


default search action
IACR Cryptology ePrint Archive, Volume 2017
Volume 2017, 2017
- Jorge Luis Villar:
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems. 1 - (Withdrawn) Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Application to Authenticated Encryption. 2
- Mike Hamburg:
The STROBE protocol framework. 3 - Sungwook Kim, Jinsu Kim, Jae Hong Seo:
A New Approach for Practical Function-Private Inner Product Encryption. 4 - Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi:
High-speed Hardware Implementations of Point Multiplication for Binary Edwards and Generalized Hessian Curves. 5 - Eduardo Ruiz Duarte:
Reduced Mumford divisors of a genus 2 curve through its jacobian function field. 6 - Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk:
Algebraic Attack Efficiency versus S-box Representation. 7 - Joshua Gancher, Adam Groce, Alex Ledger:
Externally Verifiable Oblivious RAM. 8 - Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi:
Access Control Encryption for Equality, Comparison, and More. 9 - Wutichai Chongchitmate, Rafail Ostrovsky:
Circuit-Private Multi-Key FHE. 10 - Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures. 11 - Venkata Koppula, Andrew Poelstra, Brent Waters:
Universal Samplers with Fast Verification. 12 - Meilof Veeningen:
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation. 13 - Tommaso Gagliardoni, Nikolaos P. Karvelas, Stefan Katzenbeisser:
ORAMs in a Quantum World. 14 - Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi:
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes. 15 - Yevgeniy Dodis, Jonathan Katz, John P. Steinberger, Aishwarya Thiruvengadam, Zhe Zhang:
Provable Security of Substitution-Permutation Networks. 16 - Gottfried Herold, Elena Kirshanova:
Improved Algorithms for the Approximate k-List Problem in Euclidean Norm. 17 - Nir Bitansky:
Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs. 18 - Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena:
SMART POOL : Practical Decentralized Pooled Mining. 19 - Olivier Levillain, Maxence Tury, Nicolas Vivet:
concerto: A Methodology Towards Reproducible Analyses of TLS Datasets. 20 - Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters:
A Generic Approach to Constructing and Proving Verifiable Random Functions. 21 - Jan Camenisch, Anja Lehmann:
Privacy for Distributed Databases via (Un)linkable Pseudonyms. 22 - Nuttapong Attrapadung:
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits. 23 - Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann:
Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases. 24 - Charanjit S. Jutla, Arnab Roy:
Improved Structure Preserving Signatures under Standard Bilinear Assumptions. 25 - Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam:
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. 26 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
Scalable Multi-Party Private Set-Intersection. 27 - (Withdrawn) A Decentralized PKI In A Mobile Ecosystem. 28
- Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich:
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions. 29 - Jonathan Katz, Samuel Ranellucci, Xiao Wang:
Authenticated Garbling and Communication-Efficient, Constant-Round, Secure Two-Party Computation. 30 - Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache:
Honey Encryption for Language. 31 - Mohamed Sabt, Jacques Traoré:
Cryptanalysis of GlobalPlatform Secure Channel Protocols. 32 - Peter Pessl:
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures. 33 - Alex Biryukov, Aleksei Udovenko, Vesselin Velichkov:
Analysis of the NORX Core Permutation. 34 - Hervé Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, Emmanuel Prouff:
Privacy-Preserving Classification on Deep Neural Network. 35 - Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan:
Low-Complexity Cryptographic Hash Functions. 36 - Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange:
Double-base scalar multiplication revisited. 37 - Fabrice Benhamouda, Florian Bourse, Helger Lipmaa:
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions. 38 - Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Preneel:
PePTCAP: A Privacy-enhancing Protocol for(Temporary) Car Access Provision. 39 - Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Practical Non-Malleable Codes from ℓ-more Extractable Hash Functions. 40 - Yongge Wang, Qutaibah M. Malluhi:
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy. 41 - Yuanxi Dai, Yannick Seurin, John P. Steinberger, Aishwarya Thiruvengadam:
Five Rounds are Sufficient and Necessary for the Indifferentiability of Iterated Even-Mansour. 42 - Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov:
Accumulators with Applications to Anonymity-Preserving Revocation. 43 - Matthew McKague, David M. Eyers:
Anonymous contribution of data. 44 - Essam Ghadafi:
Efficient Round-Optimal Blind Signatures in the Standard Model. 45 - Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade:
Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption. 46 - Martin R. Albrecht:
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL. 47 - Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun:
ROTE: Rollback Protection for Trusted Execution. 48 - Rachid El Bansarkhani:
LARA - A Design Concept for Lattice-based Encryption. 49 - Peter T. Breuer:
An Obfuscating Compiler. 50 - Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
A note on VRFs from Verifiable Functional Encryption. 51 - Boris Skoric:
A short note on the security of Round-Robin Differential Phase-Shift QKD. 52 - Dimitar Jetchev, Benjamin Wesolowski:
Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem. 53 - Javier Herranz:
Attribute-Based Encryption Implies Identity-Based Encryption. 54 - Prabhat Kushwaha, Ayan Mahalanobis:
A Probabilistic Baby-Step Giant-Step Algorithm. 55 - Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti:
Verifiable Classroom Voting in Practice. 56 - Mathias Wagner, Stefan Heyse:
Single-Trace Template Attack on the DES Round Keys of a Recent Smart Card. 57 - Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells:
WalnutDSA(TM): A Quantum Resistant Group Theoretic Digital Signature Algorithm. 58 - Kamalesh Acharya, Ratna Dutta:
Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext. 59 - Jacqueline Brendel, Marc Fischlin:
Zero Round-Trip Time for the Extended Access Control Protocol. 60 - Tibor Jager, Rafael Kurek:
Continuous Collision Resistance and its Applications. 61 - Arash Afshar, Payman Mohassel, Mike Rosulek:
Efficient Maliciously Secure Two Party Computation for Mixed Programs. 62 - Chaya Ganesh, Arpita Patra:
Optimal Extension Protocols for Byzantine Broadcast and Agreement. 63 - Yin Li, Yu Zhang:
Fast Montgomery-like Square Root Computation for All Trinomials. 64 - Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint:
FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime. 65 - Seiko Arita, Sari Handa:
Subring Homomorphic Encryption. 66 - Thorsten Kleinjung, Claus Diem, Arjen K. Lenstra, Christine Priplata, Colin Stahlke:
Computation of a 768-bit prime field discrete logarithm. 67 - Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam:
Authenticated Encryption in the Face of Protocol and Side Channel Leakage. 68 - Peter Gazi, Krzysztof Pietrzak, Michal Rybár:
The Exact Security of PMAC. 69 - Charlie Jacomme, Steve Kremer, Guillaume Scerri:
Symbolic Models for Isolated Execution Environments. 70 - Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers. 71 - Carmen Kempka, Ryo Kikuchi, Koutarou Suzuki:
How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes. 72 - Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee:
Visual Honey Encryption: Application to Steganography. 73 - Joo-Im Kim, Ji Won Yoon:
Honey Chatting: A novel instant messaging system robust to eavesdropping over communication. 74 - Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques Fournier, Renaud Sirdey:
A First DFA on PRIDE: from Theory to Practice (extended version). 75 - Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey:
DFA on LS-Designs with a Practical Implementation on SCREAM (extended version). 76 - Martin Ekerå, Johan Håstad:
Quantum algorithms for computing short discrete logarithms and factoring RSA integers. 77 - Andre Esser, Robert Kübler, Alexander May:
LPN Decoded. 78 - Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim:
Faster Bootstrapping of FHE over the Integers. 79 - Ilan Komargodski, Gil Segev:
From Minicrypt to Obfustopia via Private-Key Functional Encryption. 80 - Ivo Kubjas, Tiit Pikma, Jan Willemson
:
Estonian Voting Verification Mechanism Revisited Again. 81 - Marc Fischlin, Felix Günther:
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates. 82 - Anna Johnston:
Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders. 83 - Laszlo Hars:
Hardware Bit-Mixers. 84 - Laszlo Hars:
Information Security Applications of Bit-Mixers. 85 - David Derler, Sebastian Ramacher, Daniel Slamanig:
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation. 86 - Sabyasachi Dey, Santanu Sarkar:
Cryptanalysis of full round Fruit. 87 - Subhamoy Maitra, Akhilesh Siddhanti:
A Differential Fault Attack on Plantlet. 88 - Yuri L. Borissov, Peter G. Boyvalenkov, Robert Tsenkov:
On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes. 89 - Saiyu Qi, Yichen Li, Yuanqing Zheng, Yong Qi:
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud. 90 - Vincent Herbert, Caroline Fontaine:
Software Implementation of 2-Depth Pairing-based Homomorphic Encryption Scheme. 91 - Atsushi Takayasu, Yao Lu, Liqiang Peng:
Small CRT-Exponent RSA Revisited. 92 - Vasyl Ustimenko:
On new multivariate cryptosystems based on hidden Eulerian equations over finite fields. 93 - Shalev Ben-David, Or Sattath:
Quantum Tokens for Digital Signatures. 94 - Gunnar Hartung:
Attacks on Secure Logging Schemes. 95 - Shota Yamada:
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques. 96 - Claude Carlet, Pierrick Méaux, Yann Rotella:
Boolean functions with restricted input and their robustness; application to the FLIP cipher. 97 - Vanesa Daza, Nikolaos Makriyannis:
Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions. 98 - Dimitrios Papadopoulos, Duane Wessels, Shumon Huque, Moni Naor, Jan Vcelák, Leonid Reyzin, Sharon Goldberg:
Can NSEC5 be practical for DNSSEC deployments? 99 - Dan Boneh, Sam Kim, Hart William Montgomery:
Private Puncturable PRFs From Standard Lattice Assumptions. 100 - Jérémy Jean, Thomas Peyrin, Siang Meng Sim:
Optimizing Implementations of Lightweight Building Blocks. 101 - Serge Fehr, Louis Salvail:
Quantum Authentication and Encryption with Key Recycling. 102 - Hannes Groß, Stefan Mangard:
Reconciling d+1Masking in Hardware and Software. 103 - Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz:
Implementing BP-Obfuscation Using Graph-Induced Encoding. 104 - Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan:
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. 105 - Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun:
μchain: How to Forget without Hard Forks. 106 - Erik-Oliver Blass, Guevara Noubir:
Secure Logging with Crash Tolerance. 107 - Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Photonic Side Channel Attacks Against RSA. 108 - Yevgeniy Dodis, Dario Fiore:
Unilaterally-Authenticated Key Exchange. 109 - Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
A Smart Contract for Boardroom Voting with Maximum Voter Privacy. 110 - Jonathan Burns, Daniel Moore, Katrina Ray, Ryan Speers, Brian Vohaska:
EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves. 111 - Xavier Bultel, Pascal Lafourcade:
Zero-Knowledge Proxy Re-Identification Revisited. 112 - Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl:
Algebraic Fault Analysis of SHA-3. 113 - Itay Berman, Ron D. Rothblum, Vinod Vaikuntanathan:
Zero-Knowledge Proofs of Proximity. 114 - Sietse Ringers, Eric R. Verheul, Jaap-Henk Hoepman:
An efficient self-blindable attribute-based credential scheme. 115 - Vincent Grosso, François-Xavier Standaert:
Masking Proofs are Tight (and How to Exploit it in Security Evaluations). 116 - Zhaohui Cheng:
The SM9 Cryptographic Schemes. 117 - Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:
A New Structural-Differential Property of 5-Round AES. 118 - Christopher Portmann:
Quantum Authentication with Key Recycling. 119 - Rishab Goyal, Venkata Koppula, Brent Waters:
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption. 120 - David Kohel:
Twisted μ4-normal form for elliptic curves. 121 - Vadim Lyubashevsky, Gregory Neven:
One-Shot Verifiable Encryption from Lattices. 122 - Rishab Goyal, Venkata Koppula, Brent Waters:
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. 123 - Sanjam Garg
, Susumu Kiyoshima, Omkant Pandey:
On the Exact Round Complexity of Self-Composable Two-Party Computation. 124 - Payman Mohassel, Mike Rosulek:
Non-Interactive Secure 2PC in the Offline/Online and Batch Settings. 125 - Seny Kamara, Tarik Moataz:
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity. 126 - Prabhanjan Ananth, Aayush Jain, Amit Sahai:
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption. 127 - Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo:
New Collision Attacks on Round-Reduced Keccak. 128 - Payman Mohassel, Mike Rosulek, Alessandra Scafuro:
Sublinear Zero-Knowledge Arguments for RAM Programs. 129 - Adi Akavia, Tal Moran:
Topology-Hiding Computation Beyond Logarithmic Diameter. 130 - Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed:
A Practical Multivariate Blind Signature Scheme. 131 - Roel Peeters, Jens Hermans, Aysajan Abidin:
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol. 132 - Christian Badertscher, Ueli Maurer:
Composable and Robust Outsourced Storage. 133 - Ryan Stanley-Oakes:
A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes. 134 - Xiong Fan, Chaya Ganesh, Vladimir Kolesnikov:
Hashing Garbled Circuits for Free. 135 - Anna Johnston:
Dispersed Cryptography and the Quotient Ring Transform. 136 - Paul Grubbs, Thomas Ristenpart, Yuval Yarom:
Modifying an Enciphering Scheme after Deployment. 137 - François-Xavier Standaert:
How (not) to Use Welch's T-test in Side-Channel Security Evaluations. 138 - David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon:
Revisiting AES Related-Key Differential Attacks with Constraint Programming. 139 - Markus Schmidt, Nina Bindel:
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples. 140 - Dario Fiore, María Isabel González Vasco, Claudio Soriente:
Partitioned Group Password-Based Authenticated Key Exchange. 141 - Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner:
Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme. 142 - Ran Canetti, Yilei Chen:
Constraint-hiding Constrained PRFs for NC1 from LWE. 143 - Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin:
Privacy-Preserving Search of Similar Patients in Genomic Data. 144 - Viet Tung Hoang, Stefano Tessaro:
The Multi-User Security of Double Encryption. 145 - Mohammad Hajiabadi, Bruce M. Kapron:
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions. 146 - Amos Beimel, Yuval Ishai, Eyal Kushilevitz:
Ad Hoc PSM Protocols: Secure Computation Without Coordination. 147 - Olivier Sanders, Cristina Onete
, Pierre-Alain Fouque:
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data. 148 - Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Bitcoin as a Transaction Ledger: A Composable Treatment. 149 - Elette Boyle, Niv Gilboa, Yuval Ishai:
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation. 150 - Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore, Romain Gay:
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption. 151 - Fermi Ma, Mark Zhandry:
Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption. 152 - Iraklis Leontiadis, Ming Li:
Storage Efficient Substring Searchable Symmetric Encryption. 153 - Thorsten Kranz, Friedrich Wiemer, Gregor Leander:
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. 154 - Yoshinori Aono, Phong Q. Nguyen:
Random Sampling Revisited: Lattice Enumeration with Discrete Pruning. 155 - Orfeas Stefanos Thyfronitis Litos, Dionysis Zindros:
Trust Is Risk: A Decentralized Financial Trust Platform. 156 - Kim Ramchen:
Detecting General Algebraic Manipulation Attacks. 157 - Martin Potthast
, Christian Forler, Eik List, Stefan Lucks:
Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy. 158 - Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin:
Cube-like Attack on Round-Reduced Initialization of Ketje Sr. 159 - Zheng Li, Xiaoyang Dong, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced ASCON. 160 - Giorgia Azzurra Marson, Bertram Poettering:
Security Notions for Bidirectional Channels. 161 - Siwei Sun, David Gérault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:
Analysis of AES, SKINNY, and Others with Constraint Programming. 162 - Anamaria Costache, Nigel P. Smart:
Homomorphic Encryption without Gaussian Noise. 163 - Benny Applebaum, Barak Arkis, Pavel Raykov, Prashant Nalini Vasudevan:
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations. 164 - Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. 165 - Kristian Gjøsteen, Martin Strand:
A roadmap to fully homomorphic elections: Stronger security, better verifiability. 166 - Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid:
Cloud Storage File Recoverability. 167 - Shay Gueron, Adam Langley, Yehuda Lindell:
AES-GCM-SIV: Specification and Analysis. 168 - Nicholas Hilbert, Christian S. Jensen, Dan Lin, Wei Jiang:
UFace: Your Universal Password That No One Can See. 169 - Martin Seysen:
Error-free protection of EC point multiplication by modular extension. 170 - Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald, Dan J. Shepherd:
Quantum Key Search with Side Channel Advice. 171 - Ashwin Jha, Avradip Mandal, Mridul Nandi:
On The Exact Security of Message Authentication Using Pseudorandom Functions. 172 - Marc Stevens, Daniel Shumow:
Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions. 173 - Ruiyu Zhu, Yan Huang:
Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes. 174 - Goutam Paul, Souvik Ray:
Analysis of Burn-in period for RC4 State Transition. 175 - Yuval Ishai, Mor Weiss:
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge. 176 - Navid Nasr Esfahani, Ian Goldberg, Douglas R. Stinson:
Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets. 177 - Zhengbin Liu, Yongqiang Li, Mingsheng Wang:
Optimal Differential Trails in SIMON-like Ciphers. 178 - Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse:
REM: Resource-Efficient Mining for Blockchains. 179 - Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust Synchronous P2P Primitives Using SGX Enclaves. 180 - Silvia Mella, Joan Daemen, Gilles Van Assche:
New techniques for trail bounds and application to differential trails in Keccak. 181 - Leif Both, Alexander May:
The Approximate k-List Problem. 182 - Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen:
Analysis of Software Countermeasures for Whitebox Encryption. 183 - Guillaume Endignoux, Damian Vizár:
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models. 184 - Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin:
A Virtual Wiretap Channel for Secure MessageTransmission. 185 - Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev:
A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies. 186 - H. Gopalakrishna Gadiyar, R. Padma:
The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives. 187 - Wenying Zhang, Vincent Rijmen:
Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer. 188 - Jonathan Katz, Samuel Ranellucci, Xiao Wang:
Authenticated Garbling and Efficient Maliciously Secure Multi-Party Computation. 189 - Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov:
The first collision for full SHA-1. 190 - David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. 191 - (Withdrawn) Improved Hybrid Consensus Scheme with Privacy-preserving Property. 192
- Shuwen Deng, Doguhan Gümüsoglu, Wenjie Xiong, Y. Serhan Gener, Onur Demir, Jakub Szefer:
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures. 193 - Andrea Visconti, Chiara Valentina Schiavo, René Peralta:
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2). 194 - Chaoyun Li, Qingju Wang:
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices. 195 - Bao-Hong Li, Guoqing Xu, Yin-Liang Zhao:
Attribute-based concurrent signatures. 196 - Wenying Zhang, Zhaohui Xing, Keqin Feng:
A Construction of Bent Functions with Optimal Algebraic Degree and Large Symmetric Group. 197 - Masahiro Yagisawa:
FHE with Recursive Ciphertext. 198 - Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme. 199 - Jan Camenisch, Manu Drijvers, Anja Lehmann:
Anonymous Attestation with Subverted TPMs. 200 - Gabriel Kaptchuk, Ian Miers, Matthew Green:
Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control. 201 - Marshall Ball
, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan:
Average-Case Fine-Grained Hardness. 202 - Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan:
Proofs of Useful Work. 203 - Tomer Ashur, Daniël Bodden, Orr Dunkelman:
Linear Cryptanalysis Using Low-bias Linear Approximations. 204 - Anindya Shankar Bhandari, Dipanwita Roy Chowdhury:
ZETA: Towards Tagless Authenticated Encryption. 205 - Yongge Wang:
Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes. 206 - Gizem S. Çetin, Hao Chen, Kim Laine, Kristin E. Lauter, Peter Rindal, Yuhou Xia:
Private Queries on Encrypted Genomic Data. 207 - Sylvain Ruhault:
SoK: Security Models for Pseudo-Random Number Generators. 208 - Qipeng Liu, Mark Zhandry:
Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness. 209 - Charles Herder, Benjamin Fuller, Marten van Dijk, Srinivas Devadas:
Public Key Cryptosystems with Noisy Secret Keys. 210 - James Alderman, Keith M. Martin, Sarah Louise Renwick:
Multi-level Access in Searchable Symmetric Encryption. 211 - Craig Costello, Benjamin Smith:
Montgomery curves and their arithmetic: The case of large characteristic fields. 212 - Ghazal Kachigar, Jean-Pierre Tillich:
Quantum Information Set Decoding Algorithms. 213 - Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez:
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer. 214 - (Withdrawn) SEVDSI: Secure, Efficient and Verifiable Data Set Intersection. 215
- Ignacio Cascudo, Bernardo David:
SCRAPE: Scalable Randomness Attested by Public Entities. 216 - Kuo-Hui Yeh:
Cryptanalysis of Wang et al's Certificateless Signature Scheme without Bilinear Pairings. 217 - Kenji Yasunaga, Kosuke Yuzawa:
Repeated Games for Generating Randomness in Encryption. 218 - Chun-I Fan, Yi-Fan Tseng, Chih-Wen Lin:
Attribute-Based Encryption from Identity-Based Encryption. 219 - Kazuhiko Minematsu, Tetsu Iwata:
Cryptanalysis of PMACx, PMAC2x, and SIVx. 220 - Florian Göpfert, Christine van Vredendaal, Thomas Wunderer:
A Quantum Attack on LWE with Arbitrary Error Distribution. 221 - (Withdrawn) A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption. 222
- Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer:
0-RTT Key Exchange with Full Forward Secrecy. 223 - Hao Chen, Kim Laine, Rachel Player:
Simple Encrypted Arithmetic Library - SEAL v2.1. 224 - Ling Ren, Srinivas Devadas:
Bandwidth Hard Functions for ASIC Resistance. 225 - Ruiyu Zhu, Yan Huang:
Faster LEGO-based Secure Computation without Homomorphic Commitments. 226 - Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun:
Towards Shared Ownership in the Cloud. 227 - João Sá Sousa, Cédric Lefebvre, Zhicong Huang, Jean Louis Raisaro, Carlos Aguilar Melchor, Marc-Olivier Killijian, Jean-Pierre Hubaux:
Efficient and Secure Outsourcing of Genomic Data Storage. 228 - Claude Crépeau, Nan Yang:
Multi-Prover Interactive Proofs: Unsound Foundations. 229 - Yaron Velner, Jason Teutsch, Loi Luu:
Smart Contracts Make Bitcoin Mining Pools Vulnerable. 230 - Sergey Agievich:
EHE: nonce misuse-resistant message authentication. 231 - Alexander Chepurnoy, Tuyet Duong, Lei Fan, Hong-Sheng Zhou:
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake. 232 - Shashank Agrawal, Melissa Chase:
Simplifying Design and Analysis of Complex Predicate Encryption Schemes. 233 - Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan:
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. 234 - Isheeta Nargis:
Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption. 235 - Pierre Loidreau:
A new rank metric codes based encryption scheme. 236 - Tim Ruffing, Giulio Malavolta:
Switch Commitments: A Safety Switch for Confidential Transactions. 237 - Tim Ruffing, Pedro Moreno-Sanchez
:
Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin. 238 - Tomer Ashur, Orr Dunkelman, Atul Luykx:
Boosting Authenticated Encryption Robustness With Minimal Modifications. 239 - Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation. 240 - Alexander Russell, Cristopher Moore, Aggelos Kiayias, Saad Quader:
Forkable Strings are Rare. 241 - Riad S. Wahby, Ye Ji, Andrew J. Blumberg, Abhi Shelat, Justin Thaler, Michael Walfish, Thomas Wies:
Full accounting for verifiable outsourcing. 242 - Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines:
Key Recovery: Inert and Public. 243 - Mateus Borges, Quoc-Sang Phan, Antonio Filieri, Corina S. Pasareanu:
Model-counting Approaches For Nonlinear Numerical Constraints. 244 - Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
Cache-Base Application Detection in the Cloud Using Machine Learning. 245 - Joël Cathébras, Alexandre Carbon, Renaud Sirdey, Nicolas Ventroux:
An Analysis of FV Parameters Impact Towards its Hardware Acceleration. 246 - Mohamed Saied Emam Mohamed, Albrecht Petzoldt:
Efficient Multivariate Ring Signature Schemes. 247 - Dillibabu Shanmugam, Ravikumar Selvam, Suganya Annadurai:
IPcore implementation susceptibility: A case study of Low latency ciphers. 248 - Mitar Milutinovic, Warren He, Howard Wu, Maxinder Kanwal:
Proof of Luck: an Efficient Blockchain Consensus Protocol. 249 - Huijia Lin, Stefano Tessaro:
Indistinguishability Obfuscation from Bilinear Maps and Block-Wise Local PRGs. 250 - Dan Boneh, Rosario Gennaro, Steven Goldfeder, Sam Kim:
A Lattice-Based Universal Thresholdizer for Cryptographic Systems. 251 - Jean-Sébastien Coron:
High-Order Conversion From Boolean to Arithmetic Masking. 252 - Chris Brzuska, Håkon Jacobsen:
A Modular Security Analysis of EAP and IEEE 802.11. 253 - Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Juan Ai:
Towards Easy Key Enumeration. 254 - Lorenzo Grassi, Christian Rechberger:
New Limits for AES Known-Key Distinguishers. 255 - Ralf Küsters, Daniel Rausch:
A Framework for Universally Composable Diffie-Hellman Key Exchange. 256 - Aayush Jain, Peter M. R. Rasmussen, Amit Sahai:
Threshold Fully Homomorphic Encryption. 257 - Chris Peikert, Oded Regev, Noah Stephens-Davidowitz:
Pseudorandomness of Ring-LWE for Any Ring and Modulus. 258 - Daniele Micciancio, Michael Walter:
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time. 259 - Shoichi Hirose, Yu Sasaki, Kan Yasuda:
Message-Recovery MACs and Verification-Unskippable AE. 260 - Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? 261 - Peter Scholl, Nigel P. Smart, Tim Wood:
When It's All Just Too Much: Outsourcing MPC-Preprocessing. 262 - Sylvain Guilley, Liran Lerman:
Bivariate attacks and confusion coefficients. 263 - Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez:
A note on how to (pre-)compute a ladder. 264 - Kamalesh Acharya, Ratna Dutta:
Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation. 265 - Tyge Tiessen:
From Higher-Order Differentials to Polytopic Cryptanalysis. 266 - Seungkwang Lee:
A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis. 267 - Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder:
Efficient Sanitizable Signatures without Random Oracles. 268 - Okan Seker, Thomas Eisenbarth, Rainer Steinwandt:
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. 269 - Keita Inasawa, Kenji Yasunaga:
Rational Proofs against Rational Verifiers. 270 - Jean-Sébastien Coron, Franck Rondepierre, Rina Zeitoun:
High Order Masking of Look-up Tables with Common Shares. 271 - Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht:
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA. 272 - Huijia Lin, Rafael Pass, Pratik Soni:
Two-Round Concurrent Non-Malleable Commitment from Time-Lock Puzzles. 273 - Rishab Goyal, Venkata Koppula, Brent Waters:
Lockable Obfuscation. 274 - Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka:
Indistinguishability Obfuscation: Simpler Constructions using Secret-Key Functional Encryption. 275 - Daniel Wichs, Giorgos Zirdelis:
Obfuscating Compute-and-Compare Programs under LWE. 276 - Alex Lombardi, Vinod Vaikuntanathan:
Minimizing the Complexity of Goldreich's Pseudorandom Generator. 277 - Yunwen Liu, Vincent Rijmen:
New Observations on Invariant Subspace Attack. 278 - Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
:
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. 279 - Rafaël Del Pino, Vadim Lyubashevsky:
Amortization with Fewer Equations for Proving Knowledge of Small Secrets. 280 - Kallista A. Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth:
Practical Secure Aggregation for Privacy Preserving Machine Learning. 281 - Dominique Unruh:
Collapsing sponges: Post-quantum security of the sponge construction. 282 - Thorben Moos, Amir Moradi:
On the Easiness of Turning Higher-Order Leakages into First-Order. 283 - Maik Ender, Alexander Wild, Amir Moradi:
SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA. 284 - Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas:
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors. 285 - (Withdrawn) Impossible Differential Attack on Midori128 Using Rebound-like Technique. 286
- Liwei Zhang, A. Adam Ding, François Durvaux, François-Xavier Standaert, Yunsi Fei:
Towards Sound and Optimal Leakage Detection Procedure. 287 - Pooya Farshim, Claudio Orlandi, Razvan Rosie:
Security of Symmetric Primitives under Incorrect Usage of Keys. 288 - Matthias Krause:
On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks. 289 - Yuanqi Shen, Hai Zhou:
Double DIP: Re-Evaluating Security of Logic Encryption Algorithms. 290 - Dakshita Khurana, Amit Sahai:
Two-Message Non-Malleable Commitments from Standard Sub-exponential Assumptions. 291 - Shihui Fu, Xiutao Feng:
Involutory Differentially 4-Uniform Permutations from Known Constructions. 292 - Daniel J. Bernstein, Tanja Lange:
Montgomery curves and the Montgomery ladder. 293 - Jung Hee Cheon, Miran Kim, Yong Soo Song:
Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme. 294 - Ludo Tolhuizen, Ronald Rietman, Óscar García-Morchón:
Improved key-reconciliation method. 295 - Adi Akavia, Rio LaVigne, Tal Moran:
Topology-Hiding Computation on all Graphs. 296 - Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete
, Jean-Marc Robert:
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. 297 - Séamus Brannigan, Neil Smyth, Tobias Oder, Felipe Valencia, Elizabeth O'Sullivan, Tim Güneysu, Francesco Regazzoni:
An Investigation of Sources of Randomness Within Discrete Gaussian Sampling. 298 - Hao Chen, Kim Laine, Peter Rindal:
Fast Private Set Intersection from Homomorphic Encryption. 299 - Iddo Bentov, Pavel Hubácek, Tal Moran, Asaf Nadler:
Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies. 300 - Alex Lombardi, Vinod Vaikuntanathan:
On the Non-Existence of Blockwise 2-Local PRGs with Applications to Indistinguishability Obfuscation. 301 - (Withdrawn) Quantum preimage, 2nd-preimage, and collision resistance of SHA3. 302
- Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi:
Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model. 303 - Yang Yu, Guangwu Xu, Xiaoyun Wang:
Provably Secure NTRUEncrypt over More General Cyclotomic Rings. 304 - Alessandro Chiesa, Michael A. Forbes, Nicholas Spooner:
A Zero Knowledge Sumcheck and its Applications. 305 - Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. 306 - Ling Ren, Kartik Nayak, Ittai Abraham, Srinivas Devadas:
Practical Synchronous Byzantine Consensus. 307 - Nicholas Genise, Daniele Micciancio:
Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus. 308 - Maiki Fujita, Takeshi Koshiba:
Perfectly Secure Message Transmission Scheme against Rational Adversaries. 309 - Shuai Han, Shengli Liu:
KDM-Secure Public-Key Encryption from Constant-Noise LPN. 310 - Aaron Hutchinson, Koray Karabina:
Constructing Multidimensional Differential Addition Chains and their Applications. 311 - Boaz Barak, Zvika Brakerski, Ilan Komargodski, Pravesh K. Kothari:
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation). 312 - (Withdrawn) A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes. 313
- Daniel J. Bernstein, Tanja Lange:
Post-quantum cryptography - dealing with the fallout of physics success. 314 - Bernardo Ferreira, João Leitão, Henrique João L. Domingos:
Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version). 315 - Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Exploring Potential 6LoWPAN Traffic Side Channels. 316 - Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed E. Kosba, Ari Juels, Elaine Shi:
Solidus: Confidential Distributed Ledger Transactions via PVORM. 317 - (Withdrawn) Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud. 318
- Sikhar Patranabis, Debdeep Mukhopadhyay:
Encrypt-Augment-Recover: Computationally Function Private Predicate Encryption in the Public-Key Setting. 319 - Neriman Gamze Orhon, Hüseyin Hisil:
Speeding up Huff Form of Elliptic Curves. 320 - Dingfeng Ye, Peng Liu, Jun Xu:
Towards Practical Obfuscation of General Circuits. 321 - (Withdrawn) Approximate Polynomial Common Divisor Problem Relates to Noisy Multipolynomial Reconstruction. 322
- Atsushi Takayasu, Yohei Watanabe:
Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance. 323 - Srikanth Ch, C. E. Veni Madhavan, Kumar Swamy H. V.:
Family of PRGs based on Collections of Arithmetic Progressions. 324 - Rolf Haenni, Reto E. Koenig, Philipp Locher, Eric Dubuis:
CHVote System Specification. 325 - Manuel Barbosa, Dario Catalano, Dario Fiore:
Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data. 326 - Alan Szepieniec, Ward Beullens, Bart Preneel:
MQ Signatures for PKI. 327 - Debrup Chakraborty, Sebati Ghosh, Palash Sarkar:
Evaluating Bernstein-Rabin-Winograd Polynomials. 328 - Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Maliciously Secure Multi-Client ORAM. 329 - Abhishek Jain
, Yael Tauman Kalai, Dakshita Khurana, Ron Rothblum:
Distinguisher-Dependent Simulation in Two Rounds and its Applications. 330 - Daan Leermakers, Boris Skoric:
Optimal attacks on qubit-based Quantum Key Recycling. 331 - Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:
Reforgeability of Authenticated Encryption Schemes. 332 - Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren:
Faster Homomorphic Function Evaluation using Non-Integral Base Encoding. 333 - Razvan Barbulescu, Sylvain Duquesne:
Updating key size estimations for pairings. 334 - (Withdrawn) Privacy-Preserving Linear Regression on Distributed Data. 335
- Carmina Georgescu, Alina Petrescu-Nita, Emil Simion, Antonela Toma:
NIST Randomness Tests (in)dependence. 336 - Gang Sheng, Chunming Tang, Wei Gao, Yunlu Cai, Xing Hu:
Authentication of Outsourced Linear Function Query with Efficient Updates. 337 - Amrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena:
A Traceability Analysis of Monero's Blockchain. 338 - Alan Kaminsky:
ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication. 339 - (Withdrawn) Enhancing Security by Combining Biometrics and Cryptography. 340
- Dragos Dumitrescu, Ioan-Mihail Stan, Emil Simion:
Steganography techniques. 341 - Chunsheng Gu:
Multilinear Maps Using a Variant of Ring-LWE. 342 - Essam Ghadafi, Jens Groth:
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups. 343 - Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti:
DUPLO: Unifying Cut-and-Choose for Garbled Circuits. 344 - Kostas Papagiannopoulos, Nikita Veshchikov:
Mind the Gap: Towards Secure 1st-order Masking in Software. 345 - Subhadeep Banik, Takanori Isobe:
Some cryptanalytic results on Lizard. 346 - Naghmeh Karimi, Jean-Luc Danger, Florent Lozach, Sylvain Guilley:
Predictive Aging of Reliability of two Delay PUFs. 347 - Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, Jeyavijayan Rajendran:
Removal Attacks on Logic Locking and Camouflaging Techniques. 348 - Panos Kampanakis, Scott R. Fluhrer:
LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards. 349 - Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez:
The Montgomery ladder on binary elliptic curves. 350 - Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta:
Post-quantum RSA. 351 - Daniel J. Bernstein, Jean-François Biasse, Michele Mosca:
A low-resource quantum factoring algorithm. 352 - San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease. 353 - Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart:
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. 354 - Joppe W. Bos, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen:
White-Box Cryptography: Don't Forget About Grey Box Attacks. 355 - Bart Mennink, Alan Szepieniec:
XOR of PRPs in a Quantum World. 356 - Nico Döttling, Jesper Buus Nielsen, Maciej Obremski:
Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model. 357 - Olivier Blazy, Céline Chevalier, Paul Germouty:
Almost Optimal Oblivious Transfer from QA-NIZK. 358 - Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
New Protocols for Conditional Disclosure of Secrets (and More). 359 - Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen:
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error. 360 - Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka:
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption. 361 - Jesper Buus Nielsen:
Universally Composable Zero-Knowledge Proof of Membership. 362 - Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF. 363 - Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols. 364 - Boaz Barak:
The Complexity of Public-Key Cryptography. 365 - Gideon Samid, Serguei Popov:
BitFlip: A Randomness-Rich Cipher. 366 - Shuyang Tang, Zhiqiang Liu, Sherman S. M. Chow, Zhen Liu, Yu Long:
Forking-Free Hybrid Consensus with Generalized Proof-of-Activity. 367 - Sumanta Sarkar, Habeeb Syed:
Analysis of Toeplitz MDS Matrices. 368 - (Withdrawn) Enforcing Input Correctness via Certification in Garbled Circuit Evaluation. 369
- Ziya Alper Genç, Vincenzo Iovino, Alfredo Rial:
"The Simplest Protocol for Oblivious Transfer" Revisited. 370 - Lijing Zhou, Licheng Wang, Yiru Sun:
On the Efficient Construction of Lightweight Orthogonal MDS Matrices. 371 - Antoine Joux, Vanessa Vitse:
A crossbred algorithm for solving Boolean polynomial systems. 372 - Ryo Hiromasa, Yutaka Kawai:
Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption. 373 - Alexandre Gélin, Benjamin Wesolowski:
Loop-abort faults on supersingular isogeny cryptosystems. 374 - Karl Wüst, Arthur Gervais:
Do you need a Blockchain? 375 - (Withdrawn) Determining the Minimum Degree of an S-box. 376
- Stefan Wüller, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries. 377 - Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek:
Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables. 378 - Yan Bo Ti:
Fault attack on Supersingular Isogeny Cryptosystems. 379 - Sam Kim, David J. Wu:
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions. 380 - Alexandre de Castro:
Quantum one-way permutation over the finite field of two elements. 381 - Steven Cavanaugh:
A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK. 382 - Travis Scholl:
Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography. 383 - Matthias Hamann, Matthias Krause, Willi Meier, Bin Zhang:
Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers. 384 - Benny Applebaum:
Garbled Circuits as Randomized Encodings of Functions: a Primer. 385 - Zvika Brakerski, Shai Halevi, Antigoni Polychroniadou:
Four Round Secure Computation without Setup. 386 - Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng:
Homomorphically Encrypted Arithmetic Operations over the Integer Ring. 387 - Silvan Streit, Fabrizio De Santis:
Post-Quantum Key Exchange on ARMv8-A - A New Hope for NEON made Simple. 388 - Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized Blacklistable Anonymous Credentials with Reputation. 389 - Yi Deng, Xuyang Song, Jingyue Yu, Yu Chen:
On Instance Compression, Schnorr/Guillou-Quisquater, and the Security of Classic Protocols for Unique Witness Relations. 390 - Subhabrata Samajder, Palash Sarkar:
Another Look at Success Probability in Linear Cryptanalysis. 391 - Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey:
Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE. 392 - Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner:
Privacy-Preserving Interdomain Routing at Internet Scale. 393 - Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
Double-spending Prevention for Bitcoin zero-confirmation transactions. 394 - Hannes Groß, David Schaffenrath, Stefan Mangard:
Higher-Order Side-Channel Protected Implementations of Keccak. 395 - Payman Mohassel, Yupeng Zhang:
SecureML: A System for Scalable Privacy-Preserving Machine Learning. 396 - Edoardo Persichetti:
Efficient Digital Signatures From Coding Theory. 397 - Dominique Unruh:
Post-Quantum Security of Fiat-Shamir. 398 - David McCann, Elisabeth Oswald:
Practical Evaluation of Masking Software Countermeasures on an IoT processor. 399 - Cédric Van Rompay, Refik Molva, Melek Önen:
A Leakage-Abuse Attack Against Multi-User Searchable Encryption. 400 - Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan:
Synthesis of Adaptive Side-Channel Attacks. 401 - Prabhanjan Ananth, Arka Rai Choudhuri, Abhishek Jain
:
A New Approach to Round-Optimal Secure Multiparty Computation. 402 - Masaaki Shirase:
Condition on composite numbers easily factored with elliptic curve method. 403 - Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal:
Short generators without quantum computers: the case of multiquadratics. 404 - Jingjing Wang, Xiaoyu Zhang, Jingjing Guo, Jianfeng Wang:
Security Analysis of "PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare". 405 - Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Bryan Ford:
OmniLedger: A Secure, Scale-Out, Decentralized Ledger. 406 - Peter Rindal, Roberto Trifiletti:
SplitCommit: Implementing and Analyzing Homomorphic UC Commitments. 407 - Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast. 408 - Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges:
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead. 409 - Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, Vinod Vaikuntanathan:
Fast Proxy Re-Encryption for Publish/Subscribe Systems. 410 - Çetin Kaya Koç:
A New Algorithm for Inversion mod pk. 411 - Ximing Fu, Xiaoyun Wang, Jiazhe Chen:
Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently. 412 - Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava:
Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems. 413 - Alex Biryukov, Léo Perrin:
Symmetrically and Asymmetrically Hard Cryptography. 414 - Osman Biçer, Muhammed Ali Bingöl, Mehmet Sabir Kiraz, Albert Levi:
Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates. 415 - Ioana Boureanu, David Gérault, Pascal Lafourcade, Cristina Onete
:
Breaking and Fixing the HB+DB protocol. 416 - Massimo Bartoletti, Stefano Lande, Alessandro Sebastian Podda:
A Proof-of-Stake protocol for consensus on Bitcoin subchains. 417 - Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strong Authenticated Key Exchange with Auxiliary Inputs. 418 - Alessandro Budroni, Federico Pintore:
Efficient hash maps to 픾2 on BLS curves. 419 - Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang:
Construction and Filtration of Lightweight Formalized MDS Matrices. 420 - Eric Brier, Rémi Géraud, David Naccache:
Exploring Naccache-Stern Knapsack Encryption. 421 - Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs. 422 - Alexander Koch, Stefan Walzer
:
Foundations for Actively Secure Card-based Cryptography. 423 - Markku-Juhani O. Saarinen:
On Reliability, Reconciliation, and Error Correction in Ring-LWE Encryption. 424 - Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Card-Based Protocols Using Unequal Division Shuffle. 425 - Masahiro Yagisawa:
FHPKE based on multivariate discrete logarithm problem. 426 - Gregor Leander, Alexander May:
Grover Meets Simon - Quantumly Attacking the FX-construction. 427 - Douglas R. Stinson:
Optimal Ramp Schemes and Related Combinatorial Objects. 428 - Christian Badertscher, Christian Matt, Ueli Maurer:
Strengthening Access Control Encryption. 429 - Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène:
Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping. 430 - Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi:
Understanding RUP Integrity of COLM. 431 - Kaisa Nyberg:
Statistical and Linear Independence of Binary Random Variables. 432 - Saikrishna Badrinarayanan, Sanjam Garg
, Yuval Ishai, Amit Sahai, Akshay Wadia:
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions. 433 - Zhe Liu, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo:
FourQ on embedded devices with strong countermeasures against side-channel attacks. 434 - Atul Luykx, Bart Mennink, Kenneth G. Paterson:
Analyzing Multi-Key Security Degradation. 435 - Kaiyan Zheng, Peng Wang:
A Uniform Class of Weak Keys for Universal Hash Functions. 436 - Michael Scott:
Slothful reduction. 437 - James Howe, Máire O'Neill:
GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography. 438 - Abdelrahaman Aly, Mathieu Van Vyve:
Practically Efficient Secure Single-Commodity Multi-Market Auctions. 439 - Nicolas T. Courtois, Klaus Schmeh, Jörg Drobick, Jacques Patarin, Maria-Bristena Oprisanu, Matteo Scarlata, Om Bhallamudi:
Cryptographic Security Analysis of T-310. 440 - Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan:
New Approach to Practical Leakage-Resilient Public-Key Cryptography. 441 - Jeremiah Blocki, Samson Zhou:
On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i. 442 - Joël Alwen, Jeremiah Blocki, Benjamin Harsha:
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions. 443 - Ming Li, Jian Weng, Anjia Yang, Wei Lu:
CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing. 444 - Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures. 445 - Diana Maimut, George Teseleanu:
Secretly Embedding Trapdoors into Contract Signing Protocols. 446 - Huige Li, Haibo Tian, Fangguo Zhang:
Block Chain based Searchable Symmetric Encryption. 447 - (Withdrawn) Obfuscation of Bloom Filter Queries from Ring-LWE. 448
- Shihui Fu, Xiutao Feng, Baofeng Wu:
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies. 449 - Elena Pagnin, Aikaterini Mitrokotsa:
Privacy-preserving biometric authentication: challenges and directions. 450 - Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE. 451 - Jian Liu, Mika Juuti, Yao Lu, N. Asokan:
Oblivious Neural Network Predictions via MiniONN transformations. 452 - Johannes Blömer, Gennadij Liske:
Subtleties in Security Definitions for Predicate Encryption with Public Index. 453 - Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich:
Algorand: Scaling Byzantine Agreements for Cryptocurrencies. 454 - Daniel Apon, Xiong Fan, Feng-Hao Liu:
Vector Encoding over Lattices and Its Applications. 455 - Xiong Fan, Feng-Hao Liu:
Proxy Re-Encryption and Re-Signatures from Lattices. 456 - Masahito Hayashi, Takeshi Koshiba:
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority. 457 - (Withdrawn) Fully Homomorphic Encryption Using Multivariate Polynomials. 458
- Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test. 459 - Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila:
Transitioning to a Quantum-Resistant Public Key Infrastructure. 460 - Daniel Jost, Ueli Maurer:
Context-Restricted Indifferentiability: Generalizing UCE and Implications on the Soundness of Hash-Function Constructions. 461 - Suvradip Chakraborty, Chester Rebeiro, Debdeep Mukhopadhyay, C. Pandu Rangan:
Leakage-Resilient Tweakable Encryption from One-Way Functions. 462 - Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella:
Proving Resistance against Invariant Attacks: How to Choose the Round Constants. 463 - Mike Rosulek, Morgan Shirley:
On the Structure of Unconditional UC Hybrid Protocols. 464 - Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong:
Lelantos: A Blockchain-based Anonymous Physical Delivery System. 465 - Yusuke Naito:
Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security. 466 - Sam Kim, David J. Wu:
Access Control Encryption for General Policies from Standard Assumptions. 467 - Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov:
Why Your Encrypted Database Is Not Secure. 468 - Hiroaki Anada, Seiko Arita:
Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption. 469 - José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot:
On the Relation Between SIM and IND-RoR Security Models for PAKEs. 470 - Jacob Alperin-Sheriff, Jintai Ding, Albrecht Petzoldt, Daniel Smith-Tone:
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree. 471 - Cengiz Örencik, Erkay Savas, Mahmoud Alewiwi:
A Unified Framework for Secure Search Over Encrypted Cloud Data. 472 - Bart Mennink, Samuel Neves:
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory. 473 - Bart Mennink:
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security. 474 - Pooya Farshim, Louiza Khati, Damien Vergnaud:
Security of Even-Mansour Ciphers under Key-Dependent Messages. 475 - Mihir Bellare, Adam O'Neill, Igors Stepanovs:
Forward-Security under Continual Leakage. 476 - Dan Boneh, Sam Kim, David J. Wu:
Constrained Keys for Invertible Pseudorandom Functions. 477 - Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens:
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds. 478 - Keita Emura:
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions. 479 - Thomas Prest:
Sharper Bounds in Lattice-Based Cryptography using the Rényi Divergence. 480 - Divesh Aggarwal, Antoine Joux, Anupam Prakash, Miklos Santha:
A New Public-Key Cryptosystem via Mersenne Numbers. 481 - Léo Ducas, Alice Pellet-Mary:
On the Statistical Leak of the GGH13 Multilinear Map and some Variants. 482 - Sergiu Carpov, Pascal Aubry, Renaud Sirdey:
A multi-start heuristic for multiplicative depth minimization of boolean circuits. 483 - Jung Hee Cheon, Minki Hhan, Changmin Lee:
Cryptanalysis of the Overstretched NTRU Problem for General Modulus Polynomial. 484 - Jiangshan Yu, Mark Ryan, Liqun Chen:
Authenticating compromisable storage systems. 485 - Ilan Komargodski, Moni Naor, Eylon Yogev:
Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions. 486 - Yi Lu:
New Linear Attacks on Block Cipher GOST. 487 - Nir Bitansky, Yael Tauman Kalai, Omer Paneth:
Multi-Collision Resistance: A Paradigm for Keyless Hash Functions. 488 - Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan:
Multi Collision Resistant Hash Functions and their Applications. 489 - Peter Pessl, Leon Groot Bruinderink, Yuval Yarom:
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures. 490 - Chongwon Cho, Nico Döttling, Sanjam Garg
, Divya Gupta, Peihan Miao, Antigoni Polychroniadou:
Laconic Oblivious Transfer and its Applications. 491 - Marcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood:
Reducing Communication Channels in MPC. 492 - Georg T. Becker:
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice. 493 - Tomás Fabsic, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, Thomas Johansson:
A Reaction Attack on the QC-LDPC McEliece Cryptosystem. 494 - Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi:
Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy. 495 - Dragos Rotaru, Nigel P. Smart, Martijn Stam:
Modes of Operation Suitable for Computing on Encrypted Data. 496 - Itai Dinur, Niv Nadler:
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme. 497 - Joan Daemen, Bart Mennink, Gilles Van Assche:
Full-State Keyed Duplex With Built-In Multi-User Support. 498 - Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. 499 - Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps. 500 - Felix Günther, Sogol Mazaheri:
A Formal Treatment of Multi-key Channels. 501 - Bita Darvish Rouhani, M. Sadegh Riazi, Farinaz Koushanfar
:
DeepSecure: Scalable Provably-Secure Deep Learning. 502 - Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie:
Encryption Switching Protocols Revisited: Switching modulo p. 503 - Craig Costello, Hüseyin Hisil:
A simple and compact algorithm for SIDH with arbitrary degree isogenies. 504 - Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Side-Channel Attacks on BLISS Lattice-Based Signatures - Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers. 505 - (Withdrawn) Optimal Overcoming Weak Expectations. 506
- Maciej Obremski, Maciej Skorski
:
Inverted Leftover Hash Lemma. 507 - Victor Cauchois, Clément Gomez, Reynald Lercier:
Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations. 508 - Fang Song, Aaram Yun:
Quantum Security of NMAC and Related Constructions. 509 - Alexandra Boldyreva, Christopher Patton, Thomas Shrimpton:
Hedging Public-Key Encryption in the Real World. 510 - Alex Biryukov, Léo Perrin:
State of the Art in Lightweight Symmetric Cryptography. 511 - (Withdrawn) Provably Secure Two-Factor Authentication Scheme for E-Health Using Smart Card. 512
- Patrick Holzer, Thomas Wunderer:
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor pα qβ. 513 - Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich:
Identity-based Encryption from Codes with Rank Metric. 514 - Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs:
Be Adaptive, Avoid Overcommitting. 515 - Claude Carlet:
Characterizations of the differential uniformity of vectorial functions by the Walsh transform. 516 - Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson:
PRF-ODH: Relations, Instantiations, and Impossibility Results. 517 - Joost Renes, Benjamin Smith:
qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs. 518 - Nishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala:
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case. 519 - Juan A. Garay, Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas:
The Price of Low Communication in Secure Multi-Party Computation. 520 - F. Betül Durak, Serge Vaudenay:
Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains. 521 - Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache:
On the Hardness of the Mersenne Low Hamming Ratio Assumption. 522 - Vadim Lyubashevsky, Gregor Seiler:
Partially Splitting Rings for Faster Lattice-Based Zero-Knowledge Proofs. 523 - Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan:
Compact Structure-preserving Signatures with Almost Tight Security. 524 - Romain Gay, Dennis Hofheinz, Lisa Kohl:
Kurosawa-Desmedt Meets Tight Security. 525 - Jiangshan Yu, Mark Ryan:
Evaluating web PKIs. 526 - Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:
Key Rotation for Authenticated Encryption. 527 - Claude Carlet:
Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets. 528 - Ling Song, Guohong Liao, Jian Guo:
Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak. 529 - Sebastian Faust, Kristina Hostáková, Pratyay Mukherjee, Daniele Venturi:
Non-Malleable Codes for Space-Bounded Tampering. 530 - Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Template Attack vs Bayes Classifier. 531 - Xavier Boyen, Qinyi Li:
All-But-Many Lossy Trapdoor Functions from Lattices and Applications. 532 - Gorjan Alagic, Christian Majenz:
Quantum non-malleability and authentication. 533 - Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. 534 - Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin:
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. 535 - Jean Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche:
HACL*: A Verified Modern Cryptographic Library. 536 - Wei Dai, Viet Tung Hoang, Stefano Tessaro:
Information-theoretic Indistinguishability via the Chi-squared Method. 537 - Sumegha Garg, Henry Yuen, Mark Zhandry:
New security notions and feasibility results for authentication of quantum data. 538 - Pratik Soni, Stefano Tessaro:
Public-Seed Pseudorandom Permutations. 539 - Jens Groth, Mary Maller:
Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs. 540 - Sanjam Garg
, Mohammad Mahmoody, Ameer Mohammed:
Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives. 541 - Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication. 542 - Nico Döttling, Sanjam Garg
:
Identity-Based Encryption from the Diffie-Hellman Assumption. 543 - Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev:
Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability. 544 - Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci:
Resource-efficient OT combiners with active security. 545 - Hitesh Tewari, Arthur Hughes, Stefan Weber, Tomas Barry:
X509CLOUD - Framework for a Ubiquitous PKI. 546 - Seyed Farhad Aghili, Hamid Mala:
Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce. 547 - Yarkin Doröz, Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Berk Sunar, William Whyte, Zhenfei Zhang:
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem. 548 - Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher:
ZeroTrace : Oblivious Memory Primitives from Intel SGX. 549 - Tore Kasper Frederiksen, Benny Pinkas, Avishay Yanai:
Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments. 550 - Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions. 551 - Yehuda Lindell:
Fast Secure Two-Party ECDSA Signing. 552 - Scott R. Fluhrer:
Further Analysis of a Proposed Hash-Based Signature Standard. 553 - Renaud Dubois:
Trapping ECC with Invalid Curve Bug Attacks. 554 - Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin:
Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion. 555 - Sankhanil Dey, Ranjan Ghosh:
Multiplication and Division over Extended Galois Field GF(pq): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF(pq). 556 - Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
:
Watermarking Public-key Cryptographic Functionalities and Implementations. 557 - (Withdrawn) Detecting Large Integer Arithmetic for Defense Against Crypto Ransomware. 558
- Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval:
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange. 559 - Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers:
Notes on the design and analysis of SIMON and SPECK. 560 - Yashvanth Kondi, Arpita Patra:
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic. 561 - Björn Haase, Benoît Labrique:
Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices. 562 - Jacob Alperin-Sheriff, Daniel Apon:
Weak is Better: Tightly Secure Short Signatures from Weak PRFs. 563 - Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Sourangshu Bhattacharya
:
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks. 564 - Pramod Subramanyan, Rohit Sinha, Ilia A. Lebedev, Srinivas Devadas, Sanjit A. Seshia:
A Formal Foundation for Secure Remote Execution of Enclaves. 565 - Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo:
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services. 566 - Elette Boyle, Yuval Ishai, Rafael Pass, Mary Wootters:
Can We Access a Database Both Locally and Privately? 567 - Ran Canetti, Justin Holmgren
, Silas Richelson:
Towards Doubly Efficient Private Information Retrieval. 568 - Yihua Zhang, Marina Blanton
, Fattaneh Bayatbabolghani:
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation. 569 - Anders P. K. Dalskov, Claudio Orlandi:
Assessing the No-Knowledge Property of SpiderOak ONE. 570 - Christophe Petit:
Faster Algorithms for Isogeny Problems using Torsion Point Images. 571 - Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Marten van Dijk:
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks. 572 - Bernardo Machado David, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol. 573 - (Withdrawn) A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment. 574
- Ehsan Ebrahimi Targhi, Dominique Unruh:
Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds. 575 - Zhengbin Liu, Yongqiang Li, Mingsheng Wang:
The Security of SIMON-like Ciphers Against Linear Cryptanalysis. 576 - Steffen Schulz, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser:
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors. 577 - Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun:
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation. 578 - Mridul Nandi:
Birthday Attack on Dual EWCDM. 579 - Riddhi Ghosal:
Analysing Relations involving small number of Monomials in AES S- Box. 580 - Gilles Dequen, Sorina Ionica, Monika Trimoska:
Parallel Collision Search with Radix Trees. 581 - Angela Jäschke, Frederik Armknecht:
(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation. 582 - (Withdrawn) Side-Channel Attacks on BLISS Lattice-Based Signatures - Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers. 583
- Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun:
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. 584 - Pavel Tarasov, Hitesh Tewari:
Internet Voting Using Zcash. 585 - Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry:
Deterministic, Stash-Free Write-Only ORAM. 586 - Georg Fuchsbauer:
Subversion-zero-knowledge SNARKs. 587 - Maciej Obremski, Maciej Skorski
:
Renyi Entropy Estimation Revisited. 588 - Juay Guan Hee:
An Attempt to Cryptanalyze A Partially Known Cipher Algorithm. 589 - Linru Zhang, Gongxian Zeng, Yuechen Chen, Siu-Ming Yiu, Nairen Cao, Zheli Liu:
Constant bandwidth ORAM with small block size using PIR operations. 590 - Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-based Ranging. 591 - Anja Becker, Dusan Kostic:
Speeding up lattice sieve with Xeon Phi coprocessor. 592 - Alessio Caminata, Elisa Gorla:
Solving Multivariate Polynomial Systems and an Invariant from Commutative Algebra. 593 - Robert Primas, Peter Pessl, Stefan Mangard:
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption. 594 - Wen Wang, Jakub Szefer, Ruben Niederhagen:
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes. 595 - Melissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson:
A Side-Channel Assisted Cryptanalytic Attack Against QcBits. 596 - Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain
, Dakshita Khurana, Amit Sahai:
Round Optimal Concurrent MPC via Strong Simulation. 597 - Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin E. Lauter:
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms. 598 - Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Michal Zajac:
A Subversion-Resistant SNARK. 599 - Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich:
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY. 600 - Wei Dai, Yarkin Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savas, Berk Sunar:
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme. 601 - Sean Bowe, Ariel Gabizon, Matthew D. Green:
A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK. 602 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes. 603 - Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz:
A Modular Analysis of the Fujisaki-Okamoto Transformation. 604 - Xavier Bultel, Pascal Lafourcade:
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures. 605 - Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter:
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. 606 - Edward Eaton:
Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model. 607 - Vincent Immler, Robert Specht, Florian Unterstein:
Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs. 608 - Alessandro Amadori, Federico Pintore, Massimiliano Sala:
On the discrete logarithm problem for prime-field elliptic curves. 609 - Céline Blondeau, Roberto Civino, Massimiliano Sala:
Differential Attacks: Using Alternative Operations. 610 - David S. Leslie, Chris Sherfield, Nigel P. Smart:
Multi-Rate Threshold FlipThem. 611 - Martin R. Albrecht, Amit Deo:
Large Modulus Ring-LWE >= Module-LWE. 612 - Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim:
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications. 613 - Mathias Wagner, Stefan Heyse:
Brute-Force Search Strategies for Single-Trace and Few - Traces Template Attacks on the DES Round Keys of a Recent Smart Card. 614 - Nabil Alkeilani Alkadri, Johannes Buchmann, Rachid El Bansarkhani, Juliane Krämer:
A Framework to Select Parameters for Lattice-Based Cryptography. 615 - Bingsheng Zhang, Hong-Sheng Zhou:
Digital Liquid Democracy: How to Vote Your Delegation Statement. 616 - Benny Applebaum, Ivan Damgård, Yuval Ishai, Michael Nielsen, Lior Zichron:
Secure Arithmetic Computation with Constant Computational Overhead. 617 - Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth:
CacheZoom: How SGX Amplifies The Power of Cache Attacks. 618 - Qiong Huang, Jianye Huang:
Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting. 619 - Eike Kiltz, Julian Loss:
The Algebraic Group Model and its Applications. 620 - Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte:
Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks. 621 - Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, Yu Sasaki:
GIFT: A Small Present. 622 - Marios O. Choudary, Pantelimon George Popescu:
Back to Massey: Impressively fast, scalable and tight security evaluation tools. 623 - Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede:
Fast Leakage Assessment. 624 - Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl:
How to Break Secure Boot on FPGA SoCs through Malicious Hardware. 625 - Hai Zhou, Ruifeng Jiang, Shuyu Kong:
CycSAT: SAT-Based Attack on Cyclic Logic Encryptions. 626 - Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom:
Sliding right into disaster: Left-to-right sliding windows leak. 627 - Miruna Rosca, Amin Sakzad, Ron Steinfeld, Damien Stehlé:
Middle-Product Learning With Errors. 628 - Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert:
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks. 629 - Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier:
Gimli: a cross-platform permutation. 630 - Ran Canetti, Amit Lichtenberg:
Certifying Trapdoor Permutations, Revisited. 631 - Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek:
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures. 632 - Léo Ducas, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé:
CRYSTALS - Dilithium: Digital Signatures from Module Lattices. 633 - Joppe W. Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Damien Stehlé:
CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM. 634 - Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski:
PERUN: Virtual Payment Channels over Cryptographic Currencies. 635 - Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, Chen-Mou Cheng:
Implementing 128-bit Secure MPKC Signatures. 636 - Anthony Journault, François-Xavier Standaert:
Very High Order Masking: Efficient Implementation and Security Evaluation. 637 - Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka:
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness. 638 - Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian:
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. 639 - Fabrice Benhamouda, Houda Ferradi, Rémi Géraud, David Naccache:
Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms. 640 - Chunsheng Gu:
Integer Version of Ring-LWE and its Applications. 641 - Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami:
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata. 642 - Morten Dahl, Valerio Pastro, Mathieu Poumeyrol:
Private Data Aggregation on a Budget. 643 - (Withdrawn) On Space-Scarce Economy In Blockchain Systems. 644
- Shay Gueron, Nicky Mouha:
SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security. 645 - Mehrdad Nojoumian:
Rational Trust Modeling. 646 - Subhamoy Maitra, Nishant Sinha, Akhilesh Siddhanti, Ravi Anand, Sugata Gangopadhyay:
A TMDTO Attack Against Lizard. 647 - Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Justin Cappos, Bryan Ford:
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. 648 - Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-based Authenticated Encryption: How Small Can We Go? 649 - Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada:
Efficient Public Trace and Revoke from Standard Assumptions. 650 - (Withdrawn) Rescuing LoRaWAN 1.0. 651
- Andrej Bogdanov, Alon Rosen:
Pseudorandom Functions: Three Decades Later. 652 - Fanbao Liu, Fengmei Liu:
Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions. 653 - Tom Eccles, Basel Halak:
A Secure and Private Billing Protocol for Smart Metering. 654 - Jiao Hu, Ruilin Li, Chaojing Tang:
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones. 655 - Lei Fan, Hong-Sheng Zhou:
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake). 656 - Sanjit Chatterjee, Sayantan Mukherjee, Tapas Pandit:
CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient. 657 - Avradip Mandal, John C. Mitchell, Hart William Montgomery, Arnab Roy:
Privacy for Targeted Advertising. 658 - Russell W. F. Lai, Sherman S. M. Chow:
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. 659 - Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou:
Profiling Good Leakage Models For Masked Implementations. 660 - Bernardo Ferreira, João Leitão, Henrique João L. Domingos:
MuSE: Multimodal Searchable Encryption for Cloud Applications. 661 - Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich:
A new signature scheme based on (U|U+V) codes. 662 - Thomas Unterluggauer, Mario Werner, Stefan Mangard:
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives. 663 - Paul Grubbs, Jiahui Lu, Thomas Ristenpart:
Message Franking via Committing Authenticated Encryption. 664 - Michael A. Raskin:
Lower bounds on communication for multiparty computation of multiple AND instances with secret sharing. 665 - Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner:
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. 666 - Andreas Hülsing, Joost Rijneveld, John M. Schanck, Peter Schwabe:
High-speed key encapsulation from NTRU. 667 - Sikhar Patranabis, Debdeep Mukhopadhyay:
Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs. 668 - Kwang Ho Kim, Junyop Choe, Song Yun Kim, Namsu Kim, Sekung Hong:
Speeding up Elliptic Curve Scalar Multiplication without Precomputation. 669 - Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas:
Private Set Intersection for Unequal Set Sizes with Mobile Applications. 670 - Alex Biryukov, Daniel Feher, Dmitry Khovratovich:
Guru: Universal Reputation Module for Distributed Consensus Protocols. 671 - Anat Paskin-Cherniavsky, Slava Radune:
Coding for interactive communication beyond threshold adversaries. 672 - Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta:
Differential Fault Analysis Automation. 673 - Mario Werner, Thomas Unterluggauer, Robert Schilling, David Schaffenrath, Stefan Mangard:
Transparent Memory Encryption and Authentication. 674 - Benedikt Auerbach, David Cash, Manuel Fersch, Eike Kiltz:
Memory-Tight Reductions. 675 - Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya:
Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC. 676 - Amanda Cristina Davi Resende, Diego F. Aranha:
Unbalanced Approximate Private Set Intersection. 677 - Akhilesh Siddhanti, Santanu Sarkar, Subhamoy Maitra, Anupam Chattopadhyay:
Differential Fault Attack on Grain v1, ACORN v3 and Lizard. 678 - Nils Löken:
Searchable Encryption with Access Control. 679 - Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe:
SOFIA: MQ-based signatures in the QROM. 680 - Alexandre de Castro:
Controlled-NOT function can provoke biased interpretation from Bell's test experiments. 681 - Alexandros Zacharakis, Panagiotis Grontas, Aris Pagourtzis:
Conditional Blind Signatures. 682 - Ruiyu Zhu, Yan Huang:
Efficient Privacy-Preserving Edit Distance and Beyond. 683 - Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and Efficient Scheme in Zerocash. 684 - Dongxi Liu, Nan Li, Jongkil Kim, Surya Nepal:
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication. 685 - Ren Zhang, Bart Preneel:
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol. 686 - (Withdrawn) Impossibility of Secure Multi-Party Products in Non-Abelian Groups. 687
- Marko Balogh, Edward Eaton, Fang Song:
Quantum Collision-Finding in Non-Uniform Random Functions. 688 - Yasufumi Hashimoto:
On the security of HMFEv. 689 - Po-Chun Kuo
, Wen-Ding Li, Yu-Wei Chen, Yuan-Che Hsu, Bo-Yuan Peng, Chen-Mou Cheng, Bo-Yin Yang:
Post-Quantum Key Exchange on FPGAs. 690 - Fanbao Liu, Fengmei Liu:
Universal Forgery and Key Recovery Attacks: Application to FKS, FKD and Keyak. 691 - Deepesh Data, Manoj Prabhakaran:
Towards Characterizing Securely Computable Two-Party Randomized Functions. 692 - Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers. 693 - Patrick McCorry, Ethan Heilman, Andrew Miller:
Atomically Trading with Roger: Gambling on the success of a hardfork. 694 - Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann:
Updatable Tokenization: Formal Definitions and Provably Secure Constructions. 695 - Hai Zhou:
A Humble Theory and Application for Logic Encryption. 696 - Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev:
Increasing the Lifetime of Symmetric Keys for the GCM Mode by Internal Re-keying. 697 - Sean Murphy, Rachel Player:
Noise Distributions in Homomorphic Ring-LWE. 698 - Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet:
Runtime Code Polymorphism as a Protection Against Side Channel Attacks. 699 - Johannes Buchmann, Denise Demirel, Lucas Schabhüser, Patrick Struck:
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability. 700 - Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. 701 - Shay Gueron, Yehuda Lindell:
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation. 702 - Helger Lipmaa:
Optimally Sound Sigma Protocols Under DCRA. 703 - Zhongxiang Zheng, Chunhuan Zhao, Haining Fan, Xiaoyun Wang:
A Key Backup Scheme Based on Bitcoin. 704 - Aikaterini Mitrokotsa, Cristina Onete
, Elena Pagnin, Mahesh Perera:
Multi-Hop Distance Estimation: How Far are You? 705 - Hugues Thiebeauld, Georges Gagnerot, Antoine Wurcker, Christophe Clavier:
SCATTER : A New Dimension in Side-Channel. 706 - Irene Giacomelli, Somesh Jha, C. David Page, Kyonghwan Yoon:
Privacy-Preserving Ridge Regression on Distributed Data. 707 - Tetsu Iwata, Yannick Seurin:
Reconsidering the Security Bound of AES-GCM-SIV. 708 - Sauvik Bhattacharya, Óscar García-Morchón, Ronald Rietman, Ludo Tolhuizen:
spKEX: An optimized lattice-based key exchange. 709 - Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia:
Distributed Computing with Channel Noise. 710 - Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, François-Xavier Standaert:
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model. 711 - Vasyl Ustimenko:
On desynchronised El Gamal algorithm. 712 - Paul Rösler, Christian Mainka, Jörg Schwenk:
More is Less: How Group Chats Weaken the Security of Instant Messengers Signal, WhatsApp, and Threema. 713