Cryptology ePrint Archive: Listing for 2020


2020/616 ( PDF )
Master-Key KDM-Secure IBE from Pairings
Sanjam Garg and Romain Gay and Mohammad Hajiabadi
2020/615 ( PDF )
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
Diego F. Aranha and Felipe Rodrigues Novaes and Akira Takahashi and Mehdi Tibouchi and Yuval Yarom
2020/614 ( PDF )
Lattice-Based E-Cash, Revisited
Amit Deo and Benoit Libert and Khoa Nguyen and Olivier Sanders
2020/613 ( PDF )
SiGamal: A supersingular isogeny-based PKE and its application to a PRF
Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi
2020/612 ( PDF )
Key Assignment Schemes with Authenticated Encryption, revisited
Jeroen Pijnenburg and Bertram Poettering
2020/611 ( PDF )
Efficient and Fast Hardware Architectures for SIKE Round 2 on FPGA
Rami Elkhatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2020/610 ( PDF )
Stronger Multilinear Maps from Indistinguishability Obfuscation
Navid Alamati and Hart Montgomery and Sikhar Patranabis
2020/609 ( PDF )
Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers
Behnaz Rezvani and Thomas Conroy and Luke Beckwith and Matthew Bozzay and Trevor Laffoon and David McFeeters and Yijia Shi and Minh Vu and William Diehl
2020/608 ( PDF )
Low-latency Meets Low-area: An Improved Bit-Sliding Technique for AES, SKINNY and GIFT
Fatih Balli and Andrea Caforio and Subhadeep Banik
2020/607 ( PDF )
Energy Analysis of Lightweight AEAD Circuits
Andrea Caforio and Fatih Balli and Subhadeep Banik
2020/606 ( PDF )
Ring Key-Homomorphic Weak PRFs and Applications
Navid Alamati and Hart Montgomery and Sikhar Patranabis
2020/605 ( PDF )
LUSA: the HPC library for lattice-based cryptanalysis
Artur Mariano
2020/604 ( PDF )
Perfectly Secure Oblivious Parallel RAM with $O(\log^3 N/ \log \log N)$ Overhead
T-H. Hubert Chan and Wei-Kai Lin and Kartik Nayak and Elaine Shi
2020/603 ( PDF )
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification
Gilles Barthe and Marc Gourjon and Benjamin Gregoire and Maximilian Orlt and Clara Paglialonga and Lars Porth
2020/602 ( PDF )
CENCPP - Beyond-birthday-secure Encryption from Public Permutations
Arghya Bhattarcharjee and Avijit Dutta and Eik List and Mridul Nandi
2020/601 ( PDF )
Everything is a Race and Nakamoto Always Wins
Amir Dembo and Sreeram Kannan and Ertem Nusret Tas and David Tse and Pramod Viswanath and Xuechao Wang and Ofer Zeitouni
2020/600 ( PDF )
Multi-Party Threshold Private Set Intersection with Sublinear Communication
Saikrishna Badrinarayanan and Peihan Miao and Peter Rindal
2020/599 ( PDF )
Private Matching for Compute
Prasad Buddhavarapu and Andrew Knox and Payman Mohassel and Shubho Sengupta and Erik Taubeneck and Vlad Vlaskin
2020/598 ( PDF )
Cryptanalysis of Au et al. Dynamic Universal Accumulator
Alex Biryukov and Aleksei Udovenko and Giuseppe Vitto
2020/597 ( PDF )
Bitstream Modification of Trivium
Kalle Ngo and Elena Dubrova and Michail Moraitis
2020/596 ( PDF )
On quantum indistinguishability under chosen plaintext attack
Tore Vincent Carstens and Ehsan Ebrahimi and Gelo Tabia and and Dominique Unruh
2020/595 ( PDF )
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption
Masahito Ishizaka and Shinsaku Kiyomoto
2020/594 ( PDF )
LESS is More: Code-Based Signatures without Syndromes
Jean-Francois Biasse and Giacomo Micheli and Edoardo Persichetti and Paolo Santini
2020/593 ( PDF )
Alt-Coin Traceability
Claire Ye and Chinedu Ojukwu and Anthony Hsu and Ruiqi Hu
2020/592 ( PDF )
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning
Nishat Koti and Mahak Pancholi and Arpita Patra and Ajith Suresh
2020/591 ( PDF )
Automatic Verification of Differential Characteristics: Application to Reduced Gimli
Fukang Liu and Takanori Isobe and Willi Meier
2020/590 ( PDF )
Expected Constant Round Byzantine Broadcast under Dishonest Majority
Jun Wan and Hanshen Xiao and Elaine Shi and Srinivas Devadas
2020/589 ( PDF )
Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity
Mykhailo Kasianchuk and Mikolaj Karpinski and Roman Kochan and Volodymyr Karpinskyi and Grzegorz Litawa and Inna Shylinska and Igor Yakymenko
2020/588 ( PDF )
Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS
ZaHyun Koo and Jong-Seon No and Young-Sik Kim
2020/587 ( PDF )
MoniPoly---An Expressive $q$-SDH-Based Anonymous Attribute-Based Credential System
Syh-Yuan Tan and Thomas Gross
2020/586 ( PDF )
Component-Based Comparison of Privacy-First Exposure Notification Protocols
Ellie Daw
2020/585 ( PDF )
Improving Key Mismatch Attack on NewHope with Fewer Queries
Satoshi Okada and Yuntao Wang and Tsuyoshi Takagi
2020/584 ( PDF )
vCNN: Verifiable Convolutional Neural Network
Seunghwa Lee and Hankyung Ko and Jihye Kim and Hyunok Oh
2020/583 ( PDF )
A New Targeted Password Guessing Model
Xie Zhijie and Zhang Min and Yin Anqi and Li Zhenhan
2020/582 ( PDF )
Risk and Architecture factors in Digital Exposure Notification
Archanaa S. Krishnan and Yaling Yang and Patrick Schaumont
2020/581 ( PDF )
The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency
Benny Applebaum and Eliran Kachlon and Arpita Patra
2020/580 ( PDF )
TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation
Alexei Zamyatin and Zeta Avarikioti and Daniel Perez and William J. Knottenbelt
2020/579 ( PDF )
BitFund: A Benevolent Blockchain Funding Network
Darrow R Hartman
2020/578 ( PDF )
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
Zhuotao Liu and Yangxi Xiang and Jian Shi and Peng Gao and Haoyu Wang and Xusheng Xiao and Bihan Wen and Yih-Chun Hu
2020/577 ( PDF )
Inner-Product Functional Encryption with Fine-Grained Access Control
Michel Abdalla and Dario Catalano and Romain Gay and Bogdan Ursu
2020/576 ( PDF )
How Low Can We Go?
Yuval Ishai
2020/575 ( PDF )
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption
Sanjit Chatterjee and R. Kabaleeshwaran
2020/574 ( PDF )
Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization
Ming Li, Anjia Yang, Xinkai Chen
2020/573 ( PDF )
Quantifying the Security Cost of Migrating Protocols to Practice
Christopher Patton and Thomas Shrimpton
2020/572 ( PDF )
HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms)
Marina Polubelova and Karthikeyan Bhargavan and Jonathan Protzenko and Benjamin Beurdouche and Aymeric Fromherz and Natalia Kulatova and Santiago Zanella-Béguelin
2020/571 ( PDF )
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers
Anubhab Baksi and Jakub Breier and Xiaoyang Dong and Chen Yi
2020/570 ( PDF )
On Optimality of d + 1 TI Shared Functions of 8 Bits or Less
Dušan Božilov
2020/569 ( PDF )
QA-NIZK Arguments of Same Opening for Bilateral Commitments
Carla Rŕfols and Javier Silva
2020/568 ( PDF )
Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy)
Tomer Ashur and Siemen Dhooghe
2020/567 ( PDF )
An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster
Yi Liu and Qi Wang and Siu-Ming Yiu
2020/566 ( PDF )
Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain
Auqib Hamid Lone and Roohie Naaz
2020/565 ( PDF )
Homomorphic Computation in Reed-Muller Codes
Jinkyu Cho and Young-Sik Kim and Jong-Seon No
2020/564 ( PDF )
Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
Mahmoud Yehia and Riham AlTawy and T. Aaron Gulliver
2020/563 ( PDF )
Secure large-scale genome-wide association studies using homomorphic encryption
Marcelo Blatt and Alexander Gusev and Yuriy Polyakov and Shafi Goldwasser
2020/562 ( PDF )
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
Hocheol Shin and Juhwan Noh and Dohyun Kim and Yongdae Kim
2020/561 ( PDF )
Exploiting Weak Diffusion of Gimli: A Full-Round Distinguisher and Reduced-Round Preimage Attacks
Fukang Liu and Takanori Isobe and Willi Meier
2020/560 ( PDF )
ZeroJoin: Combining ZeroCoin and CoinJoin
Alexander Chepurnoy and Amitabh Saxena
2020/559 ( PDF )
Striking the Balance: Effective yet Privacy Friendly Contact Tracing
Giuseppe Garofalo and Tim Van hamme and Davy Preuveneers and Wouter Joosen and Aysajan Abidin and Mustafa A. Mustafa
2020/558 ( PDF )
BSPL: Balanced Static Power Logic
Bijan Fadaeinia and Thorben Moos and Amir Moradi
2020/557 ( PDF )
On the sensitivity of some APN permutations to swapping points
Lilya Budaghyan and Nikolay Kaleyski and Constanza Riera and Pantelimon Stanica
2020/556 ( PDF )
Kerckhoffs' Legacy
Jean-Claude Caraco and Rémi Géraud-Stewart and David Naccache
2020/555 ( PDF )
Splitting Payments Locally While Routing Interdimensionally
Lisa Eckey and Sebastian Faust and Kristina Hostáková and Stefanie Roos
2020/554 ( PDF )
Bitcoin-Compatible Virtual Channels
Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostáková and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi
2020/553 ( PDF )
Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT
Hu Xiong and Jinhao Chen and Minghao Yang and Xin Huang
2020/552 ( PDF )
Optimal Minimax Polynomial Approximation of Modular Reduction for Bootstrapping of Approximate Homomorphic Encryption
Joon-Woo Lee and Eunsang Lee and Yongwoo Lee and Young-Sik Kim and Jong-Seon No
2020/551 ( PDF )
Higher Order Differential Attack against Full-Round BIG
Naoki Shibayama and Yasutaka Igarashi and Toshinobu Kaneko
2020/550 ( PDF )
Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation
Ruiyu Zhu and Changchang Ding and Yan Huang
2020/549 ( PDF )
Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks
Prasanna Ravi and Shivam Bhasin and Sujoy Sinha Roy and Anupam Chattopadhyay
2020/548 ( PDF )
Blockchain Stealth Address Schemes
Gary Yu
2020/547 ( PDF )
Finding Bit-Based Division Property for Ciphers with Complex Linear Layer
Kai Hu and Qingju Wang and Meiqin Wang
2020/546 ( PDF )
MixColumns Coefficient Property and Security of the AES with A Secret S-Box
Xin An and Kai Hu and Meiqin Wang
2020/545 ( PDF )
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security
Ran Canetti and Pratik Sarkar and Xiao Wang
2020/544 ( PDF )
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis
Okan Seker and Sebastian Berndt and Thomas Eisenbarth
2020/543 ( PDF )
Kachina - Foundations of Private Smart Contracts
Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
2020/542 ( PDF )
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation
Yusuke Naito and Yu Sasaki and Takeshi Sugawara
2020/541 ( PDF )
There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging
Benjamin Dowling and Britta Hale
2020/540 ( PDF )
One Round Threshold ECDSA with Identifiable Abort
Rosario Gennaro and Steven Goldfeder
2020/539 ( PDF )
On the Concrete Security of LWE with Small Secret
Hao Chen and Lynn Chua and Kristin Lauter and Yongsoo Song
2020/538 ( PDF )
Rotational Cryptanalysis on MAC Algorithm Chaskey
Liliya Kraleva and Tomer Ashur and Vincent Rijmen
2020/537 ( PDF )
TARDIS: Time And Relative Delays In Simulation
Carsten Baum and Bernardo David and Rafael Dowsley and Jesper Buus Nielsen and Sabine Oechsner
2020/536 ( PDF )
Higher-Order Differentials of Ciphers with Low-Degree S-Boxes
Carlos Cid and Lorenzo Grassi and Reinhard Lüftenegger and Christian Rechberger and Markus Schofnegger
2020/535 ( PDF )
Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions
Geoffroy Couteau and Shuichi Katsumata and Bogdan Ursu
2020/534 ( PDF )
Post-quantum TLS without handshake signatures
Peter Schwabe and Douglas Stebila and Thom Wiggers
2020/533 ( PDF )
Anonymous Lottery in the Proof-of-Stake Setting
Foteini Baldimtsi and Varun Madathil and Alessandra Scafuro and Linfeng Zhou
2020/532 ( PDF )
Promise: Leveraging Future Gains for Collateral Reduction
Dominik Harz and Lewis Gudgeon and Rami Khalil and Alexei Zamyatin
2020/531 ( PDF )
Centralized or Decentralized? The Contact Tracing Dilemma
Serge Vaudenay
2020/530 ( PDF )
Determining the Multiplicative Complexity of Boolean Functions using SAT
Mathias Soeken
2020/529 ( PDF )
CRISP: Compromise Resilient Identity-based Symmetric PAKE
Moni Naor and Shahar Paz and Eyal Ronen
2020/528 ( PDF )
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach
Joseph K. Liu and Man Ho Au and Tsz Hon Yuen and Cong Zuo and Jiawei Wang and Amin Sakzad and Xiapu Luo and Li Li
2020/527 ( PDF )
Aggregatable Subvector Commitments for Stateless Cryptocurrencies
Alin Tomescu and Ittai Abraham and Vitalik Buterin and Justin Drake and Dankrad Feist and Dmitry Khovratovich
2020/526 ( PDF )
Efficient Montgomery-like formulas for general Huff's and Huff's elliptic curves and their applications to the isogeny-based cryptography
Robert Dryło and Tomasz Kijko and Michał Wroński
2020/525 ( PDF )
Account Management in Proof of Stake Ledgers
Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira
2020/524 ( PDF )
Efficient Signatures on Randomizable Ciphertexts
Balthazar Bauer and Georg Fuchsbauer
2020/523 ( PDF )
The Strictly Zero-Correlation Attack with Application to the Full DES
Tomer Ashur and Raluca Posteuca and Danilo Šijačić and Stef D’haeseleer
2020/522 ( PDF )
Aggregated Private Information Retrieval: A First Practical Implementation to Support Large-Scale Disease Analytics
Lukas Helminger and Daniel Kales and Christian Rechberger and Roman Walch
2020/521 ( PDF )
MP-SPDZ: A Versatile Framework for Multi-Party Computation
Marcel Keller
2020/520 ( PDF )
MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation
Yarkın Doröz and Jeffrey Hoffstein and Joseph H. Silverman and Berk Sunar
2020/519 ( PDF )
Design & Analysis of Optimal Coin-tossing: New Techniques
Hamidreza Amini Khorasgani and Hemanta K. Maji and Mingyuan Wang
2020/518 ( PDF )
Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings
Muhammed F. Esgin and Ngoc Khanh Nguyen and Gregor Seiler
2020/517 ( PDF )
Practical Product Proofs for Lattice Commitments
Thomas Attema and Vadim Lyubashevsky and Gregor Seiler
2020/516 ( PDF )
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers
Mordechai Guri
2020/515 ( PDF )
On a hybrid approach to solve binary-LWE
Thomas Espitau and Antoine Joux and Natalia Kharchenko
2020/514 ( PDF )
On the Deployment of curve based cryptography for the Internet of Things
Michael Scott
2020/513 ( PDF )
E-cclesia: Universally Composable Self-Tallying Elections
Myrto Arapinis and Nikolaos Lamprou and Lenka Marekova and Thomas Zacharias
2020/512 ( PDF )
Glimpses are Forever in RC4 amidst the Spectre of Biases
Chandratop Chakraborty and Pranab Chakraborty and Subhamoy Maitra
2020/511 ( PDF )
JaxNet: Scalable Blockchain Network
Iurii Shyshatsky and Vinod Manoharan and Taras Emelyanenko and Lucas Leger
2020/510 ( PDF )
On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM
Nir Drucker and Shay Gueron and Dusan Kostic and Edoardo Persichetti
2020/509 ( PDF )
BBB Secure Nonce Based MAC Using Public Permutations
Avijit Dutta and Mridul Nandi
2020/508 ( PDF )
Augmenting Leakage Detection using Bootstrapping
Yuan Yao and Michael Tunstall and Elke De Mulder and Anton Kochepasov and Patrick Schaumont
2020/507 ( PDF )
Characteristics of Hadamard square of Reed--Muller subcodes of special type (Extended abstract)
Victoria Vysotskaya
2020/506 ( PDF )
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations
Sonia Belaďd and Pierre-Evariste Dagand and Darius Mercadier and Matthieu Rivain and Raphaël Wintersdorff
2020/505 ( PDF )
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
Wasilij Beskorovajnov and Felix Dörre and Gunnar Hartung and Alexander Koch and Jörn Müller-Quade and Thorsten Strufe
2020/504 ( PDF )
Storing and Retrieving Secrets on a Blockchain
Vipul Goyal and Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno and Yifan Song
2020/503 ( PDF )
A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder
Aaron Hutchinson and Koray Karabina
2020/502 ( PDF )
Applying Blockchain Layer2 Technology to Mass E-Commerce
Sijia Zhao and Donal O’Mahony
2020/501 ( PDF )
Fast Threshold ECDSA with Honest Majority
Ivan Damgĺrd and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael Bćksvang Řstergĺrd
2020/500 ( PDF )
Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Ciphers
Lorenzo Grassi and Christian Rechberger and Markus Schofnegger
2020/499 ( PDF )
Proof-Carrying Data from Accumulation Schemes
Benedikt Bünz and Alessandro Chiesa and Pratyush Mishra and Nicholas Spooner
2020/498 ( PDF )
Threshold ECDSA for Decentralized Asset Custody
Adam Gągol and Jędrzej Kula and Damian Straszak and Michał Świętek
2020/497 ( PDF )
Collusion-Preserving Computation without a Mediator
Michele Ciampi and Yun Lu and Vassilis Zikas
2020/496 ( PDF )
Linear Generalized ElGamal Encryption Scheme
Demba Sow and Léo Robert and Pascal Lafourcade
2020/495 ( PDF )
Disperse rotation operator DRT and use in some stream ciphers
Kim Yong-Jin and Yon Yong-Ho and Jong Yu-Jin and Li Ok-Chol
2020/494 ( PDF )
Improved Black-Box Constructions of Composable Secure Computation
Rohit Chatterjee and Xiao Liang and Omkant Pandey
2020/493 ( PDF )
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System
Gennaro Avitabile and Vincenzo Botta and Vincenzo Iovino and Ivan Visconti
2020/492 ( PDF )
UC Non-Interactive, Proactive, Threshold ECDSA
Ran Canetti and Nikolaos Makriyannis and Udi Peled
2020/491 ( PDF )
Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic
Hilder Vitor Lima Pereira
2020/490 ( PDF )
SoK: Techniques for Verifiable Mix Nets
Thomas Haines and Johannes Mueller
2020/489 ( PDF )
Pandemic Contact Tracing Apps: DP-3T, PEPP-PT NTK, and ROBERT from a Privacy Perspective
Fraunhofer AISEC
2020/488 ( PDF )
Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption
Yongwoo Lee and Joonwoo Lee and Young-Sik Kim and Jong-Seon No
2020/487 ( PDF )
Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP
Emmanouil Doulgerakis and Thijs Laarhoven and Benne de Weger
2020/486 ( PDF )
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
Jinyu Lu and Yunwen Liu and Tomer Ashur and Bing Sun and Chao Li
2020/485 ( PDF )
Edwards curve points counting method and supersingular Edwards and Montgomery curves
Ruslan V. Skuratovskii
2020/484 ( PDF )
Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions
Aaqib Bashir Dar and Auqib Hamid Lone and Saniya Zahoor and Afshan Amin Khan and Roohie Naaz
2020/483 ( PDF )
On Ideal and Weakly-Ideal Access Structures
Reza Kaboli and Shahram Khazaei and Maghsoud Parviz
2020/482 ( PDF )
A Trace Based $GF(2^n)$ Inversion Algorithm
Haining Fan
2020/481 ( PDF )
Using z14 Fused-Multiply-Add Instructions to Accelerate Elliptic Curve Cryptography
James You and Qi Zhang and Curtis D'Alves and Bill O'Farrell and Christopher K. Anand
2020/480 ( PDF )
Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Applications
Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2020/479 ( PDF )
Puncturable Witness Pseudorandom Functions and its Applications on Witness Encryption
Tapas Pal and Ratna Dutta
2020/478 ( PDF )
Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols
Eshan Chattopadhyay and Jesse Goodman and Vipul Goyal and Xin Li
2020/477 ( PDF )
Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More
Essam Ghadafi
2020/476 ( PDF )
Generalized Bitcoin-Compatible Channels
Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostakova and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi
2020/475 ( PDF )
Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews
Zachary Zaccagni and Ram Dantu
2020/474 ( PDF )
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model
Karim Baghery and Mahdi Sedaghat
2020/473 ( PDF )
Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing
Ashutosh Kumar and Raghu Meka and David Zuckerman
2020/472 ( PDF )
Bracing A Transaction DAG with A Backbone Chain
Shuyang Tang and Qingzhao Zhang and Zhengfeng Gao and Jilai Zheng and Dawu Gu
2020/471 ( PDF )
Interpose PUF can be PAC Learned
Durba Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
2020/470 ( PDF )
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
Fabio Campos and Tim Kohlstadt and Steffen Reith and Marc Stoettinger
2020/469 ( PDF )
Dedicated Security Chips in the Age of Secure Enclaves
Kari Kostiainen and Aritra Dhar and Srdjan Capkun
2020/468 ( PDF )
Distributed Auditing Proofs of Liabilities
Konstantinos Chalkias and Kevin Lewi and Payman Mohassel and Valeria Nikolaenko
2020/467 ( PDF )
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
Zhenzhen Bao and Xiaoyang Dong and Jian Guo and Zheng Li and Danping Shi and Siwei Sun and Xiaoyun Wang
2020/466 ( PDF )
Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks
Pantea Kiaei and Darius Mercadier and Pierre-Evariste Dagand and Karine Heydemann and Patrick Schaumont
2020/465 ( PDF )
Domain-Oriented Masked Instruction Set Architecture for RISC-V
Pantea Kiaei and Patrick Schaumont
2020/464 ( PDF )
Can a Blockchain Keep a Secret?
Fabrice Benhamouda and Craig Gentry and Sergey Gorbunov and Shai Halevi and Hugo Krawczyk and Chengyu Lin and Tal Rabin and Leonid Reyzin
2020/463 ( PDF )
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge
Xiaoning Liu and Bang Wu and Xingliang Yuan and Xun Yi
2020/462 ( PDF )
An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption
Ido Shahaf and Or Ordentlich and Gil Segev
2020/461 ( PDF )
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem
Jean-Sébastien Coron and Agnese Gini
2020/460 ( PDF )
A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption
Marloes Venema and Greg Alpár
2020/459 ( PDF )
Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations
Debdeep Mukhopadhyay
2020/458 ( PDF )
On the Optimality of Optimistic Responsiveness
Ittai Abraham and Kartik Nayak and Ling Ren and Nibesh Shrestha
2020/457 ( PDF )
Cryptographic Scheme for analyzing protected files on Sandboxes and share them privately
Ahmad Almorabea
2020/456 ( PDF )
Bank run Payment Channel Networks
Zhichun Lu and Runchao Han and Jiangshan Yu
2020/455 ( PDF )
Cryptanalysis of LEDAcrypt
Daniel Apon and Ray Perlner and Angela Robinson and Paolo Santini
2020/454 ( PDF )
Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification
Thomas Pornin
2020/453 ( PDF )
BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein
F. Betül Durak and Loďs Huguenin-Dumittan and Serge Vaudenay
2020/452 ( PDF )
Almost Public Coins
Amit Behera and Or Sattath
2020/451 ( PDF )
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning
Hao Chen and Miran Kim and Ilya Razenshteyn and Dragos Rotaru and Yongsoo Song and Sameer Wagh
2020/450 ( PDF )
The Landscape of Pointcheval-Sanders Signatures: Mapping to Polynomial-Based Signatures and Beyond
Kristian L. McDonald
2020/449 ( PDF )
Switched Threshold Signatures from K-Private PolyShamir Secret Sharing
Kristian L. McDonald
2020/448 ( PDF )
Partial Secret Sharing Schemes
Amir Jafari and Shahram Khazaei
2020/447 ( -- withdrawn -- )
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey
Asma Aloufi and Peizhao Hu and Yongsoo Song and and Kristin Lauter
2020/446 ( PDF )
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography
Tim Fritzmann and Georg Sigl and Johanna Sepúlveda
2020/445 ( PDF )
On Pseudorandom Encodings
Thomas Agrikola and Geoffroy Couteau and Yuval Ishai and Stanislaw Jarecki and Amit Sahai
2020/444 ( PDF )
A modern signature scheme with message recovery: Abe--Okamoto signatures with EdDSA elements
Satō Shinichi
2020/443 ( PDF )
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
Okan Seker and Thomas Eisenbarth and Maciej Liskiewicz
2020/442 ( PDF )
Fine-Grained Cryptography: A New Frontier?
Alon Rosen
2020/441 ( PDF )
Modeling for Three-Subset Division Property without Unknown Subset
Yonglin Hao and Gregor Leander and Willi Meier and Yosuke Todo and Qingju Wang
2020/440 ( PDF )
Sublattice Attacks on Ring-LWE with Wide Error Distributions I
Hao Chen
2020/439 ( PDF )
The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE
Hiroshi Onuki and Yusuke Aikawa and Tsuyoshi Takagi
2020/438 ( PDF )
Fast hybrid Karatsuba multiplier for Type II pentanomials
Yin Li and Yu Zhang and Wei He
2020/437 ( PDF )
Faster Montgomery and double-add ladders for short Weierstrass curves
Mike Hamburg
2020/436 ( PDF )
Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification
Houssem Maghrebi
2020/435 ( PDF )
WAGE: An Authenticated Encryption with a Twist
Riham AlTawy and Guang Gong and Kalikinkar Mandal and Raghvendra Rohit
2020/434 ( PDF )
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware
Sujoy Sinha Roy and Andrea Basso
2020/433 ( PDF )
zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays
Martin Westerkamp and Jacob Eberhardt
2020/432 ( PDF )
From A to Z: Projective coordinates leakage in the wild
Alejandro Cabrera Aldaya and Cesar Pereida García and Billy Bob Brumley
2020/431 ( PDF )
x-only point addition formula and faster torsion basis generation in compressed SIKE
Geovandro C. C. F. Pereira and Javad Doliskani and David Jao
2020/430 ( PDF )
Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures
Aram Jivanyan and Tigran Mamikonyan
2020/429 ( PDF )
Mathematics and Cryptography: A Marriage of Convenience?
Alice Silverberg
2020/428 ( PDF )
Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc.
Yaron Gvili
2020/427 ( PDF )
Improving the Performance of the Picnic Signature Scheme
Daniel Kales and Greg Zaverucha
2020/426 ( PDF )
Privacy-Preserving Contact Tracing: current solutions and open questions
Qiang Tang
2020/425 ( PDF )
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel
2020/424 ( PDF )
Low-gate Quantum Golden Collision Finding
Samuel Jaques and André Schrottenloher
2020/423 ( PDF )
On One-way Functions and Kolmogorov Complexity
Yanyi Liu and Rafael Pass
2020/422 ( PDF )
Privacy-Preserving Pattern Matching on Encrypted Data
Anis Bkakria and Nora Cuppens and Frédéric Cuppens
2020/421 ( PDF )
Multichain-MWPoW: A $p/2$ Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture
Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos
2020/420 ( PDF )
Practical Card-Based Protocol for Three-Input Majority
Kenji Yasunaga
2020/419 ( PDF )
Pointproofs: Aggregating Proofs for Multiple Vector Commitments
Sergey Gorbunov and Leonid Reyzin and Hoeteck Wee and Zhenfei Zhang
2020/418 ( PDF )
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
Krzysztof Pietrzak
2020/417 ( PDF )
Optimal strategies for CSIDH
Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez
2020/416 ( PDF )
The Multi-Base Discrete Logarithm Problem: Non-Rewinding Proofs and Improved Reduction Tightness for Identification and Signatures
Mihir Bellare and Wei Dai
2020/415 ( PDF )
Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE
Shweta Agrawal and Alice Pellet-Mary
2020/414 ( PDF )
Semi-Quantum Money
Roy Radian and Or Sattath
2020/413 ( PDF )
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
Louis Goubin and Matthieu Rivain and Junwei Wang
2020/412 ( PDF )
Fixslicing: A New GIFT Representation
Alexandre Adomnicai and Zakaria Najm and Thomas Peyrin
2020/411 ( PDF )
Secure Two-Party Computation in a Quantum World
Niklas Büscher and Daniel Demmler and Nikolaos P. Karvelas and Stefan Katzenbeisser and Juliane Krämer and Deevashwer Rathee and Thomas Schneider and Patrick Struck
2020/410 ( PDF )
Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4
Hwajeong Seo and Mila Anastasova and Amir Jalali and Reza Azarderakhsh
2020/409 ( PDF )
Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes
Loďs Huguenin-Dumittan and Serge Vaudenay
2020/408 ( PDF )
Speed up over the Rainbow
Nir Drucker and Shay Gueron
2020/407 ( PDF )
Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection
Aydin Abadi and Sotirios Terzis and Changyu Dong
2020/406 ( PDF )
Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience
Atsuki Momose and Jason Paul Cruz and Yuichi Kaji
2020/405 ( PDF )
Ordinos: A Verifiable Tally-Hiding E-Voting System
Ralf Kuesters and Julian Liedtke and Johannes Mueller and Daniel Rausch and Andreas Vogt
2020/404 ( PDF )
From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards
Tassos Dimitriou
2020/403 ( PDF )
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
David Derler and Kai Samelin and Daniel Slamanig
2020/402 ( PDF )
A Note on Low Order Assumptions in RSA groups
István András Seres and Péter Burcsi
2020/401 ( PDF )
Mining for Privacy: How to Bootstrap a Snarky Blockchain
Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
2020/400 ( PDF )
Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis
Jeroen Delvaux
2020/399 ( PDF )
Analysis of DP3T
Serge Vaudenay
2020/398 ( PDF )
Decentralized Contact Tracing Using a DHT and Blind Signatures
Samuel Brack and Leonie Reichert and Björn Scheuermann
2020/397 ( PDF )
Classification of 4-bit S-boxes for BOGI-permutation
Seonggyeom Kim and Deukjo Hong and Jaechul Sung and Seokhie Hong
2020/396 ( PDF )
Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing
Donggeun Kwon and HeeSeok Kim and Seokhie Hong
2020/395 ( PDF )
Cryptography from Information Loss
Marshall Ball and Elette Boyle and Akshay Degwekar and Apoorvaa Deshpande and Alon Rosen and Vinod Vaikuntanathan and Prashant Nalini Vasudevan
2020/394 ( PDF )
Candidate iO from Homomorphic Encryption Schemes
Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta
2020/393 ( PDF )
LevioSA: Lightweight Secure Arithmetic Computation
Carmit Hazay and Yuval Ishai and Antonio Marcedone and Muthuramakrishnan Venkitasubramaniam
2020/392 ( PDF )
An argument on the security of LRBC, a recently proposed lightweight block cipher
Sadegh Sadeghi and Nasour Bagheri
2020/391 ( PDF )
Optimized CSIDH Implementation Using a 2-torsion Point
Donghoe Heo and Suhri Kim and Kisoon Yoon and Young-Ho Park and Seokhie Hong
2020/390 ( PDF )
A French cipher from the late 19th century
Rémi Géraud-Stewart and David Naccache
2020/389 ( PDF )
A Unary Cipher with Advantages over the Vernam Cipher
Gideon Samid
2020/388 ( PDF )
Fast 4 way vectorized ladder for the complete set of Montgomery curves
Huseyin Hisil and Berkan Egrice and Mert Yassi
2020/387 ( PDF )
Low-complexity and Reliable Transforms for Physical Unclonable Functions
Onur Gunlu and Rafael F. Schaefer
2020/386 ( PDF )
Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric
Ralf Kuesters and Daniel Rausch and Mike Simon
2020/385 ( PDF )
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality
Peihan Miao and Sarvar Patel and Mariana Raykova and Karn Seth and Moti Yung
2020/384 ( PDF )
A ”Final” Security Bug
Nguyen Thoi Minh Quan
2020/383 ( PDF )
Parallel strategies for SIDH: Towards computing SIDH twice as fast
Daniel Cervantes-Vázquez and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez
2020/382 ( PDF )
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection
Jan Bobolz and Fabian Eidens and Stephan Krenn and Daniel Slamanig and Christoph Striecks
2020/381 ( PDF )
A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback
Leonard Kleinrock and Rafail Ostrovsky and Vassilis Zikas
2020/380 ( PDF )
Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory
Anirban Chakraborty and Sarani Bhattacharya and Sayandeep Saha and Debdeep Mukhopdhyay
2020/379 ( PDF )
Post-quantum WireGuard
Andreas Hülsing and Kai-Chun Ning and Peter Schwabe and Florian Weber and Philip R. Zimmermann
2020/378 ( PDF )
Efficient 4-way Vectorizations of the Montgomery Ladder
Kaushik Nath and Palash Sarkar
2020/377 ( PDF )
Oblivious tight compaction in O(n) time with smaller constant
Samuel Dittmer and Rafail Ostrovsky
2020/376 ( PDF )
On the privacy of a code-based single-server computational PIR scheme
Sarah Bordage and Julien Lavauzelle
2020/375 ( PDF )
Privacy-Preserving Contact Tracing of COVID-19 Patients
Leonie Reichert and Samuel Brack and Björn Scheuermann
2020/374 ( PDF )
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority
Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and abhi shelat and Muthu Venkitasubramaniam and Ruihan Wang
2020/373 ( PDF )
Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES
Huanyu Wang and Elena Dubrova
2020/372 ( PDF )
Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions
Claude Carlet
2020/371 ( PDF )
Single-Trace Attacks on Keccak
Matthias J. Kannwischer and Peter Pessl and Robert Primas
2020/370 ( PDF )
Multiparty Generation of an RSA Modulus
Megan Chen and Ran Cohen and Jack Doerner and Yashvanth Kondi and Eysa Lee and Schuyler Rosefield and abhi shelat
2020/369 ( PDF )
The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs
David Knichel and Thorben Moos and Amir Moradi
2020/368 ( PDF )
Defeating NewHope with a Single Trace
Dorian Amiet and Andreas Curiger and Lukas Leuenberger and Paul Zbinden
2020/367 ( PDF )
Exploiting Decryption Failures in Mersenne Number Cryptosystems
Marcel Tiepelt and Jan-Pieter D'Anvers
2020/366 ( PDF )
FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection
Hangwei Lu and Dhwani Mehta and Olivia Paradis and Navid Asadizanjani and Mark Tehranipoor and Damon L. Woodard
2020/365 ( PDF )
A New Algorithm to Find Monic Irreducible Polynomials over Extended Galois field GF prime p and extension q using Positional Arithmetic
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/364 ( PDF )
Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs
Behzad Abdolmaleki and Daniel Slamanig
2020/363 ( PDF )
On equivalence between known polynomial APN functions and power APN functions
Qianhong Wan and Longjiang Qu and Chao Li
2020/362 ( -- withdrawn -- )
Another Look at CBC Casper Consensus Protocol
Yongge Wang
2020/361 ( PDF )
How Not to Create an Isogeny-Based PAKE
Reza Azarderakhsh and David Jao and Brian Koziel and Jason T. LeGrow and Vladimir Soukharev and Oleg Taraskin
2020/360 ( PDF )
Composite Algorithm The New Algorithm to Search for Monic Irreducible Polynomials over Extended Galois Fields
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/359 ( PDF )
4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes.
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/358 ( PDF )
Division Algorithm to search for monic irreducible polynomials over extended Galois Field GF(p^q).
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/357 ( PDF )
Quasigroups and Substitution Permutation Networks: A Failed Experiment
George Teseleanu
2020/356 ( PDF )
Efficient MPC with a Mixed Adversary
Martin Hirt and Marta Mularczyk
2020/355 ( PDF )
Permissionless Consensus in the Resource Model
Benjamin Terner
2020/354 ( PDF )
A Generalization of the ElGamal public-key cryptosystem
Rajitha Ranasinghe and Pabasara Athukorala
2020/353 ( PDF )
A Probabilistic Public Key Encryption Scheme Based on Quartic Reciprocity (Draft V1.1)
Robert A. Threlfall
2020/352 ( PDF )
Coda: Decentralized Cryptocurrency at Scale
Joseph Bonneau and Izaak Meckler and Vanishree Rao and Evan Shapiro
2020/351 ( PDF )
Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition
Youssef El Housni and Aurore Guillevic
2020/350 ( PDF )
New Multi-bit Differentials to Improve Attacks Against ChaCha
Murilo Coutinho and T. C. Souza Neto
2020/349 ( PDF )
Differential Power Analysis on (Non-)Linear Feedback Shift Registers
Siang Meng Sim
2020/348 ( PDF )
Constructing hidden order groups using genus three Jacobians
Steve Thakur
2020/347 ( PDF )
Some Low Round Zero Knowledge Protocols
Hongda Li and Peifang Ni and Dongxue Pan
2020/346 ( PDF )
Algebraic Attacks on Round-Reduced Keccak/Xoodoo
Fukang Liu and Takanori Isobe and Willi Meier and Zhonghao Yang
2020/345 ( PDF )
Bent functions stemming from Maiorana-McFarland class being provably outside its completed version
Fengrong Zhangand Nastja Cepak and Enes Pasalicand Yongzhuang Wei
2020/344 ( PDF )
Anchoring the Value of Cryptocurrency
Yibin Xu and Yangyu Huang and Jianhua Shao
2020/343 ( PDF )
BSC: A Bitcoin Smart Contract Implementation
Hiro Midas
2020/342 ( PDF )
Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge
Estuardo Alpirez Bock and Alexander Treff
2020/341 ( PDF )
Faster computation of isogenies of large prime degree
Daniel J. Bernstein and Luca De Feo and Antonin Leroux and Benjamin Smith
2020/340 ( PDF )
Differential Privacy for Eye Tracking with Temporal Correlations
Efe Bozkir* and Onur Gunlu* and Wolfgang Fuhl and Rafael F. Schaefer and Enkelejda Kasneci
2020/339 ( PDF )
Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics
George Teseleanu
2020/338 ( PDF )
Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits
Daniel Escudero and Satrajit Ghosh and Marcel Keller and Rahul Rachuri and Peter Scholl
2020/337 ( PDF )
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography
Nicholas Genise and Daniele Micciancio and Chris Peikert and Michael Walter
2020/336 ( PDF )
Gimli Encryption in 715.9 psec
Santosh Ghosh and Michael Kounavis and Sergej Deutsch
2020/335 ( PDF )
An n/2 byzantine node tolerated blockchain sharding approach
Yibin Xu and Yangyu Huang
2020/334 ( PDF )
4-Uniform Permutations with Null Nonlinearity
Christof Beierle and Gregor Leander
2020/333 ( PDF )
A Simpler and Modular Construction of Linkable Ring Signature
Wulu Li and Yongcan Wang and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2020/332 ( PDF )
Implementation Study of Two Verifiable DelayFunctions
Vidal Attias and Luigi Vigneri and Vassil Dimitrov
2020/331 ( PDF )
The CTR mode with encrypted nonces and its extension to AE
Sergey Agievich
2020/330 ( PDF )
Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective
Gil Segev and Ido Shahaf
2020/329 ( PDF )
Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields
Gabrielle De Micheli and Pierrick Gaudry and Cécile Pierrot
2020/328 ( PDF )
Leveraging Weight Functions for Optimistic Responsiveness in Blockchains
Simon Holmgaard Kamp and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Sřren Eller Thomsen and Daniel Tschudi
2020/327 ( PDF )
On the design of stream ciphers with Cellular Automata having radius = 2
Anita John and Rohit Lakra and Jimmy Jose
2020/326 ( PDF )
An upper bound on the decryption failure rate of static-key NewHope
John M. Schanck
2020/325 ( PDF )
SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts
Robert Muth and Florian Tschorsch
2020/324 ( PDF )
Defeating CAS-Unlock
Bicky Shakya and Xiaolin Xu and Mark Tehranipoor and Domenic Forte
2020/323 ( PDF )
A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol
Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos
2020/322 ( PDF )
Optimal and Error-Free Multi-Valued Byzantine Consensus Through Parallel Execution
Andrew Loveless and Ronald Dreslinski and Baris Kasikci
2020/321 ( PDF )
Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism
Jose Maria Bermudo Mera and Furkan Turan and Angshuman Karmakar and Sujoy Sinha Roy and Ingrid Verbauwhede
2020/320 ( PDF )
Universally Composable Relaxed Password Authenticated Key Exchange
Michel Abdalla and Manuel Barbosa and Tatiana Bradley and Stanislaw Jarecki and Jonathan Katz and Jiayu Xu
2020/319 ( PDF )
Secure k-ish nearest neighbors classifier
Hayim Shaul and Dan Feldman and Daniela Rus
2020/318 ( PDF )
Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL
Huijia Lin and Ji Luo
2020/317 ( PDF )
Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure
Archisman Ghosh and Debayan Das and Shreyas Sen
2020/316 ( PDF )
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
Rishab Goyal and Sam Kim and Brent Waters and David J. Wu
2020/315 ( PDF )
plookup: A simplified polynomial protocol for lookup tables
Ariel Gabizon and Zachary J. Williamson
2020/314 ( PDF )
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA
Shigeo Tsujii and Ryo Fujita and Masahito Gotaishi
2020/313 ( PDF )
Security analysis of SPAKE2+
Victor Shoup
2020/312 ( PDF )
Arcturus: efficient proofs for confidential transactions
Sarang Noether
2020/311 ( PDF )
A Blockchain Traceable Scheme with Oversight Function
Tianjun Ma and Haixia Xu and Peili Li
2020/310 ( PDF )
Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis
Gabriel Destouet and Cécile Dumas and Anne Frassati and Valérie Perrier
2020/309 ( PDF )
Cryptanalysis Results on Spook
Patrick Derbez and Paul Huynh and Virginie Lallemand and María Naya-Plasencia and Léo Perrin and André Schrottenloher
2020/308 ( PDF )
Post-Quantum TLS on Embedded Systems
Kevin Bürstinghaus-Steinbach and Christoph Krauß and Ruben Niederhagen and Michael Schneider
2020/307 ( PDF )
Handling vectorial functions by means of their graph indicators
Claude Carlet
2020/306 ( PDF )
Leakage Assessment in Fault Attacks: A Deep Learning Perspective
Sayandeep Saha and Manaar Alam and Arnab Bag and Debdeep Mukhopadhyay and Pallab Dasgupta
2020/305 ( PDF )
3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA
Shigeo Tsujii and Toshiaki Saisho and Masao Yamasawa and Masahito Gotaishi and Kou Shikata and Koji Sasaki and Nobuharu Suzuki and Masaki Hashiyada
2020/304 ( PDF )
Multiparty Homomorphic Encryption: From Theory to Practice
Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Pierre Hubaux
2020/303 ( PDF )
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Sergei Tikhomirov and Pedro Moreno-Sanchez and Matteo Maffei
2020/302 ( PDF )
Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers
Thomas Kaeding
2020/301 ( PDF )
MadHatter: A toy cipher that conceals two plaintexts in the same ciphertext
Thomas Kaeding
2020/300 ( PDF )
Secure Multiparty Computation (MPC)
Yehuda Lindell
2020/299 ( PDF )
Hydra: Fast Isomorphic State Channels
Manuel M. T. Chakravarty and Sandro Coretti and Matthias Fitzi and Peter Gazi and Philipp Kant and Aggelos Kiayias and Alexander Russell
2020/298 ( PDF )
Fast polynomial inversion for post quantum QC-MDPC cryptography
Nir Drucker and Shay Gueron and Dusan Kostic
2020/297 ( PDF )
Random Self-reducibility of Ideal-SVP via Arakelov Random Walks
Koen de Boer and Léo Ducas and Alice Pellet-Mary and Benjamin Wesolowski
2020/296 ( PDF )
Multidimensional Database Reconstruction from Range Query Access Patterns
Akshima and David Cash and Francesca Falzon and Adam Rivkin and Jesse Stern
2020/295 ( PDF )
Generalized Isotopic Shift Construction for APN Functions
Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert Coulter and Irene Villa
2020/294 ( PDF )
Public-Key Generation with Verifiable Randomness
Olivier Blazy and Patrick Towa and Damien Vergnaud
2020/293 ( PDF )
"Many-out-of-Many" Proofs with Applications to Anonymous Zether
Benjamin E. Diamond
2020/292 ( PDF )
LWE with Side Information: Attacks and Concrete Security Estimation
Dana Dachman-Soled and Léo Ducas and Huijing Gong and Mélissa Rossi
2020/291 ( PDF )
Unforgeability in the quantum world
Myrto Arapinis and Mahshid Delavar and Mina Doosti and Elham Kashefi
2020/290 ( PDF )
Linear Cryptanalysis of Reduced-Round SIMON Using Super Rounds
Reham Almukhlifi and Poorvi Vora
2020/289 ( PDF )
The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves
Jonathan Lee
2020/288 ( PDF )
Secure Key-Alternating Feistel Ciphers Without Key Schedule
Yaobin Shen and Hailun Yan and Lei Wang and Xuejia Lai
2020/287 ( PDF )
Private resource allocators and their applications
Sebastian Angel and Sampath Kannan and Zachary Ratliff
2020/286 ( PDF )
Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages
Geoffroy Couteau and Dominik Hartmann
2020/285 ( PDF )
Improved Security Bounds for Generalized Feistel Networks
Yaobin Shen and Chun Guo and Lei Wang
2020/284 ( PDF )
Database Reconstruction Attacks in Two Dimensions
Evangelia Anna Markatou and Roberto Tamassia
2020/283 ( PDF )
CryptoWills: How to Bequeath Cryptoassets
István András Seres and Omer Shlomovits and Pratyush Ranjan Tiwari
2020/282 ( PDF )
The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
Jelle Don and Serge Fehr and Christian Majenz
2020/281 ( PDF )
Privacy-friendly Monero transaction signing on a hardware wallet, extended version
Dusan Klinec Vashek Matyas
2020/280 ( PDF )
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
Juliane Krämer and Patrick Struck
2020/279 ( PDF )
Impact of System-on-Chip Integration of AEAD Ciphers
Shashank Raghuraman and Leyla Nazhandali
2020/278 ( PDF )
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs
Ahmed Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Dawn Song
2020/277 ( PDF )
Full Analysis of Nakamoto Consensus in Bounded-Delay Networks
Juan Garay and Aggelos Kiayias and Nikos Leonardos
2020/276 ( PDF )
CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware
Hamid Nejatollahi and Saransh Gupta and Mohsen Imani and Tajana Simunic Rosing and Rosario Cammarota and Nikil Dutt
2020/275 ( PDF )
Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function
Jannis Bossert and Eik List and Stefan Lucks and Sebastian Schmitz
2020/274 ( PDF )
An Optimal Relational Database Encryption Scheme
Seny Kamara and Tarik Moataz and Stan Zdonik and Zheguang Zhao
2020/273 ( PDF )
On the Fast Algebraic Immunity of Threshold Functions
Pierrick Méaux
2020/272 ( PDF )
Privacy-Preserving Fast and Exact Linear Equations Solver with Fully Homomorphic Encryption
Keita Arimitsu and Kazuki Otsuka
2020/271 ( PDF )
Signatures from Sequential-OR Proofs
Marc Fischlin and Patrick Harasser and Christian Janson
2020/270 ( PDF )
Practical Predicate Encryption for Inner Product
Yi-Fan Tseng and Zi-Yuan Liu and Raylin Tso
2020/269 ( PDF )
Order-Fairness for Byzantine Consensus
Mahimna Kelkar and Fan Zhang and Steven Goldfeder and Ari Juels
2020/268 ( PDF )
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography
Jose Maria Bermudo Mera and Angshuman Karmakar and Ingrid Verbauwhede
2020/267 ( PDF )
Differential Power Analysis of the Picnic Signature Scheme
Tim Gellersen and Okan Seker and Thomas Eisenbarth
2020/266 ( PDF )
Make Quantum Indistinguishability Great Again
Tommaso Gagliardoni and Juliane Krämer and Patrick Struck
2020/265 ( PDF )
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More
Benoît Libert and Alain Passelčgue and Hoeteck Wee and David J. Wu
2020/264 ( PDF )
Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes
Nicholas Mainardi and Alessandro Barenghi and Gerardo Pelosi
2020/263 ( PDF )
FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups
Jihoon Kwon and Byeonghak Lee and Jooyoung Lee and and Dukjae Moon
2020/262 ( PDF )
A Note on the Ending Elliptic Curve in SIDH
Christopher Leonardi
2020/261 ( PDF )
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices
Matthieu Monteiro and Kumara Kahatapitiya and Hassan Jameel Asghar and Kanchana Thilakarathna and Thierry Rakotoarivelo and Dali Kaafar and Shujun Li and Ron Steinfeld and Josef Pieprzyk
2020/260 ( PDF )
Lattice-based (Partially) Blind Signature without Restart
Samuel Bouaziz-Ermann and Sébastien Canard and Gautier Eberhart and Guillaume Kaim and Adeline Roux-Langlois and Jacques Traoré
2020/259 ( PDF )
Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors
Divesh Aggarwal and Maciej Obremski and Joăo Ribeiro and Mark Simkin and Luisa Siniscalchi
2020/258 ( PDF )
NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations
Zvika Brakerski and Venkata Koppula and Tamer Mour
2020/257 ( PDF )
Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication
Onur Gunlu and Rafael F. Schaefer and H. Vincent Poor
2020/256 ( PDF )
Statistical ZAPR Arguments from Bilinear Maps
Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs
2020/255 ( PDF )
Novel Deception Techniques for Malware Detection on Industrial Control Systems
Takanori Machida and Dai Yamamoto and Yuki Unno and Hisashi Kojima
2020/254 ( PDF )
Formalizing Data Deletion in the Context of the Right to be Forgotten
Sanjam Garg and Shafi Goldwasser and Prashant Nalini Vasudevan
2020/253 ( PDF )
Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing
Hemanta K. Maji and Mingyuan Wang
2020/252 ( PDF )
Secure Non-interactive Simulation: Hardness & Feasibility
Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen
2020/251 ( PDF )
Communication Lower Bounds for Perfect Maliciously Secure MPC
Ivan Damgĺrd and Nikolaj I. Schwartzbach
2020/250 ( PDF )
On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations
Ehsan Aerabi and Athanasios Papadimitriou and David Hely
2020/249 ( PDF )
CONFISCA : an SIMD-based CONcurrent FI and SCA countermeasure with switchable performance and security modes
Ehsan Aerabi and Cyril Bresch and David Hély and Athanasios Papadimitriou and Mahdi Fazeli
2020/248 ( PDF )
Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast
Ittai Abraham and Benny Pinkas and Avishay Yanai
2020/247 ( -- withdrawn -- )
Crooked Indifferentiability Revisited
Rishiraj Bhattacharyya and Mridul Nandi and Anik Raychaudhuri
2020/246 ( PDF )
Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography
Jing Tian and Jun Lin and Zhongfeng Wang
2020/245 ( PDF )
New Assumptions and Efficient Cryptosystems from the $e$-th Power Residue Symbol
Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao and Licheng Wang and Zhusen Liu
2020/244 ( PDF )
On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol
Andrea Basso and Péter Kutas and Simon-Philipp Merz and Christophe Petit and Charlotte Weitkämper
2020/243 ( PDF )
An Analysis of Hybrid Public Key Encryption
Benjamin Lipp
2020/242 ( PDF )
Practical and Secure Circular Range Search on Private Spatial Data
Zhihao Zheng and Jiachen Shen and Zhenfu Cao
2020/241 ( PDF )
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability
Mihir Bellare and Hannah Davis and Felix Günther
2020/240 ( PDF )
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture
T-H. Hubert Chan and Kai-Min Chung and Wei-Kai Lin and Elaine Shi
2020/239 ( PDF )
Viktoria: A new Paradigm for Hash Functions
Edimar Veríssimo
2020/238 ( PDF )
Efficient ECM factorization in parallel with the Lyness map
Andrew Hone
2020/237 ( PDF )
On Security Notions for Encryption in a Quantum World
Céline Chevalier and Ehsan Ebrahimi and Quoc-Huy Vu
2020/236 ( PDF )
Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21
Mridul Nandi
2020/235 ( PDF )
Statistical Zaps and New Oblivious Transfer Protocols
Vipul Goyal and Abhishek Jain and Zhengzhong Jin and and Giulio Malavolta
2020/234 ( PDF )
Application of commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups to Key Exchange Protocol
Ruslan V. Skuratovskii and Aled Williams
2020/233 ( PDF )
Key-Homomorphic Pseudorandom Functions from LWE with a Small Modulus
Sam Kim
2020/232 ( PDF )
Combiners for AEAD
Bertram Poettering and Paul Rösler
2020/231 ( PDF )
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions
Junichi Tomida and Nuttapong Attrapadung
2020/230 ( PDF )
Lattice analysis on MiNTRU problem
Changmin Lee and Alexandre Wallet
2020/229 ( PDF )
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications
Itai Dinur
2020/228 ( PDF )
Optimal Broadcast Encryption from Pairings and LWE
Shweta Agrawal and Shota Yamada
2020/227 ( PDF )
About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10
Yindong Chen, Limin Lin, Chuliang Wei
2020/226 ( PDF )
Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol
Meher Krishna Duggirala . and . Ravi Duggirala . and . Krishna Subba Rao Pulugurtha
2020/225 ( PDF )
Generic-Group Delay Functions Require Hidden-Order Groups
Lior Rotem and Gil Segev and Ido Shahaf
2020/224 ( PDF )
Security under Message-Derived Keys: Signcryption in iMessage
Mihir Bellare and Igors Stepanovs
2020/223 ( PDF )
Compact NIZKs from Standard Assumptions on Bilinear Maps
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2020/222 ( PDF )
Improving Speed and Security in Updatable Encryption Schemes
Dan Boneh and Saba Eskandarian and Sam Kim and Maurice Shih
2020/221 ( PDF )
Multiparty Reusable Non-Interactive Secure Computation
Fabrice Benhamouda and Huijia Lin
2020/220 ( PDF )
Remote Side-Channel Attacks on Anonymous Transactions
Florian Tramčr and Dan Boneh and Kenneth G. Paterson
2020/219 ( PDF )
Multi-Client Functional Encryption for Separable Functions
Michele Ciampi and Luisa Siniscalchi and Hendrik Waldner
2020/218 ( PDF )
Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs
Ehsan Aerabi and Milad Bohlouli and MohammadHasan Ahmadi Livany and Mahdi Fazeli and Athanasios Papadimitriou and David Hely
2020/217 ( PDF )
SynFi: Automatic Synthetic Fingerprint Generation
M. Sadegh Riazi and Seyed M. Chavoshian and Farinaz Koushanfar
2020/216 ( PDF )
Black-Box Constructions of Bounded-Concurrent Secure Computation
Sanjam Garg and Xiao Liang and Omkant Pandey and Ivan Visconti
2020/215 ( PDF )
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption
Megumi Ando and Anna Lysyanskaya
2020/214 ( PDF )
Thresholdizing HashEdDSA: MPC to the Rescue
Charlotte Bonte and Nigel P. Smart and Titouan Tanguy
2020/213 ( PDF )
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound
Akinori Hosoyamada and Yu Sasaki
2020/212 ( PDF )
Isogenies of certain abelian varieties over finite fields with p-ranks zero
Steve Thakur
2020/211 ( PDF )
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle
Davide Bellizia and Olivier Bronchain and Gaëtan Cassiers and Vincent Grosso and Chun Guo and Charles Momin and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2020/210 ( PDF )
SITM: See-In-The-Middle--Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers
Shivam Bhasin and Jakub Breier and Xiaolu Hou and Dirmanto Jap and Romain Poussier and Siang Meng Sim
2020/209 ( PDF )
Adaptive Simulation Security for Inner Product Functional Encryption
Shweta Agrawal and Benoît Libert and Monosij Maitra and Radu Titiu
2020/208 ( PDF )
Random Integer Lattice Generation via HNF
Gengran Hu and Lin You and Liqin Hu and Hui Wang
2020/207 ( PDF )
A Framework for Universally Composable Publicly Verifiable Cryptographic Protocols
Carsten Baum and Bernardo David and Rafael Dowsley
2020/206 ( -- withdrawn -- )
A Post-Quantum Non-Interactive Key-Exchange Protocol from Coding Theory
Jean-Francois Biasse and Giacomo Micheli and Edoardo Persichetti and Paolo Santini
2020/205 ( PDF )
SodsBC: Stream of Distributed Secrets for Quantum-safe Blockchain
Shlomi Dolev and Ziyu Wang
2020/204 ( PDF )
Cryptographic Reverse Firewalls for Interactive Proof Systems
Chaya Ganesh and Bernardo Magri and Daniele Venturi
2020/203 ( PDF )
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework
Thang Hoang and Jorge Guajardo and Attila A. Yavuz
2020/202 ( PDF )
Strong Anti-SAT: Secure and Effective Logic Locking
Yuntao Liu and Michael Zuzak and Yang Xie and Abhishek Chakraborty and Ankur Srivastava
2020/201 ( PDF )
A Survey on Neural Trojans
Yuntao Liu and Ankit Mondal and Abhishek Chakraborty and Michael Zuzak and Nina Jacobsen and Daniel Xing and Ankur Srivastava
2020/200 ( PDF )
Exploring the Golden Mean Between Leakage and Fault Resilience and Practice
Christoph Dobraunig and Bart Mennink and Robert Primas
2020/199 ( PDF )
Improvement on a Masked White-box Cryptographic Implementation
Seungkwang Lee and Myungchul Kim
2020/198 ( PDF )
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors
Shi Bai and Dipayan Das and Ryo Hiromasa and Miruna Rosca and Amin Sakzad and Damien Stehlé and Ron Steinfeld and Zhenfei Zhang
2020/197 ( PDF )
Dynamic Decentralized Functional Encryption
Jérémy Chotard and Edouard Dufour-Sans and Romain Gay and Duong Hieu Phan and David Pointcheval
2020/196 ( PDF )
Trustless Groups of Unknown Order with Hyperelliptic Curves
Samuel Dobson and Steven D. Galbraith
2020/195 ( PDF )
Replicated state machines without replicated execution
Jonathan Lee and Kirill Nikitin and Srinath Setty
2020/194 ( PDF )
Adaptively Secure ABE for DFA from k-Lin and More
Junqing Gong and Hoeteck Wee
2020/193 ( PDF )
PSI from PaXoS: Fast, Malicious Private Set Intersection
Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai
2020/192 ( PDF )
Certificateless Homomorphic Signature Scheme for Network Coding
Jinyong Chang and Bilin Shao and Yanyan Ji and Genqing Bian
2020/191 ( PDF )
Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE
Zvika Brakerski and Vinod Vaikuntanathan
2020/190 ( PDF )
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees
Assimakis Kattis and Joseph Bonneau
2020/189 ( PDF )
Guaranteed Output Delivery Comes Free in Honest Majority MPC
Vipul Goyal and Yifan Song and Chenzhi Zhu
2020/188 ( PDF )
Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer
2020/187 ( PDF )
Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack
Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart
2020/186 ( PDF )
Bitcoin Crypto–Bounties for Quantum Capable Adversaries
Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt
2020/185 ( PDF )
Hardware Private Circuits: From Trivial Composition to Full Verification
Gaëtan Cassiers and Benjamin Grégoire and Itamar Levi and François-Xavier Standaert
2020/184 ( PDF )
Fair and Decentralized Exchange of Digital Goods
Ariel Futoransky and Carlos Sarraute and Daniel Fernandez and Matias Travizano and Ariel Waissbein
2020/183 ( PDF )
A Note on Secure Multiparty Computation via Higher Residue Symbol Techniques
Ignacio Cascudo and Reto Schnyder
2020/182 ( PDF )
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Maria Eichlseder and Lorenzo Grassi and Reinhard Lüftenegger and Morten Řygarden and Christian Rechberger and Markus Schofnegger and Qingju Wang
2020/181 ( PDF )
$L_1$-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space
Kohei Nakagawa and Hiroshi Onuki and Atsushi Takayasu and Tsuyoshi Takagi
2020/180 ( PDF )
Multikey FHE in the Plain Model
Prabhanjan Ananth and Abhishek Jain and ZhengZhong Jin and Giulio Malavolta
2020/179 ( PDF )
Mind the Middle Layer: The HADES Design Strategy Revisited
Nathan Keller and Asaf Rosemarin
2020/178 ( PDF )
A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device
Santosh Ghosh and Luis S Kida and Soham Jayesh Desai and Reshma Lal
2020/177 ( PDF )
Revisiting (R)CCA Security and Replay Protection
Christian Badertscher and Ueli Maurer and Christopher Portmann and Guilherme Rito
2020/176 ( PDF )
Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version)
Eugene Frimpong and Alexandros Bakas and Hai-Van Dang and Antonis Michalas
2020/175 ( PDF )
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
Stefan Dziembowski and Grzegorz Fabiański and Sebastian Faust and Siavash Riahi
2020/174 ( PDF )
On Selective-Opening Security of Deterministic Primitives
Mohammad Zaheri and Adam O'Neill
2020/173 ( PDF )
Securing Proof-of-Work Ledgers via Checkpointing
Dimitris Karakostas and Aggelos Kiayias
2020/172 ( PDF )
Qubit-based Unclonable Encryption with Key Recycling
Daan Leermakers and Boris Skoric
2020/171 ( PDF )
High Performance Logistic Regression for Privacy-Preserving Genome Analysis
Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen and Ariel Todoki
2020/170 ( PDF )
Reusable Two-Round MPC from DDH
James Bartusek and Sanjam Garg and Daniel Masny and Pratyay Mukherjee
2020/169 ( PDF )
Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE)
Prabhanjan Ananth and Abhishek Jain and Zhengzhong Jin
2020/168 ( PDF )
Improved Classical and Quantum Algorithms for Subset-Sum
Xavier Bonnetain and Rémi Bricout and André Schrottenloher and Yixin Shen
2020/167 ( PDF )
Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning
Jinhyun So and Basak Guler and A. Salman Avestimehr
2020/166 ( PDF )
Ethna: Channel Network with Dynamic Internal Payment Splitting
Stefan Dziembowski and Paweł Kędzior
2020/165 ( PDF )
Efficient Solutions of the CHES 2018 AES Challenge Using Deep Residual Neural Networks and Knowledge Distillation on Adversarial Examples
Aron Gohr and Sven Jacob and Werner Schindler
2020/164 ( PDF )
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way?
Alex Bienstock and Allison Bishop and Eli Goldin and Garrison Grogan and Victor Lecomte
2020/163 ( PDF )
Impossibility Results for Lattice-Based Functional Encryption Schemes
Akin Ünal
2020/162 ( PDF )
A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity
Ignacio Cascudo and Jaron Skovsted Gundersen
2020/161 ( PDF )
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact
Hanlin Liu and Yu Yu and Shuoyao Zhao and Jiang Zhang and Wenling Liu
2020/160 ( PDF )
Solving Some Affine Equations over Finite Fields
Sihem Mesnager and Kwang Ho Kim and Jong Hyok Choe and Dok Nam Lee
2020/159 ( PDF )
Privacy-preserving collaborative machine learning on genomic data using TensorFlow
Cheng Hong and Zhicong Huang and Wen-jie Lu and Hunter Qu and Li Ma and Morten Dahl and Jason Mancuso
2020/158 ( PDF )
Jump index in T-functions for designing a new basic structure of stream ciphers
Ali Hadipour and Seyed Mahdi Sajadieh and Raheleh Afifi
2020/157 ( PDF )
Multi-Source Non-Malleable Extractors and Applications
Vipul Goyal and Akshayaram Srinivasan and Chenzhi Zhu
2020/156 ( PDF )
Phantom: An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts
Xing Li and Yi Zheng and Kunxian Xia and Tongcheng Sun and John Beyler
2020/155 ( PDF )
Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference
Yifan Tian and Laurent Njilla and Jiawei Yuan and Shucheng Yu
2020/154 ( PDF )
Combiners for Functional Encryption, Unconditionally
Aayush Jain and Nathan Manohar and Amit Sahai
2020/153 ( PDF )
Constructing Secure Multi-Party Computation with Identifiable Abort
Nicholas-Philip Brandt and Sven Maier and Tobias Müller and Jörn Müller-Quade
2020/152 ( PDF )
Compressed $\Sigma$-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics
Thomas Attema and Ronald Cramer
2020/151 ( PDF )
Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
Wouter Castryck and Jana Sotáková and Frederik Vercauteren
2020/150 ( PDF )
On the Security of NTS-KEM in the Quantum Random Oracle Model
Varun Maram
2020/149 ( PDF )
Vector Commitment Techniques and Applications to Verifiable Decentralized Storage
Matteo Campanelli and Dario Fiore and Nicola Greco and Dimitris Kolonelos and Luca Nizzardo
2020/148 ( PDF )
Determining the Core Primitive for Optimally Secure Ratcheting
Fatih Balli and Paul Rösler and Serge Vaudenay
2020/147 ( PDF )
Non-Malleability against Polynomial Tampering
Marshall Ball and Eshan Chattopadhyay and Jyun-Jie Liao and Tal Malkin and Li-Yang Tan
2020/146 ( PDF )
Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security
Roman Langrehr and Jiaxin Pan
2020/145 ( PDF )
Self-Secured PUF: Protecting the Loop PUF by Masking
Lars Tebelmann and Jean-Luc Danger and Michael Pehl
2020/144 ( PDF )
Double-Base Chains for Scalar Multiplications on Elliptic Curves
Wei Yu and Saud Al Musa and Bao Li
2020/143 ( PDF )
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT
Hailong Yao and Caifen Wang* and Xingbing Fu and Chao Liu and Bin Wu and Fagen Li
2020/142 ( PDF )
Network-Agnostic State Machine Replication
Erica Blum and Jonathan Katz and Julian Loss
2020/141 ( PDF )
Deterministic-Prover Zero-Knowledge Proofs
Hila Dahari and Yehuda Lindell
2020/140 ( PDF )
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model
Shaoquan Jiang and Guang Gong and Jingnan He and Khoa Nguyen and Huaxiong Wang
2020/139 ( PDF )
Going Beyond Dual Execution: MPC for Functions with Efficient Verification
Carmit Hazay and abhi shelat and Muthuramakrishnan Venkitasubramaniam
2020/138 ( PDF )
Smart Contract Derivatives
Kostis Karantias and Aggelos Kiayias and Dionysis Zindros
2020/137 ( PDF )
Consistency for Functional Encryption
Christian Badertscher and Aggelos Kiayias and Markulf Kohlweiss and Hendrik Waldner
2020/136 ( PDF )
Stacked Garbling for Disjunctive Zero-Knowledge Proofs
David Heath and Vladimir Kolesnikov
2020/135 ( PDF )
Threshold Ring Signatures: New Definitions and Post-Quantum Security
Abida Haque and Alessandra Scafuro
2020/134 ( PDF )
Malicious Security Comes Free in Honest-Majority MPC
Vipul Goyal and Yifan Song
2020/133 ( PDF )
Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware
Souradyuti Paul and Ananya Shrivastava
2020/132 ( PDF )
Boosting Verifiable Computation on Encrypted Data
Dario Fiore and Anca Nitulescu and David Pointcheval
2020/131 ( PDF )
Coin Tossing with Lazy Defense: Hardness of Computation Results
Hamidreza Amini Khorasgani and Hemanta K. Maji and Mingyuan Wang
2020/130 ( PDF )
Succinctly Reconstructed Distributed Signatures and Balanced Byzantine Agreement
Elette Boyle and Ran Cohen and Aarushi Goel
2020/129 ( PDF )
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
Juliane Krämer and Patrick Struck
2020/128 ( PDF )
LegRoast: Efficient post-quantum signatures from the Legendre PRF
Ward Beullens and Cyprien Delpech de Saint Guilhem
2020/127 ( PDF )
Fifty Shades of Ballot Privacy: Privacy against a Malicious Board
Véronique Cortier and Joseph Lallemand and Bogdan Warinschi
2020/126 ( PDF )
Public-Key Puncturable Encryption: Modular and Compact Constructions
Shi-Feng Sun and Amin Sakzad and Ron Steinfeld and Joseph Liu and Dawu Gu
2020/125 ( PDF )
Oblivious Parallel Tight Compaction
Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Enoch Peserico and Elaine Shi
2020/124 ( PDF )
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512
Ali El Kaafarani and Shuichi Katsumata and Federico Pintore
2020/123 ( PDF )
Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains
Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov
2020/122 ( PDF )
Verifiable Inner Product Encryption Scheme
Najmeh Soroush and Vincenzo Iovino and Alfredo Rial and Peter B. Roenne and Peter Y. A. Ryan
2020/121 ( PDF )
When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead
Hao Chen and Ilia Iliashenko and Kim Laine
2020/120 ( PDF )
The randomized slicer for CVPP: sharper, faster, smaller, batchier
Léo Ducas and Thijs Laarhoven and Wessel P.J. van Woerden
2020/119 ( PDF )
Hardness of LWE on General Entropic Distributions
Zvika Brakerski and Nico Döttling
2020/118 ( PDF )
InfoCommit: Information-Theoretic Polynomial Commitment and Verification
Saeid Sahraei and Salman Avestimehr
2020/117 ( PDF )
Efficient BIKE Hardware Design with Constant-Time Decoder
Andrew Reinders and Rafael Misoczki and Santosh Ghosh and Manoj Sastry
2020/116 ( PDF )
Separating Two-Round Secure Computation from Oblivious Transfer
Benny Applebaum and Zvika Brakerski and Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan
2020/115 ( PDF )
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
Xavier Boyen and Thomas Haines and Johannes Mueller
2020/114 ( PDF )
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
Antoine Delignat-Lavaud and Cédric Fournet and Bryan Parno and Jonathan Protzenko and Tahina Ramananandro and Jay Bosamiya and Joseph Lallemand and Itsaka Rakotonirina and Yi Zhou
2020/113 ( PDF )
New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve
Madhurima Mukhopadhyay and Palash Sarkar and Shashank Singh and Emmanuel Thome
2020/112 ( PDF )
A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography
Patrick Karl and Michael Tempelmeier
2020/111 ( PDF )
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2020/110 ( PDF )
Blazing Fast OT for Three-Round UC OT Extension
Ran Canetti and Pratik Sarkar and Xiao Wang
2020/109 ( PDF )
Fixing the Achilles Heel of E-Voting: The Bulletin Board
Lucca Hirschi and Lara Schmid and David Basin
2020/108 ( PDF )
Practical Forgeries for ORANGE
Christoph Dobraunig and Florian Mendel and Bart Mennink
2020/107 ( PDF )
One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication
Ryan Amos and Marios Georgiou and Aggelos Kiayias and Mark Zhandry
2020/106 ( PDF )
Relaxed freshness in component authentication
Frank Schuhmacher
2020/105 ( PDF )
MCU intrinsic group features for component authentication
Frank Schuhmacher
2020/104 ( PDF )
On the Security Goals of White-Box Cryptography
Estuardo Alpirez Bock and Alessandro Amadori and Chris Brzuska and Wil Michiels
2020/103 ( PDF )
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128
Boxin Zhao and Xiaoyang Dong and Keting Jia and Willi Meier
2020/102 ( PDF )
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
Boxin Zhao and Xiaoyang Dong and Keting Jia
2020/101 ( PDF )
A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future
Haibat Khan and Keith M. Martin
2020/100 ( PDF )
A direct proof of APN-ness of the Kasami functions
Claude Carlet and Kwang Ho Kim and Sihem Mesnager
2020/099 ( PDF )
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange
Benjamin Dowling and Torben Brandt Hansen and Kenneth G. Paterson
2020/098 ( PDF )
Improved key recovery on the Legendre PRF
Novak Kaluđerović and Thorsten Kleinjung and Dusan Kostic
2020/097 ( PDF )
Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard
Stanislav S. Malakhov
2020/096 ( PDF )
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons
David Galindo and Jia Liu and Mihai Ordean and Jin-Mann Wong
2020/095 ( PDF )
SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors
Zhongxiang Zheng and Anyu Wang and Haining Fan and Chunhuan Zhao and Chao Liu and Xue Zhang
2020/094 ( PDF )
On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms
Michael Davidson and Tyler Diamond
2020/093 ( PDF )
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
Romain Gay
2020/092 ( PDF )
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees
Daniel Jost and Ueli Maurer
2020/091 ( PDF )
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption
Jonathan Takeshita and Matthew Schoenbauer and Ryan Karl and Taeho Jung
2020/090 ( PDF )
Witness Maps and Applications
Suvradip Chakraborty and Manoj Prabhakaran and Daniel Wichs
2020/089 ( PDF )
The MILP-Aided Conditional Differential Attack and Its Application to Trivium
Chen-Dong Ye and Tian Tian and Fan-Yang Zeng
2020/088 ( PDF )
Streamlet: Textbook Streamlined Blockchains
Benjamin Y Chan and Elaine Shi
2020/087 ( PDF )
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey)
Elaine Shi
2020/086 ( PDF )
Bootstrapping in FHEW-like Cryptosystems
Daniele Micciancio and Yuriy Polyakov
2020/085 ( PDF )
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems
Ben Nassi and Dudi Nassi and Raz Ben-Netanel and Yisroel Mirsky and Oleg Drokin and Yuval Elovici
2020/084 ( PDF )
Bandwidth-efficient threshold EC-DSA
Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
2020/083 ( PDF )
Metal: A Metadata-Hiding File-Sharing System
Weikeng Chen and Raluca Ada Popa
2020/082 ( PDF )
Random Walks and Concurrent Zero-Knowledge
Anand Aiyer and Xiao Liang and Nilu Nalini and Omkant Pandey
2020/081 ( PDF )
Efficient polynomial commitment schemes for multiple points and polynomials
Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon
2020/080 ( PDF )
Better Secret-Sharing via Robust Conditional Disclosure of Secrets
Benny Applebaum and Amos Beimel and Oded Nir and Naty Peter
2020/079 ( PDF )
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective
Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
2020/078 ( PDF )
Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo
Kentaro Tamura and Yutaka Shikano
2020/077 ( PDF )
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms
Thomas Häner and Samuel Jaques and Michael Naehrig and Martin Roetteler and Mathias Soeken
2020/076 ( PDF )
Wyner-Ziv reconciliation for key exchange based on Ring-LWE
Charbel Saliba and Laura Luzzi and Cong Ling
2020/075 ( PDF )
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms
Rishiraj Bhattacharyya
2020/074 ( PDF )
Rolling up sleeves when subversion's in a field?
Daniel R. L. Brown
2020/073 ( PDF )
Anonymous Symmetric-Key Communication
Fabio Banfi and Ueli Maurer
2020/072 ( PDF )
Efficient Anonymous Tokens with Private Metadata Bit
Ben Kreuter and Tancrede Lepoint and Michele Orru and Mariana Raykova
2020/071 ( PDF )
Post-Quantum Authentication in TLS 1.3: A Performance Study
Dimitrios Sikeridis and Panos Kampanakis and Michael Devetsikiotis
2020/070 ( PDF )
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
Thomas Agrikola and Dennis Hofheinz and Julia Kastner
2020/069 ( PDF )
RSA and redactable blockchains
Dima Grigoriev and Vladimir Shpilrain
2020/068 ( PDF )
Further Clarification on Mantin's Digraph Repetition Bias in RC4
Pranab Chakraborty and Subhamoy Maitra
2020/067 ( PDF )
Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse
Taylor R Campbell
2020/066 ( PDF )
Talek: Private Group Messaging with Hidden Access Patterns
Raymond Cheng and William Scott and Elisaweta Masserova and Irene Zhang and Vipul Goyal and Thomas Anderson and Arvind Krishnamurthy and Bryan Parno
2020/065 ( PDF )
A Performant, Misuse-Resistant API for Primality Testing
Jake Massimo and Kenneth G. Paterson
2020/064 ( PDF )
Dual System in Lattice: Fully Secure ABE from LWE Assumption
Geng Wang and Ming Wan and Zhen Liu and Dawu Gu
2020/063 ( PDF )
Attack on LAC Key Exchange in Misuse Situation
Aurelien Greuet and Simon Montoya and Guenael Renault
2020/062 ( PDF )
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
Behzad Abdolmaleki and Sebastian Ramacher and Daniel Slamanig
2020/061 ( PDF )
Simple Schnorr Signature with Pedersen Commitment as Key
Gary Yu
2020/060 ( PDF )
Auditable Asymmetric Password Authenticated Public Key Establishment
Antonio Faonio and Maria Isabel Gonzalez Vasco and Claudio Soriente and Hien Thi Thu Truong
2020/059 ( PDF )
ARX-KW, a family of key wrapping constructions using SipHash and ChaCha
Satō Shinichi
2020/058 ( PDF )
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis
Guilherme Perin and Ileana Buhan and Stjepan Picek
2020/057 ( PDF )
On the smoothing parameter and last minimum of random orthogonal lattices
Elena Kirshanova and Huyen Nguyen and Damien Stehlé and Alexandre Wallet
2020/056 ( PDF )
AKCN-E8: Compact and Flexible KEM from Ideal Lattice
Zhengzhong JIn and Yunlei Zhao
2020/055 ( PDF )
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
Alejandro Cabrera Aldaya and Billy Bob Brumley
2020/054 ( PDF )
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA
Wen Wang and Shanquan Tian and Bernhard Jungk and Nina Bindel and Patrick Longa and Jakub Szefer
2020/053 ( PDF )
Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems"
Yasuhiko Ikematsu and Shuhei Nakamura
2020/052 ( PDF )
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
Mohamed Tolba and Muhammad ElSheikh and Amr M. Youssef
2020/051 ( PDF )
Low-Latency Hardware Masking with Application to AES
Pascal Sasdrich and Begül Bilgin and Michael Hutter and Mark Marson
2020/050 ( PDF )
Delphi: A Cryptographic Inference Service for Neural Networks
Pratyush Mishra and Ryan Lehmkuhl and Akshayaram Srinivasan and Wenting Zheng and Raluca Ada Popa
2020/049 ( PDF )
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Erdem Alkim and Hülya Evkan and Norman Lahr and Ruben Niederhagen and Richard Petri
2020/048 ( PDF )
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage
Changshe Ma and Yiping Gu and Hongfei Li
2020/047 ( PDF )
New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version)
Tianshuo Cong and Ximing Fu and Xuting Zhou and Yuli Zou and Haining Fan
2020/046 ( PDF )
On Analysis of Lightweight Stream Ciphers with Keyed Update
Orhun Kara and Muhammed F. Esgin
2020/045 ( PDF )
Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6
Haibat Khan and Benjamin Dowling and Keith M. Martin
2020/044 ( PDF )
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts
Alexander Chepurnoy and Amitabh Saxena
2020/043 ( PDF )
Zone Encryption with Anonymous Authentication for V2V Communication
Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa
2020/042 ( PDF )
BLAZE: Blazing Fast Privacy-Preserving Machine Learning
Arpita Patra and Ajith Suresh
2020/041 ( PDF )
Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders
Aggelos Kiayias and Saad Quader and Alexander Russell
2020/040 ( PDF )
A Compact and Scalable Hardware/Software Co-design of SIKE
Pedro Maat C. Massolino and Patrick Longa and Joost Renes and Lejla Batina
2020/039 ( PDF )
Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis
Damien Robissout and Gabriel Zaid and Brice Colombier and Lilian Bossuet and Amaury Habrard
2020/038 ( PDF )
Bitstream Modification Attack on SNOW 3G
Michail Moraitis and Elena Dubrova
2020/037 ( PDF )
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput
Matthias Fitzi and Peter Gaži and Aggelos Kiayias and Alexander Russell
2020/036 ( PDF )
Analysis on Aigis-Enc: asymmetrical and symmetrical
Yupu Hu and Siyue Dong and Xingting Dong
2020/035 ( PDF )
Constant-round Dynamic Group Key Exchange from RLWE Assumption
Rakyong Choi and Dongyeon Hong and Kwangjo Kim
2020/034 ( PDF )
SkyEye: A Traceable Scheme for Blockchain
Tianjun Ma and Haixia Xu and Peili Li
2020/033 ( PDF )
Scalable Open-Vote Network on Ethereum
Mohamed Seifelnasr and Hisham S. Galal and Amr M. Youssef
2020/032 ( PDF )
A New Approach for the Implementation of Binary Matrices Using SLP Applications
Mahdi Sajadieh and Mohsen Mousavi
2020/031 ( PDF )
Locally Decodable Codes with Randomized Encoding
Kuan Cheng and Xin Li and Yu Zheng
2020/030 ( PDF )
Κ-Cipher: A Low Latency, Bit Length Parameterizable Cipher
Michael Kounavis and Sergej Deutsch and Santosh Ghosh and David Durham
2020/029 ( PDF )
Differentially-Private Multi-Party Sketching for Large-Scale Statistics
Seung Geol Choi and Dana Dachman-Soled and Mukul Kulkarni and Arkady Yerukhimovich
2020/028 ( PDF )
Verified Security of BLT Signature Scheme
Denis Firsov and Ahto Buldas and Ahto Truu and Risto Laanoja
2020/027 ( PDF )
On Roots Factorization for PQC Algorithms
Alexander Maximov
2020/026 ( PDF )
Post-Quantum Secure Architectures for Automotive Hardware Secure Modules
Wen Wang and Marc Stöttinger
2020/025 ( PDF )
Single Secret Leader Election
Dan Boneh and Saba Eskandarian and Lucjan Hanzlik and Nicola Greco
2020/024 ( PDF )
The Arwen Trading Protocols (Full Version)
Ethan Heilman and Sebastien Lipmann and Sharon Goldberg
2020/023 ( PDF )
Threshold Multi-Signature with an Offline Recovery Party
Riccardo Longo and Alessio Meneghetti and Massimiliano Sala
2020/022 ( PDF )
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material)
Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson
2020/021 ( PDF )
eSIDH: the revenge of the SIDH
Daniel Cervantes-Vázquez and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez
2020/020 ( PDF )
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes
Shangqi Lai and Xingliang Yuan and Shi-Feng Sun and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Dongxi Liu
2020/019 ( PDF )
Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains
Suhyeon Lee and Seungjoo Kim
2020/018 ( PDF )
Triptych: logarithmic-sized linkable ring signatures with applications
Sarang Noether and Brandon Goodell
2020/017 ( PDF )
Biometric-Authenticated Searchable Encryption
Daniel Gardham and Mark Manulis and Constantin Cătălin Drăgan
2020/016 ( PDF )
Short Threshold Dynamic Group Signatures
Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa
2020/015 ( PDF )
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts
Hao Chen and Wei Dai and Miran Kim and Yongsoo Song
2020/014 ( PDF )
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
Gaëtan Leurent and Thomas Peyrin
2020/013 ( PDF )
On the Cryptographic Hardness of Local Search
Nir Bitansky and Idan Gerichter
2020/012 ( PDF )
Cortex-M4 Optimizations for \{R,M\}LWE Schemes
Erdem Alkim and Yusuf Alper Bilgin and Murat Cenk and François Gérard
2020/011 ( PDF )
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain
Ming Li,Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo
2020/010 ( PDF )
Double point compression for elliptic curves of $j$-invariant $0$
Dmitrii Koshelev
2020/009 ( PDF )
Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions
Thomas Pornin
2020/008 ( PDF )
Secret Sharing Schemes for Ports of Matroids of Rank 3
Oriol Farrŕs
2020/007 ( PDF )
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts
Nabil Alkeilani Alkadri and Rachid El Bansarkhani and Johannes Buchmann
2020/006 ( PDF )
Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures
André Chailloux and Thomas Debris-Alazard
2020/005 ( PDF )
Lai-Massey Scheme Revisited
M. R. Mirzaee Shamsabad and S. M. Dehnavi
2020/004 ( -- withdrawn -- )
BPCEX: Towards Blockchain-based Privacy-preserving Currency Exchange
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2020/003 ( PDF )
New Constructions of Traceable Range Proofs: Towards Multiple Regulation and Joint Regulation
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang
2020/002 ( PDF )
On a Conjecture of O'Donnell
Qichun Wang
2020/001 ( PDF )
Elliptic Curves of Nearly Prime Order
Manoj Gyawali and Daniele Di Tullio


[ Cryptology ePrint archive ]