Cryptology ePrint Archive: Listing for 2021


2021/538 ( PDF )
A Composable Look at Updatable Encryption
Françoise Levy-dit-Vehel and Maxime Roméas
2021/537 ( PDF )
SoK: Exploring Blockchains Interoperability
Gang Wang
2021/536 ( PDF )
Analyzing the Potential of Transport Triggered Architecture for Lattice-based Cryptography Algorithms
Latif AKÇAY and Berna ÖRS
2021/535 ( PDF )
On the Possibility of Basing Cryptography on $\EXP \neq \BPP$
Yanyi Liu and Rafael Pass
2021/534 ( PDF )
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
Maura B. Paterson and Douglas R. Stinson
2021/533 ( PDF )
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU
Sijun Tan and Brian Knott and Yuan Tian and David J. Wu
2021/532 ( PDF )
Rainbow on Cortex-M4
Tung Chou and Matthias J. Kannwischer and Bo-Yin Yang
2021/531 ( PDF )
LogStack: Stacked Garbling with $O(b \log b)$ Computation
David Heath and Vladimir Kolesnikov
2021/530 ( PDF )
Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level
Yuan Yao and Tuna Tufan and Tarun Kathuria and Baris Ege and Ulkuhan Guler and Patrick Schaumont
2021/529 ( PDF )
SNARKpack: Practical SNARK Aggregation
Nicolas Gailly and Mary Maller and Anca Nitulescu
2021/528 ( PDF )
Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping
Denis Firsov and Henri Lakk and Ahto Truu
2021/527 ( PDF )
Solving discrete logarithm problem over prime fields using quantum annealing and $\frac{n^3}{2}$ logical qubits
Michał Wroński
2021/526 ( PDF )
Reinforcement Learning-based Design of Side-channel Countermeasures
Jorai Rijsdijk and Lichao Wu and Guilherme Perin and Stjepan Picek
2021/525 ( PDF )
On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis
Lichao Wu and Guilherme Perin
2021/524 ( PDF )
Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency
Kwangsu Lee
2021/523 ( PDF )
No Time to Hash: On Superefficient Entropy Accumulation
Yevgeniy Dodis and Siyao Guo and Noah Stephens-Davidowitz and Zhiye Xie
2021/522 ( PDF )
Public-key Cryptosystems and Signature Schemes from p-adic Lattices
Yingpu Deng and Lixia Luo and Yanbin Pan and Zhaonan Wang and Guanju Xiao
2021/521 ( PDF )
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation
Daniel Demmler and Stefan Katzenbeisser and Thomas Schneider and Tom Schuster and Christian Weinert
2021/520 ( PDF )
Optimal Randomized Partial Checking for Decryption Mix Nets
Thomas Haines and Johannes Mueller
2021/519 ( PDF )
Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment
Atakan Arslan and Muhammed Ali Bingöl
2021/518 ( PDF )
How to Share and Own a Secret
Victor Ermolaev and Gamze Tillem
2021/517 ( PDF )
Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity
Yanyi Liu and Rafael Pass
2021/516 ( PDF )
A new weak curve fault attack on ECIES: embedded point validation is not enough during decryption
Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Xi and Yuhang Wang
2021/515 ( PDF )
Generic Constructions of Revocable Hierarchical Identity-based Encryption
Keita Emura and Atsushi Takayasu and Yohei Watanabe
2021/514 ( PDF )
Non-Interactive Zero Knowledge from Sub-exponential DDH
Abhishek Jain and Zhengzhong Jin
2021/513 ( PDF )
On One-way Functions from ${\sf NP}$-Complete Problems
Yanyi Liu and Rafael Pass
2021/512 ( PDF )
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
Tapas Pal and Ratna Dutta
2021/511 ( PDF )
On (Weak) Simulation-Extractability of Universal zkSNARKs
Markulf Kohlweiss and Michał Zając
2021/510 ( PDF )
Signer and Message Ambiguity from a Variety of Keys
George Teseleanu
2021/509 ( PDF )
On using the same key pair for Ed25519 and an X25519 based KEM
Erik Thormarker
2021/508 ( PDF )
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs
Wonkyung Jung and Sangpyo Kim and Jung Ho Ahn and Jung Hee Cheon and Younho Lee
2021/507 ( PDF )
The t-wise Independence of Substitution-Permutation Networks
Tianren Liu and Stefano Tessaro and Vinod Vaikuntanathan
2021/506 ( PDF )
Delegating Supersingular Isogenies over $\mathbb{F}_{p^2}$ with Cryptographic Applications
Robi Pedersen and Osmanbey Uzunkol
2021/505 ( PDF )
Cryptanalysis of Boyen’s Attribute-Based Encryption Scheme in TCC 2013
Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada
2021/504 ( PDF )
A Generic Method for Investigating Nonsingular Galois NFSRs
Xiao-Juan Wang and Tian Tian and Wen-Feng Qi
2021/503 ( PDF )
Almost-Asynchronous MPC under Honest Majority, Revisited
Matthieu Rambaud and Antoine Urban
2021/502 ( PDF )
A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
Kwangsu Lee and Joon Sik Kim
2021/501 ( PDF )
zkHawk: Practical Private Smart Contracts from MPC-based Hawk
Aritra Banerjee and Michael Clear and Hitesh Tewari
2021/500 ( PDF )
Order-C Secure Multiparty Computation for Highly Repetitive Circuits
Gabrielle Beck and Aarushi Goel and Abhishek Jain and Gabriel Kaptchuk
2021/499 ( PDF )
Optimizing Registration Based Encryption
Kelong Cong and Karim Eldefrawy and Nigel P. Smart
2021/498 ( PDF )
SoK: Multi-Device Secure Instant Messaging
Antonio Dimeo and Felix Gohla and Daniel Goßen and Niko Lockenvitz
2021/497 ( PDF )
SoK: Design Tools for Side-Channel-Aware Implementations
Ileana Buhan and Lejla Batina and Yuval Yarom and Patrick Schaumont
2021/496 ( PDF )
Applications of SKREM-like symmetric key ciphers
Mircea Digulescu
2021/495 ( PDF )
Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One-Way Functions
Mircea Digulescu
2021/494 ( PDF )
Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures.
Surbhi Shaw and Ratna Dutta
2021/493 ( PDF )
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4
Ming-Shing Chen and Tung Chou and Markus Krausz
2021/492 ( PDF )
Classic McEliece on the ARM Cortex-M4
Ming-Shing Chen and Tung Chou
2021/491 ( PDF )
A toolbox for verifiable tally-hiding e-voting systems
Véronique Cortier and Pierrick Gaudry and Quentin Yang
2021/490 ( PDF )
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE
Chao Liu and Anyu Wang and Zhongxiang Zheng
2021/489 ( PDF )
ROSE: Robust Searchable Encryption with Forward and Backward Security and Practical Performance
Peng Xu and Willy Susilo and Wei Wang and Tianyang Chen and Qianhong Wu and Hai Jin
2021/488 ( PDF )
Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle
Javier Herranz and Ramiro Martínez and Manuel Sánchez
2021/487 ( PDF )
Xifrat Cryptanalysis - Compute the Mixing Function Without the Key
"Danny" Niu Jianfang
2021/486 ( PDF )
Security Analysis of End-to-End Encryption for Zoom Meetings
Takanori Isobe and Ryoma Ito
2021/485 ( PDF )
A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme
Ferhat Yaman and Ahmet Can Mert and Erdinç Öztürk and Erkay Savaş
2021/484 ( PDF )
Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF
Alireza Kavousi and Javad Mohajeri and Mahmoud Salmasizadeh
2021/483 ( PDF )
Masking Kyber: First- and Higher-Order Implementations
Joppe W. Bos and Marc Gourjon and Joost Renes and Tobias Schneider and Christine van Vredendaal
2021/482 ( PDF )
Inconsistency of Simulation and Practice in Delay-based Strong PUFs
Anita Aghaie and Amir Moradi
2021/481 ( PDF )
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Alexander Heinrich and Matthias Hollick and Thomas Schneider and Milan Stute and Christian Weinert
2021/480 ( PDF )
Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform
Jakub Klemsa
2021/479 ( PDF )
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Tim Fritzmann and Michiel Van Beirendonck and Debapriya Basu Roy and Patrick Karl and Thomas Schamberger and Ingrid Verbauwhede and Georg Sigl
2021/478 ( PDF )
TurboIKOS: Improved Non-interactive Zero Knowledge and Post-Quantum Signatures
Yaron Gvili and Julie Ha and Sarah Scheffler and Mayank Varia and Ziling Yang and Xinyuan Zhang
2021/477 ( PDF )
Side-Channel Attack on ROLLO Post-Quantum Cryptographic Scheme
Agathe Cheriere and Lina Mortajine and Tania Richmond and Nadia El Mrabet
2021/476 ( PDF )
Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions
Aaqib Bashir Dar and Mashhood Jeelani Lone and Nuzhat Hussain
2021/475 ( PDF )
Private Liquidity Matching using MPC
Shahla Atapoor and Nigel P. Smart and Younes Talibi Alaoui
2021/474 ( PDF )
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations
Fukang Liu and Takanori Isobe and Willi Meier
2021/473 ( PDF )
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations
Ryan Karl and Jonathan Takeshita and Alamin Mohammed and Aaron Striegel and and Taeho Jung
2021/472 ( PDF )
CryptoGram: Fast Private Calculations of Histograms over Multiple Users’ Inputs
Ryan Karl and Jonathan Takeshita and Alamin Mohammed and Aaron Striegel and Taeho Jung
2021/471 ( PDF )
Size, Speed, and Security: An Ed25519 Case Study
Cesar Pereida García and Sampo Sovio
2021/470 ( PDF )
Upslices, Downslices, and Secret-Sharing with Complexity of $1.5^n$
Benny Applebaum and Oded Nir
2021/469 ( PDF )
Entropoid Based Cryptography
Danilo Gligoroski
2021/468 ( PDF )
Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report)
Coşku Acay and Rolph Recto and Joshua Gancher and Andrew C. Myers and Elaine Shi
2021/467 ( PDF )
Key-schedule Security for the TLS 1.3 Standard
Chris Brzuska and Antoine Delignat-Lavaud and Christoph Egger and Cédric Fournet and Konrad Kohbrok and Markulf Kohlweiss
2021/466 ( -- withdrawn -- )
A New Key Agreement Scheme Based On A Well-Known Property Of Powers
Michele Fabbrini
2021/465 ( PDF )
Cryptanalysis of `MAKE'
Daniel Brown and Neal Koblitz and Jason LeGrow
2021/464 ( PDF )
iTimed: Cache Attacks on the Apple A10 Fusion SoC
Gregor Haas and Seetal Potluri and Aydin Aysu
2021/463 ( PDF )
Improving Recent Side-Channel Attacks Against the DES Key Schedule
Andreas Wiemers and Johannes Mittmann
2021/462 ( PDF )
SoK: How (not) to Design and Implement Post-Quantum Cryptography
James Howe and Thomas Prest and Daniel Apon
2021/461 ( PDF )
Second-Order SCA Security with almost no Fresh Randomness
Aein Rezaei Shahmirzadi and Amir Moradi
2021/460 ( PDF )
Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
Oleksiy Lisovets and David Knichel and Thorben Moos and Amir Moradi
2021/459 ( PDF )
SIRNN: A Math Library for Secure RNN Inference
Deevashwer Rathee and Mayank Rathee and Rahul Kranti Kiran Goli and Divya Gupta and Rahul Sharma and Nishanth Chandran and Aseem Rastogi
2021/458 ( PDF )
FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm
Gideon Samid
2021/457 ( PDF )
Non-Interactive Composition of Sigma-Protocols via Share-then-Hash
Masayuki Abe and Miguel Ambrona and Andrej Bogdanov and Miyako Ohkubo and Alon Rosen
2021/456 ( PDF )
Hardening Circuit-Design IP Against Reverse-Engineering Attacks
Animesh Chhotaray and Thomas Shrimpton
2021/455 ( PDF )
Guessing Bits: Improved Lattice Attacks on (EC)DSA
Chao Sun and Thomas Espitau and Mehdi Tibouchi and Masayuki Abe
2021/454 ( PDF )
Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security
Veronika Kuchta and Amin Sakzad and Damien Stehle and Ron Steinfeld and Shi-Feng Sun
2021/453 ( PDF )
Merkle^2: A Low-Latency Transparency Log System
Yuncong Hu and Kian Hooshmand and Harika Kalidhindi and Seung Jin Yang and Raluca Ada Popa
2021/452 ( PDF )
SAT-based Method to Improve Neural Distinguisher and Applications to SIMON
Zezhou Hou and Jiongjiong Ren and Shaozhen Chen
2021/451 ( PDF )
RepShard: Reputation-based Sharding Scheme Achieves Linearly Scaling Efficiency and Security Simultaneously
Gang Wang
2021/450 ( PDF )
RandChain: Practical Scalable Decentralized Randomness Attested by Blockchain
Gang Wang and Mark Nixon
2021/449 ( PDF )
Towards Cloud-assisted Industrial IoT Platform for Large-scale Continuous Condition Monitoring
Gang Wang and Mark Nixon and Mike Boudreaux
2021/448 ( PDF )
On the Memory-Tightness of Hashed ElGamal
Ashrujit Ghoshal and Stefano Tessaro
2021/447 ( PDF )
An Intimate Analysis of Cuckoo Hashing with a Stash
Daniel Noble
2021/446 ( PDF )
Towards practical GGM-based PRF from (Module-)Learning-with-Rounding
Chitchanok Chuengsatiansup and Damien Stehle
2021/445 ( PDF )
A Survey on Perfectly-Secure Verifiable Secret-Sharing
Anirudh C and Ashish Choudhury and Arpita Patra
2021/444 ( PDF )
Xifrat - Compact Public-Key Cryptosystems based on Quasigroups
Daniel Nager and "Danny" Niu Jianfang
2021/443 ( PDF )
Constructing a pairing-free certificateless proxy signature scheme from ECDSA
Cholun Kim
2021/442 ( PDF )
How to Backdoor a Cipher
Raluca Posteuca and Tomer Ashur
2021/441 ( PDF )
Watermarking PRFs from Lattices: Public Extract and Collusion Resistant
Yukun Wang and Mingqiang Wang
2021/440 ( PDF )
Two modifications for Loidreau's code-based cryptosystem
Wenshuo Guo and Fangwei Fu
2021/439 ( PDF )
Recovering the Key from the Internal State of Grain-128AEAD
Donghoon Chang and Meltem Sonmez Turan
2021/438 ( PDF )
More Efficient Shuffle Argument from Unique Factorization
Toomas Krips and Helger Lipmaa
2021/437 ( PDF )
Formal security analysis of MPC-in-the-head zero-knowledge protocols
Nikolaj Sidorenco and Sabine Oechsner and Bas Spitters
2021/436 ( PDF )
Algebraic Differential Fault Analysis on SIMON block cipher
Duc-Phong Le and Sze Ling Yeo and Khoongming Khoo
2021/435 ( PDF )
Non-Interactive Anonymous Router
Elaine Shi and Ke Wu
2021/434 ( PDF )
On the Power of Expansion: More Efficient Constructions in the Random Probing Model
Sonia Belaďd and Matthieu Rivain and Abdul Rahman Taleb
2021/433 ( PDF )
Formations for the Quantum Random Oracle
Aaram Yun
2021/432 ( PDF )
XORBoost: Tree Boosting in the Multiparty Computation Setting
Kevin Deforth and Marc Desgroseilliers and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev and Marius Vuille
2021/431 ( PDF )
Unbounded Multi-Party Computation from Learning with Errors
Prabhanjan Ananth and Abhishek Jain and Zhengzhong Jin and Giulio Malavolta
2021/430 ( PDF )
Lattice Enumeration on GPUs for fplll
Simon Pohmann and Marc Stevens and Jens Zumbrägel
2021/429 ( PDF )
New Practical Multivariate Signatures from a Nonlinear Modifier
Daniel Smith-Tone
2021/428 ( PDF )
A Coq proof of the correctness of X25519 in TweetNaCl
Peter Schwabe and Benoît Viguier and Timmy Weerwag and Freek Wiedijk
2021/427 ( PDF )
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks
Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu
2021/426 ( PDF )
Generic Plaintext Equality and Inequality Proofs (Extended Version)
Olivier Blazy and Xavier Bultel and Pascal Lafourcade and Octavio Perez Kempner
2021/425 ( PDF )
Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions
Yuqing Zhao and Wenqi Yu and Chun Guo
2021/424 ( PDF )
Security Analysis of SFrame
Takanori Isobe and Ryoma Ito and Kazuhiko Minematsu
2021/423 ( PDF )
On effective computations in special subsemigroups of polynomial transformations and protocol based multivariate cryptosystems
Vasyl Ustimenko
2021/422 ( PDF )
Stacking Sigmas: A Framework to Compose $\Sigma$-Protocols for Disjunctions
Aarushi Goel and Matthew Green and Mathias Hall-Andersen and Gabriel Kaptchuk
2021/421 ( PDF )
Candidate Obfuscation of Null Quantum Circuits and Witness Encryption for QMA
James Bartusek and Giulio Malavolta
2021/420 ( PDF )
Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52
Fabian Boemer and Sejun Kim and Gelila Seifu and Fillipe D.M. de Souza and Vinodh Gopal
2021/419 ( -- withdrawn -- )
On The Dihedral Coset Problem
Javad Doliskani
2021/418 ( PDF )
Ring-LWE over two-to-power cyclotomics is not hard
Hao Chen
2021/417 ( PDF )
History Binding Signature
Shlomi Dolev and Matan Liber
2021/416 ( PDF )
Cryptocurrencies with Security Policies and Two-Factor Authentication
Florian Breuer and Vipul Goyal and Giulio Malavolta
2021/415 ( PDF )
Efficient Verification of Optimized Code: Correct High-speed X25519
Marc Schoolderman and Jonathan Moerman and Sjaak Smetsers and Marko van Eekelen
2021/414 ( PDF )
Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings
Sook Yan Hue and Jason Chia and Ji-Jian Chin
2021/413 ( PDF )
Blind Polynomial Evaluation and Data Trading
Yi Liu and Qi Wang and Siu-Ming Yiu
2021/412 ( PDF )
Uncloneable Encryption, Revisited
Prabhanjan Ananth and Fatih Kaleoglu
2021/411 ( PDF )
Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions
Onur Gunlu and Peter Trifonov and Muah Kim and Rafael F. Schaefer and Vladimir Sidorenko
2021/410 ( PDF )
Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM
Shlomi Dolev and Stav Doolman
2021/409 ( PDF )
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols
Markulf Kohlweiss and Varun Madathil and Kartik Nayak and Alessandra Scafuro
2021/408 ( PDF )
Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding
Christian Majenz and Christian Schaffner and Mehrdad Tahmasbi
2021/407 ( PDF )
Improved Quantum Algorithms for the k-XOR Problem
André Schrottenloher
2021/406 ( PDF )
Disappearing Cryptography in the Bounded Storage Model
Jiaxin Guan and Mark Zhandry
2021/405 ( PDF )
Revisiting some results on APN and algebraic immune functions
Claude Carlet
2021/404 ( PDF )
Chain Reductions for Multi-Signatures
Mihir Bellare and Wei Dai
2021/403 ( PDF )
Atom: A Stream Cipher with Double Key Filter
Subhadeep Banik and Andrea Caforio and Takanori Isobe and Fukang Liu and Willi Meier and Kosei Sakamoto and Santanu Sarkar
2021/402 ( PDF )
Leakage Resilient Value Comparison With Application to Message Authentication
Christoph Dobraunig and Bart Mennink
2021/401 ( PDF )
Output Prediction Attacks on SPN Block Ciphers using Deep Learning
Hayato Kimura and Keita Emura and Takanori Isobe and Ryoma Ito and Kazuto Ogawa and Toshihiro Ohigashi
2021/400 ( PDF )
Size of IK00 Branching Program
Yupu Hu and Xingting Dong and Baocang Wang
2021/399 ( PDF )
Latus Incentive Scheme: Enabling Decentralization in Blockchains based on Recursive SNARKs
Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov
2021/398 ( PDF )
Cryptanalysis of the Binary Permuted Kernel Problem
Thales Bandiera Paiva and Routo Terada
2021/397 ( PDF )
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq
Carmine Abate and Philipp G. Haselwarter and Exequiel Rivas and Antoine Van Muylder and Théo Winterhalter and Catalin Hritcu and Kenji Maillard and Bas Spitters
2021/396 ( PDF )
LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action
Alessandro Barenghi and Jean-Francois Biasse and Edoardo Persichetti and Paolo Santini
2021/395 ( PDF )
On the Validity of Spoofing Attack Against Safe is the New Smart
Harishma Boyapally and Urbi Chatterjee and Debdeep Mukhopadhyay
2021/394 ( PDF )
Quantum Encryption with Certified Deletion: Public Key and Attribute-Based
Ryo Nishimaki and Takashi Yamakawa
2021/393 ( PDF )
Key Agreement with Correlated Noise and Multiple Entities or Enrollments
Onur Gunlu
2021/392 ( PDF )
How Private Are Commonly-Used Voting Rules?
Ao Liu and Yun Lu and Lirong Xia and Vassilis Zikas
2021/391 ( PDF )
New Standards for E-Voting Systems: Reflections on Source Code Examinations
Thomas Haines and Peter Roenne
2021/390 ( PDF )
Orthros: A Low-Latency PRF
Subhadeep Banik and Takanori Isobe and Fukang Liu and Kazuhiko Minematsu and Kosei Sakamoto
2021/389 ( PDF )
Physically Related Functions: A New Paradigm for Light-weight Key-Exchange
Durba Chatterjee and Harishma Boyapally and Sikhar Patranabis and Urbi Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
2021/388 ( PDF )
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball and Elette Boyle and Ran Cohen and Lisa Kohl and Tal Malkin and Pierre Meyer and Tal Moran
2021/387 ( PDF )
Quantum-access security of the Winternitz one-time signature scheme
Christian Majenz and Chanelle Matadah Manfouo and Maris Ozols
2021/386 ( PDF )
SAFELearn: Secure Aggregation for private FEderated Learning
Hossein Fereidooni and Samuel Marchal and Markus Miettinen and Azalia Mirhoseini and Helen Möllering and Thien Duc Nguyen and Phillip Rieger and Ahmad Reza Sadeghi and Thomas Schneider and Hossein Yalame and Shaza Zeitouni
2021/385 ( PDF )
Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices
Yasufumi Hashimoto
2021/384 ( PDF )
Analysis and Probing of Parallel Channels in the Lightning Network
Alex Biryukov and Gleb Naumenko and Sergei Tikhomirov
2021/383 ( PDF )
GLV+HWCD for 2y^2=x^3+x/GF(8^91+5)
Daniel R. L. Brown
2021/382 ( PDF )
Signatures with Tight Multi-User Security from Search Assumptions
Jiaxin Pan and Magnus Ringerud
2021/381 ( PDF )
Towards Practical and Round-Optimal Lattice-Based Threshold and Blind Signatures
Shweta Agrawal and Damien Stehle and Anshu Yadav
2021/380 ( PDF )
Certificateless Designated Verifier Proxy Signature
Cholun Kim
2021/379 ( PDF )
A Note on the Bias of Rotational Differential-Linear Distinguishers
Yunwen Liu and Zhongfeng Niu and Siwei Sun and Chao Li and Lei Hu
2021/378 ( PDF )
Multiparty Reusable Non-Interactive Secure Computation from LWE
Fabrice Benhamouda and Aayush Jain and Ilan Komargodski and Huijia Lin
2021/377 ( PDF )
Attacks and weaknesses of BLS aggregate signatures
Nguyen Thoi Minh Quan
2021/376 ( PDF )
On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds
Nai-Hui Chia and Kai-Min Chung and Qipeng Liu and Takashi Yamakawa
2021/375 ( PDF )
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines
Rafael Dowsley and Caleb Horst and Anderson C A Nascimento
2021/374 ( PDF )
ZXAD: Zero-knowledge Exit Abuse Detection for Tor
Akshaya Mani and Ian Goldberg
2021/373 ( PDF )
T5: Hashing Five Inputs with Three Compression Calls
Yevgeniy Dodis and Dmitry Khovratovich and Nicky Mouha and Mridul Nandi
2021/372 ( PDF )
Explicit connections between supersingular isogeny graphs and Bruhat–Tits trees
Laia Amorós and Annamaria Iezzi and Kristin Lauter and Chloe Martindale and Jana Sotáková
2021/371 ( PDF )
Construction of minimal linear codes with few weights from weakly regular plateaued functions
Ahmet Sinak
2021/370 ( PDF )
Nova: Recursive Zero-Knowledge Arguments from Folding Schemes
Abhiram Kothapalli and Srinath Setty and Ioanna Tzialla
2021/369 ( PDF )
Another Algebraic Decomposition Method for Masked Implementation
Shoichi Hirose
2021/368 ( PDF )
Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE
Aaron Hutchinson and Koray Karabina and Geovandro Pereira
2021/367 ( PDF )
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
Arnab Roy and Elena Andreeva and Jan Ferdinand Sauer
2021/366 ( PDF )
Multiparty Computation with Covert Security and Public Verifiability
Peter Scholl and Mark Simkin and Luisa Siniscalchi
2021/365 ( PDF )
Updatable Signatures and Message Authentication Codes
Valerio Cini and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks and Erkan Tairi
2021/364 ( PDF )
RAGHAV: A new low power S-P network encryption design for resource constrained environment
GAURAV BANSOD
2021/363 ( PDF )
Information Leakages in Code-based Masking: A Unified Quantification Approach
Wei Cheng and Sylvain Guilley and Claude Carlet and Jean-Luc Danger and Sihem Mesnager
2021/362 ( PDF )
Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning
Zezhou Hou and Jiongjiong Ren and Shaozhen Chen
2021/361 ( PDF )
Some Generic Constructions of Generalized Plateaued Functions
Jiaxin Wang Fang-Wei Fu
2021/360 ( PDF )
An Architecture for Blockchain-based Cloud Banking
Thuat Do
2021/359 ( PDF )
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso
2021/358 ( PDF )
Time- and Space-Efficient Arguments from Groups of Unknown Order
Alexander R. Block and Justin Holmgren and Alon Rosen and Ron D. Rothblum and Pratik Soni
2021/357 ( PDF )
AISY - Deep Learning-based Framework for Side-channel Analysis
Guilherme Perin and Lichao Wu and Stjepan Picek
2021/356 ( PDF )
Active Implementation of End-to-End Post-Quantum Encryption
Anton Tutoveanu
2021/355 ( PDF )
A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware
Georg Land and Pascal Sasdrich and Tim Güneysu
2021/354 ( PDF )
Efficient permutation protocol for MPC in the head
Peeter Laud
2021/353 ( PDF )
Succinct Publicly Verifiable Computation
Alonso González and Alexandros Zacharakis
2021/352 ( PDF )
A Configurable Hardware Implementation of XMSS
Jan Philipp Thoma and Tim Güneysu
2021/351 ( PDF )
Practical Dynamic Group Signatures Without Knowledge Extractors
Hyoseung Kim and Olivier Sanders and Michel Abdalla and Jong Hwan Park
2021/350 ( PDF )
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
Konstantinos Chalkias and Francois Garillot and Yashvanth Kondi and Valeria Nikolaenko
2021/349 ( PDF )
Post-quantum Resettably-Sound Zero Knowledge
Nir Bitansky and Michael Kellner and Omri Shmueli
2021/348 ( PDF )
Decoding supercodes of Gabidulin codes and applications to cryptanalysis
Maxime Bombar and Alain Couvreur
2021/347 ( PDF )
Attacking (EC)DSA With Partially Known Multiples of Nonces
Marios Adamoudis and Konstantinos A. Draziotis and Dimitrios Poulakis
2021/346 ( PDF )
Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security
Benny Applebaum and Eliran Kachlon and Arpita Patra
2021/345 ( PDF )
Private Blocklist Lookups with Checklist
Dmitry Kogan and Henry Corrigan-Gibbs
2021/344 ( PDF )
Efficient and Universally Composable Single Secret Leader Election from Pairings
Dario Catalano and Dario Fiore and Emanuele Giunta
2021/343 ( PDF )
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
Rishab Goyal and Jiahui Liu and Brent Waters
2021/342 ( PDF )
N-for-1 Auth: N-wise Decentralized Authentication via One Authentication
Weikeng Chen and Ryan Deng and Raluca Ada Popa
2021/341 ( PDF )
Clonable PUF: On the Design of PUFs That Share Equivalent Responses
Takashi Sato and Yuki Tanaka and Song Bian
2021/340 ( PDF )
Merkle Trees Optimized for Stateless Clients in Bitcoin
Bolton Bailey and Suryanarayana Sankagiri
2021/339 ( PDF )
Non-interactive distributed key generation and key resharing
Jens Groth
2021/338 ( PDF )
Lattice-Based Proof of Shuffle and Applications to Electronic Voting
Diego F. Aranha and Carsten Baum and Kristian Gjřsteen and Tjerand Silde and Thor Tunge
2021/337 ( PDF )
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Yu-Chi Chen and Masahiro Mambo
2021/336 ( PDF )
On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES
Nicolas T. Courtois and Matteo Abbondati and Hamy Ratoanina and Marek Grajek
2021/335 ( PDF )
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
Ohad Amon and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir
2021/334 ( PDF )
Post-Quantum Succinct Arguments
Alessandro Chiesa and Fermi Ma and Nicholas Spooner and Mark Zhandry
2021/333 ( PDF )
Sumcheck Arguments and their Applications
Jonathan Bootle and Alessandro Chiesa and Katerina Sotiraki
2021/332 ( PDF )
An $O(\log^2 p)$ Approach to Point-Counting on Elliptic Curves From a Prominent Family Over the Prime Field $\mathbb{F}_p$
Yuri Borissov and Miroslav Markov
2021/331 ( PDF )
A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications
Radhakrishna Bhat and N R Sunitha and S S Iyengar
2021/330 ( PDF )
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
Pooya Farshim and Louiza Khati and Yannick Seurin and Damien Vergnaud
2021/329 ( PDF )
Two Efficient Regulatory Confi dential Transaction Schemes
Min Yang and Changtong Xu and Zhe Xia and Li Wang and Qingshu Meng
2021/328 ( PDF )
Mixup Data Augmentation for Deep Learning Side-Channel Attacks
Karim M. Abdellatif
2021/327 ( PDF )
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions
Matteo Campanelli and Mathias Hall-Andersen
2021/326 ( PDF )
Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox
François Dupressoir and Konrad Kohbrok and Sabine Oechsner
2021/325 ( PDF )
Spectrum: High-Bandwidth Anonymous Broadcast with Malicious Security
Zachary Newman and Sacha Servan-Schreiber and Srinivas Devadas
2021/324 ( PDF )
Private AI: Machine Learning on Encrypted Data
Kristin E. Lauter
2021/323 ( PDF )
0
Nguyen Thoi Minh Quan
2021/322 ( PDF )
Rinocchio: SNARKs for Ring Arithmetic
Chaya Ganesh and Anca Nitulescu and Eduardo Soria-Vazquez
2021/321 ( PDF )
Abuse Resistant Law Enforcement Access Systems
Matthew Green and Gabriel Kaptchuk and Gijs Van Laer
2021/320 ( PDF )
Binding BIKE errors to a key pair
Nir Drucker and Shay Gueron and Dusan Kostic
2021/319 ( PDF )
Tradeoff attacks on symmetric ciphers
Orhun Kara
2021/318 ( PDF )
Oblivious TLS via Multi-Party Computation
Damiano Abram and Ivan Damgĺrd and Peter Scholl and Sven Trieflinger
2021/317 ( PDF )
MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge
Duong Tung Nguyen and Ni Trieu
2021/316 ( PDF )
Reusable Two-Round MPC from LPN
James Bartusek and Sanjam Garg and Akshayaram Srinivasan and Yinuo Zhang
2021/315 ( PDF )
Faster homomorphic comparison operations for BGV and BFV
Ilia Iliashenko and Vincent Zucca
2021/314 ( PDF )
On Security Properties of All-or-nothing Transforms
Navid Nasr Esfahani and Douglas R. Stinson
2021/313 ( PDF )
Rank Estimation with Bounded Error via Exponential Sampling
Liron David and Avishai Wool
2021/312 ( PDF )
Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup
Zhimin Luo and Mengce Zheng and Ping Wang and Minhui Jin and Jiajia Zhang and Honggang Hu
2021/311 ( PDF )
Improved Neural Aided Statistical Attack for Cryptanalysis
Yi Chen and Hongbo Yu
2021/310 ( PDF )
A New Neural Distinguisher Model Considering Derived Features from Multiple Ciphertext Pairs
Yi Chen and Hongbo Yu
2021/309 ( PDF )
SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets
Xingyu Meng and Kshitij Raj and Atul Prasad Deb Nath and Kanad Basu and Sandip Ray
2021/308 ( PDF )
Threshold Garbled Circuits and Ad Hoc Secure Computation
Michele Ciampi and Vipul Goyal and Rafail Ostrovsky
2021/307 ( PDF )
A Compressed $\Sigma$-Protocol Theory for Lattices
Thomas Attema and Ronald Cramer and Lisa Kohl
2021/306 ( PDF )
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2021/305 ( PDF )
SoK: Game-based Security Models for Group Key Exchange
Bertram Poettering and Paul Rösler and Jörg Schwenk and Douglas Stebila
2021/304 ( PDF )
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting
Xavier Boyen and Thomas Haines and Johannes Mueller
2021/303 ( PDF )
The More The Merrier: Reducing the Cost of Large Scale MPC
S. Dov Gordon and Daniel Starin and Arkady Yerukhimovich
2021/302 ( PDF )
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain
Maxime Buser and Rafael Dowsley and Muhammed F. Esgin and Shabnam Kasra Kermanshahi and Veronika Kuchta and Joseph K. Liu and Raphael Phan and Zhenfei Zhang
2021/301 ( PDF )
Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of $j=0$ with the cost of one exponentiation in $\mathbb{F}_{\!q}$
Dmitrii Koshelev
2021/300 ( PDF )
Invariants for EA- and CCZ-equivalence of APN and AB functions
Nikolay Kaleyski
2021/299 ( PDF )
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality
Muhammad Saad and Afsah Anwar and Srivatsan Ravi and David Mohaisen
2021/298 ( PDF )
On extensions of the one-time-pad
Bhupendra Singh and G. Athithan and Rajesh Pillai
2021/297 ( PDF )
HashWires: Hyperefficient Credential-Based Range Proofs
Konstantinos Chalkias and Shir Cohen and Kevin Lewi and Fredric Moezinia and Yolan Romailler
2021/296 ( PDF )
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice
Jan Richter-Brockmann and Pascal Sasdrich and Tim Güneysu
2021/295 ( PDF )
Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design
Michael Zuzak and Ankur Srivastava
2021/294 ( PDF )
Code-based signatures without trapdoors through restricted vectors
Marco Baldi and Franco Chiaraluce and Paolo Santini
2021/293 ( PDF )
Thinking Outside the Superbox
Nicolas Bordes and Joan Daemen and Daniël Kuijsters and Gilles Van Assche
2021/292 ( PDF )
Quantum Collision Attacks on Reduced SHA-256 and SHA-512
Akinori Hosoyamada and Yu Sasaki
2021/291 ( PDF )
Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security
Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
2021/290 ( PDF )
Dummy Shuffling against Algebraic Attacks in White-box Implementations
Alex Biryukov and Aleksei Udovenko
2021/289 ( PDF )
Reactive Key-Loss Protection in Blockchains
Sam Blackshear and Konstantinos Chalkias and Panagiotis Chatzigiannis and Riyaz Faizullabhoy and Irakliy Khaburzaniya and Eleftherios Kokoris Kogias and Joshua Lind and David Wong and Tim Zakian
2021/288 ( PDF )
Redeeming Reset Indifferentiability and Post-Quantum Groups
Mark Zhandry
2021/287 ( PDF )
A Deeper Look at Machine Learning-Based Cryptanalysis
Adrien Benamira and David Gerault and Thomas Peyrin and Quan Quan Tan
2021/286 ( PDF )
Fiat-Shamir via List-Recoverable Codes (or: Parallel Repetition of GMW is not Zero-Knowledge)
Justin Holmgren and Alex Lombardi and Ron D. Rothblum
2021/285 ( PDF )
Degree-2 Secret Sharing and Conditional Disclosure of Secrets
Amos Beimel and Hussien Othman and Naty Peter
2021/284 ( PDF )
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
Christof Ferreira Torres and Antonio Ken Iannillo and Arthur Gervais and Radu State
2021/283 ( PDF )
P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange
Carsten Baum and Bernardo David and Tore Frederiksen
2021/282 ( PDF )
One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols
Péter Kutas and Simon-Philipp Merz and Christophe Petit and Charlotte Weitkämper
2021/281 ( PDF )
Subquadratic SNARGs in the Random Oracle Model
Alessandro Chiesa and Eylon Yogev
2021/280 ( PDF )
Online-Extractability in the Quantum Random-Oracle Model
Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner
2021/279 ( PDF )
Information-Set Decoding with Hints
Anna-Lena Horlemann and Sven Puchinger and Julian Renner and Thomas Schamberger and Antonia Wachter-Zeh
2021/278 ( PDF )
More Communication Lower Bounds for Information-Theoretic MPC
Ivan Damgĺrd and Boyang Li and Nikolaj I. Schwartzbach
2021/277 ( PDF )
On the Integer Polynomial Learning with Errors Problem
Julien Devevey and Amin Sakzad and Damien Stehlé and Ron Steinfeld
2021/276 ( PDF )
Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography
Amril Syalim and Takashi Nishide and Kouichi Sakurai
2021/275 ( PDF )
Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher
Zhengyuan Shi and Gangqiang Yang and Hailiang Xiong and Fudong Li and Honggang Hu
2021/274 ( PDF )
Large Message Homomorphic Secret Sharing from DCR and Applications
Lawrence Roy and Jaspal Singh
2021/273 ( PDF )
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding
Stanislaw Jarecki and Hugo Krawczyk and Jiayu Xu
2021/272 ( PDF )
Isogeny-based key compression without pairings
Geovandro C. C. F. Pereira and Paulo S. L. M. Barreto
2021/271 ( PDF )
On the CCA Compatibility of Public-Key Infrastructure
Dakshita Khurana and Brent Waters
2021/270 ( PDF )
PQC: R-Propping of a New Group-Based Digital Signature
Pedro Hecht
2021/269 ( PDF )
Steel: Composable Hardware-based Stateful and Randomised Functional Encryption
Pramod Bhatotia and Markulf Kohlweiss and Lorenzo Martinico and Yiannis Tselekounis
2021/268 ( PDF )
Puncture 'Em All: Stronger Updatable Encryption with No-Directional Key Updates
Daniel Slamanig and Christoph Striecks
2021/267 ( PDF )
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
Christoph Dobraunig and Lorenzo Grassi and Anna Guinet and Daniël Kuijsters
2021/266 ( PDF )
VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE
Peter Rindal and Phillipp Schoppmann
2021/265 ( PDF )
On the Hardness of Module-LWE with Binary Secret
Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen
2021/264 ( PDF )
FAST: Fair Auctions via Secret Transactions
Bernardo David and Lorenzo Gentile and Mohsen Pourpouneh
2021/263 ( PDF )
Compressed Linear Aggregate Signatures Based on Module Lattices
Katharina Boudgoust and Adeline Roux-Langlois
2021/262 ( PDF )
The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT
Claudio Orlandi and Peter Scholl and Sophia Yakoubov
2021/261 ( PDF )
MIRACLE: MIcRo-ArChitectural Leakage Evaluation
Ben Marshall and Dan Page and James Webb
2021/260 ( PDF )
A Geometric Approach to Homomorphic Secret Sharing
Yuval Ishai and Russell W. F. Lai and Giulio Malavolta
2021/259 ( PDF )
Don't forget the constant-time in CSURF
Jesús-Javier Chi-Domínguez and Krijn Reijnders
2021/258 ( PDF )
Secure Shuffling in the Probing Model
Jean-Sebastien Coron and Lorenzo Spignoli
2021/257 ( PDF )
Cryptanalysis of the quantum public-key cryptosystem OTU under heuristics from Szemerédi-type statements
Shoichi Kamada
2021/256 ( PDF )
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC
Ghada Almashaqbeh and Fabrice Benhamouda and Seungwook Han and Daniel Jaroslawicz and Tal Malkin and Alex Nicita and Tal Rabin and Abhishek Shah and Eran Tromer
2021/255 ( PDF )
A Simple Algebraic Attack on 3-Round LowMC
Fukang Liu and Takanori Isobe and Willi Meier
2021/254 ( PDF )
Multivariate Public Key Cryptosystem from Sidon Spaces
Netanel Raviv and Ben Langton and Itzhak Tamo
2021/253 ( PDF )
Improved single-round secure multiplication using regenerating codes
Mark Abspoel and Ronald Cramer and Daniel Escudero and Ivan Damgĺrd and Chaoping Xing
2021/252 ( PDF )
A Resource Binding Approach to Logic Obfuscation
Michael Zuzak and Yuntao Liu and Ankur Srivastava
2021/251 ( PDF )
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser
2021/250 ( PDF )
Key Agreement with Physical Unclonable Functions and Biometric Identifiers
Onur Gunlu
2021/249 ( PDF )
NeuroSCA: Evolving Activation Functions for Side-channel Analysis
Karlo Knezevic and Juraj Fulir and Domagoj Jakobovic and Stjepan Picek
2021/248 ( PDF )
Everlasting UC Commitments from Fully Malicious PUFs
Bernardo Magri and Giulio Malavolta and Dominique Schröder and Dominique Unruh
2021/247 ( PDF )
Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets
David Knichel and Pascal Sasdrich and Amir Moradi
2021/246 ( PDF )
Master-Key KDM-Secure ABE via Predicate Encoding
Shengyuan Feng and Junqing Gong and Jie Chen
2021/245 ( PDF )
On the Ideal Shortest Vector Problem over Random Rational Primes
Yanbin Pan and Jun Xu and Nick Wadleigh and Qi Cheng
2021/244 ( PDF )
Forward Secret Encrypted RAM: Lower Bounds and Applications
Alexander Bienstock and Yevgeniy Dodis and Kevin Yeo
2021/243 ( PDF )
Private Set Operations from Oblivious Switching
Gayathri Garimella and Payman Mohassel and Mike Rosulek and Saeed Sadeghian and Jaspal Singh
2021/242 ( PDF )
GAP: Born to Break Hiding
Ju-Hwan Kim and Ji-Eun Woo and Soo-Jin Kim and So-Yeon Park and Dong-Guk Han
2021/241 ( PDF )
On the Round Complexity of Fully Secure Solitary MPC with Honest Majority
Saikrishna Badrinarayanan and Peihan Miao and Pratyay Mukherjee and Divya Ravi
2021/240 ( PDF )
The Relationship Between Idealized Models Under Computationally Bounded Adversaries
Mark Zhandry and Cong Zhang
2021/239 ( PDF )
SoK: Auditability and Accountability in Distributed Payment Systems
Panagiotis Chatzigiannis and Foteini Baldimtsi and Konstantinos Chalkias
2021/238 ( PDF )
Two Sides of The Same Coin: Weak-Keys and More Efficient Variants of CRAFT
Gregor Leander and Shahram Rasoolzadeh
2021/237 ( PDF )
Post-quantum Security of OAEP Transform
Ehsan Ebrahimi
2021/236 ( PDF )
SNOW-Vi: an extreme performance variant of SNOW-V for low-end CPUs
Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang
2021/235 ( PDF )
More Efficient Digital Signatures with Tight Multi-User Security
Denis Diemert and Kai Gellert and Tibor Jager and Lin Lyu
2021/234 ( PDF )
New Public-Key Crypto-System EHT
Alessandro Budroni and Igor Semaev
2021/233 ( PDF )
Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers
Inbar Kaslasi and Ron D. Rothblum and Prashant Nalini Vasudevan
2021/232 ( PDF )
Fast Factoring Integers by SVP Algorithms
Claus Peter Schnorr
2021/231 ( PDF )
LL-ORAM: A Forward and Backward Private Oblivious RAM
Zhiqiang Wu and Xiaoyong Tang and Jin Wang and Tan Deng
2021/230 ( PDF )
Subversion-Resilient Public Key Encryption with Practical Watchdogs
Pascal Bemmann and Rongmao Chen and Tibor Jager
2021/229 ( PDF )
Fast Boolean Queries with Minimized Leakage for Encrypted Databases in Cloud Computing
Zhiqiang Wu and Kenli Li and Keqin Li and Jin Wang
2021/228 ( PDF )
On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments
Nils Fleischhacker and Mark Simkin
2021/227 ( PDF )
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks
Qiqi Lai and Feng-Hao Liu and Zhedong Wang
2021/226 ( PDF )
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation
Khoa Nguyen and Reihaneh Safavi-Naini and Willy Susilo and Huaxiong Wang and Yanhong Xu and Neng Zeng
2021/225 ( PDF )
Recovering or Testing Extended-Affine Equivalence
Anne Canteaut and Alain Couvreur and Léo Perrin
2021/224 ( PDF )
Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha
Murilo Coutinho and T. C. Souza Neto
2021/223 ( PDF )
Redactable Blockchain Protocol with Instant Redaction
Jing Xu and Xinyu Li and Lingyuan Yin and Yuan Lu and Qiang Tang and Zhenfeng Zhang
2021/222 ( PDF )
Quantum-safe HIBE: does it cost a Latte?
Raymond K. Zhao and Sarah McCarthy and Ron Steinfeld and Amin Sakzad and Máire O’Neill
2021/221 ( PDF )
The Direction of Updatable Encryption Does Matter
Ryo Nishimaki
2021/220 ( PDF )
A New Twofold Cornacchia-Type Algorithm
Bei Wang; Yi Ouyang; Songsong Li; Honggang Hu
2021/219 ( PDF )
Snarky Ceremonies
Markulf Kohlweiss and Mary Maller and Janno Siim and Mikhail Volkhov
2021/218 ( PDF )
InSIDH: a Simplification of SiGamal
Tako Boris Fouotsa and Christophe Petit
2021/217 ( PDF )
Verifiable Random Functions with Optimal Tightness
David Niehues
2021/216 ( PDF )
How to Meet Ternary LWE Keys
Alexander May
2021/215 ( PDF )
Limbo: Efficient Zero-knowledge MPCitH-based Arguments
Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Titouan Tanguy
2021/214 ( PDF )
Mesh Messaging in Large-scale Protests: Breaking Bridgefy
Martin R. Albrecht and Jorge Blasco and Rikke Bjerg Jensen and Lenka Mareková
2021/213 ( PDF )
Accelerating the Search of Differential and Linear Characteristics with the SAT Method
Ling Sun and Wei Wang and Meiqin Wang
2021/212 ( PDF )
Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC
Ryoma Ito and Rentaro Shiba and Kosei Sakamoto and Fukang Liu and Takanori Isobe
2021/211 ( PDF )
GearBox: An Efficient UC Sharded Ledger Leveraging the Safety-Liveness Dichotomy
Bernardo David and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Daniel Tschudi
2021/210 ( PDF )
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles
Craig Gentry and Shai Halevi and Hugo Krawczyk and Bernardo Magri and Jesper Buus Nielsen and Tal Rabin and Sophia Yakoubov
2021/209 ( PDF )
Sampling methods for cryptographic tests
George Marinakis
2021/208 ( PDF )
Secure Poisson Regression
Mahimna Kelkar and Phi Hung Le and Mariana Raykova and Karn Seth
2021/207 ( PDF )
Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank
Daniele Cozzo and Nigel P. Smart and Younes Talibi Alaoui
2021/206 ( PDF )
WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts
Ádám Ficsór and Yuval Kogman and Lucas Ontivero and István András Seres
2021/205 ( PDF )
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup
Tsz Hon Yuen and Handong Cui and Xiang Xie
2021/204 ( PDF )
Revisiting Homomorphic Encryption Schemes for Finite Fields
Andrey Kim and Yuriy Polyakov and Vincent Zucca
2021/203 ( PDF )
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
Tjerand Silde and Martin Strand
2021/202 ( PDF )
Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices
Martin R. Albrecht and Russell W. F. Lai
2021/201 ( PDF )
DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security
Hanshen Xiao and Srinivas Devadas
2021/200 ( PDF )
Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols
Sergiu Carpov and Kevin Deforth and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev and Jonathan Katz and Iraklis Leontiadis and M. Mohammadi and Abson Sae-Tang and Marius Vuille
2021/199 ( PDF )
Generic, Efficient and Isochronous Gaussian Sampling over the Integers
Shuo Sun and Yongbin Zhou and Yunfeng Ji and Rui Zhang and Yang Tao
2021/198 ( PDF )
Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs
Tatsuki Ono and Song Bian and Takashi Sato
2021/197 ( PDF )
Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA
Guilherme Perin and Lichao Wu and Stjepan Picek
2021/196 ( PDF )
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model
Xu Liu and Mingqiang Wang
2021/195 ( PDF )
Compilation of Function Representations for Secure Computing Paradigms
Karim Baghery and Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Nigel P. Smart and Titouan Tanguy
2021/194 ( PDF )
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Raghvendra Rohit and Kai Hu and Sumanta Sarkar and Siwei Sun
2021/193 ( PDF )
Multitarget decryption failure attacks and their application to Saber and Kyber
Jan-Pieter D'Anvers and Senne Batsleer
2021/192 ( PDF )
Quantum Indifferentiability of SHA-3
Jan Czajkowski
2021/191 ( PDF )
PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution
Yaroslav Balytskyi and Manohar Raavi and Anatoliy Pinchuk and Sang-Yoon Chang
2021/190 ( PDF )
Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source
Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen
2021/189 ( PDF )
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette
Yunwen Liu and Siwei Sun and Chao Li
2021/188 ( PDF )
Tight Security Bounds for Micali’s SNARGs
Alessandro Chiesa and Eylon Yogev
2021/187 ( PDF )
Weak Keys in Reduced AEGIS and Tiaoxin
Fukang Liu and Takanori Isobe and Willi Meier and Kosei Sakamoto
2021/186 ( PDF )
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages
Hemanta K. Maji and Hai H. Nguyen and Anat Paskin-Cherniavsky and Tom Suad and Mingyuan Wang
2021/185 ( PDF )
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms
Hwajeong Seo and Pakize Sanal and Wai-Kong Lee and Reza Azarderakhsh
2021/184 ( PDF )
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption
Sravya Yandamuri and Ittai Abraham and Kartik Nayak and Michael K. Reiter
2021/183 ( PDF )
Efficient State Management in Distributed Ledgers
Dimitris Karakostas and Nikos Karayannidis and Aggelos Kiayias
2021/182 ( PDF )
The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications
István András Seres and Máté Horváth and Péter Burcsi
2021/181 ( PDF )
Group Signatures with User-Controlled and Sequential Linkability
Jesus Diaz and Anja Lehmann
2021/180 ( PDF )
Apollo -- Optimistically Linear and Responsive SMR
Adithya Bhat and Akhil Bandarupalli and Saurabh Bagchi and Aniket Kate and Michael Reiter
2021/179 ( PDF )
Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis
An Wang and Yuan Li and Yaoling Ding and Liehuang Zhu and Yongjuan Wang
2021/178 ( PDF )
Attribute-Based Access Control for Inner Product Functional Encryption from LWE
Tapas Pal and Ratna Dutta
2021/177 ( PDF )
Generic Negation of Pair Encodings
Miguel Ambrona
2021/176 ( PDF )
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits
Lukas Aumayr and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei
2021/175 ( PDF )
On the Relationships between Different Methods for Degree Evaluation (Full Version)
Siwei Chen and Zejun Xiang and Xiangyong Zeng and Shasha Zhang
2021/174 ( PDF )
Smart Contracts for Incentivized Outsourcing of Computation
Alptekin Küpçü and Reihaneh Safavi-Naini
2021/173 ( PDF )
TensorCrypto
Wai-Kong Lee and Hwajeong Seo and Zhenfei Zhang and Seongoun Hwang
2021/172 ( PDF )
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI
Nishanth Chandran and Nishka Dasgupta and Divya Gupta and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Akash Shah
2021/171 ( PDF )
Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Revisited
Wei Yu and Guangwu Xu
2021/170 ( PDF )
Fully Anonymous Group Signature with Verifier-Local Revocation
Ai Kitagawa and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka
2021/169 ( PDF )
Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials
Yasuhiko Ikematsu and Shuhei Nakamura and Bagus Santoso and Takanori Yasuda
2021/168 ( PDF )
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS
Xiaohan Zhang and Chi Cheng and Yue Qin and Ruoyu Ding
2021/167 ( PDF )
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware
Seetal Potluri and Aydin Aysu
2021/166 ( PDF )
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols
Matthias Lohr and Benjamin Schlosser and Jan Jürjens and Steffen Staab
2021/165 ( PDF )
Composition with Knowledge Assumptions
Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
2021/164 ( PDF )
Graph-Based Construction for Non-Malleable Codes
Shohei Satake and Yujie Gu and Kouichi Sakurai
2021/163 ( PDF )
CNF-FSS and its Applications
Paul Bunn and Eyal Kushilevitz and Rafail Ostrovsky
2021/162 ( PDF )
Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity
Giuseppe Ateniese and Long Chen and Danilo Francati and Dimitrios Papadopoulos and Qiang Tang
2021/161 ( PDF )
Generic Adaptor Signature
Xianrui Qin and Handong Cui and Tsz Hon Yuen
2021/160 ( PDF )
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance
Tibor Jager and Rafael Kurek and David Niehues
2021/159 ( PDF )
hbACSS: How to Robustly Share Many Secrets
Thomas Yurek and Licheng Luo and Jaiden Fairoze and Aniket Kate and Andrew Miller
2021/158 ( PDF )
Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate
Nicolas Resch and Chen Yuan
2021/157 ( PDF )
Sycon: A New Milestone in Designing ASCON-like Permutations
Kalikinkar Mandal and Dhiman Saha and Sumanta Sarkar and Yosuke Todo
2021/156 ( PDF )
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability
Manuel Barbosa and Gilles Barthe and Benjamin Grégoire and Adrien Koutsos and Pierre-Yves Strub
2021/155 ( PDF )
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
James Howe and Marco Martinoli and Elisabeth Oswald and Francesco Regazzoni
2021/154 ( PDF )
Generating cryptographically-strong random lattice bases and recognizing rotations of $\mathbb{Z}^n$
Tamar Lichter Blanks and Stephen D. Miller
2021/153 ( PDF )
On the Isogeny Problem with Torsion Point Information
Boris Fouotsa Tako and Péter Kutas and Simon-Philipp Merz
2021/152 ( PDF )
Hybrid Dual Attack on LWE with Arbitrary Secrets
Lei Bi and Xianhui Lu and Junjie Luo and Kunpeng Wang and Zhenfei Zhang
2021/151 ( PDF )
On Sufficient Oracles for Secure Computation with Identifiable Abort
Mark Simkin and Luisa Siniscalchi and and Sophia Yakoubov
2021/150 ( PDF )
Two-Party Adaptor Signatures From Identification Schemes
Andreas Erwig and Sebastian Faust and Kristina Hostáková and Monosij Maitra and Siavash Riahi
2021/149 ( PDF )
Quantum Security of the Legendre PRF
Paul Frixons and André Schrottenloher
2021/148 ( PDF )
On methods of shortening ElGamal-type signatures
Liliya Akhmetzyanova and Evgeny Alekseev and Alexandra Babueva and Stanislav Smyshlyaev
2021/147 ( PDF )
IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols
Greg Morrisett and Elaine Shi and Kristina Sojakova and Xiong Fan and Joshua Gancher
2021/146 ( PDF )
Boolean Functions from Hyperplane Coverings
Benjamin E. Diamond
2021/145 ( PDF )
A Security Framework for Distributed Ledgers
Christoph Egger and Mike Graf and Ralf Kuesters and Daniel Rausch and Viktoria Ronge and and Dominique Schröder
2021/144 ( PDF )
\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol
Morteza Adeli and Nasour Bagheri and Sadegh Sadeghi and Saru Kumari
2021/143 ( PDF )
The Bitcoin Cash Backbone Protocol
Juan Garay and Yu Shen
2021/142 ( PDF )
Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication
Muah Kim and Onur Gunlu and Rafael F. Schaefer
2021/141 ( PDF )
Advanced Lattice Sieving on GPUs, with Tensor Cores
Léo Ducas and Marc Stevens and Wessel van Woerden
2021/140 ( PDF )
Practical and Scalable Access Control Mechanism for the Internet of Things
Clémentine Gritti and Emanuel Regnath and Sebastian Steinhorst
2021/139 ( PDF )
Order-Fair Consensus in the Permissionless Setting
Mahimna Kelkar and Soubhik Deb and Sreeram Kannan
2021/138 ( PDF )
Classic McEliece Implementation with Low Memory Footprint
Johannes Roth and Evangelos Karatsiolis and Juliane Krämer
2021/137 ( PDF )
Cryptographic Security of the MLS RFC, Draft 11
Chris Brzuska and Eric Cornelissen and Konrad Kohbrok
2021/136 ( PDF )
An approach for designing fast public key encryption systems using white-box cryptography techniques
Dmitry Schelkunov
2021/135 ( PDF )
Acyclicity Programming for Sigma-Protocols
Masayuki Abe and Miguel Ambrona and Andrej Bogdanov and Miyako Ohkubo and Alon Rosen
2021/134 ( PDF )
Cryptanalysis of a code-based signature scheme without trapdoors
Marco Baldi and Jean-Christophe Deneuville and Edoardo Persichetti and Paolo Santini
2021/133 ( PDF )
smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
Ravital Solomon and Ghada Almashaqbeh
2021/132 ( PDF )
Privacy-Preserving Feature Selection with Secure Multiparty Computation
Xiling Li and Rafael Dowsley and Martine De Cock
2021/131 ( PDF )
Privacy-Preserving Video Classification with Convolutional Neural Networks
Sikha Pentyala and Rafael Dowsley and Martine De Cock
2021/130 ( PDF )
Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves
Bei Wang; Songsong Li; Yi Ouyang; Honggang Hu
2021/129 ( PDF )
Lattice-based weak curve fault attack on ECDSA
Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Wei
2021/128 ( PDF )
Designing Tweakable Enciphering Schemes Using Public Permutations
Debrup Chakraborty and Avijit Dutta and Samir Kundu
2021/127 ( PDF )
Cuproof: A Novel Range Proof with Constant Size
Cong Deng and Xianghong Tang and Lin You and Gengran Hu
2021/126 ( PDF )
Observability attack on stream generators
Ramachandran Anantharaman and Virendra Sule
2021/125 ( PDF )
Privacy Preserving and Resilient RPKI
Kris Shrishak and Haya Shulman
2021/124 ( PDF )
Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption
Ozgun Ozerk and Can Elgezen and Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2021/123 ( PDF )
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs
Yue Qin and Chi Cheng and Xiaohan Zhang and Yanbin Pan and Lei Hu and Jintai Ding
2021/122 ( PDF )
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
Aner Ben Efraim and Olga Nissenbaum and Eran Omri and Anat Paskin-Cherniavsky
2021/121 ( PDF )
BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits
Yaron Gvili and Sarah Scheffler and Mayank Varia
2021/120 ( PDF )
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits
Aner Ben-Efraim and Kelong Cong and Eran Omri and Emmanuela Orsini and Nigel P. Smart and Eduardo Soria-Vazquez
2021/119 ( PDF )
Rabbit: Efficient Comparison for Secure Multi-Party Computation
Eleftheria Makri and Dragos Rotaru and Frederik Vercauteren and Sameer Wagh
2021/118 ( PDF )
High-Threshold AVSS with Optimal Communication Complexity
Nicolas Alhaddad and Mayank Varia and Haibin Zhang
2021/117 ( PDF )
FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin
Arash Mirzaei and Amin Sakzad and Jiangshan Yu and Ron Steinfeld
2021/116 ( PDF )
MAKE: a Matrix Action Key Exchange
Nael Rahman and Vladimir Shpilrain
2021/115 ( PDF )
Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4
Mila Anastasova and Reza Azarderakhsh and Mehran Mozaffari Kermani
2021/114 ( PDF )
Security Analysis of CPace
Michel Abdalla and Björn Haase and Julia Hesse
2021/113 ( PDF )
Improvement of Secure Multi-Party Multiplication of (k,n) Threshold Secret Sharing Using Only N=k Servers (Revised Version)
Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura
2021/112 ( -- withdrawn -- )
Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange
Majid Salimi and Hamid Mala and Honorio Martin and Pedro Peris-Lopez
2021/111 ( PDF )
A note on Post Quantum Onion Routing
Kelesidis Evgnosia-Alexandra
2021/110 ( PDF )
Replacing Probability Distributions in Security Games via Hellinger Distance
Kenji Yasunaga
2021/109 ( PDF )
Sequential Logic Encryption Against Model Checking Attack
Amin Rezaei and Hai Zhou
2021/108 ( PDF )
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs
Sara Ricci and Lukas Malina and Petr Jedlicka and David Smekal and Jan Hajny and Petr Cibik and Patrik Dobias
2021/107 ( PDF )
A Decentralized and Encrypted National Gun Registry
Seny Kamara and Tarik Moataz and Andrew Park and Lucy Qin
2021/106 ( PDF )
MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers
Aram Jivanyan and Jesse Lancaster and Arash Afshar and Parnian Alimi
2021/105 ( PDF )
A New Efficient Identity-Based Encryption Without Pairing
Majid Salimi
2021/104 ( PDF )
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography
Shivam Bhasin and Jan-Pieter D'Anvers and Daniel Heinz and Thomas Pöppelmann and Michiel Van Beirendonck
2021/103 ( PDF )
RUP Security of the SAEF Authenticated Encryption mode
Elena Andreeva and Amit Singh Bhati and Damian Vizar
2021/102 ( PDF )
A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization
Madalina Chirita and Alexandru-Mihai Stroie and Andrei-Daniel Safta and Emil Simion
2021/101 ( PDF )
Combined Fault and DPA Protection for Lattice-Based Cryptography
Daniel Heinz and Thomas Pöppelmann
2021/100 ( PDF )
SPURT: Scalable Distributed Randomness Beacon with Transparent Setup
Sourav Das and Vinith Krishnan and Irene Miriam Isaac and Ling Ren
2021/099 ( PDF )
Property Inference from Poisoning
Melissa Chase and Esha Ghosh and Saeed Mahloujifar
2021/098 ( PDF )
Image sets of perfectly nonlinear maps
Lukas Kölsch and Björn Kriepke and Gohar Kyureghyan
2021/097 ( PDF )
A New and Improved Reduction Proof of Cascade PRF
Mridul Nandi
2021/096 ( PDF )
Gladius: LWR based efficient hybrid public key encryption with distributed decryption
Kelong Cong and Daniele Cozzo and Varun Maram and Nigel P. Smart
2021/095 ( PDF )
Collusion-Deterrent Threshold Information Escrow
Easwar Vivek Mangipudi and Donghang Lu and Aniket Kate
2021/094 ( PDF )
Reducing HSM Reliance in Payments through Proxy Re-Encryption
Sivanarayana Gaddam and Atul Luykx and Rohit Sinha and Gaven Watson
2021/093 ( PDF )
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks
Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
2021/092 ( PDF )
New Public Key Cryptosystem (First Version)
Dieaa I. Nassr and M. Anwar and Hatem M. Bahig
2021/091 ( PDF )
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks
Ilaria Chillotti and Marc Joye and Pascal Paillier
2021/090 ( PDF )
A New Twofold Cornacchia-Type Algorithm for 4-GLV Decompositions and Its Applications
Bei Wang; Yi Ouyang; Honggang Hu ; Songsong Li
2021/089 ( PDF )
Fuzzy Message Detection
Gabrielle Beck and Julia Len and Ian Miers and Matthew Green
2021/088 ( PDF )
An Overview of the Hybrid Argument
Marc Fischlin and Arno Mittelbach
2021/087 ( PDF )
ZEN: Efficient Zero-Knowledge Proofs for Neural Networks
Boyuan Feng and Lianke Qin and Zhenfei Zhang and Yufei Ding and Shumo Chu
2021/086 ( PDF )
On Elapsed Time Consensus Protocols
Mic Bowman and Debajyoti Das and Avradip Mandal and Hart Montgomery
2021/085 ( PDF )
Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves
Suhri Kim
2021/084 ( PDF )
Ariadne Thread and Salt: New Multivariate Cryptographic Schemes with Public Keys in Degree 3
Gilles Macario-Rat and Jacques Patarin
2021/083 ( PDF )
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol
Michael Troncoso and Britta Hale
2021/082 ( PDF )
Grades of Trust in Multiparty Computation
Jaskaran V. Singh and Nicholas Hopper
2021/081 ( PDF )
Private Stream Aggregation from Labeled Secret Sharing Schemes
Hendrik Waldner and Tilen Marc and Miha Stopar and Michel Abdalla
2021/080 ( PDF )
Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption
Jan-Pieter D'Anvers and Emmanuela Orsini and Frederik Vercauteren
2021/079 ( PDF )
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM
Kalle Ngo and Elena Dubrova and Qian Guo and Thomas Johansson
2021/078 ( PDF )
An Incentive-Compatible Smart Contract for Decentralized Commerce
Nikolaj I. Schwartzbach
2021/077 ( PDF )
Magnetic RSA
Rémi Géraud-Stewart and David Naccache
2021/076 ( PDF )
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field
Kang Yang and Pratik Sarkar and Chenkai Weng and Xiao Wang
2021/075 ( PDF )
A Generalization of the Subfield Construction
Kamil Otal
2021/074 ( PDF )
Cross-Domain Attribute-Based Access Control Encryption
Mahdi Sedaghat and Bart Preneel
2021/073 ( PDF )
Application of Velusqrt algorithm to Huff's and general Huff's curves
Michał Wroński
2021/072 ( PDF )
Toward Practical Autoencoder-based Side-Channel Analysis Evaluations
Servio Paguada and Lejla Batina and Igor Armendariz
2021/071 ( PDF )
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis
Jorai Rijsdijk and Lichao Wu and Guilherme Perin and Stjepan Picek
2021/070 ( PDF )
Secure, Accurate, and Practical Narrow-Band Ranging System
Aysajan Abidin and Mohieddine El Soussi and Jac Romme and Pepijn Boer and Dave Singelée and Christian Bachmann
2021/069 ( PDF )
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation
Amanda Resende and Davis Railsback and Rafael Dowsley and Anderson C. A. Nascimento and Diego F. Aranha
2021/068 ( PDF )
Banquet: Short and Fast Signatures from AES
Carsten Baum and Cyprien Delpech de Saint Guilhem and Daniel Kales and Emmanuela Orsini and Peter Scholl and Greg Zaverucha
2021/067 ( PDF )
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Michiel Van Beirendonck and Jan-Pieter D’Anvers and Ingrid Verbauwhede
2021/066 ( PDF )
A Deep Learning Approach for Active S-box Prediction of Generalized Feistel Lightweight Block Ciphers
Mohamed Fadl Idris and Je Sen Teh and Jasy Liew Suet Yan and Wei-Zhu Yeoh
2021/065 ( PDF )
FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves
Dorin-Marian Ionita and Emil Simion
2021/064 ( PDF )
Fault Attacks on CCA-secure Lattice KEMs
Peter Pessl and Lukas Prokop
2021/063 ( PDF )
CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing
Monir Azraoui and Solenn Brunet and Sébastien Canard and Aďda Diop and Lélia Eveillard and Alicia Filipiak and Adel Hamdi and Flavie Misarsky and Donald Nokam Kuate and Marie Paindavoine and Quentin Santos and Bastien Vialla
2021/062 ( PDF )
Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3)
Dominique Unruh
2021/061 ( PDF )
A Note on IBE Performance of a Practical Application
Ştefan Maftei and Marius Supuran and Emil Simion
2021/060 ( PDF )
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts
Ran Canetti and Rosario Gennaro and Steven Goldfeder and Nikolaos Makriyannis and Udi Peled
2021/059 ( PDF )
On the Cost of Adaptivity in Graph-Based Games
Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter
2021/058 ( PDF )
A Performance Study of Crypto-Hardware in the Low-end IoT
Peter Kietzmann and Lena Boeckmann and Leandro Lanzieri and Thomas C. Schmidt and Matthias Wählisch
2021/057 ( PDF )
Correlation Intractability vs. One-wayness
Tamer Mour
2021/056 ( PDF )
The Study of Modulo $2^n$
Zhongfeng Niu
2021/055 ( PDF )
Tech Report: Inerial HSMs Thwart Advanced Physical Attacks
Jan Sebastian Götte and Björn Scheuermann
2021/054 ( PDF )
The Cost of IEEE Arithmetic in Secure Computation
David W. Archer and Shahla Atapoor and Nigel P. Smart
2021/053 ( PDF )
On Algebraic Embedding for Unstructured Lattices
Madalina Bolboceanu and Zvika Brakerski and Devika Sharma
2021/052 ( PDF )
Elementary Attestation of Cryptographically Useful Composite Moduli
Rémi Géraud-Stewart and David Naccache
2021/051 ( PDF )
How Much can F5 Really Do
Jintai Ding and Zheng Zhang and Joshua Deaton
2021/050 ( PDF )
The Distinguishing Attack on HFE
Joshua Deaton and Jintai Ding
2021/049 ( PDF )
ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process
Mark D. Aagaard and Nusa Zidaric
2021/048 ( PDF )
Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution
Sohyun Jeon and Hyang-Sook Lee and Jeongeun Park
2021/047 ( PDF )
Evolution of Bulletin Board & its application to E-Voting – A Survey
Misni Harjo Suwito and Yoshifumi Ueshige and Kouichi Sakurai
2021/046 ( PDF )
Efficient Lattice-Based Inner-Product Functional Encryption
Jose Maria Bermudo Mera and Angshuman Karmakar and Tilen Marc and Azam Soleimanian
2021/045 ( PDF )
Banners: Binarized Neural Networks with Replicated Secret Sharing
Alberto Ibarrondo and Hervé Chabanne and Melek Önen
2021/044 ( PDF )
Aloha: Metadata-private voice communication over fully untrusted infrastructure
Ishtiyaque Ahmad and Yuntian Yang and Divyakant Agrawal and Amr El Abbadi and Trinabh Gupta
2021/043 ( PDF )
Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields
Madhurima Mukhopadhyay and Palash Sarkar
2021/042 ( PDF )
Correcting Subverted Random Oracles
Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou and Jiadong Zhu
2021/041 ( PDF )
Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot
Panos Kampanakis and Peter Panburana and Michael Curcio and Chirag Shroff and Md Mahbub Alam
2021/040 ( PDF )
On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product
Any Muanalifah and Serge˘ı Sergeev
2021/039 ( PDF )
Practical FHE parameters against lattice attacks
Jung Hee Cheon and Yongha Son and Donggeon Yhee
2021/038 ( PDF )
Streaming Merkle Proofs within Binary Numeral Trees
Luke Champine
2021/037 ( PDF )
New First-Order Secure AES Performance Records
Aein Rezaei Shahmirzadi and Dušan Božilov and Amir Moradi
2021/036 ( PDF )
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
Niluka Amarasinghe and Xavier Boyen and Matthew McKague
2021/035 ( PDF )
Sketches for Blockchains
Ori Rottenstreich
2021/034 ( PDF )
Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF
Nishanth Chandran and Divya Gupta and Akash Shah
2021/033 ( PDF )
Quantum-resistant Anonymous IBE with Traceable Identities
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo and Yu-Chi Chen
2021/032 ( PDF )
Experimental relativistic zero-knowledge proofs
Pouriya Alikhani and Nicolas Brunner and Claude Crépeau and Sébastien Designolle and Raphaël Houlmann and Weixu Shi and Hugo Zbinden
2021/031 ( PDF )
A Comparative Study of Cryptographic Key Distribution Protocols
Alexandru-Ștefan Gheorghieș and Darius-Marian Lăzăroi and Emil Simion
2021/030 ( PDF )
Linear-time and post-quantum zero-knowledge SNARKs for R1CS
Jonathan Lee and Srinath Setty and Justin Thaler and Riad Wahby
2021/029 ( PDF )
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs
Thomas Schneider and Oleksandr Tkachenko
2021/028 ( PDF )
A Side Journey to Titan
Victor LOMNE and Thomas ROCHE
2021/027 ( PDF )
E-voting protocols in context of COVID19
Sfirnaciuc Emilia and Vasilescu Miruna-Elena and Simion Emil
2021/026 ( PDF )
A Gapless Code-Based Hash Proof System based on RQC and its Applications
Slim Bettaieb and Loďc Bidoux and Olivier Blazy and Yann Connan and Philippe Gaborit
2021/025 ( PDF )
FLGUARD: Secure and Private Federated Learning
Thien Duc Nguyen and Phillip Rieger and Hossein Yalame and Helen Möllering and Hossein Fereidooni and Samuel Marchal and Markus Miettinen and Azalia Mirhoseini and Ahmad-Reza Sadeghi and Thomas Schneider and Shaza Zeitouni
2021/024 ( PDF )
PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System
Pedro Hecht
2021/023 ( PDF )
What is Meant by Permissionless Blockchains?
Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Andreas Kern and Walid Fdhila
2021/022 ( PDF )
Increasing Precision of Division Property
Patrick Derbez and Pierre-Alain Fouque
2021/021 ( PDF )
Fake Near Collisions Attacks
Patrick Derbez and Pierre-Alain Fouque and Victor Mollimard
2021/020 ( PDF )
Catching the Fastest Boomerangs - Application to SKINNY
Stéphanie Delaune and Patrick Derbez and Mathieu Vavrille
2021/019 ( PDF )
Kummer versus Montgomery Face-off over Prime Order Fields
Kaushik Nath and Palash Sarkar
2021/018 ( PDF )
Comments on ``On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment''
Yuhao Yang and Xiujie Huang
2021/017 ( PDF )
Lightweight Techniques for Private Heavy Hitters
Dan Boneh and Elette Boyle and Henry Corrigan-Gibbs and Niv Gilboa and Yuval Ishai
2021/016 ( PDF )
Black-Box Uselessness: Composing Separations in Cryptography
Geoffroy Couteau and Pooya Farshim and Mohammad Mahmoody
2021/015 ( PDF )
SoK: Remote Power Analysis
Macarena Martínez-Rodríguez and Ignacio M. Delgado-Lozano and Billy Bob Brumley
2021/014 ( -- withdrawn -- )
Efficient Multilinear Map from Graded Encoding Scheme
Majid Salimi
2021/013 ( PDF )
An atlas of the Richelot isogeny graph
Enric Florit and Benjamin Smith
2021/012 ( PDF )
Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph
Enric Florit and Benjamin Smith
2021/011 ( PDF )
Complete solution over $\GF{p^n}$ of the equation $X^{p^k+1}+X+a=0$
Kwang Ho Kim and Jong Hyok Choe and Sihem Mesnager
2021/010 ( PDF )
Compcrypt -- Lightweight ANS-based Compression and Encryption
Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk
2021/009 ( PDF )
Demand-aware Channel Topologies for Off-chain Blockchain Payments
Julia Khamis and Ori Rottenstreich
2021/008 ( PDF )
A Family of Nonlinear MDS Diffusion Layers over $\mathbb{F}_{2^{4n}}$
M. R. Mirzaee Shamsabad and S. M. Dehnavi
2021/007 ( PDF )
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Cheng-Yi Lee
2021/006 ( PDF )
Privacy-Preserving Privacy Profile Proposal Protocol
Wyatt Howe and Andrei Lapets
2021/005 ( PDF )
Aggregatable Distributed Key Generation
Kobi Gurkan and Philipp Jovanovic and Mary Maller and Sarah Meiklejohn and Gilad Stern and Alin Tomescu
2021/004 ( PDF )
LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions
Ismail San
2021/003 ( PDF )
Ciphertext Policy Attribute Based Encryption for Arithmetic circuits
Mahdi Mahdavi Oliaee and Zahra Ahmadian
2021/002 ( PDF )
Can Lattice Signature be as Efficient as Lattice Encryption?
Dingfeng Ye
2021/001 ( PDF )
2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product
Michel Abdalla and David Pointcheval and Azam Soleimanian


[ Cryptology ePrint archive ]