Cryptology ePrint Archive: Listing for 2021

2021/201 ( PDF )
DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security
Hanshen Xiao and Srinivas Devadas
2021/200 ( PDF )
Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols
Sergiu Carpov and Kevin Deforth and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev and Jonathan Katz and Iraklis Leontiadis and M. Mohammadi and Abson Sae-Tang and Marius Vuille
2021/199 ( PDF )
Generic, Efficient and Isochronous Gaussian Sampling over the Integers
Shuo Sun and Yongbin Zhou and Yunfeng Ji and Rui Zhang and Yang Tao
2021/198 ( PDF )
Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs
Tatsuki Ono and Song Bian and Takashi Sato
2021/197 ( PDF )
Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA
Guilherme Perin and Lichao Wu and Stjepan Picek
2021/196 ( PDF )
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model
Xu Liu and Mingqiang Wang
2021/195 ( PDF )
Compilation of Function Representations for Secure Computing Paradigms
Karim Baghery and Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Nigel P. Smart and Titouan Tanguy
2021/194 ( PDF )
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Raghvendra Rohit and Kai Hu and Sumanta Sarkar and Siwei Sun
2021/193 ( PDF )
Multitarget decryption failure attacks and their application to Saber and Kyber
Jan-Pieter D'Anvers and Senne Batsleer
2021/192 ( PDF )
Quantum Indifferentiability of SHA-3
Jan Czajkowski
2021/191 ( PDF )
PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution
Yaroslav Balytskyi and Manohar Raavi and Anatoliy Pinchuk and Sang-Yoon Chang
2021/190 ( PDF )
Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source
Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen
2021/189 ( PDF )
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette
Yunwen Liu and Siwei Sun and Chao Li
2021/188 ( PDF )
Tight Security Bounds for Micali’s SNARGs
Alessandro Chiesa and Eylon Yogev
2021/187 ( PDF )
Weak Keys in Reduced AEGIS and Tiaoxin
Fukang Liu and Takanori Isobe and Willi Meier and Kosei Sakamoto
2021/186 ( PDF )
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages
Hemanta K. Maji and Hai H. Nguyen and Anat Paskin-Cherniavsky and Tom Suad and Mingyuan Wang
2021/185 ( PDF )
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms
Hwajeong Seo and Pakize Sanal and Wai-Kong Lee and Reza Azarderakhsh
2021/184 ( PDF )
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption
Sravya Yandamuri and Ittai Abraham and Kartik Nayak and Michael K. Reiter
2021/183 ( PDF )
Efficient State Management in Distributed Ledgers
Dimitris Karakostas and Nikos Karayannidis and Aggelos Kiayias
2021/182 ( PDF )
The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications
István András Seres and Máté Horváth and Péter Burcsi
2021/181 ( PDF )
Group Signatures with User-Controlled and Sequential Linkability
Jesus Diaz and Anja Lehmann
2021/180 ( PDF )
Apollo -- Optimistically Linear and Responsive SMR
Adithya Bhat and Akhil Bandarupalli and Saurabh Bagchi and Aniket Kate and Michael Reiter
2021/179 ( PDF )
Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis
An Wang and Yuan Li and Yaoling Ding and Liehuang Zhu and Yongjuan Wang
2021/178 ( PDF )
Attribute-Based Access Control for Inner Product Functional Encryption from LWE
Tapas Pal and Ratna Dutta
2021/177 ( PDF )
Generic Negation of Pair Encodings
Miguel Ambrona
2021/176 ( PDF )
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits
Lukas Aumayr and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei
2021/175 ( PDF )
On the Relationships between Different Methods for Degree Evaluation (Full Version)
Siwei Chen and Zejun Xiang and Xiangyong Zeng and Shasha Zhang
2021/174 ( PDF )
Smart Contracts for Incentivized Outsourcing of Computation
Alptekin Küpçü and Reihaneh Safavi-Naini
2021/173 ( PDF )
Wai-Kong Lee and Hwajeong Seo and Zhenfei Zhang and Seongoun Hwang
2021/172 ( PDF )
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI
Nishanth Chandran and Nishka Dasgupta and Divya Gupta and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Akash Shah
2021/171 ( PDF )
Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Revisited
Wei Yu and Guangwu Xu
2021/170 ( PDF )
Fully Anonymous Group Signature with Verifier-Local Revocation
Ai Kitagawa and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka
2021/169 ( PDF )
Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials
Yasuhiko Ikematsu and Shuhei Nakamura and Bagus Santoso and Takanori Yasuda
2021/168 ( PDF )
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS
Xiaohan Zhang and Chi Cheng and Yue Qin and Ruoyu Ding
2021/167 ( PDF )
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware
Seetal Potluri and Aydin Aysu
2021/166 ( PDF )
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols
Matthias Lohr and Benjamin Schlosser and Jan Jürjens and Steffen Staab
2021/165 ( PDF )
Composition with Knowledge Assumptions
Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
2021/164 ( PDF )
Graph-Based Construction for Non-Malleable Codes
Shohei Satake and Yujie Gu and Kouichi Sakurai
2021/163 ( PDF )
CNF-FSS and its Applications
Paul Bunn and Eyal Kushilevitz and Rafail Ostrovsky
2021/162 ( PDF )
Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity
Giuseppe Ateniese and Long Chen and Danilo Francati and Dimitrios Papadopoulos and Qiang Tang
2021/161 ( PDF )
Generic Adaptor Signature
Xianrui Qin and Handong Cui and Tsz Hon Yuen
2021/160 ( PDF )
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance
Tibor Jager and Rafael Kurek and David Niehues
2021/159 ( PDF )
hbACSS: How to Robustly Share Many Secrets
Thomas Yurek and Licheng Luo and Jaiden Fairoze and Aniket Kate and Andrew Miller
2021/158 ( PDF )
Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate
Nicolas Resch and Chen Yuan
2021/157 ( PDF )
Sycon: A New Milestone in Designing ASCON-like Permutations
Kalikinkar Mandal and Dhiman Saha and Sumanta Sarkar and Yosuke Todo
2021/156 ( PDF )
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability
Manuel Barbosa and Gilles Barthe and Benjamin Grégoire and Adrien Koutsos and Pierre-Yves Strub
2021/155 ( PDF )
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
James Howe and Marco Martinoli and Elisabeth Oswald and Francesco Regazzoni
2021/154 ( PDF )
Generating cryptographically-strong random lattice bases and recognizing rotations of $\mathbb{Z}^n$
Tamar Lichter Blanks and Stephen D. Miller
2021/153 ( PDF )
On the Isogeny Problem with Torsion Point Information
Boris Fouotsa Tako and Péter Kutas and Simon-Philipp Merz
2021/152 ( PDF )
Hybrid Dual Attack on LWE with Arbitrary Secrets
Lei Bi and Xianhui Lu and Junjie Luo and Kunpeng Wang and Zhenfei Zhang
2021/151 ( PDF )
On Sufficient Oracles for Secure Computation with Identifiable Abort
Mark Simkin and Luisa Siniscalchi and and Sophia Yakoubov
2021/150 ( PDF )
Two-Party Adaptor Signatures From Identification Schemes
Andreas Erwig and Sebastian Faust and Kristina Hostáková and Monosij Maitra and Siavash Riahi
2021/149 ( PDF )
Quantum Security of the Legendre PRF
Paul Frixons and André Schrottenloher
2021/148 ( PDF )
On methods of shortening ElGamal-type signatures
Liliya Akhmetzyanova and Evgeny Alekseev and Alexandra Babueva and Stanislav Smyshlyaev
2021/147 ( PDF )
IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols
Greg Morrisett and Elaine Shi and Kristina Sojakova and Xiong Fan and Joshua Gancher
2021/146 ( PDF )
Boolean Functions from Hyperplane Coverings
Benjamin E. Diamond
2021/145 ( PDF )
A Security Framework for Distributed Ledgers
Christoph Egger and Mike Graf and Ralf Kuesters and Daniel Rausch and Viktoria Ronge and and Dominique Schröder
2021/144 ( PDF )
\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol
Morteza Adeli and Nasour Bagheri and Sadegh Sadeghi and Saru Kumari
2021/143 ( PDF )
The Bitcoin Cash Backbone Protocol
Juan Garay and Yu Shen
2021/142 ( PDF )
Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication
Muah Kim and Onur Gunlu and Rafael F. Schaefer
2021/141 ( PDF )
Advanced Lattice Sieving on GPUs, with Tensor Cores
Léo Ducas and Marc Stevens and Wessel van Woerden
2021/140 ( PDF )
Practical and Scalable Access Control Mechanism for the Internet of Things
Clémentine Gritti and Emanuel Regnath and Sebastian Steinhorst
2021/139 ( PDF )
Order-Fair Consensus in the Permissionless Setting
Mahimna Kelkar and Soubhik Deb and Sreeram Kannan
2021/138 ( PDF )
Classic McEliece Implementation with Low Memory Footprint
Johannes Roth and Evangelos Karatsiolis and Juliane Krämer
2021/137 ( PDF )
Cryptographic Security of the MLS RFC, Draft 11
Chris Brzuska and Eric Cornelissen and Konrad Kohbrok
2021/136 ( PDF )
An approach for designing fast public key encryption systems using white-box cryptography techniques
Dmitry Schelkunov
2021/135 ( PDF )
Acyclicity Programming for Sigma-Protocols
Masayuki Abe and Miguel Ambrona and Andrej Bogdanov and Miyako Ohkubo and Alon Rosen
2021/134 ( PDF )
Cryptanalysis of a code-based signature scheme without trapdoors
Marco Baldi and Jean-Christophe Deneuville and Edoardo Persichetti and Paolo Santini
2021/133 ( PDF )
smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
Ravital Solomon and Ghada Almashaqbeh
2021/132 ( PDF )
Privacy-Preserving Feature Selection with Secure Multiparty Computation
Xiling Li and Rafael Dowsley and Martine De Cock
2021/131 ( PDF )
Privacy-Preserving Video Classification with Convolutional Neural Networks
Sikha Pentyala and Rafael Dowsley and Martine De Cock
2021/130 ( PDF )
Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves
Bei Wang; Songsong Li; Yi Ouyang; Honggang Hu
2021/129 ( PDF )
Lattice-based weak curve fault attack on ECDSA
Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Wei
2021/128 ( PDF )
Designing Tweakable Enciphering Schemes Using Public Permutations
Debrup Chakraborty and Avijit Dutta and Samir Kundu
2021/127 ( PDF )
Cuproof: A Novel Range Proof with Constant Size
Cong Deng and Xianghong Tang and Lin You and Gengran Hu
2021/126 ( PDF )
Observability attack on stream generators
Ramachandran Anantharaman and Virendra Sule
2021/125 ( PDF )
Privacy Preserving and Resilient RPKI
Kris Shrishak and Haya Shulman
2021/124 ( PDF )
Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption
Ozgun Ozerk and Can Elgezen and Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2021/123 ( PDF )
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs
Yue Qin and Chi Cheng and Xiaohan Zhang and Yanbin Pan and Lei Hu and Jintai Ding
2021/122 ( PDF )
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
Aner Ben Efraim and Olga Nissenbaum and Eran Omri and Anat Paskin-Cherniavsky
2021/121 ( PDF )
BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits
Yaron Gvili and Sarah Scheffler and Mayank Varia
2021/120 ( PDF )
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits
Aner Ben-Efraim and Kelong Cong and Eran Omri and Emmanuela Orsini and Nigel P. Smart and Eduardo Soria-Vazquez
2021/119 ( PDF )
Rabbit: Efficient Comparison for Secure Multi-Party Computation
Eleftheria Makri and Dragos Rotaru and Frederik Vercauteren and Sameer Wagh
2021/118 ( PDF )
High-Threshold AVSS with Optimal Communication Complexity
Nicolas Alhaddad and Mayank Varia and Haibin Zhang
2021/117 ( PDF )
FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin
Arash Mirzaei and Amin Sakzad and Jiangshan Yu and Ron Steinfeld
2021/116 ( PDF )
MAKE: a Matrix Action Key Exchange
Nael Rahman and Vladimir Shpilrain
2021/115 ( PDF )
Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4
Mila Anastasova and Reza Azarderakhsh and Mehran Mozaffari Kermani
2021/114 ( PDF )
Security Analysis of CPace
Michel Abdalla and Björn Haase and Julia Hesse
2021/113 ( PDF )
Improvement of Secure Multi-Party Multiplication of (k,n) Threshold Secret Sharing Using Only N=k Servers (Revised Version)
Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura
2021/112 ( -- withdrawn -- )
Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange
Majid Salimi and Hamid Mala and Honorio Martin and Pedro Peris-Lopez
2021/111 ( PDF )
A note on Post Quantum Onion Routing
Kelesidis Evgnosia-Alexandra
2021/110 ( PDF )
Replacing Probability Distributions in Security Games via Hellinger Distance
Kenji Yasunaga
2021/109 ( PDF )
Sequential Logic Encryption Against Model Checking Attack
Amin Rezaei and Hai Zhou
2021/108 ( PDF )
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs
Sara Ricci and Lukas Malina and Petr Jedlicka and David Smekal and Jan Hajny and Petr Cibik and Patrik Dobias
2021/107 ( PDF )
A Decentralized and Encrypted National Gun Registry
Seny Kamara and Tarik Moataz and Andrew Park and Lucy Qin
2021/106 ( PDF )
MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers
Aram Jivanyan and Jesse Lancaster and Arash Afshar and Parnian Alimi
2021/105 ( PDF )
A New Efficient Identity-Based Encryption Without Pairing
Majid Salimi
2021/104 ( PDF )
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography
Shivam Bhasin and Jan-Pieter D'Anvers and Daniel Heinz and Thomas Pöppelmann and Michiel Van Beirendonck
2021/103 ( PDF )
RUP Security of the SAEF Authenticated Encryption mode
Elena Andreeva and Amit Singh Bhati and Damian Vizar
2021/102 ( PDF )
A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization
Madalina Chirita and Alexandru-Mihai Stroie and Andrei-Daniel Safta and Emil Simion
2021/101 ( PDF )
Combined Fault and DPA Protection for Lattice-Based Cryptography
Daniel Heinz and Thomas Pöppelmann
2021/100 ( PDF )
SPURT: Scalable Distributed Randomness Beacon with Transparent Setup
Sourav Das and Vinith Krishnan and Irene Miriam Isaac and Ling Ren
2021/099 ( PDF )
Property Inference from Poisoning
Melissa Chase and Esha Ghosh and Saeed Mahloujifar
2021/098 ( PDF )
Image sets of perfectly nonlinear maps
Lukas Kölsch and Björn Kriepke and Gohar Kyureghyan
2021/097 ( PDF )
A New and Improved Reduction Proof of Cascade PRF
Mridul Nandi
2021/096 ( PDF )
Gladius: LWR based efficient hybrid public key encryption with distributed decryption
Kelong Cong and Daniele Cozzo and Varun Maram and Nigel P. Smart
2021/095 ( PDF )
Collusion-Deterrent Threshold Information Escrow
Easwar Vivek Mangipudi and Donghang Lu and Aniket Kate
2021/094 ( PDF )
Reducing HSM Reliance in Payments through Proxy Re-Encryption
Sivanarayana Gaddam and Atul Luykx and Rohit Sinha and Gaven Watson
2021/093 ( PDF )
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks
Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
2021/092 ( PDF )
New Public Key Cryptosystem (First Version)
Dieaa I. Nassr and M. Anwar and Hatem M. Bahig
2021/091 ( PDF )
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks
Ilaria Chillotti and Marc Joye and Pascal Paillier
2021/090 ( PDF )
A New Twofold Cornacchia-Type Algorithm for 4-GLV Decompositions and Its Applications
Bei Wang; Yi Ouyang; Honggang Hu ; Songsong Li
2021/089 ( PDF )
Fuzzy Message Detection
Gabrielle Beck and Julia Len and Ian Miers and Matthew Green
2021/088 ( PDF )
An Overview of the Hybrid Argument
Marc Fischlin and Arno Mittelbach
2021/087 ( PDF )
ZEN: Efficient Zero-Knowledge Proofs for Neural Networks
Boyuan Feng and Lianke Qin and Zhenfei Zhang and Yufei Ding and Shumo Chu
2021/086 ( PDF )
On Elapsed Time Consensus Protocols
Mic Bowman and Debajyoti Das and Avradip Mandal and Hart Montgomery
2021/085 ( PDF )
Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves
Suhri Kim
2021/084 ( PDF )
Ariadne Thread and Salt: New Multivariate Cryptographic Schemes with Public Keys in Degree 3
Gilles Macario-Rat and Jacques Patarin
2021/083 ( PDF )
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol
Michael Troncoso and Britta Hale
2021/082 ( PDF )
Grades of Trust in Multiparty Computation
Jaskaran V. Singh and Nicholas Hopper
2021/081 ( PDF )
Private Stream Aggregation from Labeled Secret Sharing Schemes
Hendrik Waldner and Tilen Marc and Miha Stopar and Michel Abdalla
2021/080 ( PDF )
Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption
Jan-Pieter D'Anvers and Emmanuela Orsini and Frederik Vercauteren
2021/079 ( PDF )
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM
Kalle Ngo and Elena Dubrova and Qian Guo and Thomas Johansson
2021/078 ( PDF )
An Incentive-Compatible Smart Contract for Decentralized Commerce
Nikolaj I. Schwartzbach
2021/077 ( PDF )
Magnetic RSA
Rémi Géraud-Stewart and David Naccache
2021/076 ( PDF )
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field
Kang Yang and Pratik Sarkar and Chenkai Weng and Xiao Wang
2021/075 ( PDF )
A Generalization of the Subfield Construction
Kamil Otal
2021/074 ( PDF )
Cross-Domain Attribute-Based Access Control Encryption
Mahdi Sedaghat and Bart Preneel
2021/073 ( PDF )
Application of Velusqrt algorithm to Huff's and general Huff's curves
Michał Wroński
2021/072 ( PDF )
Toward Practical Autoencoder-based Side-Channel Analysis Evaluations
Servio Paguada and Lejla Batina and Igor Armendariz
2021/071 ( PDF )
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis
Jorai Rijsdijk and Lichao Wu and Guilherme Perin and Stjepan Picek
2021/070 ( PDF )
Secure, Accurate, and Practical Narrow-Band Ranging System
Aysajan Abidin and Mohieddine El Soussi and Jac Romme and Pepijn Boer and Dave Singelée and Christian Bachmann
2021/069 ( PDF )
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation
Amanda Resende and Davis Railsback and Rafael Dowsley and Anderson C. A. Nascimento and Diego F. Aranha
2021/068 ( PDF )
Banquet: Short and Fast Signatures from AES
Carsten Baum and Cyprien Delpech de Saint Guilhem and Daniel Kales and Emmanuela Orsini and Peter Scholl and Greg Zaverucha
2021/067 ( PDF )
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Michiel Van Beirendonck and Jan-Pieter D’Anvers and Ingrid Verbauwhede
2021/066 ( PDF )
A Deep Learning Approach for Active S-box Prediction of Lightweight Block Ciphers
Mohamed Fadl Idris and Je Sen Teh and Jasy Liew Suet Yan and Wei-Zhu Yeoh
2021/065 ( PDF )
FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves
Dorin-Marian Ionita and Emil Simion
2021/064 ( PDF )
Fault Attacks on CCA-secure Lattice KEMs
Peter Pessl and Lukas Prokop
2021/063 ( PDF )
CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing
Monir Azraoui and Solenn Brunet and Sébastien Canard and Aďda Diop and Lélia Eveillard and Alicia Filipiak and Adel Hamdi and Flavie Misarsky and Donald Nokam Kuate and Marie Paindavoine and Quentin Santos and Bastien Vialla
2021/062 ( PDF )
Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3)
Dominique Unruh
2021/061 ( PDF )
A Note on IBE Performance of a Practical Application
Ştefan Maftei and Marius Supuran and Emil Simion
2021/060 ( PDF )
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts
Ran Canetti and Rosario Gennaro and Steven Goldfeder and Nikolaos Makriyannis and Udi Peled
2021/059 ( PDF )
On the Cost of Adaptivity in Graph-Based Games
Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter
2021/058 ( PDF )
A Performance Study of Crypto-Hardware in the Low-end IoT
Peter Kietzmann and Lena Boeckmann and Leandro Lanzieri and Thomas C. Schmidt and Matthias Wählisch
2021/057 ( PDF )
Correlation Intractability vs. One-wayness
Tamer Mour
2021/056 ( PDF )
The Study of Modulo $2^n$
Zhongfeng Niu
2021/055 ( PDF )
Tech Report: Inerial HSMs Thwart Advanced Physical Attacks
Jan Sebastian Götte and Björn Scheuermann
2021/054 ( PDF )
The Cost of IEEE Arithmetic in Secure Computation
David W. Archer and Shahla Atapoor and Nigel P. Smart
2021/053 ( PDF )
On Algebraic Embedding for Unstructured Lattices
Madalina Bolboceanu and Zvika Brakerski and Devika Sharma
2021/052 ( PDF )
Elementary Attestation of Cryptographically Useful Composite Moduli
Rémi Géraud-Stewart and David Naccache
2021/051 ( PDF )
How Much can F5 Really Do
Jintai Ding and Zheng Zhang and Joshua Deaton
2021/050 ( PDF )
The Distinguishing Attack on HFE
Joshua Deaton and Jintai Ding
2021/049 ( PDF )
ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process
Mark D. Aagaard and Nusa Zidaric
2021/048 ( PDF )
Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution
Sohyun Jeon and Hyang-Sook Lee and Jeongeun Park
2021/047 ( PDF )
Evolution of Bulletin Board & its application to E-Voting – A Survey
Misni Harjo Suwito and Yoshifumi Ueshige and Kouichi Sakurai
2021/046 ( PDF )
Efficient Lattice-Based Inner-Product Functional Encryption
Jose Maria Bermudo Mera and Angshuman Karmakar and Tilen Marc and Azam Soleimanian
2021/045 ( PDF )
Banners: Binarized Neural Networks with Replicated Secret Sharing
Alberto Ibarrondo and Hervé Chabanne and Melek Önen
2021/044 ( PDF )
Aloha: Metadata-private voice communication over fully untrusted infrastructure
Ishtiyaque Ahmad and Yuntian Yang and Divyakant Agrawal and Amr El Abbadi and Trinabh Gupta
2021/043 ( PDF )
Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields
Madhurima Mukhopadhyay and Palash Sarkar
2021/042 ( PDF )
Correcting Subverted Random Oracles
Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou and Jiadong Zhu
2021/041 ( PDF )
Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot
Panos Kampanakis and Peter Panburana and Michael Curcio and Chirag Shroff and Md Mahbub Alam
2021/040 ( PDF )
On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product
Any Muanalifah and Serge˘ı Sergeev
2021/039 ( PDF )
Practical FHE parameters against lattice attacks
Jung Hee Cheon and Yongha Son and Donggeon Yhee
2021/038 ( PDF )
Streaming Merkle Proofs within Binary Numeral Trees
Luke Champine
2021/037 ( PDF )
New First-Order Secure AES Performance Records
Aein Rezaei Shahmirzadi and Dušan Božilov and Amir Moradi
2021/036 ( PDF )
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
Niluka Amarasinghe and Xavier Boyen and Matthew McKague
2021/035 ( PDF )
Sketches for Blockchains
Ori Rottenstreich
2021/034 ( PDF )
Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF
Nishanth Chandran and Divya Gupta and Akash Shah
2021/033 ( PDF )
Quantum-resistant Anonymous IBE with Traceable Identities
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo and Yu-Chi Chen
2021/032 ( PDF )
Experimental relativistic zero-knowledge proofs
Pouriya Alikhani and Nicolas Brunner and Claude Crépeau and Sébastien Designolle and Raphaël Houlmann and Weixu Shi and Hugo Zbinden
2021/031 ( PDF )
A Comparative Study of Cryptographic Key Distribution Protocols
Alexandru-Ștefan Gheorghieș and Darius-Marian Lăzăroi and Emil Simion
2021/030 ( PDF )
Linear-time zero-knowledge SNARKs for R1CS
Jonathan Lee and Srinath Setty and Justin Thaler and Riad Wahby
2021/029 ( PDF )
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs
Thomas Schneider and Oleksandr Tkachenko
2021/028 ( PDF )
A Side Journey to Titan
Victor LOMNE and Thomas ROCHE
2021/027 ( PDF )
E-voting protocols in context of COVID19
Sfirnaciuc Emilia and Vasilescu Miruna-Elena and Simion Emil
2021/026 ( PDF )
A Gapless Code-Based Hash Proof System based on RQC and its Applications
Slim Bettaieb and Loďc Bidoux and Olivier Blazy and Yann Connan and Philippe Gaborit
2021/025 ( PDF )
FLGUARD: Secure and Private Federated Learning
Thien Duc Nguyen and Phillip Rieger and Hossein Yalame and Helen Möllering and Hossein Fereidooni and Samuel Marchal and Markus Miettinen and Azalia Mirhoseini and Ahmad-Reza Sadeghi and Thomas Schneider and Shaza Zeitouni
2021/024 ( PDF )
PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System
Pedro Hecht
2021/023 ( PDF )
What is Meant by Permissionless Blockchains?
Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Andreas Kern and Walid Fdhila
2021/022 ( PDF )
Increasing Precision of Division Property
Patrick Derbez and Pierre-Alain Fouque
2021/021 ( PDF )
Fake Near Collisions Attacks
Patrick Derbez and Pierre-Alain Fouque and Victor Mollimard
2021/020 ( PDF )
Catching the Fastest Boomerangs - Application to SKINNY
Stéphanie Delaune and Patrick Derbez and Mathieu Vavrille
2021/019 ( PDF )
Kummer versus Montgomery Face-off over Prime Order Fields
Kaushik Nath and Palash Sarkar
2021/018 ( PDF )
Comments on ``On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment''
Yuhao Yang and Xiujie Huang
2021/017 ( PDF )
Lightweight Techniques for Private Heavy Hitters
Dan Boneh and Elette Boyle and Henry Corrigan-Gibbs and Niv Gilboa and Yuval Ishai
2021/016 ( PDF )
Black-Box Uselessness: Composing Separations in Cryptography
Geoffroy Couteau and Pooya Farshim and Mohammad Mahmoody
2021/015 ( PDF )
SoK: Remote Power Analysis
Macarena Martínez-Rodríguez and Ignacio M. Delgado-Lozano and Billy Bob Brumley
2021/014 ( -- withdrawn -- )
Efficient Multilinear Map from Graded Encoding Scheme
Majid Salimi
2021/013 ( PDF )
An atlas of the Richelot isogeny graph
Enric Florit and Benjamin Smith
2021/012 ( PDF )
Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph
Enric Florit and Benjamin Smith
2021/011 ( PDF )
Complete solution over $\GF{p^n}$ of the equation $X^{p^k+1}+X+a=0$
Kwang Ho Kim and Jong Hyok Choe and Sihem Mesnager
2021/010 ( PDF )
Compcrypt -- Lightweight ANS-based Compression and Encryption
Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk
2021/009 ( PDF )
Demand-aware Channel Topologies for Off-chain Blockchain Payments
Julia Khamis and Ori Rottenstreich
2021/008 ( PDF )
A Family of Nonlinear MDS Diffusion Layers over $\mathbb{F}_{2^{4n}}$
M. R. Mirzaee Shamsabad and S. M. Dehnavi
2021/007 ( PDF )
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Cheng-Yi Lee
2021/006 ( PDF )
Privacy-Preserving Privacy Profile Proposal Protocol
Wyatt Howe and Andrei Lapets
2021/005 ( PDF )
Aggregatable Distributed Key Generation
Kobi Gurkan and Philipp Jovanovic and Mary Maller and Sarah Meiklejohn and Gilad Stern and Alin Tomescu
2021/004 ( PDF )
LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions
Ismail San
2021/003 ( PDF )
Ciphertext Policy Attribute Based Encryption for Arithmetic circuits
Mahdi Mahdavi Oliaee and Zahra Ahmadian
2021/002 ( PDF )
Can Lattice Signature be as Efficient as Lattice Encryption?
Dingfeng Ye
2021/001 ( PDF )
2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product
Michel Abdalla and David Pointcheval and Azam Soleimanian

[ Cryptology ePrint archive ]