Cryptology ePrint Archive: Search Results

2020/1146 ( PDF )
Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries
Siemen Dhooghe and Svetla Nikova
2020/1145 ( PDF )
Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs
Wonseok Choi and Byeonghak Lee and Yeongmin Lee and Jooyoung Lee
2020/1144 ( PDF )
Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions
Lior Rotem and Gil Segev
2020/1143 ( PDF )
Rescue-Prime: a Standard Specification (SoK)
Alan Szepieniec and Tomer Ashur and Siemen Dhooghe
2020/1142 ( PDF )
Factoring Algorithm Based on Parameterized Newton Method
Zhengjun Cao and Lihua Liu
2020/1141 ( PDF )
A post-quantum signature scheme from the secant variety of the Grassmannian
Daniele Di Tullio and Manoj Gyawali
2020/1140 ( PDF )
On the Efficient Estimation of Min-Entropy
Yongjune Kim and Cyril Guyot and Young-Sik Kim
2020/1139 ( PDF )
Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin
Huijia Lin and Ji Luo
2020/1138 ( PDF )
Epochal Signatures for Deniable Group Chats
Andreas Hülsing and Florian Weber
2020/1137 ( PDF )
MOTION - A Framework for Mixed-Protocol Multi-Party Computation
Lennart Braun and Daniel Demmler and Thomas Schneider and Oleksandr Tkachenko
2020/1136 ( PDF )
On the Family of Elliptic Curves $y^2=x^3+b/\mathbb{F}_p$
Han Wu and Guangwu Xu
2020/1135 ( PDF )
Adaptively Secure Inner Product Encryption from LWE
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2020/1134 ( PDF )
Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks
Yoo-Seung Won and Xiaolu Hou and Dirmanto Jap and Jakub Breier and Shivam Bhasin
2020/1133 ( PDF )
Security Analysis of Subterranean 2.0
Ling Song and Yi Tu and Danping Shi and Lei Hu
2020/1132 ( PDF )
Lower Bound for Oblivious RAM with Large Cells
Ilan Komargodski and Wei-Kai Lin
2020/1131 ( PDF )
Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound
Enes Pasalic and René Rodríguez and Fengrong Zhang and Yongzhuang Wei
2020/1130 ( PDF )
Secure training of decision trees with continuous attributes
Mark Abspoel and Daniel Escudero and Nikolaj Volgushev
2020/1129 ( PDF )
A Secure Software Defined Networking based Framework for IoT Networks
Ambili K N and Jimmy Jose
2020/1128 ( PDF )
Searching Cubes in Division Property Based Cube Attack: Applications to Round-Reduced ACORN
Jingchun Yang and Dongdai Lin
2020/1127 ( PDF )
SideLine: How Delay-Lines (May) Leak Secrets from your SoC
Joseph Gravellier and Jean-Max Dutertre and Yannick Teglia and Philippe Loubet Moundi
2020/1126 ( PDF )
Bitcoin--Monero Cross-chain Atomic Swap
Joël Gugger
2020/1125 ( PDF )
High-Speed FPGA Implementation of the SIKE Based on An Ultra-Low-Latency Modular Multiplier
Jing Tian and Bo Wu and Zhongfeng Wang
2020/1124 ( PDF )
Optimized Voronoi-based algorithms for parallel shortest vector computations
Artur Mariano, Filipe Cabeleira, Gabriel Falcao, Luís Paulo Santos
2020/1123 ( PDF )
Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V
Alexandre Adomnicai and Thomas Peyrin
2020/1122 ( PDF )
The Velvet Path to Superlight Blockchain Clients
Aggelos Kiayias and Andrianna Polydouri and Dionysis Zindros
2020/1121 ( PDF )
Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain
Wilson Alberto Torres and Ron Steinfeld and Amin Sakzad and Veronika Kuchta
2020/1120 ( PDF )
On the security of Diene-Thabet-Yusuf's cubic multivariate signature scheme
Yasufumi Hashimoto
2020/1119 ( PDF )
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Christoph Hagen and Christian Weinert and Christoph Sendner and Alexandra Dmitrienko and Thomas Schneider
2020/1118 ( PDF )
Approximate Homomorphic Encryption with Reduced Approximation Error
Andrey Kim and Antonis Papadimitriou and Yuriy Polyakov
2020/1117 ( PDF )
Economic Proof of Work
Jia Kan
2020/1116 ( PDF )
On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode.
V. Ustimenko
2020/1115 ( PDF )
SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets
Karim M. Abdellatif and Olivier Hériveaux
2020/1114 ( PDF )
Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting
Thomas Haines and Rajeev Gore and Bhavesh Sharma
2020/1113 ( PDF )
On combinatorial approaches to search for quadratic APN functions
Konstantin Kalgin and Valeriya Idrisova
2020/1112 ( PDF )
A cautionary note on the use of Gurobi for cryptanalysis
Muhammad ElSheikh and Amr M. Youssef
2020/1111 ( PDF )
Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography
Abhraneel Dutta and Aaron Hutchinson and Koray Karabina
2020/1110 ( PDF )
Two-round $n$-out-of-$n$ and Multi-Signatures and Trapdoor Commitment from Lattices
Ivan Damgĺrd and Claudio Orlandi and Akira Takahashi and Mehdi Tibouchi
2020/1109 ( PDF )
On the new Vélu's formulae and their applications to CSIDH and B-SIDH constant-time implementations
Gora Adj and Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez
2020/1108 ( PDF )
Radical isogenies
Wouter Castryck and Thomas Decru and Frederik Vercauteren
2020/1107 ( PDF )
Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications
Shuichi Katsumata and Kris Kwiatkowski and Federico Pintore and Thomas Prest
2020/1106 ( PDF )
Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction
Gili Schul-Ganz and Gil Segev
2020/1105 ( PDF )
Catalic: Delegated PSI Cardinality with Applications to Contact Tracing
Thai Duong and Duong Hieu Phan and Ni Trieu
2020/1104 ( PDF )
High-Assurance Cryptography Software in the Spectre Era
Gilles Barthe and Sunjay Cauligi and Benjamin Gregoire and Adrien Koutsos and Kevin Liao and Tiago Oliveira and Swarn Priya and Tamara Rezk and Peter Schwabe
2020/1103 ( PDF )
Packed Multiplication: How to Amortize the Cost of Side-channel Masking ?
Weijia Wang; Chun Guo; François-Xavier Standaert; Yu Yu; Gaëtan Cassiers
2020/1102 ( PDF )
PQC: R-Propping of Public-Key Cryptosystems Using Polynomials over Non-commutative Algebraic Extension Rings
Pedro Hecht
2020/1101 ( PDF )
NC-Max: Breaking the Throughput Limit of Nakamoto Consensus
Ren Zhang and Dingwei Zhang and Quake Wang and Jan Xie and Bart Preneel
2020/1100 ( PDF )
Towards Efficiency-Preserving Round Compression in MPC: Do fewer rounds mean more computation?
Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain
2020/1099 ( PDF )
Unbounded HIBE with Tight Security
Roman Langrehr and Jiaxin Pan
2020/1098 ( PDF )
Formalizing Bitcoin Crashes with Universally Composable Security
Junming Ke and Pawel Szalachowski and Jianying Zhou and Qiuliang Xu
2020/1097 ( PDF )
How to Build Optimally Secure PRFs Using Block Ciphers
Benoît Cogliati and Ashwin Jha and Mridul Nandi
2020/1096 ( PDF )
Far Field EM Side-Channel Attack on AES Using Deep Learning
Ruize Wang and Huanyu Wang and Elena Dubrova
2020/1095 ( PDF )
Cycle structure of generalized and closed loop invariants
Yongzhuang Wei and Rene Rodriguez and Enes Pasalic
2020/1094 ( PDF )
TN-IDS for Network Layer Attacks in RPL based IoT Systems
Ambili K N and Jimmy Jose
2020/1093 ( PDF )
Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version)
Xichao Hu and Yongqiang Li and Lin Jiao and Shizhu Tian and Mingsheng Wang
2020/1092 ( PDF )
The Round Complexity of Secure Computation Against Covert Adversaries
Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain
2020/1091 ( PDF )
Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma
Joachim Neu and Ertem Nusret Tas and David Tse
2020/1090 ( PDF )
On the Adaptive Security of MACs and PRFs
Andrew Morgan and Rafael Pass and Elaine Shi
2020/1089 ( PDF )
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers
Akinori Hosoyamada and María Naya-Plasencia and Yu Sasaki
2020/1088 ( PDF )
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security
Xiangyu Liu; Shengli Liu; Dawu Gu; Jian Weng
2020/1087 ( PDF )
Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE
Keita Emura and Atsushi Takayasu and Yohei Watanabe
2020/1086 ( PDF )
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme
Daniel Apon and Dustin Moody and Ray Perlner and Daniel Smith-Tone and Javier Verbel
2020/1085 ( PDF )
Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications
Tapas Pal and Ratna Dutta
2020/1084 ( PDF )
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions
David Derler and Stephan Krenn and Kai Samelin and Daniel Slamanig
2020/1083 ( PDF )
A Fast and Compact Accelerator for Ascon and Friends
Stefan Steinegger and Robert Primas
2020/1082 ( PDF )
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption
Bart Mennink
2020/1081 ( PDF )
Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices
Olivier Bernard and Adeline Roux-Langlois
2020/1080 ( PDF )
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting
Rupeng Yang and Junzuo Lai and Zhengan Huang and Man Ho Au and Qiuliang Xu and Willy Susilo
2020/1079 ( PDF )
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption
Rongmao Chen and Xinyi Huang and Moti Yung
2020/1078 ( PDF )
Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles
Jodie Knapp and Elizabeth A. Quaglia
2020/1077 ( PDF )
Unconditionally secure quantum bit commitment: Revised
Ming-Xing Luo and Xiaojun Wang
2020/1076 ( PDF )
Minimizing the Two-Round Tweakable Even-Mansour Cipher
Avijit Dutta
2020/1075 ( PDF )
On the Query Complexity of Constructing PRFs from Non-adaptive PRFs
Pratik Soni and Stefano Tessaro
2020/1074 ( PDF )
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping
Mihai-Zicu Mina and Emil Simion
2020/1073 ( PDF )
Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation
Yusai Wu and Liqing Yu and Zhenfu Cao and Xiaolei Dong
2020/1072 ( PDF )
Cryptanalysis of the permutation based algorithm SpoC
Liliya Kraleva and Raluca Posteuca and Vincent Rijmen
2020/1071 ( PDF )
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model
Julia Kastner and Julian Loss and Michael Rosenberg and Jiayu Xu
2020/1070 ( PDF )
Hashing to elliptic curves $y^2 = x^3 + b$ provided that $b$ is a quadratic residue
Dmitrii Koshelev
2020/1069 ( PDF )
Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions
Matteo Campanelli and Antonio Faonio and Dario Fiore and Anaďs Querol and Hadrián Rodríguez
2020/1068 ( PDF )
An Efficient Transformation Capabilities of Single Database Private Block Retrieval
Radhakrishna Bhat and N R Sunitha
2020/1067 ( PDF )
A Constant Time Full Hardware Implementation of Streamlined NTRU Prime
Adrian Marotzke
2020/1066 ( PDF )
Constant time algorithms for ROLLO-I-128
Carlos Aguilar-Melchor and Nicolas Aragon and Emanuele Bellini and Florian Caullery and Rusydi H. Makarim and Chiara Marcolla
2020/1065 ( PDF )
Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering
Naila Mukhtar and Louiza Papachristodoulou and Apostolos P. Fournaris and Lejla Batina and Yinan Kong
2020/1064 ( PDF )
Mimblewimble Non-Interactive Transaction Scheme
Gary Yu
2020/1063 ( -- withdrawn -- )
Signatures of Knowledge for Boolean Circuits under Standard Assumptions
Karim Baghery and Alonso González and Zaira Pindado and Carla Rŕfols
2020/1062 ( PDF )
Quantum Search for Scaled Hash Function Preimages
Sergi Ramos-Calderer and Emanuele Bellini and José I. Latorre and Marc Manzano and Victor Mateu
2020/1061 ( PDF )
A new idea in response to fast correlation attacks on small-state stream ciphers
Vahid Amin Ghafari and Fujiang Lin
2020/1060 ( PDF )
Circular Security Is Complete for KDM Security
Fuyuki Kitagawa and Takahiro Matsuda
2020/1059 ( PDF )
Incorrectly Generated RSA Keys: How To Recover Lost Plaintexts
Daniel Shumow
2020/1058 ( PDF )
On the Complexity of the Crossbred Algorithm
Joăo Diogo Duarte
2020/1057 ( PDF )
MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces
Jonas Nick and Tim Ruffing and Yannick Seurin and Pieter Wuille
2020/1056 ( PDF )
Optimized GPU Framework for Block Cipher Differential Search
Wei-Zhu Yeoh and Je Sen Teh and Jiageng Chen
2020/1055 ( PDF )
Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain
Santi J. Vives
2020/1054 ( PDF )
Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems
Ben Smyth
2020/1053 ( PDF )
Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation
Anders Dalskov and Eysa Lee and Eduardo Soria-Vazquez
2020/1052 ( PDF )
Attacking Threshold Wallets
Jean-Philippe Aumasson and Omer Shlomovits
2020/1051 ( PDF )
Lower Bounds on the Degree of Block Ciphers
Phil Hebborn and Baptiste Lambin and Gregor Leander and Yosuke Todo
2020/1050 ( PDF )
On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation
Arpita Patra and Divya Ravi and Swati Singla
2020/1049 ( PDF )
Rotational analysis of ChaCha permutation
Stefano Barbero and Emanuele Bellini and Rusydi Makarim
2020/1048 ( PDF )
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums
Kai Hu and Siwei Sun and Meiqin Wang and Qingju Wang
2020/1047 ( PDF )
Side-channel Attacks with Multi-thread Mixed Leakage
Yiwen Gao and Yongbin Zhou
2020/1046 ( PDF )
On the Linear Distinguishing Attack against ZUC-256 Stream Cipher
ZUC Design Team
2020/1045 ( PDF )
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
Dhiman Saha and Yu Sasaki and Danping Shi and Ferdinand Sibleyras and Siwei Sun and Yingjie Zhang
2020/1044 ( PDF )
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
2020/1043 ( PDF )
Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions
Ian McQuoid and Mike Rosulek and Lawrence Roy
2020/1042 ( PDF )
Candidate Obfuscation via Oblivious LWE Sampling
Hoeteck Wee and Daniel Wichs
2020/1041 ( PDF )
Sign in finite fields
Abraham Westerbaan and Bas Westerbaan
2020/1040 ( PDF )
The Modular Specifications Security Framework
Hemi Leibowitz and Amir Herzberg and Ewa Syta and Sara Wrótniak
2020/1039 ( PDF )
Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct
Mohammad Sadeq Dousti and Alptekin Küpçü
2020/1038 ( PDF )
On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4
Prasanna Ravi and Romain Poussier and Shivam Bhasin and Anupam Chattopadhyay
2020/1037 ( PDF )
A High-performance Hardware Implementation of Saber Based on Karatsuba Algorithm
Yihong Zhu and Min Zhu and Bohan Yang and Wenping Zhu and Chenchen Deng and Chen Chen and Shaojun Wei and Leibo Liu
2020/1036 ( PDF )
Security in banking
Arthur Van Der Merwe and David Paul and Jelena Schmalz and Timothy M. Schaerf
2020/1035 ( PDF )
Evolving Secret Sharing with Essential Participants
Jyotirmoy Pramanik and Avishek Adhikari
2020/1034 ( PDF )
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques
Fukang Liu and Takanori Isobe and Willi Meier
2020/1033 ( PDF )
RandChain: Decentralised Randomness Beacon from Sequential Proof-of-Work
Runchao Han and Jiangshan Yu and Haoyu Lin
2020/1032 ( PDF )
Cryptanalysis of the MALICIOUS Framework
Tim Beyne and Chaoyun Li
2020/1031 ( PDF )
Profiled Deep Learning Side-Channel Attack on a Protected Arbiter PUF Combined with Bitstream Modification
Yang Yu and Michail Moraitis and Elena Dubrova
2020/1030 ( PDF )
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories
Xiaoyang Dong and Siwei Sun and Danping Shi and Fei Gao and Xiaoyun Wang and Lei Hu
2020/1029 ( PDF )
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
Hannah Davis and Felix Günther
2020/1028 ( PDF )
Secure Data Hiding for Contact Tracing
Craig Gotsman and Kai Hormann
2020/1027 ( PDF )
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things
Hu Xiong and Yingzhe Hou and Xin Huang and Saru Kumari
2020/1026 ( PDF )
Simple and Efficient FE for Quadratic Functions
Junqing Gong and Haifeng Qian
2020/1025 ( PDF )
A Bit-Vector Differential Model for the Modular Addition by a Constant
Seyyed Arash Azimi and Adrián Ranea and Mahmoud Salmasizadeh and Javad Mohajeri and Mohammad Reza Aref and Vincent Rijmen
2020/1024 ( PDF )
Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices
Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta
2020/1023 ( PDF )
Post-Quantum Anonymous Veto Networks
Jintai Ding and Doug Emery and Johannes Mueller and Peter Y. A. Ryan and Vonn Kee Wong
2020/1022 ( PDF )
Polynomial IOPs for Linear Algebra Relations
Alan Szepieniec
2020/1021 ( PDF )
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy
Christian Badertscher and Peter Gaži and Aggelos Kiayias and Alexander Russell and Vassilis Zikas
2020/1020 ( PDF )
Towards Classical Hardness of Module-LWE: The Linear Rank Case
Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen
2020/1019 ( PDF )
Security of Streaming Encryption in Google's Tink Library
Viet Tung Hoang and Yaobin Shen
2020/1018 ( PDF )
Big Subset and Small Superset Obfuscation
Steven D. Galbraith and Trey Li
2020/1017 ( PDF )
Governance framework for Quipuswap - automated decentralized exchange
Andrey Sobol and Anastasiia Kondaurova
2020/1016 ( PDF )
Hardware-Assisted Intellectual Property Protection of Deep Learning Models
Abhishek Chakraborty and Ankit Mondal and Ankur Srivastava
2020/1015 ( PDF )
On Multivariate Algorithms of Digital Signatures of Linear Degree and Low Density.
Vasyl Ustimenko
2020/1014 ( PDF )
GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel
Yuntao Liu and Ankur Srivastava
2020/1013 ( PDF )
A Study on Privacy-Preserving GRU Inference Framework
Shou-Ching Hsiao and Zi-Yuan Liu and Raylin Tso
2020/1012 ( PDF )
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer
Yi-Fu Lai and Steven D. Galbraith and Cyprien Delpech de Saint Guilhem
2020/1011 ( PDF )
Private Join and Compute from PIR with Default
Tancrčde Lepoint and Sarvar Patel and Mariana Raykova and Karn Seth and Ni Trieu
2020/1010 ( PDF )
Indistinguishability Obfuscation from Circular Security
Romain Gay and Rafael Pass
2020/1009 ( PDF )
Obfuscating Finite Automata
Steven D. Galbraith and Lukas Zobernig
2020/1008 ( PDF )
Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano
Leah Lathrop
2020/1007 ( PDF )
Attacks on Integer-RLWE
Alessandro Budroni and Benjamin Chetioui and Ermes Franch
2020/1006 ( PDF )
An Analysis of Fault Attacks on CSIDH
Jason LeGrow and Aaron Hutchinson
2020/1005 ( PDF )
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks
Fabio Campos and Matthias J. Kannwischer and Michael Meyer and Hiroshi Onuki and Marc Stöttinger
2020/1004 ( PDF )
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn
Nick Frymann and Daniel Gardham and Franziskus Kiefer and Emil Lundberg and Mark Manulis and Dain Nilsson
2020/1003 ( PDF )
Indistinguishability Obfuscation from Well-Founded Assumptions
Aayush Jain and Huijia Lin and Amit Sahai
2020/1002 ( PDF )
CrypTFlow2: Practical 2-Party Secure Inference
Deevashwer Rathee and Mayank Rathee and Nishant Kumar and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma
2020/1001 ( PDF )
Robust distributed symmetric-key encryption
Xunhua Wang and Ben Huson
2020/1000 ( PDF )
Precise and Mechanised Models and Proofs for Distance-Bounding and an Application to Contactless Payments
Ioana Boureanu and Constantin Catalin Dragan and François Dupressoir and David Gerault and Pascal Lafourcade
2020/999 ( PDF )
Attribute-Based Symmetric Searchable Encryption
Hai-Van Dang and Amjad Ullah and Alexandros Bakas and Antonis Michalas
2020/998 ( PDF )
Lightweight Virtual Payment Channels
Maxim Jourenko and Mario Larangeira and Keisuke Tanaka
2020/997 ( PDF )
Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution
Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky
2020/996 ( PDF )
Unifying Generic Group Models
Ueli Maurer and Christopher Portmann and Jiamin Zhu
2020/995 ( PDF )
Bootstrapping fully homomorphic encryption over the integers in less than one second
Hilder Vitor Lima Pereira
2020/994 ( PDF )
SPARKs: Succinct Parallelizable Arguments of Knowledge
Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass
2020/993 ( PDF )
Cryptanalysis of Masked Ciphers: A not so Random Idea
Tim Beyne and Siemen Dhooghe and Zhenda Zhang
2020/992 ( PDF )
Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs
Bo-Yeon Sim and Jihoon Kwon and Joohee Lee and Il-Ju Kim and Taeho Lee and Jaeseung Han and Hyojin Yoon and Jihoon Cho and Dong-Guk Han
2020/991 ( PDF )
A Novel Hash Function Design based on Hybrid Cellular Automata and Sponge Functions
Anita John and Alan Reji and Ajay P Manoj and Atul Premachandran and Basil Zachariah and Jimmy Jose
2020/990 ( PDF )
Constructing the Cryptographic Boundaries for Lattice-based Cryptography on Hardware Security Module
Junting Xiao and Tadahiko Ito
2020/989 ( PDF )
Algorithm for SIS and MultiSIS problems
Igor Semaev
2020/988 ( PDF )
120.147 Efficient Electromagnetic Side Channel Analysis by Probe Positioning using Multi-Layer Perceptron
Anupam Golder and Baogeng Ma and Debayan Das and Josef Danial and Shreyas Sen and Arijit Raychowdhury
2020/987 ( PDF )
Fuzzy Asymmetric Password-Authenticated Key Exchange
Andreas Erwig and Julia Hesse and Maximilian Orlt and Siavash Riahi
2020/986 ( PDF )
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
Thomas Peyrin and Haoyang Wang
2020/985 ( PDF )
Orienting supersingular isogeny graphs
Leonardo Colň and David Kohel
2020/984 ( PDF )
On Multivariate Algorithms of Digital Signatures on Secure El Gamal Type Mode.
Vasyl Ustimenko
2020/983 ( PDF )
A Differential Meet-in-the-Middle Attack on the Zip cipher
Michael Stay
2020/982 ( PDF )
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios
Sevdenur Baloglu and Sergiu Bursuc and Sjouke Mauw and Jun Pang
2020/981 ( PDF )
Deep Learning based analysis of Key Scheduling Algorithm of PRESENT cipher
Manan Pareek and Dr. Girish Mishra and Varun Kohli
2020/980 ( PDF )
SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE
Ruta Jawale and Yael Tauman Kalai and Dakshita Khurana and Rachel Zhang
2020/979 ( PDF )
Mercurial Signatures for Variable-Length Messages
Elizabeth C. Crites and Anna Lysyanskaya
2020/978 ( PDF )
Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher
Sarah Alzakari and Poorvi Vora
2020/977 ( PDF )
On the Influence of Optimizers in Deep Learning-based Side-channel Analysis
Guilherme Perin and Stjepan Picek
2020/976 ( PDF )
Synchronizable Exchange
Ranjit Kumaresan and Srinivasan Raghuraman and Adam Sealfon
2020/975 ( PDF )
Aardvark: A Concurrent Authenticated Dictionary with Short Proofs
Derek Leung and Yossi Gilad and Sergey Gorbunov and Leonid Reyzin and Nickolai Zeldovich
2020/974 ( PDF )
Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions
Dongxi Liu and Surya Nepal
2020/973 ( PDF )
Stacked Garbling: Garbled Circuit Proportional to Longest Execution Path
David Heath and Vladimir Kolesnikov
2020/972 ( PDF )
Optimized Binary GCD for Modular Inversion
Thomas Pornin
2020/971 ( PDF )
QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme
Koksal Mus and Saad Islam and Berk Sunar
2020/970 ( PDF )
Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE
Carsten Baum and Daniel Escudero and Alberto Pedrouzo-Ulloa and Peter Scholl and Juan Ramón Troncoso-Pastoriza
2020/969 ( PDF )
Hashing to elliptic curves of $j=0$ and quadratic imaginary orders of class number $2$
Dmitrii Koshelev
2020/968 ( PDF )
Feeding Cryptographic Protocols with Rich and Reliable Supply of Quantum-Grade Randomness
Gideon Samid
2020/967 ( PDF )
The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes
Jintai Ding and Joshua Deaton and Vishakha and Bo-Yin Yang
2020/966 ( PDF )
EM-Side-Channel Resistant Symmetric-Key Authentication Mechanism for Small Devices
Rick Boivie and Charanjit S. Jutla and Daniel Friedman and Ghavam Shahidi
2020/965 ( PDF )
Computation of a 30750-Bit Binary Field Discrete Logarithm
Robert Granger and Thorsten Kleinjung and Arjen K. Lenstra and Benjamin Wesolowski and Jens Zumbragel
2020/964 ( PDF )
Configurable Private Querying: Lookup and Partial Matching under Homomorphic Encryption
Hamish Hunt and Jack Crawford and Oliver Masters and Enrico Steffinlongo and Flavio Bergamaschi
2020/963 ( PDF )
From Partial to Global Asynchronous Reliable Broadcast
Diana Ghinea and Martin Hirt and Chen-Da Liu-Zhang
2020/962 ( PDF )
Post-Quantum Verification of Fujisaki-Okamoto
Dominique Unruh
2020/961 ( PDF )
Enable Dynamic Parameters Combination to Boost Linear Convolutional Neural Network for Sensitive Data Inference
Qizheng Wang and Wenping Ma and Jie Li and Ge Liu
2020/960 ( PDF )
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Florian Unterstein and Marc Schink and Thomas Schamberger and Lars Tebelmann and Manuel Ilg and Johann Heyszl
2020/959 ( PDF )
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings
Carlos Cid and Akinori Hosoyamada and Yunwen Liu and Siang Meng Sim
2020/958 ( PDF )
Multi-Threshold Asynchronous Reliable Broadcast and Consensus
Martin Hirt and Ard Kastrati and Chen-Da Liu-Zhang
2020/957 ( PDF )
Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs
Johannes Tobisch and Anita Aghaie and Georg T. Becker
2020/956 ( PDF )
Constant Time Montgomery Ladder
Kaushik Nath and Palash Sarkar
2020/955 ( PDF )
Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo
2020/954 ( PDF )
New Techniques for Traitor Tracing: Size $N^{1/3}$ and More from Pairings
Mark Zhandry
2020/953 ( PDF )
Performance comparison between deep learning-based and conventional cryptographic distinguishers
Emanuele Bellini and Matteo Rossi
2020/952 ( PDF )
On What to Learn: Train or Adapt a Deeply Learned Profile?
Christophe Genevey-Metat and Benoît Gérard and Annelie Heuser
2020/951 ( PDF )
Amplifying the Security of Functional Encryption, Unconditionally
Aayush Jain and Alexis Korb and Nathan Manohar and Amit Sahai
2020/950 ( PDF )
Self-Processing Private Sensor Data via Garbled Encryption
Nathan Manohar and Abhishek Jain and Amit Sahai
2020/949 ( PDF )
HABIT: Hardware-Assisted Bluetooth-based Infection Tracking
Nathan Manohar and Peter Manohar and Rajit Manohar
2020/948 ( PDF )
STARK Friendly Hash -- Survey and Recommendation
Eli Ben-Sasson and Lior Goldberg and David Levit
2020/947 ( PDF )
Data Oblivious Algorithms for Multicores
Vijaya Ramachandran and Elaine Shi
2020/946 ( PDF )
Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm
Johannes Mittmann and Werner Schindler
2020/945 ( PDF )
On the (in)security of ROS
Fabrice Benhamouda and Tancrčde Lepoint and Michele Orrů and Mariana Raykova
2020/944 ( PDF )
Secure Conflict-free Replicated Data Types
Manuel Barbosa and Bernardo Ferreira and Joăo Marques and Bernardo Portela and Nuno Preguiça
2020/943 ( PDF )
Analysing and Improving Shard Allocation Protocols for Sharded Blockchains
Runchao Han and Jiangshan Yu and Ren Zhang
2020/942 ( PDF )
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness
Philipp Schindler and Aljosha Judmayer and Markus Hittmeir and Nicholas Stifter and Edgar Weippl
2020/941 ( PDF )
Towards Optimizing Quantum Implementation of AES S-box
Doyoung Chung and Jooyoung Lee and Seungkwang Lee and Dooho choi
2020/940 ( PDF )
Directly revocable ciphertext-policy attribute-based encryption from lattices
Fei Meng
2020/939 ( PDF )
DLDDO: Deep Learning to Detect Dummy Operations
JongHyeok Lee and Dong-Guk Han
2020/938 ( PDF )
Performance Trade-offs in Design of MimbleWimble Proofs of Reserves
Suyash Bagad and Saravanan Vijayakumaran
2020/937 ( PDF )
BAM BAM!! On Reliability of EMFI for in-situ Automotive ECU Attacks
Colin O'Flynn
2020/936 ( PDF )
Cryptanalysis and Improvement of Anonymous Authentication for Wireless Body Area Networks with Provable Security
Mahender Kumar
2020/935 ( PDF )
Privacy-Preserving Multi-Operator Contact Tracing for Early Detection of Covid19 Contagions
Davide Andreoletti and Omran Ayoub and Silvia Giordano and Massimo Tornatore and Giacomo Verticale
2020/934 ( PDF )
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
Deepak Maram and Harjasleen Malvai and Fan Zhang and Nerla Jean-Louis and Alexander Frolov and Tyler Kell and Tyrone Lobban and Christine Moy and Ari Juels and Andrew Miller
2020/933 ( -- withdrawn -- )
Instantiation of RO Model Transforms via Extractable Functions
Mohammad Zaheri
2020/932 ( PDF )
A Note on Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near – Rings
Atul Chaturvedi Varun Shukla Manoj K.Misra
2020/931 ( PDF )
Homomorphic string search with constant multiplicative depth
Charlotte Bonte and Ilia Iliashenko
2020/930 ( PDF )
The design of scalar AES Instruction Set Extensions for RISC-V
Ben Marshall and G. Richard Newell and Dan Page and Markku-Juhani O. Saarinen and Claire Wolf
2020/929 ( PDF )
Local XOR Unification: Definitions, Algorithms and Application to Cryptography
Hai Lin and Christopher Lynch
2020/928 ( PDF )
Multi-theorem (Malicious) Designated-Verifier NIZK for QMA
Omri Shmueli
2020/927 ( PDF )
A Gas-Efficient Superlight Bitcoin Client in Solidity
Stelios Daveas and Kostis Karantias and Aggelos Kiayias and Dionysis Zindros
2020/926 ( PDF )
Secure Computation over Lattices and Elliptic Curves
Brett Hemenway Falk and Daniel Noble
2020/925 ( PDF )
Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
Chenkai Weng and Kang Yang and Jonathan Katz and Xiao Wang
2020/924 ( PDF )
Ferret: Fast Extension for coRRElated oT with small communication
Kang Yang and Chenkai Weng and Xiao Lan and Jiang Zhang and Xiao Wang
2020/923 ( PDF )
Another code-based adaptation of Lyubashevsky’s signature cryptanalysed
Nicolas Aragon and Jean-Christophe Deneuville and Philippe Gaborit
2020/922 ( PDF )
Security Challenges in Smart Grid and Suitable Countermeasures
Soumyadyuti Ghosh and Urbi Chatterjee and Durba Chatterjee and Rumia Masburah and Debdeep Mukhopadhyay and Soumyajit Dey
2020/921 ( PDF )
Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications
Hyoseung Kim and Youngkyung Lee and Michel Abdalla and Jong Hwan Park
2020/920 ( PDF )
Further Cryptographic Properties of the Multiplicative Inverse Function
Deng Tang and Bimal Mandal and Subhamoy Maitra
2020/919 ( PDF )
Tight Bounds for Simon's Algorithm
Xavier Bonnetain
2020/918 ( PDF )
An Efficient Certificateless Authentication Protocol for the SAE J1939
Basker Palaniswamy
2020/917 ( PDF )
Formalizing Nakamoto-Style Proof of Stake
Sřren Eller Thomsen and Bas Spitters
2020/916 ( PDF )
Black-Box Transformations from Passive to Covert Security with Public Verifiability
Ivan Damgård and Claudio Orlandi and Mark Simkin
2020/915 ( PDF )
Does Fiat-Shamir Require a Cryptographic Hash Function?
Yilei Chen and Alex Lombardi and Fermi Ma and Willy Quach
2020/914 ( PDF )
Ultra-Short Multivariate Public Key Signatures
Jacques Patarin and Gilles Macario-Rat and Maxime Bros and Eliane Koussa
2020/913 ( PDF )
Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis
Tarun Yadav and Manoj Kumar
2020/912 ( PDF )
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber
Zhuang Xu and Owen Pemberton and Sujoy Sinha Roy and David Oswald
2020/911 ( PDF )
Lossy Correlation Intractability and PPAD Hardness from Sub-exponential LWE
Ruta Jawale and Dakshita Khurana
2020/910 ( PDF )
A Power Side-Channel Attack on the CCA2-Secure HQC KEM
Thomas Schamberger and Julian Renner and Georg Sigl and Antonia Wachter-Zeh
2020/909 ( PDF )
When is a test not a proof?
Eleanor McMurtry and Olivier Pereira and Vanessa Teague
2020/908 ( PDF )
Analysis on the MinRank Attack using Kipnis-Shamir Method Against Rainbow
Shuhei Nakamura and Yacheng Wang and Yasuhiko Ikematsu
2020/907 ( PDF )
Enhanced Flush+Reload Attack on AES
Milad Seddigh and Hadi Soleimany
2020/906 ( PDF )
Optimally-resilient Unconditionally-secure Asynchronous Multi-party Computation Revisited
Ashish Choudhury
2020/905 ( PDF )
Cryptanalysis of a Code-Based Signature Scheme Based on the Lyubashevsky Framework
Marco Baldi and Karan Khathuria and Edoardo Persichetti and Paolo Santini
2020/904 ( PDF )
A Comparison of Weight Initializers in Deep Learning-based Side-channel Analysis
Huimin Li and Marina Krček and Guilherme Perin
2020/903 ( PDF )
Optimizing Implementations of Linear Layers
Zejun Xiang and Xiangyong Zeng and Da Lin and Zhenzhen Bao and Shasha Zhang
2020/902 ( PDF )
Federated Learning in Side-Channel Analysis
Huanyu Wang and Elena Dubrova
2020/901 ( PDF )
A Not-So-Trival Replay Attack Against DH-PSI
Hongrui Cui and Yu Yu
2020/900 ( PDF )
Message-recovery Laser Fault Injection Attack on Code-based Cryptosystems
Pierre-Louis Cayrel and Brice Colombier and Vlad-Florin Dragoi and Alexandre Menu and Lilian Bossuet
2020/899 ( PDF )
Everything is Connected: From Model Learnability to Guessing Entropy
Lichao Wu and Léo Weissbart and Marina Krček and Huimin Li and Guilherme Perin and Lejla Batina and Stjepan Picek
2020/898 ( PDF )
Rapidly Verifiable XMSS Signatures
Joppe W. Bos and Andreas Hülsing and Joost Renes and Christine van Vredendaal
2020/897 ( PDF )
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices
Jan Richter-Brockmann and Tim Güneysu
2020/896 ( PDF )
Fault Injection as an Oscilloscope: Fault Correlation Analysis
Albert Spruyt and Alyssa Milburn and Lukasz Chmielewski
2020/895 ( PDF )
Multi-Currency Ledgers
Joachim Zahnentferner
2020/894 ( PDF )
Nearly Quadratic Broadcast Without Trusted Setup Under Dishonest Majority
Georgios Tsimos and Julian Loss and Charalampos Papamanthou
2020/893 ( PDF )
Toward an Asymmetric White-Box Proposal
Lucas Barthelemy
2020/892 ( PDF )
Pushing the Limits of Fault Template Attacks: The Role of Side-Channels
Sayandeep Saha and Arnab Bag and and Debdeep Mukhopadhyay
2020/891 ( PDF )
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning
Guilherme Perin and Lukasz Chmielewski and Lejla Batina and Stjepan Picek
2020/890 ( PDF )
Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness
Aein Rezaei Shahmirzadi and Amir Moradi
2020/889 ( PDF )
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption
James Bartusek and Yuval Ishai and Aayush Jain and Fermi Ma and Amit Sahai and Mark Zhandry
2020/888 ( PDF )
Machine Learning of Physical Unclonable Functions using Helper Data - Revealing a Pitfall in the Fuzzy Commitment Scheme
Emanuele Strieder and Christoph Frisch and Michael Pehl
2020/887 ( PDF )
Updatable Blockchains
Michele Ciampi and Nikos Karayannidis and Aggelos Kiayias and Dionysis Zindros
2020/886 ( PDF )
Adaptively Secure Revocable Hierarchical IBE from $k$-linear Assumption
Keita Emura and Atsushi Takayasu and Yohei Watanabe
2020/885 ( PDF )
Wendy, the Good Little Fairness Widget
Klaus Kursawe
2020/884 ( PDF )
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model
Linru Zhang and Xiangning Wang and Yuechen Chen and Siu-Ming Yiu
2020/883 ( PDF )
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis
Jeroen Delvaux
2020/882 ( PDF )
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
Willy Susilo and Dung Hoang Duong and Huy Quoc Le and Josef Pieprzyk
2020/881 ( PDF )
Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES
Loďc Masure and Nicolas Belleville and Eleonora Cagli and Marie-Angela Cornelie and Damien Couroussé and Cécile Dumas and Laurent Maingault
2020/880 ( PDF )
Classical Reduction of SVP to LWE: A Concrete Security Analysis
Palash Sarkar and Subhadip Singha
2020/879 ( PDF )
Second-Order Masked Lookup Table Compression Scheme
Annapurna Valiveti and Srinivas Vivek
2020/878 ( PDF )
Bent Boolean functions A better procedure to generate non-crypto 4-bit S-boxes
Sankhanil De and Ranjan Ghosh
2020/877 ( PDF )
Unclonable Decryption Keys
Marios Georgiou and Mark Zhandry
2020/876 ( PDF )
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks
Claude Carlet and Sylvain Guilley and Sihem Mesnager
2020/875 ( PDF )
Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves
Daiki Hayashida and Kenichiro Hayasaka and Tadanori Teruya
2020/874 ( PDF )
New Methods and Abstractions for RSA-Based Forward Secure Signatures
Susan Hohenberger and Brent Waters
2020/873 ( PDF )
Post-Quantum Group Key Agreement Scheme
Julia Bobrysheva and Sergey Zapechnikov
2020/872 ( PDF )
Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis
Gabriel Zaid and Lilian Bossuet and François Dassance and Amaury Habrard and Alexandre Venelli
2020/871 ( PDF )
Quantum Immune One-Time Memories
Qipeng Liu and Amit Sahai and Mark Zhandry
2020/870 ( PDF )
Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN
Yu Yu and Jiang Zhang
2020/869 ( PDF )
An Algorithmic Reduction Theory for Binary Codes: LLL and more
Thomas Debris-Alazard and Léo Ducas and Wessel P.J. van Woerden
2020/868 ( PDF )
SoK: A Taxonomy of Cryptocurrency Wallets
Kostis Karantias
2020/867 ( PDF )
Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks
Ping Wang and Ping Chen and Zhimin Luo and Gaofeng Dong and Mengce Zheng and Nenghai Yu and Honggang Hu
2020/866 ( PDF )
Building a Modern TRNG: An Entropy Source Interface for RISC-V
Markku-Juhani O. Saarinen and G. Richard Newell and Ben Marshall
2020/865 ( PDF )
Agora: A Privacy-Aware Data Marketplace
Vlasis Koutsos and Dimitrios Papadopoulos and Dimitris Chatzopoulos and Sasu Tarkoma and Pan Hui
2020/864 ( PDF )
Linear Complexity Private Set Intersection for Secure Two-Party Protocols
Ferhat Karakoç and Alptekin Küpçü
2020/863 ( PDF )
Privacy-Preserving Automated Exposure Notification
Ran Canetti and Yael Tauman Kalai and Anna Lysyanskaya and Ronald L. Rivest and Adi Shamir and Emily Shen and Ari Trachtenberg and Mayank Varia and Daniel J. Weitzner
2020/862 ( PDF )
Protecting Cryptography Against Compelled Self-Incrimination
Sarah Scheffler and Mayank Varia
2020/861 ( PDF )
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT
Pedro Geraldo M. R. Alves and Jheyne N. Ortiz and Diego F. Aranha
2020/860 ( PDF )
SNARGs for Bounded Depth Computations from Sub-Exponential LWE
Yael Tauman Kalai and Rachel Zhang
2020/859 ( PDF )
A Classification of Computational Assumptions in the Algebraic Group Model
Balthazar Bauer and Georg Fuchsbauer and Julian Loss
2020/858 ( PDF )
Client-oblivious OPRAM
Gareth T. Davies and Christian Janson and Daniel P. Martin
2020/857 ( PDF )
Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party
Ivan Oleynikov and Elena Pagnin and Andrei Sabelfeld
2020/856 ( PDF )
Improving Revocation for Group Signature with Redactable Signature
Olivier Sanders
2020/855 ( PDF )
Fooling primality tests on smartcards
Vladimir Sedlacek and Jan Jancar and Petr Svenda
2020/854 ( PDF )
Designing Reverse Firewalls for the Real World
Angčle Bossuat and Xavier Bultel and Pierre-Alain Fouque and Cristina Onete and Thyla van der Merwe
2020/853 ( PDF )
Linear-Complexity Private Function Evaluation is Practical
Marco Holz and Ágnes Kiss and Deevashwer Rathee and Thomas Schneider
2020/852 ( PDF )
FROST: Flexible Round-Optimized Schnorr Threshold Signatures
Chelsea Komlo and Ian Goldberg
2020/851 ( PDF )
Asynchronous Byzantine Agreement with Subquadratic Communication
Erica Blum and Jonathan Katz and Chen-Da Liu-Zhang and Julian Loss
2020/850 ( PDF )
On the Guaranteed Number of Activations in XS-circuits
Sergey Agievich
2020/849 ( PDF )
Surveying global verifiability
Ben Smyth
2020/848 ( PDF )
On Composability of Game-based Password Authenticated Key Exchange
Marjan Škrobot and Jean Lancrenon
2020/847 ( PDF )
Encrypt-to-self: Securely Outsourcing Storage
Jeroen Pijnenburg and Bertram Poettering
2020/846 ( PDF )
Deep Learning based Differential Distinguisher for Lightweight Cipher PRESENT
Aayush Jain and Varun Kohli and Girish Mishra
2020/845 ( PDF )
Post-Quantum Adaptor Signatures and Payment Channel Networks
Muhammed F. Esgin and Oguzhan Ersoy and Zekeriya Erkin
2020/844 ( PDF )
Generic Superlight Client for Permissionless Blockchains
Yuan Lu and Qiang Tang and Guiling Wang
2020/843 ( PDF )
Dragoon: Private Decentralized HITs Made Practical
Yuan Lu and Qiang Tang and Guiling Wang
2020/842 ( PDF )
Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited
Yuan Lu and Zhenliang Lu and Qiang Tang and Guiling Wang
2020/841 ( PDF )
Dumbo: Faster Asynchronous BFT Protocols
Bingyong Guo and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang
2020/840 ( PDF )
Proof of Storage-Time: Efficiently Checking Continuous Data Availability
Giuseppe Ateniese and Long Chen and Mohammad Etemad and Qiang Tang
2020/839 ( PDF )
Cryptanalysis of a ``Strengthened'' Key Exchange Protocol for IoT, or When SAKE$^+$ Turns Out to Be SAKE$^-$
Loďc Ferreira
2020/838 ( PDF )
PudgyTurtle: variable-length, keystream-dependent encoding to resist time-memory tradeoff attacks
David A August and Anne C Smith
2020/837 ( PDF )
An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes
Daniel Kales and Greg Zaverucha
2020/836 ( PDF )
Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Fabio Campos and Lars Jellema and Mauk Lemmen and Lars Müller and Daan Sprenkels and Benoit Viguier
2020/835 ( PDF )
On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function
Congwei Zhou and Bin Hu and Jie Guan
2020/834 ( PDF )
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison
Eunsang Lee and Joon-Woo Lee and Jong-Seon No and Young-Sik Kim
2020/833 ( PDF )
Secure Update of FPGA-based Secure Elements using Partial Reconfiguration
Florian Unterstein and Tolga Sel and Thomas Zeschg and Nisha Jacob and Michael Tempelmeier and Michael Pehl and Fabrizio De Santis
2020/832 ( PDF )
Round-optimal Black-box Commit-and-prove with Succinct Communication
Susumu Kiyoshima
2020/831 ( PDF )
On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs
Michele Ciampi and Roberto Parisella and Daniele Venturi
2020/830 ( PDF )
Terakey - An Encryption Method Whose Security Can Be Analyzed from First Principles
Arnold G. Reinhold
2020/829 ( PDF )
Refined Analysis of the Asymptotic Complexity of the Number Field Sieve
Aude Le Gluher and Pierre-Jean Spaenlehauer and Emmanuel Thomé
2020/828 ( PDF )
Modified Secure Hashing algorithm(MSHA-512)
Ashoka SB and Lakshmikanth D
2020/827 ( PDF )
Encrypted Blockchain Databases
Daniel Adkins and Archita Agarwal and Seny Kamara and Tarik Moataz
2020/826 ( PDF )
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes
Xuan Thanh Do and Duong Hieu Phan and Moti Yung
2020/825 ( -- withdrawn -- )
Private Set Intersection from TFHE for Cloud Computing Scenarios
Jiayu Qiang and Yi Deng
2020/824 ( PDF )
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC
Fynn Dallmeier and Jan P. Drees and Kai Gellert and Tobias Handirk and Tibor Jager and Jonas Klauke and Simon Nachtigall and Timo Renzelmann and Rudi Wolf
2020/823 ( PDF )
The Provable Security of Ed25519: Theory and Practice
Jacqueline Brendel and Cas Cremers and Dennis Jackson and Mang Zhao
2020/822 ( PDF )
Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries
Kwangsu Lee
2020/821 ( PDF )
Interconnect-Aware Bitstream Modification
Michail Moraitis and Elena Dubrova
2020/820 ( PDF )
On the security of the Rescue hash function
Tim Beyne and Anne Canteaut and Gregor Leander and María Naya-Plasencia and Léo Perrin and Friedrich Wiemer
2020/819 ( PDF )
UC-Secure OT from LWE, Revisited
Willy Quach
2020/818 ( PDF )
Security Limitations of Classical-Client Delegated Quantum Computing
Christian Badertscher and Alexandru Cojocaru and Léo Colisson and Elham Kashefi and Dominik Leichtle and Atul Mantri and Petros Wallden
2020/817 ( PDF )
Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation
Osman Biçer and Alptekin Küpçü
2020/816 ( PDF )
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
Luka Music and Céline Chevalier and Elham Kashefi
2020/815 ( PDF )
Cryptographic Divergences: New Techniques and New Applications
Marc Abboud and Thomas Prest
2020/814 ( PDF )
Incompressible Encodings
Tal Moran and Daniel Wichs
2020/813 ( PDF )
Strengthening Sequential Side-Channel Attacks Through Change Detection
Luca Frittoli and Matteo Bocchi and Silvia Mella and Diego Carrera and Beatrice Rossi and Pasqualina Fragneto and Ruggero Susella and Giacomo Boracchi
2020/812 ( PDF )
Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions
Lior Rotem and Gil Segev
2020/811 ( PDF )
Groth16 SNARKs are Randomizable and (Weakly) Simulation Extractable
Markulf Kohlweiss and Mikhail Volkhov
2020/810 ( PDF )
A Few Explanations for <Fast-to-Finalize Nakamoto-Like Consensus>
Shuyang Tang
2020/809 ( PDF )
On (expected polynomial) runtime in cryptography
Michael Klooß
2020/808 ( PDF )
Security Analysis of Olvid's SAS-based Trust Establishment Protocol
Michel Abdalla
2020/807 ( PDF )
Secure merge with $O(n \log \log n)$ secure operation
Brett Hemenway Falk and Rafail Ostrovsky
2020/806 ( PDF )
Toward Comparable Homomorphic Encryption for Crowd-sensing Network
Daxin Huang and Qingqing Gan and Xiaoming Wang and Chengpeng Huang and Yijian Lin
2020/805 ( PDF )
Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud
Furkan Turan and Ingrid Verbauwhede
2020/804 ( PDF )
Lightweight Ciphers on a 65 nm ASIC - A Comparative Study on Energy Consumption
Bastian Richter and Amir Moradi
2020/803 ( PDF )
Lattice-based Fault Attacks against Deterministic Signatures ECDSA and EdDSA
Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Xi and Haoyuan Li and Limin Fan and Wenling Wu
2020/802 ( PDF )
Quantum Attacks on HCTR and its Variants
Mostafizar Rahman and Goutam Paul
2020/801 ( PDF )
Not enough LESS: An improved algorithm for solving Code Equivalence Problems over $\mathbb{F}_q$
Ward Beullens
2020/800 ( PDF )
Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements
Mihir Bellare and Wei Dai and Phillip Rogaway
2020/799 ( PDF )
Secure Generalized Deduplication via Multi-Key Revealing Encryption
Daniel E. Lucani and Lars Nielsen and Claudio Orlandi and Elena Pagnin and Rasmus Vestergaard
2020/798 ( PDF )
Superposition Attack on OT Protocols
Ehsan Ebrahimi and Céline Chevalier and Marc Kaplan and Michele Minelli
2020/797 ( PDF )
Fast, Small, and Area-Time Efficient Architectures for Key-Exchange on Curve25519
Mojtaba Bisheh Niasar and Rami El Khatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2020/796 ( PDF )
A Generalization of Paillier's Public-Key System With Fast Decryption
Ying Guo and Zhenfu Cao and Xiaolei Dong
2020/795 ( PDF )
Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches
Viet Ba Dang and Farnoud Farahmand and Michal Andrzejczak and Kamyar Mohajerani and Duc Tri Nguyen and Kris Gaj
2020/794 ( PDF )
Symbolic and Computational Reasoning About Cryptographic Modes of Operation
Catherine Meadows
2020/793 ( PDF )
PHyCT : Privacy preserving Hybrid Contact Tracing
Mahabir Prasad Jhanwar and Sumanta Sarkar
2020/792 ( PDF )
Trace-$\Sigma$: a privacy-preserving contact tracing app
Jean-François Biasse and Sriram Chellappan and Sherzod Kariev and Noyem Khan and Lynette Menezes and Efe Seyitoglu and Charurut Somboonwit and Attila Yavuz
2020/791 ( PDF )
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies
Chaya Ganesh and Claudio Orlandi and Daniel Tschudi and Aviv Zohar
2020/790 ( PDF )
Anonymity and Rewards in Peer Rating Systems
Lydia Garms and Siaw-Lynn Ng and Elizabeth A. Quaglia and Giulia Traverso
2020/789 ( PDF )
Double-Authentication-Preventing Signatures in the Standard Model
Dario Catalano and Georg Fuchsbauer and Azam Soleimanian
2020/788 ( PDF )
Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model
Michel Abdalla and Florian Bourse and Hugo Marival and David Pointcheval and Azam Soleimanian and Hendrik Waldner
2020/787 ( PDF )
A Note on Separating Classical and Quantum Random Oracles
Takashi Yamakawa and Mark Zhandry
2020/786 ( PDF )
Random Probing Security: Verification, Composition, Expansion and New Constructions
Sonia Belaďd and Jean-Sébastien Coron and Emmanuel Prouff and Matthieu Rivain and Abdul Rahman Taleb
2020/785 ( PDF )
The Memory-Tightness of Authenticated Encryption
Ashrujit Ghoshal and Joseph Jaeger and Stefano Tessaro
2020/784 ( PDF )
CRAFT: Composable Randomness and Almost Fairness from Time
Carsten Baum and Bernardo David and Rafael Dowsley and Jesper Buus Nielsen and Sabine Oechsner
2020/783 ( PDF )
Adventures in Crypto Dark Matter: Attacks, Fixes and Analysis for Weak Pseudorandom Function Candidates
Jung Hee Cheon and Wonhee Cho and Jeong Han Kim and Jiseung Kim
2020/782 ( PDF )
A Love Affair Between Bias Amplifiers and Broken Noise Sources
George Teseleanu
2020/781 ( PDF )
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff
Haibo Zhou and Rui Zong and Xiaoyang Dong and Keting Jia and Willi Meier
2020/780 ( PDF )
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10
Daniel De Almeida Braga and Pierre-Alain Fouque and Mohamed Sabt
2020/779 ( PDF )
Non-Malleable Time-Lock Puzzles and Applications
Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass
2020/778 ( PDF )
SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT
Seyed Farhad Aghili and Amirhossein Adavoudi Jolfaei and Aysajan Abidin
2020/777 ( PDF )
Dynamic Universal Accumulator with Batch Update over Bilinear Groups
Giuseppe Vitto and Alex Biryukov
2020/776 ( PDF )
Non-Malleable Codes for Bounded Polynomial Depth Tampering
Dana Dachman-Soled and Ilan Komargodski and Rafael Pass
2020/775 ( PDF )
Improved Differential-Linear Attacks with Applications to ARX Ciphers
Christof Beierle and Gregor Leander and Yosuke Todo
2020/774 ( PDF )
Timelocked Bribes
Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer
2020/773 ( PDF )
An Instruction Set Extension to Support Software-Based Masking
Johann Großschädl and Ben Marshall and Dan Page and Thinh Pham and Francesco Regazzoni
2020/772 ( PDF )
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs
Alex Lombardi and Vinod Vaikuntanathan
2020/771 ( PDF )
Leakage-Resilient Key Exchange and Two-Seed Extractors
Xin Li and Fermi Ma and Willy Quach and Daniel Wichs
2020/770 ( PDF )
Time-Space Tradeoffs and Short Collisions in Merkle-Damgĺrd Hash Functions
Akshima and David Cash and Andrew Drucker and Hoeteck Wee
2020/769 ( PDF )
Lattice-Based Blind Signatures, Revisited
Eduard Hauck and Eike Kiltz and Julian Loss and Ngoc Khanh Nguyen
2020/768 ( PDF )
Perfect Zero Knowledge: New Upperbounds and Relativized Separations
Peter Dixon and Sutanu Gayen and A. Pavan and N. V. Vinodchandran
2020/767 ( PDF )
Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability
Carsten Baum and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez
2020/766 ( PDF )
The uncertainty of Side-Channel Analysis: A way to leverage from heuristics
Unai Rioja and Servio Paguada and Lejla Batina and Igor Armendariz
2020/765 ( PDF )
Handling Adaptive Compromise for Practical Encryption Schemes
Joseph Jaeger and Nirvan Tyagi
2020/764 ( PDF )
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification
Romain Gay and Aayush Jain and Huijia Lin and Amit Sahai
2020/763 ( PDF )
Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol
Jia Xu and Yiwen Gao and Hoonwei Lim
2020/762 ( PDF )
Functional Encryption for Attribute-Weighted Sums from $k$-Lin
Michel Abdalla and Junqing Gong and Hoeteck Wee
2020/761 ( PDF )
Decentralized reputation
Tassos Dimitriou
2020/760 ( PDF )
Curves with fast computations in the first pairing group
Rémi Clarisse and Sylvain Duquesne and Olivier Sanders
2020/759 ( PDF )
Chosen Ciphertext Security from Injective Trapdoor Functions
Susan Hohenberger and Venkata Koppula and Brent Waters
2020/758 ( PDF )
Verifiable state machines: Proofs that untrusted services operate correctly
Srinath Setty and Sebastian Angel and Jonathan Lee
2020/757 ( PDF )
Understanding Methodology for Efficient CNN Architectures in Profiling Attacks
Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli
2020/756 ( PDF )
Provable Security Analysis of FIDO2
Shan Chen and Manuel Barbosa and Alexandra Boldyreva and Bogdan Warinschi
2020/755 ( PDF )
Time-release Cryptography from Minimal Circuit Assumptions
Samuel Jaques and Hart Montgomery and Arnab Roy
2020/754 ( PDF )
Fluid MPC: Secure Multiparty Computation with Dynamic Participants
Arka Rai Choudhuri and Aarushi Goel and Matthew Green and Abhishek Jain and Gabriel Kaptchuk
2020/753 ( PDF )
Compressing Proofs of $k$-Out-Of-$n$ Partial Knowledge
Thomas Attema and Ronald Cramer and Serge Fehr
2020/752 ( PDF )
Continuous Group Key Agreement with Active Security
Joël Alwen and Sandro Coretti and Daniel Jost and Marta Mularczyk
2020/751 ( PDF )
DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
Nils Albartus and Max Hoffmann and Sebastian Temme and Leonid Azriel and Christof Paar
2020/750 ( PDF )
Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging
Max Hoffmann and Christof Paar
2020/749 ( PDF )
Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al.
Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang
2020/748 ( PDF )
Anonymous probabilistic payment in payment hub
Tatsuo Mitani and Akira Otsuka
2020/747 ( PDF )
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups
Karim Eldefrawy and Seoyeon Hwang and Rafail Ostrovsky and Moti Yung
2020/746 ( PDF )
Comparison of RISC-V and transport triggered architectures for a post-quantum cryptography application
Latif AKÇAY and Berna ÖRS
2020/745 ( PDF )
True Random Number Generation Based on DNA molecule Genetic Information (DNA-TRNG)
Siddaramappa V and Ramesh K B
2020/744 ( PDF )
New results on Gimli: full-permutation distinguishers and improved collisions
Antonio Flórez Gutiérrez and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and André Schrottenloher and Ferdinand Sibleyras
2020/743 ( PDF )
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
Qian Guo and Thomas Johansson and Alexander Nilsson
2020/742 ( PDF )
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures
Jan Richter-Brockmann and Tim Güneysu
2020/741 ( PDF )
Fast Privacy-Preserving Punch Cards
Saba Eskandarian
2020/740 ( PDF )
Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback
Erica Blum and Chen-Da Liu-Zhang and Julian Loss
2020/739 ( PDF )
Generic Constructions of Incremental and Homomorphic Timed-Release Encryption
Peter Chvojka and Tibor Jager and Daniel Slamanig and Christoph Striecks
2020/738 ( PDF )
GIFT-COFB
Subhadeep Banik and Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi and Thomas Peyrin and Yu Sasaki and Siang Meng Sim and Yosuke Todo
2020/737 ( PDF )
A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge
Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
2020/736 ( PDF )
Forward-Security Under Continual Leakage with Deterministic Key Updates
Suvradip Chakraborty and Harish Karthikeyan and Adam O'Neill and C. Pandu Rangan
2020/735 ( PDF )
Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger
Heewon Chung and Kyoohyung Han and Chanyang Ju and Myungsun Kim and Jae Hong Seo
2020/734 ( PDF )
Mirror Theory: A simple proof of the Pi+Pj Theorem with xi_max=2
Benoît Cogliati and Jacques Patarin
2020/733 ( PDF )
A Side-Channel Resistant Implementation of SABER
Michiel Van Beirendonck and Jan-Pieter D'Anvers and Angshuman Karmakar and Josep Balasch and Ingrid Verbauwhede
2020/732 ( PDF )
Security of Multi-Adjustable Join Schemes: Separations and Implications
Mojtaba Rafiee and Shahram Khazaei
2020/731 ( PDF )
The Exact Security of PMAC with Three Powering-Up Masks
Yusuke Naito
2020/730 ( PDF )
On the Security of Time-Locked Puzzles and Timed Commitments
Jonathan Katz and Julian Loss and Jiayu Xu
2020/729 ( PDF )
Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF
Melissa Chase and Peihan Miao
2020/728 ( PDF )
Minerva: The curse of ECDSA nonces
Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys
2020/727 ( PDF )
An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers
Adrian Ranea and Yunwen Liu and Tomer Ashur
2020/726 ( PDF )
On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments
Denis Diemert and Tibor Jager
2020/725 ( PDF )
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model
Gianluca Brian and Antonio Faonio and Maciej Obremski and Mark Simkin and Daniele Venturi
2020/724 ( PDF )
Multi-Party Revocation in Sovrin: Performance through Distributed Trust
Lukas Helminger and Daniel Kales and Sebastian Ramacher and Roman Walch
2020/723 ( PDF )
On the Confidentiality of Amounts in Grin
Suyash Bagad and Saravanan Vijayakumaran
2020/722 ( PDF )
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
Yehuda Afek and Anat Bremler-Barr and Lior Shafir
2020/721 ( PDF )
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Fabian Boemer and Rosario Cammarota and Daniel Demmler and Thomas Schneider and Hossein Yalame
2020/720 ( PDF )
Fast algebraic immunity of Boolean functions and LCD codes
Sihem Mesnager and Chunming Tang
2020/719 ( PDF )
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes
Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai
2020/718 ( PDF )
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Marc Fischlin and Felix Günther and Christian Janson
2020/717 ( PDF )
Fault Location Identification By Machine Learning
Anubhab Baksi and Santanu Sarkar and Akhilesh Siddhanti and Ravi Anand and Anupam Chattopadhyay
2020/716 ( PDF )
Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function
Takeshi Sugawara and Tatsuya Onuma and Yang Li
2020/715 ( PDF )
On (impracticality of) transfinite symmetric encryption with keys smaller than messages under GCH
Sergij V. Goncharov
2020/714 ( PDF )
One-One Constrained Pseudorandom Functions
Naty Peter and Rotem Tsabary and Hoeteck Wee
2020/713 ( PDF )
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism
Yi-Fan Tseng and Zi-Yuan Liu and Raylin Tso
2020/712 ( PDF )
Anonymous IBE From Quadratic Residuosity With Fast Encryption
Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jinwen Zheng
2020/711 ( PDF )
Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation
Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
2020/710 ( PDF )
Rational Behavior in Committee-Based Blockchains
Yackolley Amoussou-Guenou and Bruno Biais and Maria Potop-Butucaru and Sara Tucci-Piergiovanni
2020/709 ( PDF )
Reputable List Curation from Decentralized Voting
Elizabeth C. Crites and Mary Maller and Sarah Meiklejohn and Rebekah Mercer
2020/708 ( PDF )
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations
Ben Nassi and Yaron Pirutin and Adi Shamir and Yuval Elovici and Boris Zadov
2020/707 ( PDF )
Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k))
Martin R. Albrecht and Shi Bai and Pierre-Alain Fouque and Paul Kirchner and Damien Stehlé and Weiqiang Wen
2020/706 ( PDF )
A Logic Synthesis Toolbox for Reducing the Multiplicative Complexity in Logic Networks
Eleonora Testa and Mathias Soeken and Heinz Riener and Luca Amaru and Giovanni De Micheli
2020/705 ( PDF )
On the minimal value set size of APN functions
Ingo Czerwinski
2020/704 ( PDF )
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead
James Bell and K. A. Bonawitz and Adriŕ Gascón and Tancrčde Lepoint and Mariana Raykova
2020/703 ( PDF )
New Complexity Estimation on the Rainbow-Band-Separation Attack
Shuhei Nakamura and Yasuhiko Ikematsu and Yacheng Wang and Jintai Ding and Tsuyoshi Takagi
2020/702 ( PDF )
Rainbow Band Separation is Better than we Thought
Ray Perlner and Daniel Smith-Tone
2020/701 ( PDF )
MPC with Friends and Foes
Bar Alon and Eran Omri and Anat Paskin-Cherniavsky
2020/700 ( PDF )
Personal data exchange protocol: X
Vladimir Belsky and Ilia Gerasimov and Kirill Tsaregorodtsev and Ivan Chizhov
2020/699 ( PDF )
Looking at the NIST Lightweight Candidates from a Masking Point-of-View
Lauren De Meyer
2020/698 ( -- withdrawn -- )
Forgery attack on the authentication encryption GIFT-COFB
Zhe CEN and Xiutao FENG and Zhangyi Wang and Chunping CAO
2020/697 ( PDF )
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
F. Boudot and P. Gaudry and A. Guillevic and N. Heninger and E. Thomé and P. Zimmermann
2020/696 ( PDF )
An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials
Yin Li and Yu Zhang
2020/695 ( PDF )
Collusion Resistant Watermarkable PRFs from Standard Assumptions
Rupeng Yang and Man Ho Au and Zuoxia Yu and Qiuliang Xu
2020/694 ( PDF )
The nearest-colattice algorithm
Thomas Espitau and Paul Kirchner
2020/693 ( PDF )
Tight Quantum Time-Space Tradeoffs for Function Inversion
Kai-Min Chung and Siyao Guo and Qipeng Liu and Luowen Qian
2020/692 ( PDF )
Optimizing Inner Product Masking Scheme by A Coding Theory Approach
Wei Cheng and Sylvain Guilley and Claude Carlet and Sihem Mesnager and Jean-Luc Danger
2020/691 ( PDF )
LSS Homomorphisms and Applications to Secure Signatures, Proactive Secret Sharing and Input Certification
Diego Aranha and Anders Dalskov and Daniel Escudero and Claudio Orlandi
2020/690 ( PDF )
SAFE: A Secure and Efficient Long-Term Distributed Storage System
Johannes Buchmann and Ghada Dessouky and Tommaso Frassetto and Ágnes Kiss and Ahmad-Reza Sadeghi and Thomas Schneider and Giulia Traverso and Shaza Zeitouni
2020/689 ( PDF )
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64
Orr Dunkelman and Senyang Huang and Eran Lambooij and Stav Perle
2020/688 ( PDF )
Lin2-Xor Lemma and Log-size Linkable Ring Signature
Anton A. Sokolov
2020/687 ( PDF )
Lower Bounds on the Time/Memory Tradeoff of Function Inversion
Dror Chawin and Iftach Haitner and Noam Mazor
2020/686 ( PDF )
A Level Dependent Authentication for IoT Paradigm
Chintan Patel and Nishant Doshi
2020/685 ( PDF )
Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors
Leo de Castro and Chiraag Juvekar and Vinod Vaikuntanathan
2020/684 ( PDF )
Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE)
Ghada Arfaoui and Olivier Blazy and Xavier Bultel and Pierre-Alain Fouque and Adina Nedelcu and Cristina Onete
2020/683 ( PDF )
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model
Abida Haque and Stephan Krenn and Daniel Slamanig and Christoph Striecks
2020/682 ( PDF )
Succinct Diophantine-Satisfiability Arguments
Patrick Towa and Damien Vergnaud
2020/681 ( PDF )
An F-algebra for analysing information leaks in the presence of glitches
Vittorio Zaccaria
2020/680 ( PDF )
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition
Sumanta Sarkar and Yu Sasaki and Siang Meng Sim
2020/679 ( PDF )
BETA: Biometric Enabled Threshold Authentication
Shashank Agrawal and Saikrishna Badrinarayanan and Payman Mohassel and Pratyay Mukherjee and Sikhar Patranabis
2020/678 ( PDF )
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures
Alexander Munch-Hansen and Claudio Orlandi and Sophia Yakoubov
2020/677 ( PDF )
Blockchain with Varying Number of Players
T-H. Hubert Chan and Naomi Ephraim and Antonio Marcedone and Andrew Morgan and Rafael Pass and Elaine Shi
2020/676 ( PDF )
An airdrop that preserves recipient privacy
Riad S. Wahby and Dan Boneh and Christopher Jeffrey and Joseph Poon
2020/675 ( PDF )
Ledger Combiners for Fast Settlement
Matthias Fitzi and Peter Gazi and Aggelos Kiayias and Alexander Russell
2020/674 ( PDF )
Coercion-Resistant Blockchain-Based E-Voting Protocol
Chiara Spadafora and Riccardo Longo and Massimiliano Sala
2020/673 ( PDF )
LotMint: Blockchain Returning to Decentralization with Decentralized Clock
Wenbo MAO and Wenxiang WANG
2020/672 ( PDF )
A Survey of Automatic Contact Tracing Approaches
Leonie Reichert and Samuel Brack and Björn Scheuermann
2020/671 ( PDF )
Persistent Fault Analysis With Few Encryptions
Sebastien Carre and Sylvain Guilley and Olivier Rioul
2020/670 ( PDF )
Inverse-Sybil Attacks in Automated Contact Tracing
Crypto Group at IST Austria
2020/669 ( PDF )
Proof of Mirror Theory for $\xi_{\max}=2$
Avijit Dutta and Mridul Nandi and Abishanka Saha
2020/668 ( PDF )
On Subversion-Resistant SNARKs
Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michał Zając
2020/667 ( PDF )
New Results on the SymSum Distinguisher on Round-Reduced SHA3
Sahiba Suryawanshi and Dhiman Saha and Satyam Sachan
2020/666 ( PDF )
Revisiting the Hardness of Binary Error LWE
Chao Sun, Mehdi Tibouchi and Masayuki Abe
2020/665 ( PDF )
Montgomery-friendly primes and applications to cryptography
Jean Claude Bajard and Sylvain Duquesne
2020/664 ( PDF )
The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs
Amos Beimel and Oriol Farrŕs
2020/663 ( PDF )
Super-Linear Time-Memory Trade-Offs for Symmetric Encryption
Wei Dai and Stefano Tessaro and Xihu Zhang
2020/662 ( PDF )
Multi-Party Computation Mechanism for Anonymous Equity Block Trading: A Secure Implementation of Turquoise Plato Uncross
John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui
2020/661 ( PDF )
Tight Consistency Bounds for Bitcoin
Peter Gaži and Aggelos Kiayias and Alexander Russell
2020/660 ( PDF )
Faster Software Implementation of the SIKE Protocol Based on A New Data Representation
Jing Tian and Piaoyang Wang and Zhe Liu and Jun Lin and Zhongfeng Wang and Johann Großschädl
2020/659 ( PDF )
Software Evaluation of Grain-128AEAD for Embedded Platforms
Alexander Maximov and Martin Hell
2020/658 ( PDF )
Time-Specific Signatures
Masahito Ishizaka and Shinsaku Kiyomoto
2020/657 ( PDF )
Traceable Constant-Size Multi-Authority Credentials
Chloé Hébant and David Pointcheval
2020/656 ( PDF )
On Length Independent Security Bounds for the PMAC Family
Bishwajit Chakraborty and Soumya Chattopadhyay and Ashwin Jha and Mridul Nandi
2020/655 ( PDF )
Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel
Yoo-Seung Won and Dirmanto Jap and Shivam Bhasin
2020/654 ( PDF )
Proximity Gaps for Reed-Solomon Codes
Eli Ben-Sasson and Dan Carmon and Yuval Ishai and Swastik Kopparty and Shubhangi Saraf
2020/653 ( PDF )
MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation
Zhen Hang Jiang and Yunsi Fei and Aidong Adam Ding and Thomas Wahl
2020/652 ( PDF )
Somewhere Statistically Binding Commitment Schemes with Applications
Prastudy Fauzi and Helger Lipmaa and Zaira Pindado and Janno Siim
2020/651 ( PDF )
Cryptanalysis of ``FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things''
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso
2020/650 ( PDF )
End-to-End Verifiable E-Voting Trial for Polling Station Voting
Feng Hao and Shen Wang and Samiran Bag and Rob Procter and Siamak Shahandashti and Maryam Mehrnezhad and Ehsan Toreini and Roberto Metere and Lana Liu
2020/649 ( PDF )
NIZK from SNARG
Fuyuki Kitagawa and Takahiro Matsuda and Takashi Yamakawa
2020/648 ( PDF )
Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust
Yuncong Hu and Sam Kumar and Raluca Ada Popa
2020/647 ( PDF )
A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes
Saeid Esmaeilzade and Ziba Eslami and Nasrollah Pakniat
2020/646 ( PDF )
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices
Ward Beullens and Shuichi Katsumata and Federico Pintore
2020/645 ( PDF )
Correlation distribution analysis of a two-round key-alternating block cipher
Liliya Kraleva and Nikolai L. Manev and Vincent Rijmen
2020/644 ( PDF )
ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing
Ignacio Cascudo and Bernardo David
2020/643 ( PDF )
About Blockchain Interoperability
Pascal Lafourcade and Marius Lombard-Platet
2020/642 ( PDF )
The Ritva Blockchain: Enabling Confidential Transactions at Scale
Henri Aare and Peter Vitols
2020/641 ( PDF )
Overview of Polkadot and its Design Considerations
Jeff Burdges and Alfonso Cevallos and Peter Czaban and Rob Habermeier and Syed Hosseini and Fabio Lama and Handan Kilinc Alper and Ximin Luo and Fatemeh Shirazi and Alistair Stewart and Gavin Wood
2020/640 ( PDF )
Grover on SPECK: Quantum Resource Estimates
Kyungbae Jang and Seungjoo Choi and Hyeokdong Kwon and Hwajeong Seo
2020/639 ( PDF )
Indistinguishability obfuscation for quantum circuits of low T-count
Anne Broadbent and Raza Ali Kazmi
2020/638 ( PDF )
Delay Encryption
Jeffrey Burdges and Luca De Feo
2020/637 ( PDF )
DABANGG: Time for Fearless Flush based Cache Attacks
Anish Saxena and Biswabandan Panda
2020/636 ( PDF )
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations
Erik-Oliver Blass and Florian Kerschbaum
2020/635 ( PDF )
Two-Round Oblivious Linear Evaluation from Learning with Errors
Pedro Branco and Nico Döttling and Paulo Mateus
2020/634 ( PDF )
SILVER - Statistical Independence and Leakage Verification
David Knichel and Pascal Sasdrich and Amir Moradi
2020/633 ( PDF )
Weak instances of SIDH variants under improved torsion-point attacks
Péter Kutas and Chloe Martindale and Lorenz Panny and Christophe Petit and Katherine E. Stange
2020/632 ( PDF )
Proposing an MILP-based Method for the Experimental Verification of Difference Trails
Sadegh Sadeghi and Vincent Rijmen and Nasour Bagheri
2020/631 ( PDF )
Simultaneous Diagonalization of Incomplete Matrices and Applications
Jean-Sébastien Coron and Luca Notarnicola and Gabor Wiese
2020/630 ( PDF )
ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy
Zhiguo Wan and Xiaotong Liu
2020/629 ( PDF )
Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer
Vivek Arte and Mihir Bellare
2020/628 ( PDF )
A post-quantum key exchange protocol from the intersection of quadric surfaces
Daniele Di Tullio and Manoj Gyawali
2020/627 ( PDF )
Attacking Zcash For Fun And Profit
Duke Leto and The Hush Developers
2020/626 ( PDF )
Game theoretical framework for analyzing Blockchains Robustness
Paolo Zappalŕ and Marianna Belotti and Maria Potop-Butucaru and Stefano Secci
2020/625 ( PDF )
Probability theory and public-key cryptography
Mariya Bessonov and Dima Grigoriev and Vladimir Shpilrain
2020/624 ( PDF )
RSA for poor men: a cryptosystem based on probable primes to base 2 numbers
Marek Wójtowicz
2020/623 ( PDF )
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
Jason H. M. Ying and Shuwei Cao and Geong Sen Poh and Jia Xu and Hoon Wei Lim
2020/622 ( PDF )
The Direction of Updatable Encryption does not Matter Much
Yao Jiang
2020/621 ( PDF )
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
Junbin Fang and Dominique Unruh and Jian Weng and Jun Yan and Dehua Zhou
2020/620 ( PDF )
Private Identity Agreement for Private Set Functionalities
Ben Kreuter and Sarvar Patel and Ben Terner
2020/619 ( PDF )
Security Analysis of NIST CTR-DRBG
Viet Tung Hoang and Yaobin Shen
2020/618 ( PDF )
Bounds on Ad Hoc Threshold Encryption
Ivan Damgĺrd and Sophia Yakoubov
2020/617 ( PDF )
New Techniques in Replica Encodings with Client Setup
Rachit Garg and George Lu and Brent Waters
2020/616 ( PDF )
Master-Key KDM-Secure IBE from Pairings
Sanjam Garg and Romain Gay and Mohammad Hajiabadi
2020/615 ( PDF )
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
Diego F. Aranha and Felipe Rodrigues Novaes and Akira Takahashi and Mehdi Tibouchi and Yuval Yarom
2020/614 ( PDF )
Lattice-Based E-Cash, Revisited
Amit Deo and Benoit Libert and Khoa Nguyen and Olivier Sanders
2020/613 ( PDF )
SiGamal: A supersingular isogeny-based PKE and its application to a PRF
Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi
2020/612 ( PDF )
Key Assignment Schemes with Authenticated Encryption, revisited
Jeroen Pijnenburg and Bertram Poettering
2020/611 ( PDF )
Efficient and Fast Hardware Architectures for SIKE Round 2 on FPGA
Rami Elkhatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2020/610 ( PDF )
Stronger Multilinear Maps from Indistinguishability Obfuscation
Navid Alamati and Hart Montgomery and Sikhar Patranabis
2020/609 ( PDF )
Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers
Behnaz Rezvani and Thomas Conroy and Luke Beckwith and Matthew Bozzay and Trevor Laffoon and David McFeeters and Yijia Shi and Minh Vu and William Diehl
2020/608 ( PDF )
Low-latency Meets Low-area: An Improved Bit-Sliding Technique for AES, SKINNY and GIFT
Fatih Balli and Andrea Caforio and Subhadeep Banik
2020/607 ( PDF )
Energy Analysis of Lightweight AEAD Circuits
Andrea Caforio and Fatih Balli and Subhadeep Banik
2020/606 ( PDF )
Ring Key-Homomorphic Weak PRFs and Applications
Navid Alamati and Hart Montgomery and Sikhar Patranabis
2020/605 ( PDF )
LUSA: the HPC library for lattice-based cryptanalysis
Artur Mariano
2020/604 ( PDF )
Perfectly Secure Oblivious Parallel RAM with $O(\log^3 N/ \log \log N)$ Overhead
T-H. Hubert Chan and Wei-Kai Lin and Kartik Nayak and Elaine Shi
2020/603 ( PDF )
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification
Gilles Barthe and Marc Gourjon and Benjamin Gregoire and Maximilian Orlt and Clara Paglialonga and Lars Porth
2020/602 ( PDF )
CENCPP* - Beyond-birthday-secure Encryption from Public Permutations
Arghya Bhattacharjee and Avijit Dutta and Eik List and Mridul Nandi
2020/601 ( PDF )
Everything is a Race and Nakamoto Always Wins
Amir Dembo and Sreeram Kannan and Ertem Nusret Tas and David Tse and Pramod Viswanath and Xuechao Wang and Ofer Zeitouni
2020/600 ( PDF )
Multi-Party Threshold Private Set Intersection with Sublinear Communication
Saikrishna Badrinarayanan and Peihan Miao and Peter Rindal
2020/599 ( PDF )
Private Matching for Compute
Prasad Buddhavarapu and Andrew Knox and Payman Mohassel and Shubho Sengupta and Erik Taubeneck and Vlad Vlaskin
2020/598 ( PDF )
Cryptanalysis of Au et al. Dynamic Universal Accumulator
Alex Biryukov and Aleksei Udovenko and Giuseppe Vitto
2020/597 ( PDF )
Bitstream Modification of Trivium
Kalle Ngo and Elena Dubrova and Michail Moraitis
2020/596 ( PDF )
On quantum indistinguishability under chosen plaintext attack
Tore Vincent Carstens and Ehsan Ebrahimi and Gelo Tabia and and Dominique Unruh
2020/595 ( PDF )
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption
Masahito Ishizaka and Shinsaku Kiyomoto
2020/594 ( PDF )
LESS is More: Code-Based Signatures without Syndromes
Jean-Francois Biasse and Giacomo Micheli and Edoardo Persichetti and Paolo Santini
2020/593 ( PDF )
Alt-Coin Traceability
Claire Ye and Chinedu Ojukwu and Anthony Hsu and Ruiqi Hu
2020/592 ( PDF )
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning
Nishat Koti and Mahak Pancholi and Arpita Patra and Ajith Suresh
2020/591 ( PDF )
Automatic Verification of Differential Characteristics: Application to Reduced Gimli (Full Version)
Fukang Liu and Takanori Isobe and Willi Meier
2020/590 ( PDF )
Expected Constant Round Byzantine Broadcast under Dishonest Majority
Jun Wan and Hanshen Xiao and Elaine Shi and Srinivas Devadas
2020/589 ( PDF )
Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity
Mykhailo Kasianchuk and Mikolaj Karpinski and Roman Kochan and Volodymyr Karpinskyi and Grzegorz Litawa and Inna Shylinska and Igor Yakymenko
2020/588 ( PDF )
Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS
ZaHyun Koo and Jong-Seon No and Young-Sik Kim
2020/587 ( PDF )
MoniPoly---An Expressive $q$-SDH-Based Anonymous Attribute-Based Credential System
Syh-Yuan Tan and Thomas Gross
2020/586 ( PDF )
Component-Based Comparison of Privacy-First Exposure Notification Protocols
Ellie Daw
2020/585 ( PDF )
Improving Key Mismatch Attack on NewHope with Fewer Queries
Satoshi Okada and Yuntao Wang and Tsuyoshi Takagi
2020/584 ( PDF )
vCNN: Verifiable Convolutional Neural Network
Seunghwa Lee and Hankyung Ko and Jihye Kim and Hyunok Oh
2020/583 ( PDF )
A New Targeted Password Guessing Model
Xie Zhijie and Zhang Min and Yin Anqi and Li Zhenhan
2020/582 ( PDF )
Risk and Architecture factors in Digital Exposure Notification
Archanaa S. Krishnan and Yaling Yang and Patrick Schaumont
2020/581 ( PDF )
The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency
Benny Applebaum and Eliran Kachlon and Arpita Patra
2020/580 ( PDF )
TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation
Alexei Zamyatin and Zeta Avarikioti and Daniel Perez and William J. Knottenbelt
2020/579 ( PDF )
BitFund: A Benevolent Blockchain Funding Network
Darrow R Hartman
2020/578 ( PDF )
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
Zhuotao Liu and Yangxi Xiang and Jian Shi and Peng Gao and Haoyu Wang and Xusheng Xiao and Bihan Wen and Yih-Chun Hu
2020/577 ( PDF )
Inner-Product Functional Encryption with Fine-Grained Access Control
Michel Abdalla and Dario Catalano and Romain Gay and Bogdan Ursu
2020/576 ( PDF )
How Low Can We Go?
Yuval Ishai
2020/575 ( PDF )
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption
Sanjit Chatterjee and R. Kabaleeshwaran
2020/574 ( PDF )
Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization
Ming Li, Anjia Yang, Xinkai Chen
2020/573 ( PDF )
Quantifying the Security Cost of Migrating Protocols to Practice
Christopher Patton and Thomas Shrimpton
2020/572 ( PDF )
HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms)
Marina Polubelova and Karthikeyan Bhargavan and Jonathan Protzenko and Benjamin Beurdouche and Aymeric Fromherz and Natalia Kulatova and Santiago Zanella-Béguelin
2020/571 ( PDF )
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers
Anubhab Baksi and Jakub Breier and Xiaoyang Dong and Chen Yi
2020/570 ( PDF )
On Optimality of d + 1 TI Shared Functions of 8 Bits or Less
Dušan Božilov
2020/569 ( PDF )
QA-NIZK Arguments of Same Opening for Bilateral Commitments
Carla Rŕfols and Javier Silva
2020/568 ( PDF )
Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy)
Tomer Ashur and Siemen Dhooghe
2020/567 ( PDF )
An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster
Yi Liu and Qi Wang and Siu-Ming Yiu
2020/566 ( PDF )
Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain
Auqib Hamid Lone and Roohie Naaz
2020/565 ( PDF )
Homomorphic Computation in Reed-Muller Codes
Jinkyu Cho and Young-Sik Kim and Jong-Seon No
2020/564 ( PDF )
Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
Mahmoud Yehia and Riham AlTawy and T. Aaron Gulliver
2020/563 ( PDF )
Secure large-scale genome-wide association studies using homomorphic encryption
Marcelo Blatt and Alexander Gusev and Yuriy Polyakov and Shafi Goldwasser
2020/562 ( PDF )
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
Hocheol Shin and Juhwan Noh and Dohyun Kim and Yongdae Kim
2020/561 ( PDF )
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
Fukang Liu and Takanori Isobe and Willi Meier
2020/560 ( PDF )
ZeroJoin: Combining ZeroCoin and CoinJoin
Alexander Chepurnoy and Amitabh Saxena
2020/559 ( PDF )
Striking the Balance: Effective yet Privacy Friendly Contact Tracing
Giuseppe Garofalo and Tim Van hamme and Davy Preuveneers and Wouter Joosen and Aysajan Abidin and Mustafa A. Mustafa
2020/558 ( PDF )
BSPL: Balanced Static Power Logic
Bijan Fadaeinia and Thorben Moos and Amir Moradi
2020/557 ( PDF )
On the sensitivity of some APN permutations to swapping points
Lilya Budaghyan and Nikolay Kaleyski and Constanza Riera and Pantelimon Stanica
2020/556 ( PDF )
Kerckhoffs' Legacy
Jean-Claude Caraco and Rémi Géraud-Stewart and David Naccache
2020/555 ( PDF )
Splitting Payments Locally While Routing Interdimensionally
Lisa Eckey and Sebastian Faust and Kristina Hostáková and Stefanie Roos
2020/554 ( PDF )
Bitcoin-Compatible Virtual Channels
Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostáková and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi
2020/553 ( PDF )
Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT
Hu Xiong and Jinhao Chen and Minghao Yang and Xin Huang
2020/552 ( PDF )
Optimal Minimax Polynomial Approximation of Modular Reduction for Bootstrapping of Approximate Homomorphic Encryption
Joon-Woo Lee and Eunsang Lee and Yongwoo Lee and Young-Sik Kim and Jong-Seon No
2020/551 ( PDF )
Higher Order Differential Attack against Full-Round BIG
Naoki Shibayama and Yasutaka Igarashi and Toshinobu Kaneko
2020/550 ( PDF )
Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation
Ruiyu Zhu and Changchang Ding and Yan Huang
2020/549 ( PDF )
Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks
Prasanna Ravi and Shivam Bhasin and Sujoy Sinha Roy and Anupam Chattopadhyay
2020/548 ( PDF )
Blockchain Stealth Address Schemes
Gary Yu
2020/547 ( PDF )
Finding Bit-Based Division Property for Ciphers with Complex Linear Layer
Kai Hu and Qingju Wang and Meiqin Wang
2020/546 ( PDF )
MixColumns Coefficient Property and Security of the AES with A Secret S-Box
Xin An and Kai Hu and Meiqin Wang
2020/545 ( PDF )
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security
Ran Canetti and Pratik Sarkar and Xiao Wang
2020/544 ( PDF )
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis
Okan Seker and Sebastian Berndt and Luca Wilke and Thomas Eisenbarth
2020/543 ( PDF )
Kachina - Foundations of Private Smart Contracts
Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
2020/542 ( PDF )
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation
Yusuke Naito and Yu Sasaki and Takeshi Sugawara
2020/541 ( PDF )
There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging
Benjamin Dowling and Britta Hale
2020/540 ( PDF )
One Round Threshold ECDSA with Identifiable Abort
Rosario Gennaro and Steven Goldfeder
2020/539 ( PDF )
On the Concrete Security of LWE with Small Secret
Hao Chen and Lynn Chua and Kristin Lauter and Yongsoo Song
2020/538 ( PDF )
Rotational Cryptanalysis on MAC Algorithm Chaskey
Liliya Kraleva and Tomer Ashur and Vincent Rijmen
2020/537 ( PDF )
TARDIS: Time And Relative Delays In Simulation
Carsten Baum and Bernardo David and Rafael Dowsley and Jesper Buus Nielsen and Sabine Oechsner
2020/536 ( PDF )
Higher-Order Differentials of Word-Oriented SPN Schemes with Low-Degree S-Boxes
Carlos Cid and Lorenzo Grassi and Reinhard Lüftenegger and Christian Rechberger and Markus Schofnegger
2020/535 ( PDF )
Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions
Geoffroy Couteau and Shuichi Katsumata and Bogdan Ursu
2020/534 ( PDF )
Post-quantum TLS without handshake signatures
Peter Schwabe and Douglas Stebila and Thom Wiggers
2020/533 ( PDF )
Anonymous Lottery in the Proof-of-Stake Setting
Foteini Baldimtsi and Varun Madathil and Alessandra Scafuro and Linfeng Zhou
2020/532 ( PDF )
Promise: Leveraging Future Gains for Collateral Reduction
Dominik Harz and Lewis Gudgeon and Rami Khalil and Alexei Zamyatin
2020/531 ( PDF )
Centralized or Decentralized? The Contact Tracing Dilemma
Serge Vaudenay
2020/530 ( PDF )
Determining the Multiplicative Complexity of Boolean Functions using SAT
Mathias Soeken
2020/529 ( PDF )
CRISP: Compromise Resilient Identity-based Symmetric PAKE
Moni Naor and Shahar Paz and Eyal Ronen
2020/528 ( PDF )
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach
Joseph K. Liu and Man Ho Au and Tsz Hon Yuen and Cong Zuo and Jiawei Wang and Amin Sakzad and Xiapu Luo and Li Li
2020/527 ( PDF )
Aggregatable Subvector Commitments for Stateless Cryptocurrencies
Alin Tomescu and Ittai Abraham and Vitalik Buterin and Justin Drake and Dankrad Feist and Dmitry Khovratovich
2020/526 ( PDF )
Efficient Montgomery-like formulas for general Huff's and Huff's elliptic curves and their applications to the isogeny-based cryptography
Robert Dryło and Tomasz Kijko and Michał Wroński
2020/525 ( PDF )
Account Management in Proof of Stake Ledgers
Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira
2020/524 ( PDF )
Efficient Signatures on Randomizable Ciphertexts
Balthazar Bauer and Georg Fuchsbauer
2020/523 ( PDF )
The Strictly Zero-Correlation Attack with Application to the Full DES
Tomer Ashur and Raluca Posteuca and Danilo Šijačić and Stef D’haeseleer
2020/522 ( PDF )
Aggregated Private Information Retrieval: A First Practical Implementation to Support Large-Scale Disease Analytics
Lukas Helminger and Daniel Kales and Christian Rechberger and Roman Walch
2020/521 ( PDF )
MP-SPDZ: A Versatile Framework for Multi-Party Computation
Marcel Keller
2020/520 ( PDF )
MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation
Yarkın Doröz and Jeffrey Hoffstein and Joseph H. Silverman and Berk Sunar
2020/519 ( PDF )
Optimally-secure Coin-tossing against a Byzantine Adversary
Hamidreza Amini Khorasgani and Hemanta K. Maji and Mingyuan Wang
2020/518 ( PDF )
Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings
Muhammed F. Esgin and Ngoc Khanh Nguyen and Gregor Seiler
2020/517 ( PDF )
Practical Product Proofs for Lattice Commitments
Thomas Attema and Vadim Lyubashevsky and Gregor Seiler
2020/516 ( PDF )
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers
Mordechai Guri
2020/515 ( PDF )
On a hybrid approach to solve small secret LWE
Thomas Espitau and Antoine Joux and Natalia Kharchenko
2020/514 ( PDF )
On the Deployment of curve based cryptography for the Internet of Things
Michael Scott
2020/513 ( PDF )
E-cclesia: Universally Composable Self-Tallying Elections
Myrto Arapinis and Nikolaos Lamprou and Lenka Mareková and Thomas Zacharias
2020/512 ( PDF )
Glimpses are Forever in RC4 amidst the Spectre of Biases
Chandratop Chakraborty and Pranab Chakraborty and Subhamoy Maitra
2020/511 ( PDF )
JaxNet: Scalable Blockchain Network
Iurii Shyshatsky and Vinod Manoharan and Taras Emelyanenko and Lucas Leger
2020/510 ( PDF )
On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM
Nir Drucker and Shay Gueron and Dusan Kostic and Edoardo Persichetti
2020/509 ( PDF )
BBB Secure Nonce Based MAC Using Public Permutations
Avijit Dutta and Mridul Nandi
2020/508 ( PDF )
Augmenting Leakage Detection using Bootstrapping
Yuan Yao and Michael Tunstall and Elke De Mulder and Anton Kochepasov and Patrick Schaumont
2020/507 ( PDF )
Characteristics of Hadamard square of Reed--Muller subcodes of special type (Extended abstract)
Victoria Vysotskaya
2020/506 ( PDF )
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations
Sonia Belaďd and Pierre-Evariste Dagand and Darius Mercadier and Matthieu Rivain and Raphaël Wintersdorff
2020/505 ( PDF )
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
Wasilij Beskorovajnov and Felix Dörre and Gunnar Hartung and Alexander Koch and Jörn Müller-Quade and Thorsten Strufe
2020/504 ( PDF )
Storing and Retrieving Secrets on a Blockchain
Vipul Goyal and Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno and Yifan Song
2020/503 ( PDF )
A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder
Aaron Hutchinson and Koray Karabina
2020/502 ( PDF )
Applying Blockchain Layer2 Technology to Mass E-Commerce
Sijia Zhao and Donal O’Mahony
2020/501 ( PDF )
Fast Threshold ECDSA with Honest Majority
Ivan Damgĺrd and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael Bćksvang Řstergĺrd
2020/500 ( PDF )
Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Schemes
Lorenzo Grassi and Christian Rechberger and Markus Schofnegger
2020/499 ( PDF )
Proof-Carrying Data from Accumulation Schemes
Benedikt Bünz and Alessandro Chiesa and Pratyush Mishra and Nicholas Spooner
2020/498 ( PDF )
Threshold ECDSA for Decentralized Asset Custody
Adam Gągol and Jędrzej Kula and Damian Straszak and Michał Świętek
2020/497 ( PDF )
Collusion-Preserving Computation without a Mediator
Michele Ciampi and Yun Lu and Vassilis Zikas
2020/496 ( PDF )
Linear Generalized ElGamal Encryption Scheme
Demba Sow and Léo Robert and Pascal Lafourcade
2020/495 ( PDF )
Disperse rotation operator DRT and use in some stream ciphers
Kim Yong-Jin and Yon Yong-Ho and Jong Yu-Jin and Li Ok-Chol
2020/494 ( PDF )
Improved Black-Box Constructions of Composable Secure Computation
Rohit Chatterjee and Xiao Liang and Omkant Pandey
2020/493 ( PDF )
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System
Gennaro Avitabile and Vincenzo Botta and Vincenzo Iovino and Ivan Visconti
2020/492 ( PDF )
UC Non-Interactive, Proactive, Threshold ECDSA
Ran Canetti and Nikolaos Makriyannis and Udi Peled
2020/491 ( PDF )
Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic
Hilder Vitor Lima Pereira
2020/490 ( PDF )
SoK: Techniques for Verifiable Mix Nets
Thomas Haines and Johannes Mueller
2020/489 ( PDF )
Pandemic Contact Tracing Apps: DP-3T, PEPP-PT NTK, and ROBERT from a Privacy Perspective
Fraunhofer AISEC
2020/488 ( PDF )
Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption
Yongwoo Lee and Joonwoo Lee and Young-Sik Kim and Jong-Seon No
2020/487 ( PDF )
Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP
Emmanouil Doulgerakis and Thijs Laarhoven and Benne de Weger
2020/486 ( PDF )
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
Jinyu Lu and Yunwen Liu and Tomer Ashur and Bing Sun and Chao Li
2020/485 ( PDF )
Edwards curve points counting method and supersingular Edwards and Montgomery curves
Ruslan V. Skuratovskii
2020/484 ( PDF )
Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions
Aaqib Bashir Dar and Auqib Hamid Lone and Saniya Zahoor and Afshan Amin Khan and Roohie Naaz
2020/483 ( PDF )
On Ideal and Weakly-Ideal Access Structures
Reza Kaboli and Shahram Khazaei and Maghsoud Parviz
2020/482 ( PDF )
A Trace Based $GF(2^n)$ Inversion Algorithm
Haining Fan
2020/481 ( PDF )
Using z14 Fused-Multiply-Add Instructions to Accelerate Elliptic Curve Cryptography
James You and Qi Zhang and Curtis D'Alves and Bill O'Farrell and Christopher K. Anand
2020/480 ( PDF )
Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Evaluation
Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2020/479 ( PDF )
Puncturable Witness Pseudorandom Functions and its Applications on Witness Encryption
Tapas Pal and Ratna Dutta
2020/478 ( PDF )
Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols
Eshan Chattopadhyay and Jesse Goodman and Vipul Goyal and Xin Li
2020/477 ( PDF )
Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More
Essam Ghadafi
2020/476 ( PDF )
Generalized Bitcoin-Compatible Channels
Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostakova and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi
2020/475 ( PDF )
Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews
Zachary Zaccagni and Ram Dantu
2020/474 ( PDF )
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model
Karim Baghery and Mahdi Sedaghat
2020/473 ( PDF )
Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing
Ashutosh Kumar and Raghu Meka and David Zuckerman
2020/472 ( PDF )
Bracing A Transaction DAG with A Backbone Chain
Shuyang Tang
2020/471 ( PDF )
Interpose PUF can be PAC Learned
Durba Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
2020/470 ( PDF )
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
Fabio Campos and Tim Kohlstadt and Steffen Reith and Marc Stoettinger
2020/469 ( PDF )
Dedicated Security Chips in the Age of Secure Enclaves
Kari Kostiainen and Aritra Dhar and Srdjan Capkun
2020/468 ( PDF )
Distributed Auditing Proofs of Liabilities
Konstantinos Chalkias and Kevin Lewi and Payman Mohassel and Valeria Nikolaenko
2020/467 ( PDF )
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
Zhenzhen Bao and Xiaoyang Dong and Jian Guo and Zheng Li and Danping Shi and Siwei Sun and Xiaoyun Wang
2020/466 ( PDF )
Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks
Pantea Kiaei and Darius Mercadier and Pierre-Evariste Dagand and Karine Heydemann and Patrick Schaumont
2020/465 ( PDF )
Domain-Oriented Masked Instruction Set Architecture for RISC-V
Pantea Kiaei and Patrick Schaumont
2020/464 ( PDF )
Can a Blockchain Keep a Secret?
Fabrice Benhamouda and Craig Gentry and Sergey Gorbunov and Shai Halevi and Hugo Krawczyk and Chengyu Lin and Tal Rabin and Leonid Reyzin
2020/463 ( PDF )
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge
Xiaoning Liu and Bang Wu and Xingliang Yuan and Xun Yi
2020/462 ( PDF )
An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption
Ido Shahaf and Or Ordentlich and Gil Segev
2020/461 ( PDF )
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem
Jean-Sébastien Coron and Agnese Gini
2020/460 ( PDF )
A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption
Marloes Venema and Greg Alpár
2020/459 ( PDF )
Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations
Debdeep Mukhopadhyay
2020/458 ( PDF )
On the Optimality of Optimistic Responsiveness
Ittai Abraham and Kartik Nayak and Ling Ren and Nibesh Shrestha
2020/457 ( PDF )
Cryptographic Scheme for analyzing protected files on Sandboxes and share them privately
Ahmad Almorabea
2020/456 ( PDF )
Bank run Payment Channel Networks
Zhichun Lu and Runchao Han and Jiangshan Yu
2020/455 ( PDF )
Cryptanalysis of LEDAcrypt
Daniel Apon and Ray Perlner and Angela Robinson and Paolo Santini
2020/454 ( PDF )
Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification
Thomas Pornin
2020/453 ( PDF )
BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein
F. Betül Durak and Loďs Huguenin-Dumittan and Serge Vaudenay
2020/452 ( PDF )
Almost Public Quantum Coins
Amit Behera and Or Sattath
2020/451 ( PDF )
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning
Hao Chen and Miran Kim and Ilya Razenshteyn and Dragos Rotaru and Yongsoo Song and Sameer Wagh
2020/450 ( PDF )
The Landscape of Pointcheval-Sanders Signatures: Mapping to Polynomial-Based Signatures and Beyond
Kristian L. McDonald
2020/449 ( PDF )
Switched Threshold Signatures from K-Private PolyShamir Secret Sharing
Kristian L. McDonald
2020/448 ( PDF )
Partial Secret Sharing Schemes
Amir Jafari and Shahram Khazaei
2020/447 ( -- withdrawn -- )
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey
Asma Aloufi and Peizhao Hu and Yongsoo Song and and Kristin Lauter
2020/446 ( PDF )
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography
Tim Fritzmann and Georg Sigl and Johanna Sepúlveda
2020/445 ( PDF )
On Pseudorandom Encodings
Thomas Agrikola and Geoffroy Couteau and Yuval Ishai and Stanislaw Jarecki and Amit Sahai
2020/444 ( PDF )
A modern signature scheme with message recovery: Abe--Okamoto signatures with EdDSA elements
Satō Shinichi
2020/443 ( PDF )
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
Okan Seker and Thomas Eisenbarth and Maciej Liskiewicz
2020/442 ( PDF )
Fine-Grained Cryptography: A New Frontier?
Alon Rosen
2020/441 ( PDF )
Modeling for Three-Subset Division Property without Unknown Subset
Yonglin Hao and Gregor Leander and Willi Meier and Yosuke Todo and Qingju Wang
2020/440 ( PDF )
Sublattice Attacks on Ring-LWE with Wide Error Distributions I
Hao Chen
2020/439 ( PDF )
The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE
Hiroshi Onuki and Yusuke Aikawa and Tsuyoshi Takagi
2020/438 ( PDF )
Fast hybrid Karatsuba multiplier for Type II pentanomials
Yin Li and Yu Zhang and Wei He
2020/437 ( PDF )
Faster Montgomery and double-add ladders for short Weierstrass curves
Mike Hamburg
2020/436 ( PDF )
Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification
Houssem Maghrebi
2020/435 ( PDF )
WAGE: An Authenticated Encryption with a Twist
Riham AlTawy and Guang Gong and Kalikinkar Mandal and Raghvendra Rohit
2020/434 ( PDF )
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware
Sujoy Sinha Roy and Andrea Basso
2020/433 ( PDF )
zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays
Martin Westerkamp and Jacob Eberhardt
2020/432 ( PDF )
From A to Z: Projective coordinates leakage in the wild
Alejandro Cabrera Aldaya and Cesar Pereida García and Billy Bob Brumley
2020/431 ( PDF )
x-only point addition formula and faster torsion basis generation in compressed SIKE
Geovandro C. C. F. Pereira and Javad Doliskani and David Jao
2020/430 ( PDF )
Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures
Aram Jivanyan and Tigran Mamikonyan
2020/429 ( PDF )
Mathematics and Cryptography: A Marriage of Convenience?
Alice Silverberg
2020/428 ( PDF )
Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc.
Yaron Gvili
2020/427 ( PDF )
Improving the Performance of the Picnic Signature Scheme
Daniel Kales and Greg Zaverucha
2020/426 ( PDF )
Privacy-Preserving Contact Tracing: current solutions and open questions
Qiang Tang
2020/425 ( PDF )
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel
2020/424 ( PDF )
Low-gate Quantum Golden Collision Finding
Samuel Jaques and André Schrottenloher
2020/423 ( PDF )
On One-way Functions and Kolmogorov Complexity
Yanyi Liu and Rafael Pass
2020/422 ( PDF )
Pattern Matching on Encrypted Data
Anis Bkakria and Nora Cuppens and Frédéric Cuppens
2020/421 ( PDF )
Multichain-MWPoW: A $p/2$ Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture
Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos
2020/420 ( PDF )
Practical Card-Based Protocol for Three-Input Majority
Kenji Yasunaga
2020/419 ( PDF )
Pointproofs: Aggregating Proofs for Multiple Vector Commitments
Sergey Gorbunov and Leonid Reyzin and Hoeteck Wee and Zhenfei Zhang
2020/418 ( PDF )
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
Krzysztof Pietrzak
2020/417 ( PDF )
Optimal strategies for CSIDH
Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez
2020/416 ( PDF )
The Multi-Base Discrete Logarithm Problem: Non-Rewinding Proofs and Improved Reduction Tightness for Identification and Signatures
Mihir Bellare and Wei Dai
2020/415 ( PDF )
Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE
Shweta Agrawal and Alice Pellet-Mary
2020/414 ( PDF )
Semi-Quantum Money
Roy Radian and Or Sattath
2020/413 ( PDF )
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
Louis Goubin and Matthieu Rivain and Junwei Wang
2020/412 ( PDF )
Fixslicing: A New GIFT Representation
Alexandre Adomnicai and Zakaria Najm and Thomas Peyrin
2020/411 ( PDF )
Secure Two-Party Computation in a Quantum World
Niklas Büscher and Daniel Demmler and Nikolaos P. Karvelas and Stefan Katzenbeisser and Juliane Krämer and Deevashwer Rathee and Thomas Schneider and Patrick Struck
2020/410 ( PDF )
Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4
Hwajeong Seo and Mila Anastasova and Amir Jalali and Reza Azarderakhsh
2020/409 ( PDF )
Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes
Loďs Huguenin-Dumittan and Serge Vaudenay
2020/408 ( PDF )
Speed up over the Rainbow
Nir Drucker and Shay Gueron
2020/407 ( PDF )
Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection
Aydin Abadi and Sotirios Terzis and Changyu Dong
2020/406 ( PDF )
Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience
Atsuki Momose and Jason Paul Cruz and Yuichi Kaji
2020/405 ( PDF )
Ordinos: A Verifiable Tally-Hiding E-Voting System
Ralf Kuesters and Julian Liedtke and Johannes Mueller and Daniel Rausch and Andreas Vogt
2020/404 ( PDF )
From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards
Tassos Dimitriou
2020/403 ( PDF )
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
David Derler and Kai Samelin and Daniel Slamanig
2020/402 ( PDF )
A Note on Low Order Assumptions in RSA groups
István András Seres and Péter Burcsi
2020/401 ( PDF )
Mining for Privacy: How to Bootstrap a Snarky Blockchain
Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
2020/400 ( PDF )
Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis
Jeroen Delvaux
2020/399 ( PDF )
Analysis of DP3T
Serge Vaudenay
2020/398 ( PDF )
Decentralized Contact Tracing Using a DHT and Blind Signatures
Samuel Brack and Leonie Reichert and Björn Scheuermann
2020/397 ( PDF )
Classification of 4-bit S-boxes for BOGI-permutation
Seonggyeom Kim and Deukjo Hong and Jaechul Sung and Seokhie Hong
2020/396 ( PDF )
Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing
Donggeun Kwon and HeeSeok Kim and Seokhie Hong
2020/395 ( PDF )
Cryptography from Information Loss
Marshall Ball and Elette Boyle and Akshay Degwekar and Apoorvaa Deshpande and Alon Rosen and Vinod Vaikuntanathan and Prashant Nalini Vasudevan
2020/394 ( PDF )
Candidate iO from Homomorphic Encryption Schemes
Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta
2020/393 ( PDF )
LevioSA: Lightweight Secure Arithmetic Computation
Carmit Hazay and Yuval Ishai and Antonio Marcedone and Muthuramakrishnan Venkitasubramaniam
2020/392 ( PDF )
An argument on the security of LRBC, a recently proposed lightweight block cipher
Sadegh Sadeghi and Nasour Bagheri
2020/391 ( PDF )
Optimized CSIDH Implementation Using a 2-torsion Point
Donghoe Heo and Suhri Kim and Kisoon Yoon and Young-Ho Park and Seokhie Hong
2020/390 ( PDF )
A French cipher from the late 19th century
Rémi Géraud-Stewart and David Naccache
2020/389 ( PDF )
A Unary Cipher with Advantages over the Vernam Cipher
Gideon Samid
2020/388 ( PDF )
Fast 4 way vectorized ladder for the complete set of Montgomery curves
Huseyin Hisil and Berkan Egrice and Mert Yassi
2020/387 ( PDF )
Low-complexity and Reliable Transforms for Physical Unclonable Functions
Onur Gunlu and Rafael F. Schaefer
2020/386 ( PDF )
Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric
Ralf Kuesters and Daniel Rausch and Mike Simon
2020/385 ( PDF )
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality
Peihan Miao and Sarvar Patel and Mariana Raykova and Karn Seth and Moti Yung
2020/384 ( PDF )
A ”Final” Security Bug
Nguyen Thoi Minh Quan
2020/383 ( PDF )
Parallel strategies for SIDH: Towards computing SIDH twice as fast
Daniel Cervantes-Vázquez and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez
2020/382 ( PDF )
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection
Jan Bobolz and Fabian Eidens and Stephan Krenn and Daniel Slamanig and Christoph Striecks
2020/381 ( PDF )
A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback
Leonard Kleinrock and Rafail Ostrovsky and Vassilis Zikas
2020/380 ( PDF )
Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory
Anirban Chakraborty and Sarani Bhattacharya and Sayandeep Saha and Debdeep Mukhopdhyay
2020/379 ( PDF )
Post-quantum WireGuard
Andreas Hülsing and Kai-Chun Ning and Peter Schwabe and Florian Weber and Philip R. Zimmermann
2020/378 ( PDF )
Efficient 4-way Vectorizations of the Montgomery Ladder
Kaushik Nath and Palash Sarkar
2020/377 ( PDF )
Oblivious tight compaction in O(n) time with smaller constant
Samuel Dittmer and Rafail Ostrovsky
2020/376 ( PDF )
On the privacy of a code-based single-server computational PIR scheme
Sarah Bordage and Julien Lavauzelle
2020/375 ( PDF )
Privacy-Preserving Contact Tracing of COVID-19 Patients
Leonie Reichert and Samuel Brack and Björn Scheuermann
2020/374 ( PDF )
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority
Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and abhi shelat and Muthu Venkitasubramaniam and Ruihan Wang
2020/373 ( PDF )
Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES
Huanyu Wang and Elena Dubrova
2020/372 ( PDF )
Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions
Claude Carlet
2020/371 ( PDF )
Single-Trace Attacks on Keccak
Matthias J. Kannwischer and Peter Pessl and Robert Primas
2020/370 ( PDF )
Multiparty Generation of an RSA Modulus
Megan Chen and Ran Cohen and Jack Doerner and Yashvanth Kondi and Eysa Lee and Schuyler Rosefield and abhi shelat
2020/369 ( PDF )
The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs
David Knichel and Thorben Moos and Amir Moradi
2020/368 ( PDF )
Defeating NewHope with a Single Trace
Dorian Amiet and Andreas Curiger and Lukas Leuenberger and Paul Zbinden
2020/367 ( PDF )
Exploiting Decryption Failures in Mersenne Number Cryptosystems
Marcel Tiepelt and Jan-Pieter D'Anvers
2020/366 ( PDF )
FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection
Hangwei Lu and Dhwani Mehta and Olivia Paradis and Navid Asadizanjani and Mark Tehranipoor and Damon L. Woodard
2020/365 ( PDF )
A New Algorithm to Find Monic Irreducible Polynomials over Extended Galois field GF prime p and extension q using Positional Arithmetic
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/364 ( PDF )
Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs
Behzad Abdolmaleki and Daniel Slamanig
2020/363 ( PDF )
On equivalence between known polynomial APN functions and power APN functions
Qianhong Wan and Longjiang Qu and Chao Li
2020/362 ( -- withdrawn -- )
Another Look at CBC Casper Consensus Protocol
Yongge Wang
2020/361 ( PDF )
How Not to Create an Isogeny-Based PAKE
Reza Azarderakhsh and David Jao and Brian Koziel and Jason T. LeGrow and Vladimir Soukharev and Oleg Taraskin
2020/360 ( PDF )
Composite Algorithm The New Algorithm to Search for Monic Irreducible Polynomials over Extended Galois Fields
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/359 ( PDF )
4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes.
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/358 ( PDF )
Division Algorithm to search for monic irreducible polynomials over extended Galois Field GF(p^q).
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/357 ( PDF )
Quasigroups and Substitution Permutation Networks: A Failed Experiment
George Teseleanu
2020/356 ( PDF )
Efficient MPC with a Mixed Adversary
Martin Hirt and Marta Mularczyk
2020/355 ( PDF )
Permissionless Consensus in the Resource Model
Benjamin Terner
2020/354 ( PDF )
A Generalization of the ElGamal public-key cryptosystem
Rajitha Ranasinghe and Pabasara Athukorala
2020/353 ( PDF )
A Probabilistic Public Key Encryption Scheme Based on Quartic Reciprocity (Draft V1.1)
Robert A. Threlfall
2020/352 ( PDF )
Coda: Decentralized Cryptocurrency at Scale
Joseph Bonneau and Izaak Meckler and Vanishree Rao and Evan Shapiro
2020/351 ( PDF )
Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition
Youssef El Housni and Aurore Guillevic
2020/350 ( PDF )
New Multi-bit Differentials to Improve Attacks Against ChaCha
Murilo Coutinho and T. C. Souza Neto
2020/349 ( PDF )
Differential Power Analysis on (Non-)Linear Feedback Shift Registers
Siang Meng Sim
2020/348 ( PDF )
Constructing hidden order groups using genus three Jacobians
Steve Thakur
2020/347 ( PDF )
Some Low Round Zero Knowledge Protocols
Hongda Li and Peifang Ni and Dongxue Pan
2020/346 ( PDF )
Algebraic Attacks on Round-Reduced Keccak/Xoodoo
Fukang Liu and Takanori Isobe and Willi Meier and Zhonghao Yang
2020/345 ( PDF )
Bent functions stemming from Maiorana-McFarland class being provably outside its completed version
Fengrong Zhangand Nastja Cepak and Enes Pasalicand Yongzhuang Wei
2020/344 ( PDF )
Anchoring the Value of Cryptocurrency
Yibin Xu and Yangyu Huang and Jianhua Shao
2020/343 ( PDF )
BSC: A Bitcoin Smart Contract Implementation
Hiro Midas
2020/342 ( PDF )
Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge
Estuardo Alpirez Bock and Alexander Treff
2020/341 ( PDF )
Faster computation of isogenies of large prime degree
Daniel J. Bernstein and Luca De Feo and Antonin Leroux and Benjamin Smith
2020/340 ( PDF )
Differential Privacy for Eye Tracking with Temporal Correlations
Efe Bozkir* and Onur Gunlu* and Wolfgang Fuhl and Rafael F. Schaefer and Enkelejda Kasneci
2020/339 ( PDF )
Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics
George Teseleanu
2020/338 ( PDF )
Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits
Daniel Escudero and Satrajit Ghosh and Marcel Keller and Rahul Rachuri and Peter Scholl
2020/337 ( PDF )
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography
Nicholas Genise and Daniele Micciancio and Chris Peikert and Michael Walter
2020/336 ( PDF )
Gimli Encryption in 715.9 psec
Santosh Ghosh and Michael Kounavis and Sergej Deutsch
2020/335 ( PDF )
An n/2 byzantine node tolerated blockchain sharding approach
Yibin Xu and Yangyu Huang
2020/334 ( PDF )
4-Uniform Permutations with Null Nonlinearity
Christof Beierle and Gregor Leander
2020/333 ( -- withdrawn -- )
A Simpler and Modular Construction of Linkable Ring Signature
Wulu Li and Yongcan Wang and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2020/332 ( PDF )
Implementation Study of Two Verifiable Delay Functions
Vidal Attias and Luigi Vigneri and Vassil Dimitrov
2020/331 ( PDF )
The CTR mode with encrypted nonces and its extension to AE
Sergey Agievich
2020/330 ( PDF )
Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective
Gil Segev and Ido Shahaf
2020/329 ( PDF )
Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields
Gabrielle De Micheli and Pierrick Gaudry and Cécile Pierrot
2020/328 ( PDF )
Leveraging Weight Functions for Optimistic Responsiveness in Blockchains
Simon Holmgaard Kamp and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Sřren Eller Thomsen and Daniel Tschudi
2020/327 ( PDF )
On the design of stream ciphers with Cellular Automata having radius = 2
Anita John and Rohit Lakra and Jimmy Jose
2020/326 ( PDF )
An upper bound on the decryption failure rate of static-key NewHope
John M. Schanck
2020/325 ( PDF )
SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts
Robert Muth and Florian Tschorsch
2020/324 ( PDF )
Defeating CAS-Unlock
Bicky Shakya and Xiaolin Xu and Mark Tehranipoor and Domenic Forte
2020/323 ( PDF )
A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol
Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos
2020/322 ( PDF )
Optimal and Error-Free Multi-Valued Byzantine Consensus Through Parallel Execution
Andrew Loveless and Ronald Dreslinski and Baris Kasikci
2020/321 ( PDF )
Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism
Jose Maria Bermudo Mera and Furkan Turan and Angshuman Karmakar and Sujoy Sinha Roy and Ingrid Verbauwhede
2020/320 ( PDF )
Universally Composable Relaxed Password Authenticated Key Exchange
Michel Abdalla and Manuel Barbosa and Tatiana Bradley and Stanislaw Jarecki and Jonathan Katz and Jiayu Xu
2020/319 ( PDF )
Secure k-ish nearest neighbors classifier
Hayim Shaul and Dan Feldman and Daniela Rus
2020/318 ( PDF )
Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL
Huijia Lin and Ji Luo
2020/317 ( PDF )
Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure
Archisman Ghosh and Debayan Das and Shreyas Sen
2020/316 ( PDF )
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
Rishab Goyal and Sam Kim and Brent Waters and David J. Wu
2020/315 ( PDF )
plookup: A simplified polynomial protocol for lookup tables
Ariel Gabizon and Zachary J. Williamson
2020/314 ( PDF )
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA
Shigeo Tsujii and Ryo Fujita and Masahito Gotaishi
2020/313 ( PDF )
Security analysis of SPAKE2+
Victor Shoup
2020/312 ( PDF )
Arcturus: efficient proofs for confidential transactions
Sarang Noether
2020/311 ( PDF )
A Blockchain Traceable Scheme with Oversight Function
Tianjun Ma and Haixia Xu and Peili Li
2020/310 ( PDF )
Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis
Gabriel Destouet and Cécile Dumas and Anne Frassati and Valérie Perrier
2020/309 ( PDF )
Cryptanalysis Results on Spook
Patrick Derbez and Paul Huynh and Virginie Lallemand and María Naya-Plasencia and Léo Perrin and André Schrottenloher
2020/308 ( PDF )
Post-Quantum TLS on Embedded Systems
Kevin Bürstinghaus-Steinbach and Christoph Krauß and Ruben Niederhagen and Michael Schneider
2020/307 ( PDF )
Handling vectorial functions by means of their graph indicators
Claude Carlet
2020/306 ( PDF )
Leakage Assessment in Fault Attacks: A Deep Learning Perspective
Sayandeep Saha and Manaar Alam and Arnab Bag and Debdeep Mukhopadhyay and Pallab Dasgupta
2020/305 ( PDF )
3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA
Shigeo Tsujii and Toshiaki Saisho and Masao Yamasawa and Masahito Gotaishi and Kou Shikata and Koji Sasaki and Nobuharu Suzuki and Masaki Hashiyada
2020/304 ( PDF )
Multiparty Homomorphic Encryption: From Theory to Practice
Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Pierre Hubaux
2020/303 ( PDF )
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Sergei Tikhomirov and Pedro Moreno-Sanchez and Matteo Maffei
2020/302 ( PDF )
Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers
Thomas Kaeding
2020/301 ( PDF )
MadHatter: A toy cipher that conceals two plaintexts in the same ciphertext
Thomas Kaeding
2020/300 ( PDF )
Secure Multiparty Computation (MPC)
Yehuda Lindell
2020/299 ( PDF )
Hydra: Fast Isomorphic State Channels
Manuel M. T. Chakravarty and Sandro Coretti and Matthias Fitzi and Peter Gazi and Philipp Kant and Aggelos Kiayias and Alexander Russell
2020/298 ( PDF )
Fast polynomial inversion for post quantum QC-MDPC cryptography
Nir Drucker and Shay Gueron and Dusan Kostic
2020/297 ( PDF )
Random Self-reducibility of Ideal-SVP via Arakelov Random Walks
Koen de Boer and Léo Ducas and Alice Pellet-Mary and Benjamin Wesolowski
2020/296 ( PDF )
Multidimensional Database Reconstruction from Range Query Access Patterns
Akshima and David Cash and Francesca Falzon and Adam Rivkin and Jesse Stern
2020/295 ( PDF )
Generalized Isotopic Shift Construction for APN Functions
Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert Coulter and Irene Villa
2020/294 ( PDF )
Public-Key Generation with Verifiable Randomness
Olivier Blazy and Patrick Towa and Damien Vergnaud
2020/293 ( PDF )
"Many-out-of-Many" Proofs with Applications to Anonymous Zether
Benjamin E. Diamond
2020/292 ( PDF )
LWE with Side Information: Attacks and Concrete Security Estimation
Dana Dachman-Soled and Léo Ducas and Huijing Gong and Mélissa Rossi
2020/291 ( -- withdrawn -- )
Unforgeability in the quantum world
Myrto Arapinis and Mahshid Delavar and Mina Doosti and Elham Kashefi
2020/290 ( PDF )
Linear Cryptanalysis of Reduced-Round SIMON Using Super Rounds
Reham Almukhlifi and Poorvi Vora
2020/289 ( PDF )
The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves
Jonathan Lee
2020/288 ( PDF )
Secure Key-Alternating Feistel Ciphers Without Key Schedule
Yaobin Shen and Hailun Yan and Lei Wang and Xuejia Lai
2020/287 ( PDF )
Private resource allocators and their applications
Sebastian Angel and Sampath Kannan and Zachary Ratliff
2020/286 ( PDF )
Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages
Geoffroy Couteau and Dominik Hartmann
2020/285 ( PDF )
Improved Security Bounds for Generalized Feistel Networks
Yaobin Shen and Chun Guo and Lei Wang
2020/284 ( PDF )
Database Reconstruction Attacks in Two Dimensions
Evangelia Anna Markatou and Roberto Tamassia
2020/283 ( PDF )
CryptoWills: How to Bequeath Cryptoassets
István András Seres and Omer Shlomovits and Pratyush Ranjan Tiwari
2020/282 ( PDF )
The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
Jelle Don and Serge Fehr and Christian Majenz
2020/281 ( PDF )
Privacy-friendly Monero transaction signing on a hardware wallet, extended version
Dusan Klinec Vashek Matyas
2020/280 ( PDF )
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
Juliane Krämer and Patrick Struck
2020/279 ( PDF )
Impact of System-on-Chip Integration of AEAD Ciphers
Shashank Raghuraman and Leyla Nazhandali
2020/278 ( PDF )
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs
Ahmed Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Dawn Song
2020/277 ( PDF )
Full Analysis of Nakamoto Consensus in Bounded-Delay Networks
Juan Garay and Aggelos Kiayias and Nikos Leonardos
2020/276 ( PDF )
CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware
Hamid Nejatollahi and Saransh Gupta and Mohsen Imani and Tajana Simunic Rosing and Rosario Cammarota and Nikil Dutt
2020/275 ( PDF )
Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function
Jannis Bossert and Eik List and Stefan Lucks and Sebastian Schmitz
2020/274 ( PDF )
An Optimal Relational Database Encryption Scheme
Seny Kamara and Tarik Moataz and Stan Zdonik and Zheguang Zhao
2020/273 ( PDF )
On the Fast Algebraic Immunity of Threshold Functions
Pierrick Méaux
2020/272 ( PDF )
Privacy-Preserving Fast and Exact Linear Equations Solver with Fully Homomorphic Encryption
Keita Arimitsu and Kazuki Otsuka
2020/271 ( PDF )
Signatures from Sequential-OR Proofs
Marc Fischlin and Patrick Harasser and Christian Janson
2020/270 ( PDF )
Practical Predicate Encryption for Inner Product
Yi-Fan Tseng and Zi-Yuan Liu and Raylin Tso
2020/269 ( PDF )
Order-Fairness for Byzantine Consensus
Mahimna Kelkar and Fan Zhang and Steven Goldfeder and Ari Juels
2020/268 ( PDF )
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography
Jose Maria Bermudo Mera and Angshuman Karmakar and Ingrid Verbauwhede
2020/267 ( PDF )
Differential Power Analysis of the Picnic Signature Scheme
Tim Gellersen and Okan Seker and Thomas Eisenbarth
2020/266 ( PDF )
Quantum Indistinguishability for Public Key Encryption
Tommaso Gagliardoni and Juliane Krämer and Patrick Struck
2020/265 ( PDF )
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More
Benoît Libert and Alain Passelčgue and Hoeteck Wee and David J. Wu
2020/264 ( PDF )
Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes
Nicholas Mainardi and Alessandro Barenghi and Gerardo Pelosi
2020/263 ( PDF )
FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups
Jihoon Kwon and Byeonghak Lee and Jooyoung Lee and and Dukjae Moon
2020/262 ( PDF )
A Note on the Ending Elliptic Curve in SIDH
Christopher Leonardi
2020/261 ( PDF )
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices
Matthieu Monteiro and Kumara Kahatapitiya and Hassan Jameel Asghar and Kanchana Thilakarathna and Thierry Rakotoarivelo and Dali Kaafar and Shujun Li and Ron Steinfeld and Josef Pieprzyk
2020/260 ( PDF )
Lattice-based (Partially) Blind Signature without Restart
Samuel Bouaziz-Ermann and Sébastien Canard and Gautier Eberhart and Guillaume Kaim and Adeline Roux-Langlois and Jacques Traoré
2020/259 ( PDF )
Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors
Divesh Aggarwal and Maciej Obremski and Joăo Ribeiro and Mark Simkin and Luisa Siniscalchi
2020/258 ( PDF )
NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations
Zvika Brakerski and Venkata Koppula and Tamer Mour
2020/257 ( PDF )
Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication
Onur Gunlu and Rafael F. Schaefer and H. Vincent Poor
2020/256 ( PDF )
Statistical ZAPR Arguments from Bilinear Maps
Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs
2020/255 ( PDF )
Novel Deception Techniques for Malware Detection on Industrial Control Systems
Takanori Machida and Dai Yamamoto and Yuki Unno and Hisashi Kojima
2020/254 ( PDF )
Formalizing Data Deletion in the Context of the Right to be Forgotten
Sanjam Garg and Shafi Goldwasser and Prashant Nalini Vasudevan
2020/253 ( PDF )
Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing
Hemanta K. Maji and Mingyuan Wang
2020/252 ( PDF )
Secure Non-interactive Simulation: Feasibility & Rate
Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen
2020/251 ( PDF )
Communication Lower Bounds for Perfect Maliciously Secure MPC
Ivan Damgĺrd and Nikolaj I. Schwartzbach
2020/250 ( PDF )
On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations
Ehsan Aerabi and Athanasios Papadimitriou and David Hely
2020/249 ( PDF )
CONFISCA : an SIMD-based CONcurrent FI and SCA countermeasure with switchable performance and security modes
Ehsan Aerabi and Cyril Bresch and David Hély and Athanasios Papadimitriou and Mahdi Fazeli
2020/248 ( PDF )
Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast
Ittai Abraham and Benny Pinkas and Avishay Yanai
2020/247 ( -- withdrawn -- )
Crooked Indifferentiability Revisited
Rishiraj Bhattacharyya and Mridul Nandi and Anik Raychaudhuri
2020/246 ( PDF )
Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography
Jing Tian and Jun Lin and Zhongfeng Wang
2020/245 ( PDF )
New Assumptions and Efficient Cryptosystems from the $e$-th Power Residue Symbol
Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao and Licheng Wang and Zhusen Liu
2020/244 ( PDF )
On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol
Andrea Basso and Péter Kutas and Simon-Philipp Merz and Christophe Petit and Charlotte Weitkämper
2020/243 ( PDF )
An Analysis of Hybrid Public Key Encryption
Benjamin Lipp
2020/242 ( PDF )
Practical and Secure Circular Range Search on Private Spatial Data
Zhihao Zheng and Jiachen Shen and Zhenfu Cao
2020/241 ( PDF )
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability
Mihir Bellare and Hannah Davis and Felix Günther
2020/240 ( PDF )
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture
T-H. Hubert Chan and Kai-Min Chung and Wei-Kai Lin and Elaine Shi
2020/239 ( PDF )
Viktoria: A new Paradigm for Hash Functions
Edimar Veríssimo
2020/238 ( PDF )
Efficient ECM factorization in parallel with the Lyness map
Andrew Hone
2020/237 ( PDF )
On Security Notions for Encryption in a Quantum World
Céline Chevalier and Ehsan Ebrahimi and Quoc-Huy Vu
2020/236 ( PDF )
Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21
Mridul Nandi
2020/235 ( PDF )
Statistical Zaps and New Oblivious Transfer Protocols
Vipul Goyal and Abhishek Jain and Zhengzhong Jin and and Giulio Malavolta
2020/234 ( PDF )
Application of commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups to Key Exchange Protocol
Ruslan V. Skuratovskii and Aled Williams
2020/233 ( PDF )
Key-Homomorphic Pseudorandom Functions from LWE with a Small Modulus
Sam Kim
2020/232 ( PDF )
Combiners for AEAD
Bertram Poettering and Paul Rösler
2020/231 ( PDF )
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions
Nuttapong Attrapadung and Junichi Tomida
2020/230 ( PDF )
Lattice analysis on MiNTRU problem
Changmin Lee and Alexandre Wallet
2020/229 ( PDF )
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications
Itai Dinur
2020/228 ( PDF )
Optimal Broadcast Encryption from Pairings and LWE
Shweta Agrawal and Shota Yamada
2020/227 ( PDF )
About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10
Yindong Chen, Limin Lin, Chuliang Wei
2020/226 ( PDF )
Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol
Meher Krishna Duggirala . and . Ravi Duggirala . and . Krishna Subba Rao Pulugurtha
2020/225 ( PDF )
Generic-Group Delay Functions Require Hidden-Order Groups
Lior Rotem and Gil Segev and Ido Shahaf
2020/224 ( PDF )
Security under Message-Derived Keys: Signcryption in iMessage
Mihir Bellare and Igors Stepanovs
2020/223 ( PDF )
Compact NIZKs from Standard Assumptions on Bilinear Maps
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2020/222 ( PDF )
Improving Speed and Security in Updatable Encryption Schemes
Dan Boneh and Saba Eskandarian and Sam Kim and Maurice Shih
2020/221 ( PDF )
Multiparty Reusable Non-Interactive Secure Computation
Fabrice Benhamouda and Huijia Lin
2020/220 ( PDF )
Remote Side-Channel Attacks on Anonymous Transactions
Florian Tramčr and Dan Boneh and Kenneth G. Paterson
2020/219 ( PDF )
Multi-Client Functional Encryption for Separable Functions
Michele Ciampi and Luisa Siniscalchi and Hendrik Waldner
2020/218 ( PDF )
Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs
Ehsan Aerabi and Milad Bohlouli and MohammadHasan Ahmadi Livany and Mahdi Fazeli and Athanasios Papadimitriou and David Hely
2020/217 ( PDF )
SynFi: Automatic Synthetic Fingerprint Generation
M. Sadegh Riazi and Seyed M. Chavoshian and Farinaz Koushanfar
2020/216 ( PDF )
Black-Box Constructions of Bounded-Concurrent Secure Computation
Sanjam Garg and Xiao Liang and Omkant Pandey and Ivan Visconti
2020/215 ( PDF )
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption
Megumi Ando and Anna Lysyanskaya
2020/214 ( PDF )
Thresholdizing HashEdDSA: MPC to the Rescue
Charlotte Bonte and Nigel P. Smart and Titouan Tanguy
2020/213 ( PDF )
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound
Akinori Hosoyamada and Yu Sasaki
2020/212 ( PDF )
Isogenies of certain abelian varieties over finite fields with p-ranks zero
Steve Thakur
2020/211 ( PDF )
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle
Davide Bellizia and Olivier Bronchain and Gaëtan Cassiers and Vincent Grosso and Chun Guo and Charles Momin and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2020/210 ( PDF )
SITM: See-In-The-Middle--Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers
Shivam Bhasin and Jakub Breier and Xiaolu Hou and Dirmanto Jap and Romain Poussier and Siang Meng Sim
2020/209 ( PDF )
Adaptive Simulation Security for Inner Product Functional Encryption
Shweta Agrawal and Benoît Libert and Monosij Maitra and Radu Titiu
2020/208 ( PDF )
Random Integer Lattice Generation via HNF
Gengran Hu and Lin You and Liqin Hu and Hui Wang
2020/207 ( PDF )
A Framework for Universally Composable Publicly Verifiable Cryptographic Protocols
Carsten Baum and Bernardo David and Rafael Dowsley
2020/206 ( -- withdrawn -- )
A Post-Quantum Non-Interactive Key-Exchange Protocol from Coding Theory
Jean-Francois Biasse and Giacomo Micheli and Edoardo Persichetti and Paolo Santini
2020/205 ( PDF )
SodsBC: Stream of Distributed Secrets for Quantum-safe Blockchain
Shlomi Dolev and Ziyu Wang
2020/204 ( PDF )
Cryptographic Reverse Firewalls for Interactive Proof Systems
Chaya Ganesh and Bernardo Magri and Daniele Venturi
2020/203 ( PDF )
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework
Thang Hoang and Jorge Guajardo and Attila A. Yavuz
2020/202 ( PDF )
Strong Anti-SAT: Secure and Effective Logic Locking
Yuntao Liu and Michael Zuzak and Yang Xie and Abhishek Chakraborty and Ankur Srivastava
2020/201 ( PDF )
A Survey on Neural Trojans
Yuntao Liu and Ankit Mondal and Abhishek Chakraborty and Michael Zuzak and Nina Jacobsen and Daniel Xing and Ankur Srivastava
2020/200 ( PDF )
Exploring the Golden Mean Between Leakage and Fault Resilience and Practice
Christoph Dobraunig and Bart Mennink and Robert Primas
2020/199 ( PDF )
Improvement on a Masked White-box Cryptographic Implementation
Seungkwang Lee and Myungchul Kim
2020/198 ( PDF )
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors
Shi Bai and Dipayan Das and Ryo Hiromasa and Miruna Rosca and Amin Sakzad and Damien Stehlé and Ron Steinfeld and Zhenfei Zhang
2020/197 ( PDF )
Dynamic Decentralized Functional Encryption
Jérémy Chotard and Edouard Dufour-Sans and Romain Gay and Duong Hieu Phan and David Pointcheval
2020/196 ( PDF )
Trustless Groups of Unknown Order with Hyperelliptic Curves
Samuel Dobson and Steven D. Galbraith and Benjamin Smith
2020/195 ( PDF )
Replicated state machines without replicated execution
Jonathan Lee and Kirill Nikitin and Srinath Setty
2020/194 ( PDF )
Adaptively Secure ABE for DFA from k-Lin and More
Junqing Gong and Hoeteck Wee
2020/193 ( PDF )
PSI from PaXoS: Fast, Malicious Private Set Intersection
Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai
2020/192 ( -- withdrawn -- )
Certificateless Homomorphic Signature Scheme for Network Coding
Jinyong Chang and Bilin Shao and Yanyan Ji and Genqing Bian
2020/191 ( PDF )
Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE
Zvika Brakerski and Vinod Vaikuntanathan
2020/190 ( PDF )
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees
Assimakis Kattis and Joseph Bonneau
2020/189 ( PDF )
Guaranteed Output Delivery Comes Free in Honest Majority MPC
Vipul Goyal and Yifan Song and Chenzhi Zhu
2020/188 ( PDF )
Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer
2020/187 ( PDF )
Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack
Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart
2020/186 ( PDF )
Bitcoin Crypto–Bounties for Quantum Capable Adversaries
Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt
2020/185 ( PDF )
Hardware Private Circuits: From Trivial Composition to Full Verification
Gaëtan Cassiers and Benjamin Grégoire and Itamar Levi and François-Xavier Standaert
2020/184 ( PDF )
Fair and Decentralized Exchange of Digital Goods
Ariel Futoransky and Carlos Sarraute and Daniel Fernandez and Matias Travizano and Ariel Waissbein
2020/183 ( PDF )
A Note on Secure Multiparty Computation via Higher Residue Symbol Techniques
Ignacio Cascudo and Reto Schnyder
2020/182 ( PDF )
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Maria Eichlseder and Lorenzo Grassi and Reinhard Lüftenegger and Morten Řygarden and Christian Rechberger and Markus Schofnegger and Qingju Wang
2020/181 ( PDF )
$L_1$-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space
Kohei Nakagawa and Hiroshi Onuki and Atsushi Takayasu and Tsuyoshi Takagi
2020/180 ( PDF )
Multikey FHE in the Plain Model
Prabhanjan Ananth and Abhishek Jain and ZhengZhong Jin and Giulio Malavolta
2020/179 ( PDF )
Mind the Middle Layer: The HADES Design Strategy Revisited
Nathan Keller and Asaf Rosemarin
2020/178 ( PDF )
A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device
Santosh Ghosh and Luis S Kida and Soham Jayesh Desai and Reshma Lal
2020/177 ( PDF )
Revisiting (R)CCA Security and Replay Protection
Christian Badertscher and Ueli Maurer and Christopher Portmann and Guilherme Rito
2020/176 ( PDF )
Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version)
Eugene Frimpong and Alexandros Bakas and Hai-Van Dang and Antonis Michalas
2020/175 ( PDF )
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
Stefan Dziembowski and Grzegorz Fabiański and Sebastian Faust and Siavash Riahi
2020/174 ( PDF )
On Selective-Opening Security of Deterministic Primitives
Mohammad Zaheri and Adam O'Neill
2020/173 ( PDF )
Securing Proof-of-Work Ledgers via Checkpointing
Dimitris Karakostas and Aggelos Kiayias
2020/172 ( PDF )
Qubit-based Unclonable Encryption with Key Recycling
Daan Leermakers and Boris Skoric
2020/171 ( PDF )
High Performance Logistic Regression for Privacy-Preserving Genome Analysis
Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen and Ariel Todoki
2020/170 ( PDF )
Reusable Two-Round MPC from DDH
James Bartusek and Sanjam Garg and Daniel Masny and Pratyay Mukherjee
2020/169 ( PDF )
Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE)
Prabhanjan Ananth and Abhishek Jain and Zhengzhong Jin
2020/168 ( PDF )
Improved Classical and Quantum Algorithms for Subset-Sum
Xavier Bonnetain and Rémi Bricout and André Schrottenloher and Yixin Shen
2020/167 ( PDF )
Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning
Jinhyun So and Basak Guler and A. Salman Avestimehr
2020/166 ( PDF )
Non Atomic Payment Splitting in Channel Networks
Stefan Dziembowski and Paweł Kędzior
2020/165 ( PDF )
Efficient Solutions of the CHES 2018 AES Challenge Using Deep Residual Neural Networks and Knowledge Distillation on Adversarial Examples
Aron Gohr and Sven Jacob and Werner Schindler
2020/164 ( PDF )
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way?
Alex Bienstock and Allison Bishop and Eli Goldin and Garrison Grogan and Victor Lecomte
2020/163 ( PDF )
Impossibility Results for Lattice-Based Functional Encryption Schemes
Akin Ünal
2020/162 ( PDF )
A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity
Ignacio Cascudo and Jaron Skovsted Gundersen
2020/161 ( PDF )
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact
Hanlin Liu and Yu Yu and Shuoyao Zhao and Jiang Zhang and Wenling Liu
2020/160 ( PDF )
Solving Some Affine Equations over Finite Fields
Sihem Mesnager and Kwang Ho Kim and Jong Hyok Choe and Dok Nam Lee
2020/159 ( PDF )
Privacy-preserving collaborative machine learning on genomic data using TensorFlow
Cheng Hong and Zhicong Huang and Wen-jie Lu and Hunter Qu and Li Ma and Morten Dahl and Jason Mancuso
2020/158 ( PDF )
Jump index in T-functions for designing a new basic structure of stream ciphers
Ali Hadipour and Seyed Mahdi Sajadieh and Raheleh Afifi
2020/157 ( PDF )
Multi-Source Non-Malleable Extractors and Applications
Vipul Goyal and Akshayaram Srinivasan and Chenzhi Zhu
2020/156 ( PDF )
Phantom: An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts
Xing Li and Yi Zheng and Kunxian Xia and Tongcheng Sun and John Beyler
2020/155 ( PDF )
Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference
Yifan Tian and Laurent Njilla and Jiawei Yuan and Shucheng Yu
2020/154 ( PDF )
Combiners for Functional Encryption, Unconditionally
Aayush Jain and Nathan Manohar and Amit Sahai
2020/153 ( PDF )
Constructing Secure Multi-Party Computation with Identifiable Abort
Nicholas-Philip Brandt and Sven Maier and Tobias Müller and Jörn Müller-Quade
2020/152 ( PDF )
Compressed $\Sigma$-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics
Thomas Attema and Ronald Cramer
2020/151 ( PDF )
Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
Wouter Castryck and Jana Sotáková and Frederik Vercauteren
2020/150 ( PDF )
On the Security of NTS-KEM in the Quantum Random Oracle Model
Varun Maram
2020/149 ( PDF )
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage
Matteo Campanelli and Dario Fiore and Nicola Greco and Dimitris Kolonelos and Luca Nizzardo
2020/148 ( PDF )
Determining the Core Primitive for Optimally Secure Ratcheting
Fatih Balli and Paul Rösler and Serge Vaudenay
2020/147 ( PDF )
Non-Malleability against Polynomial Tampering
Marshall Ball and Eshan Chattopadhyay and Jyun-Jie Liao and Tal Malkin and Li-Yang Tan
2020/146 ( PDF )
Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security
Roman Langrehr and Jiaxin Pan
2020/145 ( PDF )
Self-Secured PUF: Protecting the Loop PUF by Masking
Lars Tebelmann and Jean-Luc Danger and Michael Pehl
2020/144 ( PDF )
Double-Base Chains for Scalar Multiplications on Elliptic Curves
Wei Yu and Saud Al Musa and Bao Li
2020/143 ( PDF )
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT
Hailong Yao and Caifen Wang* and Xingbing Fu and Chao Liu and Bin Wu and Fagen Li
2020/142 ( PDF )
Network-Agnostic State Machine Replication
Erica Blum and Jonathan Katz and Julian Loss
2020/141 ( PDF )
Deterministic-Prover Zero-Knowledge Proofs
Hila Dahari and Yehuda Lindell
2020/140 ( PDF )
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model
Shaoquan Jiang and Guang Gong and Jingnan He and Khoa Nguyen and Huaxiong Wang
2020/139 ( PDF )
Going Beyond Dual Execution: MPC for Functions with Efficient Verification
Carmit Hazay and abhi shelat and Muthuramakrishnan Venkitasubramaniam
2020/138 ( PDF )
Smart Contract Derivatives
Kostis Karantias and Aggelos Kiayias and Dionysis Zindros
2020/137 ( PDF )
Consistency for Functional Encryption
Christian Badertscher and Aggelos Kiayias and Markulf Kohlweiss and Hendrik Waldner
2020/136 ( PDF )
Stacked Garbling for Disjunctive Zero-Knowledge Proofs
David Heath and Vladimir Kolesnikov
2020/135 ( PDF )
Threshold Ring Signatures: New Definitions and Post-Quantum Security
Abida Haque and Alessandra Scafuro
2020/134 ( PDF )
Malicious Security Comes Free in Honest-Majority MPC
Vipul Goyal and Yifan Song
2020/133 ( PDF )
Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware
Souradyuti Paul and Ananya Shrivastava
2020/132 ( PDF )
Boosting Verifiable Computation on Encrypted Data
Dario Fiore and Anca Nitulescu and David Pointcheval
2020/131 ( PDF )
Coin Tossing with Lazy Defense: Hardness of Computation Results
Hamidreza Amini Khorasgani and Hemanta K. Maji and Mingyuan Wang
2020/130 ( PDF )
Breaking the $O(\sqrt n)$-Bits Barrier: Balanced Byzantine Agreement with Polylog Bits Per-Party
Elette Boyle and Ran Cohen and Aarushi Goel
2020/129 ( PDF )
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
Juliane Krämer and Patrick Struck
2020/128 ( PDF )
LegRoast: Efficient post-quantum signatures from the Legendre PRF
Ward Beullens and Cyprien Delpech de Saint Guilhem
2020/127 ( PDF )
Fifty Shades of Ballot Privacy: Privacy against a Malicious Board
Véronique Cortier and Joseph Lallemand and Bogdan Warinschi
2020/126 ( PDF )
Public-Key Puncturable Encryption: Modular and Compact Constructions
Shi-Feng Sun and Amin Sakzad and Ron Steinfeld and Joseph Liu and Dawu Gu
2020/125 ( PDF )
Oblivious Parallel Tight Compaction
Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Enoch Peserico and Elaine Shi
2020/124 ( PDF )
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512
Ali El Kaafarani and Shuichi Katsumata and Federico Pintore
2020/123 ( PDF )
Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains
Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov
2020/122 ( PDF )
Verifiable Inner Product Encryption Scheme
Najmeh Soroush and Vincenzo Iovino and Alfredo Rial and Peter B. Roenne and Peter Y. A. Ryan
2020/121 ( PDF )
When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead
Hao Chen and Ilia Iliashenko and Kim Laine
2020/120 ( PDF )
The randomized slicer for CVPP: sharper, faster, smaller, batchier
Léo Ducas and Thijs Laarhoven and Wessel P.J. van Woerden
2020/119 ( PDF )
Hardness of LWE on General Entropic Distributions
Zvika Brakerski and Nico Döttling
2020/118 ( PDF )
InfoCommit: Information-Theoretic Polynomial Commitment and Verification
Saeid Sahraei and Salman Avestimehr
2020/117 ( PDF )
Efficient BIKE Hardware Design with Constant-Time Decoder
Andrew Reinders and Rafael Misoczki and Santosh Ghosh and Manoj Sastry
2020/116 ( PDF )
Separating Two-Round Secure Computation from Oblivious Transfer
Benny Applebaum and Zvika Brakerski and Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan
2020/115 ( PDF )
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
Xavier Boyen and Thomas Haines and Johannes Mueller
2020/114 ( PDF )
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
Antoine Delignat-Lavaud and Cédric Fournet and Bryan Parno and Jonathan Protzenko and Tahina Ramananandro and Jay Bosamiya and Joseph Lallemand and Itsaka Rakotonirina and Yi Zhou
2020/113 ( PDF )
New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve
Madhurima Mukhopadhyay and Palash Sarkar and Shashank Singh and Emmanuel Thome
2020/112 ( PDF )
A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography
Patrick Karl and Michael Tempelmeier
2020/111 ( PDF )
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2020/110 ( PDF )
Blazing Fast OT for Three-Round UC OT Extension
Ran Canetti and Pratik Sarkar and Xiao Wang
2020/109 ( PDF )
Fixing the Achilles Heel of E-Voting: The Bulletin Board
Lucca Hirschi and Lara Schmid and David Basin
2020/108 ( PDF )
Practical Forgeries for ORANGE
Christoph Dobraunig and Florian Mendel and Bart Mennink
2020/107 ( PDF )
One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication
Ryan Amos and Marios Georgiou and Aggelos Kiayias and Mark Zhandry
2020/106 ( PDF )
Relaxed freshness in component authentication
Frank Schuhmacher
2020/105 ( PDF )
MCU intrinsic group features for component authentication
Frank Schuhmacher
2020/104 ( PDF )
On the Security Goals of White-Box Cryptography
Estuardo Alpirez Bock and Alessandro Amadori and Chris Brzuska and Wil Michiels
2020/103 ( PDF )
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128
Boxin Zhao and Xiaoyang Dong and Keting Jia and Willi Meier
2020/102 ( PDF )
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
Boxin Zhao and Xiaoyang Dong and Keting Jia
2020/101 ( PDF )
A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future
Haibat Khan and Keith M. Martin
2020/100 ( PDF )
A direct proof of APN-ness of the Kasami functions
Claude Carlet and Kwang Ho Kim and Sihem Mesnager
2020/099 ( PDF )
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange
Benjamin Dowling and Torben Brandt Hansen and Kenneth G. Paterson
2020/098 ( PDF )
Improved key recovery on the Legendre PRF
Novak Kaluđerović and Thorsten Kleinjung and Dusan Kostic
2020/097 ( PDF )
Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard
Stanislav S. Malakhov
2020/096 ( PDF )
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons
David Galindo and Jia Liu and Mihai Ordean and Jin-Mann Wong
2020/095 ( PDF )
SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors
Zhongxiang Zheng and Anyu Wang and Haining Fan and Chunhuan Zhao and Chao Liu and Xue Zhang
2020/094 ( PDF )
On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms
Michael Davidson and Tyler Diamond
2020/093 ( PDF )
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
Romain Gay
2020/092 ( PDF )
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees
Daniel Jost and Ueli Maurer
2020/091 ( PDF )
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption
Jonathan Takeshita and Matthew Schoenbauer and Ryan Karl and Taeho Jung
2020/090 ( PDF )
Witness Maps and Applications
Suvradip Chakraborty and Manoj Prabhakaran and Daniel Wichs
2020/089 ( PDF )
The MILP-Aided Conditional Differential Attack and Its Application to Trivium
Chen-Dong Ye and Tian Tian and Fan-Yang Zeng
2020/088 ( PDF )
Streamlet: Textbook Streamlined Blockchains
Benjamin Y Chan and Elaine Shi
2020/087 ( PDF )
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey)
Elaine Shi
2020/086 ( PDF )
Bootstrapping in FHEW-like Cryptosystems
Daniele Micciancio and Yuriy Polyakov
2020/085 ( PDF )
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems
Ben Nassi and Dudi Nassi and Raz Ben-Netanel and Yisroel Mirsky and Oleg Drokin and Yuval Elovici
2020/084 ( PDF )
Bandwidth-efficient threshold EC-DSA
Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
2020/083 ( PDF )
Metal: A Metadata-Hiding File-Sharing System
Weikeng Chen and Raluca Ada Popa
2020/082 ( PDF )
Random Walks and Concurrent Zero-Knowledge
Anand Aiyer and Xiao Liang and Nilu Nalini and Omkant Pandey
2020/081 ( PDF )
Efficient polynomial commitment schemes for multiple points and polynomials
Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon
2020/080 ( PDF )
Better Secret-Sharing via Robust Conditional Disclosure of Secrets
Benny Applebaum and Amos Beimel and Oded Nir and Naty Peter
2020/079 ( PDF )
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective
Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
2020/078 ( PDF )
Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo
Kentaro Tamura and Yutaka Shikano
2020/077 ( PDF )
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms
Thomas Häner and Samuel Jaques and Michael Naehrig and Martin Roetteler and Mathias Soeken
2020/076 ( PDF )
Wyner-Ziv reconciliation for key exchange based on Ring-LWE
Charbel Saliba and Laura Luzzi and Cong Ling
2020/075 ( PDF )
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms
Rishiraj Bhattacharyya
2020/074 ( PDF )
Rolling up sleeves when subversion's in a field?
Daniel R. L. Brown
2020/073 ( PDF )
Anonymous Symmetric-Key Communication
Fabio Banfi and Ueli Maurer
2020/072 ( PDF )
Efficient Anonymous Tokens with Private Metadata Bit
Ben Kreuter and Tancrede Lepoint and Michele Orru and Mariana Raykova
2020/071 ( PDF )
Post-Quantum Authentication in TLS 1.3: A Performance Study
Dimitrios Sikeridis and Panos Kampanakis and Michael Devetsikiotis
2020/070 ( PDF )
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
Thomas Agrikola and Dennis Hofheinz and Julia Kastner
2020/069 ( PDF )
RSA and redactable blockchains
Dima Grigoriev and Vladimir Shpilrain
2020/068 ( PDF )
Further Clarification on Mantin's Digraph Repetition Bias in RC4
Pranab Chakraborty and Subhamoy Maitra
2020/067 ( PDF )
Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse
Taylor R Campbell
2020/066 ( PDF )
Talek: Private Group Messaging with Hidden Access Patterns
Raymond Cheng and William Scott and Elisaweta Masserova and Irene Zhang and Vipul Goyal and Thomas Anderson and Arvind Krishnamurthy and Bryan Parno
2020/065 ( PDF )
A Performant, Misuse-Resistant API for Primality Testing
Jake Massimo and Kenneth G. Paterson
2020/064 ( PDF )
Dual System in Lattice: Fully Secure ABE from LWE Assumption
Geng Wang and Ming Wan and Zhen Liu and Dawu Gu
2020/063 ( PDF )
Attack on LAC Key Exchange in Misuse Situation
Aurelien Greuet and Simon Montoya and Guenael Renault
2020/062 ( PDF )
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
Behzad Abdolmaleki and Sebastian Ramacher and Daniel Slamanig
2020/061 ( PDF )
Simple Schnorr Signature with Pedersen Commitment as Key
Gary Yu
2020/060 ( PDF )
Auditable Asymmetric Password Authenticated Public Key Establishment
Antonio Faonio and Maria Isabel Gonzalez Vasco and Claudio Soriente and Hien Thi Thu Truong
2020/059 ( PDF )
ARX-KW, a family of key wrapping constructions using SipHash and ChaCha
Satō Shinichi
2020/058 ( PDF )
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis
Guilherme Perin and Ileana Buhan and Stjepan Picek
2020/057 ( PDF )
On the smoothing parameter and last minimum of random orthogonal lattices
Elena Kirshanova and Huyen Nguyen and Damien Stehlé and Alexandre Wallet
2020/056 ( PDF )
AKCN-E8: Compact and Flexible KEM from Ideal Lattice
Zhengzhong JIn and Yunlei Zhao
2020/055 ( PDF )
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
Alejandro Cabrera Aldaya and Billy Bob Brumley
2020/054 ( PDF )
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA
Wen Wang and Shanquan Tian and Bernhard Jungk and Nina Bindel and Patrick Longa and Jakub Szefer
2020/053 ( PDF )
Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems"
Yasuhiko Ikematsu and Shuhei Nakamura
2020/052 ( PDF )
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
Mohamed Tolba and Muhammad ElSheikh and Amr M. Youssef
2020/051 ( PDF )
Low-Latency Hardware Masking with Application to AES
Pascal Sasdrich and Begül Bilgin and Michael Hutter and Mark Marson
2020/050 ( PDF )
Delphi: A Cryptographic Inference Service for Neural Networks
Pratyush Mishra and Ryan Lehmkuhl and Akshayaram Srinivasan and Wenting Zheng and Raluca Ada Popa
2020/049 ( PDF )
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Erdem Alkim and Hülya Evkan and Norman Lahr and Ruben Niederhagen and Richard Petri
2020/048 ( PDF )
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage
Changshe Ma and Yiping Gu and Hongfei Li
2020/047 ( PDF )
New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version)
Tianshuo Cong and Ximing Fu and Xuting Zhou and Yuli Zou and Haining Fan
2020/046 ( PDF )
On Analysis of Lightweight Stream Ciphers with Keyed Update
Orhun Kara and Muhammed F. Esgin
2020/045 ( PDF )
Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6
Haibat Khan and Benjamin Dowling and Keith M. Martin
2020/044 ( PDF )
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts
Alexander Chepurnoy and Amitabh Saxena
2020/043 ( PDF )
Zone Encryption with Anonymous Authentication for V2V Communication
Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa
2020/042 ( PDF )
BLAZE: Blazing Fast Privacy-Preserving Machine Learning
Arpita Patra and Ajith Suresh
2020/041 ( PDF )
Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders
Aggelos Kiayias and Saad Quader and Alexander Russell
2020/040 ( PDF )
A Compact and Scalable Hardware/Software Co-design of SIKE
Pedro Maat C. Massolino and Patrick Longa and Joost Renes and Lejla Batina
2020/039 ( PDF )
Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis
Damien Robissout and Gabriel Zaid and Brice Colombier and Lilian Bossuet and Amaury Habrard
2020/038 ( PDF )
Bitstream Modification Attack on SNOW 3G
Michail Moraitis and Elena Dubrova
2020/037 ( PDF )
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput
Matthias Fitzi and Peter Gaži and Aggelos Kiayias and Alexander Russell
2020/036 ( PDF )
Analysis on Aigis-Enc: asymmetrical and symmetrical
Yupu Hu and Siyue Dong and Xingting Dong
2020/035 ( PDF )
Constant-round Dynamic Group Key Exchange from RLWE Assumption
Rakyong Choi and Dongyeon Hong and Kwangjo Kim
2020/034 ( PDF )
SkyEye: A Traceable Scheme for Blockchain
Tianjun Ma and Haixia Xu and Peili Li
2020/033 ( PDF )
Scalable Open-Vote Network on Ethereum
Mohamed Seifelnasr and Hisham S. Galal and Amr M. Youssef
2020/032 ( PDF )
A New Approach for the Implementation of Binary Matrices Using SLP Applications
Mahdi Sajadieh and Mohsen Mousavi
2020/031 ( PDF )
Locally Decodable Codes with Randomized Encoding
Kuan Cheng and Xin Li and Yu Zheng
2020/030 ( PDF )
Κ-Cipher: A Low Latency, Bit Length Parameterizable Cipher
Michael Kounavis and Sergej Deutsch and Santosh Ghosh and David Durham
2020/029 ( PDF )
Differentially-Private Multi-Party Sketching for Large-Scale Statistics
Seung Geol Choi and Dana Dachman-Soled and Mukul Kulkarni and Arkady Yerukhimovich
2020/028 ( PDF )
Verified Security of BLT Signature Scheme
Denis Firsov and Ahto Buldas and Ahto Truu and Risto Laanoja
2020/027 ( PDF )
On Roots Factorization for PQC Algorithms
Alexander Maximov
2020/026 ( PDF )
Post-Quantum Secure Architectures for Automotive Hardware Secure Modules
Wen Wang and Marc Stöttinger
2020/025 ( PDF )
Single Secret Leader Election
Dan Boneh and Saba Eskandarian and Lucjan Hanzlik and Nicola Greco
2020/024 ( PDF )
The Arwen Trading Protocols (Full Version)
Ethan Heilman and Sebastien Lipmann and Sharon Goldberg
2020/023 ( PDF )
Threshold Multi-Signature with an Offline Recovery Party
Riccardo Longo and Alessio Meneghetti and Massimiliano Sala
2020/022 ( PDF )
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material)
Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson
2020/021 ( PDF )
eSIDH: the revenge of the SIDH
Daniel Cervantes-Vázquez and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez
2020/020 ( PDF )
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes
Shangqi Lai and Xingliang Yuan and Shi-Feng Sun and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Dongxi Liu
2020/019 ( PDF )
Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains
Suhyeon Lee and Seungjoo Kim
2020/018 ( PDF )
Triptych: logarithmic-sized linkable ring signatures with applications
Sarang Noether and Brandon Goodell
2020/017 ( PDF )
Biometric-Authenticated Searchable Encryption
Daniel Gardham and Mark Manulis and Constantin Cătălin Drăgan
2020/016 ( PDF )
Short Threshold Dynamic Group Signatures
Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa
2020/015 ( PDF )
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts
Hao Chen and Wei Dai and Miran Kim and Yongsoo Song
2020/014 ( PDF )
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
Gaëtan Leurent and Thomas Peyrin
2020/013 ( PDF )
On the Cryptographic Hardness of Local Search
Nir Bitansky and Idan Gerichter
2020/012 ( PDF )
Cortex-M4 Optimizations for \{R,M\}LWE Schemes
Erdem Alkim and Yusuf Alper Bilgin and Murat Cenk and François Gérard
2020/011 ( PDF )
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain
Ming Li,Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo
2020/010 ( PDF )
Double point compression for elliptic curves of $j$-invariant $0$
Dmitrii Koshelev
2020/009 ( PDF )
Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions
Thomas Pornin
2020/008 ( PDF )
Secret Sharing Schemes for Ports of Matroids of Rank 3
Oriol Farrŕs
2020/007 ( PDF )
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts
Nabil Alkeilani Alkadri and Rachid El Bansarkhani and Johannes Buchmann
2020/006 ( PDF )
Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures
André Chailloux and Thomas Debris-Alazard
2020/005 ( PDF )
Lai-Massey Scheme Revisited
M. R. Mirzaee Shamsabad and S. M. Dehnavi
2020/004 ( -- withdrawn -- )
BPCEX: Towards Blockchain-based Privacy-preserving Currency Exchange
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2020/003 ( -- withdrawn -- )
New Constructions of Traceable Range Proofs: Towards Multiple Regulation and Joint Regulation
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang
2020/002 ( PDF )
On a Conjecture of O'Donnell
Qichun Wang
2020/001 ( PDF )
Elliptic Curves of Nearly Prime Order
Manoj Gyawali and Daniele Di Tullio
2019/1499 ( PDF )
Authenticated Key Distribution: When the Coupon Collector is Your Enemy
Marc Beunardeau and Fatima-Ezzahra El Orche and Diana Maimut and David Naccache and Peter B. Roenne and Peter Y.A. Ryan
2019/1498 ( PDF )
Supersingular Isogeny-Based Designated Verifier Blind Signature
Rajeev Anand Sahu and Agnese Gini and Ankan Pal
2019/1497 ( PDF )
Analysis of Modified Shell Sort for Fully Homomorphic Encryption
Joon-Woo Lee and Young-Sik Kim and Jong-Seon No
2019/1496 ( PDF )
Improved on Identity-based quantum signature based on Bell states
Chang-Bin Wang and Shu-Mei Hsu and Hsiang Chang and Jue-Sam Chou
2019/1495 ( PDF )
Tight Security of Cascaded LRW2
Ashwin Jha and Mridul Nandi
2019/1494 ( PDF )
Scaling Verifiable Computation Using Efficient Set Accumulators
Alex Ozdemir and Riad S. Wahby and Barry Whitehat and Dan Boneh
2019/1493 ( PDF )
Solving $X^{q+1}+X+a=0$ over Finite Fields
Kwang Ho Kim and Junyop Choe and Sihem Mesnager
2019/1492 ( PDF )
Too Much Crypto
Jean-Philippe Aumasson
2019/1491 ( PDF )
Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9
Yuyin Yu and Nikolay Kaleyski and Lilya Budaghyan and Yongqiang Li
2019/1490 ( PDF )
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme
Jintai Ding and Joshua Deaton and Kurt Schmidt and Vishakha and Zheng Zhang
2019/1489 ( PDF )
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement
Joël Alwen and Margarita Capretto and Miguel Cueto and Chethan Kamath and Karen Klein and Ilia Markov and Guillermo Pascual-Perez and Krzysztof Pietrzak and Michael Walter and Michelle Yeo
2019/1488 ( PDF )
Fine-Grained Cryptography Revisited
Shohei Egashira and Yuyu Wang and Keisuke Tanaka
2019/1487 ( PDF )
SNR-Centric Power Trace Extractors for Side-Channel Attacks
Changhai Ou and Degang Sun and Siew-Kei Lam and Xinping Zhou and Kexin Qiao and Qu Wang
2019/1486 ( PDF )
RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations
Ramiro Martínez and Paz Morillo
2019/1485 ( PDF )
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings
Hiroshi Okano and Keita Emura and Takuya Ishibashi and Toshihiro Ohigashi and Tatsuya Suzuki
2019/1484 ( PDF )
Force-Locking Attack on Sync Hotstuff
Atsuki Momose and Jason Paul Cruz
2019/1483 ( PDF )
Communication--Computation Trade-offs in PIR
Asra Ali and Tancrčde Lepoint and Sarvar Patel and Mariana Raykova and Phillipp Schoppmann and Karn Seth and Kevin Yeo
2019/1482 ( PDF )
Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof
Jiaheng Zhang and Tiancheng Xie and Yupeng Zhang and Dawn Song
2019/1481 ( PDF )
On metric regularity of Reed-Muller codes
Alexey Oblaukhov
2019/1480 ( PDF )
Analogue of Vélu's Formulas for Computing Isogenies over Hessian Model of Elliptic Curves
Fouazou Lontouo Perez Broon and Emmanuel Fouotsa
2019/1479 ( PDF )
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups
Jongkil Kim and Willy Susilo and Fuchun Guo and Joonsang Baek and Nan Li
2019/1478 ( PDF )
Leakage Detection with Kolmogorov-Smirnov Test
Xinping Zhou and Kexin Qiao and Changhai Ou
2019/1477 ( PDF )
Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis
Daan van der Valk and Stjepan Picek and Shivam Bhasin
2019/1476 ( PDF )
On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis
Leo Weissbart
2019/1475 ( PDF )
On the Security of Sponge-type Authenticated Encryption Modes
Bishwajit Chakraborty and Ashwin Jha and Mridul Nandi
2019/1474 ( PDF )
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders
Lichao Wu and Stjepan Picek
2019/1473 ( PDF )
Splitting the Interpose PUF: A Novel Modeling Attack Strategy
Nils Wisiol and Christopher Mühl and Niklas Pirnay and Phuong Ha Nguyen and Marian Margraf and Jean-Pierre Seifert and Marten van Dijk and Ulrich Rührmair
2019/1472 ( PDF )
Efficient Fully Secure Leakage-Deterring Encryption
Jan Camenisch and Maria Dubovitskaya and Patrick Towa
2019/1471 ( PDF )
A Privacy-Enhancing Framework for Internet of Things Services
Lukas Malina and Gautam Srivastava and Petr Dzurenda and Jan Hajny and Sara Ricci
2019/1470 ( PDF )
PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server
Carsten Baum and Tore K. Frederiksen and Julia Hesse and Anja Lehmann and Avishay Yanai
2019/1469 ( PDF )
The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures
Georg Maringer and Tim Fritzmann and Johanna Sepúlveda
2019/1468 ( PDF )
A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption
Jung Hee Cheon and Duhyeong Kim and Taechan Kim and Yongha Son
2019/1467 ( PDF )
Distributed Web Systems Leading to Hardware Oriented Cryptography and Post-Quantum Cryptologic Methodologies
Andrew M. K. Nassief
2019/1466 ( PDF )
A Note on the Instantiability of the Quantum Random Oracle
Edward Eaton and Fang Song
2019/1465 ( PDF )
An optimist's Poisson model of cryptanalysis
Daniel R. L. Brown
2019/1464 ( PDF )
New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions and Interaction
Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni
2019/1463 ( PDF )
Rescuing Logic Encryption in Post-SAT Era by Locking & Obfuscation
Amin Rezaei and Yuanqi Shen and Hai Zhou
2019/1462 ( -- withdrawn -- )
Privacy-preserving greater-than integer comparison without binary decomposition
Sigurd Eskeland
2019/1461 ( PDF )
Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP
Morteza Adeli and Nasour Bagheri
2019/1460 ( PDF )
Byzantine Fault Tolerance in Partially Synchronous Networks
Yongge Wang
2019/1459 ( PDF )
Side Channel Information Set Decoding using Iterative Chunking
Norman Lahr and Ruben Niederhagen and Richard Petri and Simona Samardjiska
2019/1458 ( PDF )
Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery
Moni Naor and Lior Rotem and Gil Segev
2019/1457 ( PDF )
Fast and Secure Updatable Encryption
Colin Boyd and Gareth T. Davies and Kristian Gjřsteen and Yao Jiang
2019/1456 ( PDF )
ModFalcon: compact signatures based on module NTRU lattices
Chitchanok Chuengsatiansup and Thomas Prest and Damien Stehlé and Alexandre Wallet and Keita Xagawa
2019/1455 ( PDF )
Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption with Decryption Key Exposure Resistance
Yanyan Liu and Yiru Sun
2019/1454 ( PDF )
Practical Relativistic Zero-Knowledge for NP
Claude Crépeau and Arnaud Massenet and Louis Salvail and Lucas Stinchcombe and Nan Yang
2019/1453 ( PDF )
Saber on ESP32
Bin Wang and Xiaozhuo Gu and Yingshan Yang
2019/1452 ( PDF )
Leakage-Resilient Lattice-Based Partially Blind Signatures
D. Papachristoudis and D. Hristu-Varsakelis and F. Baldimtsi and G. Stephanides
2019/1451 ( PDF )
Tight bound on NewHope failure probability
Thomas Plantard and Arnaud Sipasseuth and Willy Susilo and Vincent Zucca
2019/1450 ( PDF )
Extractors for Adversarial Sources via Extremal Hypergraphs
Eshan Chattopadhyay and Jesse Goodman and Vipul Goyal and Xin Li
2019/1449 ( PDF )
Formalising Oblivious Transfer in the Semi-Honest and Malicious Model in CryptHOL
David Butler and David Aspinall and Adria Gascon
2019/1448 ( PDF )
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
Johann Heyszl and Katja Miller and Florian Unterstein and Marc Schink and Alexander Wagner and Horst Gieser and Sven Freud and Tobias Damm and Dominik Klein and Dennis Kügler
2019/1447 ( PDF )
Benchmarking Post-Quantum Cryptography in TLS
Christian Paquin and Douglas Stebila and Goutam Tamvada
2019/1446 ( PDF )
Boolean functions for homomorphic-friendly stream ciphers
Claude Carlet and Pierrick Méaux
2019/1445 ( PDF )
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Madura A Shelton and Niels Samwel and Lejla Batina and Francesco Regazzoni and Markus Wagner and Yuval Yarom
2019/1444 ( PDF )
Compact Storage of Superblocks for NIPoPoW Applications
Kostis Karantias and Aggelos Kiayias and Nikos Leonardos and Dionysis Zindros
2019/1443 ( PDF )
CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist
Abhrajit Sengupta and Ozgur Sinanoglu
2019/1442 ( PDF )
Server-Aided Revocable Identity-Based Encryption Revisited
Fei Meng
2019/1441 ( PDF )
A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications
Paolo Santini and Alessandro Barenghi and Gerardo Pelosi and Marco Baldi and Franco Chiaraluce
2019/1440 ( PDF )
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems
Sarah Azouvi and George Danezis and Valeria Nikolaenko
2019/1439 ( PDF )
Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
S. Sharmila Deva Selvi and Irene Miriam Isaac and C. Pandu Rangan
2019/1438 ( PDF )
A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers
Zhengbin Liu and Yongqiang Li and Lin Jiao and Mingsheng Wang
2019/1437 ( PDF )
Reverse Outsourcing: Reduce the Cloud's Workload in Outsourced Attribute-Based Encryption Scheme
Fei Meng and Mingqiang Wang
2019/1436 ( PDF )
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond
Paul Kirchner and Thomas Espitau and Pierre-Alain Fouque
2019/1435 ( PDF )
Confidential Assets on MimbleWimble
Yi Zheng and Howard Ye and Patrick Dai and Tongcheng Sun and Vladislav Gelfer
2019/1434 ( PDF )
About Low DFR for QC-MDPC Decoding
Nicolas Sendrier and Valentin Vasseur
2019/1433 ( PDF )
T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction
Sebastian Lauer and Kai Gellert and Robert Merget and Tobias Handirk and Jörg Schwenk
2019/1432 ( PDF )
A Generic View on the Unified Zero-Knowledge Protocol and its Applications
Diana Maimut and George Teseleanu
2019/1431 ( -- withdrawn -- )
Cross-Chain Communication Using Receipts
Arasu Arun and C. Pandu Rangan
2019/1430 ( PDF )
On the Impossibility of Probabilistic Proofs in Relativized Worlds
Alessandro Chiesa and Siqi Liu
2019/1429 ( -- withdrawn -- )
Secret Sharing Schemes : A Fine Grained Analysis
Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai
2019/1428 ( -- withdrawn -- )
$AC^0$ Constructions for Evolving Secret Sharing Schemes and Redistribution of Secret Shares
Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai
2019/1427 ( PDF )
On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes
Sumanta Sarkar and Kalikinkar Mandal and Dhiman Saha
2019/1426 ( PDF )
On asymptotically optimal tests for random number generators
Boris Ryabko
2019/1425 ( PDF )
HIBEChain: A Hierarchical Identity-based Blockchain System for Large-Scale IoT
Zhiguo Wan and Wei Liu and Hui Cui
2019/1424 ( PDF )
Efficient Side-Channel Secure Message Authentication with Better Bounds
Chun Guo and François-Xavier Standaert and Weijia Wang and Yu Yu
2019/1423 ( PDF )
QC-MDPC decoders with several shades of gray
Nir Drucker and Shay Gueron and Dusan Kostic
2019/1422 ( PDF )
IPDL: A Probabilistic Dataflow Logic for Cryptography
Xiong Fan and Joshua Gancher and Greg Morrisett and Elaine Shi and Kristina Sojakova
2019/1421 ( PDF )
Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations
Nicky Mouha and Christopher Celi
2019/1420 ( PDF )
A Non-Interactive Shuffle Argument With Low Trust Assumptions
Antonis Aggelakis and Prastudy Fauzi and Georgios Korfiatis and Panos Louridas and Foteinos Mergoupis-Anagnou and Janno Siim and Michal Zajac
2019/1419 ( PDF )
Image PUF: A Physical Unclonable Function for Printed Electronics based on Optical Variation of Printed Inks
Ahmet Turan Erozan and Michael Hefenbrock and Michael Beigl and Jasmin Aghassi-Hagmann and Mehdi B. Tahoori
2019/1418 ( PDF )
Designated-ciphertext Searchable Encryption
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo
2019/1417 ( PDF )
CSIDH on Other Form of Elliptic Curves
Xuejun Fan and Song Tian and Bao Li and Xiu Xu
2019/1416 ( PDF )
The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption
Melissa Chase and Trevor Perrin and Greg Zaverucha
2019/1415 ( PDF )
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis
Hossein Arabnezhad-Khanoki and Babak Sadeghiyan
2019/1414 ( -- withdrawn -- )
A New Encryption Scheme Based On Subset Identifying Problem
Muhammad Rezal Kamel Ariffin
2019/1413 ( PDF )
Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions
Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2019/1412 ( PDF )
Cryptanalysis and Improvement of Smart-ID's Clone Detection Mechanism
Augustin P. Sarr
2019/1411 ( PDF )
Isochronous Gaussian Sampling: From Inception to Implementation
James Howe and Thomas Prest and Thomas Ricosset and Mélissa Rossi
2019/1410 ( -- withdrawn -- )
Withdrawn
Withdrawn
2019/1409 ( PDF )
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security
Gareth T. Davies and Herman Galteland and Kristian Gjřsteen and Yao Jiang
2019/1408 ( PDF )
The group of automorphisms of the set of self-dual bent functions
Aleksandr Kutsenko
2019/1407 ( PDF )
Incrementally Verifiable Computation via Incremental PCPs
Moni Naor and Omer Paneth and Guy N. Rothblum
2019/1406 ( PDF )
Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting
Tassos Dimtiriou
2019/1405 ( PDF )
Revisiting Higher-Order Computational Attacks against White-Box Implementations
Houssem Maghrebi and Davide Alessio
2019/1404 ( PDF )
CSIDH on the surface
Wouter Castryck and Thomas Decru
2019/1403 ( -- withdrawn -- )
No RISC, no Fun: Comparison of Hardware Accelerated Hash Functions for XMSS
Ingo Braun and Fabio Campos and Steffen Reith and Marc Stöttinger
2019/1402 ( PDF )
Automatize parameter tuning in Ring-Learning-With-Errors-based leveled homomorphic cryptosystem implementations
Vincent HERBERT
2019/1401 ( PDF )
SMChain: A Scalable Blockchain Protocol for Secure Metering Systems in Distributed Industrial Plants
Gang Wang and Zhijie Jerry Shi and Mark Nixon and Song Han
2019/1400 ( PDF )
RedShift: Transparent SNARKs from List Polynomial Commitment IOPs
Assimakis Kattis and Konstantin Panarin and Alexander Vlasov
2019/1399 ( PDF )
(One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes
Jan-Pieter D'Anvers and Mélissa Rossi and Fernando Virdia
2019/1398 ( PDF )
How to Construct Rational Protocols with Nash Equilibrium Consistency in the UC framework
Xiaoxia Jiang and Youliang Tian
2019/1397 ( PDF )
How to compartment secrets
Gaëlle Candel and Rémi Géraud-Stewart and David Naccache
2019/1396 ( PDF )
A note on the multivariate cryptosystem based on a linear code
Yasufumi Hashimoto
2019/1395 ( PDF )
McTiny: fast high-confidence post-quantum key erasure for tiny network servers
Daniel J. Bernstein and Tanja Lange
2019/1394 ( PDF )
Voltage-based Covert Channels in Multi-Tenant FPGAs
Dennis R. E. Gnad and Cong Dang Khoa Nguyen and Syed Hashim Gillani and Mehdi B. Tahoori
2019/1393 ( PDF )
SoK: Computer-Aided Cryptography
Manuel Barbosa and Gilles Barthe and Karthik Bhargavan and Bruno Blanchet and Cas Cremers and Kevin Liao and Bryan Parno
2019/1392 ( PDF )
Decryption failure is more likely after success
Nina Bindel and John M. Schanck
2019/1391 ( PDF )
Are These Pairing Elements Correct? Automated Verification and Applications
Susan Hohenberger and Satyanarayana Vusirikala
2019/1390 ( PDF )
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs
Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof
2019/1389 ( PDF )
Generic Attack on Iterated Tweakable FX Constructions
Ferdinand Sibleyras
2019/1388 ( PDF )
Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava code
Jayashree Dey and Ratna Dutta
2019/1387 ( PDF )
The supersingular isogeny problem in genus 2 and beyond
Craig Costello and Benjamin Smith
2019/1386 ( PDF )
Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version)
Chao Liu and Zhongxiang Zheng and Keting Jia and Qidi You
2019/1385 ( PDF )
Improvements of the Balance Discovery Attack on Lightning Network Payment Channels
Gijs van Dam and Rabiah Abdul Kadir and Puteri N.E. Nohuddin and Halimah Badioze Zaman
2019/1384 ( PDF )
Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations
Keita Emura and Shuichi Katsumata and Yohei Watanabe
2019/1383 ( PDF )
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities
Karim Eldefrawy and Tancrčde Lepoint and Antonin Leroux
2019/1382 ( PDF )
On the Power of Multiple Anonymous Messages
Badih Ghazi and Noah Golowich and Ravi Kumar and Rasmus Pagh and Ameya Velingker
2019/1381 ( PDF )
The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions
Kaisa Nyberg
2019/1380 ( PDF )
Efficient Utilization of DSPs and BRAMs Revisited: New AES-GCM Recipes on FPGAs
Elif Bilge Kavun and Nele Mentens and Jo Vliegen and Tolga Yalcin
2019/1379 ( PDF )
Systematic and Random Searches for Compact 4-Bit and 8-Bit Cryptographic S-Boxes
Christophe Clavier and Léo Reynaud
2019/1378 ( PDF )
Alzette: a 64-bit ARX-box (feat. CRAX and TRAX)
Christof Beierle and Alex Biryukov and Luan Cardoso dos Santos and Johann Großschädl and Léo Perrin and Aleksei Udovenko and Vesselin Velichkov and Qingju Wang
2019/1377 ( PDF )
A Scalable Post-quantum Hash-Based Group Signature
Masoumeh Shafieinejad and Navid Nasr Esfahani
2019/1376 ( PDF )
Generic Constructions of RIBE via Subset Difference Method
Xuecheng Ma and Dongdai Lin
2019/1375 ( PDF )
New ideas to build noise-free homomorphic cryptosystems
Gérald Gavin and Sandrine Tainturier
2019/1374 ( PDF )
A Survey of Digital Signing in the Post Quantum Era
Teik Guan Tan and Jianying Zhou
2019/1373 ( PDF )
A note on the cost of computing odd degree isogenies
Daniel Cervantes-Vázquez and Francisco Rodríguez-Henríquez
2019/1372 ( PDF )
Analyzing the Linear Keystream Biases in AEGIS
Maria Eichlseder and Marcel Nageler and Robert Primas
2019/1371 ( PDF )
A short-list of pairing-friendly curves resistant to Special TNFS at the 128-bit security level
Aurore Guillevic
2019/1370 ( PDF )
A Subset Fault Analysis of ASCON
Priyanka Joshi and Bodhisatwa Mazumdar
2019/1369 ( PDF )
Impeccable Circuits II
Aein Rezaei Shahmirzadi and Shahram Rasoolzadeh and Amir Moradi
2019/1368 ( PDF )
Efficient FPGA Implementations of LowMC and Picnic
Daniel Kales and Sebastian Ramacher and Christian Rechberger and Roman Walch and Mario Werner
2019/1367 ( PDF )
Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption
Keitaro Hashimoto and Wakaha Ogata and Toi Tomita
2019/1366 ( PDF )
A Lattice-based Enhanced Privacy ID
Nada EL Kassem and Luis Fiolhais and Paulo Martins and Liqun Chen and Leonel Sousa
2019/1365 ( PDF )
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning
Megha Byali and Harsh Chaudhari and Arpita Patra and Ajith Suresh
2019/1364 ( PDF )
Boolean Functions with Multiplicative Complexity 3 and 4
Cagdas Calik and Meltem Sonmez Turan and Rene Peralta
2019/1363 ( PDF )
Multi-Device for Signal
Sébastien Campion and Julien Devigne and Céline Duguey and Pierre-Alain Fouque
2019/1362 ( PDF )
A Modern View on Forward Security
Colin Boyd and Kai Gellert
2019/1361 ( PDF )
Efficient Elliptic Curve Diffie-Hellman Computation at the 256-bit Security Level
Kaushik Nath and Palash Sarkar
2019/1360 ( PDF )
Sashimi: Cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
Daniele Cozzo and Nigel P. smart
2019/1359 ( PDF )
Universal Forgery Attack against GCM-RUP
Yanbin Li and Gaëtan Leurent and Meiqin Wang and Wei Wang and Guoyan Zhang and Yu Liu
2019/1358 ( PDF )
Traceable Inner Product Functional Encryption
Xuan Thanh Do and Duong Hieu Phan and David Pointcheval
2019/1357 ( PDF )
Cryptanalysis of the Legendre PRF and generalizations
Ward Beullens and Tim Beyne and Aleksei Udovenko and Giuseppe Vitto
2019/1356 ( PDF )
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms
Jacqueline Brendel and Marc Fischlin and Felix Günther and Christian Janson and Douglas Stebila
2019/1355 ( PDF )
A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code
Daniel Smith-Tone and Cristina Tone
2019/1354 ( PDF )
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs
Zhangshuang Guan and Zhiguo Wan and Yang Yang and Yan Zhou and Butian Huang
2019/1353 ( PDF )
Laconic Conditional Disclosure of Secrets and Applications
Nico Döttling and Sanjam Garg and Vipul Goyal and Giulio Malavolta
2019/1352 ( PDF )
Spectral analysis of ZUC-256
Jing Yang and Thomas Johansson and Alexander Maximov
2019/1351 ( PDF )
Speeding Up OMD Instantiations in Hardware
Diana Maimut and Alexandru Stefan Mega
2019/1350 ( PDF )
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement
Patrick Leu and Mridula Singh and Marc Roeschlin and Kenneth G. Paterson and Srdjan Capkun
2019/1349 ( PDF )
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband
Mridula Singh and Patrick Leu and AbdelRahman Abdou and Srdjan Capkun
2019/1348 ( PDF )
Network Time with a Consensus on Clock
Handan Kilinc Alper
2019/1347 ( PDF )
Variants of Wegman-Carter Message Authentication Code Supporting Variable Tag Lengths
Sebati Ghosh and Palash Sarkar
2019/1346 ( PDF )
Privacy-Preserving Decentralised Singular Value Decomposition
Bowen Liu and Qiang Tang
2019/1345 ( PDF )
Audita: A Blockchain-based Auditing Framework for Off-chain Storage
Danilo Francati and Giuseppe Ateniese and Abdoulaye Faye and Andrea Maria Milazzo and Angelo Massimo Perillo and Luca Schiatti and Giuseppe Giordano
2019/1344 ( PDF )
From Fairness to Full Security in Multiparty Computation
Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem
2019/1343 ( PDF )
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber
Yue Qin and Chi Cheng and Jintai Ding
2019/1342 ( PDF )
Scalable Wildcarded Identity-Based Encryption
Jihye Kim and Seunghwa Lee and Jiwon Lee and Hyunok Oh
2019/1341 ( PDF )
Succinct Non-Interactive Secure Computation
Andrew Morgan and Rafael Pass and Antigoni Polychroniadou
2019/1340 ( PDF )
Secret Shared Shuffle
Melissa Chase and Esha Ghosh and Oxana Poburinnaya
2019/1339 ( PDF )
Extracting Randomness from Extractor-Dependent Sources
Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs
2019/1338 ( PDF )
Two-party Private Set Intersection with an Untrusted Third Party
Phi Hung Le and Samuel Ranellucci and S. Dov Gordon
2019/1337 ( PDF )
Offline Witness Encryption with Semi-Adaptive Security
Peter Chvojka and Tibor Jager and Saqib A. Kakvi
2019/1336 ( PDF )
Critical Perspectives on Provable Security: Fifteen Years of "Another Look" Papers
Neal Koblitz and Alfred Menezes
2019/1335 ( PDF )
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
Tibor Jager and David Niehues
2019/1334 ( PDF )
Privacy-Preserving Distributed Machine Learning based on Secret Sharing
Ye Dong and Xiaojun Chen and Liyan Shen
2019/1333 ( PDF )
The Dark SIDH of Isogenies
Paul Bottinelli and Victoria de Quehen and Chris Leonardi and Anton Mosunov and Filip Pawlega and Milap Sheth
2019/1332 ( PDF )
SEAL: Sealed-Bid Auction Without Auctioneers
Samiran Bag and Feng Hao and Siamak F. Shahandashti and Indranil G. Ray
2019/1331 ( PDF )
Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?
Melissa Azouaoui and Romain Poussier and François-Xavier Standaert and Vincent Verneuil
2019/1330 ( PDF )
OptiSwap: Fast Optimistic Fair Exchange
Lisa Eckey and Sebastian Faust and Benjamin Schlosser
2019/1329 ( PDF )
Drinfeld modules may not be for isogeny based cryptography
Antoine Joux and Anand Kumar Narayanan
2019/1328 ( PDF )
Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices
Yashvanth Kondi and Bernardo Magri and Claudio Orlandi and Omer Shlomovits
2019/1327 ( PDF )
Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain
Donghoon Chang and Munawar Hasan and Pranav Jain
2019/1326 ( PDF )
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE
Donghoon Chang and Nilanjan Datta and Avijit Dutta and Bart Mennink and Mridul Nandi and Somitra Sanadhya and Ferdinand Sibleyras
2019/1325 ( PDF )
Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts
Arinjita Paul and S. Sharmila Deva Selvi and C. Pandu Rangan
2019/1324 ( PDF )
Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme
Avijit Dutta and Mridul Nandi
2019/1323 ( PDF )
Secure Quantum Extraction Protocols
Prabhanjan Ananth and Rolando L. La Placa
2019/1322 ( PDF )
An Efficient Micropayment Channel on Ethereum
Hisham S. Galal and Muhammad ElSheikh and Amr M. Youssef
2019/1321 ( PDF )
Supersingular isogeny key exchange for beginners
Craig Costello
2019/1320 ( PDF )
Homomorphic Encryption Random Beacon
Alisa Cherniaeva and Ilia Shirobokov and Omer Shlomovits
2019/1319 ( PDF )
Automatic Search for the Linear (hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey and CHAM-64 (Full Version)
Mingjiang Huang and Liming Wang
2019/1318 ( PDF )
Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications (Full Version)
Mingjiang Huang and Liming Wang
2019/1317 ( PDF )
Reverse Firewalls for Actively Secure MPCs
Suvradip Chakraborty and Stefan Dziembowski and Jesper Buus Nielsen
2019/1316 ( PDF )
Binary Kummer Line
Sabyasachi Karati
2019/1315 ( PDF )
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning
Rahul Rachuri and Ajith Suresh
2019/1314 ( PDF )
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search
Zhidan Li and Wenmin Li and Fei Gao and Wei Yin and Hua Zhang and Qiaoyan Wen and Kaitai Liang
2019/1313 ( PDF )
On Oblivious Amplification of Coin-Tossing Protocols
Nir Bitansky and Nathan Geier
2019/1312 ( PDF )
Cryptographic Fault Diagnosis using VerFI
Victor Arribas and Felix Wegener and Amir Moradi and Svetla Nikova
2019/1311 ( PDF )
BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments
Jiwon Lee and Jihye Kim and Hyunok Oh
2019/1310 ( PDF )
Lightweight Iterative MDS Matrices: How Small Can We Go?
Shun Li and Siwei Sun and Danping Shi and Chaoyun Li and Lei Hu
2019/1309 ( PDF )
SaberX4: High-throughput Software Implementationof Saber Key Encapsulation Mechanism
Sujoy Sinha Roy
2019/1308 ( PDF )
A Novel CCA Attack using Decryption Errors against LAC
Qian Guo and Thomas Johansson and Jing Yang
2019/1307 ( PDF )
ABERand: Effective Distributed Randomness on Ciphertext-Policy Attribute-Based Encryption
Liang Zhang and Haibin Kan and Zening Chen and Ziqi Mao and Jinjie Gao
2019/1306 ( PDF )
A Valid Blockchain-based Data Trading Ecosystem
Taotao li and Dequan li
2019/1305 ( PDF )
Privacy-Preserving Computation over Genetic Data: HLA Matching and so on
Jinming Cui and Huaping Li and Meng Yang
2019/1304 ( PDF )
Reduction Modulo $2^{448}-2^{224}-1$
Kaushik Nath and Palash Sarkar
2019/1303 ( -- withdrawn -- )
A simpler construction of traceable and linkable ring signature scheme
Wulu Li
2019/1302 ( PDF )
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation
Máté Horváth and Levente Buttyán and Gábor Székely and Dóra Neubrandt
2019/1301 ( PDF )
Modular lattice signatures, revisited
Dipayan Das and Jeffrey Hoffstein and Jill Pipher and William Whyte and Zhenfei Zhang
2019/1300 ( PDF )
Actively Secure Setup for SPDZ
Dragos Rotaru and Nigel P. Smart and Titouan Tanguy and Frederik Vercauteren and Tim Wood
2019/1299 ( PDF )
A constant-rate non-malleable code in the split-state model.
Divesh Aggarwal and Maciej Obremski
2019/1298 ( PDF )
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
Mark Abspoel and Anders Dalskov and Daniel Escudero and Ariel Nof
2019/1297 ( PDF )
Exploring Energy Efficient Quantum-resistant Signal Processing Using Array Processors
Hamid Nejatollahi and Sina Shahhosseini and Rosario Cammarota and Nikil Dutt
2019/1296 ( PDF )
FastSwap: Concretely Efficient Contingent Payments for Complex Predicates
Mathias Hall-Andersen
2019/1295 ( PDF )
A trip between creation and destruction of non-commutative public key exchange protocols
Borja Gómez
2019/1294 ( PDF )
Hashing to elliptic curves of $j$-invariant $1728$
Dmitrii Koshelev
2019/1293 ( PDF )
LizarMong: Excellent Key Encapsulation Mechanism based on RLWE and RLWR
Chi-Gon Jung and JongHyeok Lee and Youngjin Ju and Yong-Been Kwon and Seong-Woo Kim and Yunheung Paek
2019/1292 ( PDF )
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing
Sarvar Patel and Giuseppe Persiano and Kevin Yeo and Moti Yung
2019/1291 ( PDF )
SÉTA: Supersingular Encryption from Torsion Attacks
Cyprien Delpech de Saint Guilhem and Péter Kutas and Christophe Petit and Javier Silva
2019/1290 ( PDF )
Trapdoor DDH groups from pairings and isogenies
Péter Kutas and Christophe Petit and Javier Silva
2019/1289 ( PDF )
On constant-time QC-MDPC decoding with negligible failure rate
Nir Drucker and Shay Gueron and Dusan Kostic
2019/1288 ( PDF )
Threshold Schemes from Isogeny Assumptions
Luca De Feo and Michael Meyer
2019/1287 ( PDF )
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
Muhammed F. Esgin and Raymond K. Zhao and Ron Steinfeld and Joseph K. Liu and Dongxi Liu
2019/1286 ( PDF )
Comparison of proof-of-work based blockchains against federated consensus and proof-of-validation based blockchains
Ambili K N and Jimmy Jose
2019/1285 ( PDF )
Full-Round Differential Attack on DoT Block Cipher
Manoj Kumar
2019/1284 ( PDF )
Shorter QA-NIZK and SPS with Tighter Security
Masayuki Abe and Charanjit S. Jutla and Miyako Ohkubo and Jiaxin Pan and Arnab Roy and Yuyu Wang
2019/1283 ( PDF )
Breaking the Hidden Irreducible Polynomials Scheme
Christian Eder
2019/1282 ( PDF )
Privacy-Preserving Decision Tree Training and Prediction against Malicious Server
Adi Akavia and Max Leibovich and Yehezkel S. Resheff and Roey Ron and Moni Shahar and Margarita Vald
2019/1281 ( PDF )
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer
Geoffroy Couteau and Bill Roscoe and Peter Ryan
2019/1280 ( PDF )
Fast Secrecy Computation with Multiplication Under the Setting of $k\le N<2k-1$ using Secret Sharing Scheme
Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal
2019/1279 ( PDF )
Post-quantum Zero Knowledge in Constant Rounds
Nir Bitansky and Omri Shmueli
2019/1278 ( PDF )
An IND-CCA-Secure Code-Based EncryptionScheme Using Rank Metric
Hamad Al Shehhi and Emanuele Bellini and Filipe Borba and Florian Caullery and Marc Manzano and Victor Mateu
2019/1277 ( PDF )
Towards Quantum-Safe VPNs and Internet
Maran van Heesch and Niels van Adrichem and Thomas Attema and Thijs Veugen
2019/1276 ( PDF )
Two PQ Signature Use-cases: Non-issues, challenges and potential solutions.
Panos Kampanakis and Dimitrios Sikeridis
2019/1275 ( PDF )
Updatable Oblivious Key Management for Storage Systems
Stanislaw Jarecki and Hugo Krawczyk and Jason Resch
2019/1274 ( PDF )
Rank-metric Encryption on Arm-Cortex M0
Ameirah al Abdouli and Emanuele Bellini and Florian Caullery and Marc Manzano and Victor Mateu
2019/1273 ( PDF )
A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography
Jens-Peter Kaps and William Diehl and Michael Tempelmeier and Farnoud Farahmand and Ekawat Homsirikamol and Kris Gaj
2019/1272 ( PDF )
The Niederreiter cryptosystem and Quasi-Cyclic codes
Upendra Kapshikar and Ayan Mahalanobis
2019/1271 ( PDF )
Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices
Martin R. Albrecht and Alex Davidson and Amit Deo and Nigel P. Smart
2019/1270 ( PDF )
SAVER: SNARK-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization
Jiwon Lee and Jaekyoung Choi and Jihye Kim and Hyunok Oh
2019/1269 ( PDF )
Repudiable Ring Signature: Stronger Security and Logarithmic-Size
Hao Lin and Mingqiang Wang
2019/1268 ( PDF )
On the Security of RSA-PSS in the Wild
Saqib A. Kakvi
2019/1267 ( -- withdrawn -- )
Repudiable Ring Signatures: Stronger Definitions and Logarithmic-Size
Hao Lin and Mingqiang Wang
2019/1266 ( PDF )
Note on the noise growth of the RNS variants of the BFV scheme
Jean Claude Bajard and Julien Eynard and Paulo Martins and Leonel Sousa and Vincent Zucca
2019/1265 ( PDF )
WaterCarver: Anonymous Confidential Blockchain System based on Account Model
Jiajun Xin and Pei Huang and Lei Chen and Xin Lai and Xiao Zhang and Wulu Li and Yongcan Wang
2019/1264 ( PDF )
Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era
Juan Garay and Aggelos Kiayias and Rafail Ostrovsky and Giorgos Panagiotakos and Vassilis Zikas
2019/1263 ( PDF )
Comments on Cryptographic Entropy Measurement
Anna Johnston
2019/1262 ( PDF )
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing
Shweta Agrawal and Rachit Garg and Nishant Kumar and Manoj Prabhakaran
2019/1261 ( PDF )
On Round-By-Round Soundness and State Restoration Attacks
Justin Holmgren
2019/1260 ( PDF )
TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions
Anita Aghaie and Amir Moradi
2019/1259 ( PDF )
Security and Efficiency Trade-offs for Elliptic Curve Diffie-Hellman at the 128-bit and 224-bit Security Levels
Kaushik Nath and Palash Sarkar
2019/1258 ( PDF )
Secure Pairwise Key Sharing using Geometric Group Key Sharing Method (Full Paper)
Shogo Ochiai and Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal
2019/1257 ( PDF )
Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts
Dhaval Khandla and Het Shahy and Manish Kumar Bz and Alwyn Roshan Pais and Nishant Raj
2019/1256 ( PDF )
Permuted Puzzles and Cryptographic Hardness
Elette Boyle and Justin Holmgren and Mor Weiss
2019/1255 ( PDF )
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular
Daniel Benarroch and Matteo Campanelli and Dario Fiore and Kobi Gurkan and Dimitris Kolonelos
2019/1254 ( PDF )
Cryptanalysis of FRS Obfuscation based on the CLT13 Multilinear Map
Jiseung Kim and Changmin Lee
2019/1253 ( PDF )
Probabilistic Properties of Modular Addition \\ (Extended abstract)
Victoria Vysotskaya
2019/1252 ( PDF )
Simplifying Constructions and Assumptions for $i\mathcal{O}$
Aayush Jain and Huijia Lin and Amit Sahai
2019/1251 ( PDF )
Lattice-based Zero-knowledge SNARGs for Arithmetic Circuits
Anca Nitulescu
2019/1250 ( PDF )
The Price of Active Security in Cryptographic Protocols
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss
2019/1249 ( PDF )
Related-key Attack on 5-Round Kuznyechik
Vitaly Kiryukhin
2019/1248 ( PDF )
A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis
Bastian Richter and David Knichel and Amir Moradi
2019/1247 ( PDF )
A Note on Masking Generic Boolean Functions
Lauren De Meyer and Felix Wegener and Amir Moradi
2019/1246 ( PDF )
A Note on Our Submission to Track 4 of iDASH 2019
Marcel Keller and Ke Sun
2019/1245 ( PDF )
Observations on the Quantum Circuit of the SBox of AES
Jian Zou and Yongyang Liu and Chen Dong and Wenling Wu and Le Dong
2019/1244 ( PDF )
A Note on a Static SIDH Protocol
Samuel Dobson and Trey Li and Lukas Zobernig
2019/1243 ( PDF )
On The Distinguishability of Ideal Ciphers
Roberto Avanzi and Yvo Desmedt
2019/1242 ( PDF )
Non-Profiled Side Channel Attack based on Deep Learning using Picture Trace
Jong-Yoen Park and Dong-Guk Han and Dirmanto Jap and Shivam Bhasin and Yoo-Seung Won
2019/1241 ( PDF )
SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain
Jeonghyuk Lee and Jungyeon Hwang and Jaekyung Choi and Hyunok Oh and Jihye Kim
2019/1240 ( PDF )
Forward and Backward Private DSSE for Range Queries
Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk and Lei Xu
2019/1239 ( PDF )
Computationally Modeling User-Mediated Authentication Protocols
Britta Hale
2019/1238 ( PDF )
Linear-Regression on Packed Encrypted Data in the Two-Server Model
Adi Akavia and Hayim Shaul and Mor Weiss and Zohar Yakhini
2019/1237 ( PDF )
QFactory: classically-instructed remote secret qubits preparation
Alexandru Cojocaru and Léo Colisson and Elham Kashefi and Petros Wallden
2019/1236 ( PDF )
Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack
Bo-Yeon Sim and Dong-Guk Han
2019/1235 ( PDF )
Physical Cryptography
Mariana Costiuc and Diana Maimut and George Teseleanu
2019/1234 ( PDF )
Efficient Homomorphic Comparison Methods with Optimal Complexity
Jung Hee Cheon and Dongwoo Kim and Duhyeong Kim
2019/1233 ( PDF )
Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts
Koji Nuida and Satsuya Ohata and Shigeo Mitsunari and Nuttapong Attrapadung
2019/1232 ( PDF )
Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice
Meenakshi Kansal and Ratna Dutta and Sourav Mukhopadhyay
2019/1231 ( PDF )
Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications
Zhao Chunhuan and Zheng Zhongxiang and Wang Xiaoyun and Xu Guangwu
2019/1230 ( PDF )
Linear-Size Constant-Query IOPs for Delegating Computation
Eli Ben-Sasson and Alessandro Chiesa and Lior Goldberg and Tom Gur and Michael Riabzev and Nicholas Spooner
2019/1229 ( PDF )
Transparent SNARKs from DARK Compilers
Benedikt Bünz and Ben Fisch and Alan Szepieniec
2019/1228 ( PDF )
Guess what?! On the impossibility of unconditionally secure public-key encryption
Lorenz Panny
2019/1227 ( PDF )
Dynamic Searchable Encryption with Small Client Storage
Ioannis Demertzis and Javad Ghareh Chamani and Dimitrios Papadopoulos and Charalampos Papamanthou
2019/1226 ( PDF )
Cube Cryptanalysis of Round-Reduced ACORN
Jingchun Yang and Meicheng Liu and Dongdai Lin
2019/1225 ( PDF )
Analysis of Nakamoto Consensus, Revisited
Jianyu Niu and Chen Feng and Hoang Dau and Yu-Chih Huang and Jingge Zhu
2019/1224 ( PDF )
Practical Volume-Based Attacks on Encrypted Databases
Rishabh Poddar and Stephanie Wang and Jianan Lu and Raluca Ada Popa
2019/1223 ( PDF )
Integrita: Protecting View-Consistency in Online Social Network with Federated Servers
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
2019/1222 ( PDF )
Sub-Linear Privacy-Preserving Near-Neighbor Search
M. Sadegh Riazi and Beidi Chen and Anshumali Shrivastava and Dan Wallach and Farinaz Koushanfar
2019/1221 ( PDF )
Probabilistic Data Structures in Adversarial Environments
David Clayton and Christopher Patton and Thomas Shrimpton
2019/1220 ( PDF )
Side-channel Attacks on Blinded Scalar Multiplications Revisited
Thomas Roche and Laurent Imbert and Victor Lomné
2019/1219 ( PDF )
Multi-Locking and Perfect Argument Order: Two Major Improvements of Attribute-Based Encryption~(Long Paper)
Nugier Cyrius and Adelin Remi and Migliore Vincent and Alata Eric
2019/1218 ( PDF )
On the Efficiency of Software Implementations of Lightweight Block Ciphers from the Perspective of Programming Languages
Abdur Rehman Raza and Khawir Mahmood and Muhammad Faisal Amjad and Haider Abbas and Mehreen Afzal
2019/1217 ( -- withdrawn -- )
A Scalable Blockchain Based Digital Rights Management System
Ashutosh Dhar Dwivedi
2019/1216 ( PDF )
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm
Wei-Zhu Yeoh and Je Sen Teh and Jiageng Chen
2019/1215 ( PDF )
Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
2019/1214 ( PDF )
A New Secure and Efficient Ownership Transfer Protocol based on Quadric Residue and Homomorphic Encryption
Farokhlagha Moazami and Masoumeh Safkhani
2019/1213 ( PDF )
Exploring Lightweight Efficiency of ForkAES
Fatih Balli and Subhadeep Banik
2019/1212 ( PDF )
Swap and Rotate: Lightweight linear layers for SPN-based blockciphers
Subhadeep Banik and Fatih Balli and Francesco Regazzoni and Serge Vaudenay
2019/1211 ( PDF )
Topology-Hiding Computation for Networks with Unknown Delays
Rio LaVigne and Chen-Da Liu-Zhang and Ueli Maurer and Tal Moran and Marta Mularczyk and Daniel Tschudi
2019/1210 ( PDF )
Adaptive Security of Practical Garbling Schemes
Zahra Jafargholi and Sabine Oechsner
2019/1209 ( PDF )
On collisions related to an ideal class of order 3 in CSIDH
Hiroshi Onuki and Tsuyoshi Takagi
2019/1208 ( PDF )
Towards Post-Quantum Secure Symmetric Cryptography: A Mathematical Perspective
Xenia Bogomolec and John Gregory Underhill and Stiepan Aurélien Kovac
2019/1207 ( PDF )
Behind multiple trapdoors: A cryptographic commitment scheme for establishing secure communications
Borja Gómez
2019/1206 ( PDF )
High-Speed Modular Multipliers for Isogeny-Based Post-Quantum Cryptography
Jing Tian; Zhe Liu; Jun Lin; Zhongfeng Wang; Binjing Li
2019/1205 ( PDF )
Secure Multi-party Quantum Computation with a Dishonest Majority
Yfke Dulek and Alex Grilo and Stacey Jeffery and Christian Majenz and Christian Schaffner
2019/1204 ( PDF )
Efficient simulation of random states and random unitaries
Gorjan Alagic and Christian Majenz and Alexander Russell
2019/1203 ( PDF )
Authentication in Key-Exchange: Definitions, Relations and Composition
Cyprien Delpech de Saint Guilhem and Marc Fischlin and Bogdan Warinschi
2019/1202 ( PDF )
Rational isogenies from irrational endomorphisms
Wouter Castryck and Lorenz Panny and Frederik Vercauteren
2019/1201 ( PDF )
Efficient Redactable Signature and Application to Anonymous Credentials
Olivier Sanders
2019/1200 ( PDF )
A note on short invertible ring elements and applications to cyclotomic and trinomials number fields
Thomas Attema and Ronald Cramer and Chaoping Xing
2019/1199 ( PDF )
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
Max Hoffmann and Michael Klooß and Markus Raiber and Andy Rupp
2019/1198 ( PDF )
Encrypted Databases: New Volume Attacks against Range Queries
Zichen Gui and Oliver Johnson and Bogdan Warinschi
2019/1197 ( PDF )
Secret sharing and duality
Laszlo Csirmaz
2019/1196 ( PDF )
Evaluating Octic Residue Symbols
Marc Joye
2019/1195 ( PDF )
Non-Malleable Commitments Using Goldreich-Levin List Decoding
Vipul Goyal and Silas Richelson
2019/1194 ( PDF )
Perfect Forward Security of SPAKE2
Michel Abdalla and Manuel Barbosa
2019/1193 ( PDF )
Security models for everlasting privacy
Panagiotis Grontas and Aris Pagourtzis and Alexandros Zacharakis
2019/1192 ( PDF )
Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets
Daniel Berend and Dor Bitan and Shlomi Dolev
2019/1191 ( PDF )
On the equivalence of authentication codes and robust (2,2)-threshold schemes
Maura B. Paterson and Douglas R. Stinson
2019/1190 ( PDF )
Improving Matsui's Search Algorithm for the Best Differential/Linear Trails and its Applications for DES, DESL and GIFT
Fulei Ji and Wentao Zhang and Tianyou Ding
2019/1189 ( PDF )
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging
Joël Alwen and Sandro Coretti and Yevgeniy Dodis and Yiannis Tselekounis
2019/1188 ( PDF )
Improving Password Guessing via Representation Learning
Dario Pasquini and Ankit Gangwal and Giuseppe Ateniese and Massimo Bernaschi and Mauro Conti
2019/1187 ( PDF )
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs
Orr Dunkelman and Léo Perrin
2019/1186 ( PDF )
Trading Accumulation Size for Witness Size: A Merkle Tree Based Universal Accumulator Via Subset Differences
Mahabir Prasad Jhanwar and Pratyush Ranjan Tiwari
2019/1185 ( PDF )
Formalising $\Sigma$-Protocols and Commitment Schemes using CryptHOL
David Butler and Andreas Lochbihler and David Aspinall and Adria Gascon
2019/1184 ( PDF )
A concrete instantiation of Bulletproof zero-knowledge proof
Andrey Jivsov
2019/1183 ( PDF )
Broadcast-Optimal Two-Round MPC
Ran Cohen and Juan Garay and Vassilis Zikas
2019/1182 ( PDF )
Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries
Serge Fehr and Chen Yuan
2019/1181 ( -- withdrawn -- )
Quantum Physical Unclonable Functions: Possibilities and Impossibilities
Myrto Arapinis and Mahshid Delavar and Mina Doosti and Elham Kashefi
2019/1180 ( PDF )
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices
Pierre-Alain Fouque and Paul Kirchner and Mehdi Tibouchi and Alexandre Wallet and Yang Yu
2019/1179 ( PDF )
Practical MP-LWE-based encryption balancing security-risk vs. efficiency
Ron Steinfeld and Amin Sakzad and Raymond K. Zhao
2019/1178 ( PDF )
SoK: Sharding on Blockchain
Gang Wang and Zhijie Jerry Shi and Mark Nixon and Song Han
2019/1177 ( PDF )
Proofs for Inner Pairing Products and Applications
Benedikt Bünz and Mary Maller and Pratyush Mishra and Noah Vesely
2019/1176 ( PDF )
The Thirteenth Power Residue Symbol
Eric Brier and David Naccache
2019/1175 ( PDF )
Revisiting Leakage Abuse Attacks
Laura Blackstone and Seny Kamara and Tarik Moataz
2019/1174 ( PDF )
Hidden Irreducible Polynomials : A cryptosystem based on Multivariate Public Key Cryptography
Borja Gómez
2019/1173 ( PDF )
Immunization against Complete Subversion without Random Oracles
Giuseppe Ateniese and Danilo Francati and Bernardo Magri and Daniele Venturi
2019/1172 ( PDF )
Lever: Breaking the Shackles of Scalable On-chain Validation
Mingming Wang and Qianhong Wu
2019/1171 ( PDF )
Almost universal codes for MIMO wiretap channels
Laura Luzzi and Roope Vehkalahti and Cong Ling
2019/1170 ( PDF )
Space-efficient quantum multiplication of polynomials for binary finite fields with sub-quadratic Toffoli gate count
Iggy van Hoof
2019/1169 ( PDF )
Semantically Secure Lattice Codes for Compound MIMO Channels
Antonio Campello and Cong Ling and Jean-Claude Belfiore
2019/1168 ( PDF )
Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)
Chun Guo and Jonathan Katz and Xiao Wang and Chenkai Weng and Yu Yu
2019/1167 ( PDF )
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications
Nabil Alkeilani Alkadri and Rachid El Bansarkhani and Johannes Buchmann
2019/1166 ( PDF )
The complete cost of cofactor h=1
Peter Schwabe and Daan Sprenkels
2019/1165 ( PDF )
Fast verification of masking schemes in characteristic two
Nicolas Bordes and Pierre Karpman
2019/1164 ( PDF )
Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version)
Chao Liu and Zhongxiang Zheng and Keting Jia and Limin Tao
2019/1163 ( PDF )
On the Difficulty of FSM-based Hardware Obfuscation
Marc Fyrbiak and Sebastian Wallat and Jonathan Déchelotte and Nils Albartus and Sinan Böcker and Russell Tessier and Christof Paar
2019/1162 ( PDF )
Subversion-Resistant Simulation (Knowledge) Sound NIZKs
Karim Baghery
2019/1161 ( PDF )
Estimating quantum speedups for lattice sieves
Martin R. Albrecht and Vlad Gheorghiu and Eamonn W. Postlethwaite and John M. Schanck
2019/1160 ( PDF )
Cryptanalysis of the Multivariate Encryption Scheme EFLASH
Morten Řygarden and Patrick Felke and Hĺvard Raddum and Carlos Cid
2019/1159 ( PDF )
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Rindal and Peter Scholl
2019/1158 ( PDF )
Practical Privacy-Preserving K-means Clustering
Payman Mohassel and Mike Rosulek and Ni Trieu
2019/1157 ( PDF )
A Note on the Chi-square Method : A Tool for Proving Cryptographic Security
Srimanta Bhattacharya and Mridul Nandi
2019/1156 ( PDF )
How to Extract Useful Randomness from Unreliable Sources
Divesh Aggarwal and Maciej Obremski and Joăo Ribeiro and Luisa Siniscalchi and Ivan Visconti
2019/1155 ( PDF )
Machine-Checked Proofs for Cryptographic Standards
José Bacelar Almeida and Cécile Baritel-Ruet and Manuel Barbosa and Gilles Barthe and François Dupressoir and Benjamin Grégoire and Vincent Laporte and Tiago Oliveira and Alley Stoughton and Pierre-Yves Strub
2019/1154 ( PDF )
The Retracing Boomerang Attack
Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir
2019/1153 ( PDF )
Stronger Security and Constructions of Multi-Designated Verifier Signatures
Ivan Damgĺrd and Helene Haagh and Rebekah Mercer and Anca Nițulescu and Claudio Orlandi and Sophia Yakoubov
2019/1152 ( PDF )
Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs
Jonas Krautter and Dennis R.E. Gnad and Falk Schellenberg and Amir Moradi and Mehdi B. Tahoori
2019/1151 ( PDF )
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem
Yusuke Yoshida and Fuyuki Kitagawa and Keisuke Tanaka
2019/1150 ( PDF )
The Bitcoin Backbone Protocol Against Quantum Adversaries
Alexandru Cojocaru and Juan Garay and Aggelos Kiayias and Fang Song and Petros Wallden
2019/1149 ( PDF )
LockDown: Balance Availability Attack against Lightning Network Channels
Cristina Pérez-Solŕ and Alejandro Ranchal-Pedrosa and Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Joaquin Garcia-Alfaro
2019/1148 ( PDF )
On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption
Benjamin R. Curtis and Rachel Player
2019/1147 ( PDF )
Batching non-membership proofs with bilinear accumulators
Steve Thakur
2019/1146 ( PDF )
Implementing Grover oracles for quantum key search on AES and LowMC
Samuel Jaques and Michael Naehrig and Martin Roetteler and Fernando Virdia
2019/1145 ( PDF )
B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
Craig Costello
2019/1144 ( PDF )
Rerandomizable Signatures under Standard Assumption
Sanjit Chatterjee and R. Kabaleeshwaran
2019/1143 ( PDF )
Auditable Compressed Storage
Iraklis Leontiadis and Reza Curtmola
2019/1142 ( PDF )
Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP
Tamalika Mukherjee and Noah Stephens-Davidowitz
2019/1141 ( PDF )
KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures
Murat Yasin Kubilay and Mehmet Sabir Kiraz and Haci Ali Mantar
2019/1140 ( PDF )
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols (Extended Version)
Utsav Banerjee and Tenzin S. Ukyab and Anantha P. Chandrakasan
2019/1139 ( PDF )
Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
Mingchao Yu and Saeid Sahraei and Songze Li and Salman Avestimehr and Sreeram Kannan and Pramod Viswanath
2019/1138 ( PDF )
ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage
Gang Wang and Zhijie Jerry Shi and Mark Nixon and Song Han
2019/1137 ( PDF )
On the Complexity of Arithmetic Secret Sharing
Ronald Cramer and Chaoping Xing and Chen Yuan
2019/1136 ( PDF )
An implementation of the Paillier crypto system with threshold decryption without a trusted dealer
Thijs Veugen and Thomas Attema and Gabriele Spini
2019/1135 ( PDF )
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing
Arinjita Paul and S. Sharmila Deva Selvi and C. Pandu Rangan
2019/1134 ( PDF )
Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes
Ronald Cramer and Chaoping Xing
2019/1133 ( PDF )
Threat Models and Security of Phase-Change Memory
Gang Wang
2019/1132 ( PDF )
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Mode
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2019/1131 ( PDF )
Nearly Optimal Robust Secret Sharing against Rushing Adversaries
Pasin Manurangsi and Akshayaram Srinivasan and Prashant Nalini Vasudevan
2019/1130 ( PDF )
On affine Cremona semigroups, corresponding protocols of Non-commutative Cryptography and encryption with several nonlinear multivariate transformations on secure Eulerian mode.
V. Ustimenko
2019/1129 ( PDF )
Privacy-Enhanced Machine Learning with Functional Encryption
Tilen Marc and Miha Stopar and Jan Hartman and Manca Bizjak and Jolanda Modic
2019/1128 ( PDF )
SoK: Communication Across Distributed Ledgers
Alexei Zamyatin and Mustafa Al-Bassam and Dionysis Zindros and Eleftherios Kokoris-Kogias and Pedro Moreno-Sanchez and Aggelos Kiayias and William J. Knottenbelt
2019/1127 ( PDF )
Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing
Kazuhiko Minematsu and Norifumi Kamiya
2019/1126 ( PDF )
Encrypted Distributed Hash Tables
Archita Agarwal and Seny Kamara
2019/1125 ( PDF )
Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols
Karim Baghery and Behzad Abdolmaleki and Shahram Khazaei and Mohammad Reza Aref
2019/1124 ( PDF )
Evolving Ramp Secret Sharing with a Small Gap
Amos Beimel and Hussien Othman
2019/1123 ( PDF )
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme
Laltu Sardar and Sushmita Ruj
2019/1122 ( PDF )
Exploring Trade-offs in Batch Bounded Distance Decoding
Martin R. Albrecht and Benjamin R. Curtis and Thomas Wunderer
2019/1121 ( PDF )
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors
Aaron Hutchinson and Jason LeGrow and Brian Koziel and Reza Azarderakhsh
2019/1120 ( PDF )
Structure-Preserving Signatures on Equivalence Classes From Standard Assumptions
Mojtaba Khalili and Daniel Slamanig and Mohammad Dakhilalian
2019/1119 ( PDF )
MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version)
Antonis Michalas and Alexandros Bakas and Hai-Van Dang and Alexandr Zalitko
2019/1118 ( PDF )
A Diffie-Hellman quantum session key establishment protocol without entanglement
Yalin Chen and Chang Hsiang and Liang-Chun Wang and Yu-Yuan Chou and Jue-Sam Chou *
2019/1117 ( -- withdrawn -- )
NP-completeness Reduction for Semiprimes Factorization Problem
Yen-Lung Lai
2019/1116 ( PDF )
Computational Extractors with Negligible Error in the CRS Model
Ankit Garg and Yael Tauman Kalai and Dakshita Khurana
2019/1115 ( PDF )
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash
Rui Zong and Xiaoyang Dong and Xiaoyun Wang
2019/1114 ( PDF )
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE
Jung Hee Cheon and Minki Hhan and Seungwan Hong and Yongha Son
2019/1113 ( PDF )
Towards a Homomorphic Machine Learning Big Data Pipeline for the Financial Services Sector
Oliver Masters and Hamish Hunt and Enrico Steffinlongo and Jack Crawford and Flavio Bergamaschi and Maria E. Dela Rosa and Caio C. Quini and Camila T. Alves and Feranda de Souza and Deise G. Ferreira
2019/1112 ( PDF )
Subliminal Hash Channels
George Teseleanu
2019/1111 ( PDF )
Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers
Mikerah Quintyne-Collins
2019/1110 ( PDF )
Redactable Proof-of-Stake Blockchain with Fast Confirmation
Jing Xu and Xinyu Li and Lingyuan Yin and Bingyong Guo and Han Feng and Zhenfeng Zhang
2019/1109 ( PDF )
Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography
Alberto Pedrouzo-Ulloa and Juan Ramón Troncoso-Pastoriza and Nicolas Gama and Mariya Georgieva and Fernando Pérez-González
2019/1108 ( PDF )
Lower Bounds for Multi-Server Oblivious RAMs
Kasper Green Larsen and Mark Simkin and Kevin Yeo
2019/1107 ( PDF )
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy
Lorenzo Grassi and Reinhard Lüftenegger and Christian Rechberger and Dragos Rotaru and Markus Schofnegger
2019/1106 ( PDF )
Side-channel Masking with Pseudo-Random Generator
Jean-Sébastien Coron and Aurélien Greuet and Rina Zeitoun
2019/1105 ( PDF )
On the Multi-User Security of Short Schnorr Signatures
Jeremiah Blocki and Seunghoon Lee
2019/1104 ( PDF )
More Efficient MPC from Improved Triple Generation and Authenticated Garbling
Kang Yang and Xiao Wang and Jiang Zhang
2019/1103 ( PDF )
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms
Rahul Chatterjee and M. Sadegh Riazi and Tanmoy Chowdhury and Emanuela Marasco and Farinaz Koushanfar and Ari Juels
2019/1102 ( -- withdrawn -- )
Applications on traceable range proofs from fully regulatable privacy-preserving blockchains
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2019/1101 ( PDF )
On the (Quantum) Random Oracle Methodology: New Separations and More
Jiang Zhang and Yu Yu and Dengguo Feng and Shuqin Fan and Zhenfeng Zhang
2019/1100 ( PDF )
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes
Qi Chen and Chunming Tang and Zhiqiang Lin
2019/1099 ( PDF )
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name
Eman Salem Alashwali and Kasper Rasmussen
2019/1098 ( PDF )
Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling
Eleftheria Makri and Tim Wood
2019/1097 ( PDF )
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric
Dmytro Bogatov and Angelo De Caro and Kaoutar Elkhiyaoui and Björn Tackmann
2019/1096 ( PDF )
Proof-of-Burn
Kostis Karantias and Aggelos Kiayias and Dionysis Zindros
2019/1095 ( PDF )
Secure Computation with Preprocessing via Function Secret Sharing
Elette Boyle and Niv Gilboa and Yuval Ishai
2019/1094 ( PDF )
Is Information-Theoretic Topology-Hiding Computation Possible?
Marshall Ball and Elette Boyle and Ran Cohen and Tal Malkin and Tal Moran
2019/1093 ( PDF )
Quantum Random Oracle Model with Auxiliary Input
Minki Hhan and Keita Xagawa and Takashi Yamakawa
2019/1092 ( PDF )
Cerberus Channels: Incentivizing Watchtowers for Bitcoin
Georgia Avarikioti and Orfeas Stefanos Thyfronitis Litos and Roger Wattenhofer
2019/1091 ( PDF )
Short Paper: XOR Arbiter PUFs have Systematic Response Bias
Nils Wisiol and Niklas Pirnay
2019/1090 ( PDF )
Low Complexity MDS Matrices Using $GF(2^n)$ SPB or GPB
Xinggu Chen and Haining Fan
2019/1089 ( PDF )
Lattice-Face Key Infrastructure (LFKI) for Quantum Resistant Computing
Josiah Johnson Umezurike
2019/1088 ( PDF )
KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability
Clinton Ehrlich and Anna Guzova
2019/1087 ( PDF )
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data
Shyam Murthy and Srinivas Vivek
2019/1086 ( PDF )
The SPHINCS+ Signature Framework
Daniel J. Bernstein and Andreas Hülsing and Stefan Kölbl and Ruben Niederhagen and Joost Rijneveld and Peter Schwabe
2019/1085 ( PDF )
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation
Yilei Chen and Minki Hhan and Vinod Vaikuntanathan and Hoeteck Wee
2019/1084 ( PDF )
Distributed Vector-OLE: Improved Constructions and Implementation
Phillipp Schoppmann and Adriŕ Gascón and Leonie Reichert and Mariana Raykova
2019/1083 ( PDF )
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS
Eman Salem Alashwali and Kasper Rasmussen
2019/1082 ( PDF )
On the Security of Multikey Homomorphic Encryption
Hyang-Sook Lee and Jeongeun Park
2019/1081 ( PDF )
OCEAN: A Built-In Replacement for Mining Pools
Raymond Chee and Kartik Chitturi and Edouard Dufour-Sans and Kyle Soska
2019/1080 ( PDF )
Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods
Fukang Liu and Takanori Isobe and Willi Meier
2019/1079 ( PDF )
When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited
Yiming Zhu and Zhen Liu and Yanbin Pan
2019/1078 ( PDF )
Puncturable Proxy Re-Encryption supporting to Group Messaging Service
Tran Viet Xuan Phuong and Willy Susilo and Jongkil Kim and Guomin Yang and Dongxi Liu
2019/1077 ( PDF )
Adaptively Secure Garbling Schemes for Parallel Computations
Kai-Min Chung; Luowen Qian
2019/1076 ( PDF )
Fractal: Post-Quantum and Transparent Recursive Proofs from Holography
Alessandro Chiesa and Dev Ojha and Nicholas Spooner
2019/1075 ( PDF )
Private Information Retrieval with Sublinear Online Time
Henry Corrigan-Gibbs and Dmitry Kogan
2019/1074 ( PDF )
Non-monotonic Practical ABE with Direct Revocation, Blackbox Traceability, and a Large Attribute Universe
Dirk Thatmann
2019/1073 ( PDF )
iUC: Flexible Universal Composability Made Simple
Jan Camenisch and Stephan Krenn and Ralf Kuesters and Daniel Rausch
2019/1072 ( PDF )
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem
Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Kevin Liu and Giulio Malavolta
2019/1071 ( PDF )
DLSCA: a Tool for Deep Learning Side Channel Analysis
Martin Brisfors and Sebastian Forsmark
2019/1070 ( PDF )
Secure Delegation of Isogeny Computations and Cryptographic Applications
Robi Pedersen and Osmanbey Uzunkol
2019/1069 ( PDF )
Efficient Private PEZ Protocols for Symmetric Functions
Yoshiki Abe and Mitsugu Iwamoto and Kazuo Ohta
2019/1068 ( PDF )
Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets Efficiently
Joey Green and Tilo Burghardt and Elisabeth Oswald
2019/1067 ( PDF )
Lattice Trapdoors and IBE from Middle-Product LWE
Alex Lombardi and Vinod Vaikuntanathan and Thuy Duong Vuong
2019/1066 ( PDF )
HEAX: An Architecture for Computing on Encrypted Data
M. Sadegh Riazi and Kim Laine and Blake Pelton and Wei Dai
2019/1065 ( PDF )
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Karim Baghery
2019/1064 ( PDF )
Separating Symmetric and Asymmetric Password-Authenticated Key Exchange
Julia Hesse
2019/1063 ( PDF )
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing
Behzad Abdolmaleki and Hamidreza Khoshakhlagh and Daniel Slamanig
2019/1062 ( PDF )
Local Proofs Approaching the Witness Length
Noga Ron-Zewi and Ron D. Rothblum
2019/1061 ( PDF )
Breaking and Fixing Anonymous Credentials for the Cloud
Ulrich Haböck and Stephan Krenn
2019/1060 ( PDF )
Sharing the LUOV: Threshold Post-Quantum Signatures
Daniele Cozzo and Nigel P. smart
2019/1059 ( PDF )
A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem
Daniele Di Tullio and Ankan Pal
2019/1058 ( PDF )
Privacy-preserving auditable token payments in a permissioned blockchain system
Elli Androulaki and Jan Camenisch and Angelo De Caro and Maria Dubovitskaya and Kaoutar Elkhiyaoui and Björn Tackmann
2019/1057 ( PDF )
A Study of Persistent Fault Analysis
Andrea Caforio and Subhadeep Banik
2019/1056 ( PDF )
Adventures in Supersingularland
Sarah Arpin and Catalina Camacho-Navarro and Kristin Lauter and Joelle Lim and Kristina Nelson and Travis Scholl and Jana Sotáková
2019/1055 ( PDF )
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk
2019/1054 ( PDF )
Truthful and Faithful Monetary Policy for a Stablecoin Conducted by a Decentralised, Encrypted Artificial Intelligence
David Cerezo Sánchez
2019/1053 ( PDF )
Modeling Memory Faults in Signature and Authenticated Encryption Schemes
Marc Fischlin and Felix Günther
2019/1052 ( PDF )
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem
Abderrahmane Nitaj and Willy Susilo and Joseph Tonien
2019/1051 ( PDF )
A New Public Key Cryptosystem Based on Edwards Curves
Maher Boudabra and Abderrahmane Nitaj
2019/1050 ( PDF )
A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem
Abderrahmane Nitaj and Emmanuel Fouotsa
2019/1049 ( PDF )
CrypTFlow: Secure TensorFlow Inference
Nishant Kumar and Mayank Rathee and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma
2019/1048 ( PDF )
A new elliptic curve point compression method based on $\mathbb{F}_{\!p}$-rationality of some generalized Kummer surfaces
Dmitrii Koshelev
2019/1047 ( PDF )
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS
Alessandro Chiesa and Yuncong Hu and Mary Maller and Pratyush Mishra and Noah Vesely and Nicholas Ward
2019/1046 ( PDF )
The Function-Inversion Problem: Barriers and Opportunities
Henry Corrigan-Gibbs and Dmitry Kogan
2019/1045 ( PDF )
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank
Josh Alman and Robin Hui
2019/1044 ( PDF )
Verifiable Registration-Based Encryption
Rishab Goyal and Satyanarayana Vusirikala
2019/1043 ( PDF )
Breaking the Bluetooth Pairing – The Fixed Coordinate Invalid Curve Attack
Eli Biham and Lior Neumann
2019/1042 ( PDF )
A Machine-Checked Proof of Security for AWS Key Management Service
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Matthew Campagna and Ernie Cohen and Benjamin Gregoire and Vitor Pereira and Bernardo Portela and Pierre-Yves Strub and Serdar Tasiran
2019/1041 ( PDF )
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Swapnil Paliwal and Anvita Chandrakar
2019/1040 ( PDF )
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
Abhishek Chakraborty and Ankur Srivastava
2019/1039 ( PDF )
Accelerated V2X provisioning with Extensible Processor Platform
Henrique S. Ogawa and Thomas E. Luther and Jefferson E. Ricardini and Helmiton Cunha and Marcos Simplicio Jr. and Diego F. Aranha and Ruud Derwig and Harsh Kupwade-Patil
2019/1038 ( PDF )
Dynamic Searchable Encryption with Access Control
Johannes Blömer and Nils Löken
2019/1037 ( PDF )
Card-based Cryptography Meets Formal Verification
Alexander Koch and Michael Schrempp and Michael Kirsten
2019/1036 ( PDF )
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Kazuki Yoneyama
2019/1035 ( PDF )
An LLL Algorithm for Module Lattices
Changmin Lee and Alice Pellet-Mary and Damien Stehlé and Alexandre Wallet
2019/1034 ( PDF )
Sponges Resist Leakage: The Case of Authenticated Encryption
Jean Paul Degabriele and Christian Janson and Patrick Struck
2019/1033 ( PDF )
Anonymous AE
John Chan and Phillip Rogaway
2019/1032 ( PDF )
On Fully Secure MPC with Solitary Output
Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Nikolaos Makriyannis and Tal Rabin
2019/1031 ( PDF )
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice
Rahim Toluee and Taraneh Eghlidos
2019/1030 ( PDF )
How to leverage hardness of constant degree expanding polynomials over R to build iO
Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai
2019/1029 ( PDF )
Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures
Yilei Chen and Nicholas Genise and Pratyay Mukherjee
2019/1028 ( PDF )
Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors
Divesh Aggarwal and Bogdan Ursu and Serge Vaudenay
2019/1027 ( PDF )
Quantum LLL with an Application to Mersenne Number Cryptosystems
Marcel Tiepelt and Alan Szepieniec
2019/1026 ( PDF )
Efficient Tightly-Secure Structure-Preserving Signatures and Unbounded Simulation-Sound QA-NIZK Proofs
Mojtaba Khalili and Daniel Slamanig
2019/1025 ( PDF )
On Perfect Correctness without Derandomization
Gilad Asharov and Naomi Ephraim and Ilan Komargodski and Rafael Pass
2019/1024 ( PDF )
Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix (extended abstract)
Dor Bitan and Shlomi Dolev
2019/1023 ( PDF )
Randomly Choose an Angle from Immense Number of Angles to Rotate Qubits, Compute and Reverse
Dor Bitan and Shlomi Dolev
2019/1022 ( PDF )
A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem
Jintai Ding and Joshua Deaton and Kurt Schmidt and Vishakha and Zheng Zhang
2019/1021 ( PDF )
Recursive Proof Composition without a Trusted Setup
Sean Bowe and Jack Grigg and Daira Hopwood
2019/1020 ( PDF )
Transparent Polynomial Commitment Scheme with Polylogarithmic Communication Complexity
Alexander Vlasov and Konstantin Panarin
2019/1019 ( PDF )
Revisiting the Hybrid attack on sparse and ternary secret LWE
Yongha Son and Jung Hee Cheon
2019/1018 ( PDF )
Towards Instantiating the Algebraic Group Model
Julia Kastner and Jiaxin Pan
2019/1017 ( PDF )
The Local Forking Lemma and its Application to Deterministic Encryption
Mihir Bellare and Wei Dai and Lucy Li
2019/1016 ( PDF )
Quantum Algorithms for the Approximate $k$-List Problem and their Application to Lattice Sieving
Elena Kirshanova and Erik Mĺrtensson and Eamonn W. Postlethwaite and Subhayan Roy Moulik
2019/1015 ( PDF )
Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.
Eleftherios Kokoris-Kogias and Dahlia Malkhi and Alexander Spiegelman
2019/1014 ( PDF )
Security Reductions for White-Box Key-Storage in Mobile Payments
Estuardo Alpirez Bock and Chris Brzuska and Marc Fischlin and Christian Janson and Wil Michiels
2019/1013 ( PDF )
A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules')
Carolyn Whitnall and Elisabeth Oswald
2019/1012 ( PDF )
Simple and Efficient KDM-CCA Secure Public Key Encryption
Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka
2019/1011 ( PDF )
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers
Raymond K. Zhao and Ron Steinfeld and Amin Sakzad
2019/1010 ( PDF )
On Perfect Correctness in (Lockable) Obfuscation
Rishab Goyal and Venkata Koppula and Satyanarayana Vusirikala and Brent Waters
2019/1009 ( PDF )
LLL and stochastic sandpile models
Jintai Ding and Seungki Kim and Tsuyoshi Takagi and Yuntao Wang
2019/1008 ( PDF )
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations
Olivier Bronchain and François-Xavier Standaert
2019/1007 ( PDF )
SPAE a mode of operation for AES on low-cost hardware
Philippe Elbaz-Vincent and Cyril Hugounenq and Sébastien Riou
2019/1006 ( PDF )
Lucente Stabile Atkins (LSA) Cryptosystem (Unbreakable)
Francesco Lucente Stabile and Carey Patrick Atkins
2019/1005 ( PDF )
Threshold Implementations in the Robust Probing Model
Siemen Dhooghe and Svetla Nikova and Vincent Rijmen
2019/1004 ( PDF )
Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages
Elena Andreeva and Virginie Lallemand and Antoon Purnal and Reza Reyhanitabar and Arnab Roy and Damian Vizar
2019/1003 ( PDF )
Twisted Hessian Isogenies
Thinh Dang and Dustin Moody
2019/1002 ( PDF )
Boomerang Uniformity of Popular S-box Constructions
Shizhu Tian and Christina Boura and Léo Perrin
2019/1001 ( PDF )
Middle-Product Learning with Rounding Problem and its Applications
Shi Bai and Katharina Boudgoust and Dipayan Das and Adeline Roux-Langlois and Weiqiang Wen and Zhenfei Zhang
2019/1000 ( PDF )
Security of Symmetric Primitives against Key-Correlated Attacks
Aisling Connolly and Pooya Farshim and Georg Fuchsbauer
2019/999 ( PDF )
On the Fast Algebraic Immunity of Majority Functions
Pierrick Méaux
2019/998 ( PDF )
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation
Arpita Patra and Divya Ravi
2019/997 ( PDF )
On the (In)security of Kilian-Based SNARGs
James Bartusek and Liron Bronfman and Justin Holmgren and Fermi Ma and Ron Rothblum
2019/996 ( PDF )
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG
Shaanan Cohney and Andrew Kwong and Shachar Paz and Daniel Genkin and Nadia Heninger and Eyal Ronen and Yuval Yarom
2019/995 ( PDF )
Blackbox Constructions from Mix-Nets
Douglas Wikström
2019/994 ( PDF )
A new family of APN quadrinomials
Lilya Budaghyan and Tor Helleseth and Nikolay Kaleyski
2019/993 ( PDF )
Private Set Relations with Bloom Filters for Outsourced SLA Validation
Louis Tajan and Dirk Westhoff and Frederik Armknecht
2019/992 ( PDF )
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms
Tetsu Iwata and Mustafa Khairallah and Kazuhiko Minematsu and Thomas Peyrin
2019/991 ( PDF )
Vectorized linear approximations for attacks on SNOW 3G
Jing Yang and Thomas Johansson and Alexander Maximov
2019/990 ( PDF )
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More
Sanjam Garg and Mohammad Hajiabadi and Rafail Ostrovsky
2019/989 ( PDF )
Substitution Attacks against Message Authentication
Marcel Armour and Bertram Poettering
2019/988 ( PDF )
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications
David W. Archer and Jose Manuel Calderon Trilla and Jason Dagit and Alex J. Malozemoff and Yuriy Polyakov and Kurt Rohloff and Gerard Ryan
2019/987 ( PDF )
Subverting Decryption in AEAD
Marcel Armour and Bertram Poettering
2019/986 ( PDF )
Outpost: A Responsive Lightweight Watchtower
Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer
2019/985 ( PDF )
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts
Philipp Schindler and Aljosha Judmayer and Nicholas Stifter and Edgar Weippl
2019/984 ( PDF )
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions
Sam Kim and David J. Wu
2019/983 ( PDF )
Graph Similarity and Its Applications to Hardware Security
Marc Fyrbiak and Sebastian Wallat and Sascha Reinhard and Nicolai Bissantz and Christof Paar
2019/982 ( PDF )
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions
Toi Tomita and Wakaha Ogata and Kaoru Kurosawa and Ryo Kuwayama
2019/981 ( PDF )
Traceback for End-to-End Encrypted Messaging
Nirvan Tyagi and Ian Miers and Thomas Ristenpart
2019/980 ( PDF )
New Approaches to Traitor Tracing with Embedded Identities
Rishab Goyal and Venkata Koppula and Brent Waters
2019/979 ( PDF )
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks
Kalikinkar Mandal and Guang Gong
2019/978 ( PDF )
Strength in Numbers: Improving Generalization with Ensembles in Profiled Side-channel Analysis
Guilherme Perin and Lukasz Chmielewski and Stjepan Picek
2019/977 ( PDF )
Non-malleable Zero-Knowledge Arguments with Lower Round Complexity
Zhenbin Yan and Yi Deng
2019/976 ( PDF )
Towards real-time hidden speaker recognition by means of fully homomorphic encryption
Martin Zuber and Sergiu Carpov and Renaud Sirdey
2019/975 ( -- withdrawn -- )
Ci-Lock: Cipher Induced Logic Locking Resistant Against SAT Attacks
Akashdeep Saha and Sayandeep Saha and Debdeep Mukhopadhyay and Bhargab Bikram Bhattacharya
2019/974 ( PDF )
Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE
Abdelrahaman Aly and Emmanuela Orsini and Dragos Rotaru and Nigel P. Smart and Tim Wood
2019/973 ( PDF )
On the Non-Existence of Short Vectors in Random Module Lattices
Ngoc Khanh Nguyen
2019/972 ( PDF )
Noninteractive Zero Knowledge Proof System for NP from Ring LWE
Wenping MA
2019/971 ( PDF )
Verifpal: Cryptographic Protocol Analysis for the Real World
Nadim Kobeissi and Georgio Nicolas and Mukesh Tiwari
2019/970 ( -- withdrawn -- )
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol
Xinyu Li and Jing Xu and Xiong Fan and Yuchen Wang and Zhenfeng Zhang
2019/969 ( PDF )
Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography
Russell W. F. Lai and Giulio Malavolta and Viktoria Ronge
2019/968 ( PDF )
There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero
William Black and Ryan Henry
2019/967 ( PDF )
On NIST's Compression Estimate Test
Prasanna Raghaw Mishra and Bhartendu Nandan and Navneet Gaba
2019/966 ( PDF )
Fast, Compact, and Expressive Attribute-Based Encryption
Junichi Tomida and Yuto Kawahara and Ryo Nishimaki
2019/965 ( PDF )
Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness
Andrea Caforio and F Betül Durak and Serge Vaudenay
2019/964 ( PDF )
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited
Georg Fuchsbauer
2019/963 ( PDF )
Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits
Pascal Aubry and Sergiu Carpov and Renaud Sirdey
2019/962 ( PDF )
New Constructions of Hinting PRGs, OWFs with Encryption, and more
Rishab Goyal and Satyanarayana Vusirikala and Brent Waters
2019/961 ( PDF )
Computing across Trust Boundaries using Distributed Homomorphic Cryptography
Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Pierre Hubaux
2019/960 ( PDF )
Another Look at Key Randomisation Hypotheses
Subhabrata Samajder and Palash Sarkar
2019/959 ( PDF )
Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography
Seungkwang Lee and Myungchul Kim
2019/958 ( PDF )
Using SMT Solvers to Automate Chosen Ciphertext Attacks
Gabrielle Beck and Maximilian Zinkus and Matthew Green
2019/957 ( PDF )
TaaS: Commodity MPC via Triples-as-a-Service
Nigel P. Smart and Titouan Tanguy
2019/956 ( PDF )
Security of Hedged Fiat-Shamir Signatures under Fault Attacks
Diego F. Aranha and Claudio Orlandi and Akira Takahashi and Greg Zaverucha
2019/955 ( PDF )
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications
Antonio Faonio and Dario Fiore and Javier Herranz and Carla Rŕfols
2019/954 ( PDF )
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Mohsen Jahanbani and Zeinolabedin Norouzi and Nasour Bagheri
2019/953 ( PDF )
PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge
Ariel Gabizon and Zachary J. Williamson and Oana Ciobotaru
2019/952 ( PDF )
Non-Interactive Zero Knowledge Proofs in the Random Oracle Model
Vincenzo Iovino and Ivan Visconti
2019/951 ( PDF )
Collisions on Feistel-MiMC and univariate GMiMC
Xavier Bonnetain
2019/950 ( PDF )
Another look at some isogeny hardness assumptions
Simon-Philipp Merz and Romy Minko and Christophe Petit
2019/949 ( PDF )
A Note on Parameter Choices of Round5
Yongha Son
2019/948 ( PDF )
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
Prasanna Ravi and Sujoy Sinha Roy and Anupam Chattopadhyay and Shivam Bhasin
2019/947 ( PDF )
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
Fabian Boemer and Anamaria Costache and Rosario Cammarota and Casimir Wierzynski
2019/946 ( PDF )
Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design
M Sazadur Rahman and Adib Nahiyan and Sarah Amir and Fahim Rahman and Farimah Farahmandi and Domenic Forte and Mark Tehranipoor
2019/945 ( PDF )
A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting
Navid Ghaedi Bardeh
2019/944 ( PDF )
Efficient zero-knowledge arguments in the discrete log setting, revisited
Max Hoffmann and Michael Klooß and Andy Rupp
2019/943 ( PDF )
Analysis of Nakamoto Consensus
Ling Ren
2019/942 ( PDF )
Ouroboros Clepsydra: Ouroboros Praos in the Universally Composable Relative Time Model
Handan Kılınç Alper
2019/941 ( PDF )
Does "www." Mean Better Transport Layer Security?
Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
2019/940 ( PDF )
Security analysis of two lightweight certi ficateless signature schemes
Nasrollah Pakniat
2019/939 ( PDF )
Homomorphic Encryption Standard
Martin Albrecht and Melissa Chase and Hao Chen and Jintai Ding and Shafi Goldwasser and Sergey Gorbunov and Shai Halevi and Jeffrey Hoffstein and Kim Laine and Kristin Lauter and Satya Lokam and Daniele Micciancio and Dustin Moody and Travis Morrison and Amit Sahai and Vinod Vaikuntanathan
2019/938 ( PDF )
Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem
Gaëtan Leurent and Ferdinand Sibleyras
2019/937 ( PDF )
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation
Sayandeep Saha and Arnab Bag and Debapriya Basu Roy and Sikhar Patranabis and Debdeep Mukhopadhyay
2019/936 ( PDF )
SNEIK on Microcontrollers: AVR, ARMv7-M, and RISC-V with Custom Instructions
Markku-Juhani O. Saarinen
2019/935 ( -- withdrawn -- )
Interpretable Encrypted Searchable Neural Networks
Kai Chen; Zhongrui Lin; Jian Wan; Chungen Xu.
2019/934 ( PDF )
Linear Approximations of Random Functions and Permutations
Mohsin Khan and Kaisa Nyberg
2019/933 ( PDF )
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy
Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen
2019/932 ( PDF )
Related-key Differential Cryptanalysis of Full Round CRAFT
Muhammad ElSheikh and Amr M. Youssef
2019/931 ( PDF )
Low Weight Discrete Logarithms and Subset Sum in $2^{0.65n}$ with Polynomial Memory
Andre Esser and Alexander May
2019/930 ( PDF )
Module-LWE versus Ring-LWE, Revisited
Yang Wang and Mingqiang Wang
2019/929 ( PDF )
On the Degree-Insensitive SI-GDH problem and assumption
Samuel Dobson and Steven D. Galbraith
2019/928 ( PDF )
Blockchain-enabled Cryptographically-secure Hardware Obfuscation
Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert and Domenic Forte
2019/927 ( PDF )
Isogeny-based hashing despite known endomorphisms
Lorenz Panny
2019/926 ( PDF )
Formal Verification of a Constant-Time Preserving C Compiler
Gilles Barthe and Sandrine Blazy and Benjamin Grégoire and Rémi Hutin and Vincent Laporte and David Pichardie and Alix Trieu
2019/925 ( PDF )
Fully Auditable Privacy-preserving Cryptocurrency Against Malicious Auditors
Wulu Li and Yongcan Wang and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2019/924 ( PDF )
Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework
Dirk Achenbach and Roland Gröll and Timon Hackenjos and Alexander Koch and Bernhard Löwe and Jeremias Mechler and Jörn Müller-Quade and Jochen Rill
2019/923 ( PDF )
Automated Probe Repositioning for On-Die EM Measurements
Bastian Richter and Alexander Wild and Amir Moradi
2019/922 ( PDF )
A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation
Karim Eldefrawy and Vitor Pereira
2019/921 ( PDF )
Tree authenticated ephemeral keys
Pavol Zajac
2019/920 ( PDF )
Related-Key Differential Slide Attack Against Fountain V1
Raluca Posteuca
2019/919 ( PDF )
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection (extended version∗)
Wei Cheng and Claude Carlet and Kouassi Goli and Sylvain Guilley and Jean-Luc Danger
2019/918 ( PDF )
Resolving the Trilemma in Logic Encryption
Hai Zhou and Amin Rezaei and Yuanqi Shen
2019/917 ( PDF )
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
Shixiong Wang and Juanyang Zhang and Jingnan He and Huaxiong Wang and Chao Li
2019/916 ( -- withdrawn -- )
Multi-owner Secure Encrypted Search Using Searching Adversarial Networks
Kai Chen; Zhongrui Lin; Jian Wan; Lei Xu; Chungen Xu.
2019/915 ( PDF )
Unique Rabin-Williams Signature Scheme Decryption
Lynn Margaret Batten and Hugh Cowie Williams
2019/914 ( PDF )
Composable and Finite Computational Security of Quantum Message Transmission
Fabio Banfi and Ueli Maurer and Christopher Portmann and Jiamin Zhu
2019/913 ( PDF )
Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — An Analytical Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography
Wen-Ran Zhang
2019/912 ( PDF )
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting
David Derler and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks
2019/911 ( PDF )
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
Gildas Avoine and Sébastien Canard and Loďc Ferreira
2019/910 ( PDF )
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto
Tobias Schneider and Clara Paglialonga and Tobias Oder and Tim Güneysu
2019/909 ( PDF )
A Practicable Timing Attack Against HQC and its Countermeasure
Guillaume Wafo-Tapa and Slim Bettaieb and Loic Bidoux and Philippe Gaborit and Etienne Marcatel
2019/908 ( PDF )
Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security
Benoît Libert and Khoa Nguyen and Alain Passelčgue and Radu Titiu
2019/907 ( PDF )
Practical Forgery Attacks on Limdolen and HERN
Raghvendra Rohit and Guang Gong
2019/906 ( PDF )
Efficient and secure software implementations of Fantomas
Rafael J. Cruz and Antonio Guimarăes and Diego F. Aranha
2019/905 ( -- withdrawn -- )
The Power of NIST Cryptographic Tests Suite
Paul Burciu and Emil Simion
2019/904 ( PDF )
Timed-Release Encryption With Master Time Bound Key (Full Version)
Gwangbae Choi and Serge Vaudenay
2019/903 ( PDF )
Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases
Igor Semaev and Andrea Tenti
2019/902 ( PDF )
Fractional LWE: a nonlinear variant of LWE
Gérald Gavin and Stéphane Bonnevay
2019/901 ( PDF )
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs
Thomas Haines and Clementine Gritti
2019/900 ( -- withdrawn -- )
Multi-client Secure Encrypted Search Using Searching Adversarial Networks
Kai Chen; Zhongrui Lin; Jian Wan; Lei Xu; Chungen Xu.
2019/899 ( PDF )
A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P
Michael Yonli
2019/898 ( PDF )
One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips
Mehdi Tibouchi and Alexandre Wallet
2019/897 ( PDF )
On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem
Vasyl Ustimenko
2019/896 ( PDF )
On the optionality and fairness of Atomic Swaps
Runchao Han and Haoyu Lin and Jiangshan Yu
2019/895 ( PDF )
The Singularity Attack to the Multivariate Signature Scheme Himq-3
Jintai Ding and Zheng Zhang and Joshua Deaton and Vishakha
2019/894 ( PDF )
BioID: a Privacy-Friendly Identity Document
Fatih Balli and F. Betül Durak and Serge Vaudenay
2019/893 ( PDF )
New Efficient, Constant-Time Implementations of Falcon
Thomas Pornin
2019/892 ( PDF )
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
Patrick Kresmer and Alexander Zeh
2019/891 ( PDF )
Shielded Computations in Smart Contracts Overcoming Forks
Vincenzo Botta and Daniele Friolo and Daniele Venturi and Ivan Visconti
2019/890 ( PDF )
An Adaptive Attack on 2-SIDH
Samuel Dobson and Steven D. Galbraith and Jason LeGrow and Yan Bo Ti and Lukas Zobernig
2019/889 ( PDF )
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Anders Dalskov and Marcel Keller and Claudio Orlandi and Kris Shrishak and Haya Shulman
2019/888 ( PDF )
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed
Mustafa Khairallah
2019/887 ( PDF )
Accelerating V2X Cryptography through Batch Operations
Paul Bottinelli and Robert Lambert
2019/886 ( PDF )
Round Complexity of Byzantine Agreement, Revisited
T-H. Hubert Chan and Rafael Pass and Elaine Shi
2019/885 ( PDF )
On the alpha value of polynomials in the tower number field sieve algorithm
Aurore Guillevic and Shashank Singh
2019/884 ( PDF )
Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures
Mahesh Sreekumar Rajasree
2019/883 ( PDF )
HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication
Donghang Lu and Thomas Yurek and Samarth Kulshreshtha and Rahul Govind and Rahul Mahadev and Aniket Kate and Andrew Miller
2019/882 ( PDF )
Modifying The Tropical Version of Stickel’s Key Exchange Protocol
Any Muanalifah and Serge˘ı Sergeev
2019/881 ( PDF )
On the Boomerang Uniformity of some Permutation Polynomials
Marco Calderini and Irene Villa
2019/880 ( PDF )
A Blockchain-Based Access Control Scheme for Smart Grids
Yuyang Zhou and Yuanfeng Guan and Zhiwei Zhang and Fagen Li
2019/879 ( PDF )
Cube-Based Cryptanalysis of Subterranean-SAE
Fukang Liu and Takanori Isobe and Willi Meier
2019/878 ( PDF )
Algebraically Structured LWE, Revisited
Chris Peikert and Zachary Pepin
2019/877 ( PDF )
Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model
Georg Fuchsbauer and Antoine Plouviez and Yannick Seurin
2019/876 ( PDF )
Kadcast: A Structured Approach to Broadcast in Blockchain Networks
Elias Rohrer and Florian Tschorsch
2019/875 ( PDF )
Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication
Daan Leermakers and Boris Skoric
2019/874 ( PDF )
ABDKS Attribute-Based Encryption with Dynamic Keyword Search in Fog Computing
Fei Meng and Mingqiang Wang
2019/873 ( PDF )
Count of rotational symmetric bent Boolean functions
Shashi Kant Pandey and P.R. Mishra
2019/872 ( PDF )
Efficient Information-Theoretic Secure Multiparty Computation over $\mathbb{Z}/p^k \mathbb{Z}$ via Galois Rings
Mark Abspoel and Ronald Cramer and Ivan Damgĺrd and Daniel Escudero and Chen Yuan
2019/871 ( PDF )
Non-Locality and Zero-Knowledge MIPs
Claude Crépeau and Nan Yang
2019/870 ( PDF )
The Eleventh Power Residue Symbol
Marc Joye and Oleksandra Lapiha and Ky Nguyen and David Naccache
2019/869 ( PDF )
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
Aritra Dhar and Enis Ulqinaku and Kari Kostiainen and Srdjan Capkun
2019/868 ( PDF )
On the Round Complexity of Randomized Byzantine Agreement
Ran Cohen and Iftach Haitner and Nikolaos Makriyannis and Matan Orland and Alex Samorodnitsky
2019/867 ( PDF )
A Practical Forgery Attack on Lilliput-AE
Orr Dunkelman and Nathan Keller and Eran Lambooij and Yu Sasaki
2019/866 ( PDF )
A Fast Characterization Method for Semi-invasive Fault Injection Attacks
Lichao Wu and Gerard Ribera and Noemie Beringuier-Boher and Stjepan Picek
2019/865 ( PDF )
Cryptanalysis of Reduced-Round SipHash
Le He and Hongbo Yu
2019/864 ( -- withdrawn -- )
Another Look at Byzantine Fault Tolerance
Yongge Wang
2019/863 ( PDF )
Fast Actively Secure Five-Party Computation with Security Beyond Abort
Megha Byali and Carmit Hazay and Arpita Patra and Swati Singla
2019/862 ( PDF )
Key recovery attacks on the Legendre PRFs within the birthday bound
Dmitry Khovratovich
2019/861 ( PDF )
A Tale of Three Signatures: practical attack of ECDSA with wNAF
Gabrielle De Micheli and Rémi Piau and Cécile Pierrot
2019/860 ( PDF )
Machine learning and side channel analysis in a CTF competition
Yongbo Hu and Yeyang Zheng and Pengwei Feng and Lirui Liu and Chen Zhang and Aron Gohr and Sven Jacob and Werner Schindler and Ileana Buhan and Karim Tobich
2019/859 ( PDF )
A Coin-Free Oracle-Based Augmented Black Box Framework
Kyosuke Yamashita and Mehdi Tibouchi and Masayuki Abe
2019/858 ( PDF )
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH
Eric Crockett and Christian Paquin and Douglas Stebila
2019/857 ( PDF )
Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies
Karl Wüst and Loris Diana and Kari Kostiainen and Ghassan Karame and Sinisa Matetic and Srdjan Capkun
2019/856 ( PDF )
More results on Shortest Linear Programs
Subhadeep Banik and Yuki Funabiki and Takanori Isobe
2019/855 ( PDF )
WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery
Dominic Dams and Jeff Lataille and Rino Sanchez and John Wade
2019/854 ( PDF )
Reducing the Cost of Implementing AES as a Quantum Circuit
Brandon Langenberg and Hai Pham and Rainer Steinwandt
2019/853 ( PDF )
A critique of game-based definitions of receipt-freeness for voting
Ashley Fraser and Elizabeth A. Quaglia and Ben Smyth
2019/852 ( PDF )
Weak-Key Distinguishers for AES
Lorenzo Grassi and Gregor Leander and Christian Rechberger and Cihangir Tezcan and Friedrich Wiemer
2019/851 ( PDF )
On Designing Lightweight RFID Security Protocols for Medical IoT
Masoumeh Safkhani and Ygal Bendavid and Samad Rostampour and Nasour Bagheri
2019/850 ( PDF )
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles
Morteza Adeli and Nasour Bagheri
2019/849 ( PDF )
Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems
Ambili K N and Jimmy Jose
2019/848 ( PDF )
Observations on the DLCT and Absolute Indicators
Anne Canteaut and Lukas Kölsch and Friedrich Wiemer
2019/847 ( PDF )
Improved Heuristics for Short Linear Programs
Quan Quan Tan and Thomas Peyrin
2019/846 ( PDF )
Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions
Yuechen Chen and Linru Zhang and Siu-Ming Yiu
2019/845 ( PDF )
A Reaction Attack against Cryptosystems based on LRPC Codes
Simona Samardjiska and Paolo Santini and Edoardo Persichetti and Gustavo Banegas
2019/844 ( PDF )
pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4
Matthias J. Kannwischer and Joost Rijneveld and Peter Schwabe and Ko Stoffelen
2019/843 ( PDF )
How to Construct CSIDH on Edwards Curves
Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi
2019/842 ( PDF )
Improved SIMD Implementation of Poly1305
Sreyosi Bhattacharyya and Palash Sarkar
2019/841 ( PDF )
Practical Cryptanalysis of k-ary C*
Daniel Smith-Tone
2019/840 ( PDF )
A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function to TPMS
Yuhei Watanabe and Hideki Yamamoto and Hirotaka Yoshida
2019/839 ( PDF )
Statistical Zap Arguments from Quasi-Polynomial LWE
Abhishek Jain and Zhengzhong Jin
2019/838 ( PDF )
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake
Christian Badertscher and Peter Gaži and Aggelos Kiayias and Alexander Russell and Vassilis Zikas
2019/837 ( PDF )
Stronger and Faster Side-Channel Protections for CSIDH
Daniel Cervantes-Vázquez and Mathilde Chenu and Jesús-Javier Chi-Domínguez and Luca De Feo and Francisco Rodríguez-Henríquez and Benjamin Smith
2019/836 ( PDF )
Optimal Transport Layer for Secure Computation
Markus Brandt and Claudio Orlandi and Kris Shrishak and Haya Shulman
2019/835 ( PDF )
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
Karl Wüst and Sinisa Matetic and Silvan Egli and Kari Kostiainen and Srdjan Capkun
2019/834 ( PDF )
Succinct Arguments in the Quantum Random Oracle Model
Alessandro Chiesa and Peter Manohar and Nicholas Spooner
2019/833 ( PDF )
AES MixColumn with 92 XOR gates
Alexander Maximov
2019/832 ( PDF )
Asymptotically-Good Arithmetic Secret Sharing over Z/(p^\ell Z) with Strong Multiplication and Its Applications to Efficient MPC
Ronald Cramer and Matthieu Rambaud and Chaoping Xing
2019/831 ( PDF )
Privacy of Stateful RFID Systems with Constant Tag Identifiers
Cristian Hristea and Ferucio Laurentiu Tiplea
2019/830 ( PDF )
The Simplest Multi-key Linearly Homomorphic Signature Scheme
Diego F. Aranha and Elena Pagnin
2019/829 ( PDF )
Batch Binary Weierstrass
Billy Bob Brumley and Sohaib ul Hassan and Alex Shaindlin and Nicola Tuveri and Kide Vuojärvi
2019/828 ( PDF )
Optimal Collision Side-Channel Attacks
Cezary Glowacz and Vincent Grosso
2019/827 ( PDF )
k-root-n: An efficient algorithm for avoiding short term double-spending alongside distributed ledger technologies such as blockchain
Zvi Schreiber
2019/826 ( PDF )
Modular Multiplication Algorithm Suitable For Low-Latency Circuit Implementations
Erdinç Öztürk
2019/825 ( PDF )
Plaintext Recovery Attacks against XTS Beyond Collisions
Takanori Isobe and Kazuhiko Minematsu
2019/824 ( PDF )
Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look
Behnaz Rezvani and Flora Coleman and Sachin Sachin and William Diehl
2019/823 ( PDF )
Securely Sampling Biased Coins with Applications to Differential Privacy
Jeffrey Champion and abhi shelat and Jonathan Ullman
2019/822 ( PDF )
Surveying definitions of coercion resistance
Thomas Haines and Ben Smyth
2019/821 ( PDF )
Towards Forward Secure Internet Traffic
Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
2019/820 ( PDF )
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query
Asma Aloufi and Peizhao Hu and Hang Liu and Sherman S. M. Chow
2019/819 ( PDF )
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption
Asma Aloufi and Peizhao Hu and Harry W. H. Wong and Sherman S. M. Chow
2019/818 ( PDF )
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
Debayan Das and Anupam Golder and Josef Danial and Santosh Ghosh and Arijit Raychowdhury and Shreyas Sen
2019/817 ( PDF )
Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions
Tapas Pal and Ratna Dutta
2019/816 ( PDF )
Crisis: Probabilistically Self Organizing Total Order in Unstructured P2P Networks
Mirco Richter
2019/815 ( -- withdrawn -- )
A Note on the Static-Static Key Agreement Protocol from Supersingular Isogenies
Selçuk Kayacan
2019/814 ( PDF )
Faster Subgroup Checks for BLS12-381
Sean Bowe
2019/813 ( PDF )
Multi-Client Symmetric Searchable Encryption with Forward Privacy
Alexandros Bakas and Antonis Michalas
2019/812 ( PDF )
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
Chaoyun Li and Bart Preneel
2019/811 ( PDF )
SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage
Ioannis Demertzis and Dimitrios Papadopoulos and Charalampos Papamanthou and Saurabh Shintre
2019/810 ( PDF )
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs
Jeroen Delvaux
2019/809 ( PDF )
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
Yosuke Todo and Willi Meier and Kazumaro Aoki
2019/808 ( PDF )
2-Message Publicly Verifiable WI from (Subexponential) LWE
Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs
2019/807 ( PDF )
Provably Secure PKI Schemes
Hemi Leibowitz and Amir Herzberg and Ewa Syta
2019/806 ( PDF )
Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes
Eugene Pilyankevich and Dmytro Kornieiev and Artem Storozhuk
2019/805 ( PDF )
RRTxFM: Probabilistic Counting for Differentially Private Statistics
Saskia Nuńez von Voigt and Florian Tschorsch
2019/804 ( PDF )
Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions
Claire Delaplace and Andre Esser and Alexander May
2019/803 ( PDF )
Methodology for Efficient CNN Architectures in Profiling Attacks -- Extended Version
Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli
2019/802 ( PDF )
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes
Alexander Maximov and Patrik Ekdahl
2019/801 ( PDF )
A Chosen Random Value Attack on WPA3 SAE authentication protocol
Sheng Sun
2019/800 ( PDF )
Can we Beat the Square Root Bound for ECDLP over $\mathbb{F}_{p^2}$ via Representations?
Claire Delaplace and Alexander May
2019/799 ( PDF )
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance
Nils Wisiol and Georg T. Becker and Marian Margraf and Tudor A. A. Soroceanu and Johannes Tobisch and Benjamin Zengin
2019/798 ( PDF )
A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods
Kwangsu Lee
2019/797 ( PDF )
Don't forget your roots: constant-time root finding over $\mathbb{F}_{2^m}$
Douglas Martins and Gustavo Banegas and Ricardo Custodio
2019/796 ( PDF )
The End of Logic Locking? A Critical View on the Security of Logic Locking
Susanne Engels and Max Hoffmann and Christof Paar
2019/795 ( PDF )
More Practical Single-Trace Attacks on the Number Theoretic Transform
Peter Pessl and Robert Primas
2019/794 ( PDF )
Efficient Cryptography on the RISC-V Architecture
Ko Stoffelen
2019/793 ( PDF )
On equivalence between known families of quadratic APN functions
Lylia Budaghyan and Marco Calderini and Irene Villa
2019/792 ( PDF )
TICK: Tiny Client for Blockchains
Wei Zhang and Jiangshan Yu and Qingqiang He and Nan Zhang and Nan Guan
2019/791 ( PDF )
Sublattice Attacks on LWE over Arbitrary Number Field Lattices
Hao Chen
2019/790 ( PDF )
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication
Wei Jiang and Adam Bowers and Dan Lin
2019/789 ( PDF )
Relation between o-equivalence and EA-equivalence for Niho bent functions
Diana Davidova and Lilya Budaghyan and Claude Carlet and Tor Helleseth and Ferdinand Ihringer and Tim Penttila
2019/788 ( PDF )
The Impact of Time on DNS Security
Aanchal Malhotra and Willem Toorop and Benno Overeinder and Ralph Dolmans and Sharon Goldberg
2019/787 ( PDF )
Optimized implementation of the NIST PQC submission ROLLO on microcontroller
Jérôme Lablanche and Lina Mortajine and Othman Benchaalal and Pierre-Louis Cayrel and Nadia El Mrabet
2019/786 ( PDF )
P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation
Rebecca Schwerdt and Matthias Nagel and Valerie Fetzer and Tobias Gräf and Andy Rupp
2019/785 ( PDF )
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography
Yalin Chen and Jue-Sam Chou and Liang-Chun Wang and Yu-Yuan Chou
2019/784 ( PDF )
Towards a Hybrid Public Key Infrastructure (PKI): A Review
Priyadarshi Singh and Abdul Basit and N Chaitanya Kumar and V. Ch. Venkaiah
2019/783 ( PDF )
Dissecting the CHES 2018 AES Challenge
Tobias Damm and Sven Freud and Dominik Klein
2019/782 ( PDF )
Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms
Antoine Joux and Cecile Pierrot
2019/781 ( PDF )
BBQ: Using AES in Picnic Signatures
Cyprien Delpech de Saint Guilhem and Lauren De Meyer and Emmanuela Orsini and Nigel P. Smart
2019/780 ( PDF )
Statistical ZAP Arguments
Saikrishna Badrinarayan and Rex Fernando and Aayush Jain and Dakshita Khurana and Amit Sahai
2019/779 ( PDF )
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures
Dennis Jackson and Cas Cremers and Katriel Cohn-Gordon and Ralf Sasse
2019/778 ( PDF )
A Composable Security Treatment of the Lightning Network
Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos
2019/777 ( PDF )
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
Jörg Schwenk and Douglas Stebila
2019/776 ( PDF )
Scalable Private Set Union from Symmetric-Key Techniques
Vladimir Kolesnikov and Mike Rosulek and Ni Trieu and Xiao Wang
2019/775 ( PDF )
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies
Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gazi and Sarah Meiklejohn and Edgar Weippl
2019/774 ( PDF )
Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness
Hamidreza Amini Khorasgani and Hemanta Maji and Tamalika Mukherjee
2019/773 ( PDF )
Efficient Secure Ridge Regression from Randomized Gaussian Elimination
Frank Blom and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede
2019/772 ( PDF )
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
Lorenzo Grassi and Markus Schofnegger
2019/771 ( PDF )
DDH-based Multisignatures with Public Key Aggregation
Duc-Phong Le and Guomin Yang and Ali Ghorbani
2019/770 ( PDF )
Practical Attacks on Reduced-Round AES
Navid Ghaedi Bardeh and Sondre Rřnjom
2019/769 ( PDF )
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates
Prasanna Ravi and Mahabir Prasad Jhanwar and James Howe and Anupam Chattopadhyay and Shivam Bhasin
2019/768 ( PDF )
Distributing any Elliptic Curve Based Protocol
Nigel P. Smart and Younes Talibi Alaoui
2019/767 ( PDF )
On cryptographic parameters of permutation polynomials of the form $x^rh(x^{(q-1)/d})$
Jaeseong Jeong and Chang Heon Kim and Namhun Koo and Soonhak Kwon and Sumin Lee
2019/766 ( PDF )
Complexity of Estimating Renyi Entropy of Markov Chains
Maciej Obremski and Maciej Skorski
2019/765 ( PDF )
SPQCop: Side-channel protected Post-Quantum Cryptoprocessor
Arpan Jati and Naina Gupta and Anupam Chattopadhyay and Somitra Kumar Sanadhya
2019/764 ( PDF )
The Adversarial Robustness of Sampling
Omri Ben-Eliezer and Eylon Yogev
2019/763 ( PDF )
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Shichang Wang and Meicheng Liu and Dongdai Lin and Li Ma
2019/762 ( PDF )
Verifiable Computing for Approximate Computation
Shuo Chen and Jung Hee Cheon and Dongwoo Kim and Daejun Park
2019/761 ( PDF )
Athena: A verifiable, coercion-resistant voting system with linear complexity
Ben Smyth
2019/760 ( PDF )
Differential Fault Analysis of NORX
Amit Jana and Dhiman Saha and Goutam Paul
2019/759 ( PDF )
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Onur Günlü and Onurcan Iscan and Vladimir Sidorenko and Gerhard Kramer
2019/758 ( PDF )
Genus 2 Supersingular Isogeny Oblivious Transfer
Ramsčs Fernŕndez-Valčncia
2019/757 ( PDF )
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider
Jonathan Protzenko and Bryan Parno and Aymeric Fromherz and Chris Hawblitzel and Marina Polubelova and Karthikeyan Bhargavan and Benjamin Beurdouche and Joonwon Choi and Antoine Delignat-Lavaud and Cedric Fournet and Natalia Kulatova and Tahina Ramananandro and Aseem Rastogi and Nikhil Swamy and Christoph Wintersteiger and Santiago Zanella-Beguelin
2019/756 ( PDF )
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures
Pantea Kiaei and Darius Mercadier and Pierre-Evariste Dagand and Karine Heydemann and Patrick Schaumont
2019/755 ( PDF )
Generic Attacks on Hash Combiners
Zhenzhen Bao and Itai Dinur and Jian Guo and Gaëtan Leurent and Lei Wang
2019/754 ( PDF )
Is it Easier to Prove Theorems that are Guaranteed to be True?
Rafael Pass and Muthuramakrishnan Venkitasubramaniam
2019/753 ( PDF )
Design of Anonymous Endorsement System in Hyperledger Fabric
Subhra Mazumdar and Sushmita Ruj
2019/752 ( PDF )
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains
Runchao Han and Zhimei Sui and Jiangshan Yu and Joseph Liu and Shiping Chen
2019/751 ( PDF )
Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic
Thorsten Kleinjung and Benjamin Wesolowski
2019/750 ( PDF )
A Short Note on a Weight Probability Distribution Related to SPNs
Sondre Rřnjom
2019/749 ( PDF )
The privacy of the TLS 1.3 protocol
Ghada Arfaoui and Xavier Bultel and Pierre-Alain Fouque and Adina Nedelcu and Cristina Onete
2019/748 ( PDF )
Temporary Censorship Attacks in the Presence of Rational Miners
Fredrik Winzer and Benjamin Herd and Sebastian Faust
2019/747 ( PDF )
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
Rupeng Yang and Man Ho Au and Zhenfei Zhang and Qiuliang Xu and Zuoxia Yu and William Whyte
2019/746 ( PDF )
Public-Key Function-Private Hidden Vector Encryption (and More)
James Bartusek and Brent Carmer and Abhishek Jain and Zhengzhong Jin and Tancrčde Lepoint and Fermi Ma and Tal Malkin and Alex J. Malozemoff and Mariana Raykova
2019/745 ( PDF )
Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation
Vincenzo Iovino
2019/744 ( PDF )
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection
Devin Reich and Ariel Todoki and Rafael Dowsley and Martine De Cock and Anderson C. A. Nascimento
2019/743 ( PDF )
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature
Yangguang Tian and Yingjiu Li and Robert. H Deng and Binanda Sengupta and Guomin Yang
2019/742 ( PDF )
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling
William Diehl and Abubakr Abdulgadir and Jens-Peter Kaps
2019/741 ( PDF )
Comprehensive security analysis of CRAFT
Hosein Hadipour and Sadegh Sadeghi and Majid M. Niknam and Nasour Bagheri
2019/740 ( PDF )
A Secure Publish/Subscribe Protocol for Internet of Things
Lukas Malina and Gautam Srivastava and Petr Dzurenda and Jan Hajny and Radek Fujdiak
2019/739 ( PDF )
A Survey on Authenticated Encryption -- ASIC Designer's Perspective
Elif Bilge Kavun and Hristina Mihajloska and Tolga Yalcin
2019/738 ( -- withdrawn -- )
Scrutinizing the Tower Field Implementation of the $\mathbb{F}_{2^8}$ Inverter -- with Applications to AES, Camellia, and SM4
Zihao Wei and Siwei Sun and Lei Hu and Man Wei and Joan Boyar and Rene Peralta
2019/737 ( PDF )
Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters
Katriel Cohn-Gordon and Cas Cremers and Kristian Gjřsteen and Hĺkon Jacobsen and Tibor Jager
2019/736 ( PDF )
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE
Hao Chen and Ilaria Chillotti and Ling Ren
2019/735 ( PDF )
SoK of Used Cryptography in Blockchain
Mayank Raikwar and Danilo Gligoroski and Katina Kralevska
2019/734 ( PDF )
From Usability to Secure Computing and Back Again
Lucy Qin and Andrei Lapets and Frederick Jansen and Peter Flockhart and Kinan Dak Albab and Ira Globus-Harris and Shannon Roberts and Mayank Varia
2019/733 ( PDF )
Compressible FHE with Applications to PIR
Craig Gentry and Shai Halevi
2019/732 ( PDF )
Fully Homomorphic NIZK and NIWI Proofs
Prabhanjan Ananth and Apoorvaa Deshpande and Yael Tauman Kalai and Anna Lysyanskaya
2019/731 ( PDF )
On the Complexity of ``Superdetermined'' Minrank Instances
Javier Verbel and John Baena and Daniel Cabarcas and Ray Perlner and Daniel Smith-Tone
2019/730 ( PDF )
PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH
Vladimir Soukharev and Basil Hess
2019/729 ( PDF )
Linear Complexity of A Family of Binary pq2 -periodic Sequences From Euler Quotients
Jingwei Zhang and Shuhong Gao and Chang-An Zhao
2019/728 ( PDF )
Verifying Solutions to LWE with Implications for Concrete Security
Palash Sarkar and Subhadip Singha
2019/727 ( PDF )
Iterative Differential Characteristic of TRIFLE-BC
Fukang Liu and Takanori Isobe
2019/726 ( PDF )
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange
Pedro Branco and Jintai Ding and Manuel Goulăo and Paulo Mateus
2019/725 ( PDF )
He Gives C-Sieves on the CSIDH
Chris Peikert
2019/724 ( PDF )
Breaking Tweakable Enciphering Schemes using Simon's Algorithm
Sebati Ghosh and Palash Sarkar
2019/723 ( PDF )
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality
Mihaela Ion and Ben Kreuter and Ahmet Erhan Nergiz and Sarvar Patel and Mariana Raykova and Shobhit Saxena and Karn Seth and David Shanahan and Moti Yung
2019/722 ( PDF )
Neural Network Model Assessment for Side-Channel Analysis
Guilherme Perin and Baris Ege and Lukasz Chmielewski
2019/721 ( PDF )
Optimized SIKE Round 2 on 64-bit ARM
Hwajeong Seo and Amir Jalali and Reza Azarderakhsh
2019/720 ( PDF )
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles
Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta
2019/719 ( -- withdrawn -- )
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes
Mir Tanjidur Rahman and Shahin Tajik and M. Sazadur Rahman and Mark Tehranipoor and Navid Asadizanjani
2019/718 ( PDF )
Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority
Marina Blanton and Ahreum Kang and Chen Yuan
2019/717 ( PDF )
Homomorphism learning problems and its applications to public-key cryptography
Christopher Leonardi and Luis Ruiz-Lopez
2019/716 ( PDF )
On the Quantum Complexity of the Continuous Hidden Subgroup Problem
Koen de Boer and Léo Ducas and Serge Fehr
2019/715 ( PDF )
On the Security of Lattice-based Fiat-Shamir Signatures in the Presence of Randomness Leakage
Yuejun Liu and Yongbin Zhou and Shuo Sun and Tianyu Wang and Rui Zhang and Jingdian Ming
2019/714 ( PDF )
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT
Boxin Zhao and Xiaoyang Dong and Willi Meier and Keting Jia and Gaoli Wang
2019/713 ( PDF )
Public Ledger for Sensitive Data
Riccardo Longo and Massimiliano Sala
2019/712 ( PDF )
SimpleENC and SimpleENCsmall -- an Authenticated Encryption Mode for the Lightweight Setting
Shay Gueron and Yehuda Lindell
2019/711 ( PDF )
SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation
Brian Koziel and A-Bon Ackie and Rami El Khatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2019/710 ( -- withdrawn -- )
A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0
Qianying Zhang and Shijun Zhao and Zhiping Shi and Yong Guan and Guohui Wang
2019/709 ( PDF )
Secure Computation for Cloud data Storage
Davood Rezaeipour
2019/708 ( PDF )
Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions
Luís T. A. N. Brandăo and Çağdaş Çalık and Meltem Sönmez Turan and René Peralta
2019/707 ( PDF )
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions
Olivier Blazy and Céline Chevalier and Quoc Huy Vu
2019/706 ( PDF )
Endemic Oblivious Transfer
Daniel Masny and Peter Rindal
2019/705 ( PDF )
Commodity-Based 2PC for Arithmetic Circuits
Ivan Damgĺrd and Helene Haagh and Michael Nielsen and Claudio Orlandi
2019/704 ( PDF )
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains
Adriano Di Luzio and Danilo Francati and Giuseppe Ateniese
2019/703 ( PDF )
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation
Carolyn Whitnall and Elisabeth Oswald
2019/702 ( PDF )
Cryptanalysis of Plantlet
Subhadeep Banik and Khashayar Barooti and Takanori Isobe
2019/701 ( PDF )
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs
Hiroaki Anada
2019/700 ( PDF )
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Yusuke Naito and Mitsuru Matsui and Takeshi Sugawara and Daisuke Suzuki
2019/699 ( PDF )
Tight quantum security of the Fiat-Shamir transform for commit-and-open identification schemes with applications to post-quantum signature schemes
André Chailloux
2019/698 ( PDF )
A Formal Treatment of Deterministic Wallets
Poulami Das and Sebastian Faust and Julian Loss
2019/697 ( PDF )
Breaking ACORN with a Single Fault
Elena Dubrova
2019/696 ( PDF )
Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments
Masayuki Abe and Miguel Ambrona and Miyako Ohkubo
2019/695 ( PDF )
An Efficient Secure Three-Party Sorting Protocol with an Honest Majority
Koji Chida and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Naoto Kiribuchi and Benny Pinkas
2019/694 ( PDF )
A Unified and Composable Take on Ratcheting
Daniel Jost and Ueli Maurer and Marta Mularczyk
2019/693 ( PDF )
Security-Efficiency Tradeoffs in Searchable Encryption -- Lower Bounds and Optimal Constructions
Raphael Bost and Pierre-Alain Fouque
2019/692 ( PDF )
Synchronous Consensus with Optimal Asynchronous Fallback Guarantees
Erica Blum and Jonathan Katz and Julian Loss
2019/691 ( PDF )
Comparing proofs of security for lattice-based encryption
Daniel J. Bernstein
2019/690 ( PDF )
Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks
Changhai Ou and Siew-Kei Lam and Guiyuan Jiang
2019/689 ( PDF )
On-Device Power Analysis Across Hardware Security Domains
Colin O'Flynn and Alex Dewar
2019/688 ( PDF )
Better Bootstrapping for Approximate Homomorphic Encryption
Kyoohyung Han and Dohyeong Ki
2019/687 ( PDF )
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography
Zhengfeng Ji and Youming Qiao and Fang Song and Aaram Yun
2019/686 ( PDF )
On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations
Nir Bitansky and Akshay Degwekar
2019/685 ( PDF )
Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5
Markku-Juhani O. Saarinen
2019/684 ( PDF )
Revelio: A MimbleWimble Proof of Reserves Protocol
Arijit Dutta and Saravanan Vijayakumaran
2019/683 ( PDF )
The Notion of Transparency Order, Revisited
Huizhong Li and Yongbin Zhou and Jingdian Ming and Guang Yang and Chengbin Jin
2019/682 ( PDF )
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Alexandros Bakas and Antonis Michalas
2019/681 ( PDF )
Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?
Ayesha Khalid and Sarah McCarthy and Weiqiang Liu and Maire O’Neill
2019/680 ( PDF )
Non-Commutative Ring Learning With Errors From Cyclic Algebras
Charles Grover and Cong Ling and Roope Vehkalahti
2019/679 ( PDF )
Forgery Attacks on FlexAE and FlexAEAD
Maria Eichlseder and Daniel Kales and Markus Schofnegger
2019/678 ( PDF )
A Modified pqsigRM: RM Code-Based Signature Scheme
Yongwoo Lee and Wijik Lee and Young-Sik Kim and Jong-Seon No
2019/677 ( PDF )
A Note on Lower Digits Extraction Polynomial for Bootstrapping
Mingjia Huo and Kewen Wu and Qi Ye
2019/676 ( PDF )
Robust and Scalable Consensus for Sharded Distributed Ledgers
Eleftherios Kokoris-Kogias
2019/675 ( PDF )
Balance: Dynamic Adjustment of Cryptocurrency Deposits
Dominik Harz and Lewis Gudgeon and Arthur Gervais and William J. Knottenbelt
2019/674 ( PDF )
Polar Sampler: Discrete Gaussian Sampling over the Integers Using Polar Codes
Jiabo Wang and Cong Ling
2019/673 ( PDF )
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
Ahto Buldas and Denis Firsov and Risto Laanoja and Henri Lakk and Ahto Truu
2019/672 ( PDF )
A Blockchain-Assisted Hash-Based Signature Scheme
Ahto Buldas and Risto Laanoja and Ahto Truu
2019/671 ( PDF )
A Server-Assisted Hash-Based Signature Scheme
Ahto Buldas and Risto Laanoja and Ahto Truu
2019/670 ( PDF )
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks
Vahid Amin Ghafari and Honggang Hu and Fujiang Lin
2019/669 ( PDF )
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
Yunwen Liu and Yu Sasaki
2019/668 ( PDF )
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao
2019/667 ( PDF )
PPAD-Hardness via Iterated Squaring Modulo a Composite
Arka Rai Choudhuri and Pavel Hubacek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum
2019/666 ( PDF )
On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling
Zheng Wang and Cong Ling
2019/665 ( PDF )
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption
Jintai Ding and Pedro Branco and Kevin Schmitt
2019/664 ( PDF )
How Diversity Affects Deep-Learning Side-Channel Attacks
Huanyu Wang and Martin Brisfors and Sebastian Forsmark and Elena Dubrova
2019/663 ( PDF )
Can Verifiable Delay Functions be Based on Random Oracles?
Mohammad Mahmoody and Caleb Smith and David J. Wu
2019/662 ( PDF )
Agree-and-Prove: Generalized Proofs Of Knowledge and Applications
Christian Badertscher and Daniel Jost and Ueli Maurer
2019/661 ( PDF )
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis
Shivam Bhasin and Anupam Chattopadhyay and Annelie Heuser and Dirmanto Jap and Stjepan Picek and Ritu Ranjan Shrivastwa
2019/660 ( PDF )
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling
Zheng Wang and Cong Ling
2019/659 ( PDF )
Tight Verifiable Delay Functions
Nico Döttling and Sanjam Garg and Giulio Malavolta and Prashant Nalini Vasudevan
2019/658 ( PDF )
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest
Jun Furukawa and Yehuda Lindell
2019/657 ( PDF )
Multi-Party PSM, Revisited
Leonard Assouline and Tianren Liu
2019/656 ( -- withdrawn -- )
SeqL: Secure Scan-Locking for IP Protection
Seetal Potluri and Aydin Aysu and Akash Kumar
2019/655 ( PDF )
Visualizing size-security tradeoffs for lattice-based encryption
Daniel J. Bernstein
2019/654 ( PDF )
Concise Linkable Ring Signatures and Forgery Against Adversarial Keys
Brandon Goodell and Sarang Noether and RandomRun
2019/653 ( PDF )
On the Local Leakage Resilience of Linear Secret Sharing Schemes
Fabrice Benhamouda and Akshay Degwekar and Yuval Ishai and Tal Rabin
2019/652 ( PDF )
The Exchange Attack: How to Distinguish Six Rounds of AES with $2^{88.2}$ chosen plaintexts
Navid Ghaedi Bardeh and Sondre Rřnjom
2019/651 ( PDF )
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing
Muhammad Ishaq and Ana Milanova and Vassilis Zikas
2019/650 ( PDF )
Incremental Proofs of Sequential Work
Nico Döttling and Russell W. F. Lai and Giulio Malavolta
2019/649 ( PDF )
Txilm: Lossy Block Compression with Salted Short Hashing
Donghui Ding and Xin Jiang and Jiaping Wang and Hao Wang and Xiaobing Zhang and Yi Sun
2019/648 ( PDF )
Efficient Invisible and Unlinkable Sanitizable Signatures
Xavier Bultel and Pascal Lafourcade and Russell W. F. Lai and Giulio Malavolta and Dominique Schröder and Sri Aravinda Krishnan Thyagarajan
2019/647 ( PDF )
Strong Asymmetric PAKE based on Trapdoor CKEM
Tatiana Bradley and Stanislaw Jarecki and Jiayu Xu
2019/646 ( PDF )
Communication-Efficient Unconditional MPC with Guaranteed Output Delivery
Vipul Goyal and Yanyi Liu and Yifan Song
2019/645 ( PDF )
Attribute Based Encryption for Deterministic Finite Automata from DLIN
Shweta Agrawal and Monosij Maitra and Shota Yamada
2019/644 ( PDF )
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-
Aydin Abadi and Michele Ciampi and Aggelos Kiayias and Vassilis Zikas
2019/643 ( PDF )
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification
Prabhanjan Ananth and Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai
2019/642 ( PDF )
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs
Jonathan Bootle and Vadim Lyubashevsky and Gregor Seiler
2019/641 ( PDF )
Simulation Extractability in Groth's zk-SNARK
Shahla Atapoor and Karim Baghery
2019/640 ( PDF )
On Round Optimal Statistical Zero Knowledge Arguments
Nir Bitansky and Omer Paneth
2019/639 ( PDF )
Trapdoor Hash Functions and Their Applications
Nico Döttling and Sanjam Garg and Yuval Ishai and Giulio Malavolta and Tamer Mour and Rafail Ostrovsky
2019/638 ( PDF )
On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography
Ferucio Laurentiu Tiplea and Sorin Iftene and George Teseleanu and Anca-Maria Nica
2019/637 ( PDF )
Cryptographic Sensing
Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
2019/636 ( PDF )
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions
Rishab Goyal and Willy Quach and Brent Waters and Daniel Wichs
2019/635 ( PDF )
Homomorphic Time-Lock Puzzles and Applications
Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan
2019/634 ( PDF )
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension
Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai
2019/633 ( PDF )
New non-linearity parameters of Boolean functions
Igor Semaev
2019/632 ( PDF )
Fully Homomorphic Encryption for RAMs
Ariel Hamlin and Justin Holmgren and Mor Weiss and Daniel Wichs
2019/631 ( PDF )
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge
Cody Freitag and Ilan Komargodski and Rafael Pass
2019/630 ( PDF )
ABE for DFA from k-Lin
Junqing Gong and Brent Waters and Hoeteck Wee
2019/629 ( PDF )
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE
Shweta Agrawal and Monosij Maitra and Shota Yamada
2019/628 ( PDF )
Watermarking Public-Key Cryptographic Primitives
Rishab Goyal and Sam Kim and Nathan Manohar and Brent Waters and David J. Wu
2019/627 ( PDF )
Unconditionally Secure Computation Against Low-Complexity Leakage
Andrej Bogdanov and Yuval Ishai and Akshayaram Srinivasan
2019/626 ( PDF )
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge
Vipul Goyal and Aayush Jain and Amit Sahai
2019/625 ( PDF )
Public-Key Cryptography in the Fine-Grained Setting
Rio Lavigne and Andrea Lincoln and Virginia Vassilevska Williams
2019/624 ( PDF )
Nonces are Noticed: AEAD Revisited
Mihir Bellare and Ruth Ng and Björn Tackmann
2019/623 ( PDF )
Exploring Constructions of Compact NIZKs from Various Assumptions
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2019/622 ( PDF )
Extended Truncated-differential Distinguishers on Round-reduced AES
Zhenzhen Bao and Jian Guo and Eik List
2019/621 ( PDF )
A Modified Simple Substitution Cipher With Unbounded Unicity Distance
Bruce Kallick
2019/620 ( PDF )
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems
Steven D. Galbraith and Lukas Zobernig
2019/619 ( PDF )
Continuous Verifiable Delay Functions
Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass
2019/618 ( PDF )
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods
Fukang Liu and Takanori Isobe
2019/617 ( PDF )
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model
Sebastian Gajek and Marco Lewandowsky
2019/616 ( PDF )
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation
Iftach Haitner and Noam Mazor and Ronen Shaltiel and Jad Silbak
2019/615 ( PDF )
My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks
Siemen Dhooghe and Svetla Nikova
2019/614 ( PDF )
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm
Xavier Bonnetain and Akinori Hosoyamada and María Naya-Plasencia and Yu Sasaki and André Schrottenloher
2019/613 ( PDF )
MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks
Taha Atahan Akyildiz and Can Berk Guzgeren and Cemal Yilmaz and Erkay Savas
2019/612 ( PDF )
Simulation-Extractable SNARKs Revisited
Helger Lipmaa
2019/611 ( PDF )
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set
Thaddeus Dryja
2019/610 ( PDF )
Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem
Jean-Sebastien Coron and Agnese Gini
2019/609 ( PDF )
CPA-to-CCA Transformation for KDM Security
Fuyuki Kitagawa and Takahiro Matsuda
2019/608 ( PDF )
Symmetric Primitives with Structured Secrets
Navid Alamati and Hart Montgomery and Sikhar Patranabis
2019/607 ( PDF )
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Zhenzhen Bao and Lin Ding and Jian Guo and Haoyang Wang and Wenying Zhang
2019/606 ( PDF )
An Efficient and Provable Masked Implementation of qTESLA
François Gérard and Mélissa Rossi
2019/605 ( PDF )
A note on different types of ransomware attacks
Mihail Anghel and Andrei Racautanu
2019/604 ( PDF )
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Jun Xu and Santanu Sarkar and , Lei Hu and Huaxiong Wang and Yanbin Pan
2019/603 ( PDF )
How to Delegate Computations Publicly
Yael Kalai and Omer Paneth and Lisa Yang
2019/602 ( PDF )
Continuously Non-Malleable Secret Sharing for General Access Structures
Gianluca Brian and Antonio Faonio and Daniele Venturi
2019/601 ( PDF )
AuroraLight: Improved prover efficiency and SRS size in a Sonic-like system
Ariel Gabizon
2019/600 ( PDF )
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption
Zhenzhen Bao and Jian Guo and Tetsu Iwata and Kazuhiko Minematsu
2019/599 ( PDF )
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning
Ivan Damgĺrd and Daniel Escudero and Tore Frederiksen and Marcel Keller and Peter Scholl and Nikolaj Volgushev
2019/598 ( -- withdrawn -- )
Partial Secret Sharing
Amir Jafari and Reza Kaboli and Shahram Khazaei
2019/597 ( PDF )
A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio
Shahram Khazaei
2019/596 ( PDF )
Discretisation and Product Distributions in Ring-LWE
Sean Murphy and Rachel Player
2019/595 ( PDF )
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero
Pedro Moreno-Sanchez and Randomrun and Duc V. Le and Sarang Noether and Brandon Goodell and Aniket Kate
2019/594 ( PDF )
Cryptanalysis of Ring Homomorphic Encryption Schemes
Mugurel Barcau and Vicentiu Pasol
2019/593 ( PDF )
On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces
V. Ustimenko and M. Klisowski
2019/592 ( PDF )
Statistical Analysis and Anonymity of TOR's Path Selection
Andrei Mogage and Emil Simion
2019/591 ( PDF )
Simulating Homomorphic Evaluation of Deep Learning Predictions
Christina Boura and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev
2019/590 ( PDF )
Tighter proofs of CCA security in the quantum random oracle model
Nina Bindel and Mike Hamburg and Kathrin Hövelmanns and Andreas Hülsing and Edoardo Persichetti
2019/589 ( PDF )
A${^2}$L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
Erkan Tairi and Pedro Moreno-Sanchez and Matteo Maffei
2019/588 ( PDF )
Formal Notions of Security for Verifiable Homomorphic Encryption
Jakub Klemsa and Ivana Trummová
2019/587 ( PDF )
Polygraph: Accountable Byzantine Agreement
Pierre Civit and Seth Gilbert and Vincent Gramoli
2019/586 ( PDF )
Simulation-Extractable zk-SNARK with a Single Verification
Jihye Kim and Jiwon Lee and Hyunok Oh
2019/585 ( PDF )
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners
Mustafa Khairallah and Shivam Bhasin and Anupam Chattopadhyay
2019/584 ( -- withdrawn -- )
2-threshold Ideal Secret Sharing Schemes Can Be Uniquely Modeled by Latin Squares
Lintao Liu and Xuehu Yan and Yuliang Lu and Huaixi Wang
2019/583 ( PDF )
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks
Christoph Egger and Pedro Moreno-Sanchez and Matteo Maffei
2019/582 ( PDF )
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
Ran Canetti and Alley Stoughton and Mayank Varia
2019/581 ( -- withdrawn -- )
---
---
2019/580 ( PDF )
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs
Russell W. F. Lai and Viktoria Ronge and Tim Ruffing and Dominique Schröder and Sri Aravinda Krishnan Thyagarajan and Jiafan Wang
2019/579 ( PDF )
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
Dominic Letz
2019/578 ( PDF )
Deep Learning based Side Channel Attacks in Practice
Houssem Maghrebi
2019/577 ( PDF )
Improved Multiplication Triple Generation over Rings via RLWE-based AHE
Deevashwer Rathee and Thomas Schneider and K. K. Shukla
2019/576 ( PDF )
On Group-Characterizability of Homomorphic Secret Sharing Schemes
Reza Kaboli and Shahram Khazaei and Maghsoud Parviz
2019/575 ( PDF )
On Abelian and Homomorphic Secret Sharing Schemes
Amir Jafari and Shahram Khazaei
2019/574 ( PDF )
Subliminal channels in post-quantum digital signature schemes
Herman Galteland and Kristian Gjřsteen
2019/573 ( PDF )
Security of the Suffix Keyed Sponge
Christoph Dobraunig and Bart Mennink
2019/572 ( PDF )
On the Commitment Capacity of Unfair Noisy Channels
Claude Crépeau and Rafael Dowsley and Anderson C. A. Nascimento
2019/571 ( PDF )
Multi-Party Virtual State Channels
Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Julia Hesse and Kristina Hostáková
2019/570 ( PDF )
Bias-variance Decomposition in Machine Learning-based Side-channel Analysis
Daan van der Valk and Stjepan Picek
2019/569 ( PDF )
Lattice RingCT v2.0 with Multiple Input and Output Wallets
Wilson Alberto Torres and Veronika Kuchta and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Jacob Cheng
2019/568 ( PDF )
Post Quantum ECC on FPGA Platform
Debapriya Basu Roy and Debdeep Mukhopadhyay
2019/567 ( PDF )
(Linkable) Ring Signature from Hash-Then-One-Way Signature
Xingye Lu and Man Ho Au and Zhenfei Zhang
2019/566 ( PDF )
Deep Learning based Model Building Attacks on Arbiter PUF Compositions
Pranesh Santikellur and Aritra Bhattacharyay and Rajat Subhra Chakraborty
2019/565 ( PDF )
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
Nirvan Tyagi and Paul Grubbs and Julia Len and Ian Miers and Thomas Ristenpart
2019/564 ( PDF )
Verification of Authenticated Firmware Load
Sujit Kumar Muduli and Pramod Subramanyan and Sayak Ray
2019/563 ( PDF )
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA
Omer Shlomovits and István András Seres
2019/562 ( PDF )
Towards More Secure Constructions of Adjustable Join Schemes
Shahram Khazaei and Mojtaba Rafiee
2019/561 ( PDF )
Faster Bootstrapping of FHE over the integers with large prime message space
Zhizhu Lian and Yupu Hu and Hu Chen and Baocang Wang
2019/560 ( PDF )
Solutions of $x^{q^k}+\cdots+x^{q}+x=a$ in $GF(2^n)$
Kwang Ho Kim and Jong Hyok Choe and Dok Nam Lee and Dae Song Go and Sihem Mesnager
2019/559 ( PDF )
Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables
Evgeny K. Alekseev and Lyudmila A. Kushchinskaya
2019/558 ( PDF )
How to not break SIDH
Chloe Martindale and Lorenz Panny
2019/557 ( PDF )
Extended Galbraith's Test on the Anonymity of IBEs from Higher Residuosity
Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao
2019/556 ( PDF )
When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop)
Gideon Samid
2019/555 ( PDF )
Optimal TNFS-secure pairings on elliptic curves with composite embedding degree
Georgios Fotiadis and Chloe Martindale
2019/554 ( PDF )
How to Build Pseudorandom Functions From Public Random Permutations
Yu Long Chen and Eran Lambooij and Bart Mennink
2019/553 ( PDF )
Towards post-quantum symmetric cryptography
John Gregory Underhill and Stiepan Aurélien Kovac and Xenia Bogomolec
2019/552 ( PDF )
Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space
Binyi Chen and Yilei Chen and Kristina Hostáková and Pratyay Mukherjee
2019/551 ( PDF )
A note on the correlations between NIST cryptographic statistical tests suite
Emil Simion and Paul Burciu
2019/550 ( PDF )
Spartan: Efficient and general-purpose zkSNARKs without trusted setup
Srinath Setty
2019/549 ( PDF )
Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir
Arka Rai Choudhuri and Pavel Hubacek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum
2019/548 ( PDF )
About Wave Implementation and its Leakage Immunity
Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
2019/547 ( PDF )
Linearly-Homomorphic Signatures and Scalable Mix-Nets
Chloé Hébant and Duong Hieu Phan and David Pointcheval
2019/546 ( PDF )
Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies
David Cerezo Sánchez
2019/545 ( -- withdrawn -- )
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Sayandeep Saha and Dirmanto Jap and Debapriya Basu Roy and Avik Chakraborti and Shivam Bhasin and Debdeep Mukhopadhyay
2019/544 ( PDF )
Evaluation of Code-based Signature Schemes
Partha Sarathi Roy and Kirill Morozov and Kazuhide Fukushima and Shinsaku Kiyomoto
2019/543 ( PDF )
TMPS: Ticket-Mediated Password Strengthening
John Kelsey and Dana Dachman-Soled and Sweta Mishra and Meltem Sonmez Turan
2019/542 ( PDF )
Formally Verified Cryptographic Web Applications in WebAssembly
Jonathan Protzenko and Benjamin Beurdouche and Denis Merigoux and Karthikeyan Bhargavan
2019/541 ( PDF )
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement
James Shook and Scott Simon and Peter Mell
2019/540 ( PDF )
A chosen key attack against the secret S-boxes of GOST
Markku-Juhani O. Saarinen
2019/539 ( PDF )
Cryptanalysis of FlexAEAD
Mostafizar Rahman and Dhiman Saha and Goutam Paul
2019/538 ( PDF )
On Perfect Endomorphic Ciphers
Nikolay Shenets
2019/537 ( PDF )
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin and Victor Mollimard
2019/536 ( PDF )
Protecting against Statistical Ineffective Fault Attacks
Joan Daemen and Christoph Dobraunig and Maria Eichlseder and Hannes Gross and Florian Mendel and Robert Primas
2019/535 ( PDF )
SIKE Round 2 Speed Record on ARM Cortex-M4
Hwajeong soe and Amir Jalali and Reza Azarderakhsh
2019/534 ( PDF )
Theoretical and Practical Approaches for Hardness Amplification of PUFs
Fatemeh Ganji and Shahin Tajik and Pascal Stauss and Jean-Pierre Seifert and Domenic Forte and Mark Tehranipoor
2019/533 ( PDF )
Stopping time signatures for some algorithms in cryptography
Percy Deift and Stephen D. Miller and Thomas Trogdon
2019/532 ( PDF )
Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography
Carsten Baum and Ariel Nof
2019/531 ( PDF )
How to Correct Errors in Multi-Server PIR
Kaoru Kurosawa
2019/530 ( PDF )
Speed-up of SCA attacks on 32-bit multiplications
Robert Nguyen and Adrien Facon and Sylvain Guilley and Guillaume Gautier and Safwan El Assad
2019/529 ( PDF )
UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions
Pedro Branco and Manuel Goulăo and Paulo Mateus
2019/528 ( PDF )
Anomalies and Vector Space Search: Tools for S-Box Analysis (Full Version)
Xavier Bonnetain and Léo Perrin and Shizhu Tian
2019/527 ( PDF )
Revisiting Privacy-aware Blockchain Public Key Infrastructure
Olamide Omolola and Paul Plessing
2019/526 ( PDF )
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman
Cas Cremers and Dennis Jackson
2019/525 ( PDF )
Misuse Attacks on Post-Quantum Cryptosystems
Ciprian Băetu and F. Betül Durak and Loďs Huguenin-Dumittan and Abdullah Talayhan and Serge Vaudenay
2019/524 ( PDF )
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference
Hao Chen and Wei Dai and Miran Kim and Yongsoo Song
2019/523 ( PDF )
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
Jack Doerner and Yashvanth Kondi and Eysa Lee and abhi shelat
2019/522 ( PDF )
Secret-Sharing from Robust Conditional Disclosure of Secrets
Amos Beimel and Naty Peter
2019/521 ( PDF )
Fully Homomorphic Encryption with k-bit Arithmetic Operations
Benjamin M. Case and Shuhong Gao and Gengran Hu and Qiuxia Xu
2019/520 ( PDF )
A Note on Sub-Gaussian Random Variables
Benjamin M. Case and Colin Gallagher and Shuhong Gao
2019/519 ( PDF )
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications
Christopher Patton and Thomas Shrimpton
2019/518 ( PDF )
Fast Database Joins and PSI for Secret Shared Data
Payman Mohassel and Peter Rindal and Mike Rosulek
2019/517 ( PDF )
Mobile Private Contact Discovery at Scale
Daniel Kales and Christian Rechberger and Thomas Schneider and Matthias Senker and Christian Weinert
2019/516 ( PDF )
CellTree: A New Paradigm for Distributed Data Repositories
Anasuya Acharya and Manoj Prabhakaran and Akash Trehan
2019/515 ( PDF )
A Countermeasure Against Statistical Ineffective Fault Analysis
Jakub Breier and Mustafa Khairallah and Xiaolu Hou and Yang Liu
2019/514 ( PDF )
Pixel: Multi-signatures for Consensus
Manu Drijvers and Sergey Gorbunov and Gregory Neven and Hoeteck Wee
2019/513 ( PDF )
New Code-Based Privacy-Preserving Cryptographic Constructions
Khoa Nguyen and Hanh Tang and Huaxiong Wang and Neng Zeng
2019/512 ( PDF )
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System
Shuai Han and Shengli Liu and Lin Lyu and Dawu Gu
2019/511 ( PDF )
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited
Gilles Barthe and Sonia Belaďd and Thomas Espitau and Pierre-Alain Fouque and Mélissa Rossi and Mehdi Tibouchi
2019/510 ( PDF )
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes
Jiang Zhang and Yu Yu and Shuqin Fan and Zhenfeng Zhang and Kang Yang
2019/509 ( PDF )
New Slide Attacks on Almost Self-Similar Ciphers
Orr Dunkelman and Nathan Keller and Noam Lasry and Adi Shamir
2019/508 ( PDF )
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security
Tsz Hon Yuen and Shi-feng Sun and Joseph K. Liu and Man Ho Au and Muhammed F. Esgin and Qingzhao Zhang and Dawu Gu
2019/507 ( PDF )
Simple Schemes in the Bounded Storage Model
Jiaxin Guan and Mark Zhandry
2019/506 ( PDF )
Forward Integrity and Crash Recovery for Secure Logs
Erik-Oliver Blass and Guevara Noubir
2019/505 ( PDF )
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
Felix Wegener and Thorben Moos and Amir Moradi
2019/504 ( PDF )
Afgjort: A Partially Synchronous Finality Layer for Blockchains
Thomas Dinsdale-Young and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Daniel Tschudi
2019/503 ( PDF )
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
2019/502 ( PDF )
A refined analysis of the cost for solving LWE via uSVP
Shi Bai and Shaun Miller and Weiqiang Wen
2019/501 ( PDF )
Optimal Merging in Quantum k-xor and k-sum Algorithms
María Naya-Plasencia and André Schrottenloher
2019/500 ( PDF )
An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster
Jean-Claude Bajard and Julien Eynard and Paulo Martins and Leonel Sousa and Vincent Zucca
2019/499 ( PDF )
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography
Michael Naehrig and Joost Renes
2019/498 ( PDF )
CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations
Ward Beullens and Thorsten Kleinjung and Frederik Vercauteren
2019/497 ( PDF )
Forward and Backward-Secure Range-Searchable Symmetric Encryption
Jiafan Wang and Sherman S. M. Chow
2019/496 ( PDF )
Non-malleability for quantum public-key encryption
Christian Majenz and Christian Schaffner and Jeroen van Wier
2019/495 ( PDF )
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
Marc Joye
2019/494 ( PDF )
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/493 ( PDF )
Evaluating the effectiveness of heuristic worst-case noise analysis in FHE
Anamaria Costache and Kim Laine and Rachel Player
2019/492 ( PDF )
Decisional second-preimage resistance: When does SPR imply PRE?
Daniel J. Bernstein and Andreas Hülsing
2019/491 ( PDF )
Best Information is Most Successful
Eloi de Cherisey and Sylvain Guilley and Olivier Rioul and Pablo Piantanida
2019/490 ( PDF )
Sigma protocols for MQ, PKP and SIS, and fishy signature schemes
Ward Beullens
2019/489 ( PDF )
Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4
Leon Botros and Matthias J. Kannwischer and Peter Schwabe
2019/488 ( PDF )
Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication
Alan Kaminsky
2019/487 ( PDF )
From Single-Input to Multi-Client Inner-Product Functional Encryption
Michel Abdalla and Fabrice Benhamouda and Romain Gay
2019/486 ( PDF )
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment
Suhyeon Lee and Seungjoo Kim
2019/485 ( PDF )
A taxonomy of pairings, their security, their complexity
Razvan Barbulescu and Nadia El Mrabet and Loubna Ghammam
2019/484 ( PDF )
New Number-Theoretic Cryptographic Primitives
Eric Brier and Houda Ferradi and Marc Joye and David Naccache
2019/483 ( PDF )
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations
Pierrick Méaux and Claude Carlet and Anthony Journault and François-Xavier Standaert
2019/482 ( PDF )
Tiny WireGuard Tweak
Jacob Appelbaum and Chloe Martindale and Peter Wu
2019/481 ( PDF )
An Efficient and Compact Reformulation of NIST Collision Estimate Test
Prasanna Raghaw Mishra and Bhartendu Nandan and Navneet Gaba
2019/480 ( PDF )
On the Efficiency of Privacy-Preserving Smart Contract Systems
Karim Baghery
2019/479 ( PDF )
Extended 3-Party ACCE and Application to LoRaWAN 1.1
Sébastien Canard and Loďc Ferreira
2019/478 ( PDF )
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
Sarah McCarthy and James Howe and Neil Smyth and Seamus Brannigan and Máire O’Neill
2019/477 ( PDF )
Efficient Post-Compromise Security Beyond One Group
Cas Cremers and Britta Hale and Konrad Kohbrok
2019/476 ( PDF )
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T
Muhammad ElSheikh and Ahmed Abdelkhalek and Amr M. Youssef
2019/475 ( PDF )
Dual-Mode NIZKs from Obfuscation
Dennis Hofheinz and Bogdan Ursu
2019/473 ( PDF )
A Method to Reduce the Key Size of UOV Signature Scheme
Chengdong Tao
2019/472 ( PDF )
Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM)
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2019/471 ( PDF )
UC-Secure CRS Generation for SNARKs
Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michal Zajac
2019/470 ( PDF )
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals
Niek J. Bouman and Niels de Vreede
2019/469 ( PDF )
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks
Rui Qiao and Qinglong Wang* and Zongtao Duan and Na Fan
2019/468 ( PDF )
The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem
Alessandro Budroni and Andrea Tenti
2019/467 ( PDF )
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version)
Clément Massart and François-Xavier Standaert
2019/466 ( -- withdrawn -- )
Privacy-Preserving K-means Clustering with Multiple Data Owners
Jung Hee Cheon and Jinhyuck Jeong and Dohyeong Ki and Jiseung Kim and Joohee Lee and Seok Won Lee
2019/465 ( PDF )
Towards a Practical Cluster Analysis over Encrypted Data
Jung Hee Cheon and Duhyeong Kim and Jai Hyun Park
2019/464 ( PDF )
The complexity of MinRank
Alessio Caminata and Elisa Gorla
2019/463 ( PDF )
In Pursuit of Clarity In Obfuscation
Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi
2019/462 ( PDF )
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11
Alexander Dax and Robert Künnemann and Sven Tangermann and Michael Backes
2019/461 ( PDF )
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks
Xiaolu Hou and Jakub Breier and Dirmanto Jap and Lei Ma and Shivam Bhasin and Yang Liu
2019/460 ( PDF )
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Jan Camenisch and Manu Drijvers and Petr Dzurenda and Jan Hajny
2019/459 ( PDF )
From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1
Gaëtan Leurent and Thomas Peyrin
2019/458 ( PDF )
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
Lorenzo Grassi and Dmitry Khovratovich and Christian Rechberger and Arnab Roy and Markus Schofnegger
2019/457 ( PDF )
Forgery Attack on mixFeed in the Nonce-Misuse Scenario
Mustafa Khairallah
2019/456 ( PDF )
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
Peifang Ni and Hongda Li and Xianning Meng and Dongxue Pan
2019/455 ( PDF )
FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol
Joăo Otávio Massari Chervinski and Diego Kreutz and Jiangshan Yu
2019/454 ( PDF )
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks
Ryan Karl and Timothy Burchfield and Jonathan Takeshita and Taeho Jung
2019/453 ( PDF )
A New Approach to Modelling Centralised Reputation Systems
Lydia Garms and Elizabeth A. Quaglia
2019/452 ( PDF )
A Central Limit Framework for Ring-LWE Decryption
Sean Murphy and Rachel Player
2019/451 ( PDF )
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Francesco Berti and Olivier Pereira and François-Xavier Standaert
2019/450 ( PDF )
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data
Chenglu Jin and Zheng Yang and Sridhar Adepu and Jianying Zhou
2019/449 ( PDF )
Limits to Non-Malleability
Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Tal Malkin
2019/448 ( PDF )
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl
2019/447 ( PDF )
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak
Haibo Zhou and Zheng Li and Xiaoyang Dong and Keting Jia and Willi Meier
2019/446 ( PDF )
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Sanjit Chatterjee and Shravan Kumar Parshuram Puria and Akash Shah
2019/445 ( PDF )
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications
Muhammed F. Esgin and Ron Steinfeld and Joseph K. Liu and Dongxi Liu
2019/444 ( PDF )
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
Gildas Avoine and Sébastien Canard and Loďc Ferreira
2019/443 ( PDF )
Contingent payments on a public ledger: models and reductions for automated verification
Sergiu Bursuc and Steve Kremer
2019/442 ( PDF )
K2SN-MSS: An Efficient Post-Quantum Signature (Full Version)
Sabyasachi Karati and Reihaneh Safavi-Naini
2019/441 ( PDF )
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
2019/440 ( PDF )
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
Avik Chakraborti and Nilanjan Datta and Ashwin Jha and Cuauhtemoc Mancillas Lopez and Mridul Nandi and Yu Sasaki
2019/439 ( PDF )
A Comprehensive Study of Deep Learning for Side-Channel Analysis
Loďc Masure and Cécile Dumas and Emmanuel Prouff
2019/438 ( PDF )
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data
Jan Camenisch and Angelo De Caro and Esha Ghosh and Alessandro Sorniotti
2019/437 ( PDF )
Efficient coding for secure computing with additively-homomorphic encrypted data
Thijs Veugen
2019/436 ( PDF )
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
Benjamin Dowling and Paul Rösler and Jörg Schwenk
2019/435 ( PDF )
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
Yue Qin and Chi Cheng and Jintai Ding
2019/434 ( PDF )
Masking Fuzzy-Searchable Public Databases
Alexandra Boldyreva and Tianxin Tang and Bogdan Warinschi
2019/433 ( PDF )
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
Shan Chen and Samuel Jero and Matthew Jagielski and Alexandra Boldyreva and Cristina Nita-Rotaru
2019/432 ( PDF )
Cryptanalysis of a System Based on Twisted Reed-Solomon Codes
Julien Lavauzelle and Julian Renner
2019/431 ( PDF )
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation
Aurore Guillevic and Simon Masson and Emmanuel Thomé
2019/430 ( -- withdrawn -- )
Composition of Boolean Functions: An Application to the Secondary Constructions of Bent Functions
Guangpu Gao and Dongdai Lin and Wenfen Liu and Yongjuan Wang
2019/429 ( PDF )
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Harsh Chaudhari and Ashish Choudhury and Arpita Patra and Ajith Suresh
2019/428 ( PDF )
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability
Jan Czajkowski and Christian Majenz and Christian Schaffner and Sebastian Zur
2019/427 ( PDF )
Improved Secure Integer Comparison via Homomorphic Encryption
Florian Bourse and Olivier Sanders and Jacques Traoré
2019/426 ( PDF )
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
Abdelrahaman Aly and Tomer Ashur and Eli Ben-Sasson and Siemen Dhooghe and Alan Szepieniec
2019/425 ( PDF )
Homomorphic Training of 30,000 Logistic Regression Models
Flavio Bergamaschi and Shai Halevi and Tzipora T. Halevi and Hamish Hunt
2019/424 ( -- withdrawn -- )
Preimage Security of KNOT-Hash
Raghvendra Rohit
2019/423 ( PDF )
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name
Peter T. Breuer
2019/422 ( PDF )
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound
Alexander Moch and Eik List
2019/421 ( PDF )
Continuing to reflect on TLS 1.3 with external PSK
Liliya Akhmetzyanova and Evgeny Alekseev and Ekaterina Smyshlyaeva and Alexandr Sokolov
2019/420 ( PDF )
Improving Speed of Dilithium’s Signing Procedure
Prasanna Ravi and Sourav Sen Gupta and Anupam Chattopadhyay and Shivam Bhasin
2019/419 ( PDF )
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
Martin R. Albrecht and Carlos Cid and Lorenzo Grassi and Dmitry Khovratovich and Reinhard Lüftenegger and Christian Rechberger and Markus Schofnegger
2019/418 ( PDF )
Sharing of Encrypted files in Blockchain Made Simpler
S. Sharmila Deva Selvi and Arinjita Paul and Siva Dirisala and Saswata Basu and C. Pandu Rangan
2019/417 ( PDF )
Numerical Method for Comparison on Homomorphically Encrypted Numbers
Jung Hee Cheon and Dongwoo Kim and Duhyeong Kim and Hun Hee Lee and Keewoo Lee
2019/416 ( PDF )
How many transactions per second can bitcoin really handle ? Theoretically.
Evangelos Georgiadis
2019/415 ( PDF )
Refinement and Verification of CBC Casper
Ryuya Nakamura and Takayuki Jimba and Dominik Harz
2019/414 ( PDF )
Two-Round Oblivious Transfer from CDH or LPN
Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny and Daniel Wichs
2019/413 ( PDF )
On the Streaming Indistinguishability of a Random Permutation and a Random Function
Itai Dinur
2019/412 ( PDF )
On the complexity of the Permuted Kernel Problem
Eliane KOUSSA and Gilles MACARIO-RAT and Jacques PATARIN
2019/411 ( PDF )
Exploring the Monero Peer-to-Peer Network
Tong Cao and Jiangshan Yu and Jérémie Decouchant and Xiapu Luo and Paulo Verissimo
2019/410 ( PDF )
Policy-Based Sanitizable Signatures
Kai Samelin and Daniel Slamanig
2019/409 ( PDF )
Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes
Houda Ferradi and Keita Xagawa
2019/408 ( PDF )
Forgery Attack on SNEIKEN
Mustafa Khairallah
2019/407 ( PDF )
Privacy-Preserving Network Path Validation
Binanda Sengupta and Yingjiu Li and Kai Bu and Robert H. Deng
2019/406 ( PDF )
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
David Derler and Kai Samelin and Daniel Slamanig and Christoph Striecks
2019/405 ( PDF )
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware
Jo Vliegen and Md Masoom Rabbani and Mauro Conti and Nele Mentens
2019/404 ( PDF )
Efficient Message Authentication Codes with Combinatorial Group Testing
Kazuhiko Minematsu
2019/403 ( PDF )
Fast and simple constant-time hashing to the BLS12-381 elliptic curve
Riad S. Wahby and Dan Boneh
2019/402 ( PDF )
ILC: A Calculus for Composable, Computational Cryptography
Kevin Liao and Matthew A. Hammer and Andrew Miller
2019/401 ( PDF )
Side-Channel assessment of Open Source Hardware Wallets
Manuel San Pedro and Victor Servant and Charles Guillemet
2019/400 ( PDF )
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
Akira Takahashi and Mehdi Tibouchi
2019/399 ( PDF )
Inception makes non-malleable codes shorter as well!
Divesh Aggarwal and Maciej Obremski
2019/398 ( PDF )
Constant-Round Group Key Exchange from the Ring-LWE Assumption
Daniel Apon and Dana Dachman-Soled and Huijing Gong and Jonathan Katz
2019/397 ( PDF )
Feistel Structures for MPC, and More
Martin R. Albrecht and Lorenzo Grassi and Leo Perrin and Sebastian Ramacher and Christian Rechberger and Dragos Rotaru and Arnab Roy and Markus Schofnegger
2019/396 ( PDF )
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Evangelia Anna Markatou and Roberto Tamassia
2019/395 ( PDF )
Full Database Reconstruction with Access and Search Pattern Leakage
Evangelia Anna Markatou and Roberto Tamassia
2019/394 ( PDF )
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation
Vincent Migliore and Benoit Gérard and Mehdi Tibouchi and Pierre-Alain Fouque
2019/393 ( PDF )
A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence
Itay Berman and Iftach Haitner and Eliad Tsfadia
2019/392 ( PDF )
New Conditional Cube Attack on Keccak Keyed Modes
Zheng Li and Xiaoyang Dong and Wenquan Bi and Keting Jia and Xiaoyun Wang and Willi Meier
2019/391 ( PDF )
Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense
Biswabandan Panda
2019/390 ( PDF )
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures
Michael Specter and Sunoo Park and Matthew Green
2019/389 ( PDF )
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Sauvik Bhattacharya and Oscar Garcia-Morchon and Rachel Player and Ludo Tolhuizen
2019/388 ( PDF )
Towards Secret-Free Security
Ulrich Rührmair
2019/387 ( PDF )
SoK : On DFA Vulnerabilities of Substitution-Permutation Networks
Mustafa Khairallah and Xiaolu Hou and Zakaria Najm and Jakub Breier and Shivam Bhasin and Thomas Peyrin
2019/386 ( PDF )
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation
Ryo Kikuchi and Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ai Ishida and Takahiro Matsuda and Yusuke Sakai and Jacob C. N. Schuldt
2019/385 ( PDF )
Miller Inversion is Easy for the Reduced Tate Pairing on Supersingular Curves of Embedding Degree Two and Three
Takakazu Satoh
2019/384 ( PDF )
What Storage Access Privacy is Achievable with Small Overhead?
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2019/383 ( PDF )
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
Mathy Vanhoef and Eyal Ronen
2019/382 ( PDF )
Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length
Daniel Gardham and Mark Manulis
2019/381 ( -- withdrawn -- )
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Chen-Dong Ye and Tian Tian
2019/380 ( PDF )
A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit
Kazumasa Shinagawa and Koji Nuida
2019/379 ( PDF )
Non-Malleable Codes for Decision Trees
Marshall Ball and Siyao Guo and Daniel Wichs
2019/378 ( PDF )
pRate: Anonymous Star Rating with Rating Secrecy
Jia Liu and Mark Manulis
2019/377 ( PDF )
Lower Bounds for Oblivious Near-Neighbor Search
Kasper Green Larsen and Tal Malkin and Omri Weinstein and Kevin Yeo
2019/376 ( PDF )
SELL v1.0: Searchable Encrypted Logging Library
Amir Jalali and Neil Davenport
2019/375 ( PDF )
Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters
Xavier Bultel and Pascal Lafourcade
2019/374 ( PDF )
Probability 1 Iterated Differential in the SNEIK Permutation
Léo Perrin
2019/373 ( PDF )
Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions
Aram Jivanyan
2019/372 ( PDF )
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
2019/371 ( PDF )
Adding Linkability to Ring Signatures with One-Time Signatures
Xueli Wang and Yu Chen and Xuecheng Ma
2019/370 ( PDF )
Indifferentiability for Public Key Cryptosystems
Mark Zhandry and Cong Zhang
2019/369 ( PDF )
On the EA-classes of known APN functions in small dimensions
Marco Calderini
2019/368 ( PDF )
Strong Post-Compromise Secure Proxy Re-Encryption
Alex Davidson and Amit Deo and Ela Lee and Keith Martin
2019/367 ( PDF )
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
Olivier Blazy and Angèle Bossuat and Xavier Bultel and Pierre-Alain Fouque and Cristina Onete and Elena Pagnin
2019/366 ( PDF )
Triggerflow: Regression Testing by Advanced Execution Path Inspection
Iaroslav Gridin and Cesar Pereida García and Nicola Tuveri and Billy Bob Brumley
2019/365 ( PDF )
Fully Secure Attribute-Based Encryption for $t$-CNF from LWE
Rotem Tsabary
2019/364 ( PDF )
Everybody's a Target: Scalability in Public-Key Encryption
Benedikt Auerbach and Federico Giacon and Eike Kiltz
2019/363 ( PDF )
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs
Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima
2019/362 ( PDF )
Game Channels: State Channels for the Gambling Industry with Built-In PRNG
Alisa Cherniaeva and Ilia Shirobokov and Alexander Davydov
2019/361 ( PDF )
On polynomial secret sharing schemes
Anat Paskin-Chernivasky and Artiom Radune
2019/360 ( PDF )
SoK: Layer-Two Blockchain Protocols
Lewis Gudgeon and Pedro Moreno-Sanchez and Stefanie Roos and Patrick McCorry and Arthur Gervais
2019/359 ( PDF )
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search
Hao Chen and Ilaria Chillotti and Yihe Dong and Oxana Poburinnaya and Ilya Razenshteyn and M. Sadegh Riazi
2019/358 ( PDF )
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA
Leo Weissbart and Stjepan Picek and Lejla Batina
2019/357 ( PDF )
Lattice-based proof of a shuffle
Núria Costa and Ramiro Martínez and Paz Morillo
2019/356 ( PDF )
Ad Hoc Multi-Input Functional Encryption
Shweta Agrawal and Michael Clear and Ophir Frieder and Sanjam Garg and Adam O’Neill and Justin Thaler
2019/355 ( PDF )
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks
Anubhab Baksi and Dhiman Saha and Sumanta Sarkar
2019/354 ( PDF )
Benchmarking Privacy Preserving Scientific Operations
Abdelrahaman Aly and Nigel P. Smart
2019/353 ( PDF )
A Faster Constant-time Algorithm of CSIDH keeping Two Points
Hiroshi Onuki and Yusuke Aikawa and Tsutomu Yamazaki and Tsuyoshi Takagi
2019/352 ( PDF )
SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies
Maxim Jourenko and Kanta Kurazumi and Mario Larangeira and Keisuke Tanaka
2019/351 ( PDF )
Forward Secrecy of SPAKE2
Jose Becerra and Dimiter Ostrev and Marjan Skrobot
2019/350 ( PDF )
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Fabian Boemer and Yixing Lao and Rosario Cammarota and Casimir Wierzynski
2019/349 ( PDF )
Spin Me Right Round: Rotational Symmetry for FPGA-specific AES
Felix Wegener and Lauren De Meyer and Amir Moradi
2019/348 ( PDF )
Efficient and Scalable Universal Circuits
Masaud Y. Alhassan and Daniel Günther and Ágnes Kiss and Thomas Schneider
2019/347 ( PDF )
Selfie: reflections on TLS 1.3 with PSK
Nir Drucker and Shay Gueron
2019/346 ( PDF )
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm
Christophe Clavier and Leo Reynaud and Antoine Wurcker
2019/345 ( PDF )
Second-order Scatter Attack
Hugues Thiebeauld and Aurélien Vasselle and Antoine Wurcker
2019/344 ( PDF )
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency
Ethan Heilman and Neha Narula and Garrett Tanzer and James Lovejoy and Michael Colavita and Madars Virza and Tadge Dryja
2019/343 ( PDF )
Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input
Aurelien Vasselle and Antoine Wurcker
2019/342 ( PDF )
LightChain: A DHT-based Blockchain for Resource Constrained Environments
Yahya Hassanzadeh-Nazarabadi and Alptekin Küpçü and Öznur Özkasap
2019/341 ( PDF )
MixEth: efficient, trustless coin mixing service for Ethereum
István András Seres and Dániel A. Nagy and Chris Buckland and Péter Burcsi
2019/340 ( PDF )
Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys
Antoine Wurcker
2019/339 ( PDF )
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Yusuke Naito and Takeshi Sugawara
2019/338 ( PDF )
Garbled Neural Networks are Practical
Marshall Ball and Brent Carmer and Tal Malkin and Mike Rosulek and Nichole Schimanski
2019/337 ( PDF )
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios
Łukasz Krzywiecki and Mirosław Kutyłowski and Jakub Pezda and Marcin Słowik
2019/336 ( PDF )
DEEP-FRI: Sampling Outside the Box Improves Soundness
Eli Ben-Sasson and Lior Goldberg and Swastik Kopparty and Shubhangi Saraf
2019/335 ( PDF )
Examining the Practical Side Channel Resilience of ARX-boxes
Yan Yan and Elisabeth Oswald
2019/334 ( PDF )
Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition
Abdelrahaman Aly and Aysajan Abidin and Svetla Nikova
2019/333 ( PDF )
Key-and-Argument-Updatable QA-NIZKs
Helger Lipmaa
2019/332 ( PDF )
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields
Benjamin Hong Meng Tan and Hyung Tae Lee and Huaxiong Wang and Shu Qin Ren and Khin Mi Mi Aung
2019/331 ( PDF )
Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors
Amir Jalali and Reza Azarderakhsh and Mehran Mozaffari Kermani and Matthew Campagna and David Jao
2019/330 ( PDF )
Practical Supersingular Isogeny Group Key Agreement
Reza Azarderakhsh and Amir Jalali and David Jao and Vladimir Soukharev
2019/329 ( PDF )
Doubly half-injective PRGs for incompressible white-box cryptography
Estuardo Alpirez Bock and Alessandro Amadori and Joppe W. Bos and Chris Brzuska and Wil Michiels
2019/328 ( PDF )
On the Difficulty of Hiding the Balance of Lightning Network Channels
Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Alejandro Ranchal-Pedrosa and Cristina Pérez-Solà and Joaquin Garcia-Alfaro
2019/327 ( PDF )
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers
Gembu Ito and Tetsu Iwata
2019/326 ( PDF )
Shorter Pairing-based Arguments under Standard Assumptions
Alonso Gonzalez and Carla Rafols
2019/325 ( PDF )
An Efficient Private Evaluation of a Decision Graph
Hiroki Sudo and Koji Nuida and Kana Shimizu
2019/324 ( PDF )
A Traceable Ring Signature Scheme based on Coding Theory
Pedro Branco and Paulo Mateus
2019/323 ( PDF )
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited
Sabyasachi Dutta and Kouichi Sakurai
2019/322 ( PDF )
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES
Farnoud Farahmand and Malik Umar Sharif and Kevin Briggs and Kris Gaj
2019/321 ( PDF )
Horizontal Collision Correlation Attack on Elliptic Curves
Aurélie Bauer and Eliane Jaulmes and Emmanuel Prouff and Jean-René Reinhard and Justine Wild
2019/320 ( PDF )
Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats
Léo Ducas and Steven Galbraith and Thomas Prest and Yang Yu
2019/319 ( PDF )
PGC: Pretty Good Decentralized Confidential Payment System with Auditability
Yu Chen and Xuecheng Ma and Cong Tang and Man Ho Au
2019/318 ( PDF )
Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256
Boyu Ni and Xiaoyang Dong
2019/317 ( PDF )
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
Tiancheng Xie and Jiaheng Zhang and Yupeng Zhang and Charalampos Papamanthou and Dawn Song
2019/316 ( PDF )
Extended Affine and CCZ Equivalence up to Dimension 4
Marcus Brinkmann
2019/315 ( PDF )
Blockchains from Non-Idealized Hash Functions
Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos
2019/314 ( PDF )
Optimal Bounded-Collusion Secure Functional Encryption
Prabhanjan Ananth and Vinod Vaikuntanathan
2019/313 ( PDF )
A SAT-based approach for index calculus on binary elliptic curves
Monika Trimoska and Sorina Ionica and Gilles Dequen
2019/312 ( PDF )
Side-Channel Analysis of the TERO PUF
Lars Tebelmann and Michael Pehl and Vincent Immler
2019/311 ( PDF )
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and Bertram Poettering
2019/310 ( PDF )
A Formal Approach to Secure Speculation
Kevin Cheang and Cameron Rasmussen and Sanjit Seshia and Pramod Subramanyan
2019/309 ( PDF )
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots
Jean-Sebastien Coron and Luca Notarnicola
2019/308 ( PDF )
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation
Yuan Kang and Chengyu Lin and Tal Malkin and Mariana Raykova
2019/307 ( PDF )
Solving $x^{2^k+1}+x+a=0$ in $\mathbb{F}_{2^n}$ with $\gcd(n,k)=1$
Kwang Ho Kim and Sihem Mesnager
2019/306 ( PDF )
Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields
Madhurima Mukhopadhyay and Palash Sarkar
2019/305 ( PDF )
Practical Algebraic Side-Channel Attacks Against ACORN
Alexandre Adomnicai and Laurent Masson and Jacques J.A. Fournier
2019/304 ( PDF )
Ternary Syndrome Decoding with Large Weight
Rémi Bricout and André Chailloux and Thomas Debris-Alazard and Matthieu Lequesne
2019/303 ( PDF )
Analysis of TPL Signature Scheme
Terry Shue Chien Lau and Chik How Tan and Theo Fanuela Prabowo
2019/302 ( PDF )
A Survey of Leakage-Resilient Cryptography
Yael Tauman Kalai and Leonid Reyzin
2019/301 ( PDF )
Safe Compilation for Encrypted Computing
Peter T. Breuer and Simon Pickin
2019/300 ( PDF )
Transient Effect Ring Oscillators Leak Too
Ugo Mureddu and Brice Colombier and Nathalie Bochard and Lilian Bossuet and Viktor Fischer
2019/299 ( PDF )
A Generic Construction of Revocable Identity-Based Encryption
Xuecheng Ma and Dongdai Lin
2019/298 ( PDF )
Improved Classical Cryptanalysis of SIKE in Practice
Craig Costello and Patrick Longa and Michael Naehrig and Joost Renes and Fernando Virdia
2019/297 ( PDF )
Towards Optimized and Constant-Time CSIDH on Embedded Devices
Amir Jalali and Reza Azarderakhsh and Mehran Mozaffari Kermani and David Jao
2019/296 ( PDF )
Hash functions from superspecial genus-2 curves using Richelot isogenies
Wouter Castryck and Thomas Decru and Benjamin Smith
2019/295 ( PDF )
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
Kimia Tajik and Akshith Gunasekaran and Rhea Dutta and Brandon Ellis and Rakesh B. Bobba and Mike Rosulek and Charles V. Wright and Wu-chi Feng
2019/294 ( PDF )
Semi-parallel Logistic Regression for GWAS on Encrypted Data
Miran Kim and Yongsoo Song and Baiyu Li and Daniele Micciancio
2019/293 ( PDF )
Impossibility of Strong KDM Security with Auxiliary Input
Cody Freitag and Ilan Komargodski and Rafael Pass
2019/292 ( PDF )
Timing attacks on Error Correcting Codes in Post-Quantum Schemes
Jan-Pieter D'Anvers and Marcel Tiepelt and Frederik Vercauteren and Ingrid Verbauwhede
2019/291 ( PDF )
CCA Security and Trapdoor Functions via Key-Dependent-Message Security
Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka
2019/290 ( PDF )
Cost effective techniques for chip delayering and in-situ depackaging
Philippe Loubet Moundi
2019/289 ( PDF )
Cryptanalysis of ForkAES
Subhadeep Banik and Jannis Bossert and Amit Jana and Eik List and Stefan Lucks and Willi Meier and Mostafizar Rahman and Dhiman Saha and Yu Sasaki
2019/288 ( PDF )
On the construction of S-boxes using the leaders and followers metaheuristic
Alejandro Freyre-Echevarría and Ismel Martínez-Díaz
2019/287 ( PDF )
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
A. N. Alekseychuk and S. M. Koniushok and M. V. Poremskyi
2019/286 ( PDF )
Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ variables Majority Function
Yindong Chen and Fei Guo and Liu Zhang
2019/285 ( PDF )
SpaceFlip : Unbound Geometry Cryptography
Gideon Samid
2019/284 ( PDF )
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2
Ai Ishida and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka
2019/283 ( PDF )
An Attack on Small Private Keys of RSA Based on Euclidean Algorithm
Dimitrios Poulakis
2019/282 ( PDF )
A Framework for Cryptographic Problems from Linear Algebra
Carl Bootland and Wouter Castryck and Alan Szepieniec and Frederik Vercauteren
2019/281 ( PDF )
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning
Phillipp Schoppmann and Adria Gascon and Mariana Raykova and Benny Pinkas
2019/280 ( PDF )
Multi-Authority Attribute-Based Encryption from LWE in the OT Model
Sam Kim
2019/279 ( PDF )
A Note on Key Agreement and Non-Interactive Commitments
Alex Lombardi and Luke Schaeffer
2019/278 ( PDF )
Uncovering Algebraic Structures in the MPC Landscape
Navneet Agarwal and Sanat Anand and Manoj Prabhakaran
2019/277 ( PDF )
On the boomerang uniformity of quadratic permutations
Sihem Mesnager and Chunming Tang and Maosheng Xiong
2019/276 ( PDF )
BOREALIS: Building Block for Sealed Bid Auctions on Blockchains
Erik-Oliver Blass and Florian Kerschbaum
2019/275 ( PDF )
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation
M. Sadegh Riazi and Mojan Javaheripi and Siam U. Hussain and Farinaz Koushanfar
2019/274 ( PDF )
Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue
Elaine Shi
2019/273 ( PDF )
Compressing Vector OLE
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai
2019/272 ( PDF )
Quantum Security Analysis of AES
Xavier Bonnetain and María Naya-Plasencia and André Schrottenloher
2019/271 ( PDF )
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)
Jintai Ding and Chi Cheng and Yue Qin
2019/270 ( PDF )
Sync HotStuff: Simple and Practical Synchronous State Machine Replication
Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren and Maofan Yin
2019/269 ( PDF )
Digital Signatures for Consensus
Sergey Gorbunov and Hoeteck Wee
2019/268 ( PDF )
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys*
Sergei Bauer and Martin Brunner and Peter Schartner
2019/267 ( PDF )
Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.
Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede
2019/266 ( PDF )
Fast constant-time gcd computation and modular inversion
Daniel J. Bernstein and Bo-Yin Yang
2019/265 ( PDF )
TEX - A Securely Scalable Trustless Exchange
Rami Khalil and Arthur Gervais and Guillaume Felley
2019/264 ( PDF )
Unifying computational entropies via Kullback-Leibler divergence
Rohit Agrawal and Yi-Hsiu Chen and Thibaut Horel and Salil Vadhan
2019/263 ( PDF )
Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones
Jiaping Wang and Hao Wang
2019/262 ( PDF )
Revisiting Post-Quantum Fiat-Shamir
Qipeng Liu and Mark Zhandry
2019/261 ( PDF )
Forward-Secure Multi-Signatures
Manu Drijvers and Gregory Neven
2019/260 ( PDF )
A Modular Treatment of Blind Signatures from Identification Schemes
Eduard Hauck and Eike Kiltz and Julian Loss
2019/259 ( PDF )
A Practical Method to Recover Exact Superpoly in Cube Attack
SenPeng Wang and Bin Hu and Jie Guan and Kai Zhang and TaiRong Shi
2019/258 ( PDF )
Tight Time-Memory Trade-offs for Symmetric Encryption
Joseph Jaeger and Stefano Tessaro
2019/257 ( PDF )
Uncloneable Quantum Encryption via Oracles
Anne Broadbent and Sébastien Lord
2019/256 ( PDF )
DLCT: A New Tool for Differential-Linear Cryptanalysis
Achiya Bar-On and Orr Dunkelman and Nathan Keller and Ariel Weizman
2019/255 ( PDF )
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2019/254 ( PDF )
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries
Divesh Aggarwal and Kai-Min Chung and Han-Hsuan Lin and Thomas Vidick
2019/253 ( PDF )
Founding Secure Computation on Blockchains
Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain
2019/252 ( PDF )
Reversible Proofs of Sequential Work
Hamza Abusalah and Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter
2019/251 ( PDF )
Consensus through Herding
T-H. Hubert Chan and Rafael Pass and Elaine Shi
2019/250 ( PDF )
Function-Dependent Commitments from Homomorphic Authenticators
Lucas Schabhüser and Denis Butin and Johannes Buchmann
2019/249 ( PDF )
Revisiting Variable Output Length XOR Pseudorandom Function
Srimanta Bhattacharya and Mridul Nandi
2019/248 ( PDF )
Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach
Ting Li and Yao Sun
2019/247 ( PDF )
Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
Andrea Coladangelo and Alex B. Grilo and Stacey Jeffery and Thomas Vidick
2019/246 ( PDF )
Towards optimal robust secret sharing with security against a rushing adversary
Serge Fehr and Chen Yuan
2019/245 ( PDF )
Distributed Differential Privacy via Shuffling
Albert Cheu and Adam Smith and Jonathan Ullman and David Zeber and Maxim Zhilyaev
2019/244 ( PDF )
Attacks Only Get Better: How to Break FF3 on Large Domains
Viet Tung Hoang and David Miller and Ni Trieu
2019/243 ( PDF )
4-Round Luby-Rackoff Construction is a qPRP: Tight Quantum Security Bound
Akinori Hosoyamada and Tetsu Iwata
2019/242 ( PDF )
New Constructions of Reusable Designated-Verifier NIZKs
Alex Lombardi and Willy Quach and Ron D. Rothblum and Daniel Wichs and David J. Wu
2019/241 ( PDF )
Efficient Circuit-based PSI with Linear Communication
Benny Pinkas and Thomas Schneider and Oleksandr Tkachenko and Avishay Yanai
2019/240 ( PDF )
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes
Vipul Goyal and Yifan Song
2019/239 ( PDF )
Cheaper Private Set Intersection via Differentially Private Leakage
Adam Groce and Peter Rindal and Mike Rosulek
2019/238 ( PDF )
Robust Encryption, Extended
Rémi Géraud and David Naccache and Răzvan Roşie
2019/237 ( PDF )
Optimal Oblivious Priority Queues
Zahra Jafargholi and Kasper Green Larsen and Mark Simkin
2019/236 ( PDF )
Designated-verifier pseudorandom generators, and their applications
Geoffroy Couteau and Dennis Hofheinz
2019/235 ( PDF )
Reusable Designated-Verifier NIZKs for all NP from CDH
Willy Quach and Ron D. Rothblum and Daniel Wichs
2019/234 ( PDF )
On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm
Léo Ducas and Maxime Plançon and Benjamin Wesolowski
2019/233 ( PDF )
Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption
Nuttapong Attrapadung
2019/232 ( PDF )
On Quantum Advantage in Information Theoretic Single-Server PIR
Dorit Aharonov and Zvika Brakerski and Kai-Min Chung and Ayal Green and Ching-Yi Lai and Or Sattath
2019/231 ( PDF )
Secret-Sharing Schemes for General and Uniform Access Structures
Benny Applebaum and Amos Beimel and Oriol Farrŕs and Oded Nir and Naty Peter
2019/230 ( PDF )
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
Christos Andrikos and Lejla Batina and Lukasz Chmielewski and Liran Lerman and Vasilios Mavroudis and Kostas Papagiannopoulos and Guilherme Perin and Giorgos Rassias and Alberto Sonnino
2019/229 ( PDF )
XOR-counts and lightweight multiplication with fixed elements in binary finite fields
Lukas Kölsch
2019/228 ( PDF )
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
Nimrod Aviram and Kai Gellert and Tibor Jager
2019/227 ( PDF )
Securing Update Propagation with Homomorphic Hashing
Kevin Lewi and Wonho Kim and Ilya Maykov and Stephen Weis
2019/226 ( PDF )
Flyclient: Super-Light Clients for Cryptocurrencies
Benedikt Bünz and Lucianna Kiffer and Loi Luu and Mahdi Zamani
2019/225 ( PDF )
Leakage Resilience of the Duplex Construction
Christoph Dobraunig and Bart Mennink
2019/224 ( PDF )
Compact Adaptively Secure ABE for NC1 from k-Lin
Lucas Kowalczyk and Hoeteck Wee
2019/223 ( PDF )
Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies
Marcelo Blatt and Alexander Gusev and Yuriy Polyakov and Kurt Rohloff and Vinod Vaikuntanathan
2019/222 ( PDF )
(R)CCA Secure Updatable Encryption with Integrity Protection
Michael Klooß and Anja Lehmann and Andy Rupp
2019/221 ( PDF )
Group Signatures without NIZK: From Lattices in the Standard Model
Shuichi Katsumata and Shota Yamada
2019/220 ( PDF )
Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing
Ivan Damgĺrd and Kasper Green Larsen and Jesper Buus Nielsen
2019/219 ( PDF )
Nitro Protocol
Tom Close
2019/218 ( PDF )
Computational Limitations in Robust Classification and Win-Win Results
Akshay Degwekar and Vinod Vaikuntanathan
2019/217 ( PDF )
A family of boolean functions with good cryptographic properties
Guillermo Sosa Gómez and Octavio Paez Osuna
2019/216 ( PDF )
Round Optimal Secure Multiparty Computation from Minimal Assumptions
Arka Rai Choudhuri and Michele Ciampi and Vipul Goyal and Abhishek Jain and Rafail Ostrovsky
2019/215 ( PDF )
Approx-SVP in Ideal Lattices with Pre-processing
Alice Pellet-Mary and Guillaume Hanrot and Damien Stehlé
2019/214 ( PDF )
Four-Round Secure Multiparty Computation from General Assumptions
Michele Ciampi and Rafail Ostrovsky
2019/213 ( PDF )
On ELFs, Deterministic Encryption, and Correlated-Input Security
Mark Zhandry
2019/212 ( PDF )
A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes
Hossein Oraei and Massoud Hadian Dehkordi
2019/211 ( PDF )
MonZa: Fast Maliciously Secure Two Party Computation on Z_{2^k}
Dario Catalano and Mario Di Raimondo and Dario Fiore and Irene Giacomelli
2019/210 ( PDF )
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Christof Beierle and Gregor Leander and Amir Moradi and Shahram Rasoolzadeh
2019/209 ( PDF )
SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes
Zhenzhen Bao and Jian Guo and San Ling and Yu Sasaki
2019/208 ( PDF )
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA
Muzhou Li and Kai Hu and Meiqin Wang
2019/207 ( PDF )
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security
Dragos Rotaru and Tim Wood
2019/206 ( PDF )
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
James Howe and Ayesha Khalid and Marco Martinoli and Francesco Regazzoni and Elisabeth Oswald
2019/205 ( PDF )
A note on isogeny-based hybrid verifiable delay functions
Barak Shani
2019/204 ( PDF )
The Security of All Private-key Bits in Isogeny-based Schemes
Barak Shani
2019/203 ( PDF )
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
Osman Bicer and Alptekin Kupcu
2019/202 ( PDF )
The Distinction Between Fixed and Random Generators in Group-Based Assumptions
James Bartusek and Fermi Ma and Mark Zhandry
2019/201 ( PDF )
DL-Extractable UC-Commitment Schemes
Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michał Zając
2019/200 ( PDF )
Degree 2 is Complete for the Round-Complexity of Malicious MPC
Benny Applebaum and Zvika Brakerski and Rotem Tsabary
2019/199 ( PDF )
Password-Authenticated Public-Key Encryption
Tatiana Bradley and Jan Camenisch and Stanislaw Jarecki and Anja Lehmann and Gregory Neven and Jiayu Xu
2019/198 ( PDF )
Seedless Fruit is the Sweetest: Random Number Generation, Revisited
Sandro Coretti and Yevgeniy Dodis and Harish Karthikeyan and Stefano Tessaro
2019/197 ( PDF )
Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions
Esteban Landerreche and Marc Stevens and Christian Schaffner
2019/196 ( PDF )
Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions
Michael Backes and Nico Döttling and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider
2019/195 ( PDF )
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
Jung Hee Cheon and Wonhee Cho and Minki Hhan and Minsik Kang and Jiseung Kim and Changmin Lee
2019/194 ( PDF )
Classical zero-knowledge arguments for quantum computations
Thomas Vidick and Tina Zhang
2019/193 ( PDF )
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction
Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2019/192 ( PDF )
An Omission-Tolerant Cryptographic Checksum
Francisco Corella and Karen Lewison
2019/191 ( PDF )
Zether: Towards Privacy in a Smart Contract World
Benedikt Bünz and Shashank Agrawal and Mahdi Zamani and Dan Boneh
2019/190 ( PDF )
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model
Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner
2019/189 ( PDF )
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis
Yaoling Ding and An Wang and Siu Ming YIU
2019/188 ( PDF )
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
Dan Boneh and Elette Boyle and Henry Corrigan-Gibbs and Niv Gilboa and Yuval Ishai
2019/187 ( PDF )
Fully homomorphic encryption modulo Fermat numbers
Antoine Joux
2019/186 ( PDF )
Re-thinking untraceability in the CryptoNote-style blockchain
Jiangshan Yu and Man Ho Allen Au and Paulo Esteves-Verissimo
2019/185 ( PDF )
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Ralph Ankele and Christoph Dobraunig and Jian Guo and Eran Lambooij and Gregor Leander and Yosuke Todo
2019/184 ( PDF )
Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon
William Diehl and Farnoud Farahmand and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj
2019/183 ( PDF )
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
Katherine E. Stange
2019/182 ( PDF )
Security is an Architectural Design Constraint
Prasanna Ravi and Sourav Sen Gupta and Anupam Chattopadhyay and Mustafa Khairallah and Zakaria Najm and Shivam Bhasin
2019/181 ( PDF )
Lower Bounds for Leakage-Resilient Secret Sharing
Jesper Buus Nielsen and Mark Simkin
2019/180 ( PDF )
Disco: Modern Session Encryption
David Wong
2019/179 ( PDF )
Synchronous, with a Chance of Partition Tolerance
Yue Guo and Rafael Pass and Elaine Shi
2019/178 ( PDF )
LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness
Rohit Sinha and Sivanarayana Gaddam and Ranjit Kumaresan
2019/177 ( PDF )
Genus Two Isogeny Cryptography
E.V. Flynn and Yan Bo Ti
2019/176 ( PDF )
Homomorphic Encryption for Finite Automata
Nicholas Genise and Craig Gentry and Shai Halevi and Baiyu Li and Daniele Micciancio
2019/175 ( PDF )
The Communication Complexity of Threshold Private Set Intersection
Satrajit Ghosh and Mark Simkin
2019/174 ( PDF )
Towards an Exponential Lower Bound for Secret Sharing
Kasper Green Larsen and Mark Simkin
2019/173 ( PDF )
Shorter Quadratic QA-NIZK Proofs
Vanesa Daza and Alonso González and Zaira Pindado and Carla Rŕfols and Javier Silva
2019/172 ( PDF )
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS
Danping Shi and Siwei Sun and Yu Sasaki and Chaoyun Li and Lei Hu
2019/171 ( PDF )
XONN: XNOR-based Oblivious Deep Neural Network Inference
M. Sadegh Riazi and Mohammad Samragh and Hao Chen and Kim Laine and Kristin Lauter and Farinaz Koushanfar
2019/170 ( PDF )
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes
Lingyue Qin and Xiaoyang Dong and Keting Jia and Rui Zong
2019/169 ( PDF )
Updatable Anonymous Credentials and Applications to Incentive Systems
Johannes Blömer and Jan Bobolz and Denis Diemert and Fabian Eidens
2019/168 ( PDF )
Profiling Side-channel Analysis in the Efficient Attacker Framework
Stjepan Picek and Annelie Heuser and Guilherme Perin and Sylvain Guilley
2019/167 ( PDF )
Analysis of Secure Caches using a Three-Step Model for Timing-Based Attacks
Shuwen Deng and Wenjie Xiong and Jakub Szefer
2019/166 ( PDF )
Verifiable Delay Functions from Supersingular Isogenies and Pairings
Luca De Feo and Simon Masson and Christophe Petit and Antonio Sanso
2019/165 ( PDF )
libInterMAC: Beyond Confidentiality and Integrity in Practice
Martin R. Albrecht and Torben Brandt Hansen and Kenneth G. Paterson
2019/164 ( PDF )
Use your Brain! Arithmetic 3PC For Any Modulus with Active Security
Hendrik Eerikson and Marcel Keller and Claudio Orlandi and Pille Pullonen and Joonas Puura and Mark Simkin
2019/163 ( PDF )
Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder
Melissa Azouaoui and Romain Poussier and François-Xavier Standaert
2019/162 ( PDF )
A New Blockchain Proposal Supporting Multi-Stage Proof-of-Work
Palash Sarkar
2019/161 ( PDF )
Understanding Optimizations and Measuring Performances of PBKDF2
Andrea Francesco Iuorio and Andrea Visconti
2019/160 ( PDF )
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data
Sujoy Sinha Roy and Furkan Turan and Kimmo Jarvinen and Frederik Vercauteren and Ingrid Verbauwhede
2019/159 ( PDF )
Robust MPC: Asynchronous Responsiveness yet Synchronous Security
Chen-Da Liu-Zhang and Julian Loss and Ueli Maurer and Tal Moran and Daniel Tschudi
2019/158 ( PDF )
Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors
Chris Peikert and Sina Shiehian
2019/157 ( PDF )
Schnorr-based implicit certification: improving the security and efficiency of V2X communications
Paulo S. L. M. Barreto and Marcos A. Simplicio Jr. and Jefferson E. Ricardini and Harsh Kupwade Patil
2019/156 ( PDF )
Efficient Constructions for Almost-everywhere Secure Computation
Siddhartha Jayanti and Srinivasan Raghuraman and Nikhil Vyas
2019/155 ( PDF )
Constant-time BCH Error-Correcting Code
Matthew Walters and Sujoy Sinha Roy
2019/154 ( PDF )
FastKitten: Practical Smart Contracts on Bitcoin
Poulami Das and Lisa Eckey and Tommaso Frassetto and David Gens and Kristina Hostáková and Patrick Jauernig and Sebastian Faust and Ahmad-Reza Sadeghi
2019/153 ( PDF )
Overdrive2k: Efficient Secure MPC over $Z_{2^k}$ from Somewhat Homomorphic Encryption
Emmanuela Orsini and Nigel P. Smart and Frederik Vercauteren
2019/152 ( PDF )
Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption
Duhyeong Kim and Yongha Son and Dongwoo Kim and Andrey Kim and Seungwan Hong and Jung Hee Cheon
2019/151 ( PDF )
Solving binary MQ with Grover's algorithm
Peter Schwabe and Bas Westerbaan
2019/150 ( PDF )
QcBits: Constant-Time Small-Key Code-Based Cryptography
Tung Chou
2019/149 ( PDF )
Improved Lattice-based CCA2-Secure PKE in the Standard Model
Jiang Zhang and Yu Yu and Shuqin Fan and Zhenfeng Zhang
2019/148 ( PDF )
On the efficiency of pairing-based proofs under the d-PKE
Ariel Gabizon
2019/147 ( PDF )
Practical Collision Attacks against Round-Reduced SHA-3
Jian Guo and Guohong Liao and Guozhen Liu and Meicheng Liu and Kexin Qiao and Ling Song
2019/146 ( PDF )
Boomerang Connectivity Table Revisited
Ling Song and Xianrui Qin and Lei Hu
2019/145 ( PDF )
Achieving GWAS with Homomorphic Encryption
Jun Jie Sim and Fook Mun Chan and Shibin Chen and Benjamin Hong Meng Tan and Khin Mi Mi Aung
2019/144 ( PDF )
Modeling Power Efficiency of S-boxes Using Machine Learning
Rajat Sadhukhan and Nilanjan Datta and Debdeep Mukhopadhyay
2019/143 ( PDF )
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
Benjamin Hettwer and Stefan Gehrer and Tim Güneysu
2019/142 ( PDF )
LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs
Matteo Campanelli and Dario Fiore and Anaďs Querol
2019/141 ( PDF )
A General Proof Framework for Recent AES Distinguishers
Christina Boura and Anne Canteaut and Daniel Coggia
2019/140 ( PDF )
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning
Jinhyun So and Basak Guler and A. Salman Avestimehr and Payman Mohassel
2019/139 ( PDF )
Vulnerability and Remedy of Stripped Function Logic Locking
Hai Zhou and Yuanqi Shen and Amin Rezaei
2019/138 ( PDF )
Unifying Leakage Models on a Rényi Day
Thomas Prest and Dahmun Goudarzi and Ange Martinelli and Alain Passelčgue
2019/137 ( PDF )
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications
Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2019/136 ( PDF )
Divisible E-Cash from Constrained Pseudo-Random Functions
Florian Bourse and David Pointcheval and Olivier Sanders
2019/135 ( PDF )
It wasn't me! Repudiability and Unclaimability of Ring Signatures
Sunoo Park and Adam Sealfon
2019/134 ( PDF )
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/133 ( PDF )
On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography.
Vasyl Ustimenko
2019/132 ( PDF )
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
Olivier Bronchain and Julien M. Hendrickx and Clément Massart and Alex Olshevsky and François-Xavier Standaert
2019/131 ( PDF )
Secure Evaluation of Quantized Neural Networks
Anders Dalskov and Daniel Escudero and Marcel Keller
2019/130 ( PDF )
Are Certificate Thumbprints Unique?
Greg Zaverucha and Dan Shumow
2019/129 ( PDF )
Homomorphic Secret Sharing from Lattices Without FHE
Elette Boyle and Lisa Kohl and Peter Scholl
2019/128 ( PDF )
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions
Junichi Tomida
2019/127 ( PDF )
Beyond Birthday Bound Secure MAC in Faulty Nonce Model
Avijit Dutta and Mridul Nandi and Suprita Talnikar
2019/126 ( PDF )
New Automatic search method for Truncated-differential characteristics: Application to Midori, SKINNY and CRAFT
AmirHossein E. Moghaddam and Zahra Ahmadian
2019/125 ( PDF )
Combinatorial Primality Test
Maheswara Rao Valluri
2019/124 ( PDF )
Anomalous Look at Provable Security
Douglas Wikström
2019/123 ( PDF )
Security of Multilinear Galois Mode (MGM)
Liliya Akhmetzyanova and Evgeny Alekseev and Grigory Karpunin and Vladislav Nozdrunov
2019/122 ( PDF )
Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes
Santosh Ghosh and Rafael Misoczki and Manoj R. Sastry
2019/121 ( PDF )
Anonymous Attestation for IoT
Santosh Ghosh and Andrew H. Reinders and Rafael Misoczki and Manoj R. Sastry
2019/120 ( PDF )
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019
Keita Xagawa
2019/119 ( PDF )
On the security of the BCTV Pinocchio zk-SNARK variant
Ariel Gabizon
2019/118 ( -- withdrawn -- )
Defeating the Hart, Kim, Micheli, Pascuel-Perez, Petit, Quek Attack on WalnutDSA(TM)
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2019/117 ( PDF )
Non-Interactive Keyed-Verification Anonymous Credentials
Geoffroy Couteau and Michael Reichle
2019/116 ( PDF )
Multi-Key Homomophic Encryption from TFHE
Hao Chen and Ilaria Chillotti and Yongsoo Song
2019/115 ( PDF )
Distributional Collision Resistance Beyond One-Way Functions
Nir Bitansky and Iftach Haitner and Ilan Komargodski and Eylon Yogev
2019/114 ( PDF )
Fast Multiparty Threshold ECDSA with Fast Trustless Setup
Rosario Gennaro and Steven Goldfeder
2019/113 ( PDF )
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure
Ferucio Laurentiu Tiplea and Cristian Hristea
2019/112 ( PDF )
Variable Elimination - a Tool for Algebraic Cryptanalysis
Bjřrn Greve and Řyvind Ytrehus and Hĺvard Raddum
2019/111 ( PDF )
On the Complexity of non-recursive $n$-term Karatsuba Multiplier for Trinomials
Yin Li and Shantanu Sharma and Yu Zhang and Xingpo Ma and Chuanda Qi
2019/110 ( PDF )
Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves
Suhri Kim and Kisoon Yoon and Young-Ho Park and Seokhie Hong
2019/109 ( PDF )
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture
Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2019/108 ( PDF )
Minicrypt Primitives with Algebraic Structure and Applications
Navid Alamati and Hart Montgomery and Sikhar Patranabis and Arnab Roy
2019/107 ( PDF )
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit
Shun Li and Siwei Sun and Chaoyun Li and Zihao Wei and Lei Hu
2019/106 ( PDF )
Identity-Based Higncryption
Hongbing Wang and Yunlei Zhao
2019/105 ( PDF )
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
Antonio Faonio and Daniele Venturi
2019/104 ( PDF )
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation
Naomi Farley and Robert Fitzpatrick and Duncan Jones
2019/103 ( PDF )
Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE
Samuel Jaques and John M. Schanck
2019/102 ( PDF )
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum
Hisham S. Galal and Amr M. Youssef
2019/101 ( PDF )
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption
Sergiu Carpov and Nicolas Gama and Mariya Georgieva and Juan Ramon Troncoso-Pastoriza
2019/100 ( PDF )
Power Analysis on NTRU Prime
Wei-Lun Huang and Jiun-Peng Chen and Bo-Yin Yang
2019/099 ( PDF )
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings
Mary Maller and Sean Bowe and Markulf Kohlweiss and Sarah Meiklejohn
2019/098 ( PDF )
A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions
Pedro Branco
2019/097 ( PDF )
Linearly equivalent S-boxes and the Division Property
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin
2019/096 ( PDF )
On Recovering Affine Encodings in White-Box Implementations
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin and Brice Minaud
2019/095 ( PDF )
Variants of the AES Key Schedule for Better Truncated Differential Bounds
Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean and Baptiste Lambin
2019/094 ( PDF )
CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges
Aron Gohr and Sven Jacob and Werner Schindler
2019/093 ( -- withdrawn -- )
Key Encapsulation Mechanism From Modular Multivariate Linear Equations
Muhammad Rezal Kamel Ariffin and Abderrahmane Nitaj and Yanbin Pan and Nur Azman Abu
2019/092 ( PDF )
Partitions in the S-Box of Streebog and Kuznyechik
Léo Perrin
2019/091 ( PDF )
Efficient Zero-Knowledge for NP from Secure Two-Party Computation
Li Hongda and Pan Dongxue and Ni Peifang
2019/090 ( PDF )
Round5: Compact and Fast Post-Quantum Public-Key Encryption
Hayo Baan and Sauvik Bhattacharya and Scott Fluhrer and Oscar Garcia-Morchon and Thijs Laarhoven and Ronald Rietman and Markku-Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang
2019/089 ( PDF )
The General Sieve Kernel and New Records in Lattice Reduction
Martin R. Albrecht and Léo Ducas and Gottfried Herold and Elena Kirshanova and Eamonn W. Postlethwaite and Marc Stevens
2019/088 ( PDF )
Continuous Key Agreement with Reduced Bandwidth
Nir Drucker and Shay Gueron
2019/087 ( PDF )
The Secure Link Prediction Problem
Laltu Sardar and Sushmita Ruj
2019/086 ( PDF )
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG
George Teseleanu
2019/085 ( PDF )
The Lattice-Based Digital Signature Scheme qTESLA
Erdem Alkim and Paulo S. L. M. Barreto and Nina Bindel and Juliane Kramer and Patrick Longa and Jefferson E. Ricardini
2019/084 ( PDF )
An Information Obfuscation Calculus for Encrypted Computing
Peter T. Breuer
2019/083 ( PDF )
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15
Zhen Liu and Yanbin Pan and Zhenfei Zhang
2019/082 ( PDF )
Arithmetic Garbling from Bilinear Maps
Nils Fleischhacker and Giulio Malavolta and Dominique Schröder
2019/081 ( PDF )
Practical Group-Signatures with Privacy-Friendly Openings
Stephan Krenn and Kai Samelin and Christoph Striecks
2019/080 ( PDF )
Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing
Aner Ben Efraim and Michael Nielsen and Eran Omri
2019/079 ( PDF )
New Results about the Boomerang Uniformity of Permutation Polynomials
Kangquan Li and Longjiang Qu and Bing Sun and Chao Li
2019/078 ( PDF )
Testing the Randomness of Cryptographic Function Mappings
Alan Kaminsky
2019/077 ( PDF )
Pairing Implementation Revisited
Michael Scott
2019/076 ( PDF )
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations
Matthieu Rivain and Junwei Wang
2019/075 ( PDF )
Assessment of the Key-Reuse Resilience of NewHope
Aurélie Bauer and Henri Gilbert and Guénaël Renault and Mélissa Rossi
2019/074 ( PDF )
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
Chun Guo and Jonathan Katz and Xiao Wang and Yu Yu
2019/073 ( PDF )
Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model
Cristian Hristea and Ferucio Laurentiu Tiplea
2019/072 ( PDF )
ZeroCT: Improving ZeroCoin with Confidential Transactions and more
Alex Vazquez
2019/071 ( PDF )
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks
Zhilin Zhang and Ke Wang and Weipeng Lin and Ada Wai-Chee Fu and Raymond Chi-Wing Wong
2019/070 ( PDF )
Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool
Sam M. Werner and Paul J. Pritz and Alexei Zamyatin and William J. Knottenbelt
2019/069 ( PDF )
Quantum Indistinguishability of Random Sponges
Jan Czajkowski and Andreas Hülsing and Christian Schaffner
2019/068 ( PDF )
Sampling the Integers with Low Relative Error
Michael Walter
2019/067 ( PDF )
Managing Your Kleptographic Subscription Plan
George Teseleanu
2019/066 ( PDF )
Publicly Verifiable Proofs from Blockchains
Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2019/065 ( PDF )
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols
Jan Camenisch and Manu Drijvers and Björn Tackmann
2019/064 ( PDF )
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management
Keita Emura and Takuya Hayashi
2019/063 ( PDF )
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup
Michael Backes and Lucjan Hanzlik and Amir Herzberg and Aniket Kate and Ivan Pryvalov
2019/062 ( PDF )
Additively Homomorphic IBE from Higher Residuosity
Michael Clear and Ciaran McGoldrick
2019/061 ( PDF )
SigAttack: New High-level SAT-based Attack on Logic Encryptions
Yuanqi Shen and You Li and Shuyu Kong and Amin Rezaei and Hai Zhou
2019/060 ( PDF )
CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States
Amin Rezaei and You Li and Yuanqi Shen and Shuyu Kong and Hai Zhou
2019/059 ( PDF )
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption
Yuanqi Shen and You Li and Amin Rezaei and Shuyu Kong and David Dlott and Hai Zhou
2019/058 ( PDF )
Tightly secure hierarchical identity-based encryption
Roman Langrehr and Jiaxin Pan
2019/057 ( PDF )
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts
Rafael del Pino and Vadim Lyubashevsky and Gregor Seiler
2019/056 ( PDF )
Obfuscating simple functionalities from knowledge assumptions
Ward Beullens and Hoeteck Wee
2019/055 ( PDF )
Rate-Optimizing Compilers for Continuously Non-Malleable Codes
Sandro Coretti and Antonio Faonio and Daniele Venturi
2019/054 ( PDF )
Deep Learning to Evaluate Secure RSA Implementations
Mathieu Carbone and Vincent Conin and Marie-Angela Cornelie and Francois Dassance and Guillaume Dufresne and Cecile Dumas and Emmanuel Prouff and Alexandre Venelli
2019/053 ( -- withdrawn -- )
A New Code-based Signature Scheme with Shorter Public Key
Yongcheng Song and Xinyi Huang and Yi Mu and Wei Wu
2019/052 ( PDF )
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/051 ( PDF )
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy
Daode Zhang and Jie Li and Bao Li and Xianhui Lu and Haiyang Xue and Dingding Jia and Yamin Liu
2019/050 ( PDF )
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions
Takahiro Matsuda and Kenta Takahashi and Takao Murakami and Goichiro Hanaoka
2019/049 ( PDF )
The Relationship between the Construction and Solution of the MILP Models and Applications
Lingchen Li and Wenling Wu and Yafei Zheng and Lei Zhang
2019/048 ( PDF )
Sub-logarithmic Distributed Oblivious RAM with Small Block Size
Eyal Kushilevitz and Tamer Mour
2019/047 ( PDF )
NIST Post-Quantum Cryptography- A Hardware Evaluation Study
Kanad Basu and Deepraj Soni and Mohammed Nabeel and Ramesh Karri
2019/046 ( PDF )
Block-Anti-Circulant Unbalanced Oil and Vinegar
Alan Szepieniec and Bart Preneel
2019/045 ( PDF )
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio
Ryo Nishimaki and Takashi Yamakawa
2019/044 ( PDF )
Toha Key Hardened Function
Ahmad Almorabea
2019/043 ( PDF )
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
Qian Guo and Thomas Johansson and Alexander Nilsson
2019/042 ( PDF )
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs
Lisa Kohl
2019/041 ( PDF )
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
Bartosz Zoltak
2019/040 ( PDF )
NTTRU: Truly Fast NTRU Using NTT
Vadim Lyubashevsky and Gregor Seiler
2019/039 ( PDF )
Fully Invisible Protean Signatures Schemes
Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2019/038 ( PDF )
Identity-based Broadcast Encryption with Efficient Revocation
Aijun Ge and Puwen Wei
2019/037 ( PDF )
Improving Attacks on Round-Reduced Speck32/64 using Deep Learning
Aron Gohr
2019/036 ( PDF )
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR
Shuichi Katsumata and Shota Yamada
2019/035 ( PDF )
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ
Carsten Baum and Daniele Cozzo and Nigel P. Smart
2019/034 ( PDF )
A Formal Treatment of Hardware Wallets
Myrto Arapinis and Andriana Gkaniatsou and Dimitris Karakostas and Aggelos Kiayias
2019/033 ( PDF )
FE for Inner Products and Its Application to Decentralized ABE
Zhedong Wang and Xiong Fan and Feng-Hao Liu
2019/032 ( PDF )
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation
Steven Galbraith and Jake Massimo and Kenneth G. Paterson
2019/031 ( PDF )
Collusion Resistant Broadcast and Trace from Positional Witness Encryption
Rishab Goyal and Satyanarayana Vusirikala and Brent Waters
2019/030 ( -- withdrawn -- )
Analysis of Two Countermeasures against the Signal Leakage Attack
Ke Wang and Zhenfeng Zhang
2019/029 ( -- withdrawn -- )
Upper Bound on $\lambda_1(\Lambda^{\bot}(\mathbf A))$
Huiwen Jia and Chunming Tang and Yanhua Zhang
2019/028 ( PDF )
nQUIC: Noise-Based QUIC Packet Protection
Mathias Hall-Andersen and David Wong and Nick Sullivan and Alishah Chator
2019/027 ( PDF )
Group Signatures with Selective Linkability
Lydia Garms and Anja Lehmann
2019/026 ( PDF )
Non-malleable encryption with proofs of plaintext knowledge and applications to voting
Ben Smyth and Yoshikazu Hanatani
2019/025 ( PDF )
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers
Yu Liu and Huicong Liang and Muzhou Li and Luning Huang and Kai Hu and Chenhe Yang and Meiqin Wang
2019/024 ( PDF )
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography
Yalin Chen and Jue-Sam Chou and Fang-Qi Zhou and Shu-Mei Hsu
2019/023 ( PDF )
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
Joachim Breitner and Nadia Heninger
2019/022 ( PDF )
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Anthony Demeri and Thomas Conroy and Alex Nolan and William Diehl
2019/021 ( PDF )
CryptoNote+
Ilya Aldanov
2019/020 ( PDF )
Decentralizing Inner-Product Functional Encryption
Michel Abdalla and Fabrice Benhamouda and Markulf Kolhweiss and Hendrik Waldner
2019/019 ( PDF )
Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach
Chunning Zhou and Wentao Zhang and Tianyou Ding and Zejun Xiang
2019/018 ( PDF )
Generic Constructions of Robustly Reusable Fuzzy Extractor
Yunhua Wen and Shengli Liu and Dawu Gu
2019/017 ( PDF )
CHURP: Dynamic-Committee Proactive Secret Sharing
Sai Krishna Deepak Maram and Fan Zhang and Lun Wang and Andrew Low and Yupeng Zhang and Ari Juels and Dawn Song
2019/016 ( PDF )
Fast Message Franking: From Invisible Salamanders to Encryptment
Yevgeniy Dodis and Paul Grubbs and Thomas Ristenpart and Joanne Woodage
2019/015 ( PDF )
More Efficient Algorithms for the NTRU Key Generation using the Field Norm
Thomas Pornin and Thomas Prest
2019/014 ( PDF )
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks
Gaurav Panwar and Satyajayant Misra and Roopa Vishwanathan
2019/013 ( PDF )
The Science of Guessing in Collision Optimized Divide-and-Conquer Attacks
Changhai Ou and Siew-Kei Lam and Guiyuan Jiang
2019/012 ( PDF )
A Proof of the Beierle-Kranz-Leander’s Conjecture related to Lightweight Multiplication in $F_{2^n}$
Sihem Mesnager and Kwang Ho Kim and Dujin Jo and Junyop Choe and Munhyon Han and Dok Nam Lee
2019/011 ( PDF )
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Paul Grubbs and Marie-Sarah Lacharité and Brice Minaud and Kenneth G. Paterson
2019/010 ( PDF )
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC
Rodrigo Abarzúa and Claudio Valencia and Julio López
2019/009 ( PDF )
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
Qian Guo and Thomas Johansson and Erik Mĺrtensson and Paul Stankovski Wagner
2019/008 ( PDF )
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
Jingyu Pan and Shivam Bhasin and Fan Zhang and Kui Ren
2019/007 ( PDF )
Tight Security Bounds for Generic Stream Cipher Constructions
Matthias Hamann and Matthias Krause
2019/006 ( PDF )
Minimizing Trust in Hardware Wallets with Two Factor Signatures
Antonio Marcedone and Rafael Pass and abhi shelat
2019/005 ( PDF )
ScanSAT: Unlocking Obfuscated Scan Chains
Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, and Ozgur Sinanoglu
2019/004 ( PDF )
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
Guillaume Dabosville and Houssem Maghrebi and Alexis Lhuillery and Julien Bringer and Thanh-Ha Le
2019/003 ( -- withdrawn -- )
Secure and Effective Logic Locking for Machine Learning Applications
Yuntao Liu and Yang Xie and Abhishek Charkraborty and Ankur Srivastava
2019/002 ( PDF )
Leakage-Resilient Group Signature: Definitions and Constructions
Jianye Huang and Qiong Huang
2019/001 ( PDF )
Sanctorum: A lightweight security monitor for secure enclaves
Ilia Lebedev and Kyle Hogan and Jules Drean and David Kohlbrenner and Dayeol Lee and Krste Asanović and Dawn Song and Srinivas Devadas
2018/1251 ( PDF )
Accountable Tracing Signatures from Lattices
San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu
2018/1250 ( PDF )
Function Private Predicate Encryption for Low Min-Entropy Predicates
Sikhar Patranabis and Debdeep Mukhopadhyay and Somindu C. Ramanna
2018/1249 ( PDF )
Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations
NingBo Li and TanPing Zhou and XiaoYuan Yang and YiLiang Han and Longfei Liu and WenChao Liu
2018/1248 ( PDF )
Fiat-Shamir: From Practice to Theory, Part II (NIZK and Correlation Intractability from Circular-Secure FHE)
Ran Canetti and Alex Lombardi and Daniel Wichs
2018/1247 ( PDF )
qSCMS: Post-quantum certificate provisioning process for V2X
Paulo S. L. M. Barreto and Jefferson E. Ricardini and Marcos A. Simplicio Jr. and Harsh Kupwade Patil
2018/1246 ( PDF )
Senopra: Reconciling Data Privacy and Utility via Attested Smart Contract Execution
Dat Le Tien and Frank Eliassen
2018/1245 ( PDF )
Multi-dimensional Packing for HEAAN for Approximate Matrix Arithmetics
Jung Hee Cheon and Andrey Kim and Donggeon Yhee
2018/1244 ( PDF )
Fully Deniable Interactive Encryption
Ran Canetti and Sunoo Park and Oxana Poburinnaya
2018/1243 ( -- withdrawn -- )
BoxDB: Realistic Adversary Model for Distance Bounding
Ioana Boureanu and David Gerault and Pascal Lafourcade
2018/1242 ( PDF )
Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions
Nicolas T. Courtois
2018/1241 ( PDF )
Universally Composable Accumulators
Foteini Baldimtsi and Ran Canetti and Sophia Yakoubov
2018/1240 ( -- withdrawn -- )
Jevil's Encryption Systems
Nadim Kobeissi
2018/1239 ( PDF )
Proof-of-Stake Sidechains
Peter GaĹľi and Aggelos Kiayias and Dionysis Zindros
2018/1238 ( PDF )
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform
Ye Yuan and Kazuhide Fukushima and Junting Xiao and Shinsaku Kiyomoto and Tsuyoshi Takagi
2018/1237 ( PDF )
Sum-of-Squares Meets Program Obfuscation, Revisited
Boaz Barak and Samuel B. Hopkins and Aayush Jain and Pravesh Kothari and Amit Sahai
2018/1236 ( PDF )
Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks
Mark Abspoel and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede
2018/1235 ( PDF )
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free
Adi Akavia and Craig Gentry and Shai Halevi and Max Leibovich
2018/1234 ( PDF )
FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers
Raymond K. Zhao and Ron Steinfeld and Amin Sakzad
2018/1233 ( PDF )
Key Assignment Scheme with Authenticated Encryption
Suyash Kandele and Souradyuti Paul
2018/1232 ( PDF )
Certificate Transparency Using Blockchain
D S V Madala and Mahabir Prasad Jhanwar and Anupam Chattopadhyay
2018/1231 ( PDF )
Post-quantum verifiable random functions from ring signatures
Endre Abraham
2018/1230 ( PDF )
Pooled Mining Makes Selfish Mining Tricky
Suhyeon Lee and Seungjoo Kim
2018/1229 ( PDF )
On Some Computational Problems in Local Fields
Yingpu Deng, Lixia Luo and Guanju Xiao
2018/1228 ( -- withdrawn -- )
Multi-Party Oblivious RAM based on Function Secret Sharing and Replicated Secret Sharing Arithmetic
Marina Blanton and Chen Yuan
2018/1227 ( PDF )
Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation
Louis Cianciullo and Hossein Ghodosi
2018/1226 ( PDF )
Boolean Exponent Splitting
Michael Tunstall and Louiza Papachristodoulou and Kostas Papagiannopoulos
2018/1225 ( PDF )
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V
Wen Wang and Bernhard Jungk and Julian Wälde and Shuwen Deng and Naina Gupta and Jakub Szefer and Ruben Niederhagen
2018/1224 ( PDF )
Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups
Essam Ghadafi
2018/1223 ( PDF )
Error Amplification in Code-based Cryptography
Alexander Nilsson and Thomas Johansson and Paul Stankovski Wagner
2018/1222 ( PDF )
Implementing Token-Based Obfuscation under (Ring) LWE
Cheng Chen and Nicholas Genise and Daniele Micciancio and Yuriy Polyakov and Kurt Rohloff
2018/1221 ( PDF )
Using the Cloud to Determine Key Strengths -- Triennial Update
M. Delcourt and T. Kleinjung and A.K. Lenstra and S. Nath and D. Page and N. Smart
2018/1220 ( PDF )
Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model
Taiga Mizuide and Atsushi Takayasu and Tsuyoshi Takagi
2018/1219 ( PDF )
Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property
Tomer Ashur and Raluca Posteuca
2018/1218 ( PDF )
Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications
Dan Boneh and Yuval Ishai and Alain Passelègue and Amit Sahai and David J. Wu
2018/1217 ( PDF )
Changing Points in APN Functions
Lilya Budaghyan and Claude Carlet and Tor Helleseth and Nikolay Kaleyski
2018/1216 ( PDF )
This is Not an Attack on Wave
Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
2018/1215 ( PDF )
New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves
Suhri Kim and Kisoon Yoon and Jihoon Kwon and Young-Ho Park and Seokhie Hong
2018/1214 ( PDF )
Instant Privacy-Preserving Biometric Authentication for Hamming Distance
Joohee Lee and Dongwoo Kim and Duhyeong Kim and Yongsoo Song and Junbum Shin and Jung Hee Cheon
2018/1213 ( PDF )
Deep Learning vs Template Attacks in front of fundamental targets: experimental study
Yevhenii ZOTKIN and Francis OLIVIER and Eric BOURBAO
2018/1212 ( PDF )
Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols
Itai Dinur and Niv Nadler
2018/1211 ( PDF )
Countering Block Withholding Attack Effciently
Suhyeon Lee and Seungjoo Kim
2018/1210 ( PDF )
MProve: A Proof of Reserves Protocol for Monero Exchanges
Arijit Dutta and Saravanan Vijayakumaran
2018/1209 ( PDF )
Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security
Min Liang
2018/1208 ( PDF )
Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications
Jun Xu and Santanu Sarkar and Lei Hu
2018/1207 ( PDF )
On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders
Nicolas Sendrier and Valentin Vasseur
2018/1206 ( PDF )
ARPA Whitepaper
Derek Zhang and Alex Su and Felix Xu and Jiang Chen
2018/1205 ( PDF )
Cryptanalysis of a code-based one-time signature
Jean-Christophe Deneuville and Philippe Gaborit
2018/1204 ( PDF )
The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing
Antonis Michalas
2018/1203 ( PDF )
DAGS: Reloaded Revisiting Dyadic Key Encapsulation
Gustavo Banegas and Paulo S. L. M. Barreto and Brice Odilon Boidje and Pierre-Louis Cayrel and Gilbert Ndollane Dione and Kris Gaj and Cheikh Thiecoumba Gueye and Richard Haeussler and Jean Belo Klamti and Ousmane N'diaye and Duc Tri Nguyen and Edoardo Persichetti and Jefferson E. Ricardini
2018/1202 ( PDF )
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems
Jihye Kim and Jiwon Lee and Hankyung Ko and Donghwan Oh and Semin Han and Kwonho Jeong and Hyunok Oh
2018/1201 ( PDF )
Subversion in Practice: How to Efficiently Undermine Signatures
Joonsang Baek and Willy Susilo and Jongkil Kim and Yang-Wai Chow
2018/1200 ( PDF )
On a Rank-Metric Code-Based Cryptosystem with Small Key Size
Julian Renner and Sven Puchinger and Antonia Wachter-Zeh
2018/1199 ( PDF )
Quantum Equivalence of the DLP and CDHP for Group Actions
Steven Galbraith and Lorenz Panny and Benjamin Smith and Frederik Vercauteren
2018/1198 ( PDF )
On Lions and Elligators: An efficient constant-time implementation of CSIDH
Michael Meyer and Fabio Campos and Steffen Reith
2018/1197 ( PDF )
Automated software protection for the masses against side-channel attacks
NICOLAS BELLEVILLE and DAMIEN COUROUSSÉ and KARINE HEYDEMANN and HENRI-PIERRE CHARLES
2018/1196 ( PDF )
Gradient Visualization for General Characterization in Profiling Attacks
Loďc Masure and Cécile Dumas and Emmanuel Prouff
2018/1195 ( PDF )
M&M: Masks and Macs against Physical Attacks
Lauren De Meyer and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
2018/1194 ( PDF )
On Degree-d Zero-Sum Sets of Full Rank
Christof Beierle and Alex Biryukov and Aleksei Udovenko
2018/1193 ( PDF )
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers
Gembu Ito and Akinori Hosoyamada and Ryutaroh Matsumoto and Yu Sasaki and Tetsu Iwata
2018/1192 ( PDF )
Durandal: a rank metric based signature scheme
Nicolas Aragon and Olivier Blazy and Philippe Gaborit and Adrien Hauteville and Gilles Zémor
2018/1191 ( PDF )
Cryptanalysis of 2-round KECCAK-384
Rajendra Kumar and Nikhil Mittal and Shashank Singh
2018/1190 ( PDF )
Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle)
Sanjit Chatterjee and Sayantan Mukherjee
2018/1189 ( PDF )
The Role of the Adversary Model in Applied Security Research
Quang Do and Ben Martini and Kim-Kwang Raymond Choo
2018/1188 ( PDF )
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains
Dan Boneh and Benedikt Bünz and Ben Fisch
2018/1187 ( PDF )
Automatic Search for A Variant of Division Property Using Three Subsets (Full Version)
Kai Hu and Meiqin Wang
2018/1186 ( PDF )
MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets
Senpeng Wang and Bin Hu and Jie Guan and Kai Zhang and Tairong Shi
2018/1185 ( PDF )
On Quantum Chosen-Ciphertext Attacks and Learning with Errors
Gorjan Alagic and Stacey Jeffery and Maris Ozols and Alexander Poremba
2018/1184 ( PDF )
Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity
Nasser Alsalami and Bingsheng Zhang
2018/1183 ( PDF )
Lossy Trapdoor Permutations with Improved Lossiness
Benedikt Auerbach and Eike Kiltz and Bertram Poettering and Stefan Schoenen
2018/1182 ( -- withdrawn -- )
Code-based Cryptosystem from Quasi-Cyclic Elliptic Codes
Fangguo Zhang and Zhuoran Zhang
2018/1181 ( PDF )
Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe
Christian Wittke and Ievgen Kabin and Dan Klann and Zoya Dyka and Anton Datsuk and Peter Langendoerfer
2018/1180 ( PDF )
Lattice-Based Signature from Key Consensus
Leixiao Cheng and Boru Gong and Yunlei Zhao
2018/1179 ( PDF )
Elliptic Curves in Generalized Huff's Model
Ronal Pranil Chand and Maheswara Rao Valluri
2018/1178 ( PDF )
Pseudo-Free Families of Computational Universal Algebras
Mikhail Anokhin
2018/1177 ( PDF )
Excalibur Key-Generation Protocols For DAG Hierarchic Decryption
Louis Goubin and Geraldine Monsalve and Juan Reutter and Francisco Vial Prado
2018/1176 ( PDF )
Downgradable Identity-based Encryption and Applications
Olivier Blazy and Paul Germouty and Duong Hieu Phan
2018/1175 ( PDF )
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
Ravishankar Borgaonkar and Lucca Hirschi and Shinjo Park and Altaf Shaik
2018/1174 ( PDF )
A Comparison of NTRU Variants
John M. Schanck
2018/1173 ( PDF )
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
Eyal Ronen and Robert Gillham and Daniel Genkin and Adi Shamir and David Wong and Yuval Yarom
2018/1172 ( PDF )
The impact of error dependencies on Ring/Mod-LWE/LWR based schemes
Jan-Pieter D'Anvers and Frederik Vercauteren and Ingrid Verbauwhede
2018/1171 ( PDF )
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion
Chenglu Jin and Marten van Dijk and Michael K. Reiter and Haibin Zhang
2018/1170 ( PDF )
Toward RSA-OAEP without Random Oracles
Nairen Cao and Adam O'Neill and Mohammad Zaheri
2018/1169 ( PDF )
Placing Conditional Disclosure of Secrets in the Communication Complexity Universe
Benny Applebaum and Prashant Nalini Vasudevan
2018/1168 ( PDF )
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
Shangqi Lai and Sikhar Patranabis and Amin Sakzad and Joseph K. Liu and Debdeep Mukhopadhyay and Ron Steinfeld and Shi-Feng Sun and Dongxi Liu and Cong Zuo
2018/1167 ( PDF )
On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission
Ravi Kishore and Ashutosh Kumar and Chiranjeevi Vanarasa and Kannan Srinathan
2018/1166 ( PDF )
Keeping Time-Release Secrets through Smart Contracts
Jianting Ning and Hung Dang and Ruomu Hou and Ee-Chien Chang
2018/1165 ( PDF )
Identity-Concealed Authenticated Encryption and Key Exchange
Yunlei Zhao
2018/1164 ( PDF )
Can you sign a quantum state
Gorjan Alagic and Tommaso Gagliardoni and Christian Majenz
2018/1163 ( PDF )
More on sliding right
Joachim Breitner
2018/1162 ( PDF )
On the Concrete Security of Goldreich’s Pseudorandom Generator
Geoffroy Couteau and Aurélien Dupin and Pierrick Méaux and Mélissa Rossi and Yann Rotella
2018/1161 ( PDF )
Adaptively Secure MPC with Sublinear Communication Complexity
Ran Cohen and abhi shelat and Daniel Wichs
2018/1160 ( PDF )
Algebraic normal form of a bent function: properties and restrictions
Natalia Tokareva
2018/1159 ( PDF )
Improved upper bound on root number of linearized polynomials and its application to nonlinearity estimation of Boolean functions
Sihem Mesnager and Kwang Ho Kim and Myong Song Jo
2018/1158 ( PDF )
Adversarially Robust Property Preserving Hash Functions
Elette Boyle and Rio LaVigne and Vinod Vaikuntanathan
2018/1157 ( PDF )
Special Soundness Revisited
Douglas Wikström
2018/1156 ( PDF )
Towards Round-Optimal Secure Multiparty Computations: Multikey FHE without a CRS
Eunkyung Kim and Hyang-Sook Lee and Jeongeun Park
2018/1155 ( PDF )
Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption
Pedro Branco and Jintai Ding and Manuel Goulăo and Paulo Mateus
2018/1154 ( PDF )
Leakage Resilient Secret Sharing and Applications
Akshayaram Srinivasan and Prashant Nalini Vasudevan
2018/1153 ( PDF )
Dfinity Consensus, Explored
Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren
2018/1152 ( PDF )
Improvements of Blockchain’s Block Broadcasting:An Incentive Approach
Qingzhao Zhang and Yijun Leng and Lei Fan
2018/1151 ( PDF )
Analysis Of The Simulatability Of An Oblivious Transfer
Bing Zeng
2018/1150 ( PDF )
Quantum-secure message authentication via blind-unforgeability
Gorjan Alagic and Christian Majenz and Alexander Russell and Fang Song
2018/1149 ( PDF )
Compressive Sensing based Leakage Sampling and Reconstruction: A First Study
Changhai Ou and Chengju Zhou and Siew-Kei Lam
2018/1148 ( PDF )
Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token
Mirosław Kutyłowski and Lucjan Hanzlik and Kamil Kluczniak
2018/1147 ( PDF )
Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures
Divesh Aggarwal and Ivan Damgard and Jesper Buus Nielsen and Maciej Obremski and Erick Purwanto and Joao Ribeiro and Mark Simkin
2018/1146 ( -- withdrawn -- )
Functional Analysis Attacks on Logic Locking
Deepak Sirone and Pramod Subramanyan
2018/1145 ( PDF )
Privacy Computing: Concept, Computing Framework And Future Development Trends
Fenghua Li and Hui Li and Ben Niu and Jinjun Chen
2018/1144 ( PDF )
Revisiting Non-Malleable Secret Sharing
Saikrishna Badrinarayanan and Akshayaram Srinivasan
2018/1143 ( PDF )
A new SNOW stream cipher called SNOW-V
Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang
2018/1142 ( PDF )
Factoring Products of Braids via Garside Normal Form
Simon-Philipp Merz and Christophe Petit
2018/1141 ( PDF )
Fast Authentication from Aggregate Signatures with Improved Security
Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz
2018/1140 ( PDF )
Efficient Fully-Leakage Resilient One-More Signature Schemes
Antonio Faonio
2018/1139 ( PDF )
Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities and its Applications
Kexin Hu and Zhenfeng Zhang and Kaiven Guo
2018/1138 ( PDF )
Leakage-Resilient Secret Sharing
Ashutosh Kumar and Raghu Meka and Amit Sahai
2018/1137 ( PDF )
Genus 2 curves with given split Jacobian
Jasper Scholten
2018/1136 ( PDF )
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model
S. Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan
2018/1135 ( PDF )
PoTS - A Secure Proof of TEE-Stake for Permissionless Blockchains
Sébastien Andreina and Jens-Matthias Bohli and Ghassan O. Karame and Wenting Li and Giorgia Azzurra Marson
2018/1134 ( PDF )
Echoes of the Past: Recovering Blockchain Metrics From Merged Mining
Nicholas Stifter and Philipp Schindler and Aljosha Judmayer and Alexei Zamyatin and Andreas Kern and Edgar Weippl
2018/1133 ( PDF )
A Public Key Exchange Cryptosystem Based on Ideal Secrecy
Vamshi Krishna Kammadanam and Virendra R. Sule and Yi Hong
2018/1132 ( PDF )
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake
Thomas Kerber and Markulf Kohlweiss and Aggelos Kiayias and Vassilis Zikas
2018/1131 ( PDF )
A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme
Arinjita Paul and Varshika Srinivasavaradhan and S. Sharmila Deva Selvi and C. Pandu Rangan
2018/1130 ( PDF )
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
Ashwin Jha and Mridul Nandi
2018/1129 ( PDF )
On Kilian's Randomization of Multilinear Map Encodings
Jean-Sebastien Coron and Hilder V. L. Pereira
2018/1128 ( PDF )
Direct Anonymous Attestation with Optimal TPM Signing Efficiency
Kang Yang and Liqun Chen and Zhenfeng Zhang and Christopher J.P. Newton and Bo Yang and Li Xi
2018/1127 ( PDF )
Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks
P. Arun Babu and Jithin Jose Thomas
2018/1126 ( PDF )
Lightweight AE and HASH in a Single Round Function
Dingfeng Ye and Danping Shi and Peng Wang
2018/1125 ( PDF )
Verifying liquidity of Bitcoin contracts
Massimo Bartoletti and Roberto Zunino
2018/1124 ( PDF )
Secure Opportunistic Multipath Key Exchange
Sergiu Costea and Marios O. Choudary and Doru Gucea and Björn Tackmann and Costin Raiciu
2018/1123 ( PDF )
When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis
Stjepan Picek and Annelie Heuser and Cesare Alippi and Francesco Regazzoni
2018/1122 ( PDF )
Improved Quantum Multicollision-Finding Algorithm
Akinori Hosoyamada and Yu Sasaki and Seiichiro Tani and Keita Xagawa
2018/1121 ( PDF )
An Analysis of the ProtonMail Cryptographic Architecture
Nadim Kobeissi
2018/1120 ( PDF )
Organizational Cryptography for Access Control
Masahito Gotaishi and Shigeo Tsujii
2018/1119 ( PDF )
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition
Matthias Fitzi and Peter Gaži and Aggelos Kiayias and Alexander Russell
2018/1118 ( PDF )
Non-Interactive Non-Malleability from Quantum Supremacy
Yael Tauman Kalai and Dakshita Khurana
2018/1117 ( PDF )
A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness
Felix Wegener and Amir Moradi
2018/1116 ( PDF )
Fly, you fool! Faster Frodo for the ARM Cortex-M4
Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam
2018/1115 ( PDF )
Group Signature without Random Oracles from Randomizable Signatures
Remi Clarisse and Olivier Sanders
2018/1114 ( PDF )
Lightweight Circuits with Shift and Swap
Subhadeep Banik and Francesco Regazzoni and Serge Vaudenay
2018/1113 ( PDF )
Private Function Evaluation with Cards
Alexander Koch and Stefan Walzer
2018/1112 ( PDF )
DEXON: A Highly Scalable, Decentralized DAG-Based Consensus Algorithm
Tai-Yuan Chen and Wei-Ning Huang and Po-Chun Kuo and Hao Chung and Tzu-Wei Chao
2018/1111 ( -- withdrawn -- )
Cryptanalysis of the Wave Signature Scheme
Paulo S. L. M. Barreto and Edoardo Persichetti
2018/1110 ( PDF )
Minting Mechanisms for Blockchain -- or -- Moving from Cryptoassets to Cryptocurrencies
Dominic Deuber and Nico Döttling and Bernardo Magri and Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan
2018/1109 ( PDF )
Faster SeaSign signatures through improved rejection sampling
Thomas Decru and Lorenz Panny and Frederik Vercauteren
2018/1108 ( PDF )
Covert Security with Public Verifiability: Faster, Leaner, and Simpler
Cheng Hong and Jonathan Katz and Vladimir Kolesnikov and Wen-jie Lu and Xiao Wang
2018/1107 ( PDF )
Further observations on SIMON and SPECK families of block ciphers
S. M. Dehnavi
2018/1106 ( PDF )
P4TC—Provably-Secure yet Practical Privacy-Preserving Toll Collection
Valerie Fetzer and Max Hoffmann and Matthias Nagel and Andy Rupp and Rebecca Schwerdt
2018/1105 ( PDF )
Proof-of-Stake Protocols for Privacy-Aware Blockchains
Chaya Ganesh and Claudio Orlandi and Daniel Tschudi
2018/1104 ( PDF )
Tropical cryptography II: extensions by homomorphisms
Dima Grigoriev and Vladimir Shpilrain
2018/1103 ( PDF )
Some Properties of Modular Addition
Victoria Vysotskaya
2018/1102 ( PDF )
A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing
Mohammad Ali and Javad Mohajeri and Mohammad-Reza Sadeghi
2018/1101 ( PDF )
Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments
Lunzhi Deng
2018/1100 ( PDF )
Correction to "Improving the DGK comparison protocol"
Thijs Veugen
2018/1099 ( PDF )
SoK: Modular and Efficient Private Decision Tree Evaluation
Ágnes Kiss and Masoud Naderpour and Jian Liu and N. Asokan and Thomas Schneider
2018/1098 ( PDF )
MARVELlous: a STARK-Friendly Family of Cryptographic Primitives
Tomer Ashur and Siemen Dhooghe
2018/1097 ( PDF )
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
Michael Schliep and Nicholas Hopper
2018/1096 ( PDF )
On Finding Quantum Multi-collisions
Qipeng Liu and Mark Zhandry
2018/1095 ( PDF )
Scalable One-Time Pad --- From Information Theoretic Security to Information Conservational Security
Wen-Ran Zhang
2018/1094 ( PDF )
Match Me if You Can: Matchmaking Encryption and its Applications
Giuseppe Ateniese and Danilo Francati and David Nuńez and Daniele Venturi
2018/1093 ( PDF )
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima
2018/1092 ( PDF )
Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
Felix Wegener and Christian Baiker and Amir Moradi
2018/1091 ( PDF )
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions
Keisuke Hara and Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka
2018/1090 ( PDF )
Plaintext Recovery Attack of OCB2
Tetsu Iwata
2018/1089 ( PDF )
On the impact of decryption failures on the security of LWE/LWR based schemes
Jan-Pieter D'Anvers and Frederik Vercauteren and Ingrid Verbauwhede
2018/1088 ( PDF )
High-speed Side-channel-protected Encryption and Authentication in Hardware
Nele Mentens and Vojtech Miskovsky and Martin Novotny and Jo Vliegen
2018/1087 ( PDF )
Breaking the confidentiality of OCB2
Bertram Poettering
2018/1086 ( PDF )
Two Party Distribution Testing: Communication and Security
Alexandr Andoni and Tal Malkin and Negev Shekel Nosatzki
2018/1085 ( PDF )
Exact maximum expected differential and linear probability for 2-round Kuznyechik
Vitaly Kiryukhin
2018/1084 ( PDF )
A Deep Dive into Blockchain Selfish Mining
Qianlan Bai and Xinyan Zhou and Xing Wang and Yuedong Xu and Xin Wang and Qingsheng Kong
2018/1083 ( PDF )
Private Stateful Information Retrieval
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2018/1082 ( PDF )
An Algebraic Method to Recover Superpolies in Cube Attacks
Chen-Dong Ye and Tian Tian
2018/1081 ( PDF )
Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map
Jung Hee Cheon and Wonhee Cho and Minki Hhan and Jiseung Kim and Changmin Lee
2018/1080 ( PDF )
How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation
Yiwen Gao and Yongbin Zhou and Wei Cheng
2018/1079 ( PDF )
Analysis of Deterministic Longest-Chain Protocols
Elaine Shi
2018/1078 ( PDF )
Two Round Information-Theoretic MPC with Malicious Security
Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain
2018/1077 ( PDF )
More Efficient Lattice PRFs from Keyed Pseudorandom Synthesizers
Hart Montgomery
2018/1076 ( PDF )
Game Theoretic Notions of Fairness in Multi-Party Coin Toss
Kai-Min Chung and Yue Guo and Wei-Kai Lin and Rafael Pass and Elaine Shi
2018/1075 ( -- withdrawn -- )
Rectangle and Impossible-differential Cryptanalysis on Versions of ForkAES
Jannis Bossert and Eik List and Stefan Lucks
2018/1074 ( PDF )
Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication
Felix Wegener and Amir Moradi
2018/1073 ( PDF )
Faster Homomorphic Discrete Fourier Transforms and Improved FHE Bootstrapping
Jung Hee Cheon and Kyoohyung Han and Minki Hhan
2018/1072 ( PDF )
Construction of MDS Matrices from Generalized Feistel Structures
Mahdi Sajadieh and Mohsen Mousavi
2018/1071 ( PDF )
CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain
Murat Yasin Kubilay and Mehmet Sabir Kiraz and Haci Ali Mantar
2018/1070 ( PDF )
A New Batch FHE Scheme over the Integers
Kwak Wi Song and Kim Chol Un
2018/1069 ( PDF )
Non-Malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering
Eshan Chattopadhyay and Xin Li
2018/1068 ( PDF )
Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience
Dana Dachman-Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi
2018/1067 ( PDF )
On Quantum Slide Attacks
Xavier Bonnetain and María Naya-Plasencia and André Schrottenloher
2018/1066 ( PDF )
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness
Akinori Hosoyamada and Takashi Yamakawa
2018/1065 ( PDF )
Homomorphic Secret Sharing for Low Degree Polynomials
Russell W. F. Lai and Giulio Malavolta and Dominique Schröder
2018/1064 ( PDF )
Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction
Nithyashankari Gummidipoondi Jayasankaran and Adriana Sanabria Borbon and Edgar Sanchez-Sinencio and Jiang Hu and Jeyavijayan Rajendran
2018/1063 ( PDF )
Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset
Mashael AlSabah and Gabriele Oligeri and Ryan Riley
2018/1062 ( PDF )
DAGsim: Simulation of DAG-based distributed ledger protocols
Manuel Zander and Tom Waite and Dominik Harz
2018/1061 ( PDF )
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks
Behnam Zahednejad and Majid Bayat and Ashok Kumar Das
2018/1060 ( PDF )
Port Contention for Fun and Profit
Alejandro Cabrera Aldaya and Billy Bob Brumley and Sohaib ul Hassan and Cesar Pereida García and Nicola Tuveri
2018/1059 ( PDF )
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
Daniel J. Bernstein and Tanja Lange and Chloe Martindale and Lorenz Panny
2018/1058 ( PDF )
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification
Yuzhao Cui and Qiong Huang and Jianye Huang and Hongbo Li and Guomin Yang
2018/1057 ( PDF )
Limiting the impact of unreliable randomness in deployed security protocols
Liliya Akhmetzyanova and Cas Cremers and Luke Garratt and Stanislav V. Smyshlyaev and Nick Sullivan
2018/1056 ( PDF )
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs
Ahmad Al Badawi and Jin Chao and Jie Lin and Chan Fook Mun and Jun Jie Sim and Benjamin Hong Meng Tan and Xiao Nan and Khin Mi Mi Aung and Vijay Ramaseshan Chandrasekhar
2018/1055 ( PDF )
Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation
Pan Dongxue and Li Hongda and Ni Peifang
2018/1054 ( PDF )
Efficient Multi-key FHE with short extended ciphertexts and less public parameters
Tanping Zhou and Ningbo Li and Xiaoyuan Yang and Yiliang Han and Wenchao Liu
2018/1053 ( PDF )
Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation
Jothi Rangasamy and Lakshmi Kuppusamy
2018/1052 ( PDF )
Verifiability Analysis of CHVote
David Bernhard and Véronique Cortier and Pierrick Gaudry and Mathieu Turuani and Bogdan Warinschi
2018/1051 ( PDF )
Lower Bounds for Differentially Private RAMs
Giuseppe Persiano and Kevin Yeo
2018/1050 ( PDF )
Towards Automatically Penalizing Multimedia Breaches
Easwar Vivek Mangipudi and Krutarth Rao and Jeremy Clark and Aniket Kate
2018/1049 ( PDF )
Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol
Aggelos Kiayias and Alexander Russell
2018/1048 ( PDF )
Proof-of-Work Sidechains
Aggelos Kiayias and Dionysis Zindros
2018/1047 ( PDF )
On the Linear Transformation in White-box Cryptography
Seungkwang Lee and Nam-su Jho and Myungchul Kim
2018/1046 ( PDF )
Constructing Infinite Families of Low Differential Uniformity $(n,m)$-Functions with $m>n/2$
Claude Carlet and Xi Chen* and Longjiang Qu
2018/1045 ( PDF )
MPC Joins the Dark Side
John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui
2018/1044 ( PDF )
Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions
Masahito Ishizaka and Kanta Matsuura
2018/1043 ( PDF )
Improved Bootstrapping for Approximate Homomorphic Encryption
Hao Chen and Ilaria Chillotti and Yongsoo Song
2018/1042 ( PDF )
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller
Brice Colombier and Alexandre Menu and Jean-Max Dutertre and Pierre-Alain Moëllic and Jean-Baptiste Rigaud and Jean-Luc Danger
2018/1041 ( PDF )
Secure Outsourced Matrix Computation and Application to Neural Networks
Xiaoqian Jiang and Miran Kim and Kristin Lauter and Yongsoo Song
2018/1040 ( PDF )
Cryptanalysis of OCB2
Akiko Inoue and Kazuhiko Minematsu
2018/1039 ( PDF )
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble
Georg Fuchsbauer and Michele Orrů and Yannick Seurin
2018/1038 ( PDF )
On inversion modulo pseudo-Mersenne primes
Michael Scott
2018/1037 ( PDF )
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
Joël Alwen and Sandro Coretti and Yevgeniy Dodis
2018/1036 ( PDF )
If a Generalised Butterfly is APN then it Operates on 6 Bits
Anne Canteaut and Léo Perrin and Shizhu Tian
2018/1035 ( PDF )
Relating different Polynomial-LWE problems
Madalina Bolboceanu
2018/1034 ( PDF )
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme
Michael Kraitsberg and Yehuda Lindell and Valery Osheter and Nigel P. Smart and Younes Talibi Alaoui
2018/1033 ( PDF )
One-Round Authenticated Group Key Exchange from Isogenies
Atsushi Fujioka and Katsuyuki Takashima and Kazuki Yoneyama
2018/1032 ( PDF )
Conditionals in Homomorphic Encryption and Machine Learning Applications
Diego Chialva and Ann Dooms
2018/1031 ( PDF )
Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking
Roderick Bloem and Rinat Iusupov and Martin Krenn and Stefan Mangard
2018/1030 ( PDF )
Registration-Based Encryption from Standard Assumptions
Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi and Sruthi Sekar
2018/1029 ( PDF )
Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations
Zhe Li and Chaoping Xing and Sze Ling Yeo
2018/1028 ( PDF )
Synchronous Byzantine Agreement with Expected $O(1)$ Rounds, Expected $O(n^2)$ Communication, and Optimal Resilience
Ittai Abraham and Srinivas Devadas and Danny Dolev and Kartik Nayak and Ling Ren
2018/1027 ( PDF )
A Unified Security Perspective on Legally Fair Contract Signing Protocols
Diana Maimut and George Teseleanu
2018/1026 ( PDF )
Pairing-Friendly Twisted Hessian Curves
Chitchanok Chuengsatiansup and Chloe Martindale
2018/1025 ( PDF )
Integer Matrices Homomorphic Encryption and Its application
Yanan Bai and Jingwei Chen and Yong Feng and Wenyuan Wu
2018/1024 ( PDF )
ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution
Karl Wüst and Sinisa Matetic and Moritz Schneider and Ian Miers and Kari Kostiainen and Srdjan Capkun
2018/1023 ( PDF )
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis
Jaehun Kim and Stjepan Picek and Annelie Heuser and Shivam Bhasin and Alan Hanjalic
2018/1022 ( PDF )
Blind Certificate Authorities
Liang Wang and Gilad Asharov and Rafael Pass and Thomas Ristenpart and abhi shelat
2018/1021 ( PDF )
Multi-Client Functional Encryption with Repetition for Inner Product
Jérémy Chotard and Edouard Dufour Sans and Romain Gay and Duong Hieu Phan and David Pointcheval
2018/1020 ( PDF )
Non-Interactive Secure Computation from One-Way Functions
Saikrishna Badrinarayanan and Abhishek Jain and Rafail Ostrovsky and Ivan Visconti
2018/1019 ( PDF )
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data
Chloé Hébant and Duong Hieu Phan and David Pointcheval
2018/1018 ( PDF )
Faster multiplication in $\mathbb{Z}_{2^m}[x]$ on Cortex-M4 to speed up NIST PQC candidates
Matthias J. Kannwischer and Joost Rijneveld and Peter Schwabe
2018/1017 ( PDF )
TNFS Resistant Families of Pairing-Friendly Elliptic Curves
Georgios Fotiadis and Elisavet Konstantinou
2018/1016 ( PDF )
Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol
Gerben Geltink
2018/1015 ( PDF )
Non-Malleable Codes Against Bounded Polynomial Time Tampering
Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Huijia Lin and Tal Malkin
2018/1014 ( PDF )
An FPGA-based programmable processor for bilinear pairings
Eduardo Cuevas-Farfán and Miguel Morales-Sandoval and René Cumplido
2018/1013 ( PDF )
E3: A Framework for Compiling C++ Programs with Encrypted Operands
Eduardo Chielle and Oleg Mazonka and Homer Gamil and Sanja Kastratovic and Nektarios Georgios Tsoutsos and Michail Maniatakos
2018/1012 ( PDF )
The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE
Guido Bertoni and Joan Daemen and Seth Hoffert and Michaël Peeters and Gilles Van Assche and Ronny Van Keer
2018/1011 ( PDF )
BISON - Instantiating the Whitened Swap-Or-Not Construction
Anne Canteaut and Virginie Lallemand and Gregor Leander and Patrick Neumann and Friedrich Wiemer
2018/1010 ( PDF )
Space Efficient Computational Multi-Secret Sharing and Its Applications
Aggelos Kiayias and Murat Osmanoglu and Alexander Russell and Qiang Tang
2018/1009 ( PDF )
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus
Xianhui Lu and Yamin Liu and Zhenfei Zhang and Dingding Jia and Haiyang Xue and Jingnan He and Bao Li and Kunpeng Wang
2018/1007 ( PDF )
Masking the AES with Only Two Random Bits
Hannes Gross and Ko Stoffelen and Lauren De Meyer and Martin Krenn and Stefan Mangard
2018/1005 ( PDF )
Code Offset in the Exponent
Luke Demarest and Benjamin Fuller and Alexander Russell
2018/1004 ( PDF )
Fiat-Shamir From Simpler Assumptions
Ran Canetti and Yilei Chen and Justin Holmgren and Alex Lombardi and Guy N. Rothblum and Ron D. Rothblum
2018/1003 ( PDF )
Secure Data Retrieval On The Cloud: Homomorphic Encryption Meets Coresets
Adi Akavia and Dan Feldman and Hayim Shaul
2018/1002 ( PDF )
"S-Box" Implementation of AES is NOT side-channel resistant
C Ashokkumar and Bholanath Roy and M Bhargav Sri Venkatesh and Bernard L Menezes
2018/1001 ( PDF )
Illuminating the Dark or how to recover what should not be seen in FE-based classifiers
Sergiu Carpov and Caroline Fontaine and Damien Ligier and Renaud Sirdey
2018/1000 ( PDF )
Adaptively Single-Key Secure Constrained PRFs for NC1
Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2018/999 ( PDF )
A Refinement of ``A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018
Ximing Fu and Xiaoyun Wang and Xiaoyang Dong and Willi Meier and Yonglin Hao and Boxin Zhao
2018/998 ( -- withdrawn -- )
A Key Recovery Attack on Streamlined NTRU Prime
Chen Li
2018/997 ( PDF )
Turning HATE Into LOVE: Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
Leonid Reyzin and Adam Smith and Sophia Yakoubov
2018/996 ( PDF )
Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes
Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
2018/995 ( PDF )
Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE
Shuai Zhou and Haiyang Xue and Daode Zhang and Kunpeng Wang and Xianhui Lu and Bao Li and Jingnan He
2018/994 ( PDF )
People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes
Long Chen and Qiang Tang
2018/993 ( PDF )
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization
Viet Tung Hoang and Stefano Tessaro and Aishwarya Thiruvengadam
2018/992 ( PDF )
Deconstructing the Blockchain to Approach Physical Limits
Vivek Bagaria and Sreeram Kannan and David Tse and Giulia Fanti and Pramod Viswanath
2018/991 ( PDF )
Reconsidering Generic Composition: the Tag-then-Encrypt case
Francesco Berti and Olivier Pereira and Thomas Peters
2018/990 ( PDF )
Quisquis: A New Design for Anonymous Cryptocurrencies
Prastudy Fauzi and Sarah Meiklejohn and Rebekah Mercer and Claudio Orlandi
2018/989 ( PDF )
Kleptography trapdoor free cryptographic protocols
Bohdan Kovalenko and Anton Kudin
2018/988 ( PDF )
On the Hardness of Learning With Errors with Binary Secrets
Daniele Micciancio
2018/987 ( PDF )
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody
Yehuda Lindell and Ariel Nof and Samuel Ranellucci
2018/986 ( PDF )
Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs
Sam Kim and David J. Wu
2018/985 ( PDF )
Efficient Arithmetic In (Pseudo-)Mersenne Prime Order Fields
Kaushik Nath and Palash Sarkar
2018/984 ( PDF )
Pseudorandomness Against Mean and Variance Bounded Attackers
Maciej Skorski
2018/983 ( PDF )
Efficient UC Commitment Extension with Homomorphism for Free (and Applications)
Ignacio Cascudo and Ivan Damgĺrd and Bernardo David and Nico Döttling and Rafael Dowsley and Irene Giacomelli
2018/982 ( PDF )
Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance
Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada
2018/981 ( PDF )
PaLa: A Simple Partially Synchronous Blockchain
T-H. Hubert Chan and Rafael Pass and Elaine Shi
2018/980 ( PDF )
PiLi: An Extremely Simple Synchronous Blockchain
T-H. Hubert Chan and Rafael Pass and Elaine Shi
2018/979 ( PDF )
FPGA-based Assessment of Midori and GIFT Lightweight Block Ciphers
Carlos Andres Lara-Nino and Arturo Diaz-Perez and Miguel Morales-Sandoval
2018/978 ( PDF )
Encrypted Multi-Maps with Computationally-Secure Leakage
Seny Kamara and Tarik Moataz
2018/977 ( PDF )
Threshold Single Password Authentication
Devriş İşler and Alptekin Küpçü
2018/976 ( PDF )
Distributed Single Password Protocol Framework
Devriş İşler and Alptekin Küpçü
2018/975 ( PDF )
User Study on Single Password Authentication
Devriş İşler and Alptekin Küpçü and Aykut Coskun
2018/974 ( PDF )
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously
Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka and Takashi Yamakawa
2018/973 ( PDF )
How to leverage hardness of constant-degree expanding polynomials over $\mathbb{R}$ to build iO
Aayush Jain and Amit Sahai
2018/972 ( PDF )
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18
Yonglin Hao and Lin Jiao and Chaoyun Li and Willi Meier and Yosuke Todo and Qingju Wang
2018/971 ( PDF )
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications
Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2018/970 ( PDF )
Protean Signature Schemes
Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2018/969 ( PDF )
Optimal TNFS-secure pairings on elliptic curves with even embedding degree
Georgios Fotiadis and Chloe Martindale
2018/968 ( PDF )
Edrax: A Cryptocurrency with Stateless Transaction Validation
Alexander Chepurnoy and Charalampos Papamanthou and Shravan Srinivasan and Yupeng Zhang
2018/967 ( PDF )
Higher dimensional sieving for the number field sieve algorithms
Laurent Grémy
2018/966 ( PDF )
On the Security of the Multivariate Ring Learning with Errors Problem
Carl Bootland and Wouter Castryck and Frederik Vercauteren
2018/965 ( PDF )
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
Paul Grubbs and Marie-Sarah Lacharité and Brice Minaud and Kenny Paterson
2018/964 ( PDF )
Fast Scalar Multiplication for Elliptic Curves over Prime Fields by Efficiently Computable Formulas
Saud Al Musa and Guangwu Xu
2018/963 ( PDF )
On Enabling Attribute-Based Encryption to Be Traceable against Traitors
Zhen Liu and Qiong Huang and Duncan S. Wong
2018/962 ( PDF )
Zexe: Enabling Decentralized Private Computation
Sean Bowe and Alessandro Chiesa and Matthew Green and Ian Miers and Pratyush Mishra and Howard Wu
2018/961 ( PDF )
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs
Shaofeng Zhu and Hua Chen and Limin Fan and Meihui Chen and Wei Xi and Dengguo Feng
2018/960 ( PDF )
Towards Quantum One-Time Memories from Stateless Hardware
Anne Broadbent and Sevag Gharibian and Hong-Sheng Zhou
2018/959 ( PDF )
Information Entropy Based Leakage Certification
Changhai Ou and Xinping Zhou and Siew-Kei Lam
2018/958 ( PDF )
On Tightly Secure Primitives in the Multi-Instance Setting
Dennis Hofheinz and Ngoc Khanh Nguyen
2018/957 ( PDF )
Same Point Composable and Nonmalleable Obfuscated Point Functions
Peter Fenteany and Benjamin Fuller
2018/956 ( PDF )
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
Zhen Liu and Guomin Yang and Duncan S. Wong and Khoa Nguyen and Huaxiong Wang
2018/955 ( PDF )
Compact Sparse Merkle Trees
Faraz Haider
2018/954 ( PDF )
Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging
Daniel Jost and Ueli Maurer and Marta Mularczyk
2018/953 ( PDF )
A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols
Dmytro Bogatov and George Kollios and Leonid Reyzin
2018/952 ( PDF )
Approximate Homomorphic Encryption over the Conjugate-invariant Ring
Duhyeong Kim and Yongsoo Song
2018/951 ( PDF )
The Landscape of Optimal Card-based Protocols
Alexander Koch
2018/950 ( PDF )
Security bound for CTR-ACPKM internally re-keyed encryption mode
Liliya R. Akhmetzyanova, and Evgeny K. Alekseev, and Stanislav V. Smyshlyaev
2018/949 ( PDF )
Constructing TI-Friendly Substitution Boxes using Shift-Invariant Permutations
Si Gao and Arnab Roy and and Elisabeth Oswald
2018/948 ( PDF )
MILP-Based Automatic Differential Searches for LEA and HIGHT
Elnaz Bagherzadeh and Zahra Ahmadian
2018/947 ( PDF )
On the security of Circulant UOV/Rainbow
Yasufumi Hashimoto
2018/946 ( PDF )
Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More
Nicholas Genise and Daniele Micciancio and Yuriy Polyakov
2018/945 ( PDF )
On the Inner Product Predicate and a Generalization of Matching Vector Families
Balthazar Bauer and Jevgēnijs Vihrovs and Hoeteck Wee
2018/944 ( PDF )
Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions
Jeremiah Blocki and Ben Harsha and Siteng Kang and Seunghoon Lee and Lu Xing and Samson Zhou
2018/943 ( PDF )
Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound
Shuoyao Zhao and Yu Yu and Jiang Zhang and Hanlin Liu
2018/942 ( PDF )
Insured MPC: Efficient Secure Computation with Financial Penalties
Carsten Baum and Bernardo David and Rafael Dowsley
2018/941 ( PDF )
A tutorial introduction to CryptHOL
Andreas Lochbihler and S. Reza Sefidgar
2018/940 ( PDF )
Reusable Non-Interactive Secure Computation
Melissa Chase and Yevgeniy Dodis and Yuval Ishai and Daniel Kraschewski and Tianren Liu and Rafail Ostrovsky and Vinod Vaikuntanathan
2018/939 ( PDF )
The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms
Marcella Hastings and Nadia Heninger and Eric Wustrow
2018/938 ( PDF )
Private Message Franking with After Opening Privacy
Iraklis Leontiadis and Serge Vaudenay
2018/937 ( PDF )
Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys
Mathias Wagner and Stefan Heyse
2018/936 ( PDF )
New Techniques for Obfuscating Conjunctions
James Bartusek and Tancrčde Lepoint and Fermi Ma and Mark Zhandry
2018/935 ( PDF )
Distinguishing Error of Nonlinear Invariant Attacks
Subhabrata Samajder and Palash Sarkar
2018/934 ( PDF )
Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices
Yuichi Komano and Hideo Shimizu and Hideyuki Miyake
2018/933 ( PDF )
Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures
Ferucio Laurentiu Tiplea and Constantin Catalin Dragan
2018/932 ( PDF )
18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices
Philipp Koppermann and Eduard Pop and Johann Heyszl and Georg Sigl
2018/931 ( PDF )
A Full RNS Variant of Approximate Homomorphic Encryption
Jung Hee Cheon and Kyoohyung Han and Andrey Kim and Miran Kim and Yongsoo Song
2018/930 ( PDF )
A study on the fast ElGamal encryption
Kim Gyu-Chol and Li Su-Chol
2018/929 ( PDF )
Expander Graphs are Non-Malleable Codes
Peter M. R. Rasmussen and Amit Sahai
2018/928 ( PDF )
Generic Authenticated Key Exchange in the Quantum Random Oracle Model
Kathrin Hövelmanns and Eike Kiltz and Sven Schäge and Dominique Unruh
2018/927 ( PDF )
Adaptively Secure Distributed PRFs from LWE
Benoît Libert and Damien Stehlé and Radu Titiu
2018/926 ( PDF )
Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion
Salim Ali Altug and Yilei Chen
2018/925 ( PDF )
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously
Songze Li and Mingchao Yu and A. Salman Avestimehr and Sreeram Kannan and Pramod Viswanath
2018/924 ( PDF )
Forward Secure Signatures on Smart Cards
Andreas Hülsing and Christoph Busold and Johannes Buchmann
2018/923 ( PDF )
Delegatable Anonymous Credentials from Mercurial Signatures
Elizabeth C. Crites and Anna Lysyanskaya
2018/922 ( PDF )
Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
Dušan Božilov and Miroslav Knežević and Ventzislav Nikov
2018/921 ( PDF )
Round Optimal Black-Box “Commit-and-Prove”
Dakshita Khurana and Rafail Ostrovsky and Akshayaram Srinivasan
2018/920 ( PDF )
A Message Franking Channel
Loďs Huguenin-Dumittan and Iraklis Leontiadis
2018/919 ( PDF )
Registration-Based Encryption: Removing Private-Key Generator from IBE
Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi
2018/918 ( PDF )
Scalable Lightning Factories for Bitcoin
Alejandro Ranchal-Pedrosa and Maria Potop-Butucaru and Sara Tucci-Piergiovanni
2018/917 ( PDF )
Secure multiparty PageRank algorithm for collaborative fraud detection
Alex Sangers and Maran van Heesch and Thomas Attema and Thijs Veugen and Mark Wiggerman and Jan Veldsink and Oscar Bloemen and Daniël Worm
2018/916 ( PDF )
Forking a Blockcipher for Authenticated Encryption of Very Short Messages
Elena Andreeva and Reza Reyhanitabar and Kerem Varici and Damian Vizár
2018/915 ( PDF )
On the Security of a Certificateless Strong Designated Verifier Signature Scheme
Nasrollah Pakniat
2018/914 ( PDF )
Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance
Shuichi Katsumata and Shota Yamada
2018/913 ( PDF )
Best Possible Information-Theoretic MPC
Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin
2018/912 ( PDF )
Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2018/911 ( PDF )
Achieving Fair Treatment in Algorithmic Classification
Andrew Morgan and Rafael Pass
2018/910 ( PDF )
Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation
Frédéric Dupuis and Serge Fehr and Philippe Lamontagne and Louis Salvail
2018/909 ( PDF )
Two-Round MPC: Information-Theoretic and Black-Box
Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan
2018/908 ( PDF )
FE and iO for Turing Machines from Minimal Assumptions
Shweta Agrawal, Monosij Maitra
2018/907 ( PDF )
Proving the correct execution of concurrent services in zero-knowledge
Srinath Setty and Sebastian Angel and Trinabh Gupta and Jonathan Lee
2018/906 ( PDF )
Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries
Willy Quach and Daniel Wichs and Giorgos Zirdelis
2018/905 ( PDF )
On the Security Loss of Unique Signatures
Andrew Morgan and Rafael Pass
2018/904 ( PDF )
Quantum security proofs using semi-classical oracles
Andris Ambainis and Mike Hamburg and Dominique Unruh
2018/903 ( PDF )
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
Nina Bindel and Jacqueline Brendel and Marc Fischlin and Brian Goncalves and Douglas Stebila
2018/902 ( PDF )
ProximiTEE: Hardened SGX Attestation by Proximity Verification
Aritra Dhar and Evan Puddu and Kari Kostiainen and Srdjan Capkun
2018/901 ( PDF )
On the Complexity of Fair Coin Flipping
Iftach Haitner and Nikolaos Makriyannis and Eran Omri
2018/900 ( PDF )
Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations
Mohammad Hajiabadi
2018/899 ( PDF )
Differential Cryptanalysis of Round-Reduced SPECK
Ashutosh Dhar Dwivedi and Pawel Morawiecki
2018/898 ( PDF )
Differential Cryptanalysis in ARX Ciphers with specific applications to LEA
Ashutosh Dhar Dwivedi and Gautam Srivastava
2018/897 ( PDF )
Traitor-Tracing from LWE Made Simple and Attribute-Based
Yilei Chen and Vinod Vaikuntanathan and Brent Waters and Hoeteck Wee and Daniel Wichs
2018/896 ( PDF )
Proofs of Ignorance and Applications to 2-Message Witness Hiding
Apoorvaa Deshpande and Yael Kalai
2018/895 ( PDF )
Weak Zero-Knowledge Beyond the Black-Box Barrier
Nir Bitansky and Dakshita Khurana and Omer Paneth
2018/894 ( PDF )
Perfect Secure Computation in Two Rounds
Benny Applebaum and Zvika Brakerski and Rotem Tsabary
2018/893 ( PDF )
Blockchain as cryptanalytic tool
Manfred Lochter
2018/892 ( PDF )
OptORAMa: Optimal Oblivious RAM
Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Kartik Nayak and Enoch Peserico and Elaine Shi
2018/891 ( PDF )
Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment
Seyed Farhad Aghili and Hamid Mala
2018/890 ( PDF )
A Bit-fixing PRF with O(1) Collusion-Resistance from LWE
Alex Davidson and Ryo Nishimaki
2018/889 ( PDF )
Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity
F. Betül Durak and Serge Vaudenay
2018/888 ( PDF )
Energy-Efficient ARM64 Cluster with Cryptanalytic Applications: 80 Cores That Do Not Cost You an ARM and a Leg
Thom Wiggers
2018/887 ( PDF )
Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions
Serge Fehr
2018/886 ( PDF )
Towards Isogeny-Based Password-Authenticated Key Establishment
Oleg Taraskin and Vladimir Soukharev and David Jao and Jason LeGrow
2018/885 ( PDF )
PASTA: PASsword-based Threshold Authentication
Shashank Agrawal and Peihan Miao and Payman Mohassel and Pratyay Mukherjee
2018/884 ( PDF )
Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model
Alan Szepieniec and Reza Reyhanitabar and Bart Preneel
2018/883 ( PDF )
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks
Suvradip Chakraborty and C. Pandu Rangan
2018/882 ( PDF )
Pre- and post-quantum Diffie--Hellman from groups, actions, and isogenies
Benjamin Smith
2018/881 ( PDF )
Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
Falk Schellenberg and Dennis R.E. Gnad and Amir Moradi and Mehdi B. Tahoori
2018/880 ( PDF )
Spread: a new layer for profiled deep-learning side-channel attacks
Christophe Pfeifer and Patrick Haddad
2018/879 ( PDF )
Efficient Group Signature Scheme without Pairings
Ke Gu and Bo Yin
2018/878 ( PDF )
RSA Signatures Under Hardware Restrictions
Marc Joye and Yan Michalevsky
2018/877 ( PDF )
On QA-NIZK in the BPK Model
Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michał Zając
2018/876 ( PDF )
Identity Confidentiality in 5G Mobile Telephony Systems
Haibat Khan and Benjamin Dowling and Keith M. Martin
2018/875 ( PDF )
Oblivious Transfer in Incomplete Networks
Varun Narayanan and Vinod M. Prabhakaran
2018/874 ( PDF )
Enhanced Security of Attribute-Based Signatures
Johannes Blömer and Fabian Eidens and Jakob Juhnke
2018/873 ( PDF )
TACHYON: Fast Signatures from Compact Knapsack
Rouzbeh Behnia and Muslum Ozgur Ozmen and Attila A. Yavuz and Mike Rosulek
2018/872 ( PDF )
New Techniques for Efficient Trapdoor Functions and Applications
Sanjam Garg and Romain Gay and Mohammad Hajiabadi
2018/871 ( PDF )
Non-profiled Mask Recovery: the impact of Independent Component Analysis
Si Gao and Elisabeth Oswald and Hua Chen and Wei Xi
2018/870 ( PDF )
Unifying Kleptographic Attacks
George Teseleanu
2018/869 ( PDF )
Higher-Order DCA against Standard Side-Channel Countermeasures
Andrey Bogdanov and Matthieu Rivain and Philip S. Vejre and Junwei Wang
2018/868 ( PDF )
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
Dea Saka Kurnia Putra and Mohamad Ali Sadikin and Susila Windarta
2018/867 ( PDF )
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling
Liron David and Avishai Wool
2018/866 ( PDF )
Output Compression, MPC, and iO for Turing Machines
Saikrishna Badrinarayanan and Rex Fernando and Venkata Koppula and Amit Sahai and Brent Waters
2018/865 ( PDF )
Multiplicative Masking for AES in Hardware
Lauren De Meyer and Oscar Reparaz and Begül Bilgin
2018/864 ( PDF )
Optimistic Mixing, Revisited
Antonio Faonio and Dario Fiore
2018/863 ( PDF )
Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation
Avi Asayag and Gad Cohen and Ido Grayevsky and Maya Leshkowitz and Ori Rottenstreich and Ronen Tamari and David Yakira
2018/862 ( PDF )
Attacking RO-PUFs with Enhanced Challenge-Response Pairs
Nils Wisiol and Marian Margraf
2018/861 ( PDF )
Delegating Computations with (almost) Minimal Time and Space Overhead
Justin Holmgren and Ron D. Rothblum
2018/860 ( PDF )
Encrypted Databases for Differential Privacy
Archita Agarwal and Maurice Herlihy and Seny Kamara and Tarik Moataz
2018/859 ( PDF )
Cryptanalysis of Low-Data Instances of Full LowMCv2
Christian Rechberger and Hadi Soleimany and Tyge Tiessen
2018/858 ( PDF )
Stronger Security for Sanitizable Signatures
Stephan Krenn and Kai Samelin and Dieter Sommer
2018/857 ( PDF )
Raptor: A Practical Lattice-Based (Linkable) Ring Signature
Xingye Lu and Man Ho Au and Zhenfei Zhang
2018/856 ( PDF )
Measuring, simulating and exploiting the head concavity phenomenon in BKZ
Shi Bai and Damien Stehlé and Weiqiang Wen
2018/855 ( PDF )
On the Security of the PKCS#1 v1.5 Signature Scheme
Tibor Jager and Saqib A. Kakvi and Alexander May
2018/854 ( PDF )
Multi-party Poisoning through Generalized $p$-Tampering
Saeed Mahloujifar and Mahammad Mahmoody and Ameer Mohammed
2018/853 ( PDF )
Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure
Christos Patsonakis and Katerina Samari and Mema Roussopoulos and Aggelos Kiayias
2018/852 ( PDF )
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Christoph Dobraunig and Stefan Mangard and Florian Mendel and Robert Primas
2018/851 ( PDF )
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting
T-H. Hubert Chan and Jonathan Katz and Kartik Nayak and Antigoni Polychroniadou and Elaine Shi
2018/850 ( PDF )
Computing supersingular isogenies on Kummer surfaces
Craig Costello
2018/849 ( PDF )
Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications
Masayuki Abe and Charanjit S. Jutla and Miyako Ohkubo and Arnab Roy
2018/848 ( PDF )
A Universally Composable Framework for the Privacy of Email Ecosystems
Pyrros Chaidos and Olga Fourtounelli and Aggelos Kiayias and Thomas Zacharias
2018/847 ( PDF )
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
Venkata Koppula and Brent Waters
2018/846 ( PDF )
Strong Leakage Resilient Encryption: Enhancing Data Confidentiality by Hiding Partial Ciphertext
Jia Xu and Jianying Zhou
2018/845 ( PDF )
A Framework for Achieving KDM-CCA Secure Public-Key Encryption
Fuyuki Kitagawa and Keisuke Tanaka
2018/844 ( PDF )
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Jean Paul Degabriele and Marc Fischlin
2018/843 ( PDF )
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)
Carmit Hazay and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez
2018/842 ( PDF )
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions
Yusuke Sakai and Shuichi Katsumata and Nuttapong Attrapadung and Goichiro Hanaoka
2018/841 ( PDF )
Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgĺrd Constructions
Akinori Hosoyamada and Kan Yasuda
2018/840 ( PDF )
Universal Proxy Re-Encryption
Nico Döttling and Ryo Nishimaki
2018/839 ( PDF )
On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography
Huseyin Hisil and Joost Renes
2018/838 ( PDF )
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Keita Xagawa and Takashi Yamakawa
2018/837 ( PDF )
Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem
Yu Ning and Fuyou Miao and Wenchao Huang and Keju Meng and Yan Xiong and Xingfu Wang
2018/836 ( PDF )
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques
Aljosha Judmayer and Nicholas Stifter and Philipp Schindler and Edgar Weippl
2018/835 ( PDF )
Fully-Featured Anonymous Credentials with Reputation System
Kai Bemmann and Johannes Blömer and Jan Bobolz and Henrik Bröcher and Denis Diemert and Fabian Eidens and Lukas Eilers and Jan Haltermann and Jakob Juhnke and Burhan Otour and Laurens Porzenheim and Simon Pukrop and Erik Schilling and Michael Schlichtig and Marcel Stienemeier
2018/834 ( PDF )
Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks
Dennis Hofheinz and Dingding Jia and Jiaxin Pan
2018/833 ( PDF )
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding
Jie Chen and Junqing Gong and Hoeteck Wee
2018/832 ( PDF )
Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules
Ashrujit Ghoshal and Rajat Sadhukhan and Sikhar Patranabis and Nilanjan Datta and Stjepan Picek and Debdeep Mukhopadhyay
2018/831 ( PDF )
Practical Attack on RaCoSS-R
Keita Xagawa
2018/830 ( PDF )
A remark on a success rate model fpr DPA and CPA
Andreas Wiemers
2018/829 ( PDF )
Information-Theoretic Broadcast with Dishonest Majority for Long Messages
Wutichai Chongchitmate and Rafail Ostrovsky
2018/828 ( PDF )
Aurora: Transparent Succinct Arguments for R1CS
Eli Ben-Sasson and Alessandro Chiesa and Michael Riabzev and Nicholas Spooner and Madars Virza and Nicholas P. Ward
2018/827 ( PDF )
Practical Strategy-Resistant Privacy-Preserving Elections
Sébastien Canard and David Pointcheval and Quentin Santos and Jacques Traoré
2018/826 ( PDF )
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH
Tibor Jager and Rafael Kurek and Jiaxin Pan
2018/825 ( PDF )
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
Kostas Papagiannopoulos
2018/824 ( PDF )
SeaSign: Compact isogeny signatures from class group actions
Luca De Feo and Steven D. Galbraith
2018/823 ( PDF )
The Security of Lazy Users in Out-of-Band Authentication
Moni Naor and Lior Rotem and Gil Segev
2018/822 ( PDF )
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS
Jonathan Bootle and Claire Delaplace and Thomas Espitau and Pierre-Alain Fouque and Mehdi Tibouchi
2018/821 ( PDF )
Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate
Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay and Shivam Bhasin
2018/820 ( PDF )
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy
David Sommer and Sebastian Meiser and Esfandiar Mohammadi
2018/819 ( PDF )
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls
Ritam Bhaumik and Eik List and Mridul Nandi
2018/818 ( PDF )
Robustly Reusable Fuzzy Extractor from Standard Assumptions
Yunhua Wen and Shengli Liu
2018/817 ( PDF )
Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism
Haiyang Xue and Xianhui Lu and Bao Li and Bei Liang and Jingnan He
2018/816 ( PDF )
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security
Chun Guo and Lei Wang
2018/815 ( PDF )
Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation
Yoshitatsu Matsuda and Tadanori Teruya and Kenji Kasiwabara
2018/814 ( PDF )
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
Yudi Zhang and Debiao He and Xinyi Huang and Ding Wang and Kim-Kwang Raymond Choo
2018/813 ( PDF )
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints
Danping Shi and Siwei Sun and Patrick Derbez and Yosuke Todo and Bing Sun and Lei Hu
2018/812 ( PDF )
Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier?
Lior Rotem and Gil Segev
2018/811 ( PDF )
Reconstructing an S-box from its Difference Distribution Table
Orr Dunkelman and Senyang Huang
2018/810 ( PDF )
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
Ling Song and Jian Guo
2018/809 ( PDF )
Algebraic Cryptanalysis of Frit
Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Markus Schofnegger
2018/808 ( PDF )
Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing
Jiyong Yu and Lucas Hsiung and Mohamad El Hajj and Christopher W. Fletcher
2018/807 ( PDF )
On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers
Nicolas T. Courtois
2018/806 ( PDF )
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness
Victor Arribas and Svetla Nikova and Vincent Rijmen
2018/805 ( PDF )
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers
Avik Chakraborti and Nilanjan Datta and Mridul Nandi and Kan Yasuda
2018/804 ( PDF )
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF
Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul
2018/803 ( PDF )
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution
Sinisa Matetic and Karl Wüst and Moritz Schneider and Kari Kostiainen and Ghassan Karame and Srdjan Capkun
2018/802 ( PDF )
Secure Modulo Zero-Sum Randomness as Cryptographic Resource
Masahito Hayashi and Takeshi Koshiba
2018/801 ( PDF )
Faster PCA and Linear Regression through Hypercubes in HElib
Deevashwer Rathee and Pradeep Kumar Mishra and Masaya Yasuda
2018/800 ( PDF )
Security of the Blockchain against Long Delay Attack
Puwen Wei and Quan Yuan and Yuliang Zheng
2018/799 ( PDF )
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm
Fukang Liu and Zhenfu Cao and Gaoli Wang
2018/798 ( PDF )
Recovering Secrets From Prefix-Dependent Leakage
Houda Ferradi and Rémi Géraud and Sylvain Guilley and David Naccache and Mehdi Tibouchi
2018/797 ( PDF )
Quantum algorithms for computing general discrete logarithms and orders with tradeoffs
Martin Ekerĺ
2018/796 ( PDF )
On relations between CCZ- and EA-equivalences
Lilya Budaghyan and Marco Calderini and Irene Villa
2018/795 ( PDF )
Solving ECDLP via List Decoding
Fangguo Zhang and Shengli Liu
2018/794 ( PDF )
Blending FHE-NTRU keys – The Excalibur Property
Louis Goubin and Francisco Vial-Prado
2018/793 ( PDF )
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions
Tetsu Iwata and Virginie Lallemand and Gregor Leander and Yu Sasaki
2018/792 ( PDF )
Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices
Joppe W. Bos and Simon J. Friedberger
2018/791 ( PDF )
Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo $p$
Guilhem Castagnos and Fabien Laguillaumie and Ida Tucker
2018/790 ( PDF )
Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation
David Derler and Sebastian Ramacher and Daniel Slamanig
2018/789 ( PDF )
Free IF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free
Vladimir Kolesnikov
2018/788 ( PDF )
Privacy-preserving certificate linkage/revocation in VANETs without Linkage Authorities
Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Leonardo T. D. Ferraz and Marcos Vinicius M. Silva
2018/787 ( PDF )
Labeled PSI from Fully Homomorphic Encryption with Malicious Security
Hao Chen and Zhicong Huang and Kim Laine and Peter Rindal
2018/786 ( PDF )
Discrete Gaussian Measures and New Bounds of the Smoothing Parameter for Lattices
Zhongxiang Zheng and Guangwu Xu and Chunhuan Zhao
2018/785 ( PDF )
Efficiently Processing Complex-Valued Data in Homomorphic Encryption
Carl Bootland and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren
2018/784 ( PDF )
Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model
ByeongHak Lee and Jooyoung Lee
2018/783 ( PDF )
Short Variable Length Domain Extenders With Beyond Birthday Bound Security
Yu Long Chen and Bart Mennink and Mridul Nandi
2018/782 ( PDF )
A faster way to the CSIDH
Michael Meyer and Steffen Reith
2018/781 ( PDF )
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation
Yu Chen and Yuyu Wang and Hong-sheng Zhou
2018/780 ( PDF )
A Game Theoretic Analysis of Resource Mining in Blockchain
Rajani Singh and Ashutosh Dhar Dwivedi and Gautam Srivastava and Agnieszka Wiszniewska-Matyszkiel and Xiaochun Cheng
2018/779 ( PDF )
Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability
Rafael del Pino and Vadim Lyubashevsky and Gregor Seiler
2018/778 ( PDF )
PPP-Completeness with Connections to Cryptography
Katerina Sotiraki and Manolis Zampetakis and Giorgos Zirdelis
2018/777 ( PDF )
Delegation of Decryption Rights with Revocability from Learning with Errors
Wei Yin and Qiaoyan Wen and Kaitai Liang and Zhenfei Zhang and Liqun Chen and Hanbing Yan and Hua Zhang
2018/776 ( PDF )
On Publicly Verifiable Delegation From Standard Assumptions
Yael Kalai and Omer Paneth and Lisa Yang
2018/775 ( PDF )
The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants
Matilda Backendal and Mihir Bellare and Jessica Sorrell and Jiahao Sun
2018/774 ( PDF )
Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies
Brandon Goodell and Sarang Noether
2018/773 ( PDF )
Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures
Muhammed F. Esgin and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Dongxi Liu
2018/772 ( PDF )
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
Itai Dinur and Daniel Kales and Angela Promitzer and Sebastian Ramacher and Christian Rechberger
2018/771 ( PDF )
A Simple Construction of iO for Turing Machines
Sanjam Garg and Akshayaram Srinivasan
2018/770 ( PDF )
Combiners for Backdoored Random Oracles
Balthazar Bauer and Pooya Farshim and Sogol Mazaheri
2018/769 ( PDF )
Constructing APN functions through isotopic shifts
Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert S. Coulter and Irene Villa
2018/768 ( PDF )
DRANKULA: a McEliece-like rank metric based cryptosystem implementation
Ameera Salem Al Abdouli and Mohamed Al Ali and Emanuele Bellini and Florian Caullery and Alexandros Hasikos and Marc Manzano and Victor Mateu
2018/767 ( PDF )
Xoodoo cookbook
Joan Daemen and Seth Hoffert and Michaël Peeters and Gilles Van Assche and Ronny Van Keer
2018/766 ( PDF )
Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols
Nadim Kobeissi and Georgio Nicolas and Karthikeyan Bhargavan
2018/765 ( PDF )
Symbolic Proofs for Lattice-Based Cryptography
Gilles Barthe and Xiong Fan and Joshua Gancher and Benjamin Grégoire and Charlie Jacomme and Elaine Shi
2018/764 ( PDF )
Generating Graphs Packed with Paths
Mathias Hall-Andersen and Philip S. Vejre
2018/763 ( PDF )
Block Cipher Invariants as Eigenvectors of Correlation Matrices (Full Version)
Tim Beyne
2018/762 ( PDF )
Generalizing the SPDZ Compiler For Other Protocols
Toshinori Araki and Assi Barak and Jun Furukawa and Marcel Keller and Yehuda Lindell and Kazuma Ohara and Hikaru Tsuchida
2018/761 ( PDF )
New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem
Parinaz Mahdion and Hadi Soleimany and Pouya Habibi and Farokhlagha Moazami
2018/760 ( PDF )
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies
Xiu Xu and Haiyang Xue and Kunpeng Wang and and Man Ho Au and Bei Liang and Song Tian
2018/759 ( PDF )
Succinct Garbling Schemes from Functional Encryption through a Local Simulation Paradigm
Prabhanjan Ananth and Alex Lombardi
2018/758 ( PDF )
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
Christina Boura and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev
2018/757 ( PDF )
Cryptography for Human Senses
Kimmo Halunen and Outi-Marja Latvala
2018/756 ( PDF )
Obfuscation Using Tensor Products
Craig Gentry and Charanjit S. Jutla and Daniel Kane
2018/755 ( PDF )
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks
Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li
2018/754 ( PDF )
SoK: A Consensus Taxonomy in the Blockchain Era
Juan Garay and Aggelos Kiayias
2018/753 ( PDF )
Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy
Yan Michalevsky and Marc Joye
2018/752 ( PDF )
Isogeny Secrets can be Traded
David Urbanik
2018/751 ( PDF )
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants
Assi Barak and Martin Hirt and Lior Koskas and Yehuda Lindell
2018/750 ( PDF )
Non-Malleable Secret Sharing for General Access Structures
Vipul Goyal and Ashutosh Kumar
2018/749 ( PDF )
Prime and Prejudice: Primality Testing Under Adversarial Conditions
Martin R. Albrecht and Jake Massimo and Kenneth G. Paterson and Juraj Somorovsky
2018/748 ( PDF )
Definitions for Plaintext-Existence Hiding in Cloud Storage
Colin Boyd and Gareth T. Davies and Kristian Gjřsteen and Hĺvard Raddum and Mohsen Toorani
2018/747 ( PDF )
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure
Eyal Ronen and Kenneth G. Paterson and Adi Shamir
2018/746 ( PDF )
Secret Sharing with Binary Shares
Fuchun Lin and Mahdi Cheraghchi and Venkatesan Guruswami and Reihaneh Safavi-Naini and Huaxiong Wang
2018/745 ( PDF )
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure
Jingdian Ming and Wei Cheng and Huizhong Li and Guang Yang and Yongbin Zhou and Qian Zhang
2018/744 ( PDF )
BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing
Leon J. Helsloot and Gamze Tillem and Zekeriya Erkin
2018/743 ( PDF )
On the Leakage of Corrupted Garbled Circuits
Aurélien Dupin and David Pointcheval and Christophe Bidan
2018/742 ( PDF )
Witness-Indistinguishable Arguments with $\Sigma$-Protocols for Bundled Witness Spaces and its Application to Global Identities
Hiroaki Anada and Seiko Arita
2018/741 ( PDF )
LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE
Alexander May and Gottfried Herold
2018/740 ( PDF )
FairSwap: How to fairly exchange digital goods
Stefan Dziembowski and Lisa Eckey and Sebastian Faust
2018/739 ( PDF )
Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism
Mahdi Sajadieh and Mohammad Vaziri
2018/738 ( PDF )
Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature
Sanjit Chatterjee and R. Kabaleeshwaran
2018/737 ( PDF )
Steady: A Simple End-to-End Secure Logging System
Tobias Pulls and Rasmus Dahlberg
2018/736 ( PDF )
Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs
Marina Blanton and Myoungin Jeong
2018/735 ( -- withdrawn -- )
AntNest: Fully Non-interactive Secure Multi-party Computation
Lijing Zhou and Licheng Wang and Yiru Sun and Tianyi Ai
2018/734 ( PDF )
Random Number Generators Can Be Fooled to Behave Badly
George Teseleanu
2018/733 ( PDF )
Threshold Partially-Oblivious PRFs with Applications to Key Management
Stanislaw Jarecki and Hugo Krawczyk and Jason Resch
2018/732 ( PDF )
Data Oblivious Genome Variants Search on Intel SGX
Avradip Mandal and John C. Mitchell and Hart Montgomery and Arnab Roy
2018/731 ( PDF )
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing
Itai Dinur and Nathan Keller and Ohad Klein
2018/730 ( PDF )
Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange
Atsushi Fujioka and Katsuyuki Takashima and Shintaro Terada and Kazuki Yoneyama
2018/729 ( -- withdrawn -- )
Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection
Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel
2018/728 ( PDF )
A $k$-out-of-$n$ Ring Signature with Flexible Participation for Signers
Takeshi Okamoto and Raylin Tso and Michitomo Yamaguchi and Eiji Okamoto
2018/727 ( PDF )
DiSE: Distributed Symmetric-key Encryption
Shashank Agrawal and Payman Mohassel and Pratyay Mukherjee and Peter Rindal
2018/726 ( PDF )
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES
Kai Hu and Tingting Cui and Chao Gao and Meiqin Wang
2018/725 ( PDF )
Round5: KEM and PKE based on GLWR
Sauvik Bhattacharya and Oscar Garcia-Morchon and Thijs Laarhoven and Ronald Rietman and Markku-Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang
2018/724 ( PDF )
Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow
Nele Mentens and Edoardo Charbon and Francesco Regazzoni
2018/723 ( PDF )
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M
Markku-Juhani O. Saarinen and Sauvik Bhattacharya and Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Zhenfei Zhang
2018/722 ( PDF )
uMine: a Blockchain based on Human Miners
Henning Kopp and Frank Kargl and Christoph Bösch and Andreas Peter
2018/721 ( PDF )
Transparency Logs via Append-only Authenticated Dictionaries
Alin Tomescu and Vivek Bhupatiraju and Dimitrios Papadopoulos and Charalampos Papamanthou and Nikos Triandopoulos and Srinivas Devadas
2018/720 ( PDF )
{Adiantum}: length-preserving encryption for entry-level processors
Paul Crowley and Eric Biggers
2018/719 ( PDF )
Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage
Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
2018/718 ( PDF )
Keeping or Losing Tiny-Error Correctness of Cryptosystems Implemented by Secure Pseudorandom Generators
Koji Nuida
2018/717 ( PDF )
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
Heiko Lohrke and Shahin Tajik and Thilo Krachenfels and Christian Boit and Jean-Pierre Seifert
2018/716 ( PDF )
Lattice-Based Zero-Knowledge Arguments for Integer Relations
Benoît Libert and San Ling and Khoa Nguyen and Huaxiong Wang
2018/715 ( PDF )
Practical Attacks on Relational Databases Protected via Searchable Encryption
Mohamed Ahmed Abdelraheem and Tobias Andersson and Christian Gehrmann and Cornelius Glackin
2018/714 ( PDF )
PKP-Based Signature Scheme
Ward Beullens and Jean-Charles Faugčre and Eliane Koussa and Gilles Macario-Rat and Jacques Patarin and Ludovic Perret
2018/713 ( PDF )
On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting
Anne Canteaut and Léo Perrin
2018/712 ( PDF )
A Survey of Two Verifiable Delay Functions
Dan Boneh and Benedikt Bünz and Ben Fisch
2018/711 ( PDF )
Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures
Kallepu Raju and Appala Naidu Tentuand and V. Ch. Venkaiah
2018/710 ( PDF )
Fast Secure Computation for Small Population over the Internet
Megha Byali and Arun Joseph and Arpita Patra and Divya Ravi
2018/709 ( PDF )
Simple oblivious transfer protocols compatible with Kummer and supersingular isogenies
Vanessa Vitse
2018/708 ( PDF )
Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software
Alexandre Adomnicai and Jacques J.A. Fournier and Laurent Masson
2018/707 ( PDF )
Function Secret Sharing: Improvements and Extensions
Elette Boyle and Niv Gilboa and Yuval Ishai
2018/706 ( PDF )
Efficient 3-Party Distributed ORAM
Paul Bunn and Jonathan Katz and Eyal Kushilevitz and Rafail Ostrovsky
2018/705 ( PDF )
Subvector Commitments with Application to Succinct Arguments
Russell W.F. Lai and Giulio Malavolta
2018/704 ( PDF )
Verifiable Sealed-Bid Auction on the Ethereum Blockchain
Hisham S. Galal and Amr M. Youssef
2018/703 ( PDF )
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition
Niek J. Bouman and Niels de Vreede
2018/702 ( PDF )
Tight Proofs of Space and Replication
Ben Fisch
2018/701 ( -- withdrawn -- )
Secure Sketch for All Noisy Sources
Yen-Lung Lai
2018/700 ( PDF )
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange
Hwajeong Seo and Zhe Liu and Patrick Longa and Zhi Hu
2018/699 ( PDF )
Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64
Raghvendra Rohit and Guang Gong
2018/698 ( PDF )
Parameter-Hiding Order Revealing Encryption
David Cash and Feng-Hao Liu and Adam O'Neill and Mark Zhandry and Cong Zhang
2018/697 ( PDF )
AUDIT: Practical Accountability of Secret Processes
Jonathan Frankle and Sunoo Park and Daniel Shaar and Shafi Goldwasser and Daniel J. Weitzner
2018/696 ( PDF )
Unbounded Inner Product Functional Encryption from Bilinear Maps
Junichi Tomida and Katsuyuki Takashima
2018/695 ( PDF )
SPHINX: A Password Store that Perfectly Hides Passwords from Itself
Maliheh Shirvanian and Stanislaw Jarecki and Hugo Krawczyk and Nitesh Saxena
2018/694 ( PDF )
Faster Privacy-Preserving Location Proximity Schemes
Kimmo Järvinen and Ágnes Kiss and Thomas Schneider and Oleksandr Tkachenko and Zheng Yang
2018/693 ( PDF )
Efficient Side-Channel Protections of ARX Ciphers
Bernhard Jungk and Richard Petri and Marc Stöttinger
2018/692 ( PDF )
New Configurations of Grain Ciphers: Security Against Slide Attacks
Diana Maimut and George Teseleanu
2018/691 ( PDF )
DIZK: A Distributed Zero Knowledge Proof System
Howard Wu and Wenting Zheng and Alessandro Chiesa and Raluca Ada Popa and Ion Stoica
2018/690 ( PDF )
Efficient KEA-Style Lattice-Based Authenticated Key Exchange
Zilong Wang and Honggang Hu
2018/689 ( PDF )
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
Ralph Ankele and Stefan Kölbl
2018/688 ( PDF )
Finding Integral Distinguishers with Ease
Zahra Eskandari and Andreas Brasen Kidmose and Stefan Kölbl and Tyge Tiessen
2018/687 ( PDF )
Assessing the Feasibility of Single Trace Power Analysis of Frodo
Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam
2018/686 ( PDF )
Standard Lattice-Based Key Encapsulation on Embedded Devices
James Howe and Tobias Oder and Markus Krausz and Tim Güneysu
2018/685 ( PDF )
On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards
Sven Heiberg and Ivo Kubjas and Janno Siim and Jan Willemson
2018/684 ( PDF )
PIEs: Public Incompressible Encodings for Decentralized Storage
Ethan Cecchetti and Ben Fisch and Ian Miers and Ari Juels
2018/683 ( PDF )
Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability
Oksana Kulyk and Melanie Volkamer
2018/682 ( PDF )
Saber on ARM CCA-secure module lattice-based key encapsulation on ARM
Angshuman Karmakar and Jose Maria Bermudo Mera and Sujoy Sinha Roy and Ingrid Verbauwhede
2018/681 ( PDF )
A Reusable Fuzzy Extractor with Practical Storage Size
Jung Hee Cheon and Jinhyuck Jeong and Dongwoo Kim and Jongchan Lee
2018/680 ( PDF )
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256
Rui Zong and Xiaoyang Dong and Xiaoyun Wang
2018/679 ( PDF )
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive
Jiasi Weng and Jian Weng and Jilian Zhang and Ming Li and Yue Zhang and Weiqi Luo
2018/678 ( PDF )
PoReps: Proofs of Space on Useful Data
Ben Fisch
2018/677 ( PDF )
Module-lattice KEM Over a Ring of Dimension 128 for Embedded Systems
François Gérard
2018/676 ( PDF )
Static Power Side-Channel Analysis - An Investigation of Measurement Factors
Thorben Moos and Amir Moradi and Bastian Richter
2018/675 ( PDF )
A signature scheme from the finite field isomorphism problem
Jeffrey Hoffstein and Joseph H. Silverman and William Whyte and Zhenfei Zhang
2018/674 ( PDF )
Practical Fault Injection Attacks on SPHINCS
Aymeric Genęt and Matthias J. Kannwischer and Hervé Pelletier and Andrew McLauchlan
2018/673 ( PDF )
Differential Power Analysis of XMSS and SPHINCS
Matthias J. Kannwischer and Aymeric Genęt and Denis Butin and Juliane Krämer and Johannes Buchmann
2018/672 ( PDF )
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
Martin R. Albrecht and Amit Deo and Kenneth G. Paterson
2018/671 ( PDF )
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES
Joey Green and Elisabeth Oswald and Arnab Roy
2018/670 ( PDF )
Public Key Compression for Constrained Linear Signature Schemes
Ward Beullens and Bart Preneel and Alan Szepieniec
2018/669 ( PDF )
Faster cofactorization with ECM using mixed representations
Cyril Bouvier and Laurent Imbert
2018/668 ( PDF )
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
Takanori Isobe and Kazuhiko Minematsu
2018/667 ( PDF )
On Hardware Implementation of Tang-Maitra Boolean Functions
Mustafa Khairallah and Anupam Chattopadhyay and Bimal Mandal and Subhamoy Maitra
2018/666 ( PDF )
Reproducible Codes and Cryptographic Applications
Paolo Santini and Edoardo Persichetti and Marco Baldi
2018/665 ( PDF )
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
Dan Boneh and Darren Glass and Daniel Krashen and Kristin Lauter and Shahed Sharif and Alice Silverberg and Mehdi Tibouchi and Mark Zhandry
2018/664 ( PDF )
Public Accountability vs. Secret Laws: Can They Coexist?
Shafi Goldwasser and Sunoo Park
2018/663 ( PDF )
Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption
Pradeep Kumar Mishra and Deevashwer Rathee and Dung Hoang Duong and Masaya Yasuda
2018/662 ( PDF )
Efficient Logistic Regression on Large Encrypted Data
Kyoohyung Han and Seungwan Hong and Jung Hee Cheon and Daejun Park
2018/661 ( PDF )
Exploring Deployment Strategies for the Tor Network
Christoph Döpmann and Sebastian Rust and Florian Tschorsch
2018/660 ( PDF )
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity
Xun Yi and Kwok-Yan Lam and Dieter Gollmann
2018/659 ( PDF )
On the Menezes-Teske-Weng’s conjecture
Sihem Mesnager and Kwang Ho Kim and Junyop Choe and Chunming Tang
2018/658 ( PDF )
Blockchained Post-Quantum Signatures
Konstantinos Chalkias and James Brown and Mike Hearn and Tommy Lillehagen and Igor Nitto and Thomas Schroeter
2018/657 ( PDF )
Platform-independent Secure Blockchain-Based Voting System
Bin Yu and Joseph Liu and Amin Sakzad and Surya Nepal and Paul Rimba and Ron Steinfeld and Man Ho Au
2018/656 ( PDF )
FPGA Cluster based high performance Cryptanalysis framework
Abhishek Bajpai and S V Kulgod
2018/655 ( PDF )
Loamit: A Blockchain-based Residual Loanable-limit Query System
Lijing Zhou and Licheng Wang and Yiru Sun and Pin Lv
2018/654 ( PDF )
Proofs of Replicated Storage Without Timing Assumptions
Ivan Damgĺrd and Chaya Ganesh and Claudio Orlandi
2018/653 ( PDF )
Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes
Pierre-Alain Fouque and Benjamin Hadjibeyli and Paul Kirchner
2018/652 ( PDF )
Efficient Collision Attack Frameworks for RIPEMD-160
Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao
2018/651 ( PDF )
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study
Nicola Tuveri and Sohaib ul Hassan and Cesar Pereida García and Billy Brumley
2018/650 ( PDF )
Designing Efficient Dyadic Operations for Cryptographic Applications
Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini
2018/649 ( PDF )
No-signaling Linear PCPs
Susumu Kiyoshima
2018/648 ( PDF )
Semi-Commutative Masking: A Framework for Isogeny-based Protocols, with an Application to Fully Secure Two-Round Isogeny-based OT
Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Christophe Petit and Nigel P. Smart
2018/647 ( PDF )
A new perspective on the powers of two descent for discrete logarithms in finite fields
Thorsten Kleinjung and Benjamin Wesolowski
2018/646 ( PDF )
Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation
Huijia Lin and Christian Matt
2018/645 ( PDF )
Mitigating the One-Use Restriction in Attribute-Based Encryption
Lucas Kowalczyk and Jiahui Liu and Kailash Meiyappan and Tal Malkin
2018/644 ( PDF )
Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
Osmanbey Uzunkol and Jothi Rangasamy and Lakshmi Kuppusamy
2018/643 ( PDF )
XCLAIM: Trustless, Interoperable Cryptocurrency-Backed Assets
Alexei Zamyatin and Dominik Harz and Joshua Lind and Panayiotis Panayiotou and Arthur Gervais and William J. Knottenbelt
2018/642 ( PDF )
Commit-Chains: Secure, Scalable Off-Chain Payments
Rami Khalil and Alexei Zamyatin and Guillaume Felley and Pedro Moreno-Sanchez and Arthur Gervais
2018/641 ( PDF )
Membership Privacy for Fully Dynamic Group Signatures
Michael Backes and Lucjan Hanzlik and Jonas Schneider
2018/640 ( PDF )
Lower Bounds on Structure-Preserving Signatures for Bilateral Messages
Masayuki Abe and Miguel Ambrona and Miyako Ohkubo and Mehdi Tibouchi
2018/639 ( PDF )
Function-Dependent Commitments for Verifiable Multi-Party Computation
Lucas Schabhüser and Denis Butin and Denise Demirel and Johanens Buchmann
2018/638 ( PDF )
BurnBox: Self-Revocable Encryption in a World of Compelled Access
Nirvan Tyagi and Muhammad Haris Mughees and Thomas Ristenpart and Ian Miers
2018/637 ( PDF )
Efficient Fully Homomorphic Encryption Scheme
Shuhong Gao
2018/636 ( PDF )
Lattice-Based Dual Receiver Encryption and More
Daode Zhang and Kai Zhang and Bao Li and Xianhui Lu and Haiyang Xue and Jie Li
2018/635 ( PDF )
On linear hulls in one round of DES
Tomer Ashur and Raluca Posteuca
2018/634 ( PDF )
Partially Specified Channels: The TLS 1.3 Record Layer without Elision
Christopher Patton and Thomas Shrimpton
2018/633 ( PDF )
New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation
Shweta Agrawal
2018/632 ( PDF )
CHARIOT: Cloud-Assisted Access Control for the Internet of Things
Clementine Gritti and Melek Onen and Refik Molva
2018/631 ( PDF )
Efficient Construction of the Boomerang Connection Table
Orr Dunkelman
2018/630 ( PDF )
Characterizing overstretched NTRU attacks
Gabrielle De Micheli and Nadia Heninger and Barak Shani
2018/629 ( PDF )
Context Hiding Multi-Key Linearly Homomorphic Authenticators
Lucas Schabhüser and Denis Butin and Johannes Buchmann
2018/628 ( -- withdrawn -- )
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk
2018/627 ( PDF )
Simple Verifiable Delay Functions
Krzysztof Pietrzak
2018/626 ( PDF )
Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes
Sergiu Carpov and Oana Stan
2018/625 ( PDF )
Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions
Mihir Bellare and Joseph Jaeger and Julia Len
2018/624 ( PDF )
Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker
Gergei Bana and Rohit Chadha and Ajay Kumar Eeralla
2018/623 ( PDF )
Efficient verifiable delay functions
Benjamin Wesolowski
2018/622 ( PDF )
New techniques for Multi-value input Homomorphic Evaluation and Applications
Sergiu Carpov and Malika Izabachčne and Victor Mollimard
2018/621 ( PDF )
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis
Ben Lapid and Avishai Wool
2018/620 ( PDF )
STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis
Debayan Das and Mayukh Nath and Baibhab Chatterjee and Santosh Ghosh and Shreyas Sen
2018/619 ( PDF )
Is there an Oblivious RAM Lower Bound for Online Reads?
Mor Weiss and Daniel Wichs
2018/618 ( PDF )
On some methods for constructing almost optimal S-Boxes and their resilience against side-channel attacks
Reynier Antonio de la Cruz Jiménez
2018/617 ( PDF )
Two Notions of Differential Equivalence on Sboxes
Christina Boura and Anne Canteaut and Jérémy Jean and Valentin Suder
2018/616 ( PDF )
Matrioska: A Compiler for Multi-Key Homomorphic Signatures
Dario Fiore and Elena Pagnin
2018/615 ( PDF )
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness
Prabhanjan Ananth and Aayush Jain and Amit Sahai
2018/614 ( PDF )
A Note on Key Rank
Daniel P. Martin and Marco Martinoli
2018/613 ( PDF )
One-Message Zero Knowledge and Non-Malleable Commitments
Nir Bitansky and Huijia Lin
2018/612 ( PDF )
Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol
Tim Ruffing and Sri Aravinda Thyagarajan and Viktoria Ronge and Dominique Schröder
2018/611 ( PDF )
Is Java Card ready for hash-based signatures?
Ebo van der Laan and Erik Poll and Joost Rijneveld and Joeri de Ruiter and Peter Schwabe and Jan Verschuren
2018/610 ( PDF )
Hierarchical Attribute-based Signatures
Constantin-Catalin Dragan and Daniel Gardham and Mark Manulis
2018/609 ( PDF )
Improved Results on Factoring General RSA Moduli with Known Bits
Mengce Zheng
2018/608 ( PDF )
Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols
Hamid Nejatollahi and Nikil Dutt and Indranil Banerjee and Rosario Cammarota
2018/607 ( PDF )
SEEMless: Secure End-to-End Encrypted Messaging with less trust
Melissa Chase and Apoorvaa Deshpande and Esha Ghosh and Harjasleen Malvai
2018/606 ( PDF )
Continuously Non-Malleable Codes with Split-State Refresh
Antonio Faonio and Jesper Buus Nielsen and Mark Simkin and Daniele Venturi
2018/605 ( PDF )
N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials
Yin Li and Yu Zhang and Xiaoli Guo and Chuanda Qi
2018/604 ( PDF )
Attack on Kayawood Protocol: Uncloaking Private Keys
Matvei Kotov and Anton Menshov and Alexander Ushakov
2018/603 ( PDF )
Actively Secure OT-Extension from q-ary Linear Codes
Ignacio Cascudo and René Břdker Christensen and Jaron Skovsted Gundersen
2018/602 ( PDF )
On the Universally Composable Security of OpenStack
Kyle Hogan and Hoda Maleki and Reza Rahaeimehr and Ran Canetti and Marten van Dijk and Jason Hennessey and Mayank Varia and Haibin Zhang
2018/601 ( PDF )
Verifiable Delay Functions
Dan Boneh and Joseph Bonneau and Benedikt Bünz and Ben Fisch
2018/600 ( PDF )
GRANULE: An Ultra lightweight cipher design for embedded security
Gaurav Bansod and Abhijit Patil and Narayan Pisharoty
2018/599 ( PDF )
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
Lucas Schabhüser and Denis Butin and Johannes Buchmann
2018/598 ( PDF )
Trends in design of ransomware viruses
Vlad Constantin Craciun and Andrei Mogage and Emil Simion
2018/597 ( PDF )
Consolidating Security Notions in Hardware Masking
Lauren De Meyer and Begül Bilgin and Oscar Reparaz
2018/596 ( PDF )
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments
Ivan Damgĺrd and Tomasz Kazana and Maciej Obremski and Varun Raj and Luisa Siniscalchi
2018/595 ( -- withdrawn -- )
Randomness analysis for multiple-recursive matrix generator
Subhrajyoti Deb and Bubu Bhuyan, and Sartaj Ul Hasan
2018/594 ( PDF )
Cryptanalysis of SFN Block Cipher
Sadegh Sadeghi and Nasour Bagheri
2018/593 ( PDF )
Ramanujan graphs in cryptography
Anamaria Costache and Brooke Feigon and Kristin Lauter and Maike Massierer and Anna Puskas
2018/592 ( PDF )
XS-circuits in Block Ciphers
Sergey Agievich
2018/591 ( PDF )
4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis.
Sankhanil Dey and Ranjan Ghosh
2018/590 ( PDF )
The Twin Conjugacy Search Problem and Applications
Xiaoming Chen and Weiqing You
2018/589 ( PDF )
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme
Ahmad Al Badawi and Yuriy Polyakov and Khin Mi Mi Aung and Bharadwaj Veeravalli and Kurt Rohloff
2018/588 ( PDF )
BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage
Guilherme Borges and Henrique Domingos and Bernardo Ferreira and Joăo Leităo and Tiago Oliveira and Bernardo Portela
2018/587 ( PDF )
Constructing Witness PRF and Offline Witness Encryption Without Multilinear Maps
Tapas Pal and Ratna Dutta
2018/586 ( PDF )
Lower Bounds on Lattice Enumeration with Extreme Pruning
Yoshinori Aono and Phong Q. Nguyen and Takenobu Seito and Junji Shikata
2018/585 ( PDF )
Polynomial Functional Encryption Scheme with Linear Ciphertext Size
Jung Hee Cheon and Seungwan Hong and Changmin Lee and Yongha Son
2018/584 ( PDF )
Bounded Fully Homomorphic Encryption from Monoid Algebras
Mugurel Barcau and Vicentiu Pasol
2018/583 ( PDF )
Ring Homomorphic Encryption Schemes
Mugurel Barcau and Vicentiu Pasol
2018/582 ( PDF )
Pisa: Arbitration Outsourcing for State Channels
Patrick McCorry and Surya Bakshi and Iddo Bentov and Andrew Miller and Sarah Meiklejohn
2018/581 ( PDF )
Smart contracts for bribing miners
Patrick McCorry and Alexander Hicks and Sarah Meiklejohn
2018/580 ( PDF )
Threshold Multi-Key FHE and Applications to Round-Optimal MPC
Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai
2018/579 ( PDF )
PIR-PSI: Scaling Private Contact Discovery
Daniel Demmler and Peter Rindal and Mike Rosulek and Ni Trieu
2018/578 ( PDF )
Optimizing Authenticated Garbling for Faster Secure Two-Party Computation
Jonathan Katz and Samuel Ranellucci and Mike Rosulek and Xiao Wang
2018/577 ( PDF )
Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries
Tore Kasper Frederiksen and Yehuda Lindell and Valery Osheter and Benny Pinkas
2018/576 ( PDF )
Simpler Constructions of Asymmetric Primitives from Obfuscation
Pooya Farshim and Georg Fuchsbauer and Alain Passelčgue
2018/575 ( PDF )
An Algorithmic Framework for the Generalized Birthday Problem
Itai Dinur
2018/574 ( PDF )
Correctness and Fairness of Tendermint-core Blockchains
Yackolley Amoussou-Guenou and Antonella Del Pozzo and Maria Potop-Butucaru and Sara Tucci-Piergiovanni
2018/573 ( PDF )
Improved Lightweight Implementations of CAESAR Authenticated Ciphers
Farnoud Farahmand and William Diehl and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj
2018/572 ( PDF )
Round-Optimal Secure Multiparty Computation with Honest Majority
Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain
2018/571 ( PDF )
Limits of Practical Sublinear Secure Computation
Elette Boyle and Yuval Ishai and Antigoni Polychroniadou
2018/570 ( PDF )
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
Koji Chida and Daniel Genkin and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Yehuda Lindell and Ariel Nof
2018/569 ( PDF )
Dissection-BKW
Andre Esser and Felix Heuer and Robert Kübler and Alexander May and and Christian Sohler
2018/568 ( PDF )
Finding Small Solutions of the Equation $Bx-Ay=z$ and Its Applications to Cryptanalysis of the RSA Cryptosystem
Shixiong Wang and Longjiang Qu and Chao Li and Shaojing Fu and Hao Chen
2018/567 ( PDF )
On the Security Properties of e-Voting Bulletin Boards
Aggelos Kiayias and Annabell Kuldmaa and Helger Lipmaa and Janno Siim and Thomas Zacharias
2018/566 ( PDF )
Private Circuits: A Modular Approach
Prabhanjan Ananth and Yuval Ishai and Amit Sahai
2018/565 ( -- withdrawn -- )
Homomorphic Encryption for Approximate Matrix Arithmetic
Jung Hee Cheon and Andrey Kim
2018/564 ( PDF )
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties
Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka
2018/563 ( PDF )
Multi-client Predicate-only Encryption for Conjunctive Equality Tests
Tim van de Kamp and Andreas Peter and Maarten H. Everts and Willem Jonker
2018/562 ( PDF )
maskVerif: automated analysis of software and hardware higher-order masked implementations
Gilles Barthe and Sonia Belaďd and Gaëtan Cassiers and Pierre-Alain Fouque and Benjamin Grégoire and François-Xavier Standaert
2018/561 ( PDF )
Blockchain Abstract Data Type
Emmanuelle Anceaume and Antonella Del Pozzo and Romaric Ludinard and Maria Potop-Butucaru and Sara Tucci-Piergiovanni
2018/560 ( PDF )
Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits
Carsten Baum and Jonathan Bootle and Andrea Cerulli and Rafael del Pino and Jens Groth and Vadim Lyubashevsky
2018/559 ( PDF )
Proofs of Work from Worst-Case Assumptions
Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan
2018/558 ( PDF )
Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE
Phillip Rogaway and Yusi Zhang
2018/557 ( PDF )
Non-Interactive Zero-Knowledge Proofs for Composite Statements
Shashank Agrawal and Chaya Ganesh and Payman Mohassel
2018/556 ( PDF )
The Curse of Small Domains: New Attacks on Format-Preserving Encryption
Viet Tung Hoang and Stefano Tessaro and Ni Trieu
2018/555 ( PDF )
Limits on the Power of Garbling Techniques for Public-Key Encryption
Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ameer Mohammed
2018/554 ( PDF )
A new class of irreducible pentanomials for polynomial based multipliers in binary fields
Gustavo Banegas and Ricardo Custodio and Daniel Panario
2018/553 ( PDF )
Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging
Joseph Jaeger and Igors Stepanovs
2018/552 ( PDF )
On the Complexity of Compressing Obfuscation
Gilad Asharov and Naomi Ephraim and Ilan Komargodski and Rafael Pass
2018/551 ( PDF )
Structured Encryption and Leakage Suppression
Seny Kamara and Tarik Moataz and Olga Ohrimenko
2018/550 ( PDF )
PRank: Fast Analytical Rank Estimation via Pareto Distributions
Liron David and Avishai Wool
2018/549 ( PDF )
Adaptive Garbled RAM from Laconic Oblivious Transfer
Sanjam Garg and Rafail Ostrovsky and Akshayaram Srinivasan
2018/548 ( PDF )
From Laconic Zero-Knowledge to Public-Key Cryptography
Itay Berman and Akshay Degwekar and Ron D. Rothblum and Prashant Nalini Vasudevan
2018/547 ( PDF )
Indifferentiable Authenticated Encryption
Manuel Barbosa and Pooya Farshim
2018/546 ( PDF )
Quantum Lattice Enumeration and Tweaking Discrete Pruning
Yoshinori Aono and Phong Q. Nguyen and Yixin Shen
2018/545 ( PDF )
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers
Xiaolu Hou and Jakub Breier and Fuyuan Zhang and Yang Liu
2018/544 ( PDF )
Pseudorandom Quantum States
Zhengfeng Ji and Yi-Kai Liu and Fang Song
2018/543 ( PDF )
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
Kristian Gjřsteen and Tibor Jager
2018/542 ( PDF )
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions
Rafail Ostrovsky and Giuseppe Persiano and Daniele Venturi and Ivan Visconti
2018/541 ( PDF )
Generic Attacks against Beyond-Birthday-Bound MACs
Gaëtan Leurent and Mridul Nandi and Ferdinand Sibleyras
2018/540 ( PDF )
Must the Communication Graph of MPC Protocols be an Expander?
Elette Boyle and Ran Cohen and Deepesh Data and Pavel Hubacek
2018/539 ( PDF )
Extracting Linearization Equations from Noisy Sources
Daniel Smith-Tone
2018/538 ( PDF )
Non-Malleable Codes for Partial Functions with Manipulation Detection
Aggelos Kiayias and Feng-Hao Liu and Yiannis Tselekounis
2018/537 ( PDF )
Quantum Security Analysis of CSIDH
Xavier Bonnetain and André Schrottenloher
2018/536 ( PDF )
On the Hardness of the Computational Ring-LWR Problem and its Applications
Long Chen and Zhenfeng Zhang and Zhenfei Zhang
2018/535 ( PDF )
Monero - Privacy in the Blockchain
Kurt M. Alonso and Jordi Herrera Joancomartí
2018/534 ( PDF )
Cryptographic Constructions Supporting Implicit Data Integrity
Michael Kounavis and David Durham and Sergej Deutsch and Antonios Papadimitriou and Amitabh Das
2018/533 ( PDF )
Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model
Alice Pellet-Mary
2018/532 ( PDF )
Ring packing and amortized FHEW bootstrapping
Daniele Micciancio and Jessica Sorrell
2018/531 ( PDF )
Polynomial direct sum masking to protect against both SCA and FIA
Claude Carlet and Abderrahman Daif and Sylvain Guilley and Cédric Tavernier
2018/530 ( PDF )
Two-Message Statistically Sender-Private OT from LWE
Zvika Brakerski and Nico Döttling
2018/529 ( PDF )
Trapdoor Functions from the Computational Diffie-Hellman Assumption
Sanjam Garg and Mohammad Hajiabadi
2018/528 ( PDF )
Recovering short secret keys of RLCE in polynomial time
Alain Couvreur and Matthieu Lequesne and Jean-Pierre Tillich
2018/527 ( PDF )
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data an d Memory Complexities
Achiya Bar-On and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir
2018/526 ( PDF )
Towards KEM Unification
Daniel J. Bernstein and Edoardo Persichetti
2018/525 ( PDF )
Location-Proof System based on Secure Multi-Party Computations
Aurélien Dupin and Jean-Marc Robert and Christophe Bidan
2018/524 ( PDF )
New Smooth Projective Hashing For Oblivious Transfer
Bing Zeng
2018/523 ( PDF )
Reducing Complexity of Pairing Comparisons using Polynomial Evaluation
Adam Bobowski and Marcin Słowik
2018/522 ( PDF )
Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1
Yosuke Todo and Takanori Isobe and Willi Meier and Kazumaro Aoki and Bin Zhang
2018/521 ( PDF )
Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound
Gil Segev and Ido Shahaf
2018/520 ( PDF )
Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries
Mridul Nandi
2018/519 ( PDF )
Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules
Brandon Broadnax and Alexander Koch and Jeremias Mechler and Tobias Müller and Jörn Müller-Quade and Matthias Nagel
2018/518 ( PDF )
Secure and Reliable Key Agreement with Physical Unclonable Functions
Onur Gunlu and Tasnad Kernetzky and Onurcan Iscan and Vladimir Sidorenko and Gerhard Kramer and Rafael F. Schaefer
2018/517 ( PDF )
Upper and Lower Bounds for Continuous Non-Malleable Codes
Dana Dachman-Soled and Mukul Kulkarni
2018/516 ( PDF )
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound
Atsushi Takayasu and Noboru Kunihiro
2018/515 ( PDF )
Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity
Osman Bicer and Muhammed Ali Bingol and Mehmet Sabir Kiraz and Albert Levi
2018/514 ( PDF )
Weak Compression and (In)security of Rational Proofs of Storage
Ben Fisch and Shashwat Silas
2018/513 ( PDF )
Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies
Cristina Pérez-Solŕ and Sergi Delgado-Segura and Guillermo Navarro-Arribas and Jordi Herrera-Joancomart
2018/512 ( PDF )
Provably Secure Integration Cryptosystem on Non-Commutative Group
Weiqing You and Xiaoming Chen
2018/511 ( PDF )
Return of GGH15: Provable Security Against Zeroizing Attacks
James Bartusek and Jiaxin Guan and Fermi Ma and Mark Zhandry
2018/510 ( PDF )
Key-Secrecy of PACE with OTS/CafeOBJ
Dominik Klein
2018/509 ( -- withdrawn -- )
Improved Collision Attack on Reduced RIPEMD-160
Fukang Liu and Gaoli Wang and Zhenfu Cao
2018/508 ( PDF )
Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors
Mriganka Mandal and Ratna Dutta
2018/507 ( PDF )
Tight Tradeoffs in Searchable Symmetric Encryption
Gilad Asharov and Gil Segev and Ido Shahaf
2018/506 ( PDF )
Secure Two-Party Computation over Unreliable Channels
Ran Gelles and Anat Paskin-Cherniavsky and Vassilis Zikas
2018/505 ( PDF )
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference \& Automated Optimizations
Gilles Barthe and Sonia Belaďd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and François-Xavier Standaert and Pierre-Yves Strub
2018/504 ( PDF )
Quantum Attacks on Some Feistel Block Ciphers
Xiaoyang Dong and Bingyou Dong and Xiaoyun Wang
2018/503 ( PDF )
Finger Printing Data
Gideon Samid
2018/502 ( PDF )
Computer-aided proofs for multiparty computation with active security
Helene Haagh and Aleksandr Karbyshev and Sabine Oechsner and Bas Spitters and Pierre-Yves Strub
2018/501 ( -- withdrawn -- )
Secure Grouping and Aggregation with MapReduce
Radu Ciucanu and Matthieu Giraud and Pascal Lafourcade and Lihua Ye
2018/500 ( PDF )
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC
Nilanjan Datta and Avijit Dutta and Mridul Nandi and Kan Yasuda
2018/499 ( PDF )
Secure Two-party Threshold ECDSA from ECDSA Assumptions
Jack Doerner and Yashvanth Kondi and Eysa Lee and abhi shelat
2018/498 ( PDF )
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Qian Guo and Vincent Grosso and François-Xavier Standaert and Olivier Bronchain
2018/497 ( PDF )
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
Xiangfu Song and Changyu Dong and Dandan Yuan and Qiuliang Xu and Minghao Zhao
2018/496 ( PDF )
Efficient Delegated Private Set Intersection on Outsourced Private Datasets
Aydin Abadi and Sotirios Terzis and Roberto Metere and Changyu Dong
2018/495 ( PDF )
Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity
Changyu Dong and Grigorios Loukides
2018/494 ( PDF )
Order-LWE and the Hardness of Ring-LWE with Entropic Secrets
Madalina Bolboceanu and Zvika Brakerski and Renen Perlman and Devika Sharma
2018/493 ( PDF )
Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal
Lior Rotem and Gil Segev
2018/492 ( PDF )
New Instantiations of the CRYPTO 2017 Masking Schemes
Pierre Karpman and Daniel S. Roche
2018/491 ( PDF )
Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol
Matvei Kotov and Anton Menshov and Alexey Myasnikov and Dmitry Panteleev and Alexander Ushakov
2018/490 ( PDF )
Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed
Thorben Moos and Amir Moradi and Tobias Schneider and François-Xavier Standaert
2018/489 ( PDF )
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Changyu Dong and Yilei Wang and Amjad Aldweesh and Patrick McCorry and Aad van Moorsel
2018/488 ( PDF )
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound
Benoît Cogliati and Jooyoung Lee
2018/487 ( PDF )
Unbounded Inner-Product Functional Encryption, with Succinct Keys
Edouard Dufour Sans and David Pointcheval
2018/486 ( PDF )
Pushing the Communication Barrier in Secure Computation using Lookup Tables
Ghada Dessouky and Farinaz Koushanfar and Ahmad-Reza Sadeghi and Thomas Schneider and Shaza Zeitouni and Michael Zohner
2018/485 ( PDF )
Towards practical key exchange from ordinary isogeny graphs
Luca De Feo and Jean Kieffer and Benjamin Smith
2018/484 ( PDF )
Authenticated Encryption with Nonce Misuse and Physical Leakages: Definitions, Separation Results, and Leveled Constructions
Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2018/483 ( PDF )
Compact Multi-Signatures for Smaller Blockchains
Dan Boneh and Manu Drijvers and Gregory Neven
2018/482 ( PDF )
SPDZ2k: Efficient MPC mod 2^k for Dishonest Majority
Ronald Cramer and Ivan Damgĺrd and Daniel Escudero and Peter Scholl and Chaoping Xing
2018/481 ( PDF )
On the Exact Round Complexity of Secure Three-Party Computation
Arpita Patra and Divya Ravi
2018/480 ( PDF )
On Distributional Collision Resistant Hashing
Ilan Komargodski and Eylon Yogev
2018/479 ( PDF )
On the security of Jhanwar-Barua Identity-Based Encryption Scheme
Adrian G. Schipor
2018/478 ( PDF )
On Non-Monotonicity of the Success Probability in Linear Cryptanalysis
Ali Aydin Selcuk
2018/477 ( PDF )
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information
Lejla Batina and Shivam Bhasin and Dirmanto Jap and Stjepan Picek
2018/476 ( PDF )
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations
Stjepan Picek and Annelie Heuser and Alan Jovic and Shivam Bhasin and Francesco Regazzoni
2018/475 ( PDF )
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures
Jonathan Katz and Vladimir Kolesnikov and Xiao Wang
2018/474 ( PDF )
Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification
Peter Sebastian Nordholt and Meilof Veeningen
2018/473 ( PDF )
A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement
Daniele Friolo and Daniel Masny and Daniele Venturi
2018/472 ( PDF )
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
Giulio Malavolta and Pedro Moreno-Sanchez and Clara Schneidewind and Aniket Kate and Matteo Maffei
2018/471 ( PDF )
Efficient Range ORAM with $\mathbb{O}(\log^{2}{N})$ Locality
Anrin Chakraborti and Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche and Radu Sion
2018/470 ( PDF )
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
Thomas Agrikola and Geoffroy Couteau and Dennis Hofheinz
2018/469 ( PDF )
An Abstract Model of UTxO-based Cryptocurrencies with Scripts
Joachim Zahnentferner
2018/468 ( PDF )
On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs
Yaobin Shen and Lei Wang
2018/467 ( PDF )
Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation
Nigel P. Smart and Tim Wood
2018/466 ( PDF )
A secure end-to-end verifiable e-voting system using zero knowledge based blockchain
Somnath Panja and Bimal Kumar Roy
2018/465 ( PDF )
A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model
Geoffroy Couteau
2018/464 ( PDF )
Cryptanalysis of MORUS
Tomer Ashur and Maria Eichlseder and Martin M. Lauridsen and Gaëtan Leurent and Brice Minaud and Yann Rotella and Yu Sasaki and Benoît Viguier
2018/463 ( PDF )
Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map
Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro
2018/462 ( PDF )
Logistic regression over encrypted data from fully homomorphic encryption
Hao Chen and Ran Gilad-Bachrach and Kyoohyung Han and Zhicong Huang and Amir Jalali and Kim Laine and Kristin Lauter
2018/461 ( PDF )
Continuous-Source Fuzzy Extractors: Source uncertainty and security
Benjamin Fuller and Lowen Peng
2018/460 ( PDF )
RapidChain: Scaling Blockchain via Full Sharding
Mahdi Zamani and Mahnush Movahedi and Mariana Raykova
2018/459 ( PDF )
Supersingular Isogeny Oblivious Transfer
Paulo Barreto and Glaucio Oliveira and Waldyr Benits and Anderson Nascimento
2018/458 ( PDF )
Characterizing Collision and Second-Preimage Resistance in Linicrypt
Ian McQuoid and Trevor Swope and Mike Rosulek
2018/457 ( PDF )
From FE Combiners to Secure MPC and Back
Prabhanjan Ananth and Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai
2018/456 ( PDF )
An efficient structural attack on NIST submission DAGS
Elise Barelli and Alain Couvreur
2018/455 ( PDF )
On Renyi Entropies and their Applications to Guessing Attacks in Cryptography
Serdar Boztas
2018/454 ( PDF )
R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies
Mohsen Minaei and Pedro Moreno-Sanchez and Aniket Kate
2018/453 ( PDF )
Floppy-Sized Group Signatures from Lattices
Cecilia Boschini and Jan Camenisch and Gregory Neven
2018/452 ( PDF )
Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2
Panjin Kim and Daewan Han and Kyung Chul Jeong
2018/451 ( PDF )
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model
Shuichi Katsumata and Shota Yamada and Takashi Yamakawa
2018/450 ( PDF )
From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation
David W. Archer and Dan Bogdanov and Liina Kamm and Y. Lindell and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright
2018/449 ( PDF )
Key Prediction Security of Keyed Sponges
Bart Mennink
2018/448 ( PDF )
Non-adaptive Group-Testing Aggregate MAC Scheme
Shoichi Hirose and Junji Shikata
2018/447 ( PDF )
Improved Distinguisher Search Techniques Based on Parity Sets
Xiaofeng Xie and Tian Tian
2018/446 ( PDF )
A voting scheme with post-quantum security based on physical laws
Hua Dong and Li Yang
2018/445 ( PDF )
CRPSF and NTRU Signatures over cyclotomic fields
Yang Wang and Mingqiang Wang
2018/444 ( PDF )
Founding Cryptography on Smooth Projective Hashing
Bing Zeng
2018/443 ( PDF )
Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits
Rishab Goyal
2018/442 ( PDF )
SecureNN: Efficient and Private Neural Network Training
Sameer Wagh and Divya Gupta and Nishanth Chandran
2018/441 ( PDF )
Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols
Amos Beimel and Naty Peter
2018/440 ( PDF )
Formal Analysis of Distance Bounding with Secure Hardware
Handan Kılınç and Serge Vaudenay
2018/439 ( PDF )
Tight Private Circuits: Achieving Probing Security with the Least Refreshing
Sonia Belaïd and Dahmun Goudarzi and Matthieu Rivain
2018/438 ( PDF )
Trivially and Efficiently Composing Masked Gadgets with Probe Isolating Non-Interference
Gaëtan Cassiers and François-Xavier Standaert
2018/437 ( PDF )
Zero-Knowledge Protocols for Search Problems
Ben Berger and Zvika Brakerski
2018/436 ( PDF )
Crash-tolerant Consensus in Directed Graph Revisited
Ashish Choudhury and Gayathri Garimella and Arpita Patra and Divya Ravi and Pratik Sarkar
2018/435 ( PDF )
A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence
Bingsheng Zhang and Roman Oliynykov and Hamed Balogun
2018/434 ( PDF )
Towards Tight Security of Cascaded LRW2
Bart Mennink
2018/433 ( PDF )
Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data
Guowen Xu and Hongwei Li
2018/432 ( PDF )
Hidden Shift Quantum Cryptanalysis and Implications
Xavier Bonnetain and María Naya-Plasencia
2018/431 ( -- withdrawn -- )
Lightweight ASIC Implementation of AEGIS-128
Anubhab Baksi and Vikramkumar Pudi and Swagata Mandal and Anupam Chattopadhyay
2018/430 ( PDF )
A Simplified Approach to Rigorous Degree 2 Elimination in Discrete Logarithm Algorithms
Faruk Göloğlu and Antoine Joux
2018/429 ( PDF )
Amortized Complexity of Information-Theoretically Secure MPC Revisited
Ignacio Cascudo and Ronald Cramer and Chaoping Xing and Chen Yuan
2018/428 ( PDF )
Differential Fault Analysis of Rectangle-80
Shobhit Sinha and Sandip Karmakar
2018/427 ( PDF )
Secure Boot and Remote Attestation in the Sanctum Processor
Ilia Lebedev and Kyle Hogan and Srinivas Devadas
2018/426 ( PDF )
Adaptively Secure Proxy Re-encryption
Georg Fuchsbauer and Chethan Kamath and Karen Klein and Krzysztof Pietrzak
2018/425 ( PDF )
Implementing RLWE-based Schemes Using an RSA Co-Processor
Martin R. Albrecht and Christian Hanser and Andrea Hoeller and Thomas Pöppelmann and Fernando Virdia and Andreas Wallner
2018/424 ( PDF )
Circumventing Cryptographic Deniability with Remote Attestation
Lachlan J. Gunn and Ricardo Vieitez Parra and N. Asokan
2018/423 ( PDF )
Yes, There is an Oblivious RAM Lower Bound!
Kasper Green Larsen and Jesper Buus Nielsen
2018/422 ( PDF )
Message-locked Encryption with File Update
Suyash Kandele and Souradyuti Paul
2018/421 ( PDF )
TFHE: Fast Fully Homomorphic Encryption over the Torus
Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachčne
2018/420 ( PDF )
Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance
Shuichi Katsumata and Takahiro Matsuda and Atsushi Takayasu
2018/419 ( PDF )
Homomorphic Secret Sharing: Optimizations and Applications
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Michele Orrů
2018/418 ( PDF )
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
Vladimir Kiriansky and Ilia Lebedev and Saman Amarasinghe and Srinivas Devadas and Joel Emer
2018/417 ( PDF )
On the Security of Two-Round Multi-Signatures
Manu Drijvers and Kasra Edalatnejad and Bryan Ford and Eike Kiltz and Julian Loss and Gregory Neven and Igors Stepanovs
2018/416 ( PDF )
Ledger Design Language: Towards Formal Reasoning and Implementation for Public Ledgers
Nadim Kobeissi and Natalia Kulatova
2018/415 ( PDF )
Flux: Revisiting Near Blocks for Proof-of-Work Blockchains
Alexei Zamyatin and Nicholas Stifter and Philipp Schindler and Edgar Weippl and William J. Knottenbelt
2018/414 ( PDF )
Aggregation of Gamma-Signatures and Applications to Bitcoin
Yunlei Zhao
2018/413 ( PDF )
Scaling Backend Authentication at Facebook
Kevin Lewi and Callen Rain and Stephen Weis and Yueting Lee and Haozhi Xiong and Benjamin Yang
2018/412 ( PDF )
PRCash: Fast, Private and Regulated Transactions for Digital Currencies
Karl Wüst and Kari Kostiainen and Vedran Capkun and Srdjan Capkun
2018/411 ( PDF )
Unsupervised Machine Learning on Encrypted Data
Angela Jäschke and Frederik Armknecht
2018/410 ( PDF )
A Note On Clauser-Horne-Shimony-Holt Inequality
Zhengjun Cao and Lihua Liu
2018/409 ( PDF )
Laconic Function Evaluation and Applications
Willy Quach and Hoeteck Wee and Daniel Wichs
2018/408 ( PDF )
Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem
Jung Hee Cheon and Minki Hhan and Jiseung Kim and Changmin Lee
2018/407 ( PDF )
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol
Cencen Wan and Shuyang Tang and Yuncong Zhang and Chen Pan and Zhiqiang Liu and Yu Long and Zhen Liu and Yu Yu
2018/406 ( PDF )
“Larger Keys, Less Complexity” A Strategic Proposition
Gideon Samid
2018/405 ( PDF )
A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes.
Sankhanil Dey and Ranjan Ghosh
2018/404 ( PDF )
Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Hugo Pacheco and Vitor Pereira and Bernardo Portela
2018/403 ( PDF )
ABY3: A Mixed Protocol Framework for Machine Learning
Payman Mohassel and Peter Rindal
2018/402 ( PDF )
Another Look at Relay and Distance-based Attacks in Contactless Payments
Ioana Boureanu and Anda Anda
2018/401 ( PDF )
Lattice-based Direct Anonymous Attestation (LDAA)
Nada EL Kassem and Liqun Chen and Rachid El Bansarkhani and Ali El Kaafarani and Jan Camenisch and Patrick Hough and Paulo Martins and Leonel Sousa
2018/400 ( PDF )
Agreement with Satoshi – On the Formalization of Nakamoto Consensus
Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Alexei Zamyatin and Edgar Weippl
2018/399 ( PDF )
On the Feasibility of an ECDLP Algorithm
Sergey Grebnev
2018/398 ( PDF )
Fun with Bitcoin smart contracts
Massimo Bartoletti and Tiziana Cimoli and Roberto Zunino
2018/397 ( PDF )
Cryptanalysis on the HHSS Obfuscation Arising from Absence of Safeguards
Jung Hee Cheon and Minki Hhan and Jiseung Kim and Changmin Lee
2018/396 ( PDF )
New Bleichenbacher Records: Fault Attacks on qDSA Signatures
Akira Takahashi and Mehdi Tibouchi and Masayuki Abe
2018/395 ( PDF )
Secure Computation with Constant Communication Overhead using Multiplication Embeddings
Alexander R. Block and Hemanta K. Maji and Hai H. Nguyen
2018/394 ( PDF )
Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited
Laasya Bangalore and Ashish Choudhury and Arpita Patra
2018/393 ( PDF )
AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM
Matvei Kotov and Anton Menshov and Alexander Ushakov
2018/392 ( PDF )
Making AES great again: the forthcoming vectorized AES instruction
Nir Drucker, Shay Gueron and Vlad Krasnov
2018/391 ( PDF )
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
Romain Gay and Lucas Kowalczyk and Hoeteck Wee
2018/390 ( PDF )
MILP-based Differential Attack on Round-reduced GIFT
Baoyu Zhu and Xiaoyang Dong and Hongbo Yu
2018/389 ( PDF )
Distributed SSH Key Management with Proactive RSA Threshold Signatures
Yotam Harchol and Ittai Abraham and Benny Pinkas
2018/388 ( PDF )
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT
Seyed Farhad Aghili and Hamid Mala
2018/387 ( PDF )
Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority
Ryo Kikuchi and Dai Ikarashi and Takahiro Matsuda and Koki Hamada and Koji Chida
2018/386 ( PDF )
Certificateless Public Key Signature Schemes from Standard Algorithms
Zhaohui Cheng and Liqun Chen
2018/385 ( PDF )
Cryptographic Hashing From Strong One-Way Functions
Justin Holmgren and Alex Lombardi
2018/384 ( -- withdrawn -- )
Fine-Grained and Application-Ready Distance-Bounding Security
Ioana Boureanu and David Gerault and Pascal Lafourcade
2018/383 ( PDF )
CSIDH: An Efficient Post-Quantum Commutative Group Action
Wouter Castryck and Tanja Lange and Chloe Martindale and Lorenz Panny and Joost Renes
2018/382 ( PDF )
Revocable Identity-based Encryption from Codes with Rank Metric
Donghoon Chang and Amit Kumar Chauhan and Sandeep Kumar and Somitra Kumar Sanadhya
2018/381 ( PDF )
Masking the GLP Lattice-Based Signature Scheme at Any Order
Gilles Barthe and Sonia Belaďd and Thomas Espitau and Pierre-Alain Fouque and Benjamin Grégoire and Mélissa Rossi and Mehdi Tibouchi
2018/380 ( PDF )
Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution
Jonathan Bootle and Andrea Cerulli and Jens Groth and Sune Jakobsen and Mary Maller
2018/379 ( PDF )
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)
Wilson Alberto Torres and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Veronika Kuchta and Nandita Bhattacharjee and Man Ho Au and Jacob Cheng
2018/378 ( PDF )
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability
Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas
2018/377 ( PDF )
ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement
Jing Chen and Sergey Gorbunov and Silvio Micali and Georgios Vlachos
2018/376 ( PDF )
Arithmetic Considerations for Isogeny Based Cryptography
Joppe W. Bos and Simon Friedberger
2018/375 ( PDF )
Witness Indistinguishability for any Single-Round Argument with Applications to Access Control
Zvika Brakerski and Yael Tauman Kalai
2018/374 ( PDF )
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
Zhenzhen Bao and Jian Guo and Lei Wang
2018/373 ( PDF )
PanORAMa: Oblivious RAM with Logarithmic Overhead
Sarvar Patel and Giuseppe Persiano and Mariana Raykova and Kevin Yeo
2018/372 ( PDF )
Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions)
Alexander R. Block and Divya Gupta and Hemanta K. Maji and Hai H. Nguyen
2018/371 ( PDF )
Supersingular isogeny graphs and endomorphism rings: reductions and solutions
Kirsten Eisentraeger and Sean Hallgren and Kristin Lauter and Travis Morrison and Christophe Petit
2018/370 ( PDF )
Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters
A.V. Menyachikhin
2018/369 ( PDF )
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
Hyung Tae Lee and Huaxiong Wang and Kai Zhang
2018/368 ( PDF )
Encryption with Untrusted Keys: Security against Chosen Objects Attack
Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran
2018/367 ( PDF )
Cache-Timing Attacks on RSA Key Generation
Alejandro Cabrera Aldaya and Cesar Pereida García and Luis Manuel Alvarez Tapia and Billy Bob Brumley
2018/366 ( PDF )
Directional Distance-Bounding Identification Protocols
Ahmad Ahmadi and Reihaneh Safavi-Naini
2018/365 ( PDF )
Anonymous Distance-Bounding Identification
Ahmad Ahmadi and Reihaneh Safavi-Naini and Mamunur Akand
2018/364 ( PDF )
Perfectly Secure Oblivious Parallel RAM
T-H. Hubert Chan and Kartik Nayak and Elaine Shi
2018/363 ( PDF )
Private Anonymous Data Access
Ariel Hamlin and Rafail Ostrovsky and Mor Weiss and Daniel Wichs
2018/362 ( PDF )
Backdoored Hash Functions: Immunizing HMAC and HKDF
Marc Fischlin and Christian Janson and Sogol Mazaheri
2018/361 ( PDF )
Two-message Key Exchange with Strong Security from Ideal Lattices
Zheng Yang and Yu Chen and Song Luo
2018/360 ( PDF )
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
Yilei Chen and Vinod Vaikuntanathan and Hoeteck Wee
2018/359 ( -- withdrawn -- )
Privacy-Preserving Multibiometric Authentication in Cloud with Untrusted Database Providers
Christina-Angeliki Toli and Abdelrahaman Aly and Bart Preneel
2018/358 ( PDF )
Efficient Erasable PUFs from Programmable Logic and Memristors
Yansong Gao and Chenglu Jin and Jeeson Kim and Hussein Nili and Xiaolin Xu and Wayne Burleson and Omid Kavehei and Marten van Dijk and Damith C. Ranasinghe and Ulrich Rührmair
2018/357 ( PDF )
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
Christoph Dobraunig and Maria Eichlseder and Hannes Gross and Stefan Mangard and Florian Mendel and Robert Primas
2018/356 ( PDF )
In Praise of Twisted Canonical Embedding
Jheyne N. Ortiz and Robson R. de Araujo and Ricardo Dahab and Diego F. Aranha and Sueli I. R. Costa
2018/355 ( PDF )
Differential Fault Attacks on Deterministic Lattice Signatures
Leon Groot Bruinderink and Peter Pessl
2018/354 ( PDF )
Start your ENGINEs: dynamically loadable contemporary crypto
Nicola Tuveri and Billy B. Brumley
2018/353 ( PDF )
Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
Xin Li
2018/352 ( PDF )
Cryptography with Disposable Backdoors
Kai-Min Chung and Marios Georgiou and Ching-Yi Lai and Vassilis Zikas
2018/351 ( PDF )
A Chosen Plaintext Attack on Offset Public Permutation Mode
Miloslav Homer
2018/350 ( PDF )
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks
Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Ulrich Rührmair and Marten van Dijk
2018/349 ( PDF )
An Analysis of the NIST SP 800-90A Standard
Joanne Woodage and Dan Shumow
2018/348 ( PDF )
Monero Ring Attack: Recreating Zero Mixin Transaction Effect
Dimaz Ankaa Wijaya and Joseph Liu and Ron Steinfeld and Dongxi Liu
2018/347 ( PDF )
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval
Stanislaw Jarecki and Boyang Wei
2018/346 ( PDF )
Collusion Resistant Traitor Tracing from Learning with Errors
Rishab Goyal and Venkata Koppula and Brent Waters
2018/345 ( PDF )
In-region Authentication
Mamunur Rashid Akand and Reihaneh Safavi-Naini
2018/344 ( PDF )
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection
Andrea Cerulli and Emiliano De Cristofaro and Claudio Soriente
2018/343 ( PDF )
Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments
Duc Viet Le and Mahimna Kelkar and Aniket Kate
2018/342 ( PDF )
MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth
Ralph Ankele and Florian Böhl and Simon Friedberger
2018/341 ( PDF )
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
William Diehl and Abubakr Abdulgadir and Farnoud Farahmand and Jens-Peter Kaps and Kris Gaj
2018/340 ( PDF )
Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures
Johannes Blömer and Jan Bobolz
2018/339 ( PDF )
Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme
Thomas Debris-Alazard and Jean-Pierre Tillich
2018/338 ( PDF )
Quantum FHE (Almost) As Secure As Classical
Zvika Brakerski
2018/337 ( PDF )
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Marc Fischlin and Patrick Harasser
2018/336 ( PDF )
SoK: The Problem Landscape of SIDH
David Urbanik and David Jao
2018/335 ( PDF )
Fast modular squaring with AVX512IFMA
Nir Drucker and Shay Gueron
2018/334 ( PDF )
Impossible Differential Attack on QARMA Family of Block Ciphers
Dong Yang and Wen-feng Qi and Hua-jin Chen
2018/333 ( PDF )
Breaking the Circuit-Size Barrier in Secret Sharing
Tianren Liu and Vinod Vaikuntanathan
2018/332 ( PDF )
Differential Cryptanalysis of Round-Reduced Sparx-64/128
Ralph Ankele and Eik List
2018/331 ( PDF )
Estimate all the {LWE, NTRU} schemes!
Martin R. Albrecht and Benjamin R. Curtis and Amit Deo and Alex Davidson and Rachel Player and Eamonn W. Postlethwaite and Fernando Virdia and Thomas Wunderer
2018/330 ( PDF )
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List
Joseph K. Liu and Tsz Hon Yuen and Peng Zhang and Kaitai Liang
2018/329 ( PDF )
Symbolic Side-Channel Analysis for Probabilistic Programs
Pasquale Malacaria and MHR. Khouzani and Corina S. Păsăreanu and Quoc-Sang Phan and Kasper Luckow
2018/328 ( PDF )
Improved High-Order Conversion From Boolean to Arithmetic Masking
Luk Bettale and Jean-Sebastien Coron and Rina Zeitoun
2018/327 ( PDF )
A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System
Zhengjun Cao and Lihua Liu
2018/326 ( -- withdrawn -- )
Verifier Non-Locality in Interactive Proofs
Claude Crepeau and Nan Yang
2018/325 ( PDF )
Multi-power Post-quantum RSA
John M. Schanck
2018/324 ( PDF )
ACPC: Efficient revocation of pseudonym certificates using activation codes
Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Marcos Vinicius M. Silva
2018/323 ( PDF )
PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
2018/322 ( PDF )
DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks
Huili Chen and Bita Darvish Rohani and Farinaz Koushanfar
2018/321 ( PDF )
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications
David Derler and Stephan Krenn and Thomas Lorünser and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks
2018/320 ( PDF )
General State Channel Networks
Stefan Dziembowski and Sebastian Faust and Kristina Hostáková
2018/319 ( PDF )
HydRand: Practical Continuous Distributed Randomness
Philipp Schindler and Aljosha Judmayer and Nicholas Stifter and Edgar Weippl
2018/318 ( PDF )
Practical attacks against the Walnut digital signature scheme
Ward Beullens and Simon R. Blackburn
2018/317 ( PDF )
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
Dor Fledel and Avishai Wool
2018/316 ( PDF )
Non-Malleable Secret Sharing
Vipul Goyal and Ashutosh Kumar
2018/315 ( PDF )
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
Dahmun Goudarzi and Anthony Journault and Matthieu Rivain and François-Xavier Standaert
2018/314 ( PDF )
Secure top most significant genome variants search: iDASH 2017 competition
Sergiu Carpov and Thibaud Tortech
2018/313 ( PDF )
On the cost of computing isogenies between supersingular elliptic curves
Gora Adj and Daniel Cervantes-Vázquez and Jesús-Javier Chi-Domínguez and Alfred Menezes and Francisco Rodríguez-Henríquez
2018/312 ( PDF )
Multilinear maps via secret ring
Chunsheng Gu
2018/311 ( PDF )
DeepSigns: A Generic Watermarking Framework for Protecting the Ownership of Deep Learning Models
Bita Darvish Rouhani and Huili Chen and farinaz Koushanfar
2018/310 ( PDF )
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
Yasufumi Hashimoto and Yasuhiko Ikematsu and Tsuyoshi Takagi
2018/309 ( -- withdrawn -- )
Error Estimation of Practical Convolution Discrete Gaussian Sampling with Rejection Sampling
Zhongxiang Zheng and Xiaoyun Wang and Guangwu Xu and Chunhuan Zhao
2018/308 ( PDF )
On perfectly secure 2PC in the OT-hybrid model
Bar Alon and Anat Paskin-Cherniavsky
2018/307 ( PDF )
Isolated Curves and the MOV Attack
Travis Scholl
2018/306 ( PDF )
State Separation for Code-Based Game-Playing Proofs
Chris Brzuska and Antoine Delignat-Lavaud and Cedric Fournet and Konrad Kohbrok and Markulf Kohlweiss
2018/305 ( PDF )
Efficient four-dimensional GLV curve with high security
Olivier Bernard and Renaud Dubois and Simon Masson
2018/304 ( PDF )
Geosocial Query with User-Controlled Privacy
Peizhao Hu and Sherman S.M. Chow and Asma Aloufi
2018/303 ( PDF )
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State
Bernardo David and Rafael Dowsley and Mario Larangeira
2018/302 ( PDF )
Rethinking Large-Scale Consensus
Rafael Pass and Elaine Shi
2018/301 ( PDF )
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography
Estuardo Alpirez Bock and Chris Brzuska and Wil Michiels and Alexander Treff
2018/300 ( PDF )
Outsourcing Modular Exponentiation in Cryptographic Web Applications
Pascal Mainini and Rolf Haenni
2018/299 ( PDF )
Clusters of Re-used Keys
Stephen Farrell
2018/298 ( PDF )
In search of CurveSwap: Measuring elliptic curve implementations in the wild
Luke Valenta and Nick Sullivan and Antonio Sanso and Nadia Heninger
2018/297 ( PDF )
Fine-Grained Secure Computation
Matteo Campanelli and Rosario Gennaro
2018/296 ( PDF )
Asynchronous ratcheted key exchange
Bertram Poettering and Paul Rösler
2018/295 ( PDF )
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers (Revised Version)
Sayandeep Saha and Debdeep Mukhopadhyay and Pallab Dasgupta
2018/294 ( PDF )
Learning strikes again: the case of the DRS signature scheme
Léo Ducas and Yang Yu
2018/293 ( PDF )
Privacy Amplification from Non-malleable Codes
Eshan Chattopadhyay and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar
2018/292 ( PDF )
Linear Biases in AEGIS Keystream
Brice Minaud
2018/291 ( PDF )
Simulations of Optical Emissions for Attacking AES and Masked AES
Guido Marco Bertoni and Lorenzo Grassi and Filippo Melzani
2018/290 ( PDF )
Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System
Vireshwar Kumar and He Li and Noah Luther and Pranav Asokan and Jung-Min (Jerry) Park and Kaigui Bian and Martin B. H. Weiss and Taieb Znati
2018/289 ( PDF )
Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue
Phillipp Schoppmann and and Lennart Vogelsang and Adriŕ Gascón and Borja Balle
2018/288 ( PDF )
Constant Size Traceable Ring Signature Scheme without Random Oracles
Ke Gu and Na Wu
2018/287 ( PDF )
Secure Cloud Storage Scheme Based On Hybrid Cryptosystem
Atanu Basu and Indranil Sengupta
2018/286 ( PDF )
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT
Björn Haase and Benoît Labrique
2018/285 ( PDF )
Collateral Damage of Facebook Applications: a Comprehensive Study
Iraklis Symeonidis and Gergely Biczók and Fatemeh Shirazi and Cristina Pérez-Solŕ and Jessica Schroers and Bart Preneel
2018/284 ( PDF )
Hadamard Matrices, $d$-Linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights
Qichun Wang
2018/283 ( PDF )
Homomorphic Rank Sort Using Surrogate Polynomials
Gizem S. Çetin and Berk Sunar
2018/282 ( PDF )
Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol
Jason LeGrow and David Jao and Reza Azarderakhsh
2018/281 ( PDF )
Upgrading to Functional Encryption
Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai and Brent Waters
2018/280 ( PDF )
Updatable and Universal Common Reference Strings with Applications to zk-SNARKs
Jens Groth and Markulf Kohlweiss and Mary Maller and Sarah Meiklejohn and Ian Miers
2018/279 ( PDF )
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing
Zvika Brakerski and Vadim Lyubashevsky and Vinod Vaikuntanathan and Daniel Wichs
2018/278 ( PDF )
Mixed-radix Naccache-Stern encryption
Rémi Géraud and David Naccache
2018/277 ( PDF )
Approximate and Probabilistic Differential Privacy Definitions
Sebastian Meiser
2018/276 ( PDF )
How to Record Quantum Queries, and Applications to Quantum Indifferentiability
Mark Zhandry
2018/275 ( PDF )
Lattice-Based zk-SNARKs from Square Span Programs
Rosario Gennaro and Michele Minelli and Anca Nitulescu and Michele Orrů
2018/274 ( PDF )
G-Merkle: A Hash-Based Group Signature Scheme From Standard Assumptions
Rachid El Bansarkhani and Rafael Misoczki
2018/273 ( PDF )
Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More
Prabhanjan Ananth and Xiong Fan and Elaine Shi
2018/272 ( PDF )
Multi-Theorem Preprocessing NIZKs from Lattices
Sam Kim and David J. Wu
2018/271 ( PDF )
MathCoin: A Blockchain Proposal that Helps Verify Mathematical Theorems In Public
Borching Su
2018/270 ( PDF )
A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later
Douglas R. Stinson
2018/269 ( PDF )
Vault: Fast Bootstrapping for the Algorand Cryptocurrency
Derek Leung and Adam Suhl and Yossi Gilad and Nickolai Zeldovich
2018/268 ( PDF )
Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead
Michael Raskin and Mark Simkin
2018/267 ( PDF )
A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies
Patrick Longa
2018/266 ( PDF )
Authenticated key exchange for SIDH
Steven D. Galbraith
2018/265 ( PDF )
Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography
Ayesha Khalid and James Howe and Ciara Rafferty and Francesco Regazzoni and Maire O’Neill
2018/264 ( PDF )
Security proof for Quantum Key Recycling with noise
Daan Leermakers and Boris Skoric
2018/263 ( -- withdrawn -- )
An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications
Seyyed Mahdi Sedaghat and Mohammad Hassan Ameri and Mahshid Delavar and Javad Mohajeri and Mohammad Reza Aref
2018/262 ( PDF )
Chimeric Ledgers: Translating and Unifying UTXO-based and Account-based Cryptocurrencies
Joachim Zahnentferner
2018/261 ( PDF )
Post-Quantum EPID Signatures from Symmetric Primitives
Dan Boneh and Saba Eskandarian and Ben Fisch
2018/260 ( PDF )
MDS Matrices with Lightweight Circuits
Sébastien Duval and Gaëtan Leurent
2018/259 ( PDF )
The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption
Zheng Yang and Kimmo Järvinen
2018/258 ( PDF )
Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers
Alya Geogiana Buja and Shekh Faisal Abdul-Latip and Rabiah Ahmad
2018/257 ( PDF )
On Quantum Indifferentiability
Tore Vincent Carstens and Ehsan Ebrahimi and Gelo Noel Tabia and Dominique Unruh
2018/256 ( PDF )
QC-MDPC: A Timing Attack and a CCA2 KEM
Edward Eaton and Matthieu Lequesne and Alex Parent and Nicolas Sendrier
2018/255 ( PDF )
Topology-Hiding Computation Beyond Semi-Honest Adversaries
Rio LaVigne and Chen-Da Liu-Zhang and Ueli Maurer and Tal Moran and Marta Mularczyk and Daniel Tschudi
2018/254 ( PDF )
Logistic Regression Model Training based on the Approximate Homomorphic Encryption
Andrey Kim and Yongsoo Song and Miran Kim and Keewoo Lee and Jung Hee Cheon
2018/253 ( PDF )
Capsule: A Protocol for Secure Collaborative Document Editing
Nadim Kobeissi
2018/252 ( PDF )
The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract
Yongge Wang and Qutaibah m. Malluhi
2018/251 ( PDF )
VeritasDB: High Throughput Key-Value Store with Integrity
Rohit Sinha and Mihai Christodorescu
2018/250 ( PDF )
Making Public Key Functional Encryption Function Private, Distributively
Xiong Fan and Qiang Tang
2018/249 ( PDF )
Analysis of Deutsch-Jozsa Quantum Algorithm
Zhengjun Cao and Jeffrey Uhlmann and Lihua Liu
2018/248 ( PDF )
Stake-Bleeding Attacks on Proof-of-Stake Blockchains
Peter Gaži and Aggelos Kiayias and Alexander Russell
2018/247 ( PDF )
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
Thang Hoang and Muslum Ozgur Ozmen and Yeongjin Jang and Attila A. Yavuz
2018/246 ( PDF )
Universally Verifiable MPC with Applications to IRV Ballot Counting
Chris Culnane and Olivier Pereira and Kim Ramchen and Vanessa Teague
2018/245 ( PDF )
Secure Search via Multi-Ring Fully Homomorphic Encryption
Adi Akavia and Dan Feldman and Hayim Shaul
2018/244 ( PDF )
Faster Homomorphic Linear Transformations in HElib
Shai Halevi and Victor Shoup
2018/243 ( PDF )
A New Approach to Deanonymization of Unreachable Bitcoin Nodes
Indra Deep Mastan and Souradyuti Paul
2018/242 ( PDF )
A New Constant-size Accountable Ring Signature Scheme Without Random Oracles
Sudhakar Kumawat and Souradyuti Paul
2018/241 ( PDF )
zkLedger: Privacy-Preserving Auditing for Distributed Ledgers
Neha Narula and Willy Vasquez and Madars Virza
2018/240 ( PDF )
Towards Non-Interactive Zero-Knowledge for NP from LWE
Ron D. Rothblum and Adam Sealfon and Katerina Sotiraki
2018/239 ( PDF )
RepuCoin: Your Reputation is Your Power
Jiangshan Yu and David Kozhaya and Jeremie Decouchant and Paulo Esteves-Verissimo
2018/238 ( PDF )
Private Set Intersection with Linear Communication from General Assumptions
Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky
2018/237 ( PDF )
On Tightly Secure Non-Interactive Key Exchange
Julia Hesse and Dennis Hofheinz and Lisa Kohl
2018/236 ( PDF )
Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network
Yuval Marcus and Ethan Heilman and Sharon Goldberg
2018/235 ( PDF )
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds
Julian Loss and Tal Moran
2018/234 ( PDF )
P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations
Hagen Sparka and Florian Tschorsch and Björn Scheuermann
2018/233 ( PDF )
Privacy-Preserving Logistic Regression Training
Charlotte Bonte and Frederik Vercauteren
2018/232 ( PDF )
Improved fully homomorphic public-key encryption with small ciphertext size
Masahiro Yagisawa
2018/231 ( PDF )
Remarks on Bell's Inequality
Zhengjun Cao and Lihua Liu
2018/230 ( PDF )
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
Jan-Pieter D’Anvers and Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren
2018/229 ( PDF )
Optimizing polynomial convolution for NTRUEncrypt
Wei Dai and William Whyte and Zhenfei Zhang
2018/228 ( PDF )
Non-interactive zaps of knowledge
Georg Fuchsbauer and Michele Orrů
2018/227 ( PDF )
Can We Overcome the $n \log n$ Barrier for Oblivious Sorting?
Wei-Kai Lin and Elaine Shi and Tiancheng Xie
2018/226 ( PDF )
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models
Sandro Coretti and Yevgeniy Dodis and Siyao Guo
2018/225 ( PDF )
A foundation for secret, verifiable elections
Ben Smyth
2018/224 ( PDF )
Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons
Rhys Carlton and Aleksander Essex and Krzysztof Kapulkin
2018/223 ( PDF )
Shorter double-authentication preventing signatures for small address spaces
Bertram Poettering
2018/222 ( PDF )
Authentication with weaker trust assumptions for voting systems
Elizabeth A. Quaglia and Ben Smyth
2018/221 ( PDF )
Bandwidth-Hard Functions: Reductions and Lower Bounds
Jeremiah Blocki and Ling Ren and Samson Zhou
2018/220 ( PDF )
PRO-ORAM: Constant Latency Read-Only Oblivious RAM
Shruti Tople and Yaoqi Jia and Prateek Saxena
2018/219 ( PDF )
On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering
Jakub Breier and Dirmanto Jap and Xiaolu Hou and Shivam Bhasin
2018/218 ( PDF )
On Evaluating Fault Resilient Encoding Schemes in Software
Jakub Breier and Xiaolu Hou and Yang Liu
2018/217 ( PDF )
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction
Mihir Bellare and Wei Dai
2018/216 ( PDF )
Secure Computation with Low Communication from Cross-checking
S. Dov Gordon and Samuel Ranellucci and Xiao Wang
2018/215 ( PDF )
Towards everlasting privacy and efficient coercion resistance in remote electronic voting
Panagiotis Grontas and Aris Pagourtzis and Alexandros Zacharakis and Bingsheng Zhang
2018/214 ( PDF )
RMAC -- A Lightweight Authentication Protocol for Highly Constrained IoT Devices
Ahmad Khoureich Ka
2018/213 ( PDF )
Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack
I. Stewart and D. Ilie and A. Zamyatin and S. Werner and M.F. Torshizi and W.J. Knottenbelt
2018/212 ( PDF )
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts
Thibaut Horel and Sunoo Park and Silas Richelson and Vinod Vaikuntanathan
2018/211 ( PDF )
Number "Not Used" Once - Practical fault attack on pqm4 implementations of NIST candidates
Prasanna Ravi and Debapriya Basu Roy and Shivam Bhasin and Anupam Chattopadhyay and Debdeep Mukhopadhyay
2018/210 ( PDF )
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards
Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi
2018/209 ( PDF )
Verifiable Management of Private Data under Byzantine Failures
Eleftherios Kokoris-Kogias and Enis Ceyhun Alp and Linus Gasser and Philipp Jovanovic and Ewa Syta and Bryan Ford
2018/208 ( PDF )
TinyKeys: A New Approach to Efficient Multi-Party Computation
Carmit Hazay and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez
2018/207 ( PDF )
Non-Malleable Codes for Small-Depth Circuits
Marshall Ball and Dana Dachman-Soled and Siyao Guo and Tal Malkin and Li-Yang Tan
2018/206 ( PDF )
Reading in the Dark: Classifying Encrypted Digits with Functional Encryption
Edouard Dufour Sans and Romain Gay and David Pointcheval
2018/205 ( PDF )
Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time
Thaddeus Dryja and Quanquan C. Liu and Sunoo Park
2018/204 ( PDF )
Short Non-Malleable Codes from Related-Key Secure Block Ciphers
Serge Fehr and Pierre Karpman and Bart Mennink
2018/203 ( PDF )
Impeccable Circuits
Anita Aghaie and Amir Moradi and Shahram Rasoolzadeh and Aein Rezaei Shahmirzadi and Falk Schellenberg and Tobias Schneider
2018/202 ( PDF )
Doing Real Work with FHE: The Case of Logistic Regression
Jack L.H. Crawford and Craig Gentry and Shai Halevi and Daniel Platt and Victor Shoup
2018/201 ( PDF )
Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers
Jim Basilakis and Bahman Javadi
2018/200 ( PDF )
Hermes. A framework for cryptographically assured access control and data security
Eugene Pilyankevich and Ignat Korchagin and Andrey Mnatsakanov
2018/199 ( PDF )
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
David Derler and Kai Gellert and Tibor Jager and Daniel Slamanig and Christoph Striecks
2018/198 ( PDF )
A Key-recovery Attack on 855-round Trivium
Ximing Fu and Xiaoyun Wang and Xiaoyang Dong and Willi Meier
2018/197 ( PDF )
Green Mining: toward a less energetic impact of cryptocurrencies
Philippe Jacquet and Bernard Mans
2018/196 ( PDF )
Non-Profiled Deep Learning-Based Side-Channel Attacks
Benjamin Timon
2018/195 ( PDF )
Breach-Resistant Structured Encryption
Ghous Amjad and Seny Kamara and Tarik Moataz
2018/194 ( PDF )
Proofs of Catalytic Space
Krzysztof Pietrzak
2018/193 ( PDF )
A New Family of Pairing-Friendly elliptic curves
Michael Scott and Aurore Guillevic
2018/192 ( PDF )
SoK: unraveling Bitcoin smart contracts
Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli and Stefano Lande and Roberto Zunino
2018/191 ( PDF )
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys
Michael Backes and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider
2018/190 ( PDF )
New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption
Sikhar Patranabis and Debdeep Mukhopadhyay
2018/189 ( PDF )
Threshold Implementation in Software - Case Study of PRESENT
Pascal Sasdrich and René Bock and Amir Moradi
2018/188 ( PDF )
Kissing numbers and transference theorems from generalized tail bounds
Stephen D. Miller and Noah Stephens-Davidowitz
2018/187 ( PDF )
Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model
Sean Bowe and Ariel Gabizon
2018/186 ( PDF )
RKHD ElGamal signing and 1-way sums
Daniel R. L. Brown
2018/185 ( PDF )
A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks
Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Leonardo T. D. Ferraz and Marcos Vinicius M. Silva
2018/184 ( PDF )
Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI
Yongjun Zhao and Sherman S. M. Chow
2018/183 ( PDF )
Simple Proofs of Sequential Work
Bram Cohen and Krzysztof Pietrzak
2018/182 ( PDF )
Rigorous Analysis of Truncated Differentials for 5-round AES
Lorenzo Grassi and Christian Rechberger
2018/181 ( PDF )
Rasta: A cipher with low ANDdepth and few ANDs per bit
Christoph Dobraunig and Maria Eichlseder and Lorenzo Grassi and Virginie Lallemand and Gregor Leander and Eik List and Florian Mendel and Christian Rechberger
2018/180 ( PDF )
Two-Round Multiparty Secure Computation Minimizing Public Key Operations
Sanjam Garg and Peihan Miao and Akshayaram Srinivasan
2018/179 ( PDF )
Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations
Ken Goss and Wei Jiang
2018/178 ( -- withdrawn -- )
2018/177 ( PDF )
On the Use of Independent Component Analysis to Denoise Side-Channel Measurements
Houssem Maghrebi and Emmanuel Prouff
2018/176 ( PDF )
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability
Kamil Kluczniak and Man Ho Au
2018/175 ( PDF )
Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys
Vincent Grosso
2018/174 ( PDF )
A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers
Chen-Dong Ye and Tian Tian
2018/173 ( PDF )
Vectorizing Higher-Order Masking
Benjamin Grégoire and Kostas Papagiannopoulos and Peter Schwabe and Ko Stoffelen
2018/172 ( PDF )
A First-Order SCA Resistant AES without Fresh Randomness
Felix Wegener and Amir Moradi
2018/171 ( PDF )
On the Complexity of Simulating Auxiliary Input
Yi-Hsiu Chen and Kai-Min Chung and Jyun-Jie Liao
2018/170 ( PDF )
On the Ring-LWE and Polynomial-LWE problems
Miruna Rosca and Damien Stehlé and Alexandre Wallet
2018/169 ( PDF )
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the $\chi^2$ Method
Srimanta Bhattacharya and Mridul Nandi
2018/168 ( PDF )
Statistical Witness Indistinguishability (and more) in Two Messages
Yael Tauman Kalai and Dakshita Khurana and Amit Sahai
2018/167 ( PDF )
On the Existence of Three Round Zero-Knowledge Proofs
Nils Fleischhacker and Vipul Goyal and Abhishek Jain
2018/166 ( PDF )
Optimal Forgeries Against Polynomial-Based MACs and GCM
Atul Luykx and Bart Preneel
2018/165 ( PDF )
The Wonderful World of Global Random Oracles
Jan Camenisch and Manu Drijvers and Tommaso Gagliardoni and Anja Lehmann and Gregory Neven
2018/164 ( PDF )
An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge
Pavel Hubáček and Alon Rosen and Margarita Vald
2018/163 ( PDF )
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks
Stanislaw Jarecki and Hugo Krawczyk and Jiayu Xu
2018/162 ( PDF )
Untagging Tor: A Formal Treatment of Onion Encryption
Jean Paul Degabriele and Martijn Stam
2018/161 ( PDF )
Boomerang Connectivity Table: A New Cryptanalysis Tool
Carlos Cid and Tao Huang and Thomas Peyrin and Yu Sasaki and Ling Song
2018/160 ( PDF )
DelegaTEE: Brokered Delegation Using Trusted Execution Environments
Sinisa Matetic and Moritz Schneider and Andrew Miller and Ari Juels and Srdjan Capkun
2018/159 ( PDF )
The Missing Difference Problem, and its Applications to Counter Mode Encryption
Gaëtan Leurent and Ferdinand Sibleyras
2018/158 ( PDF )
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
Meicheng Liu and Jingchun Yang and Wenhao Wang and Dongdai Lin
2018/157 ( PDF )
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement
Bernardo David and Rafael Dowsley and Mario Larangeira
2018/156 ( PDF )
A New Approach to Black-Box Concurrent Secure Computation
Sanjam Garg and Susumu Kiyoshima and Omkant Pandey
2018/155 ( PDF )
Memory Lower Bounds of Reductions Revisited
Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, and Keisuke Tanaka
2018/154 ( PDF )
Constrained PRFs for NC1 in Traditional Groups
Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2018/153 ( PDF )
Bootstrapping for Approximate Homomorphic Encryption
Jung Hee Cheon and Kyoohyung Han and Andrey Kim and Miran Kim and Yongsoo Song
2018/152 ( PDF )
A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules
Jung-Keun Lee and Bonwook Koo and Woo-Hwan Kim
2018/151 ( PDF )
Adaptively Secure Garbling with Near Optimal Online Complexity
Sanjam Garg and Akshayaram Srinivasan
2018/150 ( PDF )
Analysis of Error-Correcting Codes for Lattice-Based Key Exchange
Tim Fritzmann and Thomas Pöppelmann and Johanna Sepulveda
2018/149 ( PDF )
Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation
Ilan Komargodski and Eylon Yogev
2018/148 ( PDF )
The Complexity of Multiparty PSM Protocols and Related Models
Amos Beimel and Eyal Kushilevitz and Pnina Nissim
2018/147 ( PDF )
Sustained Space Complexity
Joel Alwen and Jeremiah Blocki and Krzysztof Pietrzak
2018/146 ( PDF )
Polynomial Time Bounded Distance Decoding near Minkowski’s Bound in Discrete Logarithm Lattices
Léo Ducas and Cécile Pierrot
2018/145 ( PDF )
Fast Near Collision Attack on the Grain v1 Stream Cipher
Bin Zhang and Chao Xu and Willi Meier
2018/144 ( PDF )
The Communication Complexity of Private Simultaneous Messages, Revisited
Benny Applebaum and Thomas Holenstein and Manoj Mishra and Ofer Shayevitz
2018/143 ( PDF )
Conjecturally Superpolynomial Lower Bound for Share Size
Shahram Khazaei
2018/142 ( PDF )
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC
Rui Zong and Xiaoyang Dong
2018/141 ( PDF )
Symbolic security of garbled circuits
Baiyu Li and Daniele Micciancio
2018/140 ( PDF )
A Reaction Attack on LEDApkc
Tomas Fabsic and Viliam Hromada and Pavol Zajac
2018/139 ( -- withdrawn -- )
Faster Multiplication Triplet Generation from Homomorphic Encryption for Practical Privacy-Preserving Machine Learning under a Narrow Bandwidth
Wen-jie Lu and Jun Sakuma
2018/138 ( PDF )
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin
Christian Badertscher and Juan Garay and Ueli Maurer and Daniel Tschudi and Vassilis Zikas
2018/137 ( PDF )
Naor-Reingold Goes Public: The Complexity of Known-key Security
Pratik Soni and Stefano Tessaro
2018/136 ( PDF )
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
Priyanka Bose and Viet Tung Hoang and Stefano Tessaro
2018/135 ( PDF )
A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT
Daniel Jost and Christian Badertscher and Fabio Banfi
2018/134 ( PDF )
A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem
Ayan Mahalanobis and Vivek Mallick
2018/133 ( PDF )
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs
Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu
2018/132 ( PDF )
On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields
Gora Adj and Omran Ahmadi and Alfred Menezes
2018/131 ( PDF )
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption
Ran Canetti and Yilei Chen and Leonid Reyzin and Ron D. Rothblum
2018/130 ( PDF )
SMT-based Cube Attack on Simeck32/64
Mojtaba Zaheri and Babak Sadeghiyan
2018/129 ( PDF )
Multi-mode Cryptocurrency Systems
Tuyet Duong and Alexander Chepurnoy and Hong-Sheng Zhou
2018/128 ( PDF )
Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation
Charanjit S. Jutla
2018/127 ( PDF )
Accountability in Security Protocols
Robert Künnemann and Deepak Garg and Michael Backes
2018/126 ( PDF )
Onion-AE: Foundations of Nested Encryption
Phillip Rogaway and Yusi Zhang
2018/125 ( PDF )
Challenges in cyber security - Ransomware Phenomenon
Pasca Vlad-Raul and Simion Emil
2018/124 ( PDF )
Evaluating the indistinguishability of the XTS mode in the proposed security model
Nguyen Tuan Anh and Nguyen Bui Cuong
2018/123 ( PDF )
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
Howard M. Heys
2018/122 ( PDF )
BitML: A Calculus for Bitcoin Smart Contracts
Massimo Bartoletti and Roberto Zunino
2018/121 ( PDF )
ECC mod 8^91+5
Daniel R. L. Brown
2018/120 ( PDF )
Efficient Circuit-based PSI via Cuckoo Hashing
Benny Pinkas and Thomas Schneider and Christian Weinert and Udi Wieder
2018/119 ( PDF )
Drive-by Key-Extraction Cache Attacks from Portable Code
Daniel Genkin and Lev Pachmanov and Eran Tromer and Yuval Yarom
2018/118 ( PDF )
Updatable Encryption with Post-Compromise Security
Anja Lehmann and Bjoern Tackmann
2018/117 ( PDF )
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme
Shai Halevi and Yuriy Polyakov and Victor Shoup
2018/116 ( PDF )
Unbounded ABE via Bilinear Entropy Expansion, Revisited
Jie Chen and Junqing Gong and Lucas Kowalczyk and Hoeteck Wee
2018/115 ( PDF )
An Improved Affine Equivalence Algorithm for Random Permutations
Itai Dinur
2018/114 ( PDF )
Offline Assisted Group Key Exchange
Colin Boyd and Gareth T. Davies and Kristian Gjřsteen and Yao Jiang
2018/113 ( PDF )
Classification of Balanced Quadratic Functions
Lauren De Meyer and Begül Bilgin
2018/112 ( PDF )
Just in Time Hashing
Benjamin Harsha and Jeremiah Blocki
2018/111 ( PDF )
MRHS Solver Based on Linear Algebra and Exhaustive Search
Hĺvard Raddum and Pavol Zajac
2018/110 ( PDF )
Rank Analysis of Cubic Multivariate Cryptosystems
John Baena and Daniel Cabarcas and Daniel Escudero and Karan Khathuria and Javier Verbel
2018/109 ( PDF )
NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme
Soda Diop and Bernard Ousmane Sané and Nafissatou Diarra and Michel Seck
2018/108 ( PDF )
Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains
F. Betül Durak and Serge Vaudenay
2018/107 ( PDF )
Towards Practical Lattice-Based One-Time Linkable Ring Signatures
Carsten Baum and Huang Lin and and Sabine Oechsner
2018/106 ( PDF )
On the Gold Standard for Security of Universal Steganography
Sebastian Berndt and Maciej Liśkiewicz
2018/105 ( PDF )
Combining Private Set-Intersection with Secure Two-Party Computation
Michele Ciampi and Claudio Orlandi
2018/104 ( PDF )
PHANTOM and GHOSTDAG: A Scalable Generalization of Nakamoto Consensus
Yonatan Sompolinsky and Shai Wyborski and Aviv Zohar
2018/103 ( PDF )
Decomposition of Permutations in a Finite Field
Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
2018/102 ( PDF )
Grafting Trees: a Fault Attack against the SPHINCS framework
Laurent Castelnovi and Ange Martinelli and Thomas Prest
2018/101 ( PDF )
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection
Mustafa A. Mustafa and Sara Cleemput and Abdelrahaman Aly and Aysajan Abidin
2018/100 ( PDF )
A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples
Hart Montgomery
2018/099 ( PDF )
Improved Bounds on the Threshold Gap in Ramp Secret Sharing
Ignacio Cascudo and Jaron Skovsted Gundersen and Diego Ruano
2018/098 ( PDF )
How to Reveal the Secrets of an Obscure White-Box Implementation
Louis Goubin and Pascal Paillier and Matthieu Rivain and Junwei Wang
2018/097 ( PDF )
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2
Andrea Visconti and Federico Gorla
2018/096 ( PDF )
Paralysis Proofs: Secure Access-Structure Updates for Cryptocurrencies and More
Fan Zhang and Philip Daian and Gabriel Kaptchuk and Iddo Bentov and Ian Miers and Ari Juels
2018/095 ( PDF )
Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage
Cees-Bart Breunesse and Ilya Kizhvatov and Ruben Muijrers and Albert Spruyt
2018/094 ( PDF )
Parameterization of Edwards curves on the rational field Q with given torsion subgroups
Linh Tung Vo
2018/093 ( PDF )
Statistical Attacks on Cookie Masking for RC4
Kenneth G. Paterson and Jacob C.N. Schuldt
2018/092 ( PDF )
Constructions of S-boxes with uniform sharing
Kerem Varici and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
2018/091 ( PDF )
Polynomial multiplication over binary finite fields: new upper bounds
Alessandro De Piccoli and Andrea Visconti and Ottavio Giulio Rizzo
2018/090 ( PDF )
Secure and Scalable Multi-User Searchable Encryption
Cédric Van Rompay and Refik Molva and Melek Önen
2018/089 ( PDF )
The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications
Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Marcos Vinicius M. Silva
2018/088 ( PDF )
Fully homomorphic public-key encryption with small ciphertext size
Masahiro Yagisawa
2018/087 ( PDF )
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice
Alexei Zamyatin and Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Edgar Weippl and William J. Knottenbelt
2018/086 ( PDF )
Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform
Claude Carlet and Xi Chen
2018/085 ( PDF )
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)
Anubhab Baksi and Shivam Bhasin and Jakub Breier and Mustafa Khairallah and Thomas Peyrin
2018/084 ( PDF )
Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher
Gideon Samid
2018/083 ( PDF )
Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017
Maki Yoshida and Satoshi Obana
2018/082 ( PDF )
Synchronized Aggregate Signatures from the RSA Assumption
Susan Hohenberger and Brent Waters
2018/081 ( PDF )
How to validate the secret of a Ring Learning with Errors (RLWE) key
Jintai Ding and Saraswathy RV and Saed Alsayigh and Crystal Clough
2018/080 ( PDF )
A Cryptographic Analysis of the WireGuard Protocol
Benjamin Dowling and Kenneth G. Paterson
2018/079 ( PDF )
Progressive lattice sieving
Thijs Laarhoven and Artur Mariano
2018/078 ( PDF )
A Systematic Approach To Cryptocurrency Fees
Alexander Chepurnoy and Vasily Kharin and Dmitry Meshkov
2018/077 ( PDF )
On the Bit Security of Cryptographic Primitives
Daniele Micciancio and Michael Walter
2018/076 ( PDF )
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread
Daniel Dinu and Ilya Kizhvatov
2018/075 ( PDF )
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes
Wenquan Bi and Xiaoyang Dong and Zheng Li and Rui Zong and Xiaoyun Wang
2018/074 ( PDF )
Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation
Miran Kim and Yongsoo Song and Shuang Wang and Yuhou Xia and Xiaoqian Jiang
2018/073 ( PDF )
GAZELLE: A Low Latency Framework for Secure Neural Network Inference
Chiraag Juvekar and Vinod Vaikuntanathan and Anantha Chandrakasan
2018/072 ( PDF )
Template-based Fault Injection Analysis of Block Ciphers
Ashrujit Ghoshal and Sikhar Patranabis and Debdeep Mukhopadhyay
2018/071 ( PDF )
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Stefan Mangard and Florian Mendel and Robert Primas
2018/070 ( PDF )
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
Craig Gentry and Adam O'Neill and Leonid Reyzin
2018/069 ( PDF )
Reusing Nonces in Schnorr Signatures
Marc Beunardeau and Aisling Connolly and Houda Ferradi and Rémi Géraud and David Naccache and Damien Vergnaud
2018/068 ( PDF )
Simple Schnorr Multi-Signatures with Applications to Bitcoin
Gregory Maxwell and Andrew Poelstra and Yannick Seurin and Pieter Wuille
2018/067 ( PDF )
Homomorphic Lower Digits Removal and Improved FHE Bootstrapping
Hao Chen and Kyoohyung Han
2018/066 ( PDF )
Tweaking Generic OTR to Avoid Forgery Attacks
Hassan Qahur Al Mahri and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon-Ho Wong
2018/065 ( PDF )
Non-Locality in Interactive Proofs
Claude Crépeau and Nan Yang
2018/064 ( PDF )
Systematization Of A 256-Bit Lightweight Block Cipher Marvin
Sukanya Saha and Krishnendu Rarhi and Abhishek Bhattacharya
2018/063 ( PDF )
The Viability of Post-quantum X.509 Certificates
Panos Kampanakis and Peter Panburana and Ellie Daw and Daniel Van Geest
2018/062 ( PDF )
Countermeasures against a side-channel attack in a kernel memory
Na-Young Ahn and Dong Hoon Lee
2018/061 ( PDF )
Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the $k$-Linear Assumption
Pratish Datta and Tatsuaki Okamoto and Junichi Tomida
2018/060 ( PDF )
A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks
Abhinav Aggarwal and Yue Guo
2018/059 ( PDF )
New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
Chen-Dong Ye and Tian Tian
2018/058 ( PDF )
Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters
Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
2018/057 ( PDF )
Efficient Noninteractive Certification of RSA Moduli and Beyond
Sharon Goldberg and Leonid Reyzin and Omar Sagga and Foteini Baldimtsi
2018/056 ( PDF )
SETLA: Signature and Encryption from Lattices
François Gérard and Keno Merckx
2018/055 ( PDF )
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction
Florian Unterstein and Johann Heyszl and Fabrizio De Santis and Robert Specht and Georg Sigl
2018/054 ( PDF )
More Efficient (Almost) Tightly Secure Structure-Preserving Signatures
Romain Gay and Dennis Hofheinz and Lisa Kohl and Jiaxin Pan
2018/053 ( PDF )
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database
Emmanuel Prouff and Remi Strullu and Ryad Benadjila and Eleonora Cagli and Cecile Dumas
2018/052 ( PDF )
Optimizing Trees for Static Searchable Encryption
Mohammad Etemad and Mohammad Mahmoody and David Evans
2018/051 ( PDF )
Semantic Security Invariance under Variant Computational Assumptions
Eftychios Theodorakis and John C. Mitchell
2018/050 ( PDF )
A Constructive Perspective on Signcryption Security
Christian Badertscher and Fabio Banfi and Ueli Maurer
2018/049 ( PDF )
Attacks and Countermeasures for White-box Designs
Alex Biryukov and Aleksei Udovenko
2018/048 ( PDF )
Impossible Differential Cryptanalysis on Deoxys-BC-256
Alireza mehrdad and Farokhlagha Moazami and Hadi Soleimany
2018/047 ( PDF )
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA
Boris Ryabko and Aleksandr Soskov
2018/046 ( PDF )
Scalable, transparent, and post-quantum secure computational integrity
Eli Ben-Sasson and Iddo Bentov and Yinon Horesh and Michael Riabzev
2018/045 ( PDF )
Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials
Jonathan Bootle and Jens Groth
2018/044 ( PDF )
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem
Tadanori Teruya and Kenji Kashiwabara and Goichiro Hanaoka
2018/043 ( PDF )
Efficient Adaptively Secure Zero-knowledge from Garbled Circuits
Chaya Ganesh and Yashvanth Kondi and Arpita Patra and Pratik Sarkar
2018/042 ( PDF )
Improved (Almost) Tightly-Secure Structure-Preserving Signatures
Charanjit S. Jutla and Miyako Ohkubo and Arnab Roy
2018/041 ( PDF )
Related Randomness Security for Public Key Encryption, Revisited
Takahiro Matsuda and Jacob C.N. Schuldt
2018/040 ( PDF )
An Analysis of Acceptance Policies For Blockchain Transactions
Seb Neumayer and Mayank Varia and Ittay Eyal
2018/039 ( PDF )
Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography
Gregor Seiler
2018/038 ( PDF )
On the Message Complexity of Secure Multiparty Computation
Yuval Ishai and Manika Mittal and Rafail Ostrovsky
2018/037 ( PDF )
Weakly Secure Equivalence-Class Signatures from Standard Assumptions
Georg Fuchsbauer and Romain Gay
2018/036 ( PDF )
Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs
Peter Scholl
2018/035 ( PDF )
A Linearly Homomorphic Signature Scheme From Weaker Assumptions
Lucas Schabhüser and Johannes Buchmann and Patrick Struck
2018/034 ( PDF )
Constant-size Group Signatures from Lattices
San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu
2018/033 ( PDF )
Two-Factor Password-Authenticated Key Exchange with End-to-End Password Security
Stanislaw Jarecki and Mohammed Jubur and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena
2018/032 ( -- withdrawn -- )
Publicly Verifiable Proofs of Space
Markus Jakobsson
2018/031 ( PDF )
Secure Remote Attestation
Markus Jakobsson
2018/030 ( PDF )
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions
Lin Lyu and Shengli Liu and Shuai Han and Dawu Gu
2018/029 ( PDF )
Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems
Johannes Blömer and Fabian Eidens and Jakob Juhnke
2018/028 ( PDF )
Compact Energy and Delay-Aware Authentication
Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz
2018/027 ( PDF )
A verifiable shuffle for the GSW cryptosystem
Martin Strand
2018/026 ( PDF )
Zero-Knowledge Proof of Decryption for FHE Ciphertexts
Christopher Carr and Anamaria Costache and Gareth T. Davies and Kristian Gjřsteen and Martin Strand
2018/025 ( PDF )
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures
Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li
2018/024 ( PDF )
KEM Combiners
Federico Giacon and Felix Heuer and Bertram Poettering
2018/023 ( PDF )
Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups
Benedikt Auerbach and Mihir Bellare and Eike Kiltz
2018/022 ( PDF )
Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices
Ali El Kaafarani and Shuichi Katsumata
2018/021 ( PDF )
Regular Lossy Functions and Their Applications in Leakage-Resilient Cryptography
Yu Chen and Baodong Qin and Haiyang Xue
2018/020 ( PDF )
Ciphertext-Only Attacks against Compact-LWE Submitted to NIST PQC Project
Haoyu Li and Renzhang Liu and Yanbin Pan and Tianyuan Xie
2018/019 ( PDF )
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited.
Daniel P. Martin and Luke Mather and Elisabeth Oswald
2018/018 ( PDF )
Multi-Key Searchable Encryption, Revisited
Ariel Hamlin and abhi shelat and Mor Weiss and Daniel Wichs
2018/017 ( PDF )
Verifiability of Helios Mixnet
Ben Smyth
2018/016 ( PDF )
New Techniques for Public Key Encryption with Sender Recovery
Murali Godi and Roopa Vishwanathan
2018/015 ( PDF )
On Composable Security for Digital Signatures
Christian Badertscher and Ueli Maurer and Björn Tackmann
2018/014 ( PDF )
Ubiquitous Weak-key Classes of BRW-polynomial Function
Kaiyan Zheng and Peng Wang and Dingfeng Ye
2018/013 ( PDF )
Hashing solutions instead of generating problems: On the interactive certification of RSA moduli
Benedikt Auerbach and Bertram Poettering
2018/012 ( PDF )
An Inside Job: Remote Power Analysis Attacks on FPGAs
Falk Schellenberg and Dennis R.E. Gnad and Amir Moradi and Mehdi B. Tahoori
2018/011 ( PDF )
Graded Encoding Schemes from Obfuscation
Pooya Farshim and Julia Hesse and Dennis Hofheinz and Enrique Larraia
2018/010 ( PDF )
Interactively Secure Groups from Obfuscation
Thomas Agrikola and Dennis Hofheinz
2018/009 ( PDF )
Evaluation of Resilience of randomized RNS implementation
Jérôme Courtois and Lokman Abbas-Turki and Jean-Claude Bajard
2018/008 ( PDF )
Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
Yu-Ao Chen and Xiao-Shan Gao
2018/007 ( PDF )
An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks
Qiong Huang and Hongbo Li
2018/006 ( PDF )
Higher Order Side-Channel Attacks Resilient S-boxes
Liran Lerman and Stjepan Picek and Nikita Veshchikov and Olivier Markowitch
2018/005 ( PDF )
Simple and Efficient Two-Server ORAM
S. Dov Gordon and Jonathan Katz and Xiao Wang
2018/004 ( PDF )
On the Performance of Convolutional Neural Networks for Side-channel Analysis
Stjepan Picek and Ioannis Petros Samiotis and Annelie Heuser and Jaehun Kim and Shivam Bhasin and Axel Legay
2018/003 ( PDF )
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
Moni Naor and Benny Pinkas and Eyal Ronen
2018/002 ( PDF )
The Multiplicative Complexity of 6-variable Boolean Functions
Cagdas Calik and Meltem Sonmez Turan and Rene Peralta
2018/001 ( PDF )
On the Power of Amortization in Secret Sharing: $d$-Uniform Secret Sharing and CDS with Constant Information Rate
Benny Applebaum and Barak Arkis
2017/1262 ( PDF )
A New Index Calculus Algorithm for the Elliptic Curve Discrete Logarithm Problem and Summation Polynomial Evaluation
Gary McGuire and Daniela Mueller
2017/1261 ( PDF )
A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates
Sachin Kumar and Jawad Haj-Yahya and Mustafa Khairallah and Mahmoud A. Elmohr and Anupam Chattopadhyay
2017/1260 ( PDF )
Collision Resistant Hashing from Sub-exponential Learning Parity with Noise
Yu Yu and Jiang Zhang and Jian Weng and Chun Guo and Xiangxue Li
2017/1259 ( PDF )
Cryptanalysis of HK17
Haoyu Li and Renzhang Liu and Yanbin Pan and Tianyuan Xie
2017/1258 ( PDF )
Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project
Yongge Wang and Qutaibah m. Malluhi
2017/1257 ( PDF )
A first-order chosen-plaintext DPA attack on the third round of DES
Oscar Reparaz and Benedikt Gierlichs
2017/1256 ( PDF )
A Universally Composable Treatment of Network Time
Ran Canetti and Kyle Hogan and Aanchal Malhotra and Mayank Varia
2017/1255 ( PDF )
On the Strategy and Behavior of Bitcoin Mining with N-attackers
Hanqing Liu and Na Ruan and Rongtian Du and Weijia Jia
2017/1254 ( PDF )
Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices
Kamil Doruk Gür and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Hadi Sajjadpour and Erkay Savaş
2017/1253 ( PDF )
Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors
Yann Le Corre and Johann Großschädl and Daniel Dinu
2017/1252 ( PDF )
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids
Jacqueline Brendel and Marc Fischlin and Felix Günther
2017/1251 ( PDF )
A toolbox for software optimization of QC-MDPC code-based cryptosystems
Nir Drucker and Shay Gueron
2017/1250 ( PDF )
Non-Interactive Delegation for Low-Space Non-Deterministic Computation
Saikrishna Badrinarayanan and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai and Daniel Wichs
2017/1249 ( PDF )
Quantum cryptanalysis on some Generalized Feistel Schemes
Xiaoyang Dong and Zheng Li and Xiaoyun Wang
2017/1248 ( PDF )
Foundations of Homomorphic Secret Sharing
Elette Boyle and Niv Gilboa and Yuval Ishai and Huijia Lin and Stefano Tessaro
2017/1247 ( PDF )
Block encryption of quantum messages
Min Liang and Li Yang
2017/1246 ( PDF )
Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus
Alessandro Cilardo and Andrea Primativo
2017/1245 ( PDF )
IntegriKey: End-to-End Integrity Protection of User Input
Aritra Dhar and Der-Yeuan Yu and Kari Kostiainen and Srdjan Capkun
2017/1244 ( PDF )
Corrections to ''Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity''
Shuang Qiu and Rui Zhang and Yongbin Zhou and Wei Cheng
2017/1243 ( PDF )
Augmented Black-Box Simulation and Zero Knowledge Argument for NP
Li Hongda and Pan Dongxue and Ni Peifang
2017/1242 ( PDF )
Designing Proof of Transaction Puzzles for Cryptocurrency
Taotao Li and Parhat Abla and Mingsheng Wang and Qianwen Wei
2017/1241 ( PDF )
A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus)
Koichiro Akiyama and Yasuhiro Goto and Shinya Okumura and Tsuyoshi Takagi and Koji Nuida and Goichiro Hanaoka and Hideo Shimizu and Yasuhiko Ikematsu
2017/1240 ( PDF )
UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks
Mridula Singh and Patrick Leu and Srdjan Capkun
2017/1239 ( PDF )
An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain
Shunli Ma and Yi Deng and Debiao He and Jiang Zhang and Xiang Xie
2017/1238 ( PDF )
Efficient Oblivious Data Structures for Database Services on the Cloud
Thang Hoang and Ceyhun D. Ozkaptan and Gabriel Hackebeil and Attila A. Yavuz
2017/1237 ( PDF )
A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
Thang Hoang and Attila A. Yavuz and Jorge Guajardo
2017/1236 ( PDF )
Fast Quantum Algorithm for Solving Multivariate Quadratic Equations
Jean-Charles Faugère and Kelsey Horan and Delaram Kahrobaei and Marc Kaplan and Elham Kashefi and Ludovic Perret
2017/1235 ( PDF )
Practical Quantum-Safe Voting from Lattices
Rafaël del Pino and Vadim Lyubashevsky and Gregory Neven and Gregor Seiler
2017/1234 ( PDF )
High-Precision Privacy-Preserving Real-Valued Function Evaluation
Christina Boura and Ilaria Chillotti and Nicolas Gama and Dimitar Jetchev and Stanislav Peceny and Alexander Petric
2017/1233 ( PDF )
Provably secure compilation of side-channel countermeasures
Gilles Barthe and Benjamin Grégoire and Vincent Laporte
2017/1232 ( PDF )
Optimal Linear Secret Sharing Schemes for Graph Access Structures on Six Participants
Motahhareh Gharahi and Shahram Khazaei
2017/1231 ( PDF )
Integer Reconstruction Public-Key Encryption
Houda Ferradi and David Naccache
2017/1230 ( PDF )
Overdrive: Making SPDZ Great Again
Marcel Keller and Valerio Pastro and Dragos Rotaru
2017/1229 ( PDF )
Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions
Akinori Hosoyamada and Yu Sasaki
2017/1228 ( PDF )
Speed-ups and time-memory trade-offs for tuple lattice sieving
Gottfried Herold and Elena Kirshanova and Thijs Laarhoven
2017/1227 ( PDF )
VerMI: Verification Tool for Masked Implementations
Victor Arribas and Svetla Nikova and Vincent Rijmen
2017/1226 ( PDF )
New (and Old) Proof Systems for Lattice Problems
Navid Alamati and Chris Peikert and Noah Stephens-Davidowitz
2017/1225 ( PDF )
Fast Garbling of Circuits over 3-Valued Logic
Yehuda Lindell and Avishay Yanai
2017/1224 ( PDF )
Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017
Keita Xagawa
2017/1223 ( PDF )
Generic Low-Latency Masking in Hardware
Hannes Gross and Rinat Iusupov and Roderick Bloem
2017/1222 ( PDF )
Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search
Muslum Ozgur Ozmen and Thang Hoang and Attila A. Yavuz
2017/1221 ( PDF )
Weak-Unforgeable Tags for Secure Supply Chain Management
Marten van Dijk and Chenglu Jin and Hoda Maleki and Phuong Ha Nguyen and Reza Rahaeimehr
2017/1220 ( PDF )
Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change
Lynn Batten and Xun Yi
2017/1219 ( PDF )
Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations
Subhabrata Samajder and Palash Sarkar
2017/1218 ( PDF )
TERMinator Suite: Benchmarking Privacy-Preserving Architectures
Dimitris Mouris and Nektarios Georgios Tsoutsos and Michail Maniatakos
2017/1217 ( PDF )
Linear Regression Side Channel Attack Applied on Constant XOR
Shan Fu and Zongyue Wang and Fanxing Wei and Guoai Xu and An Wang
2017/1216 ( PDF )
Probabilistic and Considerate Attestation of IoT Devices against Roving Malware
Xavier Carpent and Norrathep Rattanavipanon and Gene Tsudik
2017/1215 ( PDF )
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives
Rouzbeh Behnia and Muslum Ozgur Ozmen and Attila A. Yavuz
2017/1214 ( PDF )
HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction
Daniel J. Bernstein and Leon Groot Bruinderink and Tanja Lange and Lorenz Panny
2017/1213 ( PDF )
On hybrid SIDH schemes using Edwards and Montgomery curve arithmetic
Michael Meyer and Steffen Reith and Fabio Campos
2017/1212 ( PDF )
A New Crypto-Classifier Service for Energy Efficiency in Smart Cities
Oana Stan and Mohamed-Haykel Zayani and Renaud Sirdey and Amira Ben Hamida and Alessandro Ferreira Leite and Mallek Mziou-Sallami
2017/1211 ( PDF )
Zero-Sum Partitions of PHOTON Permutations
Qingju Wang and Lorenzo Grassi and Christian Rechberger
2017/1210 ( PDF )
Two-Face: New Public Key Multivariate Schemes
Gilles Macario-Rat and Jacques Patarin
2017/1209 ( PDF )
Improvements for Finding Impossible Differentials of Block Cipher Structures
Yiyuan Luo and Xuejia Lai
2017/1208 ( PDF )
Security notions for cloud storage and deduplication
Colin Boyd and Gareth T. Davies and Kristian Gjřsteen and Mohsen Toorani and Hĺvard Raddum
2017/1207 ( PDF )
Unconditionally secure multi-party quantum commitment scheme
Mingqiang Wang and Xue Wang and Tao Zhan
2017/1206 ( PDF )
Asymptotically faster quantum algorithms to solve multivariate quadratic equations
Daniel J. Bernstein and Bo-Yin Yang
2017/1205 ( PDF )
Connecting Legendre with Kummer and Edwards
Sabyasachi Karati and Palash Sarkar
2017/1204 ( PDF )
Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version)
Erick Nascimento and Lukasz Chmielewski
2017/1203 ( PDF )
Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More
David Derler and Sebastian Ramacher and Daniel Slamanig
2017/1202 ( PDF )
Faster Cryptographic Hash Function From Supersingular Isogeny Graphs
Javad Doliskani and Geovandro C. C. F. Pereira and Paulo S. L. M. Barreto
2017/1201 ( PDF )
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities
Rupeng Yang and Man Ho Au and Junzuo Lai and Qiuliang Xu and Zuoxia Yu
2017/1200 ( PDF )
MixColumns Properties and Attacks on (round-reduced) AES with a Single Secret S-Box
Lorenzo Grassi
2017/1199 ( PDF )
Quantum Key-recovery Attack on Feistel Structures
Xiaoyang Dong and Xiaoyun Wang
2017/1198 ( PDF )
Computing isogenies between Montgomery curves using the action of (0,0)
Joost Renes
2017/1197 ( PDF )
Reassessing Security of Randomizable Signatures
David Pointcheval and Olivier Sanders
2017/1196 ( PDF )
Post-Quantum Secure Remote Password Protocol from RLWE Problem
Xinwei Gao and Jintai Ding and Jiqiang Liu and Lin Li
2017/1195 ( PDF )
CAPA: The Spirit of Beaver against Physical Attacks
Oscar Reparaz and Lauren De Meyer and Begül Bilgin and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Nigel Smart
2017/1194 ( PDF )
Improved Differential Cryptanalysis on Generalized Feistel Schemes
Ivan Tjuawinata and Tao Huang and Hongjun Wu
2017/1193 ( PDF )
Rhythmic Keccak: SCA Security and Low Latency in HW
Victor Arribas and Begül Bilgin and George Petrides and Svetla Nikova and Vincent Rijmen
2017/1192 ( PDF )
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS
Xinwei Gao and Jintai Ding and Lin Li and Saraswathy RV and Jiqiang Liu
2017/1191 ( PDF )
Data Is a Stream: Security of Stream-Based Channels
Marc Fischlin and Felix Günther and Giorgia Azzurra Marson and Kenneth G. Paterson
2017/1190 ( PDF )
EPIC: Efficient Private Image Classification (or: Learning from the Masters)
Eleftheria Makri and Dragos Rotaru and Nigel P. Smart and Frederik Vercauteren
2017/1189 ( PDF )
Return Of Bleichenbacher's Oracle Threat (ROBOT)
Hanno Böck and Juraj Somorovsky and Craig Young
2017/1188 ( PDF )
Signature Schemes with a Fuzzy Private Key
Kenta Takahashi and Takahiro Matsuda and Takao Murakami and Goichiro Hanaoka and Masakatsu Nishigaki
2017/1187 ( PDF )
On the Round Complexity of OT Extension
Sanjam Garg and Mohammad Mahmoody and Daniel Masny and Izaak Meckler
2017/1186 ( PDF )
On Multiparty Garbling of Arithmetic Circuits
Aner Ben-Efraim
2017/1185 ( PDF )
Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage
Jintai Ding, Scott Fluhrer, Saraswathy RV
2017/1184 ( PDF )
EFLASH: A New Multivariate Encryption Scheme
Ryann Cartor and Daniel Smith-Tone
2017/1183 ( PDF )
Round2: KEM and PKE based on GLWR
Hayo Baan and Sauvik Bhattacharya and Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Jose-Luis Torre-Arce and Zhenfei Zhang
2017/1182 ( PDF )
Distributed Algorithms Made Secure: A Graph Theoretic Approach
Merav Parter and Eylon Yogev
2017/1181 ( PDF )
Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs
Ruben Niederhagen and Kai-Chun Ning and Bo-Yin Yang
2017/1180 ( PDF )
FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes
Wen Wang and Jakub Szefer and Ruben Niederhagen
2017/1179 ( PDF )
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials
Claude Carlet and Stjepan Picek
2017/1178 ( PDF )
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol
Xinwei Gao and Jintai Ding and Saraswathy RV and Lin Li and Jiqiang Liu
2017/1177 ( PDF )
Reusable Authentication from the Iris
Benjamin Fuller and Sailesh Simhadri and James Steel
2017/1176 ( PDF )
Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks
Amin Rezaei and Yuanqi Shen and Shuyu Kong and Jie Gu and Hai Zhou
2017/1175 ( PDF )
Short Solutions to Nonlinear Systems of Equations
Alan Szepieniec and Bart Preneel
2017/1174 ( PDF )
Efficient Optimal Ate Pairing at 128-bit Security Level
Md. Al-Amin Khandaker and Yuki Nanjo and Loubna Ghammam and Sylvain Duquesne and Yasuyuki Nogami and Yuta Kodera
2017/1173 ( PDF )
Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction
Osmanbey Uzunkol and Öznur Kalkar and İsa Sertkaya
2017/1172 ( PDF )
A Note on Stream Ciphers that Continuously Use the IV
Matthias Hamann and Matthias Krause and Willi Meier
2017/1171 ( PDF )
Attacks on the AJPS Mersenne-based cryptosystem
Koen de Boer and Léo Ducas and Stacey Jeffery and Ronald de Wolf
2017/1170 ( PDF )
SAT-based Bit-flipping Attack on Logic Encryptions
Yuanqi Shen and Amin Rezaei and Hai Zhou
2017/1169 ( PDF )
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting
David Berend and Bernhard Jungk and Shivam Bhasin
2017/1168 ( PDF )
Itsuku: a Memory-Hardened Proof-of-Work Scheme
Fabien Coelho and Arnaud Larroche and Baptiste Colin
2017/1167 ( PDF )
Cryptocurrency Voting Games
Sanjay Bhattacherjee and Palash Sarkar
2017/1166 ( PDF )
SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers
Jakub Breier and Dirmanto Jap and Shivam Bhasin
2017/1165 ( PDF )
Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security
Megha Byali and Arpita Patra and Divya Ravi and Pratik Sarkar
2017/1164 ( PDF )
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
M. Sadegh Riazi and Christian Weinert and Oleksandr Tkachenko and Ebrahim M. Songhori and Thomas Schneider and Farinaz Koushanfar
2017/1163 ( PDF )
MILP-aided Cryptanalysis of Round Reduced ChaCha
Najwa Aaraj and Florian Caullery and Marc Manzano
2017/1162 ( PDF )
Kayawood, a Key Agreement Protocol
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2017/1161 ( PDF )
A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes.
Sankhanil Dey and Ranjan Ghosh
2017/1160 ( PDF )
A Practical Cryptanalysis of WalnutDSA
Daniel Hart and DoHoon Kim and Giacomo Micheli and Guillermo Pascual Perez and Christophe Petit and Yuxuan Quek
2017/1159 ( PDF )
Cryptanalysis of indistinguishability obfuscation using GGH13 without ideals
Gu Chunsheng
2017/1158 ( PDF )
Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM
Thang Hoang and Attila A. Yavuz and Betul F. Durak and Jorge Guajardo
2017/1157 ( PDF )
ARM2GC: Succinct Garbled Processor for Secure Computation
Ebrahim M Songhori and M Sadegh Riazi and Siam U Hussain and Ahmad-Reza Sadeghi and Farinaz Koushanfar
2017/1156 ( PDF )
Two-Round Multiparty Secure Computation from Minimal Assumptions
Sanjam Garg and Akshayaram Srinivasan
2017/1155 ( PDF )
A Survey and Refinement of Repairable Threshold Schemes
Thalia M. Laing and Douglas R. Stinson
2017/1154 ( PDF )
Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives
David Derler and Sebastian Ramacher and Daniel Slamanig
2017/1153 ( PDF )
Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware
Iddo Bentov and Yan Ji and Fan Zhang and Yunqi Li and Xueyuan Zhao and Lorenz Breidenbach and Philip Daian and Ari Juels
2017/1152 ( PDF )
Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption
Catherine Meadows
2017/1151 ( PDF )
Shorter Linear Straight-Line Programs for MDS Matrices
Thorsten Kranz and Gregor Leander and Ko Stoffelen and Friedrich Wiemer
2017/1150 ( PDF )
SWiM: Secure Wildcard Pattern Matching From OT Extension
Vladimir Kolesnikov and Mike Rosulek and Ni Trieu
2017/1149 ( PDF )
Improved Cryptanalysis of HFEv- via Projection
Jintai Ding and Ray Perlner and Albrecht Petzoldt and Daniel Smith-Tone
2017/1148 ( PDF )
Improvements to the Linear Operations of LowMC: A Faster Picnic
Daniel Kales and Léo Perrin and Angela Promitzer and Sebastian Ramacher and Christian Rechberger
2017/1147 ( PDF )
Under Pressure: Security of Caesar Candidates beyond their Guarantees
Serge Vaudenay and Damian Vizár
2017/1146 ( PDF )
A Zero-Knowledge Version of vSQL
Yupeng Zhang and Daniel Genkin and Jonathan Katz and Dimitrios Papadopoulos and Charalampos Papamanthou
2017/1145 ( PDF )
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
Yupeng Zhang and Daniel Genkin and Jonathan Katz and Dimitrios Papadopoulos and Charalampos Papamanthou
2017/1144 ( PDF )
How Far Can We Reach? Breaking Masked AES Smartcard Implementation Using One Trace
Wei Cheng and Chao Zheng and Yuchen Cao and Yongbin Zhou and Hailong Zhang and Sylvain Guilley and Laurent Sauvage
2017/1143 ( PDF )
Faster key compression for isogeny-based cryptosystems
Gustavo H. M. Zanon and Marcos A. Simplicio Jr and Geovandro C. C. F. Pereira and Javad Doliskani and Paulo S. L. M. Barreto
2017/1142 ( PDF )
PIR with compressed queries and amortized query processing
Sebastian Angel and Hao Chen and Kim Laine and Srinath Setty
2017/1141 ( PDF )
Cryptanalysis of Bivium using a Boolean all solution solver
Virendra Sule and Anmol Yadav
2017/1140 ( PDF )
Lattice Klepto: Turning Post-Quantum Crypto Against Itself
Robin Kwant and Tanja Lange and Kimberley Thissen
2017/1139 ( PDF )
Decoding Linear Codes with High Error Rate and its Impact for LPN Security
Leif Both and Alexander May
2017/1138 ( PDF )
The Parallel Repetition of Non-Signaling Games: Counterexamples and Dichotomy
Justin Holmgren and Lisa Yang
2017/1137 ( PDF )
Note on the Robustness of CAESAR Candidates
Daniel Kales and Maria Eichlseder and Florian Mendel
2017/1136 ( PDF )
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Maria Eichlseder and Daniel Kales
2017/1135 ( PDF )
On the Complexity of the Hybrid Approach on HFEv-
Albrecht Petzoldt
2017/1134 ( PDF )
Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs
Jeroen Delvaux
2017/1133 ( PDF )
Sentiment Protocol: A Decentralized Protocol Leveraging Crowd Sourced Wisdom
Anton Muehlemann
2017/1132 ( PDF )
Doubly-efficient zkSNARKs without trusted setup
Riad S. Wahby and Ioanna Tzialla and abhi shelat and Justin Thaler and Michael Walfish
2017/1131 ( PDF )
A Certain Family of Subgroups of $\mathbb Z_n^\star$ Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption
Mikhail Anokhin
2017/1130 ( PDF )
Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio
Daniel Jost and Ueli Maurer and Joao L. Ribeiro
2017/1129 ( PDF )
Probabilistic solution of Yao's millionaires' problem
Mariya Bessonov and Dima Grigoriev and Vladimir Shpilrain
2017/1128 ( PDF )
Forward Secure Efficient Group Signature in Dynamic Setting using Lattices
Meenakshi Kansal and Ratna Dutta and Sourav Mukhopadhyay
2017/1127 ( PDF )
On the Leakage Resilience of Ring-LWE Based Public Key Encryption
Dana Dachman-Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi
2017/1126 ( PDF )
Privacy Games for Syntactic Privacy Notions
Robin Ankele and Andrew Simpson
2017/1125 ( PDF )
k-Round MPC from k-Round OT via Garbled Interactive Circuits
Fabrice Benhamouda and Huijia Lin
2017/1124 ( PDF )
A formal model of Bitcoin transactions
Nicola Atzei and Massimo Bartoletti and Stefano Lande and Roberto Zunino
2017/1123 ( PDF )
Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs
Cecilia Boschini and Jan Camenisch and Gregory Neven
2017/1122 ( PDF )
On post-processing in the quantum algorithm for computing short discrete logarithms
Martin Ekerĺ
2017/1121 ( PDF )
Differential Attacks on LILLIPUT Cipher
Valérie Nachef and Nicolas Marričre and Emmanuel Volte
2017/1120 ( PDF )
A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage
David Cash and Cong Zhang
2017/1119 ( PDF )
Detection of cryptographic algorithms with grap
Léonard Benedetti and Aurélien Thierry and Julien Francq
2017/1118 ( PDF )
Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus
Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren and Alexander Spiegelman
2017/1117 ( PDF )
Risky Traitor Tracing and New Differential Privacy Negative Results
Rishab Goyal and Venkata Koppula and Andrew Russell and Brent Waters
2017/1116 ( PDF )
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption
Kaisei Kajita and Kazuto Ogawa and Eiichiro Fujisaki
2017/1115 ( PDF )
Hardware Aspects of Montgomery Modular Multiplication
Colin D. Walter
2017/1114 ( PDF )
Fast Homomorphic Evaluation of Deep Discretized Neural Networks
Florian Bourse and Michele Minelli and Matthias Minihold and Pascal Paillier
2017/1113 ( PDF )
The Discrete-Logarithm Problem with Preprocessing
Henry Corrigan-Gibbs and Dmitry Kogan
2017/1112 ( PDF )
Manifold Learning Towards Masking Implementations: A First Study
Changhai Ou and Degang Sun and Zhu Wang and Xinping Zhou and Wei Cheng
2017/1111 ( PDF )
Fuzzy Password Authenticated Key Exchange
Pierre-Alain Dupont and Julia Hesse and David Pointcheval and Leonid Reyzin and Sophia Yakoubov
2017/1110 ( PDF )
The secrets of profiling for side-channel analysis: feature selection matters
Stjepan Picek and Annelie Heuser and Alan Jovic and Lejla Batina and Axel Legay
2017/1109 ( PDF )
EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation for Machine Learning
Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma and Shardul Tripathi
2017/1108 ( PDF )
Cryptographic Pairings
Kristin Lauter and Michael Naehrig
2017/1107 ( PDF )
Hardness of Non-Interactive Differential Privacy from One-Way Functions
Lucas Kowalczyk and Tal Malkin and Jonathan Ullman and Daniel Wichs
2017/1106 ( PDF )
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version)
Weijin Wang and Yu Qin and Jingbin Liu and Dengguo Feng
2017/1105 ( PDF )
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance
Zheli Liu and Siyi Lv and Yu Wei and Jin Li and Joseph K. Liu and Yang Xiang
2017/1104 ( PDF )
Efficient provable-secure NTRUEncrypt over any cyclotomic field
Yang Wang and Mingqiang Wang
2017/1103 ( PDF )
A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a
Vahid Amin Ghafari and Honggang Hu
2017/1102 ( PDF )
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption
Qiuxiang Dong and Dijiang Huang and Jim Luo and Myong Kang
2017/1101 ( PDF )
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing
Qiuxiang Dong and Dijiang Huang and Jim Luo and Myong Kang
2017/1100 ( PDF )
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication
Weijia Wang and Zhijie Wang and Bing Li and Qiuxiang Dong and Dijiang Huang
2017/1099 ( PDF )
Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method
Sadegh Jamshidpour and Zahra Ahmadian
2017/1098 ( PDF )
The Strength of Weak Randomization: Efficiently Searchable Encryption with Minimal Leakage
David Pouliot and Scott Griffy and Charles V. Wright
2017/1097 ( PDF )
Non-malleable Randomness Encoders and their Applications
Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar
2017/1096 ( PDF )
IND-CCA-secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited
Haodong Jiang and Zhenfeng Zhang and Long Chen and Hong Wang and Zhi Ma
2017/1095 ( PDF )
Analysis of the Bitcoin UTXO set
Sergi Delgado-Segura and Cristina Pérez-Solŕ and Guillermo Navarro-Arribas and Jordi Herrera-Joancomartí
2017/1094 ( PDF )
Privately Constraining and Programming PRFs, the LWE Way
Chris Peikert and Sina Shiehian
2017/1093 ( PDF )
Proposal for Protocol on a Quorum Blockchain with Zero Knowledge
Thomas Espel and Laurent Katz and Guillaume Robin
2017/1092 ( PDF )
Universally Composable Secure Computation with Corrupted Tokens
Nishanth Chandran and Wutichai Chongchitmate and Rafail Ostrovsky and Ivan Visconti
2017/1091 ( PDF )
Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards
Arka Rai Choudhuri and Matthew Green and Abhishek Jain and Gabriel Kaptchuk and Ian Miers
2017/1090 ( PDF )
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts
Lorenz Breidenbach and Philip Daian and Florian Tramčr and Ari Juels
2017/1089 ( PDF )
Secure Deduplication of Encrypted Data: Refined Model and New Constructions
Jian Liu and Li Duan and Yong Li and N. Asokan
2017/1088 ( PDF )
Promise Zero Knowledge and its Applications to Round Optimal MPC
Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai
2017/1087 ( PDF )
General purpose integer factoring
Arjen K. Lenstra
2017/1086 ( PDF )
Order-Revealing Encryption: File-Injection Attack and Forward Security
Xingchen Wang and Yunlei Zhao
2017/1085 ( PDF )
Profiled SCA with a New Twist: Semi-supervised Learning
Stjepan Picek and Annelie Heuser and Alan Jovic and Axel Legay and Karlo Knezevic
2017/1084 ( PDF )
Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count (Full version)
Dylan Toh and Jacob Teo and Khoongming Khoo and Siang Meng Sim
2017/1083 ( PDF )
CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization
Zhi Chen and Junjie Shen and Alex Nicolau and Alex Veidenbaum and Nahid Farhady Ghalaty and Rosario Cammarota
2017/1082 ( PDF )
Instruction Duplication: Leaky and Not Too Fault-Tolerant!
Lucian Cojocar and Kostas Papagiannopoulos and Niek Timmers
2017/1081 ( PDF )
The Montgomery and Joye Powering Ladders are Dual
Colin D. Walter
2017/1080 ( PDF )
Quantum Lightning Never Strikes the Same State Twice
Mark Zhandry
2017/1079 ( PDF )
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
Andreas Wiemers and Dominik Klein
2017/1078 ( PDF )
The Tao of Inference in Privacy-Protected Databases
Vincent Bindschaedler and Paul Grubbs and David Cash and Thomas Ristenpart and Vitaly Shmatikov
2017/1077 ( PDF )
A New Generalization of the KMOV Cryptosystem
Maher Boudabra and Abderrahmane Nitaj
2017/1076 ( PDF )
A generalized attack on RSA type cryptosystems
Martin Bunder and Abderrahmane Nitaj and Willy Susilo and Joseph Tonien
2017/1075 ( PDF )
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing
Ashwin Jha and Eik List and Kazuhiko Minematsu and Sweta Mishra and Mridul Nandi
2017/1074 ( PDF )
A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20
S V Dilip Kumar and Sikhar Patranabis and Jakub Breier and Debdeep Mukhopadhyay and Shivam Bhasin and Anupam Chattopadhyay and Anubhab Baksi
2017/1073 ( PDF )
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers
Sikhar Patranabis and Jakub Breier and Debdeep Mukhopadhyay and Shivam Bhasin
2017/1072 ( PDF )
Settling the mystery of $Z_r=r$ in RC4
Sabyasachi Dey and Santanu Sarkar
2017/1071 ( PDF )
Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks
Le Dong and Yongxia Mao
2017/1070 ( PDF )
The Transaction Graph for Modeling Blockchain Semantics
Christian Cachin and Angelo De Caro and Pedro Moreno-Sanchez and Björn Tackmann and Marko Vukolić
2017/1069 ( PDF )
Non-Malleability vs. CCA-Security: The Case of Commitments
Brandon Broadnax and Valerie Fetzer and Jörn Müller-Quade and Andy Rupp
2017/1068 ( PDF )
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data
Marie-Sarah Lacharité and Kenneth G. Paterson
2017/1067 ( PDF )
Sharding PoW-based Blockchains via Proofs of Knowledge
Frederik Armknecht and Jens-Matthias Bohli and Ghassan O. Karame and Wenting Li
2017/1066 ( PDF )
Bulletproofs: Short Proofs for Confidential Transactions and More
Benedikt Bünz and Jonathan Bootle and Dan Boneh and Andrew Poelstra and Pieter Wuille and Greg Maxwell
2017/1065 ( -- withdrawn -- )
-
Reyhaneh Rabaninejad and Maryam Rajabzadeh Asaar and Mahmoud Ahmadian Attari and Mohammad Reza Aref
2017/1064 ( PDF )
An Algebraic Approach to Maliciously Secure Private Set Intersection
Satrajit Ghosh and Tobias Nilges
2017/1063 ( PDF )
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (Full Version)
Qingju Wang and Yonglin Hao and Yosuke Todo and Chaoyun Li and Takanori Isobe and Willi Meier
2017/1062 ( PDF )
Towards Breaking the Exponential Barrier for General Secret Sharing
Tianren Liu and Vinod Vaikuntanathan and Hoeteck Wee
2017/1061 ( PDF )
Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering
Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Tal Malkin
2017/1060 ( PDF )
Thwarting Leakage Abuse Attacks against Searchable Encryption -- A Formal Approach and Applications to Database Padding
Raphael Bost and Pierre-Alain Fouque
2017/1059 ( PDF )
CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite
Lijing Zhou and Licheng Wang and Yiru Sun
2017/1058 ( PDF )
Optimal Key Consensus in Presence of Noise
Zhengzhong Jin and Yunlei Zhao
2017/1057 ( PDF )
Montgomery Arithmetic from a Software Perspective
Joppe W. Bos and Peter L. Montgomery
2017/1056 ( PDF )
Round-Optimal Secure Multi-Party Computation
Shai Halevi and Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
2017/1055 ( PDF )
Cellular Automata Based S-boxes
Luca Mariot and Stjepan Picek and Alberto Leporati and Domagoj Jakobovic
2017/1054 ( PDF )
On the security of another CRC based ultralightweight RFID authentication protocol
Seyed Farhad Aghili and Hamid Mala
2017/1053 ( PDF )
A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity'
Gilles Barthe and François Dupressoir and Benjamin Grégoire
2017/1052 ( PDF )
Early Detection and Analysis of Leakage Abuse Vulnerabilities
Charles V. Wright and David Pouliot
2017/1051 ( PDF )
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher
Xinping Zhou and Carolyn Whitnall and Elisabeth Oswald and Degang Sun and Zhu Wang
2017/1050 ( PDF )
Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model
Sean Bowe and Ariel Gabizon and Ian Miers
2017/1049 ( PDF )
A Practical Implementation of Identity-Based Encryption over NTRU Lattices
Sarah McCarthy and Neil Smyth and Elizabeth O’Sullivan
2017/1048 ( PDF )
Non-malleable Codes against Lookahead Tampering
Divya Gupta and Hemanta K. Maji and Mingyuan Wang
2017/1047 ( PDF )
Consolidating Inner Product Masking
Josep Balasch and Sebastian Faust and Benedikt Gierlichs and Clara Paglialonga and François-Xavier Standaert
2017/1046 ( PDF )
Approximate Thumbnail Preserving Encryption
Byron Marohn and Charles V. Wright and Wu-chi Feng and Mike Rosulek and Rakesh B. Bobba
2017/1045 ( PDF )
Tightly-Secure PAK(E)
José Becerra and Vincenzo Iovino and Dimiter Ostrev and Petra Šala and Marjan Škrobot
2017/1044 ( PDF )
Strain: A Secure Auction for Blockchains
Erik-Oliver Blass and Florian Kerschbaum
2017/1043 ( PDF )
An E-voting Protocol Based on Blockchain
Yi Liu and Qi Wang
2017/1042 ( PDF )
On one-round reliable message transmission
René Břdker Christensen
2017/1041 ( PDF )
Compact Zero-Knowledge Proofs of Small Hamming Weight
Ivan Damgĺrd and Ji Luo and Sabine Oechsner and Peter Scholl and Mark Simkin
2017/1040 ( -- withdrawn -- )
Threshold Implementations of GIFT: A Trade-off Analysis
Arpan Jati and Naina Gupta and Anupam Chattopadhyay and Somitra Kumar Sanadhya and Donghoon Chang
2017/1039 ( PDF )
Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones
Muslum Ozgur Ozmen and Attila A. Yavuz
2017/1038 ( PDF )
Embedded Proofs for Verifiable Neural Networks
Hervé Chabanne and Julien Keuffer and Refik Molva
2017/1037 ( PDF )
DAGS: Key Encapsulation using Dyadic GS Codes
Gustavo Banegas and Paulo S. L. M. Barreto and Brice Odilon Boidje and Pierre-Louis Cayrel and Gilbert Ndollane Dione and Kris Gaj and Cheikh Thiecoumba Gueye and Richard Haeussler and Jean Belo Klamti and Ousmane N'diaye and Duc Tri Nguyen and Edoardo Persichetti and and Jefferson E. Ricardini
2017/1036 ( PDF )
Rotational-XOR Cryptanalysis of Reduced-round SPECK
Yunwen Liu and Glenn De Witte and Adrián Ranea and Tomer Ashur
2017/1035 ( PDF )
Privacy-respecting Reward Generation and Accumulation for Participatory Sensing Applications
Tassos Dimitriou
2017/1034 ( PDF )
Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy
Sebastian Meiser and Esfandiar Mohammadi
2017/1033 ( PDF )
Foundations of Differentially Oblivious Algorithms
T-H. Hubert Chan and Kai-Min Chung and Bruce Maggs and Elaine Shi
2017/1032 ( PDF )
Performing Computations on Hierarchically Shared Secrets
Giulia Traverso and Denise Demirel and Johannes Buchmann
2017/1031 ( PDF )
Lightweight Design Choices for LED-like Block Ciphers
Sumanta Sarkar and Habeeb Syed and Rajat Sadhukhan and Debdeep Mukhopadhyay
2017/1030 ( PDF )
New MILP Modeling: Improved Conditional Cube Attacks on Keccak-based Constructions
Ling Song and Jian Guo and Danping Shi and San Ling
2017/1029 ( PDF )
Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs of Knowledge
Pyrros Chaidos and Geoffroy Couteau
2017/1028 ( PDF )
Cryptanalysis of 1-Round KECCAK
Rajendra Kumar and Mahesh Sreekumar Rajasree and Hoda AlKhzaimi
2017/1027 ( PDF )
Eliminating Variables in Boolean Equation Systems
Bjřrn Mřller Greve and Hĺvard Raddum and Gunnar Flřystad and Řyvind Ytrehus
2017/1026 ( -- withdrawn -- )
Cube Attack against Full Kravatte
Jian Guo and Ling Song
2017/1025 ( PDF )
Rounded Gaussians -- Fast and Secure Constant-Time Sampling for Lattice-Based Crypto
Andreas Hülsing and Tanja Lange and Kit Smeets
2017/1024 ( PDF )
Revisiting a Masked Lookup-Table Compression Scheme
Srinivas Vivek
2017/1023 ( PDF )
Several Masked Implementations of the Boyar-Peralta AES S-Box
Ashrujit Ghoshal and Thomas De Cnudde
2017/1022 ( PDF )
Direct Anonymous Attestation from Lattices
Rachid El Bansarkhani and Ali El Kaafarani
2017/1021 ( PDF )
Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round
Alexandre Adomnicai and Jacques J.A. Fournier and Laurent Masson
2017/1020 ( PDF )
A Novel Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves
Wei Yu and Saud Al Musa and Guangwu Xu and Bao Li
2017/1019 ( PDF )
Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
Mustafa Khairallah and Anupam Chattopadhyay and Thomas Peyrin
2017/1018 ( PDF )
A Fair Protocol for Data Trading Based on Bitcoin Transactions
Sergi Delgado-Segura and Cristina Pérez-Solà and Guillermo Navarro-Arribas and Jordi Herrera-Joancomartí
2017/1017 ( PDF )
Differential Cryptanalysis of 18-Round PRIDE
Virginie Lallemand and Shahram Rasoolzadeh
2017/1016 ( PDF )
Differentially Private Access Patterns in Secure Computation
Sahar Mazloom and S. Dov Gordon
2017/1015 ( PDF )
A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
Armando Faz-Hernández and Julio López and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez
2017/1014 ( PDF )
Attacking Deterministic Signature Schemes using Fault Attacks
Damian Poddebniak and Juraj Somorovsky and Sebastian Schinzel and Manfred Lochter and Paul Rösler
2017/1013 ( PDF )
Homomorphic SIM$^2$D Operations: Single Instruction Much More Data
Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren
2017/1012 ( PDF )
Conditional Cube Attack on Round-Reduced River Keyak
Wenquan Bi and Zheng Li and Xiaoyang Dong and Lu Li and Xiaoyun Wang
2017/1011 ( PDF )
Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption
Eduard Hauck and Julian Loss
2017/1010 ( -- withdrawn -- )
A New Digital Rights Management Solution Based on White-Box Cryptography
Jun Liu and Yupu Hu
2017/1009 ( PDF )
Architecture level Optimizations for Kummer based HECC on FPGAs
Gabriel Gallin and Turku Ozlum Celik and Arnaud Tisserand
2017/1008 ( PDF )
Automatic Characterization of Exploitable Faults: A Machine Learning Approach
Sayandeep Saha and Dirmanto Jap and Sikhar Patranabis and Debdeep Mukhopadhyay and Shivam Bhasin and Pallab Dasgupta
2017/1007 ( PDF )
Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys
Herman Galteland and Kristian Gjřsteen
2017/1006 ( PDF )
Round and Communication Efficient Unconditionally-secure MPC with $t < n/3$ in Partially Synchronous Network
Ashish Choudhury and Arpita Patra and Divya Ravi
2017/1005 ( PDF )
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Tsunekazu Saito and Keita Xagawa and Takashi Yamakawa
2017/1004 ( PDF )
Garbled Protocols and Two-Round MPC from Bilinear Maps
Sanjam Garg and Akshayaram Srinivasan
2017/1003 ( PDF )
Secure Multi-Party Computation in Large Networks
Varsha Dani and Valerie King and Mahnush Movahedi and Jared Saia and Mahdi Zamani
2017/1002 ( PDF )
On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications
Zhe Li and San Ling and Chaoping Xing and Sze Ling Yeo
2017/1001 ( PDF )
Impossibility of Order-Revealing Encryption in Idealized Models
Mark Zhandry and Cong Zhang
2017/1000 ( PDF )
No right to remain silent: Isolating Malicious Mixes
Hemi Leibowitz and Ania Piotrowska and George Danezis and Amir Herzberg
2017/999 ( PDF )
Shortest Vector from Lattice Sieving: a Few Dimensions for Free
Léo Ducas
2017/998 ( PDF )
A Comparative Investigation of Approximate Attacks on Logic Encryptions
Yuanqi Shen and Amin Rezaei and Hai Zhou
2017/997 ( PDF )
Hash Proof Systems over Lattices Revisited
Fabrice Benhamouda and Olivier Blazy and Léo Ducas and Willy Quach
2017/996 ( PDF )
Large FHE gates from Tensored Homomorphic Accumulator
Guillaume Bonnoron and Léo Ducas and Max Fillinger
2017/995 ( PDF )
A signature scheme from Learning with Truncation
Jeffrey Hoffstein and Jill Pipher and William Whyte and Zhenfei Zhang
2017/994 ( PDF )
Separable Statistics and Multidimensional Linear Cryptanalysis
S. Fauskanger and I. Semaev
2017/993 ( PDF )
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
Paulo S. L. M. Barreto and Bernardo David and Rafael Dowsley and Kirill Morozov and Anderson C. A. Nascimento
2017/992 ( PDF )
Leakage Bounds for Gaussian Side Channels
Thomas Unterluggauer and Thomas Korak and Stefan Mangard and Robert Schilling and Luca Benini and Frank Gürkaynak and Michael Muehlberghuber
2017/991 ( PDF )
Secure Code Updates for Smart Embedded Devices based on PUFs
Wei Feng and Yu Qin and Shijun Zhao and Ziwen Liu and Xiaobo Chu and Dengguo Feng
2017/990 ( PDF )
Bounds on Differential and Linear Branch Number of Permutations
Sumanta Sarkar and Habeeb Syed
2017/989 ( PDF )
Decentralized Multi-Client Functional Encryption for Inner Product
Jérémy Chotard and Edouard Dufour Sans and Romain Gay and Duong Hieu Phan and David Pointcheval
2017/988 ( PDF )
On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers
Yusong Du and Baodian Wei
2017/987 ( PDF )
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption
Fuyuki Kitagawa and Keisuke Tanaka
2017/986 ( PDF )
On the Hardness of Computing Endomorphism Rings of Supersingular Elliptic Curves
Kirsten Eisentraeger and Sean Hallgren and Travis Morrison
2017/985 ( PDF )
Breaking Ed25519 in WolfSSL
Niels Samwel and Lejla Batina and Guido Bertoni and Joan Daemen and Ruggero Susella
2017/984 ( PDF )
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Marc Fischlin and Sogol Mazaheri
2017/983 ( PDF )
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions
Miguel Ambrona and Gilles Barthe and Romain Gay and Hoeteck Wee
2017/982 ( PDF )
Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet
Katriel Cohn-Gordon and Cas Cremers
2017/981 ( PDF )
Efficient Maliciously Secure Multiparty Computation for RAM
Marcel Keller and Avishay Yanai
2017/980 ( PDF )
Yoyo Tricks with AES
Sondre Rønjom and Navid Ghaedi Bardeh and Tor Helleseth
2017/979 ( PDF )
Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption
Irene Giacomelli and Somesh Jha and Marc Joye and C. David Page and Kyonghwan Yoon
2017/978 ( PDF )
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny
2017/977 ( PDF )
Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations
Akinori Hosoyamada and Yu Sasaki
2017/976 ( PDF )
Improvements for Gate-Hiding Garbled Circuits
Mike Rosulek
2017/975 ( PDF )
Differential Attacks on Deterministic Signatures
Christopher Ambrose and Joppe W. Bos and Björn Fay and Marc Joye and Manfred Lochter and Bruce Murray
2017/974 ( PDF )
Obscuro: A Bitcoin Mixer using Trusted Execution Environments
Muoi Tran and Loi Luu and Min Suk Kang and Iddo Bentov and Prateek Saxena
2017/973 ( PDF )
Symmetric Searchable Encryption with Sharing and Unsharing
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2017/972 ( PDF )
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings
Michel Abdalla and Dario Catalano and Dario Fiore and Romain Gay and Bogdan Ursu
2017/971 ( PDF )
An Improved Protocol for Securely Solving the Shortest Path Problem and its Application to Combinatorial Auctions
Abdelrahaman Aly and Sara Cleemput
2017/970 ( PDF )
A New Functional Encryption for Multidimensional Range Query
Jia Xu and Ee-Chien Chang and Jianying Zhou
2017/969 ( PDF )
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation
Bei Liang and Aikaterini Mitrokotsa
2017/968 ( PDF )
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls
Sarani Bhattacharya and Clementine Maurice and Shivam Bhasin and Debdeep Mukhopadhyay
2017/967 ( PDF )
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions
Zvika Brakerski and Alex Lombardi and Gil Segev and Vinod Vaikuntanathan
2017/966 ( PDF )
Optimal Parameters for XMSS^MT
Andreas Hülsing and Lea Rausch and Johannes Buchmann
2017/965 ( PDF )
WOTS+ -- Shorter Signatures for Hash-Based Signature Schemes
Andreas Hülsing
2017/964 ( PDF )
Recursive ORAMs with Practical Constructions
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2017/963 ( PDF )
Non-Interactive Proofs of Proof-of-Work
Aggelos Kiayias and Andrew Miller and Dionysis Zindros
2017/962 ( PDF )
Hard and Easy Problems for Supersingular Isogeny Graphs
Christophe Petit and Kristin Lauter
2017/961 ( PDF )
An Offline Dictionary Attack against zkPAKE Protocol
Jose Becerra and Peter Y.A. Ryan and Petra Sala and Marjan Skrobot
2017/960 ( PDF )
Unforgeable Quantum Encryption
Gorjan Alagic and Tommaso Gagliardoni and Christian Majenz
2017/959 ( PDF )
Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU
Dung Hoang Duong and Masaya Yasuda and Tsuyoshi Takagi
2017/958 ( PDF )
Two-Message, Oblivious Evaluation of Cryptographic Functionalities
Nico Döttling and Nils Fleischhacker and Johannes Krupp and Dominique Schröder
2017/957 ( PDF )
From Selective IBE to Full IBE and Selective HIBE
Nico Döttling and Sanjam Garg
2017/956 ( PDF )
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption
Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai
2017/955 ( PDF )
Towards Practical Privacy-Preserving Genome-Wide Association Study
Charlotte Bonte and Eleftheria Makri and Amin Ardeshirdavani and Jaak Simm and Yves Moreau and Frederik Vercauteren
2017/954 ( PDF )
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency---Choose Two
Debajyoti Das and Sebastian Meiser and Esfandiar Mohammadi and Aniket Kate
2017/953 ( PDF )
Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures
George Teseleanu
2017/952 ( PDF )
Secure Two-Party Computation with Fairness -- A Necessary Design Principle
Yehuda Lindell and Tal Rabin
2017/951 ( PDF )
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
Nina Bindel and Johannes Buchmann and Juliane Krämer and Heiko Mantel and Johannes Schickel and Alexandra Weber
2017/950 ( PDF )
Blockwise $p$-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners
Saeed Mahloujifar and Mohammad Mahmoody
2017/949 ( PDF )
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
Gunnar Hartung and Björn Kaidel and Alexander Koch and Jessica Koch and Dominik Hartmann
2017/948 ( PDF )
Evolving Secret Sharing: Dynamic Thresholds and Robustness
Ilan Komargodski and Anat Paskin-Cherniavsky
2017/947 ( PDF )
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model
Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam
2017/946 ( PDF )
The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks
Fermi Ma and Mark Zhandry
2017/945 ( PDF )
Moderately Hard Functions: Definition, Instantiations, and Applications
Joël Alwen and Björn Tackmann
2017/944 ( PDF )
A Unified Approach to Constructing Black-box UC Protocols in Trusted Setup Models
Susumu Kiyoshima and Huijia Lin and Muthuramakrishnan Venkitasubramaniam
2017/943 ( PDF )
When does Functional Encryption Imply Obfuscation?
Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed
2017/942 ( PDF )
On Secure Two-Party Computation in Three Rounds
Prabhanjan Ananth and Abhishek Jain
2017/941 ( -- withdrawn -- )
.
.
2017/940 ( PDF )
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
Amos Beimel and Oriol Farrŕs and Yuval Mintz and Naty Peter
2017/939 ( PDF )
Towards Optimal Pre-processing in Leakage Detection
Changhai Ou and Degang Sun and Zhu Wang and Xinping Zhou
2017/938 ( PDF )
On the security of the WOTS-PRF signature scheme
Philip Lafrance and Alfred Menezes
2017/937 ( PDF )
Random Oracles and Non-Uniformity
Sandro Coretti and Yevgeniy Dodis and Siyao Guo and John Steinberger
2017/936 ( PDF )
A tight security reduction in the quantum random oracle model for code-based signature schemes
André Chailloux and Thomas Debris-Alazard
2017/935 ( PDF )
Overcoming Cryptographic Impossibility Results using Blockchains
Rishab Goyal and Vipul Goyal
2017/934 ( PDF )
Adaptively Indistinguishable Garbled Circuits
Zahra Jafargholi and Alessandra Scafuro and Daniel Wichs
2017/933 ( PDF )
Improving Stateless Hash-Based Signatures
Jean-Philippe Aumasson and Guillaume Endignoux
2017/932 ( PDF )
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
Nils Wisiol and Christoph Graebnitz and Marian Margraf and Manuel Oswald and Tudor A. A. Soroceanu and Benjamin Zengin
2017/931 ( PDF )
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds
Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti
2017/930 ( PDF )
Four-state Non-malleable Codes with Explicit Constant Rate
Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar
2017/929 ( PDF )
How to Securely Compute with Noisy Leakage in Quasilinear Complexity
Dahmun Goudarzi and Antoine Joux and Matthieu Rivain
2017/928 ( PDF )
Environmental Authentication in Malware
Jeremy Blackthorne and Benjamin Kaiser and Benjamin Fuller and Bulent Yener
2017/927 ( PDF )
Near-Optimal Secret Sharing and Error Correcting Codes in AC0
Kuan Cheng and Yuval Ishai and Xin Li
2017/926 ( PDF )
How to Construct a Leakage-Resilient (Stateless) Trusted Party
Daniel Genkin and Yual Ishai and Mor Weiss
2017/925 ( PDF )
Resettably-Sound Resettable Zero Knowledge in Constant Rounds
Wutichai Chongchitmate and Rafail Ostrovsky and Ivan Visconti
2017/924 ( PDF )
Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM
T-H. Hubert Chan and Yue Guo and Wei-Kai Lin and Elaine Shi
2017/923 ( PDF )
Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension
Long Chen and Zhenfeng Zhang and Xueqing Wang
2017/922 ( PDF )
On the impossibility of entropy reversal, and its application to zero-knowledge proofs
Shachar Lovett and Jiapeng Zhang
2017/921 ( PDF )
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero
Shi-Feng Sun and Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Dawu Gu
2017/920 ( PDF )
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations
Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti
2017/919 ( PDF )
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing
Oriol Farras and Tarik Kaced and Sebastia Martin and Carles Padro
2017/918 ( PDF )
Linear Repairing Codes and Side-Channel Attacks
Hervé Chabanne and Houssem Maghrebi and Emmanuel Prouff
2017/917 ( PDF )
A practical, perfectly secure password scheme in the bounded retrieval model
Moses Liskov
2017/916 ( PDF )
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model
Eike Kiltz and Vadim Lyubashevsky and Christian Schaffner
2017/915 ( PDF )
Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work
Lisa Eckey and Sebastian Faust and Julian Loss
2017/914 ( PDF )
Cache-Oblivious and Data-Oblivious Sorting and Applications
T-H. Hubert Chan and Yue Guo and Wei-Kai Lin and Elaine Shi
2017/913 ( PDF )
Thunderella: Blockchains with Optimistic Instant Confirmation
Rafael Pass and Elaine Shi
2017/912 ( PDF )
On Two Round Rerunnable MPC Protocols
Paul Laird
2017/911 ( PDF )
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Vincent Immler and Matthias Hiller and Qinzhi Liu and Andreas Lenz and Antonia Wachter-Zeh
2017/910 ( PDF )
Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC)
Benjamin Lac and Anne Canteaut and Jacques J.A. Fournier and Renaud Sirdey
2017/909 ( PDF )
Clarifying the subset-resilience problem
Jean-Philippe Aumasson and Guillaume Endignoux
2017/908 ( PDF )
Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings
Ivan Damgĺrd and Claudio Orlandi and Mark Simkin
2017/907 ( PDF )
On the differential equivalence of APN functions
Anastasiya Gorodilova
2017/906 ( PDF )
Notes On GGH13 Without The Presence Of Ideals
Martin R. Albrecht and Alex Davidson and Enrique Larraia and Alice Pellet--Mary
2017/905 ( PDF )
Shorter Ring Signatures from Standard Assumptions
Alonso González
2017/904 ( PDF )
On Iterative Collision Search for LPN and Subset Sum
Srinivas Devadas and Ling Ren and Hanshen Xiao
2017/903 ( PDF )
On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-Interactive Arguments
Omer Paneth and Guy N. Rothblum
2017/902 ( PDF )
How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors
Essam Ghadafi
2017/901 ( PDF )
Stateful Multi-Client Verifiable Computation
Christian Cachin and Esha Ghosh and Dimitrios Papadopoulos and Björn Tackmann
2017/900 ( PDF )
Proof of a shuffle for lattice-based cryptography (Full version)
Núria Costa and Ramiro Martínez and Paz Morillo
2017/899 ( PDF )
Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement
Bernardo David and Rafael Dowsley and Mario Larangeira
2017/898 ( PDF )
Putting Wings on SPHINCS
Stefan Kölbl
2017/897 ( PDF )
Formal Verification of Masked Hardware Implementations in the Presence of Glitches
Roderick Bloem and Hannes Gross and Rinat Iusupov and Bettina Könighofer and Stefan Mangard and Johannes Winter
2017/896 ( PDF )
Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks
Ashokkumar C and M. Bhargav Sri Venkatesh and Ravi Prakash Giri and Bernard Menezes
2017/895 ( PDF )
Linear Cryptanalysis of DES with Asymmetries
Andrey Bogdanov and Philip S. Vejre
2017/894 ( PDF )
An Efficient Pairing-Based Shuffle Argument
Prastudy Fauzi and Helger Lipmaa and Janno Siim and Michal Zajac
2017/893 ( PDF )
Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space
Hamza Abusalah and Joël Alwen and Bram Cohen and Danylo Khilko and Krzysztof Pietrzak and Leonid Reyzin
2017/892 ( PDF )
The Iterated Random Function Problem
Ritam Bhaumik and Nilanjan Datta and Avijit Dutta and Nicky Mouha and Mridul Nandi
2017/891 ( PDF )
Finding Bugs in Cryptographic Hash Function Implementations
Nicky Mouha and Mohammad S Raunak and D. Richard Kuhn and Raghu Kacker
2017/890 ( PDF )
On the One-Per-Message Unforgeability of (EC)DSA and its Variants
Manuel Fersch and Eike Kiltz and Bertram Poettering
2017/889 ( PDF )
On Fast Multiplication in Binary Finite Fields and Optimal Primitive Polynomials over GF(2)
Alexander Maximov and Helena Sjoberg
2017/888 ( PDF )
Asynchronous provably-secure hidden services
Philippe Camacho and Fernando Krell
2017/887 ( PDF )
Succinct Spooky Free Compilers Are Not Black Box Sound
Zvika Brakerski and Yael Tauman Kalai and Renen Perlman
2017/886 ( PDF )
Compression for trace zero points on twisted Edwards curves
Giulia Bianco and Elisa Gorla
2017/885 ( PDF )
PermuteRam: Optimizing Oblivious Computation for Efficiency
Shruti Tople and Hung Dang and Prateek Saxena and Ee-Chien Chang
2017/884 ( PDF )
Scalar multiplication in compressed coordinates in the trace-zero subgroup
Giulia Bianco and Elisa Gorla
2017/883 ( PDF )
Strengthening the Security of Encrypted Databases: Non-Transitive JOINs
Ilya Mironov and Gil Segev and Ido Shahaf
2017/882 ( PDF )
Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms
Baptiste Olivier and Tony Quertier
2017/881 ( PDF )
Möbius: Trustless Tumbling for Transaction Privacy
Sarah Meiklejohn and Rebekah Mercer
2017/880 ( PDF )
Using the Estonian Electronic Identity Card for Authentication to a Machine (Extended Version)
Danielle Morgan and Arnis Parsovs
2017/879 ( PDF )
Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations
Jean-Sebastien Coron
2017/878 ( PDF )
Raziel: Private and Verifiable Smart Contracts on Blockchains
David Cerezo Sánchez
2017/877 ( PDF )
Identity-Based Format-Preserving Encryption
Mihir Bellare and Viet Tung Hoang
2017/876 ( PDF )
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE
Benoit Libert and Amin Sakzad and Damien Stehle and Ron Steinfeld
2017/875 ( PDF )
Instantaneous Decentralized Poker
Iddo Bentov and Ranjit Kumaresan and Andrew Miller
2017/874 ( PDF )
Non-Trivial Witness Encryption and Null-iO from Standard Assumptions
Zvika Brakerski and Aayush Jain and Ilan Komargodski and Alain Passelegue and Daniel Wichs
2017/873 ( PDF )
Cycle Slicer: An Algorithm for Building Permutations on Special Domains
Sarah Miracle and Scott Yilek
2017/872 ( PDF )
Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability
Jonathan Bootle and Andrea Cerulli and Essam Ghadafi and Jens Groth and Mohammad Hajiabadi and Sune K. Jakobsen
2017/871 ( PDF )
Non-Interactive Multiparty Computation without Correlated Randomness
Shai Halevi and Yuval Ishai and Abhishek Jain and Ilan Komargodski and Amit Sahai and Eylon Yogev
2017/870 ( PDF )
Tightly-Secure Signatures from Five-Move Identification Protocols
Eike Kiltz and Julian Loss and Jiaxin Pan
2017/869 ( PDF )
Amortizing Randomness Complexity in Private Circuits
Sebastian Faust and Clara Paglialonga and Tobias Schneider
2017/868 ( PDF )
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers
Takanori Isobe and Kyoji Shibutani
2017/867 ( PDF )
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing
Arinjita Paul and S.Sharmila Deva Selvi and C. Pandu Rangan
2017/866 ( PDF )
Enhanced Modelling of Authenticated Key Exchange Security
Papa B. Seye and Augustin P. Sarr
2017/865 ( PDF )
The First Thorough Side-Channel Hardware Trojan
Maik Ender and Samaneh Ghandali and Amir Moradi and Christof Paar
2017/864 ( PDF )
Quantum Multicollision-Finding Algorithm
Akinori Hosoyamada and Yu Sasaki and Keita Xagawa
2017/863 ( PDF )
The Minimum Number of Cards in Practical Card-based Protocols
Julia Kastner and Alexander Koch and Stefan Walzer and Daiki Miyahara and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki Sone
2017/862 ( PDF )
Efficient Scalable Constant-Round MPC via Garbled Circuits
Aner Ben-Efraim and Yehuda Lindell and Eran Omri
2017/861 ( PDF )
On the Depth of Oblivious Parallel RAM
T-H. Hubert Chan and Kai-Min Chung and Elaine Shi
2017/860 ( PDF )
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property
Ling Sun and Wei Wang and Meiqin Wang
2017/859 ( PDF )
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups
Jie Chen and Junqing Gong
2017/858 ( PDF )
Differential Fault Analysis of SHA-3 under Relaxed Fault Models
Pei Luo and Yunsi Fei and Liwei Zhang and A. Adam Ding
2017/857 ( PDF )
Image Classification using non-linear Support Vector Machines on Encrypted Data
Anthony Barnett and Jay Santokhi and Michael Simpson and Nigel P. Smart and Charlie Stainton-Bygrave and Srnivas Vivek and Adrian Waller
2017/856 ( PDF )
Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash
Benoît Libert and San Ling and Khoa Nguyen and Huaxiong Wang
2017/855 ( PDF )
Fault Attack on ACORN v3
Xiaojuan Zhang and Xiutao Feng and Dongdai Lin
2017/854 ( PDF )
Zero-Knowledge Password Policy Check from Lattices
Khoa Nguyen and Benjamin Hong Meng Tan and Huaxiong Wang
2017/853 ( PDF )
Generic Forward-Secure Key Agreement Without Signatures
Cyprien de Saint Guilhem and Nigel P. Smart and Bogdan Warinschi
2017/852 ( PDF )
Blockcipher-based MACs: Beyond the Birthday Bound without Message Length
Yusuke Naito
2017/851 ( PDF )
How to Use Metaheuristics for Design of Symmetric-Key Primitives
Ivica Nikolić
2017/850 ( PDF )
Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs
Evgenios M. Kornaropoulos and Petros Efstathopoulos
2017/849 ( PDF )
FAST: Disk Encryption and Beyond
Debrup Chakraborty and Sebati Ghosh and Cuauhtemoc Mancillas Lopez and Palash Sarkar
2017/848 ( PDF )
Single Key Variant of PMAC_Plus
Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang
2017/847 ( PDF )
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography
André Chailloux and María Naya-Plasencia and André Schrottenloher
2017/846 ( PDF )
How to Prove Megabytes (Per Second)
Yaron Gvili
2017/845 ( PDF )
Improved Security for OCB3
Ritam Bhaumik and Mridul Nandi
2017/844 ( PDF )
Implementing Conjunction Obfuscation under Entropic Ring LWE
David Bruce Cousins and Giovanni Di Crescenzo and Kamil Doruk Gür and Kevin King and Yuriy Polyakov and Kur