Cryptology ePrint Archive: Listing for 2019


2019/1060 ( PDF )
Sharing the LUOV: Threshold Post-Quantum Signatures
Daniele Cozzo and Nigel P. smart
2019/1059 ( PDF )
A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem
Daniele Di Tullio and Ankan Pal
2019/1058 ( PDF )
Privacy-preserving auditable token payments in a permissioned blockchain system
Elli Androulaki and Jan Camenisch and Angelo De Caro and Maria Dubovitskaya and Kaoutar Elkhiyaoui and Bjoern Tackmann
2019/1057 ( PDF )
A Study of Persistent Fault Analysis
Andrea Caforio and Subhadeep Banik
2019/1056 ( PDF )
Adventures in Supersingularland
Sarah Arpin and Catalina Camacho-Navarro and Kristin Lauter and Joelle Lim and Kristina Nelson and Travis Scholl and Jana Sotáková
2019/1055 ( PDF )
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk
2019/1054 ( PDF )
Truthful and Faithful Monetary Policy for a Stablecoin Conducted by a Decentralised, Encrypted Artificial Intelligence
David Cerezo Sánchez
2019/1053 ( PDF )
Modeling Memory Faults in Signature and Encryption Schemes
Marc Fischlin and Felix Günther
2019/1052 ( PDF )
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem
Abderrahmane Nitaj and Willy Susilo and Joseph Tonien
2019/1051 ( PDF )
A New Public Key Cryptosystem Based on Edwards Curves
Maher Boudabra and Abderrahmane Nitaj
2019/1050 ( PDF )
A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem
Abderrahmane Nitaj and Emmanuel Fouotsa
2019/1049 ( PDF )
CrypTFlow: Secure TensorFlow Inference
Nishant Kumar and Mayank Rathee and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma
2019/1048 ( PDF )
A new elliptic curve point compression method based on $\mathbb{F}_{\!p}$-rationality of some generalized Kummer surfaces
Dmitrii Koshelev
2019/1047 ( PDF )
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS
Alessandro Chiesa and Yuncong Hu and Mary Maller and Pratyush Mishra and Noah Vesely and Nicholas Ward
2019/1046 ( PDF )
The Function-Inversion Problem: Barriers and Opportunities
Henry Corrigan-Gibbs and Dmitry Kogan
2019/1045 ( PDF )
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank
Josh Alman and Robin Hui
2019/1044 ( PDF )
Verifiable Registration-Based Encryption
Rishab Goyal and Satyanarayana Vusirikala
2019/1043 ( PDF )
Breaking the Bluetooth Pairing – The Fixed Coordinate Invalid Curve Attack
Eli Biham and Lior Neumann
2019/1042 ( PDF )
A Machine-Checked Proof of Security for AWS Key Management Service
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Matthew Campagna and Ernie Cohen and Benjamin Gregoire and Vitor Pereira and Bernardo Portela and Pierre-Yves Strub and Serdar Tasiran
2019/1041 ( PDF )
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Swapnil Paliwal and Anvita Chandrakar
2019/1040 ( PDF )
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
Abhishek Chakraborty and Ankur Srivastava
2019/1039 ( PDF )
Accelerated V2X provisioning with Extensible Processor Platform
Henrique S. Ogawa and Thomas E. Luther and Jefferson E. Ricardini and Helmiton Cunha and Marcos Simplicio Jr. and Diego F. Aranha and Ruud Derwig and Harsh Kupwade-Patil
2019/1038 ( PDF )
Dynamic Searchable Encryption with Access Control
Johannes Blömer and Nils Löken
2019/1037 ( PDF )
Card-based Cryptography Meets Formal Verification
Alexander Koch and Michael Schrempp and Michael Kirsten
2019/1036 ( PDF )
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Kazuki Yoneyama
2019/1035 ( PDF )
An LLL Algorithm for Module Lattices
Changmin Lee and Alice Pellet-Mary and Damien Stehlé and Alexandre Wallet
2019/1034 ( PDF )
Sponges Resist Leakage: The Case of Authenticated Encryption
Jean Paul Degabriele and Christian Janson and Patrick Struck
2019/1033 ( PDF )
Anonymous AE
John Chan and Phillip Rogaway
2019/1032 ( PDF )
On Fully Secure MPC with Solitary Output
Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Nikolaos Makriyannis and Tal Rabin
2019/1031 ( PDF )
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice
Rahim Toluee and Taraneh Eghlidos
2019/1030 ( PDF )
How to leverage hardness of constant degree expanding polynomials over R to build iO
Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai
2019/1029 ( PDF )
Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures
Yilei Chen and Nicholas Genise and Pratyay Mukherjee
2019/1028 ( PDF )
Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors
Divesh Aggarwal and Bogdan Ursu and Serge Vaudenay
2019/1027 ( PDF )
Quantum LLL with an Application to Mersenne Number Cryptosystems
Marcel Tiepelt and Alan Szepieniec
2019/1026 ( PDF )
Efficient Tightly-Secure Structure-Preserving Signatures and Unbounded Simulation-Sound QA-NIZK Proofs
Mojtaba Khalili and Daniel Slamanig
2019/1025 ( PDF )
On Perfect Correctness without Derandomization
Gilad Asharov and Naomi Ephraim and Ilan Komargodski and Rafael Pass
2019/1024 ( PDF )
Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix (extended abstract)
Dor Bitan and Shlomi Dolev
2019/1023 ( PDF )
Randomly Rotate Qubits Compute and Reverse --- IT-Secure Non-Interactive Fully-Compact Homomorphic Quantum Computations over Classical Data Using Random Bases
Dor Bitan and Shlomi Dolev
2019/1022 ( PDF )
A Simple Key Reuse Attack on Ntru Cryptosystem
Jintai Ding and Joshua Deaton and Zheng Zhang and Kurt Schmidt and Vishakha
2019/1021 ( PDF )
Halo: Recursive Proof Composition without a Trusted Setup
Sean Bowe and Jack Grigg and Daira Hopwood
2019/1020 ( PDF )
Transparent Polynomial Commitment Scheme with Polylogarithmic Communication Complexity
Alexander Vlasov and Konstantin Panarin
2019/1019 ( PDF )
Revisiting the Hybrid attack on sparse and ternary secret LWE
Yongha Son and Jung Hee Cheon
2019/1018 ( PDF )
Towards Instantiating the Algebraic Group Model
Julia Kastner and Jiaxin Pan
2019/1017 ( PDF )
The Local Forking Lemma and its Application to Deterministic Encryption
Mihir Bellare and Wei Dai and Lucy Li
2019/1016 ( PDF )
Quantum Algorithms for the Approximate $k$-List Problem and their Application to Lattice Sieving
Elena Kirshanova and Erik Mĺrtensson and Eamonn W. Postlethwaite and Subhayan Roy Moulik
2019/1015 ( PDF )
Bootstrapping Consensus Without Trusted Setup: Fully Asynchronous Distributed Key Generation
Eleftherios Kokoris-Kogias and Alexander Spiegelman and Dahlia Malkhi and Ittai Abraham
2019/1014 ( PDF )
Security Reductions for White-Box Key-Storage in Mobile Payments
Estuardo Alpirez Bock and Chris Brzuska and Marc Fischlin and Christian Janson and Wil Michiels
2019/1013 ( PDF )
A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules')
Carolyn Whitnall and Elisabeth Oswald
2019/1012 ( PDF )
Simple and Efficient KDM-CCA Secure Public Key Encryption
Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka
2019/1011 ( PDF )
Compact and Scalable Arbitrary-centered Discrete Gaussian Sampling over Integers
Raymond K. Zhao and Ron Steinfeld and Amin Sakzad
2019/1010 ( PDF )
On Perfect Correctness in (Lockable) Obfuscation
Rishab Goyal and Venkata Koppula and Satyanarayana Vusirikala and Brent Waters
2019/1009 ( PDF )
LLL and stochastic sandpile models
Jintai Ding and Seungki Kim and Tsuyoshi Takagi and Yuntao Wang
2019/1008 ( PDF )
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations
Olivier Bronchain and François-Xavier Standaert
2019/1007 ( PDF )
SPAE a mode of operation for AES on low-cost hardware
Philippe Elbaz-Vincent and Cyril Hugounenq and Sébastien Riou
2019/1006 ( PDF )
Lucente Stabile Atkins (LSA) Cryptosystem (Unbreakable)
Francesco Lucente Stabile and Carey Patrick Atkins
2019/1005 ( PDF )
Threshold Implementations in the Robust Probing Model
Siemen Dhooghe and Svetla Nikova and Vincent Rijmen
2019/1004 ( PDF )
Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages
Elena Andreeva and Virginie Lallemand and Antoon Purnal and Reza Reyhanitabar and Arnab Roy and Damian Vizar
2019/1003 ( PDF )
Twisted Hessian Isogenies
Thinh Dang and Dustin Moody
2019/1002 ( PDF )
Boomerang Uniformity of Popular S-box Constructions
Shizhu Tian and Christina Boura and Léo Perrin
2019/1001 ( PDF )
Middle-Product Learning with Rounding Problem and its Applications
Shi Bai and Katharina Boudgoust and Dipayan Das and Adeline Roux-Langlois and Weiqiang Wen and Zhenfei Zhang
2019/1000 ( PDF )
Security of Symmetric Primitives against Key-Correlated Attacks
Aisling Connolly and Pooya Farshim and Georg Fuchsbauer
2019/999 ( PDF )
On the Fast Algebraic Immunity of Majority Functions
Pierrick Méaux
2019/998 ( PDF )
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation
Arpita Patra and Divya Ravi
2019/997 ( PDF )
On the (In)security of Kilian-Based SNARGs
James Bartusek and Liron Bronfman and Justin Holmgren and Fermi Ma and Ron Rothblum
2019/996 ( PDF )
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG
Shaanan Cohney and Andrew Kwong and Shachar Paz and Daniel Genkin and Nadia Heninger and Eyal Ronen and Yuval Yarom
2019/995 ( PDF )
Blackbox Constructions from Mix-Nets
Douglas Wikström
2019/994 ( PDF )
A new family of APN quadrinomials
Lilya Budaghyan and Tor Helleseth and Nikolay Kaleyski
2019/993 ( PDF )
Private Set Relations with Bloom Filters for Outsourced SLA Validation
Louis Tajan and Dirk Westhoff and Frederik Armknecht
2019/992 ( PDF )
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms
Tetsu Iwata and Mustafa Khairallah and Kazuhiko Minematsu and Thomas Peyrin
2019/991 ( PDF )
Vectorized linear approximations for attacks on SNOW 3G
Jing Yang and Thomas Johansson and Alexander Maximov
2019/990 ( PDF )
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More
Sanjam Garg and Mohammad Hajiabadi and Rafail Ostrovsky
2019/989 ( PDF )
Substitution Attacks against Message Authentication
Marcel Armour and Bertram Poettering
2019/988 ( PDF )
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications
David W. Archer and Jose Manuel Calderon Trilla and Jason Dagit and Alex J. Malozemoff and Yuriy Polyakov and Kurt Rohloff and Gerard Ryan
2019/987 ( PDF )
Subverting Decryption in AEAD
Marcel Armour and Bertram Poettering
2019/986 ( PDF )
Outpost: A Responsive Lightweight Watchtower
Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer
2019/985 ( PDF )
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts
Philipp Schindler and Aljosha Judmayer and Nicholas Stifter and Edgar Weippl
2019/984 ( PDF )
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions
Sam Kim and David J. Wu
2019/983 ( PDF )
Graph Similarity and Its Applications to Hardware Security
Marc Fyrbiak and Sebastian Wallat and Sascha Reinhard and Nicolai Bissantz and Christof Paar
2019/982 ( PDF )
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions
Toi Tomita and Wakaha Ogata adn Kaoru Kurosawa and Ryo Kuwayama
2019/981 ( PDF )
Traceback for End-to-End Encrypted Messaging
Nirvan Tyagi and Ian Miers and Thomas Ristenpart
2019/980 ( PDF )
New Approaches to Traitor Tracing with Embedded Identities
Rishab Goyal and Venkata Koppula and Brent Waters
2019/979 ( PDF )
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks
Kalikinkar Mandal and Guang Gong
2019/978 ( PDF )
Deep Learning Model Generalization in Side-Channel Analysis
Guilherme Perin
2019/977 ( PDF )
Non-malleable Zero-Knowledge Arguments with Lower Round Complexity
Zhenbin Yan and Yi Deng
2019/976 ( PDF )
Towards real-time hidden speaker recognition by means of fully homomorphic encryption
Martin Zuber and Sergiu Carpov and Renaud Sirdey
2019/975 ( PDF )
Ci-Lock: Cipher Induced Logic Locking Resistant Against SAT Attacks
Akashdeep Saha and Sayandeep Saha and Debdeep Mukhopadhyay and Bhargab Bikram Bhattacharya
2019/974 ( PDF )
Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE
Abdelrahaman Aly and Emmanuela Orsini and Dragos Rotaru and Nigel P. Smart and Tim Wood
2019/973 ( PDF )
On the Non-Existence of Short Vectors in Random Module Lattices
Ngoc Khanh Nguyen
2019/972 ( PDF )
Noninteractive Zero Knowledge Proof System for NP from Ring LWE
Wenping MA
2019/971 ( PDF )
Verifpal: Cryptographic Protocol Analysis for Students and Engineers
Nadim Kobeissi
2019/970 ( -- withdrawn -- )
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol
Xinyu Li and Jing Xu and Xiong Fan and Yuchen Wang and Zhenfeng Zhang
2019/969 ( PDF )
Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography
Russell W. F. Lai and Giulio Malavolta and Viktoria Ronge
2019/968 ( PDF )
There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero
William Black and Ryan Henry
2019/967 ( PDF )
On NIST's Compression Estimate Test
Prasanna Raghaw Mishra and Bhartendu Nandan and Navneet Gaba
2019/966 ( PDF )
Fast, Compact, and Expressive Attribute-Based Encryption
Junichi Tomida and Yuto Kawahara and Ryo Nishimaki
2019/965 ( PDF )
On-Demand Ratcheting with Security Awareness
Andrea Caforio and F Betül Durak and Serge Vaudenay
2019/964 ( PDF )
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited
Georg Fuchsbauer
2019/963 ( PDF )
Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits
Pascal Aubry and Sergiu Carpov and Renaud Sirdey
2019/962 ( PDF )
New Constructions of Hinting PRGs, OWFs with Encryption, and more
Rishab Goyal and Satyanarayana Vusirikala and Brent Waters
2019/961 ( PDF )
Computing across Trust Boundaries using Distributed Homomorphic Cryptography
Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Pierre Hubaux
2019/960 ( PDF )
Another Look at Key Randomisation Hypotheses
Subhabrata Samajder and Palash Sarkar
2019/959 ( PDF )
Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography
Seungkwang Lee and Myungchul Kim
2019/958 ( PDF )
Using SMT Solvers to Automate Chosen Ciphertext Attacks
Gabrielle Beck and Maximilian Zinkus and Matthew Green
2019/957 ( PDF )
TaaS: Commodity MPC via Triples-as-a-Service
Nigel P. Smart and Titouan Tanguy
2019/956 ( PDF )
Security of Hedged Fiat-Shamir Signatures under Fault Attacks
Diego F. Aranha and Claudio Orlandi and Akira Takahashi and Greg Zaverucha
2019/955 ( PDF )
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications
Antonio Faonio and Dario Fiore and Javier Herranz and Carla Rŕfols
2019/954 ( PDF )
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Mohsen Jahanbani and Zeinolabedin Norouzi and Nasour Bagheri
2019/953 ( PDF )
PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge
Ariel Gabizon and Zachary J. Williamson and Oana Ciobotaru
2019/952 ( PDF )
Non-Interactive Zero Knowledge Proofs in the Random Oracle Model
Vincenzo Iovino and Ivan Visconti
2019/951 ( PDF )
Collisions on Feistel-MiMC and univariate GMiMC
Xavier Bonnetain
2019/950 ( PDF )
Another look at some isogeny hardness assumptions
Simon-Philipp Merz and Romy Minko and Christophe Petit
2019/949 ( PDF )
A Note on Parameter Choices of Round5
Yongha Son
2019/948 ( PDF )
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
Prasanna Ravi and Sujoy Sinha Roy and Anupam Chattopadhyay and Shivam Bhasin
2019/947 ( PDF )
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
Fabian Boemer and Anamaria Costache and Rosario Cammarota and Casimir Wierzynski
2019/946 ( PDF )
Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design
M Sazadur Rahman and Adib Nahiyan and Sarah Amir and Fahim Rahman and Farimah Farahmandi and Domenic Forte and Mark Tehranipoor
2019/945 ( PDF )
A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting
Navid Ghaedi Bardeh
2019/944 ( PDF )
Efficient zero-knowledge arguments in the discrete log setting, revisited
Max Hoffmann and Michael Klooß and Andy Rupp
2019/943 ( PDF )
Analysis of Nakamoto Consensus
Ling Ren
2019/942 ( PDF )
Ouroboros Clepsydra: Ouroboros Praos in the Universally Composable Relative Time Model
Handan Kılınç Alper
2019/941 ( PDF )
Does "www." Mean Better Transport Layer Security?
Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
2019/940 ( PDF )
Security analysis of two lightweight certi ficateless signature schemes
Nasrollah Pakniat
2019/939 ( PDF )
Homomorphic Encryption Standard
Martin Albrecht and Melissa Chase and Hao Chen and Jintai Ding and Shafi Goldwasser and Sergey Gorbunov and Shai Halevi and Jeffrey Hoffstein and Kim Laine and Kristin Lauter and Satya Lokam and Daniele Micciancio and Dustin Moody and Travis Morrison and Amit Sahai and Vinod Vaikuntanathan
2019/938 ( PDF )
Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem
Gaëtan Leurent and Ferdinand Sibleyras
2019/937 ( PDF )
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers
Sayandeep Saha and Debapriya Basu Roy and Arnab Bag and Sikhar Patranabis and Debdeep Mukhopadhyay
2019/936 ( PDF )
SNEIK on Microcontrollers: AVR, ARMv7-M, and RISC-V with Custom Instructions
Markku-Juhani O. Saarinen
2019/935 ( -- withdrawn -- )
Interpretable Encrypted Searchable Neural Networks
Kai Chen; Zhongrui Lin; Jian Wan; Chungen Xu.
2019/934 ( PDF )
Linear Approximations of Random Functions and Permutations
Mohsin Khan and Kaisa Nyberg
2019/933 ( PDF )
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy
Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen
2019/932 ( PDF )
Related-key Differential Cryptanalysis of Full Round CRAFT
Muhammad ElSheikh and Amr M. Youssef
2019/931 ( PDF )
Low Weight Discrete Logarithms and Subset Sum in $2^{0.65n}$ with Polynomial Memory
Andre Esser and Alexander May
2019/930 ( PDF )
Module-LWE versus Ring-LWE, Revisited
Yang Wang and Mingqiang Wang
2019/929 ( PDF )
On the Degree-Insensitive SI-GDH problem and assumption
Samuel Dobson and Steven D. Galbraith
2019/928 ( PDF )
Blockchain-enabled Cryptographically-secure Hardware Obfuscation
Fatemeh Ganji and Shahin Tajik and Domenic Forte and Jean-Pierre Seifert
2019/927 ( PDF )
Isogeny-based hashing despite known endomorphisms
Lorenz Panny
2019/926 ( PDF )
Formal Verification of a Constant-Time Preserving C Compiler
Gilles Barthe and Sandrine Blazy and Benjamin Grégoire and Rémi Hutin and Vincent Laporte and David Pichardie and Alix Trieu
2019/925 ( PDF )
Traceable and linkable ring signatures, traceable range proofs and applications on regulatable privacy-preserving blockchains
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2019/924 ( PDF )
Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework
Dirk Achenbach and Roland Gröll and Timon Hackenjos and Alexander Koch and Bernhard Löwe and Jeremias Mechler and Jörn Müller-Quade and Jochen Rill
2019/923 ( PDF )
Automated Probe Repositioning for On-Die EM Measurements
Bastian Richter and Alexander Wild and Amir Moradi
2019/922 ( PDF )
A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation
Karim Eldefrawy and Vitor Pereira
2019/921 ( PDF )
Tree authenticated ephemeral keys
Pavol Zajac
2019/920 ( PDF )
Related-Key Differential Slide Attack Against Fountain V1
Raluca Posteuca
2019/919 ( PDF )
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection
Wei Cheng and Claude Carlet and Kouassi Goli and Sylvain Guilley and Jean-Luc Danger
2019/918 ( PDF )
Resolving the Trilemma in Logic Encryption
Hai Zhou and Amin Rezaei and Yuanqi Shen
2019/917 ( PDF )
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
Shixiong Wang and Juanyang Zhang and Jingnan He and Huaxiong Wang and Chao Li
2019/916 ( -- withdrawn -- )
Multi-owner Secure Encrypted Search Using Searching Adversarial Networks
Kai Chen; Zhongrui Lin; Jian Wan; Lei Xu; Chungen Xu.
2019/915 ( PDF )
Unique Rabin-Williams Signature Scheme Decryption
Lynn Margaret Batten and Hugh Cowie Williams
2019/914 ( PDF )
Composable and Finite Computational Security of Quantum Message Transmission
Fabio Banfi and Ueli Maurer and Christopher Portmann and Jiamin Zh
2019/913 ( PDF )
Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — A Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography
Wen-Ran Zhang
2019/912 ( PDF )
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting
David Derler and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks
2019/911 ( PDF )
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
Gildas Avoine and Sébastien Canard and Loďc Ferreira
2019/910 ( PDF )
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto
Tobias Schneider and Clara Paglialonga and Tobias Oder and Tim Güneysu
2019/909 ( PDF )
A Practicable Timing Attack Against HQC and its Countermeasure
Guillaume Wafo-Tapa and Slim Bettaieb and Loic Bidoux and Philippe Gaborit
2019/908 ( PDF )
Simulation-Sound Proofs for LWE and Applications to KDM-CCA2 Security
Benoît Libert and Khoa Nguyen and Alain Passelčgue and Radu Titiu
2019/907 ( PDF )
Practical Forgery Attacks on Limdolen and HERN
Raghvendra Rohit and Guang Gong
2019/906 ( PDF )
Efficient and secure software implementations of Fantomas
Rafael J. Cruz and Antonio Guimarăes and Diego F. Aranha
2019/905 ( -- withdrawn -- )
The Power of NIST Cryptographic Tests Suite
Paul Burciu and Emil Simion
2019/904 ( PDF )
Timed-Release Encryption With Master Time Bound Key (Full Version)
Gwangbae Choi and Serge Vaudenay
2019/903 ( PDF )
Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases
Igor Semaev and Andrea Tenti
2019/902 ( PDF )
Fractional LWE: a nonlinear variant of LWE
Gérald Gavin and Stéphane Bonnevay
2019/901 ( PDF )
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs
Thomas Haines and Clementine Gritti
2019/900 ( -- withdrawn -- )
Multi-client Secure Encrypted Search Using Searching Adversarial Networks
Kai Chen; Zhongrui Lin; Jian Wan; Lei Xu; Chungen Xu.
2019/899 ( PDF )
A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P
Michael Yonli
2019/898 ( PDF )
One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips
Mehdi Tibouchi and Alexandre Wallet
2019/897 ( PDF )
On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem
Vasyl Ustimenko
2019/896 ( PDF )
On the optionality and fairness of Atomic Swaps
Runchao Han and Haoyu Lin and Jiangshan Yu
2019/895 ( PDF )
The Singularity Attack to the Multivariate Signature Scheme Himq-3
Jintai Ding and Zheng Zhang and Joshua Deaton and Vishakha
2019/894 ( PDF )
BioID: a Privacy-Friendly Identity Document
Fatih Balli and F. Betül Durak and Serge Vaudenay
2019/893 ( PDF )
New Efficient, Constant-Time Implementations of Falcon
Thomas Pornin
2019/892 ( PDF )
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
Patrick Kresmer and Alexander Zeh
2019/891 ( PDF )
The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking Blockchains
Vincenzo Botta and Daniele Friolo and Daniele Venturi and Ivan Visconti
2019/890 ( PDF )
Extending the Adaptive Attack to 2-SIDH
Samuel Dobson and Steven D. Galbraith and Jason LeGrow and Yan Bo Ti and Lukas Zobernig
2019/889 ( PDF )
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Anders Dalskov and Marcel Keller and Claudio Orlandi and Kris Shrishak and Haya Shulman
2019/888 ( PDF )
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed
Mustafa Khairallah
2019/887 ( PDF )
Accelerating V2X Cryptography through Batch Operations
Paul Bottinelli and Robert Lambert
2019/886 ( PDF )
Round Complexity of Byzantine Agreement, Revisited
T-H. Hubert Chan and Rafael Pass and Elaine Shi
2019/885 ( PDF )
On the alpha value of polynomials in the tower number field sieve algorithm
Aurore Guillevic and Shashank Singh
2019/884 ( PDF )
Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures
Mahesh Sreekumar Rajasree
2019/883 ( PDF )
HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication
Donghang Lu and Thomas Yurek and Samarth Kulshreshtha and Rahul Govind and Rahul Mahadev and Aniket Kate and Andrew Miller
2019/882 ( PDF )
Modifying The Tropical Version of Stickel’s Key Exchange Protocol
Any Muanalifah and Serge˘ı Sergeev
2019/881 ( PDF )
On the Boomerang Uniformity of some Permutation Polynomials
Marco Calderini and Irene Villa
2019/880 ( PDF )
A Blockchain-Based Access Control Scheme for Smart Grids
Yuyang Zhou and Yuanfeng Guan and Zhiwei Zhang and Fagen Li
2019/879 ( PDF )
Cryptanalysis of Subterranean-SAE
Fukang Liu and Takanori Isobe and Willi Meier
2019/878 ( PDF )
Algebraically Structured LWE, Revisited
Chris Peikert and Zachary Pepin
2019/877 ( PDF )
Blind Schnorr Signatures in the Algebraic Group Model
Georg Fuchsbauer and Antoine Plouviez and Yannick Seurin
2019/876 ( PDF )
Kadcast: A Structured Approach to Broadcast in Blockchain Networks
Elias Rohrer and Florian Tschorsch
2019/875 ( PDF )
Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication
Daan Leermakers and Boris Skoric
2019/874 ( PDF )
Attribute-Based Encryption with Functional Keyword Search in Fog Computing
Fei Meng and Mingqiang Wang
2019/873 ( PDF )
Count of rotational symmetric bent Boolean functions
Shashi Kant Pandey and P.R. Mishra
2019/872 ( PDF )
Efficient Information-Theoretic Secure Multiparty Computation over $\mathbb{Z}/p^k \mathbb{Z}$ via Galois Rings
Mark Abspoel and Ronald Cramer and Ivan Damgĺrd and Daniel Escudero and Chen Yuan
2019/871 ( PDF )
Non-Locality and Zero-Knowledge MIPs
Claude Crépeau and Nan Yang
2019/870 ( PDF )
The Eleventh Power Residue Symbol
Marc Joye and Oleksandra Lapiha and Ky Nguyen and David Naccache
2019/869 ( PDF )
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
Aritra Dhar and Enis Ulqinaku and Kari Kostiainen and Srdjan Capkun
2019/868 ( PDF )
On the Round Complexity of Randomized Byzantine Agreement
Ran Cohen and Iftach Haitner and Nikolaos Makriyannis and Matan Orland and Alex Samorodnitsky
2019/867 ( PDF )
A Practical Forgery Attack on Lilliput-AE
Orr Dunkelman and Nathan Keller and Eran Lambooij and Yu Sasaki
2019/866 ( PDF )
A Fast Characterization Method for Optical Fault Injection
Lichao Wu and Gerard Ribera and Stjepan Picek
2019/865 ( PDF )
Cryptanalysis of Reduced-Round SipHash
Le He and Hongbo Yu
2019/864 ( -- withdrawn -- )
Another Look at Byzantine Fault Tolerance
Yongge Wang
2019/863 ( PDF )
Fast Actively Secure Five-Party Computation with Security Beyond Abort
Megha Byali and Carmit Hazay and Arpita Patra and Swati Singla
2019/862 ( PDF )
Key recovery attacks on the Legendre PRFs within the birthday bound
Dmitry Khovratovich
2019/861 ( PDF )
A Tale of Three Signatures: practical attack of ECDSA with wNAF
Gabrielle De Micheli and Rémi Piau and Cécile Pierrot
2019/860 ( PDF )
Machine learning and side channel analysis in a CTF competition
Yongbo Hu and Yeyang Zheng and Pengwei Feng and Lirui Liu and Chen Zhang and Aron Gohr and Sven Jacob and Werner Schindler and Ileana Buhan and Karim Tobich
2019/859 ( PDF )
A Coin-Free Oracle-Based Augmented Black Box Framework
Kyosuke Yamashita and Mehdi Tibouchi and Masayuki Abe
2019/858 ( PDF )
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH
Eric Crockett and Christian Paquin and Douglas Stebila
2019/857 ( PDF )
Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies
Karl Wüst and Loris Diana and Kari Kostiainen and Ghassan Karame and Sinisa Matetic and Srdjan Capkun
2019/856 ( PDF )
More results on Shortest Linear Programs
Subhadeep Banik and Yuki Funabiki and Takanori Isobe
2019/855 ( PDF )
WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery
Dominic Dams and Jeff Lataille and Rino Sanchez and John Wade
2019/854 ( PDF )
Reducing the Cost of Implementing AES as a Quantum Circuit
Brandon Langenberg and Hai Pham and Rainer Steinwandt
2019/853 ( PDF )
A critique of game-based definitions of receipt-freeness for voting
Ashley Fraser and Elizabeth A. Quaglia and Ben Smyth
2019/852 ( PDF )
Weak-Key Subspace Trails and Applications to AES
Lorenzo Grassi and Gregor Leander and Christian Rechberger and Cihangir Tezcan and Friedrich Wiemer
2019/851 ( PDF )
On Designing Lightweight RFID Security Protocols for Medical IoT
Masoumeh Safkhani and Ygal Bendavid and Samad Rostampour and Nasour Bagheri
2019/850 ( PDF )
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles
Morteza Adeli and Nasour Bagheri
2019/849 ( PDF )
Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems
Ambili K N and Jimmy Jose
2019/848 ( PDF )
Observations on the DLCT and Absolute Indicators
Anne Canteaut and Lukas Kölsch and Friedrich Wiemer
2019/847 ( PDF )
Improved Heuristics for Short Linear Programs
Quan Quan Tan and Thomas Peyrin
2019/846 ( PDF )
Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions
Yuechen Chen and Linru Zhang and Siu-Ming Yiu
2019/845 ( PDF )
A Reaction Attack against Cryptosystems based on LRPC Codes
Simona Samardjiska and Paolo Santini and Edoardo Persichetti and Gustavo Banegas
2019/844 ( PDF )
pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4
Matthias J. Kannwischer and Joost Rijneveld and Peter Schwabe and Ko Stoffelen
2019/843 ( PDF )
How to Construct CSIDH on Edwards Curves
Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi
2019/842 ( PDF )
Improved SIMD Implementation of Poly1305
Sreyosi Bhattacharyya and Palash Sarkar
2019/841 ( PDF )
Practical Cryptanalysis of k-ary C*
Daniel Smith-Tone
2019/840 ( PDF )
A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function to TPMS
Yuhei Watanabe and Hideki Yamamoto and Hirotaka Yoshida
2019/839 ( PDF )
Statistical Zap Arguments from Quasi-Polynomial LWE
Abhishek Jain and Zhengzhong Jin
2019/838 ( PDF )
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake
Christian Badertscher and Peter Gaži and Aggelos Kiayias and Alexander Russell and Vassilis Zikas
2019/837 ( PDF )
Stronger and Faster Side-Channel Protections for CSIDH
Daniel Cervantes-Vázquez and Mathilde Chenu and Jesús-Javier Chi-Domínguez and Luca De Feo and Francisco Rodríguez-Henríquez and Benjamin Smith
2019/836 ( PDF )
Optimizing Transport Layer for Secure Computation
Markus Brandt and Claudio Orlandi and Kris Shrishak and Haya Shulman
2019/835 ( PDF )
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
Karl Wüst and Sinisa Matetic and Silvan Egli and Kari Kostiainen and Srdjan Capkun
2019/834 ( PDF )
Succinct Arguments in the Quantum Random Oracle Model
Alessandro Chiesa and Peter Manohar and Nicholas Spooner
2019/833 ( PDF )
AES MixColumn with 92 XOR gates
Alexander Maximov
2019/832 ( PDF )
Asymptotically-Good Arithmetic Secret Sharing over Z/(p^\ell Z) with Strong Multiplication and Its Applications to Efficient MPC
Ronald Cramer and Matthieu Rambaud and Chaoping Xing
2019/831 ( PDF )
Privacy of Stateful RFID Systems with Constant Tag Identifiers
Cristian Hristea and Ferucio Laurentiu Tiplea
2019/830 ( PDF )
The Simplest Multi-key Linearly Homomorphic Signature Scheme
Diego F. Aranha and Elena Pagnin
2019/829 ( PDF )
Batch Binary Weierstrass
Billy Bob Brumley and Sohaib ul Hassan and Alex Shaindlin and Nicola Tuveri and Kide Vuojärvi
2019/828 ( PDF )
Optimal Collision Side-Channel Attacks
Cezary Glowacz and Vincent Grosso
2019/827 ( PDF )
k-root-n: An efficient O(√n) algorithm for avoiding short term double spending in Distributed Ledger Technologies such as Blockchain
Zvi Schreiber
2019/826 ( PDF )
Modular Multiplication Algorithm Suitable For Low-Latency Circuit Implementations
Erdinç Öztürk
2019/825 ( PDF )
Plaintext Recovery Attacks against XTS Beyond Collisions
Takanori Isobe and Kazuhiko Minematsu
2019/824 ( PDF )
Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look
Behnaz Rezvani and William Diehl
2019/823 ( PDF )
Securely Sampling Biased Coins with Applications to Differential Privacy
Jeffrey Champion and abhi shelat and Jonathan Ullman
2019/822 ( PDF )
Surveying definitions of coercion resistance
Ben Smyth
2019/821 ( PDF )
Towards Forward Secure Internet Traffic
Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
2019/820 ( PDF )
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query
Asma Aloufi and Peizhao Hu and Hang Liu and Sherman S. M. Chow
2019/819 ( PDF )
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption
Asma Aloufi and Peizhao Hu and Harry W. H. Wong and Sherman S. M. Chow
2019/818 ( PDF )
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
Debayan Das and Anupam Golder and Josef Danial and Santosh Ghosh and Arijit Raychowdhury and Shreyas Sen
2019/817 ( PDF )
Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions
Tapas Pal and Ratna Dutta
2019/816 ( PDF )
Crisis: Probabilistically Self Organizing Total Order in Unstructured P2P Networks
Mirco Richter
2019/815 ( PDF )
A Note on the Static-Static Key Agreement Protocol from Supersingular Isogenies
Selçuk Kayacan
2019/814 ( PDF )
Faster Subgroup Checks for BLS12-381
Sean Bowe
2019/813 ( PDF )
Multi-Client Symmetric Searchable Encryption with Forward Privacy
Alexandros Bakas and Antonis Michalas
2019/812 ( PDF )
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
Chaoyun Li and Bart Preneel
2019/811 ( PDF )
SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage
Ioannis Demertzis and Dimitrios Papadopoulos and Charalampos Papamanthou and Saurabh Shintre
2019/810 ( PDF )
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs
Jeroen Delvaux
2019/809 ( PDF )
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
Yosuke Todo and Willi Meier and Kazumaro Aoki
2019/808 ( PDF )
2-Message Publicly Verifiable WI from (Subexponential) LWE
Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs
2019/807 ( PDF )
Provable Security for PKI Schemes
Hemi Leibowitz and Amir Herzberg and Ewa Syta
2019/806 ( PDF )
Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes
Eugene Pilyankevich and Dmytro Kornieiev and Artem Storozhuk
2019/805 ( PDF )
RRTxFM: Probabilistic Counting for Differentially Private Statistics
Saskia Nuńez von Voigt and Florian Tschorsch
2019/804 ( PDF )
Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions
Claire Delaplace and Andre Esser and Alexander May
2019/803 ( PDF )
Methodology for Efficient CNN Architectures in Profiling Attacks
Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli
2019/802 ( PDF )
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes
Alexander Maximov and Patrik Ekdahl
2019/801 ( PDF )
A Chosen Random Value Attack on WPA3 SAE authentication protocol
Sheng Sun
2019/800 ( PDF )
Can we Beat the Square Root Bound for ECDLP over $\mathbb{F}_{p^2}$ via Representations?
Claire Delaplace and Alexander May
2019/799 ( PDF )
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance
Nils Wisiol and Georg T. Becker and Marian Margraf and Tudor A. A. Soroceanu and Johannes Tobisch and Benjamin Zengin
2019/798 ( PDF )
A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods
Kwangsu Lee
2019/797 ( PDF )
Don't forget your roots: constant-time root finding over $\mathbb{F}_{2^m}$
Douglas Martins and Gustavo Banegas and Ricardo Custodio
2019/796 ( PDF )
The End of Logic Locking? A Critical View on the Security of Logic Locking
Susanne Engels and Max Hoffmann and Christof Paar
2019/795 ( PDF )
More Practical Single-Trace Attacks on the Number Theoretic Transform
Peter Pessl and Robert Primas
2019/794 ( PDF )
Efficient Cryptography on the RISC-V Architecture
Ko Stoffelen
2019/793 ( PDF )
On equivalence between known families of quadratic APN functions
Lylia Budaghyan and Marco Calderini and Irene Villa
2019/792 ( PDF )
TICK: Tiny Client for Blockchains
Wei Zhang and Jiangshan Yu and Qingqiang He and Nan Guan
2019/791 ( PDF )
Solving Algebraically Structured LWE in Arbitrary Number Fields
Hao Chen
2019/790 ( PDF )
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication
Wei Jiang and Adam Bowers and Dan Lin
2019/789 ( PDF )
Relation between o-equivalence and EA-equivalence for Niho bent functions
Diana Davidova and Lilya Budaghyan and Claude Carlet and Tor Helleseth and Ferdinand Ihringer and Tim Penttila
2019/788 ( PDF )
The Impact of Time on DNS Security
Aanchal Malhotra and Willem Toorop and Benno Overeinder and Ralph Dolmans and Sharon Goldberg
2019/787 ( PDF )
Optimized implementation of the NIST PQC submission ROLLO on microcontroller
Jérôme Lablanche and Lina Mortajine and Othman Benchaalal and Pierre-Louis Cayrel and Nadia El Mrabet
2019/786 ( PDF )
P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation
Rebecca Schwerdt and Matthias Nagel and Valerie Fetzer and Tobias Gräf and Andy Rupp
2019/785 ( PDF )
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography
Yalin Chen and Jue-Sam Chou and Liang-Chun Wang and Yu-Yuan Chou
2019/784 ( PDF )
Towards a Hybrid Public Key Infrastructure (PKI): A Review
Priyadarshi Singh and Abdul Basit and N Chaitanya Kumar and V. Ch. Venkaiah
2019/783 ( PDF )
Dissecting the CHES 2018 AES Challenge
Tobias Damm and Sven Freud and Dominik Klein
2019/782 ( PDF )
Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms
Antoine Joux and Cecile Pierrot
2019/781 ( PDF )
BBQ: Using AES in Picnic Signatures
Cyprien Delpech de Saint Guilhem and Lauren De Meyer and Emmanuela Orsini and Nigel P. Smart
2019/780 ( PDF )
Statistical ZAP Arguments
Saikrishna Badrinarayan and Rex Fernando and Aayush Jain and Dakshita Khurana and Amit Sahai
2019/779 ( PDF )
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures
Dennis Jackson and Cas Cremers and Katriel Cohn-Gordon and Ralf Sasse
2019/778 ( PDF )
A Composable Security Treatment of the Lightning Network
Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos
2019/777 ( PDF )
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
Jörg Schwenk and Douglas Stebila
2019/776 ( PDF )
Scalable Private Set Union from Symmetric-Key Techniques
Vladimir Kolesnikov and Mike Rosulek and Ni Trieu and Xiao Wang
2019/775 ( PDF )
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies
Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gazi and Sarah Meiklejohn and Edgar Weippl
2019/774 ( PDF )
Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness
Hamidreza Amini Khorasgani and Hemanta Maji and Tamalika Mukherjee
2019/773 ( PDF )
Efficient Secure Ridge Regression from Randomized Gaussian Elimination
Frank Blom and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede
2019/772 ( PDF )
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
Lorenzo Grassi and Markus Schofnegger
2019/771 ( PDF )
DDH-based Multisignatures with Public Key Aggregation
Duc-Phong Le and Guomin Yang and Ali Ghorbani
2019/770 ( PDF )
Practical Attacks on Reduced-Round AES
Navid Ghaedi Bardeh and Sondre Rřnjom
2019/769 ( PDF )
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates
Prasanna Ravi and Mahabir Prasad Jhanwar and James Howe and Anupam Chattopadhyay and Shivam Bhasin
2019/768 ( PDF )
Distributing any Elliptic Curve Based Protocol
Nigel P. Smart and Younes Talibi Alaoui
2019/767 ( PDF )
On cryptographic parameters of permutation polynomials of the form $x^rh(x^{(q-1)/d})$
Jaeseong Jeong and Chang Heon Kim and Namhun Koo and Soonhak Kwon and Sumin Lee
2019/766 ( PDF )
Complexity of Estimating Renyi Entropy of Markov Chains
Maciej Obremski and Maciej Skorski
2019/765 ( PDF )
SPQCop: Side-channel protected Post-Quantum Cryptoprocessor
Arpan Jati and Naina Gupta and Anupam Chattopadhyay and Somitra Kumar Sanadhya
2019/764 ( PDF )
The Adversarial Robustness of Sampling
Omri Ben-Eliezer and Eylon Yogev
2019/763 ( PDF )
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Shichang Wang and Meicheng Liu and Dongdai Lin and Li Ma
2019/762 ( PDF )
Verifiable Computing for Approximate Computation
Shuo Chen and Jung Hee Cheon and Dongwoo Kim and Daejun Park
2019/761 ( PDF )
Athena: A verifiable, coercion-resistant voting system with linear complexity
Ben Smyth
2019/760 ( PDF )
Differential Fault Analysis of NORX
Amit Jana and Dhiman Saha and Goutam Paul
2019/759 ( PDF )
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Onur Günlü and Onurcan Iscan and Vladimir Sidorenko and Gerhard Kramer
2019/758 ( PDF )
Genus 2 Supersingular Isogeny Oblivious Transfer
Ramsčs Fernŕndez-Valčncia
2019/757 ( PDF )
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider
Jonathan Protzenko and Bryan Parno and Aymeric Fromherz and Chris Hawblitzel and Marina Polubelova and Karthikeyan Bhargavan and Benjamin Beurdouche and Joonwon Choi and Antoine Delignat-Lavaud and Cedric Fournet and Tahina Ramananandro and Aseem Rastogi and Nikhil Swamy and Christoph Wintersteiger and Santiago Zanella-Beguelin
2019/756 ( PDF )
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures
Pantea Kiaei and Darius Mercadier and Pierre-Evariste Dagand and Karine Heydemann and Patrick Schaumont
2019/755 ( PDF )
Generic Attacks on Hash Combiners
Zhenzhen Bao and Itai Dinur and Jian Guo and Gaëtan Leurent and Lei Wang
2019/754 ( PDF )
A Round-Collapse Theorem for Computationally-Sound Protocols; or, TFNP is Hard (on Average) in Pessiland
Rafael Pass and Muthuramakrishnan Venkitasubramaniam
2019/753 ( PDF )
Design of Anonymous Endorsement System in Hyperledger Fabric
Subhra Mazumdar and Sushmita Ruj
2019/752 ( PDF )
Sucker punch makes you richer: Rethinking incentives in Proof-of-Work-based Blockchains
Runchao Han and Zhimei Sui and Jiangshan Yu and Joseph Liu and Shiping Chen
2019/751 ( PDF )
Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic
Thorsten Kleinjung and Benjamin Wesolowski
2019/750 ( PDF )
A Short Note on a Weight Probability Distribution Related to SPNs
Sondre Rřnjom
2019/749 ( PDF )
The privacy of the TLS 1.3 protocol
Ghada Arfaoui and Xavier Bultel and Pierre-Alain Fouque and Adina Nedelcu and Cristina Onete
2019/748 ( PDF )
Temporary Censorship Attacks in the Presence of Rational Miners
Fredrik Winzer and Benjamin Herd and Sebastian Faust
2019/747 ( PDF )
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
Rupeng Yang and Man Ho Au and Zhenfei Zhang and Qiuliang Xu and Zuoxia Yu and William Whyte
2019/746 ( PDF )
Public-Key Function-Private Hidden Vector Encryption (and More)
James Bartusek and Brent Carmer and Abhishek Jain and Zhengzhong Jin and Tancrčde Lepoint and Fermi Ma and Tal Malkin and Alex J. Malozemoff and Mariana Raykova
2019/745 ( PDF )
Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation
Vincenzo Iovino
2019/744 ( PDF )
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection
Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Devin Reich and Ariel Todoki
2019/743 ( PDF )
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature
Yangguang Tian and Yingjiu Li and Robert. H Deng and Binanda Sengupta and Guomin Yang
2019/742 ( PDF )
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling
William Diehl and Abubakr Abdulgadir and Jens-Peter Kaps
2019/741 ( PDF )
Comprehensive security analysis of CRAFT
Hosein Hadipour and Sadegh Sadeghi and Majid M. Niknam and Nasour Bagheri
2019/740 ( PDF )
A Secure Publish/Subscribe Protocol for Internet of Things
Lukas Malina and Gautam Srivastava and Petr Dzurenda and Jan Hajny and Radek Fujdiak
2019/739 ( PDF )
A Survey on Authenticated Encryption -- ASIC Designer's Perspective
Elif Bilge Kavun and Hristina Mihajloska and Tolga Yalcin
2019/738 ( -- withdrawn -- )
Scrutinizing the Tower Field Implementation of the $\mathbb{F}_{2^8}$ Inverter -- with Applications to AES, Camellia, and SM4
Zihao Wei and Siwei Sun and Lei Hu and Man Wei and Joan Boyar and Rene Peralta
2019/737 ( PDF )
Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters
Katriel Cohn-Gordon and Cas Cremers and Kristian Gjřsteen and Hĺkon Jacobsen and Tibor Jager
2019/736 ( PDF )
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE
Hao Chen and Ilaria Chillotti and Ling Ren
2019/735 ( PDF )
SoK of Used Cryptography in Blockchain
Mayank Raikwar and Danilo Gligoroski and Katina Kralevska
2019/734 ( PDF )
From Usability to Secure Computing and Back Again
Lucy Qin and Andrei Lapets and Frederick Jansen and Peter Flockhart and Kinan Dak Albab and Ira Globus-Harris and Shannon Roberts and Mayank Varia
2019/733 ( PDF )
Compressible FHE with Applications to PIR
Craig Gentry and Shai Halevi
2019/732 ( PDF )
Fully Homomorphic NIZK and NIWI Proofs
Prabhanjan Ananth and Apoorvaa Deshpande and Yael Tauman Kalai and Anna Lysyanskaya
2019/731 ( PDF )
On the Complexity of ``Superdetermined'' Minrank Instances
Javier Verbel and John Baena and Daniel Cabarcas and Ray Perlner and Daniel Smith-Tone
2019/730 ( PDF )
PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH
Vladimir Soukharev and Basil Hess
2019/729 ( PDF )
Linear Complexity of A Family of Binary pq2 -periodic Sequences From Euler Quotients
Jingwei Zhang and Shuhong Gao and Chang-An Zhao
2019/728 ( PDF )
Verifying Solutions to LWE with Implications for Concrete Security
Palash Sarkar and Subhadip Singha
2019/727 ( PDF )
Iterative Differential Characteristic of TRIFLE-BC
Fukang Liu and Takanori Isobe
2019/726 ( PDF )
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange
Pedro Branco and Jintai Ding and Manuel Goulăo and Paulo Mateus
2019/725 ( PDF )
He Gives C-Sieves on the CSIDH
Chris Peikert
2019/724 ( PDF )
Breaking Tweakable Enciphering Schemes using Simon's Algorithm
Sebati Ghosh and Palash Sarkar
2019/723 ( PDF )
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications
Mihaela Ion and Ben Kreuter and Ahmet Erhan Nergiz and Sarvar Patel and Mariana Raykova and Shobhit Saxena and Karn Seth and David Shanahan and Moti Yung
2019/722 ( PDF )
Neural Network Model Assessment for Side-Channel Analysis
Guilherme Perin and Baris Ege and Lukasz Chmielewski
2019/721 ( PDF )
Optimized SIKE Round 2 on 64-bit ARM
Hwajeong Seo and Amir Jalali and Reza Azarderakhsh
2019/720 ( PDF )
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles
Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta
2019/719 ( -- withdrawn -- )
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes
Mir Tanjidur Rahman and Shahin Tajik and M. Sazadur Rahman and Mark Tehranipoor and Navid Asadizanjani
2019/718 ( PDF )
Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority
Marina Blanton and Ahreum Kang and Chen Yuan
2019/717 ( PDF )
Homomorphism learning problems and its applications to public-key cryptography
Christopher Leonardi and Luis Ruiz-Lopez
2019/716 ( PDF )
On the Quantum Complexity of the Continuous Hidden Subgroup Problem
Koen de Boer and Léo Ducas and Serge Fehr
2019/715 ( PDF )
On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage
Yuejun Liu and Yongbin Zhou and Shuo Sun and Tianyu Wang and Rui Zhang
2019/714 ( PDF )
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT
Boxin Zhao and Xiaoyang Dong and Willi Meier and Keting Jia and Gaoli Wang
2019/713 ( PDF )
Public Ledger for Sensitive Data
Riccardo Longo and Massimiliano Sala
2019/712 ( PDF )
SimpleENC and SimpleENCsmall -- an Authenticated Encryption Mode for the Lightweight Setting
Shay Gueron and Yehuda Lindell
2019/711 ( PDF )
SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation
Brian Koziel and A-Bon Ackie and Rami El Khatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2019/710 ( -- withdrawn -- )
A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0
Qianying Zhang and Shijun Zhao and Zhiping Shi and Yong Guan and Guohui Wang
2019/709 ( PDF )
Secure Computation for Cloud data Storage
Davood Rezaeipour
2019/708 ( PDF )
Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions
Luís T. A. N. Brandăo and Çağdaş Çalık and Meltem Sönmez Turan and René Peralta
2019/707 ( PDF )
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions
Olivier Blazy and Céline Chevalier and Quoc Huy Vu
2019/706 ( PDF )
Endemic Oblivious Transfer
Daniel Masny and Peter Rindal
2019/705 ( PDF )
Commodity-Based 2PC for Arithmetic Circuits
Ivan Damgĺrd and Helene Haagh and Michael Nielsen and Claudio Orlandi
2019/704 ( PDF )
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains
Adriano Di Luzio and Danilo Francati and Giuseppe Ateniese
2019/703 ( PDF )
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation
Carolyn Whitnall and Elisabeth Oswald
2019/702 ( PDF )
Cryptanalysis of Plantlet
Subhadeep Banik and Khashayar Barooti and Takanori Isobe
2019/701 ( PDF )
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs
Hiroaki Anada
2019/700 ( PDF )
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Yusuke Naito and Mitsuru Matsui and Takeshi Sugawara and Daisuke Suzuki
2019/699 ( PDF )
Quantum security of the Fiat-Shamir transform of commit and open protocols
André Chailloux
2019/698 ( PDF )
A Formal Treatment of Deterministic Wallets
Poulami Das and Sebastian Faust and Julian Loss
2019/697 ( PDF )
Breaking ACORN with a Single Fault
Elena Dubrova
2019/696 ( PDF )
Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments
Masayuki Abe and Miguel Ambrona and Miyako Ohkubo
2019/695 ( PDF )
An Efficient Secure Three-Party Sorting Protocol with an Honest Majority
Koji Chida and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Naoto Kiribuchi and Benny Pinkas
2019/694 ( PDF )
A Unified and Composable Take on Ratcheting
Daniel Jost and Ueli Maurer and Marta Mularczyk
2019/693 ( PDF )
Security-Efficiency Tradeoffs in Searchable Encryption -- Lower Bounds and Optimal Constructions
Raphael Bost and Pierre-Alain Fouque
2019/692 ( PDF )
Synchronous Consensus with Optimal Asynchronous Fallback Guarantees
Erica Blum and Jonathan Katz and Julian Loss
2019/691 ( PDF )
Comparing proofs of security for lattice-based encryption
Daniel J. Bernstein
2019/690 ( PDF )
The Art of Guessing in Combined Side-Channel Collision Attacks
Changhai Ou and Siew-Kei Lam and Guiyuan Jiang
2019/689 ( PDF )
On-Device Power Analysis Across Hardware Security Domains
Colin O'Flynn and Alex Dewar
2019/688 ( PDF )
Better Bootstrapping for Approximate Homomorphic Encryption
Kyoohyung Han and Dohyeong Ki
2019/687 ( PDF )
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography
Zhengfeng Ji and Youming Qiao and Fang Song and Aaram Yun
2019/686 ( PDF )
On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations
Nir Bitansky and Akshay Degwekar
2019/685 ( PDF )
Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5
Markku-Juhani O. Saarinen
2019/684 ( PDF )
Revelio: A MimbleWimble Proof of Reserves Protocol
Arijit Dutta and Saravanan Vijayakumaran
2019/683 ( PDF )
The Notion of Transparency Order, Revisited
Huizhong Li and Yongbin Zhou and Jingdian Ming and Guang Yang and Chengbin Jin
2019/682 ( PDF )
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Alexandros Bakas and Antonis Michalas
2019/681 ( PDF )
Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?
Ayesha Khalid and Sarah McCarthy and Weiqiang Liu and Maire O’Neill
2019/680 ( PDF )
Structured Module Learning With Errors From Cyclic Algebras
Charles Grover and Cong Ling
2019/679 ( PDF )
Forgery Attacks on FlexAE and FlexAEAD
Maria Eichlseder and Daniel Kales and Markus Schofnegger
2019/678 ( PDF )
A Modified pqsigRM: RM Code-Based Signature Scheme
Yongwoo Lee and Wijik Lee and Young-Sik Kim and Jong-Seon No
2019/677 ( PDF )
A Note on Lower Digits Extraction Polynomial for Bootstrapping
Mingjia Huo and Kewen Wu and Qi Ye
2019/676 ( PDF )
Robust and Scalable Consensus for Sharded Distributed Ledgers
Eleftherios Kokoris-Kogias
2019/675 ( PDF )
Balance: Dynamic Adjustment of Cryptocurrency Deposits
Dominik Harz and Lewis Gudgeon and Arthur Gervais and William J. Knottenbelt
2019/674 ( PDF )
Polar Sampler: Discrete Gaussian Sampling over the Integers Using Polar Codes
Jiabo Wang and Cong Ling
2019/673 ( PDF )
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
Ahto Buldas and Denis Firsov and Risto Laanoja and Henri Lakk and Ahto Truu
2019/672 ( PDF )
A Blockchain-Assisted Hash-Based Signature Scheme
Ahto Buldas and Risto Laanoja and Ahto Truu
2019/671 ( PDF )
A Server-Assisted Hash-Based Signature Scheme
Ahto Buldas and Risto Laanoja and Ahto Truu
2019/670 ( PDF )
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks
Vahid Amin Ghafari and Honggang Hu and Fujiang Lin
2019/669 ( PDF )
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
Yunwen Liu and Yu Sasaki
2019/668 ( PDF )
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao
2019/667 ( PDF )
PPAD-Hardness via Iterated Squaring Modulo a Composite
Arka Rai Choudhuri and Pavel Hubacek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum
2019/666 ( PDF )
On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling
Zheng Wang and Cong Ling
2019/665 ( PDF )
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption
Jintai Ding and Pedro Branco and Kevin Schmitt
2019/664 ( PDF )
How Diversity Affects Deep-Learning Side-Channel Attacks
Huanyu Wang and Martin Brisfors and Sebastian Forsmark and Elena Dubrova
2019/663 ( PDF )
A Note on the (Im)possibility of Verifiable Delay Functions in the Random Oracle Model
Mohammad Mahmoody and Caleb Smith and David J. Wu
2019/662 ( PDF )
Agree-and-Prove: Generalized Proofs Of Knowledge and Applications
Christian Badertscher and Daniel Jost and Ueli Maurer
2019/661 ( PDF )
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis
Shivam Bhasin and Anupam Chattopadhyay and Annelie Heuser and Dirmanto Jap and Stjepan Picek and Ritu Ranjan Shrivastwa
2019/660 ( PDF )
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling
Zheng Wang and Cong Ling
2019/659 ( PDF )
Tight Verifiable Delay Functions
Nico Döttling and Sanjam Garg and Giulio Malavolta and Prashant Nalini Vasudevan
2019/658 ( PDF )
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest
Jun Furukawa and Yehuda Lindell
2019/657 ( PDF )
Multi-Party PSM, Revisited
Leonard Assouline and Tianren Liu
2019/656 ( -- withdrawn -- )
SeqL: Secure Scan-Locking for IP Protection
Seetal Potluri and Aydin Aysu and Akash Kumar
2019/655 ( PDF )
Visualizing size-security tradeoffs for lattice-based encryption
Daniel J. Bernstein
2019/654 ( PDF )
Compact linkable ring signatures and applications
Brandon Goodell and Sarang Noether and RandomRun
2019/653 ( PDF )
On the Local Leakage Resilience of Linear Secret Sharing Schemes
Fabrice Benhamouda and Akshay Degwekar and Yuval Ishai and Tal Rabin
2019/652 ( PDF )
The Exchange Attack: How to Distinguish Six Rounds of AES with $2^{88.2}$ chosen plaintexts
Navid Ghaedi Bardeh and Sondre Rřnjom
2019/651 ( PDF )
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing
Muhammad Ishaq and Ana Milanova and Vassilis Zikas
2019/650 ( PDF )
Incremental Proofs of Sequential Work
Nico Döttling and Russell W. F. Lai and Giulio Malavolta
2019/649 ( PDF )
Txilm: Lossy Block Compression with Salted Short Hashing
Donghui Ding and Xin Jiang and Jiaping Wang and Hao Wang and Xiaobing Zhang and Yi Sun
2019/648 ( PDF )
Efficient Invisible and Unlinkable Sanitizable Signatures
Xavier Bultel and Pascal Lafourcade and Russell W. F. Lai and Giulio Malavolta and Dominique Schröder and Sri Aravinda Krishnan Thyagarajan
2019/647 ( PDF )
Strong Asymmetric PAKE based on Trapdoor CKEM
Tatiana Bradley and Stanislaw Jarecki and Jiayu Xu
2019/646 ( PDF )
Communication-Efficient Unconditional MPC with Guaranteed Output Delivery
Vipul Goyal and Yanyi Liu and Yifan Song
2019/645 ( PDF )
Attribute Based Encryption for Deterministic Finite Automata from DLIN
Shweta Agrawal and Monosij Maitra and Shota Yamada
2019/644 ( PDF )
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-
Aydin Abadi and Michele Ciampi and Aggelos Kiayias and Vassilis Zikas
2019/643 ( PDF )
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification
Prabhanjan Ananth and Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai
2019/642 ( PDF )
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs
Jonathan Bootle and Vadim Lyubashevsky and Gregor Seiler
2019/641 ( PDF )
Simulation Extractability in Groth's zk-SNARK
Shahla Atapoor and Karim Baghery
2019/640 ( PDF )
On Round Optimal Statistical Zero Knowledge Arguments
Nir Bitansky and Omer Paneth
2019/639 ( PDF )
Trapdoor Hash Functions and Their Applications
Nico Döttling and Sanjam Garg and Yuval Ishai and Giulio Malavolta and Tamer Mour and Rafail Ostrovsky
2019/638 ( PDF )
On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography
F.L. Tiplea and S. Iftene and G. Teseleanu and A.-M. Nica
2019/637 ( PDF )
Cryptographic Sensing
Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
2019/636 ( PDF )
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions
Rishab Goyal and Willy Quach and Brent Waters and Daniel Wichs
2019/635 ( PDF )
Homomorphic Time-Lock Puzzles and Applications
Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan
2019/634 ( PDF )
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension
Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai
2019/633 ( PDF )
New non-linearity parameters of Boolean functions
Igor Semaev
2019/632 ( PDF )
Fully Homomorphic Encryption for RAMs
Ariel Hamlin and Justin Holmgren and Mor Weiss and Daniel Wichs
2019/631 ( PDF )
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge
Cody Freitag and Ilan Komargodski and Rafael Pass
2019/630 ( PDF )
ABE for DFA from k-Lin
Junqing Gong and Brent Waters and Hoeteck Wee
2019/629 ( PDF )
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE
Shweta Agrawal and Monosij Maitra and Shota Yamada
2019/628 ( PDF )
Watermarking Public-Key Cryptographic Primitives
Rishab Goyal and Sam Kim and Nathan Manohar and Brent Waters and David J. Wu
2019/627 ( PDF )
Unconditionally Secure Computation Against Low-Complexity Leakage
Andrej Bogdanov and Yuval Ishai and Akshayaram Srinivasan
2019/626 ( PDF )
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge
Vipul Goyal and Aayush Jain and Amit Sahai
2019/625 ( PDF )
Public-Key Cryptography in the Fine-Grained Setting
Rio Lavigne and Andrea Lincoln and Virginia Vassilevska Williams
2019/624 ( PDF )
Nonces are Noticed: AEAD Revisited
Mihir Bellare and Ruth Ng and Björn Tackmann
2019/623 ( PDF )
Exploring Constructions of Compact NIZKs from Various Assumptions
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2019/622 ( PDF )
Extended Expectation Cryptanalysis on Round-reduced AES
Zhenzhen Bao and Jian Guo and Eik List
2019/621 ( PDF )
A Modified Simple Substitution Cipher With Unbounded Unicity Distance
Bruce Kallick
2019/620 ( PDF )
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems
Steven D. Galbraith and Lukas Zobernig
2019/619 ( PDF )
Continuous Verifiable Delay Functions
Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass
2019/618 ( PDF )
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods
Fukang Liu and Takanori Isobe
2019/617 ( PDF )
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model
Sebastian Gajek and Marco Lewandowsky
2019/616 ( PDF )
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation
Iftach Haitner and Noam Mazor and Ronen Shaltiel and Jad Silbak
2019/615 ( PDF )
My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks
Siemen Dhooghe and Svetla Nikova
2019/614 ( PDF )
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm
Xavier Bonnetain and Akinori Hosoyamada and María Naya-Plasencia and Yu Sasaki and André Schrottenloher
2019/613 ( PDF )
MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks
Taha Atahan Akyildiz and Can Berk Guzgeren and Cemal Yilmaz and Erkay Savas
2019/612 ( PDF )
Simulation-Extractable SNARKs Revisited
Helger Lipmaa
2019/611 ( PDF )
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set
Thaddeus Dryja
2019/610 ( PDF )
Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem
Jean-Sebastien Coron and Agnese Gini
2019/609 ( PDF )
CPA-to-CCA Transformation for KDM Security
Fuyuki Kitagawa and Takahiro Matsuda
2019/608 ( PDF )
Symmetric Primitives with Structured Secrets
Navid Alamati and Hart Montgomery and Sikhar Patranabis
2019/607 ( PDF )
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Zhenzhen Bao and Lin Ding and Jian Guo and Haoyang Wang and Wenying Zhang
2019/606 ( PDF )
An Efficient and Provable Masked Implementation of qTESLA
François Gérard and Mélissa Rossi
2019/605 ( PDF )
A note on different types of ransomware attacks
Mihail Anghel and Andrei Racautanu
2019/604 ( PDF )
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Jun Xu and Santanu Sarkar and , Lei Hu and Huaxiong Wang and Yanbin Pan
2019/603 ( PDF )
How to Delegate Computations Publicly
Yael Kalai and Omer Paneth and Lisa Yang
2019/602 ( PDF )
Continuously Non-Malleable Secret Sharing for General Access Structures
Gianluca Brian and Antonio Faonio and Daniele Venturi
2019/601 ( PDF )
AuroraLight: Improved prover efficiency and SRS size in a Sonic-like system
Ariel Gabizon
2019/600 ( PDF )
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption
Zhenzhen Bao and Jian Guo and Tetsu Iwata and Kazuhiko Minematsu
2019/599 ( PDF )
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning
Ivan Damgĺrd and Daniel Escudero and Tore Frederiksen and Marcel Keller and Peter Scholl and Nikolaj Volgushev
2019/598 ( PDF )
Partial Secret Sharing
Amir Jafari and Reza Kaboli and Shahram Khazaei
2019/597 ( PDF )
A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio
Shahram Khazaei
2019/596 ( PDF )
Discretisation and Product Distributions in Ring-LWE
Sean Murphy and Rachel Player
2019/595 ( PDF )
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero
Pedro Moreno-Sanchez and Randomrun and Duc V. Le and Sarang Noether and Brandon Goodell and Aniket Kate
2019/594 ( PDF )
Cryptanalysis of Ring Homomorphic Encryption Schemes
Mugurel Barcau and Vicentiu Pasol
2019/593 ( PDF )
On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces
V. Ustimenko and M. Klisowski
2019/592 ( PDF )
Statistical Analysis and Anonymity of TOR's Path Selection
Andrei Mogage and Emil Simion
2019/591 ( PDF )
Simulating Homomorphic Evaluation of Deep Learning Predictions
Christina Boura and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev
2019/590 ( PDF )
Tighter proofs of CCA security in the quantum random oracle model
Nina Bindel and Mike Hamburg and Kathrin Hövelmanns and Andreas Hülsing and Edoardo Persichetti
2019/589 ( PDF )
A${^2}$L: Anonymous Atomic Locks for Scalability and Interoperability in Payment Channel Hubs
Erkan Tairi and Pedro Moreno-Sanchez and Matteo Maffei
2019/588 ( PDF )
Formal Notions of Security for Verifiable Homomorphic Encryption
Jakub Klemsa and Ivana Trummová
2019/587 ( PDF )
Polygraph: Accountable Byzantine Agreement
Pierre Civit and Seth Gilbert and Vincent Gramoli
2019/586 ( PDF )
QAP-based Simulation-Extractable SNARK with a Single Verification
Jihye Kim and Jiwon Lee and Hyunok Oh
2019/585 ( PDF )
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners
Mustafa Khairallah and Shivam Bhasin and Anupam Chattopadhyay
2019/584 ( PDF )
2-threshold Ideal Secret Sharing Schemes Can Be Uniquely Modeled by Latin Squares
Lintao Liu and Xuehu Yan and Yuliang Lu and Huaixi Wang
2019/583 ( PDF )
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks
Christoph Egger and Pedro Moreno-Sanchez and Matteo Maffei
2019/582 ( PDF )
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
Ran Canetti and Alley Stoughton and Mayank Varia
2019/581 ( PDF )
On relaxed security notions for secret sharing
Amir Jafari and Shahram Khazaei
2019/580 ( PDF )
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs
Russell W. F. Lai and Viktoria Ronge and Tim Ruffing and Dominique Schröder and Sri Aravinda Krishnan Thyagarajan and Jiafan Wang
2019/579 ( PDF )
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
Dominic Letz
2019/578 ( PDF )
Deep Learning based Side Channel Attacks in Practice
Houssem Maghrebi
2019/577 ( PDF )
Improved Multiplication Triple Generation over Rings via RLWE-based AHE
Deevashwer Rathee and Thomas Schneider and K. K. Shukla
2019/576 ( PDF )
Group-homomorphic Secret Sharing Schemes Are Group-characterizable with Normal Subgroups
Reza Kaboli and Shahram Khazaei and Maghsoud Parviz
2019/575 ( PDF )
On Abelian Secret Sharing: duality and separation
Amir Jafari and Shahram Khazaei
2019/574 ( PDF )
Subliminal channels in post-quantum digital signature schemes
Herman Galteland and Kristian Gjřsteen
2019/573 ( PDF )
Security of the Suffix Keyed Sponge
Christoph Dobraunig and Bart Mennink
2019/572 ( PDF )
On the Commitment Capacity of Unfair Noisy Channels
Claude Crépeau and Rafael Dowsley and Anderson C. A. Nascimento
2019/571 ( PDF )
Multi-Party Virtual State Channels
Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Julia Hesse and Kristina Hostáková
2019/570 ( PDF )
Bias-variance Decomposition in Machine Learning-based Side-channel Analysis
Daan van der Valk and Stjepan Picek
2019/569 ( PDF )
Lattice RingCT v2.0 with Multiple Input and Output Wallets
Wilson Alberto Torres and Veronika Kuchta and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Jacob Cheng
2019/568 ( PDF )
Post Quantum ECC on FPGA Platform
Debapriya Basu Roy and Debdeep Mukhopadhyay
2019/567 ( PDF )
(Linkable) Ring Signature from Hash-Then-One-Way Signature
Xingye Lu and Man Ho Au and Zhenfei Zhang
2019/566 ( PDF )
Deep Learning based Model Building Attacks on Arbiter PUF Compositions
Pranesh Santikellur and Aritra Bhattacharyay and Rajat Subhra Chakraborty
2019/565 ( PDF )
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
Nirvan Tyagi and Paul Grubbs and Julia Len and Ian Miers and Thomas Ristenpart
2019/564 ( PDF )
Verification of Authenticated Firmware Load
Sujit Kumar Muduli and Pramod Subramanyan and Sayak Ray
2019/563 ( PDF )
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA
Omer Shlomovits and István András Seres
2019/562 ( PDF )
Multi-Adjustable Join Scheme
Shahram Khazaei and Mojtaba Rafiee
2019/561 ( PDF )
Faster Bootstrapping of FHE over the integers with large prime message space
Zhizhu Lian and Yupu Hu and Hu Chen and Baocang Wang
2019/560 ( PDF )
Solutions of $x^{q^k}+\cdots+x^{q}+x=a$ in $GF(2^n)$
Kwang Ho Kim and Jong Hyok Choe and Dok Nam Lee and Dae Song Go and Sihem Mesnager
2019/559 ( PDF )
Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables
Evgeny K. Alekseev and Lyudmila A. Kushchinskaya
2019/558 ( PDF )
How to not break SIDH
Chloe Martindale and Lorenz Panny
2019/557 ( PDF )
Identity-Based Encryption from $e$-th Power Residue Symbols
Xiaopeng Zhao and Jinwen Zheng and Zhenfu Cao and Xiaolei Dong and Nanyuan Cao
2019/556 ( PDF )
When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop)
Gideon Samid
2019/555 ( PDF )
Optimal TNFS-secure pairings on elliptic curves with composite embedding degree
Georgios Fotiadis and Chloe Martindale
2019/554 ( PDF )
How to Build Pseudorandom Functions From Public Random Permutations
Yu Long Chen and Eran Lambooij and Bart Mennink
2019/553 ( PDF )
Towards post-quantum symmetric cryptography
John Gregory Underhill and Stiepan Aurélien Kovac and Xenia Bogomolec
2019/552 ( PDF )
Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space
Binyi Chen and Yilei Chen and Kristina Hostáková and Pratyay Mukherjee
2019/551 ( PDF )
A note on the correlations between NIST cryptographic statistical tests suite
Emil Simion and Paul Burciu
2019/550 ( PDF )
Spartan: Efficient and general-purpose zkSNARKs without trusted setup
Srinath Setty
2019/549 ( PDF )
Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir
Arka Rai Choudhuri and Pavel Hubacek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum
2019/548 ( PDF )
About Wave Implementation and its Leakage Immunity
Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
2019/547 ( PDF )
Linearly-Homomorphic Signatures and Scalable Mix-Nets
Chloé Hébant and Duong Hieu Phan and David Pointcheval
2019/546 ( PDF )
Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies
David Cerezo Sánchez
2019/545 ( PDF )
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Sayandeep Saha and Dirmanto Jap and Debapriya Basu Roy and Avik Chakraborti and Shivam Bhasin and Debdeep Mukhopadhyay
2019/544 ( PDF )
Evaluation of Code-based Signature Schemes
Partha Sarathi Roy and Kirill Morozov and Kazuhide Fukushima and Shinsaku Kiyomoto
2019/543 ( PDF )
TMPS: Ticket-Mediated Password Strengthening
John Kelsey and Dana Dachman-Soled and Sweta Mishra and Meltem Sonmez Turan
2019/542 ( PDF )
Formally Verified Cryptographic Web Applications in WebAssembly
Jonathan Protzenko and Benjamin Beurdouche and Denis Merigoux and Karthikeyan Bhargavan
2019/541 ( PDF )
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement
James Shook and Scott Simon and Peter Mell
2019/540 ( PDF )
A chosen key attack against the secret S-boxes of GOST
Markku-Juhani O. Saarinen
2019/539 ( PDF )
Cryptanalysis of FlexAEAD
Mostafizar Rahman and Dhiman Saha and Goutam Paul
2019/538 ( PDF )
On Perfect Endomorphic Ciphers
Nikolay Shenets
2019/537 ( PDF )
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin and Victor Mollimard
2019/536 ( PDF )
Protecting against Statistical Ineffective Fault Attacks
Joan Daemen and Christoph Dobraunig and Maria Eichlseder and Hannes Gross and Florian Mendel and Robert Primas
2019/535 ( PDF )
SIKE Round 2 Speed Record on ARM Cortex-M4
Hwajeong soe and Amir Jalali and Reza Azarderakhsh
2019/534 ( PDF )
Theoretical and Practical Approaches for Hardness Amplification of PUFs
Fatemeh Ganji and Shahin Tajik and Pascal Stauss and Jean-Pierre Seifert and Domenic Forte and Mark Tehranipoor
2019/533 ( PDF )
Stopping time signatures for some algorithms in cryptography
Percy Deift and Stephen D. Miller and Thomas Trogdon
2019/532 ( PDF )
Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography
Carsten Baum and Ariel Nof
2019/531 ( PDF )
How to Correct Errors in Multi-Server PIR
Kaoru Kurosawa
2019/530 ( PDF )
Speed-up of SCA attacks on 32-bit multiplications
Robert Nguyen and Adrien Facon and Sylvain Guilley and Guillaume Gautier and Safwan El Assad
2019/529 ( PDF )
UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions
Pedro Branco and Manuel Goulăo and Paulo Mateus
2019/528 ( PDF )
Anomalies and Vector Space Search: Tools for S-Box Analysis (Full Version)
Xavier Bonnetain and Léo Perrin and Shizhu Tian
2019/527 ( PDF )
Revisiting Privacy-aware Blockchain Public Key Infrastructure
Olamide Omolola and Paul Plessing
2019/526 ( PDF )
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman
Cas Cremers and Dennis Jackson
2019/525 ( PDF )
Misuse Attacks on Post-Quantum Cryptosystems
Ciprian Băetu and F. Betül Durak and Loďs Huguenin-Dumittan and Abdullah Talayhan and Serge Vaudenay
2019/524 ( PDF )
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference
Hao Chen and Wei Dai and Miran Kim and Yongsoo Song
2019/523 ( PDF )
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
Jack Doerner and Yashvanth Kondi and Eysa Lee and abhi shelat
2019/522 ( PDF )
Secret-Sharing from Robust Conditional Disclosure of Secrets
Amos Beimel and Naty Peter
2019/521 ( PDF )
Fully Homomorphic Encryption with k-bit Arithmetic Operations
Benjamin M. Case and Shuhong Gao and Gengran Hu and Qiuxia Xu
2019/520 ( PDF )
A Note on Sub-Gaussian Random Variables
Benjamin M. Case and Colin Gallagher and Shuhong Gao
2019/519 ( PDF )
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications
Christopher Patton and Thomas Shrimpton
2019/518 ( PDF )
Fast Database Joins for Secret Shared Data
Payman Mohassel and Peter Rindal and Mike Rosulek
2019/517 ( PDF )
Mobile Private Contact Discovery at Scale
Daniel Kales and Christian Rechberger and Thomas Schneider and Matthias Senker and Christian Weinert
2019/516 ( PDF )
CellTree: A New Paradigm for Distributed Data Repositories
Anasuya Acharya and Manoj Prabhakaran and Akash Trehan
2019/515 ( PDF )
A Countermeasure Against Statistical Ineffective Fault Analysis
Jakub Breier and Mustafa Khairallah and Xiaolu Hou and Yang Liu
2019/514 ( PDF )
Pixel: Multi-signatures for Consensus
Manu Drijvers and Sergey Gorbunov and Gregory Neven and Hoeteck Wee
2019/513 ( PDF )
New Code-Based Privacy-Preserving Cryptographic Constructions
Khoa Nguyen and Hanh Tang and Huaxiong Wang and Neng Zeng
2019/512 ( PDF )
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System
Shuai Han and Shengli Liu and Lin Lyu and Dawu Gu
2019/511 ( PDF )
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited
Gilles Barthe and Sonia Belaďd and Thomas Espitau and Pierre-Alain Fouque and Mélissa Rossi and Mehdi Tibouchi
2019/510 ( PDF )
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes
Jiang Zhang and Yu Yu and Shuqin Fan and Zhenfeng Zhang and Kang Yang
2019/509 ( PDF )
New Slide Attacks on Almost Self-Similar Ciphers
Orr Dunkelman and Nathan Keller and Noam Lasry and Adi Shamir
2019/508 ( PDF )
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security
Tsz Hon Yuen and Shi-feng Sun and Joseph K. Liu and Man Ho Au and Muhammed F. Esgin and Qingzhao Zhang and Dawu Gu
2019/507 ( PDF )
Simple Schemes in the Bounded Storage Model
Jiaxin Guan and Mark Zhandry
2019/506 ( PDF )
Forward Integrity and Crash Recovery for Secure Logs
Erik-Oliver Blass and Guevara Noubir
2019/505 ( PDF )
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
Felix Wegener and Thorben Moos and Amir Moradi
2019/504 ( PDF )
Afgjort: A Partially Synchronous Finality Layer for Blockchains
Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Daniel Tschudi
2019/503 ( PDF )
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
2019/502 ( PDF )
A refined analysis of the cost for solving LWE via uSVP
Shi Bai and Shaun Miller and Weiqiang Wen
2019/501 ( PDF )
Optimal Merging in Quantum k-xor and k-sum Algorithms
María Naya-Plasencia and André Schrottenloher
2019/500 ( PDF )
An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster
Jean-Claude Bajard and Julien Eynard and Paulo Martins and Leonel Sousa and Vincent Zucca
2019/499 ( PDF )
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography
Michael Naehrig and Joost Renes
2019/498 ( PDF )
CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations
Ward Beullens and Thorsten Kleinjung and Frederik Vercauteren
2019/497 ( PDF )
Forward and Backward-Secure Range-Searchable Symmetric Encryption
Jiafan Wang and Sherman S. M. Chow
2019/496 ( PDF )
Non-malleability for quantum public-key encryption
Christian Majenz and Christian Schaffner and Jeroen van Wier
2019/495 ( PDF )
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
Marc Joye
2019/494 ( PDF )
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/493 ( PDF )
Homomorphic noise growth in practice: comparing BGV and FV
Anamaria Costache and Kim Laine and Rachel Player
2019/492 ( PDF )
Decisional second-preimage resistance: When does SPR imply PRE?
Daniel J. Bernstein and Andreas Hülsing
2019/491 ( PDF )
Best Information is Most Successful
Eloi de Cherisey and Sylvain Guilley and Olivier Rioul and Pablo Piantanida
2019/490 ( PDF )
On sigma protocols with helper for MQ and PKP, fishy signature schemes and more
Ward Beullens
2019/489 ( PDF )
Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4
Leon Botros and Matthias J. Kannwischer and Peter Schwabe
2019/488 ( PDF )
Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication
Alan Kaminsky
2019/487 ( PDF )
From Single-Input to Multi-Client Inner-Product Functional Encryption
Michel Abdalla and Fabrice Benhamouda and Romain Gay
2019/486 ( PDF )
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment
Suhyeon Lee and Seungjoo Kim
2019/485 ( PDF )
A taxonomy of pairings, their security, their complexity
Razvan Barbulescu and Nadia El Mrabet and Loubna Ghammam
2019/484 ( PDF )
New Number-Theoretic Cryptographic Primitives
Eric Brier and Houda Ferradi and Marc Joye and David Naccache
2019/483 ( PDF )
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations
Pierrick Méaux and Claude Carlet and Anthony Journault and François-Xavier Standaert
2019/482 ( PDF )
Tiny WireGuard Tweak
Jacob Appelbaum and Chloe Martindale and Peter Wu
2019/481 ( PDF )
An Efficient and Compact Reformulation of NIST Collision Estimate Test
Prasanna Raghaw Mishra and Bhartendu Nandan and Navneet Gaba
2019/480 ( PDF )
On the Efficiency of Privacy-Preserving Smart Contract Systems
Karim Baghery
2019/479 ( PDF )
Extended 3-Party ACCE and Application to LoRaWAN 1.1
Sébastien Canard and Loďc Ferreira
2019/478 ( PDF )
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
Sarah McCarthy and James Howe and Neil Smyth and Seamus Brannigan and Máire O’Neill
2019/477 ( PDF )
Revisiting Post-Compromise Security Guarantees in Group Messaging
Cas Cremers and Britta Hale and Konrad Kohbrok
2019/476 ( PDF )
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T
Muhammad ElSheikh and Ahmed Abdelkhalek and Amr M. Youssef
2019/475 ( PDF )
Dual-Mode NIZKs from Obfuscation
Dennis Hofheinz and Bogdan Ursu
2019/473 ( PDF )
A Method to Reduce the Key Size of UOV Signature Scheme
Chengdong Tao
2019/472 ( PDF )
Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM)
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2019/471 ( PDF )
UC-Secure CRS Generation for SNARKs
Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michal Zajac
2019/470 ( PDF )
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals
Niek J. Bouman and Niels de Vreede
2019/469 ( PDF )
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks
Rui Qiao and Qinglong Wang* and Zongtao Duan and Na Fan
2019/468 ( PDF )
The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem
Alessandro Budroni and Andrea Tenti
2019/467 ( PDF )
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version)
Clément Massart and François-Xavier Standaert
2019/466 ( -- withdrawn -- )
Privacy-Preserving K-means Clustering with Multiple Data Owners
Jung Hee Cheon and Jinhyuck Jeong and Dohyeong Ki and Jiseung Kim and Joohee Lee and Seok Won Lee
2019/465 ( PDF )
Towards a Practical Cluster Analysis over Encrypted Data
Jung Hee Cheon and Duhyeong Kim and Jai Hyun Park
2019/464 ( PDF )
The complexity of MinRank
Alessio Caminata and Elisa Gorla
2019/463 ( PDF )
In Pursuit of Clarity In Obfuscation
Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi
2019/462 ( PDF )
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11
Alexander Dax and Robert Künnemann and Sven Tangermann and Michael Backes
2019/461 ( PDF )
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks
Xiaolu Hou and Jakub Breier and Dirmanto Jap and Lei Ma and Shivam Bhasin and Yang Liu
2019/460 ( PDF )
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Jan Camenisch and Manu Drijvers and Petr Dzurenda and Jan Hajny
2019/459 ( PDF )
From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1
Gaëtan Leurent and Thomas Peyrin
2019/458 ( PDF )
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems
Lorenzo Grassi and Daniel Kales and Dmitry Khovratovich and Arnab Roy and Christian Rechberger and Markus Schofnegger
2019/457 ( PDF )
Forgery Attack on mixFeed in the Nonce-Misuse Scenario
Mustafa Khairallah
2019/456 ( PDF )
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
Peifang Ni and Hongda Li and Xianning Meng and Dongxue Pan
2019/455 ( PDF )
FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol
Joăo Otávio Massari Chervinski and Diego Kreutz and Jiangshan Yu
2019/454 ( PDF )
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks
Ryan Karl and Timothy Burchfield and Jonathan Takeshita and Taeho Jung
2019/453 ( PDF )
A New Approach to Modelling Centralised Reputation Systems
Lydia Garms and Elizabeth A. Quaglia
2019/452 ( PDF )
A Central Limit Framework for Ring-LWE Decryption
Sean Murphy and Rachel Player
2019/451 ( PDF )
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Francesco Berti and Olivier Pereira and François-Xavier Standaert
2019/450 ( PDF )
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data
Chenglu Jin and Zheng Yang and Sridhar Adepu and Jianying Zhou
2019/449 ( PDF )
Limits to Non-Malleability
Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Tal Malkin
2019/448 ( PDF )
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl
2019/447 ( PDF )
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak
Haibo Zhou and Zheng Li and Xiaoyang Dong and Keting Jia and Willi Meier
2019/446 ( PDF )
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Sanjit Chatterjee and Shravan Kumar Parshuram Puria and Akash Shah
2019/445 ( PDF )
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications
Muhammed F. Esgin and Ron Steinfeld and Joseph K. Liu and Dongxi Liu
2019/444 ( PDF )
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
Gildas Avoine and Sébastien Canard and Loďc Ferreira
2019/443 ( PDF )
Contingent payments on a public ledger: models and reductions for automated verification
Sergiu Bursuc and Steve Kremer
2019/442 ( PDF )
K2SN-MSS: An Efficient Post-Quantum Signature (Full Version)
Sabyasachi Karati and Reihaneh Safavi-Naini
2019/441 ( PDF )
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
2019/440 ( PDF )
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
Avik Chakraborti and Nilanjan Datta and Ashwin Jha and Cuauhtemoc Mancillas Lopez and Mridul Nandi and Yu Sasaki
2019/439 ( PDF )
A Comprehensive Study of Deep Learning for Side-Channel Analysis
Loďc Masure and Cécile Dumas and Emmanuel Prouff
2019/438 ( PDF )
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data
Jan Camenisch and Angelo De Caro and Esha Ghosh and Alessandro Sorniotti
2019/437 ( PDF )
Efficient coding for secure computing with additively-homomorphic encrypted data
Thijs Veugen
2019/436 ( PDF )
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
Benjamin Dowling and Paul Rösler and Jörg Schwenk
2019/435 ( PDF )
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
Yue Qin and Chi Cheng and Jintai Ding
2019/434 ( PDF )
Masking Fuzzy-Searchable Public Databases
Alexandra Boldyreva and Tianxin Tang and Bogdan Warinschi
2019/433 ( PDF )
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
Shan Chen and Samuel Jero and Matthew Jagielski and Alexandra Boldyreva and Cristina Nita-Rotaru
2019/432 ( PDF )
Cryptanalysis of a System Based on Twisted Reed–Solomon Codes
Julien Lavauzelle and Julian Renner
2019/431 ( PDF )
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation
Aurore Guillevic and Simon Masson and Emmanuel Thomé
2019/430 ( -- withdrawn -- )
Composition of Boolean Functions: An Application to the Secondary Constructions of Bent Functions
Guangpu Gao and Dongdai Lin and Wenfen Liu and Yongjuan Wang
2019/429 ( PDF )
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Harsh Chaudhari and Ashish Choudhury and Arpita Patra and Ajith Suresh
2019/428 ( PDF )
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability
Jan Czajkowski and Christian Majenz and Christian Schaffner and Sebastian Zur
2019/427 ( PDF )
Improved Secure Integer Comparison via Homomorphic Encryption
Florian Bourse and Olivier Sanders and Jacques Traoré
2019/426 ( PDF )
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
Abdelrahaman Aly and Tomer Ashur and Eli Ben-Sasson and Siemen Dhooghe and Alan Szepieniec
2019/425 ( PDF )
Homomorphic Training of 30,000 Logistic Regression Models
Flavio Bergamaschi and Shai Halevi and Tzipora T. Halevi and Hamish Hunt
2019/424 ( -- withdrawn -- )
Preimage Security of KNOT-Hash
Raghvendra Rohit
2019/423 ( PDF )
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name
Peter T. Breuer
2019/422 ( PDF )
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound
Alexander Moch and Eik List
2019/421 ( PDF )
Continuing to reflect on TLS 1.3 with external PSK
Liliya Akhmetzyanova and Evgeny Alekseev and Ekaterina Smyshlyaeva and Alexandr Sokolov
2019/420 ( PDF )
Improving Speed of Dilithium’s Signing Procedure
Prasanna Ravi and Sourav Sen Gupta and Anupam Chattopadhyay and Shivam Bhasin
2019/419 ( PDF )
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
Martin R. Albrecht and Carlos Cid and Lorenzo Grassi and Dmitry Khovratovich and Reinhard Lüftenegger and Christian Rechberger and Markus Schofnegger
2019/418 ( PDF )
Sharing of Encrypted files in Blockchain Made Simpler
S. Sharmila Deva Selvi and Arinjita Paul and Siva Dirisala and Saswata Basu and C. Pandu Rangan
2019/417 ( PDF )
Numerical Method for Comparison on Homomorphically Encrypted Numbers
Jung Hee Cheon and Dongwoo Kim and Duhyeong Kim and Hun Hee Lee and Keewoo Lee
2019/416 ( PDF )
How many transactions per second can bitcoin really handle ? Theoretically.
Evangelos Georgiadis
2019/415 ( PDF )
Refinement and Verification of CBC Casper
Ryuya Nakamura and Takayuki Jimba and Dominik Harz
2019/414 ( PDF )
Two-Round Oblivious Transfer from CDH or LPN
Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny and Daniel Wichs
2019/413 ( PDF )
On the Streaming Indistinguishability of a Random Permutation and a Random Function
Itai Dinur
2019/412 ( PDF )
On the complexity of the Permuted Kernel Problem
Eliane KOUSSA and Gilles MACARIO-RAT and Jacques PATARIN
2019/411 ( PDF )
Exploring the Monero Peer-to-Peer Network
Tong Cao and Jiangshan Yu and Jérémie Decouchant and Xiapu Luo and Paulo Verissimo
2019/410 ( PDF )
Policy-Based Sanitizable Signatures
Kai Samelin and Daniel Slamanig
2019/409 ( PDF )
Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes
Houda Ferradi and Keita Xagawa
2019/408 ( PDF )
Forgery Attack on SNEIKEN
Mustafa Khairallah
2019/407 ( PDF )
Privacy-Preserving Network Path Validation
Binanda Sengupta and Yingjiu Li and Kai Bu and Robert H. Deng
2019/406 ( PDF )
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
David Derler and Kai Samelin and Daniel Slamanig and Christoph Striecks
2019/405 ( PDF )
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware
Jo Vliegen and Md Masoom Rabbani and Mauro Conti and Nele Mentens
2019/404 ( PDF )
Efficient Message Authentication Codes with Combinatorial Group Testing
Kazuhiko Minematsu
2019/403 ( PDF )
Fast and simple constant-time hashing to the BLS12-381 elliptic curve
Riad S. Wahby and Dan Boneh
2019/402 ( PDF )
ILC: A Calculus for Composable, Computational Cryptography
Kevin Liao and Matthew A. Hammer and Andrew Miller
2019/401 ( PDF )
Side-Channel assessment of Open Source Hardware Wallets
Manuel San Pedro and Victor Servant and Charles Guillemet
2019/400 ( PDF )
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
Akira Takahashi and Mehdi Tibouchi
2019/399 ( PDF )
Inception makes non-malleable codes shorter as well!
Divesh Aggarwal and Maciej Obremski
2019/398 ( PDF )
Constant-Round Group Key Exchange from the Ring-LWE Assumption
Daniel Apon and Dana Dachman-Soled and Huijing Gong and Jonathan Katz
2019/397 ( PDF )
Feistel Structures for MPC, and More
Martin R. Albrecht and Lorenzo Grassi and Leo Perrin and Sebastian Ramacher and Christian Rechberger and Dragos Rotaru and Arnab Roy and Markus Schofnegger
2019/396 ( PDF )
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Evangelia Anna Markatou and Roberto Tamassia
2019/395 ( PDF )
Full Database Reconstruction with Access and Search Pattern Leakage
Evangelia Anna Markatou and Roberto Tamassia
2019/394 ( PDF )
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation
Vincent Migliore and Benoı̂t Gérard and Mehdi Tibouchi and Pierre-Alain Fouque
2019/393 ( PDF )
A Tight Parallel-Repetition Theorem for Random-Terminating Interactive Arguments
Itay Berman and Iftach Haitner and Eliad Tsfadia
2019/392 ( PDF )
New Conditional Cube Attack on Keccak Keyed Modes
Zheng Li and Xiaoyang Dong and Wenquan Bi and Keting Jia and Xiaoyun Wang and Willi Meier
2019/391 ( PDF )
Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense
Biswabandan Panda
2019/390 ( PDF )
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures
Michael Specter and Sunoo Park and Matthew Green
2019/389 ( PDF )
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Sauvik Bhattacharya and Oscar Garcia-Morchon and Rachel Player and Ludo Tolhuizen
2019/388 ( PDF )
Towards Secret-Free Security
Ulrich Rührmair
2019/387 ( PDF )
SoK : On DFA Vulnerabilities of Substitution-Permutation Networks
Mustafa Khairallah and Xiaolu Hou and Zakaria Najm and Jakub Breier and Shivam Bhasin and Thomas Peyrin
2019/386 ( PDF )
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation
Ryo Kikuchi and Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ai Ishida and Takahiro Matsuda and Yusuke Sakai and Jacob C. N. Schuldt
2019/385 ( PDF )
Miller Inversion is Easy for the Reduced Tate Pairing on Supersingular Curves of Embedding Degree Two and Three
Takakazu Satoh
2019/384 ( PDF )
What Storage Access Privacy is Achievable with Small Overhead?
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2019/383 ( PDF )
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
Mathy Vanhoef and Eyal Ronen
2019/382 ( PDF )
Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length
Daniel Gardham and Mark Manulis
2019/381 ( -- withdrawn -- )
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Chen-Dong Ye and Tian Tian
2019/380 ( PDF )
A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit
Kazumasa Shinagawa and Koji Nuida
2019/379 ( PDF )
Non-Malleable Codes for Decision Trees
Marshall Ball and Siyao Guo and Daniel Wichs
2019/378 ( PDF )
pRate: Anonymous Star Rating with Rating Secrecy
Jia Liu and Mark Manulis
2019/377 ( PDF )
Lower Bounds for Oblivious Near-Neighbor Search
Kasper Green Larsen and Tal Malkin and Omri Weinstein and Kevin Yeo
2019/376 ( PDF )
SELL v1.0: Searchable Encrypted Logging Library
Amir Jalali and Neil Davenport
2019/375 ( PDF )
Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters
Xavier Bultel and Pascal Lafourcade
2019/374 ( PDF )
Probability 1 Iterated Differential in the SNEIK Permutation
Léo Perrin
2019/373 ( PDF )
Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions
Aram Jivanyan
2019/372 ( PDF )
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
2019/371 ( PDF )
Adding Linkability to Ring Signatures with One-Time Signatures
Xueli Wang and Yu Chen and Xuecheng Ma
2019/370 ( PDF )
Indifferentiability for Public Key Cryptosystems
Mark Zhandry and Cong Zhang
2019/369 ( PDF )
On the EA-classes of known APN functions in small dimensions
Marco Calderini
2019/368 ( PDF )
Strong Post-Compromise Secure Proxy Re-Encryption
Alex Davidson and Amit Deo and Ela Lee and Keith Martin
2019/367 ( PDF )
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
Olivier Blazy and Angèle Bossuat and Xavier Bultel and Pierre-Alain Fouque and Cristina Onete and Elena Pagnin
2019/366 ( PDF )
Triggerflow: Regression Testing by Advanced Execution Path Inspection
Iaroslav Gridin and Cesar Pereida García and Nicola Tuveri and Billy Bob Brumley
2019/365 ( PDF )
Fully Secure Attribute-Based Encryption for $t$-CNF from LWE
Rotem Tsabary
2019/364 ( PDF )
Everybody's a Target: Scalability in Public-Key Encryption
Benedikt Auerbach and Federico Giacon and Eike Kiltz
2019/363 ( PDF )
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs
Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima
2019/362 ( PDF )
Game Channels: State Channels for the Gambling Industry with Built-In PRNG
Alisa Cherniaeva and Ilia Shirobokov and Alexander Davydov
2019/361 ( PDF )
On polynomial secret sharing schemes
Anat Paskin-Chernivasky and Artiom Radune
2019/360 ( PDF )
SoK: Off The Chain Transactions
Lewis Gudgeon and Pedro Moreno-Sanchez and Stefanie Roos and Patrick McCorry and Arthur Gervais
2019/359 ( PDF )
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search
Hao Chen and Ilaria Chillotti and Yihe Dong and Oxana Poburinnaya and Ilya Razenshteyn and M. Sadegh Riazi
2019/358 ( PDF )
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA
Leo Weissbart and Stjepan Picek and Lejla Batina
2019/357 ( PDF )
Lattice-based proof of a shuffle
Núria Costa and Ramiro Martínez and Paz Morillo
2019/356 ( PDF )
Ad Hoc Multi-Input Functional Encryption
Shweta Agrawal and Michael Clear and Ophir Frieder and Sanjam Garg and Adam O’Neill and Justin Thaler
2019/355 ( PDF )
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks
Anubhab Baksi and Dhiman Saha and Sumanta Sarkar
2019/354 ( PDF )
Benchmarking Privacy Preserving Scientific Operations
Abdelrahaman Aly and Nigel P. Smart
2019/353 ( PDF )
A Faster Constant-time Algorithm of CSIDH keeping Two Points
Hiroshi Onuki and Yusuke Aikawa and Tsutomu Yamazaki and Tsuyoshi Takagi
2019/352 ( PDF )
SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies
Maxim Jourenko and Kanta Kurazumi and Mario Larangeira and Keisuke Tanaka
2019/351 ( PDF )
Forward Secrecy of SPAKE2
Jose Becerra and Dimiter Ostrev and Marjan Skrobot
2019/350 ( PDF )
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Fabian Boemer and Yixing Lao and Rosario Cammarota and Casimir Wierzynski
2019/349 ( PDF )
Spin Me Right Round: Rotational Symmetry for FPGA-specific AES
Felix Wegener and Lauren De Meyer and Amir Moradi
2019/348 ( PDF )
Efficient and Scalable Universal Circuits
Masaud Y. Alhassan and Daniel Günther and Ágnes Kiss and Thomas Schneider
2019/347 ( PDF )
Selfie: reflections on TLS 1.3 with PSK
Nir Drucker and Shay Gueron
2019/346 ( PDF )
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm
Christophe Clavier and Leo Reynaud and Antoine Wurcker
2019/345 ( PDF )
Second-order Scatter Attack
Hugues Thiebeauld and Aurélien Vasselle and Antoine Wurcker
2019/344 ( PDF )
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency
Ethan Heilman and Neha Narula and Garrett Tanzer and James Lovejoy and Michael Colavita and Madars Virza and Tadge Dryja
2019/343 ( PDF )
Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input
Aurelien Vasselle and Antoine Wurcker
2019/342 ( PDF )
LightChain: A DHT-based Blockchain for Resource Constrained Environments
Yahya Hassanzadeh-Nazarabadi and Alptekin Küpçü and Öznur Özkasap
2019/341 ( PDF )
MixEth: efficient, trustless coin mixing service for Ethereum
István András Seres and Dániel A. Nagy and Chris Buckland and Péter Burcsi
2019/340 ( PDF )
Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys
Antoine Wurcker
2019/339 ( PDF )
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Yusuke Naito and Takeshi Sugawara
2019/338 ( PDF )
Garbled Neural Networks are Practical
Marshall Ball and Brent Carmer and Tal Malkin and Mike Rosulek and Nichole Schimanski
2019/337 ( PDF )
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios
Łukasz Krzywiecki and Mirosław Kutyłowski and Jakub Pezda and Marcin Słowik
2019/336 ( PDF )
DEEP-FRI: Sampling Outside the Box Improves Soundness
Eli Ben-Sasson and Lior Goldberg and Swastik Kopparty and Shubhangi Saraf
2019/335 ( PDF )
Examining the Practical Side Channel Resilience of ARX-boxes
Yan Yan and Elisabeth Oswald
2019/334 ( PDF )
Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition
Abdelrahaman Aly and Aysajan Abidin and Svetla Nikova
2019/333 ( PDF )
Key-and-Argument-Updatable QA-NIZKs
Helger Lipmaa
2019/332 ( PDF )
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields
Benjamin Hong Meng Tan and Hyung Tae Lee and Huaxiong Wang and Shu Qin Ren and Khin Mi Mi Aung
2019/331 ( PDF )
Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors
Amir Jalali and Reza Azarderakhsh and Mehran Mozaffari Kermani and Matthew Campagna and David Jao
2019/330 ( PDF )
Practical Supersingular Isogeny Group Key Agreement
Reza Azarderakhsh and Amir Jalali and David Jao and Vladimir Soukharev
2019/329 ( PDF )
Doubly half-injective PRGs for incompressible white-box cryptography
Estuardo Alpirez Bock and Alessandro Amadori and Joppe W. Bos and Chris Brzuska and Wil Michiels
2019/328 ( PDF )
On the Difficulty of Hiding the Balance of Lightning Network Channels
Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Alejandro Ranchal-Pedrosa and Cristina Pérez-Solà and Joaquin Garcia-Alfaro
2019/327 ( PDF )
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers
Gembu Ito and Tetsu Iwata
2019/326 ( PDF )
Sublinear Pairing-based Arguments with Updatable CRS and Weaker Assumptions
Alonso González and Carla Rŕfols
2019/325 ( PDF )
An Efficient Private Evaluation of a Decision Graph
Hiroki Sudo and Koji Nuida and Kana Shimizu
2019/324 ( PDF )
A Traceable Ring Signature Scheme based on Coding Theory
Pedro Branco and Paulo Mateus
2019/323 ( PDF )
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited
Sabyasachi Dutta and Kouichi Sakurai
2019/322 ( PDF )
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES
Farnoud Farahmand and Malik Umar Sharif and Kevin Briggs and Kris Gaj
2019/321 ( PDF )
Horizontal Collision Correlation Attack on Elliptic Curves
Aurélie Bauer and Eliane Jaulmes and Emmanuel Prouff and Jean-René Reinhard and Justine Wild
2019/320 ( PDF )
Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats
Léo Ducas and Steven Galbraith and Thomas Prest and Yang Yu
2019/319 ( PDF )
PGC: Pretty Good Confidential Transaction System with Accountability
Yu Chen and Xuecheng Ma
2019/318 ( PDF )
Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256
Boyu Ni and Xiaoyang Dong
2019/317 ( PDF )
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
Tiancheng Xie and Jiaheng Zhang and Yupeng Zhang and Charalampos Papamanthou and Dawn Song
2019/316 ( PDF )
Extended Affine and CCZ Equivalence up to Dimension 4
Marcus Brinkmann
2019/315 ( PDF )
Iterated Search Problems and Blockchain Security under Falsifiable Assumptions
Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos
2019/314 ( PDF )
Optimal Bounded-Collusion Secure Functional Encryption
Prabhanjan Ananth and Vinod Vaikuntanathan
2019/313 ( PDF )
A SAT-based approach for index calculus on binary elliptic curves
Monika Trimoska and Sorina Ionica and Gilles Dequen
2019/312 ( PDF )
Side-Channel Analysis of the TERO PUF
Lars Tebelmann and Michael Pehl and Vincent Immler
2019/311 ( PDF )
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and Bertram Poettering
2019/310 ( PDF )
A Formal Approach to Secure Speculation
Kevin Cheang and Cameron Rasmussen and Sanjit Seshia and Pramod Subramanyan
2019/309 ( PDF )
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots
Jean-Sebastien Coron and Luca Notarnicola
2019/308 ( PDF )
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation
Yuan Kang and Chengyu Lin and Tal Malkin and Mariana Raykova
2019/307 ( PDF )
Solving $x^{2^k+1}+x+a=0$ in $\mathbb{F}_{2^n}$ with $\gcd(n,k)=1$
Kwang Ho Kim and Sihem Mesnager
2019/306 ( PDF )
Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields
Madhurima Mukhopadhyay and Palash Sarkar
2019/305 ( PDF )
Practical Algebraic Side-Channel Attacks Against ACORN
Alexandre Adomnicai and Laurent Masson and Jacques J.A. Fournier
2019/304 ( PDF )
Ternary Syndrome Decoding with Large Weight
Rémi Bricout and André Chailloux and Thomas Debris-Alazard and Matthieu Lequesne
2019/303 ( PDF )
Analysis of TPL Signature Scheme
Terry Shue Chien Lau and Chik How Tan and Theo Fanuela Prabowo
2019/302 ( PDF )
A Survey of Leakage-Resilient Cryptography
Yael Tauman Kalai and Leonid Reyzin
2019/301 ( PDF )
Safe Compilation for Encrypted Computing
Peter T. Breuer and Simon Pickin
2019/300 ( PDF )
Transient Effect Ring Oscillators Leak Too
Ugo Mureddu and Brice Colombier and Nathalie Bochard and Lilian Bossuet and Viktor Fischer
2019/299 ( PDF )
A Generic Construction of Revocable Identity-Based Encryption
Xuecheng Ma and Dongdai Lin
2019/298 ( PDF )
Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem
Craig Costello and Patrick Longa and Michael Naehrig and Joost Renes and Fernando Virdia
2019/297 ( PDF )
Towards Optimized and Constant-Time CSIDH on Embedded Devices
Amir Jalali and Reza Azarderakhsh and Mehran Mozaffari Kermani and David Jao
2019/296 ( PDF )
Hash functions from superspecial genus-2 curves using Richelot isogenies
Wouter Castryck and Thomas Decru and Benjamin Smith
2019/295 ( PDF )
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
Kimia Tajik and Akshith Gunasekaran and Rhea Dutta and Brandon Ellis and Rakesh B. Bobba and Mike Rosulek and Charles V. Wright and Wu-chi Feng
2019/294 ( PDF )
Semi-parallel Logistic Regression for GWAS on Encrypted Data
Miran Kim and Yongsoo Song and Baiyu Li and Daniele Micciancio
2019/293 ( PDF )
Impossibility of Strong KDM Security with Auxiliary Input
Cody Freitag and Ilan Komargodski and Rafael Pass
2019/292 ( PDF )
Timing attacks on Error Correcting Codes in Post-Quantum Schemes
Jan-Pieter D'Anvers and Marcel Tiepelt and Frederik Vercauteren and Ingrid Verbauwhede
2019/291 ( PDF )
CCA Security and Trapdoor Functions via Key-Dependent-Message Security
Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka
2019/290 ( PDF )
Cost effective techniques for chip delayering and in-situ depackaging
Philippe Loubet Moundi
2019/289 ( PDF )
Cryptanalysis of ForkAES
Subhadeep Banik and Jannis Bossert and Amit Jana and Eik List and Stefan Lucks and Willi Meier and Mostafizar Rahman and Dhiman Saha and Yu Sasaki
2019/288 ( PDF )
On the construction of S-boxes using the leaders and followers metaheuristic
Alejandro Freyre-Echevarría and Ismel Martínez-Díaz
2019/287 ( PDF )
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
A. N. Alekseychuk and S. M. Koniushok and M. V. Poremskyi
2019/286 ( PDF )
Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ variables Majority Function
Yindong Chen and Fei Guo and Liu Zhang
2019/285 ( PDF )
SpaceFlip : Unbound Geometry Cryptography
Gideon Samid
2019/284 ( PDF )
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2
Ai Ishida and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka
2019/283 ( PDF )
An Attack on Small Private Keys of RSA Based on Euclidean Algorithm
Dimitrios Poulakis
2019/282 ( PDF )
A Framework for Cryptographic Problems from Linear Algebra
Carl Bootland and Wouter Castryck and Alan Szepieniec and Frederik Vercauteren
2019/281 ( PDF )
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning
Phillipp Schoppmann and Adria Gascon and Mariana Raykova and Benny Pinkas
2019/280 ( PDF )
Multi-Authority Attribute-Based Encryption from LWE in the OT Model
Sam Kim
2019/279 ( PDF )
A Note on Key Agreement and Non-Interactive Commitments
Alex Lombardi and Luke Schaeffer
2019/278 ( PDF )
Uncovering Algebraic Structures in the MPC Landscape
Navneet Agarwal and Sanat Anand and Manoj Prabhakaran
2019/277 ( PDF )
On the boomerang uniformity of quadratic permutations
Sihem Mesnager and Chunming Tang and Maosheng Xiong
2019/276 ( PDF )
BOREALIS: Building Block for Sealed Bid Auctions on Blockchains
Erik-Oliver Blass and Florian Kerschbaum
2019/275 ( PDF )
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation
M. Sadegh Riazi and Mojan Javaheripi and Siam U. Hussain and Farinaz Koushanfar
2019/274 ( PDF )
Path Oblivious Heap
Elaine Shi
2019/273 ( PDF )
Compressing Vector OLE
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai
2019/272 ( PDF )
Quantum Security Analysis of AES
Xavier Bonnetain and María Naya-Plasencia and André Schrottenloher
2019/271 ( PDF )
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)
Jintai Ding and Chi Cheng and Yue Qin
2019/270 ( PDF )
Sync HotStuff: Simple and Practical Synchronous State Machine Replication
Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren and Maofan Yin
2019/269 ( PDF )
Digital Signatures for Consensus
Sergey Gorbunov and Hoeteck Wee
2019/268 ( PDF )
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys*
Sergei Bauer and Martin Brunner and Peter Schartner
2019/267 ( PDF )
Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.
Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede
2019/266 ( PDF )
Fast constant-time gcd computation and modular inversion
Daniel J. Bernstein and Bo-Yin Yang
2019/265 ( PDF )
TEX - A Securely Scalable Trustless Exchange
Rami Khalil and Arthur Gervais and Guillaume Felley
2019/264 ( PDF )
Unifying computational entropies via Kullback-Leibler divergence
Rohit Agrawal and Yi-Hsiu Chen and Thibaut Horel and Salil Vadhan
2019/263 ( PDF )
Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones
Jiaping Wang and Hao Wang
2019/262 ( PDF )
Revisiting Post-Quantum Fiat-Shamir
Qipeng Liu and Mark Zhandry
2019/261 ( PDF )
Forward-Secure Multi-Signatures
Manu Drijvers and Gregory Neven
2019/260 ( PDF )
A Modular Treatment of Blind Signatures from Identification Schemes
Eduard Hauck and Eike Kiltz and Julian Loss
2019/259 ( PDF )
A Practical Method to Recover Exact Superpoly in Cube Attack
SenPeng Wang and Bin Hu and Jie Guan and Kai Zhang and TaiRong Shi
2019/258 ( PDF )
Tight Time-Memory Trade-offs for Symmetric Encryption
Joseph Jaeger and Stefano Tessaro
2019/257 ( PDF )
Uncloneable Quantum Encryption via Random Oracles
Anne Broadbent and Sébastien Lord
2019/256 ( PDF )
DLCT: A New Tool for Differential-Linear Cryptanalysis
Achiya Bar-On and Orr Dunkelman and Nathan Keller and Ariel Weizman
2019/255 ( PDF )
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2019/254 ( PDF )
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries
Divesh Aggarwal and Kai-Min Chung and Han-Hsuan Lin and Thomas Vidick
2019/253 ( PDF )
Founding Secure Computation on Blockchains
Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain
2019/252 ( PDF )
Reversible Proofs of Sequential Work
Hamza Abusalah and Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter
2019/251 ( PDF )
Consensus through Herding
T-H. Hubert Chan and Rafael Pass and Elaine Shi
2019/250 ( PDF )
Function-Dependent Commitments from Homomorphic Authenticators
Lucas Schabhüser and Denis Butin and Johannes Buchmann
2019/249 ( PDF )
Revisiting Variable Output Length XOR Pseudorandom Function
Srimanta Bhattacharya and Mridul Nandi
2019/248 ( PDF )
Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach
Ting Li and Yao Sun
2019/247 ( PDF )
Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
Andrea Coladangelo and Alex B. Grilo and Stacey Jeffery and Thomas Vidick
2019/246 ( PDF )
Towards optimal robust secret sharing with security against a rushing adversary
Serge Fehr and Chen Yuan
2019/245 ( PDF )
Distributed Differential Privacy via Shuffling
Albert Cheu and Adam Smith and Jonathan Ullman and David Zeber and Maxim Zhilyaev
2019/244 ( PDF )
Attacks Only Get Better: How to Break FF3 on Large Domains
Viet Tung Hoang and David Miller and Ni Trieu
2019/243 ( PDF )
4-Round Luby-Rackoff Construction is a qPRP
Akinori Hosoyamada and Tetsu Iwata
2019/242 ( PDF )
New Constructions of Reusable Designated-Verifier NIZKs
Alex Lombardi and Willy Quach and Ron D. Rothblum and Daniel Wichs and David J. Wu
2019/241 ( PDF )
Efficient Circuit-based PSI with Linear Communication
Benny Pinkas and Thomas Schneider and Oleksandr Tkachenko and Avishay Yanai
2019/240 ( PDF )
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes
Vipul Goyal and Yifan Song
2019/239 ( PDF )
Cheaper Private Set Intersection via Differentially Private Leakage
Adam Groce and Peter Rindal and Mike Rosulek
2019/238 ( PDF )
Robust Encryption, Extended
Rémi Géraud and David Naccache and Răzvan Roşie
2019/237 ( PDF )
Optimal Oblivious Priority Queues and Offline Oblivious RAM
Zahra Jafargholi and Kasper Green Larsen and Mark Simkin
2019/236 ( PDF )
Designated-verifier pseudorandom generators, and their applications
Geoffroy Couteau and Dennis Hofheinz
2019/235 ( PDF )
Reusable Designated-Verifier NIZKs for all NP from CDH
Willy Quach and Ron D. Rothblum and Daniel Wichs
2019/234 ( PDF )
On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm
Léo Ducas and Maxime Plançon and Benjamin Wesolowski
2019/233 ( PDF )
Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption
Nuttapong Attrapadung
2019/232 ( PDF )
On Quantum Advantage in Information Theoretic Single-Server PIR
Dorit Aharonov and Zvika Brakerski and Kai-Min Chung and Ayal Green and Ching-Yi Lai and Or Sattath
2019/231 ( PDF )
Secret-Sharing Schemes for General and Uniform Access Structures
Benny Applebaum and Amos Beimel and Oriol Farrŕs and Oded Nir and Naty Peter
2019/230 ( PDF )
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
Christos Andrikos and Lejla Batina and Lukasz Chmielewski and Liran Lerman and Vasilios Mavroudis and Kostas Papagiannopoulos and Guilherme Perin and Giorgos Rassias and Alberto Sonnino
2019/229 ( PDF )
XOR-counts and lightweight multiplication with fixed elements in binary finite fields
Lukas Kölsch
2019/228 ( PDF )
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
Nimrod Aviram and Kai Gellert and Tibor Jager
2019/227 ( PDF )
Securing Update Propagation with Homomorphic Hashing
Kevin Lewi and Wonho Kim and Ilya Maykov and Stephen Weis
2019/226 ( PDF )
Flyclient: Super-Light Clients for Cryptocurrencies
Benedikt Bünz and Lucianna Kiffer and Loi Luu and Mahdi Zamani
2019/225 ( PDF )
Leakage Resilience of the Duplex Construction
Christoph Dobraunig and Bart Mennink
2019/224 ( PDF )
Compact Adaptively Secure ABE for NC1 from k-Lin
Lucas Kowalczyk and Hoeteck Wee
2019/223 ( PDF )
Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies
Marcelo Blatt and Alexander Gusev and Yuriy Polyakov and Kurt Rohloff and Vinod Vaikuntanathan
2019/222 ( PDF )
(R)CCA Secure Updatable Encryption with Integrity Protection
Michael Klooß and Anja Lehmann and Andy Rupp
2019/221 ( PDF )
Group Signatures without NIZK: From Lattices in the Standard Model
Shuichi Katsumata and Shota Yamada
2019/220 ( PDF )
Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing
Ivan Damgĺrd and Kasper Green Larsen and Jesper Buus Nielsen
2019/219 ( PDF )
Nitro Protocol
Tom Close
2019/218 ( PDF )
Computational Limitations in Robust Classification and Win-Win Results
Akshay Degwekar and Vinod Vaikuntanathan
2019/217 ( PDF )
A family of boolean functions with good cryptographic properties
Guillermo Sosa Gómez and Octavio Paez Osuna
2019/216 ( PDF )
Round Optimal Secure Multiparty Computation from Minimal Assumptions
Arka Rai Choudhuri and Michele Ciampi and Vipul Goyal and Abhishek Jain and Rafail Ostrovsky
2019/215 ( PDF )
Approx-SVP in Ideal Lattices with Pre-processing
Alice Pellet-Mary and Guillaume Hanrot and Damien Stehlé
2019/214 ( PDF )
Four-Round Secure Multiparty Computation from General Assumptions
Michele Ciampi and Rafail Ostrovsky
2019/213 ( PDF )
On ELFs, Deterministic Encryption, and Correlated-Input Security
Mark Zhandry
2019/212 ( PDF )
A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes
Hossein Oraei and Massoud Hadian Dehkordi
2019/211 ( PDF )
MonZa: Fast Maliciously Secure Two Party Computation on Z_{2^k}
Dario Catalano and Mario Di Raimondo and Dario Fiore and Irene Giacomelli
2019/210 ( PDF )
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Christof Beierle and Gregor Leander and Amir Moradi and Shahram Rasoolzadeh
2019/209 ( PDF )
SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes
Zhenzhen Bao and Jian Guo and San Ling and Yu Sasaki
2019/208 ( PDF )
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA
Muzhou Li and Kai Hu and Meiqin Wang
2019/207 ( PDF )
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security
Dragos Rotaru and Tim Wood
2019/206 ( PDF )
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
James Howe and Ayesha Khalid and Marco Martinoli and Francesco Regazzoni and Elisabeth Oswald
2019/205 ( PDF )
A note on isogeny-based hybrid verifiable delay functions
Barak Shani
2019/204 ( PDF )
The Security of All Private-key Bits in Isogeny-based Schemes
Barak Shani
2019/203 ( PDF )
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
Osman Bicer and Alptekin Kupcu
2019/202 ( PDF )
The Distinction Between Fixed and Random Generators in Group-Based Assumptions
James Bartusek and Fermi Ma and Mark Zhandry
2019/201 ( PDF )
DL-Extractable UC-Commitment Schemes
Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michał Zając
2019/200 ( PDF )
Degree 2 is Complete for the Round-Complexity of Malicious MPC
Benny Applebaum and Zvika Brakerski and Rotem Tsabary
2019/199 ( PDF )
Password-Authenticated Public-Key Encryption
Tatiana Bradley and Jan Camenisch and Stanislaw Jarecki and Anja Lehmann and Gregory Neven and Jiayu Xu
2019/198 ( PDF )
Seedless Fruit is the Sweetest: Random Number Generation, Revisited
Sandro Coretti and Yevgeniy Dodis and Harish Karthikeyan and Stefano Tessaro
2019/197 ( PDF )
Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions
Esteban Landerreche and Marc Stevens and Christian Schaffner
2019/196 ( PDF )
Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions
Michael Backes and Nico Döttling and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider
2019/195 ( PDF )
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
Jung Hee Cheon and Wonhee Cho and Minki Hhan and Minsik Kang and Jiseung Kim and Changmin Lee
2019/194 ( PDF )
Classical zero-knowledge arguments for quantum computations
Thomas Vidick and Tina Zhang
2019/193 ( PDF )
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction
Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2019/192 ( PDF )
An Omission-Tolerant Cryptographic Checksum
Francisco Corella and Karen Lewison
2019/191 ( PDF )
Zether: Towards Privacy in a Smart Contract World
Benedikt Bünz and Shashank Agrawal and Mahdi Zamani and Dan Boneh
2019/190 ( PDF )
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model
Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner
2019/189 ( PDF )
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis
Yaoling Ding and An Wang and Siu Ming YIU
2019/188 ( PDF )
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
Dan Boneh and Elette Boyle and Henry Corrigan-Gibbs and Niv Gilboa and Yuval Ishai
2019/187 ( PDF )
Fully homomorphic encryption modulo Fermat numbers
Antoine Joux
2019/186 ( PDF )
Re-thinking untraceability in the CryptoNote-style blockchain
Jiangshan Yu and Man Ho Allen Au and Paulo Esteves-Verissimo
2019/185 ( PDF )
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Ralph Ankele and Christoph Dobraunig and Jian Guo and Eran Lambooij and Gregor Leander and Yosuke Todo
2019/184 ( PDF )
Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon
William Diehl and Farnoud Farahmand and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj
2019/183 ( PDF )
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
Katherine E. Stange
2019/182 ( PDF )
Security is an Architectural Design Constraint
Prasanna Ravi and Sourav Sen Gupta and Anupam Chattopadhyay and Mustafa Khairallah and Zakaria Najm and Shivam Bhasin
2019/181 ( PDF )
Lower Bounds for Leakage-Resilient Secret Sharing
Jesper Buus Nielsen and Mark Simkin
2019/180 ( PDF )
Disco: Modern Session Encryption
David Wong
2019/179 ( PDF )
Synchronous, with a Chance of Partition Tolerance
Yue Guo and Rafael Pass and Elaine Shi
2019/178 ( PDF )
LucidiTEE: Policy-Compliant Fair Computing at Scale
Rohit Sinha and Sivanarayana Gaddam and Ranjit Kumaresan
2019/177 ( PDF )
Genus Two Isogeny Cryptography
E.V. Flynn and Yan Bo Ti
2019/176 ( PDF )
Homomorphic Encryption for Finite Automata
Nicholas Genise and Craig Gentry and Shai Halevi and Baiyu Li and Daniele Micciancio
2019/175 ( PDF )
The Communication Complexity of Threshold Private Set Intersection
Satrajit Ghosh and Mark Simkin
2019/174 ( PDF )
Towards an Exponential Lower Bound for Secret Sharing
Kasper Green Larsen and Mark Simkin
2019/173 ( PDF )
Shorter Quadratic QA-NIZK Proofs
Vanesa Daza and Alonso González and Zaira Pindado and Carla Rŕfols and Javier Silva
2019/172 ( PDF )
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS
Danping Shi and Siwei Sun and Yu Sasaki and Chaoyun Li and Lei Hu
2019/171 ( PDF )
XONN: XNOR-based Oblivious Deep Neural Network Inference
M. Sadegh Riazi and Mohammad Samragh and Hao Chen and Kim Laine and Kristin Lauter and Farinaz Koushanfar
2019/170 ( PDF )
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes
Lingyue Qin and Xiaoyang Dong and Keting Jia and Rui Zong
2019/169 ( PDF )
Updatable Anonymous Credentials and Applications to Incentive Systems
Johannes Blömer and Jan Bobolz and Denis Diemert and Fabian Eidens
2019/168 ( PDF )
Profiling Side-channel Analysis in the Restricted Attacker Framework
Stjepan Picek and Annelie Heuser and Sylvain Guilley
2019/167 ( PDF )
Analysis of Secure Caches using a Three-Step Model for Timing-Based Attacks
Shuwen Deng and Wenjie Xiong and Jakub Szefer
2019/166 ( PDF )
Verifiable Delay Functions from Supersingular Isogenies and Pairings
Luca De Feo and Simon Masson and Christophe Petit and Antonio Sanso
2019/165 ( PDF )
libInterMAC: Beyond Confidentiality and Integrity in Practice
Martin R. Albrecht and Torben Brandt Hansen and Kenneth G. Paterson
2019/164 ( PDF )
Use your Brain! Arithmetic 3PC For Any Modulus with Active Security
Hendrik Eerikson and Marcel Keller and Claudio Orlandi and Pille Pullonen and Joonas Puura and Mark Simkin
2019/163 ( PDF )
Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder
Melissa Azouaoui and Romain Poussier and François-Xavier Standaert
2019/162 ( PDF )
Multi-Stage Proof-of-Work Blockchain
Palash Sarkar
2019/161 ( PDF )
Understanding Optimizations and Measuring Performances of PBKDF2
Andrea Francesco Iuorio and Andrea Visconti
2019/160 ( PDF )
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data
Sujoy Sinha Roy and Furkan Turan and Kimmo Jarvinen and Frederik Vercauteren and Ingrid Verbauwhede
2019/159 ( PDF )
Robust MPC: Asynchronous Responsiveness yet Synchronous Security
Chen-Da Liu-Zhang and Julian Loss and Ueli Maurer and Tal Moran and Daniel Tschudi
2019/158 ( PDF )
Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors
Chris Peikert and Sina Shiehian
2019/157 ( PDF )
Schnorr-based implicit certification: improving the security and efficiency of V2X communications
Paulo S. L. M. Barreto and Marcos A. Simplicio Jr. and Jefferson E. Ricardini and Harsh Kupwade Patil
2019/156 ( PDF )
Efficient Constructions for Almost-everywhere Secure Computation
Siddhartha Jayanti and Srinivasan Raghuraman and Nikhil Vyas
2019/155 ( PDF )
Constant-time BCH Error-Correcting Code
Matthew Walters and Sujoy Sinha Roy
2019/154 ( PDF )
FastKitten: Practical Smart Contracts on Bitcoin
Poulami Das and Lisa Eckey and Tommaso Frassetto and David Gens and Kristina Hostáková and Patrick Jauernig and Sebastian Faust and Ahmad-Reza Sadeghi
2019/153 ( PDF )
Overdrive2k: Efficient Secure MPC over $Z_{2^k}$ from Somewhat Homomorphic Encryption
Emmanuela Orsini and Nigel P. Smart and Frederik Vercauteren
2019/152 ( PDF )
Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption
Duhyeong Kim and Yongha Son and Dongwoo Kim and Andrey Kim and Seungwan Hong and Jung Hee Cheon
2019/151 ( PDF )
Solving binary MQ with Grover's algorithm
Peter Schwabe and Bas Westerbaan
2019/150 ( PDF )
QcBits: Constant-Time Small-Key Code-Based Cryptography
Tung Chou
2019/149 ( PDF )
Improved Lattice-based CCA2-Secure PKE in the Standard Model
Jiang Zhang and Yu Yu and Shuqin Fan and Zhenfeng Zhang
2019/148 ( PDF )
On the efficiency of pairing-based proofs under the d-PKE
Ariel Gabizon
2019/147 ( PDF )
Practical Collision Attacks against Round-Reduced SHA-3
Jian Guo and Guohong Liao and Guozhen Liu and Meicheng Liu and Kexin Qiao and Ling Song
2019/146 ( PDF )
Boomerang Connectivity Table Revisited
Ling Song and Xianrui Qin and Lei Hu
2019/145 ( PDF )
Achieving GWAS with Homomorphic Encryption
Jun Jie Sim and Fook Mun Chan and Shibin Chen and Benjamin Hong Meng Tan and Khin Mi Mi Aung
2019/144 ( PDF )
Modeling Power Efficiency of S-boxes Using Machine Learning
Rajat Sadhukhan and Nilanjan Datta and Debdeep Mukhopadhyay
2019/143 ( PDF )
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
Benjamin Hettwer and Stefan Gehrer and Tim Güneysu
2019/142 ( PDF )
LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs
Matteo Campanelli and Dario Fiore and Anaďs Querol
2019/141 ( PDF )
A General Proof Framework for Recent AES Distinguishers
Christina Boura and Anne Canteaut and Daniel Coggia
2019/140 ( PDF )
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning
Jinhyun So and Basak Guler and A. Salman Avestimehr and Payman Mohassel
2019/139 ( PDF )
Vulnerability and Remedy of Stripped Function Logic Locking
Hai Zhou and Yuanqi Shen and Amin Rezaei
2019/138 ( PDF )
Unifying Leakage Models on a Rényi Day
Dahmun Goudarzi and Ange Martinelli and Alain Passelčgue and Thomas Prest
2019/137 ( PDF )
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications
Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2019/136 ( PDF )
Divisible E-Cash from Constrained Pseudo-Random Functions
Florian Bourse and David Pointcheval and Olivier Sanders
2019/135 ( PDF )
It wasn't me! Repudiability and Unclaimability of Ring Signatures
Sunoo Park and Adam Sealfon
2019/134 ( PDF )
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/133 ( PDF )
On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography.
Vasyl Ustimenko
2019/132 ( PDF )
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
Olivier Bronchain and Julien M. Hendrickx and Clément Massart and Alex Olshevsky and François-Xavier Standaert
2019/131 ( PDF )
Secure Evaluation of Quantized Neural Networks
Assi Barak and Daniel Escudero and Anders Dalskov and Marcel Keller
2019/130 ( PDF )
Are Certificate Thumbprints Unique?
Greg Zaverucha and Dan Shumow
2019/129 ( PDF )
Homomorphic Secret Sharing from Lattices Without FHE
Elette Boyle and Lisa Kohl and Peter Scholl
2019/128 ( PDF )
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions
Junichi Tomida
2019/127 ( PDF )
Beyond Birthday Bound Secure MAC in Faulty Nonce Model
Avijit Dutta and Mridul Nandi and Suprita Talnikar
2019/126 ( PDF )
New Automatic search method for Truncated-differential characteristics: Application to Midori, SKINNY and CRAFT
AmirHossein E. Moghaddam and Zahra Ahmadian
2019/125 ( PDF )
Combinatorial Primality Test
Maheswara Rao Valluri
2019/124 ( PDF )
Anomalous Look at Provable Security
Douglas Wikström
2019/123 ( PDF )
Security of Multilinear Galois Mode (MGM)
Liliya Akhmetzyanova and Evgeny Alekseev and Grigory Karpunin and Vladislav Nozdrunov
2019/122 ( PDF )
Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes
Santosh Ghosh and Rafael Misoczki and Manoj R. Sastry
2019/121 ( PDF )
Anonymous Attestation for IoT
Santosh Ghosh and Andrew H. Reinders and Rafael Misoczki and Manoj R. Sastry
2019/120 ( PDF )
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019
Keita Xagawa
2019/119 ( PDF )
On the security of the BCTV Pinocchio zk-SNARK variant
Ariel Gabizon
2019/118 ( -- withdrawn -- )
Defeating the Hart, Kim, Micheli, Pascuel-Perez, Petit, Quek Attack on WalnutDSA(TM)
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2019/117 ( PDF )
Non-Interactive Keyed-Verification Anonymous Credentials
Geoffroy Couteau and Michael Reichle
2019/116 ( PDF )
Multi-Key Homomophic Encryption from TFHE
Hao Chen and Ilaria Chillotti and Yongsoo Song
2019/115 ( PDF )
Distributional Collision Resistance Beyond One-Way Functions
Nir Bitansky and Iftach Haitner and Ilan Komargodski and Eylon Yogev
2019/114 ( PDF )
Fast Multiparty Threshold ECDSA with Fast Trustless Setup
Rosario Gennaro and Steven Goldfeder
2019/113 ( PDF )
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure
Ferucio Laurentiu Tiplea and Cristian Hristea
2019/112 ( PDF )
Variable Elimination - a Tool for Algebraic Cryptanalysis
Bjřrn Greve and Řyvind Ytrehus and Hĺvard Raddum
2019/111 ( PDF )
On the Complexity of non-recursive $n$-term Karatsuba Multiplier for Trinomials
Yin Li and Shantanu Sharma and Yu Zhang and Xingpo Ma and Chuanda Qi
2019/110 ( PDF )
Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves
Suhri Kim and Kisoon Yoon and Young-Ho Park and Seokhie Hong
2019/109 ( PDF )
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture
Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2019/108 ( PDF )
Minicrypt Primitives with Algebraic Structure and Applications
Navid Alamati and Hart Montgomery and Sikhar Patranabis and Arnab Roy
2019/107 ( PDF )
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit
Shun Li and Siwei Sun and Chaoyun Li and Zihao Wei and Lei Hu
2019/106 ( PDF )
Identity-Based Higncryption
Hongbing Wang and Yunlei Zhao
2019/105 ( PDF )
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
Antonio Faonio and Daniele Venturi
2019/104 ( PDF )
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation
Naomi Farley and Robert Fitzpatrick and Duncan Jones
2019/103 ( PDF )
Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE
Samuel Jaques and John M. Schanck
2019/102 ( PDF )
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum
Hisham S. Galal and Amr M. Youssef
2019/101 ( PDF )
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption
Sergiu Carpov and Nicolas Gama and Mariya Georgieva and Juan Ramon Troncoso-Pastoriza
2019/100 ( PDF )
Correlation Power Analysis on NTRU Prime and Related Countermeasures
Wei-Lun Huang and Jiun-Peng Chen and Bo-Yin Yang
2019/099 ( PDF )
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings
Mary Maller and Sean Bowe and Markulf Kohlweiss and Sarah Meiklejohn
2019/098 ( PDF )
A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions
Pedro Branco
2019/097 ( PDF )
Linearly equivalent S-boxes and the Division Property
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin
2019/096 ( PDF )
On Recovering Affine Encodings in White-Box Implementations
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin and Brice Minaud
2019/095 ( PDF )
Variants of the AES Key Schedule for Better Truncated Differential Bounds
Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean and Baptiste Lambin
2019/094 ( PDF )
CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges
Aron Gohr and Sven Jacob and Werner Schindler
2019/093 ( PDF )
Key Encapsulation Mechanism From Modular Multivariate Linear Equations
Muhammad Rezal Kamel Ariffin and Abderrahmane Nitaj and Yanbin Pan and Nur Azman Abu
2019/092 ( PDF )
Partitions in the S-Box of Streebog and Kuznyechik
Léo Perrin
2019/091 ( PDF )
Efficient Zero-Knowledge for NP from Secure Two-Party Computation
Li Hongda and Pan Dongxue and Ni Peifang
2019/090 ( PDF )
Round5: Compact and Fast Post-Quantum Public-Key Encryption
Hayo Baan and Sauvik Bhattacharya and Scott Fluhrer and Oscar Garcia-Morchon and Thijs Laarhoven and Ronald Rietman and Markku-Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang
2019/089 ( PDF )
The General Sieve Kernel and New Records in Lattice Reduction
Martin R. Albrecht and Léo Ducas and Gottfried Herold and Elena Kirshanova and Eamonn W. Postlethwaite and Marc Stevens
2019/088 ( PDF )
Continuous Key Agreement with Reduced Bandwidth
Nir Drucker and Shay Gueron
2019/087 ( PDF )
The Secure Link Prediction Problem
Laltu Sardar and Sushmita Ruj
2019/086 ( PDF )
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG
George Teseleanu
2019/085 ( PDF )
The Lattice-Based Digital Signature Scheme qTESLA
Erdem Alkim and Paulo S. L. M. Barreto and Nina Bindel and Patrick Longa and Jefferson E. Ricardini
2019/084 ( PDF )
An Information Obfuscation Calculus for Encrypted Computing
Peter T. Breuer
2019/083 ( PDF )
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15
Zhen Liu and Yanbin Pan and Zhenfei Zhang
2019/082 ( PDF )
Arithmetic Garbling from Bilinear Maps
Nils Fleischhacker and Giulio Malavolta and Dominique Schröder
2019/081 ( PDF )
Practical Group-Signatures with Privacy-Friendly Openings
Stephan Krenn and Kai Samelin and Christoph Striecks
2019/080 ( PDF )
Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing
Aner Ben Efraim and Michael Nielsen and Eran Omri
2019/079 ( PDF )
New Results about the Boomerang Uniformity of Permutation Polynomials
Kangquan Li and Longjiang Qu and Bing Sun and Chao Li
2019/078 ( PDF )
Testing the Randomness of Cryptographic Function Mappings
Alan Kaminsky
2019/077 ( PDF )
Pairing Implementation Revisited
Michael Scott
2019/076 ( PDF )
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations
Matthieu Rivain and Junwei Wang
2019/075 ( PDF )
Assessment of the Key-Reuse Resilience of NewHope
Aurélie Bauer and Henri Gilbert and Guénaël Renault and Mélissa Rossi
2019/074 ( PDF )
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
Chun Guo and Jonathan Katz and Xiao Wang and Yu Yu
2019/073 ( PDF )
Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model
Cristian Hristea and Ferucio Laurentiu Tiplea
2019/072 ( PDF )
ZeroCT: Improving ZeroCoin with Confidential Transactions and more
Alex Vazquez
2019/071 ( PDF )
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks
Zhilin Zhang and Ke Wang and Weipeng Lin and Ada Wai-Chee Fu and Raymond Chi-Wing Wong
2019/070 ( PDF )
Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool
Sam M. Werner and Paul J. Pritz and Alexei Zamyatin and William J. Knottenbelt
2019/069 ( PDF )
Quantum Indistinguishability of Random Sponges
Jan Czajkowski and Andreas Hülsing and Christian Schaffner
2019/068 ( PDF )
Sampling the Integers with Low Relative Error
Michael Walter
2019/067 ( PDF )
Managing Your Kleptographic Subscription Plan
George Teseleanu
2019/066 ( PDF )
Publicly Verifiable Proofs from Blockchains
Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2019/065 ( PDF )
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols
Jan Camenisch and Manu Drijvers and Björn Tackmann
2019/064 ( PDF )
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management
Keita Emura and Takuya Hayashi
2019/063 ( PDF )
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup
Michael Backes and Lucjan Hanzlik and Amir Herzberg and Aniket Kate and Ivan Pryvalov
2019/062 ( PDF )
Additively Homomorphic IBE from Higher Residuosity
Michael Clear and Ciaran McGoldrick
2019/061 ( PDF )
SigAttack: New High-level SAT-based Attack on Logic Encryptions
Yuanqi Shen and You Li and Shuyu Kong and Amin Rezaei and Hai Zhou
2019/060 ( PDF )
CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States
Amin Rezaei and You Li and Yuanqi Shen and Shuyu Kong and Hai Zhou
2019/059 ( PDF )
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption
Yuanqi Shen and You Li and Amin Rezaei and Shuyu Kong and David Dlott and Hai Zhou
2019/058 ( PDF )
Tightly secure hierarchical identity-based encryption
Roman Langrehr and Jiaxin Pan
2019/057 ( PDF )
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts
Rafael del Pino and Vadim Lyubashevsky and Gregor Seiler
2019/056 ( PDF )
Obfuscating simple functionalities from knowledge assumptions
Ward Beullens and Hoeteck Wee
2019/055 ( PDF )
Rate-Optimizing Compilers for Continuously Non-Malleable Codes
Sandro Coretti and Antonio Faonio and Daniele Venturi
2019/054 ( PDF )
Deep Learning to Evaluate Secure RSA Implementations
Mathieu Carbone and Vincent Conin and Marie-Angela Cornelie and Francois Dassance and Guillaume Dufresne and Cecile Dumas and Emmanuel Prouff and Alexandre Venelli
2019/053 ( -- withdrawn -- )
A New Code-based Signature Scheme with Shorter Public Key
Yongcheng Song and Xinyi Huang and Yi Mu and Wei Wu
2019/052 ( PDF )
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/051 ( PDF )
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy
Daode Zhang and Jie Li and Bao Li and Xianhui Lu and Haiyang Xue and Dingding Jia and Yamin Liu
2019/050 ( PDF )
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions
Takahiro Matsuda and Kenta Takahashi and Takao Murakami and Goichiro Hanaoka
2019/049 ( PDF )
The Relationship between the Construction and Solution of the MILP Models and Applications
Lingchen Li and Wenling Wu and Yafei Zheng and Lei Zhang
2019/048 ( PDF )
Sub-logarithmic Distributed Oblivious RAM with Small Block Size
Eyal Kushilevitz and Tamer Mour
2019/047 ( PDF )
NIST Post-Quantum Cryptography- A Hardware Evaluation Study
Kanad Basu and Deepraj Soni and Mohammed Nabeel and Ramesh Karri
2019/046 ( PDF )
Block-Anti-Circulant Unbalanced Oil and Vinegar
Alan Szepieniec and Bart Preneel
2019/045 ( PDF )
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio
Ryo Nishimaki and Takashi Yamakawa
2019/044 ( PDF )
Toha Key Hardened Function
Ahmad Almorabea
2019/043 ( PDF )
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
Qian Guo and Thomas Johansson and Alexander Nilsson
2019/042 ( PDF )
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs
Lisa Kohl
2019/041 ( PDF )
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
Bartosz Zoltak
2019/040 ( PDF )
NTTRU: Truly Fast NTRU Using NTT
Vadim Lyubashevsky and Gregor Seiler
2019/039 ( PDF )
Fully Invisible Protean Signatures Schemes
Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2019/038 ( PDF )
Identity-based Broadcast Encryption with Efficient Revocation
Aijun Ge and Puwen Wei
2019/037 ( PDF )
Improving Attacks on Round-Reduced Speck32/64 using Deep Learning
Aron Gohr
2019/036 ( PDF )
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR
Shuichi Katsumata and Shota Yamada
2019/035 ( PDF )
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ
Carsten Baum and Daniele Cozzo and Nigel P. Smart
2019/034 ( PDF )
A Formal Treatment of Hardware Wallets
Myrto Arapinis and Andriana Gkaniatsou and Dimitris Karakostas and Aggelos Kiayias
2019/033 ( PDF )
FE for Inner Products and Its Application to Decentralized ABE
Zhedong Wang and Xiong Fan and Feng-Hao Liu
2019/032 ( PDF )
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation
Steven Galbraith and Jake Massimo and Kenneth G. Paterson
2019/031 ( PDF )
Collusion Resistant Broadcast and Trace from Positional Witness Encryption
Rishab Goyal and Satyanarayana Vusirikala and Brent Waters
2019/030 ( -- withdrawn -- )
Analysis of Two Countermeasures against the Signal Leakage Attack
Ke Wang and Zhenfeng Zhang
2019/029 ( -- withdrawn -- )
Upper Bound on $\lambda_1(\Lambda^{\bot}(\mathbf A))$
Huiwen Jia and Chunming Tang and Yanhua Zhang
2019/028 ( PDF )
nQUIC: Noise-Based QUIC Packet Protection
Mathias Hall-Andersen and David Wong and Nick Sullivan and Alishah Chator
2019/027 ( PDF )
Group Signatures with Selective Linkability
Lydia Garms and Anja Lehmann
2019/026 ( PDF )
Non-malleable encryption with proofs of plaintext knowledge and applications to voting
Ben Smyth and Yoshikazu Hanatani
2019/025 ( PDF )
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers
Yu Liu and Huicong Liang and Muzhou Li and Luning Huang and Kai Hu and Chenhe Yang and Meiqin Wang
2019/024 ( PDF )
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography
Yalin Chen and Jue-Sam Chou and Fang-Qi Zhou
2019/023 ( PDF )
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
Joachim Breitner and Nadia Heninger
2019/022 ( PDF )
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Anthony Demeri and Thomas Conroy and Alex Nolan and William Diehl
2019/021 ( PDF )
CryptoNote+
Ilya Aldanov
2019/020 ( PDF )
Decentralizing Inner-Product Functional Encryption
Michel Abdalla and Fabrice Benhamouda and Markulf Kolhweiss and Hendrik Waldner
2019/019 ( PDF )
Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach
Chunning Zhou and Wentao Zhang and Tianyou Ding and Zejun Xiang
2019/018 ( PDF )
Generic Constructions of Robustly Reusable Fuzzy Extractor
Yunhua Wen and Shengli Liu and Dawu Gu
2019/017 ( PDF )
CHURP: Dynamic-Committee Proactive Secret Sharing
Sai Krishna Deepak Maram and Fan Zhang and Lun Wang and Andrew Low and Yupeng Zhang and Ari Juels and Dawn Song
2019/016 ( PDF )
Fast Message Franking: From Invisible Salamanders to Encryptment
Yevgeniy Dodis and Paul Grubbs and Thomas Ristenpart and Joanne Woodage
2019/015 ( PDF )
More Efficient Algorithms for the NTRU Key Generation using the Field Norm
Thomas Pornin and Thomas Prest
2019/014 ( PDF )
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks
Gaurav Panwar and Satyajayant Misra and Roopa Vishwanathan
2019/013 ( PDF )
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces
Changhai Ou and Siew-Kei Lam
2019/012 ( PDF )
A Proof of the Beierle-Kranz-Leander’s Conjecture related to Lightweight Multiplication in $F_{2^n}$
Sihem Mesnager and Kwang Ho Kim and Dujin Jo and Junyop Choe and Munhyon Han and Dok Nam Lee
2019/011 ( PDF )
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Paul Grubbs and Marie-Sarah Lacharité and Brice Minaud and Kenneth G. Paterson
2019/010 ( PDF )
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC
Rodrigo Abarzúa and Claudio Valencia and Julio López
2019/009 ( PDF )
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
Qian Guo and Thomas Johansson and Erik Mĺrtensson and Paul Stankovski Wagner
2019/008 ( PDF )
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
Jingyu Pan and Shivam Bhasin and Fan Zhang and Kui Ren
2019/007 ( PDF )
Tight Security Bounds for Generic Stream Cipher Constructions
Matthias Hamann and Matthias Krause
2019/006 ( PDF )
Minimizing Trust in Hardware Wallets with Two Factor Signatures
Antonio Marcedone and Rafael Pass and abhi shelat
2019/005 ( PDF )
ScanSAT: Unlocking Obfuscated Scan Chains
Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, and Ozgur Sinanoglu
2019/004 ( PDF )
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
Guillaume Dabosville and Houssem Maghrebi and Alexis Lhuillery and Julien Bringer and Thanh-Ha Le
2019/003 ( -- withdrawn -- )
Secure and Effective Logic Locking for Machine Learning Applications
Yuntao Liu and Yang Xie and Abhishek Charkraborty and Ankur Srivastava
2019/002 ( PDF )
Leakage-Resilient Group Signature: Definitions and Constructions
Jianye Huang and Qiong Huang
2019/001 ( PDF )
Sanctorum: A lightweight security monitor for secure enclaves
Ilia Lebedev and Kyle Hogan and Jules Drean and David Kohlbrenner and Dayeol Lee and Krste Asanović and Dawn Song and Srinivas Devadas


[ Cryptology ePrint archive ]