Cryptology ePrint Archive: Listing for 2025
Regex
2025/2340 (PDF ) OOPS: One-time Oblivious Polynomial Signatures Kobi Gurkan, Philipp Jovanovic, Andrija Novakovic
2025/2339 (PDF ) SoK: Approximate Agreement Diana Ghinea, Chen-Da Liu-Zhang
2025/2338 (PDF ) OHMG: One hot modular garbling Ariel Futoransky, Fadi Barbàra, Ramses Fernandez, Gabriel Larotonda
2025/2337 (PDF ) ML-DSA-OSH: An Efficient, Open-Source Hardware Implementation of ML-DSA Quinten Norga, Suparna Kundu, Ingrid Verbauwhede
2025/2336 (PDF ) Compact Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors Jingjing Fan, Xingye Lu, Man Ho Au, Siu Ming Yiu
2025/2335 (PDF ) d/v-CLSAG: Extension for Concise Linkable Spontaneous Anonymous Group Signatures sowle
2025/2334 (PDF ) Moving a Step of ChaCha in Syncopated Rhythm (Extended Version) Shichang Wang, Meicheng Liu, Shiqi Hou, Chengan Hou, Dongdai Lin
2025/2333 (PDF ) Analysis of Diffusion Properties in Generalized Feistel Ciphers under Multidimensional Linear Cryptanalysis Betül Askin Özdemir, Vincent Rijmen
2025/2332 (PDF ) DNS-Anchored zk-SNARK Proofs: A Stateless Alternative to ACME Challenge-Response for Domain Control Validation Abhinav Vishnu
2025/2331 (PDF ) SUMSIG: Compact Code-Based Signatures from Sum-Check Protocols Debrup Chatterjee
2025/2330 (PDF ) Verifiable Aggregate Receipts with Applications to User Engagement Auditing Ioannis Kaklamanis, Wenhao Wang, Harjasleen Malvai, Fan Zhang
2025/2329 (PDF ) A note on ``a fully dynamic multi-secret sharing scheme with redundant authorization'' Zhengjun Cao, Lihua Liu
2025/2328 (PDF ) SNARGs for NP via Fiat–Shamir in the Plain Model Ziyi Guan, Eylon Yogev
2025/2327 (PDF ) Transparent and Post-Quantum Distributed SNARK with Linear Prover Time Zesheng Li, Xinxuan Zhang, Yi Deng
2025/2326 (PDF ) Efficiently Provable Approximations for Non-Polynomial Functions Sriram Sridhar, Shravan Srinivasan, Dimitrios Papadopoulos, Charalampos Papamanthou
2025/2325 (PDF ) Pseudorandom Correlation Functions for Garbled Circuits Geoffroy Couteau, Srinivas Devadas, Alexander Koch, Sacha Servan-Schreiber
2025/2324 (PDF ) SHAFT: Secure, Handy, Accurate, and Fast Transformer Inference Andes Y. L. Kei, Sherman S. M. Chow
2025/2323 (PDF ) An Improved Method for Predicting Truncated Fibonacci LFSRs over Integer Residue Rings Han-Bing Yu, Qun-Xiong Zheng, Wen-Feng Qi
2025/2322 (PDF ) Distributed Symmetric Key Establishment with Forward Secrecy for Implantable Medical Devices Roozbeh Sarenche, Sayon Duttagupta, Francesco Milizia, Kevin Bogner, Varesh Mishra
2025/2321 (PDF ) High-Precision Exact FHE Made Simple, General, and Fast Chris Peikert, Doron Zarchy, Guy Zyskind
2025/2320 (PDF ) New Constructions of Multiplicative Secret Sharing Schemes Chunming Tang, Haonan Fu, Zheng Chen, Hongwei Zhu
2025/2319 (PDF ) One-Time Memories Secure against Depth-Bounded Quantum Circuits Kyosuke Sekii, Takashi Nishide
2025/2318 (PDF ) Hyperion: Private Token Sampling with Homomorphic Encryption Lawrence Lim, Jiaming Liu, Vikas Kalagi, Amr El Abbadi, Divyakant Agrawal
2025/2317 (PDF ) InstantOMR: Oblivious Message Retrieval with Low Latency and Optimal Parallelizability Haofei Liang, Zeyu Liu, Eran Tromer, Xiang Xie, Yu Yu
2025/2316 (PDF ) Making Sense of Private Advertising: A Principled Approach to a Complex Ecosystem Kyle Hogan, Alishah Chator, Gabriel Kaptchuk, Mayank Varia, Srinivas Devadas
2025/2315 (PDF ) Conditionally Input-Revealing 2PC and Fuzzy Password-Authenticated Key Exchange David Richardson, Mike Rosulek, Jiayu Xu
2025/2314 (PDF ) Registered Attribute-Based Encryption with Publicly Verifiable Certified Deletion, Everlasting Security, and More Shayeef Murshid, Ramprasad Sarkar, Mriganka Mandal
2025/2313 (PDF ) Nested YOSO MPC: Near Optimal Resilience Without an MPC Setup Ittai Abraham, Eli Chouatt, Ivan Damgård, Yossi Gilad, Gilad Stern, Sophia Yakoubov
2025/2312 (PDF ) Anamorphic Signatures With Dictator and Recipient Unforgeability for Long Messages Amit Deo, Benoit Libert
2025/2311 (PDF ) Accelerating NTRU-based Bootstrapping with Block Key Distributions Jingwei Feng, Baofeng Wu, Dongdai Lin, Binwu Xiang
2025/2310 (PDF ) RACE: A Rapid ARM Cryptographic Engine for Code-Based Classic McEliece PQC Scheme Wen Wu, Jiankuo Dong, Xuecheng Liu, Shuzhou Sun, Zhenjiang Dong, Jingqiang Lin, Fu Xiao
2025/2309 (PDF ) On the Concrete Practicality of Post-Quantum Multi-Authority Attribute-Based Encryption Hassan Nasiraee
2025/2308 (PDF ) Succinct Garbled Circuits with Low-Depth Garbling Algorithms Hanjun Li, Huijia Lin, George Lu
2025/2307 (PDF ) Computationally Succinct Authentication from DCR: Attribute-Based Laconic Function Evaluation and More Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl
2025/2306 (PDF ) On Delegation of Verifiable Presentations from mdoc and BBS Credentials Andrea Flamini, Andrea Gangemi, Enrico Guglielmino, Vincenzo Orabona
2025/2305 (PDF ) A New Approach to Large Party Beaver-Style MPC with Small Computational Overhead Aayush Jain, Huijia Lin, Nuozhou Sun
2025/2304 (PDF ) Streaming Function Secret Sharing and Its Applications Xiangfu Song, Jianli Bai, Ye Dong, Yijian Liu, Yu Zhang, Xianhui Lu, Tianwei Zhang
2025/2303 (PDF ) Suwako: A Logarithmic-Depth Modular Reduction for Arbitrary Trinomials over $\mathbb{F}_{2^m}$ without Pre-computation Junyu Zhou, Jing Wang, Hao Ren, Si Gao, Xiao Lan
2025/2302 (PDF ) Attacking and Securing Hybrid Homomorphic Encryption Against Power Analysis Aikata Aikata, Maciej Czuprynko, Nedžma Musovic, Emira Salkić, Sujoy Sinha Roy
2025/2301 (PDF ) High-Performance SIMD Software for Spielman Codes in Zero-Knowledge Proofs Florian Krieger, Christian Dobrouschek, Florian Hirner, Sujoy Sinha Roy
2025/2300 (PDF ) Gravity of the Situation:Security Analysis on Rocket.Chat E2EE Hayato Kimura, Ryoma Ito, Kazuhiko Minematsu, Takanori Isobe
2025/2299 (PDF ) Far-Field $Singing$ FPGAs: Repurposing Routing Fabrics into 100 m Covert Radiators Udi Alush, Roey Amitay, Erez Danieli, Itamar Levi
2025/2298 (PDF ) ALKAID: Accelerating Three-Party Boolean Circuits by Mixing Correlations and Redundancy Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Wen-jie Lu, Tianwei Zhang, Jianying Zhou, Jin-Song Dong
2025/2297 (PDF ) Yoyo tricks with a BEANIE Xavier Bonnetain, Sébastien Duval, Virginie Lallemand, Thierno Mamoudou Sabaly, Thomas Sagot, Thibault Sanvoisin
2025/2296 (PDF ) SoK: Verifiable Federated Learning Francesco Bruschi, Marco Esposito, Tommaso Gagliardoni, Andrea Rizzini
2025/2295 (PDF ) An Ideal Linear Secret Sharing Scheme for Complete $t$-Partite $k$-Uniform Hypergraph Access Structures Chunming Tang, Zheng Chen, Haonan Fu, Hongwei Zhu
2025/2294 (PDF ) Fully Distributed Multi-Point Functions for PCGs and Beyond Amit Agarwal, Srinivasan Raghuraman, Peter Rindal
2025/2293 (PDF ) LAKE: Lattice-Code Accelerated Kyber Encapsulation Hassan Nasiraee
2025/2292 (PDF ) FRIVail: A Data Availability Scheme based on FRI Binius Rachit Anand Srivastava
2025/2291 (PDF ) Key Recovery Attacks on ZIP Ciphers: Application to ZIP-AES and ZIP-GIFT Marcel Nageler, Debasmita Chakraborty, Simon Scherer, Maria Eichlseder
2025/2290 (PDF ) Towards Practical Multi-Party Hash Chains using Arithmetization-Oriented Primitives - With Applications to Threshold Hash-Based Signatures Alexandre Adomnicăi
2025/2289 (PDF ) Fourier Sparsity of Delta Functions and Matching Vector PIRs Fatemeh Ghasemi, Swastik Kopparty
2025/2288 (PDF ) Achieving CPAD security for BFV: a pragmatic approach Jean-Paul Bultel, Marina Checri, Caroline Fontaine, Marc Renard, Renaud Sirdey, Oana Stan
2025/2287 (PDF ) MIOPE: A Modular framework for Input and Output Privacy in Ensemble inference Kyrian Maat, Gareth T. Davies, Zoltán Ádám Mann, Joppe W. Bos, Francesco Regazzoni
2025/2286 (PDF ) Improving the Efficiency of zkSNARKs for Ballot Validity Felix Röhr, Nicolas Huber, Ralf Küsters
2025/2285 (PDF ) Laminate: Succinct SIMD-Friendly Verifiable FHE Kabir Peshawaria, Zeyu Liu, Ben Fisch, Eran Tromer
2025/2284 (PDF ) Meta-PBS: Compact High-Precision Programmable Bootstrapping Shihe Ma, Tairong Huang, Anyu Wang, Changtong Xu, Tao Wei, Xiaoyun Wang
2025/2283 (PDF ) Cryptanalysis of Pseudorandom Error-Correcting Codes Tianrui Wang, Anyu Wang, Tianshuo Cong, Delong Ran, Jinyuan Liu, Xiaoyun Wang
2025/2282 (PDF ) When Simple Permutations Mix Poorly: Limited Independence Does Not Imply Pseudorandomness Jesko Dujmovic, Angelos Pelecanos, Stefano Tessaro
2025/2281 (PDF ) UFOs: An Ultra-fast Toolkit for Multiparty Computation of Small Elements Jiacheng Gao, Moyang Xie, Yuan Zhang, Sheng Zhong
2025/2280 (PDF ) Security Models and Cryptographic Protocols in a Quantum World Céline Chevalier, Paul Hermouet, Quoc-Huy Vu
2025/2279 (PDF ) On the representation of self-orthogonal codes and applications to cryptography Marco Baldi, Rahmi El Mechri, Paolo Santini, Riccardo Schiavoni
2025/2278 (PDF ) Secure Distributed State Management for Stateful Signatures with a Practical and Universally Composable Protocol Johannes Blömer, Henrik Bröcher, Volker Krummel, Laurens Porzenheim
2025/2277 (PDF ) Quantum Resource Analysis of Low-Round Keccak/SHA-3 Preimage Attack: From Classical 2^ 57.8 to Quantum 2 ^28.9 using Qiskit Modeling Ramin Rezvani Gilkolaei, Reza Ebrahimi
2025/2276 (PDF ) E2E-AKMA: An End-to-End Secure and Privacy-Enhancing AKMA Protocol Against the Anchor Function Compromise Yueming Li, Long Chen, Qianwen Gao, Zhenfeng Zhang
2025/2275 (PDF ) Random-Access AEAD for Fast Lightweight Online Encryption Andrés Fábrega, Julia Len, Thomas Ristenpart, Gregory Rubin
2025/2274 (PDF ) Post-Quantum Security of the Sum of Even-Mansour YanJin Tan, JunTao Gao, XueLian Li
2025/2273 (PDF ) Benchmarking SLH-DSA: A Comparative Hardware Analysis Against Classical Digital Signatures for Post-Quantum Security Jayalaxmi H, H M Brunda, Sumith Subraya Nayak, Sathya M, Anirudh S Hegde
2025/2272 (PDF ) High Exponents May Not Suffice to Patch AIM (On Attacks, Weak Parameters, and Patches for AIM2) Yimeng Sun, Shiyao Chen, Guowei Liu, Meiqin Wang, Chao Niu
2025/2271 (PDF ) ARION: Attention-Optimized Transformer Inference on Encrypted Data Linhan Yang, Jingwei Chen, Wangchen Dai, Shuai Wang, Wenyuan Wu, Yong Feng
2025/2270 (PDF ) HHGS: Forward-secure Dynamic Group Signatures from Symmetric Primitives Xuelian Cao, Zheng Yang, Daniel Reijsbergen, Jianting Ning, Junming Ke, Zhiqiang Ma, Jianying Zhou
2025/2269 (PDF ) Accelerating FrodoKEM in Hardware Sanjay Deshpande, Patrick Longa, Jakub Szefer
2025/2268 (PDF ) On the Pitfalls of Modeling Individual Knowledge Wojciech Ciszewski, Stefan Dziembowski, Tomasz Lizurej, Marcin Mielniczuk
2025/2267 (PDF ) How to Compare Bandwidth Constrained Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol Benedikt Auerbach, Yevgeniy Dodis, Daniel Jost, Shuichi Katsumata, Rolfe Schmidt
2025/2266 (PDF ) Breaking UOV Encryption: Key Recovery Attack On Olivier Emanuele Cornaggia
2025/2265 (PDF ) PRGUE Schemes: Efficient Updatable Encryption With Robust Security From Symmetric Primitives Elena Andreeva, Andreas Weninger
2025/2264 (PDF ) Leakage-Resilient Multi-Party Computation: Protecting the Evaluator in Circuits Garbling Francesco Berti, Itamar Levi
2025/2263 (PDF ) Completing Policy-based Anonymous Tokens: Private Bits, Public Metadata and more... David Kretzler, Yong Li, Codrin Ogreanu
2025/2262 (PDF ) Certified-Everlasting Quantum NIZK Proofs Nikhil Pappu
2025/2261 (PDF ) TSS-PV: Traceable Secret Sharing with Public Verifiability Duc Anh Luong, Jong Hwan Park, Changmin Lee, Hyoseung Kim
2025/2260 (PDF ) Tight Generic PRF Security of HMAC and NMAC Yaobin Shen, Xiangyang Zhang, Lei Wang, Dawu Gu
2025/2259 (PDF ) HQC Beyond the Standard: Ciphertext Compression and Refined DFR Analysis Sebastian Bitzer, Jean-Christophe Deneuville, Emma Munisamy, Bharath Purtipli, Stefan Ritterhoff, Antonia Wachter-Zeh
2025/2258 (PDF ) On the Equivalence of Polynomial Commitments for an Identical Polynomial under Different Bases Dengji Ma, Jingyu Ke, Sinka Gao, Guoqiang Li
2025/2257 (PDF ) \textsc{Npir}: High-Rate PIR for Databases with Moderate-Size Records Yuliang Lin, Baosheng Wang, Yi Wang, Rongmao Chen
2025/2256 (PDF ) Scalable Private Set Intersection over Distributed Encrypted Data Seunghun Paik, Nirajan Koirala, Jack Nero, Hyunjung Son, Yunki Kim, Jae Hong Seo, Taeho Jung
2025/2255 (PDF ) LPG: Raise Your Location Privacy Game in Direct-to-Cell LEO Satellite Networks Quan Shi, Liying Wang, Prosanta Gope, Qi Liang, Haowen Wang, Qirui Liu, Chenren Xu, Shangguang Wang, Qing Li, Biplab Sikdar
2025/2254 (PDF ) Multi-Party Private Join Anja Lehmann, Christian Mouchet, Andrey Sidorenko
2025/2253 (PDF ) Efficient Privacy-Preserving Blueprints for Threshold Comparison Pratyush Ranjan Tiwari, Harry Eldridge, Matthew Green
2025/2252 (PDF ) Bridging Keyword PIR and Index PIR via MPHF and Batch PIR Huiqiang Liang, Haining Yu, Changtong Xu, Dongyang Zhan, Jinbo Yang, Hongli Zhang
2025/2251 (PDF ) An Efficient Private GPT Never Autoregressively Decodes Zhengyi Li, Yue Guan, Kang Yang, Yu Feng, Ning Liu, Yu Yu, Jingwen Leng, Minyi Guo
2025/2250 (PDF ) Nimbus: Secure and Efficient Two-Party Inference for Transformers Zhengyi Li, Kang Yang, Jin Tan, Wen-jie Lu, Haoqi Wu, Xiao Wang, Yu Yu, Derun Zhao, Yancheng Zheng, Minyi Guo, Jingwen Leng
2025/2249 (PDF ) Revisiting Sum-check-based Polynomial Commitment Schemes Yuncong Zhang
2025/2248 (PDF ) Learning from Leakage: Database Reconstruction from Just a Few Multidimensional Range Queries Peijie Li, Huanhuan Chen, Evangelia Anna Markatou, Kaitai Liang
2025/2247 (PDF ) Beyond Incentive Compatibility: Rational Harm-Proof Transaction Fee Mechanisms Forest Zhang, Elain Park, Ke Wu
2025/2246 (PDF ) Too Easy Fault Injection Attacks on Learning with Rounding (LWR) Francesco Berti, Sasha Petri, Itamar Levi
2025/2245 (PDF ) An Extended PUF-based Protocol Francesco Berti, Itamar Levi
2025/2244 (PDF ) Swarm in EM Hay: Particle Swarm-guided Probe Placement for EM SCA Dev Mehta, Seyedmohammad Nouraniboosjin, Maryam S. Safa, Shahin Tajik, Fatemeh Ganji
2025/2243 (PDF ) On The Dolev-Yao Model of Symmetric Cascade Protocol Varsha Jarali, Shashi Kant Pandey
2025/2242 (PDF ) Sanitizable Signatures with Different Admissibility Policies for Multiple Sanitizers Osama Allabwani, Olivier Blazy, Pascal Lafourcade, Charles Olivier-Anclin, Olivier Raynaud
2025/2241 (PDF ) LEAF: Lightweight and Efficient Hardware Accelerator for Signature Verification of FALCON Samuel Coulon, Jinjun Xiong, Jiafeng Xie
2025/2240 (PDF ) On the Cryptographic Resilience of MDS Matrices Kamil Otal, Ali Mert Sülçe, Oğuz Yayla
2025/2239 (PDF ) Rejection-Free Framework of Zero-Knowledge Proof Based on Hint-MLWE Antoine Douteau, Adeline Roux-Langlois
2025/2238 (PDF ) arya-STARK: Aggregation-Robust Yet Authentic Training via STARK Proofs Abdoul Ahad FALL
2025/2237 (PDF ) Distributed Broadcast Encryption for Confidential Interoperability across Private Blockchains Angelo De Caro, Kaoutar Elkhiyaoui, Sandeep Nishad, Sikhar Patranabis, Venkatraman Ramakrishna
2025/2236 (PDF ) Extending the SPHINCS+ Framework: Varying the Tree Heights and Chain Lengths Zhen Qin, Siwei Sun
2025/2235 (PDF ) MLWE’s impact on Web Metrics, mTLS TTLB, and AWS service endpoint connections Mila Anastasova, Panos Kampanakis
2025/2234 (PDF ) ZeroOS: A Universal Modular Library OS for zkVMs Guangxian Zou, Isaac Zhang, Ryan Zarick, Kelvin Wong, Thomas Kim, Daniel L.-K. Wong, Saeid Yazdinejad, Dan Boneh
2025/2233 (PDF ) Quantum Authentication: Security against Authentication and Verification Queries Shaoquan Jiang
2025/2232 (PDF ) Toward Practical Lattice-based Unbounded Inner Product Functional Encryption: Construction and Implementation Suprava Roy, Ratna Dutta
2025/2231 (PDF ) NeevAs: An AEAD Design for Lightweight Cryptography Varsha Jarali, Hari Preeth S, Khushboo Bussi, Shashi Kant Pandey
2025/2230 (PDF ) Efficient Algorithms for $\mathbb{G}_2$ Subgroup Membership testing on Pairing-friendly Curves Jianming Lin, Yu Dai, Chang-An Zhao, Yuhao Zheng
2025/2229 (PDF ) Practically Implementable Minimal Universal Gate Sets for Multi-Qudit Systems with Cryptographic Validation Anisha Dutta, Sayantan Chakraborty, Chandan Goswami, Avishek Adhikari
2025/2228 (PDF ) PIRANHAS: PrIvacy-Preserving Remote Attestation in Non-Hierarchical Asynchronous Swarms Jonas Hofmann, Philipp-Florens Lehwalder, Shahriar Ebrahimi, Parisa Hassanizadeh, Sebastian Faust
2025/2227 (PDF ) Time Memory Trade-off For Enumeration Yuanmi Chen, Zhao Chen, Tingting Guo, Chao Sun, Weiqiang Wen, Yu Yu
2025/2226 (PDF ) Learning With Physical Rounding for Linear and Quadratic Leakage Functions Clément Hoffmann, Pierrick Méaux, Charles Momin, Yann Rotella, François-Xavier Standaert, Balazs Udvarhelyi
2025/2225 (PDF ) Learning with Errors with Output Dependencies: LWE, LWR, and Physical Learning Problems under the Same Umbrella Clément Hoffmann, Pierrick Méaux, Mélissa Rossi, François-Xavier Standaert
2025/2224 (PDF ) Beyond Ethernet: Reusing MACsec for CANsec Friedrich Wiemer, Arthur Mutter, Jonathan Ndop, Julian Göppert, Axel Sikora, Thierry Walrant
2025/2223 (PDF ) Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System Alan T. Sherman, Jeremy J. Romanik Romano, Edward Zieglar, Enis Golaszewski, Jonathan D. Fuchs, William E. Byrd
2025/2222 (PDF ) Improved Pseudorandom Codes from Permuted Puzzles Miranda Christ, Noah Golowich, Sam Gunn, Ankur Moitra, Daniel Wichs
2025/2221 (PDF ) Sparse Vector Reconstruction from Distance Spectrum using Soft Information Magali Salom, Nicolas Sendrier, Valentin Vasseur
2025/2220 (PDF ) Performance Improvements of ZK-Prover for rWasm: A Sound and Efficient AIR for 32-bit Division and Remainder Suleyman Kardas, Mehmet Sabir Kiraz, Dmitry Savonin, Yao Wang, Aliaksei Dziadziuk
2025/2219 (PDF ) HATSolver: Learning Groebner Bases with Hierarchical Attention Transformers Mohamed Malhou, Ludovic Perret, Kristin Lauter
2025/2218 (PDF ) The Syndrome Weight Distribution in Quasi-Cyclic Codes, Applications to BIKE and HQC Antoine Mesnard, Jean-Pierre Tillich, Valentin Vasseur
2025/2217 (PDF ) Ideal Private Simultaneous Messages Schemes and Their Applications Keitaro Hiwatashi, Reo Eriguchi
2025/2216 (PDF ) AgentCrypt: Advancing Privacy and (Secure) Computation in AI Agent Collaboration Harish Karthikeyan, Yue Guo, Leo de Castro, Antigoni Polychroniadou, Leo Ardon, Udari Madhushani Sehwag, Sumitra Ganesh, Manuela Veloso
2025/2215 (PDF ) Obfuscating Pseudorandom Functions is Post-Quantum Complete Pedro Branco, Abhishek Jain, Akshayaram Srinivasan
2025/2214 (PDF ) Accelerating TFHE with Sorted Bootstrapping Techniques Loris Bergerat, Jean-Baptiste Orfila, Adeline Roux-Langlois, Samuel Tap
2025/2213 (PDF ) Simplified Meet-in-the-middle Preimage Attacks on AES-based Hashing Mathieu Degré, Patrick Derbez, André Schrottenloher
2025/2211 (PDF ) Architecture-private Zero-knowledge Proof of Neural Networks Yanpei Guo, Zhanpeng Guo, Wenjie Qu, Jiaheng Zhang
2025/2210 (PDF ) Multi-Client Functional Encryption for Small Domains Suvasree Biswas, Mohit Vaid, Arkady Yerukhimovich
2025/2209 (PDF ) A New Practical Cube Attack via Recovering Numerous Superpolys Min Zhang, Yao Sun
2025/2208 (PDF ) Vectorized SVE2 Optimization of the Post-Quantum Signature ML-DSA on ARMv9-A Architecture Hanyu Wei, Wenqian Li, Shiyu Shen, Hao Yang, Wenbo Guo, Yunlei Zhao
2025/2207 (PDF ) A General Framework for Registered Functional Encryption via User-Specific Pre-Constraining Tapas Pal, Robert Schädlich
2025/2206 (PDF ) LifeXP+: Secure, Usable and Reliable Key Recovery for Web3 Applications Panagiotis Chatzigiannis, Suvradip Chakraborty, Shimaa Ahmed
2025/2205 (PDF ) ML-Guided Beam Search for Differential Trail Discovery in SPN Ciphers: A Case Study on GIFT-64 Alireza Gholizadeh Shahrbejari, Reza Ebrahimi Atani
2025/2204 (PDF ) Consistency Verification for Zero-Knowledge Virtual Machine on Circuit-Irrelevant Representation Jingyu Ke, Boxuan Liang, Guoqiang Li
2025/2203 (PDF ) Hash-based Signature Schemes for Bitcoin Mikhail Kudinov, Jonas Nick
2025/2202 (PDF ) Disproving the Linearity of the Polynomials after the Pre-image Substitution in the System of the Third Attempt of MAYO Anna Stefano Narivelomanana
2025/2201 (PDF ) On $k$-sum algorithms for $\{-1,1\}^m$ vectors Pabasara Athukorala, Steven D. Galbraith
2025/2200 (PDF ) Privacy-Preserving Identifier Checking in 5G Marcel D.S.K. Gräfenstein, Stefan Köpsell, Maryam Zarezadeh
2025/2199 (PDF ) A Formal Security Proof of Masking: Reduction from Strong Noisy Leakage to Probing Model without Random Probing and Application to LR Primitive Rei Ueno, Akiko Inoue, Kazuhiko Minematsu, Akira Ito, Naofumi Homma
2025/2198 (PDF ) Putting Multi into Multi-Signatures: Tight Security for Multiple Signers Anja Lehmann, Cavit Özbay
2025/2197 (PDF ) Small-field hash-based SNARGs are less sound than conjectured Giacomo Fenzi, Antonio Sanso
2025/2196 (PDF ) Cardinal: Bridging Bitcoin with Ownership Preservation Lukas Aumayr, Jesus Diaz, Dimitar Jetchev, Aggelos Kiayias
2025/2195 (PDF ) Refined Modelling of the Primal Attack, and Variants Against Module-Learning With Errors Paola de Perthuis, Filip Trenkić
2025/2194 (PDF ) Turning Simulation into Construction: New Uses of NIZK Simulators Stephan Krenn, Kai Samelin, Daniel Slamanig
2025/2193 (PDF ) aLEAKator: HDL Mixed-Domain Simulation for Masked Hardware & Software Formal Verification Noé Amiot, Quentin Meunier, Karine Heydemann, Emmanuelle Encrenaz
2025/2192 (PDF ) Constant-time Quaternion Algorithms for SQIsign Andrea Basso, Chenfeng He, David Jacquemin, Fatna Kouider, Péter Kutas, Anisha Mukherjee, Sina Schaeffler, Sujoy Sinha Roy
2025/2191 (PDF ) Mobius: Enabling Byzantine-Resilient Single Secret Leader Election with Uniquely Verifiable State Hanyue Dou, Peifang Ni, Yingzi Gao, Jing Xu
2025/2190 (PDF ) Game-Theoretically Fair Distributed Coin Tossing With Private Preferences Pedro Branco, Pratik Soni, Sri AravindaKrishnan Thyagarajan, Ke Wu
2025/2189 (PDF ) An Improved Quantum Algorithm for 3-Tuple Lattice Sieving Lynn Engelberts, Yanlin Chen, Amin Shiraz Gilani, Maya-Iggy van Hoof, Stacey Jeffery, Ronald de Wolf
2025/2188 (PDF ) ALIOTH: An Efficient and Secure Weight-of-Evidence Framework for Privacy-Preserving Data Processing Ye Dong, Xiangfu Song, W.j Lu, Xudong Chen, Yaxi Yang, Ruonan Chen, Tianwei Zhang, Jin-Song Dong
2025/2187 (PDF ) Abuse Resistant Traceability with Minimal Trust for Encrypted Messaging Systems Zhongming Wang, Tao Xiang, Xiaoguo Li, Guomin Yang, Biwen Chen, Ze Jiang, Jiacheng Wang, Chuan Ma, Robert H. Deng
2025/2186 (PDF ) BEANIE – A 32-bit Cipher for Cryptographic Mitigations against Software Attacks Simon Gerhalter, Samir Hodžić, Marcel Medwed, Marcel Nageler, Artur Folwarczny, Ventzi Nikov, Jan Hoogerbrugge, Tobias Schneider, Gary McConville, Maria Eichlseder
2025/2185 (PDF ) Fully Adaptive Threshold IBE and Signatures in the Standard Model Jiayun Yan, Yu Li, Jie Chen, Haifeng Qian, Xiaofeng Chen, Debiao He
2025/2184 (PDF ) One-way Functions and Boundary Hardness of Randomized Time-Bounded Kolmogorov Complexity Yanyi Liu, Rafael Pass
2025/2183 (PDF ) Hardware Implementation of Stealthy and Lightweight Backdoor for CRYSTALS-Kyber Suraj Mandal, Prasanna Ravi, M Dhilipkumar, Debapriya Basu Roy, Anupam Chattopadhyay
2025/2182 (PDF ) Cryptanalysis on Asymmetric Structured Key Agreement Schemes Koki Jimbo
2025/2181 (PDF ) SVP$_p$ is Deterministically NP-Hard for all $p > 2$, Even to Approximate Within a Factor of $2^{\log^{1-\varepsilon} n}$ Isaac M Hair, Amit Sahai
2025/2180 (PDF ) Weight of Polynomial Products Mod $(X^n+1)$-Application to the HQC Cryptosystem- Laila El Aimani
2025/2179 (PDF ) Policy Compliant Secure Messaging Joël Alwen, Xiaohui Ding, Sanjam Garg, Yiannis Tselekounis
2025/2178 (PDF ) PQCUARK: A Scalar RISC-V ISA Extension for ML-KEM and ML-DSA Xavier Carril, Alicia Manuel Pasoot, Emanuele Parisi, Carlos Andrés Lara-Niño, Oriol Farràs, Miquel Moretó
2025/2177 (PDF ) TAPIR: A Two-Server Authenticated PIR Scheme with Preprocessing Francesca Falzon, Laura Hetz, Annamira O'Toole
2025/2176 (PDF ) On the (Un)biasability of Existing Verifiable Random Functions Davide Carnemolla, Dario Catalano, Valentina Frasca, Emanuele Giunta
2025/2175 (PDF ) Extended Abstract: NICE-PAKE and TEMPO Instantiations from MLWE Rerandomizable Splittable KEMs Nouri Alnahawi, Alexander Wiesmaier
2025/2174 (PDF ) LIME: High-Performance Private Inference with Lightweight Model and Batch Encryption Huan-Chih Wang, Ja-Ling Wu
2025/2173 (PDF ) Systems Security Foundations for Agentic Computing Mihai Christodorescu, Earlence Fernandes, Ashish Hooda, Somesh Jha, Johann Rehberger, Khawaja Shams
2025/2172 (PDF ) Crypto Wars in Secure Messaging: Covert Channels in Signal Despite Leaked Keys Mohammadamin Rakeei, Rosario Giustolisi, Andy Rupp, Chuanwei Lin, Gabriele Lenzini
2025/2171 (PDF ) Efficient GHASH and POLYVAL Implementation Using Polynomial Multiplication: Optimized 64-bit Decomposition with Bit-Reversal Elimination Mamone Tarsha Kurdi, Niels Möller
2025/2170 (PDF ) Lattice-Based Linkable Ring Signatures for Anonymous and Accountable Whistleblowing Vishal Pareek, Aditi Kar Gangopadhyay, Sugata Gangopadhyay
2025/2169 (PDF ) Multivariate exponential equations with unknown coefficients Trey Li
2025/2168 (PDF ) Hybrid Subsupport Guessing: A New Hybrid Technique for the Rank Decoding Problem Hugo Beeloo-Sauerbier Couvée, Antonia Wachter-Zeh, Violetta Weger
2025/2167 (PDF ) 1-Adaptive Weak Pseudorandom Functions Davide Li Calsi, Dominique Schröder, Julian Thomas
2025/2166 (PDF ) How to Prove Post-Quantum Security for Succinct Non-Interactive Reductions Alessandro Chiesa, Zijing Di, Zihan Hu, Yuxi Zheng
2025/2165 (PDF ) Extending and Accelerating Inner Product Masking with Fault Detection via Instruction Set Extension Songqiao Cui, Geng Luo, Junhan Bao, Josep Balasch, Ingrid Verbauwhede
2025/2164 (PDF ) Hardness and Algorithms for Batch LPN under Dependent Noise Xin Li, Songtao Mao, Zhaienhe Zhou
2025/2163 (PDF ) Correction-Based Fault Attack Against Randomized MAYO Mohamed Abdelmonem, Lejla Batina, Durba Chatterjee, Håvard Raddum
2025/2162 (PDF ) You Only Decapsulate Once: Ciphertext-Independent Single-Trace Passive Side-Channel Attacks on HQC Zhenzhi Lai, Ruiyi Zhang, Zhiyuan Zhang, Julius Hermelink, Michael Schwarz, Van-Thuan Pham, Udaya Parampalli
2025/2161 (PDF ) Attacks and Remedies for Randomness in AI: Cryptanalysis of PHILOX and THREEFRY Jens Alich, Thomas Eisenbarth, Hossein Hadipour, Gregor Leander, Felix Mächtle, Yevhen Perehuda, Shahram Rasoolzadeh, Jonas Sander, Cihangir Tezcan
2025/2160 (PDF ) Pairing-Based SNARGs with Two Group Elements Gal Arnon, Jesko Dujmovic, Eylon Yogev
2025/2159 (PDF ) One Fell Swoop: A Single-Trace Key-Recovery Attack on the Falcon Signing Algorithm Kang Li, Shouran Ma, Haochen Dou, Qian Guo
2025/2158 (PDF ) Efficient Batched IBE from Lattices in the Standard Model Saisi Xiong, Jie Chen
2025/2157 (PDF ) Taming the Stack: Proof-Preserving Blockwise FrodoKEM on RISC-V Devices with Hardware Acceleration Frank Hartmann
2025/2156 (PDF ) Multi-Verifier Keyed-Verification Anonymous Credentials Jan Bobolz, Emad Heydari Beni, Anja Lehmann, Omid Mirzamohammadi, Cavit Özbay, Mahdi Sedaghat
2025/2155 (PDF ) A New Approach to Arguments of Quantum Knowledge James Bartusek, Ruta Jawale, Justin Raizes, Kabir Tomer
2025/2154 (PDF ) Optimal Threshold Traitor Tracing Sourav Das, Pratish Datta, Aditi Partap, Swagata Sasmal, Mark Zhandry
2025/2153 (PDF ) Semigroup-homomorphic Signature Heng Guo, Kun Tian, Fengxia Liu, Zhiyong Zheng
2025/2152 (PDF ) Sum-check protocol for approximate computations Dor Bitan, Zachary DeStefano, Shafi Goldwasser, Yuval Ishai, Yael Tauman Kalai, Justin Thaler
2025/2151 (PDF ) Hardness of Problems with Hints in Code-Based Cryptography and Applications to Traitor Tracing Thomas Debris-Alazard, Victor Dyseryn, Duong Hieu Phan
2025/2150 (PDF ) Low-Latency Fully Homomorphic Arithmetic Using Parallel Prefix Group Circuit with Primitive Gate Bootstrapping Dohyuk Kim, Sin Kim, Seunghwan Lee, Dong-Joon Shin
2025/2149 (PDF ) Weak Tweak-Key Analysis Of Blink Via Superbox Shiyao Chen, Jian Guo, Tianyu Zhang
2025/2148 (PDF ) Introducing the ALF family: AES-NI-based length- and format-preserving encryption Dachao Wang, Alexander Maximov, Thomas Johansson
2025/2147 (PDF ) Updatable Private Set Intersection and Beyond: Efficient Constructions via Circuit Private Set Intersection Ferran Alborch, Tom Chauvier, Antonio Faonio, Alexandre Fontaine, Ferhat Karakoç, Alptekin Küpçü, Camille Malek, Melek Önen
2025/2146 (PDF ) Zero-Knowledge Protocols with PVC Security: Striking the Balance between Security and Efficiency Yi Liu, Yipeng Song, Anjia Yang, Junzuo Lai
2025/2145 (PDF ) Derivative-Free Richelot Isogenies via Subresultants: Algebraic Equivalence and Certified Guarded Computation Hung T. Dang
2025/2144 (PDF ) On Equivalence of the Butterfly Structure Chin Hei Chan
2025/2143 (PDF ) New Post-Quantum IBE leveraging maturity, efficiency and security of standard schemes Julien CAM
2025/2142 (PDF ) Differential cryptanalysis of An optimized novel lightweight block cipher for image encryption Khaled Hosseini, Sadegh Sadeghi
2025/2141 (PDF ) Memory Optimizations of Wagner's Algorithm with Applications to Equihash Lili Tang, Rui Ding, Yao Sun, Xiaorui Gong
2025/2140 (PDF ) Nostalgia Cipher: Can Filtered LFSRs Be Secure Again? An Application to Hybrid Homomorphic Encryption with Sub-50 ms Latency Nabil Chacal, Antonio Guimarães, Ange Martinelli, Pierrick Méaux, Romain Poussier
2025/2139 (PDF ) Scalable Private World Computer via Root iO: Application-Agnostic iO and Our Roadmap for Making It Practical Sora Suegami, Enrico Bottazzi
2025/2138 (PDF ) Synergeia: Super-Linear Consistency and Adaptive Stability in a Hybrid PoW/PoS Consensus Aaron M. Schutza
2025/2137 (PDF ) Linear Secret-shared Shuffle with Malicious Security Samuel Dittmer, Rohit Nema, Rafail Ostrovsky
2025/2136 (PDF ) The Latency Cost Of Censorship Resistance Ittai Abraham, Yuval Efron, Ling Ren
2025/2135 (PDF ) Robust Elections and More: Fast MPC in the Preprocessing Model Charanjit S. Jutla, Nathan Manohar, Arnab Roy
2025/2134 (PDF ) Non-Interactive Threshold Mercurial Signatures with Applications to Threshold DAC Scott Griffy, Nicholas Jankovic, Anna Lysyanskaya, Arup Mondal
2025/2133 (PDF ) Byzantine Broadcast with Unknown Participants Wonseok Choi, Ran Cohen, Juan Garay, Nikos Skoumios, Vassilis Zikas
2025/2132 (PDF ) Bandwidth Efficient Partial Authorized PSI Tjitske Ollie Koster, Francesca Falzon, Evangelia Anna Markatou
2025/2131 (PDF ) Persistent BitTorrent Trackers François-Xavier Wicht, Zhengwei Tong, Shunfan Zhou, Hang Yin, Aviv Yaish
2025/2130 (PDF ) Weightwise (almost) perfectly balanced functions: $t$-concatenation and the general Maiorana-McFarland class Leyla Işık, René Rodríguez-Aldama, Ajla Šehović
2025/2129 (PDF ) Binding Security of Explicitly-Rejecting KEMs via Plaintext Confirmation and Robust PKEs Juliane Krämer, Yannick Münz, Patrick Struck, Maximiliane Weishäupl
2025/2127 (PDF ) Censorship-Resistant Sealed-Bid Auctions on Blockchains Orestis Alpos, Lioba Heimbach, Kartik Nayak, Sarisht Wadhwa
2025/2126 (PDF ) DPaaS: Improving Decentralization by Removing Relays in Ethereum PBS Chenyang Liu, Ittai Abraham, Matthew Lentz, Kartik Nayak
2025/2125 (PDF ) Are ideal functionalities really ideal? Myrto Arapinis, Véronique Cortier, Hubert de Groote, Charlie Jacomme, Steve Kremer
2025/2124 (PDF ) SALSAA – Sumcheck-Aided Lattice-based Succinct Arguments and Applications Shuto Kuriyama, Russell W. F. Lai, Michał Osadnik, Lorenzo Tucci
2025/2123 (PDF ) Dictators? Friends? Forgers. Breaking and Fixing Unforgeability Definitions for Anamorphic Signature Schemes Joseph Jaeger, Roy Stracovsky
2025/2122 (PDF ) Adaptive Security for Constrained PRFs Kaishuo Cheng, Joseph Jaeger
2025/2121 (PDF ) Generic and Algebraic Computation Models: When AGM Proofs Transfer to the GGM Joseph Jaeger, Deep Inder Mohan
2025/2120 (PDF ) Language-Agnostic Detection of Computation-Constraint Inconsistencies in ZKP Programs via Value Inference Arman Kolozyan, Bram Vandenbogaerde, Janwillem Swalens, Lode Hoste, Stefanos Chaliasos, Coen De Roover
2025/2119 (PDF ) Twinkle: A family of Low-latency Schemes for Authenticated Encryption and Pointer Authentication Jianhua Wang, Tao Huang, Shuang Wu, Zilong Liu
2025/2118 (PDF ) Revisiting Rational Broadcast Protocols Shunya Otomo, Kenji Yasunaga
2025/2117 (PDF ) Revisiting Simulation Extractability in the Updatable Setting Hamidreza Khoshakhlagh
2025/2116 (PDF ) Oblivious Batch Updates for Bloom-Filter-based Outsourced Cryptographic Protocols Marten van Dijk, Dandan Yuan
2025/2115 (PDF ) Weighted Batched Threshold Encryption with Applications to Mempool Privacy Amit Agarwal, Kushal Babel, Sourav Das, Babak Poorebrahim Gilkalaye, Arup Mondal, Benny Pinkas, Peter Rindal, Aayush Yadav
2025/2114 (PDF ) Hardness of Range Avoidance and Proof Complexity Generators from Demi-Bits Hanlin Ren, Yichuan Wang, Yan Zhong
2025/2113 (PDF ) Single-Server Private Outsourcing of zk-SNARKs Kasra Abbaszadeh, Hossein Hafezi, Jonathan Katz, Sarah Meiklejohn
2025/2112 (PDF ) Sharing the Mask: TFHE bootstrapping on Packed Messages Bergerat Loris, Bonte Charlotte, Benjamin R. Curtis, Jean-Baptiste Orfila, Pascal Paillier, Samuel Tap
2025/2111 (PDF ) SoK: Secure Computation over Secret Shares Tamir Tassa, Arthur Zamarin
2025/2110 (PDF ) A note on mutual correlated agreement for Reed-Solomon codes Ulrich Haböck
2025/2109 (PDF ) Secure Lookup Tables: Faster, Leaner, and More General Chongrong Li, Pengfei Zhu, Yun Li, Zhanpeng Guo, Jingyu Li, Yuncong Hu, Zhicong Huang, Cheng Hong
2025/2108 (PDF ) The Grain Family of Stream Ciphers: an Abstraction, Strengthening of Components and New Concrete Instantiations Palash Sarkar
2025/2107 (PDF ) Quantum-safe Identity-binding Password Authenticated Key Exchange Protocols Pratima Jana, Ratna Dutta
2025/2106 (PDF ) SoK: Blockchain Oracles Between Theory and Practice Colin Finkbeiner, Ghada Almashaqbeh
2025/2105 (PDF ) HRA-Secure Puncturable Attribute-Based Proxy Re-Encryption from Lattices for Secure Cloud Sharing Tianqiao Zhang, Mingming Jiang, Fucai Luo, Yuyan Guo, Jinqiu Hou
2025/2104 (PDF ) Quantum Voting Protocol from Classical Assumptions Tingyu Ge, Mingqiang Wang, Xiaolei Wang, Xinyuan Zhao, Xuanxuan Xiao
2025/2103 (PDF ) Threshold Batched Identity-Based Encryption from Pairings in the Plain Model Junqing Gong, Brent Waters, Hoeteck Wee, David J. Wu
2025/2102 (PDF ) A Graph-Theoretic Framework for Randomness Optimization in First-Order Masked Circuits Dilip Kumar S. V., Benedikt Gierlichs, Ingrid Verbauwhede
2025/2101 (PDF ) Fault Attacks against UOV-based Signatures Sven Bauer, Fabrizio De Santis, Kristjane Koleci
2025/2100 (PDF ) Tag Functions and Their Applications to Lattice-based Signatures and IBEs — Compact Designs and Tighter Security Parhat Abla
2025/2099 (PDF ) A Lattice-based Designated Verifier zkSNARK from Standard Assumptions Mohammad Sadegh Ahmadi, Taraneh Eghlidos, Behzad Abdolmaleki, Ngoc Khanh Nguyen
2025/2098 (PDF ) Optical computing of zero-knowledge proof with single-pixel imaging Wei Huang, Shuming Jiao, Huichang Guan, Huisi Miao, Chao Wang
2025/2097 (PDF ) Hash-Based Blind Signatures: First Steps Javier Herranz, Hugo Louiso
2025/2096 (PDF ) Laser Fault Injection Attack on the eXtended Merkle Signature Scheme Alexander Wagner, Marc Schink, Silvan Streit, Dominik Klein, Sven Freud
2025/2095 (PDF ) FPS: Flexible Payment System Adithya Bhat, Srinivasan Raghuraman, Panagiotis Chatzigiannis, Duc V Le, Mohsen Minaei
2025/2094 (PDF ) Vega: Low-Latency Zero-Knowledge Proofs over Existing Credentials Darya Kaviani, Srinath Setty
2025/2093 (PDF ) Lore: An LWE-based Key Encapsulation Mechanism with Variable Modulus and CRT Compression Zhongxiang Zheng, Anyu Wang, Chunhuan Zhao, Guangwu Xu, Zhengtao Jiang, Sibo Feng, Zhichen Yan, Shuang Sun, Xiaoyun Wang
2025/2092 (PDF ) CRA and Cryptography: The Story Thus Far Markku-Juhani O. Saarinen
2025/2091 (PDF ) Efficient and Proof-of-Useful-Work Friendly Local-Search for Distributed Consensus Matthias Fitzi, Aggelos Kiayias, Laurent Michel, Giorgos Panagiotakos, Alexander Russell
2025/2090 (PDF ) Quantum Grover Attack on MIBS Hasan Ozgur Cildiroglu, Harun Basmaci, Oguz Yayla
2025/2089 (PDF ) Traceable Bottom-Up Secret Sharing and Law & Order on Community Social Key Recovery (Full Version) Rittwik Hajra, Subha Kar, Pratyay Mukherjee, Soumit Pal
2025/2088 (PDF ) UP TO 50% OFF: Efficient Implementation of Polynomial Masking Jorge Andresen, Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Eric Landthaler, Elena Micheli, Maximilian Orlt, Pajam Pauls, Kathrin Wirschem, Liang Zhao
2025/2087 (PDF ) Leakage-Free Enhanced Private Set Union for Balanced and Unbalanced Scenarios Qiang Liu, JaeYoung Bae, JoonWoo Lee
2025/2086 (PDF ) On Composing AGM-Secure Functionalities with Cryptographic Proofs: Applications to Unbounded-Depth IVC and More Matteo Campanelli, Dario Fiore, Mahak Pancholi
2025/2085 (PDF ) Strong Pseudorandom Functions in $AC^0[2]$ in the Bounded-Query Setting Marshall Ball, Clément Ducros, Saroja Erabelli, Lisa Kohl, Nicolas Resch
2025/2084 (PDF ) Postponing the Glitches is Not Enough - A Critical Analysis of the DATE 2024 E-ISW Masking Scheme Amir Moradi
2025/2083 (PDF ) Improvements to Lucas-sequence modular square roots and primality testing Mike Hamburg
2025/2082 (PDF ) Integrating PQC in OpenSSL via Shallow Providers for Cryptographic Agility Akif Mehmood, Nicola Tuveri
2025/2081 (PDF ) Partial Fraction Techniques for Cryptography Charanjit S. Jutla, Rohit Nema, Arnab Roy
2025/2080 (PDF ) Issuer Hiding for BBS-Based Anonymous Credentials Jonathan Katz, Marek Sefranek
2025/2079 (PDF ) On the Dangers of RSA Exponent Transforms Eugene Lau, Laura Shea, Nadia Heninger
2025/2078 (PDF ) Broadcast for Dynamic Committees without Trusted Setup Gabriel Dettling, Chen-Da Liu-Zhang, Elisaweta Masserova, Matthieu Rambaud, Antoine Urban
2025/2077 (PDF ) Malicious Homomorphic Secret Sharing with Applications to DV-NIZK and More Pedro Capitão, Hila Dahari-Garbian, Lisa Kohl, Zhe Li
2025/2076 (PDF ) Non-Interactive Blind Signatures from RSA Assumption and More Lucjan Hanzlik, Eugenio Paracucchi, Riccardo Zanotto
2025/2075 (PDF ) Leveled Isogeny Problems with Hints Subham Das, Riccardo Invernizzi, Péter Kutas, Jonas Meers
2025/2074 (PDF ) VIA: Communication-Efficient Single-Server Private Information Retrieval Chenyang Liu, Xukun Wang, Zhifang Zhang
2025/2073 (PDF ) Recursion Enabled: Improved Cryptanalysis of the Permuted Kernel Problem Alessandro Budroni, Marco Defranceschi, Federico Pintore
2025/2072 (PDF ) Multi-server Fuzzy Message Detection Christopher Goes, Yulia Khalniyazova, Enrique Larraia, Xuyang Song
2025/2071 (PDF ) On Cryptography and Distribution Verification, with Applications to Quantum Advantage Bruno Cavalar, Eli Goldin, Matthew Gray, Taiga Hiroka, Tomoyuki Morimae
2025/2070 (PDF ) MIFA: An MILP-based Framework for Improving Differential Fault Attacks Hanbeom Shin, Insung Kim, Sunyeop Kim, Byoungjin Seok, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee
2025/2069 (PDF ) Shorter Hash-Based Signatures Using Forced Pruning Mehdi Abri, Jonathan Katz
2025/2068 (PDF ) Fast Networks for High-Performance Distributed Trust Yicheng Liu, Rafail Ostrovsky, Scott Shenker, Sam Kumar
2025/2067 (PDF ) Cryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Channel Binding Enis Golaszewski, Alan T. Sherman, Edward Zieglar, Jonathan D. Fuchs, Sophia Hamer
2025/2066 (PDF ) A Comprehensive Analysis of the AKMA+ Protocol Yueming Li, Long Chen, Zhenfeng Zhang
2025/2065 (PDF ) TensorSwitch: Nearly Optimal Polynomial Commitments from Tensor Codes Benedikt Bünz, Giacomo Fenzi, Ron D. Rothblum, William Wang
2025/2064 (PDF ) Security of Private Set Operation Schemes: Separations and Implications Mojtaba Rafiee
2025/2063 (PDF ) QUIC-MLS: Making a Space Security Draft Standard Resilient for Disconnected Environments Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri
2025/2062 (PDF ) Cryptanalysis of Multi-Party Key Exchange Protocols over a Modified Supertropical Semiring Sulaiman Alhussaini, Sergeı̆ Sergeev
2025/2061 (PDF ) Multivariate Signatures with Polynomial Factorization Irene Di Muzio, Martin Feussner, Igor Semaev
2025/2060 (PDF ) Multi-homogeneous XL Kai-Chun Ning, Lars Ran, Simona Samardjiska
2025/2059 (PDF ) Compact, Efficient and Non-Separable Hybrid Signatures Julien Devevey, Morgane Guerreau, Maxime Roméas
2025/2058 (PDF ) Real-Time Encrypted Emotion Recognition Using Homomorphic Encryption Gyeongwon Cha, Dongjin Park, Yejin Choi, Eunji Park, Joon-Woo Lee
2025/2057 (PDF ) Distributed Key Generation for Efficient Threshold-CKKS Seonhong Min, Guillaume Hanrot, Jai Hyun Park, Alain Passelègue, Damien Stehlé
2025/2056 (PDF ) Unclonable Cryptography in Linear Quantum Memory Omri Shmueli, Mark Zhandry
2025/2055 (PDF ) On Proximity Gaps for Reed–Solomon Codes Eli Ben-Sasson, Dan Carmon, Ulrich Haböck, Swastik Kopparty, Shubhangi Saraf
2025/2054 (PDF ) Optimal Proximity Gaps for Subspace-Design Codes and (Random) Reed-Solomon Codes Rohan Goyal, Venkatesan Guruswami
2025/2053 (PDF ) DIFA-Rent: Division Property Based Fault Attacks on DEFAULT and BAKSHEESH Shibam Ghosh, Anup Kumar Kundu, Dhiman Saha
2025/2052 (PDF ) SoK: Systematizing Hybrid Strategies for the Transition to Post-Quantum Cryptography Abdoul Ahad Fall
2025/2051 (PDF ) All Polynomial Generators Preserve Distance with Mutual Correlated Agreement Sarah Bordage, Alessandro Chiesa, Ziyi Guan, Ignacio Manzur
2025/2050 (PDF ) TPL: Power Leakage Model Based on Technology Library Sumesh Manjunath Ramesh, Hoda Alkhzaimi
2025/2049 (PDF ) Black-Box Separation Between Multi-Collision Resistance and Collision Resistance Xinyu Mao, Jiapeng Zhang
2025/2048 (PDF ) Time-Lock Encrypted Storage for Blockchains Amit Agarwal, Kushal Babel, Sourav Das, Babak Poorebrahim Gilkalaye
2025/2047 (PDF ) Enabling Index-free Adjacency in Oblivious Graph Processing with Delayed Duplications Weiqi Feng, Xinle Cao, Adam O'Neill, Chuanhui Yang
2025/2046 (PDF ) On Reed–Solomon Proximity Gaps Conjectures Elizabeth Crites, Alistair Stewart
2025/2045 (PDF ) Handling Noisy Plaintext Checking Oracles with SPiRiT Paco Poilbout, Thomas Roche, Laurent Imbert
2025/2044 (PDF ) New Asymptotic Results on Predicting Non-linear Polynomial Congruential Generators Mengce Zheng, Yansong Feng, Abderrahmane Nitaj, Yanbin Pan
2025/2043 (PDF ) Key-Recovery Side-Channel Attack on the Berlekamp-Massey Decoding Algorithm in the Classic McEliece KEM Andrei Alexei, Marios Omar Choudary, Vlad-Florin Dragoi
2025/2042 (PDF ) Threshold Anonymous Credentials with Silent Setup Preshtha Garg, Sanjam Garg, Guru-Vamsi Policharla, Bhaskar Roberts
2025/2041 (PDF ) Sum-check Is All You Need: An Opinionated Survey on Fast Provers in SNARK Design Justin Thaler
2025/2040 (PDF ) The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1 Antoine Bak, Augustin Bariant, Aurélien Boeuf, Pierre Briaud, Morten Øygarden, Atharva Phanse
2025/2039 (PDF ) Non-Delegatable Commitments Georg Fuchsbauer, Pranav Garimidi, Guru-Vamsi Policharla, Max Resnick, Ertem Nusret Tas
2025/2038 (PDF ) Breaking and Fixing MacaKey Ritam Bhaumik, Bishwajit Chakraborty, Chandranan Dhar
2025/2037 (PDF ) On the Simulation-Extractability of Proof-Carrying Data Behzad Abdolmaleki, Matteo Campanelli, Quang Dao, Hamidreza Khoshakhlagh
2025/2036 (PDF ) On new variants of funcCPA security and related CCA-secure constructions Caroline Fontaine, Marc Renard, Renaud Sirdey, Oana Stan
2025/2035 (PDF ) Multivariate Commitments and Signatures with Efficient Protocols Charles Bouillaguet, Thibauld Feneuil, Jules Maire, Matthieu Rivain, Julia Sauvage, Damien Vergnaud
2025/2034 (PDF ) MtDB: A Decentralized Multi-Tenant Database for Secure Data Sharing Showkot Hossain, Wenyi Tang, Changhao Chenli, Haijian Sun, WenZhan Song, Seokki Lee, Mic Bowman, Taeho Jung
2025/2033 (PDF ) Vestigial Vulnerabilities in Deployed Verifiable E-Voting Systems Thomas Haines, Jarrod Rose
2025/2032 (PDF ) TrX: Encrypted Mempools in High Performance BFT Protocols Rex Fernando, Guru-Vamsi Policharla, Andrei Tonkikh, Zhuolun Xiang
2025/2031 (PDF ) A Note on Notes: Towards Scalable Anonymous Payments via Evolving Nullifiers and Oblivious Synchronization Sean Bowe, Ian Miers
2025/2030 (PDF ) Succinct Zero-knowledge Proofs from One-way Functions:The Blackbox Way Eden Florentz- Konopnicki, Ron D. Rothblum
2025/2029 (PDF ) Forging Dilithium and Falcon Signatures by Single Fault Injection Sven Bauer, Fabrizio De Santis
2025/2028 (PDF ) Improving ML-KEM and ML-DSA on OpenTitan - Efficient Multiplication Vector Instructions for OTBN Ruben Niederhagen, Hoang Nguyen Hien Pham
2025/2027 (PDF ) Accurate BGV Parameters Selection: Accounting for Secret and Public Key Dependencies in Average-Case Analysis Beatrice Biasioli, Chiara Marcolla, Nadir Murru, Matilda Urani
2025/2026 (PDF ) Whom do you trust? PRISM: Lightweight Key Transparency for All Sebastian Pusch, Ryan Quinn Ford, Joachim von zur Gathen, Alexander Markowetz
2025/2025 (PDF ) Migration to Post-Quantum Cryptography: From ECDSA to ML-DSA Daniel Dinu
2025/2024 (PDF ) A Note Comparing Three Incentive Designs Against Privacy-Targeted Collusion Tiantian Gong
2025/2023 (PDF ) Select-Then-Compute: Encrypted Label Selection and Analytics over Distributed Datasets using FHE Nirajan Koirala, Seunghun Paik, Sam Martin, Helena Berens, Tasha Januszewicz, Jonathan Takeshita, Jae Hong Seo, Taeho Jung
2025/2022 (PDF ) Formal Verification of Privacy Pass Kristiana Ivanova, Daniel Gardham, Stephan Wesemeyer
2025/2021 (PDF ) TreeCast: Multi-Party Key Establishment Protocol for IoT Devices Supriyo Banerjee, Sayon Duttagupta
2025/2020 (PDF ) VerfCNN, Optimal Complexity zkSNARK for Convolutional Neural Networks Wenjie Qu, Yanpei Guo, Yue Ying, Jiaheng Zhang
2025/2019 (PDF ) Practical Multi-party Private Set Intersection with Reducible Zero-sharing Yewei Guan, Hua Guo, Man Ho Au, Jiarong Huo, Jin Tan, Zhenyu Guan
2025/2018 (PDF ) Batched and Packed (Publicly) Verifiable Secret Sharing: A Unified Framework and Applications Shahla Atapoor, Karim Baghery, Georgio Nicolas, Robi Pedersen, Jannik Spiessens
2025/2017 (PDF ) Secure Onion Encryption and the Case of Counter Galois Onion Jean Paul Degabriele, Alessandro Melloni, Martijn Stam
2025/2016 (PDF ) Constructions of a Family of Nonlinear Permutations of Any Possible Algebraic Degrees with the Optimal Threshold Implementations Zhaole Li, Deng Tang
2025/2015 (PDF ) Proving Authenticated Key Exchange via Memory-Efficient Reductions Jiaxin Pan, Runzhi Zeng
2025/2014 (PDF ) Multi-Splitting Forking Based Modular Security of Signatures in Multivariate Quadratic Setting Sanjit Chatterjee, Tapas Pandit, Subhabrata Samajder
2025/2013 (PDF ) MARS: Low-Leakage Multi Adversarial Owner and Reader Replication-free Searchable Encryption from Private Information Retrieval Benjamin Fuller, Arinjita Paul, Maryam Rezapour, Ronak Sahu, Amey Shukla
2025/2012 (PDF ) Head Start: Digit Extraction in TFHE from MSB to LSB Jan-Pieter D'Anvers, Xander Pottier, Thomas de Ruijter, Ingrid Verbauwhede
2025/2011 (PDF ) When the Wrong Key Lives On: The Key-Recovery Procedure in Integral Attacks Christof Beierle, Gregor Leander, Yevhen Perehuda
2025/2010 (PDF ) On the Distribution of the Distances of Random Words Benjamin E. Diamond, Angus Gruen
2025/2009 (PDF ) When Randomness Isn’t Random: Practical Fault Attack on Post-Quantum Lattice Standards Hariprasad Kelassery Valsaraj, Prasanna Ravi, Shivam Bhasin, Hongjun Wu
2025/2008 (PDF ) Two-Server Private Information Retrieval in Sublinear Time and Quasilinear Space Alexandra Henzinger, Seyoon Ragavan
2025/2007 (PDF ) k-Anonymous Group Signatures: Addressing Strict Content Moderation in End-to-End Secure Messaging Platforms Shalini Banerjee, Andrey Bozhko, Andy Rupp
2025/2006 (PDF ) OmniBA: Round-Efficient BA with Quadratic Communication under Mixed Faults Simon Holmgaard Kamp, Julian Loss, Kartik Nayak, Kecheng Shi
2025/2005 (PDF ) Reactive Correctness, sINDCPA-D-Security and Deterministic Evaluation for TFHE Nigel Smart, Michael Walter
2025/2004 (PDF ) Re-randomization Attack on the Certificateless Encryption Scheme proposed by Guo et al. Nobuyuki Sugio, Keita Emura, Toshihiro Ohigashi
2025/2003 (PDF ) A Sparse Polynomial Multiplier for HQC Integrating Parallelism and Power-Based Side-Channel Countermeasures Jaeho Jeon, Suseong Lee, Myeongjun Kim, Eunyoung Seo, Myunghyun Cho, Seonggyeom Kim, Bo Gyeong Kang, Young-Sik Kim
2025/2002 (PDF ) Pseudorandom Correlation Functions for Multiparty Beaver Triples from Sparse LPN Sebastian Hasler, Pascal Reisert
2025/2001 (PDF ) On Computational VSS for General Access Structures Shahla Atapoor, Karim Baghery, Robin Jadoul, Barry van Leeuwen
2025/2000 (PDF ) Trust, But Verify When Using the Powers of Tau Karim Baghery
2025/1999 (PDF ) New Security Proofs of MPC-in-the-Head Signatures in the Quantum Random Oracle Model Haruhisa Kosuge, Keita Xagawa
2025/1998 (PDF ) Non-Adaptive One-Way to Hiding not only Implies Adaptive Quantum Reprogramming, but also Does Better Heming Liao, Jiangxia Ge, Rui Xue, Xiaogang Zhou
2025/1997 (PDF ) Provable decryption failure security for practical lattice-based PKE Christian Majenz, Fabrizio Sisinni
2025/1996 (PDF ) Turning Multiple Key-Dependent Attacks into Universal Attacks Hosein Hadipour, Yosuke Todo, Mostafizar Rahman, Maria Eichlseder, Ravi Anand, Takanori Isobe
2025/1995 (PDF ) Device-Bound Anonymous Credentials With(out) Trusted Hardware Karla Friedrichs, Franklin Harding, Anja Lehmann, Anna Lysyanskaya
2025/1994 (PDF ) Separating Pseudorandom Generators from Logarithmic Pseudorandom States Mohammed Barhoush
2025/1993 (PDF ) A Simplified Round-by-round Soundness Proof of FRI Albert Garreta, Nicolas Mohnblatt, Benedikt Wagner
2025/1992 (PDF ) Improved Concurrent-Secure Blind Schnorr Signatures Pierpaolo Della Monica, Ivan Visconti
2025/1991 (PDF ) TWFalcon: Triple-Word Arithmetic for Falcon; Giving Falcon the Precision to Fly Securely Stef Halmans, Christine van Vredendaal, Tobias Schneider, Frank Custers, Tim Güneysu
2025/1990 (PDF ) Accelerating the Primal Hybrid Attack against Sparse LWE using GPUs Ludo N. Pulles, Paul Vié
2025/1989 (PDF ) HardCODE: Hardware-based Circuit Obfuscation using Data Encryption Akashdeep Saha, Sayani Sinha, Chandan Kumar, Animesh Singh, Siddhartha Chowdhury, Sikhar Patranabis, Debdeep Mukhopadhyay
2025/1988 (PDF ) Almost NTRU: Revisiting Noncommutativity Against Lattice Attacks Ali Raya, Vikas Kumar, Seong Oun Hwang, Sugata Gangopadhyay
2025/1987 (PDF ) Single-Trace Key Recovery Attacks on HQC Using Valid and Invalid Ciphertexts Haiyue Dong, Qian Guo, Denis Nabokov
2025/1986 (PDF ) Anonymous Authentication and Key Agreement, Revisited Yanqi Zhao, Xiangyu Liu, Min Xie, Xiaoyi Yang, Jianting Ning, Baodong Qin, Haibin Zhang, Yong Yu
2025/1985 (PDF ) OUF: Oblivious Universal Function with domain specific optimizations Victor Delfour, Marc-Olivier Killijian
2025/1984 (PDF ) Fully Anonymous Secret Sharing Allison Bishop, Matthew Green, Yuval Ishai, Abhishek Jain, Paul Lou
2025/1983 (PDF ) SCORE: A SlotToCoeff Optimization for Real-Vector Encryption in CKKS Tim Seuré
2025/1982 (PDF ) On Evaluating Anonymity of Onion Routing Alessandro Melloni, Martijn Stam, Øyvind Ytrehus
2025/1981 (PDF ) Vision: A Modular Framework for Anonymous Credential Systems Anja Lehmann, Andrey Sidorenko, Alexandros Zacharakis
2025/1980 (PDF ) Traceable Secret Sharing Revisited Vipul Goyal, Abhishek Jain, Aditi Partap
2025/1979 (PDF ) On Singh et. al.'s "Collatz Hash" Joe Doyle
2025/1978 (PDF ) Cryptography with Weak Privacy Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Hanjun Li
2025/1977 (PDF ) Evaluating the Resistance of ARADI Against Differential Fault Attack Chandan Dey, Soumya Sahoo, Santanu Sarkar
2025/1976 (PDF ) Improved Differential Cryptanalysis of ARADI Surajit Mandal, Sandip Kumar Mondal, Raghvendra Rohit, Santanu Sarkar
2025/1975 (PDF ) Rethinking Consensus with Time as a Primitive Ignacio Amores-Sesar, Michelle Yeo
2025/1974 (PDF ) Taming Iterative Grinding Attacks on Blockchain Beacons Peter Gaži, Saad Quader, Alexander Russell
2025/1973 (PDF ) Tight Security for BBS Signatures Rutchathon Chairattana-Apirom, Dennis Hofheinz, Stefano Tessaro
2025/1972 (PDF ) Formalisation of the KZG polynomial commitment schemes in EasyCrypt Palak, Thomas Haines
2025/1971 (PDF ) General Key Recovery Attack on Pointwise-Keyed Functions - Application to Alternating Moduli Weak PRFs Antoine Sidem, Qingju Wang
2025/1970 (PDF ) Delving into Cryptanalytic Extraction of PReLU Neural Networks Yi Chen, Xiaoyang Dong, Ruijie Ma, Yantian Shen, Anyu Wang, Hongbo Yu, Xiaoyun Wang
2025/1969 (PDF ) Cryptographic Personas: Responsible Pseudonyms Without De-Anonymization Rachel Thomas, Oliwia Kempinski, Hari Kailad, Emma Margaret Shroyer, Ian Miers, Gabriel Kaptchuk
2025/1968 (PDF ) TAPAS: Datasets for Learning the Learning with Errors Problem Eshika Saxena, Alberto Alfarano, François Charton, Emily Wenger, Kristin Lauter
2025/1967 (PDF ) Linear-time and Logarithmically-sound Permutation and Multiset SNARKs Bing-Jyue Chen, Lilia Tang, David Heath, Daniel Kang
2025/1966 (PDF ) DPA-Style Attacks on HQC Zhuo Huang, Weijia Wang, Xiaogang Zhou, Yu Yu
2025/1965 (PDF ) Auntie: Unobservable Contracts from Zerocash and Trusted Execution Environments Adrian Cinal
2025/1964 (PDF ) Generic PVSS Framework with $O(1)$ Complexity Using CCA2-Secure Threshold Encryption Liang Zhang, Dongliang Cai, Yiwen Gao, Haibin Kan, Jiheng Zhang, Moti Yung
2025/1963 (PDF ) Germany Is Rolling Out Nation-Scale Key Escrow And Nobody Is Talking About It Jan Sebastian Götte
2025/1962 (PDF ) High Fidelity Security Mesh Monitoring using Low-Cost, Embedded Time Domain Reflectometry Jan Sebastian Götte, Björn Scheuermann
2025/1961 (PDF ) Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws Adrian Cinal, Przemysław Kubiak, Mirosław Kutyłowski, Gabriel Wechta
2025/1960 (PDF ) Multiple Rows Mixers and Hsilu - A Family of Linear Layers and A Permutation with Fewer XORs Xiaobin Yu, Meicheng Liu
2025/1959 (PDF ) On the Communication Complexity of PSM and CDS for Symmetric Functions Reo Eriguchi
2025/1958 (PDF ) A Lattice-Based IND-CCA Threshold KEM from the BCHK+ Transform Oleksandra Lapiha, Thomas Prest
2025/1957 (PDF ) Fast Batch Matrix Multiplication in Ciphertexts Jung Hee Cheon, Minsik Kang, Junho Lee
2025/1956 (PDF ) A Chosen-Ciphertext Side-Channel Attack on Shuffled CRYSTALS-Kyber Hao Zhang, Zewen Ye, Teng Wang, Yuanming Zhang, Tianyu Wang, Chengxuan Wang, Kejie Huang
2025/1955 (PDF ) Aggregate Signatures Tightly Secure under Adaptive Corruptions Yusuke Sakai
2025/1954 (PDF ) Neural Leakage Model: Correlation Power Analysis with Profiled Leakage Model using Deep Neural Networks Trevor Yap, Shivam Bhasin, Liu Zhang
2025/1953 (PDF ) Adaptively Secure Partially Non-Interactive Threshold Schnorr Signatures in the AGM Renas Bacho, Yanbo Chen, Julian Loss, Stefano Tessaro, Chenzhi Zhu
2025/1952 (PDF ) KPIR-C: Keyword PIR with Arbitrary Server-side Computation Ali Arastehfard, Weiran Liu, Qixian Zhou, Zinan Shen, Liqiang Peng, Lin Qu, Shuya Feng, Yuan Hong
2025/1951 (PDF ) What is Cryptography Hiding from Itself? Diego F. Aranha, Nikolas Melissaris
2025/1950 (PDF ) Fully Adaptive FROST in the Algebraic Group Model From Falsifiable Assumptions Ruben Baecker, Paul Gerhart, Davide Li Calsi, Luigi Russo, Dominique Schröder, Arkady Yerukhimovich
2025/1949 (PDF ) On the Credibility of Deniable Communication in Court Jacob Leiken, Sunoo Park
2025/1948 (PDF ) Feedback Lunch: Deep Feedback Codes for Wiretap Channels Yingyao Zhou, Natasha Devroye, Onur Günlü
2025/1947 (PDF ) Minicrypt PRFs Do Not Admit Black-Box Oblivious Evaluations Cruz Barnum, Mohammad Hajiabadi, David Heath, Jake Januzelli, Naman Kumar, Mike Rosulek
2025/1946 (PDF ) Robust and Scalable Lattice-Based Distributed Key Generation for Asynchronous Networks Linghe Yang, Jian Liu, Jingyi Cui, Guangquan Xu, Zhongshan Li, Lei Zhang, Mingzi Zuo, Kaitai Liang
2025/1945 (PDF ) So about that Quantum Lattice Thing: Rebuttal to "Exact Coset Sampling for Quantum Lattice Algorithms" Daniel Apon
2025/1944 (PDF ) Architectural Leakage Analysis of Masked Cryptographic Software on RISC-V Cores Siddhartha Chowdhury, Nimish Mishra, Sarani Bhattacharya, Debdeep Mukhopadhyay
2025/1943 (PDF ) Circuit-Succinct Algebraic Batch Arguments from Projective Functional Commitments David Balbás, Dario Fiore, Russell W. F. Lai
2025/1942 (PDF ) Privacy-Preserving Shape Matching with Leveled Homomorphic Encryption Agha Aghayev, Yadigar Imamverdiyev
2025/1941 (PDF ) Adaptively-Secure Three-Round Threshold Schnorr from DL Guilhem Niot, Michael Reichle, Kaoru Takemure
2025/1940 (PDF ) GPV Preimage Sampling with Weak Smoothness and Its Applications to Lattice Signatures Shiduo Zhang, Huiwen Jia, Delong Ran, Yang Yu, Yu Yu, Xiaoyun Wang
2025/1939 (PDF ) Efficient Polynomial Multiplication for HQC on ARM Cortex-M4 Jihoon Jang, Myeonghoon Lee, Donggeun Kwon, Seokhie Hong, Suhri Kim, Sangjin Lee
2025/1938 (PDF ) zk-Cookies: Continuous Anonymous Authentication for the Web Alexander Frolov, Hal Triedman, Ian Miers
2025/1937 (PDF ) Noisy Function Secret Sharing and its applications to Differentially Private computations Marc Damie, Federico Mazzone, Florian Hahn, Andreas Peter, Jan Ramon
2025/1936 (PDF ) Overshooting the Threshold: ($td+n$)-Masking Vincent Grosso, Carlos Andres Lara-Nino
2025/1935 (PDF ) Fully Homomorphic Encryption for Matrix Arithmetic Craig Gentry, Yongwoo Lee
2025/1934 (PDF ) HORCRUX - A Lightweight PQC-RISC-V eXtension Architecture Alessandra Dolmeta, Valeria Piscopo, Guido Masera, Maurizio Martina, Michael Hutter
2025/1933 (PDF ) Revisiting Multi-Key Blind Rotation: Optimized NTRU-based Bootstrapping for MKFHE Xiaohan Wan, Mingqiang Wang, Xiaopeng Cheng, Haiyang Xue, Qi Zhang
2025/1932 (PDF ) Decoding Balanced Linear Codes With Preprocessing Andrej Bogdanov, Rohit Chatterjee, Yunqi Li, Prashant Nalini Vasudevan
2025/1931 (PDF ) Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin
2025/1930 (PDF ) Attention is still what you need: Another Round of Exploring Shoup’s GGM Taiyu Wang, Cong Zhang, Hong-Sheng Zhou, Xin Wang, Pengfei Chen, Wenli Wang, Kui Ren, Chun Chen
2025/1929 (PDF ) Cryptanalysis of a Post-Quantum Signature Scheme Based on Number-Theoretic Assumptions Agha Aghayev, Nour-eddine Rahmani
2025/1928 (PDF ) Optimizing the Post Quantum Signature Scheme CROSS for Resource Constrained Devices Jonas Schupp, Marco Gianvecchio, Alessandro Barenghi, Patrick Karl, Gerardo Pelosi, Georg Sigl
2025/1927 (PDF ) Accelerating LWE-Based Post-Quantum Cryptography with Approximate Computing Diamante Simone CRESCENZO, Emanuele VALEA, Alberto BOSIO
2025/1926 (PDF ) Hashing-friendly elliptic curves Dimitri Koshelev
2025/1925 (PDF ) Improved Modeling for Substitution Boxes with Negative Samples and Beyond (Extended Version) Debranjan Pal, Anubhab Baksi, Surajit Mandal, Santanu Sarkar
2025/1924 (PDF ) Golden: Lightweight Non-Interactive Distributed Key Generation Benedikt Bünz, Kevin Choi, Chelsea Komlo
2025/1923 (PDF ) Coil-Based Detection and Concurrent Error Correction Against EMFI - An Experimental Case-Study on a Prototype ASIC Felix Uhle, Nicolai Müller, Thorben Moos, Philipp Günther, Amir Moradi
2025/1922 (PDF ) Guaranteeing a Dishonest Party’s Knowledge (Or: Setup Requirements for Deniable Authentication) Nils Fleischhacker, Guilherme Rito
2025/1921 (PDF ) Multi-Copy Security in Unclonable Cryptography Alper Çakan, Vipul Goyal, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2025/1920 (PDF ) ALFOMs and the Moirai: Quantifying the Performance/Security Tradeoff for ZK-friendly Hash Functions Aurélien Boeuf, Léo Perrin
2025/1919 (PDF ) UPPR: Universal Privacy-Preserving Revocation Leandro Rometsch, Philipp-Florens Lehwalder, Anh-Tu Hoang, Dominik Kaaser, Stefan Schulte
2025/1918 (PDF ) Differential-MITM Attack on 14-round ARADI Shibam Ghosh, Bastien Michel, María Naya-Plasencia
2025/1917 (PDF ) Embedding belief propagation within a multi-task learning model : An example on Kyber's NTT Thomas Marquet, Elisabeth Oswald
2025/1916 (PDF ) Graeffe-Based Attacks on Poseidon and NTT Lower Bounds Ziyu Zhao, Antonio Sanso, Giuseppe Vitto, Jintai Ding
2025/1915 (PDF ) A Framework for Efficient Quantum Implementations of Linear Layers Kyungbae Jang, Anubhab Baksi, Hwajeong Seo
2025/1914 (PDF ) A Note on ``Designing Anonymous Signature-Based Identity Authentication Scheme for Ocean Multilevel Transmission'' Zhengjun Cao, Lihua Liu
2025/1913 (PDF ) Unambiguous SNARGs for P from LWE with Applications to PPAD Hardness Liyan Chen, Cody Freitag, Zhengzhong Jin, Daniel Wichs
2025/1912 (PDF ) Quasar: Sublinear Multi-Cast Commitment Mixing in Recursive Accumulation Tianyu Zheng, Shang Gao, Sherman S. M. Chow, Yu Guo, Bin Xiao
2025/1911 (PDF ) Differential Meet-in-the-Middle Attacks on Feistel Ciphers Bastien Michel, Dounia M'foukh, María Naya-Plasencia
2025/1910 (PDF ) Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical Alexander Karenin, Elena Kirshanova, Alexander May, Julian Nowakowski
2025/1909 (PDF ) Weak Instances of the Two Matrix Code Equivalence Problem Jesús-Javier Chi-Domínguez
2025/1908 (PDF ) MPCitH Signature from Restricted Syndrome Decoding Michele Battagliola, Ethan Y. Chen, Hugo Sauerbier Couvée, Violetta Weger
2025/1907 (PDF ) Introducing GRAFHEN: GRoup-bAsed Fully Homomorphic Encryption without Noise Pierre Guillot, Auguste Hoang Duc, Michel Koskas, Florian Méhats
2025/1906 (PDF ) A Simple and Efficient One-Shot Signature Scheme Andrew Huang, Vinod Vaikuntanathan
2025/1905 (PDF ) Symphony: Scalable SNARKs in the Random Oracle Model from Lattice-Based High-Arity Folding Binyi Chen
2025/1904 (PDF ) Predicting Module-Lattice Reduction Léo Ducas, Lynn Engelberts, Paola de Perthuis
2025/1903 (PDF ) Serval: Slack-Free ℓ2-Sound Polynomial Commitments from Lattices Lizhen Zhang, Sherman S. M. Chow, Shang Gao, Bin Xiao
2025/1902 (PDF ) Multi-Party Functional Encryption (MPFE): A tool in the distributed and decentralized world Ruxandra F. Olimid
2025/1901 (PDF ) Towards formal verification and corrupted setup security for the SwissPost voting system Sevdenur Baloglu, Sergiu Bursuc, Reynaldo Gil-Pons, Sjouke Mauw
2025/1900 (PDF ) Beholder Signatures Stefan Dziembowski, Sebastian Faust, Paweł Kędzior, Marcin Mielniczuk, Susil Kumar Mohanty, Krzysztof Pietrzak
2025/1899 (PDF ) CoupledNets: Resisting Feature Snooping Attacks on Neural Processing Units through Noise Injection into Models Sachintha Kavishan Jayarathne, Seetal Potluri
2025/1898 (PDF ) Unique NIZKs and Steganography Detection Willy Quach, LaKyah Tyner, Daniel Wichs
2025/1897 (PDF ) Dynark: Making Groth16 Dynamic Tianyu Zhang, Yupeng Ouyang, Yupeng Zhang
2025/1896 (PDF ) An Approach to Computable Contracts with Verifiable Computation Outsourcing and Blockchain Transactions Carlo Brunetta, Amit Chaudhary, Stefano Galatolo, Massimiliano Sala
2025/1895 (PDF ) Differential Fault Attacks on MQOM, Breaking the Heart of Multivariate Evaluation Vladimir Sarde, Nicolas Debande
2025/1894 (PDF ) Bounded-Equivocable Pseudorandom Functions Paul Gerhart, Davide Li Calsi, Luigi Russo, Dominique Schröder
2025/1893 (PDF ) Poseidon(2)b: Binary Field Versions of Poseidon/Poseidon2 Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Markus Schofnegger, Verena Schröppel, Zhuo Wu
2025/1892 (PDF ) Optimizing FHEW-Like Homomorphic Encryption Schemes with Smooth Performance-Failure Trade-Offs Deokhwa Hong, Yongwoo Lee
2025/1891 (PDF ) Fraud Mitigation in Privacy-Preserving Attribution Rutchathon Chairattana-Apirom, Stefano Tessaro, Nirvan Tyagi
2025/1890 (PDF ) Cryptanalysis on Lightweight Verifiable Homomorphic Encryption Jung Hee Cheon, Daehyun Jang
2025/1889 (PDF ) Gluing Random Unitaries with Inverses and Applications to Strong Pseudorandom Unitaries Prabhanjan Ananth, John Bostanci, Aditya Gulati, Yao-Ting Lin
2025/1888 (PDF ) HCTR2-FP and HCTR3-FP: Format-Preserving Encryption from Wide-Block Ciphers Frank Denis
2025/1887 (PDF ) Parallel Spooky Pebbling Makes Regev Factoring More Practical Gregory D. Kahanamoku-Meyer, Seyoon Ragavan, Katherine Van Kirk
2025/1886 (PDF ) Blind Signatures from Arguments of Inequality Michael Klooß, Russell W. F. Lai, Michael Reichle
2025/1885 (PDF ) Correction Fault Attack on CROSS under Unknown Bit Flips Sönke Jendral, Elena Dubrova, Qian Guo, Thomas Johansson
2025/1884 (PDF ) PERSEUS – Probabilistic Evaluation of Random probing SEcurity Using efficient Sampling Sonia Belaïd, Gaëtan Cassiers
2025/1883 (PDF ) On the security of two blind signatures from code equivalence problems Valerie Gilchrist, Laurane Marco, Christophe Petit, Gang Tang
2025/1882 (PDF ) MATCHI: formal verification of hardware private circuits Gaëtan Cassiers
2025/1881 (PDF ) Making Post Quantum Key Exchange Efficient: An Implementation with the MLS Protocol Noah Greene, Britta Hale
2025/1880 (PDF ) Copy-Protection from Unclonable Puncturable Obfuscation, Revisited Prabhanjan Ananth, Amit Behera, Zikuan Huang, Fuyuki Kitagawa, Takashi Yamakawa
2025/1879 (PDF ) A Minrank-based Encryption Scheme à la Alekhnovich-Regev Thomas Debris-Alazard, Philippe Gaborit, Romaric Neveu, Olivier Ruatta
2025/1878 (PDF ) MIRANDA: short signatures from a leakage-free full-domain-hash scheme Alain Couvreur, Thomas Debris-Alazard, Philippe Gaborit, Adrien Vinçotte
2025/1877 (PDF ) Binary Codes for Computationally Bounded Errors Under Standard Crypto Assumptions George Lu, Jad Silbak, Daniel Wichs
2025/1876 (PDF ) SoK: Lookup Table Arguments Hossein Hafezi, Gaspard Anthoine, Matteo Campanelli, Dario Fiore
2025/1875 (PDF ) Generic-compatible distinguishers for linear regression based attacks Sana Boussam
2025/1874 (PDF ) 0-ART. Asynchronous and Verifiable Group Management for Decentralized Applications Yevhen Hrubiian, Illia Melnyk, Volodymyr Dubinin, Oleksandr Kurbatov, Serhii Volynets, Roman Perebynos, Yevhenii Serdiukov
2025/1873 (PDF ) Threshold Reporting Protocol for Traceability in Anonymous Social Networks Olivier Blazy, Lola-Baie Mallordy
2025/1872 (PDF ) Interoperable Symmetric Message Franking Carolina Ortega Pérez, Thomas Ristenpart, Julia Len
2025/1871 (PDF ) A Unified Approach to Quantum Key Leasing with a Classical Lessor Fuyuki Kitagawa, Jiahui Liu, Shota Yamada, Takashi Yamakawa
2025/1870 (PDF ) Lookup-Table Evaluation over Key-Homomorphic Encodings and KP-ABE for Nonlinear Operations Sora Suegami, Enrico Bottazzi
2025/1869 (PDF ) Just How Secure is SRP, Really? Jiayu Xu, Zhiyuan Zhao
2025/1868 (PDF ) Is the Hard-Label Cryptanalytic Model Extraction Really Polynomial? Akira Ito, Takayuki Miura, Yosuke Todo
2025/1867 (PDF ) Vectorized Falcon-Sign Implementations using SSE2, AVX2, AVX-512F, NEON, and RVV Jipeng Zhang, Jiaheng Zhang
2025/1866 (PDF ) Succinct Line-Point Zero-Knowledge Arguments from Homomorphic Secret Sharing Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan, Mengmeng Zhou
2025/1865 (PDF ) High-Throughput AES Transciphering using CKKS: Less than 1ms Youngjin Bae, Jung Hee Cheon, Minsik Kang, Taeseong Kim
2025/1864 (PDF ) Black-Box Separation Between Pseudorandom Unitaries, Pseudorandom Isometries, and Pseudorandom Function-Like States Aditya Gulati, Yao-Ting Lin, Tomoyuki Morimae, Shogo Yamada
2025/1863 (PDF ) On Limits on the Provable Consequences of Quantum Pseudorandomness Samuel Bouaziz--Ermann, Minki Hhan, Garazi Muguruza, Quoc-Huy Vu
2025/1862 (PDF ) CuKEM: A Concise and Unified Hybrid Key Encapsulation Mechanism Yiting Liu, Biming Zhou, Haodong Jiang
2025/1861 (PDF ) FrodoKEM: A CCA-Secure Learning With Errors Key Encapsulation Mechanism Lewis Glabush, Patrick Longa, Michael Naehrig, Chris Peikert, Douglas Stebila, Fernando Virdia
2025/1860 (PDF ) On the generalized Schönhage-type bound Theophilus Agama
2025/1859 (PDF ) qt-Pegasis: Simpler and Faster Effective Class Group Actions Pierrick Dartois, Jonathan Komada Eriksen, Riccardo Invernizzi, Frederik Vercauteren
2025/1858 (PDF ) Testing Security Equivalence in the Random Probing Model Anna Guinet, Carina Graw, Lukas Koletzko, Jan Richter-Brockmann, Holger Dette, Tim Güneysu
2025/1857 (PDF ) On the Quantum Equivalence between S|LWE⟩ and ISIS André Chailloux, Paul Hermouet
2025/1856 (PDF ) Optimal Good-Case Latency for Sleepy Consensus Yuval Efron, Joachim Neu, Ling Ren, Ertem Nusret Tas
2025/1855 (PDF ) Less is More: On Copy Complexity in Quantum Cryptography Prabhanjan Ananth, Eli Goldin
2025/1854 (PDF ) Credential Revocation Assisted by a Covertly Corrupted Server Alisa Pankova, Jelizaveta Vakarjuk
2025/1853 (PDF ) Compact, Efficient and CCA-Secure Updatable Encryption from Isogenies Antonin Leroux, Maxime Roméas
2025/1852 (PDF ) A Gaussian Leftover Hash Lemma for Modules over Number Fields Martin R. Albrecht, Joël Felderhoff, Russell W. F. Lai, Oleksandra Lapiha, Ivy K. Y. Woo
2025/1851 (PDF ) Locally Recoverable Data Availability Sampling Seunghyun Cho, Eunyoung Seo, Young-Sik Kim
2025/1850 (PDF ) Linear*-Time Permutation Check Benedikt Bünz, Jessica Chen, Zachary DeStefano
2025/1849 (PDF ) CoBBl: Dynamic constraint generation for SNARKs Kunming Jiang, Fraser Brown, Riad S. Wahby
2025/1848 (PDF ) Revisiting Lattice-based Non-interactive Blind Signature Anindya Ganguly, Angshuman Karmakar, Suparna Kundu, Debranjan Pal, Sumanta Sarkar
2025/1847 (PDF ) Security Analysis of Privately Verifiable Privacy Pass Konrad Hanff, Anja Lehmann, Cavit Özbay
2025/1846 (PDF ) The Order of Hashing in Fiat-Shamir Schemes Barbara Jiabao Benedikt, Marc Fischlin
2025/1845 (PDF ) HE-based On-the-Fly MPC, Revisited: Universal Composability, Approximate and Imperfect Computation, Circuit Privacy Ganyuan Cao, Sylvain Chatel, Christian Knabenhans
2025/1844 (PDF ) Bird of Prey: Practical Signature Combiners Preserving Strong Unforgeability Jonas Janneck
2025/1843 (PDF ) Efficiency Improvements for Signal's Handshake Protocol Barbara Jiabao Benedikt, Sebastian Clermont, Marc Fischlin, Tobias Schmalz
2025/1842 (PDF ) Collusion-Resistant Quantum Secure Key Leasing Beyond Decryption Fuyuki Kitagawa, Ryo Nishimaki, Nikhil Pappu
2025/1841 (PDF ) Pegasus and PegaRing: Efficient (Ring) Signatures from Sigma-Protocols for Power Residue PRFs with (Q)ROM Security Xinyu Zhang, Ziyi Li, Ron Steinfeld, Raymond K. Zhao, Joseph K. Liu, Tsz Hon Yuen
2025/1840 (PDF ) Quantum Cryptography and Hardness of Non-Collapsing Measurements Tomoyuki Morimae, Yuki Shirakawa, Takashi Yamakawa
2025/1839 (PDF ) Lattice-Based zk-SNARKs with Hybrid Verification Technique Supriya Adhikary, Puja Mondal, Angshuman Karmakar
2025/1838 (PDF ) Fault to Forge: Fault Assisted Forging Attacks on LESS Signature Scheme Puja Mondal, Suparna Kundu, Hikaru Nishiyama, Supriya Adhikary, Daisuke Fujimoto, Yuichi Hayashi, Angshuman Karmakar
2025/1837 (PDF ) Proofs of quantum memory Minki Hhan, Tomoyuki Morimae, Yasuaki Okinaka, Takashi Yamakawa
2025/1836 (PDF ) On the Security of LOL-MINI and LOL-DOUBLE against Correlation Attacks Yang Liu, Zhen Shi, Chenhui Jin, Jiyan Zhang, Ting Cui, Dengguo Feng
2025/1835 (PDF ) Who Verifies the Verifiers? Lessons Learned From Formally Verified Line-Point Zero-Knowledge Sabine Oechsner, Vitor Pereira, Peter Scholl
2025/1834 (PDF ) Ajax: Fast Threshold Fully Homomorphic Encryption without Noise Flooding Zhenkai Hu, Haofei Liang, Xiao Wang, Xiang Xie, Kang Yang, Yu Yu, Wenhao Zhang
2025/1833 (PDF ) Public-Key Encryption from the MinRank Problem Rohit Chatterjee, Changrui Mu, Prashant Nalini Vasudevan
2025/1832 (PDF ) Can Quantum Break ZUC? Only with a Million Qubits and a Billion Years to Spare Anik Basu Bhaumik, Suman Dutta, Siyi Wang, Anubhab Baksi, Kyungbae Jang, Amit Saha, Hwajeong Seo, Anupam Chattopadhyay
2025/1831 (PDF ) Authenticated Garbling with Tensor Gates David Heath, Nakul Khambhati, Rafail Ostrovsky, Turan Vural
2025/1830 (PDF ) A New Approach to Improved PNB-based Attacks on Reduced-round ChaCha and Salsa Goutam Paul, Anup Kumar Kundu, Sucheta Chakrabarti
2025/1829 (PDF ) On the Limits of Consensus under Dynamic Availability and Reconfiguration Joachim Neu, Javier Nieto, Ling Ren
2025/1828 (PDF ) Block-Accumulate Codes: Accelerated Linear Codes for PCGs and ZK Vladimir Kolesnikov, Stanislav Peceny, Rahul Rachuri, Srinivasan Raghuraman, Peter Rindal, Harshal Shah
2025/1827 (PDF ) Blind ECDSA from the ECDSA Assumption Jules Maire, Alan Pulval-Dady
2025/1826 (PDF ) Proofs of No Intrusion Vipul Goyal, Justin Raizes
2025/1825 (PDF ) Quantumly Computing S-unit Groups in Quantified Polynomial Time and Space Koen de Boer, Joël Felderhoff
2025/1824 (PDF ) Coppercloud: Blind Server-Supported RSA Signatures Nikita Snetkov, Jelizaveta Vakarjuk, Alisa Pankova
2025/1823 (PDF ) A unified theoretical framework for steganography: balancing reliability, security and robustness Daniele Ballo
2025/1822 (PDF ) Solving one-sided linear systems over symmetrized and supertropical semirings Sulaiman Alhussaini, Serge˘ı Sergeev
2025/1821 (PDF ) Extending Mental Poker Donald Beaver
2025/1820 (PDF ) On the Plaintext Awareness of AEAD Schemes Mario Marhuenda Beltrán, Mustafa Khairallah
2025/1819 (PDF ) New Straight-Line Extractable NIZKPs for Cryptographic Group Actions Andrea Flamini, Federico Pintore, Edoardo Signorini, Giovanni Tognolini
2025/1818 (PDF ) Simulation-based Security Notion of Correlation Robust Hashing with Applications to MPC Hongrui Cui, Chun Guo, Xiaojie Guo, Xiao Wang, Kang Yang, Yu Yu
2025/1817 (PDF ) Improved Search-to-Decision Reduction for Random Local Functions Kel Zin Tan, Prashant Nalini Vasudevan
2025/1816 (PDF ) Pool: A Practical OT-based OPRF from Learning with Rounding Alex Davidson, Amit Deo, Louis Tremblay Thibault
2025/1815 (PDF ) Efficient Multiparty Private Simultaneous Messages for Symmetric Functions Reo Eriguchi, Kazumasa Shinagawa
2025/1814 (PDF ) SoK: Is Proof-of-Useful-Work Really Useful? Pratyush Dikshit, Ashkan Emami, Johannes Sedlmeir, Gilbert Fridgen
2025/1813 (PDF ) Two-party ECDSA Signing at Constant Communication Overhead Yashvanth Kondi
2025/1812 (PDF ) Better Bounds for Finding Fixed-Degree Isogenies via Coppersmith’s Method Marius A. Aardal, Diego F. Aranha, Yansong Feng, Yiming Gao, Yanbin Pan
2025/1811 (PDF ) Anchored Merkle Range Proof for Pedersen Commitments Leona Hioki
2025/1810 (PDF ) BitGC Made (More) Efficient Wenhao Zhang, Hanlin Liu, Kang Yang, Wen-jie Lu, Yu Yu, Xiao Wang, Chenkai Weng
2025/1809 (PDF ) On the Security of Linear Secret Sharing with General Noisy Side-Channel Leakage Utkarsh Gupta, Hessam Mahdavifar
2025/1808 (PDF ) Variables for Free: Fault Injection Attack on MAYO via Valid Solutions Yadi Zhong
2025/1807 (PDF ) Traceable Ring Signatures Revisited: Extended Definitions, $O(1)$ Tracing, and Efficient Log-Size Constructions Xiangyu Liu
2025/1806 (PDF ) Improved Integral Attack on ChiLow-32 Exploiting the Inverse of the ChiChi Function Akram Khalesi, Zahra Ahmadian, Hosein Hadipour
2025/1805 (PDF ) DDH-based schemes for multi-party Function Secret Sharing Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon
2025/1804 (PDF ) HERDS: : Multi-Key Fully Homomorphic Encryption with Sublinear Bootstrapping Binwu Xiang, Seonhong Min, Intak Hwang, Zhiwei Wang, Haoqi He, Yuanju Wei, Kang Yang, Jiang Zhang, Yi Deng, Yu Yu
2025/1803 (PDF ) Concretely-Efficient Multi-Key Homomorphic Secret Sharing and Applications Kaiwen He, Sacha Servan-Schreiber, Geoffroy Couteau, Srinivas Devadas
2025/1802 (PDF ) Zyga: Optimized Zero-Knowledge Proofs with Dynamic Public Inputs Tiago A. O. Alves, Vitor Py Braga
2025/1801 (PDF ) Quantum Circuit Implementation and Resource Analysis of AIM2 Gyeongju Song, Kyungbae Jang, Seyoung Yoon, Minwoo Lee, Hwajeong Seo
2025/1800 (PDF ) Constructions of Efficiently Implementable Boolean Functions with Provable Nonlinearity/Resiliency/Algebraic Immunity Trade-Offs Palash Sarkar
2025/1799 (PDF ) Unforgettable Fuzzy Extractor: Practical Construction and Security Model Oleksandr Kurbatov, Dmytro Zakharov, Lasha Antadze, Victor Mashtalyar, Roman Skovron, Volodymyr Dubinin
2025/1798 (PDF ) Threshold Blind Signatures from CDH Michael Reichle, Zoé Reinke
2025/1797 (PDF ) An efficient quantum algorithm for computing $S$-units and its applications Jean-François Biasse, Fang Song
2025/1796 (PDF ) Efficient Fuzzy PSI Based on Prefix Representation Chengrui Dang, Xv Zhou, Bei Liang
2025/1795 (PDF ) No Honor Among Crooks: Non-transferable Anonymous Tokens from Betrayability David Kretzler, Yong Li
2025/1794 (PDF ) Going Faster: Privacy-Preserving Shortest paths from Start to End Vincent Ehrmanntraut, Ulrike Meyer
2025/1793 (PDF ) A note on the soundness of an optimized $\mathsf{gemini}$ variant Ariel Gabizon, Nishat Koti
2025/1792 (PDF ) Zero-Downtime Post-Quantum TLS 1.3 Migration: A Bridge-Server-Based Approach Minjoo Sim, Subin Jo, Hyuntae Song, Eunseong Kim, Hwajeong Seo
2025/1791 (PDF ) High-Speed 16-Radix Polynomial Multiplication on ARM Cortex-M4 with Recursive Karatsuba Layers Minjoo Sim, Hyunjun Kim, Minwoo Lee, Hwajeong Seo
2025/1790 (PDF ) CA-MCPQ: A Context-Aware Post-Quantum Protocol for AI Agent Integrity and Security Seyoung Yoon, Hyunji Kim, Hwajeong Seo
2025/1789 (PDF ) Olingo: Threshold Lattice Signatures with DKG and Identifiable Abort Kamil Doruk Gur, Patrick Hough, Jonathan Katz, Caroline Sandsbråten, Tjerand Silde
2025/1788 (PDF ) Just Guess: Improved (Quantum) Algorithm for the Underdetermined MQ problem Alexander May, Massimo Ostuzzi, Henrik Ressler
2025/1787 (PDF ) Four-round Statistical Non-malleable Zero-knowledge Susumu Kiyoshima
2025/1786 (PDF ) Leveraging Discrete CKKS to Bootstrap in High Precision Hyeongmin Choe, Jaehyung Kim, Damien Stehlé, Elias Suvanto
2025/1785 (PDF ) On the Limitations of Pseudorandom Unitaries Prabhanjan Ananth, Aditya Gulati, Yao-Ting Lin
2025/1784 (PDF ) Pseudorandom Unitaries in the Haar Random Oracle Model Prabhanjan Ananth, John Bostanci, Aditya Gulati, Yao-Ting Lin
2025/1783 (PDF ) Seedless Condensers for Efficiently Samplable Sources Cody Freitag, Jad Silbak, Daniel Wichs
2025/1782 (PDF ) On Verifiable Delay Functions from Time-Lock Puzzles Hamza Abusalah, Karen Azari, Dario Fiore, Chethan Kamath, Erkan Tairi
2025/1781 (PDF ) High-Throughput Universally Composable Threshold FHE Decryption Guy Zyskind, Doron Zarchy, Max Leibovich, Chris Peikert
2025/1780 (PDF ) There are siblings of $\chi$ which are permutations for $n$ even Björn Kriepke, Gohar Kyureghyan
2025/1779 (PDF ) Computing the Restricted Algebraic Immunity, and Application to Weightwise Perfectly Balanced Functions. Luca Bonamino, Pierrick Méaux
2025/1778 (PDF ) Unified Approach to UOV-like Multivariate Signature Schemes Peigen Li, Hao Guo, Jintai Ding
2025/1777 (PDF ) Optimizing NCC-Sign for ARMv8 Minwoo Lee, Minjoo Sim, Siwoo Eum, Gyeongju Song, Hwajeong Seo
2025/1775 (PDF ) Homomorphic Encryption Methods Applied to Cloud Computing: A Practical Architecture for Elastic, Verifiable Confidential Compute Rama Yadavalli, Jeffery Solomon, Vrinda Sharma
2025/1774 (PDF ) Adaptive-Controlled Mutual TLS for Large Language Model Systems Lui Zheng, Roger Zhu, Amit Agrawal, Carol Lamore
2025/1773 (PDF ) Impossibility of VDFs in the ROM: The Complete Picture Hamza Abusalah, Karen Azari, Chethan Kamath, Erkan Tairi, Maximilian von Consbruch
2025/1772 (PDF ) Multiple Concurrent Proposers: Why and How Pranav Garimidi, Joachim Neu, Max Resnick
2025/1771 (PDF ) Batched & Non-interactive Blind Signatures from Lattices Foteini Baldimtsi, Rishab Goyal, Aayush Yadav
2025/1770 (PDF ) On the Security of SL-DNSSEC Aditya Singh Rawat, Mahabir Prasad Jhanwar
2025/1769 (PDF ) Average-Case Complexity of Quantum Stabilizer Decoding Andrey Boris Khesin, Jonathan Z. Lu, Alexander Poremba, Akshar Ramkumar, Vinod Vaikuntanathan
2025/1768 (PDF ) DualMatrix: Conquering zkSNARK for Large Matrix Multiplication Mingshu Cong, Tsz Hon Yuen, Siu-Ming Yiu
2025/1767 (PDF ) Polylogarithmic Polynomial Commitment Scheme over Galois Rings Zhuo Wu, Xinxuan Zhang, Yi Deng, Yuanju Wei, Zhongliang Zhang, Liuyu Yang
2025/1766 (PDF ) Eliminating Exponential Key Growth in PRG-Based Distributed Point Functions Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon
2025/1765 (PDF ) Untelegraphable Encryption and its Applications Jeffrey Champion, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
2025/1764 (PDF ) Keccacheck: towards a SNARK friendly Keccak Marcin Kostrzewa, Matthew Klein, Ara Adkins, Grzegorz Świrski, Wojciech Żmuda
2025/1763 (PDF ) A High Throughput Kyber NTT Jonas Bertels, Ingrid Verbauwhede
2025/1762 (PDF ) Threshold Signatures from One-Way Functions Pedro Branco, Giulio Malavolta
2025/1761 (PDF ) Automated Proof for Quadratic Functional Encryption: Finding Attacks and New Constructions Geng Wang, Ruoyi Kong, Dawu Gu
2025/1760 (PDF ) Vive Galois! Part 1: Optimal SIMD Packing and Packed Bootstrapping for FHE Chris Peikert, Zachary Pepin
2025/1759 (PDF ) Plonk is Simulation Extractable in ROM Under Falsifiable Assumptions Helger Lipmaa
2025/1758 (PDF ) Revisiting PQ WireGuard: A Comprehensive Security Analysis With a New Design Using Reinforced KEMs Keitaro Hashimoto, Shuichi Katsumata, Guilhem Niot, Thom Wiggers
2025/1757 (PDF ) New key establishment protocol based on random 1 walks in infinite forest Vasyl Ustimenko, Tymoteusz Chojecki
2025/1756 (PDF ) Are Neural Networks Collision Resistant? Marco Benedetti, Andrej Bogdanov, Enrico M. Malatesta, Marc Mézard, Gianmarco Perrupato, Alon Rosen, Nikolaj I. Schwartzbach, Riccardo Zecchina
2025/1755 (PDF ) DAKE: Bandwidth-Efficient (U)AKE from Double-KEM Hugo Beguinet, Céline Chevalier, Guirec Lebrun, Thomas Legavre, Thomas Ricosset, Maxime Roméas, Éric Sageloli
2025/1754 (PDF ) Machine Learning and Side-Channel Attacks on Post-Quantum Cryptography Abiodun Olaluwe, Nouf Nur Nabilah, Sheikh Tareq, Akshay Raghavendra Kulkarni, Annamalai Annamalai
2025/1753 (PDF ) Bootstrapping over Free $\mathcal{R}$-Module Ruida Wang, Jikang Bai, Yijian Liu, Xinxuan Zhang, Xianhui Lu, Lutan Zhao, Kunpeng Wang, Rui Hou
2025/1752 (PDF ) Foundations of Dynamic Group Signatures: The Case of Malicious Openers and Issuers Stephan Krenn, Kai Samelin, Daniel Slamanig
2025/1751 (PDF ) On the Existence and Construction of Very Strong Elliptic Curves Andrey S. Shchebetov
2025/1750 (PDF ) Modeling Emails: On the Deniability of BCCs Jonas Janneck, Aysan Nishaburi, Guilherme Rito
2025/1749 (PDF ) Sandwich BUFF: Achieving Non-Resignability Using Iterative Hash Functions Serge Fehr, Yu-Hsuan Huang, Julia Kastner
2025/1748 (PDF ) Post-Quantum TLS 1.3 Handshake from CPA-Secure KEMs with Tighter Reductions Jinrong Chen, Biming Zhou, Rongmao Chen, Haodong Jiang, Yi Wang, Xinyi Huang, Yunlei Zhao, Moti Yung
2025/1747 (PDF ) Masked Circuit Compiler in the Cardinal Random Probing Composability Framework Sonia Belaïd, Victor Normand, Matthieu Rivain
2025/1746 (PDF ) Cross-chain Lightning Trades: Getting the Advantages of a Custodial Exchange while Keeping Your Assets Michele Ciampi, Muhammad Ishaq, Rafail Ostrovsky, Ioannis Tzannetos, Vassilis Zikas
2025/1745 (PDF ) Fault Attacks on MPCitH Signature Schemes Harrison Banda, Jan Brinkmann, Juliane Krämer
2025/1744 (PDF ) Randomness beacons from financial data in the presence of an active attacker Daji Landis, Joseph Bonneau
2025/1743 (PDF ) NISQ Security and Complexity via Simple Classical Reasoning Alexandru Cojocaru, Juan Garay, Qipeng Liu, Fang Song
2025/1742 (PDF ) Broadcast Encryption with Size N^1/3 and More from k-Lin Hoeteck Wee
2025/1741 (PDF ) Full L1 On-Chain ZK-STARK+PQC Verification on Solana: A Measurement Study Jotaro Yano
2025/1740 (PDF ) Improved Radix-based Approximate Homomorphic Encryption for Large Integers via Lightweight Bootstrapped Digit Carry Gyeongwon Cha, Dongjin Park, Joon-Woo Lee
2025/1739 (PDF ) Attacking an RSA-like Cryptosystem Using Continued Fractions and Lattices George Teseleanu
2025/1738 (PDF ) Optimal Byzantine Agreement in the Presence of Message Drops Hanwen Feng, Zhenliang Lu, Qiang Tang, Yuchen Ye
2025/1737 (PDF ) WaterSQI and PRISMO: Quaternion Signatures for Supersingular Isogeny Group Actions Tako Boris Fouotsa
2025/1736 (PDF ) Breaking the Barrier for Asynchronous MPC with a Friend Banashri Karmakar, Aniket Kate, Shravani Patil, Arpita Patra, Sikhar Patranabis, Protik Paul, Divya Ravi
2025/1735 (PDF ) Edge Encryption using Iterative Management Framework Manoja Shridhar, Bala Puruvana, Alex Cravill, Joey Wolff
2025/1734 (PDF ) Compressed Permutation Oracles Joseph Carolan
2025/1733 (PDF ) Differentially Private Compression and the Sensitivity of LZ77 Jeremiah Blocki, Seunghoon Lee, Brayan Sebastian Yepes-Garcia
2025/1732 (PDF ) Zero-Knowledge AI Inference with High Precision Arman Riasi, Haodi Wang, Rouzbeh Behnia, Viet Vo, Thang Hoang
2025/1731 (PDF ) ECCFROG522PP: An Enhanced 522-bit Weierstrass Elliptic Curve Vıctor Duarte Melo, William J Buchanan
2025/1730 (PDF ) On the Impossibility of Actively Secure Distributed Samplers Damiano Abram, Serge Fehr, Maciej Obremski, Peter Scholl
2025/1729 (PDF ) GuardianMPC: Backdoor-resilient Neural Network Computation Mohammad Hashemi, Domenic Forte, Fatemeh Ganji
2025/1728 (PDF ) Precision Strike: Targeted Misclassification of Accelerated CNNs with a Single Clock Glitch Arsalan Ali Malik, Furkan Aydin, Aydin Aysu
2025/1727 (PDF ) Rhizomes and the Roots of Efficiency—Improving Prio Armando Faz-Hernandez
2025/1726 (PDF ) How (not) to Build Identity-Based Encryption from Isogenies Elif Ozbay Gurler, Patrick Struck
2025/1725 (PDF ) Blockchain-based Economic Voting with Posterior Security from Lattices Navid Abapour, Amir Goharshady, Catalin Dragan, Mahdi Mahdavi
2025/1724 (PDF ) Efficient Aggregate Anonymous Credentials for Decentralized Identity Rebekah Mercer, Kaoutar El Khiyaoui, Angelo De Caro, Elli Androulaki
2025/1723 (PDF ) Space-Deniable Proofs Jesko Dujmovic, Christoph U. Günther, Krzysztof Pietrzak
2025/1722 (PDF ) From OT to OLE with Subquadratic Communication Jack Doerner, Iftach Haitner, Yuval Ishai, Nikolaos Makriyannis
2025/1721 (PDF ) Q-Stream: A Practical System for Operational Perfect Secrecy Adrian Neal
2025/1720 (PDF ) BATTLE – Bonded Adversarial TournamenT with Logarithmic Escalation Sergio Demian Lerner, Ariel Futoransky
2025/1719 (PDF ) Bribers, Bribers on The Chain, Is Resisting All in Vain? Trustless Consensus Manipulation Through Bribing Contracts Bence Soóki-Tóth, István András Seres, Kamilla Kara, Ábel Nagy, Balázs Pejó, Gergely Biczók
2025/1718 (PDF ) Indistinguishability Obfuscation from Ring Key-Homomorphic Weak PRFs Hart Montgomery, Sikhar Patranabis
2025/1717 (PDF ) Large-Plaintext Functional Bootstrapping in FHE with Small Bootstrapping Keys Kuiyuan Duan, Hongbo Li, Dengfa Liu, Guangsheng Ma
2025/1716 (PDF ) Beyond Shannon: Operational Perfect Secrecy as a Generalised Model for Information-Theoretic Security Adrian Neal
2025/1715 (PDF ) UltraMixer: A Compliant Zero-Knowledge Privacy Layer for Tokenized Real-World Assets Zonglun Li, Hong Kang, Xue Liu
2025/1714 (PDF ) Verifiable PIR with Small Client Storage Mayank Rathee, Keewoo Lee, Raluca Ada Popa
2025/1713 (PDF ) Ilyazh-Web3E2E: A Post-Quantum Hybrid Protocol for Forward-Secure Decentralized Messaging Ilyas Zhaisenbayev
2025/1712 (PDF ) The Syndrome-Space Lens: A Complete Resolution of Proximity Gaps for Reed-Solomon Codes Russell Okamoto
2025/1711 (PDF ) Accelerating FHEW-like Bootstrapping via New Configurations of the Underlying Cryptosystems Han Wang, Ming Luo, Han Xia, Mingsheng Wang, Hanxu Hou
2025/1710 (PDF ) Information-Theoretic Broadcast-Optimal MPC Michele Ciampi, Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov
2025/1709 (PDF ) The zkVot Protocol: A Distributed Computation Protocol for Censorship Resistant Anonymous Voting Yunus Gürlek, Kadircan Bozkurt
2025/1708 (PDF ) The Semantic Holder (SH): Algebraic Extraction for Legal Opposability MINKA MI NGUIDJOI Thierry Emmanuel
2025/1707 (PDF ) Is It Even Possible? On the Parallel Composition of Asynchronous MPC Protocols Ran Cohen, Pouyan Forghani, Juan Garay, Rutvik Patel, Vassilis Zikas
2025/1706 (PDF ) Kani's lemma from Clifford algebra Tomoki Moriya
2025/1705 (PDF ) Security Amplification of Threshold Signatures in the Standard Model Karen Azari, Cecilia Boschini, Kristina Hostáková, Michael Reichle
2025/1704 (PDF ) Data Anonymisation with the Density Matrix Classifier David Garvin, Mattia Fiorentini, Oleksiy Kondratyev, Marco Paini
2025/1703 (PDF ) Updatable Signature from Lattices Haotian Yin, Jie Zhang, Wanxin Li, Yuji Dong, Eng Gee Lim, Dominik Wojtczak
2025/1702 (PDF ) Lattice-Based Group Signatures in the Standard Model, Revisited Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo
2025/1701 (PDF ) BPSec-MLS: Asynchronous Key Agreement for Space Communications Xisen Tian, Paul Westland
2025/1700 (PDF ) Computationally-Sound Symbolic Cryptography in Lean Stefan Dziembowski, Grzegorz Fabiański, Daniele Micciancio, Rafał Stefański
2025/1699 (PDF ) A Constant-Rate Compiler for MPC over Noisy Networks Ran Gelles, Carmit Hazay, Manuj Mukherjee, Jaspal Singh, Arun Yeragudipati, Vassilis Zikas
2025/1698 (PDF ) SNARK Lower Bounds via Communication Complexity Rishabh Bhadauria, Alexander R. Block, Prantar Ghosh, Justin Thaler
2025/1697 (PDF ) Extract Discriminative Features: Profiled Side-Channel Analysis for Cryptosystems Based on Supervised Contrastive Learning Zoushaojie Jiang, An Wang, Yaoling Ding, Annyu Liu, Zheng Liu, Jing Yu, Liehuang Zhu
2025/1696 (PDF ) Threshold ECDSA in Two Rounds Yingjie Lyu, Zengpeng Li, Hong-Sheng Zhou, Xudong Deng
2025/1694 (PDF ) Lattice Reduction via Dense Sublattices: A Cryptanalytic No-Go Léo Ducas, Johanna Loyer
2025/1693 (PDF ) Quasi-perfect (de)compression of elliptic curve points in the highly $2$-adic scenario Dimitri Koshelev, Jordi Pujolàs
2025/1692 (PDF ) Combined Stability: Protecting against Combined Attacks Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov
2025/1691 (PDF ) Pilvi: Lattice Threshold PKE with Small Decryption Shares and Improved Security Valerio Cini, Russell W. F. Lai, Ivy K. Y. Woo
2025/1690 (PDF ) A Tight Quantum Algorithm for Multiple Collision Search Xavier Bonnetain, Johanna Loyer, André Schrottenloher, Yixin Shen
2025/1689 (PDF ) IPCrypt: Optimal, Practical Encryption of IP Addresses for Privacy and Measurement Frank Denis
2025/1688 (PDF ) SUMMER: Recursive Zero-Knowledge Proofs for Scalable RNN Training Yuange Li, Xiong Fan
2025/1687 (PDF ) Web3 Recovery Mechanisms and User Preferences Easwar Vivek Mangipudi, Panagiotis Chatzigiannis, Konstantinos Chalkias, Aniket Kate, Mohsen Minaei, Mainack Mondal
2025/1686 (PDF ) Honest Users Make Honest Mistakes: A Framework for Analysing eID Protocols Ole Martin Edstrøm, Kristian Gjøsteen, Hans Heum, Sjouke Mauw, Felix Stutz
2025/1685 (PDF ) Toss: Garbled PIR from Table-Only Stacking Lucien K. L. Ng, Vladimir Kolesnikov
2025/1684 (PDF ) FHEMaLe: Framework for Homomorphic Encrypted Machine Learning B PRADEEP KUMAR REDDY, SAMEEKSHA GOYAL, RUCHIKA MEEL, Ayantika Chatterjee
2025/1683 (PDF ) Proving the Security of PeerDAS without the AGM Benedikt Wagner, Arantxa Zapico
2025/1682 (PDF ) pod: An Optimal-Latency, Censorship-Free, and Accountable Generalized Consensus Layer Orestis Alpos, Bernardo David, Jakov Mitrovski, Odysseas Sofikitis, Dionysis Zindros
2025/1681 (PDF ) Modular Forms and Hecke Operators for Post-Quantum Cryptography Trey Li
2025/1680 (PDF ) ChipmunkRing: A Practical Post-Quantum Ring Signature Scheme for Blockchain Applications Dmitrii A. Gerasimov
2025/1679 (PDF ) SoK: Connecting the Dots in Privacy-Preserving ML - Systematization of MPC Protocols and Conversions Between Secret Sharing Schemes Martin Zbudila, Ajith Suresh, Hossein Yalame, Omid Mirzamohammadi, Aysajan Abidin, Bart Preneel
2025/1678 (PDF ) Two-Key Variant of the Four-Round Cascading LRW1 Shreya Dey, Avijit Dutta, Kazuhiko Minematsu
2025/1677 (PDF ) Diffie–Hellman Key Exchange from Commutativity to Group Laws Dung Hoang Duong, Youming Qiao, Chuanqi Zhang
2025/1676 (PDF ) Honest Majority Constant-Round MPC with Linear Communication from One-Way Functions Junru Li, Yifan Song
2025/1675 (PDF ) Surtr: Transparent Verification with Simple yet Strong Coercion Mitigation Rosario Giustolisi, Maryam Sheikhi Garjan, Peter Browne Rønne
2025/1674 (PDF ) Secure Rate-Distortion-Perception Trade-Off with Side Information Gustaf Åhlgren, Onur Günlü
2025/1673 (PDF ) Strong Designated Verifier Signatures with Non-delegatability from CSIDH Hiroki Minamide, Keisuke Tanaka, Masayuki Tezuka
2025/1672 (PDF ) All Paths Lead to the Root Théophile Brézot, Chloé Hébant
2025/1671 (PDF ) QKD Oracles for Authenticated Key Exchange Kathrin Hövelmanns, Daan Planken, Christian Schaffner, Sebastian Verschoor
2025/1670 (PDF ) Mixderive: A New Framework of Deriving Linear Approximations and Improved Differential-Linear Distinguishers for ChaCha Zhengting Li, Lin Ding, Xinhai Wang, Jiang Wan
2025/1669 (PDF ) Experience from UNITA Elections: Reconciling Revote, E2E Verifiability and Low Coercion Feng Hao, Luke Harrison, Saverio Veltri, Irene Pugliatti, Chris Sinclair, Gareth Nixon
2025/1668 (PDF ) Post-Quantum Cryptography in Practice: A Literature Review of Protocol-Level Transitions and Readiness Obianuju Egbuagha, Emmanuel Ikwunna
2025/1667 (PDF ) Persistence of Hourglass(-like) Structure: Improved Differential-Linear Distinguishers for Several ARX Ciphers Xinxin Gong, Qingju Wang, Yonglin Hao, Lin Jiao, Xichao Hu
2025/1666 (PDF ) Trout: Two-Round Threshold ECDSA from Class Groups Hila Dahari-Garbian, Ariel Nof, Luke Parker
2025/1665 (PDF ) Threshold Public-Key Encryption: Definitions, Relations, and CPA-to-CCA Transforms Chris Brzuska, Michael Klooß, Ivy K. Y. Woo
2025/1664 (PDF ) Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth Optimization Tarun Yadav, Shweta Singh, Sudha Yadav
2025/1663 (PDF ) IVC in the Open-and-sign Random Oracle Model Mary Maller, Nicolas Mohnblatt, Arantxa Zapico
2025/1662 (PDF ) The Affine One-Wayness (AOW): A Transparent Post-Quantum Temporal Verification via Polynomial Iteration MINKA MI NGUIDJOI Thierry Emmanuel
2025/1661 (PDF ) Distinguishing Goppa codes using higher-order vanishing Andreas Wiemers, Tobias Hemmert
2025/1660 (PDF ) Dory: Streaming PCG with Small Memory Xiaojie Guo, Hanlin Liu, Zhicong Huang, Hongrui Cui, Wenhao Zhang, Cheng Hong, Xiao Wang, Kang Yang, Yu Yu
2025/1659 (PDF ) Hurricane Mixer: The Eye in the Storm—Embedding Regulatory Oversight into Cryptocurrency Mixing Services Zonglun Li, Wangze Ni, Shuhao Zheng, Junliang Luo, Weijie Sun, Lei Chen, Xue Liu, Tianhang Zheng, Zhan Qin, Kui Ren
2025/1658 (PDF ) High-Throughput EdDSA Verification on Intel Processors with Advanced Vector Extensions Bowen Zhang, Hao Cheng, Johann Großschädl, Peter Y. A. Ryan
2025/1657 (PDF ) ORQ: Complex Analytics on Private Data with Strong Security Guarantees Eli Baum, Sam Buxbaum, Nitin Mathai, Muhammad Faisal, Vasiliki Kalavri, Mayank Varia, John Liagouris
2025/1656 (PDF ) Forgetful Encryption Suvradip Chakraborty, Sebastian Faller, Dennis Hofheinz, Kristina Hostáková
2025/1655 (PDF ) Lattice-based Multi-message Multi-recipient KEM/PKE with Malicious Security Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang
2025/1654 (PDF ) Security without Trusted Third Parties: VRF-based Authentication with Short Authenticated Strings Yanqi Gu, Stanislaw Jarecki, Phillip Nazarian, Apurva Rai
2025/1653 (PDF ) Distributed SNARK via folding schemes Zesheng Li, Dongliang Cai, Yimeng Tian, Yihang Du, Xinxuan Zhang, Yi Deng
2025/1652 (PDF ) Computing Pairings on Elliptic Curves with Embedding Degree Two via Biextensions Yuhao Zheng, Jianming Lin, Chang-an Zhao
2025/1651 (PDF ) On the Cardinality of the Walsh Support of a Boolean Function Maxence Jauberty, Pierrick Méaux
2025/1650 (PDF ) WISCH: Efficient data signing via correlated signatures Ariel Futoransky, Ramses Fernandez, Emilio Garcia, Gabriel Larotonda, Sergio Demian Lerner
2025/1649 (PDF ) SQIsign with Fixed-Precision Integer Arithmetic Won Kim, Jeonghwan Lee, Hyeonhak Kim, Changmin Lee
2025/1647 (PDF ) Universally Composable Password-Hardened Encryption Behzad Abdolmaleki, Ruben Baecker, Paul Gerhart, Mike Graf, Mojtaba Khalili, Daniel Rausch, Dominique Schröder
2025/1646 (PDF ) Scalable zkSNARKs for Matrix Computations: A Generic Framework for Verifiable Deep Learning Mingshu Cong, Sherman S. M. Chow, Siu Ming Yiu, Tsz Hon Yuen
2025/1645 (PDF ) Hardened CTIDH: Dummy-Free and Deterministic CTIDH Gustavo Banegas, Andreas Hellenbrand, Matheus Saldanha
2025/1644 (PDF ) Fast Pseudorandom Correlation Functions from Sparse LPN Lennart Braun, Geoffroy Couteau, Kelsey Melissaris, Mahshid Riahinia, Elahe Sadeghi
2025/1643 (PDF ) SCA-GPT: A Generation-Planning-Tool Assisted LLM Agent for Fully Automated Side-Channel Analysis on Cryptosystems Wenquan Zhou, An Wang, Yaoling Ding, Annyu Liu, Jingqi Zhang, Jiakun Li, Liehuang Zhu
2025/1642 (PDF ) Mixed Arithmetic-Binary Circuits in Fluid MPC Against Honest Majority of 4-Party and Its Applications Against Semi-Honest Adversary Furkan Kerim Çabaş, Oğuz Yayla
2025/1641 (PDF ) Fujisaki-Okamoto Transformation under Average-Case Decryption Error: Tighter and More General Proofs with Applications to PQC Jiangxia Ge, Kang Yang, Yang Yu, Yu Yu
2025/1640 (PDF ) On the construction of Barnes-Wall lattices and their application in cryptography Artyom Kuninets, Anton Leevik, Ekaterina Malygina, Evgeniy Melnichuk, Denis Nabokov
2025/1639 (PDF ) Rayls: A Novel Design for CBDCs Mario Yaksetig, Jiayu Xu
2025/1638 (PDF ) Rayls II: Fast, Private, and Compliant CBDCs Mario Yaksetig, Pedro M. F. Pereira, Stephen Yang, Mahdi Nejadgholi, Jiayu Xu
2025/1637 (PDF ) Pseudorandom Correlation Functions from Ring-LWR Sebastian Hasler, Pascal Reisert, Ralf Küsters
2025/1636 (PDF ) Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost? Daniel Pöllman, Tianxin Tang
2025/1635 (PDF ) Haystack ciphers: White-box countermeasures as Symmetric encryption Alex Charlès, Aleksei Udovenko
2025/1634 (PDF ) BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques Chi Feng, Lei Fan
2025/1633 (PDF ) LastRings: Lattice-based Scalable Threshold Ring Signatures Sohyun Jeon, Calvin Abou Haidar, Mehdi Tibouchi
2025/1632 (PDF ) Enhancing the DATF Technique in Differential-Linear Cryptanalysis Cheng Che, Tian Tian
2025/1631 (PDF ) Computationally and Communication Efficient Batched Asynchronous DPSS from Lightweight Cryptography Akhil Bandarupalli, Xiaoyu Ji, Soham Jog, Aniket Kate, Chen-Da Liu-Zhang, Yifan Song
2025/1630 (PDF ) Velox: Scalable Fair Asynchronous MPC from Lightweight Cryptography Akhil Bandarupalli, Xiaoyu Ji, Aniket Kate, Chen-Da Liu-Zhang, Daniel Pöllmann, Yifan Song
2025/1629 (PDF ) Solving Concealed ILWE and its Application for Breaking Masked Dilithium Simon Damm, Asja Fischer, Alexander May, Soundes Marzougui, Leander Schwarz, Henning Seidler, Jean-Pierre Seifert, Jonas Thietke, Vincent Quentin Ulitzsch
2025/1628 (PDF ) Fully Adaptive Decentralized MA-ABE: Simplified, Optimized, ASP Supported Pratish Datta, Junichi Tomida, Nikhil Vanjani
2025/1627 (PDF ) IND-CPA-D of Relaxed Functional Bootstrapping: A New Attack, A General Fix, and A Stronger Model Zeyu Liu, Yunhao Wang, Ben Fisch
2025/1626 (PDF ) The Grand Challenge of PQC Migration: Analysis of Modern Blockchain and Intertwined Human Egoisms Kigen Fukuda, Shin’ichiro Matsuo, Yuji Suga, Tadahiko Ito
2025/1625 (PDF ) A Practical and Fully Distributed E-Voting Protocol for the Swiss Context Véronique Cortier, Alexandre Debant, Olivier Esseiva, Pierrick Gaudry, Audhild Høgåsen, Chiara Spadafora
2025/1624 (PDF ) New Limits for Homomorphic Encryption Sven Schäge, Marc Vorstermans
2025/1623 (PDF ) Tetris: Versatile TFHE LUT and Its Application to FHE Instruction Set Architecture Ruida Wang, Jikang Bai, Xuan Shen, Xianhui Lu, Zhihao Li, Binwu Xiang, Zhiwei Wang, Hongyu Wang, Lutan Zhao, Kunpeng Wang, Rui Hou
2025/1622 (PDF ) General Modularity Lemmata about Random Variable Commitment Schemes, and a Certified Laplace Mechanism Fredrik Meisingseth, Christian Rechberger, Fabian Schmid
2025/1621 (PDF ) Page-efficient Encrypted Multi-Maps: New Techniques for Optimal Search Bandwidth Francesca Falzon, Zichen Gui, Michael Reichle
2025/1620 (PDF ) The Coding Limits of Robust Watermarking for Generative Models Danilo Francati, Yevin Nikhel Goonatilake, Shubham Pawar, Daniele Venturi, Giuseppe Ateniese
2025/1619 (PDF ) Generic Anonymity Wrapper for Messaging Protocols Lea Thiemt, Paul Rösler, Alexander Bienstock, Rolfe Schmidt, Yevgeniy Dodis
2025/1618 (PDF ) IND-CPA-D and KR-D Security With Reduced Noise from the HintLWE Problem Tabitha Ogilvie
2025/1617 (PDF ) Game-Theoretically Fair Coin Toss with Arbitrary Preferences Forest Zhang, Ke Wu
2025/1616 (PDF ) Transforming the POKE public key Protocol into a Key Encapsulation Mechanism Nouhou Abdou Idris, Yunusa Abdulsalam, Mustapha Hedabou
2025/1615 (PDF ) The Chaotic Entropic Expansion (CEE): A Transparent Post-Quantum Data Confidentiality Primitive via Entropic Chaotic Maps MINKA MI NGUIDJOI Thierry Emmanuel
2025/1614 (PDF ) Broadcast-Optimal Secure Computation From Black-Box Oblivious Transfer Michele Ciampi, Divya Ravi, Luisa Siniscalchi, Yu Xia
2025/1613 (PDF ) Tightly Secure Inner-Product Functional Encryption Revisited: Compact, Lattice-based, and More Shuai Han, Hongxu Yi, Shengli Liu, Dawu Gu
2025/1612 (PDF ) Low-Latency Rate-Distortion-Perception Trade-offs Through Randomized Distributed Function Computations Onur Gunlu, Maciej Skorski, H. Vincent Poor
2025/1611 (PDF ) Probabilistic Skipping-Based Data Structures with Robust Efficiency Guarantees Marc Fischlin, Moritz Huppert, Sam A. Markelon
2025/1610 (PDF ) BunnyFinder: Finding Incentive Flaws for Ethereum Consensus Rujia Li, Mingfei Zhang, Xueqian Lu, Wenbo Xu, Ying Yan, Sisi Duan
2025/1609 (PDF ) Many-time Linkable Ring Signatures Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo
2025/1608 (PDF ) Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates Haiyue Dong, Qian Guo
2025/1607 (PDF ) Faster Verification of Faster Implementations: Combining Deductive and Circuit-Based Reasoning in EasyCrypt José Bacelar Almeida, Gustavo Xavier Delerue Marinho Alves, Manuel Barbosa, Gilles Barthe, Luı́s Esquı́vel, Vincent Hwang, Tiago Oliveira, Hugo Pacheco, Peter Schwabe, Pierre-Yves Strub
2025/1606 (PDF ) Collatz Hash: Cryptographic Hash Algorithm Using 3x+1 Conjecture Shaurya Pratap Singh, Bhupendra Singh, Alok Mishra
2025/1605 (PDF ) Refined Humbert Invariants in Supersingular Isogeny Degree Analysis Eda Kırımlı, Gaurish Korpal
2025/1604 (PDF ) Qlapoti: Simple and Efficient Translation of Quaternion Ideals to Isogenies Giacomo Borin, Maria Corte-Real Santos, Jonathan Komada Eriksen, Riccardo Invernizzi, Marzio Mula, Sina Schaeffler, Frederik Vercauteren
2025/1603 (PDF ) Post-quantum Security of Key-Alternating Feistel Ciphers Jyotirmoy Basak, Ritam Bhaumik, Amit Kumar Chauhan, Ravindra Jejurikar, Ashwin Jha, Anandarup Roy, André Schrottenloher, Suprita Talnikar
2025/1602 (PDF ) Attacks on PRISM-id via Torsion over Small Extension Fields Kohei Nakagawa, Hiroshi Onuki
2025/1601 (PDF ) Meet-in-the-Middle Attacks on Full ChiLow Eran Lambooij, Patrick Neumann, Michiel Verbauwhede, Shichang Wang, Tianyu Zhang
2025/1599 (PDF ) AVX2 Implementation of QR-UOV for Modern x86 Processors Hiroshi Amagasa, Rei Ueno, Naofumi Homma
2025/1598 (PDF ) How to kickstart Secure Message Transfer with Short Authentication Strings and Out-Of-Band Communication Wasilij Beskorovajnov, Jörn Müller-Quade
2025/1597 (PDF ) The State-Test Technique on Differential Attacks: a 26-Round Attack on CRAFT and Other Applications Dounia M'Foukh, María Naya-Plasencia, Patrick Neumann
2025/1596 (PDF ) On GPU acceleration of PQC algorithms Daniel Römer, Gero Knoblauch, Alexander Wiesmaier
2025/1595 (PDF ) Round-Efficient Composable Two-Party Quantum Computation Vipul Goyal, Xiao Liang, Omkant Pandey, Yuhao Tang, Takashi Yamakawa
2025/1594 (PDF ) Practical Dense-Key Bootstrapping with Subring Secret Encapsulation Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang
2025/1593 (PDF ) Leveraging Smaller Finite Fields for More Efficient ZK-Friendly Hash Functions Gökçe Düzyol, Kamil Otal
2025/1592 (PDF ) MegaBlocks: Breaking the Logarithmic I/O-Overhead Barrier for Oblivious RAM Gilad Asharov, Eliran Eiluz, Ilan Komargodski, Wei-Kai Lin
2025/1591 (PDF ) HE-SecureNet: An Efficient and Usable Framework for Model Training via Homomorphic Encryption Thomas Schneider, Huan-Chih Wang, Hossein Yalame
2025/1590 (PDF ) The AIIP Problem: Toward a Post-Quantum Hardness Assumption from Affine Iterated Inversion over Finite Fields MINKA MI NGUIDJOI Thierry Emmanuel
2025/1589 (PDF ) A Symmetric Group-Based Public-Key Cryptosystem with Secret Partition-Dependent Decryption Kaveh Dastouri
2025/1588 (PDF ) Query-Optimal IOPPs for Linear-Time Encodable Codes Anubhav Baweja, Pratyush Mishra, Tushar Mopuri, Matan Shtepel
2025/1587 (PDF ) Secure Agents Nakul Khambhati, Joonwon Lee, Gary Song, Rafail Ostrovsky, Sam Kumar
2025/1586 (PDF ) A Note on Feedback-PRF Mode of KDF from NIST SP 800-108 Ritam Bhaumik, Avijit Dutta, Tetsu Iwata, Ashwin Jha, Kazuhiko Minematsu, Mridul Nandi, Yu Sasaki, Meltem Sönmez Turan, Stefano Tessaro
2025/1585 (PDF ) LEAF: Compact and Efficient Blind Signature from Code-based Assumptions Yi-Fu Lai, Edoardo Persichetti
2025/1584 (PDF ) PriSrv+: Privacy and Usability-Enhanced Wireless Service Discovery with Fast and Expressive Matchmaking Encryption Yang Yang, Guomin Yang, Yingjiu Li, Pengfei WU, Rui Shi, Minming Huang, Jian Weng, HweeHwa Pang, Robert H. Deng
2025/1583 (PDF ) Compact Lattice-Coded (Multi-Recipient) Kyber without CLT Independence Assumption Shuiyin Liu, Amin Sakzad
2025/1582 (PDF ) Breaking Omertà: On Threshold Cryptography, Smart Collusion, and Whistleblowing Mahimna Kelkar, Aadityan Ganesh, Aditi Partap, Joseph Bonneau, S. Matthew Weinberg
2025/1581 (PDF ) Cryptanalysis of ChiLow with Cube-Like Attacks Shuo Peng, Jiahui He, Kai Hu, Zhongfeng Niu, Shahram Rasoolzadeh, Meiqin Wang
2025/1580 (PDF ) IronDict: Transparent Dictionaries from Polynomial Commitments Hossein Hafezi, Alireza Shirzad, Benedikt Bünz, Joseph Bonneau
2025/1579 (PDF ) TACITA: Threshold Aggregation without Client Interaction Varun Madathil, Arthur Lazzaretti, Zeyu Liu, Charalampos Papamanthou
2025/1578 (PDF ) Back to the future: simple threshold decryption secure against adaptive corruptions Victor Shoup
2025/1577 (PDF ) Template and CPA Side Channel Attacks on the Kyber/ML-KEM Pair-Pointwise Multiplication Sedric Nkotto
2025/1576 (PDF ) Compressed verification for post-quantum signatures with long-term public keys Gustavo Banegas, Anaëlle Le Dévéhat, Benjamin Smith
2025/1575 (PDF ) BitPriv: A Privacy-Preserving Protocol for DeFi Applications on Bitcoin Ioannis Alexopoulos, Zeta Avarikioti, Paul Gerhart, Matteo Maffei, Dominique Schröder
2025/1574 (PDF ) Information-Theoretic Random-Index PIR Sebastian Kolby, Lawrence Roy, Jure Sternad, Sophia Yakoubov
2025/1573 (PDF ) OneTwoPAKE: Two-Round Strong Asymmetric PAKE with Ideal Security Yashvanth Kondi, Ian McQuoid, Kelsey Melissaris, Claudio Orlandi, Lawrence Roy, LaKyah Tyner
2025/1572 (PDF ) Quantum Implementation of MD5 Sangmin Cha, GyeongJu Song, Seyoung Yoon, Hwajeong Seo
2025/1571 (PDF ) Attribute-based Quantum Broadcast Encryption with Composite Policies via Symmetric Unitary t-Designs Sayatan Ganguly, Shion Samadder Chaudhury
2025/1570 (PDF ) Multi-Message Quantum Broadcast with Fine-Grained Access Control Sayatan Ganguly, Shion Samadder Chaudhury
2025/1569 (PDF ) How Hard Can It Be to Formalize a Proof? Lessons from Formalizing CryptoBox Three Times in EasyCrypt François Dupressoir, Andreas Hülsing, Cameron Low, Matthias Meijers, Charlotte Mylog, Sabine Oechsner
2025/1568 (PDF ) Montgomery Curves: Exact Enumeration and Probabilistic Analysis Tsai Yi-Ju
2025/1567 (PDF ) Bootstrappable Fully Homomorphic Attribute-Based Encryption with Unbounded Circuit Depth Feixiang Zhao, Shixin Chen, Man Ho Au, Jian Weng, Huaxiong Wang, Jian Guo
2025/1566 (PDF ) Lattice-based Threshold Blind Signatures Sebastian Faller, Guilhem Niot, Michael Reichle
2025/1565 (PDF ) Game Changer: A Modular Framework for OPRF Security Karla Friedrichs, Anja Lehmann, Cavit Özbay
2025/1564 (PDF ) SoK: Blockchain Consensus in the Quantum Age Aleck Nash, Christian Eduardo Terron Garcia, Henry Chimal-Dzul, Kim-Kwang Raymond Choo
2025/1563 (PDF ) Optimized Constant-Time Implementation of terSIDH Taehun Kang, Donghoe Heo, Jeonghwan Lee, Suhri Kim, Changmin Lee
2025/1562 (PDF ) Formally Verified Correctness Bounds for Lattice-Based Cryptography Manuel Barbosa, Matthias J. Kannwischer, Thing-han Lim, Peter Schwabe, Pierre-Yves Strub
2025/1561 (PDF ) A Traceable Threshold Asmuth--Bloom Secret Sharing Scheme Maria Leslie, Ratna Dutta
2025/1560 (PDF ) On the Termination of the HotStuff Protocol Within the Universally Composable Framework Yuhang Zeng, Zhixin Dong, Xian Xu
2025/1559 (PDF ) A New Generalized Lattice Attack Against a Family of RSA-Like Cryptosystems Michel Seck, Abdoul Aziz Ciss
2025/1558 (PDF ) Lower Bounding Update Frequency in Short Accumulators and Vector Commitments Hamza Abusalah, Gaspard Anthoine, Gennaro Avitabile, Emanuele Giunta
2025/1557 (PDF ) On Achieving ``Best-in-the-Multiverse'' MPC Anasuya Acharya, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2025/1556 (PDF ) CryptoFace: End-to-End Encrypted Face Recognition Wei Ao, Vishnu Naresh Boddeti
2025/1555 (PDF ) Information-theoretic MPC with Constant Communication Overhead Ashish Choudhury, Ivan Damgård, Shravani Patil, Arpita Patra
2025/1554 (PDF ) UniCross: A Universal Cross-Chain Payment Protocol with On-demand Privacy and High Scalability Chenke Wang, Yu Long, Xian Xu, Shi-Feng Sun, Yiqi Liu, Dawu Gu
2025/1553 (PDF ) Understanding Unexpected Fixed-Key Differential Behaviours: How to Avoid Major Weaknesses in Lightweight Designs (Extended Version) Anne Canteaut, Merlin Fruchon
2025/1552 (PDF ) Minimalist Model for Impossible Differentials Patrick Derbez, Marie Euler
2025/1551 (PDF ) M&M: Secure Two-Party Machine Learning through Efficient Modulus Conversion and Mixed-Mode Protocols (Full Version) Ye Dong, Wen-jie Lu, Xiaoyang Hou, Kang Yang, Jian Liu
2025/1550 (PDF ) Revisiting Time-Space Tradeoffs in Collision Search and Decision Problems Jian Guo, Wenjie Nan, Yiran Yao
2025/1549 (PDF ) Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via Packet Inspection Subeen Cho, Yulim Hyoung, Hagyeong Kim, Minjoo Sim, Anupam Chattopadhyay, Hwajeong Seo, Hyunji Kim
2025/1548 (PDF ) Pairing-Based Aggregate Signatures without Random Oracles Susan Hohenberger, Brent Waters, David J. Wu
2025/1547 (PDF ) Silent Threshold Cryptography from Pairings: Expressive Policies in the Plain Model Brent Waters, David J. Wu
2025/1546 (PDF ) Incrementally Verifiable Computation for NP from Standard Assumptions Pratish Datta, Abhishek Jain, Zhengzhong Jin, Alexis Korb, Surya Mathialagan, Amit Sahai
2025/1545 (PDF ) Non-Trivial Ciphertexts Gideon Samid
2025/1544 (PDF ) MDS Diffusion Layers for Arithmetization-Oriented Symmetric Ciphers: The Rotational-Add Construction Baofeng Wu, Wen Kong, Dewei Kong, Hailun Yan
2025/1543 (PDF ) Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM Proofs Elena Andreeva, Amit Singh Bhati, Andreas Weninger
2025/1542 (PDF ) SAT-Based Space Partitioning and Applications to Ascon-Hash256 Guozhen Liu, Shun Li, Huina Li, Weidong Qiu, Siwei Sun
2025/1541 (PDF ) Adaptive Attack on Static POKÉ Keys David Lim, Yan Bo Ti
2025/1540 (PDF ) A Fine-Grained and Real-Time Functional Video Encryption and Sharing Scheme Haikuo Yu, Jiahui Hou, Suyuan Liu, Lan Zhang, Xiang-Yang Li
2025/1539 (PDF ) EvH: Randomized Symmetric Cipher Paradigm with Holographic Storage and Parallelism, Compression, & Erasure Recovery Integration Hillel Avni, Shlomi Dolev, Komal Kumari, Stav Perle Elbar, Shantanu Sharma, Jeffrey Ullman, Moti Yung, Zvi Galil
2025/1538 (PDF ) Evaluating Ascon in Secure Multi-Party Computation using Reverse Multiplication-Friendly Embeddings Peter Schwarz, Erik Pohle, Aysajan Abidin, Bart Preneel
2025/1537 (PDF ) Privacy-Preserving Two-Party RBF Kernel SVM Training Based on Neat and Accurate Secure Exponentiation Qingyu Mo, Wenyuan Wu, Jingwei Chen
2025/1536 (PDF ) Inner-Product Commitments Over Integers With Applications to Succinct Arguments Shihui Fu
2025/1535 (PDF ) Tight Bounds on Uniform-Challenge Reductions from Sigma Protocols Iftach Haitner, Nikolaos Makriyannis
2025/1534 (PDF ) RBOOT: Accelerating Homomorphic Neural Network Inference by Fusing ReLU within Bootstrapping Zhaomin Yang, Chao Niu, Benqiang Wei, Zhicong Huang, Cheng Hong, Tao Wei
2025/1533 (PDF ) PARSAN-Mix: Packet-Aware Routing and Shuffling with Additional Noise for Latency Optimization in Mix Networks (Extended Version) Mahdi Rahimi
2025/1532 (PDF ) Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC Tianshi Xu, Wen-jie Lu, Jiangrui Yu, Yi Chen, Chenqi Lin, Runsheng Wang, Meng Li
2025/1531 (PDF ) Improved Semi-Free-Start Collision Attacks on RIPEMD-160 (Full Version) Zhuolong Zhang, Muzhou Li, Haoyang Wang, Shiqi Hou, Wei Wang, Meiqin Wang
2025/1530 (PDF ) PolySys: an Algebraic Leakage Attack Engine Zachary Espiritu, Seny Kamara, Tarik Moataz, Andrew Park
2025/1529 (PDF ) UC-Security of the ZK-NR Protocol under Contextual Entropy Constraints: A Composable Zero-Knowledge Attestation Framework MINKA MI NGUIDJOI Thierry Emmanuel
2025/1528 (PDF ) Trustless Delegation of Vector Commitment Construction in Resource-Constrained Settings Parisa Hassanizadeh, Shahriar Ebrahimi, Stefan Dziembowski, Janusz Szczepanski
2025/1527 (PDF ) Universally Composable Transaction Order Fairness: Refined Definitions and Adaptive Security Michele Ciampi, Aggelos Kiayias, Yu Shen
2025/1526 (PDF ) A general secondary construction of Boolean functions including the indirect sum and its generalizations Claude Carlet, Deng Tang
2025/1525 (PDF ) Making Hard Problems Easier with Custom Data Distributions and Loss Regularization: A Case Study in Modular Arithmetic Eshika Saxena, Alberto Alfarano, François Charton, Zeyuan Allen-Zhu, Emily Wenger, Kristin Lauter
2025/1524 (PDF ) AUPCH: Auditable Unlinkable Payment Channel Hubs Pedro Moreno-Sanchez, Mohsen Minaei, Srinivasan Raghuraman, Panagiotis Chatzigiannis, Duc V. Le
2025/1523 (PDF ) Decoupling Support Enumeration and Value Discovery in Non-Binary ISD Freja Elbro, Paolo Santini
2025/1522 (PDF ) Constant-Size Inner Product Arguments for Group-Scalar Relations, Dynamic Threshold VRFs, and More Omid Mir, Octavio Perez-Kempner, Sebastian Ramacher, Daniel Slamanig
2025/1521 (PDF ) Universally Composable Subversion-Resilient Authenticated Key Exchange Jiahao Liu, Yi Wang, Rongmao Chen, Xinyi Huang, Jinshu Su, Moti Yung
2025/1520 (PDF ) DAWN: Smaller and Faster NTRU Encryption via Double Encoding Yijian Liu, Yu Zhang, Xianhui Lu, Yao Cheng, Yongjian Yin
2025/1519 (PDF ) Does the UC-Security Notion for PAKE Imply Game-Based Security? Jiayu Xu
2025/1518 (PDF ) Sequential Indifferentiability of STH and EDM Nilanjan Datta, Avijit Dutta, Sougata Mandal, Hrithik Nandi
2025/1517 (PDF ) Universally Composable Treatment of Multi-Party Isomorphic State Channels Maxim Jourenko, Xiangyu Su, Adam Blatchley Hansen, Mario Larangeira
2025/1516 (PDF ) GoSSamer: Lightweight and Linear-Communication Asynchronous (Dynamic Proactive) Secret Sharing and the Applications Xinxin Xing, Yizhong Liu, Boyang Liao, Jianwei Liu, Bin Hu, Xun Lin, Yuan Lu, Tianwei Zhang
2025/1515 (PDF ) Privacy-Preserving Federated Inference for Genomic Analysis with Homomorphic Encryption Anish Chakraborty, Nektarios Georgios Tsoutsos
2025/1514 (PDF ) Rigorous Methods for Computational Number Theory Koen de Boer, Alice Pellet-Mary, Benjamin Wesolowski
2025/1512 (PDF ) Virtual End-to-End Encryption: Analysis of the Doctolib Protocol Dennis Dayanikli, Laura Holz, Anja Lehmann
2025/1511 (PDF ) Updatable aPAKE: Security Against Bulk Precomputation Attacks Dennis Dayanikli, Anja Lehmann
2025/1510 (PDF ) Mosformer: Maliciously Secure Three-Party Inference Framework for Large Transformers Ke Cheng, Yuheng Xia, Anxiao Song, Jiaxuan Fu, Wenjie Qu, Yulong Shen, Jiaheng Zhang
2025/1509 (PDF ) LEAP: High-Performance Lattice-Based Pseudorandom Number Generator Yu Zhang, Xianhui Lu, Yijian Liu, Yongjian Yin, Kunpeng Wang
2025/1508 (PDF ) Concretely Efficient Fluid MPC with Linear Communication Yubo Zeng, Kang Yang, Dengguo Feng, Min Zhang
2025/1507 (PDF ) A Novel Quantum Voting System Based on Quantum Blind Signature without Entanglement Yu-Yuan Chou, Wen-Ching Wu, Jue-Sam Chou
2025/1506 (PDF ) Superposition Attacks Against LPN-Based Authentication Protocols Carlos Cid, David Elkouss, Manuel Goulão
2025/1505 (PDF ) A New Tool to Find Lightweight (AND, XOR) Implementations of Quadratic Vectorial Boolean Functions up to Dimension 9 Marie Bolzer, Sébastien Duval, Marine Minier
2025/1504 (PDF ) On the $\gamma$-Spreadness of Average-Case to Worst-Case Transformations Hyun Ji Kwag, Jonghyun Kim, Changmin Lee, Jong Hwan Park
2025/1503 (PDF ) Constraint-Friendly Map-to-Elliptic-Curve-Group Relations and Their Applications Jens Groth, Harjasleen Malvai, Andrew Miller, Yi-Nuo Zhang
2025/1502 (PDF ) CARPOOL: Secure And Reliable Proof of Location Sayon Duttagupta, Dave Singelée, Xavier Carpent, Volkan Guler, Takahito Yoshizawa, Seyed Farhad Aghili, Aysajan Abidin, Bart Preneel
2025/1501 (PDF ) Using the Planted Clique Conjecture for Cryptography: Public-Key Encryption from Planted Clique and Noisy $k$-$\mathsf{LIN}$ Over Expanders Riddhi Ghosal, Isaac M. Hair, Aayush Jain, Amit Sahai
2025/1500 (PDF ) Data Matching in Unequal Worlds and Applications to Smart Contracts Dmitry Khovratovich, Mikhail Vladimirov, Benedikt Wagner
2025/1499 (PDF ) A Construction of Evolving $k$-threshold Secret Sharing Scheme over A Polynomial Ring Qi Cheng, Hongru Cao, Sian-Jheng Lin, Nenghai Yu, Yunghsiang S. Han, Xianhong Xie
2025/1498 (PDF ) One More Pair, More Information Gained: Improved Attacks on LowMC with Full S-box Layers Using Two Plaintext/Ciphertext Pairs Yimeng Sun, Jiamin Cui, Shiyao Chen, Meiqin Wang, Longzheng Cui, Chao Niu
2025/1497 (PDF ) Hardness Along the Boundary: Towards One-Way Functions from the Worst-case Hardness of Time-Bounded Kolmogorov Complexity Yanyi Liu, Rafael Pass
2025/1496 (PDF ) Noise-Tolerant Plaintext-Checking Oracle Attacks -- A Soft-Analytic Approach Applied to ML-KEM Julius Hermelink, Erik Mårtensson, Maggie Tran
2025/1495 (PDF ) Pairwise independence of AES-like block ciphers Tim Beyne, Gregor Leander, Immo Schütt
2025/1494 (PDF ) Quantum Circuit Synthesis for AES with Low DW-cost Haoyu Liao, Qingbin Luo
2025/1493 (PDF ) Revisit the Boyar-Peralta Algorithm to Solve the Shortest Linear Program Problem Yao Sun, Runhe Yang, Ting Li
2025/1492 (PDF ) Comment on On Gaussian sampling, smoothing parameter and application to lattice signatures Cong Ling
2025/1491 (PDF ) Homomorphic Secret Sharing with Verifiable Evaluation Arka Rai Choudhuri, Aarushi Goel, Aditya Hegde, Abhishek Jain
2025/1490 (PDF ) Accelerating FALCON: Speed Records for FALCON on Xilinx FPGAs Sharath Pendyala, Rahul Magesh, Elif Bilge Kavun, Aydin Aysu
2025/1489 (PDF ) PQ-STAR: Post-Quantum Stateless Auditable Rekeying Shlomi Dolev, Avraham Yagudaev, Moti Yung
2025/1488 (PDF ) ABEL: Perfect Asynchronous Byzantine Extension from List-Decoding Ittai Abraham, Gilad Asharov
2025/1487 (PDF ) Towards Building Efficient SCALES Protocols Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran
2025/1486 (PDF ) Naor-Reingold goes Beyond-the-Birthday-Bound Avik Chakraborti, Bishwajit Chakraborty, Nilanjan Datta, Avijit Dutta, Ashwin Jha, Sougata Mandal, Hrithik Nandi, Mridul Nandi, Abishanka Saha
2025/1485 (PDF ) Glock: Garbled Locks for Bitcoin Liam Eagen
2025/1484 (PDF ) Boosting Payment Channel Network Liquidity with Topology Optimization and Transaction Selection Krishnendu Chatterjee, Jan Matyáš Křišťan, Stefan Schmid, Jakub Svoboda, Michelle Yeo
2025/1483 (PDF ) Cross-Consensus Reliable Broadcast and its Applications Yue Huang, Xin Wang, Haibin Zhang, Sisi Duan
2025/1482 (PDF ) Complex Elections via Threshold (Fully) Homomorphic Encryption Charlotte Bonte, Georgio Nicolas, Nigel P. Smart
2025/1481 (PDF ) A Camera Zoom-based Paper-Pencil Cipher Encryption Scheme atop Merkle–Hellman Knapsack Cryptosystem Gopal Anantharaman, Jintai Ding
2025/1480 (PDF ) SoK: Kleptographic Attacks Ting-Yun Yeh
2025/1479 (PDF ) PicoGRAM: Practical Garbled RAM from Decisional Diffie-Hellman Tianyao Gu, Afonso Tinoco, Sri Harish G Rajan, Elaine Shi
2025/1478 (PDF ) Fully-Adaptive Two-Round Threshold Schnorr Signatures from DDH Paul Gerhart, Davide Li Calsi, Luigi Russo, Dominique Schröder
2025/1477 (PDF ) Adaptively Secure Threshold ElGamal Decryption from DDH Sourav Das, Ling Ren, Ziling Yang
2025/1476 (PDF ) AGB 2.0: Refined Algebraic Attack against Regular Syndrome Decoding for PCG Applications Hanlin Liu, Xiao Wang, Kang Yang, Longhui Yin, Yu Yu
2025/1475 (PDF ) Stateless 2PC Signatures for Internet-Scale Authentication and Authorization Michael Adjedj, Geoffroy Couteau, Arik Galansky, Nikolaos Makriyannis, Oren Yomtov
2025/1474 (PDF ) Snake Mackerel: An Isogeny-Based AKEM Leveraging Randomness Reuse Jonas Janneck, Jonas Meers, Massimo Ostuzzi, Doreen Riepel
2025/1473 (PDF ) Time-Space Trade-Offs for Sumcheck Anubhav Baweja, Alessandro Chiesa, Elisabetta Fedele, Giacomo Fenzi, Pratyush Mishra, Tushar Mopuri, Andrew Zitek-Estrada
2025/1472 (PDF ) Hardness of M-LWE with General Distributions and Applications to Leaky Variants Katharina Boudgoust, Corentin Jeudy, Erkan Tairi, Weiqiang Wen
2025/1471 (PDF ) NTWR Prime - redundant security based on NTRU Prime and LWR problems Jakub Mielczarek, Małgorzata Zajęcka
2025/1470 (PDF ) Efficient Fuzzy Labeled PSI from Vector Ring-OLE Dung Bui, Kelong Cong
2025/1469 (PDF ) Sample Efficient Search to Decision for $k$LIN Andrej Bogdanov, Alon Rosen, Kel Zin Tan
2025/1468 (PDF ) Privacy-Preserving Machine Learning on Web Browsing for Public Opinion Sam Buxbaum, Lucas M. Tassis, Lucas Boschelli, Giovanni Comarela, Mayank Varia, Mark Crovella, Dino P. Christenson
2025/1466 (PDF ) Revisiting Adaptively Secure IBE from Lattices with Smaller Modulus: A Conceptually Simple Framework with Low Overhead Weidan Ji, Zhedong Wang, Lin Lyu, Dawu Gu
2025/1465 (PDF ) CoRReCt: Compute, Record, Replay, Compare to Secure Computations on Untrusted Systems Felix Dörre, Marco Liebel, Jeremias Mechler, Jörn Müller-Quade
2025/1464 (PDF ) Rumors MPC: GOD for Dynamic Committees, Low Communication via Constant-Round Chat Bernardo David, Arup Mondal, Rahul Satish
2025/1463 (PDF ) Leakage-Resilient Circuits against NC1, Revisited Yuyu Wang
2025/1462 (PDF ) Large smooth twins from short lattice vectors Erik Mulder, Bruno Sterner, Wessel van Woerden
2025/1461 (PDF ) Hard Instances of Discrete Logarithm Problem and Cryptographic Applications Christopher Battarbee, Arman Darbinyan, Delaram Kahrobaei
2025/1460 (PDF ) A Performance Comparison of the Homomorphic Encryption Schemes CKKS and TFHE Clemens Krüger, Bhavinkumar Moriya, Dominik Schoop
2025/1459 (PDF ) Not in The Prophecies: Practical Attacks on Nostr Hayato Kimura, Ryoma Ito, Kazuhiko Minematsu, Shogo Shiraki, Takanori Isobe
2025/1458 (PDF ) INKE: Fast Isogeny-Based PKE Using Intermediate Curves Hyeonhak Kim, Seokhie Hong, Suhri Kim, Sangjin Lee
2025/1457 (PDF ) DOC★: Access Control for Information-Theoretically Secure Key-Document Stores Yin Li, Sharad Mehrota, Shantanu Sharma, Komal Kumari
2025/1456 (PDF ) Provably Memory-Hard Proofs of Work With Memory-Easy Verification Jeremiah Blocki, Nathan Smearsoll
2025/1455 (PDF ) Fully-Fluctuating Participation in Sleepy Consensus Yuval Efron, Joachim Neu, Toniann Pitassi
2025/1454 (PDF ) Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes Maxim Jourenko, Marcus Völker
2025/1453 (PDF ) Password-Hardened Encryption Revisited Ruben Baecker, Paul Gerhart, Dominique Schröder
2025/1452 (PDF ) Not Easy to Prepare a Pesto: Cryptanalysis of a Multivariate Public-Key Scheme from CCZ Equivalence Christof Beierle, Patrick Felke
2025/1451 (PDF ) MUSE-VFL: Multi-party Unified System for Private and Communication Efficient Backpropagation in Vertical Federated Learning Ivan Tjuawinata, Yann Fraboni, Ziyao Liu, Jun Zhao, Pu Duan, Kwok-Yan Lam
2025/1450 (PDF ) Single-round Lattice-based Multisignatures Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan
2025/1449 (PDF ) REFHE: Fully Homomorphic ALU Zvika Brakerski, Offir Friedman, Daniel Golan, Alon Gurny, Dolev Mutzari, Ohad Sheinfeld
2025/1448 (PDF ) Dimension-Reducing Algorithms for Quaternion Ideal-SVP Cong Ling, Andrew Mendelsohn, Christian Porter
2025/1447 (PDF ) A New Paradigm for Privacy-Preserving Decision Tree Evaluation Tianpei Lu, Bingsheng Zhang, Hao Li, Kui Ren
2025/1446 (PDF ) zip: Reducing Proof Sizes for Hash-Based SNARGs Giacomo Fenzi, Yuwen Zhang
2025/1445 (PDF ) Fairness Analysis on FairShare: A Secure Data Sharing Scheme for Industrial IoT Mojtaba Rafiee, Mehdi Abri
2025/1444 (PDF ) The Best of Both KEMs: Securely Combining KEMs in Post-Quantum Hybrid Schemes Gorjan Alagic, Fahran Bajaj, Aybars Kocoglu
2025/1443 (PDF ) Generic Partial Decryption as Feature Engineering for Neural Distinguishers Emanuele Bellini, Rocco Brunelli, David Gerault, Anna Hambitzer, Marco Pedicini
2025/1442 (PDF ) Shuffling is Universal: Statistical Additive Randomized Encodings for All Functions Nir Bitansky, Saroja Erabelli, Rachit Garg, Yuval Ishai
2025/1441 (PDF ) DIMSEPP: A Decentralized Identity Management System with Enhanced Privacy Protection Yu Zhang, Zongbin Wang
2025/1440 (PDF ) Faster Homomorphic Integer Computer Jaehyung Kim
2025/1439 (PDF ) A Note on the Post-Quantum Security of Identity-Based Encryption on Isogenous Pairing Groups Malte Andersch, Cezary Pilaszewicz, Marian Margraf
2025/1438 (PDF ) Secure Protocols for Best Arm Identification Using Secret Sharing Schemes Shanuja Sasi, Asaf Cohen, Onur Günlü
2025/1437 (PDF ) GURKE: Group Unidirectional Ratcheted Key Exchange Daniel Collins, Paul Rösler
2025/1436 (PDF ) VOLE-in-the-Head Signatures Based on the Linear Code Equivalence Problem Michele Battagliola, Laura Mattiuz, Alessio Meneghetti
2025/1435 (PDF ) Weak Keys in QC-MDPC-based cryptosystems via the Extended Euclidean Algorithm Alessio Meneghetti, Federica Zanetti
2025/1434 (PDF ) TLShare: Private Authenticated MPC and FHE Inputs Over TLS Manuel B. Santos, Dimitris Mouris, Xiang Xie, Miguel de Vega, Andrei Lapets
2025/1433 (PDF ) A Fully-Adaptive Threshold Partially-Oblivious PRF Ruben Baecker, Paul Gerhart, Daniel Rausch, Dominique Schröder
2025/1432 (PDF ) Brauer and certain class of Hansen chain are closed addition chains Theophilus Agama
2025/1431 (PDF ) Multi-Partner Project: Securing Future Edge-AI Processors in Practice (CONVOLVE) Sven Argo, Henk Corporaal, Alejandro Garza, Marc Geilen, Manil Dev Gomony, Tim Güneysu, Adrian Marotzke, Fouwad Mir, Christian Larmann, Jan Richter-Brockmann, Jeffrey Smith, Mottaqiallah Taouil, Said Hamdioui
2025/1430 (PDF ) Practical Collision Attacks on Reduced-Round Xoodyak Hash Mode Huina Li, Le He, Weidong Qiu
2025/1429 (PDF ) Public-Key Encryption and Injective Trapdoor Functions from LWE with Large Noise Rate Liheng Ji, Yilei Chen
2025/1428 (PDF ) Strategic Mining in Proof-of-Stake with Practical Random Election Zhuo Cai
2025/1427 (PDF ) End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces Jintong Yu, Yuxuan Wang, Shipei Qu, Yubo Zhao, Yipeng Shi, Pei Cao, Xiangjun Lu, Chi Zhang, Dawu Gu, Cheng Hong
2025/1426 (PDF ) (Im)Possibility of Symmetric Encryption against Coordinated Algorithm Substitution Attacks and Key Exfiltration Simone Colombo, Damian Vizár
2025/1425 (PDF ) Lodia: Towards Optimal Sparse Matrix-Vector Multiplication for Batched Fully Homomorphic Encryption Jiping Yu, Kun Chen, Xiaoyu Fan, Yunyi Chen, Xiaowei Zhu, Wenguang Chen
2025/1424 (PDF ) LESS is Even More: Optimizing Digital Signatures from Code Equivalence Luke Beckwith, Andre Esser, Edoardo Persichetti, Paolo Santini, Floyd Zweydinger
2025/1423 (PDF ) Collusion-Safe Proxy Re-Encryption Haotian Yin, Jie Zhang, Wanxin Li, Yuji Dong, Eng Gee Lim, Dominik Wojtczak
2025/1422 (PDF ) Design ZK-NR: A Post-Quantum Layered Protocol for Legally Explainable Zero-Knowledge Non-Repudiation Attestation Minka Mi Nguidjoi Thierry Emmanuel, Mani Onana Flavien Serge, Djotio Ndié Thomas, Atsa Etoundi Roger
2025/1421 (PDF ) Efficient randomized strong $2$-source non-malleable extractor for any linear min-entropy Divesh Aggarwal, Pranjal Dutta, Saswata Mukherjee, Satyajeet Nagargoje, Maciej Obremski
2025/1420 (PDF ) Coral: Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs Sebastian Angel, Sofía Celi, Elizabeth Margolin, Pratyush Mishra, Martin Sander, Jess Woods
2025/1419 (PDF ) BEAST-MEV: Batched Threshold Encryption with Silent Setup for MEV prevention Jan Bormet, Arka Rai Choudhuri, Sebastian Faust, Sanjam Garg, Hussien Othman, Guru-Vamsi Policharla, Ziyan Qu, Mingyuan Wang
2025/1418 (PDF ) Note: Shared Key Recovery Attack on Cascader Key Exchange Protocol Nick Aquina, Simon Rommel, Idelfonso Tafur Monroy
2025/1417 (PDF ) A Note on the Post-Quantum Security of the Inverse Discrete Logarithm Problem Joshua Limbrey, Andrew Mendelsohn
2025/1416 (PDF ) Binding Security of Combined KEMs: An Analysis of Real-World KEM Combiners Juliane Krämer, Patrick Struck, Maximiliane Weishäupl
2025/1415 (PDF ) Quantum Implementation of SHA-1 Seyoung Yoon, Gyeongju Song, Kyungbae Jang, Sangmin Cha, Hwajeong Seo
2025/1414 (PDF ) Data Availability Sampling with Repair Dan Boneh, Joachim Neu, Valeria Nikolaenko, Aditi Partap
2025/1413 (PDF ) When Can We Incrementally Prove Computations of Arbitrary Depth? Matteo Campanelli, Dario Fiore, Mahak Pancholi
2025/1412 (PDF ) AVPEU: Anonymous Verifiable Presentations with Extended Usability Yalan Wang, Liqun Chen, Yangguang Tian, Long Meng, Christopher J.P. Newton
2025/1411 (PDF ) BACON: An Improved Vector Commitment Construction with Applications to Signatures Yalan Wang, Bryan Kumara, Harsh Kasyap, Liqun Chen, Sumanta Sarkar, Christopher J.P. Newton, Carsten Maple, Ugur Ilker Atmaca
2025/1410 (PDF ) Nakamoto Consensus from Multiple Resources Mirza Ahad Baig, Christoph Ullrich Günther, Krzysztof Pietrzak
2025/1409 (PDF ) Oblivious Exact (Un)Learning of Extremely Randomized Trees Sofiane Azogagh, Zelma Aubin Birba, Sébastien Gambs, Marc-Olivier Killijian
2025/1408 (PDF ) qedb: Expressive and Modular Verifiable Databases (without SNARKs) Vincenzo Botta, Simone Bottoni, Matteo Campanelli, Emanuele Ragnoli, Alberto Trombetta
2025/1407 (PDF ) A Flexible Hardware Design Tool for Fast Fourier and Number-Theoretic Transformation Architectures Florian Krieger, Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy
2025/1406 (PDF ) Scalable Secure Multiparty Computation with Perfect Security from Preprocessing Yifan Song, Xiaxi Ye
2025/1405 (PDF ) Two-Tier Black-box Blockchains and Application to Instant Layer-1 Payments Michele Ciampi, Yun Lu, Rafail Ostrovsky, Vassilis Zikas
2025/1404 (PDF ) Optimistic Message Dissemination Chen-Da Liu-Zhang, Christian Matt, Søren Eller Thomsen
2025/1403 (PDF ) Faster Bootstrapping for CKKS with Less Modulus Consumption Lianglin Yan, Pengfei Zeng, Heyang Cao, Peizhe Song, Mingsheng Wang
2025/1402 (PDF ) Can we Speed up Information Set Decoding by Using Extension Field Structure? Freja Elbro, Violetta Weger
2025/1401 (PDF ) Automated Tool for Meet-in-the-Middle Attacks with Very Low Data and Memory Complexity (Full Version) Mohammad Vaziri
2025/1400 (PDF ) RGB I.0: Scalable consensus for client-side validated smart contracts Maxim Orlovsky
2025/1399 (PDF ) Tempo: ML-KEM to PAKE Compiler Resilient to Timing Attacks Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki
2025/1398 (PDF ) General Review of Hash-Based Signatures Halil İbrahim Kaplan
2025/1397 (PDF ) Starfighters—On the General Applicability of X-Wing Deirdre Connolly, Kathrin Hövelmanns, Andreas Hülsing, Stavros Kousidis, Matthias Meijers
2025/1396 (PDF ) A Generalized Wiener-type Attack Against a Family RSA-like Cryptosystem George Teseleanu
2025/1395 (PDF ) A Security Comment on ``A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid'' Dariush Abbasinezhad-Mood
2025/1394 (PDF ) Peeking Into the Future: MPC Resilient to Super-Rushing Adversaries Gilad Asharov, Anirudh Chandramouli, Ran Cohen, Yuval Ishai
2025/1393 (PDF ) Polynomial Lattices for the BIKE Cryptosystem Michael Schaller
2025/1392 (PDF ) FLEX — Capital-Efficient Optimistic Bridges with On-Demand Security Bonds for Bitcoin Sergio Demian Lerner, Ariel Futoransky
2025/1391 (PDF ) Inverse Discrete Logarithm - Post-Quantum take on a classical problem. Mikhail Suslov
2025/1390 (PDF ) Optimizing Backend Verification in zk-Rollup Architectures Mehdi Beriane, Muhammed Ali Bingol
2025/1389 (PDF ) Verification Cost Asymmetry in Cognitive Warfare: A Complexity-Theoretic Framework Joshua Luberisse
2025/1388 (PDF ) Collaborative zkSNARKs with Sublinear Prover Time and Constant Proof Size Zhiyong Fang, Sanjam Garg, Bhaskar Roberts, Wenxuan Wu, Yupeng Zhang
2025/1387 (PDF ) Fast Final Exponentiation on BW and BLS Curves with Even Embedding Degrees at 128 bits security Senegue Gomez Nyamsi, Emmanuel Fouotsa, Calvin Tcheka
2025/1386 (PDF ) How to Tolerate Typos in Strong Asymmetric PAKE Ian McQuoid, Mike Rosulek, Jiayu Xu
2025/1385 (PDF ) Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage Pengxu Zhu, Lei Wang
2025/1384 (PDF ) Silent Threshold Encryption with One-Shot Adaptive Security Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner
2025/1383 (PDF ) An Efficient Circuit Synthesis Framework for TFHE via Convex Sub-graph Optimization Animesh Singh, Ayantika Chatterjee, Anupam Chattopadhyay, Debdeep Mukhopadhyay
2025/1382 (PDF ) Using Learning with Rounding to Instantiate Post-Quantum Cryptographic Algorithms Andrea Basso, Joppe W. Bos, Jan-Pieter D'Anvers, Angshuman Karmakar, Jose Maria Bermudo Mera, Joost Renes, Sujoy Sinha Roy, Frederik Vercauteren, Peng Wang, Yuewu Wang, Shicong Zhang, Chenxin Zhong
2025/1381 (PDF ) Blockchain-Based Decentralized Domain Name System Guang Yang, Peter Trinh, Alma Nkemla, Amuru Serikyaku, Edward Tatchim, Osman Sharaf
2025/1380 (PDF ) Quantum Composable and Contextual Security Infrastructure (Q2CSI) : A Modular Architecture for Legally Explainable Cryptographic Signatures Thierry Emmanuel MINKA MI NGUIDJOI, MANI ONANA Flavien Serge, DJOTIO NDIÉ Thomas, BOUETOU BOUETOU Thomas
2025/1379 (PDF ) Enhancing Scale and Shift Invariance in Deep Learning-based Side-channel Attacks through Equivariant Convolutional Neural Networks David Perez, Sengim Karayalcin, Stjepan Picek, Servio Paguada
2025/1378 (PDF ) Tight Lower Bound on Witness Update Frequency in Additive Positive Accumulators Wei Qi
2025/1377 (PDF ) More Practical Non-interactive Encrypted Conjunctive Search with Leakage and Storage Suppression Huu Ngoc Duc Nguyen, Shujie Cui, Shangqi Lai, Tsz Hon Yuen, Joseph K. Liu
2025/1376 (PDF ) On Hull Attacks on the Module Lattice Isomorphism Problem Franciele C. Silva, Maja Lie, Cong Ling
2025/1375 (PDF ) Revisiting Linkable Ring Signatures with Logarithmic Verification Complexity Danai Balla, Pyrros Chaidos
2025/1374 (PDF ) An Attack to Universally Composable Commitments from Malicious Physically Uncloneable Functions and how to Avoid it Lourenço Abecasis, Paulo Mateus, Chrysoula Vlachou
2025/1373 (PDF ) A Zero-Knowledge Proof for the Syndrome Decoding Problem in the Lee Metric Mladen Kovačević, Tatjana Grbić, Darko Čapko, Nemanja Nedić, Srđan Vukmirović
2025/1372 (PDF ) Gluon W: A Cryptocurrency Stabilization Protocol Bruno Woltzenlogel Paleo, Luca D'Angelo, Mohammad Shaheer, Giselle Reis
2025/1371 (PDF ) Securing Credential Sequence Verification Mamunur Rashid Akand, Reihaneh Safavi-Naini
2025/1370 (PDF ) Randomized Distributed Function Computation (RDFC): Ultra-Efficient Semantic Communication Applications to Privacy Onur Gunlu
2025/1369 (PDF ) Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State Differences (Full Version) Mohammad Vaziri, Vesselin Velichkov
2025/1368 (PDF ) Post-Quantum Readiness in EdDSA Chains Foteini Baldimtsi, Konstantinos Chalkias, Arnab Roy, Mahdi Sedaghat
2025/1367 (PDF ) Encrypted Matrix Multiplication Using 3-Dimensional Rotations Hannah Mahon, Shane Kosieradzki
2025/1366 (PDF ) NOPE: Strengthening domain authentication with succinct proofs Zachary DeStefano, Jeff J. Ma, Joseph Bonneau, Michael Walfish
2025/1365 (PDF ) Towards Efficient Privacy-Preserving Machine Learning: A Systematic Review from Protocol, Model, and System Perspectives Wenxuan Zeng, Tianshi Xu, Yi Chen, Yifan Zhou, Mingzhe Zhang, Jin Tan, Cheng Hong, Meng Li
2025/1364 (PDF ) A Framework for Witness Encryption from Linearly Verifiable SNARKs and Applications Sanjam Garg, Mohammad Hajiabadi, Dimitris Kolonelos, Abhiram Kothapalli, Guru-Vamsi Policharla
2025/1363 (PDF ) Universally Composable Adaptor Signatures Paul Gerhart, Daniel Rausch, Dominique Schröder
2025/1362 (PDF ) Cryptanalysis of the best HFE-LL' Constructions Daniel Smith-Tone, Cristian Valenzuela
2025/1361 (PDF ) Exploring Kaneko’s bound: On multi-edges, loops and the diameter of the supersingular $\ell$-isogeny graph Sebastiano Boscardin, Sebastian A. Spindler
2025/1360 (PDF ) Towards more secure constructions of private set operation schemes Mojtaba Rafiee
2025/1359 (PDF ) Runtime Code Generation for Constant-Time Secret-Indexed Array Accesses: Applications to PERK and NTRU Décio Luiz Gazzoni Filho, Rafael G. Flores e Silva, Alessandro Budroni, Marco Palumbi, Gora Adj
2025/1358 (PDF ) Domain-Oriented Masking Revisited: More Efficient AES Implementations with Arbitrary Protection Order Feng Zhou, Hua Chen, Limin Fan, Junhuai Yang
2025/1357 (PDF ) How to Copy-Protect Malleable-Puncturable Cryptographic Functionalities Under Arbitrary Challenge Distributions Alper Çakan, Vipul Goyal
2025/1356 (PDF ) Group Signatures with Message-Dependent Opening Directly Imply Timed-Release Encryption Yuto Imura, Keita Emura
2025/1355 (PDF ) Unconditional Pseudorandomness against Shallow Quantum Circuits Soumik Ghosh, Sathyawageeswar Subramanian, Wei Zhan
2025/1354 (PDF ) Shred-to-Shine Metamorphosis of (Distributed) Polynomial Commitments Weihan Li, Zongyang Zhang, Sherman S. M. Chow, Yanpei Guo, Boyuan Gao, Xuyang Song, Yi Deng, Jianwei Liu
2025/1353 (PDF ) Introducing two ROS attack variants: breaking one-more unforgeability of BZ blind signatures Bruno M. F. Ricardo, Lucas C. Cardoso, Leonardo T. Kimura, Paulo S. Barreto, Marcos A. Simplicio Jr
2025/1352 (PDF ) InsPIRe: Communication-Efficient PIR with Server-side Preprocessing Rasoul Akhavan Mahdavi, Sarvar Patel, Joon Young Seo, Kevin Yeo
2025/1351 (PDF ) Revisiting the Generalized Birthday Problem and Equihash: Single or K Lists? Lili Tang, Yao Sun, Xiaorui Gong
2025/1350 (PDF ) Rhyme: A Fiat-Shamir Lattice-based Signature with 3C Sampling Zhongxiang Zheng, Anyu Wang, Chunhuan Zhao, Guangwu Xu, Zhengtao Jiang, Sibo Feng, Zhichen Yan, Shuang Sun, Xiaoyun Wang
2025/1349 (PDF ) $\mathsf{HyperFond}$: A Transparent and Post-Quantum Distributed SNARK with Polylogarithmic Communication Yuanzhuo Yu, Mengling Liu, Yuncong Zhang, Shi-Feng Sun, Tianyi Ma, Man Ho Au, Dawu Gu
2025/1348 (PDF ) The CRO Trilemma : a formal incompatibility between Confidentiality, Reliability and legal Opposability in Post-Quantum proof systems Thierry Emmanuel MINKA MI NGUIDJOI, MANI ONANA Flavien Serge, DJOTIO NDIÉ Thomas
2025/1347 (PDF ) Public Traceability in Threshold Decryption Sébastien Canard, Nathan Papon, Duong Hieu Phan
2025/1346 (PDF ) Cryptanalysis of TFHE-friendly Cipher FRAST Antoine Bak, Shibam Ghosh, Fukang Liu, Willi Meier, Jianqiang Ni, Léo Perrin
2025/1345 (PDF ) SLVer Bullet: Straight-Line Verification for Bulletproofs Brandon Goodell, Rigo Salazar, Freeman Slaughter, Luke Szramowski
2025/1344 (PDF ) Side-Channel Sensitivity Analysis on HQC: Towards a Fully Masked Implementation Guillaume Goy, Maxime Spyropoulos, Nicolas Aragon, Philippe Gaborit, Renaud Pacalet, Fabrice Perion, Laurent Sauvage, David Vigilant
2025/1343 (PDF ) A Hybrid Asymmetric Password-Authenticated Key Exchange in the Random Oracle Model Jelle Vos, Stanislaw Jarecki, Christopher A. Wood, Cathie Yun, Steve Myers, Yannick Sierra
2025/1342 (PDF ) Simultaneous Diophantine Approximation for Compact Discrete Gaussian Sampling Ke Ma, Jiabo Wang, Shanxiang Lyu, Junzuo Lai, Zsolt Lángi
2025/1341 (PDF ) Practical Attack on All Parameters of the HPPC Signature Scheme Pierre Briaud, Maxime Bros, Ray Perlner, Daniel Smith-Tone
2025/1340 (PDF ) Zelda: Efficient Multi-server Preprocessing PIR with Unconditional Security Ashrujit Ghoshal, Mingxun Zhou, Bo Peng, Elaine Shi
2025/1339 (PDF ) Breaking the Twinkle Authenticated Encryption Scheme and Analyzing Its Underlying Permutation Debasmita Chakraborty, Hosein Hadipour, Anup Kumar Kundu, Mostafizar Rahman, Prathamesh Ram, Yu Sasaki, Dilip Sau, Aman Sinha
2025/1338 (PDF ) Limits on the Power of Constrained PRFs and Identity-based Cryptography Roman Langrehr
2025/1337 (PDF ) Electrum: UC Fail-Stop Server-Supported Signatures Nikita Snetkov, Jelizaveta Vakarjuk, Peeter Laud
2025/1336 (PDF ) Representations of Elementary Vectors in VOLE-in-the-head-based Schemes Tung Chou
2025/1335 (PDF ) A Compact Post-quantum Strong Designated Verifier Signature Scheme from Isogenies Farzin Renan
2025/1334 (PDF ) On the use of ECDSA with hierarchical public key delegation in identity-based scenarios Lucas C. Cardoso, Marcos A. Simplicio Jr
2025/1333 (PDF ) Policy-Based Redactable Set Signatures Zachary A Kissel
2025/1332 (PDF ) Technical Note: LeanSig for Post-Quantum Ethereum Justin Drake, Dmitry Khovratovich, Mikhail Kudinov, Benedikt Wagner
2025/1331 (PDF ) Constant-Cycle Hardware Private Circuits Daniel Lammers, Nicolai Müller, Siemen Dhooghe, Amir Moradi
2025/1330 (PDF ) Exploring Core Monomial Prediction Further: Weak-Key Superpoly Recovery for 852-Round Trivium Jiahui He, Kai Hu, Guowei Liu
2025/1329 (PDF ) Cryptanalysis of a multivariate CCZ scheme Alessio Caminata, Elisa Gorla, Madison Mabe, Martina Vigorito, Irene Villa
2025/1328 (PDF ) Private Set Intersection and other Set Operations in the Third Party Setting Foo Yee Yeo, Jason H. M. Ying
2025/1327 (PDF ) Randomized Agreement, Verifiable Secret Sharing and Multi-Party Computation in Granular Synchrony Ananya Appan, David Heath, Ling Ren
2025/1326 (PDF ) New Techniques for Analyzing Differentials with Application to AES Itai Dinur
2025/1325 (PDF ) Revisiting the IPA-sumcheck connection Liam Eagen, Ariel Gabizon
2025/1324 (PDF ) FPGA-Friendly Compact and Efficient AES-like 8x8 S-Box Ahmet Malal, Cihangir Tezcan
2025/1323 (PDF ) Pairing-Based Batch Arguments for NP with a Linear-Size CRS Binyi Chen, Noel Elias, David J. Wu
2025/1322 (PDF ) Generation of Fast Finite Field Arithmetic for Cortex-M4 with ECDH and SQIsign Applications Felix Carvalho Rodrigues, Décio Gazzoni Filho, Gora Adj, Isaac A. Canales-Martínez, Jorge Chávez-Saab, Julio López, Michael Scott, Francisco Rodríguez-Henríquez
2025/1321 (PDF ) Threshold Receipt-Free Voting with Server-Side Vote Validation Thi Van Thao Doan, Olivier Pereira, Thomas Peters
2025/1320 (PDF ) Picking up the Fallen Mask: Breaking and Fixing the RS-Mask Countermeasure Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov
2025/1319 (PDF ) Bridging Usability and Performance: A Tensor Compiler for Autovectorizing Homomorphic Encryption Edward Chen, Fraser Brown, Wenting Zheng
2025/1318 (PDF ) Lifeline: Optimal Byzantine Agreement Under Minimal Synchrony Yuval Efron, Ling Ren
2025/1317 (PDF ) FunBic-CCA: Function Secret Sharing for Biclusterings Applied to Cheng and Church Algorithm (Extended Version) Shokofeh VahidianSadegh, Alberto Ibarrondo, Lena Wiese
2025/1316 (PDF ) Scalable Information Theoretic Evaluation of the Rank Statistics in Side-Channel Attacks Julien Béguinot, Olivier Rioul, Loïc Masure, François-Xavier Standaert, Wei Cheng, Sylvain Guilley
2025/1315 (PDF ) CostSphere: A Cost Model-Driven Privacy-Preserving Machine Learning Framework with Network Context Adaptation Yuntian Chen, Zhanyong Tang, Tianpei Lu, Bingsheng Zhang, Zhiying Shi, Zhiyuan Ning
2025/1314 (PDF ) THF: Designing Low-Latency Tweakable Block Ciphers Jianhua Wang, Tao Huang, Guang Zeng, Tianyou Ding, Shuang Wu, Siwei Sun
2025/1313 (PDF ) Two-Server Sublinear PIR with Symmetric Privacy and Statistical Security Shuaishuai Li, Anyu Wang, Cong Zhang, Xiaoyun Wang
2025/1312 (PDF ) Can FrodoKEM Run in a Millisecond? FPGA Says Yes! Gökçe Düzyol, Muhammed Said Gündoğan, Atakan Arslan
2025/1311 (PDF ) Batch subgroup membership testing on pairing-friendly curves Dimitri Koshelev, Youssef El Housni, Georgios Fotiadis
2025/1310 (PDF ) A Comprehensive Survey of Privacy-Preserving Decision Trees Based on Homomorphic Encryption El Hadji Mamadou DIA, Walid ARABI, Anis BKAKRIA, Reda YAICH
2025/1309 (PDF ) SoK: Deep Learning-based Side-channel Analysis Trends and Challenges Sengim Karayalcin, Marina Krcek, Stjepan Picek
2025/1308 (PDF ) Efficient High-Order Masking of FrodoKEM’s CDT-Based Gaussian Sampler Elie Eid, Aurélien Greuet, Nathan Reboud, Rina Zeitoun
2025/1307 (PDF ) The Post-Quantum Security of Bitcoin's Taproot as a Commitment Scheme Tim Ruffing
2025/1306 (PDF ) Rethinking Learning-based Symmetric Cryptanalysis: a Theoretical Perspective Yufei Yuan, Haiyi Xu, Jiaye Teng, Lei Zhang, Wenling Wu
2025/1305 (PDF ) Barely Doubly-Efficient SimplePIR Keewoo Lee
2025/1302 (PDF ) FHERMA Cookbook: FHE Components for Privacy-Preserving Applications Janis Adamek, Aikata Aikata, Ahmad Al Badawi, Andreea Alexandru, Armen Arakelov, Philipp Binfet, Victor Correa, Jules Dumezy, Sergey Gomenyuk, Valentina Kononova, Dmitrii Lekomtsev, Vivian Maloney, Chi-Hieu Nguyen, Yuriy Polyakov, Daria Pianykh, Hayim Shaul, Moritz Schulze Darup, Dieter Teichrib, Dmitry Tronin, Gurgen Arakelov
2025/1301 (PDF ) Evaluating Larger Lookup Tables using CKKS Jules Dumezy, Andreea Alexandru, Yuriy Polyakov, Pierre-Emmanuel Clet, Olive Chakraborty, Aymen Boudguiga
2025/1300 (PDF ) PlasmaFold: An Efficient and Scalable Layer 2 with Client-Side Proving Pierre Daix-Moreux, Chengru Zhang
2025/1299 (PDF ) Sota Voce: Low-Noise Sampling of Sparse Fixed-Weight Vectors Décio Luiz Gazzoni Filho, Gora Adj, Slim Bettaieb, Alessandro Budroni, Jorge Chávez-Saab, Francisco Rodríguez-Henríquez
2025/1298 (PDF ) OverModRaise: Reducing Modulus Consumption of CKKS Bootstrapping Jihwan Kim, Jung Hee Cheon, Yongdong Yeo
2025/1297 (PDF ) On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search Takeshi Yoshida, Keita Emura
2025/1296 (PDF ) Gödel in Cryptography: Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup, and Perfect Soundness Rahul Ilango
2025/1295 (PDF ) The computational refined Humbert invariant problem is equivalent to the computational isogeny problem Eda Kırımlı, Chloe Martindale
2025/1294 (PDF ) Interstellar: Efficient GKR-based IVC Scheme with Privacy-Preserving Collaborative Folding Jieyi Long
2025/1293 (PDF ) ECTester: Reverse-engineering side-channel countermeasures of ECC implementations Vojtech Suchanek, Jan Jancar, Jan Kvapil, Petr Svenda, Łukasz Chmielewski
2025/1292 (PDF ) Key Attack on the ACDGV Matrix Encryption Scheme Anmoal Porwal, Antonia Wachter-Zeh, Pierre Loidreau
2025/1291 (PDF ) A note on the security of the BitVM3 garbling scheme Ariel Futoransky, Gabriel Larotonda, Fadi Barbara
2025/1290 (PDF ) Improving the Selection Rule of Correlation Attacks for Remote Power Analysis Oriol Farràs, Vincent Grosso, Miquel Guiot, Carlos Andres Lara-Nino
2025/1289 (PDF ) AlphaFL: Secure Aggregation with Malicious$^2$ Security for Federated Learning against Dishonest Majority Yufan Jiang, Maryam Zarezadeh, Tianxiang Dai, Stefan Köpsell
2025/1288 (PDF ) New Proof for Plain OAEP: Post-Quantum Security without Parameter Restrictions or Collision-Resistance Heming Liao, Jiangxia Ge, Shujiao Cao, Rui Xue
2025/1287 (PDF ) Fault Injection Evaluation with Statistical Analysis - How to Deal with Nearly Fabricated Large Circuits Felix Uhle, Nicolai Müller, Amir Moradi
2025/1286 (PDF ) State-Based Classical Shadows Zvika Brakerski, Nir Magrafta, Tomer Solomon
2025/1285 (PDF ) FRIttata: A FRI-based Polynomial Commitment Scheme for Distributed Proof Generation Hua Xu, Mariana Gama, Emad Heydari Beni, Jiayi Kang
2025/1284 (PDF ) A Hybrid Algorithm for the Regular Syndrome Decoding Problem Tianrui Wang, Anyu Wang, Kang Yang, Hanlin Liu, Yu Yu, Jun Zhang, Xiaoyun Wang
2025/1283 (PDF ) Fast AVX-512 Implementation of the Optimal Ate Pairing on BLS12-381 Hao Cheng, Georgios Fotiadis, Johann Großschädl, Daniel Page
2025/1282 (PDF ) A Novel Partial Key Exposure Attack on Common Prime RSA Mengce Zheng, Abderrahmane Nitaj
2025/1281 (PDF ) Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith's Techniques Mengce Zheng, Yansong Feng, Abderrahmane Nitaj, Yanbin Pan
2025/1280 (PDF ) SecFePAS: Secure Facial-Expression-Based Pain Assessment with Deep Learning at the Edge Kanwal Batool, Saleem Anwar, Zolt´an Ad´am Mann
2025/1279 (PDF ) Multi-Authority Registered Attribute-Based Encryption George Lu, Brent Waters, David J. Wu
2025/1278 (PDF ) On the Security Risks of Covert Password Manager Providers Gildas Avoine, Amit Singh Bhati, Xavier Carpent, Diane Leblanc-Albarel
2025/1277 (PDF ) Scalable Accountable Byzantine Agreement and Beyond Pierre Civit, Daniel Collins, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic, Manuel Vidigueira, Pouriya Zarbafian
2025/1276 (PDF ) On Weak NIZKs, One-way Functions and Amplification Suvradip Chakraborty, James Hulett, Dakshita Khurana
2025/1275 (PDF ) Improving the Fault Robustness of Polynomial Masking Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Elena Micheli, Maximilian Orlt, Pajam Pauls, Kathrin Wirschem, Liang Zhao
2025/1274 (PDF ) Improved Matrix Inversion with Packed Ciphertexts using Fully Homomorphic Encryption Seunghu Kim, Seongbong Choi, Hyung Tae Lee
2025/1273 (PDF ) Threshold Structure-Preserving Signatures with Randomizable Key Ahmet Ramazan Ağırtaş, Emircan Çelik, Oğuz Yayla
2025/1272 (PDF ) EinHops: Einsum Notation for Expressive Homomorphic Operations on RNS-CKKS Tensors Karthik Garimella, Austin Ebel, Brandon Reagen
2025/1271 (PDF ) Applications Of Zero-Knowledge Proofs On Bitcoin Yusuf Ozmiş
2025/1270 (PDF ) Key Recovery from Side-Channel Power Analysis Attacks on Non-SIMD HQC Decryption Nathan Maillet, Cyrius Nugier, Vincent Migliore, Jean-Christophe Deneuville
2025/1269 (PDF ) Linear Prover IOPs in Log Star Rounds Noor Athamnah, Noga Ron-Zewi, Ron D. Rothblum
2025/1268 (PDF ) What’s the Matter? An In-Depth Security Analysis of the Matter Protocol Sayon Duttagupta, Arman Kolozyan, Georgio Nicolas, Bart Preneel, Dave Singelee
2025/1267 (PDF ) SMOOTHIE: (Multi-)Scalar Multiplication Optimizations On TFHE Xander Pottier, Jan-Pieter D'Anvers, Thomas de Ruijter, Ingrid Verbauwhede
2025/1266 (PDF ) Efficiently parsing existing eID documents for zero-knowledge proofs Tom Godden, Ruben De Smet, Kris Steenhaut, An Braeken
2025/1265 (PDF ) A note on a recent attack against SPEEDY-7-192 Christina Boura, Patrick Derbez, Baptiste Germon, Rachelle Heim Boissier, María Naya-Plasencia
2025/1264 (PDF ) Copy Protecting Cryptographic Functionalities over Entropic Inputs Fuyuki Kitagawa, Takashi Yamakawa
2025/1263 (PDF ) OasisDB: An Oblivious and Scalable System for Relational Data Haseeb Ahmed, Nachiket Rao, Abdelkarim Kati, Florian Kerschbaum, Sujayya Maiyya
2025/1262 (PDF ) Vectorised Hashing Based on Bernstein-Rabin-Winograd Polynomials over Prime Order Fields Kaushik Nath, Palash Sarkar
2025/1261 (PDF ) FAEST for Memory-Constrained Devices with Side-Channel Protections Diego F. Aranha, Johan Degn, Jonathan Eilath, Kent Nielsen, Peter Scholl
2025/1260 (PDF ) Opossum Attack: Application Layer Desynchronization using Opportunistic TLS Robert Merget, Nurullah Erinola, Marcel Maehren, Lukas Knittel, Sven Hebrok, Marcus Brinkmann, Juraj Somorovsky, Jörg Schwenk
2025/1259 (PDF ) Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519 Marcel Nageler, Lorenz Schmid, Maria Eichlseder
2025/1258 (PDF ) Multi-Source Randomness Extraction and Generation in the Random-Oracle Model Sandro Coretti, Pooya Farshim, Patrick Harasser, Karl Southern
2025/1257 (PDF ) Non-Profiled Higher-Order Side-Channel Attacks against Lattice-Based Post-Quantum Cryptography Tolun Tosun, Elisabeth Oswald, Erkay Savaş
2025/1256 (PDF ) Lattice-based Multi-key Homomorphic Signatures Forward-unforgeable against Signing Key Leakage Ye Xu, Takashi Nishide
2025/1255 (PDF ) Efficient Full Domain Functional Bootstrapping from Recursive LUT Decomposition Intak Hwang, Shinwon Lee, Seonhong Min, Yongsoo Song
2025/1254 (PDF ) Batch Decryption without Epochs and its Application to Encrypted Mempools Dan Boneh, Evan Laufer, Ertem Nusret Tas
2025/1253 (PDF ) SoK: BitVM with Succinct On-Chain Cost Weikeng Chen
2025/1252 (PDF ) Tree PCPs Tamer Mour, Alon Rosen, Ron Rothblum
2025/1251 (PDF ) Black Box to Blueprint: Visualizing Leakage Propagation in Deep Learning Models for SCA Suvadeep Hajra, Debdeep Mukhopadhyay
2025/1250 (PDF ) The Weighted Sum Correlation Analysis Elena Dubrova, Sönke Jendral, Yanning Ji, Ruize Wang
2025/1249 (PDF ) An Automated Model to Search For Differential Meet-In-The-Middle Attack: Applications to AndRX Ciphers Debasmita Chakraborty, Soumya Sahoo, Phuong Hoa Nguyen, Santanu Sarkar
2025/1248 (PDF ) Beyond Side-Channels: Evaluating Inner Product Masking Against SIFA Wu Qianmei, Sayandeep Saha, Wei Cheng, Fan Zhang, Shivam Bhasin
2025/1247 (PDF ) Field-Tested Authentication for Quantum Key Distribution and DoS Attacks Antoine Gansel, Juliane Krämer, Tim Schumacher, Patrick Struck, Maximilian Tippmann, Thomas Walther
2025/1246 (PDF ) On Round-Optimal Computational VSS Karim Baghery, Navid Ghaedi Bardeh, Shahram Khazaei, Mahdi Rahimi
2025/1245 (PDF ) Integrating and Benchmarking KpqC in TLS/X.509 Minjoo Sim, Gyeongju Song, Minwoo Lee, Seyoung Yoon, Anubhab Baksi, Hwajeong Seo
2025/1244 (PDF ) A New Bijective Pairing Alternative for Encoding Natural Numbers Manideep Thotakura
2025/1243 (PDF ) Improved algorithms for ascending isogeny volcanoes, and applications Steven Galbraith, Valerie Gilchrist, Damien Robert
2025/1242 (PDF ) Note: Full-round distinguisher for Synergy Orr Dunkelman, Eran Lambooij, Gaëtan Leurent
2025/1241 (PDF ) Public Key Linting for ML-KEM and ML-DSA Evangelos Karatsiolis, Franziskus Kiefer, Juliane Krämer, Mirjam Loiero, Christian Tobias, Maximiliane Weishäupl
2025/1240 (PDF ) pracy: A Practical Compiler for Attribute-Based Encryption in Python Sven Argo, Marloes Venema, Adrian Ackermann, Tim Güneysu
2025/1239 (PDF ) Improved (Again) Key Pair Generation for Falcon, BAT and Hawk Thomas Pornin
2025/1238 (PDF ) Extended $c$-differential distinguishers of full $9$ and reduced-round Kuznyechik cipher, no pre-whitening Pantelimon Stanica, Ranit Dutta, Bimal Mandal
2025/1237 (PDF ) Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog Peter Gutmann, Stephan Neuhaus
2025/1236 (PDF ) Exploring Marginal Guesswork with the Theorem of Berry-Esséen Timo Glaser
2025/1235 (PDF ) HiAE Remains Secure in Its Intended Model: A Clarification of Claimed Attacks Han Chen, Tao Huang, Phuong Pham, Shuang Wu
2025/1234 (PDF ) LegoLog: A configurable transparency log Vivian Fang, Emma Dauterman, Akshay Ravoor, Akshit Dewan, Raluca Ada Popa
2025/1233 (PDF ) Improved Constant-Sized Polynomial Commitment Schemes Without Trusted Setup Shihui Fu
2025/1232 (PDF ) OMIX: Offline Mixing for Scalable Self-Tallying Elections Sébastien Canard, Liam Medley, Duy Nguyen, Duong Hieu Phan
2025/1231 (PDF ) Compressing steganographic payloads with LLM assistance Jaisal Ahmadullah
2025/1230 (PDF ) ABE Cubed: Advanced Benchmarking Extensions for ABE Squared Sven Argo, Marloes Venema, Doreen Riepel, Tim Güneysu, Diego F. Aranha
2025/1229 (PDF ) NTRU with Hints: Recovering NTRU Secret Keys from Partial Leakage Honglin Shao, Yuejun Liu, Mingyao Shao, Yongbin Zhou
2025/1228 (PDF ) Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication Christopher Battarbee, Christoph Striecks, Ludovic Perret, Sebastian Ramacher, Kevin Verhaeghe
2025/1227 (PDF ) Improved Key-recovery Attacks on ARADI Orr Dunkelman, Shibam Ghosh
2025/1226 (PDF ) Rational Censorship Attack: Breaking Blockchain with a Blackboard Michelle Yeo, Haoqian Zhang
2025/1225 (PDF ) Lattice EPID with Efficient Revocation Corentin Jeudy, Olivier Sanders
2025/1224 (PDF ) An Update to ``Polynomial Hashing over Prime Order Fields'' Kaushik Nath, Palash Sarkar
2025/1223 (PDF ) Efficient Pseudorandom Correlation Generators over $\mathbb{Z}/p^k\mathbb{Z}$ Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan
2025/1222 (PDF ) SoK: Reassessing Side-Channel Vulnerabilities and Countermeasures in PQC Implementations Patrik Dobias, Azade Rezaeezade, Łukasz Chmielewski, Lukas Malina, Lejla Batina
2025/1221 (PDF ) EWEMrl: A White-Box Secure Cipher with Longevity Avik Chakraborti, Shibam Ghosh, Takanori Isobe, Sajani Kundu
2025/1220 (PDF ) RoK and Roll – Verifier-Efficient Random Projection for $\tilde{O}(\lambda)$-size Lattice Arguments Michael Klooß, Russell W. F. Lai, Ngoc Khanh Nguyen, Michał Osadnik
2025/1219 (PDF ) Foundations of Single-Decryptor Encryption Fuyuki Kitagawa, Takashi Yamakawa
2025/1218 (PDF ) Revisiting Module Lattice-based Homomorphic Encryption and Application to Secure-MPC Anisha Mukherjee, Sujoy Sinha Roy
2025/1217 (PDF ) Cymric: Short-tailed but Mighty Alexandre Adomnicăi, Wonseok Choi, Yeongmin Lee, Kazuhiko Minematsu, Yusuke Naito
2025/1216 (PDF ) Ring-LWR based Commitments and ZK-PoKs with Application to Verifiable Quantum-Safe Searchable Symmetric Encryption Debadrita Talapatra, Nimish Mishra, Debdeep Mukhopadhyay
2025/1215 (PDF ) Highly Scalable Searchable Symmetric Encryption for Boolean Queries from NTRU Lattice Trapdoors Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay
2025/1214 (PDF ) Hobbit: Space-Efficient zkSNARK with Optimal Prover Time Christodoulos Pappas, Dimitrios Papadopoulos
2025/1213 (PDF ) Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model Yi-Fan Tseng, Yi-Jiin Lu, Tien-Lin Tsai, Zi-Yuan Liu
2025/1212 (PDF ) All Proof of Work But No Proof of Play Hayder Tirmazi
2025/1211 (PDF ) May the Force $\textit{not}$ Be with you: Brute-Force Resistant Biometric Authentication and Key Reconstruction Alexandra Boldyreva, Deep Inder Mohan, Tianxin Tang
2025/1210 (PDF ) A Generalized Approach to Root-based Attacks against PLWE Iván Blanco Chacón, Raúl Durán Díaz, Rodrigo Martín Sánchez-Ledesma
2025/1209 (PDF ) RingSG: Optimal Secure Vertex-Centric Computation for Collaborative Graph Processing Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu
2025/1208 (PDF ) End-to-End Encrypted Git Services Ya-Nan Li, Yaqing Song, Qiang Tang, Moti Yung
2025/1207 (PDF ) Copy-Protection from UPO, Revisited Prabhanjan Ananth, Amit Behera, Zikuan Huang
2025/1206 (PDF ) New Upper and Lower Bounds for Perfectly Secure MPC Ivan Damgård, Shravani Patil, Arpita Patra, Lawrence Roy
2025/1205 (PDF ) Generic Construction of Threshold Ring Signatures and Lattice-based Instantiations Hao Lin, Mingqiang Wang, Weiqiang Wen, Shi-Feng Sun, Kaitai Liang
2025/1204 (PDF ) A search to distinguish reduction for the isomorphism problem on direct sum lattices Daniël van Gent, Wessel van Woerden
2025/1203 (PDF ) Breaking The Authenticated Encryption scheme HiAE Xichao Hu, Lin Jiao, Dengguo Feng, Yonglin Hao, Senpeng Wang, Yongqiang Li, Xinxin Gong
2025/1202 (PDF ) t-Probing (In-)Security - Pitfalls on Noise Assumptions Dina Hesse, Jakob Feldtkeller, Tim Güneysu, Julius Hermelink, Georg Land, Markus Krausz, Jan Richter-Brockmann
2025/1201 (PDF ) BitBatSPIR: Efficient Batch Symmetric Private Information Retrieval from PSI Shuaishuai Li, Liqiang Peng, Weiran Liu, Cong Zhang, Zhen Gu, Dongdai Lin
2025/1200 (PDF ) Tricycle: Private Transformer Inference with Tricyclic Encodings Lawrence Lim, Vikas Kalagi, Divyakant Agrawal, Amr El Abbadi
2025/1199 (PDF ) HypSCA: A Hyperbolic Embedding Method for Enhanced Side-channel Attack Kaibin Li, Yihuai Liang, Zhengchun Zhou, Shui Yu
2025/1198 (PDF ) Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography Extensions Markku-Juhani O. Saarinen
2025/1197 (PDF ) How to Copy-Protect All Puncturable Functionalities Without Conjectures: A Unified Solution to Quantum Protection Alper Çakan, Vipul Goyal
2025/1196 (PDF ) Limits on the Power of Private Constrained PRFs Mengda Bi, Chenxin Dai, Yaohua Ma
2025/1195 (PDF ) On symbolic computations and Post Quantum Cryptography with Lie Geometries. Vasyl Ustimenko
2025/1194 (PDF ) Private coins extension with verifiable encryption Oleg Fomenko
2025/1193 (PDF ) Non-Homomorphic Key Blinding from Symmetric Primitives Thomas Bellebaum
2025/1192 (PDF ) PrivacyGo: Privacy-Preserving Ad Measurement with Multidimensional Intersection Jian Du, Haohao Qian, Shikun Zhang, Wen-jie Lu, Donghang Lu, Yongchuan Niu, Bo Jiang, Yongjun Zhao, Qiang Yan
2025/1191 (PDF ) A Polynomial Public-Key Cryptosystem Based on Jacobian-Preserving Composition Saimon Ahmed
2025/1190 (PDF ) Towards AI-driven Optimization of Robust Probing Model-compliant Masked Hardware Gadgets Using Evolutionary Algorithms David S. Koblah, Dev M. Mehta, Mohammad Hashemi, Fatemeh Ganji, Domenic Forte
2025/1189 (PDF ) Performance and Privacy: A Low-Latency Secure Anonymous Authentication Protocol with OPRF Wenjv Hu, Yanping Ye, Yin Li
2025/1188 (PDF ) Depth-Optimized Quantum Implementation of CHAM Kyungbae Jang, Yujin Oh, Hwajeong Seo
2025/1187 (PDF ) Ligerito: A Small and Concretely Fast Polynomial Commitment Scheme Andrija Novakovic, Guillermo Angeris
2025/1186 (PDF ) Unconditional Individual Verifiability with Receipt Freeness via Post-Cast Isolation Janis Erdmanis
2025/1185 (PDF ) From Worst-Case Hardness of $\mathsf{NP}$ to Quantum Cryptography via Quantum Indistinguishability Obfuscation Tomoyuki Morimae, Yuki Shirakawa, Takashi Yamakawa
2025/1184 (PDF ) zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference Wenjie Qu, Yijun Sun, Xuanming Liu, Tao Lu, Yanpei Guo, Kai Chen, Jiaheng Zhang
2025/1183 (PDF ) PA1 Security on Release of Unverified Plaintext in Encrypt-then-MAC AE Schemes Bart Mennink, Suprita Talnikar
2025/1182 (PDF ) Pseudorandom Correlation Generators for Multiparty Beaver Triples over $\mathbb{F}_2$ Peihan Miao, Alice Murphy, Akshayaram Srinivasan, Max Tromanhauser
2025/1181 (PDF ) UOV-Based Verifiable Timed Signature Scheme Erkan Uslu, Oğuz Yayla
2025/1180 (PDF ) Cryptanalysis of HiAE Alexander Bille, Elmar Tischhauser
2025/1179 (PDF ) A Tale of Two Worlds, a Formal Story of WireGuard Hybridization Pascal Lafourcade, Dhekra Mahmoud, Sylvain Ruhault, Abdul Rahman Taleb
2025/1177 (PDF ) HY-QSN: HYbrid Quantum Safe Networks Sayan Das, Aarav Varshney, Prasanna Ravi, Anupam Chattopadhyay
2025/1176 (PDF ) Solve Approximate CVP via Variants of Nearest-Colattice Wenwen Xia, Geng Wang, Dawu Gu
2025/1175 (PDF ) Simple VESS Victor Shoup
2025/1174 (PDF ) Efficient Constant-Size Linkable Ring Signatures for Ad-Hoc Rings via Pairing-Based Set Membership Arguments Min Xie, Zhengzhou Tu, Man Ho Au, Junbin Fang, Xuan Wang, Zoe Lin Jiang
2025/1173 (PDF ) The Effectiveness of Differential Privacy in Real-world Settings: A Metrics-based Framework to help Practitioners Visualise and Evaluate $\varepsilon$ Akasha Shafiq, Abhishek Kesarwani, Dimitrios Vasilopoulos, Paolo Palmieri
2025/1172 (PDF ) Guarding the Signal: Secure Messaging with Reverse Firewalls Yevgeniy Dodis, Bernardo Magri, Noah Stephens-Davidowitz, Yiannis Tselekounis
2025/1171 (PDF ) Beyond LWE: a Lattice Framework for Homomorphic Encryption Alberto Leporati, Lorenzo Rovida, Wessel van Woerden
2025/1170 (PDF ) Optimized Rank Sort for Encrypted Real Numbers Seunghu Kim, Eymen Ünay, Ayse Yilmazer-Metin, Hyung Tae Lee
2025/1169 (PDF ) Understanding Lasso: A Novel Lookup Argument Protocol Oleg Fomenko, Anton Levochko
2025/1168 (PDF ) On Frontrunning Risks in Batch-Order Fair Systems for Blockchains (Extended Version) Eunchan Park, Taeung Yoon, Hocheol Nam, Deepak Maram, Min Suk Kang
2025/1167 (PDF ) Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester Mizuki Hayashi, Keita Emura
2025/1166 (PDF ) Threshold Signatures Reloaded: ML-DSA and Enhanced Raccoon with Identifiable Aborts Giacomo Borin, Sofía Celi, Rafael del Pino, Thomas Espitau, Guilhem Niot, Thomas Prest
2025/1165 (PDF ) Automated Analysis and Synthesis of Message Authentication Codes Stefan Milius, Dominik Paulus, Dominique Schröder, Lutz Schröder, Julian Thomas
2025/1164 (PDF ) Man-in-the-Middle and Key Recovery Attacks against QP-KEM Nick Aquina, Simon Rommel, Idelfonso Tafur Monroy
2025/1163 (PDF ) Quorus: Efficient, Scalable Threshold ML-DSA Signatures from MPC Alexander Bienstock, Leo de Castro, Daniel Escudero, Antigoni Polychroniadou, Akira Takahashi
2025/1161 (PDF ) High-Performance FPGA Accelerator for the Post-quantum Signature Scheme CROSS Patrick Karl, Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Georg Sigl
2025/1160 (PDF ) Black-box Approaches to Authenticated Dictionaries: New Constructions and Lower Bounds Francesca Falzon, Harjasleen Malvai, Emanuel Opel
2025/1159 (PDF ) $\mathsf{DekartProof}$: Efficient Vector Range Proofs and Their Applications Dan Boneh, Trisha Datta, Rex Fernando, Kamilla Nazirkhanova, Alin Tomescu
2025/1158 (PDF ) Bridging Bitcoin to Second Layers via BitVM2 Robin Linus, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Andrea Pelosi, Orfeas Thyfronitis Litos, Christos Stefo, David Tse, Alexei Zamyatin
2025/1157 (PDF ) General Multi-Prime Multi-Power RSA - A Generalization of RSA and CRT-RSA to Regular Integers Modulo $n$ Klaus Dohmen, Mandy Lange-Geisler
2025/1156 (PDF ) An efficient construction of Raz's two-source randomness extractor with improved parameters Cameron Foreman, Lewis Wooltorton, Kevin Milner, Florian J. Curchod
2025/1155 (PDF ) On the Security of Group Ring Learning with Errors Andrew Mendelsohn, Charles Grover, Cong Ling
2025/1154 (PDF ) Evaluation of Modular Polynomials from Supersingular Elliptic Curves Maria Corte-Real Santos, Jonathan Komada Eriksen, Antonin Leroux, Michael Meyer, Lorenz Panny
2025/1153 (PDF ) Privacy-aware White and Black List Searching for Fraud Analysis William J Buchanan, Jamie Gilchrist, Zakwan Jaroucheh, Dmitri Timosenko, Nanik Ramchandani, Hisham Ali
2025/1152 (PDF ) ZK-ProVer: Proving Programming Verification in Non-Interactive Zero-Knowledge Proofs Haoyu Wei, Jingyu Ke, Ruibang Liu, Guoqiang Li
2025/1151 (PDF ) Faster signature verification with 3-dimensional decomposition Vojtech Suchanek, Marek Sys, Lukasz Chmielewski
2025/1150 (PDF ) Lightweight Sorting in Approximate Homomorphic Encryption Lorenzo Rovida, Alberto Leporati, Simone Basile
2025/1149 (PDF ) An Efficient Encryption Scheme Based on $(U+V, U+W)$ Codes Yang Yang, Fangguo Zhang
2025/1148 (PDF ) On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security Avik Chakraborti, Mridul Nandi, Suprita Talnikar, Kan Yasuda
2025/1147 (PDF ) Jigsaw: Doubly Private Smart Contracts Sanjam Garg, Aarushi Goel, Dimitris Kolonelos, Rohit Sinha
2025/1146 (PDF ) QV-net: Decentralized Self-Tallying Quadratic Voting with Maximal Ballot Secrecy Zibo Zhou, Zongyang Zhang, Feng Hao, Bowen Zheng, Zulkarnaim Masyhur
2025/1145 (PDF ) Dynamic Group Signatures with Verifier-Local Revocation Callum London, Daniel Gardham, Constantin Catalin Dragan
2025/1144 (PDF ) Parasol Compiler: Pushing the Boundaries of FHE Program Efficiency Rick Weber, Ryan Orendorff, Ghada Almashaqbeh, Ravital Solomon
2025/1143 (PDF ) Wedges, oil, and vinegar -- An analysis of UOV in the exterior algebra Lars Ran
2025/1142 (PDF ) OnionPIRv2: Efficient Single-Server PIR Yue Chen, Ling Ren
2025/1141 (PDF ) LZKSA: Lattice-Based Special Zero-Knowledge Proofs for Secure Aggregation's Input Verification Zhi Lu, Songfeng Lu
2025/1140 (PDF ) Unconditionally secure encryption algorithm with unified confidentiality and integrity Zhen-Hu Ning
2025/1139 (PDF ) From Permissioned to Proof-of-Stake Consensus Jovan Komatovic, Andrew Lewis-Pye, Joachim Neu, Tim Roughgarden, Ertem Nusret Tas
2025/1138 (PDF ) ZK-NR: A Layered Cryptographic Architecture for Explainable Non-Repudiation Thierry Emmanuel MINKA MI NGUIDJOI, MANI ONANA Flavien Serge, DJOTIO NDIÉ Thomas
2025/1137 (PDF ) Security Analysis on UOV Families with Odd Characteristics: Using Symmetric Algebra Yi Jin, Yuansheng Pan, Xiaoou He, Boru Gong, Jintai Ding
2025/1136 (PDF ) Learning Parity with Quantization: Achieving Full-Rate Encryption by Exploiting Quantization Noise in Code-Based Cryptography Shanxiang Lyu, Ling Liu, Cong Ling
2025/1135 (PDF ) Keep It Unsupervised: Horizontal Attacks Meet Simple Classifiers Sana Boussam, Ninon Calleja Albillos
2025/1134 (PDF ) Optimal Dimensionality Reduction using Conditional Variational AutoEncoder Sana Boussam, Mathieu Carbone, Benoît Gérard, Guénaël Renault, Gabriel Zaid
2025/1133 (PDF ) A Note on the Rank Defect Phenomena in The Linearization Attack on Elisabeth-4 Antoine Bak
2025/1132 (PDF ) Foundations of Multi-Designated Verifier Signature: Comprehensive Formalization and New Constructions in Subset Simulation Keitaro Hashimoto, Kyosuke Yamashita, Keisuke Hara
2025/1131 (PDF ) Empowering Privacy: A Zero Cost Protocol for Concealing LGBTQ Search Queries Akshit Aggarwal, Pulkit Bharti, Yang Li, Srinibas Swain
2025/1130 (PDF ) An Open-Source Framework for Efficient Side-Channel Analysis on Cryptographic Implementations Takuya Kojima, Masaki Morita, Hideki Takase, Hiroshi Nakamura
2025/1129 (PDF ) Lattice-based Obfuscation from NTRU and Equivocal LWE Valerio Cini, Russell W. F. Lai, Ivy K. Y. Woo
2025/1128 (PDF ) Solving LWE with Independent Hints about Secret and Errors Qian Lu, Yansong Feng, Yanbin Pan
2025/1127 (PDF ) KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2025/1126 (PDF ) Leakage-Resilient Extractors against Number-on-Forehead Protocols Eshan Chattopadhyay, Jesse Goodman
2025/1125 (PDF ) Reusable Designated Verifier NIZK from Lossy Trapdoor Functions Riddhi Ghosal, Ilan Komargodski, Brent Waters
2025/1124 (PDF ) Toxic Decoys: A Path to Scaling Privacy-Preserving Cryptocurrencies Christian Cachin, François-Xavier Wicht
2025/1123 (PDF ) Cryptographic Treatment of Key Control Security -- In Light of NIST SP 800-108 Ritam Bhaumik, Avijit Dutta, Akiko Inoue, Tetsu Iwata, Ashwin Jha, Kazuhiko Minematsu, Mridul Nandi, Yu Sasaki, Meltem Sönmez Turan, Stefano Tessaro
2025/1122 (PDF ) Mechanizing Nested Hybrid Arguments Markus Krabbe Larsen, Carsten Schürmann
2025/1121 (PDF ) 1-private n-party AND from 5 random bits Samuel Dittmer, Rafail Ostrovsky
2025/1120 (PDF ) Traceable Secret Sharing Schemes for General Access Structures Oriol Farràs, Miquel Guiot
2025/1119 (PDF ) Strong Secret Sharing with Snitching Jan Bormet, Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, Marcin Mielniczuk
2025/1118 (PDF ) Extracting Some Layers of Deep Neural Networks in the Hard-Label Setting Isaac A. Canales-Martínez, David Santos
2025/1117 (PDF ) Speeding Up Sum-Check Proving Suyash Bagad, Quang Dao, Yuval Domb, Justin Thaler
2025/1116 (PDF ) The Pipes Model for Latency and Throughput Analysis Andrew Lewis-Pye, Kartik Nayak, Nibesh Shrestha
2025/1115 (PDF ) High-Throughput Permissionless Blockchain Consensus under Realistic Network Assumptions Sandro Coretti, Matthias Fitzi, Aggelos Kiayias, Giorgos Panagiotakos, Alexander Russell
2025/1114 (PDF ) VCR: Fast Private Set Intersection with Improved VOLE and CRT-Batching Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu
2025/1113 (PDF ) Computational Attestations of Polynomial Integrity Towards Verifiable Back-Propagation Dustin Ray, Caroline El Jazmi
2025/1112 (PDF ) Hydrangea: Optimistic Two-Round Partial Synchrony with Improved Fault Resilience Nibesh Shrestha, Aniket Kate, Kartik Nayak
2025/1111 (PDF ) SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference Hao Guo, Zhaoqian Liu, Ximing Fu, Zhusen Liu
2025/1110 (PDF ) A Framework for Compiling Custom Languages as Efficiently Verifiable Virtual Machines Assimakis A. Kattis, Brian Klatt, Philip Quirk, Logan Allen
2025/1109 (PDF ) Kahrobaei--Koupparis DSS: universal forgery Alexander Ushakov
2025/1108 (PDF ) Laconic PSI on Authenticated Inputs and Applications James Bartusek, Sanjam Garg, Abhishek Jain, Guru-Vamsi Policharla
2025/1107 (PDF ) Early Stopping is Cheap Fatima Elsheimy, Simon Holmgaard Kamp, Julian Loss
2025/1106 (PDF ) b4M: Holistic Benchmarking for MPC Karl W. Koch, Dragos Rotaru, Christian Rechberger
2025/1105 (PDF ) Low-cost anonymous reputation update for IoT applications Alex Shafarenko
2025/1104 (PDF ) Better GBFV Bootstrapping and Faster Encrypted Edit Distance Computation Robin Geelen, Frederik Vercauteren
2025/1103 (PDF ) Universally Composable Succinct Vector Commitments and Applications Ran Canetti, Megan Chen
2025/1102 (PDF ) TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System Sajin Sasy, Aaron Johnson, Ian Goldberg
2025/1101 (PDF ) A Note on One Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue Zhengjun Cao, Lihua Liu
2025/1100 (PDF ) Tanuki: New Frameworks for (Concurrently Secure) Blind Signatures from Post-Quantum Groups Actions Lucjan Hanzlik, Yi-Fu Lai, Marzio Mula, Eugenio Paracucchi, Daniel Slamanig, Gang Tang
2025/1099 (PDF ) Lattice-Based Accumulator and Application to Anonymous Credential Revocation Victor Youdom Kemmoe, Anna Lysyanskaya, Ngoc Khanh Nguyen
2025/1098 (PDF ) Efficient post-quantum commutative group actions from orientations of large discriminant Marc Houben
2025/1097 (PDF ) Oracle-Based Multistep Strategy for Solving Polynomial Systems Over Finite Fields and Algebraic Cryptanalysis of the Aradi Cipher Roberto La Scala, Sharwan K. Tiwari
2025/1096 (PDF ) CuFDFB: Fast and Private Computation on Non-Linear Functions Using FHE Shutong Jin, Shiyu Shen, Hao Yang, Donglong Chen, Wangchen Dai, Ray C. C. Cheung
2025/1095 (PDF ) Ideally HAWKward: How Not to Break Module-LIP Clémence Chevignard, Guilhem Mureau
2025/1094 (PDF ) Key-Updatable Identity-Based Signature Schemes Tobias Guggemos, Farzin Renan
2025/1093 (PDF ) On the Concrete Security of BBS/BBS+ Signatures Rutchathon Chairattana-Apirom, Stefano Tessaro
2025/1092 (PDF ) OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries Pratap Singh, Joshua Gancher, Bryan Parno
2025/1091 (PDF ) Quantum Computing without the Linear Algebra Aws Albarghouthi
2025/1090 (PDF ) Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures Shuichi Katsumata, Guilhem Niot, Ida Tucker, Thom Wiggers
2025/1089 (PDF ) Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security Nilanjan Datta, Jean Paul Degabriele, Avijit Dutta, Vukašin Karadžić, Hrithik Nandi
2025/1088 (PDF ) Homomorphic Field Trace Revisited : Breaking the Cubic Noise Barrier Kang Hoon Lee, Ji Won Yoon
2025/1087 (PDF ) Cryptography meets worst-case complexity: Optimal security and more from iO and worst-case assumptions Rahul Ilango, Alex Lombardi
2025/1086 (PDF ) Fairness in the Wild: Secure Atomic Swap with External Incentives Hao Chung, Elisaweta Masserova, Elaine Shi, Sri AravindaKrishnan Thyagarajan
2025/1085 (PDF ) SmallWood: Hash-Based Polynomial Commitments and Zero-Knowledge Arguments for Relatively Small Instances Thibauld Feneuil, Matthieu Rivain
2025/1084 (PDF ) Combining Oblivious Pseudorandom Functions Sebastian Faller, Marc Fischlin, Julius Hardt, Julia Hesse
2025/1083 (PDF ) The complexity of the SupportMinors Modeling for the MinRank Problem Giulia Gaggero, Elisa Gorla, Daniel Cabarcas
2025/1082 (PDF ) Treebeard: A Scalable and Fault Tolerant ORAM Datastore Amin Setayesh, Cheran Mahalingam, Emily Chen, Sujaya Maiyya
2025/1081 (PDF ) FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC Zhengyuan Su, Qi Pang, Simon Beyzerov, Wenting Zheng
2025/1080 (PDF ) Leftover Hash Lemma(s) Over Cyclotomic Rings Katharina Boudgoust, Oleksandra Lapiha
2025/1079 (PDF ) Revisiting Discrete Logarithm Reductions Maiara F. Bollauf, Roberto Parisella, Janno Siim
2025/1078 (PDF ) A Theoretical Perspective on the Formal Verification of IoT Protocols Using LTL and Rewriting Logic in Maude Delia-Iustina Grigoriță
2025/1077 (PDF ) Shorter VOLE-in-the-Head-based Signatures from Vector Semi-Commitment Seongkwang Kim, Byeonghak Lee, Mincheol Son
2025/1076 (PDF ) Weight reduction in distributed protocols: new algorithms and analysis Anatoliy Zinovyev
2025/1075 (PDF ) Secure and Practical Cold (and Hot) Staking Mario Larangeira
2025/1074 (PDF ) Multiparty Distributed Point Functions Aarushi Goel, Mingyuan Wang, Zhiheng Wang
2025/1073 (PDF ) LAPWN: A Lightweight User–Server Authentication Protocol for Wireless Networks Sajjad Alizadeh, Reza Hooshmand
2025/1072 (PDF ) How to Model Unitary Oracles Mark Zhandry
2025/1071 (PDF ) PICS: Private Intersection over Committed (and reusable) Sets Aarushi Goel, Peihan Miao, Phuoc Van Long Pham, Satvinder Singh
2025/1070 (PDF ) Zeus: Defending against Fee Stealing and Griefing Attacks in Multi-Hop Payments Jingyu Liu, Yingjie Xue, Di Wu, Jian Liu, Xuechao Wang
2025/1069 (PDF ) PRESENT Full Round Emulation : Structural Flaws and Predictable Outputs Gopal Singh
2025/1068 (PDF ) Efficient Modular Multiplication Using Vector Instructions on Commodity Hardware Simon Langowski, Srini Devadas
2025/1067 (PDF ) Full Anonymity in the Asynchronous Setting from Peony Onion Encryption Megumi Ando, Miranda Christ, Kashvi Gupta, Tal Malkin, Dane Smith
2025/1066 (PDF ) A New PUF-Based Authenticated Key Establishment Protocol for V2G Networks Milad Seddigh, Seyed Hamid Baghestani, Mahdi Esfahani
2025/1065 (PDF ) High-Order and Cortex-M4 First-Order Implementations of Masked FrodoKEM François Gérard, Morgane Guerreau
2025/1064 (PDF ) Achieving Blockchain-Secured Cryptographic Primitives from Signature-Based Witness Encryption Lev Stambler
2025/1063 (PDF ) MIZAR: Boosting Secure Three-Party Deep Learning with Co-Designed Sign-Bit Extraction and GPU Acceleration Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Tianwei Zhang, Jin-Song Dong
2025/1062 (PDF ) TrafficProof: Privacy-Preserving Reliable Traffic Information Sharing in Social Internet of Vehicles Stefan Dziembowski, Shahriar Ebrahimi, Parisa Hassanizadeh, Susil Kumar Mohanty
2025/1061 (PDF ) On the Adaptive Security of FROST Elizabeth Crites, Jonathan Katz, Chelsea Komlo, Stefano Tessaro, Chenzhi Zhu
2025/1060 (PDF ) Uniform Black-Box Separations via Non-Malleable Extractors Marshall Ball, Dana Dachman-Soled
2025/1059 (PDF ) Post-Quantum Security of Keyed Sponge-Based Constructions through a Modular Approach Akinori Hosoyamada
2025/1058 (PDF ) Adaptive TDF from any TDF via Pseudorandom Ciphertext PKE Fuyuki Kitagawa, Takahiro Matsuda
2025/1057 (PDF ) Efficient Mixed-Mode Oblivious RAMs Wenhao Zhang, Xiao Wang, Chenkai Weng
2025/1056 (PDF ) Private Signaling Secure Against Actively Corrupted Servers Haotian Chu, Xiao Wang, Yanxue Jia
2025/1055 (PDF ) Single-server Stateful PIR with Verifiability and Balanced Efficiency Pranav Shriram Arunachalaramanan, Ling Ren
2025/1054 (PDF ) Rewardable Naysayer Proofs Gennaro Avitabile, Luisa Siniscalchi, Ivan Visconti
2025/1053 (PDF ) Breaking the 1/λ-Rate Barrier for Arithmetic Garbling Geoffroy Couteau, Carmit Hazay, Aditya Hegde, Naman Kumar
2025/1052 (PDF ) How to Trace Viral Content in End-to-End Encrypted Messaging Pedro Branco, Matthew Green, Aditya Hegde, Abhishek Jain, Gabriel Kaptchuk
2025/1051 (PDF ) Synergy: A Lightweight Block Cipher with Variable Bit Rotation Feistel Network Anders Lindman
2025/1050 (PDF ) Integral Resistance of Block Ciphers with Key Whitening by Modular Addition Christof Beierle, Phil Hebborn, Gregor Leander, Yevhen Perehuda
2025/1049 (PDF ) XHMQV: Better Efficiency and Stronger Security for Signal’s Initial Handshake based on HMQV Rune Fiedler, Felix Günther, Jiaxin Pan, Runzhi Zeng
2025/1048 (PDF ) One-way multilinear functions of the second order with linear shifts Stanislav Semenov
2025/1047 (PDF ) Orient Express: Using Frobenius to Express Oriented Isogenies Wouter Castryck, Riccardo Invernizzi, Gioella Lorenzon, Jonas Meers, Frederik Vercauteren
2025/1046 (PDF ) A Quasi-polynomial Time Algorithm for the Extrapolated Dihedral Coset Problem over Power-of-Two Moduli Shi Bai, Hansraj Jangir, Elena Kirshanova, Tran Ngo, William Youmans
2025/1045 (PDF ) Constrained Verifiable Random Functions Without Obfuscation and Friends Nicholas Brandt, Miguel Cueto Noval, Christoph U. Günther, Akin Ünal, Stella Wohnig
2025/1044 (PDF ) When Threshold Meets Anamorphic Signatures: What is Possible and What is Not! Hien Chu, Khue Do, Lucjan Hanzlik, Sri AravindaKrishnan Thyagarajan
2025/1043 (PDF ) Designing QC-MDPC Public Key Encryption Schemes with Niederreiter's Construction and a Bit Flipping Decoder with Bounded DFR Alessandro Annechini, Alessandro Barenghi, Gerardo Pelosi, Simone Perriello
2025/1042 (PDF ) Crowhammer: Full Key Recovery Attack on Falcon with a Single Rowhammer Bit Flip Calvin Abou Haidar, Quentin Payet, Mehdi Tibouchi
2025/1041 (PDF ) Rubato: Provably Post-Quantum Secure and Batched Asynchronous Randomness Beacon Linghe Yang, Tonghong Chong, Jian Liu, Jingyi Cui, Guangquan Xu, Yude Bai, Lei Zhang, Tao Luo
2025/1040 (PDF ) Weave: Efficient and Expressive Oblivious Analytics at Scale Mahdi Soleimani, Grace Jia, Anurag Khandelwal
2025/1039 (PDF ) Unbounded Distributed Broadcast Encryption and Registered ABE from Succinct LWE Hoeteck Wee, David J. Wu
2025/1038 (PDF ) Security of Operations on Random Numbers: A Review Tejas Sharma, Ashish Kundu
2025/1037 (PDF ) Committed Vector Oblivious Linear Evaluation and Its Applications Yunqing Sun, Hanlin Liu, Kang Yang, Yu Yu, Xiao Wang, Chenkai Weng
2025/1036 (PDF ) A Critique on Average-Case Noise Analysis in RLWE-Based Homomorphic Encryption Mingyu Gao, Hongren Zheng
2025/1035 (PDF ) Continuous Group-Key Agreement: Concurrent Updates without Pruning Benedikt Auerbach, Miguel Cueto Noval, Boran Erol, Krzysztof Pietrzak
2025/1034 (PDF ) JANUS: Enhancing Asynchronous Common Subset with Trusted Hardware Liangrong Zhao, Hans Schmiedel, Qin Wang, Jiangshan Yu
2025/1033 (PDF ) Trusted Hardware-Assisted Leaderless Byzantine Fault Tolerance Consensus Liangrong Zhao, Jérémie Decouchant, Joseph K. Liu, Qinghua Lu, Jiangshan Yu
2025/1032 (PDF ) Constant-Round Asynchronous MPC with Optimal Resilience and Linear Communication Junru Li, Yifan Song
2025/1031 (PDF ) Quasidifferential Saves Infeasible Differential: Improved Weak-Key Key-Recovery Attacks on Round-Reduced GIFT Chengcheng Chang, Meiqin Wang, Wei Wang, Kai Hu
2025/1030 (PDF ) Everlasting Anonymous Rate-Limited Tokens Rutchathon Chairattana-Apirom, Nico Döttling, Anna Lysyanskaya, Stefano Tessaro
2025/1029 (PDF ) Improved Key Recovery Attacks of Ascon Shuo Peng, Kai Hu, Jiahui He, Meiqin Wang
2025/1028 (PDF ) Group Key Progression: Strong Security for Shared Persistent Data Matilda Backendal, David Balbás, Miro Haller
2025/1027 (PDF ) Parallel Repetition for Post-Quantum Arguments Andrew Huang, Yael Tauman Kalai
2025/1026 (PDF ) Malicious Security in Collaborative zk-SNARKs: More than Meets the Eye Sanjam Garg, Aarushi Goel, Abhishek Jain, Bhaskar Roberts, Sruthi Sekar
2025/1025 (PDF ) Secure Noise Sampling for Differentially Private Collaborative Learning Olive Franzese, Congyu Fang, Radhika Garg, Somesh Jha, Nicolas Papernot, Xiao Wang, Adam Dziedzic
2025/1024 (PDF ) Towards Trustless Provenance: A Privacy-Preserving Framework for On-chain Media Verification Piotr Mikołajczyk, Parisa Hassanizadeh, Shahriar Ebrahimi
2025/1023 (PDF ) Universal Channel Rebalancing: Flexible Coin Shifting in Payment Channel Networks Stefan Dziembowski, Shahriar Ebrahimi, Omkar Gavhane, Susil Kumar Mohanty
2025/1022 (PDF ) Burn Your Vote: Decentralized and Publicly Verifiable Anonymous Voting at Scale Shahriar Ebrahimi, Haniyeh Habibi, Parisa Hassanizadeh, Pardis Toolabi, Vincenzo Botta, Stefan Dziembowski
2025/1021 (PDF ) Black-Box Crypto is Useless for Pseudorandom Codes Sanjam Garg, Sam Gunn, Mingyuan Wang
2025/1020 (PDF ) Separating Pseudorandom Codes from Local Oracles Nico Döttling, Anne Müller, Mahesh Sreekumar Rajasree
2025/1019 (PDF ) Silent Splitter: Privacy for Payment Splitting via New Protocols for Distributed Point Functions Margaret Pierce, Saba Eskandarian
2025/1018 (PDF ) MT-TMVP: Modular Tiled TMVP-based Polynomial Multiplication for Post-Quantum Cryptography on FPGAs Shekoufeh Neisarian, Elif Bilge Kavun
2025/1017 (PDF ) Using the Schur Product to Solve the Code Equivalence Problem Michele Battagliola, Rocco Mora, Paolo Santini
2025/1016 (PDF ) Leader Election with Poly-logarithmic Communication Per Party Amey Bhangale, Chen-Da Liu-Zhang, Julian Loss, Kartik Nayak, Sravya Yandamuri
2025/1015 (PDF ) Zero-Knowledge Polynomial Commitment in Binary Fields Benjamin E. Diamond
2025/1014 (PDF ) How to Make Any Computational Secret Sharing Scheme Adaptively Secure George Lu, Brent Waters
2025/1013 (PDF ) Silentium: Implementation of a Pseudorandom Correlation Generator for Beaver Triples Vincent Rieder
2025/1012 (PDF ) Nearly Optimal Parallel Broadcast in the Plain Public Key Model Ran Gelles, Christoph Lenzen, Julian Loss, Sravya Yandamuri
2025/1011 (PDF ) Adaptive TDFs from Injective TDFs Xinyu Mao, Hongxu Yi
2025/1010 (PDF ) UPKE and UKEM Schemes from Supersingular Isogenies Pratima Jana, Ratna Dutta
2025/1009 (PDF ) Adaptively Secure Three-Round Threshold Schnorr Signatures from DDH Renas Bacho, Sourav Das, Julian Loss, Ling Ren
2025/1008 (PDF ) Reviving a Grover based Quantum Secret Sharing Scheme Debajyoti Bera, Santanu Majhi
2025/1007 (PDF ) Scalable Multiparty Computation from Non-linear Secret Sharing Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Mingyuan Wang
2025/1006 (PDF ) Permutation-Based Hash from Non-Idealized Assumptions: Adding Feed-Forward to Sponge Chun Guo, Kai Hu, Shuntian Jiang, Yanhong Fan, Yong Fu, Bart Preneel, Meiqin Wang
2025/1005 (PDF ) TEAKEX: TESLA-Authenticated Group Key Exchange Qinyi Li, Lise Millerjord, Colin Boyd
2025/1004 (PDF ) On Factoring and Power Divisor Problems via Rank-3 Lattices and the Second Vector Yiming Gao, Yansong Feng, Honggang Hu, Yanbin Pan
2025/1003 (PDF ) Low-Latency Dynamically Available Total Order Broadcast Sravya Yandamuri, Nibesh Shrestha, Luca Zanolini, Kartik Nayak
2025/1002 (PDF ) Cool + Cruel = Dual, and New Benchmarks for Sparse LWE Alexander Karenin, Elena Kirshanova, Julian Nowakowski, Eamonn W. Postlethwaite, Ludo N. Pulles, Fernando Virdia, Paul Vié
2025/1001 (PDF ) A Plausible Attack on the Adaptive Security of Threshold Schnorr Signatures Elizabeth Crites, Alistair Stewart
2025/1000 (PDF ) mmCipher: Batching Post-Quantum Public Key Encryption Made Bandwidth-Optimal Hongxiao Wang, Ron Steinfeld, Markku-Juhani O. Saarinen, Muhammed F. Esgin, Siu-Ming Yiu
2025/999 (PDF ) Insecurity of One Ring Signature Scheme with Batch Verification for Applications in VANETs Zhengjun Cao, Lihua Liu
2025/998 (PDF ) On the UC-(In)Security of PAKE Protocols Without the Random Oracle Model Naman Kumar, Jiayu Xu
2025/997 (PDF ) Kerblam — Anonymous Messaging System Protecting Both Senders and Recipients Yanxue Jia, Debajyoti Das, Wenhao Zhang, Aniket Kate
2025/996 (PDF ) Distance-Aware OT with Application to Fuzzy PSI Lucas Piske, Jaspal Singh, Ni Trieu, Vladimir Kolesnikov, Vassilis Zikas
2025/995 (PDF ) NIZK Amplification via Leakage-Resilient Secure Computation Benny Applebaum, Eliran Kachlon
2025/994 (PDF ) A Fast Multiplication Algorithm and RLWE-PLWE Equivalence for the Maximal Real Subfield of the $2^r p^s$-th Cyclotomic Field Wilmar Bolaños, Antti Haavikko, Rodrigo M. Sánchez-Ledesma
2025/993 (PDF ) Fully-Homomorphic Encryption from Lattice Isomorphism Pedro Branco, Giulio Malavolta, Zayd Maradni
2025/992 (PDF ) Improved Private Simultaneous Messages Protocols for Symmetric Functions with Universal Reconstruction Koji Nuida
2025/991 (PDF ) MOAI: Module-Optimizing Architecture for Non-Interactive Secure Transformer Inference Linru Zhang, Xiangning Wang, Jun Jie Sim, Zhicong Huang, Jiahao Zhong, Huaxiong Wang, Pu Duan, Kwok Yan Lam
2025/990 (PDF ) Lower Bounds on the Bottleneck Complexity of Secure Multiparty Computation Reo Eriguchi, Keitaro Hiwatashi
2025/989 (PDF ) List Decoding in Private Information Retrieval: Formal Definition and Efficient Constructions Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
2025/988 (PDF ) Dynamic Security: A Realistic Approach to Adaptive Security With Applications to Strong FaF Security Bar Alon, Naty Peter
2025/987 (PDF ) Security of Linear Secret Sharing Schemes with Noisy Side-Channel Leakage Utkarsh Gupta, Hessam Mahdavifar
2025/986 (PDF ) The Rényi Smoothing Parameter and Its Applications in Lattice-Based Cryptography Cong Ling, Laura Luzzi, Hao Yan
2025/985 (PDF ) Tighter Quantum Security for Fiat-Shamir-with-Aborts and Hash-and-Sign-with-Retry Signatures Pouria Fallahpour, Serge Fehr, Yu-Hsuan Huang
2025/984 (PDF ) AsconAEAD128 Revisited in the Multi-user Setting Bishwajit Chakraborty, Mridul Nandi, Soumit Pal, Thomas Peyrin, Quan Quan Tan
2025/983 (PDF ) LP2+: a robust symmetric-key AKE protocol with perfect forward secrecy, and an advocacy for thorough security proofs Pierre-Alain Jacqmin, Jean Liénardy
2025/982 (PDF ) Simulatability versus Indistinguishability SOA: CCA Relations are Sampler-Dependent Hans Heum
2025/981 (PDF ) Algebraic Cryptanalysis of AO Primitives Based on Polynomial Decomposition Applications to Rain and Full AIM-IIIIV Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang
2025/980 (PDF ) Formal Security and Functional Verification of Cryptographic Protocol Implementations in Rust Karthikeyan Bhargavan, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters
2025/979 (PDF ) Collision Attacks on Reduced RIPEMD-128 Zhengrong Lu, Hongbo Yu, Xiaoen Lin, Sitong Yuan
2025/978 (PDF ) Multi-Party Distributed Point Functions with Polylogarithmic Key Size from Invariants of Matrices Toomas Krips, Pille Pullonen-Raudvere
2025/977 (PDF ) A Novel Leakage Model in OpenSSL’s Miller-Rabin Primality Test Xiaolin Duan, Fan Huang, Yaqi Wang, Honggang Hu
2025/976 (PDF ) The Large Block Cipher Family Vistrutah Roberto Avanzi, Avik Chakraborthi, Bishwajit Chakraborty, Eik List
2025/975 (PDF ) Incompressible Encryption with Everlasting Security Eylon Yogev, Shany Ben-David
2025/974 (PDF ) OptAttest: Verifying Multi-List Multi-Hop History via a Hybrid Zero-Knowledge Architecture Joshua G. Stern
2025/973 (PDF ) On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions Balthazar Bauer, Georg Fuchsbauer, Fabian Regen
2025/972 (PDF ) Generalized BGV, BFV, and CKKS for Homomorphic Encryption over Matrix Rings Bence Mali
2025/971 (PDF ) Sabot: Efficient and Strongly Anonymous Bootstrapping of Communication Channels Christoph Coijanovic, Laura Hetz, Kenneth G. Paterson, Thorsten Strufe
2025/970 (PDF ) How to Verify that a Small Device is Quantum, Unconditionally Giulio Malavolta, Tamer Mour
2025/969 (PDF ) Decentralized Data Archival: New Definitions and Constructions Elaine Shi, Rose Silver, Changrui Mu
2025/968 (PDF ) Learning with Alternating Moduli, Arora-Ge over Composite Moduli, and Weak PRFs Yilei Chen, Liheng Ji, Wenjie Li
2025/967 (PDF ) Registered Functional Encryption for Pseudorandom Functionalities from Lattices: Registered ABE for Unbounded Depth Circuits and Turing Machines, and More Tapas Pal, Robert Schädlich, Erkan Tairi
2025/966 (PDF ) Multiparty Homomorphic Secret Sharing and More from LPN and MQ Geoffroy Couteau, Naman Kumar, Xiaxi Ye
2025/965 (PDF ) An Efficient Framework for Collusion Resistant Multiparty FHE Robin Jadoul, Barry van Leeuwen, Oliver Zajonc
2025/964 (PDF ) TOOP: A transfer of ownership protocol over Bitcoin Ariel Futoransky, Fadi Barbara, Ramses Fernandez, Gabriel Larotonda, Sergio Demian Lerner
2025/963 (PDF ) Permutation-Based Hashing With Stronger (Second) Preimage Resistance Siwei Sun, Shun Li, Zhiyu Zhang, Charlotte Lefevre, Bart Mennink, Zhen Qin, Dengguo Feng
2025/961 (PDF ) Addendum to How Small Can S-boxes Be? Yu Sun, Lixuan Wu, Chenhao Jia, Tingting Cui, Kai Hu, Meiqin Wang
2025/960 (PDF ) A Framework for Advanced Signature Notions Patrick Struck, Maximiliane Weishäupl
2025/958 (PDF ) Efficient Pairings Final Exponentiation Using Cyclotomic Cubing for Odd Embedding Degrees Curves Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, Leila Ben Abdelghani
2025/957 (PDF ) Laurent Polynomial-Based Linear Transformations for Improved Functional Bootstrapping San Ling, Benjamin Hong Meng Tan, Huaxiong Wang, Allen Siwei Yang
2025/956 (PDF ) LEAF: A Low-Latency Evaluation Architecture for Feedforward Block in Privacy-Preserving Transformer Inference Linru Zhang, Xiangning Wang, Xianhui Lu, Huaxiong Wang, Kwok Yan Lam
2025/955 (PDF ) Towards Better Integral Distinguishers over $\mathbb{F}_{p}$ Based on Exact Coefficients of Monomials Muzhou Li, Jiamin Cui, Longzheng Cui, Kai Hu, Chao Niu, Meiqin Wang
2025/954 (PDF ) Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails Lorenzo Grassi, Katharina Koschatko, Christian Rechberger
2025/953 (PDF ) Tight Multi-User Security of CCM and Enhancement by Tag-Based Key Derivation Applied to GCM and CCM Yusuke Naito, Yu Sasaki, Takeshi Sugawara
2025/952 (PDF ) A Provably Secure, MQ-Based W-OTS$^{+}$ Zijun Zhuang, Yingjie Zhang, Jintai Ding
2025/951 (PDF ) Enhancing Provable Security and Efficiency of Permutation-based DRBGs Woohyuk Chung, Seongha Hwang, Hwigyeom Kim, Jooyoung Lee
2025/950 (PDF ) Breaking Poseidon Challenges with Graeffe Transforms and Complexity Analysis by FFT Lower Bounds Ziyu Zhao, Jintai Ding
2025/949 (PDF ) Almost-Total Puzzles and Their Applications Xiao Liang, Omkant Pandey, Yuhao Tang, Takashi Yamakawa
2025/948 (PDF ) Resolving the Efficiency-Utility Dilemma of Threshold Linearly Homomorphic Encryption via Message-Space Adapter Yijia Chang, Rongmao Chen, Chao Lin, Songze Li, Xinyi Huang
2025/947 (PDF ) Quantum Rewinding for IOP-Based Succinct Arguments Alessandro Chiesa, Marcel Dall'Agnol, Zijing Di, Ziyi Guan, Nicholas Spooner
2025/946 (PDF ) Logup*: faster, cheaper logup argument for small-table indexed lookups Lev Soukhanov
2025/945 (PDF ) Quantum Security Analysis of the Key-Alternating Ciphers Chen Bai, Mehdi Esmaili, Atul Mantri
2025/944 (PDF ) Succinct Witness Encryption for Batch Languages and Applications Lalita Devadas, Abhishek Jain, Brent Waters, David J. Wu
2025/943 (PDF ) On the Adaptive Security of Key-Unique Threshold Signatures Michele Ciampi, Elizabeth Crites, Chelsea Komlo, Mary Maller
2025/942 (PDF ) On the (in)security of Proofs-of-Space based Longest-Chain Blockchains Mirza Ahad Baig, Krzysztof Pietrzak
2025/941 (PDF ) Proof of Exponentiation: Enhanced Prover Efficiency for Algebraic Statements Zhuo Wu, Shi Qi, Xinxuan Zhang, Yi Deng, Kun Lai, Hailong Wang
2025/940 (PDF ) Special Genera of Hermitian Lattices and Applications to HAWK Guilhem Mureau
2025/939 (PDF ) On the security of one certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks Zhengjun Cao, Lihua Liu
2025/938 (PDF ) PSYLOCKE: Provably Secure Logic Locking with Practical Efficiency Yohei Watanabe, Kyoichi Asano, Haruka Hirata, Tomoki Ono, Mingyu Yang, Mitsugu Iwamoto, Yang Li, Yuko Hara
2025/937 (PDF ) Attacking Poseidon via Graeffe-Based Root-Finding over NTT-Friendly Fields Antonio Sanso, Giuseppe Vitto
2025/936 (PDF ) Justvengers: Batched VOLE ZK Disjunctions in $\mathcal{O}(R{+}B{+}C)$ Communication Yibin Yang
2025/935 (PDF ) Side-channel safe conditional moves and swaps David Santos, Michael Scott
2025/934 (PDF ) Diving Deep Into UC: Uncovering and Resolving Issues in Universal Composability Céline Chevalier, Éric Sageloli
2025/933 (PDF ) Fast elliptic curve scalar multiplications in SN(T)ARK circuits Liam Eagen, Youssef El Housni, Simon Masson, Thomas Piellard
2025/932 (PDF ) Integral cryptanalysis in characteristic $p$ Tim Beyne, Michiel Verbauwhede
2025/931 (PDF ) Multivalued Broadcast with Optimal Length Gabriel Dettling, Martin Hirt, Chen-Da Liu-Zhang
2025/930 (PDF ) SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation Henri Dohmen, Robin Hundt, Nora Khayata, Thomas Schneider
2025/929 (PDF ) The DROP Protocol: Dispute Resolution via Observation in Public for Verifiable, In-Person Voting Josh Benaloh, Michael Naehrig, Olivier Pereira
2025/928 (PDF ) HAWK: Having Automorphisms Weakens Key Daniël M. H. van Gent, Ludo N. Pulles
2025/927 (PDF ) Enhancing Meme Token Market Transparency: A Multi-Dimensional Entity-Linked Address Analysis for Liquidity Risk Evaluation Qiangqiang Liu, Qian Huang, Frank Fan, Haishan Wu, Xueyan Tang
2025/926 (PDF ) Polocolo: A ZK-Friendly Hash Function Based on S-boxes Using Power Residues (Full Version) Jincheol Ha, Seongha Hwang, Jooyoung Lee, Seungmin Park, Mincheol Son
2025/925 (PDF ) SCMAC and LOL2.0: An AEAD Design Framework and A New Version of LOL Stream Cipher Design Framework Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian
2025/924 (PDF ) Card-Based Protocol Counting Connected Components of Graphs Koji Nuida
2025/923 (PDF ) SPECK: Signatures from Permutation Equivalence of Codes and Kernels Marco Baldi, Michele Battagliola, Rahmi El Mechri, Paolo Santini, Riccardo Schiavoni, Davide De Zuane
2025/921 (PDF ) Zero-knowledge Authenticator for Blockchain: Policy-private and Obliviously Updateable Kostas Kryptos Chalkias, Deepak Maram, Arnab Roy, Joy Wang, Aayush Yadav
2025/920 (PDF ) SQIsign2D$^2$: New SQIsign2D Variant by Leveraging Power Smooth Isogenies in Dimension One Zheng Xu, Kaizhan Lin, Chang-An Zhao, Yi Ouyang
2025/919 (PDF ) Rep3 Reloaded: On the Cost of Function-Dependent Preprocessing in Semi-Honest 3PC with Honest Majority Marcel Keller
2025/918 (PDF ) The Accidental Computer: Polynomial Commitments from Data Availability Alex Evans, Guillermo Angeris
2025/917 (PDF ) Jagged Polynomial Commitments (or: How to Stack Multilinears) Tamir Hemo, Kevin Jue, Eugene Rabinovich, Gyumin Roh, Ron D. Rothblum
2025/916 (PDF ) Automated Verification of Consistency in Zero-Knowledge Proof Circuits Jon Stephens, Shankara Pailoor, Isil Dillig
2025/915 (PDF ) Improved differential cryptanalysis of SPEEDY Tim Beyne, Addie Neyt
2025/914 (PDF ) Tweakable Permutation-based Luby-Rackoff Constructions Bishwajit Chakraborty, Abishanka Saha
2025/913 (PDF ) A Little LESS Secure - Side-Channel Attacks Exploiting Randomness Leakage Dina Hesse, Elisabeth Krahmer, Yi-Fu Lai, Jonas Meers
2025/912 (PDF ) Enforcing arbitrary constraints on Bitcoin transactions Federico Barbacovi, Enrique Larraia
2025/911 (PDF ) Fuzzy Private Set Intersection from VOLE Aron van Baarsen, Sihang Pu
2025/910 (PDF ) Robust Threshold ECDSA with Online-Friendly Design in Three Rounds Guofeng Tang, Haiyang Xue
2025/909 (PDF ) Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices J Cameron Patterson, William J Buchanan, Callum Turino
2025/908 (PDF ) SubLogarithmic Linear Time SNARKs from Improved Sum-Check Sikhar Patranabis, Nitin Singh, Sayani Sinha
2025/907 (PDF ) New Framework for Structure-Aware PSI From Distributed Function Secret Sharing Dung Bui, Gayathri Garimella, Peihan Miao, Phuoc Van Long Pham
2025/906 (PDF ) Covert Attacks on Machine Learning Training in Passively Secure MPC Matthew Jagielski, Rahul Rachuri, Daniel Escudero, Peter Scholl
2025/905 (PDF ) Authenticated Key Exchange Protocol with Remote Randomness John C. W. Chan
2025/904 (PDF ) The Security of ML-DSA against Fault-Injection Attacks Haruhisa Kosuge, Keita Xagawa
2025/903 (PDF ) Rock and a Hard Place: Attack Hardness in Neural Network-assisted Side Channel Analysis Seyedmohammad Nouraniboosjin, Fatemeh Ganji
2025/902 (PDF ) On the Fiat–Shamir Security of Succinct Arguments from Functional Commitments Alessandro Chiesa, Ziyi Guan, Christian Knabenhans, Zihan Yu
2025/901 (PDF ) A Generic Framework for Practical Lattice-Based Non-interactive Publicly Verifiable Secret Sharing Behzad Abdolmaleki, John Clark, Mohammad Foroutani, Shahram Khazaei, Sajjad Nasirzadeh
2025/900 (PDF ) Exclusive Ownership of Fiat-Shamir Signatures: ML-DSA, SQIsign, LESS, and More Michael Meyer, Patrick Struck, Maximiliane Weishäupl
2025/899 (PDF ) Improved Noise Bound in BFV Homomorphic Encryption and Its Application to Multiplication Akshit Aggarwal, Yang Li, Srinibas Swain
2025/898 (PDF ) A New Approach for LPN-based Pseudorandom Functions: Low-Depth and Key-Homomorphic Youlong Ding, Aayush Jain, Ilan Komargodski
2025/897 (PDF ) SQIsign2DPush: Faster Signature Scheme Using 2-Dimensional Isogenies Kohei Nakagawa, Hiroshi Onuki
2025/896 (PDF ) InstaRand: Instantly Available and Instantly Verifiable On-chain Randomness Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Pratyay Mukherjee, Pratik Sarkar, Sri AravindaKrishnan Thyagarajan
2025/895 (PDF ) Blinding Post-Quantum Hash-and-Sign Signatures Charles Bouillaguet, Thibauld Feneuil, Jules Maire, Matthieu Rivain, Julia Sauvage, Damien Vergnaud
2025/894 (PDF ) Achieving "beyond CCA1" security for linearly homomorphic encryption, without SNARKs? Marina Checri, Pierre-Emmanuel Clet, Marc Renard, Renaud Sirdey
2025/893 (PDF ) MacaKey: Full-State Keyed Sponge Meets the Summation-Truncation Hybrid Charlotte Lefevre, Mario Marhuenda Beltrán
2025/892 (PDF ) Practical cryptanalysis of pseudorandom correlation generators based on quasi-Abelian syndrome decoding Charles Bouillaguet, Claire Delaplace, Mickaël Hamdad, Damien Vergnaud
2025/891 (PDF ) Obfuscation of Unitary Quantum Programs Mi-Ying (Miryam) Huang, Er-Cheng Tang
2025/890 (PDF ) SPEEDY: Caught at Last Christina Boura, Patrick Derbez, Baptiste Germon, Rachelle Heim Boissier, María Naya-Plasencia
2025/889 (PDF ) At the Top of the Hypercube -- Better Size-Time Tradeoffs for Hash-Based Signatures Dmitry Khovratovich, Mikhail Kudinov, Benedikt Wagner
2025/888 (PDF ) Bootstrapping GBFV with CKKS Jaehyung Kim
2025/887 (PDF ) Adaptively Secure Blockchain-Aided Decentralized Storage Networks: Formalization and Generic Construction Xiangyu Su, Yuma Tamagawa, Mario Larangeira, Keisuke Tanaka
2025/886 (PDF ) PaCo: Bootstrapping for CKKS via Partial CoeffToSlot Jean-Sébastien Coron, Tim Seuré
2025/885 (PDF ) Fast Fuzzy PSI from Symmetric-Key Techniques Cong Zhang, Yu Chen, Yang Cao, Yujie Bai, Shuaishuai Li, Juntong Lin, Anyu Wang, Xiaoyun Wang
2025/884 (PDF ) $k$-out-of-$n$ Proofs and Applications to Privacy-Preserving Cryptocurrencies Min Zhang, Yu Chen, Xiyuan Fu
2025/883 (PDF ) A Fast, Efficient, Platform-Adaptive, and AIS-20/31 Compliant PLL-Based True Random Number Generator on an SoC FPGA Oğuz Yayla, Yunus Emre Yılmaz
2025/882 (PDF ) Leveled Homomorphic Encryption over Composite Groups Mahdi Mahdavi, Ehsan Meamari, Emad Heydari Beni, Maryam Sheikhi
2025/881 (PDF ) One-Way Homomorphic Encryption: A Composite Group Approach Mahdi Mahdavi, Helena Rifà-Pous
2025/880 (PDF ) Optimistic Asynchronous Dynamic-committee Proactive Secret Sharing Bin Hu, Jianwei Liu, Zhenliang Lu, Qiang Tang, Zhuolun Xiang, Zongyang Zhang
2025/879 (PDF ) Papercraft: Lattice-based Verifiable Delay Function Implemented Michał Osadnik, Darya Kaviani, Valerio Cini, Russell W. F. Lai, Giulio Malavolta
2025/878 (PDF ) Blockcipher-Based Key Derivation without PRP/PRF Switching Fabrice Benhamouda, Shai Halevi, Panos Kampanakis, Hugo Krawczyk
2025/877 (PDF ) Towards Improving Throughput and Scalability of DAG-based BFT SMR Nibesh Shrestha, Aniket Kate
2025/876 (PDF ) Lower Bounds for Garbled Circuits from Shannon-Type Information Inequalities Jake Januzelli, Mike Rosulek, Lawrence Roy
2025/875 (PDF ) Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve Mohammed Rahmani, Abderrahmane Nitaj
2025/874 (PDF ) Decentralized Multi-Authority Attribute-Based Inner-Product Functional Encryption: Noisy and Evasive Constructions from Lattices Jiaqi Liu, Yan Wang, Fang-Wei Fu
2025/873 (PDF ) Improvement of Side-Channel Attacks on Mitaka Vladimir Sarde, Nicolas Debande
2025/872 (PDF ) Finally! A Compact Lattice-Based Threshold Signature Rafael del Pino, Guilhem Niot
2025/871 (PDF ) Simple and Efficient Lattice Threshold Signatures with Identifiable Aborts Rafael del Pino, Thomas Espitau, Guilhem Niot, Thomas Prest
2025/870 (PDF ) From List-Decodability to Proximity Gaps Yiwen Gao, Dongliang Cai, Yang Xu, Haibin Kan
2025/869 (PDF ) One for All, All for One: Universal semi-agnostic quantum circuit for solving (Standard) Abelian Hidden Subgroup Problems Michał Wroński, Łukasz Dzierzkowski, Mateusz Leśniak, Ewa Syta
2025/868 (PDF ) Delegated PSI from Homomorphic Encryptions Sicheng Wei, Jingwei Hu
2025/867 (PDF ) Side Channel Analysis in Homomorphic Encryption Baraq Ghaleb, William J Buchanan
2025/866 (PDF ) Public-key Cryptography Attacks Using Adiabatic Quantum Computer Weishen Zou, Bruno Martin, Thomas Prévost
2025/865 (PDF ) Data Availability for Thousands of Nodes Yanpei Guo, Alex Luoyuan Xiong, Wenjie Qu, Jiaheng Zhang
2025/864 (PDF ) Fheanor: a new, modular FHE library for designing and optimising schemes Hiroki Okada, Rachel Player, Simon Pohmann
2025/863 (PDF ) Fly Away: Lifting Fault Security through Canaries and the Uniform Random Fault Model Gaëtan Cassiers, Siemen Dhooghe, Thorben Moos, Sayandeep Saha, François-Xavier Standaert
2025/862 (PDF ) Distinguishing Full-Round AES-256 in a Ciphertext-Only Setting via Hybrid Statistical Learning Gopal Singh
2025/861 (PDF ) MOCHA: Mixnet Optimization Considering Honest Client Anonymity Mahdi Rahimi
2025/860 (PDF ) sPAR: (Somewhat) Practical Anonymous Router Debajyoti Das, Jeongeun Park
2025/859 (PDF ) On the Provable Dual Attack for LWE by Modulus Switching Hongyuan Qu, Guangwu Xu
2025/858 (PDF ) Encrypted Matrix-Vector Products from Secret Dual Codes Fabrice Benhamouda, Caicai Chen, Shai Halevi, Yuval Ishai, Hugo Krawczyk, Tamer Mour, Tal Rabin, Alon Rosen
2025/857 (PDF ) Classify Directly: A Dynamic Time SPA Classification Method Based on DTW Yaoling Ding, Haotong Xu, Annyu Liu, An Wang, Jingqi Zhang, Jing Yu, Liehuang Zhu
2025/856 (PDF ) Testing the Tests - Opportunities for Corrections and Improvements in NIST SP 800-22r1a and its Reference Code Elias Riesinger, Jürgen Fuß
2025/855 (PDF ) Posterior Security: Anonymity and Message Hiding of Standard Signatures Tsz Hon Yuen, Ying-Teng Chen, Shimin Pan, Jiangshan Yu, Joseph K. Liu
2025/854 (PDF ) ProbeNav - Fast, precise and repeatable positioning of electromagnetic probes for local Side-Channel Attacks Matthias Probst, Alexander Wiesent, Michael Gruber, Georg Sigl
2025/853 (PDF ) Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-Waay Guilhem Niot
2025/852 (PDF ) Neural-Inspired Advances in Integral Cryptanalysis Liu Zhang, Yiran Yao, Danping Shi, Dongchen Chai, Jian Guo, Zilong Wang
2025/851 (PDF ) V$\epsilon$rity: Verifiable Local Differential Privacy James Bell-Clark, Adrià Gascón, Baiyu Li, Mariana Raykova, Amrita Roy Chowdhury
2025/850 (PDF ) Succinct Computational Secret Sharing for Monotone Circuits George Lu, Shafik Nassar, Brent Waters
2025/849 (PDF ) Unmasking TRaccoon: A Lattice-Based Threshold Signature with An Efficient Identifiable Abort Protocol Rafael del Pino, Shuichi Katsumata, Guilhem Niot, Michael Reichle, Kaoru Takemure
2025/848 (PDF ) On Graphs of Incremental Proofs of Sequential Work Hamza Abusalah
2025/847 (PDF ) Deterministic algorithms for class group actions Marc Houben
2025/845 (PDF ) Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols Lei Tian, Chenke Wang, Yu Long, Xian Xu, Mingchao Wan, Chunmiao Li, Shi-Feng Sun, Dawu Gu
2025/844 (PDF ) Post-Quantum PKE from Unstructured Noisy Linear Algebraic Assumptions: Beyond LWE and Alekhnovich's LPN Riddhi Ghosal, Aayush Jain, Paul Lou, Amit Sahai, Neekon Vafa
2025/843 (PDF ) Rerandomizable Garbling, Revisited Raphael Heitjohann, Jonas von der Heyden, Tibor Jager
2025/842 (PDF ) Improvements on the schemes VOX and QR UOV When minus is a plus Pierre Varjabedian
2025/841 (PDF ) Verifiable E-Voting with a Trustless Bulletin Board Daniel Rausch, Nicolas Huber, Ralf Kuesters
2025/840 (PDF ) T-Spoon: Tightly Secure Two-Round Multi-Signatures with Key Aggregation Renas Bacho, Benedikt Wagner
2025/839 (PDF ) Correlation power analysis of LESS and CROSS Maciej Czuprynko, Anisha Mukherjee, Sujoy Sinha Roy
2025/837 (PDF ) Towards Optimal Differential Attacks on FLY and PIPO Insung Kim, Seonggyeom Kim, Sunyeop Kim, Donggeun Kwon, Hanbeom Shin, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong
2025/836 (PDF ) Registered Functional Encryption for Attribute-Weighted Sums with Access Control Tapas Pal, Robert Schädlich
2025/835 (PDF ) Universally Composable Interactive and Ordered Multi-Signatures Carsten Baum, Bernardo David, Elena Pagnin, Akira Takahashi
2025/834 (PDF ) A Note on ``CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT'' Zhengjun Cao, Lihua Liu
2025/833 (PDF ) A note on closed addition chains and complete numbers Theophilus Agama
2025/832 (PDF ) Constant-time Integer Arithmetic for SQIsign Fatna Kouider, Anisha Mukherjee, David Jacquemin, Péter Kutas
2025/831 (PDF ) Worst-Case Time Analysis of Key Agreement Protocols in 10BASE-T1S Automotive Networks Teodora Ljubevska, Alexander Zeh, Donjete Elshani Rama, Ken Tindell
2025/830 (PDF ) Simple Power Analysis Attack on SQIsign Anisha Mukherjee, Maciej Czuprynko, David Jacquemin, Péter Kutas, Sujoy Sinha Roy
2025/829 (PDF ) Row Reduction Techniques for $n$-Party Garbling Kelong Cong, Emmanuela Orsini, Erik Pohle, Oliver Zajonc
2025/828 (PDF ) Bandwidth-Efficient Robust Threshold ECDSA in Three Rounds Yingjie Lyu, Zengpeng Li, Hong-Sheng Zhou, Haiyang Xue, Mei Wang, Shuchao Wang, Mengling Liu
2025/827 (PDF ) Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios Binbin Tu, Yujie Bai, Cong Zhang, Yang Cao, Yu Chen
2025/826 (PDF ) Repeated Agreement is Cheap! On Weak Accountability and Multishot Byzantine Agreement Pierre Civit, Muhammad Ayaz Dzulfikar, Seth Gilbert, Rachid Guerraoui, Jovan Komatovic, Manuel Vidigueira
2025/825 (PDF ) High-Performance FPGA Implementations of Lightweight ASCON-128 and ASCON-128a with Enhanced Throughput-to-Area Efficiency Ahmet Malal
2025/824 (PDF ) A Specification of an Anonymous Credential System Using BBS+ Signatures with Privacy-Preserving Revocation and Device Binding Christoph Graebnitz, Nicolas Buchmann, Martin Seiffert, Marian Margraf
2025/822 (PDF ) Generalization of semi-regular sequences: Maximal Gröbner basis degree, variants of genericness, and related conjectures Momonari Kudo, Kazuhiro Yokoyama
2025/821 (PDF ) Multi-Client Attribute-Based and Predicate Encryption, Revisited Robert Schädlich
2025/820 (PDF ) Less Than a Bit to Rule Them All – Key Recovery from Randomness Leakage in ML-DSA Simon Damm, Nicolai Kraus, Alexander May, Julian Nowakowski, Jonas Thietke
2025/819 (PDF ) SoK: Dlog-based Distributed Key Generation Renas Bacho, Alireza Kavousi
2025/818 (PDF ) An Attack on TON’s ADNL Secure Channel Protocol Aviv Frenkel, Dmitry Kogan
2025/817 (PDF ) Relating Definitions of Computational Differential Privacy in Wider Parameter Regimes Fredrik Meisingseth, Christian Rechberger
2025/816 (PDF ) Randomized vs. Deterministic? Practical Randomized Synchronous BFT in Expected Constant Time Xufeng Zhang, Baohan Huang, Sisi Duan, Haibin Zhang
2025/815 (PDF ) Security Analysis of NIST Key Derivation Using Pseudorandom Functions Yaobin Shen, Lei Wang, Dawu Gu
2025/814 (PDF ) Groebner Basis Cryptanalysis of Anemoi Luca Campa, Arnab Roy
2025/813 (PDF ) HydraProofs: Optimally Computing All Proofs in a Vector Commitment (with applications to efficient zkSNARKs over data from multiple users) Christodoulos Pappas, Dimitris Papadopoulos, Charalampos Papamanthou
2025/812 (PDF ) Post-Quantum Cryptography in eMRTDs: Evaluating PAKE and PKI for Travel Documents Nouri Alnahawi, Melissa Azouaoui, Joppe W. Bos, Gareth T. Davies, SeoJeong Moon, Christine van Vredendaal, Alexander Wiesmaier
2025/811 (PDF ) Side-Channel Power Trace Dataset for Kyber Pair-Pointwise Multiplication on Cortex-M4 Azade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek
2025/810 (PDF ) Actively Secure MPC in the Dishonest Majority Setting: Achieving Constant Complexity in Online Communication, Computation Per Gate, Rounds, and Private Input Size Seunghwan Lee, Jaesang Noh, Taejeong Kim, Dohyuk Kim, Dong-Joon Shin
2025/809 (PDF ) Don’t be mean: Reducing Approximation Noise in TFHE through Mean Compensation Thomas de Ruijter, Jan-Pieter D'Anvers, Ingrid Verbauwhede
2025/808 (PDF ) Partially Registered Multi-authority Attribute-based Encryption Viktória I. Villányi, Vladimir Božović
2025/807 (PDF ) Registered ABE for Circuits from Evasive Lattice Assumptions Xinrui Yang, Yijian Zhang, Ying Gao, Jie Chen
2025/806 (PDF ) BERMUDA: A BPSec-Compatible Key Management Scheme for DTNs Fiona Fuchs, Felix Walter, Florian Tschorsch
2025/805 (PDF ) Accelerating Multiparty Noise Generation Using Lookups Fredrik Meisingseth, Christian Rechberger, Fabian Schmid
2025/804 (PDF ) Putting Sybils on a Diet: Securing Distributed Hash Tables using Proofs of Space Christoph U. Günther, Krzysztof Pietrzak
2025/803 (PDF ) Universally Composable On-Chain Quadratic Voting for Liquid Democracy Lyudmila Kovalchuk, Bingsheng Zhang, Andrii Nastenko, Zeyuan Yin, Roman Oliynykov, Mariia Rodinko
2025/802 (PDF ) Optimizing Key Recovery in Classic McEliece: Advanced Error Correction for Noisy Side-Channel Measurements Nicolas Vallet, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Vincent Grosso
2025/801 (PDF ) POBA: Privacy-Preserving Operator-Side Bookkeeping and Analytics Dennis Faut, Valerie Fetzer, Jörn Müller-Quade, Markus Raiber, Andy Rupp
2025/800 (PDF ) Comparing classical and quantum conditional disclosure of secrets Uma Girish, Alex May, Leo Orshansky, Chris Waddell
2025/799 (PDF ) Code-based Masking: From Fields to Bits Bitsliced Higher-Order Masked SKINNY John Gaspoz, Siemen Dhooghe
2025/798 (PDF ) CRAFT: Characterizing and Root-Causing Fault Injection Threats at Pre-Silicon Arsalan Ali Malik, Harshvadan Mihir, Aydin Aysu
2025/797 (PDF ) WEBCAT: Web-based Code Assurance and Transparency Giulio Berra
2025/796 (PDF ) Unified MEDS Accelerator Sanjay Deshpande, Yongseok Lee, Mamuri Nawan, Kashif Nawaz, Ruben Niederhagen, Yunheung Paek, Jakub Szefer
2025/795 (PDF ) Efficient Noncommutative KEMs from Twisted Dihedral Group Ring Ali Raya, Vikas Kumar, Sugata Gangopadhyay, Aditi Kar Gangopadhyay
2025/794 (PDF ) Formal Analysis of Multi-Device Group Messaging in WhatsApp Martin R. Albrecht, Benjamin Dowling, Daniel Jones
2025/793 (PDF ) Solving systems of polynomial equations via Macaulay matrices Shuhei Nakamura
2025/792 (PDF ) Scrutinizing the Security of AES-based Hashing and One-way Functions Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang
2025/791 (PDF ) Analysis of One Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism Zhengjun Cao, Lihua Liu
2025/790 (PDF ) PULSE: Parallel Private Set Union for Large-Scale Entities Jiahui Gao, Son Nguyen, Marina Blanton, Ni Trieu
2025/789 (PDF ) Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations Alexander Kyster, Frederik Huss Nielsen, Sabine Oechsner, Peter Scholl
2025/788 (PDF ) Identity-Based Ring Signature from Quantum Token Nabanita Chakraborty, Ratna Dutta
2025/787 (PDF ) Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Ariel Nof
2025/786 (PDF ) Robust and Verifiable MPC with Applications to Linear Machine Learning Inference Tzu-Shen Wang, Jimmy Dani, Juan Garay, Soamar Homsi, Nitesh Saxena
2025/785 (PDF ) DNDK: Combining Nonce and Key Derivation for Fast and Scalable AEAD Shay Gueron, Thomas Ristenpart
2025/784 (PDF ) SHIP: A Shallow and Highly Parallelizable CKKS Bootstrapping Algorithm Jung Hee Cheon, Guillaume Hanrot, Jongmin Kim, Damien Stehlé
2025/783 (PDF ) Non-Adaptive Cryptanalytic Time-Space Lower Bounds via a Shearer-like Inequality for Permutations Itai Dinur, Nathan Keller, Avichai Marmor
2025/782 (PDF ) AES Is Not Enough: the Block Ciphers Zoo Goes Homormorphic (over TFHE) Daphné Trama, Aymen Boudguiga, Renaud Sirdey
2025/781 (PDF ) Generalizing the Augot-Finiasz PKE to Other Code Classes Anmoal Porwal, Anna Baumeister, Violetta Weger, Antonia Wachter-Zeh, Pierre Loidreau
2025/780 (PDF ) The Planted Orthogonal Vectors Problem David Kühnemann, Adam Polak, Alon Rosen
2025/779 (PDF ) Towards Reliable Broadcast with Optimal Communication and Round Complexity Thomas Locher, Victor Shoup
2025/778 (PDF ) Cryptography from Lossy Reductions: Towards OWFs from ETH, and Beyond Pouria Fallahpour, Alex B. Grilo, Garazi Muguruza, Mahshid Riahinia
2025/777 (PDF ) Seamless Switching Between PBS and WoPBS for Scalable TFHE Rostin Shokri, Nektarios Georgios Tsoutsos
2025/776 (PDF ) Clementine: A Collateral-Efficient, Trust-Minimized, and Scalable Bitcoin Bridge Ekrem Bal, Lukas Aumayr, Atacan İyidoğan, Giulia Scaffino, Hakan Karakuş, Cengiz Eray Aslan, Orfeas Stefanos Thyfronitis Litos
2025/775 (PDF ) AuthOr: Lower Cost Authenticity-Oriented Garbling of Arbitrary Boolean Circuits Osman Biçer, Ali Ajorian
2025/774 (PDF ) Towards a Modern LLL Implementation Léo Ducas, Ludo N. Pulles, Marc Stevens
2025/773 (PDF ) Exploring Adversarial Attacks on the MaSTer Truncation Protocol Martin Zbudila, Aysajan Abidin, Bart Preneel
2025/772 (PDF ) Publicly Auditable Garbled Circuit San Ling, Chan Nam Ngo, Khai Hanh Tang, Huaxiong Wang
2025/771 (PDF ) Differential Fault Attacks on TFHE-friendly cipher $\textsf{FRAST}$ Weizhe Wang, Deng Tang
2025/770 (PDF ) ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations Zhelei Zhou, Yun Li, Yuchen Wang, Zhaomin Yang, Bingsheng Zhang, Cheng Hong, Tao Wei, Wenguang Chen
2025/769 (PDF ) Finding the Inverse of some Shift Invariant Transformations Fukang Liu, Vaibhav Dixit, Santanu Sarkar, Willi Meier, Takanori Isobe
2025/768 (PDF ) Incompleteness in Number-Theoretic Transforms: New Tradeoffs and Faster Lattice-Based Cryptographic Applications Syed Mahbub Hafiz, Bahattin Yildiz, Marcos A. Simplicio Jr, Thales B. Paiva, Henrique Ogawa, Gabrielle De Micheli, Eduardo L. Cominetti
2025/767 (PDF ) ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofs Jiwon Kim, Abhiram Kothapalli, Orestis Chardouvelis, Riad S. Wahby, Paul Grubbs
2025/766 (PDF ) Unbiasable Verifiable Random Functions from Generic Assumptions Nicholas Brandt
2025/765 (PDF ) ZKPoG: Accelerating WitGen-Incorporated End-to-End Zero-Knowledge Proof on GPU Muyang Li, Yueteng Yu, Bangyan Wang, Xiong Fan, Shuwen Deng
2025/764 (PDF ) Security of a secret sharing protocol on the Qline Alex B. Grilo, Lucas Hanouz, Anne Marin
2025/763 (PDF ) The Tangent Space Attack Axel Lemoine
2025/762 (PDF ) $\textbf{MALARIA}$: $\textbf{Ma}$nagement of Low-$\textbf{La}$tency $\textbf{R}$outing $\textbf{I}$mpact on Mix Network $\textbf{A}$nonymity (Extended Version) Mahdi Rahimi
2025/761 (PDF ) TERRA : Trojan-Resilient Reverse-Firewall for Cryptographic Applications Chandan Kumar, Nimish Mishra, Suvradip Chakraborty, Satrajit Ghosh, Debdeep Mukhopadhyay
2025/760 (PDF ) DGSP: An Efficient Scalable Fully Dynamic Group Signature Scheme Using $\rm{SPHINCS}^+$ Mojtaba Fadavi, Seyyed Arash Azimi, Sabyasachi Karati, Samuel Jaques
2025/759 (PDF ) Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code Santiago Arranz-Olmos, Gilles Barthe, Benjamin Grégoire, Jan Jancar, Vincent Laporte, Tiago Oliveira, Peter Schwabe
2025/758 (PDF ) Blockcipher-Based Key Commitment for Nonce-Derived Schemes Panos Kampanakis, Shai Halevi, Nevine Ebeid, Matt Campagna
2025/757 (PDF ) Threshold Niederreiter: Chosen-Ciphertext Security and Improved Distributed Decoding Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, Damien Vergnaud
2025/755 (PDF ) A Note on "CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid" Zhengjun Cao, Lihua Liu
2025/753 (PDF ) Linear-Time Accumulation Schemes Benedikt Bünz, Alessandro Chiesa, Giacomo Fenzi, William Wang
2025/752 (PDF ) LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts Gulshan Kumar, Rahul Saha, Mauro Conti, William J Buchanan
2025/751 (PDF ) Improved Range Searching And Range Emptiness Under FHE Using Copy-And-Recurse Eyal Kushnir, Hayim Shaul
2025/750 (PDF ) Secure Rate-Distortion-Perception Trade-off Over Channels: A Randomized Distributed Function Computation (RDFC) Application Gustaf Ahlgren, Onur Gunlu
2025/749 (PDF ) GOLF: Unleashing GPU-Driven Acceleration for FALCON Post-Quantum Cryptography Ruihao Dai, Jiankuo Dong, Mingrui Qiu, Zhenjiang Dong, Fu Xiao, Jingqiang Lin
2025/748 (PDF ) Symphony of Speeds: Harmonizing Classic McEliece Cryptography with GPU Innovation Wen Wu, Jiankuo Dong, Zhen Xu, Zhenjiang Dong, Dung Duong, Fu Xiao, Jingqiang Lin
2025/746 (PDF ) Zemlyanika — Module-LWE based KEM with the power-of-two modulus, explicit rejection and revisited decapsulation failures Alexey S. Zelenetsky, Peter G. Klyucharev
2025/745 (PDF ) When is liquid democracy possible? On the manipulation of variance. Krishnendu Chatterjee, Seth Gilbert, Stefan Schmid, Jakub Svoboda, Michelle Yeo
2025/743 (PDF ) On graph based pseudo quadratic multivariate maps of prescribed degree as instruments of key establishment. Vasyl Ustimenko, Tymoteusz Chojecki
2025/742 (PDF ) Seamless Post-Quantum Transition: Agile and Efficient Encryption for Data-at-Rest Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Federico Valbusa
2025/741 (PDF ) Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON and Piccolo (Full Version) Weiqing Deng, Jianing Zhang, Haoyang Wang
2025/740 (PDF ) Otter: Scalable Sharding-Based Atomic Broadcast with Abortable Fork Detection Xin Wang, Xiao Sui, Sisi Duan
2025/739 (PDF ) An Extended Rectangular MinRank Attack against UOV and Its Variants Toshihiro Suzuki, Hiroki Furue, Takuma Ito, Shuhei Nakamura, Shigenori Uchiyama
2025/738 (PDF ) Quantum Lifting for Invertible Permutations and Ideal Ciphers Alexandru Cojocaru, Minki Hhan, Qipeng Liu, Takashi Yamakawa, Aaram Yun
2025/737 (PDF ) FICS and FACS: Fast IOPPs and Accumulation via Code-Switching Anubhav Baweja, Pratyush Mishra, Tushar Mopuri, Matan Shtepel
2025/736 (PDF ) Superglue: Fast formulae for (2,2)-gluing isogenies Max Duparc
2025/735 (PDF ) Improved Rényi Arguments for Lattice-Based Threshold Encryption Katharina Boudgoust, Anamaria Costache
2025/734 (PDF ) Universal Blind and Verifiable Delegated Quantum Computation with Classical Clients Vicent Esteve Voltes
2025/733 (PDF ) One More Motivation to Use Evaluation Tools, This Time for Hardware Multiplicative Masking of AES Hemin Rahimi, Amir Moradi
2025/732 (PDF ) Quantum pseudoresources imply cryptography Alex B. Grilo, Álvaro Yángüez
2025/731 (PDF ) The Sponge is Quantum Indifferentiable Gorjan Alagic, Joseph Carolan, Christian Majenz, Saliha Tokat
2025/730 (PDF ) Tetris! Traceable Extendable Threshold Ring Signatures and More Gennaro Avitabile, Vincenzo Botta, Dario Fiore
2025/729 (PDF ) Private Information Retrieval based on Homomorphic Encryption, Revisited Jaeseon Kim, Jeongeun Park, Hyewon Sung
2025/727 (PDF ) Securing Nested Attestation of Confidential Serverless Computing without Intra-Enclave Isolation Atsuki Momose, Kailun Qin, Ao Sakurai, Mona Vij
2025/726 (PDF ) Public-Key Quantum Fire and Key-Fire From Classical Oracles Alper Çakan, Vipul Goyal, Omri Shmueli
2025/725 (PDF ) Side-Channel Analysis Revisited and Evaluated Jiangshan Long, Changhai Ou, Yukun Cheng, Kexin Qiao, Wei Cheng, Fan Zhang
2025/724 (PDF ) Privacy and Security in Distributed Data Markets Daniel Alabi, Sainyam Galhotra, Shagufta Mehnaz, Zeyu Song, Eugene Wu
2025/723 (PDF ) Time-Space Tradeoffs of Truncation with Preprocessing Krzysztof Pietrzak, Pengxiang Wang
2025/722 (PDF ) One-Step Schnorr Threshold Identification Foteinos Mergoupis-Anagnou
2025/721 (PDF ) Efficient Key Recovery via Correlation Power Analysis on Scloud⁺ Hangyu Bai, Fan Huang, Xiaolin Duan, Honggang Hu
2025/720 (PDF ) Towards Lightweight CKKS: On Client Cost Efficiency Jung Hee Cheon, Minsik Kang, Jai Hyun Park
2025/719 (PDF ) Packed Sumcheck over Fields of Small Characteristic Yuanju Wei, Kaixuan Wang, Binwu Xiang, Xinxuan Zhang, Yi Deng, Xudong Zhu, Hailong Wang, Li Lin, Lei Wang
2025/718 (PDF ) The Hardness of Learning Quantum Circuits and its Cryptographic Applications Bill Fefferman, Soumik Ghosh, Makrand Sinha, Henry Yuen
2025/717 (PDF ) GKR for Boolean Circuits with Sub-linear RAM Operations Yuncong Hu, Chongrong Li, Zhi Qiu, Tiancheng Xie, Yue Ying, Jiaheng Zhang, Zhenfei Zhang
2025/716 (PDF ) Shark: Actively Secure Inference using Function Secret Sharing Kanav Gupta, Nishanth Chandran, Divya Gupta, Jonathan Katz, Rahul Sharma
2025/715 (PDF ) USpt: Updatable Signature with Public Tokens Haotian Yin, Jie Zhang, Wanxin Li, Yuji Dong, Eng Gee Lim, Dominik Wojtczak
2025/714 (PDF ) Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks (Full Version) Bingqing Li, Ling Sun
2025/713 (PDF ) LOHEN: Layer-wise Optimizations for Neural Network Inferences over Encrypted Data with High Performance or Accuracy Kevin Nam, Youyeon Joo, Dongju Lee, Seungjin Ha, Hyunyoung Oh, Hyungon Moon, Yunheung Paek
2025/712 (PDF ) Threshold FHE with Efficient Asynchronous Decryption Zvika Brakerski, Offir Friedman, Avichai Marmor, Dolev Mutzari, Yuval Spiizer, Ni Trieu
2025/711 (PDF ) Fast Plaintext-Ciphertext Matrix Multiplication from Additively Homomorphic Encryption Krishna Sai Tarun Ramapragada, Utsav Banerjee
2025/710 (PDF ) Arbigraph: Verifiable Turing-Complete Execution Delegation Michael Mirkin, Hongyin Chen, Ohad Eitan, Gal Granot, Ittay Eyal
2025/709 (PDF ) Thunderbolt: A Formally Verified Protocol for Off-Chain Bitcoin Transfers Hongbo Wen, Hanzhi Liu, Jingyu Ke, Yanju Chen, Dahlia Malkhi, Yu Feng
2025/708 (PDF ) Strong keys for tensor isomorphism cryptography Anand Kumar Narayanan
2025/707 (PDF ) Post Quantum Cryptography (PQC) Signatures Without Trapdoors William J Buchanan
2025/706 (PDF ) The Role of Quantum Computing in Enhancing Encryption Security: A Review Aashika Khanal, Navjot Kaur
2025/705 (PDF ) Breaking ECDSA with Two Affinely Related Nonces Jamie Gilchrist, William J Buchanan, Keir Finlow-Bates
2025/704 (PDF ) Revisiting Honest Re-Encryption Attack for Proxy Re-Encryption Schemes Haotian Yin, Jie Zhang, Yuji Dong, Eng Gee Lim, Dominik Wojtczak
2025/703 (PDF ) Priv-PFL: A Privacy-Preserving and Efficient Personalized Federated Learning Approach Alireza Aghabagherloo, Roozbeh Sarenche, Maryam Zarezadeh, Bart Preneel, Stefan Köpsell
2025/702 (PDF ) Two Party Secret Shared Joins Srinivasan Raghuraman, Peter Rindal, Harshal Shah
2025/701 (PDF ) Hermes: Efficient and Secure Multi-Writer Encrypted Database Tung Le, Thang Hoang
2025/700 (PDF ) Fherret: Proof of FHE Correct-and-Honest Evaluation with Circuit Privacy from MPCitH Janik Huth, Antoine Joux, Giacomo Santato
2025/699 (PDF ) Threshold (Fully) Homomorphic Encryption Carl Bootland, Kelong Cong, Daniel Demmler, Tore Kasper Frederiksen, Benoit Libert, Jean-Baptiste Orfila, Dragos Rotaru, Nigel P. Smart, Titouan Tanguy, Samuel Tap, Michael Walter
2025/698 (PDF ) Mind the Grammar: Side-Channel Analysis driven by Grammatical Evolution Mattia Napoli, Alberto Leporati, Stjepan Picek, Luca Mariot
2025/697 (PDF ) A Multi-Differential Approach to Enhance Related-Key Neural Distinguishers Xue Yuan, Qichun Wang
2025/696 (PDF ) Faster amortized bootstrapping using the incomplete NTT for free Thales B. Paiva, Gabrielle De Micheli, Syed Mahbub Hafiz, Marcos A. Simplicio Jr., Bahattin Yildiz
2025/695 (PDF ) Efficient Foreign-Field Arithmetic in PLONK Miguel Ambrona, Denis Firsov, Inigo Querejeta-Azurmendi
2025/694 (PDF ) A Formal Security Analysis of Hyperledger AnonCreds Ashley Fraser, Steve Schneider
2025/693 (PDF ) Accountable Liveness Andrew Lewis-Pye, Joachim Neu, Tim Roughgarden, Luca Zanolini
2025/692 (PDF ) DahLIAS: Discrete Logarithm-Based Interactive Aggregate Signatures Jonas Nick, Tim Ruffing, Yannick Seurin
2025/691 (PDF ) Let us walk on the 3-isogeny graph: efficient, fast, and simple Jesús-Javier Chi-Domínguez, Eduardo Ochoa-Jimenez, Ricardo-Neftalí Pontaza-Rodas
2025/690 (PDF ) Zero-Knowledge Protocol for Knowledge of Known Discrete Logarithms: Applications to Ring Confidential Transactions and Anonymous Zether Li Lin, Tian Qiu, Xin Wang, Hailong Wang, Changzheng Wei, Ying Yan, Wei Wang, Wenbiao Zhao
2025/689 (PDF ) Neural network design options for RNG's verification José Luis Crespo, Jaime Gutierrez, Angel Valle
2025/688 (PDF ) Uncertainty Estimation in Neural Network-enabled Side-channel Analysis and Links to Explainability Seyedmohammad Nouraniboosjin, Fatemeh Ganji
2025/687 (PDF ) Myco: Unlocking Polylogarithmic Accesses in Metadata-Private Messaging Darya Kaviani, Deevashwer Rathee, Bhargav Annem, Raluca Ada Popa
2025/686 (PDF ) Fast amortized bootstrapping with small keys and polynomial noise overhead Antonio Guimarães, Hilder V. L. Pereira
2025/685 (PDF ) Proofs of Useful Work from Arbitrary Matrix Multiplication Ilan Komargodski, Omri Weinstein
2025/684 (PDF ) Post-quantum Cryptographic Analysis of SSH Benjamin Benčina, Benjamin Dowling, Varun Maram, Keita Xagawa
2025/683 (PDF ) On the Definition of Malicious Private Information Retrieval Bar Alon, Amos Beimel
2025/682 (PDF ) SUMAC: an Efficient Administrated-CGKA Using Multicast Key Agreement Nicolas Bon, Céline Chevalier, Guirec Lebrun, Ange Martinelli
2025/681 (PDF ) Quantum Periodic Distinguisher Construction: Symbolization Method and Automated Tool Qun Liu, Haoyang Wang, Jinliang Wang, Boyun Li, Meiqin Wang
2025/680 (PDF ) Pirouette: Query Efficient Single-Server PIR Jiayi Kang, Leonard Schild
2025/679 (PDF ) Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM Rishub Nagpal, Vedad Hadžić, Robert Primas, Stefan Mangard
2025/678 (PDF ) Recovering S-Box Design Structures and Quantifying Distances between S-Boxes using Deep Learning Donggeun Kwon, Deukjo Hong, Jaechul Sung, Seokhie Hong
2025/677 (PDF ) Impossible Differential Attack on SAND-128 Nobuyuki Sugio
2025/676 (PDF ) Onion Encryption Revisited: Relations Among Security Notions Daichong Chao, Liehuang Zhu, Dawei Xu, Tong Wu, Chuan Zhang, Fuchun Guo
2025/675 (PDF ) Trilithium: Efficient and Universally Composable Distributed ML-DSA Signing Antonín Dufka, Semjon Kravtšenko, Peeter Laud, Nikita Snetkov
2025/674 (PDF ) On the Security of Two IKKR-type Code-Based Cryptosystems Kirill Vedenev
2025/673 (PDF ) Hybrid Fingerprinting for Effective Detection of Cloned Neural Networks Can Aknesil, Elena Dubrova, Niklas Lindskog, Jakob Sternby, Håkan Englund
2025/672 (PDF ) Simpler and Faster Pairings from the Montgomery Ladder Giacomo Pope, Krijn Reijnders, Damien Robert, Alessandro Sferlazza, Benjamin Smith
2025/671 (PDF ) Multi-signature in Fully Split Ring and Quantum Random Oracle Model Shimin Pan, Tsz Hon Yuen, Siu-Ming Yiu
2025/670 (PDF ) Biextensions in pairing-based cryptography Jianming Lin, Damien Robert, Chang-An Zhao, Yuhao Zheng
2025/669 (PDF ) SoK: FHE-Friendly Symmetric Ciphers and Transciphering Chao Niu, Benqiang Wei, Zhicong Huang, Zhaomin Yang, Cheng Hong, Meiqin Wang, Tao Wei
2025/668 (PDF ) (Interleaved) Extended Gabidulin Codes, More Analysis on Blockwise Rank Decoding Problem, and Their Applications to Cryptosystems Yongcheng Song, Rongmao Chen, Fangguo Zhang, Xinyi Huang, Jian Weng, Huaxiong Wang
2025/667 (PDF ) Vector Commitment Design, Analysis, and Applications: A Survey Vir Pathak, Sushmita Ruj, Ron van der Meyden
2025/666 (PDF ) Adaptive Robustness of Hypergrid Johnson-Lindenstrauss Andrej Bogdanov, Alon Rosen, Neekon Vafa, Vinod Vaikuntanathan
2025/665 (PDF ) MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero Varun Thakore, Saravanan Vijayakumaran
2025/664 (PDF ) Publicly Verifiable Generalized Secret Sharing Schemes and Their Applications Liang Zhang, Dongliang Cai, Tao Liu, Xingyu Wu, Haibin Kan, Jiheng Zhang
2025/663 (PDF ) Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters Mihir Bellare, Doreen Riepel, Laura Shea
2025/662 (PDF ) Attribute-Based Publicly Verifiable Secret Sharing Liang Zhang, Xingyu Wu, Qiuling Yue, Haibin Kan, Jiheng Zhang
2025/661 (PDF ) An LLM Framework For Cryptography Over Chat Channels Danilo Gligoroski, Mayank Raikwar, Sonu Kumar Jha
2025/659 (PDF ) Scalable and Fine-Tuned Privacy Pass from Group Verifiable Random Functions Dennis Faut, Julia Hesse, Lisa Kohl, Andy Rupp
2025/658 (PDF ) Efficient Verifiable Mixnets from Lattices, Revisited Jonathan Bootle, Vadim Lyubashevsky, Antonio Merino-Gallardo
2025/657 (PDF ) Key Derivation Functions Without a Grain of Salt Matilda Backendal, Sebastian Clermont, Marc Fischlin, Felix Günther
2025/656 (PDF ) Unbounded Multi-Hop Proxy Re-Encryption with HRA Security: An LWE-Based Optimization Xiaohan Wan, Yang Wang, Haiyang Xue, Mingqiang Wang
2025/655 (PDF ) Taking AI-Based Side-Channel Attacks to a New Dimension Lucas David Meier, Felipe Valencia, Cristian-Alexandru Botocan, Damian Vizár
2025/654 (PDF ) ECDSA Cracking Methods William J Buchanan, Jamie Gilchrist, Keir Finlow-Bates
2025/653 (PDF ) Fission: Distributed Privacy-Preserving Large Language Model Inference Mehmet Ugurbil, Dimitris Mouris, Manuel B. Santos, José Cabrero-Holgueras, Miguel de Vega, Shubho Sengupta
2025/652 (PDF ) MultiCent: Secure and Scalable Computation of Centrality Measures on Multilayer Graphs Andreas Brüggemann, Nishat Koti, Varsha Bhat Kukkala, Thomas Schneider
2025/651 (PDF ) Low-Latency Bootstrapping for CKKS using Roots of Unity Jean-Sébastien Coron, Robin Köstler
2025/650 (PDF ) ADC-BE: Optimizing Worst-Case Bandwidth in Broadcast Encryption with Boolean Functions Yadi Zhong
2025/649 (PDF ) Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience Ying Cai, Chengyi Qin, Mingqiang Wang
2025/648 (PDF ) HQC Beyond the BSC: Towards Error Structure-Aware Decoding Marco Baldi, Sebastian Bitzer, Nicholas Lilla, Paolo Santini
2025/647 (PDF ) Anamorphic Voting: Ballot Freedom Against Dishonest Authorities Rosario Giustolisi, Mohammadamin Rakeei, Gabriele Lenzini
2025/646 (PDF ) Secret-Key PIR from Random Linear Codes Caicai Chen, Yuval Ishai, Tamer Mour, Alon Rosen
2025/645 (PDF ) GIGA Protocol: Unlocking Trustless Parallel Computation in Blockchains Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov, Daniele Di Tullio, Mariia Rodinko
2025/644 (PDF ) Attacking at non-harmonic frequencies in screaming-channel attacks Jeremy Guillaume, Maxime Pelcat, Amor Nafkha, Ruben Salvador
2025/643 (PDF ) Obfuscation for Deep Neural Networks against Model Extraction: Attack Taxonomy and Defense Optimization Yulian Sun, Vedant Bonde, Li Duan, Yong Li
2025/642 (PDF ) A Meta-Complexity Characterization of Quantum Cryptography Bruno P. Cavalar, Eli Goldin, Matthew Gray, Peter Hall
2025/641 (PDF ) Scalable Non-Fungible Tokens on Bitcoin Jordi Herrera-Joancomartí, Cristina Pérez-Solà, Toni Mateos
2025/640 (PDF ) Multi-Party Private Set Operations from Predicative Zero-Sharing Minglang Dong, Yu Chen, Cong Zhang, Yujie Bai, Yang Cao
2025/639 (PDF ) Cryptomania v.s. Minicrypt in a Quantum World Longcheng Li, Qian Li, Xingjian Li, Qipeng Liu
2025/638 (PDF ) Round-Efficient Adaptively Secure Threshold Signatures with Rewinding Yanbo Chen
2025/637 (PDF ) A Study of Blockchain Consensus Protocols Shymaa M. Arafat
2025/636 (PDF ) Impossible Differential Attack on SAND-64 Nobuyuki Sugio
2025/635 (PDF ) Towards Scalable YOSO MPC via Packed Secret-Sharing Daniel Escudero, Elisaweta Masserova, Antigoni Polychroniadou
2025/634 (PDF ) Cryptography based on 2D Ray Tracing Sneha Mohanty, Christian Schindelhauer
2025/633 (PDF ) Hybrid-query bounds with partial input control - framework and application to tight M-eTCR Andreas Hülsing, Mikhail Kudinov, Christian Majenz
2025/632 (PDF ) On breaking McEliece keys using brute force Lorenz Panny
2025/631 (PDF ) Dyna-hinTS: Silent Threshold Signatures for Dynamic Committees Aniket Kate, Pratyay Mukherjee, Samipa Samanta, Pratik Sarkar
2025/630 (PDF ) Charge Your Clients: Payable Secure Computation and Its Applications Cong Zhang, Liqiang Peng, Weiran Liu, Shuaishuai Li, Meng Hao, Lei Zhang, Dongdai Lin
2025/629 (PDF ) Audience Injection Attacks: A New Class of Attacks on Web-Based Authorization and Authentication Standards Pedram Hosseyni, Ralf Kuesters, Tim Würtele
2025/628 (PDF ) Improving the Masked Division for the FALCON Signature Pierre-Augustin Berthet, Cédric Tavernier
2025/627 (PDF ) Everlasting Fully Dynamic Group Signatures Yimeng He, San Ling, Khai Hanh Tang, Huaxiong Wang
2025/626 (PDF ) Tree-based Quantum Carry-Save Adder Hyunjun Kim, Sejin Lim, Kyungbae Jang, Siyi Wang, Anubhab Baksi, Anupam Chattopadhyay, Hwajeong Seo
2025/625 (PDF ) FHECAP: An Encrypted Control System with Piecewise Continuous Actuation Song Bian, Yunhao Fu, Dong Zhao, Haowen Pan, Yuexiang Jin, Jiayue Sun, Hui Qiao, Zhenyu Guan
2025/624 (PDF ) Trapdoor one-way functions from tensors Anand Kumar Narayanan
2025/623 (PDF ) CertainSync: Rateless Set Reconciliation with Certainty Tomer Keniagin, Eitan Yaakobi, Ori Rottenstreich
2025/622 (PDF ) Byzantine Reliable Broadcast and Tendermint Consensus with trusted components Yackolley Amoussou-Guenou, Lionel Beltrando, Maurice Herlihy, Maria Potop-Butucaru
2025/621 (PDF ) SPHINCSLET: An Area-Efficient Accelerator for the Full SPHINCS+ Digital Signature Algorithm Sanjay Deshpande, Yongseok Lee, Cansu Karakuzu, Jakub Szefer, Yunheung Paek
2025/620 (PDF ) Need for zkSpeed: Accelerating HyperPlonk for Zero-Knowledge Proofs Alhad Daftardar, Jianqiao Mo, Joey Ah-kiow, Benedikt Bünz, Ramesh Karri, Siddharth Garg, Brandon Reagen
2025/619 (PDF ) Making BBS Anonymous Credentials eIDAS 2.0 Compliant Nicolas Desmoulins, Antoine Dumanois, Seyni Kane, Jacques Traoré
2025/618 (PDF ) Anonymous Self-Credentials and their Application to Single-Sign-On Jayamine Alupotha, Mariarosaria Barbaraci, Ioannis Kaklamanis, Abhimanyu Rawat, Christian Cachin, Fan Zhang
2025/617 (PDF ) Multi-Screaming-Channel Attacks: Frequency Diversity for Enhanced Attacks Jeremy Guillaume, Maxime Pelcat, Amor Nafkha, Ruben Salvador
2025/616 (PDF ) State Machine Replication Among Strangers, Fast and Self-Sufficient Juan Garay, Aggelos Kiayias, Yu Shen
2025/615 (PDF ) From at Least $n/3$ to at Most $3\sqrt{n}$: Correcting the Algebraic Immunity of the Hidden Weight Bit Function Pierrick Méaux
2025/614 (PDF ) Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound Yi Liu, Junzuo Lai, Peng Yang, Anjia Yang, Qi Wang, Siu-Ming Yiu, Jian Weng
2025/613 (PDF ) Low-Latency Rate-Distortion-Perception Trade-off: A Randomized Distributed Function Computation Application Onur Gunlu, Maciej Skorski, H. Vincent Poor
2025/612 (PDF ) More NTRU+Sign Signatures from Cyclotomic Trinomials Ga Hee Hong, Joo Woo, Jonghyun Kim, Minkyu Kim, Hochang Lee, Jong Hwan Park
2025/611 (PDF ) Proving CPU Executions in Small Space Vineet Nair, Justin Thaler, Michael Zhu
2025/610 (PDF ) Clubcards for the WebPKI: smaller certificate revocation tests in theory and practice John M. Schanck
2025/609 (PDF ) Random Oracle Combiners: Merkle-Damgård Style Yevgeniy Dodis, Eli Goldin, Peter Hall
2025/608 (PDF ) On some non-linear recurrences over finite fields linked to isogeny graphs Juan Jesús León, Vicente Muñoz
2025/607 (PDF ) Analytic and Simulation Results of a Gaussian Physically Unclonable Constant Based on Resistance Dispersion Riccardo Bernardini
2025/606 (PDF ) An attack on ML-DSA using an implicit hint Paco Azevedo-Oliveira, Jordan Beraud, Louis Goubin
2025/605 (PDF ) Laconic Cryptography with Preprocessing Rishabh Bhadauria, Nico Döttling, Carmit Hazay, Chuanwei Lin
2025/604 (PDF ) On the success rate of simple side-channel attacks against masking with unlimited attack traces Aymeric Hiltenbrand, Julien Eynard, Romain Poussier
2025/603 (PDF ) Mobile Byzantine Agreement in a Trusted World Bo Pan, Maria Potop Butucaru
2025/602 (PDF ) Lattice-Based Sanitizable Signature Schemes: Chameleon Hash Functions and More Sebastian Clermont, Samed Düzlü, Christian Janson, Laurens Porzenheim, Patrick Struck
2025/601 (PDF ) PHOENIX: Crypto-Agile Hardware Sharing for ML-KEM and HQC Antonio Ras, Antoine Loiseau, Mikaël Carmona, Simon Pontié, Guénaël Renault, Benjamin Smith, Emanuele Valea
2025/600 (PDF ) Improved Round-by-round Soundness IOPs via Reed-Muller Codes Dor Minzer, Kai Zhe Zheng
2025/599 (PDF ) Insecurity of One Decentralized Attribute-based Signature Scheme for Social Co-governance Zhengjun Cao, Lihua Liu
2025/598 (PDF ) Nominal State-Separating Proofs Markus Krabbe Larsen, Carsten Schürmann
2025/597 (PDF ) SoK: Self-Generated Nudes over Private Chats: How Can Technology Contribute to a Safer Sexting? Joel Samper, Bernardo Ferreira
2025/596 (PDF ) Highway to Hull: An Algorithm for Solving the General Matrix Code Equivalence Problem Alain Couvreur, Christophe Levrat
2025/595 (PDF ) Partial Key Exposure Attacks on UOV and Its Variants Yuki Seto, Hiroki Furue, Atsushi Takayasu
2025/594 (PDF ) Efficient SNARKs for Boolean Circuits via Sumcheck over Tower Fields Tianyi Liu, Yupeng Zhang
2025/593 (PDF ) Oblivious Immutable Memory Ananya Appan, David Heath
2025/592 (PDF ) DSM: Decentralized State Machine - The Missing Trust Layer of the Internet Brandon Ramsay
2025/591 (PDF ) ColliderVM: Stateful Computation on Bitcoin without Fraud Proofs Victor I. Kolobov, Avihu M. Levy, Moni Naor
2025/590 (PDF ) $\mathsf{GraSP}$: Secure Collaborative Graph Processing Made Scalable Siddharth Kapoor, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2025/589 (PDF ) Defeating AutoLock: From Simulation to Real-World Cache-Timing Exploits against TrustZone Quentin Forcioli, Sumanta Chaudhuri, Jean-Luc Danger
2025/588 (PDF ) A Place for Everyone vs Everyone in its Place: Measuring and Attacking the Ethereum Global Network Chenyu Li, Ren Zhang, Xiaorui Gong
2025/587 (PDF ) Lifeboats on the Titanic Cryptography Gideon Samid
2025/586 (PDF ) Heuristic Algorithm for Solving Restricted SVP and its Applications Geng Wang, Wenwen Xia, Dawu Gu
2025/585 (PDF ) Adaptively-Secure Big-Key Identity-Based Encryption Jeffrey Champion, Brent Waters, David J. Wu
2025/584 (PDF ) The Singularity Random Number Generator: Bridging Determinism and Unpredictability to Redefine Randomness, Secure Systems, and Adaptive Intelligence S. P. Prahlad
2025/583 (PDF ) Counter Galois Onion (CGO) for Tor: Fast Non-Malleable Onion Encryption Jean Paul Degabriele, Alessandro Melloni, Jean-Pierre Münch, Martijn Stam
2025/582 (PDF ) Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on the ML-DSA Cryptosystem Zheng Liu, An Wang, Congming Wei, Yaoling Ding, Jingqi Zhang, Annyu Liu, Liehuang Zhu
2025/581 (PDF ) Multi-Party Homomorphic Encryption with Dynamicity and Ciphertext Reusability Jung Hee Cheon, Hyeongmin Choe, Seunghong Kim, Yongdong Yeo
2025/580 (PDF ) Efficient Revocable Identity-Based Encryption from Middle-Product LWE Takumi Nishimura, Atsushi Takayasu
2025/579 (PDF ) REGKYC: Supporting Privacy and Compliance Enforcement for KYC in Blockchains Xihan Xiong, Michael Huth, William Knottenbelt
2025/578 (PDF ) Efficient Garbled Pseudorandom Functions and Lookup Tables from Minimal Assumption Wei-Kai Lin, Zhenghao Lu, Hong-Sheng Zhou
2025/577 (PDF ) Making GCM Great Again: Toward Full Security and Longer Nonces Woohyuk Chung, Seongha Hwang, Seongkwang Kim, Byeonghak Lee, Jooyoung Lee
2025/576 (PDF ) Pre-Constructed Publicly Verifiable Secret Sharing and Applications Karim Baghery, Noah Knapen, Georgio Nicolas, Mahdi Rahimi
2025/575 (PDF ) Wagner's Algorithm Provably Runs in Subexponential Time for SIS$^\infty$ Léo Ducas, Lynn Engelberts, Johanna Loyer
2025/574 (PDF ) Buffalo: A Practical Secure Aggregation Protocol for Buffered Asynchronous Federated Learning Riccardo Taiello, Clémentine Gritti, Melek Önen, Marco Lorenzi
2025/573 (PDF ) Forking Lemma in EasyCrypt Denis Firsov, Jakub Janků
2025/572 (PDF ) Zinnia: Expressive, Efficient Zero-Knowledge Framework for General-Purpose Data Analytics Zhantong Xue, Pingchuan Ma, Zhaoyu Wang, Shuai Wang
2025/571 (PDF ) Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange Shuya Hanai, Keisuke Tanaka, Masayuki Tezuka, Yusuke Yoshida
2025/570 (PDF ) Partial Key Overwrite Attacks in Microcontrollers: a Survey pcy Sluys, Lennert Wouters, Benedikt Gierlichs, Ingrid Verbauwhede
2025/569 (PDF ) Solving Data Availability Limitations in Client-Side Validation with UTxO Binding Yunwen Liu, Bo Wang, Ren Zhang
2025/568 (PDF ) An in-depth security evaluation of the Nintendo DSi gaming console pcy Sluys, Lennert Wouters, Benedikt Gierlichs, Ingrid Verbauwhede
2025/567 (PDF ) Making Uncertified DAG BFT Provably Live with Linear Payload and Quadratic Metadata Communication Nikita Polyanskii, Sebastian Mueller, Ilya Vorobyev
2025/566 (PDF ) Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities Subhadeep Banik, Hailun Yan
2025/565 (PDF ) Attacking soundness for an optimization of the Gemini Polynomial Commitment Scheme Lydia Garms, Michael Livesey
2025/564 (PDF ) Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V Linus Mainka, Kostas Papagiannopoulos
2025/563 (PDF ) An Optimized Instantiation of Post-Quantum MQTT protocol on 8-bit AVR Sensor Nodes YoungBeom Kim, Seog Chung Seo
2025/562 (PDF ) Analysis of One Certificateless Authentication and Key Agreement Scheme for Wireless Body Area Network Zhengjun Cao, Lihua Liu
2025/561 (PDF ) ThreatLens: LLM-guided Threat Modeling and Test Plan Generation for Hardware Security Verification Dipayan Saha, Hasan Al Shaikh, Shams Tarek, Farimah Farahmandi
2025/560 (PDF ) Jump, It Is Easy: JumpReLU Activation Function in Deep Learning-based Side-channel Analysis Abraham Basurto-Becerra, Azade Rezaeezade, Stjepan Picek
2025/559 (PDF ) Is Your Bluetooth Chip Leaking Secrets via RF Signals? Yanning Ji, Elena Dubrova, Ruize Wang
2025/558 (PDF ) Breaking and Fixing Content-Defined Chunking Kien Tuong Truong, Simon-Philipp Merz, Matteo Scarlata, Felix Günther, Kenneth G. Paterson
2025/557 (PDF ) Soloist: Distributed SNARK for R1CS with Constant Proof Size Weihan Li, Zongyang Zhang, Yun Li, Pengfei Zhu, Cheng Hong, Jianwei Liu
2025/556 (PDF ) Private SCT Auditing, Revisited Lena Heimberger, Christopher Patton, Bas Westerbaan
2025/555 (PDF ) Strong Federated Authentication With Password-based Credential Against Identity Server Corruption Changsong Jiang, Chunxiang Xu, Guomin Yang, Li Duan, Jing Wang
2025/554 (PDF ) Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix Joseph Jaeger, Akshaya Kumar
2025/553 (PDF ) HIPR: Hardware IP Protection through Low-Overhead Fine-Grain Redaction Aritra Dasgupta, Sudipta Paria, Swarup Bhunia
2025/552 (PDF ) Black Box Crypto is Useless for Doubly Efficient PIR Wei-Kai Lin, Ethan Mook, Daniel Wichs
2025/551 (PDF ) ANARKey: A New Approach to (Socially) Recover Keys Aniket Kate, Pratyay Mukherjee, Hamza Saleem, Pratik Sarkar, Bhaskar Roberts
2025/550 (PDF ) Exact Formula for RX-Differential Probability through Modular Addition for All Rotations Alex Biryukov, Baptiste Lambin, Aleksei Udovenko
2025/549 (PDF ) Public Key Accumulators for Revocation of Non-Anonymous Credentials Andrea Flamini, Silvio Ranise, Giada Sciarretta, Mario Scuro, Nicola Smaniotto, Alessandro Tomasi
2025/548 (PDF ) Breaking HuFu with 0 Leakage: A Side-Channel Analysis Julien Devevey, Morgane Guerreau, Thomas Legavre, Ange Martinelli, Thomas Ricosset
2025/547 (PDF ) Improved Cryptanalysis of FEA-1 and FEA-2 using Square Attacks Abhishek Kumar, Amit Kumar Chauhan, Somitra Kumar Sanadhya
2025/546 (PDF ) BugWhisperer: Fine-Tuning LLMs for SoC Hardware Vulnerability Detection Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Farimah Farahmandi
2025/545 (PDF ) Enhancing E-Voting with Multiparty Class Group Encryption Michele Battagliola, Giuseppe D'Alconzo, Andrea Gangemi, Chiara Spadafora
2025/544 (PDF ) Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies Théophile Brézot, Chloé Hébant, Paola de Perthuis, David Pointcheval
2025/543 (PDF ) Models of Kummer lines and Galois representations Razvan Barbulescu, Damien Robert, Nicolas Sarkis
2025/542 (PDF ) That’s AmorE: Amortized Efficiency for Pairing Delegation Adrián Pérez Keilty, Diego F. Aranha, Elena Pagnin, Francisco Rodríguez-Henríquez
2025/541 (PDF ) Physical Design-Aware Power Side-Channel Leakage Assessment Framework using Deep Learning Dipayan Saha, Jingbo Zhou, Farimah Farahmandi
2025/540 (PDF ) Tangram: Encryption-friendly SNARK framework under Pedersen committed engines Gweonho Jeong, Myeongkyun Moon, Geonho Yoon, Hyunok Oh, Jihye Kim
2025/539 (PDF ) Aegis: Scalable Privacy-preserving CBDC Framework with Dynamic Proof of Liabilities Gweonho Jeong, Jaewoong Lee, Minhae Kim, Byeongkyu Han, Jihye Kim, Hyunok Oh
2025/538 (PDF ) Efficient Proofs of Possession for Legacy Signatures Anna P. Y. Woo, Alex Ozdemir, Chad Sharp, Thomas Pornin, Paul Grubbs
2025/537 (PDF ) Improved Framework of Related-key Differential Neural Distinguisher and Applications to the Standard Ciphers Rui-Tao Su, Jiong-Jiong Ren, Shao-Zhen Chen
2025/536 (PDF ) A Fiat–Shamir Transformation From Duplex Sponges Alessandro Chiesa, Michele Orrù
2025/535 (PDF ) zkPyTorch: A Hierarchical Optimized Compiler for Zero-Knowledge Machine Learning Tiancheng Xie, Tao Lu, Zhiyong Fang, Siqi Wang, Zhenfei Zhang, Yongzheng Jia, Dawn Song, Jiaheng Zhang
2025/534 (PDF ) Plonkify: R1CS-to-Plonk transpiler Pengfei Zhu
2025/533 (PDF ) JesseQ: Efficient Zero-Knowledge Proofs for Circuits over Any Field Mengling Liu, Yang Heng, Xingye Lu, Man Ho Au
2025/532 (PDF ) Chunking Attacks on File Backup Services using Content-Defined Chunking Boris Alexeev, Colin Percival, Yan X Zhang
2025/531 (PDF ) Understanding the new distinguisher of alternant codes at degree 2 Axel Lemoine, Rocco Mora, Jean-Pierre Tillich
2025/529 (PDF ) On the Anonymity in "A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments" Zhengjun Cao, Lihua Liu
2025/528 (PDF ) VeRange: Verification-efficient Zero-knowledge Range Arguments with Transparent Setup for Blockchain Applications and More Yue Zhou, Sid Chi-Kin Chau
2025/527 (PDF ) SoK: Fully-homomorphic encryption in smart contracts Daniel Aronoff, Adithya Bhat, Panagiotis Chatzigiannis, Mohsen Minaei, Srinivasan Raghuraman, Robert M. Townsend, Nicolas Xuan-Yi Zhang
2025/526 (PDF ) AI Agents in Cryptoland: Practical Attacks and No Silver Bullet Atharv Singh Patlan, Peiyao Sheng, S. Ashwin Hebbar, Prateek Mittal, Pramod Viswanath
2025/525 (PDF ) Deniable Secret Sharing Ran Canetti, Ivan Damgård, Sebastian Kolby, Divya Ravi, Sophia Yakoubov
2025/524 (PDF ) Ring Referral: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User Anonymity for Decentralized Identity and More The-Anh Ta, Xiangyu Hui, Sid Chi-Kin Chau
2025/523 (PDF ) Assembly optimised Curve25519 and Curve448 implementations for ARM Cortex-M4 and Cortex-M33 Emil Lenngren
2025/522 (PDF ) New Techniques for Analyzing Fully Secure Protocols: A Case Study of Solitary Output Secure Computation Bar Alon, Benjamin Saldman, Eran Omri
2025/521 (PDF ) Division polynomials for arbitrary isogenies Katherine E. Stange
2025/520 (PDF ) Masking-Friendly Post-Quantum Signatures in the Threshold-Computation-in-the-Head Framework Thibauld Feneuil, Matthieu Rivain, Auguste Warmé-Janville
2025/519 (PDF ) mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software Brieuc Balon, Lorenzo Grassi, Pierrick Méaux, Thorben Moos, François-Xavier Standaert, Matthias Johann Steiner
2025/518 (PDF ) Secret-Sharing Schemes for General Access Structures: An Introduction Amos Beimel
2025/517 (PDF ) Designated-Verifier SNARGs with One Group Element Gal Arnon, Jesko Dujmovic, Yuval Ishai
2025/516 (PDF ) Don't Use It Twice: Reloaded! On the Lattice Isomorphism Group Action Alessandro Budroni, Jesús-Javier Chi-Domínguez, Ermes Franch
2025/515 (PDF ) Compressed Sigma Protocols: New Model and Aggregation Techniques Yuxi Xue, Tianyu Zheng, Shang Gao, Bin Xiao, Man Ho Au
2025/514 (PDF ) On Extractability of the KZG Family of Polynomial Commitment Schemes Juraj Belohorec, Pavel Dvořák, Charlotte Hoffmann, Pavel Hubáček, Kristýna Mašková, Martin Pastyřík
2025/513 (PDF ) Server-Aided Anonymous Credentials Rutchathon Chairattana-Apirom, Franklin Harding, Anna Lysyanskaya, Stefano Tessaro
2025/512 (PDF ) Optimizing AES-GCM on ARM Cortex-M4: A Fixslicing and FACE-Based Approach Hyunjun Kim, Hwajeong Seo
2025/511 (PDF ) VeriSSO: A Privacy-Preserving Legacy-Compatible Single Sign-On Protocol Using Verifiable Credentials Ifteher Alom, Sudip Bhujel, Yang Xiao
2025/510 (PDF ) Adaptive Adversaries in Byzantine-Robust Federated Learning: A survey. Jakub Kacper Szeląg, Ji-Jian Chin, Sook-Chin Yip
2025/509 (PDF ) Almost Optimal KP and CP-ABE for Circuits from Succinct LWE Hoeteck Wee
2025/508 (PDF ) Towards Building Scalable Constant-Round MPC from Minimal Assumptions via Round Collapsing Vipul Goyal, Junru Li, Rafail Ostrovsky, Yifan Song
2025/507 (PDF ) Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning Meng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang
2025/506 (PDF ) On the Estonian Internet Voting System, IVXV, SoK and Suggestions Shymaa M. Arafat
2025/505 (PDF ) Capitalized Bitcoin Fork for National Strategic Reserve Charanjit Singh Jutla, Arnab Roy
2025/504 (PDF ) Ideal Compartmented Secret Sharing Scheme Based on the Chinese Remainder Theorem for Polynomial Rings Alexandru-Valentin Basaga, Sorin Iftene
2025/503 (PDF ) Max Bias Analysis: A New Approach on Computing the Entropy of Free Ring-Oscillator Nicolas David, Eric Garrido
2025/502 (PDF ) Registration-Based Encryption in the Plain Model Jesko Dujmovic, Giulio Malavolta, Wei Qi
2025/501 (PDF ) Quantum Key-Recovery Attacks on Permutation-Based Pseudorandom Functions Hong-Wei Sun, Fei Gao, Rong-Xue Xu, Dan-Dan Li, Zhen-Qiang Li, Ke-Jia Zhang
2025/500 (PDF ) SecurED: Secure Multiparty Edit Distance for Genomic Sequences Jiahui Gao, Yagaagowtham Palanikuma, Dimitris Mouris, Duong Tung Nguyen, Ni Trieu
2025/499 (PDF ) SCAPEgoat: Side-channel Analysis Library Dev Mehta, Trey Marcantino, Mohammad Hashemi, Sam Karkache, Dillibabu Shanmugam, Patrick Schaumont, Fatemeh Ganji
2025/498 (PDF ) Scoop: An Optimizer for Profiling Attacks against Higher-Order Masking Nathan Rousselot, Karine Heydemann, Loïc Masure, Vincent Migairou
2025/497 (PDF ) Fast Scloud+: A Fast Hardware Implementation for the Unstructured LWE-based KEM - Scloud+ Jing Tian, Yaodong Wei, Dejun Xu, Kai Wang, Anyu Wang, Zhiyuan Qiu, Fu Yao, Guang Zeng
2025/496 (PDF ) Shortcut2Secrets: A Table-based Differential Fault Attack Framework Weizhe Wang, Pierrick Méaux, Deng Tang
2025/495 (PDF ) A Security-Enhanced Pairing-Free Certificateless Aggregate Signature for Vehicular Ad-Hoc Networks, Revisited Zhengjun Cao, Lihua Liu
2025/493 (PDF ) Tighter Concrete Security for the Simplest OT Iftach Haitner, Gil Segev
2025/491 (PDF ) Blind Brother: Attribute-Based Selective Video Encryption Eugene Frimpong, Bin Liu, Camille Nuoskala, Antonis Michalas
2025/490 (PDF ) PREAMBLE: Private and Efficient Aggregation of Block Sparse Vectors and Applications Hilal Asi, Vitaly Feldman, Hannah Keller, Guy N. Rothblum, Kunal Talwar
2025/489 (PDF ) Translating Between the Common Haar Random State Model and the Unitary Model Eli Goldin, Mark Zhandry
2025/488 (PDF ) Exploring General Cyclotomic Rings in Torus-Based Fully Homomorphic Encryption Philippe Chartier, Michel Koskas, Mohammed Lemou
2025/487 (PDF ) webSPDZ: Versatile MPC on the Web Thomas Buchsteiner, Karl W. Koch, Dragos Rotaru, Christian Rechberger
2025/486 (PDF ) On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations Omri Shmueli, Mark Zhandry
2025/485 (PDF ) Key reconstruction for QC-MDPC McEliece from imperfect distance spectrum Motonari Ohtsuka, Takahiro Ishimaru, Rei Iseki, Shingo Kukita, Kohtaro Watanabe
2025/484 (PDF ) EvoLUTe+: Fine-Grained Look-Up-Table-based RTL IP Redaction Rui Guo, M Sazadur Rahman, Jingbo Zhou, Hadi M Kamali, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
2025/483 (PDF ) Adaptively Secure Threshold Blind BLS Signatures and Threshold Oblivious PRF Stanislaw Jarecki, Phillip Nazarian
2025/482 (PDF ) An Efficient Sequential Aggregate Signature Scheme with Lazy Verification Arinjita Paul, Sabyasachi Dutta, Kouichi Sakurai, C. Pandu Rangan
2025/481 (PDF ) RHQC: post-quantum ratcheted key exchange from coding assumptions Julien Juaneda, Marina Dehez-Clementi, Jean-Christophe Deneuville, Jérôme Lacan
2025/480 (PDF ) Worst-case Analysis of Lattice Enumeration Algorithm over Modules Jiseung Kim, Changmin Lee, Yongha Son
2025/479 (PDF ) Post Quantum Migration of Tor Denis Berger, Mouad Lemoudden, William J Buchanan
2025/478 (PDF ) Attacking Single-Cycle Ciphers on Modern FPGAs featuring Explainable Deep Learning Mustafa Khairallah, Trevor Yap
2025/477 (PDF ) A Note on the Advanced Use of the Tate Pairing Krijn Reijnders
2025/476 (PDF ) A note on "industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training" Zhengjun Cao, Lihua Liu
2025/475 (PDF ) HammR: A ZKP Protocol for Fixed Hamming-Weight Restricted-Entry Vectors Felice Manganiello, Freeman Slaughter
2025/474 (PDF ) Black-Box Constant-Round Secure 2PC with Succinct Communication Michele Ciampi, Ankit Kumar Misra, Rafail Ostrovsky, Akash Shah
2025/473 (PDF ) Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE Faneela, Jawad Ahmad, Baraq Ghaleb, Sana Ullah Jan, William J Buchanan
2025/472 (PDF ) Quantum Attacks on Sum of Even-Mansour Construction Utilizing Online Classical Queries Zhenqiang Li, Shuqin Fan, Fei Gao, Yonglin Hao, Hongwei Sun, Xichao Hu, Dandan Li
2025/471 (PDF ) A Practical Tutorial on Deep Learning-based Side-channel Analysis Sengim Karayalcin, Marina Krcek, Stjepan Picek
2025/470 (PDF ) On Deniable Authentication against Malicious Verifiers Rune Fiedler, Roman Langrehr
2025/469 (PDF ) Practical Semi-Open Chat Groups for Secure Messaging Applications Alex Davidson, Luiza Soezima, Fernando Virdia
2025/468 (PDF ) Optimized Frobenius and Cyclotomic Cubing for Enhanced Pairing Computation Leila Ben Abdelghani, Nadia El Mrabet, Loubna Ghammam, Lina Mortajine
2025/467 (PDF ) PMNS arithmetic for elliptic curve cryptography Fangan Yssouf Dosso, Sylvain Duquesne, Nadia El Mrabet, Emma Gautier
2025/466 (PDF ) Algebraic Cryptanalysis of Small-Scale Variants of Stream Cipher E0 Jan Dolejš, Martin Jureček
2025/465 (PDF ) zkAML: Zero-knowledge Anti Money Laundering in Smart Contracts with whitelist approach Donghwan Oh, Semin Han, Jihye Kim, Hyunok Oh, Jiyeal Chung, Jieun Lee, Hee-jun Yoo, Tae wan Kim
2025/464 (PDF ) SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields Jean Paul Degabriele, Jan Gilcher, Jérôme Govinden, Kenneth G. Paterson
2025/463 (PDF ) Multi-Party Computation in Corporate Data Processing: Legal and Technical Insights Sebastian Becker, Christoph Bösch, Benjamin Hettwer, Thomas Hoeren, Merlin Rombach, Sven Trieflinger, Hossein Yalame
2025/462 (PDF ) Practical Key Collision on AES and Kiasu-BC Jianqiang Ni, Yingxin Li, Fukang Liu, Gaoli Wang
2025/461 (PDF ) Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth Thomas Haines, Rajeev Goré, Mukesh Tiwari
2025/460 (PDF ) Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training Truong Son Nguyen, Yi Ren, Guangyu Nie, Ni Trieu
2025/459 (PDF ) Privacy and Security of FIDO2 Revisited Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Kaishuo Cheng, Luís Esquível
2025/458 (PDF ) CAKE requires programming - On the provable post-quantum security of (O)CAKE Kathrin Hövelmanns, Andreas Hülsing, Mikhail Kudinov, Silvia Ritsch
2025/457 (PDF ) A 10-bit S-box generated by Feistel construction from cellular automata Thomas Prévost, Bruno Martin
2025/456 (PDF ) A Democratic Distributed Post-Quantum Certificateless Encryption Scheme Thomas Prévost, Bruno Martin, Olivier Alibart
2025/455 (PDF ) StaMAC: Fault Protection via Stable-MAC Tags Siemen Dhooghe, Artemii Ovchinnikov, Dilara Toprakhisar
2025/454 (PDF ) Quantum circuit for implementing AES S-box with low costs Huinan Chen, Binbin Cai, Fei Gao, Song Lin
2025/453 (PDF ) Verifiable Secret Sharing Based on Fully Batchable Polynomial Commitment for Privacy-Preserving Distributed Computation Xiangyu Kong, Min Zhang, Yu Chen
2025/452 (PDF ) Polar Lattice Cryptography Gideon Samid
2025/451 (PDF ) Analysis of the Telegram Key Exchange Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Eyal Ronen, Igors Stepanovs
2025/450 (PDF ) Verifiable Decapsulation: Recognizing Faulty Implementations of Post-Quantum KEMs Lewis Glabush, Felix Günther, Kathrin Hövelmanns, Douglas Stebila
2025/449 (PDF ) Concretely Efficient Correlated Oblivious Permutation Feng Han, Xiao Lan, Weiran Liu, Lei Zhang, Hao Ren, Lin Qu, Yuan Hong
2025/448 (PDF ) Ciphertext-Ciphertext Matrix Multiplication: Fast for Large Matrices Jai Hyun Park
2025/447 (PDF ) Protecting Computations Against Continuous Bounded-Communication Leakage Yuval Ishai, Yifan Song
2025/446 (PDF ) Disincentivize Collusion in Verifiable Secret Sharing Tiantian Gong, Aniket Kate, Hemanta K. Maji, Hai H. Nguyen
2025/445 (PDF ) A proof of P≠NP (New symmetric encryption algorithm against any linear attacks and differential attacks) Gao Ming
2025/444 (PDF ) Multiparty Garbling from OT with Linear Scaling and RAM Support David Heath, Vladimir Kolesnikov, Varun Narayanan, Rafail Ostrovsky, Akash Shah
2025/443 (PDF ) Homomorphic Signature-based Witness Encryption and Applications Alireza Kavousi, István András Seres
2025/442 (PDF ) A Unified Framework for Succinct Garbling from Homomorphic Secret Sharing Yuval Ishai, Hanjun Li, Huijia Lin
2025/441 (PDF ) High-Order Masking of BIKE Matthias Trannoy
2025/440 (PDF ) AI for Code-based Cryptography Mohamed Malhou, Ludovic Perret, Kristin Lauter
2025/439 (PDF ) Preimage Attacks on up to 5 Rounds of SHA-3 Using Internal Differentials Zhongyi Zhang, Chengan Hou, Meicheng Liu
2025/438 (PDF ) Transmitting Secrets by Transmitting only Plaintext Gideon Samid
2025/437 (PDF ) Improved Cryptanalysis of ChaCha: Beating PNBs with Bit Puncturing Antonio Flórez-Gutiérrez, Yosuke Todo
2025/436 (PDF ) The Algebraic One-More MISIS Problem and Applications to Threshold Signatures Chenzhi Zhu, Stefano Tessaro
2025/435 (PDF ) Constant-Time Code: The Pessimist Case Thomas Pornin
2025/434 (PDF ) Fine-Grained Verifier NIZK and Its Applications Shuai Han, Shengli Liu, Xiangyu Liu, Dawu Gu
2025/433 (PDF ) MIDAS: an End-to-end CAD Framework for Automating Combinational Logic Locking Akashdeep Saha, Siddhartha Chowdhury, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
2025/432 (PDF ) Black-Box (and Fast) Non-Malleable Zero Knowledge Vincenzo Botta, Michele Ciampi, Emmanuela Orsini, Luisa Siniscalchi, Ivan Visconti
2025/431 (PDF ) Commitment Schemes Based on Module-LIP Hengyi Luo, Kaijie Jiang, Renjie Jin, Yanbin Pan, Anyu Wang
2025/430 (PDF ) Non-interactive Anonymous Tokens with Private Metadata Bit Foteini Baldimtsi, Lucjan Hanzlik, Quan Nguyen, Aayush Yadav
2025/429 (PDF ) Enhanced CKKS Bootstrapping with Generalized Polynomial Composites Approximation Seonhong Min, Joon-Woo Lee, Yongsoo Song
2025/428 (PDF ) On Improved Cryptanalytic Results against ChaCha for Reduced Rounds ≥ 7 Nitin Kumar Sharma, Sabyasachi Dey, Santanu Sarkar, Subhamoy Maitra
2025/427 (PDF ) BUFFing Threshold Signature Schemes Marc Fischlin, Aikaterini Mitrokotsa, Jenit Tomy
2025/426 (PDF ) Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable Keitaro Hashimoto, Shuichi Katsumata, Guillermo Pascual-Perez
2025/425 (PDF ) A Note on the Blindness of the Scheme from ePrint 2025/397 Lucjan Hanzlik
2025/424 (PDF ) Matchmaker: Fast Secure Inference across Deployment Scenarios Neha Jawalkar, Nishanth Chandran, Divya Gupta, Rahul Sharma, Arkaprava Basu
2025/423 (PDF ) Multi-Client Attribute-Based Unbounded Inner Product Functional Encryption, and More Subhranil Dutta, Aikaterini Mitrokotsa, Tapas Pal, Jenit Tomy
2025/422 (PDF ) Private Computation on Common Fuzzy Records Kyoohyung Han, Seongkwang Kim, Yongha Son
2025/421 (PDF ) A Note on Obfuscation-based Attacks on Private-coin Evasive LWE Tzu-Hsiang Huang, Wei-Hsiang Hung, Shota Yamada
2025/420 (PDF ) Non-Interactive Verifiable Aggregation Ojaswi Acharya, Suvasree Biswas, Weiqi Feng, Adam O'Neill, Arkady Yerukhimovich
2025/419 (PDF ) Samaritan: Linear-time Prover SNARK from New Multilinear Polynomial Commitments Chaya Ganesh, Sikhar Patranabis, Nitin Singh
2025/418 (PDF ) ProofFrog: A Tool For Verifying Game-Hopping Proofs Ross Evans, Matthew McKague, Douglas Stebila
2025/417 (PDF ) Evaluation of Privacy-aware Support Vector Machine (SVM) Learning using Homomorphic Encryption William J Buchanan, Hisham Ali
2025/416 (PDF ) Trapdoor Hash Functions and PIR from Low-Noise LPN Damiano Abram, Giulio Malavolta, Lawrence Roy
2025/415 (PDF ) On the Soundness of Algebraic Attacks against Code-based Assumptions Miguel Cueto Noval, Simon-Philipp Merz, Patrick Stählin, Akin Ünal
2025/414 (PDF ) Deimos Cipher: A High-Entropy, Secure Encryption Algorithm with Strong Diffusion and Key Sensitivity Mohsin Belam
2025/413 (PDF ) Garblet: Multi-party Computation for Protecting Chiplet-based Systems Mohammad Hashemi, Shahin Tajik, Fatemeh Ganji
2025/412 (PDF ) Multi-Authority Encryption with Malicious Authorities Rishab Goyal, Saikumar Yadugiri
2025/411 (PDF ) Security of the Ascon Authenticated Encryption Mode in the Presence of Quantum Adversaries Nathalie Lang, Stefan Lucks, Bart Mennink, Suprita Talnikar
2025/410 (PDF ) TreeKEM: A Modular Machine-Checked Symbolic Security Analysis of Group Key Agreement in Messaging Layer Security Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan
2025/409 (PDF ) Low Communication Threshold FHE from Standard (Module-)LWE Hiroki Okada, Tsuyoshi Takagi
2025/408 (PDF ) Hybrid Obfuscated Key Exchange and KEMs Felix Günther, Michael Rosenberg, Douglas Stebila, Shannon Veitch
2025/407 (PDF ) Delegatable ABE with $O(1)$ Delegations from Witness Encryption Rishab Goyal, Saikumar Yadugiri
2025/406 (PDF ) AsyRand: asynchronous distributed randomness beacon with reconfiguration Liang Zhang, Tao Liu, Haibin Kan, Jiheng Zhang
2025/404 (PDF ) SNARKs for Stateful Computations on Authenticated Data Johannes Reinhart, Erik-Oliver Blass, Bjoern Annighoefer
2025/403 (PDF ) Unlocking Mix-Basis Potential: Geometric Approach for Combined Attacks Kai Hu, Chi Zhang, Chengcheng Chang, Jiashu Zhang, Meiqin Wang, Thomas Peyrin
2025/402 (PDF ) Mix-Basis Geometric Approach to Boomerang Distinguishers Chengcheng Chang, Hosein Hadipour, Kai Hu, Muzhou Li, Meiqin Wang
2025/401 (PDF ) PEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogenies Pierrick Dartois, Jonathan Komada Eriksen, Tako Boris Fouotsa, Arthur Herlédan Le Merdy, Riccardo Invernizzi, Damien Robert, Ryan Rueger, Frederik Vercauteren, Benjamin Wesolowski
2025/400 (PDF ) Re-Randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Tang Gang, Yanbin Pan, Xiaoyun Wang
2025/399 (PDF ) Computational Quantum Anamorphic Encryption and Anamorphic Secret Sharing SAYANTAN GANGULY, Shion Samadder Chaudhury
2025/398 (PDF ) Tight Adaptive Simulation Security for Identity-based Inner-Product FE in the (Quantum) Random Oracle Model Tenma Edamura, Atsushi Takayasu
2025/397 (PDF ) Blind Signatures from Cryptographic Group Actions Dung Hoang Duong, Xuan Thanh Khuc, Youming Qiao, Willy Susilo, Chuanqi Zhang
2025/396 (PDF ) Trail-Estimator: An Automated Verifier for Differential Trails in Block Ciphers Thomas Peyrin, Quan Quan Tan, Hongyi Zhang, Chunning Zhou
2025/395 (PDF ) Provably Secure Approximate Computation Protocols from CKKS Intak Hwang, Yisol Hwang, Miran Kim, Dongwon Lee, Yongsoo Song
2025/394 (PDF ) Reducing the Number of Qubits in Solving LWE Barbara Jiabao Benedikt
2025/393 (PDF ) An Efficient Quantum Oblivious Transfer Protocol Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath, Sihem Mesnager
2025/392 (PDF ) Blockchain-based Secure D2D localisation with adaptive precision Gewu Bu, Bilel Zaghdoudi, Maria Potop-Butucaru, Serge Fdida
2025/391 (PDF ) Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity Shafik Nassar, Brent Waters, David J. Wu
2025/390 (PDF ) Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption (Part II: zeroizing attacks against private-coin evasive LWE assumptions) Yao-Ching Hsieh, Aayush Jain, Huijia Lin
2025/389 (PDF ) An ETSI GS QKD compliant TLS implementation Thomas Prévost, Bruno Martin, Olivier Alibart
2025/388 (PDF ) Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures Ruben Baecker, Paul Gerhart, Jonathan Katz, Dominique Schröder
2025/387 (PDF ) Generic Composition: From Classical to Quantum Security Nathalie Lang, Jannis Leuther, Stefan Lucks
2025/386 (PDF ) How Small Can S-boxes Be Chenhao Jia, Tingting Cui, Qing Ling, Yan He, Kai Hu, Yu Sun, Meiqin Wang
2025/385 (PDF ) MERCURY: A multilinear Polynomial Commitment Scheme with constant proof size and no prover FFTs Liam Eagen, Ariel Gabizon
2025/383 (PDF ) Pencil: A Domain-Extended PRF with Full $n$-bit Security for Strengthening GCM and More Ritam Bhaumik, Jean Paul Degabriele
2025/382 (PDF ) On the Security and Privacy of CKKS-based Homomorphic Evaluation Protocols Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song
2025/381 (PDF ) Faster FHEW Bootstrapping with Adaptive Key Update Qi Zhang, Mingqiang Wang, Xiaopeng Cheng
2025/380 (PDF ) A New Generalized Attack on RSA-like Cryptosystems Michel Seck, Oumar Niang, Djiby Sow, Abderrahmane Nitaj, Mengce Zheng, Maher Boudabra
2025/379 (PDF ) A Complete Security Proof of SQIsign Marius A. Aardal, Andrea Basso, Luca De Feo, Sikhar Patranabis, Benjamin Wesolowski
2025/378 (PDF ) Side-Channel and Fault Injection Attacks on VOLEitH Signature Schemes: A Case Study of Masked FAEST Sönke Jendral, Elena Dubrova
2025/377 (PDF ) HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency Han Chen, Tao Huang, Phuong Pham, Shuang Wu
2025/376 (PDF ) Another Look at the Quantum Security of the Vectorization Problem with Shifted Inputs Paul Frixons, Valerie Gilchrist, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Lam L. Pham
2025/375 (PDF ) Zeroizing Attacks against Evasive and Circular Evasive LWE Shweta Agrawal, Anuja Modi, Anshu Yadav, Shota Yamada
2025/374 (PDF ) Simple and General Counterexamples for Private-Coin Evasive LWE Nico Döttling, Abhishek Jain, Giulio Malavolta, Surya Mathialagan, Vinod Vaikuntanathan
2025/373 (PDF ) Split Prover Zero-Knowledge SNARKs Sanjam Garg, Aarushi Goel, Dimitris Kolonelos, Sina Shiehian, Rohit Sinha
2025/372 (PDF ) KLPT²: Algebraic Pathfinding in Dimension Two and Applications Wouter Castryck, Thomas Decru, Péter Kutas, Abel Laval, Christophe Petit, Yan Bo Ti
2025/371 (PDF ) Functional Oblivious Transfer with Applications in Privacy-Preserving Machine Learning Aydin Abadi, Mohammad Naseri
2025/370 (PDF ) Simple Public Key Anamorphic Encryption and Signature using Multi-Message Extensions Shalini Banerjee, Tapas Pal, Andy Rupp, Daniel Slamanig
2025/369 (PDF ) Higher Residuosity Attacks on Small RSA Subgroup Decision Problems Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Zhusen Liu
2025/368 (PDF ) Polynomial Secret Sharing Schemes and Algebraic Matroids Amos Beimel, Oriol Farràs, Adriana Moya
2025/367 (PDF ) Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally Martin R. Albrecht, Russell W. F. Lai, Oleksandra Lapiha, Ivy K. Y. Woo
2025/366 (PDF ) Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY Amin Abdulrahman, Matthias J. Kannwischer, Thing-Han Lim
2025/365 (PDF ) Lattice-Based Updatable Public-Key Encryption for Group Messaging Joël Alwen, Georg Fuchsbauer, Marta Mularczyk, Doreen Riepel
2025/364 (PDF ) Traitor Tracing in Multi-sender Setting ($\textsf{TMCFE}$: Traceable Multi-client Functional Encryption) Xuan Thanh Do, Dang Truong Mac, Ky Nguyen, Duong Hieu Phan, Quoc-Huy Vu
2025/363 (PDF ) The Security of Hash-and-Sign with Retry against Superposition Attacks Haruhisa Kosuge, Keita Xagawa
2025/362 (PDF ) Adaptively Secure Fully Homomorphic Message Authentication Code with Pre-processable Verification Jeongsu Kim, Aaram Yun
2025/361 (PDF ) Predicate Encryption from Lattices: Enhanced Compactness and Refined Functionality Yuejun Wang, Baocang Wang, Qiqi Lai, Huaxiong Wang
2025/360 (PDF ) Vanishing Short Integer Solution, Revisited: Reductions, Trapdoors, Homomorphic Signatures for Low-Degree Polynomials Kalle Jyrkinen, Russell W. F. Lai
2025/359 (PDF ) A Note on Zero-Knowledge Simulator of the CROSS Identification Protocol Shai Levin
2025/358 (PDF ) The Complexity of Memory Checking with Covert Security Elette Boyle, Ilan Komargodski, Neekon Vafa
2025/357 (PDF ) Random Number Generation from Pulsars Hayder Tirmazi
2025/356 (PDF ) Lattice-based Proof-Friendly Signatures from Vanishing Short Integer Solutions Adrien Dubois, Michael Klooß, Russell W. F. Lai, Ivy K. Y. Woo
2025/355 (PDF ) Commit-and-Prove System for Vectors and Applications to Threshold Signing Anja Lehmann, Cavit Özbay
2025/354 (PDF ) Delayed-Input Multi-Party Computation Michele Ciampi, Jure Sternad, Yu Xia
2025/353 (PDF ) Stronger Security for Threshold Blind Signatures Anja Lehmann, Phillip Nazarian, Cavit Özbay
2025/352 (PDF ) Efficient NIZK Arguments with Straight-Line Simulation and Extraction Michele Ciampi, Ivan Visconti
2025/351 (PDF ) Thorough Power Analysis on Falcon Gaussian Samplers and Practical Countermeasure Xiuhan Lin, Shiduo Zhang, Yang Yu, Weijia Wang, Qidi You, Ximing Xu, Xiaoyun Wang
2025/350 (PDF ) Bootstrapping with RMFE for Fully Homomorphic Encryption Khin Mi Mi Aung, Enhui Lim, Jun Jie Sim, Benjamin Hong Meng Tan, Huaxiong Wang
2025/349 (PDF ) Efficient Distributed Randomness Generation from Minimal Assumptions where PArties Speak Sequentially Once Chen-Da Liu-Zhang, Elisaweta Masserova, João Ribeiro, Pratik Soni, Sri AravindaKrishnan Thyagarajan
2025/348 (PDF ) Juicebox Protocol: Distributed Storage and Recovery of Secrets Using Simple PIN Authentication Nora Trapp, Diego Ongaro
2025/347 (PDF ) Helix: Scalable Multi-Party Machine Learning Inference against Malicious Adversaries Yansong Zhang, Xiaojun Chen, Qinghui Zhang, Xudong Chen, Ye Dong
2025/346 (PDF ) Homomorphic Encryption for Large Integers from Nested Residue Number Systems Dan Boneh, Jaehyung Kim
2025/345 (PDF ) Publicly Verifiable Threshold Proxy Re-encryption and Its Application in Data Rights Confirmation Tao Liu, Liang Zhang, Haibin Kan, Jiheng Zhang
2025/343 (PDF ) On The Multi-target Security of Post-Quantum Key Encapsulation Mechanisms Lewis Glabush, Kathrin Hövelmanns, Douglas Stebila
2025/342 (PDF ) Traceable Threshold Encryption without a Trusted Dealer Jan Bormet, Jonas Hofmann, Hussien Othman
2025/341 (PDF ) CCA-Secure Traceable Threshold (ID-based) Encryption and Application Rishiraj Bhattacharyya, Jan Bormet, Sebastian Faust, Pratyay Mukherjee, Hussien Othman
2025/340 (PDF ) Hollow LWE: A New Spin, Unbounded Updatable Encryption from LWE and PCE Martin R. Albrecht, Benjamin Benčina, Russell W. F. Lai
2025/339 (PDF ) Key-Homomorphic Computations for RAM: Fully Succinct Randomised Encodings and More Damiano Abram, Giulio Malavolta, Lawrence Roy
2025/338 (PDF ) CT-LLVM: Automatic Large-Scale Constant-Time Analysis Zhiyuan Zhang, Gilles Barthe
2025/337 (PDF ) IP Masking with Generic Security Guarantees under Minimum Assumptions, and Applications Sebastian Faust, Loïc Masure, Elena Micheli, Hai Hoang Nguyen, Maximilian Orlt, François-Xavier Standaert
2025/336 (PDF ) Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits Damiano Abram, Giulio Malavolta, Lawrence Roy
2025/335 (PDF ) Privacy-Preserving Multi-Signatures: Generic Techniques and Constructions Without Pairings Calvin Abou Haidar, Dipayan Das, Anja Lehmann, Cavit Özbay, Octavio Perez Kempner
2025/334 (PDF ) How to Share an NP Statement or Combiners for Zero-Knowledge Proofs Benny Applebaum, Eliran Kachlon
2025/333 (PDF ) Leap: A Fast, Lattice-based OPRF With Application to Private Set Intersection Lena Heimberger, Daniel Kales, Riccardo Lolato, Omid Mir, Sebastian Ramacher, Christian Rechberger
2025/332 (PDF ) Towards Leakage-Resilient Ratcheted Key Exchange Daniel Collins, Simone Colombo, Sina Schaeffler
2025/331 (PDF ) Private Multi-Party Neural Network Training over $\mathbb{Z}_{2^k}$ via Galois Rings Hengcheng Zhou
2025/330 (PDF ) (Multi-Input) FE for Randomized Functionalities, Revisited Pratish Datta, Jiaxin Guan, Alexis Korb, Amit Sahai
2025/329 (PDF ) Towards a White-Box Secure Fiat-Shamir Transformation Gal Arnon, Eylon Yogev
2025/328 (PDF ) Fully Asymmetric Anamorphic Homomorphic Encryption from LWE Amit Deo, Benoît Libert
2025/327 (PDF ) Bulletproofs for R1CS: Bridging the Completeness-Soundness Gap and a ZK Extension Gil Segev
2025/326 (PDF ) On the Adaptive Security of Free-XOR-based Garbling Schemes in the Plain Model Anasuya Acharya, Karen Azari, Chethan Kamath
2025/325 (PDF ) On Quantum Money and Evasive Obfuscation Mark Zhandry
2025/324 (PDF ) Fine-Grained Complexity in a World without Cryptography Josh Alman, Yizhi Huang, Kevin Yeo
2025/323 (PDF ) A Generic Approach to Adaptively-Secure Broadcast Encryption in the Plain Model Yao-Ching Hsieh, Brent Waters, David J. Wu
2025/321 (PDF ) Differential Cryptanalysis of the Reduced Pointer Authentication Code Function used in Arm’s FEAT_PACQARMA3 Feature Roberto Avanzi, Orr Dunkelman, Shibam Ghosh
2025/320 (PDF ) Committing Authenticated Encryption: Generic Transforms with Hash Functions Shan Chen, Vukašin Karadžić
2025/319 (PDF ) Single Trace Side-Channel Vulnerabilities Discovery Using Statistical Leakage Simulator Jinyi Qiu
2025/318 (PDF ) Traceable Verifiable Secret Sharing and Applications Karim Baghery, Ehsan Ebrahimi, Omid Mirzamohammadi, Mahdi Sedaghat
2025/317 (PDF ) Minicrypt PIR for Big Batches Nico Döttling, Jesko Dujmovic, Julian Loss, Maciej Obremski
2025/316 (PDF ) $\mathsf{Zinc}$: Succinct Arguments with Small Arithmetization Overheads from IOPs of Proximity to the Integers Albert Garreta, Hendrik Waldner, Katerina Hristova, Luca Dall'Ava
2025/315 (PDF ) Cryptanalysis of Full SCARF Antonio Flórez-Gutiérrez, Eran Lambooij, Gaëtan Leurent, Håvard Raddum, Tyge Tiessen, Michiel Verbauwhede
2025/314 (PDF ) Towards Optimally Secure Deterministic Authenticated Encryption Schemes Yu Long Chen, Avijit Dutta, Ashwin Jha, Mridul Nandi
2025/313 (PDF ) Lattice-based $\Sigma$-Protocols for Polynomial Relations with Standard Soundness Lizhen Zhang, Shang Gao, Bin Xiao
2025/312 (PDF ) Traceable Verifiable Random Functions Dan Boneh, Aditi Partap, Lior Rotem
2025/311 (PDF ) Malleable SNARKs and Their Applications Suvradip Chakraborty, Dennis Hofheinz, Roman Langrehr, Jesper Buus Nielsen, Christoph Striecks, Daniele Venturi
2025/310 (PDF ) Non-Interactive Key Exchange: New Notions, New Constructions, and Forward Security Suvradip Chakraborty, Dennis Hofheinz, Roman Langrehr
2025/309 (PDF ) A Unified Treatment of Anamorphic Encryption Wonseok Choi, Daniel Collins, Xiangyu Liu, Vassilis Zikas
2025/308 (PDF ) ChiLow and ChiChi: New Constructions for Code Encryption Yanis Belkheyar, Patrick Derbez, Shibam Ghosh, Gregor Leander, Silvia Mella, Léo Perrin, Shahram Rasoolzadeh, Lukas Stennes, Siwei Sun, Gilles Van Assche, Damian Vizár
2025/307 (PDF ) Quasi-Linear Indistinguishability Obfuscation via Mathematical Proofs of Equivalence and Applications Yaohua Ma, Chenxin Dai, Elaine Shi
2025/306 (PDF ) Dimensional e$\mathsf{ROS}$ion: Improving the $\mathsf{ROS}$ Attack with Decomposition in Higher Bases Antoine Joux, Julian Loss, Giacomo Santato
2025/305 (PDF ) The Malice of ELFs: Practical Anamorphic-Resistant Encryption without Random Oracles Gennaro Avitabile, Vincenzo Botta, Emanuele Giunta, Marcin Mielniczuk, Francesco Migliaro
2025/304 (PDF ) Lattice-based Cryptography: A survey on the security of the lattice-based NIST finalists Koen de Boer, Wessel van Woerden
2025/303 (PDF ) Asynchronous Algorand: Reaching Agreement with Near Linear Communication and Constant Expected Time Ittai Abraham, Eli Chouatt, Ivan Damgård, Yossi Gilad, Gilad Stern, Sophia Yakoubov
2025/302 (PDF ) Phalanx: An FHE-Friendly SNARK for Verifiable Computation on Encrypted Data Xinxuan Zhang, Ruida Wang, Zeyu Liu, Binwu Xiang, Yi Deng, Ben Fisch, Xianhui Lu
2025/301 (PDF ) Making Protocol FSU Revocable Kazuma Wariki, Atsushi Fujioka, Akira Nagai, Kan Yasuda
2025/300 (PDF ) Pseudorandom Functions with Weak Programming Privacy and Applications to Private Information Retrieval Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi, Bo Peng
2025/299 (PDF ) (Un)breakable curses - re-encryption in the Fujisaki-Okamoto transform Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz, Fabrizio Sisinni
2025/298 (PDF ) Stateless Hash-Based Signatures for Post-Quantum Security Keys Ruben Gonzalez
2025/297 (PDF ) Practical Zero-Trust Threshold Signatures in Large-Scale Dynamic Asynchronous Networks Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan Cohen Scaly, Yuval Spiizer
2025/296 (PDF ) DFS: Delegation-friendly zkSNARK and Private Delegation of Provers Yuncong Hu, Pratyush Mishra, Xiao Wang, Jie Xie, Kang Yang, Yu Yu, Yuwen Zhang
2025/295 (PDF ) Stationary Syndrome Decoding for Improved PCGs Vladimir Kolesnikov, Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal
2025/294 (PDF ) Neo: Lattice-based folding scheme for CCS over small fields and pay-per-bit commitments Wilson Nguyen, Srinath Setty
2025/293 (PDF ) Anamorphic-Resistant Encryption; Or Why the Encryption Debate is Still Alive Yevgeniy Dodis, Eli Goldin
2025/292 (PDF ) Tight Lower Bounds and New Upper Bounds For Evolving CDS Tamar Ben David, Anat Paskin-Cherniavsky
2025/291 (PDF ) A Note on Adaptive Security in Hierarchical Identity-Based Encryption Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree
2025/290 (PDF ) Dynamic Decentralized Functional Encryption: Generic Constructions with Strong Security Ky Nguyen, David Pointcheval, Robert Schädlich
2025/289 (PDF ) Significantly Improved Cryptanalysis of Salsa20 With Two-Round Criteria Sabyasachi Dey, Subhamoy Maitra, Santanu Sarkar, Nitin Kumar Sharma
2025/288 (PDF ) Deep Neural Cryptography David Gerault, Anna Hambitzer, Eyal Ronen, Adi Shamir
2025/287 (PDF ) A reduction from Hawk to the principal ideal problem in a quaternion algebra Clémence Chevignard, Guilhem Mureau, Thomas Espitau, Alice Pellet-Mary, Heorhii Pliatsok, Alexandre Wallet
2025/286 (PDF ) Verifiable Computation for Approximate Homomorphic Encryption Schemes Ignacio Cascudo, Anamaria Costache, Daniele Cozzo, Dario Fiore, Antonio Guimarães, Eduardo Soria-Vazquez
2025/285 (PDF ) MicroCrypt Assumptions with Quantum Input Sampling and Pseudodeterminism: Constructions and Separations Mohammed Barhoush, Ryo Nishimaki, Takashi Yamakawa
2025/284 (PDF ) S2DV: Scalable and Secure DAO Voting Ali Dogan, Sermin Kocaman
2025/283 (PDF ) Honest Majority MPC with $\tilde{O}(|C|)$ Communication in Minicrypt Yifan Song, Xiaxi Ye
2025/282 (PDF ) Transistor: a TFHE-friendly Stream Cipher Jules Baudrin, Sonia Belaïd, Nicolas Bon, Christina Boura, Anne Canteaut, Gaëtan Leurent, Pascal Paillier, Léo Perrin, Matthieu Rivain, Yann Rotella, Samuel Tap
2025/281 (PDF ) Securely Instantiating 'Half Gates' Garbling in the Standard Model Anasuya Acharya, Karen Azari, Mirza Ahad Baig, Dennis Hofheinz, Chethan Kamath
2025/280 (PDF ) Cryptanalysis of rank-2 module-LIP: a single real embedding is all it takes Bill Allombert, Alice Pellet-Mary, Wessel van Woerden
2025/279 (PDF ) Context-Dependent Threshold Decryption and its Applications Dan Boneh, Benedikt Bünz, Kartik Nayak, Lior Rotem, Victor Shoup
2025/278 (PDF ) New Techniques for Random Probing Security and Application to Raccoon Signature Scheme Sonia Belaïd, Matthieu Rivain, Mélissa Rossi
2025/277 (PDF ) Tighter Control for Distributed Key Generation: Share Refreshing and Expressive Reconstruction Policies Sara Montanari, Riccardo Longo, Alessio Meneghetti
2025/276 (PDF ) Finding and Protecting the Weakest Link - On Side-Channel Attacks on y in Masked ML-DSA Julius Hermelink, Kai-Chun Ning, Richard Petri
2025/275 (PDF ) Error-Simulatable Sanitization for TFHE and Applications Nigel P. Smart, Michael Walter
2025/274 (PDF ) Post-Quantum Blind Signatures from Matrix Code Equivalence Veronika Kuchta, Jason T. LeGrow, Edoardo Persichetti
2025/273 (PDF ) Clustering Approach for Higher-Order Deterministic Masking Vahid Jahandideh, Jan Schoone, Lejla Batina
2025/272 (PDF ) X-Transfer: Enabling and Optimizing Cross-PCN Transactions Lukas Aumayr, Zeta Avarikioti, Iosif Salem, Stefan Schmid, Michelle Yeo
2025/271 (PDF ) Unconditional foundations for supersingular isogeny-based cryptography Arthur Herlédan Le Merdy, Benjamin Wesolowski
2025/270 (PDF ) A Decomposition Approach for Evaluating Security of Masking Vahid Jahandideh, Bart Mennink, Lejla Batina
2025/269 (PDF ) 10-Party Sublinear Secure Computation from Standard Assumptions Geoffroy Couteau, Naman Kumar
2025/268 (PDF ) 𝜔(1/𝜆)-Rate Boolean Garbling Scheme from Generic Groups Geoffroy Couteau, Carmit Hazay, Aditya Hegde, Naman Kumar
2025/267 (PDF ) Authentication and sole control at a high level of assurance on widespread smartphones with threshold signatures Sander Q. Dijkhuis
2025/266 (PDF ) Memory-Efficient BKW Algorithm for Solving the LWE Problem Yu Wei, Lei Bi, Xianhui Lu, Kunpeng Wang
2025/265 (PDF ) White-Box Watermarking Signatures against Quantum Adversaries and Its Applications Fuyuki Kitagawa, Ryo Nishimaki
2025/264 (PDF ) Dazzle: Improved Adaptive Threshold Signatures from DDH Yanbo Chen
2025/263 (PDF ) Transparent SNARKs over Galois Rings Yuanju Wei, Xinxuan Zhang, Yi Deng
2025/262 (PDF ) PKE and ABE with Collusion-Resistant Secure Key Leasing Fuyuki Kitagawa, Ryo Nishimaki, Nikhil Pappu
2025/261 (PDF ) HasteBoots: Proving FHE Bootstrapping in Seconds Fengrun Liu, Haofei Liang, Tianyu Zhang, Yuncong Hu, Xiang Xie, Haisheng Tan, Yu Yu
2025/260 (PDF ) Quantum Security Evaluation of ASCON Yujin Oh, Kyungbae Jang, Hwajeong Seo
2025/259 (PDF ) Improved Resultant Attack against Arithmetization-Oriented Primitives Augustin Bariant, Aurélien Boeuf, Pierre Briaud, Maël Hostettler, Morten Øygarden, Håvard Raddum
2025/258 (PDF ) MPC with Publicly Identifiable Abort from Pseudorandomness and Homomorphic Encryption Marc Rivinius
2025/257 (PDF ) TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
2025/256 (PDF ) Inaccessible Entropy for Watermarking Generative Agents Daniel Alabi, Lav R. Varshney
2025/255 (PDF ) Tighter Security Notions for a Modular Approach to Private Circuits Bohan Wang, Juelin Zhang, Yu Yu, Weijia Wang
2025/254 (PDF ) Garbled Lookup Tables from Homomorphic Secret Sharing Liqiang Liu, Tianren Liu, Bo Peng
2025/253 (PDF ) Adaptively Secure IBE from Lattices with Asymptotically Better Efficiency Weidan Ji, Zhedong Wang, Lin Lyu, Dawu Gu
2025/252 (PDF ) Chiplet-Based Techniques for Scalable and Memory-Aware Multi-Scalar Multiplication Florian Hirner, Florian Krieger, Sujoy Sinha Roy
2025/251 (PDF ) Verifiable Streaming Computation and Step-by-Step Zero-Knowledge Abtin Afshar, Rishab Goyal
2025/250 (PDF ) The Round Complexity of Black-Box Post-Quantum Secure Computation Rohit Chatterjee, Xiao Liang, Omkant Pandey, Takashi Yamakawa
2025/249 (PDF ) cuFalcon: An Adaptive Parallel GPU Implementation for High-Performance Falcon Acceleration Wenqian Li, Hanyu Wei, Shiyu Shen, Hao Yang, Wangchen Dai, Yunlei Zhao
2025/248 (PDF ) New Exchanged Boomerang Distinguishers for 5-Round AES Hanbeom Shin, Seonkyu Kim, Byoungjin Seok, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong
2025/247 (PDF ) LatticeFold+: Faster, Simpler, Shorter Lattice-Based Folding for Succinct Proof Systems Dan Boneh, Binyi Chen
2025/246 (PDF ) Towards Optimal Early Stopping Agreement Protocols Fatima Elsheimy, Julian Loss, Charalampos Papamanthou
2025/245 (PDF ) Silent Circuit Relinearisation: Sublinear-Size (Boolean and Arithmetic) Garbled Circuits from DCR Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl
2025/244 (PDF ) Provable Speedups for SVP Approximation Under Random Local Blocks Jianwei Li
2025/243 (PDF ) K-Linkable Ring Signatures and Applications in Generalized Voting Wonseok Choi, Xiangyu Liu, Lirong Xia, Vassilis Zikas
2025/242 (PDF ) Rational Secret Sharing with Competition Tiantian Gong, Zeyu Liu
2025/241 (PDF ) IBE-IBE: Intent-Based Execution through Identity-Based Encryption and Auctions Peyman Momeni, Fig Smith
2025/240 (PDF ) Robust Non-Interactive Zero-Knowledge Combiners Michele Ciampi, Lorenzo Magliocco, Daniele Venturi, Yu Xia
2025/239 (PDF ) DART: Decentralized, Anonymous, and Regulation-friendly Tokenization Amirreza Sarencheh, Hamidreza Khoshakhlagh, Alireza Kavousi, Aggelos Kiayias
2025/238 (PDF ) On the Power of Polynomial Preprocessing: Proving Computations in Sublinear Time, and More Matteo Campanelli, Mario Carrillo, Ignacio Cascudo, Dario Fiore, Danilo Francati, Rosario Gennaro
2025/237 (PDF ) UC-Security of Encrypted Key Exchange: A Tutorial Jiayu Xu
2025/236 (PDF ) Diamond iO: A Straightforward Construction of Indistinguishability Obfuscation from Lattices Sora Suegami, Enrico Bottazzi, Gayeong Park
2025/235 (PDF ) Doubly Efficient Cryptography: Commitments, Arguments and RAM MPC Wei-Kai Lin, Ethan Mook, Daniel Wichs
2025/234 (PDF ) Merkle Mountain Ranges are Optimal: On Witness Update Frequency for Cryptographic Accumulators Joseph Bonneau, Jessica Chen, Miranda Christ, Ioanna Karantaidou
2025/233 (PDF ) Anamorphic Resistant Encryption: the Good, the Bad and the Ugly Davide Carnemolla, Dario Catalano, Emanuele Giunta, Francesco Migliaro
2025/232 (PDF ) Authenticated BitGC for Actively Secure Rate-One 2PC Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu
2025/231 (PDF ) NoIC: PAKE from KEM without Ideal Ciphers Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki
2025/230 (PDF ) Privately Constrained PRFs from DCR: Puncturing and Bounded Waring Rank Amik Raj Behera, Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl
2025/229 (PDF ) ETK: External-Operations TreeKEM and the Security of MLS in RFC 9420 Cas Cremers, Esra Günsay, Vera Wesselkamp, Mang Zhao
2025/228 (PDF ) Network agnostic consensus in constant time Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen
2025/227 (PDF ) Two Is All It Takes: Asymptotic and Concrete Improvements for Solving Code Equivalence Alessandro Budroni, Andre Esser, Ermes Franch, Andrea Natale
2025/226 (PDF ) Improved Subfield Curve Search For Specific Field Characteristics Jesús-Javier Chi-Domínguez
2025/225 (PDF ) “Check-Before-you-Solve”: Verifiable Time-lock Puzzles Jiajun Xin, Dimitrios Papadopoulos
2025/223 (PDF ) Building Hard Problems by Combining Easy Ones: Revisited Yael Eisenberg, Christopher Havens, Alexis Korb, Elio Merolle, Amit Sahai
2025/222 (PDF ) A Robust Variant of ChaCha20-Poly1305 Tim Beyne, Yu Long Chen, Michiel Verbauwhede
2025/221 (PDF ) Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero Brandon Goodell, Rigo Salazar, Freeman Slaughter
2025/220 (PDF ) The Quantum Decoherence Model: Everlasting Composable Secure Computation and More Nico Döttling, Alexander Koch, Sven Maier, Jeremias Mechler, Anne Müller, Jörn Müller-Quade, Marcel Tiepelt
2025/219 (PDF ) Slot a la carte: Centralization Issues in Ethereum's Proof-of-Stake Protocol János Tapolcai, Bence Ladóczki, Ábel Nagy
2025/218 (PDF ) LSM Trees in Adversarial Environments Hayder Tirmazi
2025/217 (PDF ) Assumption-Free Fuzzy PSI via Predicate Encryption Erik-Oliver Blass, Guevara Noubir
2025/216 (PDF ) Practical TFHE Ciphertext Sanitization for Oblivious Circuit Evaluation Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song
2025/215 (PDF ) A note on the genus of the HAWK lattice Daniël M. H. van Gent
2025/214 (PDF ) Rejected Signatures' Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks Yuanyuan Zhou, Weijia Wang, Yiteng Sun, Yu Yu
2025/213 (PDF ) An Innovative Lightweight Symmetric Encryption Algorithm Integrating NeoAlzette ARX S-box and XCR CSPRNG Jiang Yu
2025/212 (PDF ) Constructing Quantum Implementations with the Minimal T-depth or Minimal Width and Their Applications Zhenyu Huang, Fuxin Zhang, Dongdai Lin
2025/211 (PDF ) Prior-Based Label Differential Privacy via Secure Two-Party Computation Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth
2025/210 (PDF ) Practical Keyword Private Information Retrieval from Key-to-Index Mappings Meng Hao, Weiran Liu, Liqiang Peng, Cong Zhang, Pengfei Wu, Lei Zhang, Hongwei Li, Robert H. Deng
2025/208 (PDF ) Reductions Between Code Equivalence Problems Mahdi Cheraghchi, Nikhil Shagrithaya, Alexandra Veliche
2025/207 (PDF ) Efficient Mixed Garbling from Homomorphic Secret Sharing and GGM-Tree Jian Guo, Wenjie Nan
2025/205 (PDF ) Addressing Scalability Issues of Blockchains with Hypergraph Payment Networks Arad Kotzer, Bence Ladóczki, János Tapolcai, Ori Rottenstreich
2025/204 (PDF ) On the Composable Security of MDVS and MDRS-PKE Constructions Chen-Da Liu-Zhang, Christopher Portmann, Guilherme Rito
2025/203 (PDF ) Ciphertext-Simulatable HE from BFV with Randomized Evaluation Intak Hwang, Seonhong Min, Yongsoo Song
2025/202 (PDF ) Distributed Non-Interactive Zero-Knowledge Proofs Alex B. Grilo, Ami Paz, Mor Perry
2025/201 (PDF ) Cryptanalysis of Isogeny-Based Quantum Money with Rational Points Hyeonhak Kim, DongHoe Heo, Seokhie Hong
2025/200 (PDF ) Improved Secure Two-party Computation from a Geometric Perspective Hao Guo, Liqiang Peng, Haiyang Xue, Li Peng, Weiran Liu, Zhe Liu, Lei Hu
2025/199 (PDF ) Sublinear Proofs over Polynomial Rings Mi-Ying Miryam Huang, Xinyu Mao, Jiapeng Zhang
2025/198 (PDF ) Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption Song Bian, Haowen Pan, Jiaqi Hu, Zhou Zhang, Yunhao Fu, Jiafeng Hua, Yi Chen, Bo Zhang, Yier Jin, Jin Dong, Zhenyu Guan
2025/197 (PDF ) Cryptanalysis of a nonlinear filter-based stream cipher Tim Beyne, Michiel Verbauwhede
2025/195 (PDF ) Finding a polytope: A practical fault attack against Dilithium Paco Azevedo-Oliveira, Andersson Calle Viera, Benoît Cogliati, Louis Goubin
2025/194 (PDF ) AUCIL: An Inclusion List Design for Rational Parties Sarisht Wadhwa, Julian Ma, Thomas Thiery, Barnabe Monnot, Luca Zanolini, Fan Zhang, Kartik Nayak
2025/193 (PDF ) On the Average Random Probing Model Julien Béguinot, Loïc Masure
2025/192 (PDF ) Practical Electromagnetic Fault Injection on Intel Neural Compute Stick 2 Shivam Bhasin, Dirmanto Jap, Marina Krček, Stjepan Picek, Prasanna Ravi
2025/191 (PDF ) Adaptive Distributional Security: A Framework for Input-Adaptive Cryptography Cruz Barnum, David Heath
2025/190 (PDF ) Binary Codes for Error Detection and Correction in a Computationally Bounded World Jad Silbak, Daniel Wichs
2025/189 (PDF ) Experimentally studying path-finding problem between conjugates in supersingular isogeny graphs: Optimizing primes and powers to speed-up cycle finding Madhurima Mukhopadhyay
2025/188 (PDF ) BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup Nan Wang, Qianhui Wang, Dongxi Liu, Muhammed F. Esgin, Alsharif Abuadbba
2025/187 (PDF ) Asymptotic improvements to provable algorithms for the code equivalence problem Huck Bennett, Drisana Bhatia, Jean-François Biasse, Medha Durisheti, Lucas LaBuff, Vincenzo Pallozzi Lavorante, Philip Waitkevich
2025/186 (PDF ) Computing Quaternion Embeddings and Endomorphism rings of Supersingular Oriented Elliptic curves Maher Mamah
2025/185 (PDF ) AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions Marcel Nageler, Shibam Ghosh, Marlene Jüttler, Maria Eichlseder
2025/184 (PDF ) NodeChain: Cheap Data Integrity Without Consensus Orfeas Stefanos Thyfronitis Litos, Zhaoxuan Wu, Alfredo Musumeci, Songyun Hu, James Helsby, Michael Breza, William Knottenbelt
2025/183 (PDF ) OBLIVIATOR: Oblivious Parallel Joins and other Operators in Shared Memory Environments Apostolos Mavrogiannakis, Xian Wang, Ioannis Demertzis, Dimitrios Papadopoulos, Minos Garofalakis
2025/182 (PDF ) Deny Whatever You Want: Dual-Deniable Public-Key Encryption Zhiyuan An, Fangguo Zhang
2025/181 (PDF ) Improved NTT and CRT-based RNR Blinding for Side-Channel and Fault Resistant Kyber Max Duparc, Mounir Taha
2025/180 (PDF ) On the Atomicity and Efficiency of Blockchain Payment Channels Di Wu, Shoupeng Ren, Yuman Bai, Lipeng He, Jian Liu, Wu Wen, Kui Ren, Chun Chen
2025/179 (PDF ) Probing Secure Composability Without Fresh Randomness: Theory and Application to Ascon Vahid Jahandideh, Bart Mennink, Lejla Batina
2025/178 (PDF ) Improved Differential and Linear Cryptanalysis on Round-Reduced SIMON Chao Niu, Muzhou Li, Jifu Zhang, Meiqin Wang
2025/177 (PDF ) On the Power of Sumcheck in Secure Multiparty Computation Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan
2025/176 (PDF ) HyperLoop: Rationally secure efficient cross-chain bridge Aniket Kate, Easwar Vivek Mangipudi, Charan Nomula, Raghavendra Ramesh, Athina Terzoglou, Joshua Tobkin
2025/175 (PDF ) Updatable Public-Key Encryption, Revisited Joël Alwen, Georg Fuchsbauer, Marta Mularczyk
2025/174 (PDF ) VITARIT: Paying for Threshold Services on Bitcoin and Friends Sri AravindaKrishnan Thyagarajan, Easwar Vivek Mangipudi, Lucjan Hanzlik, Aniket Kate, Pratyay Mukherjee
2025/173 (PDF ) A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography Nick Aquina, Bruno Cimoli, Soumya Das, Kathrin Hövelmanns, Fiona Johanna Weber, Chigo Okonkwo, Simon Rommel, Boris Škorić, Idelfonso Tafur Monroy, Sebastian Verschoor
2025/172 (PDF ) SoK: Understanding zk-SNARKs: The Gap Between Research and Practice Junkai Liang, Daqi Hu, Pengfei Wu, Yunbo Yang, Qingni Shen, Zhonghai Wu
2025/171 (PDF ) S5: Combining white-box countermeasures to resist state-of-the-art attacks Alex Charlès, Aleksei Udovenko
2025/170 (PDF ) Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms Mohamed Abdelmonem, Lukas Holzbaur, Håvard Raddum, Alexander Zeh
2025/169 (PDF ) Efficient Pseudorandom Correlation Generators for Any Finite Field Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan
2025/168 (PDF ) Revisiting Beimel-Weinreb Weighted Threshold Secret Sharing Schemes Oriol Farràs, Miquel Guiot
2025/167 (PDF ) Wiretapping LLMs: Network Side-Channel Attacks on Interactive LLM Services Mahdi Soleimani, Grace Jia, In Gim, Seung-seob Lee, Anurag Khandelwal
2025/166 (PDF ) Polynomial Inversion Algorithms in Constant Time for Post-Quantum Cryptography Abhraneel Dutta, Emrah Karagoz, Edoardo Persichetti, Pakize Sanal
2025/165 (PDF ) SLIDE: Shuffle Shamir Secret Shares Uniformly with Linear Online Communication and Guaranteed Output Delivery Jiacheng Gao, Moyang Xie, Yuan Zhang, Sheng Zhong
2025/164 (PDF ) Multi-Authority Functional Encryption with Bounded Collusions from Standard Assumptions Rishab Goyal, Saikumar Yadugiri
2025/163 (PDF ) Bootstrapping (T)FHE Ciphertexts via Automorphisms: Closing the Gap Between Binary and Gaussian Keys Olivier Bernard, Marc Joye
2025/162 (PDF ) Learning from Functionality Outputs: Private Join and Compute in the Real World Francesca Falzon, Tianxin Tang
2025/161 (PDF ) Stronger Security for Blind Signatures with Attributes Foteini Baldimtsi, Julia Kastner, Julian Loss, Omar Renawi
2025/160 (PDF ) The Nonlinear Filter Model of Stream Cipher Redivivus Claude Carlet, Palash Sarkar
2025/159 (PDF ) A Holistic Framework for Impossible Boomerang Attacks Yincen Chen, Qinggan Fu, Ning Zhao, Jiahao Zhao, Ling Song, Qianqian Yang
2025/158 (PDF ) Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool Haoyang Wang, Jianing Zhang
2025/157 (PDF ) Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis Azade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek
2025/156 (PDF ) TallyGuard: Privacy Preserving Tallied-as-cast Guarantee Athish Pranav Dharmalingam, Sai Venkata Krishnan, KC Sivaramakrishnan, N.S. Narayanaswamy
2025/155 (PDF ) Cycles and Cuts in Supersingular L-Isogeny Graphs Sarah Arpin, Ross Bowden, James Clements, Wissam Ghantous, Jason T. LeGrow, Krystal Maughan
2025/154 (PDF ) Shadowfax: Hybrid Security and Deniability for AKEMs Phillip Gajland, Vincent Hwang, Jonas Janneck
2025/153 (PDF ) Error floor prediction with Markov models for QC-MDPC codes Sarah Arpin, Jun Bo Lau, Antoine Mesnard, Ray Perlner, Angela Robinson, Jean-Pierre Tillich, Valentin Vasseur
2025/152 (PDF ) Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay
2025/151 (PDF ) Quantum function secret sharing Alex B. Grilo, Ramis Movassagh
2025/150 (PDF ) On pairs of primes with small order reciprocity Craig Costello, Gaurish Korpal
2025/149 (PDF ) Practical Asynchronous Distributed Key Reconfiguration and Its Applications Hanwen Feng, Yingzi Gao, Yuan Lu, Qiang Tang, Jing Xu
2025/148 (PDF ) A Comprehensive Formal Security Analysis of OPC UA Vincent Diemunsch, Lucca Hirschi, Steve Kremer
2025/147 (PDF ) Efficient algorithms for the detection of $(N,N)$-splittings and endomorphisms Maria Corte-Real Santos, Craig Costello, Sam Frengley
2025/146 (PDF ) SHIFT SNARE: Uncovering Secret Keys in FALCON via Single-Trace Analysis Jinyi Qiu, Aydin Aysu
2025/145 (PDF ) Breaking RSA with Overclocking-induced GPU Faults Reuven Yakar, Avishai Wool, Eyal Ronen
2025/144 (PDF ) KZH-Fold: Accountable Voting from Sublinear Accumulation George Kadianakis, Arantxa Zapico, Hossein Hafezi, Benedikt Bünz
2025/143 (PDF ) A New Way to Achieve Round-Efficient Asynchronous Byzantine Agreement Simon Holmgaard Kamp
2025/142 (PDF ) hax: Verifying Security-Critical Rust Software using Multiple Provers Karthikeyan Bhargavan, Maxime Buyse, Lucas Franceschino, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters
2025/141 (PDF ) Space-Lock Puzzles and Verifiable Space-Hard Functions from Root-Finding in Sparse Polynomials Nico Döttling, Jesko Dujmovic, Antoine Joux
2025/140 (PDF ) HELP: Everlasting Privacy through Server-Aided Randomness Yevgeniy Dodis, Jiaxin Guan, Peter Hall, Alison Lin
2025/139 (PDF ) Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers Rabiah Alnashwan, Benjamin Dowling, Bhagya Wimalasiri
2025/138 (PDF ) Preprocessing Security of (Nonzero) Short Schnorr Signatures and Hashed ElGamal KEM Jeremiah Blocki, Seunghoon Lee
2025/137 (PDF ) FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs Jonas Bertels, Hilder V. L. Pereira, Ingrid Verbauwhede
2025/136 (PDF ) Computing Isomorphisms between Products of Supersingular Elliptic Curves Pierrick Gaudry, Julien Soumier, Pierre-Jean Spaenlehauer
2025/135 (PDF ) PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies Andrea Basso, Giacomo Borin, Wouter Castryck, Maria Corte-Real Santos, Riccardo Invernizzi, Antonin Leroux, Luciano Maino, Frederik Vercauteren, Benjamin Wesolowski
2025/134 (PDF ) TockOwl: Asynchronous Consensus with Fault and Network Adaptability Minghang Li, Qianhong Wu, Zhipeng Wang, Bo Qin, Bohang Wei, Hang Ruan, Shihong Xiong, Zhenyang Ding
2025/133 (PDF ) Cryptanalysis of an Efficient Signature Based on Isotropic Quadratic Forms Henry Bambury, Phong Q. Nguyen
2025/132 (PDF ) Distributional Private Information Retrieval Ryan Lehmkuhl, Alexandra Henzinger, Henry Corrigan-Gibbs
2025/131 (PDF ) On the Anonymity of Linkable Ring Signatures Xavier Bultel, Charles Olivier-Anclin
2025/130 (PDF ) Symmetric Perceptrons, Number Partitioning and Lattices Neekon Vafa, Vinod Vaikuntanathan
2025/129 (PDF ) DewTwo: a transparent PCS with quasi-linear prover, logarithmic verifier and 4.5KB proofs from falsifiable assumptions Benedikt Bünz, Tushar Mopuri, Alireza Shirzad, Sriram Sridhar
2025/128 (PDF ) Asynchronous YOSO a la Paillier Ivan Bjerre Damgård, Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen
2025/127 (PDF ) A Revision of CROSS Security: Proofs and Attacks for Multi-Round Fiat-Shamir Signatures Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, Giovanni Tognolini
2025/126 (PDF ) Always by Your Side: Constructing Traceable Anonymous Credentials with Hardware-Binding Chang Chen, Guoyu Yang, Qi Chen, Wei Wang, Jin Li
2025/125 (PDF ) Adversarially Robust Bloom Filters: Privacy, Reductions, and Open Problems Hayder Tirmazi
2025/124 (PDF ) GPU Implementations of Three Different Key-Switching Methods for Homomorphic Encryption Schemes Ali Şah Özcan, Erkay Savaş
2025/123 (PDF ) Falcon on ARM Cortex-M4: an Update Thomas Pornin
2025/122 (PDF ) Qelect: Lattice-based Single Secret Leader Election Made Practical Yunhao Wang, Fan Zhang
2025/121 (PDF ) On symbolic computations over arbitrary commutative rings and cryptography with the temporal Jordan-Gauss graphs. Vasyl Ustimenko
2025/120 (PDF ) Module Learning with Errors with Truncated Matrices Katharina Boudgoust, Hannah Keller
2025/119 (PDF ) SoK: PQC PAKEs - Design, Security and Performance Nouri Alnahawi, David Haas, Erik Mauß, Alexander Wiesmaier
2025/118 (PDF ) How to Prove False Statements: Practical Attacks on Fiat-Shamir Dmitry Khovratovich, Ron D. Rothblum, Lev Soukhanov
2025/117 (PDF ) Post-Quantum Online/Offline Signatures Martin R. Albrecht, Nicolas Gama, James Howe, Anand Kumar Narayanan
2025/116 (PDF ) A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS) Jonas Schupp, Georg Sigl
2025/115 (PDF ) Signatures with Tight Adaptive Corruptions from Search Assumptions Keitaro Hashimoto, Wakaha Ogata, Yusuke Sakai
2025/113 (PDF ) Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head James Hsin-Yu Chiang, Ivan Damgård, William R. Duro, Sunniva Engan, Sebastian Kolby, Peter Scholl
2025/112 (PDF ) Post-Quantum Stealth Address Protocols Marija Mikić, Mihajlo Srbakoski, Strahinja Praška
2025/111 (PDF ) On the structure of the Schur squares of Twisted Generalized Reed-Solomon codes and application to cryptanalysis Alain Couvreur, Rakhi Pratihar, Nihan Tanisali, Ilaria Zappatore
2025/110 (PDF ) Verification-efficient Homomorphic Signatures for Verifiable Computation over Data Streams Gaspard Anthoine, Daniele Cozzo, Dario Fiore
2025/109 (PDF ) A Formal Treatment of Homomorphic Encryption Based Outsourced Computation in the Universal Composability Framework Wasilij Beskorovajnov, Sarai Eilebrecht, Yufan Jiang, Jörn Mueller-Quade
2025/108 (PDF ) Subset sum, a new insight Samir Bouftass
2025/107 (PDF ) dCTIDH: Fast & Deterministic CTIDH Fabio Campos, Andreas Hellenbrand, Michael Meyer, Krijn Reijnders
2025/106 (PDF ) NTRU+Sign: Compact NTRU-Based Signatures Using Bimodal Distributions Joo Woo, Jonghyun Kim, Ga Hee Hong, Seungwoo Lee, Minkyu Kim, Hochang Lee, Jong Hwan Park
2025/105 (PDF ) Twist and Shout: Faster memory checking arguments via one-hot addressing and increments Srinath Setty, Justin Thaler
2025/104 (PDF ) Additive Randomized Encodings from Public Key Encryption Nir Bitansky, Saroja Erabelli, Rachit Garg
2025/103 (PDF ) Technology-Dependent Synthesis and Optimization of Circuits for Small S-boxes Zihao Wei, Siwei Sun, Fengmei Liu, Lei Hu, Zhiyu Zhang
2025/102 (PDF ) A practical distinguisher on the full Skyscraper permutation Antoine Bak
2025/101 (PDF ) Unveiling Privacy Risks in Quantum Optimization Services Mateusz Leśniak, Michał Wroński, Ewa Syta, Mirosław Kutyłowski
2025/100 (PDF ) Zero-Knowledge Proofs of Quantumness Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng
2025/099 (PDF ) Adaptive Hardcore Bit and Quantum Key Leasing over Classical Channel from LWE with Polynomial Modulus Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng
2025/098 (PDF ) Fast, private and regulated payments in asynchronous networks Maxence Brugeres, Victor Languille, Petr Kuznetsov, Hamza Zarfaoui
2025/097 (PDF ) Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake Mingfei Zhang, Rujia Li, Xueqian Lu, Sisi Duan
2025/096 (PDF ) Simultaneous-Message and Succinct Secure Computation Elette Boyle, Abhishek Jain, Sacha Servan-Schreiber, Akshayaram Srinivasan
2025/095 (PDF ) Non-Interactive Distributed Point Functions Elette Boyle, Lalita Devadas, Sacha Servan-Schreiber
2025/094 (PDF ) Multi-Key Homomorphic Secret Sharing Geoffroy Couteau, Lalita Devadas, Aditya Hegde, Abhishek Jain, Sacha Servan-Schreiber
2025/093 (PDF ) A Survey on Transciphering and Symmetric Ciphers for Homomorphic Encryption Indranil Thakur, Angshuman Karmakar, Chaoyun Li, Bart Preneel
2025/092 (PDF ) Public-Key Quantum Money From Standard Assumptions (In The Generic Model) Jake Doliskani
2025/091 (PDF ) poqeth: Efficient, post-quantum signature verification on Ethereum Ruslan Kysil, István András Seres, Péter Kutas, Nándor Kelecsényi
2025/090 (PDF ) Friendly primes for efficient modular arithmetic using the Polynomial Modular Number System Fangan Yssouf Dosso, Nadia El Mrabet, Nicolas Méloni, François Palma, Pascal Véron
2025/089 (PDF ) An Introduction to Protein Cryptography Hayder Tirmazi, Tien Phuoc Tran
2025/088 (PDF ) ICT: Insured Cryptocurrency Transactions Aydin Abadi, Amirreza Sarencheh, Henry Skeoch, Thomas Zacharias
2025/087 (PDF ) On Gaussian Sampling for $q$-ary Lattices and Linear Codes with Lee Weight Maiara F. Bollauf, Maja Lie, Cong Ling
2025/086 (PDF ) Artificial Results From Hardware Synthesis Ahmed Alharbi, Charles Bouillaguet
2025/085 (PDF ) Enhancing Threshold Group Action Signature Schemes: Adaptive Security and Scalability Improvements Michele Battagliola, Giacomo Borin, Giovanni Di Crescenzo, Alessio Meneghetti, Edoardo Persichetti
2025/084 (PDF ) Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity Yijia Chang, Songze Li
2025/083 (PDF ) Recover from Excessive Faults in Partially-Synchronous BFT SMR Tiantian Gong, Gustavo Franco Camilo, Kartik Nayak, Andrew Lewis-Pye, Aniket Kate
2025/082 (PDF ) Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer Qingliang Hou, Kuntong Li, Guoyan Zhang, Yanzhao Shen, Qidi You, Xiaoyang Dong
2025/081 (PDF ) Integer Commitments, Old and New Tools Iftach Haitner, Yehuda Lindell, Nikolaos Makriyannis
2025/080 (PDF ) Breaking verifiability and vote privacy in CHVote Véronique Cortier, Alexandre Debant, Pierrick Gaudry
2025/079 (PDF ) Exploring side-channels in Intel Trust Domain Extensions Upasana Mandal, Shubhi Shukla, Nimish Mishra, Sarani Bhattacharya, Paritosh Saxena, Debdeep Mukhopadhyay
2025/078 (PDF ) Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol Yevgeniy Dodis, Daniel Jost, Shuichi Katsumata, Thomas Prest, Rolfe Schmidt
2025/077 (PDF ) On Multi-Key FuncCPA Secure Encryption Schemes Eri Nakajima, Keisuke Hara, Kyosuke Yamashita
2025/076 (PDF ) Decompose and conquer: ZVP attacks on GLV curves Vojtěch Suchánek, Vladimír Sedláček, Marek Sýs
2025/075 (PDF ) Further Improvements in AES Execution over TFHE: Towards Breaking the 1 sec Barrier Sonia Belaïd, Nicolas Bon, Aymen Boudguiga, Renaud Sirdey, Daphné Trama, Nicolas Ye
2025/074 (PDF ) XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering Chao Niu, Zhicong Huang, Zhaomin Yang, Yi Chen, Liang Kong, Cheng Hong, Tao Wei
2025/073 (PDF ) Conditional Constant Function Problem and Its Quantum Solutions: Attacking Feistel Ciphers Zhenqiang Li, Shuqin Fan, Fei Gao, Yonglin Hao, Xichao Hu, Linchun Wan, Hongwei Sun, Qi Su
2025/072 (PDF ) PSMT: Private Segmented Membership Test for Distributed Record Linkage Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Sam Martin, Taeho Jung
2025/071 (PDF ) The HHE Land: Exploring the Landscape of Hybrid Homomorphic Encryption Hossein Abdinasibfar, Camille Nuoskala, Antonis Michalas
2025/070 (PDF ) Beyond Optimal Fault-Tolerance Andrew Lewis-Pye, Tim Roughgarden
2025/069 (PDF ) On Composing Generic Voting Schemes for Improved Privacy Oskar Goldhahn
2025/068 (PDF ) Shielded CSV: Private and Efficient Client-Side Validation Jonas Nick, Liam Eagen, Robin Linus
2025/067 (PDF ) Constant latency and finality for dynamically available DAG Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu
2025/066 (PDF ) Efficient Homomorphic Integer Computer from CKKS Jaehyung Kim
2025/065 (PDF ) Morgana: a laconic circuit builder Lev Soukhanov, Yaroslav Rebenko
2025/064 (PDF ) SoK: Trusted setups for powers-of-tau strings Faxing Wang, Shaanan Cohney, Joseph Bonneau
2025/063 (PDF ) Enabling Puncturable Encrypted Search over Lattice for Privacy-Preserving in Mobile Cloud Yibo Cao, Shiyuan Xu, Gang Xu, Xiu-Bo Chen, Zongpeng Li, Jiawen Kang, Dusit Niyato
2025/062 (PDF ) Treating dishonest ciphertexts in post-quantum KEMs -- explicit vs. implicit rejection in the FO transform Kathrin Hövelmanns, Mikhail Kudinov
2025/061 (PDF ) CAPSS: A Framework for SNARK-Friendly Post-Quantum Signatures Thibauld Feneuil, Matthieu Rivain
2025/060 (PDF ) SoK: Multiparty Computation in the Preprocessing Model Shuang Sun, Eleftheria Makri
2025/059 (PDF ) Fair Signature Exchange Hossein Hafezi, Aditi Partap, Sourav Das, Joseph Bonneau
2025/058 (PDF ) Skyscraper-v2: Fast Hashing on Big Primes Clémence Bouvier, Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Fabian Schmid, Markus Schofnegger
2025/057 (PDF ) Trustless Bridges via Random Sampling Light Clients Bhargav Nagaraja Bhatt, Fatemeh Shirazi, Alistair Stewart
2025/056 (PDF ) A Unified Key Recovery Framework for Impossible Boomerang Attacks: Applications to Full-Round-ARADI and SKINNYe v2 Xichao Hu, Lin Jiao, Dengguo Feng, Yongqiang Li, Senpeng Wang, Yonglin Hao, Xinxin Gong
2025/055 (PDF ) Hash-Based Multi-Signatures for Post-Quantum Ethereum Justin Drake, Dmitry Khovratovich, Mikhail Kudinov, Benedikt Wagner
2025/054 (PDF ) Doubly Efficient Fuzzy Private Set Intersection for High-dimensional Data with Cosine Similarity Hyunjung Son, Seunghun Paik, Yunki Kim, Sunpill Kim, Heewon Chung, Jae Hong Seo
2025/053 (PDF ) Founding Zero-Knowledge Proofs of Training on Optimum Vicinity Gefei Tan, Adrià Gascón, Sarah Meiklejohn, Mariana Raykova, Xiao Wang, Ning Luo
2025/052 (PDF ) Separating Broadcast from Cheater Identification Yashvanth Kondi, Divya Ravi
2025/051 (PDF ) Black-Box Registered ABE from Lattices Ziqi Zhu, Kai Zhang, Zhili Chen, Junqing Gong, Haifeng Qian
2025/050 (PDF ) Cryptojacking detection using local interpretable model-agnostic explanations Elodie Ngoie Mutombo, Mike Wa Nkongolo, Mahmut Tokmak
2025/049 (PDF ) On the gap between terms in an addition chain Theophilus Agama
2025/048 (PDF ) ABLE: Optimizing Mixed Arithmetic and Boolean Garbled Circuit Jianqiao Cambridge Mo, Karthik Garimella, Austin Ebel, Brandon Reagen
2025/047 (PDF ) Time-Lock Puzzles from Lattices Shweta Agrawal, Giulio Malavolta, Tianwei Zhang
2025/046 (PDF ) The Meta-Complexity of Secret Sharing Benny Applebaum, Oded Nir
2025/045 (PDF ) IND-CPA$^{\text{C}}$: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption Bhuvnesh Chaturvedi, Anirban Chakraborty, Nimish Mishra, Ayantika Chatterjee, Debdeep Mukhopadhyay
2025/044 (PDF ) Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE Jeffrey Champion, Yao-Ching Hsieh, David J. Wu
2025/043 (PDF ) SoK: Time to be Selfless?! Demystifying the Landscape of Selfish Mining Strategies and Models Colin Finkbeiner, Mohamed E. Najd, Julia Guskind, Ghada Almashaqbeh
2025/042 (PDF ) Structural Results for Maximal Quaternion Orders and Connecting Ideals of Prime Power Norm in $B_{p,\infty}$ James Clements
2025/041 (PDF ) Keyed-Verification Anonymous Credentials with Highly Efficient Partial Disclosure Omid Mirzamohammadi, Jan Bobolz, Mahdi Sedaghat, Emad Heydari Beni, Aysajan Abidin, Dave Singelee, Bart Preneel
2025/040 (PDF ) Bundled Authenticated Key Exchange: A Concrete Treatment of (Post-Quantum) Signal's Handshake Protocol Keitaro Hashimoto, Shuichi Katsumata, Thom Wiggers
2025/039 (PDF ) VDORAM: Towards a Random Access Machine with Both Public Verifiability and Distributed Obliviousness Huayi Qi, Minghui Xu, Xiaohua Jia, Xiuzhen Cheng
2025/038 (PDF ) Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains Zhongtang Luo, Yanxue Jia, Alejandra Victoria Ospina Gracia, Aniket Kate
2025/037 (PDF ) Forking the RANDAO: Manipulating Ethereum's Distributed Randomness Beacon Ábel Nagy, János Tapolcai, István András Seres, Bence Ladóczki
2025/036 (PDF ) Scalable Post-Quantum Oblivious Transfers for Resource-Constrained Receivers Aydin Abadi, Yvo Desmedt
2025/035 (PDF ) All-You-Can-Compute: Packed Secret Sharing for Combined Resilience Sebastian Faust, Maximilian Orlt, Kathrin Wirschem, Liang Zhao
2025/034 (PDF ) ZODA: Zero-Overhead Data Availability Alex Evans, Nicolas Mohnblatt, Guillermo Angeris
2025/033 (PDF ) Parametrizing Maximal Orders Along Supersingular $\ell$-Isogeny Paths Laia Amorós, James Clements, Chloe Martindale
2025/032 (PDF ) A New Paradigm for Server-Aided MPC Alessandra Scafuro, Tanner Verber
2025/031 (PDF ) Round-Optimal Compiler for Semi-Honest to Malicious Oblivious Transfer via CIH Varun Madathil, Alessandra Scafuro, Tanner Verber
2025/030 (PDF ) Delegated Multi-party Private Set Intersection from Secret Sharing Jingwei Hu, Zhiqi Liu, Cong Zuo
2025/029 (PDF ) Highly Efficient Server-Aided Multiparty Subfield VOLE Distribution Protocol Dongyu Wu
2025/028 (PDF ) Extending Groth16 for Disjunctive Statements Xudong Zhu, Xinxuan Zhang, Xuyang Song, Yi Deng, Yuanju Wei, Liuyu Yang
2025/027 (PDF ) Constant time lattice reduction in dimension 4 with application to SQIsign Otto Hanyecz, Alexander Karenin, Elena Kirshanova, Péter Kutas, Sina Schaeffler
2025/026 (PDF ) How to use your brain for cryptography without trustworthy machines Wakaha Ogata, Toi Tomita, Kenta Takahashi, Masakatsu Nishigaki
2025/025 (PDF ) Chosen-Ciphertext Security for Functional Encryption with Multiple Users: Definitions and Generic Concrete Constructions Ky Nguyen
2025/024 (PDF ) Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited Olivier Blazy, Philippe Gaborit, Philippe Krejci, Cristina Onete
2025/023 (PDF ) Cryptography is Rocket Science: Analysis of BPSec Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri
2025/022 (PDF ) Leveled Functional Bootstrapping via External Product Tree Zhihao Li, Xuan Shen, Xianhui Lu, Ruida Wang, Yuan Zhao, Zhiwei Wang, Benqiang Wei
2025/021 (PDF ) Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem Thomas Johansson, Mustafa Khairallah, Vu Nguyen
2025/020 (PDF ) ProbeShooter: A New Practical Approach for Probe Aiming Daehyeon Bae, Sujin Park, Minsig Choi, Young-Giu Jung, Changmin Jeong, Heeseok Kim, Seokhie Hong
2025/019 (PDF ) Foundations of Platform-Assisted Auctions Hao Chung, Ke Wu, Elaine Shi
2025/018 (PDF ) On the Independence Assumption in Quasi-Cyclic Code-Based Cryptography Maxime Bombar, Nicolas Resch, Emiel Wiedijk
2025/017 (PDF ) New Quantum Cryptanalysis of Binary Elliptic Curves (Extended Version) Kyungbae Jang, Vikas Srivastava, Anubhab Baksi, Santanu Sarkar, Hwajeong Seo
2025/016 (PDF ) Dynamically Available Common Subset Yuval Efron, Ertem Nusret Tas
2025/015 (PDF ) A New Method for Solving Discrete Logarithm Based on Index Calculus Jianjun HU
2025/014 (PDF ) SPY-PMU: Side-Channel Profiling of Your Performance Monitoring Unit to Leak Remote User Activity Md Kawser Bepary, Arunabho Basu, Sajeed Mohammad, Rakibul Hassan, Farimah Farahmandi, Mark Tehranipoor
2025/013 (PDF ) Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms José Reis, Mehmet Ugurbil, Sameer Wagh, Ryan Henry, Miguel de Vega
2025/012 (PDF ) Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell Wouter Legiest, Jan-Pieter D'Anvers, Bojan Spasic, Nam-Luc Tran, Ingrid Verbauwhede
2025/011 (PDF ) DL-SCADS: Deep Learning-Based Post-Silicon Side-Channel Analysis Using Decomposed Signal Dipayan Saha, Farimah Farahmandi
2025/010 (PDF ) A Combinatorial Approach to IoT Data Security Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar
2025/009 (PDF ) Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust Merve Karabulut, Reza Azarderakhsh
2025/008 (PDF ) A Survey of Interactive Verifiable Computing: Utilizing Randomness in Low-Degree Polynomials Angold Wang
2025/007 (PDF ) Non Linearizable Entropic Operator Daniel Nager
2025/006 (PDF ) Nearly Quadratic Asynchronous Distributed Key Generation from Recursive Consensus Ittai Abraham, Renas Bacho, Julian Loss, Gilad Stern
2025/005 (PDF ) What is "legal" and "illegal?": Social Norms, Current Practices and Perceived Risks among the Cryptocurrency Users in Bangladesh Tanusree Sharma, Atm Mizanur Rahman, Silvia Sandhi, Yang Wang, Rifat Shahriyar, S M Taiabul Haque
2025/004 (PDF ) Smaug: Modular Augmentation of LLVM for MPC Radhika Garg, Xiao Wang
2025/003 (PDF ) Post-Quantum DNSSEC with Faster TCP Fallbacks Aditya Singh Rawat, Mahabir Prasad Jhanwar
2025/002 (PDF ) Voting with coercion resistance and everlasting privacy using linkable ring signatures Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou
2025/001 (PDF ) Attribute Based Encryption for Turing Machines from Lattices Shweta Agrawal, Simran Kumari, Shota Yamada
[ Cryptology ePrint archive ]