


default search action
IACR Cryptology ePrint Archive, Volume 2023
Volume 2023, 2023
- Mohammad Hashemi, Domenic Forte, Fatemeh Ganji:
Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions. 1 - Jeffrey Burdges, Handan Kilinç Alper, Alistair Stewart, Sergey Vasilyev:
Ethical identity, ring VRFs, and zero-knowledge continuations. 2 - Yan-Cheng Chang:
How to Use Sigstore without Sigstore. 3 - Hyunji Kim, Sejin Lim, Anubhab Baksi, Dukyoung Kim, Seyoung Yoon, Kyungbae Jang, Hwajeong Seo:
Quantum Artificial Intelligence on Cryptanalysis. 4 - Shuai Cheng, Shengke Zeng, Haoyu Zeng, Yawen Feng, Jixiang Xiao:
Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud. 5 - Thomas Marquet, Elisabeth Oswald:
Exploring multi-task learning in the context of two masked AES implementations. 6 - Haodong Jiang, Zhi Ma, Zhenfeng Zhang:
Post-Quantum Security of Key Encapsulation Mechanism against CCA Attacks with a Single Decapsulation Query. 7 - Mick G. D. Remmerswaal, Lichao Wu, Sébastien Tiran, Nele Mentens:
AutoPOI: Automated Points Of Interest Selection for Side-channel Analysis. 8 - Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini:
Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE. 9 - Martin Brain, Carlos Cid, Rachel Player, Wrenna Robson:
Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation. 10 - Sietse Ringers:
Using the RSA or RSA-B accumulator in anonymous credential schemes. 11 - Dimitris Mouris, Daniel Masny, Ni Trieu, Shubho Sengupta, Prasad Buddhavarapu, Benjamin M. Case:
Delegated Private Matching for Compute. 12 - Tako Boris Fouotsa, Tomoki Moriya, Christophe Petit:
M-SIDH and MD-SIDH: countering SIDH attacks by masking information. 13 - Antonio Guimarães, Hilder V. L. Pereira, Barry Van Leeuwen:
Amortized Bootstrapping Revisited: Simpler, Asymptotically-faster, Implemented. 14 - Yuyu Wang, Jiaxin Pan:
Unconditionally Secure NIZK in the Fine-Grained Setting. 15 - Katharina Boudgoust, Peter Scholl:
Simple Threshold (Fully Homomorphic) Encryption From LWE With Polynomial Modulus. 16 - Oliver W. Gnilke, Jens Zumbrägel:
Cryptographic Group and Semigroup Actions. 17 - Zhenqiang Li, Fei Gao, Su-Juan Qin, Qiaoyan Wen:
New record in the number of qubits for a quantum implementation of AES. 18 - Marina Krcek, Guilherme Perin:
Autoencoder-enabled Model Portability for Reducing Hyperparameter Tuning Efforts in Side-channel Analysis. 19 - Amadou Tall:
The Scholz conjecture on addition chain is true for infinitely many integers with â"(2n) = â"(n). 20 - Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng:
DLPFA: Deep Learning based Persistent Fault Analysis against Block Ciphers. 21 - Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu:
Recommendation for a holistic secure embedded ISA extension. 22 - Stéphanie Delaune, Patrick Derbez
, Arthur Gontier, Charles Prud'homme:
New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks. 23 - Alexandros Bakas, Antonis Michalas:
It Runs and it Hides: A Function-Hiding Construction for Private-Key Multi-Input Functional Encryption. 24 - Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao:
Quantum Attacks on Beyond-Birthday-Bound MACs. 25 - Hanno Böck:
Fermat Factorization in the Wild. 26 - Katharina Kreuzer:
Verification of the (1-δ)-Correctness Proof of CRYSTALS-KYBER with Number Theoretic Transform. 27 - Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov:
Information-Theoretic Distributed Point Functions. 28 - Sarah Scheffler, Anunay Kulshrestha, Jonathan R. Mayer:
Public Verification for Private Hash Matching. 29 - Aydin Abadi, Steven J. Murdoch:
Earn While You Reveal: Private Set Intersection that Rewards Participants. 30 - Jeffrey Burdges, Handan Kilinç Alper, Alistair Stewart, Sergey Vasilyev:
Sassafras and Semi-Anonymous Single Leader Election. 31 - Joseph Surin, Shaanan Cohney:
A Gentle Tutorial for Lattice-Based Cryptanalysis. 32 - Dankrad Feist, Dmitry Khovratovich:
Fast amortized KZG proofs. 33 - Jannik Zeitschner, Nicolai Müller, Amir Moradi:
PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries. 34 - Daniel Lammers, Nicolai Müller, Amir Moradi:
Glitch-free is not Enough - Revisiting Glitch-Extended Probing Model. 35 - Christina Boura, Margot Funk, Yann Rotella:
Differential analysis of the ternary hash function Troika. 36 - Kelong Cong, Yi-Fu Lai, Shai Levin
:
Efficient Isogeny Proofs Using Generic Techniques. 37 - Atsuki Momose, Ling Ren, Elaine Shi, Jun Wan, Zhuolun Xiang:
On the Amortized Communication Complexity of Byzantine Broadcast. 38 - Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk:
Server-Supported Decryption for Mobile Devices. 39 - Shuqin Su, Bohan Yang, Vladimir Rozic, Mingyuan Yang, Min Zhu, Shaojun Wei, Leibo Liu:
A Closer Look at the Chaotic Ring Oscillators based TRNG Design. 40 - Adrian-Daniel Stefan, Ionut-Petrisor Anghel, Emil Simion:
Quantum-Safe Protocols and Application in Data Security of Medical Records. 41 - Aymeric Genêt:
On Protecting SPHINCS+ Against Fault Attacks. 42 - David Spielmann, Ognjen Glamocanin, Mirjana Stojilovic:
RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks. 43 - Mahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, Ari Juels:
Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets. 44 - Manuela Horduna, Simona-Maria Lazarescu, Emil Simion:
A note on machine learning applied in ransomware detection. 45 - José Contreras:
Cognitive Cryptography using behavioral features from linguistic-biometric data. 46 - Raja Adhithan RadhaKrishnan:
Side-Channel Resistant Implementation Using Arbiter PUF. 47 - Marc Joye:
On-Line/Off-Line DCR-based Homomorphic Encryption and Applications. 48 - Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Implementing and Benchmarking Word-Wise Homomorphic Encryption Schemes on GPU. 49 - Alexandre Berzati, Andersson Calle Viera, Maya Chartouni, Steven Madec, Damien Vergnaud, David Vigilant:
A Practical Template Attack on CRYSTALS-Dilithium. 50 - Theophilus Agama:
A proof of the Scholz conjecture on addition chains. 51 - Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser:
Putting the Online Phase on a Diet: Covert Security from Short MACs. 52 - Weizhao Jin, Erik Kline, T. K. Satish Kumar, Lincoln Thurlow, Srivatsan Ravi:
ð'3ð' : Privacy-Preserving Path Validation System for Multi-Authority Sliced Networks. 53 - Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia:
On the Incoercibility of Digital Signatures. 54 - Nicu Neculache, Vlad-Andrei Petcu, Emil Simion:
An analysis of a scheme proposed for electronic voting systems. 55 - Trey Li:
Quantum Annealing for Subset Product and Noisy Subset Product. 56 - Max Ammann, Lucca Hirschi, Steve Kremer:
DY Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing. 57 - Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, Benjamin Wesolowski:
SCALLOP: scaling the CSI-FiSh. 58 - Ward Beullens, Ming-Shing Chen, Shih-Hao Hung, Matthias J. Kannwischer, Bo-Yuan Peng, Cheng-Jhih Shih, Bo-Yin Yang:
Oil and Vinegar: Modern Parameters and Implementations. 59 - Edward Chen, Jinhao Zhu, Alex Ozdemir, Riad S. Wahby, Fraser Brown, Wenting Zheng:
Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols. 60 - Shaoquan Jiang, Dima Alhadidi, Hamid Fazli Khojir:
Key-and-Signature Compact Multi-Signatures: A Compiler with Realizations. 61 - Mingxing Hu:
Post-Quantum Secure Deterministic Wallet: Stateless, Hot/Cold Setting, and More Secure. 62 - Leemon Baird, Sanjam Garg
, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
Threshold Signatures in the Multiverse. 63 - Antonin Leroux:
Computation of Hilbert class polynomials and modular polynomials from supersingular elliptic curves. 64 - Jakub Klemsa, Melek Önen, Yavuz Akin:
A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth. 65 - Alexandr Bulkin, Tim Dokchitser:
Plonkup scheme with multiple queries. 66 - Paulo S. L. M. Barreto, Gustavo H. M. Zanon:
Blind signatures from Zero-knowledge arguments. 67 - Shalini Banerjee, Steven D. Galbraith, Giovanni Russello:
Obfuscating Decision Trees. 68 - Prabhanjan Ananth, Zihan Hu, Henry Yuen:
On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions. 69 - (Withdrawn) A new side-channel attack on RSA prime numbers generation. 70
- Corina-Elena Bogos, Razvan Mocanu, Emil Simion:
A security analysis comparison between Signal, WhatsApp and Telegram. 71 - Geoffroy Couteau, Maryam Zarezadeh:
Non-Interactive Secure Computation of Inner-Product from LPN and LWE. 72 - Peng Yang, Zoe Lin Jiang, Shiqi Gao, Jiehang Zhuang, Hongxiao Wang, Junbin Fang, Siu-Ming Yiu, Yulin Wu:
FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing. 73 - Geoffroy Couteau, Adi Rosén:
Random Sources in Private Computation. 74 - Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat-Safa, Shahin Tajik:
Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis. 75 - Dev M. Mehta, Mohammad Hashemi, David Selasi Koblah, Domenic Forte, Fatemeh Ganji:
Bake It Till You Make It: Heat-induced Leakage from Masked Neural Networks. 76 - Ward Beullens, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler:
Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal. 77 - Mostefa Kara, Abdelkader Laouid, Mohammad Hammoudeh:
An Efficient Multi-Signature Scheme for Blockchain. 78 - Tabacaru Robert, Anghel Florin, Asandoaiei David, Simion Emil:
The challenges of proving solvency while preserving privacy. 79 - Dimitris Mouris, Pratik Sarkar, Nektarios Georgios Tsoutsos:
PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries with Full Security. 80 - Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean F. Lawlor:
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging. 81 - Tarak Ben Youssef, Riad S. Wahby:
Specialized Proof of Confidential Knowledge (SPoCK). 82 - Surya Mathialagan, Neekon Vafa:
MacORAMa: Optimal Oblivious RAM with Integrity. 83 - GyuChol Kim:
Single-tiered hybrid PoW consensus protocol to encourage decentralization in bitcoin. 84 - Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson:
The Security of ChaCha20-Poly1305 in the Multi-user Setting. 85 - Javier Álvarez Cid-Fuentes, Diego Angel Masini, Sergio Demian Lerner:
Flyover: A Repayment Protocol for Fast Bitcoin Transfers over Federated Pegs. 86 - Katharina Kreuzer:
Verification of Correctness and Security Properties for CRYSTALS-KYBER. 87 - Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej:
Individual Cryptography. 88 - Benjamin Levy, Benjamin Sherman, Muhammad Ishaq, Lindsey Kennard, Ana L. Milanova, Vassilis Zikas:
Compilation and Backend-Independent Vectorization for Multi-Party Computation. 89 - Karim M. Abdellatif, Olivier Hériveaux, Adrian Thillard:
Unlimited Results: Breaking Firmware Encryption of ESP32-V3. 90 - Alex Ozdemir, Gereon Kremer, Cesare Tinelli, Clark W. Barrett:
Satisfiability Modulo Finite Fields. 91 - Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro:
Estimation of Shor's Circuit for 2048-bit Integers based on Quantum Simulator. 92 - Pritha Gupta, Jan Peter Drees, Eyke Hüllermeier:
Automated Side-Channel Attacks using Black-Box Neural Architecture Search. 93 - Watson Ladd, Marloes Venema, Tanya Verma:
Portunus: Re-imagining access control in distributed systems. 94 - Michael Scott:
On TLS for the Internet of Things, in a Post Quantum world. 95 - Mariana Botelho da Gama, Emad Heydari Beni, Emmanuela Orsini, Nigel P. Smart, Oliver Zajonc:
MPC With Delayed Parties Over Star-Like Networks. 96 - Behzad Abdolmaleki, Noemi Glaeser, Sebastian Ramacher, Daniel Slamanig:
Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable. 97 - Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek:
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors. 98 - Gabrielle Beck, Aarushi Goel, Aditya Hegde, Abhishek Jain, Zhengzhong Jin, Gabriel Kaptchuk:
Scalable Multiparty Garbling. 99 - Ye Dong, Xiaojun Chen, Weizhan Jing, Kaiyun Li, Weiping Wang:
Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs. 100 - Xiaoen Lin, Le He, Hongbo Yu:
Practical Preimage Attack on 3-Round Keccak-256. 101 - Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson:
Cache-timing attack against HQC. 102 - Runchao Han, Jiangshan Yu:
Fair Delivery of Decentralised Randomness Beacon. 103 - Anamaria Costache, Lea Nürnberger, Rachel Player:
Optimizations and Trade-offs for HElib. 104 - Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu:
Gate-Level Masking of Streamlined NTRU Prime Decapsulation in Hardware. 105 - Jonathan Komada Eriksen, Lorenz Panny, Jana Sotáková, Mattia Veroni:
Deuring for the People: Supersingular Elliptic Curves with Prescribed Endomorphism Ring in General Characteristic. 106 - Alan Szepieniec, Alexander Lemmens, Jan Ferdinand Sauer, Bobbin Threadbare:
The Tip5 Hash Function for Recursive STARKs. 107 - Kyle Storrier, Adithya Vadapalli, Allan Lyons, Ryan Henry:
Grotto: Screaming fast (2 + 1)-PC for ℤ2n via (2, 2)-DPFs. 108 - Ling Sun, Meiqin Wang:
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations (Long Paper). 109 - Ripon Patgiri, Dolendro Singh Laiphrakpam, Dalton Meitei Thounaojam:
VORSHA: A Variable-sized, One-way and Randomized Secure Hash Algorithm. 110 - Vahid Amin Ghafari, Mohammad Ali Orumiehchiha, Saeed Rostami:
An Attack on the LILLE Stream Cipher. 111 - Gabrielle De Micheli, Duhyeong Kim, Daniele Micciancio, Adam Suhl:
Faster Amortized FHEW bootstrapping using Ring Automorphisms. 112 - Luciano Freitas de Souza, Andrei Tonkikh, Adda-Akram Bendoukha, Sara Tucci Piergiovanni, Renaud Sirdey, Oana Stan, Petr Kuznetsov:
Homomorphic Sortition - Single Secret Leader Election for PoS Blockchains. 113 - Tarun Chitra, Matheus V. X. Ferreira, Kshitij Kulkarni:
Credible, Optimal Auctions via Blockchains. 114 - Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud:
Multi-User CDH Problems and the Concrete Security of NAXOS and HMQV. 115 - Diego Castejon-Molina, Dimitrios Vasilopoulos, Pedro Moreno-Sanchez:
CBDC-Cash: How to Fund and Defund CBDC Wallets. 116 - Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey:
Full-Round Differential Attack on ULC and LICID Block Ciphers Designed for IoT. 117 - Chloé Gravouil:
A New Generic Fault Resistant Masking Scheme using Error-Correcting Codes. 118 - Akin Ünal:
Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant Locality. 119 - Adam Caulfield, Nabiha Raza, Peizhao Hu:
X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts. 120 - Dmitrii I. Koshelev:
Hashing to elliptic curves over highly 2-adic fields $\mathbb{F}_{\!q}$ with O(log(q)) operations in $\mathbb{F}_{\!q}$. 121 - Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen:
SoK: Privacy-Enhancing Technologies in Finance. 122 - Tudorica Radu, Rares Radu, Emil Simion:
A way of decrypting particular malware payloads found in MZPE files. 123 - Ionut Rosca
, Alexandra-Ina Butnaru, Emil Simion:
Security of Ethereum Layer 2s. 124 - Irimia Alexandru-Vasile:
Ransomware data recovery techniques. 125 - Danielle Movsowitz-Davidow, Yacov Manevich:
Privacy-Preserving Payment System With Verifiable Local Differential Privacy. 126 - Rebecca Schwerdt, Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Jörn Müller-Quade, Astrid Ottenhues:
Sender-binding Key Encapsulation. 127 - Prabhanjan Ananth, Fatih Kaleoglu, Qipeng Liu:
Cloning Games: A General Framework for Unclonable Primitives. 128 - Noam Mazor:
A Lower Bound on the Share Size in Evolving Secret Sharing. 129 - Hannah Davis, Christopher Patton, Mike Rosulek, Phillipp Schoppmann:
Verifiable Distributed Aggregation Functions. 130 - (Withdrawn) Some Practical Applications of Fully Homomorphic Encryption. 131
- Alexandra Ciobanu, Marina Stefiuc:
Security analysis of DBTRU cryptosystem. 132 - Shantanu Sharma
, Yin Li, Sharad Mehrotra, Nisha Panwar
, Dhrubajyoti Ghosh, Peeyush Gupta:
Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data. 133 - Sabyasachi Dey, Hirendra Kumar Garai
, Subhamoy Maitra:
Cryptanalysis of Reduced Round ChaCha- New Attack and Deeper Analysis. 134 - Sarani Bhattacharya, Dilip Kumar Shanmugasundaram Veeraraghavan, Shivam Bhasin, Debdeep Mukhopadhyay:
Uncovering Vulnerabilities in Smartphone Cryptography: A Timing Analysis of the Bouncy Castle RSA Implementation. 135 - Kaizhan Lin, Jianming Lin, Shiping Cai, Weize Wang, Chang-An Zhao:
Public-key Compression in M-SIDH. 136 - Joakim Brorsson, Bernardo David, Lorenzo Gentile
, Elena Pagnin, Paul Stankovski Wagner:
PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials. 137 - Chloé Hébant, David Pointcheval, Robert Schädlich:
Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures. 138 - Alessandro Budroni, Erik Mårtensson:
Improved Estimation of Key Enumeration with Applications to Solving LWE. 139 - Jianwei Li, Michael Walter:
Improving Convergence and Practicality of Slide-type Reductions. 140 - Reyhaneh Rabaninejad, Alexandros Bakas, Eugene Frimpong, Antonis Michalas:
A Secure Bandwidth-Efficient Treatment for Dropout-Resistant Time-Series Data Aggregation. 141 - Soundes Marzougui, Ievgan Kabin, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert:
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler using a CDT. 142 - Marloes Venema:
A Practical Compiler for Attribute-Based Encryption: New Decentralized Constructions and More. 143 - Hisham S. Galal, Amr M. Youssef:
Aegis: Privacy-Preserving Market for Non-Fungible Tokens. 144 - Xinxin Gong, Yonglin Hao, Qingju Wang:
Combining MILP Modeling with Algebraic Bias Evaluation for Linear Mask Search: Improved Fast Correlation Attacks on SNOW. 145 - Da Lin, Zejun Xiang, Runqing Xu, Shasha Zhang, Xiangyong Zeng:
Optimized Quantum Implementation of AES. 146 - Chaya Ganesh, Claudio Orlandi, Mahak Pancholi
, Akira Takahashi, Daniel Tschudi:
Fiat-Shamir Bulletproofs are Non-Malleable (in the Random Oracle Model). 147 - Ripon Patgiri, Dolendro Singh Laiphrakpam:
PassPro: A secure password protection from the adversaries. 148 - Ahmad Al Badawi, Yuriy Polyakov:
Demystifying Bootstrapping in Fully Homomorphic Encryption. 149 - Fuchun Lin, Chaoping Xing, Yizhou Yao:
More Efficient Zero-Knowledge Protocols over ℤ2k via Galois Rings. 150 - Coteanu Maria Gabriela, Tîflea Denisa-Ionela:
Analysis of the XSL Attack. 151 - Antonio Faonio, Dennis Hofheinz, Luigi Russo:
Almost Tightly-Secure Re-Randomizable and Replayable CCA-secure Public Key Encryption. 152 - Shuai Han, Shengli Liu, Dawu Gu:
Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model. 153 - Sisi Duan, Xin Wang, Haibin Zhang:
Practical Signature-Free Asynchronous Common Subset in Constant Time. 154 - Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo Ohta:
More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters. 155 - Xinxuan Zhang, Yi Deng:
Zero-Knowledge Elementary Databases with Function Queries. 156 - Thomas Prest:
A Key-Recovery Attack against Mitaka in the t-Probing Model. 157 - Joppe W. Bos, Olivier Bronchain, Frank Custers, Joost Renes, Denise Verbakel, Christine van Vredendaal:
Enabling FrodoKEM on Embedded Devices. 158 - Katharina Boudgoust, Akira Takahashi:
Sequential Half-Aggregation of Lattice-Based Signatures. 159 - Madhurima Mukhopadhyay:
Practical Improvement to Gaudry-Schost Algorithm on Subgroups of ℤ*p. 160 - Tomoyuki Morimae, Takashi Yamakawa:
Quantum Advantage from One-Way Functions. 161 - Wei Ao, Vishnu Boddeti:
AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE. 162 - Anuj Dubey, Rosario Cammarota, Avinash Varna, Raghavan Kumar, Aydin Aysu:
Hardware-Software Co-design for Side-Channel Protected Neural Network Inference. 163 - Frank Y. C. Lu:
Input Transformation Based Efficient Zero-Knowledge Argument System for Arbitrary Circuits with Practical Succinctness. 164 - Chengkai Zhu, Zhenyu Huang:
Optimizing the depth of quantum implementations of linear layers. 165 - Brice Minaud, Michael Reichle:
Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption. 166 - Colin Boyd, Bor de Kock, Lise Millerjord:
Modular Design of KEM-Based Authenticated Key Exchange. 167 - Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani, Lubjana Beshaj:
Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4. 168 - Muhong Huang, Runchao Han, Zhiqiang Du, Yanfang Fu, Liangxin Liu:
Reputation-based state machine replication. 169 - Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
EKE Meets Tight Security in the Universally Composable Framework. 170 - Itai Dinur, Uri Stemmer, David P. Woodruff, Samson Zhou:
On Differential Privacy and Adaptive Data Analysis with Bounded Space. 171 - Luke Demarest, Benjamin Fuller, Alexander Russell:
Impossibility of Efficient Information-Theoretic Fuzzy Extraction. 172 - Daniel Escudero, Hongqing Liu, Chaoping Xing, Chen Yuan:
Degree-D Reverse Multiplication-Friendly Embeddings: Constructions and Applications. 173 - Qun Liu, Zheng Zhao, Meiqin Wang:
Improved Heuristics for Low-latency Implementations of Linear Layers. 174 - Vasyl Ustimenko:
Linear codes of Schubert type and quadratic public keys of Multivariate Cryptography. 175 - Pierre Briaud, Morten Øygarden:
A New Algebraic Approach to the Regular Syndrome Decoding Problem and Implications for PCG Constructions. 176 - Damien Robert:
The geometric interpretation of the Tate pairing and its applications. 177 - Siwei Chen
, Mingming Zhu, Zejun Xiang, Runqing Xu, Xiangyong Zeng, Shasha Zhang:
Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers. 178 - Itay Bookstein, Boaz Tsaban:
TS-Hash: a lightweight cryptographic hash family based on Galois LFSRs. 179 - Jinpeng Hou, Yansong Gao, Mang Su, Willy Susilo, Jie Chen, Anmin Fu:
Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys. 180 - Emanuele Bellini, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin:
Fully Automated Differential-Linear Attacks against ARX Ciphers. 181 - Yi-Fu Lai:
CAPYBARA and TSUBAKI: Verifiable Random Functions from Group Actions and Isogenies. 182 - Mario Larangeira, Maxim Jourenko:
Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality. 183 - André Schrottenloher:
Quantum Linear Key-recovery Attacks Using the QFT. 184 - Philipp G. Haselwarter, Benjamin Salling Hvass, Lasse Letager Hansen, Théo Winterhalter, Catalin Hritcu, Bas Spitters:
The Last Yard: Foundational End-to-End Verification of High-Speed Cryptography. 185 - Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Generic Models for Group Actions. 186 - Lúcás Críostóir Meier:
Towards Modular Foundations for Protocol Security. 187 - Daniel R. L. Brown:
Cryptanalysis of a key agreement scheme using determinants and rectangular matrices. 188 - Nicolas Gailly, Kelsey Melissaris, Yolan Romailler:
tlock: Practical Timelock Encryption from Threshold BLS. 189 - Hongbo Wen, Jon Stephens, Yanju Chen, Kostas Ferles, Shankara Pailoor, Kyle Charbonnet, Isil Dillig, Yu Feng:
Practical Security Analysis of Zero-Knowledge Proof Circuits. 190 - Sanghyeon Park
, Jeong Hyuk Lee, Seunghwa Lee, Jung Hyun Chun, Hyeonmyeong Cho, MinGi Kim, Hyun Ki Cho, Soo-Mook Moon:
Beyond the Blockchain Address: Zero-Knowledge Address Abstraction. 191 - Hagit Attiya, Constantin Enea, Shafik Nassar:
Faithful Simulation of Randomized BFT Protocols on Block DAGs. 192 - Ismail Afia, Riham AlTawy:
Traceable Policy-Based Signatures with Delegation. 193 - Léo Ducas, Shane Gibbons:
Hull Attacks on the Lattice Isomorphism Problem. 194 - Pavel Atnashev:
A simpler alternative to Lucas-Lehmer-Riesel primality test. 195 - Shengyuan Xu, Xiutao Feng, Yongxing Wang:
On Two Factors Affecting the Efficiency of MILP Models in Automated Cryptanalyses. 196 - Mihir Bellare, Laura Shea:
Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle Attacks. 197 - Jiaxin Pan, Benedikt Wagner:
Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive Assumptions. 198 - Reyhane Attarian, Esfandiar Mohammadi, Tao Wang, Emad Heydari Beni:
MixFlow: Assessing Mixnets Anonymity with Contrastive Architectures and Semantic Network Information. 199 - Johanna Loyer, André Chailloux:
Classical and quantum 3 and 4-sieves to solve SVP with low memory. 200 - Aleksei Udovenko:
DenseQMC: an efficient bit-slice implementation of the Quine-McCluskey algorithm. 201 - Dachao Wang, Baocang Wang, Siwei Sun:
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper). 202 - Esra Günsay, Cansu Betin Onur, Murat Cenk:
A Different Base Approach for Better Efficiency on Range Proofs. 203 - Arthur Lazzaretti, Charalampos Papamanthou:
TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH. 204 - Jitendra Bhandari, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel, Ramesh Karri
:
DEFending Integrated Circuit Layouts. 205 - Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, Rahul Sharma:
Orca: FSS-based Secure Training with GPUs. 206 - Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, Ashwin Jha:
On Quantum Secure Compressing Pseudorandom Functions. 207 - Sai Deng, Bo Du:
zkTree: a zk recursion tree with ZKP membership proofs. 208 - Lichao Wu, Guilherme Perin, Stjepan Picek:
Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext. 209 - Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
New Generic Constructions of Error-Correcting PIR and Efficient Instantiations. 210 - Gyeongju Song, Kyungbae Jang, Hwajeong Seo:
Improved Low-depth SHA3 Quantum Circuit for Fault-tolerant Quantum Computers. 211 - Madhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay:
Generating Secure Hardware using ChatGPT Resistant to CWEs. 212 - Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, Guilherme Rito:
Deniable Authentication when Signing Keys Leak. 213 - Joakim Brorsson, Martin Gunnarsson:
DIPSAUCE: Efficient Private Stream Aggregation Without Trusted Parties. 214 - José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Antoine Séré, Pierre-Yves Strub:
Formally verifying Kyber Part I: Implementation Correctness. 215 - Yashvanth Kondi, Claudio Orlandi, Lawrence Roy:
Two-Round Stateless Deterministic Two-Party Schnorr Signatures From Pseudorandom Correlation Functions. 216 - Charlotte Lefevre:
Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks. 217 - Nathalie Lang
, Stefan Lucks:
On the Post-Quantum Security of Classical Authenticated Encryption Schemes. 218 - Knud Ahrens:
Sieving for large twin smooth integers using single solutions to Prouhet-Tarry-Escott. 219 - Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood:
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication. 220 - Kevin Choi, Arasu Arun, Nirvan Tyagi, Joseph Bonneau:
Bicorn: An optimistically efficient distributed randomness beacon. 221 - Samed Düzlü, Juliane Krämer, Thomas Pöppelmann, Patrick Struck:
A Lightweight Identification Protocol Based on Lattices. 222 - Chris Peikert, Jiayu Xu:
Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability. 223 - Shiduo Zhang, Xiuhan Lin, Yang Yu, Weijia Wang:
Improved Power Analysis Attacks on Falcon. 224 - Andrea Basso:
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies. 225 - Chun Guo, Lei Wang, Dongdai Lin:
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls. 226 - Yong Liu, Zejun Xiang, Siwei Chen
, Shasha Zhang, Xiangyong Zeng:
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials. 227 - Benjamin Dowling, Britta Hale:
Authenticated Continuous Key Agreement: Active MitM Detection and Prevention. 228 - Fuyuki Kitagawa, Ryo Nishimaki:
One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More. 229 - Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM. 230 - Mostefa Kara, Abdelkader Laouid, Omer Al dabbas, Mohammad Hammoudeh, Ahcène Bounceur:
One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations. 231 - Martin R. Albrecht, Alex Davidson, Amit Deo, Daniel Gardham:
Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and FHE. 232 - Varun Narayanan, Vinod M. Prabhakaran, Neha Sangwan, Shun Watanabe:
Complete Characterization of Broadcast and Pseudo-Signatures from Correlations. 233 - Rupeng Yang:
Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness. 234 - Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaolu Hou, Hyunji Kim, Hwajeong Seo:
New Results on Machine Learning Based Distinguishers. 235 - Taiga Hiroka, Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Tapas Pal, Takashi Yamakawa:
Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More. 236 - Keegan Ryan, Nadia Heninger:
Fast Practical Lattice Reduction through Iterated Compression. 237 - Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak:
Certifying Giant Nonprimes. 238 - (Withdrawn) Improved Preimage Sampling for Lattices. 239
- Baptiste Lambin, Gregor Leander, Patrick Neumann:
Pitfalls and Shortcomings for Decompositions and Alignment (Full Version). 240 - Munawar Hasan, Donghoon Chang:
Lynx: Family of Lightweight Authenticated Encryption Schemes based on Tweakable Blockcipher. 241 - Vittorio Zaccaria:
The propagation game: on simulatability, correlation matrices, and probing security. 242 - Andre Esser, Rahul Girme, Arindam Mukherjee, Santanu Sarkar:
Memory-Efficient Attacks on Small LWE Keys. 243 - Céline Chevalier, Paul Hermouet, Quoc-Huy Vu:
Semi-Quantum Copy-Protection and More. 244 - Julien Devevey, Pouria Fallahpour, Alain Passelègue, Damien Stehlé:
A Detailed Analysis of Fiat-Shamir with Aborts. 245 - Manuel Barbosa, Gilles Barthe, Christian Doczkal, Jelle Don, Serge Fehr, Benjamin Grégoire, Yu-Hsuan Huang, Andreas Hülsing, Yi Lee, Xiaodi Wu:
Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium. 246 - Qian Guo, Thomas Johansson, Vu Nguyen:
A New Sieving-Style Information-Set Decoding Algorithm. 247 - Paul Rösler, Daniel Slamanig, Christoph Striecks:
Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging. 248 - Fabio Banfi, Konstantin Gegier, Martin Hirt, Ueli Maurer:
Anamorphic Encryption, Revisited. 249 - Dan Boneh, Jiaxin Guan, Mark Zhandry:
A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies. 250 - Usman Ali, Hamza Omar, Chujiao Ma, Vaibhav Garg, Omer Khan:
Hardware Root-of-Trust implementations in Trusted Execution Environments. 251 - James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa:
Obfuscation of Pseudo-Deterministic Quantum Circuits. 252 - Zhenzhen Bao, Seongha Hwang, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Kazuhiko Minematsu:
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version). 253 - Kaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais:
Mitigating Decentralized Finance Liquidations with Reversible Call Options. 254 - Danping Shi, Siwei Sun, Ling Song, Lei Hu, Qianqian Yang:
Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY. 255 - Junqing Gong, Ji Luo, Hoeteck Wee:
Traitor Tracing with N^(1/3)-size Ciphertexts and O(1)-size Keys from k-Lin. 256 - Andrei Stoian, Jordan Fréry, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoît Chevallier-Mames:
Deep Neural Networks for Encrypted Inference with TFHE. 257 - Jordan Fréry, Andrei Stoian, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoît Chevallier-Mames, Arthur Meyre:
Privacy-Preserving Tree-Based Inference with Fully Homomorphic Encryption. 258 - Guangqiu Lv, Chenhui Jin, Ting Cui:
A MIQCP-Based Automatic Search Algorithm for Differential-Linear Trails of ARX Ciphers(Long Paper). 259 - Drew Stone:
Webb Protocol: A cross-chain private application and governance protocol. 260 - Sanjay Bhattacherjee, Julio Hernandez-Castro, Jack Moyler:
A Greedy Global Framework for LLL. 261 - Henri Gilbert, Rachelle Heim Boissier, Louiza Khati, Yann Rotella:
Generic Attack on Duplex-Based AEAD Modes using Random Function Statistics. 262 - Yanbo Chen:
DualMS: Efficient Lattice-Based Two-Round Multi-Signature with Trapdoor-Free Simulation. 263 - Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Public Key Encryption with Secure Key Leasing. 264 - James Bartusek, Sanjam Garg
, Vipul Goyal, Dakshita Khurana, Giulio Malavolta, Justin Raizes, Bhaskar Roberts:
Obfuscation and Outsourced Computation with Certified Deletion. 265 - Panos Kampanakis, Tancrède Lepoint:
Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments. 266 - Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy:
PROTEUS: A Tool to generate pipelined Number Theoretic Transform Architectures for FHE and ZKP applications. 267 - Dinh Duy Nguyen, Duong Hieu Phan, David Pointcheval:
Verifiable Multi-Client Functional Encryption for Inner Product. 268 - Emmanuela Orsini, Riccardo Zanotto:
Simple Two-Round OT in the Explicit Isogeny Model. 269 - Benny Applebaum, Niv Konstantini:
Actively Secure Arithmetic Computation and VOLE with Constant Computational Overhead. 270 - Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, Peter Schwabe:
Swoosh: Practical Lattice-Based Non-Interactive Key Exchange. 271 - Bertram Poettering, Simon Rastikian:
A study of KEM generalizations. 272 - Josh Beal, Ben Fisch:
Derecho: Privacy Pools with Proof-Carrying Disclosures. 273 - Kelong Cong, Debajyoti Das, Georgio Nicolas, Jeongeun Park:
Panacea: Non-interactive and Stateless Oblivious RAM. 274 - Stefano Tessaro, Chenzhi Zhu:
Revisiting BBS Signatures. 275 - Stefano Tessaro, Chenzhi Zhu:
Threshold and Multi-Signature Schemes from Linear Hash Functions. 276 - Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe:
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. 277 - Hongrui Cui, Xiao Wang, Kang Yang, Yu Yu:
Actively Secure Half-Gates with Minimum Overhead under Duplex Networks. 278 - Francesco D'Amato, Luca Zanolini:
Recent Latest Message Driven GHOST: Balancing Dynamic Availability With Asynchrony Resilience. 279 - Francesco D'Amato, Luca Zanolini:
A Simple Single Slot Finality Protocol For Ethereum. 280 - Zhenkun Yang, Wen Wang, Jeremy Casas, Pasquale Cocchini, Jin Yang:
Towards A Correct-by-Construction FHE Model. 281 - Andrea Coladangelo:
Quantum trapdoor functions from classical one-way functions. 282 - Ke Wu, Elaine Shi, Hao Chung:
Maximizing Miner Revenue in Transaction Fee Mechanism Design. 283 - Somnath Panja, Nikita Tripathi, Shaoquan Jiang, Reihaneh Safavi-Naini:
Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data. 284 - Yingxin Li, Fukang Liu, Gaoli Wang:
New Records in Collision Attacks on RIPEMD-160 and SHA-256. 285 - Matthew Chun, Anubhab Baksi, Anupam Chattopadhyay:
DORCIS: Depth Optimized Quantum Implementation of Substitution Boxes. 286 - Nimish Mishra, Kuheli Pratihar, Anirban Chakraborty, Debdeep Mukhopadhyay:
Modelling Delay-based Physically Unclonable Functions through Particle Swarm Optimization. 287 - Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. 288 - Amos Beimel:
Lower-Bounds for Secret-Sharing Schemes for k-Hypergraphs. 289 - Thomas Pornin:
Improved Key Pair Generation for Falcon, BAT and Hawk. 290 - Wenlong Tian, Jian Guo, Zhiyong Xu, Ruixuan Li, Weijun Xiao:
PEO-Store: Practical and Economical Oblivious Store with Peer-to-Peer Delegation. 291 - Chelsea Komlo, Ian Goldberg, Douglas Stebila:
A Formal Treatment of Distributed Key Generation, and New Constructions. 292 - Diana Maimut, Evgnosia-Alexandra Kelesidis, Ilona Teodora Ciocan:
Searching for Gemstones: Flawed Stegosystems May Hide Promissing Ideas. 293 - Qian Guo, Denis Nabokov, Alexander Nilsson, Thomas Johansson:
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes. 294 - Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki:
Randomized Half-Ideal Cipher on Groups with applications to UC (a)PAKE. 295 - Ethan Heilman, Lucie Mugnier, Athanasios Filippidis, Sharon Goldberg, Sebastien Lipman, Yuval Marcus, Mike Milano, Sidhartha Premkumar, Chad Unrein:
OpenPubkey: Augmenting OpenID Connect with User held Signing Keys. 296 - Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford:
Authenticated private information retrieval. 297 - Mihir Bellare, Hannah Davis, Zijing Di:
Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA. 298 - Yonglin Hao, Qingju Wang, Lin Jiao, Xinxin Gong:
Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE. 299 - Hu Xiaobo, Shengyuan Xu, Tu Yinzi, Xiutao Feng:
CNF Characterization of Sets over ℤ2n and Its Applications in Cryptography. 300 - Kamil Kluczniak, Giacomo Santato:
On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption. 301 - Léo Ducas, Ludo N. Pulles:
Does the Dual-Sieve Attack on Learning with Errors even Work? 302 - Brandon Goodell, Aaron Feickert:
Fusion One-Time Non-Interactively-Aggregatable Digital Signatures From Lattices. 303 - Eleni Agathocleous, Vishnupriya Anupindi, Annette Bachmayr, Chloe Martindale, Rahinatou Yuh Njah Nchiwo, Mima Stanojkovski:
On homomorphic encryption using abelian groups: Classical security analysis. 304 - Marco Macchetti:
A Novel Related Nonce Attack for ECDSA. 305 - Khashayar Barooti, Giulio Malavolta, Michael Walter:
A Simple Construction of Quantum Public-Key Encryption from Quantum-Secure One-Way Functions. 306 - Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song, Chenkai Weng:
SUPERPACK: Dishonest Majority MPC with Constant Online Communication. 307 - Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi:
Punctured Syndrome Decoding Problem Efficient Side-Channel Attacks Against Classic McEliece. 308 - Rohann Bella, Xavier Bultel, Céline Chevalier, Pascal Lafourcade, Charles Olivier-Anclin:
Practical Construction for Secure Trick-Taking Games Even With Cards Set Aside. 309 - Lennart Braun, Mahak Pancholi
, Rahul Rachuri, Mark Simkin:
Ramen: Souper Fast Three-Party Computation for RAM Programs. 310 - Léo Colisson, Garazi Muguruza, Florian Speelman:
Oblivious Transfer from Zero-Knowledge Proofs, or How to Achieve Round-Optimal Quantum Oblivious Transfer and Zero-Knowledge Proofs on Quantum States. 311 - Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss, Siavash Riahi:
BIP32-Compatible Threshold Wallets. 312 - Sajin Sasy, Ian Goldberg:
SoK: Metadata-Protecting Communication Systems. 313 - Joseph Jaeger, Akshaya Kumar:
Memory-Tight Multi-Challenge Security of Public-Key Encryption. 314 - Thuat Do:
SoK on Blockchain Evolution and a Taxonomy for Public Blockchain Generations. 315 - Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Ting Cui, Tairong Shi, Kai Zhang:
New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers. 316 - Razvan Barbulescu, Adrien Poulalion:
The special case of cyclotomic fields in quantum algorithms for unit groups. 317 - Danilo Gligoroski:
A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography. 318 - Reza Ghasemi:
A Sharding-Based Approach for Enhancing Efficiency in ISSDOs for Sharing Scattered Values. 319 - Fabrice Benhamouda, Mariana Raykova, Karn Seth:
Anonymous Counting Tokens. 320 - Cas Cremers, Julian Loss, Benedikt Wagner:
A Holistic Security Analysis of Monero Transactions. 321 - R. Radheshwar, Meenakshi Kansal, Pierrick Méaux, Dibyendu Roy:
Differential Fault Attack on Rasta and FiLIP DSM. 322 - Lorenzo Grassi, Dmitry Khovratovich, Markus Schofnegger:
Poseidon2: A Faster Version of the Poseidon Hash Function. 323 - Michael Rosenberg
:
LATKE: An identity-binding PAKE from lattice assumptions. 324 - Prabhanjan Ananth, Alexander Poremba, Vinod Vaikuntanathan:
Revocable Cryptography from Learning with Errors. 325 - Jean Liénardy, Frédéric Lafitte:
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality. 326 - Yangru Zheng, Juntao Gao, Baocang Wang:
New Quantum Search Model on Symmetric Ciphers and Its Applications. 327 - Jan Schoone, Joan Daemen:
The state diagram of χ. 328 - Martin R. Albrecht, Miro Haller, Lenka Mareková, Kenneth G. Paterson:
Caveat Implementor! Key Recovery Attacks on MEGA. 329 - Bernardo David, Anders Konring, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan:
Perfect MPC over Layered Graphs. 330 - Nicky Mouha, Christopher Celi:
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm. 331 - Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng:
Asymmetric Group Message Franking: Definitions & Constructions. 332 - Izumi Takeuti, Tomoko Adachi:
Secret Sharing Scheme with Perfect Concealment. 333 - Pierre-Alain Fouque, Adela Georgescu, Chen Qian, Adeline Roux-Langlois, Weiqiang Wen:
A Generic Transform from Multi-Round Interactive Proof to NIZK. 334 - Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger:
Separating Oil and Vinegar with a Single Trace. 335 - Apurva K. Vangujar, Buvana Ganesh, Paolo Palmieri:
A Novel Approach to e-Voting with Group Identity Based Identification and Homomorphic Encryption. 336 - Kyungbae Jang, Dukyoung Kim, Yujin Oh, Sejin Lim, Yujin Yang, Hyunji Kim, Hwajeong Seo:
Quantum Implementation of AIM: Aiming for Low-Depth. 337 - Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Shield: Secure Allegation Escrow System with Stronger Guarantees. 338 - Christopher Dunne:
An Analysis of the Post Quantum and Classical Security of 4x4 and 16x4 S-Boxes and Their Implementations in Simplified-AES. 339 - Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter:
SALSA PICANTE: a machine learning attack on LWE with binary secrets. 340 - Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Benjamin Livshits, Arthur Gervais:
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy. 341 - Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier:
TurboSHAKE. 342 - Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs:
A Map of Witness Maps: New Definitions and Connections. 343 - Kyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida:
Quantum Search-to-Decision Reduction for the LWE Problem. 344 - Alex B. Grilo, Or Sattath, Quoc Huy Vu:
Encryption with Quantum Public Keys. 345 - Jin Li, Xingyu Li, Chang Chen, Guoyu Yang, Junyang Li, Qi Chen, Hongyang Yan:
How to achieve bidirectional zero-knowledge authentication? 346 - Yibin Yang, Mohsen Minaei, Srinivasan Raghuraman, Ranjit Kumaresan, Mahdi Zamani:
Off-Chain Programmability at Scale. 347 - Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski:
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions. 348 - Gang Xu, Shiyuan Xu, Yibo Cao, Ke Xiao, Xiu-Bo Chen, Mianxiong Dong, Shui Yu:
AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios. 349 - Leonard Assouline, Brice Minaud:
Weighted Oblivious RAM, with Applications to Searchable Symmetric Encryption. 350 - Yoshinori Aono, Junji Shikata:
Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from DLP or LWE. 351 - Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock:
Post-Quantum Security for the Extended Access Control Protocol. 352 - Rahul Mishra, Bhupendra Singh, Radhakrishnan Delhibabu:
Searching for S-boxes with better Diffusion using Evolutionary Algorithm. 353 - Federico Canale, María Naya-Plasencia:
Guessing Less and Better: Improved Attacks on GIFT-64. 354 - Jian Liu, Yanjun Li, Runyi Liu, Jian Zou, Zhiqiang Wang:
Improved Differential Analysis of MIBS Based on Greedy Algorithm. 355 - Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication! 356 - Zhen Gu, Wen-jie Lu, Cheng Hong:
FFT-less TFHE: Simpler, Faster and Scale-invariant. 357 - Farshid Haidary Makoui, T. Aaron Gulliver, Mohammad Dakhilalian:
Efficient Code Based Cryptosystem with Dual Inverse Matrix. 358 - Marc Rivinius, Pascal Reisert, Sebastian Hasler, Ralf Küsters:
Convolutions in Overdrive: Maliciously Secure Convolutions for MPC. 359 - Farshid Haidary Makoui, T. Aaron Gulliver, Mohammad Dakhilalian:
Fast and Efficient Code-Based Digital Signature with Dual Inverse Matrix. 360 - Alexandre Adomnicai, Kazuhiko Minematsu, Junji Shikata:
Authenticated Encryption for Very Short Inputs. 361 - Or Sattath, Shai Wyborski:
Protecting Quantum Procrastinators with Signature Lifting: A Case Study in Cryptocurrencies. 362 - Robin Berger, Brandon Broadnax, Michael Klooß, Jeremias Mechler, Jörn Müller-Quade, Astrid Ottenhues, Markus Raiber:
Composable Long-Term Security with Rewinding. 363 - Dimitris Kolonelos, Mary Maller, Mikhail Volkhov:
Zero-Knowledge Arguments for Subverted RSA Groups. 364 - Ramsès Fernàndez-València:
Verifiable encodings in multigroup fully homomorphic encryption. 365 - Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide:
Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications. 366 - Qiang Li, Qun-Xiong Zheng, Wenfeng Qi:
Practical Attacks on Small Private Exponent RSA: New Records and New Insights. 367 - Naina Gupta, Arpan Jati, Anupam Chattopadhyay:
AI Attacks AI: Recovering Neural Network architecture from NVDLA using AI-assisted Side Channel Attack. 368 - Nada Amin, John Burnham, François Garillot, Rosario Gennaro, Chhi'mèd Künzang, Daniel Rogozin, Cameron Wong:
LURK: Lambda, the Ultimate Recursive Knowledge. 369 - James Bartusek, Dakshita Khurana, Alexander Poremba:
Publicly-Verifiable Deletion via Target-Collapsing Functions. 370 - Scott Griffy, Anna Lysyanskaya:
PACIFIC: Privacy-preserving automated contact tracing scheme featuring integrity against cloning. 371 - Haozhe Jiang, Kaiyue Wen, Yilei Chen:
Practically Solving LPN in High Noise Regimes Faster Using Neural Networks. 372 - Yuuki Komi, Takayuki Tatekawa:
Consensus Algorithm Using Transaction History for Cryptocurrency. 373 - Orr Dunkelman, Nathan Keller, Ariel Weizman:
Practical-Time Related-Key Attack on GOST with Secret S-boxes. 374 - Nicolas Belleville:
Accelerating exp-log based finite field multiplication. 375 - Thomas Decru, Sabrina Kunzweiler:
Efficient computation of (3n,3n)-isogenies. 376 - Stefan Ritterhoff, Georg Maringer, Sebastian Bitzer, Violetta Weger, Patrick Karl, Thomas Schamberger, Jonas Schupp, Antonia Wachter-Zeh:
FuLeeca: A Lee-based Signature Scheme. 377 - Nerla Jean-Louis, Yunqi Li, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller:
SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. 378 - Theodoros Kapourniotis, Elham Kashefi, Dominik Leichtle, Luka Music, Harold Ollivier:
Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority. 379 - Edward Eaton, Tancrède Lepoint, Christopher A. Wood:
Security Analysis of Signature Schemes with Key Blinding. 380 - Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse:
Security of Blockchains at Capacity. 381 - Thomas Attema, Pedro Capitão, Lisa Kohl:
On Homomorphic Secret Sharing from Polynomial-Modulus LWE. 382 - Gideon Samid:
The Prospect of a New Cryptography: Extensive use of non-algorithmic randomness competes with mathematical complexity. 383 - Zhenfei Zhang:
Origami: Fold a Plonk for Ethereum's VDF. 384 - Marco Baldi, Sebastian Bitzer, Alessio Pavoni, Paolo Santini, Antonia Wachter-Zeh, Violetta Weger:
Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem. 385 - Julia Len, Esha Ghosh, Paul Grubbs, Paul Rösler:
Interoperability in End-to-End Encrypted Messaging. 386 - Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia:
Constrained Pseudorandom Functions from Homomorphic Secret Sharing. 387 - Lucjan Hanzlik:
Non-Interactive Blind Signatures for Random Messages. 388 - Sahiba Suryawanshi, Dhiman Saha, Shashwat Jaiswal
:
TIDAL: Practical Collisions on State-Reduced Keccak Variants. 389 - Dmitrii I. Koshelev:
Batching Cipolla-Lehmer-Müller's square root algorithm with hashing to elliptic curves. 390 - Rhys Weatherley:
Additional Modes for ASCON. 391 - Justin Holmgren
, Ruta Jawale:
Locally Covert Learning. 392 - Liam Eagen, Ariel Gabizon:
cqlin: Efficient linear operations on KZG commitments with cached quotients. 393 - Joël Alwen, Marta Mularczyk, Yiannis Tselekounis:
Fork-Resilient Continuous Group Key Agreement. 394 - Danilo Francati, Daniele Friolo, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Daniele Venturi:
Registered (Inner-Product) Functional Encryption. 395 - Giuseppe D'Alconzo
:
Monomial Isomorphism for Tensors and Applications to Code Equivalence Problems. 396 - Dahlia Malkhi, Kartik Nayak:
Extended Abstract: HotStuff-2: Optimal Two-Phase Responsive BFT. 397 - Tomer Ashur, Erik Takke:
A New Linear Distinguisher for Four-Round AES. 398 - Wai-Kong Lee, Raymond K. Zhao, Ron Steinfeld, Amin Sakzad, Seong Oun Hwang:
High Throughput Lattice-based Signatures on GPUs: Comparing Falcon and Mitaka. 399 - Antigoni Polychroniadou, Gilad Asharov, Benjamin E. Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso:
Prime Match: A Privacy-Preserving Inventory Matching System. 400 - Keita Emura:
Generic Construction of Broadcast Authenticated Encryption with Keyword Search. 401 - KangHoon Lee, Ji Won Yoon:
Discretization Error Reduction for Torus Fully Homomorphic Encryption. 402 - Daniel Collins, Simone Colombo, Loïs Huguenin-Dumittan:
Real World Deniability in Messaging. 403 - Nico Döttling, Dimitris Kolonelos, Russell W. F. Lai, Chuanwei Lin, Giulio Malavolta, Ahmadreza Rahimi:
Efficient Laconic Cryptography from Learning With Errors. 404 - Carsten Baum, Bernardo David, Elena Pagnin, Akira Takahashi:
CaSCaDE: (Time-Based) Cryptography from Space Communications DElay. 405 - Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Quasi-linear masking to protect against both SCA and FIA. 406 - Simone Galimberti, Maria Potop-Butucaru:
Game Theoretical Analysis of DAG-Ledgers Backbone. 407 - Manuel Barbosa, François Dupressoir, Benjamin Grégoire, Andreas Hülsing, Matthias Meijers, Pierre-Yves Strub:
Machine-Checked Security for $\mathrm{XMSS}$ as in RFC 8391 and $\mathrm{SPHINCS}^{+}$. 408 - Jiaxin Guan, Daniel Wichs, Mark Zhandry:
Somewhere Randomness Extraction and Security against Bounded-Storage Mass Surveillance. 409 - Alper Çakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro:
Unbounded Leakage-Resilience and Leakage-Detection in a Quantum World. 410 - Vikas Srivastava, Anubhab Baksi, Sumit Kumar Debnath:
An Overview of Hash Based Signatures. 411 - Keita Emura:
Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search. 412 - Miran Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Accelerating HE Operations from Key Decomposition Technique. 413 - Guru-Vamsi Policharla, Bas Westerbaan, Armando Faz-Hernández, Christopher A. Wood:
Post-Quantum Privacy Pass via Post-Quantum Anonymous Credentials. 414 - Giovanni Deligios, Aarushi Goel, Chen-Da Liu-Zhang:
Maximally-Fluid MPC with Guaranteed Output Delivery. 415 - Asaf Cohen, Pawel Cyprys, Shlomi Dolev:
Single Instance Self-Masking via Permutations. 416 - Isaac Andrés Canales Martinez, Igor Semaev:
Multivariate Correlation Attacks and the Cryptanalysis of LFSR-based Stream Ciphers. 417 - Benny Applebaum, Eliran Kachlon, Arpita Patra:
The Round Complexity of Statistical MPC with Optimal Resiliency. 418 - Nick Frymann, Daniel Gardham, Mark Manulis:
Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices. 419 - Laurane Marco, Abdullah Talayhan, Serge Vaudenay:
Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger. 420 - Islam Faisal:
Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation. 421 - Sven Bauer, Fabrizio De Santis:
A Differential Fault Attack against Deterministic Falcon Signatures. 422 - Nina Bindel, Britta Hale:
A Note on Hybrid Signature Schemes. 423 - Shuichi Hirahara, Rahul Ilango, Zhenjian Lu, Mikito Nanashima, Igor C. Oliveira:
A Duality Between One-Way Functions and Average-Case Symmetry of Information. 424 - Keita Emura:
Generic Construction of Dual-Server Public Key Authenticated Encryption with Keyword Search. 425 - Hyungrok Jo, Shingo Sato, Junji Shikata:
A Tightly Secure Identity-based Signature Scheme from Isogenies. 426 - Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin, Yiping Ma:
SPRINT: High-Throughput Robust Distributed Schnorr Signatures. 427 - Yu Li, Li-Ping Wang:
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory. 428 - Mathieu Gross, Robert Kunzelmann
, Georg Sigl:
CPU to FPGA Power Covert Channel in FPGA-SoCs. 429 - Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen:
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging. 430 - Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal:
Ruffle: Rapid 3-party shuffle protocols. 431 - Thomas Aulbach, Simona Samardjiska, Monika Trimoska:
Practical key-recovery attack on MQ-Sign. 432 - Wissam Ghantous, Federico Pintore, Mattia Veroni:
Efficiency of SIDH-based signatures (yes, SIDH). 433 - Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography. 434 - Ky Nguyen, Duong Hieu Phan, David Pointcheval:
Optimal Security Notion for Decentralized Multi-Client Functional Encryption. 435 - Pierrick Dartois, Antonin Leroux, Damien Robert, Benjamin Wesolowski:
SQISignHD: New Dimensions in Cryptography. 436 - Benjamin M. Case, Richa Jain, Alex Koshelev, Andy Leiserson, Daniel Masny, Ben Savage, Erik Taubeneck, Martin Thomson, Taiki Yamaguchi:
Interoperable Private Attribution: A Distributed Attribution and Aggregation Protocol. 437 - René Rodríguez, Enes Pasalic, Fengrong Zhang, Yongzhuang Wei:
Minimal p-ary codes from non-covering permutations. 438 - Karim Eldefrawy, Sashidhar Jakkamsetti, Ben Terner, Moti Yung:
Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition. 439 - Hannah Davis, Matthew Green, Nadia Heninger, Keegan Ryan, Adam Suhl:
On the Possibility of a Backdoor in the Micali-Schnorr Generator. 440 - Boris Ryabko:
Unconditionally secure ciphers with a short key for a source with unknown statistics. 441 - Jingwei Chen, Yong Feng, Yang Liu, Wenyuan Wu, Guanci Yang:
Non-interactive privacy-preserving naive Bayes classifier using homomorphic encryption. 442 - Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Sakiyama:
Abstraction Model of Probing and DFA Attacks on Block Ciphers. 443 - Shingo Sato, Junji Shikata:
Compact Bounded-Collusion Identity-based Encryption via Group Testing. 444 - Elizabeth C. Crites, Chelsea Komlo, Mary Maller:
Fully Adaptive Schnorr Threshold Signatures. 445 - Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders:
Revisiting Preimage Sampling for Lattices. 446 - Léo Ducas:
Provable Lattice Reduction of ℤn with Blocksize n/2. 447 - Farshid Haidary Makoui, T. Aaron Gulliver:
Generalized Inverse Matrix Construction for Code Based Cryptography. 448 - Diana Ghinea, Chen-Da Liu-Zhang, Roger Wattenhofer:
Multidimensional Approximate Agreement with Asynchronous Fallback. 449 - Sam Haskins, Trevor Stevado:
Unlocking doors from half a continent away: A relay attack against HID Seos. 450 - Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, Sri Aravinda Krishnan Thyagarajan:
Non-interactive VSS using Class Groups and Application to DKG. 451 - Mingxun Zhou, Andrew Park, Elaine Shi, Wenting Zheng:
Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation. 452 - Hao Guo:
An algebraic attack for forging signatures of MPPK/DS. 453 - Afonso Arriaga, Petra Sala, Marjan Skrobot:
Wireless-channel Key Exchange. 454 - David Heath, Vladimir Kolesnikov, Rafail Ostrovsky:
Tri-State Circuits: A Better Model of Computation for Garbling. 455 - Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz:
Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems. 456 - Pratish Datta, Tapas Pal:
Registration-Based Functional Encryption. 457 - Nir Bitansky, Omer Paneth, Dana Shamir, Tomer Solomon:
Non-interactive Universal Arguments. 458 - Moshe Avital, Itamar Levi:
SCMA: Plaintext Classification Assisted Side Channel Spectral Modulation Attacks. Towards Noise-insensitive SCA Attacks... 459 - Qinglan Zhao, Mengran Li, Zhixiong Chen, Baodong Qin, Dong Zheng:
A unified construction of weightwise perfectly balanced Boolean functions. 460 - Debranjan Pal
, Upasana Mandal, Abhijit Das, Dipanwita Roy Chowdhury:
Deep Learning based Differential Classifier of PRIDE and RC5. 461 - Sebastian Hasler, Toomas Krips, Ralf Küsters, Pascal Reisert, Marc Rivinius:
Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice. 462 - Benjamin Y. Chan, Rafael Pass:
Simplex Consensus: A Simple and Fast Consensus Protocol. 463 - Johannes Blömer, Jan Bobolz, Laurens Porzenheim:
A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices. 464 - Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Thari Nabeel, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew G. Schmidt, Brandon Reagen:
RPU: The Ring Processing Unit. 465 - Sarvar Patel, Joon Young Seo, Kevin Yeo:
Don't be Dense: Efficient Keyword PIR for Sparse Databases. 466 - Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song:
Secure Floating-Point Training. 467 - Tugberk Kocatekin, Cafer Çaliskan:
A new approach on IoT security: n-out-of-n. 468 - Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs:
Four Attacks and a Proof for Telegram. 469 - Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi:
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges. 470 - Toi Tomita, Junji Shikata:
Compact Signature Aggregation from Module-Lattices. 471 - Roi Bar Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar:
Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL. 472 - Joshua Gancher, Sydney Gibson, Pratap Singh, Samvid Dharanikota, Bryan Parno:
Owl: Compositional Verification of Security Protocols via an Information-Flow Type System. 473 - Héctor Masip Ardevol, Marc Guzmán-Albiol, Jordi Baylina Melé, Jose Luis Muñoz-Tapia:
eSTARK: Extending STARKs with Arguments. 474 - Ferucio Laurentiu Tiplea:
The Jacobi Symbol Problem for Quadratic Congruences and Applications to Cryptography. 475 - Muhammad Imran:
A private set intersection protocol based on multi-party quantum computation for greatest common divisor. 476 - Yodai Watanabe:
Separations among formulations of non-malleable encryption under valid ciphertext condition. 477 - Hyeonbum Lee, Jae Hong Seo:
TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup. 478 - Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. 479 - Adda-Akram Bendoukha, Oana Stan, Renaud Sirdey, Nicolas Quero, Luciano Freitas de Souza:
Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications. 480 - Johannes Ernst, Aikaterini Mitrokotsa:
A Framework for UC Secure Privacy Preserving Biometric Authentication using Efficient Functional Encryption. 481 - Buvana Ganesh, Apurva K. Vangujar, Alia Umrani, Paolo Palmieri:
Homomorphic Trapdoors for Identity-based and Group Signatures. 482 - Uddipana Dowerah, Subhranil Dutta, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal:
Unbounded Predicate Inner Product Functional Encryption from Pairings. 483 - Kamyar Mohajerani, Luke Beckwith, Abubakr Abdulgadir, Eduardo Ferrufino, Jens-Peter Kaps
, Kris Gaj:
SCA Evaluation and Benchmarking of Finalists in the NIST Lightweight Cryptography Standardization Process. 484 - Martin R. Albrecht, Sofía Celi, Benjamin Dowling, Daniel Jones:
Practically-exploitable Cryptographic Vulnerabilities in Matrix. 485 - Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin:
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. 486 - Nouri Alnahawi, Nicolai Schmitt, Alexander Wiesmaier, Andreas Heinemann, Tobias Grasmeyer:
On the State of Crypto-Agility. 487 - Shweta Agrawal, Sagnik Saha, Nikolaj I. Schwartzbach, Akhil Vanukuri, Prashant Nalini Vasudevan:
k-SUM in the Sparse Regime. 488 - Éric Sageloli, Pierre Pébereau, Pierrick Méaux, Céline Chevalier:
Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices. 489 - Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa:
Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions. 490 - Samuel Bedassa Alemu, Julia Kastner:
On the Security of Blind Signatures in the Multi-Signer Setting. 491 - Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano:
Batch Signatures, Revisited. 492 - Tianxiang Dai, Li Duan, Yufan Jiang, Yong Li, Fei Mei, Yulian Sun:
Force: Making 4PC > 4 × PC in Privacy Preserving Machine Learning on GPU. 493 - Quang Dao, Paul Grubbs:
Spartan and Bulletproofs are simulation-extractable (for free!). 494 - Agnese Gini, Pierrick Méaux:
On the algebraic immunity of weightwise perfectly balanced functions. 495 - Xichao Hu, Yongqiang Li, Lin Jiao, Zhengbin Liu, Mingsheng Wang:
Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect. 496 - Sergey Agievich:
Upper bounding the number of bent functions using 2-row bent rectangles. 497 - Foteini Baldimtsi, Konstantinos Kryptos Chalkias, François Garillot, Jonas Lindstrøm, Ben Riva, Arnab Roy, Alberto Sonnino, Pun Waiwitlikhit, Joy Wang:
Subset-optimized BLS Multi-signature with Key Aggregation. 498 - Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame:
FLUTE: Fast and Secure Lookup Table Evaluations (Full Version). 499 - Giulio Malavolta, Michael Walter:
Non-Interactive Quantum Key Distribution. 500 - Marshall Ball
, Hanjun Li, Huijia Lin, Tianren Liu:
New Ways to Garble Arithmetic Circuits. 501 - Nico Döttling, Phillip Gajland, Giulio Malavolta:
Laconic Function Evaluation for Turing Machines. 502 - Wouter Legiest, Furkan Turan, Michiel Van Beirendonck, Jan-Pieter D'Anvers, Ingrid Verbauwhede:
Neural Network Quantisation for Faster Homomorphic Encryption. 503 - Shuailiang Hu:
Private Computation Based On Polynomial Operation. 504 - Matthias Probst, Manuel Brosch, Georg Sigl:
Side-Channel Analysis of Integrate-and-Fire Neurons within Spiking Neural Networks. 505 - George Tasopoulos, Charis Dimopoulos, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld:
Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices. 506 - Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May:
Low Memory Attacks on Small Key CSIDH. 507 - Jesús-Javier Chi-Domínguez, Amalia Pizarro-Madariaga, Edgardo Riquelme:
Computing Quotient Groups of Smooth Order with Applications to Isogenies over Higher-Dimensional Abelian Varieties. 508 - Anit Kumar Ghosal, Dipanwita Roychowdhury:
Non-malleable Codes from Authenticated Encryption in Split-State Model. 509 - Anit Kumar Ghosal, Dipanwita Roychowdhury:
Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model. 510 - Dimitris Mouris, Charles Gouert, Nektarios Georgios Tsoutsos:
MPloC: Privacy-Preserving IP Verification using Logic Locking and Secure Multiparty Computation. 511 - Shankara Pailoor, Yanju Chen, Franklyn Wang, Clara Rodríguez-Núñez, Jacob Van Gaffen, Jason Morton, Michael Chu, Brian Gu, Yu Feng, Isil Dillig:
Automated Detection of Underconstrained Circuits for Zero-Knowledge Proofs. 512 - Elette Boyle, Geoffroy Couteau, Pierre Meyer:
Sublinear Secure Computation from New Assumptions. 513 - Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
Black-Box Reusable NISC with Random Oracles. 514 - Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas, Amir Nabizadeh:
stoRNA: Stateless Transparent Proofs of Storage-time. 515 - Atsunori Ichikawa, Ilan Komargodski, Koki Hamada, Ryo Kikuchi, Dai Ikarashi:
3-Party Secure Computation for RAMs: Optimal and Concretely Efficient. 516 - Aikata, Andrea Basso, Gaëtan Cassiers, Ahmet Can Mert, Sujoy Sinha Roy:
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography. 517 - Lingyue Qin, Boxin Zhao, Jialiang Hua, Xiaoyang Dong, Xiaoyun Wang:
Weak-Diffusion Structure: Meet-in-the-Middle Attacks on Sponge-based Hashing Revisited. 518 - Farshid Haidary Makoui, Thomas Aaron Guliver:
Generalized Inverse Binary Matrix Construction with PKC Application. 519 - Dmitry Khovratovich, Mario Marhuenda Beltrán, Bart Mennink:
Generic Security of the SAFE API and Its Applications. 520 - David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew G. Schmidt, Ajey P. Jacob, Benedict Reynwar, Kellie Canida, Akhilesh R. Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram:
TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation. 521 - Jean-Philippe Aumasson, Dmitry Khovratovich, Bart Mennink, Porçu Quine:
SAFE: Sponge API for Field Elements. 522 - Frank Denis:
Adding more parallelism to the AEGIS authenticated encryption algorithms. 523 - Gideon Samid:
AI Resistant (AIR) Cryptography. 524 - Daniele Micciancio, Mark Schultz:
Error Correction and Ciphertext Quantization in Lattice Cryptography. 525 - Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart:
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More. 526 - Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong:
Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree. 527 - Yizhi Huang, Rahul Ilango, Hanlin Ren:
NP-Hardness of Approximating Meta-Complexity: A Cryptographic Approach. 528 - Ivan Damgård, Divya Ravi, Daniel Tschudi, Sophia Yakoubov:
Secure Communication in Dynamic Incomplete Networks. 529 - Raine Nieminen, Thomas Schneider:
Breaking and Fixing Garbled Circuits when a Gate has Duplicate Input Wires. 530 - Boaz Shahar:
Practical Randomness Measure Tool. 531 - Shuang Wu, Chunhuan Zhao, Ye Yuan, Shuzhou Sun, Jie Li, Yamin Liu:
HLG: A framework for computing graphs in Residue Number System and its application in Fully Homomorphic Encryption. 532 - Ghous Amjad, Seny Kamara, Tarik Moataz:
Injection-Secure Structured and Searchable Symmetric Encryption. 533 - Zeyu Liu, Eran Tromer, Yunhao Wang:
Group Oblivious Message Retrieval. 534 - Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park:
Practical Randomized Lattice Gadget Decomposition With Application to FHE. 535 - Victor Shoup, Nigel P. Smart:
Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience. 536 - Tomer Ashur, Thomas Buschman, Mohammad Mahzoun:
Algebraic cryptanalysis of POSEIDON. 537 - Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa:
Publicly Verifiable Deletion from Minimal Assumptions. 538 - Alexander May, Carl Richard Theodor Schneider:
Dlog is Practically as Hard (or Easy) as DH - Solving Dlogs via DH Oracles on EC Standards. 539 - Arianna Gringiani, Alessio Meneghetti, Edoardo Signorini, Ruggero Susella:
MAYO: Optimized Implementation with Revised Parameters for ARMv7-M. 540 - Han-Ting Chen, Yi-Hua Chung, Vincent Hwang, Chi-Ting Liu, Bo-Yin Yang:
Algorithmic Views of Vectorized Polynomial Multipliers for NTRU and NTRU Prime (Long Paper). 541 - Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, Andrea Visconti:
A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium. 542 - Amit Behera, Zvika Brakerski, Or Sattath, Omri Shmueli:
Pseudorandomness with Proof of Destruction and Applications. 543 - Jakub Klemsa, Melek Önen:
PARMESAN: Parallel ARithMEticS over ENcrypted data. 544 - Jung Hee Cheon, Wonhee Cho, Jiseung Kim:
Improved Universal Thresholdizer from Threshold Fully Homomorphic Encryption. 545 - Brice Colombier, Vincent Grosso, Pierre-Louis Cayrel, Vlad-Florin Dragoi:
Horizontal Correlation Attack on Classic McEliece. 546 - Junrui Liu, Ian Kretz, Hanzhi Liu, Bryan Tan, Jonathan Wang, Yi Sun, Luke Pearson, Anders Miltner, Isil Dillig, Yu Feng:
Certifying Zero-Knowledge Circuits with Refinement Types. 547 - Ahmet Ramazan Agirtas, Oguz Yayla:
Compartment-based and Hierarchical Threshold Delegated Verifiable Accountable Subgroup Multi-signatures. 548 - Wouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam van Buuren, Frederik Vercauteren:
Weak instances of class group action based cryptography via self-pairings. 549 - Akin Ünal:
New Baselines for Local Pseudorandom Number Generators by Field Extensions. 550 - Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Lukasz Chmielewski, Kirthivaasan Puniamurthy, Milan Sorf:
Breaking DPA-protected Kyber via the pair-pointwise multiplication. 551 - Srinath T. V. Setty, Justin Thaler, Riad S. Wahby:
Customizable constraint systems for succinct arguments. 552 - Ren Taguchi, Atsushi Takayasu:
Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain. 553 - Reza Hooshmand:
Hybrid Encryption Scheme based on Polar Codes. 554 - Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame:
SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning. 555 - Quan Yuan, Mehdi Tibouchi, Masayuki Abe:
Quantum-access Security of Hash-based Signature Schemes. 556 - Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra:
Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time. 557 - Alia Umrani, Paolo Palmieri:
A Multireceiver Certificateless Signcryption (MCLS) Scheme. 558 - James Bartusek, Dakshita Khurana, Giulio Malavolta, Alexander Poremba, Michael Walter:
Weakening Assumptions for Publicly-Verifiable Deletion. 559 - Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Alessandro Sorniotti:
A Framework for Practical Anonymous Credentials from Lattices. 560 - Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
vr2FHE- Securing FHE from Reaction-based Key Recovery Attacks. 561 - Liliya Kraleva, Mohammad Mahzoun, Raluca Posteuca, Dilara Toprakhisar, Tomer Ashur, Ingrid Verbauwhede:
Cryptanalysis of Strong Physically Unclonable Functions. 562 - Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko:
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. 563 - James Bartusek, Dakshita Khurana, Akshayaram Srinivasan:
Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge). 564 - Pratish Datta, Tapas Pal:
Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded. 565 - Zhuohui Feng, Ye Luo, Chao Wang, Qianqian Yang, Zhiquan Liu, Ling Song:
Improved Differential Cryptanalysis on SPECK Using Plaintext Structures. 566 - Sanjam Garg
, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
hinTS: Threshold Signatures with Silent Setup. 567 - Marc Titus Trifan, Alexandru Nicolau, Alexander V. Veidenbaum:
Enhancing the Privacy of Machine Learning via faster arithmetic over Torus FHE. 568 - Antonio Faonio, Dario Fiore, Markulf Kohlweiss, Luigi Russo, Michal Zajac:
From Polynomial IOP and Commitments to Non-malleable zkSNARKs. 569 - Kai-Min Chung, Yao-Ting Lin, Mohammad Mahmoody:
Black-Box Separations for Non-Interactive Commitments in a Quantum World. 570 - Abtin Afshar, Geoffroy Couteau, Mohammad Mahmoody, Elahe Sadeghi:
Fine-Grained Non-Interactive Key-Exchange: Constructions and Lower Bounds. 571 - Sashidhar Jakkamsetti, Zeyu Liu, Varun Madathil:
Scalable Private Signaling. 572 - Abhiram Kothapalli, Srinath T. V. Setty:
HyperNova: Recursive arguments for customizable constraint systems. 573 - Ajay Dabral:
A Randomized Bit Generator using Algebraic Number Theory. 574 - István Vajda:
On Central Bank Digital Currency: A composable treatment. 575 - Elnaz Mehraein, Zahra Ahmadian, Reza Nourmohammadi:
IGD-ScoreChain: A Lightweight and Scalable Blockchain Based on Node Sharding for the Internet of Things. 576 - Nicky Mouha:
Exploring Formal Methods for Cryptographic Hash Function Implementations. 577 - Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang:
DORAM revisited: Maliciously secure RAM-MPC with logarithmic overhead. 578 - Erez Danieli, Menachem Goldzweig, Moshe Avital, Itamar Levi:
Revealing the Secrets of Radio-Enabled Embedded Systems: on extraction of raw information from any on-board signal through RF. 579 - Rui Zhou, Ming Duan, Qi Wang, Qianqiong Wu, Sheng Guo, Lulu Guo, Zheng Gong:
Neural-Linear Attack Based on Distribution Data and Its Application on DES. 580 - Yasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda:
A security analysis on MQ-Sign. 581 - Elena Kirshanova, Alexander May, Julian Nowakowski:
New NTRU Records with Improved Lattice Bases. 582 - Akash Madhusudan, Mahdi Sedaghat, Samarth Tiwari, Kelong Cong, Bart Preneel:
Reusable, Instant and Private Payment Guarantees for Cryptocurrencies. 583 - Bernardo Portela, Hugo Pacheco, Pedro Jorge, Rogério Pontes:
General-Purpose Secure Conflict-free Replicated Data Types. 584 - Alex Dalton, David Thomas, Peter Cheung:
Secret Swapping: Two Party Fair Exchange. 585 - Alex Dalton, David Thomas, Peter Cheung:
Proofless Verifiable Computation from Integer Factoring. 586 - Megan Chen, Alessandro Chiesa, Tom Gur, Jack O'Connor, Nicholas Spooner:
Proof-Carrying Data From Arithmetized Random Oracles. 587 - Nicolas Sendrier:
Wave Parameter Selection. 588 - Andre Esser, Javier A. Verbel, Floyd Zweydinger, Emanuele Bellini:
ttCryptographicEstimators: a Software Library for Cryptographic Hardness Estimation. 589 - Francesco Berti:
Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure. 590 - Shiyuan Xu, Yibo Cao, Xue Chen, Siu-Ming Yiu, Yanmin Zhao:
Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, Implementation, and Applications. 591 - Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais:
Blockchain Large Language Models. 592 - Johannes Mono, Tim Güneysu:
Implementing and Optimizing Matrix Triples with Homomorphic Encryption. 593 - Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti:
Semidirect Product Key Exchange: the State of Play. 594 - Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures. 595 - Shenghui Su, Ping Luo:
Time Complexities of Multiple-precision Modular Operations and Related Ratios. 596 - Songze Li, Duanyi Yao, Jin Liu:
FedVS: Straggler-Resilient and Privacy-Preserving Vertical Federated Learning for Split Models. 597 - Sourav Das, Philippe Camacho, Zhuolun Xiang, Javier Nieto, Benedikt Bünz, Ling Ren:
Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold. 598 - George Teseleanu:
A Note on a CBC-Type Mode of Operation. 599 - Beatrice Biasioli, Chiara Marcolla, Marco Calderini, Johannes Mono:
Improving and Automating BFV Parameters Selection: An Average-Case Approach. 600 - George Teseleanu:
Threshold Cryptosystems Based on 2k-th Power Residue Symbols. 601 - Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat, LaKyah Tyner:
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. 602 - Marc Joye:
TFHE Public-Key Encryption Revisited. 603 - Vincent Hwang:
Technical Report: Even Faster Polynomial Multiplication for NTRU Prime with AVX2. 604 - Apostolos Tzinas, Dionysis Zindros:
The Principal-Agent Problem in Liquid Staking. 605 - Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo:
Novel Approach to Cryptography Implementation using ChatGPT. 606 - Alexander Maximov, Mats Näslund:
Security analysis of the Milenage-construction based on a PRF. 607 - Paul Germouty, Enrique Larraia, Wei Zhang:
Publicly Verifiable Auctions with Privacy. 608 - Ferhat Karakoç, Alptekin Küpçü:
Enabling Two-Party Secure Computation on Set Intersection. 609 - Xingyu Meng, Abhrajit Sengupta, Kanad Basu:
A Needle in the Haystack: Inspecting Circuit Layout to Identify Hardware Trojans. 610 - Thomas Marquet, Elisabeth Oswald:
A Comparison of Multi-task learning and Single-task learning Approaches. 611 - Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, Meiqin Wang:
Cryptanalysis of SPEEDY. 612 - Alper Çakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro:
Computational Quantum Secret Sharing. 613 - Tianyu Zhang:
Comprehensive Preimage Security Evaluations on Rijndael-based Hashing. 614 - Elaine Shi, Nikhil Vanjani:
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles. 615 - Andrea Cerulli, Aisling Connolly, Gregory Neven, Franz-Stefan Preiss, Victor Shoup:
vetKeys: How a Blockchain Can Keep Many Secrets. 616 - Soham Roy, Anubhab Baksi, Anupam Chattopadhyay:
Quantum Implementation of ASCON Linear Layer. 617 - Jonas Bertels, Michiel Van Beirendonck, Furkan Turan, Ingrid Verbauwhede:
Hardware Acceleration of FHEW. 618 - Hiroki Furue, Tsuyoshi Takagi:
Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields. 619 - Benedikt Bünz, Binyi Chen:
ProtoStar: Generic Efficient Accumulation/Folding for Special Sound Protocols. 620 - Claude Carlet:
On APN functions whose graphs are maximal Sidon sets. 621 - Emanuele Bellini, David Gérault, Juan Grados, Yun Ju Huang, Mohamed Rachidi, Sharwan K. Tiwari, Rusydi H. Makarim:
CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives. 622 - Duhyeong Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Toward Practical Lattice-based Proof of Knowledge from Hint-MLWE. 623 - Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, MinJune Yi:
HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures. 624 - Junru Li
, Pengzhen Ke, Liang Feng Zhang:
Efficient Information-Theoretic Distributed Point Function with General Output Groups. 625 - Michael Mirkin, Lulu Zhou, Ittay Eyal, Fan Zhang:
Sprints: Intermittent Blockchain PoW Mining. 626 - Benny Applebaum, Eliran Kachlon:
Conflict Checkable and Decodable Codes and Their Applications. 627 - Debadrita Talapatra, Nimish Mishra, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
SEC: Fast Private Boolean Circuit Evaluation from Encrypted Look-ups. 628 - Vlasis Koutsos, Dimitrios Papadopoulos:
Publicly Auditable Functional Encryption. 629 - Benjamin E. Diamond, Jim Posen:
Proximity Testing with Logarithmic Randomness. 630 - KeYi Liu, Chungen Xu, Bennian Dou, Lei Xu:
Optimization of Functional Bootstrap with Large LUT and Packing Key Switching. 631 - Jung Hee Cheon, Minsik Kang, Taeseong Kim, Junyoung Jung, Yongdong Yeo:
High-Throughput Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Channel-By-Channel Packing. 632 - Anubhab Baksi, Sylvain Guilley, Ritu Ranjan Shrivastwa, Sofiane Takarabt:
From Substitution Box To Threshold. 633 - Sreyosi Bhattacharyya, Kaushik Nath, Palash Sarkar:
Polynomial Hashing over Prime Order Fields. 634 - Schwinn Saereesitthipitak, Dionysis Zindros:
Cassiopeia: Practical On-Chain Witness Encryption. 635 - Gustavo Banegas, Florian Caullery:
Multi-Armed SPHINCS+. 636 - Jean Liénardy:
Padding-based forgeries in the mode XOCB. 637 - Shahram Rasoolzadeh:
Classification of All t-Resilient Boolean Functions with t+4 Variables. 638 - Lena Heimberger, Fredrik Meisingseth, Christian Rechberger:
OPRFs from Isogenies: Designs and Analysis. 639 - Luciano Maino, Chloe Martindale, Lorenz Panny, Giacomo Pope, Benjamin Wesolowski:
A Direct Key Recovery Attack on SIDH. 640 - Charles Gouert, Vinu Joseph, Steven Dalton, Cédric Augonnet, Michael Garland, Nektarios Georgios Tsoutsos:
Accelerated Encrypted Execution of General-Purpose Applications. 641 - Sylvain Chatel, Christian Mouchet, Ali Utkan Sahin, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux:
PELTA - Shielding Multiparty-FHE against Malicious Adversaries. 642 - Ning Luo, Chenkai Weng, Jaspal Singh, Gefei Tan, Ruzica Piskac, Mariana Raykova:
Privacy-Preserving Regular Expression Matching using Nondeterministic Finite Automata. 643 - Jakob Burkhardt, Ivan Damgård, Tore Kasper Frederiksen, Satrajit Ghosh, Claudio Orlandi:
Improved Distributed RSA Key Generation Using the Miller-Rabin Test. 644 - Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation. 645 - Zhengjun Cao, Lihua Liu:
A Note on "Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT". 646 - Kwok-Yan Lam, Xianhui Lu, Linru Zhang, Xiangning Wang, Huaxiong Wang, Si Qi Goh:
Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service. 647 - Wei Ren:
Collatz Computation Sequence for Sufficient Large Integers is Random. 648 - Michael Brand, Hamish Ivey-Law, Tania Churchill:
FinTracer: A privacy-preserving mechanism for tracing electronic money. 649 - Geoffroy Couteau, Clément Ducros:
Pseudorandom Correlation Functions from Variable-Density LPN, Revisited. 650 - Marc Fischlin:
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. 651 - Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai:
ScionFL: Efficient and Robust Secure Quantized Aggregation. 652 - Sonja Bruckner, Sebastian Ramacher, Christoph Striecks:
Muckle+: End-to-End Hybrid Authenticated Key Exchanges. 653 - Thomas Schneider, Hossein Yalame, Michael Yonli:
Griffin: Towards Mixed Multi-Key Homomorphic Encryption. 654 - Joshua Davis, Rashid Minhas, Michelle Casario:
TandaPay Whistleblowing Communities: Shifting Workplace Culture Towards Zero-Tolerance Sexual Harassment Policies. 655 - Bolton Bailey, Andrew Miller:
Formalizing Soundness Proofs of SNARKs. 656 - Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, Zhong Shao:
Ou: Automating the Parallelization of Zero-Knowledge Protocols. 657 - Zhengjun Cao, Lihua Liu:
A note on "faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things". 658 - Tianrui Wang, Anyu Wang, Xiaoyun Wang:
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. 659 - Andrea Basso, Luciano Maino, Giacomo Pope:
FESTA: Fast Encryption from Supersingular Torsion Attacks. 660 - Tiago Martins, João Farinha:
Study of Arithmetization Methods for STARKs. 661 - Reo Eriguchi:
Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexity. 662 - Joel Gärtner:
NTWE: A Natural Combination of NTRU and LWE. 663 - Antoine Joux:
MPC in the head for isomorphisms and group actions. 664 - Keita Emura:
On the Feasibility of Identity-based Encryption with Equality Test against Insider Attacks. 665 - Morgan Thomas:
Arithmetization of predicates into Halo 2 using application specific trace types. 666 - Sina Aeeneh:
New Bounds on the Accuracy of Majority Voting for Multi-Class Classification. 667 - Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser:
Statement-Oblivious Threshold Witness Encryption. 668 - Thomas Kaeding:
Classical substitution ciphers and group theory. 669 - István András Seres, Péter Burcsi:
Behemoth: transparent polynomial commitment scheme with constant opening proof size and verifier time. 670 - Ward Beullens, Luca De Feo, Steven D. Galbraith, Christophe Petit:
Proving knowledge of isogenies - A survey. 671 - Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. 672 - Mark Zhandry:
Tracing Quantum State Distinguishers via Backtracking. 673 - Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Takanori Isobe:
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros. 674 - Xiao Lan, Hongjian Jin, Hui Guo, Xiao Wang:
Efï¬cient and Secure Quantile Aggregation of Private Data Streams. 675 - Jikang Lin, Jiahui He, Yanhong Fan, Meiqin Wang:
From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers. 676 - Barbara Gigerl, Robert Primas, Stefan Mangard:
Secure Context Switching of Masked Software Implementations. 677 - Archisman Ghosh, Jose Maria Bermudo Mera, Angshuman Karmakar, Debayan Das, Santosh Ghosh, Ingrid Verbauwhede, Shreyas Sen:
A 334µW 0.158mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber with Low-latency Striding Toom-Cook Multiplication Extended Version. 678 - Xiaohai Dai, Bolin Zhang, Hai Jin, Ling Ren:
ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path. 679 - Rishabh Bhadauria
, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Wenxuan Wu, Yupeng Zhang:
Private Polynomial Commitments and Applications to MPC. 680 - Colin Steidtmann, Sanjay Gollapudi:
Benchmarking ZK-Circuits in Circom. 681 - Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman:
Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT. 682 - Hannah Keller, Claudio Orlandi, Anat Paskin-Cherniavsky, Divya Ravi:
MPC with Low Bottleneck-Complexity: Information-Theoretic Security and More. 683 - Zhengjun Cao, Lihua Liu:
A note on "a lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment". 684 - Foo Yee Yeo, Jason H. M. Ying:
Third-Party Private Set Intersection. 685 - Raziyeh Salarifard, Hadi Soleimany:
Efficient Accelerator for NTT-based Polynomial Multiplication. 686 - Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia:
SoK: Delay-based Cryptography. 687 - Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia:
Applications of Timed-release Encryption with Implicit Authentication. 688 - Erica Blum, Jonathan Katz, Julian Loss, Kartik Nayak, Simon Ochsenreither:
Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus. 689 - Ginevra Giordani, Lorenzo Grassi, Silvia Onofri, Marco Pedicini:
Invertible Quadratic Non-Linear Functions over 픽pn via Multiple Local Maps. 690 - Quang Dao, Jim Miller, Opal Wright, Paul Grubbs:
Weak Fiat-Shamir Attacks on Modern Proof Systems. 691 - Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong:
On the Invalidity of LV16/Lin17 Obfuscation Schemes. 692 - Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik:
LeakyOhm: Secret Bits Extraction using Impedance Analysis. 693 - Xiaohan Yue:
VeriVoting: A decentralized, verifiable and privacy-preserving scheme for weighted voting. 694 - Jeffrey Champion, David J. Wu:
Non-Interactive Zero-Knowledge from Non-Interactive Batch Arguments. 695 - Koustabh Ghosh, Jonathan Fuchs, Parisa Amiri-Eliasi, Joan Daemen:
Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices. 696 - Mehmet Sabir Kiraz, Enrique Larraia, Owen Vaughan:
NFT Trades in Bitcoin with Off-chain Receipts. 697 - S. Murugesh:
A public-key based secure quantum-communication protocol using entangled qubits. 698 - Xiaokang Dai, Jingwei Chen, Wenyuan Wu, Yong Feng:
Lattice-based, more general anti-leakage model and its application in decentralization. 699 - Luke Harmon, Gaetan Delavignette, Arnab Roy, David William Honorio Araujo da Silva:
PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption. 700 - Tabitha Ogilvie:
Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption. 701 - Ghada Almashaqbeh, Rohit Chatterjee:
Building Unclonable Cryptography: A Tale of Two No-cloning Paradigms. 702 - Ping Wang, Yiting Su:
BQP ≠q QMA. 703 - Vipul Goyal, Chen-Da Liu-Zhang, Rafail Ostrovsky:
Asymmetric Multi-Party Computation. 704 - Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang:
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience. 705 - You Lyu, Shengli Liu:
Two-Message Authenticated Key Exchange from Public-Key Encryption. 706 - Julia Kastner, Julian Loss, Omar Renawi:
Concurrent Security of Anonymous Credentials Light, Revisited. 707 - Manuel Barbosa, Peter Schwabe:
Kyber terminates. 708 - Alexandre Augusto Giron:
Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement. 709 - Varun Madathil, Alessandra Scafuro:
PriFHEte: Achieving Full-Privacy in Account-based Cryptocurrencies is Possible. 710 - Serge Fehr, Yu-Hsuan Huang:
On the Quantum Security of HAWK. 711 - Alexandru Ionita:
Optimizing Attribute-based Encryption for Circuits using Compartmented Access Structures. 712 - Ali Dogan, Kemal Bicakci:
KAIME : Central Bank Digital Currency with Realistic and Modular Privacy. 713 - ChihYun Chuang, IHung Hsu, TingFang Lee:
A Two-Party Hierarchical Deterministic Wallets in Practice. 714 - Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao:
Research Philosophy of Modern Cryptography. 715 - Malik Imran, Aikata, Sujoy Sinha Roy, Samuel N. Pagliarini:
Towards High-speed ASIC Implementations of Post-Quantum Cryptography. 716 - Felice Manganiello
, Freeman Slaughter:
Generic Error SDP and Generic Error CVE. 717 - Giacomo Borin
, Edoardo Persichetti, Paolo Santini:
Zero-Knowledge Proofs from the Action Subgraph. 718 - Erkan Tairi
, Akin Ünal:
Lower Bounds for Lattice-based Compact Functional Encryption. 719 - Tung Le, Rouzbeh Behnia, Jorge Guajardo, Thang Hoang:
MUSES: Efficient Multi-User Searchable Encrypted Database. 720 - Supriya Adhikary, Angshuman Karmakar:
A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication. 721 - Mugurel Barcau, Vicentiu Pasol, George C. Turcas:
Composing Bridges. 722 - Giuseppe D'Alconzo
, Andrea Flamini, Andrea Gangemi:
Non-Interactive Commitment from Non-Transitive Group Actions. 723 - Lichao Wu, Guilherme Perin, Stjepan Picek:
Not so Difficult in the End: Breaking the ASCADv2 Dataset. 724 - Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes:
On Perfect Linear Approximations and Differentials over Two-Round SPNs. 725 - Zhengjun Cao, Lihua Liu:
A Note on "A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT". 726 - Marwan Zeggari, Aydin Abadi,