Cryptology ePrint Archive: Listing for 2024
Regex
2024/2100 (PDF ) Compact Key Storage in the Standard Model Yevgeniy Dodis, Daniel Jost
2024/2099 (PDF ) MicroNova: Folding-based arguments with efficient (on-chain) verification Jiaxing Zhao, Srinath Setty, Weidong Cui, Greg Zaverucha
2024/2098 (PDF ) Asymptotically Optimal Adaptive Asynchronous Common Coin and DKG with Silent Setup Hanwen Feng, Qiang Tang
2024/2096 (PDF ) Efficient Multi-party Private Set Union Resistant to Maximum Collusion Attacks Qiang Liu, Joon-Woo Lee
2024/2095 (PDF ) A Note on the Minimality of One-Way Functions in Post-Quantum Cryptography Sam Buxbaum, Mohammad Mahmoody
2024/2094 (PDF ) Secure Vault scheme in the Cloud Operating Model Rishiraj Bhattacharyya, Avradip Mandal, Meghna Sengupta
2024/2093 (PDF ) Exploring Large Integer Multiplication for Cryptography Targeting In-Memory Computing Florian Krieger, Florian Hirner, Sujoy Sinha Roy
2024/2092 (PDF ) PQConnect: Automated Post-Quantum End-to-End Tunnels Daniel J. Bernstein, Tanja Lange, Jonathan Levin, Bo-Yin Yang
2024/2091 (PDF ) Encrypted Multi-map that Hides Query, Access, and Volume Patterns Alexandra Boldyreva, Tianxin Tang
2024/2090 (PDF ) Breaking the Shadow: Key Recovery Attack on Full-Round Shadow Block Ciphers with Minimal Data Anda Che, Shahram Rasoolzadeh
2024/2089 (PDF ) Computing the Hermite Normal Form: A Survey Leon Damer
2024/2088 (PDF ) An Embedded Domain-Specific Language for Using One-Hot Vectors and Binary Matrices in Secure Computation Protocols Andrei Lapets
2024/2087 (PDF ) Post-Quantum Privacy for Traceable Receipt-Free Encryption Paola de Perthuis, Thomas Peters
2024/2086 (PDF ) How To Think About End-To-End Encryption and AI: Training, Processing, Disclosure, and Consent Mallory Knodel, Andrés Fábrega, Daniella Ferrari, Jacob Leiken, Betty Li Hou, Derek Yen, Sam de Alfaro, Kyunghyun Cho, Sunoo Park
2024/2085 (PDF ) Definition of End-to-end Encryption Mallory Knodel, Sofía Celi, Olaf Kolkman, Gurshabad Grover
2024/2084 (PDF ) Zero Knowledge Memory-Checking Techniques for Stacks and Queues Alexander Frolov
2024/2083 (PDF ) Fully Hybrid TLSv1.3 in WolfSSL on Cortex-M4 Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani
2024/2082 (PDF ) ClusterGuard: Secure Clustered Aggregation for Federated Learning with Robustness Yulin Zhao, Zhiguo Wan, Zhangshuang Guan, Guannan Li, Miao Guo
2024/2081 (PDF ) Generalized Cryptanalysis of Cubic Pell RSA Hao Kang, Mengce Zheng
2024/2080 (PDF ) Improved Lattice-Based Attack on Mersenne Low Hamming Ratio Search Problem Mengce Zheng, Wei Yan
2024/2079 (PDF ) Solving AES-SAT Using Side-Channel Hints: A Practical Assessment Elena Dubrova
2024/2078 (PDF ) Strongly Secure Universal Thresholdizer Ehsan Ebrahimi, Anshu Yadav
2024/2077 (PDF ) Report on evaluation of KpqC Round-2 candidates Daniel J. Bernstein, Jolijn Cottaar, Emanuele Di Giandomenico, Kathrin Hövelmanns, Andreas Hülsing, Mikhail Kudinov, Tanja Lange, Mairon Mahzoun, Matthias Meijers, Alex Pellegrini, Alberto Ravagnani, Silvia Ritsch, Sven Schäge, Tianxin Tang, Monika Trimoska, Marc Vorstermans, Fiona Johanna Weber
2024/2076 (PDF ) Blind Signatures from Proofs of Inequality Michael Klooß, Michael Reichle
2024/2075 (PDF ) Tightly-Secure Blind Signatures in Pairing-Free Groups Nicholas Brandt, Dennis Hofheinz, Michael Klooß, Michael Reichle
2024/2074 (PDF ) EQSIGN: Practical Digital Signatures from the Non-Abelian Hidden Subgroup Problem and Information Theoretic Equivocation Samuel Lavery
2024/2073 (PDF ) Succinct Homomorphic MACs from Groups and Applications Yuval Ishai, Hanjun Li, Huijia Lin
2024/2072 (PDF ) Beyond the 1/2 Bound: On the Theory and Practice of Biprimality Tests ChihYun Chuang, IHung Hsu, TingFang Lee
2024/2071 (PDF ) Perfectly Secure Fluid MPC with Abort and Linear Communication Complexity Alexander Bienstock, Daniel Escudero, Antigoni Polychroniadou
2024/2070 (PDF ) Sneaking up the Ranks: Partial Key Exposure Attacks on Rank-Based Schemes Giuseppe D'Alconzo, Andre Esser, Andrea Gangemi, Carlo Sanna
2024/2069 (PDF ) A Prompt Framework for LLM-Based Fully Automated Simple Power Analysis on Cryptosystems Wenquan Zhou, An Wang, Yaoling Ding, Congming Wei, Jingqi Zhang, Jiakun Li
2024/2068 (PDF ) Weightwise Almost Perfectly Balanced Functions, Construction From A Permutation Group Action View Deepak Kumar Dalai, Krishna Mallick, Pierrick Méaux
2024/2067 (PDF ) Bypassing the characteristic bound in logUp Liam Eagen, Ulrich Haböck
2024/2066 (PDF ) COCO: Coconuts and Oblivious Computations for Orthogonal Authentication Yamya Reiki
2024/2065 (PDF ) Partial Exposure Attacks Against a Family of RSA-like Cryptosystems George Teseleanu
2024/2064 (PDF ) (Deep) Learning about Elliptic Curve Cryptography Diana Maimut, Alexandru Cristian Matei, George Teseleanu
2024/2063 (PDF ) The Number of the Beast: Reducing Additions in Fast Matrix Multiplication Algorithms for Dimensions up to 666 Erik Mårtensson, Paul Stankovski Wagner
2024/2062 (PDF ) Two Halves Make a Whole: How to Reconcile Soundness and Robustness in Watermarking for Large Language Models Lei Fan, Chenhao Tang, Weicheng Yang, Hong-Sheng Zhou
2024/2061 (PDF ) Programming Equation Systems of Arithmetization-Oriented Primitives with Constraints Mengyu Chang, Kexin Qiao, Junjie Cheng, Changhai Ou, Liehuang Zhu
2024/2060 (PDF ) "These results must be false": A usability evaluation of constant-time analysis tools Marcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar
2024/2059 (PDF ) Minimizing the Use of the Honest Majority in YOSO MPC with Guaranteed Output Delivery Rishabh Bhadauria, James Hsin-yu Chiang, Divya Ravi, Jure Sternad, Sophia Yakoubov
2024/2058 (PDF ) Learning with Errors from Nonassociative Algebras Andrew Mendelsohn, Cong Ling
2024/2057 (PDF ) Leveraging remote attestation APIs for secure image sharing in messaging apps Joel Samper, Bernardo Ferreira
2024/2056 (PDF ) Exact Template Attacks with Spectral Computation Meriem Mahar, Mammar Ouladj, Sylvain Guilley, Hacène Belbachir, Farid Mokrane
2024/2055 (PDF ) Zeroed Out: Cryptanalysis of Weak PRFs in Alternating Moduli Irati Manterola Ayala, Håvard Raddum
2024/2054 (PDF ) Greedy Algorithm for Representative Sets: Applications to IVLBC and GIFT-64 in Impossible Differential Attack Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey
2024/2053 (PDF ) HCTR+: An Optimally Secure TBC-based Accordion Mode Nilanjan Datta, Avijit Dutta, Shibam Ghosh, Eik List, Hrithik Nandi
2024/2052 (PDF ) Compact Lattice Signatures via Iterative Rejection Sampling Joel Gärtner
2024/2051 (PDF ) Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM Alexandre Berzati, Andersson Calle Viera, Maya Chartouny, David Vigilant
2024/2050 (PDF ) Simulation Secure Multi-Input Quadratic Functional Encryption: Applications to Differential Privacy Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie
2024/2049 (PDF ) BBB Secure Arbitrary Length Tweak TBC from n-bit Block Ciphers Arghya Bhattacharjee, Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Shibam Ghosh, Sougata Mandal
2024/2048 (PDF ) TinyLabels: How to Compress Garbled Circuit Input Labels, Efficiently Marian Dietz, Hanjun Li, Huijia Lin
2024/2047 (PDF ) Breaking and Provably Restoring Authentication: A Formal Analysis of SPDM 1.2 including Cross-Protocol Attacks Cas Cremers, Alexander Dax, Aurora Naska
2024/2046 (PDF ) Decompressing Dilithium's Public Key with Fewer Signatures Using Side Channel Analysis Ruize Wang, Joel Gärtner, Elena Dubrova
2024/2045 (PDF ) Observations on TETRA Encryption Algorithm TEA-3 Jens Alich, Amund Askeland, Subhadeep Banik, Tim Beyne, Anne Canteaut, Patrick Felke, Gregor Leander, Willi Meier, Lukas Stennes
2024/2044 (PDF ) Cryptographic Commitments on Anonymizable Data Xavier Bultel, Céline Chevalier, Charlène Jojon, Diandian Liu, Benjamin Nguyen
2024/2043 (PDF ) Efficient Error-tolerant Side-channel Attacks on GPV Signatures Based on Ordinary Least Squares Regression Jaesang Noh, Hyunseo Choi, Dongwoo Han, Dong-Joon Shin
2024/2042 (PDF ) A Note on Isogeny Group Action-Based Pseudorandom Functions Yi-Fu Lai
2024/2041 (PDF ) SeaSearch: Secure and Efficient Selection Queries Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Komal Kumari, Swagnik Roychoudhury
2024/2040 (PDF ) Verified Foundations for Differential Privacy Markus de Medeiros, Muhammad Naveed, Tancrède Lepoint, Temesghen Kahsai, Tristan Ravitch, Stefan Zetzsche, Anjali Joshi, Joseph Tassarotti, Aws Albarghouthi, Jean-Baptiste Tristan
2024/2039 (PDF ) Revisiting Boomerang Attacks on Lightweight ARX and AND-RX Ciphers with Applications to KATAN, SIMON and CHAM Li Yu, Je Sen Teh
2024/2038 (PDF ) Adaptive Special Soundness: Improved Knowledge Extraction by Adaptive Useful Challenge Sampling Thomas Attema, Michael Klooß, Russell W. F. Lai, Pavlo Yatsyna
2024/2037 (PDF ) Multilateral Trade Credit Set-off in MPC via Graph Anonymization and Network Simplex Enrico Bottazzi, Chan Nam Ngo, Masato Tsutsumi
2024/2036 (PDF ) Simple is COOL: Graded Dispersal and its Applications for Byzantine Fault Tolerance Ittai Abraham, Gilad Asharov, Anirudh Chandramouli
2024/2035 (PDF ) A Note on P $\neq$ NP Ping Wang
2024/2034 (PDF ) The Jacobi Factoring Circuit: Quantum Factoring with Near-Linear Gates and Sublinear Space and Depth Gregory D. Kahanamoku-Meyer, Seyoon Ragavan, Vinod Vaikuntanathan, Katherine Van Kirk
2024/2033 (PDF ) General Practical Cryptanalysis of the Sum of Round-Reduced Block Ciphers and ZIP-AES Antonio Flórez-Gutiérrez, Lorenzo Grassi, Gregor Leander, Ferdinand Sibleyras, Yosuke Todo
2024/2032 (PDF ) Carousel: Fully Homomorphic Encryption with Bootstrapping over Automorphism Group Intak Hwang, Seonhong Min, Yongsoo Song
2024/2031 (PDF ) Covert 19th century political intrigues of Tenerife nobility revealed by cryptanalyzing an encrypted letter Jezabel Molina-Gil, Cándido Caballero-Gil, Judit Gutiérrez-de-Armas, Moti Yung
2024/2030 (PDF ) Security Analysis of ASCON Cipher under Persistent Faults Madhurima Das, Bodhisatwa Mazumdar
2024/2029 (PDF ) NLAT: the NonLinear Approximation Table of Vectorial Boolean Mappings Jorge Nakahara Jr
2024/2028 (PDF ) Qubit Optimized Quantum Implementation of SLIM Hasan Ozgur Cildiroglu, Oguz Yayla
2024/2027 (PDF ) Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems Zhongming Wang, Tao Xiang, Xiaoguo Li, Biwen Chen, Guomin Yang, Chuan Ma, Robert H. Deng
2024/2026 (PDF ) Orbweaver: Succinct Linear Functional Commitments from Lattices Ben Fisch, Zeyu Liu, Psi Vesely
2024/2025 (PDF ) Mira: Efficient Folding for Pairing-based Arguments Josh Beal, Ben Fisch
2024/2024 (PDF ) Hash-Prune-Invert: Improved Differentially Private Heavy-Hitter Detection in the Two-Server Model Borja Balle, James Bell, Albert Cheu, Adria Gascon, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Thomas Steinke
2024/2023 (PDF ) An Abstract Multi-Forking Lemma Charanjit S Jutla
2024/2022 (PDF ) The Revisited Hidden Weight Bit Function Pierrick Méaux, Tim Seuré, Deng Tang
2024/2021 (PDF ) PrivQuant: Communication-Efficient Private Inference with Quantized Network/Protocol Co-Optimization Tianshi Xu, Shuzhang Zhong, Wenxuan Zeng, Runsheng Wang, Meng Li
2024/2020 (PDF ) Ring Ring! Who's There? A Privacy Preserving Mobile Number Search Akshit Aggarwal
2024/2019 (PDF ) Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key, Revisited: Consistency, Outsider Strong Unforgeability, and Generic Construction Keita Emura
2024/2018 (PDF ) On the BUFF Security of ECDSA with Key Recovery Keita Emura
2024/2017 (PDF ) Byzantine Reliable Broadcast in Wireless Networks Hao Lu, Jian Liu, Kui Ren
2024/2016 (PDF ) The Existence of Quantum One-Way Functions Ping Wang, Yikang Lei, Zishen Shen, Fangguo Zhang
2024/2015 (PDF ) Universal SNARGs for NP from Proofs of Correctness Zhengzhong Jin, Yael Tauman Kalai, Alex Lombardi, Surya Mathialagan
2024/2014 (PDF ) On the Traceability of Group Signatures: Uncorrupted User Must Exist Keita Emura
2024/2013 (PDF ) Crescent: Stronger Privacy for Existing Credentials Christian Paquin, Guru-Vamsi Policharla, Greg Zaverucha
2024/2012 (PDF ) GraSS: Graph-based Similarity Search on Encrypted Query Duhyeong Kim, Yujin Nam, Wen Wang, Huijing Gong, Ishwar Bhati, Rosario Cammarota, Tajana S. Rosing, Mariano Tepper, Theodore L. Willke
2024/2011 (PDF ) Honest-Majority Threshold ECDSA with Batch Generation of Key-Independent Presignatures Jonathan Katz, Antoine Urban
2024/2010 (PDF ) Anonymous credentials from ECDSA Matteo Frigo, abhi shelat
2024/2009 (PDF ) The Mis/Dis-information Problem is Hard to Solve Gregory Hagen, Reihaneh Safavi-Naini, Moti Yung
2024/2008 (PDF ) PrivCirNet: Efficient Private Inference via Block Circulant Transformation Tianshi Xu, Lemeng Wu, Runsheng Wang, Meng Li
2024/2007 (PDF ) A Combinatorial Attack on Ternary Sparse Learning with Errors (sLWE) Abul Kalam, Santanu Sarkar, Willi Meier
2024/2006 (PDF ) Data Decryption and Analysis of Note-Taking Applications Seyoung Yoon, Myungseo Park, Kyungbae Jang, Hwajeong Seo
2024/2005 (PDF ) Post-Quantum Secure Channel Protocols for eSIMs Luk Bettale, Emmanuelle Dottax, Laurent Grémy
2024/2004 (PDF ) Regev's attack on hyperelliptic cryptosystems Razvan Barbulescu, Gaetan Bisson
2024/2003 (PDF ) Exploring the Optimal Differential Characteristics of SM4 (Full Version): Improving Automatic Search by Including Human Insights Bingqing Li, Ling Sun
2024/2002 (PDF ) Improving Differential-Neural Distinguisher For Simeck Family Xue Yuan, Qichun Wang
2024/2001 (PDF ) Xiezhi: Toward Succinct Proofs of Solvency Youwei Deng, Jeremy Clark
2024/2000 (PDF ) Evasive LWE Assumptions: Definitions, Classes, and Counterexamples Chris Brzuska, Akin Ünal, Ivy K. Y. Woo
2024/1999 (PDF ) Multivariate Encryptions with LL’ perturbations - Is it possible to repair HFE in encryption? - Jacques Patarin, Pierre Varjabedian
2024/1998 (PDF ) Impossible Differential Automation: Model Generation and New Techniques Emanuele Bellini, Paul Huynh, David Gerault, Andrea Visconti, Alessandro De Piccoli, Simone Pelizzola
2024/1997 (PDF ) On format preserving encryption with nonce Alexander Maximov, Jukka Ylitalo
2024/1996 (PDF ) A Framework for Generating S-Box Circuits with Boyar-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin Yongjin Jeon, Seungjun Baek, Giyoon Kim, Jongsung Kim
2024/1995 (PDF ) BitVM: Quasi-Turing Complete Computation on Bitcoin Lukas Aumayr, Zeta Avarikioti, Robin Linus, Matteo Maffei, Andrea Pelosi, Christos Stefo, Alexei Zamyatin
2024/1994 (PDF ) Token-Based Key Exchange - Non-Interactive Key Exchange meets Attribute-Based Encryption Elsie Mestl Fondevik, Kristian Gjøsteen
2024/1993 (PDF ) BOIL: Proof-Carrying Data from Accumulation of Correlated Holographic IOPs Tohru Kohrita, Maksim Nikolaev, Javier Silva
2024/1992 (PDF ) Improved Quantum Linear Attacks and Application to CAST Kaveh Bashiri, Xavier Bonnetain, Akinori Hosoyamada, Nathalie Lang, André Schrottenloher
2024/1991 (PDF ) CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction Song Bian, Zian Zhao, Ruiyu Shen, Zhou Zhang, Ran Mao, Dawei Li, Yizhong Liu, Masaki Waga, Kohei Suenaga, Zhenyu Guan, Jiafeng Hua, Yier Jin, Jianwei Liu
2024/1990 (PDF ) How To Scale Multi-Party Computation Marcel Keller
2024/1989 (PDF ) Revisiting OKVS-based OPRF and PSI: Cryptanalysis and Better Construction Kyoohyung Han, Seongkwang Kim, Byeonghak Lee, Yongha Son
2024/1988 (PDF ) BitGC: Garbled Circuits with 1 Bit per Gate Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu
2024/1986 (PDF ) Improved Quantum Analysis of ARIA Yujin Oh, Kyungbae Jang, Hwajeong Seo
2024/1985 (PDF ) Endomorphisms for Faster Cryptography on Elliptic Curves of Moderate CM Discriminants Dimitri Koshelev, Antonio Sanso
2024/1984 (PDF ) Low Communication Threshold Fully Homomorphic Encryption Alain Passelègue, Damien Stehlé
2024/1983 (PDF ) UTRA: Universe Token Reusability Attack and Verifiable Delegatable Order-Revealing Encryption Jaehwan Park, Hyeonbum Lee, Junbeom Hur, Jae Hong Seo, Doowon Kim
2024/1982 (PDF ) New Results in Quantum Analysis of LED: Featuring One and Two Oracle Attacks Siyi Wang, Kyungbae Jang, Anubhab Baksi, Sumanta Chakraborty, Bryan Lee, Anupam Chattopadhyay, Hwajeong Seo
2024/1981 (PDF ) Shutter Network: Private Transactions from Threshold Cryptography Stefan Dziembowski, Sebastian Faust, Jannik Luhn
2024/1980 (PDF ) Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs Amit Singh Bhati, Elena Andreeva, Simon Müller, Damian Vizar
2024/1979 (PDF ) On the Security of LWE-based KEMs under Various Distributions: A Case Study of Kyber Mingyao Shao, Yuejun Liu, Yongbin Zhou, Yan Shao
2024/1978 (PDF ) µLAM: A LLM-Powered Assistant for Real-Time Micro-architectural Attack Detection and Mitigation Upasana Mandal, Shubhi Shukla, Ayushi Rastogi, Sarani Bhattacharya, Debdeep Mukhopadhyay
2024/1977 (PDF ) Bounded CCA2 Secure Proxy Re-encryption Based on Kyber Shingo Sato, Junji Shikata
2024/1976 (PDF ) HI-CKKS: Is High-Throughput Neglected? Reimagining CKKS Efficiency with Parallelism Fuyuan Chen, Jiankuo Dong, Xiaoyu Hu, Zhenjiang Dong, Wangchen Dai
2024/1975 (PDF ) Quadratic Modelings of Syndrome Decoding Alessio Caminata, Ryann Cartor, Alessio Meneghetti, Rocco Mora, Alex Pellegrini
2024/1974 (PDF ) Efficient and Practical Multi-party Private Set Intersection Cardinality Protocol Shengzhe Meng, Xiaodong Wang, Zijie Lu, Bei Liang
2024/1973 (PDF ) Privately Compute the Item with Maximal Weight Sum in Set Intersection Hongyuan Cai, Xiaodong Wang, Zijie Lu, Bei Liang
2024/1972 (PDF ) RoK, Paper, SISsors – Toolkit for Lattice-based Succinct Arguments Michael Klooß, Russell W. F. Lai, Ngoc Khanh Nguyen, Michał Osadnik
2024/1971 (PDF ) Further Connections Between Isogenies of Supersingular Curves and Bruhat-Tits Trees Steven Galbraith, Valerie Gilchrist, Shai Levin, Ari Markowitz
2024/1970 (PDF ) Scribe: Low-memory SNARKs via Read-Write Streaming Anubhav Baweja, Pratyush Mishra, Tushar Mopuri, Karan Newatia, Steve Wang
2024/1969 (PDF ) SoK: Security of the Ascon Modes Charlotte Lefevre, Bart Mennink
2024/1968 (PDF ) SoK: Pseudorandom Generation for Masked Cryptographic Implementation Rei Ueno, Naofumi Homma, Kazuhiko Minematsu
2024/1967 (PDF ) Analysis of REDOG: The Pad Thai Attack Alex Pellegrini, Marc Vorstermans
2024/1966 (PDF ) Efficient Succinct Zero-Knowledge Arguments in the CL Framework Agathe Beaugrand, Guilhem Castagnos, Fabien Laguillaumie
2024/1965 (PDF ) Onion Franking: Abuse Reports for Mix-Based Private Messaging Matthew Gregoire, Margaret Pierce, Saba Eskandarian
2024/1964 (PDF ) Lova: Lattice-Based Folding Scheme from Unstructured Lattices Giacomo Fenzi, Christian Knabenhans, Ngoc Khanh Nguyen, Duc Tu Pham
2024/1963 (PDF ) Proof of Time: A Method for Verifiable Temporal Commitments Without Timestamp Disclosure Alexander John Lee
2024/1962 (PDF ) uKNIT: Breaking Round-alignment for Cipher Design -- Featuring uKNIT-BC, an Ultra Low-Latency Block Cipher Kai Hu, Mustafa Khairallah, Thomas Peyrin, Quan Quan Tan
2024/1961 (PDF ) On the (Im)possibility of Game-Theoretically Fair Leader Election Protocols Ohad Klein, Ilan Komargodski, Chenzhi Zhu
2024/1960 (PDF ) Share the MAYO: thresholdizing MAYO Sofia Celi, Daniel Escudero, Guilhem Niot
2024/1959 (PDF ) SoK: Privacy-Preserving Transactions in Blockchains Foteini Baldimtsi, Kostas Kryptos Chalkias, Varun Madathil, Arnab Roy
2024/1958 (PDF ) M-Sel: A Message Selection Functional Encryption from Simple Tools Ahmad Khoureich Ka
2024/1957 (PDF ) NICE-PAKE: On the Security of KEM-Based PAKE Constructions without Ideal Ciphers Nouri Alnahawi, Jacob Alperin-Sheriff, Daniel Apon, Gareth T. Davies, Alexander Wiesmaier
2024/1956 (PDF ) MultiReg-FE: Registered FE for Unbounded Inner-Product and Attribute-Weighted Sums Qiuyan Du, Qiaohan Chu, Jie Chen, Man Ho Au, Debiao He
2024/1955 (PDF ) Gold OPRF: Post-Quantum Oblivious Power-Residue PRF Yibin Yang, Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin
2024/1954 (PDF ) A Complete Characterization of One-More Assumptions In the Algebraic Group Model Jake Januzelli, Jiayu Xu
2024/1953 (PDF ) Truncation Untangled: Scaling Fixed-Point Arithmetic for Privacy-Preserving Machine Learning to Large Models and Datasets Christopher Harth-Kitzerow, Ajith Suresh, Georg Carle
2024/1952 (PDF ) Worst-Case Lattice Sampler with Truncated Gadgets and Applications Corentin Jeudy, Olivier Sanders
2024/1951 (PDF ) Vote&Check: Secure Postal Voting with Reduced Trust Assumptions Véronique Cortier, Alexandre Debant, Pierrick Gaudry, Léo Louistisserand
2024/1950 (PDF ) Two-Round 2PC ECDSA at the Cost of 1 OLE Michael Adjedj, Constantin Blokh, Geoffroy Couteau, Arik Galansky, Antoine Joux, Nikolaos Makriyannis
2024/1949 (PDF ) Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for Deep Learning-based Side-Channel Analysis Zhao Minghui, Trevor Yap
2024/1948 (PDF ) ARK: Adaptive Rotation Key Management for Fully Homomorphic Encryption Targeting Memory Efficient Deep Learning Inference Jia-Lin Chan, Wai-Kong Lee, Denis C.-K Wong, Wun-She Yap, Bok-Min Goi
2024/1947 (PDF ) One-More Unforgeability for Multi- and Threshold Signatures Sela Navot, Stefano Tessaro
2024/1946 (PDF ) Distributed Differentially Private Data Analytics via Secure Sketching Jakob Burkhardt, Hannah Keller, Claudio Orlandi, Chris Schwiegelshohn
2024/1945 (PDF ) Multi-Client Attribute-Based and Predicate Encryption from Standard Assumptions David Pointcheval, Robert Schädlich
2024/1944 (PDF ) SoK: The apprentice guide to automated fault injection simulation for security evaluation Asmita Adhikary, Giacomo Tommaso Petrucci, Philippe Tanguy, Vianney Lapôtre, Ileana Buhan
2024/1942 (PDF ) DGMT: A Fully Dynamic Group Signature From Symmetric-key Primitives Mojtaba Fadavi, Sabyasachi Karati, Aylar Erfanian, Reihaneh Safavi-Naini
2024/1941 (PDF ) Universally Composable Server-Supported Signatures for Smartphones Nikita Snetkov, Jelizaveta Vakarjuk, Peeter Laud
2024/1940 (PDF ) A Comprehensive Review of Post-Quantum Cryptography: Challenges and Advances Seyed MohammadReza Hosseini, Hossein Pilaram
2024/1939 (PDF ) Machine Learning-Based Detection of Glitch Attacks in Clock Signal Data Asier Gambra, Durba Chatterjee, Unai Rioja, Igor Armendariz, Lejla Batina
2024/1938 (PDF ) SoK: On the Security Goals of Key Transparency Systems Nicholas Brandt, Mia Filić, Sam A. Markelon
2024/1937 (PDF ) Asynchronous Byzantine Consensus with Trusted Monotonic Counters Yackolley Amoussou-Guenou, Maurice Herlihy, Maria Potop Butucaru
2024/1936 (PDF ) Free Linear Online Phase for Secure Multiparty Shuffle Jiacheng Gao, Yuan Zhang, Sheng Zhong
2024/1935 (PDF ) RevoLUT : Rust Efficient Versatile Oblivious Look-Up-Tables Sofiane Azogagh, Zelma Aubin Birba, Marc-Olivier Killijian, Félix Larose-Gervais, Sébastien Gambs
2024/1934 (PDF ) Quantum One-Time Programs, Revisited Aparna Gupte, Jiahui Liu, Justin Raizes, Bhaskar Roberts, Vinod Vaikuntanathan
2024/1933 (PDF ) On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms George Teseleanu
2024/1932 (PDF ) On Witness Encryption and Laconic Zero-Knowledge Arguments Yanyi Liu, Noam Mazor, Rafael Pass
2024/1931 (PDF ) On White-Box Learning and Public-Key Encryption Yanyi Liu, Noam Mazor, Rafael Pass
2024/1930 (PDF ) Algebraic Zero Knowledge Contingent Payment Javier Gomez-Martinez, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez, Dario Fiore
2024/1929 (PDF ) LightCROSS: A Secure and Memory Optimized Post-Quantum Digital Signature CROSS Harry Hart, Puja Mondal, Suparna Kundu, Supriya Adhikary, Angshuman Karmakar, Chaoyun Li
2024/1928 (PDF ) Generic Security of GCM-SST Akiko Inoue, Ashwin Jha, Bart Mennink, Kazuhiko Minematsu
2024/1927 (PDF ) ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials Anup Kumar Kundu, Shibam Ghosh, Aikata Aikata, Dhiman Saha
2024/1926 (PDF ) Cryptanalysis of BAKSHEESH Block Cipher Shengyuan Xu, Siwei Chen, Xiutao Feng, Zejun Xiang, Xiangyong Zeng
2024/1925 (PDF ) EndGame: Field-Agnostic Succinct Blockchain with Arc Simon Judd
2024/1924 (PDF ) The complexity of solving a random polynomial system Giulia Gaggero, Elisa Gorla
2024/1923 (PDF ) Implementation analysis of index calculus method on elliptic curves over prime finite fields Jianjun HU
2024/1922 (PDF ) Deterministic Consensus using Overpass Channels in Distributed Ledger Technology Brandon "Cryptskii" Ramsay
2024/1921 (PDF ) Downlink (T)FHE ciphertexts compression Antonina Bondarchuk, Olive Chakraborty, Geoffroy Couteau, Renaud Sirdey
2024/1920 (PDF ) An Extended Hierarchy of Security Notions for Threshold Signature Schemes and Automated Analysis of Protocols That Use Them Cas Cremers, Aleksi Peltonen, Mang Zhao
2024/1919 (PDF ) PASTA on Edge: Cryptoprocessor for Hybrid Homomorphic Encryption Aikata Aikata, Daniel Sanz Sobrino, Sujoy Sinha Roy
2024/1918 (PDF ) Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time Florian Hirner, Florian Krieger, Constantin Piber, Sujoy Sinha Roy
2024/1917 (PDF ) Decentralized FHE Computer Gurgen Arakelov, Sergey Gomenyuk, Hovsep Papoyan
2024/1916 (PDF ) Fast, Compact and Hardware-Friendly Bootstrapping in less than 3ms Using Multiple Instruction Multiple Ciphertext Seunghwan Lee, Dohyuk Kim, Dong-Joon Shin
2024/1915 (PDF ) MULTISS: a protocol for long-term secure distributed storage over multiple remote QKD networks Thomas Prévost, Olivier Alibart, Anne Marin, Marc Kaplan
2024/1913 (PDF ) Key Guidance Invocation: A White-box Mode Enables Strong Space Hardness under Adaptively Chosen-Space Attacks Yipeng Shi, Xiaolin Zhang, Boshi Yuan, Chenghao Chen, Jintong Yu, Yuxuan Wang, Chi Zhang, Dawu Gu
2024/1912 (PDF ) Universally Composable and Reliable Password Hardening Services Shaoqiang Wu, Ding Wang
2024/1911 (PDF ) Deletions and Dishonesty: Probabilistic Data Structures in Adversarial Settings Mia Filić, Keran Kocher, Ella Kummer, Anupama Unnikrishnan
2024/1910 (PDF ) Stealth Software Trojan: Amplifying Hidden RF Side-Channels with Ultra High SNR and Data-Rate Gal Cohen, Itamar Levy
2024/1908 (PDF ) Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY Ling Song, Qinggan Fu, Qianqian Yang, Yin Lv, Lei Hu
2024/1907 (PDF ) Towards Optimal Garbled Circuits in the Standard Model Ruiyang Li, Chun Guo, Xiao Wang
2024/1906 (PDF ) On Efficient Computations of $y^2=X^3+b/\mathbb{F}_p$ \\for Primes $p\equiv 1 \pmod 3$ Guangwu Xu, Wei Yu, Ke Han, Pengfei Lu
2024/1905 (PDF ) OPL4GPT: An Application Space Exploration of Optimal Programming Language for Hardware Design by LLM Kimia Tasnia, Sazadur Rahman
2024/1904 (PDF ) An Open Source Ecosystem for Implementation Security Testing Aydin Aysu, Fatemeh Ganji, Trey Marcantonio, Patrick Schaumont
2024/1903 (PDF ) Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus Mahdi Mahdavi, Navid Abapour, Zahra Ahmadian
2024/1902 (PDF ) ZK-SNARKs for Ballot Validity: A Feasibility Study Nicolas Huber, Ralf Kuesters, Julian Liedtke, Daniel Rausch
2024/1901 (PDF ) On the Insecurity of Bloom Filter-Based Private Set Intersections Jelle Vos, Jorrit van Assen, Tjitske Koster, Evangelia Anna Markatou, Zekeriya Erkin
2024/1900 (PDF ) Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith Fukang Liu, Katharina Koschatko, Lorenzo Grassi, Hailun Yan, Shiyao Chen, Subhadeep Banik, Willi Meier
2024/1899 (PDF ) Fast Multiplication and the PLWE-RLWE Equivalence for an Infinite Family of Maximal Real Subfields of Cyclotomic Fields Joonas Ahola, Iván Blanco-Chacón, Wilmar Bolaños, Antti Haavikko, Camilla Hollanti, Rodrigo M. Sánchez-Ledesma
2024/1898 (PDF ) NTRU-based Bootstrapping for MK-FHEs without using Overstretched Parameters Binwu Xiang, Jiang Zhang, Kaixing Wang, Yi Deng, Dengguo Feng
2024/1897 (PDF ) On Threshold Signatures from MPC-in-the-Head Eliana Carozza, Geoffroy Couteau
2024/1896 (PDF ) Shardora: Towards Scaling Blockchain Sharding via Unleashing Parallelism Yu Tao, Lu Zhou, Lei Xie, Dongming Zhang, Xinyu Lei, Fei Xu, Zhe Liu
2024/1895 (PDF ) A Tool for Fast and Secure LWE Parameter Selection: the FHE case Beatrice Biasioli, Elena Kirshanova, Chiara Marcolla, Sergi Rovira
2024/1894 (PDF ) A non-comparison oblivious sort and its application to private k-NN Sofiane Azogagh, Marc-Olivier Killijian, Félix Larose-Gervais
2024/1893 (PDF ) High Speed High Assurance implementations of Multivariate Quadratic based Signatures Samyuktha M, Pallavi Borkar, Chester Rebeiro
2024/1892 (PDF ) A Comprehensive Survey on Hardware-Software co-Protection against Invasive, Non-Invasive and Interactive Security Threats Md Habibur Rahman
2024/1891 (PDF ) Shifting our knowledge of MQ-Sign security Lars Ran, Monika Trimoska
2024/1890 (PDF ) Optimized FPGA Architecture for Modular Reduction in NTT Tolun Tosun, Selim Kırbıyık, Emre Koçer, Ersin Alaybeyoğlu
2024/1889 (PDF ) IO-Optimized Design-Time Configurable Negacyclic Seven-Step NTT Architecture for FHE Applications Emre Koçer, Selim Kırbıyık, Tolun Tosun, Ersin Alaybeyoğlu, Erkay Savaş
2024/1888 (PDF ) Chosen-Prefix Collisions on AES-like Hashing Shiyao Chen, Xiaoyang Dong, Jian Guo, Tianyu Zhang
2024/1887 (PDF ) Differential MITM attacks on SLIM and LBCIoT Peter Grochal, Martin Stanek
2024/1886 (PDF ) Impossibility Results for Post-Compromise Security in Real-World Communication Systems Cas Cremers, Niklas Medinger, Aurora Naska
2024/1885 (PDF ) Improved PIR Schemes using Matching Vectors and Derivatives Fatemeh Ghasemi, Swastik Kopparty, Madhu Sudan
2024/1884 (PDF ) Age-aware Fairness in Blockchain Transaction Ordering for Reducing Tail Latency Yaakov Sokolik, Mohammad Nassar, Ori Rottenstriech
2024/1883 (PDF ) A Fault Analysis on SNOVA Gustavo Banegas, Ricardo Villanueva-Polanco
2024/1882 (PDF ) Single Trace Side-Channel Attack on the MPC-in-the-Head Framework Julie Godard, Nicolas Aragon, Philippe Gaborit, Antoine Loiseau, Julien Maillard
2024/1881 (PDF ) THOR: Secure Transformer Inference with Homomorphic Encryption Jungho Moon, Dongwoo Yoo, Xiaoqian Jiang, Miran Kim
2024/1880 (PDF ) Cryptography Experiments In Lean 4: SHA-3 Implementation Gérald Doussot
2024/1879 (PDF ) Practical Zero-Knowledge PIOP for Maliciously Secure Multiparty Homomorphic Encryption Intak Hwang, Hyeonbum Lee, Jinyeong Seo, Yongsoo Song
2024/1878 (PDF ) Tighter Provable Security for TreeKEM Karen Azari, Andreas Ellison
2024/1877 (PDF ) On the Black-Box Complexity of Private-Key Inner-Product Functional Encryption Mohammad Hajiabadi, Roman Langrehr, Adam O'Neill, Mingyuan Wang
2024/1876 (PDF ) Unbounded Leakage-Resilient Encryption and Signatures Alper Çakan, Vipul Goyal
2024/1875 (PDF ) mUOV: Masking the Unbalanced Oil and Vinegar Digital Signature Scheme at First- and Higher-Order Suparna Kundu, Quinten Norga, Angshuman Karmakar, Uttam Kumar Ojha, Anindya Ganguly, Ingrid Verbauwhede
2024/1874 (PDF ) Multi-Holder Anonymous Credentials from BBS Signatures Andrea Flamini, Eysa Lee, Anna Lysyanskaya
2024/1873 (PDF ) $\mathsf{Cirrus}$: Performant and Accountable Distributed SNARK Wenhao Wang, Fangyan Shi, Dani Vilardell, Fan Zhang
2024/1872 (PDF ) Amigo: Secure Group Mesh Messaging in Realistic Protest Settings David Inyangson, Sarah Radway, Tushar M. Jois, Nelly Fazio, James Mickens
2024/1871 (PDF ) Field-Agnostic SNARKs from Expand-Accumulate Codes Alexander R. Block, Zhiyong Fang, Jonathan Katz, Justin Thaler, Hendrik Waldner, Yupeng Zhang
2024/1870 (PDF ) A Divide-and-Conquer Strategy for Hard-Label Extraction of Deep Neural Networks via Side-Channel Attacks Benoit Coqueret, Mathieu Carbone, Olivier Sentieys, Gabriel Zaid
2024/1869 (PDF ) Black-box Collision Attacks on Widely Deployed Perceptual Hash Functions Diane Leblanc-Albarel, Bart Preneel
2024/1868 (PDF ) IMOK: A compact connector for non-prohibition proofs to privacy-preserving applications Oleksandr Kurbatov, Lasha Antadze, Ameen Soleimani, Kyrylo Riabov, Artem Sdobnov
2024/1867 (PDF ) Symmetric Twin Column Parity Mixers and their Applications Hao Lei, Raghvendra Rohit, Guoxiao Liu, Jiahui He, Mohamed Rachidi, Keting Jia, Kai Hu, Meiqin Wang
2024/1866 (PDF ) ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors Asmita Adhikary, Abraham J. Basurto Becerra, Lejla Batina, Ileana Buhan, Durba Chatterjee, Senna van Hoek, Eloi Sanfelix Gonzalez
2024/1865 (PDF ) Tightly-Secure Group Key Exchange with Perfect Forward Secrecy Emanuele Di Giandomenico, Doreen Riepel, Sven Schäge
2024/1864 (PDF ) Tweakable ForkCipher from Ideal Block Cipher Sougata Mandal
2024/1863 (PDF ) Blockchain-Based Carbon Footprint Management Umut Pekel, Oguz Yayla
2024/1862 (PDF ) BatchZK: A Fully Pipelined GPU-Accelerated System for Batch Generation of Zero-Knowledge Proofs Tao Lu, Yuxun Chen, Zonghui Wang, Xiaohang Wang, Wenzhi Chen, Jiaheng Zhang
2024/1861 (PDF ) Another Lattice Attack Against an RSA-like Cryptosystem George Teseleanu
2024/1859 (PDF ) Non-interactive Fully Encrypted Machine Learning Protocol for Inference Seungwan Hong, Jiseung Kim, Changmin Lee, Minhye Seo
2024/1858 (PDF ) (In)Security of Threshold Fully Homomorphic Encryption based on Shamir Secret Sharing Wonhee Cho, Jiseung Kim, Changmin Lee
2024/1857 (PDF ) Access-Controlled Inner Product Function-Revealing Encryption Ojaswi Acharya, Weiqi Feng, Roman Langrehr, Adam O'Neill
2024/1856 (PDF ) "There's always another counter": Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting Upasana Mandal, Rupali Kalundia, Nimish Mishra, Shubhi Shukla, Sarani Bhattacharya, Debdeep Mukhopadhyay
2024/1855 (PDF ) Lova: A Novel Framework for Verifying Mathematical Proofs with Incrementally Verifiable Computation Noel Elias
2024/1854 (PDF ) A Zero-Knowledge PCP Theorem Tom Gur, Jack O'Connor, Nicholas Spooner
2024/1853 (PDF ) Giant Does NOT Mean Strong: Cryptanalysis of BQTRU Ali Raya, Vikas Kumar, Aditi Kar Gangopadhyay, Sugata Gangopadhyay
2024/1852 (PDF ) Faster algorithms for isogeny computations over extensions of finite fields Shiping Cai, Mingjie Chen, Christophe Petit
2024/1851 (PDF ) Secure Transformer-Based Neural Network Inference for Protein Sequence Classification Jingwei Chen, Linhan Yang, Chen Yang, Shuai Wang, Rui Li, Weijie Miao, Wenyuan Wu, Li Yang, Kang Wu, Lizhong Dai
2024/1850 (PDF ) Single-trace side-channel attacks on MAYO exploiting leaky modular multiplication Sönke Jendral, Elena Dubrova
2024/1849 (PDF ) A Linearisation Method for Identifying Dependencies in Differential Characteristics: Examining the Intersection of Deterministic Linear Relations and Nonlinear Constraints Ling Sun
2024/1848 (PDF ) Non-Interactive Zero-Knowledge Arguments with Certified Deletion Kasra Abbaszadeh, Jonathan Katz
2024/1847 (PDF ) Notions of Quantum Reductions and Impossibility of Statistical NIZK Chuhan Lu, Nikhil Pappu
2024/1846 (PDF ) The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy Vadim Lyubashevsky, Gregor Seiler, Patrick Steuer
2024/1845 (PDF ) Single-Server Client Preprocessing PIR with Tight Space-Time Trade-off Zhikun Wang, Ling Ren
2024/1844 (PDF ) KLaPoTi: An asymptotically efficient isogeny group action from 2-dimensional isogenies Lorenz Panny, Christophe Petit, Miha Stopar
2024/1843 (PDF ) Khatam: Reducing the Communication Complexity of Code-Based SNARKs Hadas Zeilberger
2024/1842 (PDF ) Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, Sebastian Steinhorst
2024/1841 (PDF ) Verifying Jolt zkVM Lookup Semantics Carl Kwan, Quang Dao, Justin Thaler
2024/1840 (PDF ) Ideal Pseudorandom Codes Omar Alrabiah, Prabhanjan Ananth, Miranda Christ, Yevgeniy Dodis, Sam Gunn
2024/1839 (PDF ) Cryptographically Secure Digital Consent F. Betül Durak, Abdullah Talayhan, Serge Vaudenay
2024/1838 (PDF ) Pushing the QAM method for finding APN functions further Nadiia Ichanska, Simon Berg, Nikolay S. Kaleyski, Yuyin Yu
2024/1837 (PDF ) Analyze Your Leakage! Security Analysis of Encryption Schemes for Substring Search Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis
2024/1836 (PDF ) Symmetric Encryption on a Quantum Computer David Garvin, Oleksiy Kondratyev, Alexander Lipton, Marco Paini
2024/1835 (PDF ) Hybrid Zero-Knowledge from Garbled Circuits Masayuki Abe, Miguel Ambrona, Miyako Ohkubo
2024/1834 (PDF ) Scutum: Temporal Verification for Cross-Rollup Bridges via Goal-Driven Reduction Yanju Chen, Juson Xia, Bo Wen, Kyle Charbonnet, Hongbo Wen, Hanzhi Liu, Luke Pearson, Yu Feng
2024/1833 (PDF ) Private Neural Network Training with Packed Secret Sharing Hengcheng Zhou
2024/1832 (PDF ) How to Delete Without a Trace: Certified Deniability in a Quantum World Alper Çakan, Vipul Goyal, Justin Raizes
2024/1831 (PDF ) Fast Two-party Threshold ECDSA with Proactive Security Brian Koziel, S. Dov Gordon, Craig Gentry
2024/1830 (PDF ) A Tight Analysis of GHOST Consistency Peter Gaži, Zahra Motaqy, Alexander Russell
2024/1829 (PDF ) Compiled Nonlocal Games from any Trapdoor Claw-Free Function Kaniuar Bacho, Alexander Kulpe, Giulio Malavolta, Simon Schmidt, Michael Walter
2024/1828 (PDF ) Classic McEliece Hardware Implementation with Enhanced Side-Channel and Fault Resistance Peizhou Gan, Prasanna Ravi, Kamal Raj, Anubhab Baksi, Anupam Chattopadhyay
2024/1827 (PDF ) OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM Xander Pottier, Thomas de Ruijter, Jonas Bertels, Wouter Legiest, Michiel Van Beirendonck, Ingrid Verbauwhede
2024/1826 (PDF ) Cloning Games, Black Holes and Cryptography Alexander Poremba, Seyoon Ragavan, Vinod Vaikuntanathan
2024/1825 (PDF ) BrakingBase - a linear prover, poly-logarithmic verifier, field agnostic polynomial commitment scheme Vineet Nair, Ashish Sharma, Bhargav Thankey
2024/1824 (PDF ) Constructing Dembowski–Ostrom permutation polynomials from upper triangular matrices Yuyin Yu, Yanbin Zheng, Yongqiang Li, Jingang Liu
2024/1823 (PDF ) A Composability Treatment of Bitcoin's Transaction Ledger with Variable Difficulty Juan Garay, Yun Lu, Julien Prat, Brady Testa, Vassilis Zikas
2024/1822 (PDF ) Anonymous Public-Key Quantum Money and Quantum Voting Alper Çakan, Vipul Goyal, Takashi Yamakawa
2024/1821 (PDF ) SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security Jianan Su, Laasya Bangalore, Harel Berger, Jason Yi, Sophia Castor, Micah Sherr, Muthuramakrishnan Venkitasubramaniam
2024/1820 (PDF ) On the Power of Oblivious State Preparation James Bartusek, Dakshita Khurana
2024/1819 (PDF ) VCVio: A Formally Verified Forking Lemma and Fiat-Shamir Transform, via a Flexible and Expressive Oracle Representation Devon Tuma, Nicholas Hopper
2024/1818 (PDF ) SoK: On the Physical Security of UOV-based Signature Schemes Thomas Aulbach, Fabio Campos, Juliane Krämer
2024/1817 (PDF ) Improved ML-DSA Hardware Implementation With First Order Masking Countermeasure Kamal Raj, Prasanna Ravi, Tee Kiah Chia, Anupam Chattopadhyay
2024/1816 (PDF ) Attacking Automotive RKE Security: How Smart are your ‘Smart’ Keys? Ritul Satish, Alfred Daimari, Argha Chakrabarty, Kahaan Shah, Debayan Gupta
2024/1815 (PDF ) Succinct Randomized Encodings from Laconic Function Evaluation, Faster and Simpler Nir Bitansky, Rachit Garg
2024/1814 (PDF ) SophOMR: Improved Oblivious Message Retrieval from SIMD-Aware Homomorphic Compression Keewoo Lee, Yongdong Yeo
2024/1813 (PDF ) Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD: More Applications of Pseudo-Random Injections Mustafa Khairallah
2024/1812 (PDF ) Batching Adaptively-Sound SNARGs for NP Lalita Devadas, Brent Waters, David J. Wu
2024/1811 (PDF ) Pseudorandom Function-like States from Common Haar Unitary Minki Hhan, Shogo Yamada
2024/1810 (PDF ) Linear Proximity Gap for Linear Codes within the 1.5 Johnson Bound Yiwen Gao, Haibin Kan, Yuan Li
2024/1809 (PDF ) Foundations of Adaptor Signatures Paul Gerhart, Dominique Schröder, Pratik Soni, Sri AravindaKrishnan Thyagarajan
2024/1808 (PDF ) Breaking BASS Simon-Philipp Merz, Kenneth G. Paterson, Àlex Rodríguez García
2024/1807 (PDF ) An Unstoppable Ideal Functionality for Signatures and a Modular Analysis of the Dolev-Strong Broadcast Ran Cohen, Jack Doerner, Eysa Lee, Anna Lysyanskaya, Lawrence Roy
2024/1806 (PDF ) Encrypted RAM Delegation: Homomorphic NIZKs, Malicious MPC with Optimal Communication Complexity, and more Abtin Afshar, Jiaqi Cheng, Rishab Goyal, Aayush Yadav, Saikumar Yadugiri
2024/1805 (PDF ) Solving the Shortest Vector Problem in $2^{0.63269n+o(n)}$ time on Random Lattices Amaury Pouly, Yixin Shen
2024/1804 (PDF ) Quantum Chosen-Cipher Attack on Camellia Yanjun Li, Qi Wang, DingYun Huang, Jian Liu, Huiqin Xie
2024/1803 (PDF ) Siniel: Distributed Privacy-Preserving zkSNARK Yunbo Yang, Yuejia Cheng, Kailun Wang, Xiaoguo Li, Jianfei Sun, Jiachen Shen, Xiaolei Dong, Zhenfu Cao, Guomin Yang, Robert H. Deng
2024/1802 (PDF ) ColliderScript: Covenants in Bitcoin via 160-bit hash collisions Ethan Heilman, Victor I. Kolobov, Avihu M. Levy, Andrew Poelstra
2024/1801 (PDF ) Investigation of the Optimal Linear Characteristics of BAKSHEESH (Full Version) Yuxuan Peng, Jinpeng Liu, Ling Sun
2024/1800 (PDF ) Privacy-Preserving Multi-Party Search via Homomorphic Encryption with Constant Multiplicative Depth Mihail-Iulian Pleşa, Ruxandra F. Olimid
2024/1799 (PDF ) Consensus Under Adversary Majority Done Right Srivatsan Sridhar, Ertem Nusret Tas, Joachim Neu, Dionysis Zindros, David Tse
2024/1798 (PDF ) Quantum One-Time Protection of any Randomized Algorithm Sam Gunn, Ramis Movassagh
2024/1797 (PDF ) FLock: Robust and Privacy-Preserving Federated Learning based on Practical Blockchain State Channels Ruonan Chen, Ye Dong, Yizhong Liu, Tingyu Fan, Dawei Li, Zhenyu Guan, Jianwei Liu, Jianying Zhou
2024/1796 (PDF ) Isogeny interpolation and the computation of isogenies from higher dimensional representations David Jao, Jeanne Laflamme
2024/1795 (PDF ) How Fast Does the Inverse Walk Approximate a Random Permutation? Vishesh Jain, Tianren Liu, Clayton Mizgerd, Angelos Pelecanos, Stefano Tessaro, Vinod Vaikuntanathan
2024/1794 (PDF ) How Much Public Randomness Do Modern Consensus Protocols Need? Joseph Bonneau, Benedikt Bünz, Miranda Christ, Yuval Efron
2024/1793 (PDF ) On the Jordan-Gauss graphs and new multivariate public keys Vasyl Ustimenko, Tymoteusz Chojecki, Aneta Wróblewska
2024/1792 (PDF ) Towards Explainable Side-Channel Leakage: Unveiling the Secrets of Microarchitecture Ischa Stork, Vipul Arora, Łukasz Chmielewski, Ileana Buhan
2024/1791 (PDF ) Discrete gaussian sampling for BKZ-reduced basis Amaury Pouly, Yixin Shen
2024/1790 (PDF ) Revisiting subgroup membership testing on pairing-friendly curves via the Tate pairing Yu Dai, Debiao He, Dimitri Koshelev, Cong Peng, Zhijian Yang
2024/1789 (PDF ) Stealth and Beyond: Attribute-Driven Accountability in Bitcoin Transactions Alberto Maria Mongardini, Daniele Friolo, Giuseppe Ateniese
2024/1788 (PDF ) Advanced Transparency System Yuxuan Sun, Yuncong Hu, Yu Yu
2024/1787 (PDF ) An Efficient and Secure Boolean Function Evaluation Protocol Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Sumit Kumar Debnath, Pantelimon Stanica
2024/1786 (PDF ) Black-Box Timed Commitments from Time-Lock Puzzles Hamza Abusalah, Gennaro Avitabile
2024/1785 (PDF ) A General Quantum Duality for Representations of Groups with Applications to Quantum Money, Lightning, and Fire John Bostanci, Barak Nehoran, Mark Zhandry
2024/1784 (PDF ) Fine-Grained Non-Interactive Key-Exchange without Idealized Assumptions, and Lower Bounds Yuyu Wang, Chuanjie Su, Jiaxin Pan, Chunxiang Xu
2024/1783 (PDF ) PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng
2024/1782 (PDF ) Is Periodic Pseudo-randomization Sufficient for Beacon Privacy? Liron David, Avinatan Hassidim, Yossi Matias, Moti Yung
2024/1781 (PDF ) New results in Share Conversion, with applications to evolving access structures Tamar Ben David, Varun Narayanan, Olga Nissenbaum, Anat Paskin-Cherniavsky
2024/1780 (PDF ) ABE for Circuits with $\mathsf{poly}(\lambda)$-sized Keys from LWE Valerio Cini, Hoeteck Wee
2024/1779 (PDF ) Secure Pairing-Free IBE and CP-ABE from Inner-Product Functional Encryption Ahmad Khoureich Ka
2024/1778 (PDF ) Construction of quadratic APN functions with coefficients in $\mathbb{F}_2$ in dimensions $10$ and $11$ Yuyin Yu, Jingchen Li, Nadiia Ichanska, Nikolay Kaleyski
2024/1777 (PDF ) Masking Gaussian Elimination at Arbitrary Order, with Application to Multivariate- and Code-Based PQC Quinten Norga, Suparna Kundu, Uttam Kumar Ojha, Anindya Ganguly, Angshuman Karmakar, Ingrid Verbauwhede
2024/1776 (PDF ) An efficient collision attack on Castryck-Decru-Smith’s hash function Ryo Ohashi, Hiroshi Onuki
2024/1775 (PDF ) zkMarket: Ensuring Fairness and Privacy in Decentralized Data Exchange Seongho Park, Seungwoo Kim, Semin Han, Kyeongtae Lee, Jihye Kim, Hyunok Oh
2024/1774 (PDF ) PANTHER: Private Approximate Nearest Neighbor Search in the Single Server Setting Jingyu Li, Zhicong Huang, Min Zhang, Cheng Hong, Jian Liu, Tao Wei, Wenguang Chen
2024/1773 (PDF ) Universal Adaptor Signatures from Blackbox Multi-Party Computation Michele Ciampi, Xiangyu Liu, Ioannis Tzannetos, Vassilis Zikas
2024/1772 (PDF ) Byte-wise equal property of ARADI Sunyeop Kim, Insung Kim, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong
2024/1771 (PDF ) PRIME: Differentially Private Distributed Mean Estimation with Malicious Security Laasya Bangalore, Albert Cheu, Muthuramakrishnan Venkitasubramaniam
2024/1770 (PDF ) Improved Attacks for SNOVA by Exploiting Stability under a Group Action Daniel Cabarcas, Peigen Li, Javier Verbel, Ricardo Villanueva-Polanco
2024/1769 (PDF ) A Closer Look at Falcon Pierre-Alain Fouque, Phillip Gajland, Hubert de Groote, Jonas Janneck, Eike Kiltz
2024/1768 (PDF ) Programmable Bitcoin Verification via Synthesis-Aided Lifting Hanzhi Liu, Jingyu Ke, Hongbo Wen, Luke Pearson, Robin Linus, Lukas George, Manish Bista, Hakan Karakuş, Domo, Junrui Liu, Yanju Chen, Yu Feng
2024/1767 (PDF ) ECPM Cryptanalysis Resource Estimation Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Jaehan Cho, Howon Kim
2024/1766 (PDF ) Critical Rounds in Multi-Round Proofs: Proof of Partial Knowledge and Trapdoor Commitments Masayuki Abe, David Balbás, Dung Bui, Miyako Ohkubo, Zehua Shang, Akira Takahashi, Mehdi Tibouchi
2024/1765 (PDF ) Compact and Tightly Secure (Anonymous) IBE from Module LWE in the QROM Toi Tomita, Junji Shikata
2024/1764 (PDF ) Fully Homomorphic Encryption with Efficient Public Verification Mi-Ying (Miryam) Huang, Baiyu Li, Xinyu Mao, Jiapeng Zhang
2024/1763 (PDF ) Quantum Black-Box Separations: Succinct Non-Interactive Arguments from Falsifiable Assumptions Gorjan Alagic, Dana Dachman-Soled, Manasi Shingane, Patrick Struck
2024/1762 (PDF ) Homomorphic Matrix Operations under Bicyclic Encoding Jingwei Chen, Linhan Yang, Wenyuan Wu, Yang Liu, Yong Feng
2024/1761 (PDF ) Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing Hao Cheng, Jiliang Li, Yizhong Liu, Yuan Lu, Weizhi Meng, Zhenfeng Zhang
2024/1760 (PDF ) Somewhat Homomorphic Encryption from Linear Homomorphism and Sparse LPN Henry Corrigan-Gibbs, Alexandra Henzinger, Yael Tauman Kalai, Vinod Vaikuntanathan
2024/1759 (PDF ) A Forgery Attack on a Code-based Signature Scheme Ali Babaei, Taraneh Eghlidos
2024/1758 (PDF ) A comprehensive analysis of Regev's quantum algorithm Razvan Barbulescu, Mugurel Barcau, Vicentiu Pasol
2024/1757 (PDF ) On the Sample Complexity of Linear Code Equivalence for all Code Rates Alessandro Budroni, Andrea Natale
2024/1756 (PDF ) $\mathsf{Graphiti}$: Secure Graph Computation Made More Scalable Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2024/1755 (PDF ) Exponential sums in linear cryptanalysis Tim Beyne, Clémence Bouvier
2024/1754 (PDF ) PQNTRU: Acceleration of NTRU-based Schemes via Customized Post-Quantum Processor Zewen Ye, Junhao Huang, Tianshun Huang, Yudan Bai, Jinze Li, Hao Zhang, Guangyan Li, Donglong Chen, Ray C.C. Cheung, Kejie Huang
2024/1753 (PDF ) HTCNN: High-Throughput Batch CNN Inference with Homomorphic Encryption Zewen Ye, Tianyu Wang, Tianshun Huang, Yonggen Li, Chengxuan Wang, Ray C.C. Cheung, Kejie Huang
2024/1752 (PDF ) DEEP Commitments and Their Applications Alan Szepieniec
2024/1751 (PDF ) Offline-Online Indifferentiability of Cryptographic Systems Ashrujit Ghoshal, Ilan Komargodski, Gil Segev
2024/1750 (PDF ) Robust Double Auctions for Resource Allocation Arthur Lazzaretti, Charalampos Papamanthou, Ismael Hishon-Rezaizadeh
2024/1749 (PDF ) Revisiting the “improving the security of multi-party quantum key agreement with five- qubit Brown states” Yu-Yuan Chou, Hsien-Hung Liu, Jue-Sam Chou
2024/1748 (PDF ) New Experimental Evidences For the Riemann Hypothesis Zhengjun Cao
2024/1747 (PDF ) POMS : Proxy Offloading for Multicloud Storage with Keyword Search Adam Oumar Abdel-Rahman, Sofiane Azogagh, Zelma Aubin Birba, Arthur Tran Van
2024/1746 (PDF ) Secure and Privacy-preserving CBDC Offline Payments using a Secure Element Elli Androulaki, Angelo De Caro, Kaoutar El Khiyaoui, Romain Gay, Rebekah Mercer, Alessandro Sorniotti
2024/1745 (PDF ) Pseudorandomness in the (Inverseless) Haar Random Oracle Model Prabhanjan Ananth, John Bostanci, Aditya Gulati, Yao-Ting Lin
2024/1744 (PDF ) PEARL-SCALLOP: Parameter Extension Applicable in Real-Life SCALLOP Bill Allombert, Jean-François Biasse, Jonathan Komada Eriksen, Péter Kutas, Chris Leonardi, Aurel Page, Renate Scheidler, Márton Tot Bagi
2024/1743 (PDF ) The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs Emanuele Bellini, David GERAULT, Juan Grados, Thomas Peyrin
2024/1742 (PDF ) Pseudorandom Obfuscation and Applications Pedro Branco, Nico Döttling, Abhishek Jain, Giulio Malavolta, Surya Mathialagan, Spencer Peters, Vinod Vaikuntanathan
2024/1741 (PDF ) The Learning Stabilizers with Noise problem Alexander Poremba, Yihui Quek, Peter Shor
2024/1740 (PDF ) OpenNTT: An Automated Toolchain for Compiling High-Performance NTT Accelerators in FHE Florian Krieger, Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy
2024/1739 (PDF ) Provably Robust Watermarks for Open-Source Language Models Miranda Christ, Sam Gunn, Tal Malkin, Mariana Raykova
2024/1738 (PDF ) More Efficient Isogeny Proofs of Knowledge via Canonical Modular Polynomials Thomas den Hollander, Sören Kleine, Marzio Mula, Daniel Slamanig, Sebastian A. Spindler
2024/1737 (PDF ) Embedded Curves and Embedded Families for SNARK-Friendly Curves Aurore Guillevic, Simon Masson
2024/1736 (PDF ) A graph-theoretic approach to analyzing decoding failures of BIKE Sarah Arpin, Tyler Raven Billingsley, Daniel Rayor Hast, Jun Bo Lau, Ray Perlner, Angela Robinson
2024/1735 (PDF ) The Mysteries of LRA: Roots and Progresses in Side-channel Applications Jiangshan Long, Changhai Ou, Zhu Wang, Fan Zhang
2024/1734 (PDF ) Optimizing Message Range and Ciphertext Storage in GSW Encryption Using CRT and PVW-like Compression Scheme Kung-Wei Hu, Huan-Chih Wang, Ja-Ling Wu
2024/1733 (PDF ) One Time Pad and the Short Key Dream Umberto Cerruti
2024/1732 (PDF ) Radical 2-isogenies and cryptographic hash functions in dimensions 1, 2 and 3 Sabrina Kunzweiler, Luciano Maino, Tomoki Moriya, Christophe Petit, Giacomo Pope, Damien Robert, Miha Stopar, Yan Bo Ti
2024/1731 (PDF ) Arc: Accumulation for Reed--Solomon Codes Benedikt Bünz, Pratyush Mishra, Wilson Nguyen, William Wang
2024/1730 (PDF ) Secure and Efficient Outsourced Matrix Multiplication with Homomorphic Encryption Aikata Aikata, Sujoy Sinha Roy
2024/1729 (PDF ) cuTraNTT: A Novel Transposed Number Theoretic Transform Targeting Low Latency Homomorphic Encryption for IoT Applications Supriya Adhikary, Wai Kong Lee, Angshuman Karmakar, Yongwoo Lee, Seong Oun Hwang, Ramachandra Achar
2024/1728 (PDF ) On Key Substitution Attacks against Aggregate Signatures and Multi-Signatures Yuuki Fujita, Yusuke Sakai, Kyosuke Yamashita, Goichiro Hanaoka
2024/1727 (PDF ) (Quantum) Indifferentiability and Pre-Computation Joseph Carolan, Alexander Poremba, Mark Zhandry
2024/1726 (PDF ) On the Equivalence between Classical Position Verification and Certified Randomness Fatih Kaleoglu, Minzhao Liu, Kaushik Chakraborty, David Cui, Omar Amer, Marco Pistoia, Charles Lim
2024/1725 (PDF ) PISA: Privacy-Preserving Smart Parking Sayon Duttagupta, Dave Singelée
2024/1724 (PDF ) Straight-Line Knowledge Extraction for Multi-Round Protocols Lior Rotem, Stefano Tessaro
2024/1723 (PDF ) Proving the Security of the Extended Summation-Truncation Hybrid Avijit Dutta, Eik List
2024/1722 (PDF ) Revisiting Fermat's Factorization Method Gajraj Kuldeep, Rune Hylsberg Jacobsen
2024/1721 (PDF ) An Efficient Noncommutative NTRU from Semidirect Product Vikas Kumar, Ali Raya, Aditi Kar Gangopadhyay, Sugata Gangopadhyay, Md Tarique Hussain
2024/1720 (PDF ) Pseudorandom Multi-Input Functional Encryption and Applications Shweta Agrawal, Simran Kumari, Shota Yamada
2024/1719 (PDF ) Compact Pseudorandom Functional Encryption from Evasive LWE Shweta Agrawal, Simran Kumari, Shota Yamada
2024/1718 (PDF ) Drifting Towards Better Error Probabilities in Fully Homomorphic Encryption Schemes Olivier Bernard, Marc Joye, Nigel P. Smart, Michael Walter
2024/1717 (PDF ) Practical Asynchronous MPC from Lightweight Cryptography Atsuki Momose
2024/1716 (PDF ) Rate-1 Statistical Non-Interactive Zero-Knowledge Pedro Branco, Nico Döttling, Akshayaram Srinivasan
2024/1715 (PDF ) OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates Haiyue Dong, Qian Guo
2024/1714 (PDF ) Theoretical Approaches to Solving the Shortest Vector Problem in NP-Hard Lattice-Based Cryptography with Post-SUSY Theories of Quantum Gravity in Polynomial Time by Orch-Or Trevor Nestor
2024/1713 (PDF ) Universally Composable Non-Interactive Zero-Knowledge from Sigma Protocols via a New Straight-line Compiler Megan Chen, Pousali Dey, Chaya Ganesh, Pratyay Mukherjee, Pratik Sarkar, Swagata Sasmal
2024/1712 (PDF ) Efficient Updatable PSI from Asymmetric PSI and PSU Guowei Ling, Peng Tang, Weidong Qiu
2024/1711 (PDF ) Good Things Come to Those Who Wait: Dishonest-Majority Coin-Flipping Requires Delay Functions Joseph Bonneau, Benedikt Bünz, Miranda Christ, Yuval Efron
2024/1710 (PDF ) $\widetilde{\mbox{O}}$ptimal Adaptively Secure Hash-based Asynchronous Common Subset Hanwen Feng, Zhenliang Lu, Qiang Tang
2024/1709 (PDF ) Do Not Disturb a Sleeping Falcon: Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences Xiuhan Lin, Mehdi Tibouchi, Yang Yu, Shiduo Zhang
2024/1708 (PDF ) Subliminal Encrypted Multi-Maps and Black-Box Leakage Absorption Amine Bahi, Seny Kamara, Tarik Moataz, Guevara Noubir
2024/1707 (PDF ) CountCrypt: Quantum Cryptography between QCMA and PP Eli Goldin, Tomoyuki Morimae, Saachi Mutreja, Takashi Yamakawa
2024/1706 (PDF ) State of the art of HFE variants Is it possible to repair HFE with appropriate perturbations? Benoit COGLIATI, Gilles Macariot-Rat, Jacques Patarin, Pierre Varjabedian
2024/1705 (PDF ) Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience Yuan Su, Yuan Lu, Jiliang Li, Yuyi Wang, Chengyi Dong, Qiang Tang
2024/1704 (PDF ) From One-Time to Two-Round Reusable Multi-Signatures without Nested Forking Lior Rotem, Gil Segev, Eylon Yogev
2024/1703 (PDF ) Free-XOR Gate Bootstrapping Chunling Chen, Xianhui Lu, Ruida Wang, Zhihao Li, Xuan Shen, Benqiang Wei
2024/1702 (PDF ) Secure and efficient transciphering for FHE-based MPC Diego F. Aranha, Antonio Guimarães, Clément Hoffmann, Pierrick Méaux
2024/1701 (PDF ) Secure Computation with Parallel Calls to 2-ary Functions Varun Narayanan, Shubham Vivek Pawar, Akshayaram Srinivasan
2024/1700 (PDF ) Does quantum lattice sieving require quantum RAM? Beomgeun Cho, Minki Hhan, Taehyun Kim, Jeonghoon Lee, Yixin Shen
2024/1699 (PDF ) HADES: Range-Filtered Private Aggregation on Public Data Xiaoyuan Liu, Ni Trieu, Trinabh Gupta, Ishtiyaque Ahmad, Dawn Song
2024/1698 (PDF ) Computational Analysis of Plausibly Post-Quantum-Secure Recursive Arguments of Knowledge Dustin Ray, Paulo L. Barreto
2024/1697 (PDF ) On pairing-friendly 2-cycles and SNARK-friendly 2-chains of elliptic curves containing a curve from a prime-order family Tomáš Novotný, Vladimír Sedláček
2024/1696 (PDF ) Revisiting the Robustness of {(R/M)LWR} under Polynomial Moduli and its Applications Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, Yang Yu
2024/1695 (PDF ) Discrete Gaussians Modulo Sub-Lattices: New Leftover Hash Lemmas for Discrete Gaussians Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, Dawu Gu
2024/1694 (PDF ) Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation Vlad-Florin Drăgoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso
2024/1693 (PDF ) A notion on S-boxes for a partial resistance to some integral attacks Claude Carlet
2024/1692 (PDF ) On the practicality of quantum sieving algorithms for the shortest vector problem Joao F. Doriguello, George Giapitzakis, Alessandro Luongo, Aditya Morolia
2024/1691 (PDF ) A Framework for Group Action-Based Multi-Signatures and Applications to LESS, MEDS, and ALTEQ Giuseppe D'Alconzo, Andrea Flamini, Alessio Meneghetti, Edoardo Signorini
2024/1690 (PDF ) A Note on Security Definitions for Secret Sharing with Certified Deletion Dominique Bazin, Ryo Nishimaki
2024/1689 (PDF ) Homomorphic Encryption with Authority Joohee Lee, Joon-Woo Lee
2024/1688 (PDF ) Revisiting Products of the Form $X$ Times a Linearized Polynomial $L(X)$ Christof Beierle
2024/1687 (PDF ) Revocable Encryption, Programs, and More: The Case of Multi-Copy Security Prabhanjan Ananth, Saachi Mutreja, Alexander Poremba
2024/1686 (PDF ) Circular Insecure Encryption: from Long Cycles to Short Cycles Zehou Wu
2024/1685 (PDF ) GAPP: Generic Aggregation of Polynomial Protocols Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh
2024/1684 (PDF ) Blind zkSNARKs for Private Proof Delegation and Verifiable Computation over Encrypted Data Mariana Gama, Emad Heydari Beni, Jiayi Kang, Jannik Spiessens, Frederik Vercauteren
2024/1683 (PDF ) Unclonable Functional Encryption Arthur Mehta, Anne Müller
2024/1682 (PDF ) Toward Optimal-Complexity Hash-Based Asynchronous MVBA with Optimal Resilience Jovan Komatovic, Joachim Neu, Tim Roughgarden
2024/1681 (PDF ) Another L makes it better? Lagrange meets LLL and may improve BKZ pre-processing Sebastien Balny, Claire Delaplace, Gilles Dequen
2024/1680 (PDF ) Sunfish: Reading Ledgers with Sparse Nodes Giulia Scaffino, Karl Wüst, Deepak Maram, Alberto Sonnino, Lefteris Kokoris-Kogias
2024/1679 (PDF ) Information Set Decoding for Ring-Linear Codes Giulia Cavicchioni, Alessio Meneghetti, Giovanni Tognolini
2024/1678 (PDF ) Commutative Cryptanalysis as a Generalization of Differential Cryptanalysis Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, Lukas Stennes
2024/1677 (PDF ) Batch Range Proof: How to Make Threshold ECDSA More Efficient Guofeng Tang, Shuai Han, Li Lin, Changzheng Wei, Ying Yan
2024/1676 (PDF ) The Sting Framework: Proving the Existence of Superclass Adversaries Mahimna Kelkar, Yunqi Li, Nerla Jean-Louis, Carolina Ortega Pérez, Kushal Babel, Andrew Miller, Ari Juels
2024/1675 (PDF ) Testing Robustness of Homomorphically Encrypted Split Model LLMs Lars Wolfgang Folkerts, Nektarios Georgios Tsoutsos
2024/1674 (PDF ) Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard Alexandra Boldyreva, Virendra Kumar, Jiahao Sun
2024/1673 (PDF ) Proteus: A Fully Homomorphic Authenticated Transciphering Protocol Lars Wolfgang Folkerts, Nektarios Georgios Tsoutsos
2024/1672 (PDF ) New Strategies for Bootstrapping Large-Error Ciphertext in Large-Precision FHEW/TFHE Cryptosystem Hongbo Li, Dengfa Liu, Guangsheng Ma
2024/1671 (PDF ) Multi-party Setup Ceremony for Generating Multivariate zk-SNARK Parameters Muhammed Ali Bingol
2024/1670 (PDF ) Statistical Layered MPC Giovanni Deligios, Anders Konring, Chen-Da Liu-Zhang, Varun Narayanan
2024/1669 (PDF ) The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys Samed Düzlü, Patrick Struck
2024/1668 (PDF ) Modelings for generic PoK and Applications: Shorter SD and PKP based Signatures Slim Bettaieb, Loïc Bidoux, Philippe Gaborit, Mukul Kulkarni
2024/1667 (PDF ) Overlapped Bootstrapping for FHEW/TFHE and Its Application to SHA3 Deokhwa Hong, Youngjin Choi, Yongwoo Lee, Young-Sik Kim
2024/1666 (PDF ) Computationally Efficient Asynchronous MPC with Linear Communication and Low Additive Overhead Akhil Bandarupalli, Xiaoyu Ji, Aniket Kate, Chen-Da Liu-Zhang, Yifan Song
2024/1665 (PDF ) DMM: Distributed Matrix Mechanism for Differentially-Private Federated Learning Based on Constant-Overhead Linear Secret Resharing Alexander Bienstock, Ujjwal Kumar, Antigoni Polychroniadou
2024/1664 (PDF ) Consensus on SNARK pre-processed circuit polynomials Jehyuk Jang
2024/1663 (PDF ) A Hidden-Bits Approach to Statistical ZAPs from LWE Eli Bradley, George Lu, Shafik Nassar, Brent Waters, David J. Wu
2024/1662 (PDF ) Composability in Watermarking Schemes Jiahui Liu, Mark Zhandry
2024/1661 (PDF ) zkFFT: Extending Halo2 with Vector Commitments & More Aram Jivanyan, Gohar Hovhannisyan, Hayk Hovhannisyan, Nerses Asaturyan
2024/1660 (PDF ) A Note on the Hint in the Dilithium Digital Signature Scheme Amit Berman, Ariel Doubchak, Noam Livne
2024/1659 (PDF ) Instance Compression, Revisited Gal Arnon, Shany Ben-David, Eylon Yogev
2024/1658 (PDF ) High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies Guy Zyskind, Avishay Yanai, Alex "Sandy" Pentland
2024/1657 (PDF ) Securely Computing One-Sided Matching Markets James Hsin-Yu Chiang, Ivan Damgård, Claudio Orlandi, Mahak Pancholi, Mark Simkin
2024/1656 (PDF ) Asymptotically Optimal Early Termination for Dishonest Majority Broadcast Giovanni Deligios, Ivana Klasovita, Chen-Da Liu-Zhang
2024/1655 (PDF ) Secure Stateful Aggregation: A Practical Protocol with Applications in Differentially-Private Federated Learning Marshall Ball, James Bell-Clark, Adria Gascon, Peter Kairouz, Sewoong Oh, Zhiye Xie
2024/1654 (PDF ) $\Sigma$-Check: Compressed $\Sigma$-protocol Theory from Sum-check Shang Gao, Chen Qian, Tianyu Zheng, Yu Guo, Bin Xiao
2024/1653 (PDF ) AD-MPC: Asynchronous Dynamic MPC with Guaranteed Output Delivery Wenxuan Yu, Minghui Xu, Bing Wu, Sisi Duan, Xiuzhen Cheng
2024/1652 (PDF ) How to Construct Random Unitaries Fermi Ma, Hsin-Yuan Huang
2024/1651 (PDF ) One-Shot Native Proofs of Non-Native Operations in Incrementally Verifiable Computations Tohru Kohrita, Patrick Towa, Zachary J. Williamson
2024/1650 (PDF ) Towards Practical Oblivious Map Xinle Cao, Weiqi Feng, Jian Liu, Jinjin Zhou, Wenjing Fang, Lei Wang, Quanqing Xu, Chuanhui Yang, Kui Ren
2024/1649 (PDF ) Multiplying Polynomials without Powerful Multiplication Instructions (Long Paper) Vincent Hwang, YoungBeom Kim, Seog Chung Seo
2024/1648 (PDF ) SIMD-style Sorting of Integer Sequence in RLWE Ciphertext Zijing Li, Hongbo Li, Zhengyang Wang
2024/1647 (PDF ) Curve Forests: Transparent Zero-Knowledge Set Membership with Batching and Strong Security Matteo Campanelli, Mathias Hall-Andersen, Simon Holmgaard Kamp
2024/1646 (PDF ) Parallel Execution Fee Mechanisms Abdoulaye Ndiaye
2024/1645 (PDF ) Fiat-Shamir Goes Rational (Or: On the Perils of Sublinear Verification) Matteo Campanelli, Agni Datta
2024/1644 (PDF ) A Tight Lower Bound on the TdScrypt Trapdoor Memory-Hard Function Jeremiah Blocki, Seunghoon Lee
2024/1643 (PDF ) Optimizing Liveness for Blockchain-Based Sealed-Bid Auctions in Rational Settings Maozhou Huang, Xiangyu Su, Mario Larangeira, Keisuke Tanaka
2024/1642 (PDF ) Fuzzy PSI via Oblivious Protocol Routing David Richardson, Mike Rosulek, Jiayu Xu
2024/1641 (PDF ) Simplification Issues of An Authentication and Key Agreement Scheme for Smart Grid Zhengjun Cao, Lihua Liu
2024/1640 (PDF ) Maximizing the Utility of Cryptographic Setups: Secure PAKEs, with either functional RO or CRS Yuting Xiao, Rui Zhang, Hong-Sheng Zhou
2024/1639 (PDF ) Efficient Quantum Pseudorandomness from Hamiltonian Phase States John Bostanci, Jonas Haferkamp, Dominik Hangleiter, Alexander Poremba
2024/1638 (PDF ) Modular Reduction in CKKS Jaehyung Kim, Taeyeong Noh
2024/1637 (PDF ) Bootstrapping Small Integers With CKKS Youngjin Bae, Jaehyung Kim, Damien Stehlé, Elias Suvanto
2024/1636 (PDF ) Quantum State Group Actions Saachi Mutreja, Mark Zhandry
2024/1635 (PDF ) RPO-M31 and XHash-M31: Efficient Hash Functions for Circle STARKs Tomer Ashur, Sundas Tariq
2024/1634 (PDF ) On Constructing Pseudorandom Involutions: Feistel variants using a single round function Chun Guo, Meiqin Wang, Weijia Wang
2024/1633 (PDF ) Efficient Boolean-to-Arithmetic Mask Conversion in Hardware Aein Rezaei Shahmirzadi, Michael Hutter
2024/1632 (PDF ) Fully Secure Searchable Encryption from PRFs, Pairings, and Lattices Hirotomo Shinoki, Hisayoshi Sato, Masayuki Yoshino
2024/1631 (PDF ) Sparrow: Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees Christodoulos Pappas, Dimitrios Papadopoulos
2024/1630 (PDF ) Hybrid Password Authentication Key Exchange in the UC Framework You Lyu, Shengli Liu
2024/1629 (PDF ) Efficient Key-Switching for Word-Type FHE and GPU Acceleration Shutong Jin, Zhen Gu, Guangyan Li, Donglong Chen, Çetin Kaya Koç, Ray C. C. Cheung, Wangchen Dai
2024/1628 (PDF ) Glacius: Threshold Schnorr Signatures from DDH with Full Adaptive Security Renas Bacho, Sourav Das, Julian Loss, Ling Ren
2024/1627 (PDF ) Cycles of supersingular elliptic curves for pairing-based proof systems Craig Costello, Gaurish Korpal
2024/1626 (PDF ) Faster Proofs and VRFs from Isogenies Shai Levin, Robi Pedersen
2024/1625 (PDF ) On the Tight Security of the Double Ratchet Daniel Collins, Doreen Riepel, Si An Oliver Tran
2024/1624 (PDF ) Double-Matrix: Complete Diffusion in a Single Round with (small) MDS Matrices Jorge Nakahara Jr
2024/1623 (PDF ) General Functional Bootstrapping using CKKS Andreea Alexandru, Andrey Kim, Yuriy Polyakov
2024/1622 (PDF ) A New Approach Towards Encrypted Data Sharing and Computation: Enhancing Efficiency Beyond MPC and Multi-Key FHE Anil Kumar Pradhan
2024/1621 (PDF ) PAKE Combiners and Efficient Post-Quantum Instantiations Julia Hesse, Michael Rosenberg
2024/1620 (PDF ) Really Complex Codes with Application to STARKs Yuval Domb
2024/1619 (PDF ) Structure-Preserving Compressing Primitives: Vector Commitments and Accumulators and Applications Stephan Krenn, Omid Mir, Daniel Slamanig
2024/1618 (PDF ) Shaking up authenticated encryption Joan Daemen, Seth Hoffert, Silvia Mella, Gilles Van Assche, Ronny Van Keer
2024/1617 (PDF ) Algebraic Equipage for Learning with Errors in Cyclic Division Algebras Cong Ling, Andrew Mendelsohn
2024/1616 (PDF ) End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem Jonas Hofmann, Kien Tuong Truong
2024/1615 (PDF ) LeOPaRd: Towards Practical Post-Quantum Oblivious PRFs via 2HashDH Paradigm Muhammed F. Esgin, Ron Steinfeld, Erkan Tairi, Jie Xu
2024/1614 (PDF ) Related-Key Cryptanalysis of FUTURE Amit Jana, Smita Das, Ayantika Chatterjee, Debdeep Mukhopadhyay, Yu Sasaki
2024/1613 (PDF ) Efficient Maliciously Secure Oblivious Exponentiations Carsten Baum, Jens Berlips, Walther Chen, Ivan Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu
2024/1612 (PDF ) On Wagner's k-Tree Algorithm Over Integers Haoxing Lin, Prashant Nalini Vasudevan
2024/1611 (PDF ) Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference Jiaxing He, Kang Yang, Guofeng Tang, Zhangjie Huang, Li Lin, Changzheng Wei, Ying Yan, Wei Wang
2024/1610 (PDF ) Secret Sharing with Snitching Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, Marcin Mielniczuk
2024/1609 (PDF ) Blaze: Fast SNARKs from Interleaved RAA Codes Martijn Brehm, Binyi Chen, Ben Fisch, Nicolas Resch, Ron D. Rothblum, Hadas Zeilberger
2024/1608 (PDF ) Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation Zhengan Huang, Junzuo Lai, Gongxian Zeng, Jian Weng
2024/1607 (PDF ) Tighter Proofs for PKE-to-KEM Transformation in the Quantum Random Oracle Model Jinrong Chen, Yi Wang, Rongmao Chen, Xinyi Huang, Wei Peng
2024/1606 (PDF ) NeutronNova: Folding everything that reduces to zero-check Abhiram Kothapalli, Srinath Setty
2024/1605 (PDF ) Nebula: Efficient read-write memory and switchboard circuits for folding schemes Arasu Arun, Srinath Setty
2024/1604 (PDF ) Predicting truncated multiple matrix congruential generators with unknown parameters Changcun Wang, Zhaopeng Dai
2024/1603 (PDF ) Boosting SNARKs and Rate-1 Barrier in Arguments of Knowledge Jiaqi Cheng, Rishab Goyal
2024/1602 (PDF ) Cryptography and Collective Power Leah Namisa Rosenbloom
2024/1601 (PDF ) Juggernaut: Efficient Crypto-Agnostic Byzantine Agreement Daniel Collins, Yuval Efron, Jovan Komatovic
2024/1600 (PDF ) Pacmann: Efficient Private Approximate Nearest Neighbor Search Mingxun Zhou, Elaine Shi, Giulia Fanti
2024/1599 (PDF ) Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes Bar Alon, Amos Beimel, Or Lasri
2024/1598 (PDF ) On the security of the initial tropical Stickel protocol and its modification based on Linde-de la Puente matrices Sulaiman Alhussaini, Serge˘ı Sergeev
2024/1597 (PDF ) An Undetectable Watermark for Generative Image Models Sam Gunn, Xuandong Zhao, Dawn Song
2024/1596 (PDF ) Secret Sharing with Publicly Verifiable Deletion Jonathan Katz, Ben Sela
2024/1595 (PDF ) DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs Yanpei Guo, Xuanming Liu, Kexi Huang, Wenjie Qu, Tianyang Tao, Jiaheng Zhang
2024/1594 (PDF ) Attacks on Goldreich's Pseudorandom Generators by Grouping and Solving Ximing Fu, Mo Li, Shihan Lyu, Chuanyi Liu
2024/1593 (PDF ) Stateful Communication with Malicious Parties Chen-Da Liu-Zhang, Christopher Portmann, Guilherme Rito
2024/1592 (PDF ) DART: Distributed argument of knowledge for rough terrains Steve Thakur
2024/1591 (PDF ) MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography Weihao Bai, Long Chen, Qianwen Gao, Zhenfeng Zhang
2024/1590 (PDF ) Matching radar signals and fingerprints with MPC Benjamin Hansen Mortensen, Mathias Karsrud Nordal, Martin Strand
2024/1589 (PDF ) A Systematic Study of Sparse LWE Aayush Jain, Huijia Lin, Sagnik Saha
2024/1588 (PDF ) A Note on ``Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming'' Zhengjun Cao, Lihua Liu
2024/1587 (PDF ) Fully Homomorphic Encryption for Cyclotomic Prime Moduli Robin Geelen, Frederik Vercauteren
2024/1586 (PDF ) WHIR: Reed–Solomon Proximity Testing with Super-Fast Verification Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, Eylon Yogev
2024/1585 (PDF ) Quantum Money from Class Group Actions on Elliptic Curves Hart Montgomery, Shahed Sharif
2024/1584 (PDF ) Block Ciphers in Idealized Models: Automated Proofs and New Security Results Miguel Ambrona, Pooya Farshim, Patrick Harasser
2024/1583 (PDF ) Efficient Pairing-Free Adaptable k-out-of-N Oblivious Transfer Protocols Keykhosro Khosravani, Taraneh Eghlidos, Mohammad reza Aref
2024/1582 (PDF ) Halving differential additions on Kummer lines Damien Robert, Nicolas Sarkis
2024/1581 (PDF ) $\mathsf{Protoss}$ Protocol for Tight Optimal Symmetric Security Emanuele Di Giandomenico, Yong Li, Sven Schäge
2024/1580 (PDF ) Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting Nicholas Carlini, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Adi Shamir
2024/1579 (PDF ) Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols Francesca Falzon, Evangelia Anna Markatou
2024/1578 (PDF ) Quantum Group Actions Tomoyuki Morimae, Keita Xagawa
2024/1577 (PDF ) Solving Multivariate Coppersmith Problems with Known Moduli Keegan Ryan
2024/1576 (PDF ) Verifiable Value Added Tax Victor Sint Nicolaas, Sascha Jafari
2024/1575 (PDF ) Efficiently-Thresholdizable Batched Identity Based Encryption, with Applications Amit Agarwal, Rex Fernando, Benny Pinkas
2024/1574 (PDF ) Scalable Two-Round $n$-out-of-$n$ and Multi-Signatures from Lattices in the Quantum Random Oracle Model Qiqi Lai, Feng-Hao Liu, Yang Lu, Haiyang Xue, Yong Yu, Yuan Chen
2024/1573 (PDF ) OML: Open, Monetizable, and Loyal AI Zerui Cheng, Edoardo Contente, Ben Finch, Oleg Golev, Jonathan Hayase, Andrew Miller, Niusha Moshrefi, Anshul Nasery, Sandeep Nailwal, Sewoong Oh, Himanshu Tyagi, Pramod Viswanath
2024/1572 (PDF ) Bounded Collusion-Resistant Registered Functional Encryption for Circuits Yijian Zhang, Jie Chen, Debiao He, Yuqing Zhang
2024/1571 (PDF ) Basefold in the List Decoding Regime Ulrich Haböck
2024/1570 (PDF ) Can KANs Do It? Toward Interpretable Deep Learning-based Side-channel Analysis Kota Yoshida, Sengim Karayalcin, Stjepan Picek
2024/1569 (PDF ) The Supersingular ℓ-Isogeny Path and Endomorphism Ring Problems: Tighter Unconditional Reductions Maher Mamah
2024/1568 (PDF ) Oracle Separation Between Quantum Commitments and Quantum One-wayness John Bostanci, Boyang Chen, Barak Nehoran
2024/1567 (PDF ) A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID Amit Behera, Giulio Malavolta, Tomoyuki Morimae, Tamer Mour, Takashi Yamakawa
2024/1566 (PDF ) Dynamic zk-SNARKs (with applications to sparse zk-SNARKs and IVC) Weijie Wang, Charalampos Papamanthou, Shravan Srinivasan, Dimitrios Papadopoulos
2024/1565 (PDF ) Fiat-Shamir in the Wild Hieu Nguyen, Uyen Ho, Alex Biryukov
2024/1564 (PDF ) A Simple Framework for Secure Key Leasing Fuyuki Kitagawa, Tomoyuki Morimae, Takashi Yamakawa
2024/1563 (PDF ) Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4 Marius A. Aardal, Gora Adj, Arwa Alblooshi, Diego F. Aranha, Isaac A. Canales-Martínez, Jorge Chavez-Saab, Décio Luiz Gazzoni Filho, Krijn Reijnders, Francisco Rodríguez-Henríquez
2024/1562 (PDF ) Fully Privacy-preserving Billing Models for Peer-to-Peer Electricity Trading Markets Akash Madhusudan, Mustafa A. Mustafa, Hilder V.L. Pereira, Erik Takke
2024/1561 (PDF ) FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation Daniel Günther, Joachim Schmidt, Thomas Schneider, Hossein Yalame
2024/1560 (PDF ) Private Set Operations from Circuit-Based PSI Jiseung Kim, Hyung Tae Lee, Yongha Son
2024/1559 (PDF ) Mind the Composition of Toffoli Gates: Structural Algebraic Distinguishers of ARADI Emanuele Bellini, Mohamed Rachidi, Raghvendra Rohit, Sharwan K. Tiwari
2024/1558 (PDF ) Understanding Leakage in Searchable Encryption: a Quantitative Approach Alexandra Boldyreva, Zichen Gui, Bogdan Warinschi
2024/1557 (PDF ) Tightly Secure Threshold Signatures over Pairing-Free Groups Renas Bacho, Benedikt Wagner
2024/1556 (PDF ) The module action for isogeny based cryptography Damien Robert
2024/1554 (PDF ) Breaking the IEEE Encryption Standard – XCB-AES in Two Queries Amit Singh Bhati, Elena Andreeva
2024/1553 (PDF ) STARK-based Signatures from the RPO Permutation Shahla Atapoor, Cyprien Delpech de Saint Guilhem, Al Kindi
2024/1552 (PDF ) Revisiting Keyed-Verification Anonymous Credentials Michele Orrù
2024/1551 (PDF ) SNARKs for Virtual Machines are Non-Malleable Matteo Campanelli, Antonio Faonio, Luigi Russo
2024/1550 (PDF ) MAYO Key Recovery by Fixing Vinegar Seeds Sönke Jendral, Elena Dubrova
2024/1549 (PDF ) Universally Composable SNARKs with Transparent Setup without Programmable Random Oracle Christian Badertscher, Matteo Campanelli, Michele Ciampi, Luigi Russo, Luisa Siniscalchi
2024/1548 (PDF ) Fully Succinct Arguments over the Integers from First Principles Matteo Campanelli, Mathias Hall-Andersen
2024/1547 (PDF ) HHL for tensor-decomposable matrices Cezary Pilaszewicz, Marian Margraf
2024/1546 (PDF ) Bit t-SNI Secure Multiplication Gadget for Inner Product Masking John Gaspoz, Siemen Dhooghe
2024/1545 (PDF ) Fully Composable Homomorphic Encryption Daniele Micciancio
2024/1544 (PDF ) PoUDR: Proof of Unified Data Retrieval in Decentralized Storage Networks Zonglun Li, Shuhao Zheng, Junliang Luo, Ziyue Xin, Dun Yuan, Shang Gao, Sichao Yang, Bin Xiao, Xue Liu
2024/1543 (PDF ) HEonGPU: a GPU-based Fully Homomorphic Encryption Library 1.0 Ali Şah Özcan, Erkay Savaş
2024/1542 (PDF ) Robust AE With Committing Security Viet Tung Hoang, Sanketh Menda
2024/1541 (PDF ) Findex: A Concurrent and Database-Independent Searchable Encryption Scheme Théophile Brézot, Chloé Hébant
2024/1540 (PDF ) Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process Pedram Hosseyni, Ralf Küsters, Tim Würtele
2024/1539 (PDF ) Quantum Cryptography from Meta-Complexity Taiga Hiroka, Tomoyuki Morimae
2024/1538 (PDF ) Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem Maggie Yongqi Guan, Yaman Yu, Tanusree Sharma, Molly Zhuangtong Huang, Kaihua Qin, Yang Wang, Kanye Ye Wang
2024/1537 (PDF ) VOLE-in-the-head signatures from Subfield Bilinear Collisions Janik Huth, Antoine Joux
2024/1536 (PDF ) Cryptographic Characterization of Quantum Advantage Tomoyuki Morimae, Yuki Shirakawa, Takashi Yamakawa
2024/1535 (PDF ) Relaxed Lattice-Based Programmable Hash Functions: New Efficient Adaptively Secure IBEs Xingye Lu, Jingjing Fan, Man Ho AU
2024/1534 (PDF ) More Efficient Lattice-based OLE from Circuit-private Linear HE with Polynomial Overhead Leo de Castro, Duhyeong Kim, Miran Kim, Keewoo Lee, Seonhong Min, Yongsoo Song
2024/1533 (PDF ) BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention Jan Bormet, Sebastian Faust, Hussien Othman, Ziyan Qu
2024/1532 (PDF ) Bitwise Garbling Schemes --- A Model with $\frac{3}{2}\kappa$-bit Lower Bound of Ciphertexts Fei Xu, Honggang Hu, Changhong Xu
2024/1531 (PDF ) FLI: Folding Lookup Instances Albert Garreta, Ignacio Manzur
2024/1530 (PDF ) Folding Schemes with Privacy Preserving Selective Verification Joan Boyar, Simon Erfurth
2024/1529 (PDF ) Challenges in Timed Cryptography: A Position Paper Karim Eldefrawy, Benjamin Terner, Moti Yung
2024/1528 (PDF ) Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption Gavin Cho, Georg Fuchsbauer, Adam O'Neill, Marek Sefranek
2024/1527 (PDF ) How to Recover the Full Plaintext of XCB Peng Wang, Shuping Mao, Ruozhou Xu, Jiwu Jing, Yuewu Wang
2024/1526 (PDF ) Overpass Channels: Horizontally Scalable, Privacy-Enhanced, with Independent Verification, Fluid Liquidity, and Robust Censorship Proof, Payments Brandon "Cryptskii" Ramsay
2024/1525 (PDF ) Evaluating Leakage Attacks Against Relational Encrypted Search Patrick Ehrler, Abdelkarim Kati, Thomas Schneider, Amos Treiber
2024/1524 (PDF ) Lower Bounds on the Overhead of Indistinguishability Obfuscation Zhenjian Lu, Noam Mazor, Igor C. Oliveira, Rafael Pass
2024/1523 (PDF ) Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments Nikhil Vanjani, Pratik Soni, Sri AravindaKrishnan Thyagarajan
2024/1522 (PDF ) Mind the Faulty Keccak: A Practical Fault Injection Attack Scheme Apply to All Phases of ML-KEM and ML-DSA Yuxuan Wang, Jintong Yu, Shipei Qu, Xiaolin Zhang, Xiaowei Li, Chi Zhang, Dawu Gu
2024/1521 (PDF ) The SMAesH dataset Gaëtan Cassiers, Charles Momin
2024/1520 (PDF ) On the rough order assumption in imaginary quadratic number fields Antonio Sanso
2024/1519 (PDF ) Efficient theta-based algorithms for computing $(\ell, \ell)$-isogenies on Kummer surfaces for arbitrary odd $\ell$ Ryo Yoshizumi, Hiroshi Onuki, Ryo Ohashi, Momonari Kudo, Koji Nuida
2024/1518 (PDF ) Witness Semantic Security Paul Lou, Nathan Manohar, Amit Sahai
2024/1517 (PDF ) A Note on the SNOVA Security Lih-Chung Wang, Chun-Yen Chou, Jintai Ding, Yen-Liang Kuan, Jan Adriaan Leegwater, Ming-Siou Li, Bo-Shu Tseng, Po-En Tseng, Chia-Chun Wang
2024/1516 (PDF ) Practical Mempool Privacy via One-time Setup Batched Threshold Encryption Arka Rai Choudhuri, Sanjam Garg, Guru-Vamsi Policharla, Mingyuan Wang
2024/1515 (PDF ) Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V} Jipeng Zhang, Yuxing Yan, Junhao Huang, Çetin Kaya Koç
2024/1514 (PDF ) Black-Box Non-Interactive Zero Knowledge from Vector Trapdoor Hash Pedro Branco, Arka Rai Choudhuri, Nico Döttling, Abhishek Jain, Giulio Malavolta, Akshayaram Srinivasan
2024/1513 (PDF ) Depth Optimized Circuits for Lattice Based Voting with Large Candidate Sets Oskar Goldhahn, Kristian Gjøsteen
2024/1511 (PDF ) Some Classes of Cubic Monomial Boolean Functions with Good Second-Order Nonlinearity RUCHI TELANG GODE
2024/1510 (PDF ) Group Factorisation for Smaller Signatures from Cryptographic Group Actions Giuseppe D'Alconzo, Alessio Meneghetti, Edoardo Signorini
2024/1509 (PDF ) DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group Semin Han, Geonho Yoon, Hyunok Oh, Jihye Kim
2024/1508 (PDF ) Key Collisions on AES and Its Applications Kodai Taiyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka, Takanori Isobe
2024/1507 (PDF ) Unbounded ABE for Circuits from LWE, Revisited Valerio Cini, Hoeteck Wee
2024/1506 (PDF ) Bit Security: optimal adversaries, equivalence results, and a toolbox for computational-statistical security analysis Daniele Micciancio, Mark Schultz-Wu
2024/1505 (PDF ) FINALLY: A Multi-Key FHE Scheme Based on NTRU and LWE Jeongeun Park, Barry Van Leeuwen, Oliver Zajonc
2024/1504 (PDF ) Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries" Thomas Schneider, Ajith Suresh, Hossein Yalame
2024/1503 (PDF ) A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts Masayuki Abe, Masaya Nanri, Miyako Ohkubo, Octavio Perez Kempner, Daniel Slamanig, Mehdi Tibouchi
2024/1502 (PDF ) MatriGear: Accelerating Authenticated Matrix Triple Generation with Scalable Prime Fields via Optimized HE Packing Hyunho Cha, Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song
2024/1501 (PDF ) Exploring User Perceptions of Security Auditing in the Web3 Ecosystem Molly Zhuangtong Huang, Rui Jiang, Tanusree Sharma, Kanye Ye Wang
2024/1500 (PDF ) Hard Quantum Extrapolations in Quantum Cryptography Luowen Qian, Justin Raizes, Mark Zhandry
2024/1499 (PDF ) Multi-Key Fully-Homomorphic Aggregate MAC for Arithmetic Circuits Suvasree Biswas, Arkady Yerukhimovich
2024/1498 (PDF ) Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script Federico Barbacovi, Enrique Larraia, Paul Germouty, Wei Zhang
2024/1497 (PDF ) Low-degree Security of the Planted Random Subgraph Problem Andrej Bogdanov, Chris Jones, Alon Rosen, Ilias Zadik
2024/1496 (PDF ) No Fish Is Too Big for Flash Boys! Frontrunning on DAG-based Blockchains Jianting Zhang, Aniket Kate
2024/1495 (PDF ) Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems Anna-Lena Horlemann, Karan Khathuria, Marc Newman, Amin Sakzad, Carlos Vela Cabello
2024/1494 (PDF ) Concretely Efficient Private Set Union via Circuit-based PSI Gowri R Chandran, Thomas Schneider, Maximilian Stillger, Christian Weinert
2024/1493 (PDF ) Rate-1 Zero-Knowledge Proofs from One-Way Functions Noor Athamnah, Eden Florentz – Konopnicki, Ron D. Rothblum
2024/1492 (PDF ) Multi-Designated Detector Watermarking for Language Models Zhengan Huang, Gongxian Zeng, Xin Mu, Yu Wang, Yue Yu
2024/1491 (PDF ) On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud Zhengjun Cao, Lihua Liu
2024/1490 (PDF ) Founding Quantum Cryptography on Quantum Advantage, or, Towards Cryptography from $\#\mathsf{P}$-Hardness Dakshita Khurana, Kabir Tomer
2024/1489 (PDF ) Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC Nishanth Chandran, Juan Garay, Ankit Kumar Misra, Rafail Ostrovsky, Vassilis Zikas
2024/1488 (PDF ) Compact Proofs of Partial Knowledge for Overlapping CNF Formulae Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti
2024/1487 (PDF ) The transition to post-quantum cryptography, metaphorically Stefan-Lukas Gazdag, Sophia Grundner-Culemann
2024/1486 (PDF ) Adaptively Secure Attribute-Based Encryption from Witness Encryption Brent Waters, Daniel Wichs
2024/1485 (PDF ) LARMix$\mathbf{++}$: Latency-Aware Routing in Mix Networks with Free Routes Topology Mahdi Rahimi
2024/1484 (PDF ) Quadratic-like balanced functions and permutations Claude Carlet, Irene Villa
2024/1483 (PDF ) Making Searchable Symmetric Encryption Schemes Smaller and Faster Debrup Chakraborty, Avishek Majumder, Subhabrata Samajder
2024/1482 (PDF ) The Power of NAPs: Compressing OR-Proofs via Collision-Resistant Hashing Katharina Boudgoust, Mark Simkin
2024/1481 (PDF ) Tighter Adaptive IBEs and VRFs: Revisiting Waters' Artificial Abort Goichiro Hanaoka, Shuichi Katsumata, Kei Kimura, Kaoru Takemure, Shota Yamada
2024/1480 (PDF ) On Schubert cells of Projective Geometry and quadratic public keys of Multivariate Cryptography Vasyl Ustimenko
2024/1479 (PDF ) Honest Majority GOD MPC with $O(\mathsf{depth}(C))$ Rounds and Low Online Communication Amit Agarwal, Alexander Bienstock, Ivan Damgård, Daniel Escudero
2024/1478 (PDF ) Mind the Bad Norms: Revisiting Compressed Oracle-based Quantum Indistinguishability Proofs Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, Ashwin Jha
2024/1477 (PDF ) Signature-based Witness Encryption with Compact Ciphertext Gennaro Avitabile, Nico Döttling, Bernardo Magri, Christos Sakkas, Stella Wohnig
2024/1476 (PDF ) The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs Mihir Bellare, Rishabh Ranjan, Doreen Riepel, Ali Aldakheel
2024/1475 (PDF ) On the Spinor Genus and the Distinguishing Lattice Isomorphism Problem Cong Ling, Jingbo Liu, Andrew Mendelsohn
2024/1474 (PDF ) Mystrium: Wide Block Encryption Efficient on Entry-Level Processors Parisa Amiri Eliasi, Koustabh Ghosh, Joan Daemen
2024/1473 (PDF ) A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction Pierre Charbit, Geoffroy Couteau, Pierre Meyer, Reza Naserasr
2024/1472 (PDF ) Isogeny-Based Secure Voting Systems for Large-Scale Elections Mohammed El Baraka, Siham Ezzouak
2024/1471 (PDF ) Communication Efficient Secure and Private Multi-Party Deep Learning Sankha Das, Sayak Ray Chowdhury, Nishanth Chandran, Divya Gupta, Satya Lokam, Rahul Sharma
2024/1470 (PDF ) Quantum Pseudorandom Scramblers Chuhan Lu, Minglong Qin, Fang Song, Penghui Yao, Mingnan Zhao
2024/1469 (PDF ) Password-Protected Threshold Signatures Stefan Dziembowski, Stanislaw Jarecki, Paweł Kędzior, Hugo Krawczyk, Chan Nam Ngo, Jiayu Xu
2024/1468 (PDF ) Dense and smooth lattices in any genus Wessel van Woerden
2024/1467 (PDF ) P2C2T: Preserving the Privacy of Cross-Chain Transfer Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino
2024/1466 (PDF ) Dishonest Majority Constant-Round MPC with Linear Communication from DDH Vipul Goyal, Junru Li, Ankit Kumar Misra, Rafail Ostrovsky, Yifan Song, Chenkai Weng
2024/1465 (PDF ) Linear approximations of the Flystel construction Tim Beyne, Clémence Bouvier
2024/1464 (PDF ) SoK: Descriptive Statistics Under Local Differential Privacy René Raab, Pascal Berrang, Paul Gerhart, Dominique Schröder
2024/1463 (PDF ) Asynchronous Verifiable Secret Sharing with Elastic Thresholds and Distributed Key Generation Junming Li, Zhi Lu, Renfei Shen, Yuanqing Feng, Songfeng Lu
2024/1462 (PDF ) Efficient Fuzzy Private Set Intersection from Fuzzy Mapping Ying Gao, Lin Qi, Xiang Liu, Yuanchao Luo, Longxin Wang
2024/1461 (PDF ) Detecting and Correcting Computationally Bounded Errors: A Simple Construction Under Minimal Assumptions Jad Silbak, Daniel Wichs
2024/1460 (PDF ) PPSA: Polynomial Private Stream Aggregation for Time-Series Data Analysis Antonia Januszewicz, Daniela Medrano Gutierrez, Nirajan Koirala, Jiachen Zhao, Jonathan Takeshita, Jaewoo Lee, Taeho Jung
2024/1459 (PDF ) Verifiable Oblivious Pseudorandom Functions from Lattices: Practical-ish and Thresholdisable Martin R. Albrecht, Kamil Doruk Gur
2024/1458 (PDF ) Providing Integrity for Authenticated Encryption in the Presence of Joint Faults and Leakage Francesco Berti, Itamar Levi
2024/1457 (PDF ) A Combined Design of 4-PLL-TRNG and 64-bit CDC-7-XPUF on a Zynq-7020 SoC Oğuz Yayla, Yunus Emre Yılmaz
2024/1456 (PDF ) Crooked Indifferentiability of the Feistel Construction Alexander Russell, Qiang Tang, Jiadong Zhu
2024/1455 (PDF ) Threshold PAKE with Security against Compromise of all Servers Yanqi Gu, Stanislaw Jarecki, Pawel Kedzior, Phillip Nazarian, Jiayu Xu
2024/1454 (PDF ) Interval Key-Encapsulation Mechanism Alexander Bienstock, Yevgeniy Dodis, Paul Rösler, Daniel Wichs
2024/1453 (PDF ) Breaking and Repairing SQIsign2D-East Wouter Castryck, Mingjie Chen, Riccardo Invernizzi, Gioella Lorenzon, Frederik Vercauteren
2024/1452 (PDF ) On the Complexity of Cryptographic Groups and Generic Group Models Cong Zhang, Keyu Ji, Taiyu Wang, Bingsheng Zhang, Hong-Sheng Zhou, Xin Wang, Kui Ren
2024/1451 (PDF ) Traffic-aware Merkle Trees for Shortening Blockchain Transaction Proofs Avi Mizrahi, Noam Koren, Ori Rottenstreich, Yuval Cassuto
2024/1450 (PDF ) TentLogiX: 5-bit Chaos-Driven S-Boxes for Lightweight Cryptographic Systems Maha Allouzi, Arefeh Rahaei
2024/1449 (PDF ) Marian: An Open Source RISC-V Processor with Zvk Vector Cryptography Extensions Thomas Szymkowiak, Endrit Isufi, Markku-Juhani Saarinen
2024/1448 (PDF ) Randomness in Private Sequential Stateless Protocols Hari Krishnan P. Anilkumar, Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran
2024/1447 (PDF ) Generic Differential Key Recovery Attacks and Beyond Ling Song, Huimin Liu, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng
2024/1446 (PDF ) Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity Saikrishna Badrinarayanan, Peihan Miao, Xinyi Shi, Max Tromanhauser, Ruida Zeng
2024/1445 (PDF ) Another Walk for Monchi Riccardo Taiello, Emre Tosun, Alberto Ibarrondo, Hervé Chabanne, Melek Önen
2024/1444 (PDF ) Attestation Proof of Association – provability that attestation keys are bound to the same hardware and person Eric Verheul
2024/1443 (PDF ) 32-bit and 64-bit CDC-7-XPUF Implementations on a Zynq-7020 SoC Oğuz Yayla, Yunus Emre Yılmaz
2024/1442 (PDF ) Design and Implementation of a Fast, Platform-Adaptive, AIS-20/31 Compliant PLL-Based True Random Number Generator on a Zynq 7020 SoC FPGA Oğuz Yayla, Yunus Emre Yılmaz
2024/1441 (PDF ) FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup Nan Wang, Dongxi Liu
2024/1440 (PDF ) Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort Johann Knechtel, Mohammad Eslami, Peng Zou, Min Wei, Xingyu Tong, Binggang Qiu, Zhijie Cai, Guohao Chen, Benchao Zhu, Jiawei Li, Jun Yu, Jianli Chen, Chun-Wei Chiu, Min-Feng Hsieh, Chia-Hsiu Ou, Ting-Chi Wang, Bangqi Fu, Qijing Wang, Yang Sun, Qin Luo, Anthony W. H. Lau, Fangzhou Wang, Evangeline F. Y. Young, Shunyang Bi, Guangxin Guo, Haonan Wu, Zhengguang Tang, Hailong You, Cong Li, Ramesh Karri, Ozgur Sinanoglu, Samuel Pagliarini
2024/1439 (PDF ) Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms Suparna Kundu, Quinten Norga, Angshuman Karmakar, Shreya Gangopadhyay, Jose Maria Bermudo Mera, Ingrid Verbauwhede
2024/1438 (PDF ) Anamorphic Authenticated Key Exchange: Double Key Distribution under Surveillance Weihao Wang, Shuai Han, Shengli Liu
2024/1437 (PDF ) UNIDLE: A Unified Framework for Deep Learning-based Side-channel Analysis Suvadeep Hajra, Debdeep Mukhopadhyay, Soumi Chatterjee
2024/1436 (PDF ) Eva: Efficient Privacy-Preserving Proof of Authenticity for Lossily Encoded Videos Chengru Zhang, Xiao Yang, David Oswald, Mark Ryan, Philipp Jovanovic
2024/1435 (PDF ) Actively Secure Polynomial Evaluation from Shared Polynomial Encodings Pascal Reisert, Marc Rivinius, Toomas Krips, Sebastian Hasler, Ralf Küsters
2024/1434 (PDF ) Untangling the Security of Kilian's Protocol: Upper and Lower Bounds Alessandro Chiesa, Marcel Dall'Agnol, Ziyi Guan, Nicholas Spooner, Eylon Yogev
2024/1433 (PDF ) $Shortcut$: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases Peizhao Zhou, Xiaojie Guo, Pinzhi Chen, Tong Li, Siyi Lv, Zheli Liu
2024/1432 (PDF ) On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages Masayuki Fukumitsu, Shingo Hasegawa
2024/1431 (PDF ) Interactive Line-Point Zero-Knowledge with Sublinear Communication and Linear Computation Fuchun Lin, Chaoping Xing, Yizhou Yao
2024/1430 (PDF ) MYao: Multiparty ``Yao'' Garbled Circuits with Row Reduction, Half Gates, and Efficient Online Computation Aner Ben-Efraim, Lior Breitman, Jonathan Bronshtein, Olga Nissenbaum, Eran Omri
2024/1429 (PDF ) Powerformer: Efficient and High-Accuracy Privacy-Preserving Language Model with Homomorphic Encryption Dongjin Park, Eunsang Lee, Joon-Woo Lee
2024/1428 (PDF ) Mario: Multi-round Multiple-Aggregator Secure Aggregation with Robustness against Malicious Actors Truong Son Nguyen, Tancrède Lepoint, Ni Trieu
2024/1427 (PDF ) LogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK Carmit Hazay, David Heath, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam, Yibin Yang
2024/1426 (PDF ) Agile Asymmetric Cryptography and the Case for Finite Fields Anna M. Johnston
2024/1425 (PDF ) New constructions of pseudorandom codes Surendra Ghentiyala, Venkatesan Guruswami
2024/1424 (PDF ) A Waterlog for Detecting and Tracing Synthetic Text from Large Language Models Brennon Brimhall, Orion Weller, Matthew Green, Ian Miers
2024/1423 (PDF ) Towards package opening detection at power-up by monitoring thermal dissipation Julien Toulemont, Geoffrey Chancel, Fréderick Mailly, Philippe Maurine, Pascal Nouet
2024/1422 (PDF ) ZKFault: Fault attack analysis on zero-knowledge based post-quantum digital signature schemes Puja Mondal, Supriya Adhikary, Suparna Kundu, Angshuman Karmakar
2024/1421 (PDF ) Provable Security of Linux-DRBG in the Seedless Robustness Model Woohyuk Chung, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee
2024/1420 (PDF ) Privacy-Preserving Breadth-First-Search and Maximal-Flow Vincent Ehrmanntraut, Ulrike Meyer
2024/1419 (PDF ) On the Relationship between Public Key Primitives via Indifferentiability Shuang Hu, Bingsheng Zhang, Cong Zhang, Kui Ren
2024/1418 (PDF ) Public-key encryption from a trapdoor one-way embedding of $SL_2(\mathbb{N})$ Robert Hines
2024/1417 (PDF ) Distributed Broadcast Encryption from Lattices Jeffrey Champion, David J. Wu
2024/1416 (PDF ) Circuit ABE with poly(depth, λ)-sized Ciphertexts and Keys from Lattices Hoeteck Wee
2024/1415 (PDF ) Privacy Comparison for Bitcoin Light Client Implementations Arad Kotzer, Ori Rottenstreich
2024/1414 (PDF ) Code-Based Zero-Knowledge from VOLE-in-the-Head and Their Applications: Simpler, Faster, and Smaller Ying Ouyang, Deng Tang, Yanhong Xu
2024/1413 (PDF ) The Black-Box Simulation Barrier Persists in a Fully Quantum World Nai-Hui Chia, Kai-Min Chung, Xiao Liang, Jiahui Liu
2024/1412 (PDF ) A New Method to Test the Zeros of Riemann Zeta Function Zhengjun Cao, Lihua Liu
2024/1411 (PDF ) Design issues of ``an anonymous authentication and key agreement protocol in smart living'' Zhengjun Cao, Lihua Liu
2024/1410 (PDF ) Cryptobazaar: Private Sealed-bid Auctions at Scale Andrija Novakovic, Alireza Kavousi, Kobi Gurkan, Philipp Jovanovic
2024/1409 (PDF ) Oraqle: A Depth-Aware Secure Computation Compiler Jelle Vos, Mauro Conti, Zekeriya Erkin
2024/1408 (PDF ) Multiple-Tweak Differential Attack Against SCARF Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, Yosuke Todo
2024/1407 (PDF ) Encrypted MultiChannel Communication (EMC2): Johnny Should Use Secret Sharing Gowri R. Chandran, Kilian Demuth, Kasra Edalatnejad, Sebastian Linsner, Christian Reuter, Thomas Schneider
2024/1406 (PDF ) Blind Multisignatures for Anonymous Tokens with Decentralized Issuance Ioanna Karantaidou, Omar Renawi, Foteini Baldimtsi, Nikolaos Kamarinakis, Jonathan Katz, Julian Loss
2024/1405 (PDF ) VECTIS: Efficient Batching Framework for Group-based CP-SNARKs Byeongjun Jang, Gweonho Jeong, Hyuktae Kwon, Hyunok Oh, Jihye Kim
2024/1404 (PDF ) PIsignHD: A New Structure for the SQIsign Family with Flexible Applicability Kaizhan Lin, Weize Wang, Chang-An Zhao, Yunlei Zhao
2024/1403 (PDF ) Hard-Label Cryptanalytic Extraction of Neural Network Models Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang
2024/1402 (PDF ) A Recursive zk-based State Update System Daniel Bloom, Sai Deng
2024/1401 (PDF ) New Techniques for Preimage Sampling: Improved NIZKs and More from LWE Brent Waters, Hoeteck Wee, David J. Wu
2024/1400 (PDF ) Efficient Asymmetric PAKE Compiler from KEM and AE You Lyu, Shengli Liu, Shuai Han
2024/1399 (PDF ) A Note on Ligero and Logarithmic Randomness Guillermo Angeris, Alex Evans, Gyumin Roh
2024/1398 (PDF ) Coercion-resistant i-voting with short PIN and OAuth 2.0 Matteo Bitussi, Riccardo Longo, Francesco Antonio Marino, Umberto Morelli, Amir Sharif, Chiara Spadafora, Alessandro Tomasi
2024/1397 (PDF ) Efficient Batch Algorithms for the Post-Quantum Crystals Dilithium Signature Scheme and Crystals Kyber Encryption Scheme Nazlı Deniz TÜRE, Murat CENK
2024/1396 (PDF ) Rare structures in tensor graphs - Bermuda triangles for cryptosystems based on the Tensor Isomorphism problem Lars Ran, Simona Samardjiska
2024/1395 (PDF ) A Formal Analysis of Apple’s iMessage PQ3 Protocol Felix Linker, Ralf Sasse, David Basin
2024/1394 (PDF ) SLAMP-FSS: Two-Party Multi-Point Function Secret Sharing from Simple Linear Algebra Erki Külaots, Toomas Krips, Hendrik Eerikson, Darya Pisetskaya, Pille Pullonen-Raudvere
2024/1393 (PDF ) Survivable Payment Channel Networks Yekaterina Podiatchev, Ariel Orda, Ori Rottenstreich
2024/1392 (PDF ) Key Policy Attribute-Based Encryption Leveraging Isogeny-Based Cryptography Madické Diadji Mbodj, Anis Bkakria
2024/1391 (PDF ) Scalable Equi-Join Queries over Encrypted Database Kai Du, Jianfeng Wang, Jiaojiao Wu, Yunling Wang
2024/1390 (PDF ) Cache Timing Leakages in Zero-Knowledge Protocols Shibam Mukherjee, Christian Rechberger, Markus Schofnegger
2024/1389 (PDF ) DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES Tomáš Gerlich, Jakub Breier, Pavel Sikora, Zdeněk Martinásek, Aron Gohr, Anubhab Baksi, Xiaolu Hou
2024/1388 (PDF ) One-Way Functions and pKt Complexity Shuichi Hirahara, Zhenjian Lu, Igor C. Oliveira
2024/1387 (PDF ) SPADE: Digging into Selective and PArtial DEcryption using Functional Encryption Camille Nuoskala, Hossein Abdinasibfar, Antonis Michalas
2024/1386 (PDF ) Problems and New Approaches for Crypto-Agility in Operational Technology Tobias Frauenschläger, Jürgen Mottok
2024/1385 (PDF ) Locally Verifiable Distributed SNARGs Eden Aldema Tshuva, Elette Boyle, Ran Cohen, Tal Moran, Rotem Oshman
2024/1384 (PDF ) Password-Protected Key Retrieval with(out) HSM Protection Sebastian Faller, Tobias Handirk, Julia Hesse, Máté Horváth, Anja Lehmann
2024/1383 (PDF ) Self-Orthogonal Minimal Codes From (Vectorial) p-ary Plateaued Functions René Rodríguez Aldama, Enes Pasalic, Fengrong Zhang, Yongzhuang Wei
2024/1382 (PDF ) Universal Context Commitment without Ciphertext Expansion Arghya Bhattacharjee, Ritam Bhaumik, Chandranan Dhar
2024/1381 (PDF ) Reality Check on Side-Channels: Lessons learnt from breaking AES on an ARM Cortex A processor Harishma Boyapally, Dirmanto Jap, Qianmei Wu, Fan Zhang, Shivam Bhasin
2024/1380 (PDF ) EUCLEAK Thomas Roche
2024/1379 (PDF ) EvalRound+ Bootstrapping and its Rigorous Analysis for CKKS Scheme Hyewon Sung, Sieun Seo, Taekyung Kim, Chohong Min
2024/1378 (PDF ) Practical Blind Signatures in Pairing-Free Groups Michael Klooß, Michael Reichle, Benedikt Wagner
2024/1377 (PDF ) Security Strengthening of Threshold Symmetric Schemes Ehsan Ebrahimi
2024/1376 (PDF ) FDFB$^2$: Functional Bootstrapping via Sparse Polynomial Multiplication Kamil Kluczniak, Leonard Schild
2024/1375 (PDF ) ALGAES: An Authenticated Lattice-based Generic Asymmetric Encryption Scheme Aravind Vishnu S S, M Sethumadhavan, Lakshmy K V
2024/1374 (PDF ) Lifting approach against the SNOVA scheme Shuhei Nakamura, Yusuke Tani, Hiroki Furue
2024/1373 (PDF ) Uncompressing Dilithium's public key Paco Azevedo Oliveira, Andersson Calle Viera, Benoît Cogliati, Louis Goubin
2024/1372 (PDF ) Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits Zhicong Huang, Wen-jie Lu, Yuchen Wang, Cheng Hong, Tao Wei, WenGuang Chen
2024/1371 (PDF ) PIGEON: A High Throughput Framework for Private Inference of Neural Networks using Secure Multiparty Computation Christopher Harth-Kitzerow, Yongqin Wang, Rachit Rajat, Georg Carle, Murali Annavaram
2024/1370 (PDF ) ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON Tarun Yadav, Manoj Kumar
2024/1369 (PDF ) AGATE: Augmented Global Attested Trusted Execution in the Universal Composability framework Lorenzo Martinico, Markulf Kohlweiss
2024/1368 (PDF ) Tightly Secure Non-Interactive BLS Multi-Signatures Renas Bacho, Benedikt Wagner
2024/1367 (PDF ) A Better Kyber Butterfly for FPGAs Jonas Bertels, Quinten Norga, Ingrid Verbauwhede
2024/1366 (PDF ) Adaptive Successive Over-Relaxation Method for a Faster Iterative Approximation of Homomorphic Operations Jungho Moon, Zhanibek Omarov, Donghoon Yoo, Yongdae An, Heewon Chung
2024/1365 (PDF ) High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature Shiyu Shen, Hao Yang, Wangchen Dai, Hong Zhang, Zhe Liu, Yunlei Zhao
2024/1364 (PDF ) FLIP-and-prove R1CS Anca Nitulescu, Nikitas Paslis, Carla Ràfols
2024/1362 (PDF ) A Documentation of Ethereum’s PeerDAS Benedikt Wagner, Arantxa Zapico
2024/1361 (PDF ) What Did Come Out of It? Analysis and Improvements of DIDComm Messaging Christian Badertscher, Fabio Banfi, Jesus Diaz
2024/1360 (PDF ) CPA-secure KEMs are also sufficient for Post-Quantum TLS 1.3 Biming Zhou, Haodong Jiang, Yunlei Zhao
2024/1359 (PDF ) Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs Debasmita Chakraborty, Hosein Hadipour, Phuong Hoa Nguyen, Maria Eichlseder
2024/1358 (PDF ) Quantum Sieving for Code-Based Cryptanalysis and Its Limitations for ISD Lynn Engelberts, Simona Etinski, Johanna Loyer
2024/1357 (PDF ) Understanding the Blockchain Interoperability Graph based on Cryptocurrency Price Correlation Ori Mazor, Ori Rottenstreich
2024/1356 (PDF ) Leakage-Resilience of Circuit Garbling Ruiyang Li, Yiteng Sun, Chun Guo, Francois-Xavier Standaert, Weijia Wang, Xiao Wang
2024/1355 (PDF ) Direct Range Proofs for Paillier Cryptosystem and Their Applications Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu
2024/1354 (PDF ) Votexx: Extreme Coercion Resistance David Chaum, Richard T. Carback, Mario Yaksetig, Jeremy Clark, Mahdi Nejadgholi, Bart Preneel, Alan T. Sherman, Filip Zagorski, Bingsheng Zhang, Zeyuan Yin
2024/1353 (PDF ) On the overflow and $p$-adic theory applied to homomorphic encryption Jacob Blindenbach, Jung Hee Cheon, Gamze Gürsoy, Jiayi Kang
2024/1352 (PDF ) ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra Doreen Riepel, Marloes Venema, Tanya Verma
2024/1351 (PDF ) Proximity Gaps in Interleaved Codes Benjamin E. Diamond, Angus Gruen
2024/1350 (PDF ) Update to the Sca25519 Library: Mitigating Tearing-based Side-channel Attacks Lukasz Chmielewski, Lubomír Hrbáček
2024/1348 (PDF ) Zero-Knowledge Validation for an Offline Electronic Document Wallet using Bulletproofs Michael Brand, Benoît Poletti
2024/1347 (PDF ) Secure Multiparty Computation with Lazy Sharing Shuaishuai Li, Cong Zhang, Dongdai Lin
2024/1346 (PDF ) Provably Secure Online Authenticated Encryption and Bidirectional Online Channels Arghya Bhattacharjee, Ritam Bhaumik, Daniel Collins, Mridul Nandi
2024/1345 (PDF ) SoK: The Engineer’s Guide to Post-Quantum Cryptography for Embedded Devices Maximilian Pursche, Nikolai Puch, Sebastian N. Peters, Michael P. Heinl
2024/1344 (PDF ) Quantum Security of a Compact Multi-Signature Shaoquan Jiang
2024/1343 (PDF ) Generalized one-way function and its application Hua-Lei Yin
2024/1342 (PDF ) Unconditionally secure key distribution without quantum channel Hua-Lei Yin
2024/1341 (PDF ) Approach for High-Performance Random Number Generators for Critical Systems Pascal Hammer, Veronika Krause, Tobias Probst, Jürgen Mottok
2024/1340 (PDF ) Unbalanced Private Set Union with Reduced Computation and Communication Cong Zhang, Yu Chen, Weiran Liu, Liqiang Peng, Meng Hao, Anyu Wang, Xiaoyun Wang
2024/1339 (PDF ) Comprehensive Robustness Analysis of GCM, CCM, and OCB3 Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu
2024/1338 (PDF ) Horcrux: Synthesize, Split, Shift and Stay Alive Preventing Channel Depletion via Universal and Enhanced Multi-hop Payments Anqi Tian, Peifang Ni, Yingzi Gao, Jing Xu
2024/1337 (PDF ) Designing bent functions using the Maiorana-McFarland secondary construction Juan Carlos Ku-Cauich, Javier Diaz-Vargas
2024/1336 (PDF ) Fast Low Level Disk Encryption Using FPGAs Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas Lopez, Palash Sarkar
2024/1335 (PDF ) Perfect Monomial Prediction for Modular Addition Kai Hu, Trevor Yap
2024/1334 (PDF ) Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map George Teseleanu
2024/1333 (PDF ) Efficient online and Non-Interactive Threshold Signatures with Identifiable Aborts for Identity-Based Signatures in the IEEE P1363 Standard Yan Jiang, Youwen Zhu, Jian Wang, Yudi Zhang
2024/1332 (PDF ) Attacking trapdoors from matrix products Thomas Decru, Tako Boris Fouotsa, Paul Frixons, Valerie Gilchrist, Christophe Petit
2024/1331 (PDF ) Practical Small Private Exponent Attacks against RSA Yansong Feng, Zhen Liu, Abderrahmane Nitaj, Yanbin Pan
2024/1330 (PDF ) Computing Asymptotic Bounds for Small Roots in Coppersmith's Method via Sumset Theory Yansong Feng, Hengyi Luo, Qiyuan Chen, Abderrahmane Nitaj, Yanbin Pan
2024/1329 (PDF ) Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA Yansong Feng, Abderrahmane Nitaj, Yanbin Pan
2024/1328 (PDF ) A Note on ARADI and LLAMA Roberto Avanzi, Orr Dunkelman, Shibam Ghosh
2024/1327 (PDF ) Public-Key Anamorphism in (CCA-secure) Public-Key Encryption and Beyond Giuseppe Persiano, Duong Hieu Phan, Moti Yung
2024/1326 (PDF ) On the anonymity of one authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks Zhengjun Cao, Lihua Liu
2024/1325 (PDF ) Authenticity in the Presence of Leakage using a Forkcipher Francesco Berti, François-Xavier Standaert, Itamar Levi
2024/1324 (PDF ) CLAASPing ARADI: Automated Analysis of the ARADI Block Cipher Emanuele Bellini, Mattia Formenti, David Gérault, Juan Grados, Anna Hambitzer, Yun Ju Huang, Paul Huynh, Mohamed Rachidi, Raghvendra Rohit, Sharwan K. Tiwari
2024/1323 (PDF ) SoK: Instruction Set Extensions for Cryptographers Hao Cheng, Johann Großschädl, Ben Marshall, Daniel Page, Markku-Juhani O. Saarinen
2024/1322 (PDF ) Revisiting a Realistic EM Side-Channel Attack on a Complex Modern SoC Debao Wang, Yiwen Gao, Yongbin Zhou, Xian Huang
2024/1321 (PDF ) ECC’s Achilles’ Heel: Unveiling Weak Keys in Standardized Curves Enrico Talotti, Matteo Paier, Marino Miculan
2024/1320 (PDF ) Post-Quantum DNSSEC over UDP via QNAME-Based Fragmentation Aditya Singh Rawat, Mahabir Prasad Jhanwar
2024/1319 (PDF ) Quantum-safe Signatureless DNSSEC Aditya Singh Rawat, Mahabir Prasad Jhanwar
2024/1318 (PDF ) Refined TFHE Leveled Homomorphic Evaluation and Its Application Ruida Wang, Jincheol Ha, Xuan Shen, Xianhui Lu, Chunling Chen, Kunpeng Wang, Jooyoung Lee
2024/1317 (PDF ) MAESTRO: Multi-party AES using Lookup Tables Hiraku Morita, Erik Pohle, Kunihiko Sadakane, Peter Scholl, Kazunari Tozawa, Daniel Tschudi
2024/1316 (PDF ) Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields Arnab Roy, Matthias Johann Steiner
2024/1315 (PDF ) PulpFHE: Complex Instruction Set Extensions for FHE Processors Omar Ahmed, Nektarios Georgios Tsoutsos
2024/1314 (PDF ) Verifiable Homomorphic Linear Combinations in Multi-Instance Time-Lock Puzzles Aydin Abadi
2024/1313 (PDF ) A Lattice Attack Against a Family of RSA-like Cryptosystems George Teseleanu
2024/1312 (PDF ) Probabilistic Data Structures in the Wild: A Security Analysis of Redis Mia Filić, Jonas Hofmann, Sam A. Markelon, Kenneth G. Paterson, Anupama Unnikrishnan
2024/1311 (PDF ) Dynamic Threshold Key Encapsulation with a Transparent Setup Joon Sik Kim, Kwangsu Lee, Jong Hwan Park, Hyoseung Kim
2024/1310 (PDF ) On the Effects of Neural Network-based Output Prediction Attacks on the Design of Symmetric-key Ciphers Hayato Watanabe, Ryoma Ito, Toshihiro Ohigashi
2024/1309 (PDF ) R-STELLAR: A Resilient Synthesizable Signature Attenuation SCA Protection on AES-256 with built-in Attack-on-Countermeasure Detection Archisman Ghosh, Dong-Hyun Seo, Debayan Das, Santosh Ghosh, Shreyas Sen
2024/1308 (PDF ) LAMA: Leakage-Abuse Attacks Against Microsoft Always Encrypted Ryan Seah, Daren Khu, Alexander Hoover, Ruth Ng
2024/1307 (PDF ) On Algebraic Homomorphic Encryption and its Applications to Doubly-Efficient PIR Hiroki Okada, Rachel Player, Simon Pohmann, Christian Weinert
2024/1306 (PDF ) Scloud+: a Lightweight LWE-based KEM without Ring/Module Structure Anyu Wang, Zhongxiang Zheng, Chunhuan Zhao, Zhiyuan Qiu, Guang Zeng, Ye Yuan, Changchun Mu, Xiaoyun Wang
2024/1305 (PDF ) Use of Simple Arithmetic Operations to Construct Efficiently Implementable Boolean functions Possessing High Nonlinearity and Good Resistance to Algebraic Attacks Claude Carlet, Palash Sarkar
2024/1304 (PDF ) Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity Xingwei Ren, Yongqiang Li, Mingsheng Wang
2024/1303 (PDF ) Efficient Zero-Knowledge Arguments for Paillier Cryptosystem Borui GONG, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, Lichun Li
2024/1302 (PDF ) Privacy-preserving in cloud networks: An efficient, revocable and authenticated encrypted search scheme Yibo Cao, Shiyuan Xu, Gang Xu, Xiu-Bo Chen, Yuling Chen, Siu-Ming Yiu
2024/1301 (PDF ) Kalos: Hierarchical-auditable and Human-binding Authentication Scheme for Clinical Trial Chang Chen, Zelong Wu, Guoyu Yang, Qi Chen, Wei Wang, Jin Li
2024/1300 (PDF ) Survey: 6 Years of Neural Differential Cryptanalysis David Gerault, Anna Hambitzer, Moritz Huppert, Stjepan Picek
2024/1299 (PDF ) Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups) Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Lei Yang
2024/1298 (PDF ) Point (de)compression for elliptic curves over highly $2$-adic finite fields Dmitrii Koshelev
2024/1297 (PDF ) Improved Cryptanalysis of SNOVA Ward Beullens
2024/1296 (PDF ) Universal Composable Transaction Serialization with Order Fairness Michele Ciampi, Aggelos Kiayias, Yu Shen
2024/1295 (PDF ) Identity-Based Encryption from Lattices with More Compactness in the Standard Model Weidan Ji, Zhedong Wang, Haoxiang Jin, Qi Wang, Geng Wang, Dawu Gu
2024/1294 (PDF ) Don’t Trust Setup! New Directions in Pre-Constrained Cryptography Shweta Agrawal, Simran Kumari, Ryo Nishimaki
2024/1293 (PDF ) Greyhound: Fast Polynomial Commitments from Lattices Ngoc Khanh Nguyen, Gregor Seiler
2024/1292 (PDF ) Hierarchical Identity-Based Matchmaking Encryption Sohto Chiku, Keisuke Hara, Junji Shikata
2024/1291 (PDF ) Raccoon: A Masking-Friendly Signature Proven in the Probing Model Rafaël del Pino, Shuichi Katsumata, Thomas Prest, Mélissa Rossi
2024/1290 (PDF ) SoK: Computational and Distributed Differential Privacy for MPC Fredrik Meisingseth, Christian Rechberger
2024/1289 (PDF ) Improved Lattice Blind Signatures from Recycled Entropy Corentin Jeudy, Olivier Sanders
2024/1288 (PDF ) KpqClean Ver2: Comprehensive Benchmarking and Analysis of KpqC Algorithm Round 2 Submissions Minjoo Sim, Siwoo Eum, Gyeongju Song, Minwoo Lee, Sangwon Kim, Minho Song, Hwajeong Seo
2024/1287 (PDF ) Basic Lattice Cryptography: The concepts behind Kyber (ML-KEM) and Dilithium (ML-DSA) Vadim Lyubashevsky
2024/1286 (PDF ) Towards a Tightly Secure Signature in Multi-User Setting with Corruptions Based on Search Assumptions Hirofumi Yoshioka, Wakaha Ogata, Keitaro Hashimoto
2024/1285 (PDF ) Robust Multiparty Computation from Threshold Encryption Based on RLWE Antoine Urban, Matthieu Rambaud
2024/1284 (PDF ) Plaintext-Ciphertext Matrix Multiplication and FHE Bootstrapping: Fast and Fused Youngjin Bae, Jung Hee Cheon, Guillaume Hanrot, Jai Hyun Park, Damien Stehlé
2024/1283 (PDF ) Password-authenticated Cryptography from Consumable Tokens Ghada Almashaqbeh
2024/1282 (PDF ) NTRU+PKE: Efficient Public-Key Encryption Schemes from the NTRU Problem Jonghyun Kim, Jong Hwan Park
2024/1281 (PDF ) Stackproofs: Private proofs of stack and contract execution using Protogalaxy Liam Eagen, Ariel Gabizon, Marek Sefranek, Patrick Towa, Zachary J. Williamson
2024/1280 (PDF ) A Survey on SoC Security Verification Methods at the Pre-silicon Stage Rasheed Kibria, Farimah Farahmandi, Mark Tehranipoor
2024/1279 (PDF ) Improved Polynomial Division in Cryptography Kostas Kryptos Chalkias, Charanjit Jutla, Jonas Lindstrom, Varun Madathil, Arnab Roy
2024/1278 (PDF ) Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys Ravi Anand, Shibam Ghosh, Takanori Isobe, Rentaro Shiba
2024/1277 (PDF ) Robust but Relaxed Probing Model Nicolai Müller, Amir Moradi
2024/1276 (PDF ) A bound on the quantum value of all compiled nonlocal games Alexander Kulpe, Giulio Malavolta, Connor Paddock, Simon Schmidt, Michael Walter
2024/1275 (PDF ) MIFARE Classic: exposing the static encrypted nonce variant Philippe Teuwen
2024/1274 (PDF ) Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples Vincent Rieder
2024/1273 (PDF ) HyperPianist: Pianist with Linear-Time Prover and Logarithmic Communication Cost Chongrong Li, Pengfei Zhu, Yun Li, Cheng Hong, Wenjie Qu, Jiaheng Zhang
2024/1272 (PDF ) An Improved Algorithm for Code Equivalence Julian Nowakowski
2024/1271 (PDF ) AES-based Multi-instance TCCR Hash with High Security, and Applications Hongrui Cui, Chun Guo, Xiao Wang, Chenkai Weng, Kang Yang, Yu Yu
2024/1270 (PDF ) Meet-in-the-Middle Attack on 4+4 Rounds of SCARF under Single-Tweak Setting Siwei Chen, Kai Hu, Guozhen Liu, Zhongfeng Niu, Quan Quan Tan, Shichang Wang
2024/1269 (PDF ) Cryptographic Security through Kleene’s Theorem and Automata Theory Mike Wa Nkongolo
2024/1268 (PDF ) Improved YOSO Randomness Generation with Worst-Case Corruptions Chen-Da Liu-Zhang, Elisaweta Masserova, João Ribeiro, Pratik Soni, Sri AravindaKrishnan Thyagarajan
2024/1267 (PDF ) Chrysalis Cipher Suite Ian Malloy, Dennis Hollenbeck
2024/1266 (PDF ) Information-Theoretic Topology-Hiding Broadcast: Wheels, Stars, Friendship, and Beyond D'or Banoun, Elette Boyle, Ran Cohen
2024/1265 (PDF ) Safe curves for elliptic-curve cryptography Daniel J. Bernstein, Tanja Lange
2024/1264 (PDF ) Succinct Non-Subsequence Arguments San Ling, Khai Hanh Tang, Khu Vu, Huaxiong Wang, Yingfei Yan
2024/1263 (PDF ) A Security Analysis of Two Classes of RSA-like Cryptosystems Paul Cotan, George Teseleanu
2024/1262 (PDF ) Dilithium-Based Verifiable Timed Signature Scheme Erkan Uslu, Oğuz Yayla
2024/1261 (PDF ) A Key-Recovery Attack on a Leaky Seasign Variant Shai Levin
2024/1260 (PDF ) zk-promises: Anonymous Moderation, Reputation, and Blocking from Anonymous Credentials with Callbacks Maurice Shih, Michael Rosenberg, Hari Kailad, Ian Miers
2024/1259 (PDF ) Efficient (Non-)Membership Tree from Multicollision-Resistance with Applications to Zero-Knowledge Proofs Maksym Petkus
2024/1258 (PDF ) Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange Mihir Bellare, Doreen Riepel, Stefano Tessaro, Yizhao Zhang
2024/1257 (PDF ) Committing Wide Encryption Mode with Minimum Ciphertext Expansion Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2024/1256 (PDF ) Concrete Analysis of Schnorr-type Signatures with Aborts Theo Fanuela Prabowo, Chik How Tan
2024/1255 (PDF ) Compass: Encrypted Semantic Search with High Accuracy Jinhao Zhu, Liana Patel, Matei Zaharia, Raluca Ada Popa
2024/1254 (PDF ) Non-Interactive Zero-Knowledge from LPN and MQ Quang Dao, Aayush Jain, Zhengzhong Jin
2024/1253 (PDF ) FELIX (XGCD for FALCON): FPGA-based Scalable and Lightweight Accelerator for Large Integer Extended GCD Sam Coulon, Tianyou Bao, Jiafeng Xie
2024/1252 (PDF ) The Pseudorandomness of Legendre Symbols under the Quadratic-Residuosity Assumption Henry Corrigan-Gibbs, David J. Wu
2024/1251 (PDF ) EMI Shielding for Use in Side-Channel Security: Analysis, Simulation and Measurements Daniel Dobkin, Edut Katz, David Popovtzer, Itamar Levi
2024/1250 (PDF ) AutoHoG: Automating Homomorphic Gate Design for Large-Scale Logic Circuit Evaluation Zhenyu Guan, Ran Mao, Qianyun Zhang, Zhou Zhang, Zian Zhao, Song Bian
2024/1249 (PDF ) Koala: A Low-Latency Pseudorandom Function Parisa Amiri Eliasi, Yanis Belkheyar, Joan Daemen, Santosh Ghosh, Daniël Kuijsters, Alireza Mehrdad, Silvia Mella, Shahram Rasoolzadeh, Gilles Van Assche
2024/1248 (PDF ) A Not So Discrete Sampler: Power Analysis Attacks on HAWK signature scheme Morgane Guerreau, Mélissa Rossi
2024/1247 (PDF ) A Note on the Quasigroup Lai-Massey Structures George Teseleanu
2024/1246 (PDF ) MSMAC: Accelerating Multi-Scalar Multiplication for Zero-Knowledge Proof Pengcheng Qiu, Guiming Wu, Tingqiang Chu, Changzheng Wei, Runzhou Luo, Ying Yan, Wei Wang, Hui Zhang
2024/1245 (PDF ) Garuda and Pari: Faster and Smaller SNARKs via Equifficient Polynomial Commitments Michel Dellepere, Pratyush Mishra, Alireza Shirzad
2024/1244 (PDF ) A Note on ``Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things'' Zhengjun Cao, Lihua Liu
2024/1243 (PDF ) Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations Thales B. Paiva, Marcos A. Simplicio Jr, Syed Mahbub Hafiz, Bahattin Yildiz, Eduardo L. Cominetti, Henrique S. Ogawa
2024/1242 (PDF ) Beyond the Whitepaper: Where BFT Consensus Protocols Meet Reality David Wong, Denis Kolegov, Ivan Mikushin
2024/1241 (PDF ) PROF: Protected Order Flow in a Profit-Seeking World Kushal Babel, Nerla Jean-Louis, Yan Ji, Ujval Misra, Mahimna Kelkar, Kosala Yapa Mudiyanselage, Andrew Miller, Ari Juels
2024/1240 (PDF ) ARADI and LLAMA: Low-Latency Cryptography for Memory Encryption Patricia Greene, Mark Motley, Bryan Weeks
2024/1239 (PDF ) Efficient Differentially Private Set Intersection Xinyu Peng, Yufei Wang, Weiran Liu, Liqiang Peng, Feng Han, Zhen Gu, Jianling Sun, Yuan Hong
2024/1238 (PDF ) Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption Rachit Garg, Rishab Goyal, George Lu
2024/1237 (PDF ) Efficient Variants of TNT with BBB Security Ritam Bhaumik, Wonseok Choi, Avijit Dutta, Cuauhtemoc Mancillas López, Hrithik Nandi, Yaobin Shen
2024/1236 (PDF ) Optimizing Big Integer Multiplication on Bitcoin: Introducing w-windowed Approach Dmytro Zakharov, Oleksandr Kurbatov, Manish Bista, Belove Bist
2024/1235 (PDF ) Blue fish, red fish, live fish, dead fish Victor Shoup
2024/1234 (PDF ) EagleSignV3 : A new secure variant of EagleSign signature over lattices Abiodoun Clement Hounkpevi, Sidoine Djimnaibeye, Michel Seck, Djiby Sow
2024/1233 (PDF ) Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC Juliane Krämer, Patrick Struck, Maximiliane Weishäupl
2024/1232 (PDF ) Efficient and Privacy-Preserving Collective Remote Attestation for NFV Ghada Arfaoui, Thibaut Jacques, Cristina Onete
2024/1231 (PDF ) A Composable View of Homomorphic Encryption and Authenticator Ganyuan Cao
2024/1230 (PDF ) Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY Jianing Zhang, Haoyang Wang, Deng Tang
2024/1229 (PDF ) Benchmarking Attacks on Learning with Errors Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin Lauter
2024/1228 (PDF ) Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models Elijah Pelofske, Vincent Urias, Lorie M. Liebrock
2024/1227 (PDF ) ZIPNet: Low-bandwidth anonymous broadcast from (dis)Trusted Execution Environments Michael Rosenberg, Maurice Shih, Zhenyu Zhao, Rui Wang, Ian Miers, Fan Zhang
2024/1226 (PDF ) A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David Basin
2024/1225 (PDF ) SIGNITC: Supersingular Isogeny Graph Non-Interactive Timed Commitments Knud Ahrens
2024/1224 (PDF ) Generic Construction of Secure Sketches from Groups Axel Durbet, Koray Karabina, Kevin Thiry-Atighehchi
2024/1223 (PDF ) A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level Diego F. Aranha, Georgios Fotiadis, Aurore Guillevic
2024/1222 (PDF ) Quantum Implementation and Analysis of ARIA Yujin Oh, Kyungbae Jang, Yujin Yang, Hwajeong Seo
2024/1221 (PDF ) Depth Optimized Quantum Circuits for HIGHT and LEA Kyungbae Jang, Yujin Oh, Minwoo Lee, Dukyoung Kim, Hwajeong Seo
2024/1220 (PDF ) Mova: Nova folding without committing to error terms Nikolaos Dimitriou, Albert Garreta, Ignacio Manzur, Ilia Vlasov
2024/1219 (PDF ) Foldable, Recursive Proofs of Isogeny Computation with Reduced Time Complexity Krystal Maughan, Joseph Near, Christelle Vincent
2024/1218 (PDF ) A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities Xavier Bonnetain, Virginie Lallemand
2024/1216 (PDF ) Delegatable Anonymous Credentials From Mercurial Signatures With Stronger Privacy Scott Griffy, Anna Lysyanskaya, Omid Mir, Octavio Perez Kempner, Daniel Slamanig
2024/1215 (PDF ) Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols Chris Brzuska, Cas Cremers, Håkon Jacobsen, Douglas Stebila, Bogdan Warinschi
2024/1214 (PDF ) Less Effort, More Success: Efficient Genetic Algorithm-Based Framework for Side-channel Collision Attacks Jiawei Zhang, Jiangshan Long, Changhai Ou, Kexin Qiao, Fan Zhang, Shi Yan
2024/1213 (PDF ) Dynamic Bounded-Collusion Streaming Functional Encryption from Minimal Assumptions Kaartik Bhushan, Alexis Korb, Amit Sahai
2024/1211 (PDF ) A Generic Framework for Side-Channel Attacks against LWE-based Cryptosystems Julius Hermelink, Silvan Streit, Erik Mårtensson, Richard Petri
2024/1210 (PDF ) More Optimizations to Sum-Check Proving Quang Dao, Justin Thaler
2024/1209 (PDF ) Collaborative CP-NIZKs: Modular, Composable Proofs for Distributed Secrets Mohammed Alghazwi, Tariq Bontekoe, Leon Visscher, Fatih Turkmen
2024/1208 (PDF ) Hekaton: Horizontally-Scalable zkSNARKs via Proof Aggregation Michael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, Pratyush Mishra
2024/1207 (PDF ) What Have SNARGs Ever Done for FHE? Michael Walter
2024/1206 (PDF ) Applying Post-Quantum Cryptography Algorithms to a DLT-Based CBDC Infrastructure: Comparative and Feasibility Analysis Daniel de Haro Moraes, Joao Paulo Aragao Pereira, Bruno Estolano Grossi, Gustavo Mirapalheta, George Marcel Monteiro Arcuri Smetana, Wesley Rodrigues, Courtnay Nery Guimarães Jr., Bruno Domingues, Fábio Saito, Marcos Simplício
2024/1205 (PDF ) Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card Zhengjun Cao, Lihua Liu
2024/1204 (PDF ) A Fast Heuristic for Mapping Boolean Circuits to Functional Bootstrapping Sergiu Carpov
2024/1203 (PDF ) Preservation of Speculative Constant-Time by Compilation Santiago Arranz Olmos, Gilles Barthe, Lionel Blatter, Benjamin Grégoire, Vincent Laporte
2024/1202 (PDF ) Prover - Toward More Efficient Formal Verification of Masking in Probing Model Feng Zhou, Hua Chen, Limin Fan
2024/1201 (PDF ) Designing a General-Purpose 8-bit (T)FHE Processor Abstraction Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey, Nicolas Ye
2024/1200 (PDF ) Depth-Aware Arithmetization of Common Primitives in Prime Fields Jelle Vos, Mauro Conti, Zekeriya Erkin
2024/1199 (PDF ) On degrees of carry and Scholz's conjecture Theophilus Agama
2024/1198 (PDF ) ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA Xinyi Ji, Jiankuo Dong, Junhao Huang, Zhijian Yuan, Wangchen Dai, Fu Xiao, Jingqiang Lin
2024/1197 (PDF ) Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng
2024/1196 (PDF ) Client-Aided Privacy-Preserving Machine Learning Peihan Miao, Xinyi Shi, Chao Wu, Ruofan Xu
2024/1195 (PDF ) Constructing More Super-optimal Pairings via Small Degree Endomorphisms Jianming Lin, Chang-An Zhao, Yuhao Zheng
2024/1194 (PDF ) Hardware Implementation and Security Analysis of Local-Masked NTT for CRYSTALS-Kyber Rafael Carrera Rodriguez, Emanuele Valea, Florent Bruguier, Pascal Benoit
2024/1193 (PDF ) The syzygy distinguisher Hugues RANDRIAMBOLOLONA
2024/1192 (PDF ) Towards ML-KEM & ML-DSA on OpenTitan Amin Abdulrahman, Felix Oberhansl, Hoang Nguyen Hien Pham, Jade Philipoom, Peter Schwabe, Tobias Stelzer, Andreas Zankl
2024/1191 (PDF ) A note on ``a novel authentication protocol for IoT-enabled devices'' Zhengjun Cao, Lihua Liu
2024/1190 (PDF ) Efficient Two-Party Secure Aggregation via Incremental Distributed Point Function Nan Cheng, Aikaterini Mitrokotsa, Feng Zhang, Frank Hartmann
2024/1189 (PDF ) The Espresso Sequencing Network: HotShot Consensus, Tiramisu Data-Availability, and Builder-Exchange Jeb Bearer, Benedikt Bünz, Philippe Camacho, Binyi Chen, Ellie Davidson, Ben Fisch, Brendon Fish, Gus Gutoski, Fernando Krell, Chengyu Lin, Dahlia Malkhi, Kartik Nayak, Keyao Shen, Alex Xiong, Nathan Yospe, Sishan Long
2024/1188 (PDF ) Lightweight Dynamic Linear Components for Symmetric Cryptography S. M. Dehnavi, M. R. Mirzaee Shamsabad
2024/1187 (PDF ) STORM — Small Table Oriented Redundancy-based SCA Mitigation for AES Yaacov Belenky, Hennadii Chernyshchyk, Oleg Karavaev, Oleh Maksymenko, Valery Teper, Daria Ryzhkova, Itamar Levi, Osnat Keren, Yury Kreimer
2024/1186 (PDF ) MATTER: A Wide-Block Tweakable Block Cipher Roberto Avanzi, Orr Dunkelman, Kazuhiko Minematsu
2024/1185 (PDF ) Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies Giacomo Borin, Yi-Fu Lai, Antonin Leroux
2024/1184 (PDF ) Sanitizable and Accountable Endorsement for Dynamic Transactions in Fabric Zhaoman Liu, Jianting Ning, Huiying Hou, Yunlei Zhao
2024/1183 (PDF ) Updatable Private Set Intersection from Structured Encryption Archita Agarwal, David Cash, Marilyn George, Seny Kamara, Tarik Moataz, Jaspal Singh
2024/1182 (PDF ) Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation Aditya Damodaran, Simon Rastikian, Peter B. Rønne, Peter Y A Ryan
2024/1181 (PDF ) AQQUA: Augmenting Quisquis with Auditability George Papadoulis, Danai Balla, Panagiotis Grontas, Aris Pagourtzis
2024/1180 (PDF ) Fast computation of 2-isogenies in dimension 4 and cryptographic applications Pierrick Dartois
2024/1179 (PDF ) Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm for Inner Product Ring LWE Problem and Ring SIS Problem Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai
2024/1178 (PDF ) Towards Quantum-Safe Blockchain: Exploration of PQC and Public-key Recovery on Embedded Systems Dominik Marchsreiter
2024/1177 (PDF ) Cryptanalysis of two post-quantum authenticated key agreement protocols Mehdi Abri, Hamid Mala
2024/1176 (PDF ) A zero-trust swarm security architecture and protocols Alex Shafarenko
2024/1175 (PDF ) AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities Vlasis Koutsos, Sankarshan Damle, Dimitrios Papadopoulos, Sujit Gujar, Dimitris Chatzopoulos
2024/1174 (PDF ) Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber Jinnuo Li, Chi Cheng, Muyan Shen, Peng Chen, Qian Guo, Dongsheng Liu, Liji Wu, Jian Weng
2024/1173 (PDF ) Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms Hengyi Luo, Kaijie Jiang, Yanbin Pan, Anyu Wang
2024/1172 (PDF ) Generalized class group actions on oriented elliptic curves with level structure Sarah Arpin, Wouter Castryck, Jonathan Komada Eriksen, Gioella Lorenzon, Frederik Vercauteren
2024/1171 (PDF ) Tight Time-Space Tradeoffs for the Decisional Diffie-Hellman Problem Akshima, Tyler Besselman, Siyao Guo, Zhiye Xie, Yuping Ye
2024/1170 (PDF ) Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism Suparna Kundu, Archisman Ghosh, Angshuman Karmakar, Shreyas Sen, Ingrid Verbauwhede
2024/1169 (PDF ) Attacking Tropical Stickel Protocol by MILP and Heuristic Optimization Techniques Sulaiman Alhussaini, Serge˘ı Sergeev
2024/1168 (PDF ) Time is not enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-timing Channel Congming Wei, Guangze Hong, An Wang, Jing Wang, Shaofei Sun, Yaoling Ding, Liehuang Zhu, Wenrui Ma
2024/1167 (PDF ) Expanding the Toolbox: Coercion and Vote-Selling at Vote-Casting Revisited Tamara Finogina, Javier Herranz, Peter B. Roenne
2024/1166 (PDF ) Relationships among FuncCPA and Its Related Notions Takumi Shinozaki, Tatsuaki Okamoto, Keisuke Takana, Masayuki Tezuka, Yusuke Yoshida
2024/1165 (PDF ) Respire: High-Rate PIR for Databases with Small Records Alexander Burton, Samir Jordan Menon, David J. Wu
2024/1164 (PDF ) A Crack in the Firmament: Restoring Soundness of the Orion Proof System and More Thomas den Hollander, Daniel Slamanig
2024/1163 (PDF ) On the Number of Restricted Solutions to Constrained Systems and their Applications Benoît Cogliati, Jordan Ethan, Ashwin Jha, Mridul Nandi, Abishanka Saha
2024/1162 (PDF ) Practical Traceable Receipt-Free Encryption Henri Devillez, Olivier Pereira, Thomas Peters
2024/1161 (PDF ) On the Concrete Security of Non-interactive FRI Alexander R. Block, Pratyush Ranjan Tiwari
2024/1159 (PDF ) LaPSuS – A Lattice-Based Private Stream Aggregation Scheme under Scrutiny Johannes Ottenhues, Alexander Koch
2024/1158 (PDF ) A Note on `` Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters'' Zhengjun Cao, Lihua Liu
2024/1157 (PDF ) Shift-invariant transformations and almost liftings Jan Kristian Haugland, Tron Omland
2024/1156 (PDF ) On affine forestry over integral domains and families of deep Jordan-Gauss graphs Tymoteusz Chojecki, Grahame Erskine, James Tuite, Vasyl Ustimenko
2024/1155 (PDF ) Cross Ledger Transaction Consistency for Financial Auditing Vlasis Koutsos, Xiangan Tian, Dimitrios Papadopoulos, Dimitris Chatzopoulos
2024/1154 (PDF ) Blockchain Space Tokenization Aggelos Kiayias, Elias Koutsoupias, Philip Lazos, Giorgos Panagiotakos
2024/1153 (PDF ) Designated-Verifier zk-SNARKs Made Easy Chen Li, Fangguo Zhang
2024/1152 (PDF ) Secure Multiparty Computation of Symmetric Functions with Polylogarithmic Bottleneck Complexity and Correlated Randomness Reo Eriguchi
2024/1151 (PDF ) Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models Aydin Abadi, Vishnu Asutosh Dasu, Sumanta Sarkar
2024/1150 (PDF ) Finding Practical Parameters for Isogeny-based Cryptography Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Francisco Rodríguez-Henríquez
2024/1149 (PDF ) Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, Rina Zeitoun
2024/1148 (PDF ) On hermitian decomposition lattices and the module-LIP problem in rank 2 Thomas Espitau, Heorhii Pliatsok
2024/1147 (PDF ) A reduction from Hawk to the principal ideal problem in a quaternion algebra Clémence Chevignard, Pierre-Alain Fouque, Guilhem Mureau, Alice Pellet-Mary, Alexandre Wallet
2024/1146 (PDF ) Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions Minglang Dong, Cong Zhang, Yujie Bai, Yu Chen
2024/1145 (PDF ) A Practical and Scalable Implementation of the Vernam Cipher, under Shannon Conditions, using Quantum Noise Adrian Neal
2024/1144 (PDF ) A Note on ``Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain'' Zhengjun Cao, Lihua Liu
2024/1143 (PDF ) LR-OT: Leakage-Resilient Oblivious Transfer Francesco Berti, Carmit Hazay, Itamar Levi
2024/1141 (PDF ) Optimized Privacy-Preserving Clustering with Fully Homomorphic Encryption Chen Yang, Jingwei Chen, Wenyuan Wu, Yong Feng
2024/1140 (PDF ) Permutation Superposition Oracles for Quantum Query Lower Bounds Christian Majenz, Giulio Malavolta, Michael Walter
2024/1139 (PDF ) Anonymous Outsourced Statekeeping with Reduced Server Storage Dana Dachman-Soled, Esha Ghosh, Mingyu Liang, Ian Miers, Michael Rosenberg
2024/1138 (PDF ) Dot-Product Proofs and Their Applications Nir Bitansky, Prahladh Harsha, Yuval Ishai, Ron D. Rothblum, David J. Wu
2024/1137 (PDF ) Cryptanalysis of EagleSign Ludo N. Pulles, Mehdi Tibouchi
2024/1136 (PDF ) Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3 Zhongyi Zhang, Chengan Hou, Meicheng Liu
2024/1135 (PDF ) Scalable and Lightweight State-Channel Audits Christian Badertscher, Maxim Jourenko, Dimitris Karakostas, Mario Larangeira
2024/1134 (PDF ) Exploiting signature leakages: breaking Enhanced pqsigRM Thomas Debris-Alazard, Pierre Loisel, Valentin Vasseur
2024/1133 (PDF ) Parameters of Algebraic Representation vs. Efficiency of Algebraic Cryptanalysis Hossein Arabnezhad, Babak Sadeghiyan
2024/1132 (PDF ) A New PPML Paradigm for Quantized Models Tianpei Lu, Bingsheng Zhang, Xiaoyuan Zhang, Kui Ren
2024/1131 (PDF ) Jolt-b: recursion friendly Jolt with basefold commitment Hang Su, Qi Yang, Zhenfei Zhang
2024/1130 (PDF ) Distributed Verifiable Random Function With Compact Proof Ahmet Ramazan Ağırtaş, Arda Buğra Özer, Zülfükar Saygı, Oğuz Yayla
2024/1129 (PDF ) Attribute-Based Signatures for Circuits with Optimal Parameter Size from Standard Assumptions Ryuya Hayashi, Yusuke Sakai, Shota Yamada
2024/1128 (PDF ) Extended Diffie-Hellman Encryption for Secure and Efficient Real-Time Beacon Notifications Liron David, Omer Berkman, Avinatan Hassidim, David Lazarov, Yossi Matias, Moti Yung
2024/1127 (PDF ) Curl: Private LLMs through Wavelet-Encoded Look-Up Tables Manuel B. Santos, Dimitris Mouris, Mehmet Ugurbil, Stanislaw Jarecki, José Reis, Shubho Sengupta, Miguel de Vega
2024/1126 (PDF ) Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods Avital Shafran, Eran Malach, Thomas Ristenpart, Gil Segev, Stefano Tessaro
2024/1125 (PDF ) Revisiting PACD-based Attacks on RSA-CRT Guillaume Barbu, Laurent Grémy, Roch Lescuyer
2024/1124 (PDF ) OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms Maximilian Kroschewski, Anja Lehmann, Cavit Özbay
2024/1123 (PDF ) Switching Off your Device Does Not Protect Against Fault Attacks Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, Vincent Grosso
2024/1122 (PDF ) Finding Bugs and Features Using Cryptographically-Informed Functional Testing Giacomo Fenzi, Jan Gilcher, Fernando Virdia
2024/1121 (PDF ) Implementation and Performance Evaluation of Elliptic Curve Cryptography over SECP256R1 on STM32 Microprocessor Onur İşler
2024/1120 (PDF ) A Fast and Efficient SIKE Co-Design: Coarse-Grained Reconfigurable Accelerators with Custom RISC-V Microcontroller on FPGA Jing Tian, Bo Wu, Lang Feng, Haochen Zhang, Zhongfeng Wang
2024/1119 (PDF ) Generic Anamorphic Encryption, Revisited: New Limitations and Constructions Dario Catalano, Emanuele Giunta, Francesco Migliaro
2024/1118 (PDF ) Shared-Custodial Password-Authenticated Deterministic Wallets Poulami Das, Andreas Erwig, Sebastian Faust
2024/1117 (PDF ) Oryx: Private detection of cycles in federated graphs Ke Zhong, Sebastian Angel
2024/1116 (PDF ) A Simple Post-Quantum Oblivious Transfer Protocol from Mod-LWR Shen Dong, Hongrui Cui, Kaiyi Zhang, Kang Yang, Yu Yu
2024/1115 (PDF ) Public vs Private Blockchains lineage storage Bilel Zaghdoudi, Maria Potop Butucaru
2024/1114 (PDF ) Time-Memory Trade-off Algorithms for Homomorphically Evaluating Look-up Table in TFHE Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Takashi Nishide
2024/1113 (PDF ) Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors Cecilia Boschini, Darya Kaviani, Russell W. F. Lai, Giulio Malavolta, Akira Takahashi, Mehdi Tibouchi
2024/1112 (PDF ) HERatio: Homomorphic Encryption of Rationals using Laurent Polynomials Luke Harmon, Gaetan Delavignette, Hanes Oliveira
2024/1111 (PDF ) Collision-Based Attacks on Block Cipher Modes - Exploiting Collisions and Their Absence John Preuß Mattsson
2024/1110 (PDF ) Legacy Encryption Downgrade Attacks against LibrePGP and CMS Falko Strenzke, Johannes Roth
2024/1109 (PDF ) QuickPool: Privacy-Preserving Ride-Sharing Service Banashri Karmakar, Shyam Murthy, Arpita Patra, Protik Paul
2024/1108 (PDF ) Faster Asynchronous Blockchain Consensus and MVBA Matthieu Rambaud
2024/1107 (PDF ) Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements Colin O'Flynn
2024/1106 (PDF ) Masked Vector Sampling for HQC Maxime Spyropoulos, David Vigilant, Fabrice Perion, Renaud Pacalet, Laurent Sauvage
2024/1105 (PDF ) A New CRT-based Fully Homomorphic Encryption Anil Kumar Pradhan, Abhraneel Dutta, Hansraj Jangir
2024/1104 (PDF ) Structural Lower Bounds on Black-Box Constructions of Pseudorandom Functions Amos Beimel, Tal Malkin, Noam Mazor
2024/1103 (PDF ) A Note on Efficient Computation of the Multilinear Extension Ron D. Rothblum
2024/1102 (PDF ) A Note on ``Privacy Preserving n-Party Scalar Product Protocol'' Lihua Liu
2024/1101 (PDF ) Stickel’s Protocol using Tropical Increasing Matrices Any Muanalifah, Zahari Mahad, Nurwan, Rosalio G Artes
2024/1100 (PDF ) Unforgeability of Blind Schnorr in the Limited Concurrency Setting Franklin Harding, Jiayu Xu
2024/1099 (PDF ) FHE-MENNs: Opportunities and Pitfalls for Accelerating Fully Homomorphic Private Inference with Multi-Exit Neural Networks Lars Wolfgang Folkerts, Nektarios Georgios Tsoutsos
2024/1098 (PDF ) Limits of Black-Box Anamorphic Encryption Dario Catalano, Emanuele Giunta, Francesco Migliaro
2024/1097 (PDF ) The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging Michael Anastos, Benedikt Auerbach, Mirza Ahad Baig, Miguel Cueto Noval, Matthew Kwan, Guillermo Pascual-Perez, Krzysztof Pietrzak
2024/1096 (PDF ) Post-Quantum Ready Key Agreement for Aviation Marcel Tiepelt, Christian Martin, Nils Maeurer
2024/1095 (PDF ) Lower Bound on Number of Compression Calls of a Collision-Resistance Preserving Hash Debasmita Chakraborty, Mridul Nandi
2024/1094 (PDF ) Notes on Multiplying Cyclotomic Polynomials on a GPU Joseph Johnston
2024/1093 (PDF ) ROTL: Faster Lookup Table Evaluation Xiaoyang Hou, Jian Liu, Jingyu Li, Jiawen Zhang, Kui Ren, Chun Chen
2024/1092 (PDF ) Fusion Channel Attack with POI Learning Encoder Xinyao Li, Xiwen Ren, Ling Ning, Changhai Ou
2024/1091 (PDF ) MatcHEd: Privacy-Preserving Set Similarity based on MinHash Rostin Shokri, Charles Gouert, Nektarios Georgios Tsoutsos
2024/1090 (PDF ) PolyFHEmus: Rethinking Multiplication in Fully Homomorphic Encryption Charles Gouert, Nektarios Georgios Tsoutsos
2024/1089 (PDF ) Juliet: A Configurable Processor for Computing on Encrypted Data Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos
2024/1088 (PDF ) HElix: Genome Similarity Detection in the Encrypted Domain Rostin Shokri, Charles Gouert, Nektarios Georgios Tsoutsos
2024/1087 (PDF ) Tyche: Probabilistic Selection over Encrypted Data for Generative Language Models Lars Folkerts, Nektarios Georgios Tsoutsos
2024/1086 (PDF ) Obfuscated Key Exchange Felix Günther, Douglas Stebila, Shannon Veitch
2024/1085 (PDF ) Randomized Distributed Function Computation with Semantic Communications: Applications to Privacy Onur Gunlu
2024/1084 (PDF ) Enabling Complete Atomicity for Cross-chain Applications Through Layered State Commitments Yuandi Cai, Ru Cheng, Yifan Zhou, Shijie Zhang, Jiang Xiao, Hai Jin
2024/1083 (PDF ) LEA Block Cipher in Rust Language: Trade-off between Memory Safety and Performance Sangwon Kim, Siwoo Eum, Minho Song, Hwajeong Seo
2024/1082 (PDF ) Quantum Implementation of LSH Yujin Oh, Kyungbae Jang, Hwajeong Seo
2024/1081 (PDF ) Practical Non-interactive Multi-signatures, and a Multi-to-Aggregate Signatures Compiler Matthieu Rambaud, Christophe Levrat
2024/1080 (PDF ) Separating Selective Opening Security From Standard Security, Assuming IO Justin Holmgren, Brent Waters
2024/1079 (PDF ) QuietOT: Lightweight Oblivious Transfer with a Public-Key Setup Geoffroy Couteau, Lalita Devadas, Srinivas Devadas, Alexander Koch, Sacha Servan-Schreiber
2024/1078 (PDF ) GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song
2024/1077 (PDF ) Securely Training Decision Trees Efficiently Divyanshu Bhardwaj, Sandhya Saravanan, Nishanth Chandran, Divya Gupta
2024/1076 (PDF ) A More Compact AES, and More Dag Arne Osvik, David Canright
2024/1075 (PDF ) TaSSLE: Lasso for the commitment-phobic Tesseract Dore
2024/1074 (PDF ) Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini
2024/1073 (PDF ) Message Latency in Waku Relay with Rate Limiting Nullifiers Alvaro Revuelta, Sergei Tikhomirov, Aaryamann Challani, Hanno Cornelius, Simon Pierre Vivier
2024/1072 (PDF ) A Study of Partial Non-Linear Layers with DEFAULT and BAKSHEESH Anubhab Baksi
2024/1071 (PDF ) On the efficient representation of isogenies (a survey) Damien Robert
2024/1070 (PDF ) Protecting Cryptographic Code Against Spectre-RSB Santiago Arranz Olmos, Gilles Barthe, Chitchanok Chuengsatiansup, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Peter Schwabe, Yuval Yarom, Zhiyuan Zhang
2024/1069 (PDF ) Strong Existential Unforgeability and BUFF Securities of MPC-in-the-Head Signatures Mukul Kulkarni, Keita Xagawa
2024/1068 (PDF ) From Interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote Attestation Shahriar Ebrahimi, Parisa Hassanizadeh
2024/1067 (PDF ) Efficient Lattice-Based Threshold Signatures with Functional Interchangeability Guofeng Tang, Bo Pang, Long Chen, Zhenfeng Zhang
2024/1066 (PDF ) VerITAS: Verifying Image Transformations at Scale Trisha Datta, Binyi Chen, Dan Boneh
2024/1065 (PDF ) AITIA: Efficient Secure Computation of Bivariate Causal Discovery Truong Son Nguyen, Lun Wang, Evgenios M. Kornaropoulos, Ni Trieu
2024/1064 (PDF ) ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption Zhou Zhang, Song Bian, Zian Zhao, Ran Mao, Haoyi Zhou, Jiafeng Hua, Yier Jin, Zhenyu Guan
2024/1063 (PDF ) VIMz: Private Proofs of Image Manipulation using Folding-based zkSNARKs Stefan Dziembowski, Shahriar Ebrahimi, Parisa Hassanizadeh
2024/1062 (PDF ) Compact Key Function Secret Sharing with Non-linear Decoder Chandan Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay
2024/1061 (PDF ) Insta-Pok3r: Real-time Poker on Blockchain Sanjam Garg, Aniket Kate, Pratyay Mukherjee, Rohit Sinha, Sriram Sridhar
2024/1060 (PDF ) Quirky Interactive Reductions of Knowledge Joseph Johnston
2024/1059 (PDF ) HEProfiler: An In-Depth Profiler of Approximate Homomorphic Encryption Libraries Jonathan Takeshita, Nirajan Koirala, Colin McKechney, Taeho Jung
2024/1058 (PDF ) Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them Matteo Campanelli, Dario Fiore, Rosario Gennaro
2024/1057 (PDF ) Password-authenticated Key Exchange and Applications Kristian Gjøsteen
2024/1056 (PDF ) Shuffle Arguments Based on Subset-Checking Behzad Abdolmaleki, Prastudy Fauzi, Toomas Krips, Janno Siim
2024/1055 (PDF ) Enhancing Local Verification: Aggregate and Multi-Signature Schemes Ahmet Ramazan Ağırtaş, Neslihan Yaman Gökce, Oğuz Yayla
2024/1054 (PDF ) Optimized Computation of the Jacobi Symbol Jonas Lindstrøm, Kostas Kryptos Chalkias
2024/1053 (PDF ) Stochastic Secret Sharing with $1$-Bit Shares and Applications to MPC Benny Applebaum, Eliran Kachlon
2024/1052 (PDF ) A New Fine Tuning Method for FHEW/TFHE Bootstrapping with IND-CPAD Security Deokhwa Hong, Young-Sik Kim, Yongwoo Lee, Eunyoung Seo
2024/1051 (PDF ) Adaptor Signatures: New Security Definition and A Generic Construction for NP Relations Xiangyu Liu, Ioannis Tzannetos, Vassilis Zikas
2024/1050 (PDF ) On Sequential Functions and Fine-Grained Cryptography Jiaxin Guan, Hart Montgomery
2024/1049 (PDF ) KyberSlash: Exploiting secret-dependent division timings in Kyber implementations Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales Paiva, Prasanna Ravi, Goutam Tamvada
2024/1048 (PDF ) Distributional Secure Merge Gayathri Garimella, Srinivasan Raghuramam, Peter Rindal
2024/1047 (PDF ) Improved Multi-Party Fixed-Point Multiplication Saikrishna Badrinarayanan, Eysa Lee, Peihan Miao, Peter Rindal
2024/1046 (PDF ) The Sum-Check Protocol over Fields of Small Characteristic Suyash Bagad, Yuval Domb, Justin Thaler
2024/1045 (PDF ) Efficient Secret Sharing for Large-Scale Applications Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo
2024/1044 (PDF ) Searching for differential addition chains Daniel J. Bernstein, Jolijn Cottaar, Tanja Lange
2024/1043 (PDF ) Cryptography in the Common Haar State Model: Feasibility Results and Separations Prabhanjan Ananth, Aditya Gulati, Yao-Ting Lin
2024/1042 (PDF ) Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model Tariq Bontekoe, Hassan Jameel Asghar, Fatih Turkmen
2024/1041 (PDF ) Embedding Integer Lattices as Ideals into Polynomial Rings Yihang Cheng, Yansong Feng, Yanbin Pan
2024/1040 (PDF ) PeaceFounder: centralised E2E verifiable evoting via pseudonym braiding and history trees Janis Erdmanis
2024/1039 (PDF ) Reduction from Average-Case M-ISIS to Worst-Case CVP Over Perfect Lattices Samuel Lavery
2024/1038 (PDF ) Constraint-Packing and the Sum-Check Protocol over Binary Tower Fields Quang Dao, Justin Thaler
2024/1037 (PDF ) A note on adding zero-knowledge to STARKs Ulrich Haböck, Al Kindi
2024/1036 (PDF ) A note on the G-FFT Ulrich Haböck
2024/1035 (PDF ) Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks Sirui Shen, Chenglu Jin
2024/1034 (PDF ) A Practical Protocol for Quantum Oblivious Transfer from One-Way Functions Eleni Diamanti, Alex B. Grilo, Adriano Innocenzi, Pascal Lefebvre, Verena Yacoub, Álvaro Yángüez
2024/1033 (PDF ) Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with Rewinding Shuichi Katsumata, Michael Reichle, Kaoru Takemure
2024/1032 (PDF ) Threshold OPRF from Threshold Additive HE Animesh Singh, Sikhar Patranabis, Debdeep Mukhopadhyay
2024/1031 (PDF ) SACfe: Secure Access Control in Functional Encryption with Unbounded Data Uddipana Dowerah, Subhranil Dutta, Frank Hartmann, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal
2024/1030 (PDF ) GRASP: Accelerating Hash-based PQC Performance on GPU Parallel Architecture Yijing Ning, Jiankuo Dong, Jingqiang Lin, Fangyu Zheng, Yu Fu, Zhenjiang Dong, Fu Xiao
2024/1029 (PDF ) Oblivious Single Access Machines: A New Model for Oblivious Computation Ananya Appan, David Heath, Ling Ren
2024/1028 (PDF ) FASIL: A challenge-based framework for secure and privacy-preserving federated learning Ferhat Karakoç, Betül Güvenç Paltun, Leyli Karaçay, Ömer Tuna, Ramin Fuladi, Utku Gülen
2024/1027 (PDF ) Structured-Seed Local Pseudorandom Generators and their Applications Benny Applebaum, Dung Bui, Geoffroy Couteau, Nikolas Melissaris
2024/1026 (PDF ) MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing without Pre-Processing Martin Zbudila, Erik Pohle, Aysajan Abidin, Bart Preneel
2024/1025 (PDF ) Polynomial sharings on two secrets: Buy one, get one free Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Maximilian Orlt
2024/1024 (PDF ) Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity Behzad Abdolmaleki, Antonis Michalas, Reyhaneh Rabaninejad, Sebastian Ramacher, Daniel Slamanig
2024/1023 (PDF ) Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices Feixiang Zhao, Huaxiong Wang, Jian Weng
2024/1022 (PDF ) Competitive Policies for Online Collateral Maintenance Ghada Almashaqbeh, Sixia Chen, Alexander Russell
2024/1021 (PDF ) ammBoost: State Growth Control for AMMs Nicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh
2024/1020 (PDF ) chainBoost: A Secure Performance Booster for Blockchain-based Resource Markets Zahra Motaqy, Mohamed E. Najd, Ghada Almashaqbeh
2024/1019 (PDF ) Exploiting Clock-Slew Dependent Variability in CMOS Digital Circuits Towards Power and EM SCA Resilience Archisman Ghosh, Md. Abdur Rahman, Debayan Das, Santosh Ghosh, Shreyas Sen
2024/1018 (PDF ) Sparsity-Aware Protocol for ZK-friendly ML Models: Shedding Lights on Practical ZKML Alan Li, Qingkai Liang, Mo Dong
2024/1017 (PDF ) Accelerating pairings on BW10 and BW14 Curves Senegue Gomez Nyamsi, Laurian Guimagang Azebaze, Emmanuel Fouotsa
2024/1016 (PDF ) A Succinct Range Proof for Polynomial-based Vector Commitment Rui Gao, Zhiguo Wan, Yuncong Hu, Huaqun Wang
2024/1015 (PDF ) Expediting Homomorphic Computation via Multiplicative Complexity-aware Multiplicative Depth Minimization Mingfei Yu, Giovanni De Micheli
2024/1014 (PDF ) Grafting: Decoupled Scale Factors and Modulus in RNS-CKKS Jung Hee Cheon, Hyeongmin Choe, Minsik Kang, Jaehyung Kim, Seonghak Kim, Johannes Mono, Taeyeong Noh
2024/1013 (PDF ) Tempora-Fusion: Time-Lock Puzzle with Efficient Verifiable Homomorphic Linear Combination Aydin Abadi
2024/1012 (PDF ) Supersonic OT: Fast Unconditionally Secure Oblivious Transfer Aydin Abadi, Yvo Desmedt
2024/1011 (PDF ) Secure Vickrey Auctions with Rational Parties Chaya Ganesh, Shreyas Gupta, Bhavana Kanukurthi, Girisha Shankar
2024/1010 (PDF ) FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu Ming Yiu, Xuan Wang
2024/1009 (PDF ) Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences Maciej Obremski, João Ribeiro, Lawrence Roy, François-Xavier Standaert, Daniele Venturi
2024/1008 (PDF ) Impossible Boomerang Distinguishers Revisited Xichao Hu, Lin Jiao, Dengguo Feng, Yonglin Hao, Xinxin Gong, Yongqiang Li, Siwei Sun
2024/1007 (PDF ) On the vector subspaces of $\mathbb{F}_{2^n}$ over which the multiplicative inverse function sums to zero Claude Carlet
2024/1006 (PDF ) Delegated-Query Oblivious Transfer and its Practical Applications Yvo Desmedt, Aydin Abadi
2024/1005 (PDF ) Differential Fault Attack on HE-Friendly Stream Ciphers: Masta, Pasta and Elisabeth Weizhe Wang, Deng Tang
2024/1004 (PDF ) Relaxed Vector Commitment for Shorter Signatures Seongkwang Kim, Byeonghak Lee, Mincheol Son
2024/1003 (PDF ) zkVoting : Zero-knowledge proof based coercion-resistant and E2E verifiable e-voting system Seongho Park, Jaekyoung Choi, Jihye Kim, Hyunok Oh
2024/1002 (PDF ) Elementary Formulas for Greatest Common Divisors and Semiprime Factors Joseph M. Shunia
2024/1001 (PDF ) Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption Elena Kirshanova, Chiara Marcolla, Sergi Rovira
2024/1000 (PDF ) File-Injection Attacks on Searchable Encryption, Based on Binomial Structures Tjard Langhout, Huanhuan Chen, Kaitai Liang
2024/999 (PDF ) ProxCode: Efficient Biometric Proximity Searchable Encryption from Error Correcting Codes Maryam Rezapour, Benjamin Fuller
2024/998 (PDF ) Measuring Conditional Anonymity - A Global Study Pascal Berrang, Paul Gerhart, Dominique Schröder
2024/997 (PDF ) Dishonest Majority Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted Verifiers Daniel Escudero, Antigoni Polychroniadou, Yifan Song, Chenkai Weng
2024/996 (PDF ) Great-LaKeys: An Improved Threshold-PRF and a Novel Exponent-VRF from LWR Matthias Geihs
2024/995 (PDF ) Cross-chain bridges via backwards-compatible SNARKs Sergio Juárez, Mark Blunden, Joris Koopman, Anish Mohammed, Kapil Shenvi Pause, Steve Thakur
2024/994 (PDF ) On Knowledge-Soundness of Plonk in ROM from Falsifiable Assumptions Helger Lipmaa, Roberto Parisella, Janno Siim
2024/993 (PDF ) Limits on the Power of Prime-Order Groups: Separating Q-Type from Static Assumptions George Lu, Mark Zhandry
2024/992 (PDF ) An analysis of the Crossbred Algorithm for the MQ Problem Damien Vidal, Sorina Ionica, Claire Delaplace
2024/991 (PDF ) Leveled Homomorphic Encryption Schemes for Homomorphic Encryption Standard Shuhong Gao, Kyle Yates
2024/990 (PDF ) Perfectly-secure Network-agnostic MPC with Optimal Resiliency Shravani Patil, Arpita Patra
2024/989 (PDF ) A Formal Treatment of End-to-End Encrypted Cloud Storage Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller, Kenneth G. Paterson
2024/988 (PDF ) Privacy-Preserving Dijkstra Benjamin Ostrovsky
2024/987 (PDF ) CoGNN: Towards Secure and Efficient Collaborative Graph Learning Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu
2024/986 (PDF ) FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis
2024/985 (PDF ) DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj
2024/984 (PDF ) Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation (Extended Version) Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomáš Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdeněk Martinásek, Shivam Bhasin
2024/983 (PDF ) SoCureLLM: An LLM-driven Approach for Large-Scale System-on-Chip Security Verification and Policy Generation Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi
2024/982 (PDF ) SoK: Programmable Privacy in Distributed Systems Daniel Benarroch, Bryan Gillespie, Ying Tong Lai, Andrew Miller
2024/981 (PDF ) Hadamard Product Arguments and Their Applications Kyeongtae Lee, Donghwan Oh, Hankyung Ko, Jihye Kim, Hyunok Oh
2024/980 (PDF ) FaultyGarble: Fault Attack on Secure Multiparty Neural Network Inference Mohammad Hashemi, Dev Mehta, Kyle Mitard, Shahin Tajik, Fatemeh Ganji
2024/979 (PDF ) Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs Alex Ozdemir, Evan Laufer, Dan Boneh
2024/978 (PDF ) Distributed PIR: Scaling Private Messaging via the Users' Machines Elkana Tovey, Jonathan Weiss, Yossi Gilad
2024/977 (PDF ) Improved Boomerang Attacks on 6-Round AES Augustin Bariant, Orr Dunkelman, Nathan Keller, Gaëtan Leurent, Victor Mollimard
2024/976 (PDF ) PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds Yuval Ishai, Elaine Shi, Daniel Wichs
2024/975 (PDF ) ZLR: a fast online authenticated encryption scheme achieving full security Wonseok Choi, Seongha Hwang, Byeonghak Lee, Jooyoung Lee
2024/974 (PDF ) Towards Optimal Parallel Broadcast under a Dishonest Majority Daniel Collins, Sisi Duan, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos, Haochen Wang
2024/973 (PDF ) ICICLE v2: Polynomial API for Coding ZK Provers to Run on Specialized Hardware Karthik Inbasekar, Yuval Shekel, Michael Asa
2024/972 (PDF ) Efficient Secure Communication Over Dynamic Incomplete Networks With Minimal Connectivity Ivan Damgård, Divya Ravi, Lawrence Roy, Daniel Tschudi, Sophia Yakoubov
2024/971 (PDF ) A Note on (2, 2)-isogenies via Theta Coordinates Jianming Lin, Saiyu Wang, Chang-An Zhao
2024/970 (PDF ) Cryptography at the Crossroads: Ethical Responsibility, the Cypherpunk Movement and Institutions Eric Blair
2024/969 (PDF ) Probabilistic Attacks and Enhanced Security for "Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF" Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai
2024/968 (PDF ) Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility Jia Liu, Mark Manulis
2024/967 (PDF ) Consolidated Linear Masking (CLM): Generalized Randomized Isomorphic Representations, Powerful Degrees of Freedom and Low(er)-cost Itamar Levi, Osnat Keren
2024/966 (PDF ) Diffuse Some Noise: Diffusion Models for Measurement Noise Removal in Side-channel Analysis Sengim Karayalcin, Guilherme Perin, Stjepan Picek
2024/965 (PDF ) Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things Shiyuan Xu, Xue Chen, Yu Guo, Siu-Ming Yiu, Shang Gao, Bin Xiao
2024/964 (PDF ) Malicious Security for PIR (almost) for Free Brett Falk, Pratyush Mishra, Matan Shtepel
2024/963 (PDF ) Shared OT and Its Applications Lucas Piske, Jeroen van de Graaf, Anderson C. A. Nascimento, Ni Trieu
2024/962 (PDF ) Secure Account Recovery for a Privacy-Preserving Web Service Ryan Little, Lucy Qin, Mayank Varia
2024/961 (PDF ) Efficient Execution Auditing for Blockchains under Byzantine Assumptions Jeff Burdges, Alfonso Cevallos, Handan Kılınç Alper, Chen-Da Liu-Zhang, Fatemeh Shirazi, Alistair Stewart, Rob Habermeier, Robert Klotzner, Andronik Ordian
2024/960 (PDF ) Designs for practical SHE schemes based on Ring-LWR Madalina Bolboceanu, Anamaria Costache, Erin Hales, Rachel Player, Miruna Rosca, Radu Titiu
2024/959 (PDF ) Flood and Submerse: Distributed Key Generation and Robust Threshold Signature from Lattices Thomas Espitau, Guilhem Niot, Thomas Prest
2024/958 (PDF ) Signer Revocability for Threshold Ring Signatures Da Teng, Yanqing Yao
2024/957 (PDF ) VRaaS: Verifiable Randomness as a Service on Blockchains Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar, Sri AravindaKrishnan Thyagarajan
2024/956 (PDF ) SNARGs under LWE via Propositional Proofs Zhengzhong Jin, Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan
2024/955 (PDF ) ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections Josh Benaloh, Michael Naehrig, Olivier Pereira, Dan S. Wallach
2024/954 (PDF ) Arithmetisation of computation via polynomial semantics for first-order logic Murdoch J. Gabbay
2024/953 (PDF ) MixBuy: Contingent Payment in the Presence of Coin Mixers Diego Castejon-Molina, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez
2024/952 (PDF ) Communication Complexity vs Randomness Complexity in Interactive Proofs Benny Applebaum, Kaartik Bhushan, Manoj Prabhakaran
2024/951 (PDF ) Notes on (failed) attempts to instantiate TLR3 Alexander Maximov
2024/950 (PDF ) DISCO: Dynamic Searchable Encryption with Constant State Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang
2024/949 (PDF ) Efficient 2PC for Constant Round Secure Equality Testing and Comparison Tianpei Lu, Xin Kang, Bingsheng Zhang, Zhuo Ma, Xiaoyuan Zhang, Yang Liu, Kui Ren, Chun Chen
2024/948 (PDF ) Return of the Kummer: a Toolbox for Genus-2 Cryptography Maria Corte-Real Santos, Krijn Reijnders
2024/947 (PDF ) A Modular Approach to Registered ABE for Unbounded Predicates Nuttapong Attrapadung, Junichi Tomida
2024/946 (PDF ) Provably Secure Butterfly Key Expansion from the CRYSTALS Post-Quantum Schemes Edward Eaton, Philippe Lamontagne, Peter Matsakis
2024/945 (PDF ) Quantum-Safe Public Key Blinding from MPC-in-the-Head Signature Schemes Sathvika Balumuri, Edward Eaton, Philippe Lamontagne
2024/944 (PDF ) Quantum CCA-Secure PKE, Revisited Navid Alamati, Varun Maram
2024/943 (PDF ) Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKs Chaya Ganesh, Vineet Nair, Ashish Sharma
2024/942 (PDF ) Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Client Stragglers Riccardo Taiello, Melek Önen, Clémentine Gritti, Marco Lorenzi
2024/941 (PDF ) SmartZKCP: Towards Practical Data Exchange Marketplace Against Active Attacks Xuanming Liu, Jiawen Zhang, Yinghao Wang, Xinpeng Yang, Xiaohu Yang
2024/940 (PDF ) Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation Xuanming Liu, Zhelei Zhou, Yinghao Wang, Yanxin Pang, Jinye He, Bingsheng Zhang, Xiaohu Yang, Jiaheng Zhang
2024/939 (PDF ) Two RSA-based Cryptosystems A. Telveenus
2024/938 (PDF ) Certifying Private Probabilistic Mechanisms Zoë Ruha Bell, Shafi Goldwasser, Michael P. Kim, Jean-Luc Watson
2024/937 (PDF ) Distributed Point Function with Constraints, Revisited Keyu Ji, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2024/936 (PDF ) Willow: Secure Aggregation with One-Shot Clients James Bell-Clark, Adrià Gascón, Baiyu Li, Mariana Raykova, Phillipp Schoppmann
2024/935 (PDF ) MFKDF: Multiple Factors Knocked Down Flat Matteo Scarlata, Matilda Backendal, Miro Haller
2024/934 (PDF ) An Explicit High-Moment Forking Lemma and its Applications to the Concrete Security of Multi-Signatures Gil Segev, Liat Shapira
2024/933 (PDF ) A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for NP Brent Waters, David J. Wu
2024/932 (PDF ) CISELeaks: Information Leakage Assessment of Cryptographic Instruction Set Extension Prototypes Aruna Jayasena, Richard Bachmann, Prabhat Mishra
2024/931 (PDF ) Multi-Hop Multi-Key Homomorphic Signatures with Context Hiding from Standard Assumptions Abtin Afshar, Jiaqi Cheng, Rishab Goyal
2024/930 (PDF ) Information-Theoretic Single-Server PIR in the Shuffle Model Yuval Ishai, Mahimna Kelkar, Daniel Lee, Yiping Ma
2024/929 (PDF ) Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis Itai Dinur
2024/928 (PDF ) The Committing Security of MACs with Applications to Generic Composition Ritam Bhaumik, Bishwajit Chakraborty, Wonseok Choi, Avijit Dutta, Jérôme Govinden, Yaobin Shen
2024/926 (PDF ) Verifiable and Private Vote-by-Mail Henri Devillez, Olivier Pereira, Thomas Peters
2024/925 (PDF ) Time Sharing - A Novel Approach to Low-Latency Masking Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
2024/924 (PDF ) Climbing and descending tall isogeny volcanos Steven Galbraith
2024/923 (PDF ) On Orchestrating Parallel Broadcasts for Distributed Ledgers Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, Maofan Yin
2024/922 (PDF ) Scalable Private Set Union, with Stronger Security Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu
2024/921 (PDF ) Simple Logarithmic-size LSAG signature Edsger Hughes
2024/920 (PDF ) Leveraging Small Message Spaces for CCA1 Security in Additively Homomorphic and BGN-type Encryption Benoit Libert
2024/919 (PDF ) Multi-Input Functional Encryption for Unbounded Inner Products Bishnu Charan Behera, Somindu C. Ramanna
2024/918 (PDF ) Cryptographic Analysis of Delta Chat Yuanming Song, Lenka Mareková, Kenneth G. Paterson
2024/917 (PDF ) Unbounded Non-Zero Inner Product Encryption Bishnu Charan Behera, Somindu C. Ramanna
2024/916 (PDF ) Polymath: Groth16 Is Not The Limit Helger Lipmaa
2024/915 (PDF ) REACTIVE: Rethinking Effective Approaches Concerning Trustees in Verifiable Elections Josh Benaloh, Michael Naehrig, Olivier Pereira
2024/914 (PDF ) Compact Key Storage: A Modern Approach to Key Backup and Delegation Yevgeniy Dodis, Daniel Jost, Antonio Marcedone
2024/913 (PDF ) SoK: Model Reverse Engineering Threats for Neural Network Hardware Seetal Potluri, Farinaz Koushanfar
2024/912 (PDF ) Quantum Evolving Secret Sharing for General Access Structures Efrat Cohen, Anat Paskin-Cherniavsky
2024/911 (PDF ) Generalized Indifferentiable Sponge and its Application to Polygon Miden VM Tomer Ashur, Amit Singh Bhati
2024/910 (PDF ) A Tight Security Proof for $\mathrm{SPHINCS^{+}}$, Formally Verified Manuel Barbosa, François Dupressoir, Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub
2024/909 (PDF ) Approximate CRT-Based Gadget Decomposition and Application to TFHE Blind Rotation Olivier Bernard, Marc Joye
2024/908 (PDF ) Preliminary Analysis of Ascon-Xof and Ascon-Hash Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
2024/907 (PDF ) Reducing the Number of Qubits in Quantum Information Set Decoding Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher
2024/906 (PDF ) Are Your Keys Protected? Time will Tell Yoav Ben-Dov, Liron David, Moni Naor, Elad Tzalik
2024/905 (PDF ) On the Semidirect Discrete Logarithm Problem in Finite Groups Christopher Battarbee, Giacomo Borin, Julian Brough, Ryann Cartor, Tobias Hemmert, Nadia Heninger, David Jao, Delaram Kahrobaei, Laura Maddison, Edoardo Persichetti, Angela Robinson, Daniel Smith-Tone, Rainer Steinwandt
2024/904 (PDF ) On round elimination for special-sound multi-round identification and the generality of the hypercube for MPCitH Andreas Hülsing, David Joseph, Christian Majenz, Anand Kumar Narayanan
2024/903 (PDF ) Nopenena Untraceable Payments: Defeating Graph Analysis with Small Decoy Sets Jayamine Alupotha, Mathieu Gestin, Christian Cachin
2024/902 (PDF ) Access Structure Hiding Verifiable Tensor Designs Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar
2024/901 (PDF ) Practical Committing Attacks against Rocca-S Ryunosuke Takeuchi, Yosuke Todo, Tetsu Iwata
2024/900 (PDF ) Breaktooth: Breaking Security and Privacy in Bluetooth Power-Saving Mode Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii
2024/899 (PDF ) Monotone-Policy Aggregate Signatures Maya Farber Brodsky, Arka Rai Choudhuri, Abhishek Jain, Omer Paneth
2024/898 (PDF ) Edit Distance Robust Watermarks for Language Models Noah Golowich, Ankur Moitra
2024/897 (PDF ) Laconic Function Evaluation and ABE for RAMs from (Ring-)LWE Fangqi Dong, Zihan Hao, Ethan Mook, Hoeteck Wee, Daniel Wichs
2024/896 (PDF ) Dynamic-FROST: Schnorr Threshold Signatures with a Flexible Committee Annalisa Cimatti, Francesco De Sclavis, Giuseppe Galano, Sara Giammusso, Michela Iezzi, Antonio Muci, Matteo Nardelli, Marco Pedicini
2024/895 (PDF ) Fully-Succinct Multi-Key Homomorphic Signatures from Standard Assumptions Gaspard Anthoine, David Balbás, Dario Fiore
2024/894 (PDF ) Quantum Algorithms for Fast Correlation Attacks on LFSR-Based Stream Ciphers Akinori Hosoyamada
2024/893 (PDF ) How to Construct Quantum FHE, Generically Aparna Gupte, Vinod Vaikuntanathan
2024/892 (PDF ) Flock: A Framework for Deploying On-Demand Distributed Trust Darya Kaviani, Sijun Tan, Pravein Govindan Kannan, Raluca Ada Popa
2024/891 (PDF ) Glitch-Stopping Circuits: Hardware Secure Masking without Registers Zhenda Zhang, Svetla Nikova, Ventzislav Nikov
2024/890 (PDF ) Ring Signatures for Deniable AKEM: Gandalf's Fellowship Phillip Gajland, Jonas Janneck, Eike Kiltz
2024/889 (PDF ) Analyzing and Benchmarking ZK-Rollups Stefanos Chaliasos, Itamar Reif, Adrià Torralba-Agell, Jens Ernstberger, Assimakis Kattis, Benjamin Livshits
2024/888 (PDF ) zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving Auditing Yihao Guo, Minghui Xu, Xiuzhen Cheng, Dongxiao Yu, Wangjie Qiu, Gang Qu, Weibing Wang, Mingming Song
2024/887 (PDF ) Secret Key Recovery in a Global-Scale End-to-End Encryption System Graeme Connell, Vivian Fang, Rolfe Schmidt, Emma Dauterman, Raluca Ada Popa
2024/886 (PDF ) A New Security Evaluation Method Based on Resultant for Arithmetic-Oriented Algorithms Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang, Quan-feng Liu, Deng Tang
2024/885 (PDF ) Bruisable Onions: Anonymous Communication in the Asynchronous Model Megumi Ando, Anna Lysyanskaya, Eli Upfal
2024/884 (PDF ) Security of Fixed-Weight Repetitions of Special-Sound Multi-Round Interactive Proofs Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, Giovanni Tognolini
2024/883 (PDF ) Low-Latency Linear Transformations with Small Key Transmission for Private Neural Network on Homomorphic Encryption Byeong-Seo Min, Joon-Woo Lee
2024/882 (PDF ) Lattice-based Fault Attacks against ECMQV Weiqiong Cao, Hua Chen, Jingyi Feng, Linmin Fan, Wenling Wu
2024/881 (PDF ) PipeSwap: Forcing the Timely Release of a Secret for Atomic Cross-Chain Swaps Peifang Ni, Anqi Tian, Jing Xu
2024/880 (PDF ) Extending class group action attacks via sesquilinear pairings Joseph Macula, Katherine E. Stange
2024/879 (PDF ) Consistency-or-Die: Consistency for Key Transparency Joakim Brorsson, Elena Pagnin, Bernardo David, Paul Stankovski Wagner
2024/878 (PDF ) Radical Vélu Isogeny Formulae Thomas Decru
2024/877 (PDF ) Multiple Sampling Fast Correlation Attack on Small State Stream Ciphers with Limited Round Key Period Zhongzhi Zhou, Vahid Amin-Ghafari, Hui Liu
2024/876 (PDF ) Distributing Keys and Random Secrets with Constant Complexity Benny Applebaum, Benny Pinkas
2024/875 (PDF ) Succinctly-Committing Authenticated Encryption Mihir Bellare, Viet Tung Hoang
2024/874 (PDF ) Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication Marc Fischlin, Olga Sanina
2024/873 (PDF ) Cryptanalysis of Algebraic Verifiable Delay Functions Alex Biryukov, Ben Fisch, Gottfried Herold, Dmitry Khovratovich, Gaëtan Leurent, María Naya-Plasencia, Benjamin Wesolowski
2024/872 (PDF ) Epistle: Elastic Succinct Arguments for Plonk Constraint System Shuangjun Zhang, Dongliang Cai, Yuan Li, Haibin Kan, Liang Zhang
2024/871 (PDF ) New Approaches for Estimating the Bias of Differential-Linear Distinguishers (Full Version) Ting Peng, Wentao Zhang, Jingsui Weng, Tianyou Ding
2024/870 (PDF ) Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model Adrià Gascón, Yuval Ishai, Mahimna Kelkar, Baiyu Li, Yiping Ma, Mariana Raykova
2024/869 (PDF ) On cycles of pairing-friendly abelian varieties Maria Corte-Real Santos, Craig Costello, Michael Naehrig
2024/868 (PDF ) Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, Sushmita Ruj
2024/867 (PDF ) Optimal Traitor Tracing from Pairings Mark Zhandry
2024/866 (PDF ) Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations Charles Gouert, Mehmet Ugurbil, Dimitris Mouris, Miguel de Vega, Nektarios Georgios Tsoutsos
2024/865 (PDF ) Result Pattern Hiding Boolean Searchable Encryption: Achieving Negligible False Positive Rates in Low Storage Overhead Dandan Yuan, Shujie Cui, Giovanni Russello
2024/864 (PDF ) Collaborative, Segregated NIZK (CoSNIZK) and More Efficient Lattice-Based Direct Anonymous Attestation Liqun Chen, Patrick Hough, Nada El Kassem
2024/863 (PDF ) Length Leakage in Oblivious Data Access Mechanisms Grace Jia, Rachit Agarwal, Anurag Khandelwal
2024/862 (PDF ) BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federated Learning Songze Li, Yanbo Dai
2024/861 (PDF ) A new multivariate primitive from CCZ equivalence Marco Calderini, Alessio Caminata, Irene Villa
2024/860 (PDF ) HAWKEYE – Recovering Symmetric Cryptography From Hardware Circuits Gregor Leander, Christof Paar, Julian Speith, Lukas Stennes
2024/859 (PDF ) Novel approximations of elementary functions in zero-knowledge proofs Kaarel August Kurik, Peeter Laud
2024/858 (PDF ) Ascon-Keccak AEAD Algorithm Stephan Müller
2024/857 (PDF ) Speeding up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations Zhongfeng Niu, Kai Hu, Siwei Sun, Zhiyu Zhang, Meiqin Wang
2024/856 (PDF ) Indistinguishability Obfuscation from Bilinear Maps and LPN Variants Seyoon Ragavan, Neekon Vafa, Vinod Vaikuntanathan
2024/855 (PDF ) Securing the Future of GenAI: Policy and Technology Mihai Christodorescu, Ryan Craven, Soheil Feizi, Neil Gong, Mia Hoffmann, Somesh Jha, Zhengyuan Jiang, Mehrdad Saberi Kamarposhti, John Mitchell, Jessica Newman, Emelia Probasco, Yanjun Qi, Khawaja Shams, Matthew Turek
2024/854 (PDF ) Simulation-Extractable KZG Polynomial Commitments and Applications to HyperPlonk Benoit Libert
2024/853 (PDF ) Accurate and Composable Noise Estimates for CKKS with Application to Exact HE Computation Jean-Philippe Bossuat, Anamaria Costache, Christian Mouchet, Lea Nürnberger, Juan Ramón Troncoso-Pastoriza
2024/852 (PDF ) A Machine Learning-Based Framework for Assessing Cryptographic Indistinguishability of Lightweight Block Ciphers Jimmy Dani, Kalyan Nakka, Nitesh Saxena
2024/851 (PDF ) On the parallelization of square-root Vélu's formulas Jorge Chávez-Saab, Odalis Ortega, Amalia Pizarro-Madariaga
2024/850 (PDF ) Constant-Round Arguments for Batch-Verification and Bounded-Space Computations from One-Way Functions Noga Amit, Guy N. Rothblum
2024/849 (PDF ) Fast, Large Scale Dimensionality Reduction Schemes Based on CKKS Haonan Yuan, Wenyuan Wu, Jingwei Chen
2024/848 (PDF ) How (Not) to Simulate PLONK Marek Sefranek
2024/847 (PDF ) More Efficient Approximate $k$-wise Independent Permutations from Random Reversible Circuits via log-Sobolev Inequalities Lucas Gretta, William He, Angelos Pelecanos
2024/846 (PDF ) Distributed Asynchronous Remote Key Generation Mark Manulis, Hugo Nartz
2024/845 (PDF ) PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries Francesca Falzon, Esha Ghosh, Kenneth G. Paterson, Roberto Tamassia
2024/844 (PDF ) Finding Dense Submodules with Algebraic Lattice Reduction Alexander Karenin, Elena Kirshanova
2024/843 (PDF ) Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt José Bacelar Almeida, Santiago Arranz Olmos, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Cameron Low, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Pierre-Yves Strub
2024/842 (PDF ) Computation Efficient Structure Aware PSI From Incremental Function Secret Sharing Gayathri Garimella, Benjamin Goff, Peihan Miao
2024/841 (PDF ) Two generalizations of almost perfect nonlinearity Claude Carlet
2024/840 (PDF ) Batching-Efficient RAM using Updatable Lookup Arguments Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh
2024/839 (PDF ) Almost optimal succinct arguments for Boolean circuit on RAM Tiancheng Xie, Tianyi Liu
2024/838 (PDF ) Verifiable Secret Sharing from Symmetric Key Cryptography with Improved Optimistic Complexity Ignacio Cascudo, Daniele Cozzo, Emanuele Giunta
2024/837 (PDF ) Fully Secure MPC and zk-FLIOP Over Rings: New Constructions, Improvements and Extensions Anders Dalskov, Daniel Escudero, Ariel Nof
2024/836 (PDF ) The Round Complexity of Proofs in the Bounded Quantum Storage Model Alex B. Grilo, Philippe Lamontagne
2024/835 (PDF ) Provable security against decryption failure attacks from LWE Christian Majenz, Fabrizio Sisinni
2024/834 (PDF ) Fine-Grained Non-Interactive Key Exchange, Revisited Balthazar Bauer, Geoffroy Couteau, Elahe Sadeghi
2024/833 (PDF ) INDIANA - Verifying (Random) Probing Security through Indistinguishability Analysis Christof Beierle, Jakob Feldtkeller, Anna Guinet, Tim Güneysu, Gregor Leander, Jan Richter-Brockmann, Pascal Sasdrich
2024/832 (PDF ) Hamming Weight Proofs of Proximity with One-Sided Error Gal Arnon, Shany Ben-David, Eylon Yogev
2024/831 (PDF ) Tight Characterizations for Preprocessing against Cryptographic Salting Fangqi Dong, Qipeng Liu, Kewen Wu
2024/830 (PDF ) How (not) to Build Quantum PKE in Minicrypt Longcheng Li, Qian Li, Xingjian Li, Qipeng Liu
2024/829 (PDF ) Multi-Server Doubly Efficient PIR in the Classical Model and Beyond Arthur Lazzaretti, Zeyu Liu, Ben Fisch, Peihan Miao, Charalampos Papamanthou
2024/828 (PDF ) Post-quantum XML and SAML Single Sign-On Johannes Müller, Jan Oupický
2024/827 (PDF ) Multivariate Multi-Polynomial Commitment and its Applications Xiao Yang, Chengru Zhang, Mark Ryan, Gao Meng
2024/826 (PDF ) Securing Lightning Channels against Rational Miners Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Subhra Mazumdar
2024/825 (PDF ) KHAN Encryption Algorithm: Leveraging Full Reptend Primes Ayaz Khan
2024/824 (PDF ) Improved Meet-LWE Attack via Ternary Trees Eunmin Lee, Joohee Lee, Yongha Son, Yuntao Wang
2024/823 (PDF ) Batched Distributed Point Function from Sparse LPN and Homomorphic Secret Sharing Lucas Piske, Jaspal Singh, Ni Trieu
2024/822 (PDF ) Early Stopping Byzantine Agreement in $(1+\epsilon) \cdot f$ Rounds Fatima Elsheimy, Julian Loss, Charalampos Papamanthou
2024/821 (PDF ) A General Framework for Lattice-Based ABE Using Evasive Inner-Product Functional Encryption Yao-Ching Hsieh, Huijia Lin, Ji Luo
2024/820 (PDF ) Rate-1 Arithmetic Garbling from Homomorphic Secret-Sharing Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl
2024/819 (PDF ) A new stand-alone MAC construct called SMAC Dachao Wang, Alexander Maximov, Patrik Ekdahl, Thomas Johansson
2024/818 (PDF ) The Brave New World of Global Generic Groups and UC-Secure Zero-Overhead SNARKs Jan Bobolz, Pooya Farshim, Markulf Kohlweiss, Akira Takahashi
2024/817 (PDF ) DVA: Dangerous Variations of ALTEQ Arnaud Sipasseuth
2024/816 (PDF ) Zero-knowledge IOPs Approaching Witness Length Noga Ron-Zewi, Mor Weiss
2024/815 (PDF ) Faster verifications and smaller signatures: Trade-offs for ALTEQ using rejections Arnaud Sipasseuth
2024/814 (PDF ) Succinct Homomorphic Secret Sharing Damiano Abram, Lawrence Roy, Peter Scholl
2024/813 (PDF ) How to Redact the Bitcoin Backbone Protocol Mehmet Sabir Kiraz, Enrique Larraia, Owen Vaughan
2024/812 (PDF ) Relations among new CCA security notions for approximate FHE Chris Brzuska, Sébastien Canard, Caroline Fontaine, Duong Hieu Phan, David Pointcheval, Marc Renard, Renaud Sirdey
2024/811 (PDF ) Traceable Secret Sharing Based on the Chinese Remainder Theorem Charlotte Hoffmann
2024/810 (PDF ) The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber Qian Guo, Erik Mårtensson, Adrian Åström
2024/809 (PDF ) Reducing Overdefined Systems of Polynomial Equations Derived from Small Scale Variants of the AES via Data Mining Methods Jana Berušková, Martin Jureček, Olha Jurečková
2024/808 (PDF ) Arma: Byzantine Fault Tolerant Consensus with Horizontal Scalability Yacov Manevich, Hagar Meir, Kaoutar Elkhiyaoui, Yoav Tock, May Buzaglo
2024/807 (PDF ) Consensus in the Presence of Overlapping Faults and Total Omission Julian Loss, Kecheng Shi, Gilad Stern
2024/806 (PDF ) Resettable Statistical Zero-Knowledge for NP Susumu Kiyoshima
2024/805 (PDF ) DiTRU: A Resurrection of NTRU over Dihedral Group Ali Raya, Vikas Kumar, Sugata Gangopadhyay
2024/804 (PDF ) Analysis on Sliced Garbling via Algebraic Approach Taechan Kim
2024/803 (PDF ) Can We Beat Three Halves Lower Bound?: (Im)Possibility of Reducing Communication Cost for Garbled Circuits Chunghun Baek, Taechan Kim
2024/802 (PDF ) On Maximum Size Simultaneous Linear Approximations in Ascon and Keccak and Related Translation and Differential Properties Nicolas T. Courtois, Frédéric Amiel, Alexandre Bonnard de Fonvillars
2024/801 (PDF ) Algebraic Structure of the Iterates of $\chi$ Björn Kriepke, Gohar Kyureghyan
2024/800 (PDF ) A Note on Zero-Knowledge for NP and One-Way Functions Yanyi Liu, Noam Mazor, Rafael Pass
2024/799 (PDF ) Symmetric Signcryption and E2EE Group Messaging in Keybase Joseph Jaeger, Akshaya Kumar, Igors Stepanovs
2024/798 (PDF ) Incompressible Functional Encryption Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree, Aman Verma
2024/797 (PDF ) Nonadaptive One-Way to Hiding Implies Adaptive Quantum Reprogramming Joseph Jaeger
2024/796 (PDF ) Weak Consistency mode in Key Transparency: OPTIKS Esha Ghosh, Melissa Chase
2024/795 (PDF ) New Limits of Provable Security and Applications to ElGamal Encryption Sven Schäge
2024/794 (PDF ) Detecting Rogue Decryption in (Threshold) Encryption via Self-Incriminating Proofs James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen, Arup Mondal, Esra Yeniaras
2024/793 (PDF ) Hide-and-Seek and the Non-Resignability of the BUFF Transform Jelle Don, Serge Fehr, Yu-Hsuan Huang, Jyun-Jie Liao, Patrick Struck
2024/792 (PDF ) Stickel's Key Agreement Algebraic Variation Daniel Nager
2024/791 (PDF ) Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, Qingju Wang
2024/790 (PDF ) Physical Ring Signature Xavier Bultel
2024/789 (PDF ) Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF Yaxi Yang, Xiaojian Liang, Xiangfu Song, Ye Dong, Linting Huang, Hongyu Ren, Changyu Dong, Jianying Zhou
2024/788 (PDF ) A Fault-Resistant NTT by Polynomial Evaluation and Interpolation Sven Bauer, Fabrizio De Santis, Kristjane Koleci, Anita Aghaie
2024/787 (PDF ) A new attack against search-LWE using Diophantine approximations Robin Frot, Daniel Zentai
2024/786 (PDF ) Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit Fukang Liu, Mohammad Mahzoun, Willi Meier
2024/784 (PDF ) Universal Blockchain Assets Owen Vaughan
2024/783 (PDF ) Differential Cryptanalysis on Quantum Computers Kyungbae Jang, Yujin Oh, Hwajeong Seo
2024/782 (PDF ) Relating Code Equivalence to Other Isomorphism Problems Huck Bennett, Kaung Myat Htay Win
2024/781 (PDF ) Doubly-Efficient Batch Verification in Statistical Zero-Knowledge Or Keret, Ron D. Rothblum, Prashant Nalini Vasudevan
2024/780 (PDF ) Information-theoretic Multi-server Private Information Retrieval with Client Preprocessing Jaspal Singh, Yu Wei, Vassilis Zikas
2024/779 (PDF ) Elliptic Curve Cryptography for the masses: Simple and fast finite field arithmetic Michael Scott
2024/778 (PDF ) Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign Hiroshi Onuki, Kohei Nakagawa
2024/777 (PDF ) Measure-Rewind-Extract: Tighter Proofs of One-Way to Hiding and CCA Security in the Quantum Random Oracle Model Jiangxia Ge, Heming Liao, Rui Xue
2024/776 (PDF ) Instance-Hiding Interactive Proofs Changrui Mu, Prashant Nalini Vasudevan
2024/775 (PDF ) Spec-o-Scope: Cache Probing at Cache Speed Gal Horowitz, Eyal Ronen, Yuval Yarom
2024/774 (PDF ) Byzantine Reliable Broadcast with One Trusted Monotonic Counter Yackolley Amoussou-Guenou, Lionel Beltrando, Maurice Herlihy, Maria Potop-Butucaru
2024/773 (PDF ) SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies Max Duparc, Tako Boris Fouotsa
2024/772 (PDF ) Reducing the Share Size of Weighted Threshold Secret Sharing Schemes via Chow Parameters Approximation Oriol Farràs, Miquel Guiot
2024/771 (PDF ) SQIsign2D-East: A New Signature Scheme Using 2-dimensional Isogenies Kohei Nakagawa, Hiroshi Onuki
2024/770 (PDF ) Sublinear-Round Broadcast without Trusted Setup Andreea B. Alexandru, Julian Loss, Charalampos Papamanthou, Giorgos Tsimos, Benedikt Wagner
2024/769 (PDF ) Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More Damiano Abram, Lawrence Roy, Mark Simkin
2024/768 (PDF ) The Ouroboros of ZK: Why Verifying the Verifier Unlocks Longer-Term ZK Innovation Denis Firsov, Benjamin Livshits
2024/767 (PDF ) Bootstrapping Bits with CKKS Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Damien Stehlé
2024/766 (PDF ) Breaking Verifiable Delay Functions in the Random Oracle Model Ziyi Guan, Artur Riazanov, Weiqiang Yuan
2024/765 (PDF ) Scalable Multi-Server Private Information Retrieval Ashrujit Ghoshal, Baitian Li, Yaohua Ma, Chenxin Dai, Elaine Shi
2024/764 (PDF ) Decentralized Multi-Client Functional Encryption with Strong Security Ky Nguyen, David Pointcheval, Robert Schädlich
2024/763 (PDF ) Differential Analysis of Feistel Ciphers Incorporating Ajtai SIS Hash Function Yu Morishima, Masahiro Kaminaga
2024/762 (PDF ) Constant-Cost Batched Partial Decryption in Threshold Encryption Sora Suegami, Shinsaku Ashizawa, Kyohei Shibano
2024/761 (PDF ) Enabling Secure and Efficient Broadcast Encrypted Search in Cloud Computing Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, Gang Xu, Siu-Ming Yiu, Zongpeng Li
2024/760 (PDF ) SQIsign2D-West: The Fast, the Small, and the Safer Andrea Basso, Luca De Feo, Pierrick Dartois, Antonin Leroux, Luciano Maino, Giacomo Pope, Damien Robert, Benjamin Wesolowski
2024/759 (PDF ) Watermarking Language Models for Many Adaptive Users Aloni Cohen, Alexander Hoover, Gabe Schoenbach
2024/758 (PDF ) Admissible Parameters for the Crossbred Algorithm and Semi-regular Sequences over Finite Fields John Baena, Daniel Cabarcas, Sharwan K. Tiwari, Javier Verbel, Luis Villota
2024/757 (PDF ) Formal Definition and Verification for Combined Random Fault and Random Probing Security Sonia Belaid, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, Abdul Rahman Taleb
2024/756 (PDF ) (Strong) aPAKE Revisited: Capturing Multi-User Security and Salting Dennis Dayanikli, Anja Lehmann
2024/755 (PDF ) Efficient Second-Order Masked Software Implementations of Ascon in Theory and Practice Barbara Gigerl, Florian Mendel, Martin Schläffer, Robert Primas
2024/754 (PDF ) Adversary Resilient Learned Bloom Filters Ghada Almashaqbeh, Allison Bishop, Hayder Tirmazi
2024/753 (PDF ) Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Taeho Jung
2024/752 (PDF ) More Embedded Curves for SNARK-Pairing-Friendly Curves Aurore Guillevic
2024/751 (PDF ) Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography Prabhanjan Ananth, Fatih Kaleoglu, Henry Yuen
2024/750 (PDF ) Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs Xinxin Fan, Veronika Kuchta, Francesco Sica, Lei Xu
2024/749 (PDF ) Reducing the CRS Size in Registered ABE Systems Rachit Garg, George Lu, Brent Waters, David J. Wu
2024/748 (PDF ) PERK: Compact Signature Scheme Based on a New Variant of the Permuted Kernel Problem Slim Bettaieb, Loïc Bidoux, Victor Dyseryn, Andre Esser, Philippe Gaborit, Mukul Kulkarni, Marco Palumbi
2024/747 (PDF ) Scaling Lattice Sieves across Multiple Machines Martin R. Albrecht, Joe Rowell
2024/746 (PDF ) The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS Céline Chevalier, Guirec Lebrun, Ange Martinelli, Jérôme Plût
2024/745 (PDF ) FRAST: TFHE-friendly Cipher Based on Random S-boxes Mingyu Cho, Woohyuk Chung, Jincheol Ha, Jooyoung Lee, Eun-Gyeol Oh, Mincheol Son
2024/744 (PDF ) An NVMe-based Secure Computing Platform with FPGA-based TFHE Accelerator Yoshihiro Ohba, Tomoya Sanuki, Claude Gravel, Kentaro Mihara, Asuka Wakasugi, Kenta Adachi
2024/743 (PDF ) Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings -- with a Break-Fix Strategy Kai Hu
2024/742 (PDF ) Efficient Universally-Verifiable Electronic Voting with Everlasting Privacy David Pointcheval
2024/741 (PDF ) A Deniability Analysis of Signal's Initial Handshake PQXDH Rune Fiedler, Christian Janson
2024/740 (PDF ) Multi-Client Functional Encryption with Public Inputs and Strong Security Ky Nguyen, Duong Hieu Phan, David Pointcheval
2024/739 (PDF ) BGJ15 Revisited: Sieving with Streamed Memory Access Ziyu Zhao, Jintai Ding, Bo-Yin Yang
2024/738 (PDF ) Quantum Key-Revocable Dual-Regev Encryption, Revisited Prabhanjan Ananth, Zihan Hu, Zikuan Huang
2024/737 (PDF ) Mutable Batch Arguments and Applications Rishab Goyal
2024/736 (PDF ) Secret Sharing with Certified Deletion James Bartusek, Justin Raizes
2024/735 (PDF ) Secure Multiparty Computation in the Presence of Covert Adaptive Adversaries Isheeta Nargis, Anwar Hasan
2024/734 (PDF ) Proof of Stake and Activity: Rewarding On-Chain Activity Through Consensus Aram Jivanyan, Karen Terjanian
2024/733 (PDF ) Proxying Is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability Zhongtang Luo, Yanxue Jia, Yaobin Shen, Aniket Kate
2024/732 (PDF ) Compact Encryption based on Module-NTRU problems Shi Bai, Hansraj Jangir, Hao Lin, Tran Ngo, Weiqiang Wen, Jinwei Zheng
2024/731 (PDF ) Toward Full $n$-bit Security and Nonce Misuse Resistance of Block Cipher-based MACs Wonseok Choi, Jooyoung Lee, Yeongmin Lee
2024/730 (PDF ) New Solutions to Delsarte's Dual Linear Programs André Chailloux, Thomas Debris-Alazard
2024/729 (PDF ) Covert Adaptive Adversary Model: A New Adversary Model for Multiparty Computation Isheeta Nargis, Anwar Hasan
2024/728 (PDF ) Relativized Succinct Arguments in the ROM Do Not Exist Annalisa Barbara, Alessandro Chiesa, Ziyi Guan
2024/727 (PDF ) Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise Joseph Jaeger
2024/726 (PDF ) Challenger: Blockchain-based Massively Multiplayer Online Game Architecture Boris Chan Yip Hon, Bilel Zaghdoudi, Maria Potop-Butucaru, Sébastien Tixeuil, Serge Fdida
2024/725 (PDF ) Multi User Security of LightMAC and LightMAC_Plus Nilanjan Datta, Shreya Dey, Avijit Dutta, Devdutto Kanungo
2024/724 (PDF ) zkSNARKs in the ROM with Unconditional UC-Security Alessandro Chiesa, Giacomo Fenzi
2024/723 (PDF ) $\mathsf{OPA}$: One-shot Private Aggregation with Single Client Interaction and its Applications to Federated Learning Harish Karthikeyan, Antigoni Polychroniadou
2024/722 (PDF ) Ultrametric integral cryptanalysis Tim Beyne, Michiel Verbauwhede
2024/721 (PDF ) Real-world Universal zkSNARKs are non-malleable Antonio Faonio, Dario Fiore, Luigi Russo
2024/720 (PDF ) Multivariate Blind Signatures Revisited Ward Beullens
2024/719 (PDF ) Client-Efficient Online-Offline Private Information Retrieval Hoang-Dung Nguyen, Jorge Guajardo, Thang Hoang
2024/718 (PDF ) PAC-Private Algorithms Mayuri Sridhar, Hanshen Xiao, Srinivas Devadas
2024/717 (PDF ) An Improved Threshold Homomorphic Cryptosystem Based on Class Groups Lennart Braun, Guilhem Castagnos, Ivan Damgård, Fabien Laguillaumie, Kelsey Melissaris, Claudio Orlandi, Ida Tucker
2024/716 (PDF ) Unclonable Secret Sharing Prabhanjan Ananth, Vipul Goyal, Jiahui Liu, Qipeng Liu
2024/715 (PDF ) A New Cryptographic Algorithm Ali Mahdoum
2024/714 (PDF ) Learning With Quantization: A Ciphertext Efficient Lattice Problem with Tight Security Reduction from LWE Shanxiang Lyu, Ling Liu, Cong Ling
2024/713 (PDF ) Analyzing Pump and jump BKZ algorithm using dynamical systems Leizhang Wang
2024/712 (PDF ) Concrete Quantum Cryptanalysis of Shortest Vector Problem Hyunji Kim, Kyungbae Jang, Anubhab Baksi, Sumanta Chakraborty, Hwajeong Seo
2024/711 (PDF ) Non-Transferable Anonymous Tokens by Secret Binding F. Betül Durak, Laurane Marco, Abdullah Talayhan, Serge Vaudenay
2024/710 (PDF ) BUFFing FALCON without Increasing the Signature Size Samed Düzlü, Rune Fiedler, Marc Fischlin
2024/709 (PDF ) Masked Computation the Floor Function and its Application to the FALCON Signature Pierre-Augustin Berthet, Justine Paillet, Cédric Tavernier
2024/708 (PDF ) Automated Generation of Fault-Resistant Circuits Nicolai Müller, Amir Moradi
2024/707 (PDF ) Towards a Polynomial Instruction Based Compiler for Fully Homomorphic Encryption Accelerators Sejun Kim, Wen Wang, Duhyeong Kim, Adish Vartak, Michael Steiner, Rosario Cammarota
2024/706 (PDF ) Linicrypt in the Ideal Cipher Model Zahra Javar, Bruce M. Kapron
2024/705 (PDF ) Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions of Users Remco Bloemen, Bryan Gillespie, Daniel Kales, Philipp Sippl, Roman Walch
2024/704 (PDF ) Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains Krishnendu Chatterjee, Amirali Ebrahim-Zadeh, Mehrdad Karrabi, Krzysztof Pietrzak, Michelle Yeo, Djordje Zikelic
2024/703 (PDF ) An Efficient and Extensible Zero-knowledge Proof Framework for Neural Networks Tao Lu, Haoyu Wang, Wenjie Qu, Zonghui Wang, Jinye He, Tianyang Tao, Wenzhi Chen, Jiaheng Zhang
2024/702 (PDF ) Security Analysis of Signal's PQXDH Handshake Rune Fiedler, Felix Günther
2024/701 (PDF ) Quantum Unpredictability Tomoyuki Morimae, Shogo Yamada, Takashi Yamakawa
2024/700 (PDF ) Sublinear Distributed Product Checks on Replicated Secret-Shared Data over $\mathbb{Z}_{2^k}$ Without Ring Extensions Yun Li, Daniel Escudero, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song
2024/699 (PDF ) An Efficient All-to-All GCD Algorithm for Low Entropy RSA Key Factorization Elijah Pelofske
2024/698 (PDF ) Private Computations on Streaming Data Vladimir Braverman, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky
2024/697 (PDF ) LINE: Cryptosystem based on linear equations for logarithmic signatures Gennady Khalimov, Yevgen Kotukh, Maksym Kolisnyk, Svitlana Khalimova, Oleksandr Sievierinov
2024/696 (PDF ) A Theoretical Take on a Practical Consensus Protocol Victor Shoup
2024/695 (PDF ) Beale Cipher 1 and Cipher 3: Numbers With No Messages Richard Wassmer
2024/694 (PDF ) Lower-Bounds on Public-Key Operations in PIR Jesko Dujmovic, Mohammad Hajiabadi
2024/692 (PDF ) Blink: An Optimal Proof of Proof-of-Work Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Giulia Scaffino, Dionysis Zindros
2024/691 (PDF ) White-box filtering attacks breaking SEL masking: from exponential to polynomial time Alex Charlès, Aleksei Udovenko
2024/690 (PDF ) LPN-based Attacks in the White-box Setting Alex Charlès, Aleksei Udovenko
2024/689 (PDF ) Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models Elijah Pelofske, Vincent Urias, Lorie M. Liebrock
2024/688 (PDF ) Succinct Functional Commitments for Circuits from k-Lin Hoeteck Wee, David J. Wu
2024/687 (PDF ) Lower Bounds for Levin–Kolmogorov Complexity Nicholas Brandt
2024/686 (PDF ) Unstructured Inversions of New Hope Ian Malloy
2024/685 (PDF ) Committing AVID with Partial Retrieval and Optimal Storage Nicolas Alhaddad, Leonid Reyzin, Mayank Varia
2024/684 (PDF ) A Plug-and-Play Long-Range Defense System for Proof-of-Stake Blockchains Lucien K. L. Ng, Panagiotis Chatzigiannis, Duc V. Le, Mohsen Minaei, Ranjit Kumaresan, Mahdi Zamani
2024/683 (PDF ) A note on ``a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE'' Zhengjun Cao, Lihua Liu
2024/682 (PDF ) Approximate PSI with Near-Linear Communication Wutichai Chongchitmate, Steve Lu, Rafail Ostrovsky
2024/681 (PDF ) HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security Aloni Cohen, David Bruce Cousins, Nicholas Genise, Erik Kline, Yuriy Polyakov, Saraswathy RV
2024/680 (PDF ) Universal Vector Commitments Ojaswi Acharya, Foteini Baldimtsi, Samuel Dov Gordon, Daniel McVicker, Aayush Yadav
2024/679 (PDF ) Isotropic Quadratic Forms, Diophantine equations and Digital Signatures, DEFIv2 Martin Feussner, Igor Semaev
2024/678 (PDF ) Quantum-Safe Account Recovery for WebAuthn Douglas Stebila, Spencer Wilson
2024/677 (PDF ) Asynchronous Consensus without Trusted Setup or Public-Key Cryptography Sourav Das, Sisi Duan, Shengqi Liu, Atsuki Momose, Ling Ren, Victor Shoup
2024/676 (PDF ) Composing Timed Cryptographic Protocols: Foundations and Applications Karim Eldefrawy, Benjamin Terner, Moti Yung
2024/675 (PDF ) Succinctly Verifiable Computation over Additively-Homomorphically Encrypted Data: Making Privacy-Preserving Blueprints Practical Scott Griffy, Markulf Kohlweiss, Anna Lysyanskaya, Meghna Sengupta
2024/674 (PDF ) SigmaSuite: How to Minimize Foreign Arithmetic in ZKP Circuits While Keeping Succinct Final Verification. Wyatt Benno
2024/673 (PDF ) Chocobo: Creating Homomorphic Circuit Operating with Functional Bootstrapping in basis B Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey
2024/672 (PDF ) Secure Coded Distributed Computing and Extensions to Multiple Access Setting Shanuja Sasi, Onur Gunlu
2024/671 (PDF ) Exploiting Internal Randomness for Privacy in Vertical Federated Learning Yulian Sun, Li Duan, Ricardo Mendes, Derui Zhu, Yue Xia, Yong Li, Asja Fischer
2024/670 (PDF ) Secure Implementation of SRAM PUF for Private Key Generation Raja Adhithan Radhakrishnan
2024/669 (PDF ) Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses Arka Rai Choudhuri, Sanjam Garg, Julien Piet, Guru-Vamsi Policharla
2024/668 (PDF ) Blockchain Price vs. Quantity Controls Abdoulaye Ndiaye
2024/667 (PDF ) Agile, Post-quantum Secure Cryptography in Avionics Karolin Varner, Wanja Zaeske, Sven Friedrich, Aaron Kaiser, Alice Bowman
2024/666 (PDF ) Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, Raluca Ada Popa
2024/665 (PDF ) Fast Homomorphic Evaluation of LWR-based PRFs Amit Deo, Marc Joye, Benoit Libert, Benjamin R. Curtis, Mayeul de Bellabre
2024/664 (PDF ) Pando: Extremely Scalable BFT Based on Committee Sampling Xin Wang, Haochen Wang, Haibin Zhang, Sisi Duan
2024/663 (PDF ) Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size Xinwei Yong, Jiaojiao Wu, Jianfeng Wang
2024/662 (PDF ) Faster Private Decision Tree Evaluation for Batched Input from Homomorphic Encryption Kelong Cong, Jiayi Kang, Georgio Nicolas, Jeongeun Park
2024/661 (PDF ) On amortization techniques for FRI-based SNARKs Albert Garreta, Hayk Hovhanissyan, Aram Jivanyan, Ignacio Manzur, Isaac Villalobos, Michał Zając
2024/660 (PDF ) FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption Camille Nuoskala, Reyhaneh Rabbaninejad, Tassos Dimitriou, Antonis Michalas
2024/659 (PDF ) Secure Latent Dirichlet Allocation Thijs Veugen, Vincent Dunning, Michiel Marcus, Bart Kamphorst
2024/658 (PDF ) Information-theoretic security with asymmetries Tim Beyne, Yu Long Chen
2024/657 (PDF ) Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs Anaïs Barthoulot, Olivier Blazy, Sébastien Canard
2024/656 (PDF ) Cryptanalytic Audit of the XHash Sponge Function and its Components Vincent Rijmen
2024/655 (PDF ) Implementation and Performance Analysis of Homomorphic Signature Schemes Davide Carnemolla, Dario Catalano, Mario Di Raimondo, Federico Savasta
2024/654 (PDF ) Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification Alberto Ibarrondo, Ismet Kerenciler, Hervé Chabanne, Vincent Despiegel, Melek Önen
2024/653 (PDF ) Ipotane: Balancing the Good and Bad Cases of Asynchronous BFT Xiaohai Dai, Chaozheng Ding, Hai Jin, Julian Loss, Ling Ren
2024/651 (PDF ) A New Hash-based Enhanced Privacy ID Signature Scheme Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J.P. Newton, Yalan Wang
2024/650 (PDF ) Hash-based Direct Anonymous Attestation Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J.P. Newton, Yalan Wang
2024/649 (PDF ) Sphinx-in-the-Head: Group Signatures from Symmetric Primitives Liqun Chen, Changyu Dong, Christopher J. P. Newton, Yalan Wang
2024/647 (PDF ) Weightwise (almost) perfectly balanced functions based on total orders Pierrick Méaux
2024/646 (PDF ) Efficient Quantum Algorithm for SUBSET-SUM Problem Sanchita Ghosh, Anant Sharma, Sreetama Das, Shibdas Roy
2024/644 (PDF ) Jumping for Bernstein-Yang Inversion Li-Jie Jian, Ting-Yuan Wang, Bo-Yin Yang, Ming-Shing Chen
2024/643 (PDF ) Key-Homomorphic and Aggregate Verifiable Random Functions Giulio Malavolta
2024/642 (PDF ) GraphOS: Towards Oblivious Graph Processing Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili
2024/641 (PDF ) Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon Xuanji Meng, Xiao Sui, Zhaoxin Yang, Kang Rong, Wenbo Xu, Shenglong Chen, Ying Yan, Sisi Duan
2024/640 (PDF ) On Proving Pairings Andrija Novakovic, Liam Eagen
2024/639 (PDF ) Computational Attestations of Polynomial Integrity Towards Verifiable Machine Learning Dustin Ray, Caroline El Jazmi
2024/638 (PDF ) A note on ``a lightweight mutual and transitive authentication mechanism for IoT network'' Zhengjun Cao, Lihua Liu
2024/637 (PDF ) Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity Marshall Ball, Juan Garay, Peter Hall, Aggelos Kiayias, Giorgos Panagiotakos
2024/636 (PDF ) Regev Factoring Beyond Fibonacci: Optimizing Prefactors Seyoon Ragavan
2024/635 (PDF ) Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, Hoda Maleki
2024/634 (PDF ) NTRU-based FHE for Larger Key and Message Space Robin Jadoul, Axel Mertens, Jeongeun Park, Hilder V. L. Pereira
2024/633 (PDF ) Vision Mark-32: ZK-Friendly Hash Function Over Binary Tower Fields Tomer Ashur, Mohammad Mahzoun, Jim Posen, Danilo Šijačić
2024/632 (PDF ) Further Investigations on Nonlinear Complexity of Periodic Binary Sequences Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, Debiao He
2024/631 (PDF ) BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring Tahoura Mosavirik, Shahin Tajik
2024/630 (PDF ) Conditional disclosure of secrets with quantum resources Vahid R. Asadi, Kohdai Kuroiwa, Debbie Leung, Alex May, Sabrina Pasterski, Chris Waddell
2024/629 (PDF ) Unconditional correctness of recent quantum algorithms for factoring and computing discrete logarithms Cédric Pilatte
2024/628 (PDF ) MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications Bernardo David, Rafael Dowsley, Anders Konring, Mario Larangeira
2024/627 (PDF ) Distributed & Scalable Oblivious Sorting and Shuffling Nicholas Ngai, Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos
2024/626 (PDF ) An Efficient Quantum Algorithm for the Traveling Salesman Problem Anant Sharma, Nupur Deshpande, Sanchita Ghosh, Sreetama Das, Shibdas Roy
2024/625 (PDF ) Interactive Threshold Mercurial Signatures and Applications Masayuki Abe, Masaya Nanri, Octavio Perez Kempner, Mehdi Tibouchi
2024/624 (PDF ) POKÉ: A Compact and Efficient PKE from Higher-dimensional Isogenies Andrea Basso, Luciano Maino
2024/623 (PDF ) Complete group law for genus 2 Jacobians on Jacobian coordinates Elif Ozbay Gurler, Huseyin Hisil
2024/622 (PDF ) Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols Roozbeh Sarenche, Svetla Nikova, Bart Preneel
2024/621 (PDF ) How to Lose Some Weight - A Practical Template Syndrome Decoding Attack Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, Antonia Wachter-Zeh
2024/620 (PDF ) New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang
2024/619 (PDF ) BPDTE: Batch Private Decision Tree Evaluation via Amortized Efficient Private Comparison Huiqiang Liang, Haining Lu, Yifeng Guo, Geng Wang, Haining Yu, Hongli Zhang, Baoyu An, Jinyu Li, Li Su
2024/618 (PDF ) Efficient KZG-based Univariate Sum-check and Lookup Argument Yuncong Zhang, Shi-Feng Sun, Dawu Gu
2024/617 (PDF ) Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions and Constructions Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang, Min Xie
2024/616 (PDF ) $\mathsf{Cougar}$: Cubic Root Verifier Inner Product Argument under Discrete Logarithm Assumption Hyeonbum Lee, Seunghun Paik, Hyunjung Son, Jae Hong Seo
2024/615 (PDF ) Subverting Cryptographic Protocols from A Fine-Grained Perspective - A Case Study on 2-Party ECDSA Jialiu Cheng, Yi Wang, Rongmao Chen, Xinyi Huang
2024/614 (PDF ) Non-interactive Blind Signatures: Post-quantum and Stronger Security Foteini Baldimtsi, Jiaqi Cheng, Rishab Goyal, Aayush Yadav
2024/613 (PDF ) Hadamard Product Argument from Lagrange-Based Univariate Polynomials Jie Xie, Yuncong Hu, Yu Yu
2024/612 (PDF ) FHERMA: Building the Open-Source FHE Components Library for Practical Use Gurgen Arakelov, Nikita Kaskov, Daria Pianykh, Yuriy Polyakov
2024/611 (PDF ) A Security Analysis of Restricted Syndrome Decoding Problems Ward Beullens, Pierre Briaud, Morten Øygarden
2024/610 (PDF ) Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation Min Xie, Peichen Ju, Yanqi Zhao, Man Ho Au, Zoe Lin Jiang, Junbin Fang, Yong Yu, Xuan Wang
2024/609 (PDF ) New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes Benoît Cogliati, Pierre-Alain Fouque, Louis Goubin, Brice Minaud
2024/608 (PDF ) The Practical Advantage of RSA over ECC and Pairings Zhengjun Cao, Lihua Liu
2024/607 (PDF ) Low-latency Secure Integrated Sensing and Communication with Transmitter Actions Truman Welling, Onur Gunlu, Aylin Yener
2024/606 (PDF ) Classical Commitments to Quantum States Sam Gunn, Yael Tauman Kalai, Anand Natarajan, Agi Villanyi
2024/605 (PDF ) Security Analysis of XHASH8/12 Léo Perrin
2024/604 (PDF ) Generic MitM Attack Frameworks on Sponge Constructions Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, Xiaoyun Wang
2024/603 (PDF ) Worst-Case to Average-Case Hardness of LWE: An Alternative Perspective Divesh Aggarwal, Leong Jin Ming, Alexandra Veliche
2024/602 (PDF ) Secret-Sharing Schemes for High Slices Amos Beimel, Oriol Farràs, Or Lasri, Oded Nir
2024/601 (PDF ) Improved Provable Reduction of NTRU and Hypercubic Lattices Henry Bambury, Phong Q. Nguyen
2024/600 (PDF ) A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme- Mustafa Khairallah
2024/599 (PDF ) Probabilistically Checkable Arguments for all NP Shany Ben-David
2024/598 (PDF ) Decryption Indistinguishability under Chosen Control Flow Ganyuan Cao
2024/597 (PDF ) Blockchain-based decentralized identity system: Design and security analysis Gewu BU, Serge Fdida, Maria Potop-Butucaru, Bilel Zaghdoudi
2024/596 (PDF ) Cryptanalysis of signature schemes based on the root extraction problem over braid group Djimnaibeye Sidoine, Guy Mobouale Wamba, Abiodoun Clement Hounkpevi, Tieudjo Daniel, Djiby Sow
2024/595 (PDF ) Analysis of Multivariate Encryption Schemes: Application to Dob and C* Morten Øygarden, Patrick Felke, Håvard Raddum
2024/594 (PDF ) Greco: Fast Zero-Knowledge Proofs for Valid FHE RLWE Ciphertexts Formation Enrico Bottazzi
2024/593 (PDF ) The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem George Teseleanu
2024/592 (PDF ) Asymptotics for the standard block size in primal lattice attacks: second order, formally verified Daniel J. Bernstein
2024/591 (PDF ) Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures Thomas Aulbach, Samed Düzlü, Michael Meyer, Patrick Struck, Maximiliane Weishäupl
2024/590 (PDF ) Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks Quan Yuan, Chao Sun, Tsuyoshi Takagi
2024/589 (PDF ) Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training Xunyue Hu, Quentin L. Meunier, Emmanuelle Encrenaz
2024/588 (PDF ) Digital Signatures for Authenticating Compressed JPEG Images Simon Erfurth
2024/587 (PDF ) Hidden $\Delta$-fairness: A Novel Notion for Fair Secure Two-Party Computation Saskia Bayreuther, Robin Berger, Felix Dörre, Jeremias Mechler, Jörn Müller-Quade
2024/586 (PDF ) Encryption Based Covert Channel for Large Language Models Yongge Wang
2024/585 (PDF ) A Complete Beginner Guide to the Number Theoretic Transform (NTT) Ardianto Satriawan, Rella Mareta, Hanho Lee
2024/584 (PDF ) Efficient Implementations of Square-root Vélu's Formulas Jianming Lin, Weize Wang, Chang-An Zhao, Yuhao Zheng
2024/582 (PDF ) Improved Alternating-Moduli PRFs and Post-Quantum Signatures Navid Alamati, Guru-Vamsi Policharla, Srinivasan Raghuraman, Peter Rindal
2024/581 (PDF ) Fault Attack on SQIsign JeongHwan Lee, Donghoe Heo, Hyeonhak Kim, Gyusang Kim, Suhri Kim, Heeseok Kim, Seokhie Hong
2024/580 (PDF ) Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model Duy Nguyen
2024/579 (PDF ) Tight Multi-user Security of Ascon and Its Large Key Extension Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi
2024/578 (PDF ) Assessing the quality of Random Number Generators through Neural Networks José Luis Crespo, Javier González-Villa, Jaime Gutierrez, Angel Valle
2024/577 (PDF ) Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box Said Eddahmani, Sihem Mesnager
2024/576 (PDF ) On the complexity of the problem of solving systems of tropical polynomial equations of degree two Ivan Buchinskiy, Matvei Kotov, Alexander Treier
2024/575 (PDF ) Pairing Optimizations for Isogeny-based Cryptosystems Shiping Cai, Kaizhan Lin, Chang-An Zhao
2024/574 (PDF ) PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software Jannik Zeitschner, Amir Moradi
2024/573 (PDF ) Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay
2024/572 (PDF ) Split Gröbner Bases for Satisfiability Modulo Finite Fields Alex Ozdemir, Shankara Pailoor, Alp Bassa, Kostas Ferles, Clark Barrett, Işil Dillig
2024/571 (PDF ) MiniCast: Minimizing the Communication Complexity of Reliable Broadcast Thomas Locher, Victor Shoup
2024/570 (PDF ) Actively Secure Private Set Intersection in the Client-Server Setting Yunqing Sun, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Xiao Wang
2024/569 (PDF ) An overview of symmetric fuzzy PAKE protocols Johannes Ottenhues
2024/568 (PDF ) Communication-Efficient Multi-Party Computation for RMS Programs Thomas Attema, Aron van Baarsen, Stefan van den Berg, Pedro Capitão, Vincent Dunning, Lisa Kohl
2024/567 (PDF ) Amortizing Circuit-PSI in the Multiple Sender/Receiver Setting Aron van Baarsen, Marc Stevens
2024/566 (PDF ) A Round-Optimal Near-Linear Third-Party Private Set Intersection Protocol Foo Yee Yeo, Jason H. M. Ying
2024/565 (PDF ) On the construction of quantum circuits for S-boxes with different criteria based on the SAT solver Da Lin, Chunli Yang, Shengyuan Xu, Shizhu Tian, Bing Sun
2024/564 (PDF ) Multiple Group Action Dlogs with(out) Precomputation Alexander May, Massimo Ostuzzi
2024/563 (PDF ) A Note on Related-Tweakey Impossible Differential Attacks Xavier Bonnetain, Virginie Lallemand
2024/562 (PDF ) Practical Proofs of Parsing for Context-free Grammars Harjasleen Malvai, Siam Hussain, Gregory Neven, Andrew Miller
2024/561 (PDF ) SQIAsignHD: SQIsignHD Adaptor Signature Farzin Renan, Péter Kutas
2024/560 (PDF ) Two-Party Decision Tree Training from Updatable Order-Revealing Encryption Robin Berger, Felix Dörre, Alexander Koch
2024/559 (PDF ) Convolution-Friendly Image Compression with FHE Axel Mertens, Georgio Nicolas, Sergi Rovira
2024/558 (PDF ) Scoring the predictions: a way to improve profiling side-channel attacks Damien Robissout, Lilian Bossuet, Amaury Habrard
2024/557 (PDF ) Permutation-Based Hash Chains with Application to Password Hashing Charlotte Lefevre, Bart Mennink
2024/556 (PDF ) Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage Leonie Reichert, Gowri R Chandran, Phillipp Schoppmann, Thomas Schneider, Björn Scheuermann
2024/555 (PDF ) Quantum Algorithms for Lattice Problems Yilei Chen
2024/554 (PDF ) Leakage-Abuse Attacks Against Structured Encryption for SQL Alexander Hoover, Ruth Ng, Daren Khu, Yao'an Li, Joelle Lim, Derrick Ng, Jed Lim, Yiyang Song
2024/553 (PDF ) Efficient Linkable Ring Signatures: New Framework and Post-Quantum Instantiations Yuxi Xue, Xingye Lu, Man Ho Au, Chengru Zhang
2024/552 (PDF ) Insights from building a blockchain-based metaverse Mario Yaksetig
2024/551 (PDF ) Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography Nimish Mishra, Debdeep Mukhopadhyay
2024/550 (PDF ) Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV Mustafa Khairallah
2024/549 (PDF ) Integral Attack on the Full FUTURE Block Cipher Zeyu Xu, Jiamin Cui, Kai Hu, Meiqin Wang
2024/548 (PDF ) Efficient isochronous fixed-weight sampling with applications to NTRU Décio Luiz Gazzoni Filho, Tomás S. R. Silva, Julio López
2024/547 (PDF ) Efficient Permutation Correlations and Batched Random Access for Two-Party Computation Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal, Harshal Shah
2024/546 (PDF ) Share with Care: Breaking E2EE in Nextcloud Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson
2024/545 (PDF ) Optimal Asynchronous Byzantine Consensus with Fair Separability Vincent Gramoli, Zhenliang Lu, Qiang Tang, Pouriya Zarbafian
2024/544 (PDF ) A post-quantum Distributed OPRF from the Legendre PRF Novak Kaluđerović, Nan Cheng, Katerina Mitrokotsa
2024/543 (PDF ) A Note on the Common Haar State Model Prabhanjan Ananth, Aditya Gulati, Yao-Ting Lin
2024/542 (PDF ) Breaking Bicoptor from S$\&$P 2023 Based on Practical Secret Recovery Attack Jun Xu, Zhiwei Li, Lei Hu
2024/541 (PDF ) Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank Loïc Bidoux, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, Matthieu Rivain
2024/540 (PDF ) Lattice-Based Timed Cryptography Russell W. F. Lai, Giulio Malavolta
2024/539 (PDF ) Supersingular Hashing using Lattès Maps Daniel Larsson
2024/538 (PDF ) A comment on "Comparing the MOV and FR reductions in elliptic curve cryptography" from EUROCRYPT'99 Qiping Lin, Fengmei Liu
2024/537 (PDF ) Confidential and Verifiable Machine Learning Delegations on the Cloud Wenxuan Wu, Soamar Homsi, Yupeng Zhang
2024/536 (PDF ) Public-Algorithm Substitution Attacks: Subverting Hashing and Verification Mihir Bellare, Doreen Riepel, Laura Shea
2024/535 (PDF ) NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree Tianxiang Dai, Yufan Jiang, Yong Li, Fei Mei
2024/534 (PDF ) CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model Simon Jeanteur, Laura Kovács, Matteo Maffei, Michael Rawson
2024/533 (PDF ) HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger, Tim Weißmantel, Hossein Yalame
2024/532 (PDF ) Analysing Cryptography in the Wild - A Retrospective Martin R. Albrecht, Kenneth G. Paterson
2024/531 (PDF ) Avoiding Trusted Setup in Isogeny-based Commitments Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, Célestin Nkuimi-Jugnia
2024/530 (PDF ) An efficient key generation algorithm for GR-NTRU over dihedral group Vikas Kumar, Ali Raya, Aditi Kar Gangopadhyay
2024/529 (PDF ) Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest Hojune Shin, Jina Choi, Dain Lee, Kyoungok Kim, Younho Lee
2024/528 (PDF ) The solving degrees for computing Gröbner bases of affine semi-regular polynomial sequences Momonari Kudo, Kazuhiro Yokoyama
2024/526 (PDF ) Optimizing and Implementing Fischlin's Transform for UC-Secure Zero-Knowledge Yi-Hsiu Chen, Yehuda Lindell
2024/525 (PDF ) Privacy Preserving Biometric Authentication for Fingerprints and Beyond Marina Blanton, Dennis Murphy
2024/524 (PDF ) A Time-Space Tradeoff for the Sumcheck Prover Alessandro Chiesa, Elisabetta Fedele, Giacomo Fenzi, Andrew Zitek-Estrada
2024/523 (PDF ) Unbindable Kemmy Schmidt: ML-KEM is neither MAL-BIND-K-CT nor MAL-BIND-K-PK Sophie Schmieg
2024/522 (PDF ) Cryptanalysis of Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs Mahender Kumar
2024/521 (PDF ) LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram Tomoki Moriya, Miha Stopar
2024/520 (PDF ) A note on securing insertion-only Cuckoo filters Fernando Virdia, Mia Filić
2024/519 (PDF ) On implementation of Stickel's key exchange protocol over max-min and max-$T$ semirings Sulaiman Alhussaini, Serge˘ı Sergeev
2024/518 (PDF ) Software-Defined Cryptography: A Design Feature of Cryptographic Agility Jihoon Cho, Changhoon Lee, Eunkyung Kim, Jieun Lee, Beumjin Cho
2024/517 (PDF ) Fast pairings via biextensions and cubical arithmetic Damien Robert
2024/516 (PDF ) Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages Björn Ho, Huanhuan Chen, Zeshun Shi, Kaitai Liang
2024/515 (PDF ) Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE Manning Zhang, Zeshun Shi, Huanhuan Chen, Kaitai Liang
2024/514 (PDF ) Zero-Knowledge Proof Vulnerability Analysis and Security Auditing Xueyan Tang, Lingzhi Shi, Xun Wang, Kyle Charbonnet, Shixiang Tang, Shixiao Sun
2024/512 (PDF ) Single Trace is All It Takes: Efficient Side-channel Attack on Dilithium Zehua Qiao, Yuejun Liu, Yongbin Zhou, Yuhan Zhao, Shuyi Chen
2024/511 (PDF ) A Black-box Attack on Fixed-Unitary Quantum Encryption Schemes Cezary Pilaszewicz, Lea R. Muth, Marian Margraf
2024/510 (PDF ) Snake-eye Resistant PKE from LWE for Oblivious Message Retrieval and Robust Encryption Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang
2024/509 (PDF ) Distribution of cycles in supersingular $\ell$-isogeny graphs Eli Orvis
2024/508 (PDF ) Secure Multi-Party Linear Algebra with Perfect Correctness Jules Maire, Damien Vergnaud
2024/507 (PDF ) An Efficient SNARK for Field-Programmable and RAM Circuits Jehyuk Jang, Jamie Judd
2024/506 (PDF ) A Decentralized Federated Learning using Reputation Olive Chakraborty, Aymen Boudguiga
2024/505 (PDF ) RSA-Based Dynamic Accumulator without Hashing into Primes Victor Youdom Kemmoe, Anna Lysyanskaya
2024/504 (PDF ) Polylogarithmic Proofs for Multilinears over Binary Towers Benjamin E. Diamond, Jim Posen
2024/503 (PDF ) Weakly Super-Invertible Matrices and Constant Communication Dishonest Majority MPC Alexander Bienstock, Kevin Yeo
2024/502 (PDF ) Best of Two Worlds: Efficient, Usable and Auditable Biometric ABC on the Blockchain Neyire Deniz Sarier
2024/501 (PDF ) Anonymous Revocable Identity-Based Encryption Supporting Anonymous Revocation Kwangsu Lee
2024/500 (PDF ) Side Channel Resistant Sphincs+ Scott Fluhrer
2024/499 (PDF ) CCA Secure Updatable Encryption from Non-Mappable Group Actions Jonas Meers, Doreen Riepel
2024/498 (PDF ) Number-Theoretic Transform Architecture for Fully Homomorphic Encryption from Hypercube Topology Jingwei Hu, Yuhong Fang, Wangchen Dai
2024/497 (PDF ) On the Security of Data Markets and Private Function Evaluation István Vajda
2024/496 (PDF ) Two-Round Threshold Signature from Algebraic One-More Learning with Errors Thomas Espitau, Shuichi Katsumata, Kaoru Takemure
2024/495 (PDF ) Reducing Signature Size of Matrix-code-based Signature Schemes Tung Chou, Ruben Niederhagen, Lars Ran, Simona Samardjiska
2024/494 (PDF ) HW-token-based Common Random String Setup István Vajda
2024/493 (PDF ) Reckle Trees: Updatable Merkle Batch Proofs with Applications Charalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, Stjepan Golemac
2024/492 (PDF ) Statistical testing of random number generators and their improvement using randomness extraction Cameron Foreman, Richie Yeung, Florian J. Curchod
2024/491 (PDF ) Updatable Policy-Compliant Signatures Christian Badertscher, Monosij Maitra, Christian Matt, Hendrik Waldner
2024/490 (PDF ) One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures Carsten Baum, Ward Beullens, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, Peter Scholl
2024/489 (PDF ) Guess and Determine Analysis Based on Set Split Zhe CEN, Xiutao FENG, Zhangyi WANG, Yamin ZHU, Chunping CAO
2024/488 (PDF ) Improving Generic Attacks Using Exceptional Functions Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, André Schrottenloher
2024/487 (PDF ) Real-Valued Somewhat-Pseudorandom Unitaries Zvika Brakerski, Nir Magrafta
2024/486 (PDF ) Anamorphic Encryption: New Constructions and Homomorphic Realizations Dario Catalano, Emanuele Giunta, Francesco Migliaro
2024/485 (PDF ) A Variation on Knellwolf and Meier's Attack on the Knapsack Generator Florette Martinez
2024/484 (PDF ) Harmonizing PUFs for Forward Secure Authenticated Key Exchange with Symmetric Primitives Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay, Shivam Bhasin
2024/483 (PDF ) Lower data attacks on Advanced Encryption Standard Orhun Kara
2024/482 (PDF ) $\textsf{ThorPIR}$: Single Server PIR via Homomorphic Thorp Shuffles Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Charalampos Papamanthou
2024/481 (PDF ) Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation Charlotte Hoffmann, Krzysztof Pietrzak
2024/480 (PDF ) Folding-based zkLLM Wilbert W
2024/479 (PDF ) Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement Hanwen Feng, Zhenliang Lu, Tiancheng Mai, Qiang Tang
2024/478 (PDF ) The Insecurity of SHA2 under the Differential Fault Characteristic of Boolean Functions Weiqiong Cao, Hua Chen, Hongsong Shi, Haoyuan Li, Jian Wang
2024/477 (PDF ) Large Language Models for Blockchain Security: A Systematic Literature Review Zheyuan He, Zihao Li, Sen Yang, He Ye, Ao Qiao, Xiaosong Zhang, Ting Chen, Xiapu Luo
2024/476 (PDF ) OPSA: Efficient and Verifiable One-Pass Secure Aggregation with TEE for Federated Learning Zhangshuang Guan, Yulin Zhao, Zhiguo Wan, Jinsong Han
2024/475 (PDF ) CheckOut: User-Controlled Anonymization for Customer Loyalty Programs Matthew Gregoire, Rachel Thomas, Saba Eskandarian
2024/474 (PDF ) Accumulation without Homomorphism Benedikt Bünz, Pratyush Mishra, Wilson Nguyen, William Wang
2024/473 (PDF ) Extremely Simple (Almost) Fail-Stop ECDSA Signatures Mario Yaksetig
2024/472 (PDF ) Sailfish: Towards Improving the Latency of DAG-based BFT Nibesh Shrestha, Rohan Shrothrium, Aniket Kate, Kartik Nayak
2024/471 (PDF ) A Knot-based Key Exchange protocol Silvia Sconza, Arno Wildi
2024/470 (PDF ) Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, Damien Vergnaud
2024/469 (PDF ) Malicious Security for Sparse Private Histograms Lennart Braun, Adrià Gascón, Mariana Raykova, Phillipp Schoppmann, Karn Seth
2024/467 (PDF ) Partially Non-Interactive Two-Round Lattice-Based Threshold Signatures Rutchathon Chairattana-Apirom, Stefano Tessaro, Chenzhi Zhu
2024/466 (PDF ) Arctic: Lightweight and Stateless Threshold Schnorr Signatures Chelsea Komlo, Ian Goldberg
2024/465 (PDF ) Efficient Multi-instance Vector Commitment and Application to Post-quantum Signatures Dung Bui
2024/464 (PDF ) ON THE IMPLEMENTATION OF A LATTICE-BASED DAA FOR VANET SYSTEM Doryan Lesaignoux, Mikael Carmona
2024/463 (PDF ) Security Guidelines for Implementing Homomorphic Encryption Jean-Philippe Bossuat, Rosario Cammarota, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Yuriy Polyakov, Luis Antonio Ruiz Lopez, Yongsoo Song, Donggeon Yhee
2024/462 (PDF ) Perfect Zero-Knowledge PCPs for #P Tom Gur, Jack O'Connor, Nicholas Spooner
2024/461 (PDF ) Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, Tucker Balch
2024/460 (PDF ) Encrypted Image Classification with Low Memory Footprint using Fully Homomorphic Encryption Lorenzo Rovida, Alberto Leporati
2024/459 (PDF ) Isogeny problems with level structure Luca De Feo, Tako Boris Fouotsa, Lorenz Panny
2024/458 (PDF ) Classical and Quantum Generic Attacks on 6-round Feistel Schemes Maya Chartouny, Benoit Cogliati, Jacques Patarin
2024/457 (PDF ) Studying Lattice-Based Zero-Knowlege Proofs: A Tutorial and an Implementation of Lantern Lena Heimberger, Florian Lugstein, Christian Rechberger
2024/456 (PDF ) Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam
2024/455 (PDF ) Anonymous Complaint Aggregation for Secure Messaging Connor Bell, Saba Eskandarian
2024/454 (PDF ) The Systemic Errors of Banded Quantum Fourier Transformation Zhengjun Cao, Zhenfu Cao
2024/453 (PDF ) Verifiable Information-Theoretic Function Secret Sharing Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang, Liang Feng Zhang
2024/452 (PDF ) Modeling Mobile Crash in Byzantine Consensus Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu
2024/451 (PDF ) Towards Verifiable FHE in Practice: Proving Correct Execution of TFHE's Bootstrapping using plonky2 Louis Tremblay Thibault, Michael Walter
2024/450 (PDF ) The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations Ward Beullens, Lucas Dodgson, Sebastian Faller, Julia Hesse
2024/449 (PDF ) Practical Lattice-Based Distributed Signatures for a Small Number of Signers Nabil Alkeilani Alkadri, Nico Döttling, Sihang Pu
2024/448 (PDF ) Differential Cryptanalysis of a Lightweight Block Cipher LELBC Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey
2024/447 (PDF ) ORIGO: Proving Provenance of Sensitive Data with Constant Communication Jens Ernstberger, Jan Lauinger, Yinnan Wu, Arthur Gervais, Sebastian Steinhorst
2024/446 (PDF ) Estimating the Unpredictability of Multi-Bit Strong PUF Classes Ahmed Bendary, Wendson A. S. Barbosa, Andrew Pomerance, C. Emre Koksal
2024/445 (PDF ) Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy
2024/444 (PDF ) A trust-minimized e-cash for cryptocurrencies Mario Yaksetig
2024/443 (PDF ) The cool and the cruel: separating hard parts of LWE secrets Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, Francois Charton, Kristin Lauter
2024/442 (PDF ) Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking Kostas Kryptos Chalkias, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Alberto Sonnino, Joy Wang
2024/441 (PDF ) Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields Guilhem Mureau, Alice Pellet-Mary, Heorhii Pliatsok, Alexandre Wallet
2024/440 (PDF ) Secret and Shared Keys Recovery on Hamming Quasi-Cyclic with SASCA Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau
2024/439 (PDF ) Threshold implementations of cryptographic functions between finite Abelian groups Enrico Piccione
2024/438 (PDF ) EFFLUX-F2: A High Performance Hardware Security Evaluation Board Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
2024/437 (PDF ) Insecurity of MuSig and Bellare-Neven Multi-Signatures with Delayed Message Selection Sela Navot
2024/436 (PDF ) Re-Randomized FROST Conrado P. L. Gouvea, Chelsea Komlo
2024/435 (PDF ) Unbiasable Verifiable Random Functions Emanuele Giunta, Alistair Stewart
2024/434 (PDF ) Parameter-Hiding Order-Revealing Encryption without Pairings Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang
2024/433 (PDF ) UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling
2024/432 (PDF ) Perfect Asynchronous MPC with Linear Communication Overhead Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
2024/431 (PDF ) Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version Lorenzo Grassi, Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert
2024/430 (PDF ) SoK: Zero-Knowledge Range Proofs Miranda Christ, Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Deepak Maram, Arnab Roy, Joy Wang
2024/429 (PDF ) FOLEAGE: $\mathbb{F}_4$OLE-Based Multi-Party Computation for Boolean Circuits Maxime Bombar, Dung Bui, Geoffroy Couteau, Alain Couvreur, Clément Ducros, Sacha Servan-Schreiber
2024/428 (PDF ) SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, Debayan Das
2024/427 (PDF ) A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes Hermann Seuschek, Johann Heyszl, Fabrizio De Santis
2024/426 (PDF ) Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, Xiao Wang
2024/425 (PDF ) Kolmogorov Comes to Cryptomania: On Interactive Kolmogorov Complexity and Key-Agreement Marshall Ball, Yanyi Liu, Noam Mazor, Rafael Pass
2024/424 (PDF ) Revisiting the Security of Approximate FHE with Noise-Flooding Countermeasures Flavio Bergamaschi, Anamaria Costache, Dana Dachman-Soled, Hunter Kippen, Lucas LaBuff, Rui Tang
2024/423 (PDF ) Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores Konstantina Miteloudi, Asmita Adhikary, Niels van Drueten, Lejla Batina, Ileana Buhan
2024/422 (PDF ) A Class of Weightwise Almost Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity Deepak Kumar Dalai, Krishna Mallick
2024/421 (PDF ) LLRing: Logarithmic Linkable Ring Signatures with Transparent Setup Xiangyu Hui, Sid Chi-Kin Chau
2024/420 (PDF ) Gap MCSP is not (Levin) NP-complete in Obfustopia Noam Mazor, Rafael Pass
2024/419 (PDF ) New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs Bar Alon, Amos Beimel, Tamar Ben David, Eran Omri, Anat Paskin-Cherniavsky
2024/418 (PDF ) Atomic and Fair Data Exchange via Blockchain Ertem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, Valeria Nikolaenko
2024/417 (PDF ) An improved exact CRR basis conversion algorithm for FHE without floating-point arithmetic Hongyuan Qu, Guangwu Xu
2024/416 (PDF ) Mangrove: A Scalable Framework for Folding-based SNARKs Wilson Nguyen, Trisha Datta, Binyi Chen, Nirvan Tyagi, Dan Boneh
2024/415 (PDF ) Column-wise Garbling, and How to Go Beyond the Linear Model Lei Fan, Zhenghao Lu, Hong-Sheng Zhou
2024/414 (PDF ) Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations Joseph Carolan, Alexander Poremba
2024/413 (PDF ) Bent functions using Maiorana-McFarland secondary construction Juan Carlos Ku-Cauich, Javier Diaz-Vargas, Sara Mandujano-Velazquez
2024/412 (PDF ) Quasi-Optimal Permutation Ranking and Applications to PERK Slim Bettaieb, Alessandro Budroni, Marco Palumbi, Décio Luiz Gazzoni Filho
2024/411 (PDF ) Polytopes in the Fiat-Shamir with Aborts Paradigm Henry Bambury, Hugo Beguinet, Thomas Ricosset, Eric Sageloli
2024/410 (PDF ) Recent Progress in Quantum Computing Relevant to Internet Security Hilarie Orman
2024/409 (PDF ) Nebula: A Privacy-First Platform for Data Backhaul Jean-Luc Watson, Tess Despres, Alvin Tan, Shishir G. Patil, Prabal Dutta, Raluca Ada Popa
2024/408 (PDF ) Stateless and Verifiable Execution Layer for Meta-Protocols on Bitcoin Hongbo Wen, Hanzhi Liu, Shuyang Tang, Tianyue Li, Shuhan Cao, Domo, Yanju Chen, Yu Feng
2024/407 (PDF ) Permutation-Based Hashing Beyond the Birthday Bound Charlotte Lefevre, Bart Mennink
2024/406 (PDF ) Some notes on algorithms for abelian varieties Damien Robert
2024/405 (PDF ) Traceable Secret Sharing: Strong Security and Efficient Constructions Dan Boneh, Aditi Partap, Lior Rotem
2024/404 (PDF ) Breaking the DECT Standard Cipher with Lower Time Cost Lin Ding, Zhengting Li, Ziyu Guan, Xinhai Wang, Zheng Wu
2024/403 (PDF ) DARE to agree: Byzantine Agreement with Optimal Resilience and Adaptive Communication Pierre Civit, Muhammad Ayaz Dzulfikar, Seth Gilbert, Rachid Guerraoui, Jovan Komatovic, Manuel Vidigueira
2024/402 (PDF ) Efficient Unbalanced Quorum PSI from Homomorphic Encryption Xinpeng Yang, Liang Cai, Yinghao Wang, Yinghao Wang, Lu Sun, Jingwei Hu
2024/401 (PDF ) Plover: Masking-Friendly Hash-and-Sign Lattice Signatures Muhammed F. Esgin, Thomas Espitau, Guilhem Niot, Thomas Prest, Amin Sakzad, Ron Steinfeld
2024/400 (PDF ) SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks Max Duparc, Tako Boris Fouotsa, Serge Vaudenay
2024/399 (PDF ) A Direct PRF Construction from Kolmogorov Complexity Yanyi Liu, Rafael Pass
2024/398 (PDF ) The Last Challenge Attack on Fiat-Shamir in KZG-based SNARKs Oana Ciobotaru, Maxim Peter, Vesselin Velichkov
2024/397 (PDF ) Exponent-VRFs and Their Applications Dan Boneh, Iftach Haitner, Yehuda Lindell, Gil Segev
2024/396 (PDF ) On the impact of ionizing and non-ionizing irradiation damage on security microcontrollers in CMOS technology Theresa Krüger
2024/395 (PDF ) Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators Jiajun Xin, Arman Haghighi, Xiangan Tian, Dimitrios Papadopoulos
2024/394 (PDF ) A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System Shuhan Zeng, Yongjian Liao, Chuanhao Zhou, Jinlin He, Hongwei Wang
2024/393 (PDF ) Solving McEliece-1409 in One Day --- Cryptanalysis with the Improved BJMM Algorithm Shintaro Narisada, Shusaku Uemura, Hiroki Okada, Hiroki Furue, Yusuke Aikawa, Kazuhide Fukushima
2024/392 (PDF ) Heuristic Ideal Obfuscation Based on Evasive LWR Zhuang Shan, Leyou Zhang, Qiqi Lai
2024/391 (PDF ) On Information-Theoretic Secure Multiparty Computation with Local Repairability Daniel Escudero, Ivan Tjuawinata, Chaoping Xing
2024/390 (PDF ) STIR: Reed–Solomon Proximity Testing with Fewer Queries Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, Eylon Yogev
2024/389 (PDF ) On the Feasibility of Sliced Garbling Tomer Ashur, Carmit Hazay, Rahul Satish
2024/388 (PDF ) Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding Yijian Zhang, Yunhao Ling, Jie Chen, Luping Wang
2024/387 (PDF ) Ceno: Non-uniform, Segment and Parallel Zero-knowledge Virtual Machine Tianyi Liu, Zhenfei Zhang, Yuncong Zhang, Wenqing Hu, Ye Zhang
2024/386 (PDF ) High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings Christopher Harth-Kitzerow, Ajith Suresh, Yongqin Wang, Hossein Yalame, Georg Carle, Murali Annavaram
2024/385 (PDF ) A New Public Key Cryptosystem Based on the Cubic Pell Curve Michel Seck, Abderrahmane Nitaj
2024/384 (PDF ) Transmitter Actions for Secure Integrated Sensing and Communication Truman Welling, Onur Gunlu, Aylin Yener
2024/383 (PDF ) Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran
2024/382 (PDF ) Decentralized Access Control Infrastructure for Enterprise Digital Asset Management Chirag Madaan, Rohan Agarwal, Vipul Saini, Ujjwal Kumar
2024/381 (PDF ) Quantum Circuits of AES with a Low-depth Linear Layer and a New Structure Haotian Shi, Xiutao Feng
2024/380 (PDF ) Collision Resistance from Multi-Collision Resistance for all Constant Parameters Jan Buzek, Stefano Tessaro
2024/379 (PDF ) SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity Elizabeth Crites, Aggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh
2024/378 (PDF ) Strong PUF Security Metrics: Sensitivity of Responses to Single Challenge Bit Flips Wolfgang Stefani, Fynn Kappelhoff, Martin Gruber, Yu-Neng Wang, Sara Achour, Debdeep Mukhopadhyay, Ulrich Rührmair
2024/377 (PDF ) Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking Sebastian Faust, Loïc Masure, Elena Micheli, Maximilian Orlt, François-Xavier Standaert
2024/376 (PDF ) Perfect (Parallel) Broadcast in Constant Expected Rounds via Statistical VSS Gilad Asharov, Anirudh Chandramouli
2024/375 (PDF ) Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2024/374 (PDF ) Universal Composable Password Authenticated Key Exchange for the Post-Quantum World You Lyu, Shengli Liu, Shuai Han
2024/373 (PDF ) Lower Bounds for Differential Privacy Under Continual Observation and Online Threshold Queries Edith Cohen, Xin Lyu, Jelani Nelson, Tamás Sarlós, Uri Stemmer
2024/372 (PDF ) Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate Pedro Branco, Nico Döttling, Akshayaram Srinivasan
2024/371 (PDF ) Preimage Attacks on Reduced-Round Ascon-Xof Seungjun Baek, Giyoon Kim, Jongsung Kim
2024/370 (PDF ) Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus Daniel Escudero, Yifan Song, Wenhao Wang
2024/369 (PDF ) Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts David Heath, Vladimir Kolesnikov, Lucien K. L. Ng
2024/368 (PDF ) Algorithms for Matrix Code and Alternating Trilinear Form Equivalences via New Isomorphism Invariants Anand Kumar Narayanan, Youming Qiao, Gang Tang
2024/367 (PDF ) Accelerating SLH-DSA by Two Orders of Magnitude with a Single Hash Unit Markku-Juhani O. Saarinen
2024/366 (PDF ) Key Recovery Attack on the Partial Vandermonde Knapsack Problem Dipayan Das, Antoine Joux
2024/365 (PDF ) Combined Threshold Implementation Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
2024/364 (PDF ) Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem Lars Ran, Simona Samardjiska, Monika Trimoska
2024/363 (PDF ) Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure? Roozbeh Sarenche, Ren Zhang, Svetla Nikova, Bart Preneel
2024/362 (PDF ) Integrating Causality in Messaging Channels Shan Chen, Marc Fischlin
2024/361 (PDF ) Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation Jiaxin Pan, Doreen Riepel, Runzhi Zeng
2024/360 (PDF ) The NISQ Complexity of Collision Finding Yassine Hamoudi, Qipeng Liu, Makrand Sinha
2024/359 (PDF ) Key-Recovery Attack on a Public-Key Encryption Related to Planted Clique Caicai Chen, Chris Jones
2024/358 (PDF ) Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication Qi Feng, Kang Yang, Kaiyi Zhang, Xiao Wang, Yu Yu, Xiang Xie
2024/357 (PDF ) Security analysis of the iMessage PQ3 protocol Douglas Stebila
2024/356 (PDF ) On Central Primitives for Quantum Cryptography with Classical Communication Kai-Min Chung, Eli Goldin, Matthew Gray
2024/355 (PDF ) Adaptively Secure Streaming Functional Encryption Pratish Datta, Jiaxin Guan, Alexis Korb, Amit Sahai
2024/354 (PDF ) WARPfold : Wrongfield ARithmetic for Protostar folding Lev Soukhanov
2024/353 (PDF ) FuLeakage: Breaking FuLeeca by Learning Attacks Felicitas Hörmann, Wessel van Woerden
2024/352 (PDF ) Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, Tianyu Zhang
2024/351 (PDF ) Improved Differential Meet-In-The-Middle Cryptanalysis Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia
2024/350 (PDF ) Automating Collision Attacks on RIPEMD-160 Yingxin Li, Fukang Liu, Gaoli Wang
2024/349 (PDF ) New Records in Collision Attacks on SHA-2 Yingxin Li, Fukang Liu, Gaoli Wang
2024/348 (PDF ) A Computational Tsirelson's Theorem for the Value of Compiled XOR Games David Cui, Giulio Malavolta, Arthur Mehta, Anand Natarajan, Connor Paddock, Simon Schmidt, Michael Walter, Tina Zhang
2024/347 (PDF ) The Algebraic Freelunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, Håvard Raddum
2024/346 (PDF ) A data aggregation protocol based on TFHE Maria Ferrara, Antonio Tortora, Maria Tota
2024/345 (PDF ) An Efficient Adaptive Attack Against FESTA Guoqing Zhou, Maozhi Xu
2024/344 (PDF ) Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng
2024/342 (PDF ) Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium Jiahui He, Kai Hu, Hao Lei, Meiqin Wang
2024/341 (PDF ) VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers Leo de Castro, Keewoo Lee
2024/340 (PDF ) A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors Brent Waters
2024/339 (PDF ) From Random Probing to Noisy Leakages Without Field-Size Dependence Gianluca Brian, Stefan Dziembowski, Sebastian Faust
2024/338 (PDF ) Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis Itai Dinur
2024/337 (PDF ) Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme Valerie Gilchrist, Laurane Marco, Christophe Petit, Gang Tang
2024/336 (PDF ) RAMenPaSTA: Parallelizable Scalable Transparent Arguments of Knowledge for RAM Programs Khai Hanh Tang, Nhat Minh Pham, Chan Nam Ngo
2024/335 (PDF ) Split-State Non-Malleable Codes and Secret Sharing Schemes for Quantum Messages Naresh Goud Boddu, Vipul Goyal, Rahul Jain, João Ribeiro
2024/334 (PDF ) The Impact of Reversibility on Parallel Pebbling Jeremiah Blocki, Blake Holman, Seunghoon Lee
2024/333 (PDF ) Practical Attack on All Parameters of the DME Signature Scheme Pierre Briaud, Maxime Bros, Ray Perlner, Daniel Smith-Tone
2024/332 (PDF ) Leakage-Tolerant Circuits Yuval Ishai, Yifan Song
2024/331 (PDF ) Transaction Fee Mechanism Design in a Post-MEV World Maryam Bahrani, Pranav Garimidi, Tim Roughgarden
2024/330 (PDF ) Fuzzy Private Set Intersection with Large Hyperballs Aron van Baarsen, Sihang Pu
2024/329 (PDF ) How to Validate a Verification? Houda Ferradi
2024/328 (PDF ) Attribute-Based Signatures with Advanced Delegation, and Tracing Cécile Delerablée, Lénaïck Gouriou, David Pointcheval
2024/327 (PDF ) Registered Functional Encryptions from Pairings Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian
2024/326 (PDF ) Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications Nicolas Alhaddad, Mayank Varia, Ziling Yang
2024/325 (PDF ) Proofs for Deep Thought: Accumulation for large memories and deterministic computations Benedikt Bünz, Jessica Chen
2024/324 (PDF ) Under What Conditions Is Encrypted Key Exchange Actually Secure? Jake Januzelli, Lawrence Roy, Jiayu Xu
2024/323 (PDF ) Circuit Bootstrapping: Faster and Smaller Ruida Wang, Yundi Wen, Zhihao Li, Xianhui Lu, Benqiang Wei, Kun Liu, Kunpeng Wang
2024/322 (PDF ) On the Explanation and Enhancement of Neural-inspired Differential Cryptanalysis Weixi Zheng, Liu Zhang, Zilong Wang
2024/321 (PDF ) Formal Verification of Emulated Floating-Point Arithmetic in Falcon Vincent Hwang
2024/320 (PDF ) POPSTAR: Lightweight Threshold Reporting with Reduced Leakage Hanjun Li, Sela Navot, Stefano Tessaro
2024/319 (PDF ) On the cryptosystems based on two Eulerian transfor-mations defined over the commutative rings $Z_{2^s}, s>1$. Vasyl Ustimenko
2024/318 (PDF ) Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs Alexander Hoover, Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2024/317 (PDF ) Closing the Efficiency Gap between Synchronous and Network-Agnostic Consensus Giovanni Deligios, Mose Mizrahi Erbes
2024/316 (PDF ) Threshold Garbled Circuits with Low Overhead Schuyler Rosefield, abhi shelat, LaKyah Tyner
2024/315 (PDF ) Alternative Key Schedules for the AES Christina Boura, Patrick Derbez, Margot Funk
2024/314 (PDF ) Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration Andrey Kim, Ahmet Can Mert, Anisha Mukherjee, Aikata Aikata, Maxim Deryabin, Sunmin Kwon, HyungChul Kang, Sujoy Sinha Roy
2024/313 (PDF ) The Complexity of Algebraic Algorithms for LWE Matthias Johann Steiner
2024/312 (PDF ) Trapdoor Memory-Hard Functions Benedikt Auerbach, Christoph U. Günther, Krzysztof Pietrzak
2024/311 (PDF ) Aggregating Falcon Signatures with LaBRADOR Marius A. Aardal, Diego F. Aranha, Katharina Boudgoust, Sebastian Kolby, Akira Takahashi
2024/309 (PDF ) NiLoPher: Breaking a Modern SAT-Hardened Logic-Locking Scheme via Power Analysis Attack Prithwish Basu Roy, Johann Knechtel, Akashdeep Saha, Saideep Sreekumar, Likhitha Mankali, Mohammed Nabeel, Debdeep Mukhopadhyay, Ramesh Karri, Ozgur Sinanoglu
2024/308 (PDF ) C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki, Marjan Skrobot
2024/307 (PDF ) SweetPAKE: Key exchange with decoy passwords Afonso Arriaga, Peter Y.A. Ryan, Marjan Skrobot
2024/306 (PDF ) Concretely Efficient Lattice-based Polynomial Commitment from Standard Assumptions Intak Hwang, Jinyeong Seo, Yongsoo Song
2024/305 (PDF ) Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2024/304 (PDF ) A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, Yongluan Zhou
2024/303 (PDF ) Single Pass Client-Preprocessing Private Information Retrieval Arthur Lazzaretti, Charalampos Papamanthou
2024/302 (PDF ) Simple constructions of linear-depth t-designs and pseudorandom unitaries Tony Metger, Alexander Poremba, Makrand Sinha, Henry Yuen
2024/301 (PDF ) Recommendations for the Design and Validation of a Physical True Random Number Generator Integrated in an Electronic Device David Lubicz, Viktor FIscher
2024/300 (PDF ) Diving Deep into the Preimage Security of AES-like Hashing Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang
2024/299 (PDF ) Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks Robin Leander Schröder, Stefan Gast, Qian Guo
2024/298 (PDF ) New Models for the Cryptanalysis of ASCON Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher
2024/297 (PDF ) Accelerating Training and Enhancing Security Through Message Size Optimization in Symmetric Cryptography ABHISAR, Madhav Yadav, Girish Mishra
2024/296 (PDF ) Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks Yiming Gao, Jinghui Wang, Honggang Hu, Binang He
2024/295 (PDF ) An Efficient Hash Function for Imaginary Class Groups Kostas Kryptos Chalkias, Jonas Lindstrøm, Arnab Roy
2024/294 (PDF ) Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate Thomas Peters, Yaobin Shen, François-Xavier Standaert
2024/293 (PDF ) Registered Attribute-Based Signature Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, Jie Chen
2024/292 (PDF ) IDEA-DAC: Integrity-Driven Editing for Accountable Decentralized Anonymous Credentials via ZK-JSON Shuhao Zheng, Zonglun Li, Junliang Luo, Ziyue Xin, Xue Liu
2024/291 (PDF ) Quantum Pseudorandomness Cannot Be Shrunk In a Black-Box Way Samuel Bouaziz--Ermann, Garazi Muguruza
2024/290 (PDF ) Secure Integrated Sensing and Communication Under Correlated Rayleigh Fading Martin Mittelbach, Rafael F. Schaefer, Matthieu Bloch, Aylin Yener, Onur Gunlu
2024/289 (PDF ) SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov
2024/288 (PDF ) A generic algorithm for efficient key recovery in differential attacks – and its associated tool Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, María Naya-Plasencia
2024/287 (PDF ) CAPABARA: A Combined Attack on CAPA Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov
2024/286 (PDF ) Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head Jules Maire, Damien Vergnaud
2024/285 (PDF ) Mirrored Commitment: Fixing ``Randomized Partial Checking'' and Applications Paweł Lorek, Moti Yung, Filip Zagórski
2024/284 (PDF ) Practical Improvements to Statistical Ineffective Fault Attacks Barış Ege, Bob Swinkels, Dilara Toprakhisar, Praveen Kumar Vadnala
2024/283 (PDF ) Toward Malicious Constant-Rate 2PC via Arithmetic Garbling Carmit Hazay, Yibin Yang
2024/282 (PDF ) A Concrete Analysis of Wagner's $k$-List Algorithm over $\mathbb{Z}_p$ Antoine Joux, Hunter Kippen, Julian Loss
2024/281 (PDF ) Polynomial Commitments from Lattices: Post-Quantum Security, Fast Verification and Transparent Setup Valerio Cini, Giulio Malavolta, Ngoc Khanh Nguyen, Hoeteck Wee
2024/280 (PDF ) HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures Renas Bacho, Julian Loss, Gilad Stern, Benedikt Wagner
2024/279 (PDF ) Polynomial-Time Key-Recovery Attack on the ${\tt NIST}$ Specification of ${\tt PROV}$ River Moreira Ferreira, Ludovic Perret
2024/278 (PDF ) Circle STARKs Ulrich Haböck, David Levit, Shahar Papini
2024/277 (PDF ) Fault Attacks on UOV and Rainbow Juliane Krämer, Mirjam Loiero
2024/276 (PDF ) Reduce and Prange: Revisiting Prange's ISD for Solving LPN/RSD over Large Fields Jiseung Kim, Changmin Lee
2024/275 (PDF ) The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets Chun Guo, Xiao Wang, Xiang Xie, Yu Yu
2024/274 (PDF ) Amortized Large Look-up Table Evaluation with Multivariate Polynomials for Homomorphic Encryption Heewon Chung, Hyojun Kim, Young-Sik Kim, Yongwoo Lee
2024/273 (PDF ) Perfect 2-Party Computation from Additive Somewhat Homomorphic Encryption Jonathan Trostle
2024/272 (PDF ) Deep Learning Based Analysis of Key Scheduling Algorithm of Advanced Ciphers Narendra Kumar Patel, Hemraj Shobharam Lamkuche
2024/271 (PDF ) Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem Janice Jianing Si, Tanusree Sharma, Kanye Ye Wang
2024/270 (PDF ) YPIR: High-Throughput Single-Server PIR with Silent Preprocessing Samir Jordan Menon, David J. Wu
2024/269 (PDF ) A note on PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks Milad Seddigh, Seyed Hamid Baghestani
2024/268 (PDF ) A New Approach to Generic Lower Bounds: Classical/Quantum MDL, Quantum Factoring, and More Minki Hhan
2024/267 (PDF ) zkPi: Proving Lean Theorems in Zero-Knowledge Evan Laufer, Alex Ozdemir, Dan Boneh
2024/266 (PDF ) WhisPIR: Stateless Private Information Retrieval with Low Communication Leo de Castro, Kevin Lewi, Edward Suh
2024/265 (PDF ) Beyond the circuit: How to Minimize Foreign Arithmetic in ZKP Circuits Michele Orrù, George Kadianakis, Mary Maller, Greg Zaverucha
2024/264 (PDF ) Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT Nils Fleischhacker, Mathias Hall-Andersen, Mark Simkin
2024/263 (PDF ) Threshold Encryption with Silent Setup Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, Mingyuan Wang
2024/262 (PDF ) Note on the cryptanalysis of Speedy Tim Beyne, Addie Neyt
2024/261 (PDF ) Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility Véronique Cortier, Alexandre Debant, Anselme Goetschmann, Lucca Hirschi
2024/260 (PDF ) Kleptographic Attacks against Implicit Rejection Antoine Joux, Julian Loss, Benedikt Wagner
2024/259 (PDF ) Anonymity on Byzantine-Resilient Decentralized Computing Kehao Ma, Minghui Xu, Yihao Guo, Lukai Cui, Shiping Ni, Shan Zhang, Weibing Wang, Haiyong Yang, Xiuzhen Cheng
2024/258 (PDF ) SoK: Decentralized Storage Network Chuanlei Li, Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng
2024/257 (PDF ) LatticeFold: A Lattice-based Folding Scheme and its Applications to Succinct Proof Systems Dan Boneh, Binyi Chen
2024/256 (PDF ) Fiat-Shamir for Bounded-Depth Adversaries Liyan Chen, Yilei Chen, Zikuan Huang, Nuozhou Sun, Tianqi Yang, Yiding Zhang
2024/255 (PDF ) Revisiting Differential-Linear Attacks via a Boomerang Perspective With Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT Hosein Hadipour, Patrick Derbez, Maria Eichlseder
2024/254 (PDF ) Adaptive Security in SNARGs via iO and Lossy Functions Brent Waters, Mark Zhandry
2024/253 (PDF ) 2PC-MPC: Emulating Two Party ECDSA in Large-Scale MPC Offir Friedman, Avichai Marmor, Dolev Mutzari, Omer Sadika, Yehonatan C. Scaly, Yuval Spiizer, Avishay Yanai
2024/252 (PDF ) Faster Signatures from MPC-in-the-Head Dung Bui, Eliana Carozza, Geoffroy Couteau, Dahmun Goudarzi, Antoine Joux
2024/251 (PDF ) Communication-Optimal Convex Agreement Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer
2024/250 (PDF ) Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi Katharina Koschatko, Reinhard Lüftenegger, Christian Rechberger
2024/249 (PDF ) Robust Additive Randomized Encodings from IO and Pseudo-Non-linear Codes Nir Bitansky, Sapir Freizeit
2024/248 (PDF ) FRIDA: Data Availability Sampling from FRI Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner
2024/247 (PDF ) Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults Simon Tollec, Vedad Hadžić, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan Mangard
2024/246 (PDF ) OCash: Fully Anonymous Payments between Blockchain Light Clients Adam Blatchley Hansen, Jesper Buus Nielsen, Mark Simkin
2024/245 (PDF ) Linear-Communication Asynchronous Complete Secret Sharing with Optimal Resilience Xiaoyu Ji, Junru Li, Yifan Song
2024/244 (PDF ) Don’t Use It Twice! Solving Relaxed Linear Code Equivalence Problems Alessandro Budroni, Jesús-Javier Chi-Domínguez, Giuseppe D'Alconzo, Antonio J. Di Scala, Mukul Kulkarni
2024/243 (PDF ) Towards Achieving Asynchronous MPC with Linear Communication and Optimal Resilience Vipul Goyal, Chen-Da Liu-Zhang, Yifan Song
2024/242 (PDF ) Perfectly-Secure MPC with Constant Online Communication Complexity Yifan Song, Xiaxi Ye
2024/241 (PDF ) Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings Kaisei Kajita, Go Ohtake, Tsuyoshi Takagi
2024/240 (PDF ) Implementation of Cryptanalytic Programs Using ChatGPT Nobuyuki Sugio
2024/238 (PDF ) A Single Trace Fault Injection Attack on Hedged CRYSTALS-Dilithium Sönke Jendral
2024/237 (PDF ) Collusion-Resilience in Transaction Fee Mechanism Design Hao Chung, Tim Roughgarden, Elaine Shi
2024/236 (PDF ) New Black-Box Separations through Mathematically Structured Primitives Hart Montgomery, Sikhar Patranabis
2024/235 (PDF ) Pseudorandom Error-Correcting Codes Miranda Christ, Sam Gunn
2024/234 (PDF ) Bare PAKE: Universally Composable Key Exchange from just Passwords Manuel Barbosa, Kai Gellert, Julia Hesse, Stanislaw Jarecki
2024/233 (PDF ) Cayley hashing with cookies Vladimir Shpilrain, Bianca Sosnovski
2024/232 (PDF ) On the Security of Nova Recursive Proof System: Limitations of and Alternatives to Bounded-Depth Analysis Hyeonbum Lee, Jae Hong Seo
2024/231 (PDF ) Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices Eugene Frimpong, Alexandros Bakas, Camille Foucault, Antonis Michalas
2024/230 (PDF ) Analysis of Layered ROLLO-I: A BII-LRPC code-based KEM Seongtaek Chee, Kyung Chul Jeong, Tanja Lange, Nari Lee, Alex Pellegrini, Hansol Ryu
2024/229 (PDF ) Strong Batching for Non-Interactive Statistical Zero-Knowledge Changrui Mu, Shafik Nassar, Ron D. Rothblum, Prashant Nalini Vasudevan
2024/228 (PDF ) On the Untapped Potential of the Quantum FLT-based Inversion Ren Taguchi, Atsushi Takayasu
2024/227 (PDF ) Adaptively Sound Zero-Knowledge SNARKs for UP Surya Mathialagan, Spencer Peters, Vinod Vaikuntanathan
2024/226 (PDF ) Attribute-based Keyed (Fully) Homomorphic Encryption Keita Emura, Shingo Sato, Atsushi Takayasu
2024/225 (PDF ) Universal Computational Extractors and Multi-Bit AIPO from Lattice Assumptions Yilei Chen, Xinyu Mao
2024/224 (PDF ) Amplification of Non-Interactive Zero Knowledge, Revisited Nir Bitansky, Nathan Geier
2024/223 (PDF ) Game-Theoretically Fair Distributed Sampling Sri AravindaKrishnan Thyagarajan, Ke Wu, Pratik Soni
2024/222 (PDF ) Reducing the Number of Qubits in Quantum Factoring Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher
2024/221 (PDF ) Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics Dimitris Mouris, Christopher Patton, Hannah Davis, Pratik Sarkar, Nektarios Georgios Tsoutsos
2024/220 (PDF ) Security of Symmetric Ratchets and Key Chains - Implications for Protocols like TLS 1.3, Signal, and PQ3 John Preuß Mattsson
2024/219 (PDF ) Singular points of UOV and VOX Pierre Pébereau
2024/218 (PDF ) Lightweight Leakage-Resilient PRNG from TBCs using Superposition Mustafa Khairallah, Srinivasan Yadhunathan, Shivam Bhasin
2024/217 (PDF ) Hardware Acceleration of the Prime-Factor and Rader NTT for BGV Fully Homomorphic Encryption David Du Pont, Jonas Bertels, Furkan Turan, Michiel Van Beirendonck, Ingrid Verbauwhede
2024/216 (PDF ) Rate-1 Fully Local Somewhere Extractable Hashing from DDH Pedro Branco, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto
2024/215 (PDF ) Batch PIR and Labeled PSI with Oblivious Ciphertext Compression Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo
2024/214 (PDF ) Distributed Fiat-Shamir Transform: from Threshold Identification Protocols to Signatures Michele Battagliola, Andrea Flamini
2024/213 (PDF ) A Note on Adversarial Online Complexity in Security Proofs of Duplex-Based Authenticated Encryption Modes Charlotte Lefevre
2024/212 (PDF ) Analysis of a Programmable Quantum Annealer as a Random Number Generator Elijah Pelofske
2024/211 (PDF ) INSPECT: Investigating Supply Chain and Cyber-Physical Security of Battery Systems Tao Zhang, Shang Shi, Md Habibur Rahman, Nitin Varshney, Akshay Kulkarni, Farimah Farahmandi, Mark Tehranipoor
2024/210 (PDF ) Rollerblade: Replicated Distributed Protocol Emulation on Top of Ledgers Dionysis Zindros, Apostolos Tzinas, David Tse
2024/209 (PDF ) General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption Konstantinos Brazitikos, Vassilis Zikas
2024/207 (PDF ) NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness Prabhanjan Ananth, Gilad Asharov, Vipul Goyal, Hadar Kaner, Pratik Soni, Brent Waters
2024/206 (PDF ) Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead Yizhong Liu, Andi Liu, Yuan Lu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Song Bian, Mauro Conti
2024/204 (PDF ) PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation Zeyu Liu, Eran Tromer, Yunhao Wang
2024/203 (PDF ) Application-Aware Approximate Homomorphic Encryption: Configuring FHE for Practical Use Andreea Alexandru, Ahmad Al Badawi, Daniele Micciancio, Yuriy Polyakov
2024/202 (PDF ) Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability Mark Manulis, Jérôme Nguyen
2024/201 (PDF ) Breaking the decisional Diffie-Hellman problem in totally non-maximal imaginary quadratic orders Antonio Sanso
2024/200 (PDF ) A Better Proof-of-Work Fork Choice Rule Dionysis Zindros, Apostolos Tzinas, Karl Kreder, Shreekara Shastry, Sriram Vishwanath
2024/199 (PDF ) Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul
2024/198 (PDF ) Distributed Randomness using Weighted VUFs Sourav Das, Benny Pinkas, Alin Tomescu, Zhuolun Xiang
2024/197 (PDF ) Alba: The Dawn of Scalable Bridges for Blockchains Giulia Scaffino, Lukas Aumayr, Mahsa Bastankhah, Zeta Avarikioti, Matteo Maffei
2024/196 (PDF ) Subfield attack: leveraging composite-degree extensions in the Quotient Ring transform Pierre Pébereau
2024/195 (PDF ) PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs Décio Luiz Gazzoni Filho, Guilherme Brandão, Gora Adj, Arwa Alblooshi, Isaac A. Canales-Martínez, Jorge Chávez-Saab, Julio López
2024/194 (PDF ) Helium: Scalable MPC among Lightweight Participants and under Churn Christian Mouchet, Sylvain Chatel, Apostolos Pyrgelis, Carmela Troncoso
2024/192 (PDF ) Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism Elette Boyle, Lisa Kohl, Zhe Li, Peter Scholl
2024/191 (PDF ) A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions Steven Galbraith, Yi-Fu Lai, Hart Montgomery
2024/190 (PDF ) Constructing Committing and Leakage-Resilient Authenticated Encryption Patrick Struck, Maximiliane Weishäupl
2024/189 (PDF ) ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution Haoqian Zhang, Michelle Yeo, Vero Estrada-Galinanes, Bryan Ford
2024/188 (PDF ) HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted Yanxue Jia, Varun Madathil, Aniket Kate
2024/187 (PDF ) On the bijectivity of the map $\chi$ Anna-Maurin Graner, Björn Kriepke, Lucas Krompholz, Gohar M. Kyureghyan
2024/186 (PDF ) RAD-FS: Remote Timing and Power SCA Security in DVFS-Augmented Ultra-Low-Power Embedded Systems Daniel Dobkin, Nimrod Cever, Itamar Levi
2024/185 (PDF ) Vortex: A List Polynomial Commitment and its Application to Arguments of Knowledge Alexandre Belling, Azam Soleimanian, Bogdan Ursu
2024/184 (PDF ) Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions Rafael del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani Saarinen
2024/183 (PDF ) On Security Proofs of Existing Equivalence Class Signature Schemes Balthazar Bauer, Georg Fuchsbauer, Fabian Regen
2024/182 (PDF ) FileDES: A Secure, Scalable and Succinct Decentralized Encrypted Storage Network Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng, Dongxiao Yu, Qin Hu, Yijun Li, Yipu Wu
2024/181 (PDF ) Functional Bootstrapping for Packed Ciphertexts via Homomorphic LUT Evaluation Dongwon Lee, Seonhong Min, Yongsoo Song
2024/180 (PDF ) Exploiting RPMB authentication in a closed source TEE implementation Aya Fukami, Richard Buurke, Zeno Geradts
2024/179 (PDF ) Traitor Tracing without Trusted Authority from Registered Functional Encryption Pedro Branco, Russell W. F. Lai, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Ivy K. Y. Woo
2024/178 (PDF ) Fast Public-Key Silent OT and More from Constrained Naor-Reingold Dung Bui, Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia
2024/177 (PDF ) Registered Functional Encryption for Quadratic Functions from MDDH Qiaohan Chu, Li Lin, Chen Qian, Jie Chen
2024/176 (PDF ) The impact of data-heavy, post-quantum TLS 1.3 on the Time-To-Last-Byte of real-world connections Panos Kampanakis, Will Childs-Klein
2024/175 (PDF ) Lossy Cryptography from Code-Based Assumptions Quang Dao, Aayush Jain
2024/174 (PDF ) QPP and HPPK: Unifying Non-Commutativity for Quantum-Secure Cryptography with Galois Permutation Group Randy Kuang
2024/173 (PDF ) Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions Helger Lipmaa, Roberto Parisella, Janno Siim
2024/172 (PDF ) Relaxed Functional Bootstrapping: A New Perspective on BGV and BFV Bootstrapping Zeyu Liu, Yunhao Wang
2024/171 (PDF ) Approximate Methods for the Computation of Step Functions in Homomorphic Encryption Tairong Huang, Shihe Ma, Anyu Wang, XiaoYun Wang
2024/170 (PDF ) Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis Trevor Yap Hong Eng, Shivam Bhasin, Léo Weissbart
2024/169 (PDF ) Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Anupam Chattopadhyay
2024/168 (PDF ) Dragon: Decentralization at the cost of Representation after Arbitrary Grouping and Its Applications to Sub-cubic DKG and Interactive Consistency Hanwen Feng, Zhenliang Lu, Qiang Tang
2024/167 (PDF ) Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack Trevor Yap, Dirmanto Jap
2024/166 (PDF ) A Practical MinRank Attack Against VOX Hao Guo, Jintai Ding
2024/165 (PDF ) Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation Brent Waters, David J. Wu
2024/164 (PDF ) Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang
2024/163 (PDF ) On Tweakable Correlation Robust Hashing against Key Leakages Chun Guo, Xiao Wang, Kang Yang, Yu Yu
2024/162 (PDF ) Zero-Knowledge Proofs of Training for Deep Neural Networks Kasra Abbaszadeh, Christodoulos Pappas, Jonathan Katz, Dimitrios Papadopoulos
2024/161 (PDF ) zkMatrix: Batched Short Proof for Committed Matrix Multiplication Mingshu Cong, Tsz Hon Yuen, Siu Ming Yiu
2024/160 (PDF ) LightDAG: A Low-latency DAG-based BFT Consensus through Lightweight Broadcast Xiaohai Dai, Guanxiong Wang, Jiang Xiao, Zhengxuan Guo, Rui Hao, Xia Xie, Hai Jin
2024/159 (PDF ) Logstar: Efficient Linear* Time Secure Merge Suvradip Chakraborty, Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal
2024/158 (PDF ) HiSE: Hierarchical (Threshold) Symmetric-key Encryption Pousali Dey, Pratyay Mukherjee, Swagata Sasmal, Rohit Sinha
2024/157 (PDF ) Delphi: sharing assessments of cryptographic assumptions Jeroen van de Graaf, Arjen K. Lenstra
2024/156 (PDF ) Homomorphic sign evaluation with a RNS representation of integers Philippe Chartier, Michel Koskas, Mohammed Lemou, Florian Méhats
2024/155 (PDF ) Fully Homomorphic Encryption on large integers Philippe Chartier, Michel Koskas, Mohammed Lemou, Florian Méhats
2024/154 (PDF ) Broadcast Encryption using Sum-Product decomposition of Boolean functions Aurélien Dupin, Simon Abelard
2024/153 (PDF ) Revisiting the Slot-to-Coefficient Transformation for BGV and BFV Robin Geelen
2024/152 (PDF ) Equivalence of Generalised Feistel Networks Patrick Derbez, Marie Euler
2024/151 (PDF ) Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing Antonio Flórez-Gutiérrez, Yosuke Todo
2024/150 (PDF ) SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, Francois Charton, Kristin Lauter
2024/149 (PDF ) Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang
2024/148 (PDF ) Preliminary Cryptanalysis of the Biscuit Signature Scheme Charles Bouillaguet, Julia Sauvage
2024/147 (PDF ) Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks Thorben Moos, Sayandeep Saha, François-Xavier Standaert
2024/146 (PDF ) Computing Orientations from the Endomorphism Ring of Supersingular Curves and Applications Jonathan Komada Eriksen, Antonin Leroux
2024/145 (PDF ) Practical Batch Proofs of Exponentiation Charlotte Hoffmann, Pavel Hubáček, Svetlana Ivanova
2024/144 (PDF ) Efficient (3,3)-isogenies on fast Kummer surfaces Maria Corte-Real Santos, Craig Costello, Benjamin Smith
2024/143 (PDF ) Scalable Collaborative zk-SNARK: Fully Distributed Proof Generation and Malicious Security Xuanming Liu, Zhelei Zhou, Yinghao Wang, Bingsheng Zhang, Xiaohu Yang
2024/142 (PDF ) GradedDAG: An Asynchronous DAG-based BFT Consensus with Lower Latency Xiaohai Dai, Zhaonan Zhang, Jiang Xiao, Jingtao Yue, Xia Xie, Hai Jin
2024/141 (PDF ) Secure Statistical Analysis on Multiple Datasets: Join and Group-By Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Junichi Tomida
2024/140 (PDF ) Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps Binbin Tu, Min Zhang, Yu Chen
2024/139 (PDF ) Efficient Arithmetic in Garbled Circuits David Heath
2024/138 (PDF ) Correction Fault Attacks on Randomized CRYSTALS-Dilithium Elisabeth Krahmer, Peter Pessl, Georg Land, Tim Güneysu
2024/137 (PDF ) Consensus in the Known Participation Model with Byzantine Failures and Sleepy Replicas Chenxu Wang, Sisi Duan, Minghui Xu, Feng Li, Xiuzhen Cheng
2024/136 (PDF ) Secure Transformer Inference Made Non-interactive Jiawen Zhang, Xinpeng Yang, Lipeng He, Kejia Chen, Wen-jie Lu, Yinghao Wang, Xiaoyang Hou, Jian Liu, Kui Ren, Xiaohu Yang
2024/135 (PDF ) A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks Kexin Qiao, Zhaoyang Wang, Heng Chang, Siwei Sun, Zehan Wu, Junjie Cheng, Changhai Ou, An Wang, Liehuang Zhu
2024/134 (PDF ) Byzantine Fault Tolerance with Non-Determinism, Revisited Yue Huang, Huizhong Li, Yi Sun, Sisi Duan
2024/133 (PDF ) Optimizing Implementations of Boolean Functions Meltem Sonmez Turan
2024/132 (PDF ) SimpleFT: A Simple Byzantine Fault Tolerant Consensus Rui Hao, Chenglong Yi, Weiqi Dai, Zhaonan Zhang
2024/131 (PDF ) Practical Post-Quantum Signatures for Privacy Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders
2024/130 (PDF ) HADES: Automated Hardware Design Exploration for Cryptographic Primitives Fabian Buschkowski, Georg Land, Niklas Höher, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
2024/129 (PDF ) Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers Gideon Samid
2024/128 (PDF ) Non-Binding (Designated Verifier) Signature Ehsan Ebrahimi
2024/127 (PDF ) Attacks Against the INDCPA-D Security of Exact FHE Schemes Jung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, Elias Suvanto
2024/126 (PDF ) Monte Carlo Tree Search for automatic differential characteristics search: application to SPECK Emanuele Bellini, David Gerault, Matteo Protopapa, Matteo Rossi
2024/124 (PDF ) Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks Akira Ito, Rei Ueno, Naofumi Homma
2024/123 (PDF ) Memory Checking Requires Logarithmic Overhead Elette Boyle, Ilan Komargodski, Neekon Vafa
2024/122 (PDF ) SPRITE: Secure and Private Routing in Payment Channel Networks Gaurav Panwar, Roopa Vishwanathan, George Torres, Satyajayant Misra
2024/121 (PDF ) An acceleration of the AKS prime identification algorithm Stephen Meredith Williams
2024/120 (PDF ) K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay
2024/119 (PDF ) R3PO: Reach-Restricted Reactive Program Obfuscation and its Application to MA-ABE Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran, Rajeev Raghunath
2024/118 (PDF ) Data Privacy Made Easy: Enhancing Applications with Homomorphic Encryption Charles Gouert, Nektarios Georgios Tsoutsos
2024/117 (PDF ) Breaking HWQCS: a code-based signature scheme from high weight QC-LDPC codes Alex Pellegrini, Giovanni Tognolini
2024/116 (PDF ) On the practical CPAD security of “exact” and threshold FHE schemes and libraries Marina Checri, Renaud Sirdey, Aymen Boudguiga, Jean-Paul Bultel
2024/115 (PDF ) Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$ Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang
2024/114 (PDF ) X2X: Low-Randomness and High-Throughput A2B and B2A Conversions for $d+1$ shares in Hardware Quinten Norga, Jan-Pieter D'Anvers, Suparna Kundu, Ingrid Verbauwhede
2024/113 (PDF ) Improved Linear Key Recovery Attacks on PRESENT Wenhui Wu, Muzhou Li, Meiqin Wang
2024/112 (PDF ) pqm4: Benchmarking NIST Additional Post-Quantum Signature Schemes on Microcontrollers Matthias J. Kannwischer, Markus Krausz, Richard Petri, Shang-Yi Yang
2024/111 (PDF ) A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation Yong Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao, Zehua Qiao, Huaxin Wang
2024/110 (PDF ) Cryptanalysis of the SNOVA signature scheme Peigen Li, Jintai Ding
2024/109 (PDF ) Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS Jaehyung Kim, Jinyeong Seo, Yongsoo Song
2024/108 (PDF ) Some Improvements for the PIOP for ZeroCheck Angus Gruen
2024/107 (PDF ) ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, Antonio Marcedone
2024/106 (PDF ) A Trust-based Recommender System over Arbitrarily Partitioned Data with Privacy Ibrahim Yakut, Huseyin Polat
2024/105 (PDF ) Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gerault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti
2024/104 (PDF ) AnonPSI: An Anonymity Assessment Framework for PSI Bo Jiang, Jian Du, Qiang Yan
2024/103 (PDF ) ChaCha related 64 bit oriented ARX cipher Daniel Nager
2024/102 (PDF ) Laconic Branching Programs from the Diffie-Hellman Assumption Sanjam Garg, Mohammad Hajiabadi, Peihan Miao, Alice Murphy
2024/101 (PDF ) Unconditional Security using (Random) Anonymous Bulletin Board Albert Yu, Hai H. Nguyen, Aniket Kate, Hemanta K. Maji
2024/100 (PDF ) Fuzzy Extractors are Practical: Cryptographic Strength Key Derivation from the Iris Amey Shukla, Luke Demarest, Benjamin Fuller, Sohaib Ahmad, Caleb Manicke, Alexander Russell, Sixia Chen
2024/099 (PDF ) Snarktor: A Decentralized Protocol for Scaling SNARKs Verification in Blockchains Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov
2024/098 (PDF ) Theoretical differential fault attacks on FLIP and FiLIP Pierrick Méaux, Dibyendu Roy
2024/097 (PDF ) Faster VOLEitH Signatures from All-but-One Vector Commitment and Half-Tree Dung Bui, Kelong Cong, Cyprien Delpech de Saint Guilhem
2024/096 (PDF ) Revisiting the security analysis of SNOVA Yasuhiko Ikematsu, Rika Akiyama
2024/095 (PDF ) ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin
2024/094 (PDF ) Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade
2024/093 (PDF ) Short Code-based One-out-of-Many Proofs and Applications Xindong Liu, Li-Ping Wang
2024/092 (PDF ) Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries Sofía Celi, Alex Davidson
2024/091 (PDF ) On historical Multivariate Cryptosystems and their restorations as instruments of Post-Quantum Cryptography Vasyl Ustimenko
2024/090 (PDF ) Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller
2024/089 (PDF ) Two-party GOST in two parts: fruitless search and fruitful synthesis Liliya Akhmetzyanova, Evgeny Alekseev, Alexandra Babueva, Lidiia Nikiforova, Stanislav Smyshlyaev
2024/088 (PDF ) Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices Slim Bettaieb, Loïc Bidoux, Alessandro Budroni, Marco Palumbi, Lucas Pandolfo Perin
2024/087 (PDF ) Tree-based Lookup Table on Batched Encrypted Queries using Homomorphic Encryption Jung Hee Cheon, Hyeongmin Choe, Jai Hyun Park
2024/086 (PDF ) On Hilbert-Poincaré series of affine semi-regular polynomial sequences and related Gröbner bases Momonari Kudo, Kazuhiro Yokoyama
2024/085 (PDF ) Simultaneously simple universal and indifferentiable hashing to elliptic curves Dimitri Koshelev
2024/084 (PDF ) Efficient Instances of Docked Double Decker With AES, and Application to Authenticated Encryption Christoph Dobraunig, Krystian Matusiewicz, Bart Mennink, Alexander Tereschenko
2024/083 (PDF ) Layout Graphs, Random Walks and the t-wise Independence of SPN Block Ciphers Tianren Liu, Angelos Pelecanos, Stefano Tessaro, Vinod Vaikuntanathan
2024/082 (PDF ) Quantum State Obfuscation from Classical Oracles James Bartusek, Zvika Brakerski, Vinod Vaikuntanathan
2024/081 (PDF ) SuperFL: Privacy-Preserving Federated Learning with Efficiency and Robustness Yulin Zhao, Hualin Zhou, Zhiguo Wan
2024/080 (PDF ) Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions Samuel Jaques
2024/078 (PDF ) Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process Pedram Hosseyni, Ralf Kuesters, Tim Würtele
2024/077 (PDF ) OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko
2024/076 (PDF ) A provably masked implementation of BIKE Key Encapsulation Mechanism Loïc Demange, Mélissa Rossi
2024/075 (PDF ) Succinct Verification of Compressed Sigma Protocols in the Updatable SRS setting Moumita Dutta, Chaya Ganesh, Neha Jawalkar
2024/074 (PDF ) PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers Beyza Bozdemir, Betül Aşkın Özdemir, Melek Önen
2024/073 (PDF ) A Comparative Examination of Network and Contract-Based Blockchain Storage Solutions for Decentralized Applications Lipeng He
2024/072 (PDF ) 1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji
2024/071 (PDF ) Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis Seyedmohammad Nouraniboosjin, Fatemeh Ganji
2024/070 (PDF ) Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng
2024/069 (PDF ) SDitH in Hardware Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue
2024/068 (PDF ) Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation Fangqi Dong, Zihan Hao, Ethan Mook, Daniel Wichs
2024/067 (PDF ) A Refined Hardness Estimation of LWE in Two-step Mode Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang
2024/066 (PDF ) Exploiting the Central Reduction in Lattice-Based Cryptography Tolun Tosun, Amir Moradi, Erkay Savas
2024/065 (PDF ) Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation Marie Beth van Egmond, Vincent Dunning, Stefan van den Berg, Thomas Rooijakkers, Alex Sangers, Ton Poppe, Jan Veldsink
2024/064 (PDF ) Extreme Algebraic Attacks Pierrick Méaux, Qingju Wang
2024/061 (PDF ) Partial Key Exposure Attack on Common Prime RSA Mengce Zheng
2024/060 (PDF ) The Insecurity of Masked Comparisons: SCAs on ML-KEM’s FO-Transform Julius Hermelink, Kai-Chun Ning, Richard Petri, Emanuele Strieder
2024/059 (PDF ) CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors Oren Ganon, Itamar Levi
2024/058 (PDF ) Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions Sacha Servan-Schreiber
2024/057 (PDF ) Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou
2024/056 (PDF ) Zero-Knowledge Proofs for SIDH variants with Masked Degree or Torsion Youcef Mokrani, David Jao
2024/055 (PDF ) Multi-Hop Fine-Grained Proxy Re-Encryption Yunxiao Zhou, Shengli Liu, Shuai Han
2024/054 (PDF ) FEASE: Fast and Expressive Asymmetric Searchable Encryption Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu
2024/053 (PDF ) Anonymous Homomorphic IBE with Application to Anonymous Aggregation Michael Clear, Ciaran McGoldrick, Hitesh Tewari
2024/052 (PDF ) Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash SAHIBA SURYAWANSHI, Shibam Ghosh, Dhiman Saha, Prathamesh Ram
2024/051 (PDF ) Limits on Authenticated Encryption Use in TLS Atul Luykx, Kenneth G. Paterson
2024/050 (PDF ) Do You Need a Zero Knowledge Proof? Jens Ernstberger, Stefanos Chaliasos, Liyi Zhou, Philipp Jovanovic, Arthur Gervais
2024/049 (PDF ) CL-SCA: A Contrastive Learning Approach for Profiled Side-Channel Analysis Annv Liu, An Wang, Shaofei Sun, Congming Wei, Yaoling Ding, Yongjuan Wang, Liehuang Zhu
2024/048 (PDF ) Computational Differential Privacy for Encrypted Databases Supporting Linear Queries Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, Duong Hieu Phan
2024/047 (PDF ) On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy, Stefano Trevisani
2024/046 (PDF ) Quantum-Secure Hybrid Communication for Aviation Infrastructure Benjamin Dowling, Bhagya Wimalasiri
2024/045 (PDF ) A Low-Latency High-Order Arithmetic to Boolean Masking Conversion Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, Leibo Liu
2024/044 (PDF ) Adaptive Distributional Security for Garbling Schemes with $\mathcal{O}(|x|)$ Online Complexity Estuardo Alpírez Bock, Chris Brzuska, Pihla Karanko, Sabine Oechsner, Kirthivaasan Puniamurthy
2024/043 (PDF ) Fuzzy Identity Based Encryption with a flexible threshold value Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar
2024/042 (PDF ) Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions Jan Bobolz, Jesus Diaz, Markulf Kohlweiss
2024/041 (PDF ) SASTA: Single-Fault Nonce Respecting Differential Attack on Hybrid Homomorphic Encryption Aikata Aikata, Ahaan Dabholkar, Dhiman Saha, Sujoy Sinha Roy
2024/040 (PDF ) ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, Kaiyi Zhang
2024/039 (PDF ) X-Wing: The Hybrid KEM You’ve Been Looking For Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karolin Varner, Bas Westerbaan
2024/038 (PDF ) On Computing the Multidimensional Scalar Multiplication on Elliptic Curves Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, Leila Ben Abdelghani
2024/037 (PDF ) Computing $2$-isogenies between Kummer lines Damien Robert, Nicolas Sarkis
2024/036 (PDF ) Blink: Breaking Lattice-Based Schemes Implemented in Parallel with Chosen-Ciphertext Attack Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li
2024/035 (PDF ) A New Approach to Efficient and Secure Fixed-point Computation Tore Kasper Frederiksen, Jonas Lindstrøm, Mikkel Wienberg Madsen, Anne Dorte Spangsberg
2024/034 (PDF ) How (not) to hash into class groups of imaginary quadratic fields? István András Seres, Péter Burcsi, Péter Kutas
2024/033 (PDF ) Security analysis and improvements on a semi-quantum electronic voting protocol Qiu Shujing, Xin Xiangjun, Zheng Qian, Li Chaoyang, Li Fagen
2024/032 (PDF ) Verifiable FHE via Lattice-based SNARKs Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, Jannik Spiessens
2024/031 (PDF ) Feldman's Verifiable Secret Sharing for a Dishonest Majority Yi-Hsiu Chen, Yehuda Lindell
2024/030 (PDF ) Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs Thomas Debris-Alazard, Pouria Fallahpour, Damien Stehlé
2024/029 (PDF ) YouChoose: A Lightweight Anonymous Proof of Account Ownership Aarav Varshney, Prashant Agrawal, Mahabir Prasad Jhanwar
2024/028 (PDF ) Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis Hoeteck Wee, David J. Wu
2024/027 (PDF ) Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang
2024/026 (PDF ) Towards Compact Identity-based Encryption on Ideal Lattices Huiwen Jia, Yupu Hu, Chunming Tang, Lin Wang
2024/025 (PDF ) Bitcoin Clique: Channel-free Off-chain Payments using Two-Shot Adaptor Signatures Siavash Riahi, Orfeas Stefanos Thyfronitis Litos
2024/024 (PDF ) FlexHi: A Flexible Hierarchical Threshold Signature Scheme Muhammed Ali Bingol, Sermin Kocaman, Ali Dogan, Sibel Kurt Toplu
2024/023 (PDF ) CCA Security with Short AEAD Tags Mustafa Khairallah
2024/022 (PDF ) Fully Dynamic Attribute-Based Signatures for Circuits from Codes San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu
2024/021 (PDF ) Designing homomorphic encryptions with rational functions Gerald Gavin, Sandrine Tainturier
2024/020 (PDF ) EROR: Efficient Repliable Onion Routing with Strong Provable Privacy Michael Klooß, Andy Rupp, Daniel Schadt, Thorsten Strufe, Christiane Weis
2024/019 (PDF ) Benchmark Performance of Homomorphic Polynomial Public Key Cryptography for Key Encapsulation and Digital Signature Schemes Randy Kuang, Maria Perepechaenko, Dafu Lou, Brinda Tank
2024/018 (PDF ) Smaller Sphincs$^{+}$ Scott Fluhrer, Quynh Dang
2024/017 (PDF ) PT-symmetric mapping of three states and its implementation on a cloud quantum processor Yaroslav Balytskyi, Yevgen Kotukh, Gennady Khalimov, Sang-Yoon Chang
2024/016 (PDF ) Reducing the computational complexity of fuzzy identity-based encryption from lattice Sedigheh Khajouei-Nejad, Hamid Haj Seyyed Javadi, Sam Jabbehdari, Seyed Mohammad Hossein Moattar
2024/015 (PDF ) Unconditionally secure MPC for Boolean circuits with constant online communication Zhenkai Hu, Kang Yang, Yu Yu
2024/014 (PDF ) A Lattice-based Accountable Subgroup Multi-signature Scheme with Verifiable Group Setup Ahmet Ramazan Ağırtaş, Oğuz YAYLA
2024/013 (PDF ) A note on ``intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era'' Zhengjun Cao, Lihua Liu
2024/012 (PDF ) Two-Round ID-PAKE with strong PFS and single pairing operation Behnam Zahednejad, Gao Chong-zhi
2024/011 (PDF ) MetaDORAM: Info-Theoretic Distributed ORAM with Less Communication Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2024/010 (PDF ) On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs Sulaiman Alhussaini, Craig Collett, Serge˘ı Sergeev
2024/009 (PDF ) Information-Theoretically Secure Distributed Protocols for Two-Party MPC Primitives Tamir Tassa, Aviad Ben Arie
2024/008 (PDF ) SoK: Methods for Sampling Random Permutations in Post-Quantum Cryptography Alessandro Budroni, Isaac A. Canales-Martínez, Lucas Pandolfo Perin
2024/007 (PDF ) Password Protected Universal Thresholdizer Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, Willy Susilo
2024/006 (PDF ) Towards general-purpose program obfuscation via local mixing Ran Canetti, Claudio Chamon, Eduardo Mucciolo, Andrei Ruckenstein
2024/005 (PDF ) The Multiple Millionaires' Problem: New Algorithmic Approaches and Protocols Tamir Tassa, Avishay Yanai
2024/004 (PDF ) Practical Two-party Computational Differential Privacy with Active Security Fredrik Meisingseth, Christian Rechberger, Fabian Schmid
2024/003 (PDF ) Simple Soundness Proofs Alex Kampa
2024/002 (PDF ) Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López
2024/001 (PDF ) On short digital signatures with Eulerian transformations Vasyl Ustimenko
[ Cryptology ePrint archive ]