharding for the Internet of Things Elnaz Mehraein, Reza Nourmohammadi
2023/575 (PDF ) On Central Bank Digital Currency: A composable treatment István Vajda
2023/573 (PDF ) HyperNova: Recursive arguments for customizable constraint systems Abhiram Kothapalli, Srinath Setty
2023/572 (PDF ) Scalable Private Signaling Sashidhar Jakkamsetti, Zeyu Liu, Varun Madathil
2023/571 (PDF ) Fine-Grained Non-Interactive Key-Exchange: Constructions and Lower Bounds Abtin Afshar, Geoffroy Couteau, Mohammad Mahmoody, Elahe Sadeghi
2023/570 (PDF ) Black-Box Separations for Non-Interactive Commitments in a Quantum World Kai-Min Chung, Yao-Ting Lin, Mohammad Mahmoody
2023/569 (PDF ) From Polynomial IOP and Commitments to Non-malleable zkSNARKs Antonio Faonio, Dario Fiore, Markulf Kohlweiss, Luigi Russo, Michal Zajac
2023/568 (PDF ) Enhancing the Privacy of Machine Learning via faster arithmetic over Torus FHE Marc Titus Trifan, Alexandru Nicolau, Alexander Veidenbaum
2023/567 (PDF ) hinTS: Threshold Signatures with Silent Setup Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
2023/566 (PDF ) Improved Differential Cryptanalysis on SPECK Using Plaintext Structures Zhuohui Feng, Ye Luo, Chao Wang, Qianqian Yang, Zhiquan Liu, Ling Song
2023/565 (PDF ) Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded Pratish Datta, Tapas Pal
2023/564 (PDF ) Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge) James Bartusek, Dakshita Khurana, Akshayaram Srinivasan
2023/563 (PDF ) FUSE – Flexible File Format and Intermediate Representation for Secure Multi-Party Computation Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko
2023/562 (PDF ) Cryptanalysis of Strong Physically Unclonable Functions Liliya Kraleva, Mohammad Mahzoun, Raluca Posteuca, Dilara Toprakhisar, Tomer Ashur, Ingrid Verbauwhede
2023/561 (PDF ) vr$^2$FHE- Securing FHE from Reaction-based Key Recovery Attacks Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay
2023/560 (PDF ) A Framework for Practical Anonymous Credentials from Lattices Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Alessandro Sorniotti
2023/559 (PDF ) Weakening Assumptions for Publicly-Verifiable Deletion James Bartusek, Dakshita Khurana, Giulio Malavolta, Alexander Poremba, Michael Walter
2023/557 (PDF ) Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
2023/556 (PDF ) Quantum-access Security of Hash-based Signature Schemes Quan Yuan, Mehdi Tibouchi, Masayuki Abe
2023/555 (PDF ) SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame
2023/554 (PDF ) Hybrid Encryption Scheme based on Polar Codes Reza Hooshmand
2023/553 (PDF ) Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain Ren Taguchi, Atsushi Takayasu
2023/552 (PDF ) Customizable constraint systems for succinct arguments Srinath Setty, Justin Thaler, Riad Wahby
2023/551 (PDF ) Breaking DPA-protected Kyber via the pair-pointwise multiplication Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Łukasz Chmielewski, Kirthivaasan Puniamurthy, Milan Šorf
2023/550 (PDF ) New Baselines for Local Pseudorandom Number Generators by Field Extensions Akin Ünal
2023/549 (PDF ) Weak instances of class group action based cryptography via self-pairings Wouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam van Buuren, Frederik Vercauteren
2023/548 (PDF ) Compartment-based and Hierarchical Threshold Delegated Verifiable Accountable Subgroup Multi-signatures Ahmet Ramazan Ağırtaş, Oğuz Yayla
2023/547 (PDF ) Certifying Zero-Knowledge Circuits with Refinement Types Junrui Liu, Ian Kretz, Hanzhi Liu, Bryan Tan, Jonathan Wang, Yi Sun, Luke Pearson, Anders Miltner, Işıl Dillig, Yu Feng
2023/546 (PDF ) Horizontal Correlation Attack on Classic McEliece Brice Colombier, Vincent Grosso, Pierre-Louis Cayrel, Vlad-Florin Drăgoi
2023/545 (PDF ) Improved Universal Thresholdizer from Iterative Shamir Secret Sharing Jung Hee Cheon, Wonhee Cho, Jiseung Kim
2023/544 (PDF ) PARMESAN: Parallel ARithMEticS over ENcrypted data Jakub Klemsa, Melek Önen
2023/543 (PDF ) Pseudorandomness with Proof of Destruction and Applications Amit Behera, Zvika Brakerski, Or Sattath, Omri Shmueli
2023/542 (PDF ) A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, Andrea Visconti
2023/541 (PDF ) Algorithmic Views of Vectorized Polynomial Multipliers for NTRU and NTRU Prime (Long Paper) Han-Ting Chen, Yi-Hua Chung, Vincent Hwang, Chi-Ting Liu, Bo-Yin Yang
2023/540 (PDF ) MAYO: Optimized Implementation with Revised Parameters for ARMv7-M Arianna Gringiani, Alessio Meneghetti, Edoardo Signorini, Ruggero Susella
2023/539 (PDF ) Dlog is Practically as Hard (or Easy) as DH – Solving Dlogs via DH Oracles on EC Standards Alexander May, Carl Richard Theodor Schneider
2023/538 (PDF ) Publicly Verifiable Deletion from Minimal Assumptions Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2023/537 (PDF ) Algebraic Cryptanalysis of HADES Design Strategy: Application to POSEIDON and Poseidon2 Tomer Ashur, Thomas Buschman, Mohammad Mahzoun
2023/536 (PDF ) Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience Victor Shoup, Nigel P. Smart
2023/535 (PDF ) Practical Randomized Lattice Gadget Decomposition With Application to FHE Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park
2023/534 (PDF ) Group Oblivious Message Retrieval Zeyu Liu, Eran Tromer, Yunhao Wang
2023/533 (PDF ) Injection-Secure Structured and Searchable Symmetric Encryption Ghous Amjad, Seny Kamara, Tarik Moataz
2023/532 (PDF ) HLG: A framework for computing graphs in Residue Number System and its application in Fully Homomorphic Encryption Shuang Wu, Chunhuan Zhao, Ye Yuan, Shuzhou Sun, Jie Li, Yamin Liu
2023/531 (PDF ) Practical Randomness Measure Tool Boaz Shahar
2023/530 (PDF ) Breaking and Fixing Garbled Circuits when a Gate has Duplicate Input Wires Raine Nieminen, Thomas Schneider
2023/529 (PDF ) Secure Communication in Dynamic Incomplete Networks Ivan Damgård, Divya Ravi, Daniel Tschudi, Sophia Yakoubov
2023/528 (PDF ) NP-Hardness of Approximating Meta-Complexity: A Cryptographic Approach Yizhi Huang, Rahul Ilango, Hanlin Ren
2023/527 (PDF ) Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong
2023/526 (PDF ) Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart
2023/525 (PDF ) Error Correction and Ciphertext Quantization in Lattice Cryptography Daniele Micciancio, Mark Schultz
2023/524 (PDF ) AI Resistant (AIR) Cryptography Gideon Samid
2023/523 (PDF ) Adding more parallelism to the AEGIS authenticated encryption algorithms Frank Denis
2023/522 (PDF ) SAFE: Sponge API for Field Elements JP Aumasson, Dmitry Khovratovich, Bart Mennink, Porçu Quine
2023/521 (PDF ) TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew Schmidt, Ajey Jacob, Benedict Reynwar, Kellie Canida, Akhilesh Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram
2023/520 (PDF ) Generic Security of the SAFE API and Its Applications Dmitry Khovratovich, Mario Marhuenda Beltrán, Bart Mennink
2023/517 (PDF ) Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography Aikata Aikata, Andrea Basso, Gaetan Cassiers, Ahmet Can Mert, Sujoy Sinha Roy
2023/516 (PDF ) 3-Party Secure Computation for RAMs: Optimal and Concretely Efficient Atsunori Ichikawa, Ilan Komargodski, Koki Hamada, Ryo Kikuchi, Dai Ikarashi
2023/515 (PDF ) stoRNA: Stateless Transparent Proofs of Storage-time Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas, Amir Nabizadeh
2023/514 (PDF ) Black-Box Reusable NISC with Random Oracles Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan
2023/513 (PDF ) Sublinear Secure Computation from New Assumptions Elette Boyle, Geoffroy Couteau, Pierre Meyer
2023/512 (PDF ) Automated Detection of Underconstrained Circuits for Zero-Knowledge Proofs Shankara Pailoor, Yanju Chen, Franklyn Wang, Clara Rodríguez, Jacob Van Gaffen, Jason Morton, Michael Chu, Brian Gu, Yu Feng, Isil Dillig
2023/511 (PDF ) $\text{MP}\ell\circ \mathrm{C}$: Privacy-Preserving IP Verification Using Logic Locking and Secure Multiparty Computation Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos
2023/510 (PDF ) Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model Anit Kumar Ghosal, Dipanwita Roychowdhury
2023/508 (PDF ) Computing Isogenies of Power-Smooth Degrees Between PPAVs Jesús-Javier Chi-Domínguez, Amalia Pizarro-Madariaga, Edgardo Riquelme
2023/507 (PDF ) Low Memory Attacks on Small Key CSIDH Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May
2023/506 (PDF ) Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices George Tasopoulos, Charis Dimopoulos, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld
2023/505 (PDF ) Side-Channel Analysis of Integrate-and-Fire Neurons within Spiking Neural Networks Matthias Probst, Manuel Brosch, Georg Sigl
2023/504 (PDF ) Private Computation Based On Polynomial Operation Shuailiang Hu
2023/503 (PDF ) Neural Network Quantisation for Faster Homomorphic Encryption Wouter Legiest, Furkan Turan, Michiel Van Beirendonck, Jan-Pieter D'Anvers, Ingrid Verbauwhede
2023/502 (PDF ) Laconic Function Evaluation for Turing Machines Nico Döttling, Phillip Gajland, Giulio Malavolta
2023/501 (PDF ) New Ways to Garble Arithmetic Circuits Marshall Ball, Hanjun Li, Huijia Lin, Tianren Liu
2023/500 (PDF ) Robust Quantum Public-Key Encryption with Applications to Quantum Key Distribution Giulio Malavolta, Michael Walter
2023/499 (PDF ) FLUTE: Fast and Secure Lookup Table Evaluations (Full Version) Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame
2023/498 (PDF ) Subset-optimized BLS Multi-signature with Key Aggregation Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Francois Garillot, Jonas Lindstrom, Ben Riva, Arnab Roy, Mahdi Sedaghat, Alberto Sonnino, Pun Waiwitlikhit, Joy Wang
2023/497 (PDF ) Upper bounding the number of bent functions using 2-row bent rectangles Sergey Agievich
2023/496 (PDF ) Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect Xichao Hu, Yongqiang Li, Lin Jiao, Zhengbin Liu, Mingsheng Wang
2023/495 (PDF ) On the algebraic immunity of weightwise perfectly balanced functions Agnese Gini, Pierrick Méaux
2023/494 (PDF ) Spartan and Bulletproofs are simulation-extractable (for free!) Quang Dao, Paul Grubbs
2023/493 (PDF ) Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU Tianxiang Dai, Li Duan, Yufan Jiang, Yong Li, Fei Mei, Yulian Sun
2023/492 (PDF ) Batch Signatures, Revisited Carlos Aguilar-Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano
2023/491 (PDF ) On the Security of Blind Signatures in the Multi-Signer Setting Samuel Bedassa Alemu, Julia Kastner
2023/490 (PDF ) Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
2023/489 (PDF ) Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices Eric Sageloli, Pierre Pébereau, Pierrick Méaux, Céline Chevalier
2023/488 (PDF ) $k$-SUM in the Sparse Regime Shweta Agrawal, Sagnik Saha, Nikolaj Ignatieff Schwartzbach, Akhil Vanukuri, Prashant Nalini Vasudevan
2023/487 (PDF ) On the State of Crypto-Agility Nouri Alnahawi, Nicolai Schmitt, Alexander Wiesmaier, Andreas Heinemann, Tobias Grasmeyer
2023/486 (PDF ) Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin
2023/485 (PDF ) Practically-exploitable Cryptographic Vulnerabilities in Matrix Martin R. Albrecht, Sofía Celi, Benjamin Dowling, Daniel Jones
2023/484 (PDF ) SCA Evaluation and Benchmarking of Finalists in the NIST Lightweight Cryptography Standardization Process Kamyar Mohajerani, Luke Beckwith, Abubakr Abdulgadir, Eduardo Ferrufino, Jens-Peter Kaps, Kris Gaj
2023/483 (PDF ) Unbounded Predicate Inner Product Functional Encryption from Pairings Uddipana Dowerah, Subhranil Dutta, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal
2023/482 (PDF ) Homomorphic Trapdoors for Identity-based and Group Signatures Buvana Ganesh, Apurva Vangujar, Alia Umrani, Paolo Palmieri
2023/481 (PDF ) A Framework for UC Secure Privacy Preserving Biometric Authentication using Efficient Functional Encryption Johannes Ernst, Aikaterini Mitrokotsa
2023/480 (PDF ) Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications Adda-Akram Bendoukha, Oana Stan, Renaud Sirdey, Nicolas Quero, Luciano Freitas
2023/479 (PDF ) Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi
2023/478 (PDF ) TENET : Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup Hyeonbum Lee, Jae Hong Seo
2023/477 (PDF ) Separations between simulation-based and simulation-free formulations of security for public key encryption Yodai Watanabe
2023/476 (PDF ) A private set intersection protocol based on multi-party quantum computation for greatest common divisor Muhammad Imran
2023/475 (PDF ) The Jacobi Symbol Problem for Quadratic Congruences and Applications to Cryptography Ferucio Laurențiu Țiplea
2023/474 (PDF ) eSTARK: Extending STARKs with Arguments Héctor Masip-Ardevol, Marc Guzmán-Albiol, Jordi Baylina-Melé, Jose Luis Muñoz-Tapia
2023/473 (PDF ) Owl: Compositional Verification of Security Protocols via an Information-Flow Type System Joshua Gancher, Sydney Gibson, Pratap Singh, Samvid Dharanikota, Bryan Parno
2023/472 (PDF ) Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL Roi Bar-Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar
2023/471 (PDF ) Compact Aggregate Signature from Module-Lattices Toi Tomita, Junji Shikata
2023/470 (PDF ) GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi
2023/469 (PDF ) Four Attacks and a Proof for Telegram Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs
2023/468 (PDF ) A new approach on IoT security: n-out-of-n Tuğberk KOCATEKİN, Cafer ÇALIŞKAN
2023/467 (PDF ) Secure Floating-Point Training Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song
2023/466 (PDF ) Don't be Dense: Efficient Keyword PIR for Sparse Databases Sarvar Patel, Joon Young Seo, Kevin Yeo
2023/465 (PDF ) RPU: The Ring Processing Unit Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Nabeel Thari Moopan, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew Schmidt, Brandon Reagen
2023/464 (PDF ) A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices Johannes Blömer, Jan Bobolz, Laurens Porzenheim
2023/463 (PDF ) Simplex Consensus: A Simple and Fast Consensus Protocol Benjamin Y Chan, Rafael Pass
2023/462 (PDF ) Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice Sebastian Hasler, Toomas Krips, Ralf Küsters, Pascal Reisert, Marc Rivinius
2023/461 (PDF ) Deep Learning based Differential Classifier of PRIDE and RC5 Debranjan Pal, Upasana Mandal, Abhijit Das, Dipanwita Roy Chowdhury
2023/460 (PDF ) A unified construction of weightwise perfectly balanced Boolean functions Qinglan Zhao, Mengran Li, Zhixiong Chen, Baodong Qin, Dong Zheng
2023/459 (PDF ) SCMA: Plaintext Classification Assisted Side Channel Spectral Modulation Attacks. Towards Noise-insensitive SCA Attacks... Moshe Avital, Itamar Levi
2023/458 (PDF ) Non-interactive Universal Arguments Nir Bitansky, Omer Paneth, Dana Shamir, Tomer Solomon
2023/457 (PDF ) Registered FE beyond Predicates: (Attribute-Based) Linear Functions and more Pratish Datta, Tapas Pal, Shota Yamada
2023/456 (PDF ) Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz
2023/455 (PDF ) Tri-State Circuits: A Circuit Model that Captures RAM David Heath, Vladimir Kolesnikov, Rafail Ostrovsky
2023/454 (PDF ) Wireless-channel Key Exchange Afonso Arriaga, Petra Sala, Marjan Škrobot
2023/453 (PDF ) An algebraic attack for forging signatures of MPPK/DS Hao Guo
2023/452 (PDF ) Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation Mingxun Zhou, Andrew Park, Elaine Shi, Wenting Zheng
2023/451 (PDF ) Non-interactive VSS using Class Groups and Application to DKG Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, Sri Aravinda Krishnan Thyagarajan
2023/450 (PDF ) Unlocking doors from half a continent away: A relay attack against HID Seos Sam Haskins, Trevor Stevado
2023/449 (PDF ) Multidimensional Approximate Agreement with Asynchronous Fallback Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer
2023/447 (PDF ) Provable Lattice Reduction of $\mathbb Z^n$ with Blocksize $n/2$ Léo Ducas
2023/446 (PDF ) Phoenix: Hash-and-Sign with Aborts from Lattice Gadgets Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders
2023/445 (PDF ) Fully Adaptive Schnorr Threshold Signatures Elizabeth Crites, Chelsea Komlo, Mary Maller
2023/444 (PDF ) Compact Bounded-Collusion Identity-based Encryption via Group Testing Shingo Sato, Junji Shikata
2023/443 (PDF ) Abstraction Model of Probing and DFA Attacks on Block Ciphers Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Sakiyama
2023/442 (PDF ) Non-interactive privacy-preserving naive Bayes classifier using homomorphic encryption Jingwei Chen, Yong Feng, Yang Liu, Wenyuan Wu, Guanci Yang
2023/441 (PDF ) Unconditionally secure ciphers with a short key for a source with unknown statistics Boris Ryabko
2023/440 (PDF ) On the Possibility of a Backdoor in the Micali-Schnorr Generator Hannah Davis, Matthew Green, Nadia Heninger, Keegan Ryan, Adam Suhl
2023/439 (PDF ) Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition Karim Eldefrawy, Sashidhar Jakkamsetti, Ben Terner, Moti Yung
2023/438 (PDF ) Minimal $p$-ary codes via the direct sum of functions, non-covering permutations and subspaces of derivatives René Rodríguez, Enes Pasalic, Fengrong Zhang, Yongzhuang Wei
2023/437 (PDF ) Interoperable Private Attribution: A Distributed Attribution and Aggregation Protocol Benjamin Case, Richa Jain, Alex Koshelev, Andy Leiserson, Daniel Masny, Thurston Sandberg, Ben Savage, Erik Taubeneck, Martin Thomson, Taiki Yamaguchi
2023/436 (PDF ) SQISignHD: New Dimensions in Cryptography Pierrick Dartois, Antonin Leroux, Damien Robert, Benjamin Wesolowski
2023/435 (PDF ) Optimal Security Notion for Decentralized Multi-Client Functional Encryption Ky Nguyen, Duong Hieu Phan, David Pointcheval
2023/434 (PDF ) The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada
2023/433 (PDF ) Efficiency of SIDH-based signatures (yes, SIDH) Wissam Ghantous, Federico Pintore, Mattia Veroni
2023/432 (PDF ) Practical key-recovery attack on MQ-Sign Thomas Aulbach, Simona Samardjiska, Monika Trimoska
2023/431 (PDF ) Ruffle: Rapid 3-party shuffle protocols Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
2023/430 (PDF ) QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen
2023/429 (PDF ) CPU to FPGA Power Covert Channel in FPGA-SoCs Mathieu Gross, Robert Kunzelmann, Georg Sigl
2023/428 (PDF ) Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory Yu Li, Li-Ping Wang
2023/427 (PDF ) SPRINT: High-Throughput Robust Distributed Schnorr Signatures Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Yiping Ma, Tal Rabin
2023/426 (PDF ) A Tightly Secure Identity-based Signature Scheme from Isogenies Hyungrok Jo, Shingo Sato, Junji Shikata
2023/425 (PDF ) Generic Construction of Dual-Server Public Key Authenticated Encryption with Keyword Search Keita Emura
2023/424 (PDF ) A Duality Between One-Way Functions and Average-Case Symmetry of Information Shuichi Hirahara, Rahul Ilango, Zhenjian Lu, Mikito Nanashima, Igor C. Oliveira
2023/423 (PDF ) A Note on Hybrid Signature Schemes Nina Bindel, Britta Hale
2023/422 (PDF ) A Differential Fault Attack against Deterministic Falcon Signatures Sven Bauer, Fabrizio De Santis
2023/421 (PDF ) Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation Islam Faisal
2023/420 (PDF ) Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger Laurane Marco, Abdullah Talayhan, Serge Vaudenay
2023/419 (PDF ) Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices Nick Frymann, Daniel Gardham, Mark Manulis
2023/418 (PDF ) The Round Complexity of Statistical MPC with Optimal Resiliency Benny Applebaum, Eliran Kachlon, Arpita Patra
2023/417 (PDF ) Multivariate Correlation Attacks and the Cryptanalysis of LFSR-based Stream Ciphers Isaac A. Canales-Martínez, Igor Semaev
2023/416 (PDF ) Single Instance Self-Masking via Permutations Asaf Cohen, Paweł Cyprys, Shlomi Dolev
2023/415 (PDF ) Maximally-Fluid MPC with Guaranteed Output Delivery Giovanni Deligios, Aarushi Goel, Chen-Da Liu-Zhang
2023/414 (PDF ) Post-Quantum Privacy Pass via Post-Quantum Anonymous Credentials Guru-Vamsi Policharla, Bas Westerbaan, Armando Faz-Hernández, Christopher A Wood
2023/413 (PDF ) Accelerating HE Operations from Key Decomposition Technique Miran Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song
2023/412 (PDF ) Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search Keita Emura
2023/411 (PDF ) An Overview of Hash Based Signatures Vikas Srivastava, Anubhab Baksi, Sumit Kumar Debnath
2023/410 (PDF ) Unbounded Leakage-Resilience and Intrusion-Detection in a Quantum World Alper Cakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro
2023/409 (PDF ) Multi-Instance Randomness Extraction and Security against Bounded-Storage Mass Surveillance Jiaxin Guan, Daniel Wichs, Mark Zhandry
2023/408 (PDF ) Machine-Checked Security for $\mathrm{XMSS}$ as in RFC 8391 and $\mathrm{SPHINCS}^{+}$ Manuel Barbosa, François Dupressoir, Benjamin Grégoire, Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub
2023/407 (PDF ) Game Theoretical Analysis of DAG-Ledgers Backbone Yackolley Amoussou-Guenou, Simone Galimberti, Maria Potop-Butucaru
2023/406 (PDF ) Quasi-linear masking to protect against both SCA and FIA Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier
2023/405 (PDF ) CaSCaDE: (Time-Based) Cryptography from Space Communications DElay Carsten Baum, Bernardo David, Elena Pagnin, Akira Takahashi
2023/404 (PDF ) Efficient Laconic Cryptography from Learning With Errors Nico Döttling, Dimitris Kolonelos, Russell W. F. Lai, Chuanwei Lin, Giulio Malavolta, Ahmadreza Rahimi
2023/403 (PDF ) Real-World Deniability in Messaging Daniel Collins, Simone Colombo, Loïs Huguenin-Dumittan
2023/402 (PDF ) Discretization Error Reduction for Torus Fully Homomorphic Encryption Kang Hoon Lee, Ji Won Yoon
2023/401 (PDF ) Generic Construction of Broadcast Authenticated Encryption with Keyword Search Keita Emura
2023/400 (PDF ) Prime Match: A Privacy-Preserving Inventory Matching System Antigoni Polychroniadou, Gilad Asharov, Benjamin Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso
2023/399 (PDF ) High Throughput Lattice-based Signatures on GPUs: Comparing Falcon and Mitaka Wai-Kong Lee, Raymond K. Zhao, Ron Steinfeld, Amin Sakzad, Seong Oun Hwang
2023/398 (PDF ) A New Linear Distinguisher for Four-Round AES Tomer Ashur, Erik Takke
2023/397 (PDF ) Extended Abstract: HotStuff-2: Optimal Two-Phase Responsive BFT Dahlia Malkhi, Kartik Nayak
2023/396 (PDF ) Monomial Isomorphism for Tensors and Applications to Code Equivalence Problems Giuseppe D'Alconzo
2023/395 (PDF ) Registered (Inner-Product) Functional Encryption Danilo Francati, Daniele Friolo, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Daniele Venturi
2023/394 (PDF ) Fork-Resilient Continuous Group Key Agreement Joël Alwen, Marta Mularczyk, Yiannis Tselekounis
2023/393 (PDF ) cqlin: Efficient linear operations on KZG commitments with cached quotients Liam Eagen, Ariel Gabizon
2023/392 (PDF ) Locally Covert Learning Justin Holmgren, Ruta Jawale
2023/391 (PDF ) Additional Modes for ASCON Rhys Weatherley
2023/390 (PDF ) Hashing to elliptic curves through Cipolla–Lehmer–Müller’s square root algorithm Dmitrii Koshelev
2023/389 (PDF ) TIDAL: Practical Collisions on State-Reduced Keccak Variants Sahiba Suryawanshi, Dhiman Saha, Shashwat jaiswal
2023/388 (PDF ) Non-Interactive Blind Signatures for Random Messages Lucjan Hanzlik
2023/387 (PDF ) Constrained Pseudorandom Functions from Homomorphic Secret Sharing Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia
2023/386 (PDF ) Interoperability in End-to-End Encrypted Messaging Julia Len, Esha Ghosh, Paul Grubbs, Paul Rösler
2023/385 (PDF ) Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem Marco Baldi, Sebastian Bitzer, Alessio Pavoni, Paolo Santini, Antonia Wachter-Zeh, Violetta Weger
2023/383 (PDF ) The Prospect of a New Cryptography: Extensive use of non-algorithmic randomness competes with mathematical complexity Gideon Samid
2023/382 (PDF ) On Homomorphic Secret Sharing from Polynomial-Modulus LWE Thomas Attema, Pedro Capitão, Lisa Kohl
2023/381 (PDF ) Nakamoto Consensus under Bounded Processing Capacity Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse
2023/380 (PDF ) Security Analysis of Signature Schemes with Key Blinding Edward Eaton, Tancrède Lepoint, Christopher A. Wood
2023/379 (PDF ) Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier
2023/378 (PDF ) SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller
2023/377 (PDF ) FuLeeca: A Lee-based Signature Scheme Stefan Ritterhoff, Georg Maringer, Sebastian Bitzer, Violetta Weger, Patrick Karl, Thomas Schamberger, Jonas Schupp, Antonia Wachter-Zeh
2023/376 (PDF ) Efficient computation of $(3^n,3^n)$-isogenies Thomas Decru, Sabrina Kunzweiler
2023/375 (PDF ) Accelerating exp-log based finite field multiplication Nicolas Belleville
2023/374 (PDF ) Practical-Time Related-Key Attack on GOST with Secret S-boxes Orr Dunkelman, Nathan Keller, Ariel Weizman
2023/373 (PDF ) Consensus Algorithm Using Transaction History for Cryptocurrency Yuuki Komi, Takayuki Tatekawa
2023/372 (PDF ) Practically Solving LPN in High Noise Regimes Faster Using Neural Networks Haozhe Jiang, Kaiyue Wen, Yilei Chen
2023/371 (PDF ) PACIFIC: Privacy-preserving automated contact tracing scheme featuring integrity against cloning Scott Griffy, Anna Lysyanskaya
2023/370 (PDF ) Publicly-Verifiable Deletion via Target-Collapsing Functions James Bartusek, Dakshita Khurana, Alexander Poremba
2023/369 (PDF ) LURK: Lambda, the Ultimate Recursive Knowledge Nada Amin, John Burnham, François Garillot, Rosario Gennaro, Chhi'mèd Künzang, Daniel Rogozin, Cameron Wong
2023/368 (PDF ) AI Attacks AI: Recovering Neural Network architecture from NVDLA using AI-assisted Side Channel Attack Naina Gupta, Arpan Jati, Anupam Chattopadhyay
2023/367 (PDF ) Practical Attacks on Small Private Exponent RSA: New Records and New Insights Qiang Li, Qun-xiong Zheng, Wen-feng Qi
2023/366 (PDF ) Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide
2023/365 (PDF ) Verifiable encodings in multigroup fully homomorphic encryption Ramsès Fernàndez-València
2023/364 (PDF ) Zero-Knowledge Arguments for Subverted RSA Groups Dimitris Kolonelos, Mary Maller, Mikhail Volkhov
2023/363 (PDF ) Composable Long-Term Security with Rewinding Robin Berger, Brandon Broadnax, Michael Klooß, Jeremias Mechler, Jörn Müller-Quade, Astrid Ottenhues, Markus Raiber
2023/362 (PDF ) Protecting Quantum Procrastinators with Signature Lifting: A Case Study in Cryptocurrencies Or Sattath, Shai Wyborski
2023/361 (PDF ) Authenticated Encryption for Very Short Inputs Alexandre Adomnicai, Kazuhiko Minematsu, Junji Shikata
2023/359 (PDF ) Convolutions in Overdrive: Maliciously Secure Convolutions for MPC Marc Rivinius, Pascal Reisert, Sebastian Hasler, Ralf Kuesters
2023/356 (PDF ) Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication! Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada
2023/354 (PDF ) Guessing Less and Better: Improved Attacks on GIFT-64 Federico Canale, María Naya-Plasencia
2023/353 (PDF ) Searching for S-boxes with better Diffusion using Evolutionary Algorithm Rahul Mishra, Bhupendra Singh, Radhakrishnan Delhibabu
2023/352 (PDF ) Post-Quantum Security for the Extended Access Control Protocol Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock
2023/351 (PDF ) Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from DLP or LWE Yoshinori Aono, Junji Shikata
2023/350 (PDF ) Weighted Oblivious RAM, with Applications to Searchable Symmetric Encryption Leonard Assouline, Brice Minaud
2023/348 (PDF ) Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski
2023/347 (PDF ) Programmable Payment Channels Yibin Yang, Mohsen Minaei, Srinivasan Raghuraman, Ranjit Kumaresan, Duc V. Le, Mahdi Zamani
2023/346 (PDF ) How to achieve bidirectional zero-knowledge authentication? Jin Li, Xingyu Li, Chang Chen, Guoyu Yang, Junyang Li, Qi Chen, Hongyang Yan
2023/345 (PDF ) Encryption with Quantum Public Keys Alex B. Grilo, Or Sattath, Quoc-Huy Vu
2023/344 (PDF ) Quantum Search-to-Decision Reduction for the LWE Problem Kyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida
2023/343 (PDF ) A Map of Witness Maps: New Definitions and Connections Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs
2023/342 (PDF ) TurboSHAKE Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier
2023/341 (PDF ) On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Benjamin Livshits, Arthur Gervais
2023/340 (PDF ) SALSA PICANTE: a machine learning attack on LWE with binary secrets Cathy Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, Kristin Lauter
2023/339 (PDF ) An Analysis of the Post Quantum and Classical Security of 4x4 and 16x4 S-Boxes and Their Implementations in Simplified-AES Christopher Dunne
2023/338 (PDF ) Shield: Secure Allegation Escrow System with Stronger Guarantees Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2023/337 (PDF ) Quantum Implementation of AIM: Aiming for Low-Depth Kyungbae Jang, Dukyoung Kim, Yujin Oh, Sejin Lim, Yujin Yang, Hyunji Kim, Hwajeong Seo
2023/336 (PDF ) A Novel Approach to e-Voting with Group Identity Based Identification and Homomorphic Encryption Apurva K Vangujar, Buvana Ganesh, Alia Umrani, Paolo Palmieri
2023/335 (PDF ) Separating Oil and Vinegar with a Single Trace Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger
2023/334 (PDF ) A Generic Transform from Multi-Round Interactive Proof to NIZK Pierre-Alain Fouque, Adela Georgescu, Chen Qian, Adeline Roux-Langlois, Weiqiang Wen
2023/333 (PDF ) Secret Sharing Scheme with Perfect Concealment Izumi Takeuti, Tomoko Adachi
2023/332 (PDF ) Asymmetric Group Message Franking: Definitions & Constructions Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng
2023/331 (PDF ) A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms Nicky Mouha, Christopher Celi
2023/330 (PDF ) Perfect MPC over Layered Graphs Bernardo David, Yuval Ishai, Anders Konring, Eyal Kushilevitz, Varun Narayanan
2023/329 (PDF ) Caveat Implementor! Key Recovery Attacks on MEGA Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson
2023/328 (PDF ) The state diagram of $\chi$ Jan Schoone, Joan Daemen
2023/326 (PDF ) A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality Jean Liénardy, Frédéric Lafitte
2023/325 (PDF ) Revocable Cryptography from Learning with Errors Prabhanjan Ananth, Alexander Poremba, Vinod Vaikuntanathan
2023/324 (PDF ) LATKE: A Framework for Constructing Identity-Binding PAKEs Jonathan Katz, Michael Rosenberg
2023/323 (PDF ) Poseidon2: A Faster Version of the Poseidon Hash Function Lorenzo Grassi, Dmitry Khovratovich, Markus Schofnegger
2023/322 (PDF ) Differential Fault Attack on Rasta and $\text {FiLIP} _ {\text {DSM}}$ R Radheshwar, Meenakshi Kansal, Pierrick Méaux, Dibyendu Roy
2023/321 (PDF ) A Holistic Security Analysis of Monero Transactions Cas Cremers, Julian Loss, Benedikt Wagner
2023/320 (PDF ) Anonymous Counting Tokens Fabrice Benhamouda, Mariana Raykova, Karn Seth
2023/319 (PDF ) A Sharding-Based Approach for Enhancing Efficiency in ISSDOs for Sharing Scattered Values Reza Ghasemi
2023/318 (PDF ) A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography Danilo Gligoroski
2023/317 (PDF ) The special case of cyclotomic fields in quantum algorithms for unit groups Razvan Barbulescu, Adrien Poulalion
2023/316 (PDF ) New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Ting Cui, Tairong Shi, Kai Zhang
2023/315 (PDF ) SoK on Blockchain Evolution and a Taxonomy for Public Blockchain Generations Thuat Do
2023/314 (PDF ) Memory-Tight Multi-Challenge Security of Public-Key Encryption Joseph Jaeger, Akshaya Kumar
2023/313 (PDF ) SoK: Metadata-Protecting Communication Systems Sajin Sasy, Ian Goldberg
2023/312 (PDF ) BIP32-Compatible Threshold Wallets Poulami Das, Andreas Erwig, Sebastian Faust, Philipp-Florens Lehwalder, Julian Loss, Ziyan Qu, Siavash Riahi
2023/311 (PDF ) Oblivious Transfer from Zero-Knowledge Proofs, or How to Achieve Round-Optimal Quantum Oblivious Transfer and Zero-Knowledge Proofs on Quantum States Léo Colisson, Garazi Muguruza, Florian Speelman
2023/310 (PDF ) Ramen: Souper Fast Three-Party Computation for RAM Programs Lennart Braun, Mahak Pancholi, Rahul Rachuri, Mark Simkin
2023/309 (PDF ) Practical Construction for Secure Trick-Taking Games Even With Cards Set Aside Rohann Bella, Xavier Bultel, Céline Chevalier, Pascal Lafourcade, Charles Olivier-Anclin
2023/308 (PDF ) Punctured Syndrome Decoding Problem Efficient Side-Channel Attacks Against Classic McEliece Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi
2023/307 (PDF ) SUPERPACK: Dishonest Majority MPC with Constant Online Communication Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song, Chenkai Weng
2023/306 (PDF ) A Simple Construction of Quantum Public-Key Encryption from Quantum-Secure One-Way Functions Khashayar Barooti, Giulio Malavolta, Michael Walter
2023/305 (PDF ) A Novel Related Nonce Attack for ECDSA Marco Macchetti
2023/304 (PDF ) On homomorphic encryption using abelian groups: Classical security analysis Eleni Agathocleous, Vishnupriya Anupindi, Annette Bachmayr, Chloe Martindale, Rahinatou Yuh Njah Nchiwo, Mima Stanojkovski
2023/303 (PDF ) Fusion One-Time Non-Interactively-Aggregatable Digital Signatures From Lattices Brandon Goodell, Aaron Feickert
2023/302 (PDF ) Does the Dual-Sieve Attack on Learning with Errors even Work? Léo Ducas, Ludo Pulles
2023/301 (PDF ) On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption Kamil Kluczniak, Giacomo Santato
2023/300 (PDF ) CNF Characterization of Sets over $\mathbb{Z}_2^n$ and Its Applications in Cryptography Hu Xiaobo, Xu Shengyuan, Tu Yinzi, Feng Xiutao
2023/299 (PDF ) Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE Yonglin Hao, Qingju Wang, Lin Jiao, Xinxin Gong
2023/298 (PDF ) Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA Mihir Bellare, Hannah Davis, Zijing Di
2023/297 (PDF ) Authenticated private information retrieval Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford
2023/296 (PDF ) OpenPubkey: Augmenting OpenID Connect with User held Signing Keys Ethan Heilman, Lucie Mugnier, Athanasios Filippidis, Sharon Goldberg, Sebastien Lipman, Yuval Marcus, Mike Milano, Sidhartha Premkumar, Chad Unrein, John Merfeld
2023/295 (PDF ) Randomized Half-Ideal Cipher on Groups with applications to UC (a)PAKE Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki
2023/294 (PDF ) SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes Qian Guo, Denis Nabokov, Alexander Nilsson, Thomas Johansson
2023/293 (PDF ) Searching for Gemstones: Flawed Stegosystems May Hide Promissing Ideas Diana Maimut, Evgnosia-Alexandra Kelesidis, Ilona Teodora Ciocan
2023/292 (PDF ) A Formal Treatment of Distributed Key Generation, and New Constructions Chelsea Komlo, Ian Goldberg, Douglas Stebila
2023/291 (PDF ) PEO-Store: Practical and Economical Oblivious Store with Peer-to-Peer Delegation Wenlong Tian, Jian Guo, Zhiyong Xu, Ruixuan Li, Weijun Xiao
2023/290 (PDF ) Improved Key Pair Generation for Falcon, BAT and Hawk Thomas Pornin
2023/289 (PDF ) Lower Bounds for Secret-Sharing Schemes for k-Hypergraphs Amos Beimel
2023/288 (PDF ) Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2023/287 (PDF ) Modelling Delay-based Physically Unclonable Functions through Particle Swarm Optimization Nimish Mishra, Kuheli Pratihar, Anirban Chakraborty, Debdeep Mukhopadhyay
2023/286 (PDF ) DORCIS: Depth Optimized Quantum Implementation of Substitution Boxes Matthew Chun, Anubhab Baksi, Anupam Chattopadhyay
2023/285 (PDF ) New Records in Collision Attacks on RIPEMD-160 and SHA-256 Yingxin Li, Fukang Liu, Gaoli Wang
2023/284 (PDF ) Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data Somnath Panja, Nikita Tripathi, Shaoquan Jiang, Reihaneh Safavi-Naini
2023/283 (PDF ) Maximizing Miner Revenue in Transaction Fee Mechanism Design Ke Wu, Elaine Shi, Hao Chung
2023/282 (PDF ) Quantum trapdoor functions from classical one-way functions Andrea Coladangelo
2023/281 (PDF ) Towards A Correct-by-Construction FHE Model Zhenkun Yang, Wen Wang, Jeremy Casas, Pasquale Cocchini, Jin Yang
2023/280 (PDF ) A Simple Single Slot Finality Protocol For Ethereum Francesco D'Amato, Luca Zanolini
2023/279 (PDF ) Recent Latest Message Driven GHOST: Balancing Dynamic Availability With Asynchrony Resilience Francesco D'Amato, Luca Zanolini
2023/278 (PDF ) Actively Secure Half-Gates with Minimum Overhead under Duplex Networks Hongrui Cui, Xiao Wang, Kang Yang, Yu Yu
2023/277 (PDF ) Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe
2023/276 (PDF ) Threshold and Multi-Signature Schemes from Linear Hash Functions Stefano Tessaro, Chenzhi Zhu
2023/275 (PDF ) Revisiting BBS Signatures Stefano Tessaro, Chenzhi Zhu
2023/274 (PDF ) Panacea: Non-interactive and Stateless Oblivious RAM Kelong Cong, Debajyoti Das, Georgio Nicolas, Jeongeun Park
2023/273 (PDF ) Derecho: Privacy Pools with Proof-Carrying Disclosures Josh Beal, Ben Fisch
2023/272 (PDF ) A study of KEM generalizations Bertram Poettering, Simon Rastikian
2023/271 (PDF ) Swoosh: Efficient Lattice-Based Non-Interactive Key Exchange Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe
2023/270 (PDF ) Actively Secure Arithmetic Computation and VOLE with Constant Computational Overhead Benny Applebaum, Niv Konstantini
2023/269 (PDF ) Simple Two-Round OT in the Explicit Isogeny Model Emmanuela Orsini, Riccardo Zanotto
2023/268 (PDF ) Verifiable Decentralized Multi-Client Functional Encryption for Inner Product Dinh Duy Nguyen, Duong Hieu Phan, David Pointcheval
2023/267 (PDF ) Proteus: A Pipelined NTT Architecture Generator Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy
2023/266 (PDF ) Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments Panos Kampanakis, Tancrède Lepoint
2023/265 (PDF ) Software with Certified Deletion James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta, Justin Raizes, Bhaskar Roberts
2023/264 (PDF ) Public Key Encryption with Secure Key Leasing Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2023/263 (PDF ) DualMS: Efficient Lattice-Based Two-Round Multi-Signature with Trapdoor-Free Simulation Yanbo Chen
2023/262 (PDF ) Generic Attack on Duplex-Based AEAD Modes using Random Function Statistics Henri Gilbert, Rachelle Heim Boissier, Louiza Khati, Yann Rotella
2023/261 (PDF ) A Greedy Global Framework for Lattice Reduction Using Deep Insertions Sanjay Bhattacherjee, Julio Hernandez-Castro, Jack Moyler
2023/260 (PDF ) Webb Protocol: A cross-chain private application and governance protocol. Drew Stone
2023/259 (PDF ) A MIQCP-Based Automatic Search Algorithm for Differential-Linear Trails of ARX Ciphers(Long Paper) Guangqiu Lv, Chenhui Jin, Ting Cui
2023/258 (PDF ) Privacy-Preserving Tree-Based Inference with Fully Homomorphic Encryption Jordan Frery, Andrei Stoian, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoit Chevallier-Mames, Arthur Meyre
2023/257 (PDF ) Deep Neural Networks for Encrypted Inference with TFHE Andrei Stoian, Jordan Frery, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoit Chevallier-Mames
2023/256 (PDF ) Traitor Tracing with N^(1/3)-size Ciphertexts and O(1)-size Keys from k-Lin Junqing Gong, Ji Luo, Hoeteck Wee
2023/255 (PDF ) Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY Danping Shi, Siwei Sun, Ling Song, Lei Hu, Qianqian Yang
2023/254 (PDF ) Mitigating Decentralized Finance Liquidations with Reversible Call Options Kaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais
2023/253 (PDF ) XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version) Zhenzhen Bao, Seongha Hwang, Akiko Inoue, Byeonghak Lee, Jooyoung Lee, Kazuhiko Minematsu
2023/252 (PDF ) Obfuscation of Pseudo-Deterministic Quantum Circuits James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2023/251 (PDF ) Hardware Root-of-Trust implementations in Trusted Execution Environments Usman Ali, Hamza Omar, Chujiao Ma, Vaibhav Garg, Omer Khan
2023/250 (PDF ) A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies Dan Boneh, Jiaxin Guan, Mark Zhandry
2023/249 (PDF ) Anamorphic Encryption, Revisited Fabio Banfi, Konstantin Gegier, Martin Hirt, Ueli Maurer, Guilherme Rito
2023/248 (PDF ) Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging Paul Rösler, Daniel Slamanig, Christoph Striecks
2023/247 (PDF ) A New Sieving-Style Information-Set Decoding Algorithm Qian Guo, Thomas Johansson, Vu Nguyen
2023/246 (PDF ) Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium Manuel Barbosa, Gilles Barthe, Christian Doczkal, Jelle Don, Serge Fehr, Benjamin Grégoire, Yu-Hsuan Huang, Andreas Hülsing, Yi Lee, Xiaodi Wu
2023/245 (PDF ) A Detailed Analysis of Fiat-Shamir with Aborts Julien Devevey, Pouria Fallahpour, Alain Passelègue, Damien Stehlé, Keita Xagawa
2023/244 (PDF ) Semi-Quantum Copy-Protection and More Céline Chevalier, Paul Hermouet, Quoc-Huy Vu
2023/243 (PDF ) Memory-Efficient Attacks on Small LWE Keys Andre Esser, Arindam Mukherjee, Santanu Sarkar
2023/242 (PDF ) The propagation game: on simulatability, correlation matrices, and probing security Vittorio Zaccaria
2023/241 (PDF ) Lynx: Family of Lightweight Authenticated Encryption Schemes based on Tweakable Blockcipher Munawar Hasan, Donghoon Chang
2023/240 (PDF ) Pitfalls and Shortcomings for Decompositions and Alignment (Full Version) Baptiste Lambin, Gregor Leander, Patrick Neumann
2023/238 (PDF ) Certifying Giant Nonprimes Charlotte Hoffmann, Pavel Hubáček, Chethan Kamath, Krzysztof Pietrzak
2023/237 (PDF ) Fast Practical Lattice Reduction through Iterated Compression Keegan Ryan, Nadia Heninger
2023/236 (PDF ) Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More Taiga Hiroka, Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Tapas Pal, Takashi Yamakawa
2023/235 (PDF ) New Results on Machine Learning Based Distinguishers Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaolu Hou, Hyunji Kim, Hwajeong Seo
2023/234 (PDF ) Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness Rupeng Yang
2023/233 (PDF ) Complete Characterization of Broadcast and Pseudo-Signatures from Correlations Varun Narayanan, Vinod M. Prabhakaran, Neha Sangwan, Shun Watanabe
2023/232 (PDF ) Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and FHE Martin R. Albrecht, Alex Davidson, Amit Deo, Daniel Gardham
2023/231 (PDF ) One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations Mostefa Kara, Abdelkader Laouid, Omer Al dabbas, Mohammad Hammoudeh, Ahcène Bounceur
2023/230 (PDF ) Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM Orr Dunkelman, Shibam Ghosh, Eran Lambooij
2023/229 (PDF ) One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More Fuyuki Kitagawa, Ryo Nishimaki
2023/228 (PDF ) Authenticated Continuous Key Agreement: Active MitM Detection and Prevention Benjamin Dowling, Britta Hale
2023/227 (PDF ) A Novel Automatic Technique Based on MILP to Search for Impossible Differentials Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang, Xiangyong Zeng
2023/226 (PDF ) Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls Chun Guo, Lei Wang, Dongdai Lin
2023/225 (PDF ) A Post-Quantum Round-Optimal Oblivious PRF from Isogenies Andrea Basso
2023/224 (PDF ) Improved Power Analysis Attacks on Falcon Shiduo Zhang, Xiuhan Lin, Yang Yu, Weijia Wang
2023/223 (PDF ) Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability Chris Peikert, Jiayu Xu
2023/222 (PDF ) A Lightweight Identification Protocol Based on Lattices Samed Düzlü, Juliane Krämer, Thomas Pöppelmann, Patrick Struck
2023/221 (PDF ) Bicorn: An optimistically efficient distributed randomness beacon Kevin Choi, Arasu Arun, Nirvan Tyagi, Joseph Bonneau
2023/220 (PDF ) Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood
2023/219 (PDF ) Sieving for large twin smooth integers using single solutions to Prouhet-Tarry-Escott Knud Ahrens
2023/218 (PDF ) On the Post-Quantum Security of Classical Authenticated Encryption Schemes Nathalie Lang, Stefan Lucks
2023/217 (PDF ) Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks Charlotte Lefevre
2023/216 (PDF ) Two-Round Stateless Deterministic Two-Party Schnorr Signatures From Pseudorandom Correlation Functions Yashvanth Kondi, Claudio Orlandi, Lawrence Roy
2023/215 (PDF ) Formally verifying Kyber Episode IV: Implementation Correctness José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Antoine Séré, Pierre-Yves Strub
2023/214 (PDF ) DIPSAUCE: Efficient Private Stream Aggregation Without Trusted Parties Joakim Brorsson, Martin Gunnarsson
2023/213 (PDF ) Deniable Authentication when Signing Keys Leak Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, Guilherme Rito
2023/212 (PDF ) Generating Secure Hardware using ChatGPT Resistant to CWEs Madhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay
2023/211 (PDF ) Improved Low-depth SHA3 Quantum Circuit for Fault-tolerant Quantum Computers Gyeongju Song, Kyungbae Jang, Hwajeong Seo
2023/210 (PDF ) New Generic Constructions of Error-Correcting PIR and Efficient Instantiations Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2023/209 (PDF ) Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext Lichao Wu, Guilherme Perin, Stjepan Picek
2023/208 (PDF ) zkTree: A Zero-Knowledge Recursion Tree with ZKP Membership Proofs Sai Deng, Bo Du
2023/207 (PDF ) On Quantum Secure Compressing Pseudorandom Functions Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, Ashwin Jha
2023/206 (PDF ) Orca: FSS-based Secure Training and Inference with GPUs Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, Rahul Sharma
2023/205 (PDF ) DEFending Integrated Circuit Layouts Jitendra Bhandari, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel, Ramesh Karri
2023/204 (PDF ) TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH Arthur Lazzaretti, Charalampos Papamanthou
2023/203 (PDF ) A Different Base Approach for Better Efficiency on Range Proofs Esra Günsay, Cansu Betin Onur, Murat Cenk
2023/202 (PDF ) SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper) Dachao Wang, Baocang Wang, Siwei Sun
2023/201 (PDF ) DenseQMC: an efficient bit-slice implementation of the Quine-McCluskey algorithm Aleksei Udovenko
2023/200 (PDF ) Classical and quantum 3 and 4-sieves to solve SVP with low memory Johanna Loyer, André Chailloux
2023/199 (PDF ) MixFlow: Assessing Mixnets Anonymity with Contrastive Architectures and Semantic Network Information Reyhane Attarian, Esfandiar Mohammadi, Tao Wang, Emad Heydari Beni
2023/198 (PDF ) Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive Assumptions Jiaxin Pan, Benedikt Wagner
2023/197 (PDF ) Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle Attacks Mihir Bellare, Laura Shea
2023/196 (PDF ) On Two Factors Affecting the Efficiency of MILP Models in Automated Cryptanalyses Shengyuan Xu, Xiutao Feng, Yongxing Wang
2023/195 (PDF ) A simpler alternative to Lucas–Lehmer–Riesel primality test Pavel Atnashev
2023/194 (PDF ) Hull Attacks on the Lattice Isomorphism Problem Léo Ducas, Shane Gibbons
2023/193 (PDF ) Traceable Policy-Based Signatures with Delegation Ismail Afia, Riham AlTawy
2023/192 (PDF ) Faithful Simulation of Randomized BFT Protocols on Block DAGs Hagit Attiya, Constantin Enea, Shafik Nassar
2023/191 (PDF ) Beyond the Blockchain Address: Zero-Knowledge Address Abstraction Sanghyeon Park, Jeong Hyuk Lee, Seunghwa Lee, Jung Hyun Chun, Hyeonmyeong Cho, MinGi Kim, Hyun Ki Cho, Soo-Mook Moon
2023/190 (PDF ) Practical Security Analysis of Zero-Knowledge Proof Circuits Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, Yu Feng
2023/189 (PDF ) tlock: Practical Timelock Encryption from Threshold BLS Nicolas Gailly, Kelsey Melissaris, Yolan Romailler
2023/188 (PDF ) Cryptanalysis of a key agreement scheme using determinants and rectangular matrices Daniel R. L. Brown
2023/187 (PDF ) Towards Modular Foundations for Protocol Security Lúcás Críostóir Meier
2023/186 (PDF ) Generic Models for Group Actions Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel
2023/185 (PDF ) The Last Yard: Foundational End-to-End Verification of High-Speed Cryptography Philipp G. Haselwarter, Benjamin Salling Hvass, Lasse Letager Hansen, Théo Winterhalter, Catalin Hritcu, Bas Spitters
2023/184 (PDF ) Quantum Linear Key-recovery Attacks Using the QFT André Schrottenloher
2023/183 (PDF ) Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality Mario Larangeira, Maxim Jourenko
2023/182 (PDF ) CAPYBARA and TSUBAKI: Verifiable Random Functions from Group Actions and Isogenies Yi-Fu Lai
2023/181 (PDF ) Fully Automated Differential-Linear Attacks against ARX Ciphers Emanuele Bellini, David Gerault, Juan Grados, Rusydi Makarim, Thomas Peyrin
2023/180 (PDF ) Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys Jinpeng Hou, Yansong Gao, Anmin Fu, Jie Chen, Xiaofeng Chen, Yuqing Zhang, Willy Susilo, Josef Pieprzyk
2023/179 (PDF ) TS-Hash: a lightweight cryptographic hash family based on Galois LFSRs Itay Bookstein, Boaz Tsaban
2023/178 (PDF ) Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers Siwei Chen, Mingming Zhu, Zejun Xiang, Runqing Xu, Xiangyong Zeng, Shasha Zhang
2023/177 (PDF ) The geometric interpretation of the Tate pairing and its applications Damien Robert
2023/176 (PDF ) A New Algebraic Approach to the Regular Syndrome Decoding Problem and Implications for PCG Constructions Pierre Briaud, Morten Øygarden
2023/175 (PDF ) Linear codes of Schubert type and quadratic public keys of Multivariate Cryptography Vasyl Ustimenko
2023/174 (PDF ) Improved Heuristics for Low-latency Implementations of Linear Layers Qun Liu, Zheng Zhao, Meiqin Wang
2023/173 (PDF ) Degree-$D$ Reverse Multiplication-Friendly Embeddings: Constructions and Applications Daniel Escudero, Cheng Hong, Hongqing Liu, Chaoping Xing, Chen Yuan
2023/172 (PDF ) Impossibility of Efficient Information-Theoretic Fuzzy Extraction Benjamin Fuller
2023/171 (PDF ) On Differential Privacy and Adaptive Data Analysis with Bounded Space Itai Dinur, Uri Stemmer, David P. Woodruff, Samson Zhou
2023/170 (PDF ) EKE Meets Tight Security in the Universally Composable Framework Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu
2023/169 (PDF ) Reputation-based state machine replication Muhong Huang, Runchao Han, Zhiqiang Du, Yanfang Fu, Liangxin Liu
2023/168 (PDF ) Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4 Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani, Lubjana Beshaj
2023/167 (PDF ) Modular Design of KEM-Based Authenticated Key Exchange Colin Boyd, Bor de Kock, Lise Millerjord
2023/166 (PDF ) Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption Brice Minaud, Michael Reichle
2023/165 (PDF ) Optimizing the depth of quantum implementations of linear layers Chengkai Zhu, Zhenyu Huang
2023/164 (PDF ) Fast Zero-Knowledge Argument System with Short Polynomial Using Direct Computation Frank Y.C. Lu
2023/163 (PDF ) Hardware-Software Co-design for Side-Channel Protected Neural Network Inference Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu
2023/162 (PDF ) AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE Wei Ao, Vishnu Naresh Boddeti
2023/161 (PDF ) Quantum Advantage from One-Way Functions Tomoyuki Morimae, Takashi Yamakawa
2023/160 (PDF ) Improving Gaudry-Schost algorithm for multi-dimensional discrete logarithm calculations: Implementations relevant to electronic voting and cash schemes Madhurima Mukhopadhyay
2023/159 (PDF ) Sequential Half-Aggregation of Lattice-Based Signatures Katharina Boudgoust, Akira Takahashi
2023/158 (PDF ) Enabling FrodoKEM on Embedded Devices Joppe W. Bos, Olivier Bronchain, Frank Custers, Joost Renes, Denise Verbakel, Christine van Vredendaal
2023/157 (PDF ) A Key-Recovery Attack against Mitaka in the t-Probing Model Thomas Prest
2023/156 (PDF ) Zero-Knowledge Functional Elementary Databases Xinxuan Zhang, Yi Deng
2023/155 (PDF ) More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo Ohta
2023/154 (PDF ) FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time Sisi Duan, Xin Wang, Haibin Zhang
2023/153 (PDF ) Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model Shuai Han, Shengli Liu, Dawu Gu
2023/152 (PDF ) Almost Tightly-Secure Re-Randomizable and Replayable CCA-secure Public Key Encryption Antonio Faonio, Dennis Hofheinz, Luigi Russo
2023/151 (PDF ) Analysis of the XSL Attack Coteanu Maria Gabriela, Țîflea Denisa-Ionela
2023/150 (PDF ) More Efficient Zero-Knowledge Protocols over $\mathbb{Z}_{2^k}$ via Galois Rings Fuchun Lin, Chaoping Xing, Yizhou Yao
2023/149 (PDF ) Demystifying Bootstrapping in Fully Homomorphic Encryption Ahmad Al Badawi, Yuriy Polyakov
2023/148 (PDF ) PassPro: A Secure Password-based Authentication Mechanism using SHF Ripon Patgiri, Laiphrakpam Dolendro Singh
2023/147 (PDF ) Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model) Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi
2023/146 (PDF ) Optimized Quantum Implementation of AES Da Lin, Zejun Xiang, Runqing Xu, Shasha Zhang, Xiangyong Zeng
2023/145 (PDF ) Combining MILP Modeling with Algebraic Bias Evaluation for Linear Mask Search: Improved Fast Correlation Attacks on SNOW Xinxin Gong, Yonglin Hao, Qingju Wang
2023/144 (PDF ) Aegis: Privacy-Preserving Market for Non-Fungible Tokens Hisham S. Galal, Amr M. Youssef
2023/143 (PDF ) A Practical Compiler for Attribute-Based Encryption: New Decentralized Constructions and More Marloes Venema
2023/142 (PDF ) On the Feasibility of Single-Trace Attacks on the Gaussian Sampler using a CDT Soundes Marzougui, Ievgan Kabin, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert
2023/141 (PDF ) A Secure Bandwidth-Efficient Treatment for Dropout-Resistant Time-Series Data Aggregation Reyhaneh Rabaninejad, Alexandros Bakas, Eugene Frimpong, Antonis Michalas
2023/140 (PDF ) Improving Convergence and Practicality of Slide-type Reductions Jianwei Li, Michael Walter
2023/139 (PDF ) Improved Estimation of Key Enumeration with Applications to Solving LWE Alessandro Budroni, Erik Mårtensson
2023/138 (PDF ) Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures Chloé Hébant, David Pointcheval, Robert Schädlich
2023/137 (PDF ) PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials Joakim Brorsson, Bernardo David, Lorenzo Gentile, Elena Pagnin, Paul Stankovski Wagner
2023/136 (PDF ) Compressed M-SIDH: An Instance of Compressed SIDH-like Schemes with Isogenies of Highly Composite Degrees Kaizhan Lin, Jianming Lin, Shiping Cai, Weize Wang, Chang-An Zhao
2023/135 (PDF ) Uncovering Vulnerabilities in Smartphone Cryptography: A Timing Analysis of the Bouncy Castle RSA Implementation Sarani Bhattacharya, Dilip Kumar Shanmugasundaram Veeraraghavan, Shivam Bhasin, Debdeep Mukhopadhyay
2023/134 (PDF ) Cryptanalysis of Reduced Round ChaCha- New Attack and Deeper Analysis Sabyasachi Dey, Hirendra Kumar Garai, Subhamoy Maitra
2023/133 (PDF ) Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Dhrubajyoti Ghosh, Peeyush Gupta
2023/132 (PDF ) Security analysis of DBTRU cryptosystem Alexandra Ciobanu, Marina Stefiuc
2023/130 (PDF ) Verifiable Distributed Aggregation Functions Hannah Davis, Christopher Patton, Mike Rosulek, Phillipp Schoppmann
2023/129 (PDF ) A Lower Bound on the Share Size in Evolving Secret Sharing Noam Mazor
2023/128 (PDF ) Cloning Games: A General Framework for Unclonable Primitives Prabhanjan Ananth, Fatih Kaleoglu, Qipeng Liu
2023/127 (PDF ) Sender-binding Key Encapsulation Rebecca Schwerdt, Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Jörn Müller-Quade, Astrid Ottenhues
2023/126 (PDF ) Privacy-Preserving Payment System With Verifiable Local Differential Privacy Danielle Movsowitz Davidow, Yacov Manevich, Eran Toch
2023/125 (PDF ) Ransomware data recovery techniques Irimia Alexandru-Vasile
2023/124 (PDF ) Security of Ethereum Layer 2s Ionuț Roșca, Alexandra-Ina Butnaru, Emil Simion
2023/123 (PDF ) A way of decrypting particular malware payloads found in MZPE files Tudorică Radu, Rares Radu, Emil Simion
2023/122 (PDF ) SoK: Privacy-Enhancing Technologies in Finance Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen
2023/121 (PDF ) Hashing to elliptic curves over highly $2$-adic fields $\mathbb{F}_{\!q}$ with $O(\log(q))$ operations in $\mathbb{F}_{\!q}$ Dmitrii Koshelev
2023/120 (PDF ) X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts Adam Caulfield, Nabiha Raza, Peizhao Hu
2023/119 (PDF ) Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant Locality Akin Ünal
2023/118 (PDF ) A New Generic Fault Resistant Masking Scheme using Error-Correcting Codes Chloé Gravouil
2023/117 (PDF ) Full-Round Differential Attack on ULC and LICID Block Ciphers Designed for IoT Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey
2023/116 (PDF ) A Cryptographic Layer for the Interoperability of CBDC and Cryptocurrency Ledgers Diego Castejon-Molina, Alberto del Amo Pastelero, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez
2023/115 (PDF ) Multi-User CDH Problems and the Concrete Security of NAXOS and HMQV Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud
2023/114 (PDF ) Credible, Optimal Auctions via Blockchains Tarun Chitra, Matheus V. X. Ferreira, Kshitij Kulkarni
2023/113 (PDF ) Homomorphic Sortition – Single Secret Leader Election for PoS Blockchains Luciano Freitas, Andrei Tonkikh, Adda-Akram Bendoukha, Sara Tucci-Piergiovanni, Renaud Sirdey, Oana Stan, Petr Kuznetsov
2023/112 (PDF ) Faster Amortized FHEW bootstrapping using Ring Automorphisms Gabrielle De Micheli, Duhyeong Kim, Daniele Micciancio, Adam Suhl
2023/111 (PDF ) An Attack on the LILLE Stream Cipher Vahid Amin-Ghafari, Mohammad Ali Orumiehchiha, Saeed Rostami
2023/110 (PDF ) VORSHA: A Variable-sized, One-way and Randomized Secure Hash Algorithm Ripon Patgiri, Laiphrakpam Dolendro Singh, Dalton Meitei Thounaojam
2023/109 (PDF ) SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations (Long Paper) Ling Sun, Meiqin Wang
2023/108 (PDF ) Grotto: Screaming fast $(2 + 1)$-PC for $\mathbb{Z}_{2^{n}}$ via (2, 2)-DPFs Kyle Storrier, Adithya Vadapalli, Allan Lyons, Ryan Henry
2023/107 (PDF ) The Tip5 Hash Function for Recursive STARKs Alan Szepieniec, Alexander Lemmens, Jan Ferdinand Sauer, Bobbin Threadbare, Al-Kindi
2023/106 (PDF ) Deuring for the People: Supersingular Elliptic Curves with Prescribed Endomorphism Ring in General Characteristic Jonathan Komada Eriksen, Lorenz Panny, Jana Sotáková, Mattia Veroni
2023/105 (PDF ) Gate-Level Masking of Streamlined NTRU Prime Decapsulation in Hardware Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu
2023/104 (PDF ) Optimizations and Trade-offs for HElib Anamaria Costache, Lea Nürnberger, Rachel Player
2023/103 (PDF ) Fair Delivery of Decentralised Randomness Beacon Runchao Han, Jiangshan Yu
2023/102 (PDF ) Cache-timing attack against HQC Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson
2023/101 (PDF ) Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160] Xiaoen Lin, Le He, Hongbo Yu
2023/100 (PDF ) Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs Ye Dong, Xiaojun Chen, Weizhan Jing, Kaiyun Li, Weiping Wang
2023/099 (PDF ) Scalable Multiparty Garbling Gabrielle Beck, Aarushi Goel, Aditya Hegde, Abhishek Jain, Zhengzhong Jin, Gabriel Kaptchuk
2023/098 (PDF ) Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek
2023/097 (PDF ) Circuit-Succinct Universally-Composable NIZKs with Updatable CRS Behzad Abdolmaleki, Noemi Glaeser, Sebastian Ramacher, Daniel Slamanig
2023/096 (PDF ) MPC With Delayed Parties Over Star-Like Networks Mariana Gama, Emad Heydari Beni, Emmanuela Orsini, Nigel P. Smart, Oliver Zajonc
2023/095 (PDF ) On TLS for the Internet of Things, in a Post Quantum world Michael Scott
2023/094 (PDF ) Portunus: Re-imagining access control in distributed systems Watson Ladd, Tanya Verma, Marloes Venema, Armando Faz Hernandez, Brendan McMillion, Avani Wildani, Nick Sullivan
2023/093 (PDF ) Automated Side-Channel Attacks using Black-Box Neural Architecture Search Pritha Gupta, Jan Peter Drees, Eyke Hüllermeier
2023/092 (PDF ) Estimation of Shor's Circuit for 2048-bit Integers based on Quantum Simulator Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro
2023/091 (PDF ) Satisfiability Modulo Finite Fields Alex Ozdemir, Gereon Kremer, Cesare Tinelli, Clark Barrett
2023/090 (PDF ) Unlimited Results: Breaking Firmware Encryption of ESP32-V3 Karim M. Abdellatif, Olivier Hériveaux, Adrian Thillard
2023/089 (PDF ) COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party Computation Benjamin Levy, Muhammad Ishaq, Ben Sherman, Lindsey Kennard, Ana Milanova, Vassilis Zikas
2023/088 (PDF ) Individual Cryptography Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej
2023/087 (PDF ) Verification of Correctness and Security Properties for CRYSTALS-KYBER Katharina Kreuzer
2023/086 (PDF ) Flyover: A Repayment Protocol for Fast Bitcoin Transfers over Federated Pegs Javier Álvarez Cid-Fuentes, Diego Angel Masini, Sergio Demian Lerner
2023/085 (PDF ) The Security of ChaCha20-Poly1305 in the Multi-user Setting Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson
2023/084 (PDF ) Single-tiered hybrid PoW consensus protocol to encourage decentralization in bitcoin GyuChol.Kim
2023/083 (PDF ) MacORAMa: Optimal Oblivious RAM with Integrity Surya Mathialagan, Neekon Vafa
2023/082 (PDF ) Specialized Proof of Confidential Knowledge (SPoCK) Tarak Ben Youssef, Riad S. Wahby
2023/081 (PDF ) Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean Lawlor
2023/080 (PDF ) PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries Dimitris Mouris, Pratik Sarkar, Nektarios Georgios Tsoutsos
2023/079 (PDF ) The challenges of proving solvency while preserving privacy. Tabacaru Robert, Anghel Florin, Asandoaiei David, Simion Emil
2023/077 (PDF ) Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal Ward Beullens, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2023/076 (PDF ) Bake It Till You Make It: Heat-induced Power Leakage from Masked Neural Networks Dev M. Mehta, Mohammad Hashemi, David S. Koblah, Domenic Forte, Fatemeh Ganji
2023/075 (PDF ) Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat Safa, Shahin Tajik
2023/074 (PDF ) Random Sources in Private Computation Geoffroy Couteau, Adi Rosén
2023/073 (PDF ) FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing Peng Yang, Zoe Lin Jiang, Shiqi Gao, Hongxiao Wang, Jun Zhou, Yangyiye Jin, Siu-Ming Yiu, Junbin Fang
2023/072 (PDF ) Non-Interactive Secure Computation of Inner-Product from LPN and LWE Geoffroy Couteau, Maryam Zarezadeh
2023/071 (PDF ) A security analysis comparison between Signal, WhatsApp and Telegram Corina-Elena Bogos, Răzvan Mocanu, Emil Simion
2023/069 (PDF ) On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions Prabhanjan Ananth, Zihan Hu, Henry Yuen
2023/068 (PDF ) Obfuscating Evasive Decision Trees Shalini Banerjee, Steven D. Galbraith, Giovanni Russello
2023/067 (PDF ) Blind signatures from Zero-knowledge arguments Paulo L. Barreto, Gustavo H. M. Zanon
2023/066 (PDF ) Plonkup scheme with multiple queries Alexandr Bulkin, Tim Dokchitser
2023/065 (PDF ) A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth Jakub Klemsa, Melek Önen, Yavuz Akın
2023/064 (PDF ) Computation of Hilbert class polynomials and modular polynomials from supersingular elliptic curves Antonin Leroux
2023/063 (PDF ) Threshold Signatures in the Multiverse Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
2023/062 (PDF ) Post-Quantum Secure Deterministic Wallet: Stateless, Hot/Cold Setting, and More Secure Mingxing Hu
2023/061 (PDF ) Key-and-Signature Compact Multi-Signatures for Blockchain: A Compiler with Realizations Shaoquan Jiang, Dima Alhadidi, Hamid Fazli Khojir
2023/060 (PDF ) Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols Edward Chen, Jinhao Zhu, Alex Ozdemir, Riad S. Wahby, Fraser Brown, Wenting Zheng
2023/059 (PDF ) Oil and Vinegar: Modern Parameters and Implementations Ward Beullens, Ming-Shing Chen, Shih-Hao Hung, Matthias J. Kannwischer, Bo-Yuan Peng, Cheng-Jhih Shih, Bo-Yin Yang
2023/058 (PDF ) SCALLOP: scaling the CSI-FiSh Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, Benjamin Wesolowski
2023/057 (PDF ) DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing Max Ammann, Lucca Hirschi, Steve Kremer
2023/056 (PDF ) Quantum Annealing for Subset Product and Noisy Subset Product Trey Li
2023/055 (PDF ) An analysis of a scheme proposed for electronic voting systems Nicu Neculache, Vlad-Andrei Petcu, Emil Simion
2023/054 (PDF ) On the Incoercibility of Digital Signatures Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia
2023/053 (PDF ) P3V: Privacy-Preserving Path Validation System for Multi-Authority Sliced Networks Weizhao Jin, Erik Kline, T. K. Satish Kumar, Lincoln Thurlow, Srivatsan Ravi
2023/052 (PDF ) Putting the Online Phase on a Diet: Covert Security from Short MACs Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2023/051 (PDF ) On the Scholz conjecture on addition chains Theophilus Agama
2023/050 (PDF ) Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach Alexandre Berzati, Andersson Calle Viera, Maya Chartouny, Steven Madec, Damien Vergnaud, David Vigilant
2023/049 (PDF ) Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao
2023/048 (PDF ) On-Line/Off-Line DCR-based Homomorphic Encryption and Applications Marc Joye
2023/047 (PDF ) Side-Channel Resistant Implementation Using Arbiter PUF Raja Adhithan RadhaKrishnan
2023/046 (PDF ) Cognitive Cryptography using behavioral features from linguistic-biometric data Jose Contreras
2023/045 (PDF ) A note on machine learning applied in ransomware detection Manuela Horduna, Simona-Maria Lăzărescu, Emil Simion
2023/044 (PDF ) Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets Mahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, Ari Juels
2023/043 (PDF ) RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks David Spielmann, Ognjen Glamocanin, Mirjana Stojilovic
2023/042 (PDF ) On Protecting SPHINCS+ Against Fault Attacks Aymeric Genêt
2023/041 (PDF ) Quantum-Safe Protocols and Application in Data Security of Medical Records Adrian-Daniel Stefan, Ionut-Petrisor Anghel, Emil Simion
2023/040 (PDF ) A Closer Look at the Chaotic Ring Oscillators based TRNG Design Shuqin Su, Bohan Yang, Vladimir Rožić, Mingyuan Yang, Min Zhu, Shaojun Wei, Leibo Liu
2023/039 (PDF ) Server-Supported Decryption for Mobile Devices Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk
2023/038 (PDF ) On the Amortized Communication Complexity of Byzantine Broadcast Atsuki Momose, Ling Ren, Elaine Shi, Jun Wan, Zhuolun Xiang
2023/037 (PDF ) Efficient Isogeny Proofs Using Generic Techniques Kelong Cong, Yi-Fu Lai, Shai Levin
2023/036 (PDF ) Differential analysis of the ternary hash function Troika Christina Boura, Margot Funk, Yann Rotella
2023/035 (PDF ) A Deep Analysis of two Glitch-Free Hardware Masking Schemes SESYM and LMDPL Nicolai Müller, Daniel Lammers, Amir Moradi
2023/034 (PDF ) PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries Jannik Zeitschner, Nicolai Müller, Amir Moradi
2023/033 (PDF ) Fast amortized KZG proofs Dankrad Feist, Dmitry Khovratovich
2023/032 (PDF ) A Gentle Tutorial for Lattice-Based Cryptanalysis Joseph Surin, Shaanan Cohney
2023/031 (PDF ) Sassafras: Efficient Batch Single Leader Election Jeffrey Burdges, Elizabeth Crites, Handan Kılınç Alper, Alistair Stewart, Sergey Vasilyev
2023/030 (PDF ) Earn While You Reveal: Private Set Intersection that Rewards Participants Aydin Abadi
2023/029 (PDF ) Public Verification for Private Hash Matching Sarah Scheffler, Anunay Kulshrestha, Jonathan Mayer
2023/028 (PDF ) Information-Theoretic Distributed Point Functions Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov
2023/027 (PDF ) Verification of the (1–δ)-Correctness Proof of CRYSTALS-KYBER with Number Theoretic Transform Katharina Kreuzer
2023/026 (PDF ) Fermat Factorization in the Wild Hanno Böck
2023/025 (PDF ) Quantum Attacks on Beyond-Birthday-Bound MACs Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao
2023/024 (PDF ) It Runs and it Hides: A Function-Hiding Construction for Private-Key Multi-Input Functional Encryption Alexandros Bakas, Antonis Michalas
2023/023 (PDF ) New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
2023/022 (PDF ) Recommendation for a holistic secure embedded ISA extension Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu
2023/021 (PDF ) DLFA: Deep Learning based Fault Analysis against Block Ciphers Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng, Shengmin Xu, Jiangshan Long
2023/020 (PDF ) The Scholz conjecture on addition chain is true for infinitely many integers with ℓ(2n) = ℓ(n) Amadou TALL
2023/019 (PDF ) Autoencoder-enabled Model Portability for Reducing Hyperparameter Tuning Efforts in Side-channel Analysis Marina Krček, Guilherme Perin
2023/018 (PDF ) New record in the number of qubits for a quantum implementation of AES Zhenqiang Li, Fei Gao, Sujuan Qin, Qiaoyan Wen
2023/017 (PDF ) Cryptographic Group and Semigroup Actions Oliver W. Gnilke, Jens Zumbrägel
2023/016 (PDF ) Simple Threshold (Fully Homomorphic) Encryption From LWE With Polynomial Modulus Katharina Boudgoust, Peter Scholl
2023/015 (PDF ) Unconditionally Secure NIZK in the Fine-Grained Setting Yuyu Wang, Jiaxin Pan
2023/014 (PDF ) Amortized Bootstrapping Revisited: Simpler, Asymptotically-faster, Implemented Antonio Guimarães, Hilder V. L. Pereira, Barry van Leeuwen
2023/013 (PDF ) M-SIDH and MD-SIDH: countering SIDH attacks by masking information Tako Boris Fouotsa, Tomoki Moriya, Christophe Petit
2023/012 (PDF ) Delegated Private Matching for Compute Dimitris Mouris, Daniel Masny, Ni Trieu, Shubho Sengupta, Prasad Buddhavarapu, Benjamin Case
2023/011 (PDF ) Using the RSA or RSA-B accumulator in anonymous credential schemes Sietse Ringers
2023/010 (PDF ) Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation Martin Brain, Carlos Cid, Rachel Player, Wrenna Robson
2023/009 (PDF ) Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini
2023/008 (PDF ) AutoPOI: Automated Points Of Interest Selection for Side-channel Analysis Mick G.D. Remmerswaal, Lichao Wu, Sébastien Tiran, Nele Mentens
2023/007 (PDF ) Post-Quantum Security of Key Encapsulation Mechanism against CCA Attacks with a Single Decapsulation Query Haodong Jiang, Zhi Ma, Zhenfeng Zhang
2023/006 (PDF ) Exploring multi-task learning in the context of masked AES implementations Thomas Marquet, Elisabeth Oswald
2023/005 (PDF ) Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud Shuai Cheng, Shengke Zeng, Haoyu Zeng, Yawen Feng, Jixiang Xiao
2023/004 (PDF ) Quantum Artificial Intelligence on Cryptanalysis Hyunji Kim, Sejin Lim, Anubhab Baksi, Dukyoung Kim, Seyoung Yoon, Kyungbae Jang, Hwajeong Seo
2023/003 (PDF ) How to Use Sigstore without Sigstore Yan-Cheng Chang
2023/002 (PDF ) Ring Verifiable Random Functions and Zero-Knowledge Continuations Jeffrey Burdges, Oana Ciobotaru, Handan Kılınç Alper, Alistair Stewart, Sergey Vasilyev
2023/001 (PDF ) Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions Mohammad Hashemi, Domenic Forte, Fatemeh Ganji
[ Cryptology ePrint archive ]