Cryptology ePrint Archive: Listing for 2019

2019/487 ( PDF )
From Single-Input to Multi-Client Inner-Product Functional Encryption
Michel Abdalla and Fabrice Benhamouda and Romain Gay
2019/486 ( PDF )
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment
Suhyeon Lee and Seungjoo Kim
2019/485 ( PDF )
A taxonomy of pairings, their security, their complexity
Razvan Barbulescu and Nadia El Mrabet and Loubna Ghammam
2019/484 ( PDF )
New Number-Theoretic Cryptographic Primitives
Eric Brier and Houda Ferradi and Marc Joye and David Naccache
2019/483 ( PDF )
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations
Pierrick Méaux and Claude Carlet and Anthony Journault and François-Xavier Standaert
2019/482 ( PDF )
Tiny WireGuard Tweak
Jacob Appelbaum and Chloe Martindale and Peter Wu
2019/481 ( PDF )
An Efficient and Compact Reformulation of NIST Collision Estimate Test
Prasanna Raghaw Mishra and Bhartendu Nandan and Navneet Gaba
2019/480 ( PDF )
On the Efficiency of Privacy-Preserving Smart Contract Systems
Karim Baghery
2019/479 ( PDF )
Extended 3-Party ACCE and Application to LoRaWAN 1.1
Sébastien Canard and Loďc Ferreira
2019/478 ( PDF )
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
Sarah McCarthy and James Howe and Neil Smyth and Seamus Brannigan and Máire O’Neill
2019/477 ( PDF )
Revisiting Post-Compromise Security Guarantees in Group Messaging
Cas Cremers and Britta Hale and Konrad Kohbrok
2019/476 ( PDF )
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T
Muhammad ElSheikh and Ahmed Abdelkhalek and Amr M. Youssef
2019/475 ( PDF )
Dual-Mode NIZKs from Obfuscation
Dennis Hofheinz and Bogdan Ursu
2019/473 ( PDF )
A Method to Reduce the Key Size of UOV Signature Scheme
Chengdong Tao
2019/472 ( PDF )
Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM)
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2019/471 ( PDF )
UC-Secure CRS Generation for SNARKs
Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michal Zajac
2019/470 ( PDF )
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals
Niek J. Bouman and Niels de Vreede
2019/469 ( PDF )
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks
Rui Qiao and Qinglong Wang* and Zongtao Duan and Na Fan
2019/468 ( PDF )
The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem
Alessandro Budroni and Andrea Tenti
2019/467 ( PDF )
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version)
Clément Massart and François-Xavier Standaert
2019/466 ( -- withdrawn -- )
Privacy-Preserving K-means Clustering with Multiple Data Owners
Jung Hee Cheon and Jinhyuck Jeong and Dohyeong Ki and Jiseung Kim and Joohee Lee and Seok Won Lee
2019/465 ( PDF )
Towards a Practical Clustering Analysis over Encrypted Data
Jung Hee Cheon and Duhyeong Kim and Jai Hyun Park
2019/464 ( PDF )
The complexity of MinRank
Alessio Caminata and Elisa Gorla
2019/463 ( PDF )
In Pursuit of Clarity In Obfuscation
Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi
2019/462 ( PDF )
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11
Alexander Dax and Robert Künnemann and Sven Tangermann and Michael Backes
2019/461 ( PDF )
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks
Xiaolu Hou and Jakub Breier and Dirmanto Jap and Lei Ma and Shivam Bhasin and Yang Liu
2019/460 ( PDF )
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Jan Camenisch and Manu Drijvers and Petr Dzurenda and Jan Hajny
2019/459 ( PDF )
From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1
Gaëtan Leurent and Thomas Peyrin
2019/458 ( PDF )
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems
Lorenzo Grassi and Daniel Kales and Dmitry Khovratovich and Arnab Roy and Christian Rechberger and Markus Schofnegger
2019/457 ( PDF )
Forgery Attack on mixFeed in the Nonce-Misuse Scenario
Mustafa Khairallah
2019/456 ( PDF )
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
Peifang Ni and Hongda Li and Xianning Meng and Dongxue Pan
2019/455 ( PDF )
FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol
Joăo Otávio Massari Chervinski and Diego Kreutz and Jiangshan Yu
2019/454 ( PDF )
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks
Ryan Karl and Timothy Burchfield and Jonathan Takeshita and Taeho Jung
2019/453 ( PDF )
A New Approach to Modelling Centralised Reputation Systems
Lydia Garms and Elizabeth A. Quaglia
2019/452 ( PDF )
A Central Limit Framework for Ring-LWE Decryption
Sean Murphy and Rachel Player
2019/451 ( PDF )
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Francesco Berti and Olivier Pereira and François-Xavier Standaert
2019/450 ( PDF )
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data
Chenglu Jin and Zheng Yang and Sridhar Adepu and Jianying Zhou
2019/449 ( PDF )
Limits to Non-Malleability
Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Tal Malkin
2019/448 ( PDF )
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl
2019/447 ( PDF )
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak
Haibo Zhou and Zheng Li and Xiaoyang Dong and Keting Jia and Willi Meier
2019/446 ( PDF )
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Sanjit Chatterjee and Shravan Kumar Parshuram Puria and Akash Shah
2019/445 ( PDF )
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications
Muhammed F. Esgin and Ron Steinfeld and Joseph K. Liu and Dongxi Liu
2019/444 ( PDF )
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
Gildas Avoine and Sébastien Canard and Loďc Ferreira
2019/443 ( PDF )
Contingent payments on a public ledger: models and reductions for automated verification
Sergiu Bursuc and Steve Kremer
2019/442 ( PDF )
K2SN-MSS: An Efficient Post-Quantum Signature (Full Version)
Sabyasachi Karati and Reihaneh Safavi-Naini
2019/441 ( PDF )
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
2019/440 ( PDF )
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
Avik Chakraborti and Nilanjan Datta and Ashwin Jha and Cuauhtemoc Mancillas Lopez and Mridul Nandi and Yu Sasaki
2019/439 ( PDF )
A Comprehensive Study of Deep Learning for Side-Channel Analysis
Loďc Masure and Cécile Dumas and Emmanuel Prouff
2019/438 ( PDF )
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data
Jan Camenisch and Angelo De Caro and Esha Ghosh and Alessandro Sorniotti
2019/437 ( PDF )
Efficient coding for secure computing with additively-homomorphic encrypted data
Thijs Veugen
2019/436 ( PDF )
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
Benjamin Dowling and Paul Rösler and Jörg Schwenk
2019/435 ( PDF )
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
Yue Qin and Chi Cheng and Jintai Ding
2019/434 ( PDF )
Masking Fuzzy-Searchable Public Databases
Alexandra Boldyreva and Tianxin Tang and Bogdan Warinschi
2019/433 ( PDF )
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
Shan Chen and Samuel Jero and Matthew Jagielski and Alexandra Boldyreva and Cristina Nita-Rotaru
2019/432 ( PDF )
Cryptanalysis of a System Based on Twisted Reed–Solomon Codes
Julien Lavauzelle and Julian Renner
2019/431 ( PDF )
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation
Aurore Guillevic and Simon Masson and Emmanuel Thomé
2019/430 ( PDF )
Composition of Boolean Functions: An Application to the Secondary Constructions of Bent Functions
Guangpu Gao and Dongdai Lin and Wenfen Liu and Yongjuan Wang
2019/429 ( PDF )
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Harsh Chaudhari and Ashish Choudhury and Arpita Patra and Ajith Suresh
2019/428 ( PDF )
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability
Jan Czajkowski and Christian Majenz and Christian Schaffner and Sebastian Zur
2019/427 ( PDF )
Improved Secure Integer Comparison via Homomorphic Encryption
Florian Bourse and Olivier Sanders and Jacques Traoré
2019/426 ( PDF )
Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution)
Abdelrahaman Aly and Tomer Ashur and Eli Ben-Sasson and Siemen Dhooghe and Alan Szepieniec
2019/425 ( PDF )
Homomorphic Training of 30,000 Logistic Regression Models
Flavio Bergamaschi and Shai Halevi and Tzipora T. Halevi and Hamish Hunt
2019/424 ( -- withdrawn -- )
Preimage Security of KNOT-Hash
Raghvendra Rohit
2019/423 ( PDF )
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name
Peter T. Breuer
2019/422 ( PDF )
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound
Alexander Moch and Eik List
2019/421 ( PDF )
Continuing to reflect on TLS 1.3 with external PSK
Liliya Akhmetzyanova and Evgeny Alekseev and Ekaterina Smyshlyaeva and Alexandr Sokolov
2019/420 ( PDF )
Improving Speed of Dilithium’s Signing Procedure
Prasanna Ravi and Sourav Sen Gupta and Anupam Chattopadhyay and Shivam Bhasin
2019/419 ( PDF )
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
Martin R. Albrecht and Carlos Cid and Lorenzo Grassi and Dmitry Khovratovich and Reinhard Lüftenegger and Christian Rechberger and Markus Schofnegger
2019/418 ( PDF )
Sharing of Encrypted files in Blockchain Made Simpler
S. Sharmila Deva Selvi and Arinjita Paul and Siva Dirisala and Saswata Basu and C. Pandu Rangan
2019/417 ( PDF )
Numerical Methods for Comparison on Homomorphically Encrypted Numbers
Jung Hee Cheon and Dongwoo Kim and Duhyeong Kim and Hun Hee Lee and Keewoo Lee
2019/416 ( PDF )
How many transactions per second can bitcoin really handle ? Theoretically.
Evangelos Georgiadis
2019/415 ( PDF )
Refinement and Verification of CBC Casper
Ryuya Nakamura and Takayuki Jimba and Dominik Harz
2019/414 ( PDF )
Two-Round Oblivious Transfer from CDH or LPN
Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny and Daniel Wichs
2019/413 ( PDF )
On the Streaming Indistinguishability of a Random Permutation and a Random Function
Itai Dinur
2019/412 ( PDF )
On the complexity of the Permuted Kernel Problem
Eliane KOUSSA and Gilles MACARIO-RAT and Jacques PATARIN
2019/411 ( PDF )
Exploring the Monero Peer-to-Peer Network
Tong Cao and Jiangshan Yu and Jérémie Decouchant and Xiapu Luo and Paulo Verissimo
2019/410 ( PDF )
Policy-Based Sanitizable Signatures
Kai Samelin and Daniel Slamanig
2019/409 ( PDF )
Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes
Houda Ferradi and Keita Xagawa
2019/408 ( PDF )
Forgery Attack on SNEIKEN
Mustafa Khairallah
2019/407 ( PDF )
Privacy-Preserving Network Path Validation
Binanda Sengupta and Yingjiu Li and Kai Bu and Robert H. Deng
2019/406 ( PDF )
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
David Derler and Kai Samelin and Daniel Slamanig and Christoph Striecks
2019/405 ( PDF )
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware
Jo Vliegen and Md Masoom Rabbani and Mauro Conti and Nele Mentens
2019/404 ( PDF )
Efficient Message Authentication Codes with Combinatorial Group Testing
Kazuhiko Minematsu
2019/403 ( PDF )
Fast and simple constant-time hashing to the BLS12-381 elliptic curve
Riad S. Wahby and Dan Boneh
2019/402 ( PDF )
ILC: A Calculus for Composable, Computational Cryptography
Kevin Liao and Matthew A. Hammer and Andrew Miller
2019/401 ( PDF )
Side-Channel assessment of Open Source Hardware Wallets
Manuel San Pedro and Victor Servant and Charles Guillemet
2019/400 ( PDF )
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
Akira Takahashi and Mehdi Tibouchi
2019/399 ( PDF )
Inception makes non-malleable codes shorter as well!
Divesh Aggarwal and Maciej Obremski
2019/398 ( PDF )
Constant-Round Group Key Exchange from the Ring-LWE Assumption
Daniel Apon and Dana Dachman-Soled and Huijing Gong and Jonathan Katz
2019/397 ( PDF )
Feistel Structures for MPC, and More
Martin R. Albrecht and Lorenzo Grassi and Léo Perrin and Sebastian Ramacher and Christian Rechberger and Dragos Rotaru and Arnab Roy and Markus Schofnegger
2019/396 ( PDF )
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Evangelia Anna Markatou and Roberto Tamassia
2019/395 ( PDF )
Full Database Reconstruction with Access and Search Pattern Leakage
Evangelia Anna Markatou and Roberto Tamassia
2019/394 ( PDF )
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation
Vincent Migliore and Benoı̂t Gérard and Mehdi Tibouchi and Pierre-Alain Fouque
2019/393 ( PDF )
A Tight Parallel-Repetition Theorem for Random-Terminating Interactive Arguments
Itay Berman and Iftach Haitner and Eliad Tsfadia
2019/392 ( PDF )
New Conditional Cube Attack on Keccak Keyed Modes
Zheng Li and Xiaoyang Dong and Wenquan Bi and Keting Jia and Xiaoyun Wang and Willi Meier
2019/391 ( PDF )
Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense
Biswabandan Panda
2019/390 ( PDF )
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures
Michael Specter and Sunoo Park and Matthew Green
2019/389 ( PDF )
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Sauvik Bhattacharya and Oscar Garcia-Morchon and Rachel Player and Ludo Tolhuizen
2019/388 ( PDF )
Towards Secret-Free Security
Ulrich Rührmair
2019/387 ( PDF )
SoK : On DFA Vulnerabilities of Substitution-Permutation Networks
Mustafa Khairallah and Xiaolu Hou and Zakaria Najm and Jakub Breier and Shivam Bhasin and Thomas Peyrin
2019/386 ( PDF )
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation
Ryo Kikuchi and Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ai Ishida and Takahiro Matsuda and Yusuke Sakai and Jacob C. N. Schuldt
2019/385 ( PDF )
Miller Inversion is Easy for the Reduced Tate Pairing on Trace Zero Supersingular Curves
Takakazu Satoh
2019/384 ( PDF )
What Storage Access Privacy is Achievable with Small Overhead?
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2019/383 ( PDF )
Dragonblood: A Security Analysis of WPA3's SAE Handshake
Mathy Vanhoef and Eyal Ronen
2019/382 ( PDF )
Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length
Daniel Gardham and Mark Manulis
2019/381 ( PDF )
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Chen-Dong Ye and Tian Tian
2019/380 ( PDF )
A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit
Kazumasa Shinagawa and Koji Nuida
2019/379 ( PDF )
Non-Malleable Codes for Decision Trees
Marshall Ball and Siyao Guo and Daniel Wichs
2019/378 ( PDF )
pRate: Anonymous Star Rating with Rating Secrecy
Jia Liu and Mark Manulis
2019/377 ( PDF )
Lower Bounds for Oblivious Near-Neighbor Search
Kasper Green Larsen and Tal Malkin and Omri Weinstein and Kevin Yeo
2019/376 ( PDF )
SELL v1.0: Searchable Encrypted Logging Library
Amir Jalali and Neil Davenport
2019/375 ( PDF )
Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters
Xavier Bultel and Pascal Lafourcade
2019/374 ( PDF )
Probability 1 Iterated Differential in the SNEIK Permutation
Léo Perrin
2019/373 ( PDF )
Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions
Aram Jivanyan
2019/372 ( PDF )
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
2019/371 ( PDF )
Generic Construction of Linkable Ring Signature
Xueli Wang and Yu Chen and Xuecheng Ma
2019/370 ( PDF )
Indifferentiability for Public Key Cryptosystems
Mark Zhandry and Cong Zhang
2019/369 ( PDF )
On the EA-classes of known APN functions in small dimensions
Marco Calderini
2019/368 ( PDF )
Strong Post-Compromise Secure Proxy Re-Encryption
Alex Davidson and Amit Deo and Ela Lee and Keith Martin
2019/367 ( PDF )
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
Olivier Blazy and Angèle Bossuat and Xavier Bultel and Pierre-Alain Fouque and Cristina Onete and Elena Pagnin
2019/366 ( PDF )
Triggerflow: Regression Testing by Advanced Execution Path Inspection
Iaroslav Gridin and Cesar Pereida García and Nicola Tuveri and Billy Bob Brumley
2019/365 ( PDF )
Fully Secure Attribute-Based Encryption for $t$-CNF from LWE
Rotem Tsabary
2019/364 ( PDF )
Everybody's a Target: Scalability in Public-Key Encryption
Benedikt Auerbach and Federico Giacon and Eike Kiltz
2019/363 ( PDF )
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs
Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima
2019/362 ( PDF )
Game Channels: State Channels for the Gambling Industry with Built-In PRNG
Alisa Chernyaeva and Ilya Shirobokov and Alexander Davydov
2019/361 ( PDF )
On polynomial secret sharing schemes
Anat Paskin-Chernivasky and Artiom Radune
2019/360 ( PDF )
SoK: Off The Chain Transactions
Lewis Gudgeon and Pedro Moreno-Sanchez and Stefanie Roos and Patrick McCorry and Arthur Gervais
2019/359 ( PDF )
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search
Hao Chen and Ilaria Chillotti and Yihe Dong and Oxana Poburinnaya and Ilya Razenshteyn and M. Sadegh Riazi
2019/358 ( PDF )
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA
Leo Weissbart and Stjepan Picek and Lejla Batina
2019/357 ( PDF )
Lattice-based proof of a shuffle
Núria Costa and Ramiro Martínez and Paz Morillo
2019/356 ( PDF )
Ad Hoc Multi-Input Functional Encryption
Shweta Agrawal and Michael Clear and Ophir Frieder and Sanjam Garg and Adam O’Neill and Justin Thaler
2019/355 ( PDF )
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks
Anubhab Baksi and Dhiman Saha and Sumanta Sarkar
2019/354 ( PDF )
Benchmarking Privacy Preserving Scientific Operations
Abdelrahaman Aly and Nigel P. Smart
2019/353 ( PDF )
A Faster Constant-time Algorithm of CSIDH keeping Two Torsion Points
Hiroshi Onuki and Yusuke Aikawa and Tsutomu Yamazaki and Tsuyoshi Takagi
2019/352 ( PDF )
SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies
Maxim Jourenko and Kanta Kurazumi and Mario Larangeira and Keisuke Tanaka
2019/351 ( PDF )
Forward Secrecy of SPAKE2
Jose Becerra and Dimiter Ostrev and Marjan Skrobot
2019/350 ( PDF )
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Fabian Boemer and Yixing Lao and Rosario Cammarota and Casimir Wierzynski
2019/349 ( PDF )
Spin Me Right Round: Rotational Symmetry for FPGA-specific AES
Felix Wegener and Lauren De Meyer and Amir Moradi
2019/348 ( PDF )
Efficient and Scalable Universal Circuits
Masaud Y. Alhassan and Daniel Günther and Ágnes Kiss and Thomas Schneider
2019/347 ( PDF )
Selfie: reflections on TLS 1.3 with PSK
Nir Drucker and Shay Gueron
2019/346 ( PDF )
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm
Christophe Clavier and Leo Reynaud and Antoine Wurcker
2019/345 ( PDF )
Second-order Scatter Attack
Hugues Thiebeauld and Aurélien Vasselle and Antoine Wurcker
2019/344 ( PDF )
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency
Ethan Heilman and Neha Narula and Garrett Tanzer and James Lovejoy and Michael Colavita and Madars Virza and Tadge Dryja
2019/343 ( PDF )
Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input
Aurelien Vasselle and Antoine Wurcker
2019/342 ( PDF )
LightChain: A DHT-based Blockchain for Resource Constrained Environments
Yahya Hassanzadeh-Nazarabadi and Alptekin Küpçü and Öznur Özkasap
2019/341 ( PDF )
MixEth: efficient, trustless coin mixing service for Ethereum
István András Seres and Dániel A. Nagy and Chris Buckland and Péter Burcsi
2019/340 ( PDF )
Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys
Antoine Wurcker
2019/339 ( PDF )
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Yusuke Naito and Takeshi Sugawara
2019/338 ( PDF )
Garbled Neural Networks are Practical
Marshall Ball and Brent Carmer and Tal Malkin and Mike Rosulek and Nichole Schimanski
2019/337 ( PDF )
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios
Łukasz Krzywiecki and Mirosław Kutyłowski and Jakub Pezda and Marcin Słowik
2019/336 ( PDF )
DEEP-FRI: Sampling Outside the Box Improves Soundness
Eli Ben-Sasson and Lior Goldberg and Swastik Kopparty and Shubhangi Saraf
2019/335 ( PDF )
Examining the Practical Side Channel Resilience of ARX-boxes
Yan Yan and Elisabeth Oswald
2019/334 ( PDF )
Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition
Abdelrahaman Aly and Aysajan Abidin and Svetla Nikova
2019/333 ( PDF )
Key-and-Argument-Updatable QA-NIZKs
Helger Lipmaa
2019/332 ( PDF )
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields
Benjamin Hong Meng Tan and Hyung Tae Lee and Huaxiong Wang and Shu Qin Ren and Khin Mi Mi Aung
2019/331 ( PDF )
Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors
Amir Jalali and Reza Azarderakhsh and Mehran Mozaffari Kermani and Matthew Campagna and David Jao
2019/330 ( PDF )
Practical Supersingular Isogeny Group Key Agreement
Reza Azarderakhsh and Amir Jalali and David Jao and Vladimir Soukharev
2019/329 ( PDF )
Doubly half-injective PRGs for incompressible white-box cryptography
Estuardo Alpirez Bock and Alessandro Amadori and Joppe W. Bos and Chris Brzuska and Wil Michiels
2019/328 ( PDF )
On the Difficulty of Hiding the Balance of Lightning Network Channels
Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Alejandro Ranchal-Pedrosa and Cristina Pérez-Solà and Joaquin Garcia-Alfaro
2019/327 ( PDF )
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers
Gembu Ito and Tetsu Iwata
2019/326 ( PDF )
Sublinear Pairing-based Arguments with Updatable CRS and Weaker Assumptions
Alonso González and Carla Rŕfols
2019/325 ( PDF )
An Efficient Private Evaluation of a Decision Graph
Hiroki Sudo and Koji Nuida and Kana Shimizu
2019/324 ( PDF )
A Traceable Ring Signature Scheme based on Coding Theory
Pedro Branco and Paulo Mateus
2019/323 ( PDF )
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited
Sabyasachi Dutta and Kouichi Sakurai
2019/322 ( PDF )
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES
Farnoud Farahmand and Malik Umar Sharif and Kevin Briggs and Kris Gaj
2019/321 ( PDF )
Horizontal Collision Correlation Attack on Elliptic Curves
Aurélie Bauer and Eliane Jaulmes and Emmanuel Prouff and Jean-René Reinhard and Justine Wild
2019/320 ( PDF )
Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats
Léo Ducas and Steven Galbraith and Thomas Prest and Yang Yu
2019/319 ( PDF )
PGC: Pretty Good Confidential Transaction System with Accountability
Yu Chen and Xuecheng Ma
2019/318 ( PDF )
Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256
Boyu Ni and Xiaoyang Dong
2019/317 ( PDF )
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
Tiancheng Xie and Jiaheng Zhang and Yupeng Zhang and Charalampos Papamanthou and Dawn Song
2019/316 ( PDF )
Extended Affine and CCZ Equivalence up to Dimension 4
Marcus Brinkmann
2019/315 ( PDF )
Iterated Search Problems and Blockchain Security under Falsifiable Assumptions
Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos
2019/314 ( PDF )
Optimal Bounded-Collusion Secure Functional Encryption
Prabhanjan Ananth and Vinod Vaikuntanathan
2019/313 ( PDF )
A SAT-based approach for index calculus on binary elliptic curves
Monika Trimoska and Sorina Ionica and Gilles Dequen
2019/312 ( PDF )
Side-Channel Analysis of the TERO PUF
Lars Tebelmann and Michael Pehl and Vincent Immler
2019/311 ( PDF )
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and Bertram Poettering
2019/310 ( PDF )
A Formal Approach to Secure Speculation
Kevin Cheang and Cameron Rasmussen and Sanjit Seshia and Pramod Subramanyan
2019/309 ( PDF )
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots
Jean-Sebastien Coron and Luca Notarnicola
2019/308 ( PDF )
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation
Yuan Kang and Chengyu Lin and Tal Malkin and Mariana Raykova
2019/307 ( PDF )
Solving $x^{2^k+1}+x+a=0$ in $\mathbb{F}_{2^n}$ with $\gcd(n,k)=1$
Kwang Ho Kim and Sihem Mesnager
2019/306 ( PDF )
Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields
Madhurima Mukhopadhyay and Palash Sarkar
2019/305 ( PDF )
Practical Algebraic Side-Channel Attacks Against ACORN
Alexandre Adomnicai and Laurent Masson and Jacques J.A. Fournier
2019/304 ( PDF )
Ternary Syndrome Decoding with Large Weight
Rémi Bricout and André Chailloux and Thomas Debris-Alazard and Matthieu Lequesne
2019/303 ( PDF )
Analysis of TPL Signature Scheme
Terry Shue Chien Lau and Chik How Tan and Theo Fanuela Prabowo
2019/302 ( PDF )
A Survey of Leakage-Resilient Cryptography
Yael Tauman Kalai and Leonid Reyzin
2019/301 ( PDF )
Safe Compilation for Encrypted Computing
Peter T. Breuer and Simon Pickin
2019/300 ( PDF )
Transient Effect Ring Oscillators Leak Too
Ugo Mureddu and Brice Colombier and Nathalie Bochard and Lilian Bossuet and Viktor Fischer
2019/299 ( PDF )
A Generic Construction of Revocable Identity-Based Encryption
Xuecheng Ma and Dongdai Lin
2019/298 ( PDF )
Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem
Craig Costello and Patrick Longa and Michael Naehrig and Joost Renes and Fernando Virdia
2019/297 ( PDF )
Towards Optimized and Constant-Time CSIDH on Embedded Devices
Amir Jalali and Reza Azarderakhsh and Mehran Mozaffari Kermani and David Jao
2019/296 ( PDF )
Hash functions from superspecial genus-2 curves using Richelot isogenies
Wouter Castryck and Thomas Decru and Benjamin Smith
2019/295 ( PDF )
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
Kimia Tajik and Akshith Gunasekaran and Rhea Dutta and Brandon Ellis and Rakesh B. Bobba and Mike Rosulek and Charles V. Wright and Wu-chi Feng
2019/294 ( PDF )
Semi-parallel Logistic Regression for GWAS on Encrypted Data
Miran Kim and Yongsoo Song and Baiyu Li and Daniele Micciancio
2019/293 ( PDF )
Impossibility of Strong KDM Security with Auxiliary Input
Cody Freitag and Ilan Komargodski and Rafael Pass
2019/292 ( PDF )
Timing attacks on Error Correcting Codes in Post-Quantum Secure Schemes
Jan-Pieter D'Anvers and Marcel Tiepelt and Frederik Vercauteren and Ingrid Verbauwhede
2019/291 ( PDF )
CCA Security and Trapdoor Functions via Key-Dependent-Message Security
Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka
2019/290 ( PDF )
Cost effective techniques for chip delayering and in-situ depackaging
Philippe Loubet Moundi
2019/289 ( PDF )
Cryptanalysis of ForkAES
Subhadeep Banik and Jannis Bossert and Amit Jana and Eik List and Stefan Lucks and Willi Meier and Mostafizar Rahman and Dhiman Saha and Yu Sasaki
2019/288 ( PDF )
On the construction of S-boxes using the leaders and followers metaheuristic
Alejandro Freyre-Echevarría and Ismel Martínez-Díaz
2019/287 ( PDF )
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
A. N. Alekseychuk and S. M. Koniushok and M. V. Poremskyi
2019/286 ( PDF )
Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ variables Majority Function
Yindong Chen and Fei Guo and Liu Zhang
2019/285 ( PDF )
SpaceFlip : Unbound Geometry Cryptography
Gideon Samid
2019/284 ( PDF )
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2
Ai Ishida and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka
2019/283 ( PDF )
An Attack on Small Private Keys of RSA Based on Euclidean Algorithm
Dimitrios Poulakis
2019/282 ( PDF )
A Framework for Cryptographic Problems from Linear Algebra
Carl Bootland and Wouter Castryck and Alan Szepieniec and Frederik Vercauteren
2019/281 ( PDF )
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning
Phillipp Schoppmann and Adria Gascon and Mariana Raykova and Benny Pinkas
2019/280 ( PDF )
Multi-Authority Attribute-Based Encryption from LWE in the OT Model
Sam Kim
2019/279 ( PDF )
A Note on Key Agreement and Non-Interactive Commitments
Alex Lombardi and Luke Schaeffer
2019/278 ( PDF )
Uncovering Algebraic Structures in the MPC Landscape
Navneet Agarwal and Sanat Anand and Manoj Prabhakaran
2019/277 ( PDF )
On the boomerang uniformity of quadratic permutations over $\mathbb{F}_{2^n}$
Sihem Mesnager and Chunming Tang and Maosheng Xiong
2019/276 ( PDF )
Secure Computation of the $k^\text{th}$-ranked Integer on Blockchains
Erik-Oliver Blass and Florian Kerschbaum
2019/275 ( PDF )
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation
M. Sadegh Riazi and Mojan Javaheripi and Siam U. Hussain and Farinaz Koushanfar
2019/274 ( PDF )
Path Oblivious Heap
Elaine Shi
2019/273 ( PDF )
Compressing Vector OLE
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai
2019/272 ( PDF )
Quantum Security Analysis of AES
Xavier Bonnetain and María Naya-Plasencia and André Schrottenloher
2019/271 ( PDF )
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)
Jintai Ding and Chi Cheng and Yue Qin
2019/270 ( PDF )
Sync HotStuff: Simple and Practical Synchronous State Machine Replication
Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren and Maofan Yin
2019/269 ( PDF )
Digital Signatures for Consensus
Sergey Gorbunov and Hoeteck Wee
2019/268 ( PDF )
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys*
Sergei Bauer and Martin Brunner and Peter Schartner
2019/267 ( PDF )
Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.
Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede
2019/266 ( PDF )
Fast constant-time gcd computation and modular inversion
Daniel J. Bernstein and Bo-Yin Yang
2019/265 ( PDF )
TEX - A Securely Scalable Trustless Exchange
Rami Khalil and Arthur Gervais and Guillaume Felley
2019/264 ( PDF )
Unifying computational entropies via Kullback-Leibler divergence
Rohit Agrawal and Yi-Hsiu Chen and Thibaut Horel and Salil Vadhan
2019/263 ( PDF )
Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones
Jiaping Wang and Hao Wang
2019/262 ( PDF )
Revisiting Post-Quantum Fiat-Shamir
Qipeng Liu and Mark Zhandry
2019/261 ( PDF )
Forward-Secure Multi-Signatures
Manu Drijvers and Gregory Neven
2019/260 ( PDF )
A Modular Treatment of Blind Signatures from Identification Schemes
Eduard Hauck and Eike Kiltz and Julian Loss
2019/259 ( PDF )
A Practical Method to Recover Exact Superpoly in Cube Attack
SenPeng Wang and Bin Hu and Jie Guan and Kai Zhang and TaiRong Shi
2019/258 ( PDF )
Tight Time-Memory Trade-offs for Symmetric Encryption
Joseph Jaeger and Stefano Tessaro
2019/257 ( PDF )
Uncloneable Quantum Encryption via Random Oracles
Anne Broadbent and Sébastien Lord
2019/256 ( PDF )
DLCT: A New Tool for Differential-Linear Cryptanalysis
Achiya Bar-On and Orr Dunkelman and Nathan Keller and Ariel Weizman
2019/255 ( PDF )
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2019/254 ( PDF )
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries
Divesh Aggarwal and Kai-Min Chung and Han-Hsuan Lin and Thomas Vidick
2019/253 ( PDF )
Founding Secure Computation on Blockchains
Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain
2019/252 ( PDF )
Reversible Proofs of Sequential Work
Hamza Abusalah and Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter
2019/251 ( PDF )
Consensus through Herding
T-H. Hubert Chan and Rafael Pass and Elaine Shi
2019/250 ( PDF )
Function-Dependent Commitments from Homomorphic Authenticators
Lucas Schabhüser and Denis Butin and Johannes Buchmann
2019/249 ( PDF )
Revisiting Variable Output Length XOR Pseudorandom Function
Srimanta Bhattacharya and Mridul Nandi
2019/248 ( PDF )
Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach
Ting Li and Yao Sun
2019/247 ( PDF )
Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
Andrea Coladangelo and Alex B. Grilo and Stacey Jeffery and Thomas Vidick
2019/246 ( PDF )
Towards optimal robust secret sharing with security against a rushing adversary
Serge Fehr and Chen Yuan
2019/245 ( PDF )
Distributed Differential Privacy via Shuffling
Albert Cheu and Adam Smith and Jonathan Ullman and David Zeber and Maxim Zhilyaev
2019/244 ( PDF )
Attacks Only Get Better: How to Break FF3 on Large Domains
Viet Tung Hoang and David Miller and Ni Trieu
2019/243 ( PDF )
4-Round Luby-Rackoff Construction is a qPRP
Akinori Hosoyamada and Tetsu Iwata
2019/242 ( PDF )
New Constructions of Reusable Designated-Verifier NIZKs
Alex Lombardi and Willy Quach and Ron D. Rothblum and Daniel Wichs and David J. Wu
2019/241 ( PDF )
Efficient Circuit-based PSI with Linear Communication
Benny Pinkas and Thomas Schneider and Oleksandr Tkachenko and Avishay Yanai
2019/240 ( PDF )
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes
Vipul Goyal and Yifan Song
2019/239 ( PDF )
Cheaper Private Set Intersection via Differentially Private Leakage
Adam Groce and Peter Rindal and Mike Rosulek
2019/238 ( PDF )
Robust Encryption, Extended
Rémi Géraud and David Naccache and Răzvan Roşie
2019/237 ( PDF )
Optimal Oblivious Priority Queues and Offline Oblivious RAM
Zahra Jafargholi and Kasper Green Larsen and Mark Simkin
2019/236 ( PDF )
Designated-verifier pseudorandom generators, and their applications
Geoffroy Couteau and Dennis Hofheinz
2019/235 ( PDF )
Reusable Designated-Verifier NIZKs for all NP from CDH
Willy Quach and Ron D. Rothblum and Daniel Wichs
2019/234 ( PDF )
On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm
Léo Ducas and Maxime Plançon and Benjamin Wesolowski
2019/233 ( PDF )
Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption
Nuttapong Attrapadung
2019/232 ( PDF )
On Quantum Advantage in Information Theoretic Single-Server PIR
Dorit Aharonov and Zvika Brakerski and Kai-Min Chung and Ayal Green and Ching-Yi Lai and Or Sattath
2019/231 ( PDF )
Secret-Sharing Schemes for General and Uniform Access Structures
Benny Applebaum and Amos Beimel and Oriol Farrŕs and Oded Nir and Naty Peter
2019/230 ( PDF )
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
Christos Andrikos and Lejla Batina and Lukasz Chmielewski and Liran Lerman and Vasilios Mavroudis and Kostas Papagiannopoulos and Guilherme Perin and Giorgos Rassias and Alberto Sonnino
2019/229 ( PDF )
XOR-counts and lightweight multiplication with fixed elements in binary finite fields
Lukas Kölsch
2019/228 ( PDF )
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
Nimrod Aviram and Kai Gellert and Tibor Jager
2019/227 ( PDF )
Securing Update Propagation with Homomorphic Hashing
Kevin Lewi and Wonho Kim and Ilya Maykov and Stephen Weis
2019/226 ( PDF )
Flyclient: Super-Light Clients for Cryptocurrencies
Benedikt Bünz and Lucianna Kiffer and Loi Luu and Mahdi Zamani
2019/225 ( PDF )
Leakage Resilience of the Duplex Construction
Christoph Dobraunig and Bart Mennink
2019/224 ( PDF )
Compact Adaptively Secure ABE for NC1 from k-Lin
Lucas Kowalczyk and Hoeteck Wee
2019/223 ( PDF )
Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies
Marcelo Blatt and Alexander Gusev and Yuriy Polyakov and Kurt Rohloff and Vinod Vaikuntanathan
2019/222 ( PDF )
(R)CCA Secure Updatable Encryption with Integrity Protection
Michael Klooß and Anja Lehmann and Andy Rupp
2019/221 ( PDF )
Group Signatures without NIZK: From Lattices in the Standard Model
Shuichi Katsumata and Shota Yamada
2019/220 ( PDF )
Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing
Ivan Damgĺrd and Kasper Green Larsen and Jesper Buus Nielsen
2019/219 ( PDF )
Nitro Protocol
Tom Close
2019/218 ( PDF )
Computational Limitations in Robust Classification and Win-Win Results
Akshay Degwekar and Vinod Vaikuntanathan
2019/217 ( PDF )
A family of boolean functions with good cryptographic properties
Guillermo Sosa Gómez and Octavio Paez Osuna
2019/216 ( PDF )
Round Optimal Secure Multiparty Computation from Minimal Assumptions
Arka Rai Choudhuri and Michele Ciampi and Vipul Goyal and Abhishek Jain and Rafail Ostrovsky
2019/215 ( PDF )
Approx-SVP in Ideal Lattices with Pre-processing
Alice Pellet-Mary and Guillaume Hanrot and Damien Stehlé
2019/214 ( PDF )
Four-Round Secure Multiparty Computation from General Assumptions
Michele Ciampi and Rafail Ostrovsky
2019/213 ( PDF )
On ELFs, Deterministic Encryption, and Correlated-Input Security
Mark Zhandry
2019/212 ( PDF )
A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes
Hossein Oraei and Massoud Hadian Dehkordi
2019/211 ( PDF )
MonZa: Fast Maliciously Secure Two Party Computation on Z_{2^k}
Dario Catalano and Mario Di Raimondo and Dario Fiore and Irene Giacomelli
2019/210 ( PDF )
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Christof Beierle and Gregor Leander and Amir Moradi and Shahram Rasoolzadeh
2019/209 ( PDF )
SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes
Zhenzhen Bao and Jian Guo and San Ling and Yu Sasaki
2019/208 ( PDF )
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA
Muzhou Li and Kai Hu and Meiqin Wang
2019/207 ( PDF )
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security
Dragos Rotaru and Tim Wood
2019/206 ( PDF )
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
James Howe and Ayesha Khalid and Marco Martinoli and Francesco Regazzoni and Elisabeth Oswald
2019/205 ( PDF )
A note on isogeny-based hybrid verifiable delay functions
Barak Shani
2019/204 ( PDF )
The Security of All Private-key Bits in Isogeny-based Schemes
Barak Shani
2019/203 ( PDF )
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
Osman Bicer and Alptekin Kupcu
2019/202 ( PDF )
The Distinction Between Fixed and Random Generators in Group-Based Assumptions
James Bartusek and Fermi Ma and Mark Zhandry
2019/201 ( PDF )
DL-Extractable UC-Commitment Schemes
Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michał Zając
2019/200 ( PDF )
Degree 2 is Complete for the Round-Complexity of Malicious MPC
Benny Applebaum and Zvika Brakerski and Rotem Tsabary
2019/199 ( PDF )
Password-Authenticated Public-Key Encryption
Tatiana Bradley and Jan Camenisch and Stanislaw Jarecki and Anja Lehmann and Gregory Neven and Jiayu Xu
2019/198 ( PDF )
Seedless Fruit is the Sweetest: Random Number Generation, Revisited
Sandro Coretti and Yevgeniy Dodis and Harish Karthikeyan and Stefano Tessaro
2019/197 ( PDF )
Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions
Esteban Landerreche and Marc Stevens and Christian Schaffner
2019/196 ( PDF )
Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions
Michael Backes and Nico Döttling and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider
2019/195 ( PDF )
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
Jung Hee Cheon and Wonhee Cho and Minki Hhan and Minsik Kang and Jiseung Kim and Changmin Lee
2019/194 ( PDF )
Classical zero-knowledge arguments for quantum computations
Thomas Vidick and Tina Zhang
2019/193 ( PDF )
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge
Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2019/192 ( PDF )
An Omission-Tolerant Cryptographic Checksum
Francisco Corella and Karen Lewison
2019/191 ( PDF )
Zether: Towards Privacy in a Smart Contract World
Benedikt Bünz and Shashank Agrawal and Mahdi Zamani and Dan Boneh
2019/190 ( PDF )
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model
Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner
2019/189 ( PDF )
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis
Yaoling Ding and An Wang and Siu Ming YIU
2019/188 ( PDF )
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
Dan Boneh and Elette Boyle and Henry Corrigan-Gibbs and Niv Gilboa and Yuval Ishai
2019/187 ( PDF )
Fully homomorphic encryption modulo Fermat numbers
Antoine Joux
2019/186 ( PDF )
Re-thinking untraceability in the CryptoNote-style blockchain
Jiangshan Yu and Man Ho Allen Au and Paulo Esteves-Verissimo
2019/185 ( PDF )
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Ralph Ankele and Christoph Dobraunig and Jian Guo and Eran Lambooij and Gregor Leander and Yosuke Todo
2019/184 ( PDF )
Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon
William Diehl and Farnoud Farahmand and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj
2019/183 ( PDF )
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
Katherine E. Stange
2019/182 ( PDF )
Security is an Architectural Design Constraint
Prasanna Ravi and Sourav Sen Gupta and Anupam Chattopadhyay and Mustafa Khairallah and Zakaria Najm and Shivam Bhasin
2019/181 ( PDF )
Lower Bounds for Leakage-Resilient Secret Sharing
Jesper Buus Nielsen and Mark Simkin
2019/180 ( PDF )
Disco: Modern Session Encryption
David Wong
2019/179 ( PDF )
Synchronous, with a Chance of Partition Tolerance
Yue Guo and Rafael Pass and Elaine Shi
2019/178 ( PDF )
LucidiTEE: Policy-Compliant Fair Computing at Scale
Rohit Sinha and Sivanarayana Gaddam and Ranjit Kumaresan
2019/177 ( PDF )
Genus Two Isogeny Cryptography
E.V. Flynn and Yan Bo Ti
2019/176 ( PDF )
Homomorphic Encryption for Finite Automata
Nicholas Genise and Craig Gentry and Shai Halevi and Baiyu Li and Daniele Micciancio
2019/175 ( PDF )
The Communication Complexity of Threshold Private Set Intersection
Satrajit Ghosh and Mark Simkin
2019/174 ( PDF )
Exponential Lower Bounds for Secret Sharing
Kasper Green Larsen and Mark Simkin
2019/173 ( PDF )
Shorter Quadratic QA-NIZK Proofs
Vanesa Daza and Alonso González and Zaira Pindado and Carla Rŕfols and Javier Silva
2019/172 ( PDF )
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS
Danping Shi and Siwei Sun and Yu Sasaki and Chaoyun Li and Lei Hu
2019/171 ( PDF )
XONN: XNOR-based Oblivious Deep Neural Network Inference
M. Sadegh Riazi and Mohammad Samragh and Hao Chen and Kim Laine and Kristin Lauter and Farinaz Koushanfar
2019/170 ( PDF )
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes
Lingyue Qin and Xiaoyang Dong and Keting Jia and Rui Zong
2019/169 ( PDF )
Updatable Anonymous Credentials and Applications to Incentive Systems
Johannes Blömer and Jan Bobolz and Denis Diemert and Fabian Eidens
2019/168 ( PDF )
Profiling Side-channel Analysis in the Restricted Attacker Framework
Stjepan Picek and Annelie Heuser and Sylvain Guilley
2019/167 ( PDF )
Analysis of Secure Caches and Timing-Based Side-Channel Attacks
Shuwen Deng and Wenjie Xiong and Jakub Szefer
2019/166 ( PDF )
Verifiable Delay Functions from Supersingular Isogenies and Pairings
Luca De Feo and Simon Masson and Christophe Petit and Antonio Sanso
2019/165 ( PDF )
libInterMAC: Beyond Confidentiality and Integrity in Practice
Martin R. Albrecht and Torben Brandt Hansen and Kenneth G. Paterson
2019/164 ( PDF )
Use your Brain! Arithmetic 3PC For Any Modulus with Active Security
Hendrik Eerikson and Claudio Orlandi and Pille Pullonen and Joonas Puura and Mark Simkin
2019/163 ( PDF )
Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder
Melissa Azouaoui and Romain Poussier and François-Xavier Standaert
2019/162 ( PDF )
Multi-Stage Proof-of-Work Blockchain
Palash Sarkar
2019/161 ( PDF )
Understanding Optimizations and Measuring Performances of PBKDF2
Andrea Francesco Iuorio and Andrea Visconti
2019/160 ( PDF )
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data
Sujoy Sinha Roy and Furkan Turan and Kimmo Jarvinen and Frederik Vercauteren and Ingrid Verbauwhede
2019/159 ( PDF )
Robust MPC: Asynchronous Responsiveness yet Synchronous Security
Chen-Da Liu-Zhang and Julian Loss and Ueli Maurer and Tal Moran and Daniel Tschudi
2019/158 ( PDF )
Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors
Chris Peikert and Sina Shiehian
2019/157 ( PDF )
Schnorr-based implicit certification: improving the security and efficiency of V2X communications
Paulo S. L. M. Barreto and Marcos A. Simplicio Jr. and Jefferson E. Ricardini and Harsh Kupwade Patil
2019/156 ( PDF )
Efficient Constructions for Almost-everywhere Secure Computation
Siddhartha Jayanti and Srinivasan Raghuraman and Nikhil Vyas
2019/155 ( PDF )
Constant-time BCH Error-Correcting Code
Matthew Walters and Sujoy Sinha Roy
2019/154 ( PDF )
FastKitten: Practical Smart Contracts on Bitcoin
Poulami Das and Lisa Eckey and Tommaso Frassetto and David Gens and Kristina Hostáková and Patrick Jauernig and Sebastian Faust and Ahmad-Reza Sadeghi
2019/153 ( PDF )
Overdrive2k: Efficient Secure MPC over $Z_{2^k}$ from Somewhat Homomorphic Encryption
Emmanuela Orsini and Nigel P. Smart and Frederik Vercauteren
2019/152 ( PDF )
Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption
Duhyeong Kim and Yongha Son and Dongwoo Kim and Andrey Kim and Seungwan Hong and Jung Hee Cheon
2019/151 ( PDF )
Solving binary MQ with Grover's algorithm
Peter Schwabe and Bas Westerbaan
2019/150 ( PDF )
QcBits: Constant-Time Small-Key Code-Based Cryptography
Tung Chou
2019/149 ( PDF )
Improved Lattice-based CCA2-Secure PKE in the Standard Model
Jiang Zhang and Yu Yu and Shuqin Fan and Zhenfeng Zhang
2019/148 ( PDF )
On the efficiency of pairing-based proofs under the d-PKE
Ariel Gabizon
2019/147 ( PDF )
Practical Collision Attacks against Round-Reduced SHA-3
Jian Guo and Guohong Liao and Guozhen Liu and Meicheng Liu and Kexin Qiao and Ling Song
2019/146 ( PDF )
Boomerang Connectivity Table Revisited
Ling Song and Xianrui Qin and Lei Hu
2019/145 ( PDF )
Achieving GWAS with Homomorphic Encryption
Jun Jie Sim and Fook Mun Chan and Shibin Chen and Benjamin Hong Meng Tan and Khin Mi Mi Aung
2019/144 ( PDF )
Modeling Power Efficiency of S-boxes Using Machine Learning
Rajat Sadhukhan and Nilanjan Datta and Debdeep Mukhopadhyay
2019/143 ( PDF )
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
Benjamin Hettwer and Stefan Gehrer and Tim Güneysu
2019/142 ( PDF )
LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs
Matteo Campanelli and Dario Fiore and Anaďs Querol
2019/141 ( PDF )
A General Proof Framework for Recent AES Distinguishers
Christina Boura and Anne Canteaut and Daniel Coggia
2019/140 ( PDF )
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning
Jinhyun So and Basak Guler and A. Salman Avestimehr and Payman Mohassel
2019/139 ( PDF )
Vulnerability and Remedy of Stripped Function Logic Locking
Hai Zhou and Yuanqi Shen and Amin Rezaei
2019/138 ( PDF )
Unifying Leakage Models on a Rényi Day
Dahmun Goudarzi and Ange Martinelli and Alain Passelčgue and Thomas Prest
2019/137 ( PDF )
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications
Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2019/136 ( PDF )
Divisible E-Cash from Constrained Pseudo-Random Functions
Florian Bourse and David Pointcheval and Olivier Sanders
2019/135 ( PDF )
It wasn't me! Repudiability and Unclaimability of Ring Signatures
Sunoo Park and Adam Sealfon
2019/134 ( PDF )
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/133 ( PDF )
On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography.
Vasyl Ustimenko
2019/132 ( PDF )
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
Olivier Bronchain and Julien M. Hendrickx and Clément Massart and Alex Olshevsky and François-Xavier Standaert
2019/131 ( PDF )
Secure Evaluation of Quantized Neural Networks
Assi Barak and Daniel Escudero and Anders Dalskov and Marcel Keller
2019/130 ( PDF )
Are Certificate Thumbprints Unique?
Greg Zaverucha and Dan Shumow
2019/129 ( PDF )
Homomorphic Secret Sharing from Lattices Without FHE
Elette Boyle and Lisa Kohl and Peter Scholl
2019/128 ( PDF )
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions
Junichi Tomida
2019/127 ( PDF )
Beyond Birthday Bound Secure MAC in Faulty Nonce Model
Avijit Dutta and Mridul Nandi and Suprita Talnikar
2019/126 ( PDF )
New Automatic search method for Truncated-differential characteristics: Application to Midori and SKINNY
AmirHossein E. Moghaddam and Zahra Ahmadian
2019/125 ( PDF )
Combinatorial Primality Test
Maheswara Rao Valluri
2019/124 ( PDF )
Anomalous Look at Provable Security
Douglas Wikström
2019/123 ( PDF )
Security of Multilinear Galois Mode (MGM)
Liliya Akhmetzyanova and Evgeny Alekseev and Grigory Karpunin and Vladislav Nozdrunov
2019/122 ( PDF )
Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes
Santosh Ghosh and Rafael Misoczki and Manoj R. Sastry
2019/121 ( PDF )
Anonymous Attestation for IoT
Santosh Ghosh and Andrew H. Reinders and Rafael Misoczki and Manoj R. Sastry
2019/120 ( PDF )
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019
Keita Xagawa
2019/119 ( PDF )
On the security of the BCTV Pinocchio zk-SNARK variant
Ariel Gabizon
2019/118 ( -- withdrawn -- )
Defeating the Hart, Kim, Micheli, Pascuel-Perez, Petit, Quek Attack on WalnutDSA(TM)
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2019/117 ( PDF )
Non-Interactive Keyed-Verification Anonymous Credentials
Geoffroy Couteau and Michael Reichle
2019/116 ( PDF )
Multi-Key Homomophic Encryption from TFHE
Hao Chen and Ilaria Chillotti and Yongsoo Song
2019/115 ( PDF )
Distributional Collision Resistance Beyond One-Way Functions
Nir Bitansky and Iftach Haitner and Ilan Komargodski and Eylon Yogev
2019/114 ( PDF )
Fast Multiparty Threshold ECDSA with Fast Trustless Setup
Rosario Gennaro and Steven Goldfeder
2019/113 ( PDF )
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure
Ferucio Laurentiu Tiplea and Cristian Hristea
2019/112 ( PDF )
Variable Elimination - a Tool for Algebraic Cryptanalysis
Bjřrn Greve and Řyvind Ytrehus and Hĺvard Raddum
2019/111 ( PDF )
On the Complexity of non-recursive $n$-term Karatsuba Multiplier for Trinomials
Yin Li and Yu Zhang and Xingpo Ma and Chuanda Qi
2019/110 ( PDF )
Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves
Suhri Kim and Kisoon Yoon and Young-Ho Park and Seokhie Hong
2019/109 ( PDF )
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture
Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2019/108 ( PDF )
Minicrypt Primitives with Algebraic Structure and Applications
Navid Alamati and Hart Montgomery and Sikhar Patranabis and Arnab Roy
2019/107 ( PDF )
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit
Shun Li and Siwei Sun and Chaoyun Li and Zihao Wei and Lei Hu
2019/106 ( PDF )
Identity-Based Higncryption
Hongbing Wang and Yunlei Zhao
2019/105 ( PDF )
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
Antonio Faonio and Daniele Venturi
2019/104 ( PDF )
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation
Naomi Farley and Robert Fitzpatrick and Duncan Jones
2019/103 ( PDF )
Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE
Samuel Jaques and John M. Schanck
2019/102 ( PDF )
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum
Hisham S. Galal and Amr M. Youssef
2019/101 ( PDF )
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption
Sergiu Carpov and Nicolas Gama and Mariya Georgieva and Juan Ramon Troncoso-Pastoriza
2019/100 ( PDF )
Correlation Power Analysis on NTRU Prime and Related Countermeasures
Wei-Lun Huang and Jiun-Peng Chen and Bo-Yin Yang
2019/099 ( PDF )
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings
Mary Maller and Sean Bowe and Markulf Kohlweiss and Sarah Meiklejohn
2019/098 ( PDF )
A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions
Pedro Branco
2019/097 ( PDF )
Linearly equivalent S-boxes and the Division Property
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin
2019/096 ( PDF )
On Recovering Affine Encodings in White-Box Implementations
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin and Brice Minaud
2019/095 ( PDF )
Variants of the AES Key Schedule for Better Truncated Differential Bounds
Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean and Baptiste Lambin
2019/094 ( PDF )
CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges
Aron Gohr and Sven Jacob and Werner Schindler
2019/093 ( PDF )
Key Encapsulation Mechanism From Modular Multivariate Linear Equations
Muhammad Rezal Kamel Ariffin and Abderrahmane Nitaj and Yanbin Pan and Nur Azman Abu
2019/092 ( PDF )
Partitions in the S-Box of Streebog and Kuznyechik
Léo Perrin
2019/091 ( PDF )
Efficient Zero-Knowledge for NP from Secure Two-Party Computation
Li Hongda and Pan Dongxue and Ni Peifang
2019/090 ( PDF )
Round5: Compact and Fast Post-Quantum Public-Key Encryption
Hayo Baan and Sauvik Bhattacharya and Scott Fluhrer and Oscar Garcia-Morchon and Thijs Laarhoven and Ronald Rietman and Markku-Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang
2019/089 ( PDF )
The General Sieve Kernel and New Records in Lattice Reduction
Martin R. Albrecht and Léo Ducas and Gottfried Herold and Elena Kirshanova and Eamonn W. Postlethwaite and Marc Stevens
2019/088 ( PDF )
Continuous Key Agreement with Reduced Bandwidth
Nir Drucker and Shay Gueron
2019/087 ( PDF )
The Secure Link Prediction Problem
Laltu Sardar and Sushmita Ruj
2019/086 ( PDF )
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG
George Teseleanu
2019/085 ( PDF )
The Lattice-Based Digital Signature Scheme qTESLA
Erdem Alkim and Paulo S. L. M. Barreto and Nina Bindel and Patrick Longa and Jefferson E. Ricardini
2019/084 ( PDF )
An Information Obfuscation Calculus for Encrypted Computing
Peter T. Breuer
2019/083 ( PDF )
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15
Zhen Liu and Yanbin Pan and Zhenfei Zhang
2019/082 ( PDF )
Arithmetic Garbling from Bilinear Maps
Nils Fleischhacker and Giulio Malavolta and Dominique Schröder
2019/081 ( PDF )
Practical Group-Signatures with Privacy-Friendly Openings
Stephan Krenn and Kai Samelin and Christoph Striecks
2019/080 ( PDF )
Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing
Aner Ben Efraim and Michael Nielsen and Eran Omri
2019/079 ( PDF )
New Results about the Boomerang Uniformity of Permutation Polynomials
Kangquan Li and Longjiang Qu and Bing Sun and Chao Li
2019/078 ( PDF )
Testing the Randomness of Cryptographic Function Mappings
Alan Kaminsky
2019/077 ( PDF )
Pairing Implementation Revisited
Michael Scott
2019/076 ( PDF )
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations
Matthieu Rivain and Junwei Wang
2019/075 ( PDF )
Assessment of the Key-Reuse Resilience of NewHope
Aurélie Bauer and Henri Gilbert and Guénaël Renault and Mélissa Rossi
2019/074 ( PDF )
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
Chun Guo and Jonathan Katz and Xiao Wang and Yu Yu
2019/073 ( PDF )
Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model
Cristian Hristea and Ferucio Laurentiu Tiplea
2019/072 ( PDF )
ZeroCT: Improving ZeroCoin with Confidential Transactions and more
Alex Vazquez
2019/071 ( PDF )
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks
Zhilin Zhang and Ke Wang and Weipeng Lin and Ada Wai-Chee Fu and Raymond Chi-Wing Wong
2019/070 ( PDF )
Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool
Sam M. Werner and Paul J. Pritz and Alexei Zamyatin and William J. Knottenbelt
2019/069 ( PDF )
Quantum Indistinguishability of Random Sponges
Jan Czajkowski and Andreas Hülsing and Christian Schaffner
2019/068 ( PDF )
Sampling the Integers with Low Relative Error
Michael Walter
2019/067 ( PDF )
Managing Your Kleptographic Subscription Plan
George Teseleanu
2019/066 ( PDF )
Publicly Verifiable Proofs from Blockchains
Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2019/065 ( PDF )
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols
Jan Camenisch and Manu Drijvers and Björn Tackmann
2019/064 ( PDF )
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management
Keita Emura and Takuya Hayashi
2019/063 ( PDF )
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup
Michael Backes and Lucjan Hanzlik and Amir Herzberg and Aniket Kate and Ivan Pryvalov
2019/062 ( PDF )
Additively Homomorphic IBE from Higher Residuosity
Michael Clear and Ciaran McGoldrick
2019/061 ( PDF )
SigAttack: New High-level SAT-based Attack on Logic Encryptions
Yuanqi Shen and You Li and Shuyu Kong and Amin Rezaei and Hai Zhou
2019/060 ( PDF )
CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States
Amin Rezaei and You Li and Yuanqi Shen and Shuyu Kong and Hai Zhou
2019/059 ( PDF )
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption
Yuanqi Shen and You Li and Amin Rezaei and Shuyu Kong and David Dlott and Hai Zhou
2019/058 ( PDF )
Tightly secure hierarchical identity-based encryption
Roman Langrehr and Jiaxin Pan
2019/057 ( PDF )
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts
Rafael del Pino and Vadim Lyubashevsky and Gregor Seiler
2019/056 ( PDF )
Obfuscating simple functionalities from knowledge assumptions
Ward Beullens and Hoeteck Wee
2019/055 ( PDF )
Rate-Optimizing Compilers for Continuously Non-Malleable Codes
Sandro Coretti and Antonio Faonio and Daniele Venturi
2019/054 ( PDF )
Deep Learning to Evaluate Secure RSA Implementations
Mathieu Carbone and Vincent Conin and Marie-Angela Cornelie and Francois Dassance and Guillaume Dufresne and Cecile Dumas and Emmanuel Prouff and Alexandre Venelli
2019/053 ( -- withdrawn -- )
A New Code-based Signature Scheme with Shorter Public Key
Yongcheng Song and Xinyi Huang and Yi Mu and Wei Wu
2019/052 ( PDF )
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/051 ( PDF )
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy
Daode Zhang and Jie Li and Bao Li and Xianhui Lu and Haiyang Xue and Dingding Jia and Yamin Liu
2019/050 ( PDF )
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions
Takahiro Matsuda and Kenta Takahashi and Takao Murakami and Goichiro Hanaoka
2019/049 ( PDF )
The Relationship between the Construction and Solution of the MILP Models and Applications
Lingchen Li and Wenling Wu and Yafei Zheng and Lei Zhang
2019/048 ( PDF )
Sub-logarithmic Distributed Oblivious RAM with Small Block Size
Eyal Kushilevitz and Tamer Mour
2019/047 ( PDF )
NIST Post-Quantum Cryptography- A Hardware Evaluation Study
Kanad Basu and Deepraj Soni and Mohammed Nabeel and Ramesh Karri
2019/046 ( PDF )
Block-Anti-Circulant Unbalanced Oil and Vinegar
Alan Szepieniec and Bart Preneel
2019/045 ( PDF )
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio
Ryo Nishimaki and Takashi Yamakawa
2019/044 ( PDF )
Toha Key Hardened Function
Ahmad Almorabea
2019/043 ( PDF )
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
Qian Guo and Thomas Johansson and Alexander Nilsson
2019/042 ( PDF )
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs
Lisa Kohl
2019/041 ( PDF )
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
Bartosz Zoltak
2019/040 ( PDF )
NTTRU: Truly Fast NTRU Using NTT
Vadim Lyubashevsky and Gregor Seiler
2019/039 ( PDF )
Fully Invisible Protean Signatures Schemes
Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2019/038 ( PDF )
Identity-based Broadcast Encryption with Efficient Revocation
Aijun Ge and Puwen Wei
2019/037 ( PDF )
Improving Attacks on Speck32/64 using Deep Learning
Aron Gohr
2019/036 ( PDF )
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR
Shuichi Katsumata and Shota Yamada
2019/035 ( PDF )
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ
Carsten Baum and Daniele Cozzo and Nigel P. Smart
2019/034 ( PDF )
A Formal Treatment of Hardware Wallets
Myrto Arapinis and Andriana Gkaniatsou and Dimitris Karakostas and Aggelos Kiayias
2019/033 ( PDF )
FE for Inner Products and Its Application to Decentralized ABE
Zhedong Wang and Xiong Fan and Feng-Hao Liu
2019/032 ( PDF )
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation
Steven Galbraith and Jake Massimo and Kenneth G. Paterson
2019/031 ( PDF )
Collusion Resistant Broadcast and Trace from Positional Witness Encryption
Rishab Goyal and Satyanarayana Vusirikala and Brent Waters
2019/030 ( -- withdrawn -- )
Analysis of Two Countermeasures against the Signal Leakage Attack
Ke Wang and Zhenfeng Zhang
2019/029 ( -- withdrawn -- )
Upper Bound on $\lambda_1(\Lambda^{\bot}(\mathbf A))$
Huiwen Jia and Chunming Tang and Yanhua Zhang
2019/028 ( PDF )
nQUIC: Noise-Based QUIC Packet Protection
Mathias Hall-Andersen and David Wong and Nick Sullivan and Alishah Chator
2019/027 ( PDF )
Group Signatures with Selective Linkability
Lydia Garms and Anja Lehmann
2019/026 ( PDF )
Non-malleable encryption with proofs of plaintext knowledge and applications to voting
Ben Smyth and Yoshikazu Hanatani
2019/025 ( PDF )
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers
Yu Liu and Huicong Liang and Muzhou Li and Luning Huang and Kai Hu and Chenhe Yang and Meiqin Wang
2019/024 ( PDF )
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography
Yalin Chen and Jue-Sam Chou and Fang-Qi Zhou
2019/023 ( PDF )
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
Joachim Breitner and Nadia Heninger
2019/022 ( PDF )
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Anthony Demeri and Thomas Conroy and Alex Nolan and William Diehl
2019/021 ( PDF )
Ilya Aldanov
2019/020 ( PDF )
Decentralizing Inner-Product Functional Encryption
Michel Abdalla and Fabrice Benhamouda and Markulf Kolhweiss and Hendrik Waldner
2019/019 ( PDF )
Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach
Chunning Zhou and Wentao Zhang and Tianyou Ding and Zejun Xiang
2019/018 ( PDF )
Generic Constructions of Robustly Reusable Fuzzy Extractor
Yunhua Wen and Shengli Liu and Dawu Gu
2019/017 ( PDF )
CHURP: Dynamic-Committee Proactive Secret Sharing
Sai Krishna Deepak Maram and Fan Zhang and Lun Wang and Andrew Low and Yupeng Zhang and Ari Juels and Dawn Song
2019/016 ( PDF )
Fast Message Franking: From Invisible Salamanders to Encryptment
Yevgeniy Dodis and Paul Grubbs and Thomas Ristenpart and Joanne Woodage
2019/015 ( PDF )
More Efficient Algorithms for the NTRU Key Generation using the Field Norm
Thomas Pornin and Thomas Prest
2019/014 ( PDF )
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks
Gaurav Panwar and Satyajayant Misra and Roopa Vishwanathan
2019/013 ( PDF )
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces
Changhai Ou and Siew-Kei Lam
2019/012 ( PDF )
A Proof of the Beierle-Kranz-Leander’s Conjecture related to Lightweight Multiplication in $F_{2^n}$
Sihem Mesnager and Kwang Ho Kim and Dujin Jo and Junyop Choe and Munhyon Han and Dok Nam Lee
2019/011 ( PDF )
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Paul Grubbs and Marie-Sarah Lacharité and Brice Minaud and Kenneth G. Paterson
2019/010 ( PDF )
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC
Rodrigo Abarzúa and Claudio Valencia and Julio López
2019/009 ( PDF )
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
Qian Guo and Thomas Johansson and Erik Mĺrtensson and Paul Stankovski Wagner
2019/008 ( PDF )
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
Jingyu Pan and Shivam Bhasin and Fan Zhang and Kui Ren
2019/007 ( PDF )
Tight Security Bounds for Generic Stream Cipher Constructions
Matthias Hamann and Matthias Krause
2019/006 ( PDF )
Minimizing Trust in Hardware Wallets with Two Factor Signatures
Antonio Marcedone and Rafael Pass and abhi shelat
2019/005 ( PDF )
ScanSAT: Unlocking Obfuscated Scan Chains
Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, and Ozgur Sinanoglu
2019/004 ( PDF )
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
Guillaume Dabosville and Houssem Maghrebi and Alexis Lhuillery and Julien Bringer and Thanh-Ha Le
2019/003 ( -- withdrawn -- )
Secure and Effective Logic Locking for Machine Learning Applications
Yuntao Liu and Yang Xie and Abhishek Charkraborty and Ankur Srivastava
2019/002 ( PDF )
Leakage-Resilient Group Signature: Definitions and Constructions
Jianye Huang and Qiong Huang
2019/001 ( PDF )
Sanctorum: A lightweight security monitor for secure enclaves
Ilia Lebedev and Kyle Hogan and Jules Drean and David Kohlbrenner and Dayeol Lee and Krste Asanović and Dawn Song and Srinivas Devadas

[ Cryptology ePrint archive ]