


default search action
IACR Cryptology ePrint Archive, Volume 2021
Volume 2021, 2021
- Michel Abdalla, David Pointcheval, Azam Soleimanian:
2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product. 1 - Dingfeng Ye:
Can Lattice Signature be as Efficient as Lattice Encryption? 2 - Mahdi Mahdavi Oliaee, Zahra Ahmadian:
Ciphertext Policy Attribute Based Encryption for Arithmetic circuits. 3 - Ismail San:
LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions. 4 - Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu:
Aggregatable Distributed Key Generation. 5 - Wyatt Howe
, Andrei Lapets:
Privacy-Preserving Privacy Profile Proposal Protocol. 6 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Cheng-Yi Lee:
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search. 7 - M. R. Mirzaee Shamsabad, Seyed Mojtaba Dehnavi:
A Family of Nonlinear MDS Diffusion Layers over 픽24n. 8 - Julia Khamis, Ori Rottenstreich:
Demand-aware Channel Topologies for Off-chain Blockchain Payments. 9 - Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk:
Compcrypt - Lightweight ANS-based Compression and Encryption. 10 - Kwang Ho Kim, Jong Hyok Choe, Sihem Mesnager:
Complete solution over $\GF{p^n}$ of the equation Xpk+1+X+a=0. 11 - Enric Florit, Benjamin Smith:
Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph. 12 - Enric Florit, Benjamin Smith:
An atlas of the Richelot isogeny graph. 13 - (Withdrawn) Efficient Multilinear Map from Graded Encoding Scheme. 14
- Macarena C. Martínez-Rodríguez
, Ignacio M. Delgado-Lozano, Billy Bob Brumley:
SoK: Remote Power Analysis. 15 - Geoffroy Couteau, Pooya Farshim, Mohammad Mahmoody:
Black-Box Uselessness: Composing Separations in Cryptography. 16 - Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Lightweight Techniques for Private Heavy Hitters. 17 - Yuhao Yang, Xiujie Huang:
Comments on "On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment". 18 - Kaushik Nath, Palash Sarkar:
Kummer versus Montgomery Face-off over Prime Order Fields. 19 - Stéphanie Delaune, Patrick Derbez
, Mathieu Vavrille:
Catching the Fastest Boomerangs - Application to SKINNY. 20 - Patrick Derbez
, Pierre-Alain Fouque, Victor Mollimard:
Fake Near Collisions Attacks. 21 - Patrick Derbez
, Pierre-Alain Fouque:
Increasing Precision of Division Property. 22 - Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Andreas Kern, Walid Fdhila:
What is Meant by Permissionless Blockchains? 23 - Pedro Hecht:
PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System. 24 - Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni:
FLGUARD: Secure and Private Federated Learning. 25 - Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Yann Connan, Philippe Gaborit:
A Gapless Code-Based Hash Proof System based on RQC and its Applications. 26 - Sfirnaciuc Emilia, Vasilescu Miruna-Elena, Emil Simion:
E-voting protocols in context of COVID19. 27 - Victor Lomné, Thomas Roche:
A Side Journey to Titan. 28 - Thomas Schneider, Oleksandr Tkachenko:
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs. 29 - Jonathan Lee, Srinath T. V. Setty, Justin Thaler, Riad S. Wahby:
Linear-time zero-knowledge SNARKs for R1CS. 30 - Alexandru-Stefan Gheorghies, Darius-Marian Lazaroi, Emil Simion:
A Comparative Study of Cryptographic Key Distribution Protocols. 31 - Pouriya Alikhani, Nicolas Brunner, Claude Crépeau, Sébastien Designolle, Raphaël Houlmann, Weixu Shi, Hugo Zbinden:
Experimental relativistic zero-knowledge proofs. 32 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Quantum-resistant Anonymous IBE with Traceable Identities. 33 - Nishanth Chandran, Divya Gupta, Akash Shah:
Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF. 34 - Ori Rottenstreich:
Sketches for Blockchains. 35 - Niluka Amarasinghe, Xavier Boyen, Matthew McKague:
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration. 36 - Aein Rezaei Shahmirzadi, Dusan Bozilov, Amir Moradi:
New First-Order Secure AES Performance Records. 37 - Luke Champine:
Streaming Merkle Proofs within Binary Numeral Trees. 38 - Jung Hee Cheon, Yongha Son, Donggeon Yhee:
Practical FHE parameters against lattice attacks. 39 - Any Muanalifah, Sergei Sergeev:
On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product. 40 - Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff, Md. Mahbub Alam:
Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot. 41 - Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu:
Correcting Subverted Random Oracles. 42 - Madhurima Mukhopadhyay, Palash Sarkar:
Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields. 43 - Ishtiyaque Ahmad, Yuntian Yang, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta:
Aloha: Metadata-private voice communication over fully untrusted infrastructure. 44 - Alberto Ibarrondo, Hervé Chabanne, Melek Önen:
Banners: Binarized Neural Networks with Replicated Secret Sharing. 45 - Jose Maria Bermudo Mera, Angshuman Karmakar, Tilen Marc, Azam Soleimanian:
Efficient Lattice-Based Inner-Product Functional Encryption. 46 - Misni Harjo Suwito, Yoshifumi Ueshige, Kouichi Sakurai:
Evolution of Bulletin Board & its application to E-Voting - A Survey. 47 - Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park:
Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution. 48 - Mark D. Aagaard, Nusa Zidaric:
ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: (Preliminary Results). 49 - Joshua Deaton, Jintai Ding:
The Distinguishing Attack on HFE. 50 - Jintai Ding, Zheng Zhang, Joshua Deaton:
How Much can F5 Really Do. 51 - Rémi Géraud-Stewart, David Naccache:
Elementary Attestation of Cryptographically Useful Composite Moduli. 52 - Madalina Bolboceanu, Zvika Brakerski, Devika Sharma:
On Algebraic Embedding for Unstructured Lattices. 53 - David W. Archer, Shahla Atapoor, Nigel P. Smart:
The Cost of IEEE Arithmetic in Secure Computation. 54 - Jan Sebastian Götte, Björn Scheuermann:
Tech Report: Inerial HSMs Thwart Advanced Physical Attacks. 55 - Zhongfeng Niu:
The Study of Modulo 2n. 56 - Tamer Mour:
Correlation Intractability vs. One-wayness. 57 - Peter Kietzmann, Lena Boeckmann, Leandro Lanzieri, Thomas C. Schmidt, Matthias Wählisch:
A Performance Study of Crypto-Hardware in the Low-end IoT. 58 - Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter:
On the Cost of Adaptivity in Graph-Based Games. 59 - Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled:
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts. 60 - Stefan Maftei, Marius Supuran, Emil Simion:
A Note on IBE Performance of a Practical Application. 61 - Dominique Unruh:
Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3). 62 - Monir Azraoui, Solenn Brunet, Sébastien Canard, Aïda Diop, Lélia Eveillard, Alicia Filipiak, Adel Hamdi, Flavie Misarsky, Donald Nokam Kuate, Marie Paindavoine, Quentin Santos, Bastien Vialla:
CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing. 63 - Peter Pessl, Lukas Prokop:
Fault Attacks on CCA-secure Lattice KEMs. 64 - Dorin-Marian Ionita, Emil Simion:
FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves. 65 - Mohamed Fadl Idris, Je Sen Teh, Jasy Liew Suet Yan, Wei-Zhu Yeoh:
A Deep Learning Approach for Active S-box Prediction of Lightweight Block Ciphers. 66 - Michiel Van Beirendonck, Jan-Pieter D'Anvers, Ingrid Verbauwhede:
Analysis and Comparison of Table-based Arithmetic to Boolean Masking. 67 - Carsten Baum, Cyprien Delpech de Saint Guilhem, Daniel Kales, Emmanuela Orsini, Peter Scholl, Greg Zaverucha
:
Banquet: Short and Fast Signatures from AES. 68 - Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha:
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation. 69 - Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann
:
Secure, Accurate, and Practical Narrow-Band Ranging System. 70 - Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek:
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis. 71 - Servio Paguada, Lejla Batina, Igor Armendariz:
Toward Practical Autoencoder-based Side-Channel Analysis Evaluations. 72 - Michal Wronski:
Application of Velusqrt algorithm to Huff's and general Huff's curves. 73 - Mahdi Sedaghat, Bart Preneel:
Cross-Domain Attribute-Based Access Control Encryption. 74 - Kamil Otal:
A Generalization of the Subfield Construction. 75 - Kang Yang, Pratik Sarkar, Chenkai Weng, Xiao Wang:
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field. 76 - Rémi Géraud-Stewart, David Naccache:
Magnetic RSA. 77 - Nikolaj I. Schwartzbach:
An Incentive-Compatible Smart Contract for Decentralized Commerce. 78 - Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson:
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM. 79 - Jan-Pieter D'Anvers, Emmanuela Orsini, Frederik Vercauteren:
Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption. 80 - Hendrik Waldner, Tilen Marc, Miha Stopar, Michel Abdalla:
Private Stream Aggregation from Labeled Secret Sharing Schemes. 81 - Jaskaran V. Singh, Nicholas Hopper:
Grades of Trust in Multiparty Computation. 82 - Michael Troncoso, Britta Hale:
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol. 83 - Gilles Macario-Rat, Jacques Patarin:
Ariadne Thread and Salt: New Multivariate Cryptographic Schemes with Public Keys in Degree 3. 84 - Suhri Kim:
Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves. 85 - Mic Bowman, Debajyoti Das, Avradip Mandal, Hart Montgomery:
On Elapsed Time Consensus Protocols. 86 - Boyuan Feng, Lianke Qin, Zhenfei Zhang, Yufei Ding, Shumo Chu:
ZEN: Efficient Zero-Knowledge Proofs for Neural Networks. 87 - Marc Fischlin, Arno Mittelbach:
An Overview of the Hybrid Argument. 88 - Gabrielle Beck, Julia Len, Ian Miers, Matthew Green:
Fuzzy Message Detection. 89 - Bei Wang, Yi Ouyang, Honggang Hu, Songsong Li:
A New Twofold Cornacchia-Type Algorithm for 4-GLV Decompositions and Its Applications. 90 - Ilaria Chillotti, Marc Joye, Pascal Paillier:
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks. 91 - Dieaa I. Nassr
, M. Anwar, Hatem M. Bahig:
New Public Key Cryptosystem (First Version). 92 - Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia:
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks. 93 - Sivanarayana Gaddam, Atul Luykx, Rohit Sinha, Gaven J. Watson:
Reducing HSM Reliance in Payments through Proxy Re-Encryption. 94 - Easwar Vivek Mangipudi, Donghang Lu, Aniket Kate:
Collusion-Deterrent Threshold Information Escrow. 95 - Kelong Cong, Daniele Cozzo, Varun Maram, Nigel P. Smart:
Gladius: LWR based efficient hybrid public key encryption with distributed decryption. 96 - Mridul Nandi:
A New and Improved Reduction Proof of Cascade PRF. 97 - Lukas Kölsch, Björn Kriepke, Gohar M. Kyureghyan:
Image sets of perfectly nonlinear maps. 98 - Melissa Chase, Esha Ghosh, Saeed Mahloujifar:
Property Inference from Poisoning. 99 - Sourav Das, Vinith Krishnan, Irene Miriam Isaac, Ling Ren:
SPURT: Scalable Distributed Randomness Beacon with Transparent Setup. 100 - Daniel Heinz, Thomas Pöppelmann:
Combined Fault and DPA Protection for Lattice-Based Cryptography. 101 - Madalina Chirita, Alexandru-Mihai Stroie, Andrei-Daniel Safta, Emil Simion:
A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization. 102 - Elena Andreeva, Amit Singh Bhati, Damian Vizár:
RUP Security of the SAEF Authenticated Encryption mode. 103 - Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz, Thomas Pöppelmann, Michiel Van Beirendonck:
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography. 104 - Majid Salimi:
A New Efficient Identity-Based Encryption Without Pairing. 105 - Aram Jivanyan, Jesse Lancaster, Arash Afshar, Parnian Alimi:
MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers. 106 - Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin:
A Decentralized and Encrypted National Gun Registry. 107 - Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Peter Cíbik, Patrik Dobias:
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs. 108 - Amin Rezaei, Hai Zhou:
Sequential Logic Encryption Against Model Checking Attack. 109 - Kenji Yasunaga:
Replacing Probability Distributions in Security Games via Hellinger Distance. 110 - Evgnosia-Alexandra Kelesidis:
A note on Post Quantum Onion Routing. 111 - (Withdrawn) Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange. 112
- Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N=k Servers (Revised Version). 113 - Michel Abdalla, Björn Haase, Julia Hesse:
Security Analysis of CPace. 114 - Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4. 115 - Nael Rahman, Vladimir Shpilrain:
MAKE: a Matrix Action Key Exchange. 116 - Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:
FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin. 117 - Nicolas Alhaddad, Mayank Varia, Haibin Zhang:
High-Threshold AVSS with Optimal Communication Complexity. 118 - Eleftheria Makri, Dragos Rotaru, Frederik Vercauteren, Sameer Wagh:
Rabbit: Efficient Comparison for Secure Multi-Party Computation. 119 - Aner Ben-Efraim, Kelong Cong, Eran Omri, Emmanuela Orsini, Nigel P. Smart, Eduardo Soria-Vazquez:
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits. 120 - Yaron Gvili, Sarah Scheffler, Mayank Varia:
BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits. 121 - Aner Ben-Efraim, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky:
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection. 122 - Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding:
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs. 123 - Özgün Özerk, Can Elgezen, Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption. 124 - Kris Shrishak, Haya Schulmann:
Privacy Preserving and Resilient RPKI. 125 - Ramachandran Anantharaman, Virendra R. Sule:
Observability attack on stream generators. 126 - Cong Deng, Xianghong Tang, Lin You, Gengran Hu:
Cuproof: A Novel Range Proof with Constant Size. 127 - Debrup Chakraborty, Avijit Dutta, Samir Kundu:
Designing Tweakable Enciphering Schemes Using Public Permutations. 128 - Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei:
Lattice-based weak curve fault attack on ECDSA. 129 - Bei Wang, Songsong Li, Yi Ouyang, Honggang Hu:
Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves. 130 - Sikha Pentyala, Rafael Dowsley, Martine De Cock:
Privacy-Preserving Video Classification with Convolutional Neural Networks. 131 - Xiling Li, Rafael Dowsley, Martine De Cock:
Privacy-Preserving Feature Selection with Secure Multiparty Computation. 132 - Ravital Solomon, Ghada Almashaqbeh:
smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption. 133 - Marco Baldi, Jean-Christophe Deneuville, Edoardo Persichetti, Paolo Santini:
Cryptanalysis of a code-based signature scheme without trapdoors. 134 - Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen:
Acyclicity Programming for Sigma-Protocols. 135 - Dmitry Schelkunov:
An approach for designing fast public key encryption systems using white-box cryptography techniques. 136 - Chris Brzuska, Eric Cornelissen, Konrad Kohbrok:
Cryptographic Security of the MLS RFC, Draft 11. 137 - Johannes Roth, Evangelos G. Karatsiolis, Juliane Krämer:
Classic McEliece Implementation with Low Memory Footprint. 138 - Mahimna Kelkar, Soubhik Deb, Sreeram Kannan:
Order-Fair Consensus in the Permissionless Setting. 139 - Clémentine Gritti, Emanuel Regnath, Sebastian Steinhorst:
Practical and Scalable Access Control Mechanism for the Internet of Things. 140 - Léo Ducas, Marc Stevens, Wessel P. J. van Woerden:
Advanced Lattice Sieving on GPUs, with Tensor Cores. 141 - Muah Kim, Onur Günlü, Rafael F. Schaefer:
Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication. 142 - Juan A. Garay, Yu Shen:
The Bitcoin Cash Backbone Protocol. 143 - Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari:
\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol. 144 - Christoph Egger, Mike Graf
, Ralf Küsters, Daniel Rausch, Viktoria Ronge, Dominique Schröder:
A Security Framework for Distributed Ledgers. 145 - Benjamin E. Diamond:
Boolean Functions from Hyperplane Coverings. 146 - Greg Morrisett, Elaine Shi, Kristina Sojakova, Xiong Fan, Joshua Gancher:
IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols. 147 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Stanislav Smyshlyaev:
On methods of shortening ElGamal-type signatures. 148 - Paul Frixons, André Schrottenloher:
Quantum Security of the Legendre PRF. 149 - Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi:
Two-Party Adaptor Signatures From Identification Schemes. 150 - Mark Simkin, Luisa Siniscalchi, Sophia Yakoubov:
On Sufficient Oracles for Secure Computation with Identifiable Abort. 151 - Lei Bi
, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang:
Hybrid Dual Attack on LWE with Arbitrary Secrets. 152 - Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz:
On the Isogeny Problem with Torsion Point Information. 153 - Tamar Lichter Blanks, Stephen D. Miller:
Generating cryptographically-strong random lattice bases and recognizing rotations of ℤn. 154 - James Howe, Marco Martinoli, Elisabeth Oswald, Francesco Regazzoni:
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware. 155 - Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub:
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability. 156 - Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo:
Sycon: A New Milestone in Designing ASCON-like Permutations. 157 - Nicolas Resch, Chen Yuan:
Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate. 158 - Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller:
hbACSS: How to Robustly Share Many Secrets. 159 - Tibor Jager, Rafael Kurek, David Niehues:
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance. 160 - (Withdrawn) Generic Adaptor Signature. 161
- Giuseppe Ateniese, Long Chen, Danilo Francati, Dimitrios Papadopoulos, Qiang Tang:
Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity. 162 - Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky:
CNF-FSS and its Applications. 163 - Shohei Satake, Yujie Gu, Kouichi Sakurai:
Graph-Based Construction for Non-Malleable Codes. 164 - Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss:
Composition with Knowledge Assumptions. 165 - Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab:
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols. 166 - Seetal Potluri, Aydin Aysu:
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware. 167 - Xiaohan Zhang, Chi Cheng, Yue Qin, Ruoyu Ding:
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS. 168 - Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda:
Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials. 169 - Ai Kitagawa, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:
Fully Anonymous Group Signature with Verifier-Local Revocation. 170 - Wei Yu, Guangwu Xu:
Pre-Computation Scheme of Window τNAF for Koblitz Curves Revisited. 171 - Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah:
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI. 172 - Wai-Kong Lee, Hwajeong Seo, Zhenfei Zhang, Seongoun Hwang:
TensorCrypto. 173 - Alptekin Küpçü, Reihaneh Safavi-Naini:
Smart Contracts for Incentivized Outsourcing of Computation. 174 - Siwei Chen
, Zejun Xiang, Xiangyong Zeng, Shasha Zhang:
On the Relationships between Different Methods for Degree Evaluation (Full Version). 175 - Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. 176 - Miguel Ambrona:
Generic Negation of Pair Encodings. 177 - Tapas Pal, Ratna Dutta:
Attribute-Based Access Control for Inner Product Functional Encryption from LWE. 178 - An Wang, Yuan Li, Yaoling Ding, Liehuang Zhu, Yongjuan Wang:
Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis. 179 - Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
Apollo - Optimistically Linear and Responsive SMR. 180 - Jesus Diaz, Anja Lehmann:
Group Signatures with User-Controlled and Sequential Linkability. 181 - István András Seres, Máté Horváth, Péter Burcsi:
The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications. 182 - Dimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias:
Efficient State Management in Distributed Ledgers. 183 - Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption. 184 - Hwajeong Seo, Pakize Sanal, Wai-Kong Lee, Reza Azarderakhsh:
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms. 185 - Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang:
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages. 186 - Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:
Weak Keys in Reduced AEGIS and Tiaoxin. 187 - Alessandro Chiesa, Eylon Yogev:
Tight Security Bounds for Micali's SNARGs. 188 - Yunwen Liu, Siwei Sun, Chao Li:
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette. 189 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen:
Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source. 190 - Yaroslav Balytskyi, Manohar Raavi, Anatoliy Pinchuk, Sang-Yoon Chang:
PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution. 191 - Jan Czajkowski:
Quantum Indifferentiability of SHA-3. 192 - Jan-Pieter D'Anvers, Senne Batsleer:
Multitarget decryption failure attacks and their application to Saber and Kyber. 193 - Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun:
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon. 194 - Karim Baghery, Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy:
Compilation of Function Representations for Secure Computing Paradigms. 195 - Xu Liu, Mingqiang Wang:
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model. 196 - Guilherme Perin, Lichao Wu, Stjepan Picek:
Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA. 197 - Tatsuki Ono, Song Bian, Takashi Sato:
Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs. 198 - Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao:
Generic, Efficient and Isochronous Gaussian Sampling over the Integers. 199 - Sergiu Carpov, Kevin Deforth, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Jonathan Katz, Iraklis Leontiadis, Mohsen Mohammadi, Abson Sae-Tang, Marius Vuille:
Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols. 200 - Hanshen Xiao, Srinivas Devadas:
DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security. 201 - Martin R. Albrecht, Russell W. F. Lai:
Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices. 202 - Tjerand Silde, Martin Strand:
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing. 203 - Andrey Kim, Yuriy Polyakov, Vincent Zucca:
Revisiting Homomorphic Encryption Schemes for Finite Fields. 204 - Tsz Hon Yuen, Handong Cui, Xiang Xie:
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup. 205 - Ádám Ficsór, Yuval Kogman, Lucas Ontivero, István András Seres:
WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts. 206 - Daniele Cozzo, Nigel P. Smart, Younes Talibi Alaoui:
Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank. 207 - Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth:
Secure Poisson Regression. 208 - George Marinakis:
Sampling methods for cryptographic tests. 209 - Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles. 210 - Bernardo David, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi:
GearBox: An Efficient UC Sharded Ledger Leveraging the Safety-Liveness Dichotomy. 211 - Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe:
Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC. 212 - Ling Sun, Wei Wang, Meiqin Wang:
Accelerating the Search of Differential and Linear Characteristics with the SAT Method. 213 - Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková:
Mesh Messaging in Large-scale Protests: Breaking Bridgefy. 214 - Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy:
Limbo: Efficient Zero-knowledge MPCitH-based Arguments. 215 - Alexander May:
How to Meet Ternary LWE Keys. 216 - David Niehues:
Verifiable Random Functions with Optimal Tightness. 217 - Tako Boris Fouotsa, Christophe Petit:
InSIDH: a Simplification of SiGamal. 218 - Markulf Kohlweiss, Mary Maller, Janno Siim, Mikhail Volkhov:
Snarky Ceremonies. 219 - Bei Wang, Yi Ouyang, Songsong Li, Honggang Hu:
A New Twofold Cornacchia-Type Algorithm. 220 - Ryo Nishimaki:
The Direction of Updatable Encryption Does Matter. 221 - Raymond K. Zhao, Sarah McCarthy, Ron Steinfeld, Amin Sakzad, Máire O'Neill:
Quantum-safe HIBE: does it cost a Latte? 222 - Jing Xu, Xinyu Li, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang:
Redactable Blockchain Protocol with Instant Redaction. 223 - Murilo Coutinho, T. C. Souza Neto:
Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha. 224 - Anne Canteaut, Alain Couvreur, Léo Perrin:
Recovering or Testing Extended-Affine Equivalence. 225 - Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. 226 - Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks. 227 - Nils Fleischhacker, Mark Simkin:
On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments. 228 - Zhiqiang Wu, Kenli Li, Keqin Li, Jin Wang:
Fast Boolean Queries with Minimized Leakage for Encrypted Databases in Cloud Computing. 229 - Pascal Bemmann, Rongmao Chen, Tibor Jager:
Subversion-Resilient Public Key Encryption with Practical Watchdogs. 230 - (Withdrawn) LL-ORAM: A Forward and Backward Private Oblivious RAM. 231
- (Withdrawn) Fast Factoring Integers by SVP Algorithms. 232
- Inbar Kaslasi, Ron D. Rothblum, Prashant Nalini Vasudevan:
Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers. 233 - Alessandro Budroni, Igor Semaev:
New Public-Key Crypto-System EHT. 234 - Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu:
More Efficient Digital Signatures with Tight Multi-User Security. 235 - Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang:
SNOW-Vi: an extreme performance variant of SNOW-V for low-end CPUs. 236 - Ehsan Ebrahimi:
Post-quantum Security of OAEP Transform. 237 - Gregor Leander, Shahram Rasoolzadeh:
Two Sides of The Same Coin: Weak-Keys and More Efficient Variants of CRAFT. 238 - Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias:
SoK: Auditability and Accountability in Distributed Payment Systems. 239 - Mark Zhandry, Cong Zhang:
The Relationship Between Idealized Models Under Computationally Bounded Adversaries. 240 - Saikrishna Badrinarayanan, Peihan Miao, Pratyay Mukherjee, Divya Ravi:
On the Round Complexity of Fully Secure Solitary MPC with Honest Majority. 241 - Ju-Hwan Kim, Ji-Eun Woo, Soo-Jin Kim, So-Yeon Park, Dong-Guk Han:
GAP: Born to Break Hiding. 242 - Gayathri Garimella, Payman Mohassel, Mike Rosulek, Seyed Saeed Sadeghian, Jaspal Singh:
Private Set Operations from Oblivious Switching. 243 - Alexander Bienstock, Yevgeniy Dodis, Kevin Yeo:
Forward Secret Encrypted RAM: Lower Bounds and Applications. 244 - Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng:
On the Ideal Shortest Vector Problem over Random Rational Primes. 245 - Shengyuan Feng, Junqing Gong, Jie Chen:
Master-Key KDM-Secure ABE via Predicate Encoding. 246 - David Knichel, Pascal Sasdrich, Amir Moradi:
Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets. 247 - Bernardo Magri, Giulio Malavolta, Dominique Schröder, Dominique Unruh:
Everlasting UC Commitments from Fully Malicious PUFs. 248 - Karlo Knezevic, Juraj Fulir, Domagoj Jakobovic, Stjepan Picek:
NeuroSCA: Evolving Activation Functions for Side-channel Analysis. 249 - Onur Günlü:
Key Agreement with Physical Unclonable Functions and Biometric Identifiers. 250 - Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser:
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation. 251 - Michael Zuzak, Yuntao Liu, Ankur Srivastava:
A Resource Binding Approach to Logic Obfuscation. 252 - Mark Abspoel, Ronald Cramer, Daniel Escudero, Ivan Damgård, Chaoping Xing:
Improved single-round secure multiplication using regenerating codes. 253 - Netanel Raviv, Ben Langton, Itzhak Tamo:
Multivariate Public Key Cryptosystem from Sidon Spaces. 254 - Fukang Liu, Takanori Isobe, Willi Meier:
A Simple Algebraic Attack on 3-Round LowMC. 255 - Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer:
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC. 256 - Shoichi Kamada:
Cryptanalysis of the quantum public-key cryptosystem OTU under heuristics from Szemerédi-type statements. 257 - Jean-Sébastien Coron, Lorenzo Spignoli:
Secure Shuffling in the Probing Model. 258 - Jesús-Javier Chi-Domínguez, Krijn Reijnders:
Don't forget the constant-time in CSURF. 259 - Yuval Ishai, Russell W. F. Lai, Giulio Malavolta:
A Geometric Approach to Homomorphic Secret Sharing. 260 - Ben Marshall, Dan Page, James Webb:
MIRACLE: MIcRo-ArChitectural Leakage Evaluation. 261 - Claudio Orlandi, Peter Scholl, Sophia Yakoubov:
The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT. 262 - Katharina Boudgoust, Adeline Roux-Langlois:
Compressed Linear Aggregate Signatures Based on Module Lattices. 263 - Bernardo David, Lorenzo Gentile, Mohsen Pourpouneh:
FAST: Fair Auctions via Secret Transactions. 264 - Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen:
On the Hardness of Module-LWE with Binary Secret. 265 - Peter Rindal, Phillipp Schoppmann:
VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE. 266 - Christoph Dobraunig, Lorenzo Grassi, Anna Guinet, Daniël Kuijsters:
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields. 267 - Daniel Slamanig, Christoph Striecks
:
Puncture 'Em All: Stronger Updatable Encryption with No-Directional Key Updates. 268 - Pramod Bhatotia, Markulf Kohlweiss, Lorenzo Martinico, Yiannis Tselekounis:
Steel: Composable Hardware-based Stateful and Randomised Functional Encryption. 269 - Pedro Hecht:
PQC: R-Propping of a New Group-Based Digital Signature. 270 - Dakshita Khurana, Brent Waters:
On the CCA Compatibility of Public-Key Infrastructure. 271 - Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto:
Isogeny-based key compression without pairings. 272 - Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. 273 - Lawrence Roy, Jaspal Singh:
Large Message Homomorphic Secret Sharing from DCR and Applications. 274 - Zhengyuan Shi, Gangqiang Yang, Hailiang Xiong, Fudong Li, Honggang Hu:
Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher. 275 - Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography. 276 - Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld:
On the Integer Polynomial Learning with Errors Problem. 277 - Ivan Damgård, Boyang Li, Nikolaj I. Schwartzbach:
More Communication Lower Bounds for Information-Theoretic MPC. 278 - Anna-Lena Horlemann-Trautmann, Sven Puchinger, Julian Renner, Thomas Schamberger, Antonia Wachter-Zeh:
Information-Set Decoding with Hints. 279 - Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Online-Extractability in the Quantum Random-Oracle Model. 280 - Alessandro Chiesa, Eylon Yogev:
Subquadratic SNARGs in the Random Oracle Model. 281 - Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper:
One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols. 282 - Carsten Baum, Bernardo David, Tore Kasper Frederiksen:
P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange. 283 - Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State:
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts. 284 - Amos Beimel, Hussien Othman, Naty Peter:
Degree-2 Secret Sharing and Conditional Disclosure of Secrets. 285 - Justin Holmgren
, Alex Lombardi, Ron D. Rothblum:
Fiat-Shamir via List-Recoverable Codes (or: Parallel Repetition of GMW is not Zero-Knowledge). 286 - Adrien Benamira, David Gérault, Thomas Peyrin, Quan Quan Tan:
A Deeper Look at Machine Learning-Based Cryptanalysis. 287 - Mark Zhandry:
Redeeming Reset Indifferentiability and Post-Quantum Groups. 288 - Sam Blackshear, Konstantinos Chalkias, Panagiotis Chatzigiannis, Riyaz Faizullabhoy, Irakliy Khaburzaniya, Eleftherios Kokoris-Kogias, Joshua Lind, David Wong, Tim Zakian:
Reactive Key-Loss Protection in Blockchains. 289 - Alex Biryukov, Aleksei Udovenko:
Dummy Shuffling against Algebraic Attacks in White-box Implementations. 290 - Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:
Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security. 291 - Akinori Hosoyamada, Yu Sasaki:
Quantum Collision Attacks on Reduced SHA-256 and SHA-512. 292 - Nicolas Bordes, Joan Daemen, Daniël Kuijsters, Gilles Van Assche:
Thinking Outside the Superbox. 293 - Marco Baldi, Franco Chiaraluce, Paolo Santini:
Code-based signatures without trapdoors through restricted vectors. 294 - Michael Zuzak, Ankur Srivastava:
Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design. 295 - Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice. 296 - Konstantinos Chalkias, Shir Cohen, Kevin Lewi, Fredric Moezinia, Yolan Romailler:
HashWires: Hyperefficient Credential-Based Range Proofs. 297 - Bhupendra Singh, G. Athithan, Rajesh Pillai:
On extensions of the one-time-pad. 298 - Muhammad Saad, Afsah Anwar, Srivatsan Ravi
, David Mohaisen:
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality. 299 - Nikolay S. Kaleyski:
Invariants for EA- and CCZ-equivalence of APN and AB functions. 300 - Dmitrii I. Koshelev:
Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of j=0 with the cost of one exponentiation in $\mathbb{F}_{\!q}$. 301 - Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi
, Veronika Kuchta
, Joseph K. Liu, Raphael C.-W. Phan, Zhenfei Zhang:
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain. 302 - S. Dov Gordon, Daniel Starin, Arkady Yerukhimovich:
The More The Merrier: Reducing the Cost of Large Scale MPC. 303 - Xavier Boyen, Thomas Haines, Johannes Müller:
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting. 304 - Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila:
SoK: Game-based Security Models for Group Key Exchange. 305 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions. 306 - Thomas Attema, Ronald Cramer, Lisa Kohl:
A Compressed Σ-Protocol Theory for Lattices. 307 - Michele Ciampi, Vipul Goyal, Rafail Ostrovsky:
Threshold Garbled Circuits and Ad Hoc Secure Computation. 308 - Xingyu Meng, Kshitij Raj, Atul Prasad Deb Nath, Kanad Basu, Sandip Ray:
SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets. 309 - Yi Chen, Hongbo Yu:
A New Neural Distinguisher Model Considering Derived Features from Multiple Ciphertext Pairs. 310 - Yi Chen, Hongbo Yu:
Improved Neural Aided Statistical Attack for Cryptanalysis. 311 - Zhimin Luo, Mengce Zheng, Ping Wang, Minhui Jin, Jiajia Zhang, Honggang Hu, Nenghai Yu:
Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup. 312 - Liron David, Avishai Wool:
Rank Estimation with Bounded Error via Exponential Sampling. 313 - Navid Nasr Esfahani, Douglas R. Stinson:
On Security Properties of All-or-nothing Transforms. 314 - Ilia Iliashenko, Vincent Zucca:
Faster homomorphic comparison operations for BGV and BFV. 315 - James Bartusek, Sanjam Garg
, Akshayaram Srinivasan, Yinuo Zhang:
Reusable Two-Round MPC from LPN. 316 - Duong Tung Nguyen, Ni Trieu:
MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge. 317 - Damiano Abram, Ivan Damgård, Peter Scholl, Sven Trieflinger:
Oblivious TLS via Multi-Party Computation. 318 - Orhun Kara:
Tradeoff attacks on symmetric ciphers. 319 - Nir Drucker, Shay Gueron, Dusan Kostic:
Binding BIKE errors to a key pair. 320 - Matthew Green, Gabriel Kaptchuk, Gijs Van Laer:
Abuse Resistant Law Enforcement Access Systems. 321 - Chaya Ganesh, Anca Nitulescu, Eduardo Soria-Vazquez:
Rinocchio: SNARKs for Ring Arithmetic. 322 - Quan Thoi Minh Nguyen:
0. 323 - Kristin E. Lauter:
Private AI: Machine Learning on Encrypted Data. 324 - Zachary Newman
, Sacha Servan-Schreiber, Srinivas Devadas:
Spectrum: High-Bandwidth Anonymous Broadcast with Malicious Security. 325 - François Dupressoir, Konrad Kohbrok, Sabine Oechsner:
Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox. 326 - Matteo Campanelli, Mathias Hall-Andersen:
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions. 327 - Karim M. Abdellatif:
Mixup Data Augmentation for Deep Learning Side-Channel Attacks. 328 - Min Yang, Changtong Xu, Zhe Xia, Li Wang, Qingshu Meng:
Two Efficient Regulatory Confi dential Transaction Schemes. 329 - Pooya Farshim, Louiza Khati, Yannick Seurin, Damien Vergnaud:
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers. 330 - Radhakrishna Bhat, N. R. Sunitha, S. S. Iyengar:
A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications. 331 - Yuri L. Borissov, Miroslav Markov:
An O(log2 p) Approach to Point-Counting on Elliptic Curves From a Prominent Family Over the Prime Field 픽p. 332 - Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki
:
Sumcheck Arguments and their Applications. 333 - Alessandro Chiesa, Fermi Ma, Nicholas Spooner, Mark Zhandry:
Post-Quantum Succinct Arguments. 334 - Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. 335 - Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek:
On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES. 336 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo:
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System. 337 - Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge:
Lattice-Based Proof of Shuffle and Applications to Electronic Voting. 338 - Jens Groth:
Non-interactive distributed key generation and key resharing. 339 - Bolton Bailey, Suryanarayana Sankagiri:
Merkle Trees Optimized for Stateless Clients in Bitcoin. 340 - Takashi Sato, Yuki Tanaka, Song Bian:
Clonable PUF: On the Design of PUFs That Share Equivalent Responses. 341 - Weikeng Chen, Ryan Deng, Raluca Ada Popa:
N-for-1 Auth: N-wise Decentralized Authentication via One Authentication. 342 - Rishab Goyal, Jiahui Liu, Brent Waters:
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups. 343 - Dario Catalano, Dario Fiore, Emanuele Giunta:
Efficient and Universally Composable Single Secret Leader Election from Pairings. 344 - Dmitry Kogan, Henry Corrigan-Gibbs:
Private Blocklist Lookups with Checklist. 345 - Benny Applebaum, Eliran Kachlon, Arpita Patra:
Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security. 346 - Marios Adamoudis, Konstantinos A. Draziotis, Dimitrios Poulakis:
Attacking (EC)DSA With Partially Known Multiples of Nonces. 347 - Maxime Bombar, Alain Couvreur:
Decoding supercodes of Gabidulin codes and applications to cryptanalysis. 348 - Nir Bitansky, Michael Kellner, Omri Shmueli:
Post-quantum Resettably-Sound Zero Knowledge. 349 - Konstantinos Chalkias, François Garillot, Yashvanth Kondi, Valeria Nikolaenko:
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures. 350 - Hyoseung Kim, Olivier Sanders, Michel Abdalla, Jong Hwan Park:
Practical Dynamic Group Signatures Without Knowledge Extractors. 351 - Jan Philipp Thoma, Tim Güneysu:
A Configurable Hardware Implementation of XMSS. 352 - Alonso González, Alexandros Zacharakis:
Succinct Publicly Verifiable Computation. 353 - Peeter Laud:
Efficient permutation protocol for MPC in the head. 354 - Georg Land, Pascal Sasdrich, Tim Güneysu:
A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware. 355 - Anton Tutoveanu:
Active Implementation of End-to-End Post-Quantum Encryption. 356 - Guilherme Perin, Lichao Wu, Stjepan Picek:
AISY - Deep Learning-based Framework for Side-channel Analysis. 357 - Alexander R. Block, Justin Holmgren
, Alon Rosen, Ron D. Rothblum, Pratik Soni:
Time- and Space-Efficient Arguments from Groups of Unknown Order. 358 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'. 359 - Thuat Do:
An Architecture for Blockchain-based Cloud Banking. 360 - Jiaxin Wang, Fang-Wei Fu:
Some Generic Constructions of Generalized Plateaued Functions. 361 - Zezhou Hou, Jiongjiong Ren, Shaozhen Chen:
Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning. 362 - Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:
Information Leakages in Code-based Masking: A Unified Quantification Approach. 363 - Gaurav Bansod:
RAGHAV: A new low power S-P network encryption design for resource constrained environment. 364 - Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
, Erkan Tairi:
Updatable Signatures and Message Authentication Codes. 365 - Peter Scholl, Mark Simkin, Luisa Siniscalchi:
Multiparty Computation with Covert Security and Public Verifiability. 366 - Arnab Roy, Elena Andreeva, Jan Ferdinand Sauer:
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions. 367 - Aaron Hutchinson, Koray Karabina, Geovandro Pereira:
Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE. 368 - Shoichi Hirose:
Another Algebraic Decomposition Method for Masked Implementation. 369 - Abhiram Kothapalli, Srinath T. V. Setty, Ioanna Tzialla:
Nova: Recursive Zero-Knowledge Arguments from Folding Schemes. 370 - Ahmet Sinak:
Construction of minimal linear codes with few weights from weakly regular plateaued functions. 371 - Laia Amorós, Annamaria Iezzi, Kristin E. Lauter, Chloe Martindale, Jana Sotáková:
Explicit connections between supersingular isogeny graphs and Bruhat - Tits trees. 372 - Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi:
T5: Hashing Five Inputs with Three Compression Calls. 373 - Akshaya Mani, Ian Goldberg:
ZXAD: Zero-knowledge Exit Abuse Detection for Tor. 374 - Rafael Dowsley, Caleb Horst, Anderson C. A. Nascimento:
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines. 375 - Nai-Hui Chia, Kai-Min Chung, Qipeng Liu, Takashi Yamakawa:
On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds. 376 - Quan Thoi Minh Nguyen:
Attacks and weaknesses of BLS aggregate signatures. 377 - Fabrice Benhamouda, Aayush Jain, Ilan Komargodski, Huijia Lin:
Multiparty Reusable Non-Interactive Secure Computation from LWE. 378 - Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu:
A Note on the Bias of Rotational Differential-Linear Distinguishers. 379 - Cholun Kim:
Certificateless Designated Verifier Proxy Signature. 380 - (Withdrawn) Towards Practical and Round-Optimal Lattice-Based Threshold and Blind Signatures. 381
- Jiaxin Pan, Magnus Ringerud:
Signatures with Tight Multi-User Security from Search Assumptions. 382 - Daniel R. L. Brown:
GLV+HWCD for 2y^2=x^3+x/GF(8^91+5). 383 - Alex Biryukov, Gleb Naumenko, Sergei Tikhomirov:
Analysis and Probing of Parallel Channels in the Lightning Network. 384 - Yasufumi Hashimoto:
Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices. 385 - Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni:
SAFELearn: Secure Aggregation for private FEderated Learning. 386 - Christian Majenz, Chanelle Matadah Manfouo, Maris Ozols:
Quantum-access security of the Winternitz one-time signature scheme. 387 - Marshall Ball
, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, Tal Moran:
Topology-Hiding Communication from Minimal Assumptions. 388 - Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
Physically Related Functions: A New Paradigm for Light-weight Key-Exchange. 389 - Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto:
Orthros: A Low-Latency PRF. 390 - Thomas Haines, Peter B. Rønne:
New Standards for E-Voting Systems: Reflections on Source Code Examinations. 391 - Ao Liu, Yun Lu, Lirong Xia, Vassilis Zikas:
How Private Are Commonly-Used Voting Rules? 392 - Onur Günlü:
Key Agreement with Correlated Noise and Multiple Entities or Enrollments. 393 - Ryo Nishimaki, Takashi Yamakawa:
Quantum Encryption with Certified Deletion: Public Key and Attribute-Based. 394 - Harishma Boyapally, Urbi Chatterjee, Debdeep Mukhopadhyay:
On the Validity of Spoofing Attack Against Safe is the New Smart. 395 - Alessandro Barenghi, Jean-François Biasse, Edoardo Persichetti, Paolo Santini:
LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action. 396 - Carmine Abate, Philipp G. Haselwarter, Exequiel Rivas, Antoine Van Muylder, Théo Winterhalter, Catalin Hritcu, Kenji Maillard, Bas Spitters:
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq. 397 - Thales Bandiera Paiva, Routo Terada:
Cryptanalysis of the Binary Permuted Kernel Problem. 398 - Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov:
Latus Incentive Scheme: Enabling Decentralization in Blockchains based on Recursive SNARKs. 399 - Yupu Hu, Xingting Dong, Baocang Wang:
Size of IK00 Branching Program. 400 - Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi:
Output Prediction Attacks on SPN Block Ciphers using Deep Learning. 401 - Christoph Dobraunig, Bart Mennink:
Leakage Resilient Value Comparison With Application to Message Authentication. 402 - Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:
Atom: A Stream Cipher with Double Key Filter. 403 - Mihir Bellare, Wei Dai:
Chain Reductions for Multi-Signatures. 404 - Claude Carlet:
Revisiting some results on APN and algebraic immune functions. 405 - Jiaxin Guan, Mark Zhandry:
Disappearing Cryptography in the Bounded Storage Model. 406 - André Schrottenloher:
Improved Quantum Algorithms for the k-XOR Problem. 407 - Christian Majenz, Christian Schaffner, Mehrdad Tahmasbi:
Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding. 408 - Markulf Kohlweiss, Varun Madathil, Kartik Nayak, Alessandra Scafuro:
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols. 409 - Shlomi Dolev, Stav Doolman:
Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM. 410 - Onur Günlü, Peter Trifonov, Muah Kim, Rafael F. Schaefer, Vladimir Sidorenko:
Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions. 411 - Prabhanjan Ananth, Fatih Kaleoglu:
Uncloneable Encryption, Revisited. 412 - Yi Liu, Qi Wang, Siu-Ming Yiu:
Blind Polynomial Evaluation and Data Trading. 413 - Sook-Yan Hue, Jason Chia, Ji-Jian Chin:
Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings. 414 - Marc Schoolderman, Jonathan Moerman, Sjaak Smetsers, Marko C. J. D. van Eekelen:
Efficient Verification of Optimized Code: Correct High-speed X25519. 415 - Florian Breuer, Vipul Goyal, Giulio Malavolta:
Cryptocurrencies with Security Policies and Two-Factor Authentication. 416 - Shlomi Dolev, Matan Liber:
History Binding Signature. 417 - Hao Chen:
Ring-LWE over two-to-power cyclotomics is not hard. 418 - (Withdrawn) On The Dihedral Coset Problem. 419
- Fabian Boemer, Sejun Kim, Gelila Seifu, Fillipe D. M. de Souza, Vinodh Gopal:
Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52. 420 - James Bartusek, Giulio Malavolta:
Candidate Obfuscation of Null Quantum Circuits and Witness Encryption for QMA. 421 - Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk:
Stacking Sigmas: A Framework to Compose Σ-Protocols for Disjunctions. 422 - Vasyl Ustimenko:
On effective computations in special subsemigroups of polynomial transformations and protocol based multivariate cryptosystems. 423 - Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu:
Security Analysis of SFrame. 424 - Yuqing Zhao, Wenqi Yu, Chun Guo:
Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions. 425 - Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Octavio Perez-Kempner:
Generic Plaintext Equality and Inequality Proofs (Extended Version). 426 - Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks. 427 - Peter Schwabe, Benoît Viguier, Timmy Weerwag, Freek Wiedijk:
A Coq proof of the correctness of X25519 in TweetNaCl. 428 - Daniel Smith-Tone:
New Practical Multivariate Signatures from a Nonlinear Modifier. 429 - Simon Pohmann, Marc Stevens, Jens Zumbrägel:
Lattice Enumeration on GPUs for fplll. 430 - Prabhanjan Ananth, Abhishek Jain
, Zhengzhong Jin, Giulio Malavolta:
Unbounded Multi-Party Computation from Learning with Errors. 431 - Kevin Deforth, Marc Desgroseilliers, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Marius Vuille:
XORBoost: Tree Boosting in the Multiparty Computation Setting. 432 - Aaram Yun:
Formations for the Quantum Random Oracle. 433 - Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb:
On the Power of Expansion: More Efficient Constructions in the Random Probing Model. 434 - Elaine Shi, Ke Wu:
Non-Interactive Anonymous Router. 435 - Duc-Phong Le, Sze Ling Yeo, Khoongming Khoo:
Algebraic Differential Fault Analysis on SIMON block cipher. 436 - Nikolaj Sidorenco, Sabine Oechsner, Bas Spitters:
Formal security analysis of MPC-in-the-head zero-knowledge protocols. 437 - Toomas Krips, Helger Lipmaa:
More Efficient Shuffle Argument from Unique Factorization. 438 - Donghoon Chang, Meltem Sönmez Turan:
Recovering the Key from the Internal State of Grain-128AEAD. 439 - Wenshuo Guo, Fangwei Fu:
Two modifications for Loidreau's code-based cryptosystem. 440 - Yukun Wang, Mingqiang Wang:
Watermarking PRFs from Lattices: Public Extract and Collusion Resistant. 441 - Raluca Posteuca, Tomer Ashur:
How to Backdoor a Cipher. 442 - Cholun Kim:
Constructing a pairing-free certificateless proxy signature scheme from ECDSA. 443 - Daniel Nager, Danny Niu Jianfang:
Xifrat - Compact Public-Key Cryptosystems based on Quasigroups. 444 - Anirudh C, Ashish Choudhury, Arpita Patra:
A Survey on Perfectly-Secure Verifiable Secret-Sharing. 445 - Chitchanok Chuengsatiansup, Damien Stehlé:
Towards practical GGM-based PRF from (Module-)Learning-with-Rounding. 446 - Daniel Noble:
An Intimate Analysis of Cuckoo Hashing with a Stash. 447 - Ashrujit Ghoshal, Stefano Tessaro:
On the Memory-Tightness of Hashed ElGamal. 448 - Gang Wang, Mark Nixon, Mike Boudreaux:
Towards Cloud-assisted Industrial IoT Platform for Large-scale Continuous Condition Monitoring. 449 - Gang Wang, Mark Nixon:
RandChain: Practical Scalable Decentralized Randomness Attested by Blockchain. 450 - Gang Wang:
RepShard: Reputation-based Sharding Scheme Achieves Linearly Scaling Efficiency and Security Simultaneously. 451 - (Withdrawn) SAT-based Method to Improve Neural Distinguisher and Applications to SIMON. 452
- Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, Raluca Ada Popa:
Merkle^2: A Low-Latency Transparency Log System. 453 - Veronika Kuchta, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Shifeng Sun:
Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security. 454 - Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe:
Guessing Bits: Improved Lattice Attacks on (EC)DSA. 455 - Animesh Chhotaray, Thomas Shrimpton:
Hardening Circuit-Design IP Against Reverse-Engineering Attacks. 456 - Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen:
Non-Interactive Composition of Sigma-Protocols via Share-then-Hash. 457 - Gideon Samid:
FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm. 458 - Deevashwer Rathee, Mayank Rathee, G. Rahul Kranti Kiran, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi:
SIRNN: A Math Library for Secure RNN Inference. 459 - Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi:
Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User Authentication through SCA. 460 - Aein Rezaei Shahmirzadi, Amir Moradi:
Second-Order SCA Security with almost no Fresh Randomness. 461 - James Howe, Thomas Prest, Daniel Apon:
SoK: How (not) to Design and Implement Post-Quantum Cryptography. 462 - Andreas Wiemers, Johannes Mittmann:
Improving Recent Side-Channel Attacks Against the DES Key Schedule. 463 - Gregor Haas, Seetal Potluri, Aydin Aysu:
iTimed: Cache Attacks on the Apple A10 Fusion SoC. 464 - Daniel R. L. Brown, Neal Koblitz, Jason T. LeGrow:
Cryptanalysis of 'MAKE'. 465 - (Withdrawn) A New Key Agreement Scheme Based On A Well-Known Property Of Powers. 466
- Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss:
Key-schedule Security for the TLS 1.3 Standard. 467 - Cosku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi:
Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report). 468 - Danilo Gligoroski:
Entropoid Based Cryptography. 469 - Benny Applebaum, Oded Nir:
Upslices, Downslices, and Secret-Sharing with Complexity of 1.5n. 470 - Cesar Pereida García, Sampo Sovio:
Size, Speed, and Security: An Ed25519 Case Study. 471 - Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung:
CryptoGram: Fast Private Calculations of Histograms over Multiple Users' Inputs. 472 - Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung:
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations. 473 - Fukang Liu, Takanori Isobe, Willi Meier:
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations. 474 - Shahla Atapoor, Nigel P. Smart, Younes Talibi Alaoui:
Private Liquidity Matching using MPC. 475 - Aaqib Bashir Dar, Mashhood Jeelani Lone, Nuzhat Hussain:
Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions. 476 - Agathe Cheriere, Lina Mortajine, Tania Richmond, Nadia El Mrabet:
Side-Channel Attack on ROLLO Post-Quantum Cryptographic Scheme. 477 - Yaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang, Xinyuan Zhang:
TurboIKOS: Improved Non-interactive Zero Knowledge and Post-Quantum Signatures. 478 - Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl:
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography. 479 - Jakub Klemsa:
Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform. 480 - Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. 481 - Anita Aghaie, Amir Moradi:
Inconsistency of Simulation and Practice in Delay-based Strong PUFs. 482 - Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal:
Masking Kyber: First- and Higher-Order Implementations. 483 - Alireza Kavousi, Javad Mohajeri, Mahmoud Salmasizadeh:
Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF. 484 - Ferhat Yaman, Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme. 485 - Takanori Isobe, Ryoma Ito:
Security Analysis of End-to-End Encryption for Zoom Meetings. 486 - Danny Niu Jianfang:
Xifrat Cryptanalysis - Compute the Mixing Function Without the Key. 487 - Javier Herranz, Ramiro Martínez, Manuel Sánchez:
Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle. 488 - (Withdrawn) ROSE: Robust Searchable Encryption with Forward and Backward Security and Practical Performance. 489
- Chao Liu, Anyu Wang, Zhongxiang Zheng:
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE. 490 - Véronique Cortier, Pierrick Gaudry, Quentin Yang:
A toolbox for verifiable tally-hiding e-voting systems. 491 - Ming-Shing Chen, Tung Chou:
Classic McEliece on the ARM Cortex-M4. 492 - Ming-Shing Chen, Tung Chou, Markus Krausz:
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4. 493 - Surbhi Shaw, Ratna Dutta:
Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures. 494 - Mircea Digulescu:
Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One-Way Functions. 495 - Mircea Digulescu:
Applications of SKREM-like symmetric key ciphers. 496 - Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont:
SoK: Design Tools for Side-Channel-Aware Implementations. 497 - Antonio Dimeo, Felix Gohla, Daniel Goßen, Niko Lockenvitz:
SoK: Multi-Device Secure Instant Messaging. 498 - Kelong Cong, Karim Eldefrawy, Nigel P. Smart:
Optimizing Registration Based Encryption. 499 - Gabrielle Beck, Aarushi Goel, Abhishek Jain
, Gabriel Kaptchuk:
Order-C Secure Multiparty Computation for Highly Repetitive Circuits. 500 - Aritra Banerjee, Michael Clear, Hitesh Tewari:
zkHawk: Practical Private Smart Contracts from MPC-based Hawk. 501 - Kwangsu Lee, Joon Sik Kim:
A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption. 502 - Matthieu Rambaud, Antoine Urban:
Almost-Asynchronous MPC under Honest Majority, Revisited. 503 - Xiao-Juan Wang, Tian Tian, Wen-Feng Qi:
A Generic Method for Investigating Nonsingular Galois NFSRs. 504 - Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, Shota Yamada:
Cryptanalysis of Boyen's Attribute-Based Encryption Scheme in TCC 2013. 505 - Robi Pedersen, Osmanbey Uzunkol:
Delegating Supersingular Isogenies over 픽p2 with Cryptographic Applications. 506 - Tianren Liu, Stefano Tessaro, Vinod Vaikuntanathan:
The t-wise Independence of Substitution-Permutation Networks. 507 - Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, Younho Lee:
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs. 508 - Erik Thormarker:
On using the same key pair for Ed25519 and an X25519 based KEM. 509 - George Teseleanu:
Signer and Message Ambiguity from a Variety of Keys. 510 - Markulf Kohlweiss, Michal Zajac:
On Simulation-Extractability of Universal zkSNARKs. 511 - Tapas Pal, Ratna Dutta:
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF. 512 - Yanyi Liu, Rafael Pass:
On One-way Functions from NP-Complete Problems. 513 - Abhishek Jain
, Zhengzhong Jin:
Non-Interactive Zero Knowledge from Sub-exponential DDH. 514 - Keita Emura, Atsushi Takayasu, Yohei Watanabe:
Generic Constructions of Revocable Hierarchical Identity-based Encryption. 515 - (Withdrawn) A new weak curve fault attack on ECIES: embedded point validation is not enough during decryption. 516
- Yanyi Liu, Rafael Pass:
Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity. 517 - Victor Ermolaev, Gamze Tillem:
How to Share and Own a Secret. 518 - Atakan Arslan, Muhammed Ali Bingöl:
Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment. 519 - Thomas Haines, Johannes Müller:
Optimal Randomized Partial Checking for Decryption Mix Nets. 520 - Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert:
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation. 521 - Yingpu Deng, Lixia Luo, Yanbin Pan, Zhaonan Wang, Guanju Xiao:
Public-key Cryptosystems and Signature Schemes from p-adic Lattices. 522 - Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie:
No Time to Hash: On Superefficient Entropy Accumulation. 523 - Kwangsu Lee:
Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency. 524 - Lichao Wu, Guilherme Perin:
On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis. 525 - Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek:
Reinforcement Learning-based Design of Side-channel Countermeasures. 526 - Michal Wronski:
Solving discrete logarithm problem over prime fields using quantum annealing and $\frac{n^3}{2}$ logical qubits. 527 - Denis Firsov, Henri Lakk, Ahto Truu:
Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping. 528 - Nicolas Gailly, Mary Maller, Anca Nitulescu:
SnarkPack: Practical SNARK Aggregation. 529 - Yuan Yao, Tuna B. Tufan, Tarun Kathuria, Baris Ege, Ulkuhan Guler, Patrick Schaumont:
Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level. 530 - David Heath, Vladimir Kolesnikov:
LogStack: Stacked Garbling with O(b log b) Computation. 531 - Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang:
Rainbow on Cortex-M4. 532 - Sijun Tan, Brian Knott, Yuan Tian, David J. Wu:
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU. 533 - Maura B. Paterson, Douglas R. Stinson:
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes. 534 - Yanyi Liu, Rafael Pass:
On the Possibility of Basing Cryptography on $\EXP \neq \BPP$. 535 - (Withdrawn) Analyzing the Potential of Transport Triggered Architecture for Lattice-based Cryptography Algorithms. 536
- Gang Wang:
SoK: Exploring Blockchains Interoperability. 537 - Françoise Levy-dit-Vehel, Maxime Roméas:
A Composable Look at Updatable Encryption. 538 - Atsushi Takayasu:
More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions. 539 - Geoffroy Couteau, Michael Klooß, Huang Lin, Michael Reichle:
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments. 540 - Reza Azarderakhsh, Rami El Khatib, Brian Koziel, Brandon Langenberg:
Hardware Deployment of Hybrid PQC. 541 - Samir Bouftass:
Symetric encryption algorithms based on the mathematical structure underlying the three body problem. 542 - Craig Costello:
The Case for SIKE: A Decade of the Supersingular Isogeny Problem. 543 - Jing Yang, Thomas Johansson, Alexander Maximov:
New improved attacks on SNOW-V. 544 - Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao:
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments. 545 - Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto:
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V. 546 - Yao Sun:
Cube Attack against 843-Round Trivium. 547 - Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:
Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper). 548 - Benjamin Salling Hvass, Diego F. Aranha, Bas Spitters:
High-assurance field inversion for curve-based cryptography. 549 - Amar Bapic, Samir Hodzic, Enes Pasalic:
Quadratic almost bent functions - their partial characterization and design in the spectral domain. 550 - Seungwan Hong, Seunghong Kim, Jiheon Choi, Younho Lee, Jung Hee Cheon:
Efficient Sorting of Homomorphic Encrypted Data with k-way Sorting Network. 551 - André Chailloux, Thomas Debris-Alazard, Simona Etinski:
Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric. 552 - Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt:
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild. 553 - Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo:
Grover on Caesar and Vigenère Ciphers. 554 - Nils Wisiol, Khalid T. Mursi, Jean-Pierre Seifert, Yu Zhuang:
Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited. 555 - Léo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuki:
Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori. 556 - Thijs Laarhoven, Michael Walter:
Dual lattice attacks for closest vector problems (with preprocessing). 557 - Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter B. Rønne, Tjerand Silde:
Verifiable Decryption in the Head. 558 - Andrés Fábrega, Ueli Maurer, Marta Mularczyk:
A Fresh Approach to Updatable Symmetric Encryption. 559 - Nael Rahman, Vladimir Shpilrain:
MOBS (Matrices Over Bit Strings) public key exchange. 560 - Pakize Sanal, Emrah Karagoz, Hwajeong Seo, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors. 561 - Wouter Castryck, Ann Dooms, Carlo Emerencia, Alexander Lemmens:
A fusion algorithm for solving the hidden shift problem in finite abelian groups. 562 - Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani:
High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography. 563 - Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler:
SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions. 564 - Cyprien Delpech de Saint Guilhem, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy:
The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving. 565 - Cong Zhang, Hong-Sheng Zhou:
From Random Oracles to Ideal Signatures, and Back. 566 - Jeonghyuk Lee, Jihye Kim, Hyunok Oh:
Forward-secure Multi-user Aggregate Signatures based on zk-SNARKs. 567 - Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra:
ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems. 568 - David Knichel, Amir Moradi, Nicolai Müller, Pascal Sasdrich:
Automated Generation of Masked Hardware. 569 - André Chailloux, Johanna Loyer:
Lattice sieving via quantum random walks. 570 - Thomas Attema, Nicole Gervasoni, Michiel Marcus, Gabriele Spini:
Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond. 571 - Charanjit S. Jutla, Nathan Manohar:
Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE. 572 - Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy:
Compactness of Hashing Modes and Efficiency beyond Merkle Tree. 573 - Yuyin Yu, Léo Perrin:
Constructing More Quadratic APN Functions with the QAM Method. 574 - Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu:
MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing. 575 - Surya Addanki, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky, Antigoni Polychroniadou:
Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares. 576 - Dionysis Zindros:
Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks. 577 - Itai Dinur:
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2). 578 - Joseph Jaeger, Fang Song, Stefano Tessaro:
Quantum Key-length Extension. 579 - Leo de Castro, Antigoni Polychroniadou:
Lightweight, Verifiable Function Secret Sharing and its Applications. 580 - Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu:
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces. 581 - StarkWare Team:
ethSTARK Documentation. 582 - Lorenz Panny:
Entropoid-based cryptography is group exponentiation in disguise. 583 - Onur Günlü, Ueli Maurer, João Ribeiro:
Effects of Quantization on the Multiple-Round Secret-Key Capacity. 584 - Maxime Plançon, Thomas Prest:
Exact Lattice Sampling from Non-Gaussian Distributions. 585 - Laila El Aimani:
A New Approach for finding Low-Weight Polynomial Multiples. 586 - David Heath, Vladimir Kolesnikov:
PrORAM: Fast O(log n) Private Coin ZK ORAM. 587 - Thomas Haines, Johannes Müller:
A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose. 588 - Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo:
White-Box Encryption Scheme Using a Quantum Memory. 589 - Carla Ràfols, Arantxa Zapico:
An Algebraic Framework for Universal and Updatable SNARKs. 590 - Jan Peter Drees, Pritha Gupta, Eyke Hüllermeier, Tibor Jager, Alexander Konze, Claudia Priesterjahn, Arunselvan Ramaswamy, Juraj Somorovsky:
Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs! 591 - Loïc Masure, Rémi Strullu:
Side Channel Analysis against the ANSSI's protected AES implementation on ARM. 592 - Shumo Chu, Danyang Zhuo, Elaine Shi, T.-H. Hubert Chan:
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms. 593 - Zhelei Zhou, Xinle Cao, Jian Liu, Bingsheng Zhang, Kui Ren:
ZK Contingent Payments for Trained Neural Networks. 594 - Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath:
Securing Parallel-chain Protocols under Variable Mining Power. 595 - Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico:
Mutual Accountability Layer: Accountable Anonymity within Accountable Trust. 596 - Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Accelerated RISC-V for Post-Quantum SIKE. 597 - Panagiotis Chatzigiannis, Konstantinos Chalkias:
Proof of Assets in the Diem Blockchain. 598 - Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang:
Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments. 599 - Christian Porter, Andrew Mendelsohn, Cong Ling:
Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group. 600 - Hanshen Xiao, Srinivas Devadas:
The Art of Labeling: Task Augmentation for Private(Collaborative) Learning on Transformed Data. 601 - Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen:
Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak. 602 - Justin Kim, Vandan Mehta, Kartik Nayak, Nibesh Shrestha:
Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults. 603 - David Heath, Vladimir Kolesnikov, Stanislav Peceny:
Masked Triples: Amortizing Multiplication Triples across Conditionals. 604 - Benny Applebaum, Eyal Golombek:
On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs. 605 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss:
ZK-PCPs from Leakage-Resilient Secret Sharing. 606 - Jiaxin Pan, Chen Qian, Magnus Ringerud:
Signed Diffie-Hellman Key Exchange with Tight Security. 607 - Daniel R. L. Brown:
Layering diverse cryptography to lower future secret attack risks: post-quantum estimates. 608 - Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky, Vassilis Zikas:
FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker. 609 - Alexander Nilsson, Irina E. Bocharova, Boris D. Kudryashov, Thomas Johansson:
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems. 610 - Fatih Balli, Andrea Caforio, Subhadeep Banik:
Some Applications of Hamming Weight Correlations. 611 - Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider:
Privacy-preserving Density-based Clustering. 612 - Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu:
Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE. 613 - Rafael Pass:
Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit. 614 - Rafael Pass:
A Tutorial on Concurrent Zero Knowledge. 615 - Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest:
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable. 616 - Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa:
Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication. 617 - Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:
Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing. 618 - Jiabo Wang, Cong Ling:
Polar Coding for Ring-LWE-Based Public Key Encryption. 619 - Elzbieta Burek, Michal Misztal, Michal Wronski:
Algebraic attacks on block ciphers using quantum annealing. 620 - Léonard Lys, Arthur Micoulet, Maria Potop-Butucaru:
R-SWAP: Relay based atomic cross-chain swap protocol. 621 - Ripon Patgiri:
Stealth: A Highly Secured End-to-End Symmetric Communication Protocol. 622 - Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros:
Mining in Logarithmic Space. 623 - Guru-Vamsi Policharla, Manoj Prabhakaran, Rajeev Raghunath, Parjanya Vyas:
Group Structure in Correlations and its Applications in Cryptography. 624 - Daniel R. L. Brown:
Plactic key agreement. 625 - Jan Wichelmann, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth:
Help, my Signal has bad Device! Breaking the Signal Messenger's Post-CompromiseSecurity through a Malicious Device. 626 - Nirvan Tyagi, Ben Fisch, Joseph Bonneau, Stefano Tessaro:
Client-Auditable Verifiable Registries. 627 - Joachim Neu, Ertem Nusret Tas, David Tse:
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets. 628 - Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
Bitcoin Privacy - A Survey on Mixing Techniques. 629 - Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings. 630 - Felix Engelmann, Lukas Müller, Andreas Peter, Frank Kargl, Christoph Bösch:
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges. 631 - Jan Camenisch, Manu Drijvers, Timo Hanke, Yvonne-Anne Pignolet, Victor Shoup, Dominic Williams:
Internet Computer Consensus. 632 - Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková:
CTIDH: faster constant-time CSIDH. 633 - Jakub Klemsa:
Setting Up Efficient TFHE Parameters for Multivalue Plaintexts and Multiple Additions. 634 - Ripon Patgiri:
symKrypt: A General-purpose and Lightweight Symmetric-Key Cryptography. 635 - Akinori Kawachi, Harumichi Nishimura:
Communication Complexity of Private simultaneous Quantum Messages Protocols. 636 - Yevgeniy Dodis, Kevin Yeo:
Doubly-Affine Extractors, and their Applications. 637 - Ioanna Karantaidou, Foteini Baldimtsi:
Efficient Constructions of Pairing Based Accumulators. 638 - Charalampos Papamanthou, Cong Zhang, Hong-Sheng Zhou:
Indifferentiable Signatures: High Performance and Fallback Security. 639 - Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl:
Security and Trust in Open Source Security Tokens. 640 - William Zhang, Yu Xia:
Hydra: Succinct Fully Pipelineable Interactive Arguments of Knowledge. 641 - Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk:
On the Cryptographic Deniability of the Signal Protocol. 642 - Muhammad ElSheikh, Amr M. Youssef:
On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers. 643 - Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti:
Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings. 644 - Alexander May, Floyd Zweydinger:
Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing. 645 - Cihangir Tezcan:
Optimization of Advanced Encryption Standard on Graphics Processing Units. 646 - Ripon Patgiri:
privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm. 647 - Mustafa Khairallah:
Security of COFB against Chosen Ciphertext Attacks. 648 - Aurélien Dupin, Pierrick Méaux, Mélissa Rossi:
On the Algebraic Immunity - Resiliency trade-off, implications for Goldreich's Pseudorandom Generator. 649 - Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya:
Structured Leakage and Applications to Cryptographic Constant-Time and Cost. 650 - Collin Chin, Howard Wu, Raymond Chu, Alessandro Coglio, Eric McCarthy, Eric Smith:
Leo: A Programming Language for Formally Verified, Zero-Knowledge Applications. 651 - Arsalan Javeed, Cemal Yilmaz, Erkay Savas:
Detector+: An Approach for Detecting, Isolating, and Preventing Timing Attacks. 652 - Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Helger Lipmaa:
Smooth Zero-Knowledge Hash Functions. 653 - Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa:
Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning. 654 - Morten Øygarden, Daniel Smith-Tone, Javier A. Verbel:
On the Effect of Projection on Rank Attacks in Multivariate Cryptography. 655 - Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny. 656 - Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Jenit Tomy:
Locally Reconstructable Non-malleable Secret Sharing. 657 - Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum:
A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem. 658 - Mohammed Nabeel, Mohammed Ashraf, Eduardo Chielle, Nektarios Georgios Tsoutsos, Michail Maniatakos:
Technical report: CoPHEE: Co-processor forPartially Homomorphic Encrypted Execution. 659 - Lei Fan, Jonathan Katz, Phuc Thai, Hong-Sheng Zhou:
A Permissionless Proof-of-Stake Blockchain with Best-Possible Unpredictability. 660 - Ling Sun, Wei Wang, Meiqin Wang:
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. 661 - Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang:
Verifying Post-Quantum Signatures in 8 kB of RAM. 662 - Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier:
On the Design and Misuse of Microcoded (Embedded) Processors - A Cautionary Note. 663 - Handong Cui, Tsz Hon Yuen:
A Trustless GQ Multi-Signature Scheme with Identifiable Abort. 664 - Pierrick Méaux:
On the algebraic immunity of direct sum constructions. 665 - Ahad Niknia, Miguel Correia, Jaber Karimpour:
Secure cloud-of-clouds storage with space-efficient secret sharing. 666 - Hyeokdong Kwon, Hyunjun Kim, Siwoo Eum, Minjoo Shim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo:
Optimized Implementation of SM4 on AVR Microcontrollers and ARM Processors. 667 - Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo:
Grover on SM3. 668 - David Cerezo Sánchez:
Pravuil: Global Consensus for a United World. 669 - Farid Javani, Alan T. Sherman:
AOT: Anonymization by Oblivious Transfer. 670 - Atsuki Momose, Ling Ren:
Multi-Threshold Byzantine Fault Tolerance. 671 - Pedro Hecht:
PQC: R-Propping a Chaotic Cellular Automata. 672 - Tianyi Liu, Xiang Xie, Yupeng Zhang:
zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy. 673 - Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li:
On the Effect of the Key-expansion Algorithm in Simon-like Ciphers. 674 - Hector B. Hougaard:
3-round Feistel is Not Superpseudorandom Over Any Group. 675 - Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez, Benjamin Smith:
Extending the GLS endomorphism to speed up GHS Weil descent using Magma. 676 - Paul Cotan, George Teseleanu:
Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes. 677 - Dmitrii I. Koshelev:
Faster indifferentiable hashing to elliptic $\mathbb{F}_{\!q^2}$-curves. 678 - Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Permutation Based EDM: An Inverse Free BBB Secure PRF. 679 - (Withdrawn) Efficient Attribute Based Encryption for Boolean Circuits. 680
- Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
Learnability of Multiplexer PUF and SN-PUF : A Fourier-based Approach. 681 - Ian McQuoid, Mike Rosulek, Lawrence Roy:
Batching Base Oblivious Transfers. 682 - Tânia Esteves, Mariana Miranda, João Paulo, Bernardo Portela:
S2Dedup: SGX-enabled Secure Deduplication. 683 - Nicholas Brandt:
Tight Setup Bounds for Identifiable Abort. 684 - Melissa Azouaoui
, Kostas Papagiannopoulos, Dominik Zürner:
Blind Side-Channel SIFA. 685 - Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin:
Meteor: Cryptographically Secure Steganography for Realistic Distributions. 686 - Hanshen Xiao, Srinivas Devadas:
Towards Understanding Practical Randomness Beyond Noise: Differential Privacy and Mixup. 687 - Geoffroy Couteau, Shuichi Katsumata, Elahe Sadeghi, Bogdan Ursu:
Statistical ZAPs from Group-Based Assumptions. 688 - Ripon Patgiri:
OSHA: A General-purpose One-way Secure Hash Algorithm. 689 - Aarushi Goel, Abhishek Jain
, Manoj Prabhakaran, Rajeev Raghunath:
On Communication Models and Best-Achievable Security in Two-Round MPC. 690 - Andrey Kim, Maxim Deryabin, Jieun Eom, Rakyong Choi, Yongwoo Lee, Whan Ghang, Donghoon Yoo:
General Bootstrapping Approach for RLWE-based Homomorphic Encryption. 691 - Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha
:
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. 692 - Mark Fischer, Fabian Langer, Johannes Mono, Clemens Nasenberg, Nils Albartus:
Hardware Penetration Testing Knocks Your SoCs Off. 693 - Ignacio Cascudo, Emanuele Giunta:
On Interactive Oracle Proofs for Boolean R1CS Statements. 694 - Atsushi Takayasu:
Adaptively Secure Lattice-based Revocable IBE in the QROM: Compact Parameters, Tight Security, and Anonymity. 695 - Edward Eaton, Douglas Stebila:
The "quantum annoying" property of password-authenticated key exchange protocols. 696 - Deepak Maram, Iddo Bentov, Mahimna Kelkar, Ari Juels:
GoAT: File Geolocation via Anchor Timestamping. 697 - Masahito Ishizaka, Shinsaku Kiyomoto:
Multi-Dimensional Sub/Super-Range Signatures. 698 - Hiroshi Onuki, Tomoki Moriya:
Radical Isogenies on Montgomery Curves. 699 - Robi Pedersen:
DeCSIDH: Delegating isogeny computations in the CSIDH setting. 700 - Samir Bouftass:
Multidimentional ModDiv public key exchange protocol. 701 - Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord:
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. 702