


default search action
IACR Cryptology ePrint Archive, Volume 2018
Volume 2018, 2018
- Benny Applebaum, Barak Arkis:
Conditional Disclosure of Secrets and d-Uniform Secret Sharing with Constant Information Rate. 1 - Çagdas Çalik, Meltem Sönmez Turan, René Peralta:
The Multiplicative Complexity of 6-variable Boolean Functions. 2 - Moni Naor, Benny Pinkas, Eyal Ronen:
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior. 3 - Stjepan Picek, Ioannis Petros Samiotis, Annelie Heuser, Jaehun Kim, Shivam Bhasin, Axel Legay:
On the Performance of Deep Learning for Side-channel Analysis. 4 - Xiao Wang, S. Dov Gordon, Jonathan Katz:
Simple and Efficient Two-Server ORAM. 5 - Liran Lerman, Stjepan Picek, Nikita Veshchikov, Olivier Markowitch:
Higher Order Side-Channel Attacks Resilient S-boxes. 6 - Qiong Huang, Hongbo Li:
An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks. 7 - Yu-Ao Chen, Xiao-Shan Gao:
Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems. 8 - Jérôme Courtois, Lokman A. Abbas-Turki, Jean-Claude Bajard:
Evaluation of Resilience of randomized RNS implementation. 9 - Thomas Agrikola, Dennis Hofheinz:
Interactively Secure Groups from Obfuscation. 10 - Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia:
Graded Encoding Schemes from Obfuscation. 11 - Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi Baradaran Tahoori:
An Inside Job: Remote Power Analysis Attacks on FPGAs. 12 - Benedikt Auerbach, Bertram Poettering:
Hashing solutions instead of generating problems: On the interactive certification of RSA moduli. 13 - Kaiyan Zheng, Peng Wang, Dingfeng Ye:
Ubiquitous Weak-key Classes of BRW-polynomial Function. 14 - Christian Badertscher, Ueli Maurer, Björn Tackmann:
On Composable Security for Digital Signatures. 15 - Murali Godi, Roopa Vishwanathan:
New Techniques for Public Key Encryption with Sender Recovery. 16 - Ben Smyth:
Verifiability of Helios Mixnet. 17 - Ariel Hamlin, Abhi Shelat, Mor Weiss, Daniel Wichs:
Multi-Key Searchable Encryption, Revisited. 18 - Daniel P. Martin, Luke Mather, Elisabeth Oswald:
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited. 19 - Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie:
Cryptanalysis of Compact-LWE Submitted to NIST PQC Project. 20 - Yu Chen, Baodong Qin, Haiyang Xue:
Regularly Lossy Functions and Their Applications. 21 - Ali El Kaafarani, Shuichi Katsumata:
Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices. 22 - Benedikt Auerbach, Mihir Bellare, Eike Kiltz:
Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups. 23 - Federico Giacon, Felix Heuer, Bertram Poettering:
KEM Combiners. 24 - Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures. 25 - Christopher Carr, Anamaria Costache, Gareth T. Davies
, Kristian Gjøsteen, Martin Strand:
Zero-Knowledge Proof of Decryption for FHE Ciphertexts. 26 - Martin Strand:
A verifiable shuffle for the GSW cryptosystem. 27 - Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz:
Compact Energy and Delay-aware Authentication. 28 - Johannes Blömer, Fabian Eidens, Jakob Juhnke:
Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. 29 - Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. 30 - Markus Jakobsson:
Secure Remote Attestation. 31 - (Withdrawn) Publicly Verifiable Proofs of Space. 32
- Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. 33 - San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Constant-size Group Signatures from Lattices. 34 - Lucas Schabhüser, Johannes Buchmann, Patrick Struck:
A Linearly Homomorphic Signature Scheme From Weaker Assumptions. 35 - Peter Scholl:
Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs. 36 - Georg Fuchsbauer, Romain Gay:
Weakly Secure Equivalence-Class Signatures from Standard Assumptions. 37 - Yuval Ishai, Manika Mittal, Rafail Ostrovsky:
On the Message Complexity of Secure Multiparty Computation. 38 - Gregor Seiler:
Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography. 39 - Seb Neumayer, Mayank Varia, Ittay Eyal:
An Analysis of Acceptance Policies For Blockchain Transactions. 40 - Takahiro Matsuda, Jacob C. N. Schuldt:
Related Randomness Security for Public Key Encryption, Revisited. 41 - Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy:
Improved (Almost) Tightly-Secure Structure-Preserving Signatures. 42 - Chaya Ganesh, Yashvanth Kondi, Arpita Patra, Pratik Sarkar:
Efficient Adaptively Secure Zero-knowledge from Garbled Circuits. 43 - Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka:
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem. 44 - Jonathan Bootle, Jens Groth:
Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials. 45 - Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, Michael Riabzev:
Scalable, transparent, and post-quantum secure computational integrity. 46 - Boris Ryabko, Aleksandr Soskov:
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA. 47 - Alireza Mehrdad, Farokhlagha Moazami, Hadi Soleimany:
Impossible Differential Cryptanalysis on Deoxys-BC-256. 48 - Alex Biryukov, Aleksei Udovenko:
Attacks and Countermeasures for White-box Designs. 49 - Christian Badertscher, Fabio Banfi, Ueli Maurer:
A Constructive Perspective on Signcryption Security. 50 - Eftychios Theodorakis, John C. Mitchell:
Semantic Security Invariance under Variant Computational Assumptions. 51 - Mohammad Etemad, Mohammad Mahmoody, David Evans:
Optimizing Trees for Static Searchable Encryption. 52 - Emmanuel Prouff, Rémi Strullu, Ryad Benadjila, Eleonora Cagli, Cécile Dumas:
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database. 53 - Romain Gay, Dennis Hofheinz, Lisa Kohl, Jiaxin Pan:
More Efficient (Almost) Tightly Secure Structure-Preserving Signatures. 54 - Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl:
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction. 55 - François Gérard, Keno Merckx:
Post-Quantum Signcryption From Lattice-Based Signatures. 56 - Foteini Baldimtsi, Sharon Goldberg, Leonid Reyzin, Omar Sagga:
Certifying RSA Public Keys with an Efficient NIZK. 57 - Divesh Aggarwal, Tomasz Kazana, Maciej Obremski:
Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters. 58 - Chen-Dong Ye, Tian Tian:
New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC. 59 - Abhinav Aggarwal, Yue Guo:
A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks. 60 - Pratish Datta, Tatsuaki Okamoto, Junichi Tomida:
Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the k-Linear Assumption. 61 - Na-Young Ahn, Dong Hoon Lee:
Countermeasures against a side-channel attack in a kernel memory. 62 - Panos Kampanakis, Peter Panburana, Ellie Daw, Daniel Van Geest:
The Viability of Post-quantum X.509 Certificates. 63 - Sukanya Saha, Krishnendu Rarhi, Abhishek Bhattacharya:
Systematization Of A 256-Bit Lightweight Block Cipher Marvin. 64 - Claude Crépeau, Nan Yang:
New Perspectives on Multi-Prover Interactive Proofs. 65 - Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Tweaking Generic OTR to Avoid Forgery Attacks. 66 - Hao Chen, Kyoohyung Han:
Homomorphic Lower Digits Removal and Improved FHE Bootstrapping. 67 - Gregory Maxwell, Andrew Poelstra, Yannick Seurin, Pieter Wuille:
Simple Schnorr Multi-Signatures with Applications to Bitcoin. 68 - Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud:
Reusing Nonces in Schnorr Signatures. 69 - Craig Gentry, Adam O'Neill, Leonid Reyzin:
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures. 70 - Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas:
Exploiting Ineffective Fault Inductions on Symmetric Cryptography. 71 - Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay:
Template-based Fault Injection Analysis of Block Ciphers. 72 - Chiraag Juvekar, Vinod Vaikuntanathan, Anantha P. Chandrakasan:
GAZELLE: A Low Latency Framework for Secure Neural Network Inference. 73 - Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, Xiaoqian Jiang:
Secure Logistic Regression based on Homomorphic Encryption. 74 - Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang:
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes. 75 - Daniel Dinu, Ilya Kizhvatov:
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread. 76 - Daniele Micciancio, Michael Walter:
On the Bit Security of Cryptographic Primitives. 77 - Alexander Chepurnoy, Vasily Kharin, Dmitry Meshkov:
A Systematic Approach To Cryptocurrency Fees. 78 - Thijs Laarhoven, Artur Mariano:
Progressive lattice sieving. 79 - Benjamin Dowling, Kenneth G. Paterson:
A Cryptographic Analysis of the WireGuard Protocol. 80 - Jintai Ding, Saraswathy RV, Saed Alsayigh, Crystal Clough:
How to validate the secret of a Ring Learning with Errors (RLWE) key. 81 - Susan Hohenberger, Brent Waters:
Synchronized Aggregate Signatures from the RSA Assumption. 82 - Maki Yoshida, Satoshi Obana:
Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017. 83 - Gideon Samid:
Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher. 84 - Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin:
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version). 85 - Claude Carlet, Xi Chen:
Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform. 86 - Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. 87 - Masahiro Yagisawa:
Fully homomorphic public-key encryption with small ciphertext size. 88 - Marcos A. Simplício Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos V. M. Silva:
The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications. 89 - Cédric Van Rompay, Refik Molva, Melek Önen:
Secure and Scalable Multi-User Searchable Encryption. 90 - Alessandro De Piccoli, Andrea Visconti, Ottavio Giulio Rizzo:
Polynomial multiplication over binary finite fields: new upper bounds. 91 - Kerem Varici, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Constructions of S-boxes with uniform sharing. 92 - Kenneth G. Paterson, Jacob C. N. Schuldt:
Statistical Attacks on Cookie Masking for RC4. 93 - Linh Tung Vo:
Parameterization of Edwards curves on the rational field Q with given torsion subgroups. 94 - Cees-Bart Breunesse, Ilya Kizhvatov, Ruben Muijrers, Albert Spruyt:
Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage. 95 - Fan Zhang, Philip Daian, Iddo Bentov, Ari Juels:
Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More. 96 - Andrea Visconti, Federico Gorla:
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2. 97 - Louis Goubin, Pascal Paillier, Matthieu Rivain, Junwei Wang:
How to Reveal the Secrets of an Obscure White-Box Implementation. 98 - Ignacio Cascudo, Jaron Skovsted Gundersen, Diego Ruano:
Improved Bounds on the Threshold Gap in Ramp Secret Sharing. 99 - Hart William Montgomery:
A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples. 100 - Mustafa A. Mustafa, Sara Cleemput, Abdelrahaman Aly, Aysajan Abidin:
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection. 101 - Laurent Castelnovi, Ange Martinelli, Thomas Prest:
Grafting Trees: a Fault Attack against the SPHINCS framework. 102 - Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Decomposition of Permutations in a Finite Field. 103 - Yonatan Sompolinsky, Aviv Zohar:
PHANTOM: A Scalable BlockDAG Protocol. 104 - Michele Ciampi, Claudio Orlandi:
Combining Private Set-Intersection with Secure Two-Party Computation. 105 - Sebastian Berndt, Maciej Liskiewicz:
On the Gold Standard for Security of Universal Steganography. 106 - Carsten Baum, Huang Lin, Sabine Oechsner:
Towards Practical Lattice-Based One-Time Linkable Ring Signatures. 107 - F. Betül Durak, Serge Vaudenay:
Generic Round-Function Recovery for Feistel Networks over Small Domains. 108 - Soda Diop, Bernard Ousmane Sané, Nafissatou Diarra, Michel Seck:
NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme. 109 - John Baena, Daniel Cabarcas, Daniel E. Escudero, Karan Khathuria, Javier A. Verbel:
Rank Analysis of Cubic Multivariate Cryptosystems. 110 - Håvard Raddum, Pavol Zajac:
MRHS Solver Based on Linear Algebra and Exhaustive Search. 111 - Benjamin Harsha, Jeremiah Blocki:
Just in Time Hashing. 112 - Lauren De Meyer, Begül Bilgin
:
Classification of Balanced Quadratic Functions. 113 - Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Offline Assisted Group Key Exchange. 114 - Itai Dinur:
An Improved Affine Equivalence Algorithm for Random Permutations. 115 - Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee:
Unbounded ABE via Bilinear Entropy Expansion, Revisited. 116 - Shai Halevi, Yuriy Polyakov, Victor Shoup:
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme. 117 - Anja Lehmann, Björn Tackmann:
Updatable Encryption with Post-Compromise Security. 118 - Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom:
Drive-by Key-Extraction Cache Attacks from Portable Code. 119 - Benny Pinkas, Thomas Schneider, Christian Weinert, Udi Wieder:
Efficient Circuit-based PSI via Cuckoo Hashing. 120 - Daniel R. L. Brown:
ECC mod 8^91+5. 121 - Massimo Bartoletti, Roberto Zunino:
BitML: a calculus for Bitcoin smart contracts. 122 - Howard M. Heys:
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode). 123 - Nguyen Tuan Anh, Nguyen Bui Cuong:
Evaluating the indistinguishability of the XTS mode in the proposed security model. 124 - Vlad-Raul Pasca, Emil Simion:
Challenges in cyber security - Ransomware Phenomenon. 125 - Phillip Rogaway, Yusi Zhang:
Onion-AE: Foundations of Nested Encryption. 126 - Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in Security Protocols. 127 - Charanjit S. Jutla:
Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation. 128 - Tuyet Duong, Alexander Chepurnoy, Hong-Sheng Zhou:
Multi-mode Cryptocurrency Systems. 129 - Mojtaba Zaheri, Babak Sadeghiyan:
SMT-based Cube Attack on Simeck32/64. 130 - Ran Canetti, Yilei Chen, Leonid Reyzin, Ron D. Rothblum:
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption. 131 - Gora Adj, Omran Ahmadi, Alfred Menezes:
On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields. 132 - Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. 133 - Ayan Mahalanobis, Vivek Mallick:
A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem. 134 - Daniel Jost, Christian Badertscher, Fabio Banfi:
A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT. 135 - Priyanka Bose, Viet Tung Hoang, Stefano Tessaro:
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds. 136 - Pratik Soni, Stefano Tessaro:
Naor-Reingold Goes Public: The Complexity of Known-key Security. 137 - Christian Badertscher, Juan A. Garay, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin. 138 - (Withdrawn) Faster Multiplication Triplet Generation from Homomorphic Encryption for Practical Privacy-Preserving Machine Learning under a Narrow Bandwidth. 139
- Tomás Fabsic, Viliam Hromada, Pavol Zajac:
A Reaction Attack on LEDApkc. 140 - Baiyu Li, Daniele Micciancio:
Symbolic security of garbled circuits. 141 - Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC. 142 - Shahram Khazaei:
Conjecturally Superpolynomial Lower Bound for Share Size. 143 - Benny Applebaum, Thomas Holenstein, Manoj Mishra, Ofer Shayevitz:
The Communication Complexity of Private Simultaneous Messages, Revisited. 144 - Bin Zhang, Chao Xu, Willi Meier:
Fast Near Collision Attack on the Grain v1 Stream Cipher. 145 - Léo Ducas, Cécile Pierrot:
Polynomial Time Bounded Distance Decoding near Minkowski's Bound in Discrete Logarithm Lattices. 146 - Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak:
Sustained Space Complexity. 147 - Amos Beimel, Eyal Kushilevitz, Pnina Nissim:
The Complexity of Multiparty PSM Protocols and Related Models. 148 - Ilan Komargodski, Eylon Yogev:
Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation. 149 - Tim Fritzmann, Thomas Pöppelmann, Johanna Sepúlveda:
Analysis of Error-Correcting Codes for Lattice-Based Key Exchange. 150 - Sanjam Garg
, Akshayaram Srinivasan:
Adaptively Secure Garbling with Near Optimal Online Complexity. 151 - Jung-Keun Lee, Bonwook Koo, Woo-Hwan Kim:
Related-Key Linear Cryptanalysis on SIMON. 152 - Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song:
Bootstrapping for Approximate Homomorphic Encryption. 153 - Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Constrained PRFs for NC1 in Traditional Groups. 154 - Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Memory Lower Bounds of Reductions Revisited. 155 - Sanjam Garg
, Susumu Kiyoshima, Omkant Pandey:
A New Approach to Black-Box Concurrent Secure Computation. 156 - Bernardo David, Rafael Dowsley, Mario Larangeira:
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement. 157 - Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin:
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. 158 - Gaëtan Leurent, Ferdinand Sibleyras:
The Missing Difference Problem, and its Applications to Counter Mode Encryption. 159 - Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:
DelegaTEE: Brokered Delegation Using Trusted Execution Environments. 160 - Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Boomerang Connectivity Table: A New Cryptanalysis Tool. 161 - Jean Paul Degabriele, Martijn Stam:
Untagging Tor: A Formal Treatment of Onion Encryption. 162 - Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks. 163 - Pavel Hubácek, Alon Rosen, Margarita Vald:
An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge. 164 - Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven:
The Wonderful World of Global Random Oracles. 165 - Atul Luykx, Bart Preneel:
Optimal Forgeries Against Polynomial-Based MACs and GCM. 166 - Nils Fleischhacker, Vipul Goyal, Abhishek Jain
:
On the Existence of Three Round Zero-Knowledge Proofs. 167 - Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Statistical Witness Indistinguishability (and more) in Two Messages. 168 - Srimanta Bhattacharya, Mridul Nandi:
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the χ2 Method. 169 - Miruna Rosca, Damien Stehlé, Alexandre Wallet:
On the Ring-LWE and Polynomial-LWE problems. 170 - Yi-Hsiu Chen, Kai-Min Chung, Jyun-Jie Liao:
On the Complexity of Simulating Auxiliary Input. 171 - Felix Wegener, Amir Moradi:
A First-Order SCA Resistant AES without Fresh Randomness. 172 - Benjamin Grégoire, Kostas Papagiannopoulos, Peter Schwabe, Ko Stoffelen:
Vectorizing Higher-Order Masking. 173 - Chen-Dong Ye, Tian Tian:
A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers. 174 - Vincent Grosso:
Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys. 175 - Kamil Kluczniak, Man Ho Au:
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability. 176 - Houssem Maghrebi, Emmanuel Prouff:
On the Use of Independent Component Analysis to Denoise Side-Channel Measurements. 177 - Ken Goss, Wei Jiang:
Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations. 179 - Sanjam Garg
, Peihan Miao, Akshayaram Srinivasan:
Two-Round Multiparty Secure Computation Minimizing Public Key Operations. 180 - Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A cipher with low ANDdepth and few ANDs per bit. 181 - Lorenzo Grassi, Christian Rechberger:
New Rigorous Analysis of Truncated Differentials for 5-round AES. 182 - Bram Cohen, Krzysztof Pietrzak:
Simple Proofs of Sequential Work. 183 - Yongjun Zhao, Sherman S. M. Chow:
Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI. 184 - Marcos A. Simplício Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos V. M. Silva:
A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks. 185 - Daniel R. L. Brown:
RKHD ElGamal signing and 1-way sums. 186 - Sean Bowe, Ariel Gabizon:
Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model. 187 - Stephen D. Miller, Noah Stephens-Davidowitz:
Generalizations of Banaszczyk's transference theorems and tail bound. 188 - Pascal Sasdrich, René Bock, Amir Moradi:
Threshold Implementation in Software - Case Study of PRESENT. 189 - Sikhar Patranabis, Debdeep Mukhopadhyay:
New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption. 190 - Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version). 191 - Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, Roberto Zunino:
SoK: unraveling Bitcoin smart contracts. 192 - Michael Scott:
A New Family of Pairing-Friendly elliptic curves. 193 - Krzysztof Pietrzak:
Proofs of Catalytic Space. 194 - Ghous Amjad, Seny Kamara, Tarik Moataz:
Breach-Resistant Structured Encryption. 195 - Benjamin Timon:
Non-Profiled Deep Learning-Based Side-Channel Attacks. 196 - Philippe Jacquet, Bernard Mans:
Green Mining: toward a less energetic impact of cryptocurrencies. 197 - Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier:
A Key-recovery Attack on 855-round Trivium. 198 - David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, Christoph Striecks
:
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange. 199 - Eugene Pilyankevich, Ignat Korchagin, Andrey Mnatsakanov:
Hermes. A framework for cryptographically assured access control and data security. 200 - Jim Basilakis, Bahman Javadi:
Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers. 201 - Jack L. H. Crawford, Craig Gentry, Shai Halevi, Daniel Platt, Victor Shoup:
Doing Real Work with FHE: The Case of Logistic Regression. 202 - Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Falk Schellenberg, Tobias Schneider:
Impeccable Circuits. 203 - Serge Fehr, Pierre Karpman, Bart Mennink:
Short Non-Malleable Codes from Related-Key Secure Block Ciphers. 204 - Thaddeus Dryja, Quanquan C. Liu, Sunoo Park:
Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling. 205 - Edouard Dufour Sans, Romain Gay, David Pointcheval:
Reading in the Dark: Classifying Encrypted Digits with Functional Encryption. 206 - Marshall Ball
, Dana Dachman-Soled, Siyao Guo, Tal Malkin, Li-Yang Tan:
Non-Malleable Codes for Small-Depth Circuits. 207 - Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez:
TinyKeys: A New Approach to Efficient Multi-Party Computation. 208 - Eleftherios Kokoris-Kogias, Enis Ceyhun Alp, Sandra Deepthy Siby, Nicolas Gailly, Philipp Jovanovic, Linus Gasser, Bryan Ford:
Hidden in Plain Sight: Storing and Managing Secrets on a Public Ledger. 209 - Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi:
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards. 210 - Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay:
Number "Not" Used Once - Key Recovery Fault Attacks on LWE Based Lattice Cryptographic Schemes. 211 - Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan:
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts. 212 - Iain Stewart, Dragos Ioan Ilie, Alexei Zamyatin, Sam Werner, M. F. Torshizi, William J. Knottenbelt:
Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack. 213 - Ahmad Khoureich Ka:
R-MAC - A lightwheight authentication protocol for RFID Tags. 214 - Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis, Bingsheng Zhang:
Towards everlasting privacy and efficient coercion resistance in remote electronic voting. 215 - S. Dov Gordon, Samuel Ranellucci, Xiao Wang:
Secure Computation with Low Communication from Cross-checking. 216 - Mihir Bellare, Wei Dai:
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction. 217 - Jakub Breier, Xiaolu Hou, Yang Liu:
Fault Resilient Encoding Schemes in Software: How Far Can We Go? 218 - Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin:
On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering. 219 - Shruti Tople, Yaoqi Jia, Prateek Saxena:
PRO-ORAM: Constant Latency Read-Only Oblivious RAM. 220 - Jeremiah Blocki, Ling Ren, Samson Zhou:
Bandwidth-Hard Functions: Reductions and Lower Bounds. 221 - Elizabeth A. Quaglia, Ben Smyth:
Authentication with weaker trust assumptions for voting systems. 222 - Bertram Poettering:
Shorter double-authentication preventing signatures for small address spaces. 223 - Rhys Carlton, Aleksander Essex, Krzysztof Kapulkin:
Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons. 224 - Ben Smyth:
A foundation for secret, verifiable elections. 225 - Sandro Coretti, Yevgeniy Dodis, Siyao Guo:
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models. 226 - Wei-Kai Lin, Elaine Shi, Tiancheng Xie:
Can We Overcome the n log n Barrier for Oblivious Sorting? 227 - Georg Fuchsbauer, Michele Orrù:
Non-interactive zaps of knowledge. 228 - Wei Dai, William Whyte, Zhenfei Zhang:
Optimizing polynomial convolution for NTRUEncrypt. 229 - Jan-Pieter D'Anvers, Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren:
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM. 230 - Zhengjun Cao, Lihua Liu:
Remarks on Bell's Inequality. 231 - Masahiro Yagisawa:
Improved fully homomorphic public-key encryption with small ciphertext size. 232 - Charlotte Bonte, Frederik Vercauteren:
Privacy-Preserving Logistic Regression Training. 233 - Hagen Sparka, Florian Tschorsch, Björn Scheuermann:
P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations. 234 - Julian Loss, Tal Moran:
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds. 235 - Yuval Marcus, Ethan Heilman, Sharon Goldberg:
Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network. 236 - Julia Hesse, Dennis Hofheinz, Lisa Kohl:
On Tightly Secure Non-Interactive Key Exchange. 237 - Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky:
Private Set Intersection with Linear Communication from General Assumptions. 238 - Jiangshan Yu, David Kozhaya, Jérémie Decouchant, Paulo Jorge Esteves Veríssimo:
RepuCoin: Your Reputation is Your Power. 239 - Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki
:
Towards Non-Interactive Zero-Knowledge for NP from LWE. 240 - Neha Narula, Willy Vasquez, Madars Virza:
zkLedger: Privacy-Preserving Auditing for Distributed Ledgers. 241 - Sudhakar Kumawat, Souradyuti Paul:
A New Constant-size Accountable Ring Signature Scheme Without Random Oracles. 242 - Indra Deep Mastan, Souradyuti Paul:
A New Approach to Deanonymization of Unreachable Bitcoin Nodes. 243 - Shai Halevi, Victor Shoup:
Faster Homomorphic Linear Transformations in HElib. 244 - Adi Akavia, Dan Feldman, Hayim Shaul:
Secure Search via Multi-Ring Fully Homomorphic Encryption. 245 - Chris Culnane, Olivier Pereira, Kim Ramchen, Vanessa Teague:
Universally Verifiable MPC with Applications to IRV Ballot Counting. 246 - Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz:
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset. 247 - Peter Gazi, Aggelos Kiayias, Alexander Russell:
Stake-Bleeding Attacks on Proof-of-Stake Blockchains. 248 - Zhengjun Cao, Jeffrey Uhlmann, Lihua Liu:
Analysis of Deutsch-Jozsa Quantum Algorithm. 249 - Xiong Fan, Qiang Tang:
Making Public Key Functional Encryption Function Private, Distributively. 250 - Rohit Sinha, Mihai Christodorescu:
VeritasDB: High Throughput Key-Value Store with Integrity. 251 - Yongge Wang, Qutaibah M. Malluhi:
The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract. 252 - Nadim Kobeissi:
Capsule: A Protocol for Secure Collaborative Document Editing. 253 - Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, Jung Hee Cheon:
Logistic Regression Model Training based on the Approximate Homomorphic Encryption. 254 - Rio LaVigne, Chen-Da Liu Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi:
Topology-Hiding Computation Beyond Semi-Honest Adversaries. 255 - Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier:
QC-MDPC: A Timing Attack and a CCA2 KEM. 256 - Tore Vincent Carstens, Ehsan Ebrahimi
, Gelo Noel Tabia, Dominique Unruh:
On Quantum Indifferentiability. 257 - Alya Geogiana Buja, Shekh Faisal Abdul-Latip, Rabiah Ahmad:
Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers. 258 - Zheng Yang, Kimmo Järvinen:
The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption. 259 - Sébastien Duval, Gaëtan Leurent:
MDS Matrices with Lightweight Circuits. 260 - Dan Boneh, Saba Eskandarian, Ben Fisch:
Post-Quantum Group Signatures from Symmetric Primitives. 261 - Joachim Zahnentferner:
Chimeric Ledgers: Translating and Unifying UTXO-based and Account-based Cryptocurrencies. 262 - (Withdrawn) An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications. 263
- Daan Leermakers, Boris Skoric:
Security proof for Quantum Key Recycling with noise. 264 - Ayesha Khalid, James Howe, Ciara Rafferty, Francesco Regazzoni, Máire O'Neill:
Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography. 265 - Steven D. Galbraith:
Authenticated key exchange for SIDH. 266 - Patrick Longa:
A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies. 267 - Michael A. Raskin, Mark Simkin:
Oblivious RAM with Small Storage Overhead. 268 - Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich:
Vault: Fast Bootstrapping for Cryptocurrencies. 269 - Douglas R. Stinson:
A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later. 270 - Borching Su:
MathCoin: A Blockchain Proposal that Helps Verify Mathematical Theorems In Public. 271 - Sam Kim, David J. Wu:
Multi-Theorem Preprocessing NIZKs from Lattices. 272 - Prabhanjan Ananth, Xiong Fan:
Attribute Based Encryption for RAMs from LWE. 273 - Rachid El Bansarkhani, Rafael Misoczki:
G-Merkle: A Hash-Based Group Signature Scheme From Standard Assumptions. 274 - Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù:
Lattice-Based zk-SNARKs from Square Span Programs. 275 - Mark Zhandry:
How to Record Quantum Queries, and Applications to Quantum Indifferentiability. 276 - Sebastian Meiser:
Approximate and Probabilistic Differential Privacy Definitions. 277 - Rémi Géraud, David Naccache:
Mixed-radix Naccache-Stern encryption. 278 - Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs:
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing. 279 - Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, Ian Miers:
Updatable and Universal Common Reference Strings with Applications to zk-SNARKs. 280 - Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, Brent Waters:
Upgrading to Functional Encryption. 281 - Jason T. LeGrow, David Jao, Reza Azarderakhsh:
Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol. 282 - Gizem S. Çetin, Berk Sunar:
Homomorphic Rank Sort Using Surrogate Polynomials. 283 - Qichun Wang:
Hadamard Matrices, d-Linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights. 284 - Iraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, Bart Preneel:
Collateral Damage of Facebook Applications: a Comprehensive Study. 285 - Björn Haase, Benoît Labrique:
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT. 286 - Atanu Basu, Indranil Sengupta:
Secure Cloud Storage Scheme Based On Hybrid Cryptosystem. 287 - Ke Gu, Na Wu:
Constant Size Traceable Ring Signature Scheme without Random Oracles. 288 - Phillipp Schoppmann, Adrià Gascón, Borja Balle:
Private Nearest Neighbors Classification in Federated Databases. 289 - Vireshwar Kumar, He Li, Noah Luther, Pranav Asokan, Jung-Min "Jerry" Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati:
Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System. 290 - Guido Marco Bertoni, Lorenzo Grassi, Filippo Melzani:
Simulations of Optical Emissions for Attacking AES and Masked AES. 291 - Brice Minaud:
Linear Biases in AEGIS Keystream. 292 - Eshan Chattopadhyay, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar:
Privacy Amplification from Non-malleable Codes. 293 - Yang Yu, Léo Ducas:
Learning strikes again: the case of the DRS signature scheme. 294 - Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta:
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers. 295 - Bertram Poettering, Paul Rösler:
Ratcheted key exchange, revisited. 296 - Matteo Campanelli, Rosario Gennaro:
Fine-Grained Secure Computation. 297 - Luke Valenta, Nick Sullivan, Antonio Sanso, Nadia Heninger:
In search of CurveSwap: Measuring elliptic curve implementations in the wild. 298 - Stephen Farrell:
Clusters of Re-used Keys. 299 - Pascal Mainini, Rolf Haenni:
Outsourcing Modular Exponentiation in Cryptographic Web Applications. 300 - Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff:
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography. 301 - Rafael Pass, Elaine Shi:
Rethinking Large-Scale Consensus. 302 - Bernardo David, Rafael Dowsley, Mario Larangeira:
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State. 303 - Peizhao Hu, Sherman S. M. Chow, Asma Aloufi:
Geosocial Query with User-Controlled Privacy. 304 - Olivier Bernard, Renaud Dubois, Simon Masson:
Efficient four-dimensional GLV curve with high security. 305 - Chris Brzuska, Antoine Delignat-Lavaud, Konrad Kohbrok, Markulf Kohlweiss:
State-Separating Proofs: A Reduction Methodology for Real-World Protocols. 306 - Travis Scholl:
Isolated Curves and the MOV Attack. 307 - Anat Paskin-Cherniavsky:
On Perfectly Secure 2PC in the OT-hybrid model. 308 - (Withdrawn) Error Estimation of Practical Convolution Discrete Gaussian Sampling. 309
- Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. 310 - Bita Darvish Rouhani, Huili Chen, Farinaz Koushanfar
:
DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models. 311 - Chunsheng Gu:
Multilinear maps via secret ring. 312 - Gora Adj, Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez, Alfred Menezes, Francisco Rodríguez-Henríquez:
On the cost of computing isogenies between supersingular elliptic curves. 313 - Sergiu Carpov, Thibaud Tortech:
Secure top most significant genome variants search: iDASH 2017 competition. 314 - Dahmun Goudarzi, Anthony Journault, Matthieu Rivain, François-Xavier Standaert:
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison. 315 - Vipul Goyal, Ashutosh Kumar:
Non-Malleable Secret Sharing. 316 - Dor Fledel, Avishai Wool:
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock. 317 - Ward Beullens, Simon R. Blackburn:
Practical attacks against the Walnut digital signature scheme. 318 - Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
HydRand: Practical Continuous Distributed Randomness. 319 - Stefan Dziembowski, Sebastian Faust, Kristina Hostáková:
Foundations of State Channel Networks. 320 - David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
:
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications. 321 - Huili Chen, Bita Darvish Rohani, Farinaz Koushanfar
:
DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks. 322 - Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks. 323 - Marcos A. Simplício Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos V. M. Silva:
ACPC: Efficient revocation of pseudonym certificates using activation codes. 324 - John M. Schanck:
Multi-power Post-quantum RSA. 325 - (Withdrawn) Verifier Non-Locality in Interactive Proofs. 326
- Zhengjun Cao, Lihua Liu:
A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System. 327 - Luk Bettale, Jean-Sébastien Coron, Rina Zeitoun:
Improved High-Order Conversion From Boolean to Arithmetic Masking. 328 - Pasquale Malacaria, M. H. R. Khouzani, Corina S. Pasareanu, Quoc-Sang Phan, Kasper Søe Luckow:
Symbolic Side-Channel Analysis for Probabilistic Programs. 329 - Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang:
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. 330 - Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer:
Estimate all the {LWE, NTRU} schemes! 331 - Ralph Ankele, Eik List:
Differential Cryptanalysis of Round-Reduced Sparx-64/128. 332 - Tianren Liu, Vinod Vaikuntanathan:
Breaking the Circuit-Size Barrier in Secret Sharing. 333 - Dong Yang, Wen-Feng Qi, Hua-Jin Chen:
Impossible Differential Attack on QARMA Family of Block Ciphers. 334 - Nir Drucker, Shay Gueron:
Fast modular squaring with AVX512IFMA. 335 - David Urbanik, David Jao:
SoK: The Problem Landscape of SIDH. 336 - Marc Fischlin, Patrick Harasser:
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent. 337 - Zvika Brakerski:
Quantum FHE (Almost) As Secure as Classical. 338 - Thomas Debris-Alazard, Jean-Pierre Tillich:
A polynomial attack on a NIST proposal: RankSign, a code-based signature in rank metric. 339 - Johannes Blömer, Jan Bobolz:
Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures. 340 - William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj:
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers. 341 - Ralph Ankele, Florian Böhl, Simon Friedberger:
MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth. 342 - Duc Viet Le, Mahimna Kelkar, Aniket Kate:
Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments. 343 - Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente:
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection. 344 - Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini:
In-region Authentication. 345 - Rishab Goyal, Venkata Koppula, Brent Waters:
Collusion Resistant Traitor Tracing from Learning with Errors. 346 - Stanislaw Jarecki, Boyang Wei:
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval. 347 - Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Monero Ring Attack: Recreating Zero Mixin Transaction Effect. 348 - Joanne Woodage, Dan Shumow:
An Analysis of the NIST SP 800-90A Standard. 349 - Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk:
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks. 350 - Miloslav Homer:
A Chosen Plaintext Attack on Offset Public Permutation Mode. 351 - Kai-Min Chung, Marios Georgiou, Ching-Yi Lai, Vassilis Zikas:
Cryptography with Dispensable Backdoors. 352 - Xin Li:
Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions. 353 - Nicola Tuveri, Billy Bob Brumley:
Start your ENGINEs: dynamically loadable contemporary crypto. 354 - Leon Groot Bruinderink, Peter Pessl:
Differential Fault Attacks on Deterministic Lattice Signatures. 355 - Jheyne N. Ortiz, Robson R. de Araujo, Ricardo Dahab, Diego F. Aranha, Sueli I. R. Costa:
In Praise of Twisted Canonical Embedding. 356 - Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Stefan Mangard, Florian Mendel, Robert Primas:
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures. 357 - Yansong Gao, Chenglu Jin, Jeeson Kim, Hussein Nili, Xiaolin Xu, Wayne P. Burleson, Omid Kavehei, Marten van Dijk, Damith Chinthana Ranasinghe, Ulrich Rührmair:
Efficient Erasable PUFs from Programmable Logic and Memristors. 358 - (Withdrawn) Privacy-Preserving Multibiometric Authentication in Cloud with Untrusted Database Providers. 359
- Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee:
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates. 360 - Zheng Yang, Yu Chen, Song Luo:
Two-message Key Exchange with Strong Security from Ideal Lattices. 361 - Marc Fischlin, Christian Janson, Sogol Mazaheri:
Backdoored Hash Functions: Immunizing HMAC and HKDF. 362 - Ariel Hamlin, Rafail Ostrovsky, Mor Weiss, Daniel Wichs:
Private Anonymous Data Access. 363 - T.-H. Hubert Chan, Kartik Nayak, Elaine Shi:
Perfectly Secure Oblivious Parallel RAM. 364 - Ahmad Ahmadi, Reihaneh Safavi-Naini, Md. Mamunur Rashid Akand:
Anonymous Distance-Bounding Identification. 365 - Ahmad Ahmadi, Reihaneh Safavi-Naini:
Directional Distance-Bounding Identification Protocols. 366 - Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley:
Cache-Timing Attacks on RSA Key Generation. 367 - (Withdrawn) Encryption with Untrusted Keys: Security against Chosen Objects Attack. 368
- Hyung Tae Lee, Huaxiong Wang, Kai Zhang:
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. 369 - A. V. Menyachikhin:
Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters. 370 - Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter, Travis Morrison, Christophe Petit:
Supersingular isogeny graphs and endomorphism rings: reductions and solutions. 371 - Alexander R. Block, Divya Gupta, Hemanta K. Maji, Hai H. Nguyen:
Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions). 372 - Sarvar Patel, Giuseppe Persiano, Mariana Raykova, Kevin Yeo:
PanORAMa: Oblivious RAM with Logarithmic Overhead. 373 - Zhenzhen Bao, Jian Guo, Lei Wang:
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions. 374 - Zvika Brakerski, Yael Tauman Kalai:
Monotone Batch NP-Delegation with Applications to Access Control. 375 - Joppe W. Bos, Simon Friedberger:
Arithmetic Considerations for Isogeny Based Cryptography. 376 - Jing Chen, Sergey Gorbunov, Silvio Micali, Georgios Vlachos:
ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement. 377 - Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability. 378 - Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta
, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). 379 - Jonathan Bootle, Andrea Cerulli, Jens Groth, Sune K. Jakobsen, Mary Maller:
Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution. 380 - Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. 381 - Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya:
Revocable Identity-based Encryption from Codes with Rank Metric. 382 - Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes:
CSIDH: An Efficient Post-Quantum Commutative Group Action. 383 - (Withdrawn) Fine-Grained and Application-Ready Distance-Bounding Security. 384
- Justin Holmgren
, Alex Lombardi:
Cryptographic Hashing From Strong One-Way Functions. 385 - Zhaohui Cheng, Liqun Chen:
Certificateless Public Key Signature Schemes from Standard Algorithms. 386 - Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida:
Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority. 387 - Seyed Farhad Aghili, Hamid Mala:
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT. 388 - Yotam Harchol, Ittai Abraham, Benny Pinkas:
Distributed SSH Key Management with Proactive RSA Threshold Signatures. 389 - Baoyu Zhu, Xiaoyang Dong, Hongbo Yu:
MILP-based Differential Attack on Round-reduced GIFT. 390 - Romain Gay, Lucas Kowalczyk, Hoeteck Wee:
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys. 391 - Nir Drucker, Shay Gueron, Vlad Krasnov:
Making AES great again: the forthcoming vectorized AES instruction. 392 - Matvei Kotov, Anton Menshov, Alexander Ushakov:
AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM. 393 - Laasya Bangalore, Ashish Choudhury, Arpita Patra:
Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited. 394 - Alexander R. Block, Hemanta K. Maji, Hai H. Nguyen:
Secure Computation with Constant Communication Overhead using Multiplication Embeddings. 395 - Akira Takahashi, Mehdi Tibouchi, Masayuki Abe:
New Bleichenbacher Records: Practical Fault Attacks on qDSA Signatures. 396 - Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee:
Cryptanalysis on the HHSS Obfuscation Arising from Absence of Safeguards. 397 - Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino:
Fun with Bitcoin smart contracts. 398 - Sergey Grebnev:
On the Feasibility of an ECDLP Algorithm. 399 - Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, Edgar R. Weippl:
Agreement with Satoshi - On the Formalization of Nakamoto Consensus. 400 - Nada El Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough:
L-DAA: Lattice-Based Direct Anonymous Attestation. 401 - Ioana Boureanu, Anda Anda:
Another Look at Relay and Distance-based Attacks in Contactless Payments. 402 - Payman Mohassel, Peter Rindal:
ABY3: A Mixed Protocol Framework for Machine Learning. 403 - José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela:
Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks. 404 - Sankhanil Dey, Ranjan Ghosh:
A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes. 405 - Gideon Samid:
"Larger Keys, Less Complexity" A Strategic Proposition. 406 - Cencen Wan, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu, Shuyang Tang:
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol. 407 - Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee:
Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from NTRU Attack. 408 - Willy Quach, Hoeteck Wee, Daniel Wichs:
Laconic Function Evaluation and Applications. 409 - Zhengjun Cao, Lihua Liu:
A Note On Clauser-Horne-Shimony-Holt Inequality. 410 - Angela Jäschke, Frederik Armknecht:
Unsupervised Machine Learning on Encrypted Data. 411 - Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun:
PRCash: Centrally-Issued Digital Currency with Privacy and Regulation. 412 - Kevin Lewi, Callen Rain, Stephen A. Weis, Yueting Lee, Haozhi Xiong, Benjamin Yang:
Scaling Backend Authentication at Facebook. 413 - Yunlei Zhao:
Aggregation of Gamma-Signatures and Applications to Bitcoin. 414 - Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
Flux: Revisiting Near Blocks for Proof-of-Work Blockchains. 415 - Nadim Kobeissi, Natalia Kulatova:
Ledger Design Language: Towards Formal Reasoning and Implementation for Public Ledgers. 416 - Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Gregory Neven:
Okamoto Beats Schnorr: On the Provable Security of Multi-Signatures. 417 - Vladimir Kiriansky, Ilia A. Lebedev, Saman P. Amarasinghe, Srinivas Devadas, Joel S. Emer:
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors. 418 - Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orrù:
Homomorphic Secret Sharing: Optimizations and Applications. 419 - Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu:
Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. 420 - Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène:
TFHE: Fast Fully Homomorphic Encryption over the Torus. 421 - Suyash Kandele, Souradyuti Paul:
Message-locked Encryption with File Update. 422 - Kasper Green Larsen, Jesper Buus Nielsen:
Yes, There is an Oblivious RAM Lower Bound! 423 - Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan:
On The Use of Remote Attestation to Break and Repair Deniability. 424 - Martin R. Albrecht, Christian Hanser, Andrea Höller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner:
Learning with Errors on RSA Co-Processors. 425 - Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak:
Adaptively Secure Proxy Re-encryption. 426 - Ilia A. Lebedev, Kyle Hogan, Srinivas Devadas:
Secure Boot and Remote Attestation in the Sanctum Processor. 427 - Shobhit Sinha, Sandip Karmakar:
Differential Fault Analysis of Rectangle-80. 428 - Ignacio Cascudo, Ronald Cramer, Chaoping Xing, Chen Yuan:
Amortized Complexity of Information-Theoretically Secure MPC Revisited. 429 - Faruk Göloglu, Antoine Joux:
A Simplified Approach to Rigorous Degree 2 Elimination in Discrete Logarithm Algorithms. 430 - (Withdrawn) Lightweight ASIC Implementation of AEGIS-128. 431
- Xavier Bonnetain, María Naya-Plasencia:
Hidden Shift Quantum Cryptanalysis and Implications. 432 - Guowen Xu, Hongwei Li:
Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data. 433 - Bart Mennink:
Towards Tight Security of Cascaded LRW2. 434 - Bingsheng Zhang, Roman Oliynykov, Hamed Balogun:
A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence. 435 - Ashish Choudhury, Gayathri Garimella, Arpita Patra, Divya Ravi, Pratik Sarkar:
Crash-tolerant Consensus in Directed Graph Revisited. 436 - Ben Berger, Zvika Brakerski:
Zero-Knowledge Protocols for Search Problems. 437 - Gaëtan Cassiers, François-Xavier Standaert:
Improved Bitslice Masking: from Optimized Non-Interference to Probe Isolation. 438 - Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain:
Tight Private Circuits: Achieving Probing Security with the Least Refreshing. 439 - Handan Kilinç, Serge Vaudenay:
Formal Analysis of Distance Bounding with Secure Hardware. 440 - Amos Beimel, Naty Peter:
Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols. 441 - Sameer Wagh, Divya Gupta, Nishanth Chandran:
SecureNN: Efficient and Private Neural Network Training. 442 - Rishab Goyal:
Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits. 443 - Bing Zeng:
Founding Cryptography on Smooth Projective Hashing. 444 - Yang Wang, Mingqiang Wang:
CRPSF and NTRU Signatures over cyclotomic fields. 445 - Hua Dong, Li Yang:
A voting scheme with post-quantum security based on physical laws. 446 - Xiaofeng Xie, Tian Tian:
Improved Distinguisher Search Techniques Based on Parity Sets. 447 - Shoichi Hirose, Junji Shikata:
Non-adaptive Group-Testing Aggregate MAC Scheme. 448 - Bart Mennink:
Key Prediction Security of Keyed Sponges. 449 - David W. Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright:
From Keys to Databases - Real-World Applications of Secure Multi-Party Computation. 450 - Shuichi Katsumata, Shota Yamada, Takashi Yamakawa:
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model. 451 - Panjin Kim, Kyung Chul Jeong, Daewan Han:
Time-Space Complexity of Quantum Search Algorithms in Symmetric Cryptanalysis. 452 - Cecilia Boschini, Jan Camenisch, Gregory Neven:
Floppy-Sized Group Signatures from Lattices. 453 - Mohsen Minaei, Pedro Moreno-Sanchez
, Aniket Kate:
R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies. 454 - Serdar Boztas:
On Renyi Entropies and their Applications to Guessing Attacks in Cryptography. 455 - Elise Barelli, Alain Couvreur:
An efficient structural attack on NIST submission DAGS. 456 - Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
From FE Combiners to Secure MPC and Back. 457 - Ian McQuoid, Trevor Swope, Mike Rosulek:
Characterizing Collision and Second-Preimage Resistance in Linicrypt. 458 - Paulo Barreto, Glaucio Oliveira, Waldyr Benits:
Supersingular Isogeny Oblivious Transfer. 459 - Mahdi Zamani, Mahnush Movahedi, Mariana Raykova:
RapidChain: A Fast Blockchain Protocol via Full Sharding. 460 - Benjamin Fuller, Lowen Peng:
When are Continuous-Source Fuzzy Extractors Possible? 461 - Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, Kristin E. Lauter:
Logistic regression over encrypted data from fully homomorphic encryption. 462 - Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map. 463 - Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier:
Cryptanalysis of MORUS. 464 - Geoffroy Couteau:
A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model. 465 - Somnath Panja, Bimal Kumar Roy:
A secure end-to-end verifiable e-voting system using zero knowledge based blockchain. 466 - Nigel P. Smart, Tim Wood:
Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation. 467 - Yaobin Shen, Lei Wang, Dawu Gu:
ISO/IEC 9797-1 Revisited: Beyond Birthday Bound. 468 - Joachim Zahnentferner:
An Abstract Model of UTxO-based Cryptocurrencies with Scripts. 469 - Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz:
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO. 470 - Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion:
Efficient Range ORAM with 핆(log2N) Locality. 471 - Giulio Malavolta, Pedro Moreno-Sanchez
, Clara Schneidewind, Aniket Kate, Matteo Maffei:
Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks. 472 - Daniele Friolo, Daniel Masny, Daniele Venturi:
Secure Multi-Party Computation from Strongly Uniform Key Agreement. 473 - Peter Sebastian Nordholt, Meilof Veeningen:
Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification. 474 - Jonathan Katz, Vladimir Kolesnikov, Xiao Wang:
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures. 475 - Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations. 476 - Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. 477 - Ali Aydin Selçuk:
On Non-Monotonicity of the Success Probability in Linear Cryptanalysis. 478 - Adrian G. Schipor:
On the security of Jhanwar-Barua Identity-Based Encryption Scheme. 479 - Ilan Komargodski, Eylon Yogev:
On Distributional Collision Resistant Hashing. 480 - Arpita Patra, Divya Ravi:
On the Exact Round Complexity of Secure Three-Party Computation. 481 - Ronald Cramer, Ivan Damgård, Daniel Escudero, Peter Scholl, Chaoping Xing:
SPDℤ2k: Efficient MPC mod 2k for Dishonest Majority. 482 - Dan Boneh, Manu Drijvers, Gregory Neven:
Compact Multi-Signatures for Smaller Blockchains. 483 - Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions. 484 - Luca De Feo, Jean Kieffer, Benjamin Smith:
Towards practical key exchange from ordinary isogeny graphs. 485 - Ghada Dessouky, Farinaz Koushanfar
, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner:
Pushing the Communication Barrier in Secure Computation using Lookup Tables. 486 - Edouard Dufour Sans, David Pointcheval:
Unbounded Inner Product Functional Encryption, with Succinct Keys. 487 - Benoît Cogliati, Jooyoung Lee:
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound. 488 - Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. 489 - Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert:
Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed. 490 - Matvei Kotov, Anton Menshov, Alex D. Myasnikov, Dmitry Panteleev, Alexander Ushakov:
Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol. 491 - Pierre Karpman, Daniel S. Roche:
New Instantiations of the CRYPTO 2017 Masking Schemes. 492 - Lior Rotem, Gil Segev:
Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal. 493 - Zvika Brakerski, Renen Perlman:
Order-LWE and the Hardness of Ring-LWE with Entropic Secrets. 494 - Changyu Dong, Grigorios Loukides:
Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity. 495 - Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong:
Efficient Delegated Private Set Intersection on Outsourced Private Datasets. 496 - Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao:
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. 497 - Qian Guo, Vincent Grosso, François-Xavier Standaert:
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint. 498 - Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Secure Two-party Threshold ECDSA from ECDSA Assumptions. 499 - Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda:
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC. 500 - (Withdrawn) Secure Grouping and Aggregation with MapReduce. 501
- Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub:
Computer-aided proofs for multiparty computation with active security. 502 - Gideon Samid:
Finger Printing Data. 503 - Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang:
Quantum Attacks on Some Feistel Block Ciphers. 504 - Gilles Barthe, Sonia Belaïd, François Dupressoir
, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub:
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations. 505 - Ran Gelles, Anat Paskin-Cherniavsky, Vassilis Zikas:
Secure Two-Party Computation over Unreliable Channels. 506 - Gilad Asharov, Gil Segev, Ido Shahaf:
Tight Tradeoffs in Searchable Symmetric Encryption. 507 - Mriganka Mandal, Ratna Dutta:
Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors. 508 - (Withdrawn) Improved Collision Attack on Reduced RIPEMD-160. 509
- Dominik Klein:
Key-Secrecy of PACE with OTS/CafeOBJ. 510 - James Bartusek, Jiaxin Guan, Fermi Ma, Mark Zhandry:
Preventing Zeroizing Attacks on GGH15. 511 - Weiqing You, Xiaoming Chen, Wenxi Li:
Provably Secure Integration Cryptosystem on Non-Commutative Group. 512 - Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies. 513 - Ben Fisch, Shashwat Silas:
Weak Compression and (In)security of Rational Proofs of Storage. 514 - Osman Biçer, Muhammed Ali Bingöl, Mehmet Sabir Kiraz:
Highly Efficient and Reusable Private Function Evaluation with Linear Complexity. 515 - Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound. 516 - Dana Dachman-Soled, Mukul Kulkarni:
Upper and Lower Bounds for Continuous Non-Malleable Codes. 517 - Onur Günlü, Tasnad Kernetzky, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer, Rafael F. Schaefer:
Secure and Reliable Key Agreement with Physical Unclonable Functions. 518 - Brandon Broadnax, Alexander Koch
, Jeremias Mechler, Tobias Müller, Jörn Müller-Quade, Matthias Nagel:
Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules. 519 - Mridul Nandi:
Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries. 520 - Gil Segev, Ido Shahaf:
Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound. 521 - Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. 522 - Adam Bobowski, Marcin Slowik:
Reducing Complexity of Pairing Comparisons using Polynomial Evaluation. 523 - Bing Zeng:
New Smooth Projective Hashing For Oblivious Transfer. 524 - Aurélien Dupin, Jean-Marc Robert, Christophe Bidan:
Location-Proof System based on Secure Multi-Party Computations. 525 - Daniel J. Bernstein, Edoardo Persichetti:
Towards KEM Unification. 526 - Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. 527 - Alain Couvreur, Matthieu Lequesne, Jean-Pierre Tillich:
Recovering short secret keys of RLCE in polynomial time. 528 - Sanjam Garg
, Mohammad Hajiabadi:
Trapdoor Functions from the Computational Diffie-Hellman Assumption. 529 - Zvika Brakerski, Nico Döttling:
Two-Message Statistical Sender-Private OT from LWE. 530 - Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Polynomial direct sum masking to protect against both SCA and FIA. 531 - Daniele Micciancio, Jessica Sorrell:
Ring packing and amortized FHEW bootstrapping. 532 - Alice Pellet-Mary:
Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model. 533 - Kurt M. Alonso, Jordi Herrera-Joancomartí:
Monero - Privacy in the Blockchain. 535 - Long Chen, Zhenfeng Zhang, Zhenfei Zhang:
On the Hardness of the Computational Ring-LWR Problem and its Applications. 536 - Xavier Bonnetain, André Schrottenloher:
Quantum Security Analysis of CSIDH and Ordinary Isogeny-based Schemes. 537 - Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Non-Malleable Codes for Partial Functions with Manipulation Detection. 538 - Daniel Smith-Tone:
Extracting Linearization Equations from Noisy Sources. 539 - Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubácek:
Must the Communication Graph of MPC Protocols be an Expander? 540 - Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras:
Generic Attacks against Beyond-Birthday-Bound MACs. 541 - Rafail Ostrovsky, Giuseppe Persiano, Daniele Venturi, Ivan Visconti:
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions. 542 - Kristian Gjøsteen, Tibor Jager:
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange. 543 - Zhengfeng Ji, Yi-Kai Liu, Fang Song:
Pseudorandom Quantum States. 544 - Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu:
Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms. 545 - Yoshinori Aono, Phong Q. Nguyen, Yixin Shen:
Quantum Lattice Enumeration and Tweaking Discrete Pruning. 546 - Manuel Barbosa, Pooya Farshim:
Indifferentiable Authenticated Encryption. 547 - Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan:
From Laconic Zero-Knowledge to Public-Key Cryptography. 548 - Sanjam Garg
, Rafail Ostrovsky, Akshayaram Srinivasan:
Adaptive Garbled RAM from Laconic Oblivious Transfer. 549 - Liron David, Avishai Wool:
PRank: Fast Analytical Rank Estimation via Pareto Distributions. 550 - Seny Kamara, Tarik Moataz, Olga Ohrimenko:
Structured Encryption and Leakage Suppression. 551 - Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass:
On the Complexity of Compressing Obfuscation. 552 - Joseph Jaeger, Igors Stepanovs:
Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging. 553 - Gustavo Banegas, Ricardo Felipe Custódio, Daniel Panario:
A new class of irreducible pentanomials for polynomial based multipliers in binary fields. 554 - Sanjam Garg
, Mohammad Hajiabadi, Mohammad Mahmoody, Ameer Mohammed:
Limits on the Power of Garbling Techniques for Public-Key Encryption. 555 - Viet Tung Hoang, Stefano Tessaro, Ni Trieu:
The Curse of Small Domains: New Attacks on Format-Preserving Encryption. 556 - Shashank Agrawal, Chaya Ganesh, Payman Mohassel:
Non-Interactive Zero-Knowledge Proofs for Composite Statements. 557 - Phillip Rogaway, Yusi Zhang:
Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE. 558 - Marshall Ball
, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan:
Proofs of Work from Worst-Case Assumptions. 559 - Carsten Baum, Jonathan Bootle, Andrea Cerulli, Rafaël Del Pino, Jens Groth, Vadim Lyubashevsky:
Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits. 560 - Emmanuelle Anceaume, Antonella Del Pozzo, Romaric Ludinard, Maria Potop-Butucaru, Sara Tucci Piergiovanni:
Blockchain Abstract Data Type. 561 - Gilles Barthe, Sonia Belaïd, Pierre-Alain Fouque, Benjamin Grégoire:
maskVerif: a formal tool for analyzing software and hardware masked implementations. 562 - Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker:
Multi-client Predicate-only Encryption for Conjunctive Equality Tests. 563 - Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties. 564 - (Withdrawn) Homomorphic Encryption for Approximate Matrix Arithmetic. 565
- Prabhanjan Ananth, Yuval Ishai, Amit Sahai:
Private Circuits: A Modular Approach. 566 - Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias:
On the Security Properties of e-Voting Bulletin Boards. 567 - Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
Finding Small Solutions of the Equation Bx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem. 568 - Andre Esser, Felix Heuer, Robert Kübler, Alexander May, Christian Sohler
:
Dissection-BKW. 569 - Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, Ariel Nof:
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. 570 - Elette Boyle, Yuval Ishai, Antigoni Polychroniadou:
Limits of Practical Sublinear Secure Computation. 571 - Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
:
Round-Optimal Secure Multiparty Computation with Honest Majority. 572 - Farnoud Farahmand, William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj:
Improved Lightweight Implementations of CAESAR Authenticated Ciphers. 573 - Yackolley Amoussou-Guenou, Antonella Del Pozzo, Maria Potop-Butucaru, Sara Tucci Piergiovanni:
Correctness and Fairness of Tendermint-core Blockchains. 574 - Itai Dinur:
An Algorithmic Framework for the Generalized Birthday Problem. 575 - Pooya Farshim, Georg Fuchsbauer, Alain Passelègue:
Simpler Constructions of Asymmetric Primitives from Obfuscation. 576 - Tore Kasper Frederiksen, Yehuda Lindell, Valery Osheter, Benny Pinkas:
Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries. 577 - Jonathan Katz, Samuel Ranellucci, Mike Rosulek, Xiao Wang:
Optimizing Authenticated Garbling for Faster Secure Two-Party Computation. 578 - Daniel Demmler, Peter Rindal, Mike Rosulek, Ni Trieu:
PIR-PSI: Scaling Private Contact Discovery. 579 - Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
Secure MPC: Laziness Leads to GOD. 580 - Patrick McCorry, Alexander Hicks, Sarah Meiklejohn:
Smart contracts for bribing miners. 581 - Patrick McCorry, Surya Bakshi, Iddo Bentov, Andrew Miller, Sarah Meiklejohn:
Pisa: Arbitration Outsourcing for State Channels. 582 - Mugurel Barcau, Vicentiu Pasol:
Ring Homomorphic Encryption Schemes. 583 - Mugurel Barcau, Vicentiu Pasol:
Bounded Fully Homomorphic Encryption from Monoid Algebras. 584 - Jung Hee Cheon, Seungwan Hong, Changmin Lee, Yongha Son:
Polynomial Functional Encryption Scheme with Linear Ciphertext Size. 585 - Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, Junji Shikata:
Lower Bounds on Lattice Enumeration with Extreme Pruning. 586 - Tapas Pal, Ratna Dutta:
Constructing Witness PRF and Offline Witness Encryption Without Multilinear Maps. 587 - Guilherme Borges, Henrique João L. Domingos, Bernardo Ferreira, João Leitão, Tiago Oliveira, Bernardo Portela:
BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage. 588 - Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff:
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme. 589 - Xiaoming Chen, Weiqing You:
The Twin Conjugacy Search Problem and Applications. 590 - Sankhanil Dey, Ranjan Ghosh:
4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis. 591 - Sergey Agievich:
XS-circuits in Block Ciphers. 592 - Anamaria Costache, Brooke Feigon, Kristin E. Lauter, Maike Massierer, Anna Puskás:
Ramanujan graphs in cryptography. 593 - Sadegh Sadeghi, Nasour Bagheri:
Cryptanalysis of SFN Block Cipher. 594 - (Withdrawn) Randomness analysis for multiple-recursive matrix generator. 595
- Ivan Damgård, Tomasz Kazana, Maciej Obremski, Varun Raj, Luisa Siniscalchi:
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. 596 - Lauren De Meyer, Begül Bilgin
, Oscar Reparaz:
Consolidating Security Notions in Hardware Masking. 597 - Vlad Constantin Craciun, Andrei Mogage, Emil Simion:
Trends in design of ransomware viruses. 598 - Lucas Schabhüser, Denis Butin, Johannes Buchmann:
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case. 599 - Gaurav Bansod, Abhijit Patil, Narayan Pisharoty:
GRANULE: An Ultra lightweight cipher design for embedded security. 600 - Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch:
Verifiable Delay Functions. 601 - Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang:
On the Universally Composable Security of OpenStack. 602 - Ignacio Cascudo, René Bødker Christensen, Jaron Skovsted Gundersen:
Actively Secure OT-Extension from q-ary Linear Codes. 603 - Matvei Kotov, Anton Menshov, Alexander Ushakov:
Attack on Kayawood Protocol: Uncloaking Private Keys. 604 - Yin Li, Yu Zhang, Xiaoli Guo, Chuanda Qi:
N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials. 605 - Antonio Faonio
, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi:
Continuously Non-Malleable Codes with Split-State Refresh. 606 - Melissa Chase, Apoorvaa Deshpande, Esha Ghosh:
Privacy Preserving Verifiable Key Directories. 607 - Hamid Nejatollahi, Nikil D. Dutt
, Indranil Banerjee, Rosario Cammarota:
Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols. 608 - Mengce Zheng:
Improved Results on Factoring General RSA Moduli with Known Bits. 609 - Constantin Catalin Dragan, Daniel Gardham, Mark Manulis:
Hierarchical Attribute-based Signatures. 610 - Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren:
Is Java Card ready for hash-based signatures? 611 - Tim Ruffing, Sri Aravinda Krishnan Thyagarajan, Viktoria Ronge, Dominique Schröder:
Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol. 612 - Nir Bitansky, Huijia Lin:
One-Message Zero Knowledge and Non-Malleable Commitments. 613 - Daniel P. Martin, Marco Martinoli:
A Note on Key Rank. 614 - Prabhanjan Ananth, Aayush Jain, Dakshita Khurana, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness. 615 - Dario Fiore, Elena Pagnin:
Matrioska: A Compiler for Multi-Key Homomorphic Signatures. 616 - Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder:
Two Notions of Differential Equivalence on Sboxes. 617 - Reynier Antonio de la Cruz Jiménez:
On some methods for constructing almost optimal S-Boxes and their resilience against side-channel attacks. 618 - Mor Weiss, Daniel Wichs:
Is there an Oblivious RAM Lower Bound for Online Reads? 619 - Debayan Das, Mayukh Nath, Baibhab Chatterjee, Santosh Ghosh, Shreyas Sen:
Ground-up Root-cause Analysis guided Low-Overhead Generic Countermeasure for Electro-Magnetic Side-Channel Attack. 620 - Ben Lapid, Avishai Wool:
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis. 621 - Sergiu Carpov, Malika Izabachène, Victor Mollimard:
New techniques for multi-value homomorphic evaluation and applications. 622 - Benjamin Wesolowski:
Efficient verifiable delay functions. 623 - Gergei Bana, Rohit Chadha, Ajay Kumar Eeralla:
Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker. 624 - Mihir Bellare, Joseph Jaeger, Julia Len:
Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions. 625 - Sergiu Carpov, Oana Stan:
Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes. 626 - Krzysztof Pietrzak:
Simple Verifiable Delay Functions. 627 - (Withdrawn) Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security. 628
- Lucas Schabhüser, Denis Butin, Johannes Buchmann:
Context Hiding Multi-Key Linearly Homomorphic Authenticators. 629 - Gabrielle De Micheli, Nadia Heninger, Barak Shani:
Characterizing overstretched NTRU attacks. 630 - Orr Dunkelman:
Efficient Construction of the Boomerang Connection Table. 631 - Clémentine Gritti, Melek Önen, Refik Molva:
CHARIOT: Cloud-Assisted Access Control for the Internet of Things. 632 - Shweta Agrawal:
New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation. 633 - Christopher Patton, Thomas Shrimpton:
Partially specified channels: The TLS 1.3 record layer without elision. 634 - Tomer Ashur, Raluca Posteuca:
On linear hulls in one round of DES. 635 - Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li:
Lattice-Based Dual Receiver Encryption and More. 636 - Shuhong Gao:
Efficient Fully Homomorphic Encryption Scheme. 637 - Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers:
BurnBox: Self-Revocable Encryption in a World Of Compelled Access. 638 - Lucas Schabhüser, Denis Butin, Denise Demirel, Johannes Buchmann:
Function-Dependent Commitments for Verifiable Multi-Party Computation. 639 - Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi:
Lower Bounds on Structure-Preserving Signatures for Bilateral Messages. 640 - Michael Backes, Lucjan Hanzlik, Jonas Schneider:
Membership Privacy for Fully Dynamic Group Signatures. 641 - Rami Khalil, Arthur Gervais:
NOCUST - A Non-Custodial 2nd-Layer Financial Intermediary. 642 - Alexei Zamyatin, Dominik Harz, William J. Knottenbelt:
Issue, Trade, Redeem: Crossing Systems Bounds with Cryptocurrency-Backed Tokens. 643 - Osmanbey Uzunkol, Jothi Rangasamy, Lakshmi Kuppusamy:
Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT. 644 - Lucas Kowalczyk, Jiahui Liu, Tal Malkin, Kailash Meiyappan:
Mitigating the One-Use Restriction in Attribute-Based Encryption. 645 - Huijia Lin, Christian Matt:
Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation. 646 - Thorsten Kleinjung, Benjamin Wesolowski:
A new perspective on the powers of two descent for discrete logarithms in finite fields. 647 - Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Christophe Petit, Nigel P. Smart:
Secure Oblivious Transfer from Semi-Commutative Masking. 648 - Susumu Kiyoshima:
No-signaling Linear PCPs. 649 - Gustavo Banegas, Paulo S. L. M. Barreto, Edoardo Persichetti, Paolo Santini:
Designing Efficient Dyadic Operations for Cryptographic Applications. 650 - Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Bob Brumley:
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study. 651 - Fukang Liu:
Efficient Collision Attack Frameworks for RIPEMD-160. 652 - Pierre-Alain Fouque, Benjamin Hadjibeyli, Paul Kirchner:
Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes. 653 - Ivan Damgård, Chaya Ganesh, Claudio Orlandi:
Proofs of Replicated Storage Without Timing Assumptions. 654 - Lijing Zhou, Licheng Wang, Yiru Sun, Pin Lv:
Loamit: A Blockchain-based Residual Loanable-limit Query System. 655 - Abhishek Bajpai, S. V. Kulgod:
FPGA Cluster based high performance Cryptanalysis framework. 656 - Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au:
Platform-independent Secure Blockchain-Based Voting System. 657 - Konstantinos Chalkias, James Brown, Mike Hearn, Tommy Lillehagen, Igor Nitto, Thomas Schroeter:
Blockchained Post-Quantum Signatures. 658 - Sihem Mesnager, Kwang Ho Kim, Junyop Choe, Chunming Tang:
On the Menezes-Teske-Weng's conjecture. 659 - Xun Yi, Kwok-Yan Lam, Dieter Gollmann:
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity. 660 - Christoph Döpmann, Sebastian Rust, Florian Tschorsch:
Exploring Deployment Strategies for the Tor Network. 661 - Kyoohyung Han, Seungwan Hong, Jung Hee Cheon, Daejun Park:
Efficient Logistic Regression on Large Encrypted Data. 662 - Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda:
Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption. 663 - Shafi Goldwasser, Sunoo Park:
Public Accountability vs. Secret Laws: Can They Coexist? 664 - Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. 665 - Paolo Santini, Edoardo Persichetti, Marco Baldi:
Reproducible Codes and Cryptographic Applications. 666 - Mustafa Khairallah, Anupam Chattopadhyay, Bimal Mandal, Subhamoy Maitra:
On Hardware Implementation of Tang-Maitra Boolean Functions. 667 - Takanori Isobe, Kazuhiko Minematsu:
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE. 668 - Cyril Bouvier, Laurent Imbert:
Faster cofactorization with ECM using mixed representations. 669 - Ward Beullens, Bart Preneel, Alan Szepieniec:
Public Key Compression for Constrained Linear Signature Schemes. 670 - Joey Green, Arnab Roy, Elisabeth Oswald:
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES. 671 - Martin R. Albrecht, Amit Deo, Kenneth G. Paterson:
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT. 672 - Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann:
Differential Power Analysis of XMSS and SPHINCS. 673 - Aymeric Genêt, Matthias J. Kannwischer, Hervé Pelletier, Andrew McLauchlan:
Practical Fault Injection Attacks on SPHINCS. 674 - Jeffrey Hoffstein, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
A signature scheme from the finite field isomorphism problem. 675 - Thorben Moos, Amir Moradi, Bastian Richter:
Static Power Side-Channel Analysis - A Survey on Measurement Factors. 676 - François Gérard:
Module-lattice KEM Over a Ring of Dimension 128 for Embedded Systems. 677 - Ben Fisch:
PoReps: Proofs of Space on Useful Data. 678 - Jiasi Weng, Jian Weng, Ming Li, Yue Zhang, Weiqi Luo:
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive. 679 - Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256. 680 - Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee:
A Reusable Fuzzy Extractor with Practical Storage Size. 681 - Angshuman Karmakar, Jose Maria Bermudo Mera, Sujoy Sinha Roy, Ingrid Verbauwhede:
Saber on ARM CCA-secure module lattice-based key encapsulation on ARM. 682 - Oksana Kulyk, Melanie Volkamer:
Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability. 683 - Ethan Cecchetti, Ian Miers, Ari Juels:
PIEs: Public Incompressible Encodings for Decentralized Storage. 684 - Sven Heiberg, Ivo Kubjas, Janno Siim, Jan Willemson
:
On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards. 685 - James Howe, Tobias Oder, Markus Krausz, Tim Güneysu:
Standard Lattice-Based Key Encapsulation on Embedded Devices. 686 - Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam:
Assessing the Feasibility of Single Trace Power Analysis of Frodo. 687 - Zahra Eskandari, Andreas B. Kidmose
, Stefan Kölbl, Tyge Tiessen:
Finding Integral Distinguishers with Ease. 688 - Ralph Ankele, Stefan Kölbl:
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis. 689 - Zilong Wang, Honggang Hu:
Efficient KEA-Style Lattice-Based Authenticated Key Exchange. 690 - Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica:
DIZK: A Distributed Zero Knowledge Proof System. 691 - Diana Maimut, George Teseleanu:
New Configurations of Grain Ciphers: Security Against Slide Attacks. 692 - Bernhard Jungk, Richard Petri, Marc Stöttinger:
Efficient Side-Channel Protections of ARX Ciphers. 693 - Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang:
Faster Privacy-Preserving Location Proximity Schemes. 694 - Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. 695 - Junichi Tomida, Katsuyuki Takashima:
Unbounded Inner Product Functional Encryption from Bilinear Maps. 696 - Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner:
Practical Accountability of Secret Processes. 697 - David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang:
Parameter-Hiding Order Revealing Encryption. 698 - Raghvendra Rohit, Guang Gong:
Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64. 699 - Hwajeong Seo, Zhe Liu, Patrick Longa, Zhi Hu:
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange. 700 - (Withdrawn) How to Correct More Errors in a Secure Sketch. 701
- Ben Fisch:
Tight Proofs of Space and Replication. 702 - Niek J. Bouman, Niels de Vreede:
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition. 703 - Hisham S. Galal, Amr M. Youssef:
Verifiable Sealed-Bid Auction on the Ethereum Blockchain. 704 - Russell W. F. Lai, Giulio Malavolta:
Optimal Succinct Arguments via Hidden Order Groups. 705 - Paul Bunn, Jonathan Katz, Eyal Kushilevitz, Rafail Ostrovsky:
Efficient 3-Party Distributed ORAM. 706 - Elette Boyle, Niv Gilboa, Yuval Ishai:
Function Secret Sharing: Improvements and Extensions. 707 - Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson:
Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software. 708 - Vanessa Vitse:
Simple oblivious transfer protocols compatible with Kummer and supersingular isogenies. 709 - Megha Byali, Arun Joseph, Arpita Patra, Divya Ravi:
Fast Secure Computation for Small Population over the Internet. 710 - Kallepu Raju, Appala Naidu Tentu, China Venkaiah Vadlamudi:
Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures. 711 - Dan Boneh, Benedikt Bünz, Ben Fisch:
A Survey of Two Verifiable Delay Functions. 712