Cryptology ePrint Archive: Listing for 2020

2020/231 ( PDF )
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions
Junichi Tomida and Nuttapong Attrapadung
2020/230 ( PDF )
Lattice analysis on MiNTRU problem
Changmin Lee and Alexandre Wallet
2020/229 ( PDF )
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications
Itai Dinur
2020/228 ( PDF )
Optimal Broadcast Encryption from Pairings and LWE
Shweta Agrawal and Shota Yamada
2020/227 ( PDF )
About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10
Yindong Chen, Limin Lin, Chuliang Wei
2020/226 ( PDF )
Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol
Meher Krishna Duggirala . and . Ravi Duggirala . and . Krishna Subba Rao Pulugurtha
2020/225 ( PDF )
Generic-Group Delay Functions Require Hidden-Order Groups
Lior Rotem and Gil Segev and Ido Shahaf
2020/224 ( PDF )
Security under Message-Derived Keys: Signcryption in iMessage
Mihir Bellare and Igors Stepanovs
2020/223 ( PDF )
Compact NIZKs from Standard Assumptions on Bilinear Maps
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2020/222 ( PDF )
Improving Speed and Security in Updatable Encryption Schemes
Dan Boneh and Saba Eskandarian and Sam Kim and Maurice Shih
2020/221 ( PDF )
Multiparty Reusable Non-Interactive Secure Computation
Fabrice Benhamouda and Huijia Lin
2020/220 ( PDF )
Remote Side-Channel Attacks on Anonymous Transactions
Florian Tramèr and Dan Boneh and Kenneth G. Paterson
2020/219 ( PDF )
Multi-Client Functional Encryption for Separable Functions
Michele Ciampi and Luisa Siniscalchi and Hendrik Waldner
2020/218 ( PDF )
Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs
Ehsan Aerabi and Milad Bohlouli and MohammadHasan Ahmadi Livany and Mahdi Fazeli and Athanasios Papadimitriou and David Hely
2020/217 ( PDF )
SynFi: Automatic Synthetic Fingerprint Generation
M. Sadegh Riazi and Seyed M. Chavoshian and Farinaz Koushanfar
2020/216 ( PDF )
Black-Box Constructions of Bounded-Concurrent Secure Computation
Sanjam Garg and Xiao Liang and Omkant Pandey and Ivan Visconti
2020/215 ( PDF )
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption
Megumi Ando and Anna Lysyanskaya
2020/214 ( PDF )
Thresholdizing HashEdDSA: MPC to the Rescue
Charlotte Bonte and Nigel P. Smart and Titouan Tanguy
2020/213 ( PDF )
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound
Akinori Hosoyamada and Yu Sasaki
2020/212 ( PDF )
Isogenies of certain abelian varieties over finite fields with p-ranks zero
Steve Thakur
2020/211 ( PDF )
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle
Davide Bellizia and Olivier Bronchain and Gaëtan Cassiers and Vincent Grosso and Chun Guo and Charles Momin and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2020/210 ( PDF )
SITM: See-In-The-Middle--Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers
Shivam Bhasin and Jakub Breier and Xiaolu Hou and Dirmanto Jap and Romain Poussier and Siang Meng Sim
2020/209 ( PDF )
Adaptive Simulation Security for Inner Product Functional Encryption
Shweta Agrawal and Benoît Libert and Monosij Maitra and Radu Titiu
2020/208 ( PDF )
Random Integer Lattice Generation via HNF
Gengran Hu and Lin You and Liqin Hu and Hui Wang
2020/207 ( PDF )
A Framework for Universally Composable Publicly Verifiable Cryptographic Protocols
Carsten Baum and Bernardo David and Rafael Dowsley
2020/206 ( -- withdrawn -- )
A Post-Quantum Non-Interactive Key-Exchange Protocol from Coding Theory
Jean-Francois Biasse and Giacomo Micheli and Edoardo Persichetti and Paolo Santini
2020/205 ( PDF )
SodsBC: Stream of Distributed Secrets for Quantum-safe Blockchain
Shlomi Dolev and Ziyu Wang
2020/204 ( PDF )
Cryptographic Reverse Firewalls for Interactive Proof Systems
Chaya Ganesh and Bernardo Magri and Daniele Venturi
2020/203 ( PDF )
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework
Thang Hoang and Jorge Guajardo and Attila A. Yavuz
2020/202 ( PDF )
Strong Anti-SAT: Secure and Effective Logic Locking
Yuntao Liu and Michael Zuzak and Yang Xie and Abhishek Chakraborty and Ankur Srivastava
2020/201 ( PDF )
A Survey on Neural Trojans
Yuntao Liu and Ankit Mondal and Abhishek Chakraborty and Michael Zuzak and Nina Jacobsen and Daniel Xing and Ankur Srivastava
2020/200 ( PDF )
Exploring the Golden Mean Between Leakage and Fault Resilience and Practice
Christoph Dobraunig and Bart Mennink and Robert Primas
2020/199 ( PDF )
Improvement on a Masked White-box Cryptographic Implementation
Seungkwang Lee and Myungchul Kim
2020/198 ( PDF )
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors
Shi Bai and Dipayan Das and Ryo Hiromasa and Miruna Rosca and Amin Sakzad and Damien Stehlé and Ron Steinfeld and Zhenfei Zhang
2020/197 ( PDF )
Dynamic Decentralized Functional Encryption
Jérémy Chotard and Edouard Dufour-Sans and Romain Gay and Duong Hieu Phan and David Pointcheval
2020/196 ( PDF )
Trustless Groups of Unknown Order with Hyperelliptic Curves
Samuel Dobson and Steven D. Galbraith
2020/195 ( PDF )
Replicated state machines without replicated execution
Jonathan Lee and Kirill Nikitin and Srinath Setty
2020/194 ( PDF )
Adaptively Secure ABE for DFA from k-Lin and More
Junqing Gong and Hoeteck Wee
2020/193 ( PDF )
PSI from PaXoS: Fast, Malicious Private Set Intersection
Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai
2020/192 ( PDF )
Certificateless Homomorphic Signature Scheme for Network Coding
Jinyong Chang and Bilin Shao and Yanyan Ji and Genqing Bian
2020/191 ( PDF )
Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE
Zvika Brakerski and Vinod Vaikuntanathan
2020/190 ( PDF )
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees
Assimakis Kattis and Joseph Bonneau
2020/189 ( PDF )
Guaranteed Output Delivery Comes Free in Honest Majority MPC
Vipul Goyal and Yifan Song and Chenzhi Zhu
2020/188 ( PDF )
Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer
2020/187 ( PDF )
Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack
Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart
2020/186 ( PDF )
Bitcoin Crypto–Bounties for Quantum Capable Adversaries
Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt
2020/185 ( PDF )
Hardware Private Circuits: From Trivial Composition to Full Verification
Gaëtan Cassiers and Benjamin Grégoire and Itamar Levi and François-Xavier Standaert
2020/184 ( PDF )
Fair and Decentralized Exchange of Digital Goods
Ariel Futoransky and Carlos Sarraute and Daniel Fernandez and Matias Travizano and Ariel Waissbein
2020/183 ( PDF )
A Note on Secure Multiparty Computation via Higher Residue Symbol Techniques
Ignacio Cascudo and Reto Schnyder
2020/182 ( PDF )
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Maria Eichlseder and Lorenzo Grassi and Reinhard Lüftenegger and Morten Øygarden and Christian Rechberger and Markus Schofnegger and Qingju Wang
2020/181 ( PDF )
$L_1$-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space
Kohei Nakagawa and Hiroshi Onuki and Atsushi Takayasu and Tsuyoshi Takagi
2020/180 ( PDF )
Multikey FHE in the Plain Model
Prabhanjan Ananth and Abhishek Jain and ZhengZhong Jin and Giulio Malavolta
2020/179 ( PDF )
Mind the Middle Layer: The HADES Design Strategy Revisited
Nathan Keller and Asaf Rosemarin
2020/178 ( PDF )
A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device
Santosh Ghosh and Luis S Kida and Soham Jayesh Desai and Reshma Lal
2020/177 ( PDF )
Revisiting (R)CCA Security and Replay Protection
Christian Badertscher and Ueli Maurer and Christopher Portmann and Guilherme Rito
2020/176 ( PDF )
Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version)
Eugene Frimpong and Alexandros Bakas and Hai-Van Dang and Antonis Michalas
2020/175 ( PDF )
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
Stefan Dziembowski and Grzegorz Fabiański and Sebastian Faust and Siavash Riahi
2020/174 ( PDF )
On Selective-Opening Security of Deterministic Primitives
Mohammad Zaheri and Adam O'Neill
2020/173 ( PDF )
Securing Proof-of-Work Ledgers via Checkpointing
Dimitris Karakostas and Aggelos Kiayias
2020/172 ( PDF )
Qubit-based Unclonable Encryption with Key Recycling
Daan Leermakers and Boris Skoric
2020/171 ( PDF )
High Performance Logistic Regression for Privacy-Preserving Genome Analysis
Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen and Ariel Todoki
2020/170 ( PDF )
Reusable Two-Round MPC from DDH
Saikrishna Badrinarayanan and James Bartusek and Sanjam Garg and Daniel Masny and Pratyay Muhkerjee
2020/169 ( PDF )
Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE)
Prabhanjan Ananth and Abhishek Jain and Zhengzhong Jin
2020/168 ( PDF )
Improved Classical and Quantum Algorithms for Subset-Sum
Xavier Bonnetain and Rémi Bricout and André Schrottenloher and Yixin Shen
2020/167 ( PDF )
Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning
Jinhyun So and Basak Guler and A. Salman Avestimehr
2020/166 ( PDF )
Ethna: Channel Network with Dynamic Internal Payment Splitting
Stefan Dziembowski and Paweł Kędzior
2020/165 ( PDF )
Efficient Solutions of the CHES 2018 AES Challenge Using Deep Residual Neural Networks and Knowledge Distillation on Adversarial Examples
Aron Gohr and Sven Jacob and Werner Schindler
2020/164 ( PDF )
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way?
Alex Bienstock and Allison Bishop and Eli Goldin and Garrison Grogan and Victor Lecomte
2020/163 ( PDF )
Impossibility Results for Lattice-Based Functional Encryption Schemes
Akin Ünal
2020/162 ( PDF )
A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity
Ignacio Cascudo and Jaron Skovsted Gundersen
2020/161 ( PDF )
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact
Hanlin Liu and Yu Yu and Shuoyao Zhao and Jiang Zhang and Wenling Liu
2020/160 ( PDF )
Solving Some Affine Equations over Finite Fields
Sihem Mesnager and Kwang Ho Kim and Jong Hyok Choe and Dok Nam Lee
2020/159 ( PDF )
Privacy-preserving collaborative machine learning on genomic data using TensorFlow
Cheng Hong and Zhicong Huang and Wen-jie Lu and Hunter Qu and Li Ma and Morten Dahl and Jason Mancuso
2020/158 ( PDF )
Jump index in T-functions for designing a new basic structure of stream ciphers
Ali Hadipour and Seyed Mahdi Sajadieh and Raheleh Afifi
2020/157 ( PDF )
Multi-Source Non-Malleable Extractors and Applications
Vipul Goyal and Akshayaram Srinivasan and Chenzhi Zhu
2020/156 ( PDF )
Phantom: An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts
Xing Li and Yi Zheng and Kunxian Xia and Tongcheng Sun and John Beyler
2020/155 ( PDF )
Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference
Yifan Tian and Laurent Njilla and Jiawei Yuan and Shucheng Yu
2020/154 ( PDF )
Combiners for Functional Encryption, Unconditionally
Aayush Jain and Nathan Manohar and Amit Sahai
2020/153 ( PDF )
Constructing Secure Multi-Party Computation with Identifiable Abort
Nicholas-Philip Brandt and Sven Maier and Tobias Müller and Jörn Müller-Quade
2020/152 ( PDF )
Compressed $\Sigma$-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics
Thomas Attema and Ronald Cramer
2020/151 ( PDF )
Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
Wouter Castryck and Jana Sotáková and Frederik Vercauteren
2020/150 ( PDF )
On the Security of NTS-KEM in the Quantum Random Oracle Model
Varun Maram
2020/149 ( PDF )
Vector Commitment Techniques and Applications to Verifiable Decentralized Storage
Matteo Campanelli and Dario Fiore and Nicola Greco and Dimitris Kolonelos and Luca Nizzardo
2020/148 ( PDF )
Determining the Core Primitive for Optimally Secure Ratcheting
Fatih Balli and Paul Rösler and Serge Vaudenay
2020/147 ( PDF )
Non-Malleability against Polynomial Tampering
Marshall Ball and Eshan Chattopadhyay and Jyun-Jie Liao and Tal Malkin and Li-Yang Tan
2020/146 ( PDF )
Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security
Roman Langrehr and Jiaxin Pan
2020/145 ( PDF )
Self-Secured PUF: Protecting the Loop PUF by Masking
Lars Tebelmann and Jean-Luc Danger and Michael Pehl
2020/144 ( PDF )
Double-Base Chains for Scalar Multiplications on Elliptic Curves
Wei Yu and Saud Al Musa and Bao Li
2020/143 ( PDF )
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT
Hailong Yao and Caifen Wang* and Xingbing Fu and Chao Liu and Bin Wu and Fagen Li
2020/142 ( PDF )
Network-Agnostic State Machine Replication
Erica Blum and Jonathan Katz and Julian Loss
2020/141 ( PDF )
Deterministic-Prover Zero-Knowledge Proofs
Hila Dahari and Yehuda Lindell
2020/140 ( PDF )
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model
Shaoquan Jiang and Guang Gong and Jingnan He and Khoa Nguyen and Huaxiong Wang
2020/139 ( PDF )
Going Beyond Dual Execution: MPC for Functions with Efficient Verification
Carmit Hazay and abhi shelat and Muthuramakrishnan Venkitasubramaniam
2020/138 ( PDF )
Smart Contract Derivatives
Kostis Karantias and Aggelos Kiayias and Dionysis Zindros
2020/137 ( PDF )
Consistency for Functional Encryption
Christian Badertscher and Aggelos Kiayias and Markulf Kohlweiss and Hendrik Waldner
2020/136 ( PDF )
Stacked Garbling for Disjunctive Zero-Knowledge Proofs
David Heath and Vladimir Kolesnikov
2020/135 ( PDF )
Threshold Ring Signatures: New Definitions and Post-Quantum Security
Abida Haque and Alessandra Scafuro
2020/134 ( PDF )
Malicious Security Comes Free in Honest-Majority MPC
Vipul Goyal and Yifan Song
2020/133 ( PDF )
Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware
Souradyuti Paul and Ananya Shrivastava
2020/132 ( PDF )
Boosting Verifiable Computation on Encrypted Data
Dario Fiore and Anca Nitulescu and David Pointcheval
2020/131 ( PDF )
Coin Tossing with Lazy Defense: Hardness of Computation Results
Hamidreza Amini Khorasgani and Hemanta K. Maji and Mingyuan Wang
2020/130 ( PDF )
Succinctly Reconstructed Distributed Signatures and Balanced Byzantine Agreement
Elette Boyle and Ran Cohen and Aarushi Goel
2020/129 ( PDF )
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
Juliane Krämer and Patrick Struck
2020/128 ( PDF )
LegRoast: Efficient post-quantum signatures from the Legendre PRF
Ward Beullens and Cyprien Delpech de Saint Guilhem
2020/127 ( PDF )
Fifty Shades of Ballot Privacy: Privacy against a Malicious Board
Véronique Cortier and Joseph Lallemand and Bogdan Warinschi
2020/126 ( PDF )
Public-Key Puncturable Encryption: Modular and Compact Constructions
Shi-Feng Sun and Amin Sakzad and Ron Steinfeld and Joseph Liu and Dawu Gu
2020/125 ( PDF )
Oblivious Parallel Tight Compaction
Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Enoch Peserico and Elaine Shi
2020/124 ( PDF )
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512
Ali El Kaafarani and Shuichi Katsumata and Federico Pintore
2020/123 ( PDF )
Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains
Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov
2020/122 ( PDF )
Verifiable Inner Product Encryption Scheme
Najmeh Soroush and Vincenzo Iovino and Alfredo Rial and Peter B. Roenne and Peter Y. A. Ryan
2020/121 ( PDF )
When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead
Hao Chen and Ilia Iliashenko and Kim Laine
2020/120 ( PDF )
The randomized slicer for CVPP: sharper, faster, smaller, batchier
Léo Ducas and Thijs Laarhoven and Wessel P.J. van Woerden
2020/119 ( PDF )
Hardness of LWE on General Entropic Distributions
Zvika Brakerski and Nico Döttling
2020/118 ( PDF )
InfoCommit: Information-Theoretic Polynomial Commitment and Verification
Saeid Sahraei and Salman Avestimehr
2020/117 ( PDF )
Efficient BIKE Hardware Design with Constant-Time Decoder
Andrew Reinders and Rafael Misoczki and Santosh Ghosh and Manoj Sastry
2020/116 ( PDF )
Separating Two-Round Secure Computation from Oblivious Transfer
Benny Applebaum and Zvika Brakerski and Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan
2020/115 ( PDF )
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
Xavier Boyen and Thomas Haines and Johannes Mueller
2020/114 ( PDF )
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
Antoine Delignat-Lavaud and Cédric Fournet and Bryan Parno and Jonathan Protzenko and Tahina Ramananandro and Jay Bosamiya and Joseph Lallemand and Itsaka Rakotonirina and Yi Zhou
2020/113 ( PDF )
New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve
Madhurima Mukhopadhyay and Palash Sarkar and Shashank Singh and Emmanuel Thome
2020/112 ( PDF )
A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography
Patrick Karl and Michael Tempelmeier
2020/111 ( PDF )
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2020/110 ( PDF )
Blazing Fast OT for Three-Round UC OT Extension
Ran Canetti and Pratik Sarkar and Xiao Wang
2020/109 ( PDF )
Fixing the Achilles Heel of E-Voting: The Bulletin Board
Lucca Hirschi and Lara Schmid and David Basin
2020/108 ( PDF )
Practical Forgeries for ORANGE
Christoph Dobraunig and Florian Mendel and Bart Mennink
2020/107 ( PDF )
One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication
Ryan Amos and Marios Georgiou and Aggelos Kiayias and Mark Zhandry
2020/106 ( PDF )
Relaxed freshness in component authentication
Frank Schuhmacher
2020/105 ( PDF )
MCU intrinsic group features for component authentication
Frank Schuhmacher
2020/104 ( PDF )
On the Security Goals of White-Box Cryptography
Estuardo Alpirez Bock and Alessandro Amadori and Chris Brzuska and Wil Michiels
2020/103 ( PDF )
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128
Boxin Zhao and Xiaoyang Dong and Keting Jia and Willi Meier
2020/102 ( PDF )
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
Boxin Zhao and Xiaoyang Dong and Keting Jia
2020/101 ( PDF )
A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future
Haibat Khan and Keith M. Martin
2020/100 ( PDF )
A direct proof of APN-ness of the Kasami functions
Claude Carlet and Kwang Ho Kim and Sihem Mesnager
2020/099 ( PDF )
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange
Benjamin Dowling and Torben Brandt Hansen and Kenneth G. Paterson
2020/098 ( PDF )
Improved key recovery on the Legendre PRF
Novak Kaluderovic; and Thorsten Kleinjung and Dusan Kostic;
2020/097 ( PDF )
Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard
Stanislav S. Malakhov
2020/096 ( PDF )
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons
David Galindo and Jia Liu and Mihai Ordean and Jin-Mann Wong
2020/095 ( PDF )
SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors
Zhongxiang Zheng and Anyu Wang and Haining Fan and Chunhuan Zhao and Chao Liu and Xue Zhang
2020/094 ( PDF )
On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms
Michael Davidson and Tyler Diamond
2020/093 ( PDF )
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
Romain Gay
2020/092 ( PDF )
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees
Daniel Jost and Ueli Maurer
2020/091 ( PDF )
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption
Jonathan Takeshita and Matthew Schoenbauer and Ryan Karl and Taeho Jung
2020/090 ( PDF )
Witness Maps and Applications
Suvradip Chakraborty and Manoj Prabhakaran and Daniel Wichs
2020/089 ( PDF )
The MILP-Aided Conditional Differential Attack and Its Application to Trivium
Chen-Dong Ye and Tian Tian and Fan-Yang Zeng
2020/088 ( PDF )
Streamlet: Textbook Streamlined Blockchains
Benjamin Y Chan and Elaine Shi
2020/087 ( PDF )
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey)
Elaine Shi
2020/086 ( PDF )
Bootstrapping in FHEW-like Cryptosystems
Daniele Micciancio and Yuriy Polyakov
2020/085 ( PDF )
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems
Ben Nassi and Dudi Nassi and Raz Ben-Netanel and Yisroel Mirsky and Oleg Drokin and Yuval Elovici
2020/084 ( PDF )
Bandwidth-efficient threshold EC-DSA
Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
2020/083 ( PDF )
Metal: A Metadata-Hiding File-Sharing System
Weikeng Chen and Raluca Ada Popa
2020/082 ( PDF )
Random Walks and Concurrent Zero-Knowledge
Anand Aiyer and Xiao Liang and Nilu Nalini and Omkant Pandey
2020/081 ( PDF )
Efficient polynomial commitment schemes for multiple points and polynomials
Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon
2020/080 ( PDF )
Better Secret-Sharing via Robust Conditional Disclosure of Secrets
Benny Applebaum and Amos Beimel and Oded Nir and Naty Peter
2020/079 ( PDF )
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective
Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
2020/078 ( PDF )
Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo
Kentaro Tamura and Yutaka Shikano
2020/077 ( PDF )
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms
Thomas Häner and Samuel Jaques and Michael Naehrig and Martin Roetteler and Mathias Soeken
2020/076 ( PDF )
Wyner-Ziv reconciliation for key exchange based on Ring-LWE
Charbel Saliba and Laura Luzzi and Cong Ling
2020/075 ( PDF )
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms
Rishiraj Bhattacharyya
2020/074 ( PDF )
Rolling up sleeves when subversion's in a field?
Daniel R. L. Brown
2020/073 ( PDF )
Anonymous Symmetric-Key Communication
Fabio Banfi and Ueli Maurer
2020/072 ( PDF )
Anonymous Tokens with Private Metadata Bit
Ben Kreuter and Tancrede Lepoint and Michele Orru and Mariana Raykova
2020/071 ( PDF )
Post-Quantum Authentication in TLS 1.3: A Performance Study
Dimitrios Sikeridis and Panos Kampanakis and Michael Devetsikiotis
2020/070 ( PDF )
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
Thomas Agrikola and Dennis Hofheinz and Julia Kastner
2020/069 ( PDF )
RSA and redactable blockchains
Dima Grigoriev and Vladimir Shpilrain
2020/068 ( PDF )
Further Clarification on Mantin's Digraph Repetition Bias in RC4
Pranab Chakraborty and Subhamoy Maitra
2020/067 ( PDF )
Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse
Taylor R Campbell
2020/066 ( PDF )
Talek: Private Group Messaging with Hidden Access Patterns
Raymond Cheng and William Scott and Elisaweta Masserova and Irene Zhang and Vipul Goyal and Thomas Anderson and Arvind Krishnamurthy and Bryan Parno
2020/065 ( PDF )
A Performant, Misuse-Resistant API for Primality Testing
Jake Massimo and Kenneth G. Paterson
2020/064 ( PDF )
Dual System in Lattice: Fully Secure ABE from LWE Assumption
Geng Wang and Ming Wan and Zhen Liu and Dawu Gu
2020/063 ( PDF )
Attack on LAC Key Exchange in Misuse Situation
Aurelien Greuet and Simon Montoya and Guenael Renault
2020/062 ( PDF )
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
Behzad Abdolmaleki and Sebastian Ramacher and Daniel Slamanig
2020/061 ( PDF )
Simple Schnorr Signature with Pedersen Commitment as Key
Gary Yu
2020/060 ( PDF )
Auditable Asymmetric Password Authenticated Public Key Establishment
Antonio Faonio and Maria Isabel Gonzalez Vasco and Claudio Soriente and Hien Thi Thu Truong
2020/059 ( PDF )
ARX-KW, a family of key wrapping constructions using SipHash and ChaCha
Satō Shinichi
2020/058 ( PDF )
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis
Guilherme Perin and Ileana Buhan and Stjepan Picek
2020/057 ( PDF )
On the smoothing parameter and last minimum of random orthogonal lattices
Elena Kirshanova and Huyen Nguyen and Damien Stehlé and Alexandre Wallet
2020/056 ( PDF )
AKCN-E8: Compact and Flexible KEM from Ideal Lattice
Zhengzhong JIn and Yunlei Zhao
2020/055 ( PDF )
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
Alejandro Cabrera Aldaya and Billy Bob Brumley
2020/054 ( PDF )
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA
Wen Wang and Shanquan Tian and Bernhard Jungk and Nina Bindel and Patrick Longa and Jakub Szefer
2020/053 ( PDF )
Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems"
Yasuhiko Ikematsu and Shuhei Nakamura
2020/052 ( PDF )
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
Mohamed Tolba and Muhammad ElSheikh and Amr M. Youssef
2020/051 ( PDF )
Low-Latency Hardware Masking with Application to AES
Pascal Sasdrich and Begül Bilgin and Michael Hutter and Mark Marson
2020/050 ( PDF )
Delphi: A Cryptographic Inference Service for Neural Networks
Pratyush Mishra and Ryan Lehmkuhl and Akshayaram Srinivasan and Wenting Zheng and Raluca Ada Popa
2020/049 ( PDF )
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Erdem Alkim and Hülya Evkan and Norman Lahr and Ruben Niederhagen and Richard Petri
2020/048 ( PDF )
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage
Changshe Ma and Yiping Gu and Hongfei Li
2020/047 ( PDF )
New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version)
Tianshuo Cong and Ximing Fu and Xuting Zhou and Yuli Zou and Haining Fan
2020/046 ( PDF )
On Analysis of Lightweight Stream Ciphers with Keyed Update
Orhun Kara and Muhammed F. Esgin
2020/045 ( PDF )
Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6
Haibat Khan and Benjamin Dowling and Keith M. Martin
2020/044 ( PDF )
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts
Alexander Chepurnoy and Amitabh Saxena
2020/043 ( PDF )
Zone Encryption with Anonymous Authentication for V2V Communication
Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa
2020/042 ( PDF )
BLAZE: Blazing Fast Privacy-Preserving Machine Learning
Arpita Patra and Ajith Suresh
2020/041 ( PDF )
Consistency in Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders
Aggelos Kiayias and Saad Quader and Alexander Russell
2020/040 ( PDF )
A Compact and Scalable Hardware/Software Co-design of SIKE
Pedro Maat C. Massolino and Patrick Longa and Joost Renes and Lejla Batina
2020/039 ( PDF )
Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis
Damien Robissout and Gabriel Zaid and Brice Colombier and Lilian Bossuet and Amaury Habrard
2020/038 ( PDF )
Bitstream Modification Attack on SNOW 3G
Michail Moraitis and Elena Dubrova
2020/037 ( PDF )
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput
Matthias Fitzi and Peter Gaži and Aggelos Kiayias and Alexander Russell
2020/036 ( PDF )
Analysis on Aigis-Enc: asymmetrical and symmetrical
Yupu Hu and Siyue Dong and Xingting Dong
2020/035 ( PDF )
Constant-round Dynamic Group Key Exchange from RLWE Assumption
Rakyong Choi and Dongyeon Hong and Kwangjo Kim
2020/034 ( PDF )
SkyEye: A Traceable Scheme for Blockchain
Tianjun Ma and Haixia Xu and Peili Li
2020/033 ( PDF )
Scalable Open-Vote Network on Ethereum
Mohamed Seifelnasr and Hisham S. Galal and Amr M. Youssef
2020/032 ( PDF )
A New Approach for the Implementation of Binary Matrices Using SLP Applications
Mahdi Sajadieh and Mohsen Mousavi
2020/031 ( PDF )
Locally Decodable Codes with Randomized Encoding
Kuan Cheng and Xin Li and Yu Zheng
2020/030 ( PDF )
Κ-Cipher: A Low Latency, Bit Length Parameterizable Cipher
Michael Kounavis and Sergej Deutsch and Santosh Ghosh and David Durham
2020/029 ( PDF )
Differentially-Private Multi-Party Sketching for Large-Scale Statistics
Seung Geol Choi and Dana Dachman-Soled and Mukul Kulkarni and Arkady Yerukhimovich
2020/028 ( PDF )
Verified Security of BLT Signature Scheme
Denis Firsov and Ahto Buldas and Ahto Truu and Risto Laanoja
2020/027 ( PDF )
On Roots Factorization for PQC Algorithms
Alexander Maximov
2020/026 ( PDF )
Post-Quantum Secure Architectures for Automotive Hardware Secure Modules
Wen Wang and Marc Stöttinger
2020/025 ( PDF )
Single Secret Leader Election
Dan Boneh and Saba Eskandarian and Lucjan Hanzlik and Nicola Greco
2020/024 ( PDF )
The Arwen Trading Protocols (Full Version)
Ethan Heilman and Sebastien Lipmann and Sharon Goldberg
2020/023 ( PDF )
Threshold Multi-Signature with an Offline Recovery Party
Riccardo Longo and Alessio Meneghetti and Massimiliano Sala
2020/022 ( PDF )
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material)
Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson
2020/021 ( PDF )
eSIDH: the revenge of the SIDH
Daniel Cervantes-Vázquez and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez
2020/020 ( PDF )
Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes
Shangqi Lai and Xingliang Yuan and Shi-Feng Sun and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Dongxi Liu
2020/019 ( PDF )
Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains
Suhyeon Lee and Seungjoo Kim
2020/018 ( PDF )
Triptych: logarithmic-sized linkable ring signatures with applications
Sarang Noether and Brandon Goodell
2020/017 ( PDF )
Biometric-Authenticated Searchable Encryption
Daniel Gardham and Mark Manulis and Constantin Cătălin Drăgan
2020/016 ( PDF )
Short Threshold Dynamic Group Signatures
Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa
2020/015 ( PDF )
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts
Hao Chen and Wei Dai and Miran Kim and Yongsoo Song
2020/014 ( PDF )
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
Gaëtan Leurent and Thomas Peyrin
2020/013 ( PDF )
On the Cryptographic Hardness of Local Search
Nir Bitansky and Idan Gerichter
2020/012 ( PDF )
Cortex-M4 Optimizations for \{R,M\}LWE Schemes
Erdem Alkim and Yusuf Alper Bilgin and Murat Cenk and François Gérard
2020/011 ( PDF )
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain
Ming Li,Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo
2020/010 ( PDF )
Double point compression for elliptic curves of $j$-invariant $0$
Dmitrii Koshelev
2020/009 ( PDF )
Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions
Thomas Pornin
2020/008 ( PDF )
Secret Sharing Schemes for Ports of Matroids of Rank 3
Oriol Farràs
2020/007 ( PDF )
On Lattice-Based Interactive Protocols with Aborts
Nabil Alkeilani Alkadri and Rachid El Bansarkhani and Johannes Buchmann
2020/006 ( PDF )
Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures
André Chailloux and Thomas Debris-Alazard
2020/005 ( PDF )
Lai-Massey Scheme Revisited
M. R. Mirzaee Shamsabad and S. M. Dehnavi
2020/004 ( PDF )
BPCEX: Towards Blockchain-based Privacy-preserving Currency Exchange
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2020/003 ( PDF )
New Constructions of Traceable Range Proofs: Towards Multiple Regulation and Joint Regulation
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2020/002 ( PDF )
On a Conjecture of O'Donnell
Qichun Wang
2020/001 ( PDF )
Elliptic Curves of Nearly Prime Order
Manoj Gyawali and Daniele Di Tullio

[ Cryptology ePrint archive ]