


default search action
IACR Cryptology ePrint Archive, Volume 2024
Volume 2024, 2024
- Vasyl Ustimenko:
On short digital signatures with Eulerian transformations. 1 - Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López:
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs. 2 - Alex Kampa:
Simple Soundness Proofs. 3 - Fredrik Meisingseth, Christian Rechberger, Fabian Schmid:
Practical Two-party Computational Differential Privacy with Active Security. 4 - Tamir Tassa, Avishay Yanai:
The Multiple Millionaires' Problem. 5 - Ran Canetti, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein:
Towards general-purpose program obfuscation via local mixing. 6 - Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, Willy Susilo:
Password Protected Universal Thresholdizer. 7 - Alessandro Budroni, Isaac Andrés Canales Martinez, Lucas Pandolfo Perin:
SoK: Methods for Sampling Random Permutations in Post-Quantum Cryptography. 8 - Aviad Ben Arie, Tamir Tassa:
Distributed Protocols for Oblivious Transfer and Polynomial Evaluation. 9 - Sulaiman Alhussaini, Craig Collett, Sergei Sergeev:
On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs. 10 - Daniel Noble, Brett Hemenway Falk, Rafail Ostrovsky:
MetaDORAM: Breaking the Log-Overhead Information Theoretic Barrier. 11 - Behnam Zahednejad, Chong-zhi Gao:
Two-Round ID-PAKE with strong PFS and single pairing operation. 12 - Zhengjun Cao, Lihua Liu:
A note on "intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era". 13 - Ahmet Ramazan Agirtas, Oguz Yayla:
A Lattice-based Accountable Subgroup Multi-signature Scheme with Verifiable Group Setup. 14 - Zhenkai Hu, Kang Yang, Yu Yu:
Unconditionally secure MPC for Boolean circuits with constant online communication. 15 - Sedigheh Khajouei-Nejad, Hamid Haj Seyyed Javadi, Sam Jabbehdari, Seyed Mohammad Hossein Moattar:
Reducing the computational complexity of fuzzy identity-based encryption from lattice. 16 - Yaroslav Balytskyi, Yevgen Kotukh, Gennady Khalimov, Sang-Yoon Chang:
PT-symmetric mapping of three states and its implementation on a cloud quantum processor. 17 - Scott R. Fluhrer, Quynh Dang:
Smaller Sphincs+. 18 - Randy Kuang, Maria Perepechaenko, Dafu Lou, Brinda Tank:
Benchmark Performance of Homomorphic Polynomial Public Key Cryptography for Key Encapsulation and Digital Signature Schemes. 19 - Michael Klooß, Andy Rupp, Daniel Schadt, Thorsten Strufe, Christiane Weis:
EROR: Efficient Repliable Onion Routing with Strong Provable Privacy. 20 - Gérald Gavin, Sandrine Tainturier:
Designing homomorphic encryptions with rational functions. 21 - San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu:
Fully Dynamic Attribute-Based Signatures for Circuits from Codes. 22 - Mustafa Khairallah:
CCA Security with Short AEAD Tags. 23 - Muhammed Ali Bingöl, Sermin Kocaman, Ali Dogan, Sibel Kurt Toplu:
FlexHi: A Flexible Hierarchical Threshold. 24 - Siavash Riahi, Orfeas Stefanos Thyfronitis Litos:
Bitcoin Clique: Channel-free Off-chain Payments using Two-Shot Adaptor Signatures. 25 - Huiwen Jia, Yupu Hu, Chunming Tang, Lin Wang:
Towards Compact Identity-based Encryption on Ideal Lattices. 26 - Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe Lin Jiang:
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice. 27 - Hoeteck Wee, David J. Wu:
Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis. 28 - Aarav Varshney, Prashant Agrawal, Mahabir Prasad Jhanwar:
YouChoose: A Lightweight Anonymous Proof of Account Ownership. 29 - Thomas Debris-Alazard, Pouria Fallahpour, Damien Stehlé:
Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs. 30 - Yi-Hsiu Chen, Yehuda Lindell:
Feldman's Verifiable Secret Sharing for a Dishonest Majority. 31 - Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, Jannik Spiessens:
Verifiable FHE via Lattice-based SNARKs. 32 - Qiu Shujing, Xin Xiangjun, Zheng Qian, Li Chaoyang, Li Fagen:
Security analysis and improvements on a semi-quantum electronic voting protocol. 33 - István András Seres, Péter Burcsi, Péter Kutas:
How (not) to hash into class groups of imaginary quadratic fields? 34 - Tore Kasper Frederiksen, Jonas Lindstrøm, Mikkel Wienberg Madsen, Anne Dorte Spangsberg:
A New Approach to Efficient and Secure Fixed-point Computation. 35 - Jian Wang
, Weiqiong Cao, Hua Chen, Haoyuan Li:
Blink: Breaking Lattice-Based Schemes Implemented in Parallel with Chosen-Ciphertext Attack. 36 - Damien Robert, Nicolas Sarkis:
Computing 2-isogenies between Kummer lines. 37 - Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, Leila Ben Abdelghani:
On Computing the Multidimensional Scalar Multiplication on Elliptic Curves. 38 - Manuel Barbosa, Deirdre Connolly, João Diogo Duarte
, Aaron Kaiser, Peter Schwabe, Karoline Varner, Bas Westerbaan:
X-Wing: The Hybrid KEM You've Been Looking For. 39 - Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, Kaiyi Zhang:
ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. 40 - Aikata, Dhiman Saha, Sujoy Sinha Roy:
SASTA: Ambushing Hybrid Homomorphic Encryption Schemes with a Single Fault. 41 - Jan Bobolz, Jesus Diaz, Markulf Kohlweiss:
Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. 42 - Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar:
Fuzzy Identity Based Encryption with a flexible threshold value. 43 - Estuardo Alpirez Bock, Chris Brzuska, Pihla Karanko, Sabine Oechsner, Kirthivaasan Puniamurthy:
Adaptive Distributional Security for Garbling Schemes with 풪(|x|) Online Complexity. 44 - Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, Leibo Liu:
A Low-Latency High-Order Arithmetic to Boolean Masking Conversion. 45 - Benjamin Dowling, Bhagya Wimalasiri:
Quantum-Secure Hybrid Communication for Aviation Infrastructure. 46 - Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy, Stefano Trevisani:
On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing. 47 - Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, Duong Hieu Phan:
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries. 48 - Annv Liu, An Wang, Shaofei Sun, Congming Wei, Yaoling Ding, Yongjuan Wang, Liehuang Zhu:
CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis. 49 - Jens Ernstberger, Stefanos Chaliasos, Liyi Zhou, Philipp Jovanovic, Arthur Gervais:
Do You Need a Zero Knowledge Proof? 50 - Atul Luykx, Kenneth G. Paterson:
Limits on Authenticated Encryption Use in TLS. 51 - Sahiba Suryawanshi, Shibam Ghosh, Dhiman Saha, Prathamesh Ram:
Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash. 52 - Michael Clear, Ciaran McGoldrick, Hitesh Tewari:
Anonymous Homomorphic IBE with Application to Anonymous Aggregation. 53 - Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu:
FEASE: Fast and Expressive Asymmetric Searchable Encryption. 54 - Yunxiao Zhou, Shengli Liu, Shuai Han:
Multi-Hop Fine-Grained Proxy Re-Encryption. 55 - Youcef Mokrani, David Jao:
Zero-Knowledge Proofs for SIDH variants with Masked Degree or Torsion. 56 - Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou:
Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs. 57 - Sacha Servan-Schreiber:
Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions. 58 - Oren Ganon, Itamar Levi:
CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors. 59 - Julius Hermelink, Kai-Chun Ning, Emanuele Strieder:
The Insecurity of Masked Comparisons: SCAs on ML-KEM's FO-Transform. 60 - Mengce Zheng:
Partial Key Exposure Attack on Common Prime RSA. 61 - WenBin Hsieh:
Double Difficulties, Defense in Depth A succinct authenticated key agreement protocol. 62 - Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier:
A Study of Soft Analytical Side-Channel Attacks on Secure Hash Algorithms. 63 - Pierrick Méaux, Qingju Wang:
Extreme Algebraic Attacks. 64 - Marie Beth van Egmond, Vincent Dunning, Stefan van den Berg, Thomas Rooijakkers, Alex Sangers, Ton Poppe, Jan Veldsink:
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation. 65 - Tolun Tosun, Amir Moradi, Erkay Savas:
Exploiting the Central Reduction in Lattice-Based Cryptography. 66 - Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang:
A Refined Hardness Estimation of LWE in Two-step Mode. 67 - Fangqi Dong, Zihan Hao, Ethan Mook, Daniel Wichs:
Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation. 68 - Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue:
SDitH in Hardware. 69 - Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. 70 - Seyedmohammad Nouraniboosjin, Fatemeh Ganji:
Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis. 71 - Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. 72 - Lipeng He:
A Comparative Examination of Network and Contract-Based Blockchain Storage Solutions for Decentralized Applications. 73 - Beyza Bozdemir, Betül Askin Özdemir, Melek Önen:
PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers. 74 - Moumita Dutta, Chaya Ganesh, Neha Jawalkar:
Succinct Verification of Compressed Sigma Protocols in the Updatable SRS setting. 75 - Loïc Demange, Mélissa Rossi:
A provably masked implementation of BIKE Key Encapsulation Mechanism. 76 - Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko:
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element. 77 - Pedram Hosseyni, Ralf Küsters, Tim Würtele:
Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process. 78 - Yanze Yang, Yiran Jia, Guangwu Xu:
On Modular Algorithms and Butterfly Operations in Number Theoretic Transform. 79 - Samuel Jaques:
Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions. 80 - Yulin Zhao, Hualin Zhou, Zhiguo Wan:
SuperFL: Privacy-Preserving Federated Learning with Efficiency and Robustness. 81 - James Bartusek, Zvika Brakerski, Vinod Vaikuntanathan:
Quantum State Obfuscation from Classical Oracles. 82 - Tianren Liu, Angelos Pelecanos, Stefano Tessaro, Vinod Vaikuntanathan:
Layout Graphs, Random Walks and the t-wise Independence of SPN Block Ciphers. 83 - Christoph Dobraunig, Krystian Matusiewicz, Bart Mennink, Alexander Tereschenko:
Efficient Instances of Docked Double Decker With AES. 84 - Dmitrii I. Koshelev:
Simultaneously simple universal and indifferentiable hashing to elliptic curves. 85 - Momonari Kudo, Kazuhiro Yokoyama:
On Hilbert-Poincaré series of affine semi-regular polynomial sequences and related Gröbner bases. 86 - Jung Hee Cheon, Hyeongmin Choe, Jai Hyun Park:
Tree-based Lookup Table on Batched Encrypted Queries using Homomorphic Encryption. 87 - Slim Bettaieb, Loïc Bidoux, Alessandro Budroni, Marco Palumbi, Lucas Pandolfo Perin:
Enabling PERK on Resource-Constrained Devices. 88 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Lidiia Nikiforova, Stanislav Smyshlyaev:
Two-party GOST in two parts: fruitless search and fruitful synthesis. 89 - Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller:
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection. 90 - Vasyl Ustimenko:
On historical Multivariate Cryptosystems and their restorations as instruments of Post-Quantum Cryptography. 91 - Sofía Celi, Alex Davidson:
Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries. 92 - Xindong Liu, Li-Ping Wang:
Short Code-based One-out-of-Many Proofs and Applications. 93 - Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade:
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions. 94 - Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin:
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches. 95 - Yasuhiko Ikematsu, Rika Akiyama:
Revisiting the security analysis of SNOVA. 96 - Dung Bui, Kelong Cong, Cyprien Delpech de Saint Guilhem:
Improved All-but-One Vector Commitment with Applications to Post-Quantum Signatures. 97 - Pierrick Méaux, Dibyendu Roy:
Theoretical differential fault attacks on FLIP and FiLIP. 98 - Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov:
Snarktor: A Decentralized Protocol for Scaling SNARKs Verification in Blockchains. 99 - Luke Demarest, Sohaib Ahmad, Sixia Chen, Benjamin Fuller, Alexander Russell:
FiveEyes: Cryptographic Biometric Authentication from the Iris. 100 - Albert Yu, Hai H. Nguyen, Aniket Kate, Hemanta K. Maji:
Unconditional Security using (Random) Anonymous Bulletin Board. 101 - Sanjam Garg
, Mohammad Hajiabadi, Peihan Miao, Alice Murphy:
Laconic Branching Programs from the Diffie-Hellman Assumption. 102 - Daniel Nager:
ChaCha related 64 bit oriented ARX cipher. 103 - Bo Jiang, Jian Du, Qiang Yan:
AnonPSI: An Anonymity Assessment Framework for PSI. 104 - Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gérault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti:
Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives. 105 - Ibrahim Yakut, Huseyin Polat:
A Trust-based Recommender System over Arbitrarily Partitioned Data with Privacy. 106 - Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, Antonio Marcedone:
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency. 107 - Angus Gruen:
Some Improvements for the PIOP for ZeroCheck. 108 - Jaehyung Kim, Jinyeong Seo, Yongsoo Song:
Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS. 109 - Peigen Li, Jintai Ding:
Cryptanalysis of the SNOVA signature scheme. 110 - Yong Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao, Zehua Qiao, Huaxin Wang:
A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation. 111 - Matthias J. Kannwischer, Markus Krausz
, Richard Petri, Shang-Yi Yang:
pqm4: Benchmarking NIST Additional Post-Quantum Signature Schemes on Microcontrollers. 112 - Wenhui Wu, Muzhou Li, Meiqin Wang:
Improved Linear Key Recovery Attacks on PRESENT. 113 - Quinten Norga, Jan-Pieter D'Anvers, Suparna Kundu, Ingrid Verbauwhede:
Mask Conversions for d+1 shares in Hardware, with Application to Lattice-based PQC. 114 - Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Accelerating BGV Bootstrapping for Large p Using Null Polynomials Over ℤpe. 115 - Marina Checri, Renaud Sirdey, Aymen Boudguiga, Jean-Paul Bultel, Antoine Choffrut:
On the practical CPAD security of "exact" and threshold FHE schemes and libraries. 116 - Alex Pellegrini, Giovanni Tognolini:
Breaking HWQCS: a code-based signature scheme from high weight QC-LDPC codes. 117 - Charles Gouert, Nektarios Georgios Tsoutsos:
Data Privacy Made Easy: Enhancing Applications with Homomorphic Encryption. 118 - Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran, Rajeev Raghunath:
R3PO: Reach-Restricted Reactive Program Obfuscation and its Application to MA-ABE. 119 - Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay:
K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures. 120 - Stephen M. Williams
:
An acceleration of the AKS prime identification algorithm. 121 - Gaurav Panwar, Roopa Vishwanathan, George Torres, Satyajayant Misra:
SPRITE: Secure and Private Routing in Payment Channel Networks. 122 - Elette Boyle, Ilan Komargodski, Neekon Vafa:
Memory Checking Requires Logarithmic Overhead. 123 - Akira Ito, Rei Ueno, Naofumi Homma:
Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks. 124 - Melike Çakmak, Ahmet Sinak, Oguz Yayla:
New self-orthogonal codes from weakly regular plateaued functions and their application in LCD codes. 125 - Emanuele Bellini, David Gérault, Matteo Protopapa, Matteo Rossi:
Monte Carlo Tree Search for automatic differential characteristics search: application to SPECK. 126 - Jung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, Elias Suvanto:
Attacks Against the INDCPA-D Security of Exact FHE Schemes. 127 - Ehsan Ebrahimi
:
Non-Binding (Designated Verifier) Signature. 128 - Gideon Samid:
Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers. 129 - Fabian Buschkowski, Georg Land, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
HADES: Automated Hardware Design Exploration for Cryptographic Primitives. 130 - Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders:
Practical Post-Quantum Signatures for Privacy. 131 - Rui Hao, Chenglong Yi, Weiqi Dai, Zhaonan Zhang:
SimpleFT: A Simple Byzantine Fault Tolerant Consensus. 132 - Meltem Sönmez Turan:
Optimizing Implementations of Boolean Functions. 133 - Sisi Duan, Yue Huang:
Byzantine Fault Tolerance with Non-Determinism, Revisited. 134 - Kexin Qiao, Siwei Sun, Zhaoyang Wang, Zehan Wu, Junjie Cheng, An Wang, Liehuang Zhu:
A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks. 135 - Jiawen Zhang, Jian Liu, Xinpeng Yang, Yinghao Wang, Kejia Chen, Xiaoyang Hou, Kui Ren, Xiaohu Yang:
Secure Transformer Inference Made Non-interactive. 136 - Chenxu Wang, Sisi Duan, Minghui Xu, Feng Li, Xiuzhen Cheng:
Sleepy Consensus in the Known Participation Model. 137 - Elisabeth Krahmer, Peter Pessl, Georg Land, Tim Güneysu:
Correction Fault Attacks on Randomized CRYSTALS-Dilithium. 138 - David Heath:
Efficient Arithmetic in Garbled Circuits. 139 - Binbin Tu, Min Zhang, Yu Chen:
Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps. 140 - Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Junichi Tomida:
Secure Statistical Analysis on Multiple Datasets: Join and Group-By. 141 - Xiaohai Dai, Zhaonan Zhang, Jiang Xiao, Jingtao Yue, Xia Xie, Hai Jin:
GradedDAG: An Asynchronous DAG-based BFT Consensus with Lower Latency. 142 - Xuanming Liu, Zhelei Zhou, Yinghao Wang, Bingsheng Zhang, Xiaohu Yang:
Scalable Collaborative zk-SNARK: Fully Distributed Proof Generation and Malicious Security. 143 - Maria Corte-Real Santos, Craig Costello, Benjamin Smith:
Efficient (3,3)-isogenies on fast Kummer surfaces. 144 - Charlotte Hoffmann, Pavel Hubácek, Svetlana Ivanova:
Practical Batch Proofs of Exponentiation. 145 - Jonathan Komada Eriksen, Antonin Leroux:
Computing Orientations from the Endomorphism Ring of Supersingular Curves and Applications. 146 - Thorben Moos, Sayandeep Saha, François-Xavier Standaert:
Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks. 147 - Charles Bouillaguet, Julia Sauvage:
Preliminary Cryptanalysis of the Biscuit Signature Scheme. 148 - Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang:
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks. 149 - Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin E. Lauter:
SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors. 150 - Antonio Flórez-Gutiérrez, Yosuke Todo:
Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing. 151 - Patrick Derbez, Marie Euler:
Equivalence of Generalised Feistel Networks. 152 - Robin Geelen:
Revisiting the Slot-to-Coefficient Transformation for BGV and BFV. 153 - Aurélien Dupin, Simon Abelard:
Broadcast Encryption using Sum-Product decomposition of Boolean functions. 154 - Philippe Chartier, Michel Koskas, Mohammed Lemou, Florian Méhats
:
Fully Homomorphic Encryption on large integers. 155 - Philippe Chartier, Michel Koskas, Mohammed Lemou, Florian Méhats
:
Homomorphic sign evaluation using functional bootstrapping with a RNS representation of integers. 156 - Jeroen van de Graaf, Arjen K. Lenstra:
Delphi: sharing assessments of cryptographic assumptions. 157 - Pousali Dey, Pratyay Mukherjee, Swagata Sasmal, Rohit Sinha:
HiSE: Hierarchical (Threshold) Symmetric-key Encryption. 158 - Suvradip Chakraborty, Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal:
Logstar: Efficient Linear* Time Secure Merge. 159 - Xiaohai Dai, Guanxiong Wang, Jiang Xiao, Zhengxuan Guo, Rui Hao, Xia Xie, Hai Jin:
LightDAG: A Low-latency DAG-based BFT Consensus through Lightweight Broadcast. 160 - Mingshu Cong, Tsz Hon Yuen, Siu Ming Yiu:
zkMatrix: Batched Short Proof for Committed Matrix Multiplication. 161 - Kasra Abbaszadeh, Christodoulos Pappas, Dimitrios Papadopoulos, Jonathan Katz:
Zero-Knowledge Proofs of Training for Deep Neural Networks. 162 - Chun Guo, Xiao Wang, Kang Yang, Yu Yu:
On Tweakable Correlation Robust Hashing against Key Leakages. 163 - Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT. 164 - Brent Waters, David J. Wu:
Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation. 165 - Hao Guo, Jintai Ding:
A Practical MinRank Attack Against VOX. 166 - Trevor Yap, Dirmanto Jap:
Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack. 167 - Hanwen Feng, Zhenliang Lu, Qiang Tang:
Breaking the Cubic Barrier: Distributed Key and Randomness Generation through Deterministic Sharding. 168 - Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Anupam Chattopadhyay:
Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM. 169 - Trevor Yap Hong Eng, Shivam Bhasin, Léo Weissbart:
Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis. 170 - Tairong Huang, Shihe Ma, Anyu Wang, Xiaoyun Wang:
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption. 171 - Zeyu Liu, Yunhao Wang:
Relaxed Functional Bootstrapping: A New Perspective on BGV/BFV Bootstrapping. 172 - Helger Lipmaa, Roberto Parisella, Janno Siim:
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions. 173 - Randy Kuang:
QPP and HPPK: Unifying Non-Commutativity for Quantum-Secure Cryptography with Galois Permutation Group. 174 - Quang Dao, Aayush Jain:
Lossy Cryptography from Code-Based Assumptions. 175 - Panos Kampanakis, Will Childs-Klein:
The impact of data-heavy, post-quantum TLS 1.3 on the Time-To-Last-Byte of real-world connections. 176 - Qiaohan Chu, Li Lin, Chen Qian, Jie Chen:
Registered Functional Encryption for Quadratic Functions from MDDH. 177 - Dung Bui, Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia:
Fast Public-Key Silent OT and More from Constrained Naor-Reingold. 178 - Pedro Branco, Russell W. F. Lai, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Ivy K. Y. Woo:
Traitor Tracing without Trusted Authority from Registered Functional Encryption. 179 - Aya Fukami, Richard Buurke, Zeno Geradts:
Exploiting RPMB authentication in a closed source TEE implementation. 180 - Dongwon Lee, Seonhong Min, Yongsoo Song:
Functional Bootstrapping for FV-style Cryptosystems. 181 - Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng, Dongxiao Yu, Qin Hu, Yijun Li, Yipu Wu:
FileDES: A Secure, Scalable and Succinct Decentralized Encrypted Storage Network. 182 - Balthazar Bauer, Georg Fuchsbauer:
On Security Proofs of Existing Equivalence Class Signature Schemes. 183 - Rafaël Del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani O. Saarinen:
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions. 184 - Alexandre Belling, Azam Soleimanian, Bogdan Ursu:
Vortex: A List Polynomial Commitment and its Application to Arguments of Knowledge. 185 - Daniel Dobkin, Nimrod Cever, Itamar Levi:
RAD-FS - Inherent and Embedded SCA-Security in Ultra-Low Power IoTs. 186 - Anna-Maurin Graner, Björn Kriepke, Lucas Krompholz, Gohar M. Kyureghyan:
On the bijectivity of the map χ. 187 - Yanxue Jia, Varun Madathil, Aniket Kate:
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted. 188 - Haoqian Zhang, Michelle Yeo, Vero Estrada-Galiñanes, Bryan Ford:
ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution. 189 - Patrick Struck, Maximiliane Weishäupl:
Constructing Committing and Leakage-Resilient Authenticated Encryption. 190 - Steven D. Galbraith, Yi-Fu Lai, Hart Montgomery:
A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions. 191 - Elette Boyle, Lisa Kohl, Zhe Li, Peter Scholl:
Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism. 192 - Laura Maddison:
MQ Does Not Reduce to TUOV. 193 - Christian Mouchet, Sylvain Chatel, Apostolos Pyrgelis, Carmela Troncoso:
Helium: Scalable MPC among Lightweight Participants and under Churn. 194 - Décio Luiz Gazzoni Filho, Guilherme Brandão, Gora Adj, Arwa Alblooshi, Isaac Andrés Canales Martinez, Jorge Chávez-Saab, Julio López:
PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs. 195 - Pierre Pébereau:
Subfield attack: leveraging composite-degree extensions in the Quotient Ring transform. 196 - Giulia Scaffino, Lukas Aumayr, Mahsa Bastankhah, Zeta Avarikioti, Matteo Maffei:
Alba: The Dawn of Scalable Bridges for Blockchains. 197 - Sourav Das, Benny Pinkas, Alin Tomescu, Zhuolun Xiang:
Distributed Randomness using Weighted VRFs. 198 - Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing. 199 - Karl Kreder, Shreekara Shastry, Apostolos Tzinas, Sriram Vishwanath, Dionysis Zindros:
A Better Proof-of-Work Fork Choice Rule. 200 - Antonio Sanso:
Breaking the decisional Diffie-Hellman problem in totally non-maximal imaginary quadratic orders. 201 - Mark Manulis, Jérôme Nguyen:
Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability. 202 - Andreea Alexandru, Ahmad Al Badawi, Daniele Micciancio, Yuriy Polyakov:
Application-Aware Approximate Homomorphic Encryption: Configuring FHE for Practical Use. 203 - Zeyu Liu, Eran Tromer, Yunhao Wang:
PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation. 204 - ChihYun Chuang, IHung Hsu, TingFang Lee:
A Generalized Distributed RSA Key Generation. 205 - Andi Liu, Yizhong Liu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Yuan Lu:
Kronos: A Robust Sharding Blockchain Consensus with Optimal Communication Overhead. 206 - Prabhanjan Ananth, Gilad Asharov, Vipul Goyal, Hadar Kaner, Pratik Soni, Brent Waters:
NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness. 207 - Samuel Lavery:
Asymmetric Cryptography from Number Theoretic Transformations. 208 - Konstantinos Brazitikos, Vassilis Zikas:
General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption. 209 - Dionysis Zindros, Apostolos Tzinas, David Tse:
Rollerblade: Replicated Distributed Protocol Emulation on Top of Ledgers. 210 - Tao Zhang, Shang Shi, Md. Habibur Rahman, Nitin Varshney, Akshay Kulkarni, Farimah Farahmandi, Mark M. Tehranipoor:
INSPECT: Investigating Supply Chain and Cyber-Physical Security of Battery Systems. 211 - Elijah Pelofske:
Analysis of a Programmable Quantum Annealer as a Random Number Generator. 212 - Charlotte Lefevre:
A Note on Adversarial Online Complexity in Security Proofs of Duplex-Based Authenticated Encryption Modes. 213 - Michele Battagliola, Andrea Flamini:
Distributed Fiat-Shamir Transform. 214 - Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo:
Batch PIR and Labeled PSI with Oblivious Ciphertext Compression. 215 - Pedro Branco, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto:
Rate-1 Fully Local Somewhere Extractable Hashing from DDH. 216 - David Du Pont, Jonas Bertels, Furkan Turan, Michiel Van Beirendonck, Ingrid Verbauwhede:
Hardware Acceleration of the Prime-Factor and Rader NTT for BGV Fully Homomorphic Encryption. 217 - Mustafa Khairallah, Srinivasan Yadhunathan, Shivam Bhasin:
Lightweight Leakage-Resilient PRNG from TBCs using Superposition. 218 - Pierre Pébereau:
Singular points of UOV and VOX. 219 - John Preuß Mattsson:
Security of Symmetric Ratchets and Key Chains - Implications for Protocols like TLS 1.3, Signal, and PQ3. 220 - Dimitris Mouris, Christopher Patton, Hannah Davis, Pratik Sarkar, Nektarios Georgios Tsoutsos:
Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics. 221 - Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher:
Reducing the Number of Qubits in Quantum Factoring. 222 - Sri Aravinda Krishnan Thyagarajan, Ke Wu, Pratik Soni:
Game-Theoretically Fair Distributed Sampling. 223 - Nir Bitansky, Nathan Geier:
Amplification of Non-Interactive Zero Knowledge, Revisited. 224 - Yilei Chen, Xinyu Mao:
Universal Computational Extractors from Lattice Assumptions. 225 - Keita Emura, Shingo Sato, Atsushi Takayasu:
Attribute-based Keyed (Fully) Homomorphic Encryption. 226 - Surya Mathialagan, Spencer Peters, Vinod Vaikuntanathan:
Adaptively Sound Zero-Knowledge SNARKs for UP. 227 - Ren Taguchi, Atsushi Takayasu:
On the Untapped Potential of the Quantum FLT-based Inversion. 228 - Changrui Mu, Shafik Nassar, Ron D. Rothblum, Prashant Nalini Vasudevan:
Strong Batching for Non-Interactive Statistical Zero-Knowledge. 229 - Seongtaek Chee, Kyung Chul Jeong, Tanja Lange, Nari Lee, Alex Pellegrini, Hansol Ryu:
Analysis of Layered ROLLO-I. 230 - Eugene Frimpong, Alexandros Bakas, Camille Foucault, Antonis Michalas:
Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices. 231 - Hyeonbum Lee, Jae Hong Seo:
On the Security of Nova Recursive Proof System. 232 - Vladimir Shpilrain, Bianca Sosnovski:
Cayley hashing with cookies. 233 - Manuel Barbosa, Kai Gellert, Julia Hesse, Stanislaw Jarecki:
Bare PAKE: Universally Composable Key Exchange from just Passwords. 234 - Miranda Christ, Sam Gunn:
Pseudorandom Error-Correcting Codes. 235 - Hart Montgomery, Sikhar Patranabis:
Public-Key Cryptography through the Lens of Monoid Actions. 236 - Hao Chung, Tim Roughgarden, Elaine Shi:
Collusion-Resilience in Transaction Fee Mechanism Design. 237 - Sönke Jendral:
A Single Trace Fault Injection Attack on Hedged CRYSTALS-Dilithium. 238 - Hiroki Okada, Tsuyoshi Takagi:
Simulation-Secure Threshold PKE from Standard (Ring-)LWE. 239 - Nobuyuki Sugio:
Implementation of Cryptanalytic Programs Using ChatGPT. 240 - Kaisei Kajita, Go Ohtake, Tsuyoshi Takagi:
Generalized Adaptor Signature Scheme: From Two-Party to N-Party Settings. 241 - Yifan Song, Xiaxi Ye:
Perfectly-Secure MPC with Constant Online Communication Complexity. 242 - Vipul Goyal, Chen-Da Liu-Zhang, Yifan Song:
Towards Achieving Asynchronous MPC with Linear Communication and Optimal Resilience. 243 - Alessandro Budroni, Jesús-Javier Chi-Domínguez, Giuseppe D'Alconzo, Antonio J. Di Scala, Mukul Kulkarni:
Don't Use It Twice! Solving Relaxed Linear Code Equivalence Problems. 244 - Xiaoyu Ji, Junru Li, Yifan Song:
Linear-Communication Asynchronous Complete Secret Sharing with Optimal Resilience. 245 - Adam Blatchley Hansen, Jesper Buus Nielsen, Mark Simkin:
OCash: Fully Anonymous Payments between Blockchain Light Clients. 246 - Simon Tollec, Vedad Hadzic, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan Mangard:
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. 247 - Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner:
FRIDA: Data Availability Sampling from FRI. 248 - Nir Bitansky, Sapir Freizeit:
Robust Additive Randomized Encodings from IO and Pseudo-Non-linear Codes. 249 - Katharina Koschatko, Reinhard Lüftenegger, Christian Rechberger:
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi. 250 - Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer:
Communication-Optimal Convex Agreement. 251 - Dung Bui, Eliana Carozza, Geoffroy Couteau, Dahmun Goudarzi, Antoine Joux:
Short Signatures from Regular Syndrome Decoding, Revisited. 252 - Offir Friedman, Avichai Marmor, Dolev Mutzari, Omer Sadika, Yehonatan C. Scaly, Yuval Spiizer, Avishay Yanai:
2PC-MPC: Emulating Two Party ECDSA in Large-Scale MPC. 253 - Brent Waters, Mark Zhandry:
Adaptive Security in SNARGs via iO and Lossy Functions. 254 - Hosein Hadipour, Patrick Derbez, Maria Eichlseder:
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. 255 - Liyan Chen, Yilei Chen, Zikuan Huang, Nuozhou Sun, Tianqi Yang, Yiding Zhang:
Fiat-Shamir for Bounded-Depth Adversaries. 256 - Dan Boneh, Binyi Chen:
LatticeFold: A Lattice-based Folding Scheme and its Applications to Succinct Proof Systems. 257 - Chuanlei Li, Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng:
SoK: Decentralized Storage Network. 258 - Kehao Ma, Minghui Xu, Yihao Guo, Lukai Cui, Shiping Ni, Shan Zhang, Weibing Wang, Haiyong Yang, Xiuzhen Cheng:
Anonymity on Byzantine-Resilient Decentralized Computing. 259 - Antoine Joux, Julian Loss, Benedikt Wagner:
Kleptographic Attacks against Implicit Rejection. 260 - Véronique Cortier, Alexandre Debant, Anselme Goetschmann, Lucca Hirschi:
Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility. 261 - Tim Beyne, Addie Neyt:
Note on the cryptanalysis of Speedy. 262 - Sanjam Garg
, Dimitris Kolonelos, Guru-Vamsi Policharla, Mingyuan Wang:
Threshold Encryption with Silent Setup. 263 - Nils Fleischhacker, Mathias Hall-Andersen, Mark Simkin:
Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT. 264 - Michele Orrù, George Kadianakis, Mary Maller, Greg Zaverucha
:
Beyond the circuit: How to Minimize Foreign Arithmetic in ZKP Circuits. 265 - Leo de Castro, Kevin Lewi, Edward Suh:
WhisPIR: Stateless Private Information Retrieval with Low Communication. 266 - Evan Laufer, Alex Ozdemir, Dan Boneh:
zkPi: Proving Lean Theorems in Zero-Knowledge. 267 - Minki Hhan:
A New Approach to Generic Lower Bounds: Classical/Quantum MDL, Quantum Factoring, and More. 268 - Milad Seddigh, Seyed Hamid Baghestani:
A note on PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks. 269 - Samir Jordan Menon, David J. Wu:
YPIR: High-Throughput Single-Server PIR with Silent Preprocessing. 270 - Janice Jianing Si, Tanusree Sharma, Kanye Ye Wang:
Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem. 271 - Narendra Kumar Patel, Hemraj Shobharam Lamkuche:
Deep Learning Based Analysis of Key Scheduling Algorithm of Advanced Ciphers. 272 - Jonathan Trostle:
Information-Theoretic Homomorphic Encryption and 2-Party Computation. 273 - Heewon Chung, Hyojun Kim, Young-Sik Kim, Yongwoo Lee:
Amortized Large Look-up Table Evaluation with Multivariate Polynomials for Homomorphic Encryption. 274 - Chun Guo, Xiao Wang, Xiang Xie, Yu Yu:
The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets. 275 - Jiseung Kim
, Changmin Lee
:
Reduce and Prange: Revisiting Prange's Information Set Decoding for LPN and RSD. 276 - Juliane Krämer, Mirjam Loiero:
Fault Attacks on UOV and Rainbow. 277 - Ulrich Haböck, David Levit, Shahar Papini:
Circle STARKs. 278 - River Moreira Ferreira, Ludovic Perret:
Polynomial-Time Key-Recovery Attack on the ${\tt NIST}$ Specification of ${\tt PROV}$. 279 - Renas Bacho, Julian Loss, Gilad Stern, Benedikt Wagner:
HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures. 280 - Valerio Cini, Giulio Malavolta, Ngoc Khanh Nguyen, Hoeteck Wee:
Polynomial Commitments from Lattices: Post-Quantum Security, Fast Verification and Transparent Setup. 281 - Antoine Joux, Hunter Kippen, Julian Loss:
A Concrete Analysis of Wagner's k-List Algorithm over ℤp. 282 - Carmit Hazay, Yibin Yang:
Toward Malicious Constant-Rate 2PC via Arithmetic Garbling. 283 - Baris Ege, Bob Swinkels, Dilara Toprakhisar, Praveen Kumar Vadnala:
Practical Improvements to Statistical Ineffective Fault Attacks. 284 - Pawel Lorek, Moti Yung, Filip Zagórski:
Mirrored Commitment: Fixing "Randomized Partial Checking" and Applications. 285 - Jules Maire, Damien Vergnaud:
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head. 286 - Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
CAPABARA: A Combined Attack on CAPA. 287 - Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, María Naya-Plasencia:
A generic algorithm for efficient key recovery in differential attacks - and its associated tool. 288 - Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice. 289 - Martin Mittelbach, Rafael F. Schaefer, Matthieu R. Bloch, Aylin Yener, Onur Günlü:
Secure Integrated Sensing and Communication under Correlated Rayleigh Fading. 290 - Samuel Bouaziz-Ermann, Garazi Muguruza:
Quantum Pseudorandomness Cannot Be Shrunk In a Black-Box Way. 291 - Shuhao Zheng, Zonglun Li, Junliang Luo, Ziyue Xin, Xue Liu:
IDEA-DAC: Integrity-Driven Editing for Accountable Decentralized Anonymous Credentials via ZK-JSON. 292 - Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, Jie Chen:
Registered Attribute-Based Signature. 293 - Thomas Peters, Yaobin Shen, François-Xavier Standaert:
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate. 294 - Konstantinos Kryptos Chalkias, Jonas Lindstrøm, Arnab Roy:
An Efficient Hash Function for Imaginary Class Groups. 295 - Yiming Gao, Jinghui Wang, Honggang Hu, Binang He:
Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks. 296 - Abhisar, Madhav Yadav, Girish Mishra:
Accelerating Training and Enhancing Security Through Message Size Optimization in Symmetric Cryptography. 297 - Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher:
New Models for the Cryptanalysis of ASCON. 298 - Robin Leander Schröder, Stefan Gast, Qian Guo:
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks. 299 - Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang:
Diving Deep into the Preimage Security of AES-like Hashing. 300 - David Lubicz, Viktor Fischer:
Recommendations for the Design and Validation of a Physical True Random Number Generator Integrated in an Electronic Device. 301 - Tony Metger, Alexander Poremba, Makrand Sinha, Henry Yuen:
Pseudorandom unitaries with non-adaptive security. 302 - Arthur Lazzaretti, Charalampos Papamanthou:
Single Pass Client-Preprocessing Private Information Retrieval. 303 - Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, Yongluan Zhou:
A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance. 304 - Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal. 305 - Intak Hwang, Jinyeong Seo, Yongsoo Song:
Concretely Efficient Lattice-based Polynomial Commitment from Standard Assumptions. 306 - Afonso Arriaga
, Peter Y. A. Ryan, Marjan Skrobot:
SweetPAKE: Key exchange with decoy passwords. 307 - Afonso Arriaga
, Manuel Barbosa, Stanislaw Jarecki, Marjan Skrobot:
C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM. 308 - Prithwish Basu Roy, Johann Knechtel, Akashdeep Saha, Saideep Sreekumar, Likhitha Mankali, Mohammed Thari Nabeel, Debdeep Mukhopadhyay, Ramesh Karri, Ozgur Sinanoglu:
NiLoPher: Breaking a Modern SAT-Hardened Logic-Locking Scheme via Power Analysis Attack. 309 - Matthias Johann Steiner:
A Zero-Dimensional Gröbner Basis for Poseidon. 310 - Marius A. Aardal, Diego F. Aranha, Katharina Boudgoust, Sebastian Kolby, Akira Takahashi:
Aggregating Falcon Signatures with LaBRADOR. 311 - Benedikt Auerbach, Christoph U. Günther, Krzysztof Pietrzak:
Trapdoor Memory-Hard Functions. 312 - Matthias Johann Steiner:
The Complexity of Algebraic Algorithms for LWE. 313 - Andrey Kim, Ahmet Can Mert, Anisha Mukherjee, Aikata, Maxim Deryabin, Sunmin Kwon, HyungChul Kang, Sujoy Sinha Roy:
Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration. 314 - Christina Boura, Patrick Derbez, Margot Funk:
Alternative Key Schedules for the AES. 315 - Schuyler Rosefield, Abhi Shelat, LaKyah Tyner:
Threshold Garbled Circuits with Low Overhead. 316 - Giovanni Deligios, Mose Mizrahi Erbes:
Closing the Efficiency Gap between Synchronous and Network-Agnostic Consensus. 317 - Alexander Hoover, Sarvar Patel, Giuseppe Persiano, Kevin Yeo:
Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs. 318 - Vasyl Ustimenko:
On the cryptosystems based on two Eulerian transfor-mations defined over the commutative rings Z2s, s>1. 319 - Hanjun Li, Sela Navot, Stefano Tessaro:
POPSTAR: Lightweight Threshold Reporting with Reduced Leakage. 320 - Vincent Hwang:
Formal Verification of Emulated Floating-Point Arithmetic in Falcon. 321 - Weixi Zheng, Liu Zhang, Zilong Wang:
Theoretical Explanation and Improvement of Deep Learning-aided Cryptanalysis. 322 - Ruida Wang, Yundi Wen, Zhihao Li, Xianhui Lu, Benqiang Wei, Kun Liu, Kunpeng Wang:
Circuit Bootstrapping: Faster and Smaller. 323 - Jake Januzelli, Lawrence Roy, Jiayu Xu:
Under What Conditions Is Encrypted Key Exchange Actually Secure? 324 - Benedikt Bünz, Jessica Chen:
Proofs for Deep Thought: Accumulation for large memories and deterministic computations. 325 - Nicolas Alhaddad, Mayank Varia, Ziling Yang:
Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications. 326 - Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered Functional Encryptions from Pairings. 327 - Cécile Delerablée, Lénaïck Gouriou, David Pointcheval:
Attribute-Based Signatures with Advanced Delegation, and Tracing. 328 - Houda Ferradi:
How to Validate a Verification? 329 - Aron van Baarsen, Sihang Pu:
Fuzzy Private Set Intersection with Large Hyperballs. 330 - Maryam Bahrani, Pranav Garimidi, Tim Roughgarden:
Transaction Fee Mechanism Design in a Post-MEV World. 331 - Yuval Ishai, Yifan Song:
Leakage-Tolerant Circuits. 332 - Pierre Briaud, Maxime Bros, Ray A. Perlner, Daniel Smith-Tone:
Practical Attack on All Parameters of the DME Signature Scheme. 333 - Jeremiah Blocki, Blake Holman, Seunghoon Lee:
The Impact of Reversibility on Parallel Pebbling. 334 - Naresh Goud Boddu, Vipul Goyal, Rahul Jain, João Ribeiro:
Split-State Non-Malleable Codes and Secret Sharing Schemes for Quantum Messages. 335 - Khai Hanh Tang, Minh Pham, Chan Nam Ngo:
RAMenPaSTA: Parallelizable Scalable Transparent Arguments of Knowledge for RAM Programs. 336 - Valerie Gilchrist, Laurane Marco, Christophe Petit, Gang Tang:
Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme. 337 - Itai Dinur:
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis. 338 - Gianluca Brian, Stefan Dziembowski, Sebastian Faust:
From Random Probing to Noisy Leakages Without Field-Size Dependence. 339 - Brent Waters:
A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors. 340 - Leo de Castro, Keewoo Lee:
VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers. 341 - Jiahui He, Kai Hu, Hao Lei, Meiqin Wang:
Massive Superpoly Recovery with a Meet-in-the-middle Framework - Improved Cube Attacks on Trivium and Kreyvium. 342 - Yang Gao:
Partial Differential Fault Analysis on Ascon. 343 - Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng:
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond. 344 - Guoqing Zhou, Maozhi Xu:
An Efficient Adaptive Attack Against FESTA. 345 - Maria Ferrara, Antonio Tortora, Maria Tota:
A data aggregation protocol based on TFHE. 346 - Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, Håvard Raddum:
The Algebraic Freelunch Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives. 347 - David Cui, Giulio Malavolta, Arthur Mehta, Anand Natarajan, Connor Paddock, Simon Schmidt, Michael Walter, Tina Zhang:
A Computational Tsirelson's Theorem for the Value of Compiled XOR Games. 348 - Yingxin Li, Fukang Liu, Gaoli Wang:
New Records in Collision Attacks on SHA-2. 349 - Yingxin Li, Fukang Liu, Gaoli Wang:
Automating Collision Attacks on RIPEMD-160. 350 - Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia:
Improved Differential Meet-In-The-Middle Cryptanalysis. 351 - Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, Tianyu Zhang:
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. 352 - Felicitas Hörmann
, Wessel P. J. van Woerden:
FuLeakage: Breaking FuLeeca by Learning Attacks. 353 - Lev Soukhanov:
WARPfold : Wrongfield ARithmetic for Protostar folding. 354 - Pratish Datta, Jiaxin Guan, Alexis Korb, Amit Sahai:
Adaptively Secure Streaming Functional Encryption. 355 - Kai-Min Chung, Eli Goldin, Matthew Gray:
On Central Primitives for Quantum Cryptography with Classical Communication. 356 - Douglas Stebila:
Security analysis of the iMessage PQ3 protocol. 357 - Qi Feng, Kang Yang, Kaiyi Zhang, Xiao Wang, Yu Yu, Xiang Xie, Debiao He:
Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication. 358 - Caicai Chen, Chris Jones:
Key-Recovery Attack on a Public-Key Encryption Related to Planted Clique. 359 - Yassine Hamoudi, Qipeng Liu, Makrand Sinha:
The NISQ Complexity of Collision Finding. 360 - Jiaxin Pan, Doreen Riepel, Runzhi Zeng:
Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation. 361 - Shan Chen, Marc Fischlin:
Integrating Causality in Messaging Channels. 362 - Roozbeh Sarenche, Ren Zhang, Svetla Nikova, Bart Preneel:
Time-Averaged Analysis of Selfish Mining in Bitcoin. 363 - Lars Ran, Simona Samardjiska, Monika Trimoska:
Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem. 364 - Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
Combined Threshold Implementation. 365 - Dipayan Das, Antoine Joux:
Key Recovery Attack on the Partial Vandermonde Knapsack Problem. 366 - Markku-Juhani O. Saarinen:
Accelerating SLH-DSA by Two Orders of Magnitude with a Single Hash Unit. 367 - Anand Kumar Narayanan, Youming Qiao, Gang Tang:
Algorithms for Matrix Code and Alternating Trilinear Form Equivalences via New Isomorphism Invariants. 368 - David Heath, Vladimir Kolesnikov, Lucien K. L. Ng:
Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts. 369 - Daniel Escudero, Yifan Song, Wenhao Wang:
Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus. 370 - Seungjun Baek, Giyoon Kim, Jongsung Kim:
Preimage Attacks on Reduced-Round Ascon-Xof. 371 - Pedro Branco, Nico Döttling, Akshayaram Srinivasan:
Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate. 372 - Edith Cohen, Xin Lyu, Jelani Nelson, Tamás Sarlós, Uri Stemmer:
Lower Bounds for Differential Privacy Under Continual Observation and Online Threshold Queries. 373 - You Lyu, Shengli Liu, Shuai Han:
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World. 374 - Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search. 375 - Gilad Asharov, Anirudh Chandramouli:
Perfect (Parallel) Broadcast in Constant Expected Rounds via Statistical VSS. 376 - Sebastian Faust, Loïc Masure, Elena Micheli, Maximilian Orlt, François-Xavier Standaert:
Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking. 377 - Wolfgang Stefani, Fynn Kappelhoff, Martin Gruber, Yu-Neng Wang, Sara Achour, Debdeep Mukhopadhyay, Ulrich Rührmair:
Strong PUF Security Metrics: Sensitivity of Responses to Single Challenge Bit Flips. 378 - Elizabeth C. Crites, Aggelos Kiayias, Amirreza Sarencheh:
SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity. 379 - Jan Buzek, Stefano Tessaro:
Collision Resistance from Multi-Collision Resistance for all Constant Parameters. 380 - Haotian Shi, Xiutao Feng:
Quantum Circuits of AES with a Low-depth Linear Layer and a New Structure. 381 - Chirag Madaan, Rohan Agarwal, Vipul Saini, Ujjwal Kumar:
Decentralized Access Control Infrastructure for Enterprise Digital Asset Management. 382 - Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran:
Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers. 383 - Truman Welling, Onur Günlü, Aylin Yener:
Transmitter Actions for Secure Integrated Sensing and Communication. 384 - Michel Seck, Abderrahmane Nitaj:
A New Public Key Cryptosystem Based on the Cubic Pell Curve. 385 - Christopher Harth-Kitzerow, Georg Carle:
High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings. 386 - Wenqing Hu, Tianyi Liu, Ye Zhang, Yuncong Zhang, Zhenfei Zhang:
Parallel Zero-knowledge Virtual Machine. 387 - Yijian Zhang, Yunhao Ling, Jie Chen, Luping Wang:
Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding. 388 - Tomer Ashur, Carmit Hazay, Rahul Satish:
On the Feasibility of Sliced Garbling. 389 - Gal Arnon, Alessandro Chiesa, Giacomo Fenzi, Eylon Yogev:
STIR: Reed-Solomon Proximity Testing with Fewer Queries. 390 - Daniel Escudero, Ivan Tjuawinata, Chaoping Xing:
On Information-Theoretic Secure Multiparty Computation with Local Repairability. 391 - Zhuang Shan, Leyou Zhang, Qing Wu:
Heuristic Ideal Obfuscation Scheme based on LWE Problem, its Variants and Quantum Oracle. 392 - Shintaro Narisada, Shusaku Uemura, Hiroki Okada, Hiroki Furue, Yusuke Aikawa, Kazuhide Fukushima:
Revisiting the May-Meurer-Thomae Algorithm - Solving McEliece-1409 in One Day. 393 - Shuhan Zeng, Yongjian Liao, Chuanhao Zhou, Jinlin He, Hongwei Wang:
A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System. 394 - Jiajun Xin, Arman Haghighi, Xiangan Tian, Dimitrios Papadopoulos:
Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators. 395 - Theresa Krüger:
On the impact of ionizing and non-ionizing irradiation damage on security microcontrollers in CMOS technology. 396 - Dan Boneh, Iftach Haitner, Yehuda Lindell:
Exponent-VRFs and Their Applications. 397 - Oana Ciobotaru, Maxim Peter, Vesselin Velichkov:
The Last Challenge Attack: Exploiting a Vulnerable Implementation of the Fiat-Shamir Transform in a KZG-based SNARK. 398 - Yanyi Liu, Rafael Pass:
A Direct PRF Construction from Kolmogorov Complexity. 399 - Max Duparc, Tako Boris Fouotsa, Serge Vaudenay:
SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks. 400 - Muhammed F. Esgin, Thomas Espitau, Guilhem Niot
, Thomas Prest, Amin Sakzad, Ron Steinfeld:
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures. 401 - Xinpeng Yang, Liang Cai, Yinghao Wang, Lu Sun, Jingwei Hu:
Efficient Unbalanced Quorum PSI from Homomorphic Encryption. 402 - Pierre Civit, Muhammad Ayaz Dzulfikar, Seth Gilbert, Rachid Guerraoui, Jovan Komatovic, Manuel Vidigueira:
DARE to agree: Byzantine Agreement with Optimal Resilience and Adaptive Communication. 403 - Lin Ding, Zhengting Li, Ziyu Guan, Xinhai Wang, Zheng Wu:
Breaking the DECT Standard Cipher with Lower Time Cost. 404 - Dan Boneh, Aditi Partap, Lior Rotem:
Traceable Secret Sharing: Strong Security and Efficient Constructions. 405 - Damien Robert:
Some notes on algorithms for abelian varieties. 406 - Charlotte Lefevre, Bart Mennink:
Permutation-Based Hashing Beyond the Birthday Bound. 407 - Hongbo Wen, Hanzhi Liu, Shuyang Tang, Shuhan Cao, Domo, Yu Feng:
Modular Indexer: Fully User-Verified Execution Layer for Meta-Protocols on Bitcoin. 408 - Jean-Luc Watson, Tess Despres, Alvin Tan, Shishir G. Patil, Prabal Dutta, Raluca Ada Popa:
Nebula: A Privacy-First Platform for Data Backhaul. 409 - Hilarie Orman:
Recent Progress in Quantum Computing Relevant to Internet Security. 410 - Henry Bambury, Hugo Beguinet, Thomas Ricosset, Éric Sageloli:
Polytopes in the Fiat-Shamir with Aborts Paradigm. 411 - Slim Bettaieb, Alessandro Budroni, Marco Palumbi, Décio Luiz Gazzoni Filho:
Quasi-Optimal Permutation Ranking and Applications to PERK. 412 - Juan Carlos Ku-Cauich, Javier Diaz-Vargas, Sara Mandujano-Velazquez:
Bent functions construction using extended Maiorana-McFarland's class. 413 - Joseph Carolan, Alexander Poremba:
Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations. 414 - Lei Fan, Zhenghao Lu, Hong-Sheng Zhou:
Column-wise Garbling, and How to Go Beyond the Linear Model. 415 - Wilson D. Nguyen, Trisha Datta, Binyi Chen, Nirvan Tyagi, Dan Boneh:
Mangrove: A Scalable Framework for Folding-based SNARKs. 416 - Hongyuan Qu, Guangwu Xu:
An improved exact CRR basis conversion algorithm for FHE without floating-point arithmetic. 417 - Ertem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, Valeria Nikolaenko:
Atomic and Fair Data Exchange via Blockchain. 418 - Bar Alon, Amos Beimel, Tamar Ben David, Eran Omri, Anat Paskin-Cherniavsky:
New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs. 419 - Noam Mazor, Rafael Pass:
Gap MCSP is not (Levin) NP-complete in Obfustopia. 420 - Xiangyu Hui, Sid Chi-Kin Chau:
LLRing: Logarithmic Linkable Ring Signatures with Transparent Setup. 421 - Deepak Kumar Dalai, Krishna Mallick:
A Class of Weightwise Almost Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity. 422 - Konstantina Miteloudi, Asmita Adhikary, Niels van Drueten, Lejla Batina, Ileana Buhan:
Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores. 423 - Flávio Bergamaschi
, Anamaria Costache, Dana Dachman-Soled, Hunter Kippen, Lucas LaBuff, Rui Tang:
On the Concrete Security of Approximate FHE with Noise-Flooding Countermeasures. 424 - Marshall Ball, Yanyi Liu, Noam Mazor, Rafael Pass:
Kolmogorov Comes to Cryptomania: On Interactive Kolmogorov Complexity and Key-Agreement. 425 - Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, Xiao Wang:
Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage. 426 - Hermann Seuschek, Johann Heyszl, Fabrizio De Santis:
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes. 427 - Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, Debayan Das:
SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V. 428 - Maxime Bombar, Dung Bui, Geoffroy Couteau, Alain Couvreur, Clément Ducros, Sacha Servan-Schreiber:
FOLEAGE: 픽4OLE-Based Multi-Party Computation for Boolean Circuits. 429 - Miranda Christ, Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Deepak Maram, Arnab Roy, Joy Wang:
SoK: Zero-Knowledge Range Proofs. 430 - Lorenzo Grassi, Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert:
Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version. 431 - Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra:
Perfect Asynchronous MPC with Linear Communication Overhead. 432 - Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling:
UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience. 433 - Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang:
Parameter-Hiding Order-Revealing Encryption without Pairings. 434 - Emanuele Giunta, Alistair Stewart:
Unbiasable Verifiable Random Functions. 435 - Conrado Porto Lopes Gouvêa, Chelsea Komlo:
Re-Randomized FROST. 436 - Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya:
EFFLUX-F2: A High Performance Hardware Security Evaluation Board. 438 - Enrico Piccione:
Threshold implementations of cryptographic functions between finite Abelian groups. 439 - Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau:
Secret and Shared Keys Recovery on Hamming Quasi-Cyclic with SASCA. 440 - Guilhem Mureau, Alice Pellet-Mary, Heorhii Pliatsok, Alexandre Wallet:
Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields. 441 - Konstantinos Kryptos Chalkias, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Alberto Sonnino, Joy Wang:
Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking. 442 - Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The cool and the cruel: separating hard parts of LWE secrets. 443 - Mario Yaksetig:
A trust-minimized e-cash for cryptocurrencies. 444 - Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy:
Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions. 445 - Ahmed S. Bendary, Wendson A. S. Barbosa, Andrew Pomerance, C. Emre Koksal:
Estimating the Unpredictability of Multi-Bit Strong PUF Classes. 446 - Jens Ernstberger, Jan Lauinger, Yinnan Wu, Arthur Gervais, Sebastian Steinhorst:
ORIGO: Proving Provenance of Sensitive Data with Constant Communication. 447 - Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey:
Differential Cryptanalysis of a Lightweight Block Cipher LELBC. 448 - Nabil Alkeilani Alkadri, Nico Döttling, Sihang Pu:
Practical Lattice-Based Distributed Signatures for a Small Number of Signers. 449 - Ward Beullens, Lucas Dodgson, Sebastian H. Faller, Julia Hesse:
The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations. 450 - Louis Tremblay Thibault, Michael Walter:
Towards Verifiable FHE in Practice: Proving Correct Execution of TFHE's Bootstrapping using plonky2. 451 - Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu:
Modeling Mobile Crash in Byzantine Consensus. 452 - Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang, Liang Feng Zhang:
Verifiable Information-Theoretic Function Secret Sharing. 453 - Zhengjun Cao, Zhenfu Cao:
The Systemic Errors of Banded Quantum Fourier Transformation. 454 - Connor Bell, Saba Eskandarian:
Anonymous Complaint Aggregation for Secure Messaging. 455 - Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam:
Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction. 456 - Lena Heimberger, Florian Lugstein, Christian Rechberger:
Studying Lattice-Based Zero-Knowlege Proofs: A Tutorial and an Implementation of Lantern. 457 - Maya Chartouny, Benoit Cogliati, Jacques Patarin:
Classical and Quantum Generic Attacks on 6-round Feistel Schemes. 458 - Luca De Feo, Tako Boris Fouotsa, Lorenz Panny:
Isogeny problems with level structure. 459 - Lorenzo Rovida, Alberto Leporati:
Encrypted Image Classification with Low Memory Footprint using Fully Homomorphic Encryption. 460 - Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, Tucker Balch:
Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy. 461 - Tom Gur, Jack O'Connor, Nicholas Spooner:
Perfect Zero-Knowledge PCPs for #P. 462 - Jean-Philippe Bossuat, Rosario Cammarota, Jung Hee Cheon, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Luis Antonio Ruiz Lopez, Yongsoo Song, Donggeon Yhee, Bahattin Yildiz:
Security Guidelines for Implementing Homomorphic Encryption. 463 - Doryan Lesaignoux, Mikael Carmona:
On the Implementation of a Lattice-Based Daa for VANET System. 464 - Dung Bui:
Shorter VOLEitH Signature from Multivariate Quadratic. 465 - Chelsea Komlo, Ian Goldberg:
Arctic: Lightweight and Stateless Threshold Schnorr Signatures. 466 - Rutchathon Chairattana-Apirom, Stefano Tessaro, Chenzhi Zhu:
Partially Non-Interactive Two-Round Lattice-Based Threshold Signatures. 467 - Matthias Johann Steiner:
Zero-Dimensional Gröbner Bases for Rescue-XLIX. 468 - Lennart Braun, Adrià Gascón, Mariana Raykova, Phillipp Schoppmann, Karn Seth:
Malicious Security for Sparse Private Histograms. 469 - Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, Damien Vergnaud:
Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations. 470 - Silvia Sconza, Arno Wildi:
Knot-based Key Exchange protocol. 471 - Nibesh Shrestha, Aniket Kate, Kartik Nayak:
Sailfish: Towards Improving Latency of DAG-based BFT. 472 - Mario Yaksetig:
Extremely Simple (Almost) Fail-Stop ECDSA Signatures. 473 - Benedikt Bünz, Pratyush Mishra
, Wilson Nguyen, William Wang:
Accumulation without Homomorphism. 474 - Matthew Gregoire, Rachel Thomas, Saba Eskandarian:
CheckOut: User-Controlled Anonymization for Customer Loyalty Programs. 475 - Zhangshuang Guan, Yulin Zhao, Zhiguo Wan, Jinsong Han:
OPSA: Efficient and Verifiable One-Pass Secure Aggregation with TEE for Federated Learning. 476 - Zheyuan He, Zihao Li, Sen Yang:
Large Language Models for Blockchain Security: A Systematic Literature Review. 477 - Weiqiong Cao, Hua Chen, Hongsong Shi, Haoyuan Li, Jian Wang, Jingyi Feng:
The Insecurity of SHA2 under the Differential Fault Characteristic of Boolean Functions. 478 - Hanwen Feng, Zhenliang Lu, Tiancheng Mai, Qiang Tang:
Making Hash-based MVBA Great Again. 479 - Wilbert Wu:
Folding-based zkLLM. 480 - Charlotte Hoffmann, Krzysztof Pietrzak:
Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation. 481 - Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Charalampos Papamanthou:
Single Server PIR via Homomorphic Thorp Shuffles. 482 - Orhun Kara:
Lower data attacks on Advanced Encryption Standard. 483 - Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay, Shivam Bhasin:
Harmonizing PUFs for Forward Secure Authenticated Key Exchange with Symmetric Primitives. 484 - Florette Martinez:
A Variation on Knellwolf and Meier's Attack on the Knapsack Generator. 485 - Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Anamorphic Encryption: New Constructions and Homomorphic Realizations. 486 - Zvika Brakerski, Nir Magrafta:
Real-Valued Somewhat-Pseudorandom Unitaries. 487 - Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, André Schrottenloher:
Improving Generic Attacks Using Exceptional Functions. 488 - Zhe Cen, Xiutao Feng, Zhangyi Wang, Yamin Zhu, Chunping Cao:
Guess and Determine Analysis Based on Set Split. 489 - Carsten Baum, Ward Beullens, Shibam Mukherjee, Emmanuela Orsini, Sebastian Ramacher, Christian Rechberger, Lawrence Roy, Peter Scholl:
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures. 490 - Christian Badertscher, Monosij Maitra, Christian Matt, Hendrik Waldner:
Updatable Policy-Compliant Signatures. 491 - Cameron Foreman, Richie Yeung, Florian J. Curchod:
Statistical testing of random number generators and their improvement using randomness extraction. 492 - Charalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, Stjepan Golemac:
Reckle Trees: Updatable Merkle Batch Proofs with Applications. 493 - István Vajda:
HW-token-based Common Random String Setup. 494 - Tung Chou, Ruben Niederhagen, Lars Ran, Simona Samardjiska:
Reducing Signature Size of Matrix-code-based Signature Schemes. 495 - Thomas Espitau, Shuichi Katsumata, Kaoru Takemure:
Two-Round Threshold Signature from Algebraic One-More Learning with Errors. 496 - István Vajda:
On the Security of Data Markets and Private Function Evaluation. 497 - Jingwei Hu, Yuhong Fang, Wangchen Dai:
Number-Theoretic Transform Architecture for Fully Homomorphic Encryption from Hypercube Topology. 498 - Jonas Meers, Doreen Riepel:
CCA Secure Updatable Encryption from Non-Mappable Group Actions. 499 - Scott R. Fluhrer:
Side Channel Resistant Sphincs+. 500 - Kwangsu Lee:
Anonymous Revocable Identity-Based Encryption Supporting Anonymous Revocation. 501 - Neyire Deniz Sarier:
Best of Two Worlds: Efficient, Usable and Auditable Biometric ABC on the Blockchain. 502 - Alexander Bienstock, Kevin Yeo:
Two Levels are Better than One: Dishonest Majority MPC with $\widetilde{O}(|C|)$ Total Communication. 503 - Benjamin E. Diamond, Jim Posen:
Polylogarithmic Proofs for Multilinears over Binary Towers. 504 - Victor Youdom Kemmoe, Anna Lysyanskaya:
RSA-Based Dynamic Accumulator without Hashing into Primes. 505 - Olive Chakraborty, Aymen Boudguiga:
A Decentralized Federated Learning using Reputation. 506 - Jehyuk Jang, Jamie Judd:
An Efficient SNARK for Field-Programmable and RAM Circuits. 507 - Jules Maire, Damien Vergnaud:
Secure Multi-Party Linear Algebra with Perfect Correctness. 508 - Eli Orvis:
Distribution of cycles in supersingular ℓ-isogeny graphs. 509 - Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang:
DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE. 510 - Cezary Pilaszewicz, Lea R. Muth, Marian Margraf:
A Black-box Attack on Fixed-Unitary Quantum Encryption Schemes. 511 - Zehua Qiao, Yuejun Liu, Yongbin Zhou, Yuhan Zhao, Shuyi Chen:
Single Trace is All It Takes: Efficient Side-channel Attack on Dilithium. 512 - Kyungbae Jang, Sejin Lim, Yujin Oh, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, Hwajeong Seo:
Quantum Implementation and Analysis of SHA-2 and SHA-3. 513 - Xueyan Tang, Lingzhi Shi, Xun Wang, Kyle Charbonnet, Shixiang Tang, Shixiao Sun:
Zero-Knowledge Proof Vulnerability Analysis and Security Auditing. 514 - Manning Zhang, Zeshun Shi, Huanhuan Chen, Kaitai Liang:
Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE. 515 - Björn Ho, Huanhuan Chen, Zeshun Shi, Kaitai Liang:
Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages. 516 - Damien Robert:
Fast pairings via biextensions and cubical arithmetic. 517 - Jihoon Cho, Changhoon Lee, Eunkyung Kim, Jieun Lee, Beumjin Cho:
Software-Defined Cryptography: A Design Feature of Cryptographic Agility. 518 - Sulaiman Alhussaini, Sergei Sergeev:
On implementation of Stickel's key exchange protocol over max-min and max-T semirings. 519 - Fernando Virdia, Mia Filic:
A note on securing insertion-only Cuckoo filters. 520 - Tomoki Moriya:
LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram. 521 - Mahender Kumar:
Cryptanalysis of Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs. 522 - Sophie Schmieg:
Unbindable Kemmy Schmidt: ML-KEM is neither MAL-BIND-K-CT nor MAL-BIND-K-PK. 523 - Alessandro Chiesa, Elisabetta Fedele, Giacomo Fenzi, Andrew Zitek-Estrada:
A Time-Space Tradeoff for the Sumcheck Prover. 524 - Marina Blanton
, Dennis Murphy:
Privacy Preserving Biometric Authentication for Fingerprints and Beyond. 525 - Yi-Hsiu Chen, Yehuda Lindell:
Optimizing and Implementing Fischlin's Transform for UC-Secure Zero-Knowledge. 526 - Taechan Kim:
Slice more? It leaks: Analysis on the paper "On the Feasibility of Sliced Garbling". 527 - Momonari Kudo, Kazuhiro Yokoyama:
The solving degrees for computing Gröbner bases of affine semi-regular polynomial sequences. 528 - Hojune Shin, Jina Choi, Dain Lee, Kyoungok Kim, Younho Lee:
Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest. 529 - Vikas Kumar, Ali Raya, Aditi Kar Gangopadhyay:
An efficient key generation algorithm for GR-NTRU over dihedral group. 530 - Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, Celestin Nkuimi Jugnia:
Avoiding Trusted Setup in Isogeny-based Commitments. 531 - Martin R. Albrecht, Kenneth G. Paterson:
Analysing Cryptography in the Wild - A Retrospective. 532 - Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger
, Tim Weißmantel, Hossein Yalame:
HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation. 533 - Simon Jeanteur, Laura Kovács, Matteo Maffei, Michael Rawson:
CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model. 534 - Tianxiang Dai, Yufan Jiang, Yong Li, Fei Mei:
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree. 535 - Mihir Bellare, Doreen Riepel, Laura Shea:
Highly-Effective Backdoors for Hash Functions and Beyond. 536 - Wenxuan Wu, Soamar Homsi, Yupeng Zhang:
Confidential and Verifiable Machine Learning Delegations on the Cloud. 537 - Qiping Lin, Fengmei Liu:
A comment on "Comparing the MOV and FR reductions in elliptic curve cryptography" from EUROCRYPT'99. 538 - Daniel Larsson:
Supersingular Hashing using Lattès Maps. 539 - Russell W. F. Lai, Giulio Malavolta:
Lattice-Based Timed Cryptography. 540 - Loïc Bidoux, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, Matthieu Rivain:
Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank. 541 - Jun Xu, Zhiwei Li, Lei Hu:
Breaking Bicoptor from S&P 2023 Based on Practical Secret Recovery Attack. 542 - Prabhanjan Ananth, Aditya Gulati, Yao-Ting Lin:
A Note on the Common Haar State Model. 543 - Novak Kaluderovic, Nan Cheng, Katerina Mitrokotsa:
A post-quantum Distributed OPRF from the Legendre PRF. 544 - Vincent Gramoli, Zhenliang Lu, Qiang Tang, Pouriya Zarbafian:
Optimal Asynchronous Byzantine Consensus with Fair Separability. 545 - Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson:
Share with Care: Breaking E2EE in Nextcloud. 546 - Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal, Harshal Shah:
Efficient Permutation Correlations and Batched Random Access for Two-Party Computation. 547 - Décio Luiz Gazzoni Filho, Tomás Recio, Julio López:
Efficient isochronous fixed-weight sampling with applications to NTRU. 548 - Zeyu Xu, Jiamin Cui, Kai Hu, Meiqin Wang:
Integral Attack on the Full FUTURE Block Cipher. 549 - Mustafa Khairallah:
Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV. 550 - Nimish Mishra, Debdeep Mukhopadhyay:
Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography. 551 - Mario Yaksetig:
Insights from building a blockchain-based metaverse. 552 - Yuxi Xue, Xingye Lu, Man Ho Au, Chengru Zhang:
Efficient Linkable Ring Signatures: New Framework and Post-Quantum Instantiations. 553 - Alexander Hoover, Ruth Ng, Daren Khu, Yao'an Li, Joelle Lim, Derrick Ng, Jed Lim, Yiyang Song:
Leakage-Abuse Attacks Against Structured Encryption for SQL. 554 - Yilei Chen:
Quantum Algorithms for Lattice Problems. 555 - Leonie Reichert, Gowri R. Chandran, Phillipp Schoppmann, Thomas Schneider, Björn Scheuermann:
Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage. 556 - Charlotte Lefevre, Bart Mennink:
Permutation-Based Hash Chains with Application to Password Hashing. 557 - Damien Robissout, Lilian Bossuet, Amaury Habrard:
Scoring the predictions: a way to improve profiling side-channel attacks. 558 - Axel Mertens, Georgio Nicolas, Sergi Rovira:
Convolution-Friendly Image Compression in FHE. 559 - Robin Berger, Felix Dörre, Alexander Koch:
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption. 560 - Farzin Renan, Péter Kutas:
SQIAsignHD: SQIsignHD Adaptor Signature. 561 - Harjasleen Malvai, Gregory Neven, Andrew Miller, Siam Hussain:
Practical Proofs of Parsing for Context-free Grammars. 562 - Xavier Bonnetain, Virginie Lallemand:
A Note on Related-Tweakey Impossible Differential Attacks. 563 - Alexander May, Massimo Ostuzzi:
Multiple Group Action Dlogs with(out) Precomputation. 564 - Da Lin, Chunli Yang, Shengyuan Xu, Shizhu Tian, Bing Sun:
On the construction of quantum circuits for S-boxes with different criteria based on the SAT solver. 565 - Foo Yee Yeo, Jason H. M. Ying:
A Near-Linear Quantum-Safe Third-Party Private Set Intersection Protocol. 566 - Aron van Baarsen, Marc Stevens:
Amortizing Circuit-PSI in the Multiple Sender/Receiver Setting. 567 - Thomas Attema, Aron van Baarsen, Stefan van den Berg, Pedro Capitão, Vincent Dunning, Lisa Kohl:
Communication-Efficient Multi-Party Computation for RMS Programs. 568 - Johannes Ottenhues:
An overview of symmetric fuzzy PAKE protocols. 569 - Yunqing Sun, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Xiao Wang:
Large-Scale Private Set Intersection in the Client-Server Setting. 570 - Thomas Locher, Victor Shoup:
MiniCast: Minimizing the Communication Complexity of Reliable Broadcast. 571 - Alex Ozdemir, Shankara Pailoor, Alp Bassa, Kostas Ferles, Clark W. Barrett, Isil Dillig:
Split Gröbner Bases for Satisfiability Modulo Finite Fields. 572 - Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy. 573 - Jannik Zeitschner, Amir Moradi:
PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software. 574 - Shiping Cai, Kaizhan Lin, Chang-An Zhao:
Pairing Optimizations for Isogeny-based Cryptosystems. 575 - Ivan Buchinskiy, Matvei Kotov, Alexander Treier:
On complexity of the problem of solving systems of tropical polynomial equations of degree two. 576 - Said Eddahmani, Sihem Mesnager:
Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box. 577 - José Luis Crespo, Javier González-Villa, Jaime Gutierrez, Angel Valle:
Assessing the quality of Random Number Generators through Neural Networks. 578 - Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi:
Tight Multi-user Security of Ascon and Its Large Key Extension. 579 - Duy Nguyen:
Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model. 580 - JeongHwan Lee, Donghoe Heo, Hyeonhak Kim, GyuSang Kim, Suhri Kim, Heeseok Kim, Seokhie Hong:
Fault Attack on SQIsign. 581 - Navid Alamati, Guru-Vamsi Policharla, Srinivasan Raghuraman, Peter Rindal:
Improved Alternating Moduli PRFs and Post-Quantum Signatures. 582 - Omri Shmueli:
A Note on Quantum Algorithms for Lattice Problems. 583 - Jianming Lin, Weize Wang, Chang-An Zhao, Yuhao Zheng:
Efficient Implementations of Square-root Vélu's Formulas. 584 - Ardianto Satriawan, Rella Mareta:
A Complete Beginner Guide to the Number Theoretic Transform (NTT). 585 - Yongge Wang:
Encryption Based Covert Channel for Large Language Models. 586 - Saskia Bayreuther, Robin Berger, Felix Dörre, Jeremias Mechler, Jörn Müller-Quade:
Hidden Δ-fairness: A Novel Notion for Fair Secure Two-Party Computation. 587 - Simon Erfurth:
Digital Signatures for Authenticating Compressed JPEG Images. 588 - Xunyue Hu, Quentin L. Meunier, Emmanuelle Encrenaz:
Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training. 589 - Quan Yuan, Chao Sun, Tsuyoshi Takagi:
Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks. 590 - Thomas Aulbach, Samed Düzlü, Michael Meyer, Patrick Struck, Maximiliane Weishäupl:
Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures. 591 - Daniel J. Bernstein:
Asymptotics for the standard block size in primal lattice attacks: second order, formally verified. 592 - George Teseleanu:
The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem. 593 - Enrico Bottazzi:
Greco: Fast Zero-Knowledge Proofs for Valid FHE RLWE Ciphertexts Formation. 594 - Morten Øygarden, Patrick Felke, Håvard Raddum:
Analysis of Multivariate Encryption Schemes: Application to Dob and C. 595 - Sidoine Juicielle Kambiré, Guy Mobouale Wamba, Abiodoun Clement Hounkpevi, Daniel Tieudjo, Djiby Sow:
Cryptanalysis of signature schemes based on the root extraction problem over braid group. 596 - Gewu Bu, Serge Fdida, Maria Potop-Butucaru, Bilel Zaghdoudi:
Blockchain-based decentralized identity system: Design and security analysis. 597 - Ganyuan Cao:
A Characterization of AE Robustness as Decryption Leakage Indistinguishability. 598 - Shany Ben-David:
Probabilistically Checkable Arguments for all NP. 599 - Mustafa Khairallah:
A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-. 600 - Henry Bambury, Phong Q. Nguyen:
Improved Provable Reduction of NTRU and Hypercubic Lattices. 601 - Amos Beimel, Oriol Farràs, Oded Nir:
Secret-Sharing Schemes for High Slices. 602 - Divesh Aggarwal, Leong Jin Ming, Alexandra Veliche:
Worst-Case to Average-Case Hardness of LWE: A Simple and Practical Perspective. 603 - Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, Xiaoyun Wang:
Generic MitM Attack Frameworks on Sponge Constructions. 604 - Léo Perrin:
Security Analysis of XHASH8/12. 605 - Sam Gunn, Yael Tauman Kalai, Anand Natarajan, Agi Villanyi:
Classical Commitments to Quantum States. 606 - Truman Welling, Onur Günlü, Aylin Yener:
Low-latency Secure Integrated Sensing and Communication with Transmitter Actions. 607 - Zhengjun Cao, Lihua Liu:
The Practical Advantage of RSA over ECC and Pairings. 608 - Benoît Cogliati, Pierre-Alain Fouque, Louis Goubin, Brice Minaud:
New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes. 609 - Min Xie, Peichen Ju, Yanqi Zhao, Zoe L. Jiang, Junbin Fang, Yong Yu, Xuan Wang:
Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation. 610 - Ward Beullens, Pierre Briaud, Morten Øygarden:
A Security Analysis of Restricted Syndrome Decoding Problems. 611 - Gurgen Arakelov, Nikita Kaskov
, Daria Pianykh, Yuriy Polyakov:
FHERMA: Building the Open-Source FHE Components Library for Practical Use. 612 - Jie Xie, Yuncong Hu, Yu Yu:
Hadamard Product Argument from Lagrange-Based Univariate Polynomials. 613 - Foteini Baldimtsi, Jiaqi Cheng, Rishab Goyal, Aayush Yadav:
Non-interactive Blind Signatures from Lattices. 614 - Jialiu Cheng, Yi Wang, Rongmao Chen, Xinyi Huang:
Subverting Cryptographic Protocols from A Fine-Grained Perspective - A Case Study on 2-Party ECDSA. 615 - Hyeonbum Lee, Seunghun Paik, Hyunjung Son, Jae Hong Seo:
Cougar: Cubic Root Verifier Inner Product Argument under Discrete Logarithm Assumption. 616 - Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang, Min Xie:
Lattice-Based Succinct Mercurial Functional Commitment for Circuits: Definitions and Constructions. 617 - Yuncong Zhang, Shifeng Sun, Dawu Gu:
Efficient KZG-based Univariate Sum-check and Lookup Argument. 618 - Huiqiang Liang, Haining Lu, Geng Wang:
BPDTE: Batch Private Decision Tree Evaluation via Amortized Efficient Private Comparison. 619 - Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang:
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation. 620 - Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, Antonia Wachter-Zeh:
How to Lose Some Weight - A Practical Template Syndrome Decoding Attack. 621 - Roozbeh Sarenche, Svetla Nikova, Bart Preneel:
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols. 622 - Elif Ozbay Gurler, Hüseyin Hisil:
Complete group law for genus 2 Jacobians on Jacobian coordinates. 623 - Andrea Basso:
POKE: A Framework for Efficient PKEs, Split KEMs, and OPRFs from Higher-dimensional Isogenies. 624 - Masaya Nanri, Octavio Perez-Kempner, Mehdi Tibouchi, Masayuki Abe:
Interactive Threshold Mercurial Signatures and Applications. 625 - Anant Sharma, Nupur Deshpande, Sanchita Ghosh, Sreetama Das, Shibdas Roy:
Exponential Quantum Speedup for the Traveling Salesman Problem. 626 - Nicholas Ngai, Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos:
Distributed & Scalable Oblivious Sorting and Shuffling. 627 - Bernardo David, Rafael Dowsley, Anders Konring, Mario Larangeira:
MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications. 628 - Cédric Pilatte:
Unconditional correctness of recent quantum algorithms for factoring and computing discrete logarithms. 629 - Vahid R. Asadi, Kohdai Kuroiwa, Debbie Leung, Alex May, Sabrina Pasterski, Chris Waddell:
Conditional disclosure of secrets with quantum resources. 630 - Tahoura Mosavirik, Shahin Tajik:
BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring. 631 - Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, Debiao He:
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences. 632 - Tomer Ashur, Mohammad Mahzoun, Jim Posen, Danilo Sijacic:
Vision Mark-32: ZK-Friendly Hash Function Over Binary Tower Fields. 633 - Robin Jadoul, Axel Mertens, Jeongeun Park, Hilder V. L. Pereira:
NTRU-based FHE for Larger Key and Message Space. 634 - Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, Hoda Maleki:
Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption. 635 - Seyoon Ragavan:
Regev Factoring Beyond Fibonacci: Optimizing Prefactors. 636 - Marshall Ball
, Juan A. Garay, Peter Hall, Aggelos Kiayias, Giorgos Panagiotakos:
Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity. 637 - Zhengjun Cao, Lihua Liu:
A note on "a lightweight mutual and transitive authentication mechanism for IoT network". 638 - Dustin Ray, Caroline El Jazmi:
Computational Attestations of Polynomial Integrity Towards Verifiable Machine Learning. 639 - Andrija Novakovic, Liam Eagen:
On Proving Pairings. 640 - Xuanji Meng, Xiao Sui, Zhaoxin Yang, Kang Rong, Wenbo Xu, Shenglong Chen, Ying Yan, Sisi Duan:
Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon. 641 - Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili:
GraphOS: Towards Oblivious Graph Processing. 642 - Giulio Malavolta:
Key-Homomorphic and Aggregate Verifiable Random Functions. 643 - Li-Jie Jian, Ting-Yuan Wang, Bo-Yin Yang, Ming-Shing Chen:
Jumping for Bernstein-Yang Inversion. 644 - Abdelkader Laouid, Mostefa Kara, Mohammad Hammoudeh:
Toward Independent Key Encryption based on Q-Problem. 645 - Sanchita Ghosh, Anant Sharma, Sreetama Das, Shibdas Roy:
Efficient Quantum Algorithm for SUBSET-SUM Problem. 646 - Pierrick Méaux:
Weightwise (almost) perfectly balanced functions based on total orders. 647 - B. Pradeep Kumar Reddy, Ruchika Meel, Ayantika Chatterjee:
Encrypted KNN Implementation on Distributed Edge Device Network. 648 - Liqun Chen, Changyu Dong, Christopher J. P. Newton, Yalan Wang:
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives. 649 - Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
Hash-based Direct Anonymous Attestation. 650 - Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
A New Hash-based Enhanced Privacy ID Signature Scheme. 651 - Samuel Lavery
:
Compact and Secure Zero-Knowledge Proofs for Quantum-Resistant Cryptography from Modular Lattice Innovations. 652 - Xiaohai Dai, Chaozheng Ding, Hai Jin, Julian Loss, Ling Ren:
Ipotane: Achieving the Best of All Worlds in Asynchronous BFT. 653 - Alberto Ibarrondo, Ismet Kerenciler, Hervé Chabanne, Vincent Despiegel, Melek Önen:
Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification. 654 - Davide Carnemolla, Dario Catalano, Mario Di Raimondo, Federico Savasta:
Implementation and Performance Analysis of Homomorphic Signature Schemes. 655 - Vincent Rijmen:
Cryptanalytic Audit of the XHash Sponge Function and its Components. 656 - Anaïs Barthoulot, Olivier Blazy, Sébastien Canard:
Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs. 657 - Tim Beyne, Yu Long Chen:
Information-theoretic security with asymmetries. 658 - Thijs Veugen, Vincent Dunning, Michiel Marcus, Bart Kamphorst:
Secure Latent Dirichlet Allocation. 659 - Camille Nuoskala, Reyhaneh Rabbaninejad, Tassos Dimitriou, Antonis Michalas:
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption. 660 - Albert Garreta, Hayk Hovhanissyan, Aram Jivanyan, Ignacio Manzur, Isaac Villalobos, Michal Zajac:
On amortization techniques for FRI-based SNARKs. 661 - Kelong Cong, Jiayi Kang, Georgio Nicolas, Jeongeun Park:
Faster Private Decision Tree Evaluation for Batched Input from Homomorphic Encryption. 662 - Xinwei Yong, Jiaojiao Wu, Jianfeng Wang:
Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size. 663 - Xin Wang, Haochen Wang, Haibin Zhang, Sisi Duan:
Pando: Extremely Scalable BFT Based on Committee Sampling. 664 - Amit Deo, Marc Joye, Benoît Libert, Benjamin R. Curtis, Mayeul de Bellabre:
Homomorphic Evaluation of LWR-based PRFs and Application to Transciphering. 665 - Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, Raluca Ada Popa:
Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs. 666 - Karoline Varner, Wanja Zaeske, Sven Friedrich, Aaron Kaiser, Alice Bowman:
Agile, Post-quantum Secure Cryptography in Avionics. 667 - Abdoulaye Ndiaye:
Blockchain Price vs. Quantity Controls. 668 - Arka Rai Choudhuri, Sanjam Garg, Julien Piet, Guru-Vamsi Policharla:
Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses. 669 - Raja Adhithan RadhaKrishnan:
Secure Implementation of SRAM PUF for Private Key Generation. 670 - Yulian Sun, Li Duan, Ricardo Mendes, Derui Zhu, Yue Xia, Yong Li, Asja Fischer:
Exploiting Internal Randomness for Privacy in Vertical Federated Learning. 671 - Shanuja Sasi, Onur Günlü:
Secure Coded Distributed Computing. 672 - Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
Chocobo: Creating Homomorphic Circuit Operating with Functional Bootstrapping in basis B. 673 - Wyatt Benno:
SigmaSuite: How to Minimize Foreign Arithmetic in ZKP Circuits While Keeping Succinct Final Verification. 674 - Scott Griffy, Markulf Kohlweiss, Anna Lysyanskaya, Meghna Sengupta:
Olympic Privacy-Preserving Blueprints: Faster Communication, Highly Functional, Stronger Security. 675 - Karim Eldefrawy, Benjamin Terner, Moti Yung:
Composing Timed Cryptographic Protocols: Foundations and Applications. 676 - Sourav Das, Sisi Duan, Shengqi Liu, Atsuki Momose, Ling Ren, Victor Shoup:
Asynchronous Consensus without Trusted Setup or Public-Key Cryptography. 677 - Douglas Stebila, Spencer Wilson:
Quantum-Safe Account Recovery for WebAuthn. 678 - Martin Feussner, Igor Semaev:
Isotropic Quadratic Forms, Diophantine Equations and Digital Signatures. 679 - Ojaswi Acharya, Foteini Baldimtsi, Samuel Dov Gordon, Daniel McVicker, Aayush Yadav:
Universal Vector Commitments. 680 - Aloni Cohen, David Bruce Cousins, Nicholas Genise, Erik Kline, Yuriy Polyakov, Saraswathy RV:
HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security. 681 - Wutichai Chongchitmate, Steve Lu, Rafail Ostrovsky:
Approximate PSI with Near-Linear Communication. 682 - Zhengjun Cao, Lihua Liu:
A note on "a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE". 683 - Lucien K. L. Ng, Panagiotis Chatzigiannis, Duc Viet Le, Mohsen Minaei, Ranjit Kumaresan, Mahdi Zamani:
A Plug-and-Play Long-Range Defense System for Proof-of-Stake Blockchains. 684 - Nicolas Alhaddad, Leonid Reyzin, Mayank Varia:
Committing AVID with Partial Retrieval and Optimal Storage. 685 - Ian Malloy:
Unstructured Inversions of New Hope. 686 - Nicholas Brandt:
Levin-Kolmogorov Complexity is not in Linear Time. 687 - Hoeteck Wee, David J. Wu:
Succinct Functional Commitments for Circuits from k-Lin. 688 - Elijah Pelofske, Vincent Urias, Lorie M. Liebrock:
Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models. 689 - Alex Charlès, Aleksei Udovenko:
LPN-based Attacks in the White-box Setting. 690 - Alex Charlès, Aleksei Udovenko:
White-box filtering attacks breaking SEL masking: from exponential to polynomial time. 691 - Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Giulia Scaffino, Dionysis Zindros:
Blink: An Optimal Proof of Proof-of-Work. 692 - Pierre Briaud:
A Note of Anemoi Gröbner Bases. 693 - Jesko Dujmovic, Mohammad Hajiabadi:
Lower-Bounds on Public-Key Operations in PIR. 694 - Richard Wassmer:
Beale Cipher 1 and Cipher 3: Numbers With No Messages. 695 - Victor Shoup:
A Theoretical Take on a Practical Consensus Protocol. 696 - Gennady Khalimov, Yevgen Kotukh, Maksym Kolisnyk, Svitlana Khalimova, Oleksandr Sievierinov:
LINE: Cryptosystem based on linear equations for logarithmic signatures. 697 - Vladimir Braverman, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky:
Private Computations on Streaming Data. 698 - Elijah Pelofske:
An Efficient All-to-All GCD Algorithm for Low Entropy RSA Key Factorization. 699