


default search action
IACR Cryptology ePrint Archive, Volume 2024
Volume 2024, 2024
- Vasyl Ustimenko:
On short digital signatures with Eulerian transformations. 1 - Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López:
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs. 2 - Alex Kampa:
Simple Soundness Proofs. 3 - Fredrik Meisingseth, Christian Rechberger, Fabian Schmid:
Practical Two-party Computational Differential Privacy with Active Security. 4 - Tamir Tassa, Avishay Yanai:
The Multiple Millionaires' Problem. 5 - Ran Canetti, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein:
Towards general-purpose program obfuscation via local mixing. 6 - Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, Willy Susilo:
Password Protected Universal Thresholdizer. 7 - Alessandro Budroni, Isaac Andrés Canales Martinez, Lucas Pandolfo Perin:
SoK: Methods for Sampling Random Permutations in Post-Quantum Cryptography. 8 - Aviad Ben Arie, Tamir Tassa:
Distributed Protocols for Oblivious Transfer and Polynomial Evaluation. 9 - Sulaiman Alhussaini, Craig Collett, Sergei Sergeev:
On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs. 10 - Daniel Noble, Brett Hemenway Falk, Rafail Ostrovsky:
MetaDORAM: Breaking the Log-Overhead Information Theoretic Barrier. 11 - Behnam Zahednejad, Chong-zhi Gao:
Two-Round ID-PAKE with strong PFS and single pairing operation. 12 - Zhengjun Cao, Lihua Liu:
A note on "intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era". 13 - Ahmet Ramazan Agirtas, Oguz Yayla:
A Lattice-based Accountable Subgroup Multi-signature Scheme with Verifiable Group Setup. 14 - Zhenkai Hu, Kang Yang, Yu Yu:
Unconditionally secure MPC for Boolean circuits with constant online communication. 15 - Sedigheh Khajouei-Nejad, Hamid Haj Seyyed Javadi, Sam Jabbehdari, Seyed Mohammad Hossein Moattar:
Reducing the computational complexity of fuzzy identity-based encryption from lattice. 16 - Yaroslav Balytskyi, Yevgen Kotukh, Gennady Khalimov, Sang-Yoon Chang:
PT-symmetric mapping of three states and its implementation on a cloud quantum processor. 17 - Scott R. Fluhrer, Quynh Dang:
Smaller Sphincs+. 18 - Randy Kuang, Maria Perepechaenko, Dafu Lou, Brinda Tank:
Benchmark Performance of Homomorphic Polynomial Public Key Cryptography for Key Encapsulation and Digital Signature Schemes. 19 - Michael Klooß, Andy Rupp, Daniel Schadt, Thorsten Strufe, Christiane Weis:
EROR: Efficient Repliable Onion Routing with Strong Provable Privacy. 20 - Gérald Gavin, Sandrine Tainturier:
Designing homomorphic encryptions with rational functions. 21 - San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu:
Fully Dynamic Attribute-Based Signatures for Circuits from Codes. 22 - Mustafa Khairallah:
CCA Security with Short AEAD Tags. 23 - Muhammed Ali Bingöl, Sermin Kocaman, Ali Dogan, Sibel Kurt Toplu:
FlexHi: A Flexible Hierarchical Threshold. 24 - Siavash Riahi, Orfeas Stefanos Thyfronitis Litos:
Bitcoin Clique: Channel-free Off-chain Payments using Two-Shot Adaptor Signatures. 25 - Huiwen Jia, Yupu Hu, Chunming Tang, Lin Wang:
Towards Compact Identity-based Encryption on Ideal Lattices. 26 - Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe Lin Jiang:
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice. 27 - Hoeteck Wee, David J. Wu:
Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis. 28 - Aarav Varshney, Prashant Agrawal, Mahabir Prasad Jhanwar:
YouChoose: A Lightweight Anonymous Proof of Account Ownership. 29 - Thomas Debris-Alazard, Pouria Fallahpour, Damien Stehlé:
Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs. 30 - Yi-Hsiu Chen, Yehuda Lindell:
Feldman's Verifiable Secret Sharing for a Dishonest Majority. 31 - Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, Jannik Spiessens:
Verifiable FHE via Lattice-based SNARKs. 32 - Qiu Shujing, Xin Xiangjun, Zheng Qian, Li Chaoyang, Li Fagen:
Security analysis and improvements on a semi-quantum electronic voting protocol. 33 - István András Seres, Péter Burcsi, Péter Kutas:
How (not) to hash into class groups of imaginary quadratic fields? 34 - Tore Kasper Frederiksen, Jonas Lindstrøm, Mikkel Wienberg Madsen, Anne Dorte Spangsberg:
A New Approach to Efficient and Secure Fixed-point Computation. 35 - Jian Wang
, Weiqiong Cao, Hua Chen, Haoyuan Li:
Blink: Breaking Lattice-Based Schemes Implemented in Parallel with Chosen-Ciphertext Attack. 36 - Damien Robert, Nicolas Sarkis:
Computing 2-isogenies between Kummer lines. 37 - Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, Leila Ben Abdelghani:
On Computing the Multidimensional Scalar Multiplication on Elliptic Curves. 38 - Manuel Barbosa, Deirdre Connolly, João Diogo Duarte
, Aaron Kaiser, Peter Schwabe, Karoline Varner, Bas Westerbaan:
X-Wing: The Hybrid KEM You've Been Looking For. 39 - Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, Kaiyi Zhang:
ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. 40 - Aikata, Dhiman Saha, Sujoy Sinha Roy:
SASTA: Ambushing Hybrid Homomorphic Encryption Schemes with a Single Fault. 41 - Jan Bobolz, Jesus Diaz, Markulf Kohlweiss:
Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. 42 - Sedigheh Khajouei-Nejad, Sam Jabbehdari, Hamid Haj Seyyed Javadi, Seyed Mohammad Hossein Moattar:
Fuzzy Identity Based Encryption with a flexible threshold value. 43 - Estuardo Alpirez Bock, Chris Brzuska, Pihla Karanko, Sabine Oechsner, Kirthivaasan Puniamurthy:
Adaptive Distributional Security for Garbling Schemes with 풪(|x|) Online Complexity. 44 - Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, Leibo Liu:
A Low-Latency High-Order Arithmetic to Boolean Masking Conversion. 45 - Benjamin Dowling, Bhagya Wimalasiri:
Quantum-Secure Hybrid Communication for Aviation Infrastructure. 46 - Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy, Stefano Trevisani:
On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing. 47 - Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, Duong Hieu Phan:
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries. 48 - Annv Liu, An Wang, Shaofei Sun, Congming Wei, Yaoling Ding, Yongjuan Wang, Liehuang Zhu:
CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis. 49 - Jens Ernstberger, Stefanos Chaliasos, Liyi Zhou, Philipp Jovanovic, Arthur Gervais:
Do You Need a Zero Knowledge Proof? 50 - Atul Luykx, Kenneth G. Paterson:
Limits on Authenticated Encryption Use in TLS. 51 - Sahiba Suryawanshi, Shibam Ghosh, Dhiman Saha, Prathamesh Ram:
Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash. 52 - Michael Clear, Ciaran McGoldrick, Hitesh Tewari:
Anonymous Homomorphic IBE with Application to Anonymous Aggregation. 53 - Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu:
FEASE: Fast and Expressive Asymmetric Searchable Encryption. 54 - Yunxiao Zhou, Shengli Liu, Shuai Han:
Multi-Hop Fine-Grained Proxy Re-Encryption. 55 - Youcef Mokrani, David Jao:
Zero-Knowledge Proofs for SIDH variants with Masked Degree or Torsion. 56 - Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou:
Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs. 57 - Sacha Servan-Schreiber:
Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions. 58 - Oren Ganon, Itamar Levi:
CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors. 59 - Julius Hermelink, Kai-Chun Ning, Emanuele Strieder:
The Insecurity of Masked Comparisons: SCAs on ML-KEM's FO-Transform. 60 - Mengce Zheng:
Partial Key Exposure Attack on Common Prime RSA. 61 - WenBin Hsieh:
Double Difficulties, Defense in Depth A succinct authenticated key agreement protocol. 62 - Julien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier:
A Study of Soft Analytical Side-Channel Attacks on Secure Hash Algorithms. 63 - Pierrick Méaux, Qingju Wang:
Extreme Algebraic Attacks. 64 - Marie Beth van Egmond, Vincent Dunning, Stefan van den Berg, Thomas Rooijakkers, Alex Sangers, Ton Poppe, Jan Veldsink:
Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation. 65 - Tolun Tosun, Amir Moradi, Erkay Savas:
Exploiting the Central Reduction in Lattice-Based Cryptography. 66 - Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang:
A Refined Hardness Estimation of LWE in Two-step Mode. 67 - Fangqi Dong, Zihan Hao, Ethan Mook, Daniel Wichs:
Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation. 68 - Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue:
SDitH in Hardware. 69 - Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. 70 - Seyedmohammad Nouraniboosjin, Fatemeh Ganji:
Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis. 71 - Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. 72 - Lipeng He:
A Comparative Examination of Network and Contract-Based Blockchain Storage Solutions for Decentralized Applications. 73 - Beyza Bozdemir, Betül Askin Özdemir, Melek Önen:
PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers. 74 - Moumita Dutta, Chaya Ganesh, Neha Jawalkar:
Succinct Verification of Compressed Sigma Protocols in the Updatable SRS setting. 75 - Loïc Demange, Mélissa Rossi:
A provably masked implementation of BIKE Key Encapsulation Mechanism. 76 - Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko:
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element. 77 - Pedram Hosseyni, Ralf Küsters, Tim Würtele:
Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process. 78 - Yanze Yang, Yiran Jia, Guangwu Xu:
On Modular Algorithms and Butterfly Operations in Number Theoretic Transform. 79 - Samuel Jaques:
Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions. 80 - Yulin Zhao, Hualin Zhou, Zhiguo Wan:
SuperFL: Privacy-Preserving Federated Learning with Efficiency and Robustness. 81 - James Bartusek, Zvika Brakerski, Vinod Vaikuntanathan:
Quantum State Obfuscation from Classical Oracles. 82 - Tianren Liu, Angelos Pelecanos, Stefano Tessaro, Vinod Vaikuntanathan:
Layout Graphs, Random Walks and the t-wise Independence of SPN Block Ciphers. 83 - Christoph Dobraunig, Krystian Matusiewicz, Bart Mennink, Alexander Tereschenko:
Efficient Instances of Docked Double Decker With AES. 84 - Dmitrii I. Koshelev:
Simultaneously simple universal and indifferentiable hashing to elliptic curves. 85 - Momonari Kudo, Kazuhiro Yokoyama:
On Hilbert-Poincaré series of affine semi-regular polynomial sequences and related Gröbner bases. 86 - Jung Hee Cheon, Hyeongmin Choe, Jai Hyun Park:
Tree-based Lookup Table on Batched Encrypted Queries using Homomorphic Encryption. 87 - Slim Bettaieb, Loïc Bidoux, Alessandro Budroni, Marco Palumbi, Lucas Pandolfo Perin:
Enabling PERK on Resource-Constrained Devices. 88 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Alexandra Babueva, Lidiia Nikiforova, Stanislav Smyshlyaev:
Two-party GOST in two parts: fruitless search and fruitful synthesis. 89 - Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller:
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection. 90 - Vasyl Ustimenko:
On historical Multivariate Cryptosystems and their restorations as instruments of Post-Quantum Cryptography. 91 - Sofía Celi, Alex Davidson:
Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries. 92 - Xindong Liu, Li-Ping Wang:
Short Code-based One-out-of-Many Proofs and Applications. 93 - Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade:
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions. 94 - Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin:
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches. 95 - Yasuhiko Ikematsu, Rika Akiyama:
Revisiting the security analysis of SNOVA. 96 - Dung Bui, Kelong Cong, Cyprien Delpech de Saint Guilhem:
Improved All-but-One Vector Commitment with Applications to Post-Quantum Signatures. 97 - Pierrick Méaux, Dibyendu Roy:
Theoretical differential fault attacks on FLIP and FiLIP. 98 - Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov:
Snarktor: A Decentralized Protocol for Scaling SNARKs Verification in Blockchains. 99 - Luke Demarest, Sohaib Ahmad, Sixia Chen, Benjamin Fuller, Alexander Russell:
FiveEyes: Cryptographic Biometric Authentication from the Iris. 100 - Albert Yu, Hai H. Nguyen, Aniket Kate, Hemanta K. Maji:
Unconditional Security using (Random) Anonymous Bulletin Board. 101 - Sanjam Garg
, Mohammad Hajiabadi, Peihan Miao, Alice Murphy:
Laconic Branching Programs from the Diffie-Hellman Assumption. 102 - Daniel Nager:
ChaCha related 64 bit oriented ARX cipher. 103 - Bo Jiang, Jian Du, Qiang Yan:
AnonPSI: An Anonymity Assessment Framework for PSI. 104 - Emanuele Bellini, Alessandro De Piccoli, Mattia Formenti, David Gérault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti:
Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives. 105 - Ibrahim Yakut, Huseyin Polat:
A Trust-based Recommender System over Arbitrarily Partitioned Data with Privacy. 106 - Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, Antonio Marcedone:
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency. 107 - Angus Gruen:
Some Improvements for the PIOP for ZeroCheck. 108 - Jaehyung Kim, Jinyeong Seo, Yongsoo Song:
Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS. 109 - Peigen Li, Jintai Ding:
Cryptanalysis of the SNOVA signature scheme. 110 - Yong Liu, Yuejun Liu, Yongbin Zhou, Yiwen Gao, Zehua Qiao, Huaxin Wang:
A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation. 111 - Matthias J. Kannwischer, Markus Krausz
, Richard Petri, Shang-Yi Yang:
pqm4: Benchmarking NIST Additional Post-Quantum Signature Schemes on Microcontrollers. 112 - Wenhui Wu, Muzhou Li, Meiqin Wang:
Improved Linear Key Recovery Attacks on PRESENT. 113 - Quinten Norga, Jan-Pieter D'Anvers, Suparna Kundu, Ingrid Verbauwhede:
Mask Conversions for d+1 shares in Hardware, with Application to Lattice-based PQC. 114 - Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Accelerating BGV Bootstrapping for Large p Using Null Polynomials Over ℤpe. 115 - Marina Checri, Renaud Sirdey, Aymen Boudguiga, Jean-Paul Bultel, Antoine Choffrut:
On the practical CPAD security of "exact" and threshold FHE schemes and libraries. 116 - Alex Pellegrini, Giovanni Tognolini:
Breaking HWQCS: a code-based signature scheme from high weight QC-LDPC codes. 117 - Charles Gouert, Nektarios Georgios Tsoutsos:
Data Privacy Made Easy: Enhancing Applications with Homomorphic Encryption. 118 - Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran, Rajeev Raghunath:
R3PO: Reach-Restricted Reactive Program Obfuscation and its Application to MA-ABE. 119 - Daniel Collins, Loïs Huguenin-Dumittan, Ngoc Khanh Nguyen, Nicolas Rolin, Serge Vaudenay:
K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures. 120 - Stephen M. Williams
:
An acceleration of the AKS prime identification algorithm. 121 - Gaurav Panwar, Roopa Vishwanathan, George Torres, Satyajayant Misra:
SPRITE: Secure and Private Routing in Payment Channel Networks. 122 - Elette Boyle, Ilan Komargodski, Neekon Vafa:
Memory Checking Requires Logarithmic Overhead. 123 - Akira Ito, Rei Ueno, Naofumi Homma:
Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks. 124 - Melike Çakmak, Ahmet Sinak, Oguz Yayla:
New self-orthogonal codes from weakly regular plateaued functions and their application in LCD codes. 125 - Emanuele Bellini, David Gérault, Matteo Protopapa, Matteo Rossi:
Monte Carlo Tree Search for automatic differential characteristics search: application to SPECK. 126 - Jung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, Elias Suvanto:
Attacks Against the INDCPA-D Security of Exact FHE Schemes. 127 - Ehsan Ebrahimi
:
Non-Binding (Designated Verifier) Signature. 128 - Gideon Samid:
Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers. 129 - Fabian Buschkowski, Georg Land, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
HADES: Automated Hardware Design Exploration for Cryptographic Primitives. 130 - Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders:
Practical Post-Quantum Signatures for Privacy. 131 - Rui Hao, Chenglong Yi, Weiqi Dai, Zhaonan Zhang:
SimpleFT: A Simple Byzantine Fault Tolerant Consensus. 132 - Meltem Sönmez Turan:
Optimizing Implementations of Boolean Functions. 133 - Sisi Duan, Yue Huang:
Byzantine Fault Tolerance with Non-Determinism, Revisited. 134 - Kexin Qiao, Siwei Sun, Zhaoyang Wang, Zehan Wu, Junjie Cheng, An Wang, Liehuang Zhu:
A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks. 135 - Jiawen Zhang, Jian Liu, Xinpeng Yang, Yinghao Wang, Kejia Chen, Xiaoyang Hou, Kui Ren,