


default search action
IACR Cryptology ePrint Archive, Volume 2019
Volume 2019, 2019
- Ilia A. Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanovic, Dawn Song, Srinivas Devadas:

Sanctorum: A lightweight security monitor for secure enclaves. 1 - Jianye Huang, Qiong Huang:

Leakage-Resilient Group Signature: Definitions and Constructions. 2 - (Withdrawn) Secure and Effective Logic Locking for Machine Learning Applications. 3

- Guillaume Dabosville, Houssem Maghrebi, Alexis Lhuillery, Julien Bringer, Thanh-Ha Le:

On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks. 4 - Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu:

ScanSAT: Unlocking Obfuscated Scan Chains. 5 - Antonio Marcedone, Rafael Pass, Abhi Shelat:

Minimizing Trust in Hardware Wallets with Two Factor Signatures. 6 - Matthias Hamann, Matthias Krause:

Tight Security Bounds for Generic Stream Cipher Constructions. 7 - Jingyu Pan, Shivam Bhasin, Fan Zhang, Kui Ren:

One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis. 8 - Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner:

On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving. 9 - Rodrigo Abarzúa, Claudio Valencia Cordero, Julio López:

Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC. 10 - Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:

Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. 11 - Sihem Mesnager, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee:

A Proof of the Beierle-Kranz-Leander's Conjecture related to Lightweight Multiplication in F2n. 12 - Changhai Ou, Siew-Kei Lam:

Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces. 13 - Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan:

BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks. 14 - Thomas Pornin, Thomas Prest:

More Efficient Algorithms for the NTRU Key Generation using the Field Norm. 15 - Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage:

Fast Message Franking: From Invisible Salamanders to Encryptment. 16 - Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song:

CHURP: Dynamic-Committee Proactive Secret Sharing. 17 - Yunhua Wen, Shengli Liu, Dawu Gu:

Generic Constructions of Robustly Reusable Fuzzy Extractor. 18 - Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang:

Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach. 19 - Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner:

Decentralizing Inner-Product Functional Encryption. 20 - Ilya Aldanov:

CryptoNote+. 21 - Anthony Demeri, Thomas Conroy, Alex Nolan, William Diehl:

The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques. 22 - Joachim Breitner, Nadia Heninger:

Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies. 23 - Yalin Chen, Jue-Sam Chou, Fang-Qi Zhou:

A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography. 24 - Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang:

STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers. 25 - Ben Smyth, Yoshikazu Hanatani:

Non-malleable encryption with proofs of plaintext knowledge and applications to voting. 26 - Lydia Garms, Anja Lehmann:

Group Signatures with Selective Linkability. 27 - Mathias Hall-Andersen, David Wong, Nick Sullivan, Alishah Chator:

nQUIC: Noise-Based QUIC Packet Protection. 28 - (Withdrawn) Upper Bound on $\lambda_1(\Lambda^{\bot}(\mathbf A))$. 29

- (Withdrawn) Analysis of Two Countermeasures against the Signal Leakage Attack. 30

- Rishab Goyal, Satyanarayana Vusirikala, Brent Waters:

Collusion Resistant Broadcast and Trace from Positional Witness Encryption. 31 - Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson:

Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. 32 - Zhedong Wang, Xiong Fan, Feng-Hao Liu:

FE for Inner Products and Its Application to Decentralized ABE. 33 - Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias:

A Formal Treatment of Hardware Wallets. 34 - Carsten Baum, Daniele Cozzo, Nigel P. Smart:

Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. 35 - Shuichi Katsumata, Shota Yamada:

Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. 36 - Aron Gohr:

Improving Attacks on Speck32/64 using Deep Learning. 37 - Aijun Ge, Puwen Wei:

Identity-based Broadcast Encryption with Efficient Revocation. 38 - Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:

Fully Invisible Protean Signatures Schemes. 39 - Vadim Lyubashevsky, Gregor Seiler:

NTTRU: Truly Fast NTRU Using NTT. 40 - Bartosz Zoltak:

Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher. 41 - Lisa Kohl:

Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs. 42 - Qian Guo, Thomas Johansson, Alexander Nilsson:

A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke. 43 - Ahmad Almorabea:

Toha Key Hardened Function. 44 - Ryo Nishimaki, Takashi Yamakawa:

Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio. 45 - Alan Szepieniec, Bart Preneel:

Block-Anti-Circulant Unbalanced Oil and Vinegar. 46 - Kanad Basu, Deepraj Soni, Mohammed Nabeel, Ramesh Karri

:
NIST Post-Quantum Cryptography- A Hardware Evaluation Study. 47 - Eyal Kushilevitz, Tamer Mour:

Sub-logarithmic Distributed Oblivious RAM with Small Block Size. 48 - Lingchen Li, Wenling Wu, Yafei Zheng, Lei Zhang:

The Relationship between the Construction and Solution of the MILP Models and Applications. 49 - Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:

Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. 50 - Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu:

Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. 51 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:

Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. 52 - (Withdrawn) A New Code-based Signature Scheme with Shorter Public Key. 53

- Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, François Dassance, Guillaume Dufresne, Cécile Dumas, Emmanuel Prouff, Alexandre Venelli:

Deep Learning to Evaluate Secure RSA Implementations. 54 - Sandro Coretti, Antonio Faonio

, Daniele Venturi:
Rate-Optimizing Compilers for Continuously Non-Malleable Codes. 55 - Ward Beullens, Hoeteck Wee:

Obfuscating simple functionalities from knowledge assumptions. 56 - Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler:

Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts. 57 - Roman Langrehr, Jiaxin Pan:

Tightly secure hierarchical identity-based encryption. 58 - Yuanqi Shen, You Li, Amin Rezaei, Shuyu Kong, David Dlott, Hai Zhou:

BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption. 59 - Amin Rezaei, You Li, Yuanqi Shen, Shuyu Kong, Hai Zhou:

CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States. 60 - Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei, Hai Zhou:

SigAttack: New High-level SAT-based Attack on Logic Encryptions. 61 - Michael Clear, Ciaran McGoldrick:

Additively Homomorphic IBE from Higher Residuosity. 62 - Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:

Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup. 63 - Keita Emura, Takuya Hayashi:

A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management. 64 - Jan Camenisch, Manu Drijvers, Björn Tackmann:

Multi-Protocol UC and its Use for Building Modular and Efficient Protocols. 65 - Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti:

Publicly Verifiable Proofs from Blockchains. 66 - George Teseleanu:

Managing Your Kleptographic Subscription Plan. 67 - Michael Walter:

Sampling the Integers with Low Relative Error. 68 - Jan Czajkowski, Andreas Hülsing, Christian Schaffner:

Quantum Indistinguishability of Random Sponges. 69 - Sam M. Werner, Paul J. Pritz, Alexei Zamyatin, William J. Knottenbelt:

Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool. 70 - Zhilin Zhang, Ke Wang, Weipeng Lin, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:

Repeatable Oblivious Shuffling of Large Outsourced Data Blocks. 71 - Alex Vazquez:

ZeroCT: Improving ZeroCoin with Confidential Transactions and more. 72 - Cristian Hristea, Ferucio Laurentiu Tiplea:

Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model. 73 - Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu:

Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers. 74 - Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi:

Assessment of the Key-Reuse Resilience of NewHope. 75 - Matthieu Rivain, Junwei Wang:

Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations. 76 - Michael Scott:

Pairing Implementation Revisited. 77 - Alan Kaminsky:

Testing the Randomness of Cryptographic Function Mappings. 78 - Kangquan Li, Longjiang Qu, Bing Sun, Chao Li:

New Results about the Boomerang Uniformity of Permutation Polynomials. 79 - Aner Ben-Efraim, Eran Omri:

Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing. 80 - Stephan Krenn, Kai Samelin, Christoph Striecks

:
Practical Group-Signatures with Privacy-Friendly Openings. 81 - Nils Fleischhacker, Giulio Malavolta, Dominique Schröder:

Arithmetic Garbling from Bilinear Maps. 82 - Zhen Liu, Yanbin Pan, Zhenfei Zhang:

Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15. 83 - Peter T. Breuer:

An Information Obfuscation Calculus for Encrypted Computing. 84 - Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Krämer, Patrick Longa, Jefferson E. Ricardini:

The Lattice-Based Digital Signature Scheme qTESLA. 85 - George Teseleanu:

Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG. 86 - Laltu Sardar, Sushmita Ruj:

The Secure Link Prediction Problem. 87 - Nir Drucker, Shay Gueron:

Continuous Key Agreement with Reduced Bandwidth. 88 - Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens:

The General Sieve Kernel and New Records in Lattice Reduction. 89 - Hayo Baan, Sauvik Bhattacharya, Scott R. Fluhrer, Óscar García-Morchón, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang:

Round5: Compact and Fast Post-Quantum Public-Key Encryption. 90 - Hongda Li, Dongxue Pan, Peifang Ni:

Efficient Zero-Knowledge for NP from Secure Two-Party Computation. 91 - Léo Perrin:

Partitions in the S-Box of Streebog and Kuznyechik. 92 - (Withdrawn) Key Encapsulation Mechanism From Modular Multivariate Linear Equations. 93

- Aron Gohr, Sven Jacob, Werner Schindler

:
CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges. 94 - Patrick Derbez

, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin:
Variants of the AES Key Schedule for Better Truncated Differential Bounds. 95 - Patrick Derbez

, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud:
On Recovering Affine Encodings in White-Box Implementations. 96 - Patrick Derbez

, Pierre-Alain Fouque, Baptiste Lambin:
Linearly equivalent S-boxes and the Division Property. 97 - Pedro Branco:

A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions. 98 - Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn:

Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings. 99 - Wei-Lun Huang, Jiun-Peng Chen, Bo-Yin Yang:

Correlation Power Analysis on NTRU Prime and Related Countermeasures. 100 - Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Juan Ramón Troncoso-Pastoriza:

Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption. 101 - Hisham S. Galal, Amr M. Youssef:

Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum. 102 - Samuel Jaques, John M. Schanck:

Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE. 103 - Naomi Farley, Robert Fitzpatrick, Duncan Jones:

BADGER - Blockchain Auditable Distributed (RSA) key GEneRation. 104 - Antonio Faonio

, Daniele Venturi:
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate. 105 - Hongbing Wang, Yunlei Zhao:

Identity-Based Higncryption. 106 - Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu:

Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit. 107 - Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy:

Minicrypt Primitives with Algebraic Structure and Applications. 108 - Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:

Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture. 109 - Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong:

Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves. 110 - Yin Li, Yu Zhang, Xingpo Ma, Chuanda Qi:

On the Complexity of non-recursive n-term Karatsuba Multiplier for Trinomials. 111 - Bjørn Møller Greve, Øyvind Ytrehus, Håvard Raddum:

Variable Elimination - a Tool for Algebraic Cryptanalysis. 112 - Ferucio Laurentiu Tiplea, Cristian Hristea:

Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure. 113 - Rosario Gennaro, Steven Goldfeder:

Fast Multiparty Threshold ECDSA with Fast Trustless Setup. 114 - Nir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev:

Distributional Collision Resistance Beyond One-Way Functions. 115 - Hao Chen, Ilaria Chillotti, Yongsoo Song:

Multi-Key Homomophic Encryption from TFHE. 116 - Geoffroy Couteau, Michael Reichle:

Non-Interactive Keyed-Verification Anonymous Credentials. 117 - (Withdrawn) Defeating the Hart, Kim, Micheli, Pascuel-Perez, Petit, Quek Attack on WalnutDSA(TM). 118

- Ariel Gabizon:

On the security of the BCTV Pinocchio zk-SNARK variant. 119 - Keita Xagawa:

Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019. 120 - Santosh Ghosh, Andrew H. Reinders, Rafael Misoczki, Manoj R. Sastry:

Anonymous Attestation for IoT. 121 - Santosh Ghosh, Rafael Misoczki, Manoj R. Sastry:

Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes. 122 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Grigory Karpunin, Vladislav Nozdrunov:

Security of Multilinear Galois Mode (MGM). 123 - Douglas Wikström:

Anomalous Look at Provable Security. 124 - (Withdrawn) Combinatorial Primality Test. 125

- Amirhossein Ebrahimi Moghaddam, Zahra Ahmadian:

New Automatic search method for Truncated-differential characteristics: Application to Midori and SKINNY. 126 - Avijit Dutta, Mridul Nandi, Suprita Talnikar:

Beyond Birthday Bound Secure MAC in Faulty Nonce Model. 127 - Junichi Tomida:

Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions. 128 - Elette Boyle, Lisa Kohl, Peter Scholl:

Homomorphic Secret Sharing from Lattices Without FHE. 129 - Greg Zaverucha

, Dan Shumow:
Are Certificate Thumbprints Unique? 130 - Assi Barak, Daniel Escudero, Anders P. K. Dalskov, Marcel Keller:

Secure Evaluation of Quantized Neural Networks. 131 - Olivier Bronchain, Julien M. Hendrickx, Clément Massart, Alex Olshevsky, François-Xavier Standaert:

Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations. 132 - Vasyl Ustimenko:

On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography. 133 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:

Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model. 134 - Sunoo Park, Adam Sealfon:

It wasn't me! Repudiability and Unclaimability of Ring Signatures. 135 - Florian Bourse, Olivier Sanders:

Divisible E-Cash from Constrained Pseudo-Random Functions. 136 - Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:

TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications. 137 - Dahmun Goudarzi, Ange Martinelli, Alain Passelègue, Thomas Prest:

Unifying Leakage Models on a Rényi Day. 138 - Hai Zhou, Yuanqi Shen, Amin Rezaei:

Vulnerability and Remedy of Stripped Function Logic Locking. 139 - Jinhyun So, Basak Guler, Amir Salman Avestimehr, Payman Mohassel:

CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning. 140 - Christina Boura, Anne Canteaut, Daniel Coggia:

A General Proof Framework for Recent AES Distinguishers. 141 - Matteo Campanelli, Dario Fiore, Anaïs Querol:

LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs. 142 - Benjamin Hettwer, Stefan Gehrer, Tim Güneysu:

Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery. 143 - Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay:

Modeling Power Efficiency of S-boxes Using Machine Learning. 144 - Sim Jun Jie, Chan Fook Mun, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung:

Achieving GWAS with Homomorphic Encryption. 145 - Ling Song, Xianrui Qin, Lei Hu:

Boomerang Connectivity Table Revisited. 146 - Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song:

Practical Collision Attacks against Round-Reduced SHA-3. 147 - Ariel Gabizon:

On the efficiency of pairing-based proofs under the d-PKE. 148 - Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang:

Improved Lattice-based CCA2-Secure PKE in the Standard Model. 149 - Tung Chou:

QcBits: Constant-Time Small-Key Code-Based Cryptography. 150 - Peter Schwabe, Bas Westerbaan:

Solving binary MQ with Grover's algorithm. 151 - Duhyeong Kim, Yongha Son, Dongwoo Kim, Andrey Kim, Seungwan Hong, Jung Hee Cheon:

Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption. 152 - Emmanuela Orsini, Nigel P. Smart, Frederik Vercauteren:

Overdrive2k: Efficient Secure MPC over Z2k from Somewhat Homomorphic Encryption. 153 - Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi:

FastKitten: Practical Smart Contracts on Bitcoin. 154 - Matthew Walters, Sujoy Sinha Roy:

Constant-time BCH Error-Correcting Code. 155 - Siddhartha Jayanti, Srinivasan Raghuraman, Nikhil Vyas:

Efficient Constructions for Almost-everywhere Secure Computation. 156 - Paulo S. L. M. Barreto, Marcos A. Simplício Jr., Jefferson E. Ricardini, Harsh Kupwade Patil:

Schnorr-based implicit certification: improving the security and efficiency of V2X communications. 157 - Chris Peikert, Sina Shiehian:

Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors. 158 - Chen-Da Liu Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi:

Robust MPC: Asynchronous Responsiveness yet Synchronous Security. 159 - Sujoy Sinha Roy, Furkan Turan, Kimmo Järvinen, Frederik Vercauteren, Ingrid Verbauwhede:

FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data. 160 - Andrea Francesco Iuorio, Andrea Visconti:

Understanding Optimizations and Measuring Performances of PBKDF2. 161 - Palash Sarkar:

Multi-Stage Proof-of-Work Blockchain. 162 - Melissa Azouaoui

, Romain Poussier, François-Xavier Standaert:
Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder. 163 - Hendrik Eerikson, Claudio Orlandi, Pille Pullonen, Joonas Puura, Mark Simkin:

Use your Brain! Arithmetic 3PC For Any Modulus with Active Security. 164 - Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson:

libInterMAC: Beyond Confidentiality and Integrity in Practice. 165 - Luca De Feo, Simon Masson, Christophe Petit, Antonio Sanso:

Verifiable Delay Functions from Supersingular Isogenies and Pairings. 166 - Shuwen Deng, Wenjie Xiong, Jakub Szefer:

Analysis of Secure Caches and Timing-Based Side-Channel Attacks. 167 - Stjepan Picek, Annelie Heuser, Sylvain Guilley:

Profiling Side-channel Analysis in the Restricted Attacker Framework. 168 - Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens:

Updatable Anonymous Credentials and Applications to Incentive Systems. 169 - Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong:

Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes. 170 - M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar

:
XONN: XNOR-based Oblivious Deep Neural Network Inference. 171 - Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu:

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS. 172 - Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva:

Shorter Quadratic QA-NIZK Proofs. 173 - Kasper Green Larsen, Mark Simkin:

Exponential Lower Bounds for Secret Sharing. 174 - Satrajit Ghosh, Mark Simkin:

The Communication Complexity of Threshold Private Set Intersection. 175 - Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio:

Homomorphic Encryption for Finite Automata. 176 - E. Victor Flynn, Yan Bo Ti:

Genus Two Isogeny Cryptography. 177 - Rohit Sinha, Sivanarayana Gaddam, Ranjit Kumaresan:

LucidiTEE: Policy-based Fair Computing at Scale. 178 - Yue Guo, Rafael Pass, Elaine Shi:

Synchronous, with a Chance of Partition Tolerance. 179 - David Wong:

Disco: Modern Session Encryption. 180 - Jesper Buus Nielsen, Mark Simkin:

Lower Bounds for Leakage-Resilient Secret Sharing. 181 - Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Mustafa Khairallah, Zakaria Najm, Shivam Bhasin:

Security is an Architectural Design Constraint. 182 - Katherine E. Stange:

Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm. 183 - William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj:

Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon. 184 - Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. 185 - Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:

Re-thinking untraceability in the CryptoNote-style blockchain. 186 - Antoine Joux:

Fully homomorphic encryption modulo Fermat numbers. 187 - Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:

How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs. 188 - Yaoling Ding, An Wang, Siu-Ming Yiu:

An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis. 189 - Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:

Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model. 190 - Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh:

Zether: Towards Privacy in a Smart Contract World. 191 - Francisco Corella, Karen Pomian Lewison:

An Omission-Tolerant Cryptographic Checksum. 192 - Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:

Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge. 193 - Thomas Vidick, Tina Zhang:

Classical zero-knowledge arguments for quantum computations. 194 - Jung Hee Cheon, Wonhee Cho, Minki Hhan, Minsik Kang, Jiseung Kim, Changmin Lee:

Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem. 195 - Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:

Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions. 196 - Esteban Landerreche, Marc Stevens, Christian Schaffner:

Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions. 197 - Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro:

Seedless Fruit is the Sweetest: Random Number Generation, Revisited. 198 - Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu:

Password-Authenticated Public-Key Encryption. 199 - Benny Applebaum, Zvika Brakerski, Rotem Tsabary:

Degree 2 is Complete for the Round-Complexity of Malicious MPC. 200 - Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac:

DL-Extractable UC-Commitment Schemes. 201 - James Bartusek, Fermi Ma, Mark Zhandry:

The Distinction Between Fixed and Random Generators in Group-Based Assumptions. 202 - Osman Biçer, Alptekin Küpçü:

Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures. 203 - Barak Shani:

The Security of All Private-key Bits in Isogeny-based Schemes. 204 - Barak Shani:

A note on isogeny-based hybrid verifiable delay functions. 205 - James Howe, Ayesha Khalid, Marco Martinoli, Francesco Regazzoni, Elisabeth Oswald:

Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography. 206 - Dragos Rotaru, Tim Wood:

MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security. 207 - Muzhou Li, Kai Hu, Meiqin Wang:

Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA. 208 - Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki:

SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes. 209 - Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh:

CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks. 210 - Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli:

Monℤ2ka: Fast Maliciously Secure Two Party Computation on ℤ2k. 211 - Hossein Oraei, Massoud Hadian Dehkordi:

A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes. 212 - Mark Zhandry:

On ELFs, Deterministic Encryption, and Correlated-Input Security. 213 - Michele Ciampi, Rafail Ostrovsky:

Four-Round Secure Multiparty Computation from General Assumptions. 214 - Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé:

Approx-SVP in Ideal Lattices with Pre-processing. 215 - Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain

, Rafail Ostrovsky:
On Round Optimal Secure Multiparty Computation from Minimal Assumptions. 216 - Guillermo Sosa-Gómez, Octavio Páez Osuna:

A family of boolean functions with good cryptographic properties. 217 - Akshay Degwekar, Vinod Vaikuntanathan:

Computational Limitations in Robust Classification and Win-Win Results. 218 - Tom Close:

Nitro Protocol. 219 - Ivan Damgård, Kasper Green Larsen, Jesper Buus Nielsen:

Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing. 220 - Shuichi Katsumata, Shota Yamada:

Group Signatures without NIZK: From Lattices in the Standard Model. 221 - Michael Klooß, Anja Lehmann, Andy Rupp

:
(R)CCA Secure Updatable Encryption with Integrity Protection. 222 - Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt Rohloff, Vinod Vaikuntanathan:

Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies. 223 - Lucas Kowalczyk, Hoeteck Wee:

Compact Adaptively Secure ABE for NC1 from k-Lin. 224 - Christoph Dobraunig, Bart Mennink:

Leakage Resilience of the Duplex Construction. 225 - Benedikt Bünz, Lucianna Kiffer, Loi Luu, Mahdi Zamani:

Flyclient: Super-Light Clients for Cryptocurrencies. 226 - Kevin Lewi, Wonho Kim, Ilya Maykov, Stephen A. Weis:

Securing Update Propagation with Homomorphic Hashing. 227 - Nimrod Aviram, Kai Gellert, Tibor Jager:

Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT. 228 - Lukas Kölsch:

XOR-counts and lightweight multiplication with fixed elements in binary finite fields. 229 - Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:

Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages. 230 - Benny Applebaum, Amos Beimel, Oriol Farràs, Oded Nir, Naty Peter:

Secret-Sharing Schemes for General and Uniform Access Structures. 231 - Dorit Aharonov, Zvika Brakerski, Kai-Min Chung, Ayal Green, Ching-Yi Lai, Or Sattath:

On Quantum Advantage in Information Theoretic Single-Server PIR. 232 - Nuttapong Attrapadung:

Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption. 233 - Léo Ducas, Maxime Plançon, Benjamin Wesolowski:

On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm. 234 - Willy Quach, Ron D. Rothblum, Daniel Wichs:

Reusable Designated-Verifier NIZKs for all NP from CDH. 235 - Geoffroy Couteau, Dennis Hofheinz:

Designated-verifier pseudorandom generators, and their applications. 236 - Zahra Jafargholi, Kasper Green Larsen, Mark Simkin:

Optimal Oblivious Priority Queues and Offline Oblivious RAM. 237 - Rémi Géraud, David Naccache, Razvan Rosie:

Robust Encryption, Extended. 238 - Adam Groce, Peter Rindal, Mike Rosulek:

Cheaper Private Set Intersection via Differentially Private Leakage. 239 - Vipul Goyal, Yifan Song:

Correlated-Source Extractors and Cryptography with Correlated-Random Tapes. 240 - Benny Pinkas, Thomas Schneider, Oleksandr Tkachenko, Avishay Yanai:

Efficient Circuit-based PSI with Linear Communication. 241 - Alex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs, David J. Wu:

New Constructions of Reusable Designated-Verifier NIZKs. 242 - Akinori Hosoyamada, Tetsu Iwata:

Tight Quantum Security Bound of the 4-Round Luby-Rackoff Construction. 243 - Viet Tung Hoang, David Miller, Ni Trieu:

Attacks Only Get Better: How to Break FF3 on Large Domains. 244 - Albert Cheu, Adam D. Smith, Jonathan R. Ullman, David Zeber, Maxim Zhilyaev:

Distributed Differential Privacy via Shuffling. 245 - Serge Fehr, Chen Yuan:

Towards optimal robust secret sharing with security against a rushing adversary. 246 - Andrea Coladangelo, Alex Bredariol Grilo, Stacey Jeffery, Thomas Vidick:

Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources. 247 - Ting Liu, Yao Sun:

Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach. 248 - Srimanta Bhattacharya, Mridul Nandi:

Revisiting Variable Output Length XOR Pseudorandom Function. 249 - Lucas Schabhüser, Denis Butin, Johannes Buchmann:

Function-Dependent Commitments from Homomorphic Authenticators. 250 - T.-H. Hubert Chan, Rafael Pass, Elaine Shi:

Consensus through Herding. 251 - Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter:

Reversible Proofs of Sequential Work. 252 - Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain

:
Founding Secure Computation on Blockchains. 253 - Divesh Aggarwal, Kai-Min Chung, Han-Hsuan Lin, Thomas Vidick:

A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries. 254 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:

Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions. 255 - Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman:

DLCT: A New Tool for Differential-Linear Cryptanalysis. 256 - Anne Broadbent, Sébastien Lord:

Uncloneable Quantum Encryption via Random Oracles. 257 - Joseph Jaeger, Stefano Tessaro:

Tight Time-Memory Trade-offs for Symmetric Encryption. 258 - SenPeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:

A Practical Method to Recover Exact Superpoly in Cube Attack. 259 - Eduard Hauck, Eike Kiltz, Julian Loss:

A Modular Treatment of Blind Signatures from Identification Schemes. 260 - Manu Drijvers, Gregory Neven:

Forward-Secure Multi-Signatures. 261 - Qipeng Liu, Mark Zhandry:

Revisiting Post-Quantum Fiat-Shamir. 262 - Jiaping Wang, Hao Wang:

Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones. 263 - Rohit Agrawal, Yi-Hsiu Chen, Thibaut Horel, Salil P. Vadhan:

Unifying computational entropies via Kullback-Leibler divergence. 264 - Rami Khalil, Arthur Gervais, Guillaume Felley:

TEX - A Securely Scalable Trustless Exchange. 265 - Daniel J. Bernstein, Bo-Yin Yang:

Fast constant-time gcd computation and modular inversion. 266 - Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede:

Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon. 267 - Sergei Bauer, Martin Brunner, Peter Schartner:

Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys. 268 - Sergey Gorbunov, Hoeteck Wee:

Digital Signatures for Consensus. 269 - Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Maofan Yin:

Sync HotStuff: Synchronous SMR with 2∆ Latency and Optimistic Responsiveness. 270 - Jintai Ding, Chi Cheng, Yue Qin:

A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs). 271 - Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:

Quantum Security Analysis of AES. 272 - Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai:

Compressing Vector OLE. 273 - Elaine Shi:

Path Oblivious Heap. 274 - M. Sadegh Riazi, Mojan Javaheripi, Siam U. Hussain, Farinaz Koushanfar

:
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation. 275 - Erik-Oliver Blass, Florian Kerschbaum:

Secure Computation of the kth-ranked Integer on Blockchains. 276 - Sihem Mesnager, Chunming Tang, Maosheng Xiong:

On the boomerang uniformity of quadratic permutations over 픽2n. 277 - Navneet Agarwal, Sanat Anand, Manoj Prabhakaran:

Uncovering Algebraic Structures in the MPC Landscape. 278 - Alex Lombardi, Luke Schaeffer:

A Note on Key Agreement and Non-Interactive Commitments. 279 - Sam Kim:

Multi-Authority Attribute-Based Encryption from LWE in the OT Model. 280 - Phillipp Schoppmann, Adrià Gascón, Mariana Raykova, Benny Pinkas:

Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning. 281 - Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren:

A Framework for Cryptographic Problems from Linear Algebra. 282 - Dimitrios Poulakis:

An Attack on Small Private Keys of RSA Based on Euclidean Algorithm. 283 - Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:

Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2. 284 - Gideon Samid:

SpaceFlip : Unbound Geometry Cryptography. 285 - Yindong Chen, Fei Guo, Liu Zhang:

Fast Algebraic Immunity of 2m+2 & 2m+3 variables Majority Function. 286 - Anton Alekseychuk, Serhii Mykolaiovych Koniushok, Mikhailo V. Poremskyi:

Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields. 287 - Alejandro Freyre-Echevarría, Ismel Martínez-Díaz:

On the construction of S-boxes using the leaders and followers metaheuristic. 288 - Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:

Cryptanalysis of ForkAES. 289 - Philippe Loubet-Moundi:

Cost effective techniques for chip delayering and in-situ depackaging. 290 - Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka:

CCA Security and Trapdoor Functions via Key-Dependent-Message Security. 291 - Jan-Pieter D'Anvers, Marcel Tiepelt, Frederik Vercauteren, Ingrid Verbauwhede:

Timing attacks on Error Correcting Codes in Post-Quantum Secure Schemes. 292 - Cody Freitag, Ilan Komargodski, Rafael Pass:

Impossibility of Strong KDM Security with Auxiliary Input. 293 - Miran Kim, Yongsoo Song, Baiyu Li, Daniele Micciancio:

Semi-parallel Logistic Regression for GWAS on Encrypted Data. 294 - Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba

, Mike Rosulek, Charles V. Wright, Wu-chi Feng:
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption. 295 - Wouter Castryck, Thomas Decru, Benjamin Smith:

Hash functions from superspecial genus-2 curves using Richelot isogenies. 296 - Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao:

Towards Optimized and Constant-Time CSIDH on Embedded Devices. 297 - Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia:

Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem. 298 - Xuecheng Ma, Dongdai Lin:

A Generic Construction of Revocable Identity-Based Encryption. 299 - Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, Viktor Fischer:

Transient Effect Ring Oscillators Leak Too. 300 - Peter T. Breuer, Simon Pickin

:
Safe Compilation for Encrypted Computing. 301 - Yael Tauman Kalai, Leonid Reyzin:

A Survey of Leakage-Resilient Cryptography. 302 - Terry Shue Chien Lau, Chik How Tan, Theo Fanuela Prabowo:

Analysis of TPL Signature Scheme. 303 - Rémi Bricout, André Chailloux, Thomas Debris-Alazard, Matthieu Lequesne:

Ternary Syndrome Decoding with Large Weight. 304 - Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier:

Practical Algebraic Side-Channel Attacks Against ACORN. 305 - Madhurima Mukhopadhyay, Palash Sarkar:

Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields. 306 - Kwang Ho Kim, Sihem Mesnager:

Solving x2k+1+x+a=0 in 픽2n with gcd(n, k)=1. 307 - Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova:

Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation. 308 - Jean-Sébastien Coron, Luca Notarnicola:

Cryptanalysis of CLT13 Multilinear Maps with Independent Slots. 309 - Kevin Cheang, Cameron Rasmussen, Sanjit A. Seshia, Pramod Subramanyan:

A Formal Approach to Secure Speculation. 310 - Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:

Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. 311 - Lars Tebelmann, Michael Pehl, Vincent Immler:

Side-Channel Analysis of the TERO PUF. 312 - Monika Trimoska, Sorina Ionica, Gilles Dequen:

A SAT-based approach for index calculus on binary elliptic curves. 313 - Prabhanjan Ananth, Vinod Vaikuntanathan:

Optimal Bounded-Collusion Secure Functional Encryption. 314 - Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos:

Iterated Search Problems and Blockchain Security under Falsifiable Assumptions. 315 - Marcus Brinkmann

:
Extended Affine and CCZ Equivalence up to Dimension 4. 316 - Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, Dawn Song:

Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. 317 - Boyu Ni, Xiaoyang Dong:

Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256. 318 - Yu Chen, Xuecheng Ma:

PGC: Pretty Good Confidential Transaction System with Accountability. 319 - Léo Ducas, Steven D. Galbraith, Thomas Prest, Yang Yu:

Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats. 320 - Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild:

Horizontal Collision Correlation Attack on Elliptic Curves. 321 - Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj:

A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES. 322 - Sabyasachi Dutta, Kouichi Sakurai:

Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited. 323 - Pedro Branco, Paulo Mateus:

A Traceable Ring Signature Scheme based on Coding Theory. 324 - Hiroki Sudo, Koji Nuida, Kana Shimizu:

An Efficient Private Evaluation of a Decision Graph. 325 - Alonso González, Carla Ràfols:

Sublinear Pairing-based Arguments with Updatable CRS and Weaker Assumptions. 326 - Gembu Ito, Tetsu Iwata:

Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers. 327 - Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquín García-Alfaro:

On the Difficulty of Hiding the Balance of Lightning Network Channels. 328 - Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska, Wil Michiels:

Doubly half-injective PRGs for incompressible white-box cryptography. 329 - Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev:

Practical Supersingular Isogeny Group Key Agreement. 330 - Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, Matthew Campagna, David Jao:

Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors. 331 - Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung:

Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields. 332 - Helger Lipmaa:

Key-and-Argument-Updatable QA-NIZKs. 333 - Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova:

Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition. 334 - Yan Yan, Elisabeth Oswald:

Examining the Practical Side Channel Resilience of ARX-boxes. 335 - Eli Ben-Sasson, Lior Goldberg, Swastik Kopparty, Shubhangi Saraf:

DEEP-FRI: Sampling Outside the Box Improves Soundness. 336 - Lukasz Krzywiecki

, Miroslaw Kutylowski, Jakub Pezda, Marcin Slowik:
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios. 337 - Marshall Ball

, Brent Carmer, Tal Malkin, Mike Rosulek, Nichole Schimanski:
Garbled Neural Networks are Practical. 338 - Yusuke Naito, Takeshi Sugawara

:
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers. 339 - Antoine Wurcker:

Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys. 340 - István András Seres, Dániel A. Nagy, Chris Buckland, Péter Burcsi:

MixEth: efficient, trustless coin mixing service for Ethereum. 341 - Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:

LightChain: A DHT-based Blockchain for Resource Constrained Environments. 342 - Aurélien Vasselle, Antoine Wurcker:

Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input. 343 - Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge Dryja:

Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency. 344 - Hugues Thiebeauld, Aurélien Vasselle, Antoine Wurcker:

Second-order Scatter Attack. 345 - Christophe Clavier, Léo Reynaud, Antoine Wurcker:

Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm. 346 - Nir Drucker, Shay Gueron:

Selfie: reflections on TLS 1.3 with PSK. 347 - Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, Thomas Schneider:

Efficient and Scalable Universal Circuits. 348 - Felix Wegener, Lauren De Meyer, Amir Moradi:

Spin Me Right Round: Rotational Symmetry for FPGA-specific AES. 349 - Fabian Boemer, Yixing Lao, Rosario Cammarota, Casimir Wierzynski:

nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data. 350 - José Becerra, Dimiter Ostrev, Marjan Skrobot:

Forward Secrecy of SPAKE2. 351 - Maxim Jourenko, Kanta Kurazumi, Mario Larangeira, Keisuke Tanaka:

SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies. 352 - Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi:

A Faster Constant-time Algorithm of CSIDH keeping Two Torsion Points. 353 - Abdelrahaman Aly, Nigel P. Smart:

Benchmarking Privacy Preserving Scientific Operations. 354 - Anubhab Baksi, Dhiman Saha, Sumanta Sarkar:

To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks. 355 - Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg

, Adam O'Neill, Justin Thaler:
Ad Hoc Multi-Input Functional Encryption. 356 - Núria Costa, Ramiro Martínez, Paz Morillo:

Lattice-based proof of a shuffle. 357 - Leo Weissbart, Stjepan Picek, Lejla Batina:

One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA. 358 - Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya P. Razenshteyn, M. Sadegh Riazi:

SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search. 359 - Lewis Gudgeon, Pedro Moreno-Sanchez

, Stefanie Roos, Patrick McCorry, Arthur Gervais:
SoK: Off The Chain Transactions. 360 - Anat Paskin-Cherniavsky, Artiom Radune:

On polynomial secret sharing schemes. 361 - Alisa Chernyaeva, Ilya Shirobokov, Alexander Davydov:

Game Channels: State Channels for the Gambling Industry with Built-In PRNG. 362 - Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima:

Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs. 363 - Benedikt Auerbach, Federico Giacon, Eike Kiltz:

Everybody's a Target: Scalability in Public-Key Encryption. 364 - Rotem Tsabary:

Fully Secure Attribute-Based Encryption for t-CNF from LWE. 365 - Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley:

Triggerflow: Regression Testing by Advanced Execution Path Inspection. 366 - Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete

, Elena Pagnin:
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting. 367 - Alex Davidson, Amit Deo, Ela Lee, Keith Martin:

Strong Post-Compromise Secure Proxy Re-Encryption. 368 - Marco Calderini:

On the EA-classes of known APN functions in small dimensions. 369 - Mark Zhandry, Cong Zhang:

Indifferentiability for Public Key Cryptosystems. 370 - Xueli Wang, Yu Chen, Xuecheng Ma:

Generic Construction of Linkable Ring Signature. 371 - Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:

Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers. 372 - Aram Jivanyan:

Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions. 373 - Léo Perrin:

Probability 1 Iterated Differential in the SNEIK Permutation. 374 - Xavier Bultel, Pascal Lafourcade:

Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters. 375 - Amir Jalali, Neil Davenport:

SELL v1.0: Searchable Encrypted Logging Library. 376 - Kasper Green Larsen, Tal Malkin, Omri Weinstein, Kevin Yeo:

Lower Bounds for Oblivious Near-Neighbor Search. 377 - Jia Liu, Mark Manulis:

pRate: Anonymous Star Rating with Rating Secrecy. 378 - Marshall Ball

, Siyao Guo, Daniel Wichs:
Non-Malleable Codes for Decision Trees. 379 - Kazumasa Shinagawa, Koji Nuida:

A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit. 380 - (Withdrawn) Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks? 381

- Daniel Gardham, Mark Manulis:

Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length. 382 - Mathy Vanhoef, Eyal Ronen:

Dragonblood: A Security Analysis of WPA3's SAE Handshake. 383 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo:

What Storage Access Privacy is Achievable with Small Overhead? 384 - Takakazu Satoh:

Miller Inversion is Easy for the Reduced Tate Pairing on Trace Zero Supersingular Curves. 385 - Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C. N. Schuldt:

Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation. 386 - Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin:

SoK : On DFA Vulnerabilities of Substitution-Permutation Networks. 387 - Ulrich Rührmair:

Towards Secret-Free Security. 388 - Sauvik Bhattacharya, Óscar García-Morchón, Rachel Player, Ludo Tolhuizen:

Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution. 389 - Michael A. Specter, Sunoo Park, Matthew Green:

KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures. 390 - Biswabandan Panda:

Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense. 391 - Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:

New Conditional Cube Attack on Keccak Keyed Modes. 392 - Itay Berman, Iftach Haitner, Eliad Tsfadia:

A Tight Parallel-Repetition Theorem for Random-Terminating Interactive Arguments. 393 - Vincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque:

Masking Dilithium: Efficient Implementation and Side-Channel Evaluation. 394 - Evangelia Anna Markatou, Roberto Tamassia:

Full Database Reconstruction with Access and Search Pattern Leakage. 395 - Evangelia Anna Markatou, Roberto Tamassia:

Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries. 396 - Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger:

Feistel Structures for MPC, and More. 397 - Daniel Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz:

Constant-Round Group Key Exchange from the Ring-LWE Assumption. 398 - Divesh Aggarwal, Maciej Obremski:

Inception makes non-malleable codes shorter as well! 399 - Akira Takahashi, Mehdi Tibouchi:

Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL. 400 - Manuel San Pedro, Victor Servant, Charles Guillemet:

Side-Channel assessment of Open Source Hardware Wallets. 401 - Kevin Liao, Matthew A. Hammer, Andrew Miller:

ILC: A Calculus for Composable, Computational Cryptography. 402 - Riad S. Wahby, Dan Boneh:

Fast and simple constant-time hashing to the BLS12-381 elliptic curve. 403 - Kazuhiko Minematsu:

Efficient Message Authentication Codes with Combinatorial Group Testing. 404 - Jo Vliegen, Md Masoom Rabbani, Mauro Conti, Nele Mentens:

A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware. 405 - David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks

:
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. 406 - Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng:

Privacy-Preserving Network Path Validation. 407 - Mustafa Khairallah:

Forgery Attack on SNEIKEN. 408 - Houda Ferradi, Keita Xagawa:

Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes. 409 - Kai Samelin, Daniel Slamanig:

Policy-Based Sanitizable Signatures. 410 - Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Veríssimo:

Exploring the Monero Peer-to-Peer Network. 411 - Eliane Koussa, Gilles Macario-Rat, Jacques Patarin:

On the complexity of the Permuted Kernel Problem. 412 - Itai Dinur:

On the Streaming Indistinguishability of a Random Permutation and a Random Function. 413 - Nico Döttling, Sanjam Garg

, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs:
Two-Round Oblivious Transfer from CDH or LPN. 414 - Ryuya Nakamura, Takayuki Jimba, Dominik Harz:

Refinement and Verification of CBC Casper. 415 - Evangelos Georgiadis:

How many transactions per second can bitcoin really handle ? Theoretically. 416 - Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun-Hee Lee, Keewoo Lee:

Numerical Methods for Comparison on Homomorphically Encrypted Numbers. 417 - S. Sharmila Deva Selvi, Arinjita Paul, Siva Dirisala, Saswata Basu, C. Pandu Rangan:

Sharing of Encrypted files in Blockchain Made Simpler. 418 - Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. 419 - Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Shivam Bhasin:

Improving Speed of Dilithium's Signing Procedure. 420 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Ekaterina Smyshlyaeva, Alexandr Sokolov:

Continuing to reflect on TLS 1.3 with external PSK. 421 - Alexander Moch, Eik List:

Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound. 422 - Peter T. Breuer:

Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name. 423 - (Withdrawn) Preimage Security of KNOT-Hash. 424

- Flávio Bergamaschi, Shai Halevi, Tzipora Halevi, Hamish Hunt:

Homomorphic Training of 30, 000 Logistic Regression Models. 425 - Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec:

Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution). 426 - Florian Bourse, Olivier Sanders, Jacques Traoré:

Improved Secure Integer Comparison via Homomorphic Encryption. 427 - Jan Czajkowski, Christian Majenz, Christian Schaffner, Sebastian Zur:

Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability. 428 - Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh:

ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction. 429 - (Withdrawn) Composition of Boolean Functions: An Application to the Secondary Constructions of Bent Functions. 430

- Aurore Guillevic, Simon Masson, Emmanuel Thomé:

Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation. 431 - Julien Lavauzelle, Julian Renner:

Cryptanalysis of a System Based on Twisted Reed - Solomon Codes. 432 - Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru:

Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC. 433 - Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi:

Masking Fuzzy-Searchable Public Databases. 434 - Yue Qin, Chi Cheng, Jintai Ding:

A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope. 435 - Benjamin Dowling, Paul Rösler, Jörg Schwenk:

Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework. 436 - Thijs Veugen:

Efficient coding for secure computing with additively-homomorphic encrypted data. 437 - Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti:

Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data. 438 - Loïc Masure, Cécile Dumas, Emmanuel Prouff:

A Comprehensive Study of Deep Learning for Side-Channel Analysis. 439 - Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas López, Mridul Nandi, Yu Sasaki:

Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. 440 - Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia:

The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution. 441 - Sabyasachi Karati, Reihaneh Safavi-Naini:

K2SN-MSS: An Efficient Post-Quantum Signature (Full Version). 442 - Sergiu Bursuc, Steve Kremer:

Contingent payments on a public ledger: models and reductions for automated verification. 443 - Gildas Avoine, Sébastien Canard, Loïc Ferreira:

Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy. 444 - Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:

Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications. 445 - Sanjit Chatterjee, Shravan Kumar Parshuram Puria, Akash Shah:

Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions. 446 - Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:

Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak. 447 - Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl:

Efficient Pseudorandom Correlation Generators: Silent OT Extension and More. 448 - Marshall Ball

, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin:
Limits to Non-Malleability. 449 - Chenglu Jin, Zheng Yang, Sridhar Adepu, Jianying Zhou:

HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data. 450 - Francesco Berti, Olivier Pereira, François-Xavier Standaert:

Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher. 451 - Sean Murphy, Rachel Player:

A Central Limit Framework for Ring-LWE Decryption. 452 - Lydia Garms, Elizabeth A. Quaglia:

A New Approach to Modelling Centralised Reputation Systems. 453 - Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung:

Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks. 454 - João Otávio Massari Chervinski, Diego Kreutz, Jiangshan Yu:

FloodXMR: Low-cost transaction flooding attack with Monero's bulletproof protocol. 455 - Peifang Ni, Hongda Li, Xianning Meng, Dongxue Pan:

UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting. 456 - Mustafa Khairallah:

Forgery Attack on mixFeed in the Nonce-Misuse Scenario. 457 - Lorenzo Grassi, Daniel Kales, Dmitry Khovratovich, Arnab Roy, Christian Rechberger, Markus Schofnegger:

Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems. 458 - Gaëtan Leurent, Thomas Peyrin:

From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1. 459 - Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny:

Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards. 460 - Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu:

Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks. 461 - Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:

How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11. 462 - Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi:

In Pursuit of Clarity In Obfuscation. 463 - Alessio Caminata, Elisa Gorla:

The complexity of MinRank. 464 - Jung Hee Cheon, Duhyeong Kim, Jai Hyun Park:

Towards a Practical Clustering Analysis over Encrypted Data. 465 - (Withdrawn) Privacy-Preserving K-means Clustering with Multiple Data Owners. 466

- Clément Massart, François-Xavier Standaert:

Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version). 467 - Alessandro Budroni, Andrea Tenti:

The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem. 468 - Rui Qiao, Qinglong Wang, Zongtao Duan, Na Fan:

Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks. 469 - Niek J. Bouman, Niels de Vreede:

A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals. 470 - Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac:

UC-Secure CRS Generation for SNARKs. 471 - Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells:

Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM). 472 - Chengdong Tao:

A Method to Reduce the Key Size of UOV Signature Scheme. 473 - John Matthew Macnaghten, James Luke Menzies, Mark Munro:

A Note on SIMON-32/64 Security. 474 - Dennis Hofheinz, Bogdan Ursu:

Dual-Mode NIZKs from Obfuscation. 475 - Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef:

On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T. 476 - Cas Cremers, Britta Hale, Konrad Kohbrok:

Revisiting Post-Compromise Security Guarantees in Group Messaging. 477 - Sarah McCarthy, James Howe, Neil Smyth, Séamus Brannigan, Máire O'Neill:

BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme. 478 - Sébastien Canard, Loïc Ferreira:

Extended 3-Party ACCE and Application to LoRaWAN 1.1. 479 - Karim Baghery:

On the Efficiency of Privacy-Preserving Smart Contract Systems. 480 - Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba:

An Efficient and Compact Reformulation of NIST Collision Estimate Test. 481 - Jacob Appelbaum, Chloe Martindale, Peter Wu:

Tiny WireGuard Tweak. 482 - Pierrick Méaux, Claude Carlet, Anthony Journault, François-Xavier Standaert:

Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations. 483 - Eric Brier, Houda Ferradi, Marc Joye, David Naccache:

New Number-Theoretic Cryptographic Primitives. 484 - Razvan Barbulescu, Nadia El Mrabet, Loubna Ghammam:

A taxonomy of pairings, their security, their complexity. 485 - Suhyeon Lee, Seungjoo Kim:

Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment. 486 - Michel Abdalla, Fabrice Benhamouda, Romain Gay:

From Single-Input to Multi-Client Inner-Product Functional Encryption. 487 - Alan Kaminsky:

Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication. 488 - Leon Botros, Matthias J. Kannwischer, Peter Schwabe:

Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4. 489 - Ward Beullens:

On sigma protocols with helper for MQ and PKP, fishy signature schemes and more. 490 - Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:

Best Information is Most Successful. 491 - Daniel J. Bernstein, Andreas Hülsing:

Decisional second-preimage resistance: When does SPR imply PRE? 492 - Anamaria Costache, Kim Laine, Rachel Player:

Homomorphic noise growth in practice: comparing BGV and FV. 493 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:

On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model. 494 - Marc Joye:

Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited. 495 - Christian Majenz, Christian Schaffner, Jeroen van Wier:

Non-malleability for quantum public-key encryption. 496 - Jiafan Wang, Sherman S. M. Chow:

Forward and Backward-Secure Range-Searchable Symmetric Encryption. 497 - Ward Beullens, Thorsten Kleinjung, Frederik Vercauteren:

CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations. 498 - Michael Naehrig, Joost Renes:

Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography. 499 - Jean-Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca:

An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster. 500 - María Naya-Plasencia, André Schrottenloher:

Optimal Merging in Quantum k-xor and k-sum Algorithms. 501 - Shi Bai, Shaun Miller, Weiqiang Wen:

A refined analysis of the cost for solving LWE via uSVP. 502 - Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:

Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations. 503 - Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi:

Afgjort - A Semi-Synchronous Finality Layer for Blockchains. 504 - Felix Wegener, Thorben Moos, Amir Moradi:

DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations. 505 - Erik-Oliver Blass, Guevara Noubir:

Forward Integrity and Crash Recovery for Secure Logs. 506 - Jiaxin Guan, Mark Zhandry:

Simple Schemes in the Bounded Storage Model. 507 - Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:

RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. 508 - Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir:

New Slide Attacks on Almost Self-Similar Ciphers. 509 - Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang:

Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes. 510 - Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:

GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited. 511 - Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:

Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System. 512 - Khoa Nguyen, Hanh Tang, Huaxiong Wang, Neng Zeng:

New Code-Based Privacy-Preserving Cryptographic Constructions. 513 - Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee:

Pixel: Multi-signatures for Consensus. 514 - Jakub Breier, Mustafa Khairallah, Xiaolu Hou, Yang Liu:

A Countermeasure Against Statistical Ineffective Fault Analysis. 515 - Anasuya Acharya, Manoj Prabhakaran, Akash Trehan:

CellTree: A New Paradigm for Distributed Data Repositories. 516 - Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert:

Mobile Private Contact Discovery at Scale. 517 - Payman Mohassel, Peter Rindal, Mike Rosulek:

Fast Database Joins for Secret Shared Data. 518 - Christopher Patton, Thomas Shrimpton:

Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications. 519 - Benjamin M. Case, Colin M. Gallagher, Shuhong Gao:

A Note on Sub-Gaussian Random Variables. 520 - Benjamin M. Case, Shuhong Gao, Gengran Hu, Qiuxia Xu:

Fully Homomorphic Encryption with k-bit Arithmetic Operations. 521 - Amos Beimel, Naty Peter:

Secret-Sharing from Robust Conditional Disclosure of Secrets. 522 - Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:

Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. 523 - Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:

Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. 524 - Ciprian Baetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay:

Misuse Attacks on Post-Quantum Cryptosystems. 525 - Cas Cremers, Dennis Jackson:

Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman. 526 - Olamide Omolola, Paul Plessing:

Revisiting Privacy-aware Blockchain Public Key Infrastructure. 527 - Xavier Bonnetain, Léo Perrin, Shizhu Tian:

Anomalies and Vector Space Search: Tools for S-Box Reverse-Engineering. 528 - Pedro Branco, Manuel Goulão, Paulo Mateus:

UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions. 529 - Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad:

Speed-up of SCA attacks on 32-bit multiplications. 530 - Kaoru Kurosawa:

How to Correct Errors in Multi-Server PIR. 531 - Carsten Baum, Ariel Nof:

Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography. 532 - Percy Deift, Stephen D. Miller, Thomas Trogdon:

Stopping time signatures for some algorithms in cryptography. 533 - Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark Tehranipoor:

Theoretical and Practical Approaches for Hardness Amplification of PUFs. 534 - Hwajeong Seo, Amir Jalali, Reza Azarderakhsh:

SIKE Round 2 Speed Record on ARM Cortex-M4. 535 - Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Florian Mendel, Robert Primas:

Protecting against Statistical Ineffective Fault Attacks. 536 - Patrick Derbez

, Pierre-Alain Fouque, Baptiste Lambin, Victor Mollimard:
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks. 537 - Nikolay Shenets:

On Perfect Endomorphic Ciphers. 538 - Mostafizar Rahman, Dhiman Saha, Goutam Paul:

Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD. 539 - Markku-Juhani O. Saarinen:

A chosen key attack against the secret S-boxes of GOST. 540 - James M. Shook, Scott Simon, Peter Mell:

A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement. 541 - Jonathan Protzenko, Benjamin Beurdouche, Denis Merigoux, Karthikeyan Bhargavan:

Formally Verified Cryptographic Web Applications in WebAssembly. 542 - John Kelsey, Dana Dachman-Soled, Sweta Mishra, Meltem Sönmez Turan:

TMPS: Ticket-Mediated Password Strengthening. 543 - Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto:

Evaluation of Code-based Signature Schemes. 544 - (Withdrawn) Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers. 545

- David Cerezo Sánchez:

Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies. 546 - Chloé Hébant, Duong Hieu Phan, David Pointcheval:

Linearly-Homomorphic Signatures and Scalable Mix-Nets. 547 - Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich:

About Wave Implementation and its Leakage Immunity. 548 - Arka Rai Choudhuri, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum:

Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir. 549 - Srinath T. V. Setty:

Spartan: Efficient and general-purpose zkSNARKs without trusted setup. 550 - Emil Simion, Paul Burciu:

A note on the correlations between NIST cryptographic statistical tests suite. 551 - Binyi Chen, Yilei Chen, Kristina Hostáková, Pratyay Mukherjee:

Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space. 552 - John Gregory Underhill, Stiepan Aurélien Kovac, Xenia Bogomolec:

Towards post-quantum symmetric cryptography. 553 - Yu Long Chen, Eran Lambooij, Bart Mennink:

How to Build Pseudorandom Functions From Public Random Permutations. 554 - Georgios Fotiadis, Chloe Martindale:

Optimal TNFS-secure pairings on elliptic curves with composite embedding degree. 555 - Gideon Samid:

When Encryption is Not Enough - Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop). 556 - Xiaopeng Zhao, Jinwen Zheng, Nanyuan Cao, Zhenfu Cao, Xiaolei Dong:

Identity-Based Encryption from e-th Power Residue Symbols. 557 - Chloe Martindale, Lorenz Panny:

How to not break SIDH. 558 - Evgeny K. Alekseev, Lyudmila A. Kushchinskaya:

Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables. 559 - Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee, Dae Song Go, Sihem Mesnager:

Solutions of xqk+...+xq+x=a in GF(2n). 560 - Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang:

Faster Bootstrapping of FHE over the integers with large prime message space. 561 - Shahram Khazaei, Mojtaba Rafiee:

Multi-Adjustable Join Scheme. 562 - Omer Shlomovits, István András Seres:

ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA. 563 - Sujit Kumar Muduli, Pramod Subramanyan, Sayak Ray:

Verification of Authenticated Firmware Load. 564 - Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart:

Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption. 565 - Pranesh Santikellur, Aritra Bhattacharyay, Rajat Subhra Chakraborty:

Deep Learning based Model Building Attacks on Arbiter PUF Compositions. 566 - Xingye Lu, Man Ho Au, Zhenfei Zhang:

(Linkable) Ring Signature from Hash-Then-One-Way Signature. 567 - Debapriya Basu Roy, Debdeep Mukhopadhyay:

Post Quantum ECC on FPGA Platform. 568 - Wilson Abel Alberto Torres, Veronika Kuchta

, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng:
Lattice RingCT v2.0 with Multiple Input and Output Wallets. 569 - Daan van der Valk, Stjepan Picek:

Bias-variance Decomposition in Machine Learning-based Side-channel Analysis. 570 - Stefan Dziembowski

, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková:
Multi-Party Virtual State Channels. 571 - Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento:

On the Commitment Capacity of Unfair Noisy Channels. 572 - Christoph Dobraunig, Bart Mennink:

Security of the Suffix Keyed Sponge. 573 - Herman Galteland, Kristian Gjøsteen:

Subliminal channels in post-quantum digital signature schemes. 574 - Amir Jafari, Shahram Khazaei:

On Abelian Secret Sharing: duality and separation. 575 - Reza Kaboli, Shahram Khazaei, Maghsoud Parviz:

Group-homomorphic Secret Sharing Schemes Are Group-characterizable with Normal Subgroups. 576 - Deevashwer Rathee, Thomas Schneider, K. K. Shukla:

Improved Multiplication Triple Generation over Rings via RLWE-based AHE. 577 - Houssem Maghrebi:

Deep Learning based Side Channel Attacks in Practice. 578 - Dominic Letz:

BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices. 579 - Russell W. F. Lai, Viktoria Ronge, Tim Ruffing, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Jiafan Wang:

Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs. 580 - (Withdrawn) On relaxed security notions for secret sharing. 581

- Ran Canetti, Alley Stoughton, Mayank Varia:

EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security. 582 - Christoph Egger, Pedro Moreno-Sanchez

, Matteo Maffei:
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. 583 - (Withdrawn) 2-threshold Ideal Secret Sharing Schemes Can Be Uniquely Modeled by Latin Squares. 584

- Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay:

On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners. 585 - Jihye Kim, Jiwon Lee, Hyunok Oh:

QAP-based Simulation-Extractable SNARK with a Single Verification. 586 - Pierre Civit, Seth Gilbert, Vincent Gramoli:

Polygraph: Accountable Byzantine Agreement. 587 - Jakub Klemsa, Ivana Trummová:

Formal Notions of Security for Verifiable Homomorphic Encryption. 588 - Erkan Tairi, Pedro Moreno-Sanchez

, Matteo Maffei:
A2L: Anonymous Atomic Locks for Scalability and Interoperability in Payment Channel Hubs. 589 - Nina Bindel, Mike Hamburg, Andreas Hülsing, Edoardo Persichetti:

Tighter proofs of CCA security in the quantum random oracle model. 590 - Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev:

Simulating Homomorphic Evaluation of Deep Learning Predictions. 591 - Andrei Mogage, Emil Simion:

Statistical Analysis and Anonymity of TOR's Path Selection. 592 - Vasyl Ustimenko, Michal Klisowski:

On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces. 593 - Mugurel Barcau, Vicentiu Pasol:

Cryptanalysis of Ring Homomorphic Encryption Schemes. 594 - Pedro Moreno-Sanchez

, RandomRun, Duc Viet Le, Sarang Noether, Brandon Goodell, Aniket Kate:
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero. 595 - Sean Murphy, Rachel Player:

Discretisation and Product Distributions in Ring-LWE. 596 - Shahram Khazaei:

A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio. 597 - (Withdrawn) Partial Secret Sharing. 598

- Ivan Damgård, Daniel Escudero, Tore Kasper Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev:

New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning. 599 - Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:

ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. 600 - Ariel Gabizon:

Improved prover efficiency and SRS size in a Sonic-like system. 601 - Gianluca Brian, Antonio Faonio

, Daniele Venturi:
Continuously Non-Malleable Secret Sharing for General Access Structures. 602 - Yael Kalai, Omer Paneth, Lisa Yang:

How to Delegate Computations Publicly. 603 - Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan:

New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. 604 - Mihail Anghel, Andrei Racautanu:

A note on different types of ransomware attacks. 605 - François Gérard, Mélissa Rossi:

An Efficient and Provable Masked Implementation of qTESLA. 606 - Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang:

Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes. 607 - Navid Alamati, Hart Montgomery, Sikhar Patranabis:

Symmetric Primitives with Structured Secrets. 608 - Fuyuki Kitagawa, Takahiro Matsuda:

CPA-to-CCA Transformation for KDM Security. 609 - Jean-Sébastien Coron, Agnese Gini:

Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem. 610 - Thaddeus Dryja:

Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set. 611 - Helger Lipmaa:

Simple Yet Efficient Knowledge-Sound and Non-Black-Box Any-Simulation-Extractable ZK-SNARKs. 612 - Taha Atahan Akyildiz, Can Berk Guzgeren, Cemal Yilmaz, Erkay Savas:

MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks. 613 - Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:

Quantum Attacks without Superposition Queries: the Offline Simon Algorithm. 614 - Siemen Dhooghe, Svetla Nikova:

My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks. 615 - Iftach Haitner, Noam Mazor, Ronen Shaltiel, Jad Silbak:

Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation. 616 - Sebastian Gajek, Marco Lewandowsky:

Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model. 617 - Fukang Liu, Takanori Isobe:

Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods. 618 - Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass:

Continuous Verifiable Delay Functions. 619 - Steven D. Galbraith, Lukas Zobernig:

Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems. 620 - Bruce Kallick:

A Modified Simple Substitution Cipher With Unbounded Unicity Distance. 621 - Zhenzhen Bao, Jian Guo, Eik List:

Extended Expectation Cryptanalysis on Round-reduced AES. 622 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:

Exploring Constructions of Compact NIZKs from Various Assumptions. 623 - Mihir Bellare, Ruth Ng, Björn Tackmann:

Nonces are Noticed: AEAD Revisited. 624 - Rio LaVigne, Andrea Lincoln

, Virginia Vassilevska Williams:
Public-Key Cryptography in the Fine-Grained Setting. 625 - Vipul Goyal, Aayush Jain, Amit Sahai:

Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge. 626 - Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan:

Unconditionally Secure Computation Against Low-Complexity Leakage. 627 - Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu:

Watermarking Public-Key Cryptographic Primitives. 628 - Shweta Agrawal, Monosij Maitra, Shota Yamada:

Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE. 629 - Junqing Gong, Brent Waters, Hoeteck Wee:

ABE for DFA from k-Lin. 630 - Cody Freitag, Ilan Komargodski, Rafael Pass:

Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge. 631 - Ariel Hamlin, Justin Holmgren

, Mor Weiss, Daniel Wichs:
On the Plausibility of Fully Homomorphic Encryption for RAMs. 632 - Igor A. Semaev:

New non-linearity parameters of Boolean functions. 633 - Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai:

SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension. 634 - Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan:

Homomorphic Time-Lock Puzzles and Applications. 635 - Rishab Goyal, Willy Quach, Brent Waters, Daniel Wichs:

Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions. 636 - Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:

Cryptographic Sensing. 637 - Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica:

On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography. 638 - Nico Döttling, Sanjam Garg

, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky:
Trapdoor Hash Functions and Their Applications. 639 - Nir Bitansky, Omer Paneth:

On Round Optimal Statistical Zero Knowledge Arguments. 640 - Shahla Atapoor, Karim Baghery:

Simulation Extractability in Groth's zk-SNARK. 641 - Jonathan Bootle, Vadim Lyubashevsky, Gregor Seiler:

Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs. 642 - Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:

Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. 643 - Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas:

Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-. 644 - Shweta Agrawal, Monosij Maitra, Shota Yamada:

Attribute Based Encryption for Deterministic Finite Automata from DLIN. 645 - Vipul Goyal, Yanyi Liu, Yifan Song:

Communication-Efficient Unconditional MPC with Guaranteed Output Delivery. 646 - Tatiana Bradley, Stanislaw Jarecki, Jiayu Xu:

Strong Asymmetric PAKE based on Trapdoor CKEM. 647 - Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan:

Efficient Invisible and Unlinkable Sanitizable Signatures. 648 - Donghui Ding, Xin Jiang, Jiaping Wang, Hao Wang, Xiaobing Zhang, Yi Sun:

Txilm: Lossy Block Compression with Salted Short Hashing. 649 - Nico Döttling, Russell W. F. Lai, Giulio Malavolta:

Incremental Proofs of Sequential Work. 650 - Muhammad Ishaq, Ana L. Milanova, Vassilis Zikas:

Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing. 651 - Navid Ghaedi Bardeh, Sondre Rønjom:

The Exchange Attack: How to Distinguish 6 Rounds of AES with 288.2 chosen plaintexts. 652 - Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin:

On the Local Leakage Resilience of Linear Secret Sharing Schemes. 653 - Brandon Goodell, Sarang Noether, Arthur Blue:

Compact linkable ring signatures and applications. 654 - Daniel J. Bernstein:

Visualizing size-security tradeoffs for lattice-based encryption. 655 - (Withdrawn) SeqL: SAT-attack Resilient Sequential Locking. 656

- Leonard Assouline, Tianren Liu:

Multi-Party PSM, Revisited. 657 - Jun Furukawa

, Yehuda Lindell:
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest. 658 - Nico Döttling, Sanjam Garg

, Giulio Malavolta, Prashant Nalini Vasudevan:
Tight Verifiable Delay Functions. 659 - Zheng Wang, Cong Ling:

Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling. 660 - Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:

Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. 661 - Christian Badertscher, Daniel Jost, Ueli Maurer:

Agree-and-Prove: Generalized Proofs Of Knowledge and Applications. 662 - Mohammad Mahmoody, Caleb Smith, David J. Wu:

A Note on the (Im)possibility of Verifiable Delay Functions in the Random Oracle Model. 663 - Huanyu Wang, Martin Brisfors, Sebastian Forsmark, Elena Dubrova:

How Diversity Affects Deep-Learning Side-Channel Attacks. 664 - Jintai Ding, Pedro Branco, Kevin Schmitt:

Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption. 665 - Zheng Wang, Cong Ling:

On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling. 666 - Arka Rai Choudhuri, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum:

PPAD-Hardness via Iterated Squaring Modulo a Composite. 667 - Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:

New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. 668 - Yunwen Liu, Yu Sasaki:

Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. 669 - Vahid Amin Ghafari, Honggang Hu, Fujiang Lin:

On designing secure small-state stream ciphers against time-memory-data tradeoff attacks. 670 - Ahto Buldas, Risto Laanoja, Ahto Truu:

A Server-Assisted Hash-Based Signature Scheme. 671 - Ahto Buldas, Risto Laanoja, Ahto Truu:

A Blockchain-Assisted Hash-Based Signature Scheme. 672 - Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu:

A New Approach to Constructing Digital Signature Schemes (Extended Paper). 673 - Jiabo Wang, Cong Ling:

Polar Sampler: Discrete Gaussian Sampling over the Integers Using Polar Codes. 674 - Dominik Harz, Lewis Gudgeon, Arthur Gervais, William J. Knottenbelt:

Balance : Dynamic Adjustment of Cryptocurrency Deposits. 675 - Eleftherios Kokoris-Kogias:

Robust and Scalable Consensus for Sharded Distributed Ledgers. 676 - Mingjia Huo, Kewen Wu, Qi Ye:

A Note on Lower Digits Extraction Polynomial for Bootstrapping. 677 - Yongwoo Lee, Wijik Lee, Young-Sik Kim, Jong-Seon No:

A Modified pqsigRM: RM Code-Based Signature Scheme. 678 - Maria Eichlseder, Daniel Kales, Markus Schofnegger:

Forgery Attacks on FlexAE and FlexAEAD. 679 - Charles Grover, Cong Ling:

Structured Module Learning With Errors From Cyclic Algebras. 680 - Ayesha Khalid, Sarah McCarthy, Weiqiang Liu, Máire O'Neill:

Lattice-based Cryptography for IoT in A Quantum World: Are We Ready? 681 - Alexandros Bakas, Antonis Michalas:

Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX. 682 - Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin:

The Notion of Transparency Order, Revisited. 683 - Arijit Dutta, Saravanan Vijayakumaran:

Revelio: A MimbleWimble Proof of Reserves Protocol. 684 - Markku-Juhani O. Saarinen:

Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5. 685 - Nir Bitansky, Akshay Degwekar:

On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations. 686 - Zhengfeng Ji, Youming Qiao, Fang Song, Aaram Yun:

General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography. 687 - Kyoohyung Han, Dohyeong Ki:

Better Bootstrapping for Approximate Homomorphic Encryption. 688 - Colin O'Flynn, Alex Dewar:

On-Device Power Analysis Across Hardware Security Domains. 689 - Changhai Ou, Siew-Kei Lam, Guiyuan Jiang:

The Art of Guessing in Combined Side-Channel Collision Attacks. 690 - Daniel J. Bernstein:

Comparing proofs of security for lattice-based encryption. 691 - Erica Blum, Jonathan Katz, Julian Loss:

Synchronous Consensus with Optimal Asynchronous Fallback Guarantees. 692 - Raphael Bost, Pierre-Alain Fouque:

Security-Efficiency Tradeoffs in Searchable Encryption - Lower Bounds and Optimal Constructions. 693 - Daniel Jost, Ueli Maurer, Marta Mularczyk:

A Unified and Composable Take on Ratcheting. 694 - Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Naoto Kiribuchi, Benny Pinkas:

An Efficient Secure Three-Party Sorting Protocol with an Honest Majority. 695 - Masayuki Abe, Miguel Ambrona, Miyako Ohkubo:

Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments. 696 - Elena Dubrova:

Breaking ACORN with a Single Fault. 697 - Poulami Das, Sebastian Faust, Julian Loss:

A Formal Treatment of Deterministic Wallets. 698 - André Chailloux:

Quantum security of the Fiat-Shamir transform of commit and open protocols. 699 - Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara

, Daisuke Suzuki:
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. 700 - Hiroaki Anada:

Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs. 701 - Subhadeep Banik, Khashayar Barooti, Takanori Isobe:

Cryptanalysis of Plantlet. 702 - Carolyn Whitnall, Elisabeth Oswald:

A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation. 703 - Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese:

Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains. 704 - Ivan Damgård, Helene Haagh, Michael Nielsen, Claudio Orlandi:

Commodity-Based 2PC for Arithmetic Circuits. 705 - Daniel Masny, Peter Rindal:

Endemic Oblivious Transfer. 706 - Olivier Blazy, Céline Chevalier, Quoc-Huy Vu:

Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions. 707 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID