Cryptology ePrint Archive: Listing for 2020


2020/1193 ( PDF )
Bypassing Isolated Execution on RISC-V with Fault Injection
Shoei Nashimoto and Daisuke Suzuki and Rei Ueno and Naofumi Homma
2020/1192 ( PDF )
Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level
Yuan Yao and Tarun Kathuria and Baris Ege and Patrick Schaumont
2020/1191 ( PDF )
Schrödinger's Pirate: How To Trace a Quantum Decoder
Mark Zhandry
2020/1190 ( PDF )
Efficient Post-Quantum SNARKs for RSIS and RLWE and their Applications to Privacy
Cecilia Boschini and Jan Camenisch and Max Ovsiankin and Nicholas Spooner
2020/1189 ( PDF )
Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version)
Karim Baghery and Alonso González and Zaira Pindado and Carla Rŕfols
2020/1188 ( PDF )
Cryptographic Group Actions and Applications
Navid Alamati and Luca De Feo and Hart Montgomery and Sikhar Patranabis
2020/1187 ( PDF )
Coupling of Random Systems
David Lanzenberger and Ueli Maurer
2020/1186 ( PDF )
Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions
Zvika Brakerski and Pedro Branco and Nico Döttling and Sanjam Garg and Giulio Malavolta
2020/1185 ( PDF )
Lossiness and Entropic Hardness for Ring-LWE
Zvika Brakerski and Nico Döttling
2020/1184 ( PDF )
Constant-time verification for cut-and-choose-based signatures
Robert Ransom
2020/1183 ( PDF )
Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations
Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
2020/1182 ( PDF )
On the Round Complexity of the Shuffle Model
Amos Beimel and Iftach Haitner and Kobbi Nissim and Uri Stemmer
2020/1181 ( PDF )
TinyGarble2: Smart, Efficient, and Scalable Yao’s Garble Circuit
Siam Hussain and Baiyu Li and Farinaz Koushanfar and Rosario Cammarota
2020/1180 ( PDF )
MultiTLS: Secure communication channels with cipher suite diversity
Ricardo Moura and David R. Matos and Miguel Pardal and Miguel Correia
2020/1179 ( PDF )
Optimal Broadcast Encryption from LWE and Pairings in the Standard Model
Shweta Agrawal and Daniel Wichs and Shota Yamada
2020/1178 ( PDF )
An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH
Tomoki Kawashima and Katsuyuki Takashima and Yusuke Aikawa and Tsuyoshi Takagi
2020/1177 ( PDF )
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions
Hao Guo and Siwei Sun and Danping Shi and Ling Sun and Yao Sun and Lei Hu and Meiqin Wang
2020/1176 ( PDF )
Short Paper: PoSH Proof of Staked Hardware Consensus
Rami Khalil and Naranker Dulay
2020/1175 ( PDF )
MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication
David Heath and Vladimir Kolesnikov and Stanislav Peceny
2020/1174 ( PDF )
Proximity Searchable Encryption for Biometrics
Chloe Cachet and Luke Demarest and Benjamin Fuller and Ariel Hamlin
2020/1173 ( PDF )
Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark)
Ryo Nishimaki
2020/1172 ( PDF )
Cryptanalysis of a round optimal lattice-based multisignature scheme
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso
2020/1171 ( PDF )
On the Price of Concurrency in Group Ratcheting Protocols
Alexander Bienstock and Yevgeniy Dodis and Paul Rösler
2020/1170 ( PDF )
On the Power of an Honest Majority in Three-Party Computation Without Broadcast
Bar Alon and Ran Cohen and Eran Omri and Tom Suad
2020/1169 ( PDF )
Privacy-preserving greater-than integer comparison without binary decomposition in the malicious model
Sigurd Eskeland
2020/1168 ( PDF )
FHE-Based Bootstrapping of Designated-Prover NIZK
Zvika Brakerski and Sanjam Garg and Rotem Tsabary
2020/1167 ( PDF )
Batch Verification for Statistical Zero Knowledge Proofs
Inbar Kaslasi and Guy N. Rothblum and Ron D. Rothblum and Adam Sealfon and Prashant Nalini Vasudevan
2020/1166 ( PDF )
A Differential and Linear Analysis of the Inversion Mapping in Odd-Characteristic Finite Fields
Jorge Nakahara Jr
2020/1165 ( PDF )
Practical Isogeny-Based Key-exchange with Optimal Tightness
Bor de Kock and Kristian Gjřsteen and Mattia Veroni
2020/1164 ( PDF )
Template Attacks Based on the Multivariate Joint Distribution
Min Yang and Qingshu Meng and An Wang and Xin Liu
2020/1163 ( PDF )
Specifying cycles of minimal length for commonly used linear layers in block ciphers
Guoqiang Deng and Yongzhuang Wei and Xuefeng Duan and Enes Pasalic and Samir Hodzic
2020/1162 ( PDF )
On Average-Case Hardness in TFNP from One-Way Functions
Pavel Hubáček and Chethan Kamath and Karel Král and Veronika Slívová
2020/1161 ( PDF )
KVaC: Key-Value Commitments for Blockchains and Beyond
Shashank Agrawal and Srinivasan Raghuraman
2020/1160 ( PDF )
Characterizing Deterministic-Prover Zero Knowledge
Nir Bitansky and Arka Rai Choudhuri
2020/1159 ( PDF )
ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ?
Rintaro Fujita and Takanori Isobe and Kazuhiko Minematsu
2020/1158 ( PDF )
Don't throw your nonces out with the bathwater
Daan Sprenkels and Bas Westerbaan
2020/1157 ( PDF )
Secure Massively Parallel Computation for Dishonest Majority
Rex Fernando and Ilan Komargodski and Yanyi Liu and Elaine Shi
2020/1156 ( PDF )
Verifiable Hierarchical Key Assignment Schemes
Anna Lisa Ferrara and Chiara Ricciardi
2020/1155 ( PDF )
Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs
Dimitris Mouris and Nektarios Georgios Tsoutsos
2020/1154 ( PDF )
Functional Encryption for Set Intersection in the Multi-Client Setting
Kwangsu Lee and Minhye Seo
2020/1153 ( PDF )
Key Committing AEADs
Shay Gueron
2020/1152 ( PDF )
An Automatic Search Tool for Iterative Trails and its Application to estimation of differentials and linear hulls
Tianyou Ding and Wentao Zhang and Chunning Zhou and Fulei Ji
2020/1151 ( PDF )
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
Robert Merget and Marcus Brinkmann and Nimrod Aviram and Juraj Somorovsky and Johannes Mittmann and Jörg Schwenk
2020/1150 ( PDF )
TEnK-U: Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems
Gennaro Avitabile and Daniele Friolo and Ivan Visconti
2020/1149 ( PDF )
Deterministic Wallets in a Quantum World
Nabil Alkeilani Alkadri and Poulami Das and Andreas Erwig and Sebastian Faust and Juliane Krämer and Siavash Riahi and Patrick Struck
2020/1148 ( PDF )
An Area Aware Accelerator for Elliptic Curve Point Multiplication
Malik Imran and Samuel Pagliarini and Muhammad Rashid
2020/1147 ( PDF )
Lic-Sec: an enhanced AppArmor Docker security profile generator
Hui Zhu and Christian Gehrmann
2020/1146 ( PDF )
Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries
Siemen Dhooghe and Svetla Nikova
2020/1145 ( PDF )
Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs
Wonseok Choi and Byeonghak Lee and Yeongmin Lee and Jooyoung Lee
2020/1144 ( PDF )
Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions
Lior Rotem and Gil Segev
2020/1143 ( PDF )
Rescue-Prime: a Standard Specification (SoK)
Alan Szepieniec and Tomer Ashur and Siemen Dhooghe
2020/1142 ( PDF )
Factoring Algorithm Based on Parameterized Newton Method
Zhengjun Cao and Lihua Liu
2020/1141 ( PDF )
A post-quantum signature scheme from the secant variety of the Grassmannian
Daniele Di Tullio and Manoj Gyawali
2020/1140 ( PDF )
On the Efficient Estimation of Min-Entropy
Yongjune Kim and Cyril Guyot and Young-Sik Kim
2020/1139 ( PDF )
Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin
Huijia Lin and Ji Luo
2020/1138 ( PDF )
Epochal Signatures for Deniable Group Chats
Andreas Hülsing and Florian Weber
2020/1137 ( PDF )
MOTION - A Framework for Mixed-Protocol Multi-Party Computation
Lennart Braun and Daniel Demmler and Thomas Schneider and Oleksandr Tkachenko
2020/1136 ( PDF )
On the Family of Elliptic Curves $y^2=x^3+b/\mathbb{F}_p$
Han Wu and Guangwu Xu
2020/1135 ( PDF )
Adaptively Secure Inner Product Encryption from LWE
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2020/1134 ( PDF )
Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks
Yoo-Seung Won and Xiaolu Hou and Dirmanto Jap and Jakub Breier and Shivam Bhasin
2020/1133 ( PDF )
Security Analysis of Subterranean 2.0
Ling Song and Yi Tu and Danping Shi and Lei Hu
2020/1132 ( PDF )
Lower Bound for Oblivious RAM with Large Cells
Ilan Komargodski and Wei-Kai Lin
2020/1131 ( PDF )
Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound
Enes Pasalic and René Rodríguez and Fengrong Zhang and Yongzhuang Wei
2020/1130 ( PDF )
Secure training of decision trees with continuous attributes
Mark Abspoel and Daniel Escudero and Nikolaj Volgushev
2020/1129 ( PDF )
A Secure Software Defined Networking based Framework for IoT Networks
Ambili K N and Jimmy Jose
2020/1128 ( PDF )
Searching Cubes in Division Property Based Cube Attack: Applications to Round-Reduced ACORN
Jingchun Yang and Dongdai Lin
2020/1127 ( PDF )
SideLine: How Delay-Lines (May) Leak Secrets from your SoC
Joseph Gravellier and Jean-Max Dutertre and Yannick Teglia and Philippe Loubet Moundi
2020/1126 ( PDF )
Bitcoin--Monero Cross-chain Atomic Swap
Joël Gugger
2020/1125 ( PDF )
High-Speed FPGA Implementation of the SIKE Based on An Ultra-Low-Latency Modular Multiplier
Jing Tian and Bo Wu and Zhongfeng Wang
2020/1124 ( PDF )
Optimized Voronoi-based algorithms for parallel shortest vector computations
Artur Mariano, Filipe Cabeleira, Gabriel Falcao, Luís Paulo Santos
2020/1123 ( PDF )
Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V
Alexandre Adomnicai and Thomas Peyrin
2020/1122 ( PDF )
The Velvet Path to Superlight Blockchain Clients
Aggelos Kiayias and Andrianna Polydouri and Dionysis Zindros
2020/1121 ( PDF )
Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain
Wilson Alberto Torres and Ron Steinfeld and Amin Sakzad and Veronika Kuchta
2020/1120 ( PDF )
On the security of Diene-Thabet-Yusuf's cubic multivariate signature scheme
Yasufumi Hashimoto
2020/1119 ( PDF )
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Christoph Hagen and Christian Weinert and Christoph Sendner and Alexandra Dmitrienko and Thomas Schneider
2020/1118 ( PDF )
Approximate Homomorphic Encryption with Reduced Approximation Error
Andrey Kim and Antonis Papadimitriou and Yuriy Polyakov
2020/1117 ( PDF )
Economic Proof of Work
Jia Kan
2020/1116 ( PDF )
On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode.
V. Ustimenko
2020/1115 ( PDF )
SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets
Karim M. Abdellatif and Olivier Hériveaux
2020/1114 ( PDF )
Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting
Thomas Haines and Rajeev Gore and Bhavesh Sharma
2020/1113 ( PDF )
On combinatorial approaches to search for quadratic APN functions
Konstantin Kalgin and Valeriya Idrisova
2020/1112 ( PDF )
A cautionary note on the use of Gurobi for cryptanalysis
Muhammad ElSheikh and Amr M. Youssef
2020/1111 ( PDF )
Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography
Abhraneel Dutta and Aaron Hutchinson and Koray Karabina
2020/1110 ( PDF )
Two-round $n$-out-of-$n$ and Multi-Signatures and Trapdoor Commitment from Lattices
Ivan Damgĺrd and Claudio Orlandi and Akira Takahashi and Mehdi Tibouchi
2020/1109 ( PDF )
On new Vélu's formulae and their applications to CSIDH and B-SIDH constant-time implementations
Gora Adj and Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez
2020/1108 ( PDF )
Radical isogenies
Wouter Castryck and Thomas Decru and Frederik Vercauteren
2020/1107 ( PDF )
Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications
Shuichi Katsumata and Kris Kwiatkowski and Federico Pintore and Thomas Prest
2020/1106 ( PDF )
Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction
Gili Schul-Ganz and Gil Segev
2020/1105 ( PDF )
Catalic: Delegated PSI Cardinality with Applications to Contact Tracing
Thai Duong and Duong Hieu Phan and Ni Trieu
2020/1104 ( PDF )
High-Assurance Cryptography Software in the Spectre Era
Gilles Barthe and Sunjay Cauligi and Benjamin Gregoire and Adrien Koutsos and Kevin Liao and Tiago Oliveira and Swarn Priya and Tamara Rezk and Peter Schwabe
2020/1103 ( PDF )
Packed Multiplication: How to Amortize the Cost of Side-channel Masking ?
Weijia Wang; Chun Guo; François-Xavier Standaert; Yu Yu; Gaëtan Cassiers
2020/1102 ( PDF )
PQC: R-Propping of Public-Key Cryptosystems Using Polynomials over Non-commutative Algebraic Extension Rings
Pedro Hecht
2020/1101 ( PDF )
NC-Max: Breaking the Throughput Limit of Nakamoto Consensus
Ren Zhang and Dingwei Zhang and Quake Wang and Jan Xie and Bart Preneel
2020/1100 ( PDF )
Towards Efficiency-Preserving Round Compression in MPC: Do fewer rounds mean more computation?
Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain
2020/1099 ( PDF )
Unbounded HIBE with Tight Security
Roman Langrehr and Jiaxin Pan
2020/1098 ( PDF )
Formalizing Bitcoin Crashes with Universally Composable Security
Junming Ke and Pawel Szalachowski and Jianying Zhou and Qiuliang Xu
2020/1097 ( PDF )
How to Build Optimally Secure PRFs Using Block Ciphers
Benoît Cogliati and Ashwin Jha and Mridul Nandi
2020/1096 ( PDF )
Far Field EM Side-Channel Attack on AES Using Deep Learning
Ruize Wang and Huanyu Wang and Elena Dubrova
2020/1095 ( PDF )
Cycle structure of generalized and closed loop invariants
Yongzhuang Wei and Rene Rodriguez and Enes Pasalic
2020/1094 ( PDF )
TN-IDS for Network Layer Attacks in RPL based IoT Systems
Ambili K N and Jimmy Jose
2020/1093 ( PDF )
Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version)
Xichao Hu and Yongqiang Li and Lin Jiao and Shizhu Tian and Mingsheng Wang
2020/1092 ( PDF )
The Round Complexity of Secure Computation Against Covert Adversaries
Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain
2020/1091 ( PDF )
Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma
Joachim Neu and Ertem Nusret Tas and David Tse
2020/1090 ( PDF )
On the Adaptive Security of MACs and PRFs
Andrew Morgan and Rafael Pass and Elaine Shi
2020/1089 ( PDF )
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers
Akinori Hosoyamada and María Naya-Plasencia and Yu Sasaki
2020/1088 ( PDF )
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security
Xiangyu Liu; Shengli Liu; Dawu Gu; Jian Weng
2020/1087 ( PDF )
Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE
Keita Emura and Atsushi Takayasu and Yohei Watanabe
2020/1086 ( PDF )
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme
Daniel Apon and Dustin Moody and Ray Perlner and Daniel Smith-Tone and Javier Verbel
2020/1085 ( PDF )
Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications
Tapas Pal and Ratna Dutta
2020/1084 ( PDF )
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions
David Derler and Stephan Krenn and Kai Samelin and Daniel Slamanig
2020/1083 ( PDF )
A Fast and Compact Accelerator for Ascon and Friends
Stefan Steinegger and Robert Primas
2020/1082 ( PDF )
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption
Bart Mennink
2020/1081 ( PDF )
Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices
Olivier Bernard and Adeline Roux-Langlois
2020/1080 ( PDF )
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting
Rupeng Yang and Junzuo Lai and Zhengan Huang and Man Ho Au and Qiuliang Xu and Willy Susilo
2020/1079 ( PDF )
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption
Rongmao Chen and Xinyi Huang and Moti Yung
2020/1078 ( PDF )
Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles
Jodie Knapp and Elizabeth A. Quaglia
2020/1077 ( PDF )
Unconditionally secure quantum bit commitment: Revised
Ming-Xing Luo and Xiaojun Wang
2020/1076 ( PDF )
Minimizing the Two-Round Tweakable Even-Mansour Cipher
Avijit Dutta
2020/1075 ( PDF )
On the Query Complexity of Constructing PRFs from Non-adaptive PRFs
Pratik Soni and Stefano Tessaro
2020/1074 ( PDF )
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping
Mihai-Zicu Mina and Emil Simion
2020/1073 ( PDF )
Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation
Yusai Wu and Liqing Yu and Zhenfu Cao and Xiaolei Dong
2020/1072 ( PDF )
Cryptanalysis of the permutation based algorithm SpoC
Liliya Kraleva and Raluca Posteuca and Vincent Rijmen
2020/1071 ( PDF )
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model
Julia Kastner and Julian Loss and Michael Rosenberg and Jiayu Xu
2020/1070 ( PDF )
Hashing to elliptic curves $y^2 = x^3 + b$ provided that $b$ is a quadratic residue
Dmitrii Koshelev
2020/1069 ( PDF )
Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions
Matteo Campanelli and Antonio Faonio and Dario Fiore and Anaďs Querol and Hadrián Rodríguez
2020/1068 ( PDF )
An Efficient Transformation Capabilities of Single Database Private Block Retrieval
Radhakrishna Bhat and N R Sunitha
2020/1067 ( PDF )
A Constant Time Full Hardware Implementation of Streamlined NTRU Prime
Adrian Marotzke
2020/1066 ( PDF )
Constant time algorithms for ROLLO-I-128
Carlos Aguilar-Melchor and Nicolas Aragon and Emanuele Bellini and Florian Caullery and Rusydi H. Makarim and Chiara Marcolla
2020/1065 ( PDF )
Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering
Naila Mukhtar and Louiza Papachristodoulou and Apostolos P. Fournaris and Lejla Batina and Yinan Kong
2020/1064 ( PDF )
Mimblewimble Non-Interactive Transaction Scheme
Gary Yu
2020/1063 ( -- withdrawn -- )
Signatures of Knowledge for Boolean Circuits under Standard Assumptions
Karim Baghery and Alonso González and Zaira Pindado and Carla Rŕfols
2020/1062 ( PDF )
Quantum Search for Scaled Hash Function Preimages
Sergi Ramos-Calderer and Emanuele Bellini and José I. Latorre and Marc Manzano and Victor Mateu
2020/1061 ( PDF )
A new idea in response to fast correlation attacks on small-state stream ciphers
Vahid Amin Ghafari and Fujiang Lin
2020/1060 ( PDF )
Circular Security Is Complete for KDM Security
Fuyuki Kitagawa and Takahiro Matsuda
2020/1059 ( PDF )
Incorrectly Generated RSA Keys: How To Recover Lost Plaintexts
Daniel Shumow
2020/1058 ( PDF )
On the Complexity of the Crossbred Algorithm
Joăo Diogo Duarte
2020/1057 ( PDF )
MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces
Jonas Nick and Tim Ruffing and Yannick Seurin and Pieter Wuille
2020/1056 ( PDF )
Optimized GPU Framework for Block Cipher Differential Search
Wei-Zhu Yeoh and Je Sen Teh and Jiageng Chen
2020/1055 ( PDF )
Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain
Santi J. Vives
2020/1054 ( PDF )
Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems
Ben Smyth
2020/1053 ( PDF )
Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation
Anders Dalskov and Eysa Lee and Eduardo Soria-Vazquez
2020/1052 ( PDF )
Attacking Threshold Wallets
Jean-Philippe Aumasson and Omer Shlomovits
2020/1051 ( PDF )
Lower Bounds on the Degree of Block Ciphers
Phil Hebborn and Baptiste Lambin and Gregor Leander and Yosuke Todo
2020/1050 ( PDF )
On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation
Arpita Patra and Divya Ravi and Swati Singla
2020/1049 ( PDF )
Rotational analysis of ChaCha permutation
Stefano Barbero and Emanuele Bellini and Rusydi Makarim
2020/1048 ( PDF )
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums
Kai Hu and Siwei Sun and Meiqin Wang and Qingju Wang
2020/1047 ( PDF )
Side-channel Attacks with Multi-thread Mixed Leakage
Yiwen Gao and Yongbin Zhou
2020/1046 ( PDF )
On the Linear Distinguishing Attack against ZUC-256 Stream Cipher
ZUC Design Team
2020/1045 ( PDF )
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
Dhiman Saha and Yu Sasaki and Danping Shi and Ferdinand Sibleyras and Siwei Sun and Yingjie Zhang
2020/1044 ( PDF )
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
2020/1043 ( PDF )
Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions
Ian McQuoid and Mike Rosulek and Lawrence Roy
2020/1042 ( PDF )
Candidate Obfuscation via Oblivious LWE Sampling
Hoeteck Wee and Daniel Wichs
2020/1041 ( PDF )
Sign in finite fields
Abraham Westerbaan and Bas Westerbaan
2020/1040 ( PDF )
The Modular Specifications Security Framework
Hemi Leibowitz and Amir Herzberg and Ewa Syta and Sara Wrótniak
2020/1039 ( PDF )
Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct
Mohammad Sadeq Dousti and Alptekin Küpçü
2020/1038 ( PDF )
On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4
Prasanna Ravi and Romain Poussier and Shivam Bhasin and Anupam Chattopadhyay
2020/1037 ( PDF )
A High-performance Hardware Implementation of Saber Based on Karatsuba Algorithm
Yihong Zhu and Min Zhu and Bohan Yang and Wenping Zhu and Chenchen Deng and Chen Chen and Shaojun Wei and Leibo Liu
2020/1036 ( PDF )
Security in banking
Arthur Van Der Merwe and David Paul and Jelena Schmalz and Timothy M. Schaerf
2020/1035 ( PDF )
Evolving Secret Sharing with Essential Participants
Jyotirmoy Pramanik and Avishek Adhikari
2020/1034 ( PDF )
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques
Fukang Liu and Takanori Isobe and Willi Meier
2020/1033 ( PDF )
RandChain: Decentralised Randomness Beacon from Sequential Proof-of-Work
Runchao Han and Jiangshan Yu and Haoyu Lin
2020/1032 ( PDF )
Cryptanalysis of the MALICIOUS Framework
Tim Beyne and Chaoyun Li
2020/1031 ( PDF )
Profiled Deep Learning Side-Channel Attack on a Protected Arbiter PUF Combined with Bitstream Modification
Yang Yu and Michail Moraitis and Elena Dubrova
2020/1030 ( PDF )
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories
Xiaoyang Dong and Siwei Sun and Danping Shi and Fei Gao and Xiaoyun Wang and Lei Hu
2020/1029 ( PDF )
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
Hannah Davis and Felix Günther
2020/1028 ( PDF )
Secure Data Hiding for Contact Tracing
Craig Gotsman and Kai Hormann
2020/1027 ( PDF )
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things
Hu Xiong and Yingzhe Hou and Xin Huang and Saru Kumari
2020/1026 ( PDF )
Simple and Efficient FE for Quadratic Functions
Junqing Gong and Haifeng Qian
2020/1025 ( PDF )
A Bit-Vector Differential Model for the Modular Addition by a Constant
Seyyed Arash Azimi and Adrián Ranea and Mahmoud Salmasizadeh and Javad Mohajeri and Mohammad Reza Aref and Vincent Rijmen
2020/1024 ( PDF )
Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices
Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta
2020/1023 ( PDF )
Post-Quantum Anonymous Veto Networks
Jintai Ding and Doug Emery and Johannes Mueller and Peter Y. A. Ryan and Vonn Kee Wong
2020/1022 ( PDF )
Polynomial IOPs for Linear Algebra Relations
Alan Szepieniec
2020/1021 ( PDF )
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy
Christian Badertscher and Peter Gaži and Aggelos Kiayias and Alexander Russell and Vassilis Zikas
2020/1020 ( PDF )
Towards Classical Hardness of Module-LWE: The Linear Rank Case
Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen
2020/1019 ( PDF )
Security of Streaming Encryption in Google's Tink Library
Viet Tung Hoang and Yaobin Shen
2020/1018 ( PDF )
Big Subset and Small Superset Obfuscation
Steven D. Galbraith and Trey Li
2020/1017 ( PDF )
Governance framework for Quipuswap - automated decentralized exchange
Andrey Sobol and Anastasiia Kondaurova
2020/1016 ( PDF )
Hardware-Assisted Intellectual Property Protection of Deep Learning Models
Abhishek Chakraborty and Ankit Mondal and Ankur Srivastava
2020/1015 ( PDF )
On Multivariate Algorithms of Digital Signatures of Linear Degree and Low Density.
Vasyl Ustimenko
2020/1014 ( PDF )
GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel
Yuntao Liu and Ankur Srivastava
2020/1013 ( PDF )
A Study on Privacy-Preserving GRU Inference Framework
Shou-Ching Hsiao and Zi-Yuan Liu and Raylin Tso
2020/1012 ( PDF )
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer
Yi-Fu Lai and Steven D. Galbraith and Cyprien Delpech de Saint Guilhem
2020/1011 ( PDF )
Private Join and Compute from PIR with Default
Tancrčde Lepoint and Sarvar Patel and Mariana Raykova and Karn Seth and Ni Trieu
2020/1010 ( PDF )
Indistinguishability Obfuscation from Circular Security
Romain Gay and Rafael Pass
2020/1009 ( PDF )
Obfuscating Finite Automata
Steven D. Galbraith and Lukas Zobernig
2020/1008 ( PDF )
Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano
Leah Lathrop
2020/1007 ( PDF )
Attacks on Integer-RLWE
Alessandro Budroni and Benjamin Chetioui and Ermes Franch
2020/1006 ( PDF )
An Analysis of Fault Attacks on CSIDH
Jason LeGrow and Aaron Hutchinson
2020/1005 ( PDF )
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks
Fabio Campos and Matthias J. Kannwischer and Michael Meyer and Hiroshi Onuki and Marc Stöttinger
2020/1004 ( PDF )
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn
Nick Frymann and Daniel Gardham and Franziskus Kiefer and Emil Lundberg and Mark Manulis and Dain Nilsson
2020/1003 ( PDF )
Indistinguishability Obfuscation from Well-Founded Assumptions
Aayush Jain and Huijia Lin and Amit Sahai
2020/1002 ( PDF )
CrypTFlow2: Practical 2-Party Secure Inference
Deevashwer Rathee and Mayank Rathee and Nishant Kumar and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma
2020/1001 ( PDF )
Robust distributed symmetric-key encryption
Xunhua Wang and Ben Huson
2020/1000 ( PDF )
Precise and Mechanised Models and Proofs for Distance-Bounding and an Application to Contactless Payments
Ioana Boureanu and Constantin Catalin Dragan and François Dupressoir and David Gerault and Pascal Lafourcade
2020/999 ( PDF )
Attribute-Based Symmetric Searchable Encryption
Hai-Van Dang and Amjad Ullah and Alexandros Bakas and Antonis Michalas
2020/998 ( PDF )
Lightweight Virtual Payment Channels
Maxim Jourenko and Mario Larangeira and Keisuke Tanaka
2020/997 ( PDF )
Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution
Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky
2020/996 ( PDF )
Unifying Generic Group Models
Ueli Maurer and Christopher Portmann and Jiamin Zhu
2020/995 ( PDF )
Bootstrapping fully homomorphic encryption over the integers in less than one second
Hilder Vitor Lima Pereira
2020/994 ( PDF )
SPARKs: Succinct Parallelizable Arguments of Knowledge
Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass
2020/993 ( PDF )
Cryptanalysis of Masked Ciphers: A not so Random Idea
Tim Beyne and Siemen Dhooghe and Zhenda Zhang
2020/992 ( PDF )
Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs
Bo-Yeon Sim and Jihoon Kwon and Joohee Lee and Il-Ju Kim and Taeho Lee and Jaeseung Han and Hyojin Yoon and Jihoon Cho and Dong-Guk Han
2020/991 ( PDF )
A Novel Hash Function Design based on Hybrid Cellular Automata and Sponge Functions
Anita John and Alan Reji and Ajay P Manoj and Atul Premachandran and Basil Zachariah and Jimmy Jose
2020/990 ( PDF )
Constructing the Cryptographic Boundaries for Lattice-based Cryptography on Hardware Security Module
Junting Xiao and Tadahiko Ito
2020/989 ( PDF )
Algorithm for SIS and MultiSIS problems
Igor Semaev
2020/988 ( PDF )
120.147 Efficient Electromagnetic Side Channel Analysis by Probe Positioning using Multi-Layer Perceptron
Anupam Golder and Baogeng Ma and Debayan Das and Josef Danial and Shreyas Sen and Arijit Raychowdhury
2020/987 ( PDF )
Fuzzy Asymmetric Password-Authenticated Key Exchange
Andreas Erwig and Julia Hesse and Maximilian Orlt and Siavash Riahi
2020/986 ( PDF )
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
Thomas Peyrin and Haoyang Wang
2020/985 ( PDF )
Orienting supersingular isogeny graphs
Leonardo Colň and David Kohel
2020/984 ( PDF )
On Multivariate Algorithms of Digital Signatures on Secure El Gamal Type Mode.
Vasyl Ustimenko
2020/983 ( PDF )
A Differential Meet-in-the-Middle Attack on the Zip cipher
Michael Stay
2020/982 ( PDF )
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios
Sevdenur Baloglu and Sergiu Bursuc and Sjouke Mauw and Jun Pang
2020/981 ( PDF )
Deep Learning based analysis of Key Scheduling Algorithm of PRESENT cipher
Manan Pareek and Dr. Girish Mishra and Varun Kohli
2020/980 ( PDF )
SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE
Ruta Jawale and Yael Tauman Kalai and Dakshita Khurana and Rachel Zhang
2020/979 ( PDF )
Mercurial Signatures for Variable-Length Messages
Elizabeth C. Crites and Anna Lysyanskaya
2020/978 ( PDF )
Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher
Sarah Alzakari and Poorvi Vora
2020/977 ( PDF )
On the Influence of Optimizers in Deep Learning-based Side-channel Analysis
Guilherme Perin and Stjepan Picek
2020/976 ( PDF )
Synchronizable Exchange
Ranjit Kumaresan and Srinivasan Raghuraman and Adam Sealfon
2020/975 ( PDF )
Aardvark: A Concurrent Authenticated Dictionary with Short Proofs
Derek Leung and Yossi Gilad and Sergey Gorbunov and Leonid Reyzin and Nickolai Zeldovich
2020/974 ( PDF )
Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions
Dongxi Liu and Surya Nepal
2020/973 ( PDF )
Stacked Garbling: Garbled Circuit Proportional to Longest Execution Path
David Heath and Vladimir Kolesnikov
2020/972 ( PDF )
Optimized Binary GCD for Modular Inversion
Thomas Pornin
2020/971 ( PDF )
QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme
Koksal Mus and Saad Islam and Berk Sunar
2020/970 ( PDF )
Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE
Carsten Baum and Daniel Escudero and Alberto Pedrouzo-Ulloa and Peter Scholl and Juan Ramón Troncoso-Pastoriza
2020/969 ( PDF )
Hashing to elliptic curves of $j=0$ and quadratic imaginary orders of class number $2$
Dmitrii Koshelev
2020/968 ( PDF )
Feeding Cryptographic Protocols with Rich and Reliable Supply of Quantum-Grade Randomness
Gideon Samid
2020/967 ( PDF )
The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes
Jintai Ding and Joshua Deaton and Vishakha and Bo-Yin Yang
2020/966 ( PDF )
EM-Side-Channel Resistant Symmetric-Key Authentication Mechanism for Small Devices
Rick Boivie and Charanjit S. Jutla and Daniel Friedman and Ghavam Shahidi
2020/965 ( PDF )
Computation of a 30750-Bit Binary Field Discrete Logarithm
Robert Granger and Thorsten Kleinjung and Arjen K. Lenstra and Benjamin Wesolowski and Jens Zumbragel
2020/964 ( PDF )
Configurable Private Querying: Lookup and Partial Matching under Homomorphic Encryption
Hamish Hunt and Jack Crawford and Oliver Masters and Enrico Steffinlongo and Flavio Bergamaschi
2020/963 ( PDF )
From Partial to Global Asynchronous Reliable Broadcast
Diana Ghinea and Martin Hirt and Chen-Da Liu-Zhang
2020/962 ( PDF )
Post-Quantum Verification of Fujisaki-Okamoto
Dominique Unruh
2020/961 ( PDF )
Enable Dynamic Parameters Combination to Boost Linear Convolutional Neural Network for Sensitive Data Inference
Qizheng Wang and Wenping Ma and Jie Li and Ge Liu
2020/960 ( PDF )
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Florian Unterstein and Marc Schink and Thomas Schamberger and Lars Tebelmann and Manuel Ilg and Johann Heyszl
2020/959 ( PDF )
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings
Carlos Cid and Akinori Hosoyamada and Yunwen Liu and Siang Meng Sim
2020/958 ( PDF )
Multi-Threshold Asynchronous Reliable Broadcast and Consensus
Martin Hirt and Ard Kastrati and Chen-Da Liu-Zhang
2020/957 ( PDF )
Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs
Johannes Tobisch and Anita Aghaie and Georg T. Becker
2020/956 ( PDF )
Constant Time Montgomery Ladder
Kaushik Nath and Palash Sarkar
2020/955 ( PDF )
Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo
2020/954 ( PDF )
New Techniques for Traitor Tracing: Size $N^{1/3}$ and More from Pairings
Mark Zhandry
2020/953 ( PDF )
Performance comparison between deep learning-based and conventional cryptographic distinguishers
Emanuele Bellini and Matteo Rossi
2020/952 ( PDF )
On What to Learn: Train or Adapt a Deeply Learned Profile?
Christophe Genevey-Metat and Benoît Gérard and Annelie Heuser
2020/951 ( PDF )
Amplifying the Security of Functional Encryption, Unconditionally
Aayush Jain and Alexis Korb and Nathan Manohar and Amit Sahai
2020/950 ( PDF )
Self-Processing Private Sensor Data via Garbled Encryption
Nathan Manohar and Abhishek Jain and Amit Sahai
2020/949 ( PDF )
HABIT: Hardware-Assisted Bluetooth-based Infection Tracking
Nathan Manohar and Peter Manohar and Rajit Manohar
2020/948 ( PDF )
STARK Friendly Hash -- Survey and Recommendation
Eli Ben-Sasson and Lior Goldberg and David Levit
2020/947 ( PDF )
Data Oblivious Algorithms for Multicores
Vijaya Ramachandran and Elaine Shi
2020/946 ( PDF )
Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm
Johannes Mittmann and Werner Schindler
2020/945 ( PDF )
On the (in)security of ROS
Fabrice Benhamouda and Tancrčde Lepoint and Michele Orrů and Mariana Raykova
2020/944 ( PDF )
Secure Conflict-free Replicated Data Types
Manuel Barbosa and Bernardo Ferreira and Joăo Marques and Bernardo Portela and Nuno Preguiça
2020/943 ( PDF )
Analysing and Improving Shard Allocation Protocols for Sharded Blockchains
Runchao Han and Jiangshan Yu and Ren Zhang
2020/942 ( PDF )
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness
Philipp Schindler and Aljosha Judmayer and Markus Hittmeir and Nicholas Stifter and Edgar Weippl
2020/941 ( PDF )
Towards Optimizing Quantum Implementation of AES S-box
Doyoung Chung and Jooyoung Lee and Seungkwang Lee and Dooho choi
2020/940 ( PDF )
Directly revocable ciphertext-policy attribute-based encryption from lattices
Fei Meng
2020/939 ( PDF )
DLDDO: Deep Learning to Detect Dummy Operations
JongHyeok Lee and Dong-Guk Han
2020/938 ( PDF )
Performance Trade-offs in Design of MimbleWimble Proofs of Reserves
Suyash Bagad and Saravanan Vijayakumaran
2020/937 ( PDF )
BAM BAM!! On Reliability of EMFI for in-situ Automotive ECU Attacks
Colin O'Flynn
2020/936 ( PDF )
Cryptanalysis and Improvement of Anonymous Authentication for Wireless Body Area Networks with Provable Security
Mahender Kumar
2020/935 ( PDF )
Privacy-Preserving Multi-Operator Contact Tracing for Early Detection of Covid19 Contagions
Davide Andreoletti and Omran Ayoub and Silvia Giordano and Massimo Tornatore and Giacomo Verticale
2020/934 ( PDF )
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
Deepak Maram and Harjasleen Malvai and Fan Zhang and Nerla Jean-Louis and Alexander Frolov and Tyler Kell and Tyrone Lobban and Christine Moy and Ari Juels and Andrew Miller
2020/933 ( -- withdrawn -- )
Instantiation of RO Model Transforms via Extractable Functions
Mohammad Zaheri
2020/932 ( PDF )
A Note on Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near – Rings
Atul Chaturvedi Varun Shukla Manoj K.Misra
2020/931 ( PDF )
Homomorphic string search with constant multiplicative depth
Charlotte Bonte and Ilia Iliashenko
2020/930 ( PDF )
The design of scalar AES Instruction Set Extensions for RISC-V
Ben Marshall and G. Richard Newell and Dan Page and Markku-Juhani O. Saarinen and Claire Wolf
2020/929 ( PDF )
Local XOR Unification: Definitions, Algorithms and Application to Cryptography
Hai Lin and Christopher Lynch
2020/928 ( PDF )
Multi-theorem (Malicious) Designated-Verifier NIZK for QMA
Omri Shmueli
2020/927 ( PDF )
A Gas-Efficient Superlight Bitcoin Client in Solidity
Stelios Daveas and Kostis Karantias and Aggelos Kiayias and Dionysis Zindros
2020/926 ( PDF )
Secure Computation over Lattices and Elliptic Curves
Brett Hemenway Falk and Daniel Noble
2020/925 ( PDF )
Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
Chenkai Weng and Kang Yang and Jonathan Katz and Xiao Wang
2020/924 ( PDF )
Ferret: Fast Extension for coRRElated oT with small communication
Kang Yang and Chenkai Weng and Xiao Lan and Jiang Zhang and Xiao Wang
2020/923 ( PDF )
Another code-based adaptation of Lyubashevsky’s signature cryptanalysed
Nicolas Aragon and Jean-Christophe Deneuville and Philippe Gaborit
2020/922 ( PDF )
Security Challenges in Smart Grid and Suitable Countermeasures
Soumyadyuti Ghosh and Urbi Chatterjee and Durba Chatterjee and Rumia Masburah and Debdeep Mukhopadhyay and Soumyajit Dey
2020/921 ( PDF )
Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications
Hyoseung Kim and Youngkyung Lee and Michel Abdalla and Jong Hwan Park
2020/920 ( PDF )
Further Cryptographic Properties of the Multiplicative Inverse Function
Deng Tang and Bimal Mandal and Subhamoy Maitra
2020/919 ( PDF )
Tight Bounds for Simon's Algorithm
Xavier Bonnetain
2020/918 ( PDF )
An Efficient Certificateless Authentication Protocol for the SAE J1939
Basker Palaniswamy
2020/917 ( PDF )
Formalizing Nakamoto-Style Proof of Stake
Sřren Eller Thomsen and Bas Spitters
2020/916 ( PDF )
Black-Box Transformations from Passive to Covert Security with Public Verifiability
Ivan Damgård and Claudio Orlandi and Mark Simkin
2020/915 ( PDF )
Does Fiat-Shamir Require a Cryptographic Hash Function?
Yilei Chen and Alex Lombardi and Fermi Ma and Willy Quach
2020/914 ( PDF )
Ultra-Short Multivariate Public Key Signatures
Jacques Patarin and Gilles Macario-Rat and Maxime Bros and Eliane Koussa
2020/913 ( PDF )
Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis
Tarun Yadav and Manoj Kumar
2020/912 ( PDF )
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber
Zhuang Xu and Owen Pemberton and Sujoy Sinha Roy and David Oswald
2020/911 ( PDF )
Lossy Correlation Intractability and PPAD Hardness from Sub-exponential LWE
Ruta Jawale and Dakshita Khurana
2020/910 ( PDF )
A Power Side-Channel Attack on the CCA2-Secure HQC KEM
Thomas Schamberger and Julian Renner and Georg Sigl and Antonia Wachter-Zeh
2020/909 ( PDF )
When is a test not a proof?
Eleanor McMurtry and Olivier Pereira and Vanessa Teague
2020/908 ( PDF )
Analysis on the MinRank Attack using Kipnis-Shamir Method Against Rainbow
Shuhei Nakamura and Yacheng Wang and Yasuhiko Ikematsu
2020/907 ( PDF )
Enhanced Flush+Reload Attack on AES
Milad Seddigh and Hadi Soleimany
2020/906 ( PDF )
Optimally-resilient Unconditionally-secure Asynchronous Multi-party Computation Revisited
Ashish Choudhury
2020/905 ( PDF )
Cryptanalysis of a Code-Based Signature Scheme Based on the Lyubashevsky Framework
Marco Baldi and Karan Khathuria and Edoardo Persichetti and Paolo Santini
2020/904 ( PDF )
A Comparison of Weight Initializers in Deep Learning-based Side-channel Analysis
Huimin Li and Marina Krček and Guilherme Perin
2020/903 ( PDF )
Optimizing Implementations of Linear Layers
Zejun Xiang and Xiangyong Zeng and Da Lin and Zhenzhen Bao and Shasha Zhang
2020/902 ( PDF )
Federated Learning in Side-Channel Analysis
Huanyu Wang and Elena Dubrova
2020/901 ( PDF )
A Not-So-Trival Replay Attack Against DH-PSI
Hongrui Cui and Yu Yu
2020/900 ( PDF )
Message-recovery Laser Fault Injection Attack on Code-based Cryptosystems
Pierre-Louis Cayrel and Brice Colombier and Vlad-Florin Dragoi and Alexandre Menu and Lilian Bossuet
2020/899 ( PDF )
Everything is Connected: From Model Learnability to Guessing Entropy
Lichao Wu and Léo Weissbart and Marina Krček and Huimin Li and Guilherme Perin and Lejla Batina and Stjepan Picek
2020/898 ( PDF )
Rapidly Verifiable XMSS Signatures
Joppe W. Bos and Andreas Hülsing and Joost Renes and Christine van Vredendaal
2020/897 ( PDF )
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices
Jan Richter-Brockmann and Tim Güneysu
2020/896 ( PDF )
Fault Injection as an Oscilloscope: Fault Correlation Analysis
Albert Spruyt and Alyssa Milburn and Lukasz Chmielewski
2020/895 ( PDF )
Multi-Currency Ledgers
Joachim Zahnentferner
2020/894 ( PDF )
Nearly Quadratic Broadcast Without Trusted Setup Under Dishonest Majority
Georgios Tsimos and Julian Loss and Charalampos Papamanthou
2020/893 ( PDF )
Toward an Asymmetric White-Box Proposal
Lucas Barthelemy
2020/892 ( PDF )
Pushing the Limits of Fault Template Attacks: The Role of Side-Channels
Sayandeep Saha and Arnab Bag and and Debdeep Mukhopadhyay
2020/891 ( PDF )
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning
Guilherme Perin and Lukasz Chmielewski and Lejla Batina and Stjepan Picek
2020/890 ( PDF )
Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness
Aein Rezaei Shahmirzadi and Amir Moradi
2020/889 ( PDF )
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption
James Bartusek and Yuval Ishai and Aayush Jain and Fermi Ma and Amit Sahai and Mark Zhandry
2020/888 ( PDF )
Machine Learning of Physical Unclonable Functions using Helper Data - Revealing a Pitfall in the Fuzzy Commitment Scheme
Emanuele Strieder and Christoph Frisch and Michael Pehl
2020/887 ( PDF )
Updatable Blockchains
Michele Ciampi and Nikos Karayannidis and Aggelos Kiayias and Dionysis Zindros
2020/886 ( PDF )
Adaptively Secure Revocable Hierarchical IBE from $k$-linear Assumption
Keita Emura and Atsushi Takayasu and Yohei Watanabe
2020/885 ( PDF )
Wendy, the Good Little Fairness Widget
Klaus Kursawe
2020/884 ( PDF )
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model
Linru Zhang and Xiangning Wang and Yuechen Chen and Siu-Ming Yiu
2020/883 ( PDF )
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis
Jeroen Delvaux
2020/882 ( PDF )
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
Willy Susilo and Dung Hoang Duong and Huy Quoc Le and Josef Pieprzyk
2020/881 ( PDF )
Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES
Loďc Masure and Nicolas Belleville and Eleonora Cagli and Marie-Angela Cornelie and Damien Couroussé and Cécile Dumas and Laurent Maingault
2020/880 ( PDF )
Classical Reduction of SVP to LWE: A Concrete Security Analysis
Palash Sarkar and Subhadip Singha
2020/879 ( PDF )
Second-Order Masked Lookup Table Compression Scheme
Annapurna Valiveti and Srinivas Vivek
2020/878 ( PDF )
Bent Boolean functions A better procedure to generate non-crypto 4-bit S-boxes
Sankhanil De and Ranjan Ghosh
2020/877 ( PDF )
Unclonable Decryption Keys
Marios Georgiou and Mark Zhandry
2020/876 ( PDF )
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks
Claude Carlet and Sylvain Guilley and Sihem Mesnager
2020/875 ( PDF )
Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves
Daiki Hayashida and Kenichiro Hayasaka and Tadanori Teruya
2020/874 ( PDF )
New Methods and Abstractions for RSA-Based Forward Secure Signatures
Susan Hohenberger and Brent Waters
2020/873 ( PDF )
Post-Quantum Group Key Agreement Scheme
Julia Bobrysheva and Sergey Zapechnikov
2020/872 ( PDF )
Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis
Gabriel Zaid and Lilian Bossuet and François Dassance and Amaury Habrard and Alexandre Venelli
2020/871 ( PDF )
Quantum Immune One-Time Memories
Qipeng Liu and Amit Sahai and Mark Zhandry
2020/870 ( PDF )
Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN
Yu Yu and Jiang Zhang
2020/869 ( PDF )
An Algorithmic Reduction Theory for Binary Codes: LLL and more
Thomas Debris-Alazard and Léo Ducas and Wessel P.J. van Woerden
2020/868 ( PDF )
SoK: A Taxonomy of Cryptocurrency Wallets
Kostis Karantias
2020/867 ( PDF )
Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks
Ping Wang and Ping Chen and Zhimin Luo and Gaofeng Dong and Mengce Zheng and Nenghai Yu and Honggang Hu
2020/866 ( PDF )
Building a Modern TRNG: An Entropy Source Interface for RISC-V
Markku-Juhani O. Saarinen and G. Richard Newell and Ben Marshall
2020/865 ( PDF )
Agora: A Privacy-Aware Data Marketplace
Vlasis Koutsos and Dimitrios Papadopoulos and Dimitris Chatzopoulos and Sasu Tarkoma and Pan Hui
2020/864 ( PDF )
Linear Complexity Private Set Intersection for Secure Two-Party Protocols
Ferhat Karakoç and Alptekin Küpçü
2020/863 ( PDF )
Privacy-Preserving Automated Exposure Notification
Ran Canetti and Yael Tauman Kalai and Anna Lysyanskaya and Ronald L. Rivest and Adi Shamir and Emily Shen and Ari Trachtenberg and Mayank Varia and Daniel J. Weitzner
2020/862 ( PDF )
Protecting Cryptography Against Compelled Self-Incrimination
Sarah Scheffler and Mayank Varia
2020/861 ( PDF )
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT
Pedro Geraldo M. R. Alves and Jheyne N. Ortiz and Diego F. Aranha
2020/860 ( PDF )
SNARGs for Bounded Depth Computations from Sub-Exponential LWE
Yael Tauman Kalai and Rachel Zhang
2020/859 ( PDF )
A Classification of Computational Assumptions in the Algebraic Group Model
Balthazar Bauer and Georg Fuchsbauer and Julian Loss
2020/858 ( PDF )
Client-oblivious OPRAM
Gareth T. Davies and Christian Janson and Daniel P. Martin
2020/857 ( PDF )
Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party
Ivan Oleynikov and Elena Pagnin and Andrei Sabelfeld
2020/856 ( PDF )
Improving Revocation for Group Signature with Redactable Signature
Olivier Sanders
2020/855 ( PDF )
Fooling primality tests on smartcards
Vladimir Sedlacek and Jan Jancar and Petr Svenda
2020/854 ( PDF )
Designing Reverse Firewalls for the Real World
Angčle Bossuat and Xavier Bultel and Pierre-Alain Fouque and Cristina Onete and Thyla van der Merwe
2020/853 ( PDF )
Linear-Complexity Private Function Evaluation is Practical
Marco Holz and Ágnes Kiss and Deevashwer Rathee and Thomas Schneider
2020/852 ( PDF )
FROST: Flexible Round-Optimized Schnorr Threshold Signatures
Chelsea Komlo and Ian Goldberg
2020/851 ( PDF )
Asynchronous Byzantine Agreement with Subquadratic Communication
Erica Blum and Jonathan Katz and Chen-Da Liu-Zhang and Julian Loss
2020/850 ( PDF )
On the Guaranteed Number of Activations in XS-circuits
Sergey Agievich
2020/849 ( PDF )
Surveying global verifiability
Ben Smyth
2020/848 ( PDF )
On Composability of Game-based Password Authenticated Key Exchange
Marjan Škrobot and Jean Lancrenon
2020/847 ( PDF )
Encrypt-to-self: Securely Outsourcing Storage
Jeroen Pijnenburg and Bertram Poettering
2020/846 ( PDF )
Deep Learning based Differential Distinguisher for Lightweight Cipher PRESENT
Aayush Jain and Varun Kohli and Girish Mishra
2020/845 ( PDF )
Post-Quantum Adaptor Signatures and Payment Channel Networks
Muhammed F. Esgin and Oguzhan Ersoy and Zekeriya Erkin
2020/844 ( PDF )
Generic Superlight Client for Permissionless Blockchains
Yuan Lu and Qiang Tang and Guiling Wang
2020/843 ( PDF )
Dragoon: Private Decentralized HITs Made Practical
Yuan Lu and Qiang Tang and Guiling Wang
2020/842 ( PDF )
Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited
Yuan Lu and Zhenliang Lu and Qiang Tang and Guiling Wang
2020/841 ( PDF )
Dumbo: Faster Asynchronous BFT Protocols
Bingyong Guo and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang
2020/840 ( PDF )
Proof of Storage-Time: Efficiently Checking Continuous Data Availability
Giuseppe Ateniese and Long Chen and Mohammad Etemad and Qiang Tang
2020/839 ( PDF )
Cryptanalysis of a ``Strengthened'' Key Exchange Protocol for IoT, or When SAKE$^+$ Turns Out to Be SAKE$^-$
Loďc Ferreira
2020/838 ( PDF )
PudgyTurtle: variable-length, keystream-dependent encoding to resist time-memory tradeoff attacks
David A August and Anne C Smith
2020/837 ( PDF )
An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes
Daniel Kales and Greg Zaverucha
2020/836 ( PDF )
Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Fabio Campos and Lars Jellema and Mauk Lemmen and Lars Müller and Daan Sprenkels and Benoit Viguier
2020/835 ( PDF )
On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function
Congwei Zhou and Bin Hu and Jie Guan
2020/834 ( PDF )
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison
Eunsang Lee and Joon-Woo Lee and Jong-Seon No and Young-Sik Kim
2020/833 ( PDF )
Secure Update of FPGA-based Secure Elements using Partial Reconfiguration
Florian Unterstein and Tolga Sel and Thomas Zeschg and Nisha Jacob and Michael Tempelmeier and Michael Pehl and Fabrizio De Santis
2020/832 ( PDF )
Round-optimal Black-box Commit-and-prove with Succinct Communication
Susumu Kiyoshima
2020/831 ( PDF )
On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs
Michele Ciampi and Roberto Parisella and Daniele Venturi
2020/830 ( PDF )
Terakey - An Encryption Method Whose Security Can Be Analyzed from First Principles
Arnold G. Reinhold
2020/829 ( PDF )
Refined Analysis of the Asymptotic Complexity of the Number Field Sieve
Aude Le Gluher and Pierre-Jean Spaenlehauer and Emmanuel Thomé
2020/828 ( PDF )
Modified Secure Hashing algorithm(MSHA-512)
Ashoka SB and Lakshmikanth D
2020/827 ( PDF )
Encrypted Blockchain Databases
Daniel Adkins and Archita Agarwal and Seny Kamara and Tarik Moataz
2020/826 ( PDF )
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes
Xuan Thanh Do and Duong Hieu Phan and Moti Yung
2020/825 ( -- withdrawn -- )
Private Set Intersection from TFHE for Cloud Computing Scenarios
Jiayu Qiang and Yi Deng
2020/824 ( PDF )
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC
Fynn Dallmeier and Jan P. Drees and Kai Gellert and Tobias Handirk and Tibor Jager and Jonas Klauke and Simon Nachtigall and Timo Renzelmann and Rudi Wolf
2020/823 ( PDF )
The Provable Security of Ed25519: Theory and Practice
Jacqueline Brendel and Cas Cremers and Dennis Jackson and Mang Zhao
2020/822 ( PDF )
Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries
Kwangsu Lee
2020/821 ( PDF )
Interconnect-Aware Bitstream Modification
Michail Moraitis and Elena Dubrova
2020/820 ( PDF )
On the security of the Rescue hash function
Tim Beyne and Anne Canteaut and Gregor Leander and María Naya-Plasencia and Léo Perrin and Friedrich Wiemer
2020/819 ( PDF )
UC-Secure OT from LWE, Revisited
Willy Quach
2020/818 ( PDF )
Security Limitations of Classical-Client Delegated Quantum Computing
Christian Badertscher and Alexandru Cojocaru and Léo Colisson and Elham Kashefi and Dominik Leichtle and Atul Mantri and Petros Wallden
2020/817 ( PDF )
Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation
Osman Biçer and Alptekin Küpçü
2020/816 ( PDF )
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
Luka Music and Céline Chevalier and Elham Kashefi
2020/815 ( PDF )
Cryptographic Divergences: New Techniques and New Applications
Marc Abboud and Thomas Prest
2020/814 ( PDF )
Incompressible Encodings
Tal Moran and Daniel Wichs
2020/813 ( PDF )
Strengthening Sequential Side-Channel Attacks Through Change Detection
Luca Frittoli and Matteo Bocchi and Silvia Mella and Diego Carrera and Beatrice Rossi and Pasqualina Fragneto and Ruggero Susella and Giacomo Boracchi
2020/812 ( PDF )
Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions
Lior Rotem and Gil Segev
2020/811 ( PDF )
Groth16 SNARKs are Randomizable and (Weakly) Simulation Extractable
Markulf Kohlweiss and Mikhail Volkhov
2020/810 ( PDF )
A Few Explanations for <Fast-to-Finalize Nakamoto-Like Consensus>
Shuyang Tang
2020/809 ( PDF )
On (expected polynomial) runtime in cryptography
Michael Klooß
2020/808 ( PDF )
Security Analysis of Olvid's SAS-based Trust Establishment Protocol
Michel Abdalla
2020/807 ( PDF )
Secure merge with $O(n \log \log n)$ secure operation
Brett Hemenway Falk and Rafail Ostrovsky
2020/806 ( PDF )
Toward Comparable Homomorphic Encryption for Crowd-sensing Network
Daxin Huang and Qingqing Gan and Xiaoming Wang and Chengpeng Huang and Yijian Lin
2020/805 ( PDF )
Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud
Furkan Turan and Ingrid Verbauwhede
2020/804 ( PDF )
Lightweight Ciphers on a 65 nm ASIC - A Comparative Study on Energy Consumption
Bastian Richter and Amir Moradi
2020/803 ( PDF )
Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA
Weiqiong Cao and Hongsong Shi and Hua Chen and Jiazhe Chen and Limin Fan and Wenling Wu
2020/802 ( PDF )
Quantum Attacks on HCTR and its Variants
Mostafizar Rahman and Goutam Paul
2020/801 ( PDF )
Not enough LESS: An improved algorithm for solving Code Equivalence Problems over $\mathbb{F}_q$
Ward Beullens
2020/800 ( PDF )
Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements
Mihir Bellare and Wei Dai and Phillip Rogaway
2020/799 ( PDF )
Secure Generalized Deduplication via Multi-Key Revealing Encryption
Daniel E. Lucani and Lars Nielsen and Claudio Orlandi and Elena Pagnin and Rasmus Vestergaard
2020/798 ( PDF )
Superposition Attack on OT Protocols
Ehsan Ebrahimi and Céline Chevalier and Marc Kaplan and Michele Minelli
2020/797 ( PDF )
Fast, Small, and Area-Time Efficient Architectures for Key-Exchange on Curve25519
Mojtaba Bisheh Niasar and Rami El Khatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2020/796 ( PDF )
A Generalization of Paillier's Public-Key System With Fast Decryption
Ying Guo and Zhenfu Cao and Xiaolei Dong
2020/795 ( PDF )
Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches
Viet Ba Dang and Farnoud Farahmand and Michal Andrzejczak and Kamyar Mohajerani and Duc Tri Nguyen and Kris Gaj
2020/794 ( PDF )
Symbolic and Computational Reasoning About Cryptographic Modes of Operation
Catherine Meadows
2020/793 ( PDF )
PHyCT : Privacy preserving Hybrid Contact Tracing
Mahabir Prasad Jhanwar and Sumanta Sarkar
2020/792 ( PDF )
Trace-$\Sigma$: a privacy-preserving contact tracing app
Jean-François Biasse and Sriram Chellappan and Sherzod Kariev and Noyem Khan and Lynette Menezes and Efe Seyitoglu and Charurut Somboonwit and Attila Yavuz
2020/791 ( PDF )
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies
Chaya Ganesh and Claudio Orlandi and Daniel Tschudi and Aviv Zohar
2020/790 ( PDF )
Anonymity and Rewards in Peer Rating Systems
Lydia Garms and Siaw-Lynn Ng and Elizabeth A. Quaglia and Giulia Traverso
2020/789 ( PDF )
Double-Authentication-Preventing Signatures in the Standard Model
Dario Catalano and Georg Fuchsbauer and Azam Soleimanian
2020/788 ( PDF )
Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model
Michel Abdalla and Florian Bourse and Hugo Marival and David Pointcheval and Azam Soleimanian and Hendrik Waldner
2020/787 ( PDF )
A Note on Separating Classical and Quantum Random Oracles
Takashi Yamakawa and Mark Zhandry
2020/786 ( PDF )
Random Probing Security: Verification, Composition, Expansion and New Constructions
Sonia Belaďd and Jean-Sébastien Coron and Emmanuel Prouff and Matthieu Rivain and Abdul Rahman Taleb
2020/785 ( PDF )
The Memory-Tightness of Authenticated Encryption
Ashrujit Ghoshal and Joseph Jaeger and Stefano Tessaro
2020/784 ( PDF )
CRAFT: Composable Randomness and Almost Fairness from Time
Carsten Baum and Bernardo David and Rafael Dowsley and Jesper Buus Nielsen and Sabine Oechsner
2020/783 ( PDF )
Adventures in Crypto Dark Matter: Attacks, Fixes and Analysis for Weak Pseudorandom Function Candidates
Jung Hee Cheon and Wonhee Cho and Jeong Han Kim and Jiseung Kim
2020/782 ( PDF )
A Love Affair Between Bias Amplifiers and Broken Noise Sources
George Teseleanu
2020/781 ( PDF )
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff
Haibo Zhou and Rui Zong and Xiaoyang Dong and Keting Jia and Willi Meier
2020/780 ( PDF )
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10
Daniel De Almeida Braga and Pierre-Alain Fouque and Mohamed Sabt
2020/779 ( PDF )
Non-Malleable Time-Lock Puzzles and Applications
Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass
2020/778 ( PDF )
SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT
Seyed Farhad Aghili and Amirhossein Adavoudi Jolfaei and Aysajan Abidin
2020/777 ( PDF )
Dynamic Universal Accumulator with Batch Update over Bilinear Groups
Giuseppe Vitto and Alex Biryukov
2020/776 ( PDF )
Non-Malleable Codes for Bounded Polynomial Depth Tampering
Dana Dachman-Soled and Ilan Komargodski and Rafael Pass
2020/775 ( PDF )
Improved Differential-Linear Attacks with Applications to ARX Ciphers
Christof Beierle and Gregor Leander and Yosuke Todo
2020/774 ( PDF )
Timelocked Bribes
Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer
2020/773 ( PDF )
An Instruction Set Extension to Support Software-Based Masking
Johann Großschädl and Ben Marshall and Dan Page and Thinh Pham and Francesco Regazzoni
2020/772 ( PDF )
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs
Alex Lombardi and Vinod Vaikuntanathan
2020/771 ( PDF )
Leakage-Resilient Key Exchange and Two-Seed Extractors
Xin Li and Fermi Ma and Willy Quach and Daniel Wichs
2020/770 ( PDF )
Time-Space Tradeoffs and Short Collisions in Merkle-Damgĺrd Hash Functions
Akshima and David Cash and Andrew Drucker and Hoeteck Wee
2020/769 ( PDF )
Lattice-Based Blind Signatures, Revisited
Eduard Hauck and Eike Kiltz and Julian Loss and Ngoc Khanh Nguyen
2020/768 ( PDF )
Perfect Zero Knowledge: New Upperbounds and Relativized Separations
Peter Dixon and Sutanu Gayen and A. Pavan and N. V. Vinodchandran
2020/767 ( PDF )
Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability
Carsten Baum and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez
2020/766 ( PDF )
The uncertainty of Side-Channel Analysis: A way to leverage from heuristics
Unai Rioja and Servio Paguada and Lejla Batina and Igor Armendariz
2020/765 ( PDF )
Handling Adaptive Compromise for Practical Encryption Schemes
Joseph Jaeger and Nirvan Tyagi
2020/764 ( PDF )
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification
Romain Gay and Aayush Jain and Huijia Lin and Amit Sahai
2020/763 ( PDF )
Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol
Jia Xu and Yiwen Gao and Hoonwei Lim
2020/762 ( PDF )
Functional Encryption for Attribute-Weighted Sums from $k$-Lin
Michel Abdalla and Junqing Gong and Hoeteck Wee
2020/761 ( PDF )
Decentralized reputation
Tassos Dimitriou
2020/760 ( PDF )
Curves with fast computations in the first pairing group
Rémi Clarisse and Sylvain Duquesne and Olivier Sanders
2020/759 ( PDF )
Chosen Ciphertext Security from Injective Trapdoor Functions
Susan Hohenberger and Venkata Koppula and Brent Waters
2020/758 ( PDF )
Verifiable state machines: Proofs that untrusted services operate correctly
Srinath Setty and Sebastian Angel and Jonathan Lee
2020/757 ( PDF )
Understanding Methodology for Efficient CNN Architectures in Profiling Attacks
Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli
2020/756 ( PDF )
Provable Security Analysis of FIDO2
Shan Chen and Manuel Barbosa and Alexandra Boldyreva and Bogdan Warinschi
2020/755 ( PDF )
Time-release Cryptography from Minimal Circuit Assumptions
Samuel Jaques and Hart Montgomery and Arnab Roy
2020/754 ( PDF )
Fluid MPC: Secure Multiparty Computation with Dynamic Participants
Arka Rai Choudhuri and Aarushi Goel and Matthew Green and Abhishek Jain and Gabriel Kaptchuk
2020/753 ( PDF )
Compressing Proofs of $k$-Out-Of-$n$ Partial Knowledge
Thomas Attema and Ronald Cramer and Serge Fehr
2020/752 ( PDF )
Continuous Group Key Agreement with Active Security
Joël Alwen and Sandro Coretti and Daniel Jost and Marta Mularczyk
2020/751 ( PDF )
DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
Nils Albartus and Max Hoffmann and Sebastian Temme and Leonid Azriel and Christof Paar
2020/750 ( PDF )
Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging
Max Hoffmann and Christof Paar
2020/749 ( PDF )
Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al.
Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang
2020/748 ( PDF )
Anonymous probabilistic payment in payment hub
Tatsuo Mitani and Akira Otsuka
2020/747 ( PDF )
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups
Karim Eldefrawy and Seoyeon Hwang and Rafail Ostrovsky and Moti Yung
2020/746 ( PDF )
Comparison of RISC-V and transport triggered architectures for a post-quantum cryptography application
Latif AKÇAY and Berna ÖRS
2020/745 ( PDF )
True Random Number Generation Based on DNA molecule Genetic Information (DNA-TRNG)
Siddaramappa V and Ramesh K B
2020/744 ( PDF )
New results on Gimli: full-permutation distinguishers and improved collisions
Antonio Flórez Gutiérrez and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and André Schrottenloher and Ferdinand Sibleyras
2020/743 ( PDF )
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
Qian Guo and Thomas Johansson and Alexander Nilsson
2020/742 ( PDF )
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures
Jan Richter-Brockmann and Tim Güneysu
2020/741 ( PDF )
Fast Privacy-Preserving Punch Cards
Saba Eskandarian
2020/740 ( PDF )
Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback
Erica Blum and Chen-Da Liu-Zhang and Julian Loss
2020/739 ( PDF )
Generic Constructions of Incremental and Homomorphic Timed-Release Encryption
Peter Chvojka and Tibor Jager and Daniel Slamanig and Christoph Striecks
2020/738 ( PDF )
GIFT-COFB
Subhadeep Banik and Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi and Thomas Peyrin and Yu Sasaki and Siang Meng Sim and Yosuke Todo
2020/737 ( PDF )
A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge
Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
2020/736 ( PDF )
Forward-Security Under Continual Leakage with Deterministic Key Updates
Suvradip Chakraborty and Harish Karthikeyan and Adam O'Neill and C. Pandu Rangan
2020/735 ( PDF )
Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger
Heewon Chung and Kyoohyung Han and Chanyang Ju and Myungsun Kim and Jae Hong Seo
2020/734 ( PDF )
Mirror Theory: A simple proof of the Pi+Pj Theorem with xi_max=2
Benoît Cogliati and Jacques Patarin
2020/733 ( PDF )
A Side-Channel Resistant Implementation of SABER
Michiel Van Beirendonck and Jan-Pieter D'Anvers and Angshuman Karmakar and Josep Balasch and Ingrid Verbauwhede
2020/732 ( PDF )
Security of Multi-Adjustable Join Schemes: Separations and Implications
Mojtaba Rafiee and Shahram Khazaei
2020/731 ( PDF )
The Exact Security of PMAC with Three Powering-Up Masks
Yusuke Naito
2020/730 ( PDF )
On the Security of Time-Locked Puzzles and Timed Commitments
Jonathan Katz and Julian Loss and Jiayu Xu
2020/729 ( PDF )
Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF
Melissa Chase and Peihan Miao
2020/728 ( PDF )
Minerva: The curse of ECDSA nonces
Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys
2020/727 ( PDF )
An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers
Adrian Ranea and Yunwen Liu and Tomer Ashur
2020/726 ( PDF )
On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments
Denis Diemert and Tibor Jager
2020/725 ( PDF )
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model
Gianluca Brian and Antonio Faonio and Maciej Obremski and Mark Simkin and Daniele Venturi
2020/724 ( PDF )
Multi-Party Revocation in Sovrin: Performance through Distributed Trust
Lukas Helminger and Daniel Kales and Sebastian Ramacher and Roman Walch
2020/723 ( PDF )
On the Confidentiality of Amounts in Grin
Suyash Bagad and Saravanan Vijayakumaran
2020/722 ( PDF )
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
Yehuda Afek and Anat Bremler-Barr and Lior Shafir
2020/721 ( PDF )
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Fabian Boemer and Rosario Cammarota and Daniel Demmler and Thomas Schneider and Hossein Yalame
2020/720 ( PDF )
Fast algebraic immunity of Boolean functions and LCD codes
Sihem Mesnager and Chunming Tang
2020/719 ( PDF )
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes
Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai
2020/718 ( PDF )
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Marc Fischlin and Felix Günther and Christian Janson
2020/717 ( PDF )
Fault Location Identification By Machine Learning
Anubhab Baksi and Santanu Sarkar and Akhilesh Siddhanti and Ravi Anand and Anupam Chattopadhyay
2020/716 ( PDF )
Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function
Takeshi Sugawara and Tatsuya Onuma and Yang Li
2020/715 ( PDF )
On (impracticality of) transfinite symmetric encryption with keys smaller than messages under GCH
Sergij V. Goncharov
2020/714 ( PDF )
One-One Constrained Pseudorandom Functions
Naty Peter and Rotem Tsabary and Hoeteck Wee
2020/713 ( PDF )
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism
Yi-Fan Tseng and Zi-Yuan Liu and Raylin Tso
2020/712 ( PDF )
Anonymous IBE From Quadratic Residuosity With Fast Encryption
Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jinwen Zheng
2020/711 ( PDF )
Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation
Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
2020/710 ( PDF )
Rational Behavior in Committee-Based Blockchains
Yackolley Amoussou-Guenou and Bruno Biais and Maria Potop-Butucaru and Sara Tucci-Piergiovanni
2020/709 ( PDF )
Reputable List Curation from Decentralized Voting
Elizabeth C. Crites and Mary Maller and Sarah Meiklejohn and Rebekah Mercer
2020/708 ( PDF )
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations
Ben Nassi and Yaron Pirutin and Adi Shamir and Yuval Elovici and Boris Zadov
2020/707 ( PDF )
Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k))
Martin R. Albrecht and Shi Bai and Pierre-Alain Fouque and Paul Kirchner and Damien Stehlé and Weiqiang Wen
2020/706 ( PDF )
A Logic Synthesis Toolbox for Reducing the Multiplicative Complexity in Logic Networks
Eleonora Testa and Mathias Soeken and Heinz Riener and Luca Amaru and Giovanni De Micheli
2020/705 ( PDF )
On the minimal value set size of APN functions
Ingo Czerwinski
2020/704 ( PDF )
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead
James Bell and K. A. Bonawitz and Adriŕ Gascón and Tancrčde Lepoint and Mariana Raykova
2020/703 ( PDF )
New Complexity Estimation on the Rainbow-Band-Separation Attack
Shuhei Nakamura and Yasuhiko Ikematsu and Yacheng Wang and Jintai Ding and Tsuyoshi Takagi
2020/702 ( PDF )
Rainbow Band Separation is Better than we Thought
Ray Perlner and Daniel Smith-Tone
2020/701 ( PDF )
MPC with Friends and Foes
Bar Alon and Eran Omri and Anat Paskin-Cherniavsky
2020/700 ( PDF )
Personal data exchange protocol: X
Vladimir Belsky and Ilia Gerasimov and Kirill Tsaregorodtsev and Ivan Chizhov
2020/699 ( PDF )
Looking at the NIST Lightweight Candidates from a Masking Point-of-View
Lauren De Meyer
2020/698 ( -- withdrawn -- )
Forgery attack on the authentication encryption GIFT-COFB
Zhe CEN and Xiutao FENG and Zhangyi Wang and Chunping CAO
2020/697 ( PDF )
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
F. Boudot and P. Gaudry and A. Guillevic and N. Heninger and E. Thomé and P. Zimmermann
2020/696 ( PDF )
An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials
Yin Li and Yu Zhang
2020/695 ( PDF )
Collusion Resistant Watermarkable PRFs from Standard Assumptions
Rupeng Yang and Man Ho Au and Zuoxia Yu and Qiuliang Xu
2020/694 ( PDF )
The nearest-colattice algorithm
Thomas Espitau and Paul Kirchner
2020/693 ( PDF )
Tight Quantum Time-Space Tradeoffs for Function Inversion
Kai-Min Chung and Siyao Guo and Qipeng Liu and Luowen Qian
2020/692 ( PDF )
Optimizing Inner Product Masking Scheme by A Coding Theory Approach
Wei Cheng and Sylvain Guilley and Claude Carlet and Sihem Mesnager and Jean-Luc Danger
2020/691 ( PDF )
LSS Homomorphisms and Applications to Secure Signatures, Proactive Secret Sharing and Input Certification
Diego Aranha and Anders Dalskov and Daniel Escudero and Claudio Orlandi
2020/690 ( PDF )
SAFE: A Secure and Efficient Long-Term Distributed Storage System
Johannes Buchmann and Ghada Dessouky and Tommaso Frassetto and Ágnes Kiss and Ahmad-Reza Sadeghi and Thomas Schneider and Giulia Traverso and Shaza Zeitouni
2020/689 ( PDF )
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64
Orr Dunkelman and Senyang Huang and Eran Lambooij and Stav Perle
2020/688 ( PDF )
Lin2-Xor Lemma and Log-size Linkable Ring Signature
Anton A. Sokolov
2020/687 ( PDF )
Lower Bounds on the Time/Memory Tradeoff of Function Inversion
Dror Chawin and Iftach Haitner and Noam Mazor
2020/686 ( PDF )
A Level Dependent Authentication for IoT Paradigm
Chintan Patel and Nishant Doshi
2020/685 ( PDF )
Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors
Leo de Castro and Chiraag Juvekar and Vinod Vaikuntanathan
2020/684 ( PDF )
Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE)
Ghada Arfaoui and Olivier Blazy and Xavier Bultel and Pierre-Alain Fouque and Adina Nedelcu and Cristina Onete
2020/683 ( PDF )
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model
Abida Haque and Stephan Krenn and Daniel Slamanig and Christoph Striecks
2020/682 ( PDF )
Succinct Diophantine-Satisfiability Arguments
Patrick Towa and Damien Vergnaud
2020/681 ( PDF )
An F-algebra for analysing information leaks in the presence of glitches
Vittorio Zaccaria
2020/680 ( PDF )
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition
Sumanta Sarkar and Yu Sasaki and Siang Meng Sim
2020/679 ( PDF )
BETA: Biometric Enabled Threshold Authentication
Shashank Agrawal and Saikrishna Badrinarayanan and Payman Mohassel and Pratyay Mukherjee and Sikhar Patranabis
2020/678 ( PDF )
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures
Alexander Munch-Hansen and Claudio Orlandi and Sophia Yakoubov
2020/677 ( PDF )
Blockchain with Varying Number of Players
T-H. Hubert Chan and Naomi Ephraim and Antonio Marcedone and Andrew Morgan and Rafael Pass and Elaine Shi
2020/676 ( PDF )
An airdrop that preserves recipient privacy
Riad S. Wahby and Dan Boneh and Christopher Jeffrey and Joseph Poon
2020/675 ( PDF )
Ledger Combiners for Fast Settlement
Matthias Fitzi and Peter Gazi and Aggelos Kiayias and Alexander Russell
2020/674 ( PDF )
Coercion-Resistant Blockchain-Based E-Voting Protocol
Chiara Spadafora and Riccardo Longo and Massimiliano Sala
2020/673 ( PDF )
LotMint: Blockchain Returning to Decentralization with Decentralized Clock
Wenbo MAO and Wenxiang WANG
2020/672 ( PDF )
A Survey of Automatic Contact Tracing Approaches
Leonie Reichert and Samuel Brack and Björn Scheuermann
2020/671 ( PDF )
Persistent Fault Analysis With Few Encryptions
Sebastien Carre and Sylvain Guilley and Olivier Rioul
2020/670 ( PDF )
Inverse-Sybil Attacks in Automated Contact Tracing
Crypto Group at IST Austria
2020/669 ( PDF )
Proof of Mirror Theory for $\xi_{\max}=2$
Avijit Dutta and Mridul Nandi and Abishanka Saha
2020/668 ( PDF )
On Subversion-Resistant SNARKs
Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michał Zając
2020/667 ( PDF )
New Results on the SymSum Distinguisher on Round-Reduced SHA3
Sahiba Suryawanshi and Dhiman Saha and Satyam Sachan
2020/666 ( PDF )
Revisiting the Hardness of Binary Error LWE
Chao Sun, Mehdi Tibouchi and Masayuki Abe
2020/665 ( PDF )
Montgomery-friendly primes and applications to cryptography
Jean Claude Bajard and Sylvain Duquesne
2020/664 ( PDF )
The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs
Amos Beimel and Oriol Farrŕs
2020/663 ( PDF )
Super-Linear Time-Memory Trade-Offs for Symmetric Encryption
Wei Dai and Stefano Tessaro and Xihu Zhang
2020/662 ( PDF )
Multi-Party Computation Mechanism for Anonymous Equity Block Trading: A Secure Implementation of Turquoise Plato Uncross
John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui
2020/661 ( PDF )
Tight Consistency Bounds for Bitcoin
Peter Gaži and Aggelos Kiayias and Alexander Russell
2020/660 ( PDF )
Faster Software Implementation of the SIKE Protocol Based on A New Data Representation
Jing Tian and Piaoyang Wang and Zhe Liu and Jun Lin and Zhongfeng Wang and Johann Großschädl
2020/659 ( PDF )
Software Evaluation of Grain-128AEAD for Embedded Platforms
Alexander Maximov and Martin Hell
2020/658 ( PDF )
Time-Specific Signatures
Masahito Ishizaka and Shinsaku Kiyomoto
2020/657 ( PDF )
Traceable Constant-Size Multi-Authority Credentials
Chloé Hébant and David Pointcheval
2020/656 ( PDF )
On Length Independent Security Bounds for the PMAC Family
Bishwajit Chakraborty and Soumya Chattopadhyay and Ashwin Jha and Mridul Nandi
2020/655 ( PDF )
Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel
Yoo-Seung Won and Dirmanto Jap and Shivam Bhasin
2020/654 ( PDF )
Proximity Gaps for Reed-Solomon Codes
Eli Ben-Sasson and Dan Carmon and Yuval Ishai and Swastik Kopparty and Shubhangi Saraf
2020/653 ( PDF )
MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation
Zhen Hang Jiang and Yunsi Fei and Aidong Adam Ding and Thomas Wahl
2020/652 ( PDF )
Somewhere Statistically Binding Commitment Schemes with Applications
Prastudy Fauzi and Helger Lipmaa and Zaira Pindado and Janno Siim
2020/651 ( PDF )
Cryptanalysis of ``FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things''
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso
2020/650 ( PDF )
End-to-End Verifiable E-Voting Trial for Polling Station Voting
Feng Hao and Shen Wang and Samiran Bag and Rob Procter and Siamak Shahandashti and Maryam Mehrnezhad and Ehsan Toreini and Roberto Metere and Lana Liu
2020/649 ( PDF )
NIZK from SNARG
Fuyuki Kitagawa and Takahiro Matsuda and Takashi Yamakawa
2020/648 ( PDF )
Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust
Yuncong Hu and Sam Kumar and Raluca Ada Popa
2020/647 ( PDF )
A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes
Saeid Esmaeilzade and Ziba Eslami and Nasrollah Pakniat
2020/646 ( PDF )
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices
Ward Beullens and Shuichi Katsumata and Federico Pintore
2020/645 ( PDF )
Correlation distribution analysis of a two-round key-alternating block cipher
Liliya Kraleva and Nikolai L. Manev and Vincent Rijmen
2020/644 ( PDF )
ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing
Ignacio Cascudo and Bernardo David
2020/643 ( PDF )
About Blockchain Interoperability
Pascal Lafourcade and Marius Lombard-Platet
2020/642 ( PDF )
The Ritva Blockchain: Enabling Confidential Transactions at Scale
Henri Aare and Peter Vitols
2020/641 ( PDF )
Overview of Polkadot and its Design Considerations
Jeff Burdges and Alfonso Cevallos and Peter Czaban and Rob Habermeier and Syed Hosseini and Fabio Lama and Handan Kilinc Alper and Ximin Luo and Fatemeh Shirazi and Alistair Stewart and Gavin Wood
2020/640 ( PDF )
Grover on SPECK: Quantum Resource Estimates
Kyungbae Jang and Seungjoo Choi and Hyeokdong Kwon and Hwajeong Seo
2020/639 ( PDF )
Indistinguishability obfuscation for quantum circuits of low T-count
Anne Broadbent and Raza Ali Kazmi
2020/638 ( PDF )
Delay Encryption
Jeffrey Burdges and Luca De Feo
2020/637 ( PDF )
DABANGG: Time for Fearless Flush based Cache Attacks
Anish Saxena and Biswabandan Panda
2020/636 ( PDF )
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations
Erik-Oliver Blass and Florian Kerschbaum
2020/635 ( PDF )
Two-Round Oblivious Linear Evaluation from Learning with Errors
Pedro Branco and Nico Döttling and Paulo Mateus
2020/634 ( PDF )
SILVER - Statistical Independence and Leakage Verification
David Knichel and Pascal Sasdrich and Amir Moradi
2020/633 ( PDF )
Weak instances of SIDH variants under improved torsion-point attacks
Péter Kutas and Chloe Martindale and Lorenz Panny and Christophe Petit and Katherine E. Stange
2020/632 ( PDF )
Proposing an MILP-based Method for the Experimental Verification of Difference Trails
Sadegh Sadeghi and Vincent Rijmen and Nasour Bagheri
2020/631 ( PDF )
Simultaneous Diagonalization of Incomplete Matrices and Applications
Jean-Sébastien Coron and Luca Notarnicola and Gabor Wiese
2020/630 ( PDF )
ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy
Zhiguo Wan and Xiaotong Liu
2020/629 ( PDF )
Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer
Vivek Arte and Mihir Bellare
2020/628 ( PDF )
A post-quantum key exchange protocol from the intersection of quadric surfaces
Daniele Di Tullio and Manoj Gyawali
2020/627 ( PDF )
Attacking Zcash For Fun And Profit
Duke Leto and The Hush Developers
2020/626 ( PDF )
Game theoretical framework for analyzing Blockchains Robustness
Paolo Zappalŕ and Marianna Belotti and Maria Potop-Butucaru and Stefano Secci
2020/625 ( PDF )
Probability theory and public-key cryptography
Mariya Bessonov and Dima Grigoriev and Vladimir Shpilrain
2020/624 ( PDF )
RSA for poor men: a cryptosystem based on probable primes to base 2 numbers
Marek Wójtowicz
2020/623 ( PDF )
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
Jason H. M. Ying and Shuwei Cao and Geong Sen Poh and Jia Xu and Hoon Wei Lim
2020/622 ( PDF )
The Direction of Updatable Encryption does not Matter Much
Yao Jiang
2020/621 ( PDF )
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
Junbin Fang and Dominique Unruh and Jian Weng and Jun Yan and Dehua Zhou
2020/620 ( PDF )
Private Identity Agreement for Private Set Functionalities
Ben Kreuter and Sarvar Patel and Ben Terner
2020/619 ( PDF )
Security Analysis of NIST CTR-DRBG
Viet Tung Hoang and Yaobin Shen
2020/618 ( PDF )
Bounds on Ad Hoc Threshold Encryption
Ivan Damgĺrd and Sophia Yakoubov
2020/617 ( PDF )
New Techniques in Replica Encodings with Client Setup
Rachit Garg and George Lu and Brent Waters
2020/616 ( PDF )
Master-Key KDM-Secure IBE from Pairings
Sanjam Garg and Romain Gay and Mohammad Hajiabadi
2020/615 ( PDF )
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
Diego F. Aranha and Felipe Rodrigues Novaes and Akira Takahashi and Mehdi Tibouchi and Yuval Yarom
2020/614 ( PDF )
Lattice-Based E-Cash, Revisited
Amit Deo and Benoit Libert and Khoa Nguyen and Olivier Sanders
2020/613 ( PDF )
SiGamal: A supersingular isogeny-based PKE and its application to a PRF
Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi
2020/612 ( PDF )
Key Assignment Schemes with Authenticated Encryption, revisited
Jeroen Pijnenburg and Bertram Poettering
2020/611 ( PDF )
Efficient and Fast Hardware Architectures for SIKE Round 2 on FPGA
Rami Elkhatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2020/610 ( PDF )
Stronger Multilinear Maps from Indistinguishability Obfuscation
Navid Alamati and Hart Montgomery and Sikhar Patranabis
2020/609 ( PDF )
Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers
Behnaz Rezvani and Thomas Conroy and Luke Beckwith and Matthew Bozzay and Trevor Laffoon and David McFeeters and Yijia Shi and Minh Vu and William Diehl
2020/608 ( PDF )
Low-latency Meets Low-area: An Improved Bit-Sliding Technique for AES, SKINNY and GIFT
Fatih Balli and Andrea Caforio and Subhadeep Banik
2020/607 ( PDF )
Energy Analysis of Lightweight AEAD Circuits
Andrea Caforio and Fatih Balli and Subhadeep Banik
2020/606 ( PDF )
Ring Key-Homomorphic Weak PRFs and Applications
Navid Alamati and Hart Montgomery and Sikhar Patranabis
2020/605 ( PDF )
LUSA: the HPC library for lattice-based cryptanalysis
Artur Mariano
2020/604 ( PDF )
Perfectly Secure Oblivious Parallel RAM with $O(\log^3 N/ \log \log N)$ Overhead
T-H. Hubert Chan and Wei-Kai Lin and Kartik Nayak and Elaine Shi
2020/603 ( PDF )
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification
Gilles Barthe and Marc Gourjon and Benjamin Gregoire and Maximilian Orlt and Clara Paglialonga and Lars Porth
2020/602 ( PDF )
CENCPP* - Beyond-birthday-secure Encryption from Public Permutations
Arghya Bhattacharjee and Avijit Dutta and Eik List and Mridul Nandi
2020/601 ( PDF )
Everything is a Race and Nakamoto Always Wins
Amir Dembo and Sreeram Kannan and Ertem Nusret Tas and David Tse and Pramod Viswanath and Xuechao Wang and Ofer Zeitouni
2020/600 ( PDF )
Multi-Party Threshold Private Set Intersection with Sublinear Communication
Saikrishna Badrinarayanan and Peihan Miao and Peter Rindal
2020/599 ( PDF )
Private Matching for Compute
Prasad Buddhavarapu and Andrew Knox and Payman Mohassel and Shubho Sengupta and Erik Taubeneck and Vlad Vlaskin
2020/598 ( PDF )
Cryptanalysis of Au et al. Dynamic Universal Accumulator
Alex Biryukov and Aleksei Udovenko and Giuseppe Vitto
2020/597 ( PDF )
Bitstream Modification of Trivium
Kalle Ngo and Elena Dubrova and Michail Moraitis
2020/596 ( PDF )
On quantum indistinguishability under chosen plaintext attack
Tore Vincent Carstens and Ehsan Ebrahimi and Gelo Tabia and and Dominique Unruh
2020/595 ( PDF )
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption
Masahito Ishizaka and Shinsaku Kiyomoto
2020/594 ( PDF )
LESS is More: Code-Based Signatures without Syndromes
Jean-Francois Biasse and Giacomo Micheli and Edoardo Persichetti and Paolo Santini
2020/593 ( PDF )
Alt-Coin Traceability
Claire Ye and Chinedu Ojukwu and Anthony Hsu and Ruiqi Hu
2020/592 ( PDF )
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning
Nishat Koti and Mahak Pancholi and Arpita Patra and Ajith Suresh
2020/591 ( PDF )
Automatic Verification of Differential Characteristics: Application to Reduced Gimli (Full Version)
Fukang Liu and Takanori Isobe and Willi Meier
2020/590 ( PDF )
Expected Constant Round Byzantine Broadcast under Dishonest Majority
Jun Wan and Hanshen Xiao and Elaine Shi and Srinivas Devadas
2020/589 ( PDF )
Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity
Mykhailo Kasianchuk and Mikolaj Karpinski and Roman Kochan and Volodymyr Karpinskyi and Grzegorz Litawa and Inna Shylinska and Igor Yakymenko
2020/588 ( PDF )
Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS
ZaHyun Koo and Jong-Seon No and Young-Sik Kim
2020/587 ( PDF )
MoniPoly---An Expressive $q$-SDH-Based Anonymous Attribute-Based Credential System
Syh-Yuan Tan and Thomas Gross
2020/586 ( PDF )
Component-Based Comparison of Privacy-First Exposure Notification Protocols
Ellie Daw
2020/585 ( PDF )
Improving Key Mismatch Attack on NewHope with Fewer Queries
Satoshi Okada and Yuntao Wang and Tsuyoshi Takagi
2020/584 ( PDF )
vCNN: Verifiable Convolutional Neural Network
Seunghwa Lee and Hankyung Ko and Jihye Kim and Hyunok Oh
2020/583 ( PDF )
A New Targeted Password Guessing Model
Xie Zhijie and Zhang Min and Yin Anqi and Li Zhenhan
2020/582 ( PDF )
Risk and Architecture factors in Digital Exposure Notification
Archanaa S. Krishnan and Yaling Yang and Patrick Schaumont
2020/581 ( PDF )
The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency
Benny Applebaum and Eliran Kachlon and Arpita Patra
2020/580 ( PDF )
TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation
Alexei Zamyatin and Zeta Avarikioti and Daniel Perez and William J. Knottenbelt
2020/579 ( PDF )
BitFund: A Benevolent Blockchain Funding Network
Darrow R Hartman
2020/578 ( PDF )
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
Zhuotao Liu and Yangxi Xiang and Jian Shi and Peng Gao and Haoyu Wang and Xusheng Xiao and Bihan Wen and Yih-Chun Hu
2020/577 ( PDF )
Inner-Product Functional Encryption with Fine-Grained Access Control
Michel Abdalla and Dario Catalano and Romain Gay and Bogdan Ursu
2020/576 ( PDF )
How Low Can We Go?
Yuval Ishai
2020/575 ( PDF )
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption
Sanjit Chatterjee and R. Kabaleeshwaran
2020/574 ( PDF )
Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization
Ming Li, Anjia Yang, Xinkai Chen
2020/573 ( PDF )
Quantifying the Security Cost of Migrating Protocols to Practice
Christopher Patton and Thomas Shrimpton
2020/572 ( PDF )
HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms)
Marina Polubelova and Karthikeyan Bhargavan and Jonathan Protzenko and Benjamin Beurdouche and Aymeric Fromherz and Natalia Kulatova and Santiago Zanella-Béguelin
2020/571 ( PDF )
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers
Anubhab Baksi and Jakub Breier and Xiaoyang Dong and Chen Yi
2020/570 ( PDF )
On Optimality of d + 1 TI Shared Functions of 8 Bits or Less
Dušan Božilov
2020/569 ( PDF )
QA-NIZK Arguments of Same Opening for Bilateral Commitments
Carla Rŕfols and Javier Silva
2020/568 ( PDF )
Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy)
Tomer Ashur and Siemen Dhooghe
2020/567 ( PDF )
An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster
Yi Liu and Qi Wang and Siu-Ming Yiu
2020/566 ( PDF )
Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain
Auqib Hamid Lone and Roohie Naaz
2020/565 ( PDF )
Homomorphic Computation in Reed-Muller Codes
Jinkyu Cho and Young-Sik Kim and Jong-Seon No
2020/564 ( PDF )
Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
Mahmoud Yehia and Riham AlTawy and T. Aaron Gulliver
2020/563 ( PDF )
Secure large-scale genome-wide association studies using homomorphic encryption
Marcelo Blatt and Alexander Gusev and Yuriy Polyakov and Shafi Goldwasser
2020/562 ( PDF )
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
Hocheol Shin and Juhwan Noh and Dohyun Kim and Yongdae Kim
2020/561 ( PDF )
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
Fukang Liu and Takanori Isobe and Willi Meier
2020/560 ( PDF )
ZeroJoin: Combining ZeroCoin and CoinJoin
Alexander Chepurnoy and Amitabh Saxena
2020/559 ( PDF )
Striking the Balance: Effective yet Privacy Friendly Contact Tracing
Giuseppe Garofalo and Tim Van hamme and Davy Preuveneers and Wouter Joosen and Aysajan Abidin and Mustafa A. Mustafa
2020/558 ( PDF )
BSPL: Balanced Static Power Logic
Bijan Fadaeinia and Thorben Moos and Amir Moradi
2020/557 ( PDF )
On the sensitivity of some APN permutations to swapping points
Lilya Budaghyan and Nikolay Kaleyski and Constanza Riera and Pantelimon Stanica
2020/556 ( PDF )
Kerckhoffs' Legacy
Jean-Claude Caraco and Rémi Géraud-Stewart and David Naccache
2020/555 ( PDF )
Splitting Payments Locally While Routing Interdimensionally
Lisa Eckey and Sebastian Faust and Kristina Hostáková and Stefanie Roos
2020/554 ( PDF )
Bitcoin-Compatible Virtual Channels
Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostáková and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi
2020/553 ( PDF )
Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT
Hu Xiong and Jinhao Chen and Minghao Yang and Xin Huang
2020/552 ( PDF )
Optimal Minimax Polynomial Approximation of Modular Reduction for Bootstrapping of Approximate Homomorphic Encryption
Joon-Woo Lee and Eunsang Lee and Yongwoo Lee and Young-Sik Kim and Jong-Seon No
2020/551 ( PDF )
Higher Order Differential Attack against Full-Round BIG
Naoki Shibayama and Yasutaka Igarashi and Toshinobu Kaneko
2020/550 ( PDF )
Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation
Ruiyu Zhu and Changchang Ding and Yan Huang
2020/549 ( PDF )
Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks
Prasanna Ravi and Shivam Bhasin and Sujoy Sinha Roy and Anupam Chattopadhyay
2020/548 ( PDF )
Blockchain Stealth Address Schemes
Gary Yu
2020/547 ( PDF )
Finding Bit-Based Division Property for Ciphers with Complex Linear Layer
Kai Hu and Qingju Wang and Meiqin Wang
2020/546 ( PDF )
MixColumns Coefficient Property and Security of the AES with A Secret S-Box
Xin An and Kai Hu and Meiqin Wang
2020/545 ( PDF )
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security
Ran Canetti and Pratik Sarkar and Xiao Wang
2020/544 ( PDF )
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis
Okan Seker and Sebastian Berndt and Luca Wilke and Thomas Eisenbarth
2020/543 ( PDF )
Kachina - Foundations of Private Smart Contracts
Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
2020/542 ( PDF )
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation
Yusuke Naito and Yu Sasaki and Takeshi Sugawara
2020/541 ( PDF )
There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging
Benjamin Dowling and Britta Hale
2020/540 ( PDF )
One Round Threshold ECDSA with Identifiable Abort
Rosario Gennaro and Steven Goldfeder
2020/539 ( PDF )
On the Concrete Security of LWE with Small Secret
Hao Chen and Lynn Chua and Kristin Lauter and Yongsoo Song
2020/538 ( PDF )
Rotational Cryptanalysis on MAC Algorithm Chaskey
Liliya Kraleva and Tomer Ashur and Vincent Rijmen
2020/537 ( PDF )
TARDIS: Time And Relative Delays In Simulation
Carsten Baum and Bernardo David and Rafael Dowsley and Jesper Buus Nielsen and Sabine Oechsner
2020/536 ( PDF )
Higher-Order Differentials of Word-Oriented SPN Schemes with Low-Degree S-Boxes
Carlos Cid and Lorenzo Grassi and Reinhard Lüftenegger and Christian Rechberger and Markus Schofnegger
2020/535 ( PDF )
Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions
Geoffroy Couteau and Shuichi Katsumata and Bogdan Ursu
2020/534 ( PDF )
Post-quantum TLS without handshake signatures
Peter Schwabe and Douglas Stebila and Thom Wiggers
2020/533 ( PDF )
Anonymous Lottery in the Proof-of-Stake Setting
Foteini Baldimtsi and Varun Madathil and Alessandra Scafuro and Linfeng Zhou
2020/532 ( PDF )
Promise: Leveraging Future Gains for Collateral Reduction
Dominik Harz and Lewis Gudgeon and Rami Khalil and Alexei Zamyatin
2020/531 ( PDF )
Centralized or Decentralized? The Contact Tracing Dilemma
Serge Vaudenay
2020/530 ( PDF )
Determining the Multiplicative Complexity of Boolean Functions using SAT
Mathias Soeken
2020/529 ( PDF )
CRISP: Compromise Resilient Identity-based Symmetric PAKE
Moni Naor and Shahar Paz and Eyal Ronen
2020/528 ( PDF )
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach
Joseph K. Liu and Man Ho Au and Tsz Hon Yuen and Cong Zuo and Jiawei Wang and Amin Sakzad and Xiapu Luo and Li Li
2020/527 ( PDF )
Aggregatable Subvector Commitments for Stateless Cryptocurrencies
Alin Tomescu and Ittai Abraham and Vitalik Buterin and Justin Drake and Dankrad Feist and Dmitry Khovratovich
2020/526 ( PDF )
Efficient Montgomery-like formulas for general Huff's and Huff's elliptic curves and their applications to the isogeny-based cryptography
Robert Dryło and Tomasz Kijko and Michał Wroński
2020/525 ( PDF )
Account Management in Proof of Stake Ledgers
Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira
2020/524 ( PDF )
Efficient Signatures on Randomizable Ciphertexts
Balthazar Bauer and Georg Fuchsbauer
2020/523 ( PDF )
The Strictly Zero-Correlation Attack with Application to the Full DES
Tomer Ashur and Raluca Posteuca and Danilo Šijačić and Stef D’haeseleer
2020/522 ( PDF )
Aggregated Private Information Retrieval: A First Practical Implementation to Support Large-Scale Disease Analytics
Lukas Helminger and Daniel Kales and Christian Rechberger and Roman Walch
2020/521 ( PDF )
MP-SPDZ: A Versatile Framework for Multi-Party Computation
Marcel Keller
2020/520 ( PDF )
MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation
Yarkın Doröz and Jeffrey Hoffstein and Joseph H. Silverman and Berk Sunar
2020/519 ( PDF )
Optimally-secure Coin-tossing against a Byzantine Adversary
Hamidreza Amini Khorasgani and Hemanta K. Maji and Mingyuan Wang
2020/518 ( PDF )
Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings
Muhammed F. Esgin and Ngoc Khanh Nguyen and Gregor Seiler
2020/517 ( PDF )
Practical Product Proofs for Lattice Commitments
Thomas Attema and Vadim Lyubashevsky and Gregor Seiler
2020/516 ( PDF )
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers
Mordechai Guri
2020/515 ( PDF )
On a hybrid approach to solve small secret LWE
Thomas Espitau and Antoine Joux and Natalia Kharchenko
2020/514 ( PDF )
On the Deployment of curve based cryptography for the Internet of Things
Michael Scott
2020/513 ( PDF )
E-cclesia: Universally Composable Self-Tallying Elections
Myrto Arapinis and Nikolaos Lamprou and Lenka Mareková and Thomas Zacharias
2020/512 ( PDF )
Glimpses are Forever in RC4 amidst the Spectre of Biases
Chandratop Chakraborty and Pranab Chakraborty and Subhamoy Maitra
2020/511 ( PDF )
JaxNet: Scalable Blockchain Network
Iurii Shyshatsky and Vinod Manoharan and Taras Emelyanenko and Lucas Leger
2020/510 ( PDF )
On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM
Nir Drucker and Shay Gueron and Dusan Kostic and Edoardo Persichetti
2020/509 ( PDF )
BBB Secure Nonce Based MAC Using Public Permutations
Avijit Dutta and Mridul Nandi
2020/508 ( PDF )
Augmenting Leakage Detection using Bootstrapping
Yuan Yao and Michael Tunstall and Elke De Mulder and Anton Kochepasov and Patrick Schaumont
2020/507 ( PDF )
Characteristics of Hadamard square of Reed--Muller subcodes of special type (Extended abstract)
Victoria Vysotskaya
2020/506 ( PDF )
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations
Sonia Belaďd and Pierre-Evariste Dagand and Darius Mercadier and Matthieu Rivain and Raphaël Wintersdorff
2020/505 ( PDF )
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
Wasilij Beskorovajnov and Felix Dörre and Gunnar Hartung and Alexander Koch and Jörn Müller-Quade and Thorsten Strufe
2020/504 ( PDF )
Storing and Retrieving Secrets on a Blockchain
Vipul Goyal and Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno and Yifan Song
2020/503 ( PDF )
A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder
Aaron Hutchinson and Koray Karabina
2020/502 ( PDF )
Applying Blockchain Layer2 Technology to Mass E-Commerce
Sijia Zhao and Donal O’Mahony
2020/501 ( PDF )
Fast Threshold ECDSA with Honest Majority
Ivan Damgĺrd and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael Bćksvang Řstergĺrd
2020/500 ( PDF )
Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Schemes
Lorenzo Grassi and Christian Rechberger and Markus Schofnegger
2020/499 ( PDF )
Proof-Carrying Data from Accumulation Schemes
Benedikt Bünz and Alessandro Chiesa and Pratyush Mishra and Nicholas Spooner
2020/498 ( PDF )
Threshold ECDSA for Decentralized Asset Custody
Adam Gągol and Jędrzej Kula and Damian Straszak and Michał Świętek
2020/497 ( PDF )
Collusion-Preserving Computation without a Mediator
Michele Ciampi and Yun Lu and Vassilis Zikas
2020/496 ( PDF )
Linear Generalized ElGamal Encryption Scheme
Demba Sow and Léo Robert and Pascal Lafourcade
2020/495 ( PDF )
Disperse rotation operator DRT and use in some stream ciphers
Kim Yong-Jin and Yon Yong-Ho and Jong Yu-Jin and Li Ok-Chol
2020/494 ( PDF )
Improved Black-Box Constructions of Composable Secure Computation
Rohit Chatterjee and Xiao Liang and Omkant Pandey
2020/493 ( PDF )
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System
Gennaro Avitabile and Vincenzo Botta and Vincenzo Iovino and Ivan Visconti
2020/492 ( PDF )
UC Non-Interactive, Proactive, Threshold ECDSA
Ran Canetti and Nikolaos Makriyannis and Udi Peled
2020/491 ( PDF )
Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic
Hilder Vitor Lima Pereira
2020/490 ( PDF )
SoK: Techniques for Verifiable Mix Nets
Thomas Haines and Johannes Mueller
2020/489 ( PDF )
Pandemic Contact Tracing Apps: DP-3T, PEPP-PT NTK, and ROBERT from a Privacy Perspective
Fraunhofer AISEC
2020/488 ( PDF )
Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption
Yongwoo Lee and Joonwoo Lee and Young-Sik Kim and Jong-Seon No
2020/487 ( PDF )
Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP
Emmanouil Doulgerakis and Thijs Laarhoven and Benne de Weger
2020/486 ( PDF )
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
Jinyu Lu and Yunwen Liu and Tomer Ashur and Bing Sun and Chao Li
2020/485 ( PDF )
Edwards curve points counting method and supersingular Edwards and Montgomery curves
Ruslan V. Skuratovskii
2020/484 ( PDF )
Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions
Aaqib Bashir Dar and Auqib Hamid Lone and Saniya Zahoor and Afshan Amin Khan and Roohie Naaz
2020/483 ( PDF )
On Ideal and Weakly-Ideal Access Structures
Reza Kaboli and Shahram Khazaei and Maghsoud Parviz
2020/482 ( PDF )
A Trace Based $GF(2^n)$ Inversion Algorithm
Haining Fan
2020/481 ( PDF )
Using z14 Fused-Multiply-Add Instructions to Accelerate Elliptic Curve Cryptography
James You and Qi Zhang and Curtis D'Alves and Bill O'Farrell and Christopher K. Anand
2020/480 ( PDF )
Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Evaluation
Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2020/479 ( PDF )
Puncturable Witness Pseudorandom Functions and its Applications on Witness Encryption
Tapas Pal and Ratna Dutta
2020/478 ( PDF )
Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols
Eshan Chattopadhyay and Jesse Goodman and Vipul Goyal and Xin Li
2020/477 ( PDF )
Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More
Essam Ghadafi
2020/476 ( PDF )
Generalized Bitcoin-Compatible Channels
Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostakova and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi
2020/475 ( PDF )
Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews
Zachary Zaccagni and Ram Dantu
2020/474 ( PDF )
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model
Karim Baghery and Mahdi Sedaghat
2020/473 ( PDF )
Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing
Ashutosh Kumar and Raghu Meka and David Zuckerman
2020/472 ( PDF )
Bracing A Transaction DAG with A Backbone Chain
Shuyang Tang
2020/471 ( PDF )
Interpose PUF can be PAC Learned
Durba Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
2020/470 ( PDF )
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
Fabio Campos and Tim Kohlstadt and Steffen Reith and Marc Stoettinger
2020/469 ( PDF )
Dedicated Security Chips in the Age of Secure Enclaves
Kari Kostiainen and Aritra Dhar and Srdjan Capkun
2020/468 ( PDF )
Distributed Auditing Proofs of Liabilities
Konstantinos Chalkias and Kevin Lewi and Payman Mohassel and Valeria Nikolaenko
2020/467 ( PDF )
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
Zhenzhen Bao and Xiaoyang Dong and Jian Guo and Zheng Li and Danping Shi and Siwei Sun and Xiaoyun Wang
2020/466 ( PDF )
Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks
Pantea Kiaei and Darius Mercadier and Pierre-Evariste Dagand and Karine Heydemann and Patrick Schaumont
2020/465 ( PDF )
Domain-Oriented Masked Instruction Set Architecture for RISC-V
Pantea Kiaei and Patrick Schaumont
2020/464 ( PDF )
Can a Public Blockchain Keep a Secret?
Fabrice Benhamouda and Craig Gentry and Sergey Gorbunov and Shai Halevi and Hugo Krawczyk and Chengyu Lin and Tal Rabin and Leonid Reyzin
2020/463 ( PDF )
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge
Xiaoning Liu and Bang Wu and Xingliang Yuan and Xun Yi
2020/462 ( PDF )
An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption
Ido Shahaf and Or Ordentlich and Gil Segev
2020/461 ( PDF )
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem
Jean-Sébastien Coron and Agnese Gini
2020/460 ( PDF )
A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption
Marloes Venema and Greg Alpár
2020/459 ( PDF )
Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations
Debdeep Mukhopadhyay
2020/458 ( PDF )
On the Optimality of Optimistic Responsiveness
Ittai Abraham and Kartik Nayak and Ling Ren and Nibesh Shrestha
2020/457 ( PDF )
Cryptographic Scheme for analyzing protected files on Sandboxes and share them privately
Ahmad Almorabea
2020/456 ( PDF )
Bank run Payment Channel Networks
Zhichun Lu and Runchao Han and Jiangshan Yu
2020/455 ( PDF )
Cryptanalysis of LEDAcrypt
Daniel Apon and Ray Perlner and Angela Robinson and Paolo Santini
2020/454 ( PDF )
Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification
Thomas Pornin
2020/453 ( PDF )
BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein
F. Betül Durak and Loďs Huguenin-Dumittan and Serge Vaudenay
2020/452 ( PDF )
Almost Public Quantum Coins
Amit Behera and Or Sattath
2020/451 ( PDF )
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning
Hao Chen and Miran Kim and Ilya Razenshteyn and Dragos Rotaru and Yongsoo Song and Sameer Wagh
2020/450 ( PDF )
The Landscape of Pointcheval-Sanders Signatures: Mapping to Polynomial-Based Signatures and Beyond
Kristian L. McDonald
2020/449 ( PDF )
Switched Threshold Signatures from K-Private PolyShamir Secret Sharing
Kristian L. McDonald
2020/448 ( PDF )
Partial Secret Sharing Schemes
Amir Jafari and Shahram Khazaei
2020/447 ( -- withdrawn -- )
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey
Asma Aloufi and Peizhao Hu and Yongsoo Song and and Kristin Lauter
2020/446 ( PDF )
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography
Tim Fritzmann and Georg Sigl and Johanna Sepúlveda
2020/445 ( PDF )
On Pseudorandom Encodings
Thomas Agrikola and Geoffroy Couteau and Yuval Ishai and Stanislaw Jarecki and Amit Sahai
2020/444 ( PDF )
A modern signature scheme with message recovery: Abe--Okamoto signatures with EdDSA elements
Satō Shinichi
2020/443 ( PDF )
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
Okan Seker and Thomas Eisenbarth and Maciej Liskiewicz
2020/442 ( PDF )
Fine-Grained Cryptography: A New Frontier?
Alon Rosen
2020/441 ( PDF )
Modeling for Three-Subset Division Property without Unknown Subset
Yonglin Hao and Gregor Leander and Willi Meier and Yosuke Todo and Qingju Wang
2020/440 ( PDF )
Sublattice Attacks on Ring-LWE with Wide Error Distributions I
Hao Chen
2020/439 ( PDF )
The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE
Hiroshi Onuki and Yusuke Aikawa and Tsuyoshi Takagi
2020/438 ( PDF )
Fast hybrid Karatsuba multiplier for Type II pentanomials
Yin Li and Yu Zhang and Wei He
2020/437 ( PDF )
Faster Montgomery and double-add ladders for short Weierstrass curves
Mike Hamburg
2020/436 ( PDF )
Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification
Houssem Maghrebi
2020/435 ( PDF )
WAGE: An Authenticated Encryption with a Twist
Riham AlTawy and Guang Gong and Kalikinkar Mandal and Raghvendra Rohit
2020/434 ( PDF )
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware
Sujoy Sinha Roy and Andrea Basso
2020/433 ( PDF )
zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays
Martin Westerkamp and Jacob Eberhardt
2020/432 ( PDF )
From A to Z: Projective coordinates leakage in the wild
Alejandro Cabrera Aldaya and Cesar Pereida García and Billy Bob Brumley
2020/431 ( PDF )
x-only point addition formula and faster torsion basis generation in compressed SIKE
Geovandro C. C. F. Pereira and Javad Doliskani and David Jao
2020/430 ( PDF )
Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures
Aram Jivanyan and Tigran Mamikonyan
2020/429 ( PDF )
Mathematics and Cryptography: A Marriage of Convenience?
Alice Silverberg
2020/428 ( PDF )
Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc.
Yaron Gvili
2020/427 ( PDF )
Improving the Performance of the Picnic Signature Scheme
Daniel Kales and Greg Zaverucha
2020/426 ( PDF )
Privacy-Preserving Contact Tracing: current solutions and open questions
Qiang Tang
2020/425 ( PDF )
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel
2020/424 ( PDF )
Low-gate Quantum Golden Collision Finding
Samuel Jaques and André Schrottenloher
2020/423 ( PDF )
On One-way Functions and Kolmogorov Complexity
Yanyi Liu and Rafael Pass
2020/422 ( PDF )
Pattern Matching on Encrypted Data
Anis Bkakria and Nora Cuppens and Frédéric Cuppens
2020/421 ( PDF )
Multichain-MWPoW: A $p/2$ Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture
Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos
2020/420 ( PDF )
Practical Card-Based Protocol for Three-Input Majority
Kenji Yasunaga
2020/419 ( PDF )
Pointproofs: Aggregating Proofs for Multiple Vector Commitments
Sergey Gorbunov and Leonid Reyzin and Hoeteck Wee and Zhenfei Zhang
2020/418 ( PDF )
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
Krzysztof Pietrzak
2020/417 ( PDF )
Optimal strategies for CSIDH
Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez
2020/416 ( PDF )
The Multi-Base Discrete Logarithm Problem: Non-Rewinding Proofs and Improved Reduction Tightness for Identification and Signatures
Mihir Bellare and Wei Dai
2020/415 ( PDF )
Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE
Shweta Agrawal and Alice Pellet-Mary
2020/414 ( PDF )
Semi-Quantum Money
Roy Radian and Or Sattath
2020/413 ( PDF )
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
Louis Goubin and Matthieu Rivain and Junwei Wang
2020/412 ( PDF )
Fixslicing: A New GIFT Representation
Alexandre Adomnicai and Zakaria Najm and Thomas Peyrin
2020/411 ( PDF )
Secure Two-Party Computation in a Quantum World
Niklas Büscher and Daniel Demmler and Nikolaos P. Karvelas and Stefan Katzenbeisser and Juliane Krämer and Deevashwer Rathee and Thomas Schneider and Patrick Struck
2020/410 ( PDF )
Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4
Hwajeong Seo and Mila Anastasova and Amir Jalali and Reza Azarderakhsh
2020/409 ( PDF )
Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes
Loďs Huguenin-Dumittan and Serge Vaudenay
2020/408 ( PDF )
Speed up over the Rainbow
Nir Drucker and Shay Gueron
2020/407 ( PDF )
Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection
Aydin Abadi and Sotirios Terzis and Changyu Dong
2020/406 ( PDF )
Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience
Atsuki Momose and Jason Paul Cruz and Yuichi Kaji
2020/405 ( PDF )
Ordinos: A Verifiable Tally-Hiding E-Voting System
Ralf Kuesters and Julian Liedtke and Johannes Mueller and Daniel Rausch and Andreas Vogt
2020/404 ( PDF )
From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards
Tassos Dimitriou
2020/403 ( PDF )
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
David Derler and Kai Samelin and Daniel Slamanig
2020/402 ( PDF )
A Note on Low Order Assumptions in RSA groups
István András Seres and Péter Burcsi
2020/401 ( PDF )
Mining for Privacy: How to Bootstrap a Snarky Blockchain
Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
2020/400 ( PDF )
Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis
Jeroen Delvaux
2020/399 ( PDF )
Analysis of DP3T
Serge Vaudenay
2020/398 ( PDF )
Decentralized Contact Tracing Using a DHT and Blind Signatures
Samuel Brack and Leonie Reichert and Björn Scheuermann
2020/397 ( PDF )
Classification of 4-bit S-boxes for BOGI-permutation
Seonggyeom Kim and Deukjo Hong and Jaechul Sung and Seokhie Hong
2020/396 ( PDF )
Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing
Donggeun Kwon and HeeSeok Kim and Seokhie Hong
2020/395 ( PDF )
Cryptography from Information Loss
Marshall Ball and Elette Boyle and Akshay Degwekar and Apoorvaa Deshpande and Alon Rosen and Vinod Vaikuntanathan and Prashant Nalini Vasudevan
2020/394 ( PDF )
Candidate iO from Homomorphic Encryption Schemes
Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta
2020/393 ( PDF )
LevioSA: Lightweight Secure Arithmetic Computation
Carmit Hazay and Yuval Ishai and Antonio Marcedone and Muthuramakrishnan Venkitasubramaniam
2020/392 ( PDF )
An argument on the security of LRBC, a recently proposed lightweight block cipher
Sadegh Sadeghi and Nasour Bagheri
2020/391 ( PDF )
Optimized CSIDH Implementation Using a 2-torsion Point
Donghoe Heo and Suhri Kim and Kisoon Yoon and Young-Ho Park and Seokhie Hong
2020/390 ( PDF )
A French cipher from the late 19th century
Rémi Géraud-Stewart and David Naccache
2020/389 ( PDF )
A Unary Cipher with Advantages over the Vernam Cipher
Gideon Samid
2020/388 ( PDF )
Fast 4 way vectorized ladder for the complete set of Montgomery curves
Huseyin Hisil and Berkan Egrice and Mert Yassi
2020/387 ( PDF )
Low-complexity and Reliable Transforms for Physical Unclonable Functions
Onur Gunlu and Rafael F. Schaefer
2020/386 ( PDF )
Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric
Ralf Kuesters and Daniel Rausch and Mike Simon
2020/385 ( PDF )
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality
Peihan Miao and Sarvar Patel and Mariana Raykova and Karn Seth and Moti Yung
2020/384 ( PDF )
A ”Final” Security Bug
Nguyen Thoi Minh Quan
2020/383 ( PDF )
Parallel strategies for SIDH: Towards computing SIDH twice as fast
Daniel Cervantes-Vázquez and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez
2020/382 ( PDF )
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection
Jan Bobolz and Fabian Eidens and Stephan Krenn and Daniel Slamanig and Christoph Striecks
2020/381 ( PDF )
A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback
Leonard Kleinrock and Rafail Ostrovsky and Vassilis Zikas
2020/380 ( PDF )
Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory
Anirban Chakraborty and Sarani Bhattacharya and Sayandeep Saha and Debdeep Mukhopdhyay
2020/379 ( PDF )
Post-quantum WireGuard
Andreas Hülsing and Kai-Chun Ning and Peter Schwabe and Florian Weber and Philip R. Zimmermann
2020/378 ( PDF )
Efficient 4-way Vectorizations of the Montgomery Ladder
Kaushik Nath and Palash Sarkar
2020/377 ( PDF )
Oblivious tight compaction in O(n) time with smaller constant
Samuel Dittmer and Rafail Ostrovsky
2020/376 ( PDF )
On the privacy of a code-based single-server computational PIR scheme
Sarah Bordage and Julien Lavauzelle
2020/375 ( PDF )
Privacy-Preserving Contact Tracing of COVID-19 Patients
Leonie Reichert and Samuel Brack and Björn Scheuermann
2020/374 ( PDF )
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority
Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and abhi shelat and Muthu Venkitasubramaniam and Ruihan Wang
2020/373 ( PDF )
Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES
Huanyu Wang and Elena Dubrova
2020/372 ( PDF )
Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions
Claude Carlet
2020/371 ( PDF )
Single-Trace Attacks on Keccak
Matthias J. Kannwischer and Peter Pessl and Robert Primas
2020/370 ( PDF )
Multiparty Generation of an RSA Modulus
Megan Chen and Ran Cohen and Jack Doerner and Yashvanth Kondi and Eysa Lee and Schuyler Rosefield and abhi shelat
2020/369 ( PDF )
The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs
David Knichel and Thorben Moos and Amir Moradi
2020/368 ( PDF )
Defeating NewHope with a Single Trace
Dorian Amiet and Andreas Curiger and Lukas Leuenberger and Paul Zbinden
2020/367 ( PDF )
Exploiting Decryption Failures in Mersenne Number Cryptosystems
Marcel Tiepelt and Jan-Pieter D'Anvers
2020/366 ( PDF )
FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection
Hangwei Lu and Dhwani Mehta and Olivia Paradis and Navid Asadizanjani and Mark Tehranipoor and Damon L. Woodard
2020/365 ( PDF )
A New Algorithm to Find Monic Irreducible Polynomials over Extended Galois field GF prime p and extension q using Positional Arithmetic
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/364 ( PDF )
Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs
Behzad Abdolmaleki and Daniel Slamanig
2020/363 ( PDF )
On equivalence between known polynomial APN functions and power APN functions
Qianhong Wan and Longjiang Qu and Chao Li
2020/362 ( -- withdrawn -- )
Another Look at CBC Casper Consensus Protocol
Yongge Wang
2020/361 ( PDF )
How Not to Create an Isogeny-Based PAKE
Reza Azarderakhsh and David Jao and Brian Koziel and Jason T. LeGrow and Vladimir Soukharev and Oleg Taraskin
2020/360 ( PDF )
Composite Algorithm The New Algorithm to Search for Monic Irreducible Polynomials over Extended Galois Fields
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/359 ( PDF )
4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes.
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/358 ( PDF )
Division Algorithm to search for monic irreducible polynomials over extended Galois Field GF(p^q).
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/357 ( PDF )
Quasigroups and Substitution Permutation Networks: A Failed Experiment
George Teseleanu
2020/356 ( PDF )
Efficient MPC with a Mixed Adversary
Martin Hirt and Marta Mularczyk
2020/355 ( PDF )
Permissionless Consensus in the Resource Model
Benjamin Terner
2020/354 ( PDF )
A Generalization of the ElGamal public-key cryptosystem
Rajitha Ranasinghe and Pabasara Athukorala
2020/353 ( PDF )
A Probabilistic Public Key Encryption Scheme Based on Quartic Reciprocity (Draft V1.22)
Robert A. Threlfall
2020/352 ( PDF )
Coda: Decentralized Cryptocurrency at Scale
Joseph Bonneau and Izaak Meckler and Vanishree Rao and Evan Shapiro
2020/351 ( PDF )
Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition
Youssef El Housni and Aurore Guillevic
2020/350 ( PDF )
New Multi-bit Differentials to Improve Attacks Against ChaCha
Murilo Coutinho and T. C. Souza Neto
2020/349 ( PDF )
Differential Power Analysis on (Non-)Linear Feedback Shift Registers
Siang Meng Sim
2020/348 ( PDF )
Constructing hidden order groups using genus three Jacobians
Steve Thakur
2020/347 ( PDF )
Some Low Round Zero Knowledge Protocols
Hongda Li and Peifang Ni and Dongxue Pan
2020/346 ( PDF )
Algebraic Attacks on Round-Reduced Keccak/Xoodoo
Fukang Liu and Takanori Isobe and Willi Meier and Zhonghao Yang
2020/345 ( PDF )
Bent functions stemming from Maiorana-McFarland class being provably outside its completed version
Fengrong Zhangand Nastja Cepak and Enes Pasalicand Yongzhuang Wei
2020/344 ( PDF )
Anchoring the Value of Cryptocurrency
Yibin Xu and Yangyu Huang and Jianhua Shao
2020/343 ( PDF )
BSC: A Bitcoin Smart Contract Implementation
Hiro Midas
2020/342 ( PDF )
Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge
Estuardo Alpirez Bock and Alexander Treff
2020/341 ( PDF )
Faster computation of isogenies of large prime degree
Daniel J. Bernstein and Luca De Feo and Antonin Leroux and Benjamin Smith
2020/340 ( PDF )
Differential Privacy for Eye Tracking with Temporal Correlations
Efe Bozkir* and Onur Gunlu* and Wolfgang Fuhl and Rafael F. Schaefer and Enkelejda Kasneci
2020/339 ( PDF )
Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics
George Teseleanu
2020/338 ( PDF )
Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits
Daniel Escudero and Satrajit Ghosh and Marcel Keller and Rahul Rachuri and Peter Scholl
2020/337 ( PDF )
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography
Nicholas Genise and Daniele Micciancio and Chris Peikert and Michael Walter
2020/336 ( PDF )
Gimli Encryption in 715.9 psec
Santosh Ghosh and Michael Kounavis and Sergej Deutsch
2020/335 ( PDF )
An n/2 byzantine node tolerated blockchain sharding approach
Yibin Xu and Yangyu Huang
2020/334 ( PDF )
4-Uniform Permutations with Null Nonlinearity
Christof Beierle and Gregor Leander
2020/333 ( -- withdrawn -- )
A Simpler and Modular Construction of Linkable Ring Signature
Wulu Li and Yongcan Wang and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2020/332 ( PDF )
Implementation Study of Two Verifiable Delay Functions
Vidal Attias and Luigi Vigneri and Vassil Dimitrov
2020/331 ( PDF )
The CTR mode with encrypted nonces and its extension to AE
Sergey Agievich
2020/330 ( PDF )
Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective
Gil Segev and Ido Shahaf
2020/329 ( PDF )
Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields
Gabrielle De Micheli and Pierrick Gaudry and Cécile Pierrot
2020/328 ( PDF )
Leveraging Weight Functions for Optimistic Responsiveness in Blockchains
Simon Holmgaard Kamp and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Sřren Eller Thomsen and Daniel Tschudi
2020/327 ( PDF )
On the design of stream ciphers with Cellular Automata having radius = 2
Anita John and Rohit Lakra and Jimmy Jose
2020/326 ( PDF )
An upper bound on the decryption failure rate of static-key NewHope
John M. Schanck
2020/325 ( PDF )
SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts
Robert Muth and Florian Tschorsch
2020/324 ( PDF )
Defeating CAS-Unlock
Bicky Shakya and Xiaolin Xu and Mark Tehranipoor and Domenic Forte
2020/323 ( PDF )
A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol
Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos
2020/322 ( PDF )
Optimal and Error-Free Multi-Valued Byzantine Consensus Through Parallel Execution
Andrew Loveless and Ronald Dreslinski and Baris Kasikci
2020/321 ( PDF )
Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism
Jose Maria Bermudo Mera and Furkan Turan and Angshuman Karmakar and Sujoy Sinha Roy and Ingrid Verbauwhede
2020/320 ( PDF )
Universally Composable Relaxed Password Authenticated Key Exchange
Michel Abdalla and Manuel Barbosa and Tatiana Bradley and Stanislaw Jarecki and Jonathan Katz and Jiayu Xu
2020/319 ( PDF )
Secure k-ish nearest neighbors classifier
Hayim Shaul and Dan Feldman and Daniela Rus
2020/318 ( PDF )
Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL
Huijia Lin and Ji Luo
2020/317 ( PDF )
Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure
Archisman Ghosh and Debayan Das and Shreyas Sen
2020/316 ( PDF )
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
Rishab Goyal and Sam Kim and Brent Waters and David J. Wu
2020/315 ( PDF )
plookup: A simplified polynomial protocol for lookup tables
Ariel Gabizon and Zachary J. Williamson
2020/314 ( PDF )
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA
Shigeo Tsujii and Ryo Fujita and Masahito Gotaishi
2020/313 ( PDF )
Security analysis of SPAKE2+
Victor Shoup
2020/312 ( PDF )
Arcturus: efficient proofs for confidential transactions
Sarang Noether
2020/311 ( PDF )
A Blockchain Traceable Scheme with Oversight Function
Tianjun Ma and Haixia Xu and Peili Li
2020/310 ( PDF )
Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis
Gabriel Destouet and Cécile Dumas and Anne Frassati and Valérie Perrier
2020/309 ( PDF )
Cryptanalysis Results on Spook
Patrick Derbez and Paul Huynh and Virginie Lallemand and María Naya-Plasencia and Léo Perrin and André Schrottenloher
2020/308 ( PDF )
Post-Quantum TLS on Embedded Systems
Kevin Bürstinghaus-Steinbach and Christoph Krauß and Ruben Niederhagen and Michael Schneider
2020/307 ( PDF )
Handling vectorial functions by means of their graph indicators
Claude Carlet
2020/306 ( PDF )
Leakage Assessment in Fault Attacks: A Deep Learning Perspective
Sayandeep Saha and Manaar Alam and Arnab Bag and Debdeep Mukhopadhyay and Pallab Dasgupta
2020/305 ( PDF )
3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA
Shigeo Tsujii and Toshiaki Saisho and Masao Yamasawa and Masahito Gotaishi and Kou Shikata and Koji Sasaki and Nobuharu Suzuki and Masaki Hashiyada
2020/304 ( PDF )
Multiparty Homomorphic Encryption: From Theory to Practice
Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Pierre Hubaux
2020/303 ( PDF )
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Sergei Tikhomirov and Pedro Moreno-Sanchez and Matteo Maffei
2020/302 ( PDF )
Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers
Thomas Kaeding
2020/301 ( PDF )
MadHatter: A toy cipher that conceals two plaintexts in the same ciphertext
Thomas Kaeding
2020/300 ( PDF )
Secure Multiparty Computation (MPC)
Yehuda Lindell
2020/299 ( PDF )
Hydra: Fast Isomorphic State Channels
Manuel M. T. Chakravarty and Sandro Coretti and Matthias Fitzi and Peter Gazi and Philipp Kant and Aggelos Kiayias and Alexander Russell
2020/298 ( PDF )
Fast polynomial inversion for post quantum QC-MDPC cryptography
Nir Drucker and Shay Gueron and Dusan Kostic
2020/297 ( PDF )
Random Self-reducibility of Ideal-SVP via Arakelov Random Walks
Koen de Boer and Léo Ducas and Alice Pellet-Mary and Benjamin Wesolowski
2020/296 ( PDF )
Multidimensional Database Reconstruction from Range Query Access Patterns
Akshima and David Cash and Francesca Falzon and Adam Rivkin and Jesse Stern
2020/295 ( PDF )
Generalized Isotopic Shift Construction for APN Functions
Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert Coulter and Irene Villa
2020/294 ( PDF )
Public-Key Generation with Verifiable Randomness
Olivier Blazy and Patrick Towa and Damien Vergnaud
2020/293 ( PDF )
"Many-out-of-Many" Proofs with Applications to Anonymous Zether
Benjamin E. Diamond
2020/292 ( PDF )
LWE with Side Information: Attacks and Concrete Security Estimation
Dana Dachman-Soled and Léo Ducas and Huijing Gong and Mélissa Rossi
2020/291 ( -- withdrawn -- )
Unforgeability in the quantum world
Myrto Arapinis and Mahshid Delavar and Mina Doosti and Elham Kashefi
2020/290 ( PDF )
Linear Cryptanalysis of Reduced-Round SIMON Using Super Rounds
Reham Almukhlifi and Poorvi Vora
2020/289 ( PDF )
The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves
Jonathan Lee
2020/288 ( PDF )
Secure Key-Alternating Feistel Ciphers Without Key Schedule
Yaobin Shen and Hailun Yan and Lei Wang and Xuejia Lai
2020/287 ( PDF )
Private resource allocators and their applications
Sebastian Angel and Sampath Kannan and Zachary Ratliff
2020/286 ( PDF )
Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages
Geoffroy Couteau and Dominik Hartmann
2020/285 ( PDF )
Improved Security Bounds for Generalized Feistel Networks
Yaobin Shen and Chun Guo and Lei Wang
2020/284 ( PDF )
Database Reconstruction Attacks in Two Dimensions
Evangelia Anna Markatou and Roberto Tamassia
2020/283 ( PDF )
CryptoWills: How to Bequeath Cryptoassets
István András Seres and Omer Shlomovits and Pratyush Ranjan Tiwari
2020/282 ( PDF )
The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
Jelle Don and Serge Fehr and Christian Majenz
2020/281 ( PDF )
Privacy-friendly Monero transaction signing on a hardware wallet, extended version
Dusan Klinec Vashek Matyas
2020/280 ( PDF )
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
Juliane Krämer and Patrick Struck
2020/279 ( PDF )
Impact of System-on-Chip Integration of AEAD Ciphers
Shashank Raghuraman and Leyla Nazhandali
2020/278 ( PDF )
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs
Ahmed Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Dawn Song
2020/277 ( PDF )
Full Analysis of Nakamoto Consensus in Bounded-Delay Networks
Juan Garay and Aggelos Kiayias and Nikos Leonardos
2020/276 ( PDF )
CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware
Hamid Nejatollahi and Saransh Gupta and Mohsen Imani and Tajana Simunic Rosing and Rosario Cammarota and Nikil Dutt
2020/275 ( PDF )
Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function
Jannis Bossert and Eik List and Stefan Lucks and Sebastian Schmitz
2020/274 ( PDF )
An Optimal Relational Database Encryption Scheme
Seny Kamara and Tarik Moataz and Stan Zdonik and Zheguang Zhao
2020/273 ( PDF )
On the Fast Algebraic Immunity of Threshold Functions
Pierrick Méaux
2020/272 ( PDF )
Privacy-Preserving Fast and Exact Linear Equations Solver with Fully Homomorphic Encryption
Keita Arimitsu and Kazuki Otsuka
2020/271 ( PDF )
Signatures from Sequential-OR Proofs
Marc Fischlin and Patrick Harasser and Christian Janson
2020/270 ( PDF )
Practical Predicate Encryption for Inner Product
Yi-Fan Tseng and Zi-Yuan Liu and Raylin Tso
2020/269 ( PDF )
Order-Fairness for Byzantine Consensus
Mahimna Kelkar and Fan Zhang and Steven Goldfeder and Ari Juels
2020/268 ( PDF )
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography
Jose Maria Bermudo Mera and Angshuman Karmakar and Ingrid Verbauwhede
2020/267 ( PDF )
Differential Power Analysis of the Picnic Signature Scheme
Tim Gellersen and Okan Seker and Thomas Eisenbarth
2020/266 ( PDF )
Quantum Indistinguishability for Public Key Encryption
Tommaso Gagliardoni and Juliane Krämer and Patrick Struck
2020/265 ( PDF )
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More
Benoît Libert and Alain Passelčgue and Hoeteck Wee and David J. Wu
2020/264 ( PDF )
Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes
Nicholas Mainardi and Alessandro Barenghi and Gerardo Pelosi
2020/263 ( PDF )
FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups
Jihoon Kwon and Byeonghak Lee and Jooyoung Lee and and Dukjae Moon
2020/262 ( PDF )
A Note on the Ending Elliptic Curve in SIDH
Christopher Leonardi
2020/261 ( PDF )
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices
Matthieu Monteiro and Kumara Kahatapitiya and Hassan Jameel Asghar and Kanchana Thilakarathna and Thierry Rakotoarivelo and Dali Kaafar and Shujun Li and Ron Steinfeld and Josef Pieprzyk
2020/260 ( PDF )
Lattice-based (Partially) Blind Signature without Restart
Samuel Bouaziz-Ermann and Sébastien Canard and Gautier Eberhart and Guillaume Kaim and Adeline Roux-Langlois and Jacques Traoré
2020/259 ( PDF )
Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors
Divesh Aggarwal and Maciej Obremski and Joăo Ribeiro and Mark Simkin and Luisa Siniscalchi
2020/258 ( PDF )
NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations
Zvika Brakerski and Venkata Koppula and Tamer Mour
2020/257 ( PDF )
Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication
Onur Gunlu and Rafael F. Schaefer and H. Vincent Poor
2020/256 ( PDF )
Statistical ZAPR Arguments from Bilinear Maps
Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs
2020/255 ( PDF )
Novel Deception Techniques for Malware Detection on Industrial Control Systems
Takanori Machida and Dai Yamamoto and Yuki Unno and Hisashi Kojima
2020/254 ( PDF )
Formalizing Data Deletion in the Context of the Right to be Forgotten
Sanjam Garg and Shafi Goldwasser and Prashant Nalini Vasudevan
2020/253 ( PDF )
Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing
Hemanta K. Maji and Mingyuan Wang
2020/252 ( PDF )
Secure Non-interactive Simulation: Feasibility & Rate
Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen
2020/251 ( PDF )
Communication Lower Bounds for Perfect Maliciously Secure MPC
Ivan Damgĺrd and Nikolaj I. Schwartzbach
2020/250 ( PDF )
On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations
Ehsan Aerabi and Athanasios Papadimitriou and David Hely
2020/249 ( PDF )
CONFISCA : an SIMD-based CONcurrent FI and SCA countermeasure with switchable performance and security modes
Ehsan Aerabi and Cyril Bresch and David Hély and Athanasios Papadimitriou and Mahdi Fazeli
2020/248 ( PDF )
Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast
Ittai Abraham and Benny Pinkas and Avishay Yanai
2020/247 ( -- withdrawn -- )
Crooked Indifferentiability Revisited
Rishiraj Bhattacharyya and Mridul Nandi and Anik Raychaudhuri
2020/246 ( PDF )
Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography
Jing Tian and Jun Lin and Zhongfeng Wang
2020/245 ( PDF )
New Assumptions and Efficient Cryptosystems from the $e$-th Power Residue Symbol
Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao and Licheng Wang and Zhusen Liu
2020/244 ( PDF )
On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol
Andrea Basso and Péter Kutas and Simon-Philipp Merz and Christophe Petit and Charlotte Weitkämper
2020/243 ( PDF )
An Analysis of Hybrid Public Key Encryption
Benjamin Lipp
2020/242 ( PDF )
Practical and Secure Circular Range Search on Private Spatial Data
Zhihao Zheng and Jiachen Shen and Zhenfu Cao
2020/241 ( PDF )
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability
Mihir Bellare and Hannah Davis and Felix Günther
2020/240 ( PDF )
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture
T-H. Hubert Chan and Kai-Min Chung and Wei-Kai Lin and Elaine Shi
2020/239 ( PDF )
Viktoria: A new Paradigm for Hash Functions
Edimar Veríssimo
2020/238 ( PDF )
Efficient ECM factorization in parallel with the Lyness map
Andrew Hone
2020/237 ( PDF )
On Security Notions for Encryption in a Quantum World
Céline Chevalier and Ehsan Ebrahimi and Quoc-Huy Vu
2020/236 ( PDF )
Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21
Mridul Nandi
2020/235 ( PDF )
Statistical Zaps and New Oblivious Transfer Protocols
Vipul Goyal and Abhishek Jain and Zhengzhong Jin and and Giulio Malavolta
2020/234 ( PDF )
Application of commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups to Key Exchange Protocol
Ruslan V. Skuratovskii and Aled Williams
2020/233 ( PDF )
Key-Homomorphic Pseudorandom Functions from LWE with a Small Modulus
Sam Kim
2020/232 ( PDF )
Combiners for AEAD
Bertram Poettering and Paul Rösler
2020/231 ( PDF )
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions
Nuttapong Attrapadung and Junichi Tomida
2020/230 ( PDF )
Lattice analysis on MiNTRU problem
Changmin Lee and Alexandre Wallet
2020/229 ( PDF )
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications
Itai Dinur
2020/228 ( PDF )
Optimal Broadcast Encryption from Pairings and LWE
Shweta Agrawal and Shota Yamada
2020/227 ( PDF )
About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10
Yindong Chen, Limin Lin, Chuliang Wei
2020/226 ( PDF )
Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol
Meher Krishna Duggirala . and . Ravi Duggirala . and . Krishna Subba Rao Pulugurtha
2020/225 ( PDF )
Generic-Group Delay Functions Require Hidden-Order Groups
Lior Rotem and Gil Segev and Ido Shahaf
2020/224 ( PDF )
Security under Message-Derived Keys: Signcryption in iMessage
Mihir Bellare and Igors Stepanovs
2020/223 ( PDF )
Compact NIZKs from Standard Assumptions on Bilinear Maps
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2020/222 ( PDF )
Improving Speed and Security in Updatable Encryption Schemes
Dan Boneh and Saba Eskandarian and Sam Kim and Maurice Shih
2020/221 ( PDF )
Multiparty Reusable Non-Interactive Secure Computation
Fabrice Benhamouda and Huijia Lin
2020/220 ( PDF )
Remote Side-Channel Attacks on Anonymous Transactions
Florian Tramčr and Dan Boneh and Kenneth G. Paterson
2020/219 ( PDF )
Multi-Client Functional Encryption for Separable Functions
Michele Ciampi and Luisa Siniscalchi and Hendrik Waldner
2020/218 ( PDF )
Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs
Ehsan Aerabi and Milad Bohlouli and MohammadHasan Ahmadi Livany and Mahdi Fazeli and Athanasios Papadimitriou and David Hely
2020/217 ( PDF )
SynFi: Automatic Synthetic Fingerprint Generation
M. Sadegh Riazi and Seyed M. Chavoshian and Farinaz Koushanfar
2020/216 ( PDF )
Black-Box Constructions of Bounded-Concurrent Secure Computation
Sanjam Garg and Xiao Liang and Omkant Pandey and Ivan Visconti
2020/215 ( PDF )
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption
Megumi Ando and Anna Lysyanskaya
2020/214 ( PDF )
Thresholdizing HashEdDSA: MPC to the Rescue
Charlotte Bonte and Nigel P. Smart and Titouan Tanguy
2020/213 ( PDF )
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound
Akinori Hosoyamada and Yu Sasaki
2020/212 ( PDF )
Isogenies of certain abelian varieties over finite fields with p-ranks zero
Steve Thakur
2020/211 ( PDF )
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle
Davide Bellizia and Olivier Bronchain and Gaëtan Cassiers and Vincent Grosso and Chun Guo and Charles Momin and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2020/210 ( PDF )
SITM: See-In-The-Middle--Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers
Shivam Bhasin and Jakub Breier and Xiaolu Hou and Dirmanto Jap and Romain Poussier and Siang Meng Sim
2020/209 ( PDF )
Adaptive Simulation Security for Inner Product Functional Encryption
Shweta Agrawal and Benoît Libert and Monosij Maitra and Radu Titiu
2020/208 ( PDF )
Random Integer Lattice Generation via HNF
Gengran Hu and Lin You and Liqin Hu and Hui Wang
2020/207 ( PDF )
A Framework for Universally Composable Publicly Verifiable Cryptographic Protocols
Carsten Baum and Bernardo David and Rafael Dowsley
2020/206 ( -- withdrawn -- )
A Post-Quantum Non-Interactive Key-Exchange Protocol from Coding Theory
Jean-Francois Biasse and Giacomo Micheli and Edoardo Persichetti and Paolo Santini
2020/205 ( PDF )
SodsBC: Stream of Distributed Secrets for Quantum-safe Blockchain
Shlomi Dolev and Ziyu Wang
2020/204 ( PDF )
Cryptographic Reverse Firewalls for Interactive Proof Systems
Chaya Ganesh and Bernardo Magri and Daniele Venturi
2020/203 ( PDF )
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework
Thang Hoang and Jorge Guajardo and Attila A. Yavuz
2020/202 ( PDF )
Strong Anti-SAT: Secure and Effective Logic Locking
Yuntao Liu and Michael Zuzak and Yang Xie and Abhishek Chakraborty and Ankur Srivastava
2020/201 ( PDF )
A Survey on Neural Trojans
Yuntao Liu and Ankit Mondal and Abhishek Chakraborty and Michael Zuzak and Nina Jacobsen and Daniel Xing and Ankur Srivastava
2020/200 ( PDF )
Exploring the Golden Mean Between Leakage and Fault Resilience and Practice
Christoph Dobraunig and Bart Mennink and Robert Primas
2020/199 ( PDF )
Improvement on a Masked White-box Cryptographic Implementation
Seungkwang Lee and Myungchul Kim
2020/198 ( PDF )
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors
Shi Bai and Dipayan Das and Ryo Hiromasa and Miruna Rosca and Amin Sakzad and Damien Stehlé and Ron Steinfeld and Zhenfei Zhang
2020/197 ( PDF )
Dynamic Decentralized Functional Encryption
Jérémy Chotard and Edouard Dufour-Sans and Romain Gay and Duong Hieu Phan and David Pointcheval
2020/196 ( PDF )
Trustless Groups of Unknown Order with Hyperelliptic Curves
Samuel Dobson and Steven D. Galbraith and Benjamin Smith
2020/195 ( PDF )
Replicated state machines without replicated execution
Jonathan Lee and Kirill Nikitin and Srinath Setty
2020/194 ( PDF )
Adaptively Secure ABE for DFA from k-Lin and More
Junqing Gong and Hoeteck Wee
2020/193 ( PDF )
PSI from PaXoS: Fast, Malicious Private Set Intersection
Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai
2020/192 ( -- withdrawn -- )
Certificateless Homomorphic Signature Scheme for Network Coding
Jinyong Chang and Bilin Shao and Yanyan Ji and Genqing Bian
2020/191 ( PDF )
Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE
Zvika Brakerski and Vinod Vaikuntanathan
2020/190 ( PDF )
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees
Assimakis Kattis and Joseph Bonneau
2020/189 ( PDF )
Guaranteed Output Delivery Comes Free in Honest Majority MPC
Vipul Goyal and Yifan Song and Chenzhi Zhu
2020/188 ( PDF )
Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer
2020/187 ( PDF )
Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack
Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart
2020/186 ( PDF )
Bitcoin Crypto–Bounties for Quantum Capable Adversaries
Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt
2020/185 ( PDF )
Hardware Private Circuits: From Trivial Composition to Full Verification
Gaëtan Cassiers and Benjamin Grégoire and Itamar Levi and François-Xavier Standaert
2020/184 ( PDF )
Fair and Decentralized Exchange of Digital Goods
Ariel Futoransky and Carlos Sarraute and Daniel Fernandez and Matias Travizano and Ariel Waissbein
2020/183 ( PDF )
A Note on Secure Multiparty Computation via Higher Residue Symbol Techniques
Ignacio Cascudo and Reto Schnyder
2020/182 ( PDF )
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Maria Eichlseder and Lorenzo Grassi and Reinhard Lüftenegger and Morten Řygarden and Christian Rechberger and Markus Schofnegger and Qingju Wang
2020/181 ( PDF )
$L_1$-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space
Kohei Nakagawa and Hiroshi Onuki and Atsushi Takayasu and Tsuyoshi Takagi
2020/180 ( PDF )
Multikey FHE in the Plain Model
Prabhanjan Ananth and Abhishek Jain and ZhengZhong Jin and Giulio Malavolta
2020/179 ( PDF )
Mind the Middle Layer: The HADES Design Strategy Revisited
Nathan Keller and Asaf Rosemarin
2020/178 ( PDF )
A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device
Santosh Ghosh and Luis S Kida and Soham Jayesh Desai and Reshma Lal
2020/177 ( PDF )
Revisiting (R)CCA Security and Replay Protection
Christian Badertscher and Ueli Maurer and Christopher Portmann and Guilherme Rito
2020/176 ( PDF )
Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version)
Eugene Frimpong and Alexandros Bakas and Hai-Van Dang and Antonis Michalas
2020/175 ( PDF )
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
Stefan Dziembowski and Grzegorz Fabiański and Sebastian Faust and Siavash Riahi
2020/174 ( PDF )
On Selective-Opening Security of Deterministic Primitives
Mohammad Zaheri and Adam O'Neill
2020/173 ( PDF )
Securing Proof-of-Work Ledgers via Checkpointing
Dimitris Karakostas and Aggelos Kiayias
2020/172 ( PDF )
Qubit-based Unclonable Encryption with Key Recycling
Daan Leermakers and Boris Skoric
2020/171 ( PDF )
High Performance Logistic Regression for Privacy-Preserving Genome Analysis
Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen and Ariel Todoki
2020/170 ( PDF )
Reusable Two-Round MPC from DDH
James Bartusek and Sanjam Garg and Daniel Masny and Pratyay Mukherjee
2020/169 ( PDF )
Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE)
Prabhanjan Ananth and Abhishek Jain and Zhengzhong Jin
2020/168 ( PDF )
Improved Classical and Quantum Algorithms for Subset-Sum
Xavier Bonnetain and Rémi Bricout and André Schrottenloher and Yixin Shen
2020/167 ( PDF )
Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning
Jinhyun So and Basak Guler and A. Salman Avestimehr
2020/166 ( PDF )
Non Atomic Payment Splitting in Channel Networks
Stefan Dziembowski and Paweł Kędzior
2020/165 ( PDF )
Efficient Solutions of the CHES 2018 AES Challenge Using Deep Residual Neural Networks and Knowledge Distillation on Adversarial Examples
Aron Gohr and Sven Jacob and Werner Schindler
2020/164 ( PDF )
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way?
Alex Bienstock and Allison Bishop and Eli Goldin and Garrison Grogan and Victor Lecomte
2020/163 ( PDF )
Impossibility Results for Lattice-Based Functional Encryption Schemes
Akin Ünal
2020/162 ( PDF )
A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity
Ignacio Cascudo and Jaron Skovsted Gundersen
2020/161 ( PDF )
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact
Hanlin Liu and Yu Yu and Shuoyao Zhao and Jiang Zhang and Wenling Liu
2020/160 ( PDF )
Solving Some Affine Equations over Finite Fields
Sihem Mesnager and Kwang Ho Kim and Jong Hyok Choe and Dok Nam Lee
2020/159 ( PDF )
Privacy-preserving collaborative machine learning on genomic data using TensorFlow
Cheng Hong and Zhicong Huang and Wen-jie Lu and Hunter Qu and Li Ma and Morten Dahl and Jason Mancuso
2020/158 ( PDF )
Jump index in T-functions for designing a new basic structure of stream ciphers
Ali Hadipour and Seyed Mahdi Sajadieh and Raheleh Afifi
2020/157 ( PDF )
Multi-Source Non-Malleable Extractors and Applications
Vipul Goyal and Akshayaram Srinivasan and Chenzhi Zhu
2020/156 ( PDF )
Phantom: An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts
Xing Li and Yi Zheng and Kunxian Xia and Tongcheng Sun and John Beyler
2020/155 ( PDF )
Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference
Yifan Tian and Laurent Njilla and Jiawei Yuan and Shucheng Yu
2020/154 ( PDF )
Combiners for Functional Encryption, Unconditionally
Aayush Jain and Nathan Manohar and Amit Sahai
2020/153 ( PDF )
Constructing Secure Multi-Party Computation with Identifiable Abort
Nicholas-Philip Brandt and Sven Maier and Tobias Müller and Jörn Müller-Quade
2020/152 ( PDF )
Compressed $\Sigma$-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics
Thomas Attema and Ronald Cramer
2020/151 ( PDF )
Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
Wouter Castryck and Jana Sotáková and Frederik Vercauteren
2020/150 ( PDF )
On the Security of NTS-KEM in the Quantum Random Oracle Model
Varun Maram
2020/149 ( PDF )
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage
Matteo Campanelli and Dario Fiore and Nicola Greco and Dimitris Kolonelos and Luca Nizzardo
2020/148 ( PDF )
Determining the Core Primitive for Optimally Secure Ratcheting
Fatih Balli and Paul Rösler and Serge Vaudenay
2020/147 ( PDF )
Non-Malleability against Polynomial Tampering
Marshall Ball and Eshan Chattopadhyay and Jyun-Jie Liao and Tal Malkin and Li-Yang Tan
2020/146 ( PDF )
Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security
Roman Langrehr and Jiaxin Pan
2020/145 ( PDF )
Self-Secured PUF: Protecting the Loop PUF by Masking
Lars Tebelmann and Jean-Luc Danger and Michael Pehl
2020/144 ( PDF )
Double-Base Chains for Scalar Multiplications on Elliptic Curves
Wei Yu and Saud Al Musa and Bao Li
2020/143 ( PDF )
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT
Hailong Yao and Caifen Wang* and Xingbing Fu and Chao Liu and Bin Wu and Fagen Li
2020/142 ( PDF )
Network-Agnostic State Machine Replication
Erica Blum and Jonathan Katz and Julian Loss
2020/141 ( PDF )
Deterministic-Prover Zero-Knowledge Proofs
Hila Dahari and Yehuda Lindell
2020/140 ( PDF )
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model
Shaoquan Jiang and Guang Gong and Jingnan He and Khoa Nguyen and Huaxiong Wang
2020/139 ( PDF )
Going Beyond Dual Execution: MPC for Functions with Efficient Verification
Carmit Hazay and abhi shelat and Muthuramakrishnan Venkitasubramaniam
2020/138 ( PDF )
Smart Contract Derivatives
Kostis Karantias and Aggelos Kiayias and Dionysis Zindros
2020/137 ( PDF )
Consistency for Functional Encryption
Christian Badertscher and Aggelos Kiayias and Markulf Kohlweiss and Hendrik Waldner
2020/136 ( PDF )
Stacked Garbling for Disjunctive Zero-Knowledge Proofs
David Heath and Vladimir Kolesnikov
2020/135 ( PDF )
Threshold Ring Signatures: New Definitions and Post-Quantum Security
Abida Haque and Alessandra Scafuro
2020/134 ( PDF )
Malicious Security Comes Free in Honest-Majority MPC
Vipul Goyal and Yifan Song
2020/133 ( PDF )
Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware
Souradyuti Paul and Ananya Shrivastava
2020/132 ( PDF )
Boosting Verifiable Computation on Encrypted Data
Dario Fiore and Anca Nitulescu and David Pointcheval
2020/131 ( PDF )
Coin Tossing with Lazy Defense: Hardness of Computation Results
Hamidreza Amini Khorasgani and Hemanta K. Maji and Mingyuan Wang
2020/130 ( PDF )
Breaking the $O(\sqrt n)$-Bits Barrier: Balanced Byzantine Agreement with Polylog Bits Per-Party
Elette Boyle and Ran Cohen and Aarushi Goel
2020/129 ( PDF )
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
Juliane Krämer and Patrick Struck
2020/128 ( PDF )
LegRoast: Efficient post-quantum signatures from the Legendre PRF
Ward Beullens and Cyprien Delpech de Saint Guilhem
2020/127 ( PDF )
Fifty Shades of Ballot Privacy: Privacy against a Malicious Board
Véronique Cortier and Joseph Lallemand and Bogdan Warinschi
2020/126 ( PDF )
Public-Key Puncturable Encryption: Modular and Compact Constructions
Shi-Feng Sun and Amin Sakzad and Ron Steinfeld and Joseph Liu and Dawu Gu
2020/125 ( PDF )
Oblivious Parallel Tight Compaction
Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Enoch Peserico and Elaine Shi
2020/124 ( PDF )
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512
Ali El Kaafarani and Shuichi Katsumata and Federico Pintore
2020/123 ( PDF )
Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains
Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov
2020/122 ( PDF )
Verifiable Inner Product Encryption Scheme
Najmeh Soroush and Vincenzo Iovino and Alfredo Rial and Peter B. Roenne and Peter Y. A. Ryan
2020/121 ( PDF )
When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead
Hao Chen and Ilia Iliashenko and Kim Laine
2020/120 ( PDF )
The randomized slicer for CVPP: sharper, faster, smaller, batchier
Léo Ducas and Thijs Laarhoven and Wessel P.J. van Woerden
2020/119 ( PDF )
Hardness of LWE on General Entropic Distributions
Zvika Brakerski and Nico Döttling
2020/118 ( PDF )
InfoCommit: Information-Theoretic Polynomial Commitment and Verification
Saeid Sahraei and Salman Avestimehr
2020/117 ( PDF )
Efficient BIKE Hardware Design with Constant-Time Decoder
Andrew Reinders and Rafael Misoczki and Santosh Ghosh and Manoj Sastry
2020/116 ( PDF )
Separating Two-Round Secure Computation from Oblivious Transfer
Benny Applebaum and Zvika Brakerski and Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan
2020/115 ( PDF )
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
Xavier Boyen and Thomas Haines and Johannes Mueller
2020/114 ( PDF )
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
Antoine Delignat-Lavaud and Cédric Fournet and Bryan Parno and Jonathan Protzenko and Tahina Ramananandro and Jay Bosamiya and Joseph Lallemand and Itsaka Rakotonirina and Yi Zhou
2020/113 ( PDF )
New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve
Madhurima Mukhopadhyay and Palash Sarkar and Shashank Singh and Emmanuel Thome
2020/112 ( PDF )
A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography
Patrick Karl and Michael Tempelmeier
2020/111 ( PDF )
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2020/110 ( PDF )
Blazing Fast OT for Three-Round UC OT Extension
Ran Canetti and Pratik Sarkar and Xiao Wang
2020/109 ( PDF )
Fixing the Achilles Heel of E-Voting: The Bulletin Board
Lucca Hirschi and Lara Schmid and David Basin
2020/108 ( PDF )
Practical Forgeries for ORANGE
Christoph Dobraunig and Florian Mendel and Bart Mennink
2020/107 ( PDF )
One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication
Ryan Amos and Marios Georgiou and Aggelos Kiayias and Mark Zhandry
2020/106 ( PDF )
Relaxed freshness in component authentication
Frank Schuhmacher
2020/105 ( PDF )
MCU intrinsic group features for component authentication
Frank Schuhmacher
2020/104 ( PDF )
On the Security Goals of White-Box Cryptography
Estuardo Alpirez Bock and Alessandro Amadori and Chris Brzuska and Wil Michiels
2020/103 ( PDF )
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128
Boxin Zhao and Xiaoyang Dong and Keting Jia and Willi Meier
2020/102 ( PDF )
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
Boxin Zhao and Xiaoyang Dong and Keting Jia
2020/101 ( PDF )
A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future
Haibat Khan and Keith M. Martin
2020/100 ( PDF )
A direct proof of APN-ness of the Kasami functions
Claude Carlet and Kwang Ho Kim and Sihem Mesnager
2020/099 ( PDF )
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange
Benjamin Dowling and Torben Brandt Hansen and Kenneth G. Paterson
2020/098 ( PDF )
Improved key recovery on the Legendre PRF
Novak Kaluđerović and Thorsten Kleinjung and Dusan Kostic
2020/097 ( PDF )
Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard
Stanislav S. Malakhov
2020/096 ( PDF )
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons
David Galindo and Jia Liu and Mihai Ordean and Jin-Mann Wong
2020/095 ( PDF )
SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors
Zhongxiang Zheng and Anyu Wang and Haining Fan and Chunhuan Zhao and Chao Liu and Xue Zhang
2020/094 ( PDF )
On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms
Michael Davidson and Tyler Diamond
2020/093 ( PDF )
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
Romain Gay
2020/092 ( PDF )
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees
Daniel Jost and Ueli Maurer
2020/091 ( PDF )
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption
Jonathan Takeshita and Matthew Schoenbauer and Ryan Karl and Taeho Jung
2020/090 ( PDF )
Witness Maps and Applications
Suvradip Chakraborty and Manoj Prabhakaran and Daniel Wichs
2020/089 ( PDF )
The MILP-Aided Conditional Differential Attack and Its Application to Trivium
Chen-Dong Ye and Tian Tian and Fan-Yang Zeng
2020/088 ( PDF )
Streamlet: Textbook Streamlined Blockchains
Benjamin Y Chan and Elaine Shi
2020/087 ( PDF )
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey)
Elaine Shi
2020/086 ( PDF )
Bootstrapping in FHEW-like Cryptosystems
Daniele Micciancio and Yuriy Polyakov
2020/085 ( PDF )
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems
Ben Nassi and Dudi Nassi and Raz Ben-Netanel and Yisroel Mirsky and Oleg Drokin and Yuval Elovici
2020/084 ( PDF )
Bandwidth-efficient threshold EC-DSA
Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
2020/083 ( PDF )
Metal: A Metadata-Hiding File-Sharing System
Weikeng Chen and Raluca Ada Popa
2020/082 ( PDF )
Random Walks and Concurrent Zero-Knowledge
Anand Aiyer and Xiao Liang and Nilu Nalini and Omkant Pandey
2020/081 ( PDF )
Efficient polynomial commitment schemes for multiple points and polynomials
Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon
2020/080 ( PDF )
Better Secret-Sharing via Robust Conditional Disclosure of Secrets
Benny Applebaum and Amos Beimel and Oded Nir and Naty Peter
2020/079 ( PDF )
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective
Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
2020/078 ( PDF )
Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo
Kentaro Tamura and Yutaka Shikano
2020/077 ( PDF )
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms
Thomas Häner and Samuel Jaques and Michael Naehrig and Martin Roetteler and Mathias Soeken
2020/076 ( PDF )
Wyner-Ziv reconciliation for key exchange based on Ring-LWE
Charbel Saliba and Laura Luzzi and Cong Ling
2020/075 ( PDF )
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms
Rishiraj Bhattacharyya
2020/074 ( PDF )
Rolling up sleeves when subversion's in a field?
Daniel R. L. Brown
2020/073 ( PDF )
Anonymous Symmetric-Key Communication
Fabio Banfi and Ueli Maurer
2020/072 ( PDF )
Efficient Anonymous Tokens with Private Metadata Bit
Ben Kreuter and Tancrede Lepoint and Michele Orru and Mariana Raykova
2020/071 ( PDF )
Post-Quantum Authentication in TLS 1.3: A Performance Study
Dimitrios Sikeridis and Panos Kampanakis and Michael Devetsikiotis
2020/070 ( PDF )
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
Thomas Agrikola and Dennis Hofheinz and Julia Kastner
2020/069 ( PDF )
RSA and redactable blockchains
Dima Grigoriev and Vladimir Shpilrain
2020/068 ( PDF )
Further Clarification on Mantin's Digraph Repetition Bias in RC4
Pranab Chakraborty and Subhamoy Maitra
2020/067 ( PDF )
Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse
Taylor R Campbell
2020/066 ( PDF )
Talek: Private Group Messaging with Hidden Access Patterns
Raymond Cheng and William Scott and Elisaweta Masserova and Irene Zhang and Vipul Goyal and Thomas Anderson and Arvind Krishnamurthy and Bryan Parno
2020/065 ( PDF )
A Performant, Misuse-Resistant API for Primality Testing
Jake Massimo and Kenneth G. Paterson
2020/064 ( PDF )
Dual System in Lattice: Fully Secure ABE from LWE Assumption
Geng Wang and Ming Wan and Zhen Liu and Dawu Gu
2020/063 ( PDF )
Attack on LAC Key Exchange in Misuse Situation
Aurelien Greuet and Simon Montoya and Guenael Renault
2020/062 ( PDF )
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
Behzad Abdolmaleki and Sebastian Ramacher and Daniel Slamanig
2020/061 ( PDF )
Simple Schnorr Signature with Pedersen Commitment as Key
Gary Yu
2020/060 ( PDF )
Auditable Asymmetric Password Authenticated Public Key Establishment
Antonio Faonio and Maria Isabel Gonzalez Vasco and Claudio Soriente and Hien Thi Thu Truong
2020/059 ( PDF )
ARX-KW, a family of key wrapping constructions using SipHash and ChaCha
Satō Shinichi
2020/058 ( PDF )
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis
Guilherme Perin and Ileana Buhan and Stjepan Picek
2020/057 ( PDF )
On the smoothing parameter and last minimum of random orthogonal lattices
Elena Kirshanova and Huyen Nguyen and Damien Stehlé and Alexandre Wallet
2020/056 ( PDF )
AKCN-E8: Compact and Flexible KEM from Ideal Lattice
Zhengzhong JIn and Yunlei Zhao
2020/055 ( PDF )
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
Alejandro Cabrera Aldaya and Billy Bob Brumley
2020/054 ( PDF )
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA
Wen Wang and Shanquan Tian and Bernhard Jungk and Nina Bindel and Patrick Longa and Jakub Szefer
2020/053 ( PDF )
Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems"
Yasuhiko Ikematsu and Shuhei Nakamura
2020/052 ( PDF )
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
Mohamed Tolba and Muhammad ElSheikh and Amr M. Youssef
2020/051 ( PDF )
Low-Latency Hardware Masking with Application to AES
Pascal Sasdrich and Begül Bilgin and Michael Hutter and Mark Marson
2020/050 ( PDF )
Delphi: A Cryptographic Inference Service for Neural Networks
Pratyush Mishra and Ryan Lehmkuhl and Akshayaram Srinivasan and Wenting Zheng and Raluca Ada Popa
2020/049 ( PDF )
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Erdem Alkim and Hülya Evkan and Norman Lahr and Ruben Niederhagen and Richard Petri
2020/048 ( PDF )
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage
Changshe Ma and Yiping Gu and Hongfei Li
2020/047 ( PDF )
New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version)
Tianshuo Cong and Ximing Fu and Xuting Zhou and Yuli Zou and Haining Fan
2020/046 ( PDF )
On Analysis of Lightweight Stream Ciphers with Keyed Update
Orhun Kara and Muhammed F. Esgin
2020/045 ( PDF )
Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6
Haibat Khan and Benjamin Dowling and Keith M. Martin
2020/044 ( PDF )
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts
Alexander Chepurnoy and Amitabh Saxena
2020/043 ( PDF )
Zone Encryption with Anonymous Authentication for V2V Communication
Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa
2020/042 ( PDF )
BLAZE: Blazing Fast Privacy-Preserving Machine Learning
Arpita Patra and Ajith Suresh
2020/041 ( PDF )
Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders
Aggelos Kiayias and Saad Quader and Alexander Russell
2020/040 ( PDF )
A Compact and Scalable Hardware/Software Co-design of SIKE
Pedro Maat C. Massolino and Patrick Longa and Joost Renes and Lejla Batina
2020/039 ( PDF )
Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis
Damien Robissout and Gabriel Zaid and Brice Colombier and Lilian Bossuet and Amaury Habrard
2020/038 ( PDF )
Bitstream Modification Attack on SNOW 3G
Michail Moraitis and Elena Dubrova
2020/037 ( PDF )
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput
Matthias Fitzi and Peter Gaži and Aggelos Kiayias and Alexander Russell
2020/036 ( PDF )
Analysis on Aigis-Enc: asymmetrical and symmetrical
Yupu Hu and Siyue Dong and Xingting Dong
2020/035 ( PDF )
Constant-round Dynamic Group Key Exchange from RLWE Assumption
Rakyong Choi and Dongyeon Hong and Kwangjo Kim
2020/034 ( PDF )
SkyEye: A Traceable Scheme for Blockchain
Tianjun Ma and Haixia Xu and Peili Li
2020/033 ( PDF )
Scalable Open-Vote Network on Ethereum
Mohamed Seifelnasr and Hisham S. Galal and Amr M. Youssef
2020/032 ( PDF )
A New Approach for the Implementation of Binary Matrices Using SLP Applications
Mahdi Sajadieh and Mohsen Mousavi
2020/031 ( PDF )
Locally Decodable Codes with Randomized Encoding
Kuan Cheng and Xin Li and Yu Zheng
2020/030 ( PDF )
Κ-Cipher: A Low Latency, Bit Length Parameterizable Cipher
Michael Kounavis and Sergej Deutsch and Santosh Ghosh and David Durham
2020/029 ( PDF )
Differentially-Private Multi-Party Sketching for Large-Scale Statistics
Seung Geol Choi and Dana Dachman-Soled and Mukul Kulkarni and Arkady Yerukhimovich
2020/028 ( PDF )
Verified Security of BLT Signature Scheme
Denis Firsov and Ahto Buldas and Ahto Truu and Risto Laanoja
2020/027 ( PDF )
On Roots Factorization for PQC Algorithms
Alexander Maximov
2020/026 ( PDF )
Post-Quantum Secure Architectures for Automotive Hardware Secure Modules
Wen Wang and Marc Stöttinger
2020/025 ( PDF )
Single Secret Leader Election
Dan Boneh and Saba Eskandarian and Lucjan Hanzlik and Nicola Greco
2020/024 ( PDF )
The Arwen Trading Protocols (Full Version)
Ethan Heilman and Sebastien Lipmann and Sharon Goldberg
2020/023 ( PDF )
Threshold Multi-Signature with an Offline Recovery Party
Riccardo Longo and Alessio Meneghetti and Massimiliano Sala
2020/022 ( PDF )
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material)
Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson
2020/021 ( PDF )
eSIDH: the revenge of the SIDH
Daniel Cervantes-Vázquez and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez
2020/020 ( PDF )
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes
Shangqi Lai and Xingliang Yuan and Shi-Feng Sun and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Dongxi Liu
2020/019 ( PDF )
Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains
Suhyeon Lee and Seungjoo Kim
2020/018 ( PDF )
Triptych: logarithmic-sized linkable ring signatures with applications
Sarang Noether and Brandon Goodell
2020/017 ( PDF )
Biometric-Authenticated Searchable Encryption
Daniel Gardham and Mark Manulis and Constantin Cătălin Drăgan
2020/016 ( PDF )
Short Threshold Dynamic Group Signatures
Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa
2020/015 ( PDF )
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts
Hao Chen and Wei Dai and Miran Kim and Yongsoo Song
2020/014 ( PDF )
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
Gaëtan Leurent and Thomas Peyrin
2020/013 ( PDF )
On the Cryptographic Hardness of Local Search
Nir Bitansky and Idan Gerichter
2020/012 ( PDF )
Cortex-M4 Optimizations for \{R,M\}LWE Schemes
Erdem Alkim and Yusuf Alper Bilgin and Murat Cenk and François Gérard
2020/011 ( PDF )
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain
Ming Li,Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo
2020/010 ( PDF )
Double point compression for elliptic curves of $j$-invariant $0$
Dmitrii Koshelev
2020/009 ( PDF )
Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions
Thomas Pornin
2020/008 ( PDF )
Secret Sharing Schemes for Ports of Matroids of Rank 3
Oriol Farrŕs
2020/007 ( PDF )
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts
Nabil Alkeilani Alkadri and Rachid El Bansarkhani and Johannes Buchmann
2020/006 ( PDF )
Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures
André Chailloux and Thomas Debris-Alazard
2020/005 ( PDF )
Lai-Massey Scheme Revisited
M. R. Mirzaee Shamsabad and S. M. Dehnavi
2020/004 ( -- withdrawn -- )
BPCEX: Towards Blockchain-based Privacy-preserving Currency Exchange
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2020/003 ( -- withdrawn -- )
New Constructions of Traceable Range Proofs: Towards Multiple Regulation and Joint Regulation
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang
2020/002 ( PDF )
On a Conjecture of O'Donnell
Qichun Wang
2020/001 ( PDF )
Elliptic Curves of Nearly Prime Order
Manoj Gyawali and Daniele Di Tullio


[ Cryptology ePrint archive ]