Cryptology ePrint Archive: Listing for 2021


2021/1448 ( PDF )
Secure Featurization and Applications to Secure Phishing Detection
Akash Shah and Nishanth Chandran and Mesfin Dema and Divya Gupta and Arun Gururajan and Huan Yu
2021/1447 ( PDF )
Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
Sebastian Paul and Yulia Kuzovkova and Norman Lahr and Ruben Niederhagen
2021/1446 ( PDF )
Batch point compression in the context of advanced pairing-based protocols
Dmitrii Koshelev
2021/1445 ( PDF )
Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers
Lukas Aumayr and Sri AravindaKrishnan Thyagarajan and Giulio Malavolta and Pedro Monero-Sanchez and Matteo Maffei
2021/1444 ( PDF )
Streamlined NTRU Prime on FPGA
Bo-Yuan Peng and Adrian Marotzke and Ming-Han Tsai and Bo-Yin Yang and Ho-Lin Chen
2021/1443 ( PDF )
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation
Karl Wüst and Kari Kostiainen and Srdjan Capkun
2021/1442 ( PDF )
$P/poly$ Invalidity of the Agr17 Functional Encryption Scheme
Yupu Hu and Jun Liu and Baocang Wang and Xingting Dong and Yanbin Pan
2021/1441 ( PDF )
Length-preserving encryption with HCTR2
Paul Crowley and Nathan Huckleberry and Eric Biggers
2021/1440 ( PDF )
Improved Circuit-based PSI via Equality Preserving Compression
Kyoohyung Han and Dukjae Moon and Yongha Son
2021/1439 ( PDF )
An Addendum to the ZUC-256 Stream Cipher
ZUC Design Team
2021/1438 ( PDF )
Incremental Offline/Online PIR (extended version)
Yiping Ma and Ke Zhong and Tal Rabin and Sebastian Angel
2021/1437 ( PDF )
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking
Anuj Dubey and Afzal Ahmad and Muhammad Adeel Pasha and Rosario Cammarota and Aydin Aysu
2021/1436 ( PDF )
Efficient Representation of Numerical Optimization Problems for SNARKs
Sebastian Angel and Andrew J. Blumberg and Eleftherios Ioannidis and Jess Woods
2021/1435 ( PDF )
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a
ZhaoCun Zhou and DengGuo Feng and Bin Zhang
2021/1434 ( PDF )
The Language's Impact on the Enigma Machine
Daniel Matyas Perendi and Prosanta Gope
2021/1433 ( PDF )
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds
Arka Rai Choudhuri and Michele Ciampi and Vipul Goyal and Abhishek Jain and Rafail Ostrovsky
2021/1432 ( PDF )
Wavelet: Code-based postquantum signatures with fast verification on microcontrollers
Gustavo Banegas and Thomas Debris-Alazard and Milena Nedeljković and Benjamin Smith
2021/1431 ( PDF )
Secure and Efficient Multi-Key FHE Scheme Supporting Multi-bit Messages from LWE Preserving Non-Interactive Decryption
Chinmoy Biswas and Ratna Dutta
2021/1430 ( PDF )
Improved Zero-Knowledge Argument of Encrypted Extended Permutation
Yi Liu and Qi Wang and Siu-Ming Yiu
2021/1429 ( PDF )
Reviewing ISO/IEC Standard for Time-stamping Services
Long Meng and Liqun Chen
2021/1428 ( PDF )
Non-randomness of S-unit lattices
Daniel J. Bernstein and Tanja Lange
2021/1427 ( PDF )
Public-Key Quantum Money with a Classical Bank
Omri Shmueli
2021/1426 ( PDF )
On Unpadded NTRU Quantum (In)Security
Théodore Conrad-Frenkiel and Rémi Géraud-Stewart and David Naccache
2021/1425 ( PDF )
Improving First-Order Threshold Implementations of SKINNY
Andrea Caforio and Daniel Collins and Ognjen Glamocanin and Subhadeep Banik
2021/1424 ( PDF )
PREs with HRA Security and Key Privacy Based on Standard LWE Assumptions
Yang Wang and Yanmin Zhao and Mingqiang Wang
2021/1423 ( PDF )
Encryption to the Future: A Paradigm for Sending Secret Messages to Future (Anonymous) Committees
Matteo Campanelli and Bernardo David and Hamidreza Khoshakhlagh and Anders Konring and Jesper Buus Nielsen
2021/1422 ( PDF )
Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography
Jan-Pieter D'Anvers and Daniel Heinz and Peter Pessl and Michiel van Beirendonck and Ingrid Verbauwhede
2021/1421 ( PDF )
Breaking the $IKEp182 Challenge
Aleksei Udovenko and Giuseppe Vitto
2021/1420 ( PDF )
Extending the Tally-Hiding Ordinos System: Implementations for Borda, Hare-Niemeyer, Condorcet, and Instant-Runoff Voting
Fabian Hertel and Nicolas Huber and Jonas Kittelberger and Ralf Kuesters and Julian Liedtke and Daniel Rausch
2021/1419 ( PDF )
With a Little Help from My Friends: Constructing Practical Anonymous Credentials
Lucjan Hanzlik and Daniel Slamanig
2021/1418 ( PDF )
Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets
Qi Lei and Zijia Yang and Qin Wang and Yaoling Ding and Zhe Ma and An Wang
2021/1417 ( PDF )
How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption
Koji Nuida
2021/1416 ( PDF )
SME: Scalable Masking Extensions
Ben Marshall and Dan Page
2021/1415 ( PDF )
A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers
Aayush Jain and Alexis Korb and Paul Lou and Amit Sahai
2021/1414 ( PDF )
Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis
Guilherme Perin and Lichao Wu and Stjepan Picek
2021/1413 ( PDF )
Three Attacks on Proof-of-Stake Ethereum
Caspar Schwarz-Schilling and Joachim Neu and Barnabé Monnot and Aditya Asgaonkar and Ertem Nusret Tas and David Tse
2021/1412 ( PDF )
A Unified Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Setup
Hyesun Kwak and Dongwon Lee and Yongsoo Song and Sameer Wagh
2021/1411 ( PDF )
Analysis of Client-side Security for Long-term Time-stamping Services
Long Meng and Liqun Chen
2021/1410 ( PDF )
Franchised Quantum Money
Bhaskar Roberts and Mark Zhandry
2021/1409 ( PDF )
Hiding in Plain Sight: Memory-tight Proofs via Randomness Programming
Ashrujit Ghoshal and Riddhi Ghosal and Joseph Jaeger and Stefano Tessaro
2021/1408 ( PDF )
Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis
Maikel Kerkhof and Lichao Wu and Guilherme Perin and Stjepan Picek
2021/1407 ( PDF )
A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs
Keitaro Hashimoto and Shuichi Katsumata and Eamonn Postlethwaite and Thomas Prest and Bas Westerbaan
2021/1406 ( PDF )
Non-Slanderability of Linkable Spontaneous Anonymous Group Signature (LSAG)
Veronika Kuchta and Joseph K. Liu
2021/1405 ( PDF )
Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols
Tianyu Zheng and Shang Gao and Bin Xiao and Yubo Song
2021/1404 ( PDF )
Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments
Dakshita Khurana
2021/1403 ( PDF )
Efficient Adaptively-Secure Byzantine Agreement for Long Messages
Amey Bhangale and Chen-Da Liu-Zhang and Julian Loss and Kartik Nayak
2021/1402 ( PDF )
Guide to Fully Homomorphic Encryption over the [Discretized] Torus
Marc Joye
2021/1401 ( PDF )
HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks
Zeta Avarikioti and Krzysztof Pietrzak and Iosif Salem and Stefan Schmid and Samarth Tiwari and Michelle Yeo
2021/1400 ( PDF )
Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version)
Anubhab Baksi and Vishnu Asutosh Dasu and Banashri Karmakar and Anupam Chattopadhyay and Takanori Isobe
2021/1399 ( PDF )
Iterated Inhomogeneous Polynomials
Jiaxin Guan and Mark Zhandry
2021/1398 ( PDF )
Universally Composable Almost-Everywhere Secure Computation
Nishanth Chandran and Pouyan Forghani and Juan Garay and Rafail Ostrovsky and Rutvik Patel and Vassilis Zikas
2021/1397 ( PDF )
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
Craig Gentry and Shai Halevi and Vadim Lyubashevsky
2021/1396 ( PDF )
NTT software optimization using an extended Harvey butterfly
Jonathan Bradbury and Nir Drucker and Marius Hillenbrand
2021/1395 ( PDF )
Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-degree Polynomials
Reo Eriguchi and Koji Nuida
2021/1394 ( PDF )
Rethinking Modular Multi-Exponentiation in Real-World Applications
Vidal Attias and Luigi Vigneri and Vassil Dimitrov
2021/1393 ( PDF )
Fiat–Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model)
Chaya Ganesh and Claudio Orlandi and Mahak Pancholi and Akira Takahashi and Daniel Tschudi
2021/1392 ( PDF )
Differential fault attack on DEFAULT
Chandan Dey and Sumit Kumar Pandey and Tapabrata Roy and Santanu Sarkar
2021/1391 ( PDF )
A note on a Claim of Eldar & Hallgren: LLL already solves it
Léo Ducas and Wessel van Woerden
2021/1390 ( PDF )
UC Secure Private Branching Program and Decision Tree Evaluation
Keyu Ji and Bingsheng Zhang and Tianpei Lu and Lichun Li and Kui Ren
2021/1389 ( PDF )
DPCrypto: Acceleration of Post-quantum Cryptographic Algorithms using Dot-Product Instruction on GPUs
Wai-Kong Lee and Hwajeong Seo and Seong Oun Hwang and Angshuman Karmakar and Jose Maria Bermudo Mera and Ramachandra Achar
2021/1388 ( PDF )
MILES: Modeling Large S-box in MILP Based Differential Characteristic Search
Tarun Yadav and Manoj Kumar
2021/1387 ( PDF )
Triplicate functions
Lilya Budaghyan and Ivana Ivkovic and Nikolay Kaleyski
2021/1386 ( PDF )
Efficient Threshold-Optimal ECDSA
Michaella Pettit
2021/1385 ( PDF )
BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Nabil Alkeilani Alkadri and Patrick Harasser and Christian Janson
2021/1384 ( PDF )
Log-S-unit lattices using Explicit Stickelberger Generators to solve Approx Ideal-SVP
Olivier Bernard and Andrea Lesavourey and Tuong-Huy Nguyen and Adeline Roux-Langlois
2021/1383 ( PDF )
MHz2k: MPC from HE over $\mathbb{Z}_{2^k}$ with New Packing, Simpler Reshare, and Better ZKP
Jung Hee Cheon and Dongwoo Kim and Keewoo Lee
2021/1382 ( PDF )
ZPiE: Zero-knowledge Proofs in Embedded systems
Xavier Salleras and Vanesa Daza
2021/1381 ( PDF )
Multi-Authority ABE, Revisited
Miguel Ambrona and Romain Gay
2021/1380 ( PDF )
Orca: Blocklisting in Sender-Anonymous Messaging
Nirvan Tyagi and Julia Len and Ian Miers and Thomas Ristenpart
2021/1379 ( PDF )
Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work \\ A Provably Secure Blockchain Protocol
Matthias Fitzi and Aggelos Kiayias and Giorgos Panagiotakos and Alexander Russell
2021/1378 ( PDF )
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
Tim Beyne and Siemen Dhooghe and Amir Moradi and Aein Rezaei Shahmirzadi
2021/1377 ( PDF )
Fiat-Shamir Transformation of Multi-Round Interactive Proofs
Thomas Attema and Serge Fehr and Michael Klooß
2021/1376 ( PDF )
Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks
Ivan Damgård and Daniel Escudero and Antigoni Polychroniadou
2021/1375 ( PDF )
How to Prove Schnorr Assuming Schnorr: Security of Multi- and Threshold Signatures
Elizabeth Crites and Chelsea Komlo and Mary Maller
2021/1374 ( PDF )
Information-Combining Differential Fault Attacks on DEFAULT
Marcel Nageler and Christoph Dobraunig and Maria Eichlseder
2021/1373 ( PDF )
Highly Efficient OT-Based Multiplication Protocols
Iftach Haitner and Nikolaos Makriyannis and Samuel Ranellucci and Eliad Tsfadia
2021/1372 ( PDF )
Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones
Eugene Frimpong and Reyhaneh Rabbaninejad and Antonis Michalas
2021/1371 ( PDF )
A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test
Kyoichi Asano and Keita Emura and Atsushi Takayasu and Yohei Watanabe
2021/1370 ( PDF )
Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments
Dimitris Mouris and Nektarios Georgios Tsoutsos
2021/1369 ( PDF )
Faster Isogenies for Quantum-Safe SIKE
Rami Elkhatib and Brian Koziel and Reza Azarderakhsh
2021/1368 ( PDF )
Group Signatures and Accountable Ring Signatures from Isogeny-based Assumptions
Kai-Min Chung and Yao-Ching Hsieh and Mi-Ying Huang and Yu-Hsuan Huang and Tanja Lange and Bo-Yin Yang
2021/1367 ( -- withdrawn -- )
Hybrid Steganography deployed in hospitals for compression of medical images
Avinash Vijayarangan, K.R. Sekar, R. Srikanth
2021/1366 ( PDF )
Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient
Ward Beullens and Samuel Dobson and Shuichi Katsumata and Yi-Fu Lai and Federico Pintore
2021/1365 ( PDF )
Collusion Resistant Revocable Ring Signatures and Group Signatures from Hard Homogeneous Spaces
Yi-Fu Lai and Samuel Dobson
2021/1364 ( PDF )
Non-applicability of the Gaborit&Aguilar-Melchor patent to Kyber and Saber
Vadim Lyubashevsky and Damien Stehlé
2021/1363 ( PDF )
On Entropy and Bit Patterns of Ring Oscillator Jitter
Markku-Juhani O. Saarinen
2021/1362 ( PDF )
Practical Multiple Persistent Faults Analysis
Hadi Soleimany and Nasour Bagheri and Hosein Hadipour and Prasanna Ravi and Shivam Bhasin and Sara Mansouri
2021/1361 ( PDF )
Plumo: An Ultralight Blockchain Client
Psi Vesely and Kobi Gurkan and Michael Straka and Ariel Gabizon and Philipp Jovanovic and Georgios Konstantopoulos and Asa Oines and Marek Olszewski and and Eran Tromer
2021/1360 ( PDF )
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More
Behzad Abdolmaleki and Daniel Slamanig
2021/1359 ( PDF )
Families of SNARK-friendly 2-chains of elliptic curves
Youssef El Housni and Aurore Guillevic
2021/1358 ( PDF )
The Hardness of LWE and Ring-LWE: A Survey
David Balbás
2021/1357 ( PDF )
Two-Round Concurrently Secure Two-Party Computation
Behzad Abdolmaleki and Giulio Malavolta and Ahmadreza Rahimi
2021/1356 ( PDF )
Structural Mutual Information and Its Application
Youliang Tian and Zhiying Zhang and Jinbo Xiong and Jianfeng Ma
2021/1355 ( PDF )
Curve448 on 32-bit ARM Cortex-M4
Hwajeong Seo and Reza Azarderakhsh
2021/1354 ( PDF )
SoK: On the Security of Cryptographic Problems from Linear Algebra
Carl Bootland and Wouter Castryck and Alan Szepieniec and Frederik Vercauteren
2021/1353 ( PDF )
Noise-Tolerant Quantum Tokens for MAC
Amit Behera and Or Sattath and Uriel Shinar
2021/1352 ( PDF )
A Thorough Treatment of Highly-Efficient NTRU Instantiations
Julien Duman and Kathrin Hövelmanns and Eike Kiltz and Vadim Lyubashevsky and Gregor Seiler and Dominique Unruh
2021/1351 ( PDF )
Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing
Julien Duman and Eike Kiltz and Kathrin Hövelmanns and Vadim Lyubashevsky and Gregor Seiler
2021/1350 ( PDF )
Generalized Proof of Liabilities
Yan Ji and Konstantinos Chalkias
2021/1349 ( PDF )
Updatable Private Set Intersection
Saikrishna Badrinarayanan and Peihan Miao and Tiancheng Xie
2021/1348 ( PDF )
Beyond quadratic speedups in quantum attacks on symmetric schemes
Xavier Bonnetain and André Schrottenloher and Ferdinand Sibleyras
2021/1347 ( PDF )
TOTA: Fully Homomorphic Encryption with Smaller Parameters and Stronger Security
Zhaomin Yang and Xiang Xie and Huajie Shen and Shiying Chen and Jun Zhou
2021/1346 ( PDF )
WeStat: a Privacy-Preserving Mobile Data Usage Statistics System
Sébastien Canard and Nicolas Desmoulins and Sébastien Hallay and Adel Hamdi and Dominique Le Hello
2021/1345 ( PDF )
New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair
Subhadeep Banik and Khashayar Barooti and Serge Vaudenay and Hailun Yan
2021/1344 ( PDF )
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware
Jan Richter-Brockmann and Ming-Shing Chen and Santosh Ghosh and Tim Güneysu
2021/1343 ( PDF )
A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW
Hanlin Liu and Yu Yu
2021/1342 ( PDF )
Efficient Functional Commitments: How to Commit to Private Functions
Dan Boneh and Wilson Nguyen and Alex Ozdemir
2021/1341 ( PDF )
Anonymous Whistleblowing over Authenticated Channels
Thomas Agrikola and Geoffroy Couteau and Sven Maier
2021/1340 ( PDF )
TEDT2 - Highly Secure Leakage-resilient TBC-based Authenticated Encryption
Eik List
2021/1339 ( PDF )
Safe-Error Analysis of Post-Quantum Cryptography Mechanisms
Luk Bettale and Simon Montoya and Guénaël Renault
2021/1338 ( PDF )
Embedded Multilayer Equations: a New Hard Problem for Constructing Post-Quantum Signatures Smaller than RSA (without Hardness Assumption)
Dongxi Liu
2021/1337 ( PDF )
Large-Precision Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping
Zeyu Liu and Daniele Micciancio and Yuriy Polyakov
2021/1336 ( PDF )
Improved Computational Extractors and their Applications
Dakshita Khurana and Akshayaram Srinivasan
2021/1335 ( PDF )
Integer Functions Suitable for Homomorphic Encryption over Finite Fields
Ilia Iliashenko and Christophe Nègre and Vincent Zucca
2021/1334 ( PDF )
Indistinguishability Obfuscation from LPN over F_p, DLIN, and PRGs in NC^0
Aayush Jain and Huijia Lin and Amit Sahai
2021/1333 ( PDF )
Paradoxical Compression with Verifiable Delay Functions
Thomas Pornin
2021/1332 ( PDF )
On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography
Léo Ducas and Wessel van Woerden
2021/1331 ( PDF )
Communicating Through Subliminal-Free Signatures
George Teseleanu
2021/1330 ( PDF )
On the security of ECDSA with additive key derivation and presignatures
Jens Groth and Victor Shoup
2021/1329 ( PDF )
Trail Search with CRHS Equations
John Petter Indrøy and Håvard Raddum
2021/1328 ( PDF )
Cross-Subkey Deep-Learning Side-Channel Analysis
Fanliang Hu and Huanyu Wang and Junnian Wang
2021/1327 ( PDF )
Secure Multiparty Computation in the Bounded Storage Model
Jiahui Liu and Satyanarayana Vusirikala
2021/1326 ( PDF )
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices
Mo Zhang and Eduard Marin and David Oswald and Dave Singelee
2021/1325 ( PDF )
Decentralized Multi-Authority ABE for NC^1 from Computational-BDH
Pratish Datta and Ilan Komargodski and Brent Waters
2021/1324 ( PDF )
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption
Kamil Kluczniak
2021/1323 ( PDF )
Anonymity of NIST PQC Round-3 KEMs
Keita Xagawa
2021/1322 ( PDF )
A New Adaptive Attack on SIDH
Tako Boris Fouotsa and Christophe Petit
2021/1321 ( PDF )
Blockchain-based Privacy-preserving Fair Data Trading Protocol
Yao Jiang Galteland and Shuang Wu
2021/1320 ( PDF )
Faster Key Generation of Supersingular Isogeny Diffie-Hellman
Kaizhan Lin and Fangguo Zhang and Chang-An Zhao
2021/1319 ( PDF )
Maliciously-Secure MrNISC in the Plain Model
Rex Fernando and Aayush Jain and Ilan Komargodski
2021/1318 ( PDF )
A Supersingular Isogeny-Based Ring Signature
Maryam Sheikhi Garjan and N. Gamze Orhon Kılıç and Murat Cenk
2021/1317 ( PDF )
m-Stability: Threshold Security Meets Transferable Utility
Osman Biçer and Burcu Yıldız and Alptekin Küpçü
2021/1316 ( PDF )
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment
Unai Rioja and Lejla Batina and Igor Armendariz and Jose Luis Flores
2021/1315 ( PDF )
Certified Everlasting Zero-Knowledge Proof for QMA
Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa
2021/1314 ( PDF )
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption
Jean-Sébastien Coron and François Gérard and Simon Montoya and Rina Zeitoun
2021/1313 ( PDF )
Hybrid Memristor-CMOS Obfuscation Against Untrusted Foundries
Amin Rezaei and Jie Gu and Hai Zhou
2021/1312 ( PDF )
Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability
Ashley Fraser and Lydia Garms and Anja Lehmann
2021/1311 ( PDF )
Power analysis attack on Kyber
Alexandre Karlov and Natacha Linard de Guertechin
2021/1310 ( PDF )
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES
Chao Niu and Muzhou Li and Meiqin Wang and Qingju Wang and Siu-Ming Yiu
2021/1309 ( PDF )
Faster Final Exponentiation on the KSS18 Curve
Shiping Cai and Zhi Hu and Chang-An Zhao
2021/1308 ( PDF )
No-Commit Proofs: Defeating Livelock in BFT
Neil Giridharan and Heidi Howard and Ittai Abraham and Natacha Crooks and Alin Tomescu
2021/1307 ( PDF )
In-depth Analysis of Side-Channel Countermeasures for CRYSTALS-Kyber Message Encoding on ARM Cortex-M4
Hauke Malte Steffen and Lucie Johanna Kogelheide and Timo Bartkewitz
2021/1306 ( PDF )
Probabilistic micropayments with transferability
Taisei Takahashi and Akira Otsuka
2021/1305 ( PDF )
(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin
Pratish Datta and Tapas Pal
2021/1304 ( PDF )
An Open Problem on the Bentness of Mesnager’s Functions
Chunming Tang and Peng Han and Qi Wang and Jun Zhang and Yanfeng Qi
2021/1303 ( PDF )
Black-Box Accumulation Based on Lattices
Sebastian H. Faller and Pascal Baumer and Michael Klooß and Alexander Koch and Astrid Ottenhues and Markus Raiber
2021/1302 ( PDF )
Using Blockchain to Achieve Decentralized Privacy In IoT Healthcare
Sajad Meisami and Mohammad Beheshti-Atashgah and Mohammad Reza Aref
2021/1301 ( PDF )
An Isogeny-Based ID Protocol Using Structured Public Keys
Karim Baghery and Daniele Cozzo and Robi Pedersen
2021/1300 ( PDF )
Report and Trace Ring Signatures
Ashley Fraser and Elizabeth A. Quaglia
2021/1299 ( PDF )
Towards Quantum Large-Scale Password Guessing on Real-World Distributions
Markus Dürmuth and Maximilian Golla and Philipp Markert and Alexander May and Lars Schlieper
2021/1298 ( PDF )
Post-Quantum Authentication with Lightweight Cryptographic Primitives
Henrique Faria and José Manuel Valença
2021/1297 ( PDF )
Listen to Your Heart: Evaluation of the Cardiologic Ecosystem
Endres Puschner and Christoph Saatjohann and Markus Willing and Christian Dresen and Julia Köbe and Benjamin Rath and Christof Paar and Lars Eckardt and Uwe Haverkamp and Sebastian Schinzel
2021/1296 ( PDF )
Partitioning Oracles from Weak Key Forgeries
Marcel Armour and Carlos Cid
2021/1295 ( PDF )
Improved Quantum Hypercone Locality Sensitive Filtering in Lattice Sieving
Max Heiser
2021/1294 ( PDF )
Quantum Money from Quaternion Algebras
Daniel M. Kane and Shahed Sharif and Alice Silverberg
2021/1293 ( PDF )
A Practical Verifiable Delay Function and Delay Encryption Scheme
Angelique Faye Loe and Liam Medley and Christian O’Connell and Elizabeth A. Quaglia
2021/1292 ( PDF )
Fast Extended GCD Calculation for Large Integers for Verifiable Delay Functions
Kavya Sreedhar and Mark Horowitz and Christopher Torng
2021/1291 ( PDF )
MyOPE: Malicious securitY for Oblivious Polynomial Evaluation
Malika Izabachène and Anca Nitulescu and Paola de Perthuis and David Pointcheval
2021/1290 ( PDF )
Large-Scale Non-Interactive Threshold Cryptosystems Through Anonymity
Andreas Erwig and Sebastian Faust and Siavash Riahi
2021/1289 ( PDF )
Verifiable Isogeny Walks: Towards an Isogeny-based Postquantum VDF
Jorge Chavez-Saab and Francisco Rodríguez Henríquez and Mehdi Tibouchi
2021/1288 ( PDF )
FO-like Combiners and Hybrid Post-Quantum Cryptography
Loïs Huguenin-Dumittan and Serge Vaudenay
2021/1287 ( PDF )
The Exact Security of BIP32 Wallets
Poulami Das and Andreas Erwig and Sebastian Faust and Julian Loss and Siavash Riahi
2021/1286 ( PDF )
Post-quantum Efficient Proof for Graph 3-Coloring Problem
Ehsan Ebrahimi
2021/1285 ( PDF )
Convexity of division property transitions: theory, algorithms and compact models
Aleksei Udovenko
2021/1284 ( PDF )
APAS: Application-Specific Accelerators for RLWE-based Homomorphic Linear Transformations
Song Bian and Dur E Shahwar Kundi and Kazuma Hirozawa and Weiqiang Liu and Takashi Sato
2021/1283 ( PDF )
Parallel Verification of Serial MAC and AE Modes
Kazuhiko Minematsu and Akiko Inoue and Katsuya Moriwaki and Maki Shigeri and Hiroyasu Kubo
2021/1282 ( PDF )
On the Claims of Weak Block Synchronization in Bitcoin
Seungjin Baek and Hocheol Nam and Yongwoo Oh and Muoi Tran and Min Suk Kang
2021/1281 ( PDF )
Leveled Fully Homomorphic Encryption Schemes with Hensel Codes
David W. H. A. da Silva and Luke Harmon and Gaetan Delavignette and Carlos Araujo
2021/1280 ( PDF )
Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage
Emma Dauterman and Vivian Fang and Ioannis Demertzis and Natacha Crooks and Raluca Ada Popa
2021/1279 ( PDF )
Quantum Diffie-Hellman Key Exchange
Dirk Fischer
2021/1278 ( PDF )
A survey of algorithmic methods in IC reverse engineering
Leonid Azriel and Julian Speith and Nils Albartus and Ran Ginosara and Avi Mendelson and Christof Paar
2021/1277 ( PDF )
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
Florian Stolz and Nils Albartus and Julian Speith and Simon Klix and Clemens Nasenberg and Aiden Gula and Marc Fyrbiak and Christof Paar and Tim Güneysu and Russell Tessier
2021/1276 ( PDF )
On the Security and Performance of Blockchain Sharding
Runchao Han and Jiangshan Yu and Haoyu Lin and Shiping Chen and Paulo Esteves-Veríssimo
2021/1275 ( PDF )
Counterexample to OWF Self-XOR Being a DOWF
Nathan Geier
2021/1274 ( PDF )
Tight Computational Indistinguishability Bound of Product Distributions
Nathan Geier
2021/1273 ( PDF )
OpenSquare: Decentralized Repeated Modular Squaring Service
Sri AravindaKrishnan Thyagarajan and Tiantian Gong and Adithya Bhat and Aniket Kate and Dominique Schröder
2021/1272 ( PDF )
Efficient CCA Timed Commitments in Class Groups
Sri AravindaKrishnan Thyagarajan and Guilhem Castagnos and Fabien Laguillaumie and Giulio Malavolta
2021/1271 ( PDF )
Computing the Jacobi symbol using Bernstein-Yang
Mike Hamburg
2021/1270 ( PDF )
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited
Yevgeniy Dodis and Willy Quach and Daniel Wichs
2021/1269 ( PDF )
Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model
Antonio Faonio
2021/1268 ( PDF )
Simulation-Based Bi-Selective Opening Security for Public Key Encryption
Junzuo Lai and Rupeng Yang and Zhengan Huang and Jian Weng
2021/1267 ( PDF )
Tight Quantum Indifferentiability of a Rate-1/3 Compression Function
Jan Czajkowski
2021/1266 ( PDF )
Update-Sensitive Structured Encryption with Backward Privacy
Zhiqiang Wu and Jin Wang and Keqin Li
2021/1265 ( PDF )
Special Soundness in the Random Oracle Model
Douglas Wikström
2021/1264 ( PDF )
Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge
Prastudy Fauzi and Helger Lipmaa and Janno Siim and Michal Zajac and Arne Tobias Ødegaard
2021/1263 ( PDF )
Transparency Dictionaries with Succinct Proofs of Correct Operation
Ioanna Tzialla and Abhiram Kothapalli and Bryan Parno and Srinath Setty
2021/1262 ( PDF )
Reverse Firewalls for Adaptively Secure MPC without Setup
Suvradip Chakraborty and Chaya Ganesh and Mahak Pancholi and Pratik Sarkar
2021/1261 ( PDF )
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE
Yi Wang and Rongmao Chen and Xinyi Huang and Jianting Ning and Baosheng Wang and Moti Yung
2021/1260 ( PDF )
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers
Jelle Vos and Zekeriya Erkin and Christian Doerr
2021/1259 ( PDF )
Parallel Repetition of $(k_1,\dots,k_{\mu})$-Special-Sound Multi-Round Interactive Proofs
Thomas Attema and Serge Fehr
2021/1258 ( PDF )
Bit Security as Computational Cost for Winning Games with High Probability
Shun Watanabe and Kenji Yasunaga
2021/1257 ( PDF )
Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy
S. Dov Gordon and Jonathan Katz and Mingyu Liang and Jiayu Xu
2021/1256 ( PDF )
Oblivious Message Retrieval
Zeyu Liu and Eran Tromer
2021/1255 ( PDF )
How to Find Ternary LWE Keys Using Locality Sensitive Hashing
Elena Kirshanova and Alexander May
2021/1254 ( PDF )
Vector and Functional Commitments from Lattices
Chris Peikert and Zachary Pepin and Chad Sharp
2021/1253 ( PDF )
EasyPQC: Verifying Post-Quantum Cryptography
Manuel Barbosa and Gilles Barthe and Xiong Fan and Benjamin Grégoire and Shih-Han Hung and Jonathan Katz and Pierre-Yves Strub and Xiaodi Wu and Li Zhou
2021/1252 ( PDF )
Complete Practical Side-Channel-Assisted Reverse Engineering of AES-Like Ciphers
Andrea Caforio and Fatih Balli and Subhadeep Banik
2021/1251 ( PDF )
Efficient NIZKs for Algebraic Sets
Geoffroy Couteau and Helger Lipmaa and Roberto Parisella and Arne Tobias Ødegaard
2021/1250 ( PDF )
Efficient Leakage-Resilient MACs without Idealized Assumptions
Francesco Berti and Chun Guo and Thomas Peters and François-Xavier Standaert
2021/1249 ( PDF )
Flexible Anonymous Transactions (FLAX): Towards Privacy-Preserving and Composable Decentralized Finance
Wei Dai
2021/1248 ( PDF )
The Adversary Capabilities In Practical Byzantine Fault Tolerance
Yongge Wang
2021/1247 ( PDF )
A Geometric Approach to Linear Cryptanalysis
Tim Beyne
2021/1246 ( PDF )
Astrolabous: A Universally Composable Time-Lock Encryption Scheme
Myrto Arapinis and Nikolaos Lamprou and Thomas Zacharias
2021/1245 ( PDF )
SeqL+: Secure Scan-Obfuscation with Theoretical and Empirical Validation
Seetal Potluri and Shamik Kundu and Akash Kumar and Kanad Basu and Aydin Aysu
2021/1244 ( PDF )
IvyCross: A Trustworthy and Privacy-preserving Framework for Blockchain Interoperability
Ming Li, Jian Weng∗, Member, IEEE, Yi Li, Yongdong Wu, Jiasi Weng, Dingcheng Li, Robert Deng, Fellow, IEEE
2021/1243 ( PDF )
Syndrome Decoding Estimator
Andre Esser and Emanuele Bellini
2021/1242 ( PDF )
Non-Interactive Differentially Anonymous Router
Benedikt Bünz and Yuncong Hu and Shin’ichiro Matsuo and Elaine Shi
2021/1241 ( PDF )
Shuffling Public Keys (A Peer-to-peer Voting Algorithm)
Santi J. Vives
2021/1240 ( PDF )
Count Me In! Extendability for Threshold Ring Signatures
Diego F. Aranha and Mathias Hall-Andersen and Anca Nitulescu and Elena Pagnin and Sophia Yakoubov
2021/1239 ( PDF )
Quantum Linearization Attacks
Xavier Bonnetain and Gaëtan Leurent and María Naya-Plasencia and André Schrottenloher
2021/1238 ( PDF )
Generic Framework for Key-Guessing Improvements
Marek Broll and Federico Canale and Antonio Flórez-Gutiérrez and Gregor Leander and María Naya-Plasencia
2021/1237 ( PDF )
Hierarchical Integrated Signature and Encryption
Yu Chen and Qiang Tang and Yuyu Wang
2021/1236 ( PDF )
Architecture Support for Bitslicing
Pantea Kiaei with Tom Conroy with Patrick Schaumont
2021/1235 ( PDF )
Saidoyoki: Evaluating side-channel leakage in pre- and post-silicon setting
Pantea Kiaei with Zhenyuan Liu with Ramazan Kaan Eren with Yuan Yao with Patrick Schaumont
2021/1234 ( PDF )
Policy-Compliant Signatures
Christian Badertscher and Christian Matt and Hendrik Waldner
2021/1233 ( PDF )
Blockchains Enable Non-Interactive MPC
Vipul Goyal and Elisaweta Masserova and Bryan Parno and Yifan Song
2021/1232 ( PDF )
Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf
Gizem Kara and Oğuz Yayla
2021/1231 ( PDF )
Estimating (Miner) Extractable Value is Hard, Let’s Go Shopping!
Aljosha Judmayer and Nicholas Stifter and Philipp Schindler and Edgar Weippl
2021/1230 ( PDF )
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation
Amit Agarwal and James Bartusek and Vipul Goyal and Dakshita Khurana and Giulio Malavolta
2021/1229 ( PDF )
Direct Product Hardness Amplification
David Lanzenberger and Ueli Maurer
2021/1228 ( PDF )
Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy
Hanwen Feng and Qiang Tang
2021/1227 ( PDF )
Efficient Boolean Search over Encrypted Data with Reduced Leakage
Sarvar Patel and Giuseppe Persiano and Joon Young Seo and Kevin Yeo
2021/1226 ( PDF )
Succinct LWE Sampling, Random Polynomials, and Obfuscation
Lalita Devadas and Willy Quach and Vinod Vaikuntanathan and Hoeteck Wee and Daniel Wichs
2021/1225 ( PDF )
Massive Superpoly Recovery with Nested Monomial Predictions
Kai Hu and Siwei Sun and Yosuke Todo and Meiqin Wang and Qingju Wang
2021/1224 ( PDF )
Trojan-Resilience without Cryptography
Suvradip Chakraborty and Stefan Dziembowski and Malgorzata Galazka and Tomasz Lizurej and Krzysztof Pietrzak and Michelle Yeo
2021/1223 ( PDF )
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation
Fabrice Benhamouda and Elette Boyle and Niv Gilboa and Shai Halevi and Yuval Ishai and Ariel Nof
2021/1222 ( PDF )
Fault-enabled chosen-ciphertext attacks on Kyber
Julius Hermelink and Peter Pessl and Thomas Pöppelmann
2021/1221 ( PDF )
Simple, Fast Malicious Multiparty Private Set Intersection
Ofri Nevo and Ni Trieu and Avishay Yanai
2021/1220 ( PDF )
Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting
Denis Diemert and Kai Gellert and Tibor Jager and Lin Lyu
2021/1219 ( PDF )
Towards Tight Adaptive Security of Non-Interactive Key Exchange
Julia Hesse and Dennis Hofheinz and Lisa Kohl and Roman Langrehr
2021/1218 ( PDF )
Algebraic Adversaries in the Universal Composability Framework
Michel Abdalla and Manuel Barbosa and Jonathan Katz and Julian Loss and Jiayu Xu
2021/1217 ( PDF )
EMFI for Safety-Critical Testing of Automotive Systems
Colin O'Flynn
2021/1216 ( PDF )
Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage
Akira Ito and Rei Ueno and Naofumi Homma
2021/1215 ( PDF )
Optimization of Homomorphic Comparison Algorithm on RNS-CKKS Scheme
Eunsang Lee and Joon-Woo Lee and Young-Sik Kim and Jong-Seon No
2021/1214 ( PDF )
Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness
Susumu Kiyoshima
2021/1213 ( PDF )
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations
Tsz Hon Yuen and Muhammed F. Esgin and Joseph K. Liu and Man Ho Au and Zhimin Ding
2021/1212 ( PDF )
SPEEDY on Cortex--M3: Efficient Software Implementation of SPEEDY on ARM Cortex--M3
Hyunjun Kim and Kyungbae Jang and Gyeongju Song and Minjoo Sim and Siwoo Eum and Hyunji Kim and Hyeokdong Kwon and Wai-Kong Lee and Hwajeong Seo
2021/1211 ( PDF )
Grover on SPEEDY
Gyeongju Song and Kyungbae Jang and Hyunjun Kim and Siwoo Eum and Minjoo Sim and Hyunji Kim and Wai-Kong Lee and Hwajeong Seo
2021/1210 ( PDF )
LedMAC: More Efficient Variants of LightMAC
Yaobin Shen; Lei Wang; Dawu Gu
2021/1209 ( PDF )
Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions
Lior Rotem
2021/1208 ( PDF )
On Actively-Secure Elementary MPC Reductions
Benny Applebaum and Aarushi Goel
2021/1207 ( PDF )
Non-Malleable Vector Commitments via Local Equivocability
Lior Rotem and Gil Segev
2021/1206 ( PDF )
Efficient Perfectly Secure Computation with Optimal Resilience
Ittai Abraham and Gilad Asharov and Avishay Yanai
2021/1205 ( PDF )
FASTA – a stream cipher for fast FHE evaluation
Carlos Cid and John Petter Indrøy and Håvard Raddum
2021/1204 ( PDF )
Attacks on Pseudo Random Number Generators Hiding a Linear Structure
Florette Martinez
2021/1203 ( PDF )
The irreducible vectors of a lattice: Some theory and applications
Emmanouil Doulgerakis and Thijs Laarhoven and Benne de Weger
2021/1202 ( PDF )
Design Space Exploration of SABER in 65nm ASIC
Malik Imran and Felipe Almeida and Jaan Raik and Andrea Basso and Sujoy Sinha Roy and Samuel Pagliarini
2021/1201 ( PDF )
Provably Improving Election Verifiability in Belenios
Sevdenur Baloglu and Sergiu Bursuc and Sjouke Mauw and Jun Pang
2021/1200 ( PDF )
KDM Security for the Fujisaki-Okamoto Transformations in the QROM
Fuyuki Kitagawa and Ryo Nishimaki
2021/1199 ( PDF )
Compressed Oblivious Encoding for Homomorphically Encrypted Search
Seung Geol Choi and Dana Dachman-Soled and S. Dov Gordon and Linsheng Liu and Arkady Yerukhimovich
2021/1198 ( PDF )
Clustering Effect in Simon and Simeck
Gaëtan Leurent and Clara Pernot and André Schrottenloher
2021/1197 ( PDF )
($\epsilon,\delta$)-indistinguishable Mixing for Cryptocurrencies
Mingyu Liang and Ioanna Karantaidou and Foteini Baldimtsi and Dov Gordon and Mayank Varia
2021/1196 ( PDF )
Concurrent Composition of Differential Privacy
Salil Vadhan and Tianhao Wang
2021/1195 ( PDF )
Do you feel a chill? Using PIR against chilling effects for censorship-resistant publishing
Miti Mazmudar and Stan Gurtler and Ian Goldberg
2021/1194 ( PDF )
Automated Truncation of Differential Trails and Trail Clustering in ARX
Alex Biryukov and Luan Cardoso dos Santos and Daniel Feher and Vesselin Velichkov and Giuseppe Vitto
2021/1193 ( PDF )
JUBILEE: Secure Debt Relief and Forgiveness
David Cerezo Sánchez
2021/1192 ( PDF )
Simple Constructions from (Almost) Regular One-Way Functions
Noam Mazor and Jiapeng Zhang
2021/1191 ( PDF )
A Simpler Model for Recovering Superpoly onTrivium
Stéphanie Delaune and Patrick Derbez and Arthur Gontier and Charles Prud'homme
2021/1190 ( PDF )
Differential Fault Attack on Lightweight Block Cipher PIPO
SeongHyuck Lim and JaeSeung Han and Tae-Ho Lee and Dong-Guk Han
2021/1189 ( PDF )
A Configurable Crystals-Kyber Hardware Implementation with Side-Channel Protection
Arpan Jati and Naina Gupta and Anupam Chattopadhyay and Somitra Kumar Sanadhya
2021/1188 ( PDF )
Interhead Hydra Two Heads are Better than One
Maxim Jourenko and Mario Larangeira and Keisuke Tanaka
2021/1187 ( PDF )
Post-Quantum Signal Key Agreement with SIDH
Samuel Dobson and Steven D. Galbraith
2021/1186 ( PDF )
A Privacy-Preserving Distributed Identity Offline-First PoCP Blockchain Paradigm
Andrew M.K. Nassief
2021/1185 ( PDF )
Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework)
Ueli Maurer and Christopher Portmann and Guilherme Rito
2021/1184 ( PDF )
On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups
Aron van Baarsen and Marc Stevens
2021/1183 ( PDF )
ZkAttest: Ring and Group Signatures on top of existing ECDSA keys
Armando Faz-Hernández and Watson Ladd and Deepak Maram
2021/1182 ( PDF )
Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork
Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Edgar Weippl
2021/1181 ( PDF )
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code
Madura A. Shelton;Łukasz Chmielewski;Niels Samwel;Markus Wagner;Lejla Batina;Yuval Yarom
2021/1180 ( PDF )
The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?
István András Seres and Balázs Pejó and Péter Burcsi
2021/1179 ( PDF )
Improved Attacks on GIFT-64
Ling Sun and Wei Wang and Meiqin Wang
2021/1178 ( PDF )
Onion Routing with Replies
Christiane Kuhn and Dennis Hofheinz and Andy Rupp and Thorsten Strufe
2021/1177 ( PDF )
Algebraic Restriction Codes and their Applications
Divesh Aggarwal and Nico Döttling and Jesko Dujmovic and Mohammad Hajiabadi and Giulio Malavolta and Maciej Obremski
2021/1176 ( PDF )
Amortized Threshold Symmetric-key Encryption
Mihai Christodorescu and Sivanarayana Gaddam and Pratyay Mukherjee and Rohit Sinha
2021/1175 ( PDF )
Adaptive Security of Multi-Party Protocols, Revisited
Martin Hirt and Chen-Da Liu-Zhang and Ueli Maurer
2021/1174 ( PDF )
On Communication-Efficient Asynchronous MPC with Adaptive Security
Annick Chopard and Martin Hirt and Chen-Da Liu-Zhang
2021/1173 ( PDF )
Lelantus Spark: Secure and Flexible Private Transactions
Aram Jivanyan and Aaron Feickert
2021/1172 ( PDF )
Systematizing Core Properties of Pairing-Based Attribute-Based Encryption to Uncover Remaining Challenges in Enforcing Access Control in Practice
Marloes Venema and Greg Alpár and Jaap-Henk Hoepman
2021/1171 ( PDF )
FAST: Secure and High Performance Format-Preserving Encryption and Tokenization
F. Betül Durak and Henning Horst and Michael Horst and Serge Vaudenay
2021/1170 ( PDF )
Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs
Masahito Ishizaka and Shinsaku Kiyomoto
2021/1169 ( PDF )
As easy as ABC: Optimal (A)ccountable (B)yzantine (C)onsensus is easy!
Pierre Civit and Seth Gilbert and Vincent Gramoli and Rachid Guerraoui and Jovan Komatovic
2021/1168 ( PDF )
Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation (Full Version)
Wonseok Choi and Byeonghak Lee and Jooyoung Lee and Yeongmin Lee
2021/1167 ( PDF )
fflonk: a Fast-Fourier inspired verifier efficient version of PlonK
Ariel Gabizon and Zachary J. Williamson
2021/1166 ( PDF )
Fine-tuning the ISO/IEC Standard LightMAC
Soumya Chattopadhyay and Ashwin Jha and Mridul Nandi
2021/1165 ( PDF )
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery
Mario Larangeira
2021/1164 ( PDF )
Cube Attacks on Round-Reduced TinyJAMBU
Wil Liam Teng and Iftekhar Salam and Wei-Chuen Yau and Josef Pieprzyk and Raphaël C.-W. Phan
2021/1163 ( PDF )
Information-Theoretically Secure MPC against Mixed Dynamic Adversaries
Ivan Damgård and Daniel Escudero and Divya Ravi
2021/1162 ( PDF )
Software Implementation of Optimal Pairings on Elliptic Curves with Odd Prime Embedding Degrees
Yu Dai and Zijian Zhou and Fangguo Zhang and Chang-An Zhao
2021/1161 ( PDF )
Balanced Non-Adjacent Forms
Marc Joye
2021/1160 ( PDF )
Classical Attacks on a Variant of the RSA Cryptosystem
Abderrahmane Nitaj and Muhammad Rezal Kamel Ariffin and Nurul Nur Hanisah Adenan and Nur Azman Abu
2021/1159 ( PDF )
Compact and Malicious Private Set Intersection for Small Sets
Mike Rosulek and Ni Trieu
2021/1158 ( PDF )
Grafting Key Trees: Efficient Key Management for Overlapping Groups
Joël Alwen and Benedikt Auerbach and Mirza Ahad Baig and Miguel Cueto and Karen Klein and Guillermo Pascual-Perez and Krzysztof Pietrzak and Michael Walter
2021/1157 ( PDF )
Lightweight Private Similarity Search
Sacha Servan-Schreiber and Simon Langowski and Srinivas Devadas
2021/1156 ( PDF )
Evolving Secret Sharing in Almost Semi-honest Model
Jyotirmoy Pramanik and Avishek Adhikari
2021/1155 ( PDF )
GPS: Integration of Graphene, PALISADE, and SGX for Large-scale Aggregations of Distributed Data
Jonathan Takeshita and Colin McKechney and Justin Pajak and Antonis Papadimitriou and Ryan Karl and Taeho Jung
2021/1154 ( PDF )
1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher
Elena Andreeva and Amit Singh Bhati and Bart Preneel and Damian Vizar
2021/1153 ( PDF )
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation
Arpita Patra and Thomas Schneider and Ajith Suresh and Hossein Yalame
2021/1152 ( PDF )
Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field
Simon Masson and Antonio Sanso and Zhenfei Zhang
2021/1151 ( PDF )
Efficient Modular Multiplication
Joppe W. Bos and Thorsten Kleinjung and Dan Page
2021/1150 ( PDF )
Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes
Geoffroy Couteau and Peter Rindal and Srinivasan Raghuraman
2021/1149 ( PDF )
Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head
José Bacelar Almeida and Manuel Barbosa and Manuel L Correia and Karim Eldefrawy and Stéphane Graham-Lengrand and Hugo Pacheco and Vitor Pereira
2021/1148 ( PDF )
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS)
Linsheng Liu and Daniel S. Roche and Austin Theriault and Arkady Yerukhimovich
2021/1147 ( PDF )
Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts
Kushal Babel and Philip Daian and Mahimna Kelkar and Ari Juels
2021/1146 ( PDF )
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness
Shuai Han and Shengli Liu and Dawu Gu
2021/1145 ( PDF )
Recurring Contingent Payment for Proofs of Retrievability
Aydin Abadi and Steven J. Murdoch and Thomas Zacharias
2021/1144 ( PDF )
MAYO: Practical Post-Quantum Signatures from Oil-and-Vinegar Maps
Ward Beullens
2021/1143 ( PDF )
Facial Recognition for Remote Electronic Voting – Missing Piece of the Puzzle or Yet Another Liability?
Sven Heiberg and Kristjan Krips and Jan Willemson and Priit Vinkel
2021/1142 ( -- withdrawn -- )
The Elliptic Net Algorithm Revisited
Shiping Cai and Zhi Hu and Zheng-An Yao and Chang-An Zhao
2021/1141 ( PDF )
Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback
Giovanni Deligios and Martin Hirt and Chen-Da Liu-Zhang
2021/1140 ( PDF )
Computing Discrete Logarithms
Robert Granger and Antoine Joux
2021/1139 ( PDF )
HyperLogLog: Exponentially Bad in Adversarial Settings
Kenneth G. Paterson and Mathilde Raynal
2021/1138 ( PDF )
Optimal Good-case Latency for Rotating Leader Synchronous BFT
Ittai Abraham and Kartik Nayak and Nibesh Shrestha
2021/1137 ( PDF )
qTESLA: Practical Implementations of a Quantum Attack Resistant Signature Scheme
Michael Burger and Juliane Krämer and Christian Bischof
2021/1136 ( PDF )
A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions
Michael Burger and Christian Bischof and Juliane Krämer
2021/1135 ( PDF )
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption
Kamil Kluczniak and Leonard Schild
2021/1134 ( PDF )
Some observations on ZUC-256
Alexander Maximov
2021/1133 ( PDF )
Multiradical isogenies
Wouter Castryck and Thomas Decru
2021/1132 ( PDF )
Safe-Error Attacks on SIKE and CSIDH
Fabio Campos and Juliane Krämer and Marcel Müller
2021/1131 ( PDF )
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertext
Tanping Zhou and Zhenfeng Zhang and Long Chen and Xiaoliang Che and Wenchao Liu and Xiaoyuan Yang
2021/1130 ( PDF )
A note on group membership tests for $\G_1$, $\G_2$ and $\G_T$ on BLS pairing-friendly curves
Michael Scott
2021/1129 ( PDF )
Beauty of Cryptography: the Cryptographic Sequences and the Golden Ratio
Shenghui Su and Jianhua Zheng and Shuwang Lv
2021/1128 ( PDF )
Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity
Gianluca Brian and Antonio Faonio and Daniele Venturi
2021/1127 ( PDF )
Bigdata-facilitated Two-party Authenticated Key Exchange for IoT
Bowen Liu and Qiang Tang and Jianying Zhou
2021/1126 ( PDF )
Turn-Based Communication Channels
Carlo Brunetta and Mario Larangeira and Bei Liang and Aikaterini Mitrokotsa and Keisuke Tanaka
2021/1125 ( PDF )
Towards Explaining Epsilon: A Worst-Case Study of Differential Privacy Risks
Luise Mehner and Saskia Nuñez von Voigt and Florian Tschorsch
2021/1124 ( PDF )
A Semi-Permanent Stuck-At Fault Analysis on AES Rijndael SBox
Priyanka Joshi and Bodhisatwa Mazumdar
2021/1123 ( PDF )
Oblivious RAM with Worst-Case Logarithmic Overhead
Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Elaine Shi
2021/1122 ( PDF )
And Paper-Based is Better? Towards Comparability of Classic and Cryptographic Voting Schemes
Marc Nemes and Rebecca Schwerdt and Dirk Achenbach and Bernhard Löwe and Jörn Müller-Quade
2021/1121 ( PDF )
Constant-Time Arithmetic for Safer Cryptography
Lúcás Críostóir Meier and Simone Colombo and Marin Thiercelin and Bryan Ford
2021/1120 ( PDF )
Simpira Gets Simpler: Optimized Simpira on Microcontrollers
Minjoo Sim and Siwoo Eum and Hyeokdong Kwon and Kyungbae Jang and Hyunjun Kim and Hyunji Kim and Gyeongju Song and Wai-Kong Lee and Hwajeong Seo
2021/1119 ( PDF )
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials
Xiaoyang Dong and Zhiyu Zhang and Siwei Sun and Congming Wei and Xiaoyun Wang and Lei Hu
2021/1118 ( PDF )
THC: Practical and Cost-Effective Verification of Delegated Computation
Pablo Rauzy and Ali Nehme
2021/1117 ( PDF )
All the Polynomial Multiplication You Need on RISC-V
Hwajeong Seo and Hyeokdong Kwon and Siwoo Eum and Kyungbae Jang and Hyunjun Kim and Hyunji Kim and Minjoo Sim and Gyeongju Song and Wai-Kong Lee
2021/1116 ( PDF )
Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication
Kelong Cong and Radames Cruz Moreno and Mariana Botelho da Gama and Wei Dai and Ilia Iliashenko and Kim Laine and Michael Rosenberg
2021/1115 ( PDF )
Evolving Secret Sharing Schemes Based on Polynomial Evaluations and Algebraic Geometry Codes
Chaoping Xing and Chen Yuan
2021/1114 ( PDF )
Remarks on MOBS and cryptosystems using semidirect products
Chris Monico
2021/1113 ( PDF )
On the Security of Doubly Efficient PIR
Elette Boyle and Justin Holmgren and Fermi Ma and Mor Weiss
2021/1112 ( PDF )
Key agreement: security / division
Daniel R. L. Brown
2021/1111 ( PDF )
A Low-Randomness Second-Order Masked AES
Tim Beyne and Siemen Dhooghe and Adrián Ranea and Danilo Šijačić
2021/1110 ( PDF )
Secure and Efficient Software Masking on Superscalar Pipelined Processors
Barbara Gigerl and Robert Primas and Stefan Mangard
2021/1109 ( PDF )
On Actively Secure Fine-grained Access Structures from Isogeny Assumptions
Philipp Muth and Fabio Campos
2021/1108 ( PDF )
Preservation of DNA Privacy During the Large Scale Detection of COVID
Marcel Hollenstein and David Naccache and Peter B. Roenne and Peter Y A Ryan and Robert Weil and Ofer Yifrach-Stav
2021/1107 ( PDF )
Multi-Leak Deep-Learning Side-Channel Analysis
Fanliang Hu and Huanyu Wang and Junnian Wang
2021/1106 ( PDF )
Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More
Eric Brier and Rémi Géraud-Stewart and Marc Joye and David Naccache
2021/1105 ( PDF )
Improved Linear Approximations of SNOW-V and SNOW-Vi
Zhen Shi and Chenhui Jin and Yu Jin
2021/1104 ( PDF )
Finding Practical Distinguishers for ZUC-256 Using Modular Differences
Fukang Liu and Willi Meier and Santanu Sarkar and Gaoli Wang and Ryoma Ito and Takanori Isobe
2021/1103 ( PDF )
Exploring Differential-Based Distinguishers and Forgeries for ASCON
David Gerault and Thomas Peyrin and Quan Quan Tan
2021/1102 ( -- withdrawn -- )
Construction and Implementation of Practical Reusable and Robust Fuzzy Extractors for Fingerprint
Lin You and Wang Cheng and Gengran Hu
2021/1101 ( PDF )
Differential Privacy in Constant Function Market Makers
Tarun Chitra and Guillermo Angeris and Alex Evans
2021/1100 ( PDF )
REDsec: Running Encrypted DNNs in Seconds
Lars Folkerts and Charles Gouert and Nektarios Georgios Tsoutsos
2021/1099 ( PDF )
MILP modeling of Boolean functions by minimum number of inequalities
Aleksei Udovenko
2021/1098 ( PDF )
Individual Verifiability and Revoting in the Estonian Internet Voting System
Olivier Pereira
2021/1097 ( PDF )
The Hadamard square of concatenated linear codes
Ivan Chizhov and Alexandra Davletshina
2021/1096 ( PDF )
Mt. Random: Multi-Tiered Randomness Beacons
Ignacio Cascudo and Bernardo David and Omer Shlomovits and Denis Varlakov
2021/1095 ( PDF )
Analyzing Masked Ciphers Against Transition and Coupling Effects
Siemen Dhooghe
2021/1094 ( PDF )
Resilient Uniformity: Applying Resiliency in Masking
Siemen Dhooghe and Svetla Nikova
2021/1093 ( PDF )
Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering
Yilei Chen and Qipeng Liu and Mark Zhandry
2021/1092 ( PDF )
SoK: Deep Learning-based Physical Side-channel Analysis
Stjepan Picek and Guilherme Perin and Luca Mariot and Lichao Wu and Lejla Batina
2021/1091 ( PDF )
No (Good) Loss no Gain: Systematic Evaluation of Loss functions in Deep Learning-based Side-channel Analysis
Maikel Kerkhof and Lichao Wu and Guilherme Perin and Stjepan Picek
2021/1090 ( PDF )
Towards Accountability in CRS Generation
Prabhanjan Ananth and Gilad Asharov and Hila Dahari and Vipul Goyal
2021/1089 ( PDF )
Threshold scheme to share a secret by means of sound ranging
Sergij V. Goncharov
2021/1088 ( PDF )
Studying Bitcoin privacy attacks and their Impact on Bitcoin-based Identity Methods
Simin Ghesmati and Walid Fdhila and Edgar Weippl
2021/1087 ( PDF )
Methods for Decentralized Identities: Evaluation and Insights
Walid Fdhila and Nicholas Stifter and Kristian Kostal and Cihan Saglam and Markus Sabadello
2021/1086 ( PDF )
How do the Arbiter PUFs Sample the Boolean Function Class?
Animesh Roy and Dibyendu Roy and Subhamoy Maitra
2021/1085 ( PDF )
Homomorphic Encryption for Multiple Users with Less Communications
Jeongeun Park
2021/1084 ( PDF )
Towards the Least Inequalities for Describing a Subset in $Z_2^n$
Yao Sun
2021/1083 ( PDF )
Modular Design of Secure Group Messaging Protocols and the Security of MLS
Joël Alwen and Sandro Coretti and Yevgeniy Dodis and Yiannis Tselekounis
2021/1082 ( PDF )
Some remarks on how to hash faster onto elliptic curves
Dmitrii Koshelev
2021/1081 ( PDF )
OnionPIR: Response Efficient Single-Server PIR
Muhammad Haris Mughees and Hao Chen and Ling Ren
2021/1080 ( PDF )
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning
Ege Erdogan and Alptekin Kupcu and A. Ercument Cicek
2021/1079 ( PDF )
The Exact Complexity of Pseudorandom Functions and Tight Barriers to Lower Bound Proofs
Zhiyuan Fan and Jiatu Li and Tianqi Yang
2021/1078 ( PDF )
Reflection, Rewinding, and Coin-Toss in EasyCrypt
Denis Firsov and Dominique Unruh
2021/1077 ( PDF )
MProve+ : Privacy Enhancing Proof of Reserves Protocol for Monero
Arijit Dutta and Suyash Bagad and Saravanan Vijayakumaran
2021/1076 ( PDF )
Hardness of KT Characterizes Parallel Cryptography
Hanlin Ren and Rahul Santhanam
2021/1075 ( PDF )
The security of the code-based signature scheme based on the Stern identification protocol
Victoria Vysotskaya and Ivan Chizhov
2021/1074 ( PDF )
UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning
Ege Erdogan and Alptekin Kupcu and A. Ercument Cicek
2021/1073 ( PDF )
"Act natural!": Having a Private Chat on a Public Blockchain
Thore Tiemann and Sebastian Berndt and Thomas Eisenbarth and Maciej Liskiewicz
2021/1072 ( PDF )
Streaming SPHINCS+ for Embedded Devices using the Example of TPMs
Ruben Niederhagen and Johannes Roth and Julian Wälde
2021/1071 ( PDF )
Improved Verifiability for BeleniosVS
Thomas Haines and Rajeev Gore
2021/1070 ( PDF )
Onyx: New Encryption and Signature Schemes with Multivariate Public Key in Degree 3
Gilles Macario-Rat and Jacques Patarin
2021/1069 ( PDF )
Djed: A Formally Verified Crypto-Backed Pegged Algorithmic Stablecoin
Joachim Zahnentferner and Dmytro Kaidalov and Jean-Frédéric Etienne and Javier Díaz
2021/1068 ( PDF )
A Simple Post-Quantum Non-Interactive Zero-Knowledge Proof from Garbled Circuits
Hongrui Cui and Kaiyi Zhang
2021/1067 ( PDF )
A Tale of Twin Primitives: Single-chip Solution for PUFs and TRNGs
Kuheli Pratihar and Urbi Chatterjee and Manaar Alam and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty
2021/1066 ( PDF )
Taphonomical Security: (DNA) Information with Foreseeable Lifespan
Fatima-Ezzahra El Orche and Marcel Hollenstein and Sarah Houdaigoui and David Naccache and Daria Pchelina and Peter B. Roenne and Peter Y.A. Ryan and Julien Weibel and Robert Weil
2021/1065 ( PDF )
Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol
Gergei Bana and Marco Biroli and Megi Dervishi and Fatima-Ezzahra El Orche and Rémi Géraud-Stewart and David Naccache and Peter B. Roenne and Peter Y.A. Ryan and Hugo Waltsburger
2021/1064 ( PDF )
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED
Ben Nassi and Yaron Pirutin and Tomer Cohen Galor and Yuval Elovici and Boris Zadov
2021/1063 ( PDF )
Cairo – a Turing-complete STARK-friendly CPU architecture
Lior Goldberg and Shahar Papini and Michael Riabzev
2021/1062 ( PDF )
On the Nonsingularity and Equivalence of NFSRs
Yingyin Pan and Jianghua Zhong and Dongdai Lin
2021/1061 ( PDF )
Edwards curves and FFT-based multiplication
Pavel Atnashev and George Woltman
2021/1060 ( PDF )
Discovering New $L$-Function Relations Using Algebraic Sieving
Hadrien Barral and Éric Brier and Rémi Géraud-Stewart and Arthur Léonard and David Naccache and Quentin Vermande and Samuel Vivien
2021/1059 ( PDF )
Revisiting cryptanalysis on ChaCha from Crypto 2020 and Eurocrypt 2021
Sabyasachi Dey and Chandan Dey and Santanu Sarkar and Willi Meier
2021/1058 ( PDF )
Cryptanalysis of Caesar using Quantum Support Vector Machine
Hyunji Kim and Gyeongju Song and Kyoungbae Jang and Hwajeong Seo
2021/1057 ( PDF )
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport
Chun-I Fan and Cheng-Han Shie and Yi-Fan Tseng and Hui-Chun Huang
2021/1056 ( PDF )
Revocable Attribute-Based Encryption for Multi-Keyword Search in Clouds
Chun-I Fan and Si-Jing Wu and Yi-Fan Tseng
2021/1055 ( PDF )
Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions
François Garillot and Yashvanth Kondi and Payman Mohassel and Valeria Nikolaenko
2021/1054 ( PDF )
One-time Traceable Ring Signatures
Alessandra Scafuro and Bihan Zhang
2021/1053 ( PDF )
XDIVINSA: eXtended DIVersifying INStruction Agent to Mitigate Power Side-Channel Leakage
Thinh H. Pham and Ben Marshall and Alexander Fell and Siew-Kei Lam and Daniel Page
2021/1052 ( PDF )
Comparing Lattice Families for Bounded Distance Decoding near Minkowski’s Bound.
Oleksandra Lapiha
2021/1051 ( PDF )
Collisions in Supersingular Isogeny Graphs and the SIDH-based Identification Protocol
Wissam Ghantous and Federico Pintore and Mattia Veroni
2021/1050 ( PDF )
Privacy-Enhancing Group Signcryption Scheme
Sara Ricci and Petr Dzurenda and Jan Hajny and Lukas Malina
2021/1049 ( PDF )
Binary Search in Secure Computation
Marina Blanton and Chen Yuan
2021/1048 ( PDF )
Aggregating hash-based signatures using STARKs
Irakliy Khaburzaniya and Konstantinos Chalkias and Kevin Lewi and Harjasleen Malvai
2021/1047 ( PDF )
A Correlation Attack on Full SNOW-V and SNOW-Vi
Zhen Shi and Chenhui Jin and Jiyan Zhang and Ting Cui and Lin Ding
2021/1046 ( PDF )
On the modifier Q for multivariate signature schemes
Yasufumi Hashimoto
2021/1045 ( PDF )
Minor improvements of algorithm to solve under-defined systems of multivariate quadratic equations
Yasufumi Hashimoto
2021/1044 ( PDF )
On the security of Hufu-UOV
Yasufumi Hashimoto
2021/1043 ( PDF )
Brakedown: Linear-time and post-quantum SNARKs for R1CS
Alexander Golovnev and Jonathan Lee and Srinath Setty and Justin Thaler and Riad S. Wahby
2021/1042 ( PDF )
Rate One-Third Non-malleable Codes
Divesh Aggarwal and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Maciej Obremski and Sruthi Sekar
2021/1041 ( PDF )
On the Multiplicative Complexity of Cubic Boolean Functions
Meltem Sonmez Turan and Rene Peralta
2021/1040 ( PDF )
MUSE: Secure Inference Resilient to Malicious Clients
Ryan Lehmkuhl and Pratyush Mishra and Akshayaram Srinivasan and Raluca Ada Popa
2021/1039 ( PDF )
Neyman’s Smoothness Test: a Trade-off between Moment-based and Distribution-based Leakage Detections
Si Gao and Elisabeth Oswald and Yan Yan
2021/1038 ( PDF )
Reinforced Concrete: Fast Hash Function for Zero Knowledge Proofs and Verifiable Computation
Mario Barbara and Lorenzo Grassi and Dmitry Khovratovich and Reinhard Lueftenegger and Christian Rechberger and Markus Schofnegger and Roman Walch
2021/1037 ( PDF )
Randomness Bounds for Private Simultaneous Messages and Conditional Disclosure of Secrets
Akinori Kawachi and Maki Yoshida
2021/1036 ( PDF )
Lelantus-CLA
Pyrros Chaidos and Vladislav Gelfer
2021/1035 ( PDF )
Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data
Seny Kamara and Abdelkarim Kati and Tarik Moataz and Thomas Schneider and Amos Treiber and Michael Yonli
2021/1034 ( PDF )
Optimal encodings to elliptic curves of $j$-invariants $0$, $1728$
Dmitrii Koshelev
2021/1033 ( PDF )
Limits of Polynomial Packings for $\mathbb{Z}_{p^k}$ and $\mathbb{F}_{p^k}$
Jung Hee Cheon and Keewoo Lee
2021/1032 ( PDF )
AdVeil: A Private Targeted-Advertising Ecosystem
Sacha Servan-Schreiber and Kyle Hogan and Srinivas Devadas
2021/1031 ( PDF )
Commitment Schemes from Supersingular Elliptic Curve Isogeny Graphs
Bruno Sterner
2021/1030 ( PDF )
A lightweight ISE for ChaCha on RISC-V
Ben Marshall and Daniel Page and Thinh Hung Pham
2021/1029 ( PDF )
LOVE a pairing
Diego F. Aranha and Elena Pagnin and Francisco Rodríguez-Henríquez
2021/1028 ( PDF )
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography
Claude Carlet and Sylvain Guilley and Sihem Mesnager
2021/1027 ( PDF )
On Fingerprinting Attacks and Length-Hiding Encryption
Kai Gellert and Tibor Jager and Lin Lyu and Tom Neuschulten
2021/1026 ( -- withdrawn -- )
On the Hardness of Ring/Module/Polynomial LWR Problems
Yang Wang and Yanmin Zhao and Mingqiang Wang
2021/1025 ( PDF )
Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings
Daniel Escudero and Eduardo Soria-Vazquez
2021/1024 ( PDF )
Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications
Wai-Kong Lee and Kyungbae Jang and Gyeongju Song and Hyunji Kim and Seong Oun Hwang and Hwajeong Seo
2021/1023 ( PDF )
SIDH Proof of Knowledge
Luca De Feo and Samuel Dobson and Steven D. Galbraith and Lukas Zobernig
2021/1022 ( PDF )
Zero-Knowledge Middleboxes
Paul Grubbs and Arasu Arun and Ye Zhang and Joseph Bonneau and Michael Walfish
2021/1021 ( PDF )
Power-based Side Channel Attack Analysis on PQC Algorithms
Tendayi Kamucheka and Michael Fahr and Tristen Teague and Alexander Nelson and David Andrews and Miaoqing Huang
2021/1020 ( PDF )
Designing a Practical Code-based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
Shay Gueron and Edoardo Persichetti and Paolo Santini
2021/1019 ( PDF )
Implementing and Measuring KEMTLS
Sofía Celi and Armando Faz-Hernández and Nick Sullivan and Goutam Tamvada and Luke Valenta and Thom Wiggers and Bas Westerbaan and and Christopher A. Wood
2021/1018 ( PDF )
Obfustopia Built on Secret-Key Functional Encryption
Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
2021/1017 ( PDF )
Improve Neural Distinguisher for Cryptanalysis
Zezhou Hou and Jiongjiong Ren and Shaozhen Chen
2021/1016 ( PDF )
Quantum collision finding for homomorphic hash functions
Juan Carlos Garcia-Escartin and Vicent Gimeno and Julio José Moyano-Fernández
2021/1015 ( PDF )
Look-up the Rainbow: Efficient Table-based Parallel Implementation of Rainbow Signature on 64-bit ARMv8 Processors
Hyeokdong Kwon and Hyunjun Kim and Minjoo Sim and Wai-Kong Lee and Hwajeong Seo
2021/1014 ( PDF )
SoC Security Properties and Rules
Nusrat Farzana and Farimah Farahmandi and Mark Tehranipoor
2021/1013 ( PDF )
Iterative Oblivious Pseudo-Random Functions and Applications
Erik-Oliver Blass and Florian Kerschbaum and Travis Mayberry
2021/1012 ( PDF )
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification
Quoc Huy Do and Pedram Hosseyni and Ralf Kuesters and Guido Schmitz and Nils Wenzler and Tim Wuertele
2021/1011 ( PDF )
A Fast and Flexible Multi-Client Functional Encryption for Set Intersection
Mojtaba Rafiee
2021/1010 ( PDF )
Circuit friendly, post-quantum dynamic accumulators from RingSIS with logarithmic prover time
Endre (Silur) Abraham
2021/1009 ( PDF )
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited
Aydin Abadi and Steven J. Murdoch and Thomas Zacharias
2021/1008 ( PDF )
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo and Yu-Chi Chen
2021/1007 ( PDF )
Provably Solving the Hidden Subset Sum Problem via Statistical Learning
Jean-Sebastien Coron and Agnese Gini
2021/1006 ( PDF )
UOV-Pepper: New Public Key Short Signature in Degree 3
Gilles Macario-Rat and Jacques Patarin
2021/1005 ( PDF )
On the Construction and Cryptanalysis of Multi-Ciphers
Arush Chhatrapati
2021/1004 ( PDF )
Towards Attack Resilient Arbiter PUF-Based Strong PUFs
Nils Wisiol
2021/1003 ( PDF )
SCA-secure ECC in software – mission impossible?
Lejla Batina and Łukasz Chmielewski and Björn Haase and Niels Samwel and Peter Schwabe
2021/1002 ( PDF )
Online Linear Extractors for Independent Sources
Yevgeniy Dodis and Siyao Guo and Noah Stephens-Davidowitz and Zhiye Xie
2021/1001 ( PDF )
Classical Binding for Quantum Commitments
Nir Bitansky and Zvika Brakerski
2021/1000 ( PDF )
A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model
Masayuki Fukumitsu and Shingo Hasegawa
2021/999 ( PDF )
NTRU Fatigue: How Stretched is Overstretched?
Léo Ducas and Wessel van Woerden
2021/998 ( PDF )
Polynomial multiplication on embedded vector architectures
Hanno Becker and Jose Maria Bermudo Mera and Angshuman Karmakar and Joseph Yiu and Ingrid Verbauwhede
2021/997 ( PDF )
Higher-Order Lookup Table Masking in Essentially Constant Memory
Annapurna Valiveti and Srinivas Vivek
2021/996 ( PDF )
Kadcast-NG: A Structured Broadcast Protocol for Blockchain Networks
Elias Rohrer and Florian Tschorsch
2021/995 ( PDF )
Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4
Amin Abdulrahman and Jiun-Peng Chen and Yu-Jia Chen and Vincent Hwang and Matthias J. Kannwischer and Bo-Yin Yang
2021/994 ( PDF )
BKW Meets Fourier: New Algorithms for LPN with Sparse Parities
Dana Dachman-Soled and Huijing Gong and Hunter Kippen and Aria Shahverdi
2021/993 ( PDF )
FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority
Ye Dong and Xiaojun Chen and Kaiyun Li and Dakui Wang and Shuai Zeng
2021/992 ( PDF )
Faster Public-key Compression of SIDH with Less Memory
Kaizhan Lin and Jianming Lin and Weize Wang and Chang-An Zhao
2021/991 ( PDF )
Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices
Naila Mukhtar and Lejla Batina and Stjepan Picek and Yinan Kong
2021/990 ( PDF )
Secret Keys in Genus-2 SIDH
Sabrina Kunzweiler and Yan Bo Ti and Charlotte Weitkämper
2021/989 ( PDF )
Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism
Jia Xu and Yiwen Gao and Hoon Wei Lim and Hongbing Wang and Ee-Chien Chang
2021/988 ( PDF )
Concurrent Signatures from a Variety of Keys
George Teseleanu
2021/987 ( PDF )
A Formal Security Analysis of Session Resumption Across Hostnames
Kai Gellert and Tobias Handirk
2021/986 ( PDF )
Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1
Hanno Becker and Vincent Hwang and Matthias J. Kannwischer and Bo-Yin Yang and Shang-Yi Yang
2021/985 ( PDF )
PUF Security: Reviewing The Validity of Spoofing Attack Against Safe is the New Smart
Karim Lounis
2021/984 ( PDF )
On the Use of the Legendre Symbol in Symmetric Cipher Design
Alan Szepieniec
2021/983 ( PDF )
A Cryptographic Hash Function from Markoff Triples
Elena Fuchs and Kristin Lauter and Matthew Litman and Austin Tran
2021/982 ( PDF )
Quantum Implementation and Resource Estimates for RECTANGLE and KNOT
Anubhab Baksi and Kyungbae Jang and Gyeongju Song and Hwajeong Seo and Zejun Xiang
2021/981 ( PDF )
Deep Learning-based Side-channel Analysis against AES Inner Rounds
Sudharshan Swaminathan and Lukasz Chmielewski and Guilherme Perin and Stjepan Picek
2021/980 ( PDF )
Binary Field Montgomery Multiplication on Quantum Computers
Kyoungbae Jang and Gyeong Ju Song and Hyunji Kim and Hyeokdong Kwon and Wai-Kong Lee and Zhi Hu and Hwajeong Seo
2021/979 ( PDF )
Constant-Overhead Zero-Knowledge for RAM Programs
Nicholas Franzese and Jonathan Katz and Steve Lu and Rafail Ostrovsky and Xiao Wang and Chenkai Weng
2021/978 ( PDF )
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications
Donghang Lu and Albert Yu and Aniket Kate and Hemanta Maji
2021/977 ( PDF )
Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices
Yuval Ishai and Hang Su and David J. Wu
2021/976 ( PDF )
Reinventing BEDs: Formal Treatment of Broadcast Encryption with Dealership and Practical Constructions
Sayantan Mukherjee and Avishek Majumder
2021/975 ( PDF )
Bridges connecting Encryption Schemes
Mugurel Barcau and Cristian Lupascu and Vicentiu Pasol and George C. Turcas
2021/974 ( PDF )
Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds
Yi-Fan Tseng and Chun-I Fan and Zi-Cheng Liu
2021/973 ( PDF )
A Multiplatform Parallel Approach for Lattice Sieving Algorithms
Michał Andrzejczak and Kris Gaj
2021/972 ( PDF )
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA
Alexander May and Julian Nowakowski and Santanu Sarkar
2021/971 ( PDF )
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\Sigma$-Protocols
Lior Rotem and Gil Segev
2021/970 ( PDF )
Short Identity-Based Signatures with Tight Security from Lattices
Jiaxin Pan and Benedikt Wagner
2021/969 ( PDF )
Influence of a Set of Variables on a Boolean Function
Aniruddha Biswas and Palash Sarkar
2021/968 ( PDF )
White-Box Implementations for Hash-Based Signatures and One-Time Passwords
Kemal Bicakci and Kemal Ulker and Yusuf Uzunay
2021/967 ( PDF )
Assessment of Quantum Threat To Bitcoin and Derived Cryptocurrencies
Stephen Holmes and Liqun Chen
2021/966 ( PDF )
Soteria: Privacy-Preserving Machine Learning for Apache Spark
Cláudia Brito and Pedro Ferreira and Bernardo Portela and Rui Oliveira and João Paulo
2021/965 ( PDF )
Automatic Search for Bit-based Division Property
Shibam Ghosh and Orr Dunkelman
2021/964 ( PDF )
Secure Quantum Computation with Classical Communication
James Bartusek
2021/963 ( PDF )
Post-Quantum Key-Blinding for Authentication in Anonymity Networks
Edward Eaton and Douglas Stebila and Roy Stracovsky
2021/962 ( PDF )
Practically Solving LPN
Thom Wiggers and Simona Samardjiska
2021/961 ( PDF )
Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes
Jan Bobolz and Fabian Eidens and Raphael Heitjohann and Jeremy Fell
2021/960 ( PDF )
The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures
Gregor Leander and Thorben Moos and Amir Moradi and Shahram Rasoolzadeh
2021/959 ( PDF )
The Best of Two Worlds: Deep Learning-assisted Template Attack
Lichao Wu and Guilherme Perin and Stjepan Picek
2021/958 ( PDF )
When the Decoder Has to Look Twice: Glitching a PUF Error Correction
Jonas Ruchti and Michael Gruber and Michael Pehl
2021/957 ( PDF )
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
Arpita Patra and Akshayaram Srinivasan
2021/956 ( PDF )
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
Mike Hamburg and Julius Hermelink and Robert Primas and Simona Samardjiska and Thomas Schamberger and Silvan Streit and Emanuele Strieder and Christine van Vredendaal
2021/955 ( PDF )
Higher-degree supersingular group actions
Mathilde Chenu and Benjamin Smith
2021/954 ( PDF )
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms
Jose Maria Bermudo Mera and Angshuman Karmakar and Suparna Kundu and Ingrid Verbauwhede
2021/953 ( PDF )
State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption
Keita Emura and Ryoma Ito and Sachiko Kanamori and Ryo Nojima and Yohei Watanabe
2021/952 ( PDF )
On the Evaluation of Deep Learning-based Side-channel Analysis
Lichao Wu and Guilherme Perin and Stjepan Picek
2021/951 ( PDF )
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
Melissa Azouaoui and Olivier Bronchain and Vincent Grosso and Kostas Papagiannopoulos and François-Xavier Standaert
2021/950 ( PDF )
Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying
Sébastien Duval and Pierrick Méaux and Charles Momin and François-Xavier Standaert
2021/949 ( PDF )
A High-Speed Architecture for the Reduction in VDF Based on a Class Group
Yifeng Song and Danyang Zhu and Jing Tian and Zhongfeng Wang
2021/948 ( PDF )
How to Make a Secure Index for Searchable Symmetric Encryption, Revisited
Yohei Watanabe and Takeshi Nakai and Kazuma Ohara and Takuya Nojima and Yexuan Liu and Mitsugu Iwamoto and Kazuo Ohta
2021/947 ( PDF )
Autocorrelations of vectorial Boolean functions
Anne Canteaut and Lukas Kölsch and Chao Li and Chunlei Li and Kangquan Li and Longjiang Qu and Friedrich Wiemer
2021/946 ( PDF )
Hidden Cosets and Applications to Unclonable Cryptography
Andrea Coladangelo and Jiahui Liu and Qipeng Liu and Mark Zhandry
2021/945 ( PDF )
Limits on the Adaptive Security of Yao's Garbling
Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Daniel Wichs
2021/944 ( PDF )
Systematic Side-channel Analysis of Curve25519 with Machine Learning
Léo Weissbart and Łukasz Chmielewski and Stjepan Picek and Lejla Batina
2021/943 ( PDF )
Breaking the Circuit-Size Barrier for Secure Computation under Quasi-Polynomial LPN
Geoffroy Couteau and Pierre Meyer
2021/942 ( PDF )
Compact Ring Signatures from Learning With Errors
Rohit Chatterjee and Sanjam Garg and Mohammad Hajiabadi and Dakshita Khurana and Xiao Liang and Giulio Malavolta and Omkant Pandey and Sina Shiehian
2021/941 ( PDF )
Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme
Maamar Ouladj and Sylvain Guilley and Philippe Guillot and Farid Mokrane
2021/940 ( PDF )
SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user's secret data
Ripon Patgiri and Malaya Dutta Borah and Laiphrakpam Dolendro Singh
2021/939 ( PDF )
OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning
Jiacheng Liang and Songze Li and Wensi Jiang and Bochuan Cao and Chaoyang He
2021/938 ( PDF )
Plactic signatures
Daniel R. L. Brown
2021/937 ( PDF )
Storing data that is updated regularly on a client machine securely
Artem Los
2021/936 ( PDF )
FIVER -- Robust Verification of Countermeasures against Fault Injections
Jan Richter-Brockmann and Aein Rezaei Shahmirzadi and Pascal Sasdrich and Amir Moradi and Tim Güneysu
2021/935 ( PDF )
ROTed: Random Oblivious Transfer for embedded devices
Pedro Branco and Luís Fiolhais and Manuel Goulão and Paulo Martins and Paulo Mateus and Leonel Sousa
2021/934 ( PDF )
ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines
Diego F. Aranha and Emil Madsen Bennedsen and Matteo Campanelli and Chaya Ganesh and Claudio Orlandi and Akira Takahashi
2021/933 ( PDF )
Fast Factoring Integers by SVP Algorithms, corrected
Claus Peter Schnorr
2021/932 ( PDF )
Succinct Functional Commitment for a Large Class of Arithmetic Circuits
Helger Lipmaa and Kateryna Pavlyk
2021/931 ( PDF )
Practical Key Recovery Attacks on FlexAEAD
Orr Dunkelman and Maria Eichlseder and Daniel Kales and Nathan Keller and Gaëtan Leurent and Markus Schofnegger
2021/930 ( PDF )
Darlin: Recursive Proofs using Marlin
Ulrich Haböck and Alberto Garoffolo and Daniele Di Benedetto
2021/929 ( PDF )
A polynomial time key-recovery attack on the Sidon cryptosystem
Pierre Briaud and Jean-Pierre Tillich and Javier Verbel
2021/928 ( PDF )
Necessary and Sufficient Conditions for Galois NFSRs Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium
Jianghua Zhong and Yingyin Pan and Wenhui Kong and Dongdai Lin
2021/927 ( PDF )
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs
Shuichi Katsumata
2021/926 ( PDF )
On Treewidth, Separators and Yao's Garbling
Chethan Kamath and Karen Klein and Krzysztof Pietrzak
2021/925 ( PDF )
Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure
Marten van Dijk and Deniz Gurevin and Chenglu Jin and Omer Khan and Phuong Ha Nguyen
2021/924 ( PDF )
On Removing Rejection Conditions in Practical Lattice-Based Signatures
Rouzbeh Behnia and Yilei Chen and Daniel Masny
2021/923 ( PDF )
On the (in)security of ElGamal in OpenPGP
Luca De Feo and Bertram Poettering and Alessandro Sorniotti
2021/922 ( -- withdrawn -- )
Provably Secure Short Signature Scheme from Isogeny between Elliptic Curves
Kunal Dey and Sumit Kumar Debnath
2021/921 ( PDF )
Semilinear transformations in coding theory and their application to cryptography
Wenshuo Guo and Fang-Wei Fu
2021/920 ( PDF )
Non-malleable Commitments against Quantum Attacks
Nir Bitansky and Huijia Lin and Omri Shmueli
2021/919 ( PDF )
The supersingular isogeny path and endomorphism ring problems are equivalent
Benjamin Wesolowski
2021/918 ( PDF )
The Round Complexity of Quantum Zero-Knowledge
Orestis Chardouvelis and Giulio Malavolta
2021/917 ( PDF )
CODBS: A cascading oblivious search protocol optimized for real-world relational database indexes
Rogério Pontes and Bernardo Portela and Manuel Barbosa and Ricardo Vilaça
2021/916 ( PDF )
Mithril: Stake-based Threshold Multisignatures
Pyrros Chaidos and Aggelos Kiayias
2021/915 ( PDF )
A PCP Theorem for Interactive Proofs and Applications
Gal Arnon and Alessandro Chiesa and Eylon Yogev
2021/914 ( PDF )
Principal Component Analysis using CKKS Homomorphic Encryption Scheme
Samanvaya Panda
2021/913 ( PDF )
Practical complexities of probabilistic algorithms for solving Boolean polynomial systems
Stefano Barbero and Emanuele Bellini and Carlo Sanna and Javier Verbel
2021/912 ( PDF )
On the looseness of FO derandomization
Daniel J. Bernstein
2021/911 ( PDF )
SoK: Understanding BFT Consensus in the Age of Blockchains
Gang Wang
2021/910 ( PDF )
SECDSA: Mobile signing and authentication under classical ``sole control''
Eric Verheul
2021/909 ( PDF )
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks – A Case Study on Public-Key Algorithms –
Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli
2021/908 ( PDF )
Selection of sampling keys for cryptographic tests
George Marinakis
2021/907 ( PDF )
zkKYC: A solution concept for KYC without knowing your customer, leveraging self-sovereign identity and zero-knowledge proofs
Pieter Pauwels
2021/906 ( PDF )
Two Public-Key Cryptosystems Based on Expanded Gabidulin Codes
Wenshuo Guo and Fang-Wei Fu
2021/905 ( PDF )
A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage
Vipul Arora and Ileana Buhan and Guilherme Perin and Stjepan Picek
2021/904 ( PDF )
Spatial Dependency Analysis to Extract Information from Side-Channel Mixtures
Aurélien Vasselle and Hugues Thiebeauld and Philippe Maurine
2021/903 ( PDF )
Nowhere to Leak: Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting (Extended Version)
Alexandros Bakas and Antonis Michalas
2021/902 ( PDF )
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
Kalle Ngo and Elena Dubrova and Thomas Johansson
2021/901 ( PDF )
Resolvable Block Designs in Construction of Approximate Real MUBs that are Sparse
Ajeet Kumar and Subhamoy Maitra
2021/900 ( PDF )
ANS-based Compression and Encryption with 128-bit Security
Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk
2021/899 ( PDF )
Homomorphic decryption in blockchains via compressed discrete-log lookup tables
Panagiotis Chatzigiannis and Konstantinos Chalkias and Valeria Nikolaenko
2021/898 ( PDF )
On Extremal Expanding Algebraic Graphs and post-quantum secure delivery of passwords, encryption maps and tools for multivariate digital signatures.
Vasyl Ustimenko
2021/897 ( PDF )
A Rational Protocol Treatment of 51% Attacks
Christian Badertscher and Yun Lu and Vassilis Zikas
2021/896 ( PDF )
Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise"
Danilo Gligoroski
2021/895 ( PDF )
Targeted Lossy Functions and Applications
Willy Quach and Brent Waters and Daniel Wichs
2021/894 ( PDF )
History of Cryptographic Key Sizes
Nigel P. Smart and Emmanuel Thome
2021/893 ( PDF )
DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop
Alexander Heinrich and Matthias Hollick and Thomas Schneider and Milan Stute and Christian Weinert
2021/892 ( PDF )
Low-Latency Keccak at any Arbitrary Order
Sara Zarei and Aein Rezaei Shahmirzadi and Hadi Soleimany and Raziye Salarifard and Amir Moradi
2021/891 ( PDF )
White Box Traitor Tracing
Mark Zhandry
2021/890 ( PDF )
A Note on One-way Functions and Sparse Languages
Yanyi Liu and Rafael Pass
2021/889 ( PDF )
Counterexamples to New Circular Security Assumptions Underlying iO
Sam Hopkins and Aayush Jain and Huijia Lin
2021/888 ( PDF )
Lifting Standard Model Reductions to Common Setup Assumptions
Ngoc Khanh Nguyen and Eftychios Theodorakis and Bogdan Warinschi
2021/887 ( PDF )
Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions
Janaka Alawatugoda and Taechan Kim
2021/886 ( PDF )
Computational Records with Aging Hardware: Controlling Half the Output of SHA-256
Mellila Bouam and Charles Bouillaguet and Claire Delaplace and Camille Noûs
2021/885 ( PDF )
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications
Itai Dinur and Steven Goldfeder and Tzipora Halevi and Yuval Ishai and Mahimna Kelkar and Vivek Sharma and Greg Zaverucha
2021/884 ( PDF )
Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and Simulations
Elias Rohrer and Florian Tschorsch
2021/883 ( PDF )
Oblivious Key-Value Stores and Amplification for Private Set Intersection
Gayathri Garimella and Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai
2021/882 ( PDF )
Computational Hardness of Optimal FairComputation: Beyond Minicrypt
Hemanta K. Maji and Mingyuan Wang
2021/881 ( PDF )
Secure Code-Based Key Encapsulation Mechanism with Short Ciphertext and Secret Key
Jayashree Dey and Ratna Dutta
2021/880 ( PDF )
Towards Tight Random Probing Security
Gaëtan Cassiers and Sebastian Faust and Maximilian Orlt and François-Xavier Standaert
2021/879 ( PDF )
Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing
Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis
2021/878 ( PDF )
Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attacks
Yuan Yao and Pantea Kiaei and Richa Singh and Shahin Tajik and Patrick Schaumont
2021/877 ( PDF )
A Fully Anonymous e-Voting Protocol Employing Universal zk-SNARKs and Smart Contracts
Aritra Banerjee
2021/876 ( PDF )
Code Constructions and Bounds for Identification via Channels
Onur Gunlu and Joerg Kliewer and Rafael F. Schaefer and Vladimir Sidorenko
2021/875 ( PDF )
Hybrid Signal protocol for post-quantum email encryption
Sara Stadler and Vitor Sakaguti and Harjot Kaur and Anna Lena Fehlhaber
2021/874 ( PDF )
Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction
Bo-Yeon Sim and Aesun Park and Dong-Guk Han
2021/873 ( PDF )
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange
Yanqi Gu and Stanislaw Jarecki and Hugo Krawczyk
2021/872 ( PDF )
W-OTS(+) up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets
David Chaum and Mario Larangeira and Mario Yaksetig and William Carter
2021/871 ( PDF )
Traceable Secret Sharing and Applications
Vipul Goyal and Yifan Song and Akshayaram Srinivasan
2021/870 ( PDF )
SoK: Gröbner Basis Algorithms for Arithmetization Oriented Ciphers
Jan Ferdinand Sauer and Alan Szepieniec
2021/869 ( PDF )
MiniLedger: Compact-sized Anonymous and Auditable Distributed Payments
Panagiotis Chatzigiannis and Foteini Baldimtsi
2021/868 ( PDF )
Low-Latency Hardware Masking of PRINCE
Nicolai Müller and Thorben Moos and Amir Moradi
2021/867 ( PDF )
Key-Policy ABE with Delegation of Rights
Cécile Delerablée and Lénaïck Gouriou and David Pointcheval
2021/866 ( PDF )
The One-More Discrete Logarithm Assumption in the Generic Group Model
Balthazar Bauer and Georg Fuchsbauer and Antoine Plouviez
2021/865 ( PDF )
Quantum Key Search for Ternary LWE
Iggy van Hoof and Elena Kirshanova and Alexander May
2021/864 ( PDF )
A Fast and Simple Partially Oblivious PRF, with Applications
Nirvan Tyagi and Sofı́a Celi and Thomas Ristenpart and Nick Sullivan and Stefano Tessaro and Christopher A. Wood
2021/863 ( PDF )
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model
Shuai Han and Tibor Jager and Eike Kiltz and Shengli Liu and Jiaxin Pan and Doreen Riepel and Sven Schäge
2021/862 ( PDF )
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved
Yi Wang and Rongmao Chen and Guomin Yang and Xinyi Huang and Baosheng Wang and Moti Yung
2021/861 ( PDF )
Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors
Janaka Alawatugoda and Tatsuaki Okamoto
2021/860 ( PDF )
Verification of the security in Boolean masked circuits
Vahid Jahandideh
2021/859 ( PDF )
Concrete Evaluation of the Random Probing Security
Vahid Jahandideh
2021/858 ( PDF )
Full key recovery side-channel attack against ephemeral SIKE on the Cortex-M4
Aymeric Genêt and Natacha Linard de Guertechin and Novak Kaluđerović
2021/857 ( PDF )
Secure Computation for G-Module and its Applications
Qizhi Zhang and Bingsheng Zhang and Lichun Li and Shan Yin and Juanjuan Sun
2021/856 ( PDF )
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks
Xiaoyang Dong and Lingyue Qin and Siwei Sun and Xiaoyun Wang
2021/855 ( PDF )
Donner: UTXO-Based Virtual Channels Across Multiple Hops
Lukas Aumayr and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei
2021/854 ( PDF )
PQC: R-Propping of a Simple Oblivious Transfer
Pedro Hecht
2021/853 ( PDF )
Private Signaling
Varun Madathil and Alessandra Scafuro and István András Seres and Omer Shlomovits and Denis Varlakov
2021/852 ( PDF )
Improved Structured Encryption for SQL Databases via Hybrid Indexing
David Cash and Ruth Ng and Adam Rivkin
2021/851 ( PDF )
Multiple Candidates Coercion-Resistant Blockchain-Based E-Voting Protocol With Receipts
Riccardo Longo and Chiara Spadafora
2021/850 ( PDF )
Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack
Élise Tasso and Luca De Feo and Nadia El Mrabet and and Simon Pontié
2021/849 ( PDF )
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs
Rei Ueno and Keita Xagawa and Yutaro Tanaka and Akira Ito and Junko Takahashi and Naofumi Homma
2021/848 ( PDF )
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE
Shweta Agrawal and Monosij Maitra and Narasimha Sai Vempati and Shota Yamada
2021/847 ( PDF )
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption
Rachit Garg and Rishab Goyal and George Lu and Brent Waters
2021/846 ( PDF )
Ergo Hackathon: Crowdfunded Smart Contract Pools Research and Conceptualization
Bronson Brooks Richard and Gary Waugh
2021/845 ( PDF )
An Intermediate Secret-Guessing Attack on Hash-Based Signatures
Roland Booth and Yanhong Xu and Sabyasachi Karati and Reihaneh Safavi-Naini
2021/844 ( PDF )
A note on IND-qCCA security in the ROM and its applications
Loïs Huguenin-Dumittan and Serge Vaudenay
2021/843 ( PDF )
Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions
Brandon Broadnax and Jeremias Mechler and Jörn Müller-Quade
2021/842 ( PDF )
PCPs and Instance Compression from a Cryptographic Lens
Liron Bronfman and Ron D. Rothblum
2021/841 ( PDF )
MPC for $Q_2$ Access Structures over Rings and Fields
Robin Jadoul and Nigel P. Smart and Barry Van Leeuwen
2021/840 ( PDF )
Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates
Keita Xagawa and Akira Ito and Rei Ueno and Junko Takahashi and Naofumi Homma
2021/839 ( PDF )
Prudent Practices in Security Standardization
Feng Hao
2021/838 ( PDF )
Anonymous and Distributed Authentication for Peer-to-Peer Networks
Pasan Tennakoon and Supipi Karunathilaka and Rishikeshan Lavakumar and Janaka Alawatugoda
2021/837 ( PDF )
On McEliece type cryptosystems using self-dual codes with large minimum weight
Luca Mariot and Stjepan Picek and Radinka Yorgova
2021/836 ( PDF )
Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs
Xiao Liang and Omkant Pandey
2021/835 ( PDF )
Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy
Sen Yuan and Milan Shen and Ilya Mironov and Anderson C. A. Nascimento
2021/834 ( PDF )
Unconditional Communication-Efficient MPC via Hall's Marriage Theorem
Vipul Goyal and Antigoni Polychroniadou and Yifan Song
2021/833 ( PDF )
ATLAS: Efficient and Scalable MPC in the Honest Majority Setting
Vipul Goyal and Hanjun Li and Rafail Ostrovsky and Antigoni Polychroniadou and Yifan Song
2021/832 ( PDF )
On the Efficiency and Flexibility of Signature Verification
Cecilia Boschini and Dario Fiore and Elena Pagnin
2021/831 ( PDF )
Private Remote Sources for Secure Multi-Function Computation
Onur Gunlu and Matthieu Bloch and Rafael F. Schaefer
2021/830 ( PDF )
Analysis and Protection of the Two-metric Helper Data Scheme
Lars Tebelmann and Ulrich Kühne and Jean-Luc Danger and Michael Pehl
2021/829 ( PDF )
To Shift or Not to Shift: Understanding GEA-1
Christof Beierle and Patrick Felke and Gregor Leander
2021/828 ( PDF )
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung
Chitchanok Chuengsatiansup and Eyal Ronen and Gregory G. Rose and Yuval Yarom
2021/827 ( PDF )
TransNet: Shift Invariant Transformer Network for Power Attack
Suvadeep Hajra and Sayandeep Saha and Manaar Alam and Debdeep Mukhopadhyay
2021/826 ( PDF )
OpenSSLNTRU: Faster post-quantum TLS key exchange
Daniel J. Bernstein and Billy Bob Brumley and Ming-Shing Chen and Nicola Tuveri
2021/825 ( PDF )
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation
Hannah Keller and Helen Möllering and Thomas Schneider and Hossein Yalame
2021/824 ( PDF )
Security Characterization of J-PAKE and its Variants
Michel Abdalla and Manuel Barbosa and Peter B. Rønne and Peter Y.A. Ryan and Petra Šala
2021/823 ( PDF )
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications
Daniel Günther and Maurice Heymann and Benny Pinkas and Thomas Schneider
2021/822 ( PDF )
One-out-of-$q$ OT Combiners
Oriol Farràs and Jordi Ribes-González
2021/821 ( PDF )
On the hardness of the NTRU problem
Alice Pellet-Mary and Damien Stehlé
2021/820 ( PDF )
Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent
Marek Broll and Federico Canale and Nicolas David and Antonio Florez-Gutierrez and Gregor Leander and María Naya-Plasencia and Yosuke Todo
2021/819 ( PDF )
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
Christof Beierle and Patrick Derbez and Gregor Leander and Gaëtan Leurent and Håvard Raddum and Yann Rotella and David Rupprecht and Lukas Stennes
2021/818 ( PDF )
CTng: Secure Certificate and Revocation Transparency
Hemi Leibowitz and Haitham Ghalwash and Ewa Syta and Amir Herzberg
2021/817 ( PDF )
Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace
Olivier Bronchain and Gaëtan Cassiers and François-Xavier Standaert
2021/816 ( PDF )
Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns
Alexandra Boldyreva and Tianxin Tang
2021/815 ( PDF )
Linear Cryptanalysis of FF3-1 and FEA
Tim Beyne
2021/814 ( PDF )
A New Way to Achieve Round-Efficient Byzantine Agreement
Matthias Fitzi and Chen-Da Liu-Zhang and Julian Loss
2021/813 ( PDF )
Intelligent Composed Algorithms
Frank Byszio and Dr. Klaus-Dieter Wirth and Dr. Kim Nguyen
2021/812 ( PDF )
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing
Elena Pagnin and Gunnar Gunnarsson and Pedram Talebi and Claudio Orlandi and Andrei Sabelfeld:
2021/811 ( PDF )
A General Purpose Transpiler for Fully Homomorphic Encryption
Shruthi Gorantala and Rob Springer and Sean Purser-Haskell and William Lam and Royce Wilson and Asra Ali and Eric P. Astor and Itai Zukerman and Sam Ruth and Christoph Dibak and Phillipp Schoppmann and Sasha Kulankhina and Alain Forget and David Marn and Cameron Tew and Rafael Misoczki and Bernat Guillen and Xinyu Ye and Dennis Kraft and Damien Desfontaines and Aishe Krishnamurthy and Miguel Guevara and Irippuge Milinda Perera and Yurii Sushko and Bryant Gipson
2021/810 ( PDF )
Efficient Asynchronous Byzantine Agreement without Private Setups
Yingzi Gao and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang
2021/809 ( PDF )
SoK: Efficient Privacy-preserving Clustering
Aditya Hegde and Helen Möllering and Thomas Schneider and Hossein Yalame
2021/808 ( PDF )
SNARGs for $\mathcal{P}$ from LWE
Arka Rai Choudhuri and Abhishek Jain and Zhengzhong Jin
2021/807 ( PDF )
Non-Interactive Batch Arguments for NP from Standard Assumptions
Arka Rai Choudhuri and Abhishek Jain and Zhengzhong Jin
2021/806 ( PDF )
Boosting the Security of Blind Signature Schemes
Jonathan Katz and Julian Loss and Michael Rosenberg
2021/805 ( PDF )
Practical Settlement Bounds for Proof-of-Work Blockchains
Peter Gaži and Ling Ren and Alexander Russell
2021/804 ( PDF )
A Note on ``Reduction Modulo $2^{448}-2^{224}-1$''
Timothy Shelton
2021/803 ( PDF )
On the Privacy of Protocols based on CPA-Secure Homomorphic Encryption
Adi Akavia and Margarita Vald
2021/802 ( PDF )
On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing
Divesh Aggarwal and Eldon Chung and Maciej Obremski and João Ribeiro
2021/801 ( PDF )
Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes
Mohammad Hassan Ameri and Alexander R. Block and Jeremiah Blocki
2021/800 ( PDF )
TEMP: Time-locked Encryption Made Practical
Leemon Baird and Pratyay Mukherjee and Rohit Sinha
2021/799 ( PDF )
Lattice Attacks on NTRU and LWE: A History of Refinements
Martin Albrecht and Léo Ducas
2021/798 ( PDF )
Probabilistic Dynamic Input Output Automata
Pierre Civit and Maria Potop-Butucaru
2021/797 ( PDF )
LLVM-based Circuit Compilation for Practical Secure Computation
Tim Heldmann and Thomas Schneider and Oleksandr Tkachenko and Christian Weinert and Hossein Yalame
2021/796 ( PDF )
How Byzantine is a Send Corruption?
Karim Eldefrawy and Julian Loss and Ben Terner
2021/795 ( PDF )
Transforming Secure Comparison Protocol from Passive to Active Adversary Model
Wei Jiang
2021/794 ( PDF )
Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor
Si Gao and Elisabeth Oswald and Dan Page
2021/793 ( PDF )
Property-Preserving Hash Functions from Standard Assumptions
Nils Fleischhacker and Kasper Green Larsen and Mark Simkin
2021/792 ( PDF )
Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation
Madhurima Mukhopadhyay and Palash Sarkar
2021/791 ( PDF )
Open Sesame: A Novel Non-SAT-Attack against CAS-Lock
Akashdeep Saha and Urbi Chatterjee and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty
2021/790 ( PDF )
A Side-Channel Assisted Attack on NTRU
Amund Askeland and Sondre Rønjom
2021/789 ( PDF )
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection
Jongkil Kim and Seyit Camtepe and Joonsang Baek and Willy Susilo and Josef Pieprzyk and Surya Nepal
2021/788 ( PDF )
Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs
Yael Tauman Kalai and Vinod Vaikuntanathan and Rachel Yun Zhang
2021/787 ( PDF )
Mobile Voting -- Still Too Risky?
Sven Heiberg and Kristjan Krips and Jan Willemson
2021/786 ( PDF )
Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy
Yongjun Zhao and Huaxiong Wang and Kwok-Yan Lam
2021/785 ( PDF )
Lower bounds on lattice sieving and information set decoding
Elena Kirshanova and Thijs Laarhoven
2021/784 ( PDF )
Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols
Ignacio Fernández-Hernández and Tomer Ashur and Vincent Rijmen
2021/783 ( PDF )
Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network
Joon-Woo Lee and HyungChul Kang and Yongwoo Lee and Woosuk Choi and Jieun Eom and Maxim Deryabin and Eunsang Lee and Junghyun Lee and Donghoon Yoo and Young-Sik Kim and Jong-Seon No
2021/782 ( PDF )
On the deployment of FlyClient as a velvet fork: chain-sewing attacks and countermeasures
Tristan Nemoz and Alexei Zamyatin
2021/781 ( PDF )
Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices
Gustavo Banegas and Koen Zandberg and Adrian Herrmann and Emmanuel Baccelli and Benjamin Smith
2021/780 ( PDF )
Netlist Decompilation Workflow for Recovered Design Verification, Validation, and Assurance
Katie Liszewski and Tim McDonley and Josh Delozier and Andrew Elliott and Dylan Jones and Matt Sutter and Adam Kimura
2021/779 ( PDF )
More efficient post-quantum KEMTLS with pre-distributed public keys
Peter Schwabe and Douglas Stebila and Thom Wiggers
2021/778 ( PDF )
Efficient secret key reusing attribute-based encryption from lattices
Xinyuan Qian and Wenyuan Wu
2021/777 ( PDF )
Asynchronous Data Dissemination and its Applications
Sourav Das and Zhuolun Xiang and Ling Ren
2021/776 ( PDF )
SoK: Applying Blockchain Technology in Industrial Internet of Things
Gang Wang
2021/775 ( PDF )
Adaptively Secure Broadcast in Resource-Restricted Cryptography
Ran Cohen and Juan Garay and Vassilis Zikas
2021/774 ( PDF )
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model
Akinori Hosoyamada and Tetsu Iwata
2021/773 ( PDF )
HEX-BLOOM: An Efficient Method for Authenticity and Integrity Verification in Privacy-preserving Computing
Ripon Patgiri and Malaya Dutta Borah
2021/772 ( PDF )
Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks
Emre Karabulut and Aydin Aysu
2021/771 ( PDF )
Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Jinhyun So and Ramy E. Ali and Basak Guler and Jiantao Jiao and Salman Avestimehr
2021/770 ( PDF )
Multi-key Private Matching for Compute
Prasad Buddhavarapu and Benjamin M Case and Logan Gore and Andrew Knox and Payman Mohassel and Shubho Sengupta and Erik Taubeneck and Min Xue
2021/769 ( PDF )
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
Jacqueline Brendel and Rune Fiedler and Felix Günther and Christian Janson and Douglas Stebila
2021/768 ( PDF )
Privacy-Preserving Decision Trees Training and Prediction
Adi Akavia and Max Leibovich and Yehezkel S. Resheff and Roey Ron and Moni Shahar and Margarita Vald
2021/767 ( PDF )
White-box Cryptography with Device Binding from Token-based Obfuscation and more
Shashank Agrawal and Estuardo Alpirez Bock and Yilei Chen and Gaven Watson
2021/766 ( PDF )
Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum
John Andrews and Michele Ciampi and Vassilis Zikas
2021/765 ( PDF )
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption
Ghous Amjad and Sarvar Patel and Giuseppe Persiano and Kevin Yeo and Moti Yung
2021/764 ( PDF )
Covert Learning: How to Learn with an Untrusted Intermediary
Ran Canetti and Ari Karchmer
2021/763 ( PDF )
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation
Mathy Vanhoef
2021/762 ( PDF )
A wide class of Boolean functions generalizing the hidden weight bit function
Claude Carlet
2021/761 ( PDF )
Parameterization of Boolean functions by vectorial functions and associated constructions
Claude Carlet
2021/760 ( PDF )
Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition
Saravanan Vijayakumaran
2021/759 ( PDF )
Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning
Wenting Zheng and Ryan Deng and Weikeng Chen and Raluca Ada Popa and Aurojit Panda and Ion Stoica
2021/758 ( PDF )
Quantum cryptography based on an algorithm for determining simultaneously all the mappings of a Boolean function
Koji Nagata and Renata Wong and Do Ngoc Diep and Tadao Nakamura
2021/757 ( PDF )
On the Dual of Generalized Bent Functions
Jiaxin Wang Fang-Wei Fu
2021/756 ( PDF )
A Novel Completeness Test and its Application to Side Channel Attacks and Simulators
Si Gao and Elisabeth Oswald
2021/755 ( PDF )
Tetrad: Actively Secure 4PC for Secure Training and Inference
Nishat Koti and Arpita Patra and Rahul Rachuri and Ajith Suresh
2021/754 ( PDF )
Privacy-Preserving Training of Tree Ensembles over Continuous Data
Samuel Adams and Chaitali Choudhary and Martine De Cock and Rafael Dowsley and David Melanson and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen
2021/753 ( PDF )
Anonymous Device Authorization for Cellular Networks
Abida Haque and Varun Madathil and Bradley Reaves and Alessandra Scafuro
2021/752 ( PDF )
Quantum Reduction of Finding Short Code Vectors to the Decoding Problem
Thomas Debris-Alazard and Maxime Remaud and Jean-Pierre Tillich
2021/751 ( PDF )
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
Martin Hell and Thomas Johansson and Alexander Maximov and Willi Meier and Hirotaka Yoshida
2021/750 ( PDF )
Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and $\mathbb{Z}_{2^k}$
Carsten Baum and Lennart Braun and Alexander Munch-Hansen and Peter Scholl
2021/749 ( PDF )
Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits
Mike Rosulek and Lawrence Roy
2021/748 ( PDF )
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss
Ke Wu and Gilad Asharov and Elaine Shi (random author ordering)
2021/747 ( PDF )
Elmo: Recursive Virtual Payment Channels for Bitcoin
Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos
2021/746 ( PDF )
What is All the FaaS About? - Remote Exploitation of FPGA-as-a-Service Platforms
Nitin Pundir and Fahim Rahman and Farimah Farahmandi and Mark Tehranipoor
2021/745 ( PDF )
Generic-Group Identity-Based Encryption: A Tight Impossibility Result
Gili Schul-Ganz and Gil Segev
2021/744 ( -- withdrawn -- )
Proofs of Isogeny Knowledge and Application to Post-quantum One-Time Verifiable Random Function
Antonin Leroux
2021/743 ( PDF )
Manta: a Plug and Play Private DeFi Stack
Shumo Chu and Yu Xia and Zhenfei Zhang
2021/742 ( PDF )
Conclave: A Collective Stake Pool Protocol
Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira
2021/741 ( PDF )
NTRU leads to Anonymous, Robust Public-Key Encryption
Keita Xagawa
2021/740 ( PDF )
The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application
Keita Xagawa
2021/739 ( PDF )
A New Framework for Garbled Circuits
Tomer Ashur and Efrat Cohen and Carmit Hazay and Avishay Yanai
2021/738 ( PDF )
On the Impossibility of Purely Algebraic Signatures
Nico Döttling and Dominik Hartmann and Dennis Hofheinz and Eike Kiltz and Sven Schäge and Bogdan Ursu
2021/737 ( PDF )
GIFT-COFB is Tightly Birthday Secure with Encryption Queries
Akiko Inoue and Kazuhiko Minematsu
2021/736 ( PDF )
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation
Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Takahiro Matsuda and Ibuki Mishina and Hiraku Morita and Jacob C. N. Schuldt
2021/735 ( PDF )
Side-Channel Protections for Picnic Signatures
Diego F. Aranha and Sebastian Berndt and Thomas Eisenbarth and Okan Seker and Akira Takahashi and Luca Wilke and Greg Zaverucha
2021/734 ( PDF )
First-Order Hardware Sharings of the AES
Siemen Dhooghe and Svetla Nikova and Vincent Rijmen
2021/733 ( PDF )
GenoPPML – a framework for genomic privacy-preserving machine learning
Sergiu Carpov and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev
2021/732 ( PDF )
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems
Congming Wei and Chenhao Wu and Ximing Fu and Xiaoyang Dong and Kai He and Jue Hong and Xiaoyun Wang
2021/731 ( PDF )
Pasta: A Case for Hybrid Homomorphic Encryption
Christoph Dobraunig and Lorenzo Grassi and Lukas Helminger and Christian Rechberger and Markus Schofnegger and Roman Walch
2021/730 ( PDF )
Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning
Chenkai Weng and Kang Yang and Xiang Xie and Jonathan Katz and Xiao Wang
2021/729 ( PDF )
Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for TFHE
Ilaria Chillotti and Damien Ligier and Jean-Baptiste Orfila and Samuel Tap
2021/728 ( PDF )
Laconic Private Set Intersection and Applications
Navid Alamati and Pedro Branco and Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Sihang Pu
2021/727 ( PDF )
SoK: Privacy-Preserving Computing in the Blockchain Era
Ghada Almashaqbeh and Ravital Solomon
2021/726 ( PDF )
Asymmetric All-or-nothing Transforms
Navid Nasr Esfahani and Douglas R. Stinson
2021/725 ( PDF )
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
Felix Günther and Simon Rastikian and Patrick Towa and Thom Wiggers
2021/724 ( PDF )
Tri-op redactable blockchains with block modification, removal, and insertion
Mohammad Sadeq Dousti and Alptekin Küpçü
2021/723 ( PDF )
Cache attack on MISTY1
Haopeng Fan; Wenhao Wang; Yongjuan Wang; Wenyu Zhang; Qingjun Yuan
2021/722 ( PDF )
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption
Yusaku Maeda and Koji Nuida
2021/721 ( PDF )
Index Calculus Attacks on Hyperelliptic Jacobians with Effective Endomorphisms
Sulamithe Tsakou and Sorina Ionica
2021/720 ( PDF )
On Reverse Engineering Neural Network Implementation on GPU
Łukasz Chmielewski and Léo Weissbart
2021/719 ( PDF )
Conditional Differential-Neural Cryptanalysis
Zhenzhen Bao and Jian Guo and Meicheng Liu and Li Ma and Yi Tu
2021/718 ( PDF )
Will You Cross the Threshold for Me? - Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs
Prasanna Ravi and Martianus Frederic Ezerman and Shivam Bhasin and Anupam Chattopadhyay and Sujoy Sinha Roy
2021/717 ( PDF )
Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis
Lichao Wu and Yoo-Seung Won and Dirmanto Jap and Guilherme Perin and Shivam Bhasin and Stjepan Picek
2021/716 ( PDF )
SSE and SSD: Page-Efficient Searchable Symmetric Encryption
Angèle Bossuat and Raphael Bost and Pierre-Alain Fouque and Brice Minaud and Michael Reichle
2021/715 ( PDF )
Hours of Horus: Keyless Cryptocurrency Wallets
Dionysis Zindros
2021/714 ( PDF )
CARiMoL: A Configurable Hardware Accelerator for Ringand Module Lattice-Based Post-Quantum Cryptography
Afifa Ishtiaq and Dr. Muhammad Shafique and Dr. Osman Hassan
2021/713 ( PDF )
Public Key Encryption with Flexible Pattern Matching
Elie Bouscatié and Guilhem Castagnos and Olivier Sanders
2021/712 ( PDF )
DEFAULT: Cipher Level Resistance Against Differential Fault Attack
Anubhab Baksi and Shivam Bhasin and Jakub Breier and Mustafa Khairallah and Thomas Peyrin and Sumanta Sarkar and Siang Meng Sim
2021/711 ( PDF )
The Matrix Reloaded: Multiplication Strategies in FrodoKEM
Joppe W. Bos and Maximilian Ofner and Joost Renes and Tobias Schneider and Christine van Vredendaal
2021/710 ( PDF )
VOProof: Constructing Shorter and Faster-to-Verify zkSNARKs with Vector Oracles
Yuncong Zhang and Ren Zhang and Geng Wang and Dawu Gu
2021/709 ( PDF )
Bounded Collusion ABE for TMs from IBE
Rishab Goyal and Ridwan Syed and Brent Waters
2021/708 ( PDF )
Anonymous, Robust Post-Quantum Public Key Encryption
Paul Grubbs and Varun Maram and Kenneth G. Paterson
2021/707 ( PDF )
Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation
Gabrielle De Micheli and Pierrick Gaudry and Cécile Pierrot
2021/706 ( PDF )
Cryptanalysis of an oblivious PRF from supersingular isogenies
Andrea Basso and Péter Kutas and Simon-Philipp Merz and Christophe Petit and Antonio Sanso
2021/705 ( PDF )
Bridging Machine Learning and Cryptanalysis via EDLCT
Yi Chen and Hongbo Yu
2021/704 ( PDF )
IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status
Elli Androulaki and Ilie Circiumaru and Jesus Diaz Vico and Miguel Prada and Alessandro Sorniotti and Marc Stoecklin and Marko Vukolic and Marie Wallace
2021/703 ( PDF )
Quantum Multi-Collision Distinguishers
Zhenzhen Bao and Jian Guo and Shun Li and Phuong Pham
2021/702 ( PDF )
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
Colin Boyd and Gareth T. Davies and Bor de Kock and Kai Gellert and Tibor Jager and Lise Millerjord
2021/701 ( PDF )
Multidimentional ModDiv public key exchange protocol
Samir Bouftass
2021/700 ( PDF )
DeCSIDH: Delegating isogeny computations in the CSIDH setting
Robi Pedersen
2021/699 ( PDF )
Radical Isogenies on Montgomery Curves
Hiroshi Onuki and Tomoki Moriya
2021/698 ( PDF )
Multi-Dimensional Sub/Super-Range Signatures
Masahito Ishizaka and Shinsaku Kiyomoto
2021/697 ( PDF )
GoAT: File Geolocation via Anchor Timestamping
Deepak Maram and Iddo Bentov and Mahimna Kelkar and Ari Juels
2021/696 ( PDF )
The "quantum annoying" property of password-authenticated key exchange protocols
Edward Eaton and Douglas Stebila
2021/695 ( PDF )
Adaptively Secure Lattice-based Revocable IBE in the QROM: Compact Parameters, Tight Security, and Anonymity
Atsushi Takayasu
2021/694 ( PDF )
On Interactive Oracle Proofs for Boolean R1CS Statements
Ignacio Cascudo and Emanuele Giunta
2021/693 ( PDF )
Hardware Penetration Testing Knocks Your SoCs Off
Mark Fischer and Fabian Langer and Johannes Mono and Clemens Nasenberg and Nils Albartus
2021/692 ( PDF )
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
Christoph Dobraunig and Daniel Kales and Christian Rechberger and Markus Schofnegger and Greg Zaverucha
2021/691 ( PDF )
General Bootstrapping Approach for RLWE-based Homomorphic Encryption
Andrey Kim and Maxim Deryabin and Jieun Eom and Rakyong Choi and Yongwoo Lee and Whan Ghang and Donghoon Yoo
2021/690 ( PDF )
On Communication Models and Best-Achievable Security in Two-Round MPC
Aarushi Goel and Abhishek Jain and Manoj Prabhakaran and Rajeev Raghunath
2021/689 ( PDF )
OSHA: A General-purpose One-way Secure Hash Algorithm
Ripon Patgiri
2021/688 ( PDF )
Statistical ZAPs from Group-Based Assumptions
Geoffroy Couteau and Shuichi Katsumata and Elahe Sadeghi and Bogdan Ursu
2021/687 ( PDF )
Towards Understanding Practical Randomness Beyond Noise: Differential Privacy and Mixup
Hanshen Xiao and Srinivas Devadas
2021/686 ( PDF )
Meteor: Cryptographically Secure Steganography for Realistic Distributions
Gabriel Kaptchuk and Tushar M. Jois and Matthew Green and Aviel Rubin
2021/685 ( PDF )
Blind Side-Channel SIFA
Melissa Azouaoui and Kostas Papagiannopoulos and Dominik Zürner
2021/684 ( PDF )
Tight Setup Bounds for Identifiable Abort
Nicholas Brandt
2021/683 ( PDF )
S2Dedup: SGX-enabled Secure Deduplication
Tânia Esteves and Mariana Miranda and João Paulo and Bernardo Portela
2021/682 ( PDF )
Batching Base Oblivious Transfers
Ian McQuoid and Mike Rosulek and Lawrence Roy
2021/681 ( PDF )
Learnability of Multiplexer PUF and $S_N$-PUF : A Fourier-based Approach
Durba Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
2021/680 ( PDF )
Efficient Attribute Based Encryption for Boolean Circuits
Alexandru Ionita
2021/679 ( PDF )
Permutation Based EDM: An Inverse Free BBB Secure PRF
Avijit Dutta and Mridul Nandi and Suprita Talnikar
2021/678 ( PDF )
Faster indifferentiable hashing to elliptic $\mathbb{F}_{\!q^2}$-curves
Dmitrii Koshelev
2021/677 ( PDF )
Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes
Paul Cotan and George Teseleanu
2021/676 ( PDF )
Extending the GLS endomorphism to speed up GHS Weil descent using Magma
Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez and Benjamin Smith
2021/675 ( PDF )
3-round Feistel is Not Superpseudorandom Over Any Group
Hector B. Hougaard
2021/674 ( PDF )
On the Effect of the Key-expansion Algorithm in Simon-like Ciphers
Jinyu Lu and Yunwen Liu and Tomer Ashur and and Chao Li
2021/673 ( PDF )
zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy
Tianyi Liu and Xiang Xie and Yupeng Zhang
2021/672 ( PDF )
PQC: R-Propping a Chaotic Cellular Automata
Pedro Hecht
2021/671 ( PDF )
Multi-Threshold Byzantine Fault Tolerance
Atsuki Momose and Ling Ren
2021/670 ( PDF )
AOT: Anonymization by Oblivious Transfer
Farid Javani and Alan T. Sherman
2021/669 ( PDF )
Pravuil: Global Consensus for a United World
David Cerezo Sánchez
2021/668 ( PDF )
Grover on SM3
Gyeongju Song and Kyungbae Jang and Hyunji Kim and Wai-Kong Lee and Zhi Hu and Hwajeong Seo
2021/667 ( PDF )
Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors
Hyeokdong Kwon and Hyunjun Kim and Siwoo Eum and Minjoo Sim and Hyunji Kim and Wai-Kong Lee and Zhi Hu and Hwajeong Seo
2021/666 ( PDF )
Secure cloud-of-clouds storage with space-efficient secret sharing
Ahad Niknia and Miguel Correia and Jaber Karimpour
2021/665 ( PDF )
On the algebraic immunity of direct sum constructions
Pierrick Méaux
2021/664 ( PDF )
A Trustless GQ Multi-Signature Scheme with Identifiable Abort
Handong Cui and Tsz Hon Yuen
2021/663 ( PDF )
On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note
Nils Albartus and Clemens Nasenberg and Florian Stolz and Marc Fyrbiak and Christof Paar and Russell Tessier
2021/662 ( PDF )
Verifying Post-Quantum Signatures in 8 kB of RAM
Ruben Gonzalez and Andreas Hülsing and Matthias J. Kannwischer and Juliane Krämer and Tanja Lange and Marc Stöttinger and Elisabeth Waitz and Thom Wiggers and Bo-Yin Yang
2021/661 ( PDF )
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
Ling Sun and Wei Wang and Meiqin Wang
2021/660 ( PDF )
A Permissionless Proof-of-Stake Blockchain with Best-Possible Unpredictability
Lei Fan and Jonathan Katz and Phuc Thai and Hong-Sheng Zhou
2021/659 ( PDF )
Technical report: CoPHEE: Co-processor forPartially Homomorphic Encrypted Execution
Mohammed Nabeel and Mohammed Ashraf and Eduardo Chielle and Nektarios G.Tsoutsos and Michail Maniatakos
2021/658 ( PDF )
A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem
Prastudy Fauzi and Martha Norberg Hovd and Håvard Raddum
2021/657 ( PDF )
Locally Reconstructable Non-malleable Secret Sharing
Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Jenit Tomy
2021/656 ( PDF )
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny
Lingyue Qin and Xiaoyang Dong and Xiaoyun Wang and Keting Jia and Yunwen Liu
2021/655 ( PDF )
On the Effect of Projection on Rank Attacks in Multivariate Cryptography
Morten Øygarden and Daniel Smith-Tone and Javier Verbel
2021/654 ( PDF )
Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
Carlo Brunetta and Georgia Tsaloli and Bei Liang and Gustavo Banegas and Aikaterini Mitrokotsa
2021/653 ( PDF )
Smooth Zero-Knowledge Hash Functions
Behzad Abdolmaleki and Hamidreza Khoshakhlagh and Helger Lipmaa
2021/652 ( PDF )
Detector+: An Approach for Detecting, Isolating, and Preventing Timing Attacks
Arsalan Javeed and Cemal Yilmaz and Erkay Savas
2021/651 ( PDF )
Leo: A Programming Language for Formally Verified, Zero-Knowledge Applications
Collin Chin and Howard Wu and Raymond Chu and Alessandro Coglio and Eric McCarthy and Eric Smith
2021/650 ( PDF )
Structured Leakage and Applications to Cryptographic Constant-Time and Cost
Gilles Barthe and Benjamin Gregoire and Vincent Laporte and Swarn Priya
2021/649 ( PDF )
On the Algebraic Immunity - Resiliency trade-off, implications for Goldreich's Pseudorandom Generator
Aurélien Dupin and Pierrick Méaux and Mélissa Rossi
2021/648 ( PDF )
Security of COFB against Chosen Ciphertext Attacks
Mustafa Khairallah
2021/647 ( PDF )
privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm
Ripon Patgiri
2021/646 ( PDF )
Optimization of Advanced Encryption Standard on Graphics Processing Units
Cihangir Tezcan
2021/645 ( PDF )
Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing
Alexander May and Floyd Zweydinger
2021/644 ( PDF )
Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings
Christopher Battarbee and Delaram Kahrobaei and Siamak F. Shahandashti
2021/643 ( PDF )
On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers
Muhammad ElSheikh and Amr M. Youssef
2021/642 ( PDF )
On the Cryptographic Deniability of the Signal Protocol
Nihal Vatandas and Rosario Gennaro and Bertrand Ithurburn and Hugo Krawczyk
2021/641 ( PDF )
Hydra: Succinct Fully Pipelineable Interactive Arguments of Knowledge
William Zhang and Yu Xia
2021/640 ( PDF )
Security and Trust in Open Source Security Tokens
Marc Schink and Alexander Wagner and Florian Unterstein and Johann Heyszl
2021/639 ( PDF )
Indifferentiable Signatures: High Performance and Fallback Security
Charalampos Papamanthou and Cong Zhang and Hong-Sheng Zhou
2021/638 ( PDF )
Efficient Constructions of Pairing Based Accumulators
Ioanna Karantaidou and Foteini Baldimtsi
2021/637 ( PDF )
Doubly-Affine Extractors, and their Applications
Yevgeniy Dodis and Kevin Yeo
2021/636 ( PDF )
Communication Complexity of Private simultaneous Quantum Messages Protocols
Akinori Kawachi and Harumichi Nishimura
2021/635 ( PDF )
symKrypt: A General-purpose and Lightweight Symmetric-Key Cryptography
Ripon Patgiri
2021/634 ( PDF )
Setting Up Efficient TFHE Parameters for Multivalue Plaintexts and Multiple Additions
Jakub Klemsa
2021/633 ( PDF )
CTIDH: faster constant-time CSIDH
Gustavo Banegas and Daniel J. Bernstein and Fabio Campos and Tung Chou and Tanja Lange and Michael Meyer and Benjamin Smith and Jana Sotáková
2021/632 ( PDF )
Internet Computer Consensus
Jan Camenisch and Manu Drijvers and Timo Hanke and Yvonne-Anne Pignolet and Victor Shoup and Dominic Williams
2021/631 ( PDF )
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges
Felix Engelmann and Lukas Müller and Andreas Peter and Frank Kargl and Christoph Bösch
2021/630 ( PDF )
Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings
Julien Devevey and Benoît Libert and Khoa Nguyen and Thomas Peters and Moti Yung
2021/629 ( PDF )
SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Mixing Techniques
Simin Ghesmati and Walid Fdhila and Edgar Weippl
2021/628 ( PDF )
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets
Joachim Neu and Ertem Nusret Tas and David Tse
2021/627 ( PDF )
Client-Auditable Verifiable Registries
Nirvan Tyagi and Ben Fisch and Joseph Bonneau and Stefano Tessaro
2021/626 ( PDF )
Help, my Signal has bad Device! Breaking the Signal Messenger’s Post-CompromiseSecurity through a Malicious Device
Jan Wichelmann and Sebastian Berndt and Claudius Pott and Thomas Eisenbarth
2021/625 ( PDF )
Plactic key agreement
Daniel R. L. Brown
2021/624 ( PDF )
Group Structure in Correlations and its Applications in Cryptography
Guru-Vamsi Policharla and Manoj Prabhakaran and Rajeev Raghunath and Parjanya Vyas
2021/623 ( PDF )
Mining in Logarithmic Space
Aggelos Kiayias and Nikos Leonardos and Dionysis Zindros
2021/622 ( PDF )
Stealth: A Highly Secured End-to-End Symmetric Communication Protocol
Ripon Patgiri
2021/621 ( PDF )
R-SWAP: Relay based atomic cross-chain swap protocol
Léonard Lys and Arthur Micoulet and Maria Potop-Butucaru
2021/620 ( PDF )
Algebraic attacks on block ciphers using quantum annealing
Elżbieta Burek and Michał Misztal and Michał Wroński
2021/619 ( PDF )
Polar Coding for Ring-LWE-Based Public Key Encryption
Jiabo Wang and Cong Ling
2021/618 ( PDF )
Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing
Sumit Kumar Debnath and Vikas Srivastava and Tapaswini Mohanty and Nibedita Kundu and Kouichi Sakurai
2021/617 ( PDF )
Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication
Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa
2021/616 ( PDF )
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable
Keitaro Hashimoto and Shuichi Katsumata and Kris Kwiatkowski and Thomas Prest
2021/615 ( PDF )
A Tutorial on Concurrent Zero Knowledge
Rafael Pass
2021/614 ( PDF )
Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit
Rafael Pass
2021/613 ( PDF )
Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE
Xiaojian Liang and Jian Weng and Anjia Yang and Lisha Yao and Zike Jiang and Zhenghao Wu
2021/612 ( PDF )
Privacy-preserving Density-based Clustering
Beyza Bozdemir and Sébastien Canard and Orhan Ermis and Helen Möllering and Melek Önen and Thomas Schneider
2021/611 ( PDF )
Some Applications of Hamming Weight Correlations
Fatih Balli and Andrea Caforio and Subhadeep Banik
2021/610 ( PDF )
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems
Alexander Nilsson and Irina E. Bocharova and Boris D. Kudryashov and Thomas Johansson
2021/609 ( PDF )
FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker
Michele Ciampi and Muhammad Ishaq and Malik Magdon-Ismail and Rafail Ostrovsky and Vassilis Zikas
2021/608 ( PDF )
Layering diverse cryptography to lower risks of future and secret attacks: post-quantum estimates
Daniel R. L. Brown
2021/607 ( PDF )
Signed Diffie-Hellman Key Exchange with Tight Security
Jiaxin Pan and Chen Qian and Magnus Ringerud
2021/606 ( PDF )
ZK-PCPs from Leakage-Resilient Secret Sharing
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss
2021/605 ( PDF )
On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs
Benny Applebaum and Eyal Golombek
2021/604 ( PDF )
Masked Triples: Amortizing Multiplication Triples across Conditionals
David Heath and Vladimir Kolesnikov and Stanislav Peceny
2021/603 ( PDF )
Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults
Justin Kim and Vandan Mehta and Kartik Nayak and Nibesh Shrestha
2021/602 ( PDF )
Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak
Marten van Dijk and Deniz Gurevin and Chenglu Jin and Omer Khan and Phuong Ha Nguyen
2021/601 ( PDF )
The Art of Labeling: Task Augmentation for Private(Collaborative) Learning on Transformed Data
Hanshen Xiao and Srinivas Devadas
2021/600 ( PDF )
Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group
Christian Porter and Andrew Mendelsohn and Cong Ling
2021/599 ( PDF )
Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments
Shravan Srinivasan and Alex Chepurnoy and Charalampos Papamanthou and Alin Tomescu and Yupeng Zhang
2021/598 ( PDF )
Proof of Assets in the Diem Blockchain
Panagiotis Chatzigiannis and Konstantinos Chalkias
2021/597 ( PDF )
Accelerated RISC-V for Post-Quantum SIKE
Rami Elkhatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2021/596 ( PDF )
Mutual Accountability Layer: Accountable Anonymity within Accountable Trust
Vanesa Daza and Abida Haque and Alessandra Scafuro and Alexandros Zacharakis and Arantxa Zapico
2021/595 ( PDF )
Securing Parallel-chain Protocols under Variable Mining Power
Xuechao Wang and Viswa Virinchi Muppirala and Lei Yang and Sreeram Kannan and Pramod Viswanath
2021/594 ( PDF )
ZK Contingent Payments for Trained Neural Networks
Zhelei Zhou and Xinlei Cao and Jian Liu and Bingsheng Zhang and Kui Ren
2021/593 ( PDF )
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms
Shumo Chu and Danyang Zhuo and Elaine Shi and T-H. Hubert Chan (randomized author ordering)
2021/592 ( PDF )
Side Channel Analysis against the ANSSI’s protected AES implementation on ARM
Loïc Masure and Rémi Strullu
2021/591 ( PDF )
Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!
Jan Peter Drees and Pritha Gupta and Eyke Hüllermeier and Tibor Jager and Alexander Konze and Claudia Priesterjahn and Arunselvan Ramaswamy and Juraj Somorovsky
2021/590 ( PDF )
An Algebraic Framework for Universal and Updatable SNARKs
Carla Ràfols and Arantxa Zapico
2021/589 ( PDF )
White-Box Encryption Scheme Using a Quantum Memory
Hidenori Kuwakado and Shoichi Hirose and Masahiro Mambo
2021/588 ( PDF )
A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose
Thomas Haines and Johannes Mueller
2021/587 ( PDF )
PrORAM: Fast $O(\log n)$ Private Coin ZK ORAM
David Heath and Vladimir Kolesnikov
2021/586 ( PDF )
A New Approach for finding Low-Weight Polynomial Multiples
Laila El Aimani
2021/585 ( PDF )
Exact Lattice Sampling from Non-Gaussian Distributions
Maxime Plançon and Thomas Prest
2021/584 ( PDF )
Effects of Quantization on the Multiple-Round Secret-Key Capacity
Onur Gunlu and Ueli Maurer and Joao Ribeiro
2021/583 ( PDF )
Entropoids: Groups in Disguise
Lorenz Panny
2021/582 ( PDF )
ethSTARK Documentation
StarkWare
2021/581 ( PDF )
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces
Abhrajit Sengupta and Nimisha Limaye and Ozgur Sinanoglu
2021/580 ( PDF )
Lightweight, Verifiable Function Secret Sharing and its Applications
Leo de Castro and Antigoni Polychroniadou
2021/579 ( PDF )
Quantum Key-length Extension
Joseph Jaeger and Fang Song and Stefano Tessaro
2021/578 ( PDF )
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)
Itai Dinur
2021/577 ( PDF )
Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks
Dionysis Zindros
2021/576 ( PDF )
Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares
Surya Addanki and Kevin Garbe and Eli Jaffe and Rafail Ostrovsky and Antigoni Polychroniadou
2021/575 ( PDF )
MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing
Zhenzhen Bao and Jian Guo and Danping Shi and Yi Tu
2021/574 ( PDF )
Constructing More Quadratic APN Functions with the QAM Method
Yuyin Yu and Leo Perrin
2021/573 ( PDF )
Compactness of Hashing Modes and Efficiency beyond Merkle Tree
Elena Andreeva and Rishiraj Bhattacharyya and Arnab Roy
2021/572 ( PDF )
Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE
Charanjit Singh Jutla and Nathan Manohar
2021/571 ( PDF )
Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond
Thomas Attema and Nicole Gervasoni and Michiel Marcus and Gabriele Spini
2021/570 ( PDF )
Lattice sieving via quantum random walks
André Chailloux and Johanna Loyer
2021/569 ( PDF )
Automated Generation of Masked Hardware
David Knichel and Amir Moradi and Nicolai Müller and Pascal Sasdrich
2021/568 ( PDF )
ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems
Gaurav Panwar and Roopa Vishwanathan and Satyajayant Misra
2021/567 ( PDF )
Forward-secure Multi-user Aggregate Signatures based on zk-SNARKs
Jeonghyuk Lee and Jihye Kim and Hyunok Oh
2021/566 ( PDF )
From Random Oracles to Ideal Signatures, and Back
Cong Zhang and Hong-Sheng Zhou
2021/565 ( PDF )
The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving
Cyprien Delpech de Saint Guilhem and Eleftheria Makri and Dragos Rotaru and Titouan Tanguy
2021/564 ( PDF )
SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions
Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
2021/563 ( PDF )
High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography
Mojtaba Bisheh-Niasar and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2021/562 ( PDF )
A fusion algorithm for solving the hidden shift problem in finite abelian groups
Wouter Castryck and Ann Dooms and Carlo Emerencia and Alexander Lemmens
2021/561 ( PDF )
Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors
Pakize Sanal and Emrah Karagoz and Hwajeong Seo and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2021/560 ( PDF )
MOBS (Matrices Over Bit Strings) public key exchange
Nael Rahman and Vladimir Shpilrain
2021/559 ( PDF )
A Fresh Approach to Updatable Symmetric Encryption
Andrés Fabrega and Ueli Maurer and Marta Mularczyk
2021/558 ( PDF )
Verifiable Decryption in the Head
Kristian Gjøsteen and Thomas Haines and Johannes Müller and Peter Rønne and Tjerand Silde
2021/557 ( PDF )
Dual lattice attacks for closest vector problems (with preprocessing)
Thijs Laarhoven and Michael Walter
2021/556 ( PDF )
Interactive Physical ZKP for Connectivity:Applications to Nurikabe and Hitori
Leo Robert and Daiki Miyahara and Pascal Lafourcade and Takaaki Mizuk
2021/555 ( PDF )
Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited
Nils Wisiol and Khalid T. Mursi and Jean-Pierre Seifert and Yu Zhuang
2021/554 ( PDF )
Grover on Caesar and Vigenère Ciphers
Gyeongju Song and Kyungbae Jang and Hyunji Kim and Wai-Kong Lee and Hwajeong Seo
2021/553 ( PDF )
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild
Daniel De Almeida Braga and Pierre-Alain Fouque and Mohamed Sabt
2021/552 ( PDF )
Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric
André Chailloux and Thomas Debris-Alazard and Simona Etinski
2021/551 ( PDF )
Efficient Sorting of Homomorphic Encrypted Data with $k$-way Sorting Network
Seungwan Hong and Seunghong Kim and Jiheon Choi and Younho Lee and Jung Hee Cheon
2021/550 ( PDF )
Quadratic almost bent functions - their partial characterization and design in the spectral domain
Amar Bapić and Samir Hodžić and Enes Pasalic
2021/549 ( PDF )
High-assurance field inversion for curve-based cryptography
Benjamin Salling Hvass and Diego F. Aranha and Bas Spitters
2021/548 ( PDF )
Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper)
Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal
2021/547 ( PDF )
Cube Attack against 843-Round Trivium
Yao Sun
2021/546 ( PDF )
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V and SNOW-Vi
Jin Hoki and Takanori Isobe and Ryoma Ito and Fukang Liu and Kosei Sakamoto
2021/545 ( PDF )
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
Muhammed F. Esgin and Ron Steinfeld and Raymond K. Zhao
2021/544 ( PDF )
Improved guess-and-determine and distinguishing attacks on SNOW-V
Jing Yang and Thomas Johansson and Alexander Maximov
2021/543 ( PDF )
The Case for SIKE: A Decade of the Supersingular Isogeny Problem
Craig Costello
2021/542 ( PDF )
Symetric encryption algorithms based on the mathematical structure underlying the three body problem
Samir Bouftass.
2021/541 ( PDF )
Hardware Deployment of Hybrid PQC
Reza Azarderakhsh and Rami El Khatib and Brian Koziel and Brandon Langenberg
2021/540 ( PDF )
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
Geoffroy Couteau and Michael Klooß and Huang Lin and Michael Reichle
2021/539 ( PDF )
More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions
Atsushi Takayasu
2021/538 ( PDF )
A Composable Look at Updatable Encryption
Françoise Levy-dit-Vehel and Maxime Roméas
2021/537 ( PDF )
SoK: Exploring Blockchains Interoperability
Gang Wang
2021/536 ( PDF )
Analyzing the Potential of Transport Triggered Architecture for Lattice-based Cryptography Algorithms
Latif AKÇAY and Berna ÖRS
2021/535 ( PDF )
On the Possibility of Basing Cryptography on $\EXP \neq \BPP$
Yanyi Liu and Rafael Pass
2021/534 ( PDF )
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
Maura B. Paterson and Douglas R. Stinson
2021/533 ( PDF )
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU
Sijun Tan and Brian Knott and Yuan Tian and David J. Wu
2021/532 ( PDF )
Rainbow on Cortex-M4
Tung Chou and Matthias J. Kannwischer and Bo-Yin Yang
2021/531 ( PDF )
LogStack: Stacked Garbling with $O(b \log b)$ Computation
David Heath and Vladimir Kolesnikov
2021/530 ( PDF )
Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level
Yuan Yao and Tuna Tufan and Tarun Kathuria and Baris Ege and Ulkuhan Guler and Patrick Schaumont
2021/529 ( PDF )
SnarkPack: Practical SNARK Aggregation
Nicolas Gailly and Mary Maller and Anca Nitulescu
2021/528 ( PDF )
Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping
Denis Firsov and Henri Lakk and Ahto Truu
2021/527 ( PDF )
Solving discrete logarithm problem over prime fields using quantum annealing and $\frac{n^3}{2}$ logical qubits
Michał Wroński
2021/526 ( PDF )
Reinforcement Learning-based Design of Side-channel Countermeasures
Jorai Rijsdijk and Lichao Wu and Guilherme Perin
2021/525 ( PDF )
On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis
Lichao Wu and Guilherme Perin
2021/524 ( PDF )
Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency
Kwangsu Lee
2021/523 ( PDF )
No Time to Hash: On Superefficient Entropy Accumulation
Yevgeniy Dodis and Siyao Guo and Noah Stephens-Davidowitz and Zhiye Xie
2021/522 ( PDF )
Public-key Cryptosystems and Signature Schemes from p-adic Lattices
Yingpu Deng and Lixia Luo and Yanbin Pan and Zhaonan Wang and Guanju Xiao
2021/521 ( PDF )
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation
Daniel Demmler and Stefan Katzenbeisser and Thomas Schneider and Tom Schuster and Christian Weinert
2021/520 ( PDF )
Optimal Randomized Partial Checking for Decryption Mix Nets
Thomas Haines and Johannes Mueller
2021/519 ( PDF )
Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment
Atakan Arslan and Muhammed Ali Bingöl
2021/518 ( PDF )
How to Share and Own a Secret
Victor Ermolaev and Gamze Tillem
2021/517 ( PDF )
Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity
Yanyi Liu and Rafael Pass
2021/516 ( PDF )
A new weak curve fault attack on ECIES: embedded point validation is not enough during decryption
Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Xi and Yuhang Wang
2021/515 ( PDF )
Generic Constructions of Revocable Hierarchical Identity-based Encryption
Keita Emura and Atsushi Takayasu and Yohei Watanabe
2021/514 ( PDF )
Non-Interactive Zero Knowledge from Sub-exponential DDH
Abhishek Jain and Zhengzhong Jin
2021/513 ( PDF )
On One-way Functions from NP-Complete Problems
Yanyi Liu and Rafael Pass
2021/512 ( PDF )
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
Tapas Pal and Ratna Dutta
2021/511 ( PDF )
On Simulation-Extractability of Universal zkSNARKs
Markulf Kohlweiss and Michał Zając
2021/510 ( PDF )
Signer and Message Ambiguity from a Variety of Keys
George Teseleanu
2021/509 ( PDF )
On using the same key pair for Ed25519 and an X25519 based KEM
Erik Thormarker
2021/508 ( PDF )
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs
Wonkyung Jung and Sangpyo Kim and Jung Ho Ahn and Jung Hee Cheon and Younho Lee
2021/507 ( PDF )
The t-wise Independence of Substitution-Permutation Networks
Tianren Liu and Stefano Tessaro and Vinod Vaikuntanathan
2021/506 ( PDF )
Delegating Supersingular Isogenies over $\mathbb{F}_{p^2}$ with Cryptographic Applications
Robi Pedersen and Osmanbey Uzunkol
2021/505 ( PDF )
Cryptanalysis of Boyen’s Attribute-Based Encryption Scheme in TCC 2013
Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada
2021/504 ( PDF )
A Generic Method for Investigating Nonsingular Galois NFSRs
Xiao-Juan Wang and Tian Tian and Wen-Feng Qi
2021/503 ( PDF )
Almost-Asynchronous MPC under Honest Majority, Revisited
Matthieu Rambaud and Antoine Urban
2021/502 ( PDF )
A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
Kwangsu Lee and Joon Sik Kim
2021/501 ( PDF )
zkHawk: Practical Private Smart Contracts from MPC-based Hawk
Aritra Banerjee and Michael Clear and Hitesh Tewari
2021/500 ( PDF )
Order-C Secure Multiparty Computation for Highly Repetitive Circuits
Gabrielle Beck and Aarushi Goel and Abhishek Jain and Gabriel Kaptchuk
2021/499 ( PDF )
Optimizing Registration Based Encryption
Kelong Cong and Karim Eldefrawy and Nigel P. Smart
2021/498 ( PDF )
SoK: Multi-Device Secure Instant Messaging
Antonio Dimeo and Felix Gohla and Daniel Goßen and Niko Lockenvitz
2021/497 ( PDF )
SoK: Design Tools for Side-Channel-Aware Implementations
Ileana Buhan and Lejla Batina and Yuval Yarom and Patrick Schaumont
2021/496 ( PDF )
Applications of SKREM-like symmetric key ciphers
Mircea Digulescu
2021/495 ( PDF )
Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One-Way Functions
Mircea Digulescu
2021/494 ( PDF )
Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures.
Surbhi Shaw and Ratna Dutta
2021/493 ( PDF )
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4
Ming-Shing Chen and Tung Chou and Markus Krausz
2021/492 ( PDF )
Classic McEliece on the ARM Cortex-M4
Ming-Shing Chen and Tung Chou
2021/491 ( PDF )
A toolbox for verifiable tally-hiding e-voting systems
Véronique Cortier and Pierrick Gaudry and Quentin Yang
2021/490 ( PDF )
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE
Chao Liu and Anyu Wang and Zhongxiang Zheng
2021/489 ( PDF )
ROSE: Robust Searchable Encryption with Forward and Backward Security and Practical Performance
Peng Xu and Willy Susilo and Wei Wang and Tianyang Chen and Qianhong Wu and Hai Jin
2021/488 ( PDF )
Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle
Javier Herranz and Ramiro Martínez and Manuel Sánchez
2021/487 ( PDF )
Xifrat Cryptanalysis - Compute the Mixing Function Without the Key
"Danny" Niu Jianfang
2021/486 ( PDF )
Security Analysis of End-to-End Encryption for Zoom Meetings
Takanori Isobe and Ryoma Ito
2021/485 ( PDF )
A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme
Ferhat Yaman and Ahmet Can Mert and Erdinç Öztürk and Erkay Savaş
2021/484 ( PDF )
Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF
Alireza Kavousi and Javad Mohajeri and Mahmoud Salmasizadeh
2021/483 ( PDF )
Masking Kyber: First- and Higher-Order Implementations
Joppe W. Bos and Marc Gourjon and Joost Renes and Tobias Schneider and Christine van Vredendaal
2021/482 ( PDF )
Inconsistency of Simulation and Practice in Delay-based Strong PUFs
Anita Aghaie and Amir Moradi
2021/481 ( PDF )
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Alexander Heinrich and Matthias Hollick and Thomas Schneider and Milan Stute and Christian Weinert
2021/480 ( PDF )
Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform
Jakub Klemsa
2021/479 ( PDF )
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Tim Fritzmann and Michiel Van Beirendonck and Debapriya Basu Roy and Patrick Karl and Thomas Schamberger and Ingrid Verbauwhede and Georg Sigl
2021/478 ( PDF )
TurboIKOS: Improved Non-interactive Zero Knowledge and Post-Quantum Signatures
Yaron Gvili and Julie Ha and Sarah Scheffler and Mayank Varia and Ziling Yang and Xinyuan Zhang
2021/477 ( PDF )
Exploiting ROLLO's Constant-Time Implementations with a Single-Trace Analysis
Agathe Cheriere and Lina Mortajine and Tania Richmond and Nadia El Mrabet
2021/476 ( PDF )
Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions
Aaqib Bashir Dar and Mashhood Jeelani Lone and Nuzhat Hussain
2021/475 ( PDF )
Private Liquidity Matching using MPC
Shahla Atapoor and Nigel P. Smart and Younes Talibi Alaoui
2021/474 ( PDF )
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations
Fukang Liu and Santanu Sarkar and Willi Meier and Takanori Isobe
2021/473 ( PDF )
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations
Ryan Karl and Jonathan Takeshita and Alamin Mohammed and Aaron Striegel and and Taeho Jung
2021/472 ( PDF )
CryptoGram: Fast Private Calculations of Histograms over Multiple Users’ Inputs
Ryan Karl and Jonathan Takeshita and Alamin Mohammed and Aaron Striegel and Taeho Jung
2021/471 ( PDF )
Size, Speed, and Security: An Ed25519 Case Study
Cesar Pereida García and Sampo Sovio
2021/470 ( PDF )
Upslices, Downslices, and Secret-Sharing with Complexity of $1.5^n$
Benny Applebaum and Oded Nir
2021/469 ( PDF )
Entropoid Based Cryptography
Danilo Gligoroski
2021/468 ( PDF )
Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report)
Coşku Acay and Rolph Recto and Joshua Gancher and Andrew C. Myers and Elaine Shi
2021/467 ( PDF )
Key-schedule Security for the TLS 1.3 Standard
Chris Brzuska and Antoine Delignat-Lavaud and Christoph Egger and Cédric Fournet and Konrad Kohbrok and Markulf Kohlweiss
2021/466 ( -- withdrawn -- )
A New Key Agreement Scheme Based On A Well-Known Property Of Powers
Michele Fabbrini
2021/465 ( PDF )
Cryptanalysis of `MAKE'
Daniel Brown and Neal Koblitz and Jason LeGrow
2021/464 ( PDF )
iTimed: Cache Attacks on the Apple A10 Fusion SoC
Gregor Haas and Seetal Potluri and Aydin Aysu
2021/463 ( PDF )
Improving Recent Side-Channel Attacks Against the DES Key Schedule
Andreas Wiemers and Johannes Mittmann
2021/462 ( PDF )
SoK: How (not) to Design and Implement Post-Quantum Cryptography
James Howe and Thomas Prest and Daniel Apon
2021/461 ( PDF )
Second-Order SCA Security with almost no Fresh Randomness
Aein Rezaei Shahmirzadi and Amir Moradi
2021/460 ( PDF )
Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
Oleksiy Lisovets and David Knichel and Thorben Moos and Amir Moradi
2021/459 ( PDF )
SIRNN: A Math Library for Secure RNN Inference
Deevashwer Rathee and Mayank Rathee and Rahul Kranti Kiran Goli and Divya Gupta and Rahul Sharma and Nishanth Chandran and Aseem Rastogi
2021/458 ( PDF )
FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm
Gideon Samid
2021/457 ( PDF )
Non-Interactive Composition of Sigma-Protocols via Share-then-Hash
Masayuki Abe and Miguel Ambrona and Andrej Bogdanov and Miyako Ohkubo and Alon Rosen
2021/456 ( PDF )
Hardening Circuit-Design IP Against Reverse-Engineering Attacks
Animesh Chhotaray and Thomas Shrimpton
2021/455 ( PDF )
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage
Chao Sun and Thomas Espitau and Mehdi Tibouchi and Masayuki Abe
2021/454 ( PDF )
Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security
Veronika Kuchta and Amin Sakzad and Damien Stehle and Ron Steinfeld and Shi-Feng Sun
2021/453 ( PDF )
Merkle^2: A Low-Latency Transparency Log System
Yuncong Hu and Kian Hooshmand and Harika Kalidhindi and Seung Jin Yang and Raluca Ada Popa
2021/452 ( -- withdrawn -- )
SAT-based Method to Improve Neural Distinguisher and Applications to SIMON
Zezhou Hou and Jiongjiong Ren and Shaozhen Chen
2021/451 ( PDF )
RepShard: Reputation-based Sharding Scheme Achieves Linearly Scaling Efficiency and Security Simultaneously
Gang Wang
2021/450 ( PDF )
RandChain: Practical Scalable Decentralized Randomness Attested by Blockchain
Gang Wang and Mark Nixon
2021/449 ( PDF )
Towards Cloud-assisted Industrial IoT Platform for Large-scale Continuous Condition Monitoring
Gang Wang and Mark Nixon and Mike Boudreaux
2021/448 ( PDF )
On the Memory-Tightness of Hashed ElGamal
Ashrujit Ghoshal and Stefano Tessaro
2021/447 ( PDF )
An Intimate Analysis of Cuckoo Hashing with a Stash
Daniel Noble
2021/446 ( PDF )
Towards practical GGM-based PRF from (Module-)Learning-with-Rounding
Chitchanok Chuengsatiansup and Damien Stehle
2021/445 ( PDF )
A Survey on Perfectly-Secure Verifiable Secret-Sharing
Anirudh C and Ashish Choudhury and Arpita Patra
2021/444 ( PDF )
Xifrat - Compact Public-Key Cryptosystems based on Quasigroups
Daniel Nager and "Danny" Niu Jianfang
2021/443 ( PDF )
Constructing a pairing-free certificateless proxy signature scheme from ECDSA
Cholun Kim
2021/442 ( PDF )
How to Backdoor a Cipher
Raluca Posteuca and Tomer Ashur
2021/441 ( PDF )
Watermarking PRFs from Lattices: Public Extract and Collusion Resistant
Yukun Wang and Mingqiang Wang
2021/440 ( PDF )
Two modifications for Loidreau's code-based cryptosystem
Wenshuo Guo and Fangwei Fu
2021/439 ( PDF )
Recovering the Key from the Internal State of Grain-128AEAD
Donghoon Chang and Meltem Sonmez Turan
2021/438 ( PDF )
More Efficient Shuffle Argument from Unique Factorization
Toomas Krips and Helger Lipmaa
2021/437 ( PDF )
Formal security analysis of MPC-in-the-head zero-knowledge protocols
Nikolaj Sidorenco and Sabine Oechsner and Bas Spitters
2021/436 ( PDF )
Algebraic Differential Fault Analysis on SIMON block cipher
Duc-Phong Le and Sze Ling Yeo and Khoongming Khoo
2021/435 ( PDF )
Non-Interactive Anonymous Router
Elaine Shi and Ke Wu
2021/434 ( PDF )
On the Power of Expansion: More Efficient Constructions in the Random Probing Model
Sonia Belaïd and Matthieu Rivain and Abdul Rahman Taleb
2021/433 ( PDF )
Formations for the Quantum Random Oracle
Aaram Yun
2021/432 ( PDF )
XORBoost: Tree Boosting in the Multiparty Computation Setting
Kevin Deforth and Marc Desgroseilliers and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev and Marius Vuille
2021/431 ( PDF )
Unbounded Multi-Party Computation from Learning with Errors
Prabhanjan Ananth and Abhishek Jain and Zhengzhong Jin and Giulio Malavolta
2021/430 ( PDF )
Lattice Enumeration on GPUs for fplll
Simon Pohmann and Marc Stevens and Jens Zumbrägel
2021/429 ( PDF )
New Practical Multivariate Signatures from a Nonlinear Modifier
Daniel Smith-Tone
2021/428 ( PDF )
A Coq proof of the correctness of X25519 in TweetNaCl
Peter Schwabe and Benoît Viguier and Timmy Weerwag and Freek Wiedijk
2021/427 ( PDF )
Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks
Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu
2021/426 ( PDF )
Generic Plaintext Equality and Inequality Proofs (Extended Version)
Olivier Blazy and Xavier Bultel and Pascal Lafourcade and Octavio Perez Kempner
2021/425 ( PDF )
Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions
Yuqing Zhao and Wenqi Yu and Chun Guo
2021/424 ( PDF )
Security Analysis of SFrame
Takanori Isobe and Ryoma Ito and Kazuhiko Minematsu
2021/423 ( PDF )
On effective computations in special subsemigroups of polynomial transformations and protocol based multivariate cryptosystems
Vasyl Ustimenko
2021/422 ( PDF )
Stacking Sigmas: A Framework to Compose $\Sigma$-Protocols for Disjunctions
Aarushi Goel and Matthew Green and Mathias Hall-Andersen and Gabriel Kaptchuk
2021/421 ( PDF )
Indistinguishability Obfuscation of Null Quantum Circuits and Applications
James Bartusek and Giulio Malavolta
2021/420 ( PDF )
Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52
Fabian Boemer and Sejun Kim and Gelila Seifu and Fillipe D.M. de Souza and Vinodh Gopal
2021/419 ( -- withdrawn -- )
On The Dihedral Coset Problem
Javad Doliskani
2021/418 ( PDF )
Ring-LWE over two-to-power cyclotomics is not hard
Hao Chen
2021/417 ( PDF )
History Binding Signature
Shlomi Dolev and Matan Liber
2021/416 ( PDF )
Cryptocurrencies with Security Policies and Two-Factor Authentication
Florian Breuer and Vipul Goyal and Giulio Malavolta
2021/415 ( PDF )
Efficient Verification of Optimized Code: Correct High-speed X25519
Marc Schoolderman and Jonathan Moerman and Sjaak Smetsers and Marko van Eekelen
2021/414 ( PDF )
Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings
Sook Yan Hue and Jason Chia and Ji-Jian Chin
2021/413 ( PDF )
Blind Polynomial Evaluation and Data Trading
Yi Liu and Qi Wang and Siu-Ming Yiu
2021/412 ( PDF )
Unclonable Encryption, Revisited
Prabhanjan Ananth and Fatih Kaleoglu
2021/411 ( PDF )
Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions
Onur Gunlu and Peter Trifonov and Muah Kim and Rafael F. Schaefer and Vladimir Sidorenko
2021/410 ( PDF )
Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM
Shlomi Dolev and Stav Doolman
2021/409 ( PDF )
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols
Markulf Kohlweiss and Varun Madathil and Kartik Nayak and Alessandra Scafuro
2021/408 ( PDF )
Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding
Christian Majenz and Christian Schaffner and Mehrdad Tahmasbi
2021/407 ( PDF )
Improved Quantum Algorithms for the k-XOR Problem
André Schrottenloher
2021/406 ( PDF )
Disappearing Cryptography in the Bounded Storage Model
Jiaxin Guan and Mark Zhandry
2021/405 ( PDF )
Revisiting some results on APN and algebraic immune functions
Claude Carlet
2021/404 ( PDF )
Chain Reductions for Multi-Signatures and the HBMS Scheme
Mihir Bellare and Wei Dai
2021/403 ( PDF )
Atom: A Stream Cipher with Double Key Filter
Subhadeep Banik and Andrea Caforio and Takanori Isobe and Fukang Liu and Willi Meier and Kosei Sakamoto and Santanu Sarkar
2021/402 ( PDF )
Leakage Resilient Value Comparison With Application to Message Authentication
Christoph Dobraunig and Bart Mennink
2021/401 ( PDF )
Output Prediction Attacks on Block Ciphers using Deep Learning
Hayato Kimura and Keita Emura and Takanori Isobe and Ryoma Ito and Kazuto Ogawa and Toshihiro Ohigashi
2021/400 ( PDF )
Size of IK00 Branching Program
Yupu Hu and Xingting Dong and Baocang Wang
2021/399 ( PDF )
Latus Incentive Scheme: Enabling Decentralization in Blockchains based on Recursive SNARKs
Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov
2021/398 ( PDF )
Cryptanalysis of the Binary Permuted Kernel Problem
Thales Bandiera Paiva and Routo Terada
2021/397 ( PDF )
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq
Carmine Abate and Philipp G. Haselwarter and Exequiel Rivas and Antoine Van Muylder and Théo Winterhalter and Catalin Hritcu and Kenji Maillard and Bas Spitters
2021/396 ( PDF )
LESS-FM: Fine-tuning Signatures from the Code Equivalence Problem
Alessandro Barenghi and Jean-Francois Biasse and Edoardo Persichetti and Paolo Santini
2021/395 ( PDF )
On the Validity of Spoofing Attack Against Safe is the New Smart
Harishma Boyapally and Urbi Chatterjee and Debdeep Mukhopadhyay
2021/394 ( PDF )
Quantum Encryption with Certified Deletion: Public Key and Attribute-Based
Ryo Nishimaki and Takashi Yamakawa
2021/393 ( PDF )
Key Agreement with Correlated Noise and Multiple Entities or Enrollments
Onur Gunlu
2021/392 ( PDF )
How Private Are Commonly-Used Voting Rules?
Ao Liu and Yun Lu and Lirong Xia and Vassilis Zikas
2021/391 ( PDF )
New Standards for E-Voting Systems: Reflections on Source Code Examinations
Thomas Haines and Peter Roenne
2021/390 ( PDF )
Orthros: A Low-Latency PRF
Subhadeep Banik and Takanori Isobe and Fukang Liu and Kazuhiko Minematsu and Kosei Sakamoto
2021/389 ( PDF )
Physically Related Functions: A New Paradigm for Light-weight Key-Exchange
Durba Chatterjee and Harishma Boyapally and Sikhar Patranabis and Urbi Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
2021/388 ( PDF )
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball and Elette Boyle and Ran Cohen and Lisa Kohl and Tal Malkin and Pierre Meyer and Tal Moran
2021/387 ( PDF )
Quantum-access security of the Winternitz one-time signature scheme
Christian Majenz and Chanelle Matadah Manfouo and Maris Ozols
2021/386 ( PDF )
SAFELearn: Secure Aggregation for private FEderated Learning
Hossein Fereidooni and Samuel Marchal and Markus Miettinen and Azalia Mirhoseini and Helen Möllering and Thien Duc Nguyen and Phillip Rieger and Ahmad Reza Sadeghi and Thomas Schneider and Hossein Yalame and Shaza Zeitouni
2021/385 ( PDF )
Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices
Yasufumi Hashimoto
2021/384 ( PDF )
Analysis and Probing of Parallel Channels in the Lightning Network
Alex Biryukov and Gleb Naumenko and Sergei Tikhomirov
2021/383 ( PDF )
GLV+HWCD for 2y^2=x^3+x/GF(8^91+5)
Daniel R. L. Brown
2021/382 ( PDF )
Signatures with Tight Multi-User Security from Search Assumptions
Jiaxin Pan and Magnus Ringerud
2021/381 ( PDF )
Towards Practical and Round-Optimal Lattice-Based Threshold and Blind Signatures
Shweta Agrawal and Damien Stehle and Anshu Yadav
2021/380 ( PDF )
Certificateless Designated Verifier Proxy Signature
Cholun Kim
2021/379 ( PDF )
A Note on the Bias of Rotational Differential-Linear Distinguishers
Yunwen Liu and Zhongfeng Niu and Siwei Sun and Chao Li and Lei Hu
2021/378 ( PDF )
Multiparty Reusable Non-Interactive Secure Computation from LWE
Fabrice Benhamouda and Aayush Jain and Ilan Komargodski and Huijia Lin
2021/377 ( PDF )
Attacks and weaknesses of BLS aggregate signatures
Nguyen Thoi Minh Quan
2021/376 ( PDF )
On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds
Nai-Hui Chia and Kai-Min Chung and Qipeng Liu and Takashi Yamakawa
2021/375 ( PDF )
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines
Rafael Dowsley and Caleb Horst and Anderson C A Nascimento
2021/374 ( PDF )
ZXAD: High-volume Attack Mitigation for Tor
Akshaya Mani and Ian Goldberg
2021/373 ( PDF )
T5: Hashing Five Inputs with Three Compression Calls
Yevgeniy Dodis and Dmitry Khovratovich and Nicky Mouha and Mridul Nandi
2021/372 ( PDF )
Explicit connections between supersingular isogeny graphs and Bruhat–Tits trees
Laia Amorós and Annamaria Iezzi and Kristin Lauter and Chloe Martindale and Jana Sotáková
2021/371 ( PDF )
Construction of minimal linear codes with few weights from weakly regular plateaued functions
Ahmet Sinak
2021/370 ( PDF )
Nova: Recursive Zero-Knowledge Arguments from Folding Schemes
Abhiram Kothapalli and Srinath Setty and Ioanna Tzialla
2021/369 ( PDF )
A Note on Algebraic Decomposition Method for Masked Implementation
Shoichi Hirose
2021/368 ( PDF )
Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE
Aaron Hutchinson and Koray Karabina and Geovandro Pereira
2021/367 ( PDF )
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
Arnab Roy and Elena Andreeva and Jan Ferdinand Sauer
2021/366 ( PDF )
Multiparty Computation with Covert Security and Public Verifiability
Peter Scholl and Mark Simkin and Luisa Siniscalchi
2021/365 ( PDF )
Updatable Signatures and Message Authentication Codes
Valerio Cini and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks and Erkan Tairi
2021/364 ( PDF )
RAGHAV: A new low power S-P network encryption design for resource constrained environment
GAURAV BANSOD
2021/363 ( PDF )
Information Leakages in Code-based Masking: A Unified Quantification Approach
Wei Cheng and Sylvain Guilley and Claude Carlet and Jean-Luc Danger and Sihem Mesnager
2021/362 ( PDF )
Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning
Zezhou Hou and Jiongjiong Ren and Shaozhen Chen
2021/361 ( PDF )
Some Generic Constructions of Generalized Plateaued Functions
Jiaxin Wang Fang-Wei Fu
2021/360 ( PDF )
An Architecture for Blockchain-based Cloud Banking
Thuat Do
2021/359 ( PDF )
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso
2021/358 ( PDF )
Time- and Space-Efficient Arguments from Groups of Unknown Order
Alexander R. Block and Justin Holmgren and Alon Rosen and Ron D. Rothblum and Pratik Soni
2021/357 ( PDF )
AISY - Deep Learning-based Framework for Side-channel Analysis
Guilherme Perin and Lichao Wu and Stjepan Picek
2021/356 ( PDF )
Active Implementation of End-to-End Post-Quantum Encryption
Anton Tutoveanu
2021/355 ( PDF )
A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware
Georg Land and Pascal Sasdrich and Tim Güneysu
2021/354 ( PDF )
Efficient permutation protocol for MPC in the head
Peeter Laud
2021/353 ( PDF )
Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions
Alonso González and Alexandros Zacharakis
2021/352 ( PDF )
A Configurable Hardware Implementation of XMSS
Jan Philipp Thoma and Tim Güneysu
2021/351 ( PDF )
Practical Dynamic Group Signatures Without Knowledge Extractors
Hyoseung Kim and Olivier Sanders and Michel Abdalla and Jong Hwan Park
2021/350 ( PDF )
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
Konstantinos Chalkias and Francois Garillot and Yashvanth Kondi and Valeria Nikolaenko
2021/349 ( PDF )
Post-quantum Resettably-Sound Zero Knowledge
Nir Bitansky and Michael Kellner and Omri Shmueli
2021/348 ( PDF )
Decoding supercodes of Gabidulin codes and applications to cryptanalysis
Maxime Bombar and Alain Couvreur
2021/347 ( PDF )
Attacking (EC)DSA With Partially Known Multiples of Nonces
Marios Adamoudis and Konstantinos A. Draziotis and Dimitrios Poulakis
2021/346 ( PDF )
Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security
Benny Applebaum and Eliran Kachlon and Arpita Patra
2021/345 ( PDF )
Private Blocklist Lookups with Checklist
Dmitry Kogan and Henry Corrigan-Gibbs
2021/344 ( PDF )
Efficient and Universally Composable Single Secret Leader Election from Pairings
Dario Catalano and Dario Fiore and Emanuele Giunta
2021/343 ( PDF )
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
Rishab Goyal and Jiahui Liu and Brent Waters
2021/342 ( PDF )
N-for-1 Auth: N-wise Decentralized Authentication via One Authentication
Weikeng Chen and Ryan Deng and Raluca Ada Popa
2021/341 ( PDF )
Clonable PUF: On the Design of PUFs That Share Equivalent Responses
Takashi Sato and Yuki Tanaka and Song Bian
2021/340 ( PDF )
Merkle Trees Optimized for Stateless Clients in Bitcoin
Bolton Bailey and Suryanarayana Sankagiri
2021/339 ( PDF )
Non-interactive distributed key generation and key resharing
Jens Groth
2021/338 ( PDF )
Lattice-Based Proof of Shuffle and Applications to Electronic Voting
Diego F. Aranha and Carsten Baum and Kristian Gjøsteen and Tjerand Silde and Thor Tunge
2021/337 ( PDF )
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud Systems
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Yu-Chi Chen and Masahiro Mambo
2021/336 ( PDF )
On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES
Nicolas T. Courtois and Matteo Abbondati and Hamy Ratoanina and Marek Grajek
2021/335 ( PDF )
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
Ohad Amon and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir
2021/334 ( PDF )
Post-Quantum Succinct Arguments: Breaking the Quantum Rewinding Barrier
Alessandro Chiesa and Fermi Ma and Nicholas Spooner and Mark Zhandry
2021/333 ( PDF )
Sumcheck Arguments and their Applications
Jonathan Bootle and Alessandro Chiesa and Katerina Sotiraki
2021/332 ( PDF )
An $O(\log^2 p)$ Approach to Point-Counting on Elliptic Curves From a Prominent Family Over the Prime Field $\mathbb{F}_p$
Yuri Borissov and Miroslav Markov
2021/331 ( PDF )
A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications
Radhakrishna Bhat and N R Sunitha and S S Iyengar
2021/330 ( PDF )
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
Pooya Farshim and Louiza Khati and Yannick Seurin and Damien Vergnaud
2021/329 ( PDF )
Two Efficient and Regulatory Confidential Transaction Schemes
Min Yang and Changtong Xu and Zhe Xia and Li Wang and Qingshu Meng
2021/328 ( PDF )
Mixup Data Augmentation for Deep Learning Side-Channel Attacks
Karim M. Abdellatif
2021/327 ( PDF )
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions
Matteo Campanelli and Mathias Hall-Andersen
2021/326 ( PDF )
Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox
François Dupressoir and Konrad Kohbrok and Sabine Oechsner
2021/325 ( PDF )
Spectrum: High-Bandwidth Anonymous Broadcast with Malicious Security
Zachary Newman and Sacha Servan-Schreiber and Srinivas Devadas
2021/324 ( PDF )
Private AI: Machine Learning on Encrypted Data
Kristin E. Lauter
2021/323 ( PDF )
0
Nguyen Thoi Minh Quan
2021/322 ( PDF )
Rinocchio: SNARKs for Ring Arithmetic
Chaya Ganesh and Anca Nitulescu and Eduardo Soria-Vazquez
2021/321 ( PDF )
Abuse Resistant Law Enforcement Access Systems
Matthew Green and Gabriel Kaptchuk and Gijs Van Laer
2021/320 ( PDF )
Binding BIKE errors to a key pair
Nir Drucker and Shay Gueron and Dusan Kostic
2021/319 ( PDF )
Tradeoff attacks on symmetric ciphers
Orhun Kara
2021/318 ( PDF )
Oblivious TLS via Multi-Party Computation
Damiano Abram and Ivan Damgård and Peter Scholl and Sven Trieflinger
2021/317 ( PDF )
MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge
Duong Tung Nguyen and Ni Trieu
2021/316 ( PDF )
Reusable Two-Round MPC from LPN
James Bartusek and Sanjam Garg and Akshayaram Srinivasan and Yinuo Zhang
2021/315 ( PDF )
Faster homomorphic comparison operations for BGV and BFV
Ilia Iliashenko and Vincent Zucca
2021/314 ( PDF )
On Security Properties of All-or-nothing Transforms
Navid Nasr Esfahani and Douglas R. Stinson
2021/313 ( PDF )
Rank Estimation with Bounded Error via Exponential Sampling
Liron David and Avishai Wool
2021/312 ( PDF )
Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup
Zhimin Luo and Mengce Zheng and Ping Wang and Minhui Jin and Jiajia Zhang and Honggang Hu
2021/311 ( PDF )
Improved Neural Aided Statistical Attack for Cryptanalysis
Yi Chen and Hongbo Yu
2021/310 ( PDF )
A New Neural Distinguisher Considering Features Derived from Multiple Ciphertext Pairs
Yi Chen and Yantian Shen and Hongbo Yu and Sitong Yuan
2021/309 ( PDF )
SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets
Xingyu Meng and Kshitij Raj and Atul Prasad Deb Nath and Kanad Basu and Sandip Ray
2021/308 ( PDF )
Threshold Garbled Circuits and Ad Hoc Secure Computation
Michele Ciampi and Vipul Goyal and Rafail Ostrovsky
2021/307 ( PDF )
A Compressed $\Sigma$-Protocol Theory for Lattices
Thomas Attema and Ronald Cramer and Lisa Kohl
2021/306 ( PDF )
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2021/305 ( PDF )
SoK: Game-based Security Models for Group Key Exchange
Bertram Poettering and Paul Rösler and Jörg Schwenk and Douglas Stebila
2021/304 ( PDF )
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting
Xavier Boyen and Thomas Haines and Johannes Mueller
2021/303 ( PDF )
The More The Merrier: Reducing the Cost of Large Scale MPC
S. Dov Gordon and Daniel Starin and Arkady Yerukhimovich
2021/302 ( PDF )
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain
Maxime Buser and Rafael Dowsley and Muhammed F. Esgin and Shabnam Kasra Kermanshahi and Veronika Kuchta and Joseph K. Liu and Raphael Phan and Zhenfei Zhang
2021/301 ( PDF )
Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of $j=0$ with the cost of one exponentiation in $\mathbb{F}_{\!q}$
Dmitrii Koshelev
2021/300 ( PDF )
Invariants for EA- and CCZ-equivalence of APN and AB functions
Nikolay Kaleyski
2021/299 ( PDF )
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality
Muhammad Saad and Afsah Anwar and Srivatsan Ravi and David Mohaisen
2021/298 ( PDF )
On extensions of the one-time-pad
Bhupendra Singh and G. Athithan and Rajesh Pillai
2021/297 ( PDF )
HashWires: Hyperefficient Credential-Based Range Proofs
Konstantinos Chalkias and Shir Cohen and Kevin Lewi and Fredric Moezinia and Yolan Romailler
2021/296 ( PDF )
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice
Jan Richter-Brockmann and Pascal Sasdrich and Tim Güneysu
2021/295 ( PDF )
Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design
Michael Zuzak and Ankur Srivastava
2021/294 ( PDF )
Code-based signatures without trapdoors through restricted vectors
Marco Baldi and Franco Chiaraluce and Paolo Santini
2021/293 ( PDF )
Thinking Outside the Superbox
Nicolas Bordes and Joan Daemen and Daniël Kuijsters and Gilles Van Assche
2021/292 ( PDF )
Quantum Collision Attacks on Reduced SHA-256 and SHA-512
Akinori Hosoyamada and Yu Sasaki
2021/291 ( PDF )
Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security
Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
2021/290 ( PDF )
Dummy Shuffling against Algebraic Attacks in White-box Implementations
Alex Biryukov and Aleksei Udovenko
2021/289 ( PDF )
Reactive Key-Loss Protection in Blockchains
Sam Blackshear and Konstantinos Chalkias and Panagiotis Chatzigiannis and Riyaz Faizullabhoy and Irakliy Khaburzaniya and Eleftherios Kokoris Kogias and Joshua Lind and David Wong and Tim Zakian
2021/288 ( PDF )
Redeeming Reset Indifferentiability and Post-Quantum Groups
Mark Zhandry
2021/287 ( PDF )
A Deeper Look at Machine Learning-Based Cryptanalysis
Adrien Benamira and David Gerault and Thomas Peyrin and Quan Quan Tan
2021/286 ( PDF )
Fiat-Shamir via List-Recoverable Codes (or: Parallel Repetition of GMW is not Zero-Knowledge)
Justin Holmgren and Alex Lombardi and Ron D. Rothblum
2021/285 ( PDF )
Quadratic Secret Sharing and Conditional Disclosure of Secrets
Amos Beimel and Hussien Othman and Naty Peter
2021/284 ( PDF )
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
Christof Ferreira Torres and Antonio Ken Iannillo and Arthur Gervais and Radu State
2021/283 ( PDF )
P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange
Carsten Baum and Bernardo David and Tore Frederiksen
2021/282 ( PDF )
One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols
Péter Kutas and Simon-Philipp Merz and Christophe Petit and Charlotte Weitkämper
2021/281 ( PDF )
Subquadratic SNARGs in the Random Oracle Model
Alessandro Chiesa and Eylon Yogev
2021/280 ( PDF )
Online-Extractability in the Quantum Random-Oracle Model
Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner
2021/279 ( PDF )
Information-Set Decoding with Hints
Anna-Lena Horlemann and Sven Puchinger and Julian Renner and Thomas Schamberger and Antonia Wachter-Zeh
2021/278 ( PDF )
More Communication Lower Bounds for Information-Theoretic MPC
Ivan Damgård and Boyang Li and Nikolaj I. Schwartzbach
2021/277 ( PDF )
On the Integer Polynomial Learning with Errors Problem
Julien Devevey and Amin Sakzad and Damien Stehlé and Ron Steinfeld
2021/276 ( PDF )
Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography
Amril Syalim and Takashi Nishide and Kouichi Sakurai
2021/275 ( PDF )
Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher
Zhengyuan Shi and Gangqiang Yang and Hailiang Xiong and Fudong Li and Honggang Hu
2021/274 ( PDF )
Large Message Homomorphic Secret Sharing from DCR and Applications
Lawrence Roy and Jaspal Singh
2021/273 ( PDF )
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding
Stanislaw Jarecki and Hugo Krawczyk and Jiayu Xu
2021/272 ( PDF )
Isogeny-based key compression without pairings
Geovandro C. C. F. Pereira and Paulo S. L. M. Barreto
2021/271 ( PDF )
On the CCA Compatibility of Public-Key Infrastructure
Dakshita Khurana and Brent Waters
2021/270 ( PDF )
PQC: R-Propping of a New Group-Based Digital Signature
Pedro Hecht
2021/269 ( PDF )
Steel: Composable Hardware-based Stateful and Randomised Functional Encryption
Pramod Bhatotia and Markulf Kohlweiss and Lorenzo Martinico and Yiannis Tselekounis
2021/268 ( PDF )
Puncture 'Em All: Stronger Updatable Encryption with No-Directional Key Updates
Daniel Slamanig and Christoph Striecks
2021/267 ( PDF )
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
Christoph Dobraunig and Lorenzo Grassi and Anna Guinet and Daniël Kuijsters
2021/266 ( PDF )
VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE
Peter Rindal and Phillipp Schoppmann
2021/265 ( PDF )
On the Hardness of Module-LWE with Binary Secret
Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen
2021/264 ( PDF )
FAST: Fair Auctions via Secret Transactions
Bernardo David and Lorenzo Gentile and Mohsen Pourpouneh
2021/263 ( PDF )
Compressed Linear Aggregate Signatures Based on Module Lattices
Katharina Boudgoust and Adeline Roux-Langlois
2021/262 ( PDF )
The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT
Claudio Orlandi and Peter Scholl and Sophia Yakoubov
2021/261 ( PDF )
MIRACLE: MIcRo-ArChitectural Leakage Evaluation
Ben Marshall and Dan Page and James Webb
2021/260 ( PDF )
A Geometric Approach to Homomorphic Secret Sharing
Yuval Ishai and Russell W. F. Lai and Giulio Malavolta
2021/259 ( PDF )
Fully projective radical isogenies in constant-time
Jesús-Javier Chi-Domínguez and Krijn Reijnders
2021/258 ( PDF )
Secure Wire Shuffling in the Probing Model
Jean-Sebastien Coron and Lorenzo Spignoli
2021/257 ( PDF )
Cryptanalysis of the quantum public-key cryptosystem OTU under heuristics from Szemerédi-type statements
Shoichi Kamada
2021/256 ( PDF )
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC
Ghada Almashaqbeh and Fabrice Benhamouda and Seungwook Han and Daniel Jaroslawicz and Tal Malkin and Alex Nicita and Tal Rabin and Abhishek Shah and Eran Tromer
2021/255 ( PDF )
A Simple Algebraic Attack on 3-Round LowMC
Fukang Liu and Takanori Isobe and Willi Meier
2021/254 ( PDF )
Multivariate Public Key Cryptosystem from Sidon Spaces
Netanel Raviv and Ben Langton and Itzhak Tamo
2021/253 ( PDF )
Improved single-round secure multiplication using regenerating codes
Mark Abspoel and Ronald Cramer and Daniel Escudero and Ivan Damgård and Chaoping Xing
2021/252 ( PDF )
A Resource Binding Approach to Logic Obfuscation
Michael Zuzak and Yuntao Liu and Ankur Srivastava
2021/251 ( PDF )
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser
2021/250 ( PDF )
Key Agreement with Physical Unclonable Functions and Biometric Identifiers
Onur Gunlu
2021/249 ( PDF )
NeuroSCA: Evolving Activation Functions for Side-channel Analysis
Karlo Knezevic and Juraj Fulir and Domagoj Jakobovic and Stjepan Picek
2021/248 ( PDF )
Everlasting UC Commitments from Fully Malicious PUFs
Bernardo Magri and Giulio Malavolta and Dominique Schröder and Dominique Unruh
2021/247 ( PDF )
Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets
David Knichel and Pascal Sasdrich and Amir Moradi
2021/246 ( PDF )
Master-Key KDM-Secure ABE via Predicate Encoding
Shengyuan Feng and Junqing Gong and Jie Chen
2021/245 ( PDF )
On the Ideal Shortest Vector Problem over Random Rational Primes
Yanbin Pan and Jun Xu and Nick Wadleigh and Qi Cheng
2021/244 ( PDF )
Forward Secret Encrypted RAM: Lower Bounds and Applications
Alexander Bienstock and Yevgeniy Dodis and Kevin Yeo
2021/243 ( PDF )
Private Set Operations from Oblivious Switching
Gayathri Garimella and Payman Mohassel and Mike Rosulek and Saeed Sadeghian and Jaspal Singh
2021/242 ( PDF )
GAP: Born to Break Hiding
Ju-Hwan Kim and Ji-Eun Woo and Soo-Jin Kim and So-Yeon Park and Dong-Guk Han
2021/241 ( PDF )
On the Round Complexity of Fully Secure Solitary MPC with Honest Majority
Saikrishna Badrinarayanan and Peihan Miao and Pratyay Mukherjee and Divya Ravi
2021/240 ( PDF )
The Relationship Between Idealized Models Under Computationally Bounded Adversaries
Mark Zhandry and Cong Zhang
2021/239 ( PDF )
SoK: Auditability and Accountability in Distributed Payment Systems
Panagiotis Chatzigiannis and Foteini Baldimtsi and Konstantinos Chalkias
2021/238 ( PDF )
Two Sides of The Same Coin: Weak-Keys and More Efficient Variants of CRAFT
Gregor Leander and Shahram Rasoolzadeh
2021/237 ( PDF )
Post-quantum Security of OAEP Transform
Ehsan Ebrahimi
2021/236 ( PDF )
SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs
Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang
2021/235 ( PDF )
More Efficient Digital Signatures with Tight Multi-User Security
Denis Diemert and Kai Gellert and Tibor Jager and Lin Lyu
2021/234 ( PDF )
New Public-Key Crypto-System EHT
Alessandro Budroni and Igor Semaev
2021/233 ( PDF )
Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers
Inbar Kaslasi and Ron D. Rothblum and Prashant Nalini Vasudevan
2021/232 ( -- withdrawn -- )
Fast Factoring Integers by SVP Algorithms
Claus Peter Schnorr
2021/231 ( -- withdrawn -- )
LL-ORAM: A Forward and Backward Private Oblivious RAM
Zhiqiang Wu and Xiaoyong Tang and Jin Wang and Tan Deng
2021/230 ( PDF )
Subversion-Resilient Public Key Encryption with Practical Watchdogs
Pascal Bemmann and Rongmao Chen and Tibor Jager
2021/229 ( PDF )
Fast Boolean Queries with Minimized Leakage for Encrypted Databases in Cloud Computing
Zhiqiang Wu and Kenli Li and Keqin Li and Jin Wang
2021/228 ( PDF )
On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments
Nils Fleischhacker and Mark Simkin
2021/227 ( PDF )
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks
Qiqi Lai and Feng-Hao Liu and Zhedong Wang
2021/226 ( PDF )
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation
Khoa Nguyen and Reihaneh Safavi-Naini and Willy Susilo and Huaxiong Wang and Yanhong Xu and Neng Zeng
2021/225 ( PDF )
Recovering or Testing Extended-Affine Equivalence
Anne Canteaut and Alain Couvreur and Léo Perrin
2021/224 ( PDF )
Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha
Murilo Coutinho and T. C. Souza Neto
2021/223 ( PDF )
Redactable Blockchain Protocols with Instant Redaction
Jing Xu and Xinyu Li and Lingyuan Yin and Yuan Lu and Qiang Tang and Zhenfeng Zhang
2021/222 ( PDF )
Quantum-safe HIBE: does it cost a Latte?
Raymond K. Zhao and Sarah McCarthy and Ron Steinfeld and Amin Sakzad and Máire O’Neill
2021/221 ( PDF )
The Direction of Updatable Encryption Does Matter
Ryo Nishimaki
2021/220 ( PDF )
A New Twofold Cornacchia-Type Algorithm
Bei Wang; Yi Ouyang; Songsong Li; Honggang Hu
2021/219 ( PDF )
Snarky Ceremonies
Markulf Kohlweiss and Mary Maller and Janno Siim and Mikhail Volkhov
2021/218 ( PDF )
SimS: a Simplification of SiGamal
Tako Boris Fouotsa and Christophe Petit
2021/217 ( PDF )
Verifiable Random Functions with Optimal Tightness
David Niehues
2021/216 ( PDF )
How to Meet Ternary LWE Keys
Alexander May
2021/215 ( PDF )
Limbo: Efficient Zero-knowledge MPCitH-based Arguments
Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Titouan Tanguy
2021/214 ( PDF )
Mesh Messaging in Large-scale Protests: Breaking Bridgefy
Martin R. Albrecht and Jorge Blasco and Rikke Bjerg Jensen and Lenka Mareková
2021/213 ( PDF )
Accelerating the Search of Differential and Linear Characteristics with the SAT Method
Ling Sun and Wei Wang and Meiqin Wang
2021/212 ( PDF )
Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC
Ryoma Ito and Rentaro Shiba and Kosei Sakamoto and Fukang Liu and Takanori Isobe
2021/211 ( PDF )
GearBox: An Efficient UC Sharded Ledger Leveraging the Safety-Liveness Dichotomy
Bernardo David and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Daniel Tschudi
2021/210 ( PDF )
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles
Craig Gentry and Shai Halevi and Hugo Krawczyk and Bernardo Magri and Jesper Buus Nielsen and Tal Rabin and Sophia Yakoubov
2021/209 ( PDF )
Sampling methods for cryptographic tests
George Marinakis
2021/208 ( PDF )
Secure Poisson Regression
Mahimna Kelkar and Phi Hung Le and Mariana Raykova and Karn Seth
2021/207 ( PDF )
Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank
Daniele Cozzo and Nigel P. Smart and Younes Talibi Alaoui
2021/206 ( PDF )
WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts
Ádám Ficsór and Yuval Kogman and Lucas Ontivero and István András Seres
2021/205 ( PDF )
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup
Tsz Hon Yuen and Handong Cui and Xiang Xie
2021/204 ( PDF )
Revisiting Homomorphic Encryption Schemes for Finite Fields
Andrey Kim and Yuriy Polyakov and Vincent Zucca
2021/203 ( PDF )
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
Tjerand Silde and Martin Strand
2021/202 ( PDF )
Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices
Martin R. Albrecht and Russell W. F. Lai
2021/201 ( PDF )
DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security
Hanshen Xiao and Srinivas Devadas
2021/200 ( PDF )
Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols
Sergiu Carpov and Kevin Deforth and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev and Jonathan Katz and Iraklis Leontiadis and M. Mohammadi and Abson Sae-Tang and Marius Vuille
2021/199 ( PDF )
Generic, Efficient and Isochronous Gaussian Sampling over the Integers
Shuo Sun and Yongbin Zhou and Yunfeng Ji and Rui Zhang and Yang Tao
2021/198 ( PDF )
Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs
Tatsuki Ono and Song Bian and Takashi Sato
2021/197 ( PDF )
Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA
Guilherme Perin and Lichao Wu and Stjepan Picek
2021/196 ( PDF )
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model
Xu Liu and Mingqiang Wang
2021/195 ( PDF )
Compilation of Function Representations for Secure Computing Paradigms
Karim Baghery and Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Nigel P. Smart and Titouan Tanguy
2021/194 ( PDF )
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Raghvendra Rohit and Kai Hu and Sumanta Sarkar and Siwei Sun
2021/193 ( PDF )
Multitarget decryption failure attacks and their application to Saber and Kyber
Jan-Pieter D'Anvers and Senne Batsleer
2021/192 ( PDF )
Quantum Indifferentiability of SHA-3
Jan Czajkowski
2021/191 ( PDF )
PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution
Yaroslav Balytskyi and Manohar Raavi and Anatoliy Pinchuk and Sang-Yoon Chang
2021/190 ( PDF )
Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source
Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen
2021/189 ( PDF )
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette
Yunwen Liu and Siwei Sun and Chao Li
2021/188 ( PDF )
Tight Security Bounds for Micali’s SNARGs
Alessandro Chiesa and Eylon Yogev
2021/187 ( PDF )
Weak Keys in Reduced AEGIS and Tiaoxin
Fukang Liu and Takanori Isobe and Willi Meier and Kosei Sakamoto
2021/186 ( PDF )
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages
Hemanta K. Maji and Hai H. Nguyen and Anat Paskin-Cherniavsky and Tom Suad and Mingyuan Wang
2021/185 ( PDF )
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms
Hwajeong Seo and Pakize Sanal and Wai-Kong Lee and Reza Azarderakhsh
2021/184 ( PDF )
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption
Sravya Yandamuri and Ittai Abraham and Kartik Nayak and Michael K. Reiter
2021/183 ( PDF )
Efficient State Management in Distributed Ledgers
Dimitris Karakostas and Nikos Karayannidis and Aggelos Kiayias
2021/182 ( PDF )
The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications
István András Seres and Máté Horváth and Péter Burcsi
2021/181 ( PDF )
Group Signatures with User-Controlled and Sequential Linkability
Jesus Diaz and Anja Lehmann
2021/180 ( PDF )
Apollo -- Optimistically Linear and Responsive SMR
Adithya Bhat and Akhil Bandarupalli and Saurabh Bagchi and Aniket Kate and Michael Reiter
2021/179 ( PDF )
Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis
An Wang and Yuan Li and Yaoling Ding and Liehuang Zhu and Yongjuan Wang
2021/178 ( PDF )
Attribute-Based Access Control for Inner Product Functional Encryption from LWE
Tapas Pal and Ratna Dutta
2021/177 ( PDF )
Generic Negation of Pair Encodings
Miguel Ambrona
2021/176 ( PDF )
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits
Lukas Aumayr and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei
2021/175 ( PDF )
On the Relationships between Different Methods for Degree Evaluation (Full Version)
Siwei Chen and Zejun Xiang and Xiangyong Zeng and Shasha Zhang
2021/174 ( PDF )
Smart Contracts for Incentivized Outsourcing of Computation
Alptekin Küpçü and Reihaneh Safavi-Naini
2021/173 ( PDF )
TensorCrypto
Wai-Kong Lee and Hwajeong Seo and Zhenfei Zhang and Seongoun Hwang
2021/172 ( PDF )
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI
Nishanth Chandran and Nishka Dasgupta and Divya Gupta and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Akash Shah
2021/171 ( PDF )
Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Revisited
Wei Yu and Guangwu Xu
2021/170 ( PDF )
Fully Anonymous Group Signature with Verifier-Local Revocation
Ai Kitagawa and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka
2021/169 ( PDF )
Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials
Yasuhiko Ikematsu and Shuhei Nakamura and Bagus Santoso and Takanori Yasuda
2021/168 ( PDF )
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS
Xiaohan Zhang and Chi Cheng and Ruoyu Ding
2021/167 ( PDF )
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware
Seetal Potluri and Aydin Aysu
2021/166 ( PDF )
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols
Matthias Lohr and Benjamin Schlosser and Jan Jürjens and Steffen Staab
2021/165 ( PDF )
Composition with Knowledge Assumptions
Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
2021/164 ( PDF )
Graph-Based Construction for Non-Malleable Codes
Shohei Satake and Yujie Gu and Kouichi Sakurai
2021/163 ( PDF )
CNF-FSS and its Applications
Paul Bunn and Eyal Kushilevitz and Rafail Ostrovsky
2021/162 ( PDF )
Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity
Giuseppe Ateniese and Long Chen and Danilo Francati and Dimitrios Papadopoulos and Qiang Tang
2021/161 ( -- withdrawn -- )
Generic Adaptor Signature
Xianrui Qin and Handong Cui and Tsz Hon Yuen
2021/160 ( PDF )
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance
Tibor Jager and Rafael Kurek and David Niehues
2021/159 ( PDF )
hbACSS: How to Robustly Share Many Secrets
Thomas Yurek and Licheng Luo and Jaiden Fairoze and Aniket Kate and Andrew Miller
2021/158 ( PDF )
Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate
Nicolas Resch and Chen Yuan
2021/157 ( PDF )
Sycon: A New Milestone in Designing ASCON-like Permutations
Kalikinkar Mandal and Dhiman Saha and Sumanta Sarkar and Yosuke Todo
2021/156 ( PDF )
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability
Manuel Barbosa and Gilles Barthe and Benjamin Grégoire and Adrien Koutsos and Pierre-Yves Strub
2021/155 ( PDF )
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
James Howe and Marco Martinoli and Elisabeth Oswald and Francesco Regazzoni
2021/154 ( PDF )
Generating cryptographically-strong random lattice bases and recognizing rotations of $\mathbb{Z}^n$
Tamar Lichter Blanks and Stephen D. Miller
2021/153 ( PDF )
On the Isogeny Problem with Torsion Point Information
Tako Boris Fouotsa and Péter Kutas and Simon-Philipp Merz
2021/152 ( PDF )
Hybrid Dual Attack on LWE with Arbitrary Secrets
Lei Bi and Xianhui Lu and Junjie Luo and Kunpeng Wang and Zhenfei Zhang
2021/151 ( PDF )
On Sufficient Oracles for Secure Computation with Identifiable Abort
Mark Simkin and Luisa Siniscalchi and and Sophia Yakoubov
2021/150 ( PDF )
Two-Party Adaptor Signatures From Identification Schemes
Andreas Erwig and Sebastian Faust and Kristina Hostáková and Monosij Maitra and Siavash Riahi
2021/149 ( PDF )
Quantum Security of the Legendre PRF
Paul Frixons and André Schrottenloher
2021/148 ( PDF )
On methods of shortening ElGamal-type signatures
Liliya Akhmetzyanova and Evgeny Alekseev and Alexandra Babueva and Stanislav Smyshlyaev
2021/147 ( PDF )
IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols
Greg Morrisett and Elaine Shi and Kristina Sojakova and Xiong Fan and Joshua Gancher
2021/146 ( PDF )
Securely Computing Piecewise Constant Codes
Benjamin E. Diamond
2021/145 ( PDF )
A Security Framework for Distributed Ledgers
Mike Graf and Daniel Rausch and Viktoria Ronge and Christoph Egger and Ralf Kuesters and Dominique Schröder
2021/144 ( PDF )
\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol
Morteza Adeli and Nasour Bagheri and Sadegh Sadeghi and Saru Kumari
2021/143 ( PDF )
On Bitcoin Cash’s Target Recalculation Functions
Juan Garay and Yu Shen
2021/142 ( PDF )
Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication
Muah Kim and Onur Gunlu and Rafael F. Schaefer
2021/141 ( PDF )
Advanced Lattice Sieving on GPUs, with Tensor Cores
Léo Ducas and Marc Stevens and Wessel van Woerden
2021/140 ( PDF )
Practical and Scalable Access Control Mechanism for the Internet of Things
Clémentine Gritti and Emanuel Regnath and Sebastian Steinhorst
2021/139 ( PDF )
Order-Fair Consensus in the Permissionless Setting
Mahimna Kelkar and Soubhik Deb and Sreeram Kannan
2021/138 ( PDF )
Classic McEliece Implementation with Low Memory Footprint
Johannes Roth and Evangelos Karatsiolis and Juliane Krämer
2021/137 ( PDF )
Cryptographic Security of the MLS RFC, Draft 11
Chris Brzuska and Eric Cornelissen and Konrad Kohbrok
2021/136 ( PDF )
An approach for designing fast public key encryption systems using white-box cryptography techniques
Dmitry Schelkunov
2021/135 ( PDF )
Acyclicity Programming for Sigma-Protocols
Masayuki Abe and Miguel Ambrona and Andrej Bogdanov and Miyako Ohkubo and Alon Rosen
2021/134 ( PDF )
Cryptanalysis of a code-based signature scheme without trapdoors
Marco Baldi and Jean-Christophe Deneuville and Edoardo Persichetti and Paolo Santini
2021/133 ( PDF )
smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
Ravital Solomon and Ghada Almashaqbeh
2021/132 ( PDF )
Privacy-Preserving Feature Selection with Secure Multiparty Computation
Xiling Li and Rafael Dowsley and Martine De Cock
2021/131 ( PDF )
Privacy-Preserving Video Classification with Convolutional Neural Networks
Sikha Pentyala and Rafael Dowsley and Martine De Cock
2021/130 ( PDF )
Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves
Bei Wang; Songsong Li; Yi Ouyang; Honggang Hu
2021/129 ( PDF )
Lattice-based weak curve fault attack on ECDSA
Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Wei
2021/128 ( PDF )
Designing Tweakable Enciphering Schemes Using Public Permutations
Debrup Chakraborty and Avijit Dutta and Samir Kundu
2021/127 ( PDF )
Cuproof: A Novel Range Proof with Constant Size
Cong Deng and Xianghong Tang and Lin You and Gengran Hu and Shuhong Gao
2021/126 ( PDF )
Observability attack on stream generators
Ramachandran Anantharaman and Virendra Sule
2021/125 ( PDF )
Privacy Preserving and Resilient RPKI
Kris Shrishak and Haya Shulman
2021/124 ( PDF )
Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption
Ozgun Ozerk and Can Elgezen and Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2021/123 ( PDF )
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
Yue Qin and Chi Cheng and Xiaohan Zhang and Yanbin Pan and Lei Hu and Jintai Ding
2021/122 ( PDF )
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
Aner Ben Efraim and Olga Nissenbaum and Eran Omri and Anat Paskin-Cherniavsky
2021/121 ( PDF )
BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits
Yaron Gvili and Sarah Scheffler and Mayank Varia
2021/120 ( PDF )
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits
Aner Ben-Efraim and Kelong Cong and Eran Omri and Emmanuela Orsini and Nigel P. Smart and Eduardo Soria-Vazquez
2021/119 ( PDF )
Rabbit: Efficient Comparison for Secure Multi-Party Computation
Eleftheria Makri and Dragos Rotaru and Frederik Vercauteren and Sameer Wagh
2021/118 ( PDF )
High-Threshold AVSS with Optimal Communication Complexity
Nicolas Alhaddad and Mayank Varia and Haibin Zhang
2021/117 ( PDF )
FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin
Arash Mirzaei and Amin Sakzad and Jiangshan Yu and Ron Steinfeld
2021/116 ( PDF )
MAKE: a Matrix Action Key Exchange
Nael Rahman and Vladimir Shpilrain
2021/115 ( PDF )
Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4
Mila Anastasova and Reza Azarderakhsh and Mehran Mozaffari Kermani
2021/114 ( PDF )
Security Analysis of CPace
Michel Abdalla and Björn Haase and Julia Hesse
2021/113 ( PDF )
Improvement of Secure Multi-Party Multiplication of (k,n) Threshold Secret Sharing Using Only N=k Servers (Revised Version)
Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura
2021/112 ( -- withdrawn -- )
Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange
Majid Salimi and Hamid Mala and Honorio Martin and Pedro Peris-Lopez
2021/111 ( PDF )
A note on Post Quantum Onion Routing
Kelesidis Evgnosia-Alexandra
2021/110 ( PDF )
Replacing Probability Distributions in Security Games via Hellinger Distance
Kenji Yasunaga
2021/109 ( PDF )
Sequential Logic Encryption Against Model Checking Attack
Amin Rezaei and Hai Zhou
2021/108 ( PDF )
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs
Sara Ricci and Lukas Malina and Petr Jedlicka and David Smekal and Jan Hajny and Petr Cibik and Patrik Dobias
2021/107 ( PDF )
A Decentralized and Encrypted National Gun Registry
Seny Kamara and Tarik Moataz and Andrew Park and Lucy Qin
2021/106 ( PDF )
MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers
Aram Jivanyan and Jesse Lancaster and Arash Afshar and Parnian Alimi
2021/105 ( PDF )
A New Efficient Identity-Based Encryption Without Pairing
Majid Salimi
2021/104 ( PDF )
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography
Shivam Bhasin and Jan-Pieter D'Anvers and Daniel Heinz and Thomas Pöppelmann and Michiel Van Beirendonck
2021/103 ( PDF )
RUP Security of the SAEF Authenticated Encryption mode
Elena Andreeva and Amit Singh Bhati and Damian Vizar
2021/102 ( PDF )
A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization
Madalina Chirita and Alexandru-Mihai Stroie and Andrei-Daniel Safta and Emil Simion
2021/101 ( PDF )
Combined Fault and DPA Protection for Lattice-Based Cryptography
Daniel Heinz and Thomas Pöppelmann
2021/100 ( PDF )
SPURT: Scalable Distributed Randomness Beacon with Transparent Setup
Sourav Das and Vinith Krishnan and Irene Miriam Isaac and Ling Ren
2021/099 ( PDF )
Property Inference from Poisoning
Melissa Chase and Esha Ghosh and Saeed Mahloujifar
2021/098 ( PDF )
Image sets of perfectly nonlinear maps
Lukas Kölsch and Björn Kriepke and Gohar Kyureghyan
2021/097 ( PDF )
A New and Improved Reduction Proof of Cascade PRF
Mridul Nandi
2021/096 ( PDF )
Gladius: LWR based efficient hybrid public key encryption with distributed decryption
Kelong Cong and Daniele Cozzo and Varun Maram and Nigel P. Smart
2021/095 ( PDF )
Collusion-Deterrent Threshold Information Escrow
Easwar Vivek Mangipudi and Donghang Lu and Alexandros Psomas and Aniket Kate
2021/094 ( PDF )
Reducing HSM Reliance in Payments through Proxy Re-Encryption
Sivanarayana Gaddam and Atul Luykx and Rohit Sinha and Gaven Watson
2021/093 ( PDF )
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks
Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
2021/092 ( PDF )
New Public Key Cryptosystem (First Version)
Dieaa I. Nassr and M. Anwar and Hatem M. Bahig
2021/091 ( PDF )
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks
Ilaria Chillotti and Marc Joye and Pascal Paillier
2021/090 ( PDF )
A New Twofold Cornacchia-Type Algorithm and Its Applications
Bei Wang; Yi Ouyang; Honggang Hu ; Songsong Li
2021/089 ( PDF )
Fuzzy Message Detection
Gabrielle Beck and Julia Len and Ian Miers and Matthew Green
2021/088 ( PDF )
An Overview of the Hybrid Argument
Marc Fischlin and Arno Mittelbach
2021/087 ( PDF )
ZEN: An Optimizing Compiler for Verifiable, Zero-Knowledge Neural Network Inferences
Boyuan Feng and Lianke Qin and Zhenfei Zhang and Yufei Ding and Shumo Chu
2021/086 ( PDF )
On Elapsed Time Consensus Protocols
Mic Bowman and Debajyoti Das and Avradip Mandal and Hart Montgomery
2021/085 ( PDF )
Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves
Suhri Kim
2021/084 ( PDF )
Ariadne Thread and Pepper: New Multivariate Cryptographic Schemes with Public Keys in Degree 3
Gilles Macario-Rat and Jacques Patarin
2021/083 ( PDF )
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol
Michael Troncoso and Britta Hale
2021/082 ( PDF )
Grades of Trust in Multiparty Computation
Jaskaran V. Singh and Nicholas Hopper
2021/081 ( PDF )
Private Stream Aggregation from Labeled Secret Sharing Schemes
Hendrik Waldner and Tilen Marc and Miha Stopar and Michel Abdalla
2021/080 ( PDF )
Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption
Jan-Pieter D'Anvers and Emmanuela Orsini and Frederik Vercauteren
2021/079 ( PDF )
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM
Kalle Ngo and Elena Dubrova and Qian Guo and Thomas Johansson
2021/078 ( PDF )
An Incentive-Compatible Smart Contract for Decentralized Commerce
Nikolaj I. Schwartzbach
2021/077 ( PDF )
Magnetic RSA
Rémi Géraud-Stewart and David Naccache
2021/076 ( PDF )
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field
Kang Yang and Pratik Sarkar and Chenkai Weng and Xiao Wang
2021/075 ( PDF )
A Generalization of the Subfield Construction
Kamil Otal
2021/074 ( PDF )
Cross-Domain Attribute-Based Access Control Encryption
Mahdi Sedaghat and Bart Preneel
2021/073 ( PDF )
Application of Velusqrt algorithm to Huff's and general Huff's curves
Michał Wroński
2021/072 ( PDF )
Toward Practical Autoencoder-based Side-Channel Analysis Evaluations
Servio Paguada and Lejla Batina and Igor Armendariz
2021/071 ( PDF )
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis
Jorai Rijsdijk and Lichao Wu and Guilherme Perin and Stjepan Picek
2021/070 ( PDF )
Secure, Accurate, and Practical Narrow-Band Ranging System
Aysajan Abidin and Mohieddine El Soussi and Jac Romme and Pepijn Boer and Dave Singelée and Christian Bachmann
2021/069 ( PDF )
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation
Amanda Resende and Davis Railsback and Rafael Dowsley and Anderson C. A. Nascimento and Diego F. Aranha
2021/068 ( PDF )
Banquet: Short and Fast Signatures from AES
Carsten Baum and Cyprien Delpech de Saint Guilhem and Daniel Kales and Emmanuela Orsini and Peter Scholl and Greg Zaverucha
2021/067 ( PDF )
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Michiel Van Beirendonck and Jan-Pieter D’Anvers and Ingrid Verbauwhede
2021/066 ( PDF )
A Deep Learning Approach for Active S-box Prediction of Lightweight Generalized Feistel Block Ciphers
Mohamed Fadl Idris and Je Sen Teh and Jasy Liew Suet Yan and Wei-Zhu Yeoh
2021/065 ( PDF )
FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves
Dorin-Marian Ionita and Emil Simion
2021/064 ( PDF )
Fault Attacks on CCA-secure Lattice KEMs
Peter Pessl and Lukas Prokop
2021/063 ( PDF )
CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing
Monir Azraoui and Solenn Brunet and Sébastien Canard and Aïda Diop and Lélia Eveillard and Alicia Filipiak and Adel Hamdi and Flavie Misarsky and Donald Nokam Kuate and Marie Paindavoine and Quentin Santos and Bastien Vialla
2021/062 ( PDF )
Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3)
Dominique Unruh
2021/061 ( PDF )
A Note on IBE Performance of a Practical Application
Ştefan Maftei and Marius Supuran and Emil Simion
2021/060 ( PDF )
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts
Ran Canetti and Rosario Gennaro and Steven Goldfeder and Nikolaos Makriyannis and Udi Peled
2021/059 ( PDF )
The Cost of Adaptivity in Security Games on Graphs
Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter
2021/058 ( PDF )
A Performance Study of Crypto-Hardware in the Low-end IoT
Peter Kietzmann and Lena Boeckmann and Leandro Lanzieri and Thomas C. Schmidt and Matthias Wählisch
2021/057 ( PDF )
Correlation Intractability vs. One-wayness
Tamer Mour
2021/056 ( PDF )
The Study of Modulo $2^n$
Zhongfeng Niu
2021/055 ( PDF )
Tech Report: Inerial HSMs Thwart Advanced Physical Attacks
Jan Sebastian Götte and Björn Scheuermann
2021/054 ( PDF )
The Cost of IEEE Arithmetic in Secure Computation
David W. Archer and Shahla Atapoor and Nigel P. Smart
2021/053 ( PDF )
On Algebraic Embedding for Unstructured Lattices
Madalina Bolboceanu and Zvika Brakerski and Devika Sharma
2021/052 ( PDF )
Elementary Attestation of Cryptographically Useful Composite Moduli
Rémi Géraud-Stewart and David Naccache
2021/051 ( PDF )
How Much can F5 Really Do
Jintai Ding and Zheng Zhang and Joshua Deaton
2021/050 ( PDF )
The Distinguishing Attack on HFE
Joshua Deaton and Jintai Ding
2021/049 ( PDF )
ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process
Mark D. Aagaard and Nusa Zidaric
2021/048 ( PDF )
Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution
Sohyun Jeon and Hyang-Sook Lee and Jeongeun Park
2021/047 ( PDF )
Evolution of Bulletin Board & its application to E-Voting – A Survey
Misni Harjo Suwito and Yoshifumi Ueshige and Kouichi Sakurai
2021/046 ( PDF )
Efficient Lattice-Based Inner-Product Functional Encryption
Jose Maria Bermudo Mera and Angshuman Karmakar and Tilen Marc and Azam Soleimanian
2021/045 ( PDF )
Banners: Binarized Neural Networks with Replicated Secret Sharing
Alberto Ibarrondo and Hervé Chabanne and Melek Önen
2021/044 ( PDF )
Addra: Metadata-private voice communication over fully untrusted infrastructure
Ishtiyaque Ahmad and Yuntian Yang and Divyakant Agrawal and Amr El Abbadi and Trinabh Gupta
2021/043 ( PDF )
Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields
Madhurima Mukhopadhyay and Palash Sarkar
2021/042 ( PDF )
Correcting Subverted Random Oracles
Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou and Jiadong Zhu
2021/041 ( PDF )
Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot
Panos Kampanakis and Peter Panburana and Michael Curcio and Chirag Shroff and Md Mahbub Alam
2021/040 ( PDF )
On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product
Any Muanalifah and Serge˘ı Sergeev
2021/039 ( PDF )
Practical FHE parameters against lattice attacks
Jung Hee Cheon and Yongha Son and Donggeon Yhee
2021/038 ( PDF )
Streaming Merkle Proofs within Binary Numeral Trees
Luke Champine
2021/037 ( PDF )
New First-Order Secure AES Performance Records
Aein Rezaei Shahmirzadi and Dušan Božilov and Amir Moradi
2021/036 ( PDF )
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
Niluka Amarasinghe and Xavier Boyen and Matthew McKague
2021/035 ( PDF )
Sketches for Blockchains
Ori Rottenstreich
2021/034 ( PDF )
Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF
Nishanth Chandran and Divya Gupta and Akash Shah
2021/033 ( PDF )
Quantum-resistant Anonymous IBE with Traceable Identities
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo and Yu-Chi Chen
2021/032 ( PDF )
Experimental relativistic zero-knowledge proofs
Pouriya Alikhani and Nicolas Brunner and Claude Crépeau and Sébastien Designolle and Raphaël Houlmann and Weixu Shi and Hugo Zbinden
2021/031 ( PDF )
A Comparative Study of Cryptographic Key Distribution Protocols
Alexandru-Ștefan Gheorghieș and Darius-Marian Lăzăroi and Emil Simion
2021/030 ( PDF )
Linear-time and post-quantum zero-knowledge SNARKs for R1CS
Jonathan Lee and Srinath Setty and Justin Thaler and Riad Wahby
2021/029 ( PDF )
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs
Thomas Schneider and Oleksandr Tkachenko
2021/028 ( PDF )
A Side Journey to Titan
Victor LOMNE and Thomas ROCHE
2021/027 ( PDF )
E-voting protocols in context of COVID19
Sfirnaciuc Emilia and Vasilescu Miruna-Elena and Simion Emil
2021/026 ( PDF )
A Gapless Code-Based Hash Proof System based on RQC and its Applications
Slim Bettaieb and Loïc Bidoux and Olivier Blazy and Yann Connan and Philippe Gaborit
2021/025 ( PDF )
FLGUARD: Secure and Private Federated Learning
Thien Duc Nguyen and Phillip Rieger and Hossein Yalame and Helen Möllering and Hossein Fereidooni and Samuel Marchal and Markus Miettinen and Azalia Mirhoseini and Ahmad-Reza Sadeghi and Thomas Schneider and Shaza Zeitouni
2021/024 ( PDF )
PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System
Pedro Hecht
2021/023 ( PDF )
What is Meant by Permissionless Blockchains?
Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Andreas Kern and Walid Fdhila
2021/022 ( PDF )
Increasing Precision of Division Property
Patrick Derbez and Pierre-Alain Fouque
2021/021 ( PDF )
Fake Near Collisions Attacks
Patrick Derbez and Pierre-Alain Fouque and Victor Mollimard
2021/020 ( PDF )
Catching the Fastest Boomerangs - Application to SKINNY
Stéphanie Delaune and Patrick Derbez and Mathieu Vavrille
2021/019 ( PDF )
Kummer versus Montgomery Face-off over Prime Order Fields
Kaushik Nath and Palash Sarkar
2021/018 ( PDF )
Comments on ``On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment''
Yuhao Yang and Xiujie Huang
2021/017 ( PDF )
Lightweight Techniques for Private Heavy Hitters
Dan Boneh and Elette Boyle and Henry Corrigan-Gibbs and Niv Gilboa and Yuval Ishai
2021/016 ( PDF )
Black-Box Uselessness: Composing Separations in Cryptography
Geoffroy Couteau and Pooya Farshim and Mohammad Mahmoody
2021/015 ( PDF )
SoK: Remote Power Analysis
Macarena C. Martínez-Rodríguez and Ignacio M. Delgado-Lozano and Billy Bob Brumley
2021/014 ( -- withdrawn -- )
Efficient Multilinear Map from Graded Encoding Scheme
Majid Salimi
2021/013 ( PDF )
An atlas of the Richelot isogeny graph
Enric Florit and Benjamin Smith
2021/012 ( PDF )
Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph
Enric Florit and Benjamin Smith
2021/011 ( PDF )
Complete solution over $\GF{p^n}$ of the equation $X^{p^k+1}+X+a=0$
Kwang Ho Kim and Jong Hyok Choe and Sihem Mesnager
2021/010 ( PDF )
Compcrypt -- Lightweight ANS-based Compression and Encryption
Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk
2021/009 ( PDF )
Demand-aware Channel Topologies for Off-chain Blockchain Payments
Julia Khamis and Ori Rottenstreich
2021/008 ( PDF )
A Family of Nonlinear MDS Diffusion Layers over $\mathbb{F}_{2^{4n}}$
M. R. Mirzaee Shamsabad and S. M. Dehnavi
2021/007 ( PDF )
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Cheng-Yi Lee
2021/006 ( PDF )
Privacy-Preserving Privacy Profile Proposal Protocol
Wyatt Howe and Andrei Lapets
2021/005 ( PDF )
Aggregatable Distributed Key Generation
Kobi Gurkan and Philipp Jovanovic and Mary Maller and Sarah Meiklejohn and Gilad Stern and Alin Tomescu
2021/004 ( PDF )
LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions
Ismail San
2021/003 ( PDF )
Ciphertext Policy Attribute Based Encryption for Arithmetic circuits
Mahdi Mahdavi Oliaee and Zahra Ahmadian
2021/002 ( PDF )
Can Lattice Signature be as Efficient as Lattice Encryption?
Dingfeng Ye
2021/001 ( PDF )
2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product
Michel Abdalla and David Pointcheval and Azam Soleimanian


[ Cryptology ePrint archive ]