Cryptology ePrint Archive: Listing for 2019


2019/314 ( PDF )
Optimal Bounded-Collusion Secure Functional Encryption
Prabhanjan Ananth and Vinod Vaikuntanathan
2019/313 ( PDF )
A SAT-based approach for index calculus on binary elliptic curves
Monika Trimoska and Sorina Ionica and Gilles Dequen
2019/312 ( PDF )
Side-Channel Analysis of the TERO PUF
Lars Tebelmann and Michael Pehl and Vincent Immler
2019/311 ( PDF )
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and Bertram Poettering
2019/310 ( PDF )
A Formal Approach to Secure Speculation
Kevin Cheang and Cameron Rasmussen and Sanjit Seshia and Pramod Subramanyan
2019/309 ( PDF )
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots
Jean-Sebastien Coron and Luca Notarnicola
2019/308 ( PDF )
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation
Yuan Kang and Chengyu Lin and Tal Malkin and Mariana Raykova
2019/307 ( PDF )
Solving $x^{2^k+1}+x+a=0$ in $\mathbb{F}_{2^n}$ with $\gcd(n,k)=1$
Kwang Ho Kim and Sihem Mesnager
2019/306 ( PDF )
Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields
Madhurima Mukhopadhyay and Palash Sarkar
2019/305 ( PDF )
Practical Algebraic Side-Channel Attacks Against ACORN
Alexandre Adomnicai and Laurent Masson and Jacques J.A. Fournier
2019/304 ( PDF )
Ternary Syndrome Decoding with Large Weight
Rémi Bricout and André Chailloux and Thomas Debris-Alazard and Matthieu Lequesne
2019/303 ( PDF )
Analysis of TPL Signature Scheme
Terry Shue Chien Lau and Chik How Tan and Theo Fanuela Prabowo
2019/302 ( PDF )
A Survey of Leakage-Resilient Cryptography
Yael Tauman Kalai and Leonid Reyzin
2019/301 ( PDF )
Safe Compilation for Encrypted Computing
Peter T. Breuer and Simon Pickin
2019/300 ( PDF )
Transient Effect Ring Oscillators Leak Too
Ugo Mureddu and Brice Colombier and Nathalie Bochard and Lilian Bossuet and Viktor Fischer
2019/299 ( PDF )
A Generic Construction of Revocable Identity-Based Encryption
Xuecheng Ma and Dongdai Lin
2019/298 ( PDF )
Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem
Craig Costello and Patrick Longa and Michael Naehrig and Joost Renes and Fernando Virdia
2019/297 ( PDF )
Towards Optimized and Constant-Time CSIDH on Embedded Devices
Amir Jalali and Reza Azarderakhsh and Mehran Mozaffari Kermani and David Jao
2019/296 ( PDF )
Hash functions from superspecial genus-2 curves using Richelot isogenies
Wouter Castryck and Thomas Decru and Benjamin Smith
2019/295 ( PDF )
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
Kimia Tajik and Akshith Gunasekaran and Rhea Dutta and Brandon Ellis and Rakesh B. Bobba and Mike Rosulek and Charles V. Wright and Wu-chi Feng
2019/294 ( PDF )
Semi-parallel Logistic Regression for GWAS on Encrypted Data
Miran Kim and Yongsoo Song and Baiyu Li and Daniele Micciancio
2019/293 ( PDF )
Impossibility of Strong KDM Security with Auxiliary Input
Cody Freitag and Ilan Komargodski and Rafael Pass
2019/292 ( PDF )
Timing attacks on Error Correcting Codes in Post-Quantum Secure Schemes
Jan-Pieter D'Anvers and Marcel Tiepelt and Frederik Vercauteren and Ingrid Verbauwhede
2019/291 ( PDF )
CCA Security and Trapdoor Functions via Key-Dependent-Message Security
Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka
2019/290 ( PDF )
Cost effective techniques for chip delayering and in-situ depackaging
Philippe Loubet Moundi
2019/289 ( PDF )
Cryptanalysis of ForkAES
Subhadeep Banik and Jannis Bossert and Amit Jana and Eik List and Stefan Lucks and Willi Meier and Mostafizar Rahman and Dhiman Saha and Yu Sasaki
2019/288 ( PDF )
On the construction of S-boxes using the leaders and followers metaheuristic
Alejandro Freyre-Echevarría and Ismel Martínez-Díaz
2019/287 ( PDF )
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
A. N. Alekseychuk and S. M. Koniushok and M. V. Poremskyi
2019/286 ( PDF )
Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ variables Majority Function
Yindong Chen and Fei Guo and Liu Zhang
2019/285 ( PDF )
SpaceFlip : Unbound Geometry Cryptography
Gideon Samid
2019/284 ( PDF )
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2
Ai Ishida and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka
2019/283 ( PDF )
An Attack on Small Private Keys of RSA Based on Euclidean Algorithm
Dimitrios Poulakis
2019/282 ( PDF )
A Framework for Cryptographic Problems from Linear Algebra
Carl Bootland and Wouter Castryck and Alan Szepieniec and Frederik Vercauteren
2019/281 ( PDF )
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning
Phillipp Schoppmann and Adria Gascon and Mariana Raykova and Benny Pinkas
2019/280 ( PDF )
Multi-Authority Attribute-Based Encryption from LWE in the OT Model
Sam Kim
2019/279 ( PDF )
A Note on Key Agreement and Non-Interactive Commitments
Alex Lombardi and Luke Schaeffer
2019/278 ( PDF )
Uncovering Algebraic Structures in the MPC Landscape
Navneet Agarwal and Sanat Anand and Manoj Prabhakaran
2019/277 ( PDF )
On the boomerang uniformity of quadratic permutations over $\mathbb{F}_{2^n}$
Sihem Mesnager and Chunming Tang and Maosheng Xiong
2019/276 ( PDF )
Secure Computation of the $k^\text{th}$-ranked Integer on Blockchains
Erik-Oliver Blass and Florian Kerschbaum
2019/275 ( PDF )
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation
M. Sadegh Riazi and Mojan Javaheripi and Siam U. Hussain and Farinaz Koushanfar
2019/274 ( PDF )
Path Oblivious Heap
Elaine Shi
2019/273 ( PDF )
Compressing Vector OLE
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai
2019/272 ( PDF )
Quantum Security Analysis of AES
Xavier Bonnetain and María Naya-Plasencia and André Schrottenloher
2019/271 ( PDF )
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)
Jintai Ding and Chi Cheng and Yue Qin
2019/270 ( PDF )
Sync HotStuff: Synchronous SMR with 2∆ Latency and Optimistic Responsiveness
Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren and Maofan Yin
2019/269 ( PDF )
Digital Signatures for Consensus
Sergey Gorbunov and Hoeteck Wee
2019/268 ( PDF )
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys*
Sergei Bauer and Martin Brunner and Peter Schartner
2019/267 ( PDF )
Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.
Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede
2019/266 ( PDF )
Fast constant-time gcd computation and modular inversion
Daniel J. Bernstein and Bo-Yin Yang
2019/265 ( PDF )
TEX - A Securely Scalable Trustless Exchange
Rami Khalil and Arthur Gervais and Guillaume Felley
2019/264 ( PDF )
Unifying computational entropies via Kullback-Leibler divergence
Rohit Agrawal and Yi-Hsiu Chen and Thibaut Horel and Salil Vadhan
2019/263 ( PDF )
Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones
Jiaping Wang and Hao Wang
2019/262 ( PDF )
Revisiting Post-Quantum Fiat-Shamir
Qipeng Liu and Mark Zhandry
2019/261 ( PDF )
Forward-Secure Multi-Signatures
Manu Drijvers and Gregory Neven
2019/260 ( PDF )
A Modular Treatment of Blind Signatures from Identification Schemes
Eduard Hauck and Eike Kiltz and Julian Loss
2019/259 ( PDF )
A Practical Method to Recover Exact Superpoly in Cube Attack
SenPeng Wang and Bin Hu and Jie Guan and Kai Zhang and TaiRong Shi
2019/258 ( PDF )
Tight Time-Memory Trade-offs for Symmetric Encryption
Joseph Jaeger and Stefano Tessaro
2019/257 ( PDF )
Uncloneable Quantum Encryption via Random Oracles
Anne Broadbent and Sébastien Lord
2019/256 ( PDF )
DLCT: A New Tool for Differential-Linear Cryptanalysis
Achiya Bar-On and Orr Dunkelman and Nathan Keller and Ariel Weizman
2019/255 ( PDF )
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2019/254 ( PDF )
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries
Divesh Aggarwal and Kai-Min Chung and Han-Hsuan Lin and Thomas Vidick
2019/253 ( PDF )
Founding Secure Computation on Blockchains
Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain
2019/252 ( PDF )
Reversible Proofs of Sequential Work
Hamza Abusalah and Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter
2019/251 ( PDF )
Consensus through Herding
T-H. Hubert Chan and Rafael Pass and Elaine Shi
2019/250 ( PDF )
Function-Dependent Commitments from Homomorphic Authenticators
Lucas Schabhüser and Denis Butin and Johannes Buchmann
2019/249 ( PDF )
Revisiting Variable Output Length XOR Pseudorandom Function
Srimanta Bhattacharya and Mridul Nandi
2019/248 ( PDF )
Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach
Ting Li and Yao Sun
2019/247 ( PDF )
Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
Andrea Coladangelo and Alex B. Grilo and Stacey Jeffery and Thomas Vidick
2019/246 ( PDF )
Towards optimal robust secret sharing with security against a rushing adversary
Serge Fehr and Chen Yuan
2019/245 ( PDF )
Distributed Differential Privacy via Shuffling
Albert Cheu and Adam Smith and Jonathan Ullman and David Zeber and Maxim Zhilyaev
2019/244 ( PDF )
Attacks Only Get Better: How to Break FF3 on Large Domains
Viet Tung Hoang and David Miller and Ni Trieu
2019/243 ( PDF )
Tight Quantum Security Bound of the 4-Round Luby-Rackoff Construction
Akinori Hosoyamada and Tetsu Iwata
2019/242 ( PDF )
New Constructions of Reusable Designated-Verifier NIZKs
Alex Lombardi and Willy Quach and Ron D. Rothblum and Daniel Wichs and David J. Wu
2019/241 ( PDF )
Efficient Circuit-based PSI with Linear Communication
Benny Pinkas and Thomas Schneider and Oleksandr Tkachenko and Avishay Yanai
2019/240 ( PDF )
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes
Vipul Goyal and Yifan Song
2019/239 ( PDF )
Cheaper Private Set Intersection via Differentially Private Leakage
Adam Groce and Peter Rindal and Mike Rosulek
2019/238 ( PDF )
Robust Encryption, Extended
Rémi Géraud and David Naccache and Răzvan Roşie
2019/237 ( PDF )
Optimal Oblivious Priority Queues and Offline Oblivious RAM
Zahra Jafargholi and Kasper Green Larsen and Mark Simkin
2019/236 ( PDF )
Designated-verifier pseudorandom generators, and their applications
Geoffroy Couteau and Dennis Hofheinz
2019/235 ( PDF )
Reusable Designated-Verifier NIZKs for all NP from CDH
Willy Quach and Ron D. Rothblum and Daniel Wichs
2019/234 ( PDF )
On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm
Léo Ducas and Maxime Plançon and Benjamin Wesolowski
2019/233 ( PDF )
Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption
Nuttapong Attrapadung
2019/232 ( PDF )
On Quantum Advantage in Information Theoretic Single-Server PIR
Dorit Aharonov and Zvika Brakerski and Kai-Min Chung and Ayal Green and Ching-Yi Lai and Or Sattath
2019/231 ( PDF )
Secret-Sharing Schemes for General and Uniform Access Structures
Benny Applebaum and Amos Beimel and Oriol Farràs and Oded Nir and Naty Peter
2019/230 ( PDF )
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
Christos Andrikos and Lejla Batina and Lukasz Chmielewski and Liran Lerman and Vasilios Mavroudis and Kostas Papagiannopoulos and Guilherme Perin and Giorgos Rassias and Alberto Sonnino
2019/229 ( PDF )
XOR-counts and lightweight multiplication with fixed elements in binary finite fields
Lukas Kölsch
2019/228 ( PDF )
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
Nimrod Aviram and Kai Gellert and Tibor Jager
2019/227 ( PDF )
Securing Update Propagation with Homomorphic Hashing
Kevin Lewi and Wonho Kim and Ilya Maykov and Stephen Weis
2019/226 ( PDF )
Flyclient: Super-Light Clients for Cryptocurrencies
Benedikt Bünz and Lucianna Kiffer and Loi Luu and Mahdi Zamani
2019/225 ( PDF )
Leakage Resilience of the Duplex Construction
Christoph Dobraunig and Bart Mennink
2019/224 ( PDF )
Compact Adaptively Secure ABE for NC1 from k-Lin
Lucas Kowalczyk and Hoeteck Wee
2019/223 ( PDF )
Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies
Marcelo Blatt and Alexander Gusev and Yuriy Polyakov and Kurt Rohloff and Vinod Vaikuntanathan
2019/222 ( PDF )
(R)CCA Secure Updatable Encryption with Integrity Protection
Michael Klooß and Anja Lehmann and Andy Rupp
2019/221 ( PDF )
Group Signatures without NIZK: From Lattices in the Standard Model
Shuichi Katsumata and Shota Yamada
2019/220 ( PDF )
Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing
Ivan Damgård and Kasper Green Larsen and Jesper Buus Nielsen
2019/219 ( PDF )
Nitro Protocol
Tom Close
2019/218 ( PDF )
Computational Limitations in Robust Classification and Win-Win Results
Akshay Degwekar and Vinod Vaikuntanathan
2019/217 ( PDF )
A family of boolean functions with good cryptographic properties
Guillermo Sosa Gómez and Octavio Paez Osuna
2019/216 ( PDF )
On Round Optimal Secure Multiparty Computation from Minimal Assumptions
Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain
2019/215 ( PDF )
Approx-SVP in Ideal Lattices with Pre-processing
Alice Pellet-Mary and Guillaume Hanrot and Damien Stehlé
2019/214 ( PDF )
Four-Round Secure Multiparty Computation from General Assumptions
Michele Ciampi and Rafail Ostrovsky
2019/213 ( PDF )
On ELFs, Deterministic Encryption, and Correlated-Input Security
Mark Zhandry
2019/212 ( PDF )
A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes
Hossein Oraei and Massoud Hadian Dehkordi
2019/211 ( PDF )
Mon$\mathbb{Z}_{2^k}$a: Fast Maliciously Secure Two Party Computation on $\mathbb{Z}_{2^k}$
Dario Catalano and Mario Di Raimondo and Dario Fiore and Irene Giacomelli
2019/210 ( PDF )
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Christof Beierle and Gregor Leander and Amir Moradi and Shahram Rasoolzadeh
2019/209 ( PDF )
SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes
Zhenzhen Bao and Jian Guo and San Ling and Yu Sasaki
2019/208 ( PDF )
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA
Muzhou Li and Kai Hu and Meiqin Wang
2019/207 ( PDF )
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security
Dragos Rotaru and Tim Wood
2019/206 ( PDF )
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
James Howe and Ayesha Khalid and Marco Martinoli and Francesco Regazzoni and Elisabeth Oswald
2019/205 ( PDF )
A note on isogeny-based hybrid verifiable delay functions
Barak Shani
2019/204 ( PDF )
The Security of All Private-key Bits in Isogeny-based Schemes
Barak Shani
2019/203 ( PDF )
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
Osman Bicer and Alptekin Kupcu
2019/202 ( PDF )
The Distinction Between Fixed and Random Generators in Group-Based Assumptions
James Bartusek and Fermi Ma and Mark Zhandry
2019/201 ( PDF )
DL-Extractable UC-Commitment Schemes
Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michał Zając
2019/200 ( PDF )
Degree 2 is Complete for the Round-Complexity of Malicious MPC
Benny Applebaum and Zvika Brakerski and Rotem Tsabary
2019/199 ( PDF )
Password-Authenticated Public-Key Encryption
Tatiana Bradley and Jan Camenisch and Stanislaw Jarecki and Anja Lehmann and Gregory Neven and Jiayu Xu
2019/198 ( PDF )
Seedless Fruit is the Sweetest: Random Number Generation, Revisited
Sandro Coretti and Yevgeniy Dodis and Harish Karthikeyan and Stefano Tessaro
2019/197 ( PDF )
Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions
Esteban Landerreche and Marc Stevens and Christian Schaffner
2019/196 ( PDF )
Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions
Michael Backes and Nico Döttling and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider
2019/195 ( PDF )
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
Jung Hee Cheon and Wonhee Cho and Minki Hhan and Minsik Kang and Jiseung Kim and Changmin Lee
2019/194 ( PDF )
Classical zero-knowledge arguments for quantum computations
Thomas Vidick and Tina Zhang
2019/193 ( PDF )
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge
Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2019/192 ( PDF )
An Omission-Tolerant Cryptographic Checksum
Francisco Corella and Karen Lewison
2019/191 ( PDF )
Zether: Towards Privacy in a Smart Contract World
Benedikt Bünz and Shashank Agrawal and Mahdi Zamani and Dan Boneh
2019/190 ( PDF )
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model
Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner
2019/189 ( PDF )
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis
Yaoling Ding and An Wang and Siu Ming YIU
2019/188 ( PDF )
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs
Dan Boneh and Elette Boyle and Henry Corrigan-Gibbs and Niv Gilboa and Yuval Ishai
2019/187 ( PDF )
Fully homomorphic encryption modulo Fermat numbers
Antoine Joux
2019/186 ( PDF )
Re-thinking untraceability in the CryptoNote-style blockchain
Jiangshan Yu and Man Ho Allen Au and Paulo Esteves-Verissimo
2019/185 ( PDF )
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Ralph Ankele and Christoph Dobraunig and Jian Guo and Eran Lambooij and Gregor Leander and Yosuke Todo
2019/184 ( PDF )
Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon
William Diehl and Farnoud Farahmand and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj
2019/183 ( PDF )
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
Katherine E. Stange
2019/182 ( PDF )
Security is an Architectural Design Constraint
Prasanna Ravi and Sourav Sen Gupta and Anupam Chattopadhyay and Mustafa Khairallah and Zakaria Najm and Shivam Bhasin
2019/181 ( PDF )
Lower Bounds for Leakage-Resilient Secret Sharing
Jesper Buus Nielsen and Mark Simkin
2019/180 ( PDF )
Disco: Modern Session Encryption
David Wong
2019/179 ( PDF )
Synchronous, with a Chance of Partition Tolerance
Yue Guo and Rafael Pass and Elaine Shi
2019/178 ( PDF )
LucidiTEE: Policy-based Fair Computing at Scale
Rohit Sinha and Sivanarayana Gaddam and Ranjit Kumaresan
2019/177 ( PDF )
Genus Two Isogeny Cryptography
E.V. Flynn and Yan Bo Ti
2019/176 ( PDF )
Homomorphic Encryption for Finite Automata
Nicholas Genise and Craig Gentry and Shai Halevi and Baiyu Li and Daniele Micciancio
2019/175 ( PDF )
The Communication Complexity of Threshold Private Set Intersection
Satrajit Ghosh and Mark Simkin
2019/174 ( PDF )
Exponential Lower Bounds for Secret Sharing
Kasper Green Larsen and Mark Simkin
2019/173 ( PDF )
Shorter Quadratic QA-NIZK Proofs
Vanesa Daza and Alonso González and Zaira Pindado and Carla Ràfols and Javier Silva
2019/172 ( PDF )
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS
Danping Shi and Siwei Sun and Yu Sasaki and Chaoyun Li and Lei Hu
2019/171 ( PDF )
XONN: XNOR-based Oblivious Deep Neural Network Inference
M. Sadegh Riazi and Mohammad Samragh and Hao Chen and Kim Laine and Kristin Lauter and Farinaz Koushanfar
2019/170 ( PDF )
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes
Lingyue Qin and Xiaoyang Dong and Keting Jia and Rui Zong
2019/169 ( PDF )
Updatable Anonymous Credentials and Applications to Incentive Systems
Johannes Blömer and Jan Bobolz and Denis Diemert and Fabian Eidens
2019/168 ( PDF )
Profiling Side-channel Analysis in the Restricted Attacker Framework
Stjepan Picek and Annelie Heuser and Sylvain Guilley
2019/167 ( PDF )
Analysis of Secure Caches and Timing-Based Side-Channel Attacks
Shuwen Deng and Wenjie Xiong and Jakub Szefer
2019/166 ( PDF )
Verifiable Delay Functions from Supersingular Isogenies and Pairings
Luca De Feo and Simon Masson and Christophe Petit and Antonio Sanso
2019/165 ( PDF )
libInterMAC: Beyond Confidentiality and Integrity in Practice
Martin R. Albrecht and Torben Brandt Hansen and Kenneth G. Paterson
2019/164 ( PDF )
Use your Brain! Arithmetic 3PC For Any Modulus with Active Security
Hendrik Eerikson and Claudio Orlandi and Pille Pullonen and Joonas Puura and Mark Simkin
2019/163 ( PDF )
Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder
Melissa Azouaoui and Romain Poussier and François-Xavier Standaert
2019/162 ( PDF )
Multi-Stage Proof-of-Work Blockchain
Palash Sarkar
2019/161 ( PDF )
Understanding Optimizations and Measuring Performances of PBKDF2
Andrea Francesco Iuorio and Andrea Visconti
2019/160 ( PDF )
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data
Sujoy Sinha Roy and Furkan Turan and Kimmo Jarvinen and Frederik Vercauteren and Ingrid Verbauwhede
2019/159 ( PDF )
Robust MPC: Asynchronous Responsiveness yet Synchronous Security
Chen-Da Liu-Zhang and Julian Loss and Ueli Maurer and Tal Moran and Daniel Tschudi
2019/158 ( PDF )
Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors
Chris Peikert and Sina Shiehian
2019/157 ( PDF )
Schnorr-based implicit certification: improving the security and efficiency of V2X communications
Paulo S. L. M. Barreto and Marcos A. Simplicio Jr. and Jefferson E. Ricardini and Harsh Kupwade Patil
2019/156 ( PDF )
Efficient Constructions for Almost-everywhere Secure Computation
Siddhartha Jayanti and Srinivasan Raghuraman and Nikhil Vyas
2019/155 ( PDF )
Constant-time BCH Error-Correcting Code
Matthew Walters and Sujoy Sinha Roy
2019/154 ( PDF )
FastKitten: Practical Smart Contracts on Bitcoin
Poulami Das and Lisa Eckey and Tommaso Frassetto and David Gens and Kristina Hostáková and Patrick Jauernig and Sebastian Faust and Ahmad-Reza Sadeghi
2019/153 ( PDF )
Overdrive2k: Efficient Secure MPC over $Z_{2^k}$ from Somewhat Homomorphic Encryption
Emmanuela Orsini and Nigel P. Smart and Frederik Vercauteren
2019/152 ( PDF )
Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption
Duhyeong Kim and Yongha Son and Dongwoo Kim and Andrey Kim and Seungwan Hong and Jung Hee Cheon
2019/151 ( PDF )
Solving binary MQ with Grover's algorithm
Peter Schwabe and Bas Westerbaan
2019/150 ( PDF )
QcBits: Constant-Time Small-Key Code-Based Cryptography
Tung Chou
2019/149 ( PDF )
Improved Lattice-based CCA2-Secure PKE in the Standard Model
Jiang Zhang and Yu Yu and Shuqin Fan and Zhenfeng Zhang
2019/148 ( PDF )
On the efficiency of pairing-based proofs under the d-PKE
Ariel Gabizon
2019/147 ( PDF )
Practical Collision Attacks against Round-Reduced SHA-3
Jian Guo and Guohong Liao and Guozhen Liu and Meicheng Liu and Kexin Qiao and Ling Song
2019/146 ( PDF )
Boomerang Connectivity Table Revisited
Ling Song and Xianrui Qin and Lei Hu
2019/145 ( PDF )
Achieving GWAS with Homomorphic Encryption
Jun Jie Sim and Fook Mun Chan and Shibin Chen and Benjamin Hong Meng Tan and Khin Mi Mi Aung
2019/144 ( PDF )
Modeling Power Efficiency of S-boxes Using Machine Learning
Rajat Sadhukhan and Nilanjan Datta and Debdeep Mukhopadhyay
2019/143 ( PDF )
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
Benjamin Hettwer and Stefan Gehrer and Tim Güneysu
2019/142 ( PDF )
LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs
Matteo Campanelli and Dario Fiore and Anaïs Querol
2019/141 ( PDF )
A General Proof Framework for Recent AES Distinguishers
Christina Boura and Anne Canteaut and Daniel Coggia
2019/140 ( PDF )
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning
Jinhyun So and Basak Guler and A. Salman Avestimehr and Payman Mohassel
2019/139 ( PDF )
Vulnerability and Remedy of Stripped Function Logic Locking
Hai Zhou and Yuanqi Shen and Amin Rezaei
2019/138 ( PDF )
Unifying Leakage Models on a Rényi Day
Dahmun Goudarzi and Ange Martinelli and Alain Passelègue and Thomas Prest
2019/137 ( PDF )
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications
Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2019/136 ( PDF )
Divisible E-Cash from Constrained Pseudo-Random Functions
Florian Bourse and Olivier Sanders
2019/135 ( PDF )
It wasn't me! Repudiability and Unclaimability of Ring Signatures
Sunoo Park and Adam Sealfon
2019/134 ( PDF )
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/133 ( PDF )
On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography.
Vasyl Ustimenko
2019/132 ( PDF )
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
Olivier Bronchain and Julien M. Hendrickx and Clément Massart and Alex Olshevsky and François-Xavier Standaert
2019/131 ( PDF )
Secure Evaluation of Quantized Neural Networks
Assi Barak and Daniel Escudero and Anders Dalskov and Marcel Keller
2019/130 ( PDF )
Are Certificate Thumbprints Unique?
Greg Zaverucha and Dan Shumow
2019/129 ( PDF )
Homomorphic Secret Sharing from Lattices Without FHE
Elette Boyle and Lisa Kohl and Peter Scholl
2019/128 ( PDF )
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions
Junichi Tomida
2019/127 ( PDF )
Beyond Birthday Bound Secure MAC in Faulty Nonce Model
Avijit Dutta and Mridul Nandi and Suprita Talnikar
2019/126 ( PDF )
New Automatic search method for Truncated-differential characteristics: Application to Midori and SKINNY
AmirHossein E. Moghaddam and Zahra Ahmadian
2019/125 ( PDF )
Combinatorial Primality Test
Maheswara Rao Valluri
2019/124 ( PDF )
Anomalous Look at Provable Security
Douglas Wikström
2019/123 ( PDF )
Security of Multilinear Galois Mode (MGM)
Liliya Akhmetzyanova and Evgeny Alekseev and Grigory Karpunin and Vladislav Nozdrunov
2019/122 ( PDF )
Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes
Santosh Ghosh and Rafael Misoczki and Manoj R. Sastry
2019/121 ( PDF )
Anonymous Attestation for IoT
Santosh Ghosh and Andrew H. Reinders and Rafael Misoczki and Manoj R. Sastry
2019/120 ( PDF )
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019
Keita Xagawa
2019/119 ( PDF )
On the security of the BCTV Pinocchio zk-SNARK variant
Ariel Gabizon
2019/118 ( PDF )
Defeating the Hart, Kim, Micheli, Pascuel-Perez, Petit, Quek Attack on WalnutDSA(TM)
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2019/117 ( PDF )
Non-Interactive Keyed-Verification Anonymous Credentials
Geoffroy Couteau and Michael Reichle
2019/116 ( PDF )
Multi-Key Homomophic Encryption from TFHE
Hao Chen and Ilaria Chillotti and Yongsoo Song
2019/115 ( PDF )
Distributional Collision Resistance Beyond One-Way Functions
Nir Bitansky and Iftach Haitner and Ilan Komargodski and Eylon Yogev
2019/114 ( PDF )
Fast Multiparty Threshold ECDSA with Fast Trustless Setup
Rosario Gennaro and Steven Goldfeder
2019/113 ( PDF )
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure
Ferucio Laurentiu Tiplea and Cristian Hristea
2019/112 ( PDF )
Variable Elimination - a Tool for Algebraic Cryptanalysis
Bjørn Greve and Øyvind Ytrehus and Håvard Raddum
2019/111 ( PDF )
On the Complexity of non-recursive $n$-term Karatsuba Multiplier for Trinomials
Yin Li and Yu Zhang and Xingpo Ma and Chuanda Qi
2019/110 ( PDF )
Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves
Suhri Kim and Kisoon Yoon and Young-Ho Park and Seokhie Hong
2019/109 ( PDF )
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture
Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2019/108 ( PDF )
Minicrypt Primitives with Algebraic Structure and Applications
Navid Alamati and Hart Montgomery and Sikhar Patranabis and Arnab Roy
2019/107 ( PDF )
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit
Shun Li and Siwei Sun and Chaoyun Li and Zihao Wei and Lei Hu
2019/106 ( PDF )
Identity-Based Higncryption
Hongbing Wang and Yunlei Zhao
2019/105 ( PDF )
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
Antonio Faonio and Daniele Venturi
2019/104 ( PDF )
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation
Naomi Farley and Robert Fitzpatrick and Duncan Jones
2019/103 ( PDF )
Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE
Samuel Jaques and John M. Schanck
2019/102 ( PDF )
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum
Hisham S. Galal and Amr M. Youssef
2019/101 ( PDF )
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption
Sergiu Carpov and Nicolas Gama and Mariya Georgieva and Juan Ramon Troncoso-Pastoriza
2019/100 ( PDF )
Correlation Power Analysis on NTRU Prime and Related Countermeasures
Wei-Lun Huang and Jiun-Peng Chen and Bo-Yin Yang
2019/099 ( PDF )
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings
Mary Maller and Sean Bowe and Markulf Kohlweiss and Sarah Meiklejohn
2019/098 ( PDF )
A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions
Pedro Branco
2019/097 ( PDF )
Linearly equivalent S-boxes and the Division Property
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin
2019/096 ( PDF )
On Recovering Affine Encodings in White-Box Implementations
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin and Brice Minaud
2019/095 ( PDF )
Variants of the AES Key Schedule for Better Truncated Differential Bounds
Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean and Baptiste Lambin
2019/094 ( PDF )
CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges
Aron Gohr and Sven Jacob and Werner Schindler
2019/093 ( PDF )
Key Encapsulation Mechanism From Modular Multivariate Linear Equations
Muhammad Rezal Kamel Ariffin and Abderrahmane Nitaj and Yanbin Pan and Nur Azman Abu
2019/092 ( PDF )
Partitions in the S-Box of Streebog and Kuznyechik
Léo Perrin
2019/091 ( PDF )
Efficient Zero-Knowledge for NP from Secure Two-Party Computation
Li Hongda and Pan Dongxue and Ni Peifang
2019/090 ( PDF )
Round5: Compact and Fast Post-Quantum Public-Key Encryption
Hayo Baan and Sauvik Bhattacharya and Scott Fluhrer and Oscar Garcia-Morchon and Thijs Laarhoven and Ronald Rietman and Markku-Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang
2019/089 ( PDF )
The General Sieve Kernel and New Records in Lattice Reduction
Martin R. Albrecht and Léo Ducas and Gottfried Herold and Elena Kirshanova and Eamonn W. Postlethwaite and Marc Stevens
2019/088 ( PDF )
Continuous Key Agreement with Reduced Bandwidth
Nir Drucker and Shay Gueron
2019/087 ( PDF )
The Secure Link Prediction Problem
Laltu Sardar and Sushmita Ruj
2019/086 ( PDF )
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG
George Teseleanu
2019/085 ( PDF )
The Lattice-Based Digital Signature Scheme qTESLA
Erdem Alkim and Paulo S. L. M. Barreto and Nina Bindel and Patrick Longa and Jefferson E. Ricardini
2019/084 ( PDF )
An Information Obfuscation Calculus for Encrypted Computing
Peter T. Breuer
2019/083 ( PDF )
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15
Zhen Liu and Yanbin Pan and Zhenfei Zhang
2019/082 ( PDF )
Arithmetic Garbling from Bilinear Maps
Nils Fleischhacker and Giulio Malavolta and Dominique Schröder
2019/081 ( PDF )
Practical Group-Signatures with Privacy-Friendly Openings
Stephan Krenn and Kai Samelin and Christoph Striecks
2019/080 ( PDF )
Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing
Aner Ben Efraim and Eran Omri
2019/079 ( PDF )
New Results about the Boomerang Uniformity of Permutation Polynomials
Kangquan Li and Longjiang Qu and Bing Sun and Chao Li
2019/078 ( PDF )
Testing the Randomness of Cryptographic Function Mappings
Alan Kaminsky
2019/077 ( PDF )
Pairing Implementation Revisited
Michael Scott
2019/076 ( PDF )
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations
Matthieu Rivain and Junwei Wang
2019/075 ( PDF )
Assessment of the Key-Reuse Resilience of NewHope
Aurélie Bauer and Henri Gilbert and Guénaël Renault and Mélissa Rossi
2019/074 ( PDF )
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
Chun Guo and Jonathan Katz and Xiao Wang and Yu Yu
2019/073 ( PDF )
Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model
Cristian Hristea and Ferucio Laurentiu Tiplea
2019/072 ( PDF )
ZeroCT: Improving ZeroCoin with Confidential Transactions and more
Alex Vazquez
2019/071 ( PDF )
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks
Zhilin Zhang and Ke Wang and Weipeng Lin and Ada Wai-Chee Fu and Raymond Chi-Wing Wong
2019/070 ( PDF )
Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool
Sam M. Werner and Paul J. Pritz and Alexei Zamyatin and William J. Knottenbelt
2019/069 ( PDF )
Quantum Indistinguishability of Random Sponges
Jan Czajkowski and Andreas Hülsing and Christian Schaffner
2019/068 ( PDF )
Sampling the Integers with Low Relative Error
Michael Walter
2019/067 ( PDF )
Managing Your Kleptographic Subscription Plan
George Teseleanu
2019/066 ( PDF )
Publicly Verifiable Proofs from Blockchains
Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2019/065 ( PDF )
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols
Jan Camenisch and Manu Drijvers and Björn Tackmann
2019/064 ( PDF )
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management
Keita Emura and Takuya Hayashi
2019/063 ( PDF )
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup
Michael Backes and Lucjan Hanzlik and Amir Herzberg and Aniket Kate and Ivan Pryvalov
2019/062 ( PDF )
Additively Homomorphic IBE from Higher Residuosity
Michael Clear and Ciaran McGoldrick
2019/061 ( PDF )
SigAttack: New High-level SAT-based Attack on Logic Encryptions
Yuanqi Shen and You Li and Shuyu Kong and Amin Rezaei and Hai Zhou
2019/060 ( PDF )
CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States
Amin Rezaei and You Li and Yuanqi Shen and Shuyu Kong and Hai Zhou
2019/059 ( PDF )
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption
Yuanqi Shen and You Li and Amin Rezaei and Shuyu Kong and David Dlott and Hai Zhou
2019/058 ( PDF )
Tightly secure hierarchical identity-based encryption
Roman Langrehr and Jiaxin Pan
2019/057 ( PDF )
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts
Rafael del Pino and Vadim Lyubashevsky and Gregor Seiler
2019/056 ( PDF )
Obfuscating simple functionalities from knowledge assumptions
Ward Beullens and Hoeteck Wee
2019/055 ( PDF )
Rate-Optimizing Compilers for Continuously Non-Malleable Codes
Sandro Coretti and Antonio Faonio and Daniele Venturi
2019/054 ( PDF )
Deep Learning to Evaluate Secure RSA Implementations
Mathieu Carbone and Vincent Conin and Marie-Angela Cornelie and Francois Dassance and Guillaume Dufresne and Cecile Dumas and Emmanuel Prouff and Alexandre Venelli
2019/053 ( -- withdrawn -- )
A New Code-based Signature Scheme with Shorter Public Key
Yongcheng Song and Xinyi Huang and Yi Mu and Wei Wu
2019/052 ( PDF )
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/051 ( PDF )
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy
Daode Zhang and Jie Li and Bao Li and Xianhui Lu and Haiyang Xue and Dingding Jia and Yamin Liu
2019/050 ( PDF )
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions
Takahiro Matsuda and Kenta Takahashi and Takao Murakami and Goichiro Hanaoka
2019/049 ( PDF )
The Relationship between the Construction and Solution of the MILP Models and Applications
Lingchen Li and Wenling Wu and Yafei Zheng and Lei Zhang
2019/048 ( PDF )
Sub-logarithmic Distributed Oblivious RAM with Small Block Size
Eyal Kushilevitz and Tamer Mour
2019/047 ( PDF )
NIST Post-Quantum Cryptography- A Hardware Evaluation Study
Kanad Basu and Deepraj Soni and Mohammed Nabeel and Ramesh Karri
2019/046 ( PDF )
Block-Anti-Circulant Unbalanced Oil and Vinegar
Alan Szepieniec and Bart Preneel
2019/045 ( PDF )
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio
Ryo Nishimaki and Takashi Yamakawa
2019/044 ( PDF )
Toha Key Hardened Function
Ahmad Almorabea
2019/043 ( PDF )
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
Qian Guo and Thomas Johansson and Alexander Nilsson
2019/042 ( PDF )
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs
Lisa Kohl
2019/041 ( PDF )
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
Bartosz Zoltak
2019/040 ( PDF )
NTTRU: Truly Fast NTRU Using NTT
Vadim Lyubashevsky and Gregor Seiler
2019/039 ( PDF )
Fully Invisible Protean Signatures Schemes
Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2019/038 ( PDF )
Identity-based Broadcast Encryption with Efficient Revocation
Aijun Ge and Puwen Wei
2019/037 ( PDF )
Improving Attacks on Speck32/64 using Deep Learning
Aron Gohr
2019/036 ( PDF )
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR
Shuichi Katsumata and Shota Yamada
2019/035 ( PDF )
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ
Carsten Baum and Daniele Cozzo and Nigel P. Smart
2019/034 ( PDF )
A Formal Treatment of Hardware Wallets
Myrto Arapinis and Andriana Gkaniatsou and Dimitris Karakostas and Aggelos Kiayias
2019/033 ( PDF )
FE for Inner Products and Its Application to Decentralized ABE
Zhedong Wang and Xiong Fan and Feng-Hao Liu
2019/032 ( PDF )
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation
Steven Galbraith and Jake Massimo and Kenneth G. Paterson
2019/031 ( PDF )
Collusion Resistant Broadcast and Trace from Positional Witness Encryption
Rishab Goyal and Satyanarayana Vusirikala and Brent Waters
2019/030 ( -- withdrawn -- )
Analysis of Two Countermeasures against the Signal Leakage Attack
Ke Wang and Zhenfeng Zhang
2019/029 ( -- withdrawn -- )
Upper Bound on $\lambda_1(\Lambda^{\bot}(\mathbf A))$
Huiwen Jia and Chunming Tang and Yanhua Zhang
2019/028 ( PDF )
nQUIC: Noise-Based QUIC Packet Protection
Mathias Hall-Andersen and David Wong and Nick Sullivan and Alishah Chator
2019/027 ( PDF )
Group Signatures with Selective Linkability
Lydia Garms and Anja Lehmann
2019/026 ( PDF )
Non-malleable encryption with proofs of plaintext knowledge and applications to voting
Ben Smyth and Yoshikazu Hanatani
2019/025 ( PDF )
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers
Yu Liu and Huicong Liang and Muzhou Li and Luning Huang and Kai Hu and Chenhe Yang and Meiqin Wang
2019/024 ( PDF )
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography
Yalin Chen and Jue-Sam Chou and Fang-Qi Zhou
2019/023 ( PDF )
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
Joachim Breitner and Nadia Heninger
2019/022 ( PDF )
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Anthony Demeri and Thomas Conroy and Alex Nolan and William Diehl
2019/021 ( PDF )
CryptoNote+
Ilya Aldanov
2019/020 ( PDF )
Decentralizing Inner-Product Functional Encryption
Michel Abdalla and Fabrice Benhamouda and Markulf Kolhweiss and Hendrik Waldner
2019/019 ( PDF )
Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach
Chunning Zhou and Wentao Zhang and Tianyou Ding and Zejun Xiang
2019/018 ( PDF )
Generic Constructions of Robustly Reusable Fuzzy Extractor
Yunhua Wen and Shengli Liu and Dawu Gu
2019/017 ( PDF )
CHURP: Dynamic-Committee Proactive Secret Sharing
Sai Krishna Deepak Maram and Fan Zhang and Lun Wang and Andrew Low and Yupeng Zhang and Ari Juels and Dawn Song
2019/016 ( PDF )
Fast Message Franking: From Invisible Salamanders to Encryptment
Yevgeniy Dodis and Paul Grubbs and Thomas Ristenpart and Joanne Woodage
2019/015 ( PDF )
More Efficient Algorithms for the NTRU Key Generation using the Field Norm
Thomas Pornin and Thomas Prest
2019/014 ( PDF )
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks
Gaurav Panwar and Satyajayant Misra and Roopa Vishwanathan
2019/013 ( PDF )
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces
Changhai Ou and Siew-Kei Lam
2019/012 ( PDF )
A Proof of the Beierle-Kranz-Leander’s Conjecture related to Lightweight Multiplication in $F_{2^n}$
Sihem Mesnager and Kwang Ho Kim and Dujin Jo and Junyop Choe and Munhyon Han and Dok Nam Lee
2019/011 ( PDF )
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Paul Grubbs and Marie-Sarah Lacharité and Brice Minaud and Kenneth G. Paterson
2019/010 ( PDF )
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC
Rodrigo Abarzúa and Claudio Valencia and Julio López
2019/009 ( PDF )
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
Qian Guo and Thomas Johansson and Erik Mårtensson and Paul Stankovski Wagner
2019/008 ( PDF )
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
Jingyu Pan and Shivam Bhasin and Fan Zhang and Kui Ren
2019/007 ( PDF )
Tight Security Bounds for Generic Stream Cipher Constructions
Matthias Hamann and Matthias Krause
2019/006 ( PDF )
Minimizing Trust in Hardware Wallets with Two Factor Signatures
Antonio Marcedone and Rafael Pass and abhi shelat
2019/005 ( PDF )
ScanSAT: Unlocking Obfuscated Scan Chains
Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, and Ozgur Sinanoglu
2019/004 ( PDF )
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
Guillaume Dabosville and Houssem Maghrebi and Alexis Lhuillery and Julien Bringer and Thanh-Ha Le
2019/003 ( PDF )
Secure and Effective Logic Locking for Machine Learning Applications
Yuntao Liu and Yang Xie and Abhishek Charkraborty and Ankur Srivastava
2019/002 ( PDF )
Leakage-Resilient Group Signature: Definitions and Constructions
Jianye Huang and Qiong Huang
2019/001 ( PDF )
Sanctorum: A lightweight security monitor for secure enclaves
Ilia Lebedev and Kyle Hogan and Jules Drean and David Kohlbrenner and Dayeol Lee and Krste Asanović and Dawn Song and Srinivas Devadas


[ Cryptology ePrint archive ]