


default search action
IACR Cryptology ePrint Archive, Volume 2022
Volume 2022, 2022
- Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. 1 - (Withdrawn) Polynomial-Time Key Recovery Attack on the Lau-Tan Cryptosystem Based on Gabidulin Codes. 2
- Rutchathon Chairattana-Apirom, Anna Lysyanskaya:
Compact Cut-and-Choose: Boosting the Security of Blind Signature Schemes, Compactly. 3 - Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
Publicly verifiable anonymous tokens with private metadata bit. 4 - Josef Pieprzyk, Marcin Pawlowski, Pawel Morawiecki, Arash Mahboubi, Jarek Duda, Seyit Camtepe:
Pseudorandom Bit Generation with Asymmetric Numeral Systems. 5 - Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plançon:
Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures. 6 - Benedikt Wagner, Lucjan Hanzlik, Julian Loss:
PI-Cut-Choo! Parallel Instance Cut and Choose for Practical Blind Signatures. 7 - Jiahui Liu, Qipeng Liu, Luowen Qian:
Beating Classical Impossibility of Position Verification. 8 - Abhiram Kothapalli, Bryan Parno:
Algebraic Reductions of Knowledge. 9 - Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen:
Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks. 10 - Alfredo Rial, Ania M. Piotrowska:
Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance. 11 - Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica:
Security of Identity-based Encryption Schemes from Quadratic Residues. 12 - Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak. 13 - Hyunji Kim, Sejin Lim, Yeajun Kang, Won-Woong Kim, Hwajeong Seo:
Transformer encoder-based Crypto-Ransomware Detection for Low-Power Embedded Processors. 14 - Jiaxin Pan, Benedikt Wagner:
Lattice-based Signatures with Tight Adaptive Corruptions and More. 15 - Roberto La Scala, Sergio Polese, Sharwan K. Tiwari, Andrea Visconti:
An algebraic attack to the Bluetooth stream cipher E0. 16 - Shingo Sato, Keita Emura, Atsushi Takayasu:
Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation. 17 - Ahmet Ramazan Agirtas, Oguz Yayla:
Pairing-based Accountable Subgroup Multi-signatures with Verifiable Group Setup. 18 - Fukang Liu, Gaoli Wang, Willi Meier, Santanu Sarkar, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. 19 - Sisi Duan, Haibin Zhang:
PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement. 20 - Sisi Duan, Haibin Zhang, Boxin Zhao:
WaterBear: Information-Theoretic Asynchronous BFT Made Practical. 21 - Xiuju Huang, Jiashuo Song, Zichen Li:
Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation. 22 - Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi:
Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits. 23 - Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation. 24 - Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. 25 - Andrada-Teodora Ciulei, Marian-Codrin Cretu, Emil Simion:
Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective. 26 - Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice. 27 - Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein:
Locality-Preserving Hashing for Shifts with Connections to Cryptography. 28 - Amit Choudhari, Sylvain Guilley, Khaled Karray
:
CRYScanner: Finding cryptographic libraries misuse. 29 - Jinyu Lu, Guoqiang Liu, Yunwen Liu, Bing Sun, Chao Li, Li Liu:
Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK. 30 - Pierre-Alain Fouque, Paul Kirchner, Thomas Pornin, Yang Yu:
BAT: Small and Fast KEM over NTRU Lattices. 31 - Denis Firsov, Sven Laur, Ekaterina Zhuchko:
Formal Analysis of Non-Malleability for Commitments in EasyCrypt. 32 - Jonathan Godin, Philippe Lamontagne:
Deletion-Compliance in the Absence of Privacy. 33 - Varun Madathil, Chris Orsini, Alessandra Scafuro, Daniele Venturi:
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic. 34 - Vipul Goyal, Justin Raizes, Pratik Soni:
Time-Traveling Simulators Using Blockchains and Their Applications. 35 - Melissa Azouaoui
, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider, François-Xavier Standaert:
Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber. 36 - Dmitrii I. Koshelev:
Subgroup membership testing on elliptic curves via the Tate pairing. 37 - Antonio de la Piedra, Marloes Venema, Greg Alpár:
ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption. 38 - Ambili K. N, Jimmy Jose:
Outsourced CP-ABE with Whitebox Accountability in IoT Systems. 39 - Ambili K. N, Jimmy Jose:
Ensuring Accountability and Outsourced Decryption in IoT Systems using Ciphertext-Policy Attribute-Based Encryption. 40 - Ambili K. N, Jimmy Jose:
Reinforcing Lightweight Authenticated Encryption Schemes against Statistical Ineffective Fault Attack. 41 - Ambili K. N, Jimmy Jose:
Inapplicability of Differential Fault Attacks against Cellular Automata based Lightweight Authenticated Cipher. 42 - Konstantinos Chalkias, Panagiotis Chatzigiannis, Yan Ji:
Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges. 43 - Atakan Arslan, Muhammed Ali Bingöl:
Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes. 44 - Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud:
Probing Security through Input-Output Separation and Revisited Quasilinear Masking. 45 - Keita Emura, Kaisei Kajita, Ryo Nojima, Kazuto Ogawa, Go Ohtake:
Membership Privacy for Asynchronous Group Messaging. 46 - Stefano Tessaro, Chenzhi Zhu:
Short Pairing-Free Blind Signatures with Exponential Security. 47 - Nadia Heninger:
RSA, DH, and DSA in the Wild. 48 - Maria Eichlseder, Ahmet Can Mert, Christian Rechberger, Markus Schofnegger:
Small MACs from Small Permutations. 49 - Asep Muhamad Awaludin, Harashta Tatimma Larasati, Howon Kim:
High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA. 50 - Weikeng Chen, Thang Hoang, Jorge Guajardo, Attila A. Yavuz:
Titanium: A Metadata-Hiding File-Sharing System with Malicious Security. 51 - Sourav Das, Zhuolun Xiang, Ling Ren:
Balanced Quadratic Reliable Broadcast and Improved Asynchronous Verifiable Information Dispersal. 52 - Aron Gohr:
Brute Force Cryptanalysis. 53 - Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluderovic, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso:
SIKE Channels. 54 - Xiaokang Dai, Wenyuan Wu, Yong Feng:
Key lifting : a more efficient weak MKFHE scheme in the plain model against rational adversary. 55 - Itay Tsabary, Alex Manuskin, Ittay Eyal:
LedgerHedger: Gas Reservation for Smart-Contract Security. 56 - Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi:
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon. 57 - Daniel Heinz, Matthias J. Kannwischer, Georg Land, Thomas Pöppelmann, Peter Schwabe, Amber Sprenkels:
First-Order Masked Kyber on ARM Cortex-M4. 58 - Kaiyi Zhang, Hongrui Cui, Yu Yu:
SPHINCS-α: A Compact Stateless Hash-Based Signature Scheme. 59 - Paul Frixons, María Naya-Plasencia, André Schrottenloher:
Quantum Boomerang Attacks and Some Applications. 60 - Nicu Neculache, Vlad-Andrei Petcu, Emil Simion:
A remark on the NIST 800-22 Binary Matrix Rank Test. 61 - Daniel Escudero:
An Introduction to Secret-Sharing-Based Secure Multiparty Computation. 62 - Kang Yang, Xiao Wang:
Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers. 63 - Françoise Levy-dit-Vehel, Maxime Roméas:
A Framework for the Design of Secure and Efficient Proofs of Retrievability. 64 - Nimrod Aviram, Benjamin Dowling, Ilan Komargodski, Kenneth G. Paterson, Eyal Ronen, Eylon Yogev:
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS. 65 - Anghel Florin, Asandoaiei David, Tabacaru Robert:
A remark on the Discrete Fourier Transform statistical test. 66 - Jakub Klemsa, Melek Önen:
Parallel Operations over TFHE-Encrypted Multi-Digit Integers. 67 - Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Updatable Public Key Encryption in the Standard Model. 68 - Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Small-Box Cryptography. 69 - Marshall Ball
, Dana Dachman-Soled, Julian Loss:
(Nondeterministic) Hardness vs. Non-Malleability. 70 - Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor:
Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable. 71 - Keita Emura:
Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction. 72 - Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide:
Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain. 73 - Charlotte Bonte, Ilia Iliashenko, Jeongeun Park, Hilder V. L. Pereira, Nigel P. Smart:
FINAL: Faster FHE instantiated with NTRU and LWE. 74 - Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, Aniket Kate:
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets. 75 - Ertem Nusret Tas, David Tse, Fisher Yu, Sreeram Kannan:
Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security. 76 - Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer:
Multiple Noisy Private Remote Source Observations for Secure Function Computation. 77 - Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer:
Secure Lossy Function Computation with Multiple Private Remote Source Observations. 78 - Thijs Veugen:
Lightweight Secure Integer Comparison. 79 - Yu Long Chen, Stefano Tessaro:
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation. 80 - Henry Corrigan-Gibbs, Alexandra Henzinger, Dmitry Kogan:
Single-Server Private Information Retrieval with Sublinear Amortized Time. 81 - Carsten Baum, Robin Jadoul, Emmanuela Orsini, Peter Scholl, Nigel P. Smart:
Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs. 82 - Mathieu Baudet, Alberto Sonnino, Mahimna Kelkar, George Danezis:
Zef: Low-latency, Scalable, Private Payments. 83 - Lucjan Hanzlik, Julian Loss, Benedikt Wagner:
Token meets Wallet: Formalizing Privacy and Revocation for FIDO2. 84 - Axin Wu, Jian Weng, Weiqi Luo, Anjia Yang, Jia-Nan Liu, Zike Jiang:
Cross-Domain Identity-based Matchmaking Encryption. 85 - Luke Pearson, Joshua Brian Fitzgerald, Héctor Masip, Marta Bellés-Muñoz, Jose Luis Muñoz-Tapia:
PlonKup: Reconciling PlonK with plookup. 86 - The DFINITY Team:
The Internet Computer for Geeks. 87 - Stefania Andries, Andrei-Daniel Miron, Andrei Cristian, Emil Simion:
A survey on the security protocols employed by mobile messaging applications. 88 - Kamil Kluczniak:
NTRU-ν-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus. 89 - Francesca Falzon, Evangelia Anna Markatou, Zachary Espiritu, Roberto Tamassia:
Attacks on Encrypted Range Search Schemes in Multiple Dimensions. 90 - Thomas Häner, Mathias Soeken:
The multiplicative complexity of interval checking. 91 - N. Nalla Anandakumar, M. Sazadur Rahman, Mridha Md Mashahedur Rahman, Rasheed Kibria, Upoma Das, Farimah Farahmandi, Fahim Rahman, Mark M. Tehranipoor:
Rethinking Watermark: Providing Proof of IP Ownership in Modern SoCs. 92 - Andrej Bogdanov, Miguel Cueto Noval, Charlotte Hoffmann, Alon Rosen:
Public-Key Encryption from Continuous LWE. 93 - Nir Drucker, Tomer Pelleg:
Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies. 94 - Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk:
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More. 95 - Karim Eldefrawy, Nicholas Genise, Rutuja Kshirsagar, Moti Yung:
On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications. 96 - Dingfeng Ye, Jun Xu, Guifang Huang, Lei Hu:
Lattice Signature can be as Simple as Lattice Encryption. 97 - Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orienteering with one endomorphism. 98 - Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha:
Performance of Hierarchical Transforms in Homomorphic Encryption: A case study on Logistic Regression inference. 99 - Funda Özdemir, Çetin Kaya Koç:
Development of Cryptography since Shannon. 100 - Mingxing Hu, Zhen Liu:
Lattice-Based Linkable Ring Signature in the Standard Model. 101 - Nitin Agrawal, James Bell, Adrià Gascón, Matt J. Kusner:
MPC-Friendly Commitments for Publicly Verifiable Covert Security. 102 - (Withdrawn) E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System. 103
- Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang:
Minotaur: Multi-Resource Blockchain Consensus. 104 - Varun Madathil, Alessandra Scafuro, Kemafor Anyanwu, Sen Qiao, Akash Pateria, Binil Starly:
Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces. 105 - Soundes Marzougui, Vincent Ulitzsch, Mehdi Tibouchi, Jean-Pierre Seifert:
Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All. 106 - Aydin Abadi, Steven J. Murdoch:
Payment with Dispute Resolution: A Protocol For Reimbursing Frauds' Victims. 107 - Rohon Kundu, Alessandro De Piccoli, Andrea Visconti:
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method. 108 - Ananya Appan, Anirudh Chandramouli, Ashish Choudhury:
Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees. 109 - Jan-Pieter D'Anvers, Michiel Van Beirendonck, Ingrid Verbauwhede:
Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-sliced Implementations. 110 - Christina Boura, Rachelle Heim Boissier, Yann Rotella:
Breaking Panther. 111 - Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, Amber Sprenkels:
Faster Kyber and Dilithium on the Cortex-M4. 112 - Theodore Bugnet, Alexei Zamyatin:
XCC: Theft-Resilient and Collateral-Optimized Cryptocurrency-Backed Assets. 113 - Ziaur Rahman, Xun Yi, Ibrahim Khalil
:
Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat. 114 - Zilin Liu, Anjia Yang, Jian Weng, Tao Li, Huang Zeng, Xiaojian Liang:
GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks. 115 - Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version). 116 - Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu:
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains. 117 - Vitaly Kiryukhin:
Streebog compression function as PRF in secret-key settings. 118 - Ambati Sathvik, Tirunagari Rahul, Anubhab Baksi, Vikramkumar Pudi:
Hardware Implementation of SpoC-128. 119 - Florette Martinez:
Practical Seed Recovery of Fast Cryptographic Pseudo Random Number Generators. 120 - Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui
, Jovan Komatovic, Zarko Milosevic, Adi Seredinschi:
Crime and Punishment in Distributed Byzantine Decision Tasks. 121 - Alexandru Gheorghiu, Tony Metger, Alexander Poremba:
Quantum cryptography with classical communication: parallel remote state preparation for copy-protection, verification, and more. 122 - Subhra Mazumdar, Sushmita Ruj:
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments. 123 - Dor Salomon, Itamar Levi:
On the Performance Gap of a Generic C Optimized Assembler and Wide Vector Extensions for Masked Software with an Ascon-{\it{p}} test case. 124 - Brice Colombier, Vlad-Florin Dragoi, Pierre-Louis Cayrel, Vincent Grosso:
Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem. 125 - Andrei-Alexandru Brebu, Mihai Iacov, Emil Simion:
Storage Security in Cloud Computing: Data Auditing Protocols. 126 - Gyu-Chol Kim, Jae-Yong Sin, Yong-Bok Jong:
CCA secure ElGamal encryption over an integer group where ICDH assumption holds. 127 - Pierre Karpman, Charlotte Lefevre:
Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes. 128 - Michael Gruber, Georg Sigl:
TOFU - Toggle Count Analysis made simple. 129 - Gideon Samid:
A LeVeL Paying Field: Cryptographic Solutions towards Social Accountability and Financial Inclusion. 130 - Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange. 131 - Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo, Hoover H. F. Yin:
On Defeating Graph Analysis of Anonymous Transactions. 132 - Eduardo Lopes Cominetti, Marcos Vinicius M. Silva, Marcos A. Simplício Jr., Harsh Kupwade Patil, Jefferson E. Ricardini:
Faster verification of V2X BSM messages via Message Chaining. 133 - Emanuele Bellini, Rusydi H. Makarim:
Functional Cryptanalysis: Application to reduced-round Xoodoo. 134 - Zheng Xu, Yongqiang Li, Lin Jiao, Mingsheng Wang, Willi Meier:
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers. 135 - Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad:
Twilight: A Differentially Private Payment Channel Network. 136 - Marco Cianfriglia, Elia Onofri, Silvia Onofri, Marco Pedicini:
Ten years of cube attacks. 137 - Pierre Galissant, Louis Goubin:
Resisting Key-Extraction and Code-Compression: a Secure Implementation of the HFE Signature Scheme in the White-Box Model. 138 - Christian Janson, Patrick Struck:
Sponge-based Authenticated Encryption: Security against Quantum Attackers. 139 - Sebastian Faust, Juliane Krämer, Maximilian Orlt, Patrick Struck:
On the Related-Key Attack Security of Authenticated Encryption Schemes. 140 - Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, Sushmita Ruj:
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs. 141 - Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao:
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications. 142 - Guangpu Gao, Weiguo Zhang, Yongjuan Wang:
Composition construction of new bent functions from known dually isomorphic bent functions. 143 - Ziqi Zhou, Onur Günlü, Rafael G. L. D'Oliveira, Muriel Médard, Parastoo Sadeghi, Rafael F. Schaefer:
Rainbow Differential Privacy. 144 - Yasufumi Hashimoto:
An elementary construction of QR-UOV. 145 - Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Martine De Cock:
Training Differentially Private Models with Secure Multiparty Computation. 146 - Amar Bapic, Enes Pasalic, Fengrong Zhang, Samir Hodzic:
Constructing new superclasses of bent functions from known ones. 147 - Thomas Johansson, Willi Meier, Vu Nguyen:
Attacks on the Firekite cipher. 148 - Pierre-Emmanuel Clet, Martin Zuber, Aymen Boudguiga, Renaud Sirdey, Cédric Gouy-Pailler:
Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping. 149 - Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography. 150 - Ling Sun, Wei Wang, Meiqin Wang:
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. 151 - Minjoo Sim, Siwoo Eum, Gyeongju Song, Hyeokdong Kwon, Kyungbae Jang, Hyunjun Kim, HyunJi Kim, Yujin Yang, Won-Woong Kim, Wai-Kong Lee, Hwajeong Seo:
K-XMSS and K-SPHINCS+: Hash based Signatures with\\Korean Cryptography Algorithms. 152 - Gora Adj, Jesús-Javier Chi-Domínguez, Víctor Mateu, Francisco Rodríguez-Henríquez:
Faulty isogenies: a new kind of leakage. 153 - Ishtiyaque Ahmad, Laboni Sarker, Divyakant Agrawal, Amr El Abbadi, Trinabh Gupta:
Coeus: A System for Oblivious Document Ranking and Retrieval. 154 - Conor McMenamin, Vanesa Daza, Matthias Fitzi:
FairTraDEX: A Decentralised Exchange Preventing Value Extraction. 155 - Benjamin Y. Chan, Cody Freitag, Rafael Pass:
Cosmic Security. 156 - Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu:
Shuffle-based Private Set Union: Faster and More Secure. 157 - Olivier Bronchain, Gaëtan Cassiers:
Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs. 158 - (Withdrawn) A Note on Blockchain Authentication Methods For Mobile Devices In Healthcare. 159
- Pascal Giorgi, Bruno Grenet, Armelle Perret du Cray, Daniel S. Roche:
Random primes in arithmetic progressions. 160 - Easwar Vivek Mangipudi, Aniket Kate:
D-KODE: Mechanism to Generate and Maintain a Billion Keys. 161 - Anamaria Costache, Benjamin R. Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie, Rachel Player:
On the precision loss in approximate homomorphic encryption. 162 - James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula:
A High Performance Payment Processing System Designed for Central Bank Digital Currencies. 163 - Yunzhou Yan, Yu Xia, Srinivas Devadas:
Shanrang: Fully Asynchronous Proactive Secret Sharing with Dynamic Committees. 164 - Durba Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
PAC Learnability of iPUF Variants. 165 - Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti:
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges. 166 - Benny Applebaum, Eliran Kachlon, Arpita Patra:
Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority. 167 - Gal Arnon, Alessandro Chiesa, Eylon Yogev:
Hardness of Approximation for Stochastic Problems via Interactive Oracle Proofs. 168 - Markku-Juhani O. Saarinen:
NIST SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful. 169 - Foteini Baldimtsi, Panagiotis Chatzigiannis, S. Dov Gordon, Phi Hung Le, Daniel McVicker:
gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies. 170 - Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haibin Zhang:
Practical and Improved Byzantine Reliable Broadcast and Asynchronous Verifiable Information Dispersal from Hash Functions. 171 - Corina-Elena Bogos, Razvan Mocanu, Emil Simion:
A remark on NIST SP 800-22 serial test. 172 - Ron D. Rothblum, Prashant Nalini Vasudevan:
Collision-Resistance from Multi-Collision-Resistance. 173 - Jiangshan Long, Changhai Ou, Yajun Ma, Yifan Fan, Hua Chen, Shihui Zheng:
How to Launch a Powerful Side-Channel Collision Attack? 174 - Roi Bar Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar:
WeRLman: To Tackle Whale (Transactions), Go Deep (RL). 175 - Minze Xu, Yuan Zhang, Sheng Zhong:
Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems. 176 - Mingxun Zhou, Elaine Shi:
The Power of the Differentially Oblivious Shuffle in Distributed Privacy Mechanisms. 177 - Iftach Haitner, Daniel Nukrai, Eylon Yogev:
Lower Bound on SNARGs in the Random Oracle Model. 178 - Rishab Goyal, Vinod Vaikuntanathan:
Locally Verifiable Signature and Key Aggregation. 179 - Orel Cosseron, Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert:
Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher. 180 - Thomas Attema, Ignacio Cascudo, Ronald Cramer, Ivan Bjerre Damgård, Daniel Escudero:
Vector Commitments over Rings and Compressed Σ-Protocols. 181 - Si Gao, Elisabeth Oswald:
A Novel Framework for Explainable Leakage Assessment. 182 - Liu Zhang, Zilong Wang, Boyang Wang:
Improving Differential-Neural Cryptanalysis with Inception Blocks. 183 - Jian Guo, Guozhen Liu, Ling Song, Yi Tu:
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3. 184 - Nir Bitansky, Sapir Freizeit:
Statistically Sender-Private OT from LPN and Derandomization. 185 - Seunghwan Lee, Dong-Joon Shin:
Overflow-detectable Floating-point Fully Homomorphic Encryption. 186 - Sebastian Kolby, Divya Ravi, Sophia Yakoubov:
Towards Efficient YOSO MPC Without Setup. 187 - Thibauld Feneuil, Antoine Joux, Matthieu Rivain:
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs. 188 - André Schrottenloher, Marc Stevens:
Simplified MITM Modeling for Permutations: New (Quantum) Attacks. 189 - Arasu Arun, Joseph Bonneau, Jeremy Clark:
Short-lived zero-knowledge proofs and signatures. 190 - Andrew Park, Wei-Kai Lin, Elaine Shi:
NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead. 191 - Lawrence Roy:
SoftSpokenOT: Communication-Computation Tradeoffs in OT Extension. 192 - Adithya Bhat, Aniket Kate, Kartik Nayak, Nibesh Shrestha:
OptRand: Optimistically responsive distributed random beacons. 193 - Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov:
Finding Collisions against 4-round SHA3-384 in Practical Time. 194 - Richard Allen, Ratip Emin Berker, Sílvia Casacuberta, Michael Gul:
Quantum and Classical Algorithms for Bounded Distance Decoding. 195 - Ariana Goh, Chu-Wee Lim, Yan Bo Ti:
Generalising Fault Attacks to Genus Two Isogeny Cryptosystems. 196 - Charles Bouillaguet:
Nice Attacks - but What is the Cost? Computational Models for Cryptanalysis. 197 - Yongwoo Lee, Daniele Micciancio, Andrey Kim, Rakyong Choi, Maxim Deryabin, Jieun Eom, Donghoon Yoo:
Efficient FHEW Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption. 198 - Giang Linh Duc Nguyen, Dung Hoang Duong, Huy Quoc Le, Willy Susilo:
Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing. 199 - Akshayaram Srinivasan:
Non-Black-Box Approach to Secure Two-Party Computation in Three Rounds. 200 - Simon Holmgaard Kamp, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi:
Enig: Player Replaceable Finality Layers with Optimal Validity. 201 - Abdelrahaman Aly, Kashif Nawaz, Eugenio Salazar, Victor Sucasas:
Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLU's. 202 - Jean-Charles Faugère, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret:
A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV. 203 - Furkan Aydin, Emre Karabulut, Seetal Potluri, Erdem Alkim, Aydin Aysu:
RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library. 204 - Dipayan Das, Antoine Joux, Anand Kumar Narayanan:
Fiat-Shamir signatures without aborts using Ring-and-Noise assumptions. 205 - Ning Luo, Timos Antonopoulos, William R. Harris, Ruzica Piskac, Eran Tromer, Xiao Wang:
Proving UNSAT in Zero Knowledge. 206 - Zhicong Huang, Wen-jie Lu, Cheng Hong, Jiansheng Ding:
Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. 207 - Alon Shakevsky, Eyal Ronen, Avishai Wool:
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design. 208 - ZiXi Hee, Iftekhar Salam:
Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection. 209 - Jonathan Katz, Cong Zhang, Hong-Sheng Zhou:
An Analysis of the Algebraic Group Model. 210 - Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh:
Azeroth: Auditable Zero-knowledge Transactions in Smart Contracts. 211 - Boyue Fang, Weize Wang, Yunlei Zhao:
Tight Analysis of Decrypton Failure Probability of Kyber in Reality. 212 - Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, Kai Samelin:
Issuer-Hiding Attribute-Based Credentials. 213 - Ward Beullens:
Breaking Rainbow Takes a Weekend on a Laptop. 214 - Ky Nguyen, Duong Hieu Phan, David Pointcheval:
Multi-Client Functional Encryption with Fine-Grained Access Control. 215 - Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar:
Short Leakage Resilient and Non-malleable Secret Sharing Schemes. 216 - Luke Beckwith, Duc Tri Nguyen, Kris Gaj:
High-Performance Hardware Implementation of Lattice-Based Digital Signatures. 217 - Per Austrin, Hao Chung, Kai-Min Chung, Shiuan Fu, Yao-Ting Lin, Mohammad Mahmoody:
On the Impossibility of Key Agreements from Quantum Random Oracles. 218 - Hanyu Jia, Xiangxue Li:
PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication. 219 - Keita Emura, Shiho Moriai, Takuma Nakajima, Masato Yoshimi:
Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security. 220 - Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer, Aylin Yener:
Secure Joint Communication and Sensing. 221 - Yanbo Chen, Yunlei Zhao:
Half-Aggregation of Schnorr Signatures with Tight Reductions. 222 - Thibauld Feneuil, Jules Maire, Matthieu Rivain, Damien Vergnaud:
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection. 223 - Daniel Rausch, Ralf Küsters, Céline Chevalier:
Embedding the UC Model into the IITM Model. 224 - Monika Henzinger, Jalaj Upadhyay:
Constant matters: Fine-grained Complexity of Differentially Private Continual Observation Using Completely Bounded Norms. 225 - Mark Zhandry:
To Label, or Not To Label (in Generic Groups). 226 - Ben Nassi, Ras Swissa, Yuval Elovici, Boris Zadov:
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects. 227 - Omri Shmueli:
Semi-Quantum Tokenized Signatures. 228 - Markku-Juhani O. Saarinen:
WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography. 229 - Gregor Haas, Aydin Aysu:
Apple vs. EMA: Electromagnetic Side Channel Attacks on Apple CoreCrypto. 230 - Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang:
Towards Low-Latency Implementation of Linear Layers. 231 - Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli:
Conditional Variational AutoEncoder based on Stochastic Attack. 232 - Martin R. Albrecht, Milos Prokop, Yixin Shen, Petros Wallden:
Variational quantum solutions to the Shortest Vector Problem. 233 - Luca De Feo, Antonin Leroux, Benjamin Wesolowski:
New algorithms for the Deuring correspondence: SQISign twice as fast. 234 - Giuseppe Persiano, Kevin Yeo:
Limits of Preprocessing for Single-Server PIR. 235 - Tristan Nemoz, Zoé Amblard, Aurélien Dupin:
Characterizing the qIND-qCPA (in)security of the CBC, CFB, OFB and CTR modes of operation. 236 - Jesper Buus Nielsen, João Ribeiro, Maciej Obremski:
Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions. 237 - Lijing Zhou, Ziyu Wang, Xiao Zhang, Yu Yu:
HEAD: an FHE-based Outsourced Computation Protocol with Compact Storage and Efficient Computation. 238 - Ziyu Zhao, Jintai Ding:
Several Improvements on BKZ Algorithm. 239 - Hamza Abusalah, Georg Fuchsbauer, Peter Gazi, Karen Klein:
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients. 240 - John Kelsey, Stefan Lucks:
Coalition and Threshold Hash-Based Signatures. 241 - Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring:
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model. 242 - Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang:
A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis. 243 - Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, Daniele Venturi:
Universally Composable Subversion-Resilient Cryptography. 244 - Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen:
Entropic Hardness of Module-LWE from Module-NTRU. 245 - Hannah Davis, Denis Diemert, Felix Günther, Tibor Jager:
On the Concrete Security of TLS 1.3 PSK Mode. 246 - Aldo Gunsing, Joan Daemen, Bart Mennink:
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model. 247 - Aldo Gunsing, Bart Mennink:
Collapseability of Tree Hashes. 248 - Aldo Gunsing, Bart Mennink:
The Summation-Truncation Hybrid: Reusing Discarded Bits for Free. 249 - Vipul Goyal, Yuval Ishai, Yifan Song:
Private Circuits with Quasilinear Randomness. 250 - Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter:
CoCoA: Concurrent Continuous Group Key Agreement. 251 - Charles Momin, Gaëtan Cassiers, François-Xavier Standaert:
Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations. 252 - Kostas Papagiannopoulos, Ognjen Glamocanin, Melissa Azouaoui
, Dorian Ros, Francesco Regazzoni, Mirjana Stojilovic:
The Side-Channel Metric Cheat Sheet. 253 - Charles Momin, Gaëtan Cassiers, François-Xavier Standaert:
Unprotected and Masked Hardware Implementations of Spook v2. 254 - Diana Ghinea, Vipul Goyal, Chen-Da Liu-Zhang:
Round-Optimal Byzantine Agreement. 255 - Ueli Maurer, Christopher Portmann, Guilherme Rito:
Multi-Designated Receiver Signed Public Key Encryption. 256 - Ran Cohen, Jack Doerner, Yashvanth Kondi, Abhi Shelat:
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols. 257 - Hasan Al Shaikh, Mohammad Bin Monjil, Shigang Chen, Farimah Farahmandi, Navid Asadizanjani, Mark M. Tehranipoor, Fahim Rahman:
Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications. 258 - Andre Esser, Alexander May, Javier A. Verbel, Weiqiang Wen:
Partial Key Exposure Attacks on BIKE, Rainbow and NTRU. 259 - Hadi Mardani Kamali, Kimia Zamiri Azar, Farimah Farahmandi, Mark M. Tehranipoor:
Advances in Logic Locking: Past, Present, and Prospects. 260 - Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof:
Sublinear GMW-Style Compiler for MPC with Preprocessing. 261 - Pratyush Agarwal, Varun Narayanan, Shreya Pathak, Manoj Prabhakaran, Vinod M. Prabhakaran, Mohammad Ali Rehan:
Secure Non-Interactive Reduction and Spectral Analysis of Correlations. 262 - Vidal Attias, Luigi Vigneri, Vassil S. Dimitrov:
Rethinking Modular Multi-Exponentiation in Real-World Applications. 263 - Ittai Abraham, Gilad Asharov:
Gradecast in Synchrony and Reliable Broadcast in Asynchrony with Optimal Resilience, Efficiency, and Unconditional Security. 264 - Georg Fuchsbauer, Michele Orrù:
Non-interactive Mimblewimble transactions, revisited. 265 - Likang Lu, Jianzhu Lu:
Verifiably Distributed Multi-User Secret Sharing schemes. 266 - Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo:
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms. 267 - Mihir Bellare, Viet Tung Hoang:
Efficient Schemes for Committing Authenticated Encryption. 268 - Maxime Bombar, Alain Couvreur, Thomas Debris-Alazard:
ON CODES AND LEARNING WITH ERRORS OVER FUNCTION FIELDS. 269 - Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM. 270 - Alexander May, Julian Nowakowski, Santanu Sarkar:
Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents. 271 - Shingo Sato, Junji Shikata:
Quantum-Secure Aggregate One-time Signatures with Detecting Functionality. 272 - Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald:
Compact Storage for Homomorphic Encryption. 273 - Thomas Pornin:
EcGFp5: a Specialized Elliptic Curve. 274 - Neal Koblitz, Subhabrata Samajder, Palash Sarkar, Subhadip Singha:
Concrete Analysis of Approximate Ideal-SIVP to Decision Ring-LWE Reduction. 275 - Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Hardness estimates of the Code Equivalence Problem in the Rank Metric. 276 - Robin Salen, Vijaykumar Singh, Vladimir Soukharev:
Security Analysis of Elliptic Curves over Sextic Extension of Small Prime Fields. 277 - Iftach Haitner, Noam Mazor, Jad Silbak:
Incompressiblity and Next-Block Pseudoentropy. 278 - Tron Omland, Pantelimon Stanica:
Permutation rotation-symmetric Sboxes, liftings and affine equivalence. 279 - Jung Hee Cheon, Wootae Kim, Jai Hyun Park:
Efficient Homomorphic Evaluation on Large Interval. 280 - Shafik Nassar, Ron D. Rothblum:
Succinct Interactive Oracle Proofs: Applications and Limitations. 281 - Adi Akavia, Craig Gentry, Shai Halevi, Margarita Vald:
Achievable CCA2 Relaxation for Homomorphic Encryption. 282 - Aldo Gunsing:
Block-Cipher-Based Tree Hashing. 283 - Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plançon:
Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General. 284 - Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
Usability of Cryptocurrency Wallets Providing CoinJoin Transactions. 285 - Csanád Bertók, Andrea Huszti, Szabolcs Kovács, Norbert Oláh:
Provably Secure Identity-Based Remote Password Registration. 286 - Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
User-Perceived Privacy in Blockchain. 287 - Aaron Feickert, Aram Jivanyan:
Spats: user-defined confidential assets for the Spark transaction protocol. 288 - Joachim Neu, Ertem Nusret Tas, David Tse:
Two Attacks On Proof-of-Stake GHOST/Ethereum. 289 - Anna Lysyanskaya, Leah Namisa Rosenbloom:
Universally Composable Sigma-protocols in the Global Random-Oracle Model. 290 - Vadim Tsypyschev, Iliya Morgasov:
Provable security of CFB mode of operation with external re-keying. 291 - Michael Amar, Amit Kama, Kang Wang, Yossi Oren:
Comment on "SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices". 292 - Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov:
Minimizing Setup in Broadcast-Optimal Two Round MPC. 293 - Saikrishna Badrinarayanan, Ranjit Kumaresan, Mihai Christodorescu, Vinjith Nagaraja, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Wei Sun, Minghua Xu:
A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets. 294 - Alexander Poremba:
Quantum Proofs of Deletion for Learning with Errors. 295 - Vasyl Ustimenko:
On new results on Extremal Graph Theory, Theory of Algebraic Graphs and their applications in Cryptography and Coding Theory. 296 - Yi Deng, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie:
Promise Σ-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups. 297 - Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai:
Constructive Post-Quantum Reductions. 298 - Yanhong Fan, Muzhou Li, Chao Niu, Zhenyu Lu, Meiqin Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3. 299 - Irem Keskinkurt Paksoy, Murat Cenk:
Faster NTRU on ARM Cortex-M4 with TMVP-based multiplication. 300 - Jakub Breier, Xiaolu Hou:
How Practical are Fault Injection Attacks, Really? 301 - Sílvia Casacuberta, Julia Hesse, Anja Lehmann:
SoK: Oblivious Pseudorandom Functions. 302 - Nick Frymann, Daniel Gardham, Mark Manulis:
Unlinkable Delegation of WebAuthn Credentials. 303 - Yu Long Chen, Avijit Dutta, Mridul Nandi:
Multi-User BBB Security of Public Permutations Based MAC. 304 - Ben Smyth, Michael R. Clarkson:
Surveying definitions of election verifiability. 305 - Marina Krcek, Thomas Ordas, Daniele Fronte, Stjepan Picek:
The More You Know: Improving Laser Fault Injection with Prior Knowledge. 306 - Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé:
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. 307 - Ittai Abraham, Danny Dolev, Ittay Eyal, Joseph Y. Halpern:
Colordag: An Incentive-Compatible Blockchain. 308 - Ashrujit Ghoshal, Ilan Komargodski:
On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgard Hashing. 309 - Muhammad ElSheikh, Amr M. Youssef:
Dispute-free Scalable Open Vote Network using zk-SNARKs. 310 - Peihan Miao, Sikhar Patranabis, Gaven J. Watson:
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE. 311 - Shahar P. Cohen, Moni Naor:
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols. 312 - Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Titouan Tanguy, Michiel Verbauwhede:
Efficient Proof of RAM Programs from Any Public-Coin Zero-Knowledge System. 313 - Zvika Brakerski, Pedro Branco, Nico Döttling, Sihang Pu:
Batch-OT with Optimal Rate. 314 - Damiano Abram, Peter Scholl:
Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN. 315 - Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions. 316 - Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei:
Thora: Atomic And Privacy-Preserving Multi-Channel Updates. 317 - Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui:
Efficient Online-friendly Two-Party ECDSA Signature. 318 - Long Meng, Liqun Chen:
A Blockchain-based Long-term Time-Stamping Scheme. 319 - Peter Rindal, Srinivasan Raghuraman:
Blazing Fast PSI from Improved OKVS and Subfield VOLE. 320 - Pieter Pauwels, Joni Pirovich, Peter Braunz, Jack Deeb:
zkKYC in DeFi: An approach for implementing the zkKYC solution concept in Decentralized Finance. 321 - Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi:
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation. 322 - Joppe W. Bos, Joost Renes, Amber Sprenkels:
Dilithium for Memory Constrained Devices. 323 - Yao Jiang Galteland, Jiaxin Pan:
Backward-Leak Uni-Directional Updatable Encryption from Public Key Encryption. 324 - Michail Moraitis, Elena Dubrova:
FPGA Design Deobfuscation by Iterative LUT Modifications at Bitstream Level. 325 - Pierre Civit, Maria Potop-Butucaru:
Composable Dynamic Secure Emulation. 326 - Arthur Beckers, Lennert Wouters, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede:
Provable Secure Software Masking in the Real-World. 327 - Lennert Wouters, Benedikt Gierlichs, Bart Preneel:
On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks. 328 - Daniel R. L. Brown:
Rolling up lattice cryptography primes. 329 - Rachit Garg, Rishab Goyal, George Lu:
A Simple and Generic Approach to Dynamic Collusion Model. 330 - Akiko Inoue, Kazuhiko Minematsu:
Parallelizable Authenticated Encryption with Small State Size. 331 - Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa:
CostCO: An automatic cost modeling framework for secure multi-party computation. 332 - Dandan Yuan, Shujie Cui, Giovanni Russello:
We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption. 333 - Dung Bui, Geoffroy Couteau:
Private Set Intersection from Pseudorandom Correlation Generators. 334 - Tuan-Hong Chua, Iftekhar Salam:
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System. 335 - Brent Waters, David J. Wu:
Batch Arguments for NP and More from Standard Bilinear Group Assumptions. 336 - Matthias J. Kannwischer, Peter Schwabe, Douglas Stebila, Thom Wiggers:
Improving Software Quality in Cryptography Standardization Projects. 337 - Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, Junichi Tomida:
Private Intersection-Weighted-Sum. 338 - Igor Semaev:
New Digital Signature Algorithm EHT. 339 - Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA. 340 - Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher. 341 - Lorenzo Grassi, Morten Øygarden, Markus Schofnegger, Roman Walch:
From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications. 342 - Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai:
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation. 343 - William Wang:
Shorter Signatures from MQ. 344 - Wouter Castryck, Marc Houben, Frederik Vercauteren, Benjamin Wesolowski:
On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves. 345 - Andreas Hülsing, Mikhail A. Kudinov:
Recovering the tight security proof of SPHINCS+. 346 - Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition. 347 - Yu Dai, Kaizhan Lin, Zijian Zhou, Chang-An Zhao:
Fast Subgroup Membership Testings for $\G_1$, $\G_2$ and $\G_T$ on Pairing-friendly Curves. 348 - Antoine Leudière, Pierre-Jean Spaenlehauer:
Hard Homogeneous Spaces from the Class Field Theory of Imaginary Hyperelliptic Function Fields. 349 - Bruno Mazorra, Victor Adan, Vanesa Daza:
Do not rug on me: zero-dimensional scam detection. 350 - Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub:
Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt. 351 - Youssef El Housni, Aurore Guillevic, Thomas Piellard:
Co-factor clearing and subgroup membership testing on pairing-friendly curves. 352 - James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan:
SNARGs for P from Sub-exponential DDH and QR. 353 - Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer:
Optimal Synchronous Approximate Agreement with Asynchronous Fallback. 354 - Alexander Bienstock, Jaiden Fairoze, Sanjam Garg
, Pratyay Mukherjee, Srinivasan Raghuraman:
A More Complete Analysis of the Signal Double Ratchet Algorithm. 355 - Mustain Billah, Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Rafiqul Islam:
A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles. 356 - Antonin Leroux:
An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves. 357 - Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin:
Optimal Private Set Union from Multi-Query Reverse Private Membership Test. 358 - Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar R. Weippl:
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks. 359 - Thijs Veugen, Bart Kamphorst, Michiel Marcus:
Privacy-Preserving Contrastive Explanations with Local Foil Trees. 360 - Panagiotis Chatzigiannis, Konstantinos Chalkias:
Base64 Malleability in Practice. 361 - Alexander May, Carl Richard Theodor Schneider
:
How to Backdoor (Classical) McEliece and How to Guard Against Backdoors. 362 - Damiano Abram, Ivan Damgård, Claudio Orlandi, Peter Scholl:
An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security. 363 - Aymeric Genêt, Novak Kaluderovic:
Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE. 364 - Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz:
Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform. 365 - Clémence Bouvier, Anne Canteaut, Léo Perrin:
On the Algebraic Degree of Iterated Power Functions. 366 - Patrick Longa:
Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings and Supersingular Isogeny-Based Protocols. 367 - Samir Jordan Menon, David J. Wu:
Spiral: Fast, High-Rate Single-Server PIR via FHE Composition. 368 - Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata:
Matching Attacks on Romulus-M. 369 - Riddhi Ghosal, Paul Lou, Amit Sahai:
Efficient NIZKs from LWE via Polynomial Reconstruction and "MPC in the Head". 370 - Asep Muhamad Awaludin, Jonguk Park, Rini Wisnu Wardhani, Howon Kim:
A High-performance ECC Processor over Curve448 based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier. 371 - Vadym Kliuchnikov, Kristin E. Lauter, Romy M. Minko, Christophe Petit, Adam Paetznick:
Shorter quantum circuits. 372 - Sergey Agievich:
Blind accumulators for e-voting. 373 - Yehuda Lindell:
Simple Three-Round Multiparty Schnorr Signing with Full Simulatability. 374 - Tingting Guo, Peng Wang:
A Note on the Security Framework of Two-key DbHtS MACs. 375 - Ran Canetti, Palak Jain, Marika Swanberg, Mayank Varia:
Universally Composable End-to-End Secure Messaging. 376 - Hamidreza Khoshakhlagh:
(Commit-and-Prove) Predictable Arguments with Privacy. 377 - Antoine Urban, Matthieu Rambaud:
Share & Shrink: Ad-Hoc Threshold FHE with Short Ciphertexts and its Application to Almost-Asynchronous MPC. 378 - S. Dov Gordon, Carmit Hazay, Phi Hung Le:
Fully Secure PSI via MPC-in-the-Head. 379 - Brett Hemenway Falk, Rohit Nema, Rafail Ostrovsky:
A Linear-Time 2-Party Secure Merge Protocol. 380 - Hirotomo Shinoki, Koji Nuida:
On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption. 381 - Matteo Campanelli, Rosario Gennaro, Kelsey Melissaris, Luca Nizzardo:
Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups. 382 - Megan Chen, Alessandro Chiesa, Nicholas Spooner:
On Succinct Non-Interactive Arguments in Relativized Worlds. 383 - Ertem Nusret Tas, Dionysis Zindros, Lei Yang, David Tse:
Light Clients for Lazy Blockchains. 384 - Guillaume Barbu
, Ward Beullens, Emmanuelle Dottax
, Christophe Giraud, Agathe Houzelot
, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie:
ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest. 385 - Lin You, Yan Wang, Liang Li, Gengran Hu:
Secure Two-party Computation Approach for NTRUEncrypt. 386 - Hridya P. R, Jimmy Jose:
Phase-shift Fault Analysis of Grain-128. 387 - Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu:
Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing. 388 - Suparna Kundu, Jan-Pieter D'Anvers, Michiel Van Beirendonck, Angshuman Karmakar, Ingrid Verbauwhede:
Higher-order masked Saber. 389 - (Withdrawn) An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain. 390
- (Withdrawn) An Improved Model on the Vague Sets-Based DPoSâs Voting Phase in Blockchain. 391
- Megumi Ando, Miranda Christ, Anna Lysyanskaya, Tal Malkin:
Poly Onions: Achieving Anonymity in the Presence of Churn. 392 - Yashvanth Kondi, Abhi Shelat:
Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation. 393 - Kimia Zamiri Azar, Muhammad Monir Hossain, Arash Vafaei, Hasan Al Shaikh
, Nurun N. Mondol, Fahim Rahman, Mark M. Tehranipoor, Farimah Farahmandi:
Fuzz, Penetration, and AI Testing for SoC Security Verification: Challenges and Solutions. 394 - Likang Lu, Jianzhu Lu:
A lightweight verifiable secret sharing scheme in IoTs. 395 - (Withdrawn) Side-channel attacks based on power trace decomposition. 396
- Daniel Gardham, Mark Manulis:
Revocable Hierarchical Attribute-based Signatures from Lattices. 397 - Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C. Kao, Vladimir Kolesnikov, Abrahim Ladha, Nicholas D. Pattengale:
Auditable, Available and Resilient Private Computation on the Blockchain via MPC. 398 - Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
The Inverse of χ and Its Applications to Rasta-like Ciphers. 399 - Yael Tauman Kalai, Alex Lombardi, Vinod Vaikuntanathan, Lisa Yang:
Quantum Advantage from Any Non-Local Game. 400 - Cas Cremers, Caroline Fontaine, Charlie Jacomme:
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols. 401 - Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers. 402 - Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang:
A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications. 403 - Atsuki Momose, Ling Ren:
Constant Latency in Sleepy Consensus. 404 - James Howe, Bas Westerbaan:
Benchmarking and Analysing the NIST PQC Finalist Lattice-Based Signature Schemes on the ARM Cortex M7. 405 - Helger Lipmaa, Janno Siim, Michal Zajac:
Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK. 406 - Edward Eaton, Sajin Sasy, Ian Goldberg:
Improving the Privacy of Tor Onion Services. 407 - Agnese Gini, Pierrick Méaux:
On the weightwise nonlinearity of weightwise perfecty balanced functions. 408 - Vicent Sus:
Proof-of-Stake Is a Defective Mechanism. 409 - Ziaur Rahman, Xun Yi, Mustain Billah, Mousumi Akter Sumi, Adnan Anwar:
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home. 410 - Aurélien Greuet, Simon Montoya
, Clémence Vermeersch:
Quotient Approximation Modular Reduction. 411 - Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang:
Complete and Improved FPGA Implementation of Classic McEliece. 412 - Mustafa Safa Özdayi, Yue Guo, Mahdi Zamani:
Instachain: Breaking the Sharding Limits via Adjustable Quorums. 413 - Mila Anastasova, Panos Kampanakis, Jake Massimo:
PQ-HPKE: Post-Quantum Hybrid Public Key Encryption. 414 - Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee:
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security. 415 - Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad:
Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives. 416 - Emmanuela Orsini:
Efficient, Actively Secure MPC with a Dishonest Majority: a Survey. 417 - Victor Arribas, Zhenda Zhang, Svetla Nikova:
LLTI: Low-Latency Threshold Implementations. 418 - Arasu Arun, Chaya Ganesh, Satya V. Lokam, Tushar Mopuri, Sriram Sridhar
:
Dew: Transparent Constant-sized zkSNARKs. 419 - Jonathan Bootle, Alessandro Chiesa, Yuncong Hu, Michele Orrù:
Gemini: Elastic SNARKs for Diverse Environments. 420 - Aritra Banerjee, Hitesh Tewari:
Multiverse of HawkNess: A Universally-Composable MPC-based Hawk Variant. 421 - Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde:
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. 422 - Samanvaya Panda:
Polynomial Approximation of Inverse sqrt Function for FHE. 423 - Dor Amzaleg, Itai Dinur:
Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2. 424 - Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos:
New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks. 425 - Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom:
Spectre Declassified: Reading from the Right Place at the Wrong Time. 426 - Katarzyna Kapusta, Matthieu Rambaud, Ferdinand Sibleyras:
Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications. 427 - Adrián Ranea, Joachim Vandersmissen, Bart Preneel:
Implicit White-Box Implementations: White-Boxing ARX Ciphers. 428 - Danny Niu Jianfang:
Resurrecting Xifrat - Compact Cryptosystems 2nd Attempt. 429 - Véronique Cortier, Pierrick Gaudry, Quentin Yang:
Is the JCJ voting system really coercion-resistant? 430 - Xinyu Mao, Noam Mazor, Jiapeng Zhang:
Non-Adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions. 431 - Jiayu Zhang:
Classical Verification of Quantum Computations in Linear Time. 432 - Nico Döttling, Lucjan Hanzlik, Bernardo Magri, Stella Wohnig:
McFly: Verifiable Encryption to the Future Made Practical. 433 - Takashi Yamakawa, Mark Zhandry:
Verifiable Quantum Advantage without Structure. 434 - Frédéric Dupuis, Philippe Lamontagne, Louis Salvail:
Fiat-Shamir for Proofs Lacks a Proof Even in the Presence of Shared Entanglement. 435 - Marc Rivinius, Pascal Reisert, Daniel Rausch, Ralf Küsters:
Publicly Accountable Robust Multi-Party Computation. 436 - Aparna Gupte, Neekon Vafa, Vinod Vaikuntanathan:
Continuous LWE is as Hard as LWE & Applications to Learning Gaussian Mixtures. 437 - Benjamin Wesolowski:
Computing isogenies between finite Drinfeld modules. 438 - Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang:
Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms. 439 - Jordi Ribes-González, Oriol Farràs, Carles Hernández, Vatistas Kostalabros, Miquel Moretó:
A Security Model for Randomization-based Protected Caches. 440 - Paola de Perthuis, David Pointcheval:
Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection. 441 - Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye:
Quantum Attacks on PRFs Based on Public Random Permutations. 442 - Steven D. Galbraith, Yi-Fu Lai:
Attack on SHealS and HealS: the Second Wave of GPST. 443 - Joachim Vandersmissen, Adrián Ranea, Bart Preneel:
A White-Box Speck Implementation using Self-Equivalence Encodings (Full Version). 444 - Torgin Mackinga, Tejaswi Nadahalli, Roger Wattenhofer:
TWAP Oracle Attacks: Easier Done than Said? 445 - Louis Vialar:
Fast Side-Channel Key-Recovery Attack against Elephant Dumbo. 446 - Vanesa Daza, Paz Morillo, Sergi Rovira:
Leveled Multikey FHE with constant-size ciphertexts from RLWE. 447 - Sven Bauer, Hermann Drexler, Maximilian Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann:
Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021. 448 - Britta Hale, Chelsea Komlo:
On End-to-End Encryption. 449 - Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba:
Astrape: Anonymous Payment Channels with Boring Cryptography. 450 - Charanjit S. Jutla, Barry Mishra:
Improved Stock Market Structure Using Cryptography. 451 - Alin Tomescu, Adithya Bhat, Benny Applebaum, Ittai Abraham, Guy Gueta, Benny Pinkas, Avishay Yanai:
UTT: Decentralized Ecash with Accountable Privacy. 452 - (Withdrawn) Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach. 453
- Thomas Attema, Vincent Dunning, Maarten H. Everts, Peter Langenkamp:
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC. 454 - Guy Goren, Lefteris Kokoris-Kogias, Alberto Sonnino, Shir Cohen, Alexander Spiegelman:
Proof of Availability & Retrieval in a Modular Blockchain Architecture. 455 - Anis Bkakria:
Robust, Revocable and Adaptively Secure Attribute-Based Access Control with Outsourced Decryption. 456 - Liu Zhang, Zilong Wang:
Improving Differential-Neural Distinguisher Model For DES, Chaskey and PRESENT. 457 - Benedikt Bünz, Ben Fisch:
Schwartz-Zippel for multilinear polynomials mod N. 458 - Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany:
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers. 459 - (Withdrawn) A Novel NIZK-based Privacy Preserving Biometric Identification Scheme for Internet of Things. 460
- Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks. 461 - Miguel Ambrona, Anne-Laure Schmitt, Raphael R. Toledo, Danny Willems:
New optimization techniques for PlonKâs arithmetization. 462 - Harashta Tatimma Larasati, Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Howon Kim:
Reducing the Depth of Quantum FLT-Based Inversion Circuit. 463 - (Withdrawn) Superposition Attacks on Pseudorandom Schemes based on Two or Less Permutations. 464
- (Withdrawn) BÄhÄ"m: A Provably Secure Symmetric Cipher. 465
- Nicolas David, Thomas Espitau, Akinori Hosoyamada:
Quantum binary quadratic form reduction. 466 - Arnaud de Grandmaison, Karine Heydemann, Quentin L. Meunier:
Armistice: Micro-Architectural Leakage Modelling for Masked Software Formal Verification. 467 - Leizhang Wang, Wenwen Xia, Geng Wang, Baocang Wang, Dawu Gu:
Improved Pump and Jump BKZ by Sharp Simulator. 468 - Daniel Fallnich, Shutao Zhang, Tobias Gemmeke
:
Efficient ASIC Architectures for Low Latency Niederreiter Decryption. 469 - Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou:
Designated-Verifier Linkable Ring Signatures. 470 - Aron Gohr, Friederike Laus, Werner Schindler:
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis - A Report on the CHES Challenge Side-Channel Contest 2020. 471 - Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen:
On the Hardness of Module Learning With Errors with Short Distributions. 472 - Daniel J. Bernstein:
Understanding binary-Goppa decoding. 473 - Catinca Mujdei, Arthur Beckers, Jose Bermundo, Angshuman Karmakar, Lennert Wouters, Ingrid Verbauwhede:
Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication. 474 - Jesús-Javier Chi-Domínguez, Víctor Mateu, Lucas Pandolfo Perin:
SIDH-sign: an efficient SIDH PoK-based signature. 475 - Debrup Chakraborty, Samir Kundu:
{\sf TrCBC} is Insecure. 476 - Pratyush Ranjan Tiwari, Matthew Green:
Algorithm-Substitution Attacks on Cryptographic Puzzles. 477 - Kazuhiko Minematsu:
Property-Preserving Hash Functions and Combinatorial Group Testing. 478 - Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi:
Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption. 479 - Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy:
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data. 480 - Pratyush Ranjan Tiwari, Dhruv Agarwal
, Prakhar Jain, Swagam Dasgupta, Preetha Datta, Vineet Reddy, Debayan Gupta:
India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities. 481 - KyungHyun Han, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, Seong Oun Hwang:
cuFE: High Performance Privacy Preserving Support Vector Machine with Inner-Product Functional Encryption. 482 - Nina Bindel, Sarah McCarthy, Geoff Twardokus, Hanif Rahbari:
Drive (Quantum) Safe! â" Towards Post-Quantum Security for V2V Communications. 483 - Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu:
VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering. 484 - Xi Xie, Nian Li, Linjie Xu, Xiangyong Zeng, Xiaohu Tang:
Two new classes of permutation trinomials over 픽q3 with odd characteristic. 485 - Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete
, Léo Robert:
MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing. 486 - Navid Ghaedi Bardeh, Vincent Rijmen:
New Key Recovery Attack on Reduced-Round AES. 487 - Debajyoti Das, Easwar Vivek Mangipudi, Aniket Kate:
OrgAn: Organizational Anonymity with Low Latency. 488 - Tarun Yadav, Manoj Kumar, Amit Kumar, Saibal K. Pal:
A Practical-Quantum Differential Attack on Block Ciphers. 489 - Loïc Masure, Gaëtan Cassiers, Julien M. Hendrickx, François-Xavier Standaert:
Information Bounds and Convergence Rates for Side-Channel Security Evaluators. 490 - Lukas Helminger, Christian Rechberger:
Multi-Party Computation in the GDPR. 491 - Robert Muth, Tarek Galal, Jonathan Heiss, Florian Tschorsch:
Towards Smart Contract-based Verification of Anonymous Credentials. 492 - Loïc Masure, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert:
Donât Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking. 493 - Emre Karabulut, Erdem Alkim, Aydin Aysu:
Single-Trace Side-Channel Attacks on Ï-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM. 494 - Nico Döttling, Jesko Dujmovic:
Maliciously Circuit-Private FHE from Information-Theoretic Principles. 495 - Naina Gupta, Arpan Jati, Anupam Chattopadhyay, Gautam Jha:
Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium. 496 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss:
Protecting Distributed Primitives against Leakage: Equivocal Secret Sharing and More. 497 - Petr Sedlácek:
Limitations of Information-theoretic Incompressible Encodings. 498 - Varun Madathil, Sri Aravinda Krishnan Thyagarajan, Dimitrios Vasilopoulos, Lloyd Fournier, Giulio Malavolta, Pedro Moreno-Sanchez:
Practical Decentralized Oracle Contracts for Cryptocurrencies. 499 - Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
Multi-Server PIR with Full Error Detection and Limited Error Correction. 500 - Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Harashta Tatimma Larasati, Howon Kim:
Another Concrete Quantum Cryptanalysis of Binary Elliptic Curves. 501 - Vlastimil Klíma:
Fast Diffusion Block for Secret Key Cryptography. 502 - Peter A. Beerel, Marios Georgiou, Ben Hamlin, Alex J. Malozemoff, Pierluigi Nuzzo:
Towards a Formal Treatment of Logic Locking. 503 - Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev:
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions. 504 - Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard:
Riding the Waves Towards Generic Single-Cycle Masking in Hardware. 505 - Jens Groth, Victor Shoup:
Design and analysis of a distributed ECDSA signing service. 506 - David Knichel, Amir Moradi:
Low-Latency Hardware Private Circuits. 507 - Lorenzo Grassi, Bart Mennink:
Security of Truncated Permutation Without Initial Value. 508 - Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders:
Lattice-Based Signature with Efficient Protocols, Revisited. 509 - Liam Eagen, Sanket Kanjalkar, Tim Ruffing, Jonas Nick:
Bulletproofs++: Next Generation Confidential Transactions via Reciprocal Set Membership Arguments. 510 - (Withdrawn) OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels. 511
- Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen:
A Bit-Vector Differential Model for the Modular Addition by a Constant and its Applications to Differential and Impossible-Differential Cryptanalysis. 512 - Adrián Ranea, Vincent Rijmen:
CASCADA: Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks. 513 - Qian Guo, Andreas Johansson, Thomas Johansson:
A Key-Recovery Side-Channel Attack on Classic McEliece. 514 - Antonio Guimarães, Edson Borin, Diego F. Aranha:
MOSFHET: Optimized Software for FHE over the Torus. 515 - Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos:
zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge. 516 - Jaime Gutierrez, Jorge Jiménez Urroz:
Local permutation polynomials and the action of e-Klenian groups. 517 - Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig:
Failing to hash into supersingular isogeny graphs. 518 - Md Rasid Ali, Debranjan Pal
, Abhijit Das, Dipanwita Roy Chowdhury:
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest. 519 - Vidal Attias, Luigi Vigneri, Vassil S. Dimitrov:
Efficient Verification of the Wesolowski Verifiable Delay Function for Distributed Environments. 520 - Pavel Hubácek, L'ubica Jancová, Veronika Králová:
On The Distributed Discrete Logarithm Problem with Preprocessing. 521 - George Teseleanu:
The Case of Small Prime Numbers Versus the Joye-Libert Cryptosystem. 522 - Jurian van Geest, Ileana Buhan:
A side-channel based disassembler for the ARM-Cortex M0. 523 - Hien Chu, Dario Fiore, Dimitris Kolonelos, Dominique Schröder:
Inner Product Functional Commitments with Constant-Size Public Parameters and Openings. 524 - Elena Kirshanova, Alexander May:
Decoding McEliece with a Hint - Secret Goppa Key Parts Reveal Everything. 525 - Fuchun Guo, Willy Susilo:
Optimal Tightness for Chain-Based Unique Signatures. 526 - Jungmin Park, N. Nalla Anandakumar, Dipayan Saha
, Dhwani Mehta, Nitin Pundir, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor:
PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms. 527 - Marzio Mula, Nadir Murru, Federico Pintore:
Random sampling of supersingular elliptic curves. 528 - Diego F. Aranha, Chuanwei Lin, Claudio Orlandi, Mark Simkin:
Laconic Private Set-Intersection From Pairings. 529 - Malik Imran, Felipe Almeida, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini:
High-speed SABER Key Encapsulation Mechanism in 65nm CMOS. 530 - Norica Bacuieti, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer:
Jammin' on the deck. 531 - Joon-Woo Lee, Eunsang Lee, Young-Sik Kim, Jong-Seon No:
Hierarchical Galois Key Management Systems for Privacy Preserving AIaaS with Homomorphic Encryption. 532 - M. Rajululkahf:
BÄhÄ"m: A Symmetric Cipher with Provable 128-bit Security. 533 - Renas Bacho, Julian Loss:
On the Adaptive Security of the Threshold BLS Signature Scheme. 534 - Damiano Abram, Peter Scholl, Sophia Yakoubov:
Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round. 535 - Sabyasachi Dey, Hirendra Kumar Garai, Santanu Sarkar, Nitin Kumar Sharma:
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha. 536 - Jincheol Ha, Seongkwang Kim, ByeongHak Lee, Jooyoung Lee, Mincheol Son:
Rubato: Noisy Ciphers for Approximate Homomorphic Encryption (Full Version). 537 - Patrick Karl, Jonas Schupp, Tim Fritzmann, Georg Sigl:
Post-Quantum Signatures on RISC-V with Hardware Acceleration. 538 - Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, Florian Weber:
Post Quantum Noise. 539 - Katarzyna Anna Kowalska, Davide Fogliano, Jose Garcia Coello:
On the revision of NIST 800-22 Test Suites. 540 - Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell:
The Generalsâ Scuttlebutt: Byzantine-Resilient Gossip Protocols. 541 - Mathias Hall-Andersen, Jesper Buus Nielsen:
On Valiant's Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles. 542 - Aram Jivanyan, Aaron Feickert:
Aura: private voting with reduced trust on tallying authorities. 543 - Donghoon Chang, Deukjo Hong, Jinkeon Kang:
Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting. 544 - Elisaweta Masserova, Deepali Garg, Ken Mai, Lawrence T. Pileggi, Vipul Goyal, Bryan Parno:
Logic Locking - Connecting Theory and Practice. 545 - Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, Kartik Nayak:
He-HTLC: Revisiting Incentives in HTLC. 546 - Gyu-Chol Kim, Yong-Bok Jong:
Fast signing method in RSA with high speed verification. 547 - Yuyu Wang, Jiaxin Pan:
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security. 548 - Sora Suegami:
Smart Contracts Obfuscation from Blockchain-based One-time Program. 549 - Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder:
ROAST: Robust Asynchronous Schnorr Threshold Signatures. 550 - Xiao Sui, Sisi Duan, Haibin Zhang:
Marlin: Two-Phase BFT with Linearity. 551 - Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky:
Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One. 552 - John Best, Wayne Hineman, Steven Hetzler, Guerney Hunt, Charanjit S. Jutla:
Secure Storage with Deduplication. 553 - Sisi Duan, Haibin Zhang:
Byzantine Reliable Broadcast with O(nL+kn+n2 log n) Communication. 554 - Julius Hermelink, Silvan Streit, Emanuele Strieder, Katharina Thieme:
Adapting Belief Propagation to Counter Shuffling of NTTs. 555 - Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu:
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives. 556 - Alexander R. Block
, Christina Garman:
Honest Majority Multi-Prover Interactive Arguments. 557 - Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro:
On Seedless PRNGs and Premature Next. 558 - Joël Alwen, Benedikt Auerbach
, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak:
Coffee: Fast Healing Concurrent Continuous Group Key Agreement for Decentralized Group Messaging. 559 - Kasper Green Larsen, Maciej Obremski, Mark Simkin:
Distributed Shuffling in Adversarial Environments. 560 - Shivam Bhasin, Dirmanto Jap, Wei Cheng Ng, Siang Meng Sim:
Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes. 561 - Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orientations and cycles in supersingular isogeny graphs. 562 - Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang:
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles â" A case study of Kyber. 563 - Christopher van der Beets, Raine Nieminen, Thomas Schneider:
FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization. 564 - Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadzic, Stefan Mangard, Robert Primas:
Power Contracts: Provably Complete Power Leakage Models for Processors. 565 - Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang:
AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication. 566 - Michele Fabbrini:
FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher. 567 - Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:
Improved MITM Cryptanalysis on Streebog. 568 - Marloes Venema, Greg Alpár:
TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks. 569 - Onur Günlü, Rafael F. Schaefer, Holger Boche, H. Vincent Poor:
Secure and Private Source Coding with Private Key and Decoder Side Information. 570 - Boris Ryabko:
Entropically secure cipher for messages generated by Markov chains with unknown statistics. 571 - Ilia Iliashenko, Malika Izabachène, Axel Mertens, Hilder V. L. Pereira:
Homomorphically counting elements with the same property. 572 - Tyler Beauregard, Janabel Xia, Mike Rosulek:
Finding One Common Item, Privately. 573 - Gowri R. Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider:
Comparison-Based MPC in Star Topology (Full Version). 574 - Charles Gouert, Rishi Khan, Nektarios Georgios Tsoutsos:
Optimizing Homomorphic Encryption Parameters for Arbitrary Applications. 575 - Akira Ito, Rei Ueno, Naofumi Homma:
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage. 576 - Xuting Zhou, Tianshuo Cong:
Construction of generalized-involutory MDS matrices. 577 - Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri:
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation. 578 - Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao:
Compact and Efficient NTRU-based KEM with Scalable Ciphertext Compression. 579 - Samuel Sousa, Roman Kern:
How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing. 580 - Lidong Han, Guangwu Xu, Qi Xie, Xiao Tan, Chengliang Tian:
Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage. 581 - Hao Chung, Elisaweta Masserova, Elaine Shi, Sri Aravinda Krishnan Thyagarajan:
Ponyta: Foundations of Side-Contract-Resilient Fair Exchange. 582 - Lior Rotem, Gil Segev:
A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff. 583 - Lior Rotem:
Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups. 584 - Yi Liu, Qi Wang, Siu-Ming Yiu:
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability. 585 - Diego F. Aranha, Youssef El Housni, Aurore Guillevic:
A survey of elliptic curves for proof systems. 586 - Eduardo Soria-Vazquez:
Doubly Efficient Interactive Proofs over Infinite and Non-Commutative Rings. 587 - Daniel Kales, Greg Zaverucha
:
Efficient Lifting for Shorter Zero-Knowledge Proofs and Post-Quantum Signatures. 588 - Simin Ghesmati, Andreas Kern, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
Unnecessary Input Heuristics & PayJoin Transactions. 589 - Mark Blunk, Paul Bunn, Samuel Dittmer, Steve Lu, Rafail Ostrovsky:
Secure Merge in Linear Time and O(log log N) Rounds. 590 - Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, Kazuo Sakiyama:
Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography. 591 - Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar:
Chaghri - an FHE-friendly Block Cipher. 592 - (Withdrawn) On the Security Proof of CKO+21 Secret Sharing Scheme. 593
- (Withdrawn) A CONCRETE approach to torus fully homomorphic encryption. 594
- Theo von Arx, Kenneth G. Paterson:
On the Cryptographic Fragility of the Telegram Ecosystem. 595 - Liam Eagen:
Zero Knowledge Proofs of Elliptic Curve Inner Products from Principal Divisors and Weil Reciprocity. 596 - Sisi Duan, Haibin Zhang:
Foundations of Dynamic BFT. 597 - Laltu Sardar, Sushmita Ruj:
Verifiable and forward private conjunctive keyword search from DIA tree. 598 - Lionel Beltrando, Maria Potop-Butucaru, José Alfaro:
TenderTee: Secure Tendermint. 599 - Loïc Masure, Olivier Rioul, François-Xavier Standaert:
A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations. 600 - Lucianna Kiffer, Rajmohan Rajaraman, Abhi Shelat:
A Better Method to Analyze Blockchain Consistency. 601 - Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin:
Real-Time Frequency Detection to Synchronize Fault Injection on System-on-Chip. 602 - Léonard Lys, Maria Potop-Butucaru:
Distributed Blockchain Price Oracle. 603 - Marcel Armour, Bertram Poettering:
Algorithm Substitution Attacks against Receivers. 604 - Alexandru Ionita:
Weighted Attribute-Based Encryption with Parallelized Decryption. 605 - Li Duan, Yufan Jiang, Yong Li, Jörn Müller-Quade, Andy Rupp:
Security Against Honorific Adversaries: Efficient MPC with Server-aided Public Verifiability. 606 - Son Ho, Jonathan Protzenko, Abhishek Bichhawat, Karthikeyan Bhargavan:
Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations (Long Version). 607 - Chen-Da Liu-Zhang, Christian Matt, Ueli Maurer, Guilherme Rito, Søren Eller Thomsen:
Practical Provably Secure Flooding for Blockchains. 608 - Mingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, Elaine Shi:
Optimal Single-Server Private Information Retrieval. 609 - Tingting Pang, Nian Li, Xiangyong Zeng:
On the Differential Spectrum of a Differentially 3-Uniform Power Function. 610 - Gongyu Shi, Geng Wang, Dawu Gu:
Further Cryptanalysis of a Type of RSA Variants. 611 - Raghvendra Rohit, Santanu Sarkar:
Cryptanalysis of Reduced Round SPEEDY. 612 - Marloes Venema, Greg Alpár:
GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs. 613 - Yu Zhang, Zongbin Wang, Tihong Qin:
PPRKS: A Privacy Preserving Range Keyword Search Scheme. 614 - Thomas Debris-Alazard, Léo Ducas, Nicolas Resch, Jean-Pierre Tillich:
Smoothing Codes and Lattices: Systematic Study and New Bounds. 615 - Ren Ishibashi, Kazuki Yoneyama:
Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles. 616 - Shingo Sato, Junji Shikata:
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model. 617 - Adriano Koleci:
A simple proof of ARX completeness. 618 - Matthieu Rambaud, Antoine Urban:
Asynchronous Dynamic Proactive Secret Sharing under Honest Majority: Refreshing Without a Consistent View on Shares. 619 - Zhenyu Huang, Siwei Sun:
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits. 620 - Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin:
Caulk: Lookup Arguments in Sublinear Time. 621 - Olive Chakraborty, Martin Zuber:
Efficient and Accurate homomorphic comparisons. 622 - Anders P. K. Dalskov, Daniel Escudero, Ariel Nof:
Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority. 623 - Andriyan Bilyk, Javad Doliskani, Zhiyong Gong:
Cryptanalysis of Three Quantum Money Schemes. 624 - Sisi Duan, Haibin Zhang, Xiao Sui, Baohan Huang, Changchun Mu, Gang Di, Xiaoyun Wang:
Byzantine Fault Tolerance from Weak Certificates. 625 - Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi, Kai Zhang:
The Simplest SAT Model of Combining Matsui's Bounding Conditions with Sequential Encoding Method. 626 - Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. 627 - Elizabeth Carter, Pengzhou He, Jiafeng Xie:
High-Performance Polynomial Multiplication Hardware Accelerators for KEM Saber and NTRU. 628 - Alexandros Bakas, Antonis Michalas, Eugene Frimpong, Reyhaneh Rabbaninejad:
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors (extended version)? 629 - Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya:
Enforcing fine-grained constant-time policies. 630 - Fuyuki Kitagawa, Ryo Nishimaki:
Watermarking PRFs against Quantum Adversaries. 631 - Thomas Aulbach, Tobias Kovats, Juliane Krämer, Soundes Marzougui:
Recovering Rainbow's Secret Key with a First-Order Fault Attack. 632 - Shiyu Shen, Hao Yang, Yu Liu, Zhe Liu, Yunlei Zhao:
CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes. 633 - Shweta Agrawal, Damien Stehlé, Anshu Yadav:
Round-Optimal Lattice-Based Threshold Signatures, Revisited. 634 - Joppe W. Bos, Brian Carlson, Joost Renes, Marius Rotaru, Amber Sprenkels, Geoffrey P. Waters:
Post-Quantum Secure Boot on Vehicle Network Processors. 635 - Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer Syndrome Decoding in the Presence of Noise. 636 - Lisha Yao, Jian Weng, Bimei Wang:
Conditional Attribute-Based Proxy Re-Encryption and Its Instantiation. 637 - Matteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh, Janno Siim:
Impossibilities in Succinct Arguments: Black-box Extraction and More. 638 - Giuseppe Persiano, Duong Hieu Phan, Moti Yung:
Anamorphic Encryption: Private Communication against a Dictator. 639 - Tadas Vaitiekunas:
Dialektos: Privacy-preserving Smart Contracts. 640 - Mateus Simoes, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad:
Self-Timed Masking: Implementing First-Order Masked S-Boxes Without Registers. 641 - Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany:
Statistical Effective Fault Attacks: The other Side of the Coin. 642 - Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Accelerating the Best Trail Search on AES-Like Ciphers. 643 - Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk:
DiLizium 2.0: Revisiting Two-Party Crystals-Dilithium. 644 - Michele Ciampi, Divya Ravi, Luisa Siniscalchi, Hendrik Waldner:
Round-Optimal Multi-Party Computation with Identifiable Abort. 645 - (Withdrawn) Faster Non-interactive Verifiable Computing. 646
- Kyungbae Jang, Anubhab Baksi, Jakub Breier, Hwajeong Seo, Anupam Chattopadhyay:
Quantum Implementation and Analysis of DEFAULT. 647 - Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, Ioannis Demertzis
:
Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions. 648 - Nico Döttling, Sanjam Garg
, Sruthi Sekar, Mingyuan Wang:
IBE with Incompressible Master Secret and Small Identity Secrets. 649 - Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig:
Supersingular Non-Superspecial Abelian Surfaces in Cryptography. 650 - Ananya Appan, Anirudh Chandramouli, Ashish Choudhury:
Revisiting the Efficiency of Asynchronous Multi Party Computation Against General Adversaries. 651 - Yu Chen, Min Zhang, Cong Zhang, Minglang Dong:
Private Set Operations from Multi-Query Reverse Private Membership Test. 652 - Binbin Tu, Yu Chen, Qi Liu, Cong Zhang:
Fast Unbalanced Private Set Union from Fully Homomorphic Encryption. 653 - Péter Kutas, Christophe Petit:
Torsion point attacks on "SIDH-like" cryptosystems. 654 - Keewoo Lee:
Bit Security as Cost to Observe Advantage: Towards the Definition from THE BOOK. 655 - Martin R. Albrecht, Yixin Shen:
Quantum Augmented Dual Attack. 656 - Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios D. Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer:
BASALISC: Flexible Asynchronous Hardware Accelerator for Fully Homomorphic Encryption. 657 - Ghada Almashaqbeh, Ran Canetti, Yaniv Erlich, Jonathan Gershoni, Tal Malkin, Itsik Pe'er, Anna Roitburd-Berman, Eran Tromer:
Unclonable Polymers and Their Cryptographic Applications. 658 - Hanjun Li, Huijia Lin, Ji Luo:
ABE for Circuits with Constant-Size Secret Keys and Adaptive Security. 659 - Dana Dachman-Soled, Seung Geol Choi, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich:
Secure Sampling with Sublinear Communication. 660 - Aisling Connolly, Jérôme Deschamps, Pascal Lafourcade, Octavio Perez-Kempner:
Protego: A Credential Scheme for Permissioned Blockchains (Extended Version). 661 - Midhul Vuppalapati, Kushal Babel, Anurag Khandelwal, Rachit Agarwal:
SHORTSTACK : Distributed, Fault-tolerant, Oblivious Data Access. 662 - Harsh Chaudhari, Matthew Jagielski, Alina Oprea:
SafeNet: Mitigating Data Poisoning Attacks on Private Machine Learning. 663 - Qian Liu, Zhiwei Huang, Jianrui Xie
, Ximeng Liu, Jian Zou:
The c-differential uniformity and boomerang uniformity of three classes of permutation polynomials over 픽2n. 664 - Lih-Chung Wang, Po-En Tseng, Yen-Liang Kuan, Chun-Yen Chou:
NOVA, a Noncommutative-ring Based Unbalanced Oil and Vinegar Signature Scheme with Key-randomness Alignment. 665 - Ivana Ivkovic, Nikolay S. Kaleyski:
Deciding and reconstructing linear equivalence of uniformly distributed functions. 666 - Pascal Reisert, Marc Rivinius, Toomas Krips, Ralf Küsters:
Arithmetic Tuples for MPC. 667 - Yaobin Shen, Ferdinand Sibleyras:
Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security. 668 - Claude Carlet, Serge Feukoua:
On those Boolean functions that are coset leaders of first order Reed-Muller codes. 669 - Jayamine Alupotha, Xavier Boyen:
Practical UC-Secure Zero-Knowledge Smart Contracts. 670 - Shujiao Cao, Rui Xue:
The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions. 671 - Tassos Dimitriou, Khazam Alhamdan:
CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas. 672 - Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov:
Meet-in-the-Filter and Dynamic Counting with Applications to Speck. 673 - Cezary Glowacz:
A Note on Key Ranking for Optimal Collision Side-Channel Attacks. 674 - Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh:
MPClan: Protocol Suite for Privacy-Conscious Computations. 675 - Xavier Bonnetain, André Chailloux, André Schrottenloher, Yixin Shen:
Finding many Collisions via Reusable Quantum Walks. 676 - Leon Mächler, David Naccache:
A Conjecture on Hermite Constants. 677 - Mark Zhandry:
New Constructions of Collapsing Hashes. 678 - Katharina Boudgoust, Amin Sakzad, Ron Steinfeld:
Vandermonde meets Regev: Public Key Encryption Schemes Based on Partial Vandermonde Problems. 679 - Omid Mir, Daniel Slamanig, Balthazar Bauer, René Mayrhofer:
Practical Delegatable Anonymous Credentials From Equivalence Class Signatures. 680 - Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs:
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC. 681 - Songze Li, Sizai Hou, Baturalp Buyukates, Salman Avestimehr:
Secure Federated Clustering. 682 - Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, Anupam Chattopadhyay:
Quantum Analysis of AES. 683 - Sergio Demian Lerner, Javier Álvarez Cid-Fuentes, Julian Len, Ramsès Fernàndez-València, Patricio Gallardo, Nicolás Vescovo, Raúl Laprida, Shreemoy Mishra, Federico Jinich, Diego Masini:
RSK: A Bitcoin sidechain with stateful smart-contracts. 684 - Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library. 685 - Benoît Cogliati, Avijit Dutta, Mridul Nandi, Jacques Patarin, Abishanka Saha:
Proof of Mirror Theory for any $\xi_{\max}$. 686 - Dario Catalano, Dario Fiore, Emanuele Giunta:
Adaptively Secure Single Secret Leader Election from DDH. 687 - Subhadeep Banik, Khashayar Barooti, Andrea Caforio, Serge Vaudenay:
Memory-Efficient Single Data-Complexity Attacks on LowMC Using Partial Sets. 688 - Nilanjan Datta, Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Tight Multi-User Security Bound of sfDbHtS. 689 - Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Authentication in the Bounded Storage Model. 690 - Sujaya Maiyya, Seif Ibrahim, Caitlin Scarberry, Divyakant Agrawal, Amr El Abbadi, Huijia Lin, Stefano Tessaro, Victor Zakhary:
QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore. 691 - (Withdrawn) LIKE - Lattice Isomorphism-based Non-Interactive Key Exchange via Group Actions. 692
- Shun Watanabe, Kenji Yasunaga:
Unified View for Notions of Bit Security. 693 - Nils Fleischhacker, Mark Simkin, Zhenfei Zhang:
Squirrel: Efficient Synchronized Multi-Signatures from Lattices. 694 - Marek Bielik, Martin Jurecek, Olha Jurecková, Róbert Lórencz:
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. 695 - Dario Catalano, Dario Fiore, Rosario Gennaro, Emanuele Giunta:
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups. 696 - Pedro Branco, Nico Döttling, Jesko Dujmovic:
Rate-1 Incompressible Encryption from Standard Assumptions. 697 - Andreea B. Alexandru, Erica Blum, Jonathan Katz, Julian Loss:
State Machine Replication under Changing Network Conditions. 698 - Varun Maram, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman:
On the Quantum Security of OCB. 699 - Tejaswi Nadahalli, Majid Khabbazian, Roger Wattenhofer:
Grief-free Atomic Swaps. 700 - Augustin Bariant, Gaëtan Leurent:
Truncated Boomerang Attacks and Application to AES-based Ciphers. 701 - (Withdrawn) Kevlar: Transparent, Efficient, Polynomial Commitment Scheme with Logarithmic Verification and Communication Costs on Efficient Groups. 702
- Tim Güneysu, Philip W. Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha
:
Proof-of-possession for KEM certificates using verifiable generation. 703 - Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap:
Parameter Optimization & Larger Precision for (T)FHE. 704 - Matteo Campanelli, Anca Nitulescu, Carla Ràfols, Alexandros Zacharakis, Arantxa Zapico:
Linear-map Vector Commitments and their Practical Applications. 705 - Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj:
Finding and Evaluating Parameters for BGV. 706 - Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu:
Efficiently Masking Polynomial Inversion at Arbitrary Order. 707 - Emanuele Bellini, Rusydi H. Makarim, Carlo Sanna, Javier A. Verbel:
An Estimator for the Hardness of the MQ Problem. 708 - Katharina Boudgoust, Erell Gachon, Alice Pellet-Mary:
Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde Knapsack Problem. 709 - Alessandro Barenghi, Jean-François Biasse, Tran Ngo, Edoardo Persichetti, Paolo Santini:
Advanced Signature Functionalities from the Code Equivalence Problem. 710 - Ittai Abraham, Naama Ben-David, Sravya Yandamuri:
Efficient and Adaptively Secure Asynchronous Binary Agreement via Binding Crusader Agreement. 711 - Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu:
The Hardness of LPN over Any Integer Ring and Field for PCG Applications. 712 - S. Dov Gordon, Carmit Hazay, Phi Hung Le, Mingyu Liang:
More Efficient (Reusable) Private Set Union. 713 - Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, Tucker Balch:
MicroFedML: Privacy Preserving Federated Learning for Small Weights. 714 - Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom:
Breaking and Fixing Speculative Load Hardening. 715 - Emmanuel Fouotsa, Laurian Azebaze Guimagang, Raoul Ayissi:
x-Superoptimal Pairings on some Elliptic Curves with Odd Prime Embedding Degrees. 716 - Yacov Manevich, Adi Akavia:
Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments. 717 - Reza Ghasemi, Alptekin Küpçü:
A Post-Quantum Four-Party Outsourced Authentication. 718 - Sergiu Bursuc, Sjouke Mauw:
Contingent payments from two-party signing and verification for abelian groups. 719 - Huawei Liu, Zilong Wang, Liu Zhang:
A More Accurate Automatic Search Model for Characterizing Division Property. 720 - Jelle Vos, Mauro Conti, Zekeriya Erkin:
Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs. 721 - Kaibo Liu, Xiaozhuo Gu, Peixin Ren, Xuwen Nie:
Speedy Error Reconciliation. 722 - Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery. 723 - Thomas Schamberger, Lukas Holzbaur, Julian Renner, Antonia Wachter-Zeh, Georg Sigl:
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem. 724 - Patrick Derbez
, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen:
Revisiting Related-Key Boomerang attacks on AES using computer-aided tool. 725 - Chenar Abdulla Hassan, Oguz Yayla:
Radix-3 NTT-Based Polynomial Multiplication for Lattice-Based Cryptography. 726 - Parker Newton, Silas Richelson
:
A Lower Bound for Proving Hardness of Learning with Rounding with Polynomial Modulus. 727