Cryptology ePrint Archive: Listing for 2021
-
2021/201 ( PDF )
- DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security
- Hanshen Xiao and Srinivas Devadas
-
2021/200 ( PDF )
- Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols
- Sergiu Carpov and Kevin Deforth and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev and Jonathan Katz and Iraklis Leontiadis and M. Mohammadi and Abson Sae-Tang and Marius Vuille
-
2021/199 ( PDF )
- Generic, Efficient and Isochronous Gaussian Sampling over the Integers
- Shuo Sun and Yongbin Zhou and Yunfeng Ji and Rui Zhang and Yang Tao
-
2021/198 ( PDF )
- Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs
- Tatsuki Ono and Song Bian and Takashi Sato
-
2021/197 ( PDF )
- Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA
- Guilherme Perin and Lichao Wu and Stjepan Picek
-
2021/196 ( PDF )
- QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model
- Xu Liu and Mingqiang Wang
-
2021/195 ( PDF )
- Compilation of Function Representations for Secure Computing Paradigms
- Karim Baghery and Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Nigel P. Smart and Titouan Tanguy
-
2021/194 ( PDF )
- Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
- Raghvendra Rohit and Kai Hu and Sumanta Sarkar and Siwei Sun
-
2021/193 ( PDF )
- Multitarget decryption failure attacks and their application to Saber and Kyber
- Jan-Pieter D'Anvers and Senne Batsleer
-
2021/192 ( PDF )
- Quantum Indifferentiability of SHA-3
- Jan Czajkowski
-
2021/191 ( PDF )
- PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution
- Yaroslav Balytskyi and Manohar Raavi and Anatoliy Pinchuk and Sang-Yoon Chang
-
2021/190 ( PDF )
- Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source
- Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen
-
2021/189 ( PDF )
- Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette
- Yunwen Liu and Siwei Sun and Chao Li
-
2021/188 ( PDF )
- Tight Security Bounds for Micali’s SNARGs
- Alessandro Chiesa and Eylon Yogev
-
2021/187 ( PDF )
- Weak Keys in Reduced AEGIS and Tiaoxin
- Fukang Liu and Takanori Isobe and Willi Meier and Kosei Sakamoto
-
2021/186 ( PDF )
- Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages
- Hemanta K. Maji and Hai H. Nguyen and Anat Paskin-Cherniavsky and Tom Suad and Mingyuan Wang
-
2021/185 ( PDF )
- No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms
- Hwajeong Seo and Pakize Sanal and Wai-Kong Lee and Reza Azarderakhsh
-
2021/184 ( PDF )
- Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption
- Sravya Yandamuri and Ittai Abraham and Kartik Nayak and Michael K. Reiter
-
2021/183 ( PDF )
- Efficient State Management in Distributed Ledgers
- Dimitris Karakostas and Nikos Karayannidis and Aggelos Kiayias
-
2021/182 ( PDF )
- The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications
- István András Seres and Máté Horváth and Péter Burcsi
-
2021/181 ( PDF )
- Group Signatures with User-Controlled and Sequential Linkability
- Jesus Diaz and Anja Lehmann
-
2021/180 ( PDF )
- Apollo -- Optimistically Linear and Responsive SMR
- Adithya Bhat and Akhil Bandarupalli and Saurabh Bagchi and Aniket Kate and Michael Reiter
-
2021/179 ( PDF )
- Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis
- An Wang and Yuan Li and Yaoling Ding and Liehuang Zhu and Yongjuan Wang
-
2021/178 ( PDF )
- Attribute-Based Access Control for Inner Product Functional Encryption from LWE
- Tapas Pal and Ratna Dutta
-
2021/177 ( PDF )
- Generic Negation of Pair Encodings
- Miguel Ambrona
-
2021/176 ( PDF )
- Blitz: Secure Multi-Hop Payments Without Two-Phase Commits
- Lukas Aumayr and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei
-
2021/175 ( PDF )
- On the Relationships between Different Methods for Degree Evaluation (Full Version)
- Siwei Chen and Zejun Xiang and Xiangyong Zeng and Shasha Zhang
-
2021/174 ( PDF )
- Smart Contracts for Incentivized Outsourcing of Computation
- Alptekin Küpçü and Reihaneh Safavi-Naini
-
2021/173 ( PDF )
- TensorCrypto
- Wai-Kong Lee and Hwajeong Seo and Zhenfei Zhang and Seongoun Hwang
-
2021/172 ( PDF )
- Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI
- Nishanth Chandran and Nishka Dasgupta and Divya Gupta and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Akash Shah
-
2021/171 ( PDF )
- Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Revisited
- Wei Yu and Guangwu Xu
-
2021/170 ( PDF )
- Fully Anonymous Group Signature with Verifier-Local Revocation
- Ai Kitagawa and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka
-
2021/169 ( PDF )
- Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials
- Yasuhiko Ikematsu and Shuhei Nakamura and Bagus Santoso and Takanori Yasuda
-
2021/168 ( PDF )
- Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS
- Xiaohan Zhang and Chi Cheng and Yue Qin and Ruoyu Ding
-
2021/167 ( PDF )
- Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware
- Seetal Potluri and Aydin Aysu
-
2021/166 ( PDF )
- Cost Fairness for Blockchain-Based Two-Party Exchange Protocols
- Matthias Lohr and Benjamin Schlosser and Jan Jürjens and Steffen Staab
-
2021/165 ( PDF )
- Composition with Knowledge Assumptions
- Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
-
2021/164 ( PDF )
- Graph-Based Construction for Non-Malleable Codes
- Shohei Satake and Yujie Gu and Kouichi Sakurai
-
2021/163 ( PDF )
- CNF-FSS and its Applications
- Paul Bunn and Eyal Kushilevitz and Rafail Ostrovsky
-
2021/162 ( PDF )
- Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity
- Giuseppe Ateniese and Long Chen and Danilo Francati and Dimitrios Papadopoulos and Qiang Tang
-
2021/161 ( PDF )
- Generic Adaptor Signature
- Xianrui Qin and Handong Cui and Tsz Hon Yuen
-
2021/160 ( PDF )
- Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance
- Tibor Jager and Rafael Kurek and David Niehues
-
2021/159 ( PDF )
- hbACSS: How to Robustly Share Many Secrets
- Thomas Yurek and Licheng Luo and Jaiden Fairoze and Aniket Kate and Andrew Miller
-
2021/158 ( PDF )
- Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate
- Nicolas Resch and Chen Yuan
-
2021/157 ( PDF )
- Sycon: A New Milestone in Designing ASCON-like Permutations
- Kalikinkar Mandal and Dhiman Saha and Sumanta Sarkar and Yosuke Todo
-
2021/156 ( PDF )
- Mechanized Proofs of Adversarial Complexity and Application to Universal Composability
- Manuel Barbosa and Gilles Barthe and Benjamin Grégoire and Adrien Koutsos and Pierre-Yves Strub
-
2021/155 ( PDF )
- Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
- James Howe and Marco Martinoli and Elisabeth Oswald and Francesco Regazzoni
-
2021/154 ( PDF )
- Generating cryptographically-strong random lattice bases and recognizing rotations of $\mathbb{Z}^n$
- Tamar Lichter Blanks and Stephen D. Miller
-
2021/153 ( PDF )
- On the Isogeny Problem with Torsion Point Information
- Boris Fouotsa Tako and Péter Kutas and Simon-Philipp Merz
-
2021/152 ( PDF )
- Hybrid Dual Attack on LWE with Arbitrary Secrets
- Lei Bi and Xianhui Lu and Junjie Luo and Kunpeng Wang and Zhenfei Zhang
-
2021/151 ( PDF )
- On Sufficient Oracles for Secure Computation with Identifiable Abort
- Mark Simkin and Luisa Siniscalchi and and Sophia Yakoubov
-
2021/150 ( PDF )
- Two-Party Adaptor Signatures From Identification Schemes
- Andreas Erwig and Sebastian Faust and Kristina Hostáková and Monosij Maitra and Siavash Riahi
-
2021/149 ( PDF )
- Quantum Security of the Legendre PRF
- Paul Frixons and André Schrottenloher
-
2021/148 ( PDF )
- On methods of shortening ElGamal-type signatures
- Liliya Akhmetzyanova and Evgeny Alekseev and Alexandra Babueva and Stanislav Smyshlyaev
-
2021/147 ( PDF )
- IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols
- Greg Morrisett and Elaine Shi and Kristina Sojakova and Xiong Fan and Joshua Gancher
-
2021/146 ( PDF )
- Boolean Functions from Hyperplane Coverings
- Benjamin E. Diamond
-
2021/145 ( PDF )
- A Security Framework for Distributed Ledgers
- Christoph Egger and Mike Graf and Ralf Kuesters and Daniel Rausch and Viktoria Ronge and and Dominique Schröder
-
2021/144 ( PDF )
- \(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol
- Morteza Adeli and Nasour Bagheri and Sadegh Sadeghi and Saru Kumari
-
2021/143 ( PDF )
- The Bitcoin Cash Backbone Protocol
- Juan Garay and Yu Shen
-
2021/142 ( PDF )
- Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication
- Muah Kim and Onur Gunlu and Rafael F. Schaefer
-
2021/141 ( PDF )
- Advanced Lattice Sieving on GPUs, with Tensor Cores
- Léo Ducas and Marc Stevens and Wessel van Woerden
-
2021/140 ( PDF )
- Practical and Scalable Access Control Mechanism for the Internet of Things
- Clémentine Gritti and Emanuel Regnath and Sebastian Steinhorst
-
2021/139 ( PDF )
- Order-Fair Consensus in the Permissionless Setting
- Mahimna Kelkar and Soubhik Deb and Sreeram Kannan
-
2021/138 ( PDF )
- Classic McEliece Implementation with Low Memory Footprint
- Johannes Roth and Evangelos Karatsiolis and Juliane Krämer
-
2021/137 ( PDF )
- Cryptographic Security of the MLS RFC, Draft 11
- Chris Brzuska and Eric Cornelissen and Konrad Kohbrok
-
2021/136 ( PDF )
- An approach for designing fast public key encryption systems using white-box cryptography techniques
- Dmitry Schelkunov
-
2021/135 ( PDF )
- Acyclicity Programming for Sigma-Protocols
- Masayuki Abe and Miguel Ambrona and Andrej Bogdanov and Miyako Ohkubo and Alon Rosen
-
2021/134 ( PDF )
- Cryptanalysis of a code-based signature scheme without trapdoors
- Marco Baldi and Jean-Christophe Deneuville and Edoardo Persichetti and Paolo Santini
-
2021/133 ( PDF )
- smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
- Ravital Solomon and Ghada Almashaqbeh
-
2021/132 ( PDF )
- Privacy-Preserving Feature Selection with Secure Multiparty Computation
- Xiling Li and Rafael Dowsley and Martine De Cock
-
2021/131 ( PDF )
- Privacy-Preserving Video Classification with Convolutional Neural Networks
- Sikha Pentyala and Rafael Dowsley and Martine De Cock
-
2021/130 ( PDF )
- Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves
- Bei Wang; Songsong Li; Yi Ouyang; Honggang Hu
-
2021/129 ( PDF )
- Lattice-based weak curve fault attack on ECDSA
- Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Wei
-
2021/128 ( PDF )
- Designing Tweakable Enciphering Schemes Using Public Permutations
- Debrup Chakraborty and Avijit Dutta and Samir Kundu
-
2021/127 ( PDF )
- Cuproof: A Novel Range Proof with Constant Size
- Cong Deng and Xianghong Tang and Lin You and Gengran Hu
-
2021/126 ( PDF )
- Observability attack on stream generators
- Ramachandran Anantharaman and Virendra Sule
-
2021/125 ( PDF )
- Privacy Preserving and Resilient RPKI
- Kris Shrishak and Haya Shulman
-
2021/124 ( PDF )
- Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption
- Ozgun Ozerk and Can Elgezen and Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
-
2021/123 ( PDF )
- A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs
- Yue Qin and Chi Cheng and Xiaohan Zhang and Yanbin Pan and Lei Hu and Jintai Ding
-
2021/122 ( PDF )
- PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
- Aner Ben Efraim and Olga Nissenbaum and Eran Omri and Anat Paskin-Cherniavsky
-
2021/121 ( PDF )
- BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits
- Yaron Gvili and Sarah Scheffler and Mayank Varia
-
2021/120 ( PDF )
- Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits
- Aner Ben-Efraim and Kelong Cong and Eran Omri and Emmanuela Orsini and Nigel P. Smart and Eduardo Soria-Vazquez
-
2021/119 ( PDF )
- Rabbit: Efficient Comparison for Secure Multi-Party Computation
- Eleftheria Makri and Dragos Rotaru and Frederik Vercauteren and Sameer Wagh
-
2021/118 ( PDF )
- High-Threshold AVSS with Optimal Communication Complexity
- Nicolas Alhaddad and Mayank Varia and Haibin Zhang
-
2021/117 ( PDF )
- FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin
- Arash Mirzaei and Amin Sakzad and Jiangshan Yu and Ron Steinfeld
-
2021/116 ( PDF )
- MAKE: a Matrix Action Key Exchange
- Nael Rahman and Vladimir Shpilrain
-
2021/115 ( PDF )
- Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4
- Mila Anastasova and Reza Azarderakhsh and Mehran Mozaffari Kermani
-
2021/114 ( PDF )
- Security Analysis of CPace
- Michel Abdalla and Björn Haase and Julia Hesse
-
2021/113 ( PDF )
- Improvement of Secure Multi-Party Multiplication of (k,n) Threshold Secret Sharing Using Only N=k Servers (Revised Version)
- Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura
-
2021/112 ( -- withdrawn -- )
- Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange
- Majid Salimi and Hamid Mala and Honorio Martin and Pedro Peris-Lopez
-
2021/111 ( PDF )
- A note on Post Quantum Onion Routing
- Kelesidis Evgnosia-Alexandra
-
2021/110 ( PDF )
- Replacing Probability Distributions in Security Games via Hellinger Distance
- Kenji Yasunaga
-
2021/109 ( PDF )
- Sequential Logic Encryption Against Model Checking Attack
- Amin Rezaei and Hai Zhou
-
2021/108 ( PDF )
- Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs
- Sara Ricci and Lukas Malina and Petr Jedlicka and David Smekal and Jan Hajny and Petr Cibik and Patrik Dobias
-
2021/107 ( PDF )
- A Decentralized and Encrypted National Gun Registry
- Seny Kamara and Tarik Moataz and Andrew Park and Lucy Qin
-
2021/106 ( PDF )
- MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers
- Aram Jivanyan and Jesse Lancaster and Arash Afshar and Parnian Alimi
-
2021/105 ( PDF )
- A New Efficient Identity-Based Encryption Without Pairing
- Majid Salimi
-
2021/104 ( PDF )
- Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography
- Shivam Bhasin and Jan-Pieter D'Anvers and Daniel Heinz and Thomas Pöppelmann and Michiel Van Beirendonck
-
2021/103 ( PDF )
- RUP Security of the SAEF Authenticated Encryption mode
- Elena Andreeva and Amit Singh Bhati and Damian Vizar
-
2021/102 ( PDF )
- A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization
- Madalina Chirita and Alexandru-Mihai Stroie and Andrei-Daniel Safta and Emil Simion
-
2021/101 ( PDF )
- Combined Fault and DPA Protection for Lattice-Based Cryptography
- Daniel Heinz and Thomas Pöppelmann
-
2021/100 ( PDF )
- SPURT: Scalable Distributed Randomness Beacon with Transparent Setup
- Sourav Das and Vinith Krishnan and Irene Miriam Isaac and Ling Ren
-
2021/099 ( PDF )
- Property Inference from Poisoning
- Melissa Chase and Esha Ghosh and Saeed Mahloujifar
-
2021/098 ( PDF )
- Image sets of perfectly nonlinear maps
- Lukas Kölsch and Björn Kriepke and Gohar Kyureghyan
-
2021/097 ( PDF )
- A New and Improved Reduction Proof of Cascade PRF
- Mridul Nandi
-
2021/096 ( PDF )
- Gladius: LWR based efficient hybrid public key encryption with distributed decryption
- Kelong Cong and Daniele Cozzo and Varun Maram and Nigel P. Smart
-
2021/095 ( PDF )
- Collusion-Deterrent Threshold Information Escrow
- Easwar Vivek Mangipudi and Donghang Lu and Aniket Kate
-
2021/094 ( PDF )
- Reducing HSM Reliance in Payments through Proxy Re-Encryption
- Sivanarayana Gaddam and Atul Luykx and Rohit Sinha and Gaven Watson
-
2021/093 ( PDF )
- Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks
- Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
-
2021/092 ( PDF )
- New Public Key Cryptosystem (First Version)
- Dieaa I. Nassr and M. Anwar and Hatem M. Bahig
-
2021/091 ( PDF )
- Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks
- Ilaria Chillotti and Marc Joye and Pascal Paillier
-
2021/090 ( PDF )
- A New Twofold Cornacchia-Type Algorithm for 4-GLV Decompositions and Its Applications
- Bei Wang; Yi Ouyang; Honggang Hu ; Songsong Li
-
2021/089 ( PDF )
- Fuzzy Message Detection
- Gabrielle Beck and Julia Len and Ian Miers and Matthew Green
-
2021/088 ( PDF )
- An Overview of the Hybrid Argument
- Marc Fischlin and Arno Mittelbach
-
2021/087 ( PDF )
- ZEN: Efficient Zero-Knowledge Proofs for Neural Networks
- Boyuan Feng and Lianke Qin and Zhenfei Zhang and Yufei Ding and Shumo Chu
-
2021/086 ( PDF )
- On Elapsed Time Consensus Protocols
- Mic Bowman and Debajyoti Das and Avradip Mandal and Hart Montgomery
-
2021/085 ( PDF )
- Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves
- Suhri Kim
-
2021/084 ( PDF )
- Ariadne Thread and Salt: New Multivariate Cryptographic Schemes with Public Keys in Degree 3
- Gilles Macario-Rat and Jacques Patarin
-
2021/083 ( PDF )
- The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol
- Michael Troncoso and Britta Hale
-
2021/082 ( PDF )
- Grades of Trust in Multiparty Computation
- Jaskaran V. Singh and Nicholas Hopper
-
2021/081 ( PDF )
- Private Stream Aggregation from Labeled Secret Sharing Schemes
- Hendrik Waldner and Tilen Marc and Miha Stopar and Michel Abdalla
-
2021/080 ( PDF )
- Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption
- Jan-Pieter D'Anvers and Emmanuela Orsini and Frederik Vercauteren
-
2021/079 ( PDF )
- A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM
- Kalle Ngo and Elena Dubrova and Qian Guo and Thomas Johansson
-
2021/078 ( PDF )
- An Incentive-Compatible Smart Contract for Decentralized Commerce
- Nikolaj I. Schwartzbach
-
2021/077 ( PDF )
- Magnetic RSA
- Rémi Géraud-Stewart and David Naccache
-
2021/076 ( PDF )
- QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field
- Kang Yang and Pratik Sarkar and Chenkai Weng and Xiao Wang
-
2021/075 ( PDF )
- A Generalization of the Subfield Construction
- Kamil Otal
-
2021/074 ( PDF )
- Cross-Domain Attribute-Based Access Control Encryption
- Mahdi Sedaghat and Bart Preneel
-
2021/073 ( PDF )
- Application of Velusqrt algorithm to Huff's and general Huff's curves
- Michał Wroński
-
2021/072 ( PDF )
- Toward Practical Autoencoder-based Side-Channel Analysis Evaluations
- Servio Paguada and Lejla Batina and Igor Armendariz
-
2021/071 ( PDF )
- Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis
- Jorai Rijsdijk and Lichao Wu and Guilherme Perin and Stjepan Picek
-
2021/070 ( PDF )
- Secure, Accurate, and Practical Narrow-Band Ranging System
- Aysajan Abidin and Mohieddine El Soussi and Jac Romme and Pepijn Boer and Dave Singelée and Christian Bachmann
-
2021/069 ( PDF )
- Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation
- Amanda Resende and Davis Railsback and Rafael Dowsley and Anderson C. A. Nascimento and Diego F. Aranha
-
2021/068 ( PDF )
- Banquet: Short and Fast Signatures from AES
- Carsten Baum and Cyprien Delpech de Saint Guilhem and Daniel Kales and Emmanuela Orsini and Peter Scholl and Greg Zaverucha
-
2021/067 ( PDF )
- Analysis and Comparison of Table-based Arithmetic to Boolean Masking
- Michiel Van Beirendonck and Jan-Pieter D’Anvers and Ingrid Verbauwhede
-
2021/066 ( PDF )
- A Deep Learning Approach for Active S-box Prediction of Lightweight Block Ciphers
- Mohamed Fadl Idris and Je Sen Teh and Jasy Liew Suet Yan and Wei-Zhu Yeoh
-
2021/065 ( PDF )
- FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves
- Dorin-Marian Ionita and Emil Simion
-
2021/064 ( PDF )
- Fault Attacks on CCA-secure Lattice KEMs
- Peter Pessl and Lukas Prokop
-
2021/063 ( PDF )
- CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing
- Monir Azraoui and Solenn Brunet and Sébastien Canard and Aďda Diop and Lélia Eveillard and Alicia Filipiak and Adel Hamdi and Flavie Misarsky and Donald Nokam Kuate and Marie Paindavoine and Quentin Santos and Bastien Vialla
-
2021/062 ( PDF )
- Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3)
- Dominique Unruh
-
2021/061 ( PDF )
- A Note on IBE Performance of a Practical Application
- Ştefan Maftei and Marius Supuran and Emil Simion
-
2021/060 ( PDF )
- UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts
- Ran Canetti and Rosario Gennaro and Steven Goldfeder and Nikolaos Makriyannis and Udi Peled
-
2021/059 ( PDF )
- On the Cost of Adaptivity in Graph-Based Games
- Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter
-
2021/058 ( PDF )
- A Performance Study of Crypto-Hardware in the Low-end IoT
- Peter Kietzmann and Lena Boeckmann and Leandro Lanzieri and Thomas C. Schmidt and Matthias Wählisch
-
2021/057 ( PDF )
- Correlation Intractability vs. One-wayness
- Tamer Mour
-
2021/056 ( PDF )
- The Study of Modulo $2^n$
- Zhongfeng Niu
-
2021/055 ( PDF )
- Tech Report: Inerial HSMs Thwart Advanced Physical Attacks
- Jan Sebastian Götte and Björn Scheuermann
-
2021/054 ( PDF )
- The Cost of IEEE Arithmetic in Secure Computation
- David W. Archer and Shahla Atapoor and Nigel P. Smart
-
2021/053 ( PDF )
- On Algebraic Embedding for Unstructured Lattices
- Madalina Bolboceanu and Zvika Brakerski and Devika Sharma
-
2021/052 ( PDF )
- Elementary Attestation of Cryptographically Useful Composite Moduli
- Rémi Géraud-Stewart and David Naccache
-
2021/051 ( PDF )
- How Much can F5 Really Do
- Jintai Ding and Zheng Zhang and Joshua Deaton
-
2021/050 ( PDF )
- The Distinguishing Attack on HFE
- Joshua Deaton and Jintai Ding
-
2021/049 ( PDF )
- ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process
- Mark D. Aagaard and Nusa Zidaric
-
2021/048 ( PDF )
- Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution
- Sohyun Jeon and Hyang-Sook Lee and Jeongeun Park
-
2021/047 ( PDF )
- Evolution of Bulletin Board & its application to E-Voting – A Survey
- Misni Harjo Suwito and Yoshifumi Ueshige and Kouichi Sakurai
-
2021/046 ( PDF )
- Efficient Lattice-Based Inner-Product Functional Encryption
- Jose Maria Bermudo Mera and Angshuman Karmakar and Tilen Marc and Azam Soleimanian
-
2021/045 ( PDF )
- Banners: Binarized Neural Networks with Replicated Secret Sharing
- Alberto Ibarrondo and Hervé Chabanne and Melek Önen
-
2021/044 ( PDF )
- Aloha: Metadata-private voice communication over fully untrusted infrastructure
- Ishtiyaque Ahmad and Yuntian Yang and Divyakant Agrawal and Amr El Abbadi and Trinabh Gupta
-
2021/043 ( PDF )
- Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields
- Madhurima Mukhopadhyay and Palash Sarkar
-
2021/042 ( PDF )
- Correcting Subverted Random Oracles
- Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou and Jiadong Zhu
-
2021/041 ( PDF )
- Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot
- Panos Kampanakis and Peter Panburana and Michael Curcio and Chirag Shroff and Md Mahbub Alam
-
2021/040 ( PDF )
- On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product
- Any Muanalifah and Serge˘ı Sergeev
-
2021/039 ( PDF )
- Practical FHE parameters against lattice attacks
- Jung Hee Cheon and Yongha Son and Donggeon Yhee
-
2021/038 ( PDF )
- Streaming Merkle Proofs within Binary Numeral Trees
- Luke Champine
-
2021/037 ( PDF )
- New First-Order Secure AES Performance Records
- Aein Rezaei Shahmirzadi and Dušan Božilov and Amir Moradi
-
2021/036 ( PDF )
- The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
- Niluka Amarasinghe and Xavier Boyen and Matthew McKague
-
2021/035 ( PDF )
- Sketches for Blockchains
- Ori Rottenstreich
-
2021/034 ( PDF )
- Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF
- Nishanth Chandran and Divya Gupta and Akash Shah
-
2021/033 ( PDF )
- Quantum-resistant Anonymous IBE with Traceable Identities
- Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo and Yu-Chi Chen
-
2021/032 ( PDF )
- Experimental relativistic zero-knowledge proofs
- Pouriya Alikhani and Nicolas Brunner and Claude Crépeau and Sébastien Designolle and Raphaël Houlmann and Weixu Shi and Hugo Zbinden
-
2021/031 ( PDF )
- A Comparative Study of Cryptographic Key Distribution Protocols
- Alexandru-Ștefan Gheorghieș and Darius-Marian Lăzăroi and Emil Simion
-
2021/030 ( PDF )
- Linear-time zero-knowledge SNARKs for R1CS
- Jonathan Lee and Srinath Setty and Justin Thaler and Riad Wahby
-
2021/029 ( PDF )
- EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs
- Thomas Schneider and Oleksandr Tkachenko
-
2021/028 ( PDF )
- A Side Journey to Titan
- Victor LOMNE and Thomas ROCHE
-
2021/027 ( PDF )
- E-voting protocols in context of COVID19
- Sfirnaciuc Emilia and Vasilescu Miruna-Elena and Simion Emil
-
2021/026 ( PDF )
- A Gapless Code-Based Hash Proof System based on RQC and its Applications
- Slim Bettaieb and Loďc Bidoux and Olivier Blazy and Yann Connan and Philippe Gaborit
-
2021/025 ( PDF )
- FLGUARD: Secure and Private Federated Learning
- Thien Duc Nguyen and Phillip Rieger and Hossein Yalame and Helen Möllering and Hossein Fereidooni and Samuel Marchal and Markus Miettinen and Azalia Mirhoseini and Ahmad-Reza Sadeghi and Thomas Schneider and Shaza Zeitouni
-
2021/024 ( PDF )
- PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System
- Pedro Hecht
-
2021/023 ( PDF )
- What is Meant by Permissionless Blockchains?
- Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Andreas Kern and Walid Fdhila
-
2021/022 ( PDF )
- Increasing Precision of Division Property
- Patrick Derbez and Pierre-Alain Fouque
-
2021/021 ( PDF )
- Fake Near Collisions Attacks
- Patrick Derbez and Pierre-Alain Fouque and Victor Mollimard
-
2021/020 ( PDF )
- Catching the Fastest Boomerangs - Application to SKINNY
- Stéphanie Delaune and Patrick Derbez and Mathieu Vavrille
-
2021/019 ( PDF )
- Kummer versus Montgomery Face-off over Prime Order Fields
- Kaushik Nath and Palash Sarkar
-
2021/018 ( PDF )
- Comments on ``On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment''
- Yuhao Yang and Xiujie Huang
-
2021/017 ( PDF )
- Lightweight Techniques for Private Heavy Hitters
- Dan Boneh and Elette Boyle and Henry Corrigan-Gibbs and Niv Gilboa and Yuval Ishai
-
2021/016 ( PDF )
- Black-Box Uselessness: Composing Separations in Cryptography
- Geoffroy Couteau and Pooya Farshim and Mohammad Mahmoody
-
2021/015 ( PDF )
- SoK: Remote Power Analysis
- Macarena Martínez-Rodríguez and Ignacio M. Delgado-Lozano and Billy Bob Brumley
-
2021/014 ( -- withdrawn -- )
- Efficient Multilinear Map from Graded Encoding Scheme
- Majid Salimi
-
2021/013 ( PDF )
- An atlas of the Richelot isogeny graph
- Enric Florit and Benjamin Smith
-
2021/012 ( PDF )
- Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph
- Enric Florit and Benjamin Smith
-
2021/011 ( PDF )
- Complete solution over $\GF{p^n}$ of the equation $X^{p^k+1}+X+a=0$
- Kwang Ho Kim and Jong Hyok Choe and Sihem Mesnager
-
2021/010 ( PDF )
- Compcrypt -- Lightweight ANS-based Compression and Encryption
- Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk
-
2021/009 ( PDF )
- Demand-aware Channel Topologies for Off-chain Blockchain Payments
- Julia Khamis and Ori Rottenstreich
-
2021/008 ( PDF )
- A Family of Nonlinear MDS Diffusion Layers over $\mathbb{F}_{2^{4n}}$
- M. R. Mirzaee Shamsabad and S. M. Dehnavi
-
2021/007 ( PDF )
- Notes on a lattice-based proxy-oriented identity-based encryption with keyword search
- Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Cheng-Yi Lee
-
2021/006 ( PDF )
- Privacy-Preserving Privacy Profile Proposal Protocol
- Wyatt Howe and Andrei Lapets
-
2021/005 ( PDF )
- Aggregatable Distributed Key Generation
- Kobi Gurkan and Philipp Jovanovic and Mary Maller and Sarah Meiklejohn and Gilad Stern and Alin Tomescu
-
2021/004 ( PDF )
- LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions
- Ismail San
-
2021/003 ( PDF )
- Ciphertext Policy Attribute Based Encryption for Arithmetic circuits
- Mahdi Mahdavi Oliaee and Zahra Ahmadian
-
2021/002 ( PDF )
- Can Lattice Signature be as Efficient as Lattice Encryption?
- Dingfeng Ye
-
2021/001 ( PDF )
- 2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product
- Michel Abdalla and David Pointcheval and Azam Soleimanian
[ Cryptology ePrint archive ]