Cryptology ePrint Archive: Listing for 2020
-
2020/1620 ( PDF )
- Neural Aided Statistical Attack for Cryptanalysis
- Yi Chen and Hongbo Yu
-
2020/1619 ( PDF )
- Getting Rid of Linear Algebra in Number Theory Problems
- Paul Kirchner and Pierre-Alain Fouque
-
2020/1618 ( PDF )
- Proof-Carrying Data without Succinct Arguments
- Benedikt Bünz and Alessandro Chiesa and William Lin and Pratyush Mishra and Nicholas Spooner
-
2020/1617 ( PDF )
- Arguments of Knowledge via hidden order groups
- Steve Thakur
-
2020/1616 ( PDF )
- Algebraic Geometric Secret Sharing Schemes over Large Fields Are Asymptotically Threshold
- Fan Peng and Hao Chen and Chang-An Zhao
-
2020/1615 ( PDF )
- An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations
- Jiangtao Yuan and and Guoai Xu and Guosheng Xu
-
2020/1614 ( PDF )
- SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies
- Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gaži and Sarah Meiklejohn and Edgar Weippl
-
2020/1613 ( PDF )
- Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures
- Sri Aravinda Krishnan Thyagarajan and Giulio Malavolta
-
2020/1612 ( PDF )
- A New Efficient Hierarchical Multi-secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations
- Jiangtao Yuan and Jing Yang and Guoai Xu and Xingxing Jia and Fang-wei Fu and Chenyu Wang
-
2020/1611 ( PDF )
- SLAP: Simple Lattice-Based Private Stream Aggregation Protocol
- Jonathan Takeshita and Ryan Karl and Ting Gong and Taeho Jung
-
2020/1610 ( PDF )
- New directions in the ransomware phenomenon
- Mihai-Andrei Costandache and Marian-Stefan Mihalache and Emil Simion
-
2020/1609 ( PDF )
- A new method for secondary constructions of vectorial bent functions
- Amar Bapić and Enes Pasalic
-
2020/1608 ( PDF )
- Cryptographic competitions
- Daniel J. Bernstein
-
2020/1607 ( PDF )
- Manta: Privacy Preserving Decentralized Exchange
- Shumo Chu and Qiudong Xia and Zhenfei Zhang
-
2020/1606 ( PDF )
- PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption
- Wen-jie Lu and Zhicong Huang and Cheng Hong and Yiping Ma and Hunter Qu
-
2020/1605 ( PDF )
- $P_4$-free Partition and Cover Numbers and Application
- Alexander R. Block and Simina Branzei and Hemanta K. Maji and Himanshi Mehta and Tamalika Mukherjee and Hai H. Nguyen
-
2020/1604 ( PDF )
- An Embedded Domain-Specific Language for Logical Circuit Descriptions with Applications to Garbled Circuits
- Andrei Lapets and Wyatt Howe and Ben Getchell and Frederick Jansen
-
2020/1603 ( PDF )
- One-Time Delegation of Unlinkable Signing Rights and Its Application
- Takashi Nishide
-
2020/1602 ( PDF )
- Speeding-up Ideal Lattice-Based Key Exchange Using a RSA/ECC Coprocessor
- Aurélien Greuet and Simon Montoya and Guénaël Renault
-
2020/1601 ( PDF )
- Adaptive layer-two dispute periods in blockchains
- Rami Khalil and Naranker Dulay
-
2020/1600 ( PDF )
- Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis
- Unai Rioja and Lejla Batina and Jose Luis Flores and Igor Armendariz
-
2020/1599 ( PDF )
- Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing
- Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky and Mohamed Elsabagh and Nikolaos Kiourtis and Brian Schulte and Angelos Stavrou
-
2020/1598 ( PDF )
- MILP Based Differential Attack on Round Reduced WARP
- Manoj Kumar and Tarun Yadav
-
2020/1597 ( PDF )
- A New Improved AES S-box With Enhanced Properties
- Abderrahmane Nitaj and Willy Susilo and Joseph Tonien
-
2020/1596 ( PDF )
- Batched Differentially Private Information Retrieval
- Kinan Dak Albab and Rawane Issa and Mayank Varia and Kalman Graffi
-
2020/1595 ( PDF )
- Attack Beyond-Birthday-Bound MACs in Quantum Setting
- Tingting Guo and Peng Wang and Lei Hu and Dingfeng Ye
-
2020/1594 ( PDF )
- Bootstrapping on SEAL
- HyungChul Kang and Joon-Woo Lee and Yongwoo Lee and Young-Sik Kim and Jong-Seon No
-
2020/1593 ( PDF )
- Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies
- Edward Eaton and David Jao and and Chelsea Komlo
-
2020/1592 ( PDF )
- Puncturable Pseudorandom Sets and Private Information Retrieval with Polylogarithmic Bandwidth and Sublinear Time
- Elaine Shi and Waqar Aqeel and Balakrishnan Chandrasekaran and Bruce Maggs
-
2020/1591 ( PDF )
- Game-Theoretically Fair Leader Election in O(log log n) Rounds under Majority Coalitions
- Kai-Min Chung and T-H. Hubert Chan and Ting Wen and Elaine Shi (random author ordering)
-
2020/1590 ( PDF )
- RandPiper -- Reconfiguration-Friendly Random Beacons with Quadratic Communication
- Adithya Bhat and Nibesh Shrestha and Aniket Kate and Kartik Nayak
-
2020/1589 ( PDF )
- Unifying Presampling via Concentration Bounds
- Siyao Guo and Qian Li and Qipeng Liu and Jiapeng Zhang
-
2020/1588 ( PDF )
- Deniable Fully Homomorphic Encryption from LWE
- Shweta Agrawal and Shafi Goldwasser and Saleet Mossel
-
2020/1587 ( PDF )
- On the properties of the Boolean functions associated to the differential spectrum of general APN functions and their consequences
- Claude Carlet
-
2020/1586 ( PDF )
- Unifying Compilers for SNARKs, SMT, and More
- Alex Ozdemir and Fraser Brown and Riad S. Wahby
-
2020/1585 ( PDF )
- Semi-Regularity of Pairs of Boolean Polynomials
- Timothy J. Hodges and Hari R. Iyer
-
2020/1584 ( PDF )
- Post-Quantum Hash-Based Signatures for Secure Boot
- Panos Kampanakis and Peter Panburana and Michael Curcio and Chirag Shroff
-
2020/1583 ( PDF )
- HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System
- Iraklis Symeonidis and Dragos Rotaru and Mustafa A. Mustafa and Bart Mennink and Bart Preneel and Panos Papadimitratos
-
2020/1582 ( PDF )
- A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application
- Hangi Kim and Yongjin Jeon and Giyoon Kim and Jongsung Kim and Bo-Yeon Sim and Dong-Guk Han and Hwajeong Seo and Seonggyeom Kim and Seokhie Hong and Jaechul Sung and Deukjo Hong
-
2020/1581 ( PDF )
- Remark on the Security of CKKS Scheme in Practice
- Jung Hee Cheon and Seungwan Hong and Duhyeong Kim
-
2020/1580 ( PDF )
- Achieving State Machine Replication without Honesty Assumptions
- Conor McMenamin and Vanesa Daza and Matteo Pontecorvi
-
2020/1579 ( PDF )
- Efficient Verifiable Image Redacting based on zk-SNARKs
- Hankyung Ko and Ingeun Lee and Seunghwa Lee and Jihye Kim and Hyunok Oh
-
2020/1578 ( PDF )
- An IND-CCA2 Attack Against the 1st- and 2nd-round Versions of NTS-KEM
- Tung Chou
-
2020/1577 ( PDF )
- Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning
- Alessandro Baccarini and Marina Blanton and Chen Yuan
-
2020/1576 ( PDF )
- How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free
- Changhui Hu and Jin Li and Zheli Liu and Xiaojie Guo and Yu Wei and Xuan Guang and Grigorios Loukides and Changyu Dong
-
2020/1575 ( PDF )
- (In)security of the Radio Interface in Sigfox
- Loïc Ferreira
-
2020/1574 ( PDF )
- Analysing Mining Machine Shutdown Price
- Shange Fu and Jiangshan Yu and Rafael Dowsley and Joseph Liu
-
2020/1573 ( PDF )
- Halo 0.9: A Halo Protocol with Fully-Succinctness
- Lira Wang
-
2020/1572 ( PDF )
- Achieve Fully Decentralized End to End encryption meeting via Blockchain
- Yang Tan
-
2020/1571 ( PDF )
- Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server
- Olivier Blazy and Laura Brouilhet and Celine Chevalier and Patrick Towa and Ida Tucker and Damien Vergnaud
-
2020/1570 ( PDF )
- Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary
- Onur Gunlu and Rafael F. Schaefer
-
2020/1569 ( PDF )
- Optimal Communication Complexity of Authenticated Byzantine Agreement
- Atsuki Momose and Ling Ren
-
2020/1568 ( PDF )
- Compact Certificates of Collective Knowledge
- Silvio Micali and Leonid Reyzin and Georgios Vlachos and Riad S. Wahby and Nickolai Zeldovich
-
2020/1567 ( PDF )
- Secure Decentralized Access Control Policy for Data Sharing in Smart Grid
- Yadi Ye and Leyou Zhang and Yi Mu and Wenting You
-
2020/1566 ( PDF )
- An efficient and provably secure authenticated key agreement scheme for mobile edge computing
- Mohammad Amin Rakeei and Farokhlagha Moazami
-
2020/1565 ( PDF )
- Achieving privacy and accountability in traceable digital currency
- Amira Barki and Aline Gouget
-
2020/1564 ( PDF )
- Prime Proof Protocol
- Anna M. Johnston and Rathna Ramesh
-
2020/1563 ( PDF )
- Verifiable Timed Signatures Made Practical
- Sri Aravinda KrishnanThyagarajan and Adithya Bhat and Giulio Malavolta and Nico Döttling and Aniket Kate and Dominique Schröder
-
2020/1562 ( PDF )
- A complete study of two classes of Boolean functions for homomorphic-friendly stream ciphers
- Claude Carlet and Pierrick Méaux
-
2020/1561 ( PDF )
- Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Online Fault Tolerance
- Ryan Karl and Jonathan Takeshita and Taeho Jung
-
2020/1560 ( PDF )
- Modified Cache Template Attack on AES
- Mahdi Esfahani and Hadi Soleimany and Mohammad Reza Aref
-
2020/1559 ( PDF )
- On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks
- Prasanna Ravi and Shivam Bhasin and Sujoy Sinha Roy and Anupam Chattopadhyay
-
2020/1558 ( PDF )
- Double-Odd Elliptic Curves
- Thomas Pornin
-
2020/1557 ( PDF )
- Efficient Quantum Public-Key Encryption From Learning With Errors
- Javad Doliskani
-
2020/1556 ( PDF )
- Honest Majority MPC with Abort with Minimal Online Communication
- Daniel Escudero and Anders Dalskov
-
2020/1555 ( PDF )
- Limits on the Efficiency of (Ring) LWE based Non-Interactive Key Exchange
- Siyao Guo and Pritish Kamath and Alon Rosen and Katerina Sotiraki
-
2020/1554 ( PDF )
- DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel
- Xiaolu Hou and Jakub Breier and Shivam Bhasin
-
2020/1553 ( PDF )
- A Novel Asymmetric Searchable Encryption Scheme with Granting search capability
- Arian Arabnouri and Reza Ebrahimi Atani and Shiva Azizzadeh
-
2020/1552 ( PDF )
- Threshold Password-Hardened Encryption Services
- Julian Brost and Christoph Egger and Russell W. F. Lai and Fritz Schmid and Dominique Schröder and Markus Zoppelt
-
2020/1551 ( PDF )
- Multi-Client Oblivious RAM with Poly-Logarithmic Communication
- Sherman S. M. Chow and Katharina Fech and Russell W. F. Lai and Giulio Malavolta
-
2020/1550 ( PDF )
- Foundations of Ring Sampling
- Viktoria Ronge and Christoph Egger and Russell W. F. Lai and Dominique Schröder and Hoover H. F. Yin
-
2020/1549 ( PDF )
- High-Precision and Low-Complexity Approximate Homomorphic Encryption by Error Variance Minimization
- Yongwoo Lee and Joonwoo Lee and Young-Sik Kim and HyungChul Kang and Jong-Seon No
-
2020/1548 ( PDF )
- CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors
- Valerio Cini and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks
-
2020/1547 ( PDF )
- Two-server Distributed ORAM with Sublinear Computation and Constant Rounds
- Ariel Hamlin and Mayank Varia
-
2020/1546 ( PDF )
- PEM: Privacy-preserving Epidemiological Modeling
- Marco Holz and Benjamin Judkewitz and Helen Möllering and Benny Pinkas and Thomas Schneider
-
2020/1545 ( PDF )
- A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications
- Howard M. Heys
-
2020/1544 ( PDF )
- PAS-TA-U: PASsword-based Threshold Authentication with PASsword Update
- Rachit Rawat and Mahabir Prasad Jhanwar
-
2020/1543 ( PDF )
- CovidBloc: A Blockchain Powered Exposure Database for Contact Tracing
- Deepraj Pandey and Nandini Agrawal and Mahabir Prasad Jhanwar
-
2020/1542 ( PDF )
- Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version)
- Anubhab Baksi and Shivam Bhasin and Jakub Breier and Anupam Chattopadhyay and Vinay B. Y. Kumar
-
2020/1541 ( PDF )
- A Framework of Private Set Intersection Protocols.
- Ziyuan Liang and Weiran Liu and Fan Zhang and Bingsheng Zhang and Jian Liu and Lei Zhang and Kui Ren
-
2020/1540 ( PDF )
- On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem
- Martin R. Albrecht and Nadia Heninger
-
2020/1539 ( PDF )
- Information-Theoretic Security of Cryptographic Channels
- Marc Fischlin and Felix Günther and Philipp Muth
-
2020/1538 ( PDF )
- Homological Characterization of bounded $F_2$-regularity
- Timothy J. Hodges and Sergio Molina
-
2020/1537 ( -- withdrawn -- )
- Comments on “ Multi Recipient Aggregate Signcryption Scheme Based on Elliptic Curve”
- Nizamud Din and Abdul Waheed and Nasir Saeed
-
2020/1536 ( PDF )
- Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme
- Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon
-
2020/1535 ( PDF )
- Designer Primes
- Anna M. Johnston
-
2020/1534 ( PDF )
- Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition
- SeongHyuck Lim and JongHyeok Lee and Dong-Guk Han
-
2020/1533 ( PDF )
- On the Security of Homomorphic Encryption on Approximate Numbers
- Baiyu Li and Daniele Micciancio
-
2020/1532 ( PDF )
- Oblivious Pseudorandom Functions from Isogenies
- Dan Boneh and Dmitry Kogan and Katharine Woo
-
2020/1531 ( PDF )
- Reconstructing with Less: Leakage Abuse Attacks in Two-Dimensions
- Francesca Falzon and Evangelia Anna Markatou and William Schor and Roberto Tamassia
-
2020/1530 ( PDF )
- Security Analysis of Public Key Searchable Encryption Schemes against Injection Attacks
- Arian Arabnouri and Reza Ebrahimi Atani and Shiva Azizzadeh
-
2020/1529 ( PDF )
- Bounds on the nonlinearity of differentially uniform functions by means of their image set size, and on their distance to affine functions
- Claude Carlet
-
2020/1528 ( PDF )
- On the Concurrent Composition of Quantum Zero-Knowledge
- Prabhanjan Ananth and Kai-Min Chung and Rolando L. La Placa
-
2020/1527 ( PDF )
- Zero-Knowledge Succinct Arguments with a Linear-Time Prover
- Jonathan Bootle and Alessandro Chiesa and Siqi Liu
-
2020/1526 ( PDF )
- Flexible and Efficient Verifiable Computation on Encrypted Data
- Alexandre Bois and Ignacio Cascudo and Dario Fiore and Dongwoo Kim
-
2020/1525 ( PDF )
- BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
- Cas Cremers and Samed Düzlü and Rune Fiedler and Marc Fischlin and Christian Janson
-
2020/1524 ( PDF )
- Nonce-Misuse Security of the SAEF Authenticated Encryption mode
- Elena Andreeva and Amit Singh Bhati and Damian Vizar
-
2020/1523 ( PDF )
- Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting
- Yaobin Shen; Lei Wang; Jian Weng
-
2020/1522 ( PDF )
- Reducing Participation Costs via Incremental Verification for Ledger Systems
- Weikeng Chen and Alessandro Chiesa and Emma Dauterman and Nicholas P. Ward
-
2020/1521 ( PDF )
- Delegated RingCT: faster anonymous transactions
- Rui Morais and Paul Crocker and Simao Melo de Sousa
-
2020/1520 ( PDF )
- The SQALE of CSIDH: Square-root vélu Quantum-resistant isogeny Action with Low Exponents
- Jorge Chávez-Saab and Jesús-Javier Chi-Domínguez and Samuel Jaques and Francisco Rodríguez-Henríquez
-
2020/1519 ( PDF )
- Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2
- Sven Schäge and Jörg Schwenk and Sebastian Lauer
-
2020/1518 ( PDF )
- Botnet IND: About Botnets of Botless IoT Devices
- Ben Nassi and Yair Meidan and Dudi Nassi and Asaf Shabtai and Yuval Elovici
-
2020/1517 ( PDF )
- On Leakage-Resilient Secret Sharing
- Hemanta Maji and Anat Paskin-Cherniavsky and Tom Suad and Mingyaun Wang
-
2020/1516 ( PDF )
- How to compute all Pointproofs
- Alin Tomescu
-
2020/1515 ( PDF )
- The classification of quadratic APN functions in 7 variables
- Konstantin Kalgin and Valeriya Idrisova
-
2020/1514 ( PDF )
- Improved privacy-preserving training using fixed-Hessian minimisation
- Tabitha Ogilvie and Rachel Player and Joe Rowell
-
2020/1513 ( PDF )
- Indifferentiable hashing from Elligator 2
- Mike Hamburg
-
2020/1512 ( PDF )
- Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking
- Jan Pennekamp and Patrick Sapel and Ina Berenice Fink and Simon Wagner and Sebastian Reuter and Christian Hopmann and Klaus Wehrle and Martin Henze
-
2020/1511 ( PDF )
- Balancing Privacy and Accountability in Blockchain Identity Management
- Ivan Damgård and Chaya Ganesh and Hamidreza Khoshakhlagh and Claudio Orlandi and Luisa Siniscalchi
-
2020/1510 ( PDF )
- Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP
- Jun Yan
-
2020/1509 ( PDF )
- Single-Message Credential-Hiding Login
- Kevin Lewi and Payman Mohassel and Arnab Roy
-
2020/1508 ( PDF )
- A Combinatorial Approach to Quantum Random Functions
- Nico Döttling and Giulio Malavolta and Sihang Pu
-
2020/1507 ( PDF )
- Improvements to RSA key generation and CRT on embedded devices
- Mike Hamburg and Mike Tunstall and Qinglai Xiao
-
2020/1506 ( PDF )
- Recovering cryptographic keys from partial information, by example
- Gabrielle De Micheli and Nadia Heninger
-
2020/1505 ( PDF )
- Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model
- Mariusz Jurkiewicz
-
2020/1504 ( PDF )
- The Age of Testifying Wearable Devices: The Case of Intoxication Detection
- Ben Nassi and Lior Rokach and Yuval Elovici
-
2020/1503 ( PDF )
- Key Recovery Attack on Bob's Secrets in CRYSTALS-KYBER and SABER
- Satoshi Okada and Yuntao Wang
-
2020/1502 ( PDF )
- Witness Encryption from Garbled Circuit and Multikey Fully Homomorphic Encryption Techniques
- Kamil Kluczniak
-
2020/1501 ( PDF )
- PANCAKE: Frequency Smoothing for Encrypted Data Stores
- Paul Grubbs and Anurag Khandelwal and Marie-Sarah Lacharité and Lloyd Brown and Lucy Li and Rachit Agarwal and Thomas Ristenpart
-
2020/1500 ( PDF )
- Oblivious Transfer is in MiniQCrypt
- Alex B. Grilo and Huijia Lin and Fang Song and Vinod Vaikuntanathan
-
2020/1499 ( PDF )
- Analysing the HPKE Standard
- Joël Alwen and Bruno Blanchet and Eduard Hauck and Eike Kiltz and Benjamin Lipp and Doreen Riepel
-
2020/1498 ( PDF )
- EPID with Malicious Revocation
- Olivier Sanders and Jacques Traoré
-
2020/1497 ( PDF )
- A note on the calculation of some functions in finite fields: Tricks of the Trade
- Michael Scott
-
2020/1496 ( PDF )
- Pseudo-Free Families and Cryptographic Primitives
- Mikhail Anokhin
-
2020/1495 ( PDF )
- CloudMoles: Surveillance of Power-Wasting Activities by Infiltrating Undercover Sensors
- Seyedeh Sharareh Mirzargar and Andrea Guerrieri and Mirjana Stojilović
-
2020/1494 ( PDF )
- Nonintrusive and Adaptive Monitoring for Locating Voltage Attacks in Virtualized FPGAs
- Seyedeh Sharareh Mirzargar and Gaiëtan Renault and Andrea Guerrieri and Mirjana Stojilović
-
2020/1493 ( PDF )
- Verified fast formulas for control bits for permutation networks
- Daniel J. Bernstein
-
2020/1492 ( PDF )
- Automated ciphertext-only attack on the Wheatstone Cryptograph and related devices
- Thomas Kaeding
-
2020/1491 ( PDF )
- Partitioning Oracle Attacks
- Julia Len and Paul Grubbs and Thomas Ristenpart
-
2020/1490 ( PDF )
- Unlinkable and Invisible γ-Sanitizable Signatures
- Angèle Bossuat and Xavier Bultel
-
2020/1489 ( PDF )
- On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger
- Christian Badertscher and Julia Hesse and Vassilis Zikas
-
2020/1488 ( PDF )
- General Properties of Quantum Bit Commitments
- Jun Yan
-
2020/1487 ( PDF )
- One-Way Functions Imply Secure Computation in a Quantum World
- James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma
-
2020/1486 ( PDF )
- CommiTEE: An Efficient and Secure Commit-Chain Protocol using TEEs
- Andreas Erwig and Sebastian Faust and Siavash Riahi and Tobias Stöckert
-
2020/1485 ( PDF )
- Quantum Search for Lightweight Block Ciphers: GIFT, SKINNY, SATURNIN
- Subodh Bijwe and Amit Kumar Chauhan and Somitra Kumar Sanadhya
-
2020/1484 ( PDF )
- Cryptanalysis of Aggregate $\Gamma$-Signature and Practical Countermeasures in Application to Bitcoin
- Goichiro Hanaoka and Kazuo Ohta and Yusuke Sakai and Bagus Santoso and Kaoru Takemure and Yunlei Zhao
-
2020/1483 ( PDF )
- A Low-Depth Homomorphic Circuit for Logistic Regression Model Training
- Eric Crockett
-
2020/1482 ( PDF )
- Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber
- Andrea Basso and Sujoy Sinha Roy
-
2020/1481 ( PDF )
- Design and implementation of HElib: a homomorphic encryption library
- Shai Halevi and Victor Shoup
-
2020/1480 ( PDF )
- Malicious Security Comes for Free in Consensus with Leaders
- Matthieu Rambaud
-
2020/1479 ( PDF )
- Automatic Privacy-Preserving Contact Tracing of Novel Coronavirus Infection by Cloud-Enabled WBAN using Blockchain
- Anupam Pattanayak and Subhasish Dhal and Sourav Kanti Addya
-
2020/1478 ( PDF )
- Robust Subgroup Multi-Signatures for Consensus
- David Galindo and Jia Liu
-
2020/1477 ( PDF )
- Machine-checking the universal verifiability of ElectionGuard
- Thomas Haines and Rajeev Gore and Jack Stodart
-
2020/1476 ( PDF )
- Carbon Trading with Blockchain
- Andreas Richardson and Jiahua Xu
-
2020/1475 ( PDF )
- Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
- Kwangsu Lee
-
2020/1474 ( PDF )
- New method of verifying cryptographic protocols based on the process model
- A. M. Mironov
-
2020/1473 ( PDF )
- Lighthouses: A Warning System for Super-Spreader Events
- Leonie Reichert and Samuel Brack and Björn Scheuermann
-
2020/1472 ( PDF )
- Enhancing Code Based Zero-knowledge Proofs using Rank Metric
- Emanuele Bellini and Philippe Gaborit and Alexandros Hasikos and Victor Mateu
-
2020/1471 ( PDF )
- On The Round Complexity of Two-Party Quantum Computation
- James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma
-
2020/1470 ( PDF )
- TaiJi: Longest Chain Availability with BFT Fast Confirmation
- Songze Li and David Tse
-
2020/1469 ( PDF )
- Succinct Blind Quantum Computation Using a Random Oracle
- Jiayu Zhang
-
2020/1468 ( PDF )
- Secure Cloud Auditing with Efficient Ownership Transfer (Full Version)
- Jun Shen and Fuchun Guo and Xiaofeng Chen and Willy Susilo
-
2020/1467 ( PDF )
- Making the BKW Algorithm Practical for LWE
- Alessandro Budroni and Qian Guo and Thomas Johansson and Erik Mårtensson and Paul Stankovski Wagner
-
2020/1466 ( PDF )
- Load Balancing for Sharded Blockchains
- Naoya Okanami and Ryuya Nakamura and Takashi Nishide
-
2020/1465 ( PDF )
- Cryptanalysis of an Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network
- Mohammad Amin Rakeei and Farokhlagha Moazami
-
2020/1464 ( PDF )
- Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort
- Bar Alon and Hao Chung and Kai-Min Chung and Mi-Ying Huang and Yi Lee and Yu-Ching Shen
-
2020/1463 ( PDF )
- Observations on the Tightness of the Security Bounds of GIFT-COFB and HyENA
- Mustafa Khairallah
-
2020/1462 ( PDF )
- Ovid: Message-based Automatic Contact Tracing
- Leonie Reichert and Samuel Brack and Björn Scheuermann
-
2020/1461 ( PDF )
- Lower bounds for the depth of modular squaring
- Benjamin Wesolowski and Ryan Williams
-
2020/1460 ( PDF )
- The MAGIC Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction
- Michael Kounavis and David Durham and Sergej Deutsch and Krystian Matusiewicz and David Wheeler
-
2020/1459 ( PDF )
- Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates
- Mustafa Khairallah and Thomas Peyrin and Anupam Chattopadhyay
-
2020/1458 ( PDF )
- Analysis of Ascon, DryGASCON, and Shamash Permutations
- Cihangir Tezcan
-
2020/1457 ( PDF )
- The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3
- Patrick Longa and Wen Wang and Jakub Szefer
-
2020/1456 ( PDF )
- How to Abuse and Fix Authenticated Encryption Without Key Commitment
- Ange Albertini and Thai Duong and Shay Gueron and Stefan Kölbl and Atul Luykx and Sophie Schmieg
-
2020/1455 ( PDF )
- An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage
- Yan Yan and Elisabeth Oswald and Srinivas Vivek
-
2020/1454 ( PDF )
- Circuit Privacy for Quantum Fully Homomorphic Encryption
- Giulio Malavolta
-
2020/1453 ( PDF )
- New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system
- Jing Yang and Fang-Wei Fu
-
2020/1452 ( PDF )
- ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
- Sebastian Berndt and Jan Wichelmann and Claudius Pott and Tim-Henrik Traving and Thomas Eisenbarth
-
2020/1451 ( PDF )
- Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs
- Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof
-
2020/1450 ( PDF )
- Subversion-Resilient Enhanced Privacy ID
- Antonio Faonio and Dario Fiore and Luca Nizzardo and Claudio Soriente
-
2020/1449 ( PDF )
- More Efficient Amortization of Exact Zero-Knowledge Proofs for LWE
- Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
-
2020/1448 ( PDF )
- Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments
- Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
-
2020/1447 ( PDF )
- Compressed $\Sigma$-Protocols for Bilinear Group Arithmetic Circuits and Applications
- Thomas Attema and Ronald Cramer and Matthieu Rambaud
-
2020/1446 ( PDF )
- Line-Point Zero Knowledge and Its Applications
- Samuel Dittmer and Yuval Ishai and Rafail Ostrovsky
-
2020/1445 ( PDF )
- Observations on COMET
- Daniel J. Bernstein and Henri Gilbert and Meltem Sonmez Turan
-
2020/1444 ( PDF )
- On known constructions of APN and AB functions and their relation to each other
- Marco Calderini and Lilya Budaghyan and Claude Carlet
-
2020/1443 ( PDF )
- DPaSE: Distributed Password-Authenticated Symmetric Encryption
- Poulami Das and Julia Hesse and Anja Lehmann
-
2020/1442 ( PDF )
- Analysis of Multivariate Encryption Schemes: Application to Dob
- Morten Øygarden and Patrick Felke and Håvard Raddum
-
2020/1441 ( PDF )
- PayMo: Payment Channels For Monero
- Sri Aravinda Krishnan Thyagarajan and Giulio Malavolta and Fritz Schmidt and Dominique Schröder
-
2020/1440 ( PDF )
- SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures
- Ralph Ankele and Kai Nahrgang and Branka Stojanovic and Atta Badii
-
2020/1439 ( PDF )
- Cryptographic Vulnerabilities and Other Shortcomings of the Nextcloud Server Side Encryption as implemented by the Default Encryption Module
- Kevin "Kenny" Niehage
-
2020/1438 ( PDF )
- Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers
- Ravi Anand and Subhamoy Maitra and Arpita Maitra and Chandra Sekhar Mukherjee and Sourav Mukhopadhyay
-
2020/1437 ( PDF )
- Round-Optimal and Communication-Efficient Multiparty Computation
- Michele Ciampi and Rafail Ostrovsky and Hendrik Waldner and Vassilis Zikas
-
2020/1436 ( PDF )
- Removable Weak Keys for Discrete Logarithm Based Cryptography
- Michael John Jacobson Jr. and Prabhat Kushwaha
-
2020/1435 ( PDF )
- Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains
- Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
-
2020/1434 ( PDF )
- Towards Multiparty Computation Withstanding Coercion of All Parties
- Ran Canetti and Oxana Poburinnaya
-
2020/1433 ( PDF )
- Interactive Proofs for Social Graphs
- Liran Katzir and Clara Shikhelman and Eylon Yogev
-
2020/1432 ( PDF )
- CP-ABE for Circuits (and more) in the Symmetric Key Setting
- Shweta Agrawal and Shota Yamada
-
2020/1431 ( PDF )
- Information-Theoretic 2-Round MPC without Round Collapsing: Adaptive Security, and More
- Huijia Lin and Tianren Liu and Hoeteck Wee
-
2020/1430 ( PDF )
- Revisiting Fairness in MPC: Polynomial Number of Parties and General Adversarial Structures
- Dana Dachman-Soled
-
2020/1429 ( PDF )
- On Computational Shortcuts for Information-Theoretic PIR
- Matthew M. Hong and Yuval Ishai and Victor I. Kolobov and Russell W. F. Lai
-
2020/1428 ( PDF )
- On Statistical Security in Two-Party Computation
- Dakshita Khurana and Muhammad Haris Mughees
-
2020/1427 ( PDF )
- Barriers for Succinct Arguments in the Random Oracle Model
- Alessandro Chiesa and Eylon Yogev
-
2020/1426 ( PDF )
- Linear-Time Arguments with Sublinear Verification from Tensor Codes
- Jonathan Bootle and Alessandro Chiesa and Jens Groth
-
2020/1425 ( PDF )
- Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads
- Alexander R. Block and Justin Holmgren and Alon Rosen and Ron D. Rothblum and Pratik Soni
-
2020/1424 ( PDF )
- Improved Key Recovery of the HFEv- Signature Scheme
- Chengdong Tao Albrecht Petzoldt Jintai Ding
-
2020/1423 ( PDF )
- Quantum encryption with certified deletion
- Anne Broadbent and Rabib Islam
-
2020/1422 ( PDF )
- Non-interactive classical verification of quantum computation
- Gorjan Alagic and Andrew M. Childs and Alex B. Grilo and Shih-Han Hung
-
2020/1421 ( PDF )
- Weakly Extractable One-Way Functions
- Nir Bitansky and Noa Eizenstadt and Omer Paneth
-
2020/1420 ( PDF )
- Functional Encryption for Quadratic Functions from k-Lin, Revisited
- Hoeteck Wee
-
2020/1419 ( PDF )
- The Resiliency of MPC with Low Interaction: The Benefit of Making Errors
- Benny Applebaum and Eliran Kachlon and Arpita Patra
-
2020/1418 ( PDF )
- Quantum Period Finding against Symmetric Primitives in Practice
- Xavier Bonnetain and Samuel Jaques
-
2020/1417 ( PDF )
- Correlated Pseudorandom Functions from Variable-Density LPN
- Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl
-
2020/1416 ( PDF )
- Further on the Construction of Feedback Shift Registers with Maximum Strong Linear Complexity
- Congwei Zhou and Bin Hu and Jie Guan
-
2020/1415 ( PDF )
- Secure Graph Database Search with Oblivious Filter
- Jamie Cui and Chaochao Chen and Alex X. Liu and Li Wang
-
2020/1414 ( PDF )
- New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming (Full Version)
- Anubhab Baksi
-
2020/1413 ( PDF )
- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers
- Daniele Micciancio and Jessica Sorrell
-
2020/1412 ( PDF )
- Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields
- Antigoni Polychroniadou and Yifan Song
-
2020/1411 ( PDF )
- Transparent Error Correcting in a Computationally Bounded World
- Ofer Grossman and Justin Holmgren and Eylon Yogev
-
2020/1410 ( PDF )
- Mac'n'Cheese: Zero-Knowledge Proofs for Arithmetic Circuits with Nested Disjunctions
- Carsten Baum and Alex J. Malozemoff and Marc Rosen and Peter Scholl
-
2020/1409 ( PDF )
- The Convergence of Slide-type Reductions
- Michael Walter
-
2020/1408 ( PDF )
- On Broadcast in Generalized Network and Adversarial Models
- Chen-Da Liu-Zhang and Varun Maram and Ueli Maurer
-
2020/1407 ( PDF )
- Computing Square Roots Faster than the Tonelli-Shanks/Bernstein Algorithm
- Palash Sarkar
-
2020/1406 ( PDF )
- How not to VoteAgain: Pitfalls of Scalable Coercion-Resistant E-Voting
- Thomas Haines and Johannes Mueller
-
2020/1405 ( PDF )
- Grover on GIFT
- Kyoungbae Jang and Hyunjun Kim and Siwoo Eum and Hwajeong Seo
-
2020/1404 ( PDF )
- A Practical Key-Recovery Attack on 805-Round Trivium
- Chen-Dong Ye and Tian Tian
-
2020/1403 ( PDF )
- A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols
- Syh-Yuan Tan and Ioannis Sfyrakis and Thomas Gross
-
2020/1402 ( PDF )
- SKINNY with Scalpel - Comparing Tools for Differential Analysis
- Stéphanie Delaune and Patrick Derbez and Paul Huynh and Marine Minier and Victor Mollimard and Charles Prud'homme
-
2020/1401 ( PDF )
- Quantum Garbled Circuits
- Zvika Brakerski and Henry Yuen
-
2020/1400 ( PDF )
- Transferable E-cash: A Cleaner Model and the First Practical Instantiation
- Balthazar Bauer and Georg Fuchsbauer and Chen Qian
-
2020/1399 ( PDF )
- A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption
- Diana Maimut and George Teseleanu
-
2020/1398 ( PDF )
- A huge class of infinite sequences of minimal binary linear codes with or without crossing the Ashikhmin-Barg’s bound
- Fengrong Zhang and Enes Pasalic and René Rodríguez and Yongzhuang Wei
-
2020/1397 ( PDF )
- NTT Multiplication for NTT-unfriendly Rings
- Chi-Ming Marvin Chung and Vincent Hwang and Matthias J. Kannwischer and Gregor Seiler and Cheng-Jhih Shih and Bo-Yin Yang
-
2020/1396 ( PDF )
- Efficient Privacy Preserving Logistic Regression Inference and Training
- Kyoohyung Han and Jinhyuck Jeong and Jung Hoon Sohn and Yongha Son
-
2020/1395 ( PDF )
- Post-Quantum Multi-Party Computation
- Amit Agarwal and James Bartusek and Vipul Goyal and Dakshita Khurana and Giulio Malavolta
-
2020/1394 ( PDF )
- Practical and Secure Circular Range Search on Private Spatial Data
- Zhihao Zheng and Jiachen Shen and Zhenfu Cao
-
2020/1393 ( PDF )
- On the Effectiveness of Time Travel to Inject COVID-19 Alerts
- Vincenzo Iovino and Serge Vaudenay and Martin Vuagnoux
-
2020/1392 ( PDF )
- Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
- Elette Boyle and Nishanth Chandran and Niv Gilboa and Divya Gupta and Yuval Ishai and Nishant Kumar and Mayank Rathee
-
2020/1391 ( PDF )
- Interactive Proofs for Quantum Black-Box Computations
- Jiang Zhang and Yu Yu and Dengguo Feng and Shuqin Fan and Zhenfeng Zhang and Kang Yang
-
2020/1390 ( PDF )
- A Survey of ECDSA Threshold Signing
- Jean-Philippe Aumasson and Adrian Hamelink and Omer Shlomovits
-
2020/1389 ( PDF )
- Key Mismatch Attack on NewHope Revisited
- Jan Vacek and Jan Václavek
-
2020/1388 ( PDF )
- Signcryption in a Quantum World
- Sanjit Chatterjee and Tapas Pandit and Shravan Kumar Parshuram Puria and Akash Shah
-
2020/1387 ( PDF )
- FB-Tree: Highly Efficient Tree-Based Index for Encrypted Boolean Queries in Smart Cities
- Zhiqiang Wu and Kenli Li and Jin Wang and Naixue Xiong
-
2020/1386 ( PDF )
- Decentralized Multi-Authority ABE for DNFs from LWE
- Pratish Datta and Ilan Komargodski and Brent Waters
-
2020/1385 ( PDF )
- An Alternative Approach for SIDH Arithmetic
- Cyril Bouvier and Laurent Imbert
-
2020/1384 ( PDF )
- A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds
- Nai-Hui Chia and Kai-Min Chung and Takashi Yamakawa
-
2020/1383 ( PDF )
- Novel Single-Trace ML Profiling Attacks on NIST 3 Round candidate Dilithium
- Il-Ju Kim and Tae-Ho Lee and Jaeseung Han and Bo-Yeon Sim and Dong-Guk Han
-
2020/1382 ( PDF )
- Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE
- Tapas Pal and Ratna Dutta
-
2020/1381 ( PDF )
- PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates
- Jia-Chng Loh and Geong-Sen Poh and Jason H. M. Ying and Jia Xu and Hoon Wei Lim and Jonathan Pan and Weiyang Wong
-
2020/1380 ( PDF )
- Fast Computing of Quadratic Forms of HFE Polynomials over fields of characteristic two
- Borja Gómez
-
2020/1379 ( PDF )
- Blockchain Driven Access Control Mechanisms, Models and Frameworks: A Systematic Literature Review
- Aaqib Bashir Dar and Asif Iqbal Baba and Auqib Hamid Lone and Roohie Naaz and Fan Wu
-
2020/1378 ( PDF )
- Multi-Input Correlation-Intractable Hash Functions via Shift-Hiding
- Alex Lombardi and Vinod Vaikuntanathan
-
2020/1377 ( PDF )
- When to Barrett reduce in the inverse NTT
- Bas Westerbaan
-
2020/1376 ( PDF )
- Stronger bounds on the cost of computing Groebner bases for HFE systems
- Elisa Gorla and Daniela Mueller and Christophe Petit
-
2020/1375 ( PDF )
- Semi-regular sequences and other random systems of equations
- M. Bigdeli and E. De Negri and M. M. Dizdarevic and E. Gorla and R. Minko and S. Tsakou
-
2020/1374 ( PDF )
- ELM : A Low-Latency and Scalable Memory Encryption Scheme
- Akiko Inoue and Kazuhiko Minematsu and Maya Oda and Rei Ueno and Naofumi Homma
-
2020/1373 ( PDF )
- Transciphering, using FiLIP and TFHE for an efficient delegation of computation
- Clément Hoffmann and Pierrick Méaux and Thomas Ricosset
-
2020/1372 ( PDF )
- VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage
- Chan Fan and Xiaolei Dong and Zhenfu Cao and Jiachen Shen
-
2020/1371 ( PDF )
- Two-Source Non-Malleable Extractors and Applications to Privacy Amplification with Tamperable Memory
- Divesh Aggarwal and Maciej Obremski and João Ribeiro and Mark Simkin and Luisa Siniscalchi
-
2020/1370 ( PDF )
- A discretization attack
- Daniel J. Bernstein
-
2020/1369 ( PDF )
- Multiplication over Extension Fields for Pairing-based Cryptography: an Hardware Point of View
- Arthur Lavice and Nadia El Mrabet and Alexandre Berzati and Jean-Baptiste Rigaud
-
2020/1368 ( PDF )
- On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices
- Melissa Azouaoui and François Durvaux and Romain Poussier and François-Xavier Standaert and Kostas Papagiannopoulos and Vincent Verneuil
-
2020/1367 ( PDF )
- Costs of an Attack Against Proof-of-Work
- Loïc Etienne
-
2020/1366 ( PDF )
- LURK: Server-Controlled TLS Delegation
- Ioana Boureanu and Daniel Migault and Stere Preda and Hyame Assem Alamedine and Sanjay Mishra and Frederic Fieau and Mohammad Mannan
-
2020/1365 ( PDF )
- Evaluation Methods for Chebyshev Polynomials
- Zhengjun Cao and Lihua Liu and Leming Hong
-
2020/1364 ( PDF )
- Security of Hybrid Key Encapsulation
- Matthew Campagna and Adam Petcher
-
2020/1363 ( PDF )
- Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching
- Shashank Agrawal and Saikrishna Badrinarayanan and Pratyay Mukherjee and Peter Rindal
-
2020/1362 ( PDF )
- Lattice-Based Proof-of-Work for Post-Quantum Blockchains
- Rouzbeh Behnia and Eamonn W. Postlethwaite and Muslum Ozgur Ozmen and Attila Altay Yavuz
-
2020/1361 ( PDF )
- Tight adaptive reprogramming in the QROM
- Alex B. Grilo and Kathrin Hövelmanns and Andreas Hülsing and Christian Majenz
-
2020/1360 ( PDF )
- Incremental Cryptography Revisited: PRFs, Nonces and Modular Design
- Vivek Arte and Mihir Bellare and Louiza Khati
-
2020/1359 ( PDF )
- On two fundamental problems on APN power functions
- Lilya Budaghyan and Marco Calderini and Claude Carlet and Diana Davidova and Nikolay Kaleyski
-
2020/1358 ( PDF )
- Toward Provable One Way Functions
- Hagar Dolev and Shlomi Dolev
-
2020/1357 ( PDF )
- Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries
- Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk and Guiyi Wei
-
2020/1356 ( PDF )
- Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers
- Maria Eichlseder and Gregor Leander and Shahram Rasoolzadeh
-
2020/1355 ( PDF )
- Modular Lagrange Interpolation of the Mod Function for Bootstrapping for Approximate HE
- Charanjit S. Jutla and Nathan Manohar
-
2020/1354 ( PDF )
- Gadget-Based iNTRU Lattice Trapdoors
- Nicholas Genise and Baiyu Li
-
2020/1353 ( PDF )
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
- Linru Zhang and Xiangning Wang and Yuechen Chen and Siu-Ming Yiu
-
2020/1352 ( PDF )
- Reducing Round Complexity of Byzantine Broadcast
- Linda Chen and Jun Wan
-
2020/1351 ( PDF )
- Tight State-Restoration Soundness in the Algebraic Group Model
- Ashrujit Ghoshal and Stefano Tessaro
-
2020/1350 ( PDF )
- Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
- Rishabh Poddar and Sukrit Kalra and Avishay Yanai and Ryan Deng and Raluca Ada Popa and Joseph M. Hellerstein
-
2020/1349 ( PDF )
- Key Dependency of Differentials: Experiments in the Differential Cryptanalysis of Block Ciphers Using Small S-boxes
- Howard M. Heys
-
2020/1348 ( PDF )
- Vetted Encryption
- Martha Norberg Hovd and Martijn Stam
-
2020/1347 ( PDF )
- A Systematic Appraisal of Side Channel Evaluation Strategies
- Melissa Azouaoui and Davide Bellizia and Ileana Buhan and Nicolas Debande and Sebastien Duval and Christophe Giraud and Eliane Jaulmes and Francois Koeune and Elisabeth Oswald and Francois-Xavier Standaert and Carolyn Whitnall
-
2020/1346 ( PDF )
- SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts
- Shlomi Dolev and Ziyu Wang
-
2020/1345 ( PDF )
- Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments
- Erkan Tairi and Pedro Moreno-Sanchez and Matteo Maffei
-
2020/1344 ( PDF )
- Indifferentiability of SKINNY-HASH Internal Functions
- Akinori Hosoyamada and Tetsu Iwata
-
2020/1343 ( PDF )
- Improved Cryptanalysis of UOV and Rainbow
- Ward Beullens
-
2020/1342 ( PDF )
- Forward and Backward Private Conjunctive Searchable Symmetric Encryption
- Sikhar Patranabis and Debdeep Mukhopadhyay
-
2020/1341 ( PDF )
- Zero-Communication Reductions
- Varun Narayanan and Manoj Prabhakaran and Vinod M. Prabhakaran
-
2020/1340 ( PDF )
- Homomorphic Evaluation of the SM4
- Yu Xue
-
2020/1339 ( PDF )
- New Approaches for Quantum Copy-Protection
- Scott Aaronson and Jiahui Liu and Qipeng Liu and Mark Zhandry and Ruizhe Zhang
-
2020/1338 ( PDF )
- Optimized Architectures for Elliptic Curve Cryptography over Curve448
- Mojtaba Bisheh Niasar and Reza Azarderakhsh and Mehran Mozaffari Kermani
-
2020/1337 ( PDF )
- Multiplicative Depth Independent & Efficient MPC in the Presence of Mixed Adversary
- Achintya Desai and Shubham Raj and Kannan Srinathan
-
2020/1336 ( PDF )
- Faster Characteristic Three Polynomial Multiplication and Its Application to NTRU Prime Decapsulation
- Esra Yeniaras and Murat Cenk
-
2020/1335 ( PDF )
- Hybrid Framework for Approximate Computation over Encrypted Data
- Jihoon Cho and Jincheol Ha and Seongkwang Kim and Joohee Lee and Jooyoung Lee and Dukjae Moon and Hyojin Yoon
-
2020/1334 ( PDF )
- One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity in the Standard Model
- Benoît Libert and Khoa Nguyen and Thomas Peters and Moti Yung
-
2020/1333 ( PDF )
- Updateable Inner Product Argument with Logarithmic Verifier and Applications
- Vanesa Daza and Carla Ràfols and Alexandros Zacharakis
-
2020/1332 ( PDF )
- Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting
- Ashley Fraser and Elizabeth A. Quaglia
-
2020/1331 ( PDF )
- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme
- Kristian Gjøsteen and Thomas Haines and Morten Rotvold Solberg
-
2020/1330 ( PDF )
- Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security
- Anders Dalskov and Daniel Escudero and Marcel Keller
-
2020/1329 ( PDF )
- Adaptively secure Threshold Symmetric-key Encryption
- Pratyay Mukherjee
-
2020/1328 ( PDF )
- SWiSSSE: System-Wide Security for Searchable Symmetric Encryption
- Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis and Bogdan Warinschi
-
2020/1327 ( PDF )
- On The Insider Security of MLS
- Joël Alwen and Daniel Jost and Marta Mularczyk
-
2020/1326 ( PDF )
- Towards Fine-Grained One-Way Functions from Strong Average-Case Hardness
- Chris Brzuska and Geoffroy Couteau
-
2020/1325 ( PDF )
- On Self-Equivalence Encodings in White-Box Implementations
- Adrián Ranea and Bart Preneel
-
2020/1324 ( PDF )
- Separation Results for Boolean Function Classes
- Aniruddha Biswas and Palash Sarkar
-
2020/1323 ( PDF )
- CSI-RAShi: Distributed key generation for CSIDH
- Ward Beullens and Lucas Disson and Robi Pedersen and Frederik Vercauteren
-
2020/1322 ( PDF )
- Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication
- Sebastian Paul and Patrik Scheible
-
2020/1321 ( PDF )
- Provably Quantum-Secure Tweakable Block Ciphers
- Akinori Hosoyamada and Tetsu Iwata
-
2020/1320 ( PDF )
- WARP : Revisiting GFN for Lightweight 128-bit Block Cipher
- Subhadeep Banik and Zhenzhen Bao and Takanori Isobe and Hiroyasu Kubo and Fukang Liu and Kazuhiko Minematsu and Kosei Sakamoto and Nao Shibata and Maki Shigeri
-
2020/1319 ( PDF )
- On Succinct Arguments and Witness Encryption from Groups
- Ohad Barta and Yuval Ishai and Rafail Ostrovsky and David J. Wu
-
2020/1318 ( PDF )
- Poppins: A Direct Construction for Asymptotically Optimal zkSNARKs
- Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno
-
2020/1317 ( PDF )
- Improved Rectangle Attacks on SKINNY and CRAFT
- Hosein Hadipour and Nasour Bagheri and Ling Song
-
2020/1316 ( PDF )
- Security of Public Key Encryption against Resetting Attacks
- Juliane Krämer and Patrick Struck
-
2020/1315 ( PDF )
- On Index Calculus Algorithms for Subfield Curves
- Steven D. Galbraith and Robert Granger and Simon-Philipp Merz and Christophe Petit
-
2020/1314 ( PDF )
- Secure Software Leasing from Standard Assumptions
- Fuyuki Kitagawa and Ryo Nishimaki and Takashi Yamakawa
-
2020/1313 ( PDF )
- Payment Trees: Low Collateral Payments for Payment Channel Networks
- Maxim Jourenko and Mario Larangeira and Keisuke Tanaka
-
2020/1312 ( PDF )
- Individual Simulations
- Yi Deng
-
2020/1311 ( PDF )
- Cryptanalysis of Feistel-Based Format-Preserving Encryption
- Orr Dunkelman and Abhishek Kumar and Eran Lambooij and Somitra Kumar Sanadhya
-
2020/1310 ( PDF )
- A note on the low order assumption in class group of an imaginary quadratic number fields
- Karim Belabas and Thorsten Kleinjung and Antonio Sanso and Benjamin Wesolowski
-
2020/1309 ( PDF )
- Provable Security Analysis of Decentralized Cryptographic Contact Tracing
- Noel Danz and Oliver Derwisch and Anja Lehmann and Wenzel Puenter and Marvin Stolle and Joshua Ziemann
-
2020/1308 ( PDF )
- On the Success Probability of Solving Unique SVP via BKZ
- Eamonn W. Postlethwaite and Fernando Virdia
-
2020/1307 ( PDF )
- Multiparty Cardinality Testing for Threshold Private Set Intersection
- Pedro Branco and Nico Döttling and Sihang Pu
-
2020/1306 ( PDF )
- Simulation Extractable Versions of Groth’s zk-SNARK Revisited
- Karim Baghery and Zaira Pindado and Carla Ràfols
-
2020/1305 ( PDF )
- On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
- Kai-Min Chung and Serge Fehr and Yu-Hsuan Huang and Tai-Ning Liao
-
2020/1304 ( PDF )
- QCB: Efficient Quantum-secure Authenticated Encryption
- Ritam Bhaumik and Xavier Bonnetain and André Chailloux and Gaëtan Leurent and María Naya-Plasencia and André Schrottenloher and Yannick Seurin
-
2020/1303 ( PDF )
- Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer
- Joppe W. Bos and Joost Renes and Christine van Vredendaal
-
2020/1302 ( PDF )
- TMVP-based Multiplication for Polynomial Quotient Rings and Application to Saber on ARM Cortex-M4
- İrem Keskinkurt Paksoy and Murat Cenk
-
2020/1301 ( PDF )
- Robust Property-Preserving Hash Functions for Hamming Distance and More
- Nils Fleischhacker and Mark Simkin
-
2020/1300 ( PDF )
- Byzantine Ordered Consensus without Byzantine Oligarchy
- Yunhao Zhang and Srinath Setty and Qi Chen and Lidong Zhou and Lorenzo Alvisi
-
2020/1299 ( -- withdrawn -- )
- Unbounded Key-Policy Attribute-based Encryption with Black-Box Traceability
- Yunxiu Ye and Zhenfu Cao and Jiachen Shen
-
2020/1298 ( PDF )
- Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols
- Enis Ulqinaku and Hala Assal and AbdelRahman Abdou and Sonia Chiasson and Srdjan Čapkun
-
2020/1297 ( PDF )
- On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software
- Lauren De Meyer and Elke De Mulder and Michael Tunstall
-
2020/1296 ( PDF )
- Concrete quantum cryptanalysis of binary elliptic curves
- Gustavo Banegas and Daniel J. Bernstein and Iggy van Hoof and Tanja Lange
-
2020/1295 ( PDF )
- Optimized Software Implementations for theLightweight Encryption Scheme ForkAE
- Arne Deprez and Elena Andreeva and Jose Maria Bermudo Mera and Angshuman Karmakar and Antoon Purnal
-
2020/1294 ( PDF )
- Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs
- Barbara Gigerl and Vedad Hadzic and Robert Primas and Stefan Mangard and Roderick Bloem
-
2020/1293 ( PDF )
- I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis
- Lichao Wu and Guilherme Perin and Stjepan Picek
-
2020/1292 ( PDF )
- Optimal Oblivious Parallel RAM
- Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Enoch Peserico and Elaine Shi
-
2020/1291 ( PDF )
- Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model
- Bernardo David and Rafael Dowsley
-
2020/1290 ( PDF )
- FORTIS: FORgeable TImeStamps Thwart Selfish Mining
- Osman Biçer and Alptekin Küpçü
-
2020/1289 ( PDF )
- Sword: An Opaque Blockchain Protocol
- Farid Elwailly
-
2020/1288 ( PDF )
- Improved attacks against key reuse in learning with errors key exchange
- Nina Bindel and Douglas Stebila and Shannon Veitch
-
2020/1287 ( PDF )
- Multivariate Cryptographic Primitive based on the product of the roots of a polynomial over a field
- Borja Gómez
-
2020/1286 ( PDF )
- Secure Quantum Two-Party Computation: Impossibility and Constructions
- Michele Ciampi and Alexandru Cojocaru and Elham Kashefi and Atul Mantri
-
2020/1285 ( PDF )
- Multi-Input Quadratic Functional Encryption from Pairings
- Shweta Agrawal and Rishab Goyal and Junichi Tomida
-
2020/1284 ( PDF )
- Entropy Estimation of Physically Unclonable Functions with Offset Error
- Mitsuru Shiozaki and Yohei Hori and Takeshi Fujino
-
2020/1283 ( PDF )
- Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem
- Craig Costello and Michael Meyer and Michael Naehrig
-
2020/1282 ( PDF )
- Compact Authenticated Key Exchange in the Quantum Random Oracle Model
- Haiyang Xue and Man Ho Au and Rupeng Yang and Bei Liang and Haodong Jiang
-
2020/1281 ( PDF )
- Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees
- Matthew Weidner and Martin Kleppmann and Daniel Hugenroth and Alastair R. Beresford
-
2020/1280 ( PDF )
- DORY: An Encrypted Search System with Distributed Trust
- Emma Dauterman and Eric Feng and Ellen Luo and Raluca Ada Popa and Ion Stoica
-
2020/1279 ( PDF )
- Tightly-Secure Authenticated Key Exchange, Revisited
- Tibor Jager and Eike Kiltz and Doreen Riepel and Sven Schäge
-
2020/1278 ( PDF )
- Compact Dilithium Implementations on Cortex-M3 and Cortex-M4
- Denisa O. C. Greconici and Matthias J. Kannwischer and Daan Sprenkels
-
2020/1277 ( PDF )
- A Simple Protocol to Compare EMFI Platforms
- J. Toulemont and N. Ouldei-Tebina and J. M. Galliere and P. Nouet and E. Bourbao and P. Maurine
-
2020/1276 ( PDF )
- Lattice-based Key Sharing Schemes - A Survey
- Prasanna Ravi and James Howe and Anupam Chattopadhyay and Shivam Bhasin
-
2020/1275 ( PDF )
- Quarks: Quadruple-efficient transparent zkSNARKs
- Srinath Setty and Jonathan Lee
-
2020/1274 ( PDF )
- Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments
- Jonathan Lee
-
2020/1273 ( PDF )
- Classical Verification of Quantum Computations with Efficient Verifier
- Nai-Hui Chia and Kai-Min Chung and Takashi Yamakawa
-
2020/1272 ( PDF )
- Bent Functions from Cellular Automata
- Maximilien Gadouleau and Luca Mariot and Stjepan Picek
-
2020/1271 ( PDF )
- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version)
- Alexandros Bakas and Antonis Michalas
-
2020/1270 ( PDF )
- Classical vs Quantum Random Oracles
- Takashi Yamakawa and Mark Zhandry
-
2020/1269 ( PDF )
- PRINCEv2 - More Security for (Almost) No Overhead
- Dušan Božilov and Maria Eichlseder and Miroslav Kneževic and Baptiste Lambin and Gregor Leander and Thorben Moos and Ventzislav Nikov and Shahram Rasoolzadeh and Yosuke Todo and Friedrich Wiemer
-
2020/1268 ( PDF )
- A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis
- Anubhab Baksi and Vinay B. Y. Kumar and Banashri Karmakar and Shivam Bhasin and Dhiman Saha and Anupam Chattopadhyay
-
2020/1267 ( PDF )
- Fault Attacks In Symmetric Key Cryptosystems
- Anubhab Baksi and Shivam Bhasin and Jakub Breier and Dirmanto Jap and Dhiman Saha
-
2020/1266 ( PDF )
- Multi-Party Functional Encryption
- Shweta Agrawal and Rishab Goyal and Junichi Tomida
-
2020/1265 ( PDF )
- Revisiting ECM on GPUs
- Jonas Wloka and Jan Richter-Brockmann and Colin Stahlke and Thorsten Kleinjung and Christine Priplata and Tim Güneysu
-
2020/1264 ( PDF )
- Humanly Computable Passwords as Lattice based OTP generator with LWE
- Slawomir Matelski
-
2020/1263 ( PDF )
- Improved Fault Analysis on SIMECK Ciphers
- Duc-Phong Le and Rongxing Lu and Ali A. Ghorbani
-
2020/1262 ( PDF )
- On (multi-stage) Proof-of-Work blockchain protocols
- Paolo D'Arco and Francesco Mogavero
-
2020/1261 ( PDF )
- MuSig2: Simple Two-Round Schnorr Multi-Signatures
- Jonas Nick and Tim Ruffing and Yannick Seurin
-
2020/1260 ( PDF )
- Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance
- Martin R. Albrecht and Shi Bai and Jianwei Li and Joe Rowell
-
2020/1259 ( PDF )
- Silent Two-party Computation Assisted by Semi-trusted Hardware
- Yibiao Lu and Bingsheng Zhang and Weiran Liu and Lei Zhang and Kui Ren
-
2020/1258 ( PDF )
- TranSCA: Cross-Family Profiled Side-Channel Attacks using Transfer Learning on Deep Neural Networks
- Dhruv Thapar and Manaar Alam and Debdeep Mukhopadhyay
-
2020/1257 ( PDF )
- Improved Reduction Between SIS Problems over Structured Lattices
- ZaHyun Koo and Yongwoo Lee and Joon-Woo Lee and Jong-Seon No and Young-Sik Kim
-
2020/1256 ( PDF )
- Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/p^k Z
- Mark Abspoel and Ronald Cramer and Ivan Damgård and Daniel Escudero and Matthieu Rambaud and Chaoping Xing and Chen Yuan
-
2020/1255 ( PDF )
- Boolean Ring Cryptographic Equation Solving
- Sean Murphy and Maura Paterson and Christine Swart
-
2020/1254 ( PDF )
- Broadcast-Optimal Two Round MPC with an Honest Majority
- Ivan Damgård and Bernardo Magri and Luisa Siniscalchi and Sophia Yakoubov
-
2020/1253 ( PDF )
- New Representations of the AES Key Schedule
- Gaëtan Leurent and Clara Pernot
-
2020/1252 ( PDF )
- Constant Rate (Non-malleable) Secret Sharing Schemes Tolerating Joint Adaptive Leakage
- Nishanth Chandran and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar
-
2020/1251 ( PDF )
- Bit Security Estimation Using Various Information-Theoretic Measures
- Dong-Hoon Lee and Young-Sik Kim and Jong-Seon No
-
2020/1250 ( PDF )
- A New Code Based Signature Scheme without Trapdoors
- Zhe Li and Chaoping Xing and Sze Ling Yeo
-
2020/1249 ( PDF )
- Adversarial Level Agreements for Two-Party Protocols
- Marilyn George and Seny Kamara
-
2020/1248 ( PDF )
- Random-index PIR and Applications
- Craig Gentry and Shai Halevi and Bernardo Magri and Jesper Buus Nielsen and Sophia Yakoubov
-
2020/1247 ( PDF )
- Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time
- Jiaheng Zhang and Weijie Wang and Yinuo Zhang and Yupeng Zhang
-
2020/1246 ( PDF )
- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
- Gianluca Brian and Antonio Faonio and Maciej Obremski and João Ribeiro and Mark Simkin and Maciej Skórski and Daniele Venturi
-
2020/1245 ( PDF )
- Two-round trip Schnorr multi-signatures via delinearized witnesses
- Handan Kilinc Alper and Jeffrey Burdges
-
2020/1244 ( PDF )
- Taming the many EdDSAs
- Konstantinos Chalkias and François Garillot and Valeria Nikolaenko
-
2020/1243 ( PDF )
- A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV
- Hiroki Furue and Yasuhiko Ikematsu and Yutaro Kiyomura and Tsuyoshi Takagi
-
2020/1242 ( PDF )
- Improved (Related-key) Differential Cryptanalysis on GIFT
- Fulei Ji and Wentao Zhang and Chunning Zhou and Tianyou Ding
-
2020/1241 ( PDF )
- DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version)
- Siang Meng Sim and Dirmanto Jap and Shivam Bhasin
-
2020/1240 ( PDF )
- SQISign: compact post-quantum signatures from quaternions and isogenies
- Luca De Feo and David Kohel and Antonin Leroux and Christophe Petit and Benjamin Wesolowski
-
2020/1239 ( PDF )
- Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation
- Alin Tomescu and Yu Xia and Zachary Newman
-
2020/1238 ( PDF )
- Hardness of Module-LWE and Ring-LWE on General Entropic Distributions
- Hao Lin and Yang Wang and Mingqiang Wang
-
2020/1237 ( PDF )
- A Complete Analysis of the BKZ Lattice Reduction Algorithm
- Jianwei Li and Phong Q. Nguyen
-
2020/1236 ( PDF )
- Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions
- Jun Wan and Hanshen Xiao and Srinivas Devadas and Elaine Shi
-
2020/1235 ( PDF )
- Assessing Lightweight Block Cipher Security using Linear and Nonlinear Machine Learning Models
- Ting Rong Lee and Je Sen Teh and Jasy Liew Suet Yan and Norziana Jamil and Jiageng Chen
-
2020/1234 ( PDF )
- Impossibility on the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model
- Masayuki Fukumitsu and Shingo Hasegawa
-
2020/1233 ( PDF )
- BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer
- Farid Javani and Alan T. Sherman
-
2020/1232 ( PDF )
- On the Existence of Weak Keys for QC-MDPC Decoding
- Nicolas Sendrier and Valentin Vasseur
-
2020/1231 ( PDF )
- vault1317/signal-dakez: An authenticated key exchange protocol with a public key concealing and a participation deniability designed for secure messaging
- Richard B. Riddick
-
2020/1230 ( PDF )
- Certificateless Public-key Authenticate Encryption with Keyword Search Revised: MCI and MTP
- Leixiao Cheng and Fei Meng
-
2020/1229 ( PDF )
- Decentralized Custody Scheme with Game-Theoretic Security
- Zhaohua Chen and Guang Yang
-
2020/1228 ( PDF )
- Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices
- Colin O'Flynn
-
2020/1227 ( PDF )
- Integral Cryptanalysis of Reduced-Round Tweakable TWINE
- Muhammad ElSheikh and Amr M. Youssef
-
2020/1226 ( PDF )
- Synchronous Constructive Cryptography
- Chen-Da Liu-Zhang and Ueli Maurer
-
2020/1225 ( PDF )
- ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
- Arpita Patra and Thomas Schneider and Ajith Suresh and Hossein Yalame
-
2020/1224 ( PDF )
- Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives (extended version)
- Alexandros Bakas and Antonis Michalas
-
2020/1223 ( PDF )
- Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM
- Jonathan Takeshita and Dayane Reis and Ting Gong and Michael Niemier and X. Sharon Hu and Taeho Jung
-
2020/1222 ( PDF )
- Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand
- Muhammed F. Esgin and Veronika Kuchta and Amin Sakzad and Ron Steinfeld and Zhenfei Zhang and Shifeng Sun and Shumo Chu
-
2020/1221 ( PDF )
- Verifiable Functional Encryption using Intel SGX
- Tatsuya Suzuki and Keita Emura and Toshihiro Ohigashi and Kazumasa Omote
-
2020/1220 ( PDF )
- The Topographic Signature (TopoSign) Protocol
- Hassan Jameel Asghar and Slawomir Matelski and Josef Pieprzyk
-
2020/1219 ( PDF )
- Aggregate Signature with Detecting Functionality from Group Testing
- Shingo Sato and Junji Shikata and Tsutomu Matsumoto
-
2020/1218 ( PDF )
- Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing
- Shingo Sato and Junji Shikata
-
2020/1217 ( PDF )
- R-Propping of HK17: Upgrade for a Detached Proposal of NIST PQC First Round Survey
- Pedro Hecht
-
2020/1216 ( PDF )
- Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4
- Erdem Alkim and Dean Yun-Li Cheng and Chi-Ming Marvin Chung and Hülya Evkan and Leo Wei-Lun Huang and Vincent Hwang and Ching-Lin Trista Li and Ruben Niederhagen and Cheng-Jhih Shih and Julian Wälde and Bo-Yin Yang
-
2020/1215 ( PDF )
- Differential analysis of the ZUC-256 initialisation
- Steve Babbage and Alexander Maximov
-
2020/1214 ( PDF )
- Cryptanalysis of RSA: A Special Case of Boneh-Durfee’s Attack
- Majid Mumtaz and Ping Luo
-
2020/1213 ( PDF )
- Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness
- Joseph Jaeger and Stefano Tessaro
-
2020/1212 ( PDF )
- Triply Adaptive UC NIZK
- Ran Canetti and Pratik Sarkar and Xiao Wang
-
2020/1211 ( PDF )
- Public-key Authenticate Encryption with Keyword Search Revised:\\ Probabilistic TrapGen algorithm
- Leixiao Cheng and Fei Meng
-
2020/1210 ( PDF )
- Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions
- Yusuke Yoshida and Fuyuki Kitagawa and Keita Xagawa and Keisuke Tanaka
-
2020/1209 ( PDF )
- Universal Composition with Global Subroutines: Capturing Global Setup within plain UC
- Christian Badertscher and Ran Canetti and Julia Hesse and Björn Tackmann and Vassilis Zikas
-
2020/1208 ( PDF )
- An algorithm for bounding non-minimum weight differentials in 2-round LSX-ciphers
- Vitaly Kiryukhin
-
2020/1207 ( PDF )
- FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results
- Kamyar Mohajerani and Richard Haeussler and Rishub Nagpal and Farnoud Farahmand and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj
-
2020/1206 ( PDF )
- Frontrunning on Automated Decentralized Exchange in Proof Of Stake Environment
- Andrey Sobol
-
2020/1205 ( PDF )
- Towards Non-Interactive Witness Hiding
- Benjamin Kuykendall and Mark Zhandry
-
2020/1204 ( PDF )
- Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
- Marc Fischlin and Felix Rohrbach
-
2020/1203 ( PDF )
- Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys
- Jean-Philippe Bossuat and Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Pierre Hubaux
-
2020/1202 ( PDF )
- Correlation Power Analysis and Higher-order Masking Implementation of WAGE
- Yunsi Fei and Guang Gong and Cheng Gongye and Kalikinkar Mandal and Raghvendra Rohit and Tianhong Xu and Yunjie Yi and Nusa Zidaric
-
2020/1201 ( PDF )
- Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
- Tingting Cui and Lorenzo Grassi
-
2020/1200 ( -- withdrawn -- )
- WBCD: White-box Block Cipher Scheme Based on Dynamic Library
- Yatao Yang and Ye Zhang and Yuying Zhai and Zheng Yuan and Guangwu Xu
-
2020/1199 ( PDF )
- Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity
- Yevgeniy Dodis and Pooya Farshim and Sogol Mazaheri and Stefano Tessaro
-
2020/1198 ( PDF )
- Finding EM leakages at design stage: a simulation methodology
- Davide Poggi and Philippe Maurine and Thomas Ordas and Alexandre Sarafianos and Jérémy Raoult
-
2020/1197 ( PDF )
- Black-Box Non-Interactive Non-Malleable Commitments
- Rachit Garg and Dakshita Khurana and George Lu and Brent Waters
-
2020/1196 ( PDF )
- TR-31 and AS 2805 (Non)equivalence report
- Arthur Van Der Merwe and David Paul and Jelena Schmalz and Timothy M. Schaerf
-
2020/1195 ( PDF )
- A Lower Bound for One-Round Oblivious RAM
- David Cash and Andrew Drucker and Alexander Hoover
-
2020/1194 ( PDF )
- Quantum copy-protection of compute-and-compare programs in the quantum random oracle model
- Andrea Coladangelo and Christian Majenz and Alexander Poremba
-
2020/1193 ( PDF )
- Bypassing Isolated Execution on RISC-V with Fault Injection
- Shoei Nashimoto and Daisuke Suzuki and Rei Ueno and Naofumi Homma
-
2020/1192 ( PDF )
- Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level
- Yuan Yao and Tarun Kathuria and Baris Ege and Patrick Schaumont
-
2020/1191 ( PDF )
- Schrödinger's Pirate: How To Trace a Quantum Decoder
- Mark Zhandry
-
2020/1190 ( PDF )
- Efficient Post-Quantum SNARKs for RSIS and RLWE and their Applications to Privacy
- Cecilia Boschini and Jan Camenisch and Max Ovsiankin and Nicholas Spooner
-
2020/1189 ( PDF )
- Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version)
- Karim Baghery and Alonso González and Zaira Pindado and Carla Ràfols
-
2020/1188 ( PDF )
- Cryptographic Group Actions and Applications
- Navid Alamati and Luca De Feo and Hart Montgomery and Sikhar Patranabis
-
2020/1187 ( PDF )
- Coupling of Random Systems
- David Lanzenberger and Ueli Maurer
-
2020/1186 ( PDF )
- Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions
- Zvika Brakerski and Pedro Branco and Nico Döttling and Sanjam Garg and Giulio Malavolta
-
2020/1185 ( PDF )
- Lossiness and Entropic Hardness for Ring-LWE
- Zvika Brakerski and Nico Döttling
-
2020/1184 ( PDF )
- Constant-time verification for cut-and-choose-based signatures
- Robert Ransom
-
2020/1183 ( PDF )
- Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations
- Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
-
2020/1182 ( PDF )
- On the Round Complexity of the Shuffle Model
- Amos Beimel and Iftach Haitner and Kobbi Nissim and Uri Stemmer
-
2020/1181 ( PDF )
- TinyGarble2: Smart, Efficient, and Scalable Yao’s Garble Circuit
- Siam Hussain and Baiyu Li and Farinaz Koushanfar and Rosario Cammarota
-
2020/1180 ( PDF )
- MultiTLS: Secure communication channels with cipher suite diversity
- Ricardo Moura and David R. Matos and Miguel Pardal and Miguel Correia
-
2020/1179 ( PDF )
- Optimal Broadcast Encryption from LWE and Pairings in the Standard Model
- Shweta Agrawal and Daniel Wichs and Shota Yamada
-
2020/1178 ( PDF )
- An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH
- Tomoki Kawashima and Katsuyuki Takashima and Yusuke Aikawa and Tsuyoshi Takagi
-
2020/1177 ( PDF )
- Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions
- Hao Guo and Siwei Sun and Danping Shi and Ling Sun and Yao Sun and Lei Hu and Meiqin Wang
-
2020/1176 ( PDF )
- Short Paper: PoSH Proof of Staked Hardware Consensus
- Rami Khalil and Naranker Dulay
-
2020/1175 ( PDF )
- MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication
- David Heath and Vladimir Kolesnikov and Stanislav Peceny
-
2020/1174 ( PDF )
- Proximity Searchable Encryption for the Iris Biometrics
- Sohaib Ahmad and Chloe Cachet and Luke Demarest and Benjamin Fuller and Ariel Hamlin
-
2020/1173 ( PDF )
- Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark)
- Ryo Nishimaki
-
2020/1172 ( PDF )
- Cryptanalysis of a round optimal lattice-based multisignature scheme
- Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso
-
2020/1171 ( PDF )
- On the Price of Concurrency in Group Ratcheting Protocols
- Alexander Bienstock and Yevgeniy Dodis and Paul Rösler
-
2020/1170 ( PDF )
- On the Power of an Honest Majority in Three-Party Computation Without Broadcast
- Bar Alon and Ran Cohen and Eran Omri and Tom Suad
-
2020/1169 ( PDF )
- Privacy-preserving greater-than integer comparison without binary decomposition in the malicious model
- Sigurd Eskeland
-
2020/1168 ( PDF )
- FHE-Based Bootstrapping of Designated-Prover NIZK
- Zvika Brakerski and Sanjam Garg and Rotem Tsabary
-
2020/1167 ( PDF )
- Batch Verification for Statistical Zero Knowledge Proofs
- Inbar Kaslasi and Guy N. Rothblum and Ron D. Rothblum and Adam Sealfon and Prashant Nalini Vasudevan
-
2020/1166 ( PDF )
- A Differential and Linear Analysis of the Inversion Mapping in Odd-Characteristic Finite Fields
- Jorge Nakahara Jr
-
2020/1165 ( PDF )
- Practical Isogeny-Based Key-exchange with Optimal Tightness
- Bor de Kock and Kristian Gjøsteen and Mattia Veroni
-
2020/1164 ( PDF )
- Template Attacks Based on the Multivariate Joint Distribution
- Min Yang and Qingshu Meng and An Wang and Xin Liu
-
2020/1163 ( PDF )
- Specifying cycles of minimal length for commonly used linear layers in block ciphers
- Guoqiang Deng and Yongzhuang Wei and Xuefeng Duan and Enes Pasalic and Samir Hodzic
-
2020/1162 ( PDF )
- On Average-Case Hardness in TFNP from One-Way Functions
- Pavel Hubáček and Chethan Kamath and Karel Král and Veronika Slívová
-
2020/1161 ( PDF )
- KVaC: Key-Value Commitments for Blockchains and Beyond
- Shashank Agrawal and Srinivasan Raghuraman
-
2020/1160 ( PDF )
- Characterizing Deterministic-Prover Zero Knowledge
- Nir Bitansky and Arka Rai Choudhuri
-
2020/1159 ( PDF )
- ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ?
- Rintaro Fujita and Takanori Isobe and Kazuhiko Minematsu
-
2020/1158 ( PDF )
- Don't throw your nonces out with the bathwater
- Daan Sprenkels and Bas Westerbaan
-
2020/1157 ( PDF )
- Secure Massively Parallel Computation for Dishonest Majority
- Rex Fernando and Ilan Komargodski and Yanyi Liu and Elaine Shi
-
2020/1156 ( PDF )
- Verifiable Hierarchical Key Assignment Schemes
- Anna Lisa Ferrara and Chiara Ricciardi
-
2020/1155 ( PDF )
- Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs
- Dimitris Mouris and Nektarios Georgios Tsoutsos
-
2020/1154 ( PDF )
- Functional Encryption for Set Intersection in the Multi-Client Setting
- Kwangsu Lee and Minhye Seo
-
2020/1153 ( PDF )
- Key Committing AEADs
- Shay Gueron
-
2020/1152 ( PDF )
- An Automatic Search Tool for Iterative Trails and its Application to estimation of differentials and linear hulls
- Tianyou Ding and Wentao Zhang and Chunning Zhou and Fulei Ji
-
2020/1151 ( PDF )
- Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
- Robert Merget and Marcus Brinkmann and Nimrod Aviram and Juraj Somorovsky and Johannes Mittmann and Jörg Schwenk
-
2020/1150 ( PDF )
- TEnK-U: Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems
- Gennaro Avitabile and Daniele Friolo and Ivan Visconti
-
2020/1149 ( PDF )
- Deterministic Wallets in a Quantum World
- Nabil Alkeilani Alkadri and Poulami Das and Andreas Erwig and Sebastian Faust and Juliane Krämer and Siavash Riahi and Patrick Struck
-
2020/1148 ( PDF )
- An Area Aware Accelerator for Elliptic Curve Point Multiplication
- Malik Imran and Samuel Pagliarini and Muhammad Rashid
-
2020/1147 ( -- withdrawn -- )
- Lic-Sec: an enhanced AppArmor Docker security profile generator
- Hui Zhu and Christian Gehrmann
-
2020/1146 ( PDF )
- Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries
- Siemen Dhooghe and Svetla Nikova
-
2020/1145 ( PDF )
- Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs
- Wonseok Choi and Byeonghak Lee and Yeongmin Lee and Jooyoung Lee
-
2020/1144 ( PDF )
- Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions
- Lior Rotem and Gil Segev
-
2020/1143 ( PDF )
- Rescue-Prime: a Standard Specification (SoK)
- Alan Szepieniec and Tomer Ashur and Siemen Dhooghe
-
2020/1142 ( PDF )
- Factoring Algorithm Based on Parameterized Newton Method
- Zhengjun Cao and Lihua Liu
-
2020/1141 ( PDF )
- A post-quantum signature scheme from the secant variety of the Grassmannian
- Daniele Di Tullio and Manoj Gyawali
-
2020/1140 ( PDF )
- On the Efficient Estimation of Min-Entropy
- Yongjune Kim and Cyril Guyot and Young-Sik Kim
-
2020/1139 ( PDF )
- Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin
- Huijia Lin and Ji Luo
-
2020/1138 ( PDF )
- Epochal Signatures for Deniable Group Chats
- Andreas Hülsing and Florian Weber
-
2020/1137 ( PDF )
- MOTION - A Framework for Mixed-Protocol Multi-Party Computation
- Lennart Braun and Daniel Demmler and Thomas Schneider and Oleksandr Tkachenko
-
2020/1136 ( PDF )
- On the Family of Elliptic Curves $y^2=x^3+b/\mathbb{F}_p$
- Han Wu and Guangwu Xu
-
2020/1135 ( PDF )
- Adaptively Secure Inner Product Encryption from LWE
- Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
-
2020/1134 ( PDF )
- Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks
- Yoo-Seung Won and Xiaolu Hou and Dirmanto Jap and Jakub Breier and Shivam Bhasin
-
2020/1133 ( PDF )
- Security Analysis of Subterranean 2.0
- Ling Song and Yi Tu and Danping Shi and Lei Hu
-
2020/1132 ( PDF )
- Lower Bound for Oblivious RAM with Large Cells
- Ilan Komargodski and Wei-Kai Lin
-
2020/1131 ( PDF )
- Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound
- Enes Pasalic and René Rodríguez and Fengrong Zhang and Yongzhuang Wei
-
2020/1130 ( PDF )
- Secure training of decision trees with continuous attributes
- Mark Abspoel and Daniel Escudero and Nikolaj Volgushev
-
2020/1129 ( PDF )
- A Secure Software Defined Networking based Framework for IoT Networks
- Ambili K N and Jimmy Jose
-
2020/1128 ( -- withdrawn -- )
- Searching Cubes in Division Property Based Cube Attack: Applications to Round-Reduced ACORN
- Jingchun Yang and Dongdai Lin
-
2020/1127 ( PDF )
- SideLine: How Delay-Lines (May) Leak Secrets from your SoC
- Joseph Gravellier and Jean-Max Dutertre and Yannick Teglia and Philippe Loubet Moundi
-
2020/1126 ( PDF )
- Bitcoin-Monero Cross-chain Atomic Swap
- Joël Gugger
-
2020/1125 ( PDF )
- High-Speed FPGA Implementation of the SIKE Based on An Ultra-Low-Latency Modular Multiplier
- Jing Tian and Bo Wu and Zhongfeng Wang
-
2020/1124 ( PDF )
- Optimized Voronoi-based algorithms for parallel shortest vector computations
- Artur Mariano, Filipe Cabeleira, Gabriel Falcao, Luís Paulo Santos
-
2020/1123 ( PDF )
- Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V
- Alexandre Adomnicai and Thomas Peyrin
-
2020/1122 ( PDF )
- The Velvet Path to Superlight Blockchain Clients
- Aggelos Kiayias and Andrianna Polydouri and Dionysis Zindros
-
2020/1121 ( PDF )
- Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain
- Wilson Alberto Torres and Ron Steinfeld and Amin Sakzad and Veronika Kuchta
-
2020/1120 ( PDF )
- On the security of Diene-Thabet-Yusuf's cubic multivariate signature scheme
- Yasufumi Hashimoto
-
2020/1119 ( PDF )
- All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
- Christoph Hagen and Christian Weinert and Christoph Sendner and Alexandra Dmitrienko and Thomas Schneider
-
2020/1118 ( PDF )
- Approximate Homomorphic Encryption with Reduced Approximation Error
- Andrey Kim and Antonis Papadimitriou and Yuriy Polyakov
-
2020/1117 ( PDF )
- Economic Proof of Work
- Jia Kan
-
2020/1116 ( PDF )
- On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode.
- V. Ustimenko
-
2020/1115 ( PDF )
- SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets
- Karim M. Abdellatif and Olivier Hériveaux
-
2020/1114 ( PDF )
- Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting
- Thomas Haines and Rajeev Gore and Bhavesh Sharma
-
2020/1113 ( PDF )
- On combinatorial approaches to search for quadratic APN functions
- Konstantin Kalgin and Valeriya Idrisova
-
2020/1112 ( PDF )
- A cautionary note on the use of Gurobi for cryptanalysis
- Muhammad ElSheikh and Amr M. Youssef
-
2020/1111 ( PDF )
- Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography
- Abhraneel Dutta and Aaron Hutchinson and Koray Karabina
-
2020/1110 ( PDF )
- Two-round $n$-out-of-$n$ and Multi-Signatures and Trapdoor Commitment from Lattices
- Ivan Damgård and Claudio Orlandi and Akira Takahashi and Mehdi Tibouchi
-
2020/1109 ( PDF )
- On new Vélu's formulae and their applications to CSIDH and B-SIDH constant-time implementations
- Gora Adj and Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez
-
2020/1108 ( PDF )
- Radical isogenies
- Wouter Castryck and Thomas Decru and Frederik Vercauteren
-
2020/1107 ( PDF )
- Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications
- Shuichi Katsumata and Kris Kwiatkowski and Federico Pintore and Thomas Prest
-
2020/1106 ( PDF )
- Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction
- Gili Schul-Ganz and Gil Segev
-
2020/1105 ( PDF )
- Catalic: Delegated PSI Cardinality with Applications to Contact Tracing
- Thai Duong and Duong Hieu Phan and Ni Trieu
-
2020/1104 ( PDF )
- High-Assurance Cryptography Software in the Spectre Era
- Gilles Barthe and Sunjay Cauligi and Benjamin Gregoire and Adrien Koutsos and Kevin Liao and Tiago Oliveira and Swarn Priya and Tamara Rezk and Peter Schwabe
-
2020/1103 ( PDF )
- Packed Multiplication: How to Amortize the Cost of Side-channel Masking ?
- Weijia Wang; Chun Guo; François-Xavier Standaert; Yu Yu; Gaëtan Cassiers
-
2020/1102 ( PDF )
- PQC: R-Propping of Public-Key Cryptosystems Using Polynomials over Non-commutative Algebraic Extension Rings
- Pedro Hecht
-
2020/1101 ( PDF )
- NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus
- Ren Zhang and Dingwei Zhang and Quake Wang and Shichen Wu and Jan Xie and Bart Preneel
-
2020/1100 ( PDF )
- Towards Efficiency-Preserving Round Compression in MPC: Do fewer rounds mean more computation?
- Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain
-
2020/1099 ( PDF )
- Unbounded HIBE with Tight Security
- Roman Langrehr and Jiaxin Pan
-
2020/1098 ( PDF )
- Formalizing Bitcoin Crashes with Universally Composable Security
- Junming Ke and Pawel Szalachowski and Jianying Zhou and Qiuliang Xu
-
2020/1097 ( PDF )
- How to Build Optimally Secure PRFs Using Block Ciphers
- Benoît Cogliati and Ashwin Jha and Mridul Nandi
-
2020/1096 ( PDF )
- Far Field EM Side-Channel Attack on AES Using Deep Learning
- Ruize Wang and Huanyu Wang and Elena Dubrova
-
2020/1095 ( PDF )
- Cycle structure of generalized and closed loop invariants
- Yongzhuang Wei and Rene Rodriguez and Enes Pasalic
-
2020/1094 ( PDF )
- TN-IDS for Network Layer Attacks in RPL based IoT Systems
- Ambili K N and Jimmy Jose
-
2020/1093 ( PDF )
- Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version)
- Xichao Hu and Yongqiang Li and Lin Jiao and Shizhu Tian and Mingsheng Wang
-
2020/1092 ( PDF )
- The Round Complexity of Secure Computation Against Covert Adversaries
- Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain
-
2020/1091 ( PDF )
- Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma
- Joachim Neu and Ertem Nusret Tas and David Tse
-
2020/1090 ( PDF )
- On the Adaptive Security of MACs and PRFs
- Andrew Morgan and Rafael Pass and Elaine Shi
-
2020/1089 ( PDF )
- Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers
- Akinori Hosoyamada and María Naya-Plasencia and Yu Sasaki
-
2020/1088 ( PDF )
- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security
- Xiangyu Liu; Shengli Liu; Dawu Gu; Jian Weng
-
2020/1087 ( PDF )
- Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE
- Keita Emura and Atsushi Takayasu and Yohei Watanabe
-
2020/1086 ( PDF )
- Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme
- Daniel Apon and Dustin Moody and Ray Perlner and Daniel Smith-Tone and Javier Verbel
-
2020/1085 ( PDF )
- Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications
- Tapas Pal and Ratna Dutta
-
2020/1084 ( PDF )
- Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions
- David Derler and Stephan Krenn and Kai Samelin and Daniel Slamanig
-
2020/1083 ( PDF )
- A Fast and Compact RISC-V Accelerator for Ascon and Friends
- Stefan Steinegger and Robert Primas
-
2020/1082 ( PDF )
- Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption
- Bart Mennink
-
2020/1081 ( PDF )
- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices
- Olivier Bernard and Adeline Roux-Langlois
-
2020/1080 ( PDF )
- Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting
- Rupeng Yang and Junzuo Lai and Zhengan Huang and Man Ho Au and Qiuliang Xu and Willy Susilo
-
2020/1079 ( PDF )
- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption
- Rongmao Chen and Xinyi Huang and Moti Yung
-
2020/1078 ( PDF )
- Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles
- Jodie Knapp and Elizabeth A. Quaglia
-
2020/1077 ( PDF )
- Unconditionally secure quantum bit commitment: Revised
- Ming-Xing Luo and Xiaojun Wang
-
2020/1076 ( PDF )
- Minimizing the Two-Round Tweakable Even-Mansour Cipher
- Avijit Dutta
-
2020/1075 ( PDF )
- On the Query Complexity of Constructing PRFs from Non-adaptive PRFs
- Pratik Soni and Stefano Tessaro
-
2020/1074 ( PDF )
- A Scalable Simulation of the BB84 Protocol Involving Eavesdropping
- Mihai-Zicu Mina and Emil Simion
-
2020/1073 ( PDF )
- Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation
- Yusai Wu and Liqing Yu and Zhenfu Cao and Xiaolei Dong
-
2020/1072 ( PDF )
- Cryptanalysis of the permutation based algorithm SpoC
- Liliya Kraleva and Raluca Posteuca and Vincent Rijmen
-
2020/1071 ( PDF )
- On Pairing-Free Blind Signature Schemes in the Algebraic Group Model
- Julia Kastner and Julian Loss and Jiayu Xu
-
2020/1070 ( PDF )
- Efficient indifferentiable hashing to elliptic curves $y^2 = x^3 + b$ provided that $b$ is a quadratic residue
- Dmitrii Koshelev
-
2020/1069 ( PDF )
- Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions
- Matteo Campanelli and Antonio Faonio and Dario Fiore and Anaïs Querol and Hadrián Rodríguez
-
2020/1068 ( PDF )
- An Efficient Transformation Capabilities of Single Database Private Block Retrieval
- Radhakrishna Bhat and N R Sunitha
-
2020/1067 ( PDF )
- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime
- Adrian Marotzke
-
2020/1066 ( PDF )
- Constant time algorithms for ROLLO-I-128
- Carlos Aguilar-Melchor and Nicolas Aragon and Emanuele Bellini and Florian Caullery and Rusydi H. Makarim and Chiara Marcolla
-
2020/1065 ( PDF )
- Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering
- Naila Mukhtar and Louiza Papachristodoulou and Apostolos P. Fournaris and Lejla Batina and Yinan Kong
-
2020/1064 ( PDF )
- Mimblewimble Non-Interactive Transaction Scheme
- Gary Yu
-
2020/1063 ( -- withdrawn -- )
- Signatures of Knowledge for Boolean Circuits under Standard Assumptions
- Karim Baghery and Alonso González and Zaira Pindado and Carla Ràfols
-
2020/1062 ( PDF )
- Quantum Search for Scaled Hash Function Preimages
- Sergi Ramos-Calderer and Emanuele Bellini and José I. Latorre and Marc Manzano and Victor Mateu
-
2020/1061 ( PDF )
- A new idea in response to fast correlation attacks on small-state stream ciphers
- Vahid Amin Ghafari and Fujiang Lin
-
2020/1060 ( PDF )
- Circular Security Is Complete for KDM Security
- Fuyuki Kitagawa and Takahiro Matsuda
-
2020/1059 ( PDF )
- Incorrectly Generated RSA Keys: How To Recover Lost Plaintexts
- Daniel Shumow
-
2020/1058 ( PDF )
- On the Complexity of the Crossbred Algorithm
- João Diogo Duarte
-
2020/1057 ( PDF )
- MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces
- Jonas Nick and Tim Ruffing and Yannick Seurin and Pieter Wuille
-
2020/1056 ( PDF )
- Optimized GPU Framework for Block Cipher Differential Search
- Wei-Zhu Yeoh and Je Sen Teh and Jiageng Chen
-
2020/1055 ( PDF )
- Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain
- Santi J. Vives
-
2020/1054 ( PDF )
- Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems
- Ben Smyth
-
2020/1053 ( PDF )
- Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation
- Anders Dalskov and Eysa Lee and Eduardo Soria-Vazquez
-
2020/1052 ( PDF )
- Attacking Threshold Wallets
- Jean-Philippe Aumasson and Omer Shlomovits
-
2020/1051 ( PDF )
- Lower Bounds on the Degree of Block Ciphers
- Phil Hebborn and Baptiste Lambin and Gregor Leander and Yosuke Todo
-
2020/1050 ( PDF )
- On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation
- Arpita Patra and Divya Ravi and Swati Singla
-
2020/1049 ( PDF )
- Rotational analysis of ChaCha permutation
- Stefano Barbero and Emanuele Bellini and Rusydi Makarim
-
2020/1048 ( PDF )
- An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums
- Kai Hu and Siwei Sun and Meiqin Wang and Qingju Wang
-
2020/1047 ( PDF )
- Side-channel Attacks with Multi-thread Mixed Leakage
- Yiwen Gao and Yongbin Zhou
-
2020/1046 ( PDF )
- On the Linear Distinguishing Attack against ZUC-256 Stream Cipher
- ZUC Design Team
-
2020/1045 ( PDF )
- On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
- Dhiman Saha and Yu Sasaki and Danping Shi and Ferdinand Sibleyras and Siwei Sun and Yingjie Zhang
-
2020/1044 ( PDF )
- A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
- Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
-
2020/1043 ( PDF )
- Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions
- Ian McQuoid and Mike Rosulek and Lawrence Roy
-
2020/1042 ( PDF )
- Candidate Obfuscation via Oblivious LWE Sampling
- Hoeteck Wee and Daniel Wichs
-
2020/1041 ( PDF )
- Sign in finite fields
- Abraham Westerbaan and Bas Westerbaan
-
2020/1040 ( PDF )
- The Modular Specifications Security Framework
- Amir Herzberg and Hemi Leibowitz and Ewa Syta and Sara Wrótniak
-
2020/1039 ( PDF )
- Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct
- Mohammad Sadeq Dousti and Alptekin Küpçü
-
2020/1038 ( PDF )
- On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4
- Prasanna Ravi and Romain Poussier and Shivam Bhasin and Anupam Chattopadhyay
-
2020/1037 ( PDF )
- A High-performance Hardware Implementation of Saber Based on Karatsuba Algorithm
- Yihong Zhu and Min Zhu and Bohan Yang and Wenping Zhu and Chenchen Deng and Chen Chen and Shaojun Wei and Leibo Liu
-
2020/1036 ( PDF )
- Security in banking
- Arthur Van Der Merwe and David Paul and Jelena Schmalz and Timothy M. Schaerf
-
2020/1035 ( PDF )
- Evolving Secret Sharing with Essential Participants
- Jyotirmoy Pramanik and Avishek Adhikari
-
2020/1034 ( PDF )
- Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques
- Fukang Liu and Takanori Isobe and Willi Meier
-
2020/1033 ( PDF )
- RandChain: Decentralised Randomness Beacon from Sequential Proof-of-Work
- Runchao Han and Haoyu Lin and Jiangshan Yu
-
2020/1032 ( PDF )
- Cryptanalysis of the MALICIOUS Framework
- Tim Beyne and Chaoyun Li
-
2020/1031 ( PDF )
- Profiled Deep Learning Side-Channel Attack on a Protected Arbiter PUF Combined with Bitstream Modification
- Yang Yu and Michail Moraitis and Elena Dubrova
-
2020/1030 ( PDF )
- Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories
- Xiaoyang Dong and Siwei Sun and Danping Shi and Fei Gao and Xiaoyun Wang and Lei Hu
-
2020/1029 ( PDF )
- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
- Hannah Davis and Felix Günther
-
2020/1028 ( PDF )
- Secure Data Hiding for Contact Tracing
- Craig Gotsman and Kai Hormann
-
2020/1027 ( PDF )
- Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things
- Hu Xiong and Yingzhe Hou and Xin Huang and Saru Kumari
-
2020/1026 ( PDF )
- Simple and Efficient FE for Quadratic Functions
- Junqing Gong and Haifeng Qian
-
2020/1025 ( PDF )
- A Bit-Vector Differential Model for the Modular Addition by a Constant
- Seyyed Arash Azimi and Adrián Ranea and Mahmoud Salmasizadeh and Javad Mohajeri and Mohammad Reza Aref and Vincent Rijmen
-
2020/1024 ( PDF )
- Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices
- Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta
-
2020/1023 ( PDF )
- Post-Quantum Anonymous Veto Networks
- Jintai Ding and Doug Emery and Johannes Mueller and Peter Y. A. Ryan and Vonn Kee Wong
-
2020/1022 ( PDF )
- Polynomial IOPs for Linear Algebra Relations
- Alan Szepieniec and Yuncong Zhang
-
2020/1021 ( PDF )
- Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy
- Christian Badertscher and Peter Gaži and Aggelos Kiayias and Alexander Russell and Vassilis Zikas
-
2020/1020 ( PDF )
- Towards Classical Hardness of Module-LWE: The Linear Rank Case
- Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen
-
2020/1019 ( PDF )
- Security of Streaming Encryption in Google's Tink Library
- Viet Tung Hoang and Yaobin Shen
-
2020/1018 ( PDF )
- Big Subset and Small Superset Obfuscation
- Steven D. Galbraith and Trey Li
-
2020/1017 ( PDF )
- Governance framework for Quipuswap - automated decentralized exchange
- Andrey Sobol and Anastasiia Kondaurova
-
2020/1016 ( PDF )
- Hardware-Assisted Intellectual Property Protection of Deep Learning Models
- Abhishek Chakraborty and Ankit Mondal and Ankur Srivastava
-
2020/1015 ( PDF )
- On Multivariate Algorithms of Digital Signatures of Linear Degree and Low Density.
- Vasyl Ustimenko
-
2020/1014 ( PDF )
- GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel
- Yuntao Liu and Ankur Srivastava
-
2020/1013 ( PDF )
- A Study on Privacy-Preserving GRU Inference Framework
- Shou-Ching Hsiao and Zi-Yuan Liu and Raylin Tso
-
2020/1012 ( PDF )
- Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer
- Yi-Fu Lai and Steven D. Galbraith and Cyprien Delpech de Saint Guilhem
-
2020/1011 ( PDF )
- Private Join and Compute from PIR with Default
- Tancrède Lepoint and Sarvar Patel and Mariana Raykova and Karn Seth and Ni Trieu
-
2020/1010 ( PDF )
- Indistinguishability Obfuscation from Circular Security
- Romain Gay and Rafael Pass
-
2020/1009 ( PDF )
- Obfuscating Finite Automata
- Steven D. Galbraith and Lukas Zobernig
-
2020/1008 ( PDF )
- Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano
- Leah Lathrop
-
2020/1007 ( PDF )
- Attacks on Integer-RLWE
- Alessandro Budroni and Benjamin Chetioui and Ermes Franch
-
2020/1006 ( PDF )
- An Analysis of Fault Attacks on CSIDH
- Jason LeGrow and Aaron Hutchinson
-
2020/1005 ( PDF )
- Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks
- Fabio Campos and Matthias J. Kannwischer and Michael Meyer and Hiroshi Onuki and Marc Stöttinger
-
2020/1004 ( PDF )
- Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn
- Nick Frymann and Daniel Gardham and Franziskus Kiefer and Emil Lundberg and Mark Manulis and Dain Nilsson
-
2020/1003 ( PDF )
- Indistinguishability Obfuscation from Well-Founded Assumptions
- Aayush Jain and Huijia Lin and Amit Sahai
-
2020/1002 ( PDF )
- CrypTFlow2: Practical 2-Party Secure Inference
- Deevashwer Rathee and Mayank Rathee and Nishant Kumar and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma
-
2020/1001 ( PDF )
- Robust distributed symmetric-key encryption
- Xunhua Wang and Ben Huson
-
2020/1000 ( PDF )
- Precise and Mechanised Models and Proofs for Distance-Bounding and an Application to Contactless Payments
- Ioana Boureanu and Constantin Catalin Dragan and François Dupressoir and David Gerault and Pascal Lafourcade
-
2020/999 ( PDF )
- Attribute-Based Symmetric Searchable Encryption
- Hai-Van Dang and Amjad Ullah and Alexandros Bakas and Antonis Michalas
-
2020/998 ( PDF )
- Lightweight Virtual Payment Channels
- Maxim Jourenko and Mario Larangeira and Keisuke Tanaka
-
2020/997 ( PDF )
- Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution
- Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky
-
2020/996 ( PDF )
- Unifying Generic Group Models
- Ueli Maurer and Christopher Portmann and Jiamin Zhu
-
2020/995 ( PDF )
- Bootstrapping fully homomorphic encryption over the integers in less than one second
- Hilder Vitor Lima Pereira
-
2020/994 ( PDF )
- SPARKs: Succinct Parallelizable Arguments of Knowledge
- Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass
-
2020/993 ( PDF )
- Cryptanalysis of Masked Ciphers: A not so Random Idea
- Tim Beyne and Siemen Dhooghe and Zhenda Zhang
-
2020/992 ( PDF )
- Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs
- Bo-Yeon Sim and Jihoon Kwon and Joohee Lee and Il-Ju Kim and Taeho Lee and Jaeseung Han and Hyojin Yoon and Jihoon Cho and Dong-Guk Han
-
2020/991 ( PDF )
- A Novel Hash Function Design based on Hybrid Cellular Automata and Sponge Functions
- Anita John and Alan Reji and Ajay P Manoj and Atul Premachandran and Basil Zachariah and Jimmy Jose
-
2020/990 ( PDF )
- Performance Comparisons and Migration Analyses of Lattice-based Cryptosystems on Hardware Security Module
- Junting Xiao and Tadahiko Ito
-
2020/989 ( PDF )
- Algorithm for SIS and MultiSIS problems
- Igor Semaev
-
2020/988 ( PDF )
- 120.147 Efficient Electromagnetic Side Channel Analysis by Probe Positioning using Multi-Layer Perceptron
- Anupam Golder and Baogeng Ma and Debayan Das and Josef Danial and Shreyas Sen and Arijit Raychowdhury
-
2020/987 ( PDF )
- Fuzzy Asymmetric Password-Authenticated Key Exchange
- Andreas Erwig and Julia Hesse and Maximilian Orlt and Siavash Riahi
-
2020/986 ( PDF )
- The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
- Thomas Peyrin and Haoyang Wang
-
2020/985 ( PDF )
- Orienting supersingular isogeny graphs
- Leonardo Colò and David Kohel
-
2020/984 ( PDF )
- On Multivariate Algorithms of Digital Signatures on Secure El Gamal Type Mode.
- Vasyl Ustimenko
-
2020/983 ( PDF )
- A Differential Meet-in-the-Middle Attack on the Zip cipher
- Michael Stay
-
2020/982 ( PDF )
- Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios
- Sevdenur Baloglu and Sergiu Bursuc and Sjouke Mauw and Jun Pang
-
2020/981 ( PDF )
- Deep Learning based analysis of Key Scheduling Algorithm of PRESENT cipher
- Manan Pareek and Dr. Girish Mishra and Varun Kohli
-
2020/980 ( PDF )
- SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE
- Ruta Jawale and Yael Tauman Kalai and Dakshita Khurana and Rachel Zhang
-
2020/979 ( PDF )
- Mercurial Signatures for Variable-Length Messages
- Elizabeth C. Crites and Anna Lysyanskaya
-
2020/978 ( PDF )
- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher
- Sarah Alzakari and Poorvi Vora
-
2020/977 ( PDF )
- On the Influence of Optimizers in Deep Learning-based Side-channel Analysis
- Guilherme Perin and Stjepan Picek
-
2020/976 ( PDF )
- Synchronizable Exchange
- Ranjit Kumaresan and Srinivasan Raghuraman and Adam Sealfon
-
2020/975 ( PDF )
- Aardvark: A Concurrent Authenticated Dictionary with Short Proofs
- Derek Leung and Yossi Gilad and Sergey Gorbunov and Leonid Reyzin and Nickolai Zeldovich
-
2020/974 ( PDF )
- Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions
- Dongxi Liu and Surya Nepal
-
2020/973 ( PDF )
- Stacked Garbling: Garbled Circuit Proportional to Longest Execution Path
- David Heath and Vladimir Kolesnikov
-
2020/972 ( PDF )
- Optimized Binary GCD for Modular Inversion
- Thomas Pornin
-
2020/971 ( PDF )
- QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme
- Koksal Mus and Saad Islam and Berk Sunar
-
2020/970 ( PDF )
- Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE
- Carsten Baum and Daniel Escudero and Alberto Pedrouzo-Ulloa and Peter Scholl and Juan Ramón Troncoso-Pastoriza
-
2020/969 ( PDF )
- Hashing to elliptic curves of $j=0$ and quadratic imaginary orders of class number $2$
- Dmitrii Koshelev
-
2020/968 ( PDF )
- Feeding Cryptographic Protocols with Rich and Reliable Supply of Quantum-Grade Randomness
- Gideon Samid
-
2020/967 ( PDF )
- The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes
- Jintai Ding and Joshua Deaton and Vishakha and Bo-Yin Yang
-
2020/966 ( PDF )
- EM-Side-Channel Resistant Symmetric-Key Authentication Mechanism for Small Devices
- Rick Boivie and Charanjit S. Jutla and Daniel Friedman and Ghavam Shahidi
-
2020/965 ( PDF )
- Computation of a 30750-Bit Binary Field Discrete Logarithm
- Robert Granger and Thorsten Kleinjung and Arjen K. Lenstra and Benjamin Wesolowski and Jens Zumbragel
-
2020/964 ( PDF )
- Configurable Private Querying: Lookup and Partial Matching under Homomorphic Encryption
- Hamish Hunt and Jack Crawford and Oliver Masters and Enrico Steffinlongo and Flavio Bergamaschi
-
2020/963 ( PDF )
- From Partial to Global Asynchronous Reliable Broadcast
- Diana Ghinea and Martin Hirt and Chen-Da Liu-Zhang
-
2020/962 ( PDF )
- Post-Quantum Verification of Fujisaki-Okamoto
- Dominique Unruh
-
2020/961 ( PDF )
- Enable Dynamic Parameters Combination to Boost Linear Convolutional Neural Network for Sensitive Data Inference
- Qizheng Wang and Wenping Ma and Jie Li and Ge Liu
-
2020/960 ( PDF )
- Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
- Florian Unterstein and Marc Schink and Thomas Schamberger and Lars Tebelmann and Manuel Ilg and Johann Heyszl
-
2020/959 ( PDF )
- Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key Settings
- Carlos Cid and Akinori Hosoyamada and Yunwen Liu and Siang Meng Sim
-
2020/958 ( PDF )
- Multi-Threshold Asynchronous Reliable Broadcast and Consensus
- Martin Hirt and Ard Kastrati and Chen-Da Liu-Zhang
-
2020/957 ( PDF )
- Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs
- Johannes Tobisch and Anita Aghaie and Georg T. Becker
-
2020/956 ( PDF )
- Constant Time Montgomery Ladder
- Kaushik Nath and Palash Sarkar
-
2020/955 ( PDF )
- Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things
- Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo
-
2020/954 ( PDF )
- New Techniques for Traitor Tracing: Size $N^{1/3}$ and More from Pairings
- Mark Zhandry
-
2020/953 ( PDF )
- Performance comparison between deep learning-based and conventional cryptographic distinguishers
- Emanuele Bellini and Matteo Rossi
-
2020/952 ( PDF )
- On What to Learn: Train or Adapt a Deeply Learned Profile?
- Christophe Genevey-Metat and Benoît Gérard and Annelie Heuser
-
2020/951 ( PDF )
- Amplifying the Security of Functional Encryption, Unconditionally
- Aayush Jain and Alexis Korb and Nathan Manohar and Amit Sahai
-
2020/950 ( PDF )
- Self-Processing Private Sensor Data via Garbled Encryption
- Nathan Manohar and Abhishek Jain and Amit Sahai
-
2020/949 ( PDF )
- HABIT: Hardware-Assisted Bluetooth-based Infection Tracking
- Nathan Manohar and Peter Manohar and Rajit Manohar
-
2020/948 ( PDF )
- STARK Friendly Hash -- Survey and Recommendation
- Eli Ben-Sasson and Lior Goldberg and David Levit
-
2020/947 ( PDF )
- Data Oblivious Algorithms for Multicores
- Vijaya Ramachandran and Elaine Shi
-
2020/946 ( PDF )
- Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm
- Johannes Mittmann and Werner Schindler
-
2020/945 ( PDF )
- On the (in)security of ROS
- Fabrice Benhamouda and Tancrède Lepoint and Julian Loss and Michele Orrù and Mariana Raykova
-
2020/944 ( PDF )
- Secure Conflict-free Replicated Data Types
- Manuel Barbosa and Bernardo Ferreira and João Marques and Bernardo Portela and Nuno Preguiça
-
2020/943 ( PDF )
- Analysing and Improving Shard Allocation Protocols for Sharded Blockchains
- Runchao Han and Jiangshan Yu and Ren Zhang
-
2020/942 ( PDF )
- RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness
- Philipp Schindler and Aljosha Judmayer and Markus Hittmeir and Nicholas Stifter and Edgar Weippl
-
2020/941 ( PDF )
- Towards Optimizing Quantum Implementation of AES S-box
- Doyoung Chung and Jooyoung Lee and Seungkwang Lee and Dooho choi
-
2020/940 ( PDF )
- Directly revocable ciphertext-policy attribute-based encryption from lattices
- Fei Meng
-
2020/939 ( PDF )
- DLDDO: Deep Learning to Detect Dummy Operations
- JongHyeok Lee and Dong-Guk Han
-
2020/938 ( PDF )
- Performance Trade-offs in Design of MimbleWimble Proofs of Reserves
- Suyash Bagad and Saravanan Vijayakumaran
-
2020/937 ( PDF )
- BAM BAM!! On Reliability of EMFI for in-situ Automotive ECU Attacks
- Colin O'Flynn
-
2020/936 ( PDF )
- Cryptanalysis and Improvement of Anonymous Authentication for Wireless Body Area Networks with Provable Security
- Mahender Kumar
-
2020/935 ( PDF )
- Privacy-Preserving Multi-Operator Contact Tracing for Early Detection of Covid19 Contagions
- Davide Andreoletti and Omran Ayoub and Silvia Giordano and Massimo Tornatore and Giacomo Verticale
-
2020/934 ( PDF )
- CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
- Deepak Maram and Harjasleen Malvai and Fan Zhang and Nerla Jean-Louis and Alexander Frolov and Tyler Kell and Tyrone Lobban and Christine Moy and Ari Juels and Andrew Miller
-
2020/933 ( -- withdrawn -- )
- Instantiation of RO Model Transforms via Extractable Functions
- Mohammad Zaheri
-
2020/932 ( PDF )
- A Note on Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near – Rings
- Atul Chaturvedi Varun Shukla Manoj K.Misra
-
2020/931 ( PDF )
- Homomorphic string search with constant multiplicative depth
- Charlotte Bonte and Ilia Iliashenko
-
2020/930 ( PDF )
- The design of scalar AES Instruction Set Extensions for RISC-V
- Ben Marshall and G. Richard Newell and Dan Page and Markku-Juhani O. Saarinen and Claire Wolf
-
2020/929 ( PDF )
- Local XOR Unification: Definitions, Algorithms and Application to Cryptography
- Hai Lin and Christopher Lynch
-
2020/928 ( PDF )
- Multi-theorem (Malicious) Designated-Verifier NIZK for QMA
- Omri Shmueli
-
2020/927 ( PDF )
- A Gas-Efficient Superlight Bitcoin Client in Solidity
- Stelios Daveas and Kostis Karantias and Aggelos Kiayias and Dionysis Zindros
-
2020/926 ( PDF )
- Secure Computation over Lattices and Elliptic Curves
- Brett Hemenway Falk and Daniel Noble
-
2020/925 ( PDF )
- Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
- Chenkai Weng and Kang Yang and Jonathan Katz and Xiao Wang
-
2020/924 ( PDF )
- Ferret: Fast Extension for coRRElated oT with small communication
- Kang Yang and Chenkai Weng and Xiao Lan and Jiang Zhang and Xiao Wang
-
2020/923 ( PDF )
- Another code-based adaptation of Lyubashevsky’s signature cryptanalysed
- Nicolas Aragon and Jean-Christophe Deneuville and Philippe Gaborit
-
2020/922 ( -- withdrawn -- )
- Security Challenges in Smart Grid and Suitable Countermeasures
- Soumyadyuti Ghosh and Urbi Chatterjee and Durba Chatterjee and Rumia Masburah and Debdeep Mukhopadhyay and Soumyajit Dey
-
2020/921 ( PDF )
- Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications
- Hyoseung Kim and Youngkyung Lee and Michel Abdalla and Jong Hwan Park
-
2020/920 ( PDF )
- Further Cryptographic Properties of the Multiplicative Inverse Function
- Deng Tang and Bimal Mandal and Subhamoy Maitra
-
2020/919 ( PDF )
- Tight Bounds for Simon's Algorithm
- Xavier Bonnetain
-
2020/918 ( PDF )
- An Efficient Certificateless Authentication Protocol for the SAE J1939
- Basker Palaniswamy
-
2020/917 ( PDF )
- Formalizing Nakamoto-Style Proof of Stake
- Søren Eller Thomsen and Bas Spitters
-
2020/916 ( PDF )
- Black-Box Transformations from Passive to Covert Security with Public Verifiability
- Ivan Damgård and Claudio Orlandi and Mark Simkin
-
2020/915 ( PDF )
- Does Fiat-Shamir Require a Cryptographic Hash Function?
- Yilei Chen and Alex Lombardi and Fermi Ma and Willy Quach
-
2020/914 ( PDF )
- Ultra-Short Multivariate Public Key Signatures
- Jacques Patarin and Gilles Macario-Rat and Maxime Bros and Eliane Koussa
-
2020/913 ( PDF )
- Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis
- Tarun Yadav and Manoj Kumar
-
2020/912 ( PDF )
- Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber
- Zhuang Xu and Owen Pemberton and Sujoy Sinha Roy and David Oswald
-
2020/911 ( PDF )
- Lossy Correlation Intractability and PPAD Hardness from Sub-exponential LWE
- Ruta Jawale and Dakshita Khurana
-
2020/910 ( PDF )
- A Power Side-Channel Attack on the CCA2-Secure HQC KEM
- Thomas Schamberger and Julian Renner and Georg Sigl and Antonia Wachter-Zeh
-
2020/909 ( PDF )
- When is a test not a proof?
- Eleanor McMurtry and Olivier Pereira and Vanessa Teague
-
2020/908 ( PDF )
- Analysis on the MinRank Attack using Kipnis-Shamir Method Against Rainbow
- Shuhei Nakamura and Yacheng Wang and Yasuhiko Ikematsu
-
2020/907 ( PDF )
- Enhanced Flush+Reload Attack on AES
- Milad Seddigh and Hadi Soleimany
-
2020/906 ( PDF )
- Optimally-resilient Unconditionally-secure Asynchronous Multi-party Computation Revisited
- Ashish Choudhury
-
2020/905 ( PDF )
- Cryptanalysis of a Code-Based Signature Scheme Based on the Lyubashevsky Framework
- Marco Baldi and Karan Khathuria and Edoardo Persichetti and Paolo Santini
-
2020/904 ( PDF )
- A Comparison of Weight Initializers in Deep Learning-based Side-channel Analysis
- Huimin Li and Marina Krček and Guilherme Perin
-
2020/903 ( PDF )
- Optimizing Implementations of Linear Layers
- Zejun Xiang and Xiangyong Zeng and Da Lin and Zhenzhen Bao and Shasha Zhang
-
2020/902 ( PDF )
- Federated Learning in Side-Channel Analysis
- Huanyu Wang and Elena Dubrova
-
2020/901 ( PDF )
- A Not-So-Trival Replay Attack Against DH-PSI
- Hongrui Cui and Yu Yu
-
2020/900 ( PDF )
- Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
- Pierre-Louis Cayrel and Brice Colombier and Vlad-Florin Dragoi and Alexandre Menu and Lilian Bossuet
-
2020/899 ( PDF )
- On the Attack Evaluation and the Generalization Ability in Profiling Side-channel Analysis
- Lichao Wu and Léo Weissbart and Marina Krček and Huimin Li and Guilherme Perin and Lejla Batina and Stjepan Picek
-
2020/898 ( PDF )
- Rapidly Verifiable XMSS Signatures
- Joppe W. Bos and Andreas Hülsing and Joost Renes and Christine van Vredendaal
-
2020/897 ( PDF )
- Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices
- Jan Richter-Brockmann and Johannes Mono and Tim Güneysu
-
2020/896 ( PDF )
- Fault Injection as an Oscilloscope: Fault Correlation Analysis
- Albert Spruyt and Alyssa Milburn and Lukasz Chmielewski
-
2020/895 ( PDF )
- Multi-Currency Ledgers
- Joachim Zahnentferner
-
2020/894 ( PDF )
- Gossiping For Communication-Efficient Broadcast
- Georgios Tsimos and Julian Loss and Charalampos Papamanthou
-
2020/893 ( PDF )
- Toward an Asymmetric White-Box Proposal
- Lucas Barthelemy
-
2020/892 ( PDF )
- Pushing the Limits of Fault Template Attacks: The Role of Side-Channels
- Sayandeep Saha and Arnab Bag and and Debdeep Mukhopadhyay
-
2020/891 ( PDF )
- Keep it Unsupervised: Horizontal Attacks Meet Deep Learning
- Guilherme Perin and Lukasz Chmielewski and Lejla Batina and Stjepan Picek
-
2020/890 ( PDF )
- Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness
- Aein Rezaei Shahmirzadi and Amir Moradi
-
2020/889 ( PDF )
- Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption
- James Bartusek and Yuval Ishai and Aayush Jain and Fermi Ma and Amit Sahai and Mark Zhandry
-
2020/888 ( PDF )
- Machine Learning of Physical Unclonable Functions using Helper Data - Revealing a Pitfall in the Fuzzy Commitment Scheme
- Emanuele Strieder and Christoph Frisch and Michael Pehl
-
2020/887 ( PDF )
- Updatable Blockchains
- Michele Ciampi and Nikos Karayannidis and Aggelos Kiayias and Dionysis Zindros
-
2020/886 ( PDF )
- Adaptively Secure Revocable Hierarchical IBE from $k$-linear Assumption
- Keita Emura and Atsushi Takayasu and Yohei Watanabe
-
2020/885 ( PDF )
- Wendy, the Good Little Fairness Widget
- Klaus Kursawe
-
2020/884 ( PDF )
- Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model
- Linru Zhang and Xiangning Wang and Yuechen Chen and Siu-Ming Yiu
-
2020/883 ( PDF )
- On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis
- Jeroen Delvaux
-
2020/882 ( PDF )
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
- Willy Susilo and Dung Hoang Duong and Huy Quoc Le and Josef Pieprzyk
-
2020/881 ( PDF )
- Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES
- Loïc Masure and Nicolas Belleville and Eleonora Cagli and Marie-Angela Cornelie and Damien Couroussé and Cécile Dumas and Laurent Maingault
-
2020/880 ( PDF )
- Classical Reduction of Gap SVP to LWE: A Concrete Security Analysis
- Palash Sarkar and Subhadip Singha
-
2020/879 ( PDF )
- Second-Order Masked Lookup Table Compression Scheme
- Annapurna Valiveti and Srinivas Vivek
-
2020/878 ( PDF )
- Bent Boolean functions A better procedure to generate non-crypto 4-bit S-boxes
- Sankhanil De and Ranjan Ghosh
-
2020/877 ( PDF )
- Unclonable Decryption Keys
- Marios Georgiou and Mark Zhandry
-
2020/876 ( PDF )
- Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks
- Claude Carlet and Sylvain Guilley and Sihem Mesnager
-
2020/875 ( PDF )
- Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves
- Daiki Hayashida and Kenichiro Hayasaka and Tadanori Teruya
-
2020/874 ( PDF )
- New Methods and Abstractions for RSA-Based Forward Secure Signatures
- Susan Hohenberger and Brent Waters
-
2020/873 ( PDF )
- Post-Quantum Group Key Agreement Scheme
- Julia Bobrysheva and Sergey Zapechnikov
-
2020/872 ( PDF )
- Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis
- Gabriel Zaid and Lilian Bossuet and François Dassance and Amaury Habrard and Alexandre Venelli
-
2020/871 ( PDF )
- Quantum Immune One-Time Memories
- Qipeng Liu and Amit Sahai and Mark Zhandry
-
2020/870 ( PDF )
- Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN
- Yu Yu and Jiang Zhang
-
2020/869 ( PDF )
- An Algorithmic Reduction Theory for Binary Codes: LLL and more
- Thomas Debris-Alazard and Léo Ducas and Wessel P.J. van Woerden
-
2020/868 ( PDF )
- SoK: A Taxonomy of Cryptocurrency Wallets
- Kostis Karantias
-
2020/867 ( PDF )
- Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks
- Ping Wang and Ping Chen and Zhimin Luo and Gaofeng Dong and Mengce Zheng and Nenghai Yu and Honggang Hu
-
2020/866 ( PDF )
- Building a Modern TRNG: An Entropy Source Interface for RISC-V
- Markku-Juhani O. Saarinen and G. Richard Newell and Ben Marshall
-
2020/865 ( PDF )
- Agora: A Privacy-Aware Data Marketplace
- Vlasis Koutsos and Dimitrios Papadopoulos and Dimitris Chatzopoulos and Sasu Tarkoma and Pan Hui
-
2020/864 ( PDF )
- Linear Complexity Private Set Intersection for Secure Two-Party Protocols
- Ferhat Karakoç and Alptekin Küpçü
-
2020/863 ( PDF )
- Privacy-Preserving Automated Exposure Notification
- Ran Canetti and Yael Tauman Kalai and Anna Lysyanskaya and Ronald L. Rivest and Adi Shamir and Emily Shen and Ari Trachtenberg and Mayank Varia and Daniel J. Weitzner
-
2020/862 ( PDF )
- Protecting Cryptography Against Compelled Self-Incrimination
- Sarah Scheffler and Mayank Varia
-
2020/861 ( PDF )
- Faster Homomorphic Encryption over GPGPUs via hierarchical DGT
- Pedro Geraldo M. R. Alves and Jheyne N. Ortiz and Diego F. Aranha
-
2020/860 ( PDF )
- SNARGs for Bounded Depth Computations from Sub-Exponential LWE
- Yael Tauman Kalai and Rachel Zhang
-
2020/859 ( PDF )
- A Classification of Computational Assumptions in the Algebraic Group Model
- Balthazar Bauer and Georg Fuchsbauer and Julian Loss
-
2020/858 ( PDF )
- Client-oblivious OPRAM
- Gareth T. Davies and Christian Janson and Daniel P. Martin
-
2020/857 ( PDF )
- Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party
- Ivan Oleynikov and Elena Pagnin and Andrei Sabelfeld
-
2020/856 ( PDF )
- Improving Revocation for Group Signature with Redactable Signature
- Olivier Sanders
-
2020/855 ( PDF )
- Fooling primality tests on smartcards
- Vladimir Sedlacek and Jan Jancar and Petr Svenda
-
2020/854 ( PDF )
- Designing Reverse Firewalls for the Real World
- Angèle Bossuat and Xavier Bultel and Pierre-Alain Fouque and Cristina Onete and Thyla van der Merwe
-
2020/853 ( PDF )
- Linear-Complexity Private Function Evaluation is Practical
- Marco Holz and Ágnes Kiss and Deevashwer Rathee and Thomas Schneider
-
2020/852 ( PDF )
- FROST: Flexible Round-Optimized Schnorr Threshold Signatures
- Chelsea Komlo and Ian Goldberg
-
2020/851 ( PDF )
- Asynchronous Byzantine Agreement with Subquadratic Communication
- Erica Blum and Jonathan Katz and Chen-Da Liu-Zhang and Julian Loss
-
2020/850 ( PDF )
- On the Guaranteed Number of Activations in XS-circuits
- Sergey Agievich
-
2020/849 ( PDF )
- Surveying global verifiability
- Ben Smyth
-
2020/848 ( PDF )
- On Composability of Game-based Password Authenticated Key Exchange
- Marjan Škrobot and Jean Lancrenon
-
2020/847 ( PDF )
- Encrypt-to-self: Securely Outsourcing Storage
- Jeroen Pijnenburg and Bertram Poettering
-
2020/846 ( PDF )
- Deep Learning based Differential Distinguisher for Lightweight Cipher PRESENT
- Aayush Jain and Varun Kohli and Girish Mishra
-
2020/845 ( PDF )
- Post-Quantum Adaptor Signatures and Payment Channel Networks
- Muhammed F. Esgin and Oguzhan Ersoy and Zekeriya Erkin
-
2020/844 ( PDF )
- Generic Superlight Client for Permissionless Blockchains
- Yuan Lu and Qiang Tang and Guiling Wang
-
2020/843 ( PDF )
- Dragoon: Private Decentralized HITs Made Practical
- Yuan Lu and Qiang Tang and Guiling Wang
-
2020/842 ( PDF )
- Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited
- Yuan Lu and Zhenliang Lu and Qiang Tang and Guiling Wang
-
2020/841 ( PDF )
- Dumbo: Faster Asynchronous BFT Protocols
- Bingyong Guo and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang
-
2020/840 ( PDF )
- Proof of Storage-Time: Efficiently Checking Continuous Data Availability
- Giuseppe Ateniese and Long Chen and Mohammad Etemad and Qiang Tang
-
2020/839 ( PDF )
- Cryptanalysis of a ``Strengthened'' Key Exchange Protocol for IoT, or When SAKE$^+$ Turns Out to Be SAKE$^-$
- Loïc Ferreira
-
2020/838 ( PDF )
- PudgyTurtle: variable-length, keystream-dependent encoding to resist time-memory tradeoff attacks
- David A August and Anne C Smith
-
2020/837 ( PDF )
- An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes
- Daniel Kales and Greg Zaverucha
-
2020/836 ( PDF )
- Assembly or Optimized C for Lightweight Cryptography on RISC-V?
- Fabio Campos and Lars Jellema and Mauk Lemmen and Lars Müller and Daan Sprenkels and Benoit Viguier
-
2020/835 ( PDF )
- On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function
- Congwei Zhou and Bin Hu and Jie Guan
-
2020/834 ( PDF )
- Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison
- Eunsang Lee and Joon-Woo Lee and Jong-Seon No and Young-Sik Kim
-
2020/833 ( PDF )
- Secure Update of FPGA-based Secure Elements using Partial Reconfiguration
- Florian Unterstein and Tolga Sel and Thomas Zeschg and Nisha Jacob and Michael Tempelmeier and Michael Pehl and Fabrizio De Santis
-
2020/832 ( PDF )
- Round-optimal Black-box Commit-and-prove with Succinct Communication
- Susumu Kiyoshima
-
2020/831 ( PDF )
- On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs
- Michele Ciampi and Roberto Parisella and Daniele Venturi
-
2020/830 ( PDF )
- Terakey - An Encryption Method Whose Security Can Be Analyzed from First Principles
- Arnold G. Reinhold
-
2020/829 ( PDF )
- Refined Analysis of the Asymptotic Complexity of the Number Field Sieve
- Aude Le Gluher and Pierre-Jean Spaenlehauer and Emmanuel Thomé
-
2020/828 ( -- withdrawn -- )
- Modified Secure Hashing algorithm(MSHA-512)
- Ashoka SB and Lakshmikanth D
-
2020/827 ( PDF )
- Encrypted Blockchain Databases
- Daniel Adkins and Archita Agarwal and Seny Kamara and Tarik Moataz
-
2020/826 ( PDF )
- A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes
- Xuan Thanh Do and Duong Hieu Phan and Moti Yung
-
2020/825 ( -- withdrawn -- )
- Private Set Intersection from TFHE for Cloud Computing Scenarios
- Jiayu Qiang and Yi Deng
-
2020/824 ( PDF )
- Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC
- Fynn Dallmeier and Jan P. Drees and Kai Gellert and Tobias Handirk and Tibor Jager and Jonas Klauke and Simon Nachtigall and Timo Renzelmann and Rudi Wolf
-
2020/823 ( PDF )
- The Provable Security of Ed25519: Theory and Practice
- Jacqueline Brendel and Cas Cremers and Dennis Jackson and Mang Zhao
-
2020/822 ( PDF )
- Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries
- Kwangsu Lee
-
2020/821 ( PDF )
- Interconnect-Aware Bitstream Modification
- Michail Moraitis and Elena Dubrova
-
2020/820 ( PDF )
- On the security of the Rescue hash function
- Tim Beyne and Anne Canteaut and Gregor Leander and María Naya-Plasencia and Léo Perrin and Friedrich Wiemer
-
2020/819 ( PDF )
- UC-Secure OT from LWE, Revisited
- Willy Quach
-
2020/818 ( PDF )
- Security Limitations of Classical-Client Delegated Quantum Computing
- Christian Badertscher and Alexandru Cojocaru and Léo Colisson and Elham Kashefi and Dominik Leichtle and Atul Mantri and Petros Wallden
-
2020/817 ( PDF )
- Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation
- Osman Biçer and Alptekin Küpçü
-
2020/816 ( PDF )
- Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
- Luka Music and Céline Chevalier and Elham Kashefi
-
2020/815 ( PDF )
- Cryptographic Divergences: New Techniques and New Applications
- Marc Abboud and Thomas Prest
-
2020/814 ( PDF )
- Incompressible Encodings
- Tal Moran and Daniel Wichs
-
2020/813 ( PDF )
- Strengthening Sequential Side-Channel Attacks Through Change Detection
- Luca Frittoli and Matteo Bocchi and Silvia Mella and Diego Carrera and Beatrice Rossi and Pasqualina Fragneto and Ruggero Susella and Giacomo Boracchi
-
2020/812 ( PDF )
- Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions
- Lior Rotem and Gil Segev
-
2020/811 ( PDF )
- Another Look at Extraction and Randomization of Groth's zk-SNARK
- Karim Baghery and Markulf Kohlweiss and Janno Siim and Mikhail Volkhov
-
2020/810 ( PDF )
- A Few Explanations for <Fast-to-Finalize Nakamoto-Like Consensus>
- Shuyang Tang
-
2020/809 ( PDF )
- On (expected polynomial) runtime in cryptography
- Michael Klooß
-
2020/808 ( PDF )
- Security Analysis of Olvid's SAS-based Trust Establishment Protocol
- Michel Abdalla
-
2020/807 ( PDF )
- Secure merge with $O(n \log \log n)$ secure operation
- Brett Hemenway Falk and Rafail Ostrovsky
-
2020/806 ( PDF )
- Toward Comparable Homomorphic Encryption for Crowd-sensing Network
- Daxin Huang and Qingqing Gan and Xiaoming Wang and Chengpeng Huang and Yijian Lin
-
2020/805 ( PDF )
- Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud
- Furkan Turan and Ingrid Verbauwhede
-
2020/804 ( PDF )
- Lightweight Ciphers on a 65 nm ASIC - A Comparative Study on Energy Consumption
- Bastian Richter and Amir Moradi
-
2020/803 ( PDF )
- Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA
- Weiqiong Cao and Hongsong Shi and Hua Chen and Jiazhe Chen and Limin Fan and Wenling Wu
-
2020/802 ( PDF )
- Quantum Attacks on HCTR and its Variants
- Mostafizar Rahman and Goutam Paul
-
2020/801 ( PDF )
- Not enough LESS: An improved algorithm for solving Code Equivalence Problems over $\mathbb{F}_q$
- Ward Beullens
-
2020/800 ( PDF )
- Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements
- Mihir Bellare and Wei Dai and Phillip Rogaway
-
2020/799 ( PDF )
- Secure Generalized Deduplication via Multi-Key Revealing Encryption
- Daniel E. Lucani and Lars Nielsen and Claudio Orlandi and Elena Pagnin and Rasmus Vestergaard
-
2020/798 ( PDF )
- Superposition Attack on OT Protocols
- Ehsan Ebrahimi and Céline Chevalier and Marc Kaplan and Michele Minelli
-
2020/797 ( PDF )
- Fast, Small, and Area-Time Efficient Architectures for Key-Exchange on Curve25519
- Mojtaba Bisheh Niasar and Rami El Khatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
-
2020/796 ( PDF )
- A Generalization of Paillier's Public-Key System With Fast Decryption
- Ying Guo and Zhenfu Cao and Xiaolei Dong
-
2020/795 ( PDF )
- Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches
- Viet Ba Dang and Farnoud Farahmand and Michal Andrzejczak and Kamyar Mohajerani and Duc Tri Nguyen and Kris Gaj
-
2020/794 ( PDF )
- Symbolic and Computational Reasoning About Cryptographic Modes of Operation
- Catherine Meadows
-
2020/793 ( PDF )
- PHyCT : Privacy preserving Hybrid Contact Tracing
- Mahabir Prasad Jhanwar and Sumanta Sarkar
-
2020/792 ( PDF )
- Trace-$\Sigma$: a privacy-preserving contact tracing app
- Jean-François Biasse and Sriram Chellappan and Sherzod Kariev and Noyem Khan and Lynette Menezes and Efe Seyitoglu and Charurut Somboonwit and Attila Yavuz
-
2020/791 ( PDF )
- Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies
- Chaya Ganesh and Claudio Orlandi and Daniel Tschudi and Aviv Zohar
-
2020/790 ( PDF )
- Anonymity and Rewards in Peer Rating Systems
- Lydia Garms and Siaw-Lynn Ng and Elizabeth A. Quaglia and Giulia Traverso
-
2020/789 ( PDF )
- Double-Authentication-Preventing Signatures in the Standard Model
- Dario Catalano and Georg Fuchsbauer and Azam Soleimanian
-
2020/788 ( PDF )
- Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model
- Michel Abdalla and Florian Bourse and Hugo Marival and David Pointcheval and Azam Soleimanian and Hendrik Waldner
-
2020/787 ( PDF )
- A Note on Separating Classical and Quantum Random Oracles
- Takashi Yamakawa and Mark Zhandry
-
2020/786 ( PDF )
- Random Probing Security: Verification, Composition, Expansion and New Constructions
- Sonia Belaïd and Jean-Sébastien Coron and Emmanuel Prouff and Matthieu Rivain and Abdul Rahman Taleb
-
2020/785 ( PDF )
- The Memory-Tightness of Authenticated Encryption
- Ashrujit Ghoshal and Joseph Jaeger and Stefano Tessaro
-
2020/784 ( PDF )
- CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time
- Carsten Baum and Bernardo David and Rafael Dowsley and Jesper Buus Nielsen and Sabine Oechsner
-
2020/783 ( PDF )
- Adventures in Crypto Dark Matter: Attacks, Fixes for Weak Pseudorandom Function Candidates
- Jung Hee Cheon and Wonhee Cho and Jeong Han Kim and Jiseung Kim
-
2020/782 ( PDF )
- A Love Affair Between Bias Amplifiers and Broken Noise Sources
- George Teseleanu
-
2020/781 ( PDF )
- Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff
- Haibo Zhou and Rui Zong and Xiaoyang Dong and Keting Jia and Willi Meier
-
2020/780 ( PDF )
- The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10
- Daniel De Almeida Braga and Pierre-Alain Fouque and Mohamed Sabt
-
2020/779 ( PDF )
- Non-Malleable Time-Lock Puzzles and Applications
- Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass
-
2020/778 ( PDF )
- SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT
- Seyed Farhad Aghili and Amirhossein Adavoudi Jolfaei and Aysajan Abidin
-
2020/777 ( PDF )
- Dynamic Universal Accumulator with Batch Update over Bilinear Groups
- Giuseppe Vitto and Alex Biryukov
-
2020/776 ( PDF )
- Non-Malleable Codes for Bounded Polynomial Depth Tampering
- Dana Dachman-Soled and Ilan Komargodski and Rafael Pass
-
2020/775 ( PDF )
- Improved Differential-Linear Attacks with Applications to ARX Ciphers
- Christof Beierle and Gregor Leander and Yosuke Todo
-
2020/774 ( PDF )
- Timelocked Bribing
- Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer
-
2020/773 ( PDF )
- An Instruction Set Extension to Support Software-Based Masking
- Si Gao and Johann Großschädl and Ben Marshall and Dan Page and Thinh Pham and Francesco Regazzoni
-
2020/772 ( PDF )
- Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs
- Alex Lombardi and Vinod Vaikuntanathan
-
2020/771 ( PDF )
- Leakage-Resilient Key Exchange and Two-Seed Extractors
- Xin Li and Fermi Ma and Willy Quach and Daniel Wichs
-
2020/770 ( PDF )
- Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions
- Akshima and David Cash and Andrew Drucker and Hoeteck Wee
-
2020/769 ( PDF )
- Lattice-Based Blind Signatures, Revisited
- Eduard Hauck and Eike Kiltz and Julian Loss and Ngoc Khanh Nguyen
-
2020/768 ( PDF )
- Perfect Zero Knowledge: New Upperbounds and Relativized Separations
- Peter Dixon and Sutanu Gayen and A. Pavan and N. V. Vinodchandran
-
2020/767 ( PDF )
- Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability
- Carsten Baum and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez
-
2020/766 ( PDF )
- The uncertainty of Side-Channel Analysis: A way to leverage from heuristics
- Unai Rioja and Servio Paguada and Lejla Batina and Igor Armendariz
-
2020/765 ( PDF )
- Handling Adaptive Compromise for Practical Encryption Schemes
- Joseph Jaeger and Nirvan Tyagi
-
2020/764 ( PDF )
- Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification
- Romain Gay and Aayush Jain and Huijia Lin and Amit Sahai
-
2020/763 ( PDF )
- Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol
- Jia Xu and Yiwen Gao and Hoonwei Lim
-
2020/762 ( PDF )
- Functional Encryption for Attribute-Weighted Sums from $k$-Lin
- Michel Abdalla and Junqing Gong and Hoeteck Wee
-
2020/761 ( PDF )
- Decentralized reputation
- Tassos Dimitriou
-
2020/760 ( PDF )
- Curves with fast computations in the first pairing group
- Rémi Clarisse and Sylvain Duquesne and Olivier Sanders
-
2020/759 ( PDF )
- Chosen Ciphertext Security from Injective Trapdoor Functions
- Susan Hohenberger and Venkata Koppula and Brent Waters
-
2020/758 ( PDF )
- Verifiable state machines: Proofs that untrusted services operate correctly
- Srinath Setty and Sebastian Angel and Jonathan Lee
-
2020/757 ( PDF )
- Understanding Methodology for Efficient CNN Architectures in Profiling Attacks
- Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli
-
2020/756 ( PDF )
- Provable Security Analysis of FIDO2
- Manuel Barbosa and Alexandra Boldyreva and Shan Chen and Bogdan Warinschi
-
2020/755 ( PDF )
- Time-release Cryptography from Minimal Circuit Assumptions
- Samuel Jaques and Hart Montgomery and Arnab Roy
-
2020/754 ( PDF )
- Fluid MPC: Secure Multiparty Computation with Dynamic Participants
- Arka Rai Choudhuri and Aarushi Goel and Matthew Green and Abhishek Jain and Gabriel Kaptchuk
-
2020/753 ( PDF )
- Compressing Proofs of $k$-Out-Of-$n$ Partial Knowledge
- Thomas Attema and Ronald Cramer and Serge Fehr
-
2020/752 ( PDF )
- Continuous Group Key Agreement with Active Security
- Joël Alwen and Sandro Coretti and Daniel Jost and Marta Mularczyk
-
2020/751 ( PDF )
- DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
- Nils Albartus and Max Hoffmann and Sebastian Temme and Leonid Azriel and Christof Paar
-
2020/750 ( PDF )
- Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging
- Max Hoffmann and Christof Paar
-
2020/749 ( PDF )
- Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al.
- Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang
-
2020/748 ( PDF )
- Anonymous probabilistic payment in payment hub
- Tatsuo Mitani and Akira Otsuka
-
2020/747 ( PDF )
- Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups
- Karim Eldefrawy and Seoyeon Hwang and Rafail Ostrovsky and Moti Yung
-
2020/746 ( PDF )
- Comparison of RISC-V and transport triggered architectures for a post-quantum cryptography application
- Latif AKÇAY and Berna ÖRS
-
2020/745 ( PDF )
- True Random Number Generation Based on DNA molecule Genetic Information (DNA-TRNG)
- Siddaramappa V and Ramesh K B
-
2020/744 ( PDF )
- New results on Gimli: full-permutation distinguishers and improved collisions
- Antonio Flórez Gutiérrez and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and André Schrottenloher and Ferdinand Sibleyras
-
2020/743 ( PDF )
- A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
- Qian Guo and Thomas Johansson and Alexander Nilsson
-
2020/742 ( PDF )
- Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures
- Jan Richter-Brockmann and Tim Güneysu
-
2020/741 ( PDF )
- Fast Privacy-Preserving Punch Cards
- Saba Eskandarian
-
2020/740 ( PDF )
- Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback
- Erica Blum and Chen-Da Liu-Zhang and Julian Loss
-
2020/739 ( PDF )
- Generic Constructions of Incremental and Homomorphic Timed-Release Encryption
- Peter Chvojka and Tibor Jager and Daniel Slamanig and Christoph Striecks
-
2020/738 ( PDF )
- GIFT-COFB
- Subhadeep Banik and Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi and Thomas Peyrin and Yu Sasaki and Siang Meng Sim and Yosuke Todo
-
2020/737 ( PDF )
- A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge
- Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
-
2020/736 ( PDF )
- Forward-Security Under Continual Leakage with Deterministic Key Updates
- Suvradip Chakraborty and Harish Karthikeyan and Adam O'Neill and C. Pandu Rangan
-
2020/735 ( PDF )
- Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger
- Heewon Chung and Kyoohyung Han and Chanyang Ju and Myungsun Kim and Jae Hong Seo
-
2020/734 ( PDF )
- Mirror Theory: A simple proof of the Pi+Pj Theorem with xi_max=2
- Benoît Cogliati and Jacques Patarin
-
2020/733 ( PDF )
- A Side-Channel Resistant Implementation of SABER
- Michiel Van Beirendonck and Jan-Pieter D'Anvers and Angshuman Karmakar and Josep Balasch and Ingrid Verbauwhede
-
2020/732 ( PDF )
- Security of Multi-Adjustable Join Schemes: Separations and Implications
- Mojtaba Rafiee and Shahram Khazaei
-
2020/731 ( PDF )
- The Exact Security of PMAC with Three Powering-Up Masks
- Yusuke Naito
-
2020/730 ( PDF )
- On the Security of Time-Lock Puzzles and Timed Commitments
- Jonathan Katz and Julian Loss and Jiayu Xu
-
2020/729 ( PDF )
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF
- Melissa Chase and Peihan Miao
-
2020/728 ( PDF )
- Minerva: The curse of ECDSA nonces
- Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys
-
2020/727 ( PDF )
- An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers
- Adrian Ranea and Yunwen Liu and Tomer Ashur
-
2020/726 ( PDF )
- On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments
- Denis Diemert and Tibor Jager
-
2020/725 ( PDF )
- Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model
- Gianluca Brian and Antonio Faonio and Maciej Obremski and Mark Simkin and Daniele Venturi
-
2020/724 ( PDF )
- Multi-Party Revocation in Sovrin: Performance through Distributed Trust
- Lukas Helminger and Daniel Kales and Sebastian Ramacher and Roman Walch
-
2020/723 ( PDF )
- On the Confidentiality of Amounts in Grin
- Suyash Bagad and Saravanan Vijayakumaran
-
2020/722 ( PDF )
- NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
- Yehuda Afek and Anat Bremler-Barr and Lior Shafir
-
2020/721 ( PDF )
- MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
- Fabian Boemer and Rosario Cammarota and Daniel Demmler and Thomas Schneider and Hossein Yalame
-
2020/720 ( PDF )
- Fast algebraic immunity of Boolean functions and LCD codes
- Sihem Mesnager and Chunming Tang
-
2020/719 ( PDF )
- Hypercube and Cascading-based Algorithms for Secret Sharing Schemes
- Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai
-
2020/718 ( PDF )
- Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
- Marc Fischlin and Felix Günther and Christian Janson
-
2020/717 ( PDF )
- Fault Location Identification By Machine Learning
- Anubhab Baksi and Santanu Sarkar and Akhilesh Siddhanti and Ravi Anand and Anupam Chattopadhyay
-
2020/716 ( PDF )
- Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function
- Takeshi Sugawara and Tatsuya Onuma and Yang Li
-
2020/715 ( PDF )
- On (impracticality of) transfinite symmetric encryption with keys smaller than messages under GCH
- Sergij V. Goncharov
-
2020/714 ( PDF )
- One-One Constrained Pseudorandom Functions
- Naty Peter and Rotem Tsabary and Hoeteck Wee
-
2020/713 ( PDF )
- A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism
- Yi-Fan Tseng and Zi-Yuan Liu and Raylin Tso
-
2020/712 ( PDF )
- Anonymous IBE From Quadratic Residuosity With Fast Encryption
- Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jinwen Zheng
-
2020/711 ( PDF )
- Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation
- Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
-
2020/710 ( PDF )
- Rational Behavior in Committee-Based Blockchains
- Yackolley Amoussou-Guenou and Bruno Biais and Maria Potop-Butucaru and Sara Tucci-Piergiovanni
-
2020/709 ( PDF )
- Reputable List Curation from Decentralized Voting
- Elizabeth C. Crites and Mary Maller and Sarah Meiklejohn and Rebekah Mercer
-
2020/708 ( PDF )
- Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations
- Ben Nassi and Yaron Pirutin and Adi Shamir and Yuval Elovici and Boris Zadov
-
2020/707 ( PDF )
- Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k))
- Martin R. Albrecht and Shi Bai and Pierre-Alain Fouque and Paul Kirchner and Damien Stehlé and Weiqiang Wen
-
2020/706 ( PDF )
- A Logic Synthesis Toolbox for Reducing the Multiplicative Complexity in Logic Networks
- Eleonora Testa and Mathias Soeken and Heinz Riener and Luca Amaru and Giovanni De Micheli
-
2020/705 ( PDF )
- On the minimal value set size of APN functions
- Ingo Czerwinski
-
2020/704 ( PDF )
- Secure Single-Server Aggregation with (Poly)Logarithmic Overhead
- James Bell and K. A. Bonawitz and Adrià Gascón and Tancrède Lepoint and Mariana Raykova
-
2020/703 ( PDF )
- New Complexity Estimation on the Rainbow-Band-Separation Attack
- Shuhei Nakamura and Yasuhiko Ikematsu and Yacheng Wang and Jintai Ding and Tsuyoshi Takagi
-
2020/702 ( PDF )
- Rainbow Band Separation is Better than we Thought
- Ray Perlner and Daniel Smith-Tone
-
2020/701 ( PDF )
- MPC with Friends and Foes
- Bar Alon and Eran Omri and Anat Paskin-Cherniavsky
-
2020/700 ( PDF )
- Personal data exchange protocol: X
- Vladimir Belsky and Ilia Gerasimov and Kirill Tsaregorodtsev and Ivan Chizhov
-
2020/699 ( PDF )
- Looking at the NIST Lightweight Candidates from a Masking Point-of-View
- Lauren De Meyer
-
2020/698 ( -- withdrawn -- )
- Forgery attack on the authentication encryption GIFT-COFB
- Zhe CEN and Xiutao FENG and Zhangyi Wang and Chunping CAO
-
2020/697 ( PDF )
- Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
- F. Boudot and P. Gaudry and A. Guillevic and N. Heninger and E. Thomé and P. Zimmermann
-
2020/696 ( PDF )
- An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials
- Yin Li and Yu Zhang
-
2020/695 ( PDF )
- Collusion Resistant Watermarkable PRFs from Standard Assumptions
- Rupeng Yang and Man Ho Au and Zuoxia Yu and Qiuliang Xu
-
2020/694 ( PDF )
- The nearest-colattice algorithm
- Thomas Espitau and Paul Kirchner
-
2020/693 ( PDF )
- Tight Quantum Time-Space Tradeoffs for Function Inversion
- Kai-Min Chung and Siyao Guo and Qipeng Liu and Luowen Qian
-
2020/692 ( PDF )
- Optimizing Inner Product Masking Scheme by A Coding Theory Approach
- Wei Cheng and Sylvain Guilley and Claude Carlet and Sihem Mesnager and Jean-Luc Danger
-
2020/691 ( PDF )
- Improved Threshold Signatures, Proactive Secret Sharing and Input Certification from LSS Homomorphisms
- Diego Aranha and Anders Dalskov and Daniel Escudero and Claudio Orlandi
-
2020/690 ( PDF )
- SAFE: A Secure and Efficient Long-Term Distributed Storage System
- Johannes Buchmann and Ghada Dessouky and Tommaso Frassetto and Ágnes Kiss and Ahmad-Reza Sadeghi and Thomas Schneider and Giulia Traverso and Shaza Zeitouni
-
2020/689 ( PDF )
- Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64
- Orr Dunkelman and Senyang Huang and Eran Lambooij and Stav Perle
-
2020/688 ( PDF )
- Lin2-Xor Lemma and Log-size Linkable Ring Signature
- Anton A. Sokolov
-
2020/687 ( PDF )
- Lower Bounds on the Time/Memory Tradeoff of Function Inversion
- Dror Chawin and Iftach Haitner and Noam Mazor
-
2020/686 ( PDF )
- A Level Dependent Authentication for IoT Paradigm
- Chintan Patel and Nishant Doshi
-
2020/685 ( PDF )
- Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors
- Leo de Castro and Chiraag Juvekar and Vinod Vaikuntanathan
-
2020/684 ( PDF )
- How to (legally) keep secrets from mobile operators
- Ghada Arfaoui and Olivier Blazy and Xavier Bultel and Pierre-Alain Fouque and Thibaut Jacques and Adina Nedelcu and Cristina Onete
-
2020/683 ( PDF )
- Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model
- Abida Haque and Stephan Krenn and Daniel Slamanig and Christoph Striecks
-
2020/682 ( PDF )
- Succinct Diophantine-Satisfiability Arguments
- Patrick Towa and Damien Vergnaud
-
2020/681 ( PDF )
- An F-algebra for analysing information leaks in the presence of glitches
- Vittorio Zaccaria
-
2020/680 ( PDF )
- On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition
- Sumanta Sarkar and Yu Sasaki and Siang Meng Sim
-
2020/679 ( PDF )
- BETA: Biometric Enabled Threshold Authentication
- Shashank Agrawal and Saikrishna Badrinarayanan and Payman Mohassel and Pratyay Mukherjee and Sikhar Patranabis
-
2020/678 ( PDF )
- Stronger Notions and a More Efficient Construction of Threshold Ring Signatures
- Alexander Munch-Hansen and Claudio Orlandi and Sophia Yakoubov
-
2020/677 ( PDF )
- Blockchain with Varying Number of Players
- T-H. Hubert Chan and Naomi Ephraim and Antonio Marcedone and Andrew Morgan and Rafael Pass and Elaine Shi
-
2020/676 ( PDF )
- An airdrop that preserves recipient privacy
- Riad S. Wahby and Dan Boneh and Christopher Jeffrey and Joseph Poon
-
2020/675 ( PDF )
- Ledger Combiners for Fast Settlement
- Matthias Fitzi and Peter Gazi and Aggelos Kiayias and Alexander Russell
-
2020/674 ( PDF )
- Coercion-Resistant Blockchain-Based E-Voting Protocol
- Chiara Spadafora and Riccardo Longo and Massimiliano Sala
-
2020/673 ( PDF )
- LotMint: Blockchain Returning to Decentralization with Decentralized Clock
- Wenbo MAO and Wenxiang WANG
-
2020/672 ( PDF )
- A Survey of Automatic Contact Tracing Approaches Using Bluetooth Low Energy
- Leonie Reichert and Samuel Brack and Björn Scheuermann
-
2020/671 ( PDF )
- Persistent Fault Analysis With Few Encryptions
- Sebastien Carre and Sylvain Guilley and Olivier Rioul
-
2020/670 ( PDF )
- Inverse-Sybil Attacks in Automated Contact Tracing
- Benedikt Auerbach and Suvradip Chakraborty and Karen Klein and Guillermo Pascual-Perez and Krzysztof Pietrzak and Michael Walter and Michelle Yeo
-
2020/669 ( PDF )
- Proof of Mirror Theory for $\xi_{\max}=2$
- Avijit Dutta and Mridul Nandi and Abishanka Saha
-
2020/668 ( PDF )
- On Subversion-Resistant SNARKs
- Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michał Zając
-
2020/667 ( PDF )
- New Results on the SymSum Distinguisher on Round-Reduced SHA3
- Sahiba Suryawanshi and Dhiman Saha and Satyam Sachan
-
2020/666 ( PDF )
- Revisiting the Hardness of Binary Error LWE
- Chao Sun, Mehdi Tibouchi and Masayuki Abe
-
2020/665 ( PDF )
- Montgomery-friendly primes and applications to cryptography
- Jean Claude Bajard and Sylvain Duquesne
-
2020/664 ( PDF )
- The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs
- Amos Beimel and Oriol Farràs
-
2020/663 ( PDF )
- Super-Linear Time-Memory Trade-Offs for Symmetric Encryption
- Wei Dai and Stefano Tessaro and Xihu Zhang
-
2020/662 ( PDF )
- Multi-Party Computation Mechanism for Anonymous Equity Block Trading: A Secure Implementation of Turquoise Plato Uncross
- John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui
-
2020/661 ( PDF )
- Tight Consistency Bounds for Bitcoin
- Peter Gaži and Aggelos Kiayias and Alexander Russell
-
2020/660 ( PDF )
- Faster Software Implementation of the SIKE Protocol Based on A New Data Representation
- Jing Tian and Piaoyang Wang and Zhe Liu and Jun Lin and Zhongfeng Wang and Johann Großschädl
-
2020/659 ( PDF )
- Software Evaluation of Grain-128AEAD for Embedded Platforms
- Alexander Maximov and Martin Hell
-
2020/658 ( PDF )
- Time-Specific Signatures
- Masahito Ishizaka and Shinsaku Kiyomoto
-
2020/657 ( PDF )
- Traceable Constant-Size Multi-Authority Credentials
- Chloé Hébant and David Pointcheval
-
2020/656 ( PDF )
- On Length Independent Security Bounds for the PMAC Family
- Bishwajit Chakraborty and Soumya Chattopadhyay and Ashwin Jha and Mridul Nandi
-
2020/655 ( PDF )
- Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel
- Yoo-Seung Won and Dirmanto Jap and Shivam Bhasin
-
2020/654 ( PDF )
- Proximity Gaps for Reed-Solomon Codes
- Eli Ben-Sasson and Dan Carmon and Yuval Ishai and Swastik Kopparty and Shubhangi Saraf
-
2020/653 ( PDF )
- MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation
- Zhen Hang Jiang and Yunsi Fei and Aidong Adam Ding and Thomas Wahl
-
2020/652 ( PDF )
- Somewhere Statistically Binding Commitment Schemes with Applications
- Prastudy Fauzi and Helger Lipmaa and Zaira Pindado and Janno Siim
-
2020/651 ( PDF )
- Cryptanalysis of ``FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things''
- Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso
-
2020/650 ( PDF )
- End-to-End Verifiable E-Voting Trial for Polling Station Voting
- Feng Hao and Shen Wang and Samiran Bag and Rob Procter and Siamak Shahandashti and Maryam Mehrnezhad and Ehsan Toreini and Roberto Metere and Lana Liu
-
2020/649 ( PDF )
- NIZK from SNARG
- Fuyuki Kitagawa and Takahiro Matsuda and Takashi Yamakawa
-
2020/648 ( PDF )
- Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust
- Yuncong Hu and Sam Kumar and Raluca Ada Popa
-
2020/647 ( PDF )
- A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes
- Saeid Esmaeilzade and Ziba Eslami and Nasrollah Pakniat
-
2020/646 ( PDF )
- Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices
- Ward Beullens and Shuichi Katsumata and Federico Pintore
-
2020/645 ( PDF )
- Correlation distribution analysis of a two-round key-alternating block cipher
- Liliya Kraleva and Nikolai L. Manev and Vincent Rijmen
-
2020/644 ( PDF )
- ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing
- Ignacio Cascudo and Bernardo David
-
2020/643 ( PDF )
- About Blockchain Interoperability
- Pascal Lafourcade and Marius Lombard-Platet
-
2020/642 ( PDF )
- The Ritva Blockchain: Enabling Confidential Transactions at Scale
- Henri Aare and Peter Vitols
-
2020/641 ( PDF )
- Overview of Polkadot and its Design Considerations
- Jeff Burdges and Alfonso Cevallos and Peter Czaban and Rob Habermeier and Syed Hosseini and Fabio Lama and Handan Kilinc Alper and Ximin Luo and Fatemeh Shirazi and Alistair Stewart and Gavin Wood
-
2020/640 ( PDF )
- Grover on SPECK: Quantum Resource Estimates
- Kyungbae Jang and Seungjoo Choi and Hyeokdong Kwon and Hwajeong Seo
-
2020/639 ( PDF )
- Constructions for Quantum Indistinguishability Obfuscation
- Anne Broadbent and Raza Ali Kazmi
-
2020/638 ( PDF )
- Delay Encryption
- Jeffrey Burdges and Luca De Feo
-
2020/637 ( PDF )
- DABANGG: Time for Fearless Flush based Cache Attacks
- Anish Saxena and Biswabandan Panda
-
2020/636 ( PDF )
- Mixed-Technique Multi-Party Computations Composed of Two-Party Computations
- Erik-Oliver Blass and Florian Kerschbaum
-
2020/635 ( PDF )
- Two-Round Oblivious Linear Evaluation from Learning with Errors
- Pedro Branco and Nico Döttling and Paulo Mateus
-
2020/634 ( PDF )
- SILVER - Statistical Independence and Leakage Verification
- David Knichel and Pascal Sasdrich and Amir Moradi
-
2020/633 ( PDF )
- Improved torsion point attacks on SIDH variants
- Victoria de Quehen and Péter Kutas and Chris Leonardi and Chloe Martindale and Lorenz Panny and Christophe Petit and Katherine E. Stange
-
2020/632 ( PDF )
- Proposing an MILP-based Method for the Experimental Verification of Difference Trails
- Sadegh Sadeghi and Vincent Rijmen and Nasour Bagheri
-
2020/631 ( PDF )
- Simultaneous Diagonalization of Incomplete Matrices and Applications
- Jean-Sébastien Coron and Luca Notarnicola and Gabor Wiese
-
2020/630 ( PDF )
- ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy
- Zhiguo Wan and Xiaotong Liu
-
2020/629 ( PDF )
- Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer
- Vivek Arte and Mihir Bellare
-
2020/628 ( PDF )
- A post-quantum key exchange protocol from the intersection of quadric surfaces
- Daniele Di Tullio and Manoj Gyawali
-
2020/627 ( PDF )
- Attacking Zcash For Fun And Profit
- Duke Leto and The Hush Developers
-
2020/626 ( PDF )
- Game theoretical framework for analyzing Blockchains Robustness
- Paolo Zappalà and Marianna Belotti and Maria Potop-Butucaru and Stefano Secci
-
2020/625 ( PDF )
- Probability theory and public-key cryptography
- Mariya Bessonov and Dima Grigoriev and Vladimir Shpilrain
-
2020/624 ( PDF )
- RSA for poor men: a cryptosystem based on probable primes to base 2 numbers
- Marek Wójtowicz
-
2020/623 ( PDF )
- PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
- Jason H. M. Ying and Shuwei Cao and Geong Sen Poh and Jia Xu and Hoon Wei Lim
-
2020/622 ( PDF )
- The Direction of Updatable Encryption does not Matter Much
- Yao Jiang
-
2020/621 ( PDF )
- How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
- Junbin Fang and Dominique Unruh and Jun Yan and Dehua Zhou
-
2020/620 ( PDF )
- Private Identity Agreement for Private Set Functionalities
- Ben Kreuter and Sarvar Patel and Ben Terner
-
2020/619 ( PDF )
- Security Analysis of NIST CTR-DRBG
- Viet Tung Hoang and Yaobin Shen
-
2020/618 ( PDF )
- Broadcast Secret-Sharing, Bounds and Applications
- Ivan Damgård and Kasper Green Larsen and Sophia Yakoubov
-
2020/617 ( PDF )
- New Techniques in Replica Encodings with Client Setup
- Rachit Garg and George Lu and Brent Waters
-
2020/616 ( PDF )
- Master-Key KDM-Secure IBE from Pairings
- Sanjam Garg and Romain Gay and Mohammad Hajiabadi
-
2020/615 ( PDF )
- LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
- Diego F. Aranha and Felipe Rodrigues Novaes and Akira Takahashi and Mehdi Tibouchi and Yuval Yarom
-
2020/614 ( PDF )
- Lattice-Based E-Cash, Revisited
- Amit Deo and Benoit Libert and Khoa Nguyen and Olivier Sanders
-
2020/613 ( PDF )
- SiGamal: A supersingular isogeny-based PKE and its application to a PRF
- Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi
-
2020/612 ( PDF )
- Key Assignment Schemes with Authenticated Encryption, revisited
- Jeroen Pijnenburg and Bertram Poettering
-
2020/611 ( PDF )
- Efficient and Fast Hardware Architectures for SIKE Round 2 on FPGA
- Rami Elkhatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
-
2020/610 ( PDF )
- Stronger Multilinear Maps from Indistinguishability Obfuscation
- Navid Alamati and Hart Montgomery and Sikhar Patranabis
-
2020/609 ( PDF )
- Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers
- Behnaz Rezvani and Thomas Conroy and Luke Beckwith and Matthew Bozzay and Trevor Laffoon and David McFeeters and Yijia Shi and Minh Vu and William Diehl
-
2020/608 ( PDF )
- The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits
- Fatih Balli and Andrea Caforio and Subhadeep Banik
-
2020/607 ( PDF )
- Energy Analysis of Lightweight AEAD Circuits
- Andrea Caforio and Fatih Balli and Subhadeep Banik
-
2020/606 ( PDF )
- Ring Key-Homomorphic Weak PRFs and Applications
- Navid Alamati and Hart Montgomery and Sikhar Patranabis
-
2020/605 ( PDF )
- LUSA: the HPC library for lattice-based cryptanalysis
- Artur Mariano
-
2020/604 ( PDF )
- Perfectly Secure Oblivious Parallel RAM with $O(\log^3 N/ \log \log N)$ Overhead
- T-H. Hubert Chan and Wei-Kai Lin and Kartik Nayak and Elaine Shi
-
2020/603 ( PDF )
- Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification
- Gilles Barthe and Marc Gourjon and Benjamin Gregoire and Maximilian Orlt and Clara Paglialonga and Lars Porth
-
2020/602 ( PDF )
- CENCPP* - Beyond-birthday-secure Encryption from Public Permutations
- Arghya Bhattacharjee and Avijit Dutta and Eik List and Mridul Nandi
-
2020/601 ( PDF )
- Everything is a Race and Nakamoto Always Wins
- Amir Dembo and Sreeram Kannan and Ertem Nusret Tas and David Tse and Pramod Viswanath and Xuechao Wang and Ofer Zeitouni
-
2020/600 ( PDF )
- Multi-Party Threshold Private Set Intersection with Sublinear Communication
- Saikrishna Badrinarayanan and Peihan Miao and Srinivasan Raghuraman and Peter Rindal
-
2020/599 ( PDF )
- Private Matching for Compute
- Prasad Buddhavarapu and Andrew Knox and Payman Mohassel and Shubho Sengupta and Erik Taubeneck and Vlad Vlaskin
-
2020/598 ( PDF )
- Cryptanalysis of Au et al. Dynamic Universal Accumulator
- Alex Biryukov and Aleksei Udovenko and Giuseppe Vitto
-
2020/597 ( PDF )
- Bitstream Modification of Trivium
- Kalle Ngo and Elena Dubrova and Michail Moraitis
-
2020/596 ( PDF )
- On quantum indistinguishability under chosen plaintext attack
- Tore Vincent Carstens and Ehsan Ebrahimi and Gelo Tabia and and Dominique Unruh
-
2020/595 ( PDF )
- Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption
- Masahito Ishizaka and Shinsaku Kiyomoto
-
2020/594 ( PDF )
- LESS is More: Code-Based Signatures without Syndromes
- Jean-Francois Biasse and Giacomo Micheli and Edoardo Persichetti and Paolo Santini
-
2020/593 ( PDF )
- Alt-Coin Traceability
- Claire Ye and Chinedu Ojukwu and Anthony Hsu and Ruiqi Hu
-
2020/592 ( PDF )
- SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning
- Nishat Koti and Mahak Pancholi and Arpita Patra and Ajith Suresh
-
2020/591 ( PDF )
- Automatic Verification of Differential Characteristics: Application to Reduced Gimli (Full Version)
- Fukang Liu and Takanori Isobe and Willi Meier
-
2020/590 ( PDF )
- Expected Constant Round Byzantine Broadcast under Dishonest Majority
- Jun Wan and Hanshen Xiao and Elaine Shi and Srinivas Devadas
-
2020/589 ( PDF )
- Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity
- Mykhailo Kasianchuk and Mikolaj Karpinski and Roman Kochan and Volodymyr Karpinskyi and Grzegorz Litawa and Inna Shylinska and Igor Yakymenko
-
2020/588 ( PDF )
- Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS
- ZaHyun Koo and Jong-Seon No and Young-Sik Kim
-
2020/587 ( PDF )
- MoniPoly---An Expressive $q$-SDH-Based Anonymous Attribute-Based Credential System
- Syh-Yuan Tan and Thomas Gross
-
2020/586 ( PDF )
- Component-Based Comparison of Privacy-First Exposure Notification Protocols
- Ellie Daw
-
2020/585 ( PDF )
- Improving Key Mismatch Attack on NewHope with Fewer Queries
- Satoshi Okada and Yuntao Wang and Tsuyoshi Takagi
-
2020/584 ( PDF )
- vCNN: Verifiable Convolutional Neural Network based on zk-SNARKs
- Seunghwa Lee and Hankyung Ko and Jihye Kim and Hyunok Oh
-
2020/583 ( PDF )
- A New Targeted Password Guessing Model
- Xie Zhijie and Zhang Min and Yin Anqi and Li Zhenhan
-
2020/582 ( PDF )
- Risk and Architecture factors in Digital Exposure Notification
- Archanaa S. Krishnan and Yaling Yang and Patrick Schaumont
-
2020/581 ( PDF )
- The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency
- Benny Applebaum and Eliran Kachlon and Arpita Patra
-
2020/580 ( PDF )
- TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation
- Alexei Zamyatin and Zeta Avarikioti and Daniel Perez and William J. Knottenbelt
-
2020/579 ( PDF )
- BitFund: A Benevolent Blockchain Funding Network
- Darrow R Hartman
-
2020/578 ( PDF )
- HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
- Zhuotao Liu and Yangxi Xiang and Jian Shi and Peng Gao and Haoyu Wang and Xusheng Xiao and Bihan Wen and Yih-Chun Hu
-
2020/577 ( PDF )
- Inner-Product Functional Encryption with Fine-Grained Access Control
- Michel Abdalla and Dario Catalano and Romain Gay and Bogdan Ursu
-
2020/576 ( PDF )
- How Low Can We Go?
- Yuval Ishai
-
2020/575 ( PDF )
- From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption
- Sanjit Chatterjee and R. Kabaleeshwaran
-
2020/574 ( PDF )
- Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization
- Ming Li, Jian Weng, Anjia Yang, Jiasi Weng, Yue Zhang
-
2020/573 ( PDF )
- Quantifying the Security Cost of Migrating Protocols to Practice
- Christopher Patton and Thomas Shrimpton
-
2020/572 ( PDF )
- HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms)
- Marina Polubelova and Karthikeyan Bhargavan and Jonathan Protzenko and Benjamin Beurdouche and Aymeric Fromherz and Natalia Kulatova and Santiago Zanella-Béguelin
-
2020/571 ( PDF )
- Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers (Extended Version)
- Anubhab Baksi and Jakub Breier and Yi Chen and Xiaoyang Dong
-
2020/570 ( PDF )
- On Optimality of d + 1 TI Shared Functions of 8 Bits or Less
- Dušan Božilov
-
2020/569 ( PDF )
- QA-NIZK Arguments of Same Opening for Bilateral Commitments
- Carla Ràfols and Javier Silva
-
2020/568 ( PDF )
- Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy)
- Tomer Ashur and Siemen Dhooghe
-
2020/567 ( PDF )
- An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster
- Yi Liu and Qi Wang and Siu-Ming Yiu
-
2020/566 ( PDF )
- Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain
- Auqib Hamid Lone and Roohie Naaz
-
2020/565 ( PDF )
- Homomorphic Computation in Reed-Muller Codes
- Jinkyu Cho and Young-Sik Kim and Jong-Seon No
-
2020/564 ( PDF )
- Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
- Mahmoud Yehia and Riham AlTawy and T. Aaron Gulliver
-
2020/563 ( PDF )
- Secure large-scale genome-wide association studies using homomorphic encryption
- Marcelo Blatt and Alexander Gusev and Yuriy Polyakov and Shafi Goldwasser
-
2020/562 ( PDF )
- The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
- Hocheol Shin and Juhwan Noh and Dohyun Kim and Yongdae Kim
-
2020/561 ( PDF )
- Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
- Fukang Liu and Takanori Isobe and Willi Meier
-
2020/560 ( PDF )
- ZeroJoin: Combining ZeroCoin and CoinJoin
- Alexander Chepurnoy and Amitabh Saxena
-
2020/559 ( PDF )
- PIVOT: PrIVate and effective cOntact Tracing
- Giuseppe Garofalo and Tim Van hamme and Davy Preuveneers and Wouter Joosen and Aysajan Abidin and Mustafa A. Mustafa
-
2020/558 ( PDF )
- BSPL: Balanced Static Power Logic
- Bijan Fadaeinia and Thorben Moos and Amir Moradi
-
2020/557 ( PDF )
- On the sensitivity of some APN permutations to swapping points
- Lilya Budaghyan and Nikolay Kaleyski and Constanza Riera and Pantelimon Stanica
-
2020/556 ( PDF )
- Kerckhoffs' Legacy
- Jean-Claude Caraco and Rémi Géraud-Stewart and David Naccache
-
2020/555 ( PDF )
- Splitting Payments Locally While Routing Interdimensionally
- Lisa Eckey and Sebastian Faust and Kristina Hostáková and Stefanie Roos
-
2020/554 ( PDF )
- Bitcoin-Compatible Virtual Channels
- Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostáková and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi
-
2020/553 ( PDF )
- Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT
- Hu Xiong and Jinhao Chen and Minghao Yang and Xin Huang
-
2020/552 ( PDF )
- High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function
- Joon-Woo Lee and Eunsang Lee and Yongwoo Lee and Young-Sik Kim and Jong-Seon No
-
2020/551 ( PDF )
- Higher Order Differential Attack against Full-Round BIG
- Naoki Shibayama and Yasutaka Igarashi and Toshinobu Kaneko
-
2020/550 ( PDF )
- Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation
- Ruiyu Zhu and Changchang Ding and Yan Huang
-
2020/549 ( PDF )
- Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks
- Prasanna Ravi and Shivam Bhasin and Sujoy Sinha Roy and Anupam Chattopadhyay
-
2020/548 ( PDF )
- Blockchain Stealth Address Schemes
- Gary Yu
-
2020/547 ( PDF )
- Finding Bit-Based Division Property for Ciphers with Complex Linear Layer
- Kai Hu and Qingju Wang and Meiqin Wang
-
2020/546 ( PDF )
- MixColumns Coefficient Property and Security of the AES with A Secret S-Box
- Xin An and Kai Hu and Meiqin Wang
-
2020/545 ( PDF )
- Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security
- Ran Canetti and Pratik Sarkar and Xiao Wang
-
2020/544 ( PDF )
- SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis
- Okan Seker and Sebastian Berndt and Luca Wilke and Thomas Eisenbarth
-
2020/543 ( PDF )
- Kachina - Foundations of Private Smart Contracts
- Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
-
2020/542 ( PDF )
- Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation
- Yusuke Naito and Yu Sasaki and Takeshi Sugawara
-
2020/541 ( PDF )
- There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging
- Benjamin Dowling and Britta Hale
-
2020/540 ( PDF )
- One Round Threshold ECDSA with Identifiable Abort
- Rosario Gennaro and Steven Goldfeder
-
2020/539 ( PDF )
- On the Concrete Security of LWE with Small Secret
- Hao Chen and Lynn Chua and Kristin Lauter and Yongsoo Song
-
2020/538 ( PDF )
- Rotational Cryptanalysis on MAC Algorithm Chaskey
- Liliya Kraleva and Tomer Ashur and Vincent Rijmen
-
2020/537 ( PDF )
- TARDIS: A Foundation of Time-Lock Puzzles in UC
- Carsten Baum and Bernardo David and Rafael Dowsley and Jesper Buus Nielsen and Sabine Oechsner
-
2020/536 ( PDF )
- Higher-Order Differentials of Word-Oriented SPN Schemes with Low-Degree S-Boxes
- Carlos Cid and Lorenzo Grassi and Reinhard Lüftenegger and Christian Rechberger and Markus Schofnegger
-
2020/535 ( PDF )
- Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions
- Geoffroy Couteau and Shuichi Katsumata and Bogdan Ursu
-
2020/534 ( PDF )
- Post-quantum TLS without handshake signatures
- Peter Schwabe and Douglas Stebila and Thom Wiggers
-
2020/533 ( PDF )
- Anonymous Lottery in the Proof-of-Stake Setting
- Foteini Baldimtsi and Varun Madathil and Alessandra Scafuro and Linfeng Zhou
-
2020/532 ( PDF )
- Promise: Leveraging Future Gains for Collateral Reduction
- Dominik Harz and Lewis Gudgeon and Rami Khalil and Alexei Zamyatin
-
2020/531 ( PDF )
- Centralized or Decentralized? The Contact Tracing Dilemma
- Serge Vaudenay
-
2020/530 ( PDF )
- Determining the Multiplicative Complexity of Boolean Functions using SAT
- Mathias Soeken
-
2020/529 ( PDF )
- CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs
- Cas Cremers and Moni Naor and Shahar Paz and Eyal Ronen
-
2020/528 ( PDF )
- Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach
- Joseph K. Liu and Man Ho Au and Tsz Hon Yuen and Cong Zuo and Jiawei Wang and Amin Sakzad and Xiapu Luo and Li Li
-
2020/527 ( PDF )
- Aggregatable Subvector Commitments for Stateless Cryptocurrencies
- Alin Tomescu and Ittai Abraham and Vitalik Buterin and Justin Drake and Dankrad Feist and Dmitry Khovratovich
-
2020/526 ( PDF )
- Efficient Montgomery-like formulas for general Huff's and Huff's elliptic curves and their applications to the isogeny-based cryptography
- Robert Dryło and Tomasz Kijko and Michał Wroński
-
2020/525 ( PDF )
- Account Management in Proof of Stake Ledgers
- Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira
-
2020/524 ( PDF )
- Efficient Signatures on Randomizable Ciphertexts
- Balthazar Bauer and Georg Fuchsbauer
-
2020/523 ( PDF )
- Generalized Matsui Algorithm 1 with application for the full DES
- Tomer Ashur and Raluca Posteuca and Danilo Šijačić and Stef D’haeseleer
-
2020/522 ( PDF )
- Privately Connecting Mobility to Infectious Diseases via Applied Cryptography
- Alexandros Bampoulidis and Alessandro Bruni and Lukas Helminger and Daniel Kales and Christian Rechberger and Roman Walch
-
2020/521 ( PDF )
- MP-SPDZ: A Versatile Framework for Multi-Party Computation
- Marcel Keller
-
2020/520 ( PDF )
- MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation
- Yarkın Doröz and Jeffrey Hoffstein and Joseph H. Silverman and Berk Sunar
-
2020/519 ( PDF )
- Optimally-secure Coin-tossing against a Byzantine Adversary
- Hamidreza Amini Khorasgani and Hemanta K. Maji and Mingyuan Wang
-
2020/518 ( PDF )
- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings
- Muhammed F. Esgin and Ngoc Khanh Nguyen and Gregor Seiler
-
2020/517 ( PDF )
- Practical Product Proofs for Lattice Commitments
- Thomas Attema and Vadim Lyubashevsky and Gregor Seiler
-
2020/516 ( PDF )
- POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers
- Mordechai Guri
-
2020/515 ( PDF )
- On a hybrid approach to solve small secret LWE
- Thomas Espitau and Antoine Joux and Natalia Kharchenko
-
2020/514 ( PDF )
- On the Deployment of curve based cryptography for the Internet of Things
- Michael Scott
-
2020/513 ( PDF )
- E-cclesia: Universally Composable Self-Tallying Elections
- Myrto Arapinis and Nikolaos Lamprou and Lenka Mareková and Thomas Zacharias
-
2020/512 ( PDF )
- Glimpses are Forever in RC4 amidst the Spectre of Biases
- Chandratop Chakraborty and Pranab Chakraborty and Subhamoy Maitra
-
2020/511 ( PDF )
- JaxNet: Scalable Blockchain Network
- Iurii Shyshatsky and Vinod Manoharan and Taras Emelyanenko and Lucas Leger
-
2020/510 ( PDF )
- On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM
- Nir Drucker and Shay Gueron and Dusan Kostic and Edoardo Persichetti
-
2020/509 ( PDF )
- BBB Secure Nonce Based MAC Using Public Permutations
- Avijit Dutta and Mridul Nandi
-
2020/508 ( PDF )
- Augmenting Leakage Detection using Bootstrapping
- Yuan Yao and Michael Tunstall and Elke De Mulder and Anton Kochepasov and Patrick Schaumont
-
2020/507 ( PDF )
- Characteristics of Hadamard square of Reed--Muller subcodes of special type (Extended abstract)
- Victoria Vysotskaya
-
2020/506 ( PDF )
- Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations
- Sonia Belaïd and Pierre-Evariste Dagand and Darius Mercadier and Matthieu Rivain and Raphaël Wintersdorff
-
2020/505 ( PDF )
- ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
- Wasilij Beskorovajnov and Felix Dörre and Gunnar Hartung and Alexander Koch and Jörn Müller-Quade and Thorsten Strufe
-
2020/504 ( PDF )
- Storing and Retrieving Secrets on a Blockchain
- Vipul Goyal and Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno and Yifan Song
-
2020/503 ( PDF )
- A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder
- Aaron Hutchinson and Koray Karabina
-
2020/502 ( PDF )
- Applying Blockchain Layer2 Technology to Mass E-Commerce
- Sijia Zhao and Donal O’Mahony
-
2020/501 ( PDF )
- Fast Threshold ECDSA with Honest Majority
- Ivan Damgård and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael Bæksvang Østergård
-
2020/500 ( PDF )
- Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer
- Lorenzo Grassi and Christian Rechberger and Markus Schofnegger
-
2020/499 ( PDF )
- Proof-Carrying Data from Accumulation Schemes
- Benedikt Bünz and Alessandro Chiesa and Pratyush Mishra and Nicholas Spooner
-
2020/498 ( PDF )
- Threshold ECDSA for Decentralized Asset Custody
- Adam Gągol and Jędrzej Kula and Damian Straszak and Michał Świętek
-
2020/497 ( PDF )
- Collusion-Preserving Computation without a Mediator
- Michele Ciampi and Yun Lu and Vassilis Zikas
-
2020/496 ( PDF )
- Linear Generalized ElGamal Encryption Scheme
- Demba Sow and Léo Robert and Pascal Lafourcade
-
2020/495 ( PDF )
- Disperse rotation operator DRT and use in some stream ciphers
- Kim Yong-Jin and Yon Yong-Ho and Jong Yu-Jin and Li Ok-Chol
-
2020/494 ( PDF )
- Improved Black-Box Constructions of Composable Secure Computation
- Rohit Chatterjee and Xiao Liang and Omkant Pandey
-
2020/493 ( PDF )
- Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System
- Gennaro Avitabile and Vincenzo Botta and Vincenzo Iovino and Ivan Visconti
-
2020/492 ( PDF )
- UC Non-Interactive, Proactive, Threshold ECDSA
- Ran Canetti and Nikolaos Makriyannis and Udi Peled
-
2020/491 ( PDF )
- Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic
- Hilder Vitor Lima Pereira
-
2020/490 ( PDF )
- SoK: Techniques for Verifiable Mix Nets
- Thomas Haines and Johannes Mueller
-
2020/489 ( PDF )
- Pandemic Contact Tracing Apps: DP-3T, PEPP-PT NTK, and ROBERT from a Privacy Perspective
- Fraunhofer AISEC
-
2020/488 ( PDF )
- Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption
- Yongwoo Lee and Joonwoo Lee and Young-Sik Kim and Jong-Seon No
-
2020/487 ( PDF )
- Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP
- Emmanouil Doulgerakis and Thijs Laarhoven and Benne de Weger
-
2020/486 ( PDF )
- Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
- Jinyu Lu and Yunwen Liu and Tomer Ashur and Bing Sun and Chao Li
-
2020/485 ( PDF )
- Edwards curve points counting method and supersingular Edwards and Montgomery curves
- Ruslan V. Skuratovskii
-
2020/484 ( PDF )
- Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions
- Aaqib Bashir Dar and Auqib Hamid Lone and Saniya Zahoor and Afshan Amin Khan and Roohie Naaz
-
2020/483 ( PDF )
- On Ideal and Weakly-Ideal Access Structures
- Reza Kaboli and Shahram Khazaei and Maghsoud Parviz
-
2020/482 ( PDF )
- A Trace Based $GF(2^n)$ Inversion Algorithm
- Haining Fan
-
2020/481 ( PDF )
- Using z14 Fused-Multiply-Add Instructions to Accelerate Elliptic Curve Cryptography
- James You and Qi Zhang and Curtis D'Alves and Bill O'Farrell and Christopher K. Anand
-
2020/480 ( PDF )
- Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Evaluation
- Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
-
2020/479 ( PDF )
- Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRF
- Tapas Pal and Ratna Dutta
-
2020/478 ( PDF )
- Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols
- Eshan Chattopadhyay and Jesse Goodman and Vipul Goyal and Xin Li
-
2020/477 ( PDF )
- Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More
- Essam Ghadafi
-
2020/476 ( PDF )
- Generalized Bitcoin-Compatible Channels
- Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostakova and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi
-
2020/475 ( PDF )
- Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews
- Zachary Zaccagni and Ram Dantu
-
2020/474 ( PDF )
- Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model
- Karim Baghery and Mahdi Sedaghat
-
2020/473 ( PDF )
- Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing
- Ashutosh Kumar and Raghu Meka and David Zuckerman
-
2020/472 ( PDF )
- Bracing A Transaction DAG with A Backbone Chain
- Shuyang Tang
-
2020/471 ( PDF )
- Interpose PUF can be PAC Learned
- Durba Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
-
2020/470 ( PDF )
- LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
- Fabio Campos and Tim Kohlstadt and Steffen Reith and Marc Stoettinger
-
2020/469 ( PDF )
- Dedicated Security Chips in the Age of Secure Enclaves
- Kari Kostiainen and Aritra Dhar and Srdjan Capkun
-
2020/468 ( PDF )
- Distributed Auditing Proofs of Liabilities
- Konstantinos Chalkias and Kevin Lewi and Payman Mohassel and Valeria Nikolaenko
-
2020/467 ( PDF )
- Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
- Zhenzhen Bao and Xiaoyang Dong and Jian Guo and Zheng Li and Danping Shi and Siwei Sun and Xiaoyun Wang
-
2020/466 ( PDF )
- Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks
- Pantea Kiaei and Darius Mercadier and Pierre-Evariste Dagand and Karine Heydemann and Patrick Schaumont
-
2020/465 ( PDF )
- Domain-Oriented Masked Instruction Set Architecture for RISC-V
- Pantea Kiaei and Patrick Schaumont
-
2020/464 ( PDF )
- Can a Public Blockchain Keep a Secret?
- Fabrice Benhamouda and Craig Gentry and Sergey Gorbunov and Shai Halevi and Hugo Krawczyk and Chengyu Lin and Tal Rabin and Leonid Reyzin
-
2020/463 ( PDF )
- Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge
- Xiaoning Liu and Bang Wu and Xingliang Yuan and Xun Yi
-
2020/462 ( PDF )
- An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption
- Ido Shahaf and Or Ordentlich and Gil Segev
-
2020/461 ( PDF )
- A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem
- Jean-Sébastien Coron and Agnese Gini
-
2020/460 ( PDF )
- A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption
- Marloes Venema and Greg Alpár
-
2020/459 ( PDF )
- Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations
- Debdeep Mukhopadhyay
-
2020/458 ( PDF )
- On the Optimality of Optimistic Responsiveness
- Ittai Abraham and Kartik Nayak and Ling Ren and Nibesh Shrestha
-
2020/457 ( PDF )
- Cryptographic Scheme for analyzing protected files on Sandboxes and share them privately
- Ahmad Almorabea
-
2020/456 ( PDF )
- Bank run Payment Channel Networks
- Zhichun Lu and Runchao Han and Jiangshan Yu
-
2020/455 ( PDF )
- Cryptanalysis of LEDAcrypt
- Daniel Apon and Ray Perlner and Angela Robinson and Paolo Santini
-
2020/454 ( PDF )
- Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification
- Thomas Pornin
-
2020/453 ( PDF )
- BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein
- F. Betül Durak and Loïs Huguenin-Dumittan and Serge Vaudenay
-
2020/452 ( PDF )
- Almost Public Quantum Coins
- Amit Behera and Or Sattath
-
2020/451 ( PDF )
- Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning
- Hao Chen and Miran Kim and Ilya Razenshteyn and Dragos Rotaru and Yongsoo Song and Sameer Wagh
-
2020/450 ( PDF )
- The Landscape of Pointcheval-Sanders Signatures: Mapping to Polynomial-Based Signatures and Beyond
- Kristian L. McDonald
-
2020/449 ( PDF )
- Switched Threshold Signatures from K-Private PolyShamir Secret Sharing
- Kristian L. McDonald
-
2020/448 ( PDF )
- Partial Secret Sharing Schemes
- Amir Jafari and Shahram Khazaei
-
2020/447 ( -- withdrawn -- )
- Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey
- Asma Aloufi and Peizhao Hu and Yongsoo Song and and Kristin Lauter
-
2020/446 ( PDF )
- RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography
- Tim Fritzmann and Georg Sigl and Johanna Sepúlveda
-
2020/445 ( PDF )
- On Pseudorandom Encodings
- Thomas Agrikola and Geoffroy Couteau and Yuval Ishai and Stanislaw Jarecki and Amit Sahai
-
2020/444 ( PDF )
- A modern signature scheme with message recovery: Abe--Okamoto signatures with EdDSA elements
- Satō Shinichi
-
2020/443 ( PDF )
- A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
- Okan Seker and Thomas Eisenbarth and Maciej Liskiewicz
-
2020/442 ( PDF )
- Fine-Grained Cryptography: A New Frontier?
- Alon Rosen
-
2020/441 ( PDF )
- Modeling for Three-Subset Division Property without Unknown Subset
- Yonglin Hao and Gregor Leander and Willi Meier and Yosuke Todo and Qingju Wang
-
2020/440 ( PDF )
- Subset Attacks on Ring-LWE with Wide Error Distributions I
- Hao Chen
-
2020/439 ( PDF )
- The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE
- Hiroshi Onuki and Yusuke Aikawa and Tsuyoshi Takagi
-
2020/438 ( PDF )
- Fast hybrid Karatsuba multiplier for Type II pentanomials
- Yin Li and Yu Zhang and Wei He
-
2020/437 ( PDF )
- Faster Montgomery and double-add ladders for short Weierstrass curves
- Mike Hamburg
-
2020/436 ( PDF )
- Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification
- Houssem Maghrebi
-
2020/435 ( PDF )
- WAGE: An Authenticated Encryption with a Twist
- Riham AlTawy and Guang Gong and Kalikinkar Mandal and Raghvendra Rohit
-
2020/434 ( PDF )
- High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware
- Sujoy Sinha Roy and Andrea Basso
-
2020/433 ( PDF )
- zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays
- Martin Westerkamp and Jacob Eberhardt
-
2020/432 ( PDF )
- From A to Z: Projective coordinates leakage in the wild
- Alejandro Cabrera Aldaya and Cesar Pereida García and Billy Bob Brumley
-
2020/431 ( PDF )
- x-only point addition formula and faster compressed SIKE
- Geovandro Pereira and Javad Doliskani and David Jao
-
2020/430 ( PDF )
- Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures
- Aram Jivanyan and Tigran Mamikonyan
-
2020/429 ( PDF )
- Mathematics and Cryptography: A Marriage of Convenience?
- Alice Silverberg
-
2020/428 ( PDF )
- Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc.
- Yaron Gvili
-
2020/427 ( PDF )
- Improving the Performance of the Picnic Signature Scheme
- Daniel Kales and Greg Zaverucha
-
2020/426 ( PDF )
- Privacy-Preserving Contact Tracing: current solutions and open questions
- Qiang Tang
-
2020/425 ( PDF )
- Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
- Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel
-
2020/424 ( PDF )
- Low-gate Quantum Golden Collision Finding
- Samuel Jaques and André Schrottenloher
-
2020/423 ( PDF )
- On One-way Functions and Kolmogorov Complexity
- Yanyi Liu and Rafael Pass
-
2020/422 ( PDF )
- Pattern Matching on Encrypted Data
- Anis Bkakria and Nora Cuppens and Frédéric Cuppens
-
2020/421 ( PDF )
- Multichain-MWPoW: A $p/2$ Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture
- Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos
-
2020/420 ( PDF )
- Practical Card-Based Protocol for Three-Input Majority
- Kenji Yasunaga
-
2020/419 ( PDF )
- Pointproofs: Aggregating Proofs for Multiple Vector Commitments
- Sergey Gorbunov and Leonid Reyzin and Hoeteck Wee and Zhenfei Zhang
-
2020/418 ( PDF )
- Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
- Krzysztof Pietrzak
-
2020/417 ( PDF )
- Optimal strategies for CSIDH
- Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez
-
2020/416 ( PDF )
- The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-Rewinding Proofs for Schnorr Identification and Signatures
- Mihir Bellare and Wei Dai
-
2020/415 ( PDF )
- Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE
- Shweta Agrawal and Alice Pellet-Mary
-
2020/414 ( PDF )
- Semi-Quantum Money
- Roy Radian and Or Sattath
-
2020/413 ( PDF )
- Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
- Louis Goubin and Matthieu Rivain and Junwei Wang
-
2020/412 ( PDF )
- Fixslicing: A New GIFT Representation
- Alexandre Adomnicai and Zakaria Najm and Thomas Peyrin
-
2020/411 ( PDF )
- Secure Two-Party Computation in a Quantum World
- Niklas Büscher and Daniel Demmler and Nikolaos P. Karvelas and Stefan Katzenbeisser and Juliane Krämer and Deevashwer Rathee and Thomas Schneider and Patrick Struck
-
2020/410 ( PDF )
- Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4
- Hwajeong Seo and Mila Anastasova and Amir Jalali and Reza Azarderakhsh
-
2020/409 ( PDF )
- Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes
- Loïs Huguenin-Dumittan and Serge Vaudenay
-
2020/408 ( PDF )
- Speed up over the Rainbow
- Nir Drucker and Shay Gueron
-
2020/407 ( PDF )
- Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection
- Aydin Abadi and Sotirios Terzis and Changyu Dong
-
2020/406 ( PDF )
- Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience
- Atsuki Momose and Jason Paul Cruz and Yuichi Kaji
-
2020/405 ( PDF )
- Ordinos: A Verifiable Tally-Hiding E-Voting System
- Ralf Kuesters and Julian Liedtke and Johannes Mueller and Daniel Rausch and Andreas Vogt
-
2020/404 ( PDF )
- From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards
- Tassos Dimitriou
-
2020/403 ( PDF )
- Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
- David Derler and Kai Samelin and Daniel Slamanig
-
2020/402 ( PDF )
- A Note on Low Order Assumptions in RSA groups
- István András Seres and Péter Burcsi
-
2020/401 ( PDF )
- Mining for Privacy: How to Bootstrap a Snarky Blockchain
- Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
-
2020/400 ( PDF )
- Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis
- Jeroen Delvaux
-
2020/399 ( PDF )
- Analysis of DP3T
- Serge Vaudenay
-
2020/398 ( PDF )
- CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures
- Samuel Brack and Leonie Reichert and Björn Scheuermann
-
2020/397 ( PDF )
- Classification of 4-bit S-boxes for BOGI-permutation
- Seonggyeom Kim and Deukjo Hong and Jaechul Sung and Seokhie Hong
-
2020/396 ( PDF )
- Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing
- Donggeun Kwon and HeeSeok Kim and Seokhie Hong
-
2020/395 ( PDF )
- Cryptography from Information Loss
- Marshall Ball and Elette Boyle and Akshay Degwekar and Apoorvaa Deshpande and Alon Rosen and Vinod Vaikuntanathan and Prashant Nalini Vasudevan
-
2020/394 ( PDF )
- Candidate iO from Homomorphic Encryption Schemes
- Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta
-
2020/393 ( PDF )
- LevioSA: Lightweight Secure Arithmetic Computation
- Carmit Hazay and Yuval Ishai and Antonio Marcedone and Muthuramakrishnan Venkitasubramaniam
-
2020/392 ( PDF )
- An argument on the security of LRBC, a recently proposed lightweight block cipher
- Sadegh Sadeghi and Nasour Bagheri
-
2020/391 ( PDF )
- Optimized CSIDH Implementation Using a 2-torsion Point
- Donghoe Heo and Suhri Kim and Kisoon Yoon and Young-Ho Park and Seokhie Hong
-
2020/390 ( PDF )
- A French cipher from the late 19th century
- Rémi Géraud-Stewart and David Naccache
-
2020/389 ( PDF )
- A Unary Cipher with Advantages over the Vernam Cipher
- Gideon Samid
-
2020/388 ( PDF )
- Fast 4 way vectorized ladder for the complete set of Montgomery curves
- Huseyin Hisil and Berkan Egrice and Mert Yassi
-
2020/387 ( PDF )
- Low-complexity and Reliable Transforms for Physical Unclonable Functions
- Onur Gunlu and Rafael F. Schaefer
-
2020/386 ( PDF )
- Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric
- Ralf Kuesters and Daniel Rausch and Mike Simon
-
2020/385 ( PDF )
- Two-Sided Malicious Security for Private Intersection-Sum with Cardinality
- Peihan Miao and Sarvar Patel and Mariana Raykova and Karn Seth and Moti Yung
-
2020/384 ( PDF )
- A ”Final” Security Bug
- Nguyen Thoi Minh Quan
-
2020/383 ( PDF )
- Parallel strategies for SIDH: Towards computing SIDH twice as fast
- Daniel Cervantes-Vázquez and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez
-
2020/382 ( PDF )
- Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection
- Jan Bobolz and Fabian Eidens and Stephan Krenn and Daniel Slamanig and Christoph Striecks
-
2020/381 ( PDF )
- Proof-of-Reputation Blockchain with Nakamoto Fallback
- Leonard Kleinrock and Rafail Ostrovsky and Vassilis Zikas
-
2020/380 ( PDF )
- Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory
- Anirban Chakraborty and Sarani Bhattacharya and Sayandeep Saha and Debdeep Mukhopdhyay
-
2020/379 ( PDF )
- Post-quantum WireGuard
- Andreas Hülsing and Kai-Chun Ning and Peter Schwabe and Florian Weber and Philip R. Zimmermann
-
2020/378 ( PDF )
- Efficient 4-way Vectorizations of the Montgomery Ladder
- Kaushik Nath and Palash Sarkar
-
2020/377 ( PDF )
- Oblivious tight compaction in O(n) time with smaller constant
- Samuel Dittmer and Rafail Ostrovsky
-
2020/376 ( PDF )
- On the privacy of a code-based single-server computational PIR scheme
- Sarah Bordage and Julien Lavauzelle
-
2020/375 ( PDF )
- Privacy-Preserving Contact Tracing of COVID-19 Patients
- Leonie Reichert and Samuel Brack and Björn Scheuermann
-
2020/374 ( PDF )
- Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority
- Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and abhi shelat and Muthu Venkitasubramaniam and Ruihan Wang
-
2020/373 ( PDF )
- Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES
- Huanyu Wang and Elena Dubrova
-
2020/372 ( PDF )
- Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions
- Claude Carlet
-
2020/371 ( PDF )
- Single-Trace Attacks on Keccak
- Matthias J. Kannwischer and Peter Pessl and Robert Primas
-
2020/370 ( PDF )
- Multiparty Generation of an RSA Modulus
- Megan Chen and Ran Cohen and Jack Doerner and Yashvanth Kondi and Eysa Lee and Schuyler Rosefield and abhi shelat
-
2020/369 ( PDF )
- The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs
- David Knichel and Thorben Moos and Amir Moradi
-
2020/368 ( PDF )
- Defeating NewHope with a Single Trace
- Dorian Amiet and Andreas Curiger and Lukas Leuenberger and Paul Zbinden
-
2020/367 ( PDF )
- Exploiting Decryption Failures in Mersenne Number Cryptosystems
- Marcel Tiepelt and Jan-Pieter D'Anvers
-
2020/366 ( PDF )
- FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection
- Hangwei Lu and Dhwani Mehta and Olivia Paradis and Navid Asadizanjani and Mark Tehranipoor and Damon L. Woodard
-
2020/365 ( PDF )
- A New Algorithm to Find Monic Irreducible Polynomials over Extended Galois field GF prime p and extension q using Positional Arithmetic
- Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
-
2020/364 ( PDF )
- Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs
- Behzad Abdolmaleki and Daniel Slamanig
-
2020/363 ( PDF )
- On equivalence between known polynomial APN functions and power APN functions
- Qianhong Wan and Longjiang Qu and Chao Li
-
2020/362 ( -- withdrawn -- )
- Another Look at CBC Casper Consensus Protocol
- Yongge Wang
-
2020/361 ( PDF )
- How Not to Create an Isogeny-Based PAKE
- Reza Azarderakhsh and David Jao and Brian Koziel and Jason T. LeGrow and Vladimir Soukharev and Oleg Taraskin
-
2020/360 ( PDF )
- Composite Algorithm The New Algorithm to Search for Monic Irreducible Polynomials over Extended Galois Fields
- Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
-
2020/359 ( PDF )
- 4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes.
- Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
-
2020/358 ( PDF )
- Division Algorithm to search for monic irreducible polynomials over extended Galois Field GF(p^q).
- Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
-
2020/357 ( PDF )
- Quasigroups and Substitution Permutation Networks: A Failed Experiment
- George Teseleanu
-
2020/356 ( PDF )
- Efficient MPC with a Mixed Adversary
- Martin Hirt and Marta Mularczyk
-
2020/355 ( PDF )
- Permissionless Consensus in the Resource Model
- Benjamin Terner
-
2020/354 ( PDF )
- A Generalization of the ElGamal public-key cryptosystem
- Rajitha Ranasinghe and Pabasara Athukorala
-
2020/353 ( PDF )
- A Probabilistic Public Key Encryption Scheme Based on Quartic Reciprocity (Draft V1.22)
- Robert A. Threlfall
-
2020/352 ( PDF )
- Coda: Decentralized Cryptocurrency at Scale
- Joseph Bonneau and Izaak Meckler and Vanishree Rao and Evan Shapiro
-
2020/351 ( PDF )
- Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition
- Youssef El Housni and Aurore Guillevic
-
2020/350 ( PDF )
- New Multi-bit Differentials to Improve Attacks Against ChaCha
- Murilo Coutinho and T. C. Souza Neto
-
2020/349 ( PDF )
- Differential Power Analysis on (Non-)Linear Feedback Shift Registers
- Siang Meng Sim
-
2020/348 ( PDF )
- Constructing hidden order groups using genus three Jacobians
- Steve Thakur
-
2020/347 ( PDF )
- Some Low Round Zero Knowledge Protocols
- Hongda Li and Peifang Ni and Dongxue Pan
-
2020/346 ( PDF )
- Algebraic Attacks on Round-Reduced Keccak/Xoodoo
- Fukang Liu and Takanori Isobe and Willi Meier and Zhonghao Yang
-
2020/345 ( PDF )
- Bent functions stemming from Maiorana-McFarland class being provably outside its completed version
- Fengrong Zhangand Nastja Cepak and Enes Pasalicand Yongzhuang Wei
-
2020/344 ( PDF )
- Anchoring the Value of Cryptocurrency
- Yibin Xu and Yangyu Huang and Jianhua Shao
-
2020/343 ( PDF )
- BSC: A Bitcoin Smart Contract Implementation
- Hiro Midas
-
2020/342 ( PDF )
- Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge
- Estuardo Alpirez Bock and Alexander Treff
-
2020/341 ( PDF )
- Faster computation of isogenies of large prime degree
- Daniel J. Bernstein and Luca De Feo and Antonin Leroux and Benjamin Smith
-
2020/340 ( PDF )
- Differential Privacy for Eye Tracking with Temporal Correlations
- Efe Bozkir* and Onur Gunlu* and Wolfgang Fuhl and Rafael F. Schaefer and Enkelejda Kasneci
-
2020/339 ( PDF )
- Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics
- George Teseleanu
-
2020/338 ( PDF )
- Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits
- Daniel Escudero and Satrajit Ghosh and Marcel Keller and Rahul Rachuri and Peter Scholl
-
2020/337 ( PDF )
- Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography
- Nicholas Genise and Daniele Micciancio and Chris Peikert and Michael Walter
-
2020/336 ( PDF )
- Gimli Encryption in 715.9 psec
- Santosh Ghosh and Michael Kounavis and Sergej Deutsch
-
2020/335 ( PDF )
- An n/2 byzantine node tolerated blockchain sharding approach
- Yibin Xu and Yangyu Huang
-
2020/334 ( PDF )
- 4-Uniform Permutations with Null Nonlinearity
- Christof Beierle and Gregor Leander
-
2020/333 ( -- withdrawn -- )
- A Simpler and Modular Construction of Linkable Ring Signature
- Wulu Li and Yongcan Wang and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
-
2020/332 ( PDF )
- Implementation Study of Two Verifiable Delay Functions
- Vidal Attias and Luigi Vigneri and Vassil Dimitrov
-
2020/331 ( PDF )
- The CTR mode with encrypted nonces and its extension to AE
- Sergey Agievich
-
2020/330 ( PDF )
- Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective
- Gil Segev and Ido Shahaf
-
2020/329 ( PDF )
- Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields
- Gabrielle De Micheli and Pierrick Gaudry and Cécile Pierrot
-
2020/328 ( PDF )
- Weight-Based Nakamoto-Style Blockchains
- Simon Holmgaard Kamp and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Søren Eller Thomsen and Daniel Tschudi
-
2020/327 ( PDF )
- On the design of stream ciphers with Cellular Automata having radius = 2
- Anita John and Rohit Lakra and Jimmy Jose
-
2020/326 ( PDF )
- An upper bound on the decryption failure rate of static-key NewHope
- John M. Schanck
-
2020/325 ( PDF )
- SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts
- Robert Muth and Florian Tschorsch
-
2020/324 ( PDF )
- Defeating CAS-Unlock
- Bicky Shakya and Xiaolin Xu and Mark Tehranipoor and Domenic Forte
-
2020/323 ( PDF )
- A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol
- Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos
-
2020/322 ( PDF )
- Optimal and Error-Free Multi-Valued Byzantine Consensus Through Parallel Execution
- Andrew Loveless and Ronald Dreslinski and Baris Kasikci
-
2020/321 ( PDF )
- Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism
- Jose Maria Bermudo Mera and Furkan Turan and Angshuman Karmakar and Sujoy Sinha Roy and Ingrid Verbauwhede
-
2020/320 ( PDF )
- Universally Composable Relaxed Password Authenticated Key Exchange
- Michel Abdalla and Manuel Barbosa and Tatiana Bradley and Stanislaw Jarecki and Jonathan Katz and Jiayu Xu
-
2020/319 ( PDF )
- Secure k-ish nearest neighbors classifier
- Hayim Shaul and Dan Feldman and Daniela Rus
-
2020/318 ( PDF )
- Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL
- Huijia Lin and Ji Luo
-
2020/317 ( PDF )
- Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure
- Archisman Ghosh and Debayan Das and Shreyas Sen
-
2020/316 ( PDF )
- Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
- Rishab Goyal and Sam Kim and Brent Waters and David J. Wu
-
2020/315 ( PDF )
- plookup: A simplified polynomial protocol for lookup tables
- Ariel Gabizon and Zachary J. Williamson
-
2020/314 ( PDF )
- Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA
- Shigeo Tsujii and Ryo Fujita and Masahito Gotaishi
-
2020/313 ( PDF )
- Security analysis of SPAKE2+
- Victor Shoup
-
2020/312 ( PDF )
- Arcturus: efficient proofs for confidential transactions
- Sarang Noether
-
2020/311 ( PDF )
- A Blockchain Traceable Scheme with Oversight Function
- Tianjun Ma and Haixia Xu and Peili Li
-
2020/310 ( PDF )
- Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis
- Gabriel Destouet and Cécile Dumas and Anne Frassati and Valérie Perrier
-
2020/309 ( PDF )
- Cryptanalysis Results on Spook
- Patrick Derbez and Paul Huynh and Virginie Lallemand and María Naya-Plasencia and Léo Perrin and André Schrottenloher
-
2020/308 ( PDF )
- Post-Quantum TLS on Embedded Systems
- Kevin Bürstinghaus-Steinbach and Christoph Krauß and Ruben Niederhagen and Michael Schneider
-
2020/307 ( PDF )
- Handling vectorial functions by means of their graph indicators
- Claude Carlet
-
2020/306 ( PDF )
- Leakage Assessment in Fault Attacks: A Deep Learning Perspective
- Sayandeep Saha and Manaar Alam and Arnab Bag and Debdeep Mukhopadhyay and Pallab Dasgupta
-
2020/305 ( PDF )
- 3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA
- Shigeo Tsujii and Toshiaki Saisho and Masao Yamasawa and Masahito Gotaishi and Kou Shikata and Koji Sasaki and Nobuharu Suzuki and Masaki Hashiyada
-
2020/304 ( PDF )
- Multiparty Homomorphic Encryption from Ring-Learning-With-Errors
- Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Philippe Bossuat and Jean-Pierre Hubaux
-
2020/303 ( PDF )
- A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
- Sergei Tikhomirov and Pedro Moreno-Sanchez and Matteo Maffei
-
2020/302 ( PDF )
- Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers
- Thomas Kaeding
-
2020/301 ( PDF )
- MadHatter: A toy cipher that conceals two plaintexts in the same ciphertext
- Thomas Kaeding
-
2020/300 ( PDF )
- Secure Multiparty Computation (MPC)
- Yehuda Lindell
-
2020/299 ( PDF )
- Hydra: Fast Isomorphic State Channels
- Manuel M. T. Chakravarty and Sandro Coretti and Matthias Fitzi and Peter Gazi and Philipp Kant and Aggelos Kiayias and Alexander Russell
-
2020/298 ( PDF )
- Fast polynomial inversion for post quantum QC-MDPC cryptography
- Nir Drucker and Shay Gueron and Dusan Kostic
-
2020/297 ( PDF )
- Random Self-reducibility of Ideal-SVP via Arakelov Random Walks
- Koen de Boer and Léo Ducas and Alice Pellet-Mary and Benjamin Wesolowski
-
2020/296 ( PDF )
- Multidimensional Database Reconstruction from Range Query Access Patterns
- Akshima and David Cash and Francesca Falzon and Adam Rivkin and Jesse Stern
-
2020/295 ( PDF )
- Generalized Isotopic Shift Construction for APN Functions
- Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert Coulter and Irene Villa
-
2020/294 ( PDF )
- Public-Key Generation with Verifiable Randomness
- Olivier Blazy and Patrick Towa and Damien Vergnaud
-
2020/293 ( PDF )
- Many-out-of-Many Proofs and Applications to Anonymous Zether
- Benjamin E. Diamond
-
2020/292 ( PDF )
- LWE with Side Information: Attacks and Concrete Security Estimation
- Dana Dachman-Soled and Léo Ducas and Huijing Gong and Mélissa Rossi
-
2020/291 ( -- withdrawn -- )
- Unforgeability in the quantum world
- Myrto Arapinis and Mahshid Delavar and Mina Doosti and Elham Kashefi
-
2020/290 ( PDF )
- Linear Cryptanalysis of Reduced-Round SIMON Using Super Rounds
- Reham Almukhlifi and Poorvi Vora
-
2020/289 ( PDF )
- The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves
- Jonathan Lee
-
2020/288 ( PDF )
- Secure Key-Alternating Feistel Ciphers Without Key Schedule
- Yaobin Shen and Hailun Yan and Lei Wang and Xuejia Lai
-
2020/287 ( PDF )
- Private resource allocators and their applications
- Sebastian Angel and Sampath Kannan and Zachary Ratliff
-
2020/286 ( PDF )
- Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages
- Geoffroy Couteau and Dominik Hartmann
-
2020/285 ( PDF )
- Improved Security Bounds for Generalized Feistel Networks
- Yaobin Shen and Chun Guo and Lei Wang
-
2020/284 ( PDF )
- Database Reconstruction Attacks in Two Dimensions
- Evangelia Anna Markatou and Roberto Tamassia
-
2020/283 ( PDF )
- CryptoWills: How to Bequeath Cryptoassets
- István András Seres and Omer Shlomovits and Pratyush Ranjan Tiwari
-
2020/282 ( PDF )
- The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
- Jelle Don and Serge Fehr and Christian Majenz
-
2020/281 ( PDF )
- Privacy-friendly Monero transaction signing on a hardware wallet, extended version
- Dusan Klinec Vashek Matyas
-
2020/280 ( PDF )
- Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
- Juliane Krämer and Patrick Struck
-
2020/279 ( PDF )
- Impact of System-on-Chip Integration of AEAD Ciphers
- Shashank Raghuraman and Leyla Nazhandali
-
2020/278 ( PDF )
- MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs
- Ahmed Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Dawn Song
-
2020/277 ( PDF )
- Full Analysis of Nakamoto Consensus in Bounded-Delay Networks
- Juan Garay and Aggelos Kiayias and Nikos Leonardos
-
2020/276 ( PDF )
- CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware
- Hamid Nejatollahi and Saransh Gupta and Mohsen Imani and Tajana Simunic Rosing and Rosario Cammarota and Nikil Dutt
-
2020/275 ( PDF )
- Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function
- Jannis Bossert and Eik List and Stefan Lucks and Sebastian Schmitz
-
2020/274 ( PDF )
- An Optimal Relational Database Encryption Scheme
- Seny Kamara and Tarik Moataz and Stan Zdonik and Zheguang Zhao
-
2020/273 ( PDF )
- On the Fast Algebraic Immunity of Threshold Functions
- Pierrick Méaux
-
2020/272 ( PDF )
- Privacy-Preserving Fast and Exact Linear Equations Solver with Fully Homomorphic Encryption
- Keita Arimitsu and Kazuki Otsuka
-
2020/271 ( PDF )
- Signatures from Sequential-OR Proofs
- Marc Fischlin and Patrick Harasser and Christian Janson
-
2020/270 ( PDF )
- Practical Predicate Encryption for Inner Product
- Yi-Fan Tseng and Zi-Yuan Liu and Raylin Tso
-
2020/269 ( PDF )
- Order-Fairness for Byzantine Consensus
- Mahimna Kelkar and Fan Zhang and Steven Goldfeder and Ari Juels
-
2020/268 ( PDF )
- Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography
- Jose Maria Bermudo Mera and Angshuman Karmakar and Ingrid Verbauwhede
-
2020/267 ( PDF )
- Differential Power Analysis of the Picnic Signature Scheme
- Tim Gellersen and Okan Seker and Thomas Eisenbarth
-
2020/266 ( PDF )
- Quantum Indistinguishability for Public Key Encryption
- Tommaso Gagliardoni and Juliane Krämer and Patrick Struck
-
2020/265 ( PDF )
- New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More
- Benoît Libert and Alain Passelègue and Hoeteck Wee and David J. Wu
-
2020/264 ( PDF )
- Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes
- Nicholas Mainardi and Alessandro Barenghi and Gerardo Pelosi
-
2020/263 ( PDF )
- FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups
- Jihoon Kwon and Byeonghak Lee and Jooyoung Lee and and Dukjae Moon
-
2020/262 ( PDF )
- A Note on the Ending Elliptic Curve in SIDH
- Christopher Leonardi
-
2020/261 ( PDF )
- Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices
- Matthieu Monteiro and Kumara Kahatapitiya and Hassan Jameel Asghar and Kanchana Thilakarathna and Thierry Rakotoarivelo and Dali Kaafar and Shujun Li and Ron Steinfeld and Josef Pieprzyk
-
2020/260 ( PDF )
- Lattice-based (Partially) Blind Signature without Restart
- Samuel Bouaziz-Ermann and Sébastien Canard and Gautier Eberhart and Guillaume Kaim and Adeline Roux-Langlois and Jacques Traoré
-
2020/259 ( PDF )
- Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors
- Divesh Aggarwal and Maciej Obremski and João Ribeiro and Mark Simkin and Luisa Siniscalchi
-
2020/258 ( PDF )
- NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations
- Zvika Brakerski and Venkata Koppula and Tamer Mour
-
2020/257 ( PDF )
- Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication
- Onur Gunlu and Rafael F. Schaefer and H. Vincent Poor
-
2020/256 ( PDF )
- Statistical ZAPR Arguments from Bilinear Maps
- Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs
-
2020/255 ( PDF )
- Novel Deception Techniques for Malware Detection on Industrial Control Systems
- Takanori Machida and Dai Yamamoto and Yuki Unno and Hisashi Kojima
-
2020/254 ( PDF )
- Formalizing Data Deletion in the Context of the Right to be Forgotten
- Sanjam Garg and Shafi Goldwasser and Prashant Nalini Vasudevan
-
2020/253 ( PDF )
- Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing
- Hemanta K. Maji and Mingyuan Wang
-
2020/252 ( PDF )
- Secure Non-interactive Simulation: Feasibility & Rate
- Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen
-
2020/251 ( PDF )
- Communication Lower Bounds for Perfect Maliciously Secure MPC
- Ivan Damgård and Nikolaj I. Schwartzbach
-
2020/250 ( PDF )
- On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations
- Ehsan Aerabi and Athanasios Papadimitriou and David Hely
-
2020/249 ( PDF )
- CONFISCA : an SIMD-based CONcurrent FI and SCA countermeasure with switchable performance and security modes
- Ehsan Aerabi and Cyril Bresch and David Hély and Athanasios Papadimitriou and Mahdi Fazeli
-
2020/248 ( PDF )
- Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast
- Ittai Abraham and Benny Pinkas and Avishay Yanai
-
2020/247 ( -- withdrawn -- )
- Crooked Indifferentiability Revisited
- Rishiraj Bhattacharyya and Mridul Nandi and Anik Raychaudhuri
-
2020/246 ( PDF )
- Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography
- Jing Tian and Jun Lin and Zhongfeng Wang
-
2020/245 ( PDF )
- New Assumptions and Efficient Cryptosystems from the $e$-th Power Residue Symbol
- Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao and Licheng Wang and Zhusen Liu
-
2020/244 ( PDF )
- On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol
- Andrea Basso and Péter Kutas and Simon-Philipp Merz and Christophe Petit and Charlotte Weitkämper
-
2020/243 ( PDF )
- An Analysis of Hybrid Public Key Encryption
- Benjamin Lipp
-
2020/242 ( -- withdrawn -- )
- Practical and Secure Circular Range Search on Private Spatial Data
- Zhihao Zheng and Jiachen Shen and Zhenfu Cao
-
2020/241 ( PDF )
- Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability
- Mihir Bellare and Hannah Davis and Felix Günther
-
2020/240 ( PDF )
- MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture
- T-H. Hubert Chan and Kai-Min Chung and Wei-Kai Lin and Elaine Shi
-
2020/239 ( PDF )
- Viktoria: A new Paradigm for Hash Functions
- Edimar Veríssimo
-
2020/238 ( PDF )
- Efficient ECM factorization in parallel with the Lyness map
- Andrew Hone
-
2020/237 ( PDF )
- On Security Notions for Encryption in a Quantum World
- Céline Chevalier and Ehsan Ebrahimi and Quoc-Huy Vu
-
2020/236 ( PDF )
- Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21
- Mridul Nandi
-
2020/235 ( PDF )
- Statistical Zaps and New Oblivious Transfer Protocols
- Vipul Goyal and Abhishek Jain and Zhengzhong Jin and and Giulio Malavolta
-
2020/234 ( PDF )
- Application of commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups to Key Exchange Protocol
- Ruslan V. Skuratovskii and Aled Williams
-
2020/233 ( PDF )
- Key-Homomorphic Pseudorandom Functions from LWE with a Small Modulus
- Sam Kim
-
2020/232 ( PDF )
- Combiners for AEAD
- Bertram Poettering and Paul Rösler
-
2020/231 ( PDF )
- Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions
- Nuttapong Attrapadung and Junichi Tomida
-
2020/230 ( PDF )
- Lattice analysis on MiNTRU problem
- Changmin Lee and Alexandre Wallet
-
2020/229 ( PDF )
- Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications
- Itai Dinur
-
2020/228 ( PDF )
- Optimal Broadcast Encryption from Pairings and LWE
- Shweta Agrawal and Shota Yamada
-
2020/227 ( PDF )
- About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10
- Yindong Chen, Limin Lin, Chuliang Wei
-
2020/226 ( PDF )
- Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol
- Meher Krishna Duggirala . and . Ravi Duggirala . and . Krishna Subba Rao Pulugurtha
-
2020/225 ( PDF )
- Generic-Group Delay Functions Require Hidden-Order Groups
- Lior Rotem and Gil Segev and Ido Shahaf
-
2020/224 ( PDF )
- Security under Message-Derived Keys: Signcryption in iMessage
- Mihir Bellare and Igors Stepanovs
-
2020/223 ( PDF )
- Compact NIZKs from Standard Assumptions on Bilinear Maps
- Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
-
2020/222 ( PDF )
- Improving Speed and Security in Updatable Encryption Schemes
- Dan Boneh and Saba Eskandarian and Sam Kim and Maurice Shih
-
2020/221 ( PDF )
- Multiparty Reusable Non-Interactive Secure Computation
- Fabrice Benhamouda and Huijia Lin
-
2020/220 ( PDF )
- Remote Side-Channel Attacks on Anonymous Transactions
- Florian Tramèr and Dan Boneh and Kenneth G. Paterson
-
2020/219 ( PDF )
- Multi-Client Functional Encryption for Separable Functions
- Michele Ciampi and Luisa Siniscalchi and Hendrik Waldner
-
2020/218 ( PDF )
- Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs
- Ehsan Aerabi and Milad Bohlouli and MohammadHasan Ahmadi Livany and Mahdi Fazeli and Athanasios Papadimitriou and David Hely
-
2020/217 ( PDF )
- SynFi: Automatic Synthetic Fingerprint Generation
- M. Sadegh Riazi and Seyed M. Chavoshian and Farinaz Koushanfar
-
2020/216 ( PDF )
- Black-Box Constructions of Bounded-Concurrent Secure Computation
- Sanjam Garg and Xiao Liang and Omkant Pandey and Ivan Visconti
-
2020/215 ( PDF )
- Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption
- Megumi Ando and Anna Lysyanskaya
-
2020/214 ( PDF )
- Thresholdizing HashEdDSA: MPC to the Rescue
- Charlotte Bonte and Nigel P. Smart and Titouan Tanguy
-
2020/213 ( PDF )
- Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound
- Akinori Hosoyamada and Yu Sasaki
-
2020/212 ( PDF )
- Isogenies of certain abelian varieties over finite fields with p-ranks zero
- Steve Thakur
-
2020/211 ( PDF )
- Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle
- Davide Bellizia and Olivier Bronchain and Gaëtan Cassiers and Vincent Grosso and Chun Guo and Charles Momin and Olivier Pereira and Thomas Peters and François-Xavier Standaert
-
2020/210 ( PDF )
- SITM: See-In-The-Middle--Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers
- Shivam Bhasin and Jakub Breier and Xiaolu Hou and Dirmanto Jap and Romain Poussier and Siang Meng Sim
-
2020/209 ( PDF )
- Adaptive Simulation Security for Inner Product Functional Encryption
- Shweta Agrawal and Benoît Libert and Monosij Maitra and Radu Titiu
-
2020/208 ( PDF )
- Random Integer Lattice Generation via HNF
- Gengran Hu and Lin You and Liqin Hu and Hui Wang
-
2020/207 ( PDF )
- A Framework for Universally Composable Publicly Verifiable Cryptographic Protocols
- Carsten Baum and Bernardo David and Rafael Dowsley
-
2020/206 ( -- withdrawn -- )
- A Post-Quantum Non-Interactive Key-Exchange Protocol from Coding Theory
- Jean-Francois Biasse and Giacomo Micheli and Edoardo Persichetti and Paolo Santini
-
2020/205 ( PDF )
- SodsBC: Stream of Distributed Secrets for Quantum-safe Blockchain
- Shlomi Dolev and Ziyu Wang
-
2020/204 ( PDF )
- Cryptographic Reverse Firewalls for Interactive Proof Systems
- Chaya Ganesh and Bernardo Magri and Daniele Venturi
-
2020/203 ( PDF )
- MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework
- Thang Hoang and Jorge Guajardo and Attila A. Yavuz
-
2020/202 ( PDF )
- Strong Anti-SAT: Secure and Effective Logic Locking
- Yuntao Liu and Michael Zuzak and Yang Xie and Abhishek Chakraborty and Ankur Srivastava
-
2020/201 ( PDF )
- A Survey on Neural Trojans
- Yuntao Liu and Ankit Mondal and Abhishek Chakraborty and Michael Zuzak and Nina Jacobsen and Daniel Xing and Ankur Srivastava
-
2020/200 ( PDF )
- Exploring the Golden Mean Between Leakage and Fault Resilience and Practice
- Christoph Dobraunig and Bart Mennink and Robert Primas
-
2020/199 ( PDF )
- Improvement on a Masked White-box Cryptographic Implementation
- Seungkwang Lee and Myungchul Kim
-
2020/198 ( PDF )
- MPSign: A Signature from Small-Secret Middle-Product Learning with Errors
- Shi Bai and Dipayan Das and Ryo Hiromasa and Miruna Rosca and Amin Sakzad and Damien Stehlé and Ron Steinfeld and Zhenfei Zhang
-
2020/197 ( PDF )
- Dynamic Decentralized Functional Encryption
- Jérémy Chotard and Edouard Dufour-Sans and Romain Gay and Duong Hieu Phan and David Pointcheval
-
2020/196 ( PDF )
- Trustless Groups of Unknown Order with Hyperelliptic Curves
- Samuel Dobson and Steven D. Galbraith and Benjamin Smith
-
2020/195 ( PDF )
- Replicated state machines without replicated execution
- Jonathan Lee and Kirill Nikitin and Srinath Setty
-
2020/194 ( PDF )
- Adaptively Secure ABE for DFA from k-Lin and More
- Junqing Gong and Hoeteck Wee
-
2020/193 ( PDF )
- PSI from PaXoS: Fast, Malicious Private Set Intersection
- Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai
-
2020/192 ( -- withdrawn -- )
- Certificateless Homomorphic Signature Scheme for Network Coding
- Jinyong Chang and Bilin Shao and Yanyan Ji and Genqing Bian
-
2020/191 ( PDF )
- Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE
- Zvika Brakerski and Vinod Vaikuntanathan
-
2020/190 ( PDF )
- Proof of Necessary Work: Succinct State Verification with Fairness Guarantees
- Assimakis Kattis and Joseph Bonneau
-
2020/189 ( PDF )
- Guaranteed Output Delivery Comes Free in Honest Majority MPC
- Vipul Goyal and Yifan Song and Chenzhi Zhu
-
2020/188 ( PDF )
- Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
- Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer
-
2020/187 ( PDF )
- Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack
- Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart
-
2020/186 ( PDF )
- Bitcoin Crypto–Bounties for Quantum Capable Adversaries
- Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt
-
2020/185 ( PDF )
- Hardware Private Circuits: From Trivial Composition to Full Verification
- Gaëtan Cassiers and Benjamin Grégoire and Itamar Levi and François-Xavier Standaert
-
2020/184 ( PDF )
- Fair and Decentralized Exchange of Digital Goods
- Ariel Futoransky and Carlos Sarraute and Daniel Fernandez and Matias Travizano and Ariel Waissbein
-
2020/183 ( PDF )
- A note on secure multiparty computation via higher residue symbols
- Ignacio Cascudo and Reto Schnyder
-
2020/182 ( PDF )
- An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
- Maria Eichlseder and Lorenzo Grassi and Reinhard Lüftenegger and Morten Øygarden and Christian Rechberger and Markus Schofnegger and Qingju Wang
-
2020/181 ( PDF )
- $L_1$-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space
- Kohei Nakagawa and Hiroshi Onuki and Atsushi Takayasu and Tsuyoshi Takagi
-
2020/180 ( PDF )
- Multi-key Fully-Homomorphic Encryption in the Plain Model
- Prabhanjan Ananth and Abhishek Jain and ZhengZhong Jin and Giulio Malavolta
-
2020/179 ( PDF )
- Mind the Middle Layer: The HADES Design Strategy Revisited
- Nathan Keller and Asaf Rosemarin
-
2020/178 ( PDF )
- A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device
- Santosh Ghosh and Luis S Kida and Soham Jayesh Desai and Reshma Lal
-
2020/177 ( PDF )
- Revisiting (R)CCA Security and Replay Protection
- Christian Badertscher and Ueli Maurer and Christopher Portmann and Guilherme Rito
-
2020/176 ( PDF )
- Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version)
- Eugene Frimpong and Alexandros Bakas and Hai-Van Dang and Antonis Michalas
-
2020/175 ( PDF )
- Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
- Stefan Dziembowski and Grzegorz Fabiański and Sebastian Faust and Siavash Riahi
-
2020/174 ( PDF )
- On Selective-Opening Security of Deterministic Primitives
- Mohammad Zaheri and Adam O'Neill
-
2020/173 ( PDF )
- Securing Proof-of-Work Ledgers via Checkpointing
- Dimitris Karakostas and Aggelos Kiayias
-
2020/172 ( PDF )
- Qubit-based Unclonable Encryption with Key Recycling
- Daan Leermakers and Boris Skoric
-
2020/171 ( PDF )
- High Performance Logistic Regression for Privacy-Preserving Genome Analysis
- Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen and Ariel Todoki
-
2020/170 ( PDF )
- Reusable Two-Round MPC from DDH
- James Bartusek and Sanjam Garg and Daniel Masny and Pratyay Mukherjee
-
2020/169 ( PDF )
- Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE)
- Prabhanjan Ananth and Abhishek Jain and Zhengzhong Jin
-
2020/168 ( PDF )
- Improved Classical and Quantum Algorithms for Subset-Sum
- Xavier Bonnetain and Rémi Bricout and André Schrottenloher and Yixin Shen
-
2020/167 ( PDF )
- Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning
- Jinhyun So and Basak Guler and A. Salman Avestimehr
-
2020/166 ( PDF )
- Non Atomic Payment Splitting in Channel Networks
- Stefan Dziembowski and Paweł Kędzior
-
2020/165 ( PDF )
- Subsampling and Knowledge Distillation On Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations
- Aron Gohr and Sven Jacob and Werner Schindler
-
2020/164 ( PDF )
- From discrete-log to lattices: maybe the real lessons were our broken schemes along the way?
- Alex Bienstock and Allison Bishop and Eli Goldin and Garrison Grogan and Victor Lecomte
-
2020/163 ( PDF )
- Impossibility Results for Lattice-Based Functional Encryption Schemes
- Akin Ünal
-
2020/162 ( PDF )
- A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity
- Ignacio Cascudo and Jaron Skovsted Gundersen
-
2020/161 ( PDF )
- Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact
- Hanlin Liu and Yu Yu and Shuoyao Zhao and Jiang Zhang and Wenling Liu
-
2020/160 ( PDF )
- Solving Some Affine Equations over Finite Fields
- Sihem Mesnager and Kwang Ho Kim and Jong Hyok Choe and Dok Nam Lee
-
2020/159 ( PDF )
- Privacy-preserving collaborative machine learning on genomic data using TensorFlow
- Cheng Hong and Zhicong Huang and Wen-jie Lu and Hunter Qu and Li Ma and Morten Dahl and Jason Mancuso
-
2020/158 ( PDF )
- Jump index in T-functions for designing a new basic structure of stream ciphers
- Ali Hadipour and Seyed Mahdi Sajadieh and Raheleh Afifi
-
2020/157 ( PDF )
- Multi-Source Non-Malleable Extractors and Applications
- Vipul Goyal and Akshayaram Srinivasan and Chenzhi Zhu
-
2020/156 ( PDF )
- Phantom: An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts
- Xing Li and Yi Zheng and Kunxian Xia and Tongcheng Sun and John Beyler
-
2020/155 ( PDF )
- Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference
- Yifan Tian and Laurent Njilla and Jiawei Yuan and Shucheng Yu
-
2020/154 ( PDF )
- Combiners for Functional Encryption, Unconditionally
- Aayush Jain and Nathan Manohar and Amit Sahai
-
2020/153 ( PDF )
- Constructing Secure Multi-Party Computation with Identifiable Abort
- Nicholas-Philip Brandt and Sven Maier and Tobias Müller and Jörn Müller-Quade
-
2020/152 ( PDF )
- Compressed $\Sigma$-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics
- Thomas Attema and Ronald Cramer
-
2020/151 ( PDF )
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
- Wouter Castryck and Jana Sotáková and Frederik Vercauteren
-
2020/150 ( PDF )
- On the Security of NTS-KEM in the Quantum Random Oracle Model
- Varun Maram
-
2020/149 ( PDF )
- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage
- Matteo Campanelli and Dario Fiore and Nicola Greco and Dimitris Kolonelos and Luca Nizzardo
-
2020/148 ( PDF )
- Determining the Core Primitive for Optimally Secure Ratcheting
- Fatih Balli and Paul Rösler and Serge Vaudenay
-
2020/147 ( PDF )
- Non-Malleability against Polynomial Tampering
- Marshall Ball and Eshan Chattopadhyay and Jyun-Jie Liao and Tal Malkin and Li-Yang Tan
-
2020/146 ( PDF )
- Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security
- Roman Langrehr and Jiaxin Pan
-
2020/145 ( PDF )
- Self-Secured PUF: Protecting the Loop PUF by Masking
- Lars Tebelmann and Jean-Luc Danger and Michael Pehl
-
2020/144 ( PDF )
- Double-Base Chains for Scalar Multiplications on Elliptic Curves
- Wei Yu and Saud Al Musa and Bao Li
-
2020/143 ( PDF )
- Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT
- Hailong Yao and Caifen Wang* and Xingbing Fu and Chao Liu and Bin Wu and Fagen Li
-
2020/142 ( PDF )
- Network-Agnostic State Machine Replication
- Erica Blum and Jonathan Katz and Julian Loss
-
2020/141 ( PDF )
- Deterministic-Prover Zero-Knowledge Proofs
- Hila Dahari and Yehuda Lindell
-
2020/140 ( PDF )
- PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model
- Shaoquan Jiang and Guang Gong and Jingnan He and Khoa Nguyen and Huaxiong Wang
-
2020/139 ( PDF )
- Going Beyond Dual Execution: MPC for Functions with Efficient Verification
- Carmit Hazay and abhi shelat and Muthuramakrishnan Venkitasubramaniam
-
2020/138 ( PDF )
- Smart Contract Derivatives
- Kostis Karantias and Aggelos Kiayias and Dionysis Zindros
-
2020/137 ( PDF )
- Consistency for Functional Encryption
- Christian Badertscher and Aggelos Kiayias and Markulf Kohlweiss and Hendrik Waldner
-
2020/136 ( PDF )
- Stacked Garbling for Disjunctive Zero-Knowledge Proofs
- David Heath and Vladimir Kolesnikov
-
2020/135 ( PDF )
- Threshold Ring Signatures: New Definitions and Post-Quantum Security
- Abida Haque and Alessandra Scafuro
-
2020/134 ( PDF )
- Malicious Security Comes Free in Honest-Majority MPC
- Vipul Goyal and Yifan Song
-
2020/133 ( PDF )
- Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware
- Souradyuti Paul and Ananya Shrivastava
-
2020/132 ( PDF )
- Boosting Verifiable Computation on Encrypted Data
- Dario Fiore and Anca Nitulescu and David Pointcheval
-
2020/131 ( PDF )
- Coin Tossing with Lazy Defense: Hardness of Computation Results
- Hamidreza Amini Khorasgani and Hemanta K. Maji and Mingyuan Wang
-
2020/130 ( PDF )
- Breaking the $O(\sqrt n)$-Bits Barrier: Byzantine Agreement with Polylog Bits Per-Party
- Elette Boyle and Ran Cohen and Aarushi Goel
-
2020/129 ( PDF )
- Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
- Juliane Krämer and Patrick Struck
-
2020/128 ( PDF )
- LegRoast: Efficient post-quantum signatures from the Legendre PRF
- Ward Beullens and Cyprien Delpech de Saint Guilhem
-
2020/127 ( PDF )
- Fifty Shades of Ballot Privacy: Privacy against a Malicious Board
- Véronique Cortier and Joseph Lallemand and Bogdan Warinschi
-
2020/126 ( PDF )
- Public-Key Puncturable Encryption: Modular and Compact Constructions
- Shi-Feng Sun and Amin Sakzad and Ron Steinfeld and Joseph Liu and Dawu Gu
-
2020/125 ( PDF )
- Oblivious Parallel Tight Compaction
- Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Enoch Peserico and Elaine Shi
-
2020/124 ( PDF )
- Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512
- Ali El Kaafarani and Shuichi Katsumata and Federico Pintore
-
2020/123 ( PDF )
- Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains
- Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov
-
2020/122 ( PDF )
- Verifiable Inner Product Encryption Scheme
- Najmeh Soroush and Vincenzo Iovino and Alfredo Rial and Peter B. Roenne and Peter Y. A. Ryan
-
2020/121 ( PDF )
- When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead
- Hao Chen and Ilia Iliashenko and Kim Laine
-
2020/120 ( PDF )
- The randomized slicer for CVPP: sharper, faster, smaller, batchier
- Léo Ducas and Thijs Laarhoven and Wessel P.J. van Woerden
-
2020/119 ( PDF )
- Hardness of LWE on General Entropic Distributions
- Zvika Brakerski and Nico Döttling
-
2020/118 ( PDF )
- InfoCommit: Information-Theoretic Polynomial Commitment and Verification
- Saeid Sahraei and Salman Avestimehr
-
2020/117 ( PDF )
- Efficient BIKE Hardware Design with Constant-Time Decoder
- Andrew Reinders and Rafael Misoczki and Santosh Ghosh and Manoj Sastry
-
2020/116 ( PDF )
- Separating Two-Round Secure Computation from Oblivious Transfer
- Benny Applebaum and Zvika Brakerski and Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan
-
2020/115 ( PDF )
- A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
- Xavier Boyen and Thomas Haines and Johannes Mueller
-
2020/114 ( PDF )
- A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
- Antoine Delignat-Lavaud and Cédric Fournet and Bryan Parno and Jonathan Protzenko and Tahina Ramananandro and Jay Bosamiya and Joseph Lallemand and Itsaka Rakotonirina and Yi Zhou
-
2020/113 ( PDF )
- New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve
- Madhurima Mukhopadhyay and Palash Sarkar and Shashank Singh and Emmanuel Thome
-
2020/112 ( PDF )
- A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography
- Patrick Karl and Michael Tempelmeier
-
2020/111 ( PDF )
- Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
- Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
-
2020/110 ( PDF )
- Blazing Fast OT for Three-Round UC OT Extension
- Ran Canetti and Pratik Sarkar and Xiao Wang
-
2020/109 ( PDF )
- Fixing the Achilles Heel of E-Voting: The Bulletin Board
- Lucca Hirschi and Lara Schmid and David Basin
-
2020/108 ( PDF )
- Practical Forgeries for ORANGE
- Christoph Dobraunig and Florian Mendel and Bart Mennink
-
2020/107 ( PDF )
- One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication
- Ryan Amos and Marios Georgiou and Aggelos Kiayias and Mark Zhandry
-
2020/106 ( PDF )
- Relaxed freshness in component authentication
- Frank Schuhmacher
-
2020/105 ( PDF )
- MCU intrinsic group features for component authentication
- Frank Schuhmacher
-
2020/104 ( PDF )
- On the Security Goals of White-Box Cryptography
- Estuardo Alpirez Bock and Alessandro Amadori and Chris Brzuska and Wil Michiels
-
2020/103 ( PDF )
- Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128
- Boxin Zhao and Xiaoyang Dong and Keting Jia and Willi Meier
-
2020/102 ( PDF )
- New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
- Boxin Zhao and Xiaoyang Dong and Keting Jia
-
2020/101 ( PDF )
- A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future
- Haibat Khan and Keith M. Martin
-
2020/100 ( PDF )
- A direct proof of APN-ness of the Kasami functions
- Claude Carlet and Kwang Ho Kim and Sihem Mesnager
-
2020/099 ( PDF )
- Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange
- Benjamin Dowling and Torben Brandt Hansen and Kenneth G. Paterson
-
2020/098 ( PDF )
- Improved key recovery on the Legendre PRF
- Novak Kaluđerović and Thorsten Kleinjung and Dusan Kostic
-
2020/097 ( PDF )
- Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard
- Stanislav S. Malakhov
-
2020/096 ( PDF )
- Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons
- David Galindo and Jia Liu and Mihai Ordean and Jin-Mann Wong
-
2020/095 ( PDF )
- SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors
- Zhongxiang Zheng and Anyu Wang and Haining Fan and Chunhuan Zhao and Chao Liu and Xue Zhang
-
2020/094 ( PDF )
- On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms
- Michael Davidson and Tyler Diamond
-
2020/093 ( PDF )
- A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
- Romain Gay
-
2020/092 ( PDF )
- Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees
- Daniel Jost and Ueli Maurer
-
2020/091 ( PDF )
- Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption
- Jonathan Takeshita and Matthew Schoenbauer and Ryan Karl and Taeho Jung
-
2020/090 ( PDF )
- Witness Maps and Applications
- Suvradip Chakraborty and Manoj Prabhakaran and Daniel Wichs
-
2020/089 ( PDF )
- The MILP-Aided Conditional Differential Attack and Its Application to Trivium
- Chen-Dong Ye and Tian Tian and Fan-Yang Zeng
-
2020/088 ( PDF )
- Streamlet: Textbook Streamlined Blockchains
- Benjamin Y Chan and Elaine Shi
-
2020/087 ( PDF )
- Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey)
- Elaine Shi
-
2020/086 ( PDF )
- Bootstrapping in FHEW-like Cryptosystems
- Daniele Micciancio and Yuriy Polyakov
-
2020/085 ( PDF )
- Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems
- Ben Nassi and Dudi Nassi and Raz Ben-Netanel and Yisroel Mirsky and Oleg Drokin and Yuval Elovici
-
2020/084 ( PDF )
- Bandwidth-efficient threshold EC-DSA
- Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
-
2020/083 ( PDF )
- Metal: A Metadata-Hiding File-Sharing System
- Weikeng Chen and Raluca Ada Popa
-
2020/082 ( PDF )
- Random Walks and Concurrent Zero-Knowledge
- Anand Aiyer and Xiao Liang and Nilu Nalini and Omkant Pandey
-
2020/081 ( PDF )
- Efficient polynomial commitment schemes for multiple points and polynomials
- Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon
-
2020/080 ( PDF )
- Better Secret-Sharing via Robust Conditional Disclosure of Secrets
- Benny Applebaum and Amos Beimel and Oded Nir and Naty Peter
-
2020/079 ( PDF )
- Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective
- Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
-
2020/078 ( PDF )
- Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo
- Kentaro Tamura and Yutaka Shikano
-
2020/077 ( PDF )
- Improved Quantum Circuits for Elliptic Curve Discrete Logarithms
- Thomas Häner and Samuel Jaques and Michael Naehrig and Martin Roetteler and Mathias Soeken
-
2020/076 ( PDF )
- Wyner-Ziv reconciliation for key exchange based on Ring-LWE
- Charbel Saliba and Laura Luzzi and Cong Ling
-
2020/075 ( PDF )
- Memory-Tight Reductions for Practical Key Encapsulation Mechanisms
- Rishiraj Bhattacharyya
-
2020/074 ( PDF )
- Rolling up sleeves when subversion's in a field?
- Daniel R. L. Brown
-
2020/073 ( PDF )
- Anonymous Symmetric-Key Communication
- Fabio Banfi and Ueli Maurer
-
2020/072 ( PDF )
- Efficient Anonymous Tokens with Private Metadata Bit
- Ben Kreuter and Tancrede Lepoint and Michele Orrù and Mariana Raykova
-
2020/071 ( PDF )
- Post-Quantum Authentication in TLS 1.3: A Performance Study
- Dimitrios Sikeridis and Panos Kampanakis and Michael Devetsikiotis
-
2020/070 ( PDF )
- On Instantiating the Algebraic Group Model from Falsifiable Assumptions
- Thomas Agrikola and Dennis Hofheinz and Julia Kastner
-
2020/069 ( PDF )
- RSA and redactable blockchains
- Dima Grigoriev and Vladimir Shpilrain
-
2020/068 ( PDF )
- Further Clarification on Mantin's Digraph Repetition Bias in RC4
- Pranab Chakraborty and Subhamoy Maitra
-
2020/067 ( PDF )
- Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse
- Taylor R Campbell
-
2020/066 ( PDF )
- Talek: Private Group Messaging with Hidden Access Patterns
- Raymond Cheng and William Scott and Elisaweta Masserova and Irene Zhang and Vipul Goyal and Thomas Anderson and Arvind Krishnamurthy and Bryan Parno
-
2020/065 ( PDF )
- A Performant, Misuse-Resistant API for Primality Testing
- Jake Massimo and Kenneth G. Paterson
-
2020/064 ( PDF )
- Dual System in Lattice: Fully Secure ABE from LWE Assumption
- Geng Wang and Ming Wan and Zhen Liu and Dawu Gu
-
2020/063 ( PDF )
- Attack on LAC Key Exchange in Misuse Situation
- Aurelien Greuet and Simon Montoya and Guenael Renault
-
2020/062 ( PDF )
- Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
- Behzad Abdolmaleki and Sebastian Ramacher and Daniel Slamanig
-
2020/061 ( PDF )
- Simple Schnorr Signature with Pedersen Commitment as Key
- Gary Yu
-
2020/060 ( PDF )
- Auditable Asymmetric Password Authenticated Public Key Establishment
- Antonio Faonio and Maria Isabel Gonzalez Vasco and Claudio Soriente and Hien Thi Thu Truong
-
2020/059 ( PDF )
- ARX-KW, a family of key wrapping constructions using SipHash and ChaCha
- Satō Shinichi
-
2020/058 ( PDF )
- Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis
- Guilherme Perin and Ileana Buhan and Stjepan Picek
-
2020/057 ( PDF )
- On the smoothing parameter and last minimum of random orthogonal lattices
- Elena Kirshanova and Huyen Nguyen and Damien Stehlé and Alexandre Wallet
-
2020/056 ( PDF )
- AKCN-E8: Compact and Flexible KEM from Ideal Lattice
- Zhengzhong JIn and Yunlei Zhao
-
2020/055 ( PDF )
- When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
- Alejandro Cabrera Aldaya and Billy Bob Brumley
-
2020/054 ( PDF )
- Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA
- Wen Wang and Shanquan Tian and Bernhard Jungk and Nina Bindel and Patrick Longa and Jakub Szefer
-
2020/053 ( PDF )
- Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems"
- Yasuhiko Ikematsu and Shuhei Nakamura
-
2020/052 ( PDF )
- Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
- Mohamed Tolba and Muhammad ElSheikh and Amr M. Youssef
-
2020/051 ( PDF )
- Low-Latency Hardware Masking with Application to AES
- Pascal Sasdrich and Begül Bilgin and Michael Hutter and Mark Marson
-
2020/050 ( PDF )
- Delphi: A Cryptographic Inference Service for Neural Networks
- Pratyush Mishra and Ryan Lehmkuhl and Akshayaram Srinivasan and Wenting Zheng and Raluca Ada Popa
-
2020/049 ( PDF )
- ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
- Erdem Alkim and Hülya Evkan and Norman Lahr and Ruben Niederhagen and Richard Petri
-
2020/048 ( PDF )
- Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage
- Changshe Ma and Yiping Gu and Hongfei Li
-
2020/047 ( PDF )
- New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version)
- Tianshuo Cong and Ximing Fu and Xuting Zhou and Yuli Zou and Haining Fan
-
2020/046 ( PDF )
- On Analysis of Lightweight Stream Ciphers with Keyed Update
- Orhun Kara and Muhammed F. Esgin
-
2020/045 ( PDF )
- Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6
- Haibat Khan and Benjamin Dowling and Keith M. Martin
-
2020/044 ( PDF )
- Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts
- Alexander Chepurnoy and Amitabh Saxena
-
2020/043 ( PDF )
- Zone Encryption with Anonymous Authentication for V2V Communication
- Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa
-
2020/042 ( PDF )
- BLAZE: Blazing Fast Privacy-Preserving Machine Learning
- Arpita Patra and Ajith Suresh
-
2020/041 ( PDF )
- Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders
- Aggelos Kiayias and Saad Quader and Alexander Russell
-
2020/040 ( PDF )
- A Compact and Scalable Hardware/Software Co-design of SIKE
- Pedro Maat C. Massolino and Patrick Longa and Joost Renes and Lejla Batina
-
2020/039 ( PDF )
- Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis
- Damien Robissout and Gabriel Zaid and Brice Colombier and Lilian Bossuet and Amaury Habrard
-
2020/038 ( PDF )
- Bitstream Modification Attack on SNOW 3G
- Michail Moraitis and Elena Dubrova
-
2020/037 ( PDF )
- Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput
- Matthias Fitzi and Peter Gaži and Aggelos Kiayias and Alexander Russell
-
2020/036 ( PDF )
- Analysis on Aigis-Enc: asymmetrical and symmetrical
- Yupu Hu and Siyue Dong and Xingting Dong
-
2020/035 ( PDF )
- Constant-round Dynamic Group Key Exchange from RLWE Assumption
- Rakyong Choi and Dongyeon Hong and Kwangjo Kim
-
2020/034 ( PDF )
- SkyEye: A Traceable Scheme for Blockchain
- Tianjun Ma and Haixia Xu and Peili Li
-
2020/033 ( PDF )
- Scalable Open-Vote Network on Ethereum
- Mohamed Seifelnasr and Hisham S. Galal and Amr M. Youssef
-
2020/032 ( PDF )
- A New Approach for the Implementation of Binary Matrices Using SLP Applications
- Mahdi Sajadieh and Mohsen Mousavi
-
2020/031 ( PDF )
- Locally Decodable Codes with Randomized Encoding
- Kuan Cheng and Xin Li and Yu Zheng
-
2020/030 ( PDF )
- K-Cipher: A Low Latency, Bit Length Parameterizable Cipher
- Michael Kounavis and Sergej Deutsch and Santosh Ghosh and David Durham
-
2020/029 ( PDF )
- Differentially-Private Multi-Party Sketching for Large-Scale Statistics
- Seung Geol Choi and Dana Dachman-Soled and Mukul Kulkarni and Arkady Yerukhimovich
-
2020/028 ( PDF )
- Verified Security of BLT Signature Scheme
- Denis Firsov and Ahto Buldas and Ahto Truu and Risto Laanoja
-
2020/027 ( PDF )
- On Roots Factorization for PQC Algorithms
- Alexander Maximov
-
2020/026 ( PDF )
- Post-Quantum Secure Architectures for Automotive Hardware Secure Modules
- Wen Wang and Marc Stöttinger
-
2020/025 ( PDF )
- Single Secret Leader Election
- Dan Boneh and Saba Eskandarian and Lucjan Hanzlik and Nicola Greco
-
2020/024 ( PDF )
- The Arwen Trading Protocols (Full Version)
- Ethan Heilman and Sebastien Lipmann and Sharon Goldberg
-
2020/023 ( PDF )
- Threshold Multi-Signature with an Offline Recovery Party
- Riccardo Longo and Alessio Meneghetti and Massimiliano Sala
-
2020/022 ( PDF )
- Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material)
- Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson
-
2020/021 ( PDF )
- eSIDH: the revenge of the SIDH
- Daniel Cervantes-Vázquez and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez
-
2020/020 ( PDF )
- Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes
- Shangqi Lai and Xingliang Yuan and Shi-Feng Sun and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Dongxi Liu
-
2020/019 ( PDF )
- Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains
- Suhyeon Lee and Seungjoo Kim
-
2020/018 ( PDF )
- Triptych: logarithmic-sized linkable ring signatures with applications
- Sarang Noether and Brandon Goodell
-
2020/017 ( PDF )
- Biometric-Authenticated Searchable Encryption
- Daniel Gardham and Mark Manulis and Constantin Cătălin Drăgan
-
2020/016 ( PDF )
- Short Threshold Dynamic Group Signatures
- Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa
-
2020/015 ( PDF )
- Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts
- Hao Chen and Wei Dai and Miran Kim and Yongsoo Song
-
2020/014 ( PDF )
- SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
- Gaëtan Leurent and Thomas Peyrin
-
2020/013 ( PDF )
- On the Cryptographic Hardness of Local Search
- Nir Bitansky and Idan Gerichter
-
2020/012 ( PDF )
- Cortex-M4 Optimizations for \{R,M\}LWE Schemes
- Erdem Alkim and Yusuf Alper Bilgin and Murat Cenk and François Gérard
-
2020/011 ( PDF )
- Towards Vehicular Digital Forensics from Decentralized Trust: An Accountable, Privacy-preservation, and Secure Realization
- Ming Li,Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo
-
2020/010 ( PDF )
- Double point compression for elliptic curves of $j$-invariant $0$
- Dmitrii Koshelev
-
2020/009 ( PDF )
- Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions
- Thomas Pornin
-
2020/008 ( PDF )
- Secret Sharing Schemes for Ports of Matroids of Rank 3
- Oriol Farràs
-
2020/007 ( PDF )
- On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts
- Nabil Alkeilani Alkadri and Rachid El Bansarkhani and Johannes Buchmann
-
2020/006 ( PDF )
- Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures
- André Chailloux and Thomas Debris-Alazard
-
2020/005 ( PDF )
- Lai-Massey Scheme Revisited
- M. R. Mirzaee Shamsabad and S. M. Dehnavi
-
2020/004 ( -- withdrawn -- )
- BPCEX: Towards Blockchain-based Privacy-preserving Currency Exchange
- Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
-
2020/003 ( -- withdrawn -- )
- New Constructions of Traceable Range Proofs: Towards Multiple Regulation and Joint Regulation
- Wulu Li and Lei Chen and Xin Lai and Xiao Zhang
-
2020/002 ( PDF )
- On a Conjecture of O'Donnell
- Qichun Wang
-
2020/001 ( PDF )
- Elliptic Curves of Nearly Prime Order
- Manoj Gyawali and Daniele Di Tullio
[ Cryptology ePrint archive ]