


Остановите войну!
for scientists:


default search action
IACR Cryptology ePrint Archive, Volume 2020
Volume 2020, 2020
- Manoj Gyawali, Daniele Di Tullio:
Elliptic Curves of Nearly Prime Order. 1 - Qichun Wang:
On a Conjecture of O'Donnell. 2 - (Withdrawn) New Constructions of Traceable Range Proofs: Towards Multiple Regulation and Joint Regulation. 3
- (Withdrawn) BPCEX: Towards Blockchain-based Privacy-preserving Currency Exchange. 4
- M. R. Mirzaee Shamsabad, Seyed Mojtaba Dehnavi:
Lai-Massey Scheme Revisited. 5 - André Chailloux, Thomas Debris-Alazard:
Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures. 6 - Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann:
On Lattice-Based Interactive Protocols with Aborts. 7 - Oriol Farràs:
Secret Sharing Schemes for Ports of Matroids of Rank 3. 8 - Thomas Pornin:
Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions. 9 - Dmitrii Koshelev:
Double point compression for elliptic curves of j-invariant 0. 10 - Ming Li, Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo:
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain. 11 - Erdem Alkim, Yusuf Alper Bilgin, Murat Cenk, François Gérard:
Cortex-M4 Optimizations for \{R, M\}LWE Schemes. 12 - Nir Bitansky, Idan Gerichter:
On the Cryptographic Hardness of Local Search. 13 - Gaëtan Leurent, Thomas Peyrin:
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. 14 - Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts. 15 - Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa:
Short Threshold Dynamic Group Signatures. 16 - Daniel Gardham, Mark Manulis, Constantin Catalin Dragan:
Biometric-Authenticated Searchable Encryption. 17 - Sarang Noether, Brandon Goodell:
Triptych: logarithmic-sized linkable ring signatures with applications. 18 - Suhyeon Lee, Seungjoo Kim:
Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains. 19 - Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. 20 - Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez:
eSIDH: the revenge of the SIDH. 21 - Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material). 22 - Riccardo Longo, Alessio Meneghetti, Massimiliano Sala:
Threshold Multi-Signature with an Offline Recovery Party. 23 - Ethan Heilman, Sebastien Lipmann, Sharon Goldberg:
The Arwen Trading Protocols (Full Version). 24 - Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco:
Single Secret Leader Election. 25 - Wen Wang, Marc Stöttinger:
Post-Quantum Secure Architectures for Automotive Hardware Secure Modules. 26 - Alexander Maximov:
On Roots Factorization for PQC Algorithms. 27 - Denis Firsov, Ahto Buldas, Ahto Truu, Risto Laanoja:
Verified Security of BLT Signature Scheme. 28 - Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, Arkady Yerukhimovich:
Differentially-Private Multi-Party Sketching for Large-Scale Statistics. 29 - Kuan Cheng, Xin Li, Yu Zheng:
Locally Decodable Codes with Randomized Encoding. 31 - Mahdi Sajadieh, Mohsen Mousavi:
A New Approach for the Implementation of Binary Matrices Using SLP Applications. 32 - Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef:
Scalable Open-Vote Network on Ethereum. 33 - Tianjun Ma, Haixia Xu, Peili Li:
SkyEye: A Traceable Scheme for Blockchain. 34 - Rakyong Choi, Dongyeon Hong, Kwangjo Kim:
Constant-round Dynamic Group Key Exchange from RLWE Assumption. 35 - Yupu Hu, Siyue Dong, Xingting Dong:
Analysis on Aigis-Enc: asymmetrical and symmetrical. 36 - Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput. 37 - Michail Moraitis, Elena Dubrova:
Bitstream Modification Attack on SNOW 3G. 38 - Damien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard:
Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis. 39 - Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. 40 - Aggelos Kiayias, Saad Quader, Alexander Russell:
Consistency in Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders. 41 - Arpita Patra, Ajith Suresh:
BLAZE: Blazing Fast Privacy-Preserving Machine Learning. 42 - Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa:
Zone Encryption with Anonymous Authentication for V2V Communication. 43 - Alexander Chepurnoy, Amitabh Saxena:
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts. 44 - Haibat Khan, Benjamin Dowling, Keith M. Martin:
Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6. 45 - Orhun Kara, Muhammed F. Esgin:
On Analysis of Lightweight Stream Ciphers with Keyed Update. 46 - Tianshuo Cong, Ximing Fu, Xuting Zhou, Yuli Zou, Haining Fan:
New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version). 47 - Changshe Ma, Yiping Gu, Hongfei Li:
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage. 48 - Erdem Alkim, Hülya Evkan, Norman Lahr
, Ruben Niederhagen, Richard Petri:
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V. 49 - Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa:
Delphi: A Cryptographic Inference Service for Neural Networks. 50 - Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark E. Marson:
Low-Latency Hardware Masking with Application to AES. 51 - Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE. 52 - Yasuhiko Ikematsu, Shuhei Nakamura:
Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems". 53 - Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. 54 - Alejandro Cabrera Aldaya, Billy Bob Brumley:
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA. 55 - Zhengzhong Jin, Yunlei Zhao:
AKCN-E8: Compact and Flexible KEM from Ideal Lattice. 56 - Elena Kirshanova, Huyen Nguyen, Damien Stehlé, Alexandre Wallet:
On the smoothing parameter and last minimum of random orthogonal lattices. 57 - Guilherme Perin, Ileana Buhan, Stjepan Picek:
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis. 58 - Sato Shinichi:
ARX-KW, a family of key wrapping constructions using SipHash and ChaCha. 59 - Antonio Faonio
, María Isabel González Vasco, Claudio Soriente, Hien Thi Thu Truong:
Auditable Asymmetric Password Authenticated Public Key Establishment. 60 - Gary Yu:
Simple Schnorr Signature with Pedersen Commitment as Key. 61 - Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig:
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically. 62 - Aurélien Greuet, Simon Montoya, Guénaël Renault:
Attack on LAC Key Exchange in Misuse Situation. 63 - (Withdrawn) Dual System in Lattice: Fully Secure ABE from LWE Assumption. 64
- Jake Massimo, Kenneth G. Paterson:
A Performant, Misuse-Resistant API for Primality Testing. 65 - Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas E. Anderson, Arvind Krishnamurthy, Bryan Parno:
Talek: Private Group Messaging with Hidden Access Patterns. 66 - Taylor R. Campbell:
Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse. 67 - Pranab Chakraborty, Subhamoy Maitra:
Further Clarification on Mantin's Digraph Repetition Bias in RC4. 68 - Dima Grigoriev, Vladimir Shpilrain:
RSA and redactable blockchains. 69 - Thomas Agrikola, Dennis Hofheinz, Julia Kastner:
On Instantiating the Algebraic Group Model from Falsifiable Assumptions. 70 - Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis:
Post-Quantum Authentication in TLS 1.3: A Performance Study. 71 - Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
Anonymous Tokens with Private Metadata Bit. 72 - Fabio Banfi, Ueli Maurer:
Anonymous Symmetric-Key Communication. 73 - Daniel R. L. Brown:
Rolling up sleeves when subversion's in a field? 74 - Rishiraj Bhattacharyya:
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms. 75 - Charbel Saliba, Laura Luzzi, Cong Ling:
Wyner-Ziv reconciliation for key exchange based on Ring-LWE. 76 - Thomas Häner, Samuel Jaques, Michael Naehrig, Martin Roetteler, Mathias Soeken:
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms. 77 - Kentaro Tamura, Yutaka Shikano:
Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo. 78 - Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective. 79 - Benny Applebaum, Amos Beimel, Oded Nir, Naty Peter:
Better Secret-Sharing via Robust Conditional Disclosure of Secrets. 80 - Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon:
Efficient polynomial commitment schemes for multiple points and polynomials. 81 - Anand Aiyer, Xiao Liang, Nilu Nalini, Omkant Pandey:
Random Walks and Concurrent Zero-Knowledge. 82 - Weikeng Chen, Raluca Ada Popa:
Metal: A Metadata-Hiding File-Sharing System. 83 - Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:
Bandwidth-efficient threshold EC-DSA. 84 - Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval Elovici:
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems. 85 - Daniele Micciancio, Yuriy Polyakov:
Bootstrapping in FHEW-like Cryptosystems. 86 - Elaine Shi:
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey). 87 - Benjamin Y. Chan, Elaine Shi:
Streamlet: Textbook Streamlined Blockchains. 88 - Chen-Dong Ye, Tian Tian, Fan-Yang Zeng:
The MILP-Aided Conditional Differential Attack and Its Application to Trivium. 89 - Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs:
Witness Maps and Applications. 90 - Jonathan Takeshita, Matthew M. Schoenbauer, Ryan Karl, Taeho Jung:
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption. 91 - Daniel Jost, Ueli Maurer:
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees. 92 - Romain Gay:
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials. 93 - Michael Davidson, Tyler Diamond:
On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms. 94 - Zhongxiang Zheng, Anyu Wang, Haining Fan, Chunhuan Zhao, Chao Liu, Xue Zhang:
SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors. 95 - David Galindo, Jia Liu, Mihai Ordean
, Jin-Mann Wong:
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons. 96 - Stanislav S. Malakhov:
Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard. 97 - Novak Kaluderovic, Thorsten Kleinjung, Dusan Kostic:
Improved key recovery on the Legendre PRF. 98 - Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson:
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange. 99 - Claude Carlet, Kwang Ho Kim, Sihem Mesnager:
A direct proof of APN-ness of the Kasami functions. 100 - Haibat Khan, Keith M. Martin:
A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future. 101 - Boxin Zhao, Xiaoyang Dong, Keting Jia:
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect. 102 - Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128. 103 - Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels:
On the Security Goals of White-Box Cryptography. 104 - Frank Schuhmacher:
MCU intrinsic group features for component authentication. 105 - Frank Schuhmacher:
Relaxed freshness in component authentication. 106 - Ryan Amos, Marios Georgiou, Aggelos Kiayias, Mark Zhandry:
One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication. 107 - Christoph Dobraunig, Florian Mendel, Bart Mennink:
Practical Forgeries for ORANGE. 108 - Lucca Hirschi, Lara Schmid, David A. Basin:
Fixing the Achilles Heel of E-Voting: The Bulletin Board. 109 - Ran Canetti, Pratik Sarkar, Xiao Wang:
Blazing Fast OT for Three-Round UC OT Extension. 110 - Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model. 111 - Patrick Karl, Michael Tempelmeier:
A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography. 112 - Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh, Emmanuel Thomé:
New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve. 113 - Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou:
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer. 114 - Xavier Boyen, Thomas Haines, Johannes Müller
:
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing. 115 - Benny Applebaum, Zvika Brakerski, Sanjam Garg
, Yuval Ishai, Akshayaram Srinivasan:
Separating Two-Round Secure Computation from Oblivious Transfer. 116 - Andrew H. Reinders, Rafael Misoczki, Santosh Ghosh, Manoj R. Sastry:
Efficient BIKE Hardware Design with Constant-Time Decoder. 117 - Saeid Sahraei, Salman Avestimehr:
InfoCommit: Information-Theoretic Polynomial Commitment and Verification. 118 - Zvika Brakerski, Nico Döttling:
Hardness of LWE on General Entropic Distributions. 119 - Léo Ducas, Thijs Laarhoven, Wessel P. J. van Woerden:
The randomized slicer for CVPP: sharper, faster, smaller, batchier. 120 - Hao Chen, Ilia Iliashenko, Kim Laine:
When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead. 121 - Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Verifiable Inner Product Encryption Scheme. 122 - Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov:
Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains. 123 - Ali El Kaafarani, Shuichi Katsumata, Federico Pintore:
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512. 124 - Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi:
Oblivious Parallel Tight Compaction. 125 - Shifeng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu:
Public-Key Puncturable Encryption: Modular and Compact Constructions. 126 - Véronique Cortier, Joseph Lallemand, Bogdan Warinschi:
Fifty Shades of Ballot Privacy: Privacy against a Malicious Board. 127 - Ward Beullens, Cyprien Delpech de Saint Guilhem:
LegRoast: Efficient post-quantum signatures from the Legendre PRF. 128 - Juliane Krämer, Patrick Struck:
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security. 129 - Elette Boyle, Ran Cohen, Aarushi Goel:
Succinctly Reconstructed Distributed Signatures and Balanced Byzantine Agreement. 130 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang:
Coin Tossing with Lazy Defense: Hardness of Computation Results. 131 - Dario Fiore, Anca Nitulescu, David Pointcheval:
Boosting Verifiable Computation on Encrypted Data. 132 - Souradyuti Paul, Ananya Shrivastava:
Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware. 133 - Vipul Goyal, Yifan Song:
Malicious Security Comes Free in Honest-Majority MPC. 134 - Abida Haque, Alessandra Scafuro:
Threshold Ring Signatures: New Definitions and Post-Quantum Security. 135 - David Heath, Vladimir Kolesnikov:
Stacked Garbling for Disjunctive Zero-Knowledge Proofs. 136 - Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss, Hendrik Waldner:
Consistency for Functional Encryption. 137 - Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
Smart Contract Derivatives. 138 - Carmit Hazay, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam:
Going Beyond Dual Execution: MPC for Functions with Efficient Verification. 139 - Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang:
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. 140 - Hila Dahari, Yehuda Lindell:
Deterministic-Prover Zero-Knowledge Proofs. 141