default search action
IACR Cryptology ePrint Archive, Volume 2019
Volume 2019, 2019
- Ilia A. Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanovic, Dawn Song, Srinivas Devadas:
Sanctorum: A lightweight security monitor for secure enclaves. 1 - Jianye Huang, Qiong Huang:
Leakage-Resilient Group Signature: Definitions and Constructions. 2 - (Withdrawn) Secure and Effective Logic Locking for Machine Learning Applications. 3
- Guillaume Dabosville, Houssem Maghrebi, Alexis Lhuillery, Julien Bringer, Thanh-Ha Le:
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks. 4 - Lilas Alrahis, Muhammad Yasin, Hani H. Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu:
ScanSAT: Unlocking Obfuscated Scan Chains. 5 - Antonio Marcedone, Rafael Pass, Abhi Shelat:
Minimizing Trust in Hardware Wallets with Two Factor Signatures. 6 - Matthias Hamann, Matthias Krause:
Tight Security Bounds for Generic Stream Cipher Constructions. 7 - Jingyu Pan, Shivam Bhasin, Fan Zhang, Kui Ren:
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis. 8 - Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner:
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving. 9 - Rodrigo Abarzúa, Claudio Valencia Cordero, Julio López:
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC. 10 - Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. 11 - Sihem Mesnager, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee:
A Proof of the Beierle-Kranz-Leander's Conjecture related to Lightweight Multiplication in F2n. 12 - Changhai Ou, Siew-Kei Lam:
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces. 13 - Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan:
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks. 14 - Thomas Pornin, Thomas Prest:
More Efficient Algorithms for the NTRU Key Generation using the Field Norm. 15 - Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage:
Fast Message Franking: From Invisible Salamanders to Encryptment. 16 - Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song:
CHURP: Dynamic-Committee Proactive Secret Sharing. 17 - Yunhua Wen, Shengli Liu, Dawu Gu:
Generic Constructions of Robustly Reusable Fuzzy Extractor. 18 - Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang:
Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach. 19 - Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner:
Decentralizing Inner-Product Functional Encryption. 20 - Ilya Aldanov:
CryptoNote+. 21 - Anthony Demeri, Thomas Conroy, Alex Nolan, William Diehl:
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques. 22 - Joachim Breitner, Nadia Heninger:
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies. 23 - Yalin Chen, Jue-Sam Chou, Fang-Qi Zhou:
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography. 24 - Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang:
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers. 25 - Ben Smyth, Yoshikazu Hanatani:
Non-malleable encryption with proofs of plaintext knowledge and applications to voting. 26 - Lydia Garms, Anja Lehmann:
Group Signatures with Selective Linkability. 27 - Mathias Hall-Andersen, David Wong, Nick Sullivan, Alishah Chator:
nQUIC: Noise-Based QUIC Packet Protection. 28 - (Withdrawn) Upper Bound on $\lambda_1(\Lambda^{\bot}(\mathbf A))$. 29
- (Withdrawn) Analysis of Two Countermeasures against the Signal Leakage Attack. 30
- Rishab Goyal, Satyanarayana Vusirikala, Brent Waters:
Collusion Resistant Broadcast and Trace from Positional Witness Encryption. 31 - Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. 32 - Zhedong Wang, Xiong Fan, Feng-Hao Liu:
FE for Inner Products and Its Application to Decentralized ABE. 33 - Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias:
A Formal Treatment of Hardware Wallets. 34 - Carsten Baum, Daniele Cozzo, Nigel P. Smart:
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. 35 - Shuichi Katsumata, Shota Yamada:
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. 36 - Aron Gohr:
Improving Attacks on Speck32/64 using Deep Learning. 37 - Aijun Ge, Puwen Wei:
Identity-based Broadcast Encryption with Efficient Revocation. 38 - Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Fully Invisible Protean Signatures Schemes. 39 - Vadim Lyubashevsky, Gregor Seiler:
NTTRU: Truly Fast NTRU Using NTT. 40 - Bartosz Zoltak:
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher. 41 - Lisa Kohl:
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs. 42 - Qian Guo, Thomas Johansson, Alexander Nilsson:
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke. 43 - Ahmad Almorabea:
Toha Key Hardened Function. 44 - Ryo Nishimaki, Takashi Yamakawa:
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio. 45 - Alan Szepieniec, Bart Preneel:
Block-Anti-Circulant Unbalanced Oil and Vinegar. 46 - Kanad Basu, Deepraj Soni, Mohammed Nabeel, Ramesh Karri:
NIST Post-Quantum Cryptography- A Hardware Evaluation Study. 47 - Eyal Kushilevitz, Tamer Mour:
Sub-logarithmic Distributed Oblivious RAM with Small Block Size. 48 - Lingchen Li, Wenling Wu, Yafei Zheng, Lei Zhang:
The Relationship between the Construction and Solution of the MILP Models and Applications. 49 - Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. 50 - Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. 51 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. 52 - (Withdrawn) A New Code-based Signature Scheme with Shorter Public Key. 53
- Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, François Dassance, Guillaume Dufresne, Cécile Dumas, Emmanuel Prouff, Alexandre Venelli:
Deep Learning to Evaluate Secure RSA Implementations. 54 - Sandro Coretti, Antonio Faonio, Daniele Venturi:
Rate-Optimizing Compilers for Continuously Non-Malleable Codes. 55 - Ward Beullens, Hoeteck Wee:
Obfuscating simple functionalities from knowledge assumptions. 56 - Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler:
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts. 57 - Roman Langrehr, Jiaxin Pan:
Tightly secure hierarchical identity-based encryption. 58 - Yuanqi Shen, You Li, Amin Rezaei, Shuyu Kong, David Dlott, Hai Zhou:
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption. 59 - Amin Rezaei, You Li, Yuanqi Shen, Shuyu Kong, Hai Zhou:
CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States. 60 - Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei, Hai Zhou:
SigAttack: New High-level SAT-based Attack on Logic Encryptions. 61 - Michael Clear, Ciaran McGoldrick:
Additively Homomorphic IBE from Higher Residuosity. 62 - Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup. 63 - Keita Emura, Takuya Hayashi:
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management. 64 - Jan Camenisch, Manu Drijvers, Björn Tackmann:
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols. 65 - Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti:
Publicly Verifiable Proofs from Blockchains. 66 - George Teseleanu:
Managing Your Kleptographic Subscription Plan. 67 - Michael Walter:
Sampling the Integers with Low Relative Error. 68 - Jan Czajkowski, Andreas Hülsing, Christian Schaffner:
Quantum Indistinguishability of Random Sponges. 69 - Sam M. Werner, Paul J. Pritz, Alexei Zamyatin, William J. Knottenbelt:
Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool. 70 - Zhilin Zhang, Ke Wang, Weipeng Lin, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks. 71 - Alex Vazquez:
ZeroCT: Improving ZeroCoin with Confidential Transactions and more. 72 - Cristian Hristea, Ferucio Laurentiu Tiplea:
Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model. 73 - Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu:
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers. 74 - Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi:
Assessment of the Key-Reuse Resilience of NewHope. 75 - Matthieu Rivain, Junwei Wang:
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations. 76 - Michael Scott:
Pairing Implementation Revisited. 77 - Alan Kaminsky:
Testing the Randomness of Cryptographic Function Mappings. 78 - Kangquan Li, Longjiang Qu, Bing Sun, Chao Li:
New Results about the Boomerang Uniformity of Permutation Polynomials. 79 - Aner Ben-Efraim, Eran Omri:
Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing. 80 - Stephan Krenn, Kai Samelin, Christoph Striecks:
Practical Group-Signatures with Privacy-Friendly Openings. 81 - Nils Fleischhacker, Giulio Malavolta, Dominique Schröder:
Arithmetic Garbling from Bilinear Maps. 82 - Zhen Liu, Yanbin Pan, Zhenfei Zhang:
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15. 83 - Peter T. Breuer:
An Information Obfuscation Calculus for Encrypted Computing. 84 - Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Krämer, Patrick Longa, Jefferson E. Ricardini:
The Lattice-Based Digital Signature Scheme qTESLA. 85 - George Teseleanu:
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG. 86 - Laltu Sardar, Sushmita Ruj:
The Secure Link Prediction Problem. 87 - Nir Drucker, Shay Gueron:
Continuous Key Agreement with Reduced Bandwidth. 88 - Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens:
The General Sieve Kernel and New Records in Lattice Reduction. 89 - Hayo Baan, Sauvik Bhattacharya, Scott R. Fluhrer, Óscar García-Morchón, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang:
Round5: Compact and Fast Post-Quantum Public-Key Encryption. 90 - Hongda Li, Dongxue Pan, Peifang Ni:
Efficient Zero-Knowledge for NP from Secure Two-Party Computation. 91 - Léo Perrin:
Partitions in the S-Box of Streebog and Kuznyechik. 92 - (Withdrawn) Key Encapsulation Mechanism From Modular Multivariate Linear Equations. 93
- Aron Gohr, Sven Jacob, Werner Schindler:
CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges. 94 - Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin:
Variants of the AES Key Schedule for Better Truncated Differential Bounds. 95 - Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud:
On Recovering Affine Encodings in White-Box Implementations. 96 - Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin:
Linearly equivalent S-boxes and the Division Property. 97 - Pedro Branco:
A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions. 98 - Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn:
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings. 99 - Wei-Lun Huang, Jiun-Peng Chen, Bo-Yin Yang:
Correlation Power Analysis on NTRU Prime and Related Countermeasures. 100 - Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Juan Ramón Troncoso-Pastoriza:
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption. 101 - Hisham S. Galal, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum. 102 - Samuel Jaques, John M. Schanck:
Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE. 103 - Naomi Farley, Robert Fitzpatrick, Duncan Jones:
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation. 104 - Antonio Faonio, Daniele Venturi:
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate. 105 - Hongbing Wang, Yunlei Zhao:
Identity-Based Higncryption. 106 - Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu:
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit. 107 - Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy:
Minicrypt Primitives with Algebraic Structure and Applications. 108 - Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture. 109 - Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong:
Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves. 110 - Yin Li, Yu Zhang, Xingpo Ma, Chuanda Qi:
On the Complexity of non-recursive n-term Karatsuba Multiplier for Trinomials. 111 - Bjørn Møller Greve, Øyvind Ytrehus, Håvard Raddum:
Variable Elimination - a Tool for Algebraic Cryptanalysis. 112 - Ferucio Laurentiu Tiplea, Cristian Hristea:
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure. 113 - Rosario Gennaro, Steven Goldfeder:
Fast Multiparty Threshold ECDSA with Fast Trustless Setup. 114 - Nir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev:
Distributional Collision Resistance Beyond One-Way Functions. 115 - Hao Chen, Ilaria Chillotti, Yongsoo Song:
Multi-Key Homomophic Encryption from TFHE. 116 - Geoffroy Couteau, Michael Reichle:
Non-Interactive Keyed-Verification Anonymous Credentials. 117 - (Withdrawn) Defeating the Hart, Kim, Micheli, Pascuel-Perez, Petit, Quek Attack on WalnutDSA(TM). 118
- Ariel Gabizon:
On the security of the BCTV Pinocchio zk-SNARK variant. 119 - Keita Xagawa:
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019. 120 - Santosh Ghosh, Andrew H. Reinders, Rafael Misoczki, Manoj R. Sastry:
Anonymous Attestation for IoT. 121 - Santosh Ghosh, Rafael Misoczki, Manoj R. Sastry:
Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes. 122 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Grigory Karpunin, Vladislav Nozdrunov:
Security of Multilinear Galois Mode (MGM). 123 - Douglas Wikström:
Anomalous Look at Provable Security. 124 - (Withdrawn) Combinatorial Primality Test. 125
- Amirhossein Ebrahimi Moghaddam, Zahra Ahmadian:
New Automatic search method for Truncated-differential characteristics: Application to Midori and SKINNY. 126 - Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Beyond Birthday Bound Secure MAC in Faulty Nonce Model. 127 - Junichi Tomida:
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions. 128 - Elette Boyle, Lisa Kohl, Peter Scholl:
Homomorphic Secret Sharing from Lattices Without FHE. 129 - Greg Zaverucha, Dan Shumow:
Are Certificate Thumbprints Unique? 130 - Assi Barak, Daniel Escudero, Anders P. K. Dalskov, Marcel Keller:
Secure Evaluation of Quantized Neural Networks. 131 - Olivier Bronchain, Julien M. Hendrickx, Clément Massart, Alex Olshevsky, François-Xavier Standaert:
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations. 132 - Vasyl Ustimenko:
On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography. 133 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model. 134 - Sunoo Park, Adam Sealfon:
It wasn't me! Repudiability and Unclaimability of Ring Signatures. 135 - Florian Bourse, Olivier Sanders:
Divisible E-Cash from Constrained Pseudo-Random Functions. 136 - Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications. 137 - Dahmun Goudarzi, Ange Martinelli, Alain Passelègue, Thomas Prest:
Unifying Leakage Models on a Rényi Day. 138 - Hai Zhou, Yuanqi Shen, Amin Rezaei:
Vulnerability and Remedy of Stripped Function Logic Locking. 139 - Jinhyun So, Basak Guler, Amir Salman Avestimehr, Payman Mohassel:
CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning. 140 - Christina Boura, Anne Canteaut, Daniel Coggia:
A General Proof Framework for Recent AES Distinguishers. 141 - Matteo Campanelli, Dario Fiore, Anaïs Querol:
LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs. 142 - Benjamin Hettwer, Stefan Gehrer, Tim Güneysu:
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery. 143 - Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay:
Modeling Power Efficiency of S-boxes Using Machine Learning. 144 - Sim Jun Jie, Chan Fook Mun, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung:
Achieving GWAS with Homomorphic Encryption. 145 - Ling Song, Xianrui Qin, Lei Hu:
Boomerang Connectivity Table Revisited. 146 - Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song:
Practical Collision Attacks against Round-Reduced SHA-3. 147 - Ariel Gabizon:
On the efficiency of pairing-based proofs under the d-PKE. 148 - Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang:
Improved Lattice-based CCA2-Secure PKE in the Standard Model. 149 - Tung Chou:
QcBits: Constant-Time Small-Key Code-Based Cryptography. 150 - Peter Schwabe, Bas Westerbaan:
Solving binary MQ with Grover's algorithm. 151 - Duhyeong Kim, Yongha Son, Dongwoo Kim, Andrey Kim, Seungwan Hong, Jung Hee Cheon:
Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption. 152 - Emmanuela Orsini, Nigel P. Smart, Frederik Vercauteren:
Overdrive2k: Efficient Secure MPC over Z2k from Somewhat Homomorphic Encryption. 153 - Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi:
FastKitten: Practical Smart Contracts on Bitcoin. 154 - Matthew Walters, Sujoy Sinha Roy:
Constant-time BCH Error-Correcting Code. 155 - Siddhartha Jayanti, Srinivasan Raghuraman, Nikhil Vyas:
Efficient Constructions for Almost-everywhere Secure Computation. 156 - Paulo S. L. M. Barreto, Marcos A. Simplício Jr., Jefferson E. Ricardini, Harsh Kupwade Patil:
Schnorr-based implicit certification: improving the security and efficiency of V2X communications. 157 - Chris Peikert, Sina Shiehian:
Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors. 158 - Chen-Da Liu Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi:
Robust MPC: Asynchronous Responsiveness yet Synchronous Security. 159 - Sujoy Sinha Roy, Furkan Turan, Kimmo Järvinen, Frederik Vercauteren, Ingrid Verbauwhede:
FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data. 160 - Andrea Francesco Iuorio, Andrea Visconti:
Understanding Optimizations and Measuring Performances of PBKDF2. 161 - Palash Sarkar:
Multi-Stage Proof-of-Work Blockchain. 162 - Melissa Azouaoui, Romain Poussier, François-Xavier Standaert:
Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder. 163 - Hendrik Eerikson, Claudio Orlandi, Pille Pullonen, Joonas Puura, Mark Simkin:
Use your Brain! Arithmetic 3PC For Any Modulus with Active Security. 164 - Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson:
libInterMAC: Beyond Confidentiality and Integrity in Practice. 165 - Luca De Feo, Simon Masson, Christophe Petit, Antonio Sanso:
Verifiable Delay Functions from Supersingular Isogenies and Pairings. 166 - Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Analysis of Secure Caches and Timing-Based Side-Channel Attacks. 167 - Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Profiling Side-channel Analysis in the Restricted Attacker Framework. 168 - Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens:
Updatable Anonymous Credentials and Applications to Incentive Systems. 169 - Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong:
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes. 170 - M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar:
XONN: XNOR-based Oblivious Deep Neural Network Inference. 171 - Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu:
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS. 172 - Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva:
Shorter Quadratic QA-NIZK Proofs. 173 - Kasper Green Larsen, Mark Simkin:
Exponential Lower Bounds for Secret Sharing. 174 - Satrajit Ghosh, Mark Simkin:
The Communication Complexity of Threshold Private Set Intersection. 175 - Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio:
Homomorphic Encryption for Finite Automata. 176 - E. Victor Flynn, Yan Bo Ti:
Genus Two Isogeny Cryptography. 177 - Rohit Sinha, Sivanarayana Gaddam, Ranjit Kumaresan:
LucidiTEE: Policy-based Fair Computing at Scale. 178 - Yue Guo, Rafael Pass, Elaine Shi:
Synchronous, with a Chance of Partition Tolerance. 179 - David Wong:
Disco: Modern Session Encryption. 180 - Jesper Buus Nielsen, Mark Simkin:
Lower Bounds for Leakage-Resilient Secret Sharing. 181 - Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Mustafa Khairallah, Zakaria Najm, Shivam Bhasin:
Security is an Architectural Design Constraint. 182 - Katherine E. Stange:
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm. 183 - William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj:
Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon. 184 - Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. 185 - Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:
Re-thinking untraceability in the CryptoNote-style blockchain. 186 - Antoine Joux:
Fully homomorphic encryption modulo Fermat numbers. 187 - Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs. 188 - Yaoling Ding, An Wang, Siu-Ming Yiu:
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis. 189 - Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model. 190 - Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh:
Zether: Towards Privacy in a Smart Contract World. 191 - Francisco Corella, Karen Pomian Lewison:
An Omission-Tolerant Cryptographic Checksum. 192 - Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge. 193 - Thomas Vidick, Tina Zhang:
Classical zero-knowledge arguments for quantum computations. 194 - Jung Hee Cheon, Wonhee Cho, Minki Hhan, Minsik Kang, Jiseung Kim, Changmin Lee:
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem. 195 - Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions. 196 - Esteban Landerreche, Marc Stevens, Christian Schaffner:
Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions. 197 - Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro:
Seedless Fruit is the Sweetest: Random Number Generation, Revisited. 198 - Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu:
Password-Authenticated Public-Key Encryption. 199 - Benny Applebaum, Zvika Brakerski, Rotem Tsabary:
Degree 2 is Complete for the Round-Complexity of Malicious MPC. 200 - Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac:
DL-Extractable UC-Commitment Schemes. 201 - James Bartusek, Fermi Ma, Mark Zhandry:
The Distinction Between Fixed and Random Generators in Group-Based Assumptions. 202 - Osman Biçer, Alptekin Küpçü:
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures. 203 - Barak Shani:
The Security of All Private-key Bits in Isogeny-based Schemes. 204 - Barak Shani:
A note on isogeny-based hybrid verifiable delay functions. 205 - James Howe, Ayesha Khalid, Marco Martinoli, Francesco Regazzoni, Elisabeth Oswald:
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography. 206 - Dragos Rotaru, Tim Wood:
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security. 207 - Muzhou Li, Kai Hu, Meiqin Wang:
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA. 208 - Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki:
SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes. 209 - Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh:
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks. 210 - Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli:
Monℤ2ka: Fast Maliciously Secure Two Party Computation on ℤ2k. 211 - Hossein Oraei, Massoud Hadian Dehkordi:
A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes. 212 - Mark Zhandry:
On ELFs, Deterministic Encryption, and Correlated-Input Security. 213 - Michele Ciampi, Rafail Ostrovsky:
Four-Round Secure Multiparty Computation from General Assumptions. 214 - Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé:
Approx-SVP in Ideal Lattices with Pre-processing. 215 - Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky:
On Round Optimal Secure Multiparty Computation from Minimal Assumptions. 216 - Guillermo Sosa Gómez, Octavio Páez Osuna:
A family of boolean functions with good cryptographic properties. 217 - Akshay Degwekar, Vinod Vaikuntanathan:
Computational Limitations in Robust Classification and Win-Win Results. 218 - Tom Close:
Nitro Protocol. 219 - Ivan Damgård, Kasper Green Larsen, Jesper Buus Nielsen:
Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing. 220 - Shuichi Katsumata, Shota Yamada:
Group Signatures without NIZK: From Lattices in the Standard Model. 221 - Michael Klooß, Anja Lehmann, Andy Rupp:
(R)CCA Secure Updatable Encryption with Integrity Protection. 222 - Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt Rohloff, Vinod Vaikuntanathan:
Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies. 223 - Lucas Kowalczyk, Hoeteck Wee:
Compact Adaptively Secure ABE for NC1 from k-Lin. 224 - Christoph Dobraunig, Bart Mennink:
Leakage Resilience of the Duplex Construction. 225 - Benedikt Bünz, Lucianna Kiffer, Loi Luu, Mahdi Zamani:
Flyclient: Super-Light Clients for Cryptocurrencies. 226 - Kevin Lewi, Wonho Kim, Ilya Maykov, Stephen A. Weis:
Securing Update Propagation with Homomorphic Hashing. 227 - Nimrod Aviram, Kai Gellert, Tibor Jager:
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT. 228 - Lukas Kölsch:
XOR-counts and lightweight multiplication with fixed elements in binary finite fields. 229 - Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages. 230 - Benny Applebaum, Amos Beimel, Oriol Farràs, Oded Nir, Naty Peter:
Secret-Sharing Schemes for General and Uniform Access Structures. 231 - Dorit Aharonov, Zvika Brakerski, Kai-Min Chung, Ayal Green, Ching-Yi Lai, Or Sattath:
On Quantum Advantage in Information Theoretic Single-Server PIR. 232 - Nuttapong Attrapadung:
Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption. 233 - Léo Ducas, Maxime Plançon, Benjamin Wesolowski:
On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm. 234 - Willy Quach, Ron D. Rothblum, Daniel Wichs:
Reusable Designated-Verifier NIZKs for all NP from CDH. 235 - Geoffroy Couteau, Dennis Hofheinz:
Designated-verifier pseudorandom generators, and their applications. 236 - Zahra Jafargholi, Kasper Green Larsen, Mark Simkin:
Optimal Oblivious Priority Queues and Offline Oblivious RAM. 237 - Rémi Géraud, David Naccache, Razvan Rosie:
Robust Encryption, Extended. 238 - Adam Groce, Peter Rindal, Mike Rosulek:
Cheaper Private Set Intersection via Differentially Private Leakage. 239 - Vipul Goyal, Yifan Song:
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes. 240 - Benny Pinkas, Thomas Schneider, Oleksandr Tkachenko, Avishay Yanai:
Efficient Circuit-based PSI with Linear Communication. 241 - Alex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs, David J. Wu:
New Constructions of Reusable Designated-Verifier NIZKs. 242 - Akinori Hosoyamada, Tetsu Iwata:
Tight Quantum Security Bound of the 4-Round Luby-Rackoff Construction. 243 - Viet Tung Hoang, David Miller, Ni Trieu:
Attacks Only Get Better: How to Break FF3 on Large Domains. 244 - Albert Cheu, Adam D. Smith, Jonathan R. Ullman, David Zeber, Maxim Zhilyaev:
Distributed Differential Privacy via Shuffling. 245 - Serge Fehr, Chen Yuan:
Towards optimal robust secret sharing with security against a rushing adversary. 246 - Andrea Coladangelo, Alex Bredariol Grilo, Stacey Jeffery, Thomas Vidick:
Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources. 247 - Ting Liu, Yao Sun:
Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach. 248 - Srimanta Bhattacharya, Mridul Nandi:
Revisiting Variable Output Length XOR Pseudorandom Function. 249 - Lucas Schabhüser, Denis Butin, Johannes Buchmann:
Function-Dependent Commitments from Homomorphic Authenticators. 250 - T.-H. Hubert Chan, Rafael Pass, Elaine Shi:
Consensus through Herding. 251 - Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter:
Reversible Proofs of Sequential Work. 252 - Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain:
Founding Secure Computation on Blockchains. 253 - Divesh Aggarwal, Kai-Min Chung, Han-Hsuan Lin, Thomas Vidick:
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries. 254 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions. 255 - Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman:
DLCT: A New Tool for Differential-Linear Cryptanalysis. 256 - Anne Broadbent, Sébastien Lord:
Uncloneable Quantum Encryption via Random Oracles. 257 - Joseph Jaeger, Stefano Tessaro:
Tight Time-Memory Trade-offs for Symmetric Encryption. 258 - SenPeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
A Practical Method to Recover Exact Superpoly in Cube Attack. 259 - Eduard Hauck, Eike Kiltz, Julian Loss:
A Modular Treatment of Blind Signatures from Identification Schemes. 260 - Manu Drijvers, Gregory Neven:
Forward-Secure Multi-Signatures. 261 - Qipeng Liu, Mark Zhandry:
Revisiting Post-Quantum Fiat-Shamir. 262 - Jiaping Wang, Hao Wang:
Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones. 263 - Rohit Agrawal, Yi-Hsiu Chen, Thibaut Horel, Salil P. Vadhan:
Unifying computational entropies via Kullback-Leibler divergence. 264 - Rami Khalil, Arthur Gervais, Guillaume Felley:
TEX - A Securely Scalable Trustless Exchange. 265 - Daniel J. Bernstein, Bo-Yin Yang:
Fast constant-time gcd computation and modular inversion. 266 - Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede:
Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon. 267 - Sergei Bauer, Martin Brunner, Peter Schartner:
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys. 268 - Sergey Gorbunov, Hoeteck Wee:
Digital Signatures for Consensus. 269 - Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Maofan Yin:
Sync HotStuff: Synchronous SMR with 2∆ Latency and Optimistic Responsiveness. 270 - Jintai Ding, Chi Cheng, Yue Qin:
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs). 271 - Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:
Quantum Security Analysis of AES. 272 - Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai:
Compressing Vector OLE. 273 - Elaine Shi:
Path Oblivious Heap. 274 - M. Sadegh Riazi, Mojan Javaheripi, Siam U. Hussain, Farinaz Koushanfar:
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation. 275 - Erik-Oliver Blass, Florian Kerschbaum:
Secure Computation of the kth-ranked Integer on Blockchains. 276 - Sihem Mesnager, Chunming Tang, Maosheng Xiong:
On the boomerang uniformity of quadratic permutations over 픽2n. 277 - Navneet Agarwal, Sanat Anand, Manoj Prabhakaran:
Uncovering Algebraic Structures in the MPC Landscape. 278 - Alex Lombardi, Luke Schaeffer:
A Note on Key Agreement and Non-Interactive Commitments. 279 - Sam Kim:
Multi-Authority Attribute-Based Encryption from LWE in the OT Model. 280 - Phillipp Schoppmann, Adrià Gascón, Mariana Raykova, Benny Pinkas:
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning. 281 - Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren:
A Framework for Cryptographic Problems from Linear Algebra. 282 - Dimitrios Poulakis:
An Attack on Small Private Keys of RSA Based on Euclidean Algorithm. 283 - Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2. 284 - Gideon Samid:
SpaceFlip : Unbound Geometry Cryptography. 285 - Yindong Chen, Fei Guo, Liu Zhang:
Fast Algebraic Immunity of 2m+2 & 2m+3 variables Majority Function. 286 - Anton Alekseychuk, Serhii Mykolaiovych Koniushok, Mikhailo V. Poremskyi:
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields. 287 - Alejandro Freyre-Echevarría, Ismel Martínez-Díaz:
On the construction of S-boxes using the leaders and followers metaheuristic. 288 - Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. 289 - Philippe Loubet-Moundi:
Cost effective techniques for chip delayering and in-situ depackaging. 290 - Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka:
CCA Security and Trapdoor Functions via Key-Dependent-Message Security. 291 - Jan-Pieter D'Anvers, Marcel Tiepelt, Frederik Vercauteren, Ingrid Verbauwhede:
Timing attacks on Error Correcting Codes in Post-Quantum Secure Schemes. 292 - Cody Freitag, Ilan Komargodski, Rafael Pass:
Impossibility of Strong KDM Security with Auxiliary Input. 293 - Miran Kim, Yongsoo Song, Baiyu Li, Daniele Micciancio:
Semi-parallel Logistic Regression for GWAS on Encrypted Data. 294 - Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng:
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption. 295 - Wouter Castryck, Thomas Decru, Benjamin Smith:
Hash functions from superspecial genus-2 curves using Richelot isogenies. 296 - Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao:
Towards Optimized and Constant-Time CSIDH on Embedded Devices. 297 - Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia:
Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem. 298 - Xuecheng Ma, Dongdai Lin:
A Generic Construction of Revocable Identity-Based Encryption. 299 - Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, Viktor Fischer:
Transient Effect Ring Oscillators Leak Too. 300 - Peter T. Breuer, Simon Pickin:
Safe Compilation for Encrypted Computing. 301 - Yael Tauman Kalai, Leonid Reyzin:
A Survey of Leakage-Resilient Cryptography. 302 - Terry Shue Chien Lau, Chik How Tan, Theo Fanuela Prabowo:
Analysis of TPL Signature Scheme. 303 - Rémi Bricout, André Chailloux, Thomas Debris-Alazard, Matthieu Lequesne:
Ternary Syndrome Decoding with Large Weight. 304 - Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier:
Practical Algebraic Side-Channel Attacks Against ACORN. 305 - Madhurima Mukhopadhyay, Palash Sarkar:
Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields. 306 - Kwang Ho Kim, Sihem Mesnager:
Solving x2k+1+x+a=0 in 픽2n with gcd(n, k)=1. 307 - Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova:
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation. 308 - Jean-Sébastien Coron, Luca Notarnicola:
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots. 309 - Kevin Cheang, Cameron Rasmussen, Sanjit A. Seshia, Pramod Subramanyan:
A Formal Approach to Secure Speculation. 310 - Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. 311 - Lars Tebelmann, Michael Pehl, Vincent Immler:
Side-Channel Analysis of the TERO PUF. 312 - Monika Trimoska, Sorina Ionica, Gilles Dequen:
A SAT-based approach for index calculus on binary elliptic curves. 313 - Prabhanjan Ananth, Vinod Vaikuntanathan:
Optimal Bounded-Collusion Secure Functional Encryption. 314 - Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos:
Iterated Search Problems and Blockchain Security under Falsifiable Assumptions. 315 - Marcus Brinkmann:
Extended Affine and CCZ Equivalence up to Dimension 4. 316 - Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, Dawn Song:
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. 317 - Boyu Ni, Xiaoyang Dong:
Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256. 318 - Yu Chen, Xuecheng Ma:
PGC: Pretty Good Confidential Transaction System with Accountability. 319 - Léo Ducas, Steven D. Galbraith, Thomas Prest, Yang Yu:
Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats. 320 - Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild:
Horizontal Collision Correlation Attack on Elliptic Curves. 321 - Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj:
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES. 322 - Sabyasachi Dutta, Kouichi Sakurai:
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited. 323 - Pedro Branco, Paulo Mateus:
A Traceable Ring Signature Scheme based on Coding Theory. 324 - Hiroki Sudo, Koji Nuida, Kana Shimizu:
An Efficient Private Evaluation of a Decision Graph. 325 - Alonso González, Carla Ràfols:
Sublinear Pairing-based Arguments with Updatable CRS and Weaker Assumptions. 326 - Gembu Ito, Tetsu Iwata:
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers. 327 - Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquín García-Alfaro:
On the Difficulty of Hiding the Balance of Lightning Network Channels. 328 - Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska, Wil Michiels:
Doubly half-injective PRGs for incompressible white-box cryptography. 329 - Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev:
Practical Supersingular Isogeny Group Key Agreement. 330 - Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, Matthew Campagna, David Jao:
Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors. 331 - Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung:
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields. 332 - Helger Lipmaa:
Key-and-Argument-Updatable QA-NIZKs. 333 - Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova:
Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition. 334 - Yan Yan, Elisabeth Oswald:
Examining the Practical Side Channel Resilience of ARX-boxes. 335 - Eli Ben-Sasson, Lior Goldberg, Swastik Kopparty, Shubhangi Saraf:
DEEP-FRI: Sampling Outside the Box Improves Soundness. 336 - Lukasz Krzywiecki, Miroslaw Kutylowski, Jakub Pezda, Marcin Slowik:
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios. 337 - Marshall Ball, Brent Carmer, Tal Malkin, Mike Rosulek, Nichole Schimanski:
Garbled Neural Networks are Practical. 338 - Yusuke Naito, Takeshi Sugawara:
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers. 339 - Antoine Wurcker:
Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys. 340 - István András Seres, Dániel A. Nagy, Chris Buckland, Péter Burcsi:
MixEth: efficient, trustless coin mixing service for Ethereum. 341 - Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
LightChain: A DHT-based Blockchain for Resource Constrained Environments. 342 - Aurélien Vasselle, Antoine Wurcker:
Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input. 343 - Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge Dryja:
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency. 344 - Hugues Thiebeauld, Aurélien Vasselle, Antoine Wurcker:
Second-order Scatter Attack. 345 - Christophe Clavier, Léo Reynaud, Antoine Wurcker:
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm. 346 - Nir Drucker, Shay Gueron:
Selfie: reflections on TLS 1.3 with PSK. 347 - Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, Thomas Schneider:
Efficient and Scalable Universal Circuits. 348 - Felix Wegener, Lauren De Meyer, Amir Moradi:
Spin Me Right Round: Rotational Symmetry for FPGA-specific AES. 349 - Fabian Boemer, Yixing Lao, Rosario Cammarota, Casimir Wierzynski:
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data. 350 - José Becerra, Dimiter Ostrev, Marjan Skrobot:
Forward Secrecy of SPAKE2. 351 - Maxim Jourenko, Kanta Kurazumi, Mario Larangeira, Keisuke Tanaka:
SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies. 352 - Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi:
A Faster Constant-time Algorithm of CSIDH keeping Two Torsion Points. 353 - Abdelrahaman Aly, Nigel P. Smart:
Benchmarking Privacy Preserving Scientific Operations. 354 - Anubhab Baksi, Dhiman Saha, Sumanta Sarkar:
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks. 355 - Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O'Neill, Justin Thaler:
Ad Hoc Multi-Input Functional Encryption. 356 - Núria Costa, Ramiro Martínez, Paz Morillo:
Lattice-based proof of a shuffle. 357 - Leo Weissbart, Stjepan Picek, Lejla Batina:
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA. 358 - Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya P. Razenshteyn, M. Sadegh Riazi:
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search. 359 - Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais:
SoK: Off The Chain Transactions. 360 - Anat Paskin-Cherniavsky, Artiom Radune:
On polynomial secret sharing schemes. 361 - Alisa Chernyaeva, Ilya Shirobokov, Alexander Davydov:
Game Channels: State Channels for the Gambling Industry with Built-In PRNG. 362 - Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima:
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs. 363 - Benedikt Auerbach, Federico Giacon, Eike Kiltz:
Everybody's a Target: Scalability in Public-Key Encryption. 364 - Rotem Tsabary:
Fully Secure Attribute-Based Encryption for t-CNF from LWE. 365 - Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley:
Triggerflow: Regression Testing by Advanced Execution Path Inspection. 366 - Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin:
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting. 367 - Alex Davidson, Amit Deo, Ela Lee, Keith Martin:
Strong Post-Compromise Secure Proxy Re-Encryption. 368 - Marco Calderini:
On the EA-classes of known APN functions in small dimensions. 369 - Mark Zhandry, Cong Zhang:
Indifferentiability for Public Key Cryptosystems. 370 - Xueli Wang, Yu Chen, Xuecheng Ma:
Generic Construction of Linkable Ring Signature. 371 - Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers. 372 - Aram Jivanyan:
Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions. 373 - Léo Perrin:
Probability 1 Iterated Differential in the SNEIK Permutation. 374 - Xavier Bultel, Pascal Lafourcade:
Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters. 375 - Amir Jalali, Neil Davenport:
SELL v1.0: Searchable Encrypted Logging Library. 376 - Kasper Green Larsen, Tal Malkin, Omri Weinstein, Kevin Yeo:
Lower Bounds for Oblivious Near-Neighbor Search. 377 - Jia Liu, Mark Manulis:
pRate: Anonymous Star Rating with Rating Secrecy. 378 - Marshall Ball, Siyao Guo, Daniel Wichs:
Non-Malleable Codes for Decision Trees. 379 - Kazumasa Shinagawa, Koji Nuida:
A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit. 380 - (Withdrawn) Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks? 381
- Daniel Gardham, Mark Manulis:
Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length. 382 - Mathy Vanhoef, Eyal Ronen:
Dragonblood: A Security Analysis of WPA3's SAE Handshake. 383 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo:
What Storage Access Privacy is Achievable with Small Overhead? 384 - Takakazu Satoh:
Miller Inversion is Easy for the Reduced Tate Pairing on Trace Zero Supersingular Curves. 385 - Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C. N. Schuldt:
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation. 386 - Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin:
SoK : On DFA Vulnerabilities of Substitution-Permutation Networks. 387 - Ulrich Rührmair:
Towards Secret-Free Security. 388 - Sauvik Bhattacharya, Óscar García-Morchón, Rachel Player, Ludo Tolhuizen:
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution. 389 - Michael A. Specter, Sunoo Park, Matthew Green:
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures. 390 - Biswabandan Panda:
Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense. 391 - Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. 392 - Itay Berman, Iftach Haitner, Eliad Tsfadia:
A Tight Parallel-Repetition Theorem for Random-Terminating Interactive Arguments. 393 - Vincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque:
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation. 394 - Evangelia Anna Markatou, Roberto Tamassia:
Full Database Reconstruction with Access and Search Pattern Leakage. 395 - Evangelia Anna Markatou, Roberto Tamassia:
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries. 396 - Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger:
Feistel Structures for MPC, and More. 397 - Daniel Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz:
Constant-Round Group Key Exchange from the Ring-LWE Assumption. 398 - Divesh Aggarwal, Maciej Obremski:
Inception makes non-malleable codes shorter as well! 399 - Akira Takahashi, Mehdi Tibouchi:
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL. 400 - Manuel San Pedro, Victor Servant, Charles Guillemet:
Side-Channel assessment of Open Source Hardware Wallets. 401 - Kevin Liao, Matthew A. Hammer, Andrew Miller:
ILC: A Calculus for Composable, Computational Cryptography. 402 - Riad S. Wahby, Dan Boneh:
Fast and simple constant-time hashing to the BLS12-381 elliptic curve. 403 - Kazuhiko Minematsu:
Efficient Message Authentication Codes with Combinatorial Group Testing. 404 - Jo Vliegen, Md Masoom Rabbani, Mauro Conti, Nele Mentens:
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware. 405 - David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks:
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. 406 - Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng:
Privacy-Preserving Network Path Validation. 407 - Mustafa Khairallah:
Forgery Attack on SNEIKEN. 408 - Houda Ferradi, Keita Xagawa:
Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes. 409 - Kai Samelin, Daniel Slamanig:
Policy-Based Sanitizable Signatures. 410 - Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Veríssimo:
Exploring the Monero Peer-to-Peer Network. 411 - Eliane Koussa, Gilles Macario-Rat, Jacques Patarin:
On the complexity of the Permuted Kernel Problem. 412 - Itai Dinur:
On the Streaming Indistinguishability of a Random Permutation and a Random Function. 413 - Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs:
Two-Round Oblivious Transfer from CDH or LPN. 414 - Ryuya Nakamura, Takayuki Jimba, Dominik Harz:
Refinement and Verification of CBC Casper. 415 - Evangelos Georgiadis:
How many transactions per second can bitcoin really handle ? Theoretically. 416 - Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun-Hee Lee, Keewoo Lee:
Numerical Methods for Comparison on Homomorphically Encrypted Numbers. 417 - S. Sharmila Deva Selvi, Arinjita Paul, Siva Dirisala, Saswata Basu, C. Pandu Rangan:
Sharing of Encrypted files in Blockchain Made Simpler. 418 - Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. 419 - Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Shivam Bhasin:
Improving Speed of Dilithium's Signing Procedure. 420 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Ekaterina Smyshlyaeva, Alexandr Sokolov:
Continuing to reflect on TLS 1.3 with external PSK. 421 - Alexander Moch, Eik List:
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound. 422 - Peter T. Breuer:
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name. 423 - (Withdrawn) Preimage Security of KNOT-Hash. 424
- Flávio Bergamaschi, Shai Halevi, Tzipora Halevi, Hamish Hunt:
Homomorphic Training of 30, 000 Logistic Regression Models. 425 - Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec:
Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution). 426 - Florian Bourse, Olivier Sanders, Jacques Traoré:
Improved Secure Integer Comparison via Homomorphic Encryption. 427 - Jan Czajkowski, Christian Majenz, Christian Schaffner, Sebastian Zur:
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability. 428 - Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh:
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction. 429 - (Withdrawn) Composition of Boolean Functions: An Application to the Secondary Constructions of Bent Functions. 430
- Aurore Guillevic, Simon Masson, Emmanuel Thomé:
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation. 431 - Julien Lavauzelle, Julian Renner:
Cryptanalysis of a System Based on Twisted Reed - Solomon Codes. 432 - Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru:
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC. 433 - Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi:
Masking Fuzzy-Searchable Public Databases. 434 - Yue Qin, Chi Cheng, Jintai Ding:
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope. 435 - Benjamin Dowling, Paul Rösler, Jörg Schwenk:
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework. 436 - Thijs Veugen:
Efficient coding for secure computing with additively-homomorphic encrypted data. 437 - Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti:
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data. 438 - Loïc Masure, Cécile Dumas, Emmanuel Prouff:
A Comprehensive Study of Deep Learning for Side-Channel Analysis. 439 - Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas López, Mridul Nandi, Yu Sasaki:
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. 440 - Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia:
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution. 441 - Sabyasachi Karati, Reihaneh Safavi-Naini:
K2SN-MSS: An Efficient Post-Quantum Signature (Full Version). 442 - Sergiu Bursuc, Steve Kremer:
Contingent payments on a public ledger: models and reductions for automated verification. 443 - Gildas Avoine, Sébastien Canard, Loïc Ferreira:
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy. 444 - Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications. 445 - Sanjit Chatterjee, Shravan Kumar Parshuram Puria, Akash Shah:
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions. 446 - Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak. 447 - Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl:
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More. 448 - Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin:
Limits to Non-Malleability. 449 - Chenglu Jin, Zheng Yang, Sridhar Adepu, Jianying Zhou:
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data. 450 - Francesco Berti, Olivier Pereira, François-Xavier Standaert:
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher. 451 - Sean Murphy, Rachel Player:
A Central Limit Framework for Ring-LWE Decryption. 452 - Lydia Garms, Elizabeth A. Quaglia:
A New Approach to Modelling Centralised Reputation Systems. 453 - Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung:
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks. 454 - João Otávio Massari Chervinski, Diego Kreutz, Jiangshan Yu:
FloodXMR: Low-cost transaction flooding attack with Monero's bulletproof protocol. 455 - Peifang Ni, Hongda Li, Xianning Meng, Dongxue Pan:
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting. 456 - Mustafa Khairallah:
Forgery Attack on mixFeed in the Nonce-Misuse Scenario. 457 - Lorenzo Grassi, Daniel Kales, Dmitry Khovratovich, Arnab Roy, Christian Rechberger, Markus Schofnegger:
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems. 458 - Gaëtan Leurent, Thomas Peyrin:
From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1. 459 - Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny:
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards. 460 - Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu:
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks. 461 - Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11. 462 - Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi:
In Pursuit of Clarity In Obfuscation. 463 - Alessio Caminata, Elisa Gorla:
The complexity of MinRank. 464 - Jung Hee Cheon, Duhyeong Kim, Jai Hyun Park:
Towards a Practical Clustering Analysis over Encrypted Data. 465 - (Withdrawn) Privacy-Preserving K-means Clustering with Multiple Data Owners. 466
- Clément Massart, François-Xavier Standaert:
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version). 467 - Alessandro Budroni, Andrea Tenti:
The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem. 468 - Rui Qiao, Qinglong Wang, Zongtao Duan, Na Fan:
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks. 469 - Niek J. Bouman, Niels de Vreede:
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals. 470 - Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac:
UC-Secure CRS Generation for SNARKs. 471 - Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells:
Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM). 472 - Chengdong Tao:
A Method to Reduce the Key Size of UOV Signature Scheme. 473 - John Matthew Macnaghten, James Luke Menzies, Mark Munro:
A Note on SIMON-32/64 Security. 474 - Dennis Hofheinz, Bogdan Ursu:
Dual-Mode NIZKs from Obfuscation. 475 - Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef:
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T. 476 - Cas Cremers, Britta Hale, Konrad Kohbrok:
Revisiting Post-Compromise Security Guarantees in Group Messaging. 477 - Sarah McCarthy, James Howe, Neil Smyth, Séamus Brannigan, Máire O'Neill:
BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme. 478 - Sébastien Canard, Loïc Ferreira:
Extended 3-Party ACCE and Application to LoRaWAN 1.1. 479 - Karim Baghery:
On the Efficiency of Privacy-Preserving Smart Contract Systems. 480 - Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba:
An Efficient and Compact Reformulation of NIST Collision Estimate Test. 481 - Jacob Appelbaum, Chloe Martindale, Peter Wu:
Tiny WireGuard Tweak. 482 - Pierrick Méaux, Claude Carlet, Anthony Journault, François-Xavier Standaert:
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations. 483 - Eric Brier, Houda Ferradi, Marc Joye, David Naccache:
New Number-Theoretic Cryptographic Primitives. 484 - Razvan Barbulescu, Nadia El Mrabet, Loubna Ghammam:
A taxonomy of pairings, their security, their complexity. 485 - Suhyeon Lee, Seungjoo Kim:
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment. 486 - Michel Abdalla, Fabrice Benhamouda, Romain Gay:
From Single-Input to Multi-Client Inner-Product Functional Encryption. 487 - Alan Kaminsky:
Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication. 488 - Leon Botros, Matthias J. Kannwischer, Peter Schwabe:
Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4. 489 - Ward Beullens:
On sigma protocols with helper for MQ and PKP, fishy signature schemes and more. 490 - Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
Best Information is Most Successful. 491 - Daniel J. Bernstein, Andreas Hülsing:
Decisional second-preimage resistance: When does SPR imply PRE? 492 - Anamaria Costache, Kim Laine, Rachel Player:
Homomorphic noise growth in practice: comparing BGV and FV. 493 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model. 494 - Marc Joye:
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited. 495 - Christian Majenz, Christian Schaffner, Jeroen van Wier:
Non-malleability for quantum public-key encryption. 496 - Jiafan Wang, Sherman S. M. Chow:
Forward and Backward-Secure Range-Searchable Symmetric Encryption. 497 - Ward Beullens, Thorsten Kleinjung, Frederik Vercauteren:
CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations. 498 - Michael Naehrig, Joost Renes:
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography. 499 - Jean-Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca:
An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster. 500 - María Naya-Plasencia, André Schrottenloher:
Optimal Merging in Quantum k-xor and k-sum Algorithms. 501 - Shi Bai, Shaun Miller, Weiqiang Wen:
A refined analysis of the cost for solving LWE via uSVP. 502 - Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations. 503 - Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi:
Afgjort - A Semi-Synchronous Finality Layer for Blockchains. 504 - Felix Wegener, Thorben Moos, Amir Moradi:
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations. 505 - Erik-Oliver Blass, Guevara Noubir:
Forward Integrity and Crash Recovery for Secure Logs. 506 - Jiaxin Guan, Mark Zhandry:
Simple Schemes in the Bounded Storage Model. 507 - Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. 508 - Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-Similar Ciphers. 509 - Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes. 510 - Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited. 511 - Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System. 512 - Khoa Nguyen, Hanh Tang, Huaxiong Wang, Neng Zeng:
New Code-Based Privacy-Preserving Cryptographic Constructions. 513 - Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee:
Pixel: Multi-signatures for Consensus. 514 - Jakub Breier, Mustafa Khairallah, Xiaolu Hou, Yang Liu:
A Countermeasure Against Statistical Ineffective Fault Analysis. 515 - Anasuya Acharya, Manoj Prabhakaran, Akash Trehan:
CellTree: A New Paradigm for Distributed Data Repositories. 516 - Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert:
Mobile Private Contact Discovery at Scale. 517 - Payman Mohassel, Peter Rindal, Mike Rosulek:
Fast Database Joins for Secret Shared Data. 518 - Christopher Patton, Thomas Shrimpton:
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications. 519 - Benjamin M. Case, Colin M. Gallagher, Shuhong Gao:
A Note on Sub-Gaussian Random Variables. 520 - Benjamin M. Case, Shuhong Gao, Gengran Hu, Qiuxia Xu:
Fully Homomorphic Encryption with k-bit Arithmetic Operations. 521 - Amos Beimel, Naty Peter:
Secret-Sharing from Robust Conditional Disclosure of Secrets. 522 - Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. 523 - Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. 524 - Ciprian Baetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay:
Misuse Attacks on Post-Quantum Cryptosystems. 525 - Cas Cremers, Dennis Jackson:
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman. 526 - Olamide Omolola, Paul Plessing:
Revisiting Privacy-aware Blockchain Public Key Infrastructure. 527 - Xavier Bonnetain, Léo Perrin, Shizhu Tian:
Anomalies and Vector Space Search: Tools for S-Box Reverse-Engineering. 528 - Pedro Branco, Manuel Goulão, Paulo Mateus:
UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions. 529 - Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad:
Speed-up of SCA attacks on 32-bit multiplications. 530 - Kaoru Kurosawa:
How to Correct Errors in Multi-Server PIR. 531 - Carsten Baum, Ariel Nof:
Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography. 532 - Percy Deift, Stephen D. Miller, Thomas Trogdon:
Stopping time signatures for some algorithms in cryptography. 533 - Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Theoretical and Practical Approaches for Hardness Amplification of PUFs. 534 - Hwajeong Seo, Amir Jalali, Reza Azarderakhsh:
SIKE Round 2 Speed Record on ARM Cortex-M4. 535 - Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Florian Mendel, Robert Primas:
Protecting against Statistical Ineffective Fault Attacks. 536 - Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Victor Mollimard:
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks. 537 - Nikolay Shenets:
On Perfect Endomorphic Ciphers. 538 - Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD. 539 - Markku-Juhani O. Saarinen:
A chosen key attack against the secret S-boxes of GOST. 540 - James M. Shook, Scott Simon, Peter Mell:
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement. 541 - Jonathan Protzenko, Benjamin Beurdouche, Denis Merigoux, Karthikeyan Bhargavan:
Formally Verified Cryptographic Web Applications in WebAssembly. 542 - John Kelsey, Dana Dachman-Soled, Sweta Mishra, Meltem Sönmez Turan:
TMPS: Ticket-Mediated Password Strengthening. 543 - Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto:
Evaluation of Code-based Signature Schemes. 544 - (Withdrawn) Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers. 545
- David Cerezo Sánchez:
Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies. 546 - Chloé Hébant, Duong Hieu Phan, David Pointcheval:
Linearly-Homomorphic Signatures and Scalable Mix-Nets. 547 - Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich:
About Wave Implementation and its Leakage Immunity. 548 - Arka Rai Choudhuri, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum:
Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir. 549 - Srinath T. V. Setty:
Spartan: Efficient and general-purpose zkSNARKs without trusted setup. 550 - Emil Simion, Paul Burciu:
A note on the correlations between NIST cryptographic statistical tests suite. 551 - Binyi Chen, Yilei Chen, Kristina Hostáková, Pratyay Mukherjee:
Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space. 552 - John Gregory Underhill, Stiepan Aurélien Kovac, Xenia Bogomolec:
Towards post-quantum symmetric cryptography. 553 - Yu Long Chen, Eran Lambooij, Bart Mennink:
How to Build Pseudorandom Functions From Public Random Permutations. 554 - Georgios Fotiadis, Chloe Martindale:
Optimal TNFS-secure pairings on elliptic curves with composite embedding degree. 555 - Gideon Samid:
When Encryption is Not Enough - Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop). 556 - Xiaopeng Zhao, Jinwen Zheng, Nanyuan Cao, Zhenfu Cao, Xiaolei Dong:
Identity-Based Encryption from e-th Power Residue Symbols. 557 - Chloe Martindale, Lorenz Panny:
How to not break SIDH. 558 - Evgeny K. Alekseev, Lyudmila A. Kushchinskaya:
Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables. 559 - Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee, Dae Song Go, Sihem Mesnager:
Solutions of xqk+...+xq+x=a in GF(2n). 560 - Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang:
Faster Bootstrapping of FHE over the integers with large prime message space. 561 - Shahram Khazaei, Mojtaba Rafiee:
Multi-Adjustable Join Scheme. 562 - Omer Shlomovits, István András Seres:
ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA. 563 - Sujit Kumar Muduli, Pramod Subramanyan, Sayak Ray:
Verification of Authenticated Firmware Load. 564 - Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart:
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption. 565 - Pranesh Santikellur, Aritra Bhattacharyay, Rajat Subhra Chakraborty:
Deep Learning based Model Building Attacks on Arbiter PUF Compositions. 566 - Xingye Lu, Man Ho Au, Zhenfei Zhang:
(Linkable) Ring Signature from Hash-Then-One-Way Signature. 567 - Debapriya Basu Roy, Debdeep Mukhopadhyay:
Post Quantum ECC on FPGA Platform. 568 - Wilson Abel Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng:
Lattice RingCT v2.0 with Multiple Input and Output Wallets. 569 - Daan van der Valk, Stjepan Picek:
Bias-variance Decomposition in Machine Learning-based Side-channel Analysis. 570 - Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková:
Multi-Party Virtual State Channels. 571 - Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento:
On the Commitment Capacity of Unfair Noisy Channels. 572 - Christoph Dobraunig, Bart Mennink:
Security of the Suffix Keyed Sponge. 573 - Herman Galteland, Kristian Gjøsteen:
Subliminal channels in post-quantum digital signature schemes. 574 - Amir Jafari, Shahram Khazaei:
On Abelian Secret Sharing: duality and separation. 575 - Reza Kaboli, Shahram Khazaei, Maghsoud Parviz:
Group-homomorphic Secret Sharing Schemes Are Group-characterizable with Normal Subgroups. 576 - Deevashwer Rathee, Thomas Schneider, K. K. Shukla:
Improved Multiplication Triple Generation over Rings via RLWE-based AHE. 577 - Houssem Maghrebi:
Deep Learning based Side Channel Attacks in Practice. 578 - Dominic Letz:
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices. 579 - Russell W. F. Lai, Viktoria Ronge, Tim Ruffing, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Jiafan Wang:
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs. 580 - (Withdrawn) On relaxed security notions for secret sharing. 581
- Ran Canetti, Alley Stoughton, Mayank Varia:
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security. 582 - Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei:
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. 583 - (Withdrawn) 2-threshold Ideal Secret Sharing Schemes Can Be Uniquely Modeled by Latin Squares. 584
- Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay:
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners. 585 - Jihye Kim, Jiwon Lee, Hyunok Oh:
QAP-based Simulation-Extractable SNARK with a Single Verification. 586 - Pierre Civit, Seth Gilbert, Vincent Gramoli:
Polygraph: Accountable Byzantine Agreement. 587 - Jakub Klemsa, Ivana Trummová:
Formal Notions of Security for Verifiable Homomorphic Encryption. 588 - Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei:
A2L: Anonymous Atomic Locks for Scalability and Interoperability in Payment Channel Hubs. 589 - Nina Bindel, Mike Hamburg, Andreas Hülsing, Edoardo Persichetti:
Tighter proofs of CCA security in the quantum random oracle model. 590 - Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev:
Simulating Homomorphic Evaluation of Deep Learning Predictions. 591 - Andrei Mogage, Emil Simion:
Statistical Analysis and Anonymity of TOR's Path Selection. 592 - Vasyl Ustimenko, Michal Klisowski:
On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces. 593 - Mugurel Barcau, Vicentiu Pasol:
Cryptanalysis of Ring Homomorphic Encryption Schemes. 594 - Pedro Moreno-Sanchez, RandomRun, Duc Viet Le, Sarang Noether, Brandon Goodell, Aniket Kate:
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero. 595 - Sean Murphy, Rachel Player:
Discretisation and Product Distributions in Ring-LWE. 596 - Shahram Khazaei:
A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio. 597 - (Withdrawn) Partial Secret Sharing. 598
- Ivan Damgård, Daniel Escudero, Tore Kasper Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev:
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning. 599 - Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. 600 - Ariel Gabizon:
Improved prover efficiency and SRS size in a Sonic-like system. 601 - Gianluca Brian, Antonio Faonio, Daniele Venturi:
Continuously Non-Malleable Secret Sharing for General Access Structures. 602 - Yael Kalai, Omer Paneth, Lisa Yang:
How to Delegate Computations Publicly. 603 - Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan:
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. 604 - Mihail Anghel, Andrei Racautanu:
A note on different types of ransomware attacks. 605 - François Gérard, Mélissa Rossi:
An Efficient and Provable Masked Implementation of qTESLA. 606 - Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang:
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes. 607 - Navid Alamati, Hart Montgomery, Sikhar Patranabis:
Symmetric Primitives with Structured Secrets. 608 - Fuyuki Kitagawa, Takahiro Matsuda:
CPA-to-CCA Transformation for KDM Security. 609 - Jean-Sébastien Coron, Agnese Gini:
Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem. 610 - Thaddeus Dryja:
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set. 611 - Helger Lipmaa:
Simple Yet Efficient Knowledge-Sound and Non-Black-Box Any-Simulation-Extractable ZK-SNARKs. 612 - Taha Atahan Akyildiz, Can Berk Guzgeren, Cemal Yilmaz, Erkay Savas:
MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks. 613 - Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks without Superposition Queries: the Offline Simon Algorithm. 614 - Siemen Dhooghe, Svetla Nikova:
My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks. 615 - Iftach Haitner, Noam Mazor, Ronen Shaltiel, Jad Silbak:
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation. 616 - Sebastian Gajek, Marco Lewandowsky:
Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model. 617 - Fukang Liu, Takanori Isobe:
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods. 618 - Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass:
Continuous Verifiable Delay Functions. 619 - Steven D. Galbraith, Lukas Zobernig:
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems. 620 - Bruce Kallick:
A Modified Simple Substitution Cipher With Unbounded Unicity Distance. 621 - Zhenzhen Bao, Jian Guo, Eik List:
Extended Expectation Cryptanalysis on Round-reduced AES. 622 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Exploring Constructions of Compact NIZKs from Various Assumptions. 623 - Mihir Bellare, Ruth Ng, Björn Tackmann:
Nonces are Noticed: AEAD Revisited. 624 - Rio LaVigne, Andrea Lincoln, Virginia Vassilevska Williams:
Public-Key Cryptography in the Fine-Grained Setting. 625 - Vipul Goyal, Aayush Jain, Amit Sahai:
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge. 626 - Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan:
Unconditionally Secure Computation Against Low-Complexity Leakage. 627 - Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu:
Watermarking Public-Key Cryptographic Primitives. 628 - Shweta Agrawal, Monosij Maitra, Shota Yamada:
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE. 629 - Junqing Gong, Brent Waters, Hoeteck Wee:
ABE for DFA from k-Lin. 630 - Cody Freitag, Ilan Komargodski, Rafael Pass:
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge. 631 - Ariel Hamlin, Justin Holmgren, Mor Weiss, Daniel Wichs:
On the Plausibility of Fully Homomorphic Encryption for RAMs. 632 - Igor A. Semaev:
New non-linearity parameters of Boolean functions. 633 - Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai:
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension. 634 - Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan:
Homomorphic Time-Lock Puzzles and Applications. 635 - Rishab Goyal, Willy Quach, Brent Waters, Daniel Wichs:
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions. 636 - Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptographic Sensing. 637 - Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica:
On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography. 638 - Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky:
Trapdoor Hash Functions and Their Applications. 639 - Nir Bitansky, Omer Paneth:
On Round Optimal Statistical Zero Knowledge Arguments. 640 - Shahla Atapoor, Karim Baghery:
Simulation Extractability in Groth's zk-SNARK. 641 - Jonathan Bootle, Vadim Lyubashevsky, Gregor Seiler:
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs. 642 - Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. 643 - Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas:
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-. 644 - Shweta Agrawal, Monosij Maitra, Shota Yamada:
Attribute Based Encryption for Deterministic Finite Automata from DLIN. 645 - Vipul Goyal, Yanyi Liu, Yifan Song:
Communication-Efficient Unconditional MPC with Guaranteed Output Delivery. 646 - Tatiana Bradley, Stanislaw Jarecki, Jiayu Xu:
Strong Asymmetric PAKE based on Trapdoor CKEM. 647 - Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan:
Efficient Invisible and Unlinkable Sanitizable Signatures. 648 - Donghui Ding, Xin Jiang, Jiaping Wang, Hao Wang, Xiaobing Zhang, Yi Sun:
Txilm: Lossy Block Compression with Salted Short Hashing. 649 - Nico Döttling, Russell W. F. Lai, Giulio Malavolta:
Incremental Proofs of Sequential Work. 650 - Muhammad Ishaq, Ana L. Milanova, Vassilis Zikas:
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing. 651 - Navid Ghaedi Bardeh, Sondre Rønjom:
The Exchange Attack: How to Distinguish 6 Rounds of AES with 288.2 chosen plaintexts. 652 - Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin:
On the Local Leakage Resilience of Linear Secret Sharing Schemes. 653 - Brandon Goodell, Sarang Noether, Arthur Blue:
Compact linkable ring signatures and applications. 654 - Daniel J. Bernstein:
Visualizing size-security tradeoffs for lattice-based encryption. 655 - (Withdrawn) SeqL: SAT-attack Resilient Sequential Locking. 656
- Leonard Assouline, Tianren Liu:
Multi-Party PSM, Revisited. 657 - Jun Furukawa, Yehuda Lindell:
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest. 658 - Nico Döttling, Sanjam Garg, Giulio Malavolta, Prashant Nalini Vasudevan:
Tight Verifiable Delay Functions. 659 - Zheng Wang, Cong Ling:
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling. 660 - Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. 661 - Christian Badertscher, Daniel Jost, Ueli Maurer:
Agree-and-Prove: Generalized Proofs Of Knowledge and Applications. 662 - Mohammad Mahmoody, Caleb Smith, David J. Wu:
A Note on the (Im)possibility of Verifiable Delay Functions in the Random Oracle Model. 663 - Huanyu Wang, Martin Brisfors, Sebastian Forsmark, Elena Dubrova:
How Diversity Affects Deep-Learning Side-Channel Attacks. 664 - Jintai Ding, Pedro Branco, Kevin Schmitt:
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption. 665 - Zheng Wang, Cong Ling:
On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling. 666 - Arka Rai Choudhuri, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum:
PPAD-Hardness via Iterated Squaring Modulo a Composite. 667 - Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. 668 - Yunwen Liu, Yu Sasaki:
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. 669 - Vahid Amin Ghafari, Honggang Hu, Fujiang Lin:
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks. 670 - Ahto Buldas, Risto Laanoja, Ahto Truu:
A Server-Assisted Hash-Based Signature Scheme. 671 - Ahto Buldas, Risto Laanoja, Ahto Truu:
A Blockchain-Assisted Hash-Based Signature Scheme. 672 - Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu:
A New Approach to Constructing Digital Signature Schemes (Extended Paper). 673 - Jiabo Wang, Cong Ling:
Polar Sampler: Discrete Gaussian Sampling over the Integers Using Polar Codes. 674 - Dominik Harz, Lewis Gudgeon, Arthur Gervais, William J. Knottenbelt:
Balance : Dynamic Adjustment of Cryptocurrency Deposits. 675 - Eleftherios Kokoris-Kogias:
Robust and Scalable Consensus for Sharded Distributed Ledgers. 676 - Mingjia Huo, Kewen Wu, Qi Ye:
A Note on Lower Digits Extraction Polynomial for Bootstrapping. 677 - Yongwoo Lee, Wijik Lee, Young-Sik Kim, Jong-Seon No:
A Modified pqsigRM: RM Code-Based Signature Scheme. 678 - Maria Eichlseder, Daniel Kales, Markus Schofnegger:
Forgery Attacks on FlexAE and FlexAEAD. 679 - Charles Grover, Cong Ling:
Structured Module Learning With Errors From Cyclic Algebras. 680 - Ayesha Khalid, Sarah McCarthy, Weiqiang Liu, Máire O'Neill:
Lattice-based Cryptography for IoT in A Quantum World: Are We Ready? 681 - Alexandros Bakas, Antonis Michalas:
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX. 682 - Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin:
The Notion of Transparency Order, Revisited. 683 - Arijit Dutta, Saravanan Vijayakumaran:
Revelio: A MimbleWimble Proof of Reserves Protocol. 684 - Markku-Juhani O. Saarinen:
Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5. 685 - Nir Bitansky, Akshay Degwekar:
On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations. 686 - Zhengfeng Ji, Youming Qiao, Fang Song, Aaram Yun:
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography. 687 - Kyoohyung Han, Dohyeong Ki:
Better Bootstrapping for Approximate Homomorphic Encryption. 688 - Colin O'Flynn, Alex Dewar:
On-Device Power Analysis Across Hardware Security Domains. 689 - Changhai Ou, Siew-Kei Lam, Guiyuan Jiang:
The Art of Guessing in Combined Side-Channel Collision Attacks. 690 - Daniel J. Bernstein:
Comparing proofs of security for lattice-based encryption. 691 - Erica Blum, Jonathan Katz, Julian Loss:
Synchronous Consensus with Optimal Asynchronous Fallback Guarantees. 692 - Raphael Bost, Pierre-Alain Fouque:
Security-Efficiency Tradeoffs in Searchable Encryption - Lower Bounds and Optimal Constructions. 693 - Daniel Jost, Ueli Maurer, Marta Mularczyk:
A Unified and Composable Take on Ratcheting. 694 - Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Naoto Kiribuchi, Benny Pinkas:
An Efficient Secure Three-Party Sorting Protocol with an Honest Majority. 695 - Masayuki Abe, Miguel Ambrona, Miyako Ohkubo:
Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments. 696 - Elena Dubrova:
Breaking ACORN with a Single Fault. 697 - Poulami Das, Sebastian Faust, Julian Loss:
A Formal Treatment of Deterministic Wallets. 698 - André Chailloux:
Quantum security of the Fiat-Shamir transform of commit and open protocols. 699 - Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara, Daisuke Suzuki:
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. 700 - Hiroaki Anada:
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs. 701 - Subhadeep Banik, Khashayar Barooti, Takanori Isobe:
Cryptanalysis of Plantlet. 702 - Carolyn Whitnall, Elisabeth Oswald:
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation. 703 - Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese:
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains. 704 - Ivan Damgård, Helene Haagh, Michael Nielsen, Claudio Orlandi:
Commodity-Based 2PC for Arithmetic Circuits. 705 - Daniel Masny, Peter Rindal:
Endemic Oblivious Transfer. 706 - Olivier Blazy, Céline Chevalier, Quoc-Huy Vu:
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions. 707 - Luís T. A. N. Brandão, Çagdas Çalik, Meltem Sönmez Turan, René Peralta:
Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions. 708 - Davood Rezaeipour:
Secure Computation for Cloud data Storage. 709 - (Withdrawn) A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0. 710
- Brian Koziel, A.-Bon E. Ackie, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari Kermani:
SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation. 711 - Shay Gueron, Yehuda Lindell:
SimpleENC and SimpleENCsmall - an Authenticated Encryption Mode for the Lightweight Setting. 712 - Riccardo Longo, Massimiliano Sala:
Public Ledger for Sensitive Data. 713 - Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang:
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule. 714 - Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang:
On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage. 715 - Koen de Boer, Léo Ducas, Serge Fehr:
On the Quantum Complexity of the Continuous Hidden Subgroup Problem. 716 - Christopher Leonardi, Luis Ruiz-Lopez:
Homomorphism learning problems and its applications to public-key cryptography. 717 - Marina Blanton, Ah Reum Kang, Chen Yuan:
Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority. 718 - (Withdrawn) The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes. 719
- Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta:
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles. 720 - Hwajeong Seo, Amir Jalali, Reza Azarderakhsh:
Optimized SIKE Round 2 on 64-bit ARM. 721 - Guilherme Perin, Baris Ege, Lukasz Chmielewski:
Neural Network Model Assessment for Side-Channel Analysis. 722 - Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Mariana Raykova, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung:
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications. 723 - Sebati Ghosh, Palash Sarkar:
Breaking Tweakable Enciphering Schemes using Simon's Algorithm. 724 - Chris Peikert:
He Gives C-Sieves on the CSIDH. 725 - Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus:
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange. 726 - Fukang Liu, Takanori Isobe:
Iterative Differential Characteristic of TRIFLE-BC. 727 - Palash Sarkar, Subhadip Singha:
Verifying Solutions to LWE with Implications for Concrete Security. 728 - Jingwei Zhang, Shuhong Gao, Chang-An Zhao:
Linear Complexity of A Family of Binary pq2 -periodic Sequences From Euler Quotients. 729 - Vladimir Soukharev, Basil Hess:
PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH. 730 - Javier A. Verbel, John Baena, Daniel Cabarcas, Ray A. Perlner, Daniel Smith-Tone:
On the Complexity of "Superdetermined" Minrank Instances. 731 - Prabhanjan Ananth, Apoorvaa Deshpande, Yael Tauman Kalai, Anna Lysyanskaya:
Fully Homomorphic NIZK and NIWI Proofs. 732 - Craig Gentry, Shai Halevi:
Compressible FHE with Applications to PIR. 733 - Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia:
From Usability to Secure Computing and Back Again. 734 - Mayank Raikwar, Danilo Gligoroski, Katina Kralevska:
SoK of Used Cryptography in Blockchain. 735 - Hao Chen, Ilaria Chillotti, Ling Ren:
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE. 736 - Katriel Cohn-Gordon, Cas Cremers, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager:
Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling real-world deployments with theoretically sound parameters. 737 - (Withdrawn) Scrutinizing the Tower Field Implementation of the 픽28 Inverter - with Applications to AES, Camellia, and SM4. 738
- Elif Bilge Kavun, Hristina Mihajloska, Tolga Yalçin:
A Survey on Authenticated Encryption - ASIC Designer's Perspective. 739 - Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak:
A Secure Publish/Subscribe Protocol for Internet of Things. 740 - Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, Nasour Bagheri:
Comprehensive security analysis of CRAFT. 741 - William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps:
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling. 742 - Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang:
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature. 743 - Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Devin Reich, Ariel Todoki:
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection. 744 - Vincenzo Iovino:
Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation. 745 - James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova:
Public-Key Function-Private Hidden Vector Encryption (and More). 746 - Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte:
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. 747 - Fredrik Winzer, Benjamin Herd, Sebastian Faust:
Temporary Censorship Attacks in the Presence of Rational Miners. 748 - Ghada Arfaoui, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete:
The privacy of the TLS 1.3 protocol. 749 - Sondre Rønjom:
A Short Note on a Weight Probability Distribution Related to SPNs. 750 - Thorsten Kleinjung, Benjamin Wesolowski:
Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic. 751 - Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph K. Liu, Shiping Chen:
Sucker punch makes you richer: Rethinking Proof-of-Work security model. 752 - Subhra Mazumdar, Sushmita Ruj:
Design of Anonymous Endorsement System in Hyperledger Fabric. 753 - Rafael Pass, Muthuramakrishnan Venkitasubramaniam:
A Round-Collapse Theorem for Computationally-Sound Protocols; or, TFNP is Hard (on Average) in Pessiland. 754 - Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang:
Generic Attacks on Hash Combiners. 755 - Pantea Kiaei, Darius Mercadier, Pierre-Évariste Dagand, Karine Heydemann, Patrick Schaumont:
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures. 756 - Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cédric Fournet, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph M. Wintersteiger, Santiago Zanella Béguelin:
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider. 757 - Ramsès Fernàndez-València:
Genus 2 Supersingular Isogeny Oblivious Transfer. 758 - Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer:
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems. 759 - Amit Jana, Dhiman Saha, Goutam Paul:
Differential Fault Analysis of NORX. 760 - Ben Smyth:
Athena: A verifiable, coercion-resistant voting system with linear complexity. 761 - Shuo Chen, Jung Hee Cheon, Dongwoo Kim, Daejun Park:
Verifiable Computing for Approximate Computation. 762 - Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma:
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80. 763 - Omri Ben-Eliezer, Eylon Yogev:
The Adversarial Robustness of Sampling. 764 - Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya:
SPQCop: Side-channel protected Post-Quantum Cryptoprocessor. 765 - Maciej Obremski, Maciej Skorski:
Complexity of Estimating Renyi Entropy of Markov Chains. 766 - Jaeseong Jeong, Chang Heon Kim, Namhun Koo, Soonhak Kwon, Sumin Lee:
On cryptographic parameters of permutation polynomials of the form xrh(x(q-1)/d). 767 - Nigel P. Smart, Younes Talibi Alaoui:
Distributing any Elliptic Curve Based Protocol: With an Application to MixNets. 768 - Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin:
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates. 769 - Navid Ghaedi Bardeh, Sondre Rønjom:
Practical Attacks on Reduced-Round AES. 770 - Duc-Phong Le, Guomin Yang, Ali A. Ghorbani:
DDH-based Multisignatures with Public Key Aggregation. 771 - Lorenzo Grassi, Markus Schofnegger:
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box. 772 - Frank Blom, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede:
Efficient Secure Ridge Regression from Randomized Gaussian Elimination. 773 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Tamalika Mukherjee:
Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness. 774 - Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. 775 - Vladimir Kolesnikov, Mike Rosulek, Ni Trieu, Xiao Wang:
Scalable Private Set Union from Symmetric-Key Techniques. 776 - Jörg Schwenk, Douglas Stebila:
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos. 777 - Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos:
A Composable Security Treatment of the Lightning Network. 778 - Dennis Jackson, Cas Cremers, Katriel Cohn-Gordon, Ralf Sasse:
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures. 779 - Saikrishna Badrinarayanan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai:
Statistical ZAP Arguments. 780 - Cyprien Delpech de Saint Guilhem, Lauren De Meyer, Emmanuela Orsini, Nigel P. Smart:
BBQ: Using AES in Picnic Signatures. 781 - Antoine Joux, Cécile Pierrot:
Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms. 782 - Tobias Damm, Sven Freud, Dominik Klein:
Dissecting the CHES 2018 AES Challenge. 783 - Priyadarshi Singh, Abdul Basit, N. Chaitanya Kumar, V. Ch. Venkaiah:
Towards a Hybrid Public Key Infrastructure (PKI): A Review. 784 - Yalin Chen, Jue-Sam Chou, Liangchun Wang, Yu-Yuan Chou:
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography. 785 - Rebecca Schwerdt, Matthias Nagel, Valerie Fetzer, Tobias Gräf, Andy Rupp:
P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation. 786 - Jérôme Lablanche, Lina Mortajine, Othman Benchaalal, Pierre-Louis Cayrel, Nadia El Mrabet:
Optimized implementation of the NIST PQC submission ROLLO on microcontroller. 787 - Aanchal Malhotra, Willem Toorop, Benno J. Overeinder, Ralph Dolmans, Sharon Goldberg:
The Impact of Time on DNS Security. 788 - Diana Davidova, Lilya Budaghyan, Claude Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila:
Relation between o-equivalence and EA-equivalence for Niho bent functions. 789 - Wei Jiang, Adam Bowers, Dan Lin:
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication. 790 - Hao Chen:
Solving Ring-LWE over Algebraic Integer Rings. 791 - Wei Zhang, Jiangshan Yu, Qingqiang He, Nan Guan:
TICK: Tiny Client for Blockchains. 792 - Lilya Budaghyan, Marco Calderini, Irene Villa:
On equivalence between known families of quadratic APN functions. 793 - Ko Stoffelen:
Efficient Cryptography on the RISC-V Architecture. 794 - Peter Pessl, Robert Primas:
More Practical Single-Trace Attacks on the Number Theoretic Transform. 795 - Susanne Engels, Max Hoffmann, Christof Paar:
The End of Logic Locking? A Critical View on the Security of Logic Locking. 796 - Douglas Marcelino Beppler Martins, Gustavo Banegas, Ricardo Felipe Custódio:
Don't forget your roots: constant-time root finding over 픽2m. 797 - Kwangsu Lee:
A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods. 798 - Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, Benjamin Zengin:
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance. 799 - Claire Delaplace, Alexander May:
Can we Beat the Square Root Bound for ECDLP over Fp2 via Representations? 800 - Sheng Sun:
A Chosen Random Value Attack on WPA3 SAE authentication protocol. 801 - Alexander Maximov, Patrik Ekdahl:
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes. 802 - Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli:
Methodology for Efficient CNN Architectures in Profiling Attacks. 803 - Claire Delaplace, Andre Esser, Alexander May:
Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions. 804 - Saskia Nuñez von Voigt, Florian Tschorsch:
RRTxFM: Probabilistic Counting for Differentially Private Statistics. 805 - Eugene Pilyankevich, Dmytro Kornieiev, Artem Storozhuk:
Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes. 806 - Hemi Leibowitz, Amir Herzberg, Ewa Syta:
Provable Security for PKI Schemes. 807 - Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs:
2-Message Publicly Verifiable WI from (Subexponential) LWE. 808 - Yosuke Todo, Willi Meier, Kazumaro Aoki:
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet. 809 - Jeroen Delvaux:
Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs. 810 - Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre:
SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage. 811 - Chaoyun Li, Bart Preneel:
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree. 812 - Alexandros Bakas, Antonis Michalas:
Multi-Client Symmetric Searchable Encryption with Forward Privacy. 813 - Sean Bowe:
Faster Subgroup Checks for BLS12-381. 814 - (Withdrawn) A Note on the Static-Static Key Agreement Protocol from Supersingular Isogenies. 815
- Mirco Richter:
Crisis: Probabilistically Self Organizing Total Order in Unstructured P2P Networks. 816 - Tapas Pal, Ratna Dutta:
Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions. 817 - Debayan Das, Anupam Golder, Josef Danial, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen:
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack. 818 - Asma Aloufi, Peizhao Hu, Harry W. H. Wong, Sherman S. M. Chow:
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption. 819 - Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow:
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query. 820 - Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Towards Forward Secure Internet Traffic. 821 - Ben Smyth:
Surveying definitions of coercion resistance. 822 - Jeffrey Champion, Abhi Shelat, Jonathan R. Ullman:
Securely Sampling Biased Coins with Applications to Differential Privacy. 823 - Behnaz Rezvani, William Diehl:
Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look. 824 - Takanori Isobe, Kazuhiko Minematsu:
Plaintext Recovery Attacks against XTS Beyond Collisions. 825 - Erdinç Öztürk:
Modular Multiplication Algorithm Suitable For Low-Latency Circuit Implementations. 826 - Zvi Schreiber:
k-root-n: An efficient O(√n) algorithm for avoiding short term double spending in Distributed Ledger Technologies such as Blockchain. 827 - Cezary Glowacz, Vincent Grosso:
Optimal Collision Side-Channel Attacks. 828 - Billy Bob Brumley, Sohaib ul Hassan, Alex Shaindlin, Nicola Tuveri, Kide Vuojärvi:
Batch Binary Weierstrass. 829 - Diego F. Aranha, Elena Pagnin:
The Simplest Multi-key Linearly Homomorphic Signature Scheme. 830 - Cristian Hristea, Ferucio Laurentiu Tiplea:
Privacy of Stateful RFID Systems with Constant Tag Identifiers. 831 - Ronald Cramer, Matthieu Rambaud, Chaoping Xing:
Asymptotically-Good Arithmetic Secret Sharing over Z/(p^\ell Z) with Strong Multiplication and Its Applications to Efficient MPC. 832 - Alexander Maximov:
AES MixColumn with 92 XOR gates. 833 - Alessandro Chiesa, Peter Manohar, Nicholas Spooner:
Succinct Arguments in the Quantum Random Oracle Model. 834 - Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun:
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts. 835 - Markus Brandt, Claudio Orlandi, Kris Shrishak, Haya Schulmann:
Optimizing Transport Layer for Secure Computation. 836 - Daniel Cervantes-Vázquez, Mathilde Chenu, Jesús-Javier Chi-Domínguez, Luca De Feo, Francisco Rodríguez-Henríquez, Benjamin Smith:
Stronger and Faster Side-Channel Protections for CSIDH. 837 - Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake. 838 - Abhishek Jain, Zhengzhong Jin:
Statistical Zap Arguments from Quasi-Polynomial LWE. 839 - Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida:
A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function to TPMS. 840 - Daniel Smith-Tone:
Practical Cryptanalysis of k-ary C. 841 - Sreyosi Bhattacharyya, Palash Sarkar:
Improved SIMD Implementation of Poly1305. 842 - Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi:
How to Construct CSIDH on Edwards Curves. 843 - Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe, Ko Stoffelen:
pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4. 844 - Simona Samardjiska, Paolo Santini, Edoardo Persichetti, Gustavo Banegas:
A Reaction Attack against Cryptosystems based on LRPC Codes. 845 - Yuechen Chen, Linru Zhang, Siu-Ming Yiu:
Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions. 846 - Quan Quan Tan, Thomas Peyrin:
Improved Heuristics for Short Linear Programs. 847 - Anne Canteaut, Lukas Kölsch, Friedrich Wiemer:
Observations on the DLCT and Absolute Indicators. 848 - Ambili K. N, Jimmy Jose:
Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems. 849 - Morteza Adeli, Nasour Bagheri:
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles. 850 - Masoumeh Safkhani, Ygal Bendavid, Samad Rostampour, Nasour Bagheri:
On Designing Lightweight RFID Security Protocols for Medical IoT. 851 - Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer:
Weak-Key Subspace Trails and Applications to AES. 852 - Ashley Fraser, Elizabeth A. Quaglia, Ben Smyth:
A critique of game-based definitions of receipt-freeness for voting. 853 - Brandon Langenberg, Hai Pham, Rainer Steinwandt:
Reducing the Cost of Implementing AES as a Quantum Circuit. 854 - Dominic Dams, Jeff Lataille, Rino Sanchez, John Wade:
WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery. 855 - Subhadeep Banik, Yuki Funabiki, Takanori Isobe:
More results on Shortest Linear Programs. 856 - Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun:
Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies. 857 - Eric Crockett, Christian Paquin, Douglas Stebila:
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. 858 - Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe:
A Coin-Free Oracle-Based Augmented Black Box Framework. 859 - Yongbo Hu, Yeyang Zheng, Pengwei Feng, Lirui Liu, Chen Zhang, Aron Gohr, Sven Jacob, Werner Schindler, Ileana Buhan, Karim Tobich:
Machine learning and side channel analysis in a CTF competition. 860 - Gabrielle De Micheli, Rémi Piau, Cécile Pierrot:
A Tale of Three Signatures: practical attack of ECDSA with wNAF. 861 - Dmitry Khovratovich:
Key recovery attacks on the Legendre PRFs within the birthday bound. 862 - Megha Byali, Carmit Hazay, Arpita Patra, Swati Singla:
Fast Actively Secure Five-Party Computation with Security Beyond Abort. 863 - (Withdrawn) Another Look at Byzantine Fault Tolerance. 864
- Le He, Hongbo Yu:
Cryptanalysis of Reduced-Round SipHash. 865 - Lichao Wu, Gerard Ribera, Stjepan Picek:
A Fast Characterization Method for Optical Fault Injection. 866 - Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki:
A Practical Forgery Attack on Lilliput-AE. 867 - Ran Cohen, Iftach Haitner, Nikolaos Makriyannis, Matan Orland, Alex Samorodnitsky:
On the Round Complexity of Randomized Byzantine Agreement. 868 - Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun:
ProtectIOn: Root-of-Trust for IO in Compromised Platforms. 869 - Marc Joye, Oleksandra Lapiha, Ky Nguyen, David Naccache:
The Eleventh Power Residue Symbol. 870 - Claude Crépeau, Nan Yang:
Non-Locality and Zero-Knowledge MIPs. 871 - Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Chen Yuan:
Efficient Information-Theoretic Secure Multiparty Computation over ℤ/pk ℤ via Galois Rings. 872 - Shashi Kant Pandey, Prasanna Raghaw Mishra:
Count of rotational symmetric bent Boolean functions. 873 - Fei Meng, Mingqiang Wang:
ABFKS: Attribute-Based Encryption with Functional Keyword Search in Fog Computing. 874 - Daan Leermakers, Boris Skoric:
Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication. 875 - Elias Rohrer, Florian Tschorsch:
Kadcast: A Structured Approach to Broadcast in Blockchain Networks. 876 - Georg Fuchsbauer, Antoine Plouviez, Yannick Seurin:
Blind Schnorr Signatures in the Algebraic Group Model. 877 - Chris Peikert, Zachary Pepin:
Algebraically Structured LWE, Revisited. 878 - Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Subterranean-SAE. 879 - Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li:
A Blockchain-Based Access Control Scheme for Smart Grids. 880 - Marco Calderini, Irene Villa:
On the Boomerang Uniformity of some Permutation Polynomials. 881 - Any Muanalifah, Sergei Sergeev:
Modifying The Tropical Version of Stickel's Key Exchange Protocol. 882 - Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Rahul Mahadev, Aniket Kate, Andrew Miller:
HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication. 883 - Mahesh Sreekumar Rajasree:
Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures. 884 - Aurore Guillevic, Shashank Singh:
On the alpha value of polynomials in the tower number field sieve algorithm. 885 - T.-H. Hubert Chan, Rafael Pass, Elaine Shi:
Round Complexity of Byzantine Agreement, Revisited. 886 - Paul Bottinelli, Robert Lambert:
Accelerating V2X Cryptography through Batch Operations. 887 - Mustafa Khairallah:
Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed. 888 - Anders P. K. Dalskov, Marcel Keller, Claudio Orlandi, Kris Shrishak, Haya Schulmann:
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC. 889 - Samuel Dobson, Steven D. Galbraith, Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig:
Extending the Adaptive Attack to 2-SIDH. 890 - Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti:
The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking Blockchains. 891 - Patrick Kresmer, Alexander Zeh:
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption. 892 - Thomas Pornin:
New Efficient, Constant-Time Implementations of Falcon. 893 - Fatih Balli, F. Betül Durak, Serge Vaudenay:
BioID: a Privacy-Friendly Identity Document. 894 - Jintai Ding, Zheng Zhang, Joshua Deaton, Vishakha:
The Singularity Attack to the Multivariate Signature Scheme Himq-3. 895 - Runchao Han, Haoyu Lin, Jiangshan Yu:
On the optionality and fairness of Atomic Swaps. 896 - Vasyl Ustimenko:
On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem. 897 - Mehdi Tibouchi, Alexandre Wallet:
One Bit is All It Takes: A Devastating Timing Attack on BLISS's Non-Constant Time Sign Flips. 898 - Michael Yonli:
A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P. 899 - (Withdrawn) Multi-client Secure Encrypted Search Using Searching Adversarial Networks. 900
- Thomas Haines, Clémentine Gritti:
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs. 901 - Gérald Gavin, Stéphane Bonnevay:
Fractional LWE: a nonlinear variant of LWE. 902 - Igor Semaev, Andrea Tenti:
Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases. 903 - Gwangbae Choi, Serge Vaudenay:
Timed-Release Encryption With Master Time Bound Key (Full Version). 904 - (Withdrawn) The Power of NIST Cryptographic Tests Suite. 905
- Rafael J. Cruz, Antonio Guimarães, Diego de Freitas Aranha:
Efficient and secure software implementations of Fantomas. 906 - Raghvendra Rohit, Guang Gong:
Practical Forgery Attacks on Limdolen and HERN. 907 - Benoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu:
Simulation-Sound Proofs for LWE and Applications to KDM-CCA2 Security. 908 - Guillaume Wafo-Tapa, Slim Bettaieb, Loïc Bidoux, Philippe Gaborit:
A Practicable Timing Attack Against HQC and its Countermeasure. 909 - Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu:
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto. 910 - Gildas Avoine, Sébastien Canard, Loïc Ferreira:
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography. 911 - David Derler, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks:
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting. 912 - Wen-Ran Zhang:
Information Conservational Security with "Black Hole" Keypad Compression and Scalable One-Time Pad - A Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography. 913 - Fabio Banfi, Ueli Maurer, Christopher Portmann, Jiamin Zhu:
Composable and Finite Computational Security of Quantum Message Transmission. 914 - Lynn Margaret Batten, Hugh Cowie Williams:
Unique Rabin-Williams Signature Scheme Decryption. 915 - (Withdrawn) Multi-owner Secure Encrypted Search Using Searching Adversarial Networks. 916
- Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li:
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices. 917 - Hai Zhou, Amin Rezaei, Yuanqi Shen:
Resolving the Trilemma in Logic Encryption. 918 - Wei Cheng, Claude Carlet, Kouassi Goli, Sylvain Guilley, Jean-Luc Danger:
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection. 919 - Raluca Posteuca:
Related-Key Differential Slide Attack Against Fountain V1. 920 - Pavol Zajac:
Tree authenticated ephemeral keys. 921 - Karim Eldefrawy, Vitor Pereira:
A High-Assurance, Automatically-Synthesized, Evaluator for Machine-Checked (Proactively) Secure Multi-Party Computation. 922 - Bastian Richter, Alexander Wild, Amir Moradi:
Automated Probe Repositioning for On-Die EM Measurements. 923 - Dirk Achenbach, Roland Gröll, Timon Hackenjos, Alexander Koch, Bernhard Löwe, Jeremias Mechler, Jörn Müller-Quade, Jochen Rill:
Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework. 924 - Wulu Li, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin:
Traceable and linkable ring signatures, traceable range proofs and applications on regulatable privacy-preserving blockchains. 925 - Gilles Barthe, Sandrine Blazy, Benjamin Grégoire, Rémi Hutin, Vincent Laporte, David Pichardie, Alix Trieu:
Formal Verification of a Constant-Time Preserving C Compiler. 926 - Lorenz Panny:
Isogeny-based hashing despite known endomorphisms. 927 - Fatemeh Ganji, Shahin Tajik, Domenic Forte, Jean-Pierre Seifert:
Blockchain-enabled Cryptographically-secure Hardware Obfuscation. 928 - Samuel Dobson, Steven D. Galbraith:
On the Degree-Insensitive SI-GDH problem and assumption. 929 - Yang Wang, Mingqiang Wang:
Module-LWE versus Ring-LWE, Revisited. 930 - Andre Esser, Alexander May:
Low Weight Discrete Logarithms and Subset Sum in 20.65n with Polynomial Memory. 931 - Muhammad ElSheikh, Amr M. Youssef:
Related-key Differential Cryptanalysis of Full Round CRAFT. 932 - Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen:
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy. 933 - Mohsin Khan, Kaisa Nyberg:
Linear Approximations of Random Functions and Permutations. 934 - (Withdrawn) Interpretable Encrypted Searchable Neural Networks. 935
- Markku-Juhani O. Saarinen:
SNEIK on Microcontrollers: AVR, ARMv7-M, and RISC-V with Custom Instructions. 936 - Sayandeep Saha, Debapriya Basu Roy, Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers. 937 - Gaëtan Leurent, Ferdinand Sibleyras:
Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem. 938 - Martin R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan:
Homomorphic Encryption Standard. 939 - Nasrollah Pakniat:
Security analysis of two lightweight certi ficateless signature schemes. 940 - Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Does "www." Mean Better Transport Layer Security? 941 - Handan Kilinç Alper:
Ouroboros Clepsydra: Ouroboros Praos in the Universally Composable Relative Time Model. 942 - Ling Ren:
Analysis of Nakamoto Consensus. 943 - Max Hoffmann, Michael Klooß, Andy Rupp:
Efficient zero-knowledge arguments in the discrete log setting, revisited. 944 - Navid Ghaedi Bardeh:
A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting. 945 - M. Sazadur Rahman, Adib Nahiyan, Sarah Amir, Fahim Rahman, Farimah Farahmandi, Domenic Forte, Mark M. Tehranipoor:
Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design. 946 - Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski:
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data. 947 - Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin:
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes. 948 - Yongha Son:
A Note on Parameter Choices of Round5. 949 - Simon-Philipp Merz, Romy M. Minko, Christophe Petit:
Another look at some isogeny hardness assumptions. 950 - Xavier Bonnetain:
Collisions on Feistel-MiMC and univariate GMiMC. 951 - Vincenzo Iovino, Ivan Visconti:
Non-Interactive Zero Knowledge Proofs in the Random Oracle Model. 952 - Ariel Gabizon, Zachary J. Williamson, Oana Ciobotaru:
PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge. 953 - Mohsen Jahanbani, Zeinolabedin Norouzi, Nasour Bagheri:
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme. 954 - Antonio Faonio, Dario Fiore, Javier Herranz, Carla Ràfols:
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications. 955 - Diego F. Aranha, Claudio Orlandi, Akira Takahashi, Greg Zaverucha:
Security of Hedged Fiat-Shamir Signatures under Fault Attacks. 956 - Nigel P. Smart, Titouan Tanguy:
TaaS: Commodity MPC via Triples-as-a-Service. 957 - Gabrielle Beck, Maximilian Zinkus, Matthew Green:
Using SMT Solvers to Automate Chosen Ciphertext Attacks. 958 - Seungkwang Lee, Myungchul Kim:
Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography. 959 - Subhabrata Samajder, Palash Sarkar:
Another Look at Key Randomisation Hypotheses. 960 - Christian Mouchet, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:
Computing across Trust Boundaries using Distributed Homomorphic Cryptography. 961 - Rishab Goyal, Satyanarayana Vusirikala, Brent Waters:
New Constructions of Hinting PRGs, OWFs with Encryption, and more. 962 - Pascal Aubry, Sergiu Carpov, Renaud Sirdey:
Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits. 963 - Georg Fuchsbauer:
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited. 964 - Andrea Caforio, F. Betül Durak, Serge Vaudenay:
On-Demand Ratcheting with Security Awareness. 965 - Junichi Tomida, Yuto Kawahara, Ryo Nishimaki:
Fast, Compact, and Expressive Attribute-Based Encryption. 966 - Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba:
On NIST's Compression Estimate Test. 967 - William Black, Ryan Henry:
There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero. 968 - Russell W. F. Lai, Giulio Malavolta, Viktoria Ronge:
Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography. 969 - (Withdrawn) Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol. 970
- Nadim Kobeissi:
Verifpal: Cryptographic Protocol Analysis for Students and Engineers. 971 - Wenping Ma:
Noninteractive Zero Knowledge Proof System for NP from Ring LWE. 972 - Ngoc Khanh Nguyen:
On the Non-Existence of Short Vectors in Random Module Lattices. 973 - Abdelrahaman Aly, Emmanuela Orsini, Dragos Rotaru, Nigel P. Smart, Tim Wood:
Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE. 974 - (Withdrawn) Ci-Lock: Cipher Induced Logic Locking Resistant Against SAT Attacks. 975
- Martin Zuber, Sergiu Carpov, Renaud Sirdey:
Towards real-time hidden speaker recognition by means of fully homomorphic encryption. 976 - Zhenbin Yan, Yi Deng:
Non-malleable Zero-Knowledge Arguments with Lower Round Complexity. 977 - Guilherme Perin:
Deep Learning Model Generalization in Side-Channel Analysis. 978 - Kalikinkar Mandal, Guang Gong:
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks. 979 - Rishab Goyal, Venkata Koppula, Brent Waters:
New Approaches to Traitor Tracing with Embedded Identities. 980 - Nirvan Tyagi, Ian Miers, Thomas Ristenpart:
Traceback for End-to-End Encrypted Messaging. 981 - Toi Tomita, Wakaha Ogata, Kaoru Kurosawa, Ryo Kuwayama:
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions. 982 - Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, Christof Paar:
Graph Similarity and Its Applications to Hardware Security. 983 - Sam Kim, David J. Wu:
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions. 984 - Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar R. Weippl:
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts. 985 - Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer:
Outpost: A Responsive Lightweight Watchtower. 986 - Marcel Armour, Bertram Poettering:
Subverting Decryption in AEAD. 987 - David W. Archer, José Manuel Calderón Trilla, Jason Dagit, Alex J. Malozemoff, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan:
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications. 988 - Marcel Armour, Bertram Poettering:
Substitution Attacks against Message Authentication. 989 - Sanjam Garg, Mohammad Hajiabadi, Rafail Ostrovsky:
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More. 990 - Jing Yang, Thomas Johansson, Alexander Maximov:
Vectorized linear approximations for attacks on SNOW 3G. 991 - Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. 992 - Louis Tajan, Dirk Westhoff, Frederik Armknecht:
Private Set Relations with Bloom Filters for Outsourced SLA Validation. 993 - Lilya Budaghyan, Tor Helleseth, Nikolay S. Kaleyski:
A new family of APN quadrinomials. 994 - Douglas Wikström:
Blackbox Constructions from Mix-Nets. 995 - Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom:
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG. 996 - James Bartusek, Liron Bronfman, Justin Holmgren, Fermi Ma, Ron Rothblum:
On the (In)security of Kilian-Based SNARGs. 997 - Arpita Patra, Divya Ravi:
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation. 998 - Pierrick Méaux:
On the Fast Algebraic Immunity of Majority Functions. 999 - Aisling Connolly, Pooya Farshim, Georg Fuchsbauer:
Security of Symmetric Primitives against Key-Correlated Attacks. 1000 - Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang:
Middle-Product Learning with Rounding Problem and its Applications. 1001 - Shizhu Tian, Christina Boura, Léo Perrin:
Boomerang Uniformity of Popular S-box Constructions. 1002 - Thinh Dang, Dustin Moody:
Twisted Hessian Isogenies. 1003 - Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, Damian Vizár:
Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages. 1004 - Siemen Dhooghe, Svetla Nikova, Vincent Rijmen:
Threshold Implementations in the Robust Probing Model. 1005 - Francesco Lucente Stabile, Carey Patrick Atkins:
Lucente Stabile Atkins (LSA) Cryptosystem (Unbreakable). 1006 - Philippe Elbaz-Vincent, Cyril Hugounenq, Sébastien Riou:
SPAE a mode of operation for AES on low-cost hardware. 1007 - Olivier Bronchain, François-Xavier Standaert:
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations. 1008 - Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang:
LLL and stochastic sandpile models. 1009 - Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters:
On Perfect Correctness in (Lockable) Obfuscation. 1010 - Raymond K. Zhao, Ron Steinfeld, Amin Sakzad:
Compact and Scalable Arbitrary-centered Discrete Gaussian Sampling over Integers. 1011 - Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka:
Simple and Efficient KDM-CCA Secure Public Key Encryption. 1012 - Carolyn Whitnall, Elisabeth Oswald:
A Critical Analysis of ISO 17825 ('Testing methods for the mitigation of non-invasive attack classes against cryptographic modules'). 1013 - Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels:
Security Reductions for White-Box Key-Storage in Mobile Payments. 1014 - Eleftherios Kokoris-Kogias, Alexander Spiegelman, Dahlia Malkhi, Ittai Abraham:
Bootstrapping Consensus Without Trusted Setup: Fully Asynchronous Distributed Key Generation. 1015 - Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik:
Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving. 1016 - Mihir Bellare, Wei Dai, Lucy Li:
The Local Forking Lemma and its Application to Deterministic Encryption. 1017 - Julia Kastner, Jiaxin Pan:
Towards Instantiating the Algebraic Group Model. 1018 - Yongha Son, Jung Hee Cheon:
Revisiting the Hybrid attack on sparse and ternary secret LWE. 1019 - Alexander Vlasov, Konstantin Panarin:
Transparent Polynomial Commitment Scheme with Polylogarithmic Communication Complexity. 1020 - Sean Bowe, Jack Grigg, Daira Hopwood:
Halo: Recursive Proof Composition without a Trusted Setup. 1021 - Jintai Ding, Joshua Deaton, Zheng Zhang, Kurt Schmidt, Vishakha:
A Simple Key Reuse Attack on Ntru Cryptosystem. 1022 - Dor Bitan, Shlomi Dolev:
Randomly Rotate Qubits Compute and Reverse - IT-Secure Non-Interactive Fully-Compact Homomorphic Quantum Computations over Classical Data Using Random Bases. 1023 - Dor Bitan, Shlomi Dolev:
Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix (extended abstract). 1024 - Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass:
On Perfect Correctness without Derandomization. 1025 - Mojtaba Khalili, Daniel Slamanig:
Efficient Tightly-Secure Structure-Preserving Signatures and Unbounded Simulation-Sound QA-NIZK Proofs. 1026 - Marcel Tiepelt, Alan Szepieniec:
Quantum LLL with an Application to Mersenne Number Cryptosystems. 1027 - Divesh Aggarwal, Bogdan Ursu, Serge Vaudenay:
Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors. 1028 - Yilei Chen, Nicholas Genise, Pratyay Mukherjee:
Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures. 1029 - Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
How to leverage hardness of constant degree expanding polynomials over R to build iO. 1030 - Rahim Toluee, Taraneh Eghlidos:
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice. 1031 - Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin:
On Fully Secure MPC with Solitary Output. 1032 - John Chan, Phillip Rogaway:
Anonymous AE. 1033 - Jean Paul Degabriele, Christian Janson, Patrick Struck:
Sponges Resist Leakage: The Case of Authenticated Encryption. 1034 - Changmin Lee, Alice Pellet-Mary, Damien Stehlé, Alexandre Wallet:
An LLL Algorithm for Module Lattices. 1035 - Kazuki Yoneyama:
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies. 1036 - Alexander Koch, Michael Schrempp, Michael Kirsten:
Card-based Cryptography Meets Formal Verification. 1037 - Johannes Blömer, Nils Löken:
Dynamic Searchable Encryption with Access Control. 1038 - Henrique S. Ogawa, Thomas E. Luther, Jefferson E. Ricardini, Helmiton Cunha, Marcos A. Simplício Jr., Diego F. Aranha, Ruud Derwig, Harsh Kupwade Patil:
Accelerated V2X provisioning with Extensible Processor Platform. 1039 - Abhishek Chakraborty, Ankur Srivastava:
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators. 1040 - Swapnil Paliwal, Anvita Chandrakar:
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs. 1041 - José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Grégoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran:
A Machine-Checked Proof of Security for AWS Key Management Service. 1042 - Eli Biham, Lior Neumann:
Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve Attack. 1043 - Rishab Goyal, Satyanarayana Vusirikala:
Verifiable Registration-Based Encryption. 1044 - Josh Alman, Robin Hui:
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank. 1045 - Henry Corrigan-Gibbs, Dmitry Kogan:
The Function-Inversion Problem: Barriers and Opportunities. 1046 - Alessandro Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Psi Vesely, Nicholas P. Ward:
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS. 1047 - Dmitrii I. Koshelev:
A new elliptic curve point compression method based on $\mathbb{F}_{\!p}$-rationality of some generalized Kummer surfaces. 1048 - Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow: Secure TensorFlow Inference. 1049 - Abderrahmane Nitaj, Emmanuel Fouotsa:
A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem. 1050 - Maher Boudabra, Abderrahmane Nitaj:
A New Public Key Cryptosystem Based on Edwards Curves. 1051 - Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem. 1052 - Marc Fischlin, Felix Günther:
Modeling Memory Faults in Signature and Encryption Schemes. 1053 - David Cerezo Sánchez:
Truthful and Faithful Monetary Policy for a Stablecoin Conducted by a Decentralised, Encrypted Artificial Intelligence. 1054 - Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy. 1055 - Sarah Arpin, Catalina Camacho-Navarro, Kristin E. Lauter, Joelle Lim, Kristina Nelson, Travis Scholl, Jana Sotáková:
Adventures in Supersingularland. 1056 - Andrea Caforio, Subhadeep Banik:
A Study of Persistent Fault Analysis. 1057 - Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann:
Privacy-preserving auditable token payments in a permissioned blockchain system. 1058 - Daniele Di Tullio, Ankan Pal:
A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem. 1059 - Daniele Cozzo, Nigel P. Smart:
Sharing the LUOV: Threshold Post-Quantum Signatures. 1060 - Ulrich Haböck, Stephan Krenn:
Breaking and Fixing Anonymous Credentials for the Cloud (Full Version). 1061 - Noga Ron-Zewi, Ron D. Rothblum:
Local Proofs Approaching the Witness Length. 1062 - Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Daniel Slamanig:
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing. 1063 - Julia Hesse:
Separating Standard and Asymmetric Password-Authenticated Key Exchange. 1064 - Karim Baghery:
Subversion-Resistant Commitment Schemes: Definitions and Constructions. 1065 - M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai:
HEAX: High-Performance Architecture for Computation on Homomorphically Encrypted Data in the Cloud. 1066 - Alex Lombardi, Vinod Vaikuntanathan, Thuy-Duong Vuong:
Lattice Trapdoors and IBE from Middle-Product LWE. 1067 - Joey Green, Tilo Burghardt, Elisabeth Oswald:
Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets. 1068 - Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta:
Efficient Private PEZ Protocols for Symmetric Functions. 1069 - Robi Pedersen, Osmanbey Uzunkol:
Secure Delegation of Isogeny Computations and Cryptographic Applications. 1070 - Martin Brisfors, Sebastian Forsmark:
DLSCA: a Tool for Deep Learning Side Channel Analysis. 1071 - Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Kevin Liu, Giulio Malavolta:
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem. 1072 - Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch:
iUC: Flexible Universal Composability Made Simple. 1073 - Dirk Thatmann:
Non-monotonic Practical ABE with Direct Revocation, Blackbox Traceability, and a Large Attribute Universe. 1074 - Henry Corrigan-Gibbs, Dmitry Kogan:
Private Information Retrieval with Sublinear Online Time. 1075 - Alessandro Chiesa, Dev Ojha, Nicholas Spooner:
Fractal: Post-Quantum and Transparent Recursive Proofs from Holography. 1076 - Kai-Min Chung, Luowen Qian:
Adaptively Secure Garbling Schemes for Parallel Computations. 1077 - Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu:
Puncturable Proxy Re-Encryption supporting to Group Messaging Service. 1078 - Yiming Zhu, Zhen Liu, Yanbin Pan:
When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited. 1079 - Fukang Liu, Takanori Isobe, Willi Meier:
Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods. 1080 - Raymond Chee, Kartik Chitturi, Edouard Dufour-Sans, Kyle Soska:
OCEAN: A Built-In Replacement for Mining Pools. 1081 - Hyang-Sook Lee, Jeongeun Park:
On the Security of Multikey Homomorphic Encryption. 1082 - Eman Salem Alashwali, Kasper Rasmussen:
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS. 1083 - Phillipp Schoppmann, Adrià Gascón, Leonie Reichert, Mariana Raykova:
Distributed Vector-OLE: Improved Constructions and Implementation. 1084 - Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee:
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation. 1085 - Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe:
The SPHINCS+ Signature Framework. 1086 - Shyam Murthy, Srinivas Vivek:
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data. 1087 - Clinton Ehrlich, Anna Guzova:
KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability. 1088 - Josiah Johnson Umezurike:
Lattice-Face Key Infrastructure (LFKI) for Quantum Resistant Computing. 1089 - Xinggu Chen, Haining Fan:
Low Complexity MDS Matrices Using GF(2n) SPB or GPB. 1090 - Nils Wisiol, Niklas Pirnay:
Short Paper: XOR Arbiter PUFs have Systematic Response Bias. 1091 - Georgia Avarikioti, Orfeas Stefanos Thyfronitis Litos, Roger Wattenhofer:
Cerberus Channels: Incentivizing Watchtowers for Bitcoin. 1092 - Minki Hhan, Keita Xagawa, Takashi Yamakawa:
Quantum Random Oracle Model with Auxiliary Input. 1093 - Marshall Ball, Elette Boyle, Ran Cohen, Tal Malkin, Tal Moran:
Is Information-Theoretic Topology-Hiding Computation Possible? 1094 - Elette Boyle, Niv Gilboa, Yuval Ishai:
Secure Computation with Preprocessing via Function Secret Sharing. 1095 - Kostis Karantias, Aggelos Kiayias, Dionysis Zindros:
Proof-of-Burn. 1096 - Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann:
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric. 1097 - Eleftheria Makri, Tim Wood:
Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling. 1098 - Eman Salem Alashwali, Kasper Rasmussen:
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name. 1099 - Qi Chen, Chunming Tang, Zhiqiang Lin:
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes. 1100 - Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang:
On the (Quantum) Random Oracle Methodology: New Separations and More. 1101 - (Withdrawn) Applications on traceable range proofs from fully regulatable privacy-preserving blockchains. 1102
- Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar, Ari Juels:
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms. 1103 - Kang Yang, Xiao Wang, Jiang Zhang:
More Efficient MPC from Improved Triple Generation and Authenticated Garbling. 1104 - Jeremiah Blocki, Seunghoon Lee:
On the Multi-User Security of Short Schnorr Signatures. 1105 - Jean-Sébastien Coron, Aurélien Greuet, Rina Zeitoun:
Side-channel Masking with Pseudo-Random Generator. 1106 - Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger:
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy. 1107 - Kasper Green Larsen, Mark Simkin, Kevin Yeo:
Lower Bounds for Multi-Server Oblivious RAMs. 1108 - Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Nicolas Gama, Mariya Georgieva, Fernando Pérez-González:
Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography. 1109 - (Withdrawn) Redactable Proof-of-Stake Blockchain with Fast Confirmation. 1110
- Mikerah Quintyne-Collins:
Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers. 1111 - George Teseleanu:
Subliminal Hash Channels. 1112 - Oliver Masters, Hamish Hunt, Enrico Steffinlongo, Jack L. H. Crawford, Flávio Bergamaschi:
Towards a Homomorphic Machine Learning Big Data Pipeline for the Financial Services Sector. 1113 - Jung Hee Cheon, Minki Hhan, Seungwan Hong, Yongha Son:
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE. 1114 - Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash. 1115 - Ankit Garg, Yael Tauman Kalai, Dakshita Khurana:
Computational Extractors with Negligible Error in the CRS Model. 1116 - (Withdrawn) NP-completeness Reduction for Semiprimes Factorization Problem. 1117
- Yalin Chen, Chang Hsiang, Liangchun Wang, Yu-Yuan Chou, Jue-Sam Chou:
A Diffie-Hellman quantum session key establishment protocol without entanglement. 1118 - Antonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko:
MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version). 1119 - Mojtaba Khalili, Daniel Slamanig, Mohammad Dakhilalian:
Structure-Preserving Signatures on Equivalence Classes From Standard Assumptions. 1120 - Aaron Hutchinson, Jason T. LeGrow, Brian Koziel, Reza Azarderakhsh:
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors. 1121 - Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer:
Exploring Trade-offs in Batch Bounded Distance Decoding. 1122 - Laltu Sardar, Sushmita Ruj:
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme. 1123 - Amos Beimel, Hussien Othman:
Evolving Ramp Secret Sharing with a Small Gap. 1124 - Karim Baghery, Behzad Abdolmaleki, Shahram Khazaei, Mohammad Reza Aref:
Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols. 1125 - Archita Agarwal, Seny Kamara:
Encrypted Distributed Hash Tables. 1126 - Kazuhiko Minematsu, Norifumi Kamiya:
Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing. 1127 - Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William J. Knottenbelt:
SoK: Communication Across Distributed Ledgers. 1128 - Tilen Marc, Miha Stopar, Jan Hartman, Manca Bizjak, Jolanda Modic:
Privacy-Enhanced Machine Learning with Functional Encryption. 1129 - Vasyl Ustimenko:
On affine Cremona semigroups, corresponding protocols of Non-commutative Cryptography and encryption with several nonlinear multivariate transformations on secure Eulerian mode. 1130 - Pasin Manurangsi, Akshayaram Srinivasan, Prashant Nalini Vasudevan:
Nearly Optimal Robust Secret Sharing against Rushing Adversaries. 1131 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo:
Leakage Cell Probe Model: Lower Bounds for Key-Equality Mitigation in Encrypted Multi-Maps. 1132 - Gang Wang:
Threat Models and Security of Phase-Change Memory. 1133 - Ronald Cramer, Chaoping Xing:
Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes. 1134 - Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan:
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing. 1135 - Thijs Veugen, Thomas Attema, Gabriele Spini:
An implementation of the Paillier crypto system with threshold decryption without a trusted dealer. 1136 - Ronald Cramer, Chaoping Xing, Chen Yuan:
On the Complexity of Arithmetic Secret Sharing. 1137 - Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han:
ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage. 1138 - Mingchao Yu, Saeid Sahraei, Songze Li, Salman Avestimehr, Sreeram Kannan, Pramod Viswanath:
Coded Merkle Tree: Solving Data Availability Attacks in Blockchains. 1139 - Utsav Banerjee, Tenzin S. Ukyab, Anantha P. Chandrakasan:
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols (Extended Version). 1140 - Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar:
KORGAN: An Efficient PKI Architecture Based on Permissioned-Blockchain by Modifying PBFT Through Dynamic Threshold Signatures. 1141 - Tamalika Mukherjee, Noah Stephens-Davidowitz:
Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP. 1142 - Iraklis Leontiadis, Reza Curtmola:
Auditable Compressed Storage. 1143 - Sanjit Chatterjee, R. Kabaleeshwaran:
Rerandomizable Signatures under Standard Assumption. 1144 - Craig Costello:
B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion. 1145 - Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia:
Implementing Grover oracles for quantum key search on AES and LowMC. 1146 - Steve Thakur:
Batching non-membership proofs with bilinear accumulators. 1147 - Benjamin R. Curtis, Rachel Player:
On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption. 1148 - Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Joaquín García-Alfaro:
LockDown: Balance Availability Attack against Lightning Network Channels. 1149 - Alexandru Cojocaru, Juan A. Garay, Aggelos Kiayias, Fang Song, Petros Wallden:
The Bitcoin Backbone Protocol Against Quantum Adversaries. 1150 - Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka:
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem. 1151 - Jonas Krautter, Dennis R. E. Gnad, Falk Schellenberg, Amir Moradi, Mehdi Baradaran Tahoori:
Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs. 1152 - Ivan Damgård, Helene Haagh, Rebekah Mercer, Anca Nitulescu, Claudio Orlandi, Sophia Yakoubov:
Stronger Notions and Constructions for Multi-Designated Verifier Signatures. 1153 - Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. 1154 - José Bacelar Almeida, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub:
Machine-Checked Proofs for Cryptographic Standards. 1155 - Divesh Aggarwal, Maciej Obremski, João Ribeiro, Luisa Siniscalchi, Ivan Visconti:
How to Extract Useful Randomness from Unreliable Sources. 1156 - Srimanta Bhattacharya, Mridul Nandi:
A Note on the Chi-square Method : A Tool for Proving Cryptographic Security. 1157 - Payman Mohassel, Mike Rosulek, Ni Trieu:
Practical Privacy-Preserving K-means Clustering. 1158 - Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl:
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation. 1159 - Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid:
Cryptanalysis of the Multivariate Encryption Scheme EFLASH. 1160 - Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck:
Quantum speedups for lattice sieves are tenuous at best. 1161 - Karim Baghery:
Subversion-Resistant Simulation (Knowledge) Sound NIZKs. 1162 - Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar:
On the Difficulty of FSM-based Hardware Obfuscation. 1163 - Chao Liu, Zhongxiang Zheng, Keting Jia, Limin Tao:
Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version). 1164 - Nicolas Bordes, Pierre Karpman:
High-order private multiplication in characteristic two revisited. 1165 - Peter Schwabe, Amber Sprenkels:
The complete cost of cofactor h=1. 1166 - Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann:
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications. 1167 - Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, Yu Yu:
Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting). 1168 - Antonio Campello, Cong Ling, Jean-Claude Belfiore:
Semantically Secure Lattice Codes for Compound MIMO Channels. 1169 - Iggy van Hoof:
Space-efficient quantum multiplication of polynomials for binary finite fields with sub-quadratic Toffoli gate count. 1170 - Laura Luzzi, Roope Vehkalahti, Cong Ling:
Almost universal codes for MIMO wiretap channels. 1171 - Mingming Wang, Qianhong Wu:
Lever: Breaking the Shackles of Scalable On-chain Validation. 1172 - Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi:
Immunization against Complete Subversion without Random Oracles. 1173 - Borja Gómez:
Hidden Irreducible Polynomials : A cryptosystem based on Multivariate Public Key Cryptography. 1174 - Laura Blackstone, Seny Kamara, Tarik Moataz:
Revisiting Leakage Abuse Attacks. 1175 - Eric Brier, David Naccache:
The Thirteenth Power Residue Symbol. 1176 - Mary Maller, Psi Vesely:
Aggregatable Signatures from an Inner Pairing Product Argument. 1177 - Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han:
SoK: Sharding on Blockchain. 1178 - Ron Steinfeld, Amin Sakzad, Raymond K. Zhao:
Practical MP-LWE-based encryption balancing security-risk vs. efficiency. 1179 - Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Uprooting the Falcon Tree? 1180 - (Withdrawn) Quantum Physical Unclonable Functions: Possibilities and Impossibilities. 1181
- Serge Fehr, Chen Yuan:
Robust Secret Sharing with Optimal Share Size and Security Against Rushing Adversaries. 1182 - Ran Cohen, Juan A. Garay, Vassilis Zikas:
Broadcast-Optimal Two-Round MPC. 1183 - Andrey Jivsov:
A concrete instantiation of Bulletproof zero-knowledge proof. 1184 - David Butler, Andreas Lochbihler, David Aspinall, Adrià Gascón:
Formalising Σ-Protocols and Commitment Schemes using CryptHOL. 1185 - Mahabir Prasad Jhanwar, Pratyush Ranjan Tiwari:
Trading Accumulation Size for Witness Size: A Merkle Tree Based Universal Accumulator Via Subset Differences. 1186 - Orr Dunkelman, Léo Perrin:
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs. 1187 - Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti:
Improving Password Guessing via Representation Learning. 1188 - Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging. 1189 - Fulei Ji, Wentao Zhang, Tianyou Ding:
Improving Matsui's Search Algorithm for the Best Differential/Linear Trails and its Applications for DES, DESL and GIFT. 1190 - Maura B. Paterson, Douglas R. Stinson:
On the equivalence of authentication codes and robust (2, 2)-threshold schemes. 1191 - Daniel Berend, Dor Bitan, Shlomi Dolev:
Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets. 1192 - Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis:
Security models for everlasting privacy. 1193 - Michel Abdalla, Manuel Barbosa:
Perfect Forward Security of SPAKE2. 1194 - Vipul Goyal, Silas Richelson:
Non-Malleable Commitments Using Goldreich-Levin List Decoding. 1195 - Marc Joye:
Evaluating Octic Residue Symbols. 1196 - László Csirmaz:
Secret sharing and duality. 1197 - Zichen Gui, Oliver Johnson, Bogdan Warinschi:
Encrypted Databases: New Volume Attacks against Range Queries. 1198 - Max Hoffmann, Michael Klooß, Markus Raiber, Andy Rupp:
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices. 1199 - Thomas Attema, Ronald Cramer, Chaoping Xing:
A note on short invertible ring elements and applications to cyclotomic and trinomials number fields. 1200 - Olivier Sanders:
Efficient Redactable Signature and Application to Anonymous Credentials. 1201 - Wouter Castryck, Lorenz Panny, Frederik Vercauteren:
Rational isogenies from irrational endomorphisms. 1202 - Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi:
Authentication in Key-Exchange: Definitions, Relations and Composition. 1203 - Gorjan Alagic, Christian Majenz, Alexander Russell:
Efficient simulation of random states and random unitaries. 1204 - Yfke Dulek, Alex B. Grilo, Stacey Jeffery, Christian Majenz, Christian Schaffner:
Secure Multi-party Quantum Computation with a Dishonest Majority. 1205 - Jing Tian, Zhe Liu, Jun Lin, Zhongfeng Wang, Binjing Li:
High-Speed Modular Multipliers for Isogeny-Based Post-Quantum Cryptography. 1206 - Borja Gómez:
Behind multiple trapdoors: A cryptographic commitment scheme for establishing secure communications. 1207 - Xenia Bogomolec, John Gregory Underhill, Stiepan Aurélien Kovac:
Towards Post-Quantum Secure Symmetric Cryptography: A Mathematical Perspective. 1208 - Hiroshi Onuki, Tsuyoshi Takagi:
On collisions related to an ideal class of order 3 in CSIDH. 1209 - Zahra Jafargholi, Sabine Oechsner:
Adaptive Security of Practical Garbling Schemes. 1210 - Rio LaVigne, Chen-Da Liu Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi:
Topology-Hiding Computation for Networks with Unknown Delays. 1211 - Subhadeep Banik, Fatih Balli, Francesco Regazzoni, Serge Vaudenay:
Swap and Rotate: Lightweight linear layers for SPN-based blockciphers. 1212 - Fatih Balli, Subhadeep Banik:
Exploring Lightweight Efficiency of ForkAES. 1213 - Farokhlagha Moazami, Masoumeh Safkhani:
A New Secure and Efficient Ownership Transfer Protocol based on Quadric Residue and Homomorphic Encryption. 1214 - Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model. 1215 - Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen:
GPU-Accelerated Branch-and-Bound Algorithm for Differential Cluster Search of Block Ciphers. 1216 - (Withdrawn) A Scalable Blockchain Based Digital Rights Management System. 1217
- Abdur Rehman Raza, Khawir Mahmood, Muhammad Faisal Amjad, Haider Abbas, Mehreen Afzal:
On the Efficiency of Software Implementations of Lightweight Block Ciphers from the Perspective of Programming Languages. 1218 - Cyrius Nugier, Remi Adelin, Vincent Migliore, Eric Alata:
Multi-Locking and Perfect Argument Order: Two Major Improvements of Attribute-Based Encryption~(Long Paper). 1219 - Thomas Roche, Laurent Imbert, Victor Lomné:
Side-channel Attacks on Blinded Scalar Multiplications Revisited. 1220 - David Clayton, Christopher Patton, Thomas Shrimpton:
Probabilistic Data Structures in Adversarial Environments. 1221 - M. Sadegh Riazi, Beidi Chen, Anshumali Shrivastava, Dan S. Wallach, Farinaz Koushanfar:
Sub-Linear Privacy-Preserving Near-Neighbor Search. 1222 - Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Integrita: Protecting View-Consistency in Online Social Network with Federated Servers. 1223 - Stephanie Wang, Rishabh Poddar, Jianan Lu, Raluca Ada Popa:
Practical Volume-Based Attacks on Encrypted Databases. 1224 - Jianyu Niu, Chen Feng, Hoang Dau, Yu-Chih Huang, Jingge Zhu:
Analysis of Nakamoto Consensus, Revisited. 1225 - (Withdrawn) Cube Cryptanalysis of Round-Reduced ACORN. 1226
- Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou:
Dynamic Searchable Encryption with Small Client Storage. 1227 - Lorenz Panny:
Guess what?! On the impossibility of unconditionally secure public-key encryption. 1228 - Benedikt Bünz, Ben Fisch, Alan Szepieniec:
Transparent SNARKs from DARK Compilers. 1229 - Eli Ben-Sasson, Alessandro Chiesa, Lior Goldberg, Tom Gur, Michael Riabzev, Nicholas Spooner:
Linear-Size Constant-Query IOPs for Delegating Computation. 1230 - Chunhuan Zhao, Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu:
Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications. 1231 - Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay:
Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice. 1232 - Koji Nuida, Satsuya Ohata, Shigeo Mitsunari, Nuttapong Attrapadung:
Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts. 1233 - Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim:
Efficient Homomorphic Comparison Methods with Optimal Complexity. 1234 - Mariana Costiuc, Diana Maimut, George Teseleanu:
Physical Cryptography. 1235 - Bo-Yeon Sim, Dong-Guk Han:
Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack. 1236 - Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden:
QFactory: classically-instructed remote secret qubits preparation. 1237 - Adi Akavia, Hayim Shaul, Mor Weiss, Zohar Yakhini:
Linear-Regression on Packed Encrypted Data in the Two-Server Model. 1238 - Britta Hale:
Computationally Modeling User-Mediated Authentication Protocols. 1239 - Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu:
Forward and Backward Private DSSE for Range Queries. 1240 - Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, Jihye Kim:
SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain. 1241 - Yoo-Seung Won, Jong-Yeon Park:
Non-Profiled Side Channel Attack based on Deep learning using Picture Trace. 1242 - (Withdrawn) On The Distinguishability of Ideal Ciphers. 1243
- Samuel Dobson, Trey Li, Lukas Zobernig:
A Note on a Static SIDH Protocol. 1244 - Jian Zou, Yongyang Liu, Chen Dong, Wenling Wu, Le Dong:
Observations on the Quantum Circuit of the SBox of AES. 1245 - Marcel Keller, Ke Sun:
A Note on Our Submission to Track 4 of iDASH 2019. 1246 - Lauren De Meyer, Felix Wegener, Amir Moradi:
A Note on Masking Generic Boolean Functions. 1247 - Bastian Richter, David Knichel, Amir Moradi:
A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis. 1248 - Vitaly Kiryukhin:
Related-key Attack on 5-Round Kuznyechik. 1249 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss:
The Price of Active Security in Cryptographic Protocols. 1250 - Anca Nitulescu:
Lattice-based Zero-knowledge SNARGs for Arithmetic Circuits. 1251 - Aayush Jain, Huijia Lin, Amit Sahai:
Simplifying Constructions and Assumptions for i풪. 1252 - Victoria Vysotskaya:
Probabilistic Properties of Modular Addition \\ (Extended abstract). 1253 - Jiseung Kim, Changmin Lee:
Cryptanalysis of FRS Obfuscation based on the CLT13 Multilinear Map. 1254 - Daniel Benarroch, Matteo Campanelli, Dario Fiore, Dimitris Kolonelos:
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular. 1255 - Elette Boyle, Justin Holmgren, Mor Weiss:
Permuted Puzzles and Cryptographic Hardness. 1256 - Dhaval Khandla, Het Shahy, Manish Kumar Bz, Alwyn Roshan Pais, Nishant Raj:
Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts. 1257 - Shogo Ochiai, Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:
Secure Pairwise Key Sharing using Geometric Group Key Sharing Method (Full Paper). 1258 - Kaushik Nath, Palash Sarkar:
"Nice" Curves. 1259 - Anita Aghaie, Amir Moradi:
TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions. 1260 - Justin Holmgren:
On Round-By-Round Soundness and State Restoration Attacks. 1261 - Shweta Agrawal, Rachit Garg, Nishant Kumar, Manoj Prabhakaran:
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing. 1262 - Anna Johnston:
Comments on Cryptographic Entropy Measurement. 1263 - Juan A. Garay, Aggelos Kiayias, Rafail Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas:
Resource-Restricted Cryptography: Honest-Majority MPC from a CRS (and No Broadcast). 1264 - (Withdrawn) WaterCarver: Anonymous Confidential Blockchain System based on Account Model. 1265
- Jean-Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca:
Note on the noise growth of the RNS variants of the BFV scheme. 1266 - (Withdrawn) Repudiable Ring Signatures: Stronger Definitions and Logarithmic-Size. 1267
- Saqib A. Kakvi:
On the Security of RSA-PSS in the Wild. 1268 - Hao Lin, Mingqiang Wang:
Repudiable Ring Signature: Stronger Security and Logarithmic-Size. 1269 - Jiwon Lee, Jaekyoung Choi, Jihye Kim, Hyunok Oh:
SAVER: Snark-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization. 1270 - Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart:
Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices. 1271 - Upendra Kapshikar, Ayan Mahalanobis:
The Niederreiter cryptosystem and Quasi-Cyclic codes. 1272 - Jens-Peter Kaps, William Diehl, Michael Tempelmeier, Farnoud Farahmand, Ekawat Homsirikamol, Kris Gaj:
A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography. 1273 - Ameera Salem Al Abdouli, Emanuele Bellini, Florian Caullery, Marcos Manzano, Víctor Mateu:
Rank-metric Encryption on Arm-Cortex M0. 1274 - Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Updatable Oblivious Key Management for Storage Systems. 1275 - Panos Kampanakis, Dimitrios Sikeridis:
Two PQ Signature Use-cases: Non-issues, challenges and potential solutions. 1276 - Maran van Heesch, Niels L. M. van Adrichem, Thomas Attema, Thijs Veugen:
Towards Quantum-Safe VPNs and Internet. 1277 - Hamad Al Shehhi, Emanuele Bellini, Filipe Borba, Florian Caullery, Marc Manzano, Víctor Mateu:
An IND-CCA-Secure Code-Based EncryptionScheme Using Rank Metric. 1278 - Nir Bitansky, Omri Shmueli:
Post-Quantum Zero Knowledge in Constant Rounds. 1279 - Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:
Fast Secrecy Computation with Multiplication Under the Setting of $k\le N<2k-1$ using Secret Sharing Scheme. 1280 - Geoffroy Couteau, Bill Roscoe, Peter Y. A. Ryan:
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. 1281 - Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald:
Privacy-Preserving Decision Tree Training and Prediction against Malicious Server. 1282 - Christian Eder:
Breaking the Hidden Irreducible Polynomials Scheme. 1283 - Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy, Yuyu Wang:
Shorter QA-NIZK and SPS with Tighter Security. 1284 - Manoj Kumar:
Full-Round Differential Attack on DoT Block Cipher. 1285 - Ambili K. N, Jimmy Jose:
Comparison of proof-of-work based blockchains against federated consensus and proof-of-validation based blockchains. 1286 - Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu:
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol. 1287 - Luca De Feo, Michael Meyer:
Threshold Schemes from Isogeny Assumptions. 1288 - Nir Drucker, Shay Gueron, Dusan Kostic:
On constant-time QC-MDPC decoding with negligible failure rate. 1289 - Péter Kutas, Christophe Petit, Javier Silva:
Trapdoor DDH groups from pairings and isogenies. 1290 - Cyprien Delpech de Saint Guilhem, Péter Kutas, Christophe Petit, Javier Silva:
SÉTA: Supersingular Encryption from Torsion Attacks. 1291 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung:
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing. 1292 - Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek:
LizarMong: Excellent Key Encapsulation Mechanism based on RLWE and RLWR. 1293 - Dmitrii I. Koshelev:
Finite field mapping to elliptic curves of j-invariant 1728. 1294 - Borja Gómez:
A trip between creation and destruction of non-commutative public key exchange protocols. 1295 - Mathias Hall-Andersen:
FastSwap: Concretely Efficient Contingent Payments for Complex Predicates. 1296 - Hamid Nejatollahi, Sina Shahhosseini, Rosario Cammarota, Nikil D. Dutt:
Exploring Energy Efficient Quantum-resistant Signal Processing Using Array Processors. 1297 - Mark Abspoel, Anders P. K. Dalskov, Daniel Escudero, Ariel Nof:
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings. 1298 - Divesh Aggarwal, Maciej Obremski:
A constant-rate non-malleable code in the split-state model. 1299 - Dragos Rotaru, Nigel P. Smart, Titouan Tanguy, Frederik Vercauteren, Tim Wood:
Actively Secure Setup for SPDZ. 1300 - Dipayan Das, Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang:
Modular lattice signatures, revisited. 1301 - Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt:
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation. 1302 - (Withdrawn) A simpler construction of traceable and linkable ring signature scheme. 1303
- Kaushik Nath, Palash Sarkar:
Reduction Modulo 2448-2224-1. 1304 - Jinming Cui, Huaping Li, Meng Yang:
Privacy-Preserving Computation over Genetic Data: HLA Matching and so on. 1305 - (Withdrawn) A Valid Blockchain-based Data Trading Ecosystem. 1306
- (Withdrawn) ABERand: Effective Distributed Randomness on Ciphertext-Policy Attribute-Based Encryption. 1307
- Qian Guo, Thomas Johansson, Jing Yang:
A Novel CCA Attack using Decryption Errors against LAC. 1308 - Sujoy Sinha Roy:
SaberX4: High-throughput Software Implementationof Saber Key Encapsulation Mechanism. 1309 - Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu:
Lightweight Iterative MDS Matrices: How Small Can We Go? 1310 - Jiwon Lee, Jihye Kim, Hyunok Oh:
BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments. 1311 - Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova:
Cryptographic Fault Diagnosis using VerFI. 1312 - Nir Bitansky, Nathan Geier:
On Oblivious Amplification of Coin-Tossing Protocols. 1313 - Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang:
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search. 1314 - Rahul Rachuri, Ajith Suresh:
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. 1315 - Sabyasachi Karati:
Binary Kummer Line. 1316 - Suvradip Chakraborty, Stefan Dziembowski, Jesper Buus Nielsen:
Reverse Firewalls for Actively Secure MPCs. 1317 - Mingjiang Huang, Liming Wang:
Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications. 1318 - Mingjiang Huang, Liming Wang:
Automatic Search for the Linear (hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey and CHAM-64. 1319 - Alisa Cherniaeva, Ilia Shirobokov, Omer Shlomovits:
Homomorphic Encryption Random Beacon. 1320 - Craig Costello:
Supersingular isogeny key exchange for beginners. 1321 - Hisham S. Galal, Muhammad ElSheikh, Amr M. Youssef:
An Efficient Micropayment Channel on Ethereum. 1322 - Prabhanjan Ananth, Rolando L. La Placa:
Secure Quantum Extraction Protocols. 1323 - Avijit Dutta, Mridul Nandi:
Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme. 1324 - Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan:
Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts. 1325 - Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras:
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE. 1326 - Donghoon Chang, Munawar Hasan, Pranav Jain:
Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain. 1327 - Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits:
Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices. 1328 - Antoine Joux, Anand Kumar Narayanan:
Drinfeld modules are not for isogeny based cryptography. 1329 - Lisa Eckey, Sebastian Faust, Benjamin Schlosser:
OptiSwap: Fast Optimistic Fair Exchange. 1330 - Melissa Azouaoui, Romain Poussier, François-Xavier Standaert, Vincent Verneuil:
Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating? 1331 - Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil Ghosh Ray:
SEAL: Sealed-Bid Auction Without Auctioneers. 1332 - Paul Bottinelli, Victoria de Quehen, Chris Leonardi, Anton Mosunov, Filip Pawlega, Milap Sheth:
The Dark SIDH of Isogenies. 1333 - Ye Dong, Xiaojun Chen, Liyan Shen:
Privacy-Preserving Distributed Machine Learning based on Secret Sharing. 1334 - Tibor Jager, David Niehues:
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. 1335 - Neal Koblitz, Alfred Menezes:
Critical Perspectives on Provable Security: Fifteen Years of "Another Look" Papers. 1336 - Peter Chvojka, Tibor Jager, Saqib A. Kakvi:
Offline Witness Encryption with Semi-Adaptive Security. 1337 - Phi Hung Le, Samuel Ranellucci, S. Dov Gordon:
Two-party Private Set Intersection with an Untrusted Third Party. 1338 - Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
Extracting Randomness from Extractor-Dependent Sources. 1339 - Melissa Chase, Esha Ghosh, Oxana Poburinnaya:
Secret Shared Shuffle. 1340 - Andrew Morgan, Rafael Pass, Antigoni Polychroniadou:
Succinct Non-Interactive Secure Computation. 1341 - Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Scalable Wildcarded Identity-Based Encryption. 1342 - Yue Qin, Chi Cheng, Jintai Ding:
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber. 1343 - Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem:
From Fairness to Full Security in Multiparty Computation. 1344 - Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano:
Audita: A Blockchain-based Auditing Framework for Off-chain Storage. 1345 - Bowen Liu, Qiang Tang:
Privacy-Preserving Decentralised Singular Value Decomposition. 1346 - Sebati Ghosh, Palash Sarkar:
Variable Tag Length Message Authentication Code Schemes. 1347 - Handan Kilinç Alper:
Consensus on Clock in Universally Composable Timing Model. 1348 - Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun:
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. 1349 - Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. 1350 - Diana Maimut, Alexandru Stefan Mega:
Speeding Up OMD Instantiations in Hardware. 1351 - Jing Yang, Thomas Johansson, Alexander Maximov:
Spectral analysis of ZUC-256. 1352 - Nico Döttling, Sanjam Garg, Vipul Goyal, Giulio Malavolta:
Laconic Conditional Disclosure of Secrets and Applications. 1353 - Zhangshuang Guan, Zhiguo Wan, Yang Yang, Yan Zhou, Butian Huang:
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs. 1354 - Daniel Smith-Tone, Cristina Tone:
A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code. 1355 - Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila:
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms. 1356 - Ward Beullens, Tim Beyne, Aleksei Udovenko, Giuseppe Vitto:
Cryptanalysis of the Legendre PRF and generalizations. 1357 - Xuan Thanh Do, Duong Hieu Phan, David Pointcheval:
Traceable Inner Product Functional Encryption. 1358 - Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu:
Universal Forgery Attack against GCM-RUP. 1359 - Daniele Cozzo, Nigel P. Smart:
Sashimi: Cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol. 1360 - Kaushik Nath, Palash Sarkar:
Efficient Elliptic Curve Diffie-Hellman Computation at the 256-bit Security Level. 1361 - Colin Boyd, Kai Gellert:
A Modern View on Forward Security. 1362 - Sébastien Campion, Julien Devigne, Céline Duguey, Pierre-Alain Fouque:
Multi-Device for Signal. 1363 - Çagdas Çalik, Meltem Sönmez Turan, René Peralta:
Boolean Functions with Multiplicative Complexity 3 and 4. 1364 - Megha Byali, Harsh Chaudhari, Arpita Patra, Ajith Suresh:
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. 1365 - Nada El Kassem, Luís Fiolhais, Paulo Martins, Liqun Chen, Leonel Sousa:
A Lattice-based Enhanced Privacy ID. 1366 - Keitaro Hashimoto, Wakaha Ogata, Toi Tomita:
Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption. 1367 - Daniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner:
Efficient FPGA Implementations of LowMC and Picnic. 1368 - Aein Rezaei Shahmirzadi, Shahram Rasoolzadeh, Amir Moradi:
Impeccable Circuits II. 1369 - Priyanka Joshi, Bodhisatwa Mazumdar:
A Subset Fault Analysis of ASCON. 1370 - Aurore Guillevic:
A short-list of STNFS-secure pairing-friendly curves at the 128-bit security level. 1371 - Maria Eichlseder, Marcel Nageler, Robert Primas:
Analyzing the Linear Keystream Biases in AEGIS. 1372 - Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez:
A note on the cost of computing odd degree isogenies. 1373 - Teik Guan Tan, Jianying Zhou:
A Survey of Digital Signing in the Post Quantum Era. 1374 - Gérald Gavin, Sandrine Tainturier:
New ideas to build noise-free homomorphic cryptosystems. 1375 - Xuecheng Ma, Dongdai Lin:
Generic Constructions of RIBE via Subset Difference Method. 1376 - Masoumeh Shafieinejad, Navid Nasr Esfahani, Reihaneh Safavi-Naini:
A Scalable Post-quantum Hash-Based Group Signature. 1377 - Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-bit ARX-box. 1378 - Christophe Clavier, Léo Reynaud:
Systematic and Random Searches for Compact 4-Bit and 8-Bit Cryptographic S-Boxes. 1379 - Elif Bilge Kavun, Nele Mentens, Jo Vliegen, Tolga Yalçin:
Efficient Utilization of DSPs and BRAMs Revisited: New AES-GCM Recipes on FPGAs. 1380 - Kaisa Nyberg:
The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions. 1381 - Badih Ghazi, Noah Golowich, Ravi Kumar, Rasmus Pagh, Ameya Velingker:
On the Power of Multiple Anonymous Messages. 1382 - Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux:
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities. 1383 - Keita Emura, Shuichi Katsumata, Yohei Watanabe:
Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations. 1384 - Gijs van Dam, Rabiah Abdul Kadir, Puteri Nor Ellyza binti Nohuddin, Halimah Badioze Zaman:
Improvements of the Balance Discovery Attack on Lightning Network Payment Channels. 1385 - Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You:
Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version). 1386 - Craig Costello, Benjamin Smith:
The supersingular isogeny problem in genus 2 and beyond. 1387 - Jayashree Dey, Ratna Dutta:
Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava code. 1388 - Ferdinand Sibleyras:
Generic Attack on Iterated Tweakable FX Constructions. 1389 - Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof:
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs. 1390 - Susan Hohenberger, Satyanarayana Vusirikala:
Are These Pairing Elements Correct? Automated Verification and Applications. 1391 - Nina Bindel, John M. Schanck:
Decryption failure is more likely after success. 1392 - Manuel Barbosa, Gilles Barthe, Karthikeyan Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno:
SoK: Computer-Aided Cryptography. 1393 - Dennis R. E. Gnad, Cong Dang Khoa Nguyen, Syed Hashim Gillani, Mehdi Baradaran Tahoori:
Voltage-based Covert Channels in Multi-Tenant FPGAs. 1394 - Daniel J. Bernstein, Tanja Lange:
McTiny: fast high-confidence post-quantum key erasure for tiny network servers. 1395 - Yasufumi Hashimoto:
A note on the multivariate cryptosystem based on a linear code. 1396 - Gaëlle Candel, Rémi Géraud-Stewart, David Naccache:
How to compartment secrets. 1397 - Xiaoxia Jiang, Youliang Tian:
How to Construct Rational Protocols with Nash Equilibrium Consistency in the UC framework. 1398 - Jan-Pieter D'Anvers, Mélissa Rossi, Fernando Virdia:
(One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes. 1399 - Assimakis Kattis, Konstantin Panarin, Alexander Vlasov:
RedShift: Transparent SNARKs from List Polynomial Commitment IOPs. 1400 - Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han:
SMChain: A Scalable Blockchain Protocol for Secure Metering Systems in Distributed Industrial Plants. 1401 - Vincent Herbert:
Automatize parameter tuning in Ring-Learning-With-Errors-based leveled homomorphic cryptosystem implementations. 1402 - (Withdrawn) No RISC, no Fun: Comparison of Hardware Accelerated Hash Functions for XMSS. 1403
- Wouter Castryck, Thomas Decru:
CSIDH on the surface. 1404 - Houssem Maghrebi, Davide Alessio:
Revisiting Higher-Order Computational Attacks against White-Box Implementations. 1405 - Tassos Dimitriou:
Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting. 1406 - Moni Naor, Omer Paneth, Guy N. Rothblum:
Incrementally Verifiable Computation via Incremental PCPs. 1407 - Aleksandr Kutsenko:
The group of automorphisms of the set of self-dual bent functions. 1408 - Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang:
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. 1409 - (Withdrawn) Efficient Constant Time Conditional Branching in the Montgomery Ladder. 1410
- James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi:
Isochronous Gaussian Sampling: From Inception to Implementation. 1411 - Augustin P. Sarr:
Cryptanalysis and Improvement of Smart-ID's Clone Detection Mechanism. 1412 - Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions. 1413 - (Withdrawn) A New Encryption Scheme Based On Subset Identifying Problem. 1414
- Hossein Arabnezhad-Khanoki, Babak Sadeghiyan:
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis. 1415 - Melissa Chase, Trevor Perrin, Greg Zaverucha:
The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption. 1416 - Xuejun Fan, Song Tian, Bao Li, Xiu Xu:
CSIDH on Other Form of Elliptic Curves. 1417 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Quantum-resistant Designated-ciphertext Searchable Encryption. 1418 - Ahmet Turan Erozan, Michael Hefenbrock, Michael Beigl, Jasmin Aghassi-Hagmann, Mehdi Baradaran Tahoori:
Image PUF: A Physical Unclonable Function for Printed Electronics based on Optical Variation of Printed Inks. 1419 - Antonis Aggelakis, Prastudy Fauzi, Georgios Korfiatis, Panos Louridas, Foteinos Mergoupis-Anagnou, Janno Siim, Michal Zajac:
A Non-Interactive Shuffle Argument With Low Trust Assumptions. 1420 - Nicky Mouha, Christopher Celi:
Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations. 1421 - Xiong Fan, Joshua Gancher, Greg Morrisett, Elaine Shi, Kristina Sojakova:
IPDL: A Probabilistic Dataflow Logic for Cryptography. 1422 - Nir Drucker, Shay Gueron, Dusan Kostic:
QC-MDPC decoders with several shades of gray. 1423 - Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu:
Efficient Side-Channel Secure Message Authentication with Better Bounds. 1424 - Zhiguo Wan, Wei Liu, Hui Cui:
HIBEChain: A Hierarchical Identity-based Blockchain System for Large-Scale IoT. 1425 - Boris Ryabko:
On asymptotically optimal tests for random number generators. 1426 - Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha:
On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes. 1427 - (Withdrawn) AC0 Constructions for Evolving Secret Sharing Schemes and Redistribution of Secret Shares. 1428
- (Withdrawn) Secret Sharing Schemes : A Fine Grained Analysis. 1429
- Alessandro Chiesa, Siqi Liu:
On the Impossibility of Probabilistic Proofs in Relativized Worlds. 1430 - (Withdrawn) Cross-Chain Communication Using Receipts. 1431
- Diana Maimut, George Teseleanu:
A Generic View on the Unified Zero-Knowledge Protocol and its Applications. 1432 - Sebastian Lauer, Kai Gellert, Robert Merget, Tobias Handirk, Jörg Schwenk:
T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction. 1433 - Nicolas Sendrier, Valentin Vasseur:
About Low DFR for QC-MDPC Decoding. 1434 - Yi Zheng, Howard Ye, Patrick Dai, Tongcheng Sun, Vladislav Gelfer:
Confidential Assets on MimbleWimble. 1435 - Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque:
Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond. 1436 - Fei Meng, Mingqiang Wang:
Reverse Outsource: Reduce the Cloud's Workload in Outsourced Attribute-Based Encryption Scheme. 1437 - Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers. 1438 - S. Sharmila Deva Selvi, Irene Miriam Isaac, C. Pandu Rangan:
Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. 1439 - Sarah Azouvi, George Danezis, Valeria Nikolaenko:
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems. 1440 - Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce:
A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications. 1441 - (Withdrawn) Server-Aided Revocable Identity-Based Encryption Revisited. 1442
- Abhrajit Sengupta, Ozgur Sinanoglu:
CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist. 1443 - Kostis Karantias, Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros:
Compact Storage of Superblocks for NIPoPoW Applications. 1444 - Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. 1445 - Claude Carlet, Pierrick Méaux:
Boolean functions for homomorphic-friendly stream ciphers. 1446 - Christian Paquin, Douglas Stebila, Goutam Tamvada:
Benchmarking Post-Quantum Cryptography in TLS. 1447 - Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst A. Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler:
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule. 1448 - David Butler, David Aspinall, Adrià Gascón:
Formalising Oblivious Transfer in the Semi-Honest and Malicious Model in CryptHOL. 1449 - Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li:
Extractors for Adversarial Sources via Extremal Hypergraphs. 1450 - Thomas Plantard, Arnaud Sipasseuth, Willy Susilo, Vincent Zucca:
Tight bound on NewHope failure probability. 1451 - Dimitrios Papachristoudis, Dimitrios Hristu-Varsakelis, Foteini Baldimtsi, George Stephanides:
Leakage-Resilient Lattice-Based Partially Blind Signatures. 1452 - Bin Wang, Xiaozhuo Gu, Yingshan Yang:
Saber on ESP32. 1453 - Claude Crépeau, Arnaud Massenet, Louis Salvail, Lucas Stinchcombe, Nan Yang:
Practical Relativistic Zero-Knowledge for NP. 1454 - Yanyan Liu, Yiru Sun:
Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption with Decryption Key Exposure Resistance. 1455 - Chitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, Keita Xagawa:
ModFalcon: compact signatures based on module NTRU lattices. 1456 - Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
RISE and SHINE: Fast and Secure Updatable Encryption. 1457 - Moni Naor, Lior Rotem, Gil Segev:
Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery. 1458 - Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska:
Side Channel Information Set Decoding. 1459 - Yongge Wang:
Byzantine Fault Tolerance in Partially Connected Asynchronous Networks. 1460 - Morteza Adeli, Nasour Bagheri:
Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP. 1461 - (Withdrawn) Privacy-preserving greater-than integer comparison without binary decomposition. 1462
- Amin Rezaei, Yuanqi Shen, Hai Zhou:
Rescuing Logic Encryption in Post-SAT Era by Locking & Obfuscation. 1463 - Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni:
New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions and Interaction. 1464 - Daniel R. L. Brown:
An optimist's Poisson model of cryptanalysis. 1465 - Edward Eaton, Fang Song:
A Note on the Instantiability of the Quantum Random Oracle. 1466 - Andrew M. K. Nassief:
Distributed Web Systems Leading to Hardware Oriented Cryptography and Post-Quantum Cryptologic Methodologies. 1467 - Jung Hee Cheon, Duhyeong Kim, Taechan Kim, Yongha Son:
A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption. 1468 - Georg Maringer, Tim Fritzmann, Johanna Sepúlveda:
The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures. 1469 - Carsten Baum, Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai:
PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server. 1470 - Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci:
A Privacy-Enhancing Framework for Internet of Things Services. 1471 - Jan Camenisch, Maria Dubovitskaya, Patrick Towa:
Efficient Fully Secure Leakage-Deterring Encryption. 1472 - Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. 1473 - Lichao Wu, Stjepan Picek:
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders. 1474 - Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi:
On the Security of Sponge-type Authenticated Encryption Modes. 1475 - Leo Weissbart, Stjepan Picek, Lejla Batina:
On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis. 1476 - Daan van der Valk, Stjepan Picek, Shivam Bhasin:
Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis. 1477 - Xinping Zhou, Kexin Qiao, Changhai Ou:
Leakage Detection with Kolmogorov-Smirnov Test. 1478 - Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li:
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups. 1479 - Fouazou Lontouo Perez Broon, Emmanuel Fouotsa:
Analogue of Vélu's Formulas for Computing Isogenies over Hessian Model of Elliptic Curves. 1480 - Alexey Oblaukhov:
On metric regularity of Reed-Muller codes. 1481 - Jiaheng Zhang, Tiancheng Xie, Yupeng Zhang, Dawn Song:
Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof. 1482 - Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo:
Communication-Computation Trade-offs in PIR. 1483 - Atsuki Momose:
Force-Locking Attack on Sync Hotstuff. 1484 - Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, Tatsuya Suzuki:
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings. 1485 - Ramiro Martínez, Paz Morillo:
RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations. 1486 - Changhai Ou, Degang Sun, Siew-Kei Lam, Xinping Zhou, Kexin Qiao, Qu Wang:
SNR-Centric Power Trace Extractors for Side-Channel Attacks. 1487 - Shohei Egashira, Yuyu Wang, Keisuke Tanaka:
Fine-Grained Cryptography Revisited. 1488 - Joël Alwen, Margarita Capretto, Miguel Cueto, Chethan Kamath, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter:
Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol. 1489 - Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang:
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme. 1490 - Yuyin Yu, Nikolay S. Kaleyski, Lilya Budaghyan, Yongqiang Li:
Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9. 1491 - Jean-Philippe Aumasson:
Too Much Crypto. 1492 - Kwang Ho Kim, Junyop Choe, Sihem Mesnager:
Solving Xq+1+X+a=0 over Finite Fields. 1493 - Alex Ozdemir, Riad S. Wahby, Dan Boneh:
Scaling Verifiable Computation Using Efficient Set Accumulators. 1494 - Ashwin Jha, Mridul Nandi:
Tight Security of Cascaded LRW2. 1495 - Chang-Bin Wang, Shu-Mei Hsu, Chang Hsiang, Jue-Sam Chou:
Improved on Identity-based quantum signature based on Bell states. 1496 - Joon-Woo Lee, Young-Sik Kim, Jong-Seon No:
Analysis of Modified Shell Sort for Fully Homomorphic Encryption. 1497 - Rajeev Anand Sahu, Agnese Gini, Ankan Pal:
Supersingular Isogeny-Based Designated Verifier Blind Signature. 1498 - Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Rønne, Peter Y. A. Ryan:
Authenticated Key Distribution: When the Coupon Collector is Your Enemy. 1499
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.