Cryptology ePrint Archive: Listing for 2021


2021/986 ( PDF )
Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1
Hanno Becker and Vincent Hwang and Matthias J. Kannwischer and Bo-Yin Yang and Shang-Yi Yang
2021/985 ( PDF )
PUF Security: Reviewing The Validity of Spoofing Attack Against Safe is the New Smart
Karim Lounis
2021/984 ( PDF )
On the Use of the Legendre Symbol in Symmetric Cipher Design
Alan Szepieniec
2021/983 ( PDF )
A Cryptographic Hash Function from Markoff Triples
Elena Fuchs and Kristin Lauter and Matthew Litman and Austin Tran
2021/982 ( PDF )
Quantum Implementation and Resource Estimates for RECTANGLE and KNOT
Anubhab Baksi and Kyungbae Jang and Gyeongju Song and Hwajeong Seo and Zejun Xiang
2021/981 ( PDF )
Deep Learning-based Side-channel Analysis against AES Inner Rounds
Sudharshan Swaminathan and Lukasz Chmielewski and Guilherme Perin and Stjepan Picek
2021/980 ( PDF )
Binary Field Montgomery Multiplication on Quantum Computers
Kyoungbae Jang and Gyeong Ju Song and Hyunji Kim and Hyeokdong Kwon and Wai-Kong Lee and Zhi Hu and Hwajeong Seo
2021/979 ( PDF )
Constant-Overhead Zero-Knowledge for RAM Programs
Nicholas Franzese and Jonathan Katz and Steve Lu and Rafail Ostrovsky and Xiao Wang and Chenkai Weng
2021/978 ( PDF )
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications
Donghang Lu and Albert Yu and Aniket Kate and Hemanta Maji
2021/977 ( PDF )
Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices
Yuval Ishai and Hang Su and David J. Wu
2021/976 ( PDF )
Reinventing BEDs: Formal Treatment of Broadcast Encryption with Dealership and Practical Constructions
Sayantan Mukherjee and Avishek Majumder
2021/975 ( PDF )
Bridges connecting Encryption Schemes
Mugurel Barcau and Cristian Lupascu and Vicentiu Pasol and George C. Turcas
2021/974 ( PDF )
Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds
Yi-Fan Tseng and Chun-I Fan and Zi-Cheng Liu
2021/973 ( PDF )
A Multiplatform Parallel Approach for Lattice Sieving Algorithms
Michał Andrzejczak and Kris Gaj
2021/972 ( PDF )
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA
Alexander May and Julian Nowakowski and Santanu Sarkar
2021/971 ( PDF )
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\Sigma$-Protocols
Lior Rotem and Gil Segev
2021/970 ( PDF )
Short Identity-Based Signatures with Tight Security from Lattices
Jiaxin Pan and Benedikt Wagner
2021/969 ( PDF )
Influence of a Set of Variables on a Boolean Function
Aniruddha Biswas and Palash Sarkar
2021/968 ( PDF )
White-Box Implementations for Hash-Based Signatures and One-Time Passwords
Kemal Bicakci and Kemal Ulker and Yusuf Uzunay
2021/967 ( PDF )
Assessment of Quantum Threat To Bitcoin and Derived Cryptocurrencies
Stephen Holmes and Liqun Chen
2021/966 ( PDF )
Soteria: Privacy-Preserving Machine Learning for Apache Spark
Cláudia Brito and Pedro Ferreira and Bernardo Portela and Rui Oliveira and Joăo Paulo
2021/965 ( PDF )
Automatic Search for Bit-based Division Property
Shibam Ghosh and Orr Dunkelman
2021/964 ( PDF )
Secure Quantum Computation with Classical Communication
James Bartusek
2021/963 ( PDF )
Post-Quantum Key-Blinding for Authentication in Anonymity Networks
Edward Eaton and Douglas Stebila and Roy Stracovsky
2021/962 ( PDF )
Practically Solving LPN
Thom Wiggers and Simona Samardjiska
2021/961 ( PDF )
Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes
Jan Bobolz and Fabian Eidens and Raphael Heitjohann and Jeremy Fell
2021/960 ( PDF )
The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures
Gregor Leander and Thorben Moos and Amir Moradi and Shahram Rasoolzadeh
2021/959 ( PDF )
The Best of Two Worlds: Deep Learning-assisted Template Attack
Lichao Wu and Guilherme Perin and Stjepan Picek
2021/958 ( PDF )
When the Decoder Has to Look Twice: Glitching a PUF Error Correction
Jonas Ruchti and Michael Gruber and Michael Pehl
2021/957 ( PDF )
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
Arpita Patra and Akshayaram Srinivasan
2021/956 ( PDF )
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
Mike Hamburg and Julius Hermelink and Robert Primas and Simona Samardjiska and Thomas Schamberger and Silvan Streit and Emanuele Strieder and Christine van Vredendaal
2021/955 ( PDF )
Higher-degree supersingular group actions
Mathilde Chenu and Benjamin Smith
2021/954 ( PDF )
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms
Jose Maria Bermudo Mera and Angshuman Karmakar and Suparna Kundu and Ingrid Verbauwhede
2021/953 ( PDF )
State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption
Keita Emura and Ryoma Ito and Sachiko Kanamori and Ryo Nojima and Yohei Watanabe
2021/952 ( PDF )
On the Evaluation of Deep Learning-based Side-channel Analysis
Lichao Wu and Guilherme Perin and Stjepan Picek
2021/951 ( PDF )
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
Melissa Azouaoui and Olivier Bronchain and Vincent Grosso and Kostas Papagiannopoulos and François-Xavier Standaert
2021/950 ( PDF )
Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying
Sébastien Duval and Pierrick Méaux and Charles Momin and François-Xavier Standaert
2021/949 ( PDF )
A High-Speed Architecture for the Reduction in VDF Based on a Class Group
Yifeng Song and Danyang Zhu and Jing Tian and Zhongfeng Wang
2021/948 ( PDF )
How to Make a Secure Index for Searchable Symmetric Encryption, Revisited
Yohei Watanabe and Takeshi Nakai and Kazuma Ohara and Takuya Nojima and Yexuan Liu and Mitsugu Iwamoto and Kazuo Ohta
2021/947 ( PDF )
Autocorrelations of vectorial Boolean functions
Anne Canteaut and Lukas Kölsch and Chao Li and Chunlei Li and Kangquan Li and Longjiang Qu and Friedrich Wiemer
2021/946 ( PDF )
Hidden Cosets and Applications to Unclonable Cryptography
Andrea Coladangelo and Jiahui Liu and Qipeng Liu and Mark Zhandry
2021/945 ( PDF )
Limits on the Adaptive Security of Yao's Garbling
Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Daniel Wichs
2021/944 ( PDF )
Systematic Side-channel Analysis of Curve25519 with Machine Learning
Léo Weissbart and Łukasz Chmielewski and Stjepan Picek and Lejla Batina
2021/943 ( PDF )
Breaking the Circuit-Size Barrier for Secure Computation under Quasi-Polynomial LPN
Geoffroy Couteau and Pierre Meyer
2021/942 ( PDF )
Compact Ring Signatures from Learning With Errors
Rohit Chatterjee and Sanjam Garg and Mohammad Hajiabadi and Dakshita Khurana and Xiao Liang and Giulio Malavolta and Omkant Pandey and Sina Shiehian
2021/941 ( PDF )
Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme
Maamar Ouladj and Sylvain Guilley and Philippe Guillot and Farid Mokrane
2021/940 ( PDF )
SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user's secret data
Ripon Patgiri
2021/939 ( PDF )
OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning
Jiacheng Liang and Wensi Jiang and Songze Li
2021/938 ( PDF )
Plactic signatures
Daniel R. L. Brown
2021/937 ( PDF )
Storing data that is updated regularly on a client machine securely
Artem Los
2021/936 ( PDF )
FIVER -- Robust Verification of Countermeasures against Fault Injections
Jan Richter-Brockmann and Aein Rezaei Shahmirzadi and Pascal Sasdrich and Amir Moradi and Tim Güneysu
2021/935 ( PDF )
ROTed: Random Oblivious Transfer for embedded devices
Pedro Branco and Luís Fiolhais and Manuel Goulăo and Paulo Martins and Paulo Mateus and Leonel Sousa
2021/934 ( PDF )
ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines
Diego F. Aranha and Emil Madsen Bennedsen and Matteo Campanelli and Chaya Ganesh and Claudio Orlandi and Akira Takahashi
2021/933 ( PDF )
Fast Factoring Integers by SVP Algorithms, corrected
Claus Peter Schnorr
2021/932 ( PDF )
Succinct Functional Commitment for a Large Class of Arithmetic Circuits
Helger Lipmaa and Kateryna Pavlyk
2021/931 ( PDF )
Practical Key Recovery Attacks on FlexAEAD
Orr Dunkelman and Maria Eichlseder and Daniel Kales and Nathan Keller and Gaëtan Leurent and Markus Schofnegger
2021/930 ( PDF )
Darlin: A proof carrying data scheme based on Marlin
Ulrich Haböck and Alberto Garoffolo and Daniele Di Benedetto
2021/929 ( PDF )
A polynomial time key-recovery attack on the Sidon cryptosystem
Pierre Briaud and Jean-Pierre Tillich and Javier Verbel
2021/928 ( PDF )
Necessary and Sufficient Conditions for Galois NFSRs Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium
Jianghua Zhong and Yingyin Pan and Wenhui Kong and Dongdai Lin
2021/927 ( PDF )
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs
Shuichi Katsumata
2021/926 ( PDF )
On Treewidth, Separators and Yao's Garbling
Chethan Kamath and Karen Klein and Krzysztof Pietrzak
2021/925 ( PDF )
Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure
Marten van Dijk and Deniz Gurevin and Chenglu Jin and Omer Khan and Phuong Ha Nguyen
2021/924 ( PDF )
On Removing Rejection Conditions in Practical Lattice-Based Signatures
Rouzbeh Behnia and Yilei Chen and Daniel Masny
2021/923 ( PDF )
On the (in)security of ElGamal in OpenPGP
Luca De Feo and Bertram Poettering and Alessandro Sorniotti
2021/922 ( -- withdrawn -- )
Provably Secure Short Signature Scheme from Isogeny between Elliptic Curves
Kunal Dey and Sumit Kumar Debnath
2021/921 ( PDF )
Semilinear transformations in coding theory and their application to cryptography
Wenshuo Guo and Fang-Wei Fu
2021/920 ( PDF )
Non-malleable Commitments against Quantum Attacks
Nir Bitansky and Huijia Lin and Omri Shmueli
2021/919 ( PDF )
The supersingular isogeny path and endomorphism ring problems are equivalent
Benjamin Wesolowski
2021/918 ( PDF )
The Round Complexity of Quantum Zero-Knowledge
Orestis Chardouvelis and Giulio Malavolta
2021/917 ( PDF )
CODBS: A cascading oblivious search protocol optimized for real-world relational database indexes
Rogério Pontes and Bernardo Portela and Manuel Barbosa and Ricardo Vilaça
2021/916 ( PDF )
Mithril: Stake-based Threshold Multisignatures
Pyrros Chaidos and Aggelos Kiayias
2021/915 ( PDF )
A PCP Theorem for Interactive Proofs
Gal Arnon and Alessandro Chiesa and Eylon Yogev
2021/914 ( PDF )
Principal Component Analysis using CKKS Homomorphic Encryption Scheme
Samanvaya Panda
2021/913 ( PDF )
Practical complexities of probabilistic algorithms for solving Boolean polynomial systems
Stefano Barbero and Emanuele Bellini and Carlo Sanna and Javier Verbel
2021/912 ( PDF )
On the looseness of FO derandomization
Daniel J. Bernstein
2021/911 ( PDF )
SoK: Understanding BFT Consensus in the Age of Blockchains
Gang Wang
2021/910 ( PDF )
SECDSA: Mobile signing and authentication under classical ``sole control''
Eric Verheul
2021/909 ( PDF )
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks – A Case Study on Public-Key Algorithms –
Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli
2021/908 ( PDF )
Selection of sampling keys for cryptographic tests
George Marinakis
2021/907 ( PDF )
zkKYC: A solution concept for KYC without knowing your customer, leveraging self-sovereign identity and zero-knowledge proofs
Pieter Pauwels
2021/906 ( PDF )
Expanded Gabidulin Codes and Their Application to Cryptography
Wenshuo Guo and Fang-Wei Fu
2021/905 ( PDF )
A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage
Vipul Arora and Ileana Buhan and Guilherme Perin and Stjepan Picek
2021/904 ( PDF )
Spatial Dependency Analysis to Extract Information from Side-Channel Mixtures
Aurélien Vasselle and Hugues Thiebeauld and Philippe Maurine
2021/903 ( PDF )
Nowhere to Leak: Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting (Extended Version)
Alexandros Bakas and Antonis Michalas
2021/902 ( PDF )
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
Kalle Ngo and Elena Dubrova and Thomas Johansson
2021/901 ( PDF )
Resolvable Block Designs in Construction of Approximate Real MUBs that are Sparse
Ajeet Kumar and Subhamoy Maitra
2021/900 ( PDF )
ANS-based Compression and Encryption with 128-bit Security
Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk
2021/899 ( PDF )
Homomorphic decryption in blockchains via compressed discrete-log lookup tables
Panagiotis Chatzigiannis and Konstantinos Chalkias and Valeria Nikolaenko
2021/898 ( PDF )
On Extremal Expanding Algebraic Graphs and post-quantum secure delivery of passwords, encryption maps and tools for multivariate digital signatures.
Vasyl Ustimenko
2021/897 ( PDF )
A Rational Protocol Treatment of 51% Attacks
Christian Badertscher and Yun Lu and Vassilis Zikas
2021/896 ( PDF )
Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise"
Danilo Gligoroski
2021/895 ( PDF )
Targeted Lossy Functions and Applications
Willy Quach and Brent Waters and Daniel Wichs
2021/894 ( PDF )
History of Cryptographic Key Sizes
Nigel P. Smart and Emmanuel Thome
2021/893 ( PDF )
DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop
Alexander Heinrich and Matthias Hollick and Thomas Schneider and Milan Stute and Christian Weinert
2021/892 ( PDF )
Low-Latency Keccak at any Arbitrary Order
Sara Zarei and Aein Rezaei Shahmirzadi and Hadi Soleimany and Raziye Salarifard and Amir Moradi
2021/891 ( PDF )
White Box Traitor Tracing
Mark Zhandry
2021/890 ( PDF )
A Note on One-way Functions and Sparse Languages
Yanyi Liu and Rafael Pass
2021/889 ( PDF )
Counterexamples to New Circular Security Assumptions Underlying iO
Sam Hopkins and Aayush Jain and Huijia Lin
2021/888 ( PDF )
Lifting Standard Model Reductions to Common Setup Assumptions
Ngoc Khanh Nguyen and Eftychios Theodorakis and Bogdan Warinschi
2021/887 ( PDF )
Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions
Janaka Alawatugoda and Taechan Kim
2021/886 ( PDF )
Computational Records with Aging Hardware: Controlling Half the Output of SHA-256
Mellila Bouam and Charles Bouillaguet and Claire Delaplace and Camille Noűs
2021/885 ( PDF )
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications
Itai Dinur and Steven Goldfeder and Tzipora Halevi and Yuval Ishai and Mahimna Kelkar and Vivek Sharma and Greg Zaverucha
2021/884 ( PDF )
Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and Simulations
Elias Rohrer and Florian Tschorsch
2021/883 ( PDF )
Oblivious Key-Value Stores and Amplification for Private Set Intersection
Gayathri Garimella and Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai
2021/882 ( PDF )
Computational Hardness of Optimal FairComputation: Beyond Minicrypt
Hemanta K. Maji and Mingyuan Wang
2021/881 ( PDF )
Secure Code-Based Key Encapsulation Mechanism with Short Ciphertext and Secret Key
Jayashree Dey and Ratna Dutta
2021/880 ( PDF )
Towards Tight Random Probing Security
Gaëtan Cassiers and Sebastian Faust and Maximilian Orlt and François-Xavier Standaert
2021/879 ( PDF )
Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing
Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis
2021/878 ( PDF )
Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attacks
Yuan Yao and Pantea Kiaei and Richa Singh and Shahin Tajik and Patrick Schaumont
2021/877 ( PDF )
A Fully Anonymous e-Voting Protocol Employing Universal zk-SNARKs and Smart Contracts
Aritra Banerjee
2021/876 ( PDF )
Code Constructions and Bounds for Identification via Channels
Onur Gunlu and Joerg Kliewer and Rafael F. Schaefer and Vladimir Sidorenko
2021/875 ( PDF )
Hybrid Signal protocol for post-quantum email encryption
Sara Stadler and Vitor Sakaguti and Harjot Kaur and Anna Lena Fehlhaber
2021/874 ( PDF )
Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction
Bo-Yeon Sim and Aesun Park and Dong-Guk Han
2021/873 ( PDF )
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange
Yanqi Gu and Stanislaw Jarecki and Hugo Krawczyk
2021/872 ( PDF )
W-OTS(+) up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets
David Chaum and Mario Larangeira and Mario Yaksetig and William Carter
2021/871 ( PDF )
Traceable Secret Sharing and Applications
Vipul Goyal and Yifan Song and Akshayaram Srinivasan
2021/870 ( PDF )
SoK: Gröbner Basis Algorithms for Arithmetization Oriented Ciphers
Jan Ferdinand Sauer and Alan Szepieniec
2021/869 ( PDF )
MiniLedger: Compact-sized Anonymous and Auditable Distributed Payments
Panagiotis Chatzigiannis and Foteini Baldimtsi
2021/868 ( PDF )
Low-Latency Hardware Masking of PRINCE
Nicolai Müller and Thorben Moos and Amir Moradi
2021/867 ( PDF )
Key-Policy ABE with Delegation of Rights
Cécile Delerablée and Lénaďck Gouriou and David Pointcheval
2021/866 ( PDF )
The One-More Discrete Logarithm Assumption in the Generic Group Model
Balthazar Bauer and Georg Fuchsbauer and Antoine Plouviez
2021/865 ( PDF )
Quantum Key Search for Ternary LWE
Iggy van Hoof and Elena Kirshanova and Alexander May
2021/864 ( PDF )
A Fast and Simple Partially Oblivious PRF, with Applications
Nirvan Tyagi and Sofı́a Celi and Thomas Ristenpart and Nick Sullivan and Stefano Tessaro and Christopher A. Wood
2021/863 ( PDF )
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model
Shuai Han and Tibor Jager and Eike Kiltz and Shengli Liu and Jiaxin Pan and Doreen Riepel and Sven Schäge
2021/862 ( PDF )
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved
Yi Wang and Rongmao Chen and Guomin Yang and Xinyi Huang and Baosheng Wang and Moti Yung
2021/861 ( PDF )
Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors
Janaka Alawatugoda and Tatsuaki Okamoto
2021/860 ( PDF )
Verification of the security in Boolean masked circuits
Vahid Jahandideh
2021/859 ( PDF )
Concrete Evaluation of the Random Probing Security
Vahid Jahandideh
2021/858 ( PDF )
Full key recovery side-channel attack against ephemeral SIKE on the Cortex-M4
Aymeric Genęt and Natacha Linard de Guertechin and Novak Kaluđerović
2021/857 ( PDF )
Secure Computation for G-Module and its Applications
Qizhi Zhang and Bingsheng Zhang and Lichun Li and Shan Yin and Juanjuan Sun
2021/856 ( PDF )
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks
Xiaoyang Dong and Lingyue Qin and Siwei Sun and Xiaoyun Wang
2021/855 ( PDF )
Donner: UTXO-Based Virtual Channels Across Multiple Hops
Lukas Aumayr and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei
2021/854 ( PDF )
PQC: R-Propping of a Simple Oblivious Transfer
Pedro Hecht
2021/853 ( PDF )
Private Signaling
Varun Madathil and Alessandra Scafuro and István András Seres and Omer Shlomovits and Denis Varlakov
2021/852 ( PDF )
Improved Structured Encryption for SQL Databases via Hybrid Indexing
David Cash and Ruth Ng and Adam Rivkin
2021/851 ( PDF )
Multiple Candidates Coercion-Resistant Blockchain-Based E-Voting Protocol With Receipts
Riccardo Longo and Chiara Spadafora
2021/850 ( PDF )
Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack
Élise Tasso and Luca De Feo and Nadia El Mrabet and and Simon Pontié
2021/849 ( PDF )
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs
Rei Ueno and Keita Xagawa and Yutaro Tanaka and Akira Ito and Junko Takahashi and Naofumi Homma
2021/848 ( PDF )
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE
Shweta Agrawal and Monosij Maitra and Narasimha Sai Vempati and Shota Yamada
2021/847 ( PDF )
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption
Rachit Garg and Rishab Goyal and George Lu and Brent Waters
2021/846 ( PDF )
Ergo Hackathon: Crowdfunded Smart Contract Pools Research and Conceptualization
Bronson Brooks Richard and Gary Waugh
2021/845 ( PDF )
An Intermediate Secret-Guessing Attack on Hash-Based Signatures
Roland Booth and Yanhong Xu and Sabyasachi Karati and Reihaneh Safavi-Naini
2021/844 ( PDF )
A note on IND-qCCA security in the ROM and its applications
Loďs Huguenin-Dumittan and Serge Vaudenay
2021/843 ( PDF )
Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions
Brandon Broadnax and Jeremias Mechler and Jörn Müller-Quade
2021/842 ( PDF )
PCPs and Instance Compression from a Cryptographic Lens
Liron Bronfman and Ron D. Rothblum
2021/841 ( PDF )
MPC for $Q_2$ Access Structures over Rings and Fields
Robin Jadoul and Nigel P. Smart and Barry Van Leeuwen
2021/840 ( PDF )
Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates
Keita Xagawa and Akira Ito and Rei Ueno and Junko Takahashi and Naofumi Homma
2021/839 ( PDF )
Prudent Practices in Security Standardization
Feng Hao
2021/838 ( PDF )
Anonymous and Distributed Authentication for Peer-to-Peer Networks
Pasan Tennakoon and Supipi Karunathilaka and Rishikeshan Lavakumar and Janaka Alawatugoda
2021/837 ( PDF )
On McEliece type cryptosystems using self-dual codes with large minimum weight
Luca Mariot and Stjepan Picek and Radinka Yorgova
2021/836 ( PDF )
Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs
Xiao Liang and Omkant Pandey
2021/835 ( PDF )
Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy
Sen Yuan and Milan Shen and Ilya Mironov and Anderson C. A. Nascimento
2021/834 ( PDF )
Unconditional Communication-Efficient MPC via Hall's Marriage Theorem
Vipul Goyal and Antigoni Polychroniadou and Yifan Song
2021/833 ( PDF )
ATLAS: Efficient and Scalable MPC in the Honest Majority Setting
Vipul Goyal and Hanjun Li and Rafail Ostrovsky and Antigoni Polychroniadou and Yifan Song
2021/832 ( PDF )
On the Efficiency and Flexibility of Signature Verification
Cecilia Boschini and Dario Fiore and Elena Pagnin
2021/831 ( PDF )
Private Remote Sources for Secure Multi-Function Computation
Onur Gunlu and Matthieu Bloch and Rafael F. Schaefer
2021/830 ( PDF )
Analysis and Protection of the Two-metric Helper Data Scheme
Lars Tebelmann and Ulrich Kühne and Jean-Luc Danger and Michael Pehl
2021/829 ( PDF )
To Shift or Not to Shift: Understanding GEA-1
Christof Beierle and Patrick Felke and Gregor Leander
2021/828 ( PDF )
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung
Chitchanok Chuengsatiansup and Eyal Ronen and Gregory G. Rose and Yuval Yarom
2021/827 ( PDF )
TransNet: Shift Invariant Transformer Network for Power Attack
Suvadeep Hajra and Sayandeep Saha and Manaar Alam and Debdeep Mukhopadhyay
2021/826 ( PDF )
OpenSSLNTRU: Faster post-quantum TLS key exchange
Daniel J. Bernstein and Billy Bob Brumley and Ming-Shing Chen and Nicola Tuveri
2021/825 ( PDF )
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation
Hannah Keller and Helen Möllering and Thomas Schneider and Hossein Yalame
2021/824 ( PDF )
Security Characterization of J-PAKE and its Variants
Michel Abdalla and Manuel Barbosa and Peter B. Rřnne and Peter Y.A. Ryan and Petra Šala
2021/823 ( PDF )
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications
Daniel Günther and Maurice Heymann and Benny Pinkas and Thomas Schneider
2021/822 ( PDF )
One-out-of-$q$ OT Combiners
Oriol Farrŕs and Jordi Ribes-González
2021/821 ( PDF )
On the hardness of the NTRU problem
Alice Pellet-Mary and Damien Stehlé
2021/820 ( PDF )
Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent
Marek Broll and Federico Canale and Nicolas David and Antonio Florez-Gutierrez and Gregor Leander and María Naya-Plasencia and Yosuke Todo
2021/819 ( PDF )
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
Christof Beierle and Patrick Derbez and Gregor Leander and Gaëtan Leurent and Hĺvard Raddum and Yann Rotella and David Rupprecht and Lukas Stennes
2021/818 ( PDF )
CTng: Secure Certificate and Revocation Transparency
Hemi Leibowitz and Haitham Ghalwash and Ewa Syta and Amir Herzberg
2021/817 ( PDF )
Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace
Olivier Bronchain and Gaëtan Cassiers and François-Xavier Standaert
2021/816 ( PDF )
Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns
Alexandra Boldyreva and Tianxin Tang
2021/815 ( PDF )
Linear Cryptanalysis of FF3-1 and FEA
Tim Beyne
2021/814 ( PDF )
A New Way to Achieve Round-Efficient Byzantine Agreement
Matthias Fitzi and Chen-Da Liu-Zhang and Julian Loss
2021/813 ( PDF )
Intelligent Composed Algorithms
Frank Byszio and Dr. Klaus-Dieter Wirth and Dr. Kim Nguyen
2021/812 ( PDF )
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing
Elena Pagnin and Gunnar Gunnarsson and Pedram Talebi and Claudio Orlandi and Andrei Sabelfeld:
2021/811 ( PDF )
A General Purpose Transpiler for Fully Homomorphic Encryption
Shruthi Gorantala and Rob Springer and Sean Purser-Haskell and William Lam and Royce Wilson and Asra Ali and Eric P. Astor and Itai Zukerman and Sam Ruth and Christoph Dibak and Phillipp Schoppmann and Sasha Kulankhina and Alain Forget and David Marn and Cameron Tew and Rafael Misoczki and Bernat Guillen and Xinyu Ye and Dennis Kraft and Damien Desfontaines and Aishe Krishnamurthy and Miguel Guevara and Irippuge Milinda Perera and Yurii Sushko and Bryant Gipson
2021/810 ( PDF )
Efficient Asynchronous Byzantine Agreement without Private Setups
Yingzi Gao and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang
2021/809 ( PDF )
SoK: Efficient Privacy-preserving Clustering
Aditya Hegde and Helen Möllering and Thomas Schneider and Hossein Yalame
2021/808 ( PDF )
SNARGs for $\mathcal{P}$ from LWE
Arka Rai Choudhuri and Abhishek Jain and Zhengzhong Jin
2021/807 ( PDF )
Non-Interactive Batch Arguments for NP from Standard Assumptions
Arka Rai Choudhuri and Abhishek Jain and Zhengzhong Jin
2021/806 ( PDF )
Boosting the Security of Blind Signature Schemes
Jonathan Katz and Julian Loss and Michael Rosenberg
2021/805 ( PDF )
Practical Settlement Bounds for Proof-of-Work Blockchains
Peter Gaži and Ling Ren and Alexander Russell
2021/804 ( PDF )
A Note on ``Reduction Modulo $2^{448}-2^{224}-1$''
Timothy Shelton
2021/803 ( PDF )
On the Privacy of Protocols based on CPA-Secure Homomorphic Encryption
Adi Akavia and Margarita Vald
2021/802 ( PDF )
On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing
Divesh Aggarwal and Eldon Chung and Maciej Obremski and Joao Ribeiro
2021/801 ( PDF )
Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes
Mohammad Hassan Ameri and Alexander R. Block and Jeremiah Blocki
2021/800 ( PDF )
TEMP: Time-locked Encryption Made Practical
Leemon Baird and Pratyay Mukherjee and Rohit Sinha
2021/799 ( PDF )
Lattice Attacks on NTRU and LWE: A History of Refinements
Martin Albrecht and Léo Ducas
2021/798 ( PDF )
Probabilistic Dynamic Input Output Automata
Pierre Civit and Maria Potop-Butucaru
2021/797 ( PDF )
LLVM-based Circuit Compilation for Practical Secure Computation
Tim Heldmann and Thomas Schneider and Oleksandr Tkachenko and Christian Weinert and Hossein Yalame
2021/796 ( PDF )
How Byzantine is a Send Corruption?
Karim Eldefrawy and Julian Loss and Ben Terner
2021/795 ( PDF )
Transforming Secure Comparison Protocol from Passive to Active Adversary Model
Wei Jiang
2021/794 ( PDF )
Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor
Si Gao and Elisabeth Oswald and Dan Page
2021/793 ( PDF )
Property-Preserving Hash Functions from Standard Assumptions
Nils Fleischhacker and Kasper Green Larsen and Mark Simkin
2021/792 ( PDF )
Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation
Madhurima Mukhopadhyay and Palash Sarkar
2021/791 ( PDF )
Open Sesame: A Novel Non-SAT-Attack against CAS-Lock
Akashdeep Saha and Urbi Chatterjee and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty
2021/790 ( PDF )
A Side-Channel Assisted Attack on NTRU
Amund Askeland and Sondre Rřnjom
2021/789 ( PDF )
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection
Jongkil Kim and Seyit Camtepe and Joonsang Baek and Willy Susilo and Josef Pieprzyk and Surya Nepal
2021/788 ( PDF )
Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs
Yael Tauman Kalai and Vinod Vaikuntanathan and Rachel Yun Zhang
2021/787 ( PDF )
Mobile Voting -- Still Too Risky?
Sven Heiberg and Kristjan Krips and Jan Willemson
2021/786 ( PDF )
Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy
Yongjun Zhao and Huaxiong Wang and Kwok-Yan Lam
2021/785 ( PDF )
Lower bounds on lattice sieving and information set decoding
Elena Kirshanova and Thijs Laarhoven
2021/784 ( PDF )
Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols
Ignacio Fernández-Hernández and Tomer Ashur and Vincent Rijmen
2021/783 ( PDF )
Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network
Joon-Woo Lee and HyungChul Kang and Yongwoo Lee and Woosuk Choi and Jieun Eom and Maxim Deryabin and Eunsang Lee and Junghyun Lee and Donghoon Yoo and Young-Sik Kim and Jong-Seon No
2021/782 ( PDF )
On the deployment of FlyClient as a velvet fork: chain-sewing attacks and countermeasures
Tristan Nemoz and Alexei Zamyatin
2021/781 ( PDF )
Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices
Gustavo Banegas and Koen Zandberg and Adrian Herrmann and Emmanuel Baccelli and Benjamin Smith
2021/780 ( PDF )
Netlist Decompilation Workflow for Recovered Design Verification, Validation, and Assurance
Katie Liszewski and Tim McDonley and Josh Delozier and Andrew Elliott and Dylan Jones and Matt Sutter and Adam Kimura
2021/779 ( PDF )
More efficient post-quantum KEMTLS with pre-distributed public keys
Peter Schwabe and Douglas Stebila and Thom Wiggers
2021/778 ( PDF )
Efficient secret key reusing attribute-based encryption from lattices
Xinyuan Qian and Wenyuan Wu
2021/777 ( PDF )
Asynchronous Data Dissemination and its Applications
Sourav Das and Zhuolun Xiang and Ling Ren
2021/776 ( PDF )
SoK: Applying Blockchain Technology in Industrial Internet of Things
Gang Wang
2021/775 ( PDF )
Adaptively Secure Broadcast in Resource-Restricted Cryptography
Ran Cohen and Juan Garay and Vassilis Zikas
2021/774 ( PDF )
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model
Akinori Hosoyamada and Tetsu Iwata
2021/773 ( PDF )
HEX-BLOOM: An Alternative to the Merkle Tree
Ripon Patgiri
2021/772 ( PDF )
Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks
Emre Karabulut and Aydin Aysu
2021/771 ( PDF )
Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Jinhyun So and Ramy E. Ali and Basak Guler and Jiantao Jiao and Salman Avestimehr
2021/770 ( PDF )
Multi-key Private Matching for Compute
Prasad Buddhavarapu and Benjamin M Case and Logan Gore and Andrew Knox and Payman Mohassel and Shubho Sengupta and Erik Taubeneck and Min Xue
2021/769 ( PDF )
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
Jacqueline Brendel and Rune Fiedler and Felix Günther and Christian Janson and Douglas Stebila
2021/768 ( PDF )
Privacy-Preserving Decision Trees Training and Prediction
Adi Akavia and Max Leibovich and Yehezkel S. Resheff and Roey Ron and Moni Shahar and Margarita Vald
2021/767 ( PDF )
White-box Cryptography with Device Binding from Token-based Obfuscation and more
Shashank Agrawal and Estuardo Alpirez Bock and Yilei Chen and Gaven Watson
2021/766 ( PDF )
Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum
John Andrews and Michele Ciampi and Vassilis Zikas
2021/765 ( PDF )
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption
Ghous Amjad and Sarvar Patel and Giuseppe Persiano and Kevin Yeo and Moti Yung
2021/764 ( PDF )
Covert Learning: How to Learn with an Untrusted Intermediary
Ran Canetti and Ari Karchmer
2021/763 ( PDF )
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation
Mathy Vanhoef
2021/762 ( PDF )
A wide class of Boolean functions generalizing the hidden weight bit function
Claude Carlet
2021/761 ( PDF )
Parameterization of Boolean functions by vectorial functions and associated constructions
Claude Carlet
2021/760 ( PDF )
Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition
Saravanan Vijayakumaran
2021/759 ( PDF )
Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning
Wenting Zheng and Ryan Deng and Weikeng Chen and Raluca Ada Popa and Aurojit Panda and Ion Stoica
2021/758 ( PDF )
Quantum cryptography based on an algorithm for determining simultaneously all the mappings of a Boolean function
Koji Nagata and Renata Wong and Do Ngoc Diep and Tadao Nakamura
2021/757 ( PDF )
On the Dual of Generalized Bent Functions
Jiaxin Wang Fang-Wei Fu
2021/756 ( PDF )
A Novel Completeness Test and its Application to Side Channel Attacks and Simulators
Si Gao and Elisabeth Oswald
2021/755 ( PDF )
Tetrad: Actively Secure 4PC for Secure Training and Inference
Nishat Koti and Arpita Patra and Rahul Rachuri and Ajith Suresh
2021/754 ( PDF )
Privacy-Preserving Training of Tree Ensembles over Continuous Data
Samuel Adams and Chaitali Choudhary and Martine De Cock and Rafael Dowsley and David Melanson and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen
2021/753 ( PDF )
Anonymous Device Authorization for Cellular Networks
Abida Haque and Varun Madathil and Bradley Reaves and Alessandra Scafuro
2021/752 ( PDF )
Quantum Reduction of Finding Short Code Vectors to the Decoding Problem
Thomas Debris-Alazard and Maxime Remaud and Jean-Pierre Tillich
2021/751 ( PDF )
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
Martin Hell and Thomas Johansson and Alexander Maximov and Willi Meier and Hirotaka Yoshida
2021/750 ( PDF )
Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and $\mathbb{Z}_{2^k}$
Carsten Baum and Lennart Braun and Alexander Munch-Hansen and Peter Scholl
2021/749 ( PDF )
Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits
Mike Rosulek and Lawrence Roy
2021/748 ( PDF )
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss
Ke Wu and Gilad Asharov and Elaine Shi (random author ordering)
2021/747 ( PDF )
Elmo: Recursive Virtual Payment Channels for Bitcoin
Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos
2021/746 ( PDF )
What is All the FaaS About? - Remote Exploitation of FPGA-as-a-Service Platforms
Nitin Pundir and Fahim Rahman and Farimah Farahmandi and Mark Tehranipoor
2021/745 ( PDF )
Generic-Group Identity-Based Encryption: A Tight Impossibility Result
Gili Schul-Ganz and Gil Segev
2021/744 ( PDF )
Proofs of Isogeny Knowledge and Application to Post-quantum One-Time Verifiable Random Function
Antonin Leroux
2021/743 ( PDF )
Manta: a Plug and Play Private DeFi Stack
Shumo Chu and Yu Xia and Zhenfei Zhang
2021/742 ( PDF )
Conclave: A Collective Stake Pool Protocol
Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira
2021/741 ( PDF )
NTRU leads to Anonymous, Robust Public-Key Encryption
Keita Xagawa
2021/740 ( PDF )
The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application
Keita Xagawa
2021/739 ( PDF )
A New Framework for Garbled Circuits
Tomer Ashur and Efrat Cohen and Carmit Hazay and Avishay Yanai
2021/738 ( PDF )
On the Impossibility of Short Algebraic Signatures
Nico Döttling and Dominik Hartmann and Dennis Hofheinz and Eike Kiltz and Sven Schäge and Bogdan Ursu
2021/737 ( PDF )
GIFT-COFB is Tightly Birthday Secure with Encryption Queries
Akiko Inoue and Kazuhiko Minematsu
2021/736 ( PDF )
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation
Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Takahiro Matsuda and Ibuki Mishina and Hiraku Morita and Jacob C. N. Schuldt
2021/735 ( PDF )
Side-Channel Protections for Picnic Signatures
Diego F. Aranha and Sebastian Berndt and Thomas Eisenbarth and Okan Seker and Akira Takahashi and Luca Wilke and Greg Zaverucha
2021/734 ( PDF )
First-Order Hardware Sharings of the AES
Siemen Dhooghe and Svetla Nikova and Vincent Rijmen
2021/733 ( PDF )
GenoPPML – a framework for genomic privacy-preserving machine learning
Sergiu Carpov and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev
2021/732 ( PDF )
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems
Congming Wei and Chenhao Wu and Ximing Fu and Xiaoyang Dong and Kai He and Jue Hong and Xiaoyun Wang
2021/731 ( PDF )
Pasta: A Case for Hybrid Homomorphic Encryption
Christoph Dobraunig and Lorenzo Grassi and Lukas Helminger and Christian Rechberger and Markus Schofnegger and Roman Walch
2021/730 ( PDF )
Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning
Chenkai Weng and Kang Yang and Xiang Xie and Jonathan Katz and Xiao Wang
2021/729 ( PDF )
Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for TFHE
Ilaria Chillotti and Damien Ligier and Jean-Baptiste Orfila and Samuel Tap
2021/728 ( PDF )
Laconic Private Set Intersection and Applications
Navid Alamati and Pedro Branco and Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Sihang Pu
2021/727 ( PDF )
SoK: Privacy-Preserving Computing in the Blockchain Era
Ghada Almashaqbeh and Ravital Solomon
2021/726 ( PDF )
Asymmetric All-or-nothing Transforms
Navid Nasr Esfahani and Douglas R. Stinson
2021/725 ( PDF )
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
Felix Günther and Patrick Towa
2021/724 ( PDF )
Tri-op redactable blockchains with block modification, removal, and insertion
Mohammad Sadeq Dousti and Alptekin Küpçü
2021/723 ( PDF )
Cache attack on MISTY1
Haopeng Fan; Wenhao Wang; Yongjuan Wang; Wenyu Zhang; Qingjun Yuan
2021/722 ( PDF )
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption
Yusaku Maeda and Koji Nuida
2021/721 ( PDF )
Index Calculus Attacks on Hyperelliptic Jacobians with Effective Endomorphisms
Sulamithe Tsakou and Sorina Ionica
2021/720 ( PDF )
On Reverse Engineering Neural Network Implementation on GPU
Łukasz Chmielewski and Léo Weissbart
2021/719 ( PDF )
Conditional Differential-Neural Cryptanalysis
Zhenzhen Bao and Jian Guo and Meicheng Liu and Li Ma and Yi Tu
2021/718 ( PDF )
Generic Side-Channel Assisted Chosen-Ciphertext Attacks on Streamlined NTRU Prime
Prasanna Ravi and Martianus Frederic Ezerman and Shivam Bhasin and Anupam Chattopadhyay and Sujoy Sinha Roy
2021/717 ( PDF )
Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis
Lichao Wu and Yoo-Seung Won and Dirmanto Jap and Guilherme Perin and Shivam Bhasin and Stjepan Picek
2021/716 ( PDF )
SSE and SSD: Page-Efficient Searchable Symmetric Encryption
Angčle Bossuat and Raphael Bost and Pierre-Alain Fouque and Brice Minaud and Michael Reichle
2021/715 ( PDF )
Hours of Horus: Keyless Cryptocurrency Wallets
Dionysis Zindros
2021/714 ( PDF )
CARiMoL: A Configurable Hardware Accelerator for Ringand Module Lattice-Based Post-Quantum Cryptography
Afifa Ishtiaq and Dr. Muhammad Shafique and Dr. Osman Hassan
2021/713 ( PDF )
Public Key Encryption with Flexible Pattern Matching
Elie Bouscatié and Guilhem Castagnos and Olivier Sanders
2021/712 ( PDF )
DEFAULT: Cipher Level Resistance Against Differential Fault Attack
Anubhab Baksi and Shivam Bhasin and Jakub Breier and Mustafa Khairallah and Thomas Peyrin and Sumanta Sarkar and Siang Meng Sim
2021/711 ( PDF )
The Matrix Reloaded: Multiplication Strategies in FrodoKEM
Joppe W. Bos and Maximilian Ofner and Joost Renes and Tobias Schneider and Christine van Vredendaal
2021/710 ( PDF )
VCProof: Constructing Shorter and Faster-to-Verify zkSNARKs with Vector Oracles
Yuncong Zhang and Ren Zhang and Geng Wang and Dawu Gu
2021/709 ( PDF )
Bounded Collusion ABE for TMs from IBE
Rishab Goyal and Ridwan Syed and Brent Waters
2021/708 ( PDF )
Anonymous, Robust Post-Quantum Public Key Encryption
Paul Grubbs and Varun Maram and Kenneth G. Paterson
2021/707 ( PDF )
Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation
Gabrielle De Micheli and Pierrick Gaudry and Cécile Pierrot
2021/706 ( PDF )
Cryptanalysis of an oblivious PRF from supersingular isogenies
Andrea Basso and Péter Kutas and Simon-Philipp Merz and Christophe Petit and Antonio Sanso
2021/705 ( PDF )
Bridging Machine Learning and Cryptanalysis via EDLCT
Yi Chen and Hongbo Yu
2021/704 ( PDF )
IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status
Elli Androulaki and Ilie Circiumaru and Jesus Diaz Vico and Miguel Prada and Alessandro Sorniotti and Marc Stoecklin and Marko Vukolic and Marie Wallace
2021/703 ( PDF )
Quantum Multi-Collision Distinguishers
Zhenzhen Bao and Jian Guo and Shun Li and Phuong Pham
2021/702 ( PDF )
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
Colin Boyd and Gareth T. Davies and Bor de Kock and Kai Gellert and Tibor Jager and Lise Millerjord
2021/701 ( PDF )
Multidimentional ModDiv public key exchange protocol
Samir Bouftass
2021/700 ( PDF )
DeCSIDH: Delegating isogeny computations in the CSIDH setting
Robi Pedersen
2021/699 ( PDF )
Radical Isogenies on Montgomery Curves
Hiroshi Onuki and Tomoki Moriya
2021/698 ( PDF )
Multi-Dimensional Sub/Super-Range Signatures
Masahito Ishizaka and Shinsaku Kiyomoto
2021/697 ( PDF )
GoAT: File Geolocation via Anchor Timestamping
Deepak Maram and Iddo Bentov and Mahimna Kelkar and Ari Juels
2021/696 ( PDF )
The "quantum annoying" property of password-authenticated key exchange protocols
Edward Eaton and Douglas Stebila
2021/695 ( PDF )
Adaptively Secure Lattice-based Revocable IBE in the QROM: Compact Parameters, Tight Security, and Anonymity
Atsushi Takayasu
2021/694 ( PDF )
On Interactive Oracle Proofs for Boolean R1CS Statements
Ignacio Cascudo and Emanuele Giunta
2021/693 ( PDF )
Hardware Penetration Testing Knocks Your SoCs Off
Mark Fischer and Fabian Langer and Johannes Mono and Clemens Nasenberg and Nils Albartus
2021/692 ( PDF )
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
Christoph Dobraunig and Daniel Kales and Christian Rechberger and Markus Schofnegger and Greg Zaverucha
2021/691 ( PDF )
General Bootstrapping Approach for RLWE-based Homomorphic Encryption
Andrey Kim and Maxim Deryabin and Jieun Eom and Rakyong Choi and Yongwoo Lee and Whan Ghang and Donghoon Yoo
2021/690 ( PDF )
On Communication Models and Best-Achievable Security in Two-Round MPC
Aarushi Goel and Abhishek Jain and Manoj Prabhakaran and Rajeev Raghunath
2021/689 ( PDF )
OSHA: A General-purpose One-way Secure Hash Algorithm
Ripon Patgiri
2021/688 ( PDF )
Statistical ZAPs from Group-Based Assumptions
Geoffroy Couteau and Shuichi Katsumata and Elahe Sadeghi and Bogdan Ursu
2021/687 ( PDF )
Towards Understanding Practical Randomness Beyond Noise: Differential Privacy and Mixup
Hanshen Xiao and Srinivas Devadas
2021/686 ( PDF )
Meteor: Cryptographically Secure Steganography for Realistic Distributions
Gabriel Kaptchuk and Tushar M. Jois and Matthew Green and Aviel Rubin
2021/685 ( PDF )
Blind Side-Channel SIFA
Melissa Azouaoui and Kostas Papagiannopoulos and Dominik Zürner
2021/684 ( PDF )
Tight Setup Bounds for Identifiable Abort
Nicholas Brandt
2021/683 ( PDF )
S2Dedup: SGX-enabled Secure Deduplication
Tânia Esteves and Mariana Miranda and Joăo Paulo and Bernardo Portela
2021/682 ( PDF )
Batching Base Oblivious Transfers
Ian McQuoid and Mike Rosulek and Lawrence Roy
2021/681 ( PDF )
Learnability of Multiplexer PUF and $S_N$-PUF : A Fourier-based Approach
Durba Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
2021/680 ( PDF )
Efficient Attribute Based Encryption for Boolean Circuits
Alexandru Ionita
2021/679 ( PDF )
Permutation Based EDM: An Inverse Free BBB Secure PRF
Avijit Dutta and Mridul Nandi and Suprita Talnikar
2021/678 ( PDF )
Faster indifferentiable hashing to elliptic $\mathbb{F}_{\!q^2}$-curves
Dmitrii Koshelev
2021/677 ( PDF )
Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes
Paul Cotan and George Teseleanu
2021/676 ( PDF )
Extending the GLS endomorphism to speed up GHS Weil descent using Magma
Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez and Benjamin Smith
2021/675 ( PDF )
3-round Feistel is Not Superpseudorandom Over Any Group
Hector B. Hougaard
2021/674 ( PDF )
On the Effect of the Key-expansion Algorithm in Simon-like Ciphers
Jinyu Lu and Yunwen Liu and Tomer Ashur and and Chao Li
2021/673 ( PDF )
zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy
Tianyi Liu and Xiang Xie and Yupeng Zhang
2021/672 ( PDF )
PQC: R-Propping a Chaotic Cellular Automata
Pedro Hecht
2021/671 ( PDF )
Multi-Threshold Byzantine Fault Tolerance
Atsuki Momose and Ling Ren
2021/670 ( PDF )
AOT: Anonymization by Oblivious Transfer
Farid Javani and Alan T. Sherman
2021/669 ( PDF )
Pravuil: Global Consensus for a United World
David Cerezo Sánchez
2021/668 ( PDF )
Grover on SM3
Gyeongju Song and Kyungbae Jang and Hyunji Kim and Wai-Kong Lee and Zhi Hu and Hwajeong Seo
2021/667 ( PDF )
Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors
Hyeokdong Kwon and Hyunjun Kim and Siwoo Eum and Minjoo Sim and Hyunji Kim and Wai-Kong Lee and Zhi Hu and Hwajeong Seo
2021/666 ( PDF )
Secure cloud-of-clouds storage with space-efficient secret sharing
Ahad Niknia and Miguel Correia and Jaber Karimpour
2021/665 ( PDF )
On the algebraic immunity of direct sum constructions
Pierrick Méaux
2021/664 ( PDF )
A Trustless GQ Multi-Signature Scheme with Identifiable Abort
Handong Cui and Tsz Hon Yuen
2021/663 ( PDF )
On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note
Nils Albartus and Clemens Nasenberg and Florian Stolz and Marc Fyrbiak and Christof Paar and Russell Tessier
2021/662 ( PDF )
Verifying Post-Quantum Signatures in 8 kB of RAM
Ruben Gonzalez and Andreas Hülsing and Matthias J. Kannwischer and Juliane Krämer and Tanja Lange and Marc Stöttinger and Elisabeth Waitz and Thom Wiggers and Bo-Yin Yang
2021/661 ( PDF )
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
Ling Sun and Wei Wang and Meiqin Wang
2021/660 ( PDF )
A Permissionless Proof-of-Stake Blockchain with Best-Possible Unpredictability
Lei Fan and Jonathan Katz and Phuc Thai and Hong-Sheng Zhou
2021/659 ( PDF )
Technical report: CoPHEE: Co-processor forPartially Homomorphic Encrypted Execution
Mohammed Nabeel and Mohammed Ashraf and Eduardo Chielle and Nektarios G.Tsoutsos and Michail Maniatakos
2021/658 ( PDF )
A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem
Prastudy Fauzi and Martha Norberg Hovd and Hĺvard Raddum
2021/657 ( PDF )
Locally Reconstructable Non-malleable Secret Sharing
Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Jenit Tomy
2021/656 ( PDF )
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny
Lingyue Qin and Xiaoyang Dong and Xiaoyun Wang and Keting Jia and Yunwen Liu
2021/655 ( PDF )
On the Effect of Projection on Rank Attacks in Multivariate Cryptography
Morten Řygarden and Daniel Smith-Tone and Javier Verbel
2021/654 ( PDF )
Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
Carlo Brunetta and Georgia Tsaloli and Bei Liang and Gustavo Banegas and Aikaterini Mitrokotsa
2021/653 ( PDF )
Smooth Zero-Knowledge Hash Functions
Behzad Abdolmaleki and Hamidreza Khoshakhlagh and Helger Lipmaa
2021/652 ( PDF )
Detector+: An Approach for Detecting, Isolating, and Preventing Timing Attacks
Arsalan Javeed and Cemal Yilmaz and Erkay Savas
2021/651 ( PDF )
Leo: A Programming Language for Formally Verified, Zero-Knowledge Applications
Collin Chin and Howard Wu and Raymond Chu and Alessandro Coglio and Eric McCarthy and Eric Smith
2021/650 ( PDF )
Structured Leakage and Applications to Cryptographic Constant-Time and Cost
Gilles Barthe and Benjamin Gregoire and Vincent Laporte and Swarn Priya
2021/649 ( PDF )
On the Algebraic Immunity - Resiliency trade-off, implications for Goldreich's Pseudorandom Generator
Aurélien Dupin and Pierrick Méaux and Mélissa Rossi
2021/648 ( PDF )
Security of COFB against Chosen Ciphertext Attacks
Mustafa Khairallah
2021/647 ( PDF )
privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm
Ripon Patgiri
2021/646 ( PDF )
Optimization of Advanced Encryption Standard on Graphics Processing Units
Cihangir Tezcan
2021/645 ( PDF )
Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing
Alexander May and Floyd Zweydinger
2021/644 ( PDF )
Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings
Christopher Battarbee and Delaram Kahrobaei and Siamak F. Shahandashti
2021/643 ( PDF )
On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers
Muhammad ElSheikh and Amr M. Youssef
2021/642 ( PDF )
On the Cryptographic Deniability of the Signal Protocol
Nihal Vatandas and Rosario Gennaro and Bertrand Ithurburn and Hugo Krawczyk
2021/641 ( PDF )
Hydra: Succinct Fully Pipelineable Interactive Arguments of Knowledge
William Zhang and Yu Xia
2021/640 ( PDF )
Security and Trust in Open Source Security Tokens
Marc Schink and Alexander Wagner and Florian Unterstein and Johann Heyszl
2021/639 ( PDF )
Indifferentiable Signatures: High Performance and Fallback Security
Charalampos Papamanthou and Cong Zhang and Hong-Sheng Zhou
2021/638 ( PDF )
Efficient Constructions of Pairing Based Accumulators
Ioanna Karantaidou and Foteini Baldimtsi
2021/637 ( PDF )
Doubly-Affine Extractors, and their Applications
Yevgeniy Dodis and Kevin Yeo
2021/636 ( PDF )
Communication Complexity of Private simultaneous Quantum Messages Protocols
Akinori Kawachi and Harumichi Nishimura
2021/635 ( PDF )
symKrypt: A General-purpose and Lightweight Symmetric-Key Cryptography
Ripon Patgiri
2021/634 ( PDF )
Setting Up Efficient TFHE Parameters for Multivalue Plaintexts and Multiple Additions
Jakub Klemsa
2021/633 ( PDF )
CTIDH: faster constant-time CSIDH
Gustavo Banegas and Daniel J. Bernstein and Fabio Campos and Tung Chou and Tanja Lange and Michael Meyer and Benjamin Smith and Jana Sotáková
2021/632 ( PDF )
Internet Computer Consensus
Jan Camenisch and Manu Drijvers and Timo Hanke and Yvonne-Anne Pignolet and Victor Shoup and Dominic Williams
2021/631 ( PDF )
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges
Felix Engelmann and Lukas Müller and Andreas Peter and Frank Kargl and Christoph Bösch
2021/630 ( PDF )
Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings
Julien Devevey and Benoît Libert and Khoa Nguyen and Thomas Peters and Moti Yung
2021/629 ( PDF )
Bitcoin Privacy - A Survey on Mixing Techniques
Simin Ghesmati and Walid Fdhila and Edgar Weippl
2021/628 ( PDF )
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets
Joachim Neu and Ertem Nusret Tas and David Tse
2021/627 ( PDF )
Client-Auditable Verifiable Registries
Nirvan Tyagi and Ben Fisch and Joseph Bonneau and Stefano Tessaro
2021/626 ( PDF )
Help, my Signal has bad Device! Breaking the Signal Messenger’s Post-CompromiseSecurity through a Malicious Device
Jan Wichelmann and Sebastian Berndt and Claudius Pott and Thomas Eisenbarth
2021/625 ( PDF )
Plactic key agreement
Daniel R. L. Brown
2021/624 ( PDF )
Group Structure in Correlations and its Applications in Cryptography
Guru-Vamsi Policharla and Manoj Prabhakaran and Rajeev Raghunath and Parjanya Vyas
2021/623 ( PDF )
Mining in Logarithmic Space
Aggelos Kiayias and Nikos Leonardos and Dionysis Zindros
2021/622 ( PDF )
Stealth: A Highly Secured End-to-End Symmetric Communication Protocol
Ripon Patgiri
2021/621 ( PDF )
R-SWAP: Relay based atomic cross-chain swap protocol
Léonard Lys and Arthur Micoulet and Maria Potop-Butucaru
2021/620 ( PDF )
Algebraic attacks on block ciphers using quantum annealing
Elżbieta Burek and Michał Misztal and Michał Wroński
2021/619 ( PDF )
Polar Coding for Ring-LWE-Based Public Key Encryption
Jiabo Wang and Cong Ling
2021/618 ( PDF )
Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing
Sumit Kumar Debnath and Vikas Srivastava and Tapaswini Mohanty and Nibedita Kundu and Kouichi Sakurai
2021/617 ( PDF )
Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication
Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa
2021/616 ( PDF )
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable
Keitaro Hashimoto and Shuichi Katsumata and Kris Kwiatkowski and Thomas Prest
2021/615 ( PDF )
A Tutorial on Concurrent Zero Knowledge
Rafael Pass
2021/614 ( PDF )
Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit
Rafael Pass
2021/613 ( PDF )
Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE
Xiaojian Liang and Jian Weng and Anjia Yang and Lisha Yao and Zike Jiang and Zhenghao Wu
2021/612 ( PDF )
Privacy-preserving Density-based Clustering
Beyza Bozdemir and Sébastien Canard and Orhan Ermis and Helen Möllering and Melek Önen and Thomas Schneider
2021/611 ( PDF )
Some Applications of Hamming Weight Correlations
Fatih Balli and Andrea Caforio and Subhadeep Banik
2021/610 ( PDF )
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems
Alexander Nilsson and Irina E. Bocharova and Boris D. Kudryashov and Thomas Johansson
2021/609 ( PDF )
FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker
Michele Ciampi and Muhammad Ishaq and Malik Magdon-Ismail and Rafail Ostrovsky and Vassilis Zikas
2021/608 ( PDF )
Layering diverse cryptography to lower future secret attack risks: post-quantum estimates
Daniel R. L. Brown
2021/607 ( PDF )
Signed Diffie-Hellman Key Exchange with Tight Security
Jiaxin Pan and Chen Qian and Magnus Ringerud
2021/606 ( PDF )
ZK-PCPs from Leakage-Resilient Secret Sharing
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss
2021/605 ( PDF )
On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs
Benny Applebaum and Eyal Golombek
2021/604 ( PDF )
Masked Triples: Amortizing Multiplication Triples across Conditionals
David Heath and Vladimir Kolesnikov and Stanislav Peceny
2021/603 ( PDF )
Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults
Justin Kim and Vandan Mehta and Kartik Nayak and Nibesh Shrestha
2021/602 ( PDF )
Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak
Marten van Dijk and Deniz Gurevin and Chenglu Jin and Omer Khan and Phuong Ha Nguyen
2021/601 ( PDF )
The Art of Labeling: Task Augmentation for Private(Collaborative) Learning on Transformed Data
Hanshen Xiao and Srinivas Devadas
2021/600 ( PDF )
Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group
Christian Porter and Andrew Mendelsohn and Cong Ling
2021/599 ( PDF )
Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments
Shravan Srinivasan and Alex Chepurnoy and Charalampos Papamanthou and Alin Tomescu and Yupeng Zhang
2021/598 ( PDF )
Proof of Assets in the Diem Blockchain
Panagiotis Chatzigiannis and Konstantinos Chalkias
2021/597 ( PDF )
Accelerated RISC-V for Post-Quantum SIKE
Rami Elkhatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2021/596 ( PDF )
Mutual Accountability Layer: Accountable Anonymity within Accountable Trust
Vanesa Daza and Abida Haque and Alessandra Scafuro and Alexandros Zacharakis and Arantxa Zapico
2021/595 ( PDF )
Securing Parallel-chain Protocols under Variable Mining Power
Xuechao Wang and Viswa Virinchi Muppirala and Lei Yang and Sreeram Kannan and Pramod Viswanath
2021/594 ( PDF )
ZK Contingent Payments for Trained Neural Networks
Zhelei Zhou and Xinlei Cao and Jian Liu and Bingsheng Zhang and Kui Ren
2021/593 ( PDF )
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms
Shumo Chu and Danyang Zhuo and Elaine Shi and T-H. Hubert Chan (randomized author ordering)
2021/592 ( PDF )
Side Channel Analysis against the ANSSI’s protected AES implementation on ARM
Loďc Masure and Rémi Strullu
2021/591 ( PDF )
Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!
Jan Peter Drees and Pritha Gupta and Eyke Hüllermeier and Tibor Jager and Alexander Konze and Claudia Priesterjahn and Arunselvan Ramaswamy and Juraj Somorovsky
2021/590 ( PDF )
An Algebraic Framework for Universal and Updatable SNARKs
Carla Rŕfols and Arantxa Zapico
2021/589 ( PDF )
White-Box Encryption Scheme Using a Quantum Memory
Hidenori Kuwakado and Shoichi Hirose and Masahiro Mambo
2021/588 ( PDF )
A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose
Thomas Haines and Johannes Mueller
2021/587 ( PDF )
PrORAM: Fast $O(\log n)$ Private Coin ZK ORAM
David Heath and Vladimir Kolesnikov
2021/586 ( PDF )
A New Approach for finding Low-Weight Polynomial Multiples
Laila El Aimani
2021/585 ( PDF )
Exact Lattice Sampling from Non-Gaussian Distributions
Maxime Plançon and Thomas Prest
2021/584 ( PDF )
Effects of Quantization on the Multiple-Round Secret-Key Capacity
Onur Gunlu and Ueli Maurer and Joao Ribeiro
2021/583 ( PDF )
Entropoid-based cryptography is group exponentiation in disguise
Lorenz Panny
2021/582 ( PDF )
ethSTARK Documentation
StarkWare
2021/581 ( PDF )
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces
Abhrajit Sengupta and Nimisha Limaye and Ozgur Sinanoglu
2021/580 ( PDF )
Lightweight, Verifiable Function Secret Sharing and its Applications
Leo de Castro and Antigoni Polychroniadou
2021/579 ( PDF )
Quantum Key-length Extension
Joseph Jaeger and Fang Song and Stefano Tessaro
2021/578 ( PDF )
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)
Itai Dinur
2021/577 ( PDF )
Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks
Dionysis Zindros
2021/576 ( PDF )
Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares
Surya Addanki and Kevin Garbe and Eli Jaffe and Rafail Ostrovsky and Antigoni Polychroniadou
2021/575 ( PDF )
MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing
Zhenzhen Bao and Jian Guo and Danping Shi and Yi Tu
2021/574 ( PDF )
Constructing More Quadratic APN Functions with the QAM Method
Yuyin Yu and Leo Perrin
2021/573 ( PDF )
Compactness of Hashing Modes and Efficiency beyond Merkle Tree
Elena Andreeva and Rishiraj Bhattacharyya and Arnab Roy
2021/572 ( PDF )
Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE
Charanjit Singh Jutla and Nathan Manohar
2021/571 ( PDF )
Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond
Thomas Attema and Nicole Gervasoni and Michiel Marcus and Gabriele Spini
2021/570 ( PDF )
Lattice sieving via quantum random walks
André Chailloux and Johanna Loyer
2021/569 ( PDF )
Automated Generation of Masked Hardware
David Knichel and Amir Moradi and Nicolai Müller and Pascal Sasdrich
2021/568 ( PDF )
ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems
Gaurav Panwar and Roopa Vishwanathan and Satyajayant Misra
2021/567 ( PDF )
Forward-secure Multi-user Aggregate Signatures based on zk-SNARKs
Jeonghyuk Lee and Jihye Kim and Hyunok Oh
2021/566 ( PDF )
From Random Oracles to Ideal Signatures, and Back
Cong Zhang and Hong-Sheng Zhou
2021/565 ( PDF )
The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving
Cyprien Delpech de Saint Guilhem and Eleftheria Makri and Dragos Rotaru and Titouan Tanguy
2021/564 ( PDF )
SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions
Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
2021/563 ( PDF )
High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography
Mojtaba Bisheh-Niasar and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2021/562 ( PDF )
A fusion algorithm for solving the hidden shift problem in finite abelian groups
Wouter Castryck and Ann Dooms and Carlo Emerencia and Alexander Lemmens
2021/561 ( PDF )
Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors
Pakize Sanal and Emrah Karagoz and Hwajeong Seo and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2021/560 ( PDF )
MOBS (Matrices Over Bit Strings) public key exchange
Nael Rahman and Vladimir Shpilrain
2021/559 ( PDF )
A Fresh Approach to Updatable Symmetric Encryption
Andrés Fabrega and Ueli Maurer and Marta Mularczyk
2021/558 ( PDF )
Verifiable Decryption in the Head
Kristian Gjřsteen and Thomas Haines and Johannes Müller and Peter Rřnne and Tjerand Silde
2021/557 ( PDF )
Dual lattice attacks for closest vector problems (with preprocessing)
Thijs Laarhoven and Michael Walter
2021/556 ( PDF )
Interactive Physical ZKP for Connectivity:Applications to Nurikabe and Hitori
Leo Robert and Daiki Miyahara and Pascal Lafourcade and Takaaki Mizuk
2021/555 ( PDF )
Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited
Nils Wisiol and Khalid T. Mursi and Jean-Pierre Seifert and Yu Zhuang
2021/554 ( PDF )
Grover on Caesar and Vigenčre Ciphers
Gyeongju Song and Kyungbae Jang and Hyunji Kim and Wai-Kong Lee and Hwajeong Seo
2021/553 ( PDF )
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild
Daniel De Almeida Braga and Pierre-Alain Fouque and Mohamed Sabt
2021/552 ( PDF )
Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric
André Chailloux and Thomas Debris-Alazard and Simona Etinski
2021/551 ( PDF )
Efficient Sorting of Homomorphic Encrypted Data with $k$-way Sorting Network
Seungwan Hong and Seunghong Kim and Jiheon Choi and Younho Lee and Jung Hee Cheon
2021/550 ( PDF )
Quadratic almost bent functions - their partial characterization and design in the spectral domain
Amar Bapić and Samir Hodžić and Enes Pasalic
2021/549 ( PDF )
High-assurance field inversion for curve-based cryptography
Benjamin Salling Hvass and Diego F. Aranha and Bas Spitters
2021/548 ( PDF )
Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper)
Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal
2021/547 ( PDF )
Cube Attack against 843-Round Trivium
Yao Sun
2021/546 ( PDF )
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V and SNOW-Vi
Jin Hoki and Takanori Isobe and Ryoma Ito and Fukang Liu and Kosei Sakamoto
2021/545 ( PDF )
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
Muhammed F. Esgin and Ron Steinfeld and Raymond K. Zhao
2021/544 ( PDF )
Improved guess-and-determine and distinguishing attacks on SNOW-V
Jing Yang and Thomas Johansson and Alexander Maximov
2021/543 ( PDF )
The Case for SIKE: A Decade of the Supersingular Isogeny Problem
Craig Costello
2021/542 ( PDF )
Symetric encryption algorithms based on the mathematical structure underlying the three body problem
Samir Bouftass.
2021/541 ( PDF )
Hardware Deployment of Hybrid PQC
Reza Azarderakhsh and Rami El Khatib and Brian Koziel and Brandon Langenberg
2021/540 ( PDF )
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
Geoffroy Couteau and Michael Klooß and Huang Lin and Michael Reichle
2021/539 ( PDF )
More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions
Atsushi Takayasu
2021/538 ( PDF )
A Composable Look at Updatable Encryption
Françoise Levy-dit-Vehel and Maxime Roméas
2021/537 ( PDF )
SoK: Exploring Blockchains Interoperability
Gang Wang
2021/536 ( PDF )
Analyzing the Potential of Transport Triggered Architecture for Lattice-based Cryptography Algorithms
Latif AKÇAY and Berna ÖRS
2021/535 ( PDF )
On the Possibility of Basing Cryptography on $\EXP \neq \BPP$
Yanyi Liu and Rafael Pass
2021/534 ( PDF )
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
Maura B. Paterson and Douglas R. Stinson
2021/533 ( PDF )
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU
Sijun Tan and Brian Knott and Yuan Tian and David J. Wu
2021/532 ( PDF )
Rainbow on Cortex-M4
Tung Chou and Matthias J. Kannwischer and Bo-Yin Yang
2021/531 ( PDF )
LogStack: Stacked Garbling with $O(b \log b)$ Computation
David Heath and Vladimir Kolesnikov
2021/530 ( PDF )
Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level
Yuan Yao and Tuna Tufan and Tarun Kathuria and Baris Ege and Ulkuhan Guler and Patrick Schaumont
2021/529 ( PDF )
SnarkPack: Practical SNARK Aggregation
Nicolas Gailly and Mary Maller and Anca Nitulescu
2021/528 ( PDF )
Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping
Denis Firsov and Henri Lakk and Ahto Truu
2021/527 ( PDF )
Solving discrete logarithm problem over prime fields using quantum annealing and $\frac{n^3}{2}$ logical qubits
Michał Wroński
2021/526 ( PDF )
Reinforcement Learning-based Design of Side-channel Countermeasures
Jorai Rijsdijk and Lichao Wu and Guilherme Perin and Stjepan Picek
2021/525 ( PDF )
On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis
Lichao Wu and Guilherme Perin
2021/524 ( PDF )
Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency
Kwangsu Lee
2021/523 ( PDF )
No Time to Hash: On Superefficient Entropy Accumulation
Yevgeniy Dodis and Siyao Guo and Noah Stephens-Davidowitz and Zhiye Xie
2021/522 ( PDF )
Public-key Cryptosystems and Signature Schemes from p-adic Lattices
Yingpu Deng and Lixia Luo and Yanbin Pan and Zhaonan Wang and Guanju Xiao
2021/521 ( PDF )
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation
Daniel Demmler and Stefan Katzenbeisser and Thomas Schneider and Tom Schuster and Christian Weinert
2021/520 ( PDF )
Optimal Randomized Partial Checking for Decryption Mix Nets
Thomas Haines and Johannes Mueller
2021/519 ( PDF )
Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment
Atakan Arslan and Muhammed Ali Bingöl
2021/518 ( PDF )
How to Share and Own a Secret
Victor Ermolaev and Gamze Tillem
2021/517 ( PDF )
Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity
Yanyi Liu and Rafael Pass
2021/516 ( PDF )
A new weak curve fault attack on ECIES: embedded point validation is not enough during decryption
Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Xi and Yuhang Wang
2021/515 ( PDF )
Generic Constructions of Revocable Hierarchical Identity-based Encryption
Keita Emura and Atsushi Takayasu and Yohei Watanabe
2021/514 ( PDF )
Non-Interactive Zero Knowledge from Sub-exponential DDH
Abhishek Jain and Zhengzhong Jin
2021/513 ( PDF )
On One-way Functions from NP-Complete Problems
Yanyi Liu and Rafael Pass
2021/512 ( PDF )
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
Tapas Pal and Ratna Dutta
2021/511 ( PDF )
On Simulation-Extractability of Universal zkSNARKs
Markulf Kohlweiss and Michał Zając
2021/510 ( PDF )
Signer and Message Ambiguity from a Variety of Keys
George Teseleanu
2021/509 ( PDF )
On using the same key pair for Ed25519 and an X25519 based KEM
Erik Thormarker
2021/508 ( PDF )
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs
Wonkyung Jung and Sangpyo Kim and Jung Ho Ahn and Jung Hee Cheon and Younho Lee
2021/507 ( PDF )
The t-wise Independence of Substitution-Permutation Networks
Tianren Liu and Stefano Tessaro and Vinod Vaikuntanathan
2021/506 ( PDF )
Delegating Supersingular Isogenies over $\mathbb{F}_{p^2}$ with Cryptographic Applications
Robi Pedersen and Osmanbey Uzunkol
2021/505 ( PDF )
Cryptanalysis of Boyen’s Attribute-Based Encryption Scheme in TCC 2013
Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada
2021/504 ( PDF )
A Generic Method for Investigating Nonsingular Galois NFSRs
Xiao-Juan Wang and Tian Tian and Wen-Feng Qi
2021/503 ( PDF )
Almost-Asynchronous MPC under Honest Majority, Revisited
Matthieu Rambaud and Antoine Urban
2021/502 ( PDF )
A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
Kwangsu Lee and Joon Sik Kim
2021/501 ( PDF )
zkHawk: Practical Private Smart Contracts from MPC-based Hawk
Aritra Banerjee and Michael Clear and Hitesh Tewari
2021/500 ( PDF )
Order-C Secure Multiparty Computation for Highly Repetitive Circuits
Gabrielle Beck and Aarushi Goel and Abhishek Jain and Gabriel Kaptchuk
2021/499 ( PDF )
Optimizing Registration Based Encryption
Kelong Cong and Karim Eldefrawy and Nigel P. Smart
2021/498 ( PDF )
SoK: Multi-Device Secure Instant Messaging
Antonio Dimeo and Felix Gohla and Daniel Goßen and Niko Lockenvitz
2021/497 ( PDF )
SoK: Design Tools for Side-Channel-Aware Implementations
Ileana Buhan and Lejla Batina and Yuval Yarom and Patrick Schaumont
2021/496 ( PDF )
Applications of SKREM-like symmetric key ciphers
Mircea Digulescu
2021/495 ( PDF )
Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One-Way Functions
Mircea Digulescu
2021/494 ( PDF )
Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures.
Surbhi Shaw and Ratna Dutta
2021/493 ( PDF )
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4
Ming-Shing Chen and Tung Chou and Markus Krausz
2021/492 ( PDF )
Classic McEliece on the ARM Cortex-M4
Ming-Shing Chen and Tung Chou
2021/491 ( PDF )
A toolbox for verifiable tally-hiding e-voting systems
Véronique Cortier and Pierrick Gaudry and Quentin Yang
2021/490 ( PDF )
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE
Chao Liu and Anyu Wang and Zhongxiang Zheng
2021/489 ( PDF )
ROSE: Robust Searchable Encryption with Forward and Backward Security and Practical Performance
Peng Xu and Willy Susilo and Wei Wang and Tianyang Chen and Qianhong Wu and Hai Jin
2021/488 ( PDF )
Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle
Javier Herranz and Ramiro Martínez and Manuel Sánchez
2021/487 ( PDF )
Xifrat Cryptanalysis - Compute the Mixing Function Without the Key
"Danny" Niu Jianfang
2021/486 ( PDF )
Security Analysis of End-to-End Encryption for Zoom Meetings
Takanori Isobe and Ryoma Ito
2021/485 ( PDF )
A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme
Ferhat Yaman and Ahmet Can Mert and Erdinç Öztürk and Erkay Savaş
2021/484 ( PDF )
Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF
Alireza Kavousi and Javad Mohajeri and Mahmoud Salmasizadeh
2021/483 ( PDF )
Masking Kyber: First- and Higher-Order Implementations
Joppe W. Bos and Marc Gourjon and Joost Renes and Tobias Schneider and Christine van Vredendaal
2021/482 ( PDF )
Inconsistency of Simulation and Practice in Delay-based Strong PUFs
Anita Aghaie and Amir Moradi
2021/481 ( PDF )
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Alexander Heinrich and Matthias Hollick and Thomas Schneider and Milan Stute and Christian Weinert
2021/480 ( PDF )
Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform
Jakub Klemsa
2021/479 ( PDF )
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Tim Fritzmann and Michiel Van Beirendonck and Debapriya Basu Roy and Patrick Karl and Thomas Schamberger and Ingrid Verbauwhede and Georg Sigl
2021/478 ( PDF )
TurboIKOS: Improved Non-interactive Zero Knowledge and Post-Quantum Signatures
Yaron Gvili and Julie Ha and Sarah Scheffler and Mayank Varia and Ziling Yang and Xinyuan Zhang
2021/477 ( PDF )
Exploiting ROLLO's Constant-Time Implementations with a Single-Trace Analysis
Agathe Cheriere and Lina Mortajine and Tania Richmond and Nadia El Mrabet
2021/476 ( PDF )
Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions
Aaqib Bashir Dar and Mashhood Jeelani Lone and Nuzhat Hussain
2021/475 ( PDF )
Private Liquidity Matching using MPC
Shahla Atapoor and Nigel P. Smart and Younes Talibi Alaoui
2021/474 ( PDF )
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations
Fukang Liu and Santanu Sarkar and Willi Meier and Takanori Isobe
2021/473 ( PDF )
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations
Ryan Karl and Jonathan Takeshita and Alamin Mohammed and Aaron Striegel and and Taeho Jung
2021/472 ( PDF )
CryptoGram: Fast Private Calculations of Histograms over Multiple Users’ Inputs
Ryan Karl and Jonathan Takeshita and Alamin Mohammed and Aaron Striegel and Taeho Jung
2021/471 ( PDF )
Size, Speed, and Security: An Ed25519 Case Study
Cesar Pereida García and Sampo Sovio
2021/470 ( PDF )
Upslices, Downslices, and Secret-Sharing with Complexity of $1.5^n$
Benny Applebaum and Oded Nir
2021/469 ( PDF )
Entropoid Based Cryptography
Danilo Gligoroski
2021/468 ( PDF )
Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report)
Coşku Acay and Rolph Recto and Joshua Gancher and Andrew C. Myers and Elaine Shi
2021/467 ( PDF )
Key-schedule Security for the TLS 1.3 Standard
Chris Brzuska and Antoine Delignat-Lavaud and Christoph Egger and Cédric Fournet and Konrad Kohbrok and Markulf Kohlweiss
2021/466 ( -- withdrawn -- )
A New Key Agreement Scheme Based On A Well-Known Property Of Powers
Michele Fabbrini
2021/465 ( PDF )
Cryptanalysis of `MAKE'
Daniel Brown and Neal Koblitz and Jason LeGrow
2021/464 ( PDF )
iTimed: Cache Attacks on the Apple A10 Fusion SoC
Gregor Haas and Seetal Potluri and Aydin Aysu
2021/463 ( PDF )
Improving Recent Side-Channel Attacks Against the DES Key Schedule
Andreas Wiemers and Johannes Mittmann
2021/462 ( PDF )
SoK: How (not) to Design and Implement Post-Quantum Cryptography
James Howe and Thomas Prest and Daniel Apon
2021/461 ( PDF )
Second-Order SCA Security with almost no Fresh Randomness
Aein Rezaei Shahmirzadi and Amir Moradi
2021/460 ( PDF )
Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
Oleksiy Lisovets and David Knichel and Thorben Moos and Amir Moradi
2021/459 ( PDF )
SIRNN: A Math Library for Secure RNN Inference
Deevashwer Rathee and Mayank Rathee and Rahul Kranti Kiran Goli and Divya Gupta and Rahul Sharma and Nishanth Chandran and Aseem Rastogi
2021/458 ( PDF )
FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm
Gideon Samid
2021/457 ( PDF )
Non-Interactive Composition of Sigma-Protocols via Share-then-Hash
Masayuki Abe and Miguel Ambrona and Andrej Bogdanov and Miyako Ohkubo and Alon Rosen
2021/456 ( PDF )
Hardening Circuit-Design IP Against Reverse-Engineering Attacks
Animesh Chhotaray and Thomas Shrimpton
2021/455 ( PDF )
Guessing Bits: Improved Lattice Attacks on (EC)DSA
Chao Sun and Thomas Espitau and Mehdi Tibouchi and Masayuki Abe
2021/454 ( PDF )
Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security
Veronika Kuchta and Amin Sakzad and Damien Stehle and Ron Steinfeld and Shi-Feng Sun
2021/453 ( PDF )
Merkle^2: A Low-Latency Transparency Log System
Yuncong Hu and Kian Hooshmand and Harika Kalidhindi and Seung Jin Yang and Raluca Ada Popa
2021/452 ( PDF )
SAT-based Method to Improve Neural Distinguisher and Applications to SIMON
Zezhou Hou and Jiongjiong Ren and Shaozhen Chen
2021/451 ( PDF )
RepShard: Reputation-based Sharding Scheme Achieves Linearly Scaling Efficiency and Security Simultaneously
Gang Wang
2021/450 ( PDF )
RandChain: Practical Scalable Decentralized Randomness Attested by Blockchain
Gang Wang and Mark Nixon
2021/449 ( PDF )
Towards Cloud-assisted Industrial IoT Platform for Large-scale Continuous Condition Monitoring
Gang Wang and Mark Nixon and Mike Boudreaux
2021/448 ( PDF )
On the Memory-Tightness of Hashed ElGamal
Ashrujit Ghoshal and Stefano Tessaro
2021/447 ( PDF )
An Intimate Analysis of Cuckoo Hashing with a Stash
Daniel Noble
2021/446 ( PDF )
Towards practical GGM-based PRF from (Module-)Learning-with-Rounding
Chitchanok Chuengsatiansup and Damien Stehle
2021/445 ( PDF )
A Survey on Perfectly-Secure Verifiable Secret-Sharing
Anirudh C and Ashish Choudhury and Arpita Patra
2021/444 ( PDF )
Xifrat - Compact Public-Key Cryptosystems based on Quasigroups
Daniel Nager and "Danny" Niu Jianfang
2021/443 ( PDF )
Constructing a pairing-free certificateless proxy signature scheme from ECDSA
Cholun Kim
2021/442 ( PDF )
How to Backdoor a Cipher
Raluca Posteuca and Tomer Ashur
2021/441 ( PDF )
Watermarking PRFs from Lattices: Public Extract and Collusion Resistant
Yukun Wang and Mingqiang Wang
2021/440 ( PDF )
Two modifications for Loidreau's code-based cryptosystem
Wenshuo Guo and Fangwei Fu
2021/439 ( PDF )
Recovering the Key from the Internal State of Grain-128AEAD
Donghoon Chang and Meltem Sonmez Turan
2021/438 ( PDF )
More Efficient Shuffle Argument from Unique Factorization
Toomas Krips and Helger Lipmaa
2021/437 ( PDF )
Formal security analysis of MPC-in-the-head zero-knowledge protocols
Nikolaj Sidorenco and Sabine Oechsner and Bas Spitters
2021/436 ( PDF )
Algebraic Differential Fault Analysis on SIMON block cipher
Duc-Phong Le and Sze Ling Yeo and Khoongming Khoo
2021/435 ( PDF )
Non-Interactive Anonymous Router
Elaine Shi and Ke Wu
2021/434 ( PDF )
On the Power of Expansion: More Efficient Constructions in the Random Probing Model
Sonia Belaďd and Matthieu Rivain and Abdul Rahman Taleb
2021/433 ( PDF )
Formations for the Quantum Random Oracle
Aaram Yun
2021/432 ( PDF )
XORBoost: Tree Boosting in the Multiparty Computation Setting
Kevin Deforth and Marc Desgroseilliers and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev and Marius Vuille
2021/431 ( PDF )
Unbounded Multi-Party Computation from Learning with Errors
Prabhanjan Ananth and Abhishek Jain and Zhengzhong Jin and Giulio Malavolta
2021/430 ( PDF )
Lattice Enumeration on GPUs for fplll
Simon Pohmann and Marc Stevens and Jens Zumbrägel
2021/429 ( PDF )
New Practical Multivariate Signatures from a Nonlinear Modifier
Daniel Smith-Tone
2021/428 ( PDF )
A Coq proof of the correctness of X25519 in TweetNaCl
Peter Schwabe and Benoît Viguier and Timmy Weerwag and Freek Wiedijk
2021/427 ( PDF )
Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks
Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu
2021/426 ( PDF )
Generic Plaintext Equality and Inequality Proofs (Extended Version)
Olivier Blazy and Xavier Bultel and Pascal Lafourcade and Octavio Perez Kempner
2021/425 ( PDF )
Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions
Yuqing Zhao and Wenqi Yu and Chun Guo
2021/424 ( PDF )
Security Analysis of SFrame
Takanori Isobe and Ryoma Ito and Kazuhiko Minematsu
2021/423 ( PDF )
On effective computations in special subsemigroups of polynomial transformations and protocol based multivariate cryptosystems
Vasyl Ustimenko
2021/422 ( PDF )
Stacking Sigmas: A Framework to Compose $\Sigma$-Protocols for Disjunctions
Aarushi Goel and Matthew Green and Mathias Hall-Andersen and Gabriel Kaptchuk
2021/421 ( PDF )
Indistinguishability Obfuscation of Null Quantum Circuits and Applications
James Bartusek and Giulio Malavolta
2021/420 ( PDF )
Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52
Fabian Boemer and Sejun Kim and Gelila Seifu and Fillipe D.M. de Souza and Vinodh Gopal
2021/419 ( -- withdrawn -- )
On The Dihedral Coset Problem
Javad Doliskani
2021/418 ( PDF )
Ring-LWE over two-to-power cyclotomics is not hard
Hao Chen
2021/417 ( PDF )
History Binding Signature
Shlomi Dolev and Matan Liber
2021/416 ( PDF )
Cryptocurrencies with Security Policies and Two-Factor Authentication
Florian Breuer and Vipul Goyal and Giulio Malavolta
2021/415 ( PDF )
Efficient Verification of Optimized Code: Correct High-speed X25519
Marc Schoolderman and Jonathan Moerman and Sjaak Smetsers and Marko van Eekelen
2021/414 ( PDF )
Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings
Sook Yan Hue and Jason Chia and Ji-Jian Chin
2021/413 ( PDF )
Blind Polynomial Evaluation and Data Trading
Yi Liu and Qi Wang and Siu-Ming Yiu
2021/412 ( PDF )
Uncloneable Encryption, Revisited
Prabhanjan Ananth and Fatih Kaleoglu
2021/411 ( PDF )
Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions
Onur Gunlu and Peter Trifonov and Muah Kim and Rafael F. Schaefer and Vladimir Sidorenko
2021/410 ( PDF )
Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM
Shlomi Dolev and Stav Doolman
2021/409 ( PDF )
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols
Markulf Kohlweiss and Varun Madathil and Kartik Nayak and Alessandra Scafuro
2021/408 ( PDF )
Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding
Christian Majenz and Christian Schaffner and Mehrdad Tahmasbi
2021/407 ( PDF )
Improved Quantum Algorithms for the k-XOR Problem
André Schrottenloher
2021/406 ( PDF )
Disappearing Cryptography in the Bounded Storage Model
Jiaxin Guan and Mark Zhandry
2021/405 ( PDF )
Revisiting some results on APN and algebraic immune functions
Claude Carlet
2021/404 ( PDF )
Chain Reductions for Multi-Signatures
Mihir Bellare and Wei Dai
2021/403 ( PDF )
Atom: A Stream Cipher with Double Key Filter
Subhadeep Banik and Andrea Caforio and Takanori Isobe and Fukang Liu and Willi Meier and Kosei Sakamoto and Santanu Sarkar
2021/402 ( PDF )
Leakage Resilient Value Comparison With Application to Message Authentication
Christoph Dobraunig and Bart Mennink
2021/401 ( PDF )
Output Prediction Attacks on Block Ciphers using Deep Learning
Hayato Kimura and Keita Emura and Takanori Isobe and Ryoma Ito and Kazuto Ogawa and Toshihiro Ohigashi
2021/400 ( PDF )
Size of IK00 Branching Program
Yupu Hu and Xingting Dong and Baocang Wang
2021/399 ( PDF )
Latus Incentive Scheme: Enabling Decentralization in Blockchains based on Recursive SNARKs
Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov
2021/398 ( PDF )
Cryptanalysis of the Binary Permuted Kernel Problem
Thales Bandiera Paiva and Routo Terada
2021/397 ( PDF )
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq
Carmine Abate and Philipp G. Haselwarter and Exequiel Rivas and Antoine Van Muylder and Théo Winterhalter and Catalin Hritcu and Kenji Maillard and Bas Spitters
2021/396 ( PDF )
LESS-FM: Fine-tuning Signatures from the Code Equivalence Problem
Alessandro Barenghi and Jean-Francois Biasse and Edoardo Persichetti and Paolo Santini
2021/395 ( PDF )
On the Validity of Spoofing Attack Against Safe is the New Smart
Harishma Boyapally and Urbi Chatterjee and Debdeep Mukhopadhyay
2021/394 ( PDF )
Quantum Encryption with Certified Deletion: Public Key and Attribute-Based
Ryo Nishimaki and Takashi Yamakawa
2021/393 ( PDF )
Key Agreement with Correlated Noise and Multiple Entities or Enrollments
Onur Gunlu
2021/392 ( PDF )
How Private Are Commonly-Used Voting Rules?
Ao Liu and Yun Lu and Lirong Xia and Vassilis Zikas
2021/391 ( PDF )
New Standards for E-Voting Systems: Reflections on Source Code Examinations
Thomas Haines and Peter Roenne
2021/390 ( PDF )
Orthros: A Low-Latency PRF
Subhadeep Banik and Takanori Isobe and Fukang Liu and Kazuhiko Minematsu and Kosei Sakamoto
2021/389 ( PDF )
Physically Related Functions: A New Paradigm for Light-weight Key-Exchange
Durba Chatterjee and Harishma Boyapally and Sikhar Patranabis and Urbi Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
2021/388 ( PDF )
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball and Elette Boyle and Ran Cohen and Lisa Kohl and Tal Malkin and Pierre Meyer and Tal Moran
2021/387 ( PDF )
Quantum-access security of the Winternitz one-time signature scheme
Christian Majenz and Chanelle Matadah Manfouo and Maris Ozols
2021/386 ( PDF )
SAFELearn: Secure Aggregation for private FEderated Learning
Hossein Fereidooni and Samuel Marchal and Markus Miettinen and Azalia Mirhoseini and Helen Möllering and Thien Duc Nguyen and Phillip Rieger and Ahmad Reza Sadeghi and Thomas Schneider and Hossein Yalame and Shaza Zeitouni
2021/385 ( PDF )
Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices
Yasufumi Hashimoto
2021/384 ( PDF )
Analysis and Probing of Parallel Channels in the Lightning Network
Alex Biryukov and Gleb Naumenko and Sergei Tikhomirov
2021/383 ( PDF )
GLV+HWCD for 2y^2=x^3+x/GF(8^91+5)
Daniel R. L. Brown
2021/382 ( PDF )
Signatures with Tight Multi-User Security from Search Assumptions
Jiaxin Pan and Magnus Ringerud
2021/381 ( PDF )
Towards Practical and Round-Optimal Lattice-Based Threshold and Blind Signatures
Shweta Agrawal and Damien Stehle and Anshu Yadav
2021/380 ( PDF )
Certificateless Designated Verifier Proxy Signature
Cholun Kim
2021/379 ( PDF )
A Note on the Bias of Rotational Differential-Linear Distinguishers
Yunwen Liu and Zhongfeng Niu and Siwei Sun and Chao Li and Lei Hu
2021/378 ( PDF )
Multiparty Reusable Non-Interactive Secure Computation from LWE
Fabrice Benhamouda and Aayush Jain and Ilan Komargodski and Huijia Lin
2021/377 ( PDF )
Attacks and weaknesses of BLS aggregate signatures
Nguyen Thoi Minh Quan
2021/376 ( PDF )
On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds
Nai-Hui Chia and Kai-Min Chung and Qipeng Liu and Takashi Yamakawa
2021/375 ( PDF )
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines
Rafael Dowsley and Caleb Horst and Anderson C A Nascimento
2021/374 ( PDF )
ZXAD: Zero-knowledge Exit Abuse Detection for Tor
Akshaya Mani and Ian Goldberg
2021/373 ( PDF )
T5: Hashing Five Inputs with Three Compression Calls
Yevgeniy Dodis and Dmitry Khovratovich and Nicky Mouha and Mridul Nandi
2021/372 ( PDF )
Explicit connections between supersingular isogeny graphs and Bruhat–Tits trees
Laia Amorós and Annamaria Iezzi and Kristin Lauter and Chloe Martindale and Jana Sotáková
2021/371 ( PDF )
Construction of minimal linear codes with few weights from weakly regular plateaued functions
Ahmet Sinak
2021/370 ( PDF )
Nova: Recursive Zero-Knowledge Arguments from Folding Schemes
Abhiram Kothapalli and Srinath Setty and Ioanna Tzialla
2021/369 ( PDF )
Another Algebraic Decomposition Method for Masked Implementation
Shoichi Hirose
2021/368 ( PDF )
Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE
Aaron Hutchinson and Koray Karabina and Geovandro Pereira
2021/367 ( PDF )
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
Arnab Roy and Elena Andreeva and Jan Ferdinand Sauer
2021/366 ( PDF )
Multiparty Computation with Covert Security and Public Verifiability
Peter Scholl and Mark Simkin and Luisa Siniscalchi
2021/365 ( PDF )
Updatable Signatures and Message Authentication Codes
Valerio Cini and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks and Erkan Tairi
2021/364 ( PDF )
RAGHAV: A new low power S-P network encryption design for resource constrained environment
GAURAV BANSOD
2021/363 ( PDF )
Information Leakages in Code-based Masking: A Unified Quantification Approach
Wei Cheng and Sylvain Guilley and Claude Carlet and Jean-Luc Danger and Sihem Mesnager
2021/362 ( PDF )
Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning
Zezhou Hou and Jiongjiong Ren and Shaozhen Chen
2021/361 ( PDF )
Some Generic Constructions of Generalized Plateaued Functions
Jiaxin Wang Fang-Wei Fu
2021/360 ( PDF )
An Architecture for Blockchain-based Cloud Banking
Thuat Do
2021/359 ( PDF )
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso
2021/358 ( PDF )
Time- and Space-Efficient Arguments from Groups of Unknown Order
Alexander R. Block and Justin Holmgren and Alon Rosen and Ron D. Rothblum and Pratik Soni
2021/357 ( PDF )
AISY - Deep Learning-based Framework for Side-channel Analysis
Guilherme Perin and Lichao Wu and Stjepan Picek
2021/356 ( PDF )
Active Implementation of End-to-End Post-Quantum Encryption
Anton Tutoveanu
2021/355 ( PDF )
A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware
Georg Land and Pascal Sasdrich and Tim Güneysu
2021/354 ( PDF )
Efficient permutation protocol for MPC in the head
Peeter Laud
2021/353 ( PDF )
Fully-succinct Publicly Verifiable Delegation from Constant Size Assumptions
Alonso González and Alexandros Zacharakis
2021/352 ( PDF )
A Configurable Hardware Implementation of XMSS
Jan Philipp Thoma and Tim Güneysu
2021/351 ( PDF )
Practical Dynamic Group Signatures Without Knowledge Extractors
Hyoseung Kim and Olivier Sanders and Michel Abdalla and Jong Hwan Park
2021/350 ( PDF )
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
Konstantinos Chalkias and Francois Garillot and Yashvanth Kondi and Valeria Nikolaenko
2021/349 ( PDF )
Post-quantum Resettably-Sound Zero Knowledge
Nir Bitansky and Michael Kellner and Omri Shmueli
2021/348 ( PDF )
Decoding supercodes of Gabidulin codes and applications to cryptanalysis
Maxime Bombar and Alain Couvreur
2021/347 ( PDF )
Attacking (EC)DSA With Partially Known Multiples of Nonces
Marios Adamoudis and Konstantinos A. Draziotis and Dimitrios Poulakis
2021/346 ( PDF )
Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security
Benny Applebaum and Eliran Kachlon and Arpita Patra
2021/345 ( PDF )
Private Blocklist Lookups with Checklist
Dmitry Kogan and Henry Corrigan-Gibbs
2021/344 ( PDF )
Efficient and Universally Composable Single Secret Leader Election from Pairings
Dario Catalano and Dario Fiore and Emanuele Giunta
2021/343 ( PDF )
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
Rishab Goyal and Jiahui Liu and Brent Waters
2021/342 ( PDF )
N-for-1 Auth: N-wise Decentralized Authentication via One Authentication
Weikeng Chen and Ryan Deng and Raluca Ada Popa
2021/341 ( PDF )
Clonable PUF: On the Design of PUFs That Share Equivalent Responses
Takashi Sato and Yuki Tanaka and Song Bian
2021/340 ( PDF )
Merkle Trees Optimized for Stateless Clients in Bitcoin
Bolton Bailey and Suryanarayana Sankagiri
2021/339 ( PDF )
Non-interactive distributed key generation and key resharing
Jens Groth
2021/338 ( PDF )
Lattice-Based Proof of Shuffle and Applications to Electronic Voting
Diego F. Aranha and Carsten Baum and Kristian Gjřsteen and Tjerand Silde and Thor Tunge
2021/337 ( PDF )
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Yu-Chi Chen and Masahiro Mambo
2021/336 ( PDF )
On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES
Nicolas T. Courtois and Matteo Abbondati and Hamy Ratoanina and Marek Grajek
2021/335 ( PDF )
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
Ohad Amon and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir
2021/334 ( PDF )
Post-Quantum Succinct Arguments: Breaking the Quantum Rewinding Barrier
Alessandro Chiesa and Fermi Ma and Nicholas Spooner and Mark Zhandry
2021/333 ( PDF )
Sumcheck Arguments and their Applications
Jonathan Bootle and Alessandro Chiesa and Katerina Sotiraki
2021/332 ( PDF )
An $O(\log^2 p)$ Approach to Point-Counting on Elliptic Curves From a Prominent Family Over the Prime Field $\mathbb{F}_p$
Yuri Borissov and Miroslav Markov
2021/331 ( PDF )
A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications
Radhakrishna Bhat and N R Sunitha and S S Iyengar
2021/330 ( PDF )
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
Pooya Farshim and Louiza Khati and Yannick Seurin and Damien Vergnaud
2021/329 ( PDF )
Two Efficient and Regulatory Confidential Transaction Schemes
Min Yang and Changtong Xu and Zhe Xia and Li Wang and Qingshu Meng
2021/328 ( PDF )
Mixup Data Augmentation for Deep Learning Side-Channel Attacks
Karim M. Abdellatif
2021/327 ( PDF )
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions
Matteo Campanelli and Mathias Hall-Andersen
2021/326 ( PDF )
Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox
François Dupressoir and Konrad Kohbrok and Sabine Oechsner
2021/325 ( PDF )
Spectrum: High-Bandwidth Anonymous Broadcast with Malicious Security
Zachary Newman and Sacha Servan-Schreiber and Srinivas Devadas
2021/324 ( PDF )
Private AI: Machine Learning on Encrypted Data
Kristin E. Lauter
2021/323 ( PDF )
0
Nguyen Thoi Minh Quan
2021/322 ( PDF )
Rinocchio: SNARKs for Ring Arithmetic
Chaya Ganesh and Anca Nitulescu and Eduardo Soria-Vazquez
2021/321 ( PDF )
Abuse Resistant Law Enforcement Access Systems
Matthew Green and Gabriel Kaptchuk and Gijs Van Laer
2021/320 ( PDF )
Binding BIKE errors to a key pair
Nir Drucker and Shay Gueron and Dusan Kostic
2021/319 ( PDF )
Tradeoff attacks on symmetric ciphers
Orhun Kara
2021/318 ( PDF )
Oblivious TLS via Multi-Party Computation
Damiano Abram and Ivan Damgĺrd and Peter Scholl and Sven Trieflinger
2021/317 ( PDF )
MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge
Duong Tung Nguyen and Ni Trieu
2021/316 ( PDF )
Reusable Two-Round MPC from LPN
James Bartusek and Sanjam Garg and Akshayaram Srinivasan and Yinuo Zhang
2021/315 ( PDF )
Faster homomorphic comparison operations for BGV and BFV
Ilia Iliashenko and Vincent Zucca
2021/314 ( PDF )
On Security Properties of All-or-nothing Transforms
Navid Nasr Esfahani and Douglas R. Stinson
2021/313 ( PDF )
Rank Estimation with Bounded Error via Exponential Sampling
Liron David and Avishai Wool
2021/312 ( PDF )
Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup
Zhimin Luo and Mengce Zheng and Ping Wang and Minhui Jin and Jiajia Zhang and Honggang Hu
2021/311 ( PDF )
Improved Neural Aided Statistical Attack for Cryptanalysis
Yi Chen and Hongbo Yu
2021/310 ( PDF )
A New Neural Distinguisher Model Considering Derived Features from Multiple Ciphertext Pairs
Yi Chen and Hongbo Yu
2021/309 ( PDF )
SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets
Xingyu Meng and Kshitij Raj and Atul Prasad Deb Nath and Kanad Basu and Sandip Ray
2021/308 ( PDF )
Threshold Garbled Circuits and Ad Hoc Secure Computation
Michele Ciampi and Vipul Goyal and Rafail Ostrovsky
2021/307 ( PDF )
A Compressed $\Sigma$-Protocol Theory for Lattices
Thomas Attema and Ronald Cramer and Lisa Kohl
2021/306 ( PDF )
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2021/305 ( PDF )
SoK: Game-based Security Models for Group Key Exchange
Bertram Poettering and Paul Rösler and Jörg Schwenk and Douglas Stebila
2021/304 ( PDF )
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting
Xavier Boyen and Thomas Haines and Johannes Mueller
2021/303 ( PDF )
The More The Merrier: Reducing the Cost of Large Scale MPC
S. Dov Gordon and Daniel Starin and Arkady Yerukhimovich
2021/302 ( PDF )
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain
Maxime Buser and Rafael Dowsley and Muhammed F. Esgin and Shabnam Kasra Kermanshahi and Veronika Kuchta and Joseph K. Liu and Raphael Phan and Zhenfei Zhang
2021/301 ( PDF )
Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of $j=0$ with the cost of one exponentiation in $\mathbb{F}_{\!q}$
Dmitrii Koshelev
2021/300 ( PDF )
Invariants for EA- and CCZ-equivalence of APN and AB functions
Nikolay Kaleyski
2021/299 ( PDF )
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality
Muhammad Saad and Afsah Anwar and Srivatsan Ravi and David Mohaisen
2021/298 ( PDF )
On extensions of the one-time-pad
Bhupendra Singh and G. Athithan and Rajesh Pillai
2021/297 ( PDF )
HashWires: Hyperefficient Credential-Based Range Proofs
Konstantinos Chalkias and Shir Cohen and Kevin Lewi and Fredric Moezinia and Yolan Romailler
2021/296 ( PDF )
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice
Jan Richter-Brockmann and Pascal Sasdrich and Tim Güneysu
2021/295 ( PDF )
Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design
Michael Zuzak and Ankur Srivastava
2021/294 ( PDF )
Code-based signatures without trapdoors through restricted vectors
Marco Baldi and Franco Chiaraluce and Paolo Santini
2021/293 ( PDF )
Thinking Outside the Superbox
Nicolas Bordes and Joan Daemen and Daniël Kuijsters and Gilles Van Assche
2021/292 ( PDF )
Quantum Collision Attacks on Reduced SHA-256 and SHA-512
Akinori Hosoyamada and Yu Sasaki
2021/291 ( PDF )
Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security
Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
2021/290 ( PDF )
Dummy Shuffling against Algebraic Attacks in White-box Implementations
Alex Biryukov and Aleksei Udovenko
2021/289 ( PDF )
Reactive Key-Loss Protection in Blockchains
Sam Blackshear and Konstantinos Chalkias and Panagiotis Chatzigiannis and Riyaz Faizullabhoy and Irakliy Khaburzaniya and Eleftherios Kokoris Kogias and Joshua Lind and David Wong and Tim Zakian
2021/288 ( PDF )
Redeeming Reset Indifferentiability and Post-Quantum Groups
Mark Zhandry
2021/287 ( PDF )
A Deeper Look at Machine Learning-Based Cryptanalysis
Adrien Benamira and David Gerault and Thomas Peyrin and Quan Quan Tan
2021/286 ( PDF )
Fiat-Shamir via List-Recoverable Codes (or: Parallel Repetition of GMW is not Zero-Knowledge)
Justin Holmgren and Alex Lombardi and Ron D. Rothblum
2021/285 ( PDF )
Quadratic Secret Sharing and Conditional Disclosure of Secrets
Amos Beimel and Hussien Othman and Naty Peter
2021/284 ( PDF )
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
Christof Ferreira Torres and Antonio Ken Iannillo and Arthur Gervais and Radu State
2021/283 ( PDF )
P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange
Carsten Baum and Bernardo David and Tore Frederiksen
2021/282 ( PDF )
One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols
Péter Kutas and Simon-Philipp Merz and Christophe Petit and Charlotte Weitkämper
2021/281 ( PDF )
Subquadratic SNARGs in the Random Oracle Model
Alessandro Chiesa and Eylon Yogev
2021/280 ( PDF )
Online-Extractability in the Quantum Random-Oracle Model
Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner
2021/279 ( PDF )
Information-Set Decoding with Hints
Anna-Lena Horlemann and Sven Puchinger and Julian Renner and Thomas Schamberger and Antonia Wachter-Zeh
2021/278 ( PDF )
More Communication Lower Bounds for Information-Theoretic MPC
Ivan Damgĺrd and Boyang Li and Nikolaj I. Schwartzbach
2021/277 ( PDF )
On the Integer Polynomial Learning with Errors Problem
Julien Devevey and Amin Sakzad and Damien Stehlé and Ron Steinfeld
2021/276 ( PDF )
Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography
Amril Syalim and Takashi Nishide and Kouichi Sakurai
2021/275 ( PDF )
Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher
Zhengyuan Shi and Gangqiang Yang and Hailiang Xiong and Fudong Li and Honggang Hu
2021/274 ( PDF )
Large Message Homomorphic Secret Sharing from DCR and Applications
Lawrence Roy and Jaspal Singh
2021/273 ( PDF )
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding
Stanislaw Jarecki and Hugo Krawczyk and Jiayu Xu
2021/272 ( PDF )
Isogeny-based key compression without pairings
Geovandro C. C. F. Pereira and Paulo S. L. M. Barreto
2021/271 ( PDF )
On the CCA Compatibility of Public-Key Infrastructure
Dakshita Khurana and Brent Waters
2021/270 ( PDF )
PQC: R-Propping of a New Group-Based Digital Signature
Pedro Hecht
2021/269 ( PDF )
Steel: Composable Hardware-based Stateful and Randomised Functional Encryption
Pramod Bhatotia and Markulf Kohlweiss and Lorenzo Martinico and Yiannis Tselekounis
2021/268 ( PDF )
Puncture 'Em All: Stronger Updatable Encryption with No-Directional Key Updates
Daniel Slamanig and Christoph Striecks
2021/267 ( PDF )
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
Christoph Dobraunig and Lorenzo Grassi and Anna Guinet and Daniël Kuijsters
2021/266 ( PDF )
VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE
Peter Rindal and Phillipp Schoppmann
2021/265 ( PDF )
On the Hardness of Module-LWE with Binary Secret
Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen
2021/264 ( PDF )
FAST: Fair Auctions via Secret Transactions
Bernardo David and Lorenzo Gentile and Mohsen Pourpouneh
2021/263 ( PDF )
Compressed Linear Aggregate Signatures Based on Module Lattices
Katharina Boudgoust and Adeline Roux-Langlois
2021/262 ( PDF )
The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT
Claudio Orlandi and Peter Scholl and Sophia Yakoubov
2021/261 ( PDF )
MIRACLE: MIcRo-ArChitectural Leakage Evaluation
Ben Marshall and Dan Page and James Webb
2021/260 ( PDF )
A Geometric Approach to Homomorphic Secret Sharing
Yuval Ishai and Russell W. F. Lai and Giulio Malavolta
2021/259 ( PDF )
Don't forget the constant-time in CSURF
Jesús-Javier Chi-Domínguez and Krijn Reijnders
2021/258 ( PDF )
Secure Wire Shuffling in the Probing Model
Jean-Sebastien Coron and Lorenzo Spignoli
2021/257 ( PDF )
Cryptanalysis of the quantum public-key cryptosystem OTU under heuristics from Szemerédi-type statements
Shoichi Kamada
2021/256 ( PDF )
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC
Ghada Almashaqbeh and Fabrice Benhamouda and Seungwook Han and Daniel Jaroslawicz and Tal Malkin and Alex Nicita and Tal Rabin and Abhishek Shah and Eran Tromer
2021/255 ( PDF )
A Simple Algebraic Attack on 3-Round LowMC
Fukang Liu and Takanori Isobe and Willi Meier
2021/254 ( PDF )
Multivariate Public Key Cryptosystem from Sidon Spaces
Netanel Raviv and Ben Langton and Itzhak Tamo
2021/253 ( PDF )
Improved single-round secure multiplication using regenerating codes
Mark Abspoel and Ronald Cramer and Daniel Escudero and Ivan Damgĺrd and Chaoping Xing
2021/252 ( PDF )
A Resource Binding Approach to Logic Obfuscation
Michael Zuzak and Yuntao Liu and Ankur Srivastava
2021/251 ( PDF )
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser
2021/250 ( PDF )
Key Agreement with Physical Unclonable Functions and Biometric Identifiers
Onur Gunlu
2021/249 ( PDF )
NeuroSCA: Evolving Activation Functions for Side-channel Analysis
Karlo Knezevic and Juraj Fulir and Domagoj Jakobovic and Stjepan Picek
2021/248 ( PDF )
Everlasting UC Commitments from Fully Malicious PUFs
Bernardo Magri and Giulio Malavolta and Dominique Schröder and Dominique Unruh
2021/247 ( PDF )
Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets
David Knichel and Pascal Sasdrich and Amir Moradi
2021/246 ( PDF )
Master-Key KDM-Secure ABE via Predicate Encoding
Shengyuan Feng and Junqing Gong and Jie Chen
2021/245 ( PDF )
On the Ideal Shortest Vector Problem over Random Rational Primes
Yanbin Pan and Jun Xu and Nick Wadleigh and Qi Cheng
2021/244 ( PDF )
Forward Secret Encrypted RAM: Lower Bounds and Applications
Alexander Bienstock and Yevgeniy Dodis and Kevin Yeo
2021/243 ( PDF )
Private Set Operations from Oblivious Switching
Gayathri Garimella and Payman Mohassel and Mike Rosulek and Saeed Sadeghian and Jaspal Singh
2021/242 ( PDF )
GAP: Born to Break Hiding
Ju-Hwan Kim and Ji-Eun Woo and Soo-Jin Kim and So-Yeon Park and Dong-Guk Han
2021/241 ( PDF )
On the Round Complexity of Fully Secure Solitary MPC with Honest Majority
Saikrishna Badrinarayanan and Peihan Miao and Pratyay Mukherjee and Divya Ravi
2021/240 ( PDF )
The Relationship Between Idealized Models Under Computationally Bounded Adversaries
Mark Zhandry and Cong Zhang
2021/239 ( PDF )
SoK: Auditability and Accountability in Distributed Payment Systems
Panagiotis Chatzigiannis and Foteini Baldimtsi and Konstantinos Chalkias
2021/238 ( PDF )
Two Sides of The Same Coin: Weak-Keys and More Efficient Variants of CRAFT
Gregor Leander and Shahram Rasoolzadeh
2021/237 ( PDF )
Post-quantum Security of OAEP Transform
Ehsan Ebrahimi
2021/236 ( PDF )
SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs
Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang
2021/235 ( PDF )
More Efficient Digital Signatures with Tight Multi-User Security
Denis Diemert and Kai Gellert and Tibor Jager and Lin Lyu
2021/234 ( PDF )
New Public-Key Crypto-System EHT
Alessandro Budroni and Igor Semaev
2021/233 ( PDF )
Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers
Inbar Kaslasi and Ron D. Rothblum and Prashant Nalini Vasudevan
2021/232 ( -- withdrawn -- )
Fast Factoring Integers by SVP Algorithms
Claus Peter Schnorr
2021/231 ( PDF )
LL-ORAM: A Forward and Backward Private Oblivious RAM
Zhiqiang Wu and Xiaoyong Tang and Jin Wang and Tan Deng
2021/230 ( PDF )
Subversion-Resilient Public Key Encryption with Practical Watchdogs
Pascal Bemmann and Rongmao Chen and Tibor Jager
2021/229 ( PDF )
Fast Boolean Queries with Minimized Leakage for Encrypted Databases in Cloud Computing
Zhiqiang Wu and Kenli Li and Keqin Li and Jin Wang
2021/228 ( PDF )
On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments
Nils Fleischhacker and Mark Simkin
2021/227 ( PDF )
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks
Qiqi Lai and Feng-Hao Liu and Zhedong Wang
2021/226 ( PDF )
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation
Khoa Nguyen and Reihaneh Safavi-Naini and Willy Susilo and Huaxiong Wang and Yanhong Xu and Neng Zeng
2021/225 ( PDF )
Recovering or Testing Extended-Affine Equivalence
Anne Canteaut and Alain Couvreur and Léo Perrin
2021/224 ( PDF )
Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha
Murilo Coutinho and T. C. Souza Neto
2021/223 ( PDF )
Redactable Blockchain Protocols with Instant Redaction
Jing Xu and Xinyu Li and Lingyuan Yin and Yuan Lu and Qiang Tang and Zhenfeng Zhang
2021/222 ( PDF )
Quantum-safe HIBE: does it cost a Latte?
Raymond K. Zhao and Sarah McCarthy and Ron Steinfeld and Amin Sakzad and Máire O’Neill
2021/221 ( PDF )
The Direction of Updatable Encryption Does Matter
Ryo Nishimaki
2021/220 ( PDF )
A New Twofold Cornacchia-Type Algorithm
Bei Wang; Yi Ouyang; Songsong Li; Honggang Hu
2021/219 ( PDF )
Snarky Ceremonies
Markulf Kohlweiss and Mary Maller and Janno Siim and Mikhail Volkhov
2021/218 ( PDF )
SimS: a Simplification of SiGamal
Tako Boris Fouotsa and Christophe Petit
2021/217 ( PDF )
Verifiable Random Functions with Optimal Tightness
David Niehues
2021/216 ( PDF )
How to Meet Ternary LWE Keys
Alexander May
2021/215 ( PDF )
Limbo: Efficient Zero-knowledge MPCitH-based Arguments
Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Titouan Tanguy
2021/214 ( PDF )
Mesh Messaging in Large-scale Protests: Breaking Bridgefy
Martin R. Albrecht and Jorge Blasco and Rikke Bjerg Jensen and Lenka Mareková
2021/213 ( PDF )
Accelerating the Search of Differential and Linear Characteristics with the SAT Method
Ling Sun and Wei Wang and Meiqin Wang
2021/212 ( PDF )
Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC
Ryoma Ito and Rentaro Shiba and Kosei Sakamoto and Fukang Liu and Takanori Isobe
2021/211 ( PDF )
GearBox: An Efficient UC Sharded Ledger Leveraging the Safety-Liveness Dichotomy
Bernardo David and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Daniel Tschudi
2021/210 ( PDF )
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles
Craig Gentry and Shai Halevi and Hugo Krawczyk and Bernardo Magri and Jesper Buus Nielsen and Tal Rabin and Sophia Yakoubov
2021/209 ( PDF )
Sampling methods for cryptographic tests
George Marinakis
2021/208 ( PDF )
Secure Poisson Regression
Mahimna Kelkar and Phi Hung Le and Mariana Raykova and Karn Seth
2021/207 ( PDF )
Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank
Daniele Cozzo and Nigel P. Smart and Younes Talibi Alaoui
2021/206 ( PDF )
WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts
Ádám Ficsór and Yuval Kogman and Lucas Ontivero and István András Seres
2021/205 ( PDF )
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup
Tsz Hon Yuen and Handong Cui and Xiang Xie
2021/204 ( PDF )
Revisiting Homomorphic Encryption Schemes for Finite Fields
Andrey Kim and Yuriy Polyakov and Vincent Zucca
2021/203 ( PDF )
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
Tjerand Silde and Martin Strand
2021/202 ( PDF )
Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices
Martin R. Albrecht and Russell W. F. Lai
2021/201 ( PDF )
DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security
Hanshen Xiao and Srinivas Devadas
2021/200 ( PDF )
Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols
Sergiu Carpov and Kevin Deforth and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev and Jonathan Katz and Iraklis Leontiadis and M. Mohammadi and Abson Sae-Tang and Marius Vuille
2021/199 ( PDF )
Generic, Efficient and Isochronous Gaussian Sampling over the Integers
Shuo Sun and Yongbin Zhou and Yunfeng Ji and Rui Zhang and Yang Tao
2021/198 ( PDF )
Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs
Tatsuki Ono and Song Bian and Takashi Sato
2021/197 ( PDF )
Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA
Guilherme Perin and Lichao Wu and Stjepan Picek
2021/196 ( PDF )
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model
Xu Liu and Mingqiang Wang
2021/195 ( PDF )
Compilation of Function Representations for Secure Computing Paradigms
Karim Baghery and Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Nigel P. Smart and Titouan Tanguy
2021/194 ( PDF )
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Raghvendra Rohit and Kai Hu and Sumanta Sarkar and Siwei Sun
2021/193 ( PDF )
Multitarget decryption failure attacks and their application to Saber and Kyber
Jan-Pieter D'Anvers and Senne Batsleer
2021/192 ( PDF )
Quantum Indifferentiability of SHA-3
Jan Czajkowski
2021/191 ( PDF )
PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution
Yaroslav Balytskyi and Manohar Raavi and Anatoliy Pinchuk and Sang-Yoon Chang
2021/190 ( PDF )
Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source
Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen
2021/189 ( PDF )
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette
Yunwen Liu and Siwei Sun and Chao Li
2021/188 ( PDF )
Tight Security Bounds for Micali’s SNARGs
Alessandro Chiesa and Eylon Yogev
2021/187 ( PDF )
Weak Keys in Reduced AEGIS and Tiaoxin
Fukang Liu and Takanori Isobe and Willi Meier and Kosei Sakamoto
2021/186 ( PDF )
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages
Hemanta K. Maji and Hai H. Nguyen and Anat Paskin-Cherniavsky and Tom Suad and Mingyuan Wang
2021/185 ( PDF )
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms
Hwajeong Seo and Pakize Sanal and Wai-Kong Lee and Reza Azarderakhsh
2021/184 ( PDF )
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption
Sravya Yandamuri and Ittai Abraham and Kartik Nayak and Michael K. Reiter
2021/183 ( PDF )
Efficient State Management in Distributed Ledgers
Dimitris Karakostas and Nikos Karayannidis and Aggelos Kiayias
2021/182 ( PDF )
The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications
István András Seres and Máté Horváth and Péter Burcsi
2021/181 ( PDF )
Group Signatures with User-Controlled and Sequential Linkability
Jesus Diaz and Anja Lehmann
2021/180 ( PDF )
Apollo -- Optimistically Linear and Responsive SMR
Adithya Bhat and Akhil Bandarupalli and Saurabh Bagchi and Aniket Kate and Michael Reiter
2021/179 ( PDF )
Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis
An Wang and Yuan Li and Yaoling Ding and Liehuang Zhu and Yongjuan Wang
2021/178 ( PDF )
Attribute-Based Access Control for Inner Product Functional Encryption from LWE
Tapas Pal and Ratna Dutta
2021/177 ( PDF )
Generic Negation of Pair Encodings
Miguel Ambrona
2021/176 ( PDF )
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits
Lukas Aumayr and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei
2021/175 ( PDF )
On the Relationships between Different Methods for Degree Evaluation (Full Version)
Siwei Chen and Zejun Xiang and Xiangyong Zeng and Shasha Zhang
2021/174 ( PDF )
Smart Contracts for Incentivized Outsourcing of Computation
Alptekin Küpçü and Reihaneh Safavi-Naini
2021/173 ( PDF )
TensorCrypto
Wai-Kong Lee and Hwajeong Seo and Zhenfei Zhang and Seongoun Hwang
2021/172 ( PDF )
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI
Nishanth Chandran and Nishka Dasgupta and Divya Gupta and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Akash Shah
2021/171 ( PDF )
Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Revisited
Wei Yu and Guangwu Xu
2021/170 ( PDF )
Fully Anonymous Group Signature with Verifier-Local Revocation
Ai Kitagawa and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka
2021/169 ( PDF )
Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials
Yasuhiko Ikematsu and Shuhei Nakamura and Bagus Santoso and Takanori Yasuda
2021/168 ( PDF )
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS
Xiaohan Zhang and Chi Cheng and Yue Qin and Ruoyu Ding
2021/167 ( PDF )
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware
Seetal Potluri and Aydin Aysu
2021/166 ( PDF )
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols
Matthias Lohr and Benjamin Schlosser and Jan Jürjens and Steffen Staab
2021/165 ( PDF )
Composition with Knowledge Assumptions
Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
2021/164 ( PDF )
Graph-Based Construction for Non-Malleable Codes
Shohei Satake and Yujie Gu and Kouichi Sakurai
2021/163 ( PDF )
CNF-FSS and its Applications
Paul Bunn and Eyal Kushilevitz and Rafail Ostrovsky
2021/162 ( PDF )
Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity
Giuseppe Ateniese and Long Chen and Danilo Francati and Dimitrios Papadopoulos and Qiang Tang
2021/161 ( PDF )
Generic Adaptor Signature
Xianrui Qin and Handong Cui and Tsz Hon Yuen
2021/160 ( PDF )
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance
Tibor Jager and Rafael Kurek and David Niehues
2021/159 ( PDF )
hbACSS: How to Robustly Share Many Secrets
Thomas Yurek and Licheng Luo and Jaiden Fairoze and Aniket Kate and Andrew Miller
2021/158 ( PDF )
Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate
Nicolas Resch and Chen Yuan
2021/157 ( PDF )
Sycon: A New Milestone in Designing ASCON-like Permutations
Kalikinkar Mandal and Dhiman Saha and Sumanta Sarkar and Yosuke Todo
2021/156 ( PDF )
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability
Manuel Barbosa and Gilles Barthe and Benjamin Grégoire and Adrien Koutsos and Pierre-Yves Strub
2021/155 ( PDF )
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
James Howe and Marco Martinoli and Elisabeth Oswald and Francesco Regazzoni
2021/154 ( PDF )
Generating cryptographically-strong random lattice bases and recognizing rotations of $\mathbb{Z}^n$
Tamar Lichter Blanks and Stephen D. Miller
2021/153 ( PDF )
On the Isogeny Problem with Torsion Point Information
Tako Boris Fouotsa and Péter Kutas and Simon-Philipp Merz
2021/152 ( PDF )
Hybrid Dual Attack on LWE with Arbitrary Secrets
Lei Bi and Xianhui Lu and Junjie Luo and Kunpeng Wang and Zhenfei Zhang
2021/151 ( PDF )
On Sufficient Oracles for Secure Computation with Identifiable Abort
Mark Simkin and Luisa Siniscalchi and and Sophia Yakoubov
2021/150 ( PDF )
Two-Party Adaptor Signatures From Identification Schemes
Andreas Erwig and Sebastian Faust and Kristina Hostáková and Monosij Maitra and Siavash Riahi
2021/149 ( PDF )
Quantum Security of the Legendre PRF
Paul Frixons and André Schrottenloher
2021/148 ( PDF )
On methods of shortening ElGamal-type signatures
Liliya Akhmetzyanova and Evgeny Alekseev and Alexandra Babueva and Stanislav Smyshlyaev
2021/147 ( PDF )
IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols
Greg Morrisett and Elaine Shi and Kristina Sojakova and Xiong Fan and Joshua Gancher
2021/146 ( PDF )
Boolean Functions from Hyperplane Coverings
Benjamin E. Diamond
2021/145 ( PDF )
A Security Framework for Distributed Ledgers
Christoph Egger and Mike Graf and Ralf Kuesters and Daniel Rausch and Viktoria Ronge and and Dominique Schröder
2021/144 ( PDF )
\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol
Morteza Adeli and Nasour Bagheri and Sadegh Sadeghi and Saru Kumari
2021/143 ( PDF )
On Bitcoin Cash’s Target Recalculation Functions
Juan Garay and Yu Shen
2021/142 ( PDF )
Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication
Muah Kim and Onur Gunlu and Rafael F. Schaefer
2021/141 ( PDF )
Advanced Lattice Sieving on GPUs, with Tensor Cores
Léo Ducas and Marc Stevens and Wessel van Woerden
2021/140 ( PDF )
Practical and Scalable Access Control Mechanism for the Internet of Things
Clémentine Gritti and Emanuel Regnath and Sebastian Steinhorst
2021/139 ( PDF )
Order-Fair Consensus in the Permissionless Setting
Mahimna Kelkar and Soubhik Deb and Sreeram Kannan
2021/138 ( PDF )
Classic McEliece Implementation with Low Memory Footprint
Johannes Roth and Evangelos Karatsiolis and Juliane Krämer
2021/137 ( PDF )
Cryptographic Security of the MLS RFC, Draft 11
Chris Brzuska and Eric Cornelissen and Konrad Kohbrok
2021/136 ( PDF )
An approach for designing fast public key encryption systems using white-box cryptography techniques
Dmitry Schelkunov
2021/135 ( PDF )
Acyclicity Programming for Sigma-Protocols
Masayuki Abe and Miguel Ambrona and Andrej Bogdanov and Miyako Ohkubo and Alon Rosen
2021/134 ( PDF )
Cryptanalysis of a code-based signature scheme without trapdoors
Marco Baldi and Jean-Christophe Deneuville and Edoardo Persichetti and Paolo Santini
2021/133 ( PDF )
smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
Ravital Solomon and Ghada Almashaqbeh
2021/132 ( PDF )
Privacy-Preserving Feature Selection with Secure Multiparty Computation
Xiling Li and Rafael Dowsley and Martine De Cock
2021/131 ( PDF )
Privacy-Preserving Video Classification with Convolutional Neural Networks
Sikha Pentyala and Rafael Dowsley and Martine De Cock
2021/130 ( PDF )
Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves
Bei Wang; Songsong Li; Yi Ouyang; Honggang Hu
2021/129 ( PDF )
Lattice-based weak curve fault attack on ECDSA
Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Wei
2021/128 ( PDF )
Designing Tweakable Enciphering Schemes Using Public Permutations
Debrup Chakraborty and Avijit Dutta and Samir Kundu
2021/127 ( PDF )
Cuproof: A Novel Range Proof with Constant Size
Cong Deng and Xianghong Tang and Lin You and Gengran Hu and Shuhong Gao
2021/126 ( PDF )
Observability attack on stream generators
Ramachandran Anantharaman and Virendra Sule
2021/125 ( PDF )
Privacy Preserving and Resilient RPKI
Kris Shrishak and Haya Shulman
2021/124 ( PDF )
Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption
Ozgun Ozerk and Can Elgezen and Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2021/123 ( PDF )
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs
Yue Qin and Chi Cheng and Xiaohan Zhang and Yanbin Pan and Lei Hu and Jintai Ding
2021/122 ( PDF )
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
Aner Ben Efraim and Olga Nissenbaum and Eran Omri and Anat Paskin-Cherniavsky
2021/121 ( PDF )
BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits
Yaron Gvili and Sarah Scheffler and Mayank Varia
2021/120 ( PDF )
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits
Aner Ben-Efraim and Kelong Cong and Eran Omri and Emmanuela Orsini and Nigel P. Smart and Eduardo Soria-Vazquez
2021/119 ( PDF )
Rabbit: Efficient Comparison for Secure Multi-Party Computation
Eleftheria Makri and Dragos Rotaru and Frederik Vercauteren and Sameer Wagh
2021/118 ( PDF )
High-Threshold AVSS with Optimal Communication Complexity
Nicolas Alhaddad and Mayank Varia and Haibin Zhang
2021/117 ( PDF )
FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin
Arash Mirzaei and Amin Sakzad and Jiangshan Yu and Ron Steinfeld
2021/116 ( PDF )
MAKE: a Matrix Action Key Exchange
Nael Rahman and Vladimir Shpilrain
2021/115 ( PDF )
Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4
Mila Anastasova and Reza Azarderakhsh and Mehran Mozaffari Kermani
2021/114 ( PDF )
Security Analysis of CPace
Michel Abdalla and Björn Haase and Julia Hesse
2021/113 ( PDF )
Improvement of Secure Multi-Party Multiplication of (k,n) Threshold Secret Sharing Using Only N=k Servers (Revised Version)
Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura
2021/112 ( -- withdrawn -- )
Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange
Majid Salimi and Hamid Mala and Honorio Martin and Pedro Peris-Lopez
2021/111 ( PDF )
A note on Post Quantum Onion Routing
Kelesidis Evgnosia-Alexandra
2021/110 ( PDF )
Replacing Probability Distributions in Security Games via Hellinger Distance
Kenji Yasunaga
2021/109 ( PDF )
Sequential Logic Encryption Against Model Checking Attack
Amin Rezaei and Hai Zhou
2021/108 ( PDF )
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs
Sara Ricci and Lukas Malina and Petr Jedlicka and David Smekal and Jan Hajny and Petr Cibik and Patrik Dobias
2021/107 ( PDF )
A Decentralized and Encrypted National Gun Registry
Seny Kamara and Tarik Moataz and Andrew Park and Lucy Qin
2021/106 ( PDF )
MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers
Aram Jivanyan and Jesse Lancaster and Arash Afshar and Parnian Alimi
2021/105 ( PDF )
A New Efficient Identity-Based Encryption Without Pairing
Majid Salimi
2021/104 ( PDF )
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography
Shivam Bhasin and Jan-Pieter D'Anvers and Daniel Heinz and Thomas Pöppelmann and Michiel Van Beirendonck
2021/103 ( PDF )
RUP Security of the SAEF Authenticated Encryption mode
Elena Andreeva and Amit Singh Bhati and Damian Vizar
2021/102 ( PDF )
A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization
Madalina Chirita and Alexandru-Mihai Stroie and Andrei-Daniel Safta and Emil Simion
2021/101 ( PDF )
Combined Fault and DPA Protection for Lattice-Based Cryptography
Daniel Heinz and Thomas Pöppelmann
2021/100 ( PDF )
SPURT: Scalable Distributed Randomness Beacon with Transparent Setup
Sourav Das and Vinith Krishnan and Irene Miriam Isaac and Ling Ren
2021/099 ( PDF )
Property Inference from Poisoning
Melissa Chase and Esha Ghosh and Saeed Mahloujifar
2021/098 ( PDF )
Image sets of perfectly nonlinear maps
Lukas Kölsch and Björn Kriepke and Gohar Kyureghyan
2021/097 ( PDF )
A New and Improved Reduction Proof of Cascade PRF
Mridul Nandi
2021/096 ( PDF )
Gladius: LWR based efficient hybrid public key encryption with distributed decryption
Kelong Cong and Daniele Cozzo and Varun Maram and Nigel P. Smart
2021/095 ( PDF )
Collusion-Deterrent Threshold Information Escrow
Easwar Vivek Mangipudi and Donghang Lu and Aniket Kate
2021/094 ( PDF )
Reducing HSM Reliance in Payments through Proxy Re-Encryption
Sivanarayana Gaddam and Atul Luykx and Rohit Sinha and Gaven Watson
2021/093 ( PDF )
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks
Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
2021/092 ( PDF )
New Public Key Cryptosystem (First Version)
Dieaa I. Nassr and M. Anwar and Hatem M. Bahig
2021/091 ( PDF )
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks
Ilaria Chillotti and Marc Joye and Pascal Paillier
2021/090 ( PDF )
A New Twofold Cornacchia-Type Algorithm and Its Applications
Bei Wang; Yi Ouyang; Honggang Hu ; Songsong Li
2021/089 ( PDF )
Fuzzy Message Detection
Gabrielle Beck and Julia Len and Ian Miers and Matthew Green
2021/088 ( PDF )
An Overview of the Hybrid Argument
Marc Fischlin and Arno Mittelbach
2021/087 ( PDF )
ZEN: An Optimizing Compiler for Verifiable, Zero-Knowledge Neural Network Inferences
Boyuan Feng and Lianke Qin and Zhenfei Zhang and Yufei Ding and Shumo Chu
2021/086 ( PDF )
On Elapsed Time Consensus Protocols
Mic Bowman and Debajyoti Das and Avradip Mandal and Hart Montgomery
2021/085 ( PDF )
Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves
Suhri Kim
2021/084 ( PDF )
Ariadne Thread and Salt: New Multivariate Cryptographic Schemes with Public Keys in Degree 3
Gilles Macario-Rat and Jacques Patarin
2021/083 ( PDF )
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol
Michael Troncoso and Britta Hale
2021/082 ( PDF )
Grades of Trust in Multiparty Computation
Jaskaran V. Singh and Nicholas Hopper
2021/081 ( PDF )
Private Stream Aggregation from Labeled Secret Sharing Schemes
Hendrik Waldner and Tilen Marc and Miha Stopar and Michel Abdalla
2021/080 ( PDF )
Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption
Jan-Pieter D'Anvers and Emmanuela Orsini and Frederik Vercauteren
2021/079 ( PDF )
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM
Kalle Ngo and Elena Dubrova and Qian Guo and Thomas Johansson
2021/078 ( PDF )
An Incentive-Compatible Smart Contract for Decentralized Commerce
Nikolaj I. Schwartzbach
2021/077 ( PDF )
Magnetic RSA
Rémi Géraud-Stewart and David Naccache
2021/076 ( PDF )
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field
Kang Yang and Pratik Sarkar and Chenkai Weng and Xiao Wang
2021/075 ( PDF )
A Generalization of the Subfield Construction
Kamil Otal
2021/074 ( PDF )
Cross-Domain Attribute-Based Access Control Encryption
Mahdi Sedaghat and Bart Preneel
2021/073 ( PDF )
Application of Velusqrt algorithm to Huff's and general Huff's curves
Michał Wroński
2021/072 ( PDF )
Toward Practical Autoencoder-based Side-Channel Analysis Evaluations
Servio Paguada and Lejla Batina and Igor Armendariz
2021/071 ( PDF )
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis
Jorai Rijsdijk and Lichao Wu and Guilherme Perin and Stjepan Picek
2021/070 ( PDF )
Secure, Accurate, and Practical Narrow-Band Ranging System
Aysajan Abidin and Mohieddine El Soussi and Jac Romme and Pepijn Boer and Dave Singelée and Christian Bachmann
2021/069 ( PDF )
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation
Amanda Resende and Davis Railsback and Rafael Dowsley and Anderson C. A. Nascimento and Diego F. Aranha
2021/068 ( PDF )
Banquet: Short and Fast Signatures from AES
Carsten Baum and Cyprien Delpech de Saint Guilhem and Daniel Kales and Emmanuela Orsini and Peter Scholl and Greg Zaverucha
2021/067 ( PDF )
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Michiel Van Beirendonck and Jan-Pieter D’Anvers and Ingrid Verbauwhede
2021/066 ( PDF )
A Deep Learning Approach for Active S-box Prediction of Lightweight Generalized Feistel Block Ciphers
Mohamed Fadl Idris and Je Sen Teh and Jasy Liew Suet Yan and Wei-Zhu Yeoh
2021/065 ( PDF )
FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves
Dorin-Marian Ionita and Emil Simion
2021/064 ( PDF )
Fault Attacks on CCA-secure Lattice KEMs
Peter Pessl and Lukas Prokop
2021/063 ( PDF )
CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing
Monir Azraoui and Solenn Brunet and Sébastien Canard and Aďda Diop and Lélia Eveillard and Alicia Filipiak and Adel Hamdi and Flavie Misarsky and Donald Nokam Kuate and Marie Paindavoine and Quentin Santos and Bastien Vialla
2021/062 ( PDF )
Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3)
Dominique Unruh
2021/061 ( PDF )
A Note on IBE Performance of a Practical Application
Ştefan Maftei and Marius Supuran and Emil Simion
2021/060 ( PDF )
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts
Ran Canetti and Rosario Gennaro and Steven Goldfeder and Nikolaos Makriyannis and Udi Peled
2021/059 ( PDF )
The Cost of Adaptivity in Security Games on Graphs
Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter
2021/058 ( PDF )
A Performance Study of Crypto-Hardware in the Low-end IoT
Peter Kietzmann and Lena Boeckmann and Leandro Lanzieri and Thomas C. Schmidt and Matthias Wählisch
2021/057 ( PDF )
Correlation Intractability vs. One-wayness
Tamer Mour
2021/056 ( PDF )
The Study of Modulo $2^n$
Zhongfeng Niu
2021/055 ( PDF )
Tech Report: Inerial HSMs Thwart Advanced Physical Attacks
Jan Sebastian Götte and Björn Scheuermann
2021/054 ( PDF )
The Cost of IEEE Arithmetic in Secure Computation
David W. Archer and Shahla Atapoor and Nigel P. Smart
2021/053 ( PDF )
On Algebraic Embedding for Unstructured Lattices
Madalina Bolboceanu and Zvika Brakerski and Devika Sharma
2021/052 ( PDF )
Elementary Attestation of Cryptographically Useful Composite Moduli
Rémi Géraud-Stewart and David Naccache
2021/051 ( PDF )
How Much can F5 Really Do
Jintai Ding and Zheng Zhang and Joshua Deaton
2021/050 ( PDF )
The Distinguishing Attack on HFE
Joshua Deaton and Jintai Ding
2021/049 ( PDF )
ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process
Mark D. Aagaard and Nusa Zidaric
2021/048 ( PDF )
Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution
Sohyun Jeon and Hyang-Sook Lee and Jeongeun Park
2021/047 ( PDF )
Evolution of Bulletin Board & its application to E-Voting – A Survey
Misni Harjo Suwito and Yoshifumi Ueshige and Kouichi Sakurai
2021/046 ( PDF )
Efficient Lattice-Based Inner-Product Functional Encryption
Jose Maria Bermudo Mera and Angshuman Karmakar and Tilen Marc and Azam Soleimanian
2021/045 ( PDF )
Banners: Binarized Neural Networks with Replicated Secret Sharing
Alberto Ibarrondo and Hervé Chabanne and Melek Önen
2021/044 ( PDF )
Addra: Metadata-private voice communication over fully untrusted infrastructure
Ishtiyaque Ahmad and Yuntian Yang and Divyakant Agrawal and Amr El Abbadi and Trinabh Gupta
2021/043 ( PDF )
Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields
Madhurima Mukhopadhyay and Palash Sarkar
2021/042 ( PDF )
Correcting Subverted Random Oracles
Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou and Jiadong Zhu
2021/041 ( PDF )
Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot
Panos Kampanakis and Peter Panburana and Michael Curcio and Chirag Shroff and Md Mahbub Alam
2021/040 ( PDF )
On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product
Any Muanalifah and Serge˘ı Sergeev
2021/039 ( PDF )
Practical FHE parameters against lattice attacks
Jung Hee Cheon and Yongha Son and Donggeon Yhee
2021/038 ( PDF )
Streaming Merkle Proofs within Binary Numeral Trees
Luke Champine
2021/037 ( PDF )
New First-Order Secure AES Performance Records
Aein Rezaei Shahmirzadi and Dušan Božilov and Amir Moradi
2021/036 ( PDF )
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
Niluka Amarasinghe and Xavier Boyen and Matthew McKague
2021/035 ( PDF )
Sketches for Blockchains
Ori Rottenstreich
2021/034 ( PDF )
Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF
Nishanth Chandran and Divya Gupta and Akash Shah
2021/033 ( PDF )
Quantum-resistant Anonymous IBE with Traceable Identities
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo and Yu-Chi Chen
2021/032 ( PDF )
Experimental relativistic zero-knowledge proofs
Pouriya Alikhani and Nicolas Brunner and Claude Crépeau and Sébastien Designolle and Raphaël Houlmann and Weixu Shi and Hugo Zbinden
2021/031 ( PDF )
A Comparative Study of Cryptographic Key Distribution Protocols
Alexandru-Ștefan Gheorghieș and Darius-Marian Lăzăroi and Emil Simion
2021/030 ( PDF )
Linear-time and post-quantum zero-knowledge SNARKs for R1CS
Jonathan Lee and Srinath Setty and Justin Thaler and Riad Wahby
2021/029 ( PDF )
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs
Thomas Schneider and Oleksandr Tkachenko
2021/028 ( PDF )
A Side Journey to Titan
Victor LOMNE and Thomas ROCHE
2021/027 ( PDF )
E-voting protocols in context of COVID19
Sfirnaciuc Emilia and Vasilescu Miruna-Elena and Simion Emil
2021/026 ( PDF )
A Gapless Code-Based Hash Proof System based on RQC and its Applications
Slim Bettaieb and Loďc Bidoux and Olivier Blazy and Yann Connan and Philippe Gaborit
2021/025 ( PDF )
FLGUARD: Secure and Private Federated Learning
Thien Duc Nguyen and Phillip Rieger and Hossein Yalame and Helen Möllering and Hossein Fereidooni and Samuel Marchal and Markus Miettinen and Azalia Mirhoseini and Ahmad-Reza Sadeghi and Thomas Schneider and Shaza Zeitouni
2021/024 ( PDF )
PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System
Pedro Hecht
2021/023 ( PDF )
What is Meant by Permissionless Blockchains?
Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Andreas Kern and Walid Fdhila
2021/022 ( PDF )
Increasing Precision of Division Property
Patrick Derbez and Pierre-Alain Fouque
2021/021 ( PDF )
Fake Near Collisions Attacks
Patrick Derbez and Pierre-Alain Fouque and Victor Mollimard
2021/020 ( PDF )
Catching the Fastest Boomerangs - Application to SKINNY
Stéphanie Delaune and Patrick Derbez and Mathieu Vavrille
2021/019 ( PDF )
Kummer versus Montgomery Face-off over Prime Order Fields
Kaushik Nath and Palash Sarkar
2021/018 ( PDF )
Comments on ``On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment''
Yuhao Yang and Xiujie Huang
2021/017 ( PDF )
Lightweight Techniques for Private Heavy Hitters
Dan Boneh and Elette Boyle and Henry Corrigan-Gibbs and Niv Gilboa and Yuval Ishai
2021/016 ( PDF )
Black-Box Uselessness: Composing Separations in Cryptography
Geoffroy Couteau and Pooya Farshim and Mohammad Mahmoody
2021/015 ( PDF )
SoK: Remote Power Analysis
Macarena C. Martínez-Rodríguez and Ignacio M. Delgado-Lozano and Billy Bob Brumley
2021/014 ( -- withdrawn -- )
Efficient Multilinear Map from Graded Encoding Scheme
Majid Salimi
2021/013 ( PDF )
An atlas of the Richelot isogeny graph
Enric Florit and Benjamin Smith
2021/012 ( PDF )
Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph
Enric Florit and Benjamin Smith
2021/011 ( PDF )
Complete solution over $\GF{p^n}$ of the equation $X^{p^k+1}+X+a=0$
Kwang Ho Kim and Jong Hyok Choe and Sihem Mesnager
2021/010 ( PDF )
Compcrypt -- Lightweight ANS-based Compression and Encryption
Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk
2021/009 ( PDF )
Demand-aware Channel Topologies for Off-chain Blockchain Payments
Julia Khamis and Ori Rottenstreich
2021/008 ( PDF )
A Family of Nonlinear MDS Diffusion Layers over $\mathbb{F}_{2^{4n}}$
M. R. Mirzaee Shamsabad and S. M. Dehnavi
2021/007 ( PDF )
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Cheng-Yi Lee
2021/006 ( PDF )
Privacy-Preserving Privacy Profile Proposal Protocol
Wyatt Howe and Andrei Lapets
2021/005 ( PDF )
Aggregatable Distributed Key Generation
Kobi Gurkan and Philipp Jovanovic and Mary Maller and Sarah Meiklejohn and Gilad Stern and Alin Tomescu
2021/004 ( PDF )
LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions
Ismail San
2021/003 ( PDF )
Ciphertext Policy Attribute Based Encryption for Arithmetic circuits
Mahdi Mahdavi Oliaee and Zahra Ahmadian
2021/002 ( PDF )
Can Lattice Signature be as Efficient as Lattice Encryption?
Dingfeng Ye
2021/001 ( PDF )
2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product
Michel Abdalla and David Pointcheval and Azam Soleimanian


[ Cryptology ePrint archive ]