Cryptology ePrint Archive: Listing for 2022
-
2022/603 ( PDF )
- Distributed Blockchain Price Oracle
- Léonard Lys and Maria Potop-Butucaru
-
2022/602 ( PDF )
- Real-Time Frequency Detection to Synchronize Fault Injection on System-on-Chip
- Clément Fanjas and Clément Gaine and Driss Aboulkassimi and Simon Pontié and Olivier Potin
-
2022/601 ( PDF )
- A Better Method to Analyze Blockchain Consistency
- Lucianna Kiffer and Rajmohan Rajaraman and abhi shelat
-
2022/600 ( PDF )
- A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations
- Loïc Masure and Olivier Rioul and François-Xavier Standaert
-
2022/599 ( PDF )
- TenderTee: Secure Tendermint
- Lionel Beltrando and Maria Potop-Butucaru and Jose Alfaro
-
2022/598 ( PDF )
- Verifiable and Forward private Conjunctive keyword Search from DIA Tree
- Laltu Sardar and Sushmita Ruj
-
2022/597 ( PDF )
- Foundations of Dynamic BFT
- Sisi Duan and Haibin Zhang
-
2022/596 ( PDF )
- Zero Knowledge Proofs of Elliptic Curve Inner Products from Principal Divisors and Weil Reciprocity
- Liam Eagen
-
2022/595 ( PDF )
- On the Cryptographic Fragility of the Telegram Ecosystem
- Theo von Arx and Kenneth G. Paterson
-
2022/594 ( PDF )
- A CONCRETE approach to torus fully homomorphic encryption
- Maria Ferrara and Antonio Tortora
-
2022/593 ( PDF )
- On the Security Proof of CKO+21 Secret Sharing Scheme
- Yupu Hu and Shanshan Zhang and Baocang Wang and Siyue Dong
-
2022/592 ( PDF )
- Chaghri --- an FHE-friendly Block Cipher
- Tomer Ashur and Mohammad Mahzoun and Dilara Toprakhisar
-
2022/591 ( PDF )
- Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography
- Ryota Hira and Tomoaki Kitahara and Daiki Miyahara and Yuko Hara-Azumi and Yang Li and Kazuo Sakiyama
-
2022/590 ( PDF )
- Secure Merge in Linear Time and O(log log N) Rounds
- Mark Blunk and Paul Bunn and Samuel Dittmer and Steve Lu and Rafail Ostrovsky
-
2022/589 ( PDF )
- Unnecessary Input Heuristics & PayJoin Transactions
- Simin Ghesmati and Andreas Kern and Aljosha Judmayer and Nicholas Stifter and
-
2022/588 ( PDF )
- Efficient Lifting for Shorter Zero-Knowledge Proofs and Post-Quantum Signatures
- Daniel Kales and Greg Zaverucha
-
2022/587 ( PDF )
- Doubly Efficient Interactive Proofs over Infinite and Non-Commutative Rings
- Eduardo Soria-Vazquez
-
2022/586 ( PDF )
- A survey of elliptic curves for proof systems
- Diego F. Aranha and Youssef El Housni and Aurore Guillevic
-
2022/585 ( PDF )
- Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability
- Yi Liu and Qi Wang and Siu-Ming Yiu
-
2022/584 ( PDF )
- Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups
- Lior Rotem
-
2022/583 ( PDF )
- A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff
- Lior Rotem and Gil Segev
-
2022/582 ( PDF )
- Ponyta: Foundations of Side-Contract-Resilient Fair Exchange
- Hao Chung and Elisaweta Masserova and Elaine Shi and Sri AravindaKrishnan Thyagarajan
-
2022/581 ( PDF )
- Cryptoanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage
- Lidong Han and Guangwu Xu and Qi Xie and Xiao Tan and Chengliang Tian
-
2022/580 ( PDF )
- How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing
- Samuel Sousa and Roman Kern
-
2022/579 ( PDF )
- Compact and Efficient NTRU-based KEM with Scalable Ciphertext Compression
- Zhichuang Liang and Boyue Fang and Jieyu Zheng and Yunlei Zhao
-
2022/578 ( PDF )
- Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation
- Alexandre Adomnicai and Kazuhiko Minematsu and Maki Shigeri
-
2022/577 ( PDF )
- Construction of generalized-involutory MDS matrices
- Xuting Zhou and Tianshuo Cong
-
2022/576 ( PDF )
- On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage
- Akira Ito and Rei Ueno and Naofumi Homma
-
2022/575 ( PDF )
- Optimizing Homomorphic Encryption Parameters for Arbitrary Applications
- Charles Gouert and Rishi Khan and Nektarios Georgios Tsoutsos
-
2022/574 ( PDF )
- Comparison-Based MPC in Star Topology (Full Version)
- Gowri R Chandran and Carmit Hazay and Robin Hundt and Thomas Schneider
-
2022/573 ( PDF )
- Finding One Common Item, Privately
- Tyler Beauregard and Janabel Xia and Mike Rosulek
-
2022/572 ( PDF )
- Homomorphically counting elements with the same property
- Ilia Iliashenko and Malika Izabachène and Axel Mertens and Hilder V. L. Pereira.
-
2022/571 ( PDF )
- Entropically secure cipher for messages generated by Markov chains with unknown statistics
- Boris Ryabko
-
2022/570 ( PDF )
- Secure and Private Source Coding with Private Key and Decoder Side Information
- Onur Gunlu and Rafael F. Schaefer and Holger Boche and H. Vincent Poor
-
2022/569 ( PDF )
- TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks
- Marloes Venema and Greg Alpár
-
2022/568 ( PDF )
- Improved MITM Cryptanalysis on Streebog
- Jialiang Hua and Xiaoyang Dong and Siwei Sun and Zhiyu Zhang and Lei Hu and Xiaoyun Wang
-
2022/567 ( PDF )
- FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher
- Michele Fabbrini
-
2022/566 ( PDF )
- AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication
- Chenkai Weng and Kang Yang and Zhaomin Yang and Xiang Xie and Xiao Wang
-
2022/565 ( PDF )
- Power Contracts: Provably Complete Power Leakage Models for Processors
- Roderick Bloem and Barbara Gigerl and Marc Gourjon and Vedad Hadžić and Stefan Mangard and Robert Primas
-
2022/564 ( PDF )
- FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization
- Christopher van der Beets and Raine Nieminen and Thomas Schneider
-
2022/563 ( PDF )
- Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber
- Muyan Shen and Chi Cheng and Xiaohan Zhang and Qian Guo and Tao Jiang
-
2022/562 ( PDF )
- Orientations and cycles in supersingular isogeny graphs
- Sarah Arpin and Mingjie Chen and Kristin E. Lauter and Renate Scheidler and Katherine E. Stange and Ha T. N. Tran
-
2022/561 ( PDF )
- Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes
- Shivam Bhasin and Dirmanto Jap and Wei Cheng Ng and Siang Meng Sim
-
2022/560 ( PDF )
- Distributed Shuffling in Adversarial Environments
- Kasper Green Larsen and Maciej Obremski and Mark Simkin
-
2022/559 ( PDF )
- DeCAF: Decentralizable Continuous Group Key Agreement with Fast Healing
- Joël Alwen and Benedikt Auerbach and Miguel Cueto Noval and Karen Klein and Guillermo Pascual-Perez and Krzysztof Pietrzak
-
2022/558 ( PDF )
- On Seedless PRNGs and Premature Next
- Sandro Coretti and Yevgeniy Dodis and Harish Karthikeyan and Noah Stephens-Davidowitz and Stefano Tessaro
-
2022/557 ( PDF )
- Honest Majority Multi-Prover Interactive Arguments
- Alexander R. Block and Christina Garman
-
2022/556 ( PDF )
- Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives
- Handong Zhang and Puwen Wei and Haiyang Xue and Yi Deng and Jinsong Li and Wei Wang and Guoxiao Liu
-
2022/555 ( PDF )
- Adapting Belief Propagation to Counter Shuffling of NTTs
- Julius Hermelink and Silvan Streit and Emanuele Strieder and Katharina Thieme
-
2022/554 ( PDF )
- Byzantine Reliable Broadcast with $O(nL+kn+n^2 log n)$ Communication
- Sisi Duan and Haibin Zhang
-
2022/553 ( PDF )
- Secure Storage with Deduplication
- John Best and Wayne Hineman and Steven Hetzler and Guerney Hunt and Charanjit S. Jutla
-
2022/552 ( PDF )
- Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One
- Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky
-
2022/551 ( PDF )
- Marlin: Two-Phase BFT with Linearity
- Xiao Sui and Sisi Duan and Haibin Zhang
-
2022/550 ( PDF )
- ROAST: Robust Asynchronous Schnorr Threshold Signatures
- Tim Ruffing and Viktoria Ronge and Elliott Jin and Jonas Schneider-Bensch and Dominique Schröder
-
2022/549 ( PDF )
- Smart Contracts Obfuscation from Blockchain-based One-time Program
- Sora Suegami
-
2022/548 ( PDF )
- Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security
- Yuyu Wang and Jiaxin Pan
-
2022/547 ( PDF )
- Fast signing method in RSA with high speed verification
- GyuChol.Kim and YongBok.Jong
-
2022/546 ( PDF )
- He-HTLC: Revisiting Incentives in HTLC
- Sarisht Wadhwa and Jannis Stoeter and Fan Zhang and Kartik Nayak
-
2022/545 ( PDF )
- Logic Locking - Connecting Theory and Practice
- Elisaweta Masserova and Deepali Garg and Ken Mai and Lawrence Pileggi and Vipul Goyal and Bryan Parno
-
2022/544 ( PDF )
- Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting
- Donghoon Chang and Deukjo Hong and Jinkeon Kang
-
2022/543 ( PDF )
- Aura: private voting with reduced trust on tallying authorities
- Aram Jivanyan and Aaron Feickert
-
2022/542 ( PDF )
- On Valiant's Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles
- Mathias Hall-Andersen and Jesper Buus Nielsen
-
2022/541 ( PDF )
- The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols
- Sandro Coretti and Aggelos Kiayias and Cristopher Moore and Alexander Russell
-
2022/540 ( PDF )
- On the revision of NIST 800-22 Test Suites
- Katarzyna Anna Kowalska and Davide Fogliano and Jose Garcia Coello
-
2022/539 ( PDF )
- Post Quantum Noise
- Yawning Angel and Benjamin Dowling and Andreas Hülsing and Peter Schwabe and Florian Weber
-
2022/538 ( PDF )
- Post-Quantum Signatures on RISC-V with Hardware Acceleration
- Patrick Karl and Jonas Schupp and Tim Fritzmann and Georg Sigl
-
2022/537 ( PDF )
- Rubato: Noisy Ciphers for Approximate Homomorphic Encryption (Full Version)
- Jincheol Ha and Seongkwang Kim and Byeonghak Lee and Jooyoung Lee and Mincheol Son
-
2022/536 ( PDF )
- Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha
- Sabyasachi Dey and Hirendra Kumar Garai and Santanu Sarkar and Nitin Kumar Sharma
-
2022/535 ( PDF )
- Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round
- Damiano Abram and Peter Scholl and Sophia Yakoubov
-
2022/534 ( PDF )
- On the Adaptive Security of the Threshold BLS Signature Scheme
- Renas Bacho and Julian Loss
-
2022/533 ( PDF )
- Băhēm: A Symmetric Cipher with Provable 128-bit Security
- M. Rajululkahf
-
2022/532 ( PDF )
- Hierarchical Galois Key Management Systems for Privacy Preserving AIaaS with Homomorphic Encryption
- Joon-Woo Lee and Eunsang Lee and Young-Sik Kim and Jong-Seon No
-
2022/531 ( PDF )
- Jammin' on the deck
- Norica Băcuieți and Joan Daemen and Seth Hoffert and Gilles Van Assche and Ronny Van Keer
-
2022/530 ( PDF )
- High-speed SABER Key Encapsulation Mechanism in 65nm CMOS
- Malik Imran and Felipe Almeida and Andrea Basso and Sujoy Sinha Roy and Samuel Pagliarini
-
2022/529 ( PDF )
- Laconic Private Set-Intersection From Pairings
- Diego Aranha and Chuanwei Lin and Claudio Orlandi and Mark Simkin
-
2022/528 ( PDF )
- Random sampling of supersingular elliptic curves
- Marzio Mula and Nadir Murru and Federico Pintore
-
2022/527 ( PDF )
- PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms
- Jungmin Park and N. Nalla Anandakumar and Dipayan Saha and Dhwani Mehta and Nitin Pundir and Fahim Rahman and Farimah Farahmandi and Mark M. Tehranipoor
-
2022/526 ( PDF )
- Optimal Tightness for Chain-Based Unique Signatures
- Fuchun Guo and Willy Susilo
-
2022/525 ( PDF )
- Decoding McEliece with a Hint - Secret Goppa Key Parts Reveal Everything
- Elena Kirshanova and Alexander May
-
2022/524 ( PDF )
- Inner Product Functional Commitments with Constant-Size Public Parameters and Openings
- Hien Chu and Dario Fiore and Dimitris Kolonelos and Dominique Schröder
-
2022/523 ( PDF )
- A side-channel based disassembler for the ARM-Cortex M0
- Jurian van Geest and Ileana Buhan
-
2022/522 ( PDF )
- The Case of Small Prime Numbers Versus the Joye-Libert Cryptosystem
- George Teseleanu
-
2022/521 ( PDF )
- On The Distributed Discrete Logarithm Problem with Preprocessing
- Pavel Hubáček and Ľubica Jančová and Veronika Králová
-
2022/520 ( PDF )
- Efficient Verification of the Wesolowski Verifiable Delay Function for Distributed Environments
- Vidal Attias and Luigi Vigneri and Vassil Dimitrov
-
2022/519 ( PDF )
- HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest
- Md Rasid Ali and Debranjan Pal and Abhijit Das and Dipanwita Roychowdhury
-
2022/518 ( PDF )
- Failing to hash into supersingular isogeny graphs
- Jeremy Booher and Ross Bowden and Javad Doliskani and Tako Boris Fouotsa and Steven D. Galbraith and Sabrina Kunzweiler and Simon-Philipp Merz and Christophe Petit and Benjamin Smith and Katherine E. Stange and Yan Bo Ti and Christelle Vincent and José Felipe Voloch and Charlotte Weitkämper and Lukas Zobernig
-
2022/517 ( PDF )
- Local permutation polynomials and the action of e-Klenian groups
- Jaime Gutierrez and Jorge Jimenez Urroz
-
2022/516 ( PDF )
- zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge
- Dimitris Mouris and Charles Gouert and Nektarios Georgios Tsoutsos
-
2022/515 ( PDF )
- MOSFHET: Optimized Software for FHE over the Torus
- Antonio Guimarães and Edson Borin and Diego F. Aranha
-
2022/514 ( PDF )
- A Key-Recovery Side-Channel Attack on Classic McEliece
- Qian Guo and Andreas Johansson and Thomas Johansson
-
2022/513 ( PDF )
- CASCADA: Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks
- Adrián Ranea and Vincent Rijmen
-
2022/512 ( PDF )
- A Bit-Vector Differential Model for the Modular Addition by a Constant and its Applications to Differential and Impossible-Differential Cryptanalysis
- Seyyed Arash Azimi and Adrián Ranea and Mahmoud Salmasizadeh and Javad Mohajeri and Mohammad Reza Aref and Vincent Rijmen
-
2022/511 ( PDF )
- OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels
- Mo Zhang and Eduard Marin and David Oswald and Vassilis Kostakos and Mark Ryan and Benjamin Tag and Kleomenis Katevas
-
2022/510 ( PDF )
- Bulletproofs++
- Liam Eagen
-
2022/509 ( PDF )
- Lattice-Based Signature with Efficient Protocols, Revisited
- Corentin Jeudy and Adeline Roux-Langlois and Olivier Sanders
-
2022/508 ( PDF )
- Security of Truncated Permutation Without Initial Value
- Lorenzo Grassi and Bart Mennink
-
2022/507 ( PDF )
- Low-Latency Hardware Private Circuits
- David Knichel and Amir Moradi
-
2022/506 ( PDF )
- Design and analysis of a distributed ECDSA signing service
- Jens Groth and Victor Shoup
-
2022/505 ( PDF )
- Riding the Waves Towards Generic Single-Cycle Masking in Hardware
- Rishub Nagpal and Barbara Gigerl and Robert Primas and Stefan Mangard
-
2022/504 ( PDF )
- Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions
- Ziaur Rahman and Xun Yi and Sk. Tanzir Mehedi and Rafiqul Islam and Andrei Kelarev
-
2022/503 ( PDF )
- Towards a Formal Treatment of Logic Locking
- Peter Beerel and Marios Georgiou and Ben Hamlin and Alex J. Malozemoff and Pierluigi Nuzzo
-
2022/502 ( PDF )
- Fast Diffusion Block for Secret Key Cryptography
- Vlastimil Klima
-
2022/501 ( PDF )
- Another Concrete Quantum Cryptanalysis of Binary Elliptic Curves
- Dedy Septono Catur Putranto and Rini Wisnu Wardhani and Harashta Tatimma Larasati and Howon Kim
-
2022/500 ( PDF )
- Multi-Server PIR with Full Error Detection and Limited Error Correction
- Reo Eriguchi and Kaoru Kurosawa and Koji Nuida
-
2022/499 ( PDF )
- Practical Decentralized Oracle Contracts for Cryptocurrencies
- Varun Madathil and Sri AravindaKrishnan Thyagarajan and Dimitrios Vasilopoulos and Lloyd Fournier and Giulio Malavolta and Pedro Moreno-Sanchez
-
2022/498 ( PDF )
- Limitations of Information-theoretic Incompressible Encodings
- Petr Sedláček
-
2022/497 ( PDF )
- Protecting Distributed Primitives against Leakage: Equivocal Secret Sharing and More
- Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss
-
2022/496 ( PDF )
- Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium
- Naina Gupta and Arpan Jati and Anupam Chattopadhyay and Gautam Jha
-
2022/495 ( PDF )
- Maliciously Circuit-Private FHE from Information-Theoretic Principles
- Nico Döttling and Jesko Dujmovic
-
2022/494 ( PDF )
- Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM
- Emre Karabulut and Erdem Alkim and Aydin Aysu
-
2022/493 ( PDF )
- Don’t Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking
- Loïc Masure and Valence Cristiani and Maxime Lecomte and François-Xavier Standaert
-
2022/492 ( PDF )
- Towards Smart Contract-based Verification of Anonymous Credentials
- Robert Muth and Tarek Galal and Jonathan Heiss and Florian Tschorsch
-
2022/491 ( PDF )
- Multi-Party Computation in the GDPR
- Lukas Helminger and Christian Rechberger
-
2022/490 ( PDF )
- Information Bounds and Convergence Rates for Side-Channel Security Evaluators
- Loïc Masure and Gaëtan Cassiers and Julien Hendrickx and François-Xavier Standaert
-
2022/489 ( PDF )
- A Practical-Quantum Differential Attack on Block Ciphers
- Tarun Yadav and Manoj Kumar and Amit Kumar and S K Pal
-
2022/488 ( PDF )
- OrgAn: Organizational Anonymity with Low Latency
- Debajyoti Das and Easwar Vivek Mangipudi and Aniket Kate
-
2022/487 ( PDF )
- New Key Recovery Attack on Reduced-Round AES
- Navid Ghaedi Bardeh and Vincent Rijmen
-
2022/486 ( PDF )
- MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing
- Olivier Blazy and Pierre-Alain Fouque and Thibaut Jacques and Pascal Lafourcade and Cristina Onete and Léo Robert
-
2022/485 ( PDF )
- Two new classes of permutation trinomials over $\mathbb{F}_{q^3}$ with odd characteristic
- Xi Xie and Nian Li and Linjie Xu and Xiangyong Zeng and Xiaohu Tang
-
2022/484 ( PDF )
- VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering
- Jan Richter-Brockmann and Jakob Feldtkeller and Pascal Sasdrich and Tim Güneysu
-
2022/483 ( PDF )
- Drive (Quantum) Safe! – Towards Post-Quantum Security for V2V Communications
- Nina Bindel and Sarah McCarthy and Geoff Twardokus and Hanif Rahbari
-
2022/482 ( PDF )
- cuFE: High Performance Privacy Preserving Support Vector Machine with Inner-Product Functional Encryption
- KyungHyun Han and Wai-Kong Lee2 and Angshuman Karmakar and Jose Maria Bermudo Mera and Seong Oun Hwang
-
2022/481 ( PDF )
- India’s “Aadhaar” Biometric ID: Structure, Security, and Vulnerabilities
- Pratyush Ranjan Tiwari and Dhruv Agarwal and Prakhar Jain and Swagam Dasgupta and Preetha Datta and Vineet Reddy and Debayan Gupta
-
2022/480 ( PDF )
- Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
- Ahmet Can Mert and Aikata and Sunmin Kwon and Youngsam Shin and Donghoon Yoo and Yongwoo Lee and Sujoy Sinha Roy
-
2022/479 ( PDF )
- Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption
- Kaisei Kajita and Go Ohtake and Kazuto Ogawa and Koji Nuida and Tsuyoshi Takagi
-
2022/478 ( PDF )
- Property-Preserving Hash Functions and Combinatorial Group Testing
- Kazuhiko Minematsu
-
2022/477 ( PDF )
- Algorithm-Substitution Attacks on Cryptographic Puzzles
- Pratyush Ranjan Tiwari and Matthew Green
-
2022/476 ( PDF )
- {\sf TrCBC} is Insecure
- Debrup Chakraborty and Samir Kundu
-
2022/475 ( PDF )
- SIDH-sign: an efficient SIDH PoK-based signature
- Jesús-Javier Chi-Domínguez and Víctor Mateu and Lucas Pandolfo Perin
-
2022/474 ( PDF )
- Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication
- Catinca Mujdei and Arthur Beckers and Jose Bermundo and Angshuman Karmakar and Lennert Wouters and Ingrid Verbauwhede
-
2022/473 ( PDF )
- Understanding binary-Goppa decoding
- Daniel J. Bernstein
-
2022/472 ( PDF )
- On the Hardness of Module Learning With Errors with Short Distributions
- Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen
-
2022/471 ( PDF )
- Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis - A Report on the CHES Challenge Side-Channel Contest 2020
- Aron Gohr and Friederike Laus and Werner Schindler
-
2022/470 ( PDF )
- Designated-Verifier Linkable Ring Signatures
- Pourandokht Behrouz and Panagiotis Grontas and Vangelis Konstantakatos and Aris Pagourtzis and Marianna Spyrakou
-
2022/469 ( PDF )
- Efficient ASIC Architectures for Low Latency Niederreiter Decryption
- Daniel Fallnich and Shutao Zhang and Tobias Gemmeke
-
2022/468 ( PDF )
- Improved Pump and Jump BKZ by Sharp Simulator
- Leizhang Wang and Wenwen Xia and Geng Wang and Baocang Wang and Dawu Gu
-
2022/467 ( PDF )
- Armistice: Micro-Architectural Leakage Modelling for Masked Software Formal Verification
- Arnaud de Grandmaison and Karine Heydemann and Quentin L. Meunier
-
2022/466 ( PDF )
- Quantum binary quadratic form reduction
- Nicolas David and Thomas Espitau and Akinori Hosoyamada
-
2022/465 ( -- withdrawn -- )
- Băhēm: A Provably Secure Symmetric Cipher
- M. Rajululkahf
-
2022/464 ( PDF )
- Superposition Attacks on Pseudorandom Schemes based on Two or Less Permutations
- Shaoxuan Zhang and Chun Guo and Qingju Wang
-
2022/463 ( PDF )
- Reducing the Depth of Quantum FLT-Based Inversion Circuit
- Harashta Tatimma Larasati and Dedy Septono Catur Putranto and Rini Wisnu Wardhani and Howon Kim
-
2022/462 ( PDF )
- New optimization techniques for PlonK’s arithmetization
- Miguel Ambrona and Anne-Laure Schmitt and Raphael R. Toledo and Danny Willems
-
2022/461 ( PDF )
- Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks
- Wei Cheng and Sylvain Guilley and Jean-Luc Danger
-
2022/460 ( PDF )
- A Novel NIZK-based Privacy Preserving Biometric Identification Scheme for Internet of Things
- Lin You and Qiang Zhu and Gengran Hu
-
2022/459 ( PDF )
- SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers
- Nasour Bagheri and Sadegh Sadeghi and Prasanna Ravi and Shivam Bhasin and Hadi Soleimany
-
2022/458 ( PDF )
- Schwartz-Zippel for multilinear polynomials mod N
- Benedikt Bünz and Ben Fisch
-
2022/457 ( PDF )
- Improving Differential-Neural Distinguisher Model For DES, Chaskey and PRESENT
- Liu Zhang and Zilong Wang
-
2022/456 ( PDF )
- Robust, Revocable and Adaptively Secure Attribute-Based Encryption with Outsourced Decryption
- Anis Bkakria
-
2022/455 ( PDF )
- Proof of Availability & Retrieval in a Modular Blockchain Architecture
- Shir Cohen and Guy Goren and Lefteris Kokoris-Kogias and Alberto Sonnino and Alexander Spiegelman
-
2022/454 ( PDF )
- Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC
- Thomas Attema and Vincent Dunning and Maarten Everts and Peter Langenkamp
-
2022/453 ( -- withdrawn -- )
- Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach
- Sk. Tanzir Mehedi and Adnan Anwar and Ziaur Rahman and Kawsar Ahmed and Rafiqul Islam
-
2022/452 ( PDF )
- UTT: Decentralized Ecash with Accountable Privacy
- Alin Tomescu and Adithya Bhat and Benny Applebaum and Ittai Abraham and Guy Gueta and Benny Pinkas and Avishay Yanai
-
2022/451 ( PDF )
- Improved Stock Market Structure Using Cryptography
- Charanjit S. Jutla and Barry Mishra
-
2022/450 ( PDF )
- Astrape: Anonymous Payment Channels with Boring Cryptography
- Yuhao Dong and Ian Goldberg and Sergey Gorbunov and Raouf Boutaba
-
2022/449 ( PDF )
- On End-to-End Encryption
- Britta Hale and Chelsea Komlo
-
2022/448 ( PDF )
- Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021
- Sven Bauer and Hermann Drexler and Maximilian Gebhardt and Dominik Klein and Friederike Laus and Johannes Mittmann
-
2022/447 ( PDF )
- Leveled Multikey FHE with constant-size ciphertexts from RLWE
- Vanesa Daza and Paz Morillo and Sergi Rovira
-
2022/446 ( PDF )
- Fast Side-Channel Key-Recovery Attack against Elephant Dumbo
- Louis Vialar
-
2022/445 ( PDF )
- TWAP Oracle Attacks: Easier Done than Said?
- Torgin Mackinga and Tejaswi Nadahalli and Roger Wattenhofer
-
2022/444 ( PDF )
- A White-Box Speck Implementation using Self-Equivalence Encodings (Full Version)
- Joachim Vandersmissen and Adrián Ranea and Bart Preneel
-
2022/443 ( PDF )
- Attack on SHealS and HealS: the Second Wave of GPST
- Steven D. Galbraith and Yi-Fu Lai
-
2022/442 ( PDF )
- Quantum Attacks on PRFs Based on Public Random Permutations
- Tingting Guo and Peng Wang and Lei Hu and Dingfeng Ye
-
2022/441 ( PDF )
- Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection
- Paola de Perthuis and David Pointcheval
-
2022/440 ( PDF )
- A Security Model for Randomization-based Protected Caches
- Jordi Ribes-González and Oriol Farràs and Carles Hernández and Vatistas Kostalabros and Miquel Moretó
-
2022/439 ( PDF )
- Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms
- Hanno Becker and Vincent Hwang and Matthias J. Kannwischer and Lorenz Panny and Bo-Yin Yang
-
2022/438 ( PDF )
- Computing isogenies between finite Drinfeld modules
- Benjamin Wesolowski
-
2022/437 ( PDF )
- Continuous LWE is as Hard as LWE & Applications to Learning Gaussian Mixtures
- Aparna Gupte and Neekon Vafa and Vinod Vaikuntanathan
-
2022/436 ( PDF )
- Publicly Accountable Robust Multi-Party Computation
- Marc Rivinius and Pascal Reisert and Daniel Rausch and Ralf Küsters
-
2022/435 ( PDF )
- Fiat-Shamir for Proofs Lacks a Proof Even in the Presence of Shared Entanglement
- Frédéric Dupuis and Philippe Lamontagne and Louis Salvail
-
2022/434 ( PDF )
- Verifiable Quantum Advantage without Structure
- Takashi Yamakawa and Mark Zhandry
-
2022/433 ( PDF )
- McFly: Verifiable Encryption to the Future Made Practical
- Nico Döttling and Lucjan Hanzlik and Bernardo Magri and Stella Wohnig
-
2022/432 ( PDF )
- Classical Verification of Quantum Computations in Linear Time
- Jiayu Zhang
-
2022/431 ( PDF )
- Non-Adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions
- Xinyu Mao and Noam Mazor and Jiapeng Zhang
-
2022/430 ( PDF )
- Is the JCJ voting system really coercion-resistant?
- Véronique Cortier and Pierrick Gaudry and Quentin Yang
-
2022/429 ( PDF )
- Resurrecting Xifrat - Compact Cryptosystems 2nd Attempt
- Jianfang "Danny" Niu
-
2022/428 ( PDF )
- Implicit White-Box Implementations: White-Boxing ARX Ciphers
- Adrián Ranea and Joachim Vandersmissen and Bart Preneel
-
2022/427 ( PDF )
- Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications
- Katarzyna Kapusta and Matthieu Rambaud and Ferdinand Sibleyras
-
2022/426 ( PDF )
- Spectre Declassified: Reading from the Right Place at the Wrong Time
- Basavesh Ammanaghatta Shivakumar and Jack Barnes and Gilles Barthe and Sunjay Cauligi and Chitchanok Chuengsatiansup and Daniel Genkin and Sioli O'Connell and Peter Schwabe and Rui Qi Sim and Yuval Yarom
-
2022/425 ( PDF )
- New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks
- Charles Gouert and Dimitris Mouris and Nektarios Georgios Tsoutsos
-
2022/424 ( PDF )
- Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2
- Dor Amzaleg and Itai Dinur
-
2022/423 ( PDF )
- Polynomial Approximation of Inverse sqrt Function for FHE
- Samanvaya Panda
-
2022/422 ( PDF )
- Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions
- Diego F. Aranha and Carsten Baum and Kristian Gjøsteen and Tjerand Silde
-
2022/421 ( PDF )
- Multiverse of HawkNess: A Universally-Composable MPC-based Hawk Variant
- Aritra Banerjee and Hitesh Tewari
-
2022/420 ( PDF )
- Gemini: Elastic SNARKs for Diverse Environments
- Jonathan Bootle and Alessandro Chiesa and Yuncong Hu and Michele Orrù
-
2022/419 ( PDF )
- Dew: Transparent Constant-sized zkSNARKs
- Arasu Arun and Chaya Ganesh and Satya Lokam and Tushar Mopuri and Sriram Sridhar
-
2022/418 ( PDF )
- LLTI: Low-Latency Threshold Implementations
- Victor Arribas and Zhenda Zhang and Svetla Nikova
-
2022/417 ( PDF )
- Efficient, Actively Secure MPC with a Dishonest Majority: a Survey
- Emmanuela Orsini
-
2022/416 ( PDF )
- Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives
- Maxime Buser and Joseph K. Liu and Ron Steinfeld and Amin Sakzad
-
2022/415 ( PDF )
- Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security
- Saikrishna Badrinarayanan and Daniel Masny and Pratyay Mukherjee
-
2022/414 ( PDF )
- PQ-HPKE: Post-Quantum Hybrid Public Key Encryption
- Mila Anastasova and Panos Kampanakis and Jake Massimo
-
2022/413 ( PDF )
- Instachain: Breaking the Sharding Limits via Adjustable Quorums
- Mustafa Safa Ozdayi and Yue Guo and Mahdi Zamani
-
2022/412 ( PDF )
- Complete and Improved FPGA Implementation of Classic McEliece
- Po-Jen Chen and Tung Chou and Sanjay Deshpande and Norman Lahr and Ruben Niederhagen and Jakub Szefer and Wen Wang
-
2022/411 ( PDF )
- Quotient Approximation Modular Reduction
- Aurélien Greuet and Simon Montoya and Clémence Vermeersch
-
2022/410 ( PDF )
- Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home
- Ziaur Rahman and Xun Yi and Mustain Billah and Mousumi Sumi and Adnan Anwar
-
2022/409 ( PDF )
- Proof-of-Stake Is a Defective Mechanism
- Vicent Sus
-
2022/408 ( PDF )
- On the weightwise nonlinearity of weightwise perfectly balanced functions
- Agnese Gini and Pierrick Méaux
-
2022/407 ( PDF )
- Improving the Privacy of Tor Onion Services
- Edward Eaton and Sajin Sasy and Ian Goldberg
-
2022/406 ( PDF )
- Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK
- Helger Lipmaa and Janno Siim and Michal Zajac
-
2022/405 ( PDF )
- Benchmarking and Analysing the NIST PQC Finalist Lattice-Based Signature Schemes on the ARM Cortex M7
- James Howe and Bas Westerbaan
-
2022/404 ( PDF )
- Constant Latency in Sleepy Consensus
- Atsuki Momose and Ling Ren
-
2022/403 ( PDF )
- A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
- Lorenzo Grassi and Yonglin Hao and Christian Rechberger and Markus Schofnegger and Roman Walch and Qingju Wang
-
2022/402 ( PDF )
- Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
- Jinyu Lu and Yunwen Liu and Tomer Ashur and Bing Sun and Chao Li
-
2022/401 ( PDF )
- A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
- Cas Cremers and Caroline Fontaine and Charlie Jacomme
-
2022/400 ( PDF )
- Quantum Advantage from Any Non-Local Game
- Yael Tauman Kalai and Alex Lombardi and Vinod Vaikuntanathan and Lisa Yang
-
2022/399 ( PDF )
- The Inverse of $\chi$ and Its Applications to Rasta-like Ciphers
- Fukang Liu and Santanu Sarkar and Willi Meier and Takanori Isobe
-
2022/398 ( PDF )
- Auditable, Available and Resilient Private Computation on the Blockchain via MPC
- Christopher Cordi and Michael P. Frank and Kasimir Gabert and Carollan Helinski and Ryan C. Kao and Vladimir Kolesnikov and Abrahim Ladha and Nicholas Pattengale
-
2022/397 ( PDF )
- Revocable Hierarchical Attribute-based Signatures from Lattices
- Daniel Gardham and Mark Manulis
-
2022/396 ( PDF )
- Side-channel attacks based on power trace decomposition
- Fanliang Hu and Huanyu Wang and Junnian Wang
-
2022/395 ( PDF )
- A lightweight verifiable secret sharing scheme in IoTs
- Likang Lu and Jianzhu Lu
-
2022/394 ( PDF )
- Fuzz, Penetration, and AI Testing for SoC Security Verification: Challenges and Solutions
- Kimia Zamiri Azar and Muhammad Monir Hossain and Arash Vafaei and Hasan Al Shaikh and Nurun N. Mondol and Fahim Rahman and Mark Tehranipoor and Farimah Farahmandi
-
2022/393 ( PDF )
- Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation
- Yashvanth Kondi and abhi shelat
-
2022/392 ( PDF )
- Poly Onions: Achieving Anonymity in the Presence of Churn
- Megumi Ando and Miranda Christ and Anna Lysyanskaya and Tal Malkin
-
2022/391 ( PDF )
- An Improved Model on the Vague Sets-Based DPoS’s Voting Phase in Blockchain
- Lin You and Zhuobiao Wang and Gengran Hu and Chengtang Cao
-
2022/390 ( PDF )
- An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain
- Lin You and Xinhua Zhang and Gengran Hu and Longbo Han
-
2022/389 ( PDF )
- Higher-order masked Saber
- Suparna Kundu and Jan-Pieter D’Anvers and Michiel Van Beirendonck and Angshuman Karmakar and Ingrid Verbauwhede
-
2022/388 ( PDF )
- Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing
- Zhonghui Ge and Yi Zhang and Yu Long and Dawu Gu
-
2022/387 ( PDF )
- Phase-shift Fault Analysis of Grain-128
- Hridya P R and Jimmy Jose
-
2022/386 ( PDF )
- Secure Two-party Computation Approach for NTRUEncrypt
- Lin You and Yan Wang and Liang Li and Gengran Hu
-
2022/385 ( PDF )
- ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest
- Guillaume Barbu and Ward Beullens and Emmanuelle Dottax and Christophe Giraud and Agathe Houzelot and Chaoyun Li and Mohammad Mahzoun and Adrián Ranea and Jianrui Xie
-
2022/384 ( PDF )
- Light Clients for Lazy Blockchains
- Ertem Nusret Tas and Dionysis Zindros and Lei Yang and David Tse
-
2022/383 ( PDF )
- On Succinct Non-Interactive Arguments in Relativized Worlds
- Megan Chen and Alessandro Chiesa and Nicholas Spooner
-
2022/382 ( PDF )
- Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups
- Matteo Campanelli and Rosario Gennaro and Kelsey Melissaris and Luca Nizzardo
-
2022/381 ( PDF )
- On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
- Hirotomo Shinoki and Koji Nuida
-
2022/380 ( PDF )
- A Linear-Time 2-Party Secure Merge Protocol
- Brett Hemenway Falk and Rohit Nema and Rafail Ostrovsky
-
2022/379 ( PDF )
- Fully Secure PSI via MPC-in-the-Head
- S. Dov Gordon and Carmit Hazay and Phi Hung Le
-
2022/378 ( PDF )
- Share & Shrink: Ad-Hoc Threshold FHE with Short Ciphertexts and its Application to Almost-Asynchronous MPC
- Antoine Urban and Matthieu Rambaud
-
2022/377 ( PDF )
- (Commit-and-Prove) Predictable Arguments with Privacy
- Hamidreza Khoshakhlagh
-
2022/376 ( PDF )
- Universally Composable End-to-End Secure Messaging
- Ran Canetti and Palak Jain and Marika Swanberg and Mayank Varia
-
2022/375 ( PDF )
- A Note on the Security Framework of Two-key DbHtS MACs
- Tingting Guo and Peng Wang
-
2022/374 ( PDF )
- Simple Three-Round Multiparty Schnorr Signing with Full Simulatability
- Yehuda Lindell
-
2022/373 ( PDF )
- Blind accumulators for e-voting
- Sergey Agievich
-
2022/372 ( PDF )
- Shorter quantum circuits
- Vadym Kliuchnikov and Kristin Lauter and Romy Minko and Christophe Petit and Adam Paetznick
-
2022/371 ( PDF )
- A High-performance ECC Processor over Curve448 based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier
- Asep Muhamad Awaludin and Jonguk Park and Rini Wisnu Wardhani and Howon Kim
-
2022/370 ( PDF )
- Efficient NIZKs from LWE via Polynomial Reconstruction and ``MPC in the Head"
- Riddhi Ghosal and Paul Lou and Amit Sahai
-
2022/369 ( PDF )
- Matching Attacks on Romulus-M
- Makoto Habu and and Kazuhiko Minematsu and Tetsu Iwata
-
2022/368 ( PDF )
- Spiral: Fast, High-Rate Single-Server PIR via FHE Composition
- Samir Jordan Menon and David J. Wu
-
2022/367 ( PDF )
- Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings and Supersingular Isogeny-Based Protocols
- Patrick Longa
-
2022/366 ( PDF )
- On the Algebraic Degree of Iterated Power Functions
- Clémence Bouvier and Anne Canteaut and Léo Perrin
-
2022/365 ( PDF )
- Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform
- Kathrin Hövelmanns and Andreas Hülsing and Christian Majenz
-
2022/364 ( PDF )
- Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE
- Aymeric Genêt and Novak Kaluđerović
-
2022/363 ( PDF )
- An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security
- Damiano Abram and Ivan Damgård and Claudio Orlandi and Peter Scholl
-
2022/362 ( PDF )
- How to Backdoor (Classical) McEliece and How to Guard Against Backdoors
- Alexander May and Carl Richard Theodor Schneider
-
2022/361 ( PDF )
- Base64 Malleability in Practice
- Panagiotis Chatzigiannis and Konstantinos Chalkias
-
2022/360 ( PDF )
- Privacy-Preserving Contrastive Explanations with Local Foil Trees
- Thijs Veugen and Bart Kamphorst and Michiel Marcus
-
2022/359 ( PDF )
- How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks
- Aljosha Judmayer and Nicholas Stifter and Philipp Schindler and Edgar Weippel
-
2022/358 ( PDF )
- Optimal Private Set Union from Multi-Query Reverse Private Membership Test
- Cong Zhang and Yu Chen and Weiran Liu and Min Zhang and Dongdai Lin
-
2022/357 ( PDF )
- An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves
- Antonin Leroux
-
2022/356 ( PDF )
- A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles
- MUSTAIN BILLAH and SK. TANZIR MEHEDI and ADNAN ANWAR and ZIAUR RAHMAN and RAFIQUL ISLAM
-
2022/355 ( PDF )
- A More Complete Analysis of the Signal Double Ratchet Algorithm
- Alexander Bienstock and Jaiden Fairoze and Sanjam Garg and Pratyay Mukherjee and Srinivasan Raghuraman
-
2022/354 ( PDF )
- Optimal Synchronous Approximate Agreement with Asynchronous Fallback
- Diana Ghinea and Chen-Da Liu-Zhang and Roger Wattenhofer
-
2022/353 ( PDF )
- SNARGs for P from Sub-exponential DDH and QR
- James Hulett and Ruta Jawale and Dakshita Khurana and Akshayaram Srinivasan
-
2022/352 ( PDF )
- Co-factor clearing and subgroup membership testing on pairing-friendly curves
- Youssef El Housni and Aurore Guillevic and Thomas Piellard
-
2022/351 ( PDF )
- Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt
- Andreas Hülsing and Matthias Meijers and Pierre-Yves Strub
-
2022/350 ( PDF )
- DO NOT RUG ON ME: ZERO-DIMENSIONAL SCAM DETECTION
- Bruno Mazorra and Victor Adan and Vanesa Daza
-
2022/349 ( PDF )
- Hard Homogeneous Spaces from the Class Field Theory of Imaginary Hyperelliptic Function Fields
- Antoine Leudière and Pierre-Jean Spaenlehauer
-
2022/348 ( PDF )
- Fast Subgroup Membership Testings for $\G_1$, $\G_2$ and $\G_T$ on Pairing-friendly Curves
- Yu Dai and Kaizhan Lin and Zijian Zhou and Chang-An Zhao
-
2022/347 ( PDF )
- Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition
- Taechan Kim and Hyesun Kwak and Dongwon Lee and Jinyeong Seo and Yongsoo Song
-
2022/346 ( PDF )
- Recovering the tight security proof of $SPHINCS^{+}$
- Andreas Hülsing and Mikhail Kudinov
-
2022/345 ( PDF )
- On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
- Wouter Castryck and Marc Houben and Frederik Vercauteren and Benjamin Wesolowski
-
2022/344 ( PDF )
- Shorter Signatures from MQ
- William Wang
-
2022/343 ( PDF )
- Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation
- Yuval Ishai and Alexis Korb and Paul Lou and Amit Sahai
-
2022/342 ( PDF )
- From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications
- Lorenzo Grassi and Morten Øygarden and Markus Schofnegger and Roman Walch
-
2022/341 ( PDF )
- Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher
- Nicoleta-Norica Băcuieți and Lejla Batina and Stjepan Picek
-
2022/340 ( PDF )
- To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA
- Azade Rezaeezade and Guilherme Perin and Stjepan Picek
-
2022/339 ( PDF )
- New Digital Signature Algorithm EHT
- Igor Semaev
-
2022/338 ( PDF )
- Private Intersection-Weighted-Sum
- Koji Chida and Koki Hamada and Atsunori Ichikawa and Masanobu Kii and Junichi Tomida
-
2022/337 ( PDF )
- Improving Software Quality in Cryptography Standardization Projects
- Matthias J. Kannwischer and Peter Schwabe and Douglas Stebila and Thom Wiggers
-
2022/336 ( PDF )
- Batch Arguments for NP and More from Standard Bilinear Group Assumptions
- Brent Waters and David J. Wu
-
2022/335 ( PDF )
- Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System
- Tuan-Hong Chua and Iftekhar Salam
-
2022/334 ( PDF )
- Private Set Intersection from Pseudorandom Correlation Generators
- Dung Bui and Geoffroy Couteau
-
2022/333 ( PDF )
- We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption
- Dandan Yuan and Shujie Cui and Giovanni Russello
-
2022/332 ( PDF )
- CostCO: An automatic cost modeling framework for secure multi-party computation
- Vivian Fang and Lloyd Brown and William Lin and Wenting Zheng and Aurojit Panda and Raluca Ada Popa
-
2022/331 ( PDF )
- Parallelizable Authenticated Encryption with Small State Size
- Akiko Inoue and Kazuhiko Minematsu
-
2022/330 ( PDF )
- A Simple and Generic Approach to Dynamic Collusion Model
- Rachit Garg and Rishab Goyal and George Lu
-
2022/329 ( PDF )
- Rolling up lattice cryptography primes
- Daniel R. L. Brown
-
2022/328 ( PDF )
- On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks
- Lennert Wouters and Benedikt Gierlichs and Bart Preneel
-
2022/327 ( PDF )
- Provable Secure Software Masking in the Real-World
- Arthur Beckers and Lennert Wouters and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede
-
2022/326 ( PDF )
- Composable Dynamic Secure Emulation
- Pierre Civit and Maria Potop-Butucaru
-
2022/325 ( PDF )
- FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level
- Michail Moraitis and Elena Dubrova
-
2022/324 ( PDF )
- Backward-Leak Uni-Directional Updatable Encryption from Public Key Encryption
- Yao Jiang Galteland and Jiaxin Pan
-
2022/323 ( PDF )
- Dilithium for Memory Constrained Devices
- Joppe W. Bos and Joost Renes and Daan Sprenkels
-
2022/322 ( PDF )
- SecFloat: Accurate Floating-Point meets Secure 2-Party Computation
- Deevashwer Rathee and Anwesh Bhattacharya and Rahul Sharma and Divya Gupta and Nishanth Chandran and Aseem Rastogi
-
2022/321 ( PDF )
- zkKYC in DeFi: An approach for implementing the zkKYC solution concept in Decentralized Finance
- Pieter Pauwels and Joni Pirovich and Peter Braunz and Jack Deeb
-
2022/320 ( PDF )
- Blazing Fast PSI from Improved OKVS and Subfield VOLE
- Peter Rindal and Srinivasan Raghuraman
-
2022/319 ( PDF )
- A Blockchain-based Long-term Time-Stamping Scheme
- Long Meng and Liqun Chen
-
2022/318 ( PDF )
- Efficient Online-friendly Two-Party ECDSA Signature
- Haiyang Xue and Man Ho Au and Xiang Xie and Tsz Hon Yuen and Handong Cui
-
2022/317 ( PDF )
- Thora: Atomic And Privacy-Preserving Multi-Channel Updates
- Lukas Aumayr and Kasra Abbaszadeh and Matteo Maffei
-
2022/316 ( PDF )
- Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions
- Shweta Agrawal and Fuyuki Kitagawa and Anuja Modi and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
-
2022/315 ( PDF )
- Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN
- Damiano Abram and Peter Scholl
-
2022/314 ( PDF )
- Batch-OT with Optimal Rate
- Zvika Brakerski and Pedro Branco and Nico Döttling and Sihang Pu
-
2022/313 ( PDF )
- Efficient Proof of RAM Programs from Any Public-Coin Zero-Knowledge System
- Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Titouan Tanguy and Michiel Verbauwhede
-
2022/312 ( PDF )
- Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols
- Shahar P. Cohen and Moni Naor
-
2022/311 ( PDF )
- Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE
- Peihan Miao and Sikhar Patranabis and Gaven Watson
-
2022/310 ( PDF )
- Dispute-free Scalable Open Vote Network using zk-SNARKs
- Muhammad ElSheikh and Amr M. Youssef
-
2022/309 ( PDF )
- On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing
- Ashrujit Ghoshal and Ilan Komargodski
-
2022/308 ( PDF )
- Colordag: An Incentive-Compatible Blockchain
- Ittai Abraham and Danny Dolev and Ittay Eyal and Joseph Y. Halpern
-
2022/307 ( PDF )
- An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
- Olivier Blazy and Sayantan Mukherjee and Huyen Nguyen and Duong Hieu Phan and Damien Stehle
-
2022/306 ( PDF )
- The More You Know: Improving Laser Fault Injection with Prior Knowledge
- Marina Krček and Thomas Ordas and Daniele Fronte and Stjepan Picek
-
2022/305 ( PDF )
- Surveying definitions of election verifiability
- Ben Smyth and Michael R. Clarkson
-
2022/304 ( PDF )
- Multi-User BBB Security of Public Permutations Based MAC
- Yu Long Chen and Avijit Dutta and Mridul Nandi
-
2022/303 ( PDF )
- Unlinkable Delegation of WebAuthn Credentials
- Nick Frymann and Daniel Gardham and Mark Manulis
-
2022/302 ( PDF )
- SoK: Oblivious Pseudorandom Functions
- Sílvia Casacuberta and Julia Hesse and Anja Lehmann
-
2022/301 ( PDF )
- How Practical are Fault Injection Attacks, Really?
- Jakub Breier and Xiaolu Hou
-
2022/300 ( PDF )
- Faster NTRU on ARM Cortex-M4 with TMVP-based multiplication
- Irem Keskinkurt Paksoy and Murat Cenk
-
2022/299 ( PDF )
- Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3
- Yanhong Fan,Muzhou Li,Chao Niu,Zhenyu Lu,Meiqin Wang
-
2022/298 ( PDF )
- Constructive Post-Quantum Reductions
- Nir Bitansky and Zvika Brakerski and Yael Tauman Kalai
-
2022/297 ( PDF )
- Promise $\Sigma$-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups
- Yi Deng and Shunli Ma and Xinxuan Zhang and Hailong Wang and Xuyang Song and Xiang Xie
-
2022/296 ( PDF )
- On new results on Extremal Graph Theory, Theory of Algebraic Graphs and their applications in Cryptography and Coding Theory.
- Vasyl Ustimenko
-
2022/295 ( PDF )
- Quantum Proofs of Deletion for Learning with Errors
- Alexander Poremba
-
2022/294 ( PDF )
- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets
- Saikrishna Badrinarayanan and Ranjit Kumaresan and Mihai Christodorescu and Vinjith Nagaraja and Karan Patel and Srinivasan Raghuraman and Peter Rindal and Wei Sun and Minghua Xu
-
2022/293 ( PDF )
- Minimizing Setup in Broadcast-Optimal Two Round MPC
- Ivan Damgård and Divya Ravi and Luisa Siniscalchi and Sophia Yakoubov
-
2022/292 ( PDF )
- Comment on ``SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices''
- Michael Amar and Amit Kama and Kang Wang and Yossi Oren
-
2022/291 ( PDF )
- Provable security of CFB mode of operation with external re-keying
- Vadim Tsypyschev and Iliya Morgasov
-
2022/290 ( PDF )
- Universally Composable Sigma-protocols in the Global Random-Oracle Model
- Anna Lysyanskaya and Leah Namisa Rosenbloom
-
2022/289 ( PDF )
- Two Attacks On Proof-of-Stake GHOST/Ethereum
- Joachim Neu and Ertem Nusret Tas and David Tse
-
2022/288 ( PDF )
- Spats: user-defined confidential assets for the Spark transaction protocol
- Aaron Feickert and Aram Jivanyan
-
2022/287 ( PDF )
- User-Perceived Privacy in Blockchain
- Simin Ghesmati and Walid Fdhila and Edgar Weippl
-
2022/286 ( PDF )
- Provably Secure Identity-Based Remote Password Registration
- Csanád Bertók and Andrea Huszti and Szabolcs Kovács and Norbert Oláh
-
2022/285 ( PDF )
- Usability of Cryptocurrency Wallets Providing CoinJoin Transactions
- Simin Ghesmati and Walid Fdhila and Edgar Weippl
-
2022/284 ( PDF )
- Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General
- Vadim Lyubashevsky and Ngoc Khanh Nguyen and Maxime Plancon
-
2022/283 ( PDF )
- Block-Cipher-Based Tree Hashing
- Aldo Gunsing
-
2022/282 ( PDF )
- Achievable CCA2 Relaxation for Homomorphic Encryption
- Adi Akavia and Craig Gentry and Shai Halevi and Margarita Vald
-
2022/281 ( PDF )
- Succinct Interactive Oracle Proofs: Applications and Limitations
- Shafik Nassar and Ron D. Rothblum
-
2022/280 ( PDF )
- Efficient Homomorphic Evaluation on Large Interval
- Jung Hee Cheon and Wootae Kim and Jai Hyun Park
-
2022/279 ( PDF )
- Permutation rotation-symmetric Sboxes, liftings and affine equivalence
- Tron Omland and Pantelimon Stanica
-
2022/278 ( PDF )
- Incompressiblity and Next-Block Pseudoentropy
- Iftach Haitner and Noam Mazor and Jad Silbak
-
2022/277 ( PDF )
- Security Analysis of Elliptic Curves over Sextic Extension of Small Prime Fields
- Robin Salen and Vijaykumar Singh and Vladimir Soukharev
-
2022/276 ( PDF )
- Hardness estimates of the Code Equivalence Problem in the Rank Metric
- Krijn Reijnders and Simona Samardjiska and Monika Trimoska
-
2022/275 ( PDF )
- Concrete Analysis of Approximate Ideal-SIVP to Decision Ring-LWE Reduction
- Neal Koblitz and Subhabrata Samajder and Palash Sarkar and Subhadip Singha
-
2022/274 ( PDF )
- EcGFp5: a Specialized Elliptic Curve
- Thomas Pornin
-
2022/273 ( PDF )
- Compact Storage for Homomorphic Encryption
- Adi Akavia and Neta Oren and Boaz Sapir and Margarita Vald
-
2022/272 ( PDF )
- Quantum-Secure Aggregate One-time Signatures with Detecting Functionality
- Shingo Sato and Junji Shikata
-
2022/271 ( PDF )
- Approximate Divisor Multiples -- Factoring with Only a Third of the Secret CRT-Exponents
- Alexander May and Julian Nowakowski and Santanu Sarkar
-
2022/270 ( PDF )
- Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM
- Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner
-
2022/269 ( PDF )
- ON CODES AND LEARNING WITH ERRORS OVER FUNCTION FIELDS
- Maxime Bombar and Alain Couvreur and Thomas Debris-Alazard
-
2022/268 ( PDF )
- Efficient Schemes for Committing Authenticated Encryption
- Mihir Bellare and Viet Tung Hoang
-
2022/267 ( PDF )
- Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms
- Gang Tang and Dung Hoang Duong and Antoine Joux and Thomas Plantard and Youming Qiao and Willy Susilo
-
2022/266 ( PDF )
- Verifiably Distributed Multi-User Secret Sharing schemes
- Likang Lu and Jianzhu Lu
-
2022/265 ( PDF )
- Non-interactive Mimblewimble transactions, revisited
- Georg Fuchsbauer and Michele Orrù
-
2022/264 ( PDF )
- Gradecast in Synchrony and Reliable Broadcast in Asynchrony with Optimal Resilience, Efficiency, and Unconditional Security
- Ittai Abraham and Gilad Asharov
-
2022/263 ( PDF )
- Rethinking Modular Multi-Exponentiation in Real-World Applications
- Vidal Attias and Luigi Vigneri and Vassil Dimitrov
-
2022/262 ( PDF )
- Secure Non-Interactive Reduction and Spectral Analysis of Correlations
- Pratyush Agarwal and Varun Narayanan and Shreya Pathak and Manoj Prabhakaran and Vinod M. Prabhakaran and Mohammad Ali Rehan
-
2022/261 ( PDF )
- Sublinear GMW-Style Compiler for MPC with Preprocessing
- Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof
-
2022/260 ( PDF )
- Advances in Logic Locking: Past, Present, and Prospects
- Hadi Mardani Kamali and Kimia Zamiri Azar and Farimah Farahmandi and Mark Tehranipoor
-
2022/259 ( PDF )
- Partial Key Exposure Attacks on BIKE, Rainbow and NTRU
- Andre Esser and Alexander May and Javier Verbel and Weiqiang Wen
-
2022/258 ( PDF )
- Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications
- Hasan Al Shaikh and Mohammad Bin Monjil and Shigang Chen and Farimah Farahmandi and Navid Asadizanjani and Mark Tehranipoor and Fahim Rahman
-
2022/257 ( PDF )
- Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols
- Ran Cohen and Jack Doerner and Yashvanth Kondi and abhi shelat
-
2022/256 ( PDF )
- Multi-Designated Receiver Signed Public Key Encryption
- Ueli Maurer and Christopher Portmann and Guilherme Rito
-
2022/255 ( PDF )
- Round-Optimal Byzantine Agreement
- Diana Ghinea and Vipul Goyal and Chen-Da Liu-Zhang
-
2022/254 ( PDF )
- Unprotected and Masked Hardware Implementations of Spook v2
- Charles Momin and Gaëtan Cassiers and François-Xavier Standaert
-
2022/253 ( PDF )
- The Side-Channel Metric Cheat Sheet
- Kostas Papagiannopoulos and Ognjen Glamocanin and Melissa Azouaoui and Dorian Ros and Francesco Regazzoni and Mirjana Stojilovic
-
2022/252 ( PDF )
- Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations
- Charles Momin and Gaëtan Cassiers and François-Xavier Standaert
-
2022/251 ( PDF )
- CoCoA: Concurrent Continuous Group Key Agreement
- Joël Alwen and Benedikt Auerbach and Miguel Cueto Noval and Karen Klein and Guillermo Pascual-Perez and Krzysztof Pietrzak and Michael Walter
-
2022/250 ( PDF )
- Private Circuits with Quasilinear Randomness
- Vipul Goyal and Yuval Ishai and Yifan Song
-
2022/249 ( PDF )
- The Summation-Truncation Hybrid: Reusing Discarded Bits for Free
- Aldo Gunsing and Bart Mennink
-
2022/248 ( PDF )
- Collapseability of Tree Hashes
- Aldo Gunsing and Bart Mennink
-
2022/247 ( PDF )
- Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
- Aldo Gunsing and Joan Daemen and Bart Mennink
-
2022/246 ( PDF )
- On the Concrete Security of TLS 1.3 PSK Mode
- Hannah Davis and Denis Diemert and Felix Günther and Tibor Jager
-
2022/245 ( PDF )
- Entropic Hardness of Module-LWE from Module-NTRU
- Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen
-
2022/244 ( PDF )
- Universally Composable Subversion-Resilient Cryptography
- Suvradip Chakraborty and Bernardo Magri and Jesper Buus Nielsen and Daniele Venturi
-
2022/243 ( PDF )
- A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis
- Ling Sun and Bart Preneel and Wei Wang and Meiqin Wang
-
2022/242 ( PDF )
- YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model
- Ignacio Cascudo and Bernardo David and Lydia Garms and Anders Konring
-
2022/241 ( PDF )
- Coalition and Threshold Hash-Based Signatures
- John Kelsey and Stefan Lucks
-
2022/240 ( PDF )
- SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients
- Hamza Abusalah and Georg Fuchsbauer and Peter Gaži and Karen Klein
-
2022/239 ( PDF )
- Several Improvements on BKZ Algorithm
- Ziyu Zhao and Jintai Ding
-
2022/238 ( PDF )
- HEAD: an FHE-based Outsourced Computation Protocol with Compact Storage and Efficient Computation
- Lijing Zhou and Ziyu Wang and Xiao Zhang and Yu Yu
-
2022/237 ( PDF )
- Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions
- Jesper Buus Nielsen and João Ribeiro and Maciej Obremski
-
2022/236 ( PDF )
- Characterizing the qIND-qCPA (in)security of the CBC, CFB, OFB and CTR modes of operation
- Tristan NEMOZ and Zoé AMBLARD and Aurélien DUPIN
-
2022/235 ( PDF )
- Limits of Preprocessing for Single-Server PIR
- Giuseppe Persiano and Kevin Yeo
-
2022/234 ( PDF )
- New algorithms for the Deuring correspondence: SQISign twice as fast
- Luca De Feo and Antonin Leroux and Benjamin Wesolowski
-
2022/233 ( PDF )
- Variational quantum solutions to the Shortest Vector Problem
- Martin R. Albrecht and Miloš Prokop and Yixin Shen and Petros Wallden
-
2022/232 ( PDF )
- Conditional Variational AutoEncoder based on Stochastic Attack
- Gabriel Zaid and Lilian Bossuet and Mathieu Carbone and Amaury Habrard and Alexandre Venelli
-
2022/231 ( PDF )
- Towards Low-Latency Implementation of Linear Layers
- Qun Liu and Weijia Wang and Yanhong Fan and Lixuan Wu and Ling Sun and Meiqin Wang
-
2022/230 ( PDF )
- Apple vs. EMA: Electromagnetic Side Channel Attacks on Apple CoreCrypto
- Gregor Haas and Aydin Aysu
-
2022/229 ( PDF )
- WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography
- Markku-Juhani O. Saarinen
-
2022/228 ( PDF )
- Semi-Quantum Tokenized Signatures
- Omri Shmueli
-
2022/227 ( PDF )
- The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects
- Ben Nassi and Ras Swissa and Yuval Elovici and Boris Zadov
-
2022/226 ( PDF )
- To Label, or Not To Label (in Generic Groups)
- Mark Zhandry
-
2022/225 ( PDF )
- Constant matters: Fine-grained Complexity of Differentially Private Continual Observation Using Completely Bounded Norms
- Monika Henzinger and Jalaj Upadhyay
-
2022/224 ( PDF )
- Embedding the UC Model into the IITM Model
- Daniel Rausch and Ralf Kuesters and Céline Chevalier
-
2022/223 ( PDF )
- Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection
- Thibauld Feneuil and Jules Maire and Matthieu Rivain and Damien Vergnaud
-
2022/222 ( PDF )
- Half-Aggregation of Schnorr Signatures with Tight Reductions
- Yanbo Chen and Yunlei Zhao
-
2022/221 ( PDF )
- Secure Joint Communication and Sensing
- Onur Gunlu and Matthieu Bloch and Rafael F. Schaefer and Aylin Yener
-
2022/220 ( PDF )
- Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security
- Keita Emura and Shiho Moriai and Takuma Nakajima and Masato Yoshimi
-
2022/219 ( PDF )
- PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication
- Hanyu Jia and Xiangxue Li
-
2022/218 ( PDF )
- On the Impossibility of Key Agreements from Quantum Random Oracles
- Per Austrin and Hao Chung and Kai-Min Chung and Shiuan Fu and Yao-Ting Lin and Mohammad Mahmoody
-
2022/217 ( PDF )
- High-Performance Hardware Implementation of Lattice-Based Digital Signatures
- Luke Beckwith and Duc Tri Nguyen and Kris Gaj
-
2022/216 ( PDF )
- Short Leakage Resilient and Non-malleable Secret Sharing Schemes
- Nishanth Chandran and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar
-
2022/215 ( PDF )
- Multi-Client Functional Encryption with Fine-Grained Access Control
- Ky Nguyen and Duong Hieu Phan and David Pointcheval
-
2022/214 ( PDF )
- Breaking Rainbow Takes a Weekend on a Laptop
- Ward Beullens
-
2022/213 ( PDF )
- Issuer-Hiding Attribute-Based Credentials
- Jan Bobolz and Fabian Eidens and Stephan Krenn and Sebastian Ramacher and Kai Samelin
-
2022/212 ( PDF )
- Tight Analysis of Decrypton Failure Probability of Kyber in Reality
- Boyue Fang and Weize Wang and Yunlei Zhao
-
2022/211 ( PDF )
- Azeroth: Auditable Zero-knowledge Transactions in Smart Contracts
- Gweonho Jeong and Nuri Lee and Jihye Kim and Hyunok Oh
-
2022/210 ( PDF )
- An Analysis of the Algebraic Group Model
- Jonathan Katz and Cong Zhang and Hong-Sheng Zhou
-
2022/209 ( PDF )
- Blockchain based Contact Tracing: A Solution using Bluetooth and Sound Waves for Proximity Detection
- ZiXi Hee and Iftekhar Salam
-
2022/208 ( PDF )
- Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design
- Alon Shakevsky and Eyal Ronen and Avishai Wool
-
2022/207 ( PDF )
- Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference
- Zhicong Huang and Wen-jie Lu and Cheng Hong and Jiansheng Ding
-
2022/206 ( PDF )
- Proving UNSAT in Zero Knowledge
- Ning Luo and Timos Antonopoulos and William Harris and Ruzica Piskac and Eran Tromer and Xiao Wang
-
2022/205 ( PDF )
- Fiat-Shamir signatures without aborts using Ring-and-Noise assumptions
- Dipayan Das and Antoine Joux and Anand Kumar Narayanan
-
2022/204 ( PDF )
- RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library
- Furkan Aydin and Emre Karabulut and Seetal Potluri and Erdem Alkim and Aydin Aysu
-
2022/203 ( PDF )
- A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV
- Jean-Charles Faugère and Gilles macario-Rat and Jacques Patarin and Ludovic Perret
-
2022/202 ( PDF )
- Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLU's
- Abdelrahaman Aly and Kashif Nawaz and Eugenio Salazar and Victor Sucasas
-
2022/201 ( PDF )
- Enig: Player Replaceable Finality Layers with Optimal Validity
- Simon Holmgaard Kamp and Jesper Buus Nielsen and Søren Eller Thomsen and Daniel Tschudi
-
2022/200 ( PDF )
- Non-Black-Box Approach to Secure Two-Party Computation in Three Rounds
- Akshayaram Srinivasan
-
2022/199 ( PDF )
- Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing
- Giang Linh Duc Nguyen and Dung Hoang Duong and Huy Quoc Le and Willy Susilo
-
2022/198 ( PDF )
- Efficient FHEW Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption
- Yongwoo Lee and Daniele Micciancio and Andrey Kim and Rakyong Choi and Maxim Deryabin and Jieun Eom and Donghoon Yoo
-
2022/197 ( PDF )
- Nice Attacks --- but What is the Cost? Computational Models for Cryptanalysis
- Charles Bouillaguet
-
2022/196 ( PDF )
- Generalising Fault Attacks to Genus Two Isogeny Cryptosystems
- Ariana Goh and Chu-Wee Lim and Yan Bo Ti
-
2022/195 ( PDF )
- Quantum and Classical Algorithms for Bounded Distance Decoding
- Richard Allen and Ratip Emin Berker and Sílvia Casacuberta and Michael Gul
-
2022/194 ( PDF )
- Finding Collisions against 4-round SHA3-384 in Practical Time
- Senyang Huang and Orna Agmon Ben-Yehuda and Orr Dunkelman and Alexander Maximov
-
2022/193 ( PDF )
- OptRand: Optimistically responsive distributed random beacons
- Adithya Bhat and Aniket Kate and Kartik Nayak and Nibesh Shrestha
-
2022/192 ( PDF )
- SoftSpokenOT: Communication--Computation Tradeoffs in OT Extension
- Lawrence Roy
-
2022/191 ( PDF )
- NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead
- Andrew Park and Wei-Kai Lin and Elaine Shi
-
2022/190 ( PDF )
- Short-lived zero-knowledge proofs and signatures
- Arasu Arun and Joseph Bonneau and Jeremy Clark
-
2022/189 ( PDF )
- Simplified MITM Modeling for Permutations: New (Quantum) Attacks
- André Schrottenloher and Marc Stevens
-
2022/188 ( PDF )
- Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs
- Thibauld Feneuil and Antoine Joux and Matthieu Rivain
-
2022/187 ( PDF )
- Towards Efficient YOSO MPC Without Setup
- Sebastian Kolby and Divya Ravi and Sophia Yakoubov
-
2022/186 ( PDF )
- Overflow-detectable Floating-point Fully Homomorphic Encryption
- Seunghwan Lee and Dong-Joon Shin
-
2022/185 ( PDF )
- Statistically Sender-Private OT from LPN and Derandomization
- Nir Bitansky and Sapir Freizeit
-
2022/184 ( PDF )
- Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3
- Jian Guo and Guozhen Liu and Ling Song and Yi Tu
-
2022/183 ( PDF )
- Improving Differential-Neural Cryptanalysis with Inception Blocks
- Liu Zhang and Zilong Wang and Boyang Wang
-
2022/182 ( PDF )
- A Novel Framework for Explainable Leakage Assessment
- Si Gao and Elisabeth Oswald
-
2022/181 ( PDF )
- Vector Commitments over Rings and Compressed $\Sigma$-Protocols
- Thomas Attema and Ignacio Cascudo and Ronald Cramer and Ivan Bjerre Damgård and Daniel Escudero
-
2022/180 ( PDF )
- Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher
- Orel Cosseron and Clément Hoffmann and Pierrick Méaux and François-Xavier Standaert
-
2022/179 ( PDF )
- Locally Verifiable Signature and Key Aggregation
- Rishab Goyal and Vinod Vaikuntanathan
-
2022/178 ( PDF )
- Lower Bound on SNARGs in the Random Oracle Model
- Iftach Haitner and Daniel Nukrai and Eylon Yogev
-
2022/177 ( PDF )
- The Power of the Differentially Oblivious Shuffle in Distributed Privacy Mechanisms
- Mingxun Zhou and Elaine Shi
-
2022/176 ( PDF )
- Towards Fair Multiparty Computation in Scriptless Distributed Ledger Systems
- Minze Xu and Yuan Zhang and Sheng Zhong
-
2022/175 ( PDF )
- WeRLman: To Tackle Whale (Transactions), Go Deep (RL)
- Roi Bar-Zur and Ameer Abu-Hanna and Ittay Eyal and Aviv Tamar
-
2022/174 ( PDF )
- How to Launch a Powerful Side-Channel Collision Attack?
- Jiangshan Long and Changhai Ou and Yajun Ma and Yifan Fan and Hua Chen and Shihui Zheng
-
2022/173 ( PDF )
- Collision-Resistance from Multi-Collision-Resistance
- Ron D. Rothblum and Prashant Nalini Vasudevan
-
2022/172 ( PDF )
- A remark on NIST SP 800-22 serial test
- Corina-Elena Bogos and Razvan Mocanu and Emil Simion
-
2022/171 ( PDF )
- Practical and Improved Byzantine Reliable Broadcast and Asynchronous Verifiable Information Dispersal from Hash Functions
- Nicolas Alhaddad and Sisi Duan and Mayank Varia and Haibin Zhang
-
2022/170 ( PDF )
- gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from MPC in the Head, with Application to Proofs of Assets in Cryptocurrencies
- Foteini Baldimtsi and Panagiotis Chatzigiannis and S. Dov Gordon and Phi Hung Le and Daniel McVicker
-
2022/169 ( PDF )
- SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful
- Markku-Juhani O. Saarinen
-
2022/168 ( PDF )
- Hardness of Approximation for Stochastic Problems via Interactive Oracle Proofs
- Gal Arnon and Alessandro Chiesa and Eylon Yogev
-
2022/167 ( PDF )
- Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority
- Benny Applebaum and Eliran Kachlon and Arpita Patra
-
2022/166 ( PDF )
- Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges
- Thien Duc Nguyen and Markus Miettinen and Alexandra Dmitrienko and Ahmad-Reza Sadeghi and Ivan Visconti
-
2022/165 ( PDF )
- PAC Learnability of iPUF Variants
- Durba Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
-
2022/164 ( PDF )
- Shanrang: Fully Asynchronous Proactive Secret Sharing with Dynamic Committees
- Yunzhou Yan and Yu Xia and Srinivas Devadas
-
2022/163 ( PDF )
- A High Performance Payment Processing System Designed for Central Bank Digital Currencies
- James Lovejoy and Cory Fields and Madars Virza and Tyler Frederick and David Urness and Kevin Karwaski and Anders Brownworth and Neha Narula
-
2022/162 ( PDF )
- On the precision loss in approximate homomorphic encryption
- Anamaria Costache and Benjamin R. Curtis and Erin Hales and Sean Murphy and Tabitha Ogilvie and Rachel Player
-
2022/161 ( PDF )
- D-KODE: Mechanism to Generate and Maintain a Billion Keys
- Easwar Vivek Mangipudi and Aniket Kate
-
2022/160 ( PDF )
- Random primes in arithmetic progressions
- Pascal Giorgi and Bruno Grenet and Armelle Perret du Cray and Daniel S. Roche
-
2022/159 ( -- withdrawn -- )
- A Note on Blockchain Authentication Methods For Mobile Devices In Healthcare
- George-Mircea Grosu and Silvia-Elena Nistor and Emil Simion
-
2022/158 ( PDF )
- Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs
- Olivier Bronchain and Gaëtan Cassiers
-
2022/157 ( PDF )
- Shuffle-based Private Set Union: Faster and More Secure
- Yanxue Jia and Shi-Feng Sun and Hong-Sheng Zhou and Jiajun Du and Dawu Gu
-
2022/156 ( PDF )
- Cosmic Security
- Benjamin Chan and Cody Freitag and Rafael Pass
-
2022/155 ( PDF )
- FairTraDEX: A Decentralised Exchange Preventing Value Extraction
- Conor McMenamin and Vanesa Daza and Matthias Fitzi
-
2022/154 ( PDF )
- Coeus: A System for Oblivious Document Ranking and Retrieval
- Ishtiyaque Ahmad and Laboni Sarker and Divyakant Agrawal and Amr El Abbadi and Trinabh Gupta
-
2022/153 ( PDF )
- Faulty isogenies: a new kind of leakage
- Gora Adj and Jesús-Javier Chi-Domínguez and Víctor Mateu and Francisco Rodríguez-Henríquez
-
2022/152 ( PDF )
- K-XMSS and K-SPHINCS$^+$:Hash based Signatures with\\Korean Cryptography Algorithms
- Minjoo Sim and Siwoo Eum and Gyeongju Song and HyeokDong Kwon and Kyungbae Jang and HyunJun Kim and HyunJi Kim and Yujin Yang and Wonwoong Kim and Wai-Kong Lee and Hwajeong Seo
-
2022/151 ( PDF )
- Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
- Ling Sun and Wei Wang and Meiqin Wang
-
2022/150 ( PDF )
- The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography
- Tomoki Moriya and Hiroshi Onuki and Yusuke Aikawa and Tsuyoshi Takagi
-
2022/149 ( PDF )
- Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping
- Pierre-Emmanuel Clet and Martin Zuber and Aymen Boudguiga and Renaud Sirdey and Cédric Gouy-Pailler
-
2022/148 ( PDF )
- Attacks on the Firekite cipher
- Thomas Johansson and Willi Meier and Vu Nguyen
-
2022/147 ( PDF )
- Constructing new superclasses of bent functions from known ones
- Amar Bapić and Enes Pasalic and Fengrong Zhang and Samir Hodžić
-
2022/146 ( PDF )
- Training Differentially Private Models with Secure Multiparty Computation
- Sikha Pentyala and Davis Railsback and Ricardo Maia and Rafael Dowsley and David Melanson and Anderson Nascimento and Martine De Cock
-
2022/145 ( PDF )
- An elementary construction of QR-UOV
- Yasufumi Hashimoto
-
2022/144 ( PDF )
- Rainbow Differential Privacy
- Ziqi Zhou and Onur Gunlu and Rafael G. L. D'Oliveira and Muriel Medard and Parastoo Sadeghi and Rafael F. Schaefer
-
2022/143 ( PDF )
- Composition construction of new bent functions from known dually isomorphic bent functions
- Guangpu Gao and Weiguo Zhang and Yongjuan Wang
-
2022/142 ( PDF )
- Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications
- Muhammed F. Esgin and Ron Steinfeld and Raymond K. Zhao
-
2022/141 ( PDF )
- Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs
- Muhammed F. Esgin and Ron Steinfeld and Dongxi Liu and Sushmita Ruj
-
2022/140 ( PDF )
- On the Related-Key Attack Security of Authenticated Encryption Schemes
- Sebastian Faust and Juliane Krämer and Maximilian Orlt and Patrick Struck
-
2022/139 ( PDF )
- Sponge-based Authenticated Encryption: Security against Quantum Attackers
- Christian Janson and Patrick Struck
-
2022/138 ( PDF )
- Resisting Key-Extraction and Code-Compression: a Secure Implementation of the HFE Signature Scheme in the White-Box Model
- Pierre Galissant and Louis Goubin
-
2022/137 ( PDF )
- Ten years of cube attacks
- Marco Cianfriglia and Elia Onofri and Silvia Onofri and Marco Pedicini
-
2022/136 ( PDF )
- Twilight: A Differentially Private Payment Channel Network
- Maya Dotan and Saar Tochner and Aviv Zohar and Yossi Gilad
-
2022/135 ( PDF )
- Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers
- Zheng Xu and Yongqiang Li and Lin Jiao and Mingsheng Wang and Willi Meier
-
2022/134 ( PDF )
- Functional Cryptanalysis: Application to reduced-round Xoodoo
- Emanuele Bellini and Rusydi H. Makarim
-
2022/133 ( PDF )
- Faster verification of V2X BSM messages via Message Chaining
- Eduardo Lopes Cominetti and Marcos Vinicius M. Silva and Marcos A. Simplicio Jr. and Harsh Kupwade Patil and Jefferson E. Ricardini
-
2022/132 ( PDF )
- On Defeating Graph Analysis of Anonymous Transactions
- Christoph Egger and Russell W. F. Lai and Viktoria Ronge and Ivy K. Y. Woo and Hoover H. F. Yin
-
2022/131 ( PDF )
- Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange
- Yue Qin and Ruoyu Ding and Chi Cheng and Nina Bindel and Yanbin Pan and Jintai Ding
-
2022/130 ( PDF )
- A LeVeL Paying Field: Cryptographic Solutions towards Social Accountability and Financial Inclusion
- Gideon Samid
-
2022/129 ( PDF )
- TOFU - Toggle Count Analysis made simple
- Michael Gruber and Georg Sigl
-
2022/128 ( PDF )
- Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes
- Pierre Karpman and Charlotte Lefevre
-
2022/127 ( PDF )
- CCA secure ElGamal encryption over an integer group where ICDH assumption holds
- Gyu-Chol.Kim and Jae-Yong.Sin and Yong-Bok.Jong
-
2022/126 ( PDF )
- Storage Security in Cloud Computing: Data Auditing Protocols
- Andrei-Alexandru Brebu and Mihai Iacov and Emil Simion
-
2022/125 ( PDF )
- Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem
- Brice Colombier and Vlad-Florin Dragoi and Pierre-Louis Cayrel and Vincent Grosso
-
2022/124 ( PDF )
- On the Performance Gap of a Generic C Optimized Assembler and Wide Vector Extensions for Masked Software with an Ascon-{\it{p}} test case
- Dor Salomon and Itamar Levi
-
2022/123 ( PDF )
- CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments
- Subhra Mazumdar and Sushmita Ruj
-
2022/122 ( PDF )
- Quantum cryptography with classical communication: parallel remote state preparation for copy-protection, verification, and more
- Alexandru Gheorghiu and Tony Metger and Alexander Poremba
-
2022/121 ( PDF )
- Crime and Punishment in Distributed Byzantine Decision Tasks (Extended Version)
- Pierre Civit and Seth Gilbert and Vincent Gramoli and Rachid Guerraoui and Jovan Komatovic and Zarko Milosevic and Adi Serendinschi
-
2022/120 ( PDF )
- Practical Seed Recovery of Fast Cryptographic Pseudo Random Number Generators
- Florette Martinez
-
2022/119 ( PDF )
- Hardware Implementation of SpoC-128
- Ambati Sathvik and Tirunagari Rahul and Anubhab Baksi and Vikramkumar Pudi
-
2022/118 ( PDF )
- Streebog compression function as PRF in secret-key settings
- Vitaly Kiryukhin
-
2022/117 ( PDF )
- AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains
- Zhimei Sui and Joseph K. Liu and Jiangshan Yu and Man Ho Au and Jia Liu
-
2022/116 ( PDF )
- Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version)
- Kosei Sakamoto and Fukang Liu and Yuto Nakano and Shinsaku Kiyomoto and Takanori Isobe
-
2022/115 ( PDF )
- GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks
- Zilin Liu and Anjia Yang and Jian Weng and Tao Li and Huang Zeng and Xiaojian Liang
-
2022/114 ( PDF )
- Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat
- Ziaur Rahman and Xun Yi and Ibrahim Khalil
-
2022/113 ( PDF )
- XCC: Theft-Resilient and Collateral-Optimized Cryptocurrency-Backed Assets
- Theodore Bugnet and Alexei Zamyatin
-
2022/112 ( PDF )
- Faster Kyber and Dilithium on the Cortex-M4
- Amin Abdulrahman and Vincent Hwang and Matthias J. Kannwischer and Daan Sprenkels
-
2022/111 ( PDF )
- Breaking Panther
- Christina Boura and Rachelle Heim Boissier and Yann Rotella
-
2022/110 ( PDF )
- Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-sliced Implementations
- Jan-Pieter D'Anvers and Michiel Van Beirendonck and Ingrid Verbauwhede
-
2022/109 ( PDF )
- Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees
- Ananya Appan and Anirudh Chandramouli and Ashish Choudhury
-
2022/108 ( PDF )
- Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method
- Rohon Kundu and Alessandro de Piccoli and Andrea Visconti
-
2022/107 ( PDF )
- Payment with Dispute Resolution: A Protocol For Reimbursing Frauds' Victims
- Aydin Abadi and Steven J. Murdoch
-
2022/106 ( PDF )
- Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All
- Soundes Marzougui and Vincent Ulitzsch and Mehdi Tibouchi and Jean-Pierre Seifert
-
2022/105 ( PDF )
- Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces
- Varun Madathil and Alessandra Scafuro and Kemafor Anyanwu and Sen Qiao and Akash Pateria and Binil Starly
-
2022/104 ( PDF )
- Minotaur: Multi-Resource Blockchain Consensus
- Matthias Fitzi and Xuechao Wang and Sreeram Kannan and Aggelos Kiayias and Nikos Leonardos and Pramod Viswanath and Gerui Wang
-
2022/103 ( -- withdrawn -- )
- E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System
- Zhihui Lin and Prosanta Gope and Jianting Ning and Biplab Sikdar
-
2022/102 ( PDF )
- MPC-Friendly Commitments for Publicly Verifiable Covert Security
- Nitin Agrawal and James Bell and Adrià Gascón and Matt J. Kusner
-
2022/101 ( PDF )
- Lattice-Based Linkable Ring Signature in the Standard Model
- Mingxing Hu and Zhen Liu
-
2022/100 ( PDF )
- Development of Cryptography since Shannon
- Funda Özdemir and Çetin Kaya Koç
-
2022/099 ( PDF )
- Performance of Hierarchical Transforms in Homomorphic Encryption: A case study on Logistic Regression inference
- Pedro Geraldo M. R. Alves and Jheyne N. Ortiz and Diego F. Aranha
-
2022/098 ( PDF )
- Orienteering with one endomorphism
- Sarah Arpin and Mingjie Chen and Kristin E. Lauter and Renate Scheidler and Katherine E. Stange and Ha T. N. Tran
-
2022/097 ( PDF )
- Lattice Signature can be as Simple as Lattice Encryption
- Dingfeng Ye and Jun Xu and Guifang Huang and Lei Hu
-
2022/096 ( PDF )
- On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications
- Karim Eldefrawy and Nicholas Genise and Rutuja Kshirsagar and Moti Yung
-
2022/095 ( PDF )
- Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More
- Huy Quoc Le and Dung Hoang Duong and Willy Susilo and Josef Pieprzyk
-
2022/094 ( PDF )
- Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies
- Nir Drucker and Tomer Pelleg
-
2022/093 ( PDF )
- Public-Key Encryption from Continuous LWE
- Andrej Bogdanov and Miguel Cueto Noval and Charlotte Hoffmann and Alon Rosen
-
2022/092 ( PDF )
- Rethinking Watermark: Providing Proof of IP Ownership in Modern SoCs
- N. Nalla Anandakumar and M. Sazadur Rahman and Mridha Md Mashahedur Rahman and Rasheed Kibria and Upoma Das and Farimah Farahmandi and Fahim Rahman and Mark M. Tehranipoor
-
2022/091 ( PDF )
- The multiplicative complexity of interval checking
- Thomas Häner and Mathias Soeken
-
2022/090 ( PDF )
- Attacks on Encrypted Range Search Schemes in Multiple Dimensions
- Francesca Falzon and Evangelia Anna Markatou and Zachary Espiritu and Roberto Tamassia
-
2022/089 ( PDF )
- NTRU-$\nu$-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus
- Kamil Kluczniak
-
2022/088 ( PDF )
- A survey on the security protocols employed by mobile messaging applications
- Ștefania Andrieș and Andrei-Daniel Miron and Andrei Cristian and Emil Simion
-
2022/087 ( PDF )
- The Internet Computer for Geeks
- The DFINITY Team
-
2022/086 ( PDF )
- PlonKup: Reconciling PlonK with plookup
- Luke Pearson and Joshua Fitzgerald and Héctor Masip and Marta Bellés-Muñoz and Jose Luis Muñoz-Tapia
-
2022/085 ( PDF )
- Cross-Domain Identity-based Matchmaking Encryption
- Axin Wu and Jian Weng and Weiqi Luo and Anjia Yang and Jia-Nan Liu and Zike Jiang
-
2022/084 ( PDF )
- Token meets Wallet: Formalizing Privacy and Revocation for FIDO2
- Lucjan Hanzlik and Julian Loss and Benedikt Wagner
-
2022/083 ( PDF )
- Zef: Low-latency, Scalable, Private Payments
- Mathieu Baudet and Alberto Sonnino and Mahimna Kelkar and George Danezis
-
2022/082 ( PDF )
- Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs
- Carsten Baum and Robin Jadoul and Emmanuela Orsini and Peter Scholl and Nigel P. Smart
-
2022/081 ( PDF )
- Single-Server Private Information Retrieval with Sublinear Amortized Time
- Henry Corrigan-Gibbs and Alexandra Henzinger and Dmitry Kogan
-
2022/080 ( PDF )
- Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation
- Yu Long Chen and Stefano Tessaro
-
2022/079 ( PDF )
- Lightweight Secure Integer Comparison
- Thijs Veugen
-
2022/078 ( PDF )
- Secure Lossy Function Computation with Multiple Private Remote Source Observations
- Onur Gunlu and Matthieu Bloch and Rafael F. Schaefer
-
2022/077 ( PDF )
- Multiple Noisy Private Remote Source Observations for Secure Function Computation
- Onur Gunlu and Matthieu Bloch and Rafael F. Schaefer
-
2022/076 ( PDF )
- Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security
- Ertem Nusret Tas and David Tse and Fisher Yu and Sreeram Kannan
-
2022/075 ( PDF )
- Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets
- Easwar Vivek Mangipudi and Udit Desai and Mohsen Minaei and Mainack Mondal and Aniket Kate
-
2022/074 ( PDF )
- FINAL: Faster FHE instantiated with NTRU and LWE
- Charlotte Bonte and Ilia Iliashenko and Jeongeun Park and Hilder V. L. Pereira and Nigel P. Smart
-
2022/073 ( PDF )
- Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain
- Seiya Nuta and Jacob C. N. Schuldt and Takashi Nishide
-
2022/072 ( PDF )
- Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction
- Keita Emura
-
2022/071 ( PDF )
- Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable
- Erik Aronesty and David Cash and Yevgeniy Dodis and Daniel H. Gallancy and Christopher Higley and Harish Karthikeyan and Oren Tysor
-
2022/070 ( PDF )
- (Nondeterministic) Hardness vs. Non-Malleability
- Marshall Ball and Dana Dachman-Soled and Julian Loss
-
2022/069 ( PDF )
- Small-Box Cryptography
- Yevgeniy Dodis and Harish Karthikeyan and Daniel Wichs
-
2022/068 ( PDF )
- Updatable Public Key Encryption in the Standard Model
- Yevgeniy Dodis and Harish Karthikeyan and Daniel Wichs
-
2022/067 ( PDF )
- Parallel Operations over TFHE-Encrypted Multi-Digit Integers
- Jakub Klemsa and Melek Önen
-
2022/066 ( PDF )
- A remark on the Discrete Fourier Transform statistical test
- Anghel Florin and Asandoaiei David and Tabacaru Robert
-
2022/065 ( PDF )
- Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS
- Nimrod Aviram and Benjamin Dowling and Ilan Komargodski and Kenneth G. Paterson and Eyal Ronen and Eylon Yogev
-
2022/064 ( PDF )
- A Framework for the Design of Secure and Efficient Proofs of Retrievability
- Françoise Levy-dit-Vehel and Maxime Roméas
-
2022/063 ( PDF )
- Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers
- Kang Yang and Xiao Wang
-
2022/062 ( PDF )
- An Introduction to Secret-Sharing-Based Secure Multiparty Computation
- Daniel Escudero
-
2022/061 ( PDF )
- A remark on the NIST 800-22 Binary Matrix Rank Test
- Nicu Neculache and Vlad-Andrei Petcu and Emil Simion
-
2022/060 ( PDF )
- Quantum Boomerang Attacks and Some Applications
- Paul Frixons and María Naya-Plasencia and André Schrottenloher
-
2022/059 ( PDF )
- SPHINCS-$\alpha$: A Compact Stateless Hash-Based Signature Scheme
- Kaiyi Zhang and Hongrui Cui and Yu Yu
-
2022/058 ( PDF )
- First-Order Masked Kyber on ARM Cortex-M4
- Daniel Heinz and Matthias J. Kannwischer and Georg Land and Thomas Pöppelmann and Peter Schwabe and Daan Sprenkels
-
2022/057 ( PDF )
- The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon
- Morgane Guerreau and Ange Martinelli and Thomas Ricosset and Mélissa Rossi
-
2022/056 ( PDF )
- LedgerHedger: Gas Reservation for Smart-Contract Security
- Itay Tsabary and Alex Manuskin and Ittay Eyal
-
2022/055 ( PDF )
- Key lifting : Multi-key Fully Homomorphic Encryption in plain model
- Xiaokang Dai and Wenyuan Wu and Yong Feng
-
2022/054 ( PDF )
- SIKE Channels
- Luca De Feo and Nadia El Mrabet and Aymeric Genêt and Novak Kaluđerović and Natacha Linard de Guertechin and Simon Pontié and Élise Tasso
-
2022/053 ( PDF )
- Brute Force Cryptanalysis
- Aron Gohr
-
2022/052 ( PDF )
- Near-optimal Balanced Reliable Broadcast and Asynchronous Verifiable Information Dispersal
- Sourav Das and Zhuolun Xiang and Ling Ren
-
2022/051 ( PDF )
- Titanium: A Metadata-Hiding File-Sharing System with Malicious Security
- Weikeng Chen and Thang Hoang and Jorge Guajardo and Attila A. Yavuz
-
2022/050 ( PDF )
- High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA
- Asep Muhamad Awaludin and Harashta Tatimma Larasati and Howon Kim
-
2022/049 ( PDF )
- Small MACs from Small Permutations
- Maria Eichlseder and Ahmet Can Mert and Christian Rechberger and Markus Schofnegger
-
2022/048 ( PDF )
- RSA, DH, and DSA in the Wild
- Nadia Heninger
-
2022/047 ( PDF )
- Short Pairing-Free Blind Signatures with Exponential Security
- Stefano Tessaro and Chenzhi Zhu
-
2022/046 ( PDF )
- Membership Privacy for Asynchronous Group Messaging
- Keita Emura and Kaisei Kajita and Ryo Nojima and Kazuto Ogawa and Go Ohtake
-
2022/045 ( PDF )
- Probing Security through Input-Output Separation and Revisited Quasilinear Masking
- Dahmun Goudarzi and Thomas Prest and Matthieu Rivain and Damien Vergnaud
-
2022/044 ( PDF )
- Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes
- Atakan Arslan and Muhammed Ali Bingöl
-
2022/043 ( PDF )
- Broken Proofs of Solvency in Blockchain Custodial Wallets and Exchanges
- Konstantinos Chalkias and Panagiotis Chatzigiannis and Yan Ji
-
2022/042 ( PDF )
- Inapplicability of Differential Fault Attacks against Cellular Automata based Lightweight Authenticated Cipher
- AMBILI K N and JIMMY JOSE
-
2022/041 ( PDF )
- Reinforcing Lightweight Authenticated Encryption Schemes against Statistical Ineffective Fault Attack
- AMBILI K N and JIMMY JOSE
-
2022/040 ( PDF )
- Ensuring Accountability and Outsourced Decryption in IoT Systems using Ciphertext-Policy Attribute-Based Encryption
- AMBILI K N and JIMMY JOSE
-
2022/039 ( PDF )
- Outsourced CP-ABE with Whitebox Accountability in IoT Systems
- AMBILI K N and JIMMY JOSE
-
2022/038 ( PDF )
- ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption
- Antonio de la Piedra and Marloes Venema and Greg Alpár
-
2022/037 ( PDF )
- Subgroup membership testing on elliptic curves via the Tate pairing
- Dmitrii Koshelev
-
2022/036 ( PDF )
- Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber
- Melissa Azouaoui and Olivier Bronchain and Clément Hoffmann and Yulia Kuzovkova and Tobias Schneider and François-Xavier Standaert
-
2022/035 ( PDF )
- Time-Traveling Simulators Using Blockchains and Their Applications
- Vipul Goyal and Justin Raizes and Pratik Soni
-
2022/034 ( PDF )
- From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-theoretic
- Varun Madathil and Chris Orsini and Alessandra Scafuro and Daniele Venturi
-
2022/033 ( PDF )
- Deletion-Compliance in the Absence of Privacy
- Jonathan Godin and Philippe Lamontagne
-
2022/032 ( PDF )
- Formal Analysis of Non-Malleability for Commitments in EasyCrypt
- Denis Firsov and Sven Laur and Ekaterina Zhuchko
-
2022/031 ( PDF )
- BAT: Small and Fast KEM over NTRU Lattices
- Pierre-Alain Fouque and Paul Kirchner and Thomas Pornin and Yang Yu
-
2022/030 ( PDF )
- Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK
- Jinyu Lu and Guoqiang Liu and Yunwen Liu and Bing Sun and Chao Li and Li Liu
-
2022/029 ( PDF )
- CRYScanner: Finding cryptographic libraries misuse
- Amit Choudhari and Sylvain Guilley and Khaled Karray
-
2022/028 ( PDF )
- Locality-Preserving Hashing for Shifts with Connections to Cryptography
- Elette Boyle and Itai Dinur and Niv Gilboa and Yuval Ishai and Nathan Keller and Ohad Klein
-
2022/027 ( PDF )
- Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice
- Bingyong Guo and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang
-
2022/026 ( PDF )
- Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective
- Andrada-Teodora Ciulei and Marian-Codrin Crețu and Emil Simion
-
2022/025 ( PDF )
- Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos
- Mostafizar Rahman and Dhiman Saha and Goutam Paul
-
2022/024 ( PDF )
- Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation
- Jean-Philippe Bossuat and Juan Ramón Troncoso-Pastoriza and Jean-Pierre Hubaux
-
2022/023 ( PDF )
- Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits
- Nicolai Müller and David Knichel and Pascal Sasdrich and Amir Moradi
-
2022/022 ( PDF )
- Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation
- Xiuju Huang and Jiashuo Song and Zichen Li
-
2022/021 ( PDF )
- WaterBear: Information-Theoretic Asynchronous BFT Made Practical
- Sisi Duan and Haibin Zhang and Boxin Zhao
-
2022/020 ( PDF )
- PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement
- Sisi Duan and Haibin Zhang
-
2022/019 ( PDF )
- Algebraic Meet-in-the-Middle Attack on LowMC
- Fukang Liu and Santanu Sarkar and Gaoli Wang and Willi Meier and Takanori Isobe
-
2022/018 ( PDF )
- Pairing-based Accountable Subgroup Multi-signatures with Verifiable Group Setup
- Ahmet Ramazan Ağırtaş and Oğuz Yayla
-
2022/017 ( PDF )
- Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation
- Shingo Sato and Keita Emura and Atsushi Takayasu
-
2022/016 ( PDF )
- An algebraic attack to the Bluetooth stream cipher E0
- Roberto La Scala and Sergio Polese and Sharwan K. Tiwari and Andrea Visconti
-
2022/015 ( PDF )
- Lattice-based Signatures with Tight Adaptive Corruptions and More
- Jiaxin Pan and Benedikt Wagner
-
2022/014 ( PDF )
- Transformer encoder-based Crypto-Ransomware Detection for Low-Power Embedded Processors
- Hyunji Kim and Sejin Lim and Yeajun Kang and Wonwoong Kim and Hwajeong Seo
-
2022/013 ( PDF )
- Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak
- Runsong Wang and Xuelian Li and Juntao Gao and Hui Li and Baocang Wang
-
2022/012 ( PDF )
- Security of Identity-based Encryption Schemes from Quadratic Residues
- Ferucio Laurentiu Tiplea and Sorin Iftene and George Teseleanu and Anca-Maria Nica
-
2022/011 ( PDF )
- Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance
- Alfredo Rial and Ania M. Piotrowska
-
2022/010 ( PDF )
- Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks
- Christian Matt and Jesper Buus Nielsen and Søren Eller Thomsen
-
2022/009 ( PDF )
- Algebraic Reductions of Knowledge
- Abhiram Kothapalli and Bryan Parno
-
2022/008 ( PDF )
- Beating Classical Impossibility of Position Verification
- Jiahui Liu and Qipeng Liu and Luowen Qian
-
2022/007 ( PDF )
- PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More
- Rutchathon Chairattana-Apirom and Lucjan Hanzlik and Julian Loss and Anna Lysyanskaya and Benedikt Wagner
-
2022/006 ( PDF )
- Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures
- Vadim Lyubashevsky and Ngoc Khanh Nguyen and Maxime Plancon
-
2022/005 ( PDF )
- Pseudorandom Bit Generation with Asymmetric Numeral Systems
- Josef Pieprzyk and Marcin Pawlowski and Pawel Morawiecki and Arash Mahboubi and Jarek Duda and Seyit Camtepe
-
2022/004 ( PDF )
- Publicly verifiable anonymous tokens with private metadata bit
- Fabrice Benhamouda and Tancrède Lepoint and Michele Orrù and Mariana Raykova
-
2022/003 ( PDF )
- Merged with 2022/007
- Rutchathon Chairattana-Apirom and Anna Lysyanskaya
-
2022/002 ( -- withdrawn -- )
- Polynomial-Time Key Recovery Attack on the Lau-Tan Cryptosystem Based on Gabidulin Codes
- Wenshuo Guo and Fang-Wei Fu
-
2022/001 ( PDF )
- Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
- Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu
[ Cryptology ePrint archive ]