


default search action
IACR Cryptology ePrint Archive, Volume 2025
Volume 2025, 2025
- Shweta Agrawal, Simran Kumari, Shota Yamada:
Attribute Based Encryption for Turing Machines from Lattices. 1 - Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou:
Voting with coercion resistance and everlasting privacy using linkable ring signatures. 2 - Aditya Singh Rawat, Mahabir Prasad Jhanwar:
Post-Quantum DNSSEC with Faster TCP Fallbacks. 3 - Radhika Garg, Xiao Wang:
Smaug: Modular Augmentation of LLVM for MPC. 4 - Tanusree Sharma, Mizanur Rahman, Silvia Sandhi, Yang Wang, Rifat Shahriyar, S. M. Taiabul Haque:
What is "legal" and "illegal?": Social Norms, Current Practices and Perceived Risks among the Cryptocurrency Users in Bangladesh. 5 - Ittai Abraham, Renas Bacho, Julian Loss, Gilad Stern:
Nearly Quadratic Asynchronous Distributed Key Generation. 6 - Daniel Nager:
Non Linearizable Entropic Operator. 7 - Angold Wang:
A Survey to Zero-Knowledge Interactive Verifiable Computing: Utilizing Randomness in Low-Degree Polynomials. 8 - Merve Karabulut, Reza Azarderakhsh:
Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust. 9 - Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar:
A Combinatorial Approach to IoT Data Security. 10 - Dipayan Saha, Farimah Farahmandi:
DL-SCADS: Deep Learning-Based Post-Silicon Side-Channel Analysis Using Decomposed Signal. 11 - Wouter Legiest, Jan-Pieter D'Anvers, Bojan Spasic, Nam-Luc Tran, Ingrid Verbauwhede:
Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell. 12 - José Reis, Mehmet Ugurbil, Sameer Wagh, Ryan Henry, Miguel de Vega:
Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms. 13 - Md Kawser Bepary, Arunabho Basu, Sajeed Mohammad, Rakibul Hassan, Farimah Farahmandi, Mark M. Tehranipoor:
SPY-PMU: Side-Channel Profiling of Your Performance Monitoring Unit to Leak Remote User Activity. 14 - Jianjun Hu:
A New Method for Solving Discrete Logarithm Based on Index Calculus. 15 - Yuval Efron, Ertem Nusret Tas:
Dynamically Available Common Subset. 16 - Kyungbae Jang, Vikas Srivastava, Anubhab Baksi, Santanu Sarkar, Hwajeong Seo:
New Quantum Cryptanalysis of Binary Elliptic Curves (Extended Version). 17 - Maxime Bombar, Nicolas Resch, Emiel Wiedijk:
On the Independence Assumption in Quasi-Cyclic Code-Based Cryptography. 18 - Hao Chung, Ke Wu, Elaine Shi:
Foundations of Platform-Assisted Auctions. 19 - Daehyeon Bae, Sujin Park, Minsig Choi, Young-Giu Jung, Changmin Jeong, Heeseok Kim, Seokhie Hong:
ProbeShooter: A New Practical Approach for Probe Aiming. 20 - Thomas Johansson, Mustafa Khairallah, Vu Nguyen:
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem. 21 - Zhihao Li, Xuan Shen, Xianhui Lu, Ruida Wang, Yuan Zhao, Zhiwei Wang, Benqiang Wei:
Leveled Functional Bootstrapping via External Product Tree. 22 - Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri:
Cryptography is Rocket Science: Analysis of BPSec. 23 - Olivier Blazy, Emmanuel Conchon, Philippe Gaborit, Philippe Krejci, Cristina Onete:
Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited. 24 - Ky Nguyen:
Chosen-Ciphertext Security for Inner Product FE: Multi-Client and Multi-Input, Generically. 25 - Wakaha Ogata, Toi Tomita, Kenta Takahashi, Masakatsu Nishigaki:
How to use your brain for cryptography without trustworthy machines. 26 - Otto Hanyecz, Alexander Karenin, Elena Kirshanova, Péter Kutas, Sina Schaeffler:
Constant time lattice reduction in dimension 4 with application to SQIsign. 27 - Xudong Zhu, Xinxuan Zhang, Xuyang Song, Yi Deng, Yuanju Wei, Liuyu Yang:
Extending Groth16 for Disjunctive Statements. 28 - Dongyu Wu:
Highly Efficient Server-Aided Multiparty Subfield VOLE Distribution Protocol. 29 - Jingwei Hu, Zhiqi Liu, Cong Zuo:
Delegated Multi-party Private Set Intersection from Secret Sharing. 30 - Varun Madathil, Alessandra Scafuro, Tanner Verber:
Round-Optimal Compiler for Semi-Honest to Malicious Oblivious Transfer via CIH. 31 - Alessandra Scafuro, Tanner Verber:
A New Paradigm for Server-Aided MPC. 32 - Laia Amorós, James Clements, Chloe Martindale:
Parametrizing Maximal Orders Along Supersingular ℓ-Isogeny Paths. 33 - Alex Evans, Nicolas Mohnblatt, Guillermo Angeris:
ZODA: Zero-Overhead Data Availability. 34 - Sebastian Faust, Maximilian Orlt, Kathrin Wirschem, Liang Zhao:
All-You-Can-Compute: Packed Secret Sharing for Combined Resilience. 35 - Aydin Abadi, Yvo Desmedt:
Scalable Post-Quantum Oblivious Transfers for Resource-Constrained Receivers. 36 - Daniel A. Nagy, János Tapolcai, István András Seres, Bence Ladóczki:
Forking the RANDAO: Manipulating Ethereum's Distributed Randomness Beacon. 37 - Zhongtang Luo, Yanxue Jia, Alejandra Victoria Ospina Gracia, Aniket Kate:
Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains. 38 - Huayi Qi, Minghui Xu, Xiaohua Jia, Xiuzhen Cheng:
VDORAM: Towards a Random Access Machine with Both Public Verifiability and Distributed Obliviousness. 39 - Keitaro Hashimoto, Shuichi Katsumata, Thom Wiggers:
Bundled Authenticated Key Exchange: A Concrete Treatment of (Post-Quantum) Signal's Handshake Protocol. 40 - Omid Mirzamohammadi, Jan Bobolz, Mahdi Sedaghat, Emad Heydari Beni, Aysajan Abidin, Dave Singelée, Bart Preneel:
Keyed-Verification Anonymous Credentials with Highly Efficient Partial Disclosure. 41 - James Clements:
Structural Results for Maximal Quaternion Orders and Connecting Ideals of Prime Power Norm in Bp,∞. 42 - Colin Finkbeiner, Mohamed E. Najd, Julia Guskind, Ghada Almashaqbeh:
SoK: Time to be Selfless?! Demystifying the Landscape of Selfish Mining Strategies and Models. 43 - Jeffrey Champion, Yao-Ching Hsieh, David J. Wu:
Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE. 44 - Bhuvnesh Chaturvedi, Anirban Chakraborty, Nimish Mishra, Ayantika Chatterjee, Debdeep Mukhopadhyay:
IND-CPAC: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption. 45 - Benny Applebaum, Oded Nir:
The Meta-Complexity of Secret Sharing. 46 - Shweta Agrawal, Giulio Malavolta, Tianwei Zhang:
Time-Lock Puzzles from Lattices. 47 - Jianqiao Cambridge Mo, Brandon Reagen:
ABLE: Optimizing Mixed Arithmetic and Boolean Garbled Circuit. 48 - Theophilus Agama:
On the gap between terms in an addition chain. 49 - Elodie Ngoie Mutombo, Mike Wa Nkongolo, Mahmut Tokmak:
Cryptojacking detection using local interpretable model-agnostic explanations. 50 - Ziqi Zhu, Kai Zhang, Zhili Chen, Junqing Gong, Haifeng Qian:
Black-Box Registered ABE from Lattices. 51 - Yashvanth Kondi, Divya Ravi:
Separating Broadcast from Cheater Identification. 52 - Gefei Tan, Adrià Gascón, Sarah Meiklejohn, Mariana Raykova, Xiao Wang, Ning Luo:
Founding Zero-Knowledge Proofs of Training on Optimum Vicinity. 53 - Hyunjung Son, Seunghun Paik, Yunki Kim, Sunpill Kim, Heewon Chung, Jae Hong Seo:
Doubly Efficient Fuzzy Private Set Intersection for High-dimensional Data with Cosine Similarity. 54 - Justin Drake, Dmitry Khovratovich, Mikhail Kudinov, Benedikt Wagner:
Hash-Based Multi-Signatures for Post-Quantum Ethereum. 55 - Xichao Hu, Lin Jiao:
Partial-guess, Pre-sieve, Greedy-search - New Unified Key Recovery Framework of Impossible Boomerang Attacks: Full-round Attack on ARADI. 56 - Bhargav Nagaraja Bhatt, Fatemeh Shirazi, Alistair Stewart:
Trustless Bridges via Random Sampling Light Clients. 57 - Clémence Bouvier, Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Fabian Schmid, Markus Schofnegger:
Skyscraper: Fast Hashing on Big Primes. 58 - Hossein Hafezi, Aditi Partap, Sourav Das, Joseph Bonneau:
Fair Signature Exchange. 59 - Shuang Sun, Eleftheria Makri:
SoK: Multiparty Computation in the Preprocessing Model. 60 - Thibauld Feneuil, Matthieu Rivain:
CAPSS: A Framework for SNARK-Friendly Post-Quantum Signatures. 61 - Kathrin Hövelmanns, Mikhail A. Kudinov:
Treating dishonest ciphertexts in post-quantum KEMs - explicit vs. implicit rejection in the FO transform. 62 - Yibo Cao, Shiyuan Xu, Gang Xu, Xiu-Bo Chen, Tao Shang, Yuling Chen, Zongpeng Li:
PunSearch: Enabling Puncturable Encrypted Search over Lattice for Cloud Storage Systems. 63 - Faxing Wang, Shaanan Cohney, Joseph Bonneau:
SoK: Trusted setups for powers-of-tau strings. 64 - Lev Soukhanov, Yaroslav Rebenko:
Morgana: a laconic circuit builder. 65 - Jaehyung Kim:
Efficient Homomorphic Integer Computer from CKKS. 66 - Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu:
Constant latency and finality for dynamically available DAG. 67 - Jonas Nick, Liam Eagen, Robin Linus:
Shielded CSV: Private and Efficient Client-Side Validation. 68 - Oskar Goldhahn:
On Composing Generic Voting Schemes for Improved Privacy. 69 - Andrew Lewis-Pye, Tim Roughgarden:
Beyond Optimal Fault-Tolerance. 70 - Hossein Abdinasibfar, Camille Nuoskala, Antonis Michalas:
The HHE Land: Exploring the Landscape of Hybrid Homomorphic Encryption. 71 - Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Sam Martin, Taeho Jung:
PSMT: Private Segmented Membership Test for Distributed Record Linkage. 72 - Zhenqiang Li, Shuqin Fan, Fei Gao, Yonglin Hao, Xichao Hu, Linchun Wan, Hongwei Sun, Qi Su:
Conditional Constant Function Problem and Its Quantum Solutions: Attacking Feistel Ciphers. 73 - Chao Niu, Zhicong Huang, Zhaomin Yang, Yi Chen, Liang Kong, Cheng Hong, Tao Wei:
XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering. 74 - Sonia Belaïd, Nicolas Bon, Aymen Boudguiga, Renaud Sirdey, Daphné Trama, Nicolas Ye:
Further Improvements in AES Execution over TFHE: Towards Breaking the 1 sec Barrier. 75 - Vojtech Suchanek, Vladimir Sedlacek, Marek Sýs:
Decompose and conquer: ZVP attacks on GLV curves. 76 - Eri Nakajima, Keisuke Hara, Kyosuke Yamashita:
On Multi-Key FuncCPA Secure Encryption Schemes. 77 - Yevgeniy Dodis, Daniel Jost, Shuichi Katsumata, Thomas Prest, Rolfe Schmidt:
Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol. 78 - Upasana Mandal, Shubhi Shukla, Nimish Mishra, Sarani Bhattacharya, Paritosh Saxena, Debdeep Mukhopadhyay:
Uncovering Security Vulnerabilities in Intel Trust Domain Extensions. 79 - Véronique Cortier, Alexandre Debant, Pierrick Gaudry:
Breaking verifiability and vote privacy in CHVote. 80 - Iftach Haitner, Yehuda Lindell, Nikolaos Makriyannis:
Integer Commitments, Old and New Tools. 81 - Qingliang Hou, Kuntong Li, Guoyan Zhang, Yanzhao Shen, Qidi You, Xiaoyang Dong:
Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer. 82 - Tiantian Gong, Gustavo Franco Camilo, Kartik Nayak, Andrew Lewis-Pye, Aniket Kate:
Recover from Excessive Faults in Partially-Synchronous BFT SMR. 83 - Yijia Chang, Songze Li:
Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity. 84 - Michele Battagliola, Giacomo Borin, Giovanni Di Crescenzo, Alessio Meneghetti, Edoardo Persichetti:
Enhancing Threshold Group Action Signature Schemes: Adaptive Security and Scalability Improvements. 85 - Ahmed Alharbi, Charles Bouillaguet:
Artificial Results From Hardware Synthesis. 86 - Maiara F. Bollauf, Maja Lie, Cong Ling:
On Gaussian Sampling for q-ary Lattices and Linear Codes with Lee Weight. 87 - Aydin Abadi, Amirreza Sarencheh, Henry Skeoch, Thomas Zacharias:
ICT: Insured Cryptocurrency Transactions. 88 - Hayder Tirmazi, Tien Phuoc Tran:
An Introduction to Protein Cryptography. 89 - Fangan-Yssouf Dosso, Nadia El Mrabet, Nicolas Méloni, François Palma, Pascal Véron:
Friendly primes for efficient modular arithmetic using the Polynomial Modular Number System. 90 - Ruslan Kysil, István András Seres, Péter Kutas, Nándor Kelecsényi:
poqeth: Efficient, post-quantum signature verification on Ethereum. 91 - Jake Doliskani:
Public-Key Quantum Money From Standard Assumptions (In The Generic Model). 92 - Indranil Thakur, Angshuman Karmakar, Chaoyun Li, Bart Preneel:
A Survey on Transciphering and Symmetric Ciphers for Homomorphic Encryption. 93 - Geoffroy Couteau, Lalita Devadas, Aditya Hegde, Abhishek Jain, Sacha Servan-Schreiber:
Multi-Key Homomorphic Secret Sharing. 94 - Elette Boyle, Lalita Devadas, Sacha Servan-Schreiber:
Non-Interactive Distributed Point Functions. 95 - Elette Boyle, Abhishek Jain, Sacha Servan-Schreiber, Akshayaram Srinivasan:
Simultaneous-Message and Succinct Secure Computation. 96 - Mingfei Zhang, Rujia Li, Xueqian Lu, Sisi Duan:
Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake. 97 - Maxence Brugeres, Victor Languille, Petr Kuznetsov, Hamza Zarfaoui:
Fast, private and regulated payments in asynchronous networks. 98 - Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng:
Adaptive Hardcore Bit and Quantum Key Leasing over Classical Channel from LWE with Polynomial Modulus. 99 - Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng:
Zero-Knowledge Proofs of Quantumness. 100 - Mateusz Lesniak, Michal Wronski, Ewa Syta, Miroslaw Kutylowski:
Unveiling Privacy Risks in Quantum Optimization Services. 101 - Antoine Bak:
A practical distinguisher on the full Skyscraper permutation. 102 - Zihao Wei, Siwei Sun, Fengmei Liu, Lei Hu, Zhiyu Zhang:
Technology-Dependent Synthesis and Optimization of Circuits for Small S-boxes. 103 - Nir Bitansky, Saroja Erabelli, Rachit Garg:
Additive Randomized Encodings from Public Key Encryption. 104 - Srinath T. V. Setty, Justin Thaler:
Twist and Shout: Faster memory checking arguments via one-hot addressing and increments. 105 - Joo Woo, Jonghyun Kim, Ga Hee Hong, Seungwoo Lee, Minkyu Kim, Hochang Lee, Jong Hwan Park:
NTRU+Sign: Compact NTRU-Based Signatures Using Bimodal Distributions. 106 - Fabio Campos, Andreas Hellenbrand, Michael Meyer, Krijn Reijnders:
dCTIDH: Fast & Deterministic CTIDH. 107 - Samir Bouftass:
Subset sum, a new insight. 108 - Wasilij Beskorovajnov, Sarai Eilebrecht, Yufan Jiang, Jörn Müller-Quade:
A Formal Treatment of Homomorphic Encryption Based Outsourced Computation in the Universal Composability Framework. 109 - Gaspard Anthoine, Daniele Cozzo, Dario Fiore:
Verification-efficient Homomorphic Signatures for Verifiable Computation over Data Streams. 110 - Alain Couvreur, Rakhi Pratihar, Nihan Tanisali, Ilaria Zappatore:
On the structure of the Schur squares of Twisted Generalized Reed-Solomon codes and application to cryptanalysis. 111 - Marija Mikic, Mihajlo Srbakoski, Strahinja Praska:
Post-Quantum Stealth Address Protocols. 112 - James Hsin-Yu Chiang, Ivan Damgård, William R. Duro, Sunniva Engan, Sebastian Kolby, Peter Scholl:
Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. 113 - Cyrius Nugier, Jean-Christophe Deneuville:
Better Codes for the HQC Cryptosystem. 114 - Keitaro Hashimoto, Wakaha Ogata, Yusuke Sakai:
Signatures with Tight Adaptive Corruptions from Search Assumptions. 115 - Jonas Schupp, Georg Sigl:
A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS). 116 - Martin R. Albrecht, Nicolas Gama, James Howe, Anand Kumar Narayanan:
Post-Quantum Online/Offline Signatures. 117 - Dmitry Khovratovich, Ron D. Rothblum, Lev Soukhanov:
How to Prove False Statements: Practical Attacks on Fiat-Shamir. 118 - Nouri Alnahawi, David Haas, Erik Mauß, Alexander Wiesmaier:
SoK: PQC PAKEs - Cryptographic Primitives, Design and Security. 119 - Katharina Boudgoust, Hannah Keller:
Module Learning with Errors with Truncated Matrices. 120 - Vasyl Ustimenko:
On symbolic computations over arbitrary commutative rings and cryptography with the temporal Jordan-Gauss graphs. 121 - Yunhao Wang, Fan Zhang:
Qelect: Lattice-based Single Secret Leader Election Made Practical. 122 - Thomas Pornin:
Falcon on ARM Cortex-M4: an Update. 123 - Ali Sah Özcan, Erkay Savas:
GPU Implementations of Three Different Key-Switching Methods for Homomorphic Encryption Schemes. 124 - Hayder Tirmazi:
A Privacy Model for Classical & Learned Bloom Filters. 125 - Chang Chen, Guoyu Yang, Qi Chen, Wei Wang, Jin Li:
Always by Your Side: Constructing Traceable Anonymous Credentials with Hardware-Binding. 126 - Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, Giovanni Tognolini:
A Revision of CROSS Security: Proofs and Attacks for Multi-Round Fiat-Shamir Signatures. 127 - Ivan Bjerre Damgård, Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen:
Asynchronous YOSO a la Paillier. 128 - Benedikt Bünz, Tushar Mopuri, Alireza Shirzad, Sriram Sridhar:
DewTwo: a transparent PCS with quasi-linear prover, logarithmic verifier and 4.5KB proofs from falsifiable assumptions. 129 - Neekon Vafa, Vinod Vaikuntanathan:
Symmetric Perceptrons, Number Partitioning and Lattices. 130 - Xavier Bultel, Charles Olivier-Anclin:
On the Anonymity of Linkable Ring Signatures. 131 - Ryan Lehmkuhl, Alexandra Henzinger, Henry Corrigan-Gibbs:
Distributional Private Information Retrieval. 132 - Henry Bambury, Phong Q. Nguyen:
Cryptanalysis of an Efficient Signature Based on Isotropic Quadratic Forms. 133 - Minghang Li, Qianhong Wu, Zhipeng Wang, Bo Qin, Bohang Wei, Hang Ruan, Shihong Xiong, Zhenyang Ding:
TockOwl: Asynchronous Consensus with Fault and Network Adaptability. 134 - Andrea Basso, Giacomo Borin, Wouter Castryck, Maria Corte-Real Santos, Riccardo Invernizzi, Antonin Leroux, Luciano Maino, Frederik Vercauteren, Benjamin Wesolowski:
PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies. 135 - Pierrick Gaudry, Julien Soumier, Pierre-Jean Spaenlehauer:
Isogeny-based Cryptography using Isomorphisms of Superspecial Abelian Surfaces. 136 - Jonas Bertels, Hilder V. L. Pereira, Ingrid Verbauwhede:
FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs. 137 - Jeremiah Blocki, Seunghoon Lee:
Preprocessing Security in Multiple Idealized Models with Applications to Schnorr Signatures and PSEC-KEM. 138 - Rabiah Alnashwan, Benjamin Dowling, Bhagya Wimalasiri:
Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers. 139 - Yevgeniy Dodis, Jiaxin Guan, Peter Hall, Alison Lin:
HELP: Everlasting Privacy through Server-Aided Randomness. 140 - Nico Döttling, Jesko Dujmovic, Antoine Joux:
Space-Lock Puzzles and Verifiable Space-Hard Functions from Root-Finding in Sparse Polynomials. 141 - Karthikeyan Bhargavan, Maxime Buyse, Lucas Franceschino, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters:
hax: Verifying Security-Critical Rust Software using Multiple Provers. 142 - Simon Holmgaard Kamp:
A New Way to Achieve Round-Efficient Asynchronous Byzantine Agreement. 143 - George Kadianakis, Arantxa Zapico, Hossein Hafezi, Benedikt Bünz:
KZH-Fold: Accountable Voting from Sublinear Accumulation. 144 - Reuven Yakar, Avishai Wool, Eyal Ronen:
Breaking RSA with Overclocking-induced GPU Faults. 145 - Jinyi Qiu, Aydin Aysu:
SHIFT SNARE: Uncovering Secret Keys in FALCON via Single-Trace Analysis. 146 - Maria Corte-Real Santos, Craig Costello, Sam Frengley:
Efficient algorithms for the detection of (N,N)-splittings and endomorphisms. 147 - Vincent Diemunsch, Lucca Hirschi, Steve Kremer:
A Comprehensive Formal Security Analysis of OPC UA. 148 - Hanwen Feng, Yingzi Gao, Yuan Lu, Qiang Tang, Jing Xu:
Practical Asynchronous Distributed Key Reconfiguration and Its Applications. 149 - Craig Costello, Gaurish Korpal:
On pairs of primes with small order reciprocity. 150 - Alex B. Grilo, Ramis Movassagh:
Quantum function secret sharing. 151 - Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay:
Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World. 152 - Sarah Arpin, Jun Bo Lau, Ray A. Perlner, Angela Robinson, Jean-Pierre Tillich, Valentin Vasseur:
Error floor prediction with Markov models for QC-MDPC codes. 153 - Phillip Gajland, Vincent Hwang, Jonas Janneck:
Shadowfax: Combiners for Deniability. 154 - Sarah Arpin, Ross Bowden, James Clements, Wissam Ghantous, Jason T. LeGrow, Krystal Maughan:
Cycles and Cuts in Supersingular L-Isogeny Graphs. 155 - Athish Pranav Dharmalingam, Sai Venkata Krishnan, K. R. Sivaramakrishnan, N. S. Narayanaswamy:
TallyGuard: Privacy Preserving Tallied-as-cast Guarantee. 156 - Azade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek:
Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis. 157 - Jianing Zhang, Haoyang Wang:
Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool. 158 - Yincen Chen, Qinggan Fu, Ning Zhao, Jiahao Zhao, Ling Song, Qianqian Yang:
A Holistic Framework for Impossible Boomerang Attacks. 159 - Claude Carlet, Palash Sarkar:
The Nonlinear Filter Model of Stream Cipher Redivivus. 160 - Foteini Baldimtsi, Julia Kastner, Julian Loss, Omar Renawi:
Secure Showing of Partial Attributes. 161 - Francesca Falzon, Tianxin Tang:
Learning from Functionality Outputs: Private Join and Compute in the Real World. 162 - Olivier Bernard, Marc Joye:
Bootstrapping (T)FHE Ciphertexts via Automorphisms: Closing the Gap Between Binary and Gaussian Keys. 163 - Rishab Goyal, Saikumar Yadugiri:
Multi-Authority Functional Encryption with Bounded Collusions from Standard Assumptions. 164 - Jiacheng Gao, Yuan Zhang, Sheng Zhong:
Shuffle Shamir Secret Shares Uniformly with Linear Online Communication. 165 - Abhraneel Dutta, Emrah Karagoz, Edoardo Persichetti, Pakize Sanal:
Polynomial Inversion Algorithms in Constant Time for Post-Quantum Cryptography. 166 - Mahdi Soleimani, Grace Jia, In Gim, Seung-Seob Lee, Anurag Khandelwal:
Wiretapping LLMs: Network Side-Channel Attacks on Interactive LLM Services. 167 - Oriol Farràs, Miquel Guiot:
Revisiting Beimel-Weinreb Weighted Threshold Secret Sharing Schemes. 168 - Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan:
Efficient Pseudorandom Correlation Generators for Any Finite Field. 169 - Mohamed Abdelmonem, Lukas Holzbaur, Håvard Raddum, Alexander Zeh:
Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms. 170 - Alex Charlès, Aleksei Udovenko:
A light white-box masking scheme using Dummy Shuffled Secure Multiplication. 171 - Junkai Liang, Daqi Hu, Pengfei Wu, Yunbo Yang, Qingni Shen, Zhonghai Wu:
SoK: Understanding zk-SNARKs: The Gap Between Research and Practice. 172 - Nick Aquina, Bruno Cimoli, Soumya Das, Kathrin Hövelmanns, Fiona Johanna Weber, Chigo Okonkwo, Simon Rommel, Boris Skoric, Idelfonso Tafur Monroy, Sebastian R. Verschoor:
A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography. 173 - Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Sri Aravinda Krishnan Thyagarajan:
VITARIT: Paying for Threshold Services on Bitcoin and Friends. 174 - Joël Alwen, Georg Fuchsbauer, Marta Mularczyk:
Updatable Public-Key Encryption, Revisited. 175 - Aniket Kate, Easwar Vivek Mangipudi, Charan Nomula, Raghavendra Ramesh, Athina Terzoglou, Joshua Tobkin:
HyperLoop: Rationally secure efficient cross-chain bridge. 176 - Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan:
On the Power of Sumcheck in Secure Multiparty Computation. 177 - Chao Niu, Muzhou Li, Jifu Zhang, Meiqin Wang:
Improved Differential and Linear Cryptanalysis on Round-Reduced SIMON. 178 - Vahid Jahandideh, Bart Mennink, Lejla Batina:
Higher-Order Deterministic Masking with Application to Ascon. 179 - Di Wu, Shoupeng Ren, Yuman Bai, Lipeng He, Jian Liu, Wu Wen, Kui Ren, Chun Chen:
On the Atomicity and Efficiency of Blockchain Payment Channels. 180 - Max Duparc, Mounir Taha:
Improved NTT and CRT-based RNR Blinding for Side-Channel and Fault Resistant Kyber. 181 - Zhiyuan An, Fangguo Zhang:
Deny Whatever You Want: Dual-Deniable Public-Key Encryption. 182 - Apostolos Mavrogiannakis, Xian Wang, Ioannis Demertzis, Dimitrios Papadopoulos, Minos N. Garofalakis:
OBLIVIATOR: Oblivious Parallel Joins and other Operators in Shared Memory Environments. 183 - Orfeas Stefanos Thyfronitis Litos, Zhaoxuan Wu, Alfredo Musumeci, Songyun Hu, James Helsby, Michael Breza, William Knottenbelt:
NodeChain: Cheap Data Integrity Without Consensus. 184 - Marcel Nageler, Shibam Ghosh, Marlene Jüttler, Maria Eichlseder:
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions. 185 - Maher Mamah:
Computing Quaternion Embeddings and Endomorphism rings of Supersingular Oriented Elliptic curves. 186 - Huck Bennett, Drisana Bhatia, Jean-François Biasse, Medha Durisheti, Lucas LaBuff, Vincenzo Pallozzi Lavorante, Phillip Waitkevich:
Asymptotic improvements to provable algorithms for the code equivalence problem. 187 - Nan Wang, Qianhui Wang, Dongxi Liu, Muhammed F. Esgin, Alsharif Abuadbba:
BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup. 188 - Madhurima Mukhopadhyay:
Experimentally studying path-finding problem between conjugates in supersingular isogeny graphs: Optimizing primes and powers to speed-up cycle finding. 189 - Jad Silbak, Daniel Wichs:
Binary Codes for Error Detection and Correction in a Computationally Bounded World. 190 - Cruz Barnum, David Heath:
Adaptive Distributional Security: A Framework for Input-Adaptive Cryptography. 191 - Shivam Bhasin, Dirmanto Jap, Marina Krcek, Stjepan Picek, Prasanna Ravi:
Practical Electromagnetic Fault Injection on Intel Neural Compute Stick 2. 192 - Julien Béguinot, Loïc Masure:
On the Average Random Probing Model. 193 - Sarisht Wadhwa, Julian Ma, Thomas Thiery, Barnabé Monnot, Luca Zanolini, Fan Zhang, Kartik Nayak:
AUCIL: An Inclusion List Design for Rational Parties. 194 - Paco Azevedo Oliveira, Andersson Calle Viera, Benoît Cogliati, Louis Goubin:
Finding a polytope: A practical fault attack against Dilithium. 195 - Dimitri Koshelev, Antonio Sanso:
Endomorphisms for Faster Cryptography on Elliptic Curves of Moderate CM Discriminants, II. 196 - Tim Beyne, Michiel Verbauwhede:
Cryptanalysis of a nonlinear filter-based stream cipher. 197 - Song Bian, Haowen Pan, Jiaqi Hu, Zhou Zhang, Yunhao Fu, Jiafeng Hua, Yi Chen, Bo Zhang, Yier Jin, Jin Dong, Zhenyu Guan:
Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption. 198 - Mi-Ying Miryam Huang, Xinyu Mao, Jiapeng Zhang:
Sublinear Proofs over Polynomial Rings. 199 - Hao Guo, Liqiang Peng, Haiyang Xue, Li Peng, Weiran Liu, Zhe Liu, Lei Hu:
Improved Secure Two-party Computation from a Geometric Perspective. 200 - Hyeonhak Kim, Donghoe Heo, Seokhie Hong:
Search and Verify Isogeny-Based Quantum Money with Rational Points. 201 - Alex B. Grilo, Ami Paz, Mor Perry:
Distributed Non-Interactive Zero-Knowledge Proofs. 202 - Intak Hwang, Seonhong Min, Yongsoo Song:
Ciphertext-Simulatable HE from BFV with Randomized Evaluation. 203 - Guilherme Rito, Christopher Portmann, Chen-Da Liu-Zhang:
Simpler and Stronger Models for Deniable Authentication. 204 - Arad Kotzer, Bence Ladóczki, János Tapolcai, Ori Rottenstreich:
Addressing Scalability Issues of Blockchains with Hypergraph Payment Networks. 205 - Xinhai Wang, Lin Ding, Zhengting Li, Jiang Wan, Bin Hu:
Revisiting the Differential-Linear Attacks on ChaCha from IEEE TIT and INDOCRYPT 2024 (Extended Abstract). 206 - Jian Guo, Wenjie Nan:
Efficient Mixed Garbling from Homomorphic Secret Sharing and GGM-Tree. 207 - Mahdi Cheraghchi, Nikhil Shagrithaya, Alexandra Veliche:
Reductions Between Code Equivalence Problems. 208 - Ahmet Ramazan Agirtas, James Ball, Michael Belegris, Gustave Charles-Saigne:
NovaTEE: Private Clearing and Settlement on Trusted Execution Hardware. 209 - Meng Hao, Weiran Liu, Liqiang Peng, Cong Zhang, Pengfei Wu, Lei Zhang, Hongwei Li, Robert H. Deng:
Practical Keyword Private Information Retrieval from Key-to-Index Mappings. 210 - Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth:
Prior-Based Label Differential Privacy via Secure Two-Party Computation. 211 - Zhenyu Huang, Fuxin Zhang, Dongdai Lin:
Constructing Quantum Implementations with the Minimal T-depth or Minimal Width and Their Applications. 212 - Jiang Yu:
An Innovative Lightweight Symmetric Encryption Algorithm Integrating NeoAlzette ARX S-box and XCR CSPRNG. 213 - Yuanyuan Zhou, Weijia Wang, Yiteng Sun, Yu Yu:
Rejected Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks. 214 - Daniël M. H. van Gent:
A note on the genus of the HAWK lattice. 215 - Intak Hwang, Seonhong Min, Yongsoo Song:
Practical Circuit Privacy/Sanitization for TFHE. 216 - Erik-Oliver Blass, Guevara Noubir:
Assumption-Free Fuzzy PSI via Predicate Encryption. 217 - Hayder Tirmazi:
LSM Trees in Adversarial Environments. 218 - János Tapolcai, Bence Ladóczki, Dániel A. Nagy:
Slot a la carte: Centralization Issues in Ethereum's Proof-of-Stake Protocol. 219 - Nico Döttling, Alexander Koch, Sven Maier, Jeremias Mechler, Anne Müller, Jörn Müller-Quade, Marcel Tieplet:
The Quantum Decoherence Model: Everlasting Composable Secure Computation and More. 220 - Brandon Goodell, Rigo Salazar, Freeman Slaughter:
Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. 221 - Tim Beyne, Yu Long Chen, Michiel Verbauwhede:
A Robust Variant of ChaCha20-Poly1305. 222 - Yael Eisenberg, Christopher Havens, Alexis Korb, Amit Sahai:
Building Hard Problems by Combining Easy Ones: Revisited. 223 - Jian Liu, Kui Ren, Chun Chen:
Lightweight Single-Server PIR with Oλ(n1/3) Communication. 224 - Jiajun Xin, Dimitrios Papadopoulos:
"Check-Before-you-Solve": Verifiable Time-lock Puzzles. 225 - Jesús-Javier Chi-Domínguez:
Improved Subfield Curve Search For Specific Field Characteristics. 226 - Alessandro Budroni, Andre Esser, Ermes Franch, Andrea Natale:
Two Is All It Takes: Asymptotic and Concrete Improvements for Solving Code Equivalence. 227 - Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen:
Network agnostic consensus in constant time. 228 - Cas Cremers, Esra Günsay, Vera Wesselkamp, Mang Zhao:
ETK: External-Operations TreeKEM and the Security of MLS in RFC 9420. 229 - Amik Raj Behera, Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl:
Privately Constrained PRFs from DCR: Puncturing and Bounded Waring Rank. 230 - Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki:
NoIC: PAKE from KEM without Ideal Ciphers. 231 - Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu:
Authenticated BitGC for Actively Secure Rate-One 2PC. 232 - Davide Carnemolla, Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Anamorphic Resistant Encryption: the Good, the Bad and the Ugly. 233 - Joseph Bonneau, Jessica Chen, Miranda Christ, Ioanna Karantaidou:
Merkle Mountain Ranges are Optimal: On witness update frequency for cryptographic accumulators. 234 - Wei-Kai Lin, Ethan Mook, Daniel Wichs:
Doubly Efficient Cryptography: Commitments, Arguments and RAM MPC. 235 - Sora Suegami, Enrico Bottazzi:
Diamond iO: A Straightforward Construction of Indistinguishability Obfuscation from Lattices. 236 - Jiayu Xu:
UC-Security of Encrypted Key Exchange: A Tutorial. 237 - Matteo Campanelli, Mario Carrillo, Ignacio Cascudo, Dario Fiore, Danilo Francati, Rosario Gennaro:
On the Power of Polynomial Preprocessing: Proving Computations in Sublinear Time, and More. 238 - Amirreza Sarencheh, Hamidreza Khoshakhlagh, Alireza Kavousi, Aggelos Kiayias:
DART: Decentralized, Anonymous, and Regulation-friendly Tokenization. 239 - Michele Ciampi, Lorenzo Magliocco, Daniele Venturi, Yu Xia:
Robust Non-Interactive Zero-Knowledge Combiners. 240 - Peyman Momeni, Fig Smith:
IBE-IBE: Intent-Based Execution through Identity-Based Encryption and Auctions. 241 - Tiantian Gong, Zeyu Liu:
Rational Secret Sharing with Competition. 242 - Wonseok Choi, Xiangyu Liu, Lirong Xia, Vassilis Zikas:
K-Linkable Ring Signatures and Applications in Generalized Voting. 243 - Jianwei Li:
Provable Speedups for SVP Approximation Under Random Local Blocks. 244 - Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl:
Silent Circuit Relinearisation: Sublinear-Size (Boolean and Arithmetic) Garbled Circuits from DCR. 245 - Fatima Elsheimy, Julian Loss, Charalampos Papamanthou:
Towards Optimal Early Stopping Agreement Protocols. 246 - Dan Boneh, Binyi Chen:
LatticeFold+: Faster, Simpler, Shorter Lattice-Based Folding for Succinct Proof Systems. 247 - Hanbeom Shin, Seonkyu Kim, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong:
New Exchanged Boomerang Distinguishers for 5-Round AES. 248 - Wenqian Li, Hanyu Wei, Shiyu Shen, Hao Yang, Wangchen Dai, Yunlei Zhao:
cuFalcon: An Adaptive Parallel GPU Implementation for High-Performance Falcon Acceleration. 249 - Rohit Chatterjee, Xiao Liang, Omkant Pandey, Takashi Yamakawa:
The Round Complexity of Black-Box Post-Quantum Secure Computation. 250 - Abtin Afshar, Rishab Goyal:
Verifiable Streaming Computation and Step-by-Step Zero-Knowledge. 251 - Florian Hirner, Florian Krieger, Sujoy Sinha Roy:
Chiplet-Based Techniques for Scalable and Memory-Aware Multi-Scalar Multiplication. 252 - Weidan Ji, Zhedong Wang, Lin Lyu, Dawu Gu:
Adaptively Secure IBE from Lattices with Asymptotically Better Efficiency. 253 - Liqiang Liu, Tianren Liu, Bo Peng:
Garbled Lookup Tables from Homomorphic Secret Sharing. 254 - Bohan Wang, Juelin Zhang, Yu Yu, Weijia Wang:
Tighter Security Notions for a Modular Approach to Private Circuits. 255 - Daniel Alabi, Lav R. Varshney:
Inaccessible Entropy for Watermarking Generative Agents. 256 - Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap:
TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic. 257 - Marc Rivinius:
MPC with Publicly Identifiable Abort from Pseudorandomness and Homomorphic Encryption. 258 - Augustin Bariant, Aurélien Boeuf, Pierre Briaud, Maël Hostettler, Morten Øygarden, Håvard Raddum:
Improved Resultant Attack against Arithmetization-Oriented Primitives. 259 - Yujin Oh, Kyungbae Jang, Hwajeong Seo:
Quantum Security Evaluation of ASCON. 260 - Fengrun Liu, Haofei Liang, Tianyu Zhang, Yuncong Hu, Xiang Xie, Haisheng Tan, Yu Yu:
HasteBoots: Proving FHE Bootstrapping in Seconds. 261 - Fuyuki Kitagawa, Ryo Nishimaki, Nikhil Pappu:
PKE and ABE with Collusion-Resistant Secure Key Leasing. 262 - Yuanju Wei, Xinxuan Zhang, Yi Deng:
Transparent SNARKs over Galois Rings. 263 - Yanbo Chen:
Dazzle: Improved Adaptive Threshold Signatures from DDH. 264 - Fuyuki Kitagawa, Ryo Nishimaki:
White-Box Watermarking Signatures against Quantum Adversaries and Its Applications. 265 - Yu Wei, Lei Bi, Xianhui Lu, Kunpeng Wang:
Memory-Efficient BKW Algorithm for Solving the LWE Problem. 266 - Sander Q. Dijkhuis:
Authentication and sole control at a high level of assurance on widespread smartphones with threshold signatures. 267 - Geoffroy Couteau, Carmit Hazay, Aditya Hegde, Naman Kumar:
휔(1/휆)-Rate Boolean Garbling Scheme from Generic Groups. 268 - Geoffroy Couteau, Naman Kumar:
10-Party Sublinear Secure Computation from Standard Assumptions. 269 - Vahid Jahandideh, Bart Mennink, Lejla Batina:
A Decomposition Approach for Evaluating Security of Masking. 270 - Arthur Herlédan Le Merdy, Benjamin Wesolowski:
Unconditional foundations for supersingular isogeny-based cryptography. 271 - Lukas Aumayr, Zeta Avarikioti, Iosif Salem, Stefan Schmid, Michelle Yeo:
X-Transfer: Enabling and Optimizing Cross-PCN Transactions. 272 - Vahid Jahandideh, Jan Schoone, Lejla Batina:
Clustering Approach for Higher-Order Deterministic Masking. 273 - Veronika Kuchta, Jason T. LeGrow, Edoardo Persichetti:
Post-Quantum Blind Signatures from Matrix Code Equivalence. 274 - Nigel P. Smart, Michael Walter:
Error-Simulatable Sanitization for TFHE and Applications. 275 - Julius Hermelink, Kai-Chun Ning, Richard Petri:
Finding and Protecting the Weakest Link: On Side-Channel Attacks on Masked ML-DSA. 276 - Sara Montanari, Riccardo Longo, Alessio Meneghetti:
Tighter Control for Distributed Key Generation: Share Refreshing and Expressive Reconstruction Policies. 277 - Sonia Belaïd, Matthieu Rivain, Mélissa Rossi:
New Techniques for Random Probing Security and Application to Raccoon Signature Scheme. 278 - Dan Boneh, Benedikt Bünz, Kartik Nayak, Lior Rotem, Victor Shoup:
Context-Dependent Threshold Decryption and its Applications. 279 - Bill Allombert, Alice Pellet-Mary, Wessel P. J. van Woerden:
Cryptanalysis of rank-2 module-LIP: a single real embedding is all it takes. 280 - Anasuya Acharya, Karen Azari, Mirza Ahad Baig, Dennis Hofheinz, Chethan Kamath:
Securely Instantiating 'Half Gates' Garbling in the Standard Model. 281 - Jules Baudrin, Sonia Belaïd, Nicolas Bon, Christina Boura, Anne Canteaut, Gaëtan Leurent, Pascal Paillier, Léo Perrin, Matthieu Rivain, Yann Rotella, Samuel Tap:
Transistor: a TFHE-friendly Stream Cipher. 282 - Yifan Song, Xiaxi Ye:
Honest Majority MPC with Õ(|C|) Communication in Minicrypt. 283 - Ali Dogan, Sermin Kocaman:
S2DV: Scalable and Secure DAO Voting. 284 - Mohammed Barhoush, Ryo Nishimaki, Takashi Yamakawa:
MicroCrypt Assumptions with Quantum Input Sampling and Pseudodeterminism: Constructions and Separations. 285 - Ignacio Cascudo, Anamaria Costache, Daniele Cozzo, Dario Fiore, Antonio Guimarães, Eduardo Soria-Vazquez:
Verifiable Computation for Approximate Homomorphic Encryption Schemes. 286 - Clémence Chevignard, Guilhem Mureau, Thomas Espitau, Alice Pellet-Mary, Heorhii Pliatsok, Alexandre Wallet:
A reduction from Hawk to the principal ideal problem in a quaternion algebra. 287 - David Gérault, Anna Hambitzer, Eyal Ronen, Adi Shamir:
How to Securely Implement Cryptography in Deep Neural Networks. 288 - Sabyasachi Dey, Subhamoy Maitra, Santanu Sarkar, Nitin Kumar Sharma:
Significantly Improved Cryptanalysis of Salsa20 With Two-Round Criteria. 289 - Ky Nguyen, David Pointcheval, Robert Schädlich:
Dynamic Decentralized Functional Encryption: Generic Constructions with Strong Security. 290 - Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree:
A Note on Adaptive Security in Hierarchical Identity-Based Encryption. 291 - Tamar Ben David, Anat Paskin-Cherniavsky:
Tight Lower Bounds and New Upper Bounds For Evolving CDS. 292 - Yevgeniy Dodis, Eli Goldin:
Anamorphic-Resistant Encryption; Or Why the Encryption Debate is Still Alive. 293 - Wilson D. Nguyen, Srinath T. V. Setty:
Neo: Lattice-based folding scheme for CCS over small fields and pay-per-bit commitments. 294 - Vladimir Kolesnikov, Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal:
Stationary Syndrome Decoding for Improved PCGs. 295 - Yuncong Hu, Pratyush Mishra, Xiao Wang, Jie Xie, Kang Yang, Yu Yu, Yuwen Zhang:
DFS: Delegation-friendly zkSNARK and Private Delegation of Provers. 296 - Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan C. Scaly, Yuval Spiizer:
Practical Zero-Trust Threshold Signatures in Large-Scale Dynamic Asynchronous Networks. 297 - Ruben Gonzalez:
Stateless Hash-Based Signatures for Post-Quantum Security Keys. 298 - Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz, Fabrizio Sisinni:
(Un)breakable curses - re-encryption in the Fujisaki-Okamoto transform. 299 - Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi, Bo Peng:
Pseudorandom Functions with Weak Programming Privacy and Applications to Private Information Retrieval. 300 - Kazuma Wariki, Atsushi Fujioka, Akira Nagai, Kan Yasuda:
Making Protocol FSU Revocable. 301 - Xinxuan Zhang, Ruida Wang, Zeyu Liu, Binwu Xiang, Yi Deng, Xianhui Lu:
FHE-SNARK vs. SNARK-FHE: From Analysis to Practical Verifiable Computation. 302 - Ittai Abraham, Eli Chouatt, Ivan Damgård, Yossi Gilad, Gilad Stern, Sophia Yakoubov:
Asynchronous Algorand: Reaching Agreement with Near Linear Communication and Constant Expected Time. 303 - Koen de Boer, Wessel P. J. van Woerden:
Lattice-based Cryptography: A survey on the security of the lattice-based NIST finalists. 304 - Gennaro Avitabile, Vincenzo Botta, Emanuele Giunta, Marcin Mielniczuk, Francesco Migliaro:
The Malice of ELFs: Practical Anamorphic-Resistant Encryption without Random Oracles. 305 - Antoine Joux, Julian Loss, Giacomo Santato:
Dimensional eROSion: Improving the ROS Attack with Decomposition in Higher Bases. 306 - Yaohua Ma, Chenxin Dai, Elaine Shi:
Quasi-Linear Indistinguishability Obfuscation via Mathematical Proofs of Equivalence and Applications. 307 - Yanis Belkheyar, Patrick Derbez, Shibam Ghosh, Gregor Leander, Silvia Mella, Léo Perrin, Shahram Rasoolzadeh, Lukas Stennes, Siwei Sun, Gilles Van Assche, Damian Vizár:
ChiLow and ChiChi: New Constructions for Code Encryption. 308 - Wonseok Choi, Daniel Collins, Xiangyu Liu, Vassilis Zikas:
A Unified Treatment of Anamorphic Encryption. 309 - Suvradip Chakraborty, Dennis Hofheinz, Roman Langrehr:
Non-Interactive Key Exchange: New Notions, New Constructions, and Forward Security. 310 - Suvradip Chakraborty, Dennis Hofheinz, Roman Langrehr, Jesper Buus Nielsen, Christoph Striecks, Daniele Venturi:
Malleable SNARKs and Their Applications. 311 - Dan Boneh, Aditi Partap, Lior Rotem:
Traceable Verifiable Random Functions. 312 - Lizhen Zhang, Shang Gao, Bin Xiao:
Lattice-based Σ-Protocols for Polynomial Relations with Standard Soundness. 313 - Yu Long Chen, Avijit Dutta, Ashwin Jha, Mridul Nandi:
Towards Optimally Secure Deterministic Authenticated Encryption Schemes. 314 - Antonio Flórez-Gutiérrez, Eran Lambooij, Gaëtan Leurent, Håvard Raddum, Tyge Tiessen, Michiel Verbauwhede:
Cryptanalysis of Full SCARF. 315 - Albert Garreta, Hendrik Waldner, Katerina Hristova, Luca Dall'Ava:
Zinc: Succinct Arguments with Small Arithmetization Overheads from IOPs of Proximity to the Integers. 316 - Nico Döttling, Jesko Dujmovic, Julian Loss, Maciej Obremski:
Minicrypt PIR for Big Batches. 317 - Karim Baghery, Ehsan Ebrahimi, Omid Mirzamohammadi, Mahdi Sedaghat:
Traceable Verifiable Secret Sharing and Applications. 318 - Jinyi Qiu:
Single Trace Side-Channel Vulnerabilities Discovery Using Statistical Leakage Simulator. 319 - Shan Chen, Vukasin Karadzic:
Committing Authenticated Encryption: Generic Transforms with Hash Functions. 320 - Roberto Avanzi, Orr Dunkelman, Shibam Ghosh:
Differential Cryptanalysis of the Reduced Pointer Authentication Code Function used in Arm's FEAT_PACQARMA3 Feature. 321 - William J. Buchanan, Hisham Ali:
Partial and Fully Homomorphic Matching of IP Addresses Against Blacklists for Threat Analysis. 322 - Yao-Ching Hsieh, Brent Waters, David J. Wu:
A Generic Approach to Adaptively-Secure Broadcast Encryption in the Plain Model. 323 - Josh Alman, Yizhi Huang, Kevin Yeo:
Fine-Grained Complexity in a World without Cryptography. 324 - Mark Zhandry:
On Quantum Money and Evasive Obfuscation. 325 - Anasuya Acharya, Karen Azari, Chethan Kamath:
On the Adaptive Security of Free-XOR-based Garbling Schemes in the Plain Model. 326 - Gil Segev:
Bulletproofs for R1CS: Bridging the Completeness-Soundness Gap and a ZK Extension. 327 - Amit Deo, Benoît Libert:
Fully Asymmetric Anamorphic Homomorphic Encryption from LWE. 328 - Gal Arnon, Eylon Yogev:
Towards a White-Box Secure Fiat-Shamir Transformation. 329 - Pratish Datta, Jiaxin Guan, Alexis Korb, Amit Sahai:
(Multi-Input) FE for Randomized Functionalities, Revisited. 330 - Hengcheng Zhou:
Private Multi-Party Neural Network Training over ℤ2k via Galois Rings. 331 - Daniel Collins, Simone Colombo, Sina Schaeffler:
Towards Leakage-Resilient Ratcheted Key Exchange. 332 - Lena Heimberger, Daniel Kales, Riccardo Lolato, Omid Mir, Sebastian Ramacher, Christian Rechberger:
Leap: A Fast, Lattice-based OPRF With Application to Private Set Intersection. 333 - Benny Applebaum, Eliran Kachlon:
How to Share an NP Statement or Combiners for Zero-Knowledge Proofs. 334 - Calvin Abou Haidar, Dipayan Das, Anja Lehmann, Cavit Özbay, Octavio Perez-Kempner:
Privacy-Preserving Multi-Signatures: Generic Techniques and Constructions Without Pairings. 335 - Damiano Abram, Giulio Malavolta, Lawrence Roy:
Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits. 336 - Sebastian Faust, Loïc Masure, Elena Micheli, Hai Hoang Nguyen, Maximilian Orlt, François-Xavier Standaert:
Efficient IP Masking with Generic Security Guarantees under Minimum Assumptions. 337 - Zhiyuan Zhang, Gilles Barthe:
CT-LLVM: Automatic Large-Scale Constant-Time Analysis. 338 - Damiano Abram, Giulio Malavolta, Lawrence Roy:
Key-Homomorphic Computations for RAM: Fully Succinct Randomised Encodings and More. 339 - Martin R. Albrecht, Benjamin Bencina, Russell W. F. Lai:
Hollow LWE: A New Spin, Unbounded Updatable Encryption from LWE and PCE. 340 - Rishiraj Bhattacharyya, Jan Bormet, Sebastian Faust, Pratyay Mukherjee, Hussien Othman:
CCA-Secure Traceable Threshold (ID-based) Encryption and Application. 341 - Jan Bormet, Jonas Hofmann, Hussien Othman:
Traceable Threshold Encryption without Trusted Dealer. 342 - Lewis Glabush, Kathrin Hövelmanns, Douglas Stebila:
Tight Multi-challenge Security Reductions for Key Encapsulation Mechanisms. 343 - Liang Zhang, Dongliang Cai, Tao Liu, Haibin Kan, Jiheng Zhang, Haibin Zhang, Sisi Duan:
Publicly Verifiable Generalized Secret Sharing and Its Application in Building Decentralized Exchange. 344 - Tao Liu, Liang Zhang, Haibin Kan, Jiheng Zhang:
Publicly Verifiable Threshold Proxy Re-encryption and Its Application in Data Rights Confirmation. 345 - Dan Boneh, Jaehyung Kim:
Homomorphic Encryption for Large Integers from Nested Residue Number Systems. 346 - Yansong Zhang, Xiaojun Chen, Qinghui Zhang, Ye Dong, Xudong Chen:
Helix: Scalable Multi-Party Machine Learning Inference against Malicious Adversaries. 347 - Nora Trapp, Diego Ongaro:
Juicebox Protocol: Distributed Storage and Recovery of Secrets Using Simple PIN Authentication. 348 - Chen-Da Liu-Zhang, Elisaweta Masserova, João Ribeiro, Pratik Soni, Sri Aravinda Krishnan Thyagarajan:
Efficient Distributed Randomness Generation from Minimal Assumptions where PArties Speak Sequentially Once. 349 - Khin Mi Mi Aung, Enhui Lim, Sim Jun Jie, Benjamin Hong Meng Tan, Huaxiong Wang:
Bootstrapping with RMFE for Fully Homomorphic Encryption. 350 - Xiuhan Lin, Shiduo Zhang, Yang Yu, Weijia Wang, Qidi You, Ximing Xu, Xiaoyun Wang:
Thorough Power Analysis on Falcon Gaussian Samplers and Practical Countermeasure. 351 - Michele Ciampi, Ivan Visconti:
Efficient NIZK Arguments with Straight-Line Simulation and Extraction. 352 - Anja Lehmann, Phillip Nazarian, Cavit Özbay:
Stronger Security for Threshold Blind Signatures. 353 - Michele Ciampi, Jure Sternad, Yu Xia:
Delayed-Input Multi-Party Computation. 354 - Anja Lehmann, Cavit Özbay:
Commit-and-Prove System for Vectors and Applications to Threshold Signing. 355 - Adrien Dubois, Michael Klooß, Russell W. F. Lai, Ivy K. Y. Woo:
Lattice-based Proof-Friendly Signatures from Vanishing Short Integer Solutions. 356 - Hayder Tirmazi:
Random Number Generation from Pulsars. 357 - Elette Boyle, Ilan Komargodski, Neekon Vafa:
The Complexity of Memory Checking with Covert Security. 358 - Shai Levin:
A Note on Zero-Knowledge Simulator of the CROSS Identification Protocol. 359 - Kalle Jyrkinen, Russell W. F. Lai:
Vanishing Short Integer Solution, Revisited: Reductions, Trapdoors, Homomorphic Signatures for Low-Degree Polynomials. 360 - Yuejun Wang, Baocang Wang, Qiqi Lai, Huaxiong Wang:
Predicate Encryption from Lattices: Enhanced Compactness and Refined Functionality. 361 - Jeongsu Kim, Aaram Yun:
Adaptively Secure Fully Homomorphic Message Authentication Code with Pre-processable Verification. 362 - Haruhisa Kosuge, Keita Xagawa:
The Security of Hash-and-Sign with Retry against Superposition Attacks. 363 - Xuan Thanh Do, Dang Truong Mac, Ky Nguyen, Duong Hieu Phan, Quoc-Huy Vu:
Traitor Tracing in Multi-sender Setting (sfTMCFE: Traceable Multi-client Functional Encryption). 364 - Joël Alwen, Georg Fuchsbauer, Marta Mularczyk, Doreen Riepel:
Lattice-Based Updatable Public-Key Encryption for Group Messaging. 365 - Amin Abdulrahman, Matthias J. Kannwischer, Thing-Han Lim:
Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY. 366 - Martin R. Albrecht, Russell W. F. Lai, Oleksandra Lapiha, Ivy K. Y. Woo:
Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally. 367 - Amos Beimel, Oriol Farràs, Adriana Moya:
Polynomial Secret Sharing Schemes and Algebraic Matroids. 368 - Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Zhusen Liu:
Higher Residuosity Attacks on Small RSA Subgroup Decision Problems. 369 - Shalini Banerjee, Tapas Pal, Andy Rupp, Daniel Slamanig:
Simple Public Key Anamorphic Encryption and Signature using Multi-Message Extensions. 370 - Aydin Abadi, Mohammad Naseri:
Functional Oblivious Transfer with Applications in Privacy-Preserving Machine Learning. 371 - Wouter Castryck, Thomas Decru, Péter Kutas, Abel Laval, Christophe Petit, Yan Bo Ti:
KLPT²: Algebraic Pathfinding in Dimension Two and Applications. 372 - Sanjam Garg, Aarushi Goel, Dimitris Kolonelos, Sina Shiehian, Rohit Sinha:
Split Prover Zero-Knowledge SNARKs. 373 - Nico Döttling, Abhishek Jain, Giulio Malavolta, Surya Mathialagan, Vinod Vaikuntanathan:
Simple and General Counterexamples for Private-Coin Evasive LWE. 374 - Shweta Agrawal, Anuja Modi, Anshu Yadav, Shota Yamada:
Evasive LWE: Attacks, Variants & Obfustopia. 375 - Paul Frixons, Valerie Gilchrist, Péter Kutas, Simon-Philipp Merz, Christophe Petit:
Another Look at the Quantum Security of the Vectorization Problem with Shifted Inputs. 376 - Han Chen, Tao Huang, Phuong Pham, Shuang Wu:
HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency. 377 - Sönke Jendral, Elena Dubrova:
Side-Channel and Fault Injection Attacks on VOLEitH Signature Schemes: A Case Study of Masked FAEST. 378 - Marius A. Aardal, Andrea Basso, Luca De Feo, Sikhar Patranabis, Benjamin Wesolowski:
A Complete Security Proof of SQIsign. 379 - Michel Seck, Oumar Niang, Djiby Sow:
A New Generalized Attack on RSA-like Cryptosystems. 380 - Qi Zhang, Mingqiang Wang, Xiaopeng Cheng:
Faster FHEW Bootstrapping with Adaptive Key Update. 381 - Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song:
On the Security and Privacy of CKKS-based Homomorphic Evaluation Protocols. 382 - Ritam Bhaumik, Jean Paul Degabriele:
Pencil: A Domain-Extended PRF with Full n-bit Security \\ for Strengthening GCM and More. 383 - Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, Leila Ben Abdelghani:
Optimizing Final Exponentiation for Pairing-Friendly Elliptic Curves with Odd Embedding Degrees Divisible by 3. 384 - Liam Eagen, Ariel Gabizon:
MERCURY: A multilinear Polynomial Commitment Scheme with constant proof size and no prover FFTs. 385 - Chenhao Jia, Tingting Cui, Qing Ling, Yan He, Kai Hu, Yu Sun, Meiqin Wang:
How Small Can S-boxes Be. 386 - Nathalie Lang, Jannis Leuther, Stefan Lucks:
Generic Composition: From Classical to Quantum Security. 387 - Ruben Baecker, Paul Gerhart, Jonathan Katz, Dominique Schröder:
Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures. 388 - Thomas Prévost, Bruno Martin, Olivier Alibart:
An ETSI GS QKD compliant TLS implementation. 389 - Yao-Ching Hsieh, Aayush Jain, Huijia Lin:
Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption (Part II: zeroizing attacks against private-coin evasive LWE assumptions). 390 - Shafik Nassar, Brent Waters, David J. Wu:
Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity. 391 - Gewu Bu, Bilel Zaghdoudi, Maria Potop-Butucaru, Serge Fdida:
Blockchain-based Secure D2D localisation with adaptive precision. 392 - Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath, Sihem Mesnager:
An Efficient Quantum Oblivious Transfer Protocol. 393 - Barbara Jiabao Benedikt:
Reducing the Number of Qubits in Solving LWE. 394 - Intak Hwang, Yisol Hwang, Miran Kim, Dongwon Lee, Yongsoo Song:
Provably Secure Approximate Computation Protocols from CKKS. 395 - Thomas Peyrin, Quan Quan Tan, Hongyi Zhang, Chunning Zhou:
Trail-Estimator: An Automated Verifier for Differential Trails in Block Ciphers. 396 - Dung Hoang Duong, Thanh Xuan Khuc, Youming Qiao, Willy Susilo, Chuanqi Zhang:
Blind Signatures from Cryptographic Group Actions. 397 - Tenma Edamura, Atsushi Takayasu:
Tight Adaptive Simulation Security for Identity-based Inner-Product FE in the (Quantum) Random Oracle Model. 398 - Sayantan Ganguly, Shion Samadder Chaudhury:
Computational Quantum Anamorphic Encryption and Anamorphic Secret Sharing. 399 - Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Tang Gang, Yanbin Pan, Xiaoyun Wang:
Re-Randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions. 400 - Pierrick Dartois, Jonathan Komada Eriksen, Tako Boris Fouotsa, Arthur Herlédan Le Merdy, Riccardo Invernizzi, Damien Robert, Ryan Rueger, Frederik Vercauteren, Benjamin Wesolowski:
PEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogenies. 401 - Chengcheng Chang, Kai Hu, Muzhou Li, Meiqin Wang:
Related-Key Differential and Boomerang Cryptanalysis in the Fixed-Key Model. 402 - Kai Hu, Chi Zhang, Chengcheng Chang, Jiashu Zhang, Meiqin Wang, Thomas Peyrin:
Periodic Table of Cryptanalysis: Geometric Approach with Different Bases. 403 - Johannes Reinhart, Erik-Oliver Blass, Björn Annighöfer:
SNARKs for Stateful Computations on Authenticated Data. 404 - Ramses Fernandez:
Withdrawable signatures in Fiat-Shamir with aborts constructions. 405 - Liang Zhang, Tao Liu, Zhanrong Ou, Haibin Kan, Jiheng Zhang:
AsyRand: fast asynchronous distributed randomness beacon with reconfiguration. 406 - Rishab Goyal, Saikumar Yadugiri:
Delegatable ABE with Full Security from Witness Encryption. 407 - Felix Günther, Michael Rosenberg, Douglas Stebila, Shannon Veitch:
Hybrid Obfuscated Key Exchange and KEMs. 408 - Hiroki Okada, Tsuyoshi Takagi:
Low Communication Threshold FHE from Standard (Module-)LWE. 409 - Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan:
TreeKEM: A Modular Machine-Checked Symbolic Security Analysis of Group Key Agreement in Messaging Layer Security. 410 - Nathalie Lang, Stefan Lucks, Bart Mennink, Suprita Talnikar:
Security of the Ascon Authenticated Encryption Mode in the Presence of Quantum Adversaries. 411 - Rishab Goyal, Saikumar Yadugiri:
Multi-Authority Functional Encryption: Corrupt Authorities, Dynamic Collusion, Lower Bounds, and More. 412 - Mohammad Hashemi, Shahin Tajik, Fatemeh Ganji:
Garblet: Multi-party Computation for Protecting Chiplet-based Systems. 413 - Mohsin Belam:
Deimos Cipher: A High-Entropy, Secure Encryption Algorithm with Strong Diffusion and Key Sensitivity. 414 - Miguel Cueto Noval, Simon-Philipp Merz, Patrick Stählin, Akin Ünal:
On the Soundness of Algebraic Attacks against Code-based Assumptions. 415 - Damiano Abram, Giulio Malavolta, Lawrence Roy:
Trapdoor Hash Functions and PIR from Low-Noise LPN. 416 - William J. Buchanan, Hisham Ali:
Evaluation of Privacy-aware Support Vector Machine (SVM) Learning using Homomorphic Encryption. 417 - Ross Evans, Matthew McKague, Douglas Stebila:
ProofFrog: A Tool For Verifying Game-Hopping Proofs. 418 - Chaya Ganesh, Sikhar Patranabis, Nitin Singh:
Samaritan: Linear-time Prover SNARK from New Multilinear Polynomial Commitments. 419 - Ojaswi Acharya, Suvasree Biswas, Weiqi Feng, Adam O'Neill, Arkady Yerukhimovich:
Non-Interactive Verifiable Aggregation. 420 - Tzu-Hsiang Huang, Wei-Hsiang Hung, Shota Yamada:
A Note on Obfuscation-based Attacks on Private-coin Evasive LWE. 421 - Kyoohyung Han, Seongkwang Kim, Yongha Son:
Private Computation on Common Fuzzy Records. 422 - Subhranil Dutta, Aikaterini Mitrokotsa, Tapas Pal, Jenit Tomy:
Multi-Client Attribute-Based Unbounded Inner Product Functional Encryption, and More. 423 - Neha Jawalkar, Nishanth Chandran, Divya Gupta, Rahul Sharma, Arkaprava Basu:
Matchmaker: Fast Secure Inference across Deployment Scenarios. 424 - Lucjan Hanzlik:
A Note on the Blindness of the Scheme from ePrint 2025/397. 425 - Keitaro Hashimoto, Shuichi Katsumata, Guillermo Pascual-Perez:
Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable. 426 - Marc Fischlin, Aikaterini Mitrokotsa, Jenit Tomy:
BUFFing Threshold Signature Schemes. 427 - Nitin Kumar Sharma, Sabyasachi Dey, Santanu Sarkar, Subhamoy Maitra:
On Improved Cryptanalytic Results against ChaCha for Reduced Rounds ≥ 7. 428 - Seonhong Min, Joon-woo Lee, Yongsoo Song:
Enhanced CKKS Bootstrapping with Generalized Polynomial Composites Approximation. 429 - Foteini Baldimtsi, Lucjan Hanzlik, Quan Nguyen, Aayush Yadav:
Non-interactive Anonymous Tokens with Private Metadata Bit. 430 - Hengyi Luo, Kaijie Jiang, Yanbin Pan, Anyu Wang:
Commitment Schemes Based on Module-LIP. 431 - Vincenzo Botta, Michele Ciampi, Emmanuela Orsini, Luisa Siniscalchi, Ivan Visconti:
Black-Box (and Fast) Non-Malleable Zero Knowledge. 432 - Akashdeep Saha, Siddhartha Chowdhury, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
MIDAS: an End-to-end CAD Framework for Automating Combinational Logic Locking. 433 - Shuai Han, Shengli Liu, Xiangyu Liu, Dawu Gu:
Fine-Grained Verifier NIZK and Its Applications. 434 - Thomas Pornin:
Constant-Time Code: The Pessimist Case. 435 - Chenzhi Zhu, Stefano Tessaro:
The Algebraic One-More MISIS Problem and Applications to Threshold Signatures. 436 - Antonio Flórez-Gutiérrez, Yosuke Todo:
Improved Cryptanalysis of ChaCha: Beating PNBs with Bit Puncturing. 437 - Gideon Samid:
Transmitting Secrets by Transmitting only Plaintext. 438 - Zhongyi Zhang, Chengan Hou, Meicheng Liu:
Preimage Attacks on up to 5 Rounds of SHA-3 Using Internal Differentials. 439 - Mohamed Malhou, Ludovic Perret, Kristin E. Lauter:
AI for Code-based Cryptography. 440 - Matthias Trannoy:
High-Order Masking of BIKE. 441 - Yuval Ishai, Hanjun Li, Huijia Lin:
A Unified Framework for Succinct Garbling from Homomorphic Secret Sharing. 442 - Alireza Kavousi, István András Seres:
Homomorphic Signature-based Witness Encryption and Applications. 443 - David Heath, Vladimir Kolesnikov, Varun Narayanan, Rafail Ostrovsky, Akash Shah:
Multiparty Garbling from OT with Linear Scaling and RAM Support. 444 - Gao Ming:
A proof of P≠NP (New symmetric encryption algorithm against any linear attacks and differential attacks). 445 - Tiantian Gong, Aniket Kate, Hemanta K. Maji, Hai H. Nguyen:
Disincentivize Collusion in Verifiable Secret Sharing. 446 - Yuval Ishai, Yifan Song:
Protecting Computations Against Continuous Bounded-Communication Leakage. 447 - Jai Hyun Park:
Ciphertext-Ciphertext Matrix Multiplication: Fast for Large Matrices. 448 - Feng Han, Xiao Lan, Weiran Liu, Lei Zhang, Hao Ren, Lin Qu, Yuan Hong:
Concretely Efficient Correlated Oblivious Permutation. 449 - Lewis Glabush, Felix Günther, Kathrin Hövelmanns, Douglas Stebila:
Verifiable Decapsulation: Recognizing Faulty Implementations of Post-Quantum KEMs. 450 - Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Eyal Ronen, Igors Stepanovs:
Analysis of the Telegram Key Exchange. 451 - Gideon Samid:
Polar Lattice Cryptography. 452 - Xiangyu Kong, Min Zhang, Yu Chen:
Verifiable Secret Sharing Based on Fully Batchable Polynomial Commitment for Privacy-Preserving Distributed Computation. 453 - Huinan Chen, Binbin Cai, Fei Gao, Song Lin:
Quantum circuit for implementing AES S-box with low costs. 454 - Siemen Dhooghe, Artemii Ovchinnikov, Dilara Toprakhisar:
StaMAC: Fault Protection via Stable-MAC Tags. 455 - Thomas Prévost, Bruno Martin, Olivier Alibart:
A Democratic Distributed Post-Quantum Certificateless Encryption Scheme. 456 - Thomas Prévost, Bruno Martin:
A 10-bit S-box generated by Feistel construction from cellular automata. 457 - Kathrin Hövelmanns, Andreas Hülsing, Mikhail A. Kudinov, Silvia Ritsch:
CAKE requires programming - On the provable post-quantum security of (O)CAKE. 458 - Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Kaishuo Cheng, Luís Esquível:
Revisiting the Security and Privacy of FIDO2. 459 - Truong Son Nguyen, Yi Ren, Guangyu Nie, Ni Trieu:
Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training. 460 - Thomas Haines, Rajeev Goré, Mukesh Tiwari:
Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth. 461 - Jianqiang Ni, Yingxin Li, Fukang Liu, Gaoli Wang:
Practical Key Collision on AES and Kiasu-BC. 462 - Sebastian Becker, Christoph Bösch, Benjamin Hettwer, Thomas Hoeren, Merlin Rombach, Sven Trieflinger, Hossein Yalame:
Multi-Party Computation in Corporate Data Processing: Legal and Technical Insights. 463 - Jean Paul Degabriele, Jan Gilcher, Jérôme Govinden, Kenneth G. Paterson:
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields. 464 - Donghwan Oh, Semin Han, Jihye Kim, Hyunok Oh, Jiyeal Chung, Jieun Lee, Hee-jun Yoo, Tae wan Kim:
zkAML: Zero-knowledge Anti Money Laundering in Smart Contracts with whitelist approach. 465 - Jan Dolejs, Martin Jurecek:
Algebraic Cryptanalysis of Small-Scale Variants of Stream Cipher E0. 466 - Fangan-Yssouf Dosso, Sylvain Duquesne, Nadia El Mrabet, Emma Gautier:
PMNS arithmetic for elliptic curve cryptography. 467 - Leila Ben Abdelghani, Nadia El Mrabet, Loubna Ghammam, Lina Mortajine:
Optimized Frobenius and Cyclotomic Cubing for Enhanced Pairing Computation. 468 - Alex Davidson, Luiza Soezima, Fernando Virdia:
Practical Semi-Open Chat Groups for Secure Messaging Applications. 469 - Rune Fiedler, Roman Langrehr:
On Deniable Authentication against Malicious Verifiers. 470 - Sengim Karayalcin, Marina Krcek, Stjepan Picek:
A Practical Tutorial on Deep Learning-based Side-channel Analysis. 471 - Zhenqiang Li, Shuqin Fan, Fei Gao, Yonglin Hao, Hongwei Sun, Xichao Hu, Dandan Li:
Quantum Attacks on Sum of Even-Mansour Construction Utilizing Online Classical Queries. 472 - Faneela, Jawad Ahmad, Baraq Ghaleb, Sana Ullah Jan, William J. Buchanan:
Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE. 473 - Michele Ciampi, Ankit Kumar Misra, Rafail Ostrovsky, Akash Shah:
Black-Box Constant-Round Secure 2PC with Succinct Communication. 474 - Felice Manganiello, Freeman Slaughter:
HammR: A ZKP Protocol for Fixed Hamming-Weight Restricted-Entry Vectors. 475 - Zhengjun Cao, Lihua Liu:
A note on "industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training". 476 - Krijn Reijnders:
A Note on the Advanced Use of the Tate Pairing. 477 - Mustafa Khairallah, Trevor Yap:
Attacking Single-Cycle Ciphers on Modern FPGAs featuring Explainable Deep Learning. 478 - Denis Berger, Mouad Lemoudden, William J. Buchanan:
Post Quantum Migration of Tor. 479 - Jiseung Kim, Changmin Lee, Yongha Son:
Worst-case Analysis of Lattice Enumeration Algorithm over Modules. 480 - Julien Juaneda, Marina Dehez-Clementi, Jean-Christophe Deneuville, Jérôme Lacan:
RHQC: post-quantum ratcheted key exchange from coding assumptions. 481 - Arinjita Paul, Sabyasachi Dutta, Kouichi Sakurai, C. Pandu Rangan:
An Efficient Sequential Aggregate Signature Scheme with Lazy Verification. 482 - Stanislaw Jarecki, Phillip Nazarian:
Adaptively Secure Threshold Blind BLS Signatures and Threshold Oblivious PRF. 483 - Rui Guo, M. Sazadur Rahman, Jingbo Zhou, Hadi Mardani Kamali, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor:
EvoLUTe+: Fine-Grained Look-Up-Table-based RTL IP Redaction. 484 - Motonari Ohtsuka, Takahiro Ishimaru, Rei Iseki, Shingo Kukita, Kohtaro Watanabe:
Key reconstruction for QC-MDPC McEliece from imperfect distance spectrum. 485 - Omri Shmueli, Mark Zhandry:
On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations. 486 - Thomas Buchsteiner, Karl W. Koch, Dragos Rotaru, Christian Rechberger:
webSPDZ: Versatile MPC on the Web. 487 - Philippe Chartier, Michel Koskas, Mohammed Lemou:
Exploring General Cyclotomic Rings in Torus-Based Fully Homomorphic Encryption: Part I - Prime Power Instances. 488 - Eli Goldin, Mark Zhandry:
Translating Between the Common Haar Random State Model and the Unitary Model. 489 - Hilal Asi, Vitaly Feldman, Hannah Keller, Guy N. Rothblum, Kunal Talwar:
PREAMBLE: Private and Efficient Aggregation of Block Sparse Vectors and Applications. 490 - Eugene Frimpong, Bin Liu, Camille Nuoskala, Antonis Michalas:
Blind Brother: Attribute-Based Selective Video Encryption. 491 - J. Dharani, K. Sundarakantham, Kunwar Singh, Mercy Shalinie Selvaraj:
Endorser Peer Anonymization in Hyperledger Fabric for Consortium of Organizations. 492 - Iftach Haitner, Gil Segev:
Tighter Concrete Security for the Simplest OT. 493 - Nilupulee Anuradha Gunathilake, Owen Lo, William J. Buchanan, Ahmed Yassin Al-Dubai:
Electromagnetic Side-Channel Analysis of PRESENT Lightweight Cipher. 494 - Zhengjun Cao, Lihua Liu:
A Security-Enhanced Pairing-Free Certificateless Aggregate Signature for Vehicular Ad-Hoc Networks, Revisited. 495 - Weizhe Wang, Pierrick Méaux, Deng Tang:
Shortcut2Secrets: A Table-based Differential Fault Attack Framework. 496 - Jing Tian, Yaodong Wei, Dejun Xu, Kai Wang, Anyu Wang, Zhiyuan Qiu, Fu Yao, Guang Zeng:
Fast Scloud+: A Fast Hardware Implementation for the Unstructured LWE-based KEM - Scloud+. 497 - Nathan Rousselot, Karine Heydemann, Loïc Masure, Vincent Migairou:
Scoop: An Optimizer for Profiling Attacks against Higher-Order Masking. 498 - Dev Mehta, Trey Marcantino, Mohammad Hashemi, Sam Karkache, Dillibabu Shanmugam, Patrick Schaumont, Fatemeh Ganji:
SCAPEgoat: Side-channel Analysis Library. 499 - Jiahui Gao, Yagaagowtham Palanikuma, Dimitris Mouris, Duong Tung Nguyen, Ni Trieu:
SecurED: Secure Multiparty Edit Distance for Genomic Sequences. 500 - Hong-Wei Sun, Fei Gao, Rong-Xue Xu, Dan-Dan Li, Zhen-Qiang Li, Ke-Jia Zhang:
Quantum Key-Recovery Attacks on Permutation-Based Pseudorandom Functions. 501 - Jesko Dujmovic, Giulio Malavolta, Wei Qi:
Registration-Based Encryption in the Plain Model. 502 - Nicolas David, Eric Garrido:
Max Bias Analysis: A New Approach on Computing the Entropy of Free Ring-Oscillator. 503 - Alexandru-Valentin Basaga, Sorin Iftene:
Ideal Compartmented Secret Sharing Scheme Based on the Chinese Remainder Theorem for Polynomial Rings. 504 - Charanjit S. Jutla, Arnab Roy:
Capitalized Bitcoin Fork for National Strategic Reserve. 505 - Shymaa M. Arafat:
On the Estonian Internet Voting System, IVXV, SoK and Suggestions. 506 - Meng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang:
Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning. 507 - Vipul Goyal, Junru Li, Rafail Ostrovsky, Yifan Song:
Towards Building Scalable Constant-Round MPC from Minimal Assumptions via Round Collapsing. 508 - Hoeteck Wee:
Almost Optimal KP and CP-ABE for Circuits from Succinct LWE. 509 - Jakub Kacper Szelag, Ji-Jian Chin, Sook-Chin Yip:
Adaptive Adversaries in Byzantine-Robust Federated Learning: A survey. 510 - Ifteher Alom, Sudip Bhujel, Yang Xiao:
VeriSSO: A Privacy-Preserving Legacy-Compatible Single Sign-On Protocol Using Verifiable Credentials. 511 - Hyunjun Kim, Hwajeong Seo:
Optimizing AES-GCM on ARM Cortex-M4: A Fixslicing and FACE-Based Approach. 512 - Rutchathon Chairattana-Apirom, Franklin Harding, Anna Lysyanskaya, Stefano Tessaro:
Server-Aided Anonymous Credentials. 513 - Juraj Belohorec, Pavel Dvorák, Charlotte Hoffmann, Pavel Hubácek, Kristýna Masková, Martin Pastyrík:
On Extractability of the KZG Family of Polynomial Commitment Schemes. 514 - Yuxi Xue, Tianyu Zheng, Shang Gao, Bin Xiao, Man Ho Au:
Compressed Sigma Protocols: New Model and Aggregation Techniques. 515 - Alessandro Budroni, Jesús-Javier Chi-Domínguez, Ermes Franch:
Don't Use It Twice: Reloaded! On the Lattice Isomorphism Group Action. 516 - Gal Arnon, Jesko Dujmovic, Yuval Ishai:
Designated-Verifier SNARGs with One Group Element. 517 - Amos Beimel:
Secret-Sharing Schemes for General Access Structures: An Introduction. 518 - Brieuc Balon, Lorenzo Grassi, Pierrick Méaux, Thorben Moos, François-Xavier Standaert, Matthias Johann Steiner:
mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software. 519 - Thibauld Feneuil, Matthieu Rivain, Auguste Warmé-Janville:
Masking-Friendly Post-Quantum Signatures in the Threshold-Computation-in-the-Head Framework. 520 - Katherine E. Stange:
Division polynomials for arbitrary isogenies. 521 - Bar Alon, Benjamin Saldman, Eran Omri:
New Techniques for Analyzing Fully Secure Protocols: A Case Study of Solitary Output Secure Computation. 522 - Emil Lenngren:
Assembly optimised Curve25519 and Curve448 implementations for ARM Cortex-M4 and Cortex-M33. 523 - The-Anh Ta, Xiangyu Hui, Sid Chi-Kin Chau:
Ring Referral: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User Anonymity for Decentralized Identity and More. 524 - Ran Canetti, Ivan Damgård, Sebastian Kolby, Divya Ravi, Sophia Yakoubov:
Deniable Secret Sharing. 525 - Atharv Singh Patlan, Peiyao Sheng, S. Ashwin Hebbar, Prateek Mittal, Pramod Viswanath:
AI Agents in Cryptoland: Practical Attacks and No Silver Bullet. 526 - Daniel Aronoff, Adithya Bhat, Panagiotis Chatzigiannis, Mohsen Minaei, Srinivasan Raghuraman, Robert M. Townsend, Nicolas Xuan-Yi Zhang:
SoK: Fully-homomorphic encryption in smart contracts. 527 - Yue Zhou, Sid Chi-Kin Chau:
VeRange: Verification-efficient Zero-knowledge Range Arguments with Transparent Setup for Blockchain Applications and More. 528 - Zhengjun Cao, Lihua Liu:
On the Anonymity in "A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments". 529 - Ramses Fernandez:
Lattice-based extended withdrawable signatures. 530 - Axel Lemoine, Rocco Mora, Jean-Pierre Tillich:
Understanding the new distinguisher of alternant codes at degree 2. 531 - Boris Alexeev, Colin Percival, Yan X. Zhang:
Chunking Attacks on File Backup Services using Content-Defined Chunking. 532 - Mengling Liu, Yang Heng, Xingye Lu, Man Ho Au:
JesseQ: Efficient Zero-Knowledge Proofs for Circuits over Any Field. 533 - Pengfei Zhu:
Plonkify: R1CS-to-Plonk transpiler. 534 - Tiancheng Xie, Tao Lu, Zhiyong Fang, Siqi Wang, Zhenfei Zhang, Yongzheng Jia, Dawn Song, Jiaheng Zhang:
zkPyTorch: A Hierarchical Optimized Compiler for Zero-Knowledge Machine Learning. 535 - Alessandro Chiesa, Michele Orrù:
A Fiat-Shamir Transformation From Duplex Sponges. 536 - Rui-Tao Su, Jiong-Jiong Ren, Shao-Zhen Chen:
Improved Framework of Related-key Differential Neural Distinguisher and Applications to the Standard Ciphers. 537 - Anna P. Y. Woo, Alex Ozdemir, Chad Sharp, Thomas Pornin, Paul Grubbs:
Efficient Proofs of Possession for Legacy Signatures. 538 - Gweonho Jeong, Jaewoong Lee, Minhae Kim, Byeongkyu Han, Jihye Kim, Hyunok Oh:
Aegis: Scalable Privacy-preserving CBDC Framework with Dynamic Proof of Liabilities. 539 - Gweonho Jeong, Myeongkyun Moon, Geonho Yoon, Hyunok Oh, Jihye Kim:
Tangram: Encryption-friendly SNARK framework under Pedersen committed engines. 540 - Dipayan Saha, Jingbo Zhou, Farimah Farahmandi:
Physical Design-Aware Power Side-Channel Leakage Assessment Framework using Deep Learning. 541 - Adrian Perez Keilty, Diego F. Aranha, Elena Pagnin, Francisco Rodríguez-Henríquez:
That's AmorE: Amortized Efficiency for Pairing Delegation. 542 - Razvan Barbulescu, Damien Robert, Nicolas Sarkis:
Models of Kummer lines and Galois representations. 543 - Théophile Brézot, Chloé Hébant, Paola de Perthuis, David Pointcheval:
Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. 544 - Michele Battagliola, Giuseppe D'Alconzo, Andrea Gangemi, Chiara Spadafora:
Enhancing E-Voting with Multiparty Class Group Encryption. 545 - Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Farimah Farahmandi:
BugWhisperer: Fine-Tuning LLMs for SoC Hardware Vulnerability Detection. 546 - Abhishek Kumar, Amit Kumar Chauhan, Somitra Kumar Sanadhya:
Improved Cryptanalysis of FEA-1 and FEA-2 using Square Attacks. 547 - Julien Devevey, Morgane Guerreau, Thomas Legavre, Ange Martinelli, Thomas Ricosset:
Breaking HuFu with 0 Leakage: A Side-Channel Analysis. 548 - Andrea Flamini, Silvio Ranise, Giada Sciarretta, Mario Scuro, Nicola Smaniotto, Alessandro Tomasi:
Public Key Accumulators for Revocation of Non-Anonymous Credentials. 549 - Alex Biryukov, Baptiste Lambin, Aleksei Udovenko:
Exact Formula for RX-Differential Probability through Modular Addition for All Rotations. 550 - Aniket Kate, Pratyay Mukherjee, Hamza Saleem, Pratik Sarkar, Bhaskar Roberts:
ANARKey: A New Approach to (Socially) Recover Keys. 551 - Wei-Kai Lin, Ethan Mook, Daniel Wichs:
Black Box Crypto is Useless for Doubly Efficient PIR. 552 - Aritra Dasgupta, Sudipta Paria, Swarup Bhunia:
HIPR: Hardware IP Protection through Low-Overhead Fine-Grain Redaction. 553 - Joseph Jaeger, Akshaya Kumar:
Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix. 554 - Changsong Jiang, Chunxiang Xu, Guomin Yang, Li Duan, Jing Wang:
Strong Federated Authentication With Password-based Credential Against Identity Server Corruption. 555 - Lena Heimberger, Christopher Patton, Bas Westerbaan:
Private SCT Auditing, Revisited. 556 - Weihan Li, Zongyang Zhang, Yun Li, Pengfei Zhu, Cheng Hong, Jianwei Liu:
Soloist: Distributed SNARKs for Rank-One Constraint System. 557 - Kien Tuong Truong, Simon-Philipp Merz, Matteo Scarlata, Felix Günther, Kenneth G. Paterson:
Breaking and Fixing Content-Defined Chunking. 558 - Yanning Ji, Elena Dubrova, Ruize Wang:
Is Your Bluetooth Chip Leaking Secrets via RF Signals? 559 - Abraham Basurto-Becerra, Azade Rezaeezade, Stjepan Picek:
Jump, It Is Easy: JumpReLU Activation Function in Deep Learning-based Side-channel Analysis. 560 - Dipayan Saha, Hasan Al Shaikh, Shams Tarek, Farimah Farahmandi:
ThreatLens: LLM-guided Threat Modeling and Test Plan Generation for Hardware Security Verification. 561 - Zhengjun Cao, Lihua Liu:
Analysis of One Certificateless Authentication and Key Agreement Scheme for Wireless Body Area Network. 562 - YoungBeom Kim, Seog Chung Seo:
An Optimized Instantiation of Post-Quantum MQTT protocol on 8-bit AVR Sensor Nodes. 563 - Linus Mainka, Kostas Papagiannopoulos:
Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V. 564 - Lydia Garms, Michael Livesey:
Attacking soundness for an optimization of the Gemini Polynomial Commitment Scheme. 565 - Subhadeep Banik, Hailun Yan:
Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities. 566 - Nikita Polyanskii, Sebastian Mueller, Ilya Vorobyev:
Starfish: A high throughput BFT protocol on uncertified DAG with linear amortized communication complexity. 567 - pcy Sluys, Lennert Wouters, Benedikt Gierlichs, Ingrid Verbauwhede:
An in-depth security evaluation of the Nintendo DSi gaming console. 568 - Yunwen Liu, Bo Wang, Ren Zhang:
Solving Data Availability Limitations in Client-Side Validation with UTxO Binding. 569 - pcy Sluys, Lennert Wouters, Benedikt Gierlichs, Ingrid Verbauwhede:
Partial Key Overwrite Attacks in Microcontrollers: a Survey. 570 - Shuya Hanai, Keisuke Tanaka, Masayuki Tezuka, Yusuke Yoshida:
Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange. 571 - Zhantong Xue, Pingchuan Ma, Zhaoyu Wang, Shuai Wang:
Zinnia: An Expressive and Efficient Tensor-Oriented Zero-Knowledge Programming Framework. 572 - Denis Firsov, Jakub Janku:
Forking Lemma in EasyCrypt. 573 - Riccardo Taiello, Clémentine Gritti, Melek Önen, Marco Lorenzi:
Buffalo: A Practical Secure Aggregation Protocol for Asynchronous Federated Learning. 574 - Léo Ducas, Lynn Engelberts, Johanna Loyer:
Wagner's Algorithm Provably Runs in Subexponential Time for SIS∞. 575 - Karim Baghery, Noah Knapen, Georgio Nicolas, Mahdi Rahimi:
Pre-Constructed Publicly Verifiable Secret Sharing and Applications. 576 - Woohyuk Chung, Seongha Hwang, Seongkwang Kim, Byeonghak Lee, Jooyoung Lee:
Making GCM Great Again: Toward Full Security and Longer Nonces. 577 - Wei-Kai Lin, Zhenghao Lu, Hong-Sheng Zhou:
Efficient Garbled Pseudorandom Functions and Lookup Tables from Minimal Assumption. 578 - Xihan Xiong, Michael Huth, William Knottenbelt:
REGKYC: Supporting Privacy and Compliance Enforcement for KYC in Blockchains. 579 - Takumi Nishimura, Atsushi Takayasu:
Efficient Revocable Identity-Based Encryption from Middle-Product LWE. 580 - Jung Hee Cheon, Hyeongmin Choe, Seunghong Kim, Yongdong Yeo:
Reusable Dynamic Multi-Party Homomorphic Encryption. 581 - Zheng Liu, An Wang, Congming Wei, Yaoling Ding, Jingqi Zhang, Annyu Liu, Liehuang Zhu:
Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on Dilithium. 582 - Jean Paul Degabriele, Alessandro Melloni, Jean-Pierre Münch, Martijn Stam:
Counter Galois Onion (CGO) for Tor: Fast Non-Malleable Onion Encryption. 583 - S. P. Prahlad:
The Singularity Random Number Generator: Bridging Determinism and Unpredictability to Redefine Randomness, Secure Systems, and Adaptive Intelligence. 584 - Jeffrey Champion, Brent Waters, David J. Wu:
Adaptively-Secure Big-Key Identity-Based Encryption. 585 - Geng Wang, Wenwen Xia, Dawu Gu:
Heuristic Algorithm for Solving Restricted SVP and its Applications. 586 - Gideon Samid:
Lifeboats on the Titanic Cryptography. 587 - Chenyu Li, Ren Zhang, Xiaorui Gong:
A Place for Everyone vs Everyone in its Place: Measuring and Attacking the Ethereum Global Network. 588 - Quentin Forcioli, Sumanta Chaudhuri, Jean-Luc Danger:
Defeating AutoLock: From Simulation to Real-World Cache-Timing Exploits against TrustZone. 589 - Siddharth Kapoor, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
emGraph: Efficient Multiparty Secure Graph Computation. 590 - Victor I. Kolobov, Avihu M. Levy, Moni Naor:
ColliderVM: Stateful Computation on Bitcoin without Fraud Proofs. 591 - Brandon Ramsay:
DSM: Decentralized State Machine - The Missing Trust Layer of the Internet. 592 - Ananya Appan, David Heath:
Oblivious Immutable Memory. 593 - Tianyi Liu, Yupeng Zhang:
Efficient SNARKs for Boolean Circuits via Sumcheck over Tower Fields. 594 - Yuki Seto, Hiroki Furue, Atsushi Takayasu:
Partial Key Exposure Attacks on UOV and Its Variants. 595 - Alain Couvreur, Christophe Levrat:
Highway to Hull: An Algorithm for Solving the General Matrix Code Equivalence Problem. 596 - Joel Samper, Bernardo Ferreira:
SoK: Self-Generated Nudes over Private Chats: How Can Technology Contribute to a Safer Sexting? 597 - Markus Krabbe Larsen, Carsten Schürmann:
Nominal State-Separating Proofs. 598 - Zhengjun Cao, Lihua Liu:
Insecurity of One Decentralized Attribute-based Signature Scheme for Social Co-governance. 599 - Dor Minzer, Kai Zhe Zheng:
Improved Round-by-round Soundness IOPs via Reed-Muller Codes. 600 - Antonio Ras, Antoine Loiseau, Mikaël Carmona, Simon Pontié, Guénaël Renault, Benjamin Smith, Emanuele Valea:
PHOENIX: Crypto-Agile Hardware Sharing for ML-KEM and HQC. 601 - Sebastian Clermont, Samed Düzlü, Christian Janson, Laurens Porzenheim, Patrick Struck:
Lattice-Based Sanitizable Signature Schemes: Chameleon Hash Functions and More. 602 - Bo Pan, Maria Potop-Butucaru:
Mobile Byzantine Agreement in a Trusted World. 603 - Aymeric Hiltenbrand, Julien Eynard, Romain Poussier:
On the success rate of simple side-channel attacks against masking with unlimited attack traces. 604 - Rishabh Bhadauria, Nico Döttling, Carmit Hazay, Chuanwei Lin:
Laconic Cryptography with Preprocessing. 605 - Paco Azevedo Oliveira, Jordan Beraud, Louis Goubin:
An attack on ML-DSA using an implicit hint. 606 - Riccardo Bernardini:
Analytic and Simulation Results of a Gaussian Physically Unclonable Constant Based on Resistance Dispersion. 607 - Juan Jesús León, Vicente Muñoz:
On some non-linear recurrences over finite fields linked to isogeny graphs. 608 - Yevgeniy Dodis, Eli Goldin, Peter Hall:
Random Oracle Combiners: Merkle-Damgård Style. 609 - John M. Schanck:
Clubcards for the WebPKI: smaller certificate revocation tests in theory and practice. 610 - Vineet Nair, Justin Thaler, Michael Zhu:
Proving CPU Executions in Small Space. 611 - Ga Hee Hong, Joo Woo, Jonghyun Kim, Minkyu Kim, Hochang Lee, Jong Hwan Park:
More NTRU+Sign Signatures from Cyclotomic Trinomials. 612 - Onur Günlü, Maciej Skorski, H. Vincent Poor:
Low-Latency Rate-Distortion-Perception Trade-off: A Randomized Distributed Function Computation Application. 613 - Yi Liu, Junzuo Lai, Peng Yang, Anjia Yang, Qi Wang, Siu-Ming Yiu, Jian Weng:
Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound. 614 - Pierrick Méaux:
From at Least n/3 to at Most $3\sqrt{n}$: Correcting the Algebraic Immunity of the Hidden Weight Bit Function. 615 - Juan A. Garay, Aggelos Kiayias, Yu Shen:
State Machine Replication Without Borders. 616 - Jeremy Guillaume, Maxime Pelcat, Amor Nafkha, Rubén Salvador:
Multi-Screaming-Channel Attacks: Frequency Diversity for Enhanced Attacks. 617 - Jayamine Alupotha, Mariarosaria Barbaraci, Ioannis Kaklamanis, Abhimanyu Rawat, Christian Cachin, Fan Zhang:
Anonymous Self-Credentials and their Application to Single-Sign-On. 618 - Nicolas Desmoulins, Antoine Dumanois, Seyni Kane, Jacques Traoré:
Making BBS Anonymous Credentials eIDAS 2.0 Compliant. 619 - Alhad Daftardar, Jianqiao Mo, Joey Ah-kiow, Benedikt Bünz, Ramesh Karri, Siddharth Garg, Brandon Reagen:
Need for zkSpeed: Accelerating HyperPlonk for Zero-Knowledge Proofs. 620 - Sanjay Deshpande, Yongseok Lee, Cansu Karakuzu, Jakub Szefer, Yunheung Paek:
SPHINCSLET: An Area-Efficient Accelerator for the Full SPHINCS+ Digital Signature Algorithm. 621 - Yackolley Amoussou-Guenou, Lionel Beltrando, Maurice Herlihy, Maria Potop-Butucaru:
Byzantine Reliable Broadcast and Tendermint Consensus with trusted components. 622 - Tomer Keniagin, Eitan Yaakobi, Ori Rottenstreich:
CertainSync: Rateless Set Reconciliation with Certainty. 623 - Anand Kumar Narayanan:
Trapdoor one-way functions from tensors. 624 - Song Bian, Yunhao Fu, Dongxu Zhao, Haowen Pan, Yuexiang Jin, Jiayue Sun, Hui Qiao, Zhenyu Guan:
FHECAP: An Encrypted Control System with Piecewise Continuous Actuation. 625 - Hyunjun Kim, Sejin Lim, Kyungbae Jang, Siyi Wang, Anubhab Baksi, Anupam Chattopadhyay, Hwajeong Seo:
Tree-based Quantum Carry-Save Adder. 626 - Yimeng He, San Ling, Khai Hanh Tang, Huaxiong Wang:
Everlasting Fully Dynamic Group Signatures. 627 - Pierre-Augustin Berthet, Justine Paillet, Cédric Tavernier, Lilian Bossuet, Brice Colombier:
Improving the Masked Division for the FALCON Signature. 628 - Pedram Hosseyni, Ralf Küsters, Tim Würtele:
Audience Injection Attacks: A New Class of Attacks on Web-Based Authorization and Authentication Standards. 629 - Cong Zhang, Liqiang Peng, Weiran Liu, Shuaishuai Li, Meng Hao, Lei Zhang, Dongdai Lin:
Charge Your Clients: Payable Secure Computation and Its Applications. 630 - Aniket Kate, Pratyay Mukherjee, Samipa Samanta, Pratik Sarkar:
Dyna-hinTS: Silent Threshold Signatures for Dynamic Committees. 631 - Lorenz Panny:
On breaking McEliece keys using brute force. 632 - Andreas Hülsing, Mikhail A. Kudinov, Christian Majenz:
Hybrid-query bounds with partial input control - framework and application to tight M-eTCR. 633 - Sneha Mohanty, Christian Schindelhauer:
Cryptography based on 2D Ray Tracing. 634 - Daniel Escudero, Elisaweta Masserova, Antigoni Polychroniadou:
Towards Scalable YOSO MPC via Packed Secret-Sharing. 635 - Nobuyuki Sugio:
Impossible Differential Attack on SAND-64. 636 - Shymaa M. Arafat:
A Study of Blockchain Consensus Protocols. 637 - Yanbo Chen:
Round-Efficient Adaptively Secure Threshold Signatures with Rewinding. 638 - Longcheng Li, Qian Li, Xingjian Li, Qipeng Liu:
Cryptomania v.s. Minicrypt in a Quantum World. 639 - Minglang Dong, Yu Chen, Cong Zhang, Yujie Bai, Yang Cao:
Multi-Party Private Set Operations from Predicative Zero-Sharing. 640 - Jordi Herrera-Joancomartí, Cristina Pérez-Solà, Toni Mateos:
Scalable Non-Fungible Tokens on Bitcoin. 641 - Bruno Pasqualotto Cavalar, Eli Goldin, Matthew Gray, Peter Hall:
A Meta-Complexity Characterization of Quantum Cryptography. 642 - Yulian Sun, Vedant Bonde, Li Duan, Yong Li:
Obfuscation for Deep Neural Networks against Model Extraction: Attack Taxonomy and Defense Optimization. 643 - Jeremy Guillaume, Maxime Pelcat, Amor Nafkha, Rubén Salvador:
Attacking at non-harmonic frequencies in screaming-channel attacks. 644 - Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov, Daniele Di Tullio, Mariia Rodinko:
GIGA Protocol: Unlocking Trustless Parallel Computation in Blockchains. 645 - Caicai Chen, Yuval Ishai, Tamer Mour, Alon Rosen:
Secret-Key PIR from Random Linear Codes. 646 - Rosario Giustolisi, Mohammadamin Rakeei, Gabriele Lenzini:
Anamorphic Voting: Ballot Freedom Against Dishonest Authorities. 647 - Marco Baldi, Sebastian Bitzer, Nicholas Lilla, Paolo Santini:
HQC Beyond the BSC: Towards Error Structure-Aware Decoding. 648 - Ying Cai, Chengyi Qin, Mingqiang Wang:
Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience. 649 - Yadi Zhong:
ADC-BE: Optimizing Worst-Case Bandwidth in Broadcast Encryption with Boolean Functions. 650 - Jean-Sébastien Coron, Robin Köstler:
Low-Latency Bootstrapping for CKKS using Roots of Unity. 651 - Andreas Brüggemann, Nishat Koti, Varsha Bhat Kukkala, Thomas Schneider:
MultiCent: Secure and Scalable Centrality Measures on Multilayer Graphs. 652 - Mehmet Ugurbil, Dimitris Mouris, Manuel B. Santos, José Cabrero-Holgueras, Miguel de Vega, Shubho Sengupta:
Fission: Distributed Privacy-Preserving Large Language Model Inference. 653 - William J. Buchanan, Jamie Gilchrist, Keir Finlow-Bates:
ECDSA Cracking Methods. 654 - Lucas David Meier, Felipe Valencia, Cristian-Alexandru Botocan, Damian Vizár:
Taking AI-Based Side-Channel Attacks to a New Dimension. 655 - Xiaohan Wan, Yang Wang, Haiyang Xue, Mingqiang Wang:
Unbounded Multi-Hop Proxy Re-Encryption with HRA Security: An LWE-Based Optimization. 656 - Matilda Backendal, Sebastian Clermont, Marc Fischlin, Felix Günther:
Key Derivation Functions Without a Grain of Salt. 657 - Jonathan Bootle, Vadim Lyubashevsky, Antonio Merino-Gallardo:
Efficient Verifiable Mixnets from Lattices, Revisited. 658 - Dennis Faut, Julia Hesse, Lisa Kohl, Andy Rupp:
Scalable and Fine-Tuned Privacy Pass from Group Verifiable Random Functions. 659 - Víctor Duarte Melo, William J. Buchanan:
Eccfrog512ck2: An Enhanced 512-bit Weierstrass Elliptic Curve. 660 - Danilo Gligoroski, Mayank Raikwar, Sonu Kumar Jha:
An LLM Framework For Cryptography Over Chat Channels. 661 - Liang Zhang, Xingyu Wu, Qiuling Yue, Haibin Kan, Jiheng Zhang:
Attribute-Based Publicly Verifiable Secret Sharing. 662 - Mihir Bellare, Doreen Riepel, Laura Shea:
Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters. 663 - Liang Zhang, Dongliang Cai, Tao Liu, Haibin Kan, Jiheng Zhang:
Publicly Verifiable Generalized Secret Sharing Schemes and Their Applications. 664 - Varun Thakore, Saravanan Vijayakumaran:
MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero. 665 - Andrej Bogdanov, Alon Rosen, Neekon Vafa, Vinod Vaikuntanathan:
Adaptive Robustness of Hypergrid Johnson-Lindenstrauss. 666 - Vir Nath Pathak, Sushmita Ruj, Ron van der Meyden:
Vector Commitment Design, Analysis, and Applications: A Survey. 667 - Yongcheng Song, Rongmao Chen, Fangguo Zhang, Xinyi Huang, Jian Weng, Huaxiong Wang:
(Interleaved) Extended Gabidulin Codes and Their Applications to RQC. 668 - Chao Niu, Benqiang Wei, Zhicong Huang, Zhaomin Yang, Cheng Hong, Meiqin Wang, Tao Wei:
SoK: FHE-Friendly Symmetric Ciphers and Transciphering. 669 - Jianming Lin, Damien Robert, Chang-An Zhao, Yuhao Zheng:
Biextensions in pairing-based cryptography. 670 - Shimin Pan, Tsz Hon Yuen, Siu-Ming Yiu:
A Dilithium-like Multisignature in Fully Split Ring and Quantum Random Oracle Model. 671 - Giacomo Pope, Krijn Reijnders, Damien Robert, Alessandro Sferlazza, Benjamin Smith:
Simpler and Faster Pairings from the Montgomery Ladder. 672 - Can Aknesil, Elena Dubrova, Niklas Lindskog, Jakob Sternby, Håkan Englund:
Hybrid Fingerprinting for Effective Detection of Cloned Neural Networks. 673 - Kirill V. Vedenev:
On the Security of Two IKKR-type Code-Based Cryptosystems. 674 - Antonín Dufka, Semjon Kravtsenko, Peeter Laud, Nikita Snetkov:
Trilithium: Efficient and Universally Composable Distributed ML-DSA Signing. 675

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.