


default search action
IACR Cryptology ePrint Archive, Volume 2021
Volume 2021, 2021
- Michel Abdalla, David Pointcheval, Azam Soleimanian:

2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product. 1 - Dingfeng Ye:

Can Lattice Signature be as Efficient as Lattice Encryption? 2 - Mahdi Mahdavi Oliaee, Zahra Ahmadian:

Ciphertext Policy Attribute Based Encryption for Arithmetic circuits. 3 - Ismail San:

LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions. 4 - Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu:

Aggregatable Distributed Key Generation. 5 - Wyatt Howe

, Andrei Lapets:
Privacy-Preserving Privacy Profile Proposal Protocol. 6 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Cheng-Yi Lee:

Notes on a lattice-based proxy-oriented identity-based encryption with keyword search. 7 - M. R. Mirzaee Shamsabad, Seyed Mojtaba Dehnavi:

A Family of Nonlinear MDS Diffusion Layers over 픽24n. 8 - Julia Khamis, Ori Rottenstreich:

Demand-aware Channel Topologies for Off-chain Blockchain Payments. 9 - Seyit Camtepe, Jarek Duda, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski, Josef Pieprzyk:

Compcrypt - Lightweight ANS-based Compression and Encryption. 10 - Kwang Ho Kim, Jong Hyok Choe, Sihem Mesnager:

Complete solution over $\GF{p^n}$ of the equation Xpk+1+X+a=0. 11 - Enric Florit, Benjamin Smith:

Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph. 12 - Enric Florit, Benjamin Smith:

An atlas of the Richelot isogeny graph. 13 - (Withdrawn) Efficient Multilinear Map from Graded Encoding Scheme. 14

- Macarena C. Martínez-Rodríguez

, Ignacio M. Delgado-Lozano, Billy Bob Brumley:
SoK: Remote Power Analysis. 15 - Geoffroy Couteau, Pooya Farshim, Mohammad Mahmoody:

Black-Box Uselessness: Composing Separations in Cryptography. 16 - Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:

Lightweight Techniques for Private Heavy Hitters. 17 - Yuhao Yang, Xiujie Huang:

Comments on "On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment". 18 - Kaushik Nath, Palash Sarkar:

Kummer versus Montgomery Face-off over Prime Order Fields. 19 - Stéphanie Delaune, Patrick Derbez

, Mathieu Vavrille:
Catching the Fastest Boomerangs - Application to SKINNY. 20 - Patrick Derbez

, Pierre-Alain Fouque, Victor Mollimard:
Fake Near Collisions Attacks. 21 - Patrick Derbez

, Pierre-Alain Fouque:
Increasing Precision of Division Property. 22 - Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Andreas Kern, Walid Fdhila:

What is Meant by Permissionless Blockchains? 23 - Pedro Hecht:

PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System. 24 - Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni:

FLGUARD: Secure and Private Federated Learning. 25 - Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Yann Connan, Philippe Gaborit:

A Gapless Code-Based Hash Proof System based on RQC and its Applications. 26 - Sfirnaciuc Emilia, Vasilescu Miruna-Elena, Emil Simion:

E-voting protocols in context of COVID19. 27 - Victor Lomné, Thomas Roche:

A Side Journey to Titan. 28 - Thomas Schneider, Oleksandr Tkachenko:

EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs. 29 - Jonathan Lee, Srinath T. V. Setty, Justin Thaler, Riad S. Wahby:

Linear-time zero-knowledge SNARKs for R1CS. 30 - Alexandru-Stefan Gheorghies, Darius-Marian Lazaroi, Emil Simion:

A Comparative Study of Cryptographic Key Distribution Protocols. 31 - Pouriya Alikhani, Nicolas Brunner, Claude Crépeau, Sébastien Designolle, Raphaël Houlmann, Weixu Shi, Hugo Zbinden:

Experimental relativistic zero-knowledge proofs. 32 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:

Quantum-resistant Anonymous IBE with Traceable Identities. 33 - Nishanth Chandran, Divya Gupta, Akash Shah:

Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF. 34 - Ori Rottenstreich:

Sketches for Blockchains. 35 - Niluka Amarasinghe, Xavier Boyen, Matthew McKague:

The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration. 36 - Aein Rezaei Shahmirzadi, Dusan Bozilov, Amir Moradi:

New First-Order Secure AES Performance Records. 37 - Luke Champine:

Streaming Merkle Proofs within Binary Numeral Trees. 38 - Jung Hee Cheon, Yongha Son, Donggeon Yhee:

Practical FHE parameters against lattice attacks. 39 - Any Muanalifah, Sergei Sergeev:

On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product. 40 - Panos Kampanakis, Peter Panburana, Michael Curcio, Chirag Shroff, Md. Mahbub Alam:

Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot. 41 - Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu:

Correcting Subverted Random Oracles. 42 - Madhurima Mukhopadhyay, Palash Sarkar:

Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields. 43 - Ishtiyaque Ahmad, Yuntian Yang, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta:

Aloha: Metadata-private voice communication over fully untrusted infrastructure. 44 - Alberto Ibarrondo, Hervé Chabanne, Melek Önen:

Banners: Binarized Neural Networks with Replicated Secret Sharing. 45 - Jose Maria Bermudo Mera, Angshuman Karmakar, Tilen Marc, Azam Soleimanian:

Efficient Lattice-Based Inner-Product Functional Encryption. 46 - Misni Harjo Suwito, Yoshifumi Ueshige, Kouichi Sakurai:

Evolution of Bulletin Board & its application to E-Voting - A Survey. 47 - Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park:

Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution. 48 - Mark D. Aagaard, Nusa Zidaric:

ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: (Preliminary Results). 49 - Joshua Deaton, Jintai Ding:

The Distinguishing Attack on HFE. 50 - Jintai Ding, Zheng Zhang, Joshua Deaton:

How Much can F5 Really Do. 51 - Rémi Géraud-Stewart, David Naccache:

Elementary Attestation of Cryptographically Useful Composite Moduli. 52 - Madalina Bolboceanu, Zvika Brakerski, Devika Sharma:

On Algebraic Embedding for Unstructured Lattices. 53 - David W. Archer, Shahla Atapoor, Nigel P. Smart:

The Cost of IEEE Arithmetic in Secure Computation. 54 - Jan Sebastian Götte, Björn Scheuermann:

Tech Report: Inerial HSMs Thwart Advanced Physical Attacks. 55 - Zhongfeng Niu:

The Study of Modulo 2n. 56 - Tamer Mour:

Correlation Intractability vs. One-wayness. 57 - Peter Kietzmann, Lena Boeckmann, Leandro Lanzieri, Thomas C. Schmidt, Matthias Wählisch:

A Performance Study of Crypto-Hardware in the Low-end IoT. 58 - Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter:

On the Cost of Adaptivity in Graph-Based Games. 59 - Ran Canetti, Rosario Gennaro, Steven Goldfeder, Nikolaos Makriyannis, Udi Peled:

UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts. 60 - Stefan Maftei, Marius Supuran, Emil Simion:

A Note on IBE Performance of a Practical Application. 61 - Dominique Unruh:

Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3). 62 - Monir Azraoui, Solenn Brunet, Sébastien Canard, Aïda Diop, Lélia Eveillard, Alicia Filipiak, Adel Hamdi, Flavie Misarsky, Donald Nokam Kuate, Marie Paindavoine, Quentin Santos, Bastien Vialla:

CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing. 63 - Peter Pessl, Lukas Prokop:

Fault Attacks on CCA-secure Lattice KEMs. 64 - Dorin-Marian Ionita, Emil Simion:

FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves. 65 - Mohamed Fadl Idris, Je Sen Teh, Jasy Liew Suet Yan, Wei-Zhu Yeoh:

A Deep Learning Approach for Active S-box Prediction of Lightweight Block Ciphers. 66 - Michiel Van Beirendonck, Jan-Pieter D'Anvers, Ingrid Verbauwhede:

Analysis and Comparison of Table-based Arithmetic to Boolean Masking. 67 - Carsten Baum, Cyprien Delpech de Saint Guilhem, Daniel Kales, Emmanuela Orsini, Peter Scholl, Greg Zaverucha

:
Banquet: Short and Fast Signatures from AES. 68 - Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha:

Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation. 69 - Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann

:
Secure, Accurate, and Practical Narrow-Band Ranging System. 70 - Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek:

Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis. 71 - Servio Paguada, Lejla Batina, Igor Armendariz:

Toward Practical Autoencoder-based Side-Channel Analysis Evaluations. 72 - Michal Wronski:

Application of Velusqrt algorithm to Huff's and general Huff's curves. 73 - Mahdi Sedaghat, Bart Preneel:

Cross-Domain Attribute-Based Access Control Encryption. 74 - Kamil Otal:

A Generalization of the Subfield Construction. 75 - Kang Yang, Pratik Sarkar, Chenkai Weng, Xiao Wang:

QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field. 76 - Rémi Géraud-Stewart, David Naccache:

Magnetic RSA. 77 - Nikolaj I. Schwartzbach:

An Incentive-Compatible Smart Contract for Decentralized Commerce. 78 - Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson:

A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM. 79 - Jan-Pieter D'Anvers, Emmanuela Orsini, Frederik Vercauteren:

Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption. 80 - Hendrik Waldner, Tilen Marc, Miha Stopar, Michel Abdalla:

Private Stream Aggregation from Labeled Secret Sharing Schemes. 81 - Jaskaran V. Singh, Nicholas Hopper:

Grades of Trust in Multiparty Computation. 82 - Michael Troncoso, Britta Hale:

The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol. 83 - Gilles Macario-Rat, Jacques Patarin:

Ariadne Thread and Salt: New Multivariate Cryptographic Schemes with Public Keys in Degree 3. 84 - Suhri Kim:

Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves. 85 - Mic Bowman, Debajyoti Das, Avradip Mandal, Hart Montgomery:

On Elapsed Time Consensus Protocols. 86 - Boyuan Feng, Lianke Qin, Zhenfei Zhang, Yufei Ding, Shumo Chu:

ZEN: Efficient Zero-Knowledge Proofs for Neural Networks. 87 - Marc Fischlin, Arno Mittelbach:

An Overview of the Hybrid Argument. 88 - Gabrielle Beck, Julia Len, Ian Miers, Matthew Green:

Fuzzy Message Detection. 89 - Bei Wang, Yi Ouyang, Honggang Hu, Songsong Li:

A New Twofold Cornacchia-Type Algorithm for 4-GLV Decompositions and Its Applications. 90 - Ilaria Chillotti, Marc Joye, Pascal Paillier:

Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks. 91 - Dieaa I. Nassr

, M. Anwar, Hatem M. Bahig:
New Public Key Cryptosystem (First Version). 92 - Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia:

Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks. 93 - Sivanarayana Gaddam, Atul Luykx, Rohit Sinha, Gaven J. Watson:

Reducing HSM Reliance in Payments through Proxy Re-Encryption. 94 - Easwar Vivek Mangipudi, Donghang Lu, Aniket Kate:

Collusion-Deterrent Threshold Information Escrow. 95 - Kelong Cong, Daniele Cozzo, Varun Maram, Nigel P. Smart:

Gladius: LWR based efficient hybrid public key encryption with distributed decryption. 96 - Mridul Nandi:

A New and Improved Reduction Proof of Cascade PRF. 97 - Lukas Kölsch, Björn Kriepke, Gohar M. Kyureghyan:

Image sets of perfectly nonlinear maps. 98 - Melissa Chase, Esha Ghosh, Saeed Mahloujifar:

Property Inference from Poisoning. 99 - Sourav Das, Vinith Krishnan, Irene Miriam Isaac, Ling Ren:

SPURT: Scalable Distributed Randomness Beacon with Transparent Setup. 100 - Daniel Heinz, Thomas Pöppelmann:

Combined Fault and DPA Protection for Lattice-Based Cryptography. 101 - Madalina Chirita, Alexandru-Mihai Stroie, Andrei-Daniel Safta, Emil Simion:

A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization. 102 - Elena Andreeva, Amit Singh Bhati, Damian Vizár:

RUP Security of the SAEF Authenticated Encryption mode. 103 - Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz, Thomas Pöppelmann, Michiel Van Beirendonck:

Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography. 104 - Majid Salimi:

A New Efficient Identity-Based Encryption Without Pairing. 105 - Aram Jivanyan, Jesse Lancaster, Arash Afshar, Parnian Alimi:

MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers. 106 - Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin:

A Decentralized and Encrypted National Gun Registry. 107 - Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Peter Cíbik, Patrik Dobias:

Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs. 108 - Amin Rezaei, Hai Zhou:

Sequential Logic Encryption Against Model Checking Attack. 109 - Kenji Yasunaga:

Replacing Probability Distributions in Security Games via Hellinger Distance. 110 - Evgnosia-Alexandra Kelesidis:

A note on Post Quantum Onion Routing. 111 - (Withdrawn) Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange. 112

- Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:

Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N=k Servers (Revised Version). 113 - Michel Abdalla, Björn Haase, Julia Hesse:

Security Analysis of CPace. 114 - Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani:

Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4. 115 - Nael Rahman, Vladimir Shpilrain:

MAKE: a Matrix Action Key Exchange. 116 - Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:

FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin. 117 - Nicolas Alhaddad, Mayank Varia, Haibin Zhang:

High-Threshold AVSS with Optimal Communication Complexity. 118 - Eleftheria Makri, Dragos Rotaru, Frederik Vercauteren, Sameer Wagh:

Rabbit: Efficient Comparison for Secure Multi-Party Computation. 119 - Aner Ben-Efraim, Kelong Cong, Eran Omri, Emmanuela Orsini, Nigel P. Smart, Eduardo Soria-Vazquez:

Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits. 120 - Yaron Gvili, Sarah Scheffler, Mayank Varia:

BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits. 121 - Aner Ben-Efraim, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky:

PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection. 122 - Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding:

A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs. 123 - Özgün Özerk, Can Elgezen, Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:

Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption. 124 - Kris Shrishak, Haya Schulmann:

Privacy Preserving and Resilient RPKI. 125 - Ramachandran Anantharaman, Virendra R. Sule:

Observability attack on stream generators. 126 - Cong Deng, Xianghong Tang, Lin You, Gengran Hu:

Cuproof: A Novel Range Proof with Constant Size. 127 - Debrup Chakraborty, Avijit Dutta, Samir Kundu:

Designing Tweakable Enciphering Schemes Using Public Permutations. 128 - Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei:

Lattice-based weak curve fault attack on ECDSA. 129 - Bei Wang, Songsong Li, Yi Ouyang, Honggang Hu:

Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves. 130 - Sikha Pentyala, Rafael Dowsley, Martine De Cock:

Privacy-Preserving Video Classification with Convolutional Neural Networks. 131 - Xiling Li, Rafael Dowsley, Martine De Cock:

Privacy-Preserving Feature Selection with Secure Multiparty Computation. 132 - Ravital Solomon, Ghada Almashaqbeh:

smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption. 133 - Marco Baldi, Jean-Christophe Deneuville, Edoardo Persichetti, Paolo Santini:

Cryptanalysis of a code-based signature scheme without trapdoors. 134 - Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen:

Acyclicity Programming for Sigma-Protocols. 135 - Dmitry Schelkunov:

An approach for designing fast public key encryption systems using white-box cryptography techniques. 136 - Chris Brzuska, Eric Cornelissen, Konrad Kohbrok:

Cryptographic Security of the MLS RFC, Draft 11. 137 - Johannes Roth, Evangelos G. Karatsiolis, Juliane Krämer:

Classic McEliece Implementation with Low Memory Footprint. 138 - Mahimna Kelkar, Soubhik Deb, Sreeram Kannan:

Order-Fair Consensus in the Permissionless Setting. 139 - Clémentine Gritti, Emanuel Regnath, Sebastian Steinhorst:

Practical and Scalable Access Control Mechanism for the Internet of Things. 140 - Léo Ducas, Marc Stevens, Wessel P. J. van Woerden:

Advanced Lattice Sieving on GPUs, with Tensor Cores. 141 - Muah Kim, Onur Günlü, Rafael F. Schaefer:

Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication. 142 - Juan A. Garay, Yu Shen:

The Bitcoin Cash Backbone Protocol. 143 - Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari:

\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol. 144 - Christoph Egger, Mike Graf

, Ralf Küsters, Daniel Rausch, Viktoria Ronge, Dominique Schröder:
A Security Framework for Distributed Ledgers. 145 - Benjamin E. Diamond:

Boolean Functions from Hyperplane Coverings. 146 - Greg Morrisett, Elaine Shi, Kristina Sojakova, Xiong Fan, Joshua Gancher:

IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols. 147 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Stanislav Smyshlyaev:

On methods of shortening ElGamal-type signatures. 148 - Paul Frixons, André Schrottenloher:

Quantum Security of the Legendre PRF. 149 - Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi:

Two-Party Adaptor Signatures From Identification Schemes. 150 - Mark Simkin, Luisa Siniscalchi, Sophia Yakoubov:

On Sufficient Oracles for Secure Computation with Identifiable Abort. 151 - Lei Bi

, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang:
Hybrid Dual Attack on LWE with Arbitrary Secrets. 152 - Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz:

On the Isogeny Problem with Torsion Point Information. 153 - Tamar Lichter Blanks, Stephen D. Miller:

Generating cryptographically-strong random lattice bases and recognizing rotations of ℤn. 154 - James Howe, Marco Martinoli, Elisabeth Oswald, Francesco Regazzoni:

Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware. 155 - Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub:

Mechanized Proofs of Adversarial Complexity and Application to Universal Composability. 156 - Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo:

Sycon: A New Milestone in Designing ASCON-like Permutations. 157 - Nicolas Resch, Chen Yuan:

Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate. 158 - Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller:

hbACSS: How to Robustly Share Many Secrets. 159 - Tibor Jager, Rafael Kurek, David Niehues:

Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance. 160 - (Withdrawn) Generic Adaptor Signature. 161

- Giuseppe Ateniese, Long Chen, Danilo Francati, Dimitrios Papadopoulos, Qiang Tang:

Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity. 162 - Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky:

CNF-FSS and its Applications. 163 - Shohei Satake, Yujie Gu, Kouichi Sakurai:

Graph-Based Construction for Non-Malleable Codes. 164 - Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss:

Composition with Knowledge Assumptions. 165 - Matthias Lohr, Benjamin Schlosser, Jan Jürjens, Steffen Staab:

Cost Fairness for Blockchain-Based Two-Party Exchange Protocols. 166 - Seetal Potluri, Aydin Aysu:

Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware. 167 - Xiaohan Zhang, Chi Cheng, Yue Qin, Ruoyu Ding:

Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS. 168 - Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda:

Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials. 169 - Ai Kitagawa, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:

Fully Anonymous Group Signature with Verifier-Local Revocation. 170 - Wei Yu, Guangwu Xu:

Pre-Computation Scheme of Window τNAF for Koblitz Curves Revisited. 171 - Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah:

Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI. 172 - Wai-Kong Lee, Hwajeong Seo, Zhenfei Zhang, Seongoun Hwang:

TensorCrypto. 173 - Alptekin Küpçü, Reihaneh Safavi-Naini:

Smart Contracts for Incentivized Outsourcing of Computation. 174 - Siwei Chen

, Zejun Xiang, Xiangyong Zeng, Shasha Zhang:
On the Relationships between Different Methods for Degree Evaluation (Full Version). 175 - Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:

Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. 176 - Miguel Ambrona:

Generic Negation of Pair Encodings. 177 - Tapas Pal, Ratna Dutta:

Attribute-Based Access Control for Inner Product Functional Encryption from LWE. 178 - An Wang, Yuan Li, Yaoling Ding, Liehuang Zhu, Yongjuan Wang:

Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis. 179 - Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:

Apollo - Optimistically Linear and Responsive SMR. 180 - Jesus Diaz, Anja Lehmann:

Group Signatures with User-Controlled and Sequential Linkability. 181 - István András Seres, Máté Horváth, Péter Burcsi:

The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications. 182 - Dimitris Karakostas, Nikos Karayannidis, Aggelos Kiayias:

Efficient State Management in Distributed Ledgers. 183 - Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:

Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption. 184 - Hwajeong Seo, Pakize Sanal, Wai-Kong Lee, Reza Azarderakhsh:

No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms. 185 - Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang:

Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages. 186 - Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:

Weak Keys in Reduced AEGIS and Tiaoxin. 187 - Alessandro Chiesa, Eylon Yogev:

Tight Security Bounds for Micali's SNARGs. 188 - Yunwen Liu, Siwei Sun, Chao Li:

Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette. 189 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen:

Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source. 190 - Yaroslav Balytskyi, Manohar Raavi, Anatoliy Pinchuk, Sang-Yoon Chang:

PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution. 191 - Jan Czajkowski:

Quantum Indifferentiability of SHA-3. 192 - Jan-Pieter D'Anvers, Senne Batsleer:

Multitarget decryption failure attacks and their application to Saber and Kyber. 193 - Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun:

Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon. 194 - Karim Baghery, Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Nigel P. Smart, Titouan Tanguy:

Compilation of Function Representations for Secure Computing Paradigms. 195 - Xu Liu, Mingqiang Wang:

QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model. 196 - Guilherme Perin, Lichao Wu, Stjepan Picek:

Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA. 197 - Tatsuki Ono, Song Bian, Takashi Sato:

Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs. 198 - Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao:

Generic, Efficient and Isochronous Gaussian Sampling over the Integers. 199 - Sergiu Carpov, Kevin Deforth, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Jonathan Katz, Iraklis Leontiadis, Mohsen Mohammadi, Abson Sae-Tang, Marius Vuille:

Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols. 200 - Hanshen Xiao, Srinivas Devadas:

DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security. 201 - Martin R. Albrecht, Russell W. F. Lai:

Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices. 202 - Tjerand Silde, Martin Strand:

Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing. 203 - Andrey Kim, Yuriy Polyakov, Vincent Zucca:

Revisiting Homomorphic Encryption Schemes for Finite Fields. 204 - Tsz Hon Yuen, Handong Cui, Xiang Xie:

Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup. 205 - Ádám Ficsór, Yuval Kogman, Lucas Ontivero, István András Seres:

WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts. 206 - Daniele Cozzo, Nigel P. Smart, Younes Talibi Alaoui:

Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank. 207 - Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth:

Secure Poisson Regression. 208 - George Marinakis:

Sampling methods for cryptographic tests. 209 - Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:

YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles. 210 - Bernardo David, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi:

GearBox: An Efficient UC Sharded Ledger Leveraging the Safety-Liveness Dichotomy. 211 - Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe:

Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC. 212 - Ling Sun, Wei Wang, Meiqin Wang:

Accelerating the Search of Differential and Linear Characteristics with the SAT Method. 213 - Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková:

Mesh Messaging in Large-scale Protests: Breaking Bridgefy. 214 - Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy:

Limbo: Efficient Zero-knowledge MPCitH-based Arguments. 215 - Alexander May:

How to Meet Ternary LWE Keys. 216 - David Niehues:

Verifiable Random Functions with Optimal Tightness. 217 - Tako Boris Fouotsa, Christophe Petit:

InSIDH: a Simplification of SiGamal. 218 - Markulf Kohlweiss, Mary Maller, Janno Siim, Mikhail Volkhov:

Snarky Ceremonies. 219 - Bei Wang, Yi Ouyang, Songsong Li, Honggang Hu:

A New Twofold Cornacchia-Type Algorithm. 220 - Ryo Nishimaki:

The Direction of Updatable Encryption Does Matter. 221 - Raymond K. Zhao, Sarah McCarthy, Ron Steinfeld, Amin Sakzad, Máire O'Neill:

Quantum-safe HIBE: does it cost a Latte? 222 - Jing Xu, Xinyu Li, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang:

Redactable Blockchain Protocol with Instant Redaction. 223 - Murilo Coutinho, T. C. Souza Neto:

Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha. 224 - Anne Canteaut, Alain Couvreur, Léo Perrin:

Recovering or Testing Extended-Affine Equivalence. 225 - Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng:

Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. 226 - Qiqi Lai, Feng-Hao Liu, Zhedong Wang:

Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks. 227 - Nils Fleischhacker, Mark Simkin:

On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments. 228 - Zhiqiang Wu, Kenli Li, Keqin Li, Jin Wang:

Fast Boolean Queries with Minimized Leakage for Encrypted Databases in Cloud Computing. 229 - Pascal Bemmann, Rongmao Chen, Tibor Jager:

Subversion-Resilient Public Key Encryption with Practical Watchdogs. 230 - (Withdrawn) LL-ORAM: A Forward and Backward Private Oblivious RAM. 231

- (Withdrawn) Fast Factoring Integers by SVP Algorithms. 232

- Inbar Kaslasi, Ron D. Rothblum, Prashant Nalini Vasudevan:

Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers. 233 - Alessandro Budroni, Igor Semaev:

New Public-Key Crypto-System EHT. 234 - Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu:

More Efficient Digital Signatures with Tight Multi-User Security. 235 - Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang:

SNOW-Vi: an extreme performance variant of SNOW-V for low-end CPUs. 236 - Ehsan Ebrahimi:

Post-quantum Security of OAEP Transform. 237 - Gregor Leander, Shahram Rasoolzadeh:

Two Sides of The Same Coin: Weak-Keys and More Efficient Variants of CRAFT. 238 - Panagiotis Chatzigiannis, Foteini Baldimtsi, Konstantinos Chalkias:

SoK: Auditability and Accountability in Distributed Payment Systems. 239 - Mark Zhandry, Cong Zhang:

The Relationship Between Idealized Models Under Computationally Bounded Adversaries. 240 - Saikrishna Badrinarayanan, Peihan Miao, Pratyay Mukherjee, Divya Ravi:

On the Round Complexity of Fully Secure Solitary MPC with Honest Majority. 241 - Ju-Hwan Kim, Ji-Eun Woo, Soo-Jin Kim, So-Yeon Park, Dong-Guk Han:

GAP: Born to Break Hiding. 242 - Gayathri Garimella, Payman Mohassel, Mike Rosulek, Seyed Saeed Sadeghian, Jaspal Singh:

Private Set Operations from Oblivious Switching. 243 - Alexander Bienstock, Yevgeniy Dodis, Kevin Yeo:

Forward Secret Encrypted RAM: Lower Bounds and Applications. 244 - Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng:

On the Ideal Shortest Vector Problem over Random Rational Primes. 245 - Shengyuan Feng, Junqing Gong, Jie Chen:

Master-Key KDM-Secure ABE via Predicate Encoding. 246 - David Knichel, Pascal Sasdrich, Amir Moradi:

Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets. 247 - Bernardo Magri, Giulio Malavolta, Dominique Schröder, Dominique Unruh:

Everlasting UC Commitments from Fully Malicious PUFs. 248 - Karlo Knezevic, Juraj Fulir, Domagoj Jakobovic, Stjepan Picek:

NeuroSCA: Evolving Activation Functions for Side-channel Analysis. 249 - Onur Günlü:

Key Agreement with Physical Unclonable Functions and Biometric Identifiers. 250 - Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser:

Generic Compiler for Publicly Verifiable Covert Multi-Party Computation. 251 - Michael Zuzak, Yuntao Liu, Ankur Srivastava:

A Resource Binding Approach to Logic Obfuscation. 252 - Mark Abspoel, Ronald Cramer, Daniel Escudero, Ivan Damgård, Chaoping Xing:

Improved single-round secure multiplication using regenerating codes. 253 - Netanel Raviv, Ben Langton, Itzhak Tamo:

Multivariate Public Key Cryptosystem from Sidon Spaces. 254 - Fukang Liu, Takanori Isobe, Willi Meier:

A Simple Algebraic Attack on 3-Round LowMC. 255 - Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer:

Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC. 256 - Shoichi Kamada:

Cryptanalysis of the quantum public-key cryptosystem OTU under heuristics from Szemerédi-type statements. 257 - Jean-Sébastien Coron, Lorenzo Spignoli:

Secure Shuffling in the Probing Model. 258 - Jesús-Javier Chi-Domínguez, Krijn Reijnders:

Don't forget the constant-time in CSURF. 259 - Yuval Ishai, Russell W. F. Lai, Giulio Malavolta:

A Geometric Approach to Homomorphic Secret Sharing. 260 - Ben Marshall, Dan Page, James Webb:

MIRACLE: MIcRo-ArChitectural Leakage Evaluation. 261 - Claudio Orlandi, Peter Scholl, Sophia Yakoubov:

The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT. 262 - Katharina Boudgoust, Adeline Roux-Langlois:

Compressed Linear Aggregate Signatures Based on Module Lattices. 263 - Bernardo David, Lorenzo Gentile, Mohsen Pourpouneh:

FAST: Fair Auctions via Secret Transactions. 264 - Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen:

On the Hardness of Module-LWE with Binary Secret. 265 - Peter Rindal, Phillipp Schoppmann:

VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE. 266 - Christoph Dobraunig, Lorenzo Grassi, Anna Guinet, Daniël Kuijsters:

Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields. 267 - Daniel Slamanig, Christoph Striecks

:
Puncture 'Em All: Stronger Updatable Encryption with No-Directional Key Updates. 268 - Pramod Bhatotia, Markulf Kohlweiss, Lorenzo Martinico, Yiannis Tselekounis:

Steel: Composable Hardware-based Stateful and Randomised Functional Encryption. 269 - Pedro Hecht:

PQC: R-Propping of a New Group-Based Digital Signature. 270 - Dakshita Khurana, Brent Waters:

On the CCA Compatibility of Public-Key Infrastructure. 271 - Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto:

Isogeny-based key compression without pairings. 272 - Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:

On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. 273 - Lawrence Roy, Jaspal Singh:

Large Message Homomorphic Secret Sharing from DCR and Applications. 274 - Zhengyuan Shi, Gangqiang Yang, Hailiang Xiong, Fudong Li, Honggang Hu:

Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher. 275 - Amril Syalim, Takashi Nishide, Kouichi Sakurai:

Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography. 276 - Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld:

On the Integer Polynomial Learning with Errors Problem. 277 - Ivan Damgård, Boyang Li, Nikolaj I. Schwartzbach:

More Communication Lower Bounds for Information-Theoretic MPC. 278 - Anna-Lena Horlemann-Trautmann, Sven Puchinger, Julian Renner, Thomas Schamberger, Antonia Wachter-Zeh:

Information-Set Decoding with Hints. 279 - Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:

Online-Extractability in the Quantum Random-Oracle Model. 280 - Alessandro Chiesa, Eylon Yogev:

Subquadratic SNARGs in the Random Oracle Model. 281 - Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper:

One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols. 282 - Carsten Baum, Bernardo David, Tore Kasper Frederiksen:

P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange. 283 - Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, Radu State:

The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts. 284 - Amos Beimel, Hussien Othman, Naty Peter:

Degree-2 Secret Sharing and Conditional Disclosure of Secrets. 285 - Justin Holmgren

, Alex Lombardi, Ron D. Rothblum:
Fiat-Shamir via List-Recoverable Codes (or: Parallel Repetition of GMW is not Zero-Knowledge). 286 - Adrien Benamira, David Gérault, Thomas Peyrin, Quan Quan Tan:

A Deeper Look at Machine Learning-Based Cryptanalysis. 287 - Mark Zhandry:

Redeeming Reset Indifferentiability and Post-Quantum Groups. 288 - Sam Blackshear, Konstantinos Chalkias, Panagiotis Chatzigiannis, Riyaz Faizullabhoy, Irakliy Khaburzaniya, Eleftherios Kokoris-Kogias, Joshua Lind, David Wong, Tim Zakian:

Reactive Key-Loss Protection in Blockchains. 289 - Alex Biryukov, Aleksei Udovenko:

Dummy Shuffling against Algebraic Attacks in White-box Implementations. 290 - Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:

Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security. 291 - Akinori Hosoyamada, Yu Sasaki:

Quantum Collision Attacks on Reduced SHA-256 and SHA-512. 292 - Nicolas Bordes, Joan Daemen, Daniël Kuijsters, Gilles Van Assche:

Thinking Outside the Superbox. 293 - Marco Baldi, Franco Chiaraluce, Paolo Santini:

Code-based signatures without trapdoors through restricted vectors. 294 - Michael Zuzak, Ankur Srivastava:

Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design. 295 - Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:

Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice. 296 - Konstantinos Chalkias, Shir Cohen, Kevin Lewi, Fredric Moezinia, Yolan Romailler:

HashWires: Hyperefficient Credential-Based Range Proofs. 297 - Bhupendra Singh, G. Athithan, Rajesh Pillai:

On extensions of the one-time-pad. 298 - Muhammad Saad, Afsah Anwar, Srivatsan Ravi

, David Mohaisen:
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality. 299 - Nikolay S. Kaleyski:

Invariants for EA- and CCZ-equivalence of APN and AB functions. 300 - Dmitrii I. Koshelev:

Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of j=0 with the cost of one exponentiation in $\mathbb{F}_{\!q}$. 301 - Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi

, Veronika Kuchta
, Joseph K. Liu, Raphael C.-W. Phan, Zhenfei Zhang:
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain. 302 - S. Dov Gordon, Daniel Starin, Arkady Yerukhimovich:

The More The Merrier: Reducing the Cost of Large Scale MPC. 303 - Xavier Boyen, Thomas Haines, Johannes Müller:

Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting. 304 - Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila:

SoK: Game-based Security Models for Group Key Exchange. 305 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:

Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions. 306 - Thomas Attema, Ronald Cramer, Lisa Kohl:

A Compressed Σ-Protocol Theory for Lattices. 307 - Michele Ciampi, Vipul Goyal, Rafail Ostrovsky:

Threshold Garbled Circuits and Ad Hoc Secure Computation. 308 - Xingyu Meng, Kshitij Raj, Atul Prasad Deb Nath, Kanad Basu, Sandip Ray:

SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets. 309 - Yi Chen, Hongbo Yu:

A New Neural Distinguisher Model Considering Derived Features from Multiple Ciphertext Pairs. 310 - Yi Chen, Hongbo Yu:

Improved Neural Aided Statistical Attack for Cryptanalysis. 311 - Zhimin Luo, Mengce Zheng, Ping Wang, Minhui Jin, Jiajia Zhang, Honggang Hu, Nenghai Yu:

Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup. 312 - Liron David, Avishai Wool:

Rank Estimation with Bounded Error via Exponential Sampling. 313 - Navid Nasr Esfahani, Douglas R. Stinson:

On Security Properties of All-or-nothing Transforms. 314 - Ilia Iliashenko, Vincent Zucca:

Faster homomorphic comparison operations for BGV and BFV. 315 - James Bartusek, Sanjam Garg

, Akshayaram Srinivasan, Yinuo Zhang:
Reusable Two-Round MPC from LPN. 316 - Duong Tung Nguyen, Ni Trieu:

MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge. 317 - Damiano Abram, Ivan Damgård, Peter Scholl, Sven Trieflinger:

Oblivious TLS via Multi-Party Computation. 318 - Orhun Kara:

Tradeoff attacks on symmetric ciphers. 319 - Nir Drucker, Shay Gueron, Dusan Kostic:

Binding BIKE errors to a key pair. 320 - Matthew Green, Gabriel Kaptchuk, Gijs Van Laer:

Abuse Resistant Law Enforcement Access Systems. 321 - Chaya Ganesh, Anca Nitulescu, Eduardo Soria-Vazquez:

Rinocchio: SNARKs for Ring Arithmetic. 322 - Quan Thoi Minh Nguyen:

0. 323 - Kristin E. Lauter:

Private AI: Machine Learning on Encrypted Data. 324 - Zachary Newman

, Sacha Servan-Schreiber, Srinivas Devadas:
Spectrum: High-Bandwidth Anonymous Broadcast with Malicious Security. 325 - François Dupressoir, Konrad Kohbrok, Sabine Oechsner:

Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox. 326 - Matteo Campanelli, Mathias Hall-Andersen:

Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions. 327 - Karim M. Abdellatif:

Mixup Data Augmentation for Deep Learning Side-Channel Attacks. 328 - Min Yang, Changtong Xu, Zhe Xia, Li Wang, Qingshu Meng:

Two Efficient Regulatory Confi dential Transaction Schemes. 329 - Pooya Farshim, Louiza Khati, Yannick Seurin, Damien Vergnaud:

The Key-Dependent Message Security of Key-Alternating Feistel Ciphers. 330 - Radhakrishna Bhat, N. R. Sunitha, S. S. Iyengar:

A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications. 331 - Yuri L. Borissov, Miroslav Markov:

An O(log2 p) Approach to Point-Counting on Elliptic Curves From a Prominent Family Over the Prime Field 픽p. 332 - Jonathan Bootle, Alessandro Chiesa, Katerina Sotiraki

:
Sumcheck Arguments and their Applications. 333 - Alessandro Chiesa, Fermi Ma, Nicholas Spooner, Mark Zhandry:

Post-Quantum Succinct Arguments. 334 - Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:

Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. 335 - Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek:

On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES. 336 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo:

Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System. 337 - Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge:

Lattice-Based Proof of Shuffle and Applications to Electronic Voting. 338 - Jens Groth:

Non-interactive distributed key generation and key resharing. 339 - Bolton Bailey, Suryanarayana Sankagiri:

Merkle Trees Optimized for Stateless Clients in Bitcoin. 340 - Takashi Sato, Yuki Tanaka, Song Bian:

Clonable PUF: On the Design of PUFs That Share Equivalent Responses. 341 - Weikeng Chen, Ryan Deng, Raluca Ada Popa:

N-for-1 Auth: N-wise Decentralized Authentication via One Authentication. 342 - Rishab Goyal, Jiahui Liu, Brent Waters:

Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups. 343 - Dario Catalano, Dario Fiore, Emanuele Giunta:

Efficient and Universally Composable Single Secret Leader Election from Pairings. 344 - Dmitry Kogan, Henry Corrigan-Gibbs:

Private Blocklist Lookups with Checklist. 345 - Benny Applebaum, Eliran Kachlon, Arpita Patra:

Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security. 346 - Marios Adamoudis, Konstantinos A. Draziotis, Dimitrios Poulakis:

Attacking (EC)DSA With Partially Known Multiples of Nonces. 347 - Maxime Bombar, Alain Couvreur:

Decoding supercodes of Gabidulin codes and applications to cryptanalysis. 348 - Nir Bitansky, Michael Kellner, Omri Shmueli:

Post-quantum Resettably-Sound Zero Knowledge. 349 - Konstantinos Chalkias, François Garillot, Yashvanth Kondi, Valeria Nikolaenko:

Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures. 350 - Hyoseung Kim, Olivier Sanders, Michel Abdalla, Jong Hwan Park:

Practical Dynamic Group Signatures Without Knowledge Extractors. 351 - Jan Philipp Thoma, Tim Güneysu:

A Configurable Hardware Implementation of XMSS. 352 - Alonso González, Alexandros Zacharakis:

Succinct Publicly Verifiable Computation. 353 - Peeter Laud:

Efficient permutation protocol for MPC in the head. 354 - Georg Land, Pascal Sasdrich, Tim Güneysu:

A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware. 355 - Anton Tutoveanu:

Active Implementation of End-to-End Post-Quantum Encryption. 356 - Guilherme Perin, Lichao Wu, Stjepan Picek:

AISY - Deep Learning-based Framework for Side-channel Analysis. 357 - Alexander R. Block, Justin Holmgren

, Alon Rosen, Ron D. Rothblum, Pratik Soni:
Time- and Space-Efficient Arguments from Groups of Unknown Order. 358 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:

Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'. 359 - Thuat Do:

An Architecture for Blockchain-based Cloud Banking. 360 - Jiaxin Wang, Fang-Wei Fu:

Some Generic Constructions of Generalized Plateaued Functions. 361 - Zezhou Hou, Jiongjiong Ren, Shaozhen Chen:

Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning. 362 - Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:

Information Leakages in Code-based Masking: A Unified Quantification Approach. 363 - Gaurav Bansod:

RAGHAV: A new low power S-P network encryption design for resource constrained environment. 364 - Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks

, Erkan Tairi:
Updatable Signatures and Message Authentication Codes. 365 - Peter Scholl, Mark Simkin, Luisa Siniscalchi:

Multiparty Computation with Covert Security and Public Verifiability. 366 - Arnab Roy, Elena Andreeva, Jan Ferdinand Sauer:

Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions. 367 - Aaron Hutchinson, Koray Karabina, Geovandro Pereira:

Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE. 368 - Shoichi Hirose:

Another Algebraic Decomposition Method for Masked Implementation. 369 - Abhiram Kothapalli, Srinath T. V. Setty, Ioanna Tzialla:

Nova: Recursive Zero-Knowledge Arguments from Folding Schemes. 370 - Ahmet Sinak:

Construction of minimal linear codes with few weights from weakly regular plateaued functions. 371 - Laia Amorós, Annamaria Iezzi, Kristin E. Lauter, Chloe Martindale, Jana Sotáková:

Explicit connections between supersingular isogeny graphs and Bruhat - Tits trees. 372 - Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi:

T5: Hashing Five Inputs with Three Compression Calls. 373 - Akshaya Mani, Ian Goldberg:

ZXAD: Zero-knowledge Exit Abuse Detection for Tor. 374 - Rafael Dowsley, Caleb Horst, Anderson C. A. Nascimento:

Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines. 375 - Nai-Hui Chia, Kai-Min Chung, Qipeng Liu, Takashi Yamakawa:

On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds. 376 - Quan Thoi Minh Nguyen:

Attacks and weaknesses of BLS aggregate signatures. 377 - Fabrice Benhamouda, Aayush Jain, Ilan Komargodski, Huijia Lin:

Multiparty Reusable Non-Interactive Secure Computation from LWE. 378 - Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li, Lei Hu:

A Note on the Bias of Rotational Differential-Linear Distinguishers. 379 - Cholun Kim:

Certificateless Designated Verifier Proxy Signature. 380 - (Withdrawn) Towards Practical and Round-Optimal Lattice-Based Threshold and Blind Signatures. 381

- Jiaxin Pan, Magnus Ringerud:

Signatures with Tight Multi-User Security from Search Assumptions. 382 - Daniel R. L. Brown:

GLV+HWCD for 2y^2=x^3+x/GF(8^91+5). 383 - Alex Biryukov, Gleb Naumenko, Sergei Tikhomirov:

Analysis and Probing of Parallel Channels in the Lightning Network. 384 - Yasufumi Hashimoto:

Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices. 385 - Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni:

SAFELearn: Secure Aggregation for private FEderated Learning. 386 - Christian Majenz, Chanelle Matadah Manfouo, Maris Ozols:

Quantum-access security of the Winternitz one-time signature scheme. 387 - Marshall Ball

, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, Tal Moran:
Topology-Hiding Communication from Minimal Assumptions. 388 - Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:

Physically Related Functions: A New Paradigm for Light-weight Key-Exchange. 389 - Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto:

Orthros: A Low-Latency PRF. 390 - Thomas Haines, Peter B. Rønne:

New Standards for E-Voting Systems: Reflections on Source Code Examinations. 391 - Ao Liu, Yun Lu, Lirong Xia, Vassilis Zikas:

How Private Are Commonly-Used Voting Rules? 392 - Onur Günlü:

Key Agreement with Correlated Noise and Multiple Entities or Enrollments. 393 - Ryo Nishimaki, Takashi Yamakawa:

Quantum Encryption with Certified Deletion: Public Key and Attribute-Based. 394 - Harishma Boyapally, Urbi Chatterjee, Debdeep Mukhopadhyay:

On the Validity of Spoofing Attack Against Safe is the New Smart. 395 - Alessandro Barenghi, Jean-François Biasse, Edoardo Persichetti, Paolo Santini:

LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action. 396 - Carmine Abate, Philipp G. Haselwarter, Exequiel Rivas, Antoine Van Muylder, Théo Winterhalter, Catalin Hritcu, Kenji Maillard, Bas Spitters:

SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq. 397 - Thales Bandiera Paiva, Routo Terada:

Cryptanalysis of the Binary Permuted Kernel Problem. 398 - Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov:

Latus Incentive Scheme: Enabling Decentralization in Blockchains based on Recursive SNARKs. 399 - Yupu Hu, Xingting Dong, Baocang Wang:

Size of IK00 Branching Program. 400 - Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi:

Output Prediction Attacks on SPN Block Ciphers using Deep Learning. 401 - Christoph Dobraunig, Bart Mennink:

Leakage Resilient Value Comparison With Application to Message Authentication. 402 - Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:

Atom: A Stream Cipher with Double Key Filter. 403 - Mihir Bellare, Wei Dai:

Chain Reductions for Multi-Signatures. 404 - Claude Carlet:

Revisiting some results on APN and algebraic immune functions. 405 - Jiaxin Guan, Mark Zhandry:

Disappearing Cryptography in the Bounded Storage Model. 406 - André Schrottenloher:

Improved Quantum Algorithms for the k-XOR Problem. 407 - Christian Majenz, Christian Schaffner, Mehrdad Tahmasbi:

Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding. 408 - Markulf Kohlweiss, Varun Madathil, Kartik Nayak, Alessandra Scafuro:

On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols. 409 - Shlomi Dolev, Stav Doolman:

Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM. 410 - Onur Günlü, Peter Trifonov, Muah Kim, Rafael F. Schaefer, Vladimir Sidorenko:

Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions. 411 - Prabhanjan Ananth, Fatih Kaleoglu:

Uncloneable Encryption, Revisited. 412 - Yi Liu, Qi Wang, Siu-Ming Yiu:

Blind Polynomial Evaluation and Data Trading. 413 - Sook-Yan Hue, Jason Chia, Ji-Jian Chin:

Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings. 414 - Marc Schoolderman, Jonathan Moerman, Sjaak Smetsers, Marko C. J. D. van Eekelen:

Efficient Verification of Optimized Code: Correct High-speed X25519. 415 - Florian Breuer, Vipul Goyal, Giulio Malavolta:

Cryptocurrencies with Security Policies and Two-Factor Authentication. 416 - Shlomi Dolev, Matan Liber:

History Binding Signature. 417 - Hao Chen:

Ring-LWE over two-to-power cyclotomics is not hard. 418 - (Withdrawn) On The Dihedral Coset Problem. 419

- Fabian Boemer, Sejun Kim, Gelila Seifu, Fillipe D. M. de Souza, Vinodh Gopal:

Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52. 420 - James Bartusek, Giulio Malavolta:

Candidate Obfuscation of Null Quantum Circuits and Witness Encryption for QMA. 421 - Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk:

Stacking Sigmas: A Framework to Compose Σ-Protocols for Disjunctions. 422 - Vasyl Ustimenko:

On effective computations in special subsemigroups of polynomial transformations and protocol based multivariate cryptosystems. 423 - Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu:

Security Analysis of SFrame. 424 - Yuqing Zhao, Wenqi Yu, Chun Guo:

Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions. 425 - Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Octavio Perez-Kempner:

Generic Plaintext Equality and Inequality Proofs (Extended Version). 426 - Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:

Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks. 427 - Peter Schwabe, Benoît Viguier, Timmy Weerwag, Freek Wiedijk:

A Coq proof of the correctness of X25519 in TweetNaCl. 428 - Daniel Smith-Tone:

New Practical Multivariate Signatures from a Nonlinear Modifier. 429 - Simon Pohmann, Marc Stevens, Jens Zumbrägel:

Lattice Enumeration on GPUs for fplll. 430 - Prabhanjan Ananth, Abhishek Jain

, Zhengzhong Jin, Giulio Malavolta:
Unbounded Multi-Party Computation from Learning with Errors. 431 - Kevin Deforth, Marc Desgroseilliers, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Marius Vuille:

XORBoost: Tree Boosting in the Multiparty Computation Setting. 432 - Aaram Yun:

Formations for the Quantum Random Oracle. 433 - Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb:

On the Power of Expansion: More Efficient Constructions in the Random Probing Model. 434 - Elaine Shi, Ke Wu:

Non-Interactive Anonymous Router. 435 - Duc-Phong Le, Sze Ling Yeo, Khoongming Khoo:

Algebraic Differential Fault Analysis on SIMON block cipher. 436 - Nikolaj Sidorenco, Sabine Oechsner, Bas Spitters:

Formal security analysis of MPC-in-the-head zero-knowledge protocols. 437 - Toomas Krips, Helger Lipmaa:

More Efficient Shuffle Argument from Unique Factorization. 438 - Donghoon Chang, Meltem Sönmez Turan:

Recovering the Key from the Internal State of Grain-128AEAD. 439 - Wenshuo Guo, Fangwei Fu:

Two modifications for Loidreau's code-based cryptosystem. 440 - Yukun Wang, Mingqiang Wang:

Watermarking PRFs from Lattices: Public Extract and Collusion Resistant. 441 - Raluca Posteuca, Tomer Ashur:

How to Backdoor a Cipher. 442 - Cholun Kim:

Constructing a pairing-free certificateless proxy signature scheme from ECDSA. 443 - Daniel Nager, Danny Niu Jianfang:

Xifrat - Compact Public-Key Cryptosystems based on Quasigroups. 444 - Anirudh C, Ashish Choudhury, Arpita Patra:

A Survey on Perfectly-Secure Verifiable Secret-Sharing. 445 - Chitchanok Chuengsatiansup, Damien Stehlé:

Towards practical GGM-based PRF from (Module-)Learning-with-Rounding. 446 - Daniel Noble:

An Intimate Analysis of Cuckoo Hashing with a Stash. 447 - Ashrujit Ghoshal, Stefano Tessaro:

On the Memory-Tightness of Hashed ElGamal. 448 - Gang Wang, Mark Nixon, Mike Boudreaux:

Towards Cloud-assisted Industrial IoT Platform for Large-scale Continuous Condition Monitoring. 449 - Gang Wang, Mark Nixon:

RandChain: Practical Scalable Decentralized Randomness Attested by Blockchain. 450 - Gang Wang:

RepShard: Reputation-based Sharding Scheme Achieves Linearly Scaling Efficiency and Security Simultaneously. 451 - (Withdrawn) SAT-based Method to Improve Neural Distinguisher and Applications to SIMON. 452

- Yuncong Hu, Kian Hooshmand, Harika Kalidhindi, Seung Jin Yang, Raluca Ada Popa:

Merkle^2: A Low-Latency Transparency Log System. 453 - Veronika Kuchta, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Shifeng Sun:

Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security. 454 - Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe:

Guessing Bits: Improved Lattice Attacks on (EC)DSA. 455 - Animesh Chhotaray, Thomas Shrimpton:

Hardening Circuit-Design IP Against Reverse-Engineering Attacks. 456 - Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen:

Non-Interactive Composition of Sigma-Protocols via Share-then-Hash. 457 - Gideon Samid:

FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm. 458 - Deevashwer Rathee, Mayank Rathee, G. Rahul Kranti Kiran, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi:

SIRNN: A Math Library for Secure RNN Inference. 459 - Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi:

Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User Authentication through SCA. 460 - Aein Rezaei Shahmirzadi, Amir Moradi:

Second-Order SCA Security with almost no Fresh Randomness. 461 - James Howe, Thomas Prest, Daniel Apon:

SoK: How (not) to Design and Implement Post-Quantum Cryptography. 462 - Andreas Wiemers, Johannes Mittmann:

Improving Recent Side-Channel Attacks Against the DES Key Schedule. 463 - Gregor Haas, Seetal Potluri, Aydin Aysu:

iTimed: Cache Attacks on the Apple A10 Fusion SoC. 464 - Daniel R. L. Brown, Neal Koblitz, Jason T. LeGrow:

Cryptanalysis of 'MAKE'. 465 - (Withdrawn) A New Key Agreement Scheme Based On A Well-Known Property Of Powers. 466

- Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss:

Key-schedule Security for the TLS 1.3 Standard. 467 - Cosku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi:

Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report). 468 - Danilo Gligoroski:

Entropoid Based Cryptography. 469 - Benny Applebaum, Oded Nir:

Upslices, Downslices, and Secret-Sharing with Complexity of 1.5n. 470 - Cesar Pereida García, Sampo Sovio:

Size, Speed, and Security: An Ed25519 Case Study. 471 - Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung:

CryptoGram: Fast Private Calculations of Histograms over Multiple Users' Inputs. 472 - Ryan Karl, Jonathan Takeshita, Alamin Mohammed, Aaron Striegel, Taeho Jung:

Cryptonomial: A Framework for Private Time-Series Polynomial Calculations. 473 - Fukang Liu, Takanori Isobe, Willi Meier:

Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations. 474 - Shahla Atapoor, Nigel P. Smart, Younes Talibi Alaoui:

Private Liquidity Matching using MPC. 475 - Aaqib Bashir Dar, Mashhood Jeelani Lone, Nuzhat Hussain:

Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions. 476 - Agathe Cheriere, Lina Mortajine, Tania Richmond, Nadia El Mrabet:

Side-Channel Attack on ROLLO Post-Quantum Cryptographic Scheme. 477 - Yaron Gvili, Julie Ha, Sarah Scheffler, Mayank Varia, Ziling Yang, Xinyuan Zhang:

TurboIKOS: Improved Non-interactive Zero Knowledge and Post-Quantum Signatures. 478 - Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl:

Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography. 479 - Jakub Klemsa:

Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform. 480 - Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:

PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. 481 - Anita Aghaie, Amir Moradi:

Inconsistency of Simulation and Practice in Delay-based Strong PUFs. 482 - Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal:

Masking Kyber: First- and Higher-Order Implementations. 483 - Alireza Kavousi, Javad Mohajeri, Mahmoud Salmasizadeh:

Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF. 484 - Ferhat Yaman, Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:

A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme. 485 - Takanori Isobe, Ryoma Ito:

Security Analysis of End-to-End Encryption for Zoom Meetings. 486 - Danny Niu Jianfang:

Xifrat Cryptanalysis - Compute the Mixing Function Without the Key. 487 - Javier Herranz, Ramiro Martínez, Manuel Sánchez:

Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle. 488 - (Withdrawn) ROSE: Robust Searchable Encryption with Forward and Backward Security and Practical Performance. 489

- Chao Liu, Anyu Wang, Zhongxiang Zheng:

Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE. 490 - Véronique Cortier, Pierrick Gaudry, Quentin Yang:

A toolbox for verifiable tally-hiding e-voting systems. 491 - Ming-Shing Chen, Tung Chou:

Classic McEliece on the ARM Cortex-M4. 492 - Ming-Shing Chen, Tung Chou, Markus Krausz:

Optimizing BIKE for the Intel Haswell and ARM Cortex-M4. 493 - Surbhi Shaw, Ratna Dutta:

Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures. 494 - Mircea Digulescu:

Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One-Way Functions. 495 - Mircea Digulescu:

Applications of SKREM-like symmetric key ciphers. 496 - Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont:

SoK: Design Tools for Side-Channel-Aware Implementations. 497 - Antonio Dimeo, Felix Gohla, Daniel Goßen, Niko Lockenvitz:

SoK: Multi-Device Secure Instant Messaging. 498 - Kelong Cong, Karim Eldefrawy, Nigel P. Smart:

Optimizing Registration Based Encryption. 499 - Gabrielle Beck, Aarushi Goel, Abhishek Jain

, Gabriel Kaptchuk:
Order-C Secure Multiparty Computation for Highly Repetitive Circuits. 500 - Aritra Banerjee, Michael Clear, Hitesh Tewari:

zkHawk: Practical Private Smart Contracts from MPC-based Hawk. 501 - Kwangsu Lee, Joon Sik Kim:

A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption. 502 - Matthieu Rambaud, Antoine Urban:

Almost-Asynchronous MPC under Honest Majority, Revisited. 503 - Xiao-Juan Wang, Tian Tian, Wen-Feng Qi:

A Generic Method for Investigating Nonsingular Galois NFSRs. 504 - Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, Shota Yamada:

Cryptanalysis of Boyen's Attribute-Based Encryption Scheme in TCC 2013. 505 - Robi Pedersen, Osmanbey Uzunkol:

Delegating Supersingular Isogenies over 픽p2 with Cryptographic Applications. 506 - Tianren Liu, Stefano Tessaro, Vinod Vaikuntanathan:

The t-wise Independence of Substitution-Permutation Networks. 507 - Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, Younho Lee:

Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs. 508 - Erik Thormarker:

On using the same key pair for Ed25519 and an X25519 based KEM. 509 - George Teseleanu:

Signer and Message Ambiguity from a Variety of Keys. 510 - Markulf Kohlweiss, Michal Zajac:

On Simulation-Extractability of Universal zkSNARKs. 511 - Tapas Pal, Ratna Dutta:

Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF. 512 - Yanyi Liu, Rafael Pass:

On One-way Functions from NP-Complete Problems. 513 - Abhishek Jain

, Zhengzhong Jin:
Non-Interactive Zero Knowledge from Sub-exponential DDH. 514 - Keita Emura, Atsushi Takayasu, Yohei Watanabe:

Generic Constructions of Revocable Hierarchical Identity-based Encryption. 515 - (Withdrawn) A new weak curve fault attack on ECIES: embedded point validation is not enough during decryption. 516

- Yanyi Liu, Rafael Pass:

Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity. 517 - Victor Ermolaev, Gamze Tillem:

How to Share and Own a Secret. 518 - Atakan Arslan, Muhammed Ali Bingöl:

Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment. 519 - Thomas Haines, Johannes Müller:

Optimal Randomized Partial Checking for Decryption Mix Nets. 520 - Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert:

Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation. 521 - Yingpu Deng, Lixia Luo, Yanbin Pan, Zhaonan Wang, Guanju Xiao:

Public-key Cryptosystems and Signature Schemes from p-adic Lattices. 522 - Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie:

No Time to Hash: On Superefficient Entropy Accumulation. 523 - Kwangsu Lee:

Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency. 524 - Lichao Wu, Guilherme Perin:

On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis. 525 - Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek:

Reinforcement Learning-based Design of Side-channel Countermeasures. 526 - Michal Wronski:

Solving discrete logarithm problem over prime fields using quantum annealing and $\frac{n^3}{2}$ logical qubits. 527 - Denis Firsov, Henri Lakk, Ahto Truu:

Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping. 528 - Nicolas Gailly, Mary Maller, Anca Nitulescu:

SnarkPack: Practical SNARK Aggregation. 529 - Yuan Yao, Tuna B. Tufan, Tarun Kathuria, Baris Ege, Ulkuhan Guler, Patrick Schaumont:

Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level. 530 - David Heath, Vladimir Kolesnikov:

LogStack: Stacked Garbling with O(b log b) Computation. 531 - Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang:

Rainbow on Cortex-M4. 532 - Sijun Tan, Brian Knott, Yuan Tian, David J. Wu:

CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU. 533 - Maura B. Paterson, Douglas R. Stinson:

Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes. 534 - Yanyi Liu, Rafael Pass:

On the Possibility of Basing Cryptography on $\EXP \neq \BPP$. 535 - (Withdrawn) Analyzing the Potential of Transport Triggered Architecture for Lattice-based Cryptography Algorithms. 536

- Gang Wang:

SoK: Exploring Blockchains Interoperability. 537 - Françoise Levy-dit-Vehel, Maxime Roméas:

A Composable Look at Updatable Encryption. 538 - Atsushi Takayasu:

More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions. 539 - Geoffroy Couteau, Michael Klooß, Huang Lin, Michael Reichle:

Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments. 540 - Reza Azarderakhsh, Rami El Khatib, Brian Koziel, Brandon Langenberg:

Hardware Deployment of Hybrid PQC. 541 - Samir Bouftass:

Symetric encryption algorithms based on the mathematical structure underlying the three body problem. 542 - Craig Costello:

The Case for SIKE: A Decade of the Supersingular Isogeny Problem. 543 - Jing Yang, Thomas Johansson, Alexander Maximov:

New improved attacks on SNOW-V. 544 - Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao:

MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments. 545 - Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto:

Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V. 546 - Yao Sun:

Cube Attack against 843-Round Trivium. 547 - Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:

Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper). 548 - Benjamin Salling Hvass, Diego F. Aranha, Bas Spitters:

High-assurance field inversion for curve-based cryptography. 549 - Amar Bapic, Samir Hodzic, Enes Pasalic:

Quadratic almost bent functions - their partial characterization and design in the spectral domain. 550 - Seungwan Hong, Seunghong Kim, Jiheon Choi, Younho Lee, Jung Hee Cheon:

Efficient Sorting of Homomorphic Encrypted Data with k-way Sorting Network. 551 - André Chailloux, Thomas Debris-Alazard, Simona Etinski:

Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric. 552 - Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt:

PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild. 553 - Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo:

Grover on Caesar and Vigenère Ciphers. 554 - Nils Wisiol, Khalid T. Mursi, Jean-Pierre Seifert, Yu Zhuang:

Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited. 555 - Léo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuki:

Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori. 556 - Thijs Laarhoven, Michael Walter:

Dual lattice attacks for closest vector problems (with preprocessing). 557 - Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter B. Rønne, Tjerand Silde:

Verifiable Decryption in the Head. 558 - Andrés Fábrega, Ueli Maurer, Marta Mularczyk:

A Fresh Approach to Updatable Symmetric Encryption. 559 - Nael Rahman, Vladimir Shpilrain:

MOBS (Matrices Over Bit Strings) public key exchange. 560 - Pakize Sanal, Emrah Karagoz, Hwajeong Seo, Reza Azarderakhsh, Mehran Mozaffari Kermani:

Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors. 561 - Wouter Castryck, Ann Dooms, Carlo Emerencia, Alexander Lemmens:

A fusion algorithm for solving the hidden shift problem in finite abelian groups. 562 - Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani:

High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography. 563 - Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler:

SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions. 564 - Cyprien Delpech de Saint Guilhem, Eleftheria Makri, Dragos Rotaru, Titouan Tanguy:

The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving. 565 - Cong Zhang, Hong-Sheng Zhou:

From Random Oracles to Ideal Signatures, and Back. 566 - Jeonghyuk Lee, Jihye Kim, Hyunok Oh:

Forward-secure Multi-user Aggregate Signatures based on zk-SNARKs. 567 - Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra:

ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems. 568 - David Knichel, Amir Moradi, Nicolai Müller, Pascal Sasdrich:

Automated Generation of Masked Hardware. 569 - André Chailloux, Johanna Loyer:

Lattice sieving via quantum random walks. 570 - Thomas Attema, Nicole Gervasoni, Michiel Marcus, Gabriele Spini:

Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond. 571 - Charanjit S. Jutla, Nathan Manohar:

Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE. 572 - Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy:

Compactness of Hashing Modes and Efficiency beyond Merkle Tree. 573 - Yuyin Yu, Léo Perrin:

Constructing More Quadratic APN Functions with the QAM Method. 574 - Zhenzhen Bao, Jian Guo, Danping Shi, Yi Tu:

MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing. 575 - Surya Addanki, Kevin Garbe, Eli Jaffe, Rafail Ostrovsky, Antigoni Polychroniadou:

Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares. 576 - Dionysis Zindros:

Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks. 577 - Itai Dinur:

Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2). 578 - Joseph Jaeger, Fang Song, Stefano Tessaro:

Quantum Key-length Extension. 579 - Leo de Castro, Antigoni Polychroniadou:

Lightweight, Verifiable Function Secret Sharing and its Applications. 580 - Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu:

Breaking CAS-Lock and Its Variants by Exploiting Structural Traces. 581 - StarkWare Team:

ethSTARK Documentation. 582 - Lorenz Panny:

Entropoid-based cryptography is group exponentiation in disguise. 583 - Onur Günlü, Ueli Maurer, João Ribeiro:

Effects of Quantization on the Multiple-Round Secret-Key Capacity. 584 - Maxime Plançon, Thomas Prest:

Exact Lattice Sampling from Non-Gaussian Distributions. 585 - Laila El Aimani:

A New Approach for finding Low-Weight Polynomial Multiples. 586 - David Heath, Vladimir Kolesnikov:

PrORAM: Fast O(log n) Private Coin ZK ORAM. 587 - Thomas Haines, Johannes Müller:

A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose. 588 - Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo:

White-Box Encryption Scheme Using a Quantum Memory. 589 - Carla Ràfols, Arantxa Zapico:

An Algebraic Framework for Universal and Updatable SNARKs. 590 - Jan Peter Drees, Pritha Gupta, Eyke Hüllermeier, Tibor Jager, Alexander Konze, Claudia Priesterjahn, Arunselvan Ramaswamy, Juraj Somorovsky:

Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs! 591 - Loïc Masure, Rémi Strullu:

Side Channel Analysis against the ANSSI's protected AES implementation on ARM. 592 - Shumo Chu, Danyang Zhuo, Elaine Shi, T.-H. Hubert Chan:

Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms. 593 - Zhelei Zhou, Xinle Cao, Jian Liu, Bingsheng Zhang, Kui Ren:

ZK Contingent Payments for Trained Neural Networks. 594 - Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath:

Securing Parallel-chain Protocols under Variable Mining Power. 595 - Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico:

Mutual Accountability Layer: Accountable Anonymity within Accountable Trust. 596 - Rami Elkhatib, Reza Azarderakhsh, Mehran Mozaffari Kermani:

Accelerated RISC-V for Post-Quantum SIKE. 597 - Panagiotis Chatzigiannis, Konstantinos Chalkias:

Proof of Assets in the Diem Blockchain. 598 - Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang:

Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments. 599 - Christian Porter, Andrew Mendelsohn, Cong Ling:

Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group. 600 - Hanshen Xiao, Srinivas Devadas:

The Art of Labeling: Task Augmentation for Private(Collaborative) Learning on Transformed Data. 601 - Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen:

Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak. 602 - Justin Kim, Vandan Mehta, Kartik Nayak, Nibesh Shrestha:

Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults. 603 - David Heath, Vladimir Kolesnikov, Stanislav Peceny:

Masked Triples: Amortizing Multiplication Triples across Conditionals. 604 - Benny Applebaum, Eyal Golombek:

On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs. 605 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss:

ZK-PCPs from Leakage-Resilient Secret Sharing. 606 - Jiaxin Pan, Chen Qian, Magnus Ringerud:

Signed Diffie-Hellman Key Exchange with Tight Security. 607 - Daniel R. L. Brown:

Layering diverse cryptography to lower future secret attack risks: post-quantum estimates. 608 - Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky, Vassilis Zikas:

FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker. 609 - Alexander Nilsson, Irina E. Bocharova, Boris D. Kudryashov, Thomas Johansson:

A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems. 610 - Fatih Balli, Andrea Caforio, Subhadeep Banik:

Some Applications of Hamming Weight Correlations. 611 - Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider:

Privacy-preserving Density-based Clustering. 612 - Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu:

Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE. 613 - Rafael Pass:

Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit. 614 - Rafael Pass:

A Tutorial on Concurrent Zero Knowledge. 615 - Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest:

An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable. 616 - Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa:

Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication. 617 - Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:

Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing. 618 - Jiabo Wang, Cong Ling:

Polar Coding for Ring-LWE-Based Public Key Encryption. 619 - Elzbieta Burek, Michal Misztal, Michal Wronski:

Algebraic attacks on block ciphers using quantum annealing. 620 - Léonard Lys, Arthur Micoulet, Maria Potop-Butucaru:

R-SWAP: Relay based atomic cross-chain swap protocol. 621 - Ripon Patgiri:

Stealth: A Highly Secured End-to-End Symmetric Communication Protocol. 622 - Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros:

Mining in Logarithmic Space. 623 - Guru-Vamsi Policharla, Manoj Prabhakaran, Rajeev Raghunath, Parjanya Vyas:

Group Structure in Correlations and its Applications in Cryptography. 624 - Daniel R. L. Brown:

Plactic key agreement. 625 - Jan Wichelmann, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth:

Help, my Signal has bad Device! Breaking the Signal Messenger's Post-CompromiseSecurity through a Malicious Device. 626 - Nirvan Tyagi, Ben Fisch, Joseph Bonneau, Stefano Tessaro:

Client-Auditable Verifiable Registries. 627 - Joachim Neu, Ertem Nusret Tas, David Tse:

The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets. 628 - Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:

Bitcoin Privacy - A Survey on Mixing Techniques. 629 - Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:

Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings. 630 - Felix Engelmann, Lukas Müller, Andreas Peter, Frank Kargl, Christoph Bösch:

SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges. 631 - Jan Camenisch, Manu Drijvers, Timo Hanke, Yvonne-Anne Pignolet, Victor Shoup, Dominic Williams:

Internet Computer Consensus. 632 - Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková:

CTIDH: faster constant-time CSIDH. 633 - Jakub Klemsa:

Setting Up Efficient TFHE Parameters for Multivalue Plaintexts and Multiple Additions. 634 - Ripon Patgiri:

symKrypt: A General-purpose and Lightweight Symmetric-Key Cryptography. 635 - Akinori Kawachi, Harumichi Nishimura:

Communication Complexity of Private simultaneous Quantum Messages Protocols. 636 - Yevgeniy Dodis, Kevin Yeo:

Doubly-Affine Extractors, and their Applications. 637 - Ioanna Karantaidou, Foteini Baldimtsi:

Efficient Constructions of Pairing Based Accumulators. 638 - Charalampos Papamanthou, Cong Zhang, Hong-Sheng Zhou:

Indifferentiable Signatures: High Performance and Fallback Security. 639 - Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl:

Security and Trust in Open Source Security Tokens. 640 - William Zhang, Yu Xia:

Hydra: Succinct Fully Pipelineable Interactive Arguments of Knowledge. 641 - Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk:

On the Cryptographic Deniability of the Signal Protocol. 642 - Muhammad ElSheikh, Amr M. Youssef:

On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers. 643 - Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti:

Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings. 644 - Alexander May, Floyd Zweydinger:

Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing. 645 - Cihangir Tezcan:

Optimization of Advanced Encryption Standard on Graphics Processing Units. 646 - Ripon Patgiri:

privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm. 647 - Mustafa Khairallah:

Security of COFB against Chosen Ciphertext Attacks. 648 - Aurélien Dupin, Pierrick Méaux, Mélissa Rossi:

On the Algebraic Immunity - Resiliency trade-off, implications for Goldreich's Pseudorandom Generator. 649 - Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya:

Structured Leakage and Applications to Cryptographic Constant-Time and Cost. 650 - Collin Chin, Howard Wu, Raymond Chu, Alessandro Coglio, Eric McCarthy, Eric Smith:

Leo: A Programming Language for Formally Verified, Zero-Knowledge Applications. 651 - Arsalan Javeed, Cemal Yilmaz, Erkay Savas:

Detector+: An Approach for Detecting, Isolating, and Preventing Timing Attacks. 652 - Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Helger Lipmaa:

Smooth Zero-Knowledge Hash Functions. 653 - Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa:

Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning. 654 - Morten Øygarden, Daniel Smith-Tone, Javier A. Verbel:

On the Effect of Projection on Rank Attacks in Multivariate Cryptography. 655 - Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny. 656 - Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Jenit Tomy:

Locally Reconstructable Non-malleable Secret Sharing. 657 - Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum:

A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem. 658 - Mohammed Nabeel, Mohammed Ashraf, Eduardo Chielle, Nektarios Georgios Tsoutsos, Michail Maniatakos:

Technical report: CoPHEE: Co-processor forPartially Homomorphic Encrypted Execution. 659 - Lei Fan, Jonathan Katz, Phuc Thai, Hong-Sheng Zhou:

A Permissionless Proof-of-Stake Blockchain with Best-Possible Unpredictability. 660 - Ling Sun, Wei Wang, Meiqin Wang:

Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. 661 - Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang:

Verifying Post-Quantum Signatures in 8 kB of RAM. 662 - Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier:

On the Design and Misuse of Microcoded (Embedded) Processors - A Cautionary Note. 663 - Handong Cui, Tsz Hon Yuen:

A Trustless GQ Multi-Signature Scheme with Identifiable Abort. 664 - Pierrick Méaux:

On the algebraic immunity of direct sum constructions. 665 - Ahad Niknia, Miguel Correia, Jaber Karimpour:

Secure cloud-of-clouds storage with space-efficient secret sharing. 666 - Hyeokdong Kwon, Hyunjun Kim, Siwoo Eum, Minjoo Shim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo:

Optimized Implementation of SM4 on AVR Microcontrollers and ARM Processors. 667 - Gyeongju Song, Kyungbae Jang, Hyunji Kim, Wai-Kong Lee, Zhi Hu, Hwajeong Seo:

Grover on SM3. 668 - David Cerezo Sánchez:

Pravuil: Global Consensus for a United World. 669 - Farid Javani, Alan T. Sherman:

AOT: Anonymization by Oblivious Transfer. 670 - Atsuki Momose, Ling Ren:

Multi-Threshold Byzantine Fault Tolerance. 671 - Pedro Hecht:

PQC: R-Propping a Chaotic Cellular Automata. 672 - Tianyi Liu, Xiang Xie, Yupeng Zhang:

zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy. 673 - Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li:

On the Effect of the Key-expansion Algorithm in Simon-like Ciphers. 674 - Hector B. Hougaard:

3-round Feistel is Not Superpseudorandom Over Any Group. 675 - Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez, Benjamin Smith:

Extending the GLS endomorphism to speed up GHS Weil descent using Magma. 676 - Paul Cotan, George Teseleanu:

Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes. 677 - Dmitrii I. Koshelev:

Faster indifferentiable hashing to elliptic $\mathbb{F}_{\!q^2}$-curves. 678 - Avijit Dutta, Mridul Nandi, Suprita Talnikar:

Permutation Based EDM: An Inverse Free BBB Secure PRF. 679 - (Withdrawn) Efficient Attribute Based Encryption for Boolean Circuits. 680

- Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:

Learnability of Multiplexer PUF and SN-PUF : A Fourier-based Approach. 681 - Ian McQuoid, Mike Rosulek, Lawrence Roy:

Batching Base Oblivious Transfers. 682 - Tânia Esteves, Mariana Miranda, João Paulo, Bernardo Portela:

S2Dedup: SGX-enabled Secure Deduplication. 683 - Nicholas Brandt:

Tight Setup Bounds for Identifiable Abort. 684 - Melissa Azouaoui

, Kostas Papagiannopoulos, Dominik Zürner:
Blind Side-Channel SIFA. 685 - Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin:

Meteor: Cryptographically Secure Steganography for Realistic Distributions. 686 - Hanshen Xiao, Srinivas Devadas:

Towards Understanding Practical Randomness Beyond Noise: Differential Privacy and Mixup. 687 - Geoffroy Couteau, Shuichi Katsumata, Elahe Sadeghi, Bogdan Ursu:

Statistical ZAPs from Group-Based Assumptions. 688 - Ripon Patgiri:

OSHA: A General-purpose One-way Secure Hash Algorithm. 689 - Aarushi Goel, Abhishek Jain

, Manoj Prabhakaran, Rajeev Raghunath:
On Communication Models and Best-Achievable Security in Two-Round MPC. 690 - Andrey Kim, Maxim Deryabin, Jieun Eom, Rakyong Choi, Yongwoo Lee, Whan Ghang, Donghoon Yoo:

General Bootstrapping Approach for RLWE-based Homomorphic Encryption. 691 - Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha

:
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. 692 - Mark Fischer, Fabian Langer, Johannes Mono, Clemens Nasenberg, Nils Albartus:

Hardware Penetration Testing Knocks Your SoCs Off. 693 - Ignacio Cascudo, Emanuele Giunta:

On Interactive Oracle Proofs for Boolean R1CS Statements. 694 - Atsushi Takayasu:

Adaptively Secure Lattice-based Revocable IBE in the QROM: Compact Parameters, Tight Security, and Anonymity. 695 - Edward Eaton, Douglas Stebila:

The "quantum annoying" property of password-authenticated key exchange protocols. 696 - Deepak Maram, Iddo Bentov, Mahimna Kelkar, Ari Juels:

GoAT: File Geolocation via Anchor Timestamping. 697 - Masahito Ishizaka, Shinsaku Kiyomoto:

Multi-Dimensional Sub/Super-Range Signatures. 698 - Hiroshi Onuki, Tomoki Moriya:

Radical Isogenies on Montgomery Curves. 699 - Robi Pedersen:

DeCSIDH: Delegating isogeny computations in the CSIDH setting. 700 - Samir Bouftass:

Multidimentional ModDiv public key exchange protocol. 701 - Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord:

Symmetric Key Exchange with Full Forward Security and Robust Synchronization. 702 - Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham:

Quantum Multi-Collision Distinguishers. 703 - Elli Androulaki, Ilie Circiumaru, Jesus Diaz Vico, Miguel Prada, Alessandro Sorniotti, Marc Ph. Stoecklin, Marko Vukolic, Marie Wallace:

IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status. 704 - Yi Chen, Hongbo Yu:

Bridging Machine Learning and Cryptanalysis via EDLCT. 705 - Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso:

Cryptanalysis of an oblivious PRF from supersingular isogenies. 706 - Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot:

Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation. 707 - Paul Grubbs, Varun Maram, Kenneth G. Paterson:

Anonymous, Robust Post-Quantum Public Key Encryption. 708 - Rishab Goyal, Ridwan Syed, Brent Waters:

Bounded Collusion ABE for TMs from IBE. 709 - Yuncong Zhang, Ren Zhang, Geng Wang, Dawu Gu:

VCProof: Constructing Shorter and Faster-to-Verify zkSNARKs with Vector Oracles. 710 - Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider, Christine van Vredendaal:

The Matrix Reloaded: Multiplication Strategies in FrodoKEM. 711 - Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim:

DEFAULT: Cipher Level Resistance Against Differential Fault Attack. 712 - Elie Bouscatié, Guilhem Castagnos, Olivier Sanders:

Public Key Encryption with Flexible Pattern Matching. 713 - Afifa Ishtiaq

, Muhammad Shafique, Osman Hassan:
CARiMoL: A Configurable Hardware Accelerator for Ringand Module Lattice-Based Post-Quantum Cryptography. 714 - Dionysis Zindros:

Hours of Horus: Keyless Cryptocurrency Wallets. 715 - Angèle Bossuat, Raphael Bost, Pierre-Alain Fouque, Brice Minaud, Michael Reichle:

SSE and SSD: Page-Efficient Searchable Symmetric Encryption. 716 - Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek:

Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis. 717 - Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy:

Generic Side-Channel Assisted Chosen-Ciphertext Attacks on Streamlined NTRU Prime. 718 - Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu:

Conditional Differential-Neural Cryptanalysis. 719 - Lukasz Chmielewski, Leo Weissbart:

On Reverse Engineering Neural Network Implementation on GPU. 720 - Sulamithe Tsakou, Sorina Ionica:

Index Calculus Attacks on Hyperelliptic Jacobians with Effective Endomorphisms. 721 - Yusaku Maeda, Koji Nuida:

Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption. 722 - Haopeng Fan, Wenhao Wang, Yongjuan Wang:

Cache attack on MISTY1. 723 - Mohammad Sadeq Dousti, Alptekin Küpçü:

Tri-op redactable blockchains with block modification, removal, and insertion. 724 - Felix Günther, Patrick Towa:

KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip. 725 - Navid Nasr Esfahani, Douglas R. Stinson:

Asymmetric All-or-nothing Transforms. 726 - Ghada Almashaqbeh, Ravital Solomon:

SoK: Privacy-Preserving Computing in the Blockchain Era. 727 - Navid Alamati, Pedro Branco, Nico Döttling, Sanjam Garg

, Mohammad Hajiabadi, Sihang Pu:
Laconic Private Set Intersection and Applications. 728 - Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap:

Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for TFHE. 729 - Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, Xiao Wang:

Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning. 730 - Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch:

Pasta: A Case for Hybrid Homomorphic Encryption. 731 - Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:

Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems. 732 - Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev:

GenoPPML - a framework for genomic privacy-preserving machine learning. 733 - Siemen Dhooghe, Svetla Nikova, Vincent Rijmen:

First-Order Hardware Sharings of the AES. 734 - Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, Greg Zaverucha

:
Side-Channel Protections for Picnic Signatures. 735 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID