


default search action
IACR Communications in Cryptology, Volume 2
Volume 2, Number 1, 2025
- Daniele Micciancio
:
Fully Composable Homomorphic Encryption. 1 - Sanjay Bhattacherjee
, Julio César Hernández Castro
, Jack Moyler
:
A Greedy Global Framework for Lattice Reduction Using Deep Insertions. 2 - Alex B. Grilo
, Philippe Lamontagne
:
The Round Complexity of Proofs in the Bounded Quantum Storage Model. 3 - Sonia Belaïd
, Gaëtan Cassiers
, Camille Mutschler, Matthieu Rivain
, Thomas Roche, François-Xavier Standaert
, Abdul Rahman Taleb
:
SoK: A Methodology to Achieve Provable Side-Channel Security in Real-World Implementations. 4 - Vipul Goyal, Giulio Malavolta
, Bhaskar Roberts
:
Unconditional Quantum Cryptography with a Bounded Number of Keys. 5 - Arthur Herlédan Le Merdy
, Benjamin Wesolowski
:
The supersingular endomorphism ring problem given one endomorphism. 6 - Thomas Lavaur
, Jérôme Lacan
:
Boomy: Batch Opening Of Multivariate polYnomial commitment. 7 - Jonathan Katz
, Antoine Urban
:
Honest-Majority Threshold ECDSA with Batch Generation of Key-Independent Presignatures. 8 - Kamil Kluczniak
, Giacomo Santato
:
On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption. 9 - Alishah Chator, Matthew Green, Pratyush Ranjan Tiwari:
SoK: Privacy-Preserving Signatures. 10 - Iftach Haitner
, Gil Segev
:
Tighter Concrete Security for the Simplest OT. 11 - Ruth Ng, Alexander Hoover
, David Cash
, Eileen Ee:
Structured Encryption for Indirect Addressing. 12 - Justin Drake, Dmitry Khovratovich
, Mikhail A. Kudinov
, Benedikt Wagner
:
Hash-Based Multi-Signatures for Post-Quantum Ethereum. 13 - Lior Rotem:
Goldreich-Krawczyk Revisited: A Note on the Zero Knowledge of Proofs of Knowledge. 14 - Christophe Levrat
, Tanguy Medevielle
, Jade Nardi
:
A divide-and-conquer sumcheck protocol. 15 - Gil Segev
:
Bulletproofs for R1CS: Bridging the Completeness-Soundness Gap and a ZK Extension. 16 - Quentin Edme, Pierre-Alain Fouque
, André Schrottenloher
:
Faster Quantum Algorithms for MQ2 and Applications. 17 - Victor Shoup
:
The many faces of Schnorr: a toolkit for the modular design of threshold Schnorr signatures. 18 - Falko Strenzke
, Johannes Roth
:
Legacy Encryption Downgrade Attacks against LibrePGP and CMS. 19 - Chris Brzuska, Sébastien Canard, Caroline Fontaine, Duong Hieu Phan, David Pointcheval, Marc Renard, Renaud Sirdey:
Relations Among New CCA Security Notions for Approximate FHE. 20 - Madalina Bolboceanu, Anamaria Costache, Erin Hales, Rachel Player
, Miruna Rosca, Radu Titiu:
Designs for practical SHE schemes based on Ring-LWR. 21 - Aloni Cohen
, David Bruce Cousins
, Nicholas Genise
, Erik Kline
, Yuriy Polyakov
, Saraswathy RV
:
HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security. 22 - Michele Orrù
, George Kadianakis, Mary Maller, Greg Zaverucha
:
Beyond the Circuit: How to minimize foreign arithmetic in ZKP circuits. 23 - Chen Lotan
, Moni Naor
:
Adversarially Robust Bloom Filters: Monotonicity and Betting. 24 - Kyungbae Jang
, Anubhab Baksi
, Hyunji Kim
, Gyeongju Song
, Hwajeong Seo
, Anupam Chattopadhyay
:
Quantum Analysis of AES. 25 - Krishna Sai Tarun Ramapragada
, Utsav Banerjee
:
Fast Plaintext-Ciphertext Matrix Multiplication from Additively Homomorphic Encryption. 26 - Chengyu Lin, Zeyu Liu, Peihan Miao, Max Tromanhauser:
Finding Balance in Unbalanced PSI: A New Construction from Single-Server PIR. 27 - Subhranil Dutta
, Tapas Pal
, Amit Kumar Singh
, Sourav Mukhopadhyay
:
Fully Collusion Resistant Traceable Identity-Based Inner Product Functional Encryption. 28 - Pierrick Méaux
, Qingju Wang
:
Towards a Generalization of the Algebraic Attack on Stream Ciphers: A Study of the Case with Only Extremal-Degree Monomials. 29 - David Jacquemin
, Anisha Mukherjee
, Ahmet Can Mert
, Sujoy Sinha Roy
:
Accelerating Isogeny Walks for VDF Evaluation. 30 - Charles Bouillaguet
, Claire Delaplace
, Mickaël Hamdad:
The May-Ozerov Algorithm for Syndrome Decoding is "Galactic". 31 - Dorian Llavata, Eleonora Cagli, Rémi Eyraud, Vincent Grosso, Lilian Bossuet:
Unsupervised Horizontal Attacks against Public-Key Primitives with DCCA: - From Deep Canonical Correlation Analysis to Deep Collision Correlation Attacks -. 32 - Martin Ekerå
, Joel Gärtner
:
A high-level comparison of state-of-the-art quantum algorithms for breaking asymmetric cryptography. 33 - Vincent Grosso
, François-Xavier Standaert
:
Algebraic Side-Channel Attacks against ISAP's Re-Keying: one Ascon Round May not be Enough for Serial Implementations. 34 - Simon-Philipp Merz
, Kenneth G. Paterson
, Àlex Rodríguez García:
Breaking BASS. 35 - Jean Belo Klamti
, M. Anwarul Hasan
, Koray Karabina
:
Efficient Methods for Simultaneous Homomorphic Inversion. 36 - Sonu Jha
, Shun Li
, Danilo Gligoroski
:
Construction of Hadamard-based MixColumns Matrices Resistant to Related-Differential Cryptanalysis. 37 - Zachary Espiritu
, Seny Kamara
, Tarik Moataz
:
Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Cryptography. 38 - Sonia Belaïd
, Nicolas Bon, Aymen Boudguiga, Renaud Sirdey
, Daphné Trama, Nicolas Ye:
Further Improvements in AES Execution over TFHE. 39 - Viet Sang Nguyen
, Vincent Grosso
, Pierre-Louis Cayrel
:
Practical Persistent Fault Attacks on AES with Instruction Skip. 40
Volume 2, Number 2, 2025
- Arantxa Zapico
, Ariel Gabizon, Dmitry Khovratovich
, Mary Maller, Carla Ràfols:
Baloo: Algebraic Lookup Arguments. 1 - Andrew Mendelsohn
, Charles Grover, Cong Ling
:
On the Security of Group Ring Learning with Errors. 2 - Anisha Mukherjee
, Sujoy Sinha Roy
:
Revisiting Module Lattice-based Homomorphic Encryption and Application to Secure-MPC. 3 - Lucas Piske
, Jeroen van de Graaf
, Anderson C. A. Nascimento
, Ni Trieu
:
Shared OT and Its Applications. 4 - Venkata Koppula
, Abhinav Kumar, Mahesh Sreekumar Rajasree
, Harihar Swaminathan:
Incompressible Encryption Beyond CPA/CCA Security. 5 - Debadrita Talapatra
, Sikhar Patranabis
, Debdeep Mukhopadhyay
:
Highly Scalable Searchable Symmetric Encryption for Boolean Queries from NTRU Lattice Trapdoors. 6 - Dennis Faut
, Valerie Fetzer
, Jörn Müller-Quade, Markus Raiber
, Andy Rupp
:
POBA: Privacy-Preserving Operator-Side Bookkeeping and Analytics. 7 - Jean-Philippe Bossuat
, Anamaria Costache
, Christian Mouchet
, Lea Nürnberger
, Juan Ramón Troncoso-Pastoriza
:
Accurate and Composable Noise Estimates for CKKS with Application to Exact HE Computation. 8 - Alessandro Budroni
, Jesús-Javier Chi-Domínguez
, Ermes Franch
:
Don't Use It Twice: Reloaded! On the Lattice Isomorphism Group Action. 9 - Zehou Wu
:
Circular Insecure Encryption: from Long Cycles to Short Cycles. 10 - Ashwin Jha
:
On TRP-RF Switch in the Quantum Query Model. 11 - Koki Matsui, Shoma Kanzaki, Wakaha Ogata
, Keitaro Hashimoto
:
Round-Optimal Authenticated Key Exchange with Full Forward Privacy. 12 - Karim Baghery
, Navid Ghaedi Bardeh
, Shahram Khazaei
, Mahdi Rahimi
:
On Round-Optimal Computational VSS. 13 - Andrea Lesavourey
, Kazuhide Fukushima
, Thomas Plantard
, Arnaud Sipasseuth
:
Diagonally dominant matrices for cryptography. 14 - Deng Tang
, Anupam Chattopadhyay
, Manmatha Roy
, Bimal Mandal
, Subhamoy Maitra
:
Construction of Maiorana-McFarland type cryptographically significant Boolean functions with good implementation properties. 15 - Yanbo Chen
:
Round-Efficient Adaptively Secure Threshold Signatures with Rewinding. 16 - Jaehyung Kim
, Taeyeong Noh
:
Modular Reduction in CKKS. 17 - Yincen Chen
, Qinggan Fu
, Ning Zhao
, Jiahao Zhao
, Ling Song
, Qianqian Yang
:
A Holistic Framework for Impossible Boomerang Attacks. 18 - Juliane Krämer
, Patrick Struck
, Maximiliane Weishäupl:
Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC. 19 - Daniël M. H. van Gent
, Ludo N. Pulles
:
HAWK: Having Automorphisms Weakens Key. 20 - Sébastien Canard, Nathan Papon, Duong Hieu Phan
:
Public Traceability in Threshold Decryption. 21 - Maiara F. Bollauf
, Roberto Parisella
, Janno Siim
:
Revisiting Discrete Logarithm Reductions. 22 - Rafael Carrera Rodriguez
, Florent Bruguier
, Emanuele Valea
, Pascal Benoit
:
Cracking the Mask: SASCA Against Local-Masked NTT for CRYSTALS-Kyber. 23 - John Kelsey
, Nathalie Lang
, Stefan Lucks
:
Turning Hash-Based Signatures into Distributed Signatures and Threshold Signatures: Delegate Your Signing Capability, and Distribute it Among Trustees. 24 - Ye Xu
, Takashi Nishide
:
Lattice-based Multi-key Homomorphic Signatures Forward-unforgeable against Signing Key Leakage. 25 - Nicolas Vallet
, Pierre-Louis Cayrel
, Brice Colombier
, Vlad-Florin Dragoi
, Vincent Grosso
:
Optimizing Key Recovery in Classic McEliece: Advanced Error Correction for Noisy Side-Channel Measurements. 26 - Shihui Fu
:
Improved Constant-Sized Polynomial Commitment Schemes Without Trusted Setup. 27 - Nilanjan Datta
, Avijit Dutta
, Sougata Mandal
, Hrithik Nandi
:
Sequential Indifferentiability of STH and EDM. 28 - Giacomo Pope
, Krijn Reijnders
, Damien Robert
, Alessandro Sferlazza
, Benjamin Smith
:
Simpler and Faster Pairings from the Montgomery Ladder. 29

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.