Cryptology ePrint Archive: Listing for 2022


2022/070 ( PDF )
(Nondeterministic) Hardness vs. Non-Malleability
Marshall Ball and Dana Dachman-Soled and Julian Loss
2022/069 ( PDF )
Small-Box Cryptography
Yevgeniy Dodis and Harish Karthikeyan and Daniel Wichs
2022/068 ( PDF )
Updatable Public Key Encryption in the Standard Model
Yevgeniy Dodis and Harish Karthikeyan and Daniel Wichs
2022/067 ( PDF )
Parallel Operations over TFHE-Encrypted Multi-Digit Integers
Jakub Klemsa and Melek Önen
2022/066 ( PDF )
A remark on the Discrete Fourier Transform statistical test
Anghel Florin and Asandoaiei David and Tabacaru Robert
2022/065 ( PDF )
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS
Nimrod Aviram and Benjamin Dowling and Ilan Komargodski and Kenneth G. Paterson and Eyal Ronen and Eylon Yogev
2022/064 ( PDF )
A Framework for the Design of Secure and Efficient Proofs of Retrievability
Françoise Levy-dit-Vehel and Maxime Roméas
2022/063 ( PDF )
Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers
Kang Yang and Xiao Wang
2022/062 ( PDF )
An Introduction to Secret-Sharing-Based Secure Multiparty Computation
Daniel Escudero
2022/061 ( PDF )
A remark on the NIST 800-22 Binary Matrix Rank Test
Nicu Neculache and Vlad-Andrei Petcu and Emil Simion
2022/060 ( PDF )
Quantum Boomerang Attacks and Some Applications
Paul Frixons and María Naya-Plasencia and André Schrottenloher
2022/059 ( PDF )
SPHINCS-$\alpha$: A Compact Stateless Hash-Based Signature Scheme
Kaiyi Zhang and Hongrui Cui and Yu Yu
2022/058 ( PDF )
First-Order Masked Kyber on ARM Cortex-M4
Daniel Heinz and Matthias J. Kannwischer and Georg Land and Thomas Pöppelmann and Peter Schwabe and Daan Sprenkels
2022/057 ( PDF )
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon
Morgane Guerreau and Ange Martinelli and Thomas Ricosset and Mélissa Rossi
2022/056 ( PDF )
LedgerHedger: Gas Reservation for Smart-Contract Security
Itay Tsabary and Alex Manuskin and Ittay Eyal
2022/055 ( PDF )
Summation rather than Concatenation: a more efficient MKFHE scheme in the plain model
Xiaokang Dai and Wenyuan Wu and Yong Feng
2022/054 ( PDF )
SIKE Channels
Luca De Feo and Nadia El Mrabet and Aymeric Genêt and Novak Kaluđerović and Natacha Linard de Guertechin and Simon Pontié and Élise Tasso
2022/053 ( PDF )
Brute Force Cryptanalysis
Aron Gohr
2022/052 ( PDF )
Balanced Quadratic Reliable Broadcast and Improved Asynchronous Verifiable Information Dispersal
Sourav Das and Zhuolun Xiang and Ling Ren
2022/051 ( PDF )
Titanium: A Metadata-Hiding File-Sharing System with Malicious Security
Weikeng Chen and Thang Hoang and Jorge Guajardo and Attila A. Yavuz
2022/050 ( PDF )
High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA
Asep Muhamad Awaludin and Harashta Tatimma Larasati and Howon Kim
2022/049 ( PDF )
Small MACs from Small Permutations
Maria Eichlseder and Ahmet Can Mert and Christian Rechberger and Markus Schofnegger
2022/048 ( PDF )
RSA, DH, and DSA in the Wild
Nadia Heninger
2022/047 ( PDF )
Short Pairing-Free Blind Signatures with Exponential Security
Stefano Tessaro and Chenzhi Zhu
2022/046 ( PDF )
Membership Privacy for Asynchronous Group Messaging
Keita Emura and Kaisei Kajita and Ryo Nojima and Kazuto Ogawa and Go Ohtake
2022/045 ( PDF )
Probing Security through Input-Output Separation and Revisited Quasilinear Masking
Dahmun Goudarzi and Thomas Prest and Matthieu Rivain and Damien Vergnaud
2022/044 ( PDF )
Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes
Atakan Arslan and Muhammed Ali Bingöl
2022/043 ( PDF )
Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges
Konstantinos Chalkias and Panagiotis Chatzigiannis and Yan Ji
2022/042 ( PDF )
Inapplicability of Differential Fault Attacks against Cellular Automata based Lightweight Authenticated Cipher
AMBILI K N and JIMMY JOSE
2022/041 ( PDF )
Reinforcing Lightweight Authenticated Encryption Schemes against Statistical Ineffective Fault Attack
AMBILI K N and JIMMY JOSE
2022/040 ( PDF )
Ensuring Accountability and Outsourced Decryption in IoT Systems using Ciphertext-Policy Attribute-Based Encryption
AMBILI K N and JIMMY JOSE
2022/039 ( PDF )
Outsourced CP-ABE with Whitebox Accountability in IoT Systems
AMBILI K N and JIMMY JOSE
2022/038 ( PDF )
ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption
Antonio de la Piedra and Marloes Venema and Greg Alpár
2022/037 ( PDF )
Subgroup membership testing on elliptic curves via the Tate pairing
Dmitrii Koshelev
2022/036 ( PDF )
Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber
Melissa Azouaoui and Olivier Bronchain and Clément Hoffmann and Yulia Kuzovkova and Tobias Schneider and François-Xavier Standaert
2022/035 ( PDF )
Time-Traveling Simulators Using Blockchains and Their Applications
Vipul Goyal and Justin Raizes and Pratik Soni
2022/034 ( PDF )
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic
Varun Madathil and Chris Orsini and Alessandra Scafuro and Daniele Venturi
2022/033 ( PDF )
Deletion-Compliance in the Absence of Privacy
Jonathan Godin and Philippe Lamontagne
2022/032 ( PDF )
Formal Analysis of Non-Malleability for Commitments in EasyCrypt
Denis Firsov and Sven Laur and Ekaterina Zhuchko
2022/031 ( PDF )
BAT: Small and Fast KEM over NTRU Lattices
Pierre-Alain Fouque and Paul Kirchner and Thomas Pornin and Yang Yu
2022/030 ( PDF )
Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK
Jinyu Lu and Guoqiang Liu and Yunwen Liu and Bing Sun and Chao Li and Li Liu
2022/029 ( PDF )
CRYScanner: Finding cryptographic libraries misuse
Amit Choudhari and Sylvain Guilley and Khaled Karray
2022/028 ( PDF )
Locality-Preserving Hashing for Shifts with Connections to Cryptography
Elette Boyle and Itai Dinur and Niv Gilboa and Yuval Ishai and Nathan Keller and Ohad Klein
2022/027 ( PDF )
Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice
Bingyong Guo and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang
2022/026 ( PDF )
Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective
Andrada-Teodora Ciulei and Marian-Codrin Crețu and Emil Simion
2022/025 ( PDF )
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos
Mostafizar Rahman and Dhiman Saha and Goutam Paul
2022/024 ( PDF )
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation
Jean-Philippe Bossuat and Juan Ramón Troncoso-Pastoriza and Jean-Pierre Hubaux
2022/023 ( PDF )
Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits
Nicolai Müller and David Knichel and Pascal Sasdrich and Amir Moradi
2022/022 ( PDF )
Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation
Xiuju Huang and Jiashuo Song and Zichen Li
2022/021 ( PDF )
WaterBear: Information-Theoretic Asynchronous BFT Made Practical
Sisi Duan and Haibin Zhang and Boxin Zhao
2022/020 ( PDF )
PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement
Sisi Duan and Haibin Zhang
2022/019 ( PDF )
Algebraic Meet-in-the-Middle Attack on LowMC
Fukang Liu and Gaoli Wang and Willi Meier and Santanu Sarkar and Takanori Isobe
2022/018 ( PDF )
Pairing-based Accountable Subgroup Multi-signatures with Verifiable Group Setup
Ahmet Ramazan Ağırtaş and Oğuz Yayla
2022/017 ( PDF )
Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation
Shingo Sato and Keita Emura and Atsushi Takayasu
2022/016 ( PDF )
An algebraic attack to the Bluetooth stream cipher E0
Roberto La Scala and Sergio Polese and Sharwan K. Tiwari and Andrea Visconti
2022/015 ( PDF )
Lattice-based Signatures with Tight Adaptive Corruptions and More
Jiaxin Pan and Benedikt Wagner
2022/014 ( PDF )
Transformer encoder-based Crypto-Ransomware Detection for Low-Power Embedded Processors
Hyunji Kim and Sejin Lim and Yeajun Kang and Wonwoong Kim and Hwajeong Seo
2022/013 ( PDF )
Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak
Runsong Wang and Xuelian Li and Juntao Gao and Hui Li and Baocang Wang
2022/012 ( PDF )
Security of Identity-based Encryption Schemes from Quadratic Residues
Ferucio Laurentiu Tiplea and Sorin Iftene and George Teseleanu and Anca-Maria Nica
2022/011 ( PDF )
Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance
Alfredo Rial and Ania M. Piotrowska
2022/010 ( PDF )
Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks
Christian Matt and Jesper Buus Nielsen and Søren Eller Thomsen
2022/009 ( PDF )
Algebraic Reductions of Knowledge
Abhiram Kothapalli and Bryan Parno
2022/008 ( PDF )
Beating Classical Impossibility of Position Verification
Jiahui Liu and Qipeng Liu and Luowen Qian
2022/007 ( PDF )
PI-Cut-Choo! Parallel Instance Cut and Choose for Practical Blind Signatures
Benedikt Wagner and Lucjan Hanzlik and Julian Loss
2022/006 ( PDF )
Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures
Vadim Lyubashevsky and Ngoc Khanh Nguyen and Maxime Plancon
2022/005 ( PDF )
Pseudorandom Bit Generation with Asymmetric Numeral Systems
Josef Pieprzyk and Marcin Pawlowski and Pawel Morawiecki and Arash Mahboubi and Jarek Duda and Seyit Camtepe
2022/004 ( PDF )
Publicly verifiable anonymous tokens with private metadata bit
Fabrice Benhamouda and Tancrède Lepoint and Michele Orrù and Mariana Raykova
2022/003 ( PDF )
Compact Cut-and-Choose: Boosting the Security of Blind Signature Schemes, Compactly
Rutchathon Chairattana-Apirom and Anna Lysyanskaya
2022/002 ( PDF )
Polynomial-Time Key Recovery Attack on the Lau-Tan Cryptosystem Based on Gabidulin Codes
Wenshuo Guo and Fang-Wei Fu
2022/001 ( PDF )
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu


[ Cryptology ePrint archive ]