Cryptology ePrint Archive: Listing for 2022


2022/603 ( PDF )
Distributed Blockchain Price Oracle
Léonard Lys and Maria Potop-Butucaru
2022/602 ( PDF )
Real-Time Frequency Detection to Synchronize Fault Injection on System-on-Chip
Clément Fanjas and Clément Gaine and Driss Aboulkassimi and Simon Pontié and Olivier Potin
2022/601 ( PDF )
A Better Method to Analyze Blockchain Consistency
Lucianna Kiffer and Rajmohan Rajaraman and abhi shelat
2022/600 ( PDF )
A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations
Loïc Masure and Olivier Rioul and François-Xavier Standaert
2022/599 ( PDF )
TenderTee: Secure Tendermint
Lionel Beltrando and Maria Potop-Butucaru and Jose Alfaro
2022/598 ( PDF )
Verifiable and Forward private Conjunctive keyword Search from DIA Tree
Laltu Sardar and Sushmita Ruj
2022/597 ( PDF )
Foundations of Dynamic BFT
Sisi Duan and Haibin Zhang
2022/596 ( PDF )
Zero Knowledge Proofs of Elliptic Curve Inner Products from Principal Divisors and Weil Reciprocity
Liam Eagen
2022/595 ( PDF )
On the Cryptographic Fragility of the Telegram Ecosystem
Theo von Arx and Kenneth G. Paterson
2022/594 ( PDF )
A CONCRETE approach to torus fully homomorphic encryption
Maria Ferrara and Antonio Tortora
2022/593 ( PDF )
On the Security Proof of CKO+21 Secret Sharing Scheme
Yupu Hu and Shanshan Zhang and Baocang Wang and Siyue Dong
2022/592 ( PDF )
Chaghri --- an FHE-friendly Block Cipher
Tomer Ashur and Mohammad Mahzoun and Dilara Toprakhisar
2022/591 ( PDF )
Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography
Ryota Hira and Tomoaki Kitahara and Daiki Miyahara and Yuko Hara-Azumi and Yang Li and Kazuo Sakiyama
2022/590 ( PDF )
Secure Merge in Linear Time and O(log log N) Rounds
Mark Blunk and Paul Bunn and Samuel Dittmer and Steve Lu and Rafail Ostrovsky
2022/589 ( PDF )
Unnecessary Input Heuristics & PayJoin Transactions
Simin Ghesmati and Andreas Kern and Aljosha Judmayer and Nicholas Stifter and
2022/588 ( PDF )
Efficient Lifting for Shorter Zero-Knowledge Proofs and Post-Quantum Signatures
Daniel Kales and Greg Zaverucha
2022/587 ( PDF )
Doubly Efficient Interactive Proofs over Infinite and Non-Commutative Rings
Eduardo Soria-Vazquez
2022/586 ( PDF )
A survey of elliptic curves for proof systems
Diego F. Aranha and Youssef El Housni and Aurore Guillevic
2022/585 ( PDF )
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability
Yi Liu and Qi Wang and Siu-Ming Yiu
2022/584 ( PDF )
Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups
Lior Rotem
2022/583 ( PDF )
A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff
Lior Rotem and Gil Segev
2022/582 ( PDF )
Ponyta: Foundations of Side-Contract-Resilient Fair Exchange
Hao Chung and Elisaweta Masserova and Elaine Shi and Sri AravindaKrishnan Thyagarajan
2022/581 ( PDF )
Cryptoanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage
Lidong Han and Guangwu Xu and Qi Xie and Xiao Tan and Chengliang Tian
2022/580 ( PDF )
How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing
Samuel Sousa and Roman Kern
2022/579 ( PDF )
Compact and Efficient NTRU-based KEM with Scalable Ciphertext Compression
Zhichuang Liang and Boyue Fang and Jieyu Zheng and Yunlei Zhao
2022/578 ( PDF )
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation
Alexandre Adomnicai and Kazuhiko Minematsu and Maki Shigeri
2022/577 ( PDF )
Construction of generalized-involutory MDS matrices
Xuting Zhou and Tianshuo Cong
2022/576 ( PDF )
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage
Akira Ito and Rei Ueno and Naofumi Homma
2022/575 ( PDF )
Optimizing Homomorphic Encryption Parameters for Arbitrary Applications
Charles Gouert and Rishi Khan and Nektarios Georgios Tsoutsos
2022/574 ( PDF )
Comparison-Based MPC in Star Topology (Full Version)
Gowri R Chandran and Carmit Hazay and Robin Hundt and Thomas Schneider
2022/573 ( PDF )
Finding One Common Item, Privately
Tyler Beauregard and Janabel Xia and Mike Rosulek
2022/572 ( PDF )
Homomorphically counting elements with the same property
Ilia Iliashenko and Malika Izabachène and Axel Mertens and Hilder V. L. Pereira.
2022/571 ( PDF )
Entropically secure cipher for messages generated by Markov chains with unknown statistics
Boris Ryabko
2022/570 ( PDF )
Secure and Private Source Coding with Private Key and Decoder Side Information
Onur Gunlu and Rafael F. Schaefer and Holger Boche and H. Vincent Poor
2022/569 ( PDF )
TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks
Marloes Venema and Greg Alpár
2022/568 ( PDF )
Improved MITM Cryptanalysis on Streebog
Jialiang Hua and Xiaoyang Dong and Siwei Sun and Zhiyu Zhang and Lei Hu and Xiaoyun Wang
2022/567 ( PDF )
FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher
Michele Fabbrini
2022/566 ( PDF )
AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication
Chenkai Weng and Kang Yang and Zhaomin Yang and Xiang Xie and Xiao Wang
2022/565 ( PDF )
Power Contracts: Provably Complete Power Leakage Models for Processors
Roderick Bloem and Barbara Gigerl and Marc Gourjon and Vedad Hadžić and Stefan Mangard and Robert Primas
2022/564 ( PDF )
FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization
Christopher van der Beets and Raine Nieminen and Thomas Schneider
2022/563 ( PDF )
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber
Muyan Shen and Chi Cheng and Xiaohan Zhang and Qian Guo and Tao Jiang
2022/562 ( PDF )
Orientations and cycles in supersingular isogeny graphs
Sarah Arpin and Mingjie Chen and Kristin E. Lauter and Renate Scheidler and Katherine E. Stange and Ha T. N. Tran
2022/561 ( PDF )
Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes
Shivam Bhasin and Dirmanto Jap and Wei Cheng Ng and Siang Meng Sim
2022/560 ( PDF )
Distributed Shuffling in Adversarial Environments
Kasper Green Larsen and Maciej Obremski and Mark Simkin
2022/559 ( PDF )
DeCAF: Decentralizable Continuous Group Key Agreement with Fast Healing
Joël Alwen and Benedikt Auerbach and Miguel Cueto Noval and Karen Klein and Guillermo Pascual-Perez and Krzysztof Pietrzak
2022/558 ( PDF )
On Seedless PRNGs and Premature Next
Sandro Coretti and Yevgeniy Dodis and Harish Karthikeyan and Noah Stephens-Davidowitz and Stefano Tessaro
2022/557 ( PDF )
Honest Majority Multi-Prover Interactive Arguments
Alexander R. Block and Christina Garman
2022/556 ( PDF )
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives
Handong Zhang and Puwen Wei and Haiyang Xue and Yi Deng and Jinsong Li and Wei Wang and Guoxiao Liu
2022/555 ( PDF )
Adapting Belief Propagation to Counter Shuffling of NTTs
Julius Hermelink and Silvan Streit and Emanuele Strieder and Katharina Thieme
2022/554 ( PDF )
Byzantine Reliable Broadcast with $O(nL+kn+n^2 log n)$ Communication
Sisi Duan and Haibin Zhang
2022/553 ( PDF )
Secure Storage with Deduplication
John Best and Wayne Hineman and Steven Hetzler and Guerney Hunt and Charanjit S. Jutla
2022/552 ( PDF )
Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One
Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky
2022/551 ( PDF )
Marlin: Two-Phase BFT with Linearity
Xiao Sui and Sisi Duan and Haibin Zhang
2022/550 ( PDF )
ROAST: Robust Asynchronous Schnorr Threshold Signatures
Tim Ruffing and Viktoria Ronge and Elliott Jin and Jonas Schneider-Bensch and Dominique Schröder
2022/549 ( PDF )
Smart Contracts Obfuscation from Blockchain-based One-time Program
Sora Suegami
2022/548 ( PDF )
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security
Yuyu Wang and Jiaxin Pan
2022/547 ( PDF )
Fast signing method in RSA with high speed verification
GyuChol.Kim and YongBok.Jong
2022/546 ( PDF )
He-HTLC: Revisiting Incentives in HTLC
Sarisht Wadhwa and Jannis Stoeter and Fan Zhang and Kartik Nayak
2022/545 ( PDF )
Logic Locking - Connecting Theory and Practice
Elisaweta Masserova and Deepali Garg and Ken Mai and Lawrence Pileggi and Vipul Goyal and Bryan Parno
2022/544 ( PDF )
Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting
Donghoon Chang and Deukjo Hong and Jinkeon Kang
2022/543 ( PDF )
Aura: private voting with reduced trust on tallying authorities
Aram Jivanyan and Aaron Feickert
2022/542 ( PDF )
On Valiant's Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles
Mathias Hall-Andersen and Jesper Buus Nielsen
2022/541 ( PDF )
The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols
Sandro Coretti and Aggelos Kiayias and Cristopher Moore and Alexander Russell
2022/540 ( PDF )
On the revision of NIST 800-22 Test Suites
Katarzyna Anna Kowalska and Davide Fogliano and Jose Garcia Coello
2022/539 ( PDF )
Post Quantum Noise
Yawning Angel and Benjamin Dowling and Andreas Hülsing and Peter Schwabe and Florian Weber
2022/538 ( PDF )
Post-Quantum Signatures on RISC-V with Hardware Acceleration
Patrick Karl and Jonas Schupp and Tim Fritzmann and Georg Sigl
2022/537 ( PDF )
Rubato: Noisy Ciphers for Approximate Homomorphic Encryption (Full Version)
Jincheol Ha and Seongkwang Kim and Byeonghak Lee and Jooyoung Lee and Mincheol Son
2022/536 ( PDF )
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha
Sabyasachi Dey and Hirendra Kumar Garai and Santanu Sarkar and Nitin Kumar Sharma
2022/535 ( PDF )
Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round
Damiano Abram and Peter Scholl and Sophia Yakoubov
2022/534 ( PDF )
On the Adaptive Security of the Threshold BLS Signature Scheme
Renas Bacho and Julian Loss
2022/533 ( PDF )
Băhēm: A Symmetric Cipher with Provable 128-bit Security
M. Rajululkahf
2022/532 ( PDF )
Hierarchical Galois Key Management Systems for Privacy Preserving AIaaS with Homomorphic Encryption
Joon-Woo Lee and Eunsang Lee and Young-Sik Kim and Jong-Seon No
2022/531 ( PDF )
Jammin' on the deck
Norica Băcuieți and Joan Daemen and Seth Hoffert and Gilles Van Assche and Ronny Van Keer
2022/530 ( PDF )
High-speed SABER Key Encapsulation Mechanism in 65nm CMOS
Malik Imran and Felipe Almeida and Andrea Basso and Sujoy Sinha Roy and Samuel Pagliarini
2022/529 ( PDF )
Laconic Private Set-Intersection From Pairings
Diego Aranha and Chuanwei Lin and Claudio Orlandi and Mark Simkin
2022/528 ( PDF )
Random sampling of supersingular elliptic curves
Marzio Mula and Nadir Murru and Federico Pintore
2022/527 ( PDF )
PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms
Jungmin Park and N. Nalla Anandakumar and Dipayan Saha and Dhwani Mehta and Nitin Pundir and Fahim Rahman and Farimah Farahmandi and Mark M. Tehranipoor
2022/526 ( PDF )
Optimal Tightness for Chain-Based Unique Signatures
Fuchun Guo and Willy Susilo
2022/525 ( PDF )
Decoding McEliece with a Hint - Secret Goppa Key Parts Reveal Everything
Elena Kirshanova and Alexander May
2022/524 ( PDF )
Inner Product Functional Commitments with Constant-Size Public Parameters and Openings
Hien Chu and Dario Fiore and Dimitris Kolonelos and Dominique Schröder
2022/523 ( PDF )
A side-channel based disassembler for the ARM-Cortex M0
Jurian van Geest and Ileana Buhan
2022/522 ( PDF )
The Case of Small Prime Numbers Versus the Joye-Libert Cryptosystem
George Teseleanu
2022/521 ( PDF )
On The Distributed Discrete Logarithm Problem with Preprocessing
Pavel Hubáček and Ľubica Jančová and Veronika Králová
2022/520 ( PDF )
Efficient Verification of the Wesolowski Verifiable Delay Function for Distributed Environments
Vidal Attias and Luigi Vigneri and Vassil Dimitrov
2022/519 ( PDF )
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest
Md Rasid Ali and Debranjan Pal and Abhijit Das and Dipanwita Roychowdhury
2022/518 ( PDF )
Failing to hash into supersingular isogeny graphs
Jeremy Booher and Ross Bowden and Javad Doliskani and Tako Boris Fouotsa and Steven D. Galbraith and Sabrina Kunzweiler and Simon-Philipp Merz and Christophe Petit and Benjamin Smith and Katherine E. Stange and Yan Bo Ti and Christelle Vincent and José Felipe Voloch and Charlotte Weitkämper and Lukas Zobernig
2022/517 ( PDF )
Local permutation polynomials and the action of e-Klenian groups
Jaime Gutierrez and Jorge Jimenez Urroz
2022/516 ( PDF )
zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge
Dimitris Mouris and Charles Gouert and Nektarios Georgios Tsoutsos
2022/515 ( PDF )
MOSFHET: Optimized Software for FHE over the Torus
Antonio Guimarães and Edson Borin and Diego F. Aranha
2022/514 ( PDF )
A Key-Recovery Side-Channel Attack on Classic McEliece
Qian Guo and Andreas Johansson and Thomas Johansson
2022/513 ( PDF )
CASCADA: Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks
Adrián Ranea and Vincent Rijmen
2022/512 ( PDF )
A Bit-Vector Differential Model for the Modular Addition by a Constant and its Applications to Differential and Impossible-Differential Cryptanalysis
Seyyed Arash Azimi and Adrián Ranea and Mahmoud Salmasizadeh and Javad Mohajeri and Mohammad Reza Aref and Vincent Rijmen
2022/511 ( PDF )
OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels
Mo Zhang and Eduard Marin and David Oswald and Vassilis Kostakos and Mark Ryan and Benjamin Tag and Kleomenis Katevas
2022/510 ( PDF )
Bulletproofs++
Liam Eagen
2022/509 ( PDF )
Lattice-Based Signature with Efficient Protocols, Revisited
Corentin Jeudy and Adeline Roux-Langlois and Olivier Sanders
2022/508 ( PDF )
Security of Truncated Permutation Without Initial Value
Lorenzo Grassi and Bart Mennink
2022/507 ( PDF )
Low-Latency Hardware Private Circuits
David Knichel and Amir Moradi
2022/506 ( PDF )
Design and analysis of a distributed ECDSA signing service
Jens Groth and Victor Shoup
2022/505 ( PDF )
Riding the Waves Towards Generic Single-Cycle Masking in Hardware
Rishub Nagpal and Barbara Gigerl and Robert Primas and Stefan Mangard
2022/504 ( PDF )
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions
Ziaur Rahman and Xun Yi and Sk. Tanzir Mehedi and Rafiqul Islam and Andrei Kelarev
2022/503 ( PDF )
Towards a Formal Treatment of Logic Locking
Peter Beerel and Marios Georgiou and Ben Hamlin and Alex J. Malozemoff and Pierluigi Nuzzo
2022/502 ( PDF )
Fast Diffusion Block for Secret Key Cryptography
Vlastimil Klima
2022/501 ( PDF )
Another Concrete Quantum Cryptanalysis of Binary Elliptic Curves
Dedy Septono Catur Putranto and Rini Wisnu Wardhani and Harashta Tatimma Larasati and Howon Kim
2022/500 ( PDF )
Multi-Server PIR with Full Error Detection and Limited Error Correction
Reo Eriguchi and Kaoru Kurosawa and Koji Nuida
2022/499 ( PDF )
Practical Decentralized Oracle Contracts for Cryptocurrencies
Varun Madathil and Sri AravindaKrishnan Thyagarajan and Dimitrios Vasilopoulos and Lloyd Fournier and Giulio Malavolta and Pedro Moreno-Sanchez
2022/498 ( PDF )
Limitations of Information-theoretic Incompressible Encodings
Petr Sedláček
2022/497 ( PDF )
Protecting Distributed Primitives against Leakage: Equivocal Secret Sharing and More
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss
2022/496 ( PDF )
Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium
Naina Gupta and Arpan Jati and Anupam Chattopadhyay and Gautam Jha
2022/495 ( PDF )
Maliciously Circuit-Private FHE from Information-Theoretic Principles
Nico Döttling and Jesko Dujmovic
2022/494 ( PDF )
Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM
Emre Karabulut and Erdem Alkim and Aydin Aysu
2022/493 ( PDF )
Don’t Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking
Loïc Masure and Valence Cristiani and Maxime Lecomte and François-Xavier Standaert
2022/492 ( PDF )
Towards Smart Contract-based Verification of Anonymous Credentials
Robert Muth and Tarek Galal and Jonathan Heiss and Florian Tschorsch
2022/491 ( PDF )
Multi-Party Computation in the GDPR
Lukas Helminger and Christian Rechberger
2022/490 ( PDF )
Information Bounds and Convergence Rates for Side-Channel Security Evaluators
Loïc Masure and Gaëtan Cassiers and Julien Hendrickx and François-Xavier Standaert
2022/489 ( PDF )
A Practical-Quantum Differential Attack on Block Ciphers
Tarun Yadav and Manoj Kumar and Amit Kumar and S K Pal
2022/488 ( PDF )
OrgAn: Organizational Anonymity with Low Latency
Debajyoti Das and Easwar Vivek Mangipudi and Aniket Kate
2022/487 ( PDF )
New Key Recovery Attack on Reduced-Round AES
Navid Ghaedi Bardeh and Vincent Rijmen
2022/486 ( PDF )
MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing
Olivier Blazy and Pierre-Alain Fouque and Thibaut Jacques and Pascal Lafourcade and Cristina Onete and Léo Robert
2022/485 ( PDF )
Two new classes of permutation trinomials over $\mathbb{F}_{q^3}$ with odd characteristic
Xi Xie and Nian Li and Linjie Xu and Xiangyong Zeng and Xiaohu Tang
2022/484 ( PDF )
VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering
Jan Richter-Brockmann and Jakob Feldtkeller and Pascal Sasdrich and Tim Güneysu
2022/483 ( PDF )
Drive (Quantum) Safe! – Towards Post-Quantum Security for V2V Communications
Nina Bindel and Sarah McCarthy and Geoff Twardokus and Hanif Rahbari
2022/482 ( PDF )
cuFE: High Performance Privacy Preserving Support Vector Machine with Inner-Product Functional Encryption
KyungHyun Han and Wai-Kong Lee2 and Angshuman Karmakar and Jose Maria Bermudo Mera and Seong Oun Hwang
2022/481 ( PDF )
India’s “Aadhaar” Biometric ID: Structure, Security, and Vulnerabilities
Pratyush Ranjan Tiwari and Dhruv Agarwal and Prakhar Jain and Swagam Dasgupta and Preetha Datta and Vineet Reddy and Debayan Gupta
2022/480 ( PDF )
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Ahmet Can Mert and Aikata and Sunmin Kwon and Youngsam Shin and Donghoon Yoo and Yongwoo Lee and Sujoy Sinha Roy
2022/479 ( PDF )
Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption
Kaisei Kajita and Go Ohtake and Kazuto Ogawa and Koji Nuida and Tsuyoshi Takagi
2022/478 ( PDF )
Property-Preserving Hash Functions and Combinatorial Group Testing
Kazuhiko Minematsu
2022/477 ( PDF )
Algorithm-Substitution Attacks on Cryptographic Puzzles
Pratyush Ranjan Tiwari and Matthew Green
2022/476 ( PDF )
{\sf TrCBC} is Insecure
Debrup Chakraborty and Samir Kundu
2022/475 ( PDF )
SIDH-sign: an efficient SIDH PoK-based signature
Jesús-Javier Chi-Domínguez and Víctor Mateu and Lucas Pandolfo Perin
2022/474 ( PDF )
Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication
Catinca Mujdei and Arthur Beckers and Jose Bermundo and Angshuman Karmakar and Lennert Wouters and Ingrid Verbauwhede
2022/473 ( PDF )
Understanding binary-Goppa decoding
Daniel J. Bernstein
2022/472 ( PDF )
On the Hardness of Module Learning With Errors with Short Distributions
Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen
2022/471 ( PDF )
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis - A Report on the CHES Challenge Side-Channel Contest 2020
Aron Gohr and Friederike Laus and Werner Schindler
2022/470 ( PDF )
Designated-Verifier Linkable Ring Signatures
Pourandokht Behrouz and Panagiotis Grontas and Vangelis Konstantakatos and Aris Pagourtzis and Marianna Spyrakou
2022/469 ( PDF )
Efficient ASIC Architectures for Low Latency Niederreiter Decryption
Daniel Fallnich and Shutao Zhang and Tobias Gemmeke
2022/468 ( PDF )
Improved Pump and Jump BKZ by Sharp Simulator
Leizhang Wang and Wenwen Xia and Geng Wang and Baocang Wang and Dawu Gu
2022/467 ( PDF )
Armistice: Micro-Architectural Leakage Modelling for Masked Software Formal Verification
Arnaud de Grandmaison and Karine Heydemann and Quentin L. Meunier
2022/466 ( PDF )
Quantum binary quadratic form reduction
Nicolas David and Thomas Espitau and Akinori Hosoyamada
2022/465 ( -- withdrawn -- )
Băhēm: A Provably Secure Symmetric Cipher
M. Rajululkahf
2022/464 ( PDF )
Superposition Attacks on Pseudorandom Schemes based on Two or Less Permutations
Shaoxuan Zhang and Chun Guo and Qingju Wang
2022/463 ( PDF )
Reducing the Depth of Quantum FLT-Based Inversion Circuit
Harashta Tatimma Larasati and Dedy Septono Catur Putranto and Rini Wisnu Wardhani and Howon Kim
2022/462 ( PDF )
New optimization techniques for PlonK’s arithmetization
Miguel Ambrona and Anne-Laure Schmitt and Raphael R. Toledo and Danny Willems
2022/461 ( PDF )
Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks
Wei Cheng and Sylvain Guilley and Jean-Luc Danger
2022/460 ( PDF )
A Novel NIZK-based Privacy Preserving Biometric Identification Scheme for Internet of Things
Lin You and Qiang Zhu and Gengran Hu
2022/459 ( PDF )
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers
Nasour Bagheri and Sadegh Sadeghi and Prasanna Ravi and Shivam Bhasin and Hadi Soleimany
2022/458 ( PDF )
Schwartz-Zippel for multilinear polynomials mod N
Benedikt Bünz and Ben Fisch
2022/457 ( PDF )
Improving Differential-Neural Distinguisher Model For DES, Chaskey and PRESENT
Liu Zhang and Zilong Wang
2022/456 ( PDF )
Robust, Revocable and Adaptively Secure Attribute-Based Encryption with Outsourced Decryption
Anis Bkakria
2022/455 ( PDF )
Proof of Availability & Retrieval in a Modular Blockchain Architecture
Shir Cohen and Guy Goren and Lefteris Kokoris-Kogias and Alberto Sonnino and Alexander Spiegelman
2022/454 ( PDF )
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC
Thomas Attema and Vincent Dunning and Maarten Everts and Peter Langenkamp
2022/453 ( -- withdrawn -- )
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach
Sk. Tanzir Mehedi and Adnan Anwar and Ziaur Rahman and Kawsar Ahmed and Rafiqul Islam
2022/452 ( PDF )
UTT: Decentralized Ecash with Accountable Privacy
Alin Tomescu and Adithya Bhat and Benny Applebaum and Ittai Abraham and Guy Gueta and Benny Pinkas and Avishay Yanai
2022/451 ( PDF )
Improved Stock Market Structure Using Cryptography
Charanjit S. Jutla and Barry Mishra
2022/450 ( PDF )
Astrape: Anonymous Payment Channels with Boring Cryptography
Yuhao Dong and Ian Goldberg and Sergey Gorbunov and Raouf Boutaba
2022/449 ( PDF )
On End-to-End Encryption
Britta Hale and Chelsea Komlo
2022/448 ( PDF )
Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021
Sven Bauer and Hermann Drexler and Maximilian Gebhardt and Dominik Klein and Friederike Laus and Johannes Mittmann
2022/447 ( PDF )
Leveled Multikey FHE with constant-size ciphertexts from RLWE
Vanesa Daza and Paz Morillo and Sergi Rovira
2022/446 ( PDF )
Fast Side-Channel Key-Recovery Attack against Elephant Dumbo
Louis Vialar
2022/445 ( PDF )
TWAP Oracle Attacks: Easier Done than Said?
Torgin Mackinga and Tejaswi Nadahalli and Roger Wattenhofer
2022/444 ( PDF )
A White-Box Speck Implementation using Self-Equivalence Encodings (Full Version)
Joachim Vandersmissen and Adrián Ranea and Bart Preneel
2022/443 ( PDF )
Attack on SHealS and HealS: the Second Wave of GPST
Steven D. Galbraith and Yi-Fu Lai
2022/442 ( PDF )
Quantum Attacks on PRFs Based on Public Random Permutations
Tingting Guo and Peng Wang and Lei Hu and Dingfeng Ye
2022/441 ( PDF )
Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection
Paola de Perthuis and David Pointcheval
2022/440 ( PDF )
A Security Model for Randomization-based Protected Caches
Jordi Ribes-González and Oriol Farràs and Carles Hernández and Vatistas Kostalabros and Miquel Moretó
2022/439 ( PDF )
Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms
Hanno Becker and Vincent Hwang and Matthias J. Kannwischer and Lorenz Panny and Bo-Yin Yang
2022/438 ( PDF )
Computing isogenies between finite Drinfeld modules
Benjamin Wesolowski
2022/437 ( PDF )
Continuous LWE is as Hard as LWE & Applications to Learning Gaussian Mixtures
Aparna Gupte and Neekon Vafa and Vinod Vaikuntanathan
2022/436 ( PDF )
Publicly Accountable Robust Multi-Party Computation
Marc Rivinius and Pascal Reisert and Daniel Rausch and Ralf Küsters
2022/435 ( PDF )
Fiat-Shamir for Proofs Lacks a Proof Even in the Presence of Shared Entanglement
Frédéric Dupuis and Philippe Lamontagne and Louis Salvail
2022/434 ( PDF )
Verifiable Quantum Advantage without Structure
Takashi Yamakawa and Mark Zhandry
2022/433 ( PDF )
McFly: Verifiable Encryption to the Future Made Practical
Nico Döttling and Lucjan Hanzlik and Bernardo Magri and Stella Wohnig
2022/432 ( PDF )
Classical Verification of Quantum Computations in Linear Time
Jiayu Zhang
2022/431 ( PDF )
Non-Adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions
Xinyu Mao and Noam Mazor and Jiapeng Zhang
2022/430 ( PDF )
Is the JCJ voting system really coercion-resistant?
Véronique Cortier and Pierrick Gaudry and Quentin Yang
2022/429 ( PDF )
Resurrecting Xifrat - Compact Cryptosystems 2nd Attempt
Jianfang "Danny" Niu
2022/428 ( PDF )
Implicit White-Box Implementations: White-Boxing ARX Ciphers
Adrián Ranea and Joachim Vandersmissen and Bart Preneel
2022/427 ( PDF )
Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications
Katarzyna Kapusta and Matthieu Rambaud and Ferdinand Sibleyras
2022/426 ( PDF )
Spectre Declassified: Reading from the Right Place at the Wrong Time
Basavesh Ammanaghatta Shivakumar and Jack Barnes and Gilles Barthe and Sunjay Cauligi and Chitchanok Chuengsatiansup and Daniel Genkin and Sioli O'Connell and Peter Schwabe and Rui Qi Sim and Yuval Yarom
2022/425 ( PDF )
New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks
Charles Gouert and Dimitris Mouris and Nektarios Georgios Tsoutsos
2022/424 ( PDF )
Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2
Dor Amzaleg and Itai Dinur
2022/423 ( PDF )
Polynomial Approximation of Inverse sqrt Function for FHE
Samanvaya Panda
2022/422 ( PDF )
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions
Diego F. Aranha and Carsten Baum and Kristian Gjøsteen and Tjerand Silde
2022/421 ( PDF )
Multiverse of HawkNess: A Universally-Composable MPC-based Hawk Variant
Aritra Banerjee and Hitesh Tewari
2022/420 ( PDF )
Gemini: Elastic SNARKs for Diverse Environments
Jonathan Bootle and Alessandro Chiesa and Yuncong Hu and Michele Orrù
2022/419 ( PDF )
Dew: Transparent Constant-sized zkSNARKs
Arasu Arun and Chaya Ganesh and Satya Lokam and Tushar Mopuri and Sriram Sridhar
2022/418 ( PDF )
LLTI: Low-Latency Threshold Implementations
Victor Arribas and Zhenda Zhang and Svetla Nikova
2022/417 ( PDF )
Efficient, Actively Secure MPC with a Dishonest Majority: a Survey
Emmanuela Orsini
2022/416 ( PDF )
Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives
Maxime Buser and Joseph K. Liu and Ron Steinfeld and Amin Sakzad
2022/415 ( PDF )
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security
Saikrishna Badrinarayanan and Daniel Masny and Pratyay Mukherjee
2022/414 ( PDF )
PQ-HPKE: Post-Quantum Hybrid Public Key Encryption
Mila Anastasova and Panos Kampanakis and Jake Massimo
2022/413 ( PDF )
Instachain: Breaking the Sharding Limits via Adjustable Quorums
Mustafa Safa Ozdayi and Yue Guo and Mahdi Zamani
2022/412 ( PDF )
Complete and Improved FPGA Implementation of Classic McEliece
Po-Jen Chen and Tung Chou and Sanjay Deshpande and Norman Lahr and Ruben Niederhagen and Jakub Szefer and Wen Wang
2022/411 ( PDF )
Quotient Approximation Modular Reduction
Aurélien Greuet and Simon Montoya and Clémence Vermeersch
2022/410 ( PDF )
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home
Ziaur Rahman and Xun Yi and Mustain Billah and Mousumi Sumi and Adnan Anwar
2022/409 ( PDF )
Proof-of-Stake Is a Defective Mechanism
Vicent Sus
2022/408 ( PDF )
On the weightwise nonlinearity of weightwise perfectly balanced functions
Agnese Gini and Pierrick Méaux
2022/407 ( PDF )
Improving the Privacy of Tor Onion Services
Edward Eaton and Sajin Sasy and Ian Goldberg
2022/406 ( PDF )
Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK
Helger Lipmaa and Janno Siim and Michal Zajac
2022/405 ( PDF )
Benchmarking and Analysing the NIST PQC Finalist Lattice-Based Signature Schemes on the ARM Cortex M7
James Howe and Bas Westerbaan
2022/404 ( PDF )
Constant Latency in Sleepy Consensus
Atsuki Momose and Ling Ren
2022/403 ( PDF )
A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Lorenzo Grassi and Yonglin Hao and Christian Rechberger and Markus Schofnegger and Roman Walch and Qingju Wang
2022/402 ( PDF )
Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
Jinyu Lu and Yunwen Liu and Tomer Ashur and Bing Sun and Chao Li
2022/401 ( PDF )
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
Cas Cremers and Caroline Fontaine and Charlie Jacomme
2022/400 ( PDF )
Quantum Advantage from Any Non-Local Game
Yael Tauman Kalai and Alex Lombardi and Vinod Vaikuntanathan and Lisa Yang
2022/399 ( PDF )
The Inverse of $\chi$ and Its Applications to Rasta-like Ciphers
Fukang Liu and Santanu Sarkar and Willi Meier and Takanori Isobe
2022/398 ( PDF )
Auditable, Available and Resilient Private Computation on the Blockchain via MPC
Christopher Cordi and Michael P. Frank and Kasimir Gabert and Carollan Helinski and Ryan C. Kao and Vladimir Kolesnikov and Abrahim Ladha and Nicholas Pattengale
2022/397 ( PDF )
Revocable Hierarchical Attribute-based Signatures from Lattices
Daniel Gardham and Mark Manulis
2022/396 ( PDF )
Side-channel attacks based on power trace decomposition
Fanliang Hu and Huanyu Wang and Junnian Wang
2022/395 ( PDF )
A lightweight verifiable secret sharing scheme in IoTs
Likang Lu and Jianzhu Lu
2022/394 ( PDF )
Fuzz, Penetration, and AI Testing for SoC Security Verification: Challenges and Solutions
Kimia Zamiri Azar and Muhammad Monir Hossain and Arash Vafaei and Hasan Al Shaikh and Nurun N. Mondol and Fahim Rahman and Mark Tehranipoor and Farimah Farahmandi
2022/393 ( PDF )
Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation
Yashvanth Kondi and abhi shelat
2022/392 ( PDF )
Poly Onions: Achieving Anonymity in the Presence of Churn
Megumi Ando and Miranda Christ and Anna Lysyanskaya and Tal Malkin
2022/391 ( PDF )
An Improved Model on the Vague Sets-Based DPoS’s Voting Phase in Blockchain
Lin You and Zhuobiao Wang and Gengran Hu and Chengtang Cao
2022/390 ( PDF )
An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain
Lin You and Xinhua Zhang and Gengran Hu and Longbo Han
2022/389 ( PDF )
Higher-order masked Saber
Suparna Kundu and Jan-Pieter D’Anvers and Michiel Van Beirendonck and Angshuman Karmakar and Ingrid Verbauwhede
2022/388 ( PDF )
Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing
Zhonghui Ge and Yi Zhang and Yu Long and Dawu Gu
2022/387 ( PDF )
Phase-shift Fault Analysis of Grain-128
Hridya P R and Jimmy Jose
2022/386 ( PDF )
Secure Two-party Computation Approach for NTRUEncrypt
Lin You and Yan Wang and Liang Li and Gengran Hu
2022/385 ( PDF )
ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest
Guillaume Barbu and Ward Beullens and Emmanuelle Dottax and Christophe Giraud and Agathe Houzelot and Chaoyun Li and Mohammad Mahzoun and Adrián Ranea and Jianrui Xie
2022/384 ( PDF )
Light Clients for Lazy Blockchains
Ertem Nusret Tas and Dionysis Zindros and Lei Yang and David Tse
2022/383 ( PDF )
On Succinct Non-Interactive Arguments in Relativized Worlds
Megan Chen and Alessandro Chiesa and Nicholas Spooner
2022/382 ( PDF )
Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups
Matteo Campanelli and Rosario Gennaro and Kelsey Melissaris and Luca Nizzardo
2022/381 ( PDF )
On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
Hirotomo Shinoki and Koji Nuida
2022/380 ( PDF )
A Linear-Time 2-Party Secure Merge Protocol
Brett Hemenway Falk and Rohit Nema and Rafail Ostrovsky
2022/379 ( PDF )
Fully Secure PSI via MPC-in-the-Head
S. Dov Gordon and Carmit Hazay and Phi Hung Le
2022/378 ( PDF )
Share & Shrink: Ad-Hoc Threshold FHE with Short Ciphertexts and its Application to Almost-Asynchronous MPC
Antoine Urban and Matthieu Rambaud
2022/377 ( PDF )
(Commit-and-Prove) Predictable Arguments with Privacy
Hamidreza Khoshakhlagh
2022/376 ( PDF )
Universally Composable End-to-End Secure Messaging
Ran Canetti and Palak Jain and Marika Swanberg and Mayank Varia
2022/375 ( PDF )
A Note on the Security Framework of Two-key DbHtS MACs
Tingting Guo and Peng Wang
2022/374 ( PDF )
Simple Three-Round Multiparty Schnorr Signing with Full Simulatability
Yehuda Lindell
2022/373 ( PDF )
Blind accumulators for e-voting
Sergey Agievich
2022/372 ( PDF )
Shorter quantum circuits
Vadym Kliuchnikov and Kristin Lauter and Romy Minko and Christophe Petit and Adam Paetznick
2022/371 ( PDF )
A High-performance ECC Processor over Curve448 based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier
Asep Muhamad Awaludin and Jonguk Park and Rini Wisnu Wardhani and Howon Kim
2022/370 ( PDF )
Efficient NIZKs from LWE via Polynomial Reconstruction and ``MPC in the Head"
Riddhi Ghosal and Paul Lou and Amit Sahai
2022/369 ( PDF )
Matching Attacks on Romulus-M
Makoto Habu and and Kazuhiko Minematsu and Tetsu Iwata
2022/368 ( PDF )
Spiral: Fast, High-Rate Single-Server PIR via FHE Composition
Samir Jordan Menon and David J. Wu
2022/367 ( PDF )
Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings and Supersingular Isogeny-Based Protocols
Patrick Longa
2022/366 ( PDF )
On the Algebraic Degree of Iterated Power Functions
Clémence Bouvier and Anne Canteaut and Léo Perrin
2022/365 ( PDF )
Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform
Kathrin Hövelmanns and Andreas Hülsing and Christian Majenz
2022/364 ( PDF )
Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE
Aymeric Genêt and Novak Kaluđerović
2022/363 ( PDF )
An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security
Damiano Abram and Ivan Damgård and Claudio Orlandi and Peter Scholl
2022/362 ( PDF )
How to Backdoor (Classical) McEliece and How to Guard Against Backdoors
Alexander May and Carl Richard Theodor Schneider
2022/361 ( PDF )
Base64 Malleability in Practice
Panagiotis Chatzigiannis and Konstantinos Chalkias
2022/360 ( PDF )
Privacy-Preserving Contrastive Explanations with Local Foil Trees
Thijs Veugen and Bart Kamphorst and Michiel Marcus
2022/359 ( PDF )
How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks
Aljosha Judmayer and Nicholas Stifter and Philipp Schindler and Edgar Weippel
2022/358 ( PDF )
Optimal Private Set Union from Multi-Query Reverse Private Membership Test
Cong Zhang and Yu Chen and Weiran Liu and Min Zhang and Dongdai Lin
2022/357 ( PDF )
An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves
Antonin Leroux
2022/356 ( PDF )
A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles
MUSTAIN BILLAH and SK. TANZIR MEHEDI and ADNAN ANWAR and ZIAUR RAHMAN and RAFIQUL ISLAM
2022/355 ( PDF )
A More Complete Analysis of the Signal Double Ratchet Algorithm
Alexander Bienstock and Jaiden Fairoze and Sanjam Garg and Pratyay Mukherjee and Srinivasan Raghuraman
2022/354 ( PDF )
Optimal Synchronous Approximate Agreement with Asynchronous Fallback
Diana Ghinea and Chen-Da Liu-Zhang and Roger Wattenhofer
2022/353 ( PDF )
SNARGs for P from Sub-exponential DDH and QR
James Hulett and Ruta Jawale and Dakshita Khurana and Akshayaram Srinivasan
2022/352 ( PDF )
Co-factor clearing and subgroup membership testing on pairing-friendly curves
Youssef El Housni and Aurore Guillevic and Thomas Piellard
2022/351 ( PDF )
Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt
Andreas Hülsing and Matthias Meijers and Pierre-Yves Strub
2022/350 ( PDF )
DO NOT RUG ON ME: ZERO-DIMENSIONAL SCAM DETECTION
Bruno Mazorra and Victor Adan and Vanesa Daza
2022/349 ( PDF )
Hard Homogeneous Spaces from the Class Field Theory of Imaginary Hyperelliptic Function Fields
Antoine Leudière and Pierre-Jean Spaenlehauer
2022/348 ( PDF )
Fast Subgroup Membership Testings for $\G_1$, $\G_2$ and $\G_T$ on Pairing-friendly Curves
Yu Dai and Kaizhan Lin and Zijian Zhou and Chang-An Zhao
2022/347 ( PDF )
Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition
Taechan Kim and Hyesun Kwak and Dongwon Lee and Jinyeong Seo and Yongsoo Song
2022/346 ( PDF )
Recovering the tight security proof of $SPHINCS^{+}$
Andreas Hülsing and Mikhail Kudinov
2022/345 ( PDF )
On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
Wouter Castryck and Marc Houben and Frederik Vercauteren and Benjamin Wesolowski
2022/344 ( PDF )
Shorter Signatures from MQ
William Wang
2022/343 ( PDF )
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation
Yuval Ishai and Alexis Korb and Paul Lou and Amit Sahai
2022/342 ( PDF )
From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications
Lorenzo Grassi and Morten Øygarden and Markus Schofnegger and Roman Walch
2022/341 ( PDF )
Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher
Nicoleta-Norica Băcuieți and Lejla Batina and Stjepan Picek
2022/340 ( PDF )
To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA
Azade Rezaeezade and Guilherme Perin and Stjepan Picek
2022/339 ( PDF )
New Digital Signature Algorithm EHT
Igor Semaev
2022/338 ( PDF )
Private Intersection-Weighted-Sum
Koji Chida and Koki Hamada and Atsunori Ichikawa and Masanobu Kii and Junichi Tomida
2022/337 ( PDF )
Improving Software Quality in Cryptography Standardization Projects
Matthias J. Kannwischer and Peter Schwabe and Douglas Stebila and Thom Wiggers
2022/336 ( PDF )
Batch Arguments for NP and More from Standard Bilinear Group Assumptions
Brent Waters and David J. Wu
2022/335 ( PDF )
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System
Tuan-Hong Chua and Iftekhar Salam
2022/334 ( PDF )
Private Set Intersection from Pseudorandom Correlation Generators
Dung Bui and Geoffroy Couteau
2022/333 ( PDF )
We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption
Dandan Yuan and Shujie Cui and Giovanni Russello
2022/332 ( PDF )
CostCO: An automatic cost modeling framework for secure multi-party computation
Vivian Fang and Lloyd Brown and William Lin and Wenting Zheng and Aurojit Panda and Raluca Ada Popa
2022/331 ( PDF )
Parallelizable Authenticated Encryption with Small State Size
Akiko Inoue and Kazuhiko Minematsu
2022/330 ( PDF )
A Simple and Generic Approach to Dynamic Collusion Model
Rachit Garg and Rishab Goyal and George Lu
2022/329 ( PDF )
Rolling up lattice cryptography primes
Daniel R. L. Brown
2022/328 ( PDF )
On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks
Lennert Wouters and Benedikt Gierlichs and Bart Preneel
2022/327 ( PDF )
Provable Secure Software Masking in the Real-World
Arthur Beckers and Lennert Wouters and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede
2022/326 ( PDF )
Composable Dynamic Secure Emulation
Pierre Civit and Maria Potop-Butucaru
2022/325 ( PDF )
FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level
Michail Moraitis and Elena Dubrova
2022/324 ( PDF )
Backward-Leak Uni-Directional Updatable Encryption from Public Key Encryption
Yao Jiang Galteland and Jiaxin Pan
2022/323 ( PDF )
Dilithium for Memory Constrained Devices
Joppe W. Bos and Joost Renes and Daan Sprenkels
2022/322 ( PDF )
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation
Deevashwer Rathee and Anwesh Bhattacharya and Rahul Sharma and Divya Gupta and Nishanth Chandran and Aseem Rastogi
2022/321 ( PDF )
zkKYC in DeFi: An approach for implementing the zkKYC solution concept in Decentralized Finance
Pieter Pauwels and Joni Pirovich and Peter Braunz and Jack Deeb
2022/320 ( PDF )
Blazing Fast PSI from Improved OKVS and Subfield VOLE
Peter Rindal and Srinivasan Raghuraman
2022/319 ( PDF )
A Blockchain-based Long-term Time-Stamping Scheme
Long Meng and Liqun Chen
2022/318 ( PDF )
Efficient Online-friendly Two-Party ECDSA Signature
Haiyang Xue and Man Ho Au and Xiang Xie and Tsz Hon Yuen and Handong Cui
2022/317 ( PDF )
Thora: Atomic And Privacy-Preserving Multi-Channel Updates
Lukas Aumayr and Kasra Abbaszadeh and Matteo Maffei
2022/316 ( PDF )
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions
Shweta Agrawal and Fuyuki Kitagawa and Anuja Modi and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2022/315 ( PDF )
Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN
Damiano Abram and Peter Scholl
2022/314 ( PDF )
Batch-OT with Optimal Rate
Zvika Brakerski and Pedro Branco and Nico Döttling and Sihang Pu
2022/313 ( PDF )
Efficient Proof of RAM Programs from Any Public-Coin Zero-Knowledge System
Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Titouan Tanguy and Michiel Verbauwhede
2022/312 ( PDF )
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols
Shahar P. Cohen and Moni Naor
2022/311 ( PDF )
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE
Peihan Miao and Sikhar Patranabis and Gaven Watson
2022/310 ( PDF )
Dispute-free Scalable Open Vote Network using zk-SNARKs
Muhammad ElSheikh and Amr M. Youssef
2022/309 ( PDF )
On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing
Ashrujit Ghoshal and Ilan Komargodski
2022/308 ( PDF )
Colordag: An Incentive-Compatible Blockchain
Ittai Abraham and Danny Dolev and Ittay Eyal and Joseph Y. Halpern
2022/307 ( PDF )
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
Olivier Blazy and Sayantan Mukherjee and Huyen Nguyen and Duong Hieu Phan and Damien Stehle
2022/306 ( PDF )
The More You Know: Improving Laser Fault Injection with Prior Knowledge
Marina Krček and Thomas Ordas and Daniele Fronte and Stjepan Picek
2022/305 ( PDF )
Surveying definitions of election verifiability
Ben Smyth and Michael R. Clarkson
2022/304 ( PDF )
Multi-User BBB Security of Public Permutations Based MAC
Yu Long Chen and Avijit Dutta and Mridul Nandi
2022/303 ( PDF )
Unlinkable Delegation of WebAuthn Credentials
Nick Frymann and Daniel Gardham and Mark Manulis
2022/302 ( PDF )
SoK: Oblivious Pseudorandom Functions
Sílvia Casacuberta and Julia Hesse and Anja Lehmann
2022/301 ( PDF )
How Practical are Fault Injection Attacks, Really?
Jakub Breier and Xiaolu Hou
2022/300 ( PDF )
Faster NTRU on ARM Cortex-M4 with TMVP-based multiplication
Irem Keskinkurt Paksoy and Murat Cenk
2022/299 ( PDF )
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3
Yanhong Fan,Muzhou Li,Chao Niu,Zhenyu Lu,Meiqin Wang
2022/298 ( PDF )
Constructive Post-Quantum Reductions
Nir Bitansky and Zvika Brakerski and Yael Tauman Kalai
2022/297 ( PDF )
Promise $\Sigma$-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups
Yi Deng and Shunli Ma and Xinxuan Zhang and Hailong Wang and Xuyang Song and Xiang Xie
2022/296 ( PDF )
On new results on Extremal Graph Theory, Theory of Algebraic Graphs and their applications in Cryptography and Coding Theory.
Vasyl Ustimenko
2022/295 ( PDF )
Quantum Proofs of Deletion for Learning with Errors
Alexander Poremba
2022/294 ( PDF )
A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets
Saikrishna Badrinarayanan and Ranjit Kumaresan and Mihai Christodorescu and Vinjith Nagaraja and Karan Patel and Srinivasan Raghuraman and Peter Rindal and Wei Sun and Minghua Xu
2022/293 ( PDF )
Minimizing Setup in Broadcast-Optimal Two Round MPC
Ivan Damgård and Divya Ravi and Luisa Siniscalchi and Sophia Yakoubov
2022/292 ( PDF )
Comment on ``SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices''
Michael Amar and Amit Kama and Kang Wang and Yossi Oren
2022/291 ( PDF )
Provable security of CFB mode of operation with external re-keying
Vadim Tsypyschev and Iliya Morgasov
2022/290 ( PDF )
Universally Composable Sigma-protocols in the Global Random-Oracle Model
Anna Lysyanskaya and Leah Namisa Rosenbloom
2022/289 ( PDF )
Two Attacks On Proof-of-Stake GHOST/Ethereum
Joachim Neu and Ertem Nusret Tas and David Tse
2022/288 ( PDF )
Spats: user-defined confidential assets for the Spark transaction protocol
Aaron Feickert and Aram Jivanyan
2022/287 ( PDF )
User-Perceived Privacy in Blockchain
Simin Ghesmati and Walid Fdhila and Edgar Weippl
2022/286 ( PDF )
Provably Secure Identity-Based Remote Password Registration
Csanád Bertók and Andrea Huszti and Szabolcs Kovács and Norbert Oláh
2022/285 ( PDF )
Usability of Cryptocurrency Wallets Providing CoinJoin Transactions
Simin Ghesmati and Walid Fdhila and Edgar Weippl
2022/284 ( PDF )
Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General
Vadim Lyubashevsky and Ngoc Khanh Nguyen and Maxime Plancon
2022/283 ( PDF )
Block-Cipher-Based Tree Hashing
Aldo Gunsing
2022/282 ( PDF )
Achievable CCA2 Relaxation for Homomorphic Encryption
Adi Akavia and Craig Gentry and Shai Halevi and Margarita Vald
2022/281 ( PDF )
Succinct Interactive Oracle Proofs: Applications and Limitations
Shafik Nassar and Ron D. Rothblum
2022/280 ( PDF )
Efficient Homomorphic Evaluation on Large Interval
Jung Hee Cheon and Wootae Kim and Jai Hyun Park
2022/279 ( PDF )
Permutation rotation-symmetric Sboxes, liftings and affine equivalence
Tron Omland and Pantelimon Stanica
2022/278 ( PDF )
Incompressiblity and Next-Block Pseudoentropy
Iftach Haitner and Noam Mazor and Jad Silbak
2022/277 ( PDF )
Security Analysis of Elliptic Curves over Sextic Extension of Small Prime Fields
Robin Salen and Vijaykumar Singh and Vladimir Soukharev
2022/276 ( PDF )
Hardness estimates of the Code Equivalence Problem in the Rank Metric
Krijn Reijnders and Simona Samardjiska and Monika Trimoska
2022/275 ( PDF )
Concrete Analysis of Approximate Ideal-SIVP to Decision Ring-LWE Reduction
Neal Koblitz and Subhabrata Samajder and Palash Sarkar and Subhadip Singha
2022/274 ( PDF )
EcGFp5: a Specialized Elliptic Curve
Thomas Pornin
2022/273 ( PDF )
Compact Storage for Homomorphic Encryption
Adi Akavia and Neta Oren and Boaz Sapir and Margarita Vald
2022/272 ( PDF )
Quantum-Secure Aggregate One-time Signatures with Detecting Functionality
Shingo Sato and Junji Shikata
2022/271 ( PDF )
Approximate Divisor Multiples -- Factoring with Only a Third of the Secret CRT-Exponents
Alexander May and Julian Nowakowski and Santanu Sarkar
2022/270 ( PDF )
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM
Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner
2022/269 ( PDF )
ON CODES AND LEARNING WITH ERRORS OVER FUNCTION FIELDS
Maxime Bombar and Alain Couvreur and Thomas Debris-Alazard
2022/268 ( PDF )
Efficient Schemes for Committing Authenticated Encryption
Mihir Bellare and Viet Tung Hoang
2022/267 ( PDF )
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms
Gang Tang and Dung Hoang Duong and Antoine Joux and Thomas Plantard and Youming Qiao and Willy Susilo
2022/266 ( PDF )
Verifiably Distributed Multi-User Secret Sharing schemes
Likang Lu and Jianzhu Lu
2022/265 ( PDF )
Non-interactive Mimblewimble transactions, revisited
Georg Fuchsbauer and Michele Orrù
2022/264 ( PDF )
Gradecast in Synchrony and Reliable Broadcast in Asynchrony with Optimal Resilience, Efficiency, and Unconditional Security
Ittai Abraham and Gilad Asharov
2022/263 ( PDF )
Rethinking Modular Multi-Exponentiation in Real-World Applications
Vidal Attias and Luigi Vigneri and Vassil Dimitrov
2022/262 ( PDF )
Secure Non-Interactive Reduction and Spectral Analysis of Correlations
Pratyush Agarwal and Varun Narayanan and Shreya Pathak and Manoj Prabhakaran and Vinod M. Prabhakaran and Mohammad Ali Rehan
2022/261 ( PDF )
Sublinear GMW-Style Compiler for MPC with Preprocessing
Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof
2022/260 ( PDF )
Advances in Logic Locking: Past, Present, and Prospects
Hadi Mardani Kamali and Kimia Zamiri Azar and Farimah Farahmandi and Mark Tehranipoor
2022/259 ( PDF )
Partial Key Exposure Attacks on BIKE, Rainbow and NTRU
Andre Esser and Alexander May and Javier Verbel and Weiqiang Wen
2022/258 ( PDF )
Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications
Hasan Al Shaikh and Mohammad Bin Monjil and Shigang Chen and Farimah Farahmandi and Navid Asadizanjani and Mark Tehranipoor and Fahim Rahman
2022/257 ( PDF )
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols
Ran Cohen and Jack Doerner and Yashvanth Kondi and abhi shelat
2022/256 ( PDF )
Multi-Designated Receiver Signed Public Key Encryption
Ueli Maurer and Christopher Portmann and Guilherme Rito
2022/255 ( PDF )
Round-Optimal Byzantine Agreement
Diana Ghinea and Vipul Goyal and Chen-Da Liu-Zhang
2022/254 ( PDF )
Unprotected and Masked Hardware Implementations of Spook v2
Charles Momin and Gaëtan Cassiers and François-Xavier Standaert
2022/253 ( PDF )
The Side-Channel Metric Cheat Sheet
Kostas Papagiannopoulos and Ognjen Glamocanin and Melissa Azouaoui and Dorian Ros and Francesco Regazzoni and Mirjana Stojilovic
2022/252 ( PDF )
Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations
Charles Momin and Gaëtan Cassiers and François-Xavier Standaert
2022/251 ( PDF )
CoCoA: Concurrent Continuous Group Key Agreement
Joël Alwen and Benedikt Auerbach and Miguel Cueto Noval and Karen Klein and Guillermo Pascual-Perez and Krzysztof Pietrzak and Michael Walter
2022/250 ( PDF )
Private Circuits with Quasilinear Randomness
Vipul Goyal and Yuval Ishai and Yifan Song
2022/249 ( PDF )
The Summation-Truncation Hybrid: Reusing Discarded Bits for Free
Aldo Gunsing and Bart Mennink
2022/248 ( PDF )
Collapseability of Tree Hashes
Aldo Gunsing and Bart Mennink
2022/247 ( PDF )
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
Aldo Gunsing and Joan Daemen and Bart Mennink
2022/246 ( PDF )
On the Concrete Security of TLS 1.3 PSK Mode
Hannah Davis and Denis Diemert and Felix Günther and Tibor Jager
2022/245 ( PDF )
Entropic Hardness of Module-LWE from Module-NTRU
Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen
2022/244 ( PDF )
Universally Composable Subversion-Resilient Cryptography
Suvradip Chakraborty and Bernardo Magri and Jesper Buus Nielsen and Daniele Venturi
2022/243 ( PDF )
A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis
Ling Sun and Bart Preneel and Wei Wang and Meiqin Wang
2022/242 ( PDF )
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model
Ignacio Cascudo and Bernardo David and Lydia Garms and Anders Konring
2022/241 ( PDF )
Coalition and Threshold Hash-Based Signatures
John Kelsey and Stefan Lucks
2022/240 ( PDF )
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients
Hamza Abusalah and Georg Fuchsbauer and Peter Gaži and Karen Klein
2022/239 ( PDF )
Several Improvements on BKZ Algorithm
Ziyu Zhao and Jintai Ding
2022/238 ( PDF )
HEAD: an FHE-based Outsourced Computation Protocol with Compact Storage and Efficient Computation
Lijing Zhou and Ziyu Wang and Xiao Zhang and Yu Yu
2022/237 ( PDF )
Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions
Jesper Buus Nielsen and João Ribeiro and Maciej Obremski
2022/236 ( PDF )
Characterizing the qIND-qCPA (in)security of the CBC, CFB, OFB and CTR modes of operation
Tristan NEMOZ and Zoé AMBLARD and Aurélien DUPIN
2022/235 ( PDF )
Limits of Preprocessing for Single-Server PIR
Giuseppe Persiano and Kevin Yeo
2022/234 ( PDF )
New algorithms for the Deuring correspondence: SQISign twice as fast
Luca De Feo and Antonin Leroux and Benjamin Wesolowski
2022/233 ( PDF )
Variational quantum solutions to the Shortest Vector Problem
Martin R. Albrecht and Miloš Prokop and Yixin Shen and Petros Wallden
2022/232 ( PDF )
Conditional Variational AutoEncoder based on Stochastic Attack
Gabriel Zaid and Lilian Bossuet and Mathieu Carbone and Amaury Habrard and Alexandre Venelli
2022/231 ( PDF )
Towards Low-Latency Implementation of Linear Layers
Qun Liu and Weijia Wang and Yanhong Fan and Lixuan Wu and Ling Sun and Meiqin Wang
2022/230 ( PDF )
Apple vs. EMA: Electromagnetic Side Channel Attacks on Apple CoreCrypto
Gregor Haas and Aydin Aysu
2022/229 ( PDF )
WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography
Markku-Juhani O. Saarinen
2022/228 ( PDF )
Semi-Quantum Tokenized Signatures
Omri Shmueli
2022/227 ( PDF )
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects
Ben Nassi and Ras Swissa and Yuval Elovici and Boris Zadov
2022/226 ( PDF )
To Label, or Not To Label (in Generic Groups)
Mark Zhandry
2022/225 ( PDF )
Constant matters: Fine-grained Complexity of Differentially Private Continual Observation Using Completely Bounded Norms
Monika Henzinger and Jalaj Upadhyay
2022/224 ( PDF )
Embedding the UC Model into the IITM Model
Daniel Rausch and Ralf Kuesters and Céline Chevalier
2022/223 ( PDF )
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection
Thibauld Feneuil and Jules Maire and Matthieu Rivain and Damien Vergnaud
2022/222 ( PDF )
Half-Aggregation of Schnorr Signatures with Tight Reductions
Yanbo Chen and Yunlei Zhao
2022/221 ( PDF )
Secure Joint Communication and Sensing
Onur Gunlu and Matthieu Bloch and Rafael F. Schaefer and Aylin Yener
2022/220 ( PDF )
Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security
Keita Emura and Shiho Moriai and Takuma Nakajima and Masato Yoshimi
2022/219 ( PDF )
PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication
Hanyu Jia and Xiangxue Li
2022/218 ( PDF )
On the Impossibility of Key Agreements from Quantum Random Oracles
Per Austrin and Hao Chung and Kai-Min Chung and Shiuan Fu and Yao-Ting Lin and Mohammad Mahmoody
2022/217 ( PDF )
High-Performance Hardware Implementation of Lattice-Based Digital Signatures
Luke Beckwith and Duc Tri Nguyen and Kris Gaj
2022/216 ( PDF )
Short Leakage Resilient and Non-malleable Secret Sharing Schemes
Nishanth Chandran and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar
2022/215 ( PDF )
Multi-Client Functional Encryption with Fine-Grained Access Control
Ky Nguyen and Duong Hieu Phan and David Pointcheval
2022/214 ( PDF )
Breaking Rainbow Takes a Weekend on a Laptop
Ward Beullens
2022/213 ( PDF )
Issuer-Hiding Attribute-Based Credentials
Jan Bobolz and Fabian Eidens and Stephan Krenn and Sebastian Ramacher and Kai Samelin
2022/212 ( PDF )
Tight Analysis of Decrypton Failure Probability of Kyber in Reality
Boyue Fang and Weize Wang and Yunlei Zhao
2022/211 ( PDF )
Azeroth: Auditable Zero-knowledge Transactions in Smart Contracts
Gweonho Jeong and Nuri Lee and Jihye Kim and Hyunok Oh
2022/210 ( PDF )
An Analysis of the Algebraic Group Model
Jonathan Katz and Cong Zhang and Hong-Sheng Zhou
2022/209 ( PDF )
Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection
ZiXi Hee and Iftekhar Salam
2022/208 ( PDF )
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design
Alon Shakevsky and Eyal Ronen and Avishai Wool
2022/207 ( PDF )
Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference
Zhicong Huang and Wen-jie Lu and Cheng Hong and Jiansheng Ding
2022/206 ( PDF )
Proving UNSAT in Zero Knowledge
Ning Luo and Timos Antonopoulos and William Harris and Ruzica Piskac and Eran Tromer and Xiao Wang
2022/205 ( PDF )
Fiat-Shamir signatures without aborts using Ring-and-Noise assumptions
Dipayan Das and Antoine Joux and Anand Kumar Narayanan
2022/204 ( PDF )
RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library
Furkan Aydin and Emre Karabulut and Seetal Potluri and Erdem Alkim and Aydin Aysu
2022/203 ( PDF )
A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV
Jean-Charles Faugère and Gilles macario-Rat and Jacques Patarin and Ludovic Perret
2022/202 ( PDF )
Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLU's
Abdelrahaman Aly and Kashif Nawaz and Eugenio Salazar and Victor Sucasas
2022/201 ( PDF )
Enig: Player Replaceable Finality Layers with Optimal Validity
Simon Holmgaard Kamp and Jesper Buus Nielsen and Søren Eller Thomsen and Daniel Tschudi
2022/200 ( PDF )
Non-Black-Box Approach to Secure Two-Party Computation in Three Rounds
Akshayaram Srinivasan
2022/199 ( PDF )
Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing
Giang Linh Duc Nguyen and Dung Hoang Duong and Huy Quoc Le and Willy Susilo
2022/198 ( PDF )
Efficient FHEW Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption
Yongwoo Lee and Daniele Micciancio and Andrey Kim and Rakyong Choi and Maxim Deryabin and Jieun Eom and Donghoon Yoo
2022/197 ( PDF )
Nice Attacks --- but What is the Cost? Computational Models for Cryptanalysis
Charles Bouillaguet
2022/196 ( PDF )
Generalising Fault Attacks to Genus Two Isogeny Cryptosystems
Ariana Goh and Chu-Wee Lim and Yan Bo Ti
2022/195 ( PDF )
Quantum and Classical Algorithms for Bounded Distance Decoding
Richard Allen and Ratip Emin Berker and Sílvia Casacuberta and Michael Gul
2022/194 ( PDF )
Finding Collisions against 4-round SHA3-384 in Practical Time
Senyang Huang and Orna Agmon Ben-Yehuda and Orr Dunkelman and Alexander Maximov
2022/193 ( PDF )
OptRand: Optimistically responsive distributed random beacons
Adithya Bhat and Aniket Kate and Kartik Nayak and Nibesh Shrestha
2022/192 ( PDF )
SoftSpokenOT: Communication--Computation Tradeoffs in OT Extension
Lawrence Roy
2022/191 ( PDF )
NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead
Andrew Park and Wei-Kai Lin and Elaine Shi
2022/190 ( PDF )
Short-lived zero-knowledge proofs and signatures
Arasu Arun and Joseph Bonneau and Jeremy Clark
2022/189 ( PDF )
Simplified MITM Modeling for Permutations: New (Quantum) Attacks
André Schrottenloher and Marc Stevens
2022/188 ( PDF )
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs
Thibauld Feneuil and Antoine Joux and Matthieu Rivain
2022/187 ( PDF )
Towards Efficient YOSO MPC Without Setup
Sebastian Kolby and Divya Ravi and Sophia Yakoubov
2022/186 ( PDF )
Overflow-detectable Floating-point Fully Homomorphic Encryption
Seunghwan Lee and Dong-Joon Shin
2022/185 ( PDF )
Statistically Sender-Private OT from LPN and Derandomization
Nir Bitansky and Sapir Freizeit
2022/184 ( PDF )
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3
Jian Guo and Guozhen Liu and Ling Song and Yi Tu
2022/183 ( PDF )
Improving Differential-Neural Cryptanalysis with Inception Blocks
Liu Zhang and Zilong Wang and Boyang Wang
2022/182 ( PDF )
A Novel Framework for Explainable Leakage Assessment
Si Gao and Elisabeth Oswald
2022/181 ( PDF )
Vector Commitments over Rings and Compressed $\Sigma$-Protocols
Thomas Attema and Ignacio Cascudo and Ronald Cramer and Ivan Bjerre Damgård and Daniel Escudero
2022/180 ( PDF )
Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher
Orel Cosseron and Clément Hoffmann and Pierrick Méaux and François-Xavier Standaert
2022/179 ( PDF )
Locally Verifiable Signature and Key Aggregation
Rishab Goyal and Vinod Vaikuntanathan
2022/178 ( PDF )
Lower Bound on SNARGs in the Random Oracle Model
Iftach Haitner and Daniel Nukrai and Eylon Yogev
2022/177 ( PDF )
The Power of the Differentially Oblivious Shuffle in Distributed Privacy Mechanisms
Mingxun Zhou and Elaine Shi
2022/176 ( PDF )
Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems
Minze Xu and Yuan Zhang and Sheng Zhong
2022/175 ( PDF )
WeRLman: To Tackle Whale (Transactions), Go Deep (RL)
Roi Bar-Zur and Ameer Abu-Hanna and Ittay Eyal and Aviv Tamar
2022/174 ( PDF )
How to Launch a Powerful Side-Channel Collision Attack?
Jiangshan Long and Changhai Ou and Yajun Ma and Yifan Fan and Hua Chen and Shihui Zheng
2022/173 ( PDF )
Collision-Resistance from Multi-Collision-Resistance
Ron D. Rothblum and Prashant Nalini Vasudevan
2022/172 ( PDF )
A remark on NIST SP 800-22 serial test
Corina-Elena Bogos and Razvan Mocanu and Emil Simion
2022/171 ( PDF )
Practical and Improved Byzantine Reliable Broadcast and Asynchronous Verifiable Information Dispersal from Hash Functions
Nicolas Alhaddad and Sisi Duan and Mayank Varia and Haibin Zhang
2022/170 ( PDF )
gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies
Foteini Baldimtsi and Panagiotis Chatzigiannis and S. Dov Gordon and Phi Hung Le and Daniel McVicker
2022/169 ( PDF )
SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful
Markku-Juhani O. Saarinen
2022/168 ( PDF )
Hardness of Approximation for Stochastic Problems via Interactive Oracle Proofs
Gal Arnon and Alessandro Chiesa and Eylon Yogev
2022/167 ( PDF )
Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority
Benny Applebaum and Eliran Kachlon and Arpita Patra
2022/166 ( PDF )
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges
Thien Duc Nguyen and Markus Miettinen and Alexandra Dmitrienko and Ahmad-Reza Sadeghi and Ivan Visconti
2022/165 ( PDF )
PAC Learnability of iPUF Variants
Durba Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
2022/164 ( PDF )
Shanrang: Fully Asynchronous Proactive Secret Sharing with Dynamic Committees
Yunzhou Yan and Yu Xia and Srinivas Devadas
2022/163 ( PDF )
A High Performance Payment Processing System Designed for Central Bank Digital Currencies
James Lovejoy and Cory Fields and Madars Virza and Tyler Frederick and David Urness and Kevin Karwaski and Anders Brownworth and Neha Narula
2022/162 ( PDF )
On the precision loss in approximate homomorphic encryption
Anamaria Costache and Benjamin R. Curtis and Erin Hales and Sean Murphy and Tabitha Ogilvie and Rachel Player
2022/161 ( PDF )
D-KODE: Mechanism to Generate and Maintain a Billion Keys
Easwar Vivek Mangipudi and Aniket Kate
2022/160 ( PDF )
Random primes in arithmetic progressions
Pascal Giorgi and Bruno Grenet and Armelle Perret du Cray and Daniel S. Roche
2022/159 ( -- withdrawn -- )
A Note on Blockchain Authentication Methods For Mobile Devices In Healthcare
George-Mircea Grosu and Silvia-Elena Nistor and Emil Simion
2022/158 ( PDF )
Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs
Olivier Bronchain and Gaëtan Cassiers
2022/157 ( PDF )
Shuffle-based Private Set Union: Faster and More Secure
Yanxue Jia and Shi-Feng Sun and Hong-Sheng Zhou and Jiajun Du and Dawu Gu
2022/156 ( PDF )
Cosmic Security
Benjamin Chan and Cody Freitag and Rafael Pass
2022/155 ( PDF )
FairTraDEX: A Decentralised Exchange Preventing Value Extraction
Conor McMenamin and Vanesa Daza and Matthias Fitzi
2022/154 ( PDF )
Coeus: A System for Oblivious Document Ranking and Retrieval
Ishtiyaque Ahmad and Laboni Sarker and Divyakant Agrawal and Amr El Abbadi and Trinabh Gupta
2022/153 ( PDF )
Faulty isogenies: a new kind of leakage
Gora Adj and Jesús-Javier Chi-Domínguez and Víctor Mateu and Francisco Rodríguez-Henríquez
2022/152 ( PDF )
K-XMSS and K-SPHINCS$^+$:Hash based Signatures with\\Korean Cryptography Algorithms
Minjoo Sim and Siwoo Eum and Gyeongju Song and HyeokDong Kwon and Kyungbae Jang and HyunJun Kim and HyunJi Kim and Yujin Yang and Wonwoong Kim and Wai-Kong Lee and Hwajeong Seo
2022/151 ( PDF )
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
Ling Sun and Wei Wang and Meiqin Wang
2022/150 ( PDF )
The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography
Tomoki Moriya and Hiroshi Onuki and Yusuke Aikawa and Tsuyoshi Takagi
2022/149 ( PDF )
Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping
Pierre-Emmanuel Clet and Martin Zuber and Aymen Boudguiga and Renaud Sirdey and Cédric Gouy-Pailler
2022/148 ( PDF )
Attacks on the Firekite cipher
Thomas Johansson and Willi Meier and Vu Nguyen
2022/147 ( PDF )
Constructing new superclasses of bent functions from known ones
Amar Bapić and Enes Pasalic and Fengrong Zhang and Samir Hodžić
2022/146 ( PDF )
Training Differentially Private Models with Secure Multiparty Computation
Sikha Pentyala and Davis Railsback and Ricardo Maia and Rafael Dowsley and David Melanson and Anderson Nascimento and Martine De Cock
2022/145 ( PDF )
An elementary construction of QR-UOV
Yasufumi Hashimoto
2022/144 ( PDF )
Rainbow Differential Privacy
Ziqi Zhou and Onur Gunlu and Rafael G. L. D'Oliveira and Muriel Medard and Parastoo Sadeghi and Rafael F. Schaefer
2022/143 ( PDF )
Composition construction of new bent functions from known dually isomorphic bent functions
Guangpu Gao and Weiguo Zhang and Yongjuan Wang
2022/142 ( PDF )
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications
Muhammed F. Esgin and Ron Steinfeld and Raymond K. Zhao
2022/141 ( PDF )
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs
Muhammed F. Esgin and Ron Steinfeld and Dongxi Liu and Sushmita Ruj
2022/140 ( PDF )
On the Related-Key Attack Security of Authenticated Encryption Schemes
Sebastian Faust and Juliane Krämer and Maximilian Orlt and Patrick Struck
2022/139 ( PDF )
Sponge-based Authenticated Encryption: Security against Quantum Attackers
Christian Janson and Patrick Struck
2022/138 ( PDF )
Resisting Key-Extraction and Code-Compression: a Secure Implementation of the HFE Signature Scheme in the White-Box Model
Pierre Galissant and Louis Goubin
2022/137 ( PDF )
Ten years of cube attacks
Marco Cianfriglia and Elia Onofri and Silvia Onofri and Marco Pedicini
2022/136 ( PDF )
Twilight: A Differentially Private Payment Channel Network
Maya Dotan and Saar Tochner and Aviv Zohar and Yossi Gilad
2022/135 ( PDF )
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers
Zheng Xu and Yongqiang Li and Lin Jiao and Mingsheng Wang and Willi Meier
2022/134 ( PDF )
Functional Cryptanalysis: Application to reduced-round Xoodoo
Emanuele Bellini and Rusydi H. Makarim
2022/133 ( PDF )
Faster verification of V2X BSM messages via Message Chaining
Eduardo Lopes Cominetti and Marcos Vinicius M. Silva and Marcos A. Simplicio Jr. and Harsh Kupwade Patil and Jefferson E. Ricardini
2022/132 ( PDF )
On Defeating Graph Analysis of Anonymous Transactions
Christoph Egger and Russell W. F. Lai and Viktoria Ronge and Ivy K. Y. Woo and Hoover H. F. Yin
2022/131 ( PDF )
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange
Yue Qin and Ruoyu Ding and Chi Cheng and Nina Bindel and Yanbin Pan and Jintai Ding
2022/130 ( PDF )
A LeVeL Paying Field: Cryptographic Solutions towards Social Accountability and Financial Inclusion
Gideon Samid
2022/129 ( PDF )
TOFU - Toggle Count Analysis made simple
Michael Gruber and Georg Sigl
2022/128 ( PDF )
Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes
Pierre Karpman and Charlotte Lefevre
2022/127 ( PDF )
CCA secure ElGamal encryption over an integer group where ICDH assumption holds
Gyu-Chol.Kim and Jae-Yong.Sin and Yong-Bok.Jong
2022/126 ( PDF )
Storage Security in Cloud Computing: Data Auditing Protocols
Andrei-Alexandru Brebu and Mihai Iacov and Emil Simion
2022/125 ( PDF )
Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem
Brice Colombier and Vlad-Florin Dragoi and Pierre-Louis Cayrel and Vincent Grosso
2022/124 ( PDF )
On the Performance Gap of a Generic C Optimized Assembler and Wide Vector Extensions for Masked Software with an Ascon-{\it{p}} test case
Dor Salomon and Itamar Levi
2022/123 ( PDF )
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments
Subhra Mazumdar and Sushmita Ruj
2022/122 ( PDF )
Quantum cryptography with classical communication: parallel remote state preparation for copy-protection, verification, and more
Alexandru Gheorghiu and Tony Metger and Alexander Poremba
2022/121 ( PDF )
Crime and Punishment in Distributed Byzantine Decision Tasks (Extended Version)
Pierre Civit and Seth Gilbert and Vincent Gramoli and Rachid Guerraoui and Jovan Komatovic and Zarko Milosevic and Adi Serendinschi
2022/120 ( PDF )
Practical Seed Recovery of Fast Cryptographic Pseudo Random Number Generators
Florette Martinez
2022/119 ( PDF )
Hardware Implementation of SpoC-128
Ambati Sathvik and Tirunagari Rahul and Anubhab Baksi and Vikramkumar Pudi
2022/118 ( PDF )
Streebog compression function as PRF in secret-key settings
Vitaly Kiryukhin
2022/117 ( PDF )
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains
Zhimei Sui and Joseph K. Liu and Jiangshan Yu and Man Ho Au and Jia Liu
2022/116 ( PDF )
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version)
Kosei Sakamoto and Fukang Liu and Yuto Nakano and Shinsaku Kiyomoto and Takanori Isobe
2022/115 ( PDF )
GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks
Zilin Liu and Anjia Yang and Jian Weng and Tao Li and Huang Zeng and Xiaojian Liang
2022/114 ( PDF )
Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat
Ziaur Rahman and Xun Yi and Ibrahim Khalil
2022/113 ( PDF )
XCC: Theft-Resilient and Collateral-Optimized Cryptocurrency-Backed Assets
Theodore Bugnet and Alexei Zamyatin
2022/112 ( PDF )
Faster Kyber and Dilithium on the Cortex-M4
Amin Abdulrahman and Vincent Hwang and Matthias J. Kannwischer and Daan Sprenkels
2022/111 ( PDF )
Breaking Panther
Christina Boura and Rachelle Heim Boissier and Yann Rotella
2022/110 ( PDF )
Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-sliced Implementations
Jan-Pieter D'Anvers and Michiel Van Beirendonck and Ingrid Verbauwhede
2022/109 ( PDF )
Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees
Ananya Appan and Anirudh Chandramouli and Ashish Choudhury
2022/108 ( PDF )
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method
Rohon Kundu and Alessandro de Piccoli and Andrea Visconti
2022/107 ( PDF )
Payment with Dispute Resolution: A Protocol For Reimbursing Frauds' Victims
Aydin Abadi and Steven J. Murdoch
2022/106 ( PDF )
Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All
Soundes Marzougui and Vincent Ulitzsch and Mehdi Tibouchi and Jean-Pierre Seifert
2022/105 ( PDF )
Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces
Varun Madathil and Alessandra Scafuro and Kemafor Anyanwu and Sen Qiao and Akash Pateria and Binil Starly
2022/104 ( PDF )
Minotaur: Multi-Resource Blockchain Consensus
Matthias Fitzi and Xuechao Wang and Sreeram Kannan and Aggelos Kiayias and Nikos Leonardos and Pramod Viswanath and Gerui Wang
2022/103 ( -- withdrawn -- )
E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System
Zhihui Lin and Prosanta Gope and Jianting Ning and Biplab Sikdar
2022/102 ( PDF )
MPC-Friendly Commitments for Publicly Verifiable Covert Security
Nitin Agrawal and James Bell and Adrià Gascón and Matt J. Kusner
2022/101 ( PDF )
Lattice-Based Linkable Ring Signature in the Standard Model
Mingxing Hu and Zhen Liu
2022/100 ( PDF )
Development of Cryptography since Shannon
Funda Özdemir and Çetin Kaya Koç
2022/099 ( PDF )
Performance of Hierarchical Transforms in Homomorphic Encryption: A case study on Logistic Regression inference
Pedro Geraldo M. R. Alves and Jheyne N. Ortiz and Diego F. Aranha
2022/098 ( PDF )
Orienteering with one endomorphism
Sarah Arpin and Mingjie Chen and Kristin E. Lauter and Renate Scheidler and Katherine E. Stange and Ha T. N. Tran
2022/097 ( PDF )
Lattice Signature can be as Simple as Lattice Encryption
Dingfeng Ye and Jun Xu and Guifang Huang and Lei Hu
2022/096 ( PDF )
On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications
Karim Eldefrawy and Nicholas Genise and Rutuja Kshirsagar and Moti Yung
2022/095 ( PDF )
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More
Huy Quoc Le and Dung Hoang Duong and Willy Susilo and Josef Pieprzyk
2022/094 ( PDF )
Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies
Nir Drucker and Tomer Pelleg
2022/093 ( PDF )
Public-Key Encryption from Continuous LWE
Andrej Bogdanov and Miguel Cueto Noval and Charlotte Hoffmann and Alon Rosen
2022/092 ( PDF )
Rethinking Watermark: Providing Proof of IP Ownership in Modern SoCs
N. Nalla Anandakumar and M. Sazadur Rahman and Mridha Md Mashahedur Rahman and Rasheed Kibria and Upoma Das and Farimah Farahmandi and Fahim Rahman and Mark M. Tehranipoor
2022/091 ( PDF )
The multiplicative complexity of interval checking
Thomas Häner and Mathias Soeken
2022/090 ( PDF )
Attacks on Encrypted Range Search Schemes in Multiple Dimensions
Francesca Falzon and Evangelia Anna Markatou and Zachary Espiritu and Roberto Tamassia
2022/089 ( PDF )
NTRU-$\nu$-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus
Kamil Kluczniak
2022/088 ( PDF )
A survey on the security protocols employed by mobile messaging applications
Ștefania Andrieș and Andrei-Daniel Miron and Andrei Cristian and Emil Simion
2022/087 ( PDF )
The Internet Computer for Geeks
The DFINITY Team
2022/086 ( PDF )
PlonKup: Reconciling PlonK with plookup
Luke Pearson and Joshua Fitzgerald and Héctor Masip and Marta Bellés-Muñoz and Jose Luis Muñoz-Tapia
2022/085 ( PDF )
Cross-Domain Identity-based Matchmaking Encryption
Axin Wu and Jian Weng and Weiqi Luo and Anjia Yang and Jia-Nan Liu and Zike Jiang
2022/084 ( PDF )
Token meets Wallet: Formalizing Privacy and Revocation for FIDO2
Lucjan Hanzlik and Julian Loss and Benedikt Wagner
2022/083 ( PDF )
Zef: Low-latency, Scalable, Private Payments
Mathieu Baudet and Alberto Sonnino and Mahimna Kelkar and George Danezis
2022/082 ( PDF )
Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs
Carsten Baum and Robin Jadoul and Emmanuela Orsini and Peter Scholl and Nigel P. Smart
2022/081 ( PDF )
Single-Server Private Information Retrieval with Sublinear Amortized Time
Henry Corrigan-Gibbs and Alexandra Henzinger and Dmitry Kogan
2022/080 ( PDF )
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation
Yu Long Chen and Stefano Tessaro
2022/079 ( PDF )
Lightweight Secure Integer Comparison
Thijs Veugen
2022/078 ( PDF )
Secure Lossy Function Computation with Multiple Private Remote Source Observations
Onur Gunlu and Matthieu Bloch and Rafael F. Schaefer
2022/077 ( PDF )
Multiple Noisy Private Remote Source Observations for Secure Function Computation
Onur Gunlu and Matthieu Bloch and Rafael F. Schaefer
2022/076 ( PDF )
Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security
Ertem Nusret Tas and David Tse and Fisher Yu and Sreeram Kannan
2022/075 ( PDF )
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets
Easwar Vivek Mangipudi and Udit Desai and Mohsen Minaei and Mainack Mondal and Aniket Kate
2022/074 ( PDF )
FINAL: Faster FHE instantiated with NTRU and LWE
Charlotte Bonte and Ilia Iliashenko and Jeongeun Park and Hilder V. L. Pereira and Nigel P. Smart
2022/073 ( PDF )
Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain
Seiya Nuta and Jacob C. N. Schuldt and Takashi Nishide
2022/072 ( PDF )
Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction
Keita Emura
2022/071 ( PDF )
Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable
Erik Aronesty and David Cash and Yevgeniy Dodis and Daniel H. Gallancy and Christopher Higley and Harish Karthikeyan and Oren Tysor
2022/070 ( PDF )
(Nondeterministic) Hardness vs. Non-Malleability
Marshall Ball and Dana Dachman-Soled and Julian Loss
2022/069 ( PDF )
Small-Box Cryptography
Yevgeniy Dodis and Harish Karthikeyan and Daniel Wichs
2022/068 ( PDF )
Updatable Public Key Encryption in the Standard Model
Yevgeniy Dodis and Harish Karthikeyan and Daniel Wichs
2022/067 ( PDF )
Parallel Operations over TFHE-Encrypted Multi-Digit Integers
Jakub Klemsa and Melek Önen
2022/066 ( PDF )
A remark on the Discrete Fourier Transform statistical test
Anghel Florin and Asandoaiei David and Tabacaru Robert
2022/065 ( PDF )
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS
Nimrod Aviram and Benjamin Dowling and Ilan Komargodski and Kenneth G. Paterson and Eyal Ronen and Eylon Yogev
2022/064 ( PDF )
A Framework for the Design of Secure and Efficient Proofs of Retrievability
Françoise Levy-dit-Vehel and Maxime Roméas
2022/063 ( PDF )
Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers
Kang Yang and Xiao Wang
2022/062 ( PDF )
An Introduction to Secret-Sharing-Based Secure Multiparty Computation
Daniel Escudero
2022/061 ( PDF )
A remark on the NIST 800-22 Binary Matrix Rank Test
Nicu Neculache and Vlad-Andrei Petcu and Emil Simion
2022/060 ( PDF )
Quantum Boomerang Attacks and Some Applications
Paul Frixons and María Naya-Plasencia and André Schrottenloher
2022/059 ( PDF )
SPHINCS-$\alpha$: A Compact Stateless Hash-Based Signature Scheme
Kaiyi Zhang and Hongrui Cui and Yu Yu
2022/058 ( PDF )
First-Order Masked Kyber on ARM Cortex-M4
Daniel Heinz and Matthias J. Kannwischer and Georg Land and Thomas Pöppelmann and Peter Schwabe and Daan Sprenkels
2022/057 ( PDF )
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon
Morgane Guerreau and Ange Martinelli and Thomas Ricosset and Mélissa Rossi
2022/056 ( PDF )
LedgerHedger: Gas Reservation for Smart-Contract Security
Itay Tsabary and Alex Manuskin and Ittay Eyal
2022/055 ( PDF )
Key lifting : Multi-key Fully Homomorphic Encryption in plain model
Xiaokang Dai and Wenyuan Wu and Yong Feng
2022/054 ( PDF )
SIKE Channels
Luca De Feo and Nadia El Mrabet and Aymeric Genêt and Novak Kaluđerović and Natacha Linard de Guertechin and Simon Pontié and Élise Tasso
2022/053 ( PDF )
Brute Force Cryptanalysis
Aron Gohr
2022/052 ( PDF )
Near-optimal Balanced Reliable Broadcast and Asynchronous Verifiable Information Dispersal
Sourav Das and Zhuolun Xiang and Ling Ren
2022/051 ( PDF )
Titanium: A Metadata-Hiding File-Sharing System with Malicious Security
Weikeng Chen and Thang Hoang and Jorge Guajardo and Attila A. Yavuz
2022/050 ( PDF )
High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA
Asep Muhamad Awaludin and Harashta Tatimma Larasati and Howon Kim
2022/049 ( PDF )
Small MACs from Small Permutations
Maria Eichlseder and Ahmet Can Mert and Christian Rechberger and Markus Schofnegger
2022/048 ( PDF )
RSA, DH, and DSA in the Wild
Nadia Heninger
2022/047 ( PDF )
Short Pairing-Free Blind Signatures with Exponential Security
Stefano Tessaro and Chenzhi Zhu
2022/046 ( PDF )
Membership Privacy for Asynchronous Group Messaging
Keita Emura and Kaisei Kajita and Ryo Nojima and Kazuto Ogawa and Go Ohtake
2022/045 ( PDF )
Probing Security through Input-Output Separation and Revisited Quasilinear Masking
Dahmun Goudarzi and Thomas Prest and Matthieu Rivain and Damien Vergnaud
2022/044 ( PDF )
Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes
Atakan Arslan and Muhammed Ali Bingöl
2022/043 ( PDF )
Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges
Konstantinos Chalkias and Panagiotis Chatzigiannis and Yan Ji
2022/042 ( PDF )
Inapplicability of Differential Fault Attacks against Cellular Automata based Lightweight Authenticated Cipher
AMBILI K N and JIMMY JOSE
2022/041 ( PDF )
Reinforcing Lightweight Authenticated Encryption Schemes against Statistical Ineffective Fault Attack
AMBILI K N and JIMMY JOSE
2022/040 ( PDF )
Ensuring Accountability and Outsourced Decryption in IoT Systems using Ciphertext-Policy Attribute-Based Encryption
AMBILI K N and JIMMY JOSE
2022/039 ( PDF )
Outsourced CP-ABE with Whitebox Accountability in IoT Systems
AMBILI K N and JIMMY JOSE
2022/038 ( PDF )
ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption
Antonio de la Piedra and Marloes Venema and Greg Alpár
2022/037 ( PDF )
Subgroup membership testing on elliptic curves via the Tate pairing
Dmitrii Koshelev
2022/036 ( PDF )
Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber
Melissa Azouaoui and Olivier Bronchain and Clément Hoffmann and Yulia Kuzovkova and Tobias Schneider and François-Xavier Standaert
2022/035 ( PDF )
Time-Traveling Simulators Using Blockchains and Their Applications
Vipul Goyal and Justin Raizes and Pratik Soni
2022/034 ( PDF )
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic
Varun Madathil and Chris Orsini and Alessandra Scafuro and Daniele Venturi
2022/033 ( PDF )
Deletion-Compliance in the Absence of Privacy
Jonathan Godin and Philippe Lamontagne
2022/032 ( PDF )
Formal Analysis of Non-Malleability for Commitments in EasyCrypt
Denis Firsov and Sven Laur and Ekaterina Zhuchko
2022/031 ( PDF )
BAT: Small and Fast KEM over NTRU Lattices
Pierre-Alain Fouque and Paul Kirchner and Thomas Pornin and Yang Yu
2022/030 ( PDF )
Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK
Jinyu Lu and Guoqiang Liu and Yunwen Liu and Bing Sun and Chao Li and Li Liu
2022/029 ( PDF )
CRYScanner: Finding cryptographic libraries misuse
Amit Choudhari and Sylvain Guilley and Khaled Karray
2022/028 ( PDF )
Locality-Preserving Hashing for Shifts with Connections to Cryptography
Elette Boyle and Itai Dinur and Niv Gilboa and Yuval Ishai and Nathan Keller and Ohad Klein
2022/027 ( PDF )
Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice
Bingyong Guo and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang
2022/026 ( PDF )
Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective
Andrada-Teodora Ciulei and Marian-Codrin Crețu and Emil Simion
2022/025 ( PDF )
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos
Mostafizar Rahman and Dhiman Saha and Goutam Paul
2022/024 ( PDF )
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation
Jean-Philippe Bossuat and Juan Ramón Troncoso-Pastoriza and Jean-Pierre Hubaux
2022/023 ( PDF )
Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits
Nicolai Müller and David Knichel and Pascal Sasdrich and Amir Moradi
2022/022 ( PDF )
Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation
Xiuju Huang and Jiashuo Song and Zichen Li
2022/021 ( PDF )
WaterBear: Information-Theoretic Asynchronous BFT Made Practical
Sisi Duan and Haibin Zhang and Boxin Zhao
2022/020 ( PDF )
PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement
Sisi Duan and Haibin Zhang
2022/019 ( PDF )
Algebraic Meet-in-the-Middle Attack on LowMC
Fukang Liu and Santanu Sarkar and Gaoli Wang and Willi Meier and Takanori Isobe
2022/018 ( PDF )
Pairing-based Accountable Subgroup Multi-signatures with Verifiable Group Setup
Ahmet Ramazan Ağırtaş and Oğuz Yayla
2022/017 ( PDF )
Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation
Shingo Sato and Keita Emura and Atsushi Takayasu
2022/016 ( PDF )
An algebraic attack to the Bluetooth stream cipher E0
Roberto La Scala and Sergio Polese and Sharwan K. Tiwari and Andrea Visconti
2022/015 ( PDF )
Lattice-based Signatures with Tight Adaptive Corruptions and More
Jiaxin Pan and Benedikt Wagner
2022/014 ( PDF )
Transformer encoder-based Crypto-Ransomware Detection for Low-Power Embedded Processors
Hyunji Kim and Sejin Lim and Yeajun Kang and Wonwoong Kim and Hwajeong Seo
2022/013 ( PDF )
Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak
Runsong Wang and Xuelian Li and Juntao Gao and Hui Li and Baocang Wang
2022/012 ( PDF )
Security of Identity-based Encryption Schemes from Quadratic Residues
Ferucio Laurentiu Tiplea and Sorin Iftene and George Teseleanu and Anca-Maria Nica
2022/011 ( PDF )
Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance
Alfredo Rial and Ania M. Piotrowska
2022/010 ( PDF )
Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks
Christian Matt and Jesper Buus Nielsen and Søren Eller Thomsen
2022/009 ( PDF )
Algebraic Reductions of Knowledge
Abhiram Kothapalli and Bryan Parno
2022/008 ( PDF )
Beating Classical Impossibility of Position Verification
Jiahui Liu and Qipeng Liu and Luowen Qian
2022/007 ( PDF )
PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More
Rutchathon Chairattana-Apirom and Lucjan Hanzlik and Julian Loss and Anna Lysyanskaya and Benedikt Wagner
2022/006 ( PDF )
Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures
Vadim Lyubashevsky and Ngoc Khanh Nguyen and Maxime Plancon
2022/005 ( PDF )
Pseudorandom Bit Generation with Asymmetric Numeral Systems
Josef Pieprzyk and Marcin Pawlowski and Pawel Morawiecki and Arash Mahboubi and Jarek Duda and Seyit Camtepe
2022/004 ( PDF )
Publicly verifiable anonymous tokens with private metadata bit
Fabrice Benhamouda and Tancrède Lepoint and Michele Orrù and Mariana Raykova
2022/003 ( PDF )
Merged with 2022/007
Rutchathon Chairattana-Apirom and Anna Lysyanskaya
2022/002 ( -- withdrawn -- )
Polynomial-Time Key Recovery Attack on the Lau-Tan Cryptosystem Based on Gabidulin Codes
Wenshuo Guo and Fang-Wei Fu
2022/001 ( PDF )
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu


[ Cryptology ePrint archive ]