


default search action
IACR Cryptology ePrint Archive, Volume 2019
Volume 2019, 2019
- Ilia A. Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanovic, Dawn Song, Srinivas Devadas:
Sanctorum: A lightweight security monitor for secure enclaves. 1 - Jianye Huang, Qiong Huang:
Leakage-Resilient Group Signature: Definitions and Constructions. 2 - (Withdrawn) Secure and Effective Logic Locking for Machine Learning Applications. 3
- Guillaume Dabosville, Houssem Maghrebi, Alexis Lhuillery, Julien Bringer, Thanh-Ha Le:
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks. 4 - Lilas Alrahis, Muhammad Yasin, Hani H. Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu:
ScanSAT: Unlocking Obfuscated Scan Chains. 5 - Antonio Marcedone, Rafael Pass, Abhi Shelat:
Minimizing Trust in Hardware Wallets with Two Factor Signatures. 6 - Matthias Hamann, Matthias Krause:
Tight Security Bounds for Generic Stream Cipher Constructions. 7 - Jingyu Pan, Shivam Bhasin, Fan Zhang, Kui Ren:
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis. 8 - Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner:
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving. 9 - Rodrigo Abarzúa, Claudio Valencia Cordero, Julio López:
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC. 10 - Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. 11 - Sihem Mesnager, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee:
A Proof of the Beierle-Kranz-Leander's Conjecture related to Lightweight Multiplication in F2n. 12 - Changhai Ou, Siew-Kei Lam:
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces. 13 - Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan:
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks. 14 - Thomas Pornin, Thomas Prest:
More Efficient Algorithms for the NTRU Key Generation using the Field Norm. 15 - Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage:
Fast Message Franking: From Invisible Salamanders to Encryptment. 16 - Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song:
CHURP: Dynamic-Committee Proactive Secret Sharing. 17 - Yunhua Wen, Shengli Liu, Dawu Gu:
Generic Constructions of Robustly Reusable Fuzzy Extractor. 18 - Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang:
Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach. 19 - Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner:
Decentralizing Inner-Product Functional Encryption. 20 - Ilya Aldanov:
CryptoNote+. 21 - Anthony Demeri, Thomas Conroy, Alex Nolan, William Diehl:
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques. 22 - Joachim Breitner, Nadia Heninger:
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies. 23 - Yalin Chen, Jue-Sam Chou, Fang-Qi Zhou:
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography. 24 - Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang:
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers. 25 - Ben Smyth, Yoshikazu Hanatani:
Non-malleable encryption with proofs of plaintext knowledge and applications to voting. 26 - Lydia Garms, Anja Lehmann:
Group Signatures with Selective Linkability. 27 - Mathias Hall-Andersen, David Wong, Nick Sullivan, Alishah Chator:
nQUIC: Noise-Based QUIC Packet Protection. 28 - (Withdrawn) Upper Bound on $\lambda_1(\Lambda^{\bot}(\mathbf A))$. 29
- (Withdrawn) Analysis of Two Countermeasures against the Signal Leakage Attack. 30
- Rishab Goyal, Satyanarayana Vusirikala, Brent Waters:
Collusion Resistant Broadcast and Trace from Positional Witness Encryption. 31 - Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. 32 - Zhedong Wang, Xiong Fan, Feng-Hao Liu:
FE for Inner Products and Its Application to Decentralized ABE. 33 - Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias:
A Formal Treatment of Hardware Wallets. 34 - Carsten Baum, Daniele Cozzo, Nigel P. Smart:
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. 35 - Shuichi Katsumata, Shota Yamada:
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. 36 - Aron Gohr:
Improving Attacks on Speck32/64 using Deep Learning. 37 - Aijun Ge, Puwen Wei:
Identity-based Broadcast Encryption with Efficient Revocation. 38 - Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Fully Invisible Protean Signatures Schemes. 39 - Vadim Lyubashevsky, Gregor Seiler:
NTTRU: Truly Fast NTRU Using NTT. 40 - Bartosz Zoltak:
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher. 41 - Lisa Kohl:
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs. 42 - Qian Guo, Thomas Johansson, Alexander Nilsson:
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke. 43 - Ahmad Almorabea:
Toha Key Hardened Function. 44 - Ryo Nishimaki, Takashi Yamakawa:
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio. 45 - Alan Szepieniec, Bart Preneel:
Block-Anti-Circulant Unbalanced Oil and Vinegar. 46 - Kanad Basu, Deepraj Soni, Mohammed Nabeel, Ramesh Karri
:
NIST Post-Quantum Cryptography- A Hardware Evaluation Study. 47 - Eyal Kushilevitz, Tamer Mour:
Sub-logarithmic Distributed Oblivious RAM with Small Block Size. 48 - Lingchen Li, Wenling Wu, Yafei Zheng, Lei Zhang:
The Relationship between the Construction and Solution of the MILP Models and Applications. 49 - Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. 50 - Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. 51 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. 52 - (Withdrawn) A New Code-based Signature Scheme with Shorter Public Key. 53
- Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, François Dassance, Guillaume Dufresne, Cécile Dumas, Emmanuel Prouff, Alexandre Venelli:
Deep Learning to Evaluate Secure RSA Implementations. 54 - Sandro Coretti, Antonio Faonio
, Daniele Venturi:
Rate-Optimizing Compilers for Continuously Non-Malleable Codes. 55 - Ward Beullens, Hoeteck Wee:
Obfuscating simple functionalities from knowledge assumptions. 56 - Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler:
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts. 57 - Roman Langrehr, Jiaxin Pan:
Tightly secure hierarchical identity-based encryption. 58 - Yuanqi Shen, You Li, Amin Rezaei, Shuyu Kong, David Dlott, Hai Zhou:
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption. 59 - Amin Rezaei, You Li, Yuanqi Shen, Shuyu Kong, Hai Zhou:
CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States. 60 - Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei, Hai Zhou:
SigAttack: New High-level SAT-based Attack on Logic Encryptions. 61 - Michael Clear, Ciaran McGoldrick:
Additively Homomorphic IBE from Higher Residuosity. 62 - Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup. 63 - Keita Emura, Takuya Hayashi:
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management. 64 - Jan Camenisch, Manu Drijvers, Björn Tackmann:
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols. 65 - Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti:
Publicly Verifiable Proofs from Blockchains. 66 - George Teseleanu:
Managing Your Kleptographic Subscription Plan. 67 - Michael Walter:
Sampling the Integers with Low Relative Error. 68 - Jan Czajkowski, Andreas Hülsing, Christian Schaffner:
Quantum Indistinguishability of Random Sponges. 69 - Sam M. Werner, Paul J. Pritz, Alexei Zamyatin, William J. Knottenbelt:
Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool. 70 - Zhilin Zhang, Ke Wang, Weipeng Lin, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks. 71 - Alex Vazquez:
ZeroCT: Improving ZeroCoin with Confidential Transactions and more. 72 - Cristian Hristea, Ferucio Laurentiu Tiplea:
Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model. 73 - Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu:
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers. 74 - Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi:
Assessment of the Key-Reuse Resilience of NewHope. 75 - Matthieu Rivain, Junwei Wang:
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations. 76 - Michael Scott:
Pairing Implementation Revisited. 77 - Alan Kaminsky:
Testing the Randomness of Cryptographic Function Mappings. 78 - Kangquan Li, Longjiang Qu, Bing Sun, Chao Li:
New Results about the Boomerang Uniformity of Permutation Polynomials. 79 - Aner Ben-Efraim, Eran Omri:
Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing. 80 - Stephan Krenn, Kai Samelin, Christoph Striecks
:
Practical Group-Signatures with Privacy-Friendly Openings. 81 - Nils Fleischhacker, Giulio Malavolta, Dominique Schröder:
Arithmetic Garbling from Bilinear Maps. 82 - Zhen Liu, Yanbin Pan, Zhenfei Zhang:
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15. 83 - Peter T. Breuer:
An Information Obfuscation Calculus for Encrypted Computing. 84 - Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Krämer, Patrick Longa, Jefferson E. Ricardini:
The Lattice-Based Digital Signature Scheme qTESLA. 85 - George Teseleanu:
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG. 86 - Laltu Sardar, Sushmita Ruj:
The Secure Link Prediction Problem. 87 - Nir Drucker, Shay Gueron:
Continuous Key Agreement with Reduced Bandwidth. 88 - Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens:
The General Sieve Kernel and New Records in Lattice Reduction. 89 - Hayo Baan, Sauvik Bhattacharya, Scott R. Fluhrer, Óscar García-Morchón, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang:
Round5: Compact and Fast Post-Quantum Public-Key Encryption. 90 - Hongda Li, Dongxue Pan, Peifang Ni:
Efficient Zero-Knowledge for NP from Secure Two-Party Computation. 91 - Léo Perrin:
Partitions in the S-Box of Streebog and Kuznyechik. 92 - (Withdrawn) Key Encapsulation Mechanism From Modular Multivariate Linear Equations. 93
- Aron Gohr, Sven Jacob, Werner Schindler
:
CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges. 94 - Patrick Derbez
, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin:
Variants of the AES Key Schedule for Better Truncated Differential Bounds. 95 - Patrick Derbez
, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud:
On Recovering Affine Encodings in White-Box Implementations. 96 - Patrick Derbez
, Pierre-Alain Fouque, Baptiste Lambin:
Linearly equivalent S-boxes and the Division Property. 97 - Pedro Branco:
A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions. 98 - Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn:
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings. 99 - Wei-Lun Huang, Jiun-Peng Chen, Bo-Yin Yang:
Correlation Power Analysis on NTRU Prime and Related Countermeasures. 100 - Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Juan Ramón Troncoso-Pastoriza:
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption. 101 - Hisham S. Galal, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum. 102 - Samuel Jaques, John M. Schanck:
Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE. 103 - Naomi Farley, Robert Fitzpatrick, Duncan Jones:
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation. 104 - Antonio Faonio
, Daniele Venturi:
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate. 105 - Hongbing Wang, Yunlei Zhao:
Identity-Based Higncryption. 106 - Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu:
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit. 107 - Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy:
Minicrypt Primitives with Algebraic Structure and Applications. 108 - Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture. 109 - Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong:
Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves. 110 - Yin Li, Yu Zhang, Xingpo Ma, Chuanda Qi:
On the Complexity of non-recursive n-term Karatsuba Multiplier for Trinomials. 111 - Bjørn Møller Greve, Øyvind Ytrehus, Håvard Raddum:
Variable Elimination - a Tool for Algebraic Cryptanalysis. 112 - Ferucio Laurentiu Tiplea, Cristian Hristea:
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure. 113 - Rosario Gennaro, Steven Goldfeder:
Fast Multiparty Threshold ECDSA with Fast Trustless Setup. 114 - Nir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev:
Distributional Collision Resistance Beyond One-Way Functions. 115 - Hao Chen, Ilaria Chillotti, Yongsoo Song:
Multi-Key Homomophic Encryption from TFHE. 116 - Geoffroy Couteau, Michael Reichle:
Non-Interactive Keyed-Verification Anonymous Credentials. 117 - (Withdrawn) Defeating the Hart, Kim, Micheli, Pascuel-Perez, Petit, Quek Attack on WalnutDSA(TM). 118
- Ariel Gabizon:
On the security of the BCTV Pinocchio zk-SNARK variant. 119 - Keita Xagawa:
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019. 120 - Santosh Ghosh, Andrew H. Reinders, Rafael Misoczki, Manoj R. Sastry:
Anonymous Attestation for IoT. 121 - Santosh Ghosh, Rafael Misoczki, Manoj R. Sastry:
Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes. 122 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Grigory Karpunin, Vladislav Nozdrunov:
Security of Multilinear Galois Mode (MGM). 123 - Douglas Wikström:
Anomalous Look at Provable Security. 124 - (Withdrawn) Combinatorial Primality Test. 125
- Amirhossein Ebrahimi Moghaddam, Zahra Ahmadian:
New Automatic search method for Truncated-differential characteristics: Application to Midori and SKINNY. 126 - Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Beyond Birthday Bound Secure MAC in Faulty Nonce Model. 127 - Junichi Tomida:
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions. 128 - Elette Boyle, Lisa Kohl, Peter Scholl:
Homomorphic Secret Sharing from Lattices Without FHE. 129 - Greg Zaverucha
, Dan Shumow:
Are Certificate Thumbprints Unique? 130 - Assi Barak, Daniel Escudero, Anders P. K. Dalskov, Marcel Keller:
Secure Evaluation of Quantized Neural Networks. 131 - Olivier Bronchain, Julien M. Hendrickx, Clément Massart, Alex Olshevsky, François-Xavier Standaert:
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations. 132 - Vasyl Ustimenko:
On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography. 133 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model. 134 - Sunoo Park, Adam Sealfon:
It wasn't me! Repudiability and Unclaimability of Ring Signatures. 135 - Florian Bourse, Olivier Sanders:
Divisible E-Cash from Constrained Pseudo-Random Functions. 136 - Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications. 137 - Dahmun Goudarzi, Ange Martinelli, Alain Passelègue, Thomas Prest:
Unifying Leakage Models on a Rényi Day. 138 - Hai Zhou, Yuanqi Shen, Amin Rezaei:
Vulnerability and Remedy of Stripped Function Logic Locking. 139 - Jinhyun So, Basak Guler, Amir Salman Avestimehr, Payman Mohassel:
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning. 140 - Christina Boura, Anne Canteaut, Daniel Coggia:
A General Proof Framework for Recent AES Distinguishers. 141 - Matteo Campanelli, Dario Fiore, Anaïs Querol:
LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs. 142 - Benjamin Hettwer, Stefan Gehrer, Tim Güneysu:
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery. 143 - Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay:
Modeling Power Efficiency of S-boxes Using Machine Learning. 144 - Sim Jun Jie, Chan Fook Mun, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung:
Achieving GWAS with Homomorphic Encryption. 145 - Ling Song, Xianrui Qin, Lei Hu:
Boomerang Connectivity Table Revisited. 146 - Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song:
Practical Collision Attacks against Round-Reduced SHA-3. 147 - Ariel Gabizon:
On the efficiency of pairing-based proofs under the d-PKE. 148 - Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang:
Improved Lattice-based CCA2-Secure PKE in the Standard Model. 149 - Tung Chou:
QcBits: Constant-Time Small-Key Code-Based Cryptography. 150 - Peter Schwabe, Bas Westerbaan:
Solving binary MQ with Grover's algorithm. 151 - Duhyeong Kim, Yongha Son, Dongwoo Kim, Andrey Kim, Seungwan Hong, Jung Hee Cheon:
Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption. 152 - Emmanuela Orsini, Nigel P. Smart, Frederik Vercauteren:
Overdrive2k: Efficient Secure MPC over Z2k from Somewhat Homomorphic Encryption. 153 - Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi:
FastKitten: Practical Smart Contracts on Bitcoin. 154 - Matthew Walters, Sujoy Sinha Roy:
Constant-time BCH Error-Correcting Code. 155 - Siddhartha Jayanti, Srinivasan Raghuraman, Nikhil Vyas:
Efficient Constructions for Almost-everywhere Secure Computation. 156 - Paulo S. L. M. Barreto, Marcos A. Simplício Jr., Jefferson E. Ricardini, Harsh Kupwade Patil:
Schnorr-based implicit certification: improving the security and efficiency of V2X communications. 157 - Chris Peikert, Sina Shiehian:
Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors. 158 - Chen-Da Liu Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi:
Robust MPC: Asynchronous Responsiveness yet Synchronous Security. 159 - Sujoy Sinha Roy, Furkan Turan, Kimmo Järvinen, Frederik Vercauteren, Ingrid Verbauwhede:
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data. 160 - Andrea Francesco Iuorio, Andrea Visconti:
Understanding Optimizations and Measuring Performances of PBKDF2. 161 - Palash Sarkar:
Multi-Stage Proof-of-Work Blockchain. 162 - Melissa Azouaoui
, Romain Poussier, François-Xavier Standaert:
Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder. 163 - Hendrik Eerikson, Claudio Orlandi, Pille Pullonen, Joonas Puura, Mark Simkin:
Use your Brain! Arithmetic 3PC For Any Modulus with Active Security. 164 - Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson:
libInterMAC: Beyond Confidentiality and Integrity in Practice. 165 - Luca De Feo, Simon Masson, Christophe Petit, Antonio Sanso:
Verifiable Delay Functions from Supersingular Isogenies and Pairings. 166 - Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Analysis of Secure Caches and Timing-Based Side-Channel Attacks. 167 - Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Profiling Side-channel Analysis in the Restricted Attacker Framework. 168 - Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens:
Updatable Anonymous Credentials and Applications to Incentive Systems. 169 - Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong:
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes. 170 - M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar
:
XONN: XNOR-based Oblivious Deep Neural Network Inference. 171 - Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu:
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS. 172 - Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva:
Shorter Quadratic QA-NIZK Proofs. 173 - Kasper Green Larsen, Mark Simkin:
Exponential Lower Bounds for Secret Sharing. 174 - Satrajit Ghosh, Mark Simkin:
The Communication Complexity of Threshold Private Set Intersection. 175 - Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio:
Homomorphic Encryption for Finite Automata. 176 - E. Victor Flynn, Yan Bo Ti:
Genus Two Isogeny Cryptography. 177 - Rohit Sinha, Sivanarayana Gaddam, Ranjit Kumaresan:
LucidiTEE: Policy-based Fair Computing at Scale. 178 - Yue Guo, Rafael Pass, Elaine Shi:
Synchronous, with a Chance of Partition Tolerance. 179 - David Wong:
Disco: Modern Session Encryption. 180 - Jesper Buus Nielsen, Mark Simkin:
Lower Bounds for Leakage-Resilient Secret Sharing. 181 - Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Mustafa Khairallah, Zakaria Najm, Shivam Bhasin:
Security is an Architectural Design Constraint. 182 - Katherine E. Stange:
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm. 183 - William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj:
Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon. 184 - Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. 185 - Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:
Re-thinking untraceability in the CryptoNote-style blockchain. 186 - Antoine Joux:
Fully homomorphic encryption modulo Fermat numbers. 187 - Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs. 188 - Yaoling Ding, An Wang, Siu-Ming Yiu:
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis. 189 - Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model. 190 - Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh:
Zether: Towards Privacy in a Smart Contract World. 191 - Francisco Corella, Karen Pomian Lewison:
An Omission-Tolerant Cryptographic Checksum. 192 - Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge. 193 - Thomas Vidick, Tina Zhang:
Classical zero-knowledge arguments for quantum computations. 194 - Jung Hee Cheon, Wonhee Cho, Minki Hhan, Minsik Kang, Jiseung Kim, Changmin Lee:
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem. 195 - Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions. 196 - Esteban Landerreche, Marc Stevens, Christian Schaffner:
Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions. 197 - Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro:
Seedless Fruit is the Sweetest: Random Number Generation, Revisited. 198 - Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu:
Password-Authenticated Public-Key Encryption. 199 - Benny Applebaum, Zvika Brakerski, Rotem Tsabary:
Degree 2 is Complete for the Round-Complexity of Malicious MPC. 200 - Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac:
DL-Extractable UC-Commitment Schemes. 201 - James Bartusek, Fermi Ma, Mark Zhandry:
The Distinction Between Fixed and Random Generators in Group-Based Assumptions. 202 - Osman Biçer, Alptekin Küpçü:
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures. 203 - Barak Shani:
The Security of All Private-key Bits in Isogeny-based Schemes. 204 - Barak Shani:
A note on isogeny-based hybrid verifiable delay functions. 205 - James Howe, Ayesha Khalid, Marco Martinoli, Francesco Regazzoni, Elisabeth Oswald:
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography. 206 - Dragos Rotaru, Tim Wood:
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security. 207 - Muzhou Li, Kai Hu, Meiqin Wang:
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA. 208 - Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki:
SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes. 209 - Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh:
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks. 210 - Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli:
Monℤ2ka: Fast Maliciously Secure Two Party Computation on ℤ2k. 211 - Hossein Oraei, Massoud Hadian Dehkordi:
A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes. 212 - Mark Zhandry:
On ELFs, Deterministic Encryption, and Correlated-Input Security. 213 - Michele Ciampi, Rafail Ostrovsky:
Four-Round Secure Multiparty Computation from General Assumptions. 214 - Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé:
Approx-SVP in Ideal Lattices with Pre-processing. 215 - Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain
, Rafail Ostrovsky:
On Round Optimal Secure Multiparty Computation from Minimal Assumptions. 216 - Guillermo Sosa Gómez, Octavio Páez Osuna:
A family of boolean functions with good cryptographic properties. 217 - Akshay Degwekar, Vinod Vaikuntanathan:
Computational Limitations in Robust Classification and Win-Win Results. 218 - Tom Close:
Nitro Protocol. 219 - Ivan Damgård, Kasper Green Larsen, Jesper Buus Nielsen:
Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing. 220 - Shuichi Katsumata, Shota Yamada:
Group Signatures without NIZK: From Lattices in the Standard Model. 221 - Michael Klooß, Anja Lehmann, Andy Rupp
:
(R)CCA Secure Updatable Encryption with Integrity Protection. 222 - Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt Rohloff, Vinod Vaikuntanathan:
Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies. 223 - Lucas Kowalczyk, Hoeteck Wee:
Compact Adaptively Secure ABE for NC1 from k-Lin. 224 - Christoph Dobraunig, Bart Mennink:
Leakage Resilience of the Duplex Construction. 225 - Benedikt Bünz, Lucianna Kiffer, Loi Luu, Mahdi Zamani:
Flyclient: Super-Light Clients for Cryptocurrencies. 226 - Kevin Lewi, Wonho Kim, Ilya Maykov, Stephen A. Weis:
Securing Update Propagation with Homomorphic Hashing. 227 - Nimrod Aviram, Kai Gellert, Tibor Jager:
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT. 228 - Lukas Kölsch:
XOR-counts and lightweight multiplication with fixed elements in binary finite fields. 229 - Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages. 230 - Benny Applebaum, Amos Beimel, Oriol Farràs, Oded Nir, Naty Peter:
Secret-Sharing Schemes for General and Uniform Access Structures. 231 - Dorit Aharonov, Zvika Brakerski, Kai-Min Chung, Ayal Green, Ching-Yi Lai, Or Sattath:
On Quantum Advantage in Information Theoretic Single-Server PIR. 232 - Nuttapong Attrapadung:
Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption. 233 - Léo Ducas, Maxime Plançon, Benjamin Wesolowski:
On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm. 234 - Willy Quach, Ron D. Rothblum, Daniel Wichs:
Reusable Designated-Verifier NIZKs for all NP from CDH. 235 - Geoffroy Couteau, Dennis Hofheinz:
Designated-verifier pseudorandom generators, and their applications. 236 - Zahra Jafargholi, Kasper Green Larsen, Mark Simkin:
Optimal Oblivious Priority Queues and Offline Oblivious RAM. 237 - Rémi Géraud, David Naccache, Razvan Rosie:
Robust Encryption, Extended. 238 - Adam Groce, Peter Rindal, Mike Rosulek:
Cheaper Private Set Intersection via Differentially Private Leakage. 239 - Vipul Goyal, Yifan Song:
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes. 240 - Benny Pinkas, Thomas Schneider, Oleksandr Tkachenko, Avishay Yanai:
Efficient Circuit-based PSI with Linear Communication. 241 - Alex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs, David J. Wu:
New Constructions of Reusable Designated-Verifier NIZKs. 242 - Akinori Hosoyamada, Tetsu Iwata:
Tight Quantum Security Bound of the 4-Round Luby-Rackoff Construction. 243 - Viet Tung Hoang, David Miller, Ni Trieu:
Attacks Only Get Better: How to Break FF3 on Large Domains. 244 - Albert Cheu, Adam D. Smith, Jonathan R. Ullman, David Zeber, Maxim Zhilyaev:
Distributed Differential Privacy via Shuffling. 245 - Serge Fehr, Chen Yuan:
Towards optimal robust secret sharing with security against a rushing adversary. 246 - Andrea Coladangelo, Alex Bredariol Grilo, Stacey Jeffery, Thomas Vidick:
Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources. 247 - Ting Liu, Yao Sun:
Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach. 248 - Srimanta Bhattacharya, Mridul Nandi:
Revisiting Variable Output Length XOR Pseudorandom Function. 249 - Lucas Schabhüser, Denis Butin, Johannes Buchmann:
Function-Dependent Commitments from Homomorphic Authenticators. 250 - T.-H. Hubert Chan, Rafael Pass, Elaine Shi:
Consensus through Herding. 251 - Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter:
Reversible Proofs of Sequential Work. 252 - Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain
:
Founding Secure Computation on Blockchains. 253 - Divesh Aggarwal, Kai-Min Chung, Han-Hsuan Lin, Thomas Vidick:
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries. 254 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions. 255 - Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman:
DLCT: A New Tool for Differential-Linear Cryptanalysis. 256 - Anne Broadbent, Sébastien Lord:
Uncloneable Quantum Encryption via Random Oracles. 257 - Joseph Jaeger, Stefano Tessaro:
Tight Time-Memory Trade-offs for Symmetric Encryption. 258 - SenPeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
A Practical Method to Recover Exact Superpoly in Cube Attack. 259 - Eduard Hauck, Eike Kiltz, Julian Loss:
A Modular Treatment of Blind Signatures from Identification Schemes. 260 - Manu Drijvers, Gregory Neven:
Forward-Secure Multi-Signatures. 261 - Qipeng Liu, Mark Zhandry:
Revisiting Post-Quantum Fiat-Shamir. 262 - Jiaping Wang, Hao Wang:
Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones. 263 - Rohit Agrawal, Yi-Hsiu Chen, Thibaut Horel, Salil P. Vadhan:
Unifying computational entropies via Kullback-Leibler divergence. 264 - Rami Khalil, Arthur Gervais, Guillaume Felley:
TEX - A Securely Scalable Trustless Exchange. 265 - Daniel J. Bernstein, Bo-Yin Yang:
Fast constant-time gcd computation and modular inversion. 266 - Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede:
Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon. 267 - Sergei Bauer, Martin Brunner, Peter Schartner:
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys. 268 - Sergey Gorbunov, Hoeteck Wee:
Digital Signatures for Consensus. 269 - Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Maofan Yin:
Sync HotStuff: Synchronous SMR with 2∆ Latency and Optimistic Responsiveness. 270 - Jintai Ding, Chi Cheng, Yue Qin:
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs). 271 - Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:
Quantum Security Analysis of AES. 272 - Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai:
Compressing Vector OLE. 273 - Elaine Shi:
Path Oblivious Heap. 274 - M. Sadegh Riazi, Mojan Javaheripi, Siam U. Hussain, Farinaz Koushanfar
:
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation. 275 - Erik-Oliver Blass, Florian Kerschbaum:
Secure Computation of the kth-ranked Integer on Blockchains. 276 - Sihem Mesnager, Chunming Tang, Maosheng Xiong:
On the boomerang uniformity of quadratic permutations over 픽2n. 277 - Navneet Agarwal, Sanat Anand, Manoj Prabhakaran:
Uncovering Algebraic Structures in the MPC Landscape. 278 - Alex Lombardi, Luke Schaeffer:
A Note on Key Agreement and Non-Interactive Commitments. 279 - Sam Kim:
Multi-Authority Attribute-Based Encryption from LWE in the OT Model. 280 - Phillipp Schoppmann, Adrià Gascón, Mariana Raykova, Benny Pinkas:
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning. 281 - Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren:
A Framework for Cryptographic Problems from Linear Algebra. 282 - Dimitrios Poulakis:
An Attack on Small Private Keys of RSA Based on Euclidean Algorithm. 283 - Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2. 284 - Gideon Samid:
SpaceFlip : Unbound Geometry Cryptography. 285 - Yindong Chen, Fei Guo, Liu Zhang:
Fast Algebraic Immunity of 2m+2 & 2m+3 variables Majority Function. 286 - Anton Alekseychuk, Serhii Mykolaiovych Koniushok, Mikhailo V. Poremskyi:
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields. 287 - Alejandro Freyre-Echevarría, Ismel Martínez-Díaz:
On the construction of S-boxes using the leaders and followers metaheuristic. 288 - Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. 289 - Philippe Loubet-Moundi:
Cost effective techniques for chip delayering and in-situ depackaging. 290 - Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka:
CCA Security and Trapdoor Functions via Key-Dependent-Message Security. 291 - Jan-Pieter D'Anvers, Marcel Tiepelt, Frederik Vercauteren, Ingrid Verbauwhede:
Timing attacks on Error Correcting Codes in Post-Quantum Secure Schemes. 292 - Cody Freitag, Ilan Komargodski, Rafael Pass:
Impossibility of Strong KDM Security with Auxiliary Input. 293 - Miran Kim, Yongsoo Song, Baiyu Li, Daniele Micciancio:
Semi-parallel Logistic Regression for GWAS on Encrypted Data. 294 - Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba
, Mike Rosulek, Charles V. Wright, Wu-chi Feng:
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption. 295 - Wouter Castryck, Thomas Decru, Benjamin Smith:
Hash functions from superspecial genus-2 curves using Richelot isogenies. 296 - Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao:
Towards Optimized and Constant-Time CSIDH on Embedded Devices. 297 - Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia:
Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem. 298 - Xuecheng Ma, Dongdai Lin:
A Generic Construction of Revocable Identity-Based Encryption. 299 - Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, Viktor Fischer:
Transient Effect Ring Oscillators Leak Too. 300 - Peter T. Breuer, Simon Pickin
:
Safe Compilation for Encrypted Computing. 301 - Yael Tauman Kalai, Leonid Reyzin:
A Survey of Leakage-Resilient Cryptography. 302 - Terry Shue Chien Lau, Chik How Tan, Theo Fanuela Prabowo:
Analysis of TPL Signature Scheme. 303 - Rémi Bricout, André Chailloux, Thomas Debris-Alazard, Matthieu Lequesne:
Ternary Syndrome Decoding with Large Weight. 304 - Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier:
Practical Algebraic Side-Channel Attacks Against ACORN. 305 - Madhurima Mukhopadhyay, Palash Sarkar:
Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields. 306 - Kwang Ho Kim, Sihem Mesnager:
Solving x2k+1+x+a=0 in 픽2n with gcd(n, k)=1. 307 - Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova:
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation. 308 - Jean-Sébastien Coron, Luca Notarnicola:
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots. 309 - Kevin Cheang, Cameron Rasmussen, Sanjit A. Seshia, Pramod Subramanyan:
A Formal Approach to Secure Speculation. 310 - Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. 311 - Lars Tebelmann, Michael Pehl, Vincent Immler:
Side-Channel Analysis of the TERO PUF. 312 - Monika Trimoska, Sorina Ionica, Gilles Dequen:
A SAT-based approach for index calculus on binary elliptic curves. 313 - Prabhanjan Ananth, Vinod Vaikuntanathan:
Optimal Bounded-Collusion Secure Functional Encryption. 314 - Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos:
Iterated Search Problems and Blockchain Security under Falsifiable Assumptions. 315 - Marcus Brinkmann
:
Extended Affine and CCZ Equivalence up to Dimension 4. 316 - Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, Dawn Song:
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. 317 - Boyu Ni, Xiaoyang Dong:
Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256. 318 - Yu Chen, Xuecheng Ma:
PGC: Pretty Good Confidential Transaction System with Accountability. 319 - Léo Ducas, Steven D. Galbraith, Thomas Prest, Yang Yu:
Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats. 320 - Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild:
Horizontal Collision Correlation Attack on Elliptic Curves. 321 - Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj:
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES. 322 - Sabyasachi Dutta, Kouichi Sakurai:
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited. 323 - Pedro Branco, Paulo Mateus:
A Traceable Ring Signature Scheme based on Coding Theory. 324 - Hiroki Sudo, Koji Nuida, Kana Shimizu:
An Efficient Private Evaluation of a Decision Graph. 325 - Alonso González, Carla Ràfols:
Sublinear Pairing-based Arguments with Updatable CRS and Weaker Assumptions. 326 - Gembu Ito, Tetsu Iwata:
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers. 327 - Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquín García-Alfaro:
On the Difficulty of Hiding the Balance of Lightning Network Channels. 328 - Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska, Wil Michiels:
Doubly half-injective PRGs for incompressible white-box cryptography. 329 - Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev:
Practical Supersingular Isogeny Group Key Agreement. 330 - Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, Matthew Campagna, David Jao:
Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors. 331 - Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung:
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields. 332 - Helger Lipmaa:
Key-and-Argument-Updatable QA-NIZKs. 333 - Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova:
Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition. 334 - Yan Yan, Elisabeth Oswald:
Examining the Practical Side Channel Resilience of ARX-boxes. 335 - Eli Ben-Sasson, Lior Goldberg, Swastik Kopparty, Shubhangi Saraf:
DEEP-FRI: Sampling Outside the Box Improves Soundness. 336 - Lukasz Krzywiecki
, Miroslaw Kutylowski, Jakub Pezda, Marcin Slowik:
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios. 337 - Marshall Ball
, Brent Carmer, Tal Malkin, Mike Rosulek, Nichole Schimanski:
Garbled Neural Networks are Practical. 338 - Yusuke Naito, Takeshi Sugawara
:
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers. 339 - Antoine Wurcker:
Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys. 340 - István András Seres, Dániel A. Nagy, Chris Buckland, Péter Burcsi:
MixEth: efficient, trustless coin mixing service for Ethereum. 341 - Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
LightChain: A DHT-based Blockchain for Resource Constrained Environments. 342 - Aurélien Vasselle, Antoine Wurcker:
Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input. 343 - Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge Dryja:
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency. 344 - Hugues Thiebeauld, Aurélien Vasselle, Antoine Wurcker:
Second-order Scatter Attack. 345 - Christophe Clavier, Léo Reynaud, Antoine Wurcker:
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm. 346 - Nir Drucker, Shay Gueron:
Selfie: reflections on TLS 1.3 with PSK. 347 - Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, Thomas Schneider:
Efficient and Scalable Universal Circuits. 348 - Felix Wegener, Lauren De Meyer, Amir Moradi:
Spin Me Right Round: Rotational Symmetry for FPGA-specific AES. 349 - Fabian Boemer, Yixing Lao, Rosario Cammarota, Casimir Wierzynski:
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data. 350 - José Becerra, Dimiter Ostrev, Marjan Skrobot:
Forward Secrecy of SPAKE2. 351 - Maxim Jourenko, Kanta Kurazumi, Mario Larangeira, Keisuke Tanaka:
SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies. 352 - Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi:
A Faster Constant-time Algorithm of CSIDH keeping Two Torsion Points. 353 - Abdelrahaman Aly, Nigel P. Smart:
Benchmarking Privacy Preserving Scientific Operations. 354 - Anubhab Baksi, Dhiman Saha, Sumanta Sarkar:
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks. 355 - Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg
, Adam O'Neill, Justin Thaler:
Ad Hoc Multi-Input Functional Encryption. 356 - Núria Costa, Ramiro Martínez, Paz Morillo:
Lattice-based proof of a shuffle. 357 - Leo Weissbart, Stjepan Picek, Lejla Batina:
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA. 358 - Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya P. Razenshteyn, M. Sadegh Riazi:
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search. 359 - Lewis Gudgeon, Pedro Moreno-Sanchez
, Stefanie Roos, Patrick McCorry, Arthur Gervais:
SoK: Off The Chain Transactions. 360 - Anat Paskin-Cherniavsky, Artiom Radune:
On polynomial secret sharing schemes. 361 - Alisa Chernyaeva, Ilya Shirobokov, Alexander Davydov:
Game Channels: State Channels for the Gambling Industry with Built-In PRNG. 362 - Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima:
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs. 363 - Benedikt Auerbach, Federico Giacon, Eike Kiltz:
Everybody's a Target: Scalability in Public-Key Encryption. 364 - Rotem Tsabary:
Fully Secure Attribute-Based Encryption for t-CNF from LWE. 365 - Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley:
Triggerflow: Regression Testing by Advanced Execution Path Inspection. 366 - Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete
, Elena Pagnin:
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting. 367 - Alex Davidson, Amit Deo, Ela Lee, Keith Martin:
Strong Post-Compromise Secure Proxy Re-Encryption. 368 - Marco Calderini:
On the EA-classes of known APN functions in small dimensions. 369 - Mark Zhandry, Cong Zhang:
Indifferentiability for Public Key Cryptosystems. 370 - Xueli Wang, Yu Chen, Xuecheng Ma:
Generic Construction of Linkable Ring Signature. 371 - Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers. 372 - Aram Jivanyan:
Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions. 373 - Léo Perrin:
Probability 1 Iterated Differential in the SNEIK Permutation. 374 - Xavier Bultel, Pascal Lafourcade:
Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters. 375 - Amir Jalali, Neil Davenport:
SELL v1.0: Searchable Encrypted Logging Library. 376 - Kasper Green Larsen, Tal Malkin, Omri Weinstein, Kevin Yeo:
Lower Bounds for Oblivious Near-Neighbor Search. 377 - Jia Liu, Mark Manulis:
pRate: Anonymous Star Rating with Rating Secrecy. 378 - Marshall Ball
, Siyao Guo, Daniel Wichs:
Non-Malleable Codes for Decision Trees. 379 - Kazumasa Shinagawa, Koji Nuida:
A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit. 380 - (Withdrawn) Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks? 381
- Daniel Gardham, Mark Manulis:
Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length. 382 - Mathy Vanhoef, Eyal Ronen:
Dragonblood: A Security Analysis of WPA3's SAE Handshake. 383 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo:
What Storage Access Privacy is Achievable with Small Overhead? 384 - Takakazu Satoh:
Miller Inversion is Easy for the Reduced Tate Pairing on Trace Zero Supersingular Curves. 385 - Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C. N. Schuldt:
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation. 386 - Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin:
SoK : On DFA Vulnerabilities of Substitution-Permutation Networks. 387 - Ulrich Rührmair:
Towards Secret-Free Security. 388 - Sauvik Bhattacharya, Óscar García-Morchón, Rachel Player, Ludo Tolhuizen:
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution. 389 - Michael A. Specter, Sunoo Park, Matthew Green:
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures. 390 - Biswabandan Panda:
Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense. 391 - Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. 392 - Itay Berman, Iftach Haitner, Eliad Tsfadia:
A Tight Parallel-Repetition Theorem for Random-Terminating Interactive Arguments. 393 - Vincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque:
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation. 394 - Evangelia Anna Markatou, Roberto Tamassia:
Full Database Reconstruction with Access and Search Pattern Leakage. 395 - Evangelia Anna Markatou, Roberto Tamassia:
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries. 396 - Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger:
Feistel Structures for MPC, and More. 397 - Daniel Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz:
Constant-Round Group Key Exchange from the Ring-LWE Assumption. 398 - Divesh Aggarwal, Maciej Obremski:
Inception makes non-malleable codes shorter as well! 399 - Akira Takahashi, Mehdi Tibouchi:
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL. 400 - Manuel San Pedro, Victor Servant, Charles Guillemet:
Side-Channel assessment of Open Source Hardware Wallets. 401 - Kevin Liao, Matthew A. Hammer, Andrew Miller:
ILC: A Calculus for Composable, Computational Cryptography. 402 - Riad S. Wahby, Dan Boneh:
Fast and simple constant-time hashing to the BLS12-381 elliptic curve. 403 - Kazuhiko Minematsu:
Efficient Message Authentication Codes with Combinatorial Group Testing. 404 - Jo Vliegen, Md Masoom Rabbani, Mauro Conti, Nele Mentens:
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware. 405 - David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks
:
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. 406 - Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng:
Privacy-Preserving Network Path Validation. 407 - Mustafa Khairallah:
Forgery Attack on SNEIKEN. 408 - Houda Ferradi, Keita Xagawa:
Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes. 409 - Kai Samelin, Daniel Slamanig:
Policy-Based Sanitizable Signatures. 410 - Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Veríssimo:
Exploring the Monero Peer-to-Peer Network. 411 - Eliane Koussa, Gilles Macario-Rat, Jacques Patarin:
On the complexity of the Permuted Kernel Problem. 412 - Itai Dinur:
On the Streaming Indistinguishability of a Random Permutation and a Random Function. 413 - Nico Döttling, Sanjam Garg
, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs:
Two-Round Oblivious Transfer from CDH or LPN. 414 - Ryuya Nakamura, Takayuki Jimba, Dominik Harz:
Refinement and Verification of CBC Casper. 415 - Evangelos Georgiadis:
How many transactions per second can bitcoin really handle ? Theoretically. 416 - Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun-Hee Lee, Keewoo Lee:
Numerical Methods for Comparison on Homomorphically Encrypted Numbers. 417 - S. Sharmila Deva Selvi, Arinjita Paul, Siva Dirisala, Saswata Basu, C. Pandu Rangan:
Sharing of Encrypted files in Blockchain Made Simpler. 418 - Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. 419 - Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Shivam Bhasin:
Improving Speed of Dilithium's Signing Procedure. 420 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Ekaterina Smyshlyaeva, Alexandr Sokolov:
Continuing to reflect on TLS 1.3 with external PSK. 421 - Alexander Moch, Eik List:
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound. 422 - Peter T. Breuer:
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name. 423 - (Withdrawn) Preimage Security of KNOT-Hash. 424
- Flávio Bergamaschi, Shai Halevi, Tzipora Halevi, Hamish Hunt:
Homomorphic Training of 30, 000 Logistic Regression Models. 425 - Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec:
Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution). 426 - Florian Bourse, Olivier Sanders, Jacques Traoré:
Improved Secure Integer Comparison via Homomorphic Encryption. 427 - Jan Czajkowski, Christian Majenz, Christian Schaffner, Sebastian Zur:
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability. 428 - Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh:
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction. 429 - (Withdrawn) Composition of Boolean Functions: An Application to the Secondary Constructions of Bent Functions. 430
- Aurore Guillevic, Simon Masson, Emmanuel Thomé:
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation. 431 - Julien Lavauzelle, Julian Renner:
Cryptanalysis of a System Based on Twisted Reed - Solomon Codes. 432 - Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru:
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC. 433 - Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi:
Masking Fuzzy-Searchable Public Databases. 434 - Yue Qin, Chi Cheng, Jintai Ding:
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope. 435 - Benjamin Dowling, Paul Rösler, Jörg Schwenk:
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework. 436 - Thijs Veugen:
Efficient coding for secure computing with additively-homomorphic encrypted data. 437 - Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti:
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data. 438 - Loïc Masure, Cécile Dumas, Emmanuel Prouff:
A Comprehensive Study of Deep Learning for Side-Channel Analysis. 439 - Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas López, Mridul Nandi, Yu Sasaki:
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. 440 - Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia:
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution. 441 - Sabyasachi Karati, Reihaneh Safavi-Naini:
K2SN-MSS: An Efficient Post-Quantum Signature (Full Version). 442 - Sergiu Bursuc, Steve Kremer:
Contingent payments on a public ledger: models and reductions for automated verification. 443 - Gildas Avoine, Sébastien Canard, Loïc Ferreira:
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy. 444 - Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications. 445 - Sanjit Chatterjee, Shravan Kumar Parshuram Puria, Akash Shah:
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions. 446 - Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak. 447 - Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl:
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More. 448 - Marshall Ball
, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin:
Limits to Non-Malleability. 449 - Chenglu Jin, Zheng Yang, Sridhar Adepu, Jianying Zhou:
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data. 450 - Francesco Berti, Olivier Pereira, François-Xavier Standaert:
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher. 451 - Sean Murphy, Rachel Player:
A Central Limit Framework for Ring-LWE Decryption. 452 - Lydia Garms, Elizabeth A. Quaglia:
A New Approach to Modelling Centralised Reputation Systems. 453 - Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung:
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks. 454 - João Otávio Massari Chervinski, Diego Kreutz, Jiangshan Yu:
FloodXMR: Low-cost transaction flooding attack with Monero's bulletproof protocol. 455 - Peifang Ni, Hongda Li, Xianning Meng, Dongxue Pan:
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting. 456 - Mustafa Khairallah:
Forgery Attack on mixFeed in the Nonce-Misuse Scenario. 457 - Lorenzo Grassi, Daniel Kales, Dmitry Khovratovich, Arnab Roy, Christian Rechberger, Markus Schofnegger:
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems. 458 - Gaëtan Leurent, Thomas Peyrin:
From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1. 459 - Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny:
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards. 460 - Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu:
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks. 461 - Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11. 462 - Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi:
In Pursuit of Clarity In Obfuscation. 463 - Alessio Caminata, Elisa Gorla:
The complexity of MinRank. 464 - Jung Hee Cheon, Duhyeong Kim, Jai Hyun Park:
Towards a Practical Clustering Analysis over Encrypted Data. 465 - (Withdrawn) Privacy-Preserving K-means Clustering with Multiple Data Owners. 466
- Clément Massart, François-Xavier Standaert:
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version). 467 - Alessandro Budroni, Andrea Tenti:
The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem. 468 - Rui Qiao, Qinglong Wang, Zongtao Duan, Na Fan:
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks. 469 - Niek J. Bouman, Niels de Vreede:
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals. 470 - Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac:
UC-Secure CRS Generation for SNARKs. 471 - Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells:
Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM). 472 - Chengdong Tao:
A Method to Reduce the Key Size of UOV Signature Scheme. 473 - John Matthew Macnaghten, James Luke Menzies, Mark Munro:
A Note on SIMON-32/64 Security. 474 - Dennis Hofheinz, Bogdan Ursu:
Dual-Mode NIZKs from Obfuscation. 475 - Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef:
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T. 476 - Cas Cremers, Britta Hale, Konrad Kohbrok:
Revisiting Post-Compromise Security Guarantees in Group Messaging. 477 - Sarah McCarthy, James Howe, Neil Smyth, Séamus Brannigan, Máire O'Neill:
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme. 478 - Sébastien Canard, Loïc Ferreira:
Extended 3-Party ACCE and Application to LoRaWAN 1.1. 479 - Karim Baghery:
On the Efficiency of Privacy-Preserving Smart Contract Systems. 480 - Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba:
An Efficient and Compact Reformulation of NIST Collision Estimate Test. 481 - Jacob Appelbaum, Chloe Martindale, Peter Wu:
Tiny WireGuard Tweak. 482 - Pierrick Méaux, Claude Carlet, Anthony Journault, François-Xavier Standaert:
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations. 483 - Eric Brier, Houda Ferradi, Marc Joye, David Naccache:
New Number-Theoretic Cryptographic Primitives. 484 - Razvan Barbulescu, Nadia El Mrabet, Loubna Ghammam:
A taxonomy of pairings, their security, their complexity. 485 - Suhyeon Lee, Seungjoo Kim:
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment. 486 - Michel Abdalla, Fabrice Benhamouda, Romain Gay:
From Single-Input to Multi-Client Inner-Product Functional Encryption. 487 - Alan Kaminsky:
Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication. 488 - Leon Botros, Matthias J. Kannwischer, Peter Schwabe:
Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4. 489 - Ward Beullens:
On sigma protocols with helper for MQ and PKP, fishy signature schemes and more. 490 - Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
Best Information is Most Successful. 491 - Daniel J. Bernstein, Andreas Hülsing:
Decisional second-preimage resistance: When does SPR imply PRE? 492 - Anamaria Costache, Kim Laine, Rachel Player:
Homomorphic noise growth in practice: comparing BGV and FV. 493 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model. 494 - Marc Joye:
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited. 495 - Christian Majenz, Christian Schaffner, Jeroen van Wier:
Non-malleability for quantum public-key encryption. 496 - Jiafan Wang, Sherman S. M. Chow:
Forward and Backward-Secure Range-Searchable Symmetric Encryption. 497 - Ward Beullens, Thorsten Kleinjung, Frederik Vercauteren:
CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations. 498 - Michael Naehrig, Joost Renes:
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography. 499 - Jean-Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca:
An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster. 500 - María Naya-Plasencia, André Schrottenloher:
Optimal Merging in Quantum k-xor and k-sum Algorithms. 501 - Shi Bai, Shaun Miller, Weiqiang Wen:
A refined analysis of the cost for solving LWE via uSVP. 502 - Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations. 503 - Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi:
Afgjort - A Semi-Synchronous Finality Layer for Blockchains. 504 - Felix Wegener, Thorben Moos, Amir Moradi:
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations. 505 - Erik-Oliver Blass, Guevara Noubir:
Forward Integrity and Crash Recovery for Secure Logs. 506 - Jiaxin Guan, Mark Zhandry:
Simple Schemes in the Bounded Storage Model. 507 - Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. 508 - Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-Similar Ciphers. 509 - Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes. 510 - Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited. 511 - Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System. 512 - Khoa Nguyen, Hanh Tang, Huaxiong Wang, Neng Zeng:
New Code-Based Privacy-Preserving Cryptographic Constructions. 513 - Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee:
Pixel: Multi-signatures for Consensus. 514 - Jakub Breier, Mustafa Khairallah, Xiaolu Hou, Yang Liu:
A Countermeasure Against Statistical Ineffective Fault Analysis. 515 - Anasuya Acharya, Manoj Prabhakaran, Akash Trehan:
CellTree: A New Paradigm for Distributed Data Repositories. 516 - Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert:
Mobile Private Contact Discovery at Scale. 517 - Payman Mohassel, Peter Rindal, Mike Rosulek:
Fast Database Joins for Secret Shared Data. 518 - Christopher Patton, Thomas Shrimpton:
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications. 519 - Benjamin M. Case, Colin M. Gallagher, Shuhong Gao:
A Note on Sub-Gaussian Random Variables. 520 - Benjamin M. Case, Shuhong Gao, Gengran Hu, Qiuxia Xu:
Fully Homomorphic Encryption with k-bit Arithmetic Operations. 521 - Amos Beimel, Naty Peter:
Secret-Sharing from Robust Conditional Disclosure of Secrets. 522 - Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. 523 - Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. 524 - Ciprian Baetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay:
Misuse Attacks on Post-Quantum Cryptosystems. 525 - Cas Cremers, Dennis Jackson:
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman. 526 - Olamide Omolola, Paul Plessing:
Revisiting Privacy-aware Blockchain Public Key Infrastructure. 527 - Xavier Bonnetain, Léo Perrin, Shizhu Tian:
Anomalies and Vector Space Search: Tools for S-Box Reverse-Engineering. 528 - Pedro Branco, Manuel Goulão, Paulo Mateus:
UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions. 529 - Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad:
Speed-up of SCA attacks on 32-bit multiplications. 530 - Kaoru Kurosawa:
How to Correct Errors in Multi-Server PIR. 531 - Carsten Baum, Ariel Nof:
Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography. 532 - Percy Deift, Stephen D. Miller, Thomas Trogdon:
Stopping time signatures for some algorithms in cryptography. 533 - Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Theoretical and Practical Approaches for Hardness Amplification of PUFs. 534 - Hwajeong Seo, Amir Jalali, Reza Azarderakhsh:
SIKE Round 2 Speed Record on ARM Cortex-M4. 535 - Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Florian Mendel, Robert Primas:
Protecting against Statistical Ineffective Fault Attacks. 536 - Patrick Derbez
, Pierre-Alain Fouque, Baptiste Lambin, Victor Mollimard:
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks. 537 - Nikolay Shenets:
On Perfect Endomorphic Ciphers. 538 - Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD. 539 - Markku-Juhani O. Saarinen:
A chosen key attack against the secret S-boxes of GOST. 540 - James M. Shook, Scott Simon, Peter Mell:
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement. 541 - Jonathan Protzenko, Benjamin Beurdouche, Denis Merigoux, Karthikeyan Bhargavan:
Formally Verified Cryptographic Web Applications in WebAssembly. 542 - John Kelsey, Dana Dachman-Soled, Sweta Mishra, Meltem Sönmez Turan:
TMPS: Ticket-Mediated Password Strengthening. 543 - Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto:
Evaluation of Code-based Signature Schemes. 544 - (Withdrawn) Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers. 545
- David Cerezo Sánchez:
Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies. 546 - Chloé Hébant, Duong Hieu Phan, David Pointcheval:
Linearly-Homomorphic Signatures and Scalable Mix-Nets. 547 - Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich:
About Wave Implementation and its Leakage Immunity. 548 - Arka Rai Choudhuri, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum:
Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir. 549 - Srinath T. V. Setty:
Spartan: Efficient and general-purpose zkSNARKs without trusted setup. 550 - Emil Simion, Paul Burciu:
A note on the correlations between NIST cryptographic statistical tests suite. 551 - Binyi Chen, Yilei Chen, Kristina Hostáková, Pratyay Mukherjee:
Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space. 552 - John Gregory Underhill, Stiepan Aurélien Kovac, Xenia Bogomolec:
Towards post-quantum symmetric cryptography. 553 - Yu Long Chen, Eran Lambooij, Bart Mennink:
How to Build Pseudorandom Functions From Public Random Permutations. 554 - Georgios Fotiadis, Chloe Martindale:
Optimal TNFS-secure pairings on elliptic curves with composite embedding degree. 555 - Gideon Samid:
When Encryption is Not Enough - Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop). 556 - Xiaopeng Zhao, Jinwen Zheng, Nanyuan Cao, Zhenfu Cao, Xiaolei Dong:
Identity-Based Encryption from e-th Power Residue Symbols. 557 - Chloe Martindale, Lorenz Panny:
How to not break SIDH. 558 - Evgeny K. Alekseev, Lyudmila A. Kushchinskaya:
Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables. 559 - Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee, Dae Song Go, Sihem Mesnager:
Solutions of xqk+...+xq+x=a in GF(2n). 560 - Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang:
Faster Bootstrapping of FHE over the integers with large prime message space. 561 - Shahram Khazaei, Mojtaba Rafiee:
Multi-Adjustable Join Scheme. 562 - Omer Shlomovits, István András Seres:
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA. 563 - Sujit Kumar Muduli, Pramod Subramanyan, Sayak Ray:
Verification of Authenticated Firmware Load. 564 - Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart:
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption. 565 - Pranesh Santikellur, Aritra Bhattacharyay, Rajat Subhra Chakraborty:
Deep Learning based Model Building Attacks on Arbiter PUF Compositions. 566 - Xingye Lu, Man Ho Au, Zhenfei Zhang:
(Linkable) Ring Signature from Hash-Then-One-Way Signature. 567 - Debapriya Basu Roy, Debdeep Mukhopadhyay:
Post Quantum ECC on FPGA Platform. 568 - Wilson Abel Alberto Torres, Veronika Kuchta
, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng:
Lattice RingCT v2.0 with Multiple Input and Output Wallets. 569 - Daan van der Valk, Stjepan Picek:
Bias-variance Decomposition in Machine Learning-based Side-channel Analysis. 570 - Stefan Dziembowski
, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková:
Multi-Party Virtual State Channels. 571 - Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento:
On the Commitment Capacity of Unfair Noisy Channels. 572 - Christoph Dobraunig, Bart Mennink:
Security of the Suffix Keyed Sponge. 573 - Herman Galteland, Kristian Gjøsteen:
Subliminal channels in post-quantum digital signature schemes. 574 - Amir Jafari, Shahram Khazaei:
On Abelian Secret Sharing: duality and separation. 575 - Reza Kaboli, Shahram Khazaei, Maghsoud Parviz:
Group-homomorphic Secret Sharing Schemes Are Group-characterizable with Normal Subgroups. 576 - Deevashwer Rathee, Thomas Schneider, K. K. Shukla:
Improved Multiplication Triple Generation over Rings via RLWE-based AHE. 577 - Houssem Maghrebi:
Deep Learning based Side Channel Attacks in Practice. 578 - Dominic Letz:
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices. 579 - Russell W. F. Lai, Viktoria Ronge, Tim Ruffing, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Jiafan Wang:
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs. 580 - (Withdrawn) On relaxed security notions for secret sharing. 581
- Ran Canetti, Alley Stoughton, Mayank Varia:
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security. 582 - Christoph Egger, Pedro Moreno-Sanchez
, Matteo Maffei:
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. 583 - (Withdrawn) 2-threshold Ideal Secret Sharing Schemes Can Be Uniquely Modeled by Latin Squares. 584
- Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay:
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners. 585 - Jihye Kim, Jiwon Lee, Hyunok Oh:
QAP-based Simulation-Extractable SNARK with a Single Verification. 586 - Pierre Civit, Seth Gilbert, Vincent Gramoli:
Polygraph: Accountable Byzantine Agreement. 587 - Jakub Klemsa, Ivana Trummová:
Formal Notions of Security for Verifiable Homomorphic Encryption. 588 - Erkan Tairi, Pedro Moreno-Sanchez
, Matteo Maffei:
A2L: Anonymous Atomic Locks for Scalability and Interoperability in Payment Channel Hubs. 589 - Nina Bindel, Mike Hamburg, Andreas Hülsing, Edoardo Persichetti:
Tighter proofs of CCA security in the quantum random oracle model. 590 - Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev:
Simulating Homomorphic Evaluation of Deep Learning Predictions. 591 - Andrei Mogage, Emil Simion:
Statistical Analysis and Anonymity of TOR's Path Selection. 592 - Vasyl Ustimenko, Michal Klisowski:
On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces. 593 - Mugurel Barcau, Vicentiu Pasol:
Cryptanalysis of Ring Homomorphic Encryption Schemes. 594 - Pedro Moreno-Sanchez
, RandomRun, Duc Viet Le, Sarang Noether, Brandon Goodell, Aniket Kate:
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero. 595 - Sean Murphy, Rachel Player:
Discretisation and Product Distributions in Ring-LWE. 596 - Shahram Khazaei:
A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio. 597 - (Withdrawn) Partial Secret Sharing. 598
- Ivan Damgård, Daniel Escudero, Tore Kasper Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev:
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning. 599 - Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. 600 - Ariel Gabizon:
Improved prover efficiency and SRS size in a Sonic-like system. 601 - Gianluca Brian, Antonio Faonio
, Daniele Venturi:
Continuously Non-Malleable Secret Sharing for General Access Structures. 602 - Yael Kalai, Omer Paneth, Lisa Yang:
How to Delegate Computations Publicly. 603 - Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan:
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. 604 - Mihail Anghel, Andrei Racautanu:
A note on different types of ransomware attacks. 605 - François Gérard, Mélissa Rossi:
An Efficient and Provable Masked Implementation of qTESLA. 606 - Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang:
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes. 607 - Navid Alamati, Hart Montgomery, Sikhar Patranabis:
Symmetric Primitives with Structured Secrets. 608 - Fuyuki Kitagawa, Takahiro Matsuda:
CPA-to-CCA Transformation for KDM Security. 609 - Jean-Sébastien Coron, Agnese Gini:
Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem. 610 - Thaddeus Dryja:
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set. 611 - Helger Lipmaa:
Simple Yet Efficient Knowledge-Sound and Non-Black-Box Any-Simulation-Extractable ZK-SNARKs. 612 - Taha Atahan Akyildiz, Can Berk Guzgeren, Cemal Yilmaz, Erkay Savas:
MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks. 613 - Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks without Superposition Queries: the Offline Simon Algorithm. 614 - Siemen Dhooghe, Svetla Nikova:
My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks. 615 - Iftach Haitner, Noam Mazor, Ronen Shaltiel, Jad Silbak:
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation. 616 - Sebastian Gajek, Marco Lewandowsky:
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model. 617 - Fukang Liu, Takanori Isobe:
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods. 618 - Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass:
Continuous Verifiable Delay Functions. 619 - Steven D. Galbraith, Lukas Zobernig:
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems. 620 - Bruce Kallick:
A Modified Simple Substitution Cipher With Unbounded Unicity Distance. 621 - Zhenzhen Bao, Jian Guo, Eik List:
Extended Expectation Cryptanalysis on Round-reduced AES. 622 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Exploring Constructions of Compact NIZKs from Various Assumptions. 623 - Mihir Bellare, Ruth Ng, Björn Tackmann:
Nonces are Noticed: AEAD Revisited. 624 - Rio LaVigne, Andrea Lincoln
, Virginia Vassilevska Williams:
Public-Key Cryptography in the Fine-Grained Setting. 625 - Vipul Goyal, Aayush Jain, Amit Sahai:
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge. 626 - Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan:
Unconditionally Secure Computation Against Low-Complexity Leakage. 627 - Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu:
Watermarking Public-Key Cryptographic Primitives. 628 - Shweta Agrawal, Monosij Maitra, Shota Yamada:
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE. 629 - Junqing Gong, Brent Waters, Hoeteck Wee:
ABE for DFA from k-Lin. 630 - Cody Freitag, Ilan Komargodski, Rafael Pass:
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge. 631 - Ariel Hamlin, Justin Holmgren
, Mor Weiss, Daniel Wichs:
On the Plausibility of Fully Homomorphic Encryption for RAMs. 632 - Igor A. Semaev:
New non-linearity parameters of Boolean functions. 633 - Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai:
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension. 634 - Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan:
Homomorphic Time-Lock Puzzles and Applications. 635 - Rishab Goyal, Willy Quach, Brent Waters, Daniel Wichs:
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions. 636 - Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptographic Sensing. 637 - Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica:
On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography. 638 - Nico Döttling, Sanjam Garg
, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky:
Trapdoor Hash Functions and Their Applications. 639 - Nir Bitansky, Omer Paneth:
On Round Optimal Statistical Zero Knowledge Arguments. 640 - Shahla Atapoor, Karim Baghery:
Simulation Extractability in Groth's zk-SNARK. 641 - Jonathan Bootle, Vadim Lyubashevsky, Gregor Seiler:
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs. 642 - Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. 643 - Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas:
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-. 644 - Shweta Agrawal, Monosij Maitra, Shota Yamada:
Attribute Based Encryption for Deterministic Finite Automata from DLIN. 645 - Vipul Goyal, Yanyi Liu, Yifan Song:
Communication-Efficient Unconditional MPC with Guaranteed Output Delivery. 646 - Tatiana Bradley, Stanislaw Jarecki, Jiayu Xu:
Strong Asymmetric PAKE based on Trapdoor CKEM. 647 - Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan:
Efficient Invisible and Unlinkable Sanitizable Signatures. 648 - Donghui Ding, Xin Jiang, Jiaping Wang, Hao Wang, Xiaobing Zhang, Yi Sun:
Txilm: Lossy Block Compression with Salted Short Hashing. 649 - Nico Döttling, Russell W. F. Lai, Giulio Malavolta:
Incremental Proofs of Sequential Work. 650 - Muhammad Ishaq, Ana L. Milanova, Vassilis Zikas:
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing. 651 - Navid Ghaedi Bardeh, Sondre Rønjom:
The Exchange Attack: How to Distinguish 6 Rounds of AES with 288.2 chosen plaintexts. 652 - Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin:
On the Local Leakage Resilience of Linear Secret Sharing Schemes. 653 - Brandon Goodell, Sarang Noether, Arthur Blue:
Compact linkable ring signatures and applications. 654 - Daniel J. Bernstein:
Visualizing size-security tradeoffs for lattice-based encryption. 655 - (Withdrawn) SeqL: SAT-attack Resilient Sequential Locking. 656
- Leonard Assouline, Tianren Liu:
Multi-Party PSM, Revisited. 657 - Jun Furukawa
, Yehuda Lindell:
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest. 658 - Nico Döttling, Sanjam Garg
, Giulio Malavolta, Prashant Nalini Vasudevan:
Tight Verifiable Delay Functions. 659 - Zheng Wang, Cong Ling:
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling. 660 - Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. 661 - Christian Badertscher, Daniel Jost, Ueli Maurer:
Agree-and-Prove: Generalized Proofs Of Knowledge and Applications. 662 - Mohammad Mahmoody, Caleb Smith, David J. Wu:
A Note on the (Im)possibility of Verifiable Delay Functions in the Random Oracle Model. 663 - Huanyu Wang, Martin Brisfors, Sebastian Forsmark, Elena Dubrova:
How Diversity Affects Deep-Learning Side-Channel Attacks. 664 - Jintai Ding, Pedro Branco, Kevin Schmitt:
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption. 665 - Zheng Wang, Cong Ling:
On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling. 666 - Arka Rai Choudhuri, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum:
PPAD-Hardness via Iterated Squaring Modulo a Composite. 667 - Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. 668 - Yunwen Liu, Yu Sasaki:
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. 669 - Vahid Amin Ghafari, Honggang Hu, Fujiang Lin:
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks. 670 - Ahto Buldas, Risto Laanoja, Ahto Truu:
A Server-Assisted Hash-Based Signature Scheme. 671 - Ahto Buldas, Risto Laanoja, Ahto Truu:
A Blockchain-Assisted Hash-Based Signature Scheme. 672 - Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu:
A New Approach to Constructing Digital Signature Schemes (Extended Paper). 673 - Jiabo Wang, Cong Ling:
Polar Sampler: Discrete Gaussian Sampling over the Integers Using Polar Codes. 674 - Dominik Harz, Lewis Gudgeon, Arthur Gervais, William J. Knottenbelt:
Balance : Dynamic Adjustment of Cryptocurrency Deposits. 675 - Eleftherios Kokoris-Kogias:
Robust and Scalable Consensus for Sharded Distributed Ledgers. 676 - Mingjia Huo, Kewen Wu, Qi Ye:
A Note on Lower Digits Extraction Polynomial for Bootstrapping. 677 - Yongwoo Lee, Wijik Lee, Young-Sik Kim, Jong-Seon No:
A Modified pqsigRM: RM Code-Based Signature Scheme. 678 - Maria Eichlseder, Daniel Kales, Markus Schofnegger:
Forgery Attacks on FlexAE and FlexAEAD. 679 - Charles Grover, Cong Ling:
Structured Module Learning With Errors From Cyclic Algebras. 680 - Ayesha Khalid, Sarah McCarthy, Weiqiang Liu, Máire O'Neill:
Lattice-based Cryptography for IoT in A Quantum World: Are We Ready? 681 - Alexandros Bakas, Antonis Michalas:
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX. 682 - Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin:
The Notion of Transparency Order, Revisited. 683 - Arijit Dutta, Saravanan Vijayakumaran:
Revelio: A MimbleWimble Proof of Reserves Protocol. 684 - Markku-Juhani O. Saarinen:
Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5. 685 - Nir Bitansky, Akshay Degwekar:
On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations. 686 - Zhengfeng Ji, Youming Qiao, Fang Song, Aaram Yun:
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography. 687 - Kyoohyung Han, Dohyeong Ki:
Better Bootstrapping for Approximate Homomorphic Encryption. 688 - Colin O'Flynn, Alex Dewar:
On-Device Power Analysis Across Hardware Security Domains. 689 - Changhai Ou, Siew-Kei Lam, Guiyuan Jiang:
The Art of Guessing in Combined Side-Channel Collision Attacks. 690 - Daniel J. Bernstein:
Comparing proofs of security for lattice-based encryption. 691 - Erica Blum, Jonathan Katz, Julian Loss:
Synchronous Consensus with Optimal Asynchronous Fallback Guarantees. 692 - Raphael Bost, Pierre-Alain Fouque:
Security-Efficiency Tradeoffs in Searchable Encryption - Lower Bounds and Optimal Constructions. 693 - Daniel Jost, Ueli Maurer, Marta Mularczyk:
A Unified and Composable Take on Ratcheting. 694 - Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Naoto Kiribuchi, Benny Pinkas:
An Efficient Secure Three-Party Sorting Protocol with an Honest Majority. 695 - Masayuki Abe, Miguel Ambrona, Miyako Ohkubo:
Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments. 696 - Elena Dubrova:
Breaking ACORN with a Single Fault. 697 - Poulami Das, Sebastian Faust, Julian Loss:
A Formal Treatment of Deterministic Wallets. 698 - André Chailloux:
Quantum security of the Fiat-Shamir transform of commit and open protocols. 699 - Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara
, Daisuke Suzuki:
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. 700 - Hiroaki Anada:
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs. 701 - Subhadeep Banik, Khashayar Barooti, Takanori Isobe:
Cryptanalysis of Plantlet. 702 - Carolyn Whitnall, Elisabeth Oswald:
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation. 703 - Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese:
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains. 704 - Ivan Damgård, Helene Haagh, Michael Nielsen, Claudio Orlandi:
Commodity-Based 2PC for Arithmetic Circuits. 705 - Daniel Masny, Peter Rindal:
Endemic Oblivious Transfer. 706 - Olivier Blazy, Céline Chevalier, Quoc-Huy Vu:
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions. 707