


default search action
IACR Cryptology ePrint Archive, Volume 2020
Volume 2020, 2020
- Manoj Gyawali, Daniele Di Tullio:
Elliptic Curves of Nearly Prime Order. 1 - Qichun Wang:
On a Conjecture of O'Donnell. 2 - (Withdrawn) New Constructions of Traceable Range Proofs: Towards Multiple Regulation and Joint Regulation. 3
- (Withdrawn) BPCEX: Towards Blockchain-based Privacy-preserving Currency Exchange. 4
- M. R. Mirzaee Shamsabad, Seyed Mojtaba Dehnavi:
Lai-Massey Scheme Revisited. 5 - André Chailloux, Thomas Debris-Alazard:
Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures. 6 - Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann:
On Lattice-Based Interactive Protocols with Aborts. 7 - Oriol Farràs:
Secret Sharing Schemes for Ports of Matroids of Rank 3. 8 - Thomas Pornin:
Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions. 9 - Dmitrii I. Koshelev:
Double point compression for elliptic curves of j-invariant 0. 10 - Ming Li, Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo:
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain. 11 - Erdem Alkim, Yusuf Alper Bilgin, Murat Cenk, François Gérard:
Cortex-M4 Optimizations for \{R, M\}LWE Schemes. 12 - Nir Bitansky, Idan Gerichter:
On the Cryptographic Hardness of Local Search. 13 - Gaëtan Leurent, Thomas Peyrin:
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. 14 - Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts. 15 - Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa:
Short Threshold Dynamic Group Signatures. 16 - Daniel Gardham, Mark Manulis, Constantin Catalin Dragan:
Biometric-Authenticated Searchable Encryption. 17 - Sarang Noether, Brandon Goodell:
Triptych: logarithmic-sized linkable ring signatures with applications. 18 - Suhyeon Lee, Seungjoo Kim:
Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains. 19 - Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Dongxi Liu:
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes. 20 - Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez:
eSIDH: the revenge of the SIDH. 21 - Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material). 22 - Riccardo Longo, Alessio Meneghetti, Massimiliano Sala:
Threshold Multi-Signature with an Offline Recovery Party. 23 - Ethan Heilman, Sebastien Lipmann, Sharon Goldberg:
The Arwen Trading Protocols (Full Version). 24 - Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco:
Single Secret Leader Election. 25 - Wen Wang, Marc Stöttinger:
Post-Quantum Secure Architectures for Automotive Hardware Secure Modules. 26 - Alexander Maximov:
On Roots Factorization for PQC Algorithms. 27 - Denis Firsov, Ahto Buldas, Ahto Truu, Risto Laanoja:
Verified Security of BLT Signature Scheme. 28 - Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, Arkady Yerukhimovich:
Differentially-Private Multi-Party Sketching for Large-Scale Statistics. 29 - Kuan Cheng, Xin Li, Yu Zheng:
Locally Decodable Codes with Randomized Encoding. 31 - Mahdi Sajadieh, Mohsen Mousavi:
A New Approach for the Implementation of Binary Matrices Using SLP Applications. 32 - Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef:
Scalable Open-Vote Network on Ethereum. 33 - Tianjun Ma, Haixia Xu, Peili Li:
SkyEye: A Traceable Scheme for Blockchain. 34 - Rakyong Choi, Dongyeon Hong, Kwangjo Kim:
Constant-round Dynamic Group Key Exchange from RLWE Assumption. 35 - Yupu Hu, Siyue Dong, Xingting Dong:
Analysis on Aigis-Enc: asymmetrical and symmetrical. 36 - Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput. 37 - Michail Moraitis, Elena Dubrova:
Bitstream Modification Attack on SNOW 3G. 38 - Damien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard:
Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis. 39 - Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. 40 - Aggelos Kiayias, Saad Quader, Alexander Russell:
Consistency in Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders. 41 - Arpita Patra, Ajith Suresh:
BLAZE: Blazing Fast Privacy-Preserving Machine Learning. 42 - Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa:
Zone Encryption with Anonymous Authentication for V2V Communication. 43 - Alexander Chepurnoy, Amitabh Saxena:
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts. 44 - Haibat Khan, Benjamin Dowling, Keith M. Martin:
Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6. 45 - Orhun Kara, Muhammed F. Esgin:
On Analysis of Lightweight Stream Ciphers with Keyed Update. 46 - Tianshuo Cong, Ximing Fu, Xuting Zhou, Yuli Zou, Haining Fan:
New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version). 47 - Changshe Ma, Yiping Gu, Hongfei Li:
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage. 48 - Erdem Alkim, Hülya Evkan, Norman Lahr
, Ruben Niederhagen, Richard Petri:
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V. 49 - Pratyush Mishra
, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, Raluca Ada Popa:
Delphi: A Cryptographic Inference Service for Neural Networks. 50 - Pascal Sasdrich, Begül Bilgin
, Michael Hutter, Mark E. Marson:
Low-Latency Hardware Masking with Application to AES. 51 - Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE. 52 - Yasuhiko Ikematsu, Shuhei Nakamura:
Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems". 53 - Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. 54 - Alejandro Cabrera Aldaya, Billy Bob Brumley:
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA. 55 - Zhengzhong Jin, Yunlei Zhao:
AKCN-E8: Compact and Flexible KEM from Ideal Lattice. 56 - Elena Kirshanova, Huyen Nguyen, Damien Stehlé, Alexandre Wallet:
On the smoothing parameter and last minimum of random orthogonal lattices. 57 - Guilherme Perin, Ileana Buhan, Stjepan Picek:
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis. 58 - Sato Shinichi:
ARX-KW, a family of key wrapping constructions using SipHash and ChaCha. 59 - Antonio Faonio
, María Isabel González Vasco, Claudio Soriente, Hien Thi Thu Truong:
Auditable Asymmetric Password Authenticated Public Key Establishment. 60 - Gary Yu:
Simple Schnorr Signature with Pedersen Commitment as Key. 61 - Behzad Abdolmaleki, Sebastian Ramacher, Daniel Slamanig:
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically. 62 - Aurélien Greuet, Simon Montoya, Guénaël Renault:
Attack on LAC Key Exchange in Misuse Situation. 63 - (Withdrawn) Dual System in Lattice: Fully Secure ABE from LWE Assumption. 64
- Jake Massimo, Kenneth G. Paterson:
A Performant, Misuse-Resistant API for Primality Testing. 65 - Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas E. Anderson, Arvind Krishnamurthy, Bryan Parno:
Talek: Private Group Messaging with Hidden Access Patterns. 66 - Taylor R. Campbell:
Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse. 67 - Pranab Chakraborty, Subhamoy Maitra:
Further Clarification on Mantin's Digraph Repetition Bias in RC4. 68 - Dima Grigoriev, Vladimir Shpilrain:
RSA and redactable blockchains. 69 - Thomas Agrikola, Dennis Hofheinz, Julia Kastner:
On Instantiating the Algebraic Group Model from Falsifiable Assumptions. 70 - Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis:
Post-Quantum Authentication in TLS 1.3: A Performance Study. 71 - Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
Anonymous Tokens with Private Metadata Bit. 72 - Fabio Banfi, Ueli Maurer:
Anonymous Symmetric-Key Communication. 73 - Daniel R. L. Brown:
Rolling up sleeves when subversion's in a field? 74 - Rishiraj Bhattacharyya:
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms. 75 - Charbel Saliba, Laura Luzzi, Cong Ling:
Wyner-Ziv reconciliation for key exchange based on Ring-LWE. 76 - Thomas Häner, Samuel Jaques, Michael Naehrig, Martin Roetteler, Mathias Soeken:
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms. 77 - Kentaro Tamura, Yutaka Shikano:
Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo. 78 - Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective. 79 - Benny Applebaum, Amos Beimel, Oded Nir, Naty Peter:
Better Secret-Sharing via Robust Conditional Disclosure of Secrets. 80 - Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon:
Efficient polynomial commitment schemes for multiple points and polynomials. 81 - Anand Aiyer, Xiao Liang, Nilu Nalini, Omkant Pandey:
Random Walks and Concurrent Zero-Knowledge. 82 - Weikeng Chen, Raluca Ada Popa:
Metal: A Metadata-Hiding File-Sharing System. 83 - Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:
Bandwidth-efficient threshold EC-DSA. 84 - Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval Elovici:
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems. 85 - Daniele Micciancio, Yuriy Polyakov:
Bootstrapping in FHEW-like Cryptosystems. 86 - Elaine Shi:
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey). 87 - Benjamin Y. Chan, Elaine Shi:
Streamlet: Textbook Streamlined Blockchains. 88 - Chen-Dong Ye, Tian Tian, Fan-Yang Zeng:
The MILP-Aided Conditional Differential Attack and Its Application to Trivium. 89 - Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs:
Witness Maps and Applications. 90 - Jonathan Takeshita, Matthew M. Schoenbauer, Ryan Karl, Taeho Jung:
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption. 91 - Daniel Jost, Ueli Maurer:
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees. 92 - Romain Gay:
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials. 93 - Michael Davidson, Tyler Diamond:
On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms. 94 - Zhongxiang Zheng, Anyu Wang, Haining Fan, Chunhuan Zhao, Chao Liu, Xue Zhang:
SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors. 95 - David Galindo, Jia Liu, Mihai Ordean
, Jin-Mann Wong:
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons. 96 - Stanislav S. Malakhov:
Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard. 97 - Novak Kaluderovic, Thorsten Kleinjung, Dusan Kostic:
Improved key recovery on the Legendre PRF. 98 - Benjamin Dowling, Torben Brandt Hansen, Kenneth G. Paterson:
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange. 99 - Claude Carlet, Kwang Ho Kim, Sihem Mesnager:
A direct proof of APN-ness of the Kasami functions. 100 - Haibat Khan, Keith M. Martin:
A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future. 101 - Boxin Zhao, Xiaoyang Dong, Keting Jia:
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect. 102 - Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128. 103 - Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels:
On the Security Goals of White-Box Cryptography. 104 - Frank Schuhmacher:
MCU intrinsic group features for component authentication. 105 - Frank Schuhmacher:
Relaxed freshness in component authentication. 106 - Ryan Amos, Marios Georgiou, Aggelos Kiayias, Mark Zhandry:
One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication. 107 - Christoph Dobraunig, Florian Mendel, Bart Mennink:
Practical Forgeries for ORANGE. 108 - Lucca Hirschi, Lara Schmid, David A. Basin:
Fixing the Achilles Heel of E-Voting: The Bulletin Board. 109 - Ran Canetti, Pratik Sarkar, Xiao Wang:
Blazing Fast OT for Three-Round UC OT Extension. 110 - Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model. 111 - Patrick Karl
, Michael Tempelmeier:
A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography. 112 - Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh, Emmanuel Thomé:
New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve. 113 - Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou:
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer. 114 - Xavier Boyen, Thomas Haines, Johannes Müller
:
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing. 115 - Benny Applebaum, Zvika Brakerski, Sanjam Garg
, Yuval Ishai, Akshayaram Srinivasan:
Separating Two-Round Secure Computation from Oblivious Transfer. 116 - Andrew H. Reinders, Rafael Misoczki, Santosh Ghosh, Manoj R. Sastry:
Efficient BIKE Hardware Design with Constant-Time Decoder. 117 - Saeid Sahraei, Salman Avestimehr:
InfoCommit: Information-Theoretic Polynomial Commitment and Verification. 118 - Zvika Brakerski, Nico Döttling:
Hardness of LWE on General Entropic Distributions. 119 - Léo Ducas, Thijs Laarhoven, Wessel P. J. van Woerden:
The randomized slicer for CVPP: sharper, faster, smaller, batchier. 120 - Hao Chen, Ilia Iliashenko, Kim Laine:
When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead. 121 - Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Verifiable Inner Product Encryption Scheme. 122 - Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov:
Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains. 123 - Ali El Kaafarani, Shuichi Katsumata, Federico Pintore:
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512. 124 - Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi:
Oblivious Parallel Tight Compaction. 125 - Shifeng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu:
Public-Key Puncturable Encryption: Modular and Compact Constructions. 126 - Véronique Cortier, Joseph Lallemand, Bogdan Warinschi:
Fifty Shades of Ballot Privacy: Privacy against a Malicious Board. 127 - Ward Beullens, Cyprien Delpech de Saint Guilhem:
LegRoast: Efficient post-quantum signatures from the Legendre PRF. 128 - Juliane Krämer, Patrick Struck:
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security. 129 - Elette Boyle, Ran Cohen, Aarushi Goel:
Succinctly Reconstructed Distributed Signatures and Balanced Byzantine Agreement. 130 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang:
Coin Tossing with Lazy Defense: Hardness of Computation Results. 131 - Dario Fiore, Anca Nitulescu, David Pointcheval:
Boosting Verifiable Computation on Encrypted Data. 132 - Souradyuti Paul, Ananya Shrivastava:
Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware. 133 - Vipul Goyal, Yifan Song:
Malicious Security Comes Free in Honest-Majority MPC. 134 - Abida Haque, Alessandra Scafuro:
Threshold Ring Signatures: New Definitions and Post-Quantum Security. 135 - David Heath, Vladimir Kolesnikov:
Stacked Garbling for Disjunctive Zero-Knowledge Proofs. 136 - Christian Badertscher, Aggelos Kiayias, Markulf Kohlweiss, Hendrik Waldner:
Consistency for Functional Encryption. 137 - Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
Smart Contract Derivatives. 138 - Carmit Hazay, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam:
Going Beyond Dual Execution: MPC for Functions with Efficient Verification. 139 - Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang:
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. 140 - Hila Dahari, Yehuda Lindell:
Deterministic-Prover Zero-Knowledge Proofs. 141 - Erica Blum, Jonathan Katz, Julian Loss:
Network-Agnostic State Machine Replication. 142 - Hailong Yao, Caifen Wang, Xingbing Fu, Chao Liu, Bin Wu, Fagen Li:
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT. 143 - Wei Yu, Saud Al Musa, Bao Li:
Double-Base Chains for Scalar Multiplications on Elliptic Curves. 144 - Lars Tebelmann, Jean-Luc Danger, Michael Pehl:
Self-Secured PUF: Protecting the Loop PUF by Masking. 145 - Roman Langrehr, Jiaxin Pan:
Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security. 146 - Marshall Ball
, Eshan Chattopadhyay, Jyun-Jie Liao, Tal Malkin, Li-Yang Tan:
Non-Malleability against Polynomial Tampering. 147 - Fatih Balli, Paul Rösler, Serge Vaudenay:
Determining the Core Primitive for Optimally Secure Ratcheting. 148 - Matteo Campanelli, Dario Fiore, Nicola Greco, Dimitris Kolonelos, Luca Nizzardo:
Vector Commitment Techniques and Applications to Verifiable Decentralized Storage. 149 - Varun Maram:
On the Security of NTS-KEM in the Quantum Random Oracle Model. 150 - Wouter Castryck, Jana Sotáková, Frederik Vercauteren:
Breaking the decisional Diffie-Hellman problem for class group actions using genus theory. 151 - Thomas Attema, Ronald Cramer:
Compressed Σ-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics. 152 - Nicholas-Philip Brandt, Sven Maier, Tobias Müller, Jörn Müller-Quade:
Constructing Secure Multi-Party Computation with Identifiable Abort. 153 - Aayush Jain, Nathan Manohar, Amit Sahai:
Combiners for Functional Encryption, Unconditionally. 154 - Yifan Tian, Laurent Njilla, Jiawei Yuan, Shucheng Yu:
Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference. 155 - Xing Li, Yi Zheng, Kunxian Xia, Tongcheng Sun, John Beyler:
Phantom: An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts. 156 - Vipul Goyal, Akshayaram Srinivasan, Chenzhi Zhu:
Multi-Source Non-Malleable Extractors and Applications. 157 - Ali Hadipour, Seyed Mahdi Sajadieh, Raheleh Afifi:
Jump index in T-functions for designing a new basic structure of stream ciphers. 158 - Cheng Hong, Zhicong Huang, Wen-jie Lu, Hunter Qu, Li Ma, Morten Dahl, Jason Mancuso:
Privacy-preserving collaborative machine learning on genomic data using TensorFlow. 159 - Sihem Mesnager, Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee:
Solving Some Affine Equations over Finite Fields. 160 - Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu:
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact. 161 - Ignacio Cascudo, Jaron Skovsted Gundersen:
A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity. 162 - Akin Ünal:
Impossibility Results for Lattice-Based Functional Encryption Schemes. 163 - Alexander Bienstock, Allison Bishop, Eli Goldin, Garrison Grogan, Victor Lecomte:
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way? 164 - Aron Gohr, Sven Jacob, Werner Schindler
:
Efficient Solutions of the CHES 2018 AES Challenge Using Deep Residual Neural Networks and Knowledge Distillation on Adversarial Examples. 165 - Stefan Dziembowski, Pawel Kedzior:
Ethna: Channel Network with Dynamic Internal Payment Splitting. 166 - Jinhyun So, Basak Guler, Amir Salman Avestimehr:
Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning. 167 - Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen:
Improved Classical and Quantum Algorithms for Subset-Sum. 168 - Prabhanjan Ananth, Abhishek Jain
, Zhengzhong Jin:
Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE). 169 - Saikrishna Badrinarayanan, James Bartusek, Sanjam Garg
, Daniel Masny, Pratyay Mukherjee:
Reusable Two-Round MPC from DDH. 170 - Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki:
High Performance Logistic Regression for Privacy-Preserving Genome Analysis. 171 - Daan Leermakers, Boris Skoric:
Qubit-based Unclonable Encryption with Key Recycling. 172 - Dimitris Karakostas, Aggelos Kiayias:
Securing Proof-of-Work Ledgers via Checkpointing. 173 - Mohammad Zaheri, Adam O'Neill:
On Selective-Opening Security of Deterministic Primitives. 174 - Stefan Dziembowski
, Grzegorz Fabianski, Sebastian Faust, Siavash Riahi:
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma. 175 - Eugene Frimpong, Alexandros Bakas, Hai-Van Dang, Antonis Michalas:
Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version). 176 - Christian Badertscher, Ueli Maurer, Christopher Portmann, Guilherme Rito:
Revisiting (R)CCA Security and Replay Protection. 177 - Santosh Ghosh, Luis S. Kida, Soham Jayesh Desai, Reshma Lal:
A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device. 178 - Nathan Keller, Asaf Rosemarin:
Mind the Middle Layer: The HADES Design Strategy Revisited. 179 - Prabhanjan Ananth, Abhishek Jain
, Zhengzhong Jin, Giulio Malavolta:
Multikey FHE in the Plain Model. 180 - Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi:
L1-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space. 181 - Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang:
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. 182 - Ignacio Cascudo, Reto Schnyder:
A Note on Secure Multiparty Computation via Higher Residue Symbol Techniques. 183 - Ariel Futoransky, Carlos Sarraute, Daniel Fernandez, Matias Travizano, Ariel Waissbein:
Fair and Decentralized Exchange of Digital Goods. 184 - Gaëtan Cassiers, Benjamin Grégoire, Itamar Levi, François-Xavier Standaert:
Hardware Private Circuits: From Trivial Composition to Full Verification. 185 - Dragos Ioan Ilie, Kostis Karantias, William J. Knottenbelt:
Bitcoin Crypto - Bounties for Quantum Capable Adversaries. 186 - Dragos Ioan Ilie, William J. Knottenbelt, Iain Stewart:
Committing to Quantum Resistance, Better: A Speed - and - Risk - Configurable Defence for Bitcoin against a Fast Quantum Computing Attack. 187 - Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer
:
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. 188 - Vipul Goyal, Yifan Song, Chenzhi Zhu:
Guaranteed Output Delivery Comes Free in Honest Majority MPC. 189 - Assimakis Kattis, Joseph Bonneau:
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees. 190 - Zvika Brakerski, Vinod Vaikuntanathan:
Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE. 191 - (Withdrawn) Certificateless Homomorphic Signature Scheme for Network Coding. 192
- Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai:
PSI from PaXoS: Fast, Malicious Private Set Intersection. 193 - Junqing Gong, Hoeteck Wee:
Adaptively Secure ABE for DFA from k-Lin and More. 194 - Jonathan Lee, Kirill Nikitin, Srinath T. V. Setty:
Replicated state machines without replicated execution. 195 - Samuel Dobson, Steven D. Galbraith:
Trustless Groups of Unknown Order with Hyperelliptic Curves. 196 - Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval:
Dynamic Decentralized Functional Encryption. 197 - Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang:
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors. 198 - Seungkwang Lee, Myungchul Kim:
Improvement on a Masked White-box Cryptographic Implementation. 199 - Christoph Dobraunig, Bart Mennink, Robert Primas:
Exploring the Golden Mean Between Leakage and Fault Resilience and Practice. 200 - Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, Ankur Srivastava:
A Survey on Neural Trojans. 201 - Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava:
Strong Anti-SAT: Secure and Effective Logic Locking. 202 - Thang Hoang, Jorge Guajardo, Attila A. Yavuz:
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework. 203 - Chaya Ganesh, Bernardo Magri, Daniele Venturi:
Cryptographic Reverse Firewalls for Interactive Proof Systems. 204 - Shlomi Dolev, Ziyu Wang:
SodsBC: Stream of Distributed Secrets for Quantum-safe Blockchain. 205 - (Withdrawn) A Post-Quantum Non-Interactive Key-Exchange Protocol from Coding Theory. 206
- Carsten Baum, Bernardo David, Rafael Dowsley:
A Framework for Universally Composable Publicly Verifiable Cryptographic Protocols. 207 - Gengran Hu, Lin You, Liqin Hu, Hui Wang:
Random Integer Lattice Generation via HNF. 208 - Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu:
Adaptive Simulation Security for Inner Product Functional Encryption. 209 - Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim:
SITM: See-In-The-Middle-Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers. 210 - Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle. 211 - Steve Thakur:
Isogenies of certain abelian varieties over finite fields with p-ranks zero. 212 - Akinori Hosoyamada, Yu Sasaki:
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound. 213 - Charlotte Bonte, Nigel P. Smart, Titouan Tanguy:
Thresholdizing HashEdDSA: MPC to the Rescue. 214 - Megumi Ando, Anna Lysyanskaya:
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption. 215 - Sanjam Garg
, Xiao Liang, Omkant Pandey, Ivan Visconti:
Black-Box Constructions of Bounded-Concurrent Secure Computation. 216 - M. Sadegh Riazi, Seyed M. Chavoshian, Farinaz Koushanfar
:
SynFi: Automatic Synthetic Fingerprint Generation. 217 - Ehsan Aerabi, Milad Bohlouli, Mohammad Hasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, David Hély:
Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs. 218 - Michele Ciampi, Luisa Siniscalchi, Hendrik Waldner:
Multi-Client Functional Encryption for Separable Functions. 219 - Florian Tramèr
, Dan Boneh, Kenneth G. Paterson:
Remote Side-Channel Attacks on Anonymous Transactions. 220 - Fabrice Benhamouda, Huijia Lin:
Multiparty Reusable Non-Interactive Secure Computation. 221 - Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih:
Improving Speed and Security in Updatable Encryption Schemes. 222 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Compact NIZKs from Standard Assumptions on Bilinear Maps. 223 - Mihir Bellare, Igors Stepanovs:
Security under Message-Derived Keys: Signcryption in iMessage. 224 - Lior Rotem, Gil Segev, Ido Shahaf:
Generic-Group Delay Functions Require Hidden-Order Groups. 225 - Duggirala Meher Krishna, Duggirala Ravi, Pulugurtha Krishna Subba Rao:
Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol. 226 - Yindong Chen, Limin Lin, Chuliang Wei:
About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10. 227 - Shweta Agrawal, Shota Yamada:
Optimal Broadcast Encryption from Pairings and LWE. 228 - Itai Dinur:
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications. 229 - Changmin Lee, Alexandre Wallet:
Lattice analysis on MiNTRU problem. 230 - Junichi Tomida, Nuttapong Attrapadung:
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions. 231 - Bertram Poettering, Paul Rösler:
Combiners for AEAD. 232 - Sam Kim:
Key-Homomorphic Pseudorandom Functions from LWE with a Small Modulus. 233 - Ruslan V. Skuratovskii, Aled Williams:
Application of commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups to Key Exchange Protocol. 234 - Vipul Goyal, Abhishek Jain
, Zhengzhong Jin, Giulio Malavolta:
Statistical Zaps and New Oblivious Transfer Protocols. 235 - Mridul Nandi:
Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21. 236 - Céline Chevalier, Ehsan Ebrahimi
, Quoc-Huy Vu:
On the Security Notions for Encryption in a Quantum World. 237 - Andrew Hone:
Efficient ECM factorization in parallel with the Lyness map. 238 - Edimar Veríssimo:
Viktoria: A new Paradigm for Hash Functions. 239 - T.-H. Hubert Chan, Kai-Min Chung, Wei-Kai Lin, Elaine Shi:
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture. 240 - Mihir Bellare, Hannah Davis, Felix Günther:
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability. 241 - (Withdrawn) Practical and Secure Circular Range Search on Private Spatial Data. 242
- Benjamin Lipp:
An Analysis of Hybrid Public Key Encryption. 243 - Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper:
On Adaptive Attacks against Jao-Urbanik's Isogeny-Based Protocol. 244 - Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu:
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. 245 - Jing Tian, Jun Lin, Zhongfeng Wang:
Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography. 246 - (Withdrawn) Crooked Indifferentiability Revisited. 247
- Ittai Abraham, Benny Pinkas, Avishay Yanai:
Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast. 248 - (Withdrawn) CONFISCA : an SIMD-based CONcurrent FI and SCA countermeasure with switchable performance and security modes. 249
- Ehsan Aerabi, Athanasios Papadimitriou, David Hély:
On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations. 250 - Ivan Damgård, Nikolaj I. Schwartzbach:
Communication Lower Bounds for Perfect Maliciously Secure MPC. 251 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen:
Secure Non-interactive Simulation: Hardness & Feasibility. 252 - Hemanta K. Maji, Mingyuan Wang:
Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing. 253 - Sanjam Garg
, Shafi Goldwasser, Prashant Nalini Vasudevan:
Formalizing Data Deletion in the Context of the Right to be Forgotten. 254 - Takanori Machida, Dai Yamamoto, Yuki Unno, Hisashi Kojima:
Novel Deception Techniques for Malware Detection on Industrial Control Systems. 255 - Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs:
Statistical ZAPR Arguments from Bilinear Maps. 256 - Onur Günlü, Rafael F. Schaefer, H. Vincent Poor:
Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication. 257 - Zvika Brakerski, Venkata Koppula, Tamer Mour:
NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations. 258 - Divesh Aggarwal, Maciej Obremski, João Ribeiro, Mark Simkin, Luisa Siniscalchi:
Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors. 259 - Samuel Bouaziz-Ermann, Sébastien Canard, Gautier Eberhart, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré:
Lattice-based (Partially) Blind Signature without Restart. 260 - Matthieu Monteiro, Kumara Kahatapitiya, Hassan Jameel Asghar, Kanchana Thilakarathna, Thierry Rakotoarivelo, Dali Kaafar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices. 261 - Christopher Leonardi:
A Note on the Ending Elliptic Curve in SIDH. 262 - Jihoon Kwon, ByeongHak Lee, Jooyoung Lee, Dukjae Moon:
FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups. 263 - Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes. 264 - Benoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu:
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More. 265 - Tommaso Gagliardoni, Juliane Krämer, Patrick Struck:
Quantum Indistinguishability for Public Key Encryption. 266 - Tim Gellersen, Okan Seker, Thomas Eisenbarth:
Differential Power Analysis of the Picnic Signature Scheme. 267 - Jose Maria Bermudo Mera, Angshuman Karmakar, Ingrid Verbauwhede:
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography. 268 - Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels:
Order-Fairness for Byzantine Consensus. 269 - Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
Practical Predicate Encryption for Inner Product. 270 - Marc Fischlin, Patrick Harasser, Christian Janson:
Signatures from Sequential-OR Proofs. 271 - Keita Arimitsu, Kazuki Otsuka:
Privacy-Preserving Fast and Exact Linear Equations Solver with Fully Homomorphic Encryption. 272 - Pierrick Méaux:
On the Fast Algebraic Immunity of Threshold Functions. 273 - Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao:
An Optimal Relational Database Encryption Scheme. 274 - Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz:
Pholkos - Efficient Large-state Tweakable Block Ciphers from the AES Round Function. 275 - Hamid Nejatollahi, Saransh Gupta, Mohsen Imani, Tajana Simunic Rosing, Rosario Cammarota, Nikil D. Dutt:
CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware. 276 - Juan A. Garay, Aggelos Kiayias, Nikos Leonardos:
Full Analysis of Nakamoto Consensus in Bounded-Delay Networks. 277 - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Dawn Song:
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs. 278 - Shashank Raghuraman, Leyla Nazhandali:
Impact of System-on-Chip Integration of AEAD Ciphers. 279 - Juliane Krämer, Patrick Struck:
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions. 280 - Dusan Klinec, Vashek Matyas:
Privacy-friendly Monero transaction signing on a hardware wallet, extended version. 281 - Jelle Don, Serge Fehr, Christian Majenz:
The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More. 282 - István András Seres, Omer Shlomovits, Pratyush Ranjan Tiwari:
CryptoWills: How to Bequeath Cryptoassets. 283 - Evangelia Anna Markatou, Roberto Tamassia:
Database Reconstruction Attacks in Two Dimensions. 284 - Yaobin Shen, Chun Guo, Lei Wang:
Improved Security Bounds for Generalized Feistel Networks. 285 - Geoffroy Couteau, Dominik Hartmann:
Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages. 286 - Sebastian Angel, Sampath Kannan, Zachary B. Ratliff:
Private resource allocators and their applications. 287 - Yaobin Shen, Hailun Yan, Lei Wang, Xuejia Lai:
Secure Key-Alternating Feistel Ciphers Without Key Schedule. 288 - Jonathan Lee:
The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves. 289 - Reham Almukhlifi, Poorvi L. Vora:
Linear Cryptanalysis of Reduced-Round SIMON Using Super Rounds. 290 - (Withdrawn) Unforgeability in the quantum world. 291
- Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi:
LWE with Side Information: Attacks and Concrete Security Estimation. 292 - Benjamin E. Diamond:
"Many-out-of-Many" Proofs with Applications to Anonymous Zether. 293 - Olivier Blazy, Patrick Towa, Damien Vergnaud:
Public-Key Generation with Verifiable Randomness. 294 - Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa:
Generalized Isotopic Shift Construction for APN Functions. 295 - Akshima, David Cash, Francesca Falzon, Adam Rivkin, Jesse Stern:
Multidimensional Database Reconstruction from Range Query Access Patterns. 296 - Koen de Boer, Léo Ducas, Alice Pellet-Mary, Benjamin Wesolowski:
Random Self-reducibility of Ideal-SVP via Arakelov Random Walks. 297 - Nir Drucker, Shay Gueron, Dusan Kostic:
Fast polynomial inversion for post quantum QC-MDPC cryptography. 298 - Manuel M. T. Chakravarty, Sandro Coretti, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, Alexander Russell:
Hydra: Fast Isomorphic State Channels. 299 - Yehuda Lindell:
Secure Multiparty Computation (MPC). 300 - Thomas Kaeding:
MadHatter: A toy cipher that conceals two plaintexts in the same ciphertext. 301 - Thomas Kaeding:
Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers. 302 - Sergei Tikhomirov, Pedro Moreno-Sanchez, Matteo Maffei:
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network. 303 - Christian Mouchet, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:
Multiparty Homomorphic Encryption: From Theory to Practice. 304 - Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Masahito Gotaishi, Kou Shikata, Koji Sasaki, Nobuharu Suzuki, Masaki Hashiyada:
3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA. 305 - Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta:
Leakage Assessment in Fault Attacks: A Deep Learning Perspective. 306 - Claude Carlet:
Handling vectorial functions by means of their graph indicators. 307 - Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, Michael Schneider:
Post-Quantum TLS on Embedded Systems. 308 - Patrick Derbez
, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher:
Cryptanalysis Results on Spook. 309 - Gabriel Destouet, Cécile Dumas, Anne Frassati, Valérie Perrier:
Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis. 310 - Tianjun Ma, Haixia Xu, Peili Li:
A Blockchain Traceable Scheme with Oversight Function. 311 - (Withdrawn) Triptych-2: efficient proofs for confidential transactions. 312
- Victor Shoup:
Security analysis of SPAKE2+. 313 - Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi:
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA. 314 - Ariel Gabizon, Zachary J. Williamson:
plookup: A simplified polynomial protocol for lookup tables. 315 - Rishab Goyal, Sam Kim, Brent Waters, David J. Wu:
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions. 316 - Archisman Ghosh, Debayan Das, Shreyas Sen:
Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure. 317 - Huijia Lin, Ji Luo:
Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL. 318 - Hayim Shaul, Dan Feldman, Daniela Rus:
Secure k-ish nearest neighbors classifier. 319 - Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu:
Universally Composable Relaxed Password Authenticated Key Exchange. 320 - Jose Maria Bermudo Mera, Furkan Turan, Angshuman Karmakar, Sujoy Sinha Roy, Ingrid Verbauwhede:
Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism. 321 - Andrew D. Loveless, Ronald G. Dreslinski, Baris Kasikci:
Optimal and Error-Free Multi-Valued Byzantine Consensus Through Parallel Execution. 322 - Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos:
A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol. 323 - Bicky Shakya, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
Defeating CAS-Unlock. 324 - Robert Muth, Florian Tschorsch:
SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts. 325 - John M. Schanck:
An upper bound on the decryption failure rate of static-key NewHope. 326 - Anita John, Rohit Lakra, Jimmy Jose:
On the design of stream ciphers with Cellular Automata having radius = 2. 327 - Simon Holmgaard Kamp, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi:
Leveraging Weight Functions for Optimistic Responsiveness in Blockchains. 328 - Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot:
Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields. 329 - Gil Segev, Ido Shahaf:
Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective. 330 - Sergey Agievich:
The CTR mode with encrypted nonces and its extension to AE. 331 - Vidal Attias, Luigi Vigneri, Vassil S. Dimitrov:
Implementation Study of Two Verifiable DelayFunctions. 332 - (Withdrawn) A Simpler and Modular Construction of Linkable Ring Signature. 333
- Christof Beierle, Gregor Leander:
4-Uniform Permutations with Null Nonlinearity. 334 - Yibin Xu, Yangyu Huang:
An n/2 byzantine node tolerated blockchain sharding approach. 335 - Santosh Ghosh, Michael E. Kounavis, Sergej Deutsch:
Gimli Encryption in 715.9 psec. 336 - Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter:
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography. 337 - Daniel Escudero, Satrajit Ghosh, Marcel Keller, Rahul Rachuri, Peter Scholl:
Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits. 338 - George Teseleanu:
Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics. 339 - Onur Günlü, Efe Bozkir, Wolfgang Fuhl, Rafael F. Schaefer, Enkelejda Kasneci:
Differential Privacy for Eye Tracking with Temporal Correlations. 340 - Daniel J. Bernstein, Luca De Feo, Antonin Leroux, Benjamin Smith:
Faster computation of isogenies of large prime degree. 341 - Estuardo Alpirez Bock, Alexander Treff:
Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge. 342 - Hiro Midas:
BSC: A Bitcoin Smart Contract Implementation. 343 - Yibin Xu, Yangyu Huang, Jianhua Shao:
Anchoring the Value of Cryptocurrency. 344 - Fengrong Zhang, Nastja Cepak, Enes Pasalic, Yongzhuang Wei:
Bent functions stemming from Maiorana-McFarland class being provably outside its completed version. 345 - Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang:
Algebraic Attacks on Round-Reduced Keccak/Xoodoo. 346 - Hongda Li, Peifang Ni, Dongxue Pan:
Some Low Round Zero Knowledge Protocols. 347 - Steve Thakur:
Constructing hidden order groups using genus three Jacobians. 348 - Siang Meng Sim:
Differential Power Analysis on (Non-)Linear Feedback Shift Registers. 349 - Murilo Coutinho, T. C. Souza Neto:
New Multi-bit Differentials to Improve Attacks Against ChaCha. 350 - Youssef El Housni, Aurore Guillevic:
Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition. 351 - Joseph Bonneau, Izaak Meckler, Vanishree Rao, Evan Shapiro:
Coda: Decentralized Cryptocurrency at Scale. 352 - Robert A. Threlfall:
A Probabilistic Public Key Encryption Scheme Based on Quartic Reciprocity (Draft V1.1). 353 - Rajitha Ranasinghe, Pabasara Athukorala:
A Generalization of the ElGamal public-key cryptosystem. 354 - Benjamin Terner:
Permissionless Consensus in the Resource Model. 355 - Martin Hirt, Marta Mularczyk:
Efficient MPC with a Mixed Adversary. 356 - George Teseleanu:
Quasigroups and Substitution Permutation Networks: A Failed Experiment. 357 - Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh:
Division Algorithm to search for monic irreducible polynomials over extended Galois Field GF(p^q). 358 - Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh:
4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes. 359 - Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh:
Composite Algorithm The New Algorithm to Search for Monic Irreducible Polynomials over Extended Galois Fields. 360 - Reza Azarderakhsh, David Jao, Brian Koziel, Jason T. LeGrow, Vladimir Soukharev, Oleg Taraskin:
How Not to Create an Isogeny-Based PAKE. 361 - (Withdrawn) Another Look at CBC Casper Consensus Protocol. 362
- Qianhong Wan, Longjiang Qu, Chao Li:
On equivalence between known polynomial APN functions and power APN functions. 363 - Behzad Abdolmaleki, Daniel Slamanig:
Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs. 364 - Sankhanil Dey, Amlan Chakrabarti, Ranjan Ghosh:
A New Algorithm to Find Monic Irreducible Polynomials over Extended Galois field GF prime p and extension q using Positional Arithmetic. 365 - Hangwei Lu, Dhwani Mehta, Olivia P. Paradis, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard:
FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection. 366 - Marcel Tiepelt, Jan-Pieter D'Anvers:
Exploiting Decryption Failures in Mersenne Number Cryptosystems. 367 - Dorian Amiet, Andreas Curiger, Lukas Leuenberger, Paul Zbinden:
Defeating NewHope with a Single Trace. 368 - David Knichel, Thorben Moos, Amir Moradi:
The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs. 369 - Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, Abhi Shelat:
Multiparty Generation of an RSA Modulus. 370 - Matthias J. Kannwischer, Peter Pessl, Robert Primas:
Single-Trace Attacks on Keccak. 371 - Claude Carlet:
Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions. 372 - Huanyu Wang, Elena Dubrova:
Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES. 373 - Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam, Ruihan Wang:
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority. 374 - Leonie Reichert, Samuel Brack, Björn Scheuermann:
Privacy-Preserving Contact Tracing of COVID-19 Patients. 375 - Sarah Bordage, Julien Lavauzelle:
On the privacy of a code-based single-server computational PIR scheme. 376 - Samuel Dittmer, Rafail Ostrovsky:
Oblivious tight compaction in O(n) time with smaller constant. 377 - Kaushik Nath, Palash Sarkar:
Efficient 4-way Vectorizations of the Montgomery Ladder. 378 - Andreas Hülsing, Kai-Chun Ning, Peter Schwabe, Florian Weber, Philip R. Zimmermann:
Post-quantum WireGuard. 379 - Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory. 380 - Leonard Kleinrock, Rafail Ostrovsky, Vassilis Zikas:
A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback. 381 - Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks
:
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection. 382 - Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez:
Parallel strategies for SIDH: Towards computing SIDH twice as fast. 383 - Quan Thoi Minh Nguyen:
A "Final" Security Bug. 384 - Peihan Miao, Sarvar Patel, Mariana Raykova, Karn Seth, Moti Yung:
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality. 385 - Ralf Küsters, Daniel Rausch, Mike Simon
:
Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric. 386 - Onur Günlü, Rafael F. Schaefer:
Low-complexity and Reliable Transforms for Physical Unclonable Functions. 387 - Hüseyin Hisil, Berkan Egrice, Mert Yassi:
Fast 4 way vectorized ladder for the complete set of Montgomery curves. 388 - Gideon Samid:
A One-Time-Pad Alternative: Mathematical Secrecy with one round of Transposition. 389 - Rémi Géraud-Stewart, David Naccache:
A French cipher from the late 19th century. 390 - Donghoe Heo, Suhri Kim, Kisoon Yoon, Youngho Park, Seokhie Hong:
Optimized CSIDH Implementation Using a 2-torsion Point. 391 - Sadegh Sadeghi, Nasour Bagheri:
An argument on the security of LRBC, a recently proposed lightweight block cipher. 392 - Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam:
LevioSA: Lightweight Secure Arithmetic Computation. 393 - Zvika Brakerski, Nico Döttling, Sanjam Garg
, Giulio Malavolta:
Candidate iO from Homomorphic Encryption Schemes. 394 - Marshall Ball
, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Cryptography from Information Loss. 395 - Donggeun Kwon, HeeSeok Kim, Seokhie Hong:
Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing. 396 - Seong Gyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Classification of 4-bit S-boxes for BOGI-permutation. 397 - Samuel Brack, Leonie Reichert, Björn Scheuermann:
Decentralized Contact Tracing Using a DHT and Blind Signatures. 398 - Serge Vaudenay:
Analysis of DP3T. 399 - Jeroen Delvaux:
Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis. 400 - Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss:
Mining for Privacy: How to Bootstrap a Snarky Blockchain. 401 - István András Seres, Péter Burcsi:
A Note on Low Order Assumptions in RSA groups. 402 - David Derler, Kai Samelin, Daniel Slamanig:
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes. 403 - Tassos Dimitriou:
From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards. 404 - Ralf Küsters, Julian Liedtke, Johannes Müller, Daniel Rausch, Andreas Vogt:
Ordinos: A Verifiable Tally-Hiding E-Voting System. 405 - Atsuki Momose, Jason Paul Cruz, Yuichi Kaji:
Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience. 406 - Aydin Abadi, Sotirios Terzis, Changyu Dong:
Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection. 407 - Nir Drucker, Shay Gueron:
Speed up over the Rainbow. 408 - Loïs Huguenin-Dumittan, Serge Vaudenay:
Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes. 409 - Hwajeong Seo, Mila Anastasova, Amir Jalali, Reza Azarderakhsh:
Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4. 410 - Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, Patrick Struck:
Secure Two-Party Computation in a Quantum World. 411 - Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin:
Fixslicing: A New GIFT Representation. 412 - Louis Goubin, Matthieu Rivain, Junwei Wang:
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks. 413 - Roy Radian, Or Sattath:
Semi-Quantum Money. 414 - Shweta Agrawal, Alice Pellet-Mary:
Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE. 415 - Mihir Bellare, Wei Dai:
The Multi-Base Discrete Logarithm Problem: Concrete Security Improvements for Schnorr Identification, Signatures and Multi-Signatures. 416 - Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez:
Optimal strategies for CSIDH. 417 - Krzysztof Pietrzak:
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing. 418 - Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang:
Pointproofs: Aggregating Proofs for Multiple Vector Commitments. 419 - Kenji Yasunaga:
Practical Card-Based Protocol for Three-Input Majority. 420 - (Withdrawn) Multichain-MWPoW: A p/2 Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture. 421
- Anis Bkakria, Nora Cuppens, Frédéric Cuppens:
Privacy-Preserving Pattern Matching on Encrypted Data. 422 - Yanyi Liu, Rafael Pass:
On One-way Functions and Kolmogorov Complexity. 423 - Samuel Jaques, André Schrottenloher:
Low-gate Quantum Golden Collision Finding. 424 - Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel:
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. 425 - Qiang Tang
:
Privacy-Preserving Contact Tracing: current solutions and open questions. 426 - Daniel Kales, Greg Zaverucha
:
Improving the Performance of the Picnic Signature Scheme. 427 - Yaron Gvili:
Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc. 428 - Alice Silverberg:
Mathematics and Cryptography: A Marriage of Convenience? 429 - Aram Jivanyan, Tigran Mamikonyan:
Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures. 430 - Geovandro C. C. F. Pereira, Javad Doliskani, David Jao:
x-only point addition formula and faster torsion basis generation in compressed SIKE. 431 - Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley:
From A to Z: Projective coordinates leakage in the wild. 432 - Martin Westerkamp, Jacob Eberhardt:
zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays. 433 - Sujoy Sinha Roy, Andrea Basso:
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware. 434 - Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit:
WAGE: An Authenticated Encryption with a Twist. 435 - Houssem Maghrebi:
Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification. 436 - Mike Hamburg:
Faster Montgomery and double-add ladders for short Weierstrass curves. 437 - Yin Li, Yu Zhang, Wei He:
Fast hybrid Karatsuba multiplier for Type II pentanomials. 438 - Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE. 439 - Hao Chen:
Sublattice Attacks on Ring-LWE with Wide Error Distributions I. 440 - Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. 441 - Alon Rosen:
Fine-Grained Cryptography: A New Frontier? 442 - Okan Seker, Thomas Eisenbarth, Maciej Liskiewicz:
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks. 443 - Sato Shinichi:
A modern signature scheme with message recovery: Abe-Okamoto signatures with EdDSA elements. 444 - Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai:
On Pseudorandom Encodings. 445 - Tim Fritzmann, Georg Sigl, Johanna Sepúlveda:
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography. 446 - (Withdrawn) Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey. 447
- Amir Jafari, Shahram Khazaei:
Partial Secret Sharing Schemes. 448 - Kristian L. McDonald:
Switched Threshold Signatures from K-Private PolyShamir Secret Sharing. 449 - Kristian L. McDonald:
The Landscape of Pointcheval-Sanders Signatures: Mapping to Polynomial-Based Signatures and Beyond. 450 - Hao Chen, Miran Kim, Ilya P. Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh:
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning. 451 - Amit Behera, Or Sattath:
Almost Public Coins. 452 - F. Betül Durak, Loïs Huguenin-Dumittan, Serge Vaudenay:
BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein. 453 - Thomas Pornin:
Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification. 454 - Daniel Apon, Ray A. Perlner, Angela Robinson, Paolo Santini:
Cryptanalysis of LEDAcrypt. 455 - Zhichun Lu, Runchao Han, Jiangshan Yu:
Bank run Payment Channel Networks. 456 - Ahmad Almorabea:
Cryptographic Scheme for analyzing protected files on Sandboxes and share them privately. 457 - Ittai Abraham, Kartik Nayak, Ling Ren, Nibesh Shrestha:
On the Optimality of Optimistic Responsiveness. 458 - Debdeep Mukhopadhyay:
Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations. 459 - Marloes Venema, Greg Alpár:
A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption. 460 - Jean-Sébastien Coron, Agnese Gini:
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem. 461 - Ido Shahaf, Or Ordentlich, Gil Segev:
An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption. 462 - Xiaoning Liu, Bang Wu, Xingliang Yuan, Xun Yi:
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge. 463 - Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Blockchain Keep a Secret? 464 - Pantea Kiaei, Patrick Schaumont
:
Domain-Oriented Masked Instruction Set Architecture for RISC-V. 465 - Pantea Kiaei, Darius Mercadier, Pierre-Évariste Dagand, Karine Heydemann, Patrick Schaumont
:
Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks. 466 - Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. 467 - Konstantinos Chalkias, Kevin Lewi, Payman Mohassel, Valeria Nikolaenko:
Distributed Auditing Proofs of Liabilities. 468 - Kari Kostiainen, Aritra Dhar, Srdjan Capkun:
Dedicated Security Chips in the Age of Secure Enclaves. 469 - Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stöttinger:
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4. 470 - Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
Interpose PUF can be PAC Learned. 471 - (Withdrawn) Bracing A Transaction DAG with A Backbone Chain. 472
- Ashutosh Kumar, Raghu Meka, David Zuckerman:
Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing. 473 - Karim Baghery, Mahdi Sedaghat:
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model. 474 - Zachary Zaccagni, Ram Dantu:
Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews. 475 - Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez
, Siavash Riahi:
Generalized Bitcoin-Compatible Channels. 476 - Essam Ghadafi:
Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More. 477 - Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li:
Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols. 478 - Tapas Pal, Ratna Dutta:
Puncturable Witness Pseudorandom Functions and its Applications on Witness Encryption. 479 - Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Applications. 480 - James You, Qi Zhang, Curtis D'Alves, Bill O'Farrell, Christopher Kumar Anand:
Using z14 Fused-Multiply-Add Instructions to Accelerate Elliptic Curve Cryptography. 481 - Haining Fan:
A Trace Based GF(2n) Inversion Algorithm. 482 - Reza Kaboli, Shahram Khazaei, Maghsoud Parviz:
On Ideal and Weakly-Ideal Access Structures. 483 - Aaqib Bashir Dar, Auqib Hamid Lone, Saniya Zahoor, Afshan Amin Khan, Roohie Naaz Mir:
Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions. 484 - Ruslan V. Skuratovskii:
Edwards curve points counting method and supersingular Edwards and Montgomery curves. 485 - Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers. 486 - Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger:
Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP. 487 - Yongwoo Lee, Joon-Woo Lee, Young-Sik Kim, Jong-Seon No:
Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption. 488 - Fraunhofer AISEC:
Pandemic Contact Tracing Apps: DP-3T, PEPP-PT NTK, and ROBERT from a Privacy Perspective. 489 - Thomas Haines, Johannes Müller:
SoK: Techniques for Verifiable Mix Nets. 490 - Hilder V. L. Pereira:
Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic. 491 - Ran Canetti, Nikolaos Makriyannis, Udi Peled:
UC Non-Interactive, Proactive, Threshold ECDSA. 492 - Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti:
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System. 493 - Rohit Chatterjee, Xiao Liang, Omkant Pandey:
Improved Black-Box Constructions of Composable Secure Computation. 494 - Kim Yong-Jin, Yong Ho Yon, Jong Yu-Jin, Li Ok-Chol:
Disperse rotation operator DRT and use in some stream ciphers. 495 - Demba Sow, Léo Robert, Pascal Lafourcade:
Linear Generalized ElGamal Encryption Scheme. 496 - Michele Ciampi, Yun Lu, Vassilis Zikas:
Collusion-Preserving Computation without a Mediator. 497 - Adam Gagol, Jedrzej Kula, Damian Straszak, Michal Swietek:
Threshold ECDSA for Decentralized Asset Custody. 498 - Benedikt Bünz, Alessandro Chiesa, Pratyush Mishra
, Nicholas Spooner:
Proof-Carrying Data from Accumulation Schemes. 499 - Lorenzo Grassi, Christian Rechberger, Markus Schofnegger:
Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Ciphers. 500 - Ivan Damgård, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergård:
Fast Threshold ECDSA with Honest Majority. 501 - Sijia Zhao, Donal O'Mahony:
Applying Blockchain Layer2 Technology to Mass E-Commerce. 502 - Aaron Hutchinson, Koray Karabina:
A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder. 503 - Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song:
Storing and Retrieving Secrets on a Blockchain. 504 - Wasilij Beskorovajnov, Felix Dörre, Gunnar Hartung, Alexander Koch
, Jörn Müller-Quade, Thorsten Strufe:
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized - Decentralized Divide for Stronger Privacy. 505 - Sonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff:
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations. 506 - Victoria Vysotskaya:
Characteristics of Hadamard square of Reed-Muller subcodes of special type (Extended abstract). 507 - Yuan Yao, Michael Tunstall, Elke De Mulder, Anton Kochepasov, Patrick Schaumont:
Augmenting Leakage Detection using Bootstrapping. 508 - Avijit Dutta, Mridul Nandi:
BBB Secure Nonce Based MAC Using Public Permutations. 509 - Nir Drucker, Shay Gueron, Dusan Kostic, Edoardo Persichetti:
On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM. 510 - Iurii Shyshatsky, Vinod Manoharan, Taras Emelyanenko, Lucas Leger:
JaxNet: Scalable Blockchain Network. 511 - Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra:
Glimpses are Forever in RC4 amidst the Spectre of Biases. 512 - Myrto Arapinis, Nikolaos Lamprou, Lenka Mareková, Thomas Zacharias:
E-cclesia: Universally Composable Self-Tallying Elections. 513 - Michael Scott:
On the Deployment of curve based cryptography for the Internet of Things. 514 - Thomas Espitau, Antoine Joux, Natalia Kharchenko:
On a hybrid approach to solve binary-LWE. 515 - Mordechai Guri:
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers. 516 - Thomas Attema, Vadim Lyubashevsky, Gregor Seiler:
Practical Product Proofs for Lattice Commitments. 517 - Muhammed F. Esgin, Ngoc Khanh Nguyen
, Gregor Seiler:
Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings. 518 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang:
Design & Analysis of Optimal Coin-tossing: New Techniques. 519 - Yarkin Doröz, Jeffrey Hoffstein, Joseph H. Silverman, Berk Sunar:
MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation. 520 - Marcel Keller:
MP-SPDZ: A Versatile Framework for Multi-Party Computation. 521 - Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch:
Aggregated Private Information Retrieval: A First Practical Implementation to Support Large-Scale Disease Analytics. 522 - Tomer Ashur, Raluca Posteuca, Danilo Sijacic, Stef D'haeseleer:
The Strictly Zero-Correlation Attack with Application to the Full DES. 523 - Balthazar Bauer, Georg Fuchsbauer:
Efficient Signatures on Randomizable Ciphertexts. 524 - Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira:
Account Management in Proof of Stake Ledgers. 525 - Robert Drylo, Tomasz Kijko, Michal Wronski:
Efficient Montgomery-like formulas for general Huff's and Huff's elliptic curves and their applications to the isogeny-based cryptography. 526 - Alin Tomescu, Ittai Abraham, Vitalik Buterin, Justin Drake, Dankrad Feist, Dmitry Khovratovich:
Aggregatable Subvector Commitments for Stateless Cryptocurrencies. 527 - Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li:
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. 528 - Moni Naor, Shahar Paz, Eyal Ronen:
CRISP: Compromise Resilient Identity-based Symmetric PAKE. 529 - Mathias Soeken:
Determining the Multiplicative Complexity of Boolean Functions using SAT. 530 - Serge Vaudenay:
Centralized or Decentralized? The Contact Tracing Dilemma. 531 - Dominik Harz, Lewis Gudgeon, Rami Khalil, Alexei Zamyatin:
Promise: Leveraging Future Gains for Collateral Reduction. 532 - Foteini Baldimtsi, Varun Madathil, Alessandra Scafuro, Linfeng Zhou:
Anonymous Lottery in the Proof-of-Stake Setting. 533 - Peter Schwabe, Douglas Stebila, Thom Wiggers:
Post-quantum TLS without handshake signatures. 534 - Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu:
Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions. 535 - Carlos Cid, Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Higher-Order Differentials of Ciphers with Low-Degree S-Boxes. 536 - Carsten Baum, Bernardo David, Rafael Dowsley, Jesper Buus Nielsen, Sabine Oechsner:
TARDIS: Time And Relative Delays In Simulation. 537 - Liliya Kraleva, Tomer Ashur, Vincent Rijmen:
Rotational Cryptanalysis on MAC Algorithm Chaskey. 538 - Hao Chen, Lynn Chua, Kristin E. Lauter, Yongsoo Song:
On the Concrete Security of LWE with Small Secret. 539 - Rosario Gennaro, Steven Goldfeder:
One Round Threshold ECDSA with Identifiable Abort. 540 - Benjamin Dowling, Britta Hale:
There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging. 541 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation. 542 - Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss:
Kachina - Foundations of Private Smart Contracts. 543 - Okan Seker, Sebastian Berndt, Thomas Eisenbarth:
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis. 544 - Ran Canetti, Pratik Sarkar, Xiao Wang:
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security. 545 - Xin An, Kai Hu, Meiqin Wang:
MixColumns Coefficient Property and Security of the AES with A Secret S-Box. 546 - Kai Hu, Qingju Wang, Meiqin Wang:
Finding Bit-Based Division Property for Ciphers with Complex Linear Layer. 547 - Gary Yu:
Blockchain Stealth Address Schemes. 548 - Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay:
Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks. 549 - Ruiyu Zhu, Changchang Ding, Yan Huang:
Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation. 550 - Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko:
Higher Order Differential Attack against Full-Round BIG. 551 - Joon-Woo Lee, Eunsang Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No:
Optimal Minimax Polynomial Approximation of Modular Reduction for Bootstrapping of Approximate Homomorphic Encryption. 552 - Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang:
Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT. 553 - Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez
, Siavash Riahi:
Bitcoin-Compatible Virtual Channels. 554 - Lisa Eckey, Sebastian Faust, Kristina Hostáková, Stefanie Roos:
Splitting Payments Locally While Routing Interdimensionally. 555 - Jean-Claude Caraco, Rémi Géraud-Stewart, David Naccache:
Kerckhoffs' Legacy. 556 - Lilya Budaghyan, Nikolay S. Kaleyski, Constanza Riera, Pantelimon Stanica:
On the sensitivity of some APN permutations to swapping points. 557 - Bijan Fadaeinia, Thorben Moos, Amir Moradi:
BSPL: Balanced Static Power Logic. 558 - Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen, Aysajan Abidin, Mustafa A. Mustafa:
Striking the Balance: Effective yet Privacy Friendly Contact Tracing. 559 - Alexander Chepurnoy, Amitabh Saxena:
ZeroJoin: Combining ZeroCoin and CoinJoin. 560 - Fukang Liu, Takanori Isobe, Willi Meier:
Exploiting Weak Diffusion of Gimli: A Full-Round Distinguisher and Reduced-Round Preimage Attacks. 561 - Hocheol Shin, Juhwan Noh, Dohyun Kim, Yongdae Kim:
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure. 562 - Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Shafi Goldwasser:
Secure large-scale genome-wide association studies using homomorphic encryption. 563 - Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver:
Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security. 564 - Jinkyu Cho, Young-Sik Kim, Jong-Seon No:
Homomorphic Computation in Reed-Muller Codes. 565 - Auqib Hamid Lone, Roohie Naaz Mir:
Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain. 566 - Yi Liu, Qi Wang, Siu-Ming Yiu:
An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster. 567 - Tomer Ashur, Siemen Dhooghe:
Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy). 568 - Carla Ràfols, Javier Silva:
QA-NIZK Arguments of Same Opening for Bilateral Commitments. 569 - Dusan Bozilov:
On Optimality of d + 1 TI Shared Functions of 8 Bits or Less. 570 - Anubhab Baksi, Jakub Breier, Xiaoyang Dong, Yi Chen:
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers. 571 - Marina Polubelova, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche, Aymeric Fromherz, Natalia Kulatova, Santiago Zanella-Béguelin:
HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms). 572 - Christopher Patton, Thomas Shrimpton:
Quantifying the Security Cost of Migrating Protocols to Practice. 573 - Ming Li, Anjia Yang, Xinkai Chen:
Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization. 574 - Sanjit Chatterjee, R. Kabaleeshwaran:
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption. 575 - Yuval Ishai:
How Low Can We Go? 576 - Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu:
Inner-Product Functional Encryption with Fine-Grained Access Control. 577 - Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. 578 - Darrow R. Hartman:
BitFund: A Benevolent Blockchain Funding Network. 579 - Alexei Zamyatin, Zeta Avarikioti, Daniel Perez, William J. Knottenbelt:
TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation. 580 - Benny Applebaum, Eliran Kachlon, Arpita Patra:
The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency. 581 - Archanaa S. Krishnan, Yaling Yang, Patrick Schaumont:
Risk and Architecture factors in Digital Exposure Notification. 582 - Zhijie Xie, Min Zhang, Anqi Yin, Zhenhan Li:
A New Targeted Password Guessing Model. 583 - Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh:
vCNN: Verifiable Convolutional Neural Network. 584 - Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi:
Improving Key Mismatch Attack on NewHope with Fewer Queries. 585 - Ellie Daw:
Component-Based Comparison of Privacy-First Exposure Notification Protocols. 586 - Syh-Yuan Tan, Thomas Gross:
MoniPoly - An Expressive q-SDH-Based Anonymous Attribute-Based Credential System. 587 - ZaHyun Koo, Jong-Seon No, Young-Sik Kim:
Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS. 588 - Mykhaylo Kasianchuk, Mikolaj P. Karpinski, Roman V. Kochan, Volodymyr Karpinskyi, Grzegorz Litawa, Inna Shylinska, Igor Yakymenko:
Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity. 589 - Jun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas:
Expected Constant Round Byzantine Broadcast under Dishonest Majority. 590 - Fukang Liu, Takanori Isobe, Willi Meier:
Automatic Verification of Differential Characteristics: Application to Reduced Gimli. 591 - Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh:
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. 592 - Claire Ye, Chinedu Ojukwu, Anthony Hsu, Ruiqi Hu:
Alt-Coin Traceability. 593 - Jean-François Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini:
LESS is More: Code-Based Signatures without Syndromes. 594 - Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption. 595 - Tore Vincent Carstens, Ehsan Ebrahimi
, Gelo Noel Tabia, Dominique Unruh:
On quantum indistinguishability under chosen plaintext attack. 596 - Kalle Ngo, Elena Dubrova, Michail Moraitis:
Bitstream Modification of Trivium. 597 - Alex Biryukov, Aleksei Udovenko, Giuseppe Vitto:
Cryptanalysis of Au et al. Dynamic Universal Accumulator. 598 - Prasad Buddhavarapu, Andrew Knox, Payman Mohassel, Shubho Sengupta, Erik Taubeneck, Vlad Vlaskin:
Private Matching for Compute. 599 - Saikrishna Badrinarayanan, Peihan Miao, Peter Rindal:
Multi-Party Threshold Private Set Intersection with Sublinear Communication. 600 - Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni:
Everything is a Race and Nakamoto Always Wins. 601 - Arghya Bhattacharjee, Avijit Dutta, Eik List, Mridul Nandi:
CENCPP - Beyond-birthday-secure Encryption from Public Permutations. 602 - Gilles Barthe, Marc Gourjon, Benjamin Grégoire, Maximilian Orlt, Clara Paglialonga, Lars Porth:
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification. 603 - T.-H. Hubert Chan, Wei-Kai Lin, Kartik Nayak, Elaine Shi:
Perfectly Secure Oblivious Parallel RAM with O(log3 N/ log log N) Overhead. 604 - Artur Mariano:
LUSA: the HPC library for lattice-based cryptanalysis. 605 - Navid Alamati, Hart Montgomery, Sikhar Patranabis:
Ring Key-Homomorphic Weak PRFs and Applications. 606 - Andrea Caforio, Fatih Balli, Subhadeep Banik:
Energy Analysis of Lightweight AEAD Circuits. 607 - Fatih Balli, Andrea Caforio, Subhadeep Banik:
Low-latency Meets Low-area: An Improved Bit-Sliding Technique for AES, SKINNY and GIFT. 608 - Behnaz Rezvani, Thomas Conroy, Luke Beckwith, Matthew Bozzay, Trevor Laffoon, David McFeeters, Yijia Shi, Minh Vu, William Diehl:
Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers. 609 - (Withdrawn) Stronger Multilinear Maps from Indistinguishability Obfuscation. 610
- Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Efficient and Fast Hardware Architectures for SIKE Round 2 on FPGA. 611 - Jeroen Pijnenburg, Bertram Poettering:
Key Assignment Schemes with Authenticated Encryption, revisited. 612 - Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi:
SiGamal: A supersingular isogeny-based PKE and its application to a PRF. 613 - Amit Deo, Benoît Libert, Khoa Nguyen, Olivier Sanders:
Lattice-Based E-Cash, Revisited. 614 - Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom:
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage. 615 - Sanjam Garg
, Romain Gay, Mohammad Hajiabadi:
Master-Key KDM-Secure IBE from Pairings. 616 - Rachit Garg, George Lu, Brent Waters:
New Techniques in Replica Encodings with Client Setup. 617 - Ivan Damgård, Sophia Yakoubov:
Bounds on Ad Hoc Threshold Encryption. 618 - Viet Tung Hoang, Yaobin Shen:
Security Analysis of NIST CTR-DRBG. 619 - Ben Kreuter, Sarvar Patel, Ben Terner:
Private Identity Agreement for Private Set Functionalities. 620 - Junbin Fang, Dominique Unruh, Jian Weng, Jun Yan, Dehua Zhou:
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment? 621 - Yao Jiang:
The Direction of Updatable Encryption does not Matter Much. 622 - Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim:
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions. 623 - Marek Wójtowicz:
RSA for poor men: a cryptosystem based on probable primes to base 2 numbers. 624 - Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain:
Probability theory and public-key cryptography. 625 - Paolo Zappalà, Marianna Belotti, Maria Potop-Butucaru, Stefano Secci:
Game theoretical framework for analyzing Blockchains Robustness. 626 - Duke Leto, The Hush Developers:
Attacking Zcash For Fun And Profit. 627 - Daniele Di Tullio, Manoj Gyawali:
A post-quantum key exchange protocol from the intersection of quadric surfaces. 628 - Vivek Arte, Mihir Bellare:
Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer. 629 - Zhiguo Wan, Xiaotong Liu:
ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy. 630 - Jean-Sébastien Coron, Luca Notarnicola, Gabor Wiese:
Simultaneous Diagonalization of Incomplete Matrices and Applications. 631 - Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri:
Proposing an MILP-based Method for the Experimental Verification of Difference Trails. 632 - Péter Kutas, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange:
Weak instances of SIDH variants under improved torsion-point attacks. 633 - David Knichel, Pascal Sasdrich, Amir Moradi:
SILVER - Statistical Independence and Leakage Verification. 634 - Pedro Branco, Nico Döttling, Paulo Mateus:
Two-Round Oblivious Linear Evaluation from Learning with Errors. 635 - Erik-Oliver Blass, Florian Kerschbaum:
Mixed-Technique, Maliciously-Secure, and Composed Multi-Party Computations. 636 - (Withdrawn) DABANGG: Time for Fearless Flush based Cache Attacks. 637
- Jeffrey Burdges, Luca De Feo:
Delay Encryption. 638 - Anne Broadbent, Raza Ali Kazmi:
Indistinguishability obfuscation for quantum circuits of low T-count. 639 - Kyungbae Jang, Seungjoo Choi, Hyeokdong Kwon, Hwajeong Seo:
Grover on SPECK: Quantum Resource Estimates. 640 - Jeff Burdges, Alfonso Cevallos, Peter Czaban, Rob Habermeier, Syed Hosseini, Fabio Lama, Handan Kilinç Alper, Ximin Luo, Fatemeh Shirazi, Alistair Stewart, Gavin Wood:
Overview of Polkadot and its Design Considerations. 641 - Henri Aare, Peter Vitols:
The Ritva Blockchain: Enabling Confidential Transactions at Scale. 642 - Pascal Lafourcade, Marius Lombard-Platet:
About Blockchain Interoperability. 643 - Ignacio Cascudo, Bernardo David:
ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing. 644 - Liliya Kraleva, Nikolai L. Manev, Vincent Rijmen:
Correlation distribution analysis of a two-round key-alternating block cipher. 645 - Ward Beullens, Shuichi Katsumata, Federico Pintore:
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices. 646 - Saeid Esmaeilzade, Ziba Eslami, Nasrollah Pakniat:
A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes. 647 - Yuncong Hu, Sam Kumar, Raluca Ada Popa:
Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust. 648 - Fuyuki Kitagawa, Takahiro Matsuda, Takashi Yamakawa:
NIZK from SNARG. 649 - Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead. 650 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis of "FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things". 651 - Prastudy Fauzi, Helger Lipmaa, Zaira Pindado, Janno Siim:
Somewhere Statistically Binding Commitment Schemes with Applications. 652 - Zhen Hang Jiang, Yunsi Fei, Aidong Adam Ding, Thomas Wahl:
MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation. 653 - Eli Ben-Sasson, Dan Carmon, Yuval Ishai, Swastik Kopparty, Shubhangi Saraf:
Proximity Gaps for Reed-Solomon Codes. 654 - Yoo-Seung Won, Dirmanto Jap, Shivam Bhasin:
Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel. 655 - Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi:
On Length Independent Security Bounds for the PMAC Family. 656 - Chloé Hébant, David Pointcheval:
Traceable Attribute-Based Anonymous Credentials. 657 - Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Signatures. 658 - Alexander Maximov, Martin Hell:
Software Evaluation of Grain-128AEAD for Embedded Platforms. 659 - Jing Tian, Piaoyang Wang, Zhe Liu, Jun Lin, Zhongfeng Wang, Johann Großschädl:
Faster Software Implementation of the SIKE Protocol Based on A New Data Representation. 660 - Peter Gazi, Aggelos Kiayias, Alexander Russell:
Tight Consistency Bounds for Bitcoin. 661 - John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui:
Multi-Party Computation Mechanism for Anonymous Equity Block Trading: A Secure Implementation of Turquoise Plato Uncross. 662 - Wei Dai, Stefano Tessaro, Xihu Zhang:
Super-Linear Time-Memory Trade-Offs for Symmetric Encryption. 663 - Amos Beimel, Oriol Farràs:
The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs. 664 - Jean-Claude Bajard, Sylvain Duquesne:
Montgomery-friendly primes and applications to cryptography. 665 - Chao Sun, Mehdi Tibouchi, Masayuki Abe:
Revisiting the Hardness of Binary Error LWE. 666 - Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan:
New Results on the SymSum Distinguisher on Round-Reduced SHA3. 667 - Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michal Zajac:
On Subversion-Resistant SNARKs. 668 - Avijit Dutta, Mridul Nandi, Abishanka Saha:
Proof of Mirror Theory for $\xi_{\max}=2$. 669 - Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo:
Inverse-Sybil Attacks in Automated Contact Tracing. 670 - Sébastien Carré, Sylvain Guilley, Olivier Rioul:
Persistent Fault Analysis With Few Encryptions. 671 - Leonie Reichert, Samuel Brack, Björn Scheuermann:
A Survey of Automatic Contact Tracing Approaches. 672 - Wenbo Mao, Wenxiang Wang:
LotMint: Blockchain Returning to Decentralization with Decentralized Clock. 673 - Chiara Spadafora, Riccardo Longo, Massimiliano Sala:
Coercion-Resistant Blockchain-Based E-Voting Protocol. 674 - Matthias Fitzi, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Ledger Combiners for Fast Settlement. 675 - Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon:
An airdrop that preserves recipient privacy. 676 - T.-H. Hubert Chan, Naomi Ephraim, Antonio Marcedone, Andrew Morgan, Rafael Pass, Elaine Shi:
Blockchain with Varying Number of Players. 677 - Alexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov:
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures. 678 - Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis:
BETA: Biometric Enabled Threshold Authentication. 679 - Sumanta Sarkar, Yu Sasaki, Siang Meng Sim:
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition. 680 - Vittorio Zaccaria:
An F-algebra for analysing information leaks in the presence of glitches. 681 - Patrick Towa, Damien Vergnaud:
Succinct Diophantine-Satisfiability Arguments. 682 - Abida Haque, Stephan Krenn, Daniel Slamanig, Christoph Striecks
:
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model. 683 - Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete
:
Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE). 684 - Leo de Castro, Chiraag Juvekar, Vinod Vaikuntanathan:
Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors. 685 - Chintan Patel, Nishant Doshi:
A Level Dependent Authentication for IoT Paradigm. 686 - Dror Chawin, Iftach Haitner, Noam Mazor:
Lower Bounds on the Time/Memory Tradeoff of Function Inversion. 687 - Anton A. Sokolov:
Lin2-Xor Lemma and Log-size Linkable Ring Signature. 688 - Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle:
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64. 689 - Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni:
SAFE: A Secure and Efficient Long-Term Distributed Storage System. 690 - Diego F. Aranha, Anders P. K. Dalskov, Daniel Escudero, Claudio Orlandi:
LSS Homomorphisms and Applications to Secure Signatures, Proactive Secret Sharing and Input Certification. 691 - Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger:
Optimizing Inner Product Masking Scheme by A Coding Theory Approach. 692 - Kai-Min Chung, Siyao Guo, Qipeng Liu, Luowen Qian:
Tight Quantum Time-Space Tradeoffs for Function Inversion. 693 - Thomas Espitau, Paul Kirchner:
The nearest-colattice algorithm. 694 - Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:
Collusion Resistant Watermarkable PRFs from Standard Assumptions. 695 - Yin Li, Yu Zhang:
An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials. 696 - Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, Paul Zimmermann:
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment. 697 - (Withdrawn) Forgery attack on the authentication encryption GIFT-COFB. 698
- Lauren De Meyer:
Looking at the NIST Lightweight Candidates from a Masking Point-of-View. 699 - Vladimir Belsky, Ilia Gerasimov, Kirill Tsaregorodtsev, Ivan Chizhov:
Personal data exchange protocol: X. 700 - Bar Alon, Eran Omri, Anat Paskin-Cherniavsky:
MPC with Friends and Foes. 701 - Ray A. Perlner, Daniel Smith-Tone:
Rainbow Band Separation is Better than we Thought. 702 - Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi:
New Complexity Estimation on the Rainbow-Band-Separation Attack. 703 - James Bell, Kallista A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova:
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead. 704 - Ingo Czerwinski:
On the minimal value set size of APN functions. 705 - Eleonora Testa, Mathias Soeken, Heinz Riener, Luca G. Amarù, Giovanni De Micheli:
A Logic Synthesis Toolbox for Reducing the Multiplicative Complexity in Logic Networks. 706 - Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen:
Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)). 707 - Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov:
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations. 708 - Elizabeth C. Crites, Mary Maller, Sarah Meiklejohn, Rebekah Mercer:
Reputable List Curation from Decentralized Voting. 709 - Yackolley Amoussou-Guenou, Bruno Biais, Maria Potop-Butucaru, Sara Tucci Piergiovanni:
Rational Behavior in Committee-Based Blockchains. 710 - Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation. 711 - Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng:
Anonymous IBE From Quadratic Residue With Fast Encryption. 712 - Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism. 713 - Naty Peter, Rotem Tsabary, Hoeteck Wee:
One-One Constrained Pseudorandom Functions. 714 - Sergij V. Goncharov:
On (impracticality of) transfinite symmetric encryption with keys smaller than messages under GCH. 715 - Takeshi Sugawara, Tatsuya Onuma, Yang Li:
Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function. 716 - Anubhab Baksi, Santanu Sarkar, Akhilesh Siddhanti, Ravi Anand, Anupam Chattopadhyay:
Fault Location Identification By Machine Learning. 717 - Marc Fischlin, Felix Günther, Christian Janson:
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3. 718 - Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes. 719 - Sihem Mesnager, Chunming Tang:
Fast algebraic immunity of Boolean functions and LCD codes. 720 - Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame:
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference. 721 - Yehuda Afek, Anat Bremler-Barr, Lior Shafir:
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. 722 - Suyash Bagad, Saravanan Vijayakumaran:
On the Confidentiality of Amounts in Grin. 723 - Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch:
Multi-Party Revocation in Sovrin: Performance through Distributed Trust. 724 - Gianluca Brian, Antonio Faonio
, Maciej Obremski, Mark Simkin, Daniele Venturi:
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model. 725 - Denis Diemert, Tibor Jager:
On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments. 726 - Adrián Ranea, Yunwen Liu, Tomer Ashur:
An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers. 727 - Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sýs:
Minerva: The curse of ECDSA nonces. 728 - Melissa Chase, Peihan Miao:
Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF. 729 - Jonathan Katz, Julian Loss, Jiayu Xu:
On the Security of Time-Locked Puzzles and Timed Commitments. 730 - Yusuke Naito:
The Exact Security of PMAC with Three Powering-Up Masks. 731 - Mojtaba Rafiee, Shahram Khazaei:
Security of Multi-Adjustable Join Schemes: Separations and Implications. 732 - Michiel Van Beirendonck, Jan-Pieter D'Anvers, Angshuman Karmakar, Josep Balasch, Ingrid Verbauwhede:
A Side-Channel Resistant Implementation of SABER. 733