Cryptology ePrint Archive: Recent Updates

2021/1543 ( PDF )
Post-Quantum Zero Knowledge, Revisited (or: How to do Quantum Rewinding Undetectably)
Alex Lombardi and Fermi Ma and Nicholas Spooner
2021/1542 ( PDF )
An End-to-End Bitstream Tamper Attack Against Flip-Chip FPGAs
Fahim Rahman and Farimah Farahmandi and Mark Tehranipoor
2021/1541 ( PDF )
Revisiting the Security of COMET Authenticated Encryption Scheme
Shay Gueron and Ashwin Jha and Mridul Nandi
2021/1540 ( PDF )
Lightweight Swarm Authentication
George Teseleanu
2021/1539 ( PDF )
Route Discovery in Private Payment Channel Networks
Zeta Avarikioti and Mahsa Bastankhah and Mohammad Ali Maddah-Ali and Krzysztof Pietrzak and Jakub Svoboda and Michelle Yeo
2021/1538 ( PDF )
SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost
Nishanth Chandran and Divya Gupta and Sai Lakshmi Bhavana Obbattu and Akash Shah
2021/1537 ( PDF )
PNB-based Differential Cryptanalysis of ChaCha Stream Cipher
Shotaro Miyashita and Ryoma Ito and Atsuko Miyaji
2021/1536 ( PDF )
SoK: Tokenization on Blockchain
Gang Wang and Mark Nixon
2021/1535 ( PDF )
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security
Avik Chakraborti and Nilanjan Datta and Ashwin Jha and Cuauhtemoc Manicillas Lopez and Mridul Nandi
2021/1534 ( PDF )
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile
Liang Zhao and Ze Chen and Liqun Chen and Xinyi Huang
2021/1533 ( PDF )
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n
Lorenzo Grassi and Dmitry Khovratovich and Sondre Rønjom and Markus Schofnegger
2021/1532 ( PDF )
On the Download Rate of Homomorphic Secret Sharing
Ingerid Fosli and Yuval Ishai and Victor I. Kolobov and Mary Wootters
2021/1531 ( PDF )
Squint Hard Enough: Evaluating Perceptual Hashing with Machine Learning
Jonathan Prokos and Tushar M. Jois and Neil Fendley and Roei Schuster and Matthew Green and Eran Tromer and Yinzhi Cao
2021/1530 ( PDF )
Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets
Alex Ozdemir and Dan Boneh
2021/1529 ( PDF )
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
Hosein Hadipour and Maria Eichlseder
2021/1528 ( PDF )
An Alternative Approach for Computing Discrete Logarithms in Compressed SIDH
Kaizhan Lin, Weize Wang, Lin Wang, and Chang-An Zhao
2021/1527 ( PDF )
CoHA-NTT: A Configurable Hardware Accelerator for NTT-based Polynomial Multiplication
Kemal Derya and Ahmet Can Mert and Erdinç Öztürk and Erkay Savaş
2021/1526 ( PDF )
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems
Arush Chhatrapati and Susan Hohenberger and James Trombo and Satyanarayana Vusirikala
2021/1525 ( PDF )
Amortizing Rate-1 OT and Applications to PIR and PSI
Melissa Chase and Sanjam Garg and Mohammad Hajiabadi and Jialin Li and Peihan Miao
2021/1524 ( PDF )
An Improved Range Proof with Base-3 Construction
Esra Günsay and Cansu Betin Onur and Murat Cenk
2021/1523 ( PDF )
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives
Andrea Caforio and Subhadeep Banik and Yosuke Todo and Willi Meier and Takanori Isobe and Fukang Liu and Bin Zhang
2021/1522 ( PDF )
On Cryptocurrency Wallet Design
Ittay Eyal
2021/1521 ( PDF )
Security evaluation against side-channel analysis at compilation time
Nicolas Bruneau and Charles Christen and Jean-Luc Danger and Adrien Facon and Sylvain Guilley
2021/1520 ( PDF )
Ark of the ECC: An open-source ECDSA power analysis attack on a FPGA based Curve P-256 implementation
Jean-Pierre Thibault and Colin O’Flynn and Alex Dewar
2021/1519 ( PDF )
Practical Garbled RAM: GRAM with $O(\log^2 n)$ Overhead
David Heath and Vladimir Kolesnikov and Rafail Ostrovsky
2021/1518 ( PDF )
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs
Valence Cristiani and Maxime Lecomte and Philippe Maurine
2021/1517 ( PDF )
HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation
Weikeng Chen and Katerina Sotiraki and Ian Chang and Murat Kantarcioglu and Raluca Ada Popa
2021/1516 ( PDF )
Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round
Nai-Hui Chia and Kai-Min Chung and Xiao Liang and Takashi Yamakawa
2021/1515 ( PDF )
Blockchain-based Security Framework for Critical Industry 4.0 Cyber-physical System
Ziaur Rahman and Ibrahim Khalil and Xun Yi and Mohammed Atiquzzaman
2021/1514 ( PDF )
Clarion: Anonymous Communication from Multiparty Shuffling Protocols
Saba Eskandarian and Dan Boneh
2021/1513 ( PDF )
InterTrust: Towards an Efficient Blockchain Interoperability Architecture with Trusted Services
Gang Wang and Mark Nixon
2021/1512 ( PDF )
BLOCK CIPHER DEFINED BY MATRIX PRESENTATION OF QUASIGROUPS
Smile Markovski and Vesna Dimitrova and Zlatka Trajcheska and Marija Petkovska and Mile Kostadinoski and Damjan Buhov
2021/1511 ( PDF )
Compressed SIKE Round 3 on ARM Cortex-M4
Mila Anastasova and Mojtaba Bisheh-Niasar and Reza Azarderakhsh and Mehran Mozaffari Kermani
2021/1510 ( PDF )
Pattern Devoid Cryptography
Gideon Samid
2021/1509 ( PDF )
More Lessons: Analysis of PUF-based Authentication Protocols for IoT
Karim Lounis and Mohammad Zulkernine
2021/1508 ( PDF )
High-Speed Hardware Architectures and FPGA Benchmarking of CRYSTALS-Kyber, NTRU, and Saber
Viet Ba Dang and Kamyar Mohajerani and Kris Gaj
2021/1507 ( PDF )
Parallel Quantum Addition for Korean Block Cipher
Kyungbae Jang and Gyeongju Song and Hyunjun Kim and Hyeokdong Kwon and Hyunji Kim and Hwajeong Seo
2021/1506 ( PDF )
z-OTS: a one-time hash-based digital signaturescheme with fast verification
Amos Zheng and Marcos A. Simplicio Jr.
2021/1505 ( PDF )
EVA Improved: Compiler and Extension Library for CKKS
Sangeeta Chowdhary and Wei Dai and Kim Laine and Olli Saarikivi
2021/1504 ( PDF )
CCA SecureA Posteriori Openable Encryption in the Standard Model
Xavier Bultel
2021/1503 ( PDF )
Interaction-Preserving Compilers for Secure Computation
Nico Döttling and Vipul Goyal and Giulio Malavolta and Justin Raizes
2021/1502 ( PDF )
Strong and Tight Security Guarantees against Integral Distinguishers
Phil Hebborn and Baptiste Lambin and Gregor Leander and Yosuke Todo
2021/1501 ( PDF )
Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols
Alisa Pankova and Jan Willemson
2021/1500 ( PDF )
Succinct Erasure Coding Proof Systems
Nicolas Alhaddad and Sisi Duan and Mayank Varia and Haibin Zhang
2021/1499 ( PDF )
Improved Lattice-Based Mix-Nets for Electronic Voting
Valeh Farzaliyev and Jan Willemson and Jaan Kristjan Kaasik
2021/1498 ( PDF )
Rectangular, Range, and Restricted AONTs: Three Generalizations of All-or-Nothing Transforms
Navid Nasr Esfahani and Douglas Stinson
2021/1497 ( PDF )
GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme
Mahmoud Yehia and Riham AlTawy and T. Aaron Gulliver
2021/1496 ( PDF )
Security Analysis Of DGM and GM Group Signature Schemes Instantiated With XMSS-T
Mahmoud Yehia and Riham AlTawy and T. Aaron Gulliver
2021/1495 ( PDF )
Veri fiable Obtained Random Subsets for Improving SPHINCS+
Mahmoud Yehia and Riham AlTawy and T. Aaron Gulliver
2021/1494 ( PDF )
On the efficiency of a general attack against the MOBS cryptosystem
Christopher Battarbee and Delaram Kahrobaei and Dylan Tailor and Siamak F. Shahandashti
2021/1493 ( PDF )
VASA: Vector AES Instructions for Security Applications
Jean-Pierre Münch and Thomas Schneider and Hossein Yalame
2021/1492 ( PDF )
SoK: Password-Authenticated Key Exchange -- Theory, Practice, Standardization and Real-World Lessons
Feng Hao and Paul C. van Oorschot
2021/1491 ( PDF )
The Hidden Lattice Problem
Luca Notarnicola and Gabor Wiese
2021/1490 ( PDF )
Aggregate Measurement via Oblivious Shuffling
Erik Anderson and Melissa Chase and F. Betul Durak and Esha Ghosh and Kim Laine and Chenkai Weng
2021/1489 ( PDF )
Estimating the Effectiveness of Lattice Attacks
Kotaro Abe and Makoto Ikeda
2021/1488 ( PDF )
SuperSolver: accelerating the Delfs-Galbraith algorithm with fast subfield root detection
Maria Corte-Real Santos and Craig Costello and Jia Shi
2021/1487 ( PDF )
A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking
Ghada Arfaoui and Pierre-Alain Fouque and Thibaut Jacques and Pascal Lafourcade and Adina Nedelcu and Cristina Onete and Léo Robert
2021/1486 ( PDF )
Mitaka: a simpler, parallelizable, maskable variant of Falcon
Thomas Espitau and Pierre-Alain Fouque and François Gérard and Mélissa Rossi and Akira Takahashi and Mehdi Tibouchi and Alexandre Wallet and Yang Yu
2021/1485 ( PDF )
On the Timing Leakage of the Deterministic Re-encryption in HQC KEM
Clemens Hlauschek and Norman Lahr and Robin Leander Schröder
2021/1484 ( PDF )
On Forging SPHINCS+-Haraka Signatures on a Fault-tolerant Quantum Computer
Robin M. Berger and Marcel Tiepelt
2021/1483 ( PDF )
A Practical Forward-Secure DualRing
Nan Li and Yingjiu Li and Atsuko Miyaji and Yangguang Tian and Tsz Hon Yuen
2021/1482 ( PDF )
The Optimal Error Resilience of Interactive Communication Over Binary Channels
Meghal Gupta and Rachel Yun Zhang
2021/1481 ( PDF )
Interactive Error Correcting Codes Over Binary Erasure Channels Resilient to $>\frac12$ Adversarial Corruption
Meghal Gupta and Yael Tauman Kalai and Rachel Zhang
2021/1480 ( PDF )
Extractors: Low Entropy Requirements Colliding With Non-Malleability
Eldon Chung and Maciej Obremski and Divesh Aggarwal
2021/1479 ( PDF )
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and aPartial ML-Distinguisher
Amirhossein Ebrahimi and Francesco Regazzoni and Paolo Palmieri
2021/1478 ( PDF )
Zarcanum: A Proof-of-Stake Scheme for Confidential Transactions with Hidden Amounts
sowle and koe
2021/1477 ( PDF )
Multisignature with double threshold condition in the blockchain and its application to and strong keys generating
Ruslan Skuratovskii and Alexandr Kalenyk
2021/1476 ( PDF )
Multivariate public key cryptography with polynomial composition
Emile Hautefeuille
2021/1475 ( PDF )
Circuit-based PSI for Covid-19 Risk Scoring
Leonie Reichert and Marcel Pazelt and Björn Scheuermann
2021/1474 ( PDF )
Foundations of Transaction Fee Mechanism Design
Hao Chung and Elaine Shi
2021/1473 ( PDF )
Computational self-testing for entangled magic states
Akihiro Mizutani and Yuki Takeuchi and Ryo Hiromasa and Yusuke Aikawa and Seiichiro Tani
2021/1472 ( PDF )
Improving Cryptography Based On Entropoids
Anisha Mukherjee and Saibal K. Pal
2021/1471 ( PDF )
Efficient Searchable Symmetric Encryption for Join Queries
Charanjit Jutla and Sikhar Patranabis
2021/1470 ( PDF )
Concurrent-Secure Two-Party Computation in Two Rounds from Subexponential LWE
Saikrishna Badrinarayanan and Rex Fernando and Amit Sahai
2021/1469 ( PDF )
New Indifferentiability Security Proof of MDPH Hash Function
Chun Guo and Tetsu Iwata and Kazuhiko Minematsu
2021/1468 ( PDF )
LeakageVerif: Scalable and Efficient Leakage Verification in Symbolic Expressions
Quentin L. Meunier and Etienne Pons and Karine Heydemann
2021/1467 ( PDF )
On the Round Complexity of Black-box Secure MPC
Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan
2021/1466 ( PDF )
On semigroups of multivariate transformations constructed in terms of time dependent linguistic graphs and solutions of Post Quantum Multivariate Cryptography.
V. Ustimenko
2021/1465 ( PDF )
Themis: Fast, Strong Order-Fairness in Byzantine Consensus
Mahimna Kelkar and Soubhik Deb and Sishan Long and Ari Juels and Sreeram Kannan
2021/1464 ( PDF )
Polynomial-time targeted attacks on coin tossing for any number of corruptions
Omid Etesami and Ji Gao and Saeed Mahloujifar and Mohammad Mahmoody
2021/1463 ( PDF )
3-Party Distributed ORAM from Oblivious Set Membership
Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky
2021/1462 ( PDF )
Prime pairing in algorithms searching for smooth group order
Pavel Atnashev and George Woltman
2021/1461 ( PDF )
A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange
Aikata and Ahmet Can Mert and David Jacquemin and Amitabh Das and Donald Matthews and Santosh Ghosh and Sujoy Sinha Roy
2021/1460 ( PDF )
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR
Itai Dinur and Nathan Keller and Ohad Klein
2021/1459 ( PDF )
Privacy-preserving Identity Management System
Jeonghyuk Lee and Jaekyung Choi and Hyunok Oh and Jihye Kim
2021/1458 ( PDF )
QC-MDPC codes DFR and the IND-CCA security of BIKE
Valentin Vasseur
2021/1457 ( PDF )
An In-Depth Symbolic Security Analysis of the ACME Standard
Karthikeyan Bhargavan and Abhishek Bichhawat and Quoc Huy Do and Pedram Hosseyni and Ralf Kuesters and Guido Schmitz and Tim Wuertele
2021/1456 ( PDF )
Server-Aided Continuous Group Key Agreement
Joël Alwen and Dominik Hartmann and Eike Kiltz and Marta Mularczyk
2021/1455 ( PDF )
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity
Sonia Belaïd and Matthieu Rivain and Abdul Rahman Taleb and Damien Vergnaud
2021/1454 ( PDF )
Russian Federal Remote E-voting Scheme of 2021 -- Protocol Description and Analysis
Jelizaveta Vakarjuk and Nikita Snetkov and Jan Willemson
2021/1453 ( PDF )
A State-Separating Proof for Yao’s Garbling Scheme
Chris Brzuska and Sabine Oechsner
2021/1452 ( PDF )
A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks
Abubakr Abdulgadir and Kamyar Mohajerani and Viet Ba Dang and Jens-Peter Kaps and Kris Gaj
2021/1451 ( PDF )
High-Performance Hardware Implementation of CRYSTALS-Dilithium
Luke Beckwith and Duc Tri Nguyen and Kris Gaj
2021/1450 ( PDF )
Efficient Zero-Knowledge Argument in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier
Hyeonbum Lee and Jae Hong Seo
2021/1449 ( PDF )
One-more Unforgeability of Blind ECDSA
Xianrui Qin and Cailing Cai and Tsz Hon Yuen
2021/1448 ( PDF )
Secure Featurization and Applications to Secure Phishing Detection
Akash Shah and Nishanth Chandran and Mesfin Dema and Divya Gupta and Arun Gururajan and Huan Yu
2021/1447 ( PDF )
Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
Sebastian Paul and Yulia Kuzovkova and Norman Lahr and Ruben Niederhagen
2021/1446 ( PDF )
Batch point compression in the context of advanced pairing-based protocols
Dmitrii Koshelev
2021/1445 ( PDF )
Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers
Lukas Aumayr and Sri AravindaKrishnan Thyagarajan and Giulio Malavolta and Pedro Monero-Sánchez and Matteo Maffei
2021/1444 ( PDF )
Streamlined NTRU Prime on FPGA
Bo-Yuan Peng and Adrian Marotzke and Ming-Han Tsai and Bo-Yin Yang and Ho-Lin Chen
2021/1443 ( PDF )
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation
Karl Wüst and Kari Kostiainen and Srdjan Capkun
2021/1442 ( PDF )
$P/poly$ Invalidity of the Agr17 Functional Encryption Scheme
Yupu Hu and Jun Liu and Baocang Wang and Xingting Dong and Yanbin Pan
2021/1441 ( PDF )
Length-preserving encryption with HCTR2
Paul Crowley and Nathan Huckleberry and Eric Biggers
2021/1440 ( PDF )
Improved Circuit-based PSI via Equality Preserving Compression
Kyoohyung Han and Dukjae Moon and Yongha Son
2021/1439 ( PDF )
An Addendum to the ZUC-256 Stream Cipher
ZUC Design Team
2021/1438 ( PDF )
Incremental Offline/Online PIR (extended version)
Yiping Ma and Ke Zhong and Tal Rabin and Sebastian Angel
2021/1437 ( PDF )
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking
Anuj Dubey and Afzal Ahmad and Muhammad Adeel Pasha and Rosario Cammarota and Aydin Aysu
2021/1436 ( PDF )
Efficient Representation of Numerical Optimization Problems for SNARKs
Sebastian Angel and Andrew J. Blumberg and Eleftherios Ioannidis and Jess Woods
2021/1435 ( PDF )
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a
ZhaoCun Zhou and DengGuo Feng and Bin Zhang
2021/1434 ( PDF )
The Language's Impact on the Enigma Machine
Daniel Matyas Perendi and Prosanta Gope
2021/1433 ( PDF )
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds
Arka Rai Choudhuri and Michele Ciampi and Vipul Goyal and Abhishek Jain and Rafail Ostrovsky
2021/1432 ( PDF )
Wavelet: Code-based postquantum signatures with fast verification on microcontrollers
Gustavo Banegas and Thomas Debris-Alazard and Milena Nedeljković and Benjamin Smith
2021/1431 ( PDF )
Secure and Efficient Multi-Key FHE Scheme Supporting Multi-bit Messages from LWE Preserving Non-Interactive Decryption
Chinmoy Biswas and Ratna Dutta
2021/1430 ( PDF )
Improved Zero-Knowledge Argument of Encrypted Extended Permutation
Yi Liu and Qi Wang and Siu-Ming Yiu
2021/1429 ( PDF )
Reviewing ISO/IEC Standard for Time-stamping Services
Long Meng and Liqun Chen
2021/1428 ( PDF )
Non-randomness of S-unit lattices
Daniel J. Bernstein and Tanja Lange
2021/1427 ( PDF )
Public-Key Quantum Money with a Classical Bank
Omri Shmueli
2021/1426 ( PDF )
On Unpadded NTRU Quantum (In)Security
Théodore Conrad-Frenkiel and Rémi Géraud-Stewart and David Naccache
2021/1425 ( PDF )
Improving First-Order Threshold Implementations of SKINNY
Andrea Caforio and Daniel Collins and Ognjen Glamocanin and Subhadeep Banik
2021/1424 ( PDF )
PREs with HRA Security and Key Privacy Based on Standard LWE Assumptions
Yang Wang and Yanmin Zhao and Mingqiang Wang
2021/1423 ( PDF )
Encryption to the Future: A Paradigm for Sending Secret Messages to Future (Anonymous) Committees
Matteo Campanelli and Bernardo David and Hamidreza Khoshakhlagh and Anders Konring and Jesper Buus Nielsen
2021/1422 ( PDF )
Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography
Jan-Pieter D'Anvers and Daniel Heinz and Peter Pessl and Michiel van Beirendonck and Ingrid Verbauwhede
2021/1421 ( PDF )
Breaking the $IKEp182 Challenge
Aleksei Udovenko and Giuseppe Vitto
2021/1420 ( PDF )
Extending the Tally-Hiding Ordinos System: Implementations for Borda, Hare-Niemeyer, Condorcet, and Instant-Runoff Voting
Fabian Hertel and Nicolas Huber and Jonas Kittelberger and Ralf Kuesters and Julian Liedtke and Daniel Rausch
2021/1419 ( PDF )
With a Little Help from My Friends: Constructing Practical Anonymous Credentials
Lucjan Hanzlik and Daniel Slamanig
2021/1418 ( PDF )
Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets
Qi Lei and Zijia Yang and Qin Wang and Yaoling Ding and Zhe Ma and An Wang
2021/1417 ( PDF )
How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption
Koji Nuida
2021/1416 ( PDF )
SME: Scalable Masking Extensions
Ben Marshall and Dan Page
2021/1415 ( PDF )
A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers
Aayush Jain and Alexis Korb and Paul Lou and Amit Sahai
2021/1414 ( PDF )
Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis
Guilherme Perin and Lichao Wu and Stjepan Picek
2021/1413 ( PDF )
Three Attacks on Proof-of-Stake Ethereum
Caspar Schwarz-Schilling and Joachim Neu and Barnabé Monnot and Aditya Asgaonkar and Ertem Nusret Tas and David Tse
2021/1412 ( PDF )
A Unified Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Setup
Hyesun Kwak and Dongwon Lee and Yongsoo Song and Sameer Wagh
2021/1411 ( PDF )
Analysis of Client-side Security for Long-term Time-stamping Services
Long Meng and Liqun Chen
2021/1410 ( PDF )
Franchised Quantum Money
Bhaskar Roberts and Mark Zhandry
2021/1409 ( PDF )
Hiding in Plain Sight: Memory-tight Proofs via Randomness Programming
Ashrujit Ghoshal and Riddhi Ghosal and Joseph Jaeger and Stefano Tessaro
2021/1408 ( PDF )
Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis
Maikel Kerkhof and Lichao Wu and Guilherme Perin and Stjepan Picek
2021/1407 ( PDF )
A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs
Keitaro Hashimoto and Shuichi Katsumata and Eamonn Postlethwaite and Thomas Prest and Bas Westerbaan
2021/1406 ( PDF )
Non-Slanderability of Linkable Spontaneous Anonymous Group Signature (LSAG)
Veronika Kuchta and Joseph K. Liu
2021/1405 ( PDF )
Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols
Tianyu Zheng and Shang Gao and Bin Xiao and Yubo Song
2021/1404 ( PDF )
Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments
Dakshita Khurana
2021/1403 ( PDF )
Efficient Adaptively-Secure Byzantine Agreement for Long Messages
Amey Bhangale and Chen-Da Liu-Zhang and Julian Loss and Kartik Nayak
2021/1402 ( PDF )
Guide to Fully Homomorphic Encryption over the [Discretized] Torus
Marc Joye
2021/1401 ( PDF )
HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks
Zeta Avarikioti and Krzysztof Pietrzak and Iosif Salem and Stefan Schmid and Samarth Tiwari and Michelle Yeo
2021/1400 ( PDF )
Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version)
Anubhab Baksi and Vishnu Asutosh Dasu and Banashri Karmakar and Anupam Chattopadhyay and Takanori Isobe
2021/1399 ( PDF )
Iterated Inhomogeneous Polynomials
Jiaxin Guan and Mark Zhandry
2021/1398 ( PDF )
Universally Composable Almost-Everywhere Secure Computation
Nishanth Chandran and Pouyan Forghani and Juan Garay and Rafail Ostrovsky and Rutvik Patel and Vassilis Zikas
2021/1397 ( PDF )
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
Craig Gentry and Shai Halevi and Vadim Lyubashevsky
2021/1396 ( PDF )
NTT software optimization using an extended Harvey butterfly
Jonathan Bradbury and Nir Drucker and Marius Hillenbrand
2021/1395 ( PDF )
Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-degree Polynomials
Reo Eriguchi and Koji Nuida
2021/1394 ( PDF )
Rethinking Modular Multi-Exponentiation in Real-World Applications
Vidal Attias and Luigi Vigneri and Vassil Dimitrov
2021/1393 ( PDF )
Fiat–Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model)
Chaya Ganesh and Claudio Orlandi and Mahak Pancholi and Akira Takahashi and Daniel Tschudi
2021/1392 ( PDF )
Differential fault attack on DEFAULT
Chandan Dey and Sumit Kumar Pandey and Tapabrata Roy and Santanu Sarkar
2021/1391 ( PDF )
A note on a Claim of Eldar & Hallgren: LLL already solves it
Léo Ducas and Wessel van Woerden
2021/1390 ( PDF )
UC Secure Private Branching Program and Decision Tree Evaluation
Keyu Ji and Bingsheng Zhang and Tianpei Lu and Lichun Li and Kui Ren
2021/1389 ( PDF )
DPCrypto: Acceleration of Post-quantum Cryptographic Algorithms using Dot-Product Instruction on GPUs
Wai-Kong Lee and Hwajeong Seo and Seong Oun Hwang and Angshuman Karmakar and Jose Maria Bermudo Mera and Ramachandra Achar
2021/1388 ( PDF )
MILES: Modeling Large S-box in MILP Based Differential Characteristic Search
Tarun Yadav and Manoj Kumar
2021/1387 ( PDF )
Triplicate functions
Lilya Budaghyan and Ivana Ivkovic and Nikolay Kaleyski
2021/1386 ( PDF )
Efficient Threshold-Optimal ECDSA
Michaella Pettit
2021/1385 ( PDF )
BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Nabil Alkeilani Alkadri and Patrick Harasser and Christian Janson
2021/1384 ( PDF )
Log-S-unit lattices using Explicit Stickelberger Generators to solve Approx Ideal-SVP
Olivier Bernard and Andrea Lesavourey and Tuong-Huy Nguyen and Adeline Roux-Langlois
2021/1383 ( PDF )
MHz2k: MPC from HE over $\mathbb{Z}_{2^k}$ with New Packing, Simpler Reshare, and Better ZKP
Jung Hee Cheon and Dongwoo Kim and Keewoo Lee
2021/1382 ( PDF )
ZPiE: Zero-knowledge Proofs in Embedded systems
Xavier Salleras and Vanesa Daza
2021/1381 ( PDF )
Multi-Authority ABE, Revisited
Miguel Ambrona and Romain Gay
2021/1380 ( PDF )
Orca: Blocklisting in Sender-Anonymous Messaging
Nirvan Tyagi and Julia Len and Ian Miers and Thomas Ristenpart
2021/1379 ( PDF )
Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work \\ A Provably Secure Blockchain Protocol
Matthias Fitzi and Aggelos Kiayias and Giorgos Panagiotakos and Alexander Russell
2021/1378 ( PDF )
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
Tim Beyne and Siemen Dhooghe and Amir Moradi and Aein Rezaei Shahmirzadi
2021/1377 ( PDF )
Fiat-Shamir Transformation of Multi-Round Interactive Proofs
Thomas Attema and Serge Fehr and Michael Klooß
2021/1376 ( PDF )
Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks
Ivan Damgård and Daniel Escudero and Antigoni Polychroniadou
2021/1375 ( PDF )
How to Prove Schnorr Assuming Schnorr: Security of Multi- and Threshold Signatures
Elizabeth Crites and Chelsea Komlo and Mary Maller
2021/1374 ( PDF )
Information-Combining Differential Fault Attacks on DEFAULT
Marcel Nageler and Christoph Dobraunig and Maria Eichlseder
2021/1373 ( PDF )
Highly Efficient OT-Based Multiplication Protocols
Iftach Haitner and Nikolaos Makriyannis and Samuel Ranellucci and Eliad Tsfadia
2021/1372 ( PDF )
Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones
Eugene Frimpong and Reyhaneh Rabbaninejad and Antonis Michalas
2021/1371 ( PDF )
A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test
Kyoichi Asano and Keita Emura and Atsushi Takayasu and Yohei Watanabe
2021/1370 ( PDF )
Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments
Dimitris Mouris and Nektarios Georgios Tsoutsos
2021/1369 ( PDF )
Faster Isogenies for Quantum-Safe SIKE
Rami Elkhatib and Brian Koziel and Reza Azarderakhsh
2021/1368 ( PDF )
Group Signatures and Accountable Ring Signatures from Isogeny-based Assumptions
Kai-Min Chung and Yao-Ching Hsieh and Mi-Ying Huang and Yu-Hsuan Huang and Tanja Lange and Bo-Yin Yang
2021/1367 ( -- withdrawn -- )
Hybrid Steganography deployed in hospitals for compression of medical images
Avinash Vijayarangan, K.R. Sekar, R. Srikanth
2021/1366 ( PDF )
Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient
Ward Beullens and Samuel Dobson and Shuichi Katsumata and Yi-Fu Lai and Federico Pintore
2021/1365 ( PDF )
Collusion Resistant Revocable Ring Signatures and Group Signatures from Hard Homogeneous Spaces
Yi-Fu Lai and Samuel Dobson
2021/1364 ( PDF )
Non-applicability of the Gaborit&Aguilar-Melchor patent to Kyber and Saber
Vadim Lyubashevsky and Damien Stehlé
2021/1363 ( PDF )
On Entropy and Bit Patterns of Ring Oscillator Jitter
Markku-Juhani O. Saarinen
2021/1362 ( PDF )
Practical Multiple Persistent Faults Analysis
Hadi Soleimany and Nasour Bagheri and Hosein Hadipour and Prasanna Ravi and Shivam Bhasin and Sara Mansouri
2021/1361 ( PDF )
Plumo: An Ultralight Blockchain Client
Psi Vesely and Kobi Gurkan and Michael Straka and Ariel Gabizon and Philipp Jovanovic and Georgios Konstantopoulos and Asa Oines and Marek Olszewski and and Eran Tromer
2021/1360 ( PDF )
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More
Behzad Abdolmaleki and Daniel Slamanig
2021/1359 ( PDF )
Families of SNARK-friendly 2-chains of elliptic curves
Youssef El Housni and Aurore Guillevic
2021/1358 ( PDF )
The Hardness of LWE and Ring-LWE: A Survey
David Balbás
2021/1357 ( PDF )
Two-Round Concurrently Secure Two-Party Computation
Behzad Abdolmaleki and Giulio Malavolta and Ahmadreza Rahimi
2021/1356 ( PDF )
Structural Mutual Information and Its Application
Youliang Tian and Zhiying Zhang and Jinbo Xiong and Jianfeng Ma
2021/1355 ( PDF )
Curve448 on 32-bit ARM Cortex-M4
Hwajeong Seo and Reza Azarderakhsh
2021/1354 ( PDF )
SoK: On the Security of Cryptographic Problems from Linear Algebra
Carl Bootland and Wouter Castryck and Alan Szepieniec and Frederik Vercauteren
2021/1353 ( PDF )
Noise-Tolerant Quantum Tokens for MAC
Amit Behera and Or Sattath and Uriel Shinar
2021/1352 ( PDF )
A Thorough Treatment of Highly-Efficient NTRU Instantiations
Julien Duman and Kathrin Hövelmanns and Eike Kiltz and Vadim Lyubashevsky and Gregor Seiler and Dominique Unruh
2021/1351 ( PDF )
Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing
Julien Duman and Eike Kiltz and Kathrin Hövelmanns and Vadim Lyubashevsky and Gregor Seiler
2021/1350 ( PDF )
Generalized Proof of Liabilities
Yan Ji and Konstantinos Chalkias
2021/1349 ( PDF )
Updatable Private Set Intersection
Saikrishna Badrinarayanan and Peihan Miao and Tiancheng Xie
2021/1348 ( PDF )
Beyond quadratic speedups in quantum attacks on symmetric schemes
Xavier Bonnetain and André Schrottenloher and Ferdinand Sibleyras
2021/1347 ( PDF )
TOTA: Fully Homomorphic Encryption with Smaller Parameters and Stronger Security
Zhaomin Yang and Xiang Xie and Huajie Shen and Shiying Chen and Jun Zhou
2021/1346 ( PDF )
WeStat: a Privacy-Preserving Mobile Data Usage Statistics System
Sébastien Canard and Nicolas Desmoulins and Sébastien Hallay and Adel Hamdi and Dominique Le Hello
2021/1345 ( PDF )
New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair
Subhadeep Banik and Khashayar Barooti and Serge Vaudenay and Hailun Yan
2021/1344 ( PDF )
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware
Jan Richter-Brockmann and Ming-Shing Chen and Santosh Ghosh and Tim Güneysu
2021/1343 ( PDF )
A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW
Hanlin Liu and Yu Yu
2021/1342 ( PDF )
Efficient Functional Commitments: How to Commit to Private Functions
Dan Boneh and Wilson Nguyen and Alex Ozdemir
2021/1341 ( PDF )
Anonymous Whistleblowing over Authenticated Channels
Thomas Agrikola and Geoffroy Couteau and Sven Maier
2021/1340 ( PDF )
TEDT2 - Highly Secure Leakage-resilient TBC-based Authenticated Encryption
Eik List
2021/1339 ( PDF )
Safe-Error Analysis of Post-Quantum Cryptography Mechanisms
Luk Bettale and Simon Montoya and Guénaël Renault
2021/1338 ( PDF )
Embedded Multilayer Equations: a New Hard Problem for Constructing Post-Quantum Signatures Smaller than RSA (without Hardness Assumption)
Dongxi Liu
2021/1337 ( PDF )
Large-Precision Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping
Zeyu Liu and Daniele Micciancio and Yuriy Polyakov
2021/1336 ( PDF )
Improved Computational Extractors and their Applications
Dakshita Khurana and Akshayaram Srinivasan
2021/1335 ( PDF )
Integer Functions Suitable for Homomorphic Encryption over Finite Fields
Ilia Iliashenko and Christophe Nègre and Vincent Zucca
2021/1334 ( PDF )
Indistinguishability Obfuscation from LPN over F_p, DLIN, and PRGs in NC^0
Aayush Jain and Huijia Lin and Amit Sahai
2021/1333 ( PDF )
Paradoxical Compression with Verifiable Delay Functions
Thomas Pornin
2021/1332 ( PDF )
On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography
Léo Ducas and Wessel van Woerden
2021/1331 ( PDF )
Communicating Through Subliminal-Free Signatures
George Teseleanu
2021/1330 ( PDF )
On the security of ECDSA with additive key derivation and presignatures
Jens Groth and Victor Shoup
2021/1329 ( PDF )
Trail Search with CRHS Equations
John Petter Indrøy and Håvard Raddum
2021/1328 ( PDF )
Cross-Subkey Deep-Learning Side-Channel Analysis
Fanliang Hu and Huanyu Wang and Junnian Wang
2021/1327 ( PDF )
Secure Multiparty Computation in the Bounded Storage Model
Jiahui Liu and Satyanarayana Vusirikala
2021/1326 ( PDF )
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices
Mo Zhang and Eduard Marin and David Oswald and Dave Singelee
2021/1325 ( PDF )
Decentralized Multi-Authority ABE for NC^1 from Computational-BDH
Pratish Datta and Ilan Komargodski and Brent Waters
2021/1324 ( PDF )
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption
Kamil Kluczniak
2021/1323 ( PDF )
Anonymity of NIST PQC Round-3 KEMs
Keita Xagawa
2021/1322 ( PDF )
A New Adaptive Attack on SIDH
Tako Boris Fouotsa and Christophe Petit
2021/1321 ( PDF )
Blockchain-based Privacy-preserving Fair Data Trading Protocol
Yao Jiang Galteland and Shuang Wu
2021/1320 ( PDF )
Faster Key Generation of Supersingular Isogeny Diffie-Hellman
Kaizhan Lin and Fangguo Zhang and Chang-An Zhao
2021/1319 ( PDF )
Maliciously-Secure MrNISC in the Plain Model
Rex Fernando and Aayush Jain and Ilan Komargodski
2021/1318 ( PDF )
A Supersingular Isogeny-Based Ring Signature
Maryam Sheikhi Garjan and N. Gamze Orhon Kılıç and Murat Cenk
2021/1317 ( PDF )
m-Stability: Threshold Security Meets Transferable Utility
Osman Biçer and Burcu Yıldız and Alptekin Küpçü
2021/1316 ( PDF )
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment
Unai Rioja and Lejla Batina and Igor Armendariz and Jose Luis Flores
2021/1315 ( PDF )
Certified Everlasting Zero-Knowledge Proof for QMA
Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa
2021/1314 ( PDF )
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption
Jean-Sébastien Coron and François Gérard and Simon Montoya and Rina Zeitoun
2021/1313 ( PDF )
Hybrid Memristor-CMOS Obfuscation Against Untrusted Foundries
Amin Rezaei and Jie Gu and Hai Zhou
2021/1312 ( PDF )
Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability
Ashley Fraser and Lydia Garms and Anja Lehmann
2021/1311 ( PDF )
Power analysis attack on Kyber
Alexandre Karlov and Natacha Linard de Guertechin
2021/1310 ( PDF )
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES
Chao Niu and Muzhou Li and Meiqin Wang and Qingju Wang and Siu-Ming Yiu
2021/1309 ( PDF )
Faster Final Exponentiation on the KSS18 Curve
Shiping Cai and Zhi Hu and Chang-An Zhao
2021/1308 ( PDF )
No-Commit Proofs: Defeating Livelock in BFT
Neil Giridharan and Heidi Howard and Ittai Abraham and Natacha Crooks and Alin Tomescu
2021/1307 ( PDF )
In-depth Analysis of Side-Channel Countermeasures for CRYSTALS-Kyber Message Encoding on ARM Cortex-M4
Hauke Malte Steffen and Lucie Johanna Kogelheide and Timo Bartkewitz
2021/1306 ( PDF )
Probabilistic micropayments with transferability
Taisei Takahashi and Akira Otsuka
2021/1305 ( PDF )
(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin
Pratish Datta and Tapas Pal
2021/1304 ( PDF )
An Open Problem on the Bentness of Mesnager’s Functions
Chunming Tang and Peng Han and Qi Wang and Jun Zhang and Yanfeng Qi
2021/1303 ( PDF )
Black-Box Accumulation Based on Lattices
Sebastian H. Faller and Pascal Baumer and Michael Klooß and Alexander Koch and Astrid Ottenhues and Markus Raiber
2021/1302 ( PDF )
Using Blockchain to Achieve Decentralized Privacy In IoT Healthcare
Sajad Meisami and Mohammad Beheshti-Atashgah and Mohammad Reza Aref
2021/1301 ( PDF )
An Isogeny-Based ID Protocol Using Structured Public Keys
Karim Baghery and Daniele Cozzo and Robi Pedersen
2021/1300 ( PDF )
Report and Trace Ring Signatures
Ashley Fraser and Elizabeth A. Quaglia
2021/1299 ( PDF )
Towards Quantum Large-Scale Password Guessing on Real-World Distributions
Markus Dürmuth and Maximilian Golla and Philipp Markert and Alexander May and Lars Schlieper
2021/1298 ( PDF )
Post-Quantum Authentication with Lightweight Cryptographic Primitives
Henrique Faria and José Manuel Valença
2021/1297 ( PDF )
Listen to Your Heart: Evaluation of the Cardiologic Ecosystem
Endres Puschner and Christoph Saatjohann and Markus Willing and Christian Dresen and Julia Köbe and Benjamin Rath and Christof Paar and Lars Eckardt and Uwe Haverkamp and Sebastian Schinzel
2021/1296 ( PDF )
Partitioning Oracles from Weak Key Forgeries
Marcel Armour and Carlos Cid
2021/1295 ( PDF )
Improved Quantum Hypercone Locality Sensitive Filtering in Lattice Sieving
Max Heiser
2021/1294 ( PDF )
Quantum Money from Quaternion Algebras
Daniel M. Kane and Shahed Sharif and Alice Silverberg
2021/1293 ( PDF )
A Practical Verifiable Delay Function and Delay Encryption Scheme
Angelique Faye Loe and Liam Medley and Christian O’Connell and Elizabeth A. Quaglia
2021/1292 ( PDF )
Fast Extended GCD Calculation for Large Integers for Verifiable Delay Functions
Kavya Sreedhar and Mark Horowitz and Christopher Torng
2021/1291 ( PDF )
MyOPE: Malicious securitY for Oblivious Polynomial Evaluation
Malika Izabachène and Anca Nitulescu and Paola de Perthuis and David Pointcheval
2021/1290 ( PDF )
Large-Scale Non-Interactive Threshold Cryptosystems Through Anonymity
Andreas Erwig and Sebastian Faust and Siavash Riahi
2021/1289 ( PDF )
Verifiable Isogeny Walks: Towards an Isogeny-based Postquantum VDF
Jorge Chavez-Saab and Francisco Rodríguez Henríquez and Mehdi Tibouchi
2021/1288 ( PDF )
FO-like Combiners and Hybrid Post-Quantum Cryptography
Loïs Huguenin-Dumittan and Serge Vaudenay
2021/1287 ( PDF )
The Exact Security of BIP32 Wallets
Poulami Das and Andreas Erwig and Sebastian Faust and Julian Loss and Siavash Riahi
2021/1286 ( PDF )
Post-quantum Efficient Proof for Graph 3-Coloring Problem
Ehsan Ebrahimi
2021/1285 ( PDF )
Convexity of division property transitions: theory, algorithms and compact models
Aleksei Udovenko
2021/1284 ( PDF )
APAS: Application-Specific Accelerators for RLWE-based Homomorphic Linear Transformations
Song Bian and Dur E Shahwar Kundi and Kazuma Hirozawa and Weiqiang Liu and Takashi Sato
2021/1283 ( PDF )
Parallel Verification of Serial MAC and AE Modes
Kazuhiko Minematsu and Akiko Inoue and Katsuya Moriwaki and Maki Shigeri and Hiroyasu Kubo
2021/1282 ( PDF )
On the Claims of Weak Block Synchronization in Bitcoin
Seungjin Baek and Hocheol Nam and Yongwoo Oh and Muoi Tran and Min Suk Kang
2021/1281 ( PDF )
Leveled Fully Homomorphic Encryption Schemes with Hensel Codes
David W. H. A. da Silva and Luke Harmon and Gaetan Delavignette and Carlos Araujo
2021/1280 ( PDF )
Snoopy: Surpassing the Scalability Bottleneck of Oblivious Storage
Emma Dauterman and Vivian Fang and Ioannis Demertzis and Natacha Crooks and Raluca Ada Popa
2021/1279 ( PDF )
Quantum Diffie-Hellman Key Exchange
Dirk Fischer
2021/1278 ( PDF )
A survey of algorithmic methods in IC reverse engineering
Leonid Azriel and Julian Speith and Nils Albartus and Ran Ginosara and Avi Mendelson and Christof Paar
2021/1277 ( PDF )
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
Florian Stolz and Nils Albartus and Julian Speith and Simon Klix and Clemens Nasenberg and Aiden Gula and Marc Fyrbiak and Christof Paar and Tim Güneysu and Russell Tessier
2021/1276 ( PDF )
On the Security and Performance of Blockchain Sharding
Runchao Han and Jiangshan Yu and Haoyu Lin and Shiping Chen and Paulo Esteves-Veríssimo
2021/1275 ( PDF )
Counterexample to OWF Self-XOR Being a DOWF
Nathan Geier
2021/1274 ( PDF )
Tight Computational Indistinguishability Bound of Product Distributions
Nathan Geier
2021/1273 ( PDF )
OpenSquare: Decentralized Repeated Modular Squaring Service
Sri AravindaKrishnan Thyagarajan and Tiantian Gong and Adithya Bhat and Aniket Kate and Dominique Schröder
2021/1272 ( PDF )
Efficient CCA Timed Commitments in Class Groups
Sri AravindaKrishnan Thyagarajan and Guilhem Castagnos and Fabien Laguillaumie and Giulio Malavolta
2021/1271 ( PDF )
Computing the Jacobi symbol using Bernstein-Yang
Mike Hamburg
2021/1270 ( PDF )
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited
Yevgeniy Dodis and Willy Quach and Daniel Wichs
2021/1269 ( PDF )
Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model
Antonio Faonio
2021/1268 ( PDF )
Simulation-Based Bi-Selective Opening Security for Public Key Encryption
Junzuo Lai and Rupeng Yang and Zhengan Huang and Jian Weng
2021/1267 ( PDF )
Tight Quantum Indifferentiability of a Rate-1/3 Compression Function
Jan Czajkowski
2021/1266 ( PDF )
Update-Sensitive Structured Encryption with Backward Privacy
Zhiqiang Wu and Jin Wang and Keqin Li
2021/1265 ( PDF )
Special Soundness in the Random Oracle Model
Douglas Wikström
2021/1264 ( PDF )
Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge
Prastudy Fauzi and Helger Lipmaa and Janno Siim and Michal Zajac and Arne Tobias Ødegaard
2021/1263 ( PDF )
Transparency Dictionaries with Succinct Proofs of Correct Operation
Ioanna Tzialla and Abhiram Kothapalli and Bryan Parno and Srinath Setty
2021/1262 ( PDF )
Reverse Firewalls for Adaptively Secure MPC without Setup
Suvradip Chakraborty and Chaya Ganesh and Mahak Pancholi and Pratik Sarkar
2021/1261 ( PDF )
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE
Yi Wang and Rongmao Chen and Xinyi Huang and Jianting Ning and Baosheng Wang and Moti Yung
2021/1260 ( PDF )
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers
Jelle Vos and Zekeriya Erkin and Christian Doerr
2021/1259 ( PDF )
Parallel Repetition of $(k_1,\dots,k_{\mu})$-Special-Sound Multi-Round Interactive Proofs
Thomas Attema and Serge Fehr
2021/1258 ( PDF )
Bit Security as Computational Cost for Winning Games with High Probability
Shun Watanabe and Kenji Yasunaga
2021/1257 ( PDF )
Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy
S. Dov Gordon and Jonathan Katz and Mingyu Liang and Jiayu Xu
2021/1256 ( PDF )
Oblivious Message Retrieval
Zeyu Liu and Eran Tromer
2021/1255 ( PDF )
How to Find Ternary LWE Keys Using Locality Sensitive Hashing
Elena Kirshanova and Alexander May
2021/1254 ( PDF )
Vector and Functional Commitments from Lattices
Chris Peikert and Zachary Pepin and Chad Sharp
2021/1253 ( PDF )
EasyPQC: Verifying Post-Quantum Cryptography
Manuel Barbosa and Gilles Barthe and Xiong Fan and Benjamin Grégoire and Shih-Han Hung and Jonathan Katz and Pierre-Yves Strub and Xiaodi Wu and Li Zhou
2021/1252 ( PDF )
Complete Practical Side-Channel-Assisted Reverse Engineering of AES-Like Ciphers
Andrea Caforio and Fatih Balli and Subhadeep Banik
2021/1251 ( PDF )
Efficient NIZKs for Algebraic Sets
Geoffroy Couteau and Helger Lipmaa and Roberto Parisella and Arne Tobias Ødegaard
2021/1250 ( PDF )
Efficient Leakage-Resilient MACs without Idealized Assumptions
Francesco Berti and Chun Guo and Thomas Peters and François-Xavier Standaert
2021/1249 ( PDF )
Flexible Anonymous Transactions (FLAX): Towards Privacy-Preserving and Composable Decentralized Finance
Wei Dai
2021/1248 ( PDF )
The Adversary Capabilities In Practical Byzantine Fault Tolerance
Yongge Wang
2021/1247 ( PDF )
A Geometric Approach to Linear Cryptanalysis
Tim Beyne
2021/1246 ( PDF )
Astrolabous: A Universally Composable Time-Lock Encryption Scheme
Myrto Arapinis and Nikolaos Lamprou and Thomas Zacharias
2021/1245 ( PDF )
SeqL+: Secure Scan-Obfuscation with Theoretical and Empirical Validation
Seetal Potluri and Shamik Kundu and Akash Kumar and Kanad Basu and Aydin Aysu
2021/1244 ( PDF )
IvyCross: A Trustworthy and Privacy-preserving Framework for Blockchain Interoperability
Ming Li, Jian Weng∗, Member, IEEE, Yi Li, Yongdong Wu, Jiasi Weng, Dingcheng Li, Robert Deng, Fellow, IEEE
2021/1243 ( PDF )
Syndrome Decoding Estimator
Andre Esser and Emanuele Bellini
2021/1242 ( PDF )
Non-Interactive Differentially Anonymous Router
Benedikt Bünz and Yuncong Hu and Shin’ichiro Matsuo and Elaine Shi
2021/1241 ( PDF )
Shuffling Public Keys (A Peer-to-peer Voting Algorithm)
Santi J. Vives
2021/1240 ( PDF )
Count Me In! Extendability for Threshold Ring Signatures
Diego F. Aranha and Mathias Hall-Andersen and Anca Nitulescu and Elena Pagnin and Sophia Yakoubov
2021/1239 ( PDF )
Quantum Linearization Attacks
Xavier Bonnetain and Gaëtan Leurent and María Naya-Plasencia and André Schrottenloher
2021/1238 ( PDF )
Generic Framework for Key-Guessing Improvements
Marek Broll and Federico Canale and Antonio Flórez-Gutiérrez and Gregor Leander and María Naya-Plasencia
2021/1237 ( PDF )
Hierarchical Integrated Signature and Encryption
Yu Chen and Qiang Tang and Yuyu Wang
2021/1236 ( PDF )
Architecture Support for Bitslicing
Pantea Kiaei with Tom Conroy with Patrick Schaumont
2021/1235 ( PDF )
Saidoyoki: Evaluating side-channel leakage in pre- and post-silicon setting
Pantea Kiaei with Zhenyuan Liu with Ramazan Kaan Eren with Yuan Yao with Patrick Schaumont
2021/1234 ( PDF )
Policy-Compliant Signatures
Christian Badertscher and Christian Matt and Hendrik Waldner
2021/1233 ( PDF )
Blockchains Enable Non-Interactive MPC
Vipul Goyal and Elisaweta Masserova and Bryan Parno and Yifan Song
2021/1232 ( PDF )
Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf
Gizem Kara and Oğuz Yayla
2021/1231 ( PDF )
Estimating (Miner) Extractable Value is Hard, Let’s Go Shopping!
Aljosha Judmayer and Nicholas Stifter and Philipp Schindler and Edgar Weippl
2021/1230 ( PDF )
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation
Amit Agarwal and James Bartusek and Vipul Goyal and Dakshita Khurana and Giulio Malavolta
2021/1229 ( PDF )
Direct Product Hardness Amplification
David Lanzenberger and Ueli Maurer
2021/1228 ( PDF )
Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy
Hanwen Feng and Qiang Tang
2021/1227 ( PDF )
Efficient Boolean Search over Encrypted Data with Reduced Leakage
Sarvar Patel and Giuseppe Persiano and Joon Young Seo and Kevin Yeo
2021/1226 ( PDF )
Succinct LWE Sampling, Random Polynomials, and Obfuscation
Lalita Devadas and Willy Quach and Vinod Vaikuntanathan and Hoeteck Wee and Daniel Wichs
2021/1225 ( PDF )
Massive Superpoly Recovery with Nested Monomial Predictions
Kai Hu and Siwei Sun and Yosuke Todo and Meiqin Wang and Qingju Wang
2021/1224 ( PDF )
Trojan-Resilience without Cryptography
Suvradip Chakraborty and Stefan Dziembowski and Malgorzata Galazka and Tomasz Lizurej and Krzysztof Pietrzak and Michelle Yeo
2021/1223 ( PDF )
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation
Fabrice Benhamouda and Elette Boyle and Niv Gilboa and Shai Halevi and Yuval Ishai and Ariel Nof
2021/1222 ( PDF )
Fault-enabled chosen-ciphertext attacks on Kyber
Julius Hermelink and Peter Pessl and Thomas Pöppelmann
2021/1221 ( PDF )
Simple, Fast Malicious Multiparty Private Set Intersection
Ofri Nevo and Ni Trieu and Avishay Yanai
2021/1220 ( PDF )
Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting
Denis Diemert and Kai Gellert and Tibor Jager and Lin Lyu
2021/1219 ( PDF )
Towards Tight Adaptive Security of Non-Interactive Key Exchange
Julia Hesse and Dennis Hofheinz and Lisa Kohl and Roman Langrehr
2021/1218 ( PDF )
Algebraic Adversaries in the Universal Composability Framework
Michel Abdalla and Manuel Barbosa and Jonathan Katz and Julian Loss and Jiayu Xu
2021/1217 ( PDF )
EMFI for Safety-Critical Testing of Automotive Systems
Colin O'Flynn
2021/1216 ( PDF )
Toward Optimal Deep-Learning Based Side-Channel Attacks: Probability Concentration Inequality Loss and Its Usage
Akira Ito and Rei Ueno and Naofumi Homma
2021/1215 ( PDF )
Optimization of Homomorphic Comparison Algorithm on RNS-CKKS Scheme
Eunsang Lee and Joon-Woo Lee and Young-Sik Kim and Jong-Seon No
2021/1214 ( PDF )
Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness
Susumu Kiyoshima
2021/1213 ( PDF )
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations
Tsz Hon Yuen and Muhammed F. Esgin and Joseph K. Liu and Man Ho Au and Zhimin Ding
2021/1212 ( PDF )
SPEEDY on Cortex--M3: Efficient Software Implementation of SPEEDY on ARM Cortex--M3
Hyunjun Kim and Kyungbae Jang and Gyeongju Song and Minjoo Sim and Siwoo Eum and Hyunji Kim and Hyeokdong Kwon and Wai-Kong Lee and Hwajeong Seo
2021/1211 ( PDF )
Grover on SPEEDY
Gyeongju Song and Kyungbae Jang and Hyunjun Kim and Siwoo Eum and Minjoo Sim and Hyunji Kim and Wai-Kong Lee and Hwajeong Seo
2021/1210 ( PDF )
LedMAC: More Efficient Variants of LightMAC
Yaobin Shen; Lei Wang; Dawu Gu
2021/1209 ( PDF )
Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions
Lior Rotem
2021/1208 ( PDF )
On Actively-Secure Elementary MPC Reductions
Benny Applebaum and Aarushi Goel
2021/1207 ( PDF )
Non-Malleable Vector Commitments via Local Equivocability
Lior Rotem and Gil Segev
2021/1206 ( PDF )
Efficient Perfectly Secure Computation with Optimal Resilience
Ittai Abraham and Gilad Asharov and Avishay Yanai
2021/1205 ( PDF )
FASTA – a stream cipher for fast FHE evaluation
Carlos Cid and John Petter Indrøy and Håvard Raddum
2021/1204 ( PDF )
Attacks on Pseudo Random Number Generators Hiding a Linear Structure
Florette Martinez
2021/1203 ( PDF )
The irreducible vectors of a lattice: Some theory and applications
Emmanouil Doulgerakis and Thijs Laarhoven and Benne de Weger
2021/1202 ( PDF )
Design Space Exploration of SABER in 65nm ASIC
Malik Imran and Felipe Almeida and Jaan Raik and Andrea Basso and Sujoy Sinha Roy and Samuel Pagliarini
2021/1201 ( PDF )
Provably Improving Election Verifiability in Belenios
Sevdenur Baloglu and Sergiu Bursuc and Sjouke Mauw and Jun Pang
2021/1200 ( PDF )
KDM Security for the Fujisaki-Okamoto Transformations in the QROM
Fuyuki Kitagawa and Ryo Nishimaki
2021/1199 ( PDF )
Compressed Oblivious Encoding for Homomorphically Encrypted Search
Seung Geol Choi and Dana Dachman-Soled and S. Dov Gordon and Linsheng Liu and Arkady Yerukhimovich
2021/1198 ( PDF )
Clustering Effect in Simon and Simeck
Gaëtan Leurent and Clara Pernot and André Schrottenloher
2021/1197 ( PDF )
($\epsilon,\delta$)-indistinguishable Mixing for Cryptocurrencies
Mingyu Liang and Ioanna Karantaidou and Foteini Baldimtsi and Dov Gordon and Mayank Varia
2021/1196 ( PDF )
Concurrent Composition of Differential Privacy
Salil Vadhan and Tianhao Wang
2021/1195 ( PDF )
Do you feel a chill? Using PIR against chilling effects for censorship-resistant publishing
Miti Mazmudar and Stan Gurtler and Ian Goldberg
2021/1194 ( PDF )
Automated Truncation of Differential Trails and Trail Clustering in ARX
Alex Biryukov and Luan Cardoso dos Santos and Daniel Feher and Vesselin Velichkov and Giuseppe Vitto
2021/1193 ( PDF )
JUBILEE: Secure Debt Relief and Forgiveness
David Cerezo Sánchez
2021/1192 ( PDF )
Simple Constructions from (Almost) Regular One-Way Functions
Noam Mazor and Jiapeng Zhang
2021/1191 ( PDF )
A Simpler Model for Recovering Superpoly onTrivium
Stéphanie Delaune and Patrick Derbez and Arthur Gontier and Charles Prud'homme
2021/1190 ( PDF )
Differential Fault Attack on Lightweight Block Cipher PIPO
SeongHyuck Lim and JaeSeung Han and Tae-Ho Lee and Dong-Guk Han
2021/1189 ( PDF )
A Configurable Crystals-Kyber Hardware Implementation with Side-Channel Protection
Arpan Jati and Naina Gupta and Anupam Chattopadhyay and Somitra Kumar Sanadhya
2021/1188 ( PDF )
Interhead Hydra Two Heads are Better than One
Maxim Jourenko and Mario Larangeira and Keisuke Tanaka
2021/1187 ( PDF )
Post-Quantum Signal Key Agreement with SIDH
Samuel Dobson and Steven D. Galbraith
2021/1186 ( PDF )
A Privacy-Preserving Distributed Identity Offline-First PoCP Blockchain Paradigm
Andrew M.K. Nassief
2021/1185 ( PDF )
Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework)
Ueli Maurer and Christopher Portmann and Guilherme Rito
2021/1184 ( PDF )
On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups
Aron van Baarsen and Marc Stevens
2021/1183 ( PDF )
ZkAttest: Ring and Group Signatures on top of existing ECDSA keys
Armando Faz-Hernández and Watson Ladd and Deepak Maram
2021/1182 ( PDF )
Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork
Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Edgar Weippl
2021/1181 ( PDF )
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code
Madura A. Shelton;Łukasz Chmielewski;Niels Samwel;Markus Wagner;Lejla Batina;Yuval Yarom
2021/1180 ( PDF )
The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?
István András Seres and Balázs Pejó and Péter Burcsi
2021/1179 ( PDF )
Improved Attacks on GIFT-64
Ling Sun and Wei Wang and Meiqin Wang
2021/1178 ( PDF )
Onion Routing with Replies
Christiane Kuhn and Dennis Hofheinz and Andy Rupp and Thorsten Strufe
2021/1177 ( PDF )
Algebraic Restriction Codes and their Applications
Divesh Aggarwal and Nico Döttling and Jesko Dujmovic and Mohammad Hajiabadi and Giulio Malavolta and Maciej Obremski
2021/1176 ( PDF )
Amortized Threshold Symmetric-key Encryption
Mihai Christodorescu and Sivanarayana Gaddam and Pratyay Mukherjee and Rohit Sinha
2021/1175 ( PDF )
Adaptive Security of Multi-Party Protocols, Revisited
Martin Hirt and Chen-Da Liu-Zhang and Ueli Maurer
2021/1174 ( PDF )
On Communication-Efficient Asynchronous MPC with Adaptive Security
Annick Chopard and Martin Hirt and Chen-Da Liu-Zhang
2021/1173 ( PDF )
Lelantus Spark: Secure and Flexible Private Transactions
Aram Jivanyan and Aaron Feickert
2021/1172 ( PDF )
Systematizing Core Properties of Pairing-Based Attribute-Based Encryption to Uncover Remaining Challenges in Enforcing Access Control in Practice
Marloes Venema and Greg Alpár and Jaap-Henk Hoepman
2021/1171 ( PDF )
FAST: Secure and High Performance Format-Preserving Encryption and Tokenization
F. Betül Durak and Henning Horst and Michael Horst and Serge Vaudenay
2021/1170 ( PDF )
Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs
Masahito Ishizaka and Shinsaku Kiyomoto
2021/1169 ( PDF )
As easy as ABC: Optimal (A)ccountable (B)yzantine (C)onsensus is easy!
Pierre Civit and Seth Gilbert and Vincent Gramoli and Rachid Guerraoui and Jovan Komatovic
2021/1168 ( PDF )
Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation (Full Version)
Wonseok Choi and Byeonghak Lee and Jooyoung Lee and Yeongmin Lee
2021/1167 ( PDF )
fflonk: a Fast-Fourier inspired verifier efficient version of PlonK
Ariel Gabizon and Zachary J. Williamson
2021/1166 ( PDF )
Fine-tuning the ISO/IEC Standard LightMAC
Soumya Chattopadhyay and Ashwin Jha and Mridul Nandi
2021/1165 ( PDF )
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery
Mario Larangeira
2021/1164 ( PDF )
Cube Attacks on Round-Reduced TinyJAMBU
Wil Liam Teng and Iftekhar Salam and Wei-Chuen Yau and Josef Pieprzyk and Raphaël C.-W. Phan
2021/1163 ( PDF )
Information-Theoretically Secure MPC against Mixed Dynamic Adversaries
Ivan Damgård and Daniel Escudero and Divya Ravi
2021/1162 ( PDF )
Software Implementation of Optimal Pairings on Elliptic Curves with Odd Prime Embedding Degrees
Yu Dai and Zijian Zhou and Fangguo Zhang and Chang-An Zhao
2021/1161 ( PDF )
Balanced Non-Adjacent Forms
Marc Joye
2021/1160 ( PDF )
Classical Attacks on a Variant of the RSA Cryptosystem
Abderrahmane Nitaj and Muhammad Rezal Kamel Ariffin and Nurul Nur Hanisah Adenan and Nur Azman Abu
2021/1159 ( PDF )
Compact and Malicious Private Set Intersection for Small Sets
Mike Rosulek and Ni Trieu
2021/1158 ( PDF )
Grafting Key Trees: Efficient Key Management for Overlapping Groups
Joël Alwen and Benedikt Auerbach and Mirza Ahad Baig and Miguel Cueto and Karen Klein and Guillermo Pascual-Perez and Krzysztof Pietrzak and Michael Walter
2021/1157 ( PDF )
Lightweight Private Similarity Search
Sacha Servan-Schreiber and Simon Langowski and Srinivas Devadas
2021/1156 ( PDF )
Evolving Secret Sharing in Almost Semi-honest Model
Jyotirmoy Pramanik and Avishek Adhikari
2021/1155 ( PDF )
GPS: Integration of Graphene, PALISADE, and SGX for Large-scale Aggregations of Distributed Data
Jonathan Takeshita and Colin McKechney and Justin Pajak and Antonis Papadimitriou and Ryan Karl and Taeho Jung
2021/1154 ( PDF )
1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher
Elena Andreeva and Amit Singh Bhati and Bart Preneel and Damian Vizar
2021/1153 ( PDF )
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation
Arpita Patra and Thomas Schneider and Ajith Suresh and Hossein Yalame
2021/1152 ( PDF )
Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field
Simon Masson and Antonio Sanso and Zhenfei Zhang
2021/1151 ( PDF )
Efficient Modular Multiplication
Joppe W. Bos and Thorsten Kleinjung and Dan Page
2021/1150 ( PDF )
Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes
Geoffroy Couteau and Peter Rindal and Srinivasan Raghuraman
2021/1149 ( PDF )
Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head
José Bacelar Almeida and Manuel Barbosa and Manuel L Correia and Karim Eldefrawy and Stéphane Graham-Lengrand and Hugo Pacheco and Vitor Pereira
2021/1148 ( PDF )
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS)
Linsheng Liu and Daniel S. Roche and Austin Theriault and Arkady Yerukhimovich
2021/1147 ( PDF )
Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts
Kushal Babel and Philip Daian and Mahimna Kelkar and Ari Juels
2021/1146 ( PDF )
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness
Shuai Han and Shengli Liu and Dawu Gu
2021/1145 ( PDF )
Recurring Contingent Payment for Proofs of Retrievability
Aydin Abadi and Steven J. Murdoch and Thomas Zacharias
2021/1144 ( PDF )
MAYO: Practical Post-Quantum Signatures from Oil-and-Vinegar Maps
Ward Beullens
2021/1143 ( PDF )
Facial Recognition for Remote Electronic Voting – Missing Piece of the Puzzle or Yet Another Liability?
Sven Heiberg and Kristjan Krips and Jan Willemson and Priit Vinkel
2021/1142 ( -- withdrawn -- )
The Elliptic Net Algorithm Revisited
Shiping Cai and Zhi Hu and Zheng-An Yao and Chang-An Zhao
2021/1141 ( PDF )
Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback
Giovanni Deligios and Martin Hirt and Chen-Da Liu-Zhang
2021/1140 ( PDF )
Computing Discrete Logarithms
Robert Granger and Antoine Joux
2021/1139 ( PDF )
HyperLogLog: Exponentially Bad in Adversarial Settings
Kenneth G. Paterson and Mathilde Raynal
2021/1138 ( PDF )
Optimal Good-case Latency for Rotating Leader Synchronous BFT
Ittai Abraham and Kartik Nayak and Nibesh Shrestha
2021/1137 ( PDF )
qTESLA: Practical Implementations of a Quantum Attack Resistant Signature Scheme
Michael Burger and Juliane Krämer and Christian Bischof
2021/1136 ( PDF )
A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions
Michael Burger and Christian Bischof and Juliane Krämer
2021/1135 ( PDF )
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption
Kamil Kluczniak and Leonard Schild
2021/1134 ( PDF )
Some observations on ZUC-256
Alexander Maximov
2021/1133 ( PDF )
Multiradical isogenies
Wouter Castryck and Thomas Decru
2021/1132 ( PDF )
Safe-Error Attacks on SIKE and CSIDH
Fabio Campos and Juliane Krämer and Marcel Müller
2021/1131 ( PDF )
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertext
Tanping Zhou and Zhenfeng Zhang and Long Chen and Xiaoliang Che and Wenchao Liu and Xiaoyuan Yang
2021/1130 ( PDF )
A note on group membership tests for $\G_1$, $\G_2$ and $\G_T$ on BLS pairing-friendly curves
Michael Scott
2021/1129 ( PDF )
Beauty of Cryptography: the Cryptographic Sequences and the Golden Ratio
Shenghui Su and Jianhua Zheng and Shuwang Lv
2021/1128 ( PDF )
Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity
Gianluca Brian and Antonio Faonio and Daniele Venturi
2021/1127 ( PDF )
Bigdata-facilitated Two-party Authenticated Key Exchange for IoT
Bowen Liu and Qiang Tang and Jianying Zhou
2021/1126 ( PDF )
Turn-Based Communication Channels
Carlo Brunetta and Mario Larangeira and Bei Liang and Aikaterini Mitrokotsa and Keisuke Tanaka
2021/1125 ( PDF )
Towards Explaining Epsilon: A Worst-Case Study of Differential Privacy Risks
Luise Mehner and Saskia Nuñez von Voigt and Florian Tschorsch
2021/1124 ( PDF )
A Semi-Permanent Stuck-At Fault Analysis on AES Rijndael SBox
Priyanka Joshi and Bodhisatwa Mazumdar
2021/1123 ( PDF )
Oblivious RAM with Worst-Case Logarithmic Overhead
Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Elaine Shi
2021/1122 ( PDF )
And Paper-Based is Better? Towards Comparability of Classic and Cryptographic Voting Schemes
Marc Nemes and Rebecca Schwerdt and Dirk Achenbach and Bernhard Löwe and Jörn Müller-Quade
2021/1121 ( PDF )
Constant-Time Arithmetic for Safer Cryptography
Lúcás Críostóir Meier and Simone Colombo and Marin Thiercelin and Bryan Ford
2021/1120 ( PDF )
Simpira Gets Simpler: Optimized Simpira on Microcontrollers
Minjoo Sim and Siwoo Eum and Hyeokdong Kwon and Kyungbae Jang and Hyunjun Kim and Hyunji Kim and Gyeongju Song and Wai-Kong Lee and Hwajeong Seo
2021/1119 ( PDF )
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials
Xiaoyang Dong and Zhiyu Zhang and Siwei Sun and Congming Wei and Xiaoyun Wang and Lei Hu
2021/1118 ( PDF )
THC: Practical and Cost-Effective Verification of Delegated Computation
Pablo Rauzy and Ali Nehme
2021/1117 ( PDF )
All the Polynomial Multiplication You Need on RISC-V
Hwajeong Seo and Hyeokdong Kwon and Siwoo Eum and Kyungbae Jang and Hyunjun Kim and Hyunji Kim and Minjoo Sim and Gyeongju Song and Wai-Kong Lee
2021/1116 ( PDF )
Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication
Kelong Cong and Radames Cruz Moreno and Mariana Botelho da Gama and Wei Dai and Ilia Iliashenko and Kim Laine and Michael Rosenberg
2021/1115 ( PDF )
Evolving Secret Sharing Schemes Based on Polynomial Evaluations and Algebraic Geometry Codes
Chaoping Xing and Chen Yuan
2021/1114 ( PDF )
Remarks on MOBS and cryptosystems using semidirect products
Chris Monico
2021/1113 ( PDF )
On the Security of Doubly Efficient PIR
Elette Boyle and Justin Holmgren and Fermi Ma and Mor Weiss
2021/1112 ( PDF )
Key agreement: security / division
Daniel R. L. Brown
2021/1111 ( PDF )
A Low-Randomness Second-Order Masked AES
Tim Beyne and Siemen Dhooghe and Adrián Ranea and Danilo Šijačić
2021/1110 ( PDF )
Secure and Efficient Software Masking on Superscalar Pipelined Processors
Barbara Gigerl and Robert Primas and Stefan Mangard
2021/1109 ( PDF )
On Actively Secure Fine-grained Access Structures from Isogeny Assumptions
Philipp Muth and Fabio Campos
2021/1108 ( PDF )
Preservation of DNA Privacy During the Large Scale Detection of COVID
Marcel Hollenstein and David Naccache and Peter B. Roenne and Peter Y A Ryan and Robert Weil and Ofer Yifrach-Stav
2021/1107 ( PDF )
Multi-Leak Deep-Learning Side-Channel Analysis
Fanliang Hu and Huanyu Wang and Junnian Wang
2021/1106 ( PDF )
Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More
Eric Brier and Rémi Géraud-Stewart and Marc Joye and David Naccache
2021/1105 ( PDF )
Improved Linear Approximations of SNOW-V and SNOW-Vi
Zhen Shi and Chenhui Jin and Yu Jin
2021/1104 ( PDF )
Finding Practical Distinguishers for ZUC-256 Using Modular Differences
Fukang Liu and Willi Meier and Santanu Sarkar and Gaoli Wang and Ryoma Ito and Takanori Isobe
2021/1103 ( PDF )
Exploring Differential-Based Distinguishers and Forgeries for ASCON
David Gerault and Thomas Peyrin and Quan Quan Tan
2021/1102 ( -- withdrawn -- )
Construction and Implementation of Practical Reusable and Robust Fuzzy Extractors for Fingerprint
Lin You and Wang Cheng and Gengran Hu
2021/1101 ( PDF )
Differential Privacy in Constant Function Market Makers
Tarun Chitra and Guillermo Angeris and Alex Evans
2021/1100 ( PDF )
REDsec: Running Encrypted DNNs in Seconds
Lars Folkerts and Charles Gouert and Nektarios Georgios Tsoutsos
2021/1099 ( PDF )
MILP modeling of Boolean functions by minimum number of inequalities
Aleksei Udovenko
2021/1098 ( PDF )
Individual Verifiability and Revoting in the Estonian Internet Voting System
Olivier Pereira
2021/1097 ( PDF )
The Hadamard square of concatenated linear codes
Ivan Chizhov and Alexandra Davletshina
2021/1096 ( PDF )
Mt. Random: Multi-Tiered Randomness Beacons
Ignacio Cascudo and Bernardo David and Omer Shlomovits and Denis Varlakov
2021/1095 ( PDF )
Analyzing Masked Ciphers Against Transition and Coupling Effects
Siemen Dhooghe
2021/1094 ( PDF )
Resilient Uniformity: Applying Resiliency in Masking
Siemen Dhooghe and Svetla Nikova
2021/1093 ( PDF )
Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering
Yilei Chen and Qipeng Liu and Mark Zhandry
2021/1092 ( PDF )
SoK: Deep Learning-based Physical Side-channel Analysis
Stjepan Picek and Guilherme Perin and Luca Mariot and Lichao Wu and Lejla Batina
2021/1091 ( PDF )
No (Good) Loss no Gain: Systematic Evaluation of Loss functions in Deep Learning-based Side-channel Analysis
Maikel Kerkhof and Lichao Wu and Guilherme Perin and Stjepan Picek
2021/1090 ( PDF )
Towards Accountability in CRS Generation
Prabhanjan Ananth and Gilad Asharov and Hila Dahari and Vipul Goyal
2021/1089 ( PDF )
Threshold scheme to share a secret by means of sound ranging
Sergij V. Goncharov
2021/1088 ( PDF )
Studying Bitcoin privacy attacks and their Impact on Bitcoin-based Identity Methods
Simin Ghesmati and Walid Fdhila and Edgar Weippl
2021/1087 ( PDF )
Methods for Decentralized Identities: Evaluation and Insights
Walid Fdhila and Nicholas Stifter and Kristian Kostal and Cihan Saglam and Markus Sabadello
2021/1086 ( PDF )
How do the Arbiter PUFs Sample the Boolean Function Class?
Animesh Roy and Dibyendu Roy and Subhamoy Maitra
2021/1085 ( PDF )
Homomorphic Encryption for Multiple Users with Less Communications
Jeongeun Park
2021/1084 ( PDF )
Towards the Least Inequalities for Describing a Subset in $Z_2^n$
Yao Sun
2021/1083 ( PDF )
Modular Design of Secure Group Messaging Protocols and the Security of MLS
Joël Alwen and Sandro Coretti and Yevgeniy Dodis and Yiannis Tselekounis
2021/1082 ( PDF )
Some remarks on how to hash faster onto elliptic curves
Dmitrii Koshelev
2021/1081 ( PDF )
OnionPIR: Response Efficient Single-Server PIR
Muhammad Haris Mughees and Hao Chen and Ling Ren
2021/1080 ( PDF )
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning
Ege Erdogan and Alptekin Kupcu and A. Ercument Cicek
2021/1079 ( PDF )
The Exact Complexity of Pseudorandom Functions and Tight Barriers to Lower Bound Proofs
Zhiyuan Fan and Jiatu Li and Tianqi Yang
2021/1078 ( PDF )
Reflection, Rewinding, and Coin-Toss in EasyCrypt
Denis Firsov and Dominique Unruh
2021/1077 ( PDF )
MProve+ : Privacy Enhancing Proof of Reserves Protocol for Monero
Arijit Dutta and Suyash Bagad and Saravanan Vijayakumaran
2021/1076 ( PDF )
Hardness of KT Characterizes Parallel Cryptography
Hanlin Ren and Rahul Santhanam
2021/1075 ( PDF )
The security of the code-based signature scheme based on the Stern identification protocol
Victoria Vysotskaya and Ivan Chizhov
2021/1074 ( PDF )
UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning
Ege Erdogan and Alptekin Kupcu and A. Ercument Cicek
2021/1073 ( PDF )
"Act natural!": Having a Private Chat on a Public Blockchain
Thore Tiemann and Sebastian Berndt and Thomas Eisenbarth and Maciej Liskiewicz
2021/1072 ( PDF )
Streaming SPHINCS+ for Embedded Devices using the Example of TPMs
Ruben Niederhagen and Johannes Roth and Julian Wälde
2021/1071 ( PDF )
Improved Verifiability for BeleniosVS
Thomas Haines and Rajeev Gore
2021/1070 ( PDF )
Onyx: New Encryption and Signature Schemes with Multivariate Public Key in Degree 3
Gilles Macario-Rat and Jacques Patarin
2021/1069 ( PDF )
Djed: A Formally Verified Crypto-Backed Pegged Algorithmic Stablecoin
Joachim Zahnentferner and Dmytro Kaidalov and Jean-Frédéric Etienne and Javier Díaz
2021/1068 ( PDF )
A Simple Post-Quantum Non-Interactive Zero-Knowledge Proof from Garbled Circuits
Hongrui Cui and Kaiyi Zhang
2021/1067 ( PDF )
A Tale of Twin Primitives: Single-chip Solution for PUFs and TRNGs
Kuheli Pratihar and Urbi Chatterjee and Manaar Alam and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty
2021/1066 ( PDF )
Taphonomical Security: (DNA) Information with Foreseeable Lifespan
Fatima-Ezzahra El Orche and Marcel Hollenstein and Sarah Houdaigoui and David Naccache and Daria Pchelina and Peter B. Roenne and Peter Y.A. Ryan and Julien Weibel and Robert Weil
2021/1065 ( PDF )
Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol
Gergei Bana and Marco Biroli and Megi Dervishi and Fatima-Ezzahra El Orche and Rémi Géraud-Stewart and David Naccache and Peter B. Roenne and Peter Y.A. Ryan and Hugo Waltsburger
2021/1064 ( PDF )
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED
Ben Nassi and Yaron Pirutin and Tomer Cohen Galor and Yuval Elovici and Boris Zadov
2021/1063 ( PDF )
Cairo – a Turing-complete STARK-friendly CPU architecture
Lior Goldberg and Shahar Papini and Michael Riabzev
2021/1062 ( PDF )
On the Nonsingularity and Equivalence of NFSRs
Yingyin Pan and Jianghua Zhong and Dongdai Lin
2021/1061 ( PDF )
Edwards curves and FFT-based multiplication
Pavel Atnashev and George Woltman
2021/1060 ( PDF )
Discovering New $L$-Function Relations Using Algebraic Sieving
Hadrien Barral and Éric Brier and Rémi Géraud-Stewart and Arthur Léonard and David Naccache and Quentin Vermande and Samuel Vivien
2021/1059 ( PDF )
Revisiting cryptanalysis on ChaCha from Crypto 2020 and Eurocrypt 2021
Sabyasachi Dey and Chandan Dey and Santanu Sarkar and Willi Meier
2021/1058 ( PDF )
Cryptanalysis of Caesar using Quantum Support Vector Machine
Hyunji Kim and Gyeongju Song and Kyoungbae Jang and Hwajeong Seo
2021/1057 ( PDF )
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport
Chun-I Fan and Cheng-Han Shie and Yi-Fan Tseng and Hui-Chun Huang
2021/1056 ( PDF )
Revocable Attribute-Based Encryption for Multi-Keyword Search in Clouds
Chun-I Fan and Si-Jing Wu and Yi-Fan Tseng
2021/1055 ( PDF )
Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions
François Garillot and Yashvanth Kondi and Payman Mohassel and Valeria Nikolaenko
2021/1054 ( PDF )
One-time Traceable Ring Signatures
Alessandra Scafuro and Bihan Zhang
2021/1053 ( PDF )
XDIVINSA: eXtended DIVersifying INStruction Agent to Mitigate Power Side-Channel Leakage
Thinh H. Pham and Ben Marshall and Alexander Fell and Siew-Kei Lam and Daniel Page
2021/1052 ( PDF )
Comparing Lattice Families for Bounded Distance Decoding near Minkowski’s Bound.
Oleksandra Lapiha
2021/1051 ( PDF )
Collisions in Supersingular Isogeny Graphs and the SIDH-based Identification Protocol
Wissam Ghantous and Federico Pintore and Mattia Veroni
2021/1050 ( PDF )
Privacy-Enhancing Group Signcryption Scheme
Sara Ricci and Petr Dzurenda and Jan Hajny and Lukas Malina
2021/1049 ( PDF )
Binary Search in Secure Computation
Marina Blanton and Chen Yuan
2021/1048 ( PDF )
Aggregating hash-based signatures using STARKs
Irakliy Khaburzaniya and Konstantinos Chalkias and Kevin Lewi and Harjasleen Malvai
2021/1047 ( PDF )
A Correlation Attack on Full SNOW-V and SNOW-Vi
Zhen Shi and Chenhui Jin and Jiyan Zhang and Ting Cui and Lin Ding
2021/1046 ( PDF )
On the modifier Q for multivariate signature schemes
Yasufumi Hashimoto
2021/1045 ( PDF )
Minor improvements of algorithm to solve under-defined systems of multivariate quadratic equations
Yasufumi Hashimoto
2021/1044 ( PDF )
On the security of Hufu-UOV
Yasufumi Hashimoto
2021/1043 ( PDF )
Brakedown: Linear-time and post-quantum SNARKs for R1CS
Alexander Golovnev and Jonathan Lee and Srinath Setty and Justin Thaler and Riad S. Wahby
2021/1042 ( PDF )
Rate One-Third Non-malleable Codes
Divesh Aggarwal and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Maciej Obremski and Sruthi Sekar
2021/1041 ( PDF )
On the Multiplicative Complexity of Cubic Boolean Functions
Meltem Sonmez Turan and Rene Peralta
2021/1040 ( PDF )
MUSE: Secure Inference Resilient to Malicious Clients
Ryan Lehmkuhl and Pratyush Mishra and Akshayaram Srinivasan and Raluca Ada Popa
2021/1039 ( PDF )
Neyman’s Smoothness Test: a Trade-off between Moment-based and Distribution-based Leakage Detections
Si Gao and Elisabeth Oswald and Yan Yan
2021/1038 ( PDF )
Reinforced Concrete: Fast Hash Function for Zero Knowledge Proofs and Verifiable Computation
Mario Barbara and Lorenzo Grassi and Dmitry Khovratovich and Reinhard Lueftenegger and Christian Rechberger and Markus Schofnegger and Roman Walch
2021/1037 ( PDF )
Randomness Bounds for Private Simultaneous Messages and Conditional Disclosure of Secrets
Akinori Kawachi and Maki Yoshida
2021/1036 ( PDF )
Lelantus-CLA
Pyrros Chaidos and Vladislav Gelfer
2021/1035 ( PDF )
Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data
Seny Kamara and Abdelkarim Kati and Tarik Moataz and Thomas Schneider and Amos Treiber and Michael Yonli
2021/1034 ( PDF )
Optimal encodings to elliptic curves of $j$-invariants $0$, $1728$
Dmitrii Koshelev
2021/1033 ( PDF )
Limits of Polynomial Packings for $\mathbb{Z}_{p^k}$ and $\mathbb{F}_{p^k}$
Jung Hee Cheon and Keewoo Lee
2021/1032 ( PDF )
AdVeil: A Private Targeted-Advertising Ecosystem
Sacha Servan-Schreiber and Kyle Hogan and Srinivas Devadas
2021/1031 ( PDF )
Commitment Schemes from Supersingular Elliptic Curve Isogeny Graphs
Bruno Sterner
2021/1030 ( PDF )
A lightweight ISE for ChaCha on RISC-V
Ben Marshall and Daniel Page and Thinh Hung Pham
2021/1029 ( PDF )
LOVE a pairing
Diego F. Aranha and Elena Pagnin and Francisco Rodríguez-Henríquez
2021/1028 ( PDF )
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography
Claude Carlet and Sylvain Guilley and Sihem Mesnager
2021/1027 ( PDF )
On Fingerprinting Attacks and Length-Hiding Encryption
Kai Gellert and Tibor Jager and Lin Lyu and Tom Neuschulten
2021/1026 ( -- withdrawn -- )
On the Hardness of Ring/Module/Polynomial LWR Problems
Yang Wang and Yanmin Zhao and Mingqiang Wang
2021/1025 ( PDF )
Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings
Daniel Escudero and Eduardo Soria-Vazquez
2021/1024 ( PDF )
Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications
Wai-Kong Lee and Kyungbae Jang and Gyeongju Song and Hyunji Kim and Seong Oun Hwang and Hwajeong Seo
2021/1023 ( PDF )
SIDH Proof of Knowledge
Luca De Feo and Samuel Dobson and Steven D. Galbraith and Lukas Zobernig
2021/1022 ( PDF )
Zero-Knowledge Middleboxes
Paul Grubbs and Arasu Arun and Ye Zhang and Joseph Bonneau and Michael Walfish
2021/1021 ( PDF )
Power-based Side Channel Attack Analysis on PQC Algorithms
Tendayi Kamucheka and Michael Fahr and Tristen Teague and Alexander Nelson and David Andrews and Miaoqing Huang
2021/1020 ( PDF )
Designing a Practical Code-based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
Shay Gueron and Edoardo Persichetti and Paolo Santini
2021/1019 ( PDF )
Implementing and Measuring KEMTLS
Sofía Celi and Armando Faz-Hernández and Nick Sullivan and Goutam Tamvada and Luke Valenta and Thom Wiggers and Bas Westerbaan and and Christopher A. Wood
2021/1018 ( PDF )
Obfustopia Built on Secret-Key Functional Encryption
Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
2021/1017 ( PDF )
Improve Neural Distinguisher for Cryptanalysis
Zezhou Hou and Jiongjiong Ren and Shaozhen Chen
2021/1016 ( PDF )
Quantum collision finding for homomorphic hash functions
Juan Carlos Garcia-Escartin and Vicent Gimeno and Julio José Moyano-Fernández
2021/1015 ( PDF )
Look-up the Rainbow: Efficient Table-based Parallel Implementation of Rainbow Signature on 64-bit ARMv8 Processors
Hyeokdong Kwon and Hyunjun Kim and Minjoo Sim and Wai-Kong Lee and Hwajeong Seo
2021/1014 ( PDF )
SoC Security Properties and Rules
Nusrat Farzana and Farimah Farahmandi and Mark Tehranipoor
2021/1013 ( PDF )
Iterative Oblivious Pseudo-Random Functions and Applications
Erik-Oliver Blass and Florian Kerschbaum and Travis Mayberry
2021/1012 ( PDF )
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification
Quoc Huy Do and Pedram Hosseyni and Ralf Kuesters and Guido Schmitz and Nils Wenzler and Tim Wuertele
2021/1011 ( PDF )
A Fast and Flexible Multi-Client Functional Encryption for Set Intersection
Mojtaba Rafiee
2021/1010 ( PDF )
Circuit friendly, post-quantum dynamic accumulators from RingSIS with logarithmic prover time
Endre (Silur) Abraham
2021/1009 ( PDF )
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited
Aydin Abadi and Steven J. Murdoch and Thomas Zacharias
2021/1008 ( PDF )
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo and Yu-Chi Chen
2021/1007 ( PDF )
Provably Solving the Hidden Subset Sum Problem via Statistical Learning
Jean-Sebastien Coron and Agnese Gini
2021/1006 ( PDF )
UOV-Pepper: New Public Key Short Signature in Degree 3
Gilles Macario-Rat and Jacques Patarin
2021/1005 ( PDF )
On the Construction and Cryptanalysis of Multi-Ciphers
Arush Chhatrapati
2021/1004 ( PDF )
Towards Attack Resilient Arbiter PUF-Based Strong PUFs
Nils Wisiol
2021/1003 ( PDF )
SCA-secure ECC in software – mission impossible?
Lejla Batina and Łukasz Chmielewski and Björn Haase and Niels Samwel and Peter Schwabe
2021/1002 ( PDF )
Online Linear Extractors for Independent Sources
Yevgeniy Dodis and Siyao Guo and Noah Stephens-Davidowitz and Zhiye Xie
2021/1001 ( PDF )
Classical Binding for Quantum Commitments
Nir Bitansky and Zvika Brakerski
2021/1000 ( PDF )
A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model
Masayuki Fukumitsu and Shingo Hasegawa
2021/999 ( PDF )
NTRU Fatigue: How Stretched is Overstretched?
Léo Ducas and Wessel van Woerden
2021/998 ( PDF )
Polynomial multiplication on embedded vector architectures
Hanno Becker and Jose Maria Bermudo Mera and Angshuman Karmakar and Joseph Yiu and Ingrid Verbauwhede
2021/997 ( PDF )
Higher-Order Lookup Table Masking in Essentially Constant Memory
Annapurna Valiveti and Srinivas Vivek
2021/996 ( PDF )
Kadcast-NG: A Structured Broadcast Protocol for Blockchain Networks
Elias Rohrer and Florian Tschorsch
2021/995 ( PDF )
Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4
Amin Abdulrahman and Jiun-Peng Chen and Yu-Jia Chen and Vincent Hwang and Matthias J. Kannwischer and Bo-Yin Yang
2021/994 ( PDF )
BKW Meets Fourier: New Algorithms for LPN with Sparse Parities
Dana Dachman-Soled and Huijing Gong and Hunter Kippen and Aria Shahverdi
2021/993 ( PDF )
FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority
Ye Dong and Xiaojun Chen and Kaiyun Li and Dakui Wang and Shuai Zeng
2021/992 ( PDF )
Faster Public-key Compression of SIDH with Less Memory
Kaizhan Lin and Jianming Lin and Weize Wang and Chang-An Zhao
2021/991 ( PDF )
Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices
Naila Mukhtar and Lejla Batina and Stjepan Picek and Yinan Kong
2021/990 ( PDF )
Secret Keys in Genus-2 SIDH
Sabrina Kunzweiler and Yan Bo Ti and Charlotte Weitkämper
2021/989 ( PDF )
Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism
Jia Xu and Yiwen Gao and Hoon Wei Lim and Hongbing Wang and Ee-Chien Chang
2021/988 ( PDF )
Concurrent Signatures from a Variety of Keys
George Teseleanu
2021/987 ( PDF )
A Formal Security Analysis of Session Resumption Across Hostnames
Kai Gellert and Tobias Handirk
2021/986 ( PDF )
Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1
Hanno Becker and Vincent Hwang and Matthias J. Kannwischer and Bo-Yin Yang and Shang-Yi Yang
2021/985 ( PDF )
PUF Security: Reviewing The Validity of Spoofing Attack Against Safe is the New Smart
Karim Lounis
2021/984 ( PDF )
On the Use of the Legendre Symbol in Symmetric Cipher Design
Alan Szepieniec
2021/983 ( PDF )
A Cryptographic Hash Function from Markoff Triples
Elena Fuchs and Kristin Lauter and Matthew Litman and Austin Tran
2021/982 ( PDF )
Quantum Implementation and Resource Estimates for RECTANGLE and KNOT
Anubhab Baksi and Kyungbae Jang and Gyeongju Song and Hwajeong Seo and Zejun Xiang
2021/981 ( PDF )
Deep Learning-based Side-channel Analysis against AES Inner Rounds
Sudharshan Swaminathan and Lukasz Chmielewski and Guilherme Perin and Stjepan Picek
2021/980 ( PDF )
Binary Field Montgomery Multiplication on Quantum Computers
Kyoungbae Jang and Gyeong Ju Song and Hyunji Kim and Hyeokdong Kwon and Wai-Kong Lee and Zhi Hu and Hwajeong Seo
2021/979 ( PDF )
Constant-Overhead Zero-Knowledge for RAM Programs
Nicholas Franzese and Jonathan Katz and Steve Lu and Rafail Ostrovsky and Xiao Wang and Chenkai Weng
2021/978 ( PDF )
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications
Donghang Lu and Albert Yu and Aniket Kate and Hemanta Maji
2021/977 ( PDF )
Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices
Yuval Ishai and Hang Su and David J. Wu
2021/976 ( PDF )
Reinventing BEDs: Formal Treatment of Broadcast Encryption with Dealership and Practical Constructions
Sayantan Mukherjee and Avishek Majumder
2021/975 ( PDF )
Bridges connecting Encryption Schemes
Mugurel Barcau and Cristian Lupascu and Vicentiu Pasol and George C. Turcas
2021/974 ( PDF )
Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds
Yi-Fan Tseng and Chun-I Fan and Zi-Cheng Liu
2021/973 ( PDF )
A Multiplatform Parallel Approach for Lattice Sieving Algorithms
Michał Andrzejczak and Kris Gaj
2021/972 ( PDF )
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA
Alexander May and Julian Nowakowski and Santanu Sarkar
2021/971 ( PDF )
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\Sigma$-Protocols
Lior Rotem and Gil Segev
2021/970 ( PDF )
Short Identity-Based Signatures with Tight Security from Lattices
Jiaxin Pan and Benedikt Wagner
2021/969 ( PDF )
Influence of a Set of Variables on a Boolean Function
Aniruddha Biswas and Palash Sarkar
2021/968 ( PDF )
White-Box Implementations for Hash-Based Signatures and One-Time Passwords
Kemal Bicakci and Kemal Ulker and Yusuf Uzunay
2021/967 ( PDF )
Assessment of Quantum Threat To Bitcoin and Derived Cryptocurrencies
Stephen Holmes and Liqun Chen
2021/966 ( PDF )
Soteria: Privacy-Preserving Machine Learning for Apache Spark
Cláudia Brito and Pedro Ferreira and Bernardo Portela and Rui Oliveira and João Paulo
2021/965 ( PDF )
Automatic Search for Bit-based Division Property
Shibam Ghosh and Orr Dunkelman
2021/964 ( PDF )
Secure Quantum Computation with Classical Communication
James Bartusek
2021/963 ( PDF )
Post-Quantum Key-Blinding for Authentication in Anonymity Networks
Edward Eaton and Douglas Stebila and Roy Stracovsky
2021/962 ( PDF )
Practically Solving LPN
Thom Wiggers and Simona Samardjiska
2021/961 ( PDF )
Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes
Jan Bobolz and Fabian Eidens and Raphael Heitjohann and Jeremy Fell
2021/960 ( PDF )
The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures
Gregor Leander and Thorben Moos and Amir Moradi and Shahram Rasoolzadeh
2021/959 ( PDF )
The Best of Two Worlds: Deep Learning-assisted Template Attack
Lichao Wu and Guilherme Perin and Stjepan Picek
2021/958 ( PDF )
When the Decoder Has to Look Twice: Glitching a PUF Error Correction
Jonas Ruchti and Michael Gruber and Michael Pehl
2021/957 ( PDF )
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
Arpita Patra and Akshayaram Srinivasan
2021/956 ( PDF )
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
Mike Hamburg and Julius Hermelink and Robert Primas and Simona Samardjiska and Thomas Schamberger and Silvan Streit and Emanuele Strieder and Christine van Vredendaal
2021/955 ( PDF )
Higher-degree supersingular group actions
Mathilde Chenu and Benjamin Smith
2021/954 ( PDF )
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms
Jose Maria Bermudo Mera and Angshuman Karmakar and Suparna Kundu and Ingrid Verbauwhede
2021/953 ( PDF )
State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption
Keita Emura and Ryoma Ito and Sachiko Kanamori and Ryo Nojima and Yohei Watanabe
2021/952 ( PDF )
On the Evaluation of Deep Learning-based Side-channel Analysis
Lichao Wu and Guilherme Perin and Stjepan Picek
2021/951 ( PDF )
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
Melissa Azouaoui and Olivier Bronchain and Vincent Grosso and Kostas Papagiannopoulos and François-Xavier Standaert
2021/950 ( PDF )
Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying
Sébastien Duval and Pierrick Méaux and Charles Momin and François-Xavier Standaert
2021/949 ( PDF )
A High-Speed Architecture for the Reduction in VDF Based on a Class Group
Yifeng Song and Danyang Zhu and Jing Tian and Zhongfeng Wang
2021/948 ( PDF )
How to Make a Secure Index for Searchable Symmetric Encryption, Revisited
Yohei Watanabe and Takeshi Nakai and Kazuma Ohara and Takuya Nojima and Yexuan Liu and Mitsugu Iwamoto and Kazuo Ohta
2021/947 ( PDF )
Autocorrelations of vectorial Boolean functions
Anne Canteaut and Lukas Kölsch and Chao Li and Chunlei Li and Kangquan Li and Longjiang Qu and Friedrich Wiemer
2021/946 ( PDF )
Hidden Cosets and Applications to Unclonable Cryptography
Andrea Coladangelo and Jiahui Liu and Qipeng Liu and Mark Zhandry
2021/945 ( PDF )
Limits on the Adaptive Security of Yao's Garbling
Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Daniel Wichs
2021/944 ( PDF )
Systematic Side-channel Analysis of Curve25519 with Machine Learning
Léo Weissbart and Łukasz Chmielewski and Stjepan Picek and Lejla Batina
2021/943 ( PDF )
Breaking the Circuit-Size Barrier for Secure Computation under Quasi-Polynomial LPN
Geoffroy Couteau and Pierre Meyer
2021/942 ( PDF )
Compact Ring Signatures from Learning With Errors
Rohit Chatterjee and Sanjam Garg and Mohammad Hajiabadi and Dakshita Khurana and Xiao Liang and Giulio Malavolta and Omkant Pandey and Sina Shiehian
2021/941 ( PDF )
Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme
Maamar Ouladj and Sylvain Guilley and Philippe Guillot and Farid Mokrane
2021/940 ( PDF )
SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user's secret data
Ripon Patgiri and Malaya Dutta Borah and Laiphrakpam Dolendro Singh
2021/939 ( PDF )
OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning
Jiacheng Liang and Songze Li and Wensi Jiang and Bochuan Cao and Chaoyang He
2021/938 ( PDF )
Plactic signatures
Daniel R. L. Brown
2021/937 ( PDF )
Storing data that is updated regularly on a client machine securely
Artem Los
2021/936 ( PDF )
FIVER -- Robust Verification of Countermeasures against Fault Injections
Jan Richter-Brockmann and Aein Rezaei Shahmirzadi and Pascal Sasdrich and Amir Moradi and Tim Güneysu
2021/935 ( PDF )
ROTed: Random Oblivious Transfer for embedded devices
Pedro Branco and Luís Fiolhais and Manuel Goulão and Paulo Martins and Paulo Mateus and Leonel Sousa
2021/934 ( PDF )
ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines
Diego F. Aranha and Emil Madsen Bennedsen and Matteo Campanelli and Chaya Ganesh and Claudio Orlandi and Akira Takahashi
2021/933 ( PDF )
Fast Factoring Integers by SVP Algorithms, corrected
Claus Peter Schnorr
2021/932 ( PDF )
Succinct Functional Commitment for a Large Class of Arithmetic Circuits
Helger Lipmaa and Kateryna Pavlyk
2021/931 ( PDF )
Practical Key Recovery Attacks on FlexAEAD
Orr Dunkelman and Maria Eichlseder and Daniel Kales and Nathan Keller and Gaëtan Leurent and Markus Schofnegger
2021/930 ( PDF )
Darlin: Recursive Proofs using Marlin
Ulrich Haböck and Alberto Garoffolo and Daniele Di Benedetto
2021/929 ( PDF )
A polynomial time key-recovery attack on the Sidon cryptosystem
Pierre Briaud and Jean-Pierre Tillich and Javier Verbel
2021/928 ( PDF )
Necessary and Sufficient Conditions for Galois NFSRs Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium
Jianghua Zhong and Yingyin Pan and Wenhui Kong and Dongdai Lin
2021/927 ( PDF )
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs
Shuichi Katsumata
2021/926 ( PDF )
On Treewidth, Separators and Yao's Garbling
Chethan Kamath and Karen Klein and Krzysztof Pietrzak
2021/925 ( PDF )
Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure
Marten van Dijk and Deniz Gurevin and Chenglu Jin and Omer Khan and Phuong Ha Nguyen
2021/924 ( PDF )
On Removing Rejection Conditions in Practical Lattice-Based Signatures
Rouzbeh Behnia and Yilei Chen and Daniel Masny
2021/923 ( PDF )
On the (in)security of ElGamal in OpenPGP
Luca De Feo and Bertram Poettering and Alessandro Sorniotti
2021/922 ( -- withdrawn -- )
Provably Secure Short Signature Scheme from Isogeny between Elliptic Curves
Kunal Dey and Sumit Kumar Debnath
2021/921 ( PDF )
Semilinear transformations in coding theory and their application to cryptography
Wenshuo Guo and Fang-Wei Fu
2021/920 ( PDF )
Non-malleable Commitments against Quantum Attacks
Nir Bitansky and Huijia Lin and Omri Shmueli
2021/919 ( PDF )
The supersingular isogeny path and endomorphism ring problems are equivalent
Benjamin Wesolowski
2021/918 ( PDF )
The Round Complexity of Quantum Zero-Knowledge
Orestis Chardouvelis and Giulio Malavolta
2021/917 ( PDF )
CODBS: A cascading oblivious search protocol optimized for real-world relational database indexes
Rogério Pontes and Bernardo Portela and Manuel Barbosa and Ricardo Vilaça
2021/916 ( PDF )
Mithril: Stake-based Threshold Multisignatures
Pyrros Chaidos and Aggelos Kiayias
2021/915 ( PDF )
A PCP Theorem for Interactive Proofs and Applications
Gal Arnon and Alessandro Chiesa and Eylon Yogev
2021/914 ( PDF )
Principal Component Analysis using CKKS Homomorphic Encryption Scheme
Samanvaya Panda
2021/913 ( PDF )
Practical complexities of probabilistic algorithms for solving Boolean polynomial systems
Stefano Barbero and Emanuele Bellini and Carlo Sanna and Javier Verbel
2021/912 ( PDF )
On the looseness of FO derandomization
Daniel J. Bernstein
2021/911 ( PDF )
SoK: Understanding BFT Consensus in the Age of Blockchains
Gang Wang
2021/910 ( PDF )
SECDSA: Mobile signing and authentication under classical ``sole control''
Eric Verheul
2021/909 ( PDF )
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks – A Case Study on Public-Key Algorithms –
Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli
2021/908 ( PDF )
Selection of sampling keys for cryptographic tests
George Marinakis
2021/907 ( PDF )
zkKYC: A solution concept for KYC without knowing your customer, leveraging self-sovereign identity and zero-knowledge proofs
Pieter Pauwels
2021/906 ( PDF )
Two Public-Key Cryptosystems Based on Expanded Gabidulin Codes
Wenshuo Guo and Fang-Wei Fu
2021/905 ( PDF )
A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage
Vipul Arora and Ileana Buhan and Guilherme Perin and Stjepan Picek
2021/904 ( PDF )
Spatial Dependency Analysis to Extract Information from Side-Channel Mixtures
Aurélien Vasselle and Hugues Thiebeauld and Philippe Maurine
2021/903 ( PDF )
Nowhere to Leak: Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting (Extended Version)
Alexandros Bakas and Antonis Michalas
2021/902 ( PDF )
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
Kalle Ngo and Elena Dubrova and Thomas Johansson
2021/901 ( PDF )
Resolvable Block Designs in Construction of Approximate Real MUBs that are Sparse
Ajeet Kumar and Subhamoy Maitra
2021/900 ( PDF )
ANS-based Compression and Encryption with 128-bit Security
Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk
2021/899 ( PDF )
Homomorphic decryption in blockchains via compressed discrete-log lookup tables
Panagiotis Chatzigiannis and Konstantinos Chalkias and Valeria Nikolaenko
2021/898 ( PDF )
On Extremal Expanding Algebraic Graphs and post-quantum secure delivery of passwords, encryption maps and tools for multivariate digital signatures.
Vasyl Ustimenko
2021/897 ( PDF )
A Rational Protocol Treatment of 51% Attacks
Christian Badertscher and Yun Lu and Vassilis Zikas
2021/896 ( PDF )
Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise"
Danilo Gligoroski
2021/895 ( PDF )
Targeted Lossy Functions and Applications
Willy Quach and Brent Waters and Daniel Wichs
2021/894 ( PDF )
History of Cryptographic Key Sizes
Nigel P. Smart and Emmanuel Thome
2021/893 ( PDF )
DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop
Alexander Heinrich and Matthias Hollick and Thomas Schneider and Milan Stute and Christian Weinert
2021/892 ( PDF )
Low-Latency Keccak at any Arbitrary Order
Sara Zarei and Aein Rezaei Shahmirzadi and Hadi Soleimany and Raziye Salarifard and Amir Moradi
2021/891 ( PDF )
White Box Traitor Tracing
Mark Zhandry
2021/890 ( PDF )
A Note on One-way Functions and Sparse Languages
Yanyi Liu and Rafael Pass
2021/889 ( PDF )
Counterexamples to New Circular Security Assumptions Underlying iO
Sam Hopkins and Aayush Jain and Huijia Lin
2021/888 ( PDF )
Lifting Standard Model Reductions to Common Setup Assumptions
Ngoc Khanh Nguyen and Eftychios Theodorakis and Bogdan Warinschi
2021/887 ( PDF )
Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions
Janaka Alawatugoda and Taechan Kim
2021/886 ( PDF )
Computational Records with Aging Hardware: Controlling Half the Output of SHA-256
Mellila Bouam and Charles Bouillaguet and Claire Delaplace and Camille Noûs
2021/885 ( PDF )
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications
Itai Dinur and Steven Goldfeder and Tzipora Halevi and Yuval Ishai and Mahimna Kelkar and Vivek Sharma and Greg Zaverucha
2021/884 ( PDF )
Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and Simulations
Elias Rohrer and Florian Tschorsch
2021/883 ( PDF )
Oblivious Key-Value Stores and Amplification for Private Set Intersection
Gayathri Garimella and Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai
2021/882 ( PDF )
Computational Hardness of Optimal FairComputation: Beyond Minicrypt
Hemanta K. Maji and Mingyuan Wang
2021/881 ( PDF )
Secure Code-Based Key Encapsulation Mechanism with Short Ciphertext and Secret Key
Jayashree Dey and Ratna Dutta
2021/880 ( PDF )
Towards Tight Random Probing Security
Gaëtan Cassiers and Sebastian Faust and Maximilian Orlt and François-Xavier Standaert
2021/879 ( PDF )
Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing
Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis
2021/878 ( PDF )
Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attacks
Yuan Yao and Pantea Kiaei and Richa Singh and Shahin Tajik and Patrick Schaumont
2021/877 ( PDF )
A Fully Anonymous e-Voting Protocol Employing Universal zk-SNARKs and Smart Contracts
Aritra Banerjee
2021/876 ( PDF )
Code Constructions and Bounds for Identification via Channels
Onur Gunlu and Joerg Kliewer and Rafael F. Schaefer and Vladimir Sidorenko
2021/875 ( PDF )
Hybrid Signal protocol for post-quantum email encryption
Sara Stadler and Vitor Sakaguti and Harjot Kaur and Anna Lena Fehlhaber
2021/874 ( PDF )
Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction
Bo-Yeon Sim and Aesun Park and Dong-Guk Han
2021/873 ( PDF )
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange
Yanqi Gu and Stanislaw Jarecki and Hugo Krawczyk
2021/872 ( PDF )
W-OTS(+) up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets
David Chaum and Mario Larangeira and Mario Yaksetig and William Carter
2021/871 ( PDF )
Traceable Secret Sharing and Applications
Vipul Goyal and Yifan Song and Akshayaram Srinivasan
2021/870 ( PDF )
SoK: Gröbner Basis Algorithms for Arithmetization Oriented Ciphers
Jan Ferdinand Sauer and Alan Szepieniec
2021/869 ( PDF )
MiniLedger: Compact-sized Anonymous and Auditable Distributed Payments
Panagiotis Chatzigiannis and Foteini Baldimtsi
2021/868 ( PDF )
Low-Latency Hardware Masking of PRINCE
Nicolai Müller and Thorben Moos and Amir Moradi
2021/867 ( PDF )
Key-Policy ABE with Delegation of Rights
Cécile Delerablée and Lénaïck Gouriou and David Pointcheval
2021/866 ( PDF )
The One-More Discrete Logarithm Assumption in the Generic Group Model
Balthazar Bauer and Georg Fuchsbauer and Antoine Plouviez
2021/865 ( PDF )
Quantum Key Search for Ternary LWE
Iggy van Hoof and Elena Kirshanova and Alexander May
2021/864 ( PDF )
A Fast and Simple Partially Oblivious PRF, with Applications
Nirvan Tyagi and Sofı́a Celi and Thomas Ristenpart and Nick Sullivan and Stefano Tessaro and Christopher A. Wood
2021/863 ( PDF )
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model
Shuai Han and Tibor Jager and Eike Kiltz and Shengli Liu and Jiaxin Pan and Doreen Riepel and Sven Schäge
2021/862 ( PDF )
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved
Yi Wang and Rongmao Chen and Guomin Yang and Xinyi Huang and Baosheng Wang and Moti Yung
2021/861 ( PDF )
Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors
Janaka Alawatugoda and Tatsuaki Okamoto
2021/860 ( PDF )
Verification of the security in Boolean masked circuits
Vahid Jahandideh
2021/859 ( PDF )
Concrete Evaluation of the Random Probing Security
Vahid Jahandideh
2021/858 ( PDF )
Full key recovery side-channel attack against ephemeral SIKE on the Cortex-M4
Aymeric Genêt and Natacha Linard de Guertechin and Novak Kaluđerović
2021/857 ( PDF )
Secure Computation for G-Module and its Applications
Qizhi Zhang and Bingsheng Zhang and Lichun Li and Shan Yin and Juanjuan Sun
2021/856 ( PDF )
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks
Xiaoyang Dong and Lingyue Qin and Siwei Sun and Xiaoyun Wang
2021/855 ( PDF )
Donner: UTXO-Based Virtual Channels Across Multiple Hops
Lukas Aumayr and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei
2021/854 ( PDF )
PQC: R-Propping of a Simple Oblivious Transfer
Pedro Hecht
2021/853 ( PDF )
Private Signaling
Varun Madathil and Alessandra Scafuro and István András Seres and Omer Shlomovits and Denis Varlakov
2021/852 ( PDF )
Improved Structured Encryption for SQL Databases via Hybrid Indexing
David Cash and Ruth Ng and Adam Rivkin
2021/851 ( PDF )
Multiple Candidates Coercion-Resistant Blockchain-Based E-Voting Protocol With Receipts
Riccardo Longo and Chiara Spadafora
2021/850 ( PDF )
Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack
Élise Tasso and Luca De Feo and Nadia El Mrabet and and Simon Pontié
2021/849 ( PDF )
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs
Rei Ueno and Keita Xagawa and Yutaro Tanaka and Akira Ito and Junko Takahashi and Naofumi Homma
2021/848 ( PDF )
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE
Shweta Agrawal and Monosij Maitra and Narasimha Sai Vempati and Shota Yamada
2021/847 ( PDF )
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption
Rachit Garg and Rishab Goyal and George Lu and Brent Waters
2021/846 ( PDF )
Ergo Hackathon: Crowdfunded Smart Contract Pools Research and Conceptualization
Bronson Brooks Richard and Gary Waugh
2021/845 ( PDF )
An Intermediate Secret-Guessing Attack on Hash-Based Signatures
Roland Booth and Yanhong Xu and Sabyasachi Karati and Reihaneh Safavi-Naini
2021/844 ( PDF )
A note on IND-qCCA security in the ROM and its applications
Loïs Huguenin-Dumittan and Serge Vaudenay
2021/843 ( PDF )
Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions
Brandon Broadnax and Jeremias Mechler and Jörn Müller-Quade
2021/842 ( PDF )
PCPs and Instance Compression from a Cryptographic Lens
Liron Bronfman and Ron D. Rothblum
2021/841 ( PDF )
MPC for $Q_2$ Access Structures over Rings and Fields
Robin Jadoul and Nigel P. Smart and Barry Van Leeuwen
2021/840 ( PDF )
Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates
Keita Xagawa and Akira Ito and Rei Ueno and Junko Takahashi and Naofumi Homma
2021/839 ( PDF )
Prudent Practices in Security Standardization
Feng Hao
2021/838 ( PDF )
Anonymous and Distributed Authentication for Peer-to-Peer Networks
Pasan Tennakoon and Supipi Karunathilaka and Rishikeshan Lavakumar and Janaka Alawatugoda
2021/837 ( PDF )
On McEliece type cryptosystems using self-dual codes with large minimum weight
Luca Mariot and Stjepan Picek and Radinka Yorgova
2021/836 ( PDF )
Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs
Xiao Liang and Omkant Pandey
2021/835 ( PDF )
Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy
Sen Yuan and Milan Shen and Ilya Mironov and Anderson C. A. Nascimento
2021/834 ( PDF )
Unconditional Communication-Efficient MPC via Hall's Marriage Theorem
Vipul Goyal and Antigoni Polychroniadou and Yifan Song
2021/833 ( PDF )
ATLAS: Efficient and Scalable MPC in the Honest Majority Setting
Vipul Goyal and Hanjun Li and Rafail Ostrovsky and Antigoni Polychroniadou and Yifan Song
2021/832 ( PDF )
On the Efficiency and Flexibility of Signature Verification
Cecilia Boschini and Dario Fiore and Elena Pagnin
2021/831 ( PDF )
Private Remote Sources for Secure Multi-Function Computation
Onur Gunlu and Matthieu Bloch and Rafael F. Schaefer
2021/830 ( PDF )
Analysis and Protection of the Two-metric Helper Data Scheme
Lars Tebelmann and Ulrich Kühne and Jean-Luc Danger and Michael Pehl
2021/829 ( PDF )
To Shift or Not to Shift: Understanding GEA-1
Christof Beierle and Patrick Felke and Gregor Leander
2021/828 ( PDF )
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung
Chitchanok Chuengsatiansup and Eyal Ronen and Gregory G. Rose and Yuval Yarom
2021/827 ( PDF )
TransNet: Shift Invariant Transformer Network for Power Attack
Suvadeep Hajra and Sayandeep Saha and Manaar Alam and Debdeep Mukhopadhyay
2021/826 ( PDF )
OpenSSLNTRU: Faster post-quantum TLS key exchange
Daniel J. Bernstein and Billy Bob Brumley and Ming-Shing Chen and Nicola Tuveri
2021/825 ( PDF )
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation
Hannah Keller and Helen Möllering and Thomas Schneider and Hossein Yalame
2021/824 ( PDF )
Security Characterization of J-PAKE and its Variants
Michel Abdalla and Manuel Barbosa and Peter B. Rønne and Peter Y.A. Ryan and Petra Šala
2021/823 ( PDF )
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications
Daniel Günther and Maurice Heymann and Benny Pinkas and Thomas Schneider
2021/822 ( PDF )
One-out-of-$q$ OT Combiners
Oriol Farràs and Jordi Ribes-González
2021/821 ( PDF )
On the hardness of the NTRU problem
Alice Pellet-Mary and Damien Stehlé
2021/820 ( PDF )
Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent
Marek Broll and Federico Canale and Nicolas David and Antonio Florez-Gutierrez and Gregor Leander and María Naya-Plasencia and Yosuke Todo
2021/819 ( PDF )
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
Christof Beierle and Patrick Derbez and Gregor Leander and Gaëtan Leurent and Håvard Raddum and Yann Rotella and David Rupprecht and Lukas Stennes
2021/818 ( PDF )
CTng: Secure Certificate and Revocation Transparency
Hemi Leibowitz and Haitham Ghalwash and Ewa Syta and Amir Herzberg
2021/817 ( PDF )
Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace
Olivier Bronchain and Gaëtan Cassiers and François-Xavier Standaert
2021/816 ( PDF )
Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns
Alexandra Boldyreva and Tianxin Tang
2021/815 ( PDF )
Linear Cryptanalysis of FF3-1 and FEA
Tim Beyne
2021/814 ( PDF )
A New Way to Achieve Round-Efficient Byzantine Agreement
Matthias Fitzi and Chen-Da Liu-Zhang and Julian Loss
2021/813 ( PDF )
Intelligent Composed Algorithms
Frank Byszio and Dr. Klaus-Dieter Wirth and Dr. Kim Nguyen
2021/812 ( PDF )
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing
Elena Pagnin and Gunnar Gunnarsson and Pedram Talebi and Claudio Orlandi and Andrei Sabelfeld:
2021/811 ( PDF )
A General Purpose Transpiler for Fully Homomorphic Encryption
Shruthi Gorantala and Rob Springer and Sean Purser-Haskell and William Lam and Royce Wilson and Asra Ali and Eric P. Astor and Itai Zukerman and Sam Ruth and Christoph Dibak and Phillipp Schoppmann and Sasha Kulankhina and Alain Forget and David Marn and Cameron Tew and Rafael Misoczki and Bernat Guillen and Xinyu Ye and Dennis Kraft and Damien Desfontaines and Aishe Krishnamurthy and Miguel Guevara and Irippuge Milinda Perera and Yurii Sushko and Bryant Gipson
2021/810 ( PDF )
Efficient Asynchronous Byzantine Agreement without Private Setups
Yingzi Gao and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang
2021/809 ( PDF )
SoK: Efficient Privacy-preserving Clustering
Aditya Hegde and Helen Möllering and Thomas Schneider and Hossein Yalame
2021/808 ( PDF )
SNARGs for $\mathcal{P}$ from LWE
Arka Rai Choudhuri and Abhishek Jain and Zhengzhong Jin
2021/807 ( PDF )
Non-Interactive Batch Arguments for NP from Standard Assumptions
Arka Rai Choudhuri and Abhishek Jain and Zhengzhong Jin
2021/806 ( PDF )
Boosting the Security of Blind Signature Schemes
Jonathan Katz and Julian Loss and Michael Rosenberg
2021/805 ( PDF )
Practical Settlement Bounds for Proof-of-Work Blockchains
Peter Gaži and Ling Ren and Alexander Russell
2021/804 ( PDF )
A Note on ``Reduction Modulo $2^{448}-2^{224}-1$''
Timothy Shelton
2021/803 ( PDF )
On the Privacy of Protocols based on CPA-Secure Homomorphic Encryption
Adi Akavia and Margarita Vald
2021/802 ( PDF )
On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing
Divesh Aggarwal and Eldon Chung and Maciej Obremski and João Ribeiro
2021/801 ( PDF )
Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes
Mohammad Hassan Ameri and Alexander R. Block and Jeremiah Blocki
2021/800 ( PDF )
TEMP: Time-locked Encryption Made Practical
Leemon Baird and Pratyay Mukherjee and Rohit Sinha
2021/799 ( PDF )
Lattice Attacks on NTRU and LWE: A History of Refinements
Martin Albrecht and Léo Ducas
2021/798 ( PDF )
Probabilistic Dynamic Input Output Automata
Pierre Civit and Maria Potop-Butucaru
2021/797 ( PDF )
LLVM-based Circuit Compilation for Practical Secure Computation
Tim Heldmann and Thomas Schneider and Oleksandr Tkachenko and Christian Weinert and Hossein Yalame
2021/796 ( PDF )
How Byzantine is a Send Corruption?
Karim Eldefrawy and Julian Loss and Ben Terner
2021/795 ( PDF )
Transforming Secure Comparison Protocol from Passive to Active Adversary Model
Wei Jiang
2021/794 ( PDF )
Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor
Si Gao and Elisabeth Oswald and Dan Page
2021/793 ( PDF )
Property-Preserving Hash Functions from Standard Assumptions
Nils Fleischhacker and Kasper Green Larsen and Mark Simkin
2021/792 ( PDF )
Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation
Madhurima Mukhopadhyay and Palash Sarkar
2021/791 ( PDF )
Open Sesame: A Novel Non-SAT-Attack against CAS-Lock
Akashdeep Saha and Urbi Chatterjee and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty
2021/790 ( PDF )
A Side-Channel Assisted Attack on NTRU
Amund Askeland and Sondre Rønjom
2021/789 ( PDF )
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection
Jongkil Kim and Seyit Camtepe and Joonsang Baek and Willy Susilo and Josef Pieprzyk and Surya Nepal
2021/788 ( PDF )
Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs
Yael Tauman Kalai and Vinod Vaikuntanathan and Rachel Yun Zhang
2021/787 ( PDF )
Mobile Voting -- Still Too Risky?
Sven Heiberg and Kristjan Krips and Jan Willemson
2021/786 ( PDF )
Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy
Yongjun Zhao and Huaxiong Wang and Kwok-Yan Lam
2021/785 ( PDF )
Lower bounds on lattice sieving and information set decoding
Elena Kirshanova and Thijs Laarhoven
2021/784 ( PDF )
Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols
Ignacio Fernández-Hernández and Tomer Ashur and Vincent Rijmen
2021/783 ( PDF )
Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network
Joon-Woo Lee and HyungChul Kang and Yongwoo Lee and Woosuk Choi and Jieun Eom and Maxim Deryabin and Eunsang Lee and Junghyun Lee and Donghoon Yoo and Young-Sik Kim and Jong-Seon No
2021/782 ( PDF )
On the deployment of FlyClient as a velvet fork: chain-sewing attacks and countermeasures
Tristan Nemoz and Alexei Zamyatin
2021/781 ( PDF )
Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices
Gustavo Banegas and Koen Zandberg and Adrian Herrmann and Emmanuel Baccelli and Benjamin Smith
2021/780 ( PDF )
Netlist Decompilation Workflow for Recovered Design Verification, Validation, and Assurance
Katie Liszewski and Tim McDonley and Josh Delozier and Andrew Elliott and Dylan Jones and Matt Sutter and Adam Kimura
2021/779 ( PDF )
More efficient post-quantum KEMTLS with pre-distributed public keys
Peter Schwabe and Douglas Stebila and Thom Wiggers
2021/778 ( PDF )
Efficient secret key reusing attribute-based encryption from lattices
Xinyuan Qian and Wenyuan Wu
2021/777 ( PDF )
Asynchronous Data Dissemination and its Applications
Sourav Das and Zhuolun Xiang and Ling Ren
2021/776 ( PDF )
SoK: Applying Blockchain Technology in Industrial Internet of Things
Gang Wang
2021/775 ( PDF )
Adaptively Secure Broadcast in Resource-Restricted Cryptography
Ran Cohen and Juan Garay and Vassilis Zikas
2021/774 ( PDF )
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model
Akinori Hosoyamada and Tetsu Iwata
2021/773 ( PDF )
HEX-BLOOM: An Efficient Method for Authenticity and Integrity Verification in Privacy-preserving Computing
Ripon Patgiri and Malaya Dutta Borah
2021/772 ( PDF )
Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks
Emre Karabulut and Aydin Aysu
2021/771 ( PDF )
Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
Jinhyun So and Ramy E. Ali and Basak Guler and Jiantao Jiao and Salman Avestimehr
2021/770 ( PDF )
Multi-key Private Matching for Compute
Prasad Buddhavarapu and Benjamin M Case and Logan Gore and Andrew Knox and Payman Mohassel and Shubho Sengupta and Erik Taubeneck and Min Xue
2021/769 ( PDF )
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
Jacqueline Brendel and Rune Fiedler and Felix Günther and Christian Janson and Douglas Stebila
2021/768 ( PDF )
Privacy-Preserving Decision Trees Training and Prediction
Adi Akavia and Max Leibovich and Yehezkel S. Resheff and Roey Ron and Moni Shahar and Margarita Vald
2021/767 ( PDF )
White-box Cryptography with Device Binding from Token-based Obfuscation and more
Shashank Agrawal and Estuardo Alpirez Bock and Yilei Chen and Gaven Watson
2021/766 ( PDF )
Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum
John Andrews and Michele Ciampi and Vassilis Zikas
2021/765 ( PDF )
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption
Ghous Amjad and Sarvar Patel and Giuseppe Persiano and Kevin Yeo and Moti Yung
2021/764 ( PDF )
Covert Learning: How to Learn with an Untrusted Intermediary
Ran Canetti and Ari Karchmer
2021/763 ( PDF )
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation
Mathy Vanhoef
2021/762 ( PDF )
A wide class of Boolean functions generalizing the hidden weight bit function
Claude Carlet
2021/761 ( PDF )
Parameterization of Boolean functions by vectorial functions and associated constructions
Claude Carlet
2021/760 ( PDF )
Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition
Saravanan Vijayakumaran
2021/759 ( PDF )
Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning
Wenting Zheng and Ryan Deng and Weikeng Chen and Raluca Ada Popa and Aurojit Panda and Ion Stoica
2021/758 ( PDF )
Quantum cryptography based on an algorithm for determining simultaneously all the mappings of a Boolean function
Koji Nagata and Renata Wong and Do Ngoc Diep and Tadao Nakamura
2021/757 ( PDF )
On the Dual of Generalized Bent Functions
Jiaxin Wang Fang-Wei Fu
2021/756 ( PDF )
A Novel Completeness Test and its Application to Side Channel Attacks and Simulators
Si Gao and Elisabeth Oswald
2021/755 ( PDF )
Tetrad: Actively Secure 4PC for Secure Training and Inference
Nishat Koti and Arpita Patra and Rahul Rachuri and Ajith Suresh
2021/754 ( PDF )
Privacy-Preserving Training of Tree Ensembles over Continuous Data
Samuel Adams and Chaitali Choudhary and Martine De Cock and Rafael Dowsley and David Melanson and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen
2021/753 ( PDF )
Anonymous Device Authorization for Cellular Networks
Abida Haque and Varun Madathil and Bradley Reaves and Alessandra Scafuro
2021/752 ( PDF )
Quantum Reduction of Finding Short Code Vectors to the Decoding Problem
Thomas Debris-Alazard and Maxime Remaud and Jean-Pierre Tillich
2021/751 ( PDF )
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
Martin Hell and Thomas Johansson and Alexander Maximov and Willi Meier and Hirotaka Yoshida
2021/750 ( PDF )
Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and $\mathbb{Z}_{2^k}$
Carsten Baum and Lennart Braun and Alexander Munch-Hansen and Peter Scholl
2021/749 ( PDF )
Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits
Mike Rosulek and Lawrence Roy
2021/748 ( PDF )
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss
Ke Wu and Gilad Asharov and Elaine Shi (random author ordering)
2021/747 ( PDF )
Elmo: Recursive Virtual Payment Channels for Bitcoin
Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos
2021/746 ( PDF )
What is All the FaaS About? - Remote Exploitation of FPGA-as-a-Service Platforms
Nitin Pundir and Fahim Rahman and Farimah Farahmandi and Mark Tehranipoor
2021/745 ( PDF )
Generic-Group Identity-Based Encryption: A Tight Impossibility Result
Gili Schul-Ganz and Gil Segev
2021/744 ( -- withdrawn -- )
Proofs of Isogeny Knowledge and Application to Post-quantum One-Time Verifiable Random Function
Antonin Leroux
2021/743 ( PDF )
Manta: a Plug and Play Private DeFi Stack
Shumo Chu and Yu Xia and Zhenfei Zhang
2021/742 ( PDF )
Conclave: A Collective Stake Pool Protocol
Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira
2021/741 ( PDF )
NTRU leads to Anonymous, Robust Public-Key Encryption
Keita Xagawa
2021/740 ( PDF )
The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application
Keita Xagawa
2021/739 ( PDF )
A New Framework for Garbled Circuits
Tomer Ashur and Efrat Cohen and Carmit Hazay and Avishay Yanai
2021/738 ( PDF )
On the Impossibility of Purely Algebraic Signatures
Nico Döttling and Dominik Hartmann and Dennis Hofheinz and Eike Kiltz and Sven Schäge and Bogdan Ursu
2021/737 ( PDF )
GIFT-COFB is Tightly Birthday Secure with Encryption Queries
Akiko Inoue and Kazuhiko Minematsu
2021/736 ( PDF )
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation
Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Takahiro Matsuda and Ibuki Mishina and Hiraku Morita and Jacob C. N. Schuldt
2021/735 ( PDF )
Side-Channel Protections for Picnic Signatures
Diego F. Aranha and Sebastian Berndt and Thomas Eisenbarth and Okan Seker and Akira Takahashi and Luca Wilke and Greg Zaverucha
2021/734 ( PDF )
First-Order Hardware Sharings of the AES
Siemen Dhooghe and Svetla Nikova and Vincent Rijmen
2021/733 ( PDF )
GenoPPML – a framework for genomic privacy-preserving machine learning
Sergiu Carpov and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev
2021/732 ( PDF )
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems
Congming Wei and Chenhao Wu and Ximing Fu and Xiaoyang Dong and Kai He and Jue Hong and Xiaoyun Wang
2021/731 ( PDF )
Pasta: A Case for Hybrid Homomorphic Encryption
Christoph Dobraunig and Lorenzo Grassi and Lukas Helminger and Christian Rechberger and Markus Schofnegger and Roman Walch
2021/730 ( PDF )
Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning
Chenkai Weng and Kang Yang and Xiang Xie and Jonathan Katz and Xiao Wang
2021/729 ( PDF )
Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for TFHE
Ilaria Chillotti and Damien Ligier and Jean-Baptiste Orfila and Samuel Tap
2021/728 ( PDF )
Laconic Private Set Intersection and Applications
Navid Alamati and Pedro Branco and Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Sihang Pu
2021/727 ( PDF )
SoK: Privacy-Preserving Computing in the Blockchain Era
Ghada Almashaqbeh and Ravital Solomon
2021/726 ( PDF )
Asymmetric All-or-nothing Transforms
Navid Nasr Esfahani and Douglas R. Stinson
2021/725 ( PDF )
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip
Felix Günther and Simon Rastikian and Patrick Towa and Thom Wiggers
2021/724 ( PDF )
Tri-op redactable blockchains with block modification, removal, and insertion
Mohammad Sadeq Dousti and Alptekin Küpçü
2021/723 ( PDF )
Cache attack on MISTY1
Haopeng Fan; Wenhao Wang; Yongjuan Wang; Wenyu Zhang; Qingjun Yuan
2021/722 ( PDF )
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption
Yusaku Maeda and Koji Nuida
2021/721 ( PDF )
Index Calculus Attacks on Hyperelliptic Jacobians with Effective Endomorphisms
Sulamithe Tsakou and Sorina Ionica
2021/720 ( PDF )
On Reverse Engineering Neural Network Implementation on GPU
Łukasz Chmielewski and Léo Weissbart
2021/719 ( PDF )
Conditional Differential-Neural Cryptanalysis
Zhenzhen Bao and Jian Guo and Meicheng Liu and Li Ma and Yi Tu
2021/718 ( PDF )
Will You Cross the Threshold for Me? - Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs
Prasanna Ravi and Martianus Frederic Ezerman and Shivam Bhasin and Anupam Chattopadhyay and Sujoy Sinha Roy
2021/717 ( PDF )
Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis
Lichao Wu and Yoo-Seung Won and Dirmanto Jap and Guilherme Perin and Shivam Bhasin and Stjepan Picek
2021/716 ( PDF )
SSE and SSD: Page-Efficient Searchable Symmetric Encryption
Angèle Bossuat and Raphael Bost and Pierre-Alain Fouque and Brice Minaud and Michael Reichle
2021/715 ( PDF )
Hours of Horus: Keyless Cryptocurrency Wallets
Dionysis Zindros
2021/714 ( PDF )
CARiMoL: A Configurable Hardware Accelerator for Ringand Module Lattice-Based Post-Quantum Cryptography
Afifa Ishtiaq and Dr. Muhammad Shafique and Dr. Osman Hassan
2021/713 ( PDF )
Public Key Encryption with Flexible Pattern Matching
Elie Bouscatié and Guilhem Castagnos and Olivier Sanders
2021/712 ( PDF )
DEFAULT: Cipher Level Resistance Against Differential Fault Attack
Anubhab Baksi and Shivam Bhasin and Jakub Breier and Mustafa Khairallah and Thomas Peyrin and Sumanta Sarkar and Siang Meng Sim
2021/711 ( PDF )
The Matrix Reloaded: Multiplication Strategies in FrodoKEM
Joppe W. Bos and Maximilian Ofner and Joost Renes and Tobias Schneider and Christine van Vredendaal
2021/710 ( PDF )
VOProof: Constructing Shorter and Faster-to-Verify zkSNARKs with Vector Oracles
Yuncong Zhang and Ren Zhang and Geng Wang and Dawu Gu
2021/709 ( PDF )
Bounded Collusion ABE for TMs from IBE
Rishab Goyal and Ridwan Syed and Brent Waters
2021/708 ( PDF )
Anonymous, Robust Post-Quantum Public Key Encryption
Paul Grubbs and Varun Maram and Kenneth G. Paterson
2021/707 ( PDF )
Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation
Gabrielle De Micheli and Pierrick Gaudry and Cécile Pierrot
2021/706 ( PDF )
Cryptanalysis of an oblivious PRF from supersingular isogenies
Andrea Basso and Péter Kutas and Simon-Philipp Merz and Christophe Petit and Antonio Sanso
2021/705 ( PDF )
Bridging Machine Learning and Cryptanalysis via EDLCT
Yi Chen and Hongbo Yu
2021/704 ( PDF )
IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status
Elli Androulaki and Ilie Circiumaru and Jesus Diaz Vico and Miguel Prada and Alessandro Sorniotti and Marc Stoecklin and Marko Vukolic and Marie Wallace
2021/703 ( PDF )
Quantum Multi-Collision Distinguishers
Zhenzhen Bao and Jian Guo and Shun Li and Phuong Pham
2021/702 ( PDF )
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
Colin Boyd and Gareth T. Davies and Bor de Kock and Kai Gellert and Tibor Jager and Lise Millerjord
2021/701 ( PDF )
Multidimentional ModDiv public key exchange protocol
Samir Bouftass
2021/700 ( PDF )
DeCSIDH: Delegating isogeny computations in the CSIDH setting
Robi Pedersen
2021/699 ( PDF )
Radical Isogenies on Montgomery Curves
Hiroshi Onuki and Tomoki Moriya
2021/698 ( PDF )
Multi-Dimensional Sub/Super-Range Signatures
Masahito Ishizaka and Shinsaku Kiyomoto
2021/697 ( PDF )
GoAT: File Geolocation via Anchor Timestamping
Deepak Maram and Iddo Bentov and Mahimna Kelkar and Ari Juels
2021/696 ( PDF )
The "quantum annoying" property of password-authenticated key exchange protocols
Edward Eaton and Douglas Stebila
2021/695 ( PDF )
Adaptively Secure Lattice-based Revocable IBE in the QROM: Compact Parameters, Tight Security, and Anonymity
Atsushi Takayasu
2021/694 ( PDF )
On Interactive Oracle Proofs for Boolean R1CS Statements
Ignacio Cascudo and Emanuele Giunta
2021/693 ( PDF )
Hardware Penetration Testing Knocks Your SoCs Off
Mark Fischer and Fabian Langer and Johannes Mono and Clemens Nasenberg and Nils Albartus
2021/692 ( PDF )
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
Christoph Dobraunig and Daniel Kales and Christian Rechberger and Markus Schofnegger and Greg Zaverucha
2021/691 ( PDF )
General Bootstrapping Approach for RLWE-based Homomorphic Encryption
Andrey Kim and Maxim Deryabin and Jieun Eom and Rakyong Choi and Yongwoo Lee and Whan Ghang and Donghoon Yoo
2021/690 ( PDF )
On Communication Models and Best-Achievable Security in Two-Round MPC
Aarushi Goel and Abhishek Jain and Manoj Prabhakaran and Rajeev Raghunath
2021/689 ( PDF )
OSHA: A General-purpose One-way Secure Hash Algorithm
Ripon Patgiri
2021/688 ( PDF )
Statistical ZAPs from Group-Based Assumptions
Geoffroy Couteau and Shuichi Katsumata and Elahe Sadeghi and Bogdan Ursu
2021/687 ( PDF )
Towards Understanding Practical Randomness Beyond Noise: Differential Privacy and Mixup
Hanshen Xiao and Srinivas Devadas
2021/686 ( PDF )
Meteor: Cryptographically Secure Steganography for Realistic Distributions
Gabriel Kaptchuk and Tushar M. Jois and Matthew Green and Aviel Rubin
2021/685 ( PDF )
Blind Side-Channel SIFA
Melissa Azouaoui and Kostas Papagiannopoulos and Dominik Zürner
2021/684 ( PDF )
Tight Setup Bounds for Identifiable Abort
Nicholas Brandt
2021/683 ( PDF )
S2Dedup: SGX-enabled Secure Deduplication
Tânia Esteves and Mariana Miranda and João Paulo and Bernardo Portela
2021/682 ( PDF )
Batching Base Oblivious Transfers
Ian McQuoid and Mike Rosulek and Lawrence Roy
2021/681 ( PDF )
Learnability of Multiplexer PUF and $S_N$-PUF : A Fourier-based Approach
Durba Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
2021/680 ( PDF )
Efficient Attribute Based Encryption for Boolean Circuits
Alexandru Ionita
2021/679 ( PDF )
Permutation Based EDM: An Inverse Free BBB Secure PRF
Avijit Dutta and Mridul Nandi and Suprita Talnikar
2021/678 ( PDF )
Faster indifferentiable hashing to elliptic $\mathbb{F}_{\!q^2}$-curves
Dmitrii Koshelev
2021/677 ( PDF )
Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes
Paul Cotan and George Teseleanu
2021/676 ( PDF )
Extending the GLS endomorphism to speed up GHS Weil descent using Magma
Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez and Benjamin Smith
2021/675 ( PDF )
3-round Feistel is Not Superpseudorandom Over Any Group
Hector B. Hougaard
2021/674 ( PDF )
On the Effect of the Key-expansion Algorithm in Simon-like Ciphers
Jinyu Lu and Yunwen Liu and Tomer Ashur and and Chao Li
2021/673 ( PDF )
zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy
Tianyi Liu and Xiang Xie and Yupeng Zhang
2021/672 ( PDF )
PQC: R-Propping a Chaotic Cellular Automata
Pedro Hecht
2021/671 ( PDF )
Multi-Threshold Byzantine Fault Tolerance
Atsuki Momose and Ling Ren
2021/670 ( PDF )
AOT: Anonymization by Oblivious Transfer
Farid Javani and Alan T. Sherman
2021/669 ( PDF )
Pravuil: Global Consensus for a United World
David Cerezo Sánchez
2021/668 ( PDF )
Grover on SM3
Gyeongju Song and Kyungbae Jang and Hyunji Kim and Wai-Kong Lee and Zhi Hu and Hwajeong Seo
2021/667 ( PDF )
Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors
Hyeokdong Kwon and Hyunjun Kim and Siwoo Eum and Minjoo Sim and Hyunji Kim and Wai-Kong Lee and Zhi Hu and Hwajeong Seo
2021/666 ( PDF )
Secure cloud-of-clouds storage with space-efficient secret sharing
Ahad Niknia and Miguel Correia and Jaber Karimpour
2021/665 ( PDF )
On the algebraic immunity of direct sum constructions
Pierrick Méaux
2021/664 ( PDF )
A Trustless GQ Multi-Signature Scheme with Identifiable Abort
Handong Cui and Tsz Hon Yuen
2021/663 ( PDF )
On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note
Nils Albartus and Clemens Nasenberg and Florian Stolz and Marc Fyrbiak and Christof Paar and Russell Tessier
2021/662 ( PDF )
Verifying Post-Quantum Signatures in 8 kB of RAM
Ruben Gonzalez and Andreas Hülsing and Matthias J. Kannwischer and Juliane Krämer and Tanja Lange and Marc Stöttinger and Elisabeth Waitz and Thom Wiggers and Bo-Yin Yang
2021/661 ( PDF )
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
Ling Sun and Wei Wang and Meiqin Wang
2021/660 ( PDF )
A Permissionless Proof-of-Stake Blockchain with Best-Possible Unpredictability
Lei Fan and Jonathan Katz and Phuc Thai and Hong-Sheng Zhou
2021/659 ( PDF )
Technical report: CoPHEE: Co-processor forPartially Homomorphic Encrypted Execution
Mohammed Nabeel and Mohammed Ashraf and Eduardo Chielle and Nektarios G.Tsoutsos and Michail Maniatakos
2021/658 ( PDF )
A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem
Prastudy Fauzi and Martha Norberg Hovd and Håvard Raddum
2021/657 ( PDF )
Locally Reconstructable Non-malleable Secret Sharing
Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Jenit Tomy
2021/656 ( PDF )
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny
Lingyue Qin and Xiaoyang Dong and Xiaoyun Wang and Keting Jia and Yunwen Liu
2021/655 ( PDF )
On the Effect of Projection on Rank Attacks in Multivariate Cryptography
Morten Øygarden and Daniel Smith-Tone and Javier Verbel
2021/654 ( PDF )
Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
Carlo Brunetta and Georgia Tsaloli and Bei Liang and Gustavo Banegas and Aikaterini Mitrokotsa
2021/653 ( PDF )
Smooth Zero-Knowledge Hash Functions
Behzad Abdolmaleki and Hamidreza Khoshakhlagh and Helger Lipmaa
2021/652 ( PDF )
Detector+: An Approach for Detecting, Isolating, and Preventing Timing Attacks
Arsalan Javeed and Cemal Yilmaz and Erkay Savas
2021/651 ( PDF )
Leo: A Programming Language for Formally Verified, Zero-Knowledge Applications
Collin Chin and Howard Wu and Raymond Chu and Alessandro Coglio and Eric McCarthy and Eric Smith
2021/650 ( PDF )
Structured Leakage and Applications to Cryptographic Constant-Time and Cost
Gilles Barthe and Benjamin Gregoire and Vincent Laporte and Swarn Priya
2021/649 ( PDF )
On the Algebraic Immunity - Resiliency trade-off, implications for Goldreich's Pseudorandom Generator
Aurélien Dupin and Pierrick Méaux and Mélissa Rossi
2021/648 ( PDF )
Security of COFB against Chosen Ciphertext Attacks
Mustafa Khairallah
2021/647 ( PDF )
privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm
Ripon Patgiri
2021/646 ( PDF )
Optimization of Advanced Encryption Standard on Graphics Processing Units
Cihangir Tezcan
2021/645 ( PDF )
Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing
Alexander May and Floyd Zweydinger
2021/644 ( PDF )
Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings
Christopher Battarbee and Delaram Kahrobaei and Siamak F. Shahandashti
2021/643 ( PDF )
On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers
Muhammad ElSheikh and Amr M. Youssef
2021/642 ( PDF )
On the Cryptographic Deniability of the Signal Protocol
Nihal Vatandas and Rosario Gennaro and Bertrand Ithurburn and Hugo Krawczyk
2021/641 ( PDF )
Hydra: Succinct Fully Pipelineable Interactive Arguments of Knowledge
William Zhang and Yu Xia
2021/640 ( PDF )
Security and Trust in Open Source Security Tokens
Marc Schink and Alexander Wagner and Florian Unterstein and Johann Heyszl
2021/639 ( PDF )
Indifferentiable Signatures: High Performance and Fallback Security
Charalampos Papamanthou and Cong Zhang and Hong-Sheng Zhou
2021/638 ( PDF )
Efficient Constructions of Pairing Based Accumulators
Ioanna Karantaidou and Foteini Baldimtsi
2021/637 ( PDF )
Doubly-Affine Extractors, and their Applications
Yevgeniy Dodis and Kevin Yeo
2021/636 ( PDF )
Communication Complexity of Private simultaneous Quantum Messages Protocols
Akinori Kawachi and Harumichi Nishimura
2021/635 ( PDF )
symKrypt: A General-purpose and Lightweight Symmetric-Key Cryptography
Ripon Patgiri
2021/634 ( PDF )
Setting Up Efficient TFHE Parameters for Multivalue Plaintexts and Multiple Additions
Jakub Klemsa
2021/633 ( PDF )
CTIDH: faster constant-time CSIDH
Gustavo Banegas and Daniel J. Bernstein and Fabio Campos and Tung Chou and Tanja Lange and Michael Meyer and Benjamin Smith and Jana Sotáková
2021/632 ( PDF )
Internet Computer Consensus
Jan Camenisch and Manu Drijvers and Timo Hanke and Yvonne-Anne Pignolet and Victor Shoup and Dominic Williams
2021/631 ( PDF )
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges
Felix Engelmann and Lukas Müller and Andreas Peter and Frank Kargl and Christoph Bösch
2021/630 ( PDF )
Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings
Julien Devevey and Benoît Libert and Khoa Nguyen and Thomas Peters and Moti Yung
2021/629 ( PDF )
SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Mixing Techniques
Simin Ghesmati and Walid Fdhila and Edgar Weippl
2021/628 ( PDF )
The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets
Joachim Neu and Ertem Nusret Tas and David Tse
2021/627 ( PDF )
Client-Auditable Verifiable Registries
Nirvan Tyagi and Ben Fisch and Joseph Bonneau and Stefano Tessaro
2021/626 ( PDF )
Help, my Signal has bad Device! Breaking the Signal Messenger’s Post-CompromiseSecurity through a Malicious Device
Jan Wichelmann and Sebastian Berndt and Claudius Pott and Thomas Eisenbarth
2021/625 ( PDF )
Plactic key agreement
Daniel R. L. Brown
2021/624 ( PDF )
Group Structure in Correlations and its Applications in Cryptography
Guru-Vamsi Policharla and Manoj Prabhakaran and Rajeev Raghunath and Parjanya Vyas
2021/623 ( PDF )
Mining in Logarithmic Space
Aggelos Kiayias and Nikos Leonardos and Dionysis Zindros
2021/622 ( PDF )
Stealth: A Highly Secured End-to-End Symmetric Communication Protocol
Ripon Patgiri
2021/621 ( PDF )
R-SWAP: Relay based atomic cross-chain swap protocol
Léonard Lys and Arthur Micoulet and Maria Potop-Butucaru
2021/620 ( PDF )
Algebraic attacks on block ciphers using quantum annealing
Elżbieta Burek and Michał Misztal and Michał Wroński
2021/619 ( PDF )
Polar Coding for Ring-LWE-Based Public Key Encryption
Jiabo Wang and Cong Ling
2021/618 ( PDF )
Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing
Sumit Kumar Debnath and Vikas Srivastava and Tapaswini Mohanty and Nibedita Kundu and Kouichi Sakurai
2021/617 ( PDF )
Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication
Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa
2021/616 ( PDF )
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable
Keitaro Hashimoto and Shuichi Katsumata and Kris Kwiatkowski and Thomas Prest
2021/615 ( PDF )
A Tutorial on Concurrent Zero Knowledge
Rafael Pass
2021/614 ( PDF )
Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit
Rafael Pass
2021/613 ( PDF )
Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE
Xiaojian Liang and Jian Weng and Anjia Yang and Lisha Yao and Zike Jiang and Zhenghao Wu
2021/612 ( PDF )
Privacy-preserving Density-based Clustering
Beyza Bozdemir and Sébastien Canard and Orhan Ermis and Helen Möllering and Melek Önen and Thomas Schneider
2021/611 ( PDF )
Some Applications of Hamming Weight Correlations
Fatih Balli and Andrea Caforio and Subhadeep Banik
2021/610 ( PDF )
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems
Alexander Nilsson and Irina E. Bocharova and Boris D. Kudryashov and Thomas Johansson
2021/609 ( PDF )
FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker
Michele Ciampi and Muhammad Ishaq and Malik Magdon-Ismail and Rafail Ostrovsky and Vassilis Zikas
2021/608 ( PDF )
Layering diverse cryptography to lower risks of future and secret attacks: post-quantum estimates
Daniel R. L. Brown
2021/607 ( PDF )
Signed (Group) Diffie-Hellman Key Exchange with Tight Security
Jiaxin Pan and Chen Qian and Magnus Ringerud
2021/606 ( PDF )
ZK-PCPs from Leakage-Resilient Secret Sharing
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss
2021/605 ( PDF )
On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs
Benny Applebaum and Eyal Golombek
2021/604 ( PDF )
Masked Triples: Amortizing Multiplication Triples across Conditionals
David Heath and Vladimir Kolesnikov and Stanislav Peceny
2021/603 ( PDF )
Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults
Justin Kim and Vandan Mehta and Kartik Nayak and Nibesh Shrestha
2021/602 ( PDF )
Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak
Marten van Dijk and Deniz Gurevin and Chenglu Jin and Omer Khan and Phuong Ha Nguyen
2021/601 ( PDF )
The Art of Labeling: Task Augmentation for Private(Collaborative) Learning on Transformed Data
Hanshen Xiao and Srinivas Devadas
2021/600 ( PDF )
Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group
Christian Porter and Andrew Mendelsohn and Cong Ling
2021/599 ( PDF )
Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments
Shravan Srinivasan and Alex Chepurnoy and Charalampos Papamanthou and Alin Tomescu and Yupeng Zhang
2021/598 ( PDF )
Proof of Assets in the Diem Blockchain
Panagiotis Chatzigiannis and Konstantinos Chalkias
2021/597 ( PDF )
Accelerated RISC-V for Post-Quantum SIKE
Rami Elkhatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2021/596 ( PDF )
Mutual Accountability Layer: Accountable Anonymity within Accountable Trust
Vanesa Daza and Abida Haque and Alessandra Scafuro and Alexandros Zacharakis and Arantxa Zapico
2021/595 ( PDF )
Securing Parallel-chain Protocols under Variable Mining Power
Xuechao Wang and Viswa Virinchi Muppirala and Lei Yang and Sreeram Kannan and Pramod Viswanath
2021/594 ( PDF )
ZK Contingent Payments for Trained Neural Networks
Zhelei Zhou and Xinlei Cao and Jian Liu and Bingsheng Zhang and Kui Ren
2021/593 ( PDF )
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms
Shumo Chu and Danyang Zhuo and Elaine Shi and T-H. Hubert Chan (randomized author ordering)
2021/592 ( PDF )
Side Channel Analysis against the ANSSI’s protected AES implementation on ARM
Loïc Masure and Rémi Strullu
2021/591 ( PDF )
Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!
Jan Peter Drees and Pritha Gupta and Eyke Hüllermeier and Tibor Jager and Alexander Konze and Claudia Priesterjahn and Arunselvan Ramaswamy and Juraj Somorovsky
2021/590 ( PDF )
An Algebraic Framework for Universal and Updatable SNARKs
Carla Ràfols and Arantxa Zapico
2021/589 ( PDF )
White-Box Encryption Scheme Using a Quantum Memory
Hidenori Kuwakado and Shoichi Hirose and Masahiro Mambo
2021/588 ( PDF )
A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose
Thomas Haines and Johannes Mueller
2021/587 ( PDF )
PrORAM: Fast $O(\log n)$ Private Coin ZK ORAM
David Heath and Vladimir Kolesnikov
2021/586 ( PDF )
A New Approach for finding Low-Weight Polynomial Multiples
Laila El Aimani
2021/585 ( PDF )
Exact Lattice Sampling from Non-Gaussian Distributions
Maxime Plançon and Thomas Prest
2021/584 ( PDF )
Effects of Quantization on the Multiple-Round Secret-Key Capacity
Onur Gunlu and Ueli Maurer and Joao Ribeiro
2021/583 ( PDF )
Entropoids: Groups in Disguise
Lorenz Panny
2021/582 ( PDF )
ethSTARK Documentation
StarkWare
2021/581 ( PDF )
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces
Abhrajit Sengupta and Nimisha Limaye and Ozgur Sinanoglu
2021/580 ( PDF )
Lightweight, Maliciously Secure Verifiable Function Secret Sharing
Leo de Castro and Antigoni Polychroniadou
2021/579 ( PDF )
Quantum Key-length Extension
Joseph Jaeger and Fang Song and Stefano Tessaro
2021/578 ( PDF )
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)
Itai Dinur
2021/577 ( PDF )
Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks
Dionysis Zindros
2021/576 ( PDF )
Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares
Surya Addanki and Kevin Garbe and Eli Jaffe and Rafail Ostrovsky and Antigoni Polychroniadou
2021/575 ( PDF )
MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing
Zhenzhen Bao and Jian Guo and Danping Shi and Yi Tu
2021/574 ( PDF )
Constructing More Quadratic APN Functions with the QAM Method
Yuyin Yu and Leo Perrin
2021/573 ( PDF )
Compactness of Hashing Modes and Efficiency beyond Merkle Tree
Elena Andreeva and Rishiraj Bhattacharyya and Arnab Roy
2021/572 ( PDF )
Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE
Charanjit Singh Jutla and Nathan Manohar
2021/571 ( PDF )
Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond
Thomas Attema and Nicole Gervasoni and Michiel Marcus and Gabriele Spini
2021/570 ( PDF )
Lattice sieving via quantum random walks
André Chailloux and Johanna Loyer
2021/569 ( PDF )
Automated Generation of Masked Hardware
David Knichel and Amir Moradi and Nicolai Müller and Pascal Sasdrich
2021/568 ( PDF )
ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems
Gaurav Panwar and Roopa Vishwanathan and Satyajayant Misra
2021/567 ( PDF )
Forward-secure Multi-user Aggregate Signatures based on zk-SNARKs
Jeonghyuk Lee and Jihye Kim and Hyunok Oh
2021/566 ( PDF )
From Random Oracles to Ideal Signatures, and Back
Cong Zhang and Hong-Sheng Zhou
2021/565 ( PDF )
The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving
Cyprien Delpech de Saint Guilhem and Eleftheria Makri and Dragos Rotaru and Titouan Tanguy
2021/564 ( PDF )
SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions
Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
2021/563 ( PDF )
High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography
Mojtaba Bisheh-Niasar and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2021/562 ( PDF )
A fusion algorithm for solving the hidden shift problem in finite abelian groups
Wouter Castryck and Ann Dooms and Carlo Emerencia and Alexander Lemmens
2021/561 ( PDF )
Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors
Pakize Sanal and Emrah Karagoz and Hwajeong Seo and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2021/560 ( PDF )
MOBS (Matrices Over Bit Strings) public key exchange
Nael Rahman and Vladimir Shpilrain
2021/559 ( PDF )
A Fresh Approach to Updatable Symmetric Encryption
Andrés Fabrega and Ueli Maurer and Marta Mularczyk
2021/558 ( PDF )
Verifiable Decryption in the Head
Kristian Gjøsteen and Thomas Haines and Johannes Müller and Peter Rønne and Tjerand Silde
2021/557 ( PDF )
Dual lattice attacks for closest vector problems (with preprocessing)
Thijs Laarhoven and Michael Walter
2021/556 ( PDF )
Interactive Physical ZKP for Connectivity:Applications to Nurikabe and Hitori
Leo Robert and Daiki Miyahara and Pascal Lafourcade and Takaaki Mizuk
2021/555 ( PDF )
Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited
Nils Wisiol and Khalid T. Mursi and Jean-Pierre Seifert and Yu Zhuang
2021/554 ( PDF )
Grover on Caesar and Vigenère Ciphers
Gyeongju Song and Kyungbae Jang and Hyunji Kim and Wai-Kong Lee and Hwajeong Seo
2021/553 ( PDF )
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild
Daniel De Almeida Braga and Pierre-Alain Fouque and Mohamed Sabt
2021/552 ( PDF )
Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric
André Chailloux and Thomas Debris-Alazard and Simona Etinski
2021/551 ( PDF )
Efficient Sorting of Homomorphic Encrypted Data with $k$-way Sorting Network
Seungwan Hong and Seunghong Kim and Jiheon Choi and Younho Lee and Jung Hee Cheon
2021/550 ( PDF )
Quadratic almost bent functions - their partial characterization and design in the spectral domain
Amar Bapić and Samir Hodžić and Enes Pasalic
2021/549 ( PDF )
High-assurance field inversion for curve-based cryptography
Benjamin Salling Hvass and Diego F. Aranha and Bas Spitters
2021/548 ( PDF )
Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper)
Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal
2021/547 ( PDF )
Cube Attack against 843-Round Trivium
Yao Sun
2021/546 ( PDF )
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V and SNOW-Vi
Jin Hoki and Takanori Isobe and Ryoma Ito and Fukang Liu and Kosei Sakamoto
2021/545 ( PDF )
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
Muhammed F. Esgin and Ron Steinfeld and Raymond K. Zhao
2021/544 ( PDF )
Improved guess-and-determine and distinguishing attacks on SNOW-V
Jing Yang and Thomas Johansson and Alexander Maximov
2021/543 ( PDF )
The Case for SIKE: A Decade of the Supersingular Isogeny Problem
Craig Costello
2021/542 ( PDF )
Symetric encryption algorithms based on the mathematical structure underlying the three body problem
Samir Bouftass.
2021/541 ( PDF )
Hardware Deployment of Hybrid PQC
Reza Azarderakhsh and Rami El Khatib and Brian Koziel and Brandon Langenberg
2021/540 ( PDF )
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
Geoffroy Couteau and Michael Klooß and Huang Lin and Michael Reichle
2021/539 ( PDF )
More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions
Atsushi Takayasu
2021/538 ( PDF )
A Composable Look at Updatable Encryption
Françoise Levy-dit-Vehel and Maxime Roméas
2021/537 ( PDF )
SoK: Exploring Blockchains Interoperability
Gang Wang
2021/536 ( PDF )
Analyzing the Potential of Transport Triggered Architecture for Lattice-based Cryptography Algorithms
Latif AKÇAY and Berna ÖRS
2021/535 ( PDF )
On the Possibility of Basing Cryptography on $\EXP \neq \BPP$
Yanyi Liu and Rafael Pass
2021/534 ( PDF )
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
Maura B. Paterson and Douglas R. Stinson
2021/533 ( PDF )
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU
Sijun Tan and Brian Knott and Yuan Tian and David J. Wu
2021/532 ( PDF )
Rainbow on Cortex-M4
Tung Chou and Matthias J. Kannwischer and Bo-Yin Yang
2021/531 ( PDF )
LogStack: Stacked Garbling with $O(b \log b)$ Computation
David Heath and Vladimir Kolesnikov
2021/530 ( PDF )
Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level
Yuan Yao and Tuna Tufan and Tarun Kathuria and Baris Ege and Ulkuhan Guler and Patrick Schaumont
2021/529 ( PDF )
SnarkPack: Practical SNARK Aggregation
Nicolas Gailly and Mary Maller and Anca Nitulescu
2021/528 ( PDF )
Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping
Denis Firsov and Henri Lakk and Ahto Truu
2021/527 ( PDF )
Solving discrete logarithm problem over prime fields using quantum annealing and $\frac{n^3}{2}$ logical qubits
Michał Wroński
2021/526 ( PDF )
Reinforcement Learning-based Design of Side-channel Countermeasures
Jorai Rijsdijk and Lichao Wu and Guilherme Perin
2021/525 ( PDF )
On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis
Lichao Wu and Guilherme Perin
2021/524 ( PDF )
Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency
Kwangsu Lee
2021/523 ( PDF )
No Time to Hash: On Superefficient Entropy Accumulation
Yevgeniy Dodis and Siyao Guo and Noah Stephens-Davidowitz and Zhiye Xie
2021/522 ( PDF )
Public-key Cryptosystems and Signature Schemes from p-adic Lattices
Yingpu Deng and Lixia Luo and Yanbin Pan and Zhaonan Wang and Guanju Xiao
2021/521 ( PDF )
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation
Daniel Demmler and Stefan Katzenbeisser and Thomas Schneider and Tom Schuster and Christian Weinert
2021/520 ( PDF )
Optimal Randomized Partial Checking for Decryption Mix Nets
Thomas Haines and Johannes Mueller
2021/519 ( PDF )
Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment
Atakan Arslan and Muhammed Ali Bingöl
2021/518 ( PDF )
How to Share and Own a Secret
Victor Ermolaev and Gamze Tillem
2021/517 ( PDF )
Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity
Yanyi Liu and Rafael Pass
2021/516 ( PDF )
A new weak curve fault attack on ECIES: embedded point validation is not enough during decryption
Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Xi and Yuhang Wang
2021/515 ( PDF )
Generic Constructions of Revocable Hierarchical Identity-based Encryption
Keita Emura and Atsushi Takayasu and Yohei Watanabe
2021/514 ( PDF )
Non-Interactive Zero Knowledge from Sub-exponential DDH
Abhishek Jain and Zhengzhong Jin
2021/513 ( PDF )
On One-way Functions from NP-Complete Problems
Yanyi Liu and Rafael Pass
2021/512 ( PDF )
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
Tapas Pal and Ratna Dutta
2021/511 ( PDF )
On Simulation-Extractability of Universal zkSNARKs
Markulf Kohlweiss and Michał Zając
2021/510 ( PDF )
Signer and Message Ambiguity from a Variety of Keys
George Teseleanu
2021/509 ( PDF )
On using the same key pair for Ed25519 and an X25519 based KEM
Erik Thormarker
2021/508 ( PDF )
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs
Wonkyung Jung and Sangpyo Kim and Jung Ho Ahn and Jung Hee Cheon and Younho Lee
2021/507 ( PDF )
The t-wise Independence of Substitution-Permutation Networks
Tianren Liu and Stefano Tessaro and Vinod Vaikuntanathan
2021/506 ( PDF )
Delegating Supersingular Isogenies over $\mathbb{F}_{p^2}$ with Cryptographic Applications
Robi Pedersen and Osmanbey Uzunkol
2021/505 ( PDF )
Cryptanalysis of Boyen’s Attribute-Based Encryption Scheme in TCC 2013
Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada
2021/504 ( PDF )
A Generic Method for Investigating Nonsingular Galois NFSRs
Xiao-Juan Wang and Tian Tian and Wen-Feng Qi
2021/503 ( PDF )
Almost-Asynchronous MPC under Honest Majority, Revisited
Matthieu Rambaud and Antoine Urban
2021/502 ( PDF )
A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
Kwangsu Lee and Joon Sik Kim
2021/501 ( PDF )
zkHawk: Practical Private Smart Contracts from MPC-based Hawk
Aritra Banerjee and Michael Clear and Hitesh Tewari
2021/500 ( PDF )
Order-C Secure Multiparty Computation for Highly Repetitive Circuits
Gabrielle Beck and Aarushi Goel and Abhishek Jain and Gabriel Kaptchuk
2021/499 ( PDF )
Optimizing Registration Based Encryption
Kelong Cong and Karim Eldefrawy and Nigel P. Smart
2021/498 ( PDF )
SoK: Multi-Device Secure Instant Messaging
Antonio Dimeo and Felix Gohla and Daniel Goßen and Niko Lockenvitz
2021/497 ( PDF )
SoK: Design Tools for Side-Channel-Aware Implementations
Ileana Buhan and Lejla Batina and Yuval Yarom and Patrick Schaumont
2021/496 ( PDF )
Applications of SKREM-like symmetric key ciphers
Mircea Digulescu
2021/495 ( PDF )
Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One-Way Functions
Mircea Digulescu
2021/494 ( PDF )
Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures.
Surbhi Shaw and Ratna Dutta
2021/493 ( PDF )
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4
Ming-Shing Chen and Tung Chou and Markus Krausz
2021/492 ( PDF )
Classic McEliece on the ARM Cortex-M4
Ming-Shing Chen and Tung Chou
2021/491 ( PDF )
A toolbox for verifiable tally-hiding e-voting systems
Véronique Cortier and Pierrick Gaudry and Quentin Yang
2021/490 ( PDF )
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE
Chao Liu and Anyu Wang and Zhongxiang Zheng
2021/489 ( PDF )
ROSE: Robust Searchable Encryption with Forward and Backward Security and Practical Performance
Peng Xu and Willy Susilo and Wei Wang and Tianyang Chen and Qianhong Wu and Hai Jin
2021/488 ( PDF )
Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle
Javier Herranz and Ramiro Martínez and Manuel Sánchez
2021/487 ( PDF )
Xifrat Cryptanalysis - Compute the Mixing Function Without the Key
"Danny" Niu Jianfang
2021/486 ( PDF )
Security Analysis of End-to-End Encryption for Zoom Meetings
Takanori Isobe and Ryoma Ito
2021/485 ( PDF )
A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme
Ferhat Yaman and Ahmet Can Mert and Erdinç Öztürk and Erkay Savaş
2021/484 ( PDF )
Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF
Alireza Kavousi and Javad Mohajeri and Mahmoud Salmasizadeh
2021/483 ( PDF )
Masking Kyber: First- and Higher-Order Implementations
Joppe W. Bos and Marc Gourjon and Joost Renes and Tobias Schneider and Christine van Vredendaal
2021/482 ( PDF )
Inconsistency of Simulation and Practice in Delay-based Strong PUFs
Anita Aghaie and Amir Moradi
2021/481 ( PDF )
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Alexander Heinrich and Matthias Hollick and Thomas Schneider and Milan Stute and Christian Weinert
2021/480 ( PDF )
Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform
Jakub Klemsa
2021/479 ( PDF )
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Tim Fritzmann and Michiel Van Beirendonck and Debapriya Basu Roy and Patrick Karl and Thomas Schamberger and Ingrid Verbauwhede and Georg Sigl
2021/478 ( PDF )
TurboIKOS: Improved Non-interactive Zero Knowledge and Post-Quantum Signatures
Yaron Gvili and Julie Ha and Sarah Scheffler and Mayank Varia and Ziling Yang and Xinyuan Zhang
2021/477 ( PDF )
Exploiting ROLLO's Constant-Time Implementations with a Single-Trace Analysis
Agathe Cheriere and Lina Mortajine and Tania Richmond and Nadia El Mrabet
2021/476 ( PDF )
Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions
Aaqib Bashir Dar and Mashhood Jeelani Lone and Nuzhat Hussain
2021/475 ( PDF )
Private Liquidity Matching using MPC
Shahla Atapoor and Nigel P. Smart and Younes Talibi Alaoui
2021/474 ( PDF )
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations
Fukang Liu and Santanu Sarkar and Willi Meier and Takanori Isobe
2021/473 ( PDF )
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations
Ryan Karl and Jonathan Takeshita and Alamin Mohammed and Aaron Striegel and and Taeho Jung
2021/472 ( PDF )
CryptoGram: Fast Private Calculations of Histograms over Multiple Users’ Inputs
Ryan Karl and Jonathan Takeshita and Alamin Mohammed and Aaron Striegel and Taeho Jung
2021/471 ( PDF )
Size, Speed, and Security: An Ed25519 Case Study
Cesar Pereida García and Sampo Sovio
2021/470 ( PDF )
Upslices, Downslices, and Secret-Sharing with Complexity of $1.5^n$
Benny Applebaum and Oded Nir
2021/469 ( PDF )
Entropoid Based Cryptography
Danilo Gligoroski
2021/468 ( PDF )
Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report)
Coşku Acay and Rolph Recto and Joshua Gancher and Andrew C. Myers and Elaine Shi
2021/467 ( PDF )
Key-schedule Security for the TLS 1.3 Standard
Chris Brzuska and Antoine Delignat-Lavaud and Christoph Egger and Cédric Fournet and Konrad Kohbrok and Markulf Kohlweiss
2021/466 ( -- withdrawn -- )
A New Key Agreement Scheme Based On A Well-Known Property Of Powers
Michele Fabbrini
2021/465 ( PDF )
Cryptanalysis of `MAKE'
Daniel Brown and Neal Koblitz and Jason LeGrow
2021/464 ( PDF )
iTimed: Cache Attacks on the Apple A10 Fusion SoC
Gregor Haas and Seetal Potluri and Aydin Aysu
2021/463 ( PDF )
Improving Recent Side-Channel Attacks Against the DES Key Schedule
Andreas Wiemers and Johannes Mittmann
2021/462 ( PDF )
SoK: How (not) to Design and Implement Post-Quantum Cryptography
James Howe and Thomas Prest and Daniel Apon
2021/461 ( PDF )
Second-Order SCA Security with almost no Fresh Randomness
Aein Rezaei Shahmirzadi and Amir Moradi
2021/460 ( PDF )
Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
Oleksiy Lisovets and David Knichel and Thorben Moos and Amir Moradi
2021/459 ( PDF )
SIRNN: A Math Library for Secure RNN Inference
Deevashwer Rathee and Mayank Rathee and Rahul Kranti Kiran Goli and Divya Gupta and Rahul Sharma and Nishanth Chandran and Aseem Rastogi
2021/458 ( PDF )
FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm
Gideon Samid
2021/457 ( PDF )
Non-Interactive Composition of Sigma-Protocols via Share-then-Hash
Masayuki Abe and Miguel Ambrona and Andrej Bogdanov and Miyako Ohkubo and Alon Rosen
2021/456 ( PDF )
Hardening Circuit-Design IP Against Reverse-Engineering Attacks
Animesh Chhotaray and Thomas Shrimpton
2021/455 ( PDF )
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage
Chao Sun and Thomas Espitau and Mehdi Tibouchi and Masayuki Abe
2021/454 ( PDF )
Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security
Veronika Kuchta and Amin Sakzad and Damien Stehle and Ron Steinfeld and Shi-Feng Sun
2021/453 ( PDF )
Merkle^2: A Low-Latency Transparency Log System
Yuncong Hu and Kian Hooshmand and Harika Kalidhindi and Seung Jin Yang and Raluca Ada Popa
2021/452 ( -- withdrawn -- )
SAT-based Method to Improve Neural Distinguisher and Applications to SIMON
Zezhou Hou and Jiongjiong Ren and Shaozhen Chen
2021/451 ( PDF )
RepShard: Reputation-based Sharding Scheme Achieves Linearly Scaling Efficiency and Security Simultaneously
Gang Wang
2021/450 ( PDF )
RandChain: Practical Scalable Decentralized Randomness Attested by Blockchain
Gang Wang and Mark Nixon
2021/449 ( PDF )
Towards Cloud-assisted Industrial IoT Platform for Large-scale Continuous Condition Monitoring
Gang Wang and Mark Nixon and Mike Boudreaux
2021/448 ( PDF )
On the Memory-Tightness of Hashed ElGamal
Ashrujit Ghoshal and Stefano Tessaro
2021/447 ( PDF )
An Intimate Analysis of Cuckoo Hashing with a Stash
Daniel Noble
2021/446 ( PDF )
Towards practical GGM-based PRF from (Module-)Learning-with-Rounding
Chitchanok Chuengsatiansup and Damien Stehle
2021/445 ( PDF )
A Survey on Perfectly-Secure Verifiable Secret-Sharing
Anirudh C and Ashish Choudhury and Arpita Patra
2021/444 ( PDF )
Xifrat - Compact Public-Key Cryptosystems based on Quasigroups
Daniel Nager and "Danny" Niu Jianfang
2021/443 ( PDF )
Constructing a pairing-free certificateless proxy signature scheme from ECDSA
Cholun Kim
2021/442 ( PDF )
How to Backdoor a Cipher
Raluca Posteuca and Tomer Ashur
2021/441 ( PDF )
Watermarking PRFs from Lattices: Public Extract and Collusion Resistant
Yukun Wang and Mingqiang Wang
2021/440 ( PDF )
Two modifications for Loidreau's code-based cryptosystem
Wenshuo Guo and Fangwei Fu
2021/439 ( PDF )
Recovering the Key from the Internal State of Grain-128AEAD
Donghoon Chang and Meltem Sonmez Turan
2021/438 ( PDF )
More Efficient Shuffle Argument from Unique Factorization
Toomas Krips and Helger Lipmaa
2021/437 ( PDF )
Formal security analysis of MPC-in-the-head zero-knowledge protocols
Nikolaj Sidorenco and Sabine Oechsner and Bas Spitters
2021/436 ( PDF )
Algebraic Differential Fault Analysis on SIMON block cipher
Duc-Phong Le and Sze Ling Yeo and Khoongming Khoo
2021/435 ( PDF )
Non-Interactive Anonymous Router
Elaine Shi and Ke Wu
2021/434 ( PDF )
On the Power of Expansion: More Efficient Constructions in the Random Probing Model
Sonia Belaïd and Matthieu Rivain and Abdul Rahman Taleb
2021/433 ( PDF )
Formations for the Quantum Random Oracle
Aaram Yun
2021/432 ( PDF )
XORBoost: Tree Boosting in the Multiparty Computation Setting
Kevin Deforth and Marc Desgroseilliers and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev and Marius Vuille
2021/431 ( PDF )
Unbounded Multi-Party Computation from Learning with Errors
Prabhanjan Ananth and Abhishek Jain and Zhengzhong Jin and Giulio Malavolta
2021/430 ( PDF )
Lattice Enumeration on GPUs for fplll
Simon Pohmann and Marc Stevens and Jens Zumbrägel
2021/429 ( PDF )
New Practical Multivariate Signatures from a Nonlinear Modifier
Daniel Smith-Tone
2021/428 ( PDF )
A Coq proof of the correctness of X25519 in TweetNaCl
Peter Schwabe and Benoît Viguier and Timmy Weerwag and Freek Wiedijk
2021/427 ( PDF )
Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks
Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu
2021/426 ( PDF )
Generic Plaintext Equality and Inequality Proofs (Extended Version)
Olivier Blazy and Xavier Bultel and Pascal Lafourcade and Octavio Perez Kempner
2021/425 ( PDF )
Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions
Yuqing Zhao and Wenqi Yu and Chun Guo
2021/424 ( PDF )
Security Analysis of SFrame
Takanori Isobe and Ryoma Ito and Kazuhiko Minematsu
2021/423 ( PDF )
On effective computations in special subsemigroups of polynomial transformations and protocol based multivariate cryptosystems
Vasyl Ustimenko
2021/422 ( PDF )
Stacking Sigmas: A Framework to Compose $\Sigma$-Protocols for Disjunctions
Aarushi Goel and Matthew Green and Mathias Hall-Andersen and Gabriel Kaptchuk
2021/421 ( PDF )
Indistinguishability Obfuscation of Null Quantum Circuits and Applications
James Bartusek and Giulio Malavolta
2021/420 ( PDF )
Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52
Fabian Boemer and Sejun Kim and Gelila Seifu and Fillipe D.M. de Souza and Vinodh Gopal
2021/419 ( -- withdrawn -- )
On The Dihedral Coset Problem
Javad Doliskani
2021/418 ( PDF )
Ring-LWE over two-to-power cyclotomics is not hard
Hao Chen
2021/417 ( PDF )
History Binding Signature
Shlomi Dolev and Matan Liber
2021/416 ( PDF )
Cryptocurrencies with Security Policies and Two-Factor Authentication
Florian Breuer and Vipul Goyal and Giulio Malavolta
2021/415 ( PDF )
Efficient Verification of Optimized Code: Correct High-speed X25519
Marc Schoolderman and Jonathan Moerman and Sjaak Smetsers and Marko van Eekelen
2021/414 ( PDF )
Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings
Sook Yan Hue and Jason Chia and Ji-Jian Chin
2021/413 ( PDF )
Blind Polynomial Evaluation and Data Trading
Yi Liu and Qi Wang and Siu-Ming Yiu
2021/412 ( PDF )
Unclonable Encryption, Revisited
Prabhanjan Ananth and Fatih Kaleoglu
2021/411 ( PDF )
Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions
Onur Gunlu and Peter Trifonov and Muah Kim and Rafael F. Schaefer and Vladimir Sidorenko
2021/410 ( PDF )
Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM
Shlomi Dolev and Stav Doolman
2021/409 ( PDF )
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols
Markulf Kohlweiss and Varun Madathil and Kartik Nayak and Alessandra Scafuro
2021/408 ( PDF )
Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding
Christian Majenz and Christian Schaffner and Mehrdad Tahmasbi
2021/407 ( PDF )
Improved Quantum Algorithms for the k-XOR Problem
André Schrottenloher
2021/406 ( PDF )
Disappearing Cryptography in the Bounded Storage Model
Jiaxin Guan and Mark Zhandry
2021/405 ( PDF )
Revisiting some results on APN and algebraic immune functions
Claude Carlet
2021/404 ( PDF )
Chain Reductions for Multi-Signatures and the HBMS Scheme
Mihir Bellare and Wei Dai
2021/403 ( PDF )
Atom: A Stream Cipher with Double Key Filter
Subhadeep Banik and Andrea Caforio and Takanori Isobe and Fukang Liu and Willi Meier and Kosei Sakamoto and Santanu Sarkar
2021/402 ( PDF )
Leakage Resilient Value Comparison With Application to Message Authentication
Christoph Dobraunig and Bart Mennink
2021/401 ( PDF )
Output Prediction Attacks on Block Ciphers using Deep Learning
Hayato Kimura and Keita Emura and Takanori Isobe and Ryoma Ito and Kazuto Ogawa and Toshihiro Ohigashi
2021/400 ( PDF )
Size of IK00 Branching Program
Yupu Hu and Xingting Dong and Baocang Wang
2021/399 ( PDF )
Latus Incentive Scheme: Enabling Decentralization in Blockchains based on Recursive SNARKs
Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov
2021/398 ( PDF )
Cryptanalysis of the Binary Permuted Kernel Problem
Thales Bandiera Paiva and Routo Terada
2021/397 ( PDF )
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq
Carmine Abate and Philipp G. Haselwarter and Exequiel Rivas and Antoine Van Muylder and Théo Winterhalter and Nikolaj Sidorenco and Catalin Hritcu and Kenji Maillard and Bas Spitters
2021/396 ( PDF )
LESS-FM: Fine-tuning Signatures from the Code Equivalence Problem
Alessandro Barenghi and Jean-Francois Biasse and Edoardo Persichetti and Paolo Santini
2021/395 ( PDF )
On the Validity of Spoofing Attack Against Safe is the New Smart
Harishma Boyapally and Urbi Chatterjee and Debdeep Mukhopadhyay
2021/394 ( PDF )
Quantum Encryption with Certified Deletion: Public Key and Attribute-Based
Ryo Nishimaki and Takashi Yamakawa
2021/393 ( PDF )
Key Agreement with Correlated Noise and Multiple Entities or Enrollments
Onur Gunlu
2021/392 ( PDF )
How Private Are Commonly-Used Voting Rules?
Ao Liu and Yun Lu and Lirong Xia and Vassilis Zikas
2021/391 ( PDF )
New Standards for E-Voting Systems: Reflections on Source Code Examinations
Thomas Haines and Peter Roenne
2021/390 ( PDF )
Orthros: A Low-Latency PRF
Subhadeep Banik and Takanori Isobe and Fukang Liu and Kazuhiko Minematsu and Kosei Sakamoto
2021/389 ( PDF )
Physically Related Functions: A New Paradigm for Light-weight Key-Exchange
Durba Chatterjee and Harishma Boyapally and Sikhar Patranabis and Urbi Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
2021/388 ( PDF )
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball and Elette Boyle and Ran Cohen and Lisa Kohl and Tal Malkin and Pierre Meyer and Tal Moran
2021/387 ( PDF )
Quantum-access security of the Winternitz one-time signature scheme
Christian Majenz and Chanelle Matadah Manfouo and Maris Ozols
2021/386 ( PDF )
SAFELearn: Secure Aggregation for private FEderated Learning
Hossein Fereidooni and Samuel Marchal and Markus Miettinen and Azalia Mirhoseini and Helen Möllering and Thien Duc Nguyen and Phillip Rieger and Ahmad Reza Sadeghi and Thomas Schneider and Hossein Yalame and Shaza Zeitouni
2021/385 ( PDF )
Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices
Yasufumi Hashimoto
2021/384 ( PDF )
Analysis and Probing of Parallel Channels in the Lightning Network
Alex Biryukov and Gleb Naumenko and Sergei Tikhomirov
2021/383 ( PDF )
GLV+HWCD for 2y^2=x^3+x/GF(8^91+5)
Daniel R. L. Brown
2021/382 ( PDF )
Signatures with Tight Multi-User Security from Search Assumptions
Jiaxin Pan and Magnus Ringerud
2021/381 ( PDF )
Towards Practical and Round-Optimal Lattice-Based Threshold and Blind Signatures
Shweta Agrawal and Damien Stehle and Anshu Yadav
2021/380 ( PDF )
Certificateless Designated Verifier Proxy Signature
Cholun Kim
2021/379 ( PDF )
A Note on the Bias of Rotational Differential-Linear Distinguishers
Yunwen Liu and Zhongfeng Niu and Siwei Sun and Chao Li and Lei Hu
2021/378 ( PDF )
Multiparty Reusable Non-Interactive Secure Computation from LWE
Fabrice Benhamouda and Aayush Jain and Ilan Komargodski and Huijia Lin
2021/377 ( PDF )
Attacks and weaknesses of BLS aggregate signatures
Nguyen Thoi Minh Quan
2021/376 ( PDF )
On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds
Nai-Hui Chia and Kai-Min Chung and Qipeng Liu and Takashi Yamakawa
2021/375 ( PDF )
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines
Rafael Dowsley and Caleb Horst and Anderson C A Nascimento
2021/374 ( PDF )
ZXAD: High-volume Attack Mitigation for Tor
Akshaya Mani and Ian Goldberg
2021/373 ( PDF )
T5: Hashing Five Inputs with Three Compression Calls
Yevgeniy Dodis and Dmitry Khovratovich and Nicky Mouha and Mridul Nandi
2021/372 ( PDF )
Explicit connections between supersingular isogeny graphs and Bruhat–Tits trees
Laia Amorós and Annamaria Iezzi and Kristin Lauter and Chloe Martindale and Jana Sotáková
2021/371 ( PDF )
Construction of minimal linear codes with few weights from weakly regular plateaued functions
Ahmet Sinak
2021/370 ( PDF )
Nova: Recursive Zero-Knowledge Arguments from Folding Schemes
Abhiram Kothapalli and Srinath Setty and Ioanna Tzialla
2021/369 ( PDF )
A Note on Algebraic Decomposition Method for Masked Implementation
Shoichi Hirose
2021/368 ( PDF )
Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE
Aaron Hutchinson and Koray Karabina and Geovandro Pereira
2021/367 ( PDF )
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
Arnab Roy and Elena Andreeva and Jan Ferdinand Sauer
2021/366 ( PDF )
Multiparty Computation with Covert Security and Public Verifiability
Peter Scholl and Mark Simkin and Luisa Siniscalchi
2021/365 ( PDF )
Updatable Signatures and Message Authentication Codes
Valerio Cini and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks and Erkan Tairi
2021/364 ( PDF )
RAGHAV: A new low power S-P network encryption design for resource constrained environment
GAURAV BANSOD
2021/363 ( PDF )
Information Leakages in Code-based Masking: A Unified Quantification Approach
Wei Cheng and Sylvain Guilley and Claude Carlet and Jean-Luc Danger and Sihem Mesnager
2021/362 ( PDF )
Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning
Zezhou Hou and Jiongjiong Ren and Shaozhen Chen
2021/361 ( PDF )
Some Generic Constructions of Generalized Plateaued Functions
Jiaxin Wang Fang-Wei Fu
2021/360 ( PDF )
An Architecture for Blockchain-based Cloud Banking
Thuat Do
2021/359 ( PDF )
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso
2021/358 ( PDF )
Time- and Space-Efficient Arguments from Groups of Unknown Order
Alexander R. Block and Justin Holmgren and Alon Rosen and Ron D. Rothblum and Pratik Soni
2021/357 ( PDF )
AISY - Deep Learning-based Framework for Side-channel Analysis
Guilherme Perin and Lichao Wu and Stjepan Picek
2021/356 ( PDF )
Active Implementation of End-to-End Post-Quantum Encryption
Anton Tutoveanu
2021/355 ( PDF )
A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware
Georg Land and Pascal Sasdrich and Tim Güneysu
2021/354 ( PDF )
Efficient permutation protocol for MPC in the head
Peeter Laud
2021/353 ( PDF )
Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions
Alonso González and Alexandros Zacharakis
2021/352 ( PDF )
A Configurable Hardware Implementation of XMSS
Jan Philipp Thoma and Tim Güneysu
2021/351 ( PDF )
Practical Dynamic Group Signatures Without Knowledge Extractors
Hyoseung Kim and Olivier Sanders and Michel Abdalla and Jong Hwan Park
2021/350 ( PDF )
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
Konstantinos Chalkias and Francois Garillot and Yashvanth Kondi and Valeria Nikolaenko
2021/349 ( PDF )
Post-quantum Resettably-Sound Zero Knowledge
Nir Bitansky and Michael Kellner and Omri Shmueli
2021/348 ( PDF )
Decoding supercodes of Gabidulin codes and applications to cryptanalysis
Maxime Bombar and Alain Couvreur
2021/347 ( PDF )
Attacking (EC)DSA With Partially Known Multiples of Nonces
Marios Adamoudis and Konstantinos A. Draziotis and Dimitrios Poulakis
2021/346 ( PDF )
Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security
Benny Applebaum and Eliran Kachlon and Arpita Patra
2021/345 ( PDF )
Private Blocklist Lookups with Checklist
Dmitry Kogan and Henry Corrigan-Gibbs
2021/344 ( PDF )
Efficient and Universally Composable Single Secret Leader Election from Pairings
Dario Catalano and Dario Fiore and Emanuele Giunta
2021/343 ( PDF )
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
Rishab Goyal and Jiahui Liu and Brent Waters
2021/342 ( PDF )
N-for-1 Auth: N-wise Decentralized Authentication via One Authentication
Weikeng Chen and Ryan Deng and Raluca Ada Popa
2021/341 ( PDF )
Clonable PUF: On the Design of PUFs That Share Equivalent Responses
Takashi Sato and Yuki Tanaka and Song Bian
2021/340 ( PDF )
Merkle Trees Optimized for Stateless Clients in Bitcoin
Bolton Bailey and Suryanarayana Sankagiri
2021/339 ( PDF )
Non-interactive distributed key generation and key resharing
Jens Groth
2021/338 ( PDF )
Lattice-Based Proof of Shuffle and Applications to Electronic Voting
Diego F. Aranha and Carsten Baum and Kristian Gjøsteen and Tjerand Silde and Thor Tunge
2021/337 ( PDF )
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud Systems
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Yu-Chi Chen and Masahiro Mambo
2021/336 ( PDF )
On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES
Nicolas T. Courtois and Matteo Abbondati and Hamy Ratoanina and Marek Grajek
2021/335 ( PDF )
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
Ohad Amon and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir
2021/334 ( PDF )
Post-Quantum Succinct Arguments: Breaking the Quantum Rewinding Barrier
Alessandro Chiesa and Fermi Ma and Nicholas Spooner and Mark Zhandry
2021/333 ( PDF )
Sumcheck Arguments and their Applications
Jonathan Bootle and Alessandro Chiesa and Katerina Sotiraki
2021/332 ( PDF )
An $O(\log^2 p)$ Approach to Point-Counting on Elliptic Curves From a Prominent Family Over the Prime Field $\mathbb{F}_p$
Yuri Borissov and Miroslav Markov
2021/331 ( PDF )
A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications
Radhakrishna Bhat and N R Sunitha and S S Iyengar
2021/330 ( PDF )
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
Pooya Farshim and Louiza Khati and Yannick Seurin and Damien Vergnaud
2021/329 ( PDF )
Two Efficient and Regulatory Confidential Transaction Schemes
Min Yang and Changtong Xu and Zhe Xia and Li Wang and Qingshu Meng
2021/328 ( PDF )
Mixup Data Augmentation for Deep Learning Side-Channel Attacks
Karim M. Abdellatif
2021/327 ( PDF )
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions
Matteo Campanelli and Mathias Hall-Andersen
2021/326 ( PDF )
Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox
François Dupressoir and Konrad Kohbrok and Sabine Oechsner
2021/325 ( PDF )
Spectrum: High-Bandwidth Anonymous Broadcast with Malicious Security
Zachary Newman and Sacha Servan-Schreiber and Srinivas Devadas
2021/324 ( PDF )
Private AI: Machine Learning on Encrypted Data
Kristin E. Lauter
2021/323 ( PDF )
0
Nguyen Thoi Minh Quan
2021/322 ( PDF )
Rinocchio: SNARKs for Ring Arithmetic
Chaya Ganesh and Anca Nitulescu and Eduardo Soria-Vazquez
2021/321 ( PDF )
Abuse Resistant Law Enforcement Access Systems
Matthew Green and Gabriel Kaptchuk and Gijs Van Laer
2021/320 ( PDF )
Binding BIKE errors to a key pair
Nir Drucker and Shay Gueron and Dusan Kostic
2021/319 ( PDF )
Tradeoff attacks on symmetric ciphers
Orhun Kara
2021/318 ( PDF )
Oblivious TLS via Multi-Party Computation
Damiano Abram and Ivan Damgård and Peter Scholl and Sven Trieflinger
2021/317 ( PDF )
MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge
Duong Tung Nguyen and Ni Trieu
2021/316 ( PDF )
Reusable Two-Round MPC from LPN
James Bartusek and Sanjam Garg and Akshayaram Srinivasan and Yinuo Zhang
2021/315 ( PDF )
Faster homomorphic comparison operations for BGV and BFV
Ilia Iliashenko and Vincent Zucca
2021/314 ( PDF )
On Security Properties of All-or-nothing Transforms
Navid Nasr Esfahani and Douglas R. Stinson
2021/313 ( PDF )
Rank Estimation with Bounded Error via Exponential Sampling
Liron David and Avishai Wool
2021/312 ( PDF )
Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup
Zhimin Luo and Mengce Zheng and Ping Wang and Minhui Jin and Jiajia Zhang and Honggang Hu
2021/311 ( PDF )
Improved Neural Aided Statistical Attack for Cryptanalysis
Yi Chen and Hongbo Yu
2021/310 ( PDF )
A New Neural Distinguisher Considering Features Derived from Multiple Ciphertext Pairs
Yi Chen and Yantian Shen and Hongbo Yu and Sitong Yuan
2021/309 ( PDF )
SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets
Xingyu Meng and Kshitij Raj and Atul Prasad Deb Nath and Kanad Basu and Sandip Ray
2021/308 ( PDF )
Threshold Garbled Circuits and Ad Hoc Secure Computation
Michele Ciampi and Vipul Goyal and Rafail Ostrovsky
2021/307 ( PDF )
A Compressed $\Sigma$-Protocol Theory for Lattices
Thomas Attema and Ronald Cramer and Lisa Kohl
2021/306 ( PDF )
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2021/305 ( PDF )
SoK: Game-based Security Models for Group Key Exchange
Bertram Poettering and Paul Rösler and Jörg Schwenk and Douglas Stebila
2021/304 ( PDF )
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting
Xavier Boyen and Thomas Haines and Johannes Mueller
2021/303 ( PDF )
The More The Merrier: Reducing the Cost of Large Scale MPC
S. Dov Gordon and Daniel Starin and Arkady Yerukhimovich
2021/302 ( PDF )
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain
Maxime Buser and Rafael Dowsley and Muhammed F. Esgin and Shabnam Kasra Kermanshahi and Veronika Kuchta and Joseph K. Liu and Raphael Phan and Zhenfei Zhang
2021/301 ( PDF )
Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of $j=0$ with the cost of one exponentiation in $\mathbb{F}_{\!q}$
Dmitrii Koshelev
2021/300 ( PDF )
Invariants for EA- and CCZ-equivalence of APN and AB functions
Nikolay Kaleyski
2021/299 ( PDF )
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality
Muhammad Saad and Afsah Anwar and Srivatsan Ravi and David Mohaisen
2021/298 ( PDF )
On extensions of the one-time-pad
Bhupendra Singh and G. Athithan and Rajesh Pillai
2021/297 ( PDF )
HashWires: Hyperefficient Credential-Based Range Proofs
Konstantinos Chalkias and Shir Cohen and Kevin Lewi and Fredric Moezinia and Yolan Romailler
2021/296 ( PDF )
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice
Jan Richter-Brockmann and Pascal Sasdrich and Tim Güneysu
2021/295 ( PDF )
Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design
Michael Zuzak and Ankur Srivastava
2021/294 ( PDF )
Code-based signatures without trapdoors through restricted vectors
Marco Baldi and Franco Chiaraluce and Paolo Santini
2021/293 ( PDF )
Thinking Outside the Superbox
Nicolas Bordes and Joan Daemen and Daniël Kuijsters and Gilles Van Assche
2021/292 ( PDF )
Quantum Collision Attacks on Reduced SHA-256 and SHA-512
Akinori Hosoyamada and Yu Sasaki
2021/291 ( PDF )
Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security
Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
2021/290 ( PDF )
Dummy Shuffling against Algebraic Attacks in White-box Implementations
Alex Biryukov and Aleksei Udovenko
2021/289 ( PDF )
Reactive Key-Loss Protection in Blockchains
Sam Blackshear and Konstantinos Chalkias and Panagiotis Chatzigiannis and Riyaz Faizullabhoy and Irakliy Khaburzaniya and Eleftherios Kokoris Kogias and Joshua Lind and David Wong and Tim Zakian
2021/288 ( PDF )
Redeeming Reset Indifferentiability and Post-Quantum Groups
Mark Zhandry
2021/287 ( PDF )
A Deeper Look at Machine Learning-Based Cryptanalysis
Adrien Benamira and David Gerault and Thomas Peyrin and Quan Quan Tan
2021/286 ( PDF )
Fiat-Shamir via List-Recoverable Codes (or: Parallel Repetition of GMW is not Zero-Knowledge)
Justin Holmgren and Alex Lombardi and Ron D. Rothblum
2021/285 ( PDF )
Quadratic Secret Sharing and Conditional Disclosure of Secrets
Amos Beimel and Hussien Othman and Naty Peter
2021/284 ( PDF )
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
Christof Ferreira Torres and Antonio Ken Iannillo and Arthur Gervais and Radu State
2021/283 ( PDF )
P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange
Carsten Baum and Bernardo David and Tore Frederiksen
2021/282 ( PDF )
One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols
Péter Kutas and Simon-Philipp Merz and Christophe Petit and Charlotte Weitkämper
2021/281 ( PDF )
Subquadratic SNARGs in the Random Oracle Model
Alessandro Chiesa and Eylon Yogev
2021/280 ( PDF )
Online-Extractability in the Quantum Random-Oracle Model
Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner
2021/279 ( PDF )
Information-Set Decoding with Hints
Anna-Lena Horlemann and Sven Puchinger and Julian Renner and Thomas Schamberger and Antonia Wachter-Zeh
2021/278 ( PDF )
More Communication Lower Bounds for Information-Theoretic MPC
Ivan Damgård and Boyang Li and Nikolaj I. Schwartzbach
2021/277 ( PDF )
On the Integer Polynomial Learning with Errors Problem
Julien Devevey and Amin Sakzad and Damien Stehlé and Ron Steinfeld
2021/276 ( PDF )
Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography
Amril Syalim and Takashi Nishide and Kouichi Sakurai
2021/275 ( PDF )
Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher
Zhengyuan Shi and Gangqiang Yang and Hailiang Xiong and Fudong Li and Honggang Hu
2021/274 ( PDF )
Large Message Homomorphic Secret Sharing from DCR and Applications
Lawrence Roy and Jaspal Singh
2021/273 ( PDF )
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding
Stanislaw Jarecki and Hugo Krawczyk and Jiayu Xu
2021/272 ( PDF )
Isogeny-based key compression without pairings
Geovandro C. C. F. Pereira and Paulo S. L. M. Barreto
2021/271 ( PDF )
On the CCA Compatibility of Public-Key Infrastructure
Dakshita Khurana and Brent Waters
2021/270 ( PDF )
PQC: R-Propping of a New Group-Based Digital Signature
Pedro Hecht
2021/269 ( PDF )
Steel: Composable Hardware-based Stateful and Randomised Functional Encryption
Pramod Bhatotia and Markulf Kohlweiss and Lorenzo Martinico and Yiannis Tselekounis
2021/268 ( PDF )
Puncture 'Em All: Stronger Updatable Encryption with No-Directional Key Updates
Daniel Slamanig and Christoph Striecks
2021/267 ( PDF )
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
Christoph Dobraunig and Lorenzo Grassi and Anna Guinet and Daniël Kuijsters
2021/266 ( PDF )
VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE
Peter Rindal and Phillipp Schoppmann
2021/265 ( PDF )
On the Hardness of Module-LWE with Binary Secret
Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen
2021/264 ( PDF )
FAST: Fair Auctions via Secret Transactions
Bernardo David and Lorenzo Gentile and Mohsen Pourpouneh
2021/263 ( PDF )
Compressed Linear Aggregate Signatures Based on Module Lattices
Katharina Boudgoust and Adeline Roux-Langlois
2021/262 ( PDF )
The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT
Claudio Orlandi and Peter Scholl and Sophia Yakoubov
2021/261 ( PDF )
MIRACLE: MIcRo-ArChitectural Leakage Evaluation
Ben Marshall and Dan Page and James Webb
2021/260 ( PDF )
A Geometric Approach to Homomorphic Secret Sharing
Yuval Ishai and Russell W. F. Lai and Giulio Malavolta
2021/259 ( PDF )
Fully projective radical isogenies in constant-time
Jesús-Javier Chi-Domínguez and Krijn Reijnders
2021/258 ( PDF )
Secure Wire Shuffling in the Probing Model
Jean-Sebastien Coron and Lorenzo Spignoli
2021/257 ( PDF )
Cryptanalysis of the quantum public-key cryptosystem OTU under heuristics from Szemerédi-type statements
Shoichi Kamada
2021/256 ( PDF )
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC
Ghada Almashaqbeh and Fabrice Benhamouda and Seungwook Han and Daniel Jaroslawicz and Tal Malkin and Alex Nicita and Tal Rabin and Abhishek Shah and Eran Tromer
2021/255 ( PDF )
A Simple Algebraic Attack on 3-Round LowMC
Fukang Liu and Takanori Isobe and Willi Meier
2021/254 ( PDF )
Multivariate Public Key Cryptosystem from Sidon Spaces
Netanel Raviv and Ben Langton and Itzhak Tamo
2021/253 ( PDF )
Improved single-round secure multiplication using regenerating codes
Mark Abspoel and Ronald Cramer and Daniel Escudero and Ivan Damgård and Chaoping Xing
2021/252 ( PDF )
A Resource Binding Approach to Logic Obfuscation
Michael Zuzak and Yuntao Liu and Ankur Srivastava
2021/251 ( PDF )
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser
2021/250 ( PDF )
Key Agreement with Physical Unclonable Functions and Biometric Identifiers
Onur Gunlu
2021/249 ( PDF )
NeuroSCA: Evolving Activation Functions for Side-channel Analysis
Karlo Knezevic and Juraj Fulir and Domagoj Jakobovic and Stjepan Picek
2021/248 ( PDF )
Everlasting UC Commitments from Fully Malicious PUFs
Bernardo Magri and Giulio Malavolta and Dominique Schröder and Dominique Unruh
2021/247 ( PDF )
Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets
David Knichel and Pascal Sasdrich and Amir Moradi
2021/246 ( PDF )
Master-Key KDM-Secure ABE via Predicate Encoding
Shengyuan Feng and Junqing Gong and Jie Chen
2021/245 ( PDF )
On the Ideal Shortest Vector Problem over Random Rational Primes
Yanbin Pan and Jun Xu and Nick Wadleigh and Qi Cheng
2021/244 ( PDF )
Forward Secret Encrypted RAM: Lower Bounds and Applications
Alexander Bienstock and Yevgeniy Dodis and Kevin Yeo
2021/243 ( PDF )
Private Set Operations from Oblivious Switching
Gayathri Garimella and Payman Mohassel and Mike Rosulek and Saeed Sadeghian and Jaspal Singh
2021/242 ( PDF )
GAP: Born to Break Hiding
Ju-Hwan Kim and Ji-Eun Woo and Soo-Jin Kim and So-Yeon Park and Dong-Guk Han
2021/241 ( PDF )
On the Round Complexity of Fully Secure Solitary MPC with Honest Majority
Saikrishna Badrinarayanan and Peihan Miao and Pratyay Mukherjee and Divya Ravi
2021/240 ( PDF )
The Relationship Between Idealized Models Under Computationally Bounded Adversaries
Mark Zhandry and Cong Zhang
2021/239 ( PDF )
SoK: Auditability and Accountability in Distributed Payment Systems
Panagiotis Chatzigiannis and Foteini Baldimtsi and Konstantinos Chalkias
2021/238 ( PDF )
Two Sides of The Same Coin: Weak-Keys and More Efficient Variants of CRAFT
Gregor Leander and Shahram Rasoolzadeh
2021/237 ( PDF )
Post-quantum Security of OAEP Transform
Ehsan Ebrahimi
2021/236 ( PDF )
SNOW-Vi: an extreme performance variant of SNOW-V for lower grade CPUs
Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang
2021/235 ( PDF )
More Efficient Digital Signatures with Tight Multi-User Security
Denis Diemert and Kai Gellert and Tibor Jager and Lin Lyu
2021/234 ( PDF )
New Public-Key Crypto-System EHT
Alessandro Budroni and Igor Semaev
2021/233 ( PDF )
Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers
Inbar Kaslasi and Ron D. Rothblum and Prashant Nalini Vasudevan
2021/232 ( -- withdrawn -- )
Fast Factoring Integers by SVP Algorithms
Claus Peter Schnorr
2021/231 ( -- withdrawn -- )
LL-ORAM: A Forward and Backward Private Oblivious RAM
Zhiqiang Wu and Xiaoyong Tang and Jin Wang and Tan Deng
2021/230 ( PDF )
Subversion-Resilient Public Key Encryption with Practical Watchdogs
Pascal Bemmann and Rongmao Chen and Tibor Jager
2021/229 ( PDF )
Fast Boolean Queries with Minimized Leakage for Encrypted Databases in Cloud Computing
Zhiqiang Wu and Kenli Li and Keqin Li and Jin Wang
2021/228 ( PDF )
On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments
Nils Fleischhacker and Mark Simkin
2021/227 ( PDF )
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks
Qiqi Lai and Feng-Hao Liu and Zhedong Wang
2021/226 ( PDF )
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation
Khoa Nguyen and Reihaneh Safavi-Naini and Willy Susilo and Huaxiong Wang and Yanhong Xu and Neng Zeng
2021/225 ( PDF )
Recovering or Testing Extended-Affine Equivalence
Anne Canteaut and Alain Couvreur and Léo Perrin
2021/224 ( PDF )
Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha
Murilo Coutinho and T. C. Souza Neto
2021/223 ( PDF )
Escaping from Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting
Xinyu Li and Jing Xu and Lingyuan Yin and Yuan Lu and Qiang Tang and Zhenfeng Zhang
2021/222 ( PDF )
Quantum-safe HIBE: does it cost a Latte?
Raymond K. Zhao and Sarah McCarthy and Ron Steinfeld and Amin Sakzad and Máire O’Neill
2021/221 ( PDF )
The Direction of Updatable Encryption Does Matter
Ryo Nishimaki
2021/220 ( PDF )
A New Twofold Cornacchia-Type Algorithm
Bei Wang; Yi Ouyang; Songsong Li; Honggang Hu
2021/219 ( PDF )
Snarky Ceremonies
Markulf Kohlweiss and Mary Maller and Janno Siim and Mikhail Volkhov
2021/218 ( PDF )
SimS: a Simplification of SiGamal
Tako Boris Fouotsa and Christophe Petit
2021/217 ( PDF )
Verifiable Random Functions with Optimal Tightness
David Niehues
2021/216 ( PDF )
How to Meet Ternary LWE Keys
Alexander May
2021/215 ( PDF )
Limbo: Efficient Zero-knowledge MPCitH-based Arguments
Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Titouan Tanguy
2021/214 ( PDF )
Mesh Messaging in Large-scale Protests: Breaking Bridgefy
Martin R. Albrecht and Jorge Blasco and Rikke Bjerg Jensen and Lenka Mareková
2021/213 ( PDF )
Accelerating the Search of Differential and Linear Characteristics with the SAT Method
Ling Sun and Wei Wang and Meiqin Wang
2021/212 ( PDF )
Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC
Ryoma Ito and Rentaro Shiba and Kosei Sakamoto and Fukang Liu and Takanori Isobe
2021/211 ( PDF )
GearBox: An Efficient UC Sharded Ledger Leveraging the Safety-Liveness Dichotomy
Bernardo David and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Daniel Tschudi
2021/210 ( PDF )
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles
Craig Gentry and Shai Halevi and Hugo Krawczyk and Bernardo Magri and Jesper Buus Nielsen and Tal Rabin and Sophia Yakoubov
2021/209 ( PDF )
Sampling methods for cryptographic tests
George Marinakis
2021/208 ( PDF )
Secure Poisson Regression
Mahimna Kelkar and Phi Hung Le and Mariana Raykova and Karn Seth
2021/207 ( PDF )
Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank
Daniele Cozzo and Nigel P. Smart and Younes Talibi Alaoui
2021/206 ( PDF )
WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts
Ádám Ficsór and Yuval Kogman and Lucas Ontivero and István András Seres
2021/205 ( PDF )
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup
Tsz Hon Yuen and Handong Cui and Xiang Xie
2021/204 ( PDF )
Revisiting Homomorphic Encryption Schemes for Finite Fields
Andrey Kim and Yuriy Polyakov and Vincent Zucca
2021/203 ( PDF )
Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing
Tjerand Silde and Martin Strand
2021/202 ( PDF )
Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices
Martin R. Albrecht and Russell W. F. Lai
2021/201 ( PDF )
DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security
Hanshen Xiao and Srinivas Devadas
2021/200 ( PDF )
Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols
Sergiu Carpov and Kevin Deforth and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev and Jonathan Katz and Iraklis Leontiadis and M. Mohammadi and Abson Sae-Tang and Marius Vuille
2021/199 ( PDF )
Generic, Efficient and Isochronous Gaussian Sampling over the Integers
Shuo Sun and Yongbin Zhou and Yunfeng Ji and Rui Zhang and Yang Tao
2021/198 ( PDF )
Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs
Tatsuki Ono and Song Bian and Takashi Sato
2021/197 ( PDF )
Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA
Guilherme Perin and Lichao Wu and Stjepan Picek
2021/196 ( PDF )
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model
Xu Liu and Mingqiang Wang
2021/195 ( PDF )
Compilation of Function Representations for Secure Computing Paradigms
Karim Baghery and Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Nigel P. Smart and Titouan Tanguy
2021/194 ( PDF )
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Raghvendra Rohit and Kai Hu and Sumanta Sarkar and Siwei Sun
2021/193 ( PDF )
Multitarget decryption failure attacks and their application to Saber and Kyber
Jan-Pieter D'Anvers and Senne Batsleer
2021/192 ( PDF )
Quantum Indifferentiability of SHA-3
Jan Czajkowski
2021/191 ( PDF )
PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution
Yaroslav Balytskyi and Manohar Raavi and Anatoliy Pinchuk and Sang-Yoon Chang
2021/190 ( PDF )
Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source
Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen
2021/189 ( PDF )
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette
Yunwen Liu and Siwei Sun and Chao Li
2021/188 ( PDF )
Tight Security Bounds for Micali’s SNARGs
Alessandro Chiesa and Eylon Yogev
2021/187 ( PDF )
Weak Keys in Reduced AEGIS and Tiaoxin
Fukang Liu and Takanori Isobe and Willi Meier and Kosei Sakamoto
2021/186 ( PDF )
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages
Hemanta K. Maji and Hai H. Nguyen and Anat Paskin-Cherniavsky and Tom Suad and Mingyuan Wang
2021/185 ( PDF )
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms
Hwajeong Seo and Pakize Sanal and Wai-Kong Lee and Reza Azarderakhsh
2021/184 ( PDF )
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption
Sravya Yandamuri and Ittai Abraham and Kartik Nayak and Michael K. Reiter
2021/183 ( PDF )
Efficient State Management in Distributed Ledgers
Dimitris Karakostas and Nikos Karayannidis and Aggelos Kiayias
2021/182 ( PDF )
The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications
István András Seres and Máté Horváth and Péter Burcsi
2021/181 ( PDF )
Group Signatures with User-Controlled and Sequential Linkability
Jesus Diaz and Anja Lehmann
2021/180 ( PDF )
Apollo -- Optimistically Linear and Responsive SMR
Adithya Bhat and Akhil Bandarupalli and Saurabh Bagchi and Aniket Kate and Michael Reiter
2021/179 ( PDF )
Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis
An Wang and Yuan Li and Yaoling Ding and Liehuang Zhu and Yongjuan Wang
2021/178 ( PDF )
Attribute-Based Access Control for Inner Product Functional Encryption from LWE
Tapas Pal and Ratna Dutta
2021/177 ( PDF )
Generic Negation of Pair Encodings
Miguel Ambrona
2021/176 ( PDF )
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits
Lukas Aumayr and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei
2021/175 ( PDF )
On the Relationships between Different Methods for Degree Evaluation (Full Version)
Siwei Chen and Zejun Xiang and Xiangyong Zeng and Shasha Zhang
2021/174 ( PDF )
Smart Contracts for Incentivized Outsourcing of Computation
Alptekin Küpçü and Reihaneh Safavi-Naini
2021/173 ( PDF )
TensorCrypto
Wai-Kong Lee and Hwajeong Seo and Zhenfei Zhang and Seongoun Hwang
2021/172 ( PDF )
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI
Nishanth Chandran and Nishka Dasgupta and Divya Gupta and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Akash Shah
2021/171 ( PDF )
Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Revisited
Wei Yu and Guangwu Xu
2021/170 ( PDF )
Fully Anonymous Group Signature with Verifier-Local Revocation
Ai Kitagawa and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka
2021/169 ( PDF )
Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials
Yasuhiko Ikematsu and Shuhei Nakamura and Bagus Santoso and Takanori Yasuda
2021/168 ( PDF )
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS
Xiaohan Zhang and Chi Cheng and Ruoyu Ding
2021/167 ( PDF )
Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware
Seetal Potluri and Aydin Aysu
2021/166 ( PDF )
Cost Fairness for Blockchain-Based Two-Party Exchange Protocols
Matthias Lohr and Benjamin Schlosser and Jan Jürjens and Steffen Staab
2021/165 ( PDF )
Composition with Knowledge Assumptions
Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
2021/164 ( PDF )
Graph-Based Construction for Non-Malleable Codes
Shohei Satake and Yujie Gu and Kouichi Sakurai
2021/163 ( PDF )
CNF-FSS and its Applications
Paul Bunn and Eyal Kushilevitz and Rafail Ostrovsky
2021/162 ( PDF )
Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity
Giuseppe Ateniese and Long Chen and Danilo Francati and Dimitrios Papadopoulos and Qiang Tang
2021/161 ( -- withdrawn -- )
Generic Adaptor Signature
Xianrui Qin and Handong Cui and Tsz Hon Yuen
2021/160 ( PDF )
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance
Tibor Jager and Rafael Kurek and David Niehues
2021/159 ( PDF )
hbACSS: How to Robustly Share Many Secrets
Thomas Yurek and Licheng Luo and Jaiden Fairoze and Aniket Kate and Andrew Miller
2021/158 ( PDF )
Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate
Nicolas Resch and Chen Yuan
2021/157 ( PDF )
Sycon: A New Milestone in Designing ASCON-like Permutations
Kalikinkar Mandal and Dhiman Saha and Sumanta Sarkar and Yosuke Todo
2021/156 ( PDF )
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability
Manuel Barbosa and Gilles Barthe and Benjamin Grégoire and Adrien Koutsos and Pierre-Yves Strub
2021/155 ( PDF )
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
James Howe and Marco Martinoli and Elisabeth Oswald and Francesco Regazzoni
2021/154 ( PDF )
Generating cryptographically-strong random lattice bases and recognizing rotations of $\mathbb{Z}^n$
Tamar Lichter Blanks and Stephen D. Miller
2021/153 ( PDF )
On the Isogeny Problem with Torsion Point Information
Tako Boris Fouotsa and Péter Kutas and Simon-Philipp Merz
2021/152 ( PDF )
Hybrid Dual Attack on LWE with Arbitrary Secrets
Lei Bi and Xianhui Lu and Junjie Luo and Kunpeng Wang and Zhenfei Zhang
2021/151 ( PDF )
On Sufficient Oracles for Secure Computation with Identifiable Abort
Mark Simkin and Luisa Siniscalchi and and Sophia Yakoubov
2021/150 ( PDF )
Two-Party Adaptor Signatures From Identification Schemes
Andreas Erwig and Sebastian Faust and Kristina Hostáková and Monosij Maitra and Siavash Riahi
2021/149 ( PDF )
Quantum Security of the Legendre PRF
Paul Frixons and André Schrottenloher
2021/148 ( PDF )
On methods of shortening ElGamal-type signatures
Liliya Akhmetzyanova and Evgeny Alekseev and Alexandra Babueva and Stanislav Smyshlyaev
2021/147 ( PDF )
IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols
Greg Morrisett and Elaine Shi and Kristina Sojakova and Xiong Fan and Joshua Gancher
2021/146 ( PDF )
Securely Computing Piecewise Constant Codes
Benjamin E. Diamond
2021/145 ( PDF )
A Security Framework for Distributed Ledgers
Mike Graf and Daniel Rausch and Viktoria Ronge and Christoph Egger and Ralf Kuesters and Dominique Schröder
2021/144 ( PDF )
\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol
Morteza Adeli and Nasour Bagheri and Sadegh Sadeghi and Saru Kumari
2021/143 ( PDF )
On Bitcoin Cash’s Target Recalculation Functions
Juan Garay and Yu Shen
2021/142 ( PDF )
Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication
Muah Kim and Onur Gunlu and Rafael F. Schaefer
2021/141 ( PDF )
Advanced Lattice Sieving on GPUs, with Tensor Cores
Léo Ducas and Marc Stevens and Wessel van Woerden
2021/140 ( PDF )
Practical and Scalable Access Control Mechanism for the Internet of Things
Clémentine Gritti and Emanuel Regnath and Sebastian Steinhorst
2021/139 ( PDF )
Order-Fair Consensus in the Permissionless Setting
Mahimna Kelkar and Soubhik Deb and Sreeram Kannan
2021/138 ( PDF )
Classic McEliece Implementation with Low Memory Footprint
Johannes Roth and Evangelos Karatsiolis and Juliane Krämer
2021/137 ( PDF )
Cryptographic Security of the MLS RFC, Draft 11
Chris Brzuska and Eric Cornelissen and Konrad Kohbrok
2021/136 ( PDF )
An approach for designing fast public key encryption systems using white-box cryptography techniques
Dmitry Schelkunov
2021/135 ( PDF )
Acyclicity Programming for Sigma-Protocols
Masayuki Abe and Miguel Ambrona and Andrej Bogdanov and Miyako Ohkubo and Alon Rosen
2021/134 ( PDF )
Cryptanalysis of a code-based signature scheme without trapdoors
Marco Baldi and Jean-Christophe Deneuville and Edoardo Persichetti and Paolo Santini
2021/133 ( PDF )
smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
Ravital Solomon and Ghada Almashaqbeh
2021/132 ( PDF )
Privacy-Preserving Feature Selection with Secure Multiparty Computation
Xiling Li and Rafael Dowsley and Martine De Cock
2021/131 ( PDF )
Privacy-Preserving Video Classification with Convolutional Neural Networks
Sikha Pentyala and Rafael Dowsley and Martine De Cock
2021/130 ( PDF )
Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves
Bei Wang; Songsong Li; Yi Ouyang; Honggang Hu
2021/129 ( PDF )
Lattice-based weak curve fault attack on ECDSA
Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Wei
2021/128 ( PDF )
Designing Tweakable Enciphering Schemes Using Public Permutations
Debrup Chakraborty and Avijit Dutta and Samir Kundu
2021/127 ( PDF )
Cuproof: A Novel Range Proof with Constant Size
Cong Deng and Xianghong Tang and Lin You and Gengran Hu and Shuhong Gao
2021/126 ( PDF )
Observability attack on stream generators
Ramachandran Anantharaman and Virendra Sule
2021/125 ( PDF )
Privacy Preserving and Resilient RPKI
Kris Shrishak and Haya Shulman
2021/124 ( PDF )
Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption
Ozgun Ozerk and Can Elgezen and Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2021/123 ( PDF )
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
Yue Qin and Chi Cheng and Xiaohan Zhang and Yanbin Pan and Lei Hu and Jintai Ding
2021/122 ( PDF )
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
Aner Ben Efraim and Olga Nissenbaum and Eran Omri and Anat Paskin-Cherniavsky
2021/121 ( PDF )
BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits
Yaron Gvili and Sarah Scheffler and Mayank Varia
2021/120 ( PDF )
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits
Aner Ben-Efraim and Kelong Cong and Eran Omri and Emmanuela Orsini and Nigel P. Smart and Eduardo Soria-Vazquez
2021/119 ( PDF )
Rabbit: Efficient Comparison for Secure Multi-Party Computation
Eleftheria Makri and Dragos Rotaru and Frederik Vercauteren and Sameer Wagh
2021/118 ( PDF )
High-Threshold AVSS with Optimal Communication Complexity
Nicolas Alhaddad and Mayank Varia and Haibin Zhang
2021/117 ( PDF )
FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin
Arash Mirzaei and Amin Sakzad and Jiangshan Yu and Ron Steinfeld
2021/116 ( PDF )
MAKE: a Matrix Action Key Exchange
Nael Rahman and Vladimir Shpilrain
2021/115 ( PDF )
Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4
Mila Anastasova and Reza Azarderakhsh and Mehran Mozaffari Kermani
2021/114 ( PDF )
Security Analysis of CPace
Michel Abdalla and Björn Haase and Julia Hesse
2021/113 ( PDF )
Improvement of Secure Multi-Party Multiplication of (k,n) Threshold Secret Sharing Using Only N=k Servers (Revised Version)
Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura
2021/112 ( -- withdrawn -- )
Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange
Majid Salimi and Hamid Mala and Honorio Martin and Pedro Peris-Lopez
2021/111 ( PDF )
A note on Post Quantum Onion Routing
Kelesidis Evgnosia-Alexandra
2021/110 ( PDF )
Replacing Probability Distributions in Security Games via Hellinger Distance
Kenji Yasunaga
2021/109 ( PDF )
Sequential Logic Encryption Against Model Checking Attack
Amin Rezaei and Hai Zhou
2021/108 ( PDF )
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs
Sara Ricci and Lukas Malina and Petr Jedlicka and David Smekal and Jan Hajny and Petr Cibik and Patrik Dobias
2021/107 ( PDF )
A Decentralized and Encrypted National Gun Registry
Seny Kamara and Tarik Moataz and Andrew Park and Lucy Qin
2021/106 ( PDF )
MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers
Aram Jivanyan and Jesse Lancaster and Arash Afshar and Parnian Alimi
2021/105 ( PDF )
A New Efficient Identity-Based Encryption Without Pairing
Majid Salimi
2021/104 ( PDF )
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography
Shivam Bhasin and Jan-Pieter D'Anvers and Daniel Heinz and Thomas Pöppelmann and Michiel Van Beirendonck
2021/103 ( PDF )
RUP Security of the SAEF Authenticated Encryption mode
Elena Andreeva and Amit Singh Bhati and Damian Vizar
2021/102 ( PDF )
A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization
Madalina Chirita and Alexandru-Mihai Stroie and Andrei-Daniel Safta and Emil Simion
2021/101 ( PDF )
Combined Fault and DPA Protection for Lattice-Based Cryptography
Daniel Heinz and Thomas Pöppelmann
2021/100 ( PDF )
SPURT: Scalable Distributed Randomness Beacon with Transparent Setup
Sourav Das and Vinith Krishnan and Irene Miriam Isaac and Ling Ren
2021/099 ( PDF )
Property Inference from Poisoning
Melissa Chase and Esha Ghosh and Saeed Mahloujifar
2021/098 ( PDF )
Image sets of perfectly nonlinear maps
Lukas Kölsch and Björn Kriepke and Gohar Kyureghyan
2021/097 ( PDF )
A New and Improved Reduction Proof of Cascade PRF
Mridul Nandi
2021/096 ( PDF )
Gladius: LWR based efficient hybrid public key encryption with distributed decryption
Kelong Cong and Daniele Cozzo and Varun Maram and Nigel P. Smart
2021/095 ( PDF )
Collusion-Deterrent Threshold Information Escrow
Easwar Vivek Mangipudi and Donghang Lu and Alexandros Psomas and Aniket Kate
2021/094 ( PDF )
Reducing HSM Reliance in Payments through Proxy Re-Encryption
Sivanarayana Gaddam and Atul Luykx and Rohit Sinha and Gaven Watson
2021/093 ( PDF )
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks
Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
2021/092 ( PDF )
New Public Key Cryptosystem (First Version)
Dieaa I. Nassr and M. Anwar and Hatem M. Bahig
2021/091 ( PDF )
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks
Ilaria Chillotti and Marc Joye and Pascal Paillier
2021/090 ( PDF )
A New Twofold Cornacchia-Type Algorithm and Its Applications
Bei Wang; Yi Ouyang; Honggang Hu ; Songsong Li
2021/089 ( PDF )
Fuzzy Message Detection
Gabrielle Beck and Julia Len and Ian Miers and Matthew Green
2021/088 ( PDF )
An Overview of the Hybrid Argument
Marc Fischlin and Arno Mittelbach
2021/087 ( PDF )
ZEN: An Optimizing Compiler for Verifiable, Zero-Knowledge Neural Network Inferences
Boyuan Feng and Lianke Qin and Zhenfei Zhang and Yufei Ding and Shumo Chu
2021/086 ( PDF )
On Elapsed Time Consensus Protocols
Mic Bowman and Debajyoti Das and Avradip Mandal and Hart Montgomery
2021/085 ( PDF )
Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves
Suhri Kim
2021/084 ( PDF )
Ariadne Thread and Pepper: New Multivariate Cryptographic Schemes with Public Keys in Degree 3
Gilles Macario-Rat and Jacques Patarin
2021/083 ( PDF )
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol
Michael Troncoso and Britta Hale
2021/082 ( PDF )
Grades of Trust in Multiparty Computation
Jaskaran V. Singh and Nicholas Hopper
2021/081 ( PDF )
Private Stream Aggregation from Labeled Secret Sharing Schemes
Hendrik Waldner and Tilen Marc and Miha Stopar and Michel Abdalla
2021/080 ( PDF )
Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption
Jan-Pieter D'Anvers and Emmanuela Orsini and Frederik Vercauteren
2021/079 ( PDF )
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM
Kalle Ngo and Elena Dubrova and Qian Guo and Thomas Johansson
2021/078 ( PDF )
An Incentive-Compatible Smart Contract for Decentralized Commerce
Nikolaj I. Schwartzbach
2021/077 ( PDF )
Magnetic RSA
Rémi Géraud-Stewart and David Naccache
2021/076 ( PDF )
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field
Kang Yang and Pratik Sarkar and Chenkai Weng and Xiao Wang
2021/075 ( PDF )
A Generalization of the Subfield Construction
Kamil Otal
2021/074 ( PDF )
Cross-Domain Attribute-Based Access Control Encryption
Mahdi Sedaghat and Bart Preneel
2021/073 ( PDF )
Application of Velusqrt algorithm to Huff's and general Huff's curves
Michał Wroński
2021/072 ( PDF )
Toward Practical Autoencoder-based Side-Channel Analysis Evaluations
Servio Paguada and Lejla Batina and Igor Armendariz
2021/071 ( PDF )
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis
Jorai Rijsdijk and Lichao Wu and Guilherme Perin and Stjepan Picek
2021/070 ( PDF )
Secure, Accurate, and Practical Narrow-Band Ranging System
Aysajan Abidin and Mohieddine El Soussi and Jac Romme and Pepijn Boer and Dave Singelée and Christian Bachmann
2021/069 ( PDF )
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation
Amanda Resende and Davis Railsback and Rafael Dowsley and Anderson C. A. Nascimento and Diego F. Aranha
2021/068 ( PDF )
Banquet: Short and Fast Signatures from AES
Carsten Baum and Cyprien Delpech de Saint Guilhem and Daniel Kales and Emmanuela Orsini and Peter Scholl and Greg Zaverucha
2021/067 ( PDF )
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Michiel Van Beirendonck and Jan-Pieter D’Anvers and Ingrid Verbauwhede
2021/066 ( PDF )
A Deep Learning Approach for Active S-box Prediction of Lightweight Generalized Feistel Block Ciphers
Mohamed Fadl Idris and Je Sen Teh and Jasy Liew Suet Yan and Wei-Zhu Yeoh
2021/065 ( PDF )
FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves
Dorin-Marian Ionita and Emil Simion
2021/064 ( PDF )
Fault Attacks on CCA-secure Lattice KEMs
Peter Pessl and Lukas Prokop
2021/063 ( PDF )
CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing
Monir Azraoui and Solenn Brunet and Sébastien Canard and Aïda Diop and Lélia Eveillard and Alicia Filipiak and Adel Hamdi and Flavie Misarsky and Donald Nokam Kuate and Marie Paindavoine and Quentin Santos and Bastien Vialla
2021/062 ( PDF )
Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3)
Dominique Unruh
2021/061 ( PDF )
A Note on IBE Performance of a Practical Application
Ştefan Maftei and Marius Supuran and Emil Simion
2021/060 ( PDF )
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts
Ran Canetti and Rosario Gennaro and Steven Goldfeder and Nikolaos Makriyannis and Udi Peled
2021/059 ( PDF )
The Cost of Adaptivity in Security Games on Graphs
Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter
2021/058 ( PDF )
A Performance Study of Crypto-Hardware in the Low-end IoT
Peter Kietzmann and Lena Boeckmann and Leandro Lanzieri and Thomas C. Schmidt and Matthias Wählisch
2021/057 ( PDF )
Correlation Intractability vs. One-wayness
Tamer Mour
2021/056 ( PDF )
The Study of Modulo $2^n$
Zhongfeng Niu
2021/055 ( PDF )
Tech Report: Inerial HSMs Thwart Advanced Physical Attacks
Jan Sebastian Götte and Björn Scheuermann
2021/054 ( PDF )
The Cost of IEEE Arithmetic in Secure Computation
David W. Archer and Shahla Atapoor and Nigel P. Smart
2021/053 ( PDF )
On Algebraic Embedding for Unstructured Lattices
Madalina Bolboceanu and Zvika Brakerski and Devika Sharma
2021/052 ( PDF )
Elementary Attestation of Cryptographically Useful Composite Moduli
Rémi Géraud-Stewart and David Naccache
2021/051 ( PDF )
How Much can F5 Really Do
Jintai Ding and Zheng Zhang and Joshua Deaton
2021/050 ( PDF )
The Distinguishing Attack on HFE
Joshua Deaton and Jintai Ding
2021/049 ( PDF )
ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process
Mark D. Aagaard and Nusa Zidaric
2021/048 ( PDF )
Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution
Sohyun Jeon and Hyang-Sook Lee and Jeongeun Park
2021/047 ( PDF )
Evolution of Bulletin Board & its application to E-Voting – A Survey
Misni Harjo Suwito and Yoshifumi Ueshige and Kouichi Sakurai
2021/046 ( PDF )
Efficient Lattice-Based Inner-Product Functional Encryption
Jose Maria Bermudo Mera and Angshuman Karmakar and Tilen Marc and Azam Soleimanian
2021/045 ( PDF )
Banners: Binarized Neural Networks with Replicated Secret Sharing
Alberto Ibarrondo and Hervé Chabanne and Melek Önen
2021/044 ( PDF )
Addra: Metadata-private voice communication over fully untrusted infrastructure
Ishtiyaque Ahmad and Yuntian Yang and Divyakant Agrawal and Amr El Abbadi and Trinabh Gupta
2021/043 ( PDF )
Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields
Madhurima Mukhopadhyay and Palash Sarkar
2021/042 ( PDF )
Correcting Subverted Random Oracles
Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou and Jiadong Zhu
2021/041 ( PDF )
Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot
Panos Kampanakis and Peter Panburana and Michael Curcio and Chirag Shroff and Md Mahbub Alam
2021/040 ( PDF )
On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product
Any Muanalifah and Serge˘ı Sergeev
2021/039 ( PDF )
Practical FHE parameters against lattice attacks
Jung Hee Cheon and Yongha Son and Donggeon Yhee
2021/038 ( PDF )
Streaming Merkle Proofs within Binary Numeral Trees
Luke Champine
2021/037 ( PDF )
New First-Order Secure AES Performance Records
Aein Rezaei Shahmirzadi and Dušan Božilov and Amir Moradi
2021/036 ( PDF )
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
Niluka Amarasinghe and Xavier Boyen and Matthew McKague
2021/035 ( PDF )
Sketches for Blockchains
Ori Rottenstreich
2021/034 ( PDF )
Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF
Nishanth Chandran and Divya Gupta and Akash Shah
2021/033 ( PDF )
Quantum-resistant Anonymous IBE with Traceable Identities
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo and Yu-Chi Chen
2021/032 ( PDF )
Experimental relativistic zero-knowledge proofs
Pouriya Alikhani and Nicolas Brunner and Claude Crépeau and Sébastien Designolle and Raphaël Houlmann and Weixu Shi and Hugo Zbinden
2021/031 ( PDF )
A Comparative Study of Cryptographic Key Distribution Protocols
Alexandru-Ștefan Gheorghieș and Darius-Marian Lăzăroi and Emil Simion
2021/030 ( PDF )
Linear-time and post-quantum zero-knowledge SNARKs for R1CS
Jonathan Lee and Srinath Setty and Justin Thaler and Riad Wahby
2021/029 ( PDF )
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs
Thomas Schneider and Oleksandr Tkachenko
2021/028 ( PDF )
A Side Journey to Titan
Victor LOMNE and Thomas ROCHE
2021/027 ( PDF )
E-voting protocols in context of COVID19
Sfirnaciuc Emilia and Vasilescu Miruna-Elena and Simion Emil
2021/026 ( PDF )
A Gapless Code-Based Hash Proof System based on RQC and its Applications
Slim Bettaieb and Loïc Bidoux and Olivier Blazy and Yann Connan and Philippe Gaborit
2021/025 ( PDF )
FLGUARD: Secure and Private Federated Learning
Thien Duc Nguyen and Phillip Rieger and Hossein Yalame and Helen Möllering and Hossein Fereidooni and Samuel Marchal and Markus Miettinen and Azalia Mirhoseini and Ahmad-Reza Sadeghi and Thomas Schneider and Shaza Zeitouni
2021/024 ( PDF )
PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System
Pedro Hecht
2021/023 ( PDF )
What is Meant by Permissionless Blockchains?
Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Andreas Kern and Walid Fdhila
2021/022 ( PDF )
Increasing Precision of Division Property
Patrick Derbez and Pierre-Alain Fouque
2021/021 ( PDF )
Fake Near Collisions Attacks
Patrick Derbez and Pierre-Alain Fouque and Victor Mollimard
2021/020 ( PDF )
Catching the Fastest Boomerangs - Application to SKINNY
Stéphanie Delaune and Patrick Derbez and Mathieu Vavrille
2021/019 ( PDF )
Kummer versus Montgomery Face-off over Prime Order Fields
Kaushik Nath and Palash Sarkar
2021/018 ( PDF )
Comments on ``On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment''
Yuhao Yang and Xiujie Huang
2021/017 ( PDF )
Lightweight Techniques for Private Heavy Hitters
Dan Boneh and Elette Boyle and Henry Corrigan-Gibbs and Niv Gilboa and Yuval Ishai
2021/016 ( PDF )
Black-Box Uselessness: Composing Separations in Cryptography
Geoffroy Couteau and Pooya Farshim and Mohammad Mahmoody
2021/015 ( PDF )
SoK: Remote Power Analysis
Macarena C. Martínez-Rodríguez and Ignacio M. Delgado-Lozano and Billy Bob Brumley
2021/014 ( -- withdrawn -- )
Efficient Multilinear Map from Graded Encoding Scheme
Majid Salimi
2021/013 ( PDF )
An atlas of the Richelot isogeny graph
Enric Florit and Benjamin Smith
2021/012 ( PDF )
Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph
Enric Florit and Benjamin Smith
2021/011 ( PDF )
Complete solution over $\GF{p^n}$ of the equation $X^{p^k+1}+X+a=0$
Kwang Ho Kim and Jong Hyok Choe and Sihem Mesnager
2021/010 ( PDF )
Compcrypt -- Lightweight ANS-based Compression and Encryption
Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk
2021/009 ( PDF )
Demand-aware Channel Topologies for Off-chain Blockchain Payments
Julia Khamis and Ori Rottenstreich
2021/008 ( PDF )
A Family of Nonlinear MDS Diffusion Layers over $\mathbb{F}_{2^{4n}}$
M. R. Mirzaee Shamsabad and S. M. Dehnavi
2021/007 ( PDF )
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Cheng-Yi Lee
2021/006 ( PDF )
Privacy-Preserving Privacy Profile Proposal Protocol
Wyatt Howe and Andrei Lapets
2021/005 ( PDF )
Aggregatable Distributed Key Generation
Kobi Gurkan and Philipp Jovanovic and Mary Maller and Sarah Meiklejohn and Gilad Stern and Alin Tomescu
2021/004 ( PDF )
LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions
Ismail San
2021/003 ( PDF )
Ciphertext Policy Attribute Based Encryption for Arithmetic circuits
Mahdi Mahdavi Oliaee and Zahra Ahmadian
2021/002 ( PDF )
Can Lattice Signature be as Efficient as Lattice Encryption?
Dingfeng Ye
2021/001 ( PDF )
2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product
Michel Abdalla and David Pointcheval and Azam Soleimanian
2020/1620 ( PDF )
Neural Aided Statistical Attack for Cryptanalysis
Yi Chen and Yantian Shen and Hongbo Yu and Sitong Yuan
2020/1619 ( PDF )
Getting Rid of Linear Algebra in Number Theory Problems
Paul Kirchner and Pierre-Alain Fouque
2020/1618 ( PDF )
Proof-Carrying Data without Succinct Arguments
Benedikt Bünz and Alessandro Chiesa and William Lin and Pratyush Mishra and Nicholas Spooner
2020/1617 ( PDF )
Arguments of Knowledge via hidden order groups
Steve Thakur
2020/1616 ( PDF )
Algebraic Geometric Secret Sharing Schemes over Large Fields Are Asymptotically Threshold
Fan Peng and Hao Chen and Chang-An Zhao
2020/1615 ( PDF )
An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations
Jiangtao Yuan and and Guoai Xu and Guosheng Xu
2020/1614 ( PDF )
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies
Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gaži and Sarah Meiklejohn and Edgar Weippl
2020/1613 ( PDF )
Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures
Sri Aravinda Krishnan Thyagarajan and Giulio Malavolta
2020/1612 ( PDF )
A New Efficient Hierarchical Multi-secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations
Jiangtao Yuan and Jing Yang and Guoai Xu and Xingxing Jia and Fang-wei Fu and Chenyu Wang
2020/1611 ( PDF )
SLAP: Simple Lattice-Based Private Stream Aggregation Protocol
Jonathan Takeshita and Ryan Karl and Ting Gong and Taeho Jung
2020/1610 ( PDF )
New directions in the ransomware phenomenon
Mihai-Andrei Costandache and Marian-Stefan Mihalache and Emil Simion
2020/1609 ( PDF )
A new method for secondary constructions of vectorial bent functions
Amar Bapić and Enes Pasalic
2020/1608 ( PDF )
Cryptographic competitions
Daniel J. Bernstein
2020/1607 ( PDF )
Manta: Privacy Preserving Decentralized Exchange
Shumo Chu and Qiudong Xia and Zhenfei Zhang
2020/1606 ( PDF )
PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption
Wen-jie Lu and Zhicong Huang and Cheng Hong and Yiping Ma and Hunter Qu
2020/1605 ( PDF )
$P_4$-free Partition and Cover Numbers and Application
Alexander R. Block and Simina Branzei and Hemanta K. Maji and Himanshi Mehta and Tamalika Mukherjee and Hai H. Nguyen
2020/1604 ( PDF )
An Embedded Domain-Specific Language for Logical Circuit Descriptions with Applications to Garbled Circuits
Andrei Lapets and Wyatt Howe and Ben Getchell and Frederick Jansen
2020/1603 ( PDF )
One-Time Delegation of Unlinkable Signing Rights and Its Application
Takashi Nishide
2020/1602 ( PDF )
Speeding-up Ideal Lattice-Based Key Exchange Using a RSA/ECC Coprocessor
Aurélien Greuet and Simon Montoya and Guénaël Renault
2020/1601 ( PDF )
Adaptive layer-two dispute periods in blockchains
Rami Khalil and Naranker Dulay
2020/1600 ( PDF )
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis
Unai Rioja and Lejla Batina and Jose Luis Flores and Igor Armendariz
2020/1599 ( PDF )
Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing
Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky and Mohamed Elsabagh and Nikolaos Kiourtis and Brian Schulte and Angelos Stavrou
2020/1598 ( PDF )
MILP Based Differential Attack on Round Reduced WARP
Manoj Kumar and Tarun Yadav
2020/1597 ( PDF )
A New Improved AES S-box With Enhanced Properties
Abderrahmane Nitaj and Willy Susilo and Joseph Tonien
2020/1596 ( PDF )
Batched Differentially Private Information Retrieval
Kinan Dak Albab and Rawane Issa and Mayank Varia and Kalman Graffi
2020/1595 ( PDF )
Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting
Tingting Guo and Peng Wang and Lei Hu and Dingfeng Ye
2020/1594 ( PDF )
Bootstrapping on SEAL
HyungChul Kang and Joon-Woo Lee and Yongwoo Lee and Young-Sik Kim and Jong-Seon No
2020/1593 ( PDF )
Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies
Edward Eaton and David Jao and Chelsea Komlo and Youcef Mokrani
2020/1592 ( PDF )
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time
Elaine Shi and Waqar Aqeel and Balakrishnan Chandrasekaran and Bruce Maggs
2020/1591 ( PDF )
Game-Theoretic Fairness Meets Multi-Party Protocols: The Case of Leader Election
Kai-Min Chung and T-H. Hubert Chan and Ting Wen and Elaine Shi (random author ordering)
2020/1590 ( PDF )
RandPiper -- Reconfiguration-Friendly Random Beacons with Quadratic Communication
Adithya Bhat and Nibesh Shrestha and Aniket Kate and Kartik Nayak
2020/1589 ( PDF )
Unifying Presampling via Concentration Bounds
Siyao Guo and Qian Li and Qipeng Liu and Jiapeng Zhang
2020/1588 ( PDF )
Deniable Fully Homomorphic Encryption from LWE
Shweta Agrawal and Shafi Goldwasser and Saleet Mossel
2020/1587 ( PDF )
On the properties of the Boolean functions associated to the differential spectrum of general APN functions and their consequences
Claude Carlet
2020/1586 ( PDF )
Unifying Compilers for SNARKs, SMT, and More
Alex Ozdemir and Fraser Brown and Riad S. Wahby
2020/1585 ( PDF )
Semi-Regularity of Pairs of Boolean Polynomials
Timothy J. Hodges and Hari R. Iyer
2020/1584 ( PDF )
Post-Quantum Hash-Based Signatures for Secure Boot
Panos Kampanakis and Peter Panburana and Michael Curcio and Chirag Shroff
2020/1583 ( PDF )
HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System
Iraklis Symeonidis and Dragos Rotaru and Mustafa A. Mustafa and Bart Mennink and Bart Preneel and Panos Papadimitratos
2020/1582 ( PDF )
A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application
Hangi Kim and Yongjin Jeon and Giyoon Kim and Jongsung Kim and Bo-Yeon Sim and Dong-Guk Han and Hwajeong Seo and Seonggyeom Kim and Seokhie Hong and Jaechul Sung and Deukjo Hong
2020/1581 ( PDF )
Remark on the Security of CKKS Scheme in Practice
Jung Hee Cheon and Seungwan Hong and Duhyeong Kim
2020/1580 ( PDF )
Achieving State Machine Replication without Honest Players
Conor McMenamin and Vanesa Daza and Matteo Pontecorvi
2020/1579 ( PDF )
Efficient Verifiable Image Redacting based on zk-SNARKs
Hankyung Ko and Ingeun Lee and Seunghwa Lee and Jihye Kim and Hyunok Oh
2020/1578 ( PDF )
An IND-CCA2 Attack Against the 1st- and 2nd-round Versions of NTS-KEM
Tung Chou
2020/1577 ( PDF )
Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning
Alessandro Baccarini and Marina Blanton and Chen Yuan
2020/1576 ( PDF )
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free
Changhui Hu and Jin Li and Zheli Liu and Xiaojie Guo and Yu Wei and Xuan Guang and Grigorios Loukides and Changyu Dong
2020/1575 ( PDF )
(In)security of the Radio Interface in Sigfox
Loïc Ferreira
2020/1574 ( PDF )
Analysing Mining Machine Shutdown Price
Shange Fu and Jiangshan Yu and Rafael Dowsley and Joseph Liu
2020/1573 ( PDF )
Halo 0.9: A Halo Protocol with Fully-Succinctness
Lira Wang
2020/1572 ( -- withdrawn -- )
Achieve Fully Decentralized End to End encryption meeting via Blockchain
Yang Tan
2020/1571 ( PDF )
Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server
Olivier Blazy and Laura Brouilhet and Celine Chevalier and Patrick Towa and Ida Tucker and Damien Vergnaud
2020/1570 ( PDF )
Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary
Onur Gunlu and Rafael F. Schaefer
2020/1569 ( PDF )
Optimal Communication Complexity of Authenticated Byzantine Agreement
Atsuki Momose and Ling Ren
2020/1568 ( PDF )
Compact Certificates of Collective Knowledge
Silvio Micali and Leonid Reyzin and Georgios Vlachos and Riad S. Wahby and Nickolai Zeldovich
2020/1567 ( PDF )
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid
Yadi Ye and Leyou Zhang and Yi Mu and Wenting You
2020/1566 ( PDF )
An efficient and provably secure authenticated key agreement scheme for mobile edge computing
Mohammad Amin Rakeei and Farokhlagha Moazami
2020/1565 ( PDF )
Achieving privacy and accountability in traceable digital currency
Amira Barki and Aline Gouget
2020/1564 ( PDF )
Prime Proof Protocol
Anna M. Johnston and Rathna Ramesh
2020/1563 ( PDF )
Verifiable Timed Signatures Made Practical
Sri Aravinda KrishnanThyagarajan and Adithya Bhat and Giulio Malavolta and Nico Döttling and Aniket Kate and Dominique Schröder
2020/1562 ( PDF )
A complete study of two classes of Boolean functions for homomorphic-friendly stream ciphers
Claude Carlet and Pierrick Méaux
2020/1561 ( PDF )
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Online Fault Tolerance
Ryan Karl and Jonathan Takeshita and Taeho Jung
2020/1560 ( PDF )
Modified Cache Template Attack on AES
Mahdi Esfahani and Hadi Soleimany and Mohammad Reza Aref
2020/1559 ( PDF )
On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks
Prasanna Ravi and Shivam Bhasin and Sujoy Sinha Roy and Anupam Chattopadhyay
2020/1558 ( PDF )
Double-Odd Elliptic Curves
Thomas Pornin
2020/1557 ( PDF )
Efficient Quantum Public-Key Encryption From Learning With Errors
Javad Doliskani
2020/1556 ( PDF )
Honest Majority MPC with Abort with Minimal Online Communication
Daniel Escudero and Anders Dalskov
2020/1555 ( PDF )
Limits on the Efficiency of (Ring) LWE based Non-Interactive Key Exchange
Siyao Guo and Pritish Kamath and Alon Rosen and Katerina Sotiraki
2020/1554 ( PDF )
DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel
Xiaolu Hou and Jakub Breier and Shivam Bhasin
2020/1553 ( PDF )
A Novel Asymmetric Searchable Encryption Scheme with Granting search capability
Arian Arabnouri and Reza Ebrahimi Atani and Shiva Azizzadeh
2020/1552 ( PDF )
Threshold Password-Hardened Encryption Services
Julian Brost and Christoph Egger and Russell W. F. Lai and Fritz Schmid and Dominique Schröder and Markus Zoppelt
2020/1551 ( PDF )
Multi-Client Oblivious RAM with Poly-Logarithmic Communication
Sherman S. M. Chow and Katharina Fech and Russell W. F. Lai and Giulio Malavolta
2020/1550 ( PDF )
Foundations of Ring Sampling
Viktoria Ronge and Christoph Egger and Russell W. F. Lai and Dominique Schröder and Hoover H. F. Yin
2020/1549 ( PDF )
High-Precision and Low-Complexity Approximate Homomorphic Encryption by Error Variance Minimization
Yongwoo Lee and Joonwoo Lee and Young-Sik Kim and HyungChul Kang and Jong-Seon No
2020/1548 ( PDF )
CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors
Valerio Cini and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks
2020/1547 ( PDF )
Two-server Distributed ORAM with Sublinear Computation and Constant Rounds
Ariel Hamlin and Mayank Varia
2020/1546 ( PDF )
PEM: Privacy-preserving Epidemiological Modeling
Daniel Günther and Marco Holz and Benjamin Judkewitz and Helen Möllering and Benny Pinkas and Thomas Schneider
2020/1545 ( PDF )
A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications
Howard M. Heys
2020/1544 ( PDF )
PAS-TA-U: PASsword-based Threshold Authentication with PASsword Update
Rachit Rawat and Mahabir Prasad Jhanwar
2020/1543 ( PDF )
CovidBloc: A Blockchain Powered Exposure Database for Contact Tracing
Deepraj Pandey and Nandini Agrawal and Mahabir Prasad Jhanwar
2020/1542 ( PDF )
Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version)
Anubhab Baksi and Shivam Bhasin and Jakub Breier and Anupam Chattopadhyay and Vinay B. Y. Kumar
2020/1541 ( PDF )
A Framework of Private Set Intersection Protocols.
Ziyuan Liang and Weiran Liu and Fan Zhang and Bingsheng Zhang and Jian Liu and Lei Zhang and Kui Ren
2020/1540 ( PDF )
On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem
Martin R. Albrecht and Nadia Heninger
2020/1539 ( PDF )
Information-Theoretic Security of Cryptographic Channels
Marc Fischlin and Felix Günther and Philipp Muth
2020/1538 ( PDF )
Homological Characterization of bounded $F_2$-regularity
Timothy J. Hodges and Sergio Molina
2020/1537 ( -- withdrawn -- )
Comments on “ Multi Recipient Aggregate Signcryption Scheme Based on Elliptic Curve”
Nizamud Din and Abdul Waheed and Nasir Saeed
2020/1536 ( PDF )
Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme
Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon
2020/1535 ( PDF )
Designer Primes
Anna M. Johnston
2020/1534 ( PDF )
Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition
SeongHyuck Lim and JongHyeok Lee and Dong-Guk Han
2020/1533 ( PDF )
On the Security of Homomorphic Encryption on Approximate Numbers
Baiyu Li and Daniele Micciancio
2020/1532 ( PDF )
Oblivious Pseudorandom Functions from Isogenies
Dan Boneh and Dmitry Kogan and Katharine Woo
2020/1531 ( PDF )
Reconstructing with Less: Leakage Abuse Attacks in Two-Dimensions
Evangelia Anna Markatou and Francesca Falzon and William Schor and Roberto Tamassia
2020/1530 ( PDF )
Security Analysis of Public Key Searchable Encryption Schemes against Injection Attacks
Arian Arabnouri and Reza Ebrahimi Atani and Shiva Azizzadeh
2020/1529 ( PDF )
Bounds on the nonlinearity of differentially uniform functions by means of their image set size, and on their distance to affine functions
Claude Carlet
2020/1528 ( PDF )
On the Concurrent Composition of Quantum Zero-Knowledge
Prabhanjan Ananth and Kai-Min Chung and Rolando L. La Placa
2020/1527 ( PDF )
Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier
Jonathan Bootle and Alessandro Chiesa and Siqi Liu
2020/1526 ( PDF )
Flexible and Efficient Verifiable Computation on Encrypted Data
Alexandre Bois and Ignacio Cascudo and Dario Fiore and Dongwoo Kim
2020/1525 ( PDF )
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Cas Cremers and Samed Düzlü and Rune Fiedler and Marc Fischlin and Christian Janson
2020/1524 ( PDF )
Nonce-Misuse Security of the SAEF Authenticated Encryption mode
Elena Andreeva and Amit Singh Bhati and Damian Vizar
2020/1523 ( PDF )
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting
Yaobin Shen; Lei Wang; Dawu Gu; Jian Weng
2020/1522 ( PDF )
Reducing Participation Costs via Incremental Verification for Ledger Systems
Weikeng Chen and Alessandro Chiesa and Emma Dauterman and Nicholas P. Ward
2020/1521 ( PDF )
Delegated RingCT: faster anonymous transactions
Rui Morais and Paul Crocker and Simao Melo de Sousa
2020/1520 ( PDF )
The SQALE of CSIDH: Square-root vélu Quantum-resistant isogeny Action with Low Exponents
Jorge Chávez-Saab and Jesús-Javier Chi-Domínguez and Samuel Jaques and Francisco Rodríguez-Henríquez
2020/1519 ( PDF )
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2
Sven Schäge and Jörg Schwenk and Sebastian Lauer
2020/1518 ( PDF )
Botnet IND: About Botnets of Botless IoT Devices
Ben Nassi and Yair Meidan and Dudi Nassi and Asaf Shabtai and Yuval Elovici
2020/1517 ( PDF )
Constructing Locally Leakage-resilient Linear Secret-sharing Schemes
Hemanta Maji and Anat Paskin-Cherniavsky and Tom Suad and Mingyuan Wang
2020/1516 ( PDF )
How to compute all Pointproofs
Alin Tomescu
2020/1515 ( PDF )
The classification of quadratic APN functions in 7 variables
Konstantin Kalgin and Valeriya Idrisova
2020/1514 ( PDF )
Improved privacy-preserving training using fixed-Hessian minimisation
Tabitha Ogilvie and Rachel Player and Joe Rowell
2020/1513 ( PDF )
Indifferentiable hashing from Elligator 2
Mike Hamburg
2020/1512 ( PDF )
Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking
Jan Pennekamp and Patrick Sapel and Ina Berenice Fink and Simon Wagner and Sebastian Reuter and Christian Hopmann and Klaus Wehrle and Martin Henze
2020/1511 ( PDF )
Balancing Privacy and Accountability in Blockchain Identity Management
Ivan Damgård and Chaya Ganesh and Hamidreza Khoshakhlagh and Claudio Orlandi and Luisa Siniscalchi
2020/1510 ( PDF )
Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP
Jun Yan
2020/1509 ( PDF )
Single-Message Credential-Hiding Login
Kevin Lewi and Payman Mohassel and Arnab Roy
2020/1508 ( PDF )
A Combinatorial Approach to Quantum Random Functions
Nico Döttling and Giulio Malavolta and Sihang Pu
2020/1507 ( PDF )
Improvements to RSA key generation and CRT on embedded devices
Mike Hamburg and Mike Tunstall and Qinglai Xiao
2020/1506 ( PDF )
Recovering cryptographic keys from partial information, by example
Gabrielle De Micheli and Nadia Heninger
2020/1505 ( PDF )
Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model
Mariusz Jurkiewicz
2020/1504 ( PDF )
The Age of Testifying Wearable Devices: The Case of Intoxication Detection
Ben Nassi and Lior Rokach and Yuval Elovici
2020/1503 ( PDF )
Recovery Attack on Bob's Secrets in CRYSTALS-KYBER and SABER
Satoshi Okada and Yuntao Wang
2020/1502 ( PDF )
Witness Encryption from Garbled Circuit and Multikey Fully Homomorphic Encryption Techniques
Kamil Kluczniak
2020/1501 ( PDF )
PANCAKE: Frequency Smoothing for Encrypted Data Stores
Paul Grubbs and Anurag Khandelwal and Marie-Sarah Lacharité and Lloyd Brown and Lucy Li and Rachit Agarwal and Thomas Ristenpart
2020/1500 ( PDF )
Oblivious Transfer is in MiniQCrypt
Alex B. Grilo and Huijia Lin and Fang Song and Vinod Vaikuntanathan
2020/1499 ( PDF )
Analysing the HPKE Standard
Joël Alwen and Bruno Blanchet and Eduard Hauck and Eike Kiltz and Benjamin Lipp and Doreen Riepel
2020/1498 ( PDF )
EPID with Malicious Revocation
Olivier Sanders and Jacques Traoré
2020/1497 ( PDF )
A note on the calculation of some functions in finite fields: Tricks of the Trade
Michael Scott
2020/1496 ( PDF )
Pseudo-Free Families and Cryptographic Primitives
Mikhail Anokhin
2020/1495 ( PDF )
CloudMoles: Surveillance of Power-Wasting Activities by Infiltrating Undercover Sensors
Seyedeh Sharareh Mirzargar and Andrea Guerrieri and Mirjana Stojilović
2020/1494 ( PDF )
Nonintrusive and Adaptive Monitoring for Locating Voltage Attacks in Virtualized FPGAs
Seyedeh Sharareh Mirzargar and Gaiëtan Renault and Andrea Guerrieri and Mirjana Stojilović
2020/1493 ( PDF )
Verified fast formulas for control bits for permutation networks
Daniel J. Bernstein
2020/1492 ( PDF )
Automated ciphertext-only attack on the Wheatstone Cryptograph and related devices
Thomas Kaeding
2020/1491 ( PDF )
Partitioning Oracle Attacks
Julia Len and Paul Grubbs and Thomas Ristenpart
2020/1490 ( PDF )
Unlinkable and Invisible γ-Sanitizable Signatures
Angèle Bossuat and Xavier Bultel
2020/1489 ( PDF )
On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger
Christian Badertscher and Julia Hesse and Vassilis Zikas
2020/1488 ( PDF )
General Properties of Quantum Bit Commitments
Jun Yan
2020/1487 ( PDF )
One-Way Functions Imply Secure Computation in a Quantum World
James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma
2020/1486 ( PDF )
CommiTEE: An Efficient and Secure Commit-Chain Protocol using TEEs
Andreas Erwig and Sebastian Faust and Siavash Riahi and Tobias Stöckert
2020/1485 ( PDF )
Quantum Search for Lightweight Block Ciphers: GIFT, SKINNY, SATURNIN
Subodh Bijwe and Amit Kumar Chauhan and Somitra Kumar Sanadhya
2020/1484 ( PDF )
Cryptanalysis of Aggregate $\Gamma$-Signature and Practical Countermeasures in Application to Bitcoin
Goichiro Hanaoka and Kazuo Ohta and Yusuke Sakai and Bagus Santoso and Kaoru Takemure and Yunlei Zhao
2020/1483 ( PDF )
A Low-Depth Homomorphic Circuit for Logistic Regression Model Training
Eric Crockett
2020/1482 ( PDF )
Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber
Andrea Basso and Sujoy Sinha Roy
2020/1481 ( PDF )
Design and implementation of HElib: a homomorphic encryption library
Shai Halevi and Victor Shoup
2020/1480 ( PDF )
Malicious Security Comes for Free in Consensus with Leaders
Mark Abspoel and Thomas Attema and Matthieu Rambaud
2020/1479 ( PDF )
Automatic Privacy-Preserving Contact Tracing of Novel Coronavirus Infection by Cloud-Enabled WBAN using Blockchain
Anupam Pattanayak and Subhasish Dhal and Sourav Kanti Addya
2020/1478 ( PDF )
Robust Subgroup Multi-Signatures for Consensus
David Galindo and Jia Liu
2020/1477 ( PDF )
Machine-checking the universal verifiability of ElectionGuard
Thomas Haines and Rajeev Gore and Jack Stodart
2020/1476 ( PDF )
Carbon Trading with Blockchain
Andreas Richardson and Jiahua Xu
2020/1475 ( PDF )
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
Kwangsu Lee
2020/1474 ( PDF )
New method of verifying cryptographic protocols based on the process model
A. M. Mironov
2020/1473 ( PDF )
Lighthouses: A Warning System for Super-Spreader Events
Leonie Reichert and Samuel Brack and Björn Scheuermann
2020/1472 ( PDF )
Enhancing Code Based Zero-knowledge Proofs using Rank Metric
Emanuele Bellini and Philippe Gaborit and Alexandros Hasikos and Victor Mateu
2020/1471 ( PDF )
On The Round Complexity of Secure Quantum Computation
James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma
2020/1470 ( PDF )
TaiJi: Longest Chain Availability with BFT Fast Confirmation
Songze Li and David Tse
2020/1469 ( PDF )
Succinct Blind Quantum Computation Using a Random Oracle
Jiayu Zhang
2020/1468 ( PDF )
Secure Cloud Auditing with Efficient Ownership Transfer (Full Version)
Jun Shen and Fuchun Guo and Xiaofeng Chen and Willy Susilo
2020/1467 ( PDF )
Making the BKW Algorithm Practical for LWE
Alessandro Budroni and Qian Guo and Thomas Johansson and Erik Mårtensson and Paul Stankovski Wagner
2020/1466 ( PDF )
Load Balancing for Sharded Blockchains
Naoya Okanami and Ryuya Nakamura and Takashi Nishide
2020/1465 ( PDF )
Cryptanalysis of an Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network
Mohammad Amin Rakeei and Farokhlagha Moazami
2020/1464 ( PDF )
Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort
Bar Alon and Hao Chung and Kai-Min Chung and Mi-Ying Huang and Yi Lee and Yu-Ching Shen
2020/1463 ( PDF )
Observations on the Tightness of the Security Bounds of GIFT-COFB and HyENA
Mustafa Khairallah
2020/1462 ( PDF )
Ovid: Message-based Automatic Contact Tracing
Leonie Reichert and Samuel Brack and Björn Scheuermann
2020/1461 ( PDF )
Lower bounds for the depth of modular squaring
Benjamin Wesolowski and Ryan Williams
2020/1460 ( PDF )
The MAGIC Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction
Michael Kounavis and David Durham and Sergej Deutsch and Krystian Matusiewicz and David Wheeler
2020/1459 ( PDF )
Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates
Mustafa Khairallah and Thomas Peyrin and Anupam Chattopadhyay
2020/1458 ( PDF )
Analysis of Ascon, DryGASCON, and Shamash Permutations
Cihangir Tezcan
2020/1457 ( PDF )
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3
Patrick Longa and Wen Wang and Jakub Szefer
2020/1456 ( PDF )
How to Abuse and Fix Authenticated Encryption Without Key Commitment
Ange Albertini and Thai Duong and Shay Gueron and Stefan Kölbl and Atul Luykx and Sophie Schmieg
2020/1455 ( PDF )
An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage
Yan Yan and Elisabeth Oswald and Srinivas Vivek
2020/1454 ( PDF )
Rate-1 Quantum Fully Homomorphic Encryption
Orestis Chardouvelis and Nico Doettling and Giulio Malavolta
2020/1453 ( PDF )
New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system
Jing Yang and Fang-Wei Fu
2020/1452 ( PDF )
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
Sebastian Berndt and Jan Wichelmann and Claudius Pott and Tim-Henrik Traving and Thomas Eisenbarth
2020/1451 ( PDF )
Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs
Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof
2020/1450 ( PDF )
Subversion-Resilient Enhanced Privacy ID
Antonio Faonio and Dario Fiore and Luca Nizzardo and Claudio Soriente
2020/1449 ( PDF )
More Efficient Amortization of Exact Zero-Knowledge Proofs for LWE
Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
2020/1448 ( PDF )
Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments
Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
2020/1447 ( PDF )
Compressed $\Sigma$-Protocols for Bilinear Group Arithmetic Circuits and Applications
Thomas Attema and Ronald Cramer and Matthieu Rambaud
2020/1446 ( PDF )
Line-Point Zero Knowledge and Its Applications
Samuel Dittmer and Yuval Ishai and Rafail Ostrovsky
2020/1445 ( PDF )
Observations on COMET
Daniel J. Bernstein and Henri Gilbert and Meltem Sonmez Turan
2020/1444 ( PDF )
On known constructions of APN and AB functions and their relation to each other
Marco Calderini and Lilya Budaghyan and Claude Carlet
2020/1443 ( PDF )
DPaSE: Distributed Password-Authenticated Symmetric Encryption
Poulami Das and Julia Hesse and Anja Lehmann
2020/1442 ( PDF )
Analysis of Multivariate Encryption Schemes: Application to Dob
Morten Øygarden and Patrick Felke and Håvard Raddum
2020/1441 ( PDF )
PayMo: Payment Channels For Monero
Sri Aravinda Krishnan Thyagarajan and Giulio Malavolta and Fritz Schmidt and Dominique Schröder
2020/1440 ( PDF )
SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures
Ralph Ankele and Kai Nahrgang and Branka Stojanovic and Atta Badii
2020/1439 ( PDF )
Cryptographic Vulnerabilities and Other Shortcomings of the Nextcloud Server Side Encryption as implemented by the Default Encryption Module
Kevin "Kenny" Niehage
2020/1438 ( PDF )
Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers
Ravi Anand and Subhamoy Maitra and Arpita Maitra and Chandra Sekhar Mukherjee and Sourav Mukhopadhyay
2020/1437 ( PDF )
Round-Optimal and Communication-Efficient Multiparty Computation
Michele Ciampi and Rafail Ostrovsky and Hendrik Waldner and Vassilis Zikas
2020/1436 ( PDF )
Removable Weak Keys for Discrete Logarithm Based Cryptography
Michael John Jacobson Jr. and Prabhat Kushwaha
2020/1435 ( PDF )
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains
Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2020/1434 ( PDF )
Towards Multiparty Computation Withstanding Coercion of All Parties
Ran Canetti and Oxana Poburinnaya
2020/1433 ( PDF )
Interactive Proofs for Social Graphs
Liran Katzir and Clara Shikhelman and Eylon Yogev
2020/1432 ( PDF )
CP-ABE for Circuits (and more) in the Symmetric Key Setting
Shweta Agrawal and Shota Yamada
2020/1431 ( PDF )
Information-Theoretic 2-Round MPC without Round Collapsing: Adaptive Security, and More
Huijia Lin and Tianren Liu and Hoeteck Wee
2020/1430 ( PDF )
Revisiting Fairness in MPC: Polynomial Number of Parties and General Adversarial Structures
Dana Dachman-Soled
2020/1429 ( PDF )
On Computational Shortcuts for Information-Theoretic PIR
Matthew M. Hong and Yuval Ishai and Victor I. Kolobov and Russell W. F. Lai
2020/1428 ( PDF )
On Statistical Security in Two-Party Computation
Dakshita Khurana and Muhammad Haris Mughees
2020/1427 ( PDF )
Barriers for Succinct Arguments in the Random Oracle Model
Alessandro Chiesa and Eylon Yogev
2020/1426 ( PDF )
Linear-Time Arguments with Sublinear Verification from Tensor Codes
Jonathan Bootle and Alessandro Chiesa and Jens Groth
2020/1425 ( PDF )
Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads
Alexander R. Block and Justin Holmgren and Alon Rosen and Ron D. Rothblum and Pratik Soni
2020/1424 ( PDF )
Improved Key Recovery of the HFEv- Signature Scheme
Chengdong Tao Albrecht Petzoldt Jintai Ding
2020/1423 ( PDF )
Quantum encryption with certified deletion
Anne Broadbent and Rabib Islam
2020/1422 ( PDF )
Non-interactive classical verification of quantum computation
Gorjan Alagic and Andrew M. Childs and Alex B. Grilo and Shih-Han Hung
2020/1421 ( PDF )
Weakly Extractable One-Way Functions
Nir Bitansky and Noa Eizenstadt and Omer Paneth
2020/1420 ( PDF )
Functional Encryption for Quadratic Functions from k-Lin, Revisited
Hoeteck Wee
2020/1419 ( PDF )
The Resiliency of MPC with Low Interaction: The Benefit of Making Errors
Benny Applebaum and Eliran Kachlon and Arpita Patra
2020/1418 ( PDF )
Quantum Period Finding against Symmetric Primitives in Practice
Xavier Bonnetain and Samuel Jaques
2020/1417 ( PDF )
Correlated Pseudorandom Functions from Variable-Density LPN
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl
2020/1416 ( PDF )
Further on the Construction of Feedback Shift Registers with Maximum Strong Linear Complexity
Congwei Zhou and Bin Hu and Jie Guan
2020/1415 ( PDF )
Secure Graph Database Search with Oblivious Filter
Jamie Cui and Chaochao Chen and Alex X. Liu and Li Wang
2020/1414 ( PDF )
New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming (Full Version)
Anubhab Baksi
2020/1413 ( PDF )
Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers
Daniele Micciancio and Jessica Sorrell
2020/1412 ( PDF )
Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields
Antigoni Polychroniadou and Yifan Song
2020/1411 ( PDF )
Transparent Error Correcting in a Computationally Bounded World
Ofer Grossman and Justin Holmgren and Eylon Yogev
2020/1410 ( PDF )
Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions
Carsten Baum and Alex J. Malozemoff and Marc B. Rosen and Peter Scholl
2020/1409 ( PDF )
The Convergence of Slide-type Reductions
Michael Walter
2020/1408 ( PDF )
On Broadcast in Generalized Network and Adversarial Models
Chen-Da Liu-Zhang and Varun Maram and Ueli Maurer
2020/1407 ( PDF )
Computing Square Roots Faster than the Tonelli-Shanks/Bernstein Algorithm
Palash Sarkar
2020/1406 ( PDF )
How not to VoteAgain: Pitfalls of Scalable Coercion-Resistant E-Voting
Thomas Haines and Johannes Mueller
2020/1405 ( PDF )
Grover on GIFT
Kyoungbae Jang and Hyunjun Kim and Siwoo Eum and Hwajeong Seo
2020/1404 ( PDF )
A Practical Key-Recovery Attack on 805-Round Trivium
Chen-Dong Ye and Tian Tian
2020/1403 ( PDF )
A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols
Syh-Yuan Tan and Ioannis Sfyrakis and Thomas Gross
2020/1402 ( PDF )
SKINNY with Scalpel - Comparing Tools for Differential Analysis
Stéphanie Delaune and Patrick Derbez and Paul Huynh and Marine Minier and Victor Mollimard and Charles Prud'homme
2020/1401 ( PDF )
Quantum Garbled Circuits
Zvika Brakerski and Henry Yuen
2020/1400 ( PDF )
Transferable E-cash: A Cleaner Model and the First Practical Instantiation
Balthazar Bauer and Georg Fuchsbauer and Chen Qian
2020/1399 ( PDF )
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption
Diana Maimut and George Teseleanu
2020/1398 ( PDF )
Minimal binary linear codes - a general framework based on bent concatenation
Fengrong Zhang and Enes Pasalic and René Rodríguez and Yongzhuang Wei
2020/1397 ( PDF )
NTT Multiplication for NTT-unfriendly Rings
Chi-Ming Marvin Chung and Vincent Hwang and Matthias J. Kannwischer and Gregor Seiler and Cheng-Jhih Shih and Bo-Yin Yang
2020/1396 ( PDF )
Efficient Privacy Preserving Logistic Regression Inference and Training
Kyoohyung Han and Jinhyuck Jeong and Jung Hoon Sohn and Yongha Son
2020/1395 ( PDF )
Post-Quantum Multi-Party Computation
Amit Agarwal and James Bartusek and Vipul Goyal and Dakshita Khurana and Giulio Malavolta
2020/1394 ( PDF )
Practical and Secure Circular Range Search on Private Spatial Data
Zhihao Zheng and Jiachen Shen and Zhenfu Cao
2020/1393 ( PDF )
On the Effectiveness of Time Travel to Inject COVID-19 Alerts
Vincenzo Iovino and Serge Vaudenay and Martin Vuagnoux
2020/1392 ( PDF )
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
Elette Boyle and Nishanth Chandran and Niv Gilboa and Divya Gupta and Yuval Ishai and Nishant Kumar and Mayank Rathee
2020/1391 ( PDF )
Interactive Proofs for Quantum Black-Box Computations
Jiang Zhang and Yu Yu and Dengguo Feng and Shuqin Fan and Zhenfeng Zhang and Kang Yang
2020/1390 ( PDF )
A Survey of ECDSA Threshold Signing
Jean-Philippe Aumasson and Adrian Hamelink and Omer Shlomovits
2020/1389 ( PDF )
Key Mismatch Attack on NewHope Revisited
Jan Vacek and Jan Václavek
2020/1388 ( PDF )
Signcryption in a Quantum World
Sanjit Chatterjee and Tapas Pandit and Shravan Kumar Parshuram Puria and Akash Shah
2020/1387 ( PDF )
FB-Tree: Highly Efficient Tree-Based Index for Encrypted Boolean Queries in Smart Cities
Zhiqiang Wu and Kenli Li and Jin Wang and Naixue Xiong
2020/1386 ( PDF )
Decentralized Multi-Authority ABE for DNFs from LWE
Pratish Datta and Ilan Komargodski and Brent Waters
2020/1385 ( PDF )
An Alternative Approach for SIDH Arithmetic
Cyril Bouvier and Laurent Imbert
2020/1384 ( PDF )
A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds
Nai-Hui Chia and Kai-Min Chung and Takashi Yamakawa
2020/1383 ( PDF )
Novel Single-Trace ML Profiling Attacks on NIST 3 Round candidate Dilithium
Il-Ju Kim and Tae-Ho Lee and Jaeseung Han and Bo-Yeon Sim and Dong-Guk Han
2020/1382 ( PDF )
Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE
Tapas Pal and Ratna Dutta
2020/1381 ( PDF )
PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates
Jia-Chng Loh and Geong-Sen Poh and Jason H. M. Ying and Jia Xu and Hoon Wei Lim and Jonathan Pan and Weiyang Wong
2020/1380 ( PDF )
Fast Computing of Quadratic Forms of HFE Polynomials over fields of characteristic two
Borja Gómez
2020/1379 ( PDF )
Blockchain Driven Access Control Mechanisms, Models and Frameworks: A Systematic Literature Review
Aaqib Bashir Dar and Asif Iqbal Baba and Auqib Hamid Lone and Roohie Naaz and Fan Wu
2020/1378 ( PDF )
Correlation-Intractable Hash Functions via Shift-Hiding
Alex Lombardi and Vinod Vaikuntanathan
2020/1377 ( PDF )
When to Barrett reduce in the inverse NTT
Bas Westerbaan
2020/1376 ( PDF )
Stronger bounds on the cost of computing Groebner bases for HFE systems
Elisa Gorla and Daniela Mueller and Christophe Petit
2020/1375 ( PDF )
Semi-regular sequences and other random systems of equations
M. Bigdeli and E. De Negri and M. M. Dizdarevic and E. Gorla and R. Minko and S. Tsakou
2020/1374 ( PDF )
ELM : A Low-Latency and Scalable Memory Encryption Scheme
Akiko Inoue and Kazuhiko Minematsu and Maya Oda and Rei Ueno and Naofumi Homma
2020/1373 ( PDF )
Transciphering, using FiLIP and TFHE for an efficient delegation of computation
Clément Hoffmann and Pierrick Méaux and Thomas Ricosset
2020/1372 ( PDF )
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage
Chan Fan and Xiaolei Dong and Zhenfu Cao and Jiachen Shen
2020/1371 ( PDF )
Privacy Amplification with Tamperable Memory via Non-malleable Two-source Extractors
Divesh Aggarwal and Maciej Obremski and João Ribeiro and Mark Simkin and Luisa Siniscalchi
2020/1370 ( PDF )
A discretization attack
Daniel J. Bernstein
2020/1369 ( PDF )
Multiplication over Extension Fields for Pairing-based Cryptography: an Hardware Point of View
Arthur Lavice and Nadia El Mrabet and Alexandre Berzati and Jean-Baptiste Rigaud
2020/1368 ( PDF )
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices
Melissa Azouaoui and François Durvaux and Romain Poussier and François-Xavier Standaert and Kostas Papagiannopoulos and Vincent Verneuil
2020/1367 ( PDF )
Costs of an Attack Against Proof-of-Work
Loïc Etienne
2020/1366 ( PDF )
LURK: Server-Controlled TLS Delegation
Ioana Boureanu and Daniel Migault and Stere Preda and Hyame Assem Alamedine and Sanjay Mishra and Frederic Fieau and Mohammad Mannan
2020/1365 ( PDF )
Evaluation Methods for Chebyshev Polynomials
Zhengjun Cao and Lihua Liu and Leming Hong
2020/1364 ( PDF )
Security of Hybrid Key Encapsulation
Matthew Campagna and Adam Petcher
2020/1363 ( PDF )
Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching
Shashank Agrawal and Saikrishna Badrinarayanan and Pratyay Mukherjee and Peter Rindal
2020/1362 ( PDF )
Lattice-Based Proof-of-Work for Post-Quantum Blockchains
Rouzbeh Behnia and Eamonn W. Postlethwaite and Muslum Ozgur Ozmen and Attila Altay Yavuz
2020/1361 ( PDF )
Tight adaptive reprogramming in the QROM
Alex B. Grilo and Kathrin Hövelmanns and Andreas Hülsing and Christian Majenz
2020/1360 ( PDF )
Incremental Cryptography Revisited: PRFs, Nonces and Modular Design
Vivek Arte and Mihir Bellare and Louiza Khati
2020/1359 ( PDF )
On two fundamental problems on APN power functions
Lilya Budaghyan and Marco Calderini and Claude Carlet and Diana Davidova and Nikolay Kaleyski
2020/1358 ( PDF )
Toward Provable One Way Functions
Hagar Dolev and Shlomi Dolev
2020/1357 ( PDF )
Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries
Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk and Guiyi Wei
2020/1356 ( PDF )
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers
Maria Eichlseder and Gregor Leander and Shahram Rasoolzadeh
2020/1355 ( PDF )
Modular Lagrange Interpolation of the Mod Function for Bootstrapping of Approximate HE
Charanjit S. Jutla and Nathan Manohar
2020/1354 ( PDF )
Gadget-Based iNTRU Lattice Trapdoors
Nicholas Genise and Baiyu Li
2020/1353 ( PDF )
Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
Linru Zhang and Xiangning Wang and Yuechen Chen and Siu-Ming Yiu
2020/1352 ( PDF )
Reducing Round Complexity of Byzantine Broadcast
Linda Chen and Jun Wan
2020/1351 ( PDF )
Tight State-Restoration Soundness in the Algebraic Group Model
Ashrujit Ghoshal and Stefano Tessaro
2020/1350 ( PDF )
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
Rishabh Poddar and Sukrit Kalra and Avishay Yanai and Ryan Deng and Raluca Ada Popa and Joseph M. Hellerstein
2020/1349 ( PDF )
Key Dependency of Differentials: Experiments in the Differential Cryptanalysis of Block Ciphers Using Small S-boxes
Howard M. Heys
2020/1348 ( PDF )
Vetted Encryption
Martha Norberg Hovd and Martijn Stam
2020/1347 ( PDF )
A Systematic Appraisal of Side Channel Evaluation Strategies
Melissa Azouaoui and Davide Bellizia and Ileana Buhan and Nicolas Debande and Sebastien Duval and Christophe Giraud and Eliane Jaulmes and Francois Koeune and Elisabeth Oswald and Francois-Xavier Standaert and Carolyn Whitnall
2020/1346 ( PDF )
SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts
Shlomi Dolev and Ziyu Wang
2020/1345 ( PDF )
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments
Erkan Tairi and Pedro Moreno-Sanchez and Matteo Maffei
2020/1344 ( PDF )
Indifferentiability of SKINNY-HASH Internal Functions
Akinori Hosoyamada and Tetsu Iwata
2020/1343 ( PDF )
Improved Cryptanalysis of UOV and Rainbow
Ward Beullens
2020/1342 ( PDF )
Forward and Backward Private Conjunctive Searchable Symmetric Encryption
Sikhar Patranabis and Debdeep Mukhopadhyay
2020/1341 ( PDF )
Zero-Communication Reductions
Varun Narayanan and Manoj Prabhakaran and Vinod M. Prabhakaran
2020/1340 ( PDF )
Homomorphic Evaluation of the SM4
Yu Xue
2020/1339 ( PDF )
New Approaches for Quantum Copy-Protection
Scott Aaronson and Jiahui Liu and Qipeng Liu and Mark Zhandry and Ruizhe Zhang
2020/1338 ( PDF )
Optimized Architectures for Elliptic Curve Cryptography over Curve448
Mojtaba Bisheh Niasar and Reza Azarderakhsh and Mehran Mozaffari Kermani
2020/1337 ( PDF )
Multiplicative Depth Independent & Efficient MPC in the Presence of Mixed Adversary
Achintya Desai and Shubham Raj and Kannan Srinathan
2020/1336 ( PDF )
Faster Characteristic Three Polynomial Multiplication and Its Application to NTRU Prime Decapsulation
Esra Yeniaras and Murat Cenk
2020/1335 ( PDF )
Transciphering Framework for Approximate Homomorphic Encryption (Full Version)
Jihoon Cho and Jincheol Ha and Seongkwang Kim and Byeonghak Lee and Joohee Lee and Jooyoung Lee and Dukjae Moon and Hyojin Yoon
2020/1334 ( PDF )
One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity in the Standard Model
Benoît Libert and Khoa Nguyen and Thomas Peters and Moti Yung
2020/1333 ( PDF )
Updateable Inner Product Argument with Logarithmic Verifier and Applications
Vanesa Daza and Carla Ràfols and Alexandros Zacharakis
2020/1332 ( PDF )
Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting
Ashley Fraser and Elizabeth A. Quaglia
2020/1331 ( PDF )
Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme
Kristian Gjøsteen and Thomas Haines and Morten Rotvold Solberg
2020/1330 ( PDF )
Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security
Anders Dalskov and Daniel Escudero and Marcel Keller
2020/1329 ( PDF )
Adaptively secure Threshold Symmetric-key Encryption
Pratyay Mukherjee
2020/1328 ( PDF )
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption
Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis and Bogdan Warinschi
2020/1327 ( PDF )
On The Insider Security of MLS
Joël Alwen and Daniel Jost and Marta Mularczyk
2020/1326 ( PDF )
Towards Fine-Grained One-Way Functions from Strong Average-Case Hardness
Chris Brzuska and Geoffroy Couteau
2020/1325 ( PDF )
On Self-Equivalence Encodings in White-Box Implementations
Adrián Ranea and Bart Preneel
2020/1324 ( PDF )
Separation Results for Boolean Function Classes
Aniruddha Biswas and Palash Sarkar
2020/1323 ( PDF )
CSI-RAShi: Distributed key generation for CSIDH
Ward Beullens and Lucas Disson and Robi Pedersen and Frederik Vercauteren
2020/1322 ( PDF )
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication
Sebastian Paul and Patrik Scheible
2020/1321 ( PDF )
Provably Quantum-Secure Tweakable Block Ciphers
Akinori Hosoyamada and Tetsu Iwata
2020/1320 ( PDF )
WARP : Revisiting GFN for Lightweight 128-bit Block Cipher
Subhadeep Banik and Zhenzhen Bao and Takanori Isobe and Hiroyasu Kubo and Fukang Liu and Kazuhiko Minematsu and Kosei Sakamoto and Nao Shibata and Maki Shigeri
2020/1319 ( PDF )
On Succinct Arguments and Witness Encryption from Groups
Ohad Barta and Yuval Ishai and Rafail Ostrovsky and David J. Wu
2020/1318 ( PDF )
Poppins: A Direct Construction for Asymptotically Optimal zkSNARKs
Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno
2020/1317 ( PDF )
Improved Rectangle Attacks on SKINNY and CRAFT
Hosein Hadipour and Nasour Bagheri and Ling Song
2020/1316 ( PDF )
Security of Public Key Encryption against Resetting Attacks
Juliane Krämer and Patrick Struck
2020/1315 ( PDF )
On Index Calculus Algorithms for Subfield Curves
Steven D. Galbraith and Robert Granger and Simon-Philipp Merz and Christophe Petit
2020/1314 ( PDF )
Secure Software Leasing from Standard Assumptions
Fuyuki Kitagawa and Ryo Nishimaki and Takashi Yamakawa
2020/1313 ( PDF )
Payment Trees: Low Collateral Payments for Payment Channel Networks
Maxim Jourenko and Mario Larangeira and Keisuke Tanaka
2020/1312 ( PDF )
Individual Simulations
Yi Deng
2020/1311 ( PDF )
Cryptanalysis of Feistel-Based Format-Preserving Encryption
Orr Dunkelman and Abhishek Kumar and Eran Lambooij and Somitra Kumar Sanadhya
2020/1310 ( PDF )
A note on the low order assumption in class group of an imaginary quadratic number fields
Karim Belabas and Thorsten Kleinjung and Antonio Sanso and Benjamin Wesolowski
2020/1309 ( PDF )
Provable Security Analysis of Decentralized Cryptographic Contact Tracing
Noel Danz and Oliver Derwisch and Anja Lehmann and Wenzel Puenter and Marvin Stolle and Joshua Ziemann
2020/1308 ( PDF )
On the Success Probability of Solving Unique SVP via BKZ
Eamonn W. Postlethwaite and Fernando Virdia
2020/1307 ( PDF )
Multiparty Cardinality Testing for Threshold Private Set Intersection
Pedro Branco and Nico Döttling and Sihang Pu
2020/1306 ( PDF )
Simulation Extractable Versions of Groth’s zk-SNARK Revisited
Oussama Amine and Karim Baghery and Zaira Pindado and Carla Ràfols
2020/1305 ( PDF )
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
Kai-Min Chung and Serge Fehr and Yu-Hsuan Huang and Tai-Ning Liao
2020/1304 ( PDF )
QCB: Efficient Quantum-secure Authenticated Encryption
Ritam Bhaumik and Xavier Bonnetain and André Chailloux and Gaëtan Leurent and María Naya-Plasencia and André Schrottenloher and Yannick Seurin
2020/1303 ( PDF )
Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer
Joppe W. Bos and Joost Renes and Christine van Vredendaal
2020/1302 ( PDF )
TMVP-based Multiplication for Polynomial Quotient Rings and Application to Saber on ARM Cortex-M4
İrem Keskinkurt Paksoy and Murat Cenk
2020/1301 ( PDF )
Robust Property-Preserving Hash Functions for Hamming Distance and More
Nils Fleischhacker and Mark Simkin
2020/1300 ( PDF )
Byzantine Ordered Consensus without Byzantine Oligarchy
Yunhao Zhang and Srinath Setty and Qi Chen and Lidong Zhou and Lorenzo Alvisi
2020/1299 ( -- withdrawn -- )
Unbounded Key-Policy Attribute-based Encryption with Black-Box Traceability
Yunxiu Ye and Zhenfu Cao and Jiachen Shen
2020/1298 ( PDF )
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols
Enis Ulqinaku and Hala Assal and AbdelRahman Abdou and Sonia Chiasson and Srdjan Čapkun
2020/1297 ( PDF )
On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software
Lauren De Meyer and Elke De Mulder and Michael Tunstall
2020/1296 ( PDF )
Concrete quantum cryptanalysis of binary elliptic curves
Gustavo Banegas and Daniel J. Bernstein and Iggy van Hoof and Tanja Lange
2020/1295 ( PDF )
Optimized Software Implementations for theLightweight Encryption Scheme ForkAE
Arne Deprez and Elena Andreeva and Jose Maria Bermudo Mera and Angshuman Karmakar and Antoon Purnal
2020/1294 ( PDF )
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs
Barbara Gigerl and Vedad Hadzic and Robert Primas and Stefan Mangard and Roderick Bloem
2020/1293 ( PDF )
I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis
Lichao Wu and Guilherme Perin and Stjepan Picek
2020/1292 ( PDF )
Optimal Oblivious Parallel RAM
Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Enoch Peserico and Elaine Shi
2020/1291 ( PDF )
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model
Bernardo David and Rafael Dowsley
2020/1290 ( PDF )
FORTIS: Selfish Mining Mitigation by (FOR)geable (TI)me(S)tamps
Osman Biçer and Alptekin Küpçü
2020/1289 ( PDF )
Sword: An Opaque Blockchain Protocol
Farid Elwailly
2020/1288 ( PDF )
Improved attacks against key reuse in learning with errors key exchange
Nina Bindel and Douglas Stebila and Shannon Veitch
2020/1287 ( PDF )
Multivariate Cryptographic Primitive based on the product of the roots of a polynomial over a field
Borja Gómez
2020/1286 ( PDF )
Secure Two-Party Quantum Computation Over Classical Channels
Michele Ciampi and Alexandru Cojocaru and Elham Kashefi and Atul Mantri
2020/1285 ( PDF )
Multi-Input Quadratic Functional Encryption from Pairings
Shweta Agrawal and Rishab Goyal and Junichi Tomida
2020/1284 ( PDF )
Entropy Estimation of Physically Unclonable Functions with Offset Error
Mitsuru Shiozaki and Yohei Hori and Takeshi Fujino
2020/1283 ( PDF )
Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem
Craig Costello and Michael Meyer and Michael Naehrig
2020/1282 ( PDF )
Compact Authenticated Key Exchange in the Quantum Random Oracle Model
Haiyang Xue and Man Ho Au and Rupeng Yang and Bei Liang and Haodong Jiang
2020/1281 ( PDF )
Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees
Matthew Weidner and Martin Kleppmann and Daniel Hugenroth and Alastair R. Beresford
2020/1280 ( PDF )
DORY: An Encrypted Search System with Distributed Trust
Emma Dauterman and Eric Feng and Ellen Luo and Raluca Ada Popa and Ion Stoica
2020/1279 ( PDF )
Tightly-Secure Authenticated Key Exchange, Revisited
Tibor Jager and Eike Kiltz and Doreen Riepel and Sven Schäge
2020/1278 ( PDF )
Compact Dilithium Implementations on Cortex-M3 and Cortex-M4
Denisa O. C. Greconici and Matthias J. Kannwischer and Daan Sprenkels
2020/1277 ( PDF )
A Simple Protocol to Compare EMFI Platforms
J. Toulemont and N. Ouldei-Tebina and J. M. Galliere and P. Nouet and E. Bourbao and P. Maurine
2020/1276 ( PDF )
Lattice-based Key Sharing Schemes - A Survey
Prasanna Ravi and James Howe and Anupam Chattopadhyay and Shivam Bhasin
2020/1275 ( PDF )
Quarks: Quadruple-efficient transparent zkSNARKs
Srinath Setty and Jonathan Lee
2020/1274 ( PDF )
Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments
Jonathan Lee
2020/1273 ( PDF )
Classical Verification of Quantum Computations with Efficient Verifier
Nai-Hui Chia and Kai-Min Chung and Takashi Yamakawa
2020/1272 ( PDF )
Bent Functions from Cellular Automata
Maximilien Gadouleau and Luca Mariot and Stjepan Picek
2020/1271 ( PDF )
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version)
Alexandros Bakas and Antonis Michalas
2020/1270 ( PDF )
Classical vs Quantum Random Oracles
Takashi Yamakawa and Mark Zhandry
2020/1269 ( PDF )
PRINCEv2 - More Security for (Almost) No Overhead
Dušan Božilov and Maria Eichlseder and Miroslav Kneževic and Baptiste Lambin and Gregor Leander and Thorben Moos and Ventzislav Nikov and Shahram Rasoolzadeh and Yosuke Todo and Friedrich Wiemer
2020/1268 ( PDF )
A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis
Anubhab Baksi and Vinay B. Y. Kumar and Banashri Karmakar and Shivam Bhasin and Dhiman Saha and Anupam Chattopadhyay
2020/1267 ( PDF )
Fault Attacks In Symmetric Key Cryptosystems
Anubhab Baksi and Shivam Bhasin and Jakub Breier and Dirmanto Jap and Dhiman Saha
2020/1266 ( PDF )
Multi-Party Functional Encryption
Shweta Agrawal and Rishab Goyal and Junichi Tomida
2020/1265 ( PDF )
Revisiting ECM on GPUs
Jonas Wloka and Jan Richter-Brockmann and Colin Stahlke and Thorsten Kleinjung and Christine Priplata and Tim Güneysu
2020/1264 ( -- withdrawn -- )
Humanly Computable Passwords as Lattice based OTP generator with LWE
Slawomir Matelski
2020/1263 ( PDF )
Improved Fault Analysis on SIMECK Ciphers
Duc-Phong Le and Rongxing Lu and Ali A. Ghorbani
2020/1262 ( PDF )
Multi-stage Proof-of-Works: Properties and Vulnerabilities
Paolo D'Arco and Zahra Ebadi Ansaroudi and Francesco Mogavero
2020/1261 ( PDF )
MuSig2: Simple Two-Round Schnorr Multi-Signatures
Jonas Nick and Tim Ruffing and Yannick Seurin
2020/1260 ( PDF )
Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance
Martin R. Albrecht and Shi Bai and Jianwei Li and Joe Rowell
2020/1259 ( PDF )
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation
Yibiao Lu and Bingsheng Zhang and Hong-Sheng Zhou and Weiran Liu and Lei Zhang and Kui Ren
2020/1258 ( PDF )
TranSCA: Cross-Family Profiled Side-Channel Attacks using Transfer Learning on Deep Neural Networks
Dhruv Thapar and Manaar Alam and Debdeep Mukhopadhyay
2020/1257 ( PDF )
Improved Reduction Between SIS Problems over Structured Lattices
ZaHyun Koo and Yongwoo Lee and Joon-Woo Lee and Jong-Seon No and Young-Sik Kim
2020/1256 ( PDF )
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/p^k Z
Mark Abspoel and Ronald Cramer and Ivan Damgård and Daniel Escudero and Matthieu Rambaud and Chaoping Xing and Chen Yuan
2020/1255 ( PDF )
Boolean Ring Cryptographic Equation Solving
Sean Murphy and Maura Paterson and Christine Swart
2020/1254 ( PDF )
Broadcast-Optimal Two Round MPC with an Honest Majority
Ivan Damgård and Bernardo Magri and Divya Ravi and Luisa Siniscalchi and Sophia Yakoubov
2020/1253 ( PDF )
New Representations of the AES Key Schedule
Gaëtan Leurent and Clara Pernot
2020/1252 ( PDF )
Adaptive Extractors and their Application to Leakage Resilient Secret Sharing
Nishanth Chandran and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar
2020/1251 ( PDF )
Bit Security Estimation Using Various Information-Theoretic Measures
Dong-Hoon Lee and Young-Sik Kim and Jong-Seon No
2020/1250 ( PDF )
A New Code Based Signature Scheme without Trapdoors
Zhe Li and Chaoping Xing and Sze Ling Yeo
2020/1249 ( PDF )
Adversarial Level Agreements for Two-Party Protocols
Marilyn George and Seny Kamara
2020/1248 ( PDF )
Random-index PIR and Applications
Craig Gentry and Shai Halevi and Bernardo Magri and Jesper Buus Nielsen and Sophia Yakoubov
2020/1247 ( PDF )
Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time
Jiaheng Zhang and Tianyi Liu and Weijie Wang and Yinuo Zhang and Dawn Song and Xiang Xie and Yupeng Zhang
2020/1246 ( PDF )
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
Gianluca Brian and Antonio Faonio and Maciej Obremski and João Ribeiro and Mark Simkin and Maciej Skórski and Daniele Venturi
2020/1245 ( PDF )
Two-round trip Schnorr multi-signatures via delinearized witnesses
Handan Kilinc Alper and Jeffrey Burdges
2020/1244 ( PDF )
Taming the many EdDSAs
Konstantinos Chalkias and François Garillot and Valeria Nikolaenko
2020/1243 ( PDF )
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV
Hiroki Furue and Yasuhiko Ikematsu and Yutaro Kiyomura and Tsuyoshi Takagi
2020/1242 ( PDF )
Improved (Related-key) Differential Cryptanalysis on GIFT
Fulei Ji and Wentao Zhang and Chunning Zhou and Tianyou Ding
2020/1241 ( PDF )
DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version)
Siang Meng Sim and Dirmanto Jap and Shivam Bhasin
2020/1240 ( PDF )
SQISign: compact post-quantum signatures from quaternions and isogenies
Luca De Feo and David Kohel and Antonin Leroux and Christophe Petit and Benjamin Wesolowski
2020/1239 ( PDF )
Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation
Alin Tomescu and Yu Xia and Zachary Newman
2020/1238 ( PDF )
Hardness of Module-LWE and Ring-LWE on General Entropic Distributions
Hao Lin and Yang Wang and Mingqiang Wang
2020/1237 ( PDF )
A Complete Analysis of the BKZ Lattice Reduction Algorithm
Jianwei Li and Phong Q. Nguyen
2020/1236 ( PDF )
Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions
Jun Wan and Hanshen Xiao and Srinivas Devadas and Elaine Shi
2020/1235 ( PDF )
Assessing Lightweight Block Cipher Security using Linear and Nonlinear Machine Learning Classifiers
Ting Rong Lee and Je Sen Teh and Norziana Jamil and Jasy Liew Suet Yan and Jiageng Chen
2020/1234 ( PDF )
Impossibility on the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model
Masayuki Fukumitsu and Shingo Hasegawa
2020/1233 ( PDF )
BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer
Farid Javani and Alan T. Sherman
2020/1232 ( PDF )
On the Existence of Weak Keys for QC-MDPC Decoding
Nicolas Sendrier and Valentin Vasseur
2020/1231 ( PDF )
vault1317/signal-dakez: An authenticated key exchange protocol with a public key concealing and a participation deniability designed for secure messaging
Richard B. Riddick
2020/1230 ( -- withdrawn -- )
Certificateless Public-key Authenticate Searchable Encryption with Probabilistic Trapdoor Generation
Leixiao Cheng and Fei Meng
2020/1229 ( PDF )
Decentralized Asset Custody Scheme with Security against Rational Adversary
Zhaohua Chen and Guang Yang
2020/1228 ( PDF )
Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices
Colin O'Flynn
2020/1227 ( PDF )
Integral Cryptanalysis of Reduced-Round Tweakable TWINE
Muhammad ElSheikh and Amr M. Youssef
2020/1226 ( PDF )
Synchronous Constructive Cryptography
Chen-Da Liu-Zhang and Ueli Maurer
2020/1225 ( PDF )
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Arpita Patra and Thomas Schneider and Ajith Suresh and Hossein Yalame
2020/1224 ( PDF )
Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives (extended version)
Alexandros Bakas and Antonis Michalas
2020/1223 ( PDF )
Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM
Jonathan Takeshita and Dayane Reis and Ting Gong and Michael Niemier and X. Sharon Hu and Taeho Jung
2020/1222 ( PDF )
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand
Muhammed F. Esgin and Veronika Kuchta and Amin Sakzad and Ron Steinfeld and Zhenfei Zhang and Shifeng Sun and Shumo Chu
2020/1221 ( PDF )
Verifiable Functional Encryption using Intel SGX
Tatsuya Suzuki and Keita Emura and Toshihiro Ohigashi and Kazumasa Omote
2020/1220 ( PDF )
The Topographic Signature (TopoSign) Protocol
Hassan Jameel Asghar and Slawomir Matelski and Josef Pieprzyk
2020/1219 ( PDF )
Aggregate Signature with Detecting Functionality from Group Testing
Shingo Sato and Junji Shikata and Tsutomu Matsumoto
2020/1218 ( PDF )
Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing
Shingo Sato and Junji Shikata
2020/1217 ( PDF )
R-Propping of HK17: Upgrade for a Detached Proposal of NIST PQC First Round Survey
Pedro Hecht
2020/1216 ( PDF )
Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4
Erdem Alkim and Dean Yun-Li Cheng and Chi-Ming Marvin Chung and Hülya Evkan and Leo Wei-Lun Huang and Vincent Hwang and Ching-Lin Trista Li and Ruben Niederhagen and Cheng-Jhih Shih and Julian Wälde and Bo-Yin Yang
2020/1215 ( PDF )
Differential analysis of the ZUC-256 initialisation
Steve Babbage and Alexander Maximov
2020/1214 ( PDF )
Cryptanalysis of RSA: A Special Case of Boneh-Durfee’s Attack
Majid Mumtaz and Ping Luo
2020/1213 ( PDF )
Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness
Joseph Jaeger and Stefano Tessaro
2020/1212 ( PDF )
Triply Adaptive UC NIZK
Ran Canetti and Pratik Sarkar and Xiao Wang
2020/1211 ( -- withdrawn -- )
Public-key Authenticate Searchable Encryption With Probabilistic Trapdoor Generation
Leixiao Cheng and Fei Meng
2020/1210 ( PDF )
Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions
Yusuke Yoshida and Fuyuki Kitagawa and Keita Xagawa and Keisuke Tanaka
2020/1209 ( PDF )
Universal Composition with Global Subroutines: Capturing Global Setup within plain UC
Christian Badertscher and Ran Canetti and Julia Hesse and Björn Tackmann and Vassilis Zikas
2020/1208 ( PDF )
An algorithm for bounding non-minimum weight differentials in 2-round LSX-ciphers
Vitaly Kiryukhin
2020/1207 ( PDF )
FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results
Kamyar Mohajerani and Richard Haeussler and Rishub Nagpal and Farnoud Farahmand and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj
2020/1206 ( PDF )
Frontrunning on Automated Decentralized Exchange in Proof Of Stake Environment
Andrey Sobol
2020/1205 ( PDF )
Towards Non-Interactive Witness Hiding
Benjamin Kuykendall and Mark Zhandry
2020/1204 ( PDF )
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Marc Fischlin and Felix Rohrbach
2020/1203 ( PDF )
Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys
Jean-Philippe Bossuat and Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Pierre Hubaux
2020/1202 ( PDF )
Correlation Power Analysis and Higher-order Masking Implementation of WAGE
Yunsi Fei and Guang Gong and Cheng Gongye and Kalikinkar Mandal and Raghvendra Rohit and Tianhong Xu and Yunjie Yi and Nusa Zidaric
2020/1201 ( PDF )
Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
Tingting Cui and Lorenzo Grassi
2020/1200 ( -- withdrawn -- )
WBCD: White-box Block Cipher Scheme Based on Dynamic Library
Yatao Yang and Ye Zhang and Yuying Zhai and Zheng Yuan and Guangwu Xu
2020/1199 ( PDF )
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity
Yevgeniy Dodis and Pooya Farshim and Sogol Mazaheri and Stefano Tessaro
2020/1198 ( PDF )
Finding EM leakages at design stage: a simulation methodology
Davide Poggi and Philippe Maurine and Thomas Ordas and Alexandre Sarafianos and Jérémy Raoult
2020/1197 ( PDF )
Black-Box Non-Interactive Non-Malleable Commitments
Rachit Garg and Dakshita Khurana and George Lu and Brent Waters
2020/1196 ( PDF )
TR-31 and AS 2805 (Non)equivalence report
Arthur Van Der Merwe and David Paul and Jelena Schmalz and Timothy M. Schaerf
2020/1195 ( PDF )
A Lower Bound for One-Round Oblivious RAM
David Cash and Andrew Drucker and Alexander Hoover
2020/1194 ( PDF )
Quantum copy-protection of compute-and-compare programs in the quantum random oracle model
Andrea Coladangelo and Christian Majenz and Alexander Poremba
2020/1193 ( PDF )
Bypassing Isolated Execution on RISC-V with Fault Injection
Shoei Nashimoto and Daisuke Suzuki and Rei Ueno and Naofumi Homma
2020/1192 ( PDF )
Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level
Yuan Yao and Tarun Kathuria and Baris Ege and Patrick Schaumont
2020/1191 ( PDF )
Schrödinger's Pirate: How To Trace a Quantum Decoder
Mark Zhandry
2020/1190 ( PDF )
Efficient Post-Quantum SNARKs for RSIS and RLWE and their Applications to Privacy
Cecilia Boschini and Jan Camenisch and Max Ovsiankin and Nicholas Spooner
2020/1189 ( PDF )
Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version)
Karim Baghery and Alonso González and Zaira Pindado and Carla Ràfols
2020/1188 ( PDF )
Cryptographic Group Actions and Applications
Navid Alamati and Luca De Feo and Hart Montgomery and Sikhar Patranabis
2020/1187 ( PDF )
Coupling of Random Systems
David Lanzenberger and Ueli Maurer
2020/1186 ( PDF )
Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions
Zvika Brakerski and Pedro Branco and Nico Döttling and Sanjam Garg and Giulio Malavolta
2020/1185 ( PDF )
Lossiness and Entropic Hardness for Ring-LWE
Zvika Brakerski and Nico Döttling
2020/1184 ( PDF )
Constant-time verification for cut-and-choose-based signatures
Robert Ransom
2020/1183 ( PDF )
Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations
Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
2020/1182 ( PDF )
On the Round Complexity of the Shuffle Model
Amos Beimel and Iftach Haitner and Kobbi Nissim and Uri Stemmer
2020/1181 ( PDF )
TinyGarble2: Smart, Efficient, and Scalable Yao’s Garble Circuit
Siam Hussain and Baiyu Li and Farinaz Koushanfar and Rosario Cammarota
2020/1180 ( PDF )
MultiTLS: Secure communication channels with cipher suite diversity
Ricardo Moura and David R. Matos and Miguel Pardal and Miguel Correia
2020/1179 ( PDF )
Optimal Broadcast Encryption from LWE and Pairings in the Standard Model
Shweta Agrawal and Daniel Wichs and Shota Yamada
2020/1178 ( PDF )
An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH
Tomoki Kawashima and Katsuyuki Takashima and Yusuke Aikawa and Tsuyoshi Takagi
2020/1177 ( PDF )
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions
Hao Guo and Siwei Sun and Danping Shi and Ling Sun and Yao Sun and Lei Hu and Meiqin Wang
2020/1176 ( PDF )
Short Paper: PoSH Proof of Staked Hardware Consensus
Rami Khalil and Naranker Dulay
2020/1175 ( PDF )
MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication
David Heath and Vladimir Kolesnikov and Stanislav Peceny
2020/1174 ( PDF )
Proximity Searchable Encryption for the Iris Biometrics
Sohaib Ahmad and Chloe Cachet and Luke Demarest and Benjamin Fuller and Ariel Hamlin
2020/1173 ( PDF )
Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark)
Ryo Nishimaki
2020/1172 ( PDF )
Cryptanalysis of a round optimal lattice-based multisignature scheme
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso
2020/1171 ( PDF )
On the Price of Concurrency in Group Ratcheting Protocols
Alexander Bienstock and Yevgeniy Dodis and Paul Rösler
2020/1170 ( PDF )
On the Power of an Honest Majority in Three-Party Computation Without Broadcast
Bar Alon and Ran Cohen and Eran Omri and Tom Suad
2020/1169 ( PDF )
Privacy-preserving greater-than integer comparison without binary decomposition in the malicious model
Sigurd Eskeland
2020/1168 ( PDF )
FHE-Based Bootstrapping of Designated-Prover NIZK
Zvika Brakerski and Sanjam Garg and Rotem Tsabary
2020/1167 ( PDF )
Batch Verification for Statistical Zero Knowledge Proofs
Inbar Kaslasi and Guy N. Rothblum and Ron D. Rothblum and Adam Sealfon and Prashant Nalini Vasudevan
2020/1166 ( PDF )
A Differential and Linear Analysis of the Inversion Mapping in Odd-Characteristic Finite Fields
Jorge Nakahara Jr
2020/1165 ( PDF )
Practical Isogeny-Based Key-exchange with Optimal Tightness
Bor de Kock and Kristian Gjøsteen and Mattia Veroni
2020/1164 ( PDF )
Template Attacks Based on the Multivariate Joint Distribution
Min Yang and Qingshu Meng and An Wang and Xin Liu
2020/1163 ( PDF )
Specifying cycles of minimal length for commonly used linear layers in block ciphers
Guoqiang Deng and Yongzhuang Wei and Xuefeng Duan and Enes Pasalic and Samir Hodzic
2020/1162 ( PDF )
On Average-Case Hardness in TFNP from One-Way Functions
Pavel Hubáček and Chethan Kamath and Karel Král and Veronika Slívová
2020/1161 ( PDF )
KVaC: Key-Value Commitments for Blockchains and Beyond
Shashank Agrawal and Srinivasan Raghuraman
2020/1160 ( PDF )
Characterizing Deterministic-Prover Zero Knowledge
Nir Bitansky and Arka Rai Choudhuri
2020/1159 ( PDF )
ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ?
Rintaro Fujita and Takanori Isobe and Kazuhiko Minematsu
2020/1158 ( PDF )
Don't throw your nonces out with the bathwater
Daan Sprenkels and Bas Westerbaan
2020/1157 ( PDF )
Secure Massively Parallel Computation for Dishonest Majority
Rex Fernando and Ilan Komargodski and Yanyi Liu and Elaine Shi
2020/1156 ( PDF )
Verifiable Hierarchical Key Assignment Schemes
Anna Lisa Ferrara and Chiara Ricciardi
2020/1155 ( PDF )
Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs
Dimitris Mouris and Nektarios Georgios Tsoutsos
2020/1154 ( PDF )
Functional Encryption for Set Intersection in the Multi-Client Setting
Kwangsu Lee and Minhye Seo
2020/1153 ( PDF )
Key Committing AEADs
Shay Gueron
2020/1152 ( PDF )
An Automatic Search Tool for Iterative Trails and its Application to estimation of differentials and linear hulls
Tianyou Ding and Wentao Zhang and Chunning Zhou and Fulei Ji
2020/1151 ( PDF )
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
Robert Merget and Marcus Brinkmann and Nimrod Aviram and Juraj Somorovsky and Johannes Mittmann and Jörg Schwenk
2020/1150 ( PDF )
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems
Gennaro Avitabile and Daniele Friolo and Ivan Visconti
2020/1149 ( PDF )
Deterministic Wallets in a Quantum World
Nabil Alkeilani Alkadri and Poulami Das and Andreas Erwig and Sebastian Faust and Juliane Krämer and Siavash Riahi and Patrick Struck
2020/1148 ( PDF )
An Area Aware Accelerator for Elliptic Curve Point Multiplication
Malik Imran and Samuel Pagliarini and Muhammad Rashid
2020/1147 ( -- withdrawn -- )
Lic-Sec: an enhanced AppArmor Docker security profile generator
Hui Zhu and Christian Gehrmann
2020/1146 ( PDF )
Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries
Siemen Dhooghe and Svetla Nikova
2020/1145 ( PDF )
Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs
Wonseok Choi and Byeonghak Lee and Yeongmin Lee and Jooyoung Lee
2020/1144 ( PDF )
Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions
Lior Rotem and Gil Segev
2020/1143 ( PDF )
Rescue-Prime: a Standard Specification (SoK)
Alan Szepieniec and Tomer Ashur and Siemen Dhooghe
2020/1142 ( PDF )
Factoring Algorithm Based on Parameterized Newton Method
Zhengjun Cao and Lihua Liu
2020/1141 ( PDF )
A post-quantum signature scheme from the secant variety of the Grassmannian
Daniele Di Tullio and Manoj Gyawali
2020/1140 ( PDF )
On the Efficient Estimation of Min-Entropy
Yongjune Kim and Cyril Guyot and Young-Sik Kim
2020/1139 ( PDF )
Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin
Huijia Lin and Ji Luo
2020/1138 ( PDF )
Epochal Signatures for Deniable Group Chats
Andreas Hülsing and Florian Weber
2020/1137 ( PDF )
MOTION - A Framework for Mixed-Protocol Multi-Party Computation
Lennart Braun and Daniel Demmler and Thomas Schneider and Oleksandr Tkachenko
2020/1136 ( PDF )
On the Family of Elliptic Curves $y^2=x^3+b/\mathbb{F}_p$
Han Wu and Guangwu Xu
2020/1135 ( PDF )
Adaptively Secure Inner Product Encryption from LWE
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2020/1134 ( PDF )
Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks
Yoo-Seung Won and Xiaolu Hou and Dirmanto Jap and Jakub Breier and Shivam Bhasin
2020/1133 ( PDF )
Security Analysis of Subterranean 2.0
Ling Song and Yi Tu and Danping Shi and Lei Hu
2020/1132 ( PDF )
A Logarithmic Lower Bound for Oblivious RAM (for all parameters)
Ilan Komargodski and Wei-Kai Lin
2020/1131 ( PDF )
Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound
Enes Pasalic and René Rodríguez and Fengrong Zhang and Yongzhuang Wei
2020/1130 ( PDF )
Secure training of decision trees with continuous attributes
Mark Abspoel and Daniel Escudero and Nikolaj Volgushev
2020/1129 ( PDF )
A Secure Software Defined Networking based Framework for IoT Networks
Ambili K N and Jimmy Jose
2020/1128 ( -- withdrawn -- )
Searching Cubes in Division Property Based Cube Attack: Applications to Round-Reduced ACORN
Jingchun Yang and Dongdai Lin
2020/1127 ( PDF )
SideLine: How Delay-Lines (May) Leak Secrets from your SoC
Joseph Gravellier and Jean-Max Dutertre and Yannick Teglia and Philippe Loubet Moundi
2020/1126 ( PDF )
Bitcoin-Monero Cross-chain Atomic Swap
Joël Gugger
2020/1125 ( PDF )
High-Speed FPGA Implementation of SIKE Based on An Ultra-Low-Latency Modular Multiplier
Jing Tian and Bo Wu and Zhongfeng Wang
2020/1124 ( PDF )
Optimized Voronoi-based algorithms for parallel shortest vector computations
Artur Mariano, Filipe Cabeleira, Gabriel Falcao, Luís Paulo Santos
2020/1123 ( PDF )
Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V
Alexandre Adomnicai and Thomas Peyrin
2020/1122 ( PDF )
The Velvet Path to Superlight Blockchain Clients
Aggelos Kiayias and Andrianna Polydouri and Dionysis Zindros
2020/1121 ( PDF )
Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain
Wilson Alberto Torres and Ron Steinfeld and Amin Sakzad and Veronika Kuchta
2020/1120 ( PDF )
On the security of Diene-Thabet-Yusuf's cubic multivariate signature scheme
Yasufumi Hashimoto
2020/1119 ( PDF )
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Christoph Hagen and Christian Weinert and Christoph Sendner and Alexandra Dmitrienko and Thomas Schneider
2020/1118 ( PDF )
Approximate Homomorphic Encryption with Reduced Approximation Error
Andrey Kim and Antonis Papadimitriou and Yuriy Polyakov
2020/1117 ( PDF )
Economic Proof of Work
Jia Kan
2020/1116 ( PDF )
On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode.
V. Ustimenko
2020/1115 ( PDF )
SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets
Karim M. Abdellatif and Olivier Hériveaux
2020/1114 ( PDF )
Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting
Thomas Haines and Rajeev Gore and Bhavesh Sharma
2020/1113 ( PDF )
On combinatorial approaches to search for quadratic APN functions
Konstantin Kalgin and Valeriya Idrisova
2020/1112 ( PDF )
A cautionary note on the use of Gurobi for cryptanalysis
Muhammad ElSheikh and Amr M. Youssef
2020/1111 ( PDF )
Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography
Abhraneel Dutta and Aaron Hutchinson and Koray Karabina
2020/1110 ( PDF )
Two-round $n$-out-of-$n$ and Multi-Signatures and Trapdoor Commitment from Lattices
Ivan Damgård and Claudio Orlandi and Akira Takahashi and Mehdi Tibouchi
2020/1109 ( PDF )
Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols
Gora Adj and Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez
2020/1108 ( PDF )
Radical isogenies
Wouter Castryck and Thomas Decru and Frederik Vercauteren
2020/1107 ( PDF )
Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications
Shuichi Katsumata and Kris Kwiatkowski and Federico Pintore and Thomas Prest
2020/1106 ( PDF )
Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction
Gili Schul-Ganz and Gil Segev
2020/1105 ( PDF )
Catalic: Delegated PSI Cardinality with Applications to Contact Tracing
Thai Duong and Duong Hieu Phan and Ni Trieu
2020/1104 ( PDF )
High-Assurance Cryptography Software in the Spectre Era
Gilles Barthe and Sunjay Cauligi and Benjamin Gregoire and Adrien Koutsos and Kevin Liao and Tiago Oliveira and Swarn Priya and Tamara Rezk and Peter Schwabe
2020/1103 ( PDF )
Packed Multiplication: How to Amortize the Cost of Side-channel Masking ?
Weijia Wang; Chun Guo; François-Xavier Standaert; Yu Yu; Gaëtan Cassiers
2020/1102 ( PDF )
PQC: R-Propping of Public-Key Cryptosystems Using Polynomials over Non-commutative Algebraic Extension Rings
Pedro Hecht
2020/1101 ( PDF )
NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus
Ren Zhang and Dingwei Zhang and Quake Wang and Shichen Wu and Jan Xie and Bart Preneel
2020/1100 ( PDF )
Towards Efficiency-Preserving Round Compression in MPC: Do fewer rounds mean more computation?
Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain
2020/1099 ( PDF )
Unbounded HIBE with Tight Security
Roman Langrehr and Jiaxin Pan
2020/1098 ( PDF )
Formalizing Bitcoin Crashes with Universally Composable Security
Junming Ke and Pawel Szalachowski and Jianying Zhou and Qiuliang Xu
2020/1097 ( PDF )
How to Build Optimally Secure PRFs Using Block Ciphers
Benoît Cogliati and Ashwin Jha and Mridul Nandi
2020/1096 ( PDF )
Far Field EM Side-Channel Attack on AES Using Deep Learning
Ruize Wang and Huanyu Wang and Elena Dubrova
2020/1095 ( PDF )
Cycle structure of generalized and closed loop invariants
Yongzhuang Wei and Rene Rodriguez and Enes Pasalic
2020/1094 ( PDF )
TN-IDS for Network Layer Attacks in RPL based IoT Systems
Ambili K N and Jimmy Jose
2020/1093 ( PDF )
Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version)
Xichao Hu and Yongqiang Li and Lin Jiao and Shizhu Tian and Mingsheng Wang
2020/1092 ( PDF )
The Round Complexity of Secure Computation Against Covert Adversaries
Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain
2020/1091 ( PDF )
Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma
Joachim Neu and Ertem Nusret Tas and David Tse
2020/1090 ( PDF )
On the Adaptive Security of MACs and PRFs
Andrew Morgan and Rafael Pass and Elaine Shi
2020/1089 ( PDF )
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers
Akinori Hosoyamada and María Naya-Plasencia and Yu Sasaki
2020/1088 ( PDF )
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security
Xiangyu Liu; Shengli Liu; Dawu Gu; Jian Weng
2020/1087 ( PDF )
Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE
Keita Emura and Atsushi Takayasu and Yohei Watanabe
2020/1086 ( PDF )
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme
Daniel Apon and Dustin Moody and Ray Perlner and Daniel Smith-Tone and Javier Verbel
2020/1085 ( PDF )
Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications
Tapas Pal and Ratna Dutta
2020/1084 ( PDF )
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions
David Derler and Stephan Krenn and Kai Samelin and Daniel Slamanig
2020/1083 ( PDF )
A Fast and Compact RISC-V Accelerator for Ascon and Friends
Stefan Steinegger and Robert Primas
2020/1082 ( PDF )
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption
Bart Mennink
2020/1081 ( PDF )
Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices
Olivier Bernard and Adeline Roux-Langlois
2020/1080 ( PDF )
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting
Rupeng Yang and Junzuo Lai and Zhengan Huang and Man Ho Au and Qiuliang Xu and Willy Susilo
2020/1079 ( PDF )
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption
Rongmao Chen and Xinyi Huang and Moti Yung
2020/1078 ( PDF )
Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles
Jodie Knapp and Elizabeth A. Quaglia
2020/1077 ( PDF )
Unconditionally secure quantum bit commitment: Revised
Ming-Xing Luo and Xiaojun Wang
2020/1076 ( PDF )
Minimizing the Two-Round Tweakable Even-Mansour Cipher
Avijit Dutta
2020/1075 ( PDF )
On the Query Complexity of Constructing PRFs from Non-adaptive PRFs
Pratik Soni and Stefano Tessaro
2020/1074 ( PDF )
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping
Mihai-Zicu Mina and Emil Simion
2020/1073 ( PDF )
Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation
Yusai Wu and Liqing Yu and Zhenfu Cao and Xiaolei Dong
2020/1072 ( PDF )
Cryptanalysis of the permutation based algorithm SpoC
Liliya Kraleva and Raluca Posteuca and Vincent Rijmen
2020/1071 ( PDF )
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model
Julia Kastner and Julian Loss and Jiayu Xu
2020/1070 ( PDF )
Efficient indifferentiable hashing to elliptic curves $y^2 = x^3 + b$ provided that $b$ is a quadratic residue
Dmitrii Koshelev
2020/1069 ( PDF )
Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions
Matteo Campanelli and Antonio Faonio and Dario Fiore and Anaïs Querol and Hadrián Rodríguez
2020/1068 ( PDF )
An Efficient Transformation Capabilities of Single Database Private Block Retrieval
Radhakrishna Bhat
2020/1067 ( PDF )
A Constant Time Full Hardware Implementation of Streamlined NTRU Prime
Adrian Marotzke
2020/1066 ( PDF )
Constant time algorithms for ROLLO-I-128
Carlos Aguilar-Melchor and Nicolas Aragon and Emanuele Bellini and Florian Caullery and Rusydi H. Makarim and Chiara Marcolla
2020/1065 ( PDF )
Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering
Naila Mukhtar and Louiza Papachristodoulou and Apostolos P. Fournaris and Lejla Batina and Yinan Kong
2020/1064 ( PDF )
Mimblewimble Non-Interactive Transaction Scheme
Gary Yu
2020/1063 ( -- withdrawn -- )
Signatures of Knowledge for Boolean Circuits under Standard Assumptions
Karim Baghery and Alonso González and Zaira Pindado and Carla Ràfols
2020/1062 ( PDF )
Quantum Search for Scaled Hash Function Preimages
Sergi Ramos-Calderer and Emanuele Bellini and José I. Latorre and Marc Manzano and Victor Mateu
2020/1061 ( PDF )
A new idea in response to fast correlation attacks on small-state stream ciphers
Vahid Amin Ghafari and Fujiang Lin
2020/1060 ( PDF )
Circular Security Is Complete for KDM Security
Fuyuki Kitagawa and Takahiro Matsuda
2020/1059 ( PDF )
Incorrectly Generated RSA Keys: How To Recover Lost Plaintexts
Daniel Shumow
2020/1058 ( PDF )
On the Complexity of the Crossbred Algorithm
João Diogo Duarte
2020/1057 ( PDF )
MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces
Jonas Nick and Tim Ruffing and Yannick Seurin and Pieter Wuille
2020/1056 ( PDF )
Optimized GPU Framework for Block Cipher Differential Search
Wei-Zhu Yeoh and Je Sen Teh and Jiageng Chen
2020/1055 ( PDF )
Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain
Santi J. Vives
2020/1054 ( PDF )
Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems
Ben Smyth
2020/1053 ( PDF )
Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation
Anders Dalskov and Eysa Lee and Eduardo Soria-Vazquez
2020/1052 ( PDF )
Attacking Threshold Wallets
Jean-Philippe Aumasson and Omer Shlomovits
2020/1051 ( PDF )
Lower Bounds on the Degree of Block Ciphers
Phil Hebborn and Baptiste Lambin and Gregor Leander and Yosuke Todo
2020/1050 ( PDF )
On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation
Arpita Patra and Divya Ravi and Swati Singla
2020/1049 ( PDF )
Rotational analysis of ChaCha permutation
Stefano Barbero and Emanuele Bellini and Rusydi Makarim
2020/1048 ( PDF )
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums
Kai Hu and Siwei Sun and Meiqin Wang and Qingju Wang
2020/1047 ( PDF )
Side-channel Attacks with Multi-thread Mixed Leakage
Yiwen Gao and Yongbin Zhou
2020/1046 ( PDF )
On the Linear Distinguishing Attack against ZUC-256 Stream Cipher
ZUC Design Team
2020/1045 ( PDF )
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
Dhiman Saha and Yu Sasaki and Danping Shi and Ferdinand Sibleyras and Siwei Sun and Yingjie Zhang
2020/1044 ( PDF )
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
2020/1043 ( PDF )
Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions
Ian McQuoid and Mike Rosulek and Lawrence Roy
2020/1042 ( PDF )
Candidate Obfuscation via Oblivious LWE Sampling
Hoeteck Wee and Daniel Wichs
2020/1041 ( PDF )
Sign in finite fields
Abraham Westerbaan and Bas Westerbaan
2020/1040 ( PDF )
MoSS: Modular Security Specifications Framework
Amir Herzberg and Hemi Leibowitz and Ewa Syta and Sara Wrotniak
2020/1039 ( PDF )
Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct
Mohammad Sadeq Dousti and Alptekin Küpçü
2020/1038 ( PDF )
On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4
Prasanna Ravi and Romain Poussier and Shivam Bhasin and Anupam Chattopadhyay
2020/1037 ( PDF )
A High-performance Hardware Implementation of Saber Based on Karatsuba Algorithm
Yihong Zhu and Min Zhu and Bohan Yang and Wenping Zhu and Chenchen Deng and Chen Chen and Shaojun Wei and Leibo Liu
2020/1036 ( PDF )
Security in banking
Arthur Van Der Merwe and David Paul and Jelena Schmalz and Timothy M. Schaerf
2020/1035 ( PDF )
Evolving Secret Sharing with Essential Participants
Jyotirmoy Pramanik and Avishek Adhikari
2020/1034 ( PDF )
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques
Fukang Liu and Takanori Isobe and Willi Meier
2020/1033 ( PDF )
RandChain: A Scalable and Fair Decentralised Randomness Beacon
Runchao Han and Haoyu Lin and Jiangshan Yu
2020/1032 ( PDF )
Cryptanalysis of the MALICIOUS Framework
Tim Beyne and Chaoyun Li
2020/1031 ( PDF )
Profiled Deep Learning Side-Channel Attack on a Protected Arbiter PUF Combined with Bitstream Modification
Yang Yu and Michail Moraitis and Elena Dubrova
2020/1030 ( PDF )
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories
Xiaoyang Dong and Siwei Sun and Danping Shi and Fei Gao and Xiaoyun Wang and Lei Hu
2020/1029 ( PDF )
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
Hannah Davis and Felix Günther
2020/1028 ( PDF )
Secure Data Hiding for Contact Tracing
Craig Gotsman and Kai Hormann
2020/1027 ( PDF )
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things
Hu Xiong and Yingzhe Hou and Xin Huang and Saru Kumari
2020/1026 ( PDF )
Simple and Efficient FE for Quadratic Functions
Junqing Gong and Haifeng Qian
2020/1025 ( PDF )
A Bit-Vector Differential Model for the Modular Addition by a Constant
Seyyed Arash Azimi and Adrián Ranea and Mahmoud Salmasizadeh and Javad Mohajeri and Mohammad Reza Aref and Vincent Rijmen
2020/1024 ( PDF )
Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices
Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta
2020/1023 ( PDF )
Post-Quantum Anonymous Veto Networks
Jintai Ding and Doug Emery and Johannes Mueller and Peter Y. A. Ryan and Vonn Kee Wong
2020/1022 ( PDF )
Polynomial IOPs for Linear Algebra Relations
Alan Szepieniec and Yuncong Zhang
2020/1021 ( PDF )
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy
Christian Badertscher and Peter Gaži and Aggelos Kiayias and Alexander Russell and Vassilis Zikas
2020/1020 ( PDF )
Towards Classical Hardness of Module-LWE: The Linear Rank Case
Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen
2020/1019 ( PDF )
Security of Streaming Encryption in Google's Tink Library
Viet Tung Hoang and Yaobin Shen
2020/1018 ( PDF )
Small Superset and Big Subset Obfuscation
Steven D. Galbraith and Trey Li
2020/1017 ( PDF )
Governance framework for Quipuswap - automated decentralized exchange
Andrey Sobol and Anastasiia Kondaurova
2020/1016 ( PDF )
Hardware-Assisted Intellectual Property Protection of Deep Learning Models
Abhishek Chakraborty and Ankit Mondal and Ankur Srivastava
2020/1015 ( PDF )
On Multivariate Algorithms of Digital Signatures of Linear Degree and Low Density.
Vasyl Ustimenko
2020/1014 ( PDF )
GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel
Yuntao Liu and Ankur Srivastava
2020/1013 ( PDF )
A Study on Privacy-Preserving GRU Inference Framework
Shou-Ching Hsiao and Zi-Yuan Liu and Raylin Tso
2020/1012 ( PDF )
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer
Yi-Fu Lai and Steven D. Galbraith and Cyprien Delpech de Saint Guilhem
2020/1011 ( PDF )
Private Join and Compute from PIR with Default
Tancrède Lepoint and Sarvar Patel and Mariana Raykova and Karn Seth and Ni Trieu
2020/1010 ( PDF )
Indistinguishability Obfuscation from Circular Security
Romain Gay and Rafael Pass
2020/1009 ( PDF )
Obfuscating Finite Automata
Steven D. Galbraith and Lukas Zobernig
2020/1008 ( PDF )
Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano
Leah Lathrop
2020/1007 ( PDF )
Attacks on Integer-RLWE
Alessandro Budroni and Benjamin Chetioui and Ermes Franch
2020/1006 ( PDF )
An Analysis of Fault Attacks on CSIDH
Jason LeGrow and Aaron Hutchinson
2020/1005 ( PDF )
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks
Fabio Campos and Matthias J. Kannwischer and Michael Meyer and Hiroshi Onuki and Marc Stöttinger
2020/1004 ( PDF )
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn
Nick Frymann and Daniel Gardham and Franziskus Kiefer and Emil Lundberg and Mark Manulis and Dain Nilsson
2020/1003 ( PDF )
Indistinguishability Obfuscation from Well-Founded Assumptions
Aayush Jain and Huijia Lin and Amit Sahai
2020/1002 ( PDF )
CrypTFlow2: Practical 2-Party Secure Inference
Deevashwer Rathee and Mayank Rathee and Nishant Kumar and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma
2020/1001 ( PDF )
Robust distributed symmetric-key encryption
Xunhua Wang and Ben Huson
2020/1000 ( PDF )
Mechanised Models and Proofs for Distance-Bounding
Ioana Boureanu and Constantin Catalin Dragan and François Dupressoir and David Gerault and Pascal Lafourcade
2020/999 ( PDF )
Attribute-Based Symmetric Searchable Encryption
Hai-Van Dang and Amjad Ullah and Alexandros Bakas and Antonis Michalas
2020/998 ( PDF )
Lightweight Virtual Payment Channels
Maxim Jourenko and Mario Larangeira and Keisuke Tanaka
2020/997 ( PDF )
Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution
Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky
2020/996 ( PDF )
Unifying Generic Group Models
Ueli Maurer and Christopher Portmann and Jiamin Zhu
2020/995 ( PDF )
Bootstrapping fully homomorphic encryption over the integers in less than one second
Hilder Vitor Lima Pereira
2020/994 ( PDF )
SPARKs: Succinct Parallelizable Arguments of Knowledge
Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass
2020/993 ( PDF )
Cryptanalysis of Masked Ciphers: A not so Random Idea
Tim Beyne and Siemen Dhooghe and Zhenda Zhang
2020/992 ( PDF )
Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs
Bo-Yeon Sim and Jihoon Kwon and Joohee Lee and Il-Ju Kim and Taeho Lee and Jaeseung Han and Hyojin Yoon and Jihoon Cho and Dong-Guk Han
2020/991 ( PDF )
A Novel Hash Function Design based on Hybrid Cellular Automata and Sponge Functions
Anita John and Alan Reji and Ajay P Manoj and Atul Premachandran and Basil Zachariah and Jimmy Jose
2020/990 ( PDF )
Performance Comparisons and Migration Analyses of Lattice-based Cryptosystems on Hardware Security Module
Junting Xiao and Tadahiko Ito
2020/989 ( PDF )
Algorithm for SIS and MultiSIS problems
Igor Semaev
2020/988 ( PDF )
120.147 Efficient Electromagnetic Side Channel Analysis by Probe Positioning using Multi-Layer Perceptron
Anupam Golder and Baogeng Ma and Debayan Das and Josef Danial and Shreyas Sen and Arijit Raychowdhury
2020/987 ( PDF )
Fuzzy Asymmetric Password-Authenticated Key Exchange
Andreas Erwig and Julia Hesse and Maximilian Orlt and Siavash Riahi
2020/986 ( PDF )
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
Thomas Peyrin and Haoyang Wang
2020/985 ( PDF )
Orienting supersingular isogeny graphs
Leonardo Colò and David Kohel
2020/984 ( PDF )
On Multivariate Algorithms of Digital Signatures on Secure El Gamal Type Mode.
Vasyl Ustimenko
2020/983 ( PDF )
A Differential Meet-in-the-Middle Attack on the Zip cipher
Michael Stay
2020/982 ( PDF )
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios
Sevdenur Baloglu and Sergiu Bursuc and Sjouke Mauw and Jun Pang
2020/981 ( PDF )
Deep Learning based analysis of Key Scheduling Algorithm of PRESENT cipher
Manan Pareek and Dr. Girish Mishra and Varun Kohli
2020/980 ( PDF )
SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE
Ruta Jawale and Yael Tauman Kalai and Dakshita Khurana and Rachel Zhang
2020/979 ( PDF )
Mercurial Signatures for Variable-Length Messages
Elizabeth C. Crites and Anna Lysyanskaya
2020/978 ( PDF )
Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher
Sarah Alzakari and Poorvi Vora
2020/977 ( PDF )
On the Influence of Optimizers in Deep Learning-based Side-channel Analysis
Guilherme Perin and Stjepan Picek
2020/976 ( PDF )
Synchronizable Exchange
Ranjit Kumaresan and Srinivasan Raghuraman and Adam Sealfon
2020/975 ( PDF )
Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies
Derek Leung and Yossi Gilad and Sergey Gorbunov and Leonid Reyzin and Nickolai Zeldovich
2020/974 ( PDF )
Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions
Dongxi Liu and Surya Nepal
2020/973 ( PDF )
Stacked Garbling: Garbled Circuit Proportional to Longest Execution Path
David Heath and Vladimir Kolesnikov
2020/972 ( PDF )
Optimized Binary GCD for Modular Inversion
Thomas Pornin
2020/971 ( PDF )
QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme
Koksal Mus and Saad Islam and Berk Sunar
2020/970 ( PDF )
Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE
Carsten Baum and Daniel Escudero and Alberto Pedrouzo-Ulloa and Peter Scholl and Juan Ramón Troncoso-Pastoriza
2020/969 ( PDF )
Hashing to elliptic curves of $j=0$ and quadratic imaginary orders of class number $2$
Dmitrii Koshelev
2020/968 ( PDF )
Feeding Cryptographic Protocols with Rich and Reliable Supply of Quantum-Grade Randomness
Gideon Samid
2020/967 ( PDF )
The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes
Jintai Ding and Joshua Deaton and Vishakha and Bo-Yin Yang
2020/966 ( PDF )
EM-Side-Channel Resistant Symmetric-Key Authentication Mechanism for Small Devices
Rick Boivie and Charanjit S. Jutla and Daniel Friedman and Ghavam Shahidi
2020/965 ( PDF )
Computation of a 30750-Bit Binary Field Discrete Logarithm
Robert Granger and Thorsten Kleinjung and Arjen K. Lenstra and Benjamin Wesolowski and Jens Zumbragel
2020/964 ( PDF )
Configurable Private Querying: Lookup and Partial Matching under Homomorphic Encryption
Hamish Hunt and Jack Crawford and Oliver Masters and Enrico Steffinlongo and Flavio Bergamaschi
2020/963 ( PDF )
From Partial to Global Asynchronous Reliable Broadcast
Diana Ghinea and Martin Hirt and Chen-Da Liu-Zhang
2020/962 ( PDF )
Post-Quantum Verification of Fujisaki-Okamoto
Dominique Unruh
2020/961 ( PDF )
Enable Dynamic Parameters Combination to Boost Linear Convolutional Neural Network for Sensitive Data Inference
Qizheng Wang and Wenping Ma and Jie Li and Ge Liu
2020/960 ( PDF )
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Florian Unterstein and Marc Schink and Thomas Schamberger and Lars Tebelmann and Manuel Ilg and Johann Heyszl
2020/959 ( PDF )
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key Settings
Carlos Cid and Akinori Hosoyamada and Yunwen Liu and Siang Meng Sim
2020/958 ( PDF )
Multi-Threshold Asynchronous Reliable Broadcast and Consensus
Martin Hirt and Ard Kastrati and Chen-Da Liu-Zhang
2020/957 ( PDF )
Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs
Johannes Tobisch and Anita Aghaie and Georg T. Becker
2020/956 ( PDF )
Constant Time Montgomery Ladder
Kaushik Nath and Palash Sarkar
2020/955 ( PDF )
Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo and Yu-Chi Chen
2020/954 ( PDF )
New Techniques for Traitor Tracing: Size $N^{1/3}$ and More from Pairings
Mark Zhandry
2020/953 ( PDF )
Performance comparison between deep learning-based and conventional cryptographic distinguishers
Emanuele Bellini and Matteo Rossi
2020/952 ( PDF )
On What to Learn: Train or Adapt a Deeply Learned Profile?
Christophe Genevey-Metat and Benoît Gérard and Annelie Heuser
2020/951 ( PDF )
Amplifying the Security of Functional Encryption, Unconditionally
Aayush Jain and Alexis Korb and Nathan Manohar and Amit Sahai
2020/950 ( PDF )
Self-Processing Private Sensor Data via Garbled Encryption
Nathan Manohar and Abhishek Jain and Amit Sahai
2020/949 ( PDF )
HABIT: Hardware-Assisted Bluetooth-based Infection Tracking
Nathan Manohar and Peter Manohar and Rajit Manohar
2020/948 ( PDF )
STARK Friendly Hash -- Survey and Recommendation
Eli Ben-Sasson and Lior Goldberg and David Levit
2020/947 ( PDF )
Data Oblivious Algorithms for Multicores
Vijaya Ramachandran and Elaine Shi
2020/946 ( PDF )
Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm
Johannes Mittmann and Werner Schindler
2020/945 ( PDF )
On the (in)security of ROS
Fabrice Benhamouda and Tancrède Lepoint and Julian Loss and Michele Orrù and Mariana Raykova
2020/944 ( PDF )
Secure Conflict-free Replicated Data Types
Manuel Barbosa and Bernardo Ferreira and João Marques and Bernardo Portela and Nuno Preguiça
2020/943 ( PDF )
Analysing and Improving Shard Allocation Protocols for Sharded Blockchains
Runchao Han and Jiangshan Yu and Ren Zhang
2020/942 ( PDF )
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness
Philipp Schindler and Aljosha Judmayer and Markus Hittmeir and Nicholas Stifter and Edgar Weippl
2020/941 ( PDF )
Alternative Tower Field Construction for Quantum Implementation of the AES S-box
Doyoung Chung and Seungkwang Lee and Dooho choi and Jooyoung Lee
2020/940 ( PDF )
Directly revocable ciphertext-policy attribute-based encryption from lattices
Fei Meng
2020/939 ( PDF )
DLDDO: Deep Learning to Detect Dummy Operations
JongHyeok Lee and Dong-Guk Han
2020/938 ( PDF )
Performance Trade-offs in Design of MimbleWimble Proofs of Reserves
Suyash Bagad and Saravanan Vijayakumaran
2020/937 ( PDF )
BAM BAM!! On Reliability of EMFI for in-situ Automotive ECU Attacks
Colin O'Flynn
2020/936 ( PDF )
Cryptanalysis and Improvement of Anonymous Authentication for Wireless Body Area Networks with Provable Security
Mahender Kumar
2020/935 ( PDF )
Privacy-Preserving Multi-Operator Contact Tracing for Early Detection of Covid19 Contagions
Davide Andreoletti and Omran Ayoub and Silvia Giordano and Massimo Tornatore and Giacomo Verticale
2020/934 ( PDF )
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
Deepak Maram and Harjasleen Malvai and Fan Zhang and Nerla Jean-Louis and Alexander Frolov and Tyler Kell and Tyrone Lobban and Christine Moy and Ari Juels and Andrew Miller
2020/933 ( -- withdrawn -- )
Instantiation of RO Model Transforms via Extractable Functions
Mohammad Zaheri
2020/932 ( PDF )
A Note on Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near – Rings
Atul Chaturvedi Varun Shukla Manoj K.Misra
2020/931 ( PDF )
Homomorphic string search with constant multiplicative depth
Charlotte Bonte and Ilia Iliashenko
2020/930 ( PDF )
The design of scalar AES Instruction Set Extensions for RISC-V
Ben Marshall and G. Richard Newell and Dan Page and Markku-Juhani O. Saarinen and Claire Wolf
2020/929 ( PDF )
Local XOR Unification: Definitions, Algorithms and Application to Cryptography
Hai Lin and Christopher Lynch
2020/928 ( PDF )
Multi-theorem (Malicious) Designated-Verifier NIZK for QMA
Omri Shmueli
2020/927 ( PDF )
A Gas-Efficient Superlight Bitcoin Client in Solidity
Stelios Daveas and Kostis Karantias and Aggelos Kiayias and Dionysis Zindros
2020/926 ( PDF )
Secure Computation over Lattices and Elliptic Curves
Brett Hemenway Falk and Daniel Noble
2020/925 ( PDF )
Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
Chenkai Weng and Kang Yang and Jonathan Katz and Xiao Wang
2020/924 ( PDF )
Ferret: Fast Extension for coRRElated oT with small communication
Kang Yang and Chenkai Weng and Xiao Lan and Jiang Zhang and Xiao Wang
2020/923 ( PDF )
Another code-based adaptation of Lyubashevsky’s signature cryptanalysed
Nicolas Aragon and Jean-Christophe Deneuville and Philippe Gaborit
2020/922 ( -- withdrawn -- )
Security Challenges in Smart Grid and Suitable Countermeasures
Soumyadyuti Ghosh and Urbi Chatterjee and Durba Chatterjee and Rumia Masburah and Debdeep Mukhopadhyay and Soumyajit Dey
2020/921 ( PDF )
Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications
Hyoseung Kim and Youngkyung Lee and Michel Abdalla and Jong Hwan Park
2020/920 ( PDF )
Further Cryptographic Properties of the Multiplicative Inverse Function
Deng Tang and Bimal Mandal and Subhamoy Maitra
2020/919 ( PDF )
Tight Bounds for Simon's Algorithm
Xavier Bonnetain
2020/918 ( -- withdrawn -- )
An Efficient Certificateless Authentication Protocol for the SAE J1939
Basker Palaniswamy
2020/917 ( PDF )
Formalizing Nakamoto-Style Proof of Stake
Søren Eller Thomsen and Bas Spitters
2020/916 ( PDF )
Black-Box Transformations from Passive to Covert Security with Public Verifiability
Ivan Damgård and Claudio Orlandi and Mark Simkin
2020/915 ( PDF )
Does Fiat-Shamir Require a Cryptographic Hash Function?
Yilei Chen and Alex Lombardi and Fermi Ma and Willy Quach
2020/914 ( PDF )
Ultra-Short Multivariate Public Key Signatures
Jacques Patarin and Gilles Macario-Rat and Maxime Bros and Eliane Koussa
2020/913 ( PDF )
Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis
Tarun Yadav and Manoj Kumar
2020/912 ( PDF )
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber
Zhuang Xu and Owen Pemberton and Sujoy Sinha Roy and David Oswald and Wang Yao and Zhiming Zheng
2020/911 ( PDF )
Lossy Correlation Intractability and PPAD Hardness from Sub-exponential LWE
Ruta Jawale and Dakshita Khurana
2020/910 ( PDF )
A Power Side-Channel Attack on the CCA2-Secure HQC KEM
Thomas Schamberger and Julian Renner and Georg Sigl and Antonia Wachter-Zeh
2020/909 ( PDF )
When is a test not a proof?
Eleanor McMurtry and Olivier Pereira and Vanessa Teague
2020/908 ( PDF )
Analysis on the MinRank Attack using Kipnis-Shamir Method Against Rainbow
Shuhei Nakamura and Yacheng Wang and Yasuhiko Ikematsu
2020/907 ( PDF )
Enhanced Flush+Reload Attack on AES
Milad Seddigh and Hadi Soleimany
2020/906 ( PDF )
Optimally-resilient Unconditionally-secure Asynchronous Multi-party Computation Revisited
Ashish Choudhury
2020/905 ( PDF )
Cryptanalysis of a Code-Based Signature Scheme Based on the Lyubashevsky Framework
Marco Baldi and Karan Khathuria and Edoardo Persichetti and Paolo Santini
2020/904 ( PDF )
A Comparison of Weight Initializers in Deep Learning-based Side-channel Analysis
Huimin Li and Marina Krček and Guilherme Perin
2020/903 ( PDF )
Optimizing Implementations of Linear Layers
Zejun Xiang and Xiangyong Zeng and Da Lin and Zhenzhen Bao and Shasha Zhang
2020/902 ( PDF )
Federated Learning in Side-Channel Analysis
Huanyu Wang and Elena Dubrova
2020/901 ( PDF )
A Not-So-Trival Replay Attack Against DH-PSI
Hongrui Cui and Yu Yu
2020/900 ( PDF )
Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
Pierre-Louis Cayrel and Brice Colombier and Vlad-Florin Dragoi and Alexandre Menu and Lilian Bossuet
2020/899 ( PDF )
On the Attack Evaluation and the Generalization Ability in Profiling Side-channel Analysis
Lichao Wu and Léo Weissbart and Marina Krček and Huimin Li and Guilherme Perin and Lejla Batina and Stjepan Picek
2020/898 ( PDF )
Rapidly Verifiable XMSS Signatures
Joppe W. Bos and Andreas Hülsing and Joost Renes and Christine van Vredendaal
2020/897 ( PDF )
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices
Jan Richter-Brockmann and Johannes Mono and Tim Güneysu
2020/896 ( PDF )
Fault Injection as an Oscilloscope: Fault Correlation Analysis
Albert Spruyt and Alyssa Milburn and Lukasz Chmielewski
2020/895 ( PDF )
Multi-Currency Ledgers
Joachim Zahnentferner
2020/894 ( PDF )
Gossiping For Communication-Efficient Broadcast
Georgios Tsimos and Julian Loss and Charalampos Papamanthou
2020/893 ( PDF )
Toward an Asymmetric White-Box Proposal
Lucas Barthelemy
2020/892 ( PDF )
Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks
Sayandeep Saha and Arnab Bag and Dirmanto Jap and Debdeep Mukhopadhyay and Shivam Bhasin
2020/891 ( PDF )
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning
Guilherme Perin and Lukasz Chmielewski and Lejla Batina and Stjepan Picek
2020/890 ( PDF )
Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness
Aein Rezaei Shahmirzadi and Amir Moradi
2020/889 ( PDF )
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption
James Bartusek and Yuval Ishai and Aayush Jain and Fermi Ma and Amit Sahai and Mark Zhandry
2020/888 ( PDF )
Machine Learning of Physical Unclonable Functions using Helper Data - Revealing a Pitfall in the Fuzzy Commitment Scheme
Emanuele Strieder and Christoph Frisch and Michael Pehl
2020/887 ( PDF )
Updatable Blockchains
Michele Ciampi and Nikos Karayannidis and Aggelos Kiayias and Dionysis Zindros
2020/886 ( PDF )
Adaptively Secure Revocable Hierarchical IBE from $k$-linear Assumption
Keita Emura and Atsushi Takayasu and Yohei Watanabe
2020/885 ( PDF )
Wendy, the Good Little Fairness Widget
Klaus Kursawe
2020/884 ( PDF )
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model
Linru Zhang and Xiangning Wang and Yuechen Chen and Siu-Ming Yiu
2020/883 ( PDF )
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis
Jeroen Delvaux
2020/882 ( PDF )
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
Willy Susilo and Dung Hoang Duong and Huy Quoc Le and Josef Pieprzyk
2020/881 ( PDF )
Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES
Loïc Masure and Nicolas Belleville and Eleonora Cagli and Marie-Angela Cornelie and Damien Couroussé and Cécile Dumas and Laurent Maingault
2020/880 ( PDF )
Classical Reduction of Gap SVP to LWE: A Concrete Security Analysis
Palash Sarkar and Subhadip Singha
2020/879 ( PDF )
Second-Order Masked Lookup Table Compression Scheme
Annapurna Valiveti and Srinivas Vivek
2020/878 ( PDF )
Bent Boolean functions A better procedure to generate non-crypto 4-bit S-boxes
Sankhanil De and Ranjan Ghosh
2020/877 ( PDF )
Unclonable Decryption Keys
Marios Georgiou and Mark Zhandry
2020/876 ( PDF )
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks
Claude Carlet and Sylvain Guilley and Sihem Mesnager
2020/875 ( PDF )
Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves
Daiki Hayashida and Kenichiro Hayasaka and Tadanori Teruya
2020/874 ( PDF )
New Methods and Abstractions for RSA-Based Forward Secure Signatures
Susan Hohenberger and Brent Waters
2020/873 ( PDF )
Post-Quantum Group Key Agreement Scheme
Julia Bobrysheva and Sergey Zapechnikov
2020/872 ( PDF )
Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis
Gabriel Zaid and Lilian Bossuet and François Dassance and Amaury Habrard and Alexandre Venelli
2020/871 ( PDF )
Quantum Immune One-Time Memories
Qipeng Liu and Amit Sahai and Mark Zhandry
2020/870 ( PDF )
Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN
Yu Yu and Jiang Zhang
2020/869 ( PDF )
An Algorithmic Reduction Theory for Binary Codes: LLL and more
Thomas Debris-Alazard and Léo Ducas and Wessel P.J. van Woerden
2020/868 ( PDF )
SoK: A Taxonomy of Cryptocurrency Wallets
Kostis Karantias
2020/867 ( PDF )
Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks
Ping Wang and Ping Chen and Zhimin Luo and Gaofeng Dong and Mengce Zheng and Nenghai Yu and Honggang Hu
2020/866 ( PDF )
Development of The RISC-V Entropy Source Interface
Markku-Juhani O. Saarinen and G. Richard Newell and Ben Marshall
2020/865 ( PDF )
Agora: A Privacy-Aware Data Marketplace
Vlasis Koutsos and Dimitrios Papadopoulos and Dimitris Chatzopoulos and Sasu Tarkoma and Pan Hui
2020/864 ( PDF )
Linear Complexity Private Set Intersection for Secure Two-Party Protocols
Ferhat Karakoç and Alptekin Küpçü
2020/863 ( PDF )
Privacy-Preserving Automated Exposure Notification
Ran Canetti and Yael Tauman Kalai and Anna Lysyanskaya and Ronald L. Rivest and Adi Shamir and Emily Shen and Ari Trachtenberg and Mayank Varia and Daniel J. Weitzner
2020/862 ( PDF )
Protecting Cryptography Against Compelled Self-Incrimination
Sarah Scheffler and Mayank Varia
2020/861 ( PDF )
Faster Homomorphic Encryption over GPGPUs via hierarchical DGT
Pedro Geraldo M. R. Alves and Jheyne N. Ortiz and Diego F. Aranha
2020/860 ( PDF )
SNARGs for Bounded Depth Computations from Sub-Exponential LWE
Yael Tauman Kalai and Rachel Zhang
2020/859 ( PDF )
A Classification of Computational Assumptions in the Algebraic Group Model
Balthazar Bauer and Georg Fuchsbauer and Julian Loss
2020/858 ( PDF )
Client-oblivious OPRAM
Gareth T. Davies and Christian Janson and Daniel P. Martin
2020/857 ( PDF )
Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party
Ivan Oleynikov and Elena Pagnin and Andrei Sabelfeld
2020/856 ( PDF )
Improving Revocation for Group Signature with Redactable Signature
Olivier Sanders
2020/855 ( PDF )
Fooling primality tests on smartcards
Vladimir Sedlacek and Jan Jancar and Petr Svenda
2020/854 ( PDF )
Designing Reverse Firewalls for the Real World
Angèle Bossuat and Xavier Bultel and Pierre-Alain Fouque and Cristina Onete and Thyla van der Merwe
2020/853 ( PDF )
Linear-Complexity Private Function Evaluation is Practical
Marco Holz and Ágnes Kiss and Deevashwer Rathee and Thomas Schneider
2020/852 ( PDF )
FROST: Flexible Round-Optimized Schnorr Threshold Signatures
Chelsea Komlo and Ian Goldberg
2020/851 ( PDF )
Asynchronous Byzantine Agreement with Subquadratic Communication
Erica Blum and Jonathan Katz and Chen-Da Liu-Zhang and Julian Loss
2020/850 ( PDF )
On the Guaranteed Number of Activations in XS-circuits
Sergey Agievich
2020/849 ( PDF )
Surveying global verifiability
Ben Smyth
2020/848 ( PDF )
On Composability of Game-based Password Authenticated Key Exchange
Marjan Škrobot and Jean Lancrenon
2020/847 ( PDF )
Encrypt-to-self: Securely Outsourcing Storage
Jeroen Pijnenburg and Bertram Poettering
2020/846 ( PDF )
Deep Learning based Differential Distinguisher for Lightweight Cipher PRESENT
Aayush Jain and Varun Kohli and Girish Mishra
2020/845 ( PDF )
Post-Quantum Adaptor Signatures and Payment Channel Networks
Muhammed F. Esgin and Oguzhan Ersoy and Zekeriya Erkin
2020/844 ( PDF )
Generic Superlight Client for Permissionless Blockchains
Yuan Lu and Qiang Tang and Guiling Wang
2020/843 ( PDF )
Dragoon: Private Decentralized HITs Made Practical
Yuan Lu and Qiang Tang and Guiling Wang
2020/842 ( PDF )
Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited
Yuan Lu and Zhenliang Lu and Qiang Tang and Guiling Wang
2020/841 ( PDF )
Dumbo: Faster Asynchronous BFT Protocols
Bingyong Guo and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang
2020/840 ( PDF )
Proof of Storage-Time: Efficiently Checking Continuous Data Availability
Giuseppe Ateniese and Long Chen and Mohammad Etemad and Qiang Tang
2020/839 ( PDF )
Cryptanalysis of a ``Strengthened'' Key Exchange Protocol for IoT, or When SAKE$^+$ Turns Out to Be SAKE$^-$
Loïc Ferreira
2020/838 ( PDF )
PudgyTurtle: variable-length, keystream-dependent encoding to resist time-memory tradeoff attacks
David A August and Anne C Smith
2020/837 ( PDF )
An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes
Daniel Kales and Greg Zaverucha
2020/836 ( PDF )
Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Fabio Campos and Lars Jellema and Mauk Lemmen and Lars Müller and Daan Sprenkels and Benoit Viguier
2020/835 ( PDF )
On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function
Congwei Zhou and Bin Hu and Jie Guan
2020/834 ( PDF )
Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison
Eunsang Lee and Joon-Woo Lee and Jong-Seon No and Young-Sik Kim
2020/833 ( PDF )
Secure Update of FPGA-based Secure Elements using Partial Reconfiguration
Florian Unterstein and Tolga Sel and Thomas Zeschg and Nisha Jacob and Michael Tempelmeier and Michael Pehl and Fabrizio De Santis
2020/832 ( PDF )
Round-optimal Black-box Commit-and-prove with Succinct Communication
Susumu Kiyoshima
2020/831 ( PDF )
On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs
Michele Ciampi and Roberto Parisella and Daniele Venturi
2020/830 ( PDF )
Terakey - An Encryption Method Whose Security Can Be Analyzed from First Principles
Arnold G. Reinhold
2020/829 ( PDF )
Refined Analysis of the Asymptotic Complexity of the Number Field Sieve
Aude Le Gluher and Pierre-Jean Spaenlehauer and Emmanuel Thomé
2020/828 ( -- withdrawn -- )
Modified Secure Hashing algorithm(MSHA-512)
Ashoka SB and Lakshmikanth D
2020/827 ( PDF )
Encrypted Blockchain Databases
Daniel Adkins and Archita Agarwal and Seny Kamara and Tarik Moataz
2020/826 ( PDF )
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes
Xuan Thanh Do and Duong Hieu Phan and Moti Yung
2020/825 ( -- withdrawn -- )
Private Set Intersection from TFHE for Cloud Computing Scenarios
Jiayu Qiang and Yi Deng
2020/824 ( PDF )
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC
Fynn Dallmeier and Jan P. Drees and Kai Gellert and Tobias Handirk and Tibor Jager and Jonas Klauke and Simon Nachtigall and Timo Renzelmann and Rudi Wolf
2020/823 ( PDF )
The Provable Security of Ed25519: Theory and Practice
Jacqueline Brendel and Cas Cremers and Dennis Jackson and Mang Zhao
2020/822 ( PDF )
Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries
Kwangsu Lee
2020/821 ( PDF )
Interconnect-Aware Bitstream Modification
Michail Moraitis and Elena Dubrova
2020/820 ( PDF )
On the security of the Rescue hash function
Tim Beyne and Anne Canteaut and Gregor Leander and María Naya-Plasencia and Léo Perrin and Friedrich Wiemer
2020/819 ( PDF )
UC-Secure OT from LWE, Revisited
Willy Quach
2020/818 ( PDF )
Security Limitations of Classical-Client Delegated Quantum Computing
Christian Badertscher and Alexandru Cojocaru and Léo Colisson and Elham Kashefi and Dominik Leichtle and Atul Mantri and Petros Wallden
2020/817 ( PDF )
Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation
Osman Biçer and Alptekin Küpçü
2020/816 ( PDF )
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
Luka Music and Céline Chevalier and Elham Kashefi
2020/815 ( PDF )
Cryptographic Divergences: New Techniques and New Applications
Marc Abboud and Thomas Prest
2020/814 ( PDF )
Incompressible Encodings
Tal Moran and Daniel Wichs
2020/813 ( PDF )
Strengthening Sequential Side-Channel Attacks Through Change Detection
Luca Frittoli and Matteo Bocchi and Silvia Mella and Diego Carrera and Beatrice Rossi and Pasqualina Fragneto and Ruggero Susella and Giacomo Boracchi
2020/812 ( PDF )
Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions
Lior Rotem and Gil Segev
2020/811 ( PDF )
Another Look at Extraction and Randomization of Groth's zk-SNARK
Karim Baghery and Markulf Kohlweiss and Janno Siim and Mikhail Volkhov
2020/810 ( -- withdrawn -- )
A Few Explanations for <Fast-to-Finalize Nakamoto-Like Consensus>
Shuyang Tang
2020/809 ( PDF )
On (expected polynomial) runtime in cryptography
Michael Klooß
2020/808 ( PDF )
Security Analysis of Olvid's SAS-based Trust Establishment Protocol
Michel Abdalla
2020/807 ( PDF )
Secure merge with $O(n \log \log n)$ secure operation
Brett Hemenway Falk and Rafail Ostrovsky
2020/806 ( PDF )
Toward Comparable Homomorphic Encryption for Crowd-sensing Network
Daxin Huang and Qingqing Gan and Xiaoming Wang and Chengpeng Huang and Yijian Lin
2020/805 ( PDF )
Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud
Furkan Turan and Ingrid Verbauwhede
2020/804 ( PDF )
Lightweight Ciphers on a 65 nm ASIC - A Comparative Study on Energy Consumption
Bastian Richter and Amir Moradi
2020/803 ( PDF )
Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA
Weiqiong Cao and Hongsong Shi and Hua Chen and Jiazhe Chen and Limin Fan and Wenling Wu
2020/802 ( PDF )
Quantum Attacks on HCTR and its Variants
Mostafizar Rahman and Goutam Paul
2020/801 ( PDF )
Not enough LESS: An improved algorithm for solving Code Equivalence Problems over $\mathbb{F}_q$
Ward Beullens
2020/800 ( PDF )
Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements
Mihir Bellare and Wei Dai and Phillip Rogaway
2020/799 ( PDF )
Secure Generalized Deduplication via Multi-Key Revealing Encryption
Daniel E. Lucani and Lars Nielsen and Claudio Orlandi and Elena Pagnin and Rasmus Vestergaard
2020/798 ( PDF )
Superposition Attack on OT Protocols
Ehsan Ebrahimi and Céline Chevalier and Marc Kaplan and Michele Minelli
2020/797 ( PDF )
Fast, Small, and Area-Time Efficient Architectures for Key-Exchange on Curve25519
Mojtaba Bisheh Niasar and Rami El Khatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2020/796 ( PDF )
A Generalization of Paillier's Public-Key System With Fast Decryption
Ying Guo and Zhenfu Cao and Xiaolei Dong
2020/795 ( PDF )
Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches
Viet Ba Dang and Farnoud Farahmand and Michal Andrzejczak and Kamyar Mohajerani and Duc Tri Nguyen and Kris Gaj
2020/794 ( PDF )
Symbolic and Computational Reasoning About Cryptographic Modes of Operation
Catherine Meadows
2020/793 ( PDF )
PHyCT : Privacy preserving Hybrid Contact Tracing
Mahabir Prasad Jhanwar and Sumanta Sarkar
2020/792 ( PDF )
Trace-$\Sigma$: a privacy-preserving contact tracing app
Jean-François Biasse and Sriram Chellappan and Sherzod Kariev and Noyem Khan and Lynette Menezes and Efe Seyitoglu and Charurut Somboonwit and Attila Yavuz
2020/791 ( PDF )
Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies
Chaya Ganesh and Claudio Orlandi and Daniel Tschudi and Aviv Zohar
2020/790 ( PDF )
Anonymity and Rewards in Peer Rating Systems
Lydia Garms and Siaw-Lynn Ng and Elizabeth A. Quaglia and Giulia Traverso
2020/789 ( PDF )
Double-Authentication-Preventing Signatures in the Standard Model
Dario Catalano and Georg Fuchsbauer and Azam Soleimanian
2020/788 ( PDF )
Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model
Michel Abdalla and Florian Bourse and Hugo Marival and David Pointcheval and Azam Soleimanian and Hendrik Waldner
2020/787 ( PDF )
A Note on Separating Classical and Quantum Random Oracles
Takashi Yamakawa and Mark Zhandry
2020/786 ( PDF )
Random Probing Security: Verification, Composition, Expansion and New Constructions
Sonia Belaïd and Jean-Sébastien Coron and Emmanuel Prouff and Matthieu Rivain and Abdul Rahman Taleb
2020/785 ( PDF )
The Memory-Tightness of Authenticated Encryption
Ashrujit Ghoshal and Joseph Jaeger and Stefano Tessaro
2020/784 ( PDF )
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time
Carsten Baum and Bernardo David and Rafael Dowsley and Jesper Buus Nielsen and Sabine Oechsner
2020/783 ( PDF )
Adventures in Crypto Dark Matter: Attacks, Fixes for Weak Pseudorandom Functions
Jung Hee Cheon and Wonhee Cho and Jeong Han Kim and Jiseung Kim
2020/782 ( PDF )
A Love Affair Between Bias Amplifiers and Broken Noise Sources
George Teseleanu
2020/781 ( PDF )
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff
Haibo Zhou and Rui Zong and Xiaoyang Dong and Keting Jia and Willi Meier
2020/780 ( PDF )
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10
Daniel De Almeida Braga and Pierre-Alain Fouque and Mohamed Sabt
2020/779 ( PDF )
Non-Malleable Time-Lock Puzzles and Applications
Cody Freitag and Ilan Komargodski and Rafael Pass and Naomi Sirkin
2020/778 ( PDF )
SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT
Seyed Farhad Aghili and Amirhossein Adavoudi Jolfaei and Aysajan Abidin
2020/777 ( PDF )
Dynamic Universal Accumulator with Batch Update over Bilinear Groups
Giuseppe Vitto and Alex Biryukov
2020/776 ( PDF )
Non-Malleable Codes for Bounded Polynomial-Depth Tampering
Dana Dachman-Soled and Ilan Komargodski and Rafael Pass
2020/775 ( PDF )
Improved Differential-Linear Attacks with Applications to ARX Ciphers
Christof Beierle and Gregor Leander and Yosuke Todo
2020/774 ( PDF )
Timelocked Bribing
Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer
2020/773 ( PDF )
An Instruction Set Extension to Support Software-Based Masking
Si Gao and Johann Großschädl and Ben Marshall and Dan Page and Thinh Pham and Francesco Regazzoni
2020/772 ( PDF )
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs
Alex Lombardi and Vinod Vaikuntanathan
2020/771 ( PDF )
Leakage-Resilient Key Exchange and Two-Seed Extractors
Xin Li and Fermi Ma and Willy Quach and Daniel Wichs
2020/770 ( PDF )
Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions
Akshima and David Cash and Andrew Drucker and Hoeteck Wee
2020/769 ( PDF )
Lattice-Based Blind Signatures, Revisited
Eduard Hauck and Eike Kiltz and Julian Loss and Ngoc Khanh Nguyen
2020/768 ( PDF )
Perfect Zero Knowledge: New Upperbounds and Relativized Separations
Peter Dixon and Sutanu Gayen and A. Pavan and N. V. Vinodchandran
2020/767 ( PDF )
Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability
Carsten Baum and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez
2020/766 ( PDF )
The uncertainty of Side-Channel Analysis: A way to leverage from heuristics
Unai Rioja and Servio Paguada and Lejla Batina and Igor Armendariz
2020/765 ( PDF )
Handling Adaptive Compromise for Practical Encryption Schemes
Joseph Jaeger and Nirvan Tyagi
2020/764 ( PDF )
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification
Romain Gay and Aayush Jain and Huijia Lin and Amit Sahai
2020/763 ( PDF )
Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol
Jia Xu and Yiwen Gao and Hoonwei Lim
2020/762 ( PDF )
Functional Encryption for Attribute-Weighted Sums from $k$-Lin
Michel Abdalla and Junqing Gong and Hoeteck Wee
2020/761 ( PDF )
Decentralized reputation
Tassos Dimitriou
2020/760 ( PDF )
Curves with fast computations in the first pairing group
Rémi Clarisse and Sylvain Duquesne and Olivier Sanders
2020/759 ( PDF )
Chosen Ciphertext Security from Injective Trapdoor Functions
Susan Hohenberger and Venkata Koppula and Brent Waters
2020/758 ( PDF )
Verifiable state machines: Proofs that untrusted services operate correctly
Srinath Setty and Sebastian Angel and Jonathan Lee
2020/757 ( PDF )
Understanding Methodology for Efficient CNN Architectures in Profiling Attacks
Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli
2020/756 ( PDF )
Provable Security Analysis of FIDO2
Manuel Barbosa and Alexandra Boldyreva and Shan Chen and Bogdan Warinschi
2020/755 ( PDF )
Time-release Cryptography from Minimal Circuit Assumptions
Samuel Jaques and Hart Montgomery and Arnab Roy
2020/754 ( PDF )
Fluid MPC: Secure Multiparty Computation with Dynamic Participants
Arka Rai Choudhuri and Aarushi Goel and Matthew Green and Abhishek Jain and Gabriel Kaptchuk
2020/753 ( PDF )
Compressing Proofs of $k$-Out-Of-$n$ Partial Knowledge
Thomas Attema and Ronald Cramer and Serge Fehr
2020/752 ( PDF )
Continuous Group Key Agreement with Active Security
Joël Alwen and Sandro Coretti and Daniel Jost and Marta Mularczyk
2020/751 ( PDF )
DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
Nils Albartus and Max Hoffmann and Sebastian Temme and Leonid Azriel and Christof Paar
2020/750 ( PDF )
Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging
Max Hoffmann and Christof Paar
2020/749 ( PDF )
Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al.
Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang
2020/748 ( PDF )
Anonymous probabilistic payment in payment hub
Tatsuo Mitani and Akira Otsuka
2020/747 ( PDF )
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups
Karim Eldefrawy and Seoyeon Hwang and Rafail Ostrovsky and Moti Yung
2020/746 ( PDF )
Comparison of RISC-V and transport triggered architectures for a post-quantum cryptography application
Latif AKÇAY and Berna ÖRS
2020/745 ( PDF )
True Random Number Generation Based on DNA molecule Genetic Information (DNA-TRNG)
Siddaramappa V and Ramesh K B
2020/744 ( PDF )
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli
Antonio Flórez Gutiérrez and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and André Schrottenloher and Ferdinand Sibleyras
2020/743 ( PDF )
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
Qian Guo and Thomas Johansson and Alexander Nilsson
2020/742 ( PDF )
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures
Jan Richter-Brockmann and Tim Güneysu
2020/741 ( PDF )
Fast Privacy-Preserving Punch Cards
Saba Eskandarian
2020/740 ( PDF )
Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback
Erica Blum and Chen-Da Liu-Zhang and Julian Loss
2020/739 ( PDF )
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles
Peter Chvojka and Tibor Jager and Daniel Slamanig and Christoph Striecks
2020/738 ( PDF )
GIFT-COFB
Subhadeep Banik and Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi and Thomas Peyrin and Yu Sasaki and Siang Meng Sim and Yosuke Todo
2020/737 ( PDF )
A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge
Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler
2020/736 ( PDF )
Forward-Security Under Continual Leakage with Deterministic Key Updates
Suvradip Chakraborty and Harish Karthikeyan and Adam O'Neill and C. Pandu Rangan
2020/735 ( PDF )
Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger
Heewon Chung and Kyoohyung Han and Chanyang Ju and Myungsun Kim and Jae Hong Seo
2020/734 ( PDF )
Mirror Theory: A simple proof of the Pi+Pj Theorem with xi_max=2
Benoît Cogliati and Jacques Patarin
2020/733 ( PDF )
A Side-Channel Resistant Implementation of SABER
Michiel Van Beirendonck and Jan-Pieter D'Anvers and Angshuman Karmakar and Josep Balasch and Ingrid Verbauwhede
2020/732 ( PDF )
Security of Multi-Adjustable Join Schemes: Separations and Implications
Mojtaba Rafiee and Shahram Khazaei
2020/731 ( PDF )
The Exact Security of PMAC with Three Powering-Up Masks
Yusuke Naito
2020/730 ( PDF )
On the Security of Time-Lock Puzzles and Timed Commitments
Jonathan Katz and Julian Loss and Jiayu Xu
2020/729 ( PDF )
Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF
Melissa Chase and Peihan Miao
2020/728 ( PDF )
Minerva: The curse of ECDSA nonces
Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys
2020/727 ( PDF )
An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers
Adrian Ranea and Yunwen Liu and Tomer Ashur
2020/726 ( PDF )
On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments
Denis Diemert and Tibor Jager
2020/725 ( PDF )
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model
Gianluca Brian and Antonio Faonio and Maciej Obremski and Mark Simkin and Daniele Venturi
2020/724 ( PDF )
Multi-Party Revocation in Sovrin: Performance through Distributed Trust
Lukas Helminger and Daniel Kales and Sebastian Ramacher and Roman Walch
2020/723 ( PDF )
On the Confidentiality of Amounts in Grin
Suyash Bagad and Saravanan Vijayakumaran
2020/722 ( PDF )
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
Yehuda Afek and Anat Bremler-Barr and Lior Shafir
2020/721 ( PDF )
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Fabian Boemer and Rosario Cammarota and Daniel Demmler and Thomas Schneider and Hossein Yalame
2020/720 ( PDF )
Fast algebraic immunity of Boolean functions and LCD codes
Sihem Mesnager and Chunming Tang
2020/719 ( PDF )
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes
Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai
2020/718 ( PDF )
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Marc Fischlin and Felix Günther and Christian Janson
2020/717 ( PDF )
Fault Location Identification By Machine Learning
Anubhab Baksi and Santanu Sarkar and Akhilesh Siddhanti and Ravi Anand and Anupam Chattopadhyay
2020/716 ( PDF )
Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function
Takeshi Sugawara and Tatsuya Onuma and Yang Li
2020/715 ( PDF )
On (impracticality of) transfinite symmetric encryption with keys smaller than messages under GCH
Sergij V. Goncharov
2020/714 ( PDF )
One-One Constrained Pseudorandom Functions
Naty Peter and Rotem Tsabary and Hoeteck Wee
2020/713 ( PDF )
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism
Yi-Fan Tseng and Zi-Yuan Liu and Raylin Tso
2020/712 ( PDF )
Anonymous IBE From Quadratic Residuosity With Fast Encryption
Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jinwen Zheng
2020/711 ( PDF )
Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation
Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
2020/710 ( PDF )
Rational Behavior in Committee-Based Blockchains
Yackolley Amoussou-Guenou and Bruno Biais and Maria Potop-Butucaru and Sara Tucci-Piergiovanni
2020/709 ( PDF )
Reputable List Curation from Decentralized Voting
Elizabeth C. Crites and Mary Maller and Sarah Meiklejohn and Rebekah Mercer
2020/708 ( PDF )
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations
Ben Nassi and Yaron Pirutin and Adi Shamir and Yuval Elovici and Boris Zadov
2020/707 ( PDF )
Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k))
Martin R. Albrecht and Shi Bai and Pierre-Alain Fouque and Paul Kirchner and Damien Stehlé and Weiqiang Wen
2020/706 ( PDF )
A Logic Synthesis Toolbox for Reducing the Multiplicative Complexity in Logic Networks
Eleonora Testa and Mathias Soeken and Heinz Riener and Luca Amaru and Giovanni De Micheli
2020/705 ( PDF )
On the minimal value set size of APN functions
Ingo Czerwinski
2020/704 ( PDF )
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead
James Bell and K. A. Bonawitz and Adrià Gascón and Tancrède Lepoint and Mariana Raykova
2020/703 ( PDF )
New Complexity Estimation on the Rainbow-Band-Separation Attack
Shuhei Nakamura and Yasuhiko Ikematsu and Yacheng Wang and Jintai Ding and Tsuyoshi Takagi
2020/702 ( PDF )
Rainbow Band Separation is Better than we Thought
Ray Perlner and Daniel Smith-Tone
2020/701 ( PDF )
MPC with Friends and Foes
Bar Alon and Eran Omri and Anat Paskin-Cherniavsky
2020/700 ( PDF )
Personal data exchange protocol: X
Vladimir Belsky and Ilia Gerasimov and Kirill Tsaregorodtsev and Ivan Chizhov
2020/699 ( PDF )
Looking at the NIST Lightweight Candidates from a Masking Point-of-View
Lauren De Meyer
2020/698 ( -- withdrawn -- )
Forgery attack on the authentication encryption GIFT-COFB
Zhe CEN and Xiutao FENG and Zhangyi Wang and Chunping CAO
2020/697 ( PDF )
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
F. Boudot and P. Gaudry and A. Guillevic and N. Heninger and E. Thomé and P. Zimmermann
2020/696 ( PDF )
An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials
Yin Li and Yu Zhang
2020/695 ( PDF )
Collusion Resistant Watermarkable PRFs from Standard Assumptions
Rupeng Yang and Man Ho Au and Zuoxia Yu and Qiuliang Xu
2020/694 ( PDF )
The nearest-colattice algorithm
Thomas Espitau and Paul Kirchner
2020/693 ( PDF )
Tight Quantum Time-Space Tradeoffs for Function Inversion
Kai-Min Chung and Siyao Guo and Qipeng Liu and Luowen Qian
2020/692 ( PDF )
Optimizing Inner Product Masking Scheme by A Coding Theory Approach
Wei Cheng and Sylvain Guilley and Claude Carlet and Sihem Mesnager and Jean-Luc Danger
2020/691 ( PDF )
Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms
Diego Aranha and Anders Dalskov and Daniel Escudero and Claudio Orlandi
2020/690 ( PDF )
SAFE: A Secure and Efficient Long-Term Distributed Storage System
Johannes Buchmann and Ghada Dessouky and Tommaso Frassetto and Ágnes Kiss and Ahmad-Reza Sadeghi and Thomas Schneider and Giulia Traverso and Shaza Zeitouni
2020/689 ( PDF )
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64
Orr Dunkelman and Senyang Huang and Eran Lambooij and Stav Perle
2020/688 ( PDF )
Lin2-Xor Lemma and Log-size Linkable Threshold Ring Signature
Anton A. Sokolov
2020/687 ( PDF )
Lower Bounds on the Time/Memory Tradeoff of Function Inversion
Dror Chawin and Iftach Haitner and Noam Mazor
2020/686 ( PDF )
A Level Dependent Authentication for IoT Paradigm
Chintan Patel and Nishant Doshi
2020/685 ( PDF )
Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors
Leo de Castro and Chiraag Juvekar and Vinod Vaikuntanathan
2020/684 ( PDF )
How to (legally) keep secrets from mobile operators
Ghada Arfaoui and Olivier Blazy and Xavier Bultel and Pierre-Alain Fouque and Thibaut Jacques and Adina Nedelcu and Cristina Onete
2020/683 ( PDF )
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model
Abida Haque and Stephan Krenn and Daniel Slamanig and Christoph Striecks
2020/682 ( PDF )
Succinct Diophantine-Satisfiability Arguments
Patrick Towa and Damien Vergnaud
2020/681 ( PDF )
An F-algebra for analysing information leaks in the presence of glitches
Vittorio Zaccaria
2020/680 ( PDF )
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition
Sumanta Sarkar and Yu Sasaki and Siang Meng Sim
2020/679 ( PDF )
BETA: Biometric Enabled Threshold Authentication
Shashank Agrawal and Saikrishna Badrinarayanan and Payman Mohassel and Pratyay Mukherjee and Sikhar Patranabis
2020/678 ( PDF )
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures
Alexander Munch-Hansen and Claudio Orlandi and Sophia Yakoubov
2020/677 ( PDF )
Blockchain with Varying Number of Players
T-H. Hubert Chan and Naomi Ephraim and Antonio Marcedone and Andrew Morgan and Rafael Pass and Elaine Shi
2020/676 ( PDF )
An airdrop that preserves recipient privacy
Riad S. Wahby and Dan Boneh and Christopher Jeffrey and Joseph Poon
2020/675 ( PDF )
Ledger Combiners for Fast Settlement
Matthias Fitzi and Peter Gazi and Aggelos Kiayias and Alexander Russell
2020/674 ( PDF )
Coercion-Resistant Blockchain-Based E-Voting Protocol
Chiara Spadafora and Riccardo Longo and Massimiliano Sala
2020/673 ( PDF )
LotMint: Blockchain Returning to Decentralization with Decentralized Clock
Wenbo MAO and Wenxiang WANG
2020/672 ( PDF )
A Survey of Automatic Contact Tracing Approaches Using Bluetooth Low Energy
Leonie Reichert and Samuel Brack and Björn Scheuermann
2020/671 ( PDF )
Persistent Fault Analysis With Few Encryptions
Sebastien Carre and Sylvain Guilley and Olivier Rioul
2020/670 ( PDF )
Inverse-Sybil Attacks in Automated Contact Tracing
Benedikt Auerbach and Suvradip Chakraborty and Karen Klein and Guillermo Pascual-Perez and Krzysztof Pietrzak and Michael Walter and Michelle Yeo
2020/669 ( PDF )
Proof of Mirror Theory for $\xi_{\max}=2$
Avijit Dutta and Mridul Nandi and Abishanka Saha
2020/668 ( PDF )
On Subversion-Resistant SNARKs
Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michał Zając
2020/667 ( PDF )
New Results on the SymSum Distinguisher on Round-Reduced SHA3
Sahiba Suryawanshi and Dhiman Saha and Satyam Sachan
2020/666 ( PDF )
Revisiting the Hardness of Binary Error LWE
Chao Sun, Mehdi Tibouchi and Masayuki Abe
2020/665 ( PDF )
Montgomery-friendly primes and applications to cryptography
Jean Claude Bajard and Sylvain Duquesne
2020/664 ( PDF )
The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs
Amos Beimel and Oriol Farràs
2020/663 ( PDF )
Super-Linear Time-Memory Trade-Offs for Symmetric Encryption
Wei Dai and Stefano Tessaro and Xihu Zhang
2020/662 ( PDF )
Multi-Party Computation Mechanism for Anonymous Equity Block Trading: A Secure Implementation of Turquoise Plato Uncross
John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui
2020/661 ( PDF )
Tight Consistency Bounds for Bitcoin
Peter Gaži and Aggelos Kiayias and Alexander Russell
2020/660 ( PDF )
Efficient Software Implementation of the SIKE Protocol Using a New Data Representation
Jing Tian and Piaoyang Wang and Zhe Liu and Jun Lin and Zhongfeng Wang and Johann Großschädl
2020/659 ( PDF )
Software Evaluation of Grain-128AEAD for Embedded Platforms
Alexander Maximov and Martin Hell
2020/658 ( PDF )
Time-Specific Signatures
Masahito Ishizaka and Shinsaku Kiyomoto
2020/657 ( PDF )
Traceable Constant-Size Multi-Authority Credentials
Chloé Hébant and David Pointcheval
2020/656 ( PDF )
On Length Independent Security Bounds for the PMAC Family
Bishwajit Chakraborty and Soumya Chattopadhyay and Ashwin Jha and Mridul Nandi
2020/655 ( PDF )
Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel
Yoo-Seung Won and Dirmanto Jap and Shivam Bhasin
2020/654 ( PDF )
Proximity Gaps for Reed-Solomon Codes
Eli Ben-Sasson and Dan Carmon and Yuval Ishai and Swastik Kopparty and Shubhangi Saraf
2020/653 ( PDF )
MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation
Zhen Hang Jiang and Yunsi Fei and Aidong Adam Ding and Thomas Wahl
2020/652 ( PDF )
Somewhere Statistically Binding Commitment Schemes with Applications
Prastudy Fauzi and Helger Lipmaa and Zaira Pindado and Janno Siim
2020/651 ( PDF )
Cryptanalysis of ``FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things''
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso
2020/650 ( PDF )
End-to-End Verifiable E-Voting Trial for Polling Station Voting
Feng Hao and Shen Wang and Samiran Bag and Rob Procter and Siamak Shahandashti and Maryam Mehrnezhad and Ehsan Toreini and Roberto Metere and Lana Liu
2020/649 ( PDF )
NIZK from SNARG
Fuyuki Kitagawa and Takahiro Matsuda and Takashi Yamakawa
2020/648 ( PDF )
Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust
Yuncong Hu and Sam Kumar and Raluca Ada Popa
2020/647 ( PDF )
A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes
Saeid Esmaeilzade and Ziba Eslami and Nasrollah Pakniat
2020/646 ( PDF )
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices
Ward Beullens and Shuichi Katsumata and Federico Pintore
2020/645 ( PDF )
Correlation distribution analysis of a two-round key-alternating block cipher
Liliya Kraleva and Nikolai L. Manev and Vincent Rijmen
2020/644 ( PDF )
ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing
Ignacio Cascudo and Bernardo David
2020/643 ( PDF )
About Blockchain Interoperability
Pascal Lafourcade and Marius Lombard-Platet
2020/642 ( PDF )
The Ritva Blockchain: Enabling Confidential Transactions at Scale
Henri Aare and Peter Vitols
2020/641 ( PDF )
Overview of Polkadot and its Design Considerations
Jeff Burdges and Alfonso Cevallos and Peter Czaban and Rob Habermeier and Syed Hosseini and Fabio Lama and Handan Kilinc Alper and Ximin Luo and Fatemeh Shirazi and Alistair Stewart and Gavin Wood
2020/640 ( PDF )
Grover on SPECK: Quantum Resource Estimates
Kyungbae Jang and Seungjoo Choi and Hyeokdong Kwon and Hwajeong Seo
2020/639 ( PDF )
Constructions for Quantum Indistinguishability Obfuscation
Anne Broadbent and Raza Ali Kazmi
2020/638 ( PDF )
Delay Encryption
Jeffrey Burdges and Luca De Feo
2020/637 ( -- withdrawn -- )
DABANGG: Time for Fearless Flush based Cache Attacks
Anish Saxena and Biswabandan Panda
2020/636 ( PDF )
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations
Erik-Oliver Blass and Florian Kerschbaum
2020/635 ( PDF )
Two-Round Oblivious Linear Evaluation from Learning with Errors
Pedro Branco and Nico Döttling and Paulo Mateus
2020/634 ( PDF )
SILVER - Statistical Independence and Leakage Verification
David Knichel and Pascal Sasdrich and Amir Moradi
2020/633 ( PDF )
Improved torsion-point attacks on SIDH variants
Victoria de Quehen and Péter Kutas and Chris Leonardi and Chloe Martindale and Lorenz Panny and Christophe Petit and Katherine E. Stange
2020/632 ( PDF )
Proposing an MILP-based Method for the Experimental Verification of Difference Trails
Sadegh Sadeghi and Vincent Rijmen and Nasour Bagheri
2020/631 ( PDF )
Simultaneous Diagonalization of Incomplete Matrices and Applications
Jean-Sébastien Coron and Luca Notarnicola and Gabor Wiese
2020/630 ( PDF )
ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy
Zhiguo Wan and Xiaotong Liu
2020/629 ( PDF )
Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer
Vivek Arte and Mihir Bellare
2020/628 ( PDF )
A post-quantum key exchange protocol from the intersection of quadric surfaces
Daniele Di Tullio and Manoj Gyawali
2020/627 ( PDF )
Attacking Zcash For Fun And Profit
Duke Leto and The Hush Developers
2020/626 ( PDF )
Game theoretical framework for analyzing Blockchains Robustness
Paolo Zappalà and Marianna Belotti and Maria Potop-Butucaru and Stefano Secci
2020/625 ( PDF )
Probability theory and public-key cryptography
Mariya Bessonov and Dima Grigoriev and Vladimir Shpilrain
2020/624 ( PDF )
RSA for poor men: a cryptosystem based on probable primes to base 2 numbers
Marek Wójtowicz
2020/623 ( PDF )
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
Jason H. M. Ying and Shuwei Cao and Geong Sen Poh and Jia Xu and Hoon Wei Lim
2020/622 ( PDF )
The Direction of Updatable Encryption does not Matter Much
Yao Jiang
2020/621 ( PDF )
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
Junbin Fang and Dominique Unruh and Jun Yan and Dehua Zhou
2020/620 ( PDF )
Private Identity Agreement for Private Set Functionalities
Ben Kreuter and Sarvar Patel and Ben Terner
2020/619 ( PDF )
Security Analysis of NIST CTR-DRBG
Viet Tung Hoang and Yaobin Shen
2020/618 ( PDF )
Broadcast Secret-Sharing, Bounds and Applications
Ivan Damgård and Kasper Green Larsen and Sophia Yakoubov
2020/617 ( PDF )
New Techniques in Replica Encodings with Client Setup
Rachit Garg and George Lu and Brent Waters
2020/616 ( PDF )
Master-Key KDM-Secure IBE from Pairings
Sanjam Garg and Romain Gay and Mohammad Hajiabadi
2020/615 ( PDF )
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
Diego F. Aranha and Felipe Rodrigues Novaes and Akira Takahashi and Mehdi Tibouchi and Yuval Yarom
2020/614 ( PDF )
Lattice-Based E-Cash, Revisited
Amit Deo and Benoit Libert and Khoa Nguyen and Olivier Sanders
2020/613 ( PDF )
SiGamal: A supersingular isogeny-based PKE and its application to a PRF
Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi
2020/612 ( PDF )
Key Assignment Schemes with Authenticated Encryption, revisited
Jeroen Pijnenburg and Bertram Poettering
2020/611 ( PDF )
Efficient and Fast Hardware Architectures for SIKE Round 2 on FPGA
Rami Elkhatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2020/610 ( -- withdrawn -- )
Stronger Multilinear Maps from Indistinguishability Obfuscation
Navid Alamati and Hart Montgomery and Sikhar Patranabis
2020/609 ( PDF )
Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers
Behnaz Rezvani and Thomas Conroy and Luke Beckwith and Matthew Bozzay and Trevor Laffoon and David McFeeters and Yijia Shi and Minh Vu and William Diehl
2020/608 ( PDF )
The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits
Fatih Balli and Andrea Caforio and Subhadeep Banik
2020/607 ( PDF )
Energy Analysis of Lightweight AEAD Circuits
Andrea Caforio and Fatih Balli and Subhadeep Banik
2020/606 ( PDF )
Ring Key-Homomorphic Weak PRFs and Applications
Navid Alamati and Hart Montgomery and Sikhar Patranabis
2020/605 ( PDF )
LUSA: the HPC library for lattice-based cryptanalysis
Artur Mariano
2020/604 ( PDF )
Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions
T-H. Hubert Chan and Elaine Shi and Wei-Kai Lin and Kartik Nayak
2020/603 ( PDF )
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification
Gilles Barthe and Marc Gourjon and Benjamin Gregoire and Maximilian Orlt and Clara Paglialonga and Lars Porth
2020/602 ( PDF )
CENCPP* - Beyond-birthday-secure Encryption from Public Permutations
Arghya Bhattacharjee and Avijit Dutta and Eik List and Mridul Nandi
2020/601 ( PDF )
Everything is a Race and Nakamoto Always Wins
Amir Dembo and Sreeram Kannan and Ertem Nusret Tas and David Tse and Pramod Viswanath and Xuechao Wang and Ofer Zeitouni
2020/600 ( PDF )
Multi-Party Threshold Private Set Intersection with Sublinear Communication
Saikrishna Badrinarayanan and Peihan Miao and Srinivasan Raghuraman and Peter Rindal
2020/599 ( PDF )
Private Matching for Compute
Prasad Buddhavarapu and Andrew Knox and Payman Mohassel and Shubho Sengupta and Erik Taubeneck and Vlad Vlaskin
2020/598 ( PDF )
Cryptanalysis of Au et al. Dynamic Universal Accumulator
Alex Biryukov and Aleksei Udovenko and Giuseppe Vitto
2020/597 ( PDF )
Bitstream Modification of Trivium
Kalle Ngo and Elena Dubrova and Michail Moraitis
2020/596 ( PDF )
Relationships between quantum IND-CPA notions
Tore Vincent Carstens and Ehsan Ebrahimi and Gelo Tabia and and Dominique Unruh
2020/595 ( PDF )
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption
Masahito Ishizaka and Shinsaku Kiyomoto
2020/594 ( PDF )
LESS is More: Code-Based Signatures without Syndromes
Jean-Francois Biasse and Giacomo Micheli and Edoardo Persichetti and Paolo Santini
2020/593 ( PDF )
Alt-Coin Traceability
Claire Ye and Chinedu Ojukwu and Anthony Hsu and Ruiqi Hu
2020/592 ( PDF )
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning
Nishat Koti and Mahak Pancholi and Arpita Patra and Ajith Suresh
2020/591 ( PDF )
Automatic Verification of Differential Characteristics: Application to Reduced Gimli (Full Version)
Fukang Liu and Takanori Isobe and Willi Meier
2020/590 ( PDF )
Expected Constant Round Byzantine Broadcast under Dishonest Majority
Jun Wan and Hanshen Xiao and Elaine Shi and Srinivas Devadas
2020/589 ( PDF )
Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity
Mykhailo Kasianchuk and Mikolaj Karpinski and Roman Kochan and Volodymyr Karpinskyi and Grzegorz Litawa and Inna Shylinska and Igor Yakymenko
2020/588 ( PDF )
Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS
ZaHyun Koo and Jong-Seon No and Young-Sik Kim
2020/587 ( PDF )
MoniPoly---An Expressive $q$-SDH-Based Anonymous Attribute-Based Credential System
Syh-Yuan Tan and Thomas Gross
2020/586 ( PDF )
Component-Based Comparison of Privacy-First Exposure Notification Protocols
Ellie Daw
2020/585 ( PDF )
Improving Key Mismatch Attack on NewHope with Fewer Queries
Satoshi Okada and Yuntao Wang and Tsuyoshi Takagi
2020/584 ( PDF )
vCNN: Verifiable Convolutional Neural Network based on zk-SNARKs
Seunghwa Lee and Hankyung Ko and Jihye Kim and Hyunok Oh
2020/583 ( PDF )
A New Targeted Password Guessing Model
Xie Zhijie and Zhang Min and Yin Anqi and Li Zhenhan
2020/582 ( PDF )
Risk and Architecture factors in Digital Exposure Notification
Archanaa S. Krishnan and Yaling Yang and Patrick Schaumont
2020/581 ( PDF )
The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency
Benny Applebaum and Eliran Kachlon and Arpita Patra
2020/580 ( PDF )
TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation
Alexei Zamyatin and Zeta Avarikioti and Daniel Perez and William J. Knottenbelt
2020/579 ( PDF )
BitFund: A Benevolent Blockchain Funding Network
Darrow R Hartman
2020/578 ( PDF )
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
Zhuotao Liu and Yangxi Xiang and Jian Shi and Peng Gao and Haoyu Wang and Xusheng Xiao and Bihan Wen and Yih-Chun Hu
2020/577 ( PDF )
Inner-Product Functional Encryption with Fine-Grained Access Control
Michel Abdalla and Dario Catalano and Romain Gay and Bogdan Ursu
2020/576 ( PDF )
How Low Can We Go?
Yuval Ishai
2020/575 ( PDF )
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption
Sanjit Chatterjee and R. Kabaleeshwaran
2020/574 ( PDF )
Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization
Ming Li, Jian Weng, Anjia Yang, Jiasi Weng, Yue Zhang
2020/573 ( PDF )
Quantifying the Security Cost of Migrating Protocols to Practice
Christopher Patton and Thomas Shrimpton
2020/572 ( PDF )
HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms)
Marina Polubelova and Karthikeyan Bhargavan and Jonathan Protzenko and Benjamin Beurdouche and Aymeric Fromherz and Natalia Kulatova and Santiago Zanella-Béguelin
2020/571 ( PDF )
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers (Extended Version)
Anubhab Baksi and Jakub Breier and Yi Chen and Xiaoyang Dong
2020/570 ( PDF )
On Optimality of d + 1 TI Shared Functions of 8 Bits or Less
Dušan Božilov
2020/569 ( PDF )
QA-NIZK Arguments of Same Opening for Bilateral Commitments
Carla Ràfols and Javier Silva
2020/568 ( PDF )
Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy)
Tomer Ashur and Siemen Dhooghe
2020/567 ( PDF )
An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster
Yi Liu and Qi Wang and Siu-Ming Yiu
2020/566 ( PDF )
Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain
Auqib Hamid Lone and Roohie Naaz
2020/565 ( PDF )
Homomorphic Computation in Reed-Muller Codes
Jinkyu Cho and Young-Sik Kim and Jong-Seon No
2020/564 ( PDF )
Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
Mahmoud Yehia and Riham AlTawy and T. Aaron Gulliver
2020/563 ( PDF )
Secure large-scale genome-wide association studies using homomorphic encryption
Marcelo Blatt and Alexander Gusev and Yuriy Polyakov and Shafi Goldwasser
2020/562 ( PDF )
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
Hocheol Shin and Juhwan Noh and Dohyun Kim and Yongdae Kim
2020/561 ( PDF )
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
Fukang Liu and Takanori Isobe and Willi Meier
2020/560 ( PDF )
Zerojoin: Combining Zerocoin and CoinJoin
Alexander Chepurnoy and Amitabh Saxena
2020/559 ( PDF )
PIVOT: PrIVate and effective cOntact Tracing
Giuseppe Garofalo and Tim Van hamme and Davy Preuveneers and Wouter Joosen and Aysajan Abidin and Mustafa A. Mustafa
2020/558 ( PDF )
BSPL: Balanced Static Power Logic
Bijan Fadaeinia and Thorben Moos and Amir Moradi
2020/557 ( PDF )
On the sensitivity of some APN permutations to swapping points
Lilya Budaghyan and Nikolay Kaleyski and Constanza Riera and Pantelimon Stanica
2020/556 ( PDF )
Kerckhoffs' Legacy
Jean-Claude Caraco and Rémi Géraud-Stewart and David Naccache
2020/555 ( PDF )
Splitting Payments Locally While Routing Interdimensionally
Lisa Eckey and Sebastian Faust and Kristina Hostáková and Stefanie Roos
2020/554 ( PDF )
Bitcoin-Compatible Virtual Channels
Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostáková and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi
2020/553 ( PDF )
Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT
Hu Xiong and Jinhao Chen and Minghao Yang and Xin Huang
2020/552 ( PDF )
High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function
Joon-Woo Lee and Eunsang Lee and Yongwoo Lee and Young-Sik Kim and Jong-Seon No
2020/551 ( PDF )
Higher Order Differential Attack against Full-Round BIG
Naoki Shibayama and Yasutaka Igarashi and Toshinobu Kaneko
2020/550 ( PDF )
Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation
Ruiyu Zhu and Changchang Ding and Yan Huang
2020/549 ( PDF )
Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks
Prasanna Ravi and Shivam Bhasin and Sujoy Sinha Roy and Anupam Chattopadhyay
2020/548 ( PDF )
Blockchain Stealth Address Schemes
Gary Yu
2020/547 ( PDF )
Finding Bit-Based Division Property for Ciphers with Complex Linear Layer
Kai Hu and Qingju Wang and Meiqin Wang
2020/546 ( PDF )
MixColumns Coefficient Property and Security of the AES with A Secret S-Box
Xin An and Kai Hu and Meiqin Wang
2020/545 ( PDF )
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security
Ran Canetti and Pratik Sarkar and Xiao Wang
2020/544 ( PDF )
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis
Okan Seker and Sebastian Berndt and Luca Wilke and Thomas Eisenbarth
2020/543 ( PDF )
Kachina - Foundations of Private Smart Contracts
Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
2020/542 ( PDF )
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation
Yusuke Naito and Yu Sasaki and Takeshi Sugawara
2020/541 ( PDF )
There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging
Benjamin Dowling and Britta Hale
2020/540 ( PDF )
One Round Threshold ECDSA with Identifiable Abort
Rosario Gennaro and Steven Goldfeder
2020/539 ( PDF )
On the Concrete Security of LWE with Small Secret
Hao Chen and Lynn Chua and Kristin Lauter and Yongsoo Song
2020/538 ( PDF )
Rotational Cryptanalysis on MAC Algorithm Chaskey
Liliya Kraleva and Tomer Ashur and Vincent Rijmen
2020/537 ( PDF )
TARDIS: A Foundation of Time-Lock Puzzles in UC
Carsten Baum and Bernardo David and Rafael Dowsley and Jesper Buus Nielsen and Sabine Oechsner
2020/536 ( PDF )
Higher-Order Differentials of Strong-Aligned SPN Schemes with Low-Degree S-Boxes
Carlos Cid and Lorenzo Grassi and Reinhard Lüftenegger and Christian Rechberger and Markus Schofnegger
2020/535 ( PDF )
Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions
Geoffroy Couteau and Shuichi Katsumata and Bogdan Ursu
2020/534 ( PDF )
Post-quantum TLS without handshake signatures
Peter Schwabe and Douglas Stebila and Thom Wiggers
2020/533 ( PDF )
Anonymous Lottery in the Proof-of-Stake Setting
Foteini Baldimtsi and Varun Madathil and Alessandra Scafuro and Linfeng Zhou
2020/532 ( PDF )
Promise: Leveraging Future Gains for Collateral Reduction
Dominik Harz and Lewis Gudgeon and Rami Khalil and Alexei Zamyatin
2020/531 ( PDF )
Centralized or Decentralized? The Contact Tracing Dilemma
Serge Vaudenay
2020/530 ( PDF )
Determining the Multiplicative Complexity of Boolean Functions using SAT
Mathias Soeken
2020/529 ( PDF )
CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs
Cas Cremers and Moni Naor and Shahar Paz and Eyal Ronen
2020/528 ( PDF )
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach
Joseph K. Liu and Man Ho Au and Tsz Hon Yuen and Cong Zuo and Jiawei Wang and Amin Sakzad and Xiapu Luo and Li Li and Kim-Kwang Raymond Choo
2020/527 ( PDF )
Aggregatable Subvector Commitments for Stateless Cryptocurrencies
Alin Tomescu and Ittai Abraham and Vitalik Buterin and Justin Drake and Dankrad Feist and Dmitry Khovratovich
2020/526 ( PDF )
Efficient Montgomery-like formulas for general Huff's and Huff's elliptic curves and their applications to the isogeny-based cryptography
Robert Dryło and Tomasz Kijko and Michał Wroński
2020/525 ( PDF )
Account Management in Proof of Stake Ledgers
Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira
2020/524 ( PDF )
Efficient Signatures on Randomizable Ciphertexts
Balthazar Bauer and Georg Fuchsbauer
2020/523 ( PDF )
Generalized Matsui Algorithm 1 with application for the full DES
Tomer Ashur and Raluca Posteuca and Danilo Šijačić and Stef D’haeseleer
2020/522 ( PDF )
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography
Alexandros Bampoulidis and Alessandro Bruni and Lukas Helminger and Daniel Kales and Christian Rechberger and Roman Walch
2020/521 ( PDF )
MP-SPDZ: A Versatile Framework for Multi-Party Computation
Marcel Keller
2020/520 ( PDF )
MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation
Yarkın Doröz and Jeffrey Hoffstein and Joseph H. Silverman and Berk Sunar
2020/519 ( PDF )
Optimally-secure Coin-tossing against a Byzantine Adversary
Hamidreza Amini Khorasgani and Hemanta K. Maji and Mingyuan Wang
2020/518 ( PDF )
Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings
Muhammed F. Esgin and Ngoc Khanh Nguyen and Gregor Seiler
2020/517 ( PDF )
Practical Product Proofs for Lattice Commitments
Thomas Attema and Vadim Lyubashevsky and Gregor Seiler
2020/516 ( PDF )
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers
Mordechai Guri
2020/515 ( PDF )
On a hybrid approach to solve small secret LWE
Thomas Espitau and Antoine Joux and Natalia Kharchenko
2020/514 ( PDF )
On the Deployment of curve based cryptography for the Internet of Things
Michael Scott
2020/513 ( PDF )
E-cclesia: Universally Composable Self-Tallying Elections
Myrto Arapinis and Nikolaos Lamprou and Lenka Mareková and Thomas Zacharias
2020/512 ( PDF )
Glimpses are Forever in RC4 amidst the Spectre of Biases
Chandratop Chakraborty and Pranab Chakraborty and Subhamoy Maitra
2020/511 ( PDF )
JaxNet: Scalable Blockchain Network
Iurii Shyshatsky and Vinod Manoharan and Taras Emelyanenko and Lucas Leger
2020/510 ( PDF )
On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM
Nir Drucker and Shay Gueron and Dusan Kostic and Edoardo Persichetti
2020/509 ( PDF )
BBB Secure Nonce Based MAC Using Public Permutations
Avijit Dutta and Mridul Nandi
2020/508 ( PDF )
Augmenting Leakage Detection using Bootstrapping
Yuan Yao and Michael Tunstall and Elke De Mulder and Anton Kochepasov and Patrick Schaumont
2020/507 ( PDF )
Characteristics of Hadamard square of Reed--Muller subcodes of special type (Extended abstract)
Victoria Vysotskaya
2020/506 ( PDF )
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations
Sonia Belaïd and Pierre-Evariste Dagand and Darius Mercadier and Matthieu Rivain and Raphaël Wintersdorff
2020/505 ( PDF )
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
Wasilij Beskorovajnov and Felix Dörre and Gunnar Hartung and Alexander Koch and Jörn Müller-Quade and Thorsten Strufe
2020/504 ( PDF )
Storing and Retrieving Secrets on a Blockchain
Vipul Goyal and Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno and Yifan Song
2020/503 ( PDF )
A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder
Aaron Hutchinson and Koray Karabina
2020/502 ( PDF )
Applying Blockchain Layer2 Technology to Mass E-Commerce
Sijia Zhao and Donal O’Mahony
2020/501 ( PDF )
Fast Threshold ECDSA with Honest Majority
Ivan Damgård and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael Bæksvang Østergård
2020/500 ( PDF )
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer
Lorenzo Grassi and Christian Rechberger and Markus Schofnegger
2020/499 ( PDF )
Proof-Carrying Data from Accumulation Schemes
Benedikt Bünz and Alessandro Chiesa and Pratyush Mishra and Nicholas Spooner
2020/498 ( PDF )
Threshold ECDSA for Decentralized Asset Custody
Adam Gągol and Jędrzej Kula and Damian Straszak and Michał Świętek
2020/497 ( PDF )
Collusion-Preserving Computation without a Mediator
Michele Ciampi and Yun Lu and Vassilis Zikas
2020/496 ( PDF )
Linear Generalized ElGamal Encryption Scheme
Demba Sow and Léo Robert and Pascal Lafourcade
2020/495 ( PDF )
Disperse rotation operator DRT and use in some stream ciphers
Kim Yong-Jin and Yon Yong-Ho and Jong Yu-Jin and Li Ok-Chol
2020/494 ( PDF )
Improved Black-Box Constructions of Composable Secure Computation
Rohit Chatterjee and Xiao Liang and Omkant Pandey
2020/493 ( PDF )
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System
Gennaro Avitabile and Vincenzo Botta and Vincenzo Iovino and Ivan Visconti
2020/492 ( PDF )
UC Non-Interactive, Proactive, Threshold ECDSA
Ran Canetti and Nikolaos Makriyannis and Udi Peled
2020/491 ( PDF )
Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic
Hilder Vitor Lima Pereira
2020/490 ( PDF )
SoK: Techniques for Verifiable Mix Nets
Thomas Haines and Johannes Mueller
2020/489 ( PDF )
Pandemic Contact Tracing Apps: DP-3T, PEPP-PT NTK, and ROBERT from a Privacy Perspective
Fraunhofer AISEC
2020/488 ( PDF )
Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption
Yongwoo Lee and Joonwoo Lee and Young-Sik Kim and Jong-Seon No
2020/487 ( PDF )
Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP
Emmanouil Doulgerakis and Thijs Laarhoven and Benne de Weger
2020/486 ( PDF )
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
Jinyu Lu and Yunwen Liu and Tomer Ashur and Bing Sun and Chao Li
2020/485 ( PDF )
Edwards curve points counting method and supersingular Edwards and Montgomery curves
Ruslan V. Skuratovskii
2020/484 ( PDF )
Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions
Aaqib Bashir Dar and Auqib Hamid Lone and Saniya Zahoor and Afshan Amin Khan and Roohie Naaz
2020/483 ( PDF )
On Ideal and Weakly-Ideal Access Structures
Reza Kaboli and Shahram Khazaei and Maghsoud Parviz
2020/482 ( PDF )
A Trace Based $GF(2^n)$ Inversion Algorithm
Haining Fan
2020/481 ( PDF )
Using z14 Fused-Multiply-Add Instructions to Accelerate Elliptic Curve Cryptography
James You and Qi Zhang and Curtis D'Alves and Bill O'Farrell and Christopher K. Anand
2020/480 ( PDF )
Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Evaluation
Ahmet Can Mert and Erdinc Ozturk and Erkay Savas
2020/479 ( PDF )
Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRF
Tapas Pal and Ratna Dutta
2020/478 ( PDF )
Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols
Eshan Chattopadhyay and Jesse Goodman and Vipul Goyal and Xin Li
2020/477 ( PDF )
Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More
Essam Ghadafi
2020/476 ( PDF )
Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures
Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostakova and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi
2020/475 ( PDF )
Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews
Zachary Zaccagni and Ram Dantu
2020/474 ( PDF )
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model
Karim Baghery and Mahdi Sedaghat
2020/473 ( PDF )
Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing
Ashutosh Kumar and Raghu Meka and David Zuckerman
2020/472 ( -- withdrawn -- )
Bracing A Transaction DAG with A Backbone Chain
Shuyang Tang
2020/471 ( PDF )
Interpose PUF can be PAC Learned
Durba Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra
2020/470 ( PDF )
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
Fabio Campos and Tim Kohlstadt and Steffen Reith and Marc Stoettinger
2020/469 ( PDF )
Dedicated Security Chips in the Age of Secure Enclaves
Kari Kostiainen and Aritra Dhar and Srdjan Capkun
2020/468 ( PDF )
Distributed Auditing Proofs of Liabilities
Konstantinos Chalkias and Kevin Lewi and Payman Mohassel and Valeria Nikolaenko
2020/467 ( PDF )
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
Zhenzhen Bao and Xiaoyang Dong and Jian Guo and Zheng Li and Danping Shi and Siwei Sun and Xiaoyun Wang
2020/466 ( PDF )
Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks
Pantea Kiaei and Darius Mercadier and Pierre-Evariste Dagand and Karine Heydemann and Patrick Schaumont
2020/465 ( PDF )
Domain-Oriented Masked Instruction Set Architecture for RISC-V
Pantea Kiaei and Patrick Schaumont
2020/464 ( PDF )
Can a Public Blockchain Keep a Secret?
Fabrice Benhamouda and Craig Gentry and Sergey Gorbunov and Shai Halevi and Hugo Krawczyk and Chengyu Lin and Tal Rabin and Leonid Reyzin
2020/463 ( PDF )
Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge
Xiaoning Liu and Bang Wu and Xingliang Yuan and Xun Yi
2020/462 ( PDF )
An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption
Ido Shahaf and Or Ordentlich and Gil Segev
2020/461 ( PDF )
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem
Jean-Sébastien Coron and Agnese Gini
2020/460 ( PDF )
A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption
Marloes Venema and Greg Alpár
2020/459 ( PDF )
Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations
Debdeep Mukhopadhyay
2020/458 ( PDF )
On the Optimality of Optimistic Responsiveness
Ittai Abraham and Kartik Nayak and Ling Ren and Nibesh Shrestha
2020/457 ( PDF )
Cryptographic Scheme for analyzing protected files on Sandboxes and share them privately
Ahmad Almorabea
2020/456 ( PDF )
General Congestion Attack on HTLC-Based Payment Channel Networks
Zhichun Lu and Runchao Han and Jiangshan Yu
2020/455 ( PDF )
Cryptanalysis of LEDAcrypt
Daniel Apon and Ray Perlner and Angela Robinson and Paolo Santini
2020/454 ( PDF )
Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification
Thomas Pornin
2020/453 ( PDF )
BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein
F. Betül Durak and Loïs Huguenin-Dumittan and Serge Vaudenay
2020/452 ( PDF )
Almost Public Quantum Coins
Amit Behera and Or Sattath
2020/451 ( PDF )
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning
Hao Chen and Miran Kim and Ilya Razenshteyn and Dragos Rotaru and Yongsoo Song and Sameer Wagh
2020/450 ( PDF )
The Landscape of Pointcheval-Sanders Signatures: Mapping to Polynomial-Based Signatures and Beyond
Kristian L. McDonald
2020/449 ( PDF )
Switched Threshold Signatures from K-Private PolyShamir Secret Sharing
Kristian L. McDonald
2020/448 ( PDF )
Partial Secret Sharing Schemes
Amir Jafari and Shahram Khazaei
2020/447 ( -- withdrawn -- )
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey
Asma Aloufi and Peizhao Hu and Yongsoo Song and and Kristin Lauter
2020/446 ( PDF )
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography
Tim Fritzmann and Georg Sigl and Johanna Sepúlveda
2020/445 ( PDF )
On Pseudorandom Encodings
Thomas Agrikola and Geoffroy Couteau and Yuval Ishai and Stanislaw Jarecki and Amit Sahai
2020/444 ( PDF )
A modern signature scheme with message recovery: Abe--Okamoto signatures with EdDSA elements
Satō Shinichi
2020/443 ( PDF )
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
Okan Seker and Thomas Eisenbarth and Maciej Liskiewicz
2020/442 ( PDF )
Fine-Grained Cryptography: A New Frontier?
Alon Rosen
2020/441 ( PDF )
Modeling for Three-Subset Division Property without Unknown Subset
Yonglin Hao and Gregor Leander and Willi Meier and Yosuke Todo and Qingju Wang
2020/440 ( PDF )
Sublattice Attack on Poly-LWE with Wide Error Distributions
Hao Chen
2020/439 ( PDF )
The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE
Hiroshi Onuki and Yusuke Aikawa and Tsuyoshi Takagi
2020/438 ( PDF )
Fast hybrid Karatsuba multiplier for Type II pentanomials
Yin Li and Yu Zhang and Wei He
2020/437 ( PDF )
Faster Montgomery and double-add ladders for short Weierstrass curves
Mike Hamburg
2020/436 ( PDF )
Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification
Houssem Maghrebi
2020/435 ( PDF )
WAGE: An Authenticated Encryption with a Twist
Riham AlTawy and Guang Gong and Kalikinkar Mandal and Raghvendra Rohit
2020/434 ( PDF )
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware
Sujoy Sinha Roy and Andrea Basso
2020/433 ( PDF )
zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays
Martin Westerkamp and Jacob Eberhardt
2020/432 ( PDF )
From A to Z: Projective coordinates leakage in the wild
Alejandro Cabrera Aldaya and Cesar Pereida García and Billy Bob Brumley
2020/431 ( PDF )
x-only point addition formula and faster compressed SIKE
Geovandro Pereira and Javad Doliskani and David Jao
2020/430 ( PDF )
Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures
Aram Jivanyan and Tigran Mamikonyan
2020/429 ( PDF )
Mathematics and Cryptography: A Marriage of Convenience?
Alice Silverberg
2020/428 ( PDF )
Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc.
Yaron Gvili
2020/427 ( PDF )
Improving the Performance of the Picnic Signature Scheme
Daniel Kales and Greg Zaverucha
2020/426 ( PDF )
Privacy-Preserving Contact Tracing: current solutions and open questions
Qiang Tang
2020/425 ( PDF )
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel
2020/424 ( PDF )
Low-gate Quantum Golden Collision Finding
Samuel Jaques and André Schrottenloher
2020/423 ( PDF )
On One-way Functions and Kolmogorov Complexity
Yanyi Liu and Rafael Pass
2020/422 ( PDF )
Pattern Matching on Encrypted Data
Anis Bkakria and Nora Cuppens and Frédéric Cuppens
2020/421 ( PDF )
Multichain-MWPoW: A $p/2$ Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture
Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos
2020/420 ( PDF )
Practical Card-Based Protocol for Three-Input Majority
Kenji Yasunaga
2020/419 ( PDF )
Pointproofs: Aggregating Proofs for Multiple Vector Commitments
Sergey Gorbunov and Leonid Reyzin and Hoeteck Wee and Zhenfei Zhang
2020/418 ( PDF )
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
Krzysztof Pietrzak
2020/417 ( PDF )
Optimal strategies for CSIDH
Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez
2020/416 ( PDF )
The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-Rewinding Proofs for Schnorr Identification and Signatures
Mihir Bellare and Wei Dai
2020/415 ( PDF )
Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE
Shweta Agrawal and Alice Pellet-Mary
2020/414 ( PDF )
Semi-Quantum Money
Roy Radian and Or Sattath
2020/413 ( PDF )
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
Louis Goubin and Matthieu Rivain and Junwei Wang
2020/412 ( PDF )
Fixslicing: A New GIFT Representation
Alexandre Adomnicai and Zakaria Najm and Thomas Peyrin
2020/411 ( PDF )
Secure Two-Party Computation in a Quantum World
Niklas Büscher and Daniel Demmler and Nikolaos P. Karvelas and Stefan Katzenbeisser and Juliane Krämer and Deevashwer Rathee and Thomas Schneider and Patrick Struck
2020/410 ( PDF )
Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4
Hwajeong Seo and Mila Anastasova and Amir Jalali and Reza Azarderakhsh
2020/409 ( PDF )
Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes
Loïs Huguenin-Dumittan and Serge Vaudenay
2020/408 ( PDF )
Speed up over the Rainbow
Nir Drucker and Shay Gueron
2020/407 ( PDF )
Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection
Aydin Abadi and Sotirios Terzis and Changyu Dong
2020/406 ( PDF )
Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience
Atsuki Momose and Jason Paul Cruz and Yuichi Kaji
2020/405 ( PDF )
Ordinos: A Verifiable Tally-Hiding E-Voting System
Ralf Kuesters and Julian Liedtke and Johannes Mueller and Daniel Rausch and Andreas Vogt
2020/404 ( PDF )
From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards
Tassos Dimitriou
2020/403 ( PDF )
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
David Derler and Kai Samelin and Daniel Slamanig
2020/402 ( PDF )
A Note on Low Order Assumptions in RSA groups
István András Seres and Péter Burcsi
2020/401 ( PDF )
Mining for Privacy: How to Bootstrap a Snarky Blockchain
Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss
2020/400 ( PDF )
Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis
Jeroen Delvaux
2020/399 ( PDF )
Analysis of DP3T
Serge Vaudenay
2020/398 ( PDF )
CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures
Samuel Brack and Leonie Reichert and Björn Scheuermann
2020/397 ( PDF )
Classification of 4-bit S-boxes for BOGI-permutation
Seonggyeom Kim and Deukjo Hong and Jaechul Sung and Seokhie Hong
2020/396 ( PDF )
Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing
Donggeun Kwon and HeeSeok Kim and Seokhie Hong
2020/395 ( PDF )
Cryptography from Information Loss
Marshall Ball and Elette Boyle and Akshay Degwekar and Apoorvaa Deshpande and Alon Rosen and Vinod Vaikuntanathan and Prashant Nalini Vasudevan
2020/394 ( PDF )
Candidate iO from Homomorphic Encryption Schemes
Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta
2020/393 ( PDF )
LevioSA: Lightweight Secure Arithmetic Computation
Carmit Hazay and Yuval Ishai and Antonio Marcedone and Muthuramakrishnan Venkitasubramaniam
2020/392 ( PDF )
An argument on the security of LRBC, a recently proposed lightweight block cipher
Sadegh Sadeghi and Nasour Bagheri
2020/391 ( PDF )
Optimized CSIDH Implementation Using a 2-torsion Point
Donghoe Heo and Suhri Kim and Kisoon Yoon and Young-Ho Park and Seokhie Hong
2020/390 ( PDF )
A French cipher from the late 19th century
Rémi Géraud-Stewart and David Naccache
2020/389 ( PDF )
A Unary Cipher with Advantages over the Vernam Cipher
Gideon Samid
2020/388 ( PDF )
Fast 4 way vectorized ladder for the complete set of Montgomery curves
Huseyin Hisil and Berkan Egrice and Mert Yassi
2020/387 ( PDF )
Low-complexity and Reliable Transforms for Physical Unclonable Functions
Onur Gunlu and Rafael F. Schaefer
2020/386 ( PDF )
Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric
Ralf Kuesters and Daniel Rausch and Mike Simon
2020/385 ( PDF )
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality
Peihan Miao and Sarvar Patel and Mariana Raykova and Karn Seth and Moti Yung
2020/384 ( PDF )
A ”Final” Security Bug
Nguyen Thoi Minh Quan
2020/383 ( PDF )
Parallel strategies for SIDH: Towards computing SIDH twice as fast
Daniel Cervantes-Vázquez and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez
2020/382 ( PDF )
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection
Jan Bobolz and Fabian Eidens and Stephan Krenn and Daniel Slamanig and Christoph Striecks
2020/381 ( PDF )
Proof-of-Reputation Blockchain with Nakamoto Fallback
Leonard Kleinrock and Rafail Ostrovsky and Vassilis Zikas
2020/380 ( PDF )
Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory
Anirban Chakraborty and Sarani Bhattacharya and Sayandeep Saha and Debdeep Mukhopdhyay
2020/379 ( PDF )
Post-quantum WireGuard
Andreas Hülsing and Kai-Chun Ning and Peter Schwabe and Florian Weber and Philip R. Zimmermann
2020/378 ( PDF )
Efficient 4-way Vectorizations of the Montgomery Ladder
Kaushik Nath and Palash Sarkar
2020/377 ( PDF )
Oblivious tight compaction in O(n) time with smaller constant
Samuel Dittmer and Rafail Ostrovsky
2020/376 ( PDF )
On the privacy of a code-based single-server computational PIR scheme
Sarah Bordage and Julien Lavauzelle
2020/375 ( PDF )
Privacy-Preserving Contact Tracing of COVID-19 Patients
Leonie Reichert and Samuel Brack and Björn Scheuermann
2020/374 ( PDF )
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority
Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and abhi shelat and Muthu Venkitasubramaniam and Ruihan Wang
2020/373 ( PDF )
Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES
Huanyu Wang and Elena Dubrova
2020/372 ( PDF )
Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions
Claude Carlet
2020/371 ( PDF )
Single-Trace Attacks on Keccak
Matthias J. Kannwischer and Peter Pessl and Robert Primas
2020/370 ( PDF )
Multiparty Generation of an RSA Modulus
Megan Chen and Ran Cohen and Jack Doerner and Yashvanth Kondi and Eysa Lee and Schuyler Rosefield and abhi shelat
2020/369 ( PDF )
The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs
David Knichel and Thorben Moos and Amir Moradi
2020/368 ( PDF )
Defeating NewHope with a Single Trace
Dorian Amiet and Andreas Curiger and Lukas Leuenberger and Paul Zbinden
2020/367 ( PDF )
Exploiting Decryption Failures in Mersenne Number Cryptosystems
Marcel Tiepelt and Jan-Pieter D'Anvers
2020/366 ( PDF )
FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection
Hangwei Lu and Dhwani Mehta and Olivia Paradis and Navid Asadizanjani and Mark Tehranipoor and Damon L. Woodard
2020/365 ( PDF )
A New Algorithm to Find Monic Irreducible Polynomials over Extended Galois field GF prime p and extension q using Positional Arithmetic
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/364 ( PDF )
Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs
Behzad Abdolmaleki and Daniel Slamanig
2020/363 ( PDF )
On equivalence between known polynomial APN functions and power APN functions
Qianhong Wan and Longjiang Qu and Chao Li
2020/362 ( -- withdrawn -- )
Another Look at CBC Casper Consensus Protocol
Yongge Wang
2020/361 ( PDF )
How Not to Create an Isogeny-Based PAKE
Reza Azarderakhsh and David Jao and Brian Koziel and Jason T. LeGrow and Vladimir Soukharev and Oleg Taraskin
2020/360 ( PDF )
Composite Algorithm The New Algorithm to Search for Monic Irreducible Polynomials over Extended Galois Fields
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/359 ( PDF )
4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes.
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/358 ( PDF )
Division Algorithm to search for monic irreducible polynomials over extended Galois Field GF(p^q).
Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh
2020/357 ( PDF )
Quasigroups and Substitution Permutation Networks: A Failed Experiment
George Teseleanu
2020/356 ( PDF )
Efficient MPC with a Mixed Adversary
Martin Hirt and Marta Mularczyk
2020/355 ( PDF )
Permissionless Consensus in the Resource Model
Benjamin Terner
2020/354 ( PDF )
A Generalization of the ElGamal public-key cryptosystem
Rajitha Ranasinghe and Pabasara Athukorala
2020/353 ( PDF )
A Probabilistic Public Key Encryption Scheme Based on Quartic Reciprocity (Draft V1.22)
Robert A. Threlfall
2020/352 ( PDF )
Coda: Decentralized Cryptocurrency at Scale
Joseph Bonneau and Izaak Meckler and Vanishree Rao and Evan Shapiro
2020/351 ( PDF )
Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition
Youssef El Housni and Aurore Guillevic
2020/350 ( PDF )
New Multi-bit Differentials to Improve Attacks Against ChaCha
Murilo Coutinho and T. C. Souza Neto
2020/349 ( PDF )
Differential Power Analysis on (Non-)Linear Feedback Shift Registers
Siang Meng Sim
2020/348 ( PDF )
Constructing hidden order groups using genus three Jacobians
Steve Thakur
2020/347 ( PDF )
Some Low Round Zero Knowledge Protocols
Hongda Li and Peifang Ni and Dongxue Pan
2020/346 ( PDF )
Algebraic Attacks on Round-Reduced Keccak/Xoodoo
Fukang Liu and Takanori Isobe and Willi Meier and Zhonghao Yang
2020/345 ( PDF )
Bent functions stemming from Maiorana-McFarland class being provably outside its completed version
Fengrong Zhangand Nastja Cepak and Enes Pasalicand Yongzhuang Wei
2020/344 ( PDF )
Anchoring the Value of Cryptocurrency
Yibin Xu and Yangyu Huang and Jianhua Shao
2020/343 ( PDF )
BSC: A Bitcoin Smart Contract Implementation
Hiro Midas
2020/342 ( PDF )
Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge
Estuardo Alpirez Bock and Alexander Treff
2020/341 ( PDF )
Faster computation of isogenies of large prime degree
Daniel J. Bernstein and Luca De Feo and Antonin Leroux and Benjamin Smith
2020/340 ( PDF )
Differential Privacy for Eye Tracking with Temporal Correlations
Efe Bozkir and Onur Gunlu and Wolfgang Fuhl and Rafael F. Schaefer and Enkelejda Kasneci
2020/339 ( PDF )
Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics
George Teseleanu
2020/338 ( PDF )
Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits
Daniel Escudero and Satrajit Ghosh and Marcel Keller and Rahul Rachuri and Peter Scholl
2020/337 ( PDF )
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography
Nicholas Genise and Daniele Micciancio and Chris Peikert and Michael Walter
2020/336 ( PDF )
Gimli Encryption in 715.9 psec
Santosh Ghosh and Michael Kounavis and Sergej Deutsch
2020/335 ( PDF )
An n/2 byzantine node tolerated blockchain sharding approach
Yibin Xu and Yangyu Huang
2020/334 ( PDF )
4-Uniform Permutations with Null Nonlinearity
Christof Beierle and Gregor Leander
2020/333 ( -- withdrawn -- )
A Simpler and Modular Construction of Linkable Ring Signature
Wulu Li and Yongcan Wang and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2020/332 ( PDF )
Implementation Study of Two Verifiable Delay Functions
Vidal Attias and Luigi Vigneri and Vassil Dimitrov
2020/331 ( PDF )
The CTR mode with encrypted nonces and its extension to AE
Sergey Agievich
2020/330 ( PDF )
Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective
Gil Segev and Ido Shahaf
2020/329 ( PDF )
Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields
Gabrielle De Micheli and Pierrick Gaudry and Cécile Pierrot
2020/328 ( PDF )
Weight-Based Nakamoto-Style Blockchains
Simon Holmgaard Kamp and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Søren Eller Thomsen and Daniel Tschudi
2020/327 ( PDF )
On the design of stream ciphers with Cellular Automata having radius = 2
Anita John and Rohit Lakra and Jimmy Jose
2020/326 ( PDF )
An upper bound on the decryption failure rate of static-key NewHope
John M. Schanck
2020/325 ( PDF )
SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts
Robert Muth and Florian Tschorsch
2020/324 ( PDF )
Defeating CAS-Unlock
Bicky Shakya and Xiaolin Xu and Mark Tehranipoor and Domenic Forte
2020/323 ( PDF )
A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol
Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos
2020/322 ( PDF )
Optimal and Error-Free Multi-Valued Byzantine Consensus Through Parallel Execution
Andrew Loveless and Ronald Dreslinski and Baris Kasikci
2020/321 ( PDF )
Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism
Jose Maria Bermudo Mera and Furkan Turan and Angshuman Karmakar and Sujoy Sinha Roy and Ingrid Verbauwhede
2020/320 ( PDF )
Universally Composable Relaxed Password Authenticated Key Exchange
Michel Abdalla and Manuel Barbosa and Tatiana Bradley and Stanislaw Jarecki and Jonathan Katz and Jiayu Xu
2020/319 ( PDF )
Secure k-ish nearest neighbors classifier
Hayim Shaul and Dan Feldman and Daniela Rus
2020/318 ( PDF )
Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL
Huijia Lin and Ji Luo
2020/317 ( PDF )
Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure
Archisman Ghosh and Debayan Das and Shreyas Sen
2020/316 ( PDF )
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
Rishab Goyal and Sam Kim and Brent Waters and David J. Wu
2020/315 ( PDF )
plookup: A simplified polynomial protocol for lookup tables
Ariel Gabizon and Zachary J. Williamson
2020/314 ( PDF )
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA
Shigeo Tsujii and Ryo Fujita and Masahito Gotaishi
2020/313 ( PDF )
Security analysis of SPAKE2+
Victor Shoup
2020/312 ( -- withdrawn -- )
Arcturus: efficient proofs for confidential transactions
Sarang Noether
2020/311 ( PDF )
A Blockchain Traceable Scheme with Oversight Function
Tianjun Ma and Haixia Xu and Peili Li
2020/310 ( PDF )
Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis
Gabriel Destouet and Cécile Dumas and Anne Frassati and Valérie Perrier
2020/309 ( PDF )
Cryptanalysis Results on Spook
Patrick Derbez and Paul Huynh and Virginie Lallemand and María Naya-Plasencia and Léo Perrin and André Schrottenloher
2020/308 ( PDF )
Post-Quantum TLS on Embedded Systems
Kevin Bürstinghaus-Steinbach and Christoph Krauß and Ruben Niederhagen and Michael Schneider
2020/307 ( PDF )
Handling vectorial functions by means of their graph indicators
Claude Carlet
2020/306 ( PDF )
Leakage Assessment in Fault Attacks: A Deep Learning Perspective
Sayandeep Saha and Manaar Alam and Arnab Bag and Debdeep Mukhopadhyay and Pallab Dasgupta
2020/305 ( PDF )
3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA
Shigeo Tsujii and Toshiaki Saisho and Masao Yamasawa and Masahito Gotaishi and Kou Shikata and Koji Sasaki and Nobuharu Suzuki and Masaki Hashiyada
2020/304 ( PDF )
Multiparty Homomorphic Encryption from Ring-Learning-With-Errors
Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Philippe Bossuat and Jean-Pierre Hubaux
2020/303 ( PDF )
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Sergei Tikhomirov and Pedro Moreno-Sanchez and Matteo Maffei
2020/302 ( PDF )
Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers
Thomas Kaeding
2020/301 ( PDF )
MadHatter: A toy cipher that conceals two plaintexts in the same ciphertext
Thomas Kaeding
2020/300 ( PDF )
Secure Multiparty Computation (MPC)
Yehuda Lindell
2020/299 ( PDF )
Hydra: Fast Isomorphic State Channels
Manuel M. T. Chakravarty and Sandro Coretti and Matthias Fitzi and Peter Gazi and Philipp Kant and Aggelos Kiayias and Alexander Russell
2020/298 ( PDF )
Fast polynomial inversion for post quantum QC-MDPC cryptography
Nir Drucker and Shay Gueron and Dusan Kostic
2020/297 ( PDF )
Random Self-reducibility of Ideal-SVP via Arakelov Random Walks
Koen de Boer and Léo Ducas and Alice Pellet-Mary and Benjamin Wesolowski
2020/296 ( PDF )
Multidimensional Database Reconstruction from Range Query Access Patterns
Akshima and David Cash and Francesca Falzon and Adam Rivkin and Jesse Stern
2020/295 ( PDF )
Generalized Isotopic Shift Construction for APN Functions
Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert Coulter and Irene Villa
2020/294 ( PDF )
Public-Key Generation with Verifiable Randomness
Olivier Blazy and Patrick Towa and Damien Vergnaud
2020/293 ( PDF )
Many-out-of-Many Proofs and Applications to Anonymous Zether
Benjamin E. Diamond
2020/292 ( PDF )
LWE with Side Information: Attacks and Concrete Security Estimation
Dana Dachman-Soled and Léo Ducas and Huijing Gong and Mélissa Rossi
2020/291 ( -- withdrawn -- )
Unforgeability in the quantum world
Myrto Arapinis and Mahshid Delavar and Mina Doosti and Elham Kashefi
2020/290 ( PDF )
Linear Cryptanalysis of Reduced-Round SIMON Using Super Rounds
Reham Almukhlifi and Poorvi Vora
2020/289 ( PDF )
The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves
Jonathan Lee
2020/288 ( PDF )
Secure Key-Alternating Feistel Ciphers Without Key Schedule
Yaobin Shen and Hailun Yan and Lei Wang and Xuejia Lai
2020/287 ( PDF )
Private resource allocators and their applications
Sebastian Angel and Sampath Kannan and Zachary Ratliff
2020/286 ( PDF )
Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages
Geoffroy Couteau and Dominik Hartmann
2020/285 ( PDF )
Improved Security Bounds for Generalized Feistel Networks
Yaobin Shen and Chun Guo and Lei Wang
2020/284 ( PDF )
Database Reconstruction Attacks in Two Dimensions
Evangelia Anna Markatou and Roberto Tamassia
2020/283 ( PDF )
CryptoWills: How to Bequeath Cryptoassets
István András Seres and Omer Shlomovits and Pratyush Ranjan Tiwari
2020/282 ( PDF )
The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
Jelle Don and Serge Fehr and Christian Majenz
2020/281 ( PDF )
Privacy-friendly Monero transaction signing on a hardware wallet, extended version
Dusan Klinec Vashek Matyas
2020/280 ( PDF )
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
Juliane Krämer and Patrick Struck
2020/279 ( PDF )
Impact of System-on-Chip Integration of AEAD Ciphers
Shashank Raghuraman and Leyla Nazhandali
2020/278 ( PDF )
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs
Ahmed Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Dawn Song
2020/277 ( PDF )
Full Analysis of Nakamoto Consensus in Bounded-Delay Networks
Juan Garay and Aggelos Kiayias and Nikos Leonardos
2020/276 ( PDF )
CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware
Hamid Nejatollahi and Saransh Gupta and Mohsen Imani and Tajana Simunic Rosing and Rosario Cammarota and Nikil Dutt
2020/275 ( PDF )
Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function
Jannis Bossert and Eik List and Stefan Lucks and Sebastian Schmitz
2020/274 ( PDF )
An Optimal Relational Database Encryption Scheme
Seny Kamara and Tarik Moataz and Stan Zdonik and Zheguang Zhao
2020/273 ( PDF )
On the Fast Algebraic Immunity of Threshold Functions
Pierrick Méaux
2020/272 ( PDF )
Privacy-Preserving Fast and Exact Linear Equations Solver with Fully Homomorphic Encryption
Keita Arimitsu and Kazuki Otsuka
2020/271 ( PDF )
Signatures from Sequential-OR Proofs
Marc Fischlin and Patrick Harasser and Christian Janson
2020/270 ( PDF )
Practical Predicate Encryption for Inner Product
Yi-Fan Tseng and Zi-Yuan Liu and Raylin Tso
2020/269 ( PDF )
Order-Fairness for Byzantine Consensus
Mahimna Kelkar and Fan Zhang and Steven Goldfeder and Ari Juels
2020/268 ( PDF )
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography
Jose Maria Bermudo Mera and Angshuman Karmakar and Ingrid Verbauwhede
2020/267 ( PDF )
Differential Power Analysis of the Picnic Signature Scheme
Tim Gellersen and Okan Seker and Thomas Eisenbarth
2020/266 ( PDF )
Quantum Indistinguishability for Public Key Encryption
Tommaso Gagliardoni and Juliane Krämer and Patrick Struck
2020/265 ( PDF )
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More
Benoît Libert and Alain Passelègue and Hoeteck Wee and David J. Wu
2020/264 ( PDF )
Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes
Nicholas Mainardi and Alessandro Barenghi and Gerardo Pelosi
2020/263 ( PDF )
FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups
Jihoon Kwon and Byeonghak Lee and Jooyoung Lee and and Dukjae Moon
2020/262 ( PDF )
A Note on the Ending Elliptic Curve in SIDH
Christopher Leonardi
2020/261 ( PDF )
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices
Matthieu Monteiro and Kumara Kahatapitiya and Hassan Jameel Asghar and Kanchana Thilakarathna and Thierry Rakotoarivelo and Dali Kaafar and Shujun Li and Ron Steinfeld and Josef Pieprzyk
2020/260 ( PDF )
Lattice-based (Partially) Blind Signature without Restart
Samuel Bouaziz-Ermann and Sébastien Canard and Gautier Eberhart and Guillaume Kaim and Adeline Roux-Langlois and Jacques Traoré
2020/259 ( PDF )
Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors
Divesh Aggarwal and Maciej Obremski and João Ribeiro and Mark Simkin and Luisa Siniscalchi
2020/258 ( PDF )
NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations
Zvika Brakerski and Venkata Koppula and Tamer Mour
2020/257 ( PDF )
Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication
Onur Gunlu and Rafael F. Schaefer and H. Vincent Poor
2020/256 ( PDF )
Statistical ZAPR Arguments from Bilinear Maps
Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs
2020/255 ( PDF )
Novel Deception Techniques for Malware Detection on Industrial Control Systems
Takanori Machida and Dai Yamamoto and Yuki Unno and Hisashi Kojima
2020/254 ( PDF )
Formalizing Data Deletion in the Context of the Right to be Forgotten
Sanjam Garg and Shafi Goldwasser and Prashant Nalini Vasudevan
2020/253 ( PDF )
Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing
Hemanta K. Maji and Mingyuan Wang
2020/252 ( PDF )
Secure Non-interactive Simulation: Feasibility & Rate
Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen
2020/251 ( PDF )
Communication Lower Bounds for Perfect Maliciously Secure MPC
Ivan Damgård and Nikolaj I. Schwartzbach
2020/250 ( PDF )
On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations
Ehsan Aerabi and Athanasios Papadimitriou and David Hely
2020/249 ( -- withdrawn -- )
CONFISCA : an SIMD-based CONcurrent FI and SCA countermeasure with switchable performance and security modes
Ehsan Aerabi and Cyril Bresch and David Hély and Athanasios Papadimitriou and Mahdi Fazeli
2020/248 ( PDF )
Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast
Ittai Abraham and Benny Pinkas and Avishay Yanai
2020/247 ( -- withdrawn -- )
Crooked Indifferentiability Revisited
Rishiraj Bhattacharyya and Mridul Nandi and Anik Raychaudhuri
2020/246 ( PDF )
Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography
Jing Tian and Jun Lin and Zhongfeng Wang
2020/245 ( PDF )
New Assumptions and Efficient Cryptosystems from the $e$-th Power Residue Symbol
Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao and Licheng Wang and Zhusen Liu
2020/244 ( PDF )
On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol
Andrea Basso and Péter Kutas and Simon-Philipp Merz and Christophe Petit and Charlotte Weitkämper
2020/243 ( PDF )
An Analysis of Hybrid Public Key Encryption
Benjamin Lipp
2020/242 ( -- withdrawn -- )
Practical and Secure Circular Range Search on Private Spatial Data
Zhihao Zheng and Jiachen Shen and Zhenfu Cao
2020/241 ( PDF )
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability
Mihir Bellare and Hannah Davis and Felix Günther
2020/240 ( PDF )
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture
T-H. Hubert Chan and Kai-Min Chung and Wei-Kai Lin and Elaine Shi
2020/239 ( PDF )
Viktoria: A new Paradigm for Hash Functions
Edimar Veríssimo
2020/238 ( PDF )
Efficient ECM factorization in parallel with the Lyness map
Andrew Hone
2020/237 ( PDF )
On Security Notions for Encryption in a Quantum World
Céline Chevalier and Ehsan Ebrahimi and Quoc-Huy Vu
2020/236 ( PDF )
Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21
Mridul Nandi
2020/235 ( PDF )
Statistical Zaps and New Oblivious Transfer Protocols
Vipul Goyal and Abhishek Jain and Zhengzhong Jin and and Giulio Malavolta
2020/234 ( PDF )
Application of commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups to Key Exchange Protocol
Ruslan V. Skuratovskii and Aled Williams
2020/233 ( PDF )
Key-Homomorphic Pseudorandom Functions from LWE with a Small Modulus
Sam Kim
2020/232 ( PDF )
Combiners for AEAD
Bertram Poettering and Paul Rösler
2020/231 ( PDF )
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions
Nuttapong Attrapadung and Junichi Tomida
2020/230 ( PDF )
Lattice analysis on MiNTRU problem
Changmin Lee and Alexandre Wallet
2020/229 ( PDF )
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications
Itai Dinur
2020/228 ( PDF )
Optimal Broadcast Encryption from Pairings and LWE
Shweta Agrawal and Shota Yamada
2020/227 ( PDF )
About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10
Yindong Chen, Limin Lin, Chuliang Wei
2020/226 ( PDF )
Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol
Meher Krishna Duggirala and Ravi Duggirala and Krishna Subba Rao Pulugurtha
2020/225 ( PDF )
Generic-Group Delay Functions Require Hidden-Order Groups
Lior Rotem and Gil Segev and Ido Shahaf
2020/224 ( PDF )
Security under Message-Derived Keys: Signcryption in iMessage
Mihir Bellare and Igors Stepanovs
2020/223 ( PDF )
Compact NIZKs from Standard Assumptions on Bilinear Maps
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2020/222 ( PDF )
Improving Speed and Security in Updatable Encryption Schemes
Dan Boneh and Saba Eskandarian and Sam Kim and Maurice Shih
2020/221 ( PDF )
Multiparty Reusable Non-Interactive Secure Computation
Fabrice Benhamouda and Huijia Lin
2020/220 ( PDF )
Remote Side-Channel Attacks on Anonymous Transactions
Florian Tramèr and Dan Boneh and Kenneth G. Paterson
2020/219 ( PDF )
Multi-Client Functional Encryption for Separable Functions
Michele Ciampi and Luisa Siniscalchi and Hendrik Waldner
2020/218 ( PDF )
Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs
Ehsan Aerabi and Milad Bohlouli and MohammadHasan Ahmadi Livany and Mahdi Fazeli and Athanasios Papadimitriou and David Hely
2020/217 ( PDF )
SynFi: Automatic Synthetic Fingerprint Generation
M. Sadegh Riazi and Seyed M. Chavoshian and Farinaz Koushanfar
2020/216 ( PDF )
Black-Box Constructions of Bounded-Concurrent Secure Computation
Sanjam Garg and Xiao Liang and Omkant Pandey and Ivan Visconti
2020/215 ( PDF )
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption
Megumi Ando and Anna Lysyanskaya
2020/214 ( PDF )
Thresholdizing HashEdDSA: MPC to the Rescue
Charlotte Bonte and Nigel P. Smart and Titouan Tanguy
2020/213 ( PDF )
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound
Akinori Hosoyamada and Yu Sasaki
2020/212 ( PDF )
Isogenies of certain abelian varieties over finite fields with p-ranks zero
Steve Thakur
2020/211 ( PDF )
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle
Davide Bellizia and Olivier Bronchain and Gaëtan Cassiers and Vincent Grosso and Chun Guo and Charles Momin and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2020/210 ( PDF )
SITM: See-In-The-Middle--Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers
Shivam Bhasin and Jakub Breier and Xiaolu Hou and Dirmanto Jap and Romain Poussier and Siang Meng Sim
2020/209 ( PDF )
Adaptive Simulation Security for Inner Product Functional Encryption
Shweta Agrawal and Benoît Libert and Monosij Maitra and Radu Titiu
2020/208 ( PDF )
Random Integer Lattice Generation via HNF
Gengran Hu and Lin You and Liqin Hu and Hui Wang
2020/207 ( PDF )
(Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge
Carsten Baum and Bernardo David and Rafael Dowsley
2020/206 ( -- withdrawn -- )
A Post-Quantum Non-Interactive Key-Exchange Protocol from Coding Theory
Jean-Francois Biasse and Giacomo Micheli and Edoardo Persichetti and Paolo Santini
2020/205 ( PDF )
SodsBC: A Post-quantum by Design Asynchronous Blockchain Framework
Shlomi Dolev and Bingyong Guo and Jianyu Niu and Ziyu Wang
2020/204 ( PDF )
Cryptographic Reverse Firewalls for Interactive Proof Systems
Chaya Ganesh and Bernardo Magri and Daniele Venturi
2020/203 ( PDF )
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework
Thang Hoang and Jorge Guajardo and Attila A. Yavuz
2020/202 ( PDF )
Strong Anti-SAT: Secure and Effective Logic Locking
Yuntao Liu and Michael Zuzak and Yang Xie and Abhishek Chakraborty and Ankur Srivastava
2020/201 ( PDF )
A Survey on Neural Trojans
Yuntao Liu and Ankit Mondal and Abhishek Chakraborty and Michael Zuzak and Nina Jacobsen and Daniel Xing and Ankur Srivastava
2020/200 ( PDF )
Leakage and Tamper Resilient Permutation-Based Cryptography
Christoph Dobraunig and Bart Mennink and Robert Primas
2020/199 ( PDF )
Improvement on a Masked White-box Cryptographic Implementation
Seungkwang Lee and Myungchul Kim
2020/198 ( PDF )
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors
Shi Bai and Dipayan Das and Ryo Hiromasa and Miruna Rosca and Amin Sakzad and Damien Stehlé and Ron Steinfeld and Zhenfei Zhang
2020/197 ( PDF )
Dynamic Decentralized Functional Encryption
Jérémy Chotard and Edouard Dufour-Sans and Romain Gay and Duong Hieu Phan and David Pointcheval
2020/196 ( PDF )
Trustless unknown-order groups
Samuel Dobson and Steven D. Galbraith and Benjamin Smith
2020/195 ( PDF )
Replicated state machines without replicated execution
Jonathan Lee and Kirill Nikitin and Srinath Setty
2020/194 ( PDF )
Adaptively Secure ABE for DFA from k-Lin and More
Junqing Gong and Hoeteck Wee
2020/193 ( PDF )
PSI from PaXoS: Fast, Malicious Private Set Intersection
Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai
2020/192 ( -- withdrawn -- )
Certificateless Homomorphic Signature Scheme for Network Coding
Jinyong Chang and Bilin Shao and Yanyan Ji and Genqing Bian
2020/191 ( PDF )
Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE
Zvika Brakerski and Vinod Vaikuntanathan
2020/190 ( PDF )
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees
Assimakis Kattis and Joseph Bonneau
2020/189 ( PDF )
Guaranteed Output Delivery Comes Free in Honest Majority MPC
Vipul Goyal and Yifan Song and Chenzhi Zhu
2020/188 ( PDF )
Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer
2020/187 ( PDF )
Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack
Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart
2020/186 ( PDF )
Bitcoin Crypto–Bounties for Quantum Capable Adversaries
Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt
2020/185 ( PDF )
Hardware Private Circuits: From Trivial Composition to Full Verification
Gaëtan Cassiers and Benjamin Grégoire and Itamar Levi and François-Xavier Standaert
2020/184 ( PDF )
Fair and Decentralized Exchange of Digital Goods
Ariel Futoransky and Carlos Sarraute and Daniel Fernandez and Matias Travizano and Ariel Waissbein
2020/183 ( PDF )
A note on secure multiparty computation via higher residue symbols
Ignacio Cascudo and Reto Schnyder
2020/182 ( PDF )
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Maria Eichlseder and Lorenzo Grassi and Reinhard Lüftenegger and Morten Øygarden and Christian Rechberger and Markus Schofnegger and Qingju Wang
2020/181 ( PDF )
$L_1$-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space
Kohei Nakagawa and Hiroshi Onuki and Atsushi Takayasu and Tsuyoshi Takagi
2020/180 ( PDF )
Multi-key Fully-Homomorphic Encryption in the Plain Model
Prabhanjan Ananth and Abhishek Jain and ZhengZhong Jin and Giulio Malavolta
2020/179 ( PDF )
Mind the Middle Layer: The HADES Design Strategy Revisited
Nathan Keller and Asaf Rosemarin
2020/178 ( PDF )
A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device
Santosh Ghosh and Luis S Kida and Soham Jayesh Desai and Reshma Lal
2020/177 ( PDF )
Revisiting (R)CCA Security and Replay Protection
Christian Badertscher and Ueli Maurer and Christopher Portmann and Guilherme Rito
2020/176 ( PDF )
Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version)
Eugene Frimpong and Alexandros Bakas and Hai-Van Dang and Antonis Michalas
2020/175 ( PDF )
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
Stefan Dziembowski and Grzegorz Fabiański and Sebastian Faust and Siavash Riahi
2020/174 ( PDF )
On Selective-Opening Security of Deterministic Primitives
Mohammad Zaheri and Adam O'Neill
2020/173 ( PDF )
Securing Proof-of-Work Ledgers via Checkpointing
Dimitris Karakostas and Aggelos Kiayias
2020/172 ( PDF )
Qubit-based Unclonable Encryption with Key Recycling
Daan Leermakers and Boris Skoric
2020/171 ( PDF )
High Performance Logistic Regression for Privacy-Preserving Genome Analysis
Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen and Ariel Todoki
2020/170 ( PDF )
Reusable Two-Round MPC from DDH
James Bartusek and Sanjam Garg and Daniel Masny and Pratyay Mukherjee
2020/169 ( PDF )
Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE)
Prabhanjan Ananth and Abhishek Jain and Zhengzhong Jin
2020/168 ( PDF )
Improved Classical and Quantum Algorithms for Subset-Sum
Xavier Bonnetain and Rémi Bricout and André Schrottenloher and Yixin Shen
2020/167 ( PDF )
Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning
Jinhyun So and Basak Guler and A. Salman Avestimehr
2020/166 ( PDF )
Non Atomic Payment Splitting in Channel Networks
Stefan Dziembowski and Paweł Kędzior
2020/165 ( PDF )
Subsampling and Knowledge Distillation On Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations
Aron Gohr and Sven Jacob and Werner Schindler
2020/164 ( PDF )
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way?
Alex Bienstock and Allison Bishop and Eli Goldin and Garrison Grogan and Victor Lecomte
2020/163 ( PDF )
Impossibility Results for Lattice-Based Functional Encryption Schemes
Akin Ünal
2020/162 ( PDF )
A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity
Ignacio Cascudo and Jaron Skovsted Gundersen
2020/161 ( PDF )
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact
Hanlin Liu and Yu Yu and Shuoyao Zhao and Jiang Zhang and Wenling Liu and Zhenkai Hu
2020/160 ( PDF )
Solving Some Affine Equations over Finite Fields
Sihem Mesnager and Kwang Ho Kim and Jong Hyok Choe and Dok Nam Lee
2020/159 ( PDF )
Privacy-preserving collaborative machine learning on genomic data using TensorFlow
Cheng Hong and Zhicong Huang and Wen-jie Lu and Hunter Qu and Li Ma and Morten Dahl and Jason Mancuso
2020/158 ( PDF )
Jump index in T-functions for designing a new basic structure of stream ciphers
Ali Hadipour and Seyed Mahdi Sajadieh and Raheleh Afifi
2020/157 ( PDF )
Multi-Source Non-Malleable Extractors and Applications
Vipul Goyal and Akshayaram Srinivasan and Chenzhi Zhu
2020/156 ( PDF )
Phantom: An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts
Xing Li and Yi Zheng and Kunxian Xia and Tongcheng Sun and John Beyler
2020/155 ( PDF )
Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference
Yifan Tian and Laurent Njilla and Jiawei Yuan and Shucheng Yu
2020/154 ( PDF )
Combiners for Functional Encryption, Unconditionally
Aayush Jain and Nathan Manohar and Amit Sahai
2020/153 ( PDF )
Constructing Secure Multi-Party Computation with Identifiable Abort
Nicholas-Philip Brandt and Sven Maier and Tobias Müller and Jörn Müller-Quade
2020/152 ( PDF )
Compressed $\Sigma$-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics
Thomas Attema and Ronald Cramer
2020/151 ( PDF )
Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
Wouter Castryck and Jana Sotáková and Frederik Vercauteren
2020/150 ( PDF )
On the Security of NTS-KEM in the Quantum Random Oracle Model
Varun Maram
2020/149 ( PDF )
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage
Matteo Campanelli and Dario Fiore and Nicola Greco and Dimitris Kolonelos and Luca Nizzardo
2020/148 ( PDF )
Determining the Core Primitive for Optimally Secure Ratcheting
Fatih Balli and Paul Rösler and Serge Vaudenay
2020/147 ( PDF )
Non-Malleability against Polynomial Tampering
Marshall Ball and Eshan Chattopadhyay and Jyun-Jie Liao and Tal Malkin and Li-Yang Tan
2020/146 ( PDF )
Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security
Roman Langrehr and Jiaxin Pan
2020/145 ( PDF )
Self-Secured PUF: Protecting the Loop PUF by Masking
Lars Tebelmann and Jean-Luc Danger and Michael Pehl
2020/144 ( PDF )
Double-Base Chains for Scalar Multiplications on Elliptic Curves
Wei Yu and Saud Al Musa and Bao Li
2020/143 ( PDF )
Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT
Hailong Yao and Caifen Wang* and Xingbing Fu and Chao Liu and Bin Wu and Fagen Li
2020/142 ( PDF )
TARDIGRADE: An Atomic Broadcast Protocol for Arbitrary Network Conditions
Erica Blum and Jonathan Katz and Julian Loss
2020/141 ( PDF )
Deterministic-Prover Zero-Knowledge Proofs
Hila Dahari and Yehuda Lindell
2020/140 ( PDF )
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model
Shaoquan Jiang and Guang Gong and Jingnan He and Khoa Nguyen and Huaxiong Wang
2020/139 ( PDF )
Going Beyond Dual Execution: MPC for Functions with Efficient Verification
Carmit Hazay and abhi shelat and Muthuramakrishnan Venkitasubramaniam
2020/138 ( PDF )
Smart Contract Derivatives
Kostis Karantias and Aggelos Kiayias and Dionysis Zindros
2020/137 ( PDF )
Consistency for Functional Encryption
Christian Badertscher and Aggelos Kiayias and Markulf Kohlweiss and Hendrik Waldner
2020/136 ( PDF )
Stacked Garbling for Disjunctive Zero-Knowledge Proofs
David Heath and Vladimir Kolesnikov
2020/135 ( PDF )
Threshold Ring Signatures: New Definitions and Post-Quantum Security
Abida Haque and Alessandra Scafuro
2020/134 ( PDF )
Malicious Security Comes Free in Honest-Majority MPC
Vipul Goyal and Yifan Song
2020/133 ( PDF )
Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware
Souradyuti Paul and Ananya Shrivastava
2020/132 ( PDF )
Boosting Verifiable Computation on Encrypted Data
Dario Fiore and Anca Nitulescu and David Pointcheval
2020/131 ( PDF )
Coin Tossing with Lazy Defense: Hardness of Computation Results
Hamidreza Amini Khorasgani and Hemanta K. Maji and Mingyuan Wang
2020/130 ( PDF )
Breaking the $O(\sqrt n)$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party
Elette Boyle and Ran Cohen and Aarushi Goel
2020/129 ( PDF )
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
Juliane Krämer and Patrick Struck
2020/128 ( PDF )
LegRoast: Efficient post-quantum signatures from the Legendre PRF
Ward Beullens and Cyprien Delpech de Saint Guilhem
2020/127 ( PDF )
Fifty Shades of Ballot Privacy: Privacy against a Malicious Board
Véronique Cortier and Joseph Lallemand and Bogdan Warinschi
2020/126 ( PDF )
Public-Key Puncturable Encryption: Modular and Compact Constructions
Shi-Feng Sun and Amin Sakzad and Ron Steinfeld and Joseph Liu and Dawu Gu
2020/125 ( PDF )
Oblivious Parallel Tight Compaction
Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Enoch Peserico and Elaine Shi
2020/124 ( PDF )
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512
Ali El Kaafarani and Shuichi Katsumata and Federico Pintore
2020/123 ( PDF )
Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains
Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov
2020/122 ( PDF )
Verifiable Inner Product Encryption Scheme
Najmeh Soroush and Vincenzo Iovino and Alfredo Rial and Peter B. Roenne and Peter Y. A. Ryan
2020/121 ( PDF )
When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead
Hao Chen and Ilia Iliashenko and Kim Laine
2020/120 ( PDF )
The randomized slicer for CVPP: sharper, faster, smaller, batchier
Léo Ducas and Thijs Laarhoven and Wessel P.J. van Woerden
2020/119 ( PDF )
Hardness of LWE on General Entropic Distributions
Zvika Brakerski and Nico Döttling
2020/118 ( PDF )
InfoCommit: Information-Theoretic Polynomial Commitment and Verification
Saeid Sahraei and Salman Avestimehr
2020/117 ( PDF )
Efficient BIKE Hardware Design with Constant-Time Decoder
Andrew Reinders and Rafael Misoczki and Santosh Ghosh and Manoj Sastry
2020/116 ( PDF )
Separating Two-Round Secure Computation from Oblivious Transfer
Benny Applebaum and Zvika Brakerski and Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan
2020/115 ( PDF )
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
Xavier Boyen and Thomas Haines and Johannes Mueller
2020/114 ( PDF )
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
Antoine Delignat-Lavaud and Cédric Fournet and Bryan Parno and Jonathan Protzenko and Tahina Ramananandro and Jay Bosamiya and Joseph Lallemand and Itsaka Rakotonirina and Yi Zhou
2020/113 ( PDF )
New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve
Madhurima Mukhopadhyay and Palash Sarkar and Shashank Singh and Emmanuel Thome
2020/112 ( PDF )
A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography
Patrick Karl and Michael Tempelmeier
2020/111 ( PDF )
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2020/110 ( PDF )
Blazing Fast OT for Three-Round UC OT Extension
Ran Canetti and Pratik Sarkar and Xiao Wang
2020/109 ( PDF )
Fixing the Achilles Heel of E-Voting: The Bulletin Board
Lucca Hirschi and Lara Schmid and David Basin
2020/108 ( PDF )
Practical Forgeries for ORANGE
Christoph Dobraunig and Florian Mendel and Bart Mennink
2020/107 ( PDF )
One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication
Ryan Amos and Marios Georgiou and Aggelos Kiayias and Mark Zhandry
2020/106 ( PDF )
Relaxed freshness in component authentication
Frank Schuhmacher
2020/105 ( PDF )
MCU intrinsic group features for component authentication
Frank Schuhmacher
2020/104 ( PDF )
On the Security Goals of White-Box Cryptography
Estuardo Alpirez Bock and Alessandro Amadori and Chris Brzuska and Wil Michiels
2020/103 ( PDF )
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128
Boxin Zhao and Xiaoyang Dong and Keting Jia and Willi Meier
2020/102 ( PDF )
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
Boxin Zhao and Xiaoyang Dong and Keting Jia
2020/101 ( PDF )
A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future
Haibat Khan and Keith M. Martin
2020/100 ( PDF )
A direct proof of APN-ness of the Kasami functions
Claude Carlet and Kwang Ho Kim and Sihem Mesnager
2020/099 ( PDF )
Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange
Benjamin Dowling and Torben Brandt Hansen and Kenneth G. Paterson
2020/098 ( PDF )
Improved key recovery on the Legendre PRF
Novak Kaluđerović and Thorsten Kleinjung and Dusan Kostic
2020/097 ( PDF )
Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard
Stanislav S. Malakhov
2020/096 ( PDF )
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons
David Galindo and Jia Liu and Mihai Ordean and Jin-Mann Wong
2020/095 ( PDF )
SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors
Zhongxiang Zheng and Anyu Wang and Haining Fan and Chunhuan Zhao and Chao Liu and Xue Zhang
2020/094 ( PDF )
On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms
Michael Davidson and Tyler Diamond
2020/093 ( PDF )
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
Romain Gay
2020/092 ( PDF )
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees
Daniel Jost and Ueli Maurer
2020/091 ( PDF )
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption
Jonathan Takeshita and Matthew Schoenbauer and Ryan Karl and Taeho Jung
2020/090 ( PDF )
Witness Maps and Applications
Suvradip Chakraborty and Manoj Prabhakaran and Daniel Wichs
2020/089 ( PDF )
The MILP-Aided Conditional Differential Attack and Its Application to Trivium
Chen-Dong Ye and Tian Tian and Fan-Yang Zeng
2020/088 ( PDF )
Streamlet: Textbook Streamlined Blockchains
Benjamin Y Chan and Elaine Shi
2020/087 ( PDF )
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey)
Elaine Shi
2020/086 ( PDF )
Bootstrapping in FHEW-like Cryptosystems
Daniele Micciancio and Yuriy Polyakov
2020/085 ( PDF )
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems
Ben Nassi and Dudi Nassi and Raz Ben-Netanel and Yisroel Mirsky and Oleg Drokin and Yuval Elovici
2020/084 ( PDF )
Bandwidth-efficient threshold EC-DSA
Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
2020/083 ( PDF )
Metal: A Metadata-Hiding File-Sharing System
Weikeng Chen and Raluca Ada Popa
2020/082 ( PDF )
Random Walks and Concurrent Zero-Knowledge
Anand Aiyer and Xiao Liang and Nilu Nalini and Omkant Pandey
2020/081 ( PDF )
Efficient polynomial commitment schemes for multiple points and polynomials
Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon
2020/080 ( PDF )
Better Secret-Sharing via Robust Conditional Disclosure of Secrets
Benny Applebaum and Amos Beimel and Oded Nir and Naty Peter
2020/079 ( PDF )
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective
Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
2020/078 ( PDF )
Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo
Kentaro Tamura and Yutaka Shikano
2020/077 ( PDF )
Improved Quantum Circuits for Elliptic Curve Discrete Logarithms
Thomas Häner and Samuel Jaques and Michael Naehrig and Martin Roetteler and Mathias Soeken
2020/076 ( PDF )
Wyner-Ziv reconciliation for key exchange based on Ring-LWE
Charbel Saliba and Laura Luzzi and Cong Ling
2020/075 ( PDF )
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms
Rishiraj Bhattacharyya
2020/074 ( PDF )
Rolling up sleeves when subversion's in a field?
Daniel R. L. Brown
2020/073 ( PDF )
Anonymous Symmetric-Key Communication
Fabio Banfi and Ueli Maurer
2020/072 ( PDF )
Efficient Anonymous Tokens with Private Metadata Bit
Ben Kreuter and Tancrede Lepoint and Michele Orrù and Mariana Raykova
2020/071 ( PDF )
Post-Quantum Authentication in TLS 1.3: A Performance Study
Dimitrios Sikeridis and Panos Kampanakis and Michael Devetsikiotis
2020/070 ( PDF )
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
Thomas Agrikola and Dennis Hofheinz and Julia Kastner
2020/069 ( PDF )
RSA and redactable blockchains
Dima Grigoriev and Vladimir Shpilrain
2020/068 ( PDF )
Further Clarification on Mantin's Digraph Repetition Bias in RC4
Pranab Chakraborty and Subhamoy Maitra
2020/067 ( PDF )
Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse
Taylor R Campbell
2020/066 ( PDF )
Talek: Private Group Messaging with Hidden Access Patterns
Raymond Cheng and William Scott and Elisaweta Masserova and Irene Zhang and Vipul Goyal and Thomas Anderson and Arvind Krishnamurthy and Bryan Parno
2020/065 ( PDF )
A Performant, Misuse-Resistant API for Primality Testing
Jake Massimo and Kenneth G. Paterson
2020/064 ( -- withdrawn -- )
Dual System in Lattice: Fully Secure ABE from LWE Assumption
Geng Wang and Ming Wan and Zhen Liu and Dawu Gu
2020/063 ( PDF )
Attack on LAC Key Exchange in Misuse Situation
Aurelien Greuet and Simon Montoya and Guenael Renault
2020/062 ( PDF )
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
Behzad Abdolmaleki and Sebastian Ramacher and Daniel Slamanig
2020/061 ( PDF )
Simple Schnorr Signature with Pedersen Commitment as Key
Gary Yu
2020/060 ( PDF )
Auditable Asymmetric Password Authenticated Public Key Establishment
Antonio Faonio and Maria Isabel Gonzalez Vasco and Claudio Soriente and Hien Thi Thu Truong
2020/059 ( PDF )
ARX-KW, a family of key wrapping constructions using SipHash and ChaCha
Satō Shinichi
2020/058 ( PDF )
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis
Guilherme Perin and Ileana Buhan and Stjepan Picek
2020/057 ( PDF )
On the smoothing parameter and last minimum of random orthogonal lattices
Elena Kirshanova and Huyen Nguyen and Damien Stehlé and Alexandre Wallet
2020/056 ( PDF )
AKCN-E8: Compact and Flexible KEM from Ideal Lattice
Zhengzhong JIn and Yunlei Zhao
2020/055 ( PDF )
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
Alejandro Cabrera Aldaya and Billy Bob Brumley
2020/054 ( PDF )
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA
Wen Wang and Shanquan Tian and Bernhard Jungk and Nina Bindel and Patrick Longa and Jakub Szefer
2020/053 ( PDF )
Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems"
Yasuhiko Ikematsu and Shuhei Nakamura
2020/052 ( PDF )
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
Mohamed Tolba and Muhammad ElSheikh and Amr M. Youssef
2020/051 ( PDF )
Low-Latency Hardware Masking with Application to AES
Pascal Sasdrich and Begül Bilgin and Michael Hutter and Mark Marson
2020/050 ( PDF )
Delphi: A Cryptographic Inference Service for Neural Networks
Pratyush Mishra and Ryan Lehmkuhl and Akshayaram Srinivasan and Wenting Zheng and Raluca Ada Popa
2020/049 ( PDF )
ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Erdem Alkim and Hülya Evkan and Norman Lahr and Ruben Niederhagen and Richard Petri
2020/048 ( PDF )
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage
Changshe Ma and Yiping Gu and Hongfei Li
2020/047 ( PDF )
New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices (Full Version)
Tianshuo Cong and Ximing Fu and Xuting Zhou and Yuli Zou and Haining Fan
2020/046 ( PDF )
On Analysis of Lightweight Stream Ciphers with Keyed Update
Orhun Kara and Muhammed F. Esgin
2020/045 ( PDF )
Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6
Haibat Khan and Benjamin Dowling and Keith M. Martin
2020/044 ( PDF )
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts
Alexander Chepurnoy and Amitabh Saxena
2020/043 ( PDF )
Zone Encryption with Anonymous Authentication for V2V Communication
Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa
2020/042 ( PDF )
BLAZE: Blazing Fast Privacy-Preserving Machine Learning
Arpita Patra and Ajith Suresh
2020/041 ( PDF )
Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders
Aggelos Kiayias and Saad Quader and Alexander Russell
2020/040 ( PDF )
A Compact and Scalable Hardware/Software Co-design of SIKE
Pedro Maat C. Massolino and Patrick Longa and Joost Renes and Lejla Batina
2020/039 ( PDF )
Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis
Damien Robissout and Gabriel Zaid and Brice Colombier and Lilian Bossuet and Amaury Habrard
2020/038 ( PDF )
Bitstream Modification Attack on SNOW 3G
Michail Moraitis and Elena Dubrova
2020/037 ( PDF )
Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput
Matthias Fitzi and Peter Gaži and Aggelos Kiayias and Alexander Russell
2020/036 ( PDF )
Analysis on Aigis-Enc: asymmetrical and symmetrical
Yupu Hu and Siyue Dong and Xingting Dong
2020/035 ( PDF )
Constant-round Dynamic Group Key Exchange from RLWE Assumption
Rakyong Choi and Dongyeon Hong and Kwangjo Kim
2020/034 ( PDF )
SkyEye: A Traceable Scheme for Blockchain
Tianjun Ma and Haixia Xu and Peili Li
2020/033 ( PDF )
Scalable Open-Vote Network on Ethereum
Mohamed Seifelnasr and Hisham S. Galal and Amr M. Youssef
2020/032 ( PDF )
A New Approach for the Implementation of Binary Matrices Using SLP Applications
Mahdi Sajadieh and Mohsen Mousavi
2020/031 ( PDF )
Locally Decodable Codes with Randomized Encoding
Kuan Cheng and Xin Li and Yu Zheng
2020/030 ( PDF )
K-Cipher: A Low Latency, Bit Length Parameterizable Cipher
Michael Kounavis and Sergej Deutsch and Santosh Ghosh and David Durham
2020/029 ( PDF )
Differentially-Private Multi-Party Sketching for Large-Scale Statistics
Seung Geol Choi and Dana Dachman-Soled and Mukul Kulkarni and Arkady Yerukhimovich
2020/028 ( PDF )
Verified Security of BLT Signature Scheme
Denis Firsov and Ahto Buldas and Ahto Truu and Risto Laanoja
2020/027 ( PDF )
On Roots Factorization for PQC Algorithms
Alexander Maximov
2020/026 ( PDF )
Post-Quantum Secure Architectures for Automotive Hardware Secure Modules
Wen Wang and Marc Stöttinger
2020/025 ( PDF )
Single Secret Leader Election
Dan Boneh and Saba Eskandarian and Lucjan Hanzlik and Nicola Greco
2020/024 ( PDF )
The Arwen Trading Protocols (Full Version)
Ethan Heilman and Sebastien Lipmann and Sharon Goldberg
2020/023 ( PDF )
Threshold Multi-Signature with an Offline Recovery Party
Riccardo Longo and Alessio Meneghetti and Massimiliano Sala
2020/022 ( PDF )
Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material)
Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson
2020/021 ( PDF )
eSIDH: the revenge of the SIDH
Daniel Cervantes-Vázquez and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez
2020/020 ( PDF )
Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes
Shangqi Lai and Xingliang Yuan and Shi-Feng Sun and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Dongxi Liu
2020/019 ( PDF )
Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains
Suhyeon Lee and Seungjoo Kim
2020/018 ( PDF )
Triptych: logarithmic-sized linkable ring signatures with applications
Sarang Noether and Brandon Goodell
2020/017 ( PDF )
Biometric-Authenticated Searchable Encryption
Daniel Gardham and Mark Manulis and Constantin Cătălin Drăgan
2020/016 ( PDF )
Short Threshold Dynamic Group Signatures
Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa
2020/015 ( PDF )
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts
Hao Chen and Wei Dai and Miran Kim and Yongsoo Song
2020/014 ( PDF )
SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
Gaëtan Leurent and Thomas Peyrin
2020/013 ( PDF )
On the Cryptographic Hardness of Local Search
Nir Bitansky and Idan Gerichter
2020/012 ( PDF )
Cortex-M4 Optimizations for \{R,M\}LWE Schemes
Erdem Alkim and Yusuf Alper Bilgin and Murat Cenk and François Gérard
2020/011 ( PDF )
Towards Vehicular Digital Forensics from Decentralized Trust: An Accountable, Privacy-preservation, and Secure Realization
Ming Li,Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo
2020/010 ( PDF )
Faster point compression for elliptic curves of $j$-invariant $0$
Dmitrii Koshelev
2020/009 ( PDF )
Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions
Thomas Pornin
2020/008 ( PDF )
Secret Sharing Schemes for Ports of Matroids of Rank 3
Oriol Farràs
2020/007 ( PDF )
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts
Nabil Alkeilani Alkadri and Rachid El Bansarkhani and Johannes Buchmann
2020/006 ( PDF )
Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures
André Chailloux and Thomas Debris-Alazard
2020/005 ( PDF )
Lai-Massey Scheme Revisited
M. R. Mirzaee Shamsabad and S. M. Dehnavi
2020/004 ( -- withdrawn -- )
BPCEX: Towards Blockchain-based Privacy-preserving Currency Exchange
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2020/003 ( -- withdrawn -- )
New Constructions of Traceable Range Proofs: Towards Multiple Regulation and Joint Regulation
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang
2020/002 ( PDF )
On a Conjecture of O'Donnell
Qichun Wang
2020/001 ( PDF )
Elliptic Curves of Nearly Prime Order
Manoj Gyawali and Daniele Di Tullio
2019/1499 ( PDF )
Authenticated Key Distribution: When the Coupon Collector is Your Enemy
Marc Beunardeau and Fatima-Ezzahra El Orche and Diana Maimut and David Naccache and Peter B. Roenne and Peter Y.A. Ryan
2019/1498 ( PDF )
Supersingular Isogeny-Based Designated Verifier Blind Signature
Rajeev Anand Sahu and Agnese Gini and Ankan Pal
2019/1497 ( PDF )
Analysis of Modified Shell Sort for Fully Homomorphic Encryption
Joon-Woo Lee and Young-Sik Kim and Jong-Seon No
2019/1496 ( PDF )
Improved on Identity-based quantum signature based on Bell states
Chang-Bin Wang and Shu-Mei Hsu and Hsiang Chang and Jue-Sam Chou
2019/1495 ( PDF )
Tight Security of Cascaded LRW2
Ashwin Jha and Mridul Nandi
2019/1494 ( PDF )
Scaling Verifiable Computation Using Efficient Set Accumulators
Alex Ozdemir and Riad S. Wahby and Barry Whitehat and Dan Boneh
2019/1493 ( PDF )
Solving $X^{q+1}+X+a=0$ over Finite Fields
Kwang Ho Kim and Junyop Choe and Sihem Mesnager
2019/1492 ( PDF )
Too Much Crypto
Jean-Philippe Aumasson
2019/1491 ( PDF )
Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9
Yuyin Yu and Nikolay Kaleyski and Lilya Budaghyan and Yongqiang Li
2019/1490 ( PDF )
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme
Jintai Ding and Joshua Deaton and Kurt Schmidt and Vishakha and Zheng Zhang
2019/1489 ( PDF )
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement
Joël Alwen and Margarita Capretto and Miguel Cueto and Chethan Kamath and Karen Klein and Ilia Markov and Guillermo Pascual-Perez and Krzysztof Pietrzak and Michael Walter and Michelle Yeo
2019/1488 ( PDF )
Fine-Grained Cryptography Revisited
Shohei Egashira and Yuyu Wang and Keisuke Tanaka
2019/1487 ( PDF )
SNR-Centric Power Trace Extractors for Side-Channel Attacks
Changhai Ou and Degang Sun and Siew-Kei Lam and Xinping Zhou and Kexin Qiao and Qu Wang
2019/1486 ( PDF )
RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations
Ramiro Martínez and Paz Morillo
2019/1485 ( PDF )
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings
Hiroshi Okano and Keita Emura and Takuya Ishibashi and Toshihiro Ohigashi and Tatsuya Suzuki
2019/1484 ( PDF )
Force-Locking Attack on Sync Hotstuff
Atsuki Momose and Jason Paul Cruz
2019/1483 ( PDF )
Communication--Computation Trade-offs in PIR
Asra Ali and Tancrède Lepoint and Sarvar Patel and Mariana Raykova and Phillipp Schoppmann and Karn Seth and Kevin Yeo
2019/1482 ( PDF )
Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof
Jiaheng Zhang and Tiancheng Xie and Yupeng Zhang and Dawn Song
2019/1481 ( PDF )
On metric regularity of Reed-Muller codes
Alexey Oblaukhov
2019/1480 ( PDF )
Analogue of Vélu's Formulas for Computing Isogenies over Hessian Model of Elliptic Curves
Fouazou Lontouo Perez Broon and Emmanuel Fouotsa
2019/1479 ( PDF )
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups
Jongkil Kim and Willy Susilo and Fuchun Guo and Joonsang Baek and Nan Li
2019/1478 ( PDF )
Leakage Detection with Kolmogorov-Smirnov Test
Xinping Zhou and Kexin Qiao and Changhai Ou
2019/1477 ( PDF )
Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis
Daan van der Valk and Stjepan Picek and Shivam Bhasin
2019/1476 ( PDF )
On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis
Leo Weissbart
2019/1475 ( PDF )
On the Security of Sponge-type Authenticated Encryption Modes
Bishwajit Chakraborty and Ashwin Jha and Mridul Nandi
2019/1474 ( PDF )
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders
Lichao Wu and Stjepan Picek
2019/1473 ( PDF )
Splitting the Interpose PUF: A Novel Modeling Attack Strategy
Nils Wisiol and Christopher Mühl and Niklas Pirnay and Phuong Ha Nguyen and Marian Margraf and Jean-Pierre Seifert and Marten van Dijk and Ulrich Rührmair
2019/1472 ( PDF )
Efficient Fully Secure Leakage-Deterring Encryption
Jan Camenisch and Maria Dubovitskaya and Patrick Towa
2019/1471 ( PDF )
A Privacy-Enhancing Framework for Internet of Things Services
Lukas Malina and Gautam Srivastava and Petr Dzurenda and Jan Hajny and Sara Ricci
2019/1470 ( PDF )
PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server
Carsten Baum and Tore K. Frederiksen and Julia Hesse and Anja Lehmann and Avishay Yanai
2019/1469 ( PDF )
The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures
Georg Maringer and Tim Fritzmann and Johanna Sepúlveda
2019/1468 ( PDF )
A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption
Jung Hee Cheon and Duhyeong Kim and Taechan Kim and Yongha Son
2019/1467 ( PDF )
Distributed Web Systems Leading to Hardware Oriented Cryptography and Post-Quantum Cryptologic Methodologies
Andrew M. K. Nassief
2019/1466 ( PDF )
A Note on the Instantiability of the Quantum Random Oracle
Edward Eaton and Fang Song
2019/1465 ( PDF )
An optimist's Poisson model of cryptanalysis
Daniel R. L. Brown
2019/1464 ( PDF )
New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions and Interaction
Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni
2019/1463 ( PDF )
Rescuing Logic Encryption in Post-SAT Era by Locking & Obfuscation
Amin Rezaei and Yuanqi Shen and Hai Zhou
2019/1462 ( -- withdrawn -- )
Privacy-preserving greater-than integer comparison without binary decomposition
Sigurd Eskeland
2019/1461 ( PDF )
Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP
Morteza Adeli and Nasour Bagheri
2019/1460 ( PDF )
Byzantine Fault Tolerance in Partially Synchronous Networks
Yongge Wang
2019/1459 ( PDF )
Side Channel Information Set Decoding using Iterative Chunking
Norman Lahr and Ruben Niederhagen and Richard Petri and Simona Samardjiska
2019/1458 ( PDF )
Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery
Moni Naor and Lior Rotem and Gil Segev
2019/1457 ( PDF )
Fast and Secure Updatable Encryption
Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Yao Jiang
2019/1456 ( PDF )
ModFalcon: compact signatures based on module NTRU lattices
Chitchanok Chuengsatiansup and Thomas Prest and Damien Stehlé and Alexandre Wallet and Keita Xagawa
2019/1455 ( PDF )
Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption with Decryption Key Exposure Resistance
Yanyan Liu and Yiru Sun
2019/1454 ( PDF )
Practical Relativistic Zero-Knowledge for NP
Claude Crépeau and Arnaud Massenet and Louis Salvail and Lucas Stinchcombe and Nan Yang
2019/1453 ( PDF )
Saber on ESP32
Bin Wang and Xiaozhuo Gu and Yingshan Yang
2019/1452 ( PDF )
Leakage-Resilient Lattice-Based Partially Blind Signatures
D. Papachristoudis and D. Hristu-Varsakelis and F. Baldimtsi and G. Stephanides
2019/1451 ( PDF )
Tight bound on NewHope failure probability
Thomas Plantard and Arnaud Sipasseuth and Willy Susilo and Vincent Zucca
2019/1450 ( PDF )
Extractors for Adversarial Sources via Extremal Hypergraphs
Eshan Chattopadhyay and Jesse Goodman and Vipul Goyal and Xin Li
2019/1449 ( PDF )
Formalising Oblivious Transfer in the Semi-Honest and Malicious Model in CryptHOL
David Butler and David Aspinall and Adria Gascon
2019/1448 ( PDF )
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
Johann Heyszl and Katja Miller and Florian Unterstein and Marc Schink and Alexander Wagner and Horst Gieser and Sven Freud and Tobias Damm and Dominik Klein and Dennis Kügler
2019/1447 ( PDF )
Benchmarking Post-Quantum Cryptography in TLS
Christian Paquin and Douglas Stebila and Goutam Tamvada
2019/1446 ( PDF )
Boolean functions for homomorphic-friendly stream ciphers
Claude Carlet and Pierrick Méaux
2019/1445 ( PDF )
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Madura A Shelton and Niels Samwel and Lejla Batina and Francesco Regazzoni and Markus Wagner and Yuval Yarom
2019/1444 ( PDF )
Compact Storage of Superblocks for NIPoPoW Applications
Kostis Karantias and Aggelos Kiayias and Nikos Leonardos and Dionysis Zindros
2019/1443 ( PDF )
CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist
Abhrajit Sengupta and Ozgur Sinanoglu
2019/1442 ( -- withdrawn -- )
Server-Aided Revocable Identity-Based Encryption Revisited
Fei Meng
2019/1441 ( PDF )
A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications
Paolo Santini and Alessandro Barenghi and Gerardo Pelosi and Marco Baldi and Franco Chiaraluce
2019/1440 ( PDF )
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems
Sarah Azouvi and George Danezis and Valeria Nikolaenko
2019/1439 ( PDF )
Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
S. Sharmila Deva Selvi and Irene Miriam Isaac and C. Pandu Rangan
2019/1438 ( PDF )
A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers
Zhengbin Liu and Yongqiang Li and Lin Jiao and Mingsheng Wang
2019/1437 ( PDF )
Reverse Outsourcing: Reduce the Cloud's Workload in Outsourced Attribute-Based Encryption Scheme
Fei Meng and Mingqiang Wang
2019/1436 ( PDF )
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond
Paul Kirchner and Thomas Espitau and Pierre-Alain Fouque
2019/1435 ( PDF )
Confidential Assets on MimbleWimble
Yi Zheng and Howard Ye and Patrick Dai and Tongcheng Sun and Vladislav Gelfer
2019/1434 ( PDF )
About Low DFR for QC-MDPC Decoding
Nicolas Sendrier and Valentin Vasseur
2019/1433 ( PDF )
T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction
Sebastian Lauer and Kai Gellert and Robert Merget and Tobias Handirk and Jörg Schwenk
2019/1432 ( PDF )
A Generic View on the Unified Zero-Knowledge Protocol and its Applications
Diana Maimut and George Teseleanu
2019/1431 ( -- withdrawn -- )
Cross-Chain Communication Using Receipts
Arasu Arun and C. Pandu Rangan
2019/1430 ( PDF )
On the Impossibility of Probabilistic Proofs in Relativized Worlds
Alessandro Chiesa and Siqi Liu
2019/1429 ( -- withdrawn -- )
Secret Sharing Schemes : A Fine Grained Analysis
Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai
2019/1428 ( -- withdrawn -- )
$AC^0$ Constructions for Evolving Secret Sharing Schemes and Redistribution of Secret Shares
Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai
2019/1427 ( PDF )
On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes
Sumanta Sarkar and Kalikinkar Mandal and Dhiman Saha
2019/1426 ( PDF )
On asymptotically optimal tests for random number generators
Boris Ryabko
2019/1425 ( PDF )
HIBEChain: A Hierarchical Identity-based Blockchain System for Large-Scale IoT
Zhiguo Wan and Wei Liu and Hui Cui
2019/1424 ( PDF )
Efficient Side-Channel Secure Message Authentication with Better Bounds
Chun Guo and François-Xavier Standaert and Weijia Wang and Yu Yu
2019/1423 ( PDF )
QC-MDPC decoders with several shades of gray
Nir Drucker and Shay Gueron and Dusan Kostic
2019/1422 ( PDF )
IPDL: A Probabilistic Dataflow Logic for Cryptography
Xiong Fan and Joshua Gancher and Greg Morrisett and Elaine Shi and Kristina Sojakova
2019/1421 ( PDF )
Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations
Nicky Mouha and Christopher Celi
2019/1420 ( PDF )
A Non-Interactive Shuffle Argument With Low Trust Assumptions
Antonis Aggelakis and Prastudy Fauzi and Georgios Korfiatis and Panos Louridas and Foteinos Mergoupis-Anagnou and Janno Siim and Michal Zajac
2019/1419 ( PDF )
Image PUF: A Physical Unclonable Function for Printed Electronics based on Optical Variation of Printed Inks
Ahmet Turan Erozan and Michael Hefenbrock and Michael Beigl and Jasmin Aghassi-Hagmann and Mehdi B. Tahoori
2019/1418 ( PDF )
Designated-ciphertext Searchable Encryption
Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo
2019/1417 ( PDF )
CSIDH on Other Form of Elliptic Curves
Xuejun Fan and Song Tian and Bao Li and Xiu Xu
2019/1416 ( PDF )
The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption
Melissa Chase and Trevor Perrin and Greg Zaverucha
2019/1415 ( PDF )
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis
Hossein Arabnezhad-Khanoki and Babak Sadeghiyan
2019/1414 ( -- withdrawn -- )
A New Encryption Scheme Based On Subset Identifying Problem
Muhammad Rezal Kamel Ariffin
2019/1413 ( PDF )
Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions
Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2019/1412 ( PDF )
Cryptanalysis and Improvement of Smart-ID's Clone Detection Mechanism
Augustin P. Sarr
2019/1411 ( PDF )
Isochronous Gaussian Sampling: From Inception to Implementation
James Howe and Thomas Prest and Thomas Ricosset and Mélissa Rossi
2019/1410 ( -- withdrawn -- )
Withdrawn
Withdrawn
2019/1409 ( PDF )
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security
Gareth T. Davies and Herman Galteland and Kristian Gjøsteen and Yao Jiang
2019/1408 ( PDF )
The group of automorphisms of the set of self-dual bent functions
Aleksandr Kutsenko
2019/1407 ( PDF )
Incrementally Verifiable Computation via Incremental PCPs
Moni Naor and Omer Paneth and Guy N. Rothblum
2019/1406 ( PDF )
Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting
Tassos Dimtiriou
2019/1405 ( PDF )
Revisiting Higher-Order Computational Attacks against White-Box Implementations
Houssem Maghrebi and Davide Alessio
2019/1404 ( PDF )
CSIDH on the surface
Wouter Castryck and Thomas Decru
2019/1403 ( -- withdrawn -- )
No RISC, no Fun: Comparison of Hardware Accelerated Hash Functions for XMSS
Ingo Braun and Fabio Campos and Steffen Reith and Marc Stöttinger
2019/1402 ( PDF )
Automatize parameter tuning in Ring-Learning-With-Errors-based leveled homomorphic cryptosystem implementations
Vincent HERBERT
2019/1401 ( PDF )
SMChain: A Scalable Blockchain Protocol for Secure Metering Systems in Distributed Industrial Plants
Gang Wang and Zhijie Jerry Shi and Mark Nixon and Song Han
2019/1400 ( PDF )
RedShift: Transparent SNARKs from List Polynomial Commitment IOPs
Assimakis Kattis and Konstantin Panarin and Alexander Vlasov
2019/1399 ( PDF )
(One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes
Jan-Pieter D'Anvers and Mélissa Rossi and Fernando Virdia
2019/1398 ( PDF )
How to Construct Rational Protocols with Nash Equilibrium Consistency in the UC framework
Xiaoxia Jiang and Youliang Tian
2019/1397 ( PDF )
How to compartment secrets
Gaëlle Candel and Rémi Géraud-Stewart and David Naccache
2019/1396 ( PDF )
A note on the multivariate cryptosystem based on a linear code
Yasufumi Hashimoto
2019/1395 ( PDF )
McTiny: fast high-confidence post-quantum key erasure for tiny network servers
Daniel J. Bernstein and Tanja Lange
2019/1394 ( PDF )
Voltage-based Covert Channels using FPGAs
Dennis R. E. Gnad and Cong Dang Khoa Nguyen and Syed Hashim Gillani and Mehdi B. Tahoori
2019/1393 ( PDF )
SoK: Computer-Aided Cryptography
Manuel Barbosa and Gilles Barthe and Karthik Bhargavan and Bruno Blanchet and Cas Cremers and Kevin Liao and Bryan Parno
2019/1392 ( PDF )
Decryption failure is more likely after success
Nina Bindel and John M. Schanck
2019/1391 ( PDF )
Are These Pairing Elements Correct? Automated Verification and Applications
Susan Hohenberger and Satyanarayana Vusirikala
2019/1390 ( PDF )
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs
Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof
2019/1389 ( PDF )
Generic Attack on Iterated Tweakable FX Constructions
Ferdinand Sibleyras
2019/1388 ( PDF )
Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava code
Jayashree Dey and Ratna Dutta
2019/1387 ( PDF )
The supersingular isogeny problem in genus 2 and beyond
Craig Costello and Benjamin Smith
2019/1386 ( PDF )
Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version)
Chao Liu and Zhongxiang Zheng and Keting Jia and Qidi You
2019/1385 ( PDF )
Improvements of the Balance Discovery Attack on Lightning Network Payment Channels
Gijs van Dam and Rabiah Abdul Kadir and Puteri N.E. Nohuddin and Halimah Badioze Zaman
2019/1384 ( PDF )
Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations
Keita Emura and Shuichi Katsumata and Yohei Watanabe
2019/1383 ( PDF )
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities
Karim Eldefrawy and Tancrède Lepoint and Antonin Leroux
2019/1382 ( PDF )
On the Power of Multiple Anonymous Messages
Badih Ghazi and Noah Golowich and Ravi Kumar and Rasmus Pagh and Ameya Velingker
2019/1381 ( PDF )
The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions
Kaisa Nyberg
2019/1380 ( PDF )
Efficient Utilization of DSPs and BRAMs Revisited: New AES-GCM Recipes on FPGAs
Elif Bilge Kavun and Nele Mentens and Jo Vliegen and Tolga Yalcin
2019/1379 ( PDF )
Systematic and Random Searches for Compact 4-Bit and 8-Bit Cryptographic S-Boxes
Christophe Clavier and Léo Reynaud
2019/1378 ( PDF )
Alzette: a 64-bit ARX-box (feat. CRAX and TRAX)
Christof Beierle and Alex Biryukov and Luan Cardoso dos Santos and Johann Großschädl and Léo Perrin and Aleksei Udovenko and Vesselin Velichkov and Qingju Wang
2019/1377 ( PDF )
A Scalable Post-quantum Hash-Based Group Signature
Masoumeh Shafieinejad and Navid Nasr Esfahani
2019/1376 ( PDF )
Generic Constructions of RIBE via Subset Difference Method
Xuecheng Ma and Dongdai Lin
2019/1375 ( PDF )
New ideas to build noise-free homomorphic cryptosystems
Gérald Gavin and Sandrine Tainturier
2019/1374 ( PDF )
SoK: Challenges of Post-Quantum Digital Signing in Real-world Applications
Teik Guan Tan and Pawel Szalachowski and Jianying Zhou
2019/1373 ( PDF )
A note on the cost of computing odd degree isogenies
Daniel Cervantes-Vázquez and Francisco Rodríguez-Henríquez
2019/1372 ( PDF )
Analyzing the Linear Keystream Biases in AEGIS
Maria Eichlseder and Marcel Nageler and Robert Primas
2019/1371 ( PDF )
A short-list of pairing-friendly curves resistant to Special TNFS at the 128-bit security level
Aurore Guillevic
2019/1370 ( PDF )
A Subset Fault Analysis of ASCON
Priyanka Joshi and Bodhisatwa Mazumdar
2019/1369 ( PDF )
Impeccable Circuits II
Aein Rezaei Shahmirzadi and Shahram Rasoolzadeh and Amir Moradi
2019/1368 ( PDF )
Efficient FPGA Implementations of LowMC and Picnic
Daniel Kales and Sebastian Ramacher and Christian Rechberger and Roman Walch and Mario Werner
2019/1367 ( PDF )
Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption
Keitaro Hashimoto and Wakaha Ogata and Toi Tomita
2019/1366 ( PDF )
A Lattice-based Enhanced Privacy ID
Nada EL Kassem and Luis Fiolhais and Paulo Martins and Liqun Chen and Leonel Sousa
2019/1365 ( PDF )
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning
Megha Byali and Harsh Chaudhari and Arpita Patra and Ajith Suresh
2019/1364 ( PDF )
Boolean Functions with Multiplicative Complexity 3 and 4
Cagdas Calik and Meltem Sonmez Turan and Rene Peralta
2019/1363 ( PDF )
Multi-Device for Signal
Sébastien Campion and Julien Devigne and Céline Duguey and Pierre-Alain Fouque
2019/1362 ( PDF )
A Modern View on Forward Security
Colin Boyd and Kai Gellert
2019/1361 ( PDF )
Efficient Elliptic Curve Diffie-Hellman Computation at the 256-bit Security Level
Kaushik Nath and Palash Sarkar
2019/1360 ( PDF )
Sashimi: Cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
Daniele Cozzo and Nigel P. smart
2019/1359 ( PDF )
Universal Forgery Attack against GCM-RUP
Yanbin Li and Gaëtan Leurent and Meiqin Wang and Wei Wang and Guoyan Zhang and Yu Liu
2019/1358 ( PDF )
Traceable Inner Product Functional Encryption
Xuan Thanh Do and Duong Hieu Phan and David Pointcheval
2019/1357 ( PDF )
Cryptanalysis of the Legendre PRF and generalizations
Ward Beullens and Tim Beyne and Aleksei Udovenko and Giuseppe Vitto
2019/1356 ( PDF )
Towards Post-Quantum Security for Signal's X3DH Handshake
Jacqueline Brendel and Marc Fischlin and Felix Günther and Christian Janson and Douglas Stebila
2019/1355 ( PDF )
A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code
Daniel Smith-Tone and Cristina Tone
2019/1354 ( PDF )
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs
Zhangshuang Guan and Zhiguo Wan and Yang Yang and Yan Zhou and Butian Huang
2019/1353 ( PDF )
Laconic Conditional Disclosure of Secrets and Applications
Nico Döttling and Sanjam Garg and Vipul Goyal and Giulio Malavolta
2019/1352 ( PDF )
Spectral analysis of ZUC-256
Jing Yang and Thomas Johansson and Alexander Maximov
2019/1351 ( PDF )
Speeding Up OMD Instantiations in Hardware
Diana Maimut and Alexandru Stefan Mega
2019/1350 ( PDF )
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement
Patrick Leu and Mridula Singh and Marc Roeschlin and Kenneth G. Paterson and Srdjan Capkun
2019/1349 ( PDF )
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband
Mridula Singh and Patrick Leu and AbdelRahman Abdou and Srdjan Capkun
2019/1348 ( PDF )
Network Time with a Consensus on Clock
Handan Kilinc Alper
2019/1347 ( PDF )
Variants of Wegman-Carter Message Authentication Code Supporting Variable Tag Lengths
Sebati Ghosh and Palash Sarkar
2019/1346 ( PDF )
Privacy-Preserving Decentralised Singular Value Decomposition
Bowen Liu and Qiang Tang
2019/1345 ( PDF )
Audita: A Blockchain-based Auditing Framework for Off-chain Storage
Danilo Francati and Giuseppe Ateniese and Abdoulaye Faye and Andrea Maria Milazzo and Angelo Massimo Perillo and Luca Schiatti and Giuseppe Giordano
2019/1344 ( PDF )
From Fairness to Full Security in Multiparty Computation
Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem
2019/1343 ( PDF )
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber
Yue Qin and Chi Cheng and Jintai Ding
2019/1342 ( PDF )
Scalable Wildcarded Identity-Based Encryption
Jihye Kim and Seunghwa Lee and Jiwon Lee and Hyunok Oh
2019/1341 ( PDF )
Succinct Non-Interactive Secure Computation
Andrew Morgan and Rafael Pass and Antigoni Polychroniadou
2019/1340 ( PDF )
Secret Shared Shuffle
Melissa Chase and Esha Ghosh and Oxana Poburinnaya
2019/1339 ( PDF )
Extracting Randomness from Extractor-Dependent Sources
Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs
2019/1338 ( PDF )
Two-party Private Set Intersection with an Untrusted Third Party
Phi Hung Le and Samuel Ranellucci and S. Dov Gordon
2019/1337 ( PDF )
Offline Witness Encryption with Semi-Adaptive Security
Peter Chvojka and Tibor Jager and Saqib A. Kakvi
2019/1336 ( PDF )
Critical Perspectives on Provable Security: Fifteen Years of "Another Look" Papers
Neal Koblitz and Alfred Menezes
2019/1335 ( PDF )
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
Tibor Jager and David Niehues
2019/1334 ( PDF )
Privacy-Preserving Distributed Machine Learning based on Secret Sharing
Ye Dong and Xiaojun Chen and Liyan Shen
2019/1333 ( PDF )
The Dark SIDH of Isogenies
Paul Bottinelli and Victoria de Quehen and Chris Leonardi and Anton Mosunov and Filip Pawlega and Milap Sheth
2019/1332 ( PDF )
SEAL: Sealed-Bid Auction Without Auctioneers
Samiran Bag and Feng Hao and Siamak F. Shahandashti and Indranil G. Ray
2019/1331 ( PDF )
Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?
Melissa Azouaoui and Romain Poussier and François-Xavier Standaert and Vincent Verneuil
2019/1330 ( PDF )
OptiSwap: Fast Optimistic Fair Exchange
Lisa Eckey and Sebastian Faust and Benjamin Schlosser
2019/1329 ( PDF )
Drinfeld modules may not be for isogeny based cryptography
Antoine Joux and Anand Kumar Narayanan
2019/1328 ( PDF )
Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices
Yashvanth Kondi and Bernardo Magri and Claudio Orlandi and Omer Shlomovits
2019/1327 ( PDF )
Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain
Donghoon Chang and Munawar Hasan and Pranav Jain
2019/1326 ( PDF )
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE
Donghoon Chang and Nilanjan Datta and Avijit Dutta and Bart Mennink and Mridul Nandi and Somitra Sanadhya and Ferdinand Sibleyras
2019/1325 ( PDF )
Efficient Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts
Arinjita Paul and S. Sharmila Deva Selvi and C. Pandu Rangan
2019/1324 ( PDF )
Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme
Avijit Dutta and Mridul Nandi
2019/1323 ( PDF )
Secure Quantum Extraction Protocols
Prabhanjan Ananth and Rolando L. La Placa
2019/1322 ( PDF )
An Efficient Micropayment Channel on Ethereum
Hisham S. Galal and Muhammad ElSheikh and Amr M. Youssef
2019/1321 ( PDF )
Supersingular isogeny key exchange for beginners
Craig Costello
2019/1320 ( PDF )
Homomorphic Encryption Random Beacon
Alisa Cherniaeva and Ilia Shirobokov and Omer Shlomovits
2019/1319 ( PDF )
Automatic Search for the Linear (hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey and CHAM-64 (Full Version)
Mingjiang Huang and Liming Wang
2019/1318 ( PDF )
Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications (Full Version)
Mingjiang Huang and Liming Wang
2019/1317 ( PDF )
Reverse Firewalls for Actively Secure MPCs
Suvradip Chakraborty and Stefan Dziembowski and Jesper Buus Nielsen
2019/1316 ( PDF )
Binary Kummer Line
Sabyasachi Karati
2019/1315 ( PDF )
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning
Harsh Chaudhari and Rahul Rachuri and Ajith Suresh
2019/1314 ( PDF )
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search
Zhidan Li and Wenmin Li and Fei Gao and Wei Yin and Hua Zhang and Qiaoyan Wen and Kaitai Liang
2019/1313 ( PDF )
On Oblivious Amplification of Coin-Tossing Protocols
Nir Bitansky and Nathan Geier
2019/1312 ( PDF )
Cryptographic Fault Diagnosis using VerFI
Victor Arribas and Felix Wegener and Amir Moradi and Svetla Nikova
2019/1311 ( PDF )
BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments
Jiwon Lee and Jihye Kim and Hyunok Oh
2019/1310 ( PDF )
Lightweight Iterative MDS Matrices: How Small Can We Go?
Shun Li and Siwei Sun and Danping Shi and Chaoyun Li and Lei Hu
2019/1309 ( PDF )
SaberX4: High-throughput Software Implementationof Saber Key Encapsulation Mechanism
Sujoy Sinha Roy
2019/1308 ( PDF )
A Novel CCA Attack using Decryption Errors against LAC
Qian Guo and Thomas Johansson and Jing Yang
2019/1307 ( -- withdrawn -- )
ABERand: Effective Distributed Randomness on Ciphertext-Policy Attribute-Based Encryption
Liang Zhang and Haibin Kan and Zening Chen and Ziqi Mao and Jinjie Gao
2019/1306 ( -- withdrawn -- )
A Valid Blockchain-based Data Trading Ecosystem
Taotao li and Dequan li
2019/1305 ( PDF )
Privacy-Preserving Computation over Genetic Data: HLA Matching and so on
Jinming Cui and Huaping Li and Meng Yang
2019/1304 ( PDF )
Reduction Modulo $2^{448}-2^{224}-1$
Kaushik Nath and Palash Sarkar
2019/1303 ( -- withdrawn -- )
A simpler construction of traceable and linkable ring signature scheme
Wulu Li
2019/1302 ( PDF )
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation
Máté Horváth and Levente Buttyán and Gábor Székely and Dóra Neubrandt
2019/1301 ( PDF )
Modular lattice signatures, revisited
Dipayan Das and Jeffrey Hoffstein and Jill Pipher and William Whyte and Zhenfei Zhang
2019/1300 ( PDF )
Actively Secure Setup for SPDZ
Dragos Rotaru and Nigel P. Smart and Titouan Tanguy and Frederik Vercauteren and Tim Wood
2019/1299 ( PDF )
A constant-rate non-malleable code in the split-state model.
Divesh Aggarwal and Maciej Obremski
2019/1298 ( PDF )
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
Mark Abspoel and Anders Dalskov and Daniel Escudero and Ariel Nof
2019/1297 ( PDF )
Exploring Energy Efficient Quantum-resistant Signal Processing Using Array Processors
Hamid Nejatollahi and Sina Shahhosseini and Rosario Cammarota and Nikil Dutt
2019/1296 ( PDF )
FastSwap: Concretely Efficient Contingent Payments for Complex Predicates
Mathias Hall-Andersen
2019/1295 ( PDF )
A trip between creation and destruction of non-commutative public key exchange protocols
Borja Gómez
2019/1294 ( PDF )
Hashing to elliptic curves of $j$-invariant $1728$
Dmitrii Koshelev
2019/1293 ( PDF )
LizarMong: Excellent Key Encapsulation Mechanism based on RLWE and RLWR
Chi-Gon Jung and JongHyeok Lee and Youngjin Ju and Yong-Been Kwon and Seong-Woo Kim and Yunheung Paek
2019/1292 ( PDF )
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing
Sarvar Patel and Giuseppe Persiano and Kevin Yeo and Moti Yung
2019/1291 ( PDF )
SÉTA: Supersingular Encryption from Torsion Attacks
Luca De Feo and Cyprien Delpech de Saint Guilhem and Tako Boris Fouotsa and Péter Kutas and Antonin Leroux and Christophe Petit and Javier Silva and Benjamin Wesolowski
2019/1290 ( PDF )
Trapdoor DDH groups from pairings and isogenies
Péter Kutas and Christophe Petit and Javier Silva
2019/1289 ( PDF )
On constant-time QC-MDPC decoding with negligible failure rate
Nir Drucker and Shay Gueron and Dusan Kostic
2019/1288 ( PDF )
Threshold Schemes from Isogeny Assumptions
Luca De Feo and Michael Meyer
2019/1287 ( PDF )
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
Muhammed F. Esgin and Raymond K. Zhao and Ron Steinfeld and Joseph K. Liu and Dongxi Liu
2019/1286 ( PDF )
Comparison of proof-of-work based blockchains against federated consensus and proof-of-validation based blockchains
Ambili K N and Jimmy Jose
2019/1285 ( PDF )
Full-Round Differential Attack on DoT Block Cipher
Manoj Kumar
2019/1284 ( PDF )
Shorter QA-NIZK and SPS with Tighter Security
Masayuki Abe and Charanjit S. Jutla and Miyako Ohkubo and Jiaxin Pan and Arnab Roy and Yuyu Wang
2019/1283 ( PDF )
Breaking the Hidden Irreducible Polynomials Scheme
Christian Eder
2019/1282 ( PDF )
Privacy-Preserving Decision Tree Training and Prediction against Malicious Server
Adi Akavia and Max Leibovich and Yehezkel S. Resheff and Roey Ron and Moni Shahar and Margarita Vald
2019/1281 ( PDF )
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer
Geoffroy Couteau and Bill Roscoe and Peter Ryan
2019/1280 ( PDF )
Fast Secrecy Computation with Multiplication Under the Setting of $k\le N<2k-1$ using Secret Sharing Scheme
Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal
2019/1279 ( PDF )
Post-quantum Zero Knowledge in Constant Rounds
Nir Bitansky and Omri Shmueli
2019/1278 ( PDF )
An IND-CCA-Secure Code-Based EncryptionScheme Using Rank Metric
Hamad Al Shehhi and Emanuele Bellini and Filipe Borba and Florian Caullery and Marc Manzano and Victor Mateu
2019/1277 ( PDF )
Towards Quantum-Safe VPNs and Internet
Maran van Heesch and Niels van Adrichem and Thomas Attema and Thijs Veugen
2019/1276 ( PDF )
Two PQ Signature Use-cases: Non-issues, challenges and potential solutions.
Panos Kampanakis and Dimitrios Sikeridis
2019/1275 ( PDF )
Updatable Oblivious Key Management for Storage Systems
Stanislaw Jarecki and Hugo Krawczyk and Jason Resch
2019/1274 ( PDF )
Rank-metric Encryption on Arm-Cortex M0
Ameirah al Abdouli and Emanuele Bellini and Florian Caullery and Marc Manzano and Victor Mateu
2019/1273 ( PDF )
A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography
Jens-Peter Kaps and William Diehl and Michael Tempelmeier and Farnoud Farahmand and Ekawat Homsirikamol and Kris Gaj
2019/1272 ( PDF )
The Niederreiter cryptosystem and Quasi-Cyclic codes
Upendra Kapshikar and Ayan Mahalanobis
2019/1271 ( PDF )
Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices
Martin R. Albrecht and Alex Davidson and Amit Deo and Nigel P. Smart
2019/1270 ( PDF )
SAVER: SNARK-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization
Jiwon Lee and Jaekyoung Choi and Jihye Kim and Hyunok Oh
2019/1269 ( PDF )
Repudiable Ring Signature: Stronger Security and Logarithmic-Size
Hao Lin and Mingqiang Wang
2019/1268 ( PDF )
On the Security of RSA-PSS in the Wild
Saqib A. Kakvi
2019/1267 ( -- withdrawn -- )
Repudiable Ring Signatures: Stronger Definitions and Logarithmic-Size
Hao Lin and Mingqiang Wang
2019/1266 ( PDF )
Note on the noise growth of the RNS variants of the BFV scheme
Jean Claude Bajard and Julien Eynard and Paulo Martins and Leonel Sousa and Vincent Zucca
2019/1265 ( -- withdrawn -- )
WaterCarver: Anonymous Confidential Blockchain System based on Account Model
Jiajun Xin and Pei Huang and Lei Chen and Xin Lai and Xiao Zhang and Wulu Li and Yongcan Wang
2019/1264 ( PDF )
Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era
Juan Garay and Aggelos Kiayias and Rafail Ostrovsky and Giorgos Panagiotakos and Vassilis Zikas
2019/1263 ( PDF )
Comments on Cryptographic Entropy Measurement
Anna Johnston
2019/1262 ( PDF )
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing
Shweta Agrawal and Rachit Garg and Nishant Kumar and Manoj Prabhakaran
2019/1261 ( PDF )
On Round-By-Round Soundness and State Restoration Attacks
Justin Holmgren
2019/1260 ( PDF )
TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions
Anita Aghaie and Amir Moradi
2019/1259 ( PDF )
Security and Efficiency Trade-offs for Elliptic Curve Diffie-Hellman at the 128-bit and 224-bit Security Levels
Kaushik Nath and Palash Sarkar
2019/1258 ( PDF )
Secure Pairwise Key Sharing using Geometric Group Key Sharing Method (Full Paper)
Shogo Ochiai and Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal
2019/1257 ( PDF )
Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts
Dhaval Khandla and Het Shahy and Manish Kumar Bz and Alwyn Roshan Pais and Nishant Raj
2019/1256 ( PDF )
Permuted Puzzles and Cryptographic Hardness
Elette Boyle and Justin Holmgren and Mor Weiss
2019/1255 ( PDF )
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular
Daniel Benarroch and Matteo Campanelli and Dario Fiore and Kobi Gurkan and Dimitris Kolonelos
2019/1254 ( PDF )
Cryptanalysis of FRS Obfuscation based on the CLT13 Multilinear Map
Jiseung Kim and Changmin Lee
2019/1253 ( PDF )
Probabilistic Properties of Modular Addition \\ (Extended abstract)
Victoria Vysotskaya
2019/1252 ( PDF )
Simplifying Constructions and Assumptions for $i\mathcal{O}$
Aayush Jain and Huijia Lin and Amit Sahai
2019/1251 ( PDF )
Lattice-based Zero-knowledge SNARGs for Arithmetic Circuits
Anca Nitulescu
2019/1250 ( PDF )
The Price of Active Security in Cryptographic Protocols
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss
2019/1249 ( PDF )
Related-key Attack on 5-Round Kuznyechik
Vitaly Kiryukhin
2019/1248 ( PDF )
A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis
Bastian Richter and David Knichel and Amir Moradi
2019/1247 ( PDF )
A Note on Masking Generic Boolean Functions
Lauren De Meyer and Felix Wegener and Amir Moradi
2019/1246 ( PDF )
A Note on Our Submission to Track 4 of iDASH 2019
Marcel Keller and Ke Sun
2019/1245 ( PDF )
Observations on the Quantum Circuit of the SBox of AES
Jian Zou and Yongyang Liu and Chen Dong and Wenling Wu and Le Dong
2019/1244 ( PDF )
A Note on a Static SIDH Protocol
Samuel Dobson and Trey Li and Lukas Zobernig
2019/1243 ( -- withdrawn -- )
On The Distinguishability of Ideal Ciphers
Roberto Avanzi and Yvo Desmedt
2019/1242 ( PDF )
Non-Profiled Side Channel Attack based on Deep Learning using Picture Trace
Jong-Yoen Park and Dong-Guk Han and Dirmanto Jap and Shivam Bhasin and Yoo-Seung Won
2019/1241 ( PDF )
SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain
Jeonghyuk Lee and Jungyeon Hwang and Jaekyung Choi and Hyunok Oh and Jihye Kim
2019/1240 ( PDF )
Forward and Backward Private DSSE for Range Queries
Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk and Lei Xu
2019/1239 ( PDF )
Computationally Modeling User-Mediated Authentication Protocols
Britta Hale
2019/1238 ( PDF )
Linear-Regression on Packed Encrypted Data in the Two-Server Model
Adi Akavia and Hayim Shaul and Mor Weiss and Zohar Yakhini
2019/1237 ( PDF )
QFactory: classically-instructed remote secret qubits preparation
Alexandru Cojocaru and Léo Colisson and Elham Kashefi and Petros Wallden
2019/1236 ( PDF )
Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack
Bo-Yeon Sim and Dong-Guk Han
2019/1235 ( PDF )
Physical Cryptography
Mariana Costiuc and Diana Maimut and George Teseleanu
2019/1234 ( PDF )
Efficient Homomorphic Comparison Methods with Optimal Complexity
Jung Hee Cheon and Dongwoo Kim and Duhyeong Kim
2019/1233 ( PDF )
Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts
Koji Nuida and Satsuya Ohata and Shigeo Mitsunari and Nuttapong Attrapadung
2019/1232 ( PDF )
Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice
Meenakshi Kansal and Ratna Dutta and Sourav Mukhopadhyay
2019/1231 ( PDF )
Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications
Zhao Chunhuan and Zheng Zhongxiang and Wang Xiaoyun and Xu Guangwu
2019/1230 ( PDF )
Linear-Size Constant-Query IOPs for Delegating Computation
Eli Ben-Sasson and Alessandro Chiesa and Lior Goldberg and Tom Gur and Michael Riabzev and Nicholas Spooner
2019/1229 ( PDF )
Transparent SNARKs from DARK Compilers
Benedikt Bünz and Ben Fisch and Alan Szepieniec
2019/1228 ( PDF )
Guess what?! On the impossibility of unconditionally secure public-key encryption
Lorenz Panny
2019/1227 ( PDF )
Dynamic Searchable Encryption with Small Client Storage
Ioannis Demertzis and Javad Ghareh Chamani and Dimitrios Papadopoulos and Charalampos Papamanthou
2019/1226 ( -- withdrawn -- )
Cube Cryptanalysis of Round-Reduced ACORN
Jingchun Yang and Meicheng Liu and Dongdai Lin
2019/1225 ( PDF )
Analysis of Nakamoto Consensus, Revisited
Jianyu Niu and Chen Feng and Hoang Dau and Yu-Chih Huang and Jingge Zhu
2019/1224 ( PDF )
Practical Volume-Based Attacks on Encrypted Databases
Rishabh Poddar and Stephanie Wang and Jianan Lu and Raluca Ada Popa
2019/1223 ( PDF )
Integrita: Protecting View-Consistency in Online Social Network with Federated Servers
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
2019/1222 ( PDF )
Sub-Linear Privacy-Preserving Near-Neighbor Search
M. Sadegh Riazi and Beidi Chen and Anshumali Shrivastava and Dan Wallach and Farinaz Koushanfar
2019/1221 ( PDF )
Probabilistic Data Structures in Adversarial Environments
David Clayton and Christopher Patton and Thomas Shrimpton
2019/1220 ( PDF )
Side-channel Attacks on Blinded Scalar Multiplications Revisited
Thomas Roche and Laurent Imbert and Victor Lomné
2019/1219 ( PDF )
Multi-Locking and Perfect Argument Order: Two Major Improvements of Attribute-Based Encryption~(Long Paper)
Nugier Cyrius and Adelin Remi and Migliore Vincent and Alata Eric
2019/1218 ( PDF )
On the Efficiency of Software Implementations of Lightweight Block Ciphers from the Perspective of Programming Languages
Abdur Rehman Raza and Khawir Mahmood and Muhammad Faisal Amjad and Haider Abbas and Mehreen Afzal
2019/1217 ( -- withdrawn -- )
A Scalable Blockchain Based Digital Rights Management System
Ashutosh Dhar Dwivedi
2019/1216 ( PDF )
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm
Wei-Zhu Yeoh and Je Sen Teh and Jiageng Chen
2019/1215 ( PDF )
Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
2019/1214 ( PDF )
A New Secure and Efficient Ownership Transfer Protocol based on Quadric Residue and Homomorphic Encryption
Farokhlagha Moazami and Masoumeh Safkhani
2019/1213 ( PDF )
Exploring Lightweight Efficiency of ForkAES
Fatih Balli and Subhadeep Banik
2019/1212 ( PDF )
Swap and Rotate: Lightweight linear layers for SPN-based blockciphers
Subhadeep Banik and Fatih Balli and Francesco Regazzoni and Serge Vaudenay
2019/1211 ( PDF )
Topology-Hiding Computation for Networks with Unknown Delays
Rio LaVigne and Chen-Da Liu-Zhang and Ueli Maurer and Tal Moran and Marta Mularczyk and Daniel Tschudi
2019/1210 ( PDF )
Adaptive Security of Practical Garbling Schemes
Zahra Jafargholi and Sabine Oechsner
2019/1209 ( PDF )
On collisions related to an ideal class of order 3 in CSIDH
Hiroshi Onuki and Tsuyoshi Takagi
2019/1208 ( PDF )
Towards Post-Quantum Secure Symmetric Cryptography: A Mathematical Perspective
Xenia Bogomolec and John Gregory Underhill and Stiepan Aurélien Kovac
2019/1207 ( PDF )
Behind multiple trapdoors: A cryptographic commitment scheme for establishing secure communications
Borja Gómez
2019/1206 ( PDF )
High-Speed Modular Multipliers for Isogeny-Based Post-Quantum Cryptography
Jing Tian; Zhe Liu; Jun Lin; Zhongfeng Wang; Binjing Li
2019/1205 ( PDF )
Secure Multi-party Quantum Computation with a Dishonest Majority
Yfke Dulek and Alex Grilo and Stacey Jeffery and Christian Majenz and Christian Schaffner
2019/1204 ( PDF )
Efficient simulation of random states and random unitaries
Gorjan Alagic and Christian Majenz and Alexander Russell
2019/1203 ( PDF )
Authentication in Key-Exchange: Definitions, Relations and Composition
Cyprien Delpech de Saint Guilhem and Marc Fischlin and Bogdan Warinschi
2019/1202 ( PDF )
Rational isogenies from irrational endomorphisms
Wouter Castryck and Lorenz Panny and Frederik Vercauteren
2019/1201 ( PDF )
Efficient Redactable Signature and Application to Anonymous Credentials
Olivier Sanders
2019/1200 ( PDF )
A note on short invertible ring elements and applications to cyclotomic and trinomials number fields
Thomas Attema and Ronald Cramer and Chaoping Xing
2019/1199 ( PDF )
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
Max Hoffmann and Michael Klooß and Markus Raiber and Andy Rupp
2019/1198 ( PDF )
Encrypted Databases: New Volume Attacks against Range Queries
Zichen Gui and Oliver Johnson and Bogdan Warinschi
2019/1197 ( PDF )
Secret sharing and duality
Laszlo Csirmaz
2019/1196 ( PDF )
Evaluating Octic Residue Symbols
Marc Joye
2019/1195 ( PDF )
Non-Malleable Commitments Using Goldreich-Levin List Decoding
Vipul Goyal and Silas Richelson
2019/1194 ( PDF )
Perfect Forward Security of SPAKE2
Michel Abdalla and Manuel Barbosa
2019/1193 ( PDF )
Security models for everlasting privacy
Panagiotis Grontas and Aris Pagourtzis and Alexandros Zacharakis
2019/1192 ( PDF )
Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets
Daniel Berend and Dor Bitan and Shlomi Dolev
2019/1191 ( PDF )
On the equivalence of authentication codes and robust (2,2)-threshold schemes
Maura B. Paterson and Douglas R. Stinson
2019/1190 ( PDF )
Improving Matsui's Search Algorithm for the Best Differential/Linear Trails and its Applications for DES, DESL and GIFT
Fulei Ji and Wentao Zhang and Tianyou Ding
2019/1189 ( PDF )
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging
Joël Alwen and Sandro Coretti and Yevgeniy Dodis and Yiannis Tselekounis
2019/1188 ( PDF )
Improving Password Guessing via Representation Learning
Dario Pasquini and Ankit Gangwal and Giuseppe Ateniese and Massimo Bernaschi and Mauro Conti
2019/1187 ( PDF )
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs
Orr Dunkelman and Léo Perrin
2019/1186 ( PDF )
Trading Accumulation Size for Witness Size: A Merkle Tree Based Universal Accumulator Via Subset Differences
Mahabir Prasad Jhanwar and Pratyush Ranjan Tiwari
2019/1185 ( PDF )
Formalising $\Sigma$-Protocols and Commitment Schemes using CryptHOL
David Butler and Andreas Lochbihler and David Aspinall and Adria Gascon
2019/1184 ( PDF )
A concrete instantiation of Bulletproof zero-knowledge proof
Andrey Jivsov
2019/1183 ( PDF )
Broadcast-Optimal Two-Round MPC
Ran Cohen and Juan Garay and Vassilis Zikas
2019/1182 ( PDF )
Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries
Serge Fehr and Chen Yuan
2019/1181 ( -- withdrawn -- )
Quantum Physical Unclonable Functions: Possibilities and Impossibilities
Myrto Arapinis and Mahshid Delavar and Mina Doosti and Elham Kashefi
2019/1180 ( PDF )
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices
Pierre-Alain Fouque and Paul Kirchner and Mehdi Tibouchi and Alexandre Wallet and Yang Yu
2019/1179 ( PDF )
Practical MP-LWE-based encryption balancing security-risk vs. efficiency
Ron Steinfeld and Amin Sakzad and Raymond K. Zhao
2019/1178 ( PDF )
SoK: Sharding on Blockchain
Gang Wang and Zhijie Jerry Shi and Mark Nixon and Song Han
2019/1177 ( PDF )
Proofs for Inner Pairing Products and Applications
Benedikt Bünz and Mary Maller and Pratyush Mishra and Nirvan Tyagi and Psi Vesely
2019/1176 ( PDF )
The Thirteenth Power Residue Symbol
Eric Brier and David Naccache
2019/1175 ( PDF )
Revisiting Leakage Abuse Attacks
Laura Blackstone and Seny Kamara and Tarik Moataz
2019/1174 ( PDF )
Hidden Irreducible Polynomials : A cryptosystem based on Multivariate Public Key Cryptography
Borja Gómez
2019/1173 ( PDF )
Immunization against Complete Subversion without Random Oracles
Giuseppe Ateniese and Danilo Francati and Bernardo Magri and Daniele Venturi
2019/1172 ( PDF )
Lever: Breaking the Shackles of Scalable On-chain Validation
Mingming Wang and Qianhong Wu
2019/1171 ( PDF )
Almost universal codes for MIMO wiretap channels
Laura Luzzi and Roope Vehkalahti and Cong Ling
2019/1170 ( PDF )
Space-efficient quantum multiplication of polynomials for binary finite fields with sub-quadratic Toffoli gate count
Iggy van Hoof
2019/1169 ( PDF )
Semantically Secure Lattice Codes for Compound MIMO Channels
Antonio Campello and Cong Ling and Jean-Claude Belfiore
2019/1168 ( PDF )
Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)
Chun Guo and Jonathan Katz and Xiao Wang and Chenkai Weng and Yu Yu
2019/1167 ( PDF )
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications
Nabil Alkeilani Alkadri and Rachid El Bansarkhani and Johannes Buchmann
2019/1166 ( PDF )
The complete cost of cofactor h=1
Peter Schwabe and Daan Sprenkels
2019/1165 ( PDF )
Fast verification of masking schemes in characteristic two
Nicolas Bordes and Pierre Karpman
2019/1164 ( PDF )
Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version)
Chao Liu and Zhongxiang Zheng and Keting Jia and Limin Tao
2019/1163 ( PDF )
On the Difficulty of FSM-based Hardware Obfuscation
Marc Fyrbiak and Sebastian Wallat and Jonathan Déchelotte and Nils Albartus and Sinan Böcker and Russell Tessier and Christof Paar
2019/1162 ( PDF )
Subversion-Resistant Simulation (Knowledge) Sound NIZKs
Karim Baghery
2019/1161 ( PDF )
Estimating quantum speedups for lattice sieves
Martin R. Albrecht and Vlad Gheorghiu and Eamonn W. Postlethwaite and John M. Schanck
2019/1160 ( PDF )
Cryptanalysis of the Multivariate Encryption Scheme EFLASH
Morten Øygarden and Patrick Felke and Håvard Raddum and Carlos Cid
2019/1159 ( PDF )
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Rindal and Peter Scholl
2019/1158 ( PDF )
Practical Privacy-Preserving K-means Clustering
Payman Mohassel and Mike Rosulek and Ni Trieu
2019/1157 ( PDF )
A Note on the Chi-square Method : A Tool for Proving Cryptographic Security
Srimanta Bhattacharya and Mridul Nandi
2019/1156 ( PDF )
How to Extract Useful Randomness from Unreliable Sources
Divesh Aggarwal and Maciej Obremski and João Ribeiro and Luisa Siniscalchi and Ivan Visconti
2019/1155 ( PDF )
Machine-Checked Proofs for Cryptographic Standards
José Bacelar Almeida and Cécile Baritel-Ruet and Manuel Barbosa and Gilles Barthe and François Dupressoir and Benjamin Grégoire and Vincent Laporte and Tiago Oliveira and Alley Stoughton and Pierre-Yves Strub
2019/1154 ( PDF )
The Retracing Boomerang Attack
Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir
2019/1153 ( PDF )
Stronger Security and Constructions of Multi-Designated Verifier Signatures
Ivan Damgård and Helene Haagh and Rebekah Mercer and Anca Nițulescu and Claudio Orlandi and Sophia Yakoubov
2019/1152 ( PDF )
Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs
Jonas Krautter and Dennis R.E. Gnad and Falk Schellenberg and Amir Moradi and Mehdi B. Tahoori
2019/1151 ( PDF )
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem
Yusuke Yoshida and Fuyuki Kitagawa and Keisuke Tanaka
2019/1150 ( PDF )
The Bitcoin Backbone Protocol Against Quantum Adversaries
Alexandru Cojocaru and Juan Garay and Aggelos Kiayias and Fang Song and Petros Wallden
2019/1149 ( PDF )
LockDown: Balance Availability Attack against Lightning Network Channels
Cristina Pérez-Solà and Alejandro Ranchal-Pedrosa and Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Joaquin Garcia-Alfaro
2019/1148 ( PDF )
On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption
Benjamin R. Curtis and Rachel Player
2019/1147 ( PDF )
Batching non-membership proofs with bilinear accumulators
Steve Thakur
2019/1146 ( PDF )
Implementing Grover oracles for quantum key search on AES and LowMC
Samuel Jaques and Michael Naehrig and Martin Roetteler and Fernando Virdia
2019/1145 ( PDF )
B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
Craig Costello
2019/1144 ( PDF )
Rerandomizable Signatures under Standard Assumption
Sanjit Chatterjee and R. Kabaleeshwaran
2019/1143 ( PDF )
Auditable Compressed Storage
Iraklis Leontiadis and Reza Curtmola
2019/1142 ( PDF )
Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP
Tamalika Mukherjee and Noah Stephens-Davidowitz
2019/1141 ( PDF )
KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures
Murat Yasin Kubilay and Mehmet Sabir Kiraz and Haci Ali Mantar
2019/1140 ( PDF )
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols (Extended Version)
Utsav Banerjee and Tenzin S. Ukyab and Anantha P. Chandrakasan
2019/1139 ( PDF )
Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
Mingchao Yu and Saeid Sahraei and Songze Li and Salman Avestimehr and Sreeram Kannan and Pramod Viswanath
2019/1138 ( PDF )
ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage
Gang Wang and Zhijie Jerry Shi and Mark Nixon and Song Han
2019/1137 ( PDF )
On the Complexity of Arithmetic Secret Sharing
Ronald Cramer and Chaoping Xing and Chen Yuan
2019/1136 ( PDF )
An implementation of the Paillier crypto system with threshold decryption without a trusted dealer
Thijs Veugen and Thomas Attema and Gabriele Spini
2019/1135 ( PDF )
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing
Arinjita Paul and S. Sharmila Deva Selvi and C. Pandu Rangan
2019/1134 ( PDF )
Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes
Ronald Cramer and Chaoping Xing
2019/1133 ( PDF )
Threat Models and Security of Phase-Change Memory
Gang Wang
2019/1132 ( PDF )
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2019/1131 ( PDF )
Nearly Optimal Robust Secret Sharing against Rushing Adversaries
Pasin Manurangsi and Akshayaram Srinivasan and Prashant Nalini Vasudevan
2019/1130 ( PDF )
On affine Cremona semigroups, corresponding protocols of Non-commutative Cryptography and encryption with several nonlinear multivariate transformations on secure Eulerian mode.
V. Ustimenko
2019/1129 ( PDF )
Privacy-Enhanced Machine Learning with Functional Encryption
Tilen Marc and Miha Stopar and Jan Hartman and Manca Bizjak and Jolanda Modic
2019/1128 ( PDF )
SoK: Communication Across Distributed Ledgers
Alexei Zamyatin and Mustafa Al-Bassam and Dionysis Zindros and Eleftherios Kokoris-Kogias and Pedro Moreno-Sanchez and Aggelos Kiayias and William J. Knottenbelt
2019/1127 ( PDF )
Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing
Kazuhiko Minematsu and Norifumi Kamiya
2019/1126 ( PDF )
Encrypted Distributed Hash Tables
Archita Agarwal and Seny Kamara
2019/1125 ( PDF )
Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols
Karim Baghery and Behzad Abdolmaleki and Shahram Khazaei and Mohammad Reza Aref
2019/1124 ( PDF )
Evolving Ramp Secret Sharing with a Small Gap
Amos Beimel and Hussien Othman
2019/1123 ( PDF )
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme
Laltu Sardar and Sushmita Ruj
2019/1122 ( PDF )
Exploring Trade-offs in Batch Bounded Distance Decoding
Martin R. Albrecht and Benjamin R. Curtis and Thomas Wunderer
2019/1121 ( PDF )
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors
Aaron Hutchinson and Jason LeGrow and Brian Koziel and Reza Azarderakhsh
2019/1120 ( PDF )
Structure-Preserving Signatures on Equivalence Classes From Standard Assumptions
Mojtaba Khalili and Daniel Slamanig and Mohammad Dakhilalian
2019/1119 ( PDF )
MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version)
Antonis Michalas and Alexandros Bakas and Hai-Van Dang and Alexandr Zalitko
2019/1118 ( PDF )
A Diffie-Hellman quantum session key establishment protocol without entanglement
Yalin Chen and Chang Hsiang and Liang-Chun Wang and Yu-Yuan Chou and Jue-Sam Chou *
2019/1117 ( -- withdrawn -- )
NP-completeness Reduction for Semiprimes Factorization Problem
Yen-Lung Lai
2019/1116 ( PDF )
Computational Extractors with Negligible Error in the CRS Model
Ankit Garg and Yael Tauman Kalai and Dakshita Khurana
2019/1115 ( PDF )
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash
Rui Zong and Xiaoyang Dong and Xiaoyun Wang
2019/1114 ( PDF )
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE
Jung Hee Cheon and Minki Hhan and Seungwan Hong and Yongha Son
2019/1113 ( PDF )
Towards a Homomorphic Machine Learning Big Data Pipeline for the Financial Services Sector
Oliver Masters and Hamish Hunt and Enrico Steffinlongo and Jack Crawford and Flavio Bergamaschi and Maria E. Dela Rosa and Caio C. Quini and Camila T. Alves and Feranda de Souza and Deise G. Ferreira
2019/1112 ( PDF )
Subliminal Hash Channels
George Teseleanu
2019/1111 ( PDF )
Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers
Mikerah Quintyne-Collins
2019/1110 ( -- withdrawn -- )
Redactable Proof-of-Stake Blockchain with Fast Confirmation
Jing Xu and Xinyu Li and Lingyuan Yin and Bingyong Guo and Han Feng and Zhenfeng Zhang
2019/1109 ( PDF )
Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography
Alberto Pedrouzo-Ulloa and Juan Ramón Troncoso-Pastoriza and Nicolas Gama and Mariya Georgieva and Fernando Pérez-González
2019/1108 ( PDF )
Lower Bounds for Multi-Server Oblivious RAMs
Kasper Green Larsen and Mark Simkin and Kevin Yeo
2019/1107 ( PDF )
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy
Lorenzo Grassi and Reinhard Lüftenegger and Christian Rechberger and Dragos Rotaru and Markus Schofnegger
2019/1106 ( PDF )
Side-channel Masking with Pseudo-Random Generator
Jean-Sébastien Coron and Aurélien Greuet and Rina Zeitoun
2019/1105 ( PDF )
On the Multi-User Security of Short Schnorr Signatures with Preprocessing
Jeremiah Blocki and Seunghoon Lee
2019/1104 ( PDF )
More Efficient MPC from Improved Triple Generation and Authenticated Garbling
Kang Yang and Xiao Wang and Jiang Zhang
2019/1103 ( PDF )
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms
Rahul Chatterjee and M. Sadegh Riazi and Tanmoy Chowdhury and Emanuela Marasco and Farinaz Koushanfar and Ari Juels
2019/1102 ( -- withdrawn -- )
Applications on traceable range proofs from fully regulatable privacy-preserving blockchains
Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2019/1101 ( PDF )
On the (Quantum) Random Oracle Methodology: New Separations and More
Jiang Zhang and Yu Yu and Dengguo Feng and Shuqin Fan and Zhenfeng Zhang
2019/1100 ( PDF )
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes
Qi Chen and Chunming Tang and Zhiqiang Lin
2019/1099 ( PDF )
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name
Eman Salem Alashwali and Kasper Rasmussen
2019/1098 ( PDF )
Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling
Eleftheria Makri and Tim Wood
2019/1097 ( PDF )
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric
Dmytro Bogatov and Angelo De Caro and Kaoutar Elkhiyaoui and Björn Tackmann
2019/1096 ( PDF )
Proof-of-Burn
Kostis Karantias and Aggelos Kiayias and Dionysis Zindros
2019/1095 ( PDF )
Secure Computation with Preprocessing via Function Secret Sharing
Elette Boyle and Niv Gilboa and Yuval Ishai
2019/1094 ( PDF )
Is Information-Theoretic Topology-Hiding Computation Possible?
Marshall Ball and Elette Boyle and Ran Cohen and Tal Malkin and Tal Moran
2019/1093 ( PDF )
Quantum Random Oracle Model with Auxiliary Input
Minki Hhan and Keita Xagawa and Takashi Yamakawa
2019/1092 ( PDF )
Cerberus Channels: Incentivizing Watchtowers for Bitcoin
Georgia Avarikioti and Orfeas Stefanos Thyfronitis Litos and Roger Wattenhofer
2019/1091 ( PDF )
Short Paper: XOR Arbiter PUFs have Systematic Response Bias
Nils Wisiol and Niklas Pirnay
2019/1090 ( PDF )
Low Complexity MDS Matrices Using $GF(2^n)$ SPB or GPB
Xinggu Chen and Haining Fan
2019/1089 ( PDF )
Lattice-Face Key Infrastructure (LFKI) for Quantum Resistant Computing
Josiah Johnson Umezurike
2019/1088 ( PDF )
KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability
Clinton Ehrlich and Anna Guzova
2019/1087 ( PDF )
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data
Shyam Murthy and Srinivas Vivek
2019/1086 ( PDF )
The SPHINCS+ Signature Framework
Daniel J. Bernstein and Andreas Hülsing and Stefan Kölbl and Ruben Niederhagen and Joost Rijneveld and Peter Schwabe
2019/1085 ( PDF )
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation
Yilei Chen and Minki Hhan and Vinod Vaikuntanathan and Hoeteck Wee
2019/1084 ( PDF )
Distributed Vector-OLE: Improved Constructions and Implementation
Phillipp Schoppmann and Adrià Gascón and Leonie Reichert and Mariana Raykova
2019/1083 ( PDF )
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS
Eman Salem Alashwali and Kasper Rasmussen
2019/1082 ( PDF )
On the Security of Multikey Homomorphic Encryption
Hyang-Sook Lee and Jeongeun Park
2019/1081 ( PDF )
OCEAN: A Built-In Replacement for Mining Pools
Raymond Chee and Kartik Chitturi and Edouard Dufour-Sans and Kyle Soska
2019/1080 ( PDF )
Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods
Fukang Liu and Takanori Isobe and Willi Meier
2019/1079 ( PDF )
When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited
Yiming Zhu and Zhen Liu and Yanbin Pan
2019/1078 ( PDF )
Puncturable Proxy Re-Encryption supporting to Group Messaging Service
Tran Viet Xuan Phuong and Willy Susilo and Jongkil Kim and Guomin Yang and Dongxi Liu
2019/1077 ( PDF )
Adaptively Secure Garbling Schemes for Parallel Computations
Kai-Min Chung; Luowen Qian
2019/1076 ( PDF )
Fractal: Post-Quantum and Transparent Recursive Proofs from Holography
Alessandro Chiesa and Dev Ojha and Nicholas Spooner
2019/1075 ( PDF )
Private Information Retrieval with Sublinear Online Time
Henry Corrigan-Gibbs and Dmitry Kogan
2019/1074 ( PDF )
Non-monotonic Practical ABE with Direct Revocation, Blackbox Traceability, and a Large Attribute Universe
Dirk Thatmann
2019/1073 ( PDF )
iUC: Flexible Universal Composability Made Simple
Jan Camenisch and Stephan Krenn and Ralf Kuesters and Daniel Rausch
2019/1072 ( PDF )
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem
Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Kevin Liu and Giulio Malavolta
2019/1071 ( PDF )
DLSCA: a Tool for Deep Learning Side Channel Analysis
Martin Brisfors and Sebastian Forsmark
2019/1070 ( PDF )
Secure Delegation of Isogeny Computations and Cryptographic Applications
Robi Pedersen and Osmanbey Uzunkol
2019/1069 ( PDF )
Efficient Private PEZ Protocols for Symmetric Functions
Yoshiki Abe and Mitsugu Iwamoto and Kazuo Ohta
2019/1068 ( PDF )
Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets Efficiently
Joey Green and Tilo Burghardt and Elisabeth Oswald
2019/1067 ( PDF )
Lattice Trapdoors and IBE from Middle-Product LWE
Alex Lombardi and Vinod Vaikuntanathan and Thuy Duong Vuong
2019/1066 ( PDF )
HEAX: An Architecture for Computing on Encrypted Data
M. Sadegh Riazi and Kim Laine and Blake Pelton and Wei Dai
2019/1065 ( PDF )
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Karim Baghery
2019/1064 ( PDF )
Separating Symmetric and Asymmetric Password-Authenticated Key Exchange
Julia Hesse
2019/1063 ( PDF )
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing
Behzad Abdolmaleki and Hamidreza Khoshakhlagh and Daniel Slamanig
2019/1062 ( PDF )
Local Proofs Approaching the Witness Length
Noga Ron-Zewi and Ron D. Rothblum
2019/1061 ( PDF )
Breaking and Fixing Anonymous Credentials for the Cloud
Ulrich Haböck and Stephan Krenn
2019/1060 ( PDF )
Sharing the LUOV: Threshold Post-Quantum Signatures
Daniele Cozzo and Nigel P. smart
2019/1059 ( PDF )
A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem
Daniele Di Tullio and Ankan Pal
2019/1058 ( PDF )
Privacy-preserving auditable token payments in a permissioned blockchain system
Elli Androulaki and Jan Camenisch and Angelo De Caro and Maria Dubovitskaya and Kaoutar Elkhiyaoui and Björn Tackmann
2019/1057 ( PDF )
A Study of Persistent Fault Analysis
Andrea Caforio and Subhadeep Banik
2019/1056 ( PDF )
Adventures in Supersingularland
Sarah Arpin and Catalina Camacho-Navarro and Kristin Lauter and Joelle Lim and Kristina Nelson and Travis Scholl and Jana Sotáková
2019/1055 ( PDF )
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk
2019/1054 ( PDF )
Truthful and Faithful Monetary Policy for a Stablecoin Conducted by a Decentralised, Encrypted Artificial Intelligence
David Cerezo Sánchez
2019/1053 ( PDF )
Modeling Memory Faults in Signature and Authenticated Encryption Schemes
Marc Fischlin and Felix Günther
2019/1052 ( PDF )
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem
Abderrahmane Nitaj and Willy Susilo and Joseph Tonien
2019/1051 ( PDF )
A New Public Key Cryptosystem Based on Edwards Curves
Maher Boudabra and Abderrahmane Nitaj
2019/1050 ( PDF )
A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem
Abderrahmane Nitaj and Emmanuel Fouotsa
2019/1049 ( PDF )
CrypTFlow: Secure TensorFlow Inference
Nishant Kumar and Mayank Rathee and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma
2019/1048 ( PDF )
New point compression method for elliptic $\mathbb{F}_{\!q^2}$-curves of $j$-invariant $0$
Dmitrii Koshelev
2019/1047 ( PDF )
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS
Alessandro Chiesa and Yuncong Hu and Mary Maller and Pratyush Mishra and Psi Vesely and Nicholas Ward
2019/1046 ( PDF )
The Function-Inversion Problem: Barriers and Opportunities
Henry Corrigan-Gibbs and Dmitry Kogan
2019/1045 ( PDF )
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank
Josh Alman and Robin Hui
2019/1044 ( PDF )
Verifiable Registration-Based Encryption
Rishab Goyal and Satyanarayana Vusirikala
2019/1043 ( PDF )
Breaking the Bluetooth Pairing – The Fixed Coordinate Invalid Curve Attack
Eli Biham and Lior Neumann
2019/1042 ( PDF )
A Machine-Checked Proof of Security for AWS Key Management Service
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Matthew Campagna and Ernie Cohen and Benjamin Gregoire and Vitor Pereira and Bernardo Portela and Pierre-Yves Strub and Serdar Tasiran
2019/1041 ( PDF )
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Swapnil Paliwal and Anvita Chandrakar
2019/1040 ( PDF )
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
Abhishek Chakraborty and Ankur Srivastava
2019/1039 ( PDF )
Accelerated V2X provisioning with Extensible Processor Platform
Henrique S. Ogawa and Thomas E. Luther and Jefferson E. Ricardini and Helmiton Cunha and Marcos Simplicio Jr. and Diego F. Aranha and Ruud Derwig and Harsh Kupwade-Patil
2019/1038 ( PDF )
Dynamic Searchable Encryption with Access Control
Johannes Blömer and Nils Löken
2019/1037 ( PDF )
Card-based Cryptography Meets Formal Verification
Alexander Koch and Michael Schrempp and Michael Kirsten
2019/1036 ( PDF )
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Kazuki Yoneyama
2019/1035 ( PDF )
An LLL Algorithm for Module Lattices
Changmin Lee and Alice Pellet-Mary and Damien Stehlé and Alexandre Wallet
2019/1034 ( PDF )
Sponges Resist Leakage: The Case of Authenticated Encryption
Jean Paul Degabriele and Christian Janson and Patrick Struck
2019/1033 ( PDF )
Anonymous AE
John Chan and Phillip Rogaway
2019/1032 ( PDF )
On Fully Secure MPC with Solitary Output
Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Nikolaos Makriyannis and Tal Rabin
2019/1031 ( PDF )
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice
Rahim Toluee and Taraneh Eghlidos
2019/1030 ( PDF )
How to leverage hardness of constant degree expanding polynomials over R to build iO
Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai
2019/1029 ( PDF )
Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures
Yilei Chen and Nicholas Genise and Pratyay Mukherjee
2019/1028 ( PDF )
Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors
Divesh Aggarwal and Bogdan Ursu and Serge Vaudenay
2019/1027 ( PDF )
Quantum LLL with an Application to Mersenne Number Cryptosystems
Marcel Tiepelt and Alan Szepieniec
2019/1026 ( PDF )
Efficient Tightly-Secure Structure-Preserving Signatures and Unbounded Simulation-Sound QA-NIZK Proofs
Mojtaba Khalili and Daniel Slamanig
2019/1025 ( PDF )
On Perfect Correctness without Derandomization
Gilad Asharov and Naomi Ephraim and Ilan Komargodski and Rafael Pass
2019/1024 ( PDF )
Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix
Dor Bitan and Shlomi Dolev
2019/1023 ( PDF )
Randomly Choose an Angle from Immense Number of Angles to Rotate Qubits, Compute and Reverse
Dor Bitan and Shlomi Dolev
2019/1022 ( PDF )
A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem
Jintai Ding and Joshua Deaton and Kurt Schmidt and Vishakha and Zheng Zhang
2019/1021 ( PDF )
Recursive Proof Composition without a Trusted Setup
Sean Bowe and Jack Grigg and Daira Hopwood
2019/1020 ( PDF )
Transparent Polynomial Commitment Scheme with Polylogarithmic Communication Complexity
Alexander Vlasov and Konstantin Panarin
2019/1019 ( PDF )
Revisiting the Hybrid attack on sparse and ternary secret LWE
Yongha Son and Jung Hee Cheon
2019/1018 ( PDF )
Towards Instantiating the Algebraic Group Model
Julia Kastner and Jiaxin Pan
2019/1017 ( PDF )
The Local Forking Lemma and its Application to Deterministic Encryption
Mihir Bellare and Wei Dai and Lucy Li
2019/1016 ( PDF )
Quantum Algorithms for the Approximate $k$-List Problem and their Application to Lattice Sieving
Elena Kirshanova and Erik Mårtensson and Eamonn W. Postlethwaite and Subhayan Roy Moulik
2019/1015 ( PDF )
Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.
Eleftherios Kokoris-Kogias and Dahlia Malkhi and Alexander Spiegelman
2019/1014 ( PDF )
Security Reductions for White-Box Key-Storage in Mobile Payments
Estuardo Alpirez Bock and Chris Brzuska and Marc Fischlin and Christian Janson and Wil Michiels
2019/1013 ( PDF )
A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules')
Carolyn Whitnall and Elisabeth Oswald
2019/1012 ( PDF )
Simple and Efficient KDM-CCA Secure Public Key Encryption
Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka
2019/1011 ( PDF )
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers
Raymond K. Zhao and Ron Steinfeld and Amin Sakzad
2019/1010 ( PDF )
On Perfect Correctness in (Lockable) Obfuscation
Rishab Goyal and Venkata Koppula and Satyanarayana Vusirikala and Brent Waters
2019/1009 ( PDF )
LLL and stochastic sandpile models
Jintai Ding and Seungki Kim and Tsuyoshi Takagi and Yuntao Wang
2019/1008 ( PDF )
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations
Olivier Bronchain and François-Xavier Standaert
2019/1007 ( PDF )
SPAE a mode of operation for AES on low-cost hardware
Philippe Elbaz-Vincent and Cyril Hugounenq and Sébastien Riou
2019/1006 ( PDF )
Lucente Stabile Atkins (LSA) Cryptosystem (Unbreakable)
Francesco Lucente Stabile and Carey Patrick Atkins
2019/1005 ( PDF )
Threshold Implementations in the Robust Probing Model
Siemen Dhooghe and Svetla Nikova and Vincent Rijmen
2019/1004 ( PDF )
Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages
Elena Andreeva and Virginie Lallemand and Antoon Purnal and Reza Reyhanitabar and Arnab Roy and Damian Vizar
2019/1003 ( PDF )
Twisted Hessian Isogenies
Thinh Dang and Dustin Moody
2019/1002 ( PDF )
Boomerang Uniformity of Popular S-box Constructions
Shizhu Tian and Christina Boura and Léo Perrin
2019/1001 ( PDF )
Middle-Product Learning with Rounding Problem and its Applications
Shi Bai and Katharina Boudgoust and Dipayan Das and Adeline Roux-Langlois and Weiqiang Wen and Zhenfei Zhang
2019/1000 ( PDF )
Security of Symmetric Primitives against Key-Correlated Attacks
Aisling Connolly and Pooya Farshim and Georg Fuchsbauer
2019/999 ( PDF )
On the Fast Algebraic Immunity of Majority Functions
Pierrick Méaux
2019/998 ( PDF )
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation
Arpita Patra and Divya Ravi
2019/997 ( PDF )
On the (In)security of Kilian-Based SNARGs
James Bartusek and Liron Bronfman and Justin Holmgren and Fermi Ma and Ron Rothblum
2019/996 ( PDF )
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG
Shaanan Cohney and Andrew Kwong and Shachar Paz and Daniel Genkin and Nadia Heninger and Eyal Ronen and Yuval Yarom
2019/995 ( PDF )
Blackbox Constructions from Mix-Nets
Douglas Wikström
2019/994 ( PDF )
A new family of APN quadrinomials
Lilya Budaghyan and Tor Helleseth and Nikolay Kaleyski
2019/993 ( PDF )
Private Set Relations with Bloom Filters for Outsourced SLA Validation
Louis Tajan and Dirk Westhoff and Frederik Armknecht
2019/992 ( PDF )
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms
Tetsu Iwata and Mustafa Khairallah and Kazuhiko Minematsu and Thomas Peyrin
2019/991 ( PDF )
Vectorized linear approximations for attacks on SNOW 3G
Jing Yang and Thomas Johansson and Alexander Maximov
2019/990 ( PDF )
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More
Sanjam Garg and Mohammad Hajiabadi and Rafail Ostrovsky
2019/989 ( PDF )
Substitution Attacks against Message Authentication
Marcel Armour and Bertram Poettering
2019/988 ( PDF )
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications
David W. Archer and Jose Manuel Calderon Trilla and Jason Dagit and Alex J. Malozemoff and Yuriy Polyakov and Kurt Rohloff and Gerard Ryan
2019/987 ( PDF )
Subverting Decryption in AEAD
Marcel Armour and Bertram Poettering
2019/986 ( PDF )
Outpost: A Responsive Lightweight Watchtower
Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer
2019/985 ( PDF )
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts
Philipp Schindler and Aljosha Judmayer and Nicholas Stifter and Edgar Weippl
2019/984 ( PDF )
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions
Sam Kim and David J. Wu
2019/983 ( PDF )
Graph Similarity and Its Applications to Hardware Security
Marc Fyrbiak and Sebastian Wallat and Sascha Reinhard and Nicolai Bissantz and Christof Paar
2019/982 ( PDF )
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions
Toi Tomita and Wakaha Ogata and Kaoru Kurosawa and Ryo Kuwayama
2019/981 ( PDF )
Traceback for End-to-End Encrypted Messaging
Nirvan Tyagi and Ian Miers and Thomas Ristenpart
2019/980 ( PDF )
New Approaches to Traitor Tracing with Embedded Identities
Rishab Goyal and Venkata Koppula and Brent Waters
2019/979 ( PDF )
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks
Kalikinkar Mandal and Guang Gong
2019/978 ( PDF )
Strength in Numbers: Improving Generalization with Ensembles in Profiled Side-channel Analysis
Guilherme Perin and Lukasz Chmielewski and Stjepan Picek
2019/977 ( PDF )
Non-malleable Zero-Knowledge Arguments with Lower Round Complexity
Zhenbin Yan and Yi Deng
2019/976 ( PDF )
Towards real-time hidden speaker recognition by means of fully homomorphic encryption
Martin Zuber and Sergiu Carpov and Renaud Sirdey
2019/975 ( -- withdrawn -- )
Ci-Lock: Cipher Induced Logic Locking Resistant Against SAT Attacks
Akashdeep Saha and Sayandeep Saha and Debdeep Mukhopadhyay and Bhargab Bikram Bhattacharya
2019/974 ( PDF )
Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE
Abdelrahaman Aly and Emmanuela Orsini and Dragos Rotaru and Nigel P. Smart and Tim Wood
2019/973 ( PDF )
On the Non-Existence of Short Vectors in Random Module Lattices
Ngoc Khanh Nguyen
2019/972 ( PDF )
Noninteractive Zero Knowledge Proof System for NP from Ring LWE
Wenping MA
2019/971 ( PDF )
Verifpal: Cryptographic Protocol Analysis for the Real World
Nadim Kobeissi and Georgio Nicolas and Mukesh Tiwari
2019/970 ( -- withdrawn -- )
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol
Xinyu Li and Jing Xu and Xiong Fan and Yuchen Wang and Zhenfeng Zhang
2019/969 ( PDF )
Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography
Russell W. F. Lai and Giulio Malavolta and Viktoria Ronge
2019/968 ( PDF )
There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero
William Black and Ryan Henry
2019/967 ( PDF )
On NIST's Compression Estimate Test
Prasanna Raghaw Mishra and Bhartendu Nandan and Navneet Gaba
2019/966 ( PDF )
Fast, Compact, and Expressive Attribute-Based Encryption
Junichi Tomida and Yuto Kawahara and Ryo Nishimaki
2019/965 ( PDF )
Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness
Andrea Caforio and F Betül Durak and Serge Vaudenay
2019/964 ( PDF )
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited
Georg Fuchsbauer
2019/963 ( PDF )
Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits
Pascal Aubry and Sergiu Carpov and Renaud Sirdey
2019/962 ( PDF )
New Constructions of Hinting PRGs, OWFs with Encryption, and more
Rishab Goyal and Satyanarayana Vusirikala and Brent Waters
2019/961 ( PDF )
Computing across Trust Boundaries using Distributed Homomorphic Cryptography
Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Pierre Hubaux
2019/960 ( PDF )
Another Look at Key Randomisation Hypotheses
Subhabrata Samajder and Palash Sarkar
2019/959 ( PDF )
Table Redundancy Method for Protecting against Fault Attacks
Seungkwang Lee and Nam-su Jho and Myungchul Kim
2019/958 ( PDF )
Using SMT Solvers to Automate Chosen Ciphertext Attacks
Gabrielle Beck and Maximilian Zinkus and Matthew Green
2019/957 ( PDF )
TaaS: Commodity MPC via Triples-as-a-Service
Nigel P. Smart and Titouan Tanguy
2019/956 ( PDF )
Security of Hedged Fiat-Shamir Signatures under Fault Attacks
Diego F. Aranha and Claudio Orlandi and Akira Takahashi and Greg Zaverucha
2019/955 ( PDF )
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications
Antonio Faonio and Dario Fiore and Javier Herranz and Carla Ràfols
2019/954 ( PDF )
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Mohsen Jahanbani and Zeinolabedin Norouzi and Nasour Bagheri
2019/953 ( PDF )
PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge
Ariel Gabizon and Zachary J. Williamson and Oana Ciobotaru
2019/952 ( PDF )
Non-Interactive Zero Knowledge Proofs in the Random Oracle Model
Vincenzo Iovino and Ivan Visconti
2019/951 ( PDF )
Collisions on Feistel-MiMC and univariate GMiMC
Xavier Bonnetain
2019/950 ( PDF )
Another look at some isogeny hardness assumptions
Simon-Philipp Merz and Romy Minko and Christophe Petit
2019/949 ( PDF )
A Note on Parameter Choices of Round5
Yongha Son
2019/948 ( PDF )
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
Prasanna Ravi and Sujoy Sinha Roy and Anupam Chattopadhyay and Shivam Bhasin
2019/947 ( PDF )
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
Fabian Boemer and Anamaria Costache and Rosario Cammarota and Casimir Wierzynski
2019/946 ( PDF )
Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design
M Sazadur Rahman and Adib Nahiyan and Sarah Amir and Fahim Rahman and Farimah Farahmandi and Domenic Forte and Mark Tehranipoor
2019/945 ( PDF )
A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting
Navid Ghaedi Bardeh
2019/944 ( PDF )
Efficient zero-knowledge arguments in the discrete log setting, revisited
Max Hoffmann and Michael Klooß and Andy Rupp
2019/943 ( PDF )
Analysis of Nakamoto Consensus
Ling Ren
2019/942 ( PDF )
Ouroboros Clepsydra: Ouroboros Praos in the Universally Composable Relative Time Model
Handan Kılınç Alper
2019/941 ( PDF )
Does "www." Mean Better Transport Layer Security?
Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
2019/940 ( PDF )
Security analysis of two lightweight certificateless signature schemes
Nasrollah Pakniat
2019/939 ( PDF )
Homomorphic Encryption Standard
Martin Albrecht and Melissa Chase and Hao Chen and Jintai Ding and Shafi Goldwasser and Sergey Gorbunov and Shai Halevi and Jeffrey Hoffstein and Kim Laine and Kristin Lauter and Satya Lokam and Daniele Micciancio and Dustin Moody and Travis Morrison and Amit Sahai and Vinod Vaikuntanathan
2019/938 ( PDF )
Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem
Gaëtan Leurent and Ferdinand Sibleyras
2019/937 ( PDF )
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation
Sayandeep Saha and Arnab Bag and Debapriya Basu Roy and Sikhar Patranabis and Debdeep Mukhopadhyay
2019/936 ( PDF )
SNEIK on Microcontrollers: AVR, ARMv7-M, and RISC-V with Custom Instructions
Markku-Juhani O. Saarinen
2019/935 ( -- withdrawn -- )
Interpretable Encrypted Searchable Neural Networks
Kai Chen and Zhongrui Lin and Jian Wan and Chungen Xu
2019/934 ( PDF )
Linear Approximations of Random Functions and Permutations
Mohsin Khan and Kaisa Nyberg
2019/933 ( PDF )
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy
Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen
2019/932 ( PDF )
Related-key Differential Cryptanalysis of Full Round CRAFT
Muhammad ElSheikh and Amr M. Youssef
2019/931 ( PDF )
Low Weight Discrete Logarithms and Subset Sum in $2^{0.65n}$ with Polynomial Memory
Andre Esser and Alexander May
2019/930 ( PDF )
Module-LWE versus Ring-LWE, Revisited
Yang Wang and Mingqiang Wang
2019/929 ( PDF )
On the Degree-Insensitive SI-GDH problem and assumption
Samuel Dobson and Steven D. Galbraith
2019/928 ( PDF )
Blockchain-enabled Cryptographically-secure Hardware Obfuscation
Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert and Domenic Forte
2019/927 ( PDF )
Isogeny-based hashing despite known endomorphisms
Lorenz Panny
2019/926 ( PDF )
Formal Verification of a Constant-Time Preserving C Compiler
Gilles Barthe and Sandrine Blazy and Benjamin Grégoire and Rémi Hutin and Vincent Laporte and David Pichardie and Alix Trieu
2019/925 ( PDF )
Fully Auditable Privacy-preserving Cryptocurrency Against Malicious Auditors
Wulu Li and Yongcan Wang and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin
2019/924 ( PDF )
Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework
Dirk Achenbach and Roland Gröll and Timon Hackenjos and Alexander Koch and Bernhard Löwe and Jeremias Mechler and Jörn Müller-Quade and Jochen Rill
2019/923 ( PDF )
Automated Probe Repositioning for On-Die EM Measurements
Bastian Richter and Alexander Wild and Amir Moradi
2019/922 ( PDF )
A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation
Karim Eldefrawy and Vitor Pereira
2019/921 ( PDF )
Tree authenticated ephemeral keys
Pavol Zajac
2019/920 ( PDF )
Related-Key Differential Slide Attack Against Fountain V1
Raluca Posteuca
2019/919 ( PDF )
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection (extended version∗)
Wei Cheng and Claude Carlet and Kouassi Goli and Sylvain Guilley and Jean-Luc Danger
2019/918 ( PDF )
Resolving the Trilemma in Logic Encryption
Hai Zhou and Amin Rezaei and Yuanqi Shen
2019/917 ( PDF )
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
Shixiong Wang and Juanyang Zhang and Jingnan He and Huaxiong Wang and Chao Li
2019/916 ( -- withdrawn -- )
Multi-owner Secure Encrypted Search Using Searching Adversarial Networks
Kai Chen; Zhongrui Lin; Jian Wan; Lei Xu; Chungen Xu.
2019/915 ( PDF )
Unique Rabin-Williams Signature Scheme Decryption
Lynn Margaret Batten and Hugh Cowie Williams
2019/914 ( PDF )
Composable and Finite Computational Security of Quantum Message Transmission
Fabio Banfi and Ueli Maurer and Christopher Portmann and Jiamin Zhu
2019/913 ( PDF )
Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — An Analytical Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography
Wen-Ran Zhang
2019/912 ( PDF )
Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications
David Derler and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks
2019/911 ( PDF )
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
Gildas Avoine and Sébastien Canard and Loïc Ferreira
2019/910 ( PDF )
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto
Tobias Schneider and Clara Paglialonga and Tobias Oder and Tim Güneysu
2019/909 ( PDF )
A Practicable Timing Attack Against HQC and its Countermeasure
Guillaume Wafo-Tapa and Slim Bettaieb and Loic Bidoux and Philippe Gaborit and Etienne Marcatel
2019/908 ( PDF )
Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security
Benoît Libert and Khoa Nguyen and Alain Passelègue and Radu Titiu
2019/907 ( PDF )
Practical Forgery Attacks on Limdolen and HERN
Raghvendra Rohit and Guang Gong
2019/906 ( PDF )
Efficient and secure software implementations of Fantomas
Rafael J. Cruz and Antonio Guimarães and Diego F. Aranha
2019/905 ( -- withdrawn -- )
The Power of NIST Cryptographic Tests Suite
Paul Burciu and Emil Simion
2019/904 ( PDF )
Timed-Release Encryption With Master Time Bound Key (Full Version)
Gwangbae Choi and Serge Vaudenay
2019/903 ( PDF )
Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases
Igor Semaev and Andrea Tenti
2019/902 ( PDF )
Fractional LWE: a nonlinear variant of LWE
Gérald Gavin and Stéphane Bonnevay
2019/901 ( PDF )
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs
Thomas Haines and Clementine Gritti
2019/900 ( -- withdrawn -- )
Multi-client Secure Encrypted Search Using Searching Adversarial Networks
Kai Chen; Zhongrui Lin; Jian Wan; Lei Xu; Chungen Xu.
2019/899 ( PDF )
A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P
Michael Yonli
2019/898 ( PDF )
One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips
Mehdi Tibouchi and Alexandre Wallet
2019/897 ( PDF )
On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem
Vasyl Ustimenko
2019/896 ( PDF )
On the optionality and fairness of Atomic Swaps
Runchao Han and Haoyu Lin and Jiangshan Yu
2019/895 ( PDF )
The Singularity Attack to the Multivariate Signature Scheme Himq-3
Jintai Ding and Zheng Zhang and Joshua Deaton and Vishakha
2019/894 ( PDF )
BioID: a Privacy-Friendly Identity Document
Fatih Balli and F. Betül Durak and Serge Vaudenay
2019/893 ( PDF )
New Efficient, Constant-Time Implementations of Falcon
Thomas Pornin
2019/892 ( PDF )
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
Patrick Kresmer and Alexander Zeh
2019/891 ( PDF )
Shielded Computations in Smart Contracts Overcoming Forks
Vincenzo Botta and Daniele Friolo and Daniele Venturi and Ivan Visconti
2019/890 ( PDF )
An Adaptive Attack on 2-SIDH
Samuel Dobson and Steven D. Galbraith and Jason LeGrow and Yan Bo Ti and Lukas Zobernig
2019/889 ( PDF )
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Anders Dalskov and Marcel Keller and Claudio Orlandi and Kris Shrishak and Haya Shulman
2019/888 ( PDF )
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed
Mustafa Khairallah
2019/887 ( PDF )
Accelerating V2X Cryptography through Batch Operations
Paul Bottinelli and Robert Lambert
2019/886 ( PDF )
Round Complexity of Byzantine Agreement, Revisited
T-H. Hubert Chan and Rafael Pass and Elaine Shi
2019/885 ( PDF )
On the alpha value of polynomials in the tower number field sieve algorithm
Aurore Guillevic and Shashank Singh
2019/884 ( PDF )
Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures
Mahesh Sreekumar Rajasree
2019/883 ( PDF )
HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication
Donghang Lu and Thomas Yurek and Samarth Kulshreshtha and Rahul Govind and Rahul Mahadev and Aniket Kate and Andrew Miller
2019/882 ( PDF )
Modifying The Tropical Version of Stickel’s Key Exchange Protocol
Any Muanalifah and Serge˘ı Sergeev
2019/881 ( PDF )
On the Boomerang Uniformity of some Permutation Polynomials
Marco Calderini and Irene Villa
2019/880 ( PDF )
A Blockchain-Based Access Control Scheme for Smart Grids
Yuyang Zhou and Yuanfeng Guan and Zhiwei Zhang and Fagen Li
2019/879 ( PDF )
Cube-Based Cryptanalysis of Subterranean-SAE
Fukang Liu and Takanori Isobe and Willi Meier
2019/878 ( PDF )
Algebraically Structured LWE, Revisited
Chris Peikert and Zachary Pepin
2019/877 ( PDF )
Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model
Georg Fuchsbauer and Antoine Plouviez and Yannick Seurin
2019/876 ( PDF )
Kadcast: A Structured Approach to Broadcast in Blockchain Networks
Elias Rohrer and Florian Tschorsch
2019/875 ( PDF )
Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication
Daan Leermakers and Boris Skoric
2019/874 ( PDF )
ABDKS Attribute-Based Encryption with Dynamic Keyword Search in Fog Computing
Fei Meng and Mingqiang Wang
2019/873 ( PDF )
Count of rotational symmetric bent Boolean functions
Shashi Kant Pandey and P.R. Mishra
2019/872 ( PDF )
Efficient Information-Theoretic Secure Multiparty Computation over $\mathbb{Z}/p^k \mathbb{Z}$ via Galois Rings
Mark Abspoel and Ronald Cramer and Ivan Damgård and Daniel Escudero and Chen Yuan
2019/871 ( PDF )
Non-Locality and Zero-Knowledge MIPs
Claude Crépeau and Nan Yang
2019/870 ( PDF )
The Eleventh Power Residue Symbol
Marc Joye and Oleksandra Lapiha and Ky Nguyen and David Naccache
2019/869 ( PDF )
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
Aritra Dhar and Enis Ulqinaku and Kari Kostiainen and Srdjan Capkun
2019/868 ( PDF )
On the Round Complexity of Randomized Byzantine Agreement
Ran Cohen and Iftach Haitner and Nikolaos Makriyannis and Matan Orland and Alex Samorodnitsky
2019/867 ( PDF )
A Practical Forgery Attack on Lilliput-AE
Orr Dunkelman and Nathan Keller and Eran Lambooij and Yu Sasaki
2019/866 ( PDF )
A Fast Characterization Method for Semi-invasive Fault Injection Attacks
Lichao Wu and Gerard Ribera and Noemie Beringuier-Boher and Stjepan Picek
2019/865 ( PDF )
Cryptanalysis of Reduced-Round SipHash
Le He and Hongbo Yu
2019/864 ( -- withdrawn -- )
Another Look at Byzantine Fault Tolerance
Yongge Wang
2019/863 ( PDF )
Fast Actively Secure Five-Party Computation with Security Beyond Abort
Megha Byali and Carmit Hazay and Arpita Patra and Swati Singla
2019/862 ( PDF )
Key recovery attacks on the Legendre PRFs within the birthday bound
Dmitry Khovratovich
2019/861 ( PDF )
A Tale of Three Signatures: practical attack of ECDSA with wNAF
Gabrielle De Micheli and Rémi Piau and Cécile Pierrot
2019/860 ( PDF )
Machine learning and side channel analysis in a CTF competition
Yongbo Hu and Yeyang Zheng and Pengwei Feng and Lirui Liu and Chen Zhang and Aron Gohr and Sven Jacob and Werner Schindler and Ileana Buhan and Karim Tobich
2019/859 ( PDF )
A Coin-Free Oracle-Based Augmented Black Box Framework
Kyosuke Yamashita and Mehdi Tibouchi and Masayuki Abe
2019/858 ( PDF )
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH
Eric Crockett and Christian Paquin and Douglas Stebila
2019/857 ( PDF )
Bitcontracts: Supporting Smart Contracts in Legacy Blockchains
Karl Wüst and Loris Diana and Kari Kostiainen and Ghassan Karame and Sinisa Matetic and Srdjan Capkun
2019/856 ( PDF )
More results on Shortest Linear Programs
Subhadeep Banik and Yuki Funabiki and Takanori Isobe
2019/855 ( PDF )
WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery
Dominic Dams and Jeff Lataille and Rino Sanchez and John Wade
2019/854 ( PDF )
Reducing the Cost of Implementing AES as a Quantum Circuit
Brandon Langenberg and Hai Pham and Rainer Steinwandt
2019/853 ( PDF )
A critique of game-based definitions of receipt-freeness for voting
Ashley Fraser and Elizabeth A. Quaglia and Ben Smyth
2019/852 ( PDF )
Weak-Key Distinguishers for AES
Lorenzo Grassi and Gregor Leander and Christian Rechberger and Cihangir Tezcan and Friedrich Wiemer
2019/851 ( PDF )
On Designing Lightweight RFID Security Protocols for Medical IoT
Masoumeh Safkhani and Ygal Bendavid and Samad Rostampour and Nasour Bagheri
2019/850 ( PDF )
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles
Morteza Adeli and Nasour Bagheri
2019/849 ( PDF )
Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems
Ambili K N and Jimmy Jose
2019/848 ( PDF )
Observations on the DLCT and Absolute Indicators
Anne Canteaut and Lukas Kölsch and Friedrich Wiemer
2019/847 ( PDF )
Improved Heuristics for Short Linear Programs
Quan Quan Tan and Thomas Peyrin
2019/846 ( PDF )
Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions
Yuechen Chen and Linru Zhang and Siu-Ming Yiu
2019/845 ( PDF )
A Reaction Attack against Cryptosystems based on LRPC Codes
Simona Samardjiska and Paolo Santini and Edoardo Persichetti and Gustavo Banegas
2019/844 ( PDF )
pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4
Matthias J. Kannwischer and Joost Rijneveld and Peter Schwabe and Ko Stoffelen
2019/843 ( PDF )
How to Construct CSIDH on Edwards Curves
Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi
2019/842 ( PDF )
Improved SIMD Implementation of Poly1305
Sreyosi Bhattacharyya and Palash Sarkar
2019/841 ( PDF )
Practical Cryptanalysis of k-ary C*
Daniel Smith-Tone
2019/840 ( PDF )
A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function to TPMS
Yuhei Watanabe and Hideki Yamamoto and Hirotaka Yoshida
2019/839 ( PDF )
Statistical Zap Arguments from Quasi-Polynomial LWE
Abhishek Jain and Zhengzhong Jin
2019/838 ( PDF )
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake
Christian Badertscher and Peter Gaži and Aggelos Kiayias and Alexander Russell and Vassilis Zikas
2019/837 ( PDF )
Stronger and Faster Side-Channel Protections for CSIDH
Daniel Cervantes-Vázquez and Mathilde Chenu and Jesús-Javier Chi-Domínguez and Luca De Feo and Francisco Rodríguez-Henríquez and Benjamin Smith
2019/836 ( PDF )
Optimal Transport Layer for Secure Computation
Markus Brandt and Claudio Orlandi and Kris Shrishak and Haya Shulman
2019/835 ( PDF )
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
Karl Wüst and Sinisa Matetic and Silvan Egli and Kari Kostiainen and Srdjan Capkun
2019/834 ( PDF )
Succinct Arguments in the Quantum Random Oracle Model
Alessandro Chiesa and Peter Manohar and Nicholas Spooner
2019/833 ( PDF )
AES MixColumn with 92 XOR gates
Alexander Maximov
2019/832 ( PDF )
Asymptotically-Good Arithmetic Secret Sharing over Z/(p^\ell Z) with Strong Multiplication and Its Applications to Efficient MPC
Ronald Cramer and Matthieu Rambaud and Chaoping Xing
2019/831 ( PDF )
Privacy of Stateful RFID Systems with Constant Tag Identifiers
Cristian Hristea and Ferucio Laurentiu Tiplea
2019/830 ( PDF )
The Simplest Multi-key Linearly Homomorphic Signature Scheme
Diego F. Aranha and Elena Pagnin
2019/829 ( PDF )
Batch Binary Weierstrass
Billy Bob Brumley and Sohaib ul Hassan and Alex Shaindlin and Nicola Tuveri and Kide Vuojärvi
2019/828 ( PDF )
Optimal Collision Side-Channel Attacks
Cezary Glowacz and Vincent Grosso
2019/827 ( PDF )
k-root-n: An efficient algorithm for avoiding short term double-spending alongside distributed ledger technologies such as blockchain
Zvi Schreiber
2019/826 ( PDF )
Modular Multiplication Algorithm Suitable For Low-Latency Circuit Implementations
Erdinç Öztürk
2019/825 ( PDF )
Plaintext Recovery Attacks against XTS Beyond Collisions
Takanori Isobe and Kazuhiko Minematsu
2019/824 ( PDF )
Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look
Behnaz Rezvani and Flora Coleman and Sachin Sachin and William Diehl
2019/823 ( PDF )
Securely Sampling Biased Coins with Applications to Differential Privacy
Jeffrey Champion and abhi shelat and Jonathan Ullman
2019/822 ( PDF )
Surveying definitions of coercion resistance
Thomas Haines and Ben Smyth
2019/821 ( PDF )
Towards Forward Secure Internet Traffic
Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin
2019/820 ( PDF )
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query
Asma Aloufi and Peizhao Hu and Hang Liu and Sherman S. M. Chow
2019/819 ( PDF )
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption
Asma Aloufi and Peizhao Hu and Harry W. H. Wong and Sherman S. M. Chow
2019/818 ( PDF )
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
Debayan Das and Anupam Golder and Josef Danial and Santosh Ghosh and Arijit Raychowdhury and Shreyas Sen
2019/817 ( PDF )
Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions
Tapas Pal and Ratna Dutta
2019/816 ( PDF )
Crisis: Probabilistically Self Organizing Total Order in Unstructured P2P Networks
Mirco Richter
2019/815 ( -- withdrawn -- )
A Note on the Static-Static Key Agreement Protocol from Supersingular Isogenies
Selçuk Kayacan
2019/814 ( PDF )
Faster Subgroup Checks for BLS12-381
Sean Bowe
2019/813 ( PDF )
Multi-Client Symmetric Searchable Encryption with Forward Privacy
Alexandros Bakas and Antonis Michalas
2019/812 ( PDF )
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
Chaoyun Li and Bart Preneel
2019/811 ( PDF )
SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage
Ioannis Demertzis and Dimitrios Papadopoulos and Charalampos Papamanthou and Saurabh Shintre
2019/810 ( PDF )
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs
Jeroen Delvaux
2019/809 ( PDF )
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
Yosuke Todo and Willi Meier and Kazumaro Aoki
2019/808 ( PDF )
2-Message Publicly Verifiable WI from (Subexponential) LWE
Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs
2019/807 ( PDF )
When PKI (finally) met Provable Security
Hemi Leibowitz and Amir Herzberg and Ewa Syta
2019/806 ( PDF )
Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes
Eugene Pilyankevich and Dmytro Kornieiev and Artem Storozhuk
2019/805 ( PDF )
RRTxFM: Probabilistic Counting for Differentially Private Statistics
Saskia Nuñez von Voigt and Florian Tschorsch
2019/804 ( PDF )
Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions
Claire Delaplace and Andre Esser and Alexander May
2019/803 ( PDF )
Methodology for Efficient CNN Architectures in Profiling Attacks -- Extended Version
Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli
2019/802 ( PDF )
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes
Alexander Maximov and Patrik Ekdahl
2019/801 ( PDF )
A Chosen Random Value Attack on WPA3 SAE authentication protocol
Sheng Sun
2019/800 ( PDF )
Can we Beat the Square Root Bound for ECDLP over $\mathbb{F}_{p^2}$ via Representations?
Claire Delaplace and Alexander May
2019/799 ( PDF )
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance
Nils Wisiol and Georg T. Becker and Marian Margraf and Tudor A. A. Soroceanu and Johannes Tobisch and Benjamin Zengin
2019/798 ( PDF )
A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods
Kwangsu Lee
2019/797 ( PDF )
Don't forget your roots: constant-time root finding over $\mathbb{F}_{2^m}$
Douglas Martins and Gustavo Banegas and Ricardo Custodio
2019/796 ( PDF )
The End of Logic Locking? A Critical View on the Security of Logic Locking
Susanne Engels and Max Hoffmann and Christof Paar
2019/795 ( PDF )
More Practical Single-Trace Attacks on the Number Theoretic Transform
Peter Pessl and Robert Primas
2019/794 ( PDF )
Efficient Cryptography on the RISC-V Architecture
Ko Stoffelen
2019/793 ( PDF )
On equivalence between known families of quadratic APN functions
Lylia Budaghyan and Marco Calderini and Irene Villa
2019/792 ( PDF )
TICK: Tiny Client for Blockchains
Wei Zhang and Jiangshan Yu and Qingqiang He and Nan Zhang and Nan Guan
2019/791 ( PDF )
Sublattice Attacks on LWE over Arbitrary Number Field Lattices
Hao Chen
2019/790 ( PDF )
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication
Wei Jiang and Adam Bowers and Dan Lin
2019/789 ( PDF )
Relation between o-equivalence and EA-equivalence for Niho bent functions
Diana Davidova and Lilya Budaghyan and Claude Carlet and Tor Helleseth and Ferdinand Ihringer and Tim Penttila
2019/788 ( PDF )
The Impact of Time on DNS Security
Aanchal Malhotra and Willem Toorop and Benno Overeinder and Ralph Dolmans and Sharon Goldberg
2019/787 ( PDF )
Optimized implementation of the NIST PQC submission ROLLO on microcontroller
Jérôme Lablanche and Lina Mortajine and Othman Benchaalal and Pierre-Louis Cayrel and Nadia El Mrabet
2019/786 ( PDF )
P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation
Rebecca Schwerdt and Matthias Nagel and Valerie Fetzer and Tobias Gräf and Andy Rupp
2019/785 ( PDF )
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography
Yalin Chen and Jue-Sam Chou and Liang-Chun Wang and Yu-Yuan Chou
2019/784 ( PDF )
Towards a Hybrid Public Key Infrastructure (PKI): A Review
Priyadarshi Singh and Abdul Basit and N Chaitanya Kumar and V. Ch. Venkaiah
2019/783 ( PDF )
Dissecting the CHES 2018 AES Challenge
Tobias Damm and Sven Freud and Dominik Klein
2019/782 ( PDF )
Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms
Antoine Joux and Cecile Pierrot
2019/781 ( PDF )
BBQ: Using AES in Picnic Signatures
Cyprien Delpech de Saint Guilhem and Lauren De Meyer and Emmanuela Orsini and Nigel P. Smart
2019/780 ( PDF )
Statistical ZAP Arguments
Saikrishna Badrinarayan and Rex Fernando and Aayush Jain and Dakshita Khurana and Amit Sahai
2019/779 ( PDF )
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures
Dennis Jackson and Cas Cremers and Katriel Cohn-Gordon and Ralf Sasse
2019/778 ( PDF )
A Composable Security Treatment of the Lightning Network
Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos
2019/777 ( PDF )
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
Jörg Schwenk and Douglas Stebila
2019/776 ( PDF )
Scalable Private Set Union from Symmetric-Key Techniques
Vladimir Kolesnikov and Mike Rosulek and Ni Trieu and Xiao Wang
2019/775 ( PDF )
Pay To Win: Cheap, Crowdfundable, Cross-chain Algorithmic Incentive Manipulation Attacks on PoW Cryptocurrencies
Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gazi and Sarah Meiklejohn and Edgar Weippl
2019/774 ( PDF )
Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness
Hamidreza Amini Khorasgani and Hemanta Maji and Tamalika Mukherjee
2019/773 ( PDF )
Efficient Secure Ridge Regression from Randomized Gaussian Elimination
Frank Blom and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede
2019/772 ( PDF )
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
Lorenzo Grassi and Markus Schofnegger
2019/771 ( PDF )
DDH-based Multisignatures with Public Key Aggregation
Duc-Phong Le and Guomin Yang and Ali Ghorbani
2019/770 ( PDF )
Practical Attacks on Reduced-Round AES
Navid Ghaedi Bardeh and Sondre Rønjom
2019/769 ( PDF )
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates
Prasanna Ravi and Mahabir Prasad Jhanwar and James Howe and Anupam Chattopadhyay and Shivam Bhasin
2019/768 ( PDF )
Distributing any Elliptic Curve Based Protocol
Nigel P. Smart and Younes Talibi Alaoui
2019/767 ( PDF )
On cryptographic parameters of permutation polynomials of the form $x^rh(x^{(q-1)/d})$
Jaeseong Jeong and Chang Heon Kim and Namhun Koo and Soonhak Kwon and Sumin Lee
2019/766 ( PDF )
Complexity of Estimating Renyi Entropy of Markov Chains
Maciej Obremski and Maciej Skorski
2019/765 ( PDF )
SPQCop: Side-channel protected Post-Quantum Cryptoprocessor
Arpan Jati and Naina Gupta and Anupam Chattopadhyay and Somitra Kumar Sanadhya
2019/764 ( PDF )
The Adversarial Robustness of Sampling
Omri Ben-Eliezer and Eylon Yogev
2019/763 ( PDF )
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Shichang Wang and Meicheng Liu and Dongdai Lin and Li Ma
2019/762 ( PDF )
Verifiable Computing for Approximate Computation
Shuo Chen and Jung Hee Cheon and Dongwoo Kim and Daejun Park
2019/761 ( PDF )
Athena: A verifiable, coercion-resistant voting system with linear complexity
Ben Smyth
2019/760 ( PDF )
Differential Fault Analysis of NORX
Amit Jana and Dhiman Saha and Goutam Paul
2019/759 ( PDF )
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Onur Günlü and Onurcan Iscan and Vladimir Sidorenko and Gerhard Kramer
2019/758 ( PDF )
Genus 2 Supersingular Isogeny Oblivious Transfer
Ramsès Fernàndez-València
2019/757 ( PDF )
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider
Jonathan Protzenko and Bryan Parno and Aymeric Fromherz and Chris Hawblitzel and Marina Polubelova and Karthikeyan Bhargavan and Benjamin Beurdouche and Joonwon Choi and Antoine Delignat-Lavaud and Cedric Fournet and Natalia Kulatova and Tahina Ramananandro and Aseem Rastogi and Nikhil Swamy and Christoph Wintersteiger and Santiago Zanella-Beguelin
2019/756 ( PDF )
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures
Pantea Kiaei and Darius Mercadier and Pierre-Evariste Dagand and Karine Heydemann and Patrick Schaumont
2019/755 ( PDF )
Generic Attacks on Hash Combiners
Zhenzhen Bao and Itai Dinur and Jian Guo and Gaëtan Leurent and Lei Wang
2019/754 ( PDF )
Is it Easier to Prove Theorems that are Guaranteed to be True?
Rafael Pass and Muthuramakrishnan Venkitasubramaniam
2019/753 ( PDF )
Design of Anonymous Endorsement System in Hyperledger Fabric
Subhra Mazumdar and Sushmita Ruj
2019/752 ( PDF )
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains
Runchao Han and Zhimei Sui and Jiangshan Yu and Joseph Liu and Shiping Chen
2019/751 ( PDF )
Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic
Thorsten Kleinjung and Benjamin Wesolowski
2019/750 ( PDF )
A Short Note on a Weight Probability Distribution Related to SPNs
Sondre Rønjom
2019/749 ( PDF )
The privacy of the TLS 1.3 protocol
Ghada Arfaoui and Xavier Bultel and Pierre-Alain Fouque and Adina Nedelcu and Cristina Onete
2019/748 ( PDF )
Temporary Censorship Attacks in the Presence of Rational Miners
Fredrik Winzer and Benjamin Herd and Sebastian Faust
2019/747 ( PDF )
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
Rupeng Yang and Man Ho Au and Zhenfei Zhang and Qiuliang Xu and Zuoxia Yu and William Whyte
2019/746 ( PDF )
Public-Key Function-Private Hidden Vector Encryption (and More)
James Bartusek and Brent Carmer and Abhishek Jain and Zhengzhong Jin and Tancrède Lepoint and Fermi Ma and Tal Malkin and Alex J. Malozemoff and Mariana Raykova
2019/745 ( PDF )
Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation
Vincenzo Iovino
2019/744 ( PDF )
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection
Devin Reich and Ariel Todoki and Rafael Dowsley and Martine De Cock and Anderson C. A. Nascimento
2019/743 ( PDF )
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature
Yangguang Tian and Yingjiu Li and Robert. H Deng and Binanda Sengupta and Guomin Yang
2019/742 ( PDF )
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling
William Diehl and Abubakr Abdulgadir and Jens-Peter Kaps
2019/741 ( PDF )
Comprehensive security analysis of CRAFT
Hosein Hadipour and Sadegh Sadeghi and Majid M. Niknam and Nasour Bagheri
2019/740 ( PDF )
A Secure Publish/Subscribe Protocol for Internet of Things
Lukas Malina and Gautam Srivastava and Petr Dzurenda and Jan Hajny and Radek Fujdiak
2019/739 ( PDF )
A Survey on Authenticated Encryption -- ASIC Designer's Perspective
Elif Bilge Kavun and Hristina Mihajloska and Tolga Yalcin
2019/738 ( -- withdrawn -- )
Scrutinizing the Tower Field Implementation of the $\mathbb{F}_{2^8}$ Inverter -- with Applications to AES, Camellia, and SM4
Zihao Wei and Siwei Sun and Lei Hu and Man Wei and Joan Boyar and Rene Peralta
2019/737 ( PDF )
Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters
Katriel Cohn-Gordon and Cas Cremers and Kristian Gjøsteen and Håkon Jacobsen and Tibor Jager
2019/736 ( PDF )
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE
Hao Chen and Ilaria Chillotti and Ling Ren
2019/735 ( PDF )
SoK of Used Cryptography in Blockchain
Mayank Raikwar and Danilo Gligoroski and Katina Kralevska
2019/734 ( PDF )
From Usability to Secure Computing and Back Again
Lucy Qin and Andrei Lapets and Frederick Jansen and Peter Flockhart and Kinan Dak Albab and Ira Globus-Harris and Shannon Roberts and Mayank Varia
2019/733 ( PDF )
Compressible FHE with Applications to PIR
Craig Gentry and Shai Halevi
2019/732 ( PDF )
Fully Homomorphic NIZK and NIWI Proofs
Prabhanjan Ananth and Apoorvaa Deshpande and Yael Tauman Kalai and Anna Lysyanskaya
2019/731 ( PDF )
On the Complexity of ``Superdetermined'' Minrank Instances
Javier Verbel and John Baena and Daniel Cabarcas and Ray Perlner and Daniel Smith-Tone
2019/730 ( PDF )
PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH
Vladimir Soukharev and Basil Hess
2019/729 ( PDF )
Linear Complexity of A Family of Binary pq2 -periodic Sequences From Euler Quotients
Jingwei Zhang and Shuhong Gao and Chang-An Zhao
2019/728 ( PDF )
Verifying Solutions to LWE with Implications for Concrete Security
Palash Sarkar and Subhadip Singha
2019/727 ( PDF )
Iterative Differential Characteristic of TRIFLE-BC
Fukang Liu and Takanori Isobe
2019/726 ( PDF )
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange
Pedro Branco and Jintai Ding and Manuel Goulão and Paulo Mateus
2019/725 ( PDF )
He Gives C-Sieves on the CSIDH
Chris Peikert
2019/724 ( PDF )
Breaking Tweakable Enciphering Schemes using Simon's Algorithm
Sebati Ghosh and Palash Sarkar
2019/723 ( PDF )
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality
Mihaela Ion and Ben Kreuter and Ahmet Erhan Nergiz and Sarvar Patel and Mariana Raykova and Shobhit Saxena and Karn Seth and David Shanahan and Moti Yung
2019/722 ( PDF )
Neural Network Model Assessment for Side-Channel Analysis
Guilherme Perin and Baris Ege and Lukasz Chmielewski
2019/721 ( PDF )
Optimized SIKE Round 2 on 64-bit ARM
Hwajeong Seo and Amir Jalali and Reza Azarderakhsh
2019/720 ( PDF )
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles
Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta
2019/719 ( -- withdrawn -- )
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes
Mir Tanjidur Rahman and Shahin Tajik and M. Sazadur Rahman and Mark Tehranipoor and Navid Asadizanjani
2019/718 ( PDF )
Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority
Marina Blanton and Ahreum Kang and Chen Yuan
2019/717 ( PDF )
Homomorphism learning problems and its applications to public-key cryptography
Christopher Leonardi and Luis Ruiz-Lopez
2019/716 ( PDF )
On the Quantum Complexity of the Continuous Hidden Subgroup Problem
Koen de Boer and Léo Ducas and Serge Fehr
2019/715 ( PDF )
On the Security of Lattice-based Fiat-Shamir Signatures in the Presence of Randomness Leakage
Yuejun Liu and Yongbin Zhou and Shuo Sun and Tianyu Wang and Rui Zhang and Jingdian Ming
2019/714 ( PDF )
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT
Boxin Zhao and Xiaoyang Dong and Willi Meier and Keting Jia and Gaoli Wang
2019/713 ( PDF )
Public Ledger for Sensitive Data
Riccardo Longo and Massimiliano Sala
2019/712 ( PDF )
SimpleENC and SimpleENCsmall -- an Authenticated Encryption Mode for the Lightweight Setting
Shay Gueron and Yehuda Lindell
2019/711 ( PDF )
SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation
Brian Koziel and A-Bon Ackie and Rami El Khatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani
2019/710 ( -- withdrawn -- )
A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0
Qianying Zhang and Shijun Zhao and Zhiping Shi and Yong Guan and Guohui Wang
2019/709 ( PDF )
Secure Computation for Cloud data Storage
Davood Rezaeipour
2019/708 ( PDF )
Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions
Luís T. A. N. Brandão and Çağdaş Çalık and Meltem Sönmez Turan and René Peralta
2019/707 ( PDF )
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions
Olivier Blazy and Céline Chevalier and Quoc Huy Vu
2019/706 ( PDF )
Endemic Oblivious Transfer
Daniel Masny and Peter Rindal
2019/705 ( PDF )
Commodity-Based 2PC for Arithmetic Circuits
Ivan Damgård and Helene Haagh and Michael Nielsen and Claudio Orlandi
2019/704 ( PDF )
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains
Adriano Di Luzio and Danilo Francati and Giuseppe Ateniese
2019/703 ( PDF )
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation
Carolyn Whitnall and Elisabeth Oswald
2019/702 ( PDF )
Cryptanalysis of Plantlet
Subhadeep Banik and Khashayar Barooti and Takanori Isobe
2019/701 ( PDF )
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs
Hiroaki Anada
2019/700 ( PDF )
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Yusuke Naito and Mitsuru Matsui and Takeshi Sugawara and Daisuke Suzuki
2019/699 ( PDF )
Tight quantum security of the Fiat-Shamir transform for commit-and-open identification schemes with applications to post-quantum signature schemes
André Chailloux
2019/698 ( PDF )
A Formal Treatment of Deterministic Wallets
Poulami Das and Sebastian Faust and Julian Loss
2019/697 ( PDF )
Breaking ACORN with a Single Fault
Elena Dubrova
2019/696 ( PDF )
Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments
Masayuki Abe and Miguel Ambrona and Miyako Ohkubo
2019/695 ( PDF )
An Efficient Secure Three-Party Sorting Protocol with an Honest Majority
Koji Chida and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Naoto Kiribuchi and Benny Pinkas
2019/694 ( PDF )
A Unified and Composable Take on Ratcheting
Daniel Jost and Ueli Maurer and Marta Mularczyk
2019/693 ( PDF )
Security-Efficiency Tradeoffs in Searchable Encryption -- Lower Bounds and Optimal Constructions
Raphael Bost and Pierre-Alain Fouque
2019/692 ( PDF )
Synchronous Consensus with Optimal Asynchronous Fallback Guarantees
Erica Blum and Jonathan Katz and Julian Loss
2019/691 ( PDF )
Comparing proofs of security for lattice-based encryption
Daniel J. Bernstein
2019/690 ( PDF )
Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks
Changhai Ou and Siew-Kei Lam and Guiyuan Jiang
2019/689 ( PDF )
On-Device Power Analysis Across Hardware Security Domains
Colin O'Flynn and Alex Dewar
2019/688 ( PDF )
Better Bootstrapping for Approximate Homomorphic Encryption
Kyoohyung Han and Dohyeong Ki
2019/687 ( PDF )
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography
Zhengfeng Ji and Youming Qiao and Fang Song and Aaram Yun
2019/686 ( PDF )
On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations
Nir Bitansky and Akshay Degwekar
2019/685 ( PDF )
Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5
Markku-Juhani O. Saarinen
2019/684 ( PDF )
Revelio: A MimbleWimble Proof of Reserves Protocol
Arijit Dutta and Saravanan Vijayakumaran
2019/683 ( PDF )
The Notion of Transparency Order, Revisited
Huizhong Li and Yongbin Zhou and Jingdian Ming and Guang Yang and Chengbin Jin
2019/682 ( PDF )
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Alexandros Bakas and Antonis Michalas
2019/681 ( PDF )
Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?
Ayesha Khalid and Sarah McCarthy and Weiqiang Liu and Maire O’Neill
2019/680 ( PDF )
Non-Commutative Ring Learning With Errors From Cyclic Algebras
Charles Grover and Cong Ling and Roope Vehkalahti
2019/679 ( PDF )
Forgery Attacks on FlexAE and FlexAEAD
Maria Eichlseder and Daniel Kales and Markus Schofnegger
2019/678 ( PDF )
A Modified pqsigRM: RM Code-Based Signature Scheme
Yongwoo Lee and Wijik Lee and Young-Sik Kim and Jong-Seon No
2019/677 ( PDF )
A Note on Lower Digits Extraction Polynomial for Bootstrapping
Mingjia Huo and Kewen Wu and Qi Ye
2019/676 ( PDF )
Robust and Scalable Consensus for Sharded Distributed Ledgers
Eleftherios Kokoris-Kogias
2019/675 ( PDF )
Balance: Dynamic Adjustment of Cryptocurrency Deposits
Dominik Harz and Lewis Gudgeon and Arthur Gervais and William J. Knottenbelt
2019/674 ( PDF )
Polar Sampler: Discrete Gaussian Sampling over the Integers Using Polar Codes
Jiabo Wang and Cong Ling
2019/673 ( PDF )
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
Ahto Buldas and Denis Firsov and Risto Laanoja and Henri Lakk and Ahto Truu
2019/672 ( PDF )
A Blockchain-Assisted Hash-Based Signature Scheme
Ahto Buldas and Risto Laanoja and Ahto Truu
2019/671 ( PDF )
A Server-Assisted Hash-Based Signature Scheme
Ahto Buldas and Risto Laanoja and Ahto Truu
2019/670 ( PDF )
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks
Vahid Amin Ghafari and Honggang Hu and Fujiang Lin
2019/669 ( PDF )
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
Yunwen Liu and Yu Sasaki
2019/668 ( PDF )
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao
2019/667 ( PDF )
PPAD-Hardness via Iterated Squaring Modulo a Composite
Arka Rai Choudhuri and Pavel Hubacek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum
2019/666 ( PDF )
On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling
Zheng Wang and Cong Ling
2019/665 ( PDF )
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption
Jintai Ding and Pedro Branco and Kevin Schmitt
2019/664 ( PDF )
How Diversity Affects Deep-Learning Side-Channel Attacks
Huanyu Wang and Martin Brisfors and Sebastian Forsmark and Elena Dubrova
2019/663 ( PDF )
Can Verifiable Delay Functions be Based on Random Oracles?
Mohammad Mahmoody and Caleb Smith and David J. Wu
2019/662 ( PDF )
Generalized Proofs of Knowledge with Fully Dynamic Setup
Christian Badertscher and Daniel Jost and Ueli Maurer
2019/661 ( PDF )
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis
Shivam Bhasin and Anupam Chattopadhyay and Annelie Heuser and Dirmanto Jap and Stjepan Picek and Ritu Ranjan Shrivastwa
2019/660 ( PDF )
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling
Zheng Wang and Cong Ling
2019/659 ( PDF )
Tight Verifiable Delay Functions
Nico Döttling and Sanjam Garg and Giulio Malavolta and Prashant Nalini Vasudevan
2019/658 ( PDF )
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest
Jun Furukawa and Yehuda Lindell
2019/657 ( PDF )
Multi-Party PSM, Revisited: Improved Communication and Unbalanced Communication
Leonard Assouline and Tianren Liu
2019/656 ( -- withdrawn -- )
SeqL: Secure Scan-Locking for IP Protection
Seetal Potluri and Aydin Aysu and Akash Kumar
2019/655 ( PDF )
Visualizing size-security tradeoffs for lattice-based encryption
Daniel J. Bernstein
2019/654 ( PDF )
Concise Linkable Ring Signatures and Forgery Against Adversarial Keys
Brandon Goodell and Sarang Noether and RandomRun
2019/653 ( PDF )
On the Local Leakage Resilience of Linear Secret Sharing Schemes
Fabrice Benhamouda and Akshay Degwekar and Yuval Ishai and Tal Rabin
2019/652 ( PDF )
The Exchange Attack: How to Distinguish Six Rounds of AES with $2^{88.2}$ chosen plaintexts
Navid Ghaedi Bardeh and Sondre Rønjom
2019/651 ( PDF )
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing
Muhammad Ishaq and Ana Milanova and Vassilis Zikas
2019/650 ( PDF )
Incremental Proofs of Sequential Work
Nico Döttling and Russell W. F. Lai and Giulio Malavolta
2019/649 ( PDF )
Txilm: Lossy Block Compression with Salted Short Hashing
Donghui Ding and Xin Jiang and Jiaping Wang and Hao Wang and Xiaobing Zhang and Yi Sun
2019/648 ( PDF )
Efficient Invisible and Unlinkable Sanitizable Signatures
Xavier Bultel and Pascal Lafourcade and Russell W. F. Lai and Giulio Malavolta and Dominique Schröder and Sri Aravinda Krishnan Thyagarajan
2019/647 ( PDF )
Strong Asymmetric PAKE based on Trapdoor CKEM
Tatiana Bradley and Stanislaw Jarecki and Jiayu Xu
2019/646 ( PDF )
Communication-Efficient Unconditional MPC with Guaranteed Output Delivery
Vipul Goyal and Yanyi Liu and Yifan Song
2019/645 ( PDF )
Attribute Based Encryption for Deterministic Finite Automata from DLIN
Shweta Agrawal and Monosij Maitra and Shota Yamada
2019/644 ( PDF )
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-
Aydin Abadi and Michele Ciampi and Aggelos Kiayias and Vassilis Zikas
2019/643 ( PDF )
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification
Prabhanjan Ananth and Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai
2019/642 ( PDF )
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs
Jonathan Bootle and Vadim Lyubashevsky and Gregor Seiler
2019/641 ( PDF )
Simulation Extractability in Groth's zk-SNARK
Shahla Atapoor and Karim Baghery
2019/640 ( PDF )
On Round Optimal Statistical Zero Knowledge Arguments
Nir Bitansky and Omer Paneth
2019/639 ( PDF )
Trapdoor Hash Functions and Their Applications
Nico Döttling and Sanjam Garg and Yuval Ishai and Giulio Malavolta and Tamer Mour and Rafail Ostrovsky
2019/638 ( PDF )
On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography
Ferucio Laurentiu Tiplea and Sorin Iftene and George Teseleanu and Anca-Maria Nica
2019/637 ( PDF )
Cryptographic Sensing
Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
2019/636 ( PDF )
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions
Rishab Goyal and Willy Quach and Brent Waters and Daniel Wichs
2019/635 ( PDF )
Homomorphic Time-Lock Puzzles and Applications
Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan
2019/634 ( PDF )
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension
Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai
2019/633 ( PDF )
New non-linearity parameters of Boolean functions
Igor Semaev
2019/632 ( PDF )
Fully Homomorphic Encryption for RAMs
Ariel Hamlin and Justin Holmgren and Mor Weiss and Daniel Wichs
2019/631 ( PDF )
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge
Cody Freitag and Ilan Komargodski and Rafael Pass
2019/630 ( PDF )
ABE for DFA from k-Lin
Junqing Gong and Brent Waters and Hoeteck Wee
2019/629 ( PDF )
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE
Shweta Agrawal and Monosij Maitra and Shota Yamada
2019/628 ( PDF )
Watermarking Public-Key Cryptographic Primitives
Rishab Goyal and Sam Kim and Nathan Manohar and Brent Waters and David J. Wu
2019/627 ( PDF )
Unconditionally Secure Computation Against Low-Complexity Leakage
Andrej Bogdanov and Yuval Ishai and Akshayaram Srinivasan
2019/626 ( PDF )
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge
Vipul Goyal and Aayush Jain and Amit Sahai
2019/625 ( PDF )
Public-Key Cryptography in the Fine-Grained Setting
Rio Lavigne and Andrea Lincoln and Virginia Vassilevska Williams
2019/624 ( PDF )
Nonces are Noticed: AEAD Revisited
Mihir Bellare and Ruth Ng and Björn Tackmann
2019/623 ( PDF )
Exploring Constructions of Compact NIZKs from Various Assumptions
Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2019/622 ( PDF )
Extended Truncated-differential Distinguishers on Round-reduced AES
Zhenzhen Bao and Jian Guo and Eik List
2019/621 ( PDF )
A Modified Simple Substitution Cipher With Unbounded Unicity Distance
Bruce Kallick
2019/620 ( PDF )
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems
Steven D. Galbraith and Lukas Zobernig
2019/619 ( PDF )
Continuous Verifiable Delay Functions
Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass
2019/618 ( PDF )
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods
Fukang Liu and Takanori Isobe
2019/617 ( PDF )
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model
Sebastian Gajek and Marco Lewandowsky
2019/616 ( PDF )
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation
Iftach Haitner and Noam Mazor and Ronen Shaltiel and Jad Silbak
2019/615 ( PDF )
My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks
Siemen Dhooghe and Svetla Nikova
2019/614 ( PDF )
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm
Xavier Bonnetain and Akinori Hosoyamada and María Naya-Plasencia and Yu Sasaki and André Schrottenloher
2019/613 ( PDF )
MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks
Taha Atahan Akyildiz and Can Berk Guzgeren and Cemal Yilmaz and Erkay Savas
2019/612 ( PDF )
Simulation-Extractable SNARKs Revisited
Helger Lipmaa
2019/611 ( PDF )
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set
Thaddeus Dryja
2019/610 ( PDF )
Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem
Jean-Sebastien Coron and Agnese Gini
2019/609 ( PDF )
CPA-to-CCA Transformation for KDM Security
Fuyuki Kitagawa and Takahiro Matsuda
2019/608 ( PDF )
Symmetric Primitives with Structured Secrets
Navid Alamati and Hart Montgomery and Sikhar Patranabis
2019/607 ( PDF )
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Zhenzhen Bao and Lin Ding and Jian Guo and Haoyang Wang and Wenying Zhang
2019/606 ( PDF )
An Efficient and Provable Masked Implementation of qTESLA
François Gérard and Mélissa Rossi
2019/605 ( PDF )
A note on different types of ransomware attacks
Mihail Anghel and Andrei Racautanu
2019/604 ( PDF )
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Jun Xu and Santanu Sarkar and Lei Hu and Huaxiong Wang and Yanbin Pan
2019/603 ( PDF )
How to Delegate Computations Publicly
Yael Kalai and Omer Paneth and Lisa Yang
2019/602 ( PDF )
Continuously Non-Malleable Secret Sharing for General Access Structures
Gianluca Brian and Antonio Faonio and Daniele Venturi
2019/601 ( PDF )
AuroraLight: Improved prover efficiency and SRS size in a Sonic-like system
Ariel Gabizon
2019/600 ( PDF )
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption
Zhenzhen Bao and Jian Guo and Tetsu Iwata and Kazuhiko Minematsu
2019/599 ( PDF )
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning
Ivan Damgård and Daniel Escudero and Tore Frederiksen and Marcel Keller and Peter Scholl and Nikolaj Volgushev
2019/598 ( -- withdrawn -- )
Partial Secret Sharing
Amir Jafari and Reza Kaboli and Shahram Khazaei
2019/597 ( PDF )
A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio
Shahram Khazaei
2019/596 ( PDF )
Discretisation and Product Distributions in Ring-LWE
Sean Murphy and Rachel Player
2019/595 ( PDF )
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero
Pedro Moreno-Sanchez and Randomrun and Duc V. Le and Sarang Noether and Brandon Goodell and Aniket Kate
2019/594 ( PDF )
Cryptanalysis of Ring Homomorphic Encryption Schemes
Mugurel Barcau and Vicentiu Pasol
2019/593 ( PDF )
On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces
V. Ustimenko and M. Klisowski
2019/592 ( PDF )
Statistical Analysis and Anonymity of TOR's Path Selection
Andrei Mogage and Emil Simion
2019/591 ( PDF )
Simulating Homomorphic Evaluation of Deep Learning Predictions
Christina Boura and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev
2019/590 ( PDF )
Tighter proofs of CCA security in the quantum random oracle model
Nina Bindel and Mike Hamburg and Kathrin Hövelmanns and Andreas Hülsing and Edoardo Persichetti
2019/589 ( PDF )
A${^2}$L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
Erkan Tairi and Pedro Moreno-Sanchez and Matteo Maffei
2019/588 ( PDF )
Formal Notions of Security for Verifiable Homomorphic Encryption
Jakub Klemsa and Ivana Trummová
2019/587 ( PDF )
Polygraph: Accountable Byzantine Agreement
Pierre Civit and Seth Gilbert and Vincent Gramoli
2019/586 ( PDF )
Simulation-Extractable zk-SNARK with a Single Verification
Jihye Kim and Jiwon Lee and Hyunok Oh
2019/585 ( PDF )
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners
Mustafa Khairallah and Shivam Bhasin and Anupam Chattopadhyay
2019/584 ( -- withdrawn -- )
2-threshold Ideal Secret Sharing Schemes Can Be Uniquely Modeled by Latin Squares
Lintao Liu and Xuehu Yan and Yuliang Lu and Huaixi Wang
2019/583 ( PDF )
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks
Christoph Egger and Pedro Moreno-Sanchez and Matteo Maffei
2019/582 ( PDF )
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
Ran Canetti and Alley Stoughton and Mayank Varia
2019/581 ( -- withdrawn -- )
---
---
2019/580 ( PDF )
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs
Russell W. F. Lai and Viktoria Ronge and Tim Ruffing and Dominique Schröder and Sri Aravinda Krishnan Thyagarajan and Jiafan Wang
2019/579 ( PDF )
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
Dominic Letz
2019/578 ( PDF )
Deep Learning based Side Channel Attacks in Practice
Houssem Maghrebi
2019/577 ( PDF )
Improved Multiplication Triple Generation over Rings via RLWE-based AHE
Deevashwer Rathee and Thomas Schneider and K. K. Shukla
2019/576 ( PDF )
On Group-Characterizability of Homomorphic Secret Sharing Schemes
Reza Kaboli and Shahram Khazaei and Maghsoud Parviz
2019/575 ( PDF )
On Abelian and Homomorphic Secret Sharing Schemes
Amir Jafari and Shahram Khazaei
2019/574 ( PDF )
Subliminal channels in post-quantum digital signature schemes
Herman Galteland and Kristian Gjøsteen
2019/573 ( PDF )
Security of the Suffix Keyed Sponge
Christoph Dobraunig and Bart Mennink
2019/572 ( PDF )
On the Commitment Capacity of Unfair Noisy Channels
Claude Crépeau and Rafael Dowsley and Anderson C. A. Nascimento
2019/571 ( PDF )
Multi-Party Virtual State Channels
Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Julia Hesse and Kristina Hostáková
2019/570 ( PDF )
Bias-variance Decomposition in Machine Learning-based Side-channel Analysis
Daan van der Valk and Stjepan Picek
2019/569 ( PDF )
Lattice RingCT v2.0 with Multiple Input and Output Wallets
Wilson Alberto Torres and Veronika Kuchta and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Jacob Cheng
2019/568 ( PDF )
Post Quantum ECC on FPGA Platform
Debapriya Basu Roy and Debdeep Mukhopadhyay
2019/567 ( PDF )
(Linkable) Ring Signature from Hash-Then-One-Way Signature
Xingye Lu and Man Ho Au and Zhenfei Zhang
2019/566 ( PDF )
Deep Learning based Model Building Attacks on Arbiter PUF Compositions
Pranesh Santikellur and Aritra Bhattacharyay and Rajat Subhra Chakraborty
2019/565 ( PDF )
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
Nirvan Tyagi and Paul Grubbs and Julia Len and Ian Miers and Thomas Ristenpart
2019/564 ( PDF )
Verification of Authenticated Firmware Load
Sujit Kumar Muduli and Pramod Subramanyan and Sayak Ray
2019/563 ( PDF )
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA
Omer Shlomovits and István András Seres
2019/562 ( PDF )
Towards More Secure Constructions of Adjustable Join Schemes
Shahram Khazaei and Mojtaba Rafiee
2019/561 ( PDF )
Faster Bootstrapping of FHE over the integers with large prime message space
Zhizhu Lian and Yupu Hu and Hu Chen and Baocang Wang
2019/560 ( PDF )
Solutions of $x^{q^k}+\cdots+x^{q}+x=a$ in $GF(2^n)$
Kwang Ho Kim and Jong Hyok Choe and Dok Nam Lee and Dae Song Go and Sihem Mesnager
2019/559 ( PDF )
Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables
Evgeny K. Alekseev and Lyudmila A. Kushchinskaya
2019/558 ( PDF )
How to not break SIDH
Chloe Martindale and Lorenz Panny
2019/557 ( PDF )
Extended Galbraith's Test on the Anonymity of IBEs from Higher Residuosity
Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao
2019/556 ( PDF )
When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop)
Gideon Samid
2019/555 ( PDF )
Optimal TNFS-secure pairings on elliptic curves with composite embedding degree
Georgios Fotiadis and Chloe Martindale
2019/554 ( PDF )
How to Build Pseudorandom Functions From Public Random Permutations
Yu Long Chen and Eran Lambooij and Bart Mennink
2019/553 ( PDF )
Towards post-quantum symmetric cryptography
John Gregory Underhill and Stiepan Aurélien Kovac and Xenia Bogomolec
2019/552 ( PDF )
Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space
Binyi Chen and Yilei Chen and Kristina Hostáková and Pratyay Mukherjee
2019/551 ( PDF )
A note on the correlations between NIST cryptographic statistical tests suite
Emil Simion and Paul Burciu
2019/550 ( PDF )
Spartan: Efficient and general-purpose zkSNARKs without trusted setup
Srinath Setty
2019/549 ( PDF )
Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir
Arka Rai Choudhuri and Pavel Hubacek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum
2019/548 ( PDF )
About Wave Implementation and its Leakage Immunity
Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
2019/547 ( PDF )
Linearly-Homomorphic Signatures and Scalable Mix-Nets
Chloé Hébant and Duong Hieu Phan and David Pointcheval
2019/546 ( PDF )
Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies
David Cerezo Sánchez
2019/545 ( -- withdrawn -- )
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Sayandeep Saha and Dirmanto Jap and Debapriya Basu Roy and Avik Chakraborti and Shivam Bhasin and Debdeep Mukhopadhyay
2019/544 ( PDF )
Evaluation of Code-based Signature Schemes
Partha Sarathi Roy and Kirill Morozov and Kazuhide Fukushima and Shinsaku Kiyomoto
2019/543 ( PDF )
TMPS: Ticket-Mediated Password Strengthening
John Kelsey and Dana Dachman-Soled and Sweta Mishra and Meltem Sonmez Turan
2019/542 ( PDF )
Formally Verified Cryptographic Web Applications in WebAssembly
Jonathan Protzenko and Benjamin Beurdouche and Denis Merigoux and Karthikeyan Bhargavan
2019/541 ( PDF )
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement
James Shook and Scott Simon and Peter Mell
2019/540 ( PDF )
A chosen key attack against the secret S-boxes of GOST
Markku-Juhani O. Saarinen
2019/539 ( PDF )
Cryptanalysis of FlexAEAD
Mostafizar Rahman and Dhiman Saha and Goutam Paul
2019/538 ( PDF )
On Perfect Endomorphic Ciphers
Nikolay Shenets
2019/537 ( PDF )
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin and Victor Mollimard
2019/536 ( PDF )
Protecting against Statistical Ineffective Fault Attacks
Joan Daemen and Christoph Dobraunig and Maria Eichlseder and Hannes Gross and Florian Mendel and Robert Primas
2019/535 ( PDF )
SIKE Round 2 Speed Record on ARM Cortex-M4
Hwajeong soe and Amir Jalali and Reza Azarderakhsh
2019/534 ( PDF )
Theoretical and Practical Approaches for Hardness Amplification of PUFs
Fatemeh Ganji and Shahin Tajik and Pascal Stauss and Jean-Pierre Seifert and Domenic Forte and Mark Tehranipoor
2019/533 ( PDF )
Stopping time signatures for some algorithms in cryptography
Percy Deift and Stephen D. Miller and Thomas Trogdon
2019/532 ( PDF )
Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography
Carsten Baum and Ariel Nof
2019/531 ( PDF )
How to Correct Errors in Multi-Server PIR
Kaoru Kurosawa
2019/530 ( PDF )
Speed-up of SCA attacks on 32-bit multiplications
Robert Nguyen and Adrien Facon and Sylvain Guilley and Guillaume Gautier and Safwan El Assad
2019/529 ( PDF )
UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions
Pedro Branco and Manuel Goulão and Paulo Mateus
2019/528 ( PDF )
Anomalies and Vector Space Search: Tools for S-Box Analysis (Full Version)
Xavier Bonnetain and Léo Perrin and Shizhu Tian
2019/527 ( PDF )
Revisiting Privacy-aware Blockchain Public Key Infrastructure
Olamide Omolola and Paul Plessing
2019/526 ( PDF )
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman
Cas Cremers and Dennis Jackson
2019/525 ( PDF )
Misuse Attacks on Post-Quantum Cryptosystems
Ciprian Băetu and F. Betül Durak and Loïs Huguenin-Dumittan and Abdullah Talayhan and Serge Vaudenay
2019/524 ( PDF )
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference
Hao Chen and Wei Dai and Miran Kim and Yongsoo Song
2019/523 ( PDF )
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
Jack Doerner and Yashvanth Kondi and Eysa Lee and abhi shelat
2019/522 ( PDF )
Secret-Sharing from Robust Conditional Disclosure of Secrets
Amos Beimel and Naty Peter
2019/521 ( PDF )
Fully Homomorphic Encryption with k-bit Arithmetic Operations
Benjamin M. Case and Shuhong Gao and Gengran Hu and Qiuxia Xu
2019/520 ( PDF )
A Note on Sub-Gaussian Random Variables
Benjamin M. Case and Colin Gallagher and Shuhong Gao
2019/519 ( PDF )
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications
Christopher Patton and Thomas Shrimpton
2019/518 ( PDF )
Fast Database Joins and PSI for Secret Shared Data
Payman Mohassel and Peter Rindal and Mike Rosulek
2019/517 ( PDF )
Mobile Private Contact Discovery at Scale
Daniel Kales and Christian Rechberger and Thomas Schneider and Matthias Senker and Christian Weinert
2019/516 ( PDF )
CellTree: A New Paradigm for Distributed Data Repositories
Anasuya Acharya and Manoj Prabhakaran and Akash Trehan
2019/515 ( PDF )
A Countermeasure Against Statistical Ineffective Fault Analysis
Jakub Breier and Mustafa Khairallah and Xiaolu Hou and Yang Liu
2019/514 ( PDF )
Pixel: Multi-signatures for Consensus
Manu Drijvers and Sergey Gorbunov and Gregory Neven and Hoeteck Wee
2019/513 ( PDF )
New Code-Based Privacy-Preserving Cryptographic Constructions
Khoa Nguyen and Hanh Tang and Huaxiong Wang and Neng Zeng
2019/512 ( PDF )
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System
Shuai Han and Shengli Liu and Lin Lyu and Dawu Gu
2019/511 ( PDF )
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited
Gilles Barthe and Sonia Belaïd and Thomas Espitau and Pierre-Alain Fouque and Mélissa Rossi and Mehdi Tibouchi
2019/510 ( PDF )
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes
Jiang Zhang and Yu Yu and Shuqin Fan and Zhenfeng Zhang and Kang Yang
2019/509 ( PDF )
New Slide Attacks on Almost Self-Similar Ciphers
Orr Dunkelman and Nathan Keller and Noam Lasry and Adi Shamir
2019/508 ( PDF )
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security
Tsz Hon Yuen and Shi-feng Sun and Joseph K. Liu and Man Ho Au and Muhammed F. Esgin and Qingzhao Zhang and Dawu Gu
2019/507 ( PDF )
Simple Schemes in the Bounded Storage Model
Jiaxin Guan and Mark Zhandry
2019/506 ( PDF )
Forward Integrity and Crash Recovery for Secure Logs
Erik-Oliver Blass and Guevara Noubir
2019/505 ( PDF )
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
Thorben Moos and Felix Wegener and Amir Moradi
2019/504 ( PDF )
Afgjort: A Partially Synchronous Finality Layer for Blockchains
Thomas Dinsdale-Young and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Daniel Tschudi
2019/503 ( PDF )
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker
2019/502 ( PDF )
A refined analysis of the cost for solving LWE via uSVP
Shi Bai and Shaun Miller and Weiqiang Wen
2019/501 ( PDF )
Optimal Merging in Quantum k-xor and k-sum Algorithms
María Naya-Plasencia and André Schrottenloher
2019/500 ( PDF )
An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster
Jean-Claude Bajard and Julien Eynard and Paulo Martins and Leonel Sousa and Vincent Zucca
2019/499 ( PDF )
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography
Michael Naehrig and Joost Renes
2019/498 ( PDF )
CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations
Ward Beullens and Thorsten Kleinjung and Frederik Vercauteren
2019/497 ( PDF )
Forward and Backward-Secure Range-Searchable Symmetric Encryption
Jiafan Wang and Sherman S. M. Chow
2019/496 ( PDF )
Non-malleability for quantum public-key encryption
Christian Majenz and Christian Schaffner and Jeroen van Wier
2019/495 ( PDF )
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
Marc Joye
2019/494 ( PDF )
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
Haodong Jiang and Zhenfeng Zhang and Zhi Ma
2019/493 ( PDF )
Evaluating the effectiveness of heuristic worst-case noise analysis in FHE
Anamaria Costache and Kim Laine and Rachel Player
2019/492 ( PDF )
Decisional second-preimage resistance: When does SPR imply PRE?
Daniel J. Bernstein and Andreas Hülsing
2019/491 ( PDF )
Best Information is Most Successful
Eloi de Cherisey and Sylvain Guilley and Olivier Rioul and Pablo Piantanida
2019/490 ( PDF )
Sigma protocols for MQ, PKP and SIS, and fishy signature schemes
Ward Beullens
2019/489 ( PDF )
Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4
Leon Botros and Matthias J. Kannwischer and Peter Schwabe
2019/488 ( PDF )
Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication
Alan Kaminsky
2019/487 ( PDF )
From Single-Input to Multi-Client Inner-Product Functional Encryption
Michel Abdalla and Fabrice Benhamouda and Romain Gay
2019/486 ( PDF )
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment
Suhyeon Lee and Seungjoo Kim
2019/485 ( PDF )
A taxonomy of pairings, their security, their complexity
Razvan Barbulescu and Nadia El Mrabet and Loubna Ghammam
2019/484 ( PDF )
New Number-Theoretic Cryptographic Primitives
Eric Brier and Houda Ferradi and Marc Joye and David Naccache
2019/483 ( PDF )
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations
Pierrick Méaux and Claude Carlet and Anthony Journault and François-Xavier Standaert
2019/482 ( PDF )
Tiny WireGuard Tweak
Jacob Appelbaum and Chloe Martindale and Peter Wu
2019/481 ( PDF )
An Efficient and Compact Reformulation of NIST Collision Estimate Test
Prasanna Raghaw Mishra and Bhartendu Nandan and Navneet Gaba
2019/480 ( PDF )
On the Efficiency of Privacy-Preserving Smart Contract Systems
Karim Baghery
2019/479 ( PDF )
Extended 3-Party ACCE and Application to LoRaWAN 1.1
Sébastien Canard and Loïc Ferreira
2019/478 ( PDF )
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme
Sarah McCarthy and James Howe and Neil Smyth and Seamus Brannigan and Máire O’Neill
2019/477 ( PDF )
The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter
Cas Cremers and Britta Hale and Konrad Kohbrok
2019/476 ( PDF )
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T
Muhammad ElSheikh and Ahmed Abdelkhalek and Amr M. Youssef
2019/475 ( PDF )
Dual-Mode NIZKs from Obfuscation
Dennis Hofheinz and Bogdan Ursu
2019/473 ( PDF )
A Method to Reduce the Key Size of UOV Signature Scheme
Chengdong Tao
2019/472 ( PDF )
Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM)
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2019/471 ( PDF )
UC-Secure CRS Generation for SNARKs
Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michal Zajac
2019/470 ( PDF )
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals
Niek J. Bouman and Niels de Vreede
2019/469 ( PDF )
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks
Rui Qiao and Qinglong Wang* and Zongtao Duan and Na Fan
2019/468 ( PDF )
The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem
Alessandro Budroni and Andrea Tenti
2019/467 ( PDF )
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version)
Clément Massart and François-Xavier Standaert
2019/466 ( -- withdrawn -- )
Privacy-Preserving K-means Clustering with Multiple Data Owners
Jung Hee Cheon and Jinhyuck Jeong and Dohyeong Ki and Jiseung Kim and Joohee Lee and Seok Won Lee
2019/465 ( PDF )
Towards a Practical Cluster Analysis over Encrypted Data
Jung Hee Cheon and Duhyeong Kim and Jai Hyun Park
2019/464 ( PDF )
The complexity of MinRank
Alessio Caminata and Elisa Gorla
2019/463 ( PDF )
In Pursuit of Clarity In Obfuscation
Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi
2019/462 ( PDF )
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11
Alexander Dax and Robert Künnemann and Sven Tangermann and Michael Backes
2019/461 ( PDF )
Physical Security of Deep Learning on Edge Devices: Comprehensive Evaluation of Fault Injection Attack Vectors
Xiaolu Hou and Jakub Breier and Dirmanto Jap and Lei Ma and Shivam Bhasin and Yang Liu
2019/460 ( PDF )
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Jan Camenisch and Manu Drijvers and Petr Dzurenda and Jan Hajny
2019/459 ( PDF )
From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1
Gaëtan Leurent and Thomas Peyrin
2019/458 ( PDF )
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
Lorenzo Grassi and Dmitry Khovratovich and Christian Rechberger and Arnab Roy and Markus Schofnegger
2019/457 ( PDF )
Forgery Attack on mixFeed in the Nonce-Misuse Scenario
Mustafa Khairallah
2019/456 ( PDF )
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting
Peifang Ni and Hongda Li and Xianning Meng and Dongxue Pan
2019/455 ( PDF )
FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol
João Otávio Massari Chervinski and Diego Kreutz and Jiangshan Yu
2019/454 ( PDF )
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks
Ryan Karl and Timothy Burchfield and Jonathan Takeshita and Taeho Jung
2019/453 ( PDF )
A New Approach to Modelling Centralised Reputation Systems
Lydia Garms and Elizabeth A. Quaglia
2019/452 ( PDF )
A Central Limit Framework for Ring-LWE Decryption
Sean Murphy and Rachel Player
2019/451 ( PDF )
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Francesco Berti and Olivier Pereira and François-Xavier Standaert
2019/450 ( PDF )
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data
Chenglu Jin and Zheng Yang and Sridhar Adepu and Jianying Zhou
2019/449 ( PDF )
Limits to Non-Malleability
Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Tal Malkin
2019/448 ( PDF )
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl
2019/447 ( PDF )
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak
Haibo Zhou and Zheng Li and Xiaoyang Dong and Keting Jia and Willi Meier
2019/446 ( PDF )
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions
Sanjit Chatterjee and Shravan Kumar Parshuram Puria and Akash Shah
2019/445 ( PDF )
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications
Muhammed F. Esgin and Ron Steinfeld and Joseph K. Liu and Dongxi Liu
2019/444 ( PDF )
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
Gildas Avoine and Sébastien Canard and Loïc Ferreira
2019/443 ( PDF )
Contingent payments on a public ledger: models and reductions for automated verification
Sergiu Bursuc and Steve Kremer
2019/442 ( PDF )
K2SN-MSS: An Efficient Post-Quantum Signature (Full Version)
Sabyasachi Karati and Reihaneh Safavi-Naini
2019/441 ( PDF )
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
2019/440 ( PDF )
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
Avik Chakraborti and Nilanjan Datta and Ashwin Jha and Cuauhtemoc Mancillas Lopez and Mridul Nandi and Yu Sasaki
2019/439 ( PDF )
A Comprehensive Study of Deep Learning for Side-Channel Analysis
Loïc Masure and Cécile Dumas and Emmanuel Prouff
2019/438 ( PDF )
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data
Jan Camenisch and Angelo De Caro and Esha Ghosh and Alessandro Sorniotti
2019/437 ( PDF )
Efficient coding for secure computing with additively-homomorphic encrypted data
Thijs Veugen
2019/436 ( PDF )
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
Benjamin Dowling and Paul Rösler and Jörg Schwenk
2019/435 ( PDF )
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
Yue Qin and Chi Cheng and Jintai Ding
2019/434 ( PDF )
Masking Fuzzy-Searchable Public Databases
Alexandra Boldyreva and Tianxin Tang and Bogdan Warinschi
2019/433 ( PDF )
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
Shan Chen and Samuel Jero and Matthew Jagielski and Alexandra Boldyreva and Cristina Nita-Rotaru
2019/432 ( PDF )
Cryptanalysis of a System Based on Twisted Reed-Solomon Codes
Julien Lavauzelle and Julian Renner
2019/431 ( PDF )
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation
Aurore Guillevic and Simon Masson and Emmanuel Thomé
2019/430 ( -- withdrawn -- )
Composition of Boolean Functions: An Application to the Secondary Constructions of Bent Functions
Guangpu Gao and Dongdai Lin and Wenfen Liu and Yongjuan Wang
2019/429 ( PDF )
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Harsh Chaudhari and Ashish Choudhury and Arpita Patra and Ajith Suresh
2019/428 ( PDF )
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability
Jan Czajkowski and Christian Majenz and Christian Schaffner and Sebastian Zur
2019/427 ( PDF )
Improved Secure Integer Comparison via Homomorphic Encryption
Florian Bourse and Olivier Sanders and Jacques Traoré
2019/426 ( PDF )
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
Abdelrahaman Aly and Tomer Ashur and Eli Ben-Sasson and Siemen Dhooghe and Alan Szepieniec
2019/425 ( PDF )
Homomorphic Training of 30,000 Logistic Regression Models
Flavio Bergamaschi and Shai Halevi and Tzipora T. Halevi and Hamish Hunt
2019/424 ( -- withdrawn -- )
Preimage Security of KNOT-Hash
Raghvendra Rohit
2019/423 ( PDF )
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name
Peter T. Breuer
2019/422 ( PDF )
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound
Alexander Moch and Eik List
2019/421 ( PDF )
Continuing to reflect on TLS 1.3 with external PSK
Liliya Akhmetzyanova and Evgeny Alekseev and Ekaterina Smyshlyaeva and Alexandr Sokolov
2019/420 ( PDF )
Improving Speed of Dilithium’s Signing Procedure
Prasanna Ravi and Sourav Sen Gupta and Anupam Chattopadhyay and Shivam Bhasin
2019/419 ( PDF )
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
Martin R. Albrecht and Carlos Cid and Lorenzo Grassi and Dmitry Khovratovich and Reinhard Lüftenegger and Christian Rechberger and Markus Schofnegger
2019/418 ( PDF )
Sharing of Encrypted files in Blockchain Made Simpler
S. Sharmila Deva Selvi and Arinjita Paul and Siva Dirisala and Saswata Basu and C. Pandu Rangan
2019/417 ( PDF )
Numerical Method for Comparison on Homomorphically Encrypted Numbers
Jung Hee Cheon and Dongwoo Kim and Duhyeong Kim and Hun Hee Lee and Keewoo Lee
2019/416 ( PDF )
How many transactions per second can bitcoin really handle ? Theoretically.
Evangelos Georgiadis
2019/415 ( PDF )
Refinement and Verification of CBC Casper
Ryuya Nakamura and Takayuki Jimba and Dominik Harz
2019/414 ( PDF )
Two-Round Oblivious Transfer from CDH or LPN
Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny and Daniel Wichs
2019/413 ( PDF )
On the Streaming Indistinguishability of a Random Permutation and a Random Function
Itai Dinur
2019/412 ( PDF )
On the complexity of the Permuted Kernel Problem
Eliane KOUSSA and Gilles MACARIO-RAT and Jacques PATARIN
2019/411 ( PDF )
Exploring the Monero Peer-to-Peer Network
Tong Cao and Jiangshan Yu and Jérémie Decouchant and Xiapu Luo and Paulo Verissimo
2019/410 ( PDF )
Policy-Based Sanitizable Signatures
Kai Samelin and Daniel Slamanig
2019/409 ( PDF )
Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes
Houda Ferradi and Keita Xagawa
2019/408 ( PDF )
Forgery Attack on SNEIKEN
Mustafa Khairallah
2019/407 ( PDF )
Privacy-Preserving Network Path Validation
Binanda Sengupta and Yingjiu Li and Kai Bu and Robert H. Deng
2019/406 ( PDF )
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
David Derler and Kai Samelin and Daniel Slamanig and Christoph Striecks
2019/405 ( PDF )
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware
Jo Vliegen and Md Masoom Rabbani and Mauro Conti and Nele Mentens
2019/404 ( PDF )
Efficient Message Authentication Codes with Combinatorial Group Testing
Kazuhiko Minematsu
2019/403 ( PDF )
Fast and simple constant-time hashing to the BLS12-381 elliptic curve
Riad S. Wahby and Dan Boneh
2019/402 ( PDF )
ILC: A Calculus for Composable, Computational Cryptography
Kevin Liao and Matthew A. Hammer and Andrew Miller
2019/401 ( PDF )
Side-Channel assessment of Open Source Hardware Wallets
Manuel San Pedro and Victor Servant and Charles Guillemet
2019/400 ( PDF )
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
Akira Takahashi and Mehdi Tibouchi
2019/399 ( PDF )
Inception makes non-malleable codes shorter as well!
Divesh Aggarwal and Maciej Obremski
2019/398 ( PDF )
Constant-Round Group Key Exchange from the Ring-LWE Assumption
Daniel Apon and Dana Dachman-Soled and Huijing Gong and Jonathan Katz
2019/397 ( PDF )
Feistel Structures for MPC, and More
Martin R. Albrecht and Lorenzo Grassi and Leo Perrin and Sebastian Ramacher and Christian Rechberger and Dragos Rotaru and Arnab Roy and Markus Schofnegger
2019/396 ( PDF )
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Evangelia Anna Markatou and Roberto Tamassia
2019/395 ( PDF )
Full Database Reconstruction with Access and Search Pattern Leakage
Evangelia Anna Markatou and Roberto Tamassia
2019/394 ( PDF )
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation
Vincent Migliore and Benoit Gérard and Mehdi Tibouchi and Pierre-Alain Fouque
2019/393 ( PDF )
A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence
Itay Berman and Iftach Haitner and Eliad Tsfadia
2019/392 ( PDF )
New Conditional Cube Attack on Keccak Keyed Modes
Zheng Li and Xiaoyang Dong and Wenquan Bi and Keting Jia and Xiaoyun Wang and Willi Meier
2019/391 ( PDF )
Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense
Biswabandan Panda
2019/390 ( PDF )
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures
Michael Specter and Sunoo Park and Matthew Green
2019/389 ( PDF )
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Sauvik Bhattacharya and Oscar Garcia-Morchon and Rachel Player and Ludo Tolhuizen
2019/388 ( PDF )
Towards Secret-Free Security
Ulrich Rührmair
2019/387 ( PDF )
SoK : On DFA Vulnerabilities of Substitution-Permutation Networks
Mustafa Khairallah and Xiaolu Hou and Zakaria Najm and Jakub Breier and Shivam Bhasin and Thomas Peyrin
2019/386 ( PDF )
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation
Ryo Kikuchi and Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ai Ishida and Takahiro Matsuda and Yusuke Sakai and Jacob C. N. Schuldt
2019/385 ( PDF )
Miller Inversion is Easy for the Reduced Tate Pairing on Supersingular Curves of Embedding Degree Two and Three
Takakazu Satoh
2019/384 ( PDF )
What Storage Access Privacy is Achievable with Small Overhead?
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2019/383 ( PDF )
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
Mathy Vanhoef and Eyal Ronen
2019/382 ( PDF )
Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length
Daniel Gardham and Mark Manulis
2019/381 ( -- withdrawn -- )
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Chen-Dong Ye and Tian Tian
2019/380 ( PDF )
A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit
Kazumasa Shinagawa and Koji Nuida
2019/379 ( PDF )
Non-Malleable Codes for Decision Trees
Marshall Ball and Siyao Guo and Daniel Wichs
2019/378 ( PDF )
pRate: Anonymous Star Rating with Rating Secrecy
Jia Liu and Mark Manulis
2019/377 ( PDF )
Lower Bounds for Obliv