Cryptology ePrint Archive: Listing for 2019

2019/1499 ( PDF )
Authenticated Key Distribution: When the Coupon Collector is Your Enemy
Marc Beunardeau and Fatima-Ezzahra El Orche and Diana Maimut and David Naccache and Peter B. Roenne and Peter Y.A. Ryan
2019/1498 ( PDF )
Supersingular Isogeny-Based Designated Verifier Blind Signature
Rajeev Anand Sahu and Agnese Gini and Ankan Pal
2019/1497 ( PDF )
Analysis of Modified Shell Sort for Fully Homomorphic Encryption
Joon-Woo Lee and Young-Sik Kim and Jong-Seon No
2019/1496 ( PDF )
Improved on Identity-based quantum signature based on Bell states
Chang-Bin Wang and Shu-Mei Hsu and Hsiang Chang and Jue-Sam Chou
2019/1495 ( PDF )
Tight Security of Cascaded LRW2
Ashwin Jha and Mridul Nandi
2019/1494 ( PDF )
Scaling Verifiable Computation Using Efficient Set Accumulators
Alex Ozdemir and Riad S. Wahby and Barry Whitehat and Dan Boneh
2019/1493 ( PDF )
Solving $X^{q+1}+X+a=0$ over Finite Fields
Kwang Ho Kim and Junyop Choe and Sihem Mesnager
2019/1492 ( PDF )
Too Much Crypto
Jean-Philippe Aumasson
2019/1491 ( PDF )
Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9
Yuyin Yu and Nikolay Kaleyski and Lilya Budaghyan and Yongqiang Li
2019/1490 ( PDF )
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme
Jintai Ding and Joshua Deaton and Kurt Schmidt and Vishakha and Zheng Zhang
2019/1489 ( PDF )
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement
Joël Alwen and Margarita Capretto and Miguel Cueto and Chethan Kamath and Karen Klein and Ilia Markov and Guillermo Pascual-Perez and Krzysztof Pietrzak and Michael Walter and Michelle Yeo
2019/1488 ( PDF )
Fine-Grained Cryptography Revisited
Shohei Egashira and Yuyu Wang and Keisuke Tanaka
2019/1487 ( PDF )
SNR-Centric Power Trace Extractors for Side-Channel Attacks
Changhai Ou and Degang Sun and Siew-Kei Lam and Xinping Zhou and Kexin Qiao and Qu Wang
2019/1486 ( PDF )
RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations
Ramiro Martínez and Paz Morillo
2019/1485 ( PDF )
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings
Hiroshi Okano and Keita Emura and Takuya Ishibashi and Toshihiro Ohigashi and Tatsuya Suzuki
2019/1484 ( PDF )
Force-Locking Attack on Sync Hotstuff
Atsuki Momose and Jason Paul Cruz
2019/1483 ( PDF )
Communication--Computation Trade-offs in PIR
Asra Ali and Tancrčde Lepoint and Sarvar Patel and Mariana Raykova and Phillipp Schoppmann and Karn Seth and Kevin Yeo
2019/1482 ( PDF )
Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof
Jiaheng Zhang and Tiancheng Xie and Yupeng Zhang and Dawn Song
2019/1481 ( PDF )
On metric regularity of Reed-Muller codes
Alexey Oblaukhov
2019/1480 ( PDF )
Analogue of Vélu's Formulas for Computing Isogenies over Hessian Model of Elliptic Curves
Fouazou Lontouo Perez Broon and Emmanuel Fouotsa
2019/1479 ( PDF )
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups
Jongkil Kim and Willy Susilo and Fuchun Guo and Joonsang Baek and Nan Li
2019/1478 ( PDF )
Leakage Detection with Kolmogorov-Smirnov Test
Xinping Zhou and Kexin Qiao and Changhai Ou
2019/1477 ( PDF )
Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis
Daan van der Valk and Stjepan Picek and Shivam Bhasin
2019/1476 ( PDF )
On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis
Leo Weissbart
2019/1475 ( PDF )
On the Security of Sponge-type Authenticated Encryption Modes
Bishwajit Chakraborty and Ashwin Jha and Mridul Nandi
2019/1474 ( PDF )
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders
Lichao Wu and Stjepan Picek
2019/1473 ( PDF )
Splitting the Interpose PUF: A Novel Modeling Attack Strategy
Nils Wisiol and Christopher Mühl and Niklas Pirnay and Phuong Ha Nguyen and Marian Margraf and Jean-Pierre Seifert and Marten van Dijk and Ulrich Rührmair
2019/1472 ( PDF )
Efficient Fully Secure Leakage-Deterring Encryption
Jan Camenisch and Maria Dubovitskaya and Patrick Towa
2019/1471 ( PDF )
A Privacy-Enhancing Framework for Internet of Things Services
Lukas Malina and Gautam Srivastava and Petr Dzurenda and Jan Hajny and Sara Ricci
2019/1470 ( PDF )
PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server
Carsten Baum and Tore K. Frederiksen and Julia Hesse and Anja Lehmann and Avishay Yanai
2019/1469 ( PDF )
The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures
Georg Maringer and Tim Fritzmann and Johanna Sepúlveda
2019/1468 ( PDF )
A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption
Jung Hee Cheon and Duhyeong Kim and Taechan Kim and Yongha Son
2019/1467 ( PDF )
Distributed Web Systems Leading to Hardware Oriented Cryptography and Post-Quantum Cryptologic Methodologies
Andrew M. K. Nassief
2019/1466 ( PDF )
A Note on the Instantiability of the Quantum Random Oracle
Edward Eaton and Fang Song
2019/1465 ( PDF )
An optimist's Poisson model of cryptanalysis
Daniel R. L. Brown
2019/1464 ( PDF )
New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions and Interaction
Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni
2019/1463 ( PDF )
Rescuing Logic Encryption in Post-SAT Era by Locking & Obfuscation
Amin Rezaei and Yuanqi Shen and Hai Zhou
2019/1462 ( -- withdrawn -- )
Privacy-preserving greater-than integer comparison without binary decomposition
Sigurd Eskeland
2019/1461 ( PDF )
Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP
Morteza Adeli and Nasour Bagheri
2019/1460 ( PDF )
Byzantine Fault Tolerance in Partially Synchronous Networks
Yongge Wang
2019/1459 ( PDF )
Side Channel Information Set Decoding using Iterative Chunking
Norman Lahr and Ruben Niederhagen and Richard Petri and Simona Samardjiska
2019/1458 ( PDF )
Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery
Moni Naor and Lior Rotem and Gil Segev
2019/1457 ( PDF )
Fast and Secure Updatable Encryption
Colin Boyd and Gareth T. Davies and Kristian Gjřsteen and Yao Jiang
2019/1456 ( PDF )
ModFalcon: compact signatures based on module NTRU lattices
Chitchanok Chuengsatiansup and Thomas Prest and Damien Stehlé and Alexandre Wallet and Keita Xagawa
2019/1455 ( PDF )
Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption with Decryption Key Exposure Resistance
Yanyan Liu and Yiru Sun
2019/1454 ( PDF )
Practical Relativistic Zero-Knowledge for NP
Claude Crépeau and Arnaud Massenet and Louis Salvail and Lucas Stinchcombe and Nan Yang
2019/1453 ( PDF )
Saber on ESP32
Bin Wang and Xiaozhuo Gu and Yingshan Yang
2019/1452 ( PDF )
Leakage-Resilient Lattice-Based Partially Blind Signatures
D. Papachristoudis and D. Hristu-Varsakelis and F. Baldimtsi and G. Stephanides
2019/1451 ( PDF )
Tight bound on NewHope failure probability
Thomas Plantard and Arnaud Sipasseuth and Willy Susilo and Vincent Zucca
2019/1450 ( PDF )
Extractors for Adversarial Sources via Extremal Hypergraphs
Eshan Chattopadhyay and Jesse Goodman and Vipul Goyal and Xin Li
2019/1449 ( PDF )
Formalising Oblivious Transfer in the Semi-Honest and Malicious Model in CryptHOL
David Butler and David Aspinall and Adria Gascon
2019/1448 ( PDF )
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
Johann Heyszl and Katja Miller and Florian Unterstein and Marc Schink and Alexander Wagner and Horst Gieser and Sven Freud and Tobias Damm and Dominik Klein and Dennis Kügler
2019/1447 ( PDF )
Benchmarking Post-Quantum Cryptography in TLS
Christian Paquin and Douglas Stebila and Goutam Tamvada
2019/1446 ( PDF )
Boolean functions for homomorphic-friendly stream ciphers
Claude Carlet and Pierrick Méaux
2019/1445 ( PDF )
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Madura A Shelton and Niels Samwel and Lejla Batina and Francesco Regazzoni and Markus Wagner and Yuval Yarom
2019/1444 ( PDF )
Compact Storage of Superblocks for NIPoPoW Applications
Kostis Karantias and Aggelos Kiayias and Nikos Leonardos and Dionysis Zindros
2019/1443 ( PDF )
CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist
Abhrajit Sengupta and Ozgur Sinanoglu
2019/1442 ( PDF )
Server-Aided Revocable Identity-Based Encryption Revisited
Fei Meng
2019/1441 ( PDF )
A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications
Paolo Santini and Alessandro Barenghi and Gerardo Pelosi and Marco Baldi and Franco Chiaraluce
2019/1440 ( PDF )
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems
Sarah Azouvi and George Danezis and Valeria Nikolaenko
2019/1439 ( PDF )
Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
S. Sharmila Deva Selvi and Irene Miriam Isaac and C. Pandu Rangan
2019/1438 ( PDF )
A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers
Zhengbin Liu and Yongqiang Li and Lin Jiao and Mingsheng Wang
2019/1437 ( PDF )
Reverse Outsourcing: Reduce the Cloud's Workload in Outsourced Attribute-Based Encryption Scheme
Fei Meng and Mingqiang Wang
2019/1436 ( PDF )
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond
Paul Kirchner and Thomas Espitau and Pierre-Alain Fouque
2019/1435 ( PDF )
Confidential Assets on MimbleWimble
Yi Zheng and Howard Ye and Patrick Dai and Tongcheng Sun and Vladislav Gelfer
2019/1434 ( PDF )
About Low DFR for QC-MDPC Decoding
Nicolas Sendrier and Valentin Vasseur
2019/1433 ( PDF )
T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction
Sebastian Lauer and Kai Gellert and Robert Merget and Tobias Handirk and Jörg Schwenk
2019/1432 ( PDF )
A Generic View on the Unified Zero-Knowledge Protocol and its Applications
Diana Maimut and George Teseleanu
2019/1431 ( -- withdrawn -- )
Cross-Chain Communication Using Receipts
Arasu Arun and C. Pandu Rangan
2019/1430 ( PDF )
On the Impossibility of Probabilistic Proofs in Relativized Worlds
Alessandro Chiesa and Siqi Liu
2019/1429 ( -- withdrawn -- )
Secret Sharing Schemes : A Fine Grained Analysis
Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai
2019/1428 ( -- withdrawn -- )
$AC^0$ Constructions for Evolving Secret Sharing Schemes and Redistribution of Secret Shares
Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai
2019/1427 ( PDF )
On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes
Sumanta Sarkar and Kalikinkar Mandal and Dhiman Saha
2019/1426 ( PDF )
On asymptotically optimal tests for random number generators
Boris Ryabko
2019/1425 ( PDF )
HIBEChain: A Hierarchical Identity-based Blockchain System for Large-Scale IoT
Zhiguo Wan and Wei Liu and Hui Cui
2019/1424 ( PDF )
Efficient Side-Channel Secure Message Authentication with Better Bounds
Chun Guo and François-Xavier Standaert and Weijia Wang and Yu Yu
2019/1423 ( PDF )
QC-MDPC decoders with several shades of gray
Nir Drucker and Shay Gueron and Dusan Kostic
2019/1422 ( PDF )
IPDL: A Probabilistic Dataflow Logic for Cryptography
Xiong Fan and Joshua Gancher and Greg Morrisett and Elaine Shi and Kristina Sojakova
2019/1421 ( PDF )
Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations
Nicky Mouha and Christopher Celi
2019/1420 ( PDF )
A Non-Interactive Shuffle Argument With Low Trust Assumptions
Antonis Aggelakis and Prastudy Fauzi and Georgios Korfiatis and Panos Louridas and Foteinos Mergoupis-Anagnou and Janno Siim and Michal Zajac
2019/1419 ( PDF )
Image PUF: A Physical Unclonable Function for Printed Electronics based on Optical Variation of Printed Inks
Ahmet Turan Erozan and Michael Hefenbrock and Michael Beigl and Jasmin Aghassi-Hagmann and Mehdi B. Tahoori
2019/1418 ( PDF )
Designated-ciphertext Searchable Encryption
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo
2019/1417 ( PDF )
CSIDH on Other Form of Elliptic Curves
Xuejun Fan and Song Tian and Bao Li and Xiu Xu
2019/1416 ( PDF )
The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption
Melissa Chase and Trevor Perrin and Greg Zaverucha
2019/1415 ( PDF )
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis
Hossein Arabnezhad-Khanoki and Babak Sadeghiyan
2019/1414 ( -- withdrawn -- )
A New Encryption Scheme Based On Subset Identifying Problem
Muhammad Rezal Kamel Ariffin
2019/1413 ( PDF )
Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions
Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2019/1412 ( PDF )
Cryptanalysis and Improvement of Smart-ID's Clone Detection Mechanism
Augustin P. Sarr
2019/1411 ( PDF )
Isochronous Gaussian Sampling: From Inception to Implementation
James Howe and Thomas Prest and Thomas Ricosset and Mélissa Rossi
2019/1410 ( -- withdrawn -- )
2019/1409 ( PDF )
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security
Gareth T. Davies and Herman Galteland and Kristian Gjřsteen and Yao Jiang
2019/1408 ( PDF )
The group of automorphisms of the set of self-dual bent functions
Aleksandr Kutsenko
2019/1407 ( PDF )
Incrementally Verifiable Computation via Incremental PCPs
Moni Naor and Omer Paneth and Guy N. Rothblum
2019/1406 ( PDF )
Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting
Tassos Dimtiriou
2019/1405 ( PDF )
Revisiting Higher-Order Computational Attacks against White-Box Implementations
Houssem Maghrebi and Davide Alessio
2019/1404 ( PDF )
CSIDH on the surface
Wouter Castryck and Thomas Decru
2019/1403 ( -- withdrawn -- )
No RISC, no Fun: Comparison of Hardware Accelerated Hash Functions for XMSS
Ingo Braun and Fabio Campos and Steffen Reith and Marc Stöttinger
2019/1402 ( PDF )
Automatize parameter tuning in Ring-Learning-With-Errors-based leveled homomorphic cryptosystem implementations
2019/1401 ( PDF )
SMChain: A Scalable Blockchain Protocol for Secure Metering Systems in Distributed Industrial Plants
Gang Wang and Zhijie Jerry Shi and Mark Nixon and Song Han
2019/1400 ( PDF )
RedShift: Transparent SNARKs from List Polynomial Commitment IOPs
Assimakis Kattis and Konstantin Panarin and Alexander Vlasov
2019/1399 ( PDF )
(One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes
Jan-Pieter D'Anvers and Mélissa Rossi and Fernando Virdia
2019/1398 ( PDF )
How to Construct Rational Protocols with Nash Equilibrium Consistency in the UC framework
Xiaoxia Jiang and Youliang Tian
2019/1397 ( PDF )
How to compartment secrets
Gaëlle Candel and Rémi Géraud-Stewart and David Naccache
2019/1396 ( PDF )
A note on the multivariate cryptosystem based on a linear code
Yasufumi Hashimoto
2019/1395 ( PDF )
McTiny: fast high-confidence post-quantum key erasure for tiny network servers
Daniel J. Bernstein and Tanja Lange
2019/1394 ( PDF )
Voltage-based Covert Channels in Multi-Tenant FPGAs
Dennis R. E. Gnad and Cong Dang Khoa Nguyen and Syed Hashim Gillani and Mehdi B. Tahoori
2019/1393 ( PDF )
SoK: Computer-Aided Cryptography
Manuel Barbosa and Gilles Barthe and Karthik Bhargavan and Bruno Blanchet and Cas Cremers and Kevin Liao and Bryan Parno
2019/1392 ( PDF )
Decryption failure is more likely after success
Nina Bindel and John M. Schanck
2019/1391 ( PDF )
Are These Pairing Elements Correct? Automated Verification and Applications
Susan Hohenberger and Satyanarayana Vusirikala
2019/1390 ( PDF )
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs
Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof
2019/1389 ( PDF )
Generic Attack on Iterated Tweakable FX Constructions
Ferdinand Sibleyras
2019/1388 ( PDF )
Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava code
Jayashree Dey and Ratna Dutta
2019/1387 ( PDF )
The supersingular isogeny problem in genus 2 and beyond
Craig Costello and Benjamin Smith
2019/1386 ( PDF )
Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version)
Chao Liu and Zhongxiang Zheng and Keting Jia and Qidi You
2019/1385 ( PDF )
Improvements of the Balance Discovery Attack on Lightning Network Payment Channels
Gijs van Dam and Rabiah Abdul Kadir and Puteri N.E. Nohuddin and Halimah Badioze Zaman
2019/1384 ( PDF )
Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations
Keita Emura and Shuichi Katsumata and Yohei Watanabe
2019/1383 ( PDF )
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities
Karim Eldefrawy and Tancrčde Lepoint and Antonin Leroux
2019/1382 ( PDF )
On the Power of Multiple Anonymous Messages
Badih Ghazi and Noah Golowich and Ravi Kumar and Rasmus Pagh and Ameya Velingker
2019/1381 ( PDF )
The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions
Kaisa Nyberg
2019/1380 ( PDF )
Efficient Utilization of DSPs and BRAMs Revisited: New AES-GCM Recipes on FPGAs
Elif Bilge Kavun and Nele Mentens and Jo Vliegen and Tolga Yalcin
2019/1379 ( PDF )
Systematic and Random Searches for Compact 4-Bit and 8-Bit Cryptographic S-Boxes
Christophe Clavier and Léo Reynaud
2019/1378 ( PDF )
Alzette: a 64-bit ARX-box (feat. CRAX and TRAX)
Christof Beierle and Alex Biryukov and Luan Cardoso dos Santos and Johann Großschädl and Léo Perrin and Aleksei Udovenko and Vesselin Velichkov and Qingju Wang
2019/1377 ( PDF )
A Scalable Post-quantum Hash-Based Group Signature
Masoumeh Shafieinejad and Navid Nasr Esfahani
2019/1376 ( PDF )
Generic Constructions of RIBE via Subset Difference Method
Xuecheng Ma and Dongdai Lin
2019/1375 ( PDF )
New ideas to build noise-free homomorphic cryptosystems
Gérald Gavin and Sandrine Tainturier
2019/1374 ( PDF )
A Survey of Digital Signing in the Post Quantum Era
Teik Guan Tan and Jianying Zhou
2019/1373 ( PDF )
A note on the cost of computing odd degree isogenies
Daniel Cervantes-Vázquez and Francisco Rodríguez-Henríquez
2019/1372 ( PDF )
Analyzing the Linear Keystream Biases in AEGIS
Maria Eichlseder and Marcel Nageler and Robert Primas
2019/1371 ( PDF )
A short-list of pairing-friendly curves resistant to Special TNFS at the 128-bit security level
Aurore Guillevic
2019/1370 ( PDF )
A Subset Fault Analysis of ASCON
Priyanka Joshi and Bodhisatwa Mazumdar
2019/1369 ( PDF )
Impeccable Circuits II
Aein Rezaei Shahmirzadi and Shahram Rasoolzadeh and Amir Moradi
2019/1368 ( PDF )
Efficient FPGA Implementations of LowMC and Picnic
Daniel Kales and Sebastian Ramacher and Christian Rechberger and Roman Walch and Mario Werner
2019/1367 ( PDF )
Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption
Keitaro Hashimoto and Wakaha Ogata and Toi Tomita
2019/1366 ( PDF )
A Lattice-based Enhanced Privacy ID
Nada EL Kassem and Luis Fiolhais and Paulo Martins and Liqun Chen and Leonel Sousa
2019/1365 ( PDF )
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning
Megha Byali and Harsh Chaudhari and Arpita Patra and Ajith Suresh
2019/1364 ( PDF )
Boolean Functions with Multiplicative Complexity 3 and 4
Cagdas Calik and Meltem Sonmez Turan and Rene Peralta
2019/1363 ( PDF )
Multi-Device for Signal
Sébastien Campion and Julien Devigne and Céline Duguey and Pierre-Alain Fouque
2019/1362 ( PDF )
A Modern View on Forward Security
Colin Boyd and Kai Gellert
2019/1361 ( PDF )
Efficient Elliptic Curve Diffie-Hellman Computation at the 256-bit Security Level
Kaushik Nath and Palash Sarkar
2019/1360 ( PDF )
Sashimi: Cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
Daniele Cozzo and Nigel P. smart
2019/1359 ( PDF )
Universal Forgery Attack against GCM-RUP
Yanbin Li and Gaëtan Leurent and Meiqin Wang and Wei Wang and Guoyan Zhang and Yu Liu
2019/1358 ( PDF )
Traceable Inner Product Functional Encryption
Xuan Thanh Do and Duong Hieu Phan and David Pointcheval
2019/1357 ( PDF )
Cryptanalysis of the Legendre PRF and generalizations
Ward Beullens and Tim Beyne and Aleksei Udovenko and Giuseppe Vitto
2019/1356 ( PDF )
Towards Post-Quantum Security for Signal's X3DH Handshake
Jacqueline Brendel and Marc Fischlin and Felix Günther and Christian Janson and Douglas Stebila
2019/1355 ( PDF )
A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code
Daniel Smith-Tone and Cristina Tone
2019/1354 ( PDF )
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs
Zhangshuang Guan and Zhiguo Wan and Yang Yang and Yan Zhou and Butian Huang
2019/1353 ( PDF )
Laconic Conditional Disclosure of Secrets and Applications
Nico Döttling and Sanjam Garg and Vipul Goyal and Giulio Malavolta
2019/1352 ( PDF )
Spectral analysis of ZUC-256
Jing Yang and Thomas Johansson and Alexander Maximov
2019/1351 ( PDF )
Speeding Up OMD Instantiations in Hardware
Diana Maimut and Alexandru Stefan Mega
2019/1350 ( PDF )
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement
Patrick Leu and Mridula Singh and Marc Roeschlin and Kenneth G. Paterson and Srdjan Capkun
2019/1349 ( PDF )
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband
Mridula Singh and Patrick Leu and AbdelRahman Abdou and Srdjan Capkun
2019/1348 ( PDF )
Network Time with a Consensus on Clock
Handan Kilinc Alper
2019/1347 ( PDF )
Variants of Wegman-Carter Message Authentication Code Supporting Variable Tag Lengths
Sebati Ghosh and Palash Sarkar
2019/1346 ( PDF )
Privacy-Preserving Decentralised Singular Value Decomposition
Bowen Liu and Qiang Tang
2019/1345 ( PDF )
Audita: A Blockchain-based Auditing Framework for Off-chain Storage
Danilo Francati and Giuseppe Ateniese and Abdoulaye Faye and Andrea Maria Milazzo and Angelo Massimo Perillo and Luca Schiatti and Giuseppe Giordano
2019/1344 ( PDF )
From Fairness to Full Security in Multiparty Computation
Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem
2019/1343 ( PDF )
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber
Yue Qin and Chi Cheng and Jintai Ding
2019/1342 ( PDF )
Scalable Wildcarded Identity-Based Encryption
Jihye Kim and Seunghwa Lee and Jiwon Lee and Hyunok Oh
2019/1341 ( PDF )
Succinct Non-Interactive Secure Computation
Andrew Morgan and Rafael Pass and Antigoni Polychroniadou
2019/1340 ( PDF )
Secret Shared Shuffle
Melissa Chase and Esha Ghosh and Oxana Poburinnaya
2019/1339 ( PDF )
Extracting Randomness from Extractor-Dependent Sources
Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs
2019/1338 ( PDF )
Two-party Private Set Intersection with an Untrusted Third Party
Phi Hung Le and Samuel Ranellucci and S. Dov Gordon
2019/1337 ( PDF )
Offline Witness Encryption with Semi-Adaptive Security
Peter Chvojka and Tibor Jager and Saqib A. Kakvi
2019/1336 ( PDF )
Critical Perspectives on Provable Security: Fifteen Years of "Another Look" Papers
Neal Koblitz and Alfred Menezes
2019/1335 ( PDF )
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
Tibor Jager and David Niehues
2019/1334 ( PDF )
Privacy-Preserving Distributed Machine Learning based on Secret Sharing
Ye Dong and Xiaojun Chen and Liyan Shen
2019/1333 ( PDF )
The Dark SIDH of Isogenies
Paul Bottinelli and Victoria de Quehen and Chris Leonardi and Anton Mosunov and Filip Pawlega and Milap Sheth
2019/1332 ( PDF )
SEAL: Sealed-Bid Auction Without Auctioneers
Samiran Bag and Feng Hao and Siamak F. Shahandashti and Indranil G. Ray
2019/1331 ( PDF )
Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?
Melissa Azouaoui and Romain Poussier and François-Xavier Standaert and Vincent Verneuil
2019/1330 ( PDF )
OptiSwap: Fast Optimistic Fair Exchange
Lisa Eckey and Sebastian Faust and Benjamin Schlosser
2019/1329 ( PDF )
Drinfeld modules may not be for isogeny based cryptography
Antoine Joux and Anand Kumar Narayanan
2019/1328 ( PDF )
Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices
Yashvanth Kondi and Bernardo Magri and Claudio Orlandi and Omer Shlomovits
2019/1327 ( PDF )
Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain
Donghoon Chang and Munawar Hasan and Pranav Jain
2019/1326 ( PDF )
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE
Donghoon Chang and Nilanjan Datta and Avijit Dutta and Bart Mennink and Mridul Nandi and Somitra Sanadhya and Ferdinand Sibleyras
2019/1325 ( PDF )
Efficient Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts
Arinjita Paul and S. Sharmila Deva Selvi and C. Pandu Rangan
2019/1324 ( PDF )
Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme
Avijit Dutta and Mridul Nandi
2019/1323 ( PDF )
Secure Quantum Extraction Protocols
Prabhanjan Ananth and Rolando L. La Placa
2019/1322 ( PDF )
An Efficient Micropayment Channel on Ethereum
Hisham S. Galal and Muhammad ElSheikh and Amr M. Youssef
2019/1321 ( PDF )
Supersingular isogeny key exchange for beginners
Craig Costello
2019/1320 ( PDF )
Homomorphic Encryption Random Beacon
Alisa Cherniaeva and Ilia Shirobokov and Omer Shlomovits
2019/1319 ( PDF )
Automatic Search for the Linear (hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey and CHAM-64 (Full Version)
Mingjiang Huang and Liming Wang
2019/1318 ( PDF )
Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications (Full Version)
Mingjiang Huang and Liming Wang
2019/1317 ( PDF )
Reverse Firewalls for Actively Secure MPCs
Suvradip Chakraborty and Stefan Dziembowski and Jesper Buus Nielsen
2019/1316 ( PDF )
Binary Kummer Line
Sabyasachi Karati
2019/1315 ( PDF )
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning
Rahul Rachuri and Ajith Suresh
2019/1314 ( PDF )
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search
Zhidan Li and Wenmin Li and Fei Gao and Wei Yin and Hua Zhang and Qiaoyan Wen and Kaitai Liang
2019/1313 ( PDF )
On Oblivious Amplification of Coin-Tossing Protocols
Nir Bitansky and Nathan Geier
2019/1312 ( PDF )
Cryptographic Fault Diagnosis using VerFI
Victor Arribas and Felix Wegener and Amir Moradi and Svetla Nikova
2019/1311 ( PDF )
BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments
Jiwon Lee and Jihye Kim and Hyunok Oh
2019/1310 ( PDF )
Lightweight Iterative MDS Matrices: How Small Can We Go?
Shun Li and Siwei Sun and Danping Shi and Chaoyun Li and Lei Hu
2019/1309 ( PDF )
SaberX4: High-throughput Software Implementationof Saber Key Encapsulation Mechanism
Sujoy Sinha Roy
2019/1308 ( PDF )
A Novel CCA Attack using Decryption Errors against LAC
Qian Guo and Thomas Johansson and Jing Yang
2019/1307 ( PDF )
ABERand: Effective Distributed Randomness on Ciphertext-Policy Attribute-Based Encryption
Liang Zhang and Haibin Kan and Zening Chen and Ziqi Mao and Jinjie Gao
2019/1306 ( PDF )
A Valid Blockchain-based Data Trading Ecosystem
Taotao li and Dequan li
2019/1305 ( PDF )
Privacy-Preserving Computation over Genetic Data: HLA Matching and so on
Jinming Cui and Huaping Li and Meng Yang
2019/1304 ( PDF )
Reduction Modulo $2^{448}-2^{224}-1$
Kaushik Nath and Palash Sarkar
2019/1303 ( -- withdrawn -- )
A simpler construction of traceable and linkable ring signature scheme
Wulu Li
2019/1302 ( PDF )
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation
Máté Horváth and Levente Buttyán and Gábor Székely and Dóra Neubrandt
2019/1301 ( PDF )
Modular lattice signatures, revisited
Dipayan Das and Jeffrey Hoffstein and Jill Pipher and William Whyte and Zhenfei Zhang
2019/1300 ( PDF )
Actively Secure Setup for SPDZ
Dragos Rotaru and Nigel P. Smart and Titouan Tanguy and Frederik Vercauteren and Tim Wood
2019/1299 ( PDF )
A constant-rate non-malleable code in the split-state model.
Divesh Aggarwal and Maciej Obremski
2019/1298 ( PDF )
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
Mark Abspoel and Anders Dalskov and Daniel Escudero and Ariel Nof
2019/1297 ( PDF )
Exploring Energy Efficient Quantum-resistant Signal Processing Using Array Processors
Hamid Nejatollahi and Sina Shahhosseini and Rosario Cammarota and Nikil Dutt
2019/1296 ( PDF )
FastSwap: Concretely Efficient Contingent Payments for Complex Predicates
Mathias Hall-Andersen
2019/1295 ( PDF )
A trip between creation and destruction of non-commutative public key exchange protocols
Borja Gómez
2019/1294 ( PDF )
Hashing to elliptic curves of $j$-invariant $1728$
Dmitrii Koshelev
2019/1293 ( PDF )
LizarMong: Excellent Key Encapsulation Mechanism based on RLWE and RLWR
Chi-Gon Jung and JongHyeok Lee and Youngjin Ju and Yong-Been Kwon and Seong-Woo Kim and Yunheung Paek
2019/1292 ( PDF )
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing
Sarvar Patel and Giuseppe Persiano and Kevin Yeo and Moti Yung
2019/1291 ( PDF )
SÉTA: Supersingular Encryption from Torsion Attacks
Cyprien Delpech de Saint Guilhem and Péter Kutas and Christophe Petit and Javier Silva
2019/1290 ( PDF )
Trapdoor DDH groups from pairings and isogenies
Péter Kutas and Christophe Petit and Javier Silva
2019/1289 ( PDF )
On constant-time QC-MDPC decoding with negligible failure rate
Nir Drucker and Shay Gueron and Dusan Kostic
2019/1288 ( PDF )
Threshold Schemes from Isogeny Assumptions
Luca De Feo and Michael Meyer
2019/1287 ( PDF )
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
Muhammed F. Esgin and Raymond K. Zhao and Ron Steinfeld and Joseph K. Liu and Dongxi Liu
2019/1286 ( PDF )
Comparison of proof-of-work based blockchains against federated consensus and proof-of-validation based blockchains
Ambili K N and Jimmy Jose
2019/1285 ( PDF )
Full-Round Differential Attack on DoT Block Cipher
Manoj Kumar
2019/1284 ( PDF )
Shorter QA-NIZK and SPS with Tighter Security
Masayuki Abe and Charanjit S. Jutla and Miyako Ohkubo and Jiaxin Pan and Arnab Roy and Yuyu Wang
2019/1283 ( PDF )
Breaking the Hidden Irreducible Polynomials Scheme
Christian Eder
2019/1282 ( PDF )
Privacy-Preserving Decision Tree Training and Prediction against Malicious Server
Adi Akavia and Max Leibovich and Yehezkel S. Resheff and Roey Ron and Moni Shahar and Margarita Vald
2019/1281 ( PDF )
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer
Geoffroy Couteau and Bill Roscoe and Peter Ryan
2019/1280 ( PDF )
Fast Secrecy Computation with Multiplication Under the Setting of $k\le N<2k-1$ using Secret Sharing Scheme
Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal
2019/1279 ( PDF )
Post-quantum Zero Knowledge in Constant Rounds
Nir Bitansky and Omri Shmueli
2019/1278 ( PDF )
An IND-CCA-Secure Code-Based EncryptionScheme Using Rank Metric
Hamad Al Shehhi and Emanuele Bellini and Filipe Borba and Florian Caullery and Marc Manzano and Victor Mateu
2019/1277 ( PDF )
Towards Quantum-Safe VPNs and Internet
Maran van Heesch and Niels van Adrichem and Thomas Attema and Thijs Veugen
2019/1276 ( PDF )
Two PQ Signature Use-cases: Non-issues, challenges and potential solutions.
Panos Kampanakis and Dimitrios Sikeridis
2019/1275 ( PDF )
Updatable Oblivious Key Management for Storage Systems
Stanislaw Jarecki and Hugo Krawczyk and Jason Resch
2019/1274 ( PDF )
Rank-metric Encryption on Arm-Cortex M0
Ameirah al Abdouli and Emanuele Bellini and Florian Caullery and Marc Manzano and Victor Mateu
2019/1273 ( PDF )
A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography
Jens-Peter Kaps and William Diehl and Michael Tempelmeier and Farnoud Farahmand and Ekawat Homsirikamol and Kris Gaj
2019/1272 ( PDF )
The Niederreiter cryptosystem and Quasi-Cyclic codes
Upendra Kapshikar and Ayan Mahalanobis
2019/1271 ( PDF )
Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices
Martin R. Albrecht and Alex Davidson and Amit Deo and Nigel P. Smart
2019/1270 ( PDF )
SAVER: SNARK-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization
Jiwon Lee and Jaekyoung Choi and Jihye Kim and Hyunok Oh
2019/1269 ( PDF )
Repudiable Ring Signature: Stronger Security and Logarithmic-Size
Hao Lin and Mingqiang Wang
2019/1268 ( PDF )
On the Security of RSA-PSS in the Wild
Saqib A. Kakvi
2019/1267 ( -- withdrawn -- )
Repudiable Ring Signatures: Stronger Definitions and Logarithmic-Size
Hao Lin and Mingqiang Wang
2019/1266 ( PDF )
Note on the noise growth of the RNS variants of the BFV scheme
Jean Claude Bajard and Julien Eynard and Paulo Martins and Leonel Sousa and Vincent Zucca
2019/1265 ( -- withdrawn -- )
WaterCarver: Anonymous Confidential Blockchain System based on Account Model
Jiajun Xin and Pei Huang and Lei Chen and Xin Lai and Xiao Zhang and Wulu Li and Yongcan Wang
2019/1264 ( PDF )
Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era
Juan Garay and Aggelos Kiayias and Rafail Ostrovsky and Giorgos Panagiotakos and Vassilis Zikas
2019/1263 ( PDF )
Comments on Cryptographic Entropy Measurement
Anna Johnston
2019/1262 ( PDF )
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing
Shweta Agrawal and Rachit Garg and Nishant Kumar and Manoj Prabhakaran
2019/1261 ( PDF )
On Round-By-Round Soundness and State Restoration Attacks
Justin Holmgren
2019/1260 ( PDF )
TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions
Anita Aghaie and Amir Moradi
2019/1259 ( PDF )
Security and Efficiency Trade-offs for Elliptic Curve Diffie-Hellman at the 128-bit and 224-bit Security Levels
Kaushik Nath and Palash Sarkar
2019/1258 ( PDF )
Secure Pairwise Key Sharing using Geometric Group Key Sharing Method (Full Paper)
Shogo Ochiai and Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal
2019/1257 ( PDF )
Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts
Dhaval Khandla and Het Shahy and Manish Kumar Bz and Alwyn Roshan Pais and Nishant Raj
2019/1256 ( PDF )
Permuted Puzzles and Cryptographic Hardness
Elette Boyle and Justin Holmgren and Mor Weiss
2019/1255 ( PDF )
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular
Daniel Benarroch and Matteo Campanelli and Dario Fiore and Kobi Gurkan and Dimitris Kolonelos
2019/1254 ( PDF )
Cryptanalysis of FRS Obfuscation based on the CLT13 Multilinear Map
Jiseung Kim and Changmin Lee
2019/1253 ( PDF )
Probabilistic Properties of Modular Addition \\ (Extended abstract)
Victoria Vysotskaya
2019/1252 ( PDF )
Simplifying Constructions and Assumptions for $i\mathcal{O}$
Aayush Jain and Huijia Lin and Amit Sahai
2019/1251 ( PDF )
Lattice-based Zero-knowledge SNARGs for Arithmetic Circuits
Anca Nitulescu
2019/1250 ( PDF )
The Price of Active Security in Cryptographic Protocols
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss
2019/1249 ( PDF )
Related-key Attack on 5-Round Kuznyechik
Vitaly Kiryukhin
2019/1248 ( PDF )
A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis
Bastian Richter and David Knichel and Amir Moradi
2019/1247 ( PDF )
A Note on Masking Generic Boolean Functions
Lauren De Meyer and Felix Wegener and Amir Moradi
2019/1246 ( PDF )
A Note on Our Submission to Track 4 of iDASH 2019
Marcel Keller and Ke Sun
2019/1245 ( PDF )
Observations on the Quantum Circuit of the SBox of AES
Jian Zou and Yongyang Liu and Chen Dong and Wenling Wu and Le Dong
2019/1244 ( PDF )
A Note on a Static SIDH Protocol
Samuel Dobson and Trey Li and Lukas Zobernig
2019/1243 ( -- withdrawn -- )
On The Distinguishability of Ideal Ciphers
Roberto Avanzi and Yvo Desmedt
2019/1242 ( PDF )
Non-Profiled Side Channel Attack based on Deep Learning using Picture Trace
Jong-Yoen Park and Dong-Guk Han and Dirmanto Jap and Shivam Bhasin and Yoo-Seung Won
2019/1241 ( PDF )
SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain
Jeonghyuk Lee and Jungyeon Hwang and Jaekyung Choi and Hyunok Oh and Jihye Kim
2019/1240 ( PDF )
Forward and Backward Private DSSE for Range Queries
Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk and Lei Xu
2019/1239 ( PDF )
Computationally Modeling User-Mediated Authentication Protocols
Britta Hale
2019/1238 ( PDF )
Linear-Regression on Packed Encrypted Data in the Two-Server Model
Adi Akavia and Hayim Shaul and Mor Weiss and Zohar Yakhini
2019/1237 ( PDF )
QFactory: classically-instructed remote secret qubits preparation
Alexandru Cojocaru and Léo Colisson and Elham Kashefi and Petros Wallden
2019/1236 ( PDF )
Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack
Bo-Yeon Sim and Dong-Guk Han
2019/1235 ( PDF )
Physical Cryptography
Mariana Costiuc and Diana Maimut and George Teseleanu
2019/1234 ( PDF )
Efficient Homomorphic Comparison Methods with Optimal Complexity
Jung Hee Cheon and Dongwoo Kim and Duhyeong Kim
2019/1233 ( PDF )
Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts
Koji Nuida and Satsuya Ohata and Shigeo Mitsunari and Nuttapong Attrapadung
2019/1232 ( PDF )
Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice
Meenakshi Kansal and Ratna Dutta and Sourav Mukhopadhyay
2019/1231 ( PDF )
Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications
Zhao Chunhuan and Zheng Zhongxiang and Wang Xiaoyun and Xu Guangwu
2019/1230 ( PDF )
Linear-Size Constant-Query IOPs for Delegating Computation
Eli Ben-Sasson and Alessandro Chiesa and Lior Goldberg and Tom Gur and Michael Riabzev and Nicholas Spooner
2019/1229 ( PDF )
Transparent SNARKs from DARK Compilers
Benedikt Bünz and Ben Fisch and Alan Szepieniec
2019/1228 ( PDF )
Guess what?! On the impossibility of unconditionally secure public-key encryption
Lorenz Panny
2019/1227 ( PDF )
Dynamic Searchable Encryption with Small Client Storage
Ioannis Demertzis and Javad Ghareh Chamani and Dimitrios Papadopoulos and Charalampos Papamanthou
2019/1226 ( -- withdrawn -- )
Cube Cryptanalysis of Round-Reduced ACORN
Jingchun Yang and Meicheng Liu and Dongdai Lin
2019/1225 ( PDF )
Analysis of Nakamoto Consensus, Revisited
Jianyu Niu and Chen Feng and Hoang Dau and Yu-Chih Huang and Jingge Zhu
2019/1224 ( PDF )
Practical Volume-Based Attacks on Encrypted Databases
Rishabh Poddar and Stephanie Wang and Jianan Lu and Raluca Ada Popa
2019/1223 ( PDF )
Integrita: Protecting View-Consistency in Online Social Network with Federated Servers
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
2019/1222 ( PDF )
Sub-Linear Privacy-Preserving Near-Neighbor Search
M. Sadegh Riazi and Beidi Chen and Anshumali Shrivastava and Dan Wallach and Farinaz Koushanfar
2019/1221 ( PDF )
Probabilistic Data Structures in Adversarial Environments
David Clayton and Christopher Patton and Thomas Shrimpton
2019/1220 ( PDF )
Side-channel Attacks on Blinded Scalar Multiplications Revisited
Thomas Roche and Laurent Imbert and Victor Lomné
2019/1219 ( PDF )
Multi-Locking and Perfect Argument Order: Two Major Improvements of Attribute-Based Encryption~(Long Paper)
Nugier Cyrius and Adelin Remi and Migliore Vincent and Alata Eric
2019/1218 ( PDF )
On the Efficiency of Software Implementations of Lightweight Block Ciphers from the Perspective of Programming Languages
Abdur Rehman Raza and Khawir Mahmood and Muhammad Faisal Amjad and Haider Abbas and Mehreen Afzal
2019/1217 ( -- withdrawn -- )
A Scalable Blockchain Based Digital Rights Management System
Ashutosh Dhar Dwivedi
2019/1216 ( PDF )
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm
Wei-Zhu Yeoh and Je Sen Teh and Jiageng Chen
2019/1215 ( PDF )
Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
2019/1214 ( PDF )
A New Secure and Efficient Ownership Transfer Protocol based on Quadric Residue and Homomorphic Encryption
Farokhlagha Moazami and Masoumeh Safkhani
2019/1213 ( PDF )
Exploring Lightweight Efficiency of ForkAES
Fatih Balli and Subhadeep Banik
2019/1212 ( PDF )
Swap and Rotate: Lightweight linear layers for SPN-based blockciphers
Subhadeep Banik and Fatih Balli and Francesco Regazzoni and Serge Vaudenay
2019/1211 ( PDF )
Topology-Hiding Computation for Networks with Unknown Delays
Rio LaVigne and Chen-Da Liu-Zhang and Ueli Maurer and Tal Moran and Marta Mularczyk and Daniel Tschudi
2019/1210 ( PDF )
Adaptive Security of Practical Garbling Schemes
Zahra Jafargholi and Sabine Oechsner
2019/1209 ( PDF )
On collisions related to an ideal class of order 3 in CSIDH
Hiroshi Onuki and Tsuyoshi Takagi
2019/1208 ( PDF )
Towards Post-Quantum Secure Symmetric Cryptography: A Mathematical Perspective
Xenia Bogomolec and John Gregory Underhill and Stiepan Aurélien Kovac
2019/1207 ( PDF )
Behind multiple trapdoors: A cryptographic commitment scheme for establishing secure communications
Borja Gómez
2019/1206 ( PDF )
High-Speed Modular Multipliers for Isogeny-Based Post-Quantum Cryptography
Jing Tian; Zhe Liu; Jun Lin; Zhongfeng Wang; Binjing Li
2019/1205 ( PDF )
Secure Multi-party Quantum Computation with a Dishonest Majority
Yfke Dulek and Alex Grilo and Stacey Jeffery and Christian Majenz and Christian Schaffner
2019/1204 ( PDF )
Efficient simulation of random states and random unitaries
Gorjan Alagic and Christian Majenz and Alexander Russell
2019/1203 ( PDF )
Authentication in Key-Exchange: Definitions, Relations and Composition
Cyprien Delpech de Saint Guilhem and Marc Fischlin and Bogdan Warinschi
2019/1202 ( PDF )
Rational isogenies from irrational endomorphisms
Wouter Castryck and Lorenz Panny and Frederik Vercauteren
2019/1201 ( PDF )
Efficient Redactable Signature and Application to Anonymous Credentials
Olivier Sanders
2019/1200 ( PDF )
A note on short invertible ring elements and applications to cyclotomic and trinomials number fields
Thomas Attema and Ronald Cramer and Chaoping Xing
2019/1199 ( PDF )
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
Max Hoffmann and Michael Klooß and Markus Raiber and Andy Rupp
2019/1198 ( PDF )
Encrypted Databases: New Volume Attacks against Range Queries
Zichen Gui and Oliver Johnson and Bogdan Warinschi
2019/1197 ( PDF )
Secret sharing and duality
Laszlo Csirmaz
2019/1196 ( PDF )
Evaluating Octic Residue Symbols
Marc Joye
2019/1195 ( PDF )
Non-Malleable Commitments Using Goldreich-Levin List Decoding
Vipul Goyal and Silas Richelson
2019/1194 ( PDF )
Perfect Forward Security of SPAKE2
Michel Abdalla and Manuel Barbosa
2019/1193 ( PDF )
Security models for everlasting privacy
Panagiotis Grontas and Aris Pagourtzis and Alexandros Zacharakis
2019/1192 ( PDF )
Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets
Daniel Berend and Dor Bitan and Shlomi Dolev
2019/1191 ( PDF )
On the equivalence of authentication codes and robust (2,2)-threshold schemes
Maura B. Paterson and Douglas R. Stinson
2019/1190 ( PDF )
Improving Matsui's Search Algorithm for the Best Differential/Linear Trails and its Applications for DES, DESL and GIFT
Fulei Ji and Wentao Zhang and Tianyou Ding
2019/1189 ( PDF )
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging
Joël Alwen and Sandro Coretti and Yevgeniy Dodis and Yiannis Tselekounis
2019/1188 ( PDF )
Improving Password Guessing via Representation Learning
Dario Pasquini and Ankit Gangwal and Giuseppe Ateniese and Massimo Bernaschi and Mauro Conti
2019/1187 ( PDF )
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs
Orr Dunkelman and Léo Perrin
2019/1186 ( PDF )
Trading Accumulation Size for Witness Size: A Merkle Tree Based Universal Accumulator Via Subset Differences
Mahabir Prasad Jhanwar and Pratyush Ranjan Tiwari
2019/1185 ( PDF )
Formalising $\Sigma$-Protocols and Commitment Schemes using CryptHOL
David Butler and Andreas Lochbihler and David Aspinall and Adria Gascon
2019/1184 ( PDF )
A concrete instantiation of Bulletproof zero-knowledge proof
Andrey Jivsov
2019/1183 ( PDF )
Broadcast-Optimal Two-Round MPC
Ran Cohen and Juan Garay and Vassilis Zikas
2019/1182 ( PDF )
Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries
Serge Fehr and Chen Yuan
2019/1181 ( -- withdrawn -- )
Quantum Physical Unclonable Functions: Possibilities and Impossibilities
Myrto Arapinis and Mahshid Delavar and Mina Doosti and Elham Kashefi
2019/1180 ( PDF )
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices
Pierre-Alain Fouque and Paul Kirchner and Mehdi Tibouchi and Alexandre Wallet and Yang Yu
2019/1179 ( PDF )
Practical MP-LWE-based encryption balancing security-risk vs. efficiency
Ron Steinfeld and Amin Sakzad and Raymond K. Zhao
2019/1178 ( PDF )
SoK: Sharding on Blockchain
Gang Wang and Zhijie Jerry Shi and Mark Nixon and Song Han
2019/1177 ( PDF )
Proofs for Inner Pairing Products and Applications
Benedikt Bünz and Mary Maller and Pratyush Mishra and Noah Vesely
2019/1176 ( PDF )
The Thirteenth Power Residue Symbol
Eric Brier and David Naccache
2019/1175 ( PDF )
Revisiting Leakage Abuse Attacks
Laura Blackstone and Seny Kamara and Tarik Moataz
2019/1174 ( PDF )
Hidden Irreducible Polynomials : A cryptosystem based on Multivariate Public Key Cryptography
Borja Gómez
2019/1173 ( PDF )
Immunization against Complete Subversion without Random Oracles
Giuseppe Ateniese and Danilo Francati and Bernardo Magri and Daniele Venturi
2019/1172 ( PDF )
Lever: Breaking the Shackles of Scalable On-chain Validation
Mingming Wang and Qianhong Wu
2019/1171 ( PDF )
Almost universal codes for MIMO wiretap channels
Laura Luzzi and Roope Vehkalahti and Cong Ling
2019/1170 ( PDF )
Space-efficient quantum multiplication of polynomials for binary finite fields with sub-quadratic Toffoli gate count
Iggy van Hoof
2019/1169 ( PDF )
Semantically Secure Lattice Codes for Compound MIMO Channels
Antonio Campello and Cong Ling and Jean-Claude Belfiore
2019/1168 ( PDF )
Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)
Chun Guo and Jonathan Katz and Xiao Wang and Chenkai Weng and Yu Yu
2019/1167 ( PDF )
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications
Nabil Alkeilani Alkadri and Rachid El Bansarkhani and Johannes Buchmann
2019/1166 ( PDF )
The complete cost of cofactor h=1
Peter Schwabe and Daan Sprenkels
2019/1165 ( PDF )
Fast verification of masking schemes in characteristic two
Nicolas Bordes and Pierre Karpman
2019/1164 ( PDF )
Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version)
Chao Liu and Zhongxiang Zheng and Keting Jia and Limin Tao
2019/1163 ( PDF )
On the Difficulty of FSM-based Hardware Obfuscation
Marc Fyrbiak and Sebastian Wallat and Jonathan Déchelotte and Nils Albartus and Sinan Böcker and Russell Tessier and Christof Paar
2019/1162 ( PDF )
Subversion-Resistant Simulation (Knowledge) Sound NIZKs
Karim Baghery
2019/1161 ( PDF )
Estimating quantum speedups for lattice sieves
Martin R. Albrecht and Vlad Gheorghiu and Eamonn W. Postlethwaite and John M. Schanck
2019/1160 ( PDF )
Cryptanalysis of the Multivariate Encryption Scheme EFLASH
Morten Řygarden and Patrick Felke and Hĺvard Raddum and Carlos Cid
2019/1159 ( PDF )
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Rindal and Peter Scholl
2019/1158 ( PDF )
Practical Privacy-Preserving K-means Clustering
Payman Mohassel and Mike Rosulek and Ni Trieu
2019/1157 ( PDF )
A Note on the Chi-square Method : A Tool for Proving Cryptographic Security
Srimanta Bhattacharya and Mridul Nandi
2019/1156 ( PDF )
How to Extract Useful Randomness from Unreliable Sources
Divesh Aggarwal and Maciej Obremski and Joăo Ribeiro and Luisa Siniscalchi and Ivan Visconti
2019/1155 ( PDF )
Machine-Checked Proofs for Cryptographic Standards
José Bacelar Almeida and Cécile Baritel-Ruet and Manuel Barbosa and Gilles Barthe and François Dupressoir and Benjamin Grégoire and Vincent Laporte and Tiago Oliveira and Alley Stoughton and Pierre-Yves Strub
2019/1154 ( PDF )
The Retracing Boomerang Attack
Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir
2019/1153 ( PDF )
Stronger Security and Constructions of Multi-Designated Verifier Signatures
Ivan Damgĺrd and Helene Haagh and Rebekah Mercer and Anca Nițulescu and Claudio Orlandi and Sophia Yakoubov
2019/1152 ( PDF )
Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs
Jonas Krautter and Dennis R.E. Gnad and Falk Schellenberg and Amir Moradi and Mehdi B. Tahoori
2019/1151 ( PDF )
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem
Yusuke Yoshida and Fuyuki Kitagawa and Keisuke Tanaka
2019/1150 ( PDF )
The Bitcoin Backbone Protocol Against Quantum Adversaries
Alexandru Cojocaru and Juan Garay and Aggelos Kiayias and Fang Song and Petros Wallden
2019/1149 ( PDF )
LockDown: Balance Availability Attack against Lightning Network Channels
Cristina Pérez-Solŕ and Alejandro Ranchal-Pedrosa and Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Joaquin Garcia-Alfaro
2019/1148 ( PDF )
On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption
Benjamin R. Curtis and Rachel Player
2019/1147 ( PDF )
Batching non-membership proofs with bilinear accumulators
Steve Thakur
2019/1146 ( PDF )
Implementing Grover oracles for quantum key search on AES and LowMC
Samuel Jaques and Michael Naehrig and Martin Roetteler and Fernando Virdia
2019/1145 ( PDF )
B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
Craig Costello
2019/1144 ( PDF )
Rerandomizable Signatures under Standard Assumption
Sanjit Chatterjee and R. Kabaleeshwaran
2019/1143 ( PDF )
Auditable Compressed Storage
Iraklis Leontiadis and Reza Curtmola
2019/1142 ( PDF )
Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP
Tamalika Mukherjee and Noah Stephens-Davidowitz
2019/1141 ( PDF )
KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures
Murat Yasin Kubilay and Mehmet Sabir Kiraz and Haci Ali Mantar
2019/1140 ( PDF )
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols (Extended Version)
Utsav Banerjee and Tenzin S. Ukyab and Anantha P. Chandrakasan
2019/1139 ( PDF )
Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
Mingchao Yu and Saeid Sahraei and Songze Li and Salman Avestimehr and Sreeram Kannan and Pramod Viswanath
2019/1138 ( PDF )
ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage
Gang Wang and Zhijie Jerry Shi and Mark Nixon and Song Han
2019/1137 ( PDF )
On the Complexity of Arithmetic Secret Sharing
Ronald Cramer and Chaoping Xing and Chen Yuan
2019/1136 ( PDF )
An implementation of the Paillier crypto system with threshold decryption without a trusted dealer
Thijs Veugen and Thomas Attema and Gabriele Spini
2019/1135 ( PDF )
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing
Arinjita Paul and S. Sharmila Deva Selvi and C. Pandu Rangan
2019/1134 ( PDF )
Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes
Ronald Cramer and Chaoping Xing
2019/1133 ( PDF )
Threat Models and Security of Phase-Change Memory
Gang Wang
2019/1132 ( PDF )
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2019/1131 ( PDF )
Nearly Optimal Robust Secret Sharing against Rushing Adversaries
Pasin Manurangsi and Akshayaram Srinivasan and Prashant Nalini Vasudevan
2019/1130 ( PDF )
On affine Cremona semigroups, corresponding protocols of Non-commutative Cryptography and encryption with several nonlinear multivariate transformations on secure Eulerian mode.
V. Ustimenko
2019/1129 ( PDF )
Privacy-Enhanced Machine Learning with Functional Encryption
Tilen Marc and Miha Stopar and Jan Hartman and Manca Bizjak and Jolanda Modic
2019/1128 ( PDF )
SoK: Communication Across Distributed Ledgers
Alexei Zamyatin and Mustafa Al-Bassam and Dionysis Zindros and Eleftherios Kokoris-Kogias and Pedro Moreno-Sanchez and Aggelos Kiayias and William J. Knottenbelt
2019/1127 ( PDF )
Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing
Kazuhiko Minematsu and Norifumi Kamiya
2019/1126 ( PDF )
Encrypted Distributed Hash Tables
Archita Agarwal and Seny Kamara
2019/1125 ( PDF )
Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols
Karim Baghery and Behzad Abdolmaleki and Shahram Khazaei and Mohammad Reza Aref
2019/1124 ( PDF )
Evolving Ramp Secret Sharing with a Small Gap
Amos Beimel and Hussien Othman
2019/1123 ( PDF )
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme
Laltu Sardar and Sushmita Ruj
2019/1122 ( PDF )
Exploring Trade-offs in Batch Bounded Distance Decoding
Martin R. Albrecht and Benjamin R. Curtis and Thomas Wunderer
2019/1121 ( PDF )
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors
Aaron Hutchinson and Jason LeGrow and Brian Koziel and Reza Azarderakhsh
2019/1120 ( PDF )
Structure-Preserving Signatures on Equivalence Classes From Standard Assumptions
Mojtaba Khalili and Daniel Slamanig and Mohammad Dakhilalian
2019/1119 ( PDF )
MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version)
Antonis Michalas and Alexandros Bakas and Hai-Van Dang and Alexandr Zalitko
2019/1118 ( PDF )
A Diffie-Hellman quantum session key establishment protocol without entanglement
Yalin Chen and Chang Hsiang and Liang-Chun Wang and Yu-Yuan Chou and Jue-Sam Chou *
2019/1117 ( -- withdrawn -- )
NP-completeness Reduction for Semiprimes Factorization Problem
Yen-Lung Lai
2019/1116 ( PDF )
Computational Extractors with Negligible Error in the CRS Model
Ankit Garg and Yael Tauman Kalai and Dakshita Khurana
2019/1115 ( PDF )
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash
Rui Zong and Xiaoyang Dong and Xiaoyun Wang
2019/1114 ( PDF )
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE
Jung Hee Cheon and Minki Hhan and Seungwan Hong and Yongha Son
2019/1113 ( PDF )
Towards a Homomorphic Machine Learning Big Data Pipeline for the Financial Services Sector
Oliver Masters and Hamish Hunt and Enrico Steffinlongo and Jack Crawford and Flavio Bergamaschi and Maria E. Dela Rosa and Caio C. Quini and Camila T. Alves and Feranda de Souza and Deise G. Ferreira
2019/1112 ( PDF )
Subliminal Hash Channels
George Teseleanu
2019/1111 ( PDF )
Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers
Mikerah Quintyne-Collins
2019/1110 ( PDF )
Redactable Proof-of-Stake Blockchain with Fast Confirmation
Jing Xu and Xinyu Li and Lingyuan Yin and Bingyong Guo and Han Feng and Zhenfeng Zhang
2019/1109 ( PDF )
Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography
Alberto Pedrouzo-Ulloa and Juan Ramón Troncoso-Pastoriza and Nicolas Gama and Mariya Georgieva and Fernando Pérez-González
2019/1108 ( PDF )
Lower Bounds for Multi-Server Oblivious RAMs
Kasper Green Larsen and Mark Simkin and Kevin Yeo
2019/1107 ( PDF )
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy
Lorenzo Grassi and Reinhard Lüftenegger and Christian Rechberger and Dragos Rotaru and Markus Schofnegger
2019/1106 ( PDF )
Side-channel Masking with Pseudo-Random Generator
Jean-Sébastien Coron and Aurélien Greuet and Rina Zeitoun
2019/1105 ( PDF )
On the Multi-User Security of Short Schnorr Signatures
Jeremiah Blocki and Seunghoon Lee
2019/1104 ( PDF )
More Efficient MPC from Improved Triple Generation and Authenticated Garbling
Kang Yang and Xiao Wang and Jiang Zhang
2019/1103 ( PDF )
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms
Rahul Chatterjee and M. Sadegh Riazi and Tanmoy Chowdhury and Emanuela Marasco and Farinaz Koushanfar and Ari Juels
2019/1102 ( -- withdrawn -- )
Applications on traceable range proofs from fully regulatable privacy-preserving blockchains
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2019/1101 ( PDF )
On the (Quantum) Random Oracle Methodology: New Separations and More
Jiang Zhang and Yu Yu and Dengguo Feng and Shuqin Fan and Zhenfeng Zhang
2019/1100 ( PDF )
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes
Qi Chen and Chunming Tang and Zhiqiang Lin
2019/1099 ( PDF )
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name
Eman Salem Alashwali and Kasper Rasmussen
2019/1098 ( PDF )
Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling
Eleftheria Makri and Tim Wood
2019/1097 ( PDF )
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric
Dmytro Bogatov and Angelo De Caro and Kaoutar Elkhiyaoui and Björn Tackmann
2019/1096 ( PDF )
Kostis Karantias and Aggelos Kiayias and Dionysis Zindros
2019/1095 ( PDF )
Secure Computation with Preprocessing via Function Secret Sharing
Elette Boyle and Niv Gilboa and Yuval Ishai
2019/1094 ( PDF )
Is Information-Theoretic Topology-Hiding Computation Possible?
Marshall Ball and Elette Boyle and Ran Cohen and Tal Malkin and Tal Moran
2019/1093 ( PDF )
Quantum Random Oracle Model with Auxiliary Input
Minki Hhan and Keita Xagawa and Takashi Yamakawa
2019/1092 ( PDF )
Cerberus Channels: Incentivizing Watchtowers for Bitcoin
Georgia Avarikioti and Orfeas Stefanos Thyfronitis Litos and Roger Wattenhofer
2019/1091 ( PDF )
Short Paper: XOR Arbiter PUFs have Systematic Response Bias
Nils Wisiol and Niklas Pirnay
2019/1090 ( PDF )
Low Complexity MDS Matrices Using $GF(2^n)$ SPB or GPB
Xinggu Chen and Haining Fan
2019/1089 ( PDF )
Lattice-Face Key Infrastructure (LFKI) for Quantum Resistant Computing
Josiah Johnson Umezurike
2019/1088 ( PDF )
KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability
Clinton Ehrlich and Anna Guzova
2019/1087 ( PDF )
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data
Shyam Murthy and Srinivas Vivek
2019/1086 ( PDF )
The SPHINCS+ Signature Framework
Daniel J. Bernstein and Andreas Hülsing and Stefan Kölbl and Ruben Niederhagen and Joost Rijneveld and Peter Schwabe
2019/1085 ( PDF )
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation
Yilei Chen and Minki Hhan and Vinod Vaikuntanathan and Hoeteck Wee
2019/1084 ( PDF )
Distributed Vector-OLE: Improved Constructions and Implementation
Phillipp Schoppmann and Adriŕ Gascón and Leonie Reichert and Mariana Raykova
2019/1083 ( PDF )
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS
Eman Salem Alashwali and Kasper Rasmussen
2019/1082 ( PDF )
On the Security of Multikey Homomorphic Encryption
Hyang-Sook Lee and Jeongeun Park
2019/1081 ( PDF )
OCEAN: A Built-In Replacement for Mining Pools
Raymond Chee and Kartik Chitturi and Edouard Dufour-Sans and Kyle Soska
2019/1080 ( PDF )
Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods
Fukang Liu and Takanori Isobe and Willi Meier
2019/1079 ( PDF )
When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited
Yiming Zhu and Zhen Liu and Yanbin Pan
2019/1078 ( PDF )
Puncturable Proxy Re-Encryption supporting to Group Messaging Service
Tran Viet Xuan Phuong and Willy Susilo and Jongkil Kim and Guomin Yang and Dongxi Liu
2019/1077 ( PDF )
Adaptively Secure Garbling Schemes for Parallel Computations
Kai-Min Chung; Luowen Qian
2019/1076 ( PDF )
Fractal: Post-Quantum and Transparent Recursive Proofs from Holography
Alessandro Chiesa and Dev Ojha and Nicholas Spooner
2019/1075 ( PDF )
Private Information Retrieval with Sublinear Online Time
Henry Corrigan-Gibbs and Dmitry Kogan
2019/1074 ( PDF )
Non-monotonic Practical ABE with Direct Revocation, Blackbox Traceability, and a Large Attribute Universe
Dirk Thatmann
2019/1073 ( PDF )
iUC: Flexible Universal Composability Made Simple
Jan Camenisch and Stephan Krenn and Ralf Kuesters and Daniel Rausch
2019/1072 ( PDF )
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem
Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Kevin Liu and Giulio Malavolta
2019/1071 ( PDF )
DLSCA: a Tool for Deep Learning Side Channel Analysis
Martin Brisfors and Sebastian Forsmark
2019/1070 ( PDF )
Secure Delegation of Isogeny Computations and Cryptographic Applications
Robi Pedersen and Osmanbey Uzunkol
2019/1069 ( PDF )
Efficient Private PEZ Protocols for Symmetric Functions
Yoshiki Abe and Mitsugu Iwamoto and Kazuo Ohta
2019/1068 ( PDF )
Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets Efficiently
Joey Green and Tilo Burghardt and Elisabeth Oswald
2019/1067 ( PDF )
Lattice Trapdoors and IBE from Middle-Product LWE
Alex Lombardi and Vinod Vaikuntanathan and Thuy Duong Vuong
2019/1066 ( PDF )
HEAX: An Architecture for Computing on Encrypted Data
M. Sadegh Riazi and Kim Laine and Blake Pelton and Wei Dai
2019/1065 ( PDF )
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Karim Baghery
2019/1064 ( PDF )
Separating Symmetric and Asymmetric Password-Authenticated Key Exchange
Julia Hesse
2019/1063 ( PDF )
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing
Behzad Abdolmaleki and Hamidreza Khoshakhlagh and Daniel Slamanig
2019/1062 ( PDF )
Local Proofs Approaching the Witness Length
Noga Ron-Zewi and Ron D. Rothblum
2019/1061 ( PDF )
Breaking and Fixing Anonymous Credentials for the Cloud
Ulrich Haböck and Stephan Krenn
2019/1060 ( PDF )
Sharing the LUOV: Threshold Post-Quantum Signatures
Daniele Cozzo and Nigel P. smart
2019/1059 ( PDF )
A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem
Daniele Di Tullio and Ankan Pal
2019/1058 ( PDF )
Privacy-preserving auditable token payments in a permissioned blockchain system
Elli Androulaki and Jan Camenisch and Angelo De Caro and Maria Dubovitskaya and Kaoutar Elkhiyaoui and Björn Tackmann
2019/1057 ( PDF )
A Study of Persistent Fault Analysis
Andrea Caforio and Subhadeep Banik
2019/1056 ( PDF )
Adventures in Supersingularland
Sarah Arpin and Catalina Camacho-Navarro and Kristin Lauter and Joelle Lim and Kristina Nelson and Travis Scholl and Jana Sotáková
2019/1055 ( PDF )
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk
2019/1054 ( PDF )
Truthful and Faithful Monetary Policy for a Stablecoin Conducted by a Decentralised, Encrypted Artificial Intelligence
David Cerezo Sánchez
2019/1053 ( PDF )
Modeling Memory Faults in Signature and Authenticated Encryption Schemes
Marc Fischlin and Felix Günther
2019/1052 ( PDF )
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem
Abderrahmane Nitaj and Willy Susilo and Joseph Tonien
2019/1051 ( PDF )
A New Public Key Cryptosystem Based on Edwards Curves
Maher Boudabra and Abderrahmane Nitaj
2019/1050 ( PDF )
A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem
Abderrahmane Nitaj and Emmanuel Fouotsa
2019/1049 ( PDF )
CrypTFlow: Secure TensorFlow Inference
Nishant Kumar and Mayank Rathee and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma
2019/1048 ( PDF )
New point compression method for elliptic $\mathbb{F}_{\!q^2}$-curves of $j$-invariant $0$
Dmitrii Koshelev
2019/1047 ( PDF )
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS
Alessandro Chiesa and Yuncong Hu and Mary Maller and Pratyush Mishra and Noah Vesely and Nicholas Ward
2019/1046 ( PDF )
The Function-Inversion Problem: Barriers and Opportunities
Henry Corrigan-Gibbs and Dmitry Kogan
2019/1045 ( PDF )
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank
Josh Alman and Robin Hui
2019/1044 ( PDF )
Verifiable Registration-Based Encryption
Rishab Goyal and Satyanarayana Vusirikala
2019/1043 ( PDF )
Breaking the Bluetooth Pairing – The Fixed Coordinate Invalid Curve Attack
Eli Biham and Lior Neumann
2019/1042 ( PDF )
A Machine-Checked Proof of Security for AWS Key Management Service
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Matthew Campagna and Ernie Cohen and Benjamin Gregoire and Vitor Pereira and Bernardo Portela and Pierre-Yves Strub and Serdar Tasiran
2019/1041 ( PDF )
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Swapnil Paliwal and Anvita Chandrakar
2019/1040 ( PDF )
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
Abhishek Chakraborty and Ankur Srivastava
2019/1039 ( PDF )
Accelerated V2X provisioning with Extensible Processor Platform
Henrique S. Ogawa and Thomas E. Luther and Jefferson E. Ricardini and Helmiton Cunha and Marcos Simplicio Jr. and Diego F. Aranha and Ruud Derwig and Harsh Kupwade-Patil
2019/1038 ( PDF )
Dynamic Searchable Encryption with Access Control
Johannes Blömer and Nils Löken
2019/1037 ( PDF )
Card-based Cryptography Meets Formal Verification
Alexander Koch and Michael Schrempp and Michael Kirsten
2019/1036 ( PDF )
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Kazuki Yoneyama
2019/1035 ( PDF )
An LLL Algorithm for Module Lattices
Changmin Lee and Alice Pellet-Mary and Damien Stehlé and Alexandre Wallet
2019/1034 ( PDF )
Sponges Resist Leakage: The Case of Authenticated Encryption
Jean Paul Degabriele and Christian Janson and Patrick Struck
2019/1033 ( PDF )
Anonymous AE
John Chan and Phillip Rogaway
2019/1032 ( PDF )
On Fully Secure MPC with Solitary Output
Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Nikolaos Makriyannis and Tal Rabin
2019/1031 ( PDF )
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice
Rahim Toluee and Taraneh Eghlidos
2019/1030 ( PDF )
How to leverage hardness of constant degree expanding polynomials over R to build iO
Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai
2019/1029 ( PDF )
Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures
Yilei Chen and Nicholas Genise and Pratyay Mukherjee
2019/1028 ( PDF )
Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors
Divesh Aggarwal and Bogdan Ursu and Serge Vaudenay
2019/1027 ( PDF )
Quantum LLL with an Application to Mersenne Number Cryptosystems
Marcel Tiepelt and Alan Szepieniec
2019/1026 ( PDF )
Efficient Tightly-Secure Structure-Preserving Signatures and Unbounded Simulation-Sound QA-NIZK Proofs
Mojtaba Khalili and Daniel Slamanig
2019/1025 ( PDF )
On Perfect Correctness without Derandomization
Gilad Asharov and Naomi Ephraim and Ilan Komargodski and Rafael Pass
2019/1024 ( PDF )
Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix
Dor Bitan and Shlomi Dolev
2019/1023 ( PDF )
Randomly Choose an Angle from Immense Number of Angles to Rotate Qubits, Compute and Reverse
Dor Bitan and Shlomi Dolev
2019/1022 ( PDF )
A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem
Jintai Ding and Joshua Deaton and Kurt Schmidt and Vishakha and Zheng Zhang
2019/1021 ( PDF )
Recursive Proof Composition without a Trusted Setup
Sean Bowe and Jack Grigg and Daira Hopwood
2019/1020 ( PDF )
Transparent Polynomial Commitment Scheme with Polylogarithmic Communication Complexity
Alexander Vlasov and Konstantin Panarin
2019/1019 ( PDF )
Revisiting the Hybrid attack on sparse and ternary secret LWE
Yongha Son and Jung Hee Cheon
2019/1018 ( PDF )
Towards Instantiating the Algebraic Group Model
Julia Kastner and Jiaxin Pan
2019/1017 ( PDF )
The Local Forking Lemma and its Application to Deterministic Encryption
Mihir Bellare and Wei Dai and Lucy Li
2019/1016 ( PDF )
Quantum Algorithms for the Approximate $k$-List Problem and their Application to Lattice Sieving
Elena Kirshanova and Erik Mĺrtensson and Eamonn W. Postlethwaite and Subhayan Roy Moulik
2019/1015 ( PDF )
Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.
Eleftherios Kokoris-Kogias and Dahlia Malkhi and Alexander Spiegelman
2019/1014 ( PDF )
Security Reductions for White-Box Key-Storage in Mobile Payments
Estuardo Alpirez Bock and Chris Brzuska and Marc Fischlin and Christian Janson and Wil Michiels
2019/1013 ( PDF )
A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules')
Carolyn Whitnall and Elisabeth Oswald
2019/1012 ( PDF )
Simple and Efficient KDM-CCA Secure Public Key Encryption
Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka
2019/1011 ( PDF )
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers
Raymond K. Zhao and Ron Steinfeld and Amin Sakzad
2019/1010 ( PDF )
On Perfect Correctness in (Lockable) Obfuscation
Rishab Goyal and Venkata Koppula and Satyanarayana Vusirikala and Brent Waters
2019/1009 ( PDF )
LLL and stochastic sandpile models
Jintai Ding and Seungki Kim and Tsuyoshi Takagi and Yuntao Wang
2019/1008 ( PDF )
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations
Olivier Bronchain and François-Xavier Standaert
2019/1007 ( PDF )
SPAE a mode of operation for AES on low-cost hardware
Philippe Elbaz-Vincent and Cyril Hugounenq and Sébastien Riou
2019/1006 ( PDF )
Lucente Stabile Atkins (LSA) Cryptosystem (Unbreakable)
Francesco Lucente Stabile and Carey Patrick Atkins
2019/1005 ( PDF )
Threshold Implementations in the Robust Probing Model
Siemen Dhooghe and Svetla Nikova and Vincent Rijmen
2019/1004 ( PDF )
Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages
Elena Andreeva and Virginie Lallemand and Antoon Purnal and Reza Reyhanitabar and Arnab Roy and Damian Vizar
2019/1003 ( PDF )
Twisted Hessian Isogenies
Thinh Dang and Dustin Moody
2019/1002 ( PDF )
Boomerang Uniformity of Popular S-box Constructions
Shizhu Tian and Christina Boura and Léo Perrin
2019/1001 ( PDF )
Middle-Product Learning with Rounding Problem and its Applications
Shi Bai and Katharina Boudgoust and Dipayan Das and Adeline Roux-Langlois and Weiqiang Wen and Zhenfei Zhang
2019/1000 ( PDF )
Security of Symmetric Primitives against Key-Correlated Attacks
Aisling Connolly and Pooya Farshim and Georg Fuchsbauer
2019/999 ( PDF )
On the Fast Algebraic Immunity of Majority Functions
Pierrick Méaux
2019/998 ( PDF )
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation
Arpita Patra and Divya Ravi
2019/997 ( PDF )
On the (In)security of Kilian-Based SNARGs
James Bartusek and Liron Bronfman and Justin Holmgren and Fermi Ma and Ron Rothblum
2019/996 ( PDF )
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG
Shaanan Cohney and Andrew Kwong and Shachar Paz and Daniel Genkin and Nadia Heninger and Eyal Ronen and Yuval Yarom
2019/995 ( PDF )
Blackbox Constructions from Mix-Nets
Douglas Wikström
2019/994 ( PDF )
A new family of APN quadrinomials
Lilya Budaghyan and Tor Helleseth and Nikolay Kaleyski
2019/993 ( PDF )
Private Set Relations with Bloom Filters for Outsourced SLA Validation
Louis Tajan and Dirk Westhoff and Frederik Armknecht
2019/992 ( PDF )
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms
Tetsu Iwata and Mustafa Khairallah and Kazuhiko Minematsu and Thomas Peyrin
2019/991 ( PDF )
Vectorized linear approximations for attacks on SNOW 3G
Jing Yang and Thomas Johansson and Alexander Maximov
2019/990 ( PDF )
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More
Sanjam Garg and Mohammad Hajiabadi and Rafail Ostrovsky
2019/989 ( PDF )
Substitution Attacks against Message Authentication
Marcel Armour and Bertram Poettering
2019/988 ( PDF )
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications
David W. Archer and Jose Manuel Calderon Trilla and Jason Dagit and Alex J. Malozemoff and Yuriy Polyakov and Kurt Rohloff and Gerard Ryan
2019/987 ( PDF )
Subverting Decryption in AEAD
Marcel Armour and Bertram Poettering
2019/986 ( PDF )
Outpost: A Responsive Lightweight Watchtower
Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer
2019/985 ( PDF )
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts
Philipp Schindler and Aljosha Judmayer and Nicholas Stifter and Edgar Weippl
2019/984 ( PDF )
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions
Sam Kim and David J. Wu
2019/983 ( PDF )
Graph Similarity and Its Applications to Hardware Security
Marc Fyrbiak and Sebastian Wallat and Sascha Reinhard and Nicolai Bissantz and Christof Paar
2019/982 ( PDF )
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions
Toi Tomita and Wakaha Ogata and Kaoru Kurosawa and Ryo Kuwayama
2019/981 ( PDF )
Traceback for End-to-End Encrypted Messaging
Nirvan Tyagi and Ian Miers and Thomas Ristenpart
2019/980 ( PDF )
New Approaches to Traitor Tracing with Embedded Identities
Rishab Goyal and Venkata Koppula and Brent Waters
2019/979 ( PDF )
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks
Kalikinkar Mandal and Guang Gong
2019/978 ( PDF )
Strength in Numbers: Improving Generalization with Ensembles in Profiled Side-channel Analysis
Guilherme Perin and Lukasz Chmielewski and Stjepan Picek
2019/977 ( PDF )
Non-malleable Zero-Knowledge Arguments with Lower Round Complexity
Zhenbin Yan and Yi Deng
2019/976 ( PDF )
Towards real-time hidden speaker recognition by means of fully homomorphic encryption
Martin Zuber and Sergiu Carpov and Renaud Sirdey
2019/975 ( -- withdrawn -- )
Ci-Lock: Cipher Induced Logic Locking Resistant Against SAT Attacks
Akashdeep Saha and Sayandeep Saha and Debdeep Mukhopadhyay and Bhargab Bikram Bhattacharya
2019/974 ( PDF )
Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE
Abdelrahaman Aly and Emmanuela Orsini and Dragos Rotaru and Nigel P. Smart and Tim Wood
2019/973 ( PDF )
On the Non-Existence of Short Vectors in Random Module Lattices
Ngoc Khanh Nguyen
2019/972 ( PDF )
Noninteractive Zero Knowledge Proof System for NP from Ring LWE
Wenping MA
2019/971 ( PDF )
Verifpal: Cryptographic Protocol Analysis for the Real World
Nadim Kobeissi and Georgio Nicolas and Mukesh Tiwari
2019/970 ( -- withdrawn -- )
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol
Xinyu Li and Jing Xu and Xiong Fan and Yuchen Wang and Zhenfeng Zhang
2019/969 ( PDF )
Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography
Russell W. F. Lai and Giulio Malavolta and Viktoria Ronge
2019/968 ( PDF )
There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero
William Black and Ryan Henry
2019/967 ( PDF )
On NIST's Compression Estimate Test
Prasanna Raghaw Mishra and Bhartendu Nandan and Navneet Gaba
2019/966 ( PDF )
Fast, Compact, and Expressive Attribute-Based Encryption
Junichi Tomida and Yuto Kawahara and Ryo Nishimaki
2019/965 ( PDF )
Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness
Andrea Caforio and F Betül Durak and Serge Vaudenay
2019/964 ( PDF )
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited
Georg Fuchsbauer
2019/963 ( PDF )
Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits
Pascal Aubry and Sergiu Carpov and Renaud Sirdey
2019/962 ( PDF )
New Constructions of Hinting PRGs, OWFs with Encryption, and more
Rishab Goyal and Satyanarayana Vusirikala and Brent Waters
2019/961 ( PDF )
Computing across Trust Boundaries using Distributed Homomorphic Cryptography
Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Pierre Hubaux
2019/960 ( PDF )
Another Look at Key Randomisation Hypotheses
Subhabrata Samajder and Palash Sarkar
2019/959 ( PDF )
Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography
Seungkwang Lee and Myungchul Kim
2019/958 ( PDF )
Using SMT Solvers to Automate Chosen Ciphertext Attacks
Gabrielle Beck and Maximilian Zinkus and Matthew Green
2019/957 ( PDF )
TaaS: Commodity MPC via Triples-as-a-Service
Nigel P. Smart and Titouan Tanguy
2019/956 ( PDF )
Security of Hedged Fiat-Shamir Signatures under Fault Attacks
Diego F. Aranha and Claudio Orlandi and Akira Takahashi and Greg Zaverucha
2019/955 ( PDF )
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications
Antonio Faonio and Dario Fiore and Javier Herranz and Carla Rŕfols
2019/954 ( PDF )
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Mohsen Jahanbani and Zeinolabedin Norouzi and Nasour Bagheri
2019/953 ( PDF )
PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge
Ariel Gabizon and Zachary J. Williamson and Oana Ciobotaru
2019/952 ( PDF )
Non-Interactive Zero Knowledge Proofs in the Random Oracle Model
Vincenzo Iovino and Ivan Visconti
2019/951 ( PDF )
Collisions on Feistel-MiMC and univariate GMiMC
Xavier Bonnetain
2019/950 ( PDF )
Another look at some isogeny hardness assumptions
Simon-Philipp Merz and Romy Minko and Christophe Petit
2019/949 ( PDF )
A Note on Parameter Choices of Round5
Yongha Son
2019/948 ( PDF )
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
Prasanna Ravi and Sujoy Sinha Roy and Anupam Chattopadhyay and Shivam Bhasin
2019/947 ( PDF )
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
Fabian Boemer and Anamaria Costache and Rosario Cammarota and Casimir Wierzynski
2019/946 ( PDF )
Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design
M Sazadur Rahman and Adib Nahiyan and Sarah Amir and Fahim Rahman and Farimah Farahmandi and Domenic Forte and Mark Tehranipoor
2019/945 ( PDF )
A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting
Navid Ghaedi Bardeh
2019/944 ( PDF )
Efficient zero-knowledge arguments in the discrete log setting, revisited
Max Hoffmann and Michael Klooß and Andy Rupp
2019/943 ( PDF )
Analysis of Nakamoto Consensus
Ling Ren
2019/942 ( PDF )
Ouroboros Clepsydra: Ouroboros Praos in the Universally Composable Relative Time Model
Handan Kılınç Alper
2019/941 ( PDF )
Does "www." Mean Better Transport Layer Security?
Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
2019/940 ( PDF )
Security analysis of two lightweight certi ficateless signature schemes
Nasrollah Pakniat
2019/939 ( PDF )
Homomorphic Encryption Standard
Martin Albrecht and Melissa Chase and Hao Chen and Jintai Ding and Shafi Goldwasser and Sergey Gorbunov and Shai Halevi and Jeffrey Hoffstein and Kim Laine and Kristin Lauter and Satya Lokam and Daniele Micciancio and Dustin Moody and Travis Morrison and Amit Sahai and Vinod Vaikuntanathan
2019/938 ( PDF )
Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem
Gaëtan Leurent and Ferdinand Sibleyras
2019/937 ( PDF )
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation
Sayandeep Saha and Arnab Bag and Debapriya Basu Roy and Sikhar Patranabis and Debdeep Mukhopadhyay
2019/936 ( PDF )
SNEIK on Microcontrollers: AVR, ARMv7-M, and RISC-V with Custom Instructions
Markku-Juhani O. Saarinen
2019/935 ( -- withdrawn -- )
Interpretable Encrypted Searchable Neural Networks
Kai Chen; Zhongrui Lin; Jian Wan; Chungen Xu.
2019/934 ( PDF )
Linear Approximations of Random Functions and Permutations
Mohsin Khan and Kaisa Nyberg
2019/933 ( PDF )
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy
Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen
2019/932 ( PDF )
Related-key Differential Cryptanalysis of Full Round CRAFT
Muhammad ElSheikh and Amr M. Youssef
2019/931 ( PDF )
Low Weight Discrete Logarithms and Subset Sum in $2^{0.65n}$ with Polynomial Memory
Andre Esser and Alexander May
2019/930 ( PDF )
Module-LWE versus Ring-LWE, Revisited
Yang Wang and Mingqiang Wang
2019/929 ( PDF )
On the Degree-Insensitive SI-GDH problem and assumption
Samuel Dobson and Steven D. Galbraith
2019/928 ( PDF )
Blockchain-enabled Cryptographically-secure Hardware Obfuscation
Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert and Domenic Forte
2019/927 ( PDF )
Isogeny-based hashing despite known endomorphisms
Lorenz Panny
2019/926 ( PDF )
Formal Verification of a Constant-Time Preserving C Compiler
Gilles Barthe and Sandrine Blazy and Benjamin Grégoire and Rémi Hutin and Vincent Laporte and David Pichardie and Alix Trieu
2019/925 ( PDF )
Fully Auditable Privacy-preserving Cryptocurrency Against Malicious Auditors
Wulu Li and Yongcan Wang and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2019/924 ( PDF )
Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework
Dirk Achenbach and Roland Gröll and Timon Hackenjos and Alexander Koch and Bernhard Löwe and Jeremias Mechler and Jörn Müller-Quade and Jochen Rill
2019/923 ( PDF )
Automated Probe Repositioning for On-Die EM Measurements
Bastian Richter and Alexander Wild and Amir Moradi
2019/922 ( PDF )
A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation
Karim Eldefrawy and Vitor Pereira
2019/921 ( PDF )
Tree authenticated ephemeral keys
Pavol Zajac
2019/920 ( PDF )
Related-Key Differential Slide Attack Against Fountain V1
Raluca Posteuca
2019/919 ( PDF )
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection (extended version∗)
Wei Cheng and Claude Carlet and Kouassi Goli and Sylvain Guilley and Jean-Luc Danger
2019/918 ( PDF )
Resolving the Trilemma in Logic Encryption
Hai Zhou and Amin Rezaei and Yuanqi Shen
2019/917 ( PDF )
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
Shixiong Wang and Juanyang Zhang and Jingnan He and Huaxiong Wang and Chao Li
2019/916 ( -- withdrawn -- )
Multi-owner Secure Encrypted Search Using Searching Adversarial Networks
Kai Chen; Zhongrui Lin; Jian Wan; Lei Xu; Chungen Xu.
2019/915 ( PDF )
Unique Rabin-Williams Signature Scheme Decryption
Lynn Margaret Batten and Hugh Cowie Williams
2019/914 ( PDF )
Composable and Finite Computational Security of Quantum Message Transmission
Fabio Banfi and Ueli Maurer and Christopher Portmann and Jiamin Zhu
2019/913 ( PDF )
Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — An Analytical Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography
Wen-Ran Zhang
2019/912 ( PDF )
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting
David Derler and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks
2019/911 ( PDF )
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
Gildas Avoine and Sébastien Canard and Loďc Ferreira
2019/910 ( PDF )
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto
Tobias Schneider and Clara Paglialonga and Tobias Oder and Tim Güneysu
2019/909 ( PDF )
A Practicable Timing Attack Against HQC and its Countermeasure
Guillaume Wafo-Tapa and Slim Bettaieb and Loic Bidoux and Philippe Gaborit and Etienne Marcatel
2019/908 ( PDF )
Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security
Benoît Libert and Khoa Nguyen and Alain Passelčgue and Radu Titiu
2019/907 ( PDF )
Practical Forgery Attacks on Limdolen and HERN
Raghvendra Rohit and Guang Gong
2019/906 ( PDF )
Efficient and secure software implementations of Fantomas
Rafael J. Cruz and Antonio Guimarăes and Diego F. Aranha
2019/905 ( -- withdrawn -- )
The Power of NIST Cryptographic Tests Suite
Paul Burciu and Emil Simion
2019/904 ( PDF )
Timed-Release Encryption With Master Time Bound Key (Full Version)
Gwangbae Choi and Serge Vaudenay
2019/903 ( PDF )
Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases
Igor Semaev and Andrea Tenti
2019/902 ( PDF )
Fractional LWE: a nonlinear variant of LWE
Gérald Gavin and Stéphane Bonnevay
2019/901 ( PDF )
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs
Thomas Haines and Clementine Gritti
2019/900 ( -- withdrawn -- )
Multi-client Secure Encrypted Search Using Searching Adversarial Networks
Kai Chen; Zhongrui Lin; Jian Wan; Lei Xu; Chungen Xu.
2019/899 ( PDF )
A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P
Michael Yonli
2019/898 ( PDF )
One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips
Mehdi Tibouchi and Alexandre Wallet
2019/897 ( PDF )
On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem
Vasyl Ustimenko
2019/896 ( PDF )
On the optionality and fairness of Atomic Swaps
Runchao Han and Haoyu Lin and Jiangshan Yu
2019/895 ( PDF )
The Singularity Attack to the Multivariate Signature Scheme Himq-3
Jintai Ding and Zheng Zhang and Joshua Deaton and Vishakha
2019/894 ( PDF )
BioID: a Privacy-Friendly Identity Document
Fatih Balli and F. Betül Durak and Serge Vaudenay
2019/893 ( PDF )
New Efficient, Constant-Time Implementations of Falcon
Thomas Pornin
2019/892 ( PDF )
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
Patrick Kresmer and Alexander Zeh
2019/891 ( PDF )
Shielded Computations in Smart Contracts Overcoming Forks
Vincenzo Botta and Daniele Friolo and Daniele Venturi and Ivan Visconti
2019/890 ( PDF )
An Adaptive Attack on 2-SIDH
Samuel Dobson and Steven D. Galbraith and Jason LeGrow and Yan Bo Ti and Lukas Zobernig
2019/889 ( PDF )
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Anders Dalskov and Marcel Keller and Claudio Orlandi and Kris Shrishak and Haya Shulman
2019/888 ( PDF )
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed
Mustafa Khairallah
2019/887 ( PDF )
Accelerating V2X Cryptography through Batch Operations
Paul Bottinelli and Robert Lambert
2019/886 ( PDF )
Round Complexity of Byzantine Agreement, Revisited
T-H. Hubert Chan and Rafael Pass and Elaine Shi
2019/885 ( PDF )
On the alpha value of polynomials in the tower number field sieve algorithm
Aurore Guillevic and Shashank Singh
2019/884 ( PDF )
Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures
Mahesh Sreekumar Rajasree
2019/883 ( PDF )
HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication
Donghang Lu and Thomas Yurek and Samarth Kulshreshtha and Rahul Govind and Rahul Mahadev and Aniket Kate and Andrew Miller
2019/882 ( PDF )
Modifying The Tropical Version of Stickel’s Key Exchange Protocol
Any Muanalifah and Serge˘ı Sergeev
2019/881 ( PDF )
On the Boomerang Uniformity of some Permutation Polynomials
Marco Calderini and Irene Villa
2019/880 ( PDF )
A Blockchain-Based Access Control Scheme for Smart Grids
Yuyang Zhou and Yuanfeng Guan and Zhiwei Zhang and Fagen Li
2019/879 ( PDF )
Cube-Based Cryptanalysis of Subterranean-SAE
Fukang Liu and Takanori Isobe and Willi Meier
2019/878 ( PDF )
Algebraically Structured LWE, Revisited
Chris Peikert and Zachary Pepin
2019/877 ( PDF )
Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model
Georg Fuchsbauer and Antoine Plouviez and Yannick Seurin
2019/876 ( PDF )
Kadcast: A Structured Approach to Broadcast in Blockchain Networks
Elias Rohrer and Florian Tschorsch
2019/875 ( PDF )
Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication
Daan Leermakers and Boris Skoric
2019/874 ( PDF )
ABDKS Attribute-Based Encryption with Dynamic Keyword Search in Fog Computing
Fei Meng and Mingqiang Wang
2019/873 ( PDF )
Count of rotational symmetric bent Boolean functions
Shashi Kant Pandey and P.R. Mishra
2019/872 ( PDF )
Efficient Information-Theoretic Secure Multiparty Computation over $\mathbb{Z}/p^k \mathbb{Z}$ via Galois Rings
Mark Abspoel and Ronald Cramer and Ivan Damgĺrd and Daniel Escudero and Chen Yuan
2019/871 ( PDF )
Non-Locality and Zero-Knowledge MIPs
Claude Crépeau and Nan Yang
2019/870 ( PDF )
The Eleventh Power Residue Symbol
Marc Joye and Oleksandra Lapiha and Ky Nguyen and David Naccache
2019/869 ( PDF )
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
Aritra Dhar and Enis Ulqinaku and Kari Kostiainen and Srdjan Capkun
2019/868 ( PDF )
On the Round Complexity of Randomized Byzantine Agreement
Ran Cohen and Iftach Haitner and Nikolaos Makriyannis and Matan Orland and Alex Samorodnitsky
2019/867 ( PDF )
A Practical Forgery Attack on Lilliput-AE
Orr Dunkelman and Nathan Keller and Eran Lambooij and Yu Sasaki
2019/866 ( PDF )
A Fast Characterization Method for Semi-invasive Fault Injection Attacks
Lichao Wu and Gerard Ribera and Noemie Beringuier-Boher and Stjepan Picek
2019/865 ( PDF )
Cryptanalysis of Reduced-Round SipHash
Le He and Hongbo Yu
2019/864 ( -- withdrawn -- )
Another Look at Byzantine Fault Tolerance
Yongge Wang
2019/863 ( PDF )
Fast Actively Secure Five-Party Computation with Security Beyond Abort
Megha Byali and Carmit Hazay and Arpita Patra and Swati Singla
2019/862 ( PDF )
Key recovery attacks on the Legendre PRFs within the birthday bound
Dmitry Khovratovich
2019/861 ( PDF )
A Tale of Three Signatures: practical attack of ECDSA with wNAF
Gabrielle De Micheli and Rémi Piau and Cécile Pierrot
2019/860 ( PDF )
Machine learning and side channel analysis in a CTF competition
Yongbo Hu and Yeyang Zheng and Pengwei Feng and Lirui Liu and Chen Zhang and Aron Gohr and Sven Jacob and Werner Schindler and Ileana Buhan and Karim Tobich
2019/859 ( PDF )
A Coin-Free Oracle-Based Augmented Black Box Framework
Kyosuke Yamashita and Mehdi Tibouchi and Masayuki Abe
2019/858 ( PDF )
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH
Eric Crockett and Christian Paquin and Douglas Stebila
2019/857 ( PDF )
Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies
Karl Wüst and Loris Diana and Kari Kostiainen and Ghassan Karame and Sinisa Matetic and Srdjan Capkun
2019/856 ( PDF )
More results on Shortest Linear Programs
Subhadeep Banik and Yuki Funabiki and Takanori Isobe
2019/855 ( PDF )
WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery
Dominic Dams and Jeff Lataille and Rino Sanchez and John Wade
2019/854 ( PDF )
Reducing the Cost of Implementing AES as a Quantum Circuit
Brandon Langenberg and Hai Pham and Rainer Steinwandt
2019/853 ( PDF )
A critique of game-based definitions of receipt-freeness for voting
Ashley Fraser and Elizabeth A. Quaglia and Ben Smyth
2019/852 ( PDF )
Weak-Key Distinguishers for AES
Lorenzo Grassi and Gregor Leander and Christian Rechberger and Cihangir Tezcan and Friedrich Wiemer
2019/851 ( PDF )
On Designing Lightweight RFID Security Protocols for Medical IoT
Masoumeh Safkhani and Ygal Bendavid and Samad Rostampour and Nasour Bagheri
2019/850 ( PDF )
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles
Morteza Adeli and Nasour Bagheri
2019/849 ( PDF )
Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems
Ambili K N and Jimmy Jose
2019/848 ( PDF )
Observations on the DLCT and Absolute Indicators
Anne Canteaut and Lukas Kölsch and Friedrich Wiemer
2019/847 ( PDF )
Improved Heuristics for Short Linear Programs
Quan Quan Tan and Thomas Peyrin
2019/846 ( PDF )
Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions
Yuechen Chen and Linru Zhang and Siu-Ming Yiu
2019/845 ( PDF )
A Reaction Attack against Cryptosystems based on LRPC Codes
Simona Samardjiska and Paolo Santini and Edoardo Persichetti and Gustavo Banegas
2019/844 ( PDF )
pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4
Matthias J. Kannwischer and Joost Rijneveld and Peter Schwabe and Ko Stoffelen
2019/843 ( PDF )
How to Construct CSIDH on Edwards Curves
Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi
2019/842 ( PDF )
Improved SIMD Implementation of Poly1305
Sreyosi Bhattacharyya and Palash Sarkar
2019/841 ( PDF )
Practical Cryptanalysis of k-ary C*
Daniel Smith-Tone
2019/840 ( PDF )
A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function to TPMS
Yuhei Watanabe and Hideki Yamamoto and Hirotaka Yoshida
2019/839 ( PDF )
Statistical Zap Arguments from Quasi-Polynomial LWE
Abhishek Jain and Zhengzhong Jin
2019/838 ( PDF )
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake
Christian Badertscher and Peter Gaži and Aggelos Kiayias and Alexander Russell and Vassilis Zikas
2019/837 ( PDF )
Stronger and Faster Side-Channel Protections for CSIDH
Daniel Cervantes-Vázquez and Mathilde Chenu and Jesús-Javier Chi-Domínguez and Luca De Feo and Francisco Rodríguez-Henríquez and Benjamin Smith
2019/836 ( PDF )
Optimal Transport Layer for Secure Computation
Markus Brandt and Claudio Orlandi and Kris Shrishak and Haya Shulman
2019/835 ( PDF )
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
Karl Wüst and Sinisa Matetic and Silvan Egli and Kari Kostiainen and Srdjan Capkun
2019/834 ( PDF )
Succinct Arguments in the Quantum Random Oracle Model
Alessandro Chiesa and Peter Manohar and Nicholas Spooner
2019/833 ( PDF )
AES MixColumn with 92 XOR gates
Alexander Maximov
2019/832 ( PDF )
Asymptotically-Good Arithmetic Secret Sharing over Z/(p^\ell Z) with Strong Multiplication and Its Applications to Efficient MPC
Ronald Cramer and Matthieu Rambaud and Chaoping Xing
2019/831 ( PDF )
Privacy of Stateful RFID Systems with Constant Tag Identifiers
Cristian Hristea and Ferucio Laurentiu Tiplea
2019/830 ( PDF )
The Simplest Multi-key Linearly Homomorphic Signature Scheme
Diego F. Aranha and Elena Pagnin
2019/829 ( PDF )
Batch Binary Weierstrass
Billy Bob Brumley and Sohaib ul Hassan and Alex Shaindlin and Nicola Tuveri and Kide Vuojärvi
2019/828 ( PDF )
Optimal Collision Side-Channel Attacks
Cezary Glowacz and Vincent Grosso
2019/827 ( PDF )
k-root-n: An efficient algorithm for avoiding short term double-spending alongside distributed ledger technologies such as blockchain
Zvi Schreiber
2019/826 ( PDF )
Modular Multiplication Algorithm Suitable For Low-Latency Circuit Implementations
Erdinç Öztürk
2019/825 ( PDF )
Plaintext Recovery Attacks against XTS Beyond Collisions
Takanori Isobe and Kazuhiko Minematsu
2019/824 ( PDF )
Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look
Behnaz Rezvani and Flora Coleman and Sachin Sachin and William Diehl
2019/823 ( PDF )
Securely Sampling Biased Coins with Applications to Differential Privacy
Jeffrey Champion and abhi shelat and Jonathan Ullman
2019/822 ( PDF )
Surveying definitions of coercion resistance
Thomas Haines and Ben Smyth
2019/821 ( PDF )
Towards Forward Secure Internet Traffic
Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
2019/820 ( PDF )
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query
Asma Aloufi and Peizhao Hu and Hang Liu and Sherman S. M. Chow
2019/819 ( PDF )
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption
Asma Aloufi and Peizhao Hu and Harry W. H. Wong and Sherman S. M. Chow
2019/818 ( PDF )
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
Debayan Das and Anupam Golder and Josef Danial and Santosh Ghosh and Arijit Raychowdhury and Shreyas Sen
2019/817 ( PDF )
Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions
Tapas Pal and Ratna Dutta
2019/816 ( PDF )
Crisis: Probabilistically Self Organizing Total Order in Unstructured P2P Networks
Mirco Richter
2019/815 ( -- withdrawn -- )
A Note on the Static-Static Key Agreement Protocol from Supersingular Isogenies
Selçuk Kayacan
2019/814 ( PDF )
Faster Subgroup Checks for BLS12-381
Sean Bowe
2019/813 ( PDF )
Multi-Client Symmetric Searchable Encryption with Forward Privacy
Alexandros Bakas and Antonis Michalas
2019/812 ( PDF )
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
Chaoyun Li and Bart Preneel
2019/811 ( PDF )
SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage
Ioannis Demertzis and Dimitrios Papadopoulos and Charalampos Papamanthou and Saurabh Shintre
2019/810 ( PDF )
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs
Jeroen Delvaux
2019/809 ( PDF )
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
Yosuke Todo and Willi Meier and Kazumaro Aoki
2019/808 ( PDF )
2-Message Publicly Verifiable WI from (Subexponential) LWE
Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs
2019/807 ( PDF )
Provably Secure PKI Schemes
Hemi Leibowitz and Amir Herzberg and Ewa Syta
2019/806 ( PDF )
Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes
Eugene Pilyankevich and Dmytro Kornieiev and Artem Storozhuk
2019/805 ( PDF )
RRTxFM: Probabilistic Counting for Differentially Private Statistics
Saskia Nuńez von Voigt and Florian Tschorsch
2019/804 ( PDF )
Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions
Claire Delaplace and Andre Esser and Alexander May
2019/803 ( PDF )
Methodology for Efficient CNN Architectures in Profiling Attacks -- Extended Version
Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli
2019/802 ( PDF )
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes
Alexander Maximov and Patrik Ekdahl
2019/801 ( PDF )
A Chosen Random Value Attack on WPA3 SAE authentication protocol
Sheng Sun
2019/800 ( PDF )
Can we Beat the Square Root Bound for ECDLP over $\mathbb{F}_{p^2}$ via Representations?
Claire Delaplace and Alexander May
2019/799 ( PDF )
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance
Nils Wisiol and Georg T. Becker and Marian Margraf and Tudor A. A. Soroceanu and Johannes Tobisch and Benjamin Zengin
2019/798 ( PDF )
A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods
Kwangsu Lee
2019/797 ( PDF )
Don't forget your roots: constant-time root finding over $\mathbb{F}_{2^m}$
Douglas Martins and Gustavo Banegas and Ricardo Custodio
2019/796 ( PDF )
The End of Logic Locking? A Critical View on the Security of Logic Locking
Susanne Engels and Max Hoffmann and Christof Paar
2019/795 ( PDF )
More Practical Single-Trace Attacks on the Number Theoretic Transform
Peter Pessl and Robert Primas
2019/794 ( PDF )
Efficient Cryptography on the RISC-V Architecture
Ko Stoffelen
2019/793 ( PDF )
On equivalence between known families of quadratic APN functions
Lylia Budaghyan and Marco Calderini and Irene Villa
2019/792 ( PDF )
TICK: Tiny Client for Blockchains
Wei Zhang and Jiangshan Yu and Qingqiang He and Nan Zhang and Nan Guan
2019/791 ( PDF )
Sublattice Attacks on LWE over Arbitrary Number Field Lattices
Hao Chen
2019/790 ( PDF )
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication
Wei Jiang and Adam Bowers and Dan Lin
2019/789 ( PDF )
Relation between o-equivalence and EA-equivalence for Niho bent functions
Diana Davidova and Lilya Budaghyan and Claude Carlet and Tor Helleseth and Ferdinand Ihringer and Tim Penttila
2019/788 ( PDF )
The Impact of Time on DNS Security
Aanchal Malhotra and Willem Toorop and Benno Overeinder and Ralph Dolmans and Sharon Goldberg
2019/787 ( PDF )
Optimized implementation of the NIST PQC submission ROLLO on microcontroller
Jérôme Lablanche and Lina Mortajine and Othman Benchaalal and Pierre-Louis Cayrel and Nadia El Mrabet
2019/786 ( PDF )
P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation
Rebecca Schwerdt and Matthias Nagel and Valerie Fetzer and Tobias Gräf and Andy Rupp
2019/785 ( PDF )
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography
Yalin Chen and Jue-Sam Chou and Liang-Chun Wang and Yu-Yuan Chou
2019/784 ( PDF )
Towards a Hybrid Public Key Infrastructure (PKI): A Review
Priyadarshi Singh and Abdul Basit and N Chaitanya Kumar and V. Ch. Venkaiah
2019/783 ( PDF )
Dissecting the CHES 2018 AES Challenge
Tobias Damm and Sven Freud and Dominik Klein
2019/782 ( PDF )
Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms
Antoine Joux and Cecile Pierrot
2019/781 ( PDF )
BBQ: Using AES in Picnic Signatures
Cyprien Delpech de Saint Guilhem and Lauren De Meyer and Emmanuela Orsini and Nigel P. Smart
2019/780 ( PDF )
Statistical ZAP Arguments
Saikrishna Badrinarayan and Rex Fernando and Aayush Jain and Dakshita Khurana and Amit Sahai
2019/779 ( PDF )
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures
Dennis Jackson and Cas Cremers and Katriel Cohn-Gordon and Ralf Sasse
2019/778 ( PDF )
A Composable Security Treatment of the Lightning Network
Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos
2019/777 ( PDF )
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
Jörg Schwenk and Douglas Stebila
2019/776 ( PDF )
Scalable Private Set Union from Symmetric-Key Techniques
Vladimir Kolesnikov and Mike Rosulek and Ni Trieu and Xiao Wang
2019/775 ( PDF )
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies
Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gazi and Sarah Meiklejohn and Edgar Weippl
2019/774 ( PDF )
Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness
Hamidreza Amini Khorasgani and Hemanta Maji and Tamalika Mukherjee
2019/773 ( PDF )
Efficient Secure Ridge Regression from Randomized Gaussian Elimination
Frank Blom and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede
2019/772 ( PDF )
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
Lorenzo Grassi and Markus Schofnegger
2019/771 ( PDF )
DDH-based Multisignatures with Public Key Aggregation
Duc-Phong Le and Guomin Yang and Ali Ghorbani
2019/770 ( PDF )
Practical Attacks on Reduced-Round AES
Navid Ghaedi Bardeh and Sondre Rřnjom
2019/769 ( PDF )
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates
Prasanna Ravi and Mahabir Prasad Jhanwar and James Howe and Anupam Chattopadhyay and Shivam Bhasin
2019/768 ( PDF )
Distributing any Elliptic Curve Based Protocol
Nigel P. Smart and Younes Talibi Alaoui
2019/767 ( PDF )
On cryptographic parameters of permutation polynomials of the form $x^rh(x^{(q-1)/d})$
Jaeseong Jeong and Chang Heon Kim and Namhun Koo and Soonhak Kwon and Sumin Lee
2019/766 ( PDF )
Complexity of Estimating Renyi Entropy of Markov Chains
Maciej Obremski and Maciej Skorski
2019/765 ( PDF )
SPQCop: Side-channel protected Post-Quantum Cryptoprocessor
Arpan Jati and Naina Gupta and Anupam Chattopadhyay and Somitra Kumar Sanadhya
2019/764 ( PDF )
The Adversarial Robustness of Sampling
Omri Ben-Eliezer and Eylon Yogev
2019/763 ( PDF )
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Shichang Wang and Meicheng Liu and Dongdai Lin and Li Ma
2019/762 ( PDF )
Verifiable Computing for Approximate Computation
Shuo Chen and Jung Hee Cheon and Dongwoo Kim and Daejun Park
2019/761 ( PDF )
Athena: A verifiable, coercion-resistant voting system with linear complexity
Ben Smyth
2019/760 ( PDF )
Differential Fault Analysis of NORX
Amit Jana and Dhiman Saha and Goutam Paul
2019/759 ( PDF )
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Onur Günlü and Onurcan Iscan and Vladimir Sidorenko and Gerhard Kramer
2019/758 ( PDF )
Genus 2 Supersingular Isogeny Oblivious Transfer
Ramsčs Fernŕndez-Valčncia
2019/757 ( PDF )
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider
Jonathan Protzenko and Bryan Parno and Aymeric Fromherz and Chris Hawblitzel and Marina Polubelova and Karthikeyan Bhargavan and Benjamin Beurdouche and Joonwon Choi and Antoine Delignat-Lavaud and Cedric Fournet and Natalia Kulatova and Tahina Ramananandro and Aseem Rastogi and Nikhil Swamy and Christoph Wintersteiger and Santiago Zanella-Beguelin
2019/756 ( PDF )
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures
Pantea Kiaei and Darius Mercadier and Pierre-Evariste Dagand and Karine Heydemann and Patrick Schaumont
2019/755 ( PDF )
Generic Attacks on Hash Combiners
Zhenzhen Bao and Itai Dinur and Jian Guo and Gaëtan Leurent and Lei Wang
2019/754 ( PDF )
Is it Easier to Prove Theorems that are Guaranteed to be True?
Rafael Pass and Muthuramakrishnan Venkitasubramaniam
2019/753 ( PDF )
Design of Anonymous Endorsement System in Hyperledger Fabric
Subhra Mazumdar and Sushmita Ruj
2019/752 ( PDF )
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains
Runchao Han and Zhimei Sui and Jiangshan Yu and Joseph Liu and Shiping Chen
2019/751 ( PDF )
Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic
Thorsten Kleinjung and Benjamin Wesolowski
2019/750 ( PDF )
A Short Note on a Weight Probability Distribution Related to SPNs
Sondre Rřnjom
2019/749 ( PDF )
The privacy of the TLS 1.3 protocol
Ghada Arfaoui and Xavier Bultel and Pierre-Alain Fouque and Adina Nedelcu and Cristina Onete
2019/748 ( PDF )
Temporary Censorship Attacks in the Presence of Rational Miners
Fredrik Winzer and Benjamin Herd and Sebastian Faust
2019/747 ( PDF )
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
Rupeng Yang and Man Ho Au and Zhenfei Zhang and Qiuliang Xu and Zuoxia Yu and William Whyte
2019/746 ( PDF )
Public-Key Function-Private Hidden Vector Encryption (and More)
James Bartusek and Brent Carmer and Abhishek Jain and Zhengzhong Jin and Tancrčde Lepoint and Fermi Ma and Tal Malkin and Alex J. Malozemoff and Mariana Raykova
2019/745 ( PDF )
Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation
Vincenzo Iovino
2019/744 ( PDF )
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection
Devin Reich and Ariel Todoki and Rafael Dowsley and Martine De Cock and Anderson C. A. Nascimento
2019/743 ( PDF )
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature
Yangguang Tian and Yingjiu Li and Robert. H Deng and Binanda Sengupta and Guomin Yang
2019/742 ( PDF )
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling
William Diehl and Abubakr Abdulgadir and Jens-Peter Kaps
2019/741 ( PDF )
Comprehensive security analysis of CRAFT
Hosein Hadipour and Sadegh Sadeghi and Majid M. Niknam and Nasour Bagheri
2019/740 ( PDF )
A Secure Publish/Subscribe Protocol for Internet of Things
Lukas Malina and Gautam Srivastava and Petr Dzurenda and Jan Hajny and Radek Fujdiak
2019/739 ( PDF )
A Survey on Authenticated Encryption -- ASIC Designer's Perspective
Elif Bilge Kavun and Hristina Mihajloska and Tolga Yalcin
2019/738 ( -- withdrawn -- )
Scrutinizing the Tower Field Implementation of the $\mathbb{F}_{2^8}$ Inverter -- with Applications to AES, Camellia, and SM4
Zihao Wei and Siwei Sun and Lei Hu and Man Wei and Joan Boyar and Rene Peralta
2019/737 ( PDF )
Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters
Katriel Cohn-Gordon and Cas Cremers and Kristian Gjřsteen and Hĺkon Jacobsen and Tibor Jager
2019/736 ( PDF )
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE
Hao Chen and Ilaria Chillotti and Ling Ren
2019/735 ( PDF )
SoK of Used Cryptography in Blockchain
Mayank Raikwar and Danilo Gligoroski and Katina Kralevska
2019/734 ( PDF )
From Usability to Secure Computing and Back Again
Lucy Qin and Andrei Lapets and Frederick Jansen and Peter Flockhart and Kinan Dak Albab and Ira Globus-Harris and Shannon Roberts and Mayank Varia
2019/733 ( PDF )
Compressible FHE with Applications to PIR
Craig Gentry and Shai Halevi
2019/732 ( PDF )
Fully Homomorphic NIZK and NIWI Proofs
Prabhanjan Ananth and Apoorvaa Deshpande and Yael Tauman Kalai and Anna Lysyanskaya
2019/731 ( PDF )
On the Complexity of ``Superdetermined'' Minrank Instances
Javier Verbel and John Baena and Daniel Cabarcas and Ray Perlner and Daniel Smith-Tone
2019/730 ( PDF )
PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH
Vladimir Soukharev and Basil Hess
2019/729 ( PDF )
Linear Complexity of A Family of Binary pq2 -periodic Sequences From Euler Quotients
Jingwei Zhang and Shuhong Gao and Chang-An Zhao
2019/728 ( PDF )
Verifying Solutions to LWE with Implications for Concrete Security
Palash Sarkar and Subhadip Singha
2019/727 ( PDF )
Iterative Differential Characteristic of TRIFLE-BC
Fukang Liu and Takanori Isobe
2019/726 ( PDF )
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange
Pedro Branco and Jintai Ding and Manuel Goulăo and Paulo Mateus
2019/725 ( PDF )
He Gives C-Sieves on the CSIDH
Chris Peikert
2019/724 ( PDF )
Breaking Tweakable Enciphering Schemes using Simon's Algorithm
Sebati Ghosh and Palash Sarkar
2019/723 ( PDF )
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality
Mihaela Ion and Ben Kreuter and Ahmet Erhan Nergiz and Sarvar Patel and Mariana Raykova and Shobhit Saxena and Karn Seth and David Shanahan and Moti Yung
2019/722 ( PDF )
Neural Network Model Assessment for Side-Channel Analysis
Guilherme Perin and Baris Ege and Lukasz Chmielewski
2019/721 ( PDF )
Optimized SIKE Round 2 on 64-bit ARM
Hwajeong Seo and Amir Jalali and Reza Azarderakhsh
2019/720 ( PDF )
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles
Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta
2019/719 ( -- withdrawn -- )
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes
Mir Tanjidur Rahman and Shahin Tajik and M. Sazadur Rahman and Mark Tehranipoor and Navid Asadizanjani
2019/718 ( PDF )
Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority
Marina Blanton and Ahreum Kang and Chen Yuan
2019/717 ( PDF )
Homomorphism learning problems and its applications to public-key cryptography
Christopher Leonardi and Luis Ruiz-Lopez
2019/716 ( PDF )
On the Quantum Complexity of the Continuous Hidden Subgroup Problem
Koen de Boer and Léo Ducas and Serge Fehr
2019/715 ( PDF )
On the Security of Lattice-based Fiat-Shamir Signatures in the Presence of Randomness Leakage
Yuejun Liu and Yongbin Zhou and Shuo Sun and Tianyu Wang and Rui Zhang and Jingdian Ming
2019/714 ( PDF )
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT
Boxin Zhao and Xiaoyang Dong and Willi Meier and Keting Jia and Gaoli Wang
2019/713 ( PDF )
Public Ledger for Sensitive Data
Riccardo Longo and Massimiliano Sala
2019/712 ( PDF )
SimpleENC and SimpleENCsmall -- an Authenticated Encryption Mode for the Lightweight Setting
Shay Gueron and Yehuda Lindell
2019/711 ( PDF )
SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation
Brian Koziel and A-Bon Ackie and Rami El Khatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2019/710 ( -- withdrawn -- )
A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0
Qianying Zhang and Shijun Zhao and Zhiping Shi and Yong Guan and Guohui Wang
2019/709 ( PDF )
Secure Computation for Cloud data Storage
Davood Rezaeipour
2019/708 ( PDF )
Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions
Luís T. A. N. Brandăo and Çağdaş Çalık and Meltem Sönmez Turan and René Peralta
2019/707 ( PDF )
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions
Olivier Blazy and Céline Chevalier and Quoc Huy Vu
2019/706 ( PDF )
Endemic Oblivious Transfer
Daniel Masny and Peter Rindal
2019/705 ( PDF )
Commodity-Based 2PC for Arithmetic Circuits
Ivan Damgĺrd and Helene Haagh and Michael Nielsen and Claudio Orlandi
2019/704 ( PDF )
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains
Adriano Di Luzio and Danilo Francati and Giuseppe Ateniese
2019/703 ( PDF )
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation
Carolyn Whitnall and Elisabeth Oswald
2019/702 ( PDF )
Cryptanalysis of Plantlet
Subhadeep Banik and Khashayar Barooti and Takanori Isobe
2019/701 ( PDF )
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs
Hiroaki Anada
2019/700 ( PDF )
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Yusuke Naito and Mitsuru Matsui and Takeshi Sugawara and Daisuke Suzuki
2019/699 ( PDF )
Tight quantum security of the Fiat-Shamir transform for commit-and-open identification schemes with applications to post-quantum signature schemes
André Chailloux
2019/698 ( PDF )
A Formal Treatment of Deterministic Wallets
Poulami Das and Sebastian Faust and Julian Loss
2019/697 ( PDF )
Breaking ACORN with a Single Fault
Elena Dubrova
2019/696 ( PDF )
Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments
Masayuki Abe and Miguel Ambrona and Miyako Ohkubo
2019/695 ( PDF )
An Efficient Secure Three-Party Sorting Protocol with an Honest Majority
Koji Chida and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Naoto Kiribuchi and Benny Pinkas
2019/694 ( PDF )
A Unified and Composable Take on Ratcheting
Daniel Jost and Ueli Maurer and Marta Mularczyk
2019/693 ( PDF )
Security-Efficiency Tradeoffs in Searchable Encryption -- Lower Bounds and Optimal Constructions
Raphael Bost and Pierre-Alain Fouque
2019/692 ( PDF )
Synchronous Consensus with Optimal Asynchronous Fallback Guarantees
Erica Blum and Jonathan Katz and Julian Loss
2019/691 ( PDF )
Comparing proofs of security for lattice-based encryption
Daniel J. Bernstein
2019/690 ( PDF )
Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks
Changhai Ou and Siew-Kei Lam and Guiyuan Jiang
2019/689 ( PDF )
On-Device Power Analysis Across Hardware Security Domains
Colin O'Flynn and Alex Dewar
2019/688 ( PDF )
Better Bootstrapping for Approximate Homomorphic Encryption
Kyoohyung Han and Dohyeong Ki
2019/687 ( PDF )
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography
Zhengfeng Ji and Youming Qiao and Fang Song and Aaram Yun
2019/686 ( PDF )
On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations
Nir Bitansky and Akshay Degwekar
2019/685 ( PDF )
Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5
Markku-Juhani O. Saarinen
2019/684 ( PDF )
Revelio: A MimbleWimble Proof of Reserves Protocol
Arijit Dutta and Saravanan Vijayakumaran
2019/683 ( PDF )
The Notion of Transparency Order, Revisited
Huizhong Li and Yongbin Zhou and Jingdian Ming and Guang Yang and Chengbin Jin
2019/682 ( PDF )
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Alexandros Bakas and Antonis Michalas
2019/681 ( PDF )
Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?
Ayesha Khalid and Sarah McCarthy and Weiqiang Liu and Maire O’Neill
2019/680 ( PDF )
Non-Commutative Ring Learning With Errors From Cyclic Algebras
Charles Grover and Cong Ling and Roope Vehkalahti
2019/679 ( PDF )
Forgery Attacks on FlexAE and FlexAEAD
Maria Eichlseder and Daniel Kales and Markus Schofnegger
2019/678 ( PDF )
A Modified pqsigRM: RM Code-Based Signature Scheme
Yongwoo Lee and Wijik Lee and Young-Sik Kim and Jong-Seon No
2019/677 ( PDF )
A Note on Lower Digits Extraction Polynomial for Bootstrapping
Mingjia Huo and Kewen Wu and Qi Ye
2019/676 ( PDF )
Robust and Scalable Consensus for Sharded Distributed Ledgers
Eleftherios Kokoris-Kogias
2019/675 ( PDF )
Balance: Dynamic Adjustment of Cryptocurrency Deposits
Dominik Harz and Lewis Gudgeon and Arthur Gervais and William J. Knottenbelt
2019/674 ( PDF )
Polar Sampler: Discrete Gaussian Sampling over the Integers Using Polar Codes
Jiabo Wang and Cong Ling
2019/673 ( PDF )
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
Ahto Buldas and Denis Firsov and Risto Laanoja and Henri Lakk and Ahto Truu
2019/672 ( PDF )
A Blockchain-Assisted Hash-Based Signature Scheme
Ahto Buldas and Risto Laanoja and Ahto Truu
2019/671 ( PDF )
A Server-Assisted Hash-Based Signature Scheme
Ahto Buldas and Risto Laanoja and Ahto Truu
2019/670 ( PDF )
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks
Vahid Amin Ghafari and Honggang Hu and Fujiang Lin
2019/669 ( PDF )
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
Yunwen Liu and Yu Sasaki
2019/668 ( PDF )
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao
2019/667 ( PDF )
PPAD-Hardness via Iterated Squaring Modulo a Composite
Arka Rai Choudhuri and Pavel Hubacek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum
2019/666 ( PDF )
On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling
Zheng Wang and Cong Ling
2019/665 ( PDF )
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption
Jintai Ding and Pedro Branco and Kevin Schmitt
2019/664 ( PDF )
How Diversity Affects Deep-Learning Side-Channel Attacks
Huanyu Wang and Martin Brisfors and Sebastian Forsmark and Elena Dubrova
2019/663 ( PDF )
Can Verifiable Delay Functions be Based on Random Oracles?
Mohammad Mahmoody and Caleb Smith and David J. Wu
2019/662 ( PDF )
Agree-and-Prove: Generalized Proofs Of Knowledge and Applications
Christian Badertscher and Daniel Jost and Ueli Maurer
2019/661 ( PDF )
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis
Shivam Bhasin and Anupam Chattopadhyay and Annelie Heuser and Dirmanto Jap and Stjepan Picek and Ritu Ranjan Shrivastwa
2019/660 ( PDF )
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling
Zheng Wang and Cong Ling
2019/659 ( PDF )
Tight Verifiable Delay Functions
Nico Döttling and Sanjam Garg and Giulio Malavolta and Prashant Nalini Vasudevan
2019/658 ( PDF )
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest
Jun Furukawa and Yehuda Lindell
2019/657 ( PDF )
Multi-Party PSM, Revisited
Leonard Assouline and Tianren Liu
2019/656 ( -- withdrawn -- )
SeqL: Secure Scan-Locking for IP Protection
Seetal Potluri and Aydin Aysu and Akash Kumar
2019/655 ( PDF )
Visualizing size-security tradeoffs for lattice-based encryption
Daniel J. Bernstein
2019/654 ( PDF )
Concise Linkable Ring Signatures and Forgery Against Adversarial Keys
Brandon Goodell and Sarang Noether and RandomRun
2019/653 ( PDF )
On the Local Leakage Resilience of Linear Secret Sharing Schemes
Fabrice Benhamouda and Akshay Degwekar and Yuval Ishai and Tal Rabin
2019/652 ( PDF )
The Exchange Attack: How to Distinguish Six Rounds of AES with $2^{88.2}$ chosen plaintexts
Navid Ghaedi Bardeh and Sondre Rřnjom
2019/651 ( PDF )
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing
Muhammad Ishaq and Ana Milanova and Vassilis Zikas
2019/650 ( PDF )
Incremental Proofs of Sequential Work
Nico Döttling and Russell W. F. Lai and Giulio Malavolta
2019/649 ( PDF )
Txilm: Lossy Block Compression with Salted Short Hashing
Donghui Ding and Xin Jiang and Jiaping Wang and Hao Wang and Xiaobing Zhang and Yi Sun
2019/648 ( PDF )
Efficient Invisible and Unlinkable Sanitizable Signatures
Xavier Bultel and Pascal Lafourcade and Russell W. F. Lai and Giulio Malavolta and Dominique Schröder and Sri Aravinda Krishnan Thyagarajan
2019/647 ( PDF )
Strong Asymmetric PAKE based on Trapdoor CKEM
Tatiana Bradley and Stanislaw Jarecki and Jiayu Xu
2019/646 ( PDF )
Communication-Efficient Unconditional MPC with Guaranteed Output Delivery
Vipul Goyal and Yanyi Liu and Yifan Song
2019/645 ( PDF )
Attribute Based Encryption for Deterministic Finite Automata from DLIN
Shweta Agrawal and Monosij Maitra and Shota Yamada
2019/644 ( PDF )
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-
Aydin Abadi and Michele Ciampi and Aggelos Kiayias and Vassilis Zikas
2019/643 ( PDF )
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification
Prabhanjan Ananth and Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai
2019/642 ( PDF )
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs
Jonathan Bootle and Vadim Lyubashevsky and Gregor Seiler
2019/641 ( PDF )
Simulation Extractability in Groth's zk-SNARK
Shahla Atapoor and Karim Baghery
2019/640 ( PDF )
On Round Optimal Statistical Zero Knowledge Arguments
Nir Bitansky and Omer Paneth
2019/639 ( PDF )
Trapdoor Hash Functions and Their Applications
Nico Döttling and Sanjam Garg and Yuval Ishai and Giulio Malavolta and Tamer Mour and Rafail Ostrovsky
2019/638 ( PDF )
On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography
Ferucio Laurentiu Tiplea and Sorin Iftene and George Teseleanu and Anca-Maria Nica
2019/637 ( PDF )
Cryptographic Sensing
Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
2019/636 ( PDF )
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions
Rishab Goyal and Willy Quach and Brent Waters and Daniel Wichs
2019/635 ( PDF )
Homomorphic Time-Lock Puzzles and Applications
Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan
2019/634 ( PDF )
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension
Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai
2019/633 ( PDF )
New non-linearity parameters of Boolean functions
Igor Semaev
2019/632 ( PDF )
Fully Homomorphic Encryption for RAMs
Ariel Hamlin and Justin Holmgren and Mor Weiss and Daniel Wichs
2019/631 ( PDF )
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge
Cody Freitag and Ilan Komargodski and Rafael Pass
2019/630 ( PDF )
ABE for DFA from k-Lin
Junqing Gong and Brent Waters and Hoeteck Wee
2019/629 ( PDF )
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE
Shweta Agrawal and Monosij Maitra and Shota Yamada
2019/628 ( PDF )
Watermarking Public-Key Cryptographic Primitives
Rishab Goyal and Sam Kim and Nathan Manohar and Brent Waters and David J. Wu
2019/627 ( PDF )
Unconditionally Secure Computation Against Low-Complexity Leakage
Andrej Bogdanov and Yuval Ishai and Akshayaram Srinivasan
2019/626 ( PDF )
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge
Vipul Goyal and Aayush Jain and Amit Sahai
2019/625 ( PDF )
Public-Key Cryptography in the Fine-Grained Setting
Rio Lavigne and Andrea Lincoln and Virginia Vassilevska Williams
2019/624 ( PDF )
Nonces are Noticed: AEAD Revisited
Mihir Bellare and Ruth Ng and Björn Tackmann
2019/623 ( PDF )
Exploring Constructions of Compact NIZKs from Various Assumptions
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2019/622 ( PDF )
Extended Truncated-differential Distinguishers on Round-reduced AES
Zhenzhen Bao and Jian Guo and Eik List
2019/621 ( PDF )
A Modified Simple Substitution Cipher With Unbounded Unicity Distance
Bruce Kallick
2019/620 ( PDF )
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems
Steven D. Galbraith and Lukas Zobernig
2019/619 ( PDF )
Continuous Verifiable Delay Functions
Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass
2019/618 ( PDF )
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods
Fukang Liu and Takanori Isobe
2019/617 ( PDF )
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model
Sebastian Gajek and Marco Lewandowsky
2019/616 ( PDF )
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation
Iftach Haitner and Noam Mazor and Ronen Shaltiel and Jad Silbak
2019/615 ( PDF )
My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks
Siemen Dhooghe and Svetla Nikova
2019/614 ( PDF )
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm
Xavier Bonnetain and Akinori Hosoyamada and María Naya-Plasencia and Yu Sasaki and André Schrottenloher
2019/613 ( PDF )
MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks
Taha Atahan Akyildiz and Can Berk Guzgeren and Cemal Yilmaz and Erkay Savas
2019/612 ( PDF )
Simulation-Extractable SNARKs Revisited
Helger Lipmaa
2019/611 ( PDF )
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set
Thaddeus Dryja
2019/610 ( PDF )
Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem
Jean-Sebastien Coron and Agnese Gini
2019/609 ( PDF )
CPA-to-CCA Transformation for KDM Security
Fuyuki Kitagawa and Takahiro Matsuda
2019/608 ( PDF )
Symmetric Primitives with Structured Secrets
Navid Alamati and Hart Montgomery and Sikhar Patranabis
2019/607 ( PDF )
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Zhenzhen Bao and Lin Ding and Jian Guo and Haoyang Wang and Wenying Zhang
2019/606 ( PDF )
An Efficient and Provable Masked Implementation of qTESLA
François Gérard and Mélissa Rossi
2019/605 ( PDF )
A note on different types of ransomware attacks
Mihail Anghel and Andrei Racautanu
2019/604 ( PDF )
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Jun Xu and Santanu Sarkar and , Lei Hu and Huaxiong Wang and Yanbin Pan
2019/603 ( PDF )
How to Delegate Computations Publicly
Yael Kalai and Omer Paneth and Lisa Yang
2019/602 ( PDF )
Continuously Non-Malleable Secret Sharing for General Access Structures
Gianluca Brian and Antonio Faonio and Daniele Venturi
2019/601 ( PDF )
AuroraLight: Improved prover efficiency and SRS size in a Sonic-like system
Ariel Gabizon
2019/600 ( PDF )
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption
Zhenzhen Bao and Jian Guo and Tetsu Iwata and Kazuhiko Minematsu
2019/599 ( PDF )
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning
Ivan Damgĺrd and Daniel Escudero and Tore Frederiksen and Marcel Keller and Peter Scholl and Nikolaj Volgushev
2019/598 ( -- withdrawn -- )
Partial Secret Sharing
Amir Jafari and Reza Kaboli and Shahram Khazaei
2019/597 ( PDF )
A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio
Shahram Khazaei
2019/596 ( PDF )
Discretisation and Product Distributions in Ring-LWE
Sean Murphy and Rachel Player
2019/595 ( PDF )
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero
Pedro Moreno-Sanchez and Randomrun and Duc V. Le and Sarang Noether and Brandon Goodell and Aniket Kate
2019/594 ( PDF )
Cryptanalysis of Ring Homomorphic Encryption Schemes
Mugurel Barcau and Vicentiu Pasol
2019/593 ( PDF )
On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces
V. Ustimenko and M. Klisowski
2019/592 ( PDF )
Statistical Analysis and Anonymity of TOR's Path Selection
Andrei Mogage and Emil Simion
2019/591 ( PDF )
Simulating Homomorphic Evaluation of Deep Learning Predictions
Christina Boura and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev
2019/590 ( PDF )
Tighter proofs of CCA security in the quantum random oracle model
Nina Bindel and Mike Hamburg and Kathrin Hövelmanns and Andreas Hülsing and Edoardo Persichetti
2019/589 ( PDF )
A${^2}$L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
Erkan Tairi and Pedro Moreno-Sanchez and Matteo Maffei
2019/588 ( PDF )
Formal Notions of Security for Verifiable Homomorphic Encryption
Jakub Klemsa and Ivana Trummová
2019/587 ( PDF )
Polygraph: Accountable Byzantine Agreement
Pierre Civit and Seth Gilbert and Vincent Gramoli
2019/586 ( PDF )
Simulation-Extractable zk-SNARK with a Single Verification
Jihye Kim and Jiwon Lee and Hyunok Oh
2019/585 ( PDF )
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners
Mustafa Khairallah and Shivam Bhasin and Anupam Chattopadhyay
2019/584 ( -- withdrawn -- )
2-threshold Ideal Secret Sharing Schemes Can Be Uniquely Modeled by Latin Squares
Lintao Liu and Xuehu Yan and Yuliang Lu and Huaixi Wang
2019/583 ( PDF )
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks
Christoph Egger and Pedro Moreno-Sanchez and Matteo Maffei
2019/582 ( PDF )
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
Ran Canetti and Alley Stoughton and Mayank Varia
2019/581 ( -- withdrawn -- )
2019/580 ( PDF )
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs
Russell W. F. Lai and Viktoria Ronge and Tim Ruffing and Dominique Schröder and Sri Aravinda Krishnan Thyagarajan and Jiafan Wang
2019/579 ( PDF )
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
Dominic Letz
2019/578 ( PDF )
Deep Learning based Side Channel Attacks in Practice
Houssem Maghrebi
2019/577 ( PDF )
Improved Multiplication Triple Generation over Rings via RLWE-based AHE
Deevashwer Rathee and Thomas Schneider and K. K. Shukla
2019/576 ( PDF )
On Group-Characterizability of Homomorphic Secret Sharing Schemes
Reza Kaboli and Shahram Khazaei and Maghsoud Parviz
2019/575 ( PDF )
On Abelian and Homomorphic Secret Sharing Schemes
Amir Jafari and Shahram Khazaei
2019/574 ( PDF )
Subliminal channels in post-quantum digital signature schemes
Herman Galteland and Kristian Gjřsteen
2019/573 ( PDF )
Security of the Suffix Keyed Sponge
Christoph Dobraunig and Bart Mennink
2019/572 ( PDF )
On the Commitment Capacity of Unfair Noisy Channels
Claude Crépeau and Rafael Dowsley and Anderson C. A. Nascimento
2019/571 ( PDF )
Multi-Party Virtual State Channels
Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Julia Hesse and Kristina Hostáková
2019/570 ( PDF )
Bias-variance Decomposition in Machine Learning-based Side-channel Analysis
Daan van der Valk and Stjepan Picek
2019/569 ( PDF )
Lattice RingCT v2.0 with Multiple Input and Output Wallets
Wilson Alberto Torres and Veronika Kuchta and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Jacob Cheng
2019/568 ( PDF )
Post Quantum ECC on FPGA Platform
Debapriya Basu Roy and Debdeep Mukhopadhyay
2019/567 ( PDF )
(Linkable) Ring Signature from Hash-Then-One-Way Signature
Xingye Lu and Man Ho Au and Zhenfei Zhang
2019/566 ( PDF )
Deep Learning based Model Building Attacks on Arbiter PUF Compositions
Pranesh Santikellur and Aritra Bhattacharyay and Rajat Subhra Chakraborty
2019/565 ( PDF )
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
Nirvan Tyagi and Paul Grubbs and Julia Len and Ian Miers and Thomas Ristenpart
2019/564 ( PDF )
Verification of Authenticated Firmware Load
Sujit Kumar Muduli and Pramod Subramanyan and Sayak Ray
2019/563 ( PDF )
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA
Omer Shlomovits and István András Seres
2019/562 ( PDF )
Towards More Secure Constructions of Adjustable Join Schemes
Shahram Khazaei and Mojtaba Rafiee
2019/561 ( PDF )
Faster Bootstrapping of FHE over the integers with large prime message space
Zhizhu Lian and Yupu Hu and Hu Chen and Baocang Wang
2019/560 ( PDF )
Solutions of $x^{q^k}+\cdots+x^{q}+x=a$ in $GF(2^n)$
Kwang Ho Kim and Jong Hyok Choe and Dok Nam Lee and Dae Song Go and Sihem Mesnager
2019/559 ( PDF )
Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables
Evgeny K. Alekseev and Lyudmila A. Kushchinskaya
2019/558 ( PDF )
How to not break SIDH
Chloe Martindale and Lorenz Panny
2019/557 ( PDF )
Extended Galbraith's Test on the Anonymity of IBEs from Higher Residuosity
Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao
2019/556 ( PDF )
When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop)
Gideon Samid
2019/555 ( PDF )
Optimal TNFS-secure pairings on elliptic curves with composite embedding degree
Georgios Fotiadis and Chloe Martindale
2019/554 ( PDF )
How to Build Pseudorandom Functions From Public Random Permutations
Yu Long Chen and Eran Lambooij and Bart Mennink
2019/553 ( PDF )
Towards post-quantum symmetric cryptography
John Gregory Underhill and Stiepan Aurélien Kovac and Xenia Bogomolec
2019/552 ( PDF )
Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space
Binyi Chen and Yilei Chen and Kristina Hostáková and Pratyay Mukherjee
2019/551 ( PDF )
A note on the correlations between NIST cryptographic statistical tests suite
Emil Simion and Paul Burciu
2019/550 ( PDF )
Spartan: Efficient and general-purpose zkSNARKs without trusted setup
Srinath Setty
2019/549 ( PDF )
Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir
Arka Rai Choudhuri and Pavel Hubacek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum
2019/548 ( PDF )
About Wave Implementation and its Leakage Immunity
Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
2019/547 ( PDF )
Linearly-Homomorphic Signatures and Scalable Mix-Nets
Chloé Hébant and Duong Hieu Phan and David Pointcheval
2019/546 ( PDF )
Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies
David Cerezo Sánchez
2019/545 ( -- withdrawn -- )
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Sayandeep Saha and Dirmanto Jap and Debapriya Basu Roy and Avik Chakraborti and Shivam Bhasin and Debdeep Mukhopadhyay
2019/544 ( PDF )
Evaluation of Code-based Signature Schemes
Partha Sarathi Roy and Kirill Morozov and Kazuhide Fukushima and Shinsaku Kiyomoto
2019/543 ( PDF )
TMPS: Ticket-Mediated Password Strengthening
John Kelsey and Dana Dachman-Soled and Sweta Mishra and Meltem Sonmez Turan
2019/542 ( PDF )
Formally Verified Cryptographic Web Applications in WebAssembly
Jonathan Protzenko and Benjamin Beurdouche and Denis Merigoux and Karthikeyan Bhargavan
2019/541 ( PDF )
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement
James Shook and Scott Simon and Peter Mell
2019/540 ( PDF )
A chosen key attack against the secret S-boxes of GOST
Markku-Juhani O. Saarinen
2019/539 ( PDF )
Cryptanalysis of FlexAEAD
Mostafizar Rahman and Dhiman Saha and Goutam Paul
2019/538 ( PDF )
On Perfect Endomorphic Ciphers
Nikolay Shenets
2019/537 ( PDF )
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin and Victor Mollimard
2019/536 ( PDF )
Protecting against Statistical Ineffective Fault Attacks
Joan Daemen and Christoph Dobraunig and Maria Eichlseder and Hannes Gross and Florian Mendel and Robert Primas
2019/535 ( PDF )
SIKE Round 2 Speed Record on ARM Cortex-M4
Hwajeong soe and Amir Jalali and Reza Azarderakhsh
2019/534 ( PDF )
Theoretical and Practical Approaches for Hardness Amplification of PUFs
Fatemeh Ganji and Shahin Tajik and Pascal Stauss and Jean-Pierre Seifert and Domenic Forte and Mark Tehranipoor
2019/533 ( PDF )
Stopping time signatures for some algorithms in cryptography
Percy Deift and Stephen D. Miller and Thomas Trogdon
2019/532 ( PDF )
Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography
Carsten Baum and Ariel Nof
2019/531 ( PDF )
How to Correct Errors in Multi-Server PIR
Kaoru Kurosawa
2019/530 ( PDF )
Speed-up of SCA attacks on 32-bit multiplications
Robert Nguyen and Adrien Facon and Sylvain Guilley and Guillaume Gautier and Safwan El Assad
2019/529 ( PDF )
UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions
Pedro Branco and Manuel Goulăo and Paulo Mateus
2019/528 ( PDF )
Anomalies and Vector Space Search: Tools for S-Box Analysis (Full Version)
Xavier Bonnetain and Léo Perrin and Shizhu Tian
2019/527 ( PDF )
Revisiting Privacy-aware Blockchain Public Key Infrastructure
Olamide Omolola and Paul Plessing
2019/526 ( PDF )
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman
Cas Cremers and Dennis Jackson
2019/525 ( PDF )
Misuse Attacks on Post-Quantum Cryptosystems
Ciprian Băetu and F. Betül Durak and Loďs Huguenin-Dumittan and Abdullah Talayhan and Serge Vaudenay
2019/524 ( PDF )
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference
Hao Chen and Wei Dai and Miran Kim and Yongsoo Song
2019/523 ( PDF )
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
Jack Doerner and Yashvanth Kondi and Eysa Lee and abhi shelat
2019/522 ( PDF )
Secret-Sharing from Robust Conditional Disclosure of Secrets
Amos Beimel and Naty Peter
2019/521 ( PDF )
Fully Homomorphic Encryption with k-bit Arithmetic Operations
Benjamin M. Case and Shuhong Gao and Gengran Hu and Qiuxia Xu
2019/520 ( PDF )
A Note on Sub-Gaussian Random Variables
Benjamin M. Case and Colin Gallagher and Shuhong Gao
2019/519 ( PDF )
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications
Christopher Patton and Thomas Shrimpton
2019/518 ( PDF )
Fast Database Joins and PSI for Secret Shared Data
Payman Mohassel and Peter Rindal and Mike Rosulek
2019/517 ( PDF )
Mobile Private Contact Discovery at Scale
Daniel Kales and Christian Rechberger and Thomas Schneider and Matthias Senker and Christian Weinert
2019/516 ( PDF )
CellTree: A New Paradigm for Distributed Data Repositories
Anasuya Acharya and Manoj Prabhakaran and Akash Trehan
2019/515 ( PDF )
A Countermeasure Against Statistical Ineffective Fault Analysis
Jakub Breier and Mustafa Khairallah and Xiaolu Hou and Yang Liu
2019/514 ( PDF )
Pixel: Multi-signatures for Consensus
Manu Drijvers and Sergey Gorbunov and Gregory Neven and Hoeteck Wee
2019/513 ( PDF )
New Code-Based Privacy-Preserving Cryptographic Constructions
Khoa Nguyen and Hanh Tang and Huaxiong Wang and Neng Zeng
2019/512 ( PDF )
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System
Shuai Han and Shengli Liu and Lin Lyu and Dawu Gu
2019/511 ( PDF )
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited
Gilles Barthe and Sonia Belaďd and Thomas Espitau and Pierre-Alain Fouque and Mélissa Rossi and Mehdi Tibouchi
2019/510 ( PDF )
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes
Jiang Zhang and Yu Yu and Shuqin Fan and Zhenfeng Zhang and Kang Yang
2019/509 ( PDF )
New Slide Attacks on Almost Self-Similar Ciphers
Orr Dunkelman and Nathan Keller and Noam Lasry and Adi Shamir
2019/508 ( PDF )
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security
Tsz Hon Yuen and Shi-feng Sun and Joseph K. Liu and Man Ho Au and Muhammed F. Esgin and Qingzhao Zhang and Dawu Gu
2019/507 ( PDF )
Simple Schemes in the Bounded Storage Model
Jiaxin Guan and Mark Zhandry
2019/506 ( PDF )
Forward Integrity and Crash Recovery for Secure Logs
Erik-Oliver Blass and Guevara Noubir
2019/505 ( PDF )
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
Felix Wegener and Thorben Moos and Amir Moradi
2019/504 ( PDF )
Afgjort: A Partially Synchronous Finality Layer for Blockchains
Thomas Dinsdale-Young and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Daniel Tschudi
2019/503 ( PDF )
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
2019/502 ( PDF )
A refined analysis of the cost for solving LWE via uSVP
Shi Bai and Shaun Miller and Weiqiang Wen
2019/501 ( PDF )
Optimal Merging in Quantum k-xor and k-sum Algorithms
María Naya-Plasencia and André Schrottenloher
2019/500 ( PDF )
An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster
Jean-Claude Bajard and Julien Eynard and Paulo Martins and Leonel Sousa and Vincent Zucca
2019/499 ( PDF )
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography
Michael Naehrig and Joost Renes
2019/498 ( PDF )
CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations
Ward Beullens and Thorsten Kleinjung and Frederik Vercauteren
2019/497 ( PDF )
Forward and Backward-Secure Range-Searchable Symmetric Encryption
Jiafan Wang and Sherman S. M. Chow
2019/496 ( PDF )
Non-malleability for quantum public-key encryption
Christian Majenz and Christian Schaffner and Jeroen van Wier
2019/495 ( PDF )
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
Marc Joye
2019/494 ( PDF )
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/493 ( PDF )
Evaluating the effectiveness of heuristic worst-case noise analysis in FHE
Anamaria Costache and Kim Laine and Rachel Player
2019/492 ( PDF )
Decisional second-preimage resistance: When does SPR imply PRE?
Daniel J. Bernstein and Andreas Hülsing
2019/491 ( PDF )
Best Information is Most Successful
Eloi de Cherisey and Sylvain Guilley and Olivier Rioul and Pablo Piantanida
2019/490 ( PDF )
Sigma protocols for MQ, PKP and SIS, and fishy signature schemes
Ward Beullens
2019/489 ( PDF )
Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4
Leon Botros and Matthias J. Kannwischer and Peter Schwabe
2019/488 ( PDF )
Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication
Alan Kaminsky
2019/487 ( PDF )
From Single-Input to Multi-Client Inner-Product Functional Encryption
Michel Abdalla and Fabrice Benhamouda and Romain Gay
2019/486 ( PDF )
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment
Suhyeon Lee and Seungjoo Kim
2019/485 ( PDF )
A taxonomy of pairings, their security, their complexity
Razvan Barbulescu and Nadia El Mrabet and Loubna Ghammam
2019/484 ( PDF )
New Number-Theoretic Cryptographic Primitives
Eric Brier and Houda Ferradi and Marc Joye and David Naccache
2019/483 ( PDF )
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations
Pierrick Méaux and Claude Carlet and Anthony Journault and François-Xavier Standaert
2019/482 ( PDF )
Tiny WireGuard Tweak
Jacob Appelbaum and Chloe Martindale and Peter Wu
2019/481 ( PDF )
An Efficient and Compact Reformulation of NIST Collision Estimate Test
Prasanna Raghaw Mishra and Bhartendu Nandan and Navneet Gaba
2019/480 ( PDF )
On the Efficiency of Privacy-Preserving Smart Contract Systems
Karim Baghery
2019/479 ( PDF )
Extended 3-Party ACCE and Application to LoRaWAN 1.1
Sébastien Canard and Loďc Ferreira
2019/478 ( PDF )
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
Sarah McCarthy and James Howe and Neil Smyth and Seamus Brannigan and Máire O’Neill
2019/477 ( PDF )
Efficient Post-Compromise Security Beyond One Group
Cas Cremers and Britta Hale and Konrad Kohbrok
2019/476 ( PDF )
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T
Muhammad ElSheikh and Ahmed Abdelkhalek and Amr M. Youssef
2019/475 ( PDF )
Dual-Mode NIZKs from Obfuscation
Dennis Hofheinz and Bogdan Ursu
2019/473 ( PDF )
A Method to Reduce the Key Size of UOV Signature Scheme
Chengdong Tao
2019/472 ( PDF )
Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM)
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2019/471 ( PDF )
UC-Secure CRS Generation for SNARKs
Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michal Zajac
2019/470 ( PDF )
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals
Niek J. Bouman and Niels de Vreede
2019/469 ( PDF )
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks
Rui Qiao and Qinglong Wang* and Zongtao Duan and Na Fan
2019/468 ( PDF )
The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem
Alessandro Budroni and Andrea Tenti
2019/467 ( PDF )
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version)
Clément Massart and François-Xavier Standaert
2019/466 ( -- withdrawn -- )
Privacy-Preserving K-means Clustering with Multiple Data Owners
Jung Hee Cheon and Jinhyuck Jeong and Dohyeong Ki and Jiseung Kim and Joohee Lee and Seok Won Lee
2019/465 ( PDF )
Towards a Practical Cluster Analysis over Encrypted Data
Jung Hee Cheon and Duhyeong Kim and Jai Hyun Park
2019/464 ( PDF )
The complexity of MinRank
Alessio Caminata and Elisa Gorla
2019/463 ( PDF )
In Pursuit of Clarity In Obfuscation
Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi
2019/462 ( PDF )
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11
Alexander Dax and Robert Künnemann and Sven Tangermann and Michael Backes
2019/461 ( PDF )
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks
Xiaolu Hou and Jakub Breier and Dirmanto Jap and Lei Ma and Shivam Bhasin and Yang Liu
2019/460 ( PDF )
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Jan Camenisch and Manu Drijvers and Petr Dzurenda and Jan Hajny
2019/459 ( PDF )
From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1
Gaëtan Leurent and Thomas Peyrin
2019/458 ( PDF )
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
Lorenzo Grassi and Dmitry Khovratovich and Christian Rechberger and Arnab Roy and Markus Schofnegger
2019/457 ( PDF )
Forgery Attack on mixFeed in the Nonce-Misuse Scenario
Mustafa Khairallah
2019/456 ( PDF )
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
Peifang Ni and Hongda Li and Xianning Meng and Dongxue Pan
2019/455 ( PDF )
FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol
Joăo Otávio Massari Chervinski and Diego Kreutz and Jiangshan Yu
2019/454 ( PDF )
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks
Ryan Karl and Timothy Burchfield and Jonathan Takeshita and Taeho Jung
2019/453 ( PDF )
A New Approach to Modelling Centralised Reputation Systems
Lydia Garms and Elizabeth A. Quaglia
2019/452 ( PDF )
A Central Limit Framework for Ring-LWE Decryption
Sean Murphy and Rachel Player
2019/451 ( PDF )
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Francesco Berti and Olivier Pereira and François-Xavier Standaert
2019/450 ( PDF )
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data
Chenglu Jin and Zheng Yang and Sridhar Adepu and Jianying Zhou
2019/449 ( PDF )
Limits to Non-Malleability
Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Tal Malkin
2019/448 ( PDF )
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl
2019/447 ( PDF )
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak
Haibo Zhou and Zheng Li and Xiaoyang Dong and Keting Jia and Willi Meier
2019/446 ( PDF )
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Sanjit Chatterjee and Shravan Kumar Parshuram Puria and Akash Shah
2019/445 ( PDF )
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications
Muhammed F. Esgin and Ron Steinfeld and Joseph K. Liu and Dongxi Liu
2019/444 ( PDF )
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
Gildas Avoine and Sébastien Canard and Loďc Ferreira
2019/443 ( PDF )
Contingent payments on a public ledger: models and reductions for automated verification
Sergiu Bursuc and Steve Kremer
2019/442 ( PDF )
K2SN-MSS: An Efficient Post-Quantum Signature (Full Version)
Sabyasachi Karati and Reihaneh Safavi-Naini
2019/441 ( PDF )
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
2019/440 ( PDF )
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
Avik Chakraborti and Nilanjan Datta and Ashwin Jha and Cuauhtemoc Mancillas Lopez and Mridul Nandi and Yu Sasaki
2019/439 ( PDF )
A Comprehensive Study of Deep Learning for Side-Channel Analysis
Loďc Masure and Cécile Dumas and Emmanuel Prouff
2019/438 ( PDF )
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data
Jan Camenisch and Angelo De Caro and Esha Ghosh and Alessandro Sorniotti
2019/437 ( PDF )
Efficient coding for secure computing with additively-homomorphic encrypted data
Thijs Veugen
2019/436 ( PDF )
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
Benjamin Dowling and Paul Rösler and Jörg Schwenk
2019/435 ( PDF )
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
Yue Qin and Chi Cheng and Jintai Ding
2019/434 ( PDF )
Masking Fuzzy-Searchable Public Databases
Alexandra Boldyreva and Tianxin Tang and Bogdan Warinschi
2019/433 ( PDF )
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
Shan Chen and Samuel Jero and Matthew Jagielski and Alexandra Boldyreva and Cristina Nita-Rotaru
2019/432 ( PDF )
Cryptanalysis of a System Based on Twisted Reed-Solomon Codes
Julien Lavauzelle and Julian Renner
2019/431 ( PDF )
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation
Aurore Guillevic and Simon Masson and Emmanuel Thomé
2019/430 ( -- withdrawn -- )
Composition of Boolean Functions: An Application to the Secondary Constructions of Bent Functions
Guangpu Gao and Dongdai Lin and Wenfen Liu and Yongjuan Wang
2019/429 ( PDF )
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Harsh Chaudhari and Ashish Choudhury and Arpita Patra and Ajith Suresh
2019/428 ( PDF )
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability
Jan Czajkowski and Christian Majenz and Christian Schaffner and Sebastian Zur
2019/427 ( PDF )
Improved Secure Integer Comparison via Homomorphic Encryption
Florian Bourse and Olivier Sanders and Jacques Traoré
2019/426 ( PDF )
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
Abdelrahaman Aly and Tomer Ashur and Eli Ben-Sasson and Siemen Dhooghe and Alan Szepieniec
2019/425 ( PDF )
Homomorphic Training of 30,000 Logistic Regression Models
Flavio Bergamaschi and Shai Halevi and Tzipora T. Halevi and Hamish Hunt
2019/424 ( -- withdrawn -- )
Preimage Security of KNOT-Hash
Raghvendra Rohit
2019/423 ( PDF )
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name
Peter T. Breuer
2019/422 ( PDF )
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound
Alexander Moch and Eik List
2019/421 ( PDF )
Continuing to reflect on TLS 1.3 with external PSK
Liliya Akhmetzyanova and Evgeny Alekseev and Ekaterina Smyshlyaeva and Alexandr Sokolov
2019/420 ( PDF )
Improving Speed of Dilithium’s Signing Procedure
Prasanna Ravi and Sourav Sen Gupta and Anupam Chattopadhyay and Shivam Bhasin
2019/419 ( PDF )
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
Martin R. Albrecht and Carlos Cid and Lorenzo Grassi and Dmitry Khovratovich and Reinhard Lüftenegger and Christian Rechberger and Markus Schofnegger
2019/418 ( PDF )
Sharing of Encrypted files in Blockchain Made Simpler
S. Sharmila Deva Selvi and Arinjita Paul and Siva Dirisala and Saswata Basu and C. Pandu Rangan
2019/417 ( PDF )
Numerical Method for Comparison on Homomorphically Encrypted Numbers
Jung Hee Cheon and Dongwoo Kim and Duhyeong Kim and Hun Hee Lee and Keewoo Lee
2019/416 ( PDF )
How many transactions per second can bitcoin really handle ? Theoretically.
Evangelos Georgiadis
2019/415 ( PDF )
Refinement and Verification of CBC Casper
Ryuya Nakamura and Takayuki Jimba and Dominik Harz
2019/414 ( PDF )
Two-Round Oblivious Transfer from CDH or LPN
Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny and Daniel Wichs
2019/413 ( PDF )
On the Streaming Indistinguishability of a Random Permutation and a Random Function
Itai Dinur
2019/412 ( PDF )
On the complexity of the Permuted Kernel Problem
Eliane KOUSSA and Gilles MACARIO-RAT and Jacques PATARIN
2019/411 ( PDF )
Exploring the Monero Peer-to-Peer Network
Tong Cao and Jiangshan Yu and Jérémie Decouchant and Xiapu Luo and Paulo Verissimo
2019/410 ( PDF )
Policy-Based Sanitizable Signatures
Kai Samelin and Daniel Slamanig
2019/409 ( PDF )
Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes
Houda Ferradi and Keita Xagawa
2019/408 ( PDF )
Forgery Attack on SNEIKEN
Mustafa Khairallah
2019/407 ( PDF )
Privacy-Preserving Network Path Validation
Binanda Sengupta and Yingjiu Li and Kai Bu and Robert H. Deng
2019/406 ( PDF )
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
David Derler and Kai Samelin and Daniel Slamanig and Christoph Striecks
2019/405 ( PDF )
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware
Jo Vliegen and Md Masoom Rabbani and Mauro Conti and Nele Mentens
2019/404 ( PDF )
Efficient Message Authentication Codes with Combinatorial Group Testing
Kazuhiko Minematsu
2019/403 ( PDF )
Fast and simple constant-time hashing to the BLS12-381 elliptic curve
Riad S. Wahby and Dan Boneh
2019/402 ( PDF )
ILC: A Calculus for Composable, Computational Cryptography
Kevin Liao and Matthew A. Hammer and Andrew Miller
2019/401 ( PDF )
Side-Channel assessment of Open Source Hardware Wallets
Manuel San Pedro and Victor Servant and Charles Guillemet
2019/400 ( PDF )
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
Akira Takahashi and Mehdi Tibouchi
2019/399 ( PDF )
Inception makes non-malleable codes shorter as well!
Divesh Aggarwal and Maciej Obremski
2019/398 ( PDF )
Constant-Round Group Key Exchange from the Ring-LWE Assumption
Daniel Apon and Dana Dachman-Soled and Huijing Gong and Jonathan Katz
2019/397 ( PDF )
Feistel Structures for MPC, and More
Martin R. Albrecht and Lorenzo Grassi and Leo Perrin and Sebastian Ramacher and Christian Rechberger and Dragos Rotaru and Arnab Roy and Markus Schofnegger
2019/396 ( PDF )
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Evangelia Anna Markatou and Roberto Tamassia
2019/395 ( PDF )
Full Database Reconstruction with Access and Search Pattern Leakage
Evangelia Anna Markatou and Roberto Tamassia
2019/394 ( PDF )
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation
Vincent Migliore and Benoit Gérard and Mehdi Tibouchi and Pierre-Alain Fouque
2019/393 ( PDF )
A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence
Itay Berman and Iftach Haitner and Eliad Tsfadia
2019/392 ( PDF )
New Conditional Cube Attack on Keccak Keyed Modes
Zheng Li and Xiaoyang Dong and Wenquan Bi and Keting Jia and Xiaoyun Wang and Willi Meier
2019/391 ( PDF )
Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense
Biswabandan Panda
2019/390 ( PDF )
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures
Michael Specter and Sunoo Park and Matthew Green
2019/389 ( PDF )
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Sauvik Bhattacharya and Oscar Garcia-Morchon and Rachel Player and Ludo Tolhuizen
2019/388 ( PDF )
Towards Secret-Free Security
Ulrich Rührmair
2019/387 ( PDF )
SoK : On DFA Vulnerabilities of Substitution-Permutation Networks
Mustafa Khairallah and Xiaolu Hou and Zakaria Najm and Jakub Breier and Shivam Bhasin and Thomas Peyrin
2019/386 ( PDF )
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation
Ryo Kikuchi and Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ai Ishida and Takahiro Matsuda and Yusuke Sakai and Jacob C. N. Schuldt
2019/385 ( PDF )
Miller Inversion is Easy for the Reduced Tate Pairing on Supersingular Curves of Embedding Degree Two and Three
Takakazu Satoh
2019/384 ( PDF )
What Storage Access Privacy is Achievable with Small Overhead?
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2019/383 ( PDF )
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
Mathy Vanhoef and Eyal Ronen
2019/382 ( PDF )
Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length
Daniel Gardham and Mark Manulis
2019/381 ( -- withdrawn -- )
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Chen-Dong Ye and Tian Tian
2019/380 ( PDF )
A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit
Kazumasa Shinagawa and Koji Nuida
2019/379 ( PDF )
Non-Malleable Codes for Decision Trees
Marshall Ball and Siyao Guo and Daniel Wichs
2019/378 ( PDF )
pRate: Anonymous Star Rating with Rating Secrecy
Jia Liu and Mark Manulis
2019/377 ( PDF )
Lower Bounds for Oblivious Near-Neighbor Search
Kasper Green Larsen and Tal Malkin and Omri Weinstein and Kevin Yeo
2019/376 ( PDF )
SELL v1.0: Searchable Encrypted Logging Library
Amir Jalali and Neil Davenport
2019/375 ( PDF )
Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters
Xavier Bultel and Pascal Lafourcade
2019/374 ( PDF )
Probability 1 Iterated Differential in the SNEIK Permutation
Léo Perrin
2019/373 ( PDF )
Lelantus: A New Design for Anonymous and Confidential Cryptocurrencies
Aram Jivanyan
2019/372 ( PDF )
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
2019/371 ( PDF )
Adding Linkability to Ring Signatures with One-Time Signatures
Xueli Wang and Yu Chen and Xuecheng Ma
2019/370 ( PDF )
Indifferentiability for Public Key Cryptosystems
Mark Zhandry and Cong Zhang
2019/369 ( PDF )
On the EA-classes of known APN functions in small dimensions
Marco Calderini
2019/368 ( PDF )
Strong Post-Compromise Secure Proxy Re-Encryption
Alex Davidson and Amit Deo and Ela Lee and Keith Martin
2019/367 ( PDF )
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
Olivier Blazy and Angèle Bossuat and Xavier Bultel and Pierre-Alain Fouque and Cristina Onete and Elena Pagnin
2019/366 ( PDF )
Triggerflow: Regression Testing by Advanced Execution Path Inspection
Iaroslav Gridin and Cesar Pereida García and Nicola Tuveri and Billy Bob Brumley
2019/365 ( PDF )
Fully Secure Attribute-Based Encryption for $t$-CNF from LWE
Rotem Tsabary
2019/364 ( PDF )
Everybody's a Target: Scalability in Public-Key Encryption
Benedikt Auerbach and Federico Giacon and Eike Kiltz
2019/363 ( PDF )
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs
Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima
2019/362 ( PDF )
Game Channels: State Channels for the Gambling Industry with Built-In PRNG
Alisa Cherniaeva and Ilia Shirobokov and Alexander Davydov
2019/361 ( PDF )
On polynomial secret sharing schemes
Anat Paskin-Chernivasky and Artiom Radune
2019/360 ( PDF )
SoK: Layer-Two Blockchain Protocols
Lewis Gudgeon and Pedro Moreno-Sanchez and Stefanie Roos and Patrick McCorry and Arthur Gervais
2019/359 ( PDF )
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search
Hao Chen and Ilaria Chillotti and Yihe Dong and Oxana Poburinnaya and Ilya Razenshteyn and M. Sadegh Riazi
2019/358 ( PDF )
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA
Leo Weissbart and Stjepan Picek and Lejla Batina
2019/357 ( PDF )
Lattice-based proof of a shuffle
Núria Costa and Ramiro Martínez and Paz Morillo
2019/356 ( PDF )
Ad Hoc Multi-Input Functional Encryption
Shweta Agrawal and Michael Clear and Ophir Frieder and Sanjam Garg and Adam O’Neill and Justin Thaler
2019/355 ( PDF )
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks
Anubhab Baksi and Dhiman Saha and Sumanta Sarkar
2019/354 ( PDF )
Benchmarking Privacy Preserving Scientific Operations
Abdelrahaman Aly and Nigel P. Smart
2019/353 ( PDF )
A Faster Constant-time Algorithm of CSIDH keeping Two Points
Hiroshi Onuki and Yusuke Aikawa and Tsutomu Yamazaki and Tsuyoshi Takagi
2019/352 ( PDF )
SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies
Maxim Jourenko and Kanta Kurazumi and Mario Larangeira and Keisuke Tanaka
2019/351 ( PDF )
Forward Secrecy of SPAKE2
Jose Becerra and Dimiter Ostrev and Marjan Skrobot
2019/350 ( PDF )
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Fabian Boemer and Yixing Lao and Rosario Cammarota and Casimir Wierzynski
2019/349 ( PDF )
Spin Me Right Round: Rotational Symmetry for FPGA-specific AES
Felix Wegener and Lauren De Meyer and Amir Moradi
2019/348 ( PDF )
Efficient and Scalable Universal Circuits
Masaud Y. Alhassan and Daniel Günther and Ágnes Kiss and Thomas Schneider
2019/347 ( PDF )
Selfie: reflections on TLS 1.3 with PSK
Nir Drucker and Shay Gueron
2019/346 ( PDF )
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm
Christophe Clavier and Leo Reynaud and Antoine Wurcker
2019/345 ( PDF )
Second-order Scatter Attack
Hugues Thiebeauld and Aurélien Vasselle and Antoine Wurcker
2019/344 ( PDF )
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency
Ethan Heilman and Neha Narula and Garrett Tanzer and James Lovejoy and Michael Colavita and Madars Virza and Tadge Dryja
2019/343 ( PDF )
Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input
Aurelien Vasselle and Antoine Wurcker
2019/342 ( PDF )
LightChain: A DHT-based Blockchain for Resource Constrained Environments
Yahya Hassanzadeh-Nazarabadi and Alptekin Küpçü and Öznur Özkasap
2019/341 ( PDF )
MixEth: efficient, trustless coin mixing service for Ethereum
István András Seres and Dániel A. Nagy and Chris Buckland and Péter Burcsi
2019/340 ( PDF )
Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys
Antoine Wurcker
2019/339 ( PDF )
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Yusuke Naito and Takeshi Sugawara
2019/338 ( PDF )
Garbled Neural Networks are Practical
Marshall Ball and Brent Carmer and Tal Malkin and Mike Rosulek and Nichole Schimanski
2019/337 ( PDF )
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios
Łukasz Krzywiecki and Mirosław Kutyłowski and Jakub Pezda and Marcin Słowik
2019/336 ( PDF )
DEEP-FRI: Sampling Outside the Box Improves Soundness
Eli Ben-Sasson and Lior Goldberg and Swastik Kopparty and Shubhangi Saraf
2019/335 ( PDF )
Examining the Practical Side Channel Resilience of ARX-boxes
Yan Yan and Elisabeth Oswald
2019/334 ( PDF )
Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition
Abdelrahaman Aly and Aysajan Abidin and Svetla Nikova
2019/333 ( PDF )
Key-and-Argument-Updatable QA-NIZKs
Helger Lipmaa
2019/332 ( PDF )
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields
Benjamin Hong Meng Tan and Hyung Tae Lee and Huaxiong Wang and Shu Qin Ren and Khin Mi Mi Aung
2019/331 ( PDF )
Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors
Amir Jalali and Reza Azarderakhsh and Mehran Mozaffari Kermani and Matthew Campagna and David Jao
2019/330 ( PDF )
Practical Supersingular Isogeny Group Key Agreement
Reza Azarderakhsh and Amir Jalali and David Jao and Vladimir Soukharev
2019/329 ( PDF )
Doubly half-injective PRGs for incompressible white-box cryptography
Estuardo Alpirez Bock and Alessandro Amadori and Joppe W. Bos and Chris Brzuska and Wil Michiels
2019/328 ( PDF )
On the Difficulty of Hiding the Balance of Lightning Network Channels
Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Alejandro Ranchal-Pedrosa and Cristina Pérez-Solà and Joaquin Garcia-Alfaro
2019/327 ( PDF )
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers
Gembu Ito and Tetsu Iwata
2019/326 ( PDF )
Shorter Pairing-based Arguments under Standard Assumptions
Alonso Gonzalez and Carla Rafols
2019/325 ( PDF )
An Efficient Private Evaluation of a Decision Graph
Hiroki Sudo and Koji Nuida and Kana Shimizu
2019/324 ( PDF )
A Traceable Ring Signature Scheme based on Coding Theory
Pedro Branco and Paulo Mateus
2019/323 ( PDF )
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited
Sabyasachi Dutta and Kouichi Sakurai
2019/322 ( PDF )
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES
Farnoud Farahmand and Malik Umar Sharif and Kevin Briggs and Kris Gaj
2019/321 ( PDF )
Horizontal Collision Correlation Attack on Elliptic Curves
Aurélie Bauer and Eliane Jaulmes and Emmanuel Prouff and Jean-René Reinhard and Justine Wild
2019/320 ( PDF )
Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats
Léo Ducas and Steven Galbraith and Thomas Prest and Yang Yu
2019/319 ( PDF )
PGC: Pretty Good Decentralized Confidential Payment System with Auditability
Yu Chen and Xuecheng Ma and Cong Tang and Man Ho Au
2019/318 ( PDF )
Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256
Boyu Ni and Xiaoyang Dong
2019/317 ( PDF )
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
Tiancheng Xie and Jiaheng Zhang and Yupeng Zhang and Charalampos Papamanthou and Dawn Song
2019/316 ( PDF )
Extended Affine and CCZ Equivalence up to Dimension 4
Marcus Brinkmann
2019/315 ( PDF )
Blockchains from Non-Idealized Hash Functions
Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos
2019/314 ( PDF )
Optimal Bounded-Collusion Secure Functional Encryption
Prabhanjan Ananth and Vinod Vaikuntanathan
2019/313 ( PDF )
A SAT-based approach for index calculus on binary elliptic curves
Monika Trimoska and Sorina Ionica and Gilles Dequen
2019/312 ( PDF )
Side-Channel Analysis of the TERO PUF
Lars Tebelmann and Michael Pehl and Vincent Immler
2019/311 ( PDF )
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and Bertram Poettering
2019/310 ( PDF )
A Formal Approach to Secure Speculation
Kevin Cheang and Cameron Rasmussen and Sanjit Seshia and Pramod Subramanyan
2019/309 ( PDF )
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots
Jean-Sebastien Coron and Luca Notarnicola
2019/308 ( PDF )
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation
Yuan Kang and Chengyu Lin and Tal Malkin and Mariana Raykova
2019/307 ( PDF )
Solving $x^{2^k+1}+x+a=0$ in $\mathbb{F}_{2^n}$ with $\gcd(n,k)=1$
Kwang Ho Kim and Sihem Mesnager
2019/306 ( PDF )
Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields
Madhurima Mukhopadhyay and Palash Sarkar
2019/305 ( PDF )
Practical Algebraic Side-Channel Attacks Against ACORN
Alexandre Adomnicai and Laurent Masson and Jacques J.A. Fournier
2019/304 ( PDF )
Ternary Syndrome Decoding with Large Weight
Rémi Bricout and André Chailloux and Thomas Debris-Alazard and Matthieu Lequesne
2019/303 ( PDF )
Analysis of TPL Signature Scheme
Terry Shue Chien Lau and Chik How Tan and Theo Fanuela Prabowo
2019/302 ( PDF )
A Survey of Leakage-Resilient Cryptography
Yael Tauman Kalai and Leonid Reyzin
2019/301 ( PDF )
Safe Compilation for Encrypted Computing
Peter T. Breuer and Simon Pickin
2019/300 ( PDF )
Transient Effect Ring Oscillators Leak Too
Ugo Mureddu and Brice Colombier and Nathalie Bochard and Lilian Bossuet and Viktor Fischer
2019/299 ( PDF )
A Generic Construction of Revocable Identity-Based Encryption
Xuecheng Ma and Dongdai Lin
2019/298 ( PDF )
Improved Classical Cryptanalysis of SIKE in Practice
Craig Costello and Patrick Longa and Michael Naehrig and Joost Renes and Fernando Virdia
2019/297 ( PDF )
Towards Optimized and Constant-Time CSIDH on Embedded Devices
Amir Jalali and Reza Azarderakhsh and Mehran Mozaffari Kermani and David Jao
2019/296 ( PDF )
Hash functions from superspecial genus-2 curves using Richelot isogenies
Wouter Castryck and Thomas Decru and Benjamin Smith
2019/295 ( PDF )
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
Kimia Tajik and Akshith Gunasekaran and Rhea Dutta and Brandon Ellis and Rakesh B. Bobba and Mike Rosulek and Charles V. Wright and Wu-chi Feng
2019/294 ( PDF )
Semi-parallel Logistic Regression for GWAS on Encrypted Data
Miran Kim and Yongsoo Song and Baiyu Li and Daniele Micciancio
2019/293 ( PDF )
Impossibility of Strong KDM Security with Auxiliary Input
Cody Freitag and Ilan Komargodski and Rafael Pass
2019/292 ( PDF )
Timing attacks on Error Correcting Codes in Post-Quantum Schemes
Jan-Pieter D'Anvers and Marcel Tiepelt and Frederik Vercauteren and Ingrid Verbauwhede
2019/291 ( PDF )
CCA Security and Trapdoor Functions via Key-Dependent-Message Security
Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka
2019/290 ( PDF )
Cost effective techniques for chip delayering and in-situ depackaging
Philippe Loubet Moundi
2019/289 ( PDF )
Cryptanalysis of ForkAES
Subhadeep Banik and Jannis Bossert and Amit Jana and Eik List and Stefan Lucks and Willi Meier and Mostafizar Rahman and Dhiman Saha and Yu Sasaki
2019/288 ( PDF )
On the construction of S-boxes using the leaders and followers metaheuristic
Alejandro Freyre-Echevarría and Ismel Martínez-Díaz
2019/287 ( PDF )
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
A. N. Alekseychuk and S. M. Koniushok and M. V. Poremskyi
2019/286 ( PDF )
Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ variables Majority Function
Yindong Chen and Fei Guo and Liu Zhang
2019/285 ( PDF )
SpaceFlip : Unbound Geometry Cryptography
Gideon Samid
2019/284 ( PDF )
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2
Ai Ishida and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka
2019/283 ( PDF )
An Attack on Small Private Keys of RSA Based on Euclidean Algorithm
Dimitrios Poulakis
2019/282 ( PDF )
A Framework for Cryptographic Problems from Linear Algebra
Carl Bootland and Wouter Castryck and Alan Szepieniec and Frederik Vercauteren
2019/281 ( PDF )
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning
Phillipp Schoppmann and Adria Gascon and Mariana Raykova and Benny Pinkas
2019/280 ( PDF )
Multi-Authority Attribute-Based Encryption from LWE in the OT Model
Sam Kim
2019/279 ( PDF )
A Note on Key Agreement and Non-Interactive Commitments
Alex Lombardi and Luke Schaeffer
2019/278 ( PDF )
Uncovering Algebraic Structures in the MPC Landscape
Navneet Agarwal and Sanat Anand and Manoj Prabhakaran
2019/277 ( PDF )
On the boomerang uniformity of quadratic permutations
Sihem Mesnager and Chunming Tang and Maosheng Xiong
2019/276 ( PDF )
BOREALIS: Building Block for Sealed Bid Auctions on Blockchains
Erik-Oliver Blass and Florian Kerschbaum
2019/275 ( PDF )
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation
M. Sadegh Riazi and Mojan Javaheripi and Siam U. Hussain and Farinaz Koushanfar
2019/274 ( PDF )
Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue
Elaine Shi
2019/273 ( PDF )
Compressing Vector OLE
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai
2019/272 ( PDF )
Quantum Security Analysis of AES
Xavier Bonnetain and María Naya-Plasencia and André Schrottenloher
2019/271 ( PDF )
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)
Jintai Ding and Chi Cheng and Yue Qin
2019/270 ( PDF )
Sync HotStuff: Simple and Practical Synchronous State Machine Replication
Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren and Maofan Yin
2019/269 ( PDF )
Digital Signatures for Consensus
Sergey Gorbunov and Hoeteck Wee
2019/268 ( PDF )
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys*
Sergei Bauer and Martin Brunner and Peter Schartner
2019/267 ( PDF )
Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.
Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede
2019/266 ( PDF )
Fast constant-time gcd computation and modular inversion
Daniel J. Bernstein and Bo-Yin Yang
2019/265 ( PDF )
TEX - A Securely Scalable Trustless Exchange
Rami Khalil and Arthur Gervais and Guillaume Felley
2019/264 ( PDF )
Unifying computational entropies via Kullback-Leibler divergence
Rohit Agrawal and Yi-Hsiu Chen and Thibaut Horel and Salil Vadhan
2019/263 ( PDF )
Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones
Jiaping Wang and Hao Wang
2019/262 ( PDF )
Revisiting Post-Quantum Fiat-Shamir
Qipeng Liu and Mark Zhandry
2019/261 ( PDF )
Forward-Secure Multi-Signatures
Manu Drijvers and Gregory Neven
2019/260 ( PDF )
A Modular Treatment of Blind Signatures from Identification Schemes
Eduard Hauck and Eike Kiltz and Julian Loss
2019/259 ( PDF )
A Practical Method to Recover Exact Superpoly in Cube Attack
SenPeng Wang and Bin Hu and Jie Guan and Kai Zhang and TaiRong Shi
2019/258 ( PDF )
Tight Time-Memory Trade-offs for Symmetric Encryption
Joseph Jaeger and Stefano Tessaro
2019/257 ( PDF )
Uncloneable Quantum Encryption via Oracles
Anne Broadbent and Sébastien Lord
2019/256 ( PDF )
DLCT: A New Tool for Differential-Linear Cryptanalysis
Achiya Bar-On and Orr Dunkelman and Nathan Keller and Ariel Weizman
2019/255 ( PDF )
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2019/254 ( PDF )
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries
Divesh Aggarwal and Kai-Min Chung and Han-Hsuan Lin and Thomas Vidick
2019/253 ( PDF )
Founding Secure Computation on Blockchains
Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain
2019/252 ( PDF )
Reversible Proofs of Sequential Work
Hamza Abusalah and Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter
2019/251 ( PDF )
Consensus through Herding
T-H. Hubert Chan and Rafael Pass and Elaine Shi
2019/250 ( PDF )
Function-Dependent Commitments from Homomorphic Authenticators
Lucas Schabhüser and Denis Butin and Johannes Buchmann
2019/249 ( PDF )
Revisiting Variable Output Length XOR Pseudorandom Function
Srimanta Bhattacharya and Mridul Nandi
2019/248 ( PDF )
Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach
Ting Li and Yao Sun
2019/247 ( PDF )
Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
Andrea Coladangelo and Alex B. Grilo and Stacey Jeffery and Thomas Vidick
2019/246 ( PDF )
Towards optimal robust secret sharing with security against a rushing adversary
Serge Fehr and Chen Yuan
2019/245 ( PDF )
Distributed Differential Privacy via Shuffling
Albert Cheu and Adam Smith and Jonathan Ullman and David Zeber and Maxim Zhilyaev
2019/244 ( PDF )
Attacks Only Get Better: How to Break FF3 on Large Domains
Viet Tung Hoang and David Miller and Ni Trieu
2019/243 ( PDF )
4-Round Luby-Rackoff Construction is a qPRP: Tight Quantum Security Bound
Akinori Hosoyamada and Tetsu Iwata
2019/242 ( PDF )
New Constructions of Reusable Designated-Verifier NIZKs
Alex Lombardi and Willy Quach and Ron D. Rothblum and Daniel Wichs and David J. Wu
2019/241 ( PDF )
Efficient Circuit-based PSI with Linear Communication
Benny Pinkas and Thomas Schneider and Oleksandr Tkachenko and Avishay Yanai
2019/240 ( PDF )
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes
Vipul Goyal and Yifan Song
2019/239 ( PDF )
Cheaper Private Set Intersection via Differentially Private Leakage
Adam Groce and Peter Rindal and Mike Rosulek
2019/238 ( PDF )
Robust Encryption, Extended
Rémi Géraud and David Naccache and Răzvan Roşie
2019/237 ( PDF )
Optimal Oblivious Priority Queues
Zahra Jafargholi and Kasper Green Larsen and Mark Simkin
2019/236 ( PDF )
Designated-verifier pseudorandom generators, and their applications
Geoffroy Couteau and Dennis Hofheinz
2019/235 ( PDF )
Reusable Designated-Verifier NIZKs for all NP from CDH
Willy Quach and Ron D. Rothblum and Daniel Wichs
2019/234 ( PDF )
On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm
Léo Ducas and Maxime Plançon and Benjamin Wesolowski
2019/233 ( PDF )
Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption
Nuttapong Attrapadung
2019/232 ( PDF )
On Quantum Advantage in Information Theoretic Single-Server PIR
Dorit Aharonov and Zvika Brakerski and Kai-Min Chung and Ayal Green and Ching-Yi Lai and Or Sattath
2019/231 ( PDF )
Secret-Sharing Schemes for General and Uniform Access Structures
Benny Applebaum and Amos Beimel and Oriol Farrŕs and Oded Nir and Naty Peter
2019/230 ( PDF )
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
Christos Andrikos and Lejla Batina and Lukasz Chmielewski and Liran Lerman and Vasilios Mavroudis and Kostas Papagiannopoulos and Guilherme Perin and Giorgos Rassias and Alberto Sonnino
2019/229 ( PDF )
XOR-counts and lightweight multiplication with fixed elements in binary finite fields
Lukas Kölsch
2019/228 ( PDF )
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
Nimrod Aviram and Kai Gellert and Tibor Jager
2019/227 ( PDF )
Securing Update Propagation with Homomorphic Hashing
Kevin Lewi and Wonho Kim and Ilya Maykov and Stephen Weis
2019/226 ( PDF )
Flyclient: Super-Light Clients for Cryptocurrencies
Benedikt Bünz and Lucianna Kiffer and Loi Luu and Mahdi Zamani
2019/225 ( PDF )
Leakage Resilience of the Duplex Construction
Christoph Dobraunig and Bart Mennink
2019/224 ( PDF )
Compact Adaptively Secure ABE for NC1 from k-Lin
Lucas Kowalczyk and Hoeteck Wee
2019/223 ( PDF )
Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies
Marcelo Blatt and Alexander Gusev and Yuriy Polyakov and Kurt Rohloff and Vinod Vaikuntanathan
2019/222 ( PDF )
(R)CCA Secure Updatable Encryption with Integrity Protection
Michael Klooß and Anja Lehmann and Andy Rupp
2019/221 ( PDF )
Group Signatures without NIZK: From Lattices in the Standard Model
Shuichi Katsumata and Shota Yamada
2019/220 ( PDF )
Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing
Ivan Damgĺrd and Kasper Green Larsen and Jesper Buus Nielsen
2019/219 ( PDF )
Nitro Protocol
Tom Close
2019/218 ( PDF )
Computational Limitations in Robust Classification and Win-Win Results
Akshay Degwekar and Vinod Vaikuntanathan
2019/217 ( PDF )
A family of boolean functions with good cryptographic properties
Guillermo Sosa Gómez and Octavio Paez Osuna
2019/216 ( PDF )
Round Optimal Secure Multiparty Computation from Minimal Assumptions
Arka Rai Choudhuri and Michele Ciampi and Vipul Goyal and Abhishek Jain and Rafail Ostrovsky
2019/215 ( PDF )
Approx-SVP in Ideal Lattices with Pre-processing
Alice Pellet-Mary and Guillaume Hanrot and Damien Stehlé
2019/214 ( PDF )
Four-Round Secure Multiparty Computation from General Assumptions
Michele Ciampi and Rafail Ostrovsky
2019/213 ( PDF )
On ELFs, Deterministic Encryption, and Correlated-Input Security
Mark Zhandry
2019/212 ( PDF )
A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes
Hossein Oraei and Massoud Hadian Dehkordi
2019/211 ( PDF )
MonZa: Fast Maliciously Secure Two Party Computation on Z_{2^k}
Dario Catalano and Mario Di Raimondo and Dario Fiore and Irene Giacomelli
2019/210 ( PDF )
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Christof Beierle and Gregor Leander and Amir Moradi and Shahram Rasoolzadeh
2019/209 ( PDF )
SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes
Zhenzhen Bao and Jian Guo and San Ling and Yu Sasaki
2019/208 ( PDF )
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA
Muzhou Li and Kai Hu and Meiqin Wang
2019/207 ( PDF )
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security
Dragos Rotaru and Tim Wood
2019/206 ( PDF )
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
James Howe and Ayesha Khalid and Marco Martinoli and Francesco Regazzoni and Elisabeth Oswald
2019/205 ( PDF )
A note on isogeny-based hybrid verifiable delay functions
Barak Shani
2019/204 ( PDF )
The Security of All Private-key Bits in Isogeny-based Schemes
Barak Shani
2019/203 ( PDF )
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
Osman Bicer and Alptekin Kupcu
2019/202 ( PDF )
The Distinction Between Fixed and Random Generators in Group-Based Assumptions
James Bartusek and Fermi Ma and Mark Zhandry
2019/201 ( PDF )
DL-Extractable UC-Commitment Schemes
Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michał Zając
2019/200 ( PDF )
Degree 2 is Complete for the Round-Complexity of Malicious MPC
Benny Applebaum and Zvika Brakerski and Rotem Tsabary
2019/199 ( PDF )
Password-Authenticated Public-Key Encryption
Tatiana Bradley and Jan Camenisch and Stanislaw Jarecki and Anja Lehmann and Gregory Neven and Jiayu Xu
2019/198 ( PDF )
Seedless Fruit is the Sweetest: Random Number Generation, Revisited
Sandro Coretti and Yevgeniy Dodis and Harish Karthikeyan and Stefano Tessaro
2019/197 ( PDF )
Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions
Esteban Landerreche and Marc Stevens and Christian Schaffner
2019/196 ( PDF )
Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions
Michael Backes and Nico Döttling and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider
2019/195 ( PDF )
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
Jung Hee Cheon and Wonhee Cho and Minki Hhan and Minsik Kang and Jiseung Kim and Changmin Lee
2019/194 ( PDF )
Classical zero-knowledge arguments for quantum computations
Thomas Vidick and Tina Zhang
2019/193 ( PDF )
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction
Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2019/192 ( PDF )
An Omission-Tolerant Cryptographic Checksum
Francisco Corella and Karen Lewison
2019/191 ( PDF )
Zether: Towards Privacy in a Smart Contract World
Benedikt Bünz and Shashank Agrawal and Mahdi Zamani and Dan Boneh
2019/190 ( PDF )
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model
Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner
2019/189 ( PDF )
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis
Yaoling Ding and An Wang and Siu Ming YIU
2019/188 ( PDF )
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
Dan Boneh and Elette Boyle and Henry Corrigan-Gibbs and Niv Gilboa and Yuval Ishai
2019/187 ( PDF )
Fully homomorphic encryption modulo Fermat numbers
Antoine Joux
2019/186 ( PDF )
Re-thinking untraceability in the CryptoNote-style blockchain
Jiangshan Yu and Man Ho Allen Au and Paulo Esteves-Verissimo
2019/185 ( PDF )
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Ralph Ankele and Christoph Dobraunig and Jian Guo and Eran Lambooij and Gregor Leander and Yosuke Todo
2019/184 ( PDF )
Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon
William Diehl and Farnoud Farahmand and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj
2019/183 ( PDF )
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
Katherine E. Stange
2019/182 ( PDF )
Security is an Architectural Design Constraint
Prasanna Ravi and Sourav Sen Gupta and Anupam Chattopadhyay and Mustafa Khairallah and Zakaria Najm and Shivam Bhasin
2019/181 ( PDF )
Lower Bounds for Leakage-Resilient Secret Sharing
Jesper Buus Nielsen and Mark Simkin
2019/180 ( PDF )
Disco: Modern Session Encryption
David Wong
2019/179 ( PDF )
Synchronous, with a Chance of Partition Tolerance
Yue Guo and Rafael Pass and Elaine Shi
2019/178 ( PDF )
LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness
Rohit Sinha and Sivanarayana Gaddam and Ranjit Kumaresan
2019/177 ( PDF )
Genus Two Isogeny Cryptography
E.V. Flynn and Yan Bo Ti
2019/176 ( PDF )
Homomorphic Encryption for Finite Automata
Nicholas Genise and Craig Gentry and Shai Halevi and Baiyu Li and Daniele Micciancio
2019/175 ( PDF )
The Communication Complexity of Threshold Private Set Intersection
Satrajit Ghosh and Mark Simkin
2019/174 ( PDF )
Towards an Exponential Lower Bound for Secret Sharing
Kasper Green Larsen and Mark Simkin
2019/173 ( PDF )
Shorter Quadratic QA-NIZK Proofs
Vanesa Daza and Alonso González and Zaira Pindado and Carla Rŕfols and Javier Silva
2019/172 ( PDF )
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS
Danping Shi and Siwei Sun and Yu Sasaki and Chaoyun Li and Lei Hu
2019/171 ( PDF )
XONN: XNOR-based Oblivious Deep Neural Network Inference
M. Sadegh Riazi and Mohammad Samragh and Hao Chen and Kim Laine and Kristin Lauter and Farinaz Koushanfar
2019/170 ( PDF )
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes
Lingyue Qin and Xiaoyang Dong and Keting Jia and Rui Zong
2019/169 ( PDF )
Updatable Anonymous Credentials and Applications to Incentive Systems
Johannes Blömer and Jan Bobolz and Denis Diemert and Fabian Eidens
2019/168 ( PDF )
Profiling Side-channel Analysis in the Efficient Attacker Framework
Stjepan Picek and Annelie Heuser and Guilherme Perin and Sylvain Guilley
2019/167 ( PDF )
Analysis of Secure Caches using a Three-Step Model for Timing-Based Attacks
Shuwen Deng and Wenjie Xiong and Jakub Szefer
2019/166 ( PDF )
Verifiable Delay Functions from Supersingular Isogenies and Pairings
Luca De Feo and Simon Masson and Christophe Petit and Antonio Sanso
2019/165 ( PDF )
libInterMAC: Beyond Confidentiality and Integrity in Practice
Martin R. Albrecht and Torben Brandt Hansen and Kenneth G. Paterson
2019/164 ( PDF )
Use your Brain! Arithmetic 3PC For Any Modulus with Active Security
Hendrik Eerikson and Marcel Keller and Claudio Orlandi and Pille Pullonen and Joonas Puura and Mark Simkin
2019/163 ( PDF )
Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder
Melissa Azouaoui and Romain Poussier and François-Xavier Standaert
2019/162 ( PDF )
A New Blockchain Proposal Supporting Multi-Stage Proof-of-Work
Palash Sarkar
2019/161 ( PDF )
Understanding Optimizations and Measuring Performances of PBKDF2
Andrea Francesco Iuorio and Andrea Visconti
2019/160 ( PDF )
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data
Sujoy Sinha Roy and Furkan Turan and Kimmo Jarvinen and Frederik Vercauteren and Ingrid Verbauwhede
2019/159 ( PDF )
MPC with Synchronous Security and Asynchronous Responsiveness
Chen-Da Liu-Zhang and Julian Loss and Ueli Maurer and Tal Moran and Daniel Tschudi
2019/158 ( PDF )
Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors
Chris Peikert and Sina Shiehian
2019/157 ( PDF )
Schnorr-based implicit certification: improving the security and efficiency of V2X communications
Paulo S. L. M. Barreto and Marcos A. Simplicio Jr. and Jefferson E. Ricardini and Harsh Kupwade Patil
2019/156 ( PDF )
Efficient Constructions for Almost-everywhere Secure Computation
Siddhartha Jayanti and Srinivasan Raghuraman and Nikhil Vyas
2019/155 ( PDF )
Constant-time BCH Error-Correcting Code
Matthew Walters and Sujoy Sinha Roy
2019/154 ( PDF )
FastKitten: Practical Smart Contracts on Bitcoin
Poulami Das and Lisa Eckey and Tommaso Frassetto and David Gens and Kristina Hostáková and Patrick Jauernig and Sebastian Faust and Ahmad-Reza Sadeghi
2019/153 ( PDF )
Overdrive2k: Efficient Secure MPC over $Z_{2^k}$ from Somewhat Homomorphic Encryption
Emmanuela Orsini and Nigel P. Smart and Frederik Vercauteren
2019/152 ( PDF )
Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption
Duhyeong Kim and Yongha Son and Dongwoo Kim and Andrey Kim and Seungwan Hong and Jung Hee Cheon
2019/151 ( PDF )
Solving binary MQ with Grover's algorithm
Peter Schwabe and Bas Westerbaan
2019/150 ( PDF )
QcBits: Constant-Time Small-Key Code-Based Cryptography
Tung Chou
2019/149 ( PDF )
Improved Lattice-based CCA2-Secure PKE in the Standard Model
Jiang Zhang and Yu Yu and Shuqin Fan and Zhenfeng Zhang
2019/148 ( PDF )
On the efficiency of pairing-based proofs under the d-PKE
Ariel Gabizon
2019/147 ( PDF )
Practical Collision Attacks against Round-Reduced SHA-3
Jian Guo and Guohong Liao and Guozhen Liu and Meicheng Liu and Kexin Qiao and Ling Song
2019/146 ( PDF )
Boomerang Connectivity Table Revisited
Ling Song and Xianrui Qin and Lei Hu
2019/145 ( PDF )
Achieving GWAS with Homomorphic Encryption
Jun Jie Sim and Fook Mun Chan and Shibin Chen and Benjamin Hong Meng Tan and Khin Mi Mi Aung
2019/144 ( PDF )
Modeling Power Efficiency of S-boxes Using Machine Learning
Rajat Sadhukhan and Nilanjan Datta and Debdeep Mukhopadhyay
2019/143 ( PDF )
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
Benjamin Hettwer and Stefan Gehrer and Tim Güneysu
2019/142 ( PDF )
LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs
Matteo Campanelli and Dario Fiore and Anaďs Querol
2019/141 ( PDF )
A General Proof Framework for Recent AES Distinguishers
Christina Boura and Anne Canteaut and Daniel Coggia
2019/140 ( PDF )
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning
Jinhyun So and Basak Guler and A. Salman Avestimehr and Payman Mohassel
2019/139 ( PDF )
Vulnerability and Remedy of Stripped Function Logic Locking
Hai Zhou and Yuanqi Shen and Amin Rezaei
2019/138 ( PDF )
Unifying Leakage Models on a Rényi Day
Thomas Prest and Dahmun Goudarzi and Ange Martinelli and Alain Passelčgue
2019/137 ( PDF )
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications
Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2019/136 ( PDF )
Divisible E-Cash from Constrained Pseudo-Random Functions
Florian Bourse and David Pointcheval and Olivier Sanders
2019/135 ( PDF )
It wasn't me! Repudiability and Unclaimability of Ring Signatures
Sunoo Park and Adam Sealfon
2019/134 ( PDF )
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/133 ( PDF )
On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography.
Vasyl Ustimenko
2019/132 ( PDF )
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
Olivier Bronchain and Julien M. Hendrickx and Clément Massart and Alex Olshevsky and François-Xavier Standaert
2019/131 ( PDF )
Secure Evaluation of Quantized Neural Networks
Anders Dalskov and Daniel Escudero and Marcel Keller
2019/130 ( PDF )
Are Certificate Thumbprints Unique?
Greg Zaverucha and Dan Shumow
2019/129 ( PDF )
Homomorphic Secret Sharing from Lattices Without FHE
Elette Boyle and Lisa Kohl and Peter Scholl
2019/128 ( PDF )
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions
Junichi Tomida
2019/127 ( PDF )
Beyond Birthday Bound Secure MAC in Faulty Nonce Model
Avijit Dutta and Mridul Nandi and Suprita Talnikar
2019/126 ( PDF )
New Automatic search method for Truncated-differential characteristics: Application to Midori, SKINNY and CRAFT
AmirHossein E. Moghaddam and Zahra Ahmadian
2019/125 ( PDF )
Combinatorial Primality Test
Maheswara Rao Valluri
2019/124 ( PDF )
Anomalous Look at Provable Security
Douglas Wikström
2019/123 ( PDF )
Security of Multilinear Galois Mode (MGM)
Liliya Akhmetzyanova and Evgeny Alekseev and Grigory Karpunin and Vladislav Nozdrunov
2019/122 ( PDF )
Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes
Santosh Ghosh and Rafael Misoczki and Manoj R. Sastry
2019/121 ( PDF )
Anonymous Attestation for IoT
Santosh Ghosh and Andrew H. Reinders and Rafael Misoczki and Manoj R. Sastry
2019/120 ( PDF )
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019
Keita Xagawa
2019/119 ( PDF )
On the security of the BCTV Pinocchio zk-SNARK variant
Ariel Gabizon
2019/118 ( -- withdrawn -- )
Defeating the Hart, Kim, Micheli, Pascuel-Perez, Petit, Quek Attack on WalnutDSA(TM)
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2019/117 ( PDF )
Non-Interactive Keyed-Verification Anonymous Credentials
Geoffroy Couteau and Michael Reichle
2019/116 ( PDF )
Multi-Key Homomophic Encryption from TFHE
Hao Chen and Ilaria Chillotti and Yongsoo Song
2019/115 ( PDF )
Distributional Collision Resistance Beyond One-Way Functions
Nir Bitansky and Iftach Haitner and Ilan Komargodski and Eylon Yogev
2019/114 ( PDF )
Fast Multiparty Threshold ECDSA with Fast Trustless Setup
Rosario Gennaro and Steven Goldfeder
2019/113 ( PDF )
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure
Ferucio Laurentiu Tiplea and Cristian Hristea
2019/112 ( PDF )
Variable Elimination - a Tool for Algebraic Cryptanalysis
Bjřrn Greve and Řyvind Ytrehus and Hĺvard Raddum
2019/111 ( PDF )
On the Complexity of non-recursive $n$-term Karatsuba Multiplier for Trinomials
Yin Li and Shantanu Sharma and Yu Zhang and Xingpo Ma and Chuanda Qi
2019/110 ( PDF )
Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves
Suhri Kim and Kisoon Yoon and Young-Ho Park and Seokhie Hong
2019/109 ( PDF )
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture
Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2019/108 ( PDF )
Minicrypt Primitives with Algebraic Structure and Applications
Navid Alamati and Hart Montgomery and Sikhar Patranabis and Arnab Roy
2019/107 ( PDF )
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit
Shun Li and Siwei Sun and Chaoyun Li and Zihao Wei and Lei Hu
2019/106 ( PDF )
Identity-Based Higncryption
Hongbing Wang and Yunlei Zhao
2019/105 ( PDF )
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
Antonio Faonio and Daniele Venturi
2019/104 ( PDF )
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation
Naomi Farley and Robert Fitzpatrick and Duncan Jones
2019/103 ( PDF )
Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE
Samuel Jaques and John M. Schanck
2019/102 ( PDF )
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum
Hisham S. Galal and Amr M. Youssef
2019/101 ( PDF )
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption
Sergiu Carpov and Nicolas Gama and Mariya Georgieva and Juan Ramon Troncoso-Pastoriza
2019/100 ( PDF )
Power Analysis on NTRU Prime
Wei-Lun Huang and Jiun-Peng Chen and Bo-Yin Yang
2019/099 ( PDF )
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings
Mary Maller and Sean Bowe and Markulf Kohlweiss and Sarah Meiklejohn
2019/098 ( PDF )
A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions
Pedro Branco
2019/097 ( PDF )
Linearly equivalent S-boxes and the Division Property
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin
2019/096 ( PDF )
On Recovering Affine Encodings in White-Box Implementations
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin and Brice Minaud
2019/095 ( PDF )
Variants of the AES Key Schedule for Better Truncated Differential Bounds
Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean and Baptiste Lambin
2019/094 ( PDF )
CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges
Aron Gohr and Sven Jacob and Werner Schindler
2019/093 ( -- withdrawn -- )
Key Encapsulation Mechanism From Modular Multivariate Linear Equations
Muhammad Rezal Kamel Ariffin and Abderrahmane Nitaj and Yanbin Pan and Nur Azman Abu
2019/092 ( PDF )
Partitions in the S-Box of Streebog and Kuznyechik
Léo Perrin
2019/091 ( PDF )
Efficient Zero-Knowledge for NP from Secure Two-Party Computation
Li Hongda and Pan Dongxue and Ni Peifang
2019/090 ( PDF )
Round5: Compact and Fast Post-Quantum Public-Key Encryption
Hayo Baan and Sauvik Bhattacharya and Scott Fluhrer and Oscar Garcia-Morchon and Thijs Laarhoven and Ronald Rietman and Markku-Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang
2019/089 ( PDF )
The General Sieve Kernel and New Records in Lattice Reduction
Martin R. Albrecht and Léo Ducas and Gottfried Herold and Elena Kirshanova and Eamonn W. Postlethwaite and Marc Stevens
2019/088 ( PDF )
Continuous Key Agreement with Reduced Bandwidth
Nir Drucker and Shay Gueron
2019/087 ( PDF )
The Secure Link Prediction Problem
Laltu Sardar and Sushmita Ruj
2019/086 ( PDF )
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG
George Teseleanu
2019/085 ( PDF )
The Lattice-Based Digital Signature Scheme qTESLA
Erdem Alkim and Paulo S. L. M. Barreto and Nina Bindel and Juliane Kramer and Patrick Longa and Jefferson E. Ricardini
2019/084 ( PDF )
An Information Obfuscation Calculus for Encrypted Computing
Peter T. Breuer
2019/083 ( PDF )
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15
Zhen Liu and Yanbin Pan and Zhenfei Zhang
2019/082 ( PDF )
Arithmetic Garbling from Bilinear Maps
Nils Fleischhacker and Giulio Malavolta and Dominique Schröder
2019/081 ( PDF )
Practical Group-Signatures with Privacy-Friendly Openings
Stephan Krenn and Kai Samelin and Christoph Striecks
2019/080 ( PDF )
Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing
Aner Ben Efraim and Michael Nielsen and Eran Omri
2019/079 ( PDF )
New Results about the Boomerang Uniformity of Permutation Polynomials
Kangquan Li and Longjiang Qu and Bing Sun and Chao Li
2019/078 ( PDF )
Testing the Randomness of Cryptographic Function Mappings
Alan Kaminsky
2019/077 ( PDF )
Pairing Implementation Revisited
Michael Scott
2019/076 ( PDF )
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations
Matthieu Rivain and Junwei Wang
2019/075 ( PDF )
Assessment of the Key-Reuse Resilience of NewHope
Aurélie Bauer and Henri Gilbert and Guénaël Renault and Mélissa Rossi
2019/074 ( PDF )
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
Chun Guo and Jonathan Katz and Xiao Wang and Yu Yu
2019/073 ( PDF )
Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model
Cristian Hristea and Ferucio Laurentiu Tiplea
2019/072 ( PDF )
ZeroCT: Improving ZeroCoin with Confidential Transactions and more
Alex Vazquez
2019/071 ( PDF )
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks
Zhilin Zhang and Ke Wang and Weipeng Lin and Ada Wai-Chee Fu and Raymond Chi-Wing Wong
2019/070 ( PDF )
Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool
Sam M. Werner and Paul J. Pritz and Alexei Zamyatin and William J. Knottenbelt
2019/069 ( PDF )
Quantum Indistinguishability of Random Sponges
Jan Czajkowski and Andreas Hülsing and Christian Schaffner
2019/068 ( PDF )
Sampling the Integers with Low Relative Error
Michael Walter
2019/067 ( PDF )
Managing Your Kleptographic Subscription Plan
George Teseleanu
2019/066 ( PDF )
Publicly Verifiable Proofs from Blockchains
Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2019/065 ( PDF )
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols
Jan Camenisch and Manu Drijvers and Björn Tackmann
2019/064 ( PDF )
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management
Keita Emura and Takuya Hayashi
2019/063 ( PDF )
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup
Michael Backes and Lucjan Hanzlik and Amir Herzberg and Aniket Kate and Ivan Pryvalov
2019/062 ( PDF )
Additively Homomorphic IBE from Higher Residuosity
Michael Clear and Ciaran McGoldrick
2019/061 ( PDF )
SigAttack: New High-level SAT-based Attack on Logic Encryptions
Yuanqi Shen and You Li and Shuyu Kong and Amin Rezaei and Hai Zhou
2019/060 ( PDF )
CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States
Amin Rezaei and You Li and Yuanqi Shen and Shuyu Kong and Hai Zhou
2019/059 ( PDF )
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption
Yuanqi Shen and You Li and Amin Rezaei and Shuyu Kong and David Dlott and Hai Zhou
2019/058 ( PDF )
Tightly secure hierarchical identity-based encryption
Roman Langrehr and Jiaxin Pan
2019/057 ( PDF )
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts
Rafael del Pino and Vadim Lyubashevsky and Gregor Seiler
2019/056 ( PDF )
Obfuscating simple functionalities from knowledge assumptions
Ward Beullens and Hoeteck Wee
2019/055 ( PDF )
Rate-Optimizing Compilers for Continuously Non-Malleable Codes
Sandro Coretti and Antonio Faonio and Daniele Venturi
2019/054 ( PDF )
Deep Learning to Evaluate Secure RSA Implementations
Mathieu Carbone and Vincent Conin and Marie-Angela Cornelie and Francois Dassance and Guillaume Dufresne and Cecile Dumas and Emmanuel Prouff and Alexandre Venelli
2019/053 ( -- withdrawn -- )
A New Code-based Signature Scheme with Shorter Public Key
Yongcheng Song and Xinyi Huang and Yi Mu and Wei Wu
2019/052 ( PDF )
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/051 ( PDF )
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy
Daode Zhang and Jie Li and Bao Li and Xianhui Lu and Haiyang Xue and Dingding Jia and Yamin Liu
2019/050 ( PDF )
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions
Takahiro Matsuda and Kenta Takahashi and Takao Murakami and Goichiro Hanaoka
2019/049 ( PDF )
The Relationship between the Construction and Solution of the MILP Models and Applications
Lingchen Li and Wenling Wu and Yafei Zheng and Lei Zhang
2019/048 ( PDF )
Sub-logarithmic Distributed Oblivious RAM with Small Block Size
Eyal Kushilevitz and Tamer Mour
2019/047 ( PDF )
NIST Post-Quantum Cryptography- A Hardware Evaluation Study
Kanad Basu and Deepraj Soni and Mohammed Nabeel and Ramesh Karri
2019/046 ( PDF )
Block-Anti-Circulant Unbalanced Oil and Vinegar
Alan Szepieniec and Bart Preneel
2019/045 ( PDF )
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio
Ryo Nishimaki and Takashi Yamakawa
2019/044 ( PDF )
Toha Key Hardened Function
Ahmad Almorabea
2019/043 ( PDF )
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
Qian Guo and Thomas Johansson and Alexander Nilsson
2019/042 ( PDF )
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs
Lisa Kohl
2019/041 ( PDF )
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
Bartosz Zoltak
2019/040 ( PDF )
NTTRU: Truly Fast NTRU Using NTT
Vadim Lyubashevsky and Gregor Seiler
2019/039 ( PDF )
Fully Invisible Protean Signatures Schemes
Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2019/038 ( PDF )
Identity-based Broadcast Encryption with Efficient Revocation
Aijun Ge and Puwen Wei
2019/037 ( PDF )
Improving Attacks on Round-Reduced Speck32/64 using Deep Learning
Aron Gohr
2019/036 ( PDF )
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR
Shuichi Katsumata and Shota Yamada
2019/035 ( PDF )
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ
Carsten Baum and Daniele Cozzo and Nigel P. Smart
2019/034 ( PDF )
A Formal Treatment of Hardware Wallets
Myrto Arapinis and Andriana Gkaniatsou and Dimitris Karakostas and Aggelos Kiayias
2019/033 ( PDF )
FE for Inner Products and Its Application to Decentralized ABE
Zhedong Wang and Xiong Fan and Feng-Hao Liu
2019/032 ( PDF )
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation
Steven Galbraith and Jake Massimo and Kenneth G. Paterson
2019/031 ( PDF )
Collusion Resistant Broadcast and Trace from Positional Witness Encryption
Rishab Goyal and Satyanarayana Vusirikala and Brent Waters
2019/030 ( -- withdrawn -- )
Analysis of Two Countermeasures against the Signal Leakage Attack
Ke Wang and Zhenfeng Zhang
2019/029 ( -- withdrawn -- )
Upper Bound on $\lambda_1(\Lambda^{\bot}(\mathbf A))$
Huiwen Jia and Chunming Tang and Yanhua Zhang
2019/028 ( PDF )
nQUIC: Noise-Based QUIC Packet Protection
Mathias Hall-Andersen and David Wong and Nick Sullivan and Alishah Chator
2019/027 ( PDF )
Group Signatures with Selective Linkability
Lydia Garms and Anja Lehmann
2019/026 ( PDF )
Non-malleable encryption with proofs of plaintext knowledge and applications to voting
Ben Smyth and Yoshikazu Hanatani
2019/025 ( PDF )
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers
Yu Liu and Huicong Liang and Muzhou Li and Luning Huang and Kai Hu and Chenhe Yang and Meiqin Wang
2019/024 ( PDF )
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography
Yalin Chen and Jue-Sam Chou and Fang-Qi Zhou and Shu-Mei Hsu
2019/023 ( PDF )
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
Joachim Breitner and Nadia Heninger
2019/022 ( PDF )
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Anthony Demeri and Thomas Conroy and Alex Nolan and William Diehl
2019/021 ( PDF )
Ilya Aldanov
2019/020 ( PDF )
Decentralizing Inner-Product Functional Encryption
Michel Abdalla and Fabrice Benhamouda and Markulf Kolhweiss and Hendrik Waldner
2019/019 ( PDF )
Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach
Chunning Zhou and Wentao Zhang and Tianyou Ding and Zejun Xiang
2019/018 ( PDF )
Generic Constructions of Robustly Reusable Fuzzy Extractor
Yunhua Wen and Shengli Liu and Dawu Gu
2019/017 ( PDF )
CHURP: Dynamic-Committee Proactive Secret Sharing
Sai Krishna Deepak Maram and Fan Zhang and Lun Wang and Andrew Low and Yupeng Zhang and Ari Juels and Dawn Song
2019/016 ( PDF )
Fast Message Franking: From Invisible Salamanders to Encryptment
Yevgeniy Dodis and Paul Grubbs and Thomas Ristenpart and Joanne Woodage
2019/015 ( PDF )
More Efficient Algorithms for the NTRU Key Generation using the Field Norm
Thomas Pornin and Thomas Prest
2019/014 ( PDF )
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks
Gaurav Panwar and Satyajayant Misra and Roopa Vishwanathan
2019/013 ( PDF )
The Science of Guessing in Collision Optimized Divide-and-Conquer Attacks
Changhai Ou and Siew-Kei Lam and Guiyuan Jiang
2019/012 ( PDF )
A Proof of the Beierle-Kranz-Leander’s Conjecture related to Lightweight Multiplication in $F_{2^n}$
Sihem Mesnager and Kwang Ho Kim and Dujin Jo and Junyop Choe and Munhyon Han and Dok Nam Lee
2019/011 ( PDF )
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Paul Grubbs and Marie-Sarah Lacharité and Brice Minaud and Kenneth G. Paterson
2019/010 ( PDF )
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC
Rodrigo Abarzúa and Claudio Valencia and Julio López
2019/009 ( PDF )
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
Qian Guo and Thomas Johansson and Erik Mĺrtensson and Paul Stankovski Wagner
2019/008 ( PDF )
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
Jingyu Pan and Shivam Bhasin and Fan Zhang and Kui Ren
2019/007 ( PDF )
Tight Security Bounds for Generic Stream Cipher Constructions
Matthias Hamann and Matthias Krause
2019/006 ( PDF )
Minimizing Trust in Hardware Wallets with Two Factor Signatures
Antonio Marcedone and Rafael Pass and abhi shelat
2019/005 ( PDF )
ScanSAT: Unlocking Obfuscated Scan Chains
Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, and Ozgur Sinanoglu
2019/004 ( PDF )
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
Guillaume Dabosville and Houssem Maghrebi and Alexis Lhuillery and Julien Bringer and Thanh-Ha Le
2019/003 ( -- withdrawn -- )
Secure and Effective Logic Locking for Machine Learning Applications
Yuntao Liu and Yang Xie and Abhishek Charkraborty and Ankur Srivastava
2019/002 ( PDF )
Leakage-Resilient Group Signature: Definitions and Constructions
Jianye Huang and Qiong Huang
2019/001 ( PDF )
Sanctorum: A lightweight security monitor for secure enclaves
Ilia Lebedev and Kyle Hogan and Jules Drean and David Kohlbrenner and Dayeol Lee and Krste Asanović and Dawn Song and Srinivas Devadas

[ Cryptology ePrint archive ]